Re: [DNSOP] Verifying TLD operator authorisation

Joe Abley <jabley@hopcount.ca> Fri, 14 June 2019 02:30 UTC

Return-Path: <jabley@hopcount.ca>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4DEF412010E for <dnsop@ietfa.amsl.com>; Thu, 13 Jun 2019 19:30:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.996
X-Spam-Level:
X-Spam-Status: No, score=-1.996 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=hopcount.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FwP956JcqShB for <dnsop@ietfa.amsl.com>; Thu, 13 Jun 2019 19:30:14 -0700 (PDT)
Received: from mail-lf1-x12b.google.com (mail-lf1-x12b.google.com [IPv6:2a00:1450:4864:20::12b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A81211200D6 for <dnsop@ietf.org>; Thu, 13 Jun 2019 19:30:13 -0700 (PDT)
Received: by mail-lf1-x12b.google.com with SMTP id b11so603496lfa.5 for <dnsop@ietf.org>; Thu, 13 Jun 2019 19:30:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hopcount.ca; s=google; h=from:mime-version:references:in-reply-to:date:message-id:subject:to :cc:content-transfer-encoding; bh=FFIgbI1XZE1tpPQHbd3ZOFisEbNrg6bqUw95kngLEPk=; b=Csca07RKTY8XFL3XTKPUpp6VADXcXF2WQRsGyVHcU4vpkNoopUJMD5ury/lHDF6UR2 EzSSINv9AOeEm4hPvhV0zH3zIlQzlvyQr3licTPxb8kni6xuZuTybXgjvvcu/XPbM1KZ a8jKlShZbhPfgHp6v57M1GhvHDJ/KTo9Wef3c=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:mime-version:references:in-reply-to:date :message-id:subject:to:cc:content-transfer-encoding; bh=FFIgbI1XZE1tpPQHbd3ZOFisEbNrg6bqUw95kngLEPk=; b=OYDv/BtcjaK5vfGPSdG5d7uQHpFhMCm6gbMoKdkdKdXF2v9r3lVEhjEH+gbwGPHe3E cSZ6+ZaH46D4cquNI3w1Ws16wt43P5jxS2r8lrZBEA3WD/MbnvXNFOegIzezgElTeR+n f+JslPfFhdlHerMPRSBNahalau2IrMfYn0X4m5wX3tq1Z3ZiT+EFRVe5hYSXnVFi4B4A eZPI+dnt+HdovrFCRnuu9QGBKx5cYZv5xxaWW/LuaLKb5F2G1SIYO3NUHVw+KH85i9YV U1C1PSNRF/LX5ENtdQ+imB6DR+UYOwDEn31SkZ0BVP22+hZFpSzPq9XgGzpTV1i8seDK hDcg==
X-Gm-Message-State: APjAAAWRaqA5ZWewc9sKESD8LRMSvjs067eJoaNnsmJNi1+WI//0c5ux MRjN1jwZzBz/ZuyIUJOBpA5gehg/UY3y3twDf6THiQ==
X-Google-Smtp-Source: APXvYqyCVQYQwW+MX25Nrm/QdEItb5SkBxXvcH/yCVQH40GGm4rvFAyglYRJuh4NTDb8P8t6qDiCE3c5ZrIy0dQMCYM=
X-Received: by 2002:ac2:482d:: with SMTP id 13mr2988159lft.132.1560479411836; Thu, 13 Jun 2019 19:30:11 -0700 (PDT)
Received: from unknown named unknown by gmailapi.google.com with HTTPREST; Thu, 13 Jun 2019 19:30:10 -0700
From: Joe Abley <jabley@hopcount.ca>
Mime-Version: 1.0 (1.0)
References: <CAFz7pMvkQUz78Qow03RsFKHof3nrnGu3BUwUP0zstWgVtP3Msw@mail.gmail.com>
In-Reply-To: <CAFz7pMvkQUz78Qow03RsFKHof3nrnGu3BUwUP0zstWgVtP3Msw@mail.gmail.com>
Date: Thu, 13 Jun 2019 19:30:10 -0700
Message-ID: <CAJhMdTPTY7DmXPtTbAVCd+HNUgj9NkQoXyqa3Yx3LBJnQ+DwrA@mail.gmail.com>
To: Nick Johnson <nick=40ethereum.org@dmarc.ietf.org>
Cc: dnsop@ietf.org
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/X0ENn69XQkJIQOKXGYhkM0qtooo>
Subject: Re: [DNSOP] Verifying TLD operator authorisation
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Jun 2019 02:30:16 -0000

On Jun 13, 2019, at 22:18, Nick Johnson
<nick=40ethereum.org@dmarc.ietf.org> wrote:

> I'm working on a system that needs to authenticate a TLD owner/operator in order to take specific actions.

Can you give an example of the actions?

When you say "owner/operator" what exactly do you mean?

> We had intended to handle this by requiring them to publish a token in a TXT record under a subdomain of nic.tld, but it's been brought to our attention that we can't rely on nic.tld being owned by the TLD operators - this is only a reserved domain on ICANN new-gTLDs, not on ccTLDs or older gTLDs.

Right.

> An alternative is to require a message signed by the TLD's DNSSEC zone signing key, but I'm uncertain whether it's practical for TLD operators to sign arbitrary messages using their keys.

It does sound like a bit of a stretch. Also, not all TLDs are signed,
and some of those that are have KSKs that are constrained by process
as to how they can use, so using them for a new purpose might be
expensive.

> Are there domains that are globally reserved for the operator across all TLDs?

The zone apex is the only owner name you can rely upon always
corresponding to a particular TLD, but don't expect it to be simple to
publish new and exciting things there in all cases.

> If not, does anyone have any recommendations on an alternative authorisation or authentication mechanism?

It's hard to make a useful suggestion without understanding what
you're trying to accomplish.


Joe