Re: [DNSOP] Working Group Last Call for "Domain Verification Techniques using DNS"

John Levine <johnl@taugh.com> Fri, 17 February 2023 18:41 UTC

Return-Path: <johnl@iecc.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F78EC151543 for <dnsop@ietfa.amsl.com>; Fri, 17 Feb 2023 10:41:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.847
X-Spam-Level:
X-Spam-Status: No, score=-1.847 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=iecc.com header.b="KBx/S1cL"; dkim=pass (2048-bit key) header.d=taugh.com header.b="A3vFKDV2"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RCBqVqBPhYfC for <dnsop@ietfa.amsl.com>; Fri, 17 Feb 2023 10:41:39 -0800 (PST)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CF244C151546 for <dnsop@ietf.org>; Fri, 17 Feb 2023 10:41:23 -0800 (PST)
Received: (qmail 12125 invoked from network); 17 Feb 2023 18:41:21 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:cleverness; s=2f5b.63efca51.k2302; bh=gRT8tH4ZgAHolq1uuPmeBkW7+yMeZdHgJlrq7Bg4ZcM=; b=KBx/S1cLrOQtR9vM3mlD6hczBvKc0f6J31zpwuRLZpgGYiwtwH3/dJqdDNigZE3FBbwIZ4eHvJtJmrOcM8NgC8fiQKBea7Sir+tzT6EUhMyushMUfsXU/GFD3re1WZ1lkmnZh6S1J/0Y7LSKFKcetJWdgLyo94ll6zZHaY/2ladSwbXXI1z5dRV3tdZ7VaTuHVqoxmBp35G+NmRUF1kMhrBKAJrL6JfgKkOuGXH39HqjbdJryicEdTetb1pepH2CYAaBhBIU/PNhHVTdpd7tP1V4aisLu/kgaWRl02LKl5oYtEONMYeV9oLr90JM03rgbcz8bPsq30vbrDTOLn7ptw==
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:cleverness; s=2f5b.63efca51.k2302; bh=gRT8tH4ZgAHolq1uuPmeBkW7+yMeZdHgJlrq7Bg4ZcM=; b=A3vFKDV2W86S2HqS76AlWeQSkjn9DuoeaIGmc2vDsZWARZ9nXvro6OjW5jo8utCjjvAJ0ctB5jJHdatHOdNg7s8A/qkPGjeaC7Angiiqb9G16eXHilXdMcEr7MSdsfri2xyHVtGHxxbA2ucNpW5OT0gdfQBECfucWdmZzKbUbaO8Q+qjycd3FP905yEOE6CC46I6O+tRgjH3tGBDkCsqpNoq4ykBufRMNuWQHP40lYhLSTa8UdZSill1qu4U0IgWfRlUdr1DxhShNc70w9+l/uCkHlc5isCc3tnmspupcU/FvGW/edAr0w601QuLvNH44vVIQMKf1DrMGAstsNN+rQ==
Received: from ary.qy ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTPS (TLS1.3 ECDHE-RSA AES-256-GCM AEAD) via TCP6; 17 Feb 2023 18:41:21 -0000
Received: by ary.qy (Postfix, from userid 501) id EA6F69990B2C; Fri, 17 Feb 2023 13:41:19 -0500 (EST)
Date: Fri, 17 Feb 2023 13:41:19 -0500
Message-Id: <20230217184119.EA6F69990B2C@ary.qy>
From: John Levine <johnl@taugh.com>
To: dnsop@ietf.org
Cc: paul@nohats.ca
In-Reply-To: <d00ae207-93fd-6105-ae08-e20775c047b2@nohats.ca>
Organization: Taughannock Networks
X-Headerized: yes
Cleverness: minimal
Mime-Version: 1.0
Content-type: text/plain; charset="utf-8"
Content-transfer-encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/eTKKfpyHeEhADemHiQf0FP8u6qE>
Subject: Re: [DNSOP] Working Group Last Call for "Domain Verification Techniques using DNS"
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Feb 2023 18:41:44 -0000

It appears that Paul Wouters  <paul@nohats.ca> said:
>> _a1b2c3.example.com IN ... "whatever"
>> _crudco.example.com IN ... "a1b2c3"
>
>Adding cryptogrpahically strong/long strings in the prefix seems
>unwieldly and prone to problems - especially if the user has to put
>these in via a webgui of mediocre quality. 

That makes no sense.  Why is it harder to copy a string to the name field
in a cruddy web GUI than to the data field?  It's copy and paste either way.

>Also it makes manual
>checking harder (eg to use the dig command). 

Same question, it's still copy and paste.

But most importantly, you
>already need a good prefix to identify the vendor and service 

No you don't. If you need a prefix to keep your 26 character randomly
generated tag from colliding with my 26 character randomly generated
tag, at least one of us needs a new random number generator.  If you want
to identify the vendor and service, that should be evident from the target
of the CNAME.

>and mucking up random strings there just seems the wrong thing to recommend
>as BCP.

It doesn't seem wrong to me.  I would hope a BCP would be based on something
more than "this seems ugly to me."

>> If you use a fixed prefix, _crudco in this case, you should register it
>> in the RFC8552 attrleaf registry.
>
>Since we are recommending these are easilly recognised to vendor and
>service, these would be different for each vendoer. Sure, we can add
>another prefix in between and put that in the attrleaf registry, but
>that doesn't add any real value.

No, that's not what I said. Each vendor should register its prefix
with attrleaf, not an extra noise word. It's not like it's hard to
register or there is a shortage of ASCII strings.

>> I realize that RFC1034 says
>> not to chain CNAMEs, but we all know that people chain CNAMEs and it
>> works, e.g. www.microsoft.com goes through three CNAMEs and it works
>> fine.
>
>I was not allowed this line or argumentation with you when talking
>about the LHS of an email address :) 

There is so much wrong in that statement I don't know where to start.

>People make mistakes with CNAMEs, let's not recommend CNAMEs so chances
>that people get affected my mistakes is reduced.

I have bad news.  People make mistakes with TXT records too.

In any event, this doesn't look like a BCP, it looks to me like
someone's personal preferences, not well supported by much else. I
would not publish it in anything like its current form.

R's,
John