Re: [DNSOP] I-D Action: draft-ietf-dnsop-domain-verification-techniques-02.txt

Shumon Huque <shuque@gmail.com> Tue, 18 July 2023 00:14 UTC

Return-Path: <shuque@gmail.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3228DC151061 for <dnsop@ietfa.amsl.com>; Mon, 17 Jul 2023 17:14:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m8ADEd4a5Vyi for <dnsop@ietfa.amsl.com>; Mon, 17 Jul 2023 17:14:29 -0700 (PDT)
Received: from mail-io1-xd31.google.com (mail-io1-xd31.google.com [IPv6:2607:f8b0:4864:20::d31]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B8D98C14CE54 for <dnsop@ietf.org>; Mon, 17 Jul 2023 17:14:29 -0700 (PDT)
Received: by mail-io1-xd31.google.com with SMTP id ca18e2360f4ac-78654448524so195741039f.2 for <dnsop@ietf.org>; Mon, 17 Jul 2023 17:14:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1689639268; x=1692231268; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=QAc2fnT/xyuf6HYs1L4Enxn49UQ6IjNi//W/1i38ynY=; b=H73DkVdLI5FPqcQ74sMBdYPNz9MrrSqAyMibaCQJPKLspnSBzH80DjHgaqUDyzT+/9 Sd6ZIFhmnGxxo+OjTlROR+3H6RyE+un7B7VsgpDNEi5scOV/11ZV0W4MRSBfE9QPrJPa T+lyg7VzH56Pq7tkZMEZSJekQIbh0O5QHyJ+q60SZXtdH8BMWe0lnl0eJso1DnUq3rVR m8g9Gs+0HJmZ+j39q4SpXIkYoVqPTXBXhmRtd08eTAqTCRf5QUq/xuKMQGgYE7gNYEae Cp2Nu3CVX06wjSyTsOqDbuH2gSSDH/9H+ku3ne6PVwlZTxcUHEEoD4Rvcn8TmCrYvje5 15xw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1689639268; x=1692231268; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=QAc2fnT/xyuf6HYs1L4Enxn49UQ6IjNi//W/1i38ynY=; b=ZyZoLTFSox/gjq7+ZFCG1vWYQxsLqrZ0q+qEu+xFfP+R9wi8IAaPU7rNWq55qIynyy 3IsvziJ86/trRVK/eH7BZWHneAoLkhzoa6+Gz6NcvIFTIc9GMJOo0RlHG6QcVWEKN+fi dzz/3+jsm6TxMGlUTs6KfkREi2Wbl+hlf7WOzKx30Dd+ieuKP7H5LeWWttU4pImR0ZC4 8SYRlTxdzwxp5qBApd5gsnJtx6NvYBWc7ZMiVJXoyp5FPBXYcem7kI31eS3HMfoqLiKt YFrutxd5yCBaPJhm3HNb2cxcb2MCSEKK/dZ6L61t27Vddq/zomkEiRApppsi02VBI3aX Hu0w==
X-Gm-Message-State: ABy/qLZS7reApSBXKIy4bbczHQ9qRuyPdZlXPODbbE3iJp3KHaeisgXi d9JJJNsA0ZK/qtC70bgihfnr+90yzrJ+Swyv4Y4=
X-Google-Smtp-Source: APBJJlEYITHXPt6EGrnJ3wiNcAQLXH8a6MSjArA3NH5JFmfHM1uubmkvxHrhUl4INz6FxmsTTqk3oFRAvEYHJmlZJzc=
X-Received: by 2002:a5d:9956:0:b0:787:1c51:ff99 with SMTP id v22-20020a5d9956000000b007871c51ff99mr1186122ios.11.1689639268569; Mon, 17 Jul 2023 17:14:28 -0700 (PDT)
MIME-Version: 1.0
References: <ff30dd1e-2e4a-f037-5676-fa26c523acb1@taugh.com> <8524A81C-8113-4BDC-B962-2786DE83EDEC@nohats.ca>
In-Reply-To: <8524A81C-8113-4BDC-B962-2786DE83EDEC@nohats.ca>
From: Shumon Huque <shuque@gmail.com>
Date: Mon, 17 Jul 2023 20:14:17 -0400
Message-ID: <CAHPuVdXuDrdPPdE_poV6Be=XbWfJPtYN16DC+JTAQOf-zXyOug@mail.gmail.com>
To: Paul Wouters <paul@nohats.ca>
Cc: DNSOP Working Group <dnsop@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000066d75f0600b7ccd6"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/fPjqSGdyDi9cCH5wpoxxmhvZO8M>
Subject: Re: [DNSOP] I-D Action: draft-ietf-dnsop-domain-verification-techniques-02.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jul 2023 00:14:30 -0000

On Mon, Jul 17, 2023 at 7:20 PM Paul Wouters <paul@nohats.ca> wrote:

> On Jul 17, 2023, at 14:12, John R Levine <johnl@taugh.com> wrote:
>
> > The only somewhat plausible argument I see against stuffing the apex is
> that if people are sloppy, they might invent tokens that could be confused
> with each other.
>
> This is an important point and what got me involved with the draft.
>
> > But people have been putting tokens at the apex for years and I have
> never, ever, heard of token confusion.
>
> It’s literally what happened to me in the first week of my current
> $dayjob. I found 5 tokens that no one knew what they were, whom they were
> for and whether or not they were still needed.
>

I'm glad you found out about an issue well known to many DNS administrators
at large organizations! :)

"Stuffing" data for unrelated applications into the same DNS record
(whether at the apex or further down in the zone) has at least the
following other issues:

* Verifiers can't query for the specific data they need from the DNS. They
need to get a potentially large blob of data and look for what is
applicable to them by examining the rdata for each record in the RRset.
This is not a new issue. It is the well known record subtyping problem that
was advised against in RFC 5507 (IAB; "Design Choices When Expanding the
DNS"). That advice was targeted to new RR type design, but it applies just
as well to this type of use of TXT RDATA resident at the same name.

* You can't delegate the (application specific) domain validation record to
a 3rd party.

* Even if you don't delegate the name to another party, you may have a
shared DNS zone where you need to be able to provide record level
permissions to the specific team that is responsible for the application in
question. This can't be done if all the apps share the same domain name.

Shumon.