[DNSOP] Re: [Ext] Persistence of DCV, including for Delegated DCV (for draft-ietf-dnsop-domain-verification-techniques)

Ben Schwartz <bemasc@meta.com> Mon, 12 May 2025 17:36 UTC

Return-Path: <prvs=1227382186=bemasc@meta.com>
X-Original-To: dnsop@mail2.ietf.org
Delivered-To: dnsop@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id C195827A5B88 for <dnsop@mail2.ietf.org>; Mon, 12 May 2025 10:36:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.091
X-Spam-Level:
X-Spam-Status: No, score=-2.091 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=meta.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gLKzVzk7uu51 for <dnsop@mail2.ietf.org>; Mon, 12 May 2025 10:36:10 -0700 (PDT)
Received: from mx0b-00082601.pphosted.com (mx0b-00082601.pphosted.com [67.231.153.30]) by mail2.ietf.org (Postfix) with ESMTP id 9EC5B27A5B63 for <dnsop@ietf.org>; Mon, 12 May 2025 10:36:09 -0700 (PDT)
Received: from pps.filterd (m0109332.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 54CHOwCi010222; Mon, 12 May 2025 10:35:48 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=meta.com; h=cc :content-type:date:from:in-reply-to:message-id:mime-version :references:subject:to; s=s2048-2021-q4; bh=lyU0fsfiTb8dw2jrANpw we6yry9JeyaKHGqBAXbyCvY=; b=XG5V1o9tbvuFb5NcIpvEgLXRyX2oyS6/6MdU xGOUbtqcs6oqC+Oe2geuxK0OVsflQJy80fFlFRUiKDFnlTNPoGfvpf6CqaesjaB6 +6IES6PYyAqZkpInS1qNtx6iIYiFvO60oBiMa7nz35sGSmmKSugRppvtnc0CRNu/ 6ZAfRFkSext3Degzs0hz8uLLyQK+31akRYtMh8ARHI0aWu+Xx/hytnKOQ/6x5fR+ 6JcI60+gKj+AZFlDYoQK7wSVYGU8sk3sWqPjnO4k+8fUWoJeqhaBBQput4GCqFY6 r9U1Fw+eNN1+MmJQgwtPE1IPXJEajHC+EgePXS0RDkvknmqGQQ==
Received: from nam11-bn8-obe.outbound.protection.outlook.com (mail-bn8nam11lp2168.outbound.protection.outlook.com [104.47.58.168]) by mx0a-00082601.pphosted.com (PPS) with ESMTPS id 46kjj6sqb7-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 12 May 2025 10:35:47 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=wfYPQYqst4z/2Hz4erVtOTg/4lVuX5s+bHozRwLKbh/r5mCgVQO3HSk2UpcBWr06ufifPZwj9ESo5x3grBTVrGJxM9zgrM0AtgF2kzwTGzhp64dEGsmU/ykKVoix4a/pG7I1SpxBJOYbxwg51NuVstqH2jlS0P5snoNpx+LGkBzZ5A/OYU7vDjM+RDO8w956LA1wDMHj9q5FB3+Soto8twq8DkH7u7Tr5ZxJy6bVPPdvHiS78/9wKail+Fn0SKTRx5R4W6F68Ue9cdg5B3y0+ELmcnU2T7GWqmcHbS90Q/8LQDW9awpweEZyqYh0+DmliYB81Mp7WIPSiO4K2s5kVA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=/Q6vu18C+BjV+FCbmA0dMRms2N6K40RQUPZVWDUk8O4=; b=B4iO7zZjBYPm/xukwGGjH5GJ6gO7agrD7W1Y7fWi3jHi4m3yhEkHDaGvn1RKNVVnZTgVGe/kcql+/ynHjDT3cF19Hb/KANjkhG+R7bh2uLd0Bql62kbVp+zu0JpswEgrwgjDjNp9RaLMBEmHoCDK4HwxPRAj97ARC4FPA59xzO+vHPTFZFFtt70dpcFDD9YLE28j/WJKsEOyiXnPPUtiJhEIq0QLwTb/m2TcuG/XwxYShG8HBdjv1UpxzIIGgnV2bxx7LARRAcgjbhe4VA5BpRkBYpIzmmMUC0HS8uk72zrwoPv45I8djLPyfj8ZJ1CDop11y8pwpIhbNjqaHW4OSg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=meta.com; dmarc=pass action=none header.from=meta.com; dkim=pass header.d=meta.com; arc=none
Received: from SA1PR15MB4370.namprd15.prod.outlook.com (2603:10b6:806:191::8) by BLAPR15MB4050.namprd15.prod.outlook.com (2603:10b6:208:27e::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8722.30; Mon, 12 May 2025 17:35:45 +0000
Received: from SA1PR15MB4370.namprd15.prod.outlook.com ([fe80::b6dd:72cc:243a:babb]) by SA1PR15MB4370.namprd15.prod.outlook.com ([fe80::b6dd:72cc:243a:babb%6]) with mapi id 15.20.8722.027; Mon, 12 May 2025 17:35:45 +0000
From: Ben Schwartz <bemasc@meta.com>
To: Erik Nygren <erik+ietf@nygren.org>, Paul Wouters <paul@nohats.ca>
Thread-Topic: [DNSOP] Re: [Ext] Persistence of DCV, including for Delegated DCV (for draft-ietf-dnsop-domain-verification-techniques)
Thread-Index: AQHbvp+M3AnOaq0ojUaBCQcWT05HUbPPNvmAgAAE7oCAAANIAIAABl7E
Date: Mon, 12 May 2025 17:35:45 +0000
Message-ID: <SA1PR15MB43706B717CABF88178152F57B397A@SA1PR15MB4370.namprd15.prod.outlook.com>
References: <CAKC-DJiQXWqT+kitGO_bjdwAzN8u11WrGfSpE99HGtoVbg9OHw@mail.gmail.com> <C42CC896-CA4C-4894-9A35-D5027FD48521@icann.org> <1f9237cf-fc78-3e12-f8bb-40699dc04d21@nohats.ca> <CAKC-DJhLGHmWVT8JYkSHAfm7HiT8dLmiOqN6Aqc2kN4dyXK96g@mail.gmail.com>
In-Reply-To: <CAKC-DJhLGHmWVT8JYkSHAfm7HiT8dLmiOqN6Aqc2kN4dyXK96g@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: SA1PR15MB4370:EE_|BLAPR15MB4050:EE_
x-ms-office365-filtering-correlation-id: e6b2405d-3a38-4cff-a46a-08dd917b6d55
x-fb-source: Internal
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|376014|366016|4022899009|10070799003|1800799024|8096899003|38070700018|13003099007;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SA1PR15MB4370.namprd15.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(4022899009)(10070799003)(1800799024)(8096899003)(38070700018)(13003099007);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: n5CqtJqiV4PL5uvt31lwYUI0mcz5zRzMLkDPKNdpWddt42T2YAT1z1D6dLPJb9781L0LSec/eUB0RA2UtuIUA4nNs3neJgVlfu2ayKfRJH+jnL6VGhWAYaXAhRT4aTbhv0WLFbAMtA9JrXFPabZ1DvNzpPcoquqY69+byvLvTLzxPJEjcSIaPaZ330+cVGZE4w0L5B2HDHBAWOcHvrmufF4ZcEh1V3S+zCC65vHilVeYasVjINfQ5Mxrrlbga2NZzdphgQamzOn8UHdc5VkivmiSXt6oGw0NRoqJyO4wj/S1efq6+J1XgNJmLFh3PusbksQJVgHgaFzDY+C+FEJxpQuaLYCWS8NDWRFX+thnw76SztgTKJvzlXhbrJMqVBMsIH2C5fjNT9g6GT2ZSlp24q6Ob6PPnmpDbQuOwHk5UNv2jn6dvvAp8YWAnKRE1uPlBZFRV47nOhrdTxkJhM9TsLnPJuPxMlgXKMxYnUkZw3ILrK9euQise1QFZNtFsURYHSbYkxOu9me551MgDQlewEK5D+fiIJnmzRZryqMVwbSwZyRM8O61xl9ZsFHil4vG37Hk1DhF0dtTsL36o1QhHvkrLJ/L5oo63Ow6Ukj4oH33DPlsxbhnmx9uQxHU3+rzCbv7kNl8L6/heEkGo52J0wEjAHH7lKJ2pmTOxk8AODQhYCEMsVtiyxMkibVYbO0BvISD1p2ZJfF9p+DIiOyEX3KJZs/Ks2m5nU52xENzVwEkuFUvJLyUvV5XCHx68inoXMwuCaoF2KtHnxn5HlgwbVujMkPyIOnO48gLpOw8WIs2h7XVfZNKYR7ODwOWqc8nNKl7feKbHWtiRJ+xVWpzjChfrBxxeudwtygUJFrEHZqa08wTw8g6zHshEzsGHc5cCsfUaBzNzYKR4BBWaXe78Xy3eCtHR45hPhuff7tmKe9NfJJVnYAT99E5Ipws/Nl9MTscpN8kgIPXV5EW0ZeAs3GlkiGKV6POKaRmQNJuT+k+oYjXGwarRFv/GXPauH2bhXAL8bxtnSWcujBy9CThHodPYnf33sBMgXKkOM4Fpwn4Qgdk0djzap2Nxdk6NTBRp9truVlewpfMmuu/sIN+h8EJfb8IASY5p75h67ugHEsNo4896xWYEeywiAcvm0KOEBfdsyOyqJexa5D33/k9RGAPRGFBr9JilsaQPfhlmeWgI6Mk2Z8rqbQkw78m08L4CMzsXTkQojyKWvh5T/XPcG/ykc+6bXPpudpMRf754dn8e8P0S8fA/vAXwwLKsXtBGHr4YldWHmWXQbHti9ZFK5yUd0qkK0QLAyPAt5xgdXZJ9m9aj4kfr0lC9xlRvB2T+1brYvz9b0ScpHGqAeyLfDN10ofRrgT7xzkDYYtpFBCf3fVimnKcEWKQGZobsmsjmO6iTPd0zfb8P6I2p9Susa/g20iia+Itd4elIQVh5nHv+2/gO6qi0MBppDkit3Zv5jJs+5Uc4dPcHptzMf/CsXY8H52xMp1qj8e/+p/RvhZBDyj81/Gz8ziqajqWn4Zt0eVK6iRSLPAP0n2XLwppVfqU9QYj7KuLJs+7Ovh8971ZDGGiBT1gjZ3IhVaf4z72rk+iDIgDekJ9un8Xgy9BUIPBkFMZpnIMK4sc1D3P464=
Content-Type: multipart/alternative; boundary="_000_SA1PR15MB43706B717CABF88178152F57B397ASA1PR15MB4370namp_"
MIME-Version: 1.0
X-OriginatorOrg: meta.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SA1PR15MB4370.namprd15.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e6b2405d-3a38-4cff-a46a-08dd917b6d55
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 May 2025 17:35:45.7433 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 8ae927fe-1255-47a7-a2af-5f3a069daaa2
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: hl7n7pUx7GOY+Zg7I7381d/W6TaLLXJ6lXZV4lIagYlWFgcx+7YHH0wfPr5F5nGu
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLAPR15MB4050
X-Proofpoint-GUID: Pv0LnzivOVex3MlRrA0l32XuBOCx9P7u
X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUwNTEyMDE4MSBTYWx0ZWRfX73OXsrY1BlcZ TdOV5kx9Ulok299/akwUgPeULknKeDN2BE7ZmqdvTX1/b+CLG0X+QC8c0fgU5Yvfh/ShELv8wsi PYsJyFn3kZiNGXcNJWnuixmc6pKgmCKpwZeLPtYABff7k4b7eQs9pObdk+kbAktDRs7+HNDPaWp FBMdIx30foTW/B3HJS6vJO6fHXo/ExxSdcrR/ZdWLF14CdZzQdJq2EINf4A+DHw4JmaUGgFRMFs WehvUx9mJS7IAx8nBPOAqLU8PV+w/8QF9ieSZe33bM5yFq9CJd4xozxAK1zbz6zJNEdbsfQNQ8V iY08T0D/KxJO7Nt/jTHc/jLDqrqevNLErIu5TlrbiR6DWJ1Rvn2a9bqs6TTS8Z4HUyi8D/QD6sd I3NwnDW8yvkWu0yDHEfMVDmV0Qzvg+5ayFmSc53Da5tAzC7im8tbj85CunHABk5+F2pBvskS
X-Proofpoint-ORIG-GUID: Pv0LnzivOVex3MlRrA0l32XuBOCx9P7u
X-Authority-Analysis: v=2.4 cv=Xb+JzJ55 c=1 sm=1 tr=0 ts=68223173 cx=c_pps a=ztkV8ooph0rfw1Th5QLTnw==:117 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=wKuvFiaSGQ0qltdbU6+NXLB8nM8=:19 a=Ol13hO9ccFRV9qXi2t6ftBPywas=:19 a=xqWC_Br6kY4A:10 a=dt9VzEwgFbYA:10 a=NEAV23lmAAAA:8 a=uZw_3lL1AAAA:8 a=N7iCXatbAAAA:8 a=m9shYIPOAAAA:8 a=48vgC7mUAAAA:8 a=wfokF6qfTVkyScoz3osA:9 a=QEXdDO2ut3YA:10 a=uKoNhR6qPNqcwvqS9v0A:9 a=2q4O/K3rjNU7EHYdBHB6dYyilSc=:19 a=SlJTIFf2Dr9-XEW2:21 a=frz4AuCg-hUA:10 a=_W_S_7VecoQA:10 a=lqcHg5cX4UMA:10 a=izJwDFX-b3pl2plFB0Pf:22 a=96hUrU2xWrTe0OLsCvyc:22
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1099,Hydra:6.0.736,FMLib:17.12.80.40 definitions=2025-05-12_06,2025-05-09_01,2025-02-21_01
Message-ID-Hash: 7XE4SYKEVXCAQ5H7WJJO7YWWUMSMVPGQ
X-Message-ID-Hash: 7XE4SYKEVXCAQ5H7WJJO7YWWUMSMVPGQ
X-MailFrom: prvs=1227382186=bemasc@meta.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-dnsop.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Paul Hoffman <paul.hoffman@icann.org>, dnsop WG <dnsop@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [DNSOP] Re: [Ext] Persistence of DCV, including for Delegated DCV (for draft-ietf-dnsop-domain-verification-techniques)
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/sv7yXJ6CYfWtWCnQO5K9wkPmW0c>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Owner: <mailto:dnsop-owner@ietf.org>
List-Post: <mailto:dnsop@ietf.org>
List-Subscribe: <mailto:dnsop-join@ietf.org>
List-Unsubscribe: <mailto:dnsop-leave@ietf.org>

Paul W wrote:

> I don't think there was that much disagreement between authors. It was
> mostly a disagreement between authors and Ben Schwartz about whether
> the initial DCV record can or should be used as long term permission
> token.

I believe the current draft text in the datatracker agrees with me.  For example, draft-07 Section 4.3 says

> Some Application Service Providers currently require the Validation Record to remain in the zone indefinitely for periodic revalidation purposes. This practice should be discouraged. Subsequent validation actions using an already disclosed token are no guarantee that the original owner is still in control of the domain, and a new challenge needs to be issued.

Surely something cannot be a "best current practice" if it is also "discouraged" and one "needs" to use the other approach.  However, other portions of the draft are somewhat in tension with this paragraph, hence my PR to try to clarify the draft's stance.

> Talking about life cycles is useful, but I think like the lifecycle for
> SSL certificates, can only be feasibly done if there is an automated
> system like ACME to fully automate this. The question then though, is
> how much real "admin permission" does such a record give you if the
> admin really doesn't know because a certbot like script is running
> someplace authorizing on their behalf?

The (unstated!) presumption of DCV is that an actor who can write a DCV record at _$foo-challenge.$domain can also overwrite any record on $domain.  This actor could already do a lot of bad things, like taking websites on $domain offline, so their permission is sufficient to perform certain actions that pose risk (e.g. creating a risk of DoS), as that risk is not incremental.

Without this assumption (or an equivalent rule about parties authorized to update parts of the zone), DCV doesn't work at all.  Perhaps we need to make that more explicit...

> I still believe we are picking the best of _current_ practices ...

Drawing a very hard distinction between DCV and persistent authorization is certainly a current practice, and in my view (and the view of draft-07!) it is the best one.  Not all current practices are best ... even if they are indeed widely used without incident.

--Ben

________________________________
From: Erik Nygren <erik+ietf@nygren.org>
Sent: Monday, May 12, 2025 12:52 PM
To: Paul Wouters <paul@nohats.ca>
Cc: Paul Hoffman <paul.hoffman@icann.org>; dnsop WG <dnsop@ietf.org>
Subject: [DNSOP] Re: [Ext] Persistence of DCV, including for Delegated DCV (for draft-ietf-dnsop-domain-verification-techniques)

I agree with Paul W here. I don't think there's disagreement between the authors, and I believe that it is important to cover\ the current practices where assumptions about persistence are being made. If we go back to the examples that

I agree with Paul W here.  I don't think there's disagreement between the authors, and I believe that
it is important to cover\ the current practices where assumptions about persistence are being made.
If we go back to the examples that were in an appendix of earlier versions of this draft some of them
do assume persistence, and that is part of how we got into this.  As such, I do think we have experience
there with some of the pitfalls of certain implementations around persistence.
(For that matter, an NS record is a form of persistent delegation, although outside the scope of this draft.)

Since this doesn't appear to be clear to some readers it does seem like it would be worthwhile
to add some text to explain point-in-time-validation vs persistent validation and to highlight pitfalls.
I don't really think there is as clear of a distinction between point-in-time validation,
persistent validation, and delegation for ongoing point-in-time validations as Ben implies.
They are all cases which apply and are variations and it would be good to cover all of them
in the draft as the current version does.

      Erik




On Mon, May 12, 2025 at 12:41 PM Paul Wouters <paul@nohats.ca<mailto:paul@nohats.ca>> wrote:
On Mon, 12 May 2025, Paul Hoffman wrote:

[ speaking only as co-author of draft-ietf-dnsop-domain-verification-techniques ]

> Reading this thread and the GitHub issue that spawned it, it is clear that even the co-authors of draft-ietf-dnsop-domain-verification-techniques do not agree on how to handle persistence of validation, much less agreement among WG participants. This may be due to lack of real-world experience with persistent validation, even though we have plenty of experience with single shared secret validation for one instant.

I don't think there was that much disagreement between authors. It was
mostly a disagreement between authors and Ben Schwartz about whether
the initial DCV record can or should be used as long term permission
token.

Ben argues the draft is a BCP and should specify the "best way forward"
and use two different records. My counter argument is that the draft
is a "best CURRENT practice", anod no one I know is currently doing
this.

For reference, the github thread is here: https://github.com/ietf-wg-dnsop/draft-ietf-dnsop-domain-verification-techniques/pull/160


> draft-sheth-identifiers-dns is a good start at thinking about the differences between persistent validation and single shared secret validation. It seems safe to limit draft-ietf-dnsop-domain-verification-techniques to just the latter, and hopefully the WG adopts draft-sheth-identifiers-dns and has more discussion about what might become best practices there.

Talking about life cycles is useful, but I think like the lifecycle for
SSL certificates, can only be feasibly done if there is an automated
system like ACME to fully automate this. The question then though, is
how much real "admin permission" does such a record give you if the
admin really doesn't know because a certbot like script is running
someplace authorizing on their behalf?

> I'm posting here because just last week I thought that draft-sheth-identifiers-dns should be part of draft-ietf-dnsop-domain-verification-techniques because there was general agreement on what were best practices. I was wrong, and the more that I thought about what I would say were best practices for persistence validation, the more I realize that I hadn't thought enough about the operational and security considerations.
>
> Given that, I propose that draft-ietf-dnsop-domain-verification-techniques be narrowed to only cover the best current practices for shared secret validation, and get that published sooner rather than later. I further propose that draft-sheth-identifiers-dns be adopted by the WG, on the assumption that it starts with the same naming scheme from draft-ietf-dnsop-domain-verification-techniques.

I still believe we are picking the best of _current_ practices, and I
still believe the document should document that if you are using the
DCV record for continue permission, that it should be clear in the
RDATA using key=value pairs with for example expire=never and that
DCVs that can be removed after a one time verification, SHOULD contain
a expire=<datestamp> value. Punting this discussion further into the
future means there will be more DNS littering until that unknown future
time.

Paul W

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org<mailto:dnsop@ietf.org>
To unsubscribe send an email to dnsop-leave@ietf.org<mailto:dnsop-leave@ietf.org>