[DNSOP] Re: [Ext] Persistence of DCV, including for Delegated DCV (for draft-ietf-dnsop-domain-verification-techniques)

Paul Wouters <paul@nohats.ca> Fri, 30 May 2025 20:42 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: dnsop@mail2.ietf.org
Delivered-To: dnsop@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 655C22EF3561 for <dnsop@mail2.ietf.org>; Fri, 30 May 2025 13:42:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -4.398
X-Spam-Level:
X-Spam-Status: No, score=-4.398 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=nohats.ca
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PwKOWIHEZlT8 for <dnsop@mail2.ietf.org>; Fri, 30 May 2025 13:42:08 -0700 (PDT)
Received: from mx.nohats.ca (mx.nohats.ca [193.110.157.85]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 653782EF3557 for <dnsop@ietf.org>; Fri, 30 May 2025 13:42:08 -0700 (PDT)
Received: from localhost (localhost [IPv6:::1]) by mx.nohats.ca (Postfix) with ESMTP id 4b8FXb2SKsz519; Fri, 30 May 2025 22:42:07 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1748637727; bh=D1xBxLpvOByQSatOvAkp5Ax59GUSyKiiE57qMZODCSk=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=pCQul2KPhL/Y5LJ13FgL8Om/QxJUFnSEvatbwDjaBUPFZaJCrzSEt2KDg5wiCWS59 4g6UrgWuDzYaA6p9DXqwDdELaT668xdbQZqfJCP0DoJ0lE42L5YrX3YE15yMHEd97q a3fVvFz4Xa7lhDHHVkv7KZrqegISDn5mKKJNwbbY=
X-Virus-Scanned: amavisd-new at mx.nohats.ca
Received: from mx.nohats.ca ([IPv6:::1]) by localhost (mx.nohats.ca [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id okqp3vNq-0dz; Fri, 30 May 2025 22:42:06 +0200 (CEST)
Received: from bofh.nohats.ca (bofh.nohats.ca [193.110.157.194]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.nohats.ca (Postfix) with ESMTPS; Fri, 30 May 2025 22:42:05 +0200 (CEST)
Received: by bofh.nohats.ca (Postfix, from userid 1000) id EC28615D84C4; Fri, 30 May 2025 16:42:04 -0400 (EDT)
Received: from localhost (localhost [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id E90BC15D84C3; Fri, 30 May 2025 16:42:04 -0400 (EDT)
Date: Fri, 30 May 2025 16:42:04 -0400
From: Paul Wouters <paul@nohats.ca>
To: John R Levine <johnl@taugh.com>
In-Reply-To: <22871113-3a09-7c6a-4c01-a839708c9788@taugh.com>
Message-ID: <18669799-4670-3e2b-b9ad-dd110ba79552@nohats.ca>
References: <16ef83e1-3ba4-cd0a-24ee-85557e0e838e@taugh.com> <A730BDB0-7387-417F-92E3-B654867CA3BD@strandkip.nl> <22871113-3a09-7c6a-4c01-a839708c9788@taugh.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"; format="flowed"
Message-ID-Hash: RYON5CUZMRUZ3UQXP3EC2KOUWAGNACF6
X-Message-ID-Hash: RYON5CUZMRUZ3UQXP3EC2KOUWAGNACF6
X-MailFrom: paul@nohats.ca
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-dnsop.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Joe Abley <jabley@strandkip.nl>, Paul Hoffman <paul.hoffman@icann.org>, dnsop@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [DNSOP] Re: [Ext] Persistence of DCV, including for Delegated DCV (for draft-ietf-dnsop-domain-verification-techniques)
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/tmt_mWR5EyddpNfYTULfqWOruzM>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Owner: <mailto:dnsop-owner@ietf.org>
List-Post: <mailto:dnsop@ietf.org>
List-Subscribe: <mailto:dnsop-join@ietf.org>
List-Unsubscribe: <mailto:dnsop-leave@ietf.org>

On Fri, 30 May 2025, John R Levine wrote:

> On Fri, 30 May 2025, Joe Abley wrote:
>>  I have definitely received automated email telling me that my domain is
>>  about to be detached from a particular service because the TXT record had
>>  been removed. Other TXT records I have been removed in the interests of
>>  hygiene had no such effect.
>>  I agree that consistency would be better than this state of affairs.
>
> It seems to me that a DCV in the form we use is no worse than anything else 
> persistent that's going to be in the DNS.  The point of the random token is 
> to show that the person publishing the DNS record is the one with the account 
> to be verified, but once it's published the cat is out of the bag.  I don't 
> see any way to fix that other than periodically changing the token, and if 
> you're going to do that, you know where to find ACME.

Indeed, but is a cron job really a method to confirm continued
acceptance of a service? It requires credentials to make a DNS
change and in a way only weakens the security model. (just like ACME
using DNS-01 doesn't add anything to just publishing TLSA records in
the DNS)

>>  It also seems possible that there is a need for two signals: that a domain
>>  is authorised to onboard to a particular service, and that a domain is
>>  authorised to continue to be linked to a service.
>
> I would guess that the chances of the places that use DCV would use two 
> different signals is on the order of 0.001%.  I suppose a flag like 
> expiry=indefinite rather thean exppiry=260123 could give DNS people a hint of 
> which ones are OK to delete.

Which is what we did in more detail in previous versions of this draft.
Some in the WG thought this was too complex, and we toned it down a bit.

I don't see many people disagreeing with your statement here on a simple
expire= RRdata content. I would be happy to restore some of this text,
eg like the old version had:

https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-domain-verification-techniques-03#section-5.2.1

It would be great if the Chairs could do some consensus call on this, so
the authors know how to resolve this discussion point.

> PS: The threat model for faked long term DCV seems rather implausible. A 
> malicious actor is going to fool some SaaS company into continuing my 
> subscription so they can steal it?  That's going to be hard to do once I 
> don't pay the bill.

Yes. The model mostly assumes a new domain owner wouldn't copy old
content and so any services will get quickly decomissioned when the
domain owner changes. This is not about active attackers.

Paul W