Re: [regext] EPP Transport Service Discovery

"Hollenbeck, Scott" <shollenbeck@verisign.com> Thu, 21 March 2024 05:52 UTC

Return-Path: <shollenbeck@verisign.com>
X-Original-To: regext@ietfa.amsl.com
Delivered-To: regext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EFE93C17C89D for <regext@ietfa.amsl.com>; Wed, 20 Mar 2024 22:52:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=verisign.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oA5g9AEnxoQF for <regext@ietfa.amsl.com>; Wed, 20 Mar 2024 22:52:46 -0700 (PDT)
Received: from mail4.verisign.com (mail4.verisign.com [69.58.187.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 30AB7C15199C for <regext@ietf.org>; Wed, 20 Mar 2024 22:52:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=verisign.com; l=2312; q=dns/txt; s=VRSN; t=1711000366; h=from:to:cc:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version:subject; bh=ZLzebUlVqKOHA8YNxJjPl814j1jXZdM8lIn8MzwJ5Bc=; b=bYyZTcEZSwKp03k2tElzD2sR6RVtvA1pt1F8UKn2NdJ9gtb41bL4zGWQ 3mrKIQlQBp4BMdlZr1Frtf1J1lTIghg1tBWhAIes4WPic7+sJoclgBPQG GE1pgob6c6XDkNtBsxjR1qI776ddRUYuJqowjp1gqvduBZTXYbyz7wr0j g35fvljbzakIyD4xffsFjLOLDNhSmuMfTRjBfra3NA9mPlV2FdwTi2yrQ wkV931sI8RHBOY23u+8+URHm1KP6TvMzhCtYbW2T+aUBMo/kvsJHxgqSS LiN/CbrwqFYJJGAsmPkrPKWAWY6S2lST4OIwjIJMlx2CX8eVoi1KUImwh g==;
X-CSE-ConnectionGUID: etqZAS79RtCp/lQUNEYO9Q==
X-CSE-MsgGUID: ckR5SKbQQm+a0jMKTvkVJQ==
X-ThreatScanner-Verdict: Negative
IronPort-Data: A9a23:SS0f+qA38/zHgBVW/0Hiw5YqxClBgxIJ4kV8jS/XYbTApDolhjcBn zQXUGCDM6mCNjb1ct5zaoXg/B4H75aBztZhTANkpHpgcSlH+JHPbTi7wuUcHAvJd5GeExg3h yk6QoOdRCzhZiaE/n9BCpC48D8kk/nOH+KgYAL9EngZbRd+Tys8gg5Ulec8g4p56fC0GArlV ena+qUzA3f7nWYrWo4ow/jb8k83566r4GpwUmEWPpingnePzxH5M7pCfcldH1OgKqFIE+izQ fr0zb3R1gs1KD90V7tJOp6iGqE7aua60Tqm0xK6aID76vR2nRHe545gXBYqQRwO12jWxYAZJ OJl7vRcQS9xVkHFsLpFD0kAS0mSN4UekFPMCSDXXcB+UyQq2pYjqhljJBheAGEWxgp4KWxS7 M4xE29cVAyon6Wy+Y+dZ9hL1/12eaEHPKtH0p1h5RvjK68ZZ73zG/yM+9Rfxi92j8wIA+zFY YwSbj8HgBboOkUJYwhMTstjx6H01hETcBUBwL6RjbE35GzXwQp73bPuGMTYYN2RRMpT2E2fo woq+kyiWk1Da43FlFJp9FqnhdWSpgDxYbsXV7Tg9NtJvEOQ+E4qXUh+uVyT5KPRZlSFc91QL mQd/iUjp7I77wqsVNaVdwe1r3OUojYdVsZeVeog52mwJrH86RyfX3cCQy4ZMZk9qtVwQD0xk 1WO2dnzA2UprqeOTzSW8bL8QS6OBBX55FQqPUcsJTbpKfG6yG3vpnojlupeLZM=
IronPort-HdrOrdr: A9a23:CFj6mKq8LrbAteVSbp09f5waV5r2eYIsimQD101hICG9Ffbo8v xG/c5rtyMc5wxwZJhNo7690cq7Lk80nKQdibX5Vo3SPzUO1lHIEKhSqaXvxDH6EzDz+6p3xc 5bH5RWOZnVAUJhhcj3pCu1A78bquWvweSNif3Fx3lgCTt2bbpthj0VNi+AHlZoSBJ9CZ01KZ qZ6qN8zAadRQ==
X-Talos-CUID: 9a23:W5H7M2G0zRezPL1rqmJq6FcmM/t6I0fB52+XJ3aFL0tYb+ysHAo=
X-Talos-MUID: 9a23:ahKhWA1e8rfH5Uy4lSd1Qu8SkDUj6KeUVXsum6w/voqNbS5VGAuDjwqVe9py
X-IronPort-AV: E=Sophos;i="6.07,142,1708387200"; d="scan'208";a="30417925"
Received: from BRN1WNEX02.vcorp.ad.vrsn.com (10.173.153.49) by BRN1WNEX01.vcorp.ad.vrsn.com (10.173.153.48) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.37; Thu, 21 Mar 2024 01:52:44 -0400
Received: from BRN1WNEX02.vcorp.ad.vrsn.com ([10.173.153.49]) by BRN1WNEX02.vcorp.ad.vrsn.com ([10.173.153.49]) with mapi id 15.01.2507.037; Thu, 21 Mar 2024 01:52:44 -0400
From: "Hollenbeck, Scott" <shollenbeck@verisign.com>
To: "ggm@algebras.org" <ggm@algebras.org>
CC: "regext@ietf.org" <regext@ietf.org>
Thread-Topic: [EXTERNAL] Re: [regext] EPP Transport Service Discovery
Thread-Index: AQHaezvXIWdzEuaHBEWNpCp0MQ3jP7FBpzmw
Date: Thu, 21 Mar 2024 05:52:44 +0000
Message-ID: <13e10eae8f5846d487b45bdf3ab433d4@verisign.com>
References: <c9fd4e5780f740dc9129e42a28a21813@verisign.com> <CAKr6gn0u_7F6yjk+ARb19H4pH8nfwD=-8DPTg8oxL6r9+MLD0w@mail.gmail.com>
In-Reply-To: <CAKr6gn0u_7F6yjk+ARb19H4pH8nfwD=-8DPTg8oxL6r9+MLD0w@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.170.148.18]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/regext/42Nnsy97Utk1EZHVWwv3tlTLGTQ>
Subject: Re: [regext] EPP Transport Service Discovery
X-BeenThere: regext@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Registration Protocols Extensions <regext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/regext>, <mailto:regext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/regext/>
List-Post: <mailto:regext@ietf.org>
List-Help: <mailto:regext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/regext>, <mailto:regext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Mar 2024 05:52:51 -0000

> -----Original Message-----
> From: George Michaelson <ggm@algebras.org>
> Sent: Wednesday, March 20, 2024 11:00 PM
> To: Hollenbeck, Scott <shollenbeck@verisign.com>
> Cc: regext@ietf.org
> Subject: [EXTERNAL] Re: [regext] EPP Transport Service Discovery
> 
> Caution: This email originated from outside the organization. Do not click links
> or open attachments unless you recognize the sender and know the content is
> safe.
> 
> I very much tend to believing that SVCB is the way to do this. Not to emebed,
> not to invent, to use the existing mechanisms to find transports with flagging
> to rank server side preferences.
> 
> This also serves to bootstrap TLS and so is a "two birds with one stone"
> solution.
> 
> * its how other applications do it
> * it works
> * it can direct you into a secure transport without the transition through
> insecure state (mostly, as I understand it)

[SAH] Thanks, George. I understand that "word of mouth", or "described in an agreement", information exchange has worked in our current tcp/700-only operating environment. What got me thinking is the possibility of a server operator that supports multiple transports. Which one should a client choose? Is one preferred over the other? A service discovery protocol would allow us to answer those questions in-band. I recognize that the answers will generally remain static, and out-of-band communication may suffice. Since we're now giving serious consideration to additional transport mappings, though, we need to challenge the status quo bias. I'd really like to understand if there are environments in which clients and servers are more loosely coupled, too.

Scott