On Fri, 30 May 2025, John R Levine wrote:

On Fri, 30 May 2025, Joe Abley wrote:
 I have definitely received automated email telling me that my domain is
 about to be detached from a particular service because the TXT record had
 been removed. Other TXT records I have been removed in the interests of
 hygiene had no such effect.
 I agree that consistency would be better than this state of affairs.

It seems to me that a DCV in the form we use is no worse than anything else persistent that's going to be in the DNS. The point of the random token is to show that the person publishing the DNS record is the one with the account to be verified, but once it's published the cat is out of the bag. I don't see any way to fix that other than periodically changing the token, and if you're going to do that, you know where to find ACME.

Indeed, but is a cron job really a method to confirm continued
acceptance of a service? It requires credentials to make a DNS
change and in a way only weakens the security model. (just like ACME
using DNS-01 doesn't add anything to just publishing TLSA records in
the DNS)

 It also seems possible that there is a need for two signals: that a domain
 is authorised to onboard to a particular service, and that a domain is
 authorised to continue to be linked to a service.

I would guess that the chances of the places that use DCV would use two different signals is on the order of 0.001%. I suppose a flag like expiry=indefinite rather thean exppiry=260123 could give DNS people a hint of which ones are OK to delete.

Which is what we did in more detail in previous versions of this draft.
Some in the WG thought this was too complex, and we toned it down a bit.

I don't see many people disagreeing with your statement here on a simple
expire= RRdata content. I would be happy to restore some of this text,
eg like the old version had:

https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-domain-verification-techniques-03#section-5.2.1

It would be great if the Chairs could do some consensus call on this, so
the authors know how to resolve this discussion point.

PS: The threat model for faked long term DCV seems rather implausible. A malicious actor is going to fool some SaaS company into continuing my subscription so they can steal it? That's going to be hard to do once I don't pay the bill.

Yes. The model mostly assumes a new domain owner wouldn't copy old
content and so any services will get quickly decomissioned when the
domain owner changes. This is not about active attackers.

Paul W

_______________________________________________
DNSOP mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to