One thing that popped for me during your presentation today, Andrew, is that you say that the stupid things people are doing with the reverse zone have to work. This isn't true. They don't have to work. If they are stupid, they oughtn't to work. E.g., if your ssh server is checking your reverse record to make sure you are who you claim to be, it's kind of missing the point - it should be checking your public key.

For me, the sole function of the reverse zone is as a hint for figuring out who I'm talking to. There are two specific cases where I find this particularly viable:

1. I want to find the forward pointer for a specific host so that I can find additional information attached to it, in cases where I've already decided the host I'm talking to is worth talking to based on non-DNS mechanisms. 2. I am trying to figure out why and how something is broken, and want a hint as to who is talking to me.

These are both very important uses to me, particularly the second. In cases where there is no reverse entry, debugging gets a lot harder. This is why I'm in favor of documenting and encouraging the population of the reverse tree. I do not think that supporting peoples' broken "authentication" schemes is a reason. I haven't objected strenuously to the language in the document because I don't think it actually encourages these schemes, and I think for historical reasons it's useful to mention that such schemes are extant.

But they do not "have to work." And if you think that they do, you may be unintentionally saying things based on that belief that are setting off some of the people who are objecting to this document. So it might be profitable to actively stop thinking that these applications have to work - they really, really don't.



_______________________________________________
DNSOP mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dnsop

Reply via email to