It appears that Paul Hoffman  <[email protected]> said:
>On May 27, 2025, at 08:16, Erik Nygren <[email protected]> wrote:
>> 
>> I've been thinking about this a bunch, and I think DCV is not necessarily 
>> one-time and the current focus on that is counter-productive.  Instead we 
>> should be
>describing what properties are present due to the persistence of a DCV entry, 
>especially since it is public once entered into the DNS.  This relates to how
>Intermediates fit in as well.  Over the next week or two I'm going to see if I 
>can propose an alternate PR (or set of PRs) that may address some of the 
>concerns
>here.
>
>A persistent record is not a DCV mechanism because it no longer meets the 
>security model in the draft. The security model is that the user wants to 
>prove to the
>application service provider that they control the domain, and that no on-path 
>attacker can pretend to be the user. The method is to use an agreed-to random
>token.

I would just document the fact that the threat model is different and move on.  
I realize that
in principle an on-path attacker has more opportunity to return fake results, 
but it is my
impression that situations with malicious fake results, and particularly fake 
results that
wouldn't be apparent immediately, are quite rare.

R's,
John

_______________________________________________
DNSOP mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to