TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Show HN: Automatic Domain Verification

27 点作者 elliottinvent大约 2 年前
This is a project I&#x27;ve been working on for a little while and I&#x27;m interested in your feedback and point of view.<p>The Domain Verification protocol stores a DNS TXT record at a DNS name derived from a hashed &quot;verifiable identifier&quot; (email, telephone, DID), enabling anyone that can prove control over the verifiable identifier to prove authority for the domain name, whilst preserving the privacy of the authorised party.<p>Once setup, the record enables automatic domain verification for any service provider.<p>This record could be automatically setup by domain registrars upon domain registration (with registrant opt-in) creating a fast lane for verification with service providers many new small businesses use (eg Google Ads, Facebook, Office365, Dropbox, etc).<p>=====<p>Many of us would have verified a domain name by pasting a string into a DNS TXT record. These methods are currently being discussed and standardised at the IETF [2].<p>Let&#x27;s Encrypt&#x27;s DNS-01 method [3] is probably considered the state of the art. The differences between DNS-01 and Domain Verification protocol are:<p>- DNS-01 requires a new TXT record for each service provider. With Domain Verification Protocol, multiple service providers can use the same record.<p>- Instructions to setup a DNS-01 TXT record are instigated by the service provider, whereas a Domain Verification Protocol record can be setup independently by a user or a domain registrar. They could even pre-populated by a registrar upon domain registration (with registrant opt-in)<p>- There’s no concept of permissions in DNS-01, the act of creating the record gives the user full access for the domain with the service provider. With Domain Verification protocol multiple records can be setup, limited permissions could be setup for different third parties. For example give a marketing agency authentication to claim the domain on social media but nowhere else.<p>I&#x27;m still working on licensing but creating these records will always be free. I hope to find service providers that see significant upside in reducing friction for user onboarding that are willing to pay to license it.<p>Worked example: Let&#x27;s say you want to authenticate the user with the email user@example.com with the domain dvexample.com, these are the steps:<p>a. HASH(user@example.com) -&gt; 4i7ozur385y5nsqoo0mg0mxv6t9333s2rarxrtvlpag1gsk8pg<p>b. Store Domain Verification record at: 4i7ozur385y5nsqoo0mg0mxv6t9333s2rarxrtvlpag1gsk8pg._dv.dvexample.com<p>c. TXT record determines permissions and time limit:<p>@dv=1;d=Example user email;e=2025-01-01;s=[seo;email];h=4i7ozur385y5nsqoo0mg0mxv6t9333s2rarxrtvlpag1gsk8pg<p>Thanks for taking a look,<p>Elliott<p>1. <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=35827952" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=35827952</a><p>2. <a href="https:&#x2F;&#x2F;datatracker.ietf.org&#x2F;doc&#x2F;draft-ietf-dnsop-domain-verification-techniques&#x2F;" rel="nofollow">https:&#x2F;&#x2F;datatracker.ietf.org&#x2F;doc&#x2F;draft-ietf-dnsop-domain-ver...</a><p>3. <a href="https:&#x2F;&#x2F;letsencrypt.org&#x2F;docs&#x2F;challenge-types&#x2F;" rel="nofollow">https:&#x2F;&#x2F;letsencrypt.org&#x2F;docs&#x2F;challenge-types&#x2F;</a><p>=====<p>Quick sidebar:<p>This was originally submitted to HN under the title &quot;Show HN: Make domain verification as easy as verifying an email or phone number&quot; 3 days ago [1]. It was doing really well (#3 on front page) then totally disappeared from front page and went to bottom of page 1 of Show HN.<p>After an email exchange with dang (incredibly helpful as always), he explained that it got flagged with the &quot;overheated discussion detector&quot; and it turned out I caused this by diligently responding to every comment as fast as my fingers would type because I wanted to keep engagement going. Helpfully dang took the flag off it about 12 hours later after our email exchange, but understandably the momentum was lost.<p>So I feel like it kinda got killed, just as it was picking up pace and as the US west coast was waking up. So I am humbly reposting it with a modified description based on the comments of the last post.

5 条评论

breck大约 2 年前
I like it.<p>My feedback would be a simpler approach, ditching the hash. Why not just encourage people to put their email address in plain text in a DNS record? If they want anonymity, they can fall back to the way verification is done today. If they want convenience, they can broadcast their email&amp;DNS link.<p>For example, I own &quot;BreckYunits.com&quot; and my email address is listed throughout my site. I wouldn&#x27;t be giving up any privacy by putting that in a DNS record.<p>Sure, some people will exaggerate the fear risk (usually the ones selling a security product), but I&#x27;m of the old school opinion that we should advocate good behavior and admonish bad behavior on the web and build a more civil world.
评论 #35867931 未加载
elliottinvent大约 2 年前
Oh and to prevent what happened last time (the post getting flagged as an overheated discussion), I&#x27;m going to close the laptop and come back to this in a few hours! So if you ask a question, I&#x27;m not ignoring you – I&#x27;ll respond later.
hitchdev大约 2 年前
This is neat.<p>&gt;For example give a marketing agency authentication to claim the domain on social media but nowhere else.<p>How does it prevent them from claiming it elsewhere?
doodlesdev大约 2 年前
html tag is setting<p><pre><code> color: var(--fg) </code></pre> so text on the webpage is appearing as white-on-white for me, at least on Firefox.
评论 #35866034 未加载
nbpalomino大约 2 年前
Server is responding back with an 500 Internal Server Error.<p>HN hug of death maybe?
评论 #35865361 未加载