Security Best Practices

Operational and client guidance for secure AID usage.

Security Best Practices

This guide summarizes key operational and client-side recommendations from the specification and expands them with practical steps.

DNSSEC

  • Providers: enable DNSSEC signing on your zone. Most managed DNS providers (e.g., Cloudflare, Vercel) make this a one-click operation.
  • Clients: when possible, prefer resolvers that validate DNSSEC (AD-bit) or perform explicit validation. Expose an opt-in flag (e.g., --require-dnssec).

HTTPS and Redirects

  • Remote agent URIs MUST use https://.
  • Clients SHOULD block cross-origin first-hop redirects from the discovered URI, or require explicit user consent.

Local Execution Safeguards (proto=local)

  • Obtain explicit user consent before first run; show the resolved command.
  • Fingerprint the uri + proto and re-prompt on change.
  • Do not pass shell-interpreted strings; invoke processes with argument arrays.
  • Avoid nested discovery triggers. Prefer sandboxing (e.g., container restrictions) when possible.

IDN Safety

  • Providers: avoid confusing lookalike domains when possible.
  • Clients: warn on potential homoglyph/confusable domains in user-facing tools.

TTL and Caching

  • Providers: use TTL 300–900 seconds for _agent.<domain>.
  • Clients: respect TTL and do not cache beyond it.

Operational Checklist

  • DNSSEC enabled; _agent TXT present; TTL 300–900.
  • No secrets in TXT; URI uses https:// for remote protocols.
  • Local execution policies documented and enforced by host applications.