poztter.net

poztter.net / ports

Ports.

Three TCP ports do all of POZ. Each one enforces a specific contract — encryption and submission semantics are baked into the port choice, not negotiated within a connection.

Port Name Encryption Direction Use
7074 POZ Query None (plaintext) Client → Server Public lookups. Response is self-verifying, so plaintext is acceptable.
7075 POZ Query (Private) Noise NK Client → Server Private lookups. Eavesdropper cannot see what's being asked or returned.
7076 POZ Submit Noise NK Client → Authority Push signed updates. Used only against authoritative servers.

why three ports

firewall recommendations

SRV records

_poz._tcp.example.com.        300  IN SRV 10 0 7075 poz1.example.com.
_poz._tcp.example.com.        300  IN SRV 20 0 7075 poz2.example.com.
_poz-submit._tcp.example.com. 300  IN SRV 10 0 7076 poz-auth.example.com.

plaintext fallback

If a client cannot reach 7075 (Noise NK blocked, no shared static key yet), it may use 7074 to fetch the master zone for the domain — including the server's Noise static key — and then upgrade to 7075 for subsequent queries. Records are self-verifying either way; the encrypted port adds privacy, not authenticity.

7074 · plain 7075 · NK query 7076 · NK submit Tooling / scripts debugging, monitoring · · Holder app / browser looking up identities · · Record owner submitting updates · Public cache puller replicating from origin · a public cache opens 7074 + 7075 inbound; an authoritative server adds 7076.
fig 01 · which client types reach which ports. Tooling can stay on plaintext for convenience; anything carrying user intent should use 7075. Submissions are always 7076.