<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version  (Ruby 3.0.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-dkg-intarea-dangerous-labels-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title>Dangerous Labels in DNS and E-mail</title>

    <author initials="D. K." surname="Gillmor" fullname="Daniel Kahn Gillmor">
      <organization abbrev="ACLU">American Civil Liberties Union</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>dkg@fifthhorseman.net</email>
      </address>
    </author>

    <date year="2022" month="May" day="06"/>

    <area>sec</area>
    <workgroup>intarea</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document establishes registries that list known security-sensitive labels in the DNS and in e-mail contexts.</t>

<t>It provides references and brief explanations about the risks associated with each known label.</t>

<t>The registries established here offer guidance to the security-minded system administrator, who may not want to permit registration of these labels by untrusted users.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://dkg.gitlab.io/dangerous-labels/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dkg-intarea-dangerous-labels/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Internet Area Working Group mailing list (<eref target="mailto:intarea@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/intarea/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://gitlab.com/dkg/dangerous-labels"/>.</t>
    </note>


  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>The Internet has a few places where seemingly arbitrary labels can show up and be used interchangeably.</t>

<t>Some choices for those labels have surprising or tricky consequences.
Reasonable admnistrators may want to be aware of those labels to avoid an accidental allocation that has security implications.</t>

<t>This document registers a list of labels in DNS and e-mail systems that are known to have a security impact.
It is not recommended to create more security-sensitive labels.</t>

<t>Offering a stable registry of these dangerous labels is not an endorsement of the practice of using arbitrary labels in this way.
A new protocol that proposes adding a label to this list is encouraged to find a different solution if at all possible.</t>

<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
</section>
<section anchor="dns"><name>DNS Labels</name>

<t>Note that <xref target="RFC8552"/> defines the use of "underscored" labels which are treated differently than normal DNS labels, and often have security implications.
That document also established the IANA registry for "Underscored and Globally Scoped DNS Node Names".
That registry takes precedence to the list enumerated here, and any label in that list or with a leading underscore ("<spanx style="verb">_</spanx>") <bcp14>MUST NOT</bcp14> be included in this list.</t>

<t>Below are some normal-looking DNS labels that may grant some form of administrative control over the domain that the are attached to.</t>

<t>They are mostly "leftmost" or least-significant labels (in the sense used in <xref section="8" sectionFormat="of" target="RFC8499"/>), in that if <spanx style="verb">foo</spanx> were listed here, it would be because granting control over the <spanx style="verb">foo.example.net</spanx> label (or control over the host pointed to by <spanx style="verb">foo.example.net</spanx>) to an untrusted party might offer that party some form of administrative control over other parts of <spanx style="verb">example.org</spanx>.</t>

<t>Note: where "&lt;key-tag&gt;" occurs in <xref target="dns-table"/>, it indicates any sequence of five or more decimal digits, as described in <xref target="RFC8509"/>.</t>

<texttable title="Dangerous DNS labels" anchor="dns-table">
      <ttcol align='left'>DNS Label</ttcol>
      <ttcol align='left'>Rationale and References</ttcol>
      <c><spanx style="verb">mta-sts</spanx></c>
      <c>Set SMTP transport security policy (<xref target="RFC8641"/>)</c>
      <c><spanx style="verb">openpgpkey</spanx></c>
      <c>Domain-based OpenPGP certificate lookup and verification (<xref target="I-D.koch-openpgp-webkey-service"/>)</c>
      <c><spanx style="verb">root-key-sentinel-is-ta-</spanx>&lt;key-tag&gt;</c>
      <c>Indicates which DNSSEC root key is trusted (<xref target="RFC8509"/></c>
      <c><spanx style="verb">root-key-sentinel-not-ta-</spanx>&lt;key-tag&gt;</c>
      <c>Indicates which DNSSEC root key is not trusted (<xref target="RFC8509"/></c>
      <c><spanx style="verb">www</spanx></c>
      <c>Popular web browsers guess this label (???)</c>
</texttable>

</section>
<section anchor="e-mail"><name>E-mail Local Parts</name>

<t><xref section="3.4.1" sectionFormat="of" target="RFC5322"/> defines the <spanx style="verb">local-part</spanx> of an e-mail address (the part before the "<spanx style="verb">@</spanx>" sign) as "domain-dependent".
However, allocating some specific <spanx style="verb">local-part</spanx>s to an untrusted party can have significant security consequences for the domain or other associated resources.</t>

<t>Note that all these labels are expected to be case-insensitive.
That is, an administrator restricting registration of a <spanx style="verb">local-part</spanx> named "<spanx style="verb">admin</spanx>" <bcp14>MUST</bcp14> also apply the same constraint to "<spanx style="verb">Admin</spanx>" or "<spanx style="verb">ADMIN</spanx>" or "<spanx style="verb">aDmIn</spanx>".</t>

<t><xref target="RFC2142"/> offers some widespread historical practice for common <spanx style="verb">local-part</spanx>s.
The CA/Browser Forum's Baseline Requirements (<xref target="CABForum-BR"/>) constrain how any popular Public Key Infrastructure (PKI) Certification Authority (CA) should confirm domain ownership when verifying by e-mail.
The public CAs used by popular web browsers ("web PKI") will adhere to these guidelines, but anyone relying on unusual CAs may still be subject to risk additional labels described here.</t>

<texttable title="Dangerous E-mail local-parts" anchor="e-mail-table">
      <ttcol align='left'>E-mail local-part</ttcol>
      <ttcol align='left'>Rationale and References</ttcol>
      <c><spanx style="verb">abuse</spanx></c>
      <c>Receive reports of abusive public behavior (<xref section="2" sectionFormat="of" target="RFC2142"/>)</c>
      <c><spanx style="verb">administrator</spanx></c>
      <c>PKI Cert Issuance (Section 3.2.2.4.4 of <xref target="CABForum-BR"/>)</c>
      <c><spanx style="verb">admin</spanx></c>
      <c>PKI Cert Issuance (Section 3.2.2.4.4 of <xref target="CABForum-BR"/>)</c>
      <c><spanx style="verb">hostmaster</spanx></c>
      <c>PKI Cert Issuance (Section 3.2.2.4.4 of <xref target="CABForum-BR"/>), DNS zone control (<xref section="7" sectionFormat="of" target="RFC2142"/>)</c>
      <c><spanx style="verb">info</spanx></c>
      <c>PKI Cert Issuance (historical, see <xref target="VU591120"/>)</c>
      <c><spanx style="verb">is</spanx></c>
      <c>PKI Cert Issuance (historical, see <xref target="VU591120"/>)</c>
      <c><spanx style="verb">it</spanx></c>
      <c>PKI Cert Issuance (historical, see <xref target="VU591120"/>)</c>
      <c><spanx style="verb">noc</spanx></c>
      <c>Receive reports of network problems (<xref section="4" sectionFormat="of" target="RFC2142"/>)</c>
      <c><spanx style="verb">postmaster</spanx></c>
      <c>Receive reports related to SMTP service (<xref section="5" sectionFormat="of" target="RFC2142"/>), PKI Cert Issuance ( Section 3.2.2.4.4 of <xref target="CABForum-BR"/>)</c>
      <c><spanx style="verb">root</spanx></c>
      <c>Receive system software notifications (???), PKI Cert Issuance (historical, see <xref target="VU591120"/>)</c>
      <c><spanx style="verb">security</spanx></c>
      <c>Receive reports of technical vulnerabilities (<xref section="4" sectionFormat="of" target="RFC2142"/>)</c>
      <c><spanx style="verb">ssladministrator</spanx></c>
      <c>PKI Cert Issuance (historical, see <xref target="VU591120"/>)</c>
      <c><spanx style="verb">ssladmin</spanx></c>
      <c>PKI Cert Issuance (historical, see <xref target="VU591120"/>)</c>
      <c><spanx style="verb">sslwebmaster</spanx></c>
      <c>PKI Cert Issuance (historical, see <xref target="VU591120"/>)</c>
      <c><spanx style="verb">sysadmin</spanx></c>
      <c>PKI Cert Issuance (historical, see <xref target="VU591120"/>)</c>
      <c><spanx style="verb">webmaster</spanx></c>
      <c>PKI Cert Issuance (Section 3.2.2.4.4 of <xref target="CABForum-BR"/>), Receive reports related to HTTP service (<xref section="5" sectionFormat="of" target="RFC2142"/>)</c>
      <c><spanx style="verb">www</spanx></c>
      <c>Common alias for <spanx style="verb">webmaster</spanx> (<xref section="5" sectionFormat="of" target="RFC2142"/>)</c>
</texttable>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Allowing untrusted parties to allocate names with the labels associated in this document may grant access to administrative capabilities.</t>

<t>The administrator of a DNS or E-mail service that permits any untrusted party to register an arbitrary DNS label or e-mail <spanx style="verb">local-part</spanx> for their own use <bcp14>SHOULD</bcp14> reject attempts to register the labels listed here.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document asks IANA to establish two registries, from <xref target="dns-table"/> and <xref target="e-mail-table"/>.</t>

<t>Note that the DNS table in <xref target="dns-table"/> does not include anything that should be handled by the pre-existing "Underscored and Globally Scoped DNS Node Names" registry defined by <xref target="RFC8552"/>.</t>

<t>It's not clear how these registries should be updated.</t>

<t>Adding a new security-sensitive entry to either of these tables is likely to be a bad idea, because existing DNS zones and e-mail installations may have already made an allocation of the novel label, and cannot avoid the security implications.
For a new protocol that wants to include a label in either registry, there is almost always a better protocol design choice.</t>

<t>Yet, if some common practice permits any form of administrative access to a resource based on control over an arbitrary label, administrators need a central place to keep track of which labels are dangerous.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC8552' target='https://www.rfc-editor.org/info/rfc8552'>
<front>
<title>Scoped Interpretation of DNS Resource Records through &quot;Underscored&quot; Naming of Attribute Leaves</title>
<author fullname='D. Crocker' initials='D.' surname='Crocker'><organization/></author>
<date month='March' year='2019'/>
<abstract><t>Formally, any DNS Resource Record (RR) may occur under any domain name.  However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies.  The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., &quot;_name&quot;).  The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch.  This specification explores the nature of this DNS usage and defines the &quot;Underscored and Globally Scoped DNS Node Names&quot; registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t></abstract>
</front>
<seriesInfo name='BCP' value='222'/>
<seriesInfo name='RFC' value='8552'/>
<seriesInfo name='DOI' value='10.17487/RFC8552'/>
</reference>



<reference anchor='RFC5322' target='https://www.rfc-editor.org/info/rfc5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="CABForum-BR" target="https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.8.4.pdf">
  <front>
    <title>CA/Browser Forum Baseline Requirements</title>
    <author initials="C." surname="Forum" fullname="CA/Browser Forum">
      <organization></organization>
    </author>
    <date year="2022" month="April" day="23"/>
  </front>
</reference>
<reference anchor="VU591120" target="https://www.kb.cert.org/vuls/id/591120/">
  <front>
    <title>Multiple SSL certificate authorities use predefined email addresses as proof of domain ownership</title>
    <author initials="C. C." surname="Center" fullname="CERT Coordination Center">
      <organization></organization>
    </author>
    <date year="2015" month="April" day="07"/>
  </front>
</reference>




<reference anchor='RFC8499' target='https://www.rfc-editor.org/info/rfc8499'>
<front>
<title>DNS Terminology</title>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<author fullname='A. Sullivan' initials='A.' surname='Sullivan'><organization/></author>
<author fullname='K. Fujiwara' initials='K.' surname='Fujiwara'><organization/></author>
<date month='January' year='2019'/>
<abstract><t>The Domain Name System (DNS) is defined in literally dozens of different RFCs.  The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined.  This document gives current definitions for many of the terms used in the DNS in a single document.</t><t>This document obsoletes RFC 7719 and updates RFC 2308.</t></abstract>
</front>
<seriesInfo name='BCP' value='219'/>
<seriesInfo name='RFC' value='8499'/>
<seriesInfo name='DOI' value='10.17487/RFC8499'/>
</reference>



<reference anchor='RFC8509' target='https://www.rfc-editor.org/info/rfc8509'>
<front>
<title>A Root Key Trust Anchor Sentinel for DNSSEC</title>
<author fullname='G. Huston' initials='G.' surname='Huston'><organization/></author>
<author fullname='J. Damas' initials='J.' surname='Damas'><organization/></author>
<author fullname='W. Kumari' initials='W.' surname='Kumari'><organization/></author>
<date month='December' year='2018'/>
<abstract><t>The DNS Security Extensions (DNSSEC) were developed to provide origin authentication and integrity protection for DNS data by using digital signatures.  These digital signatures can be verified by building a chain of trust starting from a trust anchor and proceeding down to a particular node in the DNS.  This document specifies a mechanism that will allow an end user and third parties to determine the trusted key state for the root key of the resolvers that handle that user's DNS queries.  Note that this method is only applicable for determining which keys are in the trust store for the root key.</t></abstract>
</front>
<seriesInfo name='RFC' value='8509'/>
<seriesInfo name='DOI' value='10.17487/RFC8509'/>
</reference>



<reference anchor='RFC8641' target='https://www.rfc-editor.org/info/rfc8641'>
<front>
<title>Subscription to YANG Notifications for Datastore Updates</title>
<author fullname='A. Clemm' initials='A.' surname='Clemm'><organization/></author>
<author fullname='E. Voit' initials='E.' surname='Voit'><organization/></author>
<date month='September' year='2019'/>
<abstract><t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore.  Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t></abstract>
</front>
<seriesInfo name='RFC' value='8641'/>
<seriesInfo name='DOI' value='10.17487/RFC8641'/>
</reference>


<reference anchor='I-D.koch-openpgp-webkey-service'>
   <front>
      <title>OpenPGP Web Key Directory</title>
      <author fullname='Werner Koch'>
	 <organization>GnuPG e.V.</organization>
      </author>
      <date day='14' month='November' year='2021'/>
      <abstract>
	 <t>   This specification describes a service to locate OpenPGP keys by mail
   address using a Web service and the HTTPS protocol.  It also provides
   a method for secure communication between the key owner and the mail
   provider to publish and revoke the public key.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-koch-openpgp-webkey-service-13'/>
   <format target='https://www.ietf.org/archive/id/draft-koch-openpgp-webkey-service-13.txt' type='TXT'/>
</reference>



<reference anchor='RFC2142' target='https://www.rfc-editor.org/info/rfc2142'>
<front>
<title>Mailbox Names for Common Services, Roles and Functions</title>
<author fullname='D. Crocker' initials='D.' surname='Crocker'><organization/></author>
<date month='May' year='1997'/>
<abstract><t>This specification enumerates and describes Internet mail addresses (mailbox name @ host reference) to be used when contacting personnel at an organization. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2142'/>
<seriesInfo name='DOI' value='10.17487/RFC2142'/>
</reference>


<reference anchor='I-D.hoffman-dns-special-labels'>
   <front>
      <title>IANA Registry for Special Labels in the DNS</title>
      <author fullname='Paul Hoffman'>
	 <organization>ICANN</organization>
      </author>
      <date day='1' month='October' year='2018'/>
      <abstract>
	 <t>   This document defines an new IANA registry for special labels in the
   DNS.  The registry is useful because the labels cause special
   handling in DNS entities such as stub resolvers, recursive resolvers,
   and applications that use DNS, and developers of software for those
   entities should be aware of the many types of special labels in use.

   [[ A GitHub repo for this document is at
   https://github.com/paulehoffman/dns-special-labels ]]

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-hoffman-dns-special-labels-00'/>
   <format target='https://www.ietf.org/archive/id/draft-hoffman-dns-special-labels-00.txt' type='TXT'/>
</reference>




    </references>


<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>Many people created these dangerous labels or the authorization processes that rely on them over the years.</t>

<t>Dave Crocker wrote an early list of special e-mail local-parts, from <xref target="RFC2142"/>.</t>

<t>Paul Hoffman tried to document a wider survey of special DNS labels (not all security-sensitive) in <xref target="I-D.hoffman-dns-special-labels"/>.</t>

</section>
<section anchor="document-considerations"><name>Document Considerations</name>

<t>RFC Editor: please remove this section before publication.</t>

<section anchor="other-types-of-labels"><name>Other types of labels?</name>

<t>This document is limited to leftmost DNS labels and e-mail local-parts because those are the arbitrary labels
There may be other types of arbitrary labels on the Internet with special values that have security implications that the author is not aware of.</t>

</section>
<section anchor="document-history"><name>Document History</name>

<t>/No history yet/</t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

