<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.0.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-dkg-intarea-dangerous-labels-01" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title>Dangerous Labels in DNS and E-mail</title>

    <author initials="D. K." surname="Gillmor" fullname="Daniel Kahn Gillmor">
      <organization abbrev="ACLU">American Civil Liberties Union</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>dkg@fifthhorseman.net</email>
      </address>
    </author>

    <date year="2022" month="May" day="21"/>

    <area>sec</area>
    <workgroup>intarea</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document establishes registries that list known security-sensitive labels in the DNS and in e-mail contexts.</t>

<t>It provides references and brief explanations about the risks associated with each known label.</t>

<t>The registries established here offer guidance to the security-minded system administrator, who may not want to permit registration of these labels by untrusted users.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://dkg.gitlab.io/dangerous-labels/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dkg-intarea-dangerous-labels/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Internet Area Working Group mailing list (<eref target="mailto:intarea@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/intarea/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://gitlab.com/dkg/dangerous-labels"/>.</t>
    </note>


  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>The Internet has a few places where seemingly arbitrary labels can show up and be used interchangeably.</t>

<t>Some choices for those labels have surprising or tricky consequences.
Reasonable admnistrators may want to be aware of those labels to avoid an accidental allocation that has security implications.</t>

<t>This document registers a list of labels in DNS and e-mail systems that are known to have a security impact.
It is not recommended to create more security-sensitive labels.</t>

<t>Offering a stable registry of these dangerous labels is not an endorsement of the practice of using arbitrary labels in this way.
A new protocol that proposes adding a label to this list is encouraged to find a different solution if at all possible.</t>

<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
</section>
<section anchor="dns"><name>DNS Labels</name>

<t>Note that <xref target="RFC8552"/> defines the use of "underscored" labels which are treated differently than normal DNS labels, and often have security implications.
That document also established the IANA registry for "Underscored and Globally Scoped DNS Node Names".
That registry takes precedence to the list enumerated here, and any label in that list or with a leading underscore ("<spanx style="verb">_</spanx>") <bcp14>MUST NOT</bcp14> be included in this list.</t>

<t>Below are some normal-looking DNS labels that may grant some form of administrative control over the domain that the are attached to.</t>

<t>They are mostly "leftmost" or least-significant labels (in the sense used in <xref section="8" sectionFormat="of" target="RFC8499"/>), in that if <spanx style="verb">foo</spanx> were listed here, it would be because granting control over the <spanx style="verb">foo.example.net</spanx> label (or control over the host pointed to by <spanx style="verb">foo.example.net</spanx>) to an untrusted party might offer that party some form of administrative control over other parts of <spanx style="verb">example.org</spanx>.</t>

<t>Note: where "&lt;key-tag&gt;" occurs in <xref target="dns-table"/>, it indicates any sequence of five or more decimal digits, as described in <xref target="RFC8509"/>.</t>

<texttable title="Dangerous DNS labels" anchor="dns-table">
      <ttcol align='left'>DNS Label</ttcol>
      <ttcol align='left'>Rationale</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c><spanx style="verb">mta-sts</spanx></c>
      <c>Set SMTP transport security policy</c>
      <c><xref target="RFC8641"/></c>
      <c><spanx style="verb">openpgpkey</spanx></c>
      <c>Domain-based OpenPGP certificate lookup and verification</c>
      <c><xref target="I-D.koch-openpgp-webkey-service"/></c>
      <c><spanx style="verb">root-key-sentinel-is-ta-</spanx>&lt;key-tag&gt;</c>
      <c>Indicates which DNSSEC root key is trusted</c>
      <c><xref target="RFC8509"/></c>
      <c><spanx style="verb">root-key-sentinel-not-ta-</spanx>&lt;key-tag&gt;</c>
      <c>Indicates which DNSSEC root key is not trusted</c>
      <c><xref target="RFC8509"/></c>
      <c><spanx style="verb">www</spanx></c>
      <c>Popular web browsers guess this label</c>
      <c>FIXME: find a reference</c>
</texttable>

</section>
<section anchor="e-mail"><name>E-mail Local Parts</name>

<t><xref section="3.4.1" sectionFormat="of" target="RFC5322"/> defines the <spanx style="verb">local-part</spanx> of an e-mail address (the part before the "<spanx style="verb">@</spanx>" sign) as "domain-dependent".
However, allocating some specific <spanx style="verb">local-part</spanx>s to an untrusted party can have significant security consequences for the domain or other associated resources.</t>

<t>Note that all these labels are expected to be case-insensitive.
That is, an administrator restricting registration of a <spanx style="verb">local-part</spanx> named "<spanx style="verb">admin</spanx>" <bcp14>MUST</bcp14> also apply the same constraint to "<spanx style="verb">Admin</spanx>" or "<spanx style="verb">ADMIN</spanx>" or "<spanx style="verb">aDmIn</spanx>".</t>

<t><xref target="RFC2142"/> offers some widespread historical practice for common <spanx style="verb">local-part</spanx>s.
The CA/Browser Forum's Baseline Requirements (<xref target="CABForum-BR"/>) constrain how any popular Public Key Infrastructure (PKI) Certification Authority (CA) should confirm domain ownership when verifying by e-mail.
The public CAs used by popular web browsers ("web PKI") will adhere to these guidelines, but anyone relying on unusual CAs may still be subject to risk additional labels described here.</t>

<texttable title="Dangerous E-mail local-parts" anchor="e-mail-table">
      <ttcol align='left'>E-mail local-part</ttcol>
      <ttcol align='left'>Rationale</ttcol>
      <ttcol align='left'>References</ttcol>
      <c><spanx style="verb">abuse</spanx></c>
      <c>Receive reports of abusive public behavior</c>
      <c><xref section="2" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">administrator</spanx></c>
      <c>PKI Cert Issuance</c>
      <c>Section 3.2.2.4.4 of <xref target="CABForum-BR"/></c>
      <c><spanx style="verb">admin</spanx></c>
      <c>PKI Cert Issuance</c>
      <c>Section 3.2.2.4.4 of <xref target="CABForum-BR"/></c>
      <c><spanx style="verb">hostmaster</spanx></c>
      <c>PKI Cert Issuance, DNS zone control</c>
      <c>Section 3.2.2.4.4 of <xref target="CABForum-BR"/>, <xref section="7" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">info</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">is</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">it</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">noc</spanx></c>
      <c>Receive reports of network problems</c>
      <c><xref section="4" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">postmaster</spanx></c>
      <c>Receive reports related to SMTP service, PKI Cert Issuance</c>
      <c><xref section="5" sectionFormat="of" target="RFC2142"/>, Section 3.2.2.4.4 of <xref target="CABForum-BR"/></c>
      <c><spanx style="verb">root</spanx></c>
      <c>Receive system software notifications, PKI Cert Issuance (historic)</c>
      <c><xref target="VU591120"/>, FIXME: find a reference for <spanx style="verb">root</spanx> (software config docs?)</c>
      <c><spanx style="verb">security</spanx></c>
      <c>Receive reports of technical vulnerabilities</c>
      <c><xref section="4" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">ssladministrator</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">ssladmin</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">sslwebmaster</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">sysadmin</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">webmaster</spanx></c>
      <c>PKI Cert Issuance, Receive reports related to HTTP service</c>
      <c>Section 3.2.2.4.4 of <xref target="CABForum-BR"/>, <xref section="5" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">www</spanx></c>
      <c>Common alias for <spanx style="verb">webmaster</spanx></c>
      <c><xref section="5" sectionFormat="of" target="RFC2142"/></c>
</texttable>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Allowing untrusted parties to allocate names with the labels associated in this document may grant access to administrative capabilities.</t>

<t>The administrator of a DNS or E-mail service that permits any untrusted party to register an arbitrary DNS label or e-mail <spanx style="verb">local-part</spanx> for their own use <bcp14>SHOULD</bcp14> reject attempts to register the labels listed here.</t>

<section anchor="additional-risks-out-of-scope"><name>Additional Risks Out of Scope</name>

<t>The lists of security concerns in this document cover security risks and concerns associated with interoperable use of specific labels.
They do not cover every possible security concern associated with any DNS label or e-mail localpart.</t>

<t>For example, DNS labels with an existing underscore are likely by construction to be sensitive, and are registered separately in the registry defined by <xref target="RFC8552"/>.</t>

<t>Similarly, where humans or other systems capable of transcription error are in the loop, subtle variations of the labels listed here may also have security implications, due to homomgraphic confusion (<xref target="Homograph"/>), but this document does not attempt to enumerate all phishing, typosquatting, or similar risks of visual confusion, nor does it exhaustively list all other potential risks associated with variant encodings.
See <xref target="UTR36"/> for a deeper understanding of these categories of security concerns.</t>

<t>Additionally, some labels may be associated with security concerns that happen to also commonly show up as DNS labels or e-mail local parts, but their risk is not associated with their use in interoperable public forms of DNS or e-mail.
For example, on some systems, a local user account named <spanx style="verb">backup</spanx> has full read access to the local filesytsem so that it can transfer data to the local backup system.
And in some cases, the list of local user accounts is also aliased into e-mail local parts.
However, permitting the registration of <spanx style="verb">backup@example.net</spanx> as an e-mail address is not itself an interoperable security risk -- no external third party will treat any part of the <spanx style="verb">example.net</spanx> domain differently because of the registration.
This document does not cover any risk entirely related to internal configuration choices.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document asks IANA to establish two registries, from <xref target="dns-table"/> and <xref target="e-mail-table"/>.</t>

<section anchor="dangerous-dns-labels-registry"><name>Dangerous DNS Labels Registry</name>

<t>The table of Dangerous DNS Labels (in <xref target="dns-table"/>) has three columns:</t>

<t><list style="symbols">
  <t>DNS Label (text string)</t>
  <t>Rationale (human-readable short explanation)</t>
  <t>References (pointer or pointers to more detailed documentation)</t>
</list></t>

<t>Note that this table does not include anything that should be handled by the pre-existing "Underscored and Globally Scoped DNS Node Names" registry defined by <xref target="RFC8552"/>.</t>

<t>Following the guidance in <xref target="BCP26"/>, any new entry to this registry will be assigned using Specification Required.
The IESG will assign one or more designated experts for this purpose, who will consult with the IETF DNSOP working group mailing list or its designated successor.
The Designated Expert will support IANA by clearly indicating when a new DNS label should be added to this table, offering the label itself, a brief rationale, and a pointer to the permanent and readily available documentation of the security consequences of the label.
Updates or deletions of of DNS Labels will follow the same process.</t>

</section>
<section anchor="dangerous-e-mail-local-parts-registry"><name>Dangerous E-mail Local Parts Registry</name>

<t>The table of Dangerous E-mail Local Parts (in <xref target="e-mail-table"/> also has three columns:</t>

<t><list style="symbols">
  <t>E-mail local part (text string)</t>
  <t>Rationale (human-readable short explanation)</t>
  <t>References (pointer or ponters to more detailed documentation)</t>
</list></t>

<t>Following the guidance in <xref target="BCP26"/>, any new entry to this registry will be assigned using Specification Required.
The IESG will assign one or more designated experts for this purpose, who will consult with the IETF EMAILCORE working group mailing list or its designated successor.
The Designated Expert will support IANA by clearly indicating when a new e-mail local part should be added to this table, offering the local part itself, a brief rationale, and a pointer to the permanent and readily available documentation of the security consequences of the local part.
Updates or deletions of of E-mail Local Parts will follow the same process.</t>

</section>
<section anchor="shared-considerations"><name>Shared Considerations</name>

<t>Having to add a new security-sensitive entry to either of these tables is likely to be a bad idea, because existing DNS zones and e-mail installations may have already made an allocation of the novel label, and cannot avoid the security implications.
For a new protocol that wants to include a label in either registry, there is almost always a better protocol design choice.</t>

<t>Yet, if some common practice permits any form of administrative control over a separate resource based on control over an arbitrary label, administrators need a central place to keep track of which labels are dangerous.</t>

<t>If such a practice cannot be avoided, it is better to ensure that the risk is documented clearly and referenced in the appropriate registry, rather than leaving it up to each administrator to re-discover the problem.</t>

</section>
</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC8552' target='https://www.rfc-editor.org/info/rfc8552'>
<front>
<title>Scoped Interpretation of DNS Resource Records through &quot;Underscored&quot; Naming of Attribute Leaves</title>
<author fullname='D. Crocker' initials='D.' surname='Crocker'><organization/></author>
<date month='March' year='2019'/>
<abstract><t>Formally, any DNS Resource Record (RR) may occur under any domain name.  However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies.  The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., &quot;_name&quot;).  The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch.  This specification explores the nature of this DNS usage and defines the &quot;Underscored and Globally Scoped DNS Node Names&quot; registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t></abstract>
</front>
<seriesInfo name='BCP' value='222'/>
<seriesInfo name='RFC' value='8552'/>
<seriesInfo name='DOI' value='10.17487/RFC8552'/>
</reference>



<reference anchor='RFC5322' target='https://www.rfc-editor.org/info/rfc5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>


<referencegroup anchor='BCP26' target='https://www.rfc-editor.org/info/bcp26'>
<!-- reference.RFC.8126.xml -->
<reference anchor='RFC8126' target='https://www.rfc-editor.org/info/rfc8126'>
<front>
<title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
<author fullname='M. Cotton' initials='M.' surname='Cotton'><organization/></author>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<author fullname='T. Narten' initials='T.' surname='Narten'><organization/></author>
<date month='June' year='2017'/>
<abstract><t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t><t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t><t>This is the third edition of this document; it obsoletes RFC 5226.</t></abstract>
</front>
<seriesInfo name='BCP' value='26'/>
<seriesInfo name='RFC' value='8126'/>
<seriesInfo name='DOI' value='10.17487/RFC8126'/>
</reference>
</referencegroup>




    </references>

    <references title='Informative References'>

<reference anchor="CABForum-BR" target="https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.8.4.pdf">
  <front>
    <title>CA/Browser Forum Baseline Requirements</title>
    <author initials="C." surname="Forum" fullname="CA/Browser Forum">
      <organization></organization>
    </author>
    <date year="2022" month="April" day="23"/>
  </front>
</reference>
<reference anchor="VU591120" target="https://www.kb.cert.org/vuls/id/591120/">
  <front>
    <title>Multiple SSL certificate authorities use predefined email addresses as proof of domain ownership</title>
    <author initials="C. C." surname="Center" fullname="CERT Coordination Center">
      <organization></organization>
    </author>
    <date year="2015" month="April" day="07"/>
  </front>
</reference>
<reference anchor="UTR36" target="https://unicode.org/reports/tr36/">
  <front>
    <title>Unicode Security Considerations</title>
    <author initials="M." surname="Davis" fullname="Mark Davis">
      <organization></organization>
    </author>
    <author initials="M." surname="Suignard" fullname="Michel Suignard">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>




<reference anchor='RFC8499' target='https://www.rfc-editor.org/info/rfc8499'>
<front>
<title>DNS Terminology</title>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<author fullname='A. Sullivan' initials='A.' surname='Sullivan'><organization/></author>
<author fullname='K. Fujiwara' initials='K.' surname='Fujiwara'><organization/></author>
<date month='January' year='2019'/>
<abstract><t>The Domain Name System (DNS) is defined in literally dozens of different RFCs.  The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined.  This document gives current definitions for many of the terms used in the DNS in a single document.</t><t>This document obsoletes RFC 7719 and updates RFC 2308.</t></abstract>
</front>
<seriesInfo name='BCP' value='219'/>
<seriesInfo name='RFC' value='8499'/>
<seriesInfo name='DOI' value='10.17487/RFC8499'/>
</reference>



<reference anchor='RFC8509' target='https://www.rfc-editor.org/info/rfc8509'>
<front>
<title>A Root Key Trust Anchor Sentinel for DNSSEC</title>
<author fullname='G. Huston' initials='G.' surname='Huston'><organization/></author>
<author fullname='J. Damas' initials='J.' surname='Damas'><organization/></author>
<author fullname='W. Kumari' initials='W.' surname='Kumari'><organization/></author>
<date month='December' year='2018'/>
<abstract><t>The DNS Security Extensions (DNSSEC) were developed to provide origin authentication and integrity protection for DNS data by using digital signatures.  These digital signatures can be verified by building a chain of trust starting from a trust anchor and proceeding down to a particular node in the DNS.  This document specifies a mechanism that will allow an end user and third parties to determine the trusted key state for the root key of the resolvers that handle that user's DNS queries.  Note that this method is only applicable for determining which keys are in the trust store for the root key.</t></abstract>
</front>
<seriesInfo name='RFC' value='8509'/>
<seriesInfo name='DOI' value='10.17487/RFC8509'/>
</reference>



<reference anchor='RFC8641' target='https://www.rfc-editor.org/info/rfc8641'>
<front>
<title>Subscription to YANG Notifications for Datastore Updates</title>
<author fullname='A. Clemm' initials='A.' surname='Clemm'><organization/></author>
<author fullname='E. Voit' initials='E.' surname='Voit'><organization/></author>
<date month='September' year='2019'/>
<abstract><t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore.  Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t></abstract>
</front>
<seriesInfo name='RFC' value='8641'/>
<seriesInfo name='DOI' value='10.17487/RFC8641'/>
</reference>


<reference anchor='I-D.koch-openpgp-webkey-service'>
   <front>
      <title>OpenPGP Web Key Directory</title>
      <author fullname='Werner Koch'>
	 <organization>GnuPG e.V.</organization>
      </author>
      <date day='13' month='May' year='2022'/>
      <abstract>
	 <t>   This specification describes a service to locate OpenPGP keys by mail
   address using a Web service and the HTTPS protocol.  It also provides
   a method for secure communication between the key owner and the mail
   provider to publish and revoke the public key.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-koch-openpgp-webkey-service-14'/>
   <format target='https://www.ietf.org/archive/id/draft-koch-openpgp-webkey-service-14.txt' type='TXT'/>
</reference>



<reference anchor='RFC2142' target='https://www.rfc-editor.org/info/rfc2142'>
<front>
<title>Mailbox Names for Common Services, Roles and Functions</title>
<author fullname='D. Crocker' initials='D.' surname='Crocker'><organization/></author>
<date month='May' year='1997'/>
<abstract><t>This specification enumerates and describes Internet mail addresses (mailbox name @ host reference) to be used when contacting personnel at an organization. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2142'/>
<seriesInfo name='DOI' value='10.17487/RFC2142'/>
</reference>

<reference anchor='Homograph'> <front> <title>*** BROKEN REFERENCE ***</title> <author> <organization/> </author> <date/> </front> </reference>

<reference anchor='I-D.hoffman-dns-special-labels'>
   <front>
      <title>IANA Registry for Special Labels in the DNS</title>
      <author fullname='Paul Hoffman'>
	 <organization>ICANN</organization>
      </author>
      <date day='1' month='October' year='2018'/>
      <abstract>
	 <t>   This document defines an new IANA registry for special labels in the
   DNS.  The registry is useful because the labels cause special
   handling in DNS entities such as stub resolvers, recursive resolvers,
   and applications that use DNS, and developers of software for those
   entities should be aware of the many types of special labels in use.

   [[ A GitHub repo for this document is at
   https://github.com/paulehoffman/dns-special-labels ]]

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-hoffman-dns-special-labels-00'/>
   <format target='https://www.ietf.org/archive/id/draft-hoffman-dns-special-labels-00.txt' type='TXT'/>
</reference>




    </references>


<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>Many people created these dangerous labels or the authorization processes that rely on them over the years.</t>

<t>Dave Crocker wrote an early list of special e-mail local-parts, from <xref target="RFC2142"/>.</t>

<t>Paul Hoffman tried to document a wider survey of special DNS labels (not all security-sensitive) in <xref target="I-D.hoffman-dns-special-labels"/>.</t>

</section>
<section anchor="document-considerations"><name>Document Considerations</name>

<t>RFC Editor: please remove this section before publication.</t>

<section anchor="other-types-of-labels"><name>Other types of labels?</name>

<t>This document is limited to leftmost DNS labels and e-mail local-parts because those are the arbitrary labels
There may be other types of arbitrary labels on the Internet with special values that have security implications that the author is not aware of.</t>

</section>
<section removeInRFC="true" anchor="document-history"><name>Document History</name>

<section anchor="substantive-changes-from-00-to-01"><name>Substantive Changes from -00 to -01</name>

<t><list style="symbols">
  <t>explicitly define IANA tables</t>
  <t>indicate that the tables use Specification Required</t>
  <t>clarify scope</t>
</list></t>

</section>
</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

