<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.0.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-dkg-intarea-dangerous-labels-02" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title>Dangerous Labels in DNS and E-mail</title>

    <author initials="D. K." surname="Gillmor" fullname="Daniel Kahn Gillmor">
      <organization abbrev="ACLU">American Civil Liberties Union</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>dkg@fifthhorseman.net</email>
      </address>
    </author>

    <date year="2022" month="July" day="27"/>

    <area>sec</area>
    <workgroup>intarea</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document establishes registries that list known security-sensitive labels in the DNS and in e-mail contexts.</t>

<t>It provides references and brief explanations about the risks associated with each known label.</t>

<t>The registries established here offer guidance to the security-minded system administrator, who may not want to permit registration of these labels by untrusted users.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://dkg.gitlab.io/dangerous-labels/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dkg-intarea-dangerous-labels/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Internet Area Working Group mailing list (<eref target="mailto:intarea@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/intarea/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://gitlab.com/dkg/dangerous-labels"/>.</t>
    </note>


  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>The Internet has a few places where seemingly arbitrary labels can show up and be used interchangeably.</t>

<t>Some choices for those labels have surprising or tricky consequences.
Reasonable admnistrators may want to be aware of those labels to avoid an accidental allocation that has security implications.</t>

<t>This document registers a list of labels in DNS and e-mail systems that are known to have a security impact.
It is not recommended to create more security-sensitive labels.</t>

<t>Offering a stable registry of these dangerous labels is not an endorsement of the practice of using arbitrary labels in this way.
A new protocol that proposes adding a label to this list is encouraged to find a different solution if at all possible.</t>

<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
</section>
<section anchor="dns"><name>DNS Labels</name>

<t>Note that <xref target="RFC8552"/> defines the use of "underscored" labels which are treated differently than normal DNS labels, and often have security implications.
That document also established the IANA registry for "Underscored and Globally Scoped DNS Node Names".
That registry takes precedence to the list enumerated here, and any label in that list or with a leading underscore ("<spanx style="verb">_</spanx>") <bcp14>MUST NOT</bcp14> be included in this list.</t>

<t>Note also that <xref section="2.2" sectionFormat="of" target="RFC8820"/> makes it clear that depending on specific forms of DNS labels in a given URI scheme in a protocol is strongly discouraged.</t>

<t>Below are some normal-looking DNS labels that may grant some form of administrative control over the domain that they are attached to.</t>

<t>They are mostly "leftmost" or least-significant labels (in the sense used in <xref section="8" sectionFormat="of" target="RFC8499"/>), in that if <spanx style="verb">foo</spanx> were listed here, it would be because granting control over the <spanx style="verb">foo.example.net</spanx> label (or control over the host pointed to by <spanx style="verb">foo.example.net</spanx>) to an untrusted party might offer that party some form of administrative control over other parts of <spanx style="verb">example.org</spanx>.</t>

<t>Note: where "&lt;key-tag&gt;" occurs in <xref target="dns-table"/>, it indicates any sequence of five or more decimal digits, as described in <xref target="RFC8509"/>.</t>

<texttable title="Dangerous DNS labels" anchor="dns-table">
      <ttcol align='left'>DNS Label</ttcol>
      <ttcol align='left'>Rationale</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c><spanx style="verb">autoconfig</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">autodiscover</spanx></c>
      <c>Hijack Microsoft Exchange client configuration</c>
      <c><xref target="AUTODISCOVER"/></c>
      <c><spanx style="verb">imap</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">imaps</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">mta-sts</spanx></c>
      <c>Set SMTP transport security policy</c>
      <c><xref target="RFC8461"/></c>
      <c><spanx style="verb">openpgpkey</spanx></c>
      <c>Domain-based OpenPGP certificate lookup and verification</c>
      <c><xref target="I-D.koch-openpgp-webkey-service"/></c>
      <c><spanx style="verb">pop3</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">pop3s</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">root-key-sentinel-is-ta-</spanx>&lt;key-tag&gt;</c>
      <c>Indicates which DNSSEC root key is trusted</c>
      <c><xref target="RFC8509"/></c>
      <c><spanx style="verb">root-key-sentinel-not-ta-</spanx>&lt;key-tag&gt;</c>
      <c>Indicates which DNSSEC root key is not trusted</c>
      <c><xref target="RFC8509"/></c>
      <c><spanx style="verb">smtp</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">smtps</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">submission</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">wpad</spanx></c>
      <c>Automatic proxy discovery</c>
      <c><xref target="I-D.ietf-wrec-wpad-01"/></c>
      <c><spanx style="verb">www</spanx></c>
      <c>Popular web browsers guess this label</c>
      <c>FIXME: find a reference</c>
</texttable>

</section>
<section anchor="e-mail"><name>E-mail Local Parts</name>

<t><xref section="3.4.1" sectionFormat="of" target="RFC5322"/> defines the <spanx style="verb">local-part</spanx> of an e-mail address (the part before the "<spanx style="verb">@</spanx>" sign) as "domain-dependent".
However, allocating some specific <spanx style="verb">local-part</spanx>s to an untrusted party can have significant security consequences for the domain or other associated resources.</t>

<t>Note that all these labels are expected to be case-insensitive.
That is, an administrator restricting registration of a <spanx style="verb">local-part</spanx> named "<spanx style="verb">admin</spanx>" <bcp14>MUST</bcp14> also apply the same constraint to "<spanx style="verb">Admin</spanx>" or "<spanx style="verb">ADMIN</spanx>" or "<spanx style="verb">aDmIn</spanx>".</t>

<t><xref target="RFC2142"/> offers some widespread historical practice for common <spanx style="verb">local-part</spanx>s.
The CA/Browser Forum's Baseline Requirements (<xref target="CABForum-BR"/>) constrain how any popular Public Key Infrastructure (PKI) Certification Authority (CA) should confirm domain ownership when verifying by e-mail.
The public CAs used by popular web browsers ("web PKI") will adhere to these guidelines, but anyone relying on unusual CAs may still be subject to risk additional labels described here.</t>

<texttable title="Dangerous E-mail local-parts" anchor="e-mail-table">
      <ttcol align='left'>E-mail local-part</ttcol>
      <ttcol align='left'>Rationale</ttcol>
      <ttcol align='left'>References</ttcol>
      <c><spanx style="verb">abuse</spanx></c>
      <c>Receive reports of abusive public behavior</c>
      <c><xref section="2" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">administrator</spanx></c>
      <c>PKI Cert Issuance</c>
      <c>Section 3.2.2.4.4 of <xref target="CABForum-BR"/></c>
      <c><spanx style="verb">admin</spanx></c>
      <c>PKI Cert Issuance</c>
      <c>Section 3.2.2.4.4 of <xref target="CABForum-BR"/></c>
      <c><spanx style="verb">hostmaster</spanx></c>
      <c>PKI Cert Issuance, DNS zone control</c>
      <c>Section 3.2.2.4.4 of <xref target="CABForum-BR"/>, <xref section="7" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">info</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">is</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">it</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">noc</spanx></c>
      <c>Receive reports of network problems</c>
      <c><xref section="4" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">postmaster</spanx></c>
      <c>Receive reports related to SMTP service, PKI Cert Issuance</c>
      <c><xref section="5" sectionFormat="of" target="RFC2142"/>, Section 3.2.2.4.4 of <xref target="CABForum-BR"/></c>
      <c><spanx style="verb">root</spanx></c>
      <c>Receive system software notifications, PKI Cert Issuance (historic)</c>
      <c><xref target="VU591120"/>, FIXME: find a reference for <spanx style="verb">root</spanx> (software config docs?)</c>
      <c><spanx style="verb">security</spanx></c>
      <c>Receive reports of technical vulnerabilities</c>
      <c><xref section="4" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">ssladministrator</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">ssladmin</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">sslwebmaster</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">sysadmin</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">webmaster</spanx></c>
      <c>PKI Cert Issuance, Receive reports related to HTTP service</c>
      <c>Section 3.2.2.4.4 of <xref target="CABForum-BR"/>, <xref section="5" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">www</spanx></c>
      <c>Common alias for <spanx style="verb">webmaster</spanx></c>
      <c><xref section="5" sectionFormat="of" target="RFC2142"/></c>
</texttable>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Allowing untrusted parties to allocate names with the labels associated in this document may grant access to administrative capabilities.</t>

<t>The administrator of a DNS or E-mail service that permits any untrusted party to register an arbitrary DNS label or e-mail <spanx style="verb">local-part</spanx> for their own use <bcp14>SHOULD</bcp14> reject attempts to register the labels listed here.</t>

<section anchor="additional-risks-out-of-scope"><name>Additional Risks Out of Scope</name>

<t>The lists of security concerns in this document cover security risks and concerns associated with interoperable use of specific labels.
They do not cover every possible security concern associated with any DNS label or e-mail localpart.</t>

<t>For example, DNS labels with an existing underscore are likely by construction to be sensitive, and are registered separately in the registry defined by <xref target="RFC8552"/>.</t>

<t>Similarly, where humans or other systems capable of transcription error are in the loop, subtle variations of the labels listed here may also have security implications, due to homomgraphic confusion (<xref target="Homograph"/>), but this document does not attempt to enumerate all phishing, typosquatting, or similar risks of visual confusion, nor does it exhaustively list all other potential risks associated with variant encodings.
See <xref target="UTR36"/> for a deeper understanding of these categories of security concerns.</t>

<t>Additionally, some labels may be associated with security concerns that happen to also commonly show up as DNS labels or e-mail local parts, but their risk is not associated with their use in interoperable public forms of DNS or e-mail.
For example, on some systems, a local user account named <spanx style="verb">backup</spanx> has full read access to the local filesystem so that it can transfer data to the local backup system.
And in some cases, the list of local user accounts is also aliased into e-mail local parts.
However, permitting the registration of <spanx style="verb">backup@example.net</spanx> as an e-mail address is not itself an interoperable security risk -- no external third party will treat any part of the <spanx style="verb">example.net</spanx> domain differently because of the registration.
This document does not cover any risk entirely related to internal configuration choices.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document asks IANA to establish two registries, from <xref target="dns-table"/> and <xref target="e-mail-table"/>.</t>

<section anchor="dangerous-dns-labels-registry"><name>Dangerous DNS Labels Registry</name>

<t>The table of Dangerous DNS Labels (in <xref target="dns-table"/>) has three columns:</t>

<t><list style="symbols">
  <t>DNS Label (text string)</t>
  <t>Rationale (human-readable short explanation)</t>
  <t>References (pointer or pointers to more detailed documentation)</t>
</list></t>

<t>Note that this table does not include anything that should be handled by the pre-existing "Underscored and Globally Scoped DNS Node Names" registry defined by <xref target="RFC8552"/>.</t>

<t>Following the guidance in <xref target="BCP26"/>, any new entry to this registry will be assigned using Specification Required.
The IESG will assign one or more designated experts for this purpose, who will consult with the IETF DNSOP working group mailing list or its designated successor.
The Designated Expert will support IANA by clearly indicating when a new DNS label should be added to this table, offering the label itself, a brief rationale, and a pointer to the permanent and readily available documentation of the security consequences of the label.
Updates or deletions of DNS Labels will follow the same process.</t>

</section>
<section anchor="dangerous-e-mail-local-parts-registry"><name>Dangerous E-mail Local Parts Registry</name>

<t>The table of Dangerous E-mail Local Parts (in <xref target="e-mail-table"/> also has three columns:</t>

<t><list style="symbols">
  <t>E-mail local part (text string)</t>
  <t>Rationale (human-readable short explanation)</t>
  <t>References (pointer or ponters to more detailed documentation)</t>
</list></t>

<t>Following the guidance in <xref target="BCP26"/>, any new entry to this registry will be assigned using Specification Required.
The IESG will assign one or more designated experts for this purpose, who will consult with the IETF EMAILCORE working group mailing list or its designated successor.
The Designated Expert will support IANA by clearly indicating when a new e-mail local part should be added to this table, offering the local part itself, a brief rationale, and a pointer to the permanent and readily available documentation of the security consequences of the local part.
Updates or deletions of of E-mail Local Parts will follow the same process.</t>

</section>
<section anchor="shared-considerations"><name>Shared Considerations</name>

<t>Having to add a new security-sensitive entry to either of these tables is likely to be a bad idea, because existing DNS zones and e-mail installations may have already made an allocation of the novel label, and cannot avoid the security implications.
For a new protocol that wants to include a label in either registry, there is almost always a better protocol design choice.</t>

<t>Yet, if some common practice permits any form of administrative control over a separate resource based on control over an arbitrary label, administrators need a central place to keep track of which labels are dangerous.</t>

<t>If such a practice cannot be avoided, it is better to ensure that the risk is documented clearly and referenced in the appropriate registry, rather than leaving it up to each administrator to re-discover the problem.</t>

</section>
</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC8552' target='https://www.rfc-editor.org/info/rfc8552'>
<front>
<title>Scoped Interpretation of DNS Resource Records through &quot;Underscored&quot; Naming of Attribute Leaves</title>
<author fullname='D. Crocker' initials='D.' surname='Crocker'><organization/></author>
<date month='March' year='2019'/>
<abstract><t>Formally, any DNS Resource Record (RR) may occur under any domain name.  However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies.  The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., &quot;_name&quot;).  The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch.  This specification explores the nature of this DNS usage and defines the &quot;Underscored and Globally Scoped DNS Node Names&quot; registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t></abstract>
</front>
<seriesInfo name='BCP' value='222'/>
<seriesInfo name='RFC' value='8552'/>
<seriesInfo name='DOI' value='10.17487/RFC8552'/>
</reference>



<reference anchor='RFC5322' target='https://www.rfc-editor.org/info/rfc5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>


<referencegroup anchor='BCP26' target='https://www.rfc-editor.org/info/bcp26'>
<!-- reference.RFC.8126.xml -->
<reference anchor='RFC8126' target='https://www.rfc-editor.org/info/rfc8126'>
<front>
<title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
<author fullname='M. Cotton' initials='M.' surname='Cotton'><organization/></author>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<author fullname='T. Narten' initials='T.' surname='Narten'><organization/></author>
<date month='June' year='2017'/>
<abstract><t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t><t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t><t>This is the third edition of this document; it obsoletes RFC 5226.</t></abstract>
</front>
<seriesInfo name='BCP' value='26'/>
<seriesInfo name='RFC' value='8126'/>
<seriesInfo name='DOI' value='10.17487/RFC8126'/>
</reference>
</referencegroup>




    </references>

    <references title='Informative References'>

<reference anchor="AUTOCONF" target="https://roll.urown.net/server/mail/autoconfig.html">
  <front>
    <title>Mail Client Auto-Configuration</title>
    <author initials="A." surname="Wolf" fullname="Alain Wolf">
      <organization></organization>
    </author>
    <date year="2021" month="February" day="22"/>
  </front>
</reference>
<reference anchor="AUTODISCOVER" target="https://docs.microsoft.com/en-us/exchange/client-developer/exchange-web-services/autodiscover-for-exchange">
  <front>
    <title>Autodiscover for Exchange</title>
    <author >
      <organization>Microsoft</organization>
    </author>
    <date year="2020" month="January" day="15"/>
  </front>
</reference>
<reference anchor="CABForum-BR" target="https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.8.4.pdf">
  <front>
    <title>CA/Browser Forum Baseline Requirements</title>
    <author >
      <organization>CA/Browser Forum</organization>
    </author>
    <date year="2022" month="April" day="23"/>
  </front>
</reference>
<reference anchor="VU591120" target="https://www.kb.cert.org/vuls/id/591120/">
  <front>
    <title>Multiple SSL certificate authorities use predefined email addresses as proof of domain ownership</title>
    <author >
      <organization>CERT Coordination Center</organization>
    </author>
    <date year="2015" month="April" day="07"/>
  </front>
</reference>
<reference anchor="UTR36" target="https://unicode.org/reports/tr36/">
  <front>
    <title>Unicode Security Considerations</title>
    <author initials="M." surname="Davis" fullname="Mark Davis">
      <organization></organization>
    </author>
    <author initials="M." surname="Suignard" fullname="Michel Suignard">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>




<reference anchor='RFC8820' target='https://www.rfc-editor.org/info/rfc8820'>
<front>
<title>URI Design and Ownership</title>
<author fullname='M. Nottingham' initials='M.' surname='Nottingham'><organization/></author>
<date month='June' year='2020'/>
<abstract><t>Section 1.1.1 of RFC 3986 defines URI syntax as &quot;a federated and extensible naming system wherein each scheme's specification may further restrict the syntax and semantics of identifiers using that scheme.&quot;  In other words, the structure of a URI is defined by its scheme. While it is common for schemes to further delegate their substructure to the URI's owner, publishing independent standards that mandate particular forms of substructure in URIs is often problematic.</t><t>This document provides guidance on the specification of URI substructure in standards.</t><t>This document obsoletes RFC 7320 and updates RFC 3986.</t></abstract>
</front>
<seriesInfo name='BCP' value='190'/>
<seriesInfo name='RFC' value='8820'/>
<seriesInfo name='DOI' value='10.17487/RFC8820'/>
</reference>



<reference anchor='RFC8499' target='https://www.rfc-editor.org/info/rfc8499'>
<front>
<title>DNS Terminology</title>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<author fullname='A. Sullivan' initials='A.' surname='Sullivan'><organization/></author>
<author fullname='K. Fujiwara' initials='K.' surname='Fujiwara'><organization/></author>
<date month='January' year='2019'/>
<abstract><t>The Domain Name System (DNS) is defined in literally dozens of different RFCs.  The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined.  This document gives current definitions for many of the terms used in the DNS in a single document.</t><t>This document obsoletes RFC 7719 and updates RFC 2308.</t></abstract>
</front>
<seriesInfo name='BCP' value='219'/>
<seriesInfo name='RFC' value='8499'/>
<seriesInfo name='DOI' value='10.17487/RFC8499'/>
</reference>



<reference anchor='RFC8509' target='https://www.rfc-editor.org/info/rfc8509'>
<front>
<title>A Root Key Trust Anchor Sentinel for DNSSEC</title>
<author fullname='G. Huston' initials='G.' surname='Huston'><organization/></author>
<author fullname='J. Damas' initials='J.' surname='Damas'><organization/></author>
<author fullname='W. Kumari' initials='W.' surname='Kumari'><organization/></author>
<date month='December' year='2018'/>
<abstract><t>The DNS Security Extensions (DNSSEC) were developed to provide origin authentication and integrity protection for DNS data by using digital signatures.  These digital signatures can be verified by building a chain of trust starting from a trust anchor and proceeding down to a particular node in the DNS.  This document specifies a mechanism that will allow an end user and third parties to determine the trusted key state for the root key of the resolvers that handle that user's DNS queries.  Note that this method is only applicable for determining which keys are in the trust store for the root key.</t></abstract>
</front>
<seriesInfo name='RFC' value='8509'/>
<seriesInfo name='DOI' value='10.17487/RFC8509'/>
</reference>



<reference anchor='RFC8461' target='https://www.rfc-editor.org/info/rfc8461'>
<front>
<title>SMTP MTA Strict Transport Security (MTA-STS)</title>
<author fullname='D. Margolis' initials='D.' surname='Margolis'><organization/></author>
<author fullname='M. Risher' initials='M.' surname='Risher'><organization/></author>
<author fullname='B. Ramakrishnan' initials='B.' surname='Ramakrishnan'><organization/></author>
<author fullname='A. Brotman' initials='A.' surname='Brotman'><organization/></author>
<author fullname='J. Jones' initials='J.' surname='Jones'><organization/></author>
<date month='September' year='2018'/>
<abstract><t>SMTP MTA Strict Transport Security (MTA-STS) is a mechanism enabling mail service providers (SPs) to declare their ability to receive Transport Layer Security (TLS) secure SMTP connections and to specify whether sending SMTP servers should refuse to deliver to MX hosts that do not offer TLS with a trusted server certificate.</t></abstract>
</front>
<seriesInfo name='RFC' value='8461'/>
<seriesInfo name='DOI' value='10.17487/RFC8461'/>
</reference>


<reference anchor='I-D.koch-openpgp-webkey-service'>
   <front>
      <title>OpenPGP Web Key Directory</title>
      <author fullname='Werner Koch'>
	 <organization>GnuPG e.V.</organization>
      </author>
      <date day='13' month='May' year='2022'/>
      <abstract>
	 <t>   This specification describes a service to locate OpenPGP keys by mail
   address using a Web service and the HTTPS protocol.  It also provides
   a method for secure communication between the key owner and the mail
   provider to publish and revoke the public key.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-koch-openpgp-webkey-service-14'/>
   <format target='https://www.ietf.org/archive/id/draft-koch-openpgp-webkey-service-14.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-wrec-wpad-01'>
   <front>
      <title>Web Proxy Auto-Discovery Protocol</title>
      <author fullname='Charles E. Perkins' initials='C. E.' surname='Perkins'>
         </author>
      <author fullname='Josh Cohen' initials='J.' surname='Cohen'>
         </author>
      <author fullname='Martin Dunsmuir' initials='M.' surname='Dunsmuir'>
         </author>
      <author fullname='Paul A. Gauthier' initials='P. A.' surname='Gauthier'>
         </author>
      <author fullname='Ian Cooper' initials='I.' surname='Cooper'>
         </author>
      <author fullname='John W. Cohen M.A.' initials='J. W. C.' surname='M.A.'>
         </author>
      <date day='29' month='July' year='1999'/>
      <abstract>
	 <t>A mechanism is needed to permit web clients to locate nearby web 
proxy caches. Current best practice is for end users to hand 
configure their web client (i.e., browser) with the URL of an &#39;auto 
configuration file&#39;. In large environments this presents a 
formidable support problem.  It would be much more manageable for 
the web client software to automatically learn the configuration 
information for its web proxy settings. This is typically referred 
to as a resource discovery problem.
	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-wrec-wpad-01'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-wrec-wpad-01.txt' type='TXT'/>
</reference>



<reference anchor='RFC2142' target='https://www.rfc-editor.org/info/rfc2142'>
<front>
<title>Mailbox Names for Common Services, Roles and Functions</title>
<author fullname='D. Crocker' initials='D.' surname='Crocker'><organization/></author>
<date month='May' year='1997'/>
<abstract><t>This specification enumerates and describes Internet mail addresses (mailbox name @ host reference) to be used when contacting personnel at an organization. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2142'/>
<seriesInfo name='DOI' value='10.17487/RFC2142'/>
</reference>

<reference anchor='Homograph'>
  <front>
    <title>The homograph attack</title>
    <author fullname='Evgeniy Gabrilovich' initials='E.' surname='Gabrilovich'>
      <organization>Technion--Israel Institute of Technology</organization>
    </author>
    <author fullname='Alex Gontmakher' initials='A.' surname='Gontmakher'>
      <organization>Technion--Israel Institute of Technology</organization>
    </author>
    <date month='February' year='2002'/>
  </front>
  <seriesInfo name='Communications of the ACM' value='vol. 45, no. 2, pp. 128'/>
  <seriesInfo name='DOI' value='10.1145/503124.503156'/>
</reference>


<reference anchor='I-D.hoffman-dns-special-labels'>
   <front>
      <title>IANA Registry for Special Labels in the DNS</title>
      <author fullname='Paul Hoffman'>
	 <organization>ICANN</organization>
      </author>
      <date day='1' month='October' year='2018'/>
      <abstract>
	 <t>   This document defines an new IANA registry for special labels in the
   DNS.  The registry is useful because the labels cause special
   handling in DNS entities such as stub resolvers, recursive resolvers,
   and applications that use DNS, and developers of software for those
   entities should be aware of the many types of special labels in use.

   [[ A GitHub repo for this document is at
   https://github.com/paulehoffman/dns-special-labels ]]

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-hoffman-dns-special-labels-00'/>
   <format target='https://www.ietf.org/archive/id/draft-hoffman-dns-special-labels-00.txt' type='TXT'/>
</reference>




    </references>


<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>Many people created these dangerous labels or the authorization processes that rely on them over the years.</t>

<t>Dave Crocker wrote an early list of special e-mail local-parts, from <xref target="RFC2142"/>.</t>

<t>Paul Hoffman tried to document a wider survey of special DNS labels (not all security-sensitive) in <xref target="I-D.hoffman-dns-special-labels"/>.</t>

<t>Rasmus Dahlberg, yuki, and Carsten Bormann reviewed this draft and gave feedback.</t>

<t>Tim Wicinski pointed out wpad.</t>

</section>
<section removeInRFC="true" anchor="document-considerations"><name>Document Considerations</name>

<section anchor="other-types-of-labels"><name>Other types of labels?</name>

<t>This document is limited to leftmost DNS labels and e-mail local-parts because those are the arbitrary labels that the author is familiar with.
There may be other types of arbitrary labels on the Internet with special values that have security implications that the author is not aware of.
If you are aware of some other system with a similar pattern, please send feedback.</t>

</section>
<section anchor="document-history"><name>Document History</name>

<section anchor="substantive-changes-from-01-to-02"><name>Substantive Changes from -01 to -02</name>

<t><list style="symbols">
  <t>New dangerous DNS labels: WPAD, MS Exchange Autodiscover, common MUA
autoconfig (originally from Mozilla Thunderbird)</t>
</list></t>

</section>
<section anchor="substantive-changes-from-00-to-01"><name>Substantive Changes from -00 to -01</name>

<t><list style="symbols">
  <t>explicitly define IANA tables</t>
  <t>indicate that the tables use Specification Required</t>
  <t>clarify scope</t>
</list></t>

</section>
</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

