<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.0.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-dkg-intarea-dangerous-labels-03" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title>Dangerous Labels in DNS and E-mail</title>

    <author initials="D. K." surname="Gillmor" fullname="Daniel Kahn Gillmor">
      <organization abbrev="ACLU">American Civil Liberties Union</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>dkg@fifthhorseman.net</email>
      </address>
    </author>

    <date year="2022" month="October" day="13"/>

    <area>sec</area>
    <workgroup>intarea</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document establishes registries that list known security-sensitive labels in the DNS and in e-mail contexts.</t>

<t>It provides references and brief explanations about the risks associated with each known label.</t>

<t>The registries established here offer guidance to the security-minded system administrator, who may not want to permit registration of these labels by untrusted users.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://dkg.gitlab.io/dangerous-labels/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dkg-intarea-dangerous-labels/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Internet Area Working Group mailing list (<eref target="mailto:intarea@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/intarea/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://gitlab.com/dkg/dangerous-labels"/>.</t>
    </note>


  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>The Internet has a few places where seemingly arbitrary labels can show up and be used interchangeably.</t>

<t>Some choices for those labels have surprising or tricky consequences.
Reasonable admnistrators may want to be aware of those labels to avoid an accidental allocation that has security implications.</t>

<t>This document registers a list of labels in DNS and e-mail systems that are known to have a security impact.
It is not recommended to create more security-sensitive labels.</t>

<t>Offering a stable registry of these dangerous labels is not an endorsement of the practice of using arbitrary labels in this way.
A new protocol that proposes adding a label to this list is encouraged to find a different solution if at all possible.</t>

<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
</section>
<section anchor="dns"><name>DNS Labels</name>

<t>Note that <xref target="RFC8552"/> defines the use of "underscored" labels which are treated differently than normal DNS labels, and often have security implications.
That document also established the IANA registry for "Underscored and Globally Scoped DNS Node Names".
That registry takes precedence to the list enumerated here, and any label in that list or with a leading underscore ("<spanx style="verb">_</spanx>") <bcp14>MUST NOT</bcp14> be included in this list.</t>

<t>Note also that <xref section="2.2" sectionFormat="of" target="RFC8820"/> makes it clear that depending on specific forms of DNS labels in a given URI scheme in a protocol is strongly discouraged.</t>

<t>Below are some normal-looking DNS labels that may grant some form of administrative control over the domain that they are attached to.</t>

<t>They are mostly "leftmost" or least-significant labels (in the sense used in <xref section="8" sectionFormat="of" target="RFC8499"/>), in that if <spanx style="verb">foo</spanx> were listed here, it would be because granting control over the <spanx style="verb">foo.example.net</spanx> label (or control over the host pointed to by <spanx style="verb">foo.example.net</spanx>) to an untrusted party might offer that party some form of administrative control over other parts of <spanx style="verb">example.org</spanx>.</t>

<t>Note: where "&lt;key-tag&gt;" occurs in <xref target="dns-table"/>, it indicates any sequence of five or more decimal digits, as described in <xref target="RFC8509"/>.</t>

<texttable title="Dangerous DNS labels" anchor="dns-table">
      <ttcol align='left'>DNS Label</ttcol>
      <ttcol align='left'>Rationale</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c><spanx style="verb">autoconfig</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/>, <xref target="THUNDERBIRD"/></c>
      <c><spanx style="verb">autodiscover</spanx></c>
      <c>Hijack Microsoft Exchange client configuration</c>
      <c><xref target="AUTODISCOVER"/></c>
      <c><spanx style="verb">imap</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/>, <xref target="THUNDERBIRD"/></c>
      <c><spanx style="verb">imaps</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">mail</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/>, <xref target="THUNDERBIRD"/></c>
      <c><spanx style="verb">mta-sts</spanx></c>
      <c>Set SMTP transport security policy</c>
      <c><xref target="RFC8461"/></c>
      <c><spanx style="verb">openpgpkey</spanx></c>
      <c>Domain-based OpenPGP certificate lookup and verification</c>
      <c><xref target="I-D.koch-openpgp-webkey-service"/></c>
      <c><spanx style="verb">pop3</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">pop3s</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">root-key-sentinel-is-ta-</spanx>&lt;key-tag&gt;</c>
      <c>Indicates which DNSSEC root key is trusted</c>
      <c><xref target="RFC8509"/></c>
      <c><spanx style="verb">root-key-sentinel-not-ta-</spanx>&lt;key-tag&gt;</c>
      <c>Indicates which DNSSEC root key is not trusted</c>
      <c><xref target="RFC8509"/></c>
      <c><spanx style="verb">smtp</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/>, <xref target="THUNDERBIRD"/></c>
      <c><spanx style="verb">smtps</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">submission</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">wpad</spanx></c>
      <c>Automatic proxy discovery</c>
      <c><xref target="I-D.ietf-wrec-wpad-01"/></c>
      <c><spanx style="verb">www</spanx></c>
      <c>Popular web browsers guess this label</c>
      <c>FIXME: find a reference</c>
</texttable>

</section>
<section anchor="e-mail"><name>E-mail Local Parts</name>

<t><xref section="3.4.1" sectionFormat="of" target="RFC5322"/> defines the <spanx style="verb">local-part</spanx> of an e-mail address (the part before the "<spanx style="verb">@</spanx>" sign) as "domain-dependent".
However, allocating some specific <spanx style="verb">local-part</spanx>s to an untrusted party can have significant security consequences for the domain or other associated resources.</t>

<t>Note that all these labels are expected to be case-insensitive.
That is, an administrator restricting registration of a <spanx style="verb">local-part</spanx> named "<spanx style="verb">admin</spanx>" <bcp14>MUST</bcp14> also apply the same constraint to "<spanx style="verb">Admin</spanx>" or "<spanx style="verb">ADMIN</spanx>" or "<spanx style="verb">aDmIn</spanx>".</t>

<t><xref target="RFC2142"/> offers some widespread historical practice for common <spanx style="verb">local-part</spanx>s.
The CA/Browser Forum's Baseline Requirements (<xref target="CABForum-BR"/>) constrain how any popular Public Key Infrastructure (PKI) Certification Authority (CA) should confirm domain ownership when verifying by e-mail.
The public CAs used by popular web browsers ("web PKI") will adhere to these guidelines, but anyone relying on unusual CAs may still be subject to risk additional labels described here.</t>

<texttable title="Dangerous E-mail local-parts" anchor="e-mail-table">
      <ttcol align='left'>E-mail local-part</ttcol>
      <ttcol align='left'>Rationale</ttcol>
      <ttcol align='left'>References</ttcol>
      <c><spanx style="verb">abuse</spanx></c>
      <c>Receive reports of abusive public behavior</c>
      <c><xref section="2" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">administrator</spanx></c>
      <c>PKI Cert Issuance</c>
      <c>Section 3.2.2.4.4 of <xref target="CABForum-BR"/></c>
      <c><spanx style="verb">admin</spanx></c>
      <c>PKI Cert Issuance</c>
      <c>Section 3.2.2.4.4 of <xref target="CABForum-BR"/></c>
      <c><spanx style="verb">hostmaster</spanx></c>
      <c>PKI Cert Issuance, DNS zone control</c>
      <c>Section 3.2.2.4.4 of <xref target="CABForum-BR"/>, <xref section="7" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">info</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">is</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">it</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">noc</spanx></c>
      <c>Receive reports of network problems</c>
      <c><xref section="4" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">openpgp-ca</spanx></c>
      <c>Make authoritative-seeming OpenPGP certifications for in-domain e-mail addresses</c>
      <c><xref target="OPENPGP-CA"/></c>
      <c><spanx style="verb">postmaster</spanx></c>
      <c>Receive reports related to SMTP service, PKI Cert Issuance</c>
      <c><xref section="5" sectionFormat="of" target="RFC2142"/>, Section 3.2.2.4.4 of <xref target="CABForum-BR"/></c>
      <c><spanx style="verb">root</spanx></c>
      <c>Receive system software notifications, PKI Cert Issuance (historic)</c>
      <c><xref target="VU591120"/>, FIXME: find a reference for <spanx style="verb">root</spanx> (software config docs?)</c>
      <c><spanx style="verb">security</spanx></c>
      <c>Receive reports of technical vulnerabilities</c>
      <c><xref section="4" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">ssladministrator</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">ssladmin</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">sslwebmaster</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">sysadmin</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">webmaster</spanx></c>
      <c>PKI Cert Issuance, Receive reports related to HTTP service</c>
      <c>Section 3.2.2.4.4 of <xref target="CABForum-BR"/>, <xref section="5" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">www</spanx></c>
      <c>Common alias for <spanx style="verb">webmaster</spanx></c>
      <c><xref section="5" sectionFormat="of" target="RFC2142"/></c>
</texttable>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Allowing untrusted parties to allocate names with the labels associated in this document may grant access to administrative capabilities.</t>

<t>The administrator of a DNS or E-mail service that permits any untrusted party to register an arbitrary DNS label or e-mail <spanx style="verb">local-part</spanx> for their own use <bcp14>SHOULD</bcp14> reject attempts to register the labels listed here.</t>

<section anchor="additional-risks-out-of-scope"><name>Additional Risks Out of Scope</name>

<t>The lists of security concerns in this document cover security risks and concerns associated with interoperable use of specific labels.
They do not cover every possible security concern associated with any DNS label or e-mail localpart.</t>

<t>For example, DNS labels with an existing underscore are likely by construction to be sensitive, and are registered separately in the registry defined by <xref target="RFC8552"/>.</t>

<t>Similarly, where humans or other systems capable of transcription error are in the loop, subtle variations of the labels listed here may also have security implications, due to homomgraphic confusion (<xref target="Homograph"/>), but this document does not attempt to enumerate all phishing, typosquatting, or similar risks of visual confusion, nor does it exhaustively list all other potential risks associated with variant encodings.
See <xref target="UTR36"/> for a deeper understanding of these categories of security concerns.</t>

<t>Additionally, some labels may be associated with security concerns that happen to also commonly show up as DNS labels or e-mail local parts, but their risk is not associated with their use in interoperable public forms of DNS or e-mail.
For example, on some systems, a local user account named <spanx style="verb">backup</spanx> has full read access to the local filesystem so that it can transfer data to the local backup system.
And in some cases, the list of local user accounts is also aliased into e-mail local parts.
However, permitting the registration of <spanx style="verb">backup@example.net</spanx> as an e-mail address is not itself an interoperable security risk -- no external third party will treat any part of the <spanx style="verb">example.net</spanx> domain differently because of the registration.
This document does not cover any risk entirely related to internal configuration choices.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document asks IANA to establish two registries, from <xref target="dns-table"/> and <xref target="e-mail-table"/>.</t>

<section anchor="dangerous-dns-labels-registry"><name>Dangerous DNS Labels Registry</name>

<t>The table of Dangerous DNS Labels (in <xref target="dns-table"/>) has three columns:</t>

<t><list style="symbols">
  <t>DNS Label (text string)</t>
  <t>Rationale (human-readable short explanation)</t>
  <t>References (pointer or pointers to more detailed documentation)</t>
</list></t>

<t>Note that this table does not include anything that should be handled by the pre-existing "Underscored and Globally Scoped DNS Node Names" registry defined by <xref target="RFC8552"/>.</t>

<t>Following the guidance in <xref target="BCP26"/>, any new entry to this registry will be assigned using Specification Required.
The IESG will assign one or more designated experts for this purpose, who will consult with the IETF DNSOP working group mailing list or its designated successor.
The Designated Expert will support IANA by clearly indicating when a new DNS label should be added to this table, offering the label itself, a brief rationale, and a pointer to the permanent and readily available documentation of the security consequences of the label.
Updates or deletions of DNS Labels will follow the same process.</t>

</section>
<section anchor="dangerous-e-mail-local-parts-registry"><name>Dangerous E-mail Local Parts Registry</name>

<t>The table of Dangerous E-mail Local Parts (in <xref target="e-mail-table"/> also has three columns:</t>

<t><list style="symbols">
  <t>E-mail local part (text string)</t>
  <t>Rationale (human-readable short explanation)</t>
  <t>References (pointer or ponters to more detailed documentation)</t>
</list></t>

<t>Following the guidance in <xref target="BCP26"/>, any new entry to this registry will be assigned using Specification Required.
The IESG will assign one or more designated experts for this purpose, who will consult with the IETF EMAILCORE working group mailing list or its designated successor.
The Designated Expert will support IANA by clearly indicating when a new e-mail local part should be added to this table, offering the local part itself, a brief rationale, and a pointer to the permanent and readily available documentation of the security consequences of the local part.
Updates or deletions of of E-mail Local Parts will follow the same process.</t>

</section>
<section anchor="shared-considerations"><name>Shared Considerations</name>

<t>Having to add a new security-sensitive entry to either of these tables is likely to be a bad idea, because existing DNS zones and e-mail installations may have already made an allocation of the novel label, and cannot avoid the security implications.
For a new protocol that wants to include a label in either registry, there is almost always a better protocol design choice.</t>

<t>Yet, if some common practice permits any form of administrative control over a separate resource based on control over an arbitrary label, administrators need a central place to keep track of which labels are dangerous.</t>

<t>If such a practice cannot be avoided, it is better to ensure that the risk is documented clearly and referenced in the appropriate registry, rather than leaving it up to each administrator to re-discover the problem.</t>

</section>
</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC8552' target='https://www.rfc-editor.org/info/rfc8552'>
<front>
<title>Scoped Interpretation of DNS Resource Records through &quot;Underscored&quot; Naming of Attribute Leaves</title>
<author fullname='D. Crocker' initials='D.' surname='Crocker'><organization/></author>
<date month='March' year='2019'/>
<abstract><t>Formally, any DNS Resource Record (RR) may occur under any domain name.  However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies.  The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., &quot;_name&quot;).  The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch.  This specification explores the nature of this DNS usage and defines the &quot;Underscored and Globally Scoped DNS Node Names&quot; registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t></abstract>
</front>
<seriesInfo name='BCP' value='222'/>
<seriesInfo name='RFC' value='8552'/>
<seriesInfo name='DOI' value='10.17487/RFC8552'/>
</reference>



<reference anchor='RFC5322' target='https://www.rfc-editor.org/info/rfc5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>

<referencegroup anchor='BCP26' target='https://www.rfc-editor.org/info/bcp26'>
  <reference anchor='RFC8126' target='https://www.rfc-editor.org/info/rfc8126'>
    <front>
      <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
      <author fullname='M. Cotton' initials='M.' surname='Cotton'/>
      <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
      <author fullname='T. Narten' initials='T.' surname='Narten'/>
      <date month='June' year='2017'/>
      <abstract>
        <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
        <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
        <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
      </abstract>
    </front>
    <seriesInfo name='BCP' value='26'/>
    <seriesInfo name='RFC' value='8126'/>
    <seriesInfo name='DOI' value='10.17487/RFC8126'/>
  </reference>
</referencegroup>




    </references>

    <references title='Informative References'>

<reference anchor="AUTOCONF" target="https://roll.urown.net/server/mail/autoconfig.html">
  <front>
    <title>Mail Client Auto-Configuration</title>
    <author initials="A." surname="Wolf" fullname="Alain Wolf">
      <organization></organization>
    </author>
    <date year="2021" month="February" day="22"/>
  </front>
</reference>
<reference anchor="THUNDERBIRD" target="https://github.com/mdn/archived-content/tree/main/files/en-us/mozilla/thunderbird/autoconfiguration">
  <front>
    <title>Autoconfiguration in Thunderbird</title>
    <author initials="B." surname="Bucksch" fullname="Ben Bucksch">
      <organization></organization>
    </author>
    <date year="2021" month="May" day="03"/>
  </front>
</reference>
<reference anchor="AUTODISCOVER" target="https://docs.microsoft.com/en-us/exchange/client-developer/exchange-web-services/autodiscover-for-exchange">
  <front>
    <title>Autodiscover for Exchange</title>
    <author >
      <organization>Microsoft</organization>
    </author>
    <date year="2020" month="January" day="15"/>
  </front>
</reference>
<reference anchor="CABForum-BR" target="https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.8.4.pdf">
  <front>
    <title>CA/Browser Forum Baseline Requirements</title>
    <author >
      <organization>CA/Browser Forum</organization>
    </author>
    <date year="2022" month="April" day="23"/>
  </front>
</reference>
<reference anchor="VU591120" target="https://www.kb.cert.org/vuls/id/591120/">
  <front>
    <title>Multiple SSL certificate authorities use predefined email addresses as proof of domain ownership</title>
    <author >
      <organization>CERT Coordination Center</organization>
    </author>
    <date year="2015" month="April" day="07"/>
  </front>
</reference>
<reference anchor="UTR36" target="https://unicode.org/reports/tr36/">
  <front>
    <title>Unicode Security Considerations</title>
    <author initials="M." surname="Davis" fullname="Mark Davis">
      <organization></organization>
    </author>
    <author initials="M." surname="Suignard" fullname="Michel Suignard">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="OPENPGP-CA" target="https://openpgp-ca.org/background/details/">
  <front>
    <title>OpenPGP CA: Technical Details</title>
    <author >
      <organization>the OpenPGP CA project</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>




<reference anchor='RFC8820' target='https://www.rfc-editor.org/info/rfc8820'>
<front>
<title>URI Design and Ownership</title>
<author fullname='M. Nottingham' initials='M.' surname='Nottingham'><organization/></author>
<date month='June' year='2020'/>
<abstract><t>Section 1.1.1 of RFC 3986 defines URI syntax as &quot;a federated and extensible naming system wherein each scheme's specification may further restrict the syntax and semantics of identifiers using that scheme.&quot;  In other words, the structure of a URI is defined by its scheme. While it is common for schemes to further delegate their substructure to the URI's owner, publishing independent standards that mandate particular forms of substructure in URIs is often problematic.</t><t>This document provides guidance on the specification of URI substructure in standards.</t><t>This document obsoletes RFC 7320 and updates RFC 3986.</t></abstract>
</front>
<seriesInfo name='BCP' value='190'/>
<seriesInfo name='RFC' value='8820'/>
<seriesInfo name='DOI' value='10.17487/RFC8820'/>
</reference>



<reference anchor='RFC8499' target='https://www.rfc-editor.org/info/rfc8499'>
<front>
<title>DNS Terminology</title>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<author fullname='A. Sullivan' initials='A.' surname='Sullivan'><organization/></author>
<author fullname='K. Fujiwara' initials='K.' surname='Fujiwara'><organization/></author>
<date month='January' year='2019'/>
<abstract><t>The Domain Name System (DNS) is defined in literally dozens of different RFCs.  The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined.  This document gives current definitions for many of the terms used in the DNS in a single document.</t><t>This document obsoletes RFC 7719 and updates RFC 2308.</t></abstract>
</front>
<seriesInfo name='BCP' value='219'/>
<seriesInfo name='RFC' value='8499'/>
<seriesInfo name='DOI' value='10.17487/RFC8499'/>
</reference>



<reference anchor='RFC8509' target='https://www.rfc-editor.org/info/rfc8509'>
<front>
<title>A Root Key Trust Anchor Sentinel for DNSSEC</title>
<author fullname='G. Huston' initials='G.' surname='Huston'><organization/></author>
<author fullname='J. Damas' initials='J.' surname='Damas'><organization/></author>
<author fullname='W. Kumari' initials='W.' surname='Kumari'><organization/></author>
<date month='December' year='2018'/>
<abstract><t>The DNS Security Extensions (DNSSEC) were developed to provide origin authentication and integrity protection for DNS data by using digital signatures.  These digital signatures can be verified by building a chain of trust starting from a trust anchor and proceeding down to a particular node in the DNS.  This document specifies a mechanism that will allow an end user and third parties to determine the trusted key state for the root key of the resolvers that handle that user's DNS queries.  Note that this method is only applicable for determining which keys are in the trust store for the root key.</t></abstract>
</front>
<seriesInfo name='RFC' value='8509'/>
<seriesInfo name='DOI' value='10.17487/RFC8509'/>
</reference>



<reference anchor='RFC8461' target='https://www.rfc-editor.org/info/rfc8461'>
<front>
<title>SMTP MTA Strict Transport Security (MTA-STS)</title>
<author fullname='D. Margolis' initials='D.' surname='Margolis'><organization/></author>
<author fullname='M. Risher' initials='M.' surname='Risher'><organization/></author>
<author fullname='B. Ramakrishnan' initials='B.' surname='Ramakrishnan'><organization/></author>
<author fullname='A. Brotman' initials='A.' surname='Brotman'><organization/></author>
<author fullname='J. Jones' initials='J.' surname='Jones'><organization/></author>
<date month='September' year='2018'/>
<abstract><t>SMTP MTA Strict Transport Security (MTA-STS) is a mechanism enabling mail service providers (SPs) to declare their ability to receive Transport Layer Security (TLS) secure SMTP connections and to specify whether sending SMTP servers should refuse to deliver to MX hosts that do not offer TLS with a trusted server certificate.</t></abstract>
</front>
<seriesInfo name='RFC' value='8461'/>
<seriesInfo name='DOI' value='10.17487/RFC8461'/>
</reference>


<reference anchor='I-D.koch-openpgp-webkey-service'>
   <front>
      <title>OpenPGP Web Key Directory</title>
      <author fullname='Werner Koch' initials='W.' surname='Koch'>
         <organization>GnuPG e.V.</organization>
      </author>
      <date day='13' month='May' year='2022'/>
      <abstract>
	 <t>   This specification describes a service to locate OpenPGP keys by mail
   address using a Web service and the HTTPS protocol.  It also provides
   a method for secure communication between the key owner and the mail
   provider to publish and revoke the public key.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-koch-openpgp-webkey-service-14'/>
   <format target='https://www.ietf.org/archive/id/draft-koch-openpgp-webkey-service-14.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-wrec-wpad-01'>
   <front>
      <title>Web Proxy Auto-Discovery Protocol</title>
      <author fullname='Charles E. Perkins' initials='C. E.' surname='Perkins'>
         <organization>Sun Microsystems</organization>
      </author>
      <author fullname='Josh Cohen' initials='J.' surname='Cohen'>
         <organization>Microsoft Corporation</organization>
      </author>
      <author fullname='Martin Dunsmuir' initials='M.' surname='Dunsmuir'>
         <organization>RealNetworks, Inc.</organization>
      </author>
      <author fullname='Paul A. Gauthier' initials='P. A.' surname='Gauthier'>
         <organization>Inktomi Corporation</organization>
      </author>
      <author fullname='Ian Cooper' initials='I.' surname='Cooper'>
         </author>
      <author fullname='John W. Cohen M.A.' initials='J. W. C.' surname='M.A.'>
         </author>
      <date day='29' month='July' year='1999'/>
      <abstract>
	 <t>A mechanism is needed to permit web clients to locate nearby web 
proxy caches. Current best practice is for end users to hand 
configure their web client (i.e., browser) with the URL of an &#39;auto 
configuration file&#39;. In large environments this presents a 
formidable support problem.  It would be much more manageable for 
the web client software to automatically learn the configuration 
information for its web proxy settings. This is typically referred 
to as a resource discovery problem.
	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-wrec-wpad-01'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-wrec-wpad-01.txt' type='TXT'/>
</reference>



<reference anchor='RFC2142' target='https://www.rfc-editor.org/info/rfc2142'>
<front>
<title>Mailbox Names for Common Services, Roles and Functions</title>
<author fullname='D. Crocker' initials='D.' surname='Crocker'><organization/></author>
<date month='May' year='1997'/>
<abstract><t>This specification enumerates and describes Internet mail addresses (mailbox name @ host reference) to be used when contacting personnel at an organization. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2142'/>
<seriesInfo name='DOI' value='10.17487/RFC2142'/>
</reference>

<reference anchor='Homograph'>
  <front>
    <title>The homograph attack</title>
    <author fullname='Evgeniy Gabrilovich' initials='E.' surname='Gabrilovich'>
      <organization>Technion--Israel Institute of Technology</organization>
    </author>
    <author fullname='Alex Gontmakher' initials='A.' surname='Gontmakher'>
      <organization>Technion--Israel Institute of Technology</organization>
    </author>
    <date month='February' year='2002'/>
  </front>
  <seriesInfo name='Communications of the ACM' value='vol. 45, no. 2, pp. 128'/>
  <seriesInfo name='DOI' value='10.1145/503124.503156'/>
</reference>


<reference anchor='I-D.hoffman-dns-special-labels'>
   <front>
      <title>IANA Registry for Special Labels in the DNS</title>
      <author fullname='Paul E. Hoffman' initials='P. E.' surname='Hoffman'>
         <organization>ICANN</organization>
      </author>
      <date day='1' month='October' year='2018'/>
      <abstract>
	 <t>   This document defines an new IANA registry for special labels in the
   DNS.  The registry is useful because the labels cause special
   handling in DNS entities such as stub resolvers, recursive resolvers,
   and applications that use DNS, and developers of software for those
   entities should be aware of the many types of special labels in use.

   [[ A GitHub repo for this document is at
   https://github.com/paulehoffman/dns-special-labels ]]

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-hoffman-dns-special-labels-00'/>
   <format target='https://www.ietf.org/archive/id/draft-hoffman-dns-special-labels-00.txt' type='TXT'/>
</reference>




    </references>


<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>Many people created these dangerous labels or the authorization processes that rely on them over the years.</t>

<t>Dave Crocker wrote an early list of special e-mail local-parts, from <xref target="RFC2142"/>.</t>

<t>Paul Hoffman tried to document a wider survey of special DNS labels (not all security-sensitive) in <xref target="I-D.hoffman-dns-special-labels"/>.</t>

<t>Rasmus Dahlberg, yuki, and Carsten Bormann reviewed this draft and gave feedback.</t>

<t>Tim Wicinski pointed out wpad.</t>

</section>
<section removeInRFC="true" anchor="document-considerations"><name>Document Considerations</name>

<section anchor="other-types-of-labels"><name>Other types of labels?</name>

<t>This document is limited to leftmost DNS labels and e-mail local-parts because those are the arbitrary labels that the author is familiar with.
There may be other types of arbitrary labels on the Internet with special values that have security implications that the author is not aware of.
If you are aware of some other system with a similar pattern, please send feedback.</t>

</section>
<section anchor="document-history"><name>Document History</name>

<section anchor="substantive-changes-from-02-to-03"><name>Substantive Changes from -02 to -03</name>

<t><list style="symbols">
  <t>Add <spanx style="verb">mail</spanx> DNS label (MUA autoconfiguration)</t>
  <t>Reference Thunderbird guidance about MUA autoconfiguration</t>
  <t>Add <spanx style="verb">openpgp-ca</spanx> e-mail local part</t>
</list></t>

</section>
<section anchor="substantive-changes-from-01-to-02"><name>Substantive Changes from -01 to -02</name>

<t><list style="symbols">
  <t>New dangerous DNS labels: WPAD, MS Exchange Autodiscover, common MUA
autoconfig (originally from Mozilla Thunderbird)</t>
</list></t>

</section>
<section anchor="substantive-changes-from-00-to-01"><name>Substantive Changes from -00 to -01</name>

<t><list style="symbols">
  <t>explicitly define IANA tables</t>
  <t>indicate that the tables use Specification Required</t>
  <t>clarify scope</t>
</list></t>

</section>
</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

