<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-dkg-intarea-dangerous-labels-05" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title>Dangerous Labels in DNS and E-mail</title>

    <author initials="D. K." surname="Gillmor" fullname="Daniel Kahn Gillmor">
      <organization abbrev="ACLU">American Civil Liberties Union</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>dkg@fifthhorseman.net</email>
      </address>
    </author>

    <date year="2025" month="November" day="06"/>

    <area>sec</area>
    <workgroup>intarea</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 80?>

<t>This document establishes registries that list known security-sensitive labels in the DNS and in e-mail contexts.</t>

<t>It provides references and brief explanations about the risks associated with each known label.</t>

<t>The registries established here offer guidance to the security-minded system administrator, who may not want to permit registration of these labels by untrusted users.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://dkg.gitlab.io/dangerous-labels/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dkg-intarea-dangerous-labels/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Internet Area Working Group mailing list (<eref target="mailto:intarea@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/intarea/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/intarea/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://gitlab.com/dkg/dangerous-labels"/>.</t>
    </note>


  </front>

  <middle>


<?line 88?>

<section anchor="introduction"><name>Introduction</name>

<t>The Internet has a few places where seemingly arbitrary labels can show up and be used interchangeably.</t>

<t>Some choices for those labels have surprising or tricky consequences.
Reasonable administrators may want to be aware of those labels to avoid an accidental allocation that has security implications.</t>

<t>This document registers a list of labels in DNS and e-mail systems that are known to have a security impact.
It is not recommended to create more security-sensitive labels.</t>

<t>Offering a stable registry of these dangerous labels is not an endorsement of the practice of using arbitrary labels in this way.
A new protocol that proposes adding a label to this list is encouraged to find a different solution if at all possible.</t>

<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
</section>
<section anchor="dns"><name>DNS Labels</name>

<t>Note that <xref target="RFC8552"/> defines the use of "underscored" labels which are treated differently than normal DNS labels, and often have security implications.
That document also established the IANA registry for "Underscored and Globally Scoped DNS Node Names".
That registry takes precedence to the list enumerated here, and any label in that list or with a leading underscore ("<spanx style="verb">_</spanx>") <bcp14>MUST NOT</bcp14> be included in this list.</t>

<t>Note also that <xref section="2.2" sectionFormat="of" target="RFC8820"/> makes it clear that depending on specific forms of DNS labels in a given URI scheme in a protocol is strongly discouraged.</t>

<t>Below are some normal-looking DNS labels that may grant some form of administrative control over the domain that they are attached to.</t>

<t>They are mostly "leftmost" or least-significant labels (in the sense used in <xref section="8" sectionFormat="of" target="RFC8499"/>), in that if <spanx style="verb">foo</spanx> were listed here, it would be because granting control over the <spanx style="verb">foo.example.net</spanx> label (or control over the host pointed to by <spanx style="verb">foo.example.net</spanx>) to an untrusted party might offer that party some form of administrative control over other parts of <spanx style="verb">example.org</spanx>.</t>

<t>Note: where "&lt;key-tag&gt;" occurs in <xref target="dns-table"/>, it indicates any sequence of five or more decimal digits, as described in <xref target="RFC8509"/>.</t>

<texttable title="Dangerous DNS labels" anchor="dns-table">
      <ttcol align='left'>DNS Label</ttcol>
      <ttcol align='left'>Rationale</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c><spanx style="verb">autoconfig</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/>, <xref target="THUNDERBIRD"/></c>
      <c><spanx style="verb">autodiscover</spanx></c>
      <c>Hijack Microsoft Exchange client configuration</c>
      <c><xref target="AUTODISCOVER"/></c>
      <c><spanx style="verb">imap</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/>, <xref target="THUNDERBIRD"/></c>
      <c><spanx style="verb">imaps</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">mail</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/>, <xref target="THUNDERBIRD"/></c>
      <c><spanx style="verb">mta-sts</spanx></c>
      <c>Set SMTP transport security policy</c>
      <c><xref target="RFC8461"/></c>
      <c><spanx style="verb">openpgpkey</spanx></c>
      <c>Domain-based OpenPGP certificate lookup and verification</c>
      <c><xref target="I-D.koch-openpgp-webkey-service"/></c>
      <c><spanx style="verb">pop3</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">pop3s</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">root-key-sentinel-is-ta-</spanx>&lt;key-tag&gt;</c>
      <c>Indicates which DNSSEC root key is trusted</c>
      <c><xref target="RFC8509"/></c>
      <c><spanx style="verb">root-key-sentinel-not-ta-</spanx>&lt;key-tag&gt;</c>
      <c>Indicates which DNSSEC root key is not trusted</c>
      <c><xref target="RFC8509"/></c>
      <c><spanx style="verb">smtp</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/>, <xref target="THUNDERBIRD"/></c>
      <c><spanx style="verb">smtps</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">submission</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">ua-auto-config</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="I-D.ietf-mailmaint-pacc"/></c>
      <c><spanx style="verb">wpad</spanx></c>
      <c>Automatic proxy discovery</c>
      <c><xref target="I-D.ietf-wrec-wpad-01"/></c>
      <c><spanx style="verb">www</spanx></c>
      <c>Popular web browsers guess this label</c>
      <c>FIXME: find a reference</c>
</texttable>

</section>
<section anchor="e-mail"><name>E-mail Local Parts</name>

<t><xref section="3.4.1" sectionFormat="of" target="RFC5322"/> defines the <spanx style="verb">local-part</spanx> of an e-mail address (the part before the "<spanx style="verb">@</spanx>" sign) as "domain-dependent".
However, allocating some specific <spanx style="verb">local-part</spanx>s to an untrusted party can have significant security consequences for the domain or other associated resources.</t>

<t>Note that all these labels are expected to be case-insensitive.
That is, an administrator restricting registration of a <spanx style="verb">local-part</spanx> named "<spanx style="verb">admin</spanx>" <bcp14>MUST</bcp14> also apply the same constraint to "<spanx style="verb">Admin</spanx>" or "<spanx style="verb">ADMIN</spanx>" or "<spanx style="verb">aDmIn</spanx>".</t>

<t><xref target="RFC2142"/> offers some widespread historical practice for common <spanx style="verb">local-part</spanx>s.
The CA/Browser Forum's Baseline Requirements (<xref target="CABForum-BR"/>) constrain how any popular Public Key Infrastructure (PKI) Certification Authority (CA) should confirm domain ownership when verifying by e-mail.
The public CAs used by popular web browsers ("web PKI") will adhere to these guidelines, but anyone relying on unusual CAs may still be subject to risk additional labels described here.</t>

<texttable title="Dangerous E-mail local-parts" anchor="e-mail-table">
      <ttcol align='left'>E-mail local-part</ttcol>
      <ttcol align='left'>Rationale</ttcol>
      <ttcol align='left'>References</ttcol>
      <c><spanx style="verb">abuse</spanx></c>
      <c>Receive reports of abusive public behavior</c>
      <c><xref section="2" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">administrator</spanx></c>
      <c>PKI Cert Issuance</c>
      <c>Section 3.2.2.4.4 of <xref target="CABForum-BR"/></c>
      <c><spanx style="verb">admin</spanx></c>
      <c>PKI Cert Issuance</c>
      <c>Section 3.2.2.4.4 of <xref target="CABForum-BR"/></c>
      <c><spanx style="verb">hostmaster</spanx></c>
      <c>PKI Cert Issuance, DNS zone control</c>
      <c>Section 3.2.2.4.4 of <xref target="CABForum-BR"/>, <xref section="7" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">info</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">is</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">it</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">noc</spanx></c>
      <c>Receive reports of network problems</c>
      <c><xref section="4" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">openpgp-ca</spanx></c>
      <c>Make authoritative-seeming OpenPGP certifications for in-domain e-mail addresses</c>
      <c><xref target="OPENPGP-CA"/></c>
      <c><spanx style="verb">postmaster</spanx></c>
      <c>Receive reports related to SMTP service, PKI Cert Issuance</c>
      <c><xref section="5" sectionFormat="of" target="RFC2142"/>, Section 3.2.2.4.4 of <xref target="CABForum-BR"/></c>
      <c><spanx style="verb">root</spanx></c>
      <c>Receive system software notifications, PKI Cert Issuance (historic)</c>
      <c><xref target="VU591120"/>, FIXME: find a reference for <spanx style="verb">root</spanx> (software config docs?)</c>
      <c><spanx style="verb">security</spanx></c>
      <c>Receive reports of technical vulnerabilities</c>
      <c><xref section="4" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">ssh-openpgp-auth</spanx></c>
      <c>Trust anchor for SSH host keys</c>
      <c><xref target="SSH-OPENPGP-AUTH"/></c>
      <c><spanx style="verb">ssladministrator</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">ssladmin</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">sslwebmaster</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">sysadmin</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">webmaster</spanx></c>
      <c>PKI Cert Issuance, Receive reports related to HTTP service</c>
      <c>Section 3.2.2.4.4 of <xref target="CABForum-BR"/>, <xref section="5" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">www</spanx></c>
      <c>Common alias for <spanx style="verb">webmaster</spanx></c>
      <c><xref section="5" sectionFormat="of" target="RFC2142"/></c>
</texttable>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Allowing untrusted parties to allocate names with the labels associated in this document may grant access to administrative capabilities.</t>

<t>The administrator of a DNS or E-mail service that permits any untrusted party to register an arbitrary DNS label or e-mail <spanx style="verb">local-part</spanx> for their own use <bcp14>SHOULD</bcp14> reject attempts to register the labels listed here.</t>

<section anchor="additional-risks-out-of-scope"><name>Additional Risks Out of Scope</name>

<t>The lists of security concerns in this document cover security risks and concerns associated with interoperable use of specific labels.
They do not cover every possible security concern associated with any DNS label or e-mail localpart.</t>

<t>For example, DNS labels with an existing underscore are likely by construction to be sensitive, and are registered separately in the registry defined by <xref target="RFC8552"/>.</t>

<t>Similarly, where humans or other systems capable of transcription error are in the loop, subtle variations of the labels listed here may also have security implications, due to homomgraphic confusion (<xref target="Homograph"/>), but this document does not attempt to enumerate all phishing, typosquatting, or similar risks of visual confusion, nor does it exhaustively list all other potential risks associated with variant encodings.
See <xref target="UTR36"/> for a deeper understanding of these categories of security concerns.</t>

<t>Additionally, some labels may be associated with security concerns that happen to also commonly show up as DNS labels or e-mail local parts, but their risk is not associated with their use in interoperable public forms of DNS or e-mail.
For example, on some systems, a local user account named <spanx style="verb">backup</spanx> has full read access to the local filesystem so that it can transfer data to the local backup system.
And in some cases, the list of local user accounts is also aliased into e-mail local parts.
However, permitting the registration of <spanx style="verb">backup@example.net</spanx> as an e-mail address is not itself an interoperable security risk -- no external third party will treat any part of the <spanx style="verb">example.net</spanx> domain differently because of the registration.
This document does not cover any risk entirely related to internal configuration choices.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document asks IANA to establish two registries, from <xref target="dns-table"/> and <xref target="e-mail-table"/>.</t>

<section anchor="dangerous-dns-labels-registry"><name>Dangerous DNS Labels Registry</name>

<t>The table of Dangerous DNS Labels (in <xref target="dns-table"/>) has three columns:</t>

<t><list style="symbols">
  <t>DNS Label (text string)</t>
  <t>Rationale (human-readable short explanation)</t>
  <t>References (pointer or pointers to more detailed documentation)</t>
</list></t>

<t>Note that this table does not include anything that should be handled by the pre-existing "Underscored and Globally Scoped DNS Node Names" registry defined by <xref target="RFC8552"/>.</t>

<t>Following the guidance in <xref target="BCP26"/>, any new entry to this registry will be assigned using Specification Required.
The IESG will assign one or more designated experts for this purpose, who will consult with the IETF DNSOP working group mailing list or its designated successor.
The Designated Expert will support IANA by clearly indicating when a new DNS label should be added to this table, offering the label itself, a brief rationale, and a pointer to the permanent and readily available documentation of the security consequences of the label.
Updates or deletions of DNS Labels will follow the same process.</t>

</section>
<section anchor="dangerous-e-mail-local-parts-registry"><name>Dangerous E-mail Local Parts Registry</name>

<t>The table of Dangerous E-mail Local Parts (in <xref target="e-mail-table"/> also has three columns:</t>

<t><list style="symbols">
  <t>E-mail local part (text string)</t>
  <t>Rationale (human-readable short explanation)</t>
  <t>References (pointer or ponters to more detailed documentation)</t>
</list></t>

<t>Following the guidance in <xref target="BCP26"/>, any new entry to this registry will be assigned using Specification Required.
The IESG will assign one or more designated experts for this purpose, who will consult with the IETF EMAILCORE working group mailing list or its designated successor.
The Designated Expert will support IANA by clearly indicating when a new e-mail local part should be added to this table, offering the local part itself, a brief rationale, and a pointer to the permanent and readily available documentation of the security consequences of the local part.
Updates or deletions of of E-mail Local Parts will follow the same process.</t>

</section>
<section anchor="shared-considerations"><name>Shared Considerations</name>

<t>Having to add a new security-sensitive entry to either of these tables is likely to be a bad idea, because existing DNS zones and e-mail installations may have already made an allocation of the novel label, and cannot avoid the security implications.
For a new protocol that wants to include a label in either registry, there is almost always a better protocol design choice.</t>

<t>Yet, if some common practice permits any form of administrative control over a separate resource based on control over an arbitrary label, administrators need a central place to keep track of which labels are dangerous.</t>

<t>If such a practice cannot be avoided, it is better to ensure that the risk is documented clearly and referenced in the appropriate registry, rather than leaving it up to each administrator to re-discover the problem.</t>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC8552">
  <front>
    <title>Scoped Interpretation of DNS Resource Records through "Underscored" Naming of Attribute Leaves</title>
    <author fullname="D. Crocker" initials="D." surname="Crocker"/>
    <date month="March" year="2019"/>
    <abstract>
      <t>Formally, any DNS Resource Record (RR) may occur under any domain name. However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies. The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., "_name"). The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch. This specification explores the nature of this DNS usage and defines the "Underscored and Globally Scoped DNS Node Names" registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="222"/>
  <seriesInfo name="RFC" value="8552"/>
  <seriesInfo name="DOI" value="10.17487/RFC8552"/>
</reference>
<reference anchor="RFC5322">
  <front>
    <title>Internet Message Format</title>
    <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
    <date month="October" year="2008"/>
    <abstract>
      <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5322"/>
  <seriesInfo name="DOI" value="10.17487/RFC5322"/>
</reference>
<referencegroup anchor="BCP26" target="https://www.rfc-editor.org/info/bcp26">
  <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
    <front>
      <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
      <author fullname="M. Cotton" initials="M." surname="Cotton"/>
      <author fullname="B. Leiba" initials="B." surname="Leiba"/>
      <author fullname="T. Narten" initials="T." surname="Narten"/>
      <date month="June" year="2017"/>
      <abstract>
        <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
        <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
        <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
      </abstract>
    </front>
    <seriesInfo name="BCP" value="26"/>
    <seriesInfo name="RFC" value="8126"/>
    <seriesInfo name="DOI" value="10.17487/RFC8126"/>
  </reference>
</referencegroup>



    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="AUTOCONF" target="https://roll.urown.net/server/mail/autoconfig.html">
  <front>
    <title>Mail Client Auto-Configuration</title>
    <author initials="A." surname="Wolf" fullname="Alain Wolf">
      <organization></organization>
    </author>
    <date year="2021" month="February" day="22"/>
  </front>
</reference>
<reference anchor="THUNDERBIRD" target="https://github.com/mdn/archived-content/tree/main/files/en-us/mozilla/thunderbird/autoconfiguration">
  <front>
    <title>Autoconfiguration in Thunderbird</title>
    <author initials="B." surname="Bucksch" fullname="Ben Bucksch">
      <organization></organization>
    </author>
    <date year="2021" month="May" day="03"/>
  </front>
</reference>
<reference anchor="AUTODISCOVER" target="https://docs.microsoft.com/en-us/exchange/client-developer/exchange-web-services/autodiscover-for-exchange">
  <front>
    <title>Autodiscover for Exchange</title>
    <author >
      <organization>Microsoft</organization>
    </author>
    <date year="2020" month="January" day="15"/>
  </front>
</reference>
<reference anchor="CABForum-BR" target="https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.8.4.pdf">
  <front>
    <title>CA/Browser Forum Baseline Requirements</title>
    <author >
      <organization>CA/Browser Forum</organization>
    </author>
    <date year="2022" month="April" day="23"/>
  </front>
</reference>
<reference anchor="VU591120" target="https://www.kb.cert.org/vuls/id/591120/">
  <front>
    <title>Multiple SSL certificate authorities use predefined email addresses as proof of domain ownership</title>
    <author >
      <organization>CERT Coordination Center</organization>
    </author>
    <date year="2015" month="April" day="07"/>
  </front>
</reference>
<reference anchor="UTR36" target="https://unicode.org/reports/tr36/">
  <front>
    <title>Unicode Security Considerations</title>
    <author initials="M." surname="Davis" fullname="Mark Davis">
      <organization></organization>
    </author>
    <author initials="M." surname="Suignard" fullname="Michel Suignard">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="OPENPGP-CA" target="https://openpgp-ca.org/background/details/">
  <front>
    <title>OpenPGP CA: Technical Details</title>
    <author >
      <organization>the OpenPGP CA project</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="SSH-OPENPGP-AUTH" target="https://codeberg.org/wiktor/ssh-openpgp-auth#technical-details">
  <front>
    <title>SSH OpenPGP Authenticator: Technical details</title>
    <author initials="W." surname="Kwapisiewicz" fullname="Wiktor Kwapisiewicz">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


<reference anchor="RFC8820">
  <front>
    <title>URI Design and Ownership</title>
    <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
    <date month="June" year="2020"/>
    <abstract>
      <t>Section 1.1.1 of RFC 3986 defines URI syntax as "a federated and extensible naming system wherein each scheme's specification may further restrict the syntax and semantics of identifiers using that scheme." In other words, the structure of a URI is defined by its scheme. While it is common for schemes to further delegate their substructure to the URI's owner, publishing independent standards that mandate particular forms of substructure in URIs is often problematic.</t>
      <t>This document provides guidance on the specification of URI substructure in standards.</t>
      <t>This document obsoletes RFC 7320 and updates RFC 3986.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="190"/>
  <seriesInfo name="RFC" value="8820"/>
  <seriesInfo name="DOI" value="10.17487/RFC8820"/>
</reference>
<reference anchor="RFC8499">
  <front>
    <title>DNS Terminology</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="A. Sullivan" initials="A." surname="Sullivan"/>
    <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
    <date month="January" year="2019"/>
    <abstract>
      <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
      <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8499"/>
  <seriesInfo name="DOI" value="10.17487/RFC8499"/>
</reference>
<reference anchor="RFC8509">
  <front>
    <title>A Root Key Trust Anchor Sentinel for DNSSEC</title>
    <author fullname="G. Huston" initials="G." surname="Huston"/>
    <author fullname="J. Damas" initials="J." surname="Damas"/>
    <author fullname="W. Kumari" initials="W." surname="Kumari"/>
    <date month="December" year="2018"/>
    <abstract>
      <t>The DNS Security Extensions (DNSSEC) were developed to provide origin authentication and integrity protection for DNS data by using digital signatures. These digital signatures can be verified by building a chain of trust starting from a trust anchor and proceeding down to a particular node in the DNS. This document specifies a mechanism that will allow an end user and third parties to determine the trusted key state for the root key of the resolvers that handle that user's DNS queries. Note that this method is only applicable for determining which keys are in the trust store for the root key.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8509"/>
  <seriesInfo name="DOI" value="10.17487/RFC8509"/>
</reference>
<reference anchor="RFC8461">
  <front>
    <title>SMTP MTA Strict Transport Security (MTA-STS)</title>
    <author fullname="D. Margolis" initials="D." surname="Margolis"/>
    <author fullname="M. Risher" initials="M." surname="Risher"/>
    <author fullname="B. Ramakrishnan" initials="B." surname="Ramakrishnan"/>
    <author fullname="A. Brotman" initials="A." surname="Brotman"/>
    <author fullname="J. Jones" initials="J." surname="Jones"/>
    <date month="September" year="2018"/>
    <abstract>
      <t>SMTP MTA Strict Transport Security (MTA-STS) is a mechanism enabling mail service providers (SPs) to declare their ability to receive Transport Layer Security (TLS) secure SMTP connections and to specify whether sending SMTP servers should refuse to deliver to MX hosts that do not offer TLS with a trusted server certificate.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8461"/>
  <seriesInfo name="DOI" value="10.17487/RFC8461"/>
</reference>

<reference anchor="I-D.koch-openpgp-webkey-service">
   <front>
      <title>OpenPGP Web Key Directory</title>
      <author fullname="Werner Koch" initials="W." surname="Koch">
         <organization>g10 Code GmbH</organization>
      </author>
      <date day="2" month="June" year="2025"/>
      <abstract>
	 <t>   This specification describes a service to locate OpenPGP keys by mail
   address using a Web service and the HTTPS protocol.  It also provides
   a method for secure communication between the key owner and the mail
   provider to publish and revoke the public key.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-koch-openpgp-webkey-service-20"/>
   
</reference>

<reference anchor="I-D.ietf-mailmaint-pacc">
   <front>
      <title>Automatic Configuration of Email, Calendar, and Contact Server Settings</title>
      <author fullname="Daniel Eggert" initials="D." surname="Eggert">
         <organization>Apple Inc</organization>
      </author>
      <author fullname="Ben Bucksch" initials="B." surname="Bucksch">
         <organization>Beonex</organization>
      </author>
      <author fullname="Matt Diephouse" initials="M." surname="Diephouse">
         <organization>Apple Inc</organization>
      </author>
      <date day="20" month="October" year="2025"/>
      <abstract>
	 <t>   This document specifies an automatic configuration mechanism for
   email, calendar, and contact user agent applications.  Service
   providers publish standardized configuration information that user
   agent applications retrieve and use to simplify server setup
   procedures.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-mailmaint-pacc-01"/>
   
</reference>

<reference anchor="I-D.ietf-wrec-wpad-01">
   <front>
      <title>Web Proxy Auto-Discovery Protocol</title>
      <author fullname="Charles E. Perkins" initials="C. E." surname="Perkins">
         <organization>Sun Microsystems</organization>
      </author>
      <author fullname="Josh Cohen" initials="J." surname="Cohen">
         <organization>Microsoft Corporation</organization>
      </author>
      <author fullname="Martin Dunsmuir" initials="M." surname="Dunsmuir">
         <organization>RealNetworks, Inc.</organization>
      </author>
      <author fullname="Paul A. Gauthier" initials="P. A." surname="Gauthier">
         <organization>Inktomi Corporation</organization>
      </author>
      <author fullname="Ian Cooper" initials="I." surname="Cooper">
         </author>
      <author fullname="John W. Cohen M.A." initials="J. W. C." surname="M.A.">
         </author>
      <date day="29" month="July" year="1999"/>
      <abstract>
	 <t>A mechanism is needed to permit web clients to locate nearby web 
proxy caches. Current best practice is for end users to hand 
configure their web client (i.e., browser) with the URL of an &#x27;auto 
configuration file&#x27;. In large environments this presents a 
formidable support problem.  It would be much more manageable for 
the web client software to automatically learn the configuration 
information for its web proxy settings. This is typically referred 
to as a resource discovery problem.
	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-wrec-wpad-01"/>
   
</reference>
<reference anchor="RFC2142">
  <front>
    <title>Mailbox Names for Common Services, Roles and Functions</title>
    <author fullname="D. Crocker" initials="D." surname="Crocker"/>
    <date month="May" year="1997"/>
    <abstract>
      <t>This specification enumerates and describes Internet mail addresses (mailbox name @ host reference) to be used when contacting personnel at an organization. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2142"/>
  <seriesInfo name="DOI" value="10.17487/RFC2142"/>
</reference>
<reference anchor="Homograph">
  <front>
    <title>The homograph attack</title>
    <author fullname="Evgeniy Gabrilovich" initials="E." surname="Gabrilovich">
      <organization>Technion--Israel Institute of Technology</organization>
    </author>
    <author fullname="Alex Gontmakher" initials="A." surname="Gontmakher">
      <organization>Technion--Israel Institute of Technology</organization>
    </author>
    <date month="February" year="2002"/>
  </front>
  <seriesInfo name="Communications of the ACM" value="vol. 45, no. 2, pp. 128"/>
  <seriesInfo name="DOI" value="10.1145/503124.503156"/>
<refcontent>Association for Computing Machinery (ACM)</refcontent></reference>

<reference anchor="I-D.hoffman-dns-special-labels">
   <front>
      <title>IANA Registry for Special Labels in the DNS</title>
      <author fullname="Paul E. Hoffman" initials="P. E." surname="Hoffman">
         <organization>ICANN</organization>
      </author>
      <date day="1" month="October" year="2018"/>
      <abstract>
	 <t>   This document defines an new IANA registry for special labels in the
   DNS.  The registry is useful because the labels cause special
   handling in DNS entities such as stub resolvers, recursive resolvers,
   and applications that use DNS, and developers of software for those
   entities should be aware of the many types of special labels in use.

   [[ A GitHub repo for this document is at
   https://github.com/paulehoffman/dns-special-labels ]]

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-hoffman-dns-special-labels-00"/>
   
</reference>



    </references>

</references>


<?line 259?>

<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>Many people created these dangerous labels or the authorization processes that rely on them over the years.</t>

<t>Dave Crocker wrote an early list of special e-mail local-parts, from <xref target="RFC2142"/>.</t>

<t>Paul Hoffman tried to document a wider survey of special DNS labels (not all security-sensitive) in <xref target="I-D.hoffman-dns-special-labels"/>.</t>

<t>Rasmus Dahlberg, yuki, and Carsten Bormann reviewed this draft and gave feedback.</t>

<t>Tim Wicinski pointed out wpad.</t>

</section>
<section removeInRFC="true" anchor="document-considerations"><name>Document Considerations</name>

<section anchor="other-types-of-labels"><name>Other types of labels?</name>

<t>This document is limited to leftmost DNS labels and e-mail local-parts because those are the arbitrary labels that the author is familiar with.
There may be other types of arbitrary labels on the Internet with special values that have security implications that the author is not aware of.
If you are aware of some other system with a similar pattern, please send feedback.</t>

</section>
<section anchor="document-history"><name>Document History</name>

<section anchor="substantive-changes-from-04-to-05"><name>Substantive Changes from -04 to -05</name>

<t><list style="symbols">
  <t>Add <spanx style="verb">ua-auto-config</spanx> DNS label</t>
</list></t>

</section>
<section anchor="substantive-changes-from-03-to-04"><name>Substantive Changes from -03 to -04</name>

<t><list style="symbols">
  <t>Add <spanx style="verb">ssh-openpgp-auth</spanx> e-mail local part</t>
</list></t>

</section>
<section anchor="substantive-changes-from-02-to-03"><name>Substantive Changes from -02 to -03</name>

<t><list style="symbols">
  <t>Add <spanx style="verb">mail</spanx> DNS label (MUA autoconfiguration)</t>
  <t>Reference Thunderbird guidance about MUA autoconfiguration</t>
  <t>Add <spanx style="verb">openpgp-ca</spanx> e-mail local part</t>
</list></t>

</section>
<section anchor="substantive-changes-from-01-to-02"><name>Substantive Changes from -01 to -02</name>

<t><list style="symbols">
  <t>New dangerous DNS labels: WPAD, MS Exchange Autodiscover, common MUA
autoconfig (originally from Mozilla Thunderbird)</t>
</list></t>

</section>
<section anchor="substantive-changes-from-00-to-01"><name>Substantive Changes from -00 to -01</name>

<t><list style="symbols">
  <t>explicitly define IANA tables</t>
  <t>indicate that the tables use Specification Required</t>
  <t>clarify scope</t>
</list></t>

</section>
</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

