<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-davies-internal-tld-02" category="info" submissionType="independent" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Private use top-level domain">A Top-level Domain for Private Use</title>

    <author initials="K." surname="Davies" fullname="Kim Davies">
      <organization abbrev="IANA">Internet Assigned Numbers Authority</organization>
      <address>
        <email>kim.davies@iana.org</email>
      </address>
    </author>
    <author initials="A." surname="McConachie" fullname="Andrew McConachie">
      <organization abbrev="ICANN">Internet Corporation for Assigned Names and Numbers</organization>
      <address>
        <email>andrew.mcconachie@icann.org</email>
      </address>
    </author>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>

    <date year="2025" month="February" day="02"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 53?>

<t>This document describes the "internal" top-level domain for use in
private applications.</t>



    </abstract>



  </front>

  <middle>


<?line 58?>

<section anchor="introduction"><name>Introduction</name>

<t>There are certain circumstances in which private network operators may
wish to use their own domain naming scheme that is not intended to be
used or accessible by the global domain name system (DNS), such as
within closed corporate or home networks.</t>

<t>The "internal" top-level domain provides this purpose in the DNS. Such
domains will not resolve in the global DNS, but can be configured within
closed networks as the network operator sees fit. It fulfils a similar
purpose as private-use IP address ranges that are set aside (e.g.
<xref target="RFC1918"/>).</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
<xref target="BCP14"/> when, and only when, they appear in all capitals, as shown
here.</t>

<t>This document assumes familiarity with DNS terms; please see <xref target="BCP219"/>.</t>

</section>
<section anchor="using-the-internal-namespace"><name>Using the "internal" Namespace</name>

<t>Network operators have been using different names for private-use
DNS for many years. This usage has been uncoordinated and can result
in incompatibilities or harm to Internet users. For example, an
organization might choose to use a name for this purpose that has not
been assigned to them, that would later appear in the global DNS thereby
causing name collisions and undefined behavior for users.</t>

<t>If an organization determines that it requires a private-use DNS
namespace, it should either use sub-domains of a global DNS name that is
under its organizational and operational control, or use the "internal"
top-level domain. This document does not offer guidance on when a
network operators should choose the "internal" top-level domain instead
of a sub-domain of a global DNS name. This decision will depend on
multiple factors such as network design or organizational needs, and is
outside the scope of this publication.</t>

<t>DNSSEC validating resolvers will always fail to resolve names ending in
"internal". An organization wanting to use such names inside of their
organization MAY want to sign and validate names ending in "internal"
within their organization. The details of such configuration are outside
the scope of this document.</t>

</section>
<section anchor="comparisons-to-similar-namespaces"><name>Comparisons to Similar Namespaces</name>

<t>Other namespaces are reserved for similar purposes, which superficially
may seem to serve the same purpose as the "internal" domain, but are
intended for different use cases.</t>

<t><list style="symbols">
  <t>The "local" namespace <xref target="RFC6762"/> is reserved for use with the
multicast DNS protocol. This protocol allows for resolution between
devices on a local network. This namespace does not use typical DNS
zones for name allocation, and instead uses the multicast DNS protocol
to negotiate names and resolve conflicts. It is expected "internal" will
be used for applications where names are specified in locally-configured
zones.</t>
  <t>The "alt" namespace <xref target="RFC9476"/> is reserved for contexts where
identifiers are used that may look like domain names, but do not use
the DNS protocol for resolution. This is in contrast to the "internal"
domain which is to be used with the DNS protocol, but in limited
private-use network scope.</t>
  <t>The "home.arpa" namespace <xref target="RFC8375"/> is reserved for use within
residential networks, including the Home Networking Control Protocol
<xref target="RFC7788"/>.</t>
</list></t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>The document requires no IANA actions. For the reasons stated above,
as the "internal" top-level domain is reserved from being used in the
global DNS it MUST NOT appear in the DNS root zone except to the
minimum extent necessary to enable it to function for its intended
purpose.</t>

<section anchor="domain-name-reservation-considerations"><name>Domain Name Reservation Considerations</name>

<t>(Editor note (WK): It not yet decided if .internal should
be added to the list of special-use domain names at
<eref target="https://www.iana.org/assignments/special-use-domain-names/">https://www.iana.org/assignments/special-use-domain-names/</eref>.</t>

<t>Below are potential answers for the "Seven Questions" from <xref target="RFC6761"/>,
to help drive this discussion.</t>

<t>These answers were lifted from other documents which made similar
reservations, because “Good artists copy; great artists steal.” --
Pablo Picasso)</t>

<t><list style="symbols">
  <t>Answer 1: copied from <xref target="RFC6762"/>. Additional sentence added to make it more
explicit.</t>
  <t>Answer 2: copied from <xref target="RFC6761"/>, Sec 6.5.  "Domain Name Reservation
Considerations for Example Domains". Additional text about potential
special handling for cookies.</t>
  <t>Answers 3 and 4: copied from <xref target="RFC6761"/>, Sec 6.5.  "Domain Name Reservation
Considerations for Example Domains".</t>
  <t>Answers 5 and 6: copied from <xref target="RFC6761"/>, Sec 6.1 "Domain Name Reservation
Considerations for Private Addresses".</t>
  <t>Answer 7: copied from <xref target="RFC6762"/>.  <list style="numbers" type="1">
      <t>Users SHOULD understand that .internal names are not expected
to be globally unique, and may resolve to different addresses and
services on different networks. Since there is no central authority
responsible for assigning .internal names, users SHOULD be aware of
this and SHOULD exercise appropriate caution.  In an untrusted or
unfamiliar network environment, users SHOULD be aware that using a
name like "www.internal" may not actually connect them to the web
site they expected, and could easily connect them to a different web
page, or even a fake or spoof of their intended web site, designed to
trick them into revealing confidential information.  As always with
networking, end-to-end cryptographic security can be a useful tool.
For example, when connecting with ssh, the ssh host key verification
process will inform the user if it detects that the identity of the
entity they are communicating with has changed since the last time
they connected to that name.</t>
      <t>Application software, in general, SHOULD NOT recognize .internal
names as special and SHOULD use .internal names as they would other
domain names. An exception to this may be web browsers (and similar)
which may wish to institute special handling for cookies, such as
invalidation when a network change is detected.</t>
      <t>Name resolution APIs and libraries SHOULD NOT recognize .internal
names as special and SHOULD NOT treat them differently.  Name
resolution APIs SHOULD send queries for .internal names to their
configured caching DNS server(s).</t>
      <t>Caching DNS servers SHOULD NOT recognize .internal names as
special and SHOULD resolve them normally.</t>
      <t>Authoritative DNS servers SHOULD recognize these names as special
and SHOULD, by default, generate immediate negative responses for all
such queries, unless explicitly configured by the administrator to
give positive answers for names within the .internal zone.</t>
      <t>DNS server operators SHOULD, if they are using .internal names,
configure their authoritative DNS servers to act as authoritative for
these names.</t>
      <t>DNS Registries/Registrars MUST NOT grant requests to register any
of these names in the normal way to any person or entity. These names
are reserved for use in private networks, and fall outside the set of
names available for allocation by registries/ registrars. Attempting
to allocate one of these names as if it were a normal DNS domain name
will probably not work as desired, for reasons 4, 5 and 6 above.</t>
    </list></t>
</list></t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>While the namespace is designated for private use, there is no guarantee
that the names utilized in this namespace will not leak into the broader
Internet. Since usage may appear in log files, email headers, and the
like; users should not rely on the confidentiality of the "internal"
namespace.</t>

<t>Users should not expect that names in the "internal" namespace are
globally unique; it is assumed that many of the same names will be used
for entirely different purposes on different networks. This is similar
to the use of the "local" namespace in the multicast DNS protocol - just
as there are many different devices named "printer.local", there may
be many different servers named "accounting.internal". Users should be
aware of this when performing operations requiring authenticity, such as
entering credentials.</t>

<t>Users should also not assume the appearance of such names is indicative
of the true source of transmissions. When diagnosing network issues, the
appearance of such addresses must be interpreted with the associated
context to ascertain the private network with which the name is being
used. A private-use name can never be used by itself to identify the
origin of a communication.</t>

<t>The lack of global uniqueness also has implications for HTTP cookies;
a cookie set for "accounting.internal" on one network may be sent to a
different "accounting.internal" if the user changes their local network.
This may be mitigated by adding the Secure flag to the cookie. It is
expected that Certificate Authorities will not issue certificates for
the "internal" namspace as it does not resolve in the global DNS. If an
organization wants to use HTTP over TLS with names in the "internal"
namespace, they will also need an internal, private CA. The details of
this are outside the scope of this document.</t>

</section>
<section anchor="additional-information"><name>Additional Information</name>

<t>This reservation is the result of a community deliberation on this
topic over many years, most notably <xref target="SAC113"/>. The SAC113 advisory
recommended the establishment of a single top-level domain for
private-use applications. This top-level domain would not be delegated
in the DNS root zone to ensure it is not resolvable in contexts outside
of a private network.</t>

<t>A selection process <xref target="IANA-Assessment"/> determined "internal" was
the best suited string given the requirement that a single string be
selected for this purpose, and subsequently reserved for this purpose in
July 2024. <xref target="ICANN-Board-Resolution"/></t>

</section>


  </middle>

  <back>




    <references title='Informative References' anchor="sec-informative-references">



<referencegroup anchor="BCP14" target="https://www.rfc-editor.org/info/bcp14">
  <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
    <front>
      <title>Key words for use in RFCs to Indicate Requirement Levels</title>
      <author fullname="S. Bradner" initials="S." surname="Bradner"/>
      <date month="March" year="1997"/>
      <abstract>
        <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
      </abstract>
    </front>
    <seriesInfo name="BCP" value="14"/>
    <seriesInfo name="RFC" value="2119"/>
    <seriesInfo name="DOI" value="10.17487/RFC2119"/>
  </reference>
  <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
    <front>
      <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
      <author fullname="B. Leiba" initials="B." surname="Leiba"/>
      <date month="May" year="2017"/>
      <abstract>
        <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
      </abstract>
    </front>
    <seriesInfo name="BCP" value="14"/>
    <seriesInfo name="RFC" value="8174"/>
    <seriesInfo name="DOI" value="10.17487/RFC8174"/>
  </reference>
</referencegroup>

<referencegroup anchor="BCP219" target="https://www.rfc-editor.org/info/bcp219">
  <reference anchor="RFC9499" target="https://www.rfc-editor.org/info/rfc9499">
    <front>
      <title>DNS Terminology</title>
      <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
      <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
      <date month="March" year="2024"/>
      <abstract>
        <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
        <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
      </abstract>
    </front>
    <seriesInfo name="BCP" value="219"/>
    <seriesInfo name="RFC" value="9499"/>
    <seriesInfo name="DOI" value="10.17487/RFC9499"/>
  </reference>
</referencegroup>

<reference anchor="RFC1918">
  <front>
    <title>Address Allocation for Private Internets</title>
    <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
    <author fullname="B. Moskowitz" initials="B." surname="Moskowitz"/>
    <author fullname="D. Karrenberg" initials="D." surname="Karrenberg"/>
    <author fullname="G. J. de Groot" initials="G. J." surname="de Groot"/>
    <author fullname="E. Lear" initials="E." surname="Lear"/>
    <date month="February" year="1996"/>
    <abstract>
      <t>This document describes address allocation for private internets. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="5"/>
  <seriesInfo name="RFC" value="1918"/>
  <seriesInfo name="DOI" value="10.17487/RFC1918"/>
</reference>

<reference anchor="RFC6761">
  <front>
    <title>Special-Use Domain Names</title>
    <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
    <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
    <date month="February" year="2013"/>
    <abstract>
      <t>This document describes what it means to say that a Domain Name (DNS name) is reserved for special use, when reserving such a name is appropriate, and the procedure for doing so. It establishes an IANA registry for such domain names, and seeds it with entries for some of the already established special domain names.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6761"/>
  <seriesInfo name="DOI" value="10.17487/RFC6761"/>
</reference>

<reference anchor="RFC6762">
  <front>
    <title>Multicast DNS</title>
    <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
    <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
    <date month="February" year="2013"/>
    <abstract>
      <t>As networked devices become smaller, more portable, and more ubiquitous, the ability to operate with less configured infrastructure is increasingly important. In particular, the ability to look up DNS resource record data types (including, but not limited to, host names) in the absence of a conventional managed DNS server is useful.</t>
      <t>Multicast DNS (mDNS) provides the ability to perform DNS-like operations on the local link in the absence of any conventional Unicast DNS server. In addition, Multicast DNS designates a portion of the DNS namespace to be free for local use, without the need to pay any annual fee, and without the need to set up delegations or otherwise configure a conventional DNS server to answer for those names.</t>
      <t>The primary benefits of Multicast DNS names are that (i) they require little or no administration or configuration to set them up, (ii) they work when no infrastructure is present, and (iii) they work during infrastructure failures.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6762"/>
  <seriesInfo name="DOI" value="10.17487/RFC6762"/>
</reference>

<reference anchor="RFC7788">
  <front>
    <title>Home Networking Control Protocol</title>
    <author fullname="M. Stenberg" initials="M." surname="Stenberg"/>
    <author fullname="S. Barth" initials="S." surname="Barth"/>
    <author fullname="P. Pfister" initials="P." surname="Pfister"/>
    <date month="April" year="2016"/>
    <abstract>
      <t>This document describes the Home Networking Control Protocol (HNCP), an extensible configuration protocol, and a set of requirements for home network devices. HNCP is described as a profile of and extension to the Distributed Node Consensus Protocol (DNCP). HNCP enables discovery of network borders, automated configuration of addresses, name resolution, service discovery, and the use of any routing protocol that supports routing based on both the source and destination address.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7788"/>
  <seriesInfo name="DOI" value="10.17487/RFC7788"/>
</reference>

<reference anchor="RFC8375">
  <front>
    <title>Special-Use Domain 'home.arpa.'</title>
    <author fullname="P. Pfister" initials="P." surname="Pfister"/>
    <author fullname="T. Lemon" initials="T." surname="Lemon"/>
    <date month="May" year="2018"/>
    <abstract>
      <t>This document specifies the behavior that is expected from the Domain Name System with regard to DNS queries for names ending with '.home.arpa.' and designates this domain as a special-use domain name. 'home.arpa.' is designated for non-unique use in residential home networks. The Home Networking Control Protocol (HNCP) is updated to use the 'home.arpa.' domain instead of '.home'.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8375"/>
  <seriesInfo name="DOI" value="10.17487/RFC8375"/>
</reference>

<reference anchor="RFC9476">
  <front>
    <title>The .alt Special-Use Top-Level Domain</title>
    <author fullname="W. Kumari" initials="W." surname="Kumari"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>This document reserves a Top-Level Domain (TLD) label "alt" to be used in non-DNS contexts. It also provides advice and guidance to developers creating alternative namespaces.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9476"/>
  <seriesInfo name="DOI" value="10.17487/RFC9476"/>
</reference>


<reference anchor="SAC113" target="https://itp.cdn.icann.org/en/files/security-and-stability-advisory-committee-ssac-reports/sac-113-en.pdf">
  <front>
    <title>SSAC Advisory on Private-Use TLDs</title>
    <author >
      <organization></organization>
    </author>
    <date year="2020" month="September"/>
  </front>
</reference>
<reference anchor="IANA-Assessment" target="https://itp.cdn.icann.org/en/files/root-system/identification-tld-private-use-24-01-2024-en.pdf">
  <front>
    <title>Identification of a top-level domain for private use</title>
    <author >
      <organization></organization>
    </author>
    <date year="2024" month="January"/>
  </front>
</reference>
<reference anchor="ICANN-Board-Resolution" target="https://www.icann.org/en/board-activities-and-meetings/materials/approved-resolutions-special-meeting-of-the-icann-board-29-07-2024-en#section2.a">
  <front>
    <title>Reserving .INTERNAL for Private-Use Applications</title>
    <author >
      <organization></organization>
    </author>
    <date year="2024" month="July"/>
  </front>
</reference>


    </references>



<?line 257?>

<section numbered="false" anchor="notes-for-removal-before-publication"><name>Notes (for removal before publication)</name>

<t><list style="symbols">
  <t>It is currently assumed this domain should NOT
be designated as a special-use domain name at</t>
</list></t>
<t><eref target="https://www.iana.org/assignments/special-use-domain-names/">https://www.iana.org/assignments/special-use-domain-names/</eref>.</t>

<t><list style="symbols">
  <t>I-D source is maintained at: <eref target="https://github.com/kjd/draft-davies-internal-tld">https://github.com/kjd/draft-davies-internal-tld</eref></t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

