<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-davies-internal-tld-05" category="info" submissionType="independent" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Private use top-level domain">A Top-level Domain for Private Use</title>

    <author initials="K." surname="Davies" fullname="Kim Davies">
      <organization abbrev="IANA">Internet Assigned Numbers Authority</organization>
      <address>
        <email>kim.davies@iana.org</email>
      </address>
    </author>
    <author initials="A." surname="McConachie" fullname="Andrew McConachie">
      <organization abbrev="ICANN">Internet Corporation for Assigned Names and Numbers</organization>
      <address>
        <email>andrew.mcconachie@icann.org</email>
      </address>
    </author>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>

    <date year="2025" month="December" day="31"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 50?>

<t>This document describes the "internal" top-level domain for use in
private applications.</t>



    </abstract>



  </front>

  <middle>


<?line 55?>

<section anchor="introduction"><name>Introduction</name>

<t>There are certain circumstances in which private network operators may
wish to use their own domain naming scheme that is not intended to be
used or accessible by the global domain name system (DNS), such as
within corporate or home networks.</t>

<t>The "internal" top-level domain provides this purpose in the DNS. Such
domains will not resolve in the global DNS, but can be configured within
private networks as the network operator sees fit. It fulfills a purpose
similar to private-use IP address ranges (e.g. <xref target="RFC1918"/>), but in the
DNS.</t>

</section>
<section anchor="using-the-internal-namespace"><name>Using the "internal" Namespace</name>

<t>Network operators have been using using a variety of unregistered names
for private-use DNS for many years. This usage has been uncoordinated
and can result in incompatibilities or harm to Internet users. For
example, an organization might choose to use a name for this purpose
that has not been assigned to them. This name could later appear in the
global DNS, thereby causing name collisions and undefined behavior for
users.</t>

<t>In almost all cases, an entity should use a sub-domain of a global DNS
name that it controls. This ensures that names are globally unique
and avoids the potential for confusion that may arise from the use of
private-use namespaces. However, in some cases, such as for isolated
networks that will never be connected to the global Internet, use of the
"internal" top-level domain may be appropriate. Entities choosing to do
so should be cognizant of the implications of this decision, including:</t>

<t><list style="numbers" type="1">
  <t>The potential for collisions if multiple networks using "internal" are
interconnected in the future</t>
  <t>The risk of leakage of "internal" names into the global DNS, and</t>
  <t>The lack of global uniqueness of "internal" names and</t>
  <t>DNSSEC validating resolvers relying on the global DNS trust anchor
will fail to resolve names ending in "internal".</t>
</list></t>

</section>
<section anchor="comparisons-to-similar-namespaces"><name>Comparisons to Similar Namespaces</name>

<t>Other namespaces are reserved for similar purposes, which superficially
may seem to serve the same purpose as the "internal" domain, but are
intended for different use cases.</t>

<t><list style="symbols">
  <t>The "local" namespace <xref target="RFC6762"/> is reserved for use with the
multicast DNS protocol. This protocol allows for resolution between
devices on a local network. This namespace does not use typical DNS
zones for name allocation, and instead uses the multicast DNS protocol
to negotiate names and resolve conflicts. It is expected "internal" will
be used for applications where names are specified in locally-configured
zones.</t>
  <t>The "alt" namespace <xref target="RFC9476"/> is reserved for contexts where
identifiers are used that may look like domain names, but do not use
the DNS protocol for resolution. This is in contrast to the "internal"
domain which is to be used with the DNS protocol, but in limited
private-use network scope.</t>
  <t>The "home.arpa" namespace <xref target="RFC8375"/> is reserved for use within
residential networks, including with the Home Networking Control Protocol
<xref target="RFC7788"/>.</t>
</list></t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>The document requires no IANA actions. For the reasons stated above,
the "internal" top-level domain is reserved from being used in the
global DNS.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>While the namespace is designated for private use, there is no guarantee
that the names utilized in this namespace will not leak into the broader
Internet. Since usage may appear in log files, email headers, and the
like; users should not rely on the confidentiality of the "internal"
namespace.</t>

<t>Users should not expect that names in the "internal" namespace are
globally unique; it is assumed that many of the same names will be used
for entirely different purposes on different networks. This is similar
to the use of the "local" namespace in the multicast DNS protocol - just
as there are many different devices named "printer.local", there may
be many different servers named "accounting.internal". Users should be
aware of this when performing operations requiring authenticity, such as
entering credentials.</t>

<t>Given the lack of uniqueness, users should be aware that collisions
may occur if the same name is used in different "internal" networks,
for example if two organizations using "internal" interconnect their
networks. This is similar to the potential for IP address collisions
when interconnecting networks using private-use IP address ranges (e.g.,
<xref target="RFC1918"/>). Organizations should consider these implications when
deciding whether to use the "internal" namespace.</t>

<t>Users should also not assume the appearance of such names is indicative
of the true source of transmissions. When diagnosing network issues, the
appearance of such addresses must be interpreted with the associated
context to ascertain the private network with which the name is being
used. A name within the "internal" namespace can never be used by itself
to identify the origin of a communication.</t>

<t>The lack of global uniqueness also has implications for HTTP cookies;
a cookie set for "accounting.internal" on one network may be sent to a
different "accounting.internal" if the user changes their local network.
This may be mitigated by adding the Secure flag to the cookie. It is
expected that Certificate Authorities will not issue certificates for
the "internal" namespace as it does not resolve in the global DNS. If an
organization wants to use HTTP over TLS with names in the "internal"
namespace, they will also need an internal, private CA. The details of
this are outside the scope of this document.</t>

</section>
<section anchor="additional-information"><name>Additional Information</name>

<t>This reservation is the result of a community deliberation on this
topic over many years, most notably <xref target="SAC113"/>. The SAC113 advisory
recommended the establishment of a single top-level domain for
private-use applications. DNS records within this top-level domain
will not be resolvable in contexts outside of a private network.</t>

<t>A selection process <xref target="IANA-Assessment"/> determined "internal" was
the best suited string given the requirement that a single string be
selected for this purpose, and subsequently reserved for this purpose in
July 2024. <xref target="ICANN-Board-Resolution"/></t>

</section>


  </middle>

  <back>




    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC1918">
  <front>
    <title>Address Allocation for Private Internets</title>
    <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
    <author fullname="B. Moskowitz" initials="B." surname="Moskowitz"/>
    <author fullname="D. Karrenberg" initials="D." surname="Karrenberg"/>
    <author fullname="G. J. de Groot" initials="G. J." surname="de Groot"/>
    <author fullname="E. Lear" initials="E." surname="Lear"/>
    <date month="February" year="1996"/>
    <abstract>
      <t>This document describes address allocation for private internets. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="5"/>
  <seriesInfo name="RFC" value="1918"/>
  <seriesInfo name="DOI" value="10.17487/RFC1918"/>
</reference>
<reference anchor="RFC6762">
  <front>
    <title>Multicast DNS</title>
    <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
    <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
    <date month="February" year="2013"/>
    <abstract>
      <t>As networked devices become smaller, more portable, and more ubiquitous, the ability to operate with less configured infrastructure is increasingly important. In particular, the ability to look up DNS resource record data types (including, but not limited to, host names) in the absence of a conventional managed DNS server is useful.</t>
      <t>Multicast DNS (mDNS) provides the ability to perform DNS-like operations on the local link in the absence of any conventional Unicast DNS server. In addition, Multicast DNS designates a portion of the DNS namespace to be free for local use, without the need to pay any annual fee, and without the need to set up delegations or otherwise configure a conventional DNS server to answer for those names.</t>
      <t>The primary benefits of Multicast DNS names are that (i) they require little or no administration or configuration to set them up, (ii) they work when no infrastructure is present, and (iii) they work during infrastructure failures.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6762"/>
  <seriesInfo name="DOI" value="10.17487/RFC6762"/>
</reference>
<reference anchor="RFC7788">
  <front>
    <title>Home Networking Control Protocol</title>
    <author fullname="M. Stenberg" initials="M." surname="Stenberg"/>
    <author fullname="S. Barth" initials="S." surname="Barth"/>
    <author fullname="P. Pfister" initials="P." surname="Pfister"/>
    <date month="April" year="2016"/>
    <abstract>
      <t>This document describes the Home Networking Control Protocol (HNCP), an extensible configuration protocol, and a set of requirements for home network devices. HNCP is described as a profile of and extension to the Distributed Node Consensus Protocol (DNCP). HNCP enables discovery of network borders, automated configuration of addresses, name resolution, service discovery, and the use of any routing protocol that supports routing based on both the source and destination address.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7788"/>
  <seriesInfo name="DOI" value="10.17487/RFC7788"/>
</reference>
<reference anchor="RFC8375">
  <front>
    <title>Special-Use Domain 'home.arpa.'</title>
    <author fullname="P. Pfister" initials="P." surname="Pfister"/>
    <author fullname="T. Lemon" initials="T." surname="Lemon"/>
    <date month="May" year="2018"/>
    <abstract>
      <t>This document specifies the behavior that is expected from the Domain Name System with regard to DNS queries for names ending with '.home.arpa.' and designates this domain as a special-use domain name. 'home.arpa.' is designated for non-unique use in residential home networks. The Home Networking Control Protocol (HNCP) is updated to use the 'home.arpa.' domain instead of '.home'.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8375"/>
  <seriesInfo name="DOI" value="10.17487/RFC8375"/>
</reference>
<reference anchor="RFC9476">
  <front>
    <title>The .alt Special-Use Top-Level Domain</title>
    <author fullname="W. Kumari" initials="W." surname="Kumari"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>This document reserves a Top-Level Domain (TLD) label "alt" to be used in non-DNS contexts. It also provides advice and guidance to developers creating alternative namespaces.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9476"/>
  <seriesInfo name="DOI" value="10.17487/RFC9476"/>
</reference>

<reference anchor="SAC113" target="https://itp.cdn.icann.org/en/files/security-and-stability-advisory-committee-ssac-reports/sac-113-en.pdf">
  <front>
    <title>SSAC Advisory on Private-Use TLDs</title>
    <author >
      <organization></organization>
    </author>
    <date year="2020" month="September"/>
  </front>
</reference>
<reference anchor="IANA-Assessment" target="https://itp.cdn.icann.org/en/files/root-system/identification-tld-private-use-24-01-2024-en.pdf">
  <front>
    <title>Identification of a top-level domain for private use</title>
    <author >
      <organization></organization>
    </author>
    <date year="2024" month="January"/>
  </front>
</reference>
<reference anchor="ICANN-Board-Resolution" target="https://www.icann.org/en/board-activities-and-meetings/materials/approved-resolutions-special-meeting-of-the-icann-board-29-07-2024-en#section2.a">
  <front>
    <title>Reserving .INTERNAL for Private-Use Applications</title>
    <author >
      <organization></organization>
    </author>
    <date year="2024" month="July"/>
  </front>
</reference>


    </references>



<?line 180?>

<section numbered="false" anchor="notes-for-removal-before-publication"><name>Notes (for removal before publication)</name>

<t><list style="symbols">
  <t>I-D source is maintained at: <eref target="https://github.com/kjd/draft-davies-internal-tld">https://github.com/kjd/draft-davies-internal-tld</eref></t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

