<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-davies-internal-tld-03" category="info" submissionType="independent" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Private use top-level domain">A Top-level Domain for Private Use</title>

    <author initials="K." surname="Davies" fullname="Kim Davies">
      <organization abbrev="IANA">Internet Assigned Numbers Authority</organization>
      <address>
        <email>kim.davies@iana.org</email>
      </address>
    </author>
    <author initials="A." surname="McConachie" fullname="Andrew McConachie">
      <organization abbrev="ICANN">Internet Corporation for Assigned Names and Numbers</organization>
      <address>
        <email>andrew.mcconachie@icann.org</email>
      </address>
    </author>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>

    <date year="2025" month="March" day="03"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 53?>

<t>This document describes the "internal" top-level domain for use in
private applications.</t>



    </abstract>



  </front>

  <middle>


<?line 58?>

<section anchor="introduction"><name>Introduction</name>

<t>There are certain circumstances in which private network operators may
wish to use their own domain naming scheme that is not intended to be
used or accessible by the global domain name system (DNS), such as
within closed corporate or home networks.</t>

<t>The "internal" top-level domain provides this purpose in the DNS. Such
domains will not resolve in the global DNS, but can be configured within
closed networks as the network operator sees fit. It fulfils a similar
purpose as private-use IP address ranges that are set aside (e.g.
<xref target="RFC1918"/>).</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
<xref target="BCP14"/> when, and only when, they appear in all capitals, as shown
here.</t>

<t>This document assumes familiarity with DNS terms; please see <xref target="BCP219"/>.</t>

</section>
<section anchor="using-the-internal-namespace"><name>Using the "internal" Namespace</name>

<t>Network operators have been using different names for private-use
DNS for many years. This usage has been uncoordinated and can result
in incompatibilities or harm to Internet users. For example, an
organization might choose to use a name for this purpose that has not
been assigned to them, that would later appear in the global DNS thereby
causing name collisions and undefined behavior for users.</t>

<t>If an organization determines that it requires a private-use DNS
namespace, it should either use sub-domains of a global DNS name that is
under its organizational and operational control, or use the "internal"
top-level domain. This document does not offer guidance on when a
network operators should choose the "internal" top-level domain instead
of a sub-domain of a global DNS name. This decision will depend on
multiple factors such as network design or organizational needs, and is
outside the scope of this publication.</t>

<t>DNSSEC validating resolvers will fail to resolve names ending in
"internal".</t>

</section>
<section anchor="comparisons-to-similar-namespaces"><name>Comparisons to Similar Namespaces</name>

<t>Other namespaces are reserved for similar purposes, which superficially
may seem to serve the same purpose as the "internal" domain, but are
intended for different use cases.</t>

<t><list style="symbols">
  <t>The "local" namespace <xref target="RFC6762"/> is reserved for use with the
multicast DNS protocol. This protocol allows for resolution between
devices on a local network. This namespace does not use typical DNS
zones for name allocation, and instead uses the multicast DNS protocol
to negotiate names and resolve conflicts. It is expected "internal" will
be used for applications where names are specified in locally-configured
zones.</t>
  <t>The "alt" namespace <xref target="RFC9476"/> is reserved for contexts where
identifiers are used that may look like domain names, but do not use
the DNS protocol for resolution. This is in contrast to the "internal"
domain which is to be used with the DNS protocol, but in limited
private-use network scope.</t>
  <t>The "home.arpa" namespace <xref target="RFC8375"/> is reserved for use within
residential networks, including the Home Networking Control Protocol
<xref target="RFC7788"/>.</t>
</list></t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>The document requires no IANA actions. For the reasons stated above,
as the "internal" top-level domain is reserved from being used in the
global DNS it MUST NOT appear in the DNS root zone except to the
minimum extent necessary to enable it to function for its intended
purpose.</t>

<section anchor="domain-name-reservation-considerations"><name>Domain Name Reservation Considerations</name>

<t>(Editor note: It not yet decided if the "internal" top-level domain should
be added to the list of special-use domain names at
<eref target="https://www.iana.org/assignments/special-use-domain-names/">https://www.iana.org/assignments/special-use-domain-names/</eref>. These are
potential answers for the "Seven Questions" from <xref target="RFC6761"/>, to help
drive this discussion, and are likely to change before publication. As
suggested by Petr, these answers were lifted from <xref target="RFC6761"/>, Section 6.1.
- "Domain Name Reservation Considerations for Private Addresses" with minor
edits to e.g replace "private addresses" with "internal names". The answer to
question 5 was also rewritten.)</t>

<t><list style="numbers" type="1">
  <t>Users are free to use these names within the "internal" top-level domain
  as they would any other domain names.  However, since there is no central
  authority responsible for use of these names, users should be aware that
  these names are likely to yield different results on different networks.</t>
  <t>Application software SHOULD NOT recognize these names as special, and SHOULD
use these names as they would other domain names</t>
  <t>Name resolution APIs and libraries SHOULD NOT recognize these names as
  special and SHOULD NOT treat them differently.  Name resolution APIs SHOULD
  send queries for these names to their configured caching DNS server(s).</t>
  <t>Caching DNS servers SHOULD recognize these names as special and SHOULD NOT,
  by default, attempt to look up NS records for them, or otherwise query
  authoritative DNS servers in an attempt to resolve these names.  Instead,
  caching DNS servers SHOULD, by default, generate immediate (positive or
  negative) responses for all such queries.  This is to avoid unnecessary load
  on the root name servers and other name servers.  Caching DNS servers SHOULD
  offer a configuration option (disabled by default) to enable upstream
  resolution of such names, for use in private networks where names ending in
  ".internal" are known to be handled by an authoritative DNS server in that private
  network.</t>
  <t>Authoritative DNS servers SHOULD NOT recognize these names as special unless
explicitly configured by the administrator for names within the
"internal" namespace.</t>
  <t>DNS server operators SHOULD, if they are using names within the "internal"
  top-level domain, configure their authoritative DNS servers to act as
  authoritative for these names.</t>
  <t>DNS Registries/Registrars MUST NOT grant requests to register any of these
  names. These names are reserved for use in private networks, and fall outside
  the set of names available for allocation by registries/registrars. Attempting
  to allocate one of these names in the global DNS name will probably not work as
  desired, for reasons 4, 5 and 6 above.</t>
</list></t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>While the namespace is designated for private use, there is no guarantee
that the names utilized in this namespace will not leak into the broader
Internet. Since usage may appear in log files, email headers, and the
like; users should not rely on the confidentiality of the "internal"
namespace.</t>

<t>Users should not expect that names in the "internal" namespace are
globally unique; it is assumed that many of the same names will be used
for entirely different purposes on different networks. This is similar
to the use of the "local" namespace in the multicast DNS protocol - just
as there are many different devices named "printer.local", there may
be many different servers named "accounting.internal". Users should be
aware of this when performing operations requiring authenticity, such as
entering credentials.</t>

<t>Users should also not assume the appearance of such names is indicative
of the true source of transmissions. When diagnosing network issues, the
appearance of such addresses must be interpreted with the associated
context to ascertain the private network with which the name is being
used. A name within the "internal" namespace can never be used by itself
to identify the origin of a communication.</t>

<t>The lack of global uniqueness also has implications for HTTP cookies;
a cookie set for "accounting.internal" on one network may be sent to a
different "accounting.internal" if the user changes their local network.
This may be mitigated by adding the Secure flag to the cookie. It is
expected that Certificate Authorities will not issue certificates for
the "internal" namspace as it does not resolve in the global DNS. If an
organization wants to use HTTP over TLS with names in the "internal"
namespace, they will also need an internal, private CA. The details of
this are outside the scope of this document.</t>

</section>
<section anchor="additional-information"><name>Additional Information</name>

<t>This reservation is the result of a community deliberation on this
topic over many years, most notably <xref target="SAC113"/>. The SAC113 advisory
recommended the establishment of a single top-level domain for
private-use applications. This top-level domain would not be delegated
in the DNS root zone to ensure it is not resolvable in contexts outside
of a private network.</t>

<t>A selection process <xref target="IANA-Assessment"/> determined "internal" was
the best suited string given the requirement that a single string be
selected for this purpose, and subsequently reserved for this purpose in
July 2024. <xref target="ICANN-Board-Resolution"/></t>

</section>


  </middle>

  <back>




    <references title='Informative References' anchor="sec-informative-references">



<referencegroup anchor="BCP14" target="https://www.rfc-editor.org/info/bcp14">
  <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
    <front>
      <title>Key words for use in RFCs to Indicate Requirement Levels</title>
      <author fullname="S. Bradner" initials="S." surname="Bradner"/>
      <date month="March" year="1997"/>
      <abstract>
        <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
      </abstract>
    </front>
    <seriesInfo name="BCP" value="14"/>
    <seriesInfo name="RFC" value="2119"/>
    <seriesInfo name="DOI" value="10.17487/RFC2119"/>
  </reference>
  <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
    <front>
      <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
      <author fullname="B. Leiba" initials="B." surname="Leiba"/>
      <date month="May" year="2017"/>
      <abstract>
        <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
      </abstract>
    </front>
    <seriesInfo name="BCP" value="14"/>
    <seriesInfo name="RFC" value="8174"/>
    <seriesInfo name="DOI" value="10.17487/RFC8174"/>
  </reference>
</referencegroup>

<referencegroup anchor="BCP219" target="https://www.rfc-editor.org/info/bcp219">
  <reference anchor="RFC9499" target="https://www.rfc-editor.org/info/rfc9499">
    <front>
      <title>DNS Terminology</title>
      <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
      <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
      <date month="March" year="2024"/>
      <abstract>
        <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
        <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
      </abstract>
    </front>
    <seriesInfo name="BCP" value="219"/>
    <seriesInfo name="RFC" value="9499"/>
    <seriesInfo name="DOI" value="10.17487/RFC9499"/>
  </reference>
</referencegroup>

<reference anchor="RFC1918">
  <front>
    <title>Address Allocation for Private Internets</title>
    <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
    <author fullname="B. Moskowitz" initials="B." surname="Moskowitz"/>
    <author fullname="D. Karrenberg" initials="D." surname="Karrenberg"/>
    <author fullname="G. J. de Groot" initials="G. J." surname="de Groot"/>
    <author fullname="E. Lear" initials="E." surname="Lear"/>
    <date month="February" year="1996"/>
    <abstract>
      <t>This document describes address allocation for private internets. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="5"/>
  <seriesInfo name="RFC" value="1918"/>
  <seriesInfo name="DOI" value="10.17487/RFC1918"/>
</reference>

<reference anchor="RFC6761">
  <front>
    <title>Special-Use Domain Names</title>
    <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
    <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
    <date month="February" year="2013"/>
    <abstract>
      <t>This document describes what it means to say that a Domain Name (DNS name) is reserved for special use, when reserving such a name is appropriate, and the procedure for doing so. It establishes an IANA registry for such domain names, and seeds it with entries for some of the already established special domain names.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6761"/>
  <seriesInfo name="DOI" value="10.17487/RFC6761"/>
</reference>

<reference anchor="RFC6762">
  <front>
    <title>Multicast DNS</title>
    <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
    <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
    <date month="February" year="2013"/>
    <abstract>
      <t>As networked devices become smaller, more portable, and more ubiquitous, the ability to operate with less configured infrastructure is increasingly important. In particular, the ability to look up DNS resource record data types (including, but not limited to, host names) in the absence of a conventional managed DNS server is useful.</t>
      <t>Multicast DNS (mDNS) provides the ability to perform DNS-like operations on the local link in the absence of any conventional Unicast DNS server. In addition, Multicast DNS designates a portion of the DNS namespace to be free for local use, without the need to pay any annual fee, and without the need to set up delegations or otherwise configure a conventional DNS server to answer for those names.</t>
      <t>The primary benefits of Multicast DNS names are that (i) they require little or no administration or configuration to set them up, (ii) they work when no infrastructure is present, and (iii) they work during infrastructure failures.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6762"/>
  <seriesInfo name="DOI" value="10.17487/RFC6762"/>
</reference>

<reference anchor="RFC7788">
  <front>
    <title>Home Networking Control Protocol</title>
    <author fullname="M. Stenberg" initials="M." surname="Stenberg"/>
    <author fullname="S. Barth" initials="S." surname="Barth"/>
    <author fullname="P. Pfister" initials="P." surname="Pfister"/>
    <date month="April" year="2016"/>
    <abstract>
      <t>This document describes the Home Networking Control Protocol (HNCP), an extensible configuration protocol, and a set of requirements for home network devices. HNCP is described as a profile of and extension to the Distributed Node Consensus Protocol (DNCP). HNCP enables discovery of network borders, automated configuration of addresses, name resolution, service discovery, and the use of any routing protocol that supports routing based on both the source and destination address.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7788"/>
  <seriesInfo name="DOI" value="10.17487/RFC7788"/>
</reference>

<reference anchor="RFC8375">
  <front>
    <title>Special-Use Domain 'home.arpa.'</title>
    <author fullname="P. Pfister" initials="P." surname="Pfister"/>
    <author fullname="T. Lemon" initials="T." surname="Lemon"/>
    <date month="May" year="2018"/>
    <abstract>
      <t>This document specifies the behavior that is expected from the Domain Name System with regard to DNS queries for names ending with '.home.arpa.' and designates this domain as a special-use domain name. 'home.arpa.' is designated for non-unique use in residential home networks. The Home Networking Control Protocol (HNCP) is updated to use the 'home.arpa.' domain instead of '.home'.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8375"/>
  <seriesInfo name="DOI" value="10.17487/RFC8375"/>
</reference>

<reference anchor="RFC9476">
  <front>
    <title>The .alt Special-Use Top-Level Domain</title>
    <author fullname="W. Kumari" initials="W." surname="Kumari"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>This document reserves a Top-Level Domain (TLD) label "alt" to be used in non-DNS contexts. It also provides advice and guidance to developers creating alternative namespaces.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9476"/>
  <seriesInfo name="DOI" value="10.17487/RFC9476"/>
</reference>


<reference anchor="SAC113" target="https://itp.cdn.icann.org/en/files/security-and-stability-advisory-committee-ssac-reports/sac-113-en.pdf">
  <front>
    <title>SSAC Advisory on Private-Use TLDs</title>
    <author >
      <organization></organization>
    </author>
    <date year="2020" month="September"/>
  </front>
</reference>
<reference anchor="IANA-Assessment" target="https://itp.cdn.icann.org/en/files/root-system/identification-tld-private-use-24-01-2024-en.pdf">
  <front>
    <title>Identification of a top-level domain for private use</title>
    <author >
      <organization></organization>
    </author>
    <date year="2024" month="January"/>
  </front>
</reference>
<reference anchor="ICANN-Board-Resolution" target="https://www.icann.org/en/board-activities-and-meetings/materials/approved-resolutions-special-meeting-of-the-icann-board-29-07-2024-en#section2.a">
  <front>
    <title>Reserving .INTERNAL for Private-Use Applications</title>
    <author >
      <organization></organization>
    </author>
    <date year="2024" month="July"/>
  </front>
</reference>


    </references>



<?line 233?>

<section numbered="false" anchor="notes-for-removal-before-publication"><name>Notes (for removal before publication)</name>

<t><list style="symbols">
  <t>I-D source is maintained at: <eref target="https://github.com/kjd/draft-davies-internal-tld">https://github.com/kjd/draft-davies-internal-tld</eref></t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

