<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-davies-internal-tld-06" category="info" submissionType="independent" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Private use top-level domain">A Top-level Domain for Private Use</title>

    <author initials="K." surname="Davies" fullname="Kim Davies">
      <organization abbrev="IANA">Internet Assigned Numbers Authority</organization>
      <address>
        <email>kim.davies@iana.org</email>
      </address>
    </author>
    <author initials="A." surname="McConachie" fullname="Andrew McConachie">
      <organization abbrev="ICANN">Internet Corporation for Assigned Names and Numbers</organization>
      <address>
        <email>andrew.mcconachie@icann.org</email>
      </address>
    </author>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>

    <date year="2026" month="May" day="06"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 50?>

<t>This document describes the "internal" top-level domain for use in
private applications.</t>



    </abstract>



  </front>

  <middle>


<?line 55?>

<section anchor="introduction"><name>Introduction</name>

<t>There are situations in which private network operators may
wish to use their own domain naming scheme that is not intended to be
used or accessible by the global domain name system (DNS), such as
within corporate or home networks.</t>

<t>The "internal" top-level domain (TLD) is specifically designated for this
purpose. Domains under this TLD are not resolvable in the global DNS but can be
configured and utilized within private networks according to the operator's
requirements. This concept is analogous to private-use IP address ranges (e.g.,
<xref target="RFC1918"/>), providing a similar function within the DNS ecosystem.</t>

</section>
<section anchor="using-the-internal-namespace"><name>Using the "internal" Namespace</name>

<t>Network operators have long relied on various unregistered names for
private-use DNS, often in an uncoordinated manner. This practice can lead to
incompatibilities and unintended consequences for Internet users. For instance,
an organization might adopt a name for internal use that is later introduced
into the global DNS, resulting in name collisions and unpredictable behavior.</t>

<t>In almost all cases, an entity should use a sub-domain of a global DNS
name that it controls. This ensures that names are globally unique
and avoids the potential for confusion that may arise from the use of
private-use namespaces. However, in some cases, such as for isolated
networks that will never be connected to the global Internet, use of the
"internal" top-level domain may be appropriate.</t>

<t>Entities choosing to do so should be cognizant of the implications of this
decision, including:</t>

<t><list style="numbers" type="1">
  <t>The potential for collisions if multiple networks using "internal" are
interconnected in the future.</t>
  <t>The risk of leakage of "internal" names into the global DNS.</t>
  <t>The lack of global uniqueness of "internal" names.</t>
  <t>DNSSEC validating resolvers relying on the global DNS trust anchor will fail
to resolve names ending in "internal".</t>
</list></t>

</section>
<section anchor="comparisons-to-similar-namespaces"><name>Comparisons to Similar Namespaces</name>

<t>Other namespaces are reserved for similar purposes, which superficially may
seem to serve the same purpose as the "internal" domain, but are intended for
different use cases.</t>

<t><list style="symbols">
  <t>The "local" namespace <xref target="RFC6762"/> is reserved for use with the multicast DNS
protocol. This protocol allows for resolution between devices on a local
network. This namespace does not use typical DNS zones for name allocation,
and instead uses the multicast DNS protocol to negotiate names and resolve
conflicts. It is expected "internal" will be used for applications where
names are specified in locally-configured zones.</t>
  <t>The "alt" namespace <xref target="RFC9476"/> is reserved for contexts where identifiers
are used that may look like domain names, but do not use the DNS protocol for
resolution. This is in contrast to the "internal" domain which is to be used
with the DNS protocol, but in limited private-use network scope.</t>
  <t>The "home.arpa" namespace <xref target="RFC8375"/> is reserved for use within residential
networks, including with the Home Networking Control Protocol <xref target="RFC7788"/>.</t>
</list></t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>The document requires no IANA actions. For the reasons stated above, the
"internal" top-level domain is reserved from being used in the global DNS.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>While the "internal" namespace is designated for private use, it is important
to recognize its limitations and potential risks:</t>

<t><list style="numbers" type="1">
  <t><strong>Leakage into the broader Internet</strong>: Names within the "internal" namespace
may inadvertently appear in log files, email headers, or other contexts,
leading to potential exposure. Users should not rely on the confidentiality
of these names.</t>
  <t><strong>Lack of global uniqueness</strong>: Names in the "internal" namespace are not
globally unique. For example, multiple networks may use the same name, such
as "accounting.internal," for entirely different purposes. This is similar
to the use of the "local" namespace in multicast DNS, where many devices
might share the name "printer.local." Users should exercise caution when
performing operations that require authenticity, such as entering
credentials.</t>
  <t><strong>Collision risks</strong>: If two networks using the "internal" namespace are
interconnected, name collisions may occur. This is analogous to IP address
conflicts when private-use IP ranges (e.g., <xref target="RFC1918"/>) are interconnected.
Organizations should carefully evaluate this risk before adopting the
"internal" namespace.</t>
  <t><strong>DNSSEC limitations</strong>: DNSSEC-validating resolvers that rely on the global
DNS trust anchor will fail to resolve names ending in "internal." This
limitation should be considered when planning network configurations.</t>
  <t><strong>Implications for HTTP cookies</strong>: Cookies set for a domain like
"accounting.internal" on one network may be sent to a different
"accounting.internal" if the user switches networks. To mitigate this,
organizations can use the Secure flag for cookies. Additionally, since the
"internal" namespace does not resolve in the global DNS, Certificate
Authorities are not expected to issue certificates for it. Organizations
requiring HTTPS for "internal" domains will need to establish their own
private Certificate Authority (CA), which is beyond the scope of this
document.</t>
  <t><strong>Impacts on traceability</strong>: Users should also not assume the appearance of such
names is indicative of the true source of transmissions. When diagnosing
network issues, the appearance of such addresses must be interpreted with
the associated context to ascertain the private network with which the name
is being used. A name within the "internal" namespace can never be used by
itself to identify the origin of a communication.</t>
</list></t>

</section>
<section anchor="additional-information"><name>Additional Information</name>

<t>This reservation is the result of a community deliberation on this
topic over many years, most notably <xref target="SAC113"/>. The SAC113 advisory
recommended the establishment of a single top-level domain for
private-use applications. DNS records within this top-level domain
will not be resolvable in contexts outside of a private network.</t>

<t>A selection process <xref target="IANA-Assessment"/> determined "internal" was
the best suited string given the requirement that a single string be
selected for this purpose, and subsequently reserved for this purpose in
July 2024. <xref target="ICANN-Board-Resolution"/></t>

</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors would like to thank the members of the Internet community
who participated in the discussions that led to the establishment of
the "internal" top-level domain, including those who contributed to the
SAC113 advisory and the IANA assessment process.</t>

<t>The authors would especially like to thank Eliot Lear for extensive
discussion and feedback on this document. Additional feedback and
suggestions were received from Joe Abley, Mark Andrews, Wes Hardakerm
Paul Hoffman, Philip Homburg, David Lawrence, John Levine, Benno
Overeinder, Petr Špaček, Ondrej Surý, Peter Thomassen and Suzanne
Woolf.</t>

</section>


  </middle>

  <back>




    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC1918">
  <front>
    <title>Address Allocation for Private Internets</title>
    <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
    <author fullname="B. Moskowitz" initials="B." surname="Moskowitz"/>
    <author fullname="D. Karrenberg" initials="D." surname="Karrenberg"/>
    <author fullname="G. J. de Groot" initials="G. J." surname="de Groot"/>
    <author fullname="E. Lear" initials="E." surname="Lear"/>
    <date month="February" year="1996"/>
    <abstract>
      <t>This document describes address allocation for private internets. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="5"/>
  <seriesInfo name="RFC" value="1918"/>
  <seriesInfo name="DOI" value="10.17487/RFC1918"/>
</reference>
<reference anchor="RFC6762">
  <front>
    <title>Multicast DNS</title>
    <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
    <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
    <date month="February" year="2013"/>
    <abstract>
      <t>As networked devices become smaller, more portable, and more ubiquitous, the ability to operate with less configured infrastructure is increasingly important. In particular, the ability to look up DNS resource record data types (including, but not limited to, host names) in the absence of a conventional managed DNS server is useful.</t>
      <t>Multicast DNS (mDNS) provides the ability to perform DNS-like operations on the local link in the absence of any conventional Unicast DNS server. In addition, Multicast DNS designates a portion of the DNS namespace to be free for local use, without the need to pay any annual fee, and without the need to set up delegations or otherwise configure a conventional DNS server to answer for those names.</t>
      <t>The primary benefits of Multicast DNS names are that (i) they require little or no administration or configuration to set them up, (ii) they work when no infrastructure is present, and (iii) they work during infrastructure failures.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6762"/>
  <seriesInfo name="DOI" value="10.17487/RFC6762"/>
</reference>
<reference anchor="RFC7788">
  <front>
    <title>Home Networking Control Protocol</title>
    <author fullname="M. Stenberg" initials="M." surname="Stenberg"/>
    <author fullname="S. Barth" initials="S." surname="Barth"/>
    <author fullname="P. Pfister" initials="P." surname="Pfister"/>
    <date month="April" year="2016"/>
    <abstract>
      <t>This document describes the Home Networking Control Protocol (HNCP), an extensible configuration protocol, and a set of requirements for home network devices. HNCP is described as a profile of and extension to the Distributed Node Consensus Protocol (DNCP). HNCP enables discovery of network borders, automated configuration of addresses, name resolution, service discovery, and the use of any routing protocol that supports routing based on both the source and destination address.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7788"/>
  <seriesInfo name="DOI" value="10.17487/RFC7788"/>
</reference>
<reference anchor="RFC8375">
  <front>
    <title>Special-Use Domain 'home.arpa.'</title>
    <author fullname="P. Pfister" initials="P." surname="Pfister"/>
    <author fullname="T. Lemon" initials="T." surname="Lemon"/>
    <date month="May" year="2018"/>
    <abstract>
      <t>This document specifies the behavior that is expected from the Domain Name System with regard to DNS queries for names ending with '.home.arpa.' and designates this domain as a special-use domain name. 'home.arpa.' is designated for non-unique use in residential home networks. The Home Networking Control Protocol (HNCP) is updated to use the 'home.arpa.' domain instead of '.home'.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8375"/>
  <seriesInfo name="DOI" value="10.17487/RFC8375"/>
</reference>
<reference anchor="RFC9476">
  <front>
    <title>The .alt Special-Use Top-Level Domain</title>
    <author fullname="W. Kumari" initials="W." surname="Kumari"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>This document reserves a Top-Level Domain (TLD) label "alt" to be used in non-DNS contexts. It also provides advice and guidance to developers creating alternative namespaces.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9476"/>
  <seriesInfo name="DOI" value="10.17487/RFC9476"/>
</reference>

<reference anchor="SAC113" target="https://itp.cdn.icann.org/en/files/security-and-stability-advisory-committee-ssac-reports/sac-113-en.pdf">
  <front>
    <title>SSAC Advisory on Private-Use TLDs</title>
    <author >
      <organization></organization>
    </author>
    <date year="2020" month="September"/>
  </front>
</reference>
<reference anchor="IANA-Assessment" target="https://itp.cdn.icann.org/en/files/root-system/identification-tld-private-use-24-01-2024-en.pdf">
  <front>
    <title>Identification of a top-level domain for private use</title>
    <author >
      <organization></organization>
    </author>
    <date year="2024" month="January"/>
  </front>
</reference>
<reference anchor="ICANN-Board-Resolution" target="https://www.icann.org/en/board-activities-and-meetings/materials/approved-resolutions-special-meeting-of-the-icann-board-29-07-2024-en#section2.a">
  <front>
    <title>Reserving .INTERNAL for Private-Use Applications</title>
    <author >
      <organization></organization>
    </author>
    <date year="2024" month="July"/>
  </front>
</reference>


    </references>



<?line 193?>

<section numbered="false" anchor="notes-for-removal-before-publication"><name>Notes (for removal before publication)</name>

<t><list style="symbols">
  <t>I-D source is maintained at: <eref target="https://github.com/kjd/draft-davies-internal-tld">https://github.com/kjd/draft-davies-internal-tld</eref></t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

