1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
|
Internet Engineering Task Force (IETF) J. Klensin
Request for Comments: 5890 August 2010
Obsoletes: 3490
Category: Standards Track
ISSN: 2070-1721
Internationalized Domain Names for Applications (IDNA):
Definitions and Document Framework
Abstract
This document is one of a collection that, together, describe the
protocol and usage context for a revision of Internationalized Domain
Names for Applications (IDNA), superseding the earlier version. It
describes the document collection and provides definitions and other
material that are common to the set.
Status of This Memo
This is an Internet Standards Track document.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Further information on
Internet Standards is available in Section 2 of RFC 5741.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc5890.
Klensin Standards Track [Page 1]
^L
RFC 5890 IDNA Definitions August 2010
Copyright Notice
Copyright (c) 2010 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
This document may contain material from IETF Documents or IETF
Contributions published or made publicly available before November
10, 2008. The person(s) controlling the copyright in some of this
material may not have granted the IETF Trust the right to allow
modifications of such material outside the IETF Standards Process.
Without obtaining an adequate license from the person(s) controlling
the copyright in such materials, this document may not be modified
outside the IETF Standards Process, and derivative works of it may
not be created outside the IETF Standards Process, except to format
it for publication as an RFC or to translate it into languages other
than English.
Klensin Standards Track [Page 2]
^L
RFC 5890 IDNA Definitions August 2010
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1. IDNA2008 . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1.1. Audiences . . . . . . . . . . . . . . . . . . . . . . 4
1.1.2. Normative Language . . . . . . . . . . . . . . . . . . 5
1.2. Road Map of IDNA2008 Documents . . . . . . . . . . . . . . 5
2. Definitions and Terminology . . . . . . . . . . . . . . . . . 6
2.1. Characters and Character Sets . . . . . . . . . . . . . . 6
2.2. DNS-Related Terminology . . . . . . . . . . . . . . . . . 6
2.3. Terminology Specific to IDNA . . . . . . . . . . . . . . . 7
2.3.1. LDH Label . . . . . . . . . . . . . . . . . . . . . . 7
2.3.2. Terms for IDN Label Codings . . . . . . . . . . . . . 11
2.3.2.1. IDNA-valid strings, A-label, and U-label . . . . . 11
2.3.2.2. NR-LDH Label . . . . . . . . . . . . . . . . . . . 13
2.3.2.3. Internationalized Domain Name and
Internationalized Label . . . . . . . . . . . . . 13
2.3.2.4. Label Equivalence . . . . . . . . . . . . . . . . 14
2.3.2.5. ACE Prefix . . . . . . . . . . . . . . . . . . . . 14
2.3.2.6. Domain Name Slot . . . . . . . . . . . . . . . . . 14
2.3.3. Order of Characters in Labels . . . . . . . . . . . . 15
2.3.4. Punycode is an Algorithm, Not a Name or Adjective . . 15
3. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 16
4. Security Considerations . . . . . . . . . . . . . . . . . . . 16
4.1. General Issues . . . . . . . . . . . . . . . . . . . . . . 16
4.2. U-label Lengths . . . . . . . . . . . . . . . . . . . . . 16
4.3. Local Character Set Issues . . . . . . . . . . . . . . . . 17
4.4. Visually Similar Characters . . . . . . . . . . . . . . . 17
4.5. IDNA Lookup, Registration, and the Base DNS
Specifications . . . . . . . . . . . . . . . . . . . . . . 18
4.6. Legacy IDN Label Strings . . . . . . . . . . . . . . . . . 18
4.7. Security Differences from IDNA2003 . . . . . . . . . . . . 19
4.8. Summary . . . . . . . . . . . . . . . . . . . . . . . . . 20
5. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 20
6. References . . . . . . . . . . . . . . . . . . . . . . . . . . 20
6.1. Normative References . . . . . . . . . . . . . . . . . . . 20
6.2. Informative References . . . . . . . . . . . . . . . . . . 21
Klensin Standards Track [Page 3]
^L
RFC 5890 IDNA Definitions August 2010
1. Introduction
1.1. IDNA2008
This document is one of a collection that, together, describe the
protocol and usage context for a revision of Internationalized Domain
Names for Applications (IDNA) that was largely completed in 2008,
known within the series and elsewhere as "IDNA2008". The series
replaces an earlier version of IDNA [RFC3490] [RFC3491]. For
convenience, that version of IDNA is referred to in these documents
as "IDNA2003". The newer version continues to use the Punycode
algorithm [RFC3492] and ACE (ASCII-compatible encoding) prefix from
that earlier version. The document collection is described in
Section 1.2. As indicated there, this document provides definitions
and other material that are common to the set.
1.1.1. Audiences
While many IETF specifications are directed exclusively to protocol
implementers, the character of IDNA requires that it be understood
and properly used by those whose responsibilities include making
decisions about:
o what names are permitted in DNS zone files,
o policies related to names and naming, and
o the handling of domain name strings in files and systems, even
with no immediate intention of looking them up.
This document and those documents concerned with the protocol
definition, rules for handling strings that include characters
written right to left, and the actual list of characters and
categories will be of primary interest to protocol implementers.
This document and the one containing explanatory material will be of
primary interest to others, although they may have to fill in some
details by reference to other documents in the set.
This document and the associated ones are written from the
perspective of an IDNA-aware user, application, or implementation.
While they may reiterate fundamental DNS rules and requirements for
the convenience of the reader, they make no attempt to be
comprehensive about DNS principles and should not be considered as a
substitute for a thorough understanding of the DNS protocols and
specifications.
Klensin Standards Track [Page 4]
^L
RFC 5890 IDNA Definitions August 2010
1.1.2. Normative Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
1.2. Road Map of IDNA2008 Documents
IDNA2008 consists of the following documents:
o This document, containing definitions and other material that are
needed for understanding other documents in the set. It is
referred to informally in other documents in the set as "Defs" or
"Definitions".
o A document, RFC 5894 [RFC5894], that provides an overview of the
protocol and associated tables together with explanatory material
and some rationale for the decisions that led to IDNA2008. That
document also contains advice for registry operations and those
who use Internationalized Domain Names (IDNs). It is referred to
informally in other documents in the set as "Rationale". It is
not normative.
o A document, RFC 5891 [RFC5891], that describes the core IDNA2008
protocol and its operations. In combination with the Bidi
document, described immediately below, it explicitly updates and
replaces RFC 3490. It is referred to informally in other
documents in the set as "Protocol".
o A document, RFC 5893 [RFC5893], that specifies special rules
(Bidi) for labels that contain characters that are written from
right to left.
o A specification, RFC 5892 [RFC5892], of the categories and rules
that identify the code points allowed in a label written in native
character form (defined more specifically as a "U-label" in
Section 2.3.2.1 below), based on Unicode 5.2 [Unicode52] code
point assignments and additional rules unique to IDNA2008. The
Unicode-based rules are expected to be stable across Unicode
updates and hence independent of Unicode versions. That
specification obsoletes RFC 3941 and IDN use of the tables to
which it refers. It is referred to informally in other documents
in the set as "Tables".
Klensin Standards Track [Page 5]
^L
RFC 5890 IDNA Definitions August 2010
o A document [IDNA2008-Mapping] that discusses the issue of mapping
characters into other characters and that provides guidance for
doing so when that is appropriate. That document, referred to
informally as "Mapping", provides advice; it is not a required
part of IDNA.
2. Definitions and Terminology
2.1. Characters and Character Sets
A code point is an integer value in the codespace of a coded
character set. In Unicode, these are integers from 0 to 0x10FFFF.
Unicode [Unicode52] is a coded character set containing somewhat over
100,000 characters assigned to code points as of version 5.2. A
single Unicode code point is denoted in these documents by "U+"
followed by four to six hexadecimal digits, while a range of Unicode
code points is denoted by two four to six digit hexadecimal numbers
separated by "..", with no prefixes.
ASCII means US-ASCII [ASCII], a coded character set containing 128
characters associated with code points in the range 0000..007F.
Unicode is a superset of ASCII and may be thought of as a
generalization of it; it includes all the ASCII characters and
associates them with the equivalent code points.
"Letters" are, informally, generalizations from the ASCII and
common-sense understanding of that term, i.e., characters that are
used to write text and that are not digits, symbols, or punctuation.
Formally, they are characters with a Unicode General Category value
starting in "L" (see Section 4.5 of The Unicode Standard
[Unicode52]).
2.2. DNS-Related Terminology
When discussing the DNS, this document generally assumes the
terminology used in the DNS specifications [RFC1034] [RFC1035] as
subsequently modified [RFC1123] [RFC2181]. The term "lookup" is used
to describe the combination of operations performed by the IDNA2008
protocol and those actually performed by a DNS resolver. The process
of placing an entry into the DNS is referred to as "registration".
This is similar to common contemporary usage of that term in other
contexts. Consequently, any DNS zone administration is described as
a "registry", and the terms "registry" and "zone administrator" are
used interchangeably, regardless of the actual administrative
arrangements or level in the DNS tree. More details about that
relationship are included in the Rationale document.
Klensin Standards Track [Page 6]
^L
RFC 5890 IDNA Definitions August 2010
The term "LDH code point" is defined in this document to refer to the
code points associated with ASCII letters (Unicode code points
0041..005A and 0061..007A), digits (0030..0039), and the hyphen-minus
(U+002D). "LDH" is an abbreviation for "letters, digits, hyphen" but
is used specifically in this document to refer to the set of naming
rules described in Section 2.3.1 below.
The base DNS specifications [RFC1034] [RFC1035] discuss "domain
names" and "hostnames", but many people use the terms
interchangeably, as do sections of these specifications. Lack of
clarity about that terminology has contributed to confusion about
intent in some cases. These documents generally use the term "domain
name". When they refer to, e.g., hostname syntax restrictions, they
explicitly cite the relevant defining documents. The remaining
definitions in this subsection are essentially a review: if there is
any perceived difference between those definitions and the
definitions in the base DNS documents or those cited below, the
definitions in the other documents take precedence.
A label is an individual component of a domain name. Labels are
usually shown separated by dots; for example, the domain name
"www.example.com" is composed of three labels: "www", "example", and
"com". (The complete name convention using a trailing dot described
in RFC 1123 [RFC1123], which can be explicit as in "www.example.com."
or implicit as in "www.example.com", is not considered in this
specification.) IDNA extends the set of usable characters in labels
that are treated as text (as distinct from the binary string labels
discussed in RFC 1035 and RFC 2181 [RFC2181] and bitstring ones
[RFC2673]), but only in certain contexts. The different contexts for
different sets of usable characters are outlined in the next section.
For the rest of this document and in the related ones, the term
"label" is shorthand for "text label", and "every label" means "every
text label", including the expanded context.
2.3. Terminology Specific to IDNA
This section defines some terminology to reduce dependence on terms
and definitions that have been problematic in the past. The
relationships among these definitions are illustrated in Figure 1 and
Figure 2. In the first of those figures, the parenthesized numbers
refer to the notes below the figure.
2.3.1. LDH Label
This is the classical label form used, albeit with some additional
restrictions, in hostnames [RFC0952]. Its syntax is identical to
that described as the "preferred name syntax" in Section 3.5 of RFC
1034 [RFC1034] as modified by RFC 1123 [RFC1123]. Briefly, it is a
Klensin Standards Track [Page 7]
^L
RFC 5890 IDNA Definitions August 2010
string consisting of ASCII letters, digits, and the hyphen with the
further restriction that the hyphen cannot appear at the beginning or
end of the string. Like all DNS labels, its total length must not
exceed 63 octets.
LDH labels include the specialized labels used by IDNA (described as
"A-labels" below) and some additional restricted forms (also
described below).
To facilitate clear description, two new subsets of LDH labels are
created by the introduction of IDNA. These are called Reserved LDH
labels (R-LDH labels) and Non-Reserved LDH labels (NR-LDH labels).
Reserved LDH labels, known as "tagged domain names" in some other
contexts, have the property that they contain "--" in the third and
fourth characters but which otherwise conform to LDH label rules.
Only a subset of the R-LDH labels can be used in IDNA-aware
applications. That subset consists of the class of labels that begin
with the prefix "xn--" (case independent), but otherwise conform to
the rules for LDH labels. That subset is called "XN-labels" in this
set of documents. XN-labels are further divided into those whose
remaining characters (after the "xn--") are valid output of the
Punycode algorithm [RFC3492] and those that are not (see below). The
XN-labels that are valid Punycode output are known as "A-labels" if
they also meet the other criteria for IDNA-validity described below.
Because LDH labels (and, indeed, any DNS label) must not be more than
63 octets in length, the portion of an XN-label derived from the
Punycode algorithm is limited to no more than 59 ASCII characters.
Non-Reserved LDH labels are the set of valid LDH labels that do not
have "--" in the third and fourth positions.
A consequence of the restrictions on valid characters in the native
Unicode character form (see U-labels) turns out to be that mixed-case
annotation, of the sort outlined in Appendix A of RFC 3492 [RFC3492],
is never useful. Therefore, since a valid A-label is the result of
Punycode encoding of a U-label, A-labels should be produced only in
lowercase, despite matching other (mixed-case or uppercase) potential
labels in the DNS.
Some strings that are prefixed with "xn--" to form labels may not be
the output of the Punycode algorithm, may fail the other tests
outlined below, or may violate other IDNA restrictions and thus are
also not valid IDNA labels. They are called "Fake A-labels" for
convenience.
Labels within the class of R-LDH labels that are not prefixed with
"xn--" are also not valid IDNA labels. To allow for future use of
mechanisms similar to IDNA, those labels MUST NOT be processed as
Klensin Standards Track [Page 8]
^L
RFC 5890 IDNA Definitions August 2010
ordinary LDH labels by IDNA-conforming programs and SHOULD NOT be
mixed with IDNA labels in the same zone.
These distinctions among possible LDH labels are only of significance
for software that is IDNA-aware or for future extensions that use
extensions based on the same "prefix and encoding" model. For
IDNA-aware systems, the valid label types are: A-labels, U-labels,
and NR-LDH labels.
IDNA labels come in two flavors: an ACE-encoded form and a Unicode
(native character) form. These are referred to as A-labels and
U-labels, respectively, and are described in detail in the next
section.
Klensin Standards Track [Page 9]
^L
RFC 5890 IDNA Definitions August 2010
ASCII Label
__________________________________________________________________
| |
| ____________________ LDH Label (1) (4) ________________ |
| | ___________________________________ | |
| | |IDN Reserved LDH Labels | | |
| | | ("??--") or R-LDH Labels | _______________ | |
| | | _______________________________ | |NON-RESERVED | | |
| | | | XN-labels | | | LDH Labels | | |
| | | | _____________ ___________ | | | (NR-LDH | | |
| | | | | A-labels | | Fake (3) || | | labels) | | |
| | | | | "xn--"(2) | | A-labels || | |_____________| | |
| | | | |___________| |__________|| | | |
| | | |_____________________________| | | |
| | |_________________________________| | |
| |_______________________________________________________| |
| |
| _____________NON-LDH label________ |
| | ______________________ | |
| | | Underscore labels | | |
| | | e.g., _tcp | | |
| | |____________________| | |
| | | Labels with leading| | |
| | | or trailing | | |
| | | hyphens "-abcd" | | |
| | | or "xyz-" | | |
| | | or "-uvw-" | | |
| | |____________________| | |
| | | Labels with other | | |
| | | non-LDH ASCII chars| | |
| | | e.g., #$%_ | | |
| | |____________________| | |
| |________________________________| |
|________________________________________________________________|
(1) ASCII letters (uppercase and lowercase), digits,
hyphen. Hyphen may not appear in first or last
position. No more than 63 octets.
(2) Note that the string following "xn--" must
be the valid output of the Punycode algorithm
and must be convertible into valid U-label form.
(3) Note that a Fake A-label has a prefix "xn--"
but the remainder of the label is NOT the valid
output of the Punycode algorithm.
(4) LDH label subtypes are indistinguishable to
applications that are not IDNA-aware.
Figure 1: IDNA and Related DNS Terminology Space -- ASCII Labels
Klensin Standards Track [Page 10]
^L
RFC 5890 IDNA Definitions August 2010
__________________________
| Non-ASCII |
| |
| ___________________ |
| | U-label (5) | |
| |_________________| |
| | | |
| | Binary Label | |
| | (including | |
| | high bit on) | |
| |_________________| |
| | | |
| | Bit String | |
| | Label | |
| |_________________| |
|________________________|
(5) To applications that are not IDNA-aware, U-labels
are indistinguishable from Binary ones.
Figure 2: Non-ASCII Labels
2.3.2. Terms for IDN Label Codings
2.3.2.1. IDNA-valid strings, A-label, and U-label
For IDNA-aware applications, the three types of valid labels are
"A-labels", "U-labels", and "NR-LDH labels", each of which is defined
below. The relationships among them are illustrated in Figure 1 and
Figure 2.
o A string is "IDNA-valid" if it meets all of the requirements of
these specifications for an IDNA label. IDNA-valid strings may
appear in either of the two forms defined immediately below, or
may be drawn from the NR-LDH label subset. IDNA-valid strings
must also conform to all basic DNS requirements for labels. These
documents make specific reference to the form appropriate to any
context in which the distinction is important.
o An "A-label" is the ASCII-Compatible Encoding (ACE, see
Section 2.3.2.5) form of an IDNA-valid string. It must be a
complete label: IDNA is defined for labels, not for parts of them
and not for complete domain names. This means, by definition,
that every A-label will begin with the IDNA ACE prefix, "xn--"
(see Section 2.3.2.5), followed by a string that is a valid output
of the Punycode algorithm [RFC3492] and hence a maximum of 59
ASCII characters in length. The prefix and string together must
conform to all requirements for a label that can be stored in the
Klensin Standards Track [Page 11]
^L
RFC 5890 IDNA Definitions August 2010
DNS including conformance to the rules for LDH labels
(Section 2.3.1). If and only if a string meeting the above
requirements can be decoded into a U-label is it an A-label.
o A "U-label" is an IDNA-valid string of Unicode characters, in
Normalization Form C (NFC) and including at least one non-ASCII
character, expressed in a standard Unicode Encoding Form (such as
UTF-8). It is also subject to the constraints about permitted
characters that are specified in Section 4.2 of the Protocol
document and the rules in the Sections 2 and 3 of the Tables
document, the Bidi constraints in that document if it contains any
character from scripts that are written right to left, and the
symmetry constraint described immediately below. Conversions
between U-labels and A-labels are performed according to the
"Punycode" specification [RFC3492], adding or removing the ACE
prefix as needed.
To be valid, U-labels and A-labels must obey an important symmetry
constraint. While that constraint may be tested in any of several
ways, an A-label A1 must be capable of being produced by conversion
from a U-label U1, and that U-label U1 must be capable of being
produced by conversion from A-label A1. Among other things, this
implies that both U-labels and A-labels must be strings in Unicode
NFC [Unicode-UAX15] normalized form. These strings MUST contain only
characters specified elsewhere in this document series, and only in
the contexts indicated as appropriate.
Any rules or conventions that apply to DNS labels in general apply to
whichever of the U-label or A-label would be more restrictive. There
are two exceptions to this principle. First, the restriction to
ASCII characters does not apply to the U-label. Second, expansion of
the A-label form to a U-label may produce strings that are much
longer than the normal 63 octet DNS limit (potentially up to 252
characters) due to the compression efficiency of the Punycode
algorithm. Such extended-length U-labels are valid from the
standpoint of IDNA, but caution should be exercised as shorter limits
may be imposed by some applications.
For context, applications that are not IDNA-aware treat all LDH
labels as valid for appearance in DNS zone files and queries and some
of them may permit additional types of labels (i.e., not impose the
LDH restriction). IDNA-aware applications permit only A-labels and
NR-LDH labels to appear in zone files and queries. U-labels can
appear, along with the other two, in presentation and user interface
forms, and in protocols that use IDNA forms but that do not involve
the DNS itself.
Klensin Standards Track [Page 12]
^L
RFC 5890 IDNA Definitions August 2010
Specifically, for IDNA-aware applications and contexts, the three
allowed categories are A-label, U-label, and NR-LDH label. Of the
Reserved LDH labels (R-LDH labels) only A-labels are valid for IDNA
use.
Strings that appear to be A-labels or U-labels are processed in
various operations of the Protocol document [RFC5891]. Those strings
are not yet demonstrably conformant with the conditions outlined
above because they are in the process of validation. Such strings
may be referred to as "unvalidated", "putative", or "apparent", or as
being "in the form of" one of the label types to indicate that they
have not been verified to meet the specified conformance
requirements.
Unvalidated A-labels are known only to be XN-labels, while Fake
A-labels have been demonstrated to fail some of the A-label tests.
Similarly, unvalidated U-labels are simply non-ASCII labels that may
or may not meet the requirements for U-labels.
2.3.2.2. NR-LDH Label
These specifications use the term "NR-LDH label" strictly to refer to
an all-ASCII label that obeys the LDH label syntax discussed in
Section 2.3.1 and that is neither an IDN nor a label form reserved by
IDNA (R-LDH label). It should be stressed that all A-labels obey the
"hostname" [RFC0952] rules other than the length restriction in those
rules.
2.3.2.3. Internationalized Domain Name and Internationalized Label
An "internationalized domain name" (IDN) is a domain name that
contains at least one A-label or U-label, but that otherwise may
contain any mixture of NR-LDH labels, A-labels, or U-labels. Just as
has been the case with ASCII names, some DNS zone administrators may
impose restrictions, beyond those imposed by DNS or IDNA, on the
characters or strings that may be registered as labels in their
zones. Because of the diversity of characters that can be used in a
U-label and the confusion they might cause, such restrictions are
mandatory for IDN registries and zones even though the particular
restrictions are not part of these specifications (the issue is
discussed in more detail in Section 4.3 of the Protocol document
[RFC5891]. Because these restrictions, commonly known as "registry
restrictions", only affect what can be registered and not lookup
processing, they have no effect on the syntax or semantics of DNS
protocol messages; a query for a name that matches no records will
yield the same response regardless of the reason why it is not in the
zone. Clients issuing queries or interpreting responses cannot be
Klensin Standards Track [Page 13]
^L
RFC 5890 IDNA Definitions August 2010
assumed to have any knowledge of zone-specific restrictions or
conventions. See the section on registration policy in the Rationale
document [RFC5894] for additional discussion.
"Internationalized label" is used when a term is needed to refer to a
single label of an IDN, i.e., one that might be any of an NR-LDH
label, A-label, or U-label. There are some standardized DNS label
formats, such as the "underscore labels" used for service location
(SRV) records [RFC2782], that do not fall into any of the three
categories and hence are not internationalized labels.
2.3.2.4. Label Equivalence
In IDNA, equivalence of labels is defined in terms of the A-labels.
If the A-labels are equal in a case-independent comparison, then the
labels are considered equivalent, no matter how they are represented.
Because of the isomorphism of A-labels and U-labels in IDNA2008, it
is possible to compare U-labels directly; see the Protocol document
[RFC5891] for details. Traditional LDH labels already have a notion
of equivalence: within that list of characters, uppercase and
lowercase are considered equivalent. The IDNA notion of equivalence
is an extension of that older notion but, because the protocol does
not specify any mandatory mapping and only those isomorphic forms are
considered, the only equivalents are:
o Exact (bit-string identity) matches between a pair of U-labels.
o Matches between a pair of A-labels, using normal DNS
case-insensitive matching rules.
o Equivalence between a U-label and an A-label determined by
translating the U-label form into an A-label form and then testing
for a match between the A-labels using normal DNS case-insensitive
matching rules.
2.3.2.5. ACE Prefix
The "ACE prefix" is defined in this document to be a string of ASCII
characters, "xn--", that appears at the beginning of every A-label.
"ACE" stands for "ASCII-Compatible Encoding".
2.3.2.6. Domain Name Slot
A "domain name slot" is defined in this document to be a protocol
element or a function argument or a return value (and so on)
explicitly designated for carrying a domain name. Examples of domain
name slots include the QNAME field of a DNS query; the name argument
of the gethostbyname() or getaddrinfo() standard C library functions;
Klensin Standards Track [Page 14]
^L
RFC 5890 IDNA Definitions August 2010
the part of an email address following the at sign ("@") in the
parameter to the SMTP MAIL or RCPT commands or the "From:" field of
an email message header; and the host portion of the URI in the "src"
attribute of an HTML "<IMG>" tag. A string that has the syntax of a
domain name but that appears in general text is not in a domain name
slot. For example, a domain name appearing in the plain text body of
an email message is not occupying a domain name slot.
An "IDNA-aware domain name slot" is defined for this set of documents
to be a domain name slot explicitly designated for carrying an
internationalized domain name as defined in this document. The
designation may be static (for example, in the specification of the
protocol or interface) or dynamic (for example, as a result of
negotiation in an interactive session).
Name slots that are not IDNA-aware obviously include any domain name
slot whose specification predates IDNA. Note that the requirements
of some protocols that use the DNS for data storage prevent the use
of IDNs. For example, the format required for the underscore labels
used by the service location protocol [RFC2782] precludes
representation of a non-ASCII label in the DNS using A-labels because
those SRV-related labels must start with underscores. Of course,
non-ASCII IDN labels may be part of a domain name that also includes
underscore labels.
2.3.3. Order of Characters in Labels
Because IDN labels may contain characters that are read, and
preferentially displayed, from right to left, there is a potential
ambiguity about which character in a label is "first". For the
purposes of these specifications, labels are considered, and
characters numbered, strictly in the order in which they appear "on
the wire". That order is equivalent to the leftmost character being
treated as first in a label that is read left to right and to the
rightmost character being first in a label that is read right to
left. The Bidi specification contains additional discussion of the
conditions that influence reading order.
2.3.4. Punycode is an Algorithm, Not a Name or Adjective
There has been some confusion about whether a "Punycode string" does
or does not include the ACE prefix and about whether it is required
that such strings could have been the output of the ToASCII operation
(see RFC 3490, Section 4 [RFC3490]). This specification discourages
the use of the term "Punycode" to describe anything but the encoding
method and algorithm of RFC 3492 [RFC3492]. The terms defined above
are preferred as much more clear than the term "Punycode string".
Klensin Standards Track [Page 15]
^L
RFC 5890 IDNA Definitions August 2010
3. IANA Considerations
IANA actions for this version of IDNA (IDNA2008) are specified in the
Tables document [RFC5892]. An overview of the relationships among
the various IANA registries appears in the Rationale document
[RFC5894]. This document does not specify any actions for IANA.
4. Security Considerations
4.1. General Issues
Security on the Internet partly relies on the DNS. Thus, any change
to the characteristics of the DNS can change the security of much of
the Internet.
Domain names are used by users to identify and connect to Internet
hosts and other network resources. The security of the Internet is
compromised if a user entering a single internationalized name is
connected to different servers based on different interpretations of
the internationalized domain name. In addition to characters that
are permitted by IDNA2003 and its mapping conventions (see
Section 4.6), the current specification changes the interpretation of
a few characters that were mapped to others in the earlier version;
zone administrators should be aware of the problems that this might
raise and take appropriate measures. The context for this issue is
discussed in more detail in the Rationale document [RFC5894].
In addition to the Security Considerations material that appears in
this document, the Bidi document [RFC5893] contains a discussion of
security issues specific to labels containing characters from scripts
that are normally written right to left.
4.2. U-label Lengths
Labels associated with the DNS have traditionally been limited to 63
octets by the general restrictions in RFC 1035 and by the need to
treat them as a six-bit string length followed by the string in
actual calls to the DNS. That format is used in some other
applications and, in general, that representations of domain names as
dot-separated labels and as length-string pairs have been treated as
interchangeable. Because A-labels (the form actually used in the
DNS) are potentially much more compressed than UTF-8 (and UTF-8 is,
in general, more compressed that UTF-16 or UTF-32), U-labels that
obey all of the relevant symmetry (and other) constraints of these
documents may be quite a bit longer, potentially up to 252 characters
(Unicode code points). A fully-qualified domain name containing
several such labels can obviously also exceed the nominal 255 octet
Klensin Standards Track [Page 16]
^L
RFC 5890 IDNA Definitions August 2010
limit for such names. Application authors using U-labels must exert
due caution to avoid buffer overflow and truncation errors and
attacks in contexts where shorter strings are expected.
4.3. Local Character Set Issues
When systems use local character sets other than ASCII and Unicode,
these specifications leave the problem of converting between the
local character set and Unicode up to the application or local
system. If different applications (or different versions of one
application) implement different rules for conversions among coded
character sets, they could interpret the same name differently and
contact different servers. This problem is not solved by security
protocols, such as Transport Layer Security (TLS) [RFC5246], that do
not take local character sets into account.
4.4. Visually Similar Characters
To help prevent confusion between characters that are visually
similar (sometimes called "confusables"), it is suggested that
implementations provide visual indications where a domain name
contains multiple scripts, especially when the scripts contain
characters that are easily confused visually, such as an omicron in
Greek mixed with Latin text. Such mechanisms can also be used to
show when a name contains a mixture of Simplified Chinese characters
with Traditional ones that have Simplified forms, or to distinguish
zero and one from uppercase "O" and lowercase "L". DNS zone
administrators may impose restrictions (subject to the limitations
identified elsewhere in these documents) that try to minimize
characters that have similar appearance or similar interpretations.
If multiple characters appear in a label and the label consists only
of characters in one script, individual characters that might be
confused with others if compared separately may be unambiguous and
non-confusing. On the other hand, that observation makes labels
containing characters from more than one script (often called "mixed-
script labels") even more risky -- users will tend to see what they
expect to see and context is a powerful reinforcement to perception.
At the same time, while the risks associated with mixed-script labels
are clear, simply prohibiting them will not eliminate problems,
especially where closely related scripts are involved. For example,
there are many strings that are entirely in Greek or Cyrillic scripts
that can be confused with each other or with Latin script strings.
It is worth noting that there are no comprehensive technical
solutions to the problems of confusable characters. One can reduce
the extent of the problems in various ways, but probably never
Klensin Standards Track [Page 17]
^L
RFC 5890 IDNA Definitions August 2010
eliminate it. Some specific suggestions about identification and
handling of confusable characters appear in a Unicode Consortium
publication [Unicode-UTR36].
4.5. IDNA Lookup, Registration, and the Base DNS Specifications
The Protocol specification [RFC5891] describes procedures for
registering and looking up labels that are not compatible with the
preferred syntax described in the base DNS specifications (see
Section 2.3.1) because they contain non-ASCII characters. These
procedures depend on the use of a special ASCII-compatible encoding
form that contains only characters permitted in hostnames by those
earlier specifications. The encoding used is Punycode [RFC3492]. No
security issues such as string length increases or new allowed values
are introduced by the encoding process or the use of these encoded
values, apart from those introduced by the ACE encoding itself.
Domain names (or portions of them) are sometimes compared against a
set of domains to be given special treatment if a match occurs, e.g.,
treated as more privileged than others or blocked in some way. In
such situations, it is especially important that the comparisons be
done properly, as specified in the "Requirements" section of the
Protocol document [RFC5891]. For labels already in ASCII form, the
proper comparison reduces to the same case-insensitive ASCII
comparison that has always been used for ASCII labels although
IDNA-aware applications are expected to look up only A-labels and
NR-LDH labels, i.e., to avoid looking up R-LDH labels that are not
A-labels.
The introduction of IDNA meant that any existing labels that start
with the ACE prefix would be construed as A-labels, at least until
they failed one of the relevant tests, whether or not that was the
intent of the zone administrator or registrant. There is no evidence
that this has caused any practical problems since RFC 3490 was
adopted, but the risk still exists in principle.
4.6. Legacy IDN Label Strings
The URI Standard [RFC3986] and a number of application specifications
(e.g., SMTP [RFC5321] and HTTP [RFC2616]) do not permit non-ASCII
labels in DNS names used with those protocols, i.e., only the A-label
form of IDNs is permitted in those contexts. If only A-labels are
used, differences in interpretation between IDNA2003 and this version
arise only for characters whose interpretation have actually changed
(e.g., characters, such as ZWJ and ZWNJ, that were mapped to nothing
in IDNA2003 and that are considered legitimate in some contexts by
these specifications). Despite that prohibition, there are a
significant number of files and databases on the Internet in which
Klensin Standards Track [Page 18]
^L
RFC 5890 IDNA Definitions August 2010
domain name strings appear in native-character form; a subset of
those strings use native-character labels that require IDNA2003
mapping to produce valid A-labels. The treatment of such labels will
vary by types of applications and application-designer preference: in
some situations, warnings to the user or outright rejection may be
appropriate; in others, it may be preferable to attempt to apply the
earlier mappings if lookup strictly conformant to these
specifications fails or even to do lookups under both sets of rules.
This general situation is discussed in more detail in the Rationale
document [RFC5894]. However, in the absence of care by registries
about how strings that could have different interpretations under
IDNA2003 and the current specification are handled, it is possible
that the differences could be used as a component of name-matching or
name-confusion attacks. Such care is therefore appropriate.
4.7. Security Differences from IDNA2003
The registration and lookup models described in this set of documents
change the mechanisms available for lookup applications to determine
the validity of labels they encounter. In some respects, the ability
to test is strengthened. For example, putative labels that contain
unassigned code points will now be rejected, while IDNA2003 permitted
them (see the Rationale document [RFC5894] for a discussion of the
reasons for this). On the other hand, the Protocol specification no
longer assumes that the application that looks up a name will be able
to determine, and apply, information about the protocol version used
in registration. In theory, that may increase risk since the
application will be able to do less pre-lookup validation. In
practice, the protection afforded by that test has been largely
illusory for reasons explained in RFC 4690 [RFC4690] and elsewhere in
these documents.
Any change to the Stringprep [RFC3454] procedure that is profiled and
used in IDNA2003, or, more broadly, the IETF's model of the use of
internationalized character strings in different protocols, creates
some risk of inadvertent changes to those protocols, invalidating
deployed applications or databases, and so on. But these
specifications do not change Stringprep at all; they merely bypass
it. Because these documents do not depend on Stringprep, the
question of upgrading other protocols that do have that dependency
can be left to experts on those protocols: the IDNA changes and
possible upgrades to security protocols or conventions are
independent issues.
Klensin Standards Track [Page 19]
^L
RFC 5890 IDNA Definitions August 2010
4.8. Summary
No mechanism involving names or identifiers alone can protect against
a wide variety of security threats and attacks that are largely
independent of the naming or identification system. These attacks
include spoofed pages, DNS query trapping and diversion, and so on.
5. Acknowledgments
The initial version of this document was created largely by
extracting text from early draft versions of the Rationale document
[RFC5894]. See the section of this name and the one entitled
"Contributors", in it.
Specific textual suggestions after the extraction process came from
Vint Cerf, Lisa Dusseault, Bill McQuillan, Andrew Sullivan, and Ken
Whistler. Other changes were made in response to more general
comments, lists of concerns or specific errors from participants in
the Working Group and other observers, including Lyman Chapin, James
Mitchell, Subramanian Moonesamy, and Dan Winship.
6. References
6.1. Normative References
[ASCII] American National Standards Institute (formerly United
States of America Standards Institute), "USA Code for
Information Interchange", ANSI X3.4-1968, 1968. ANSI
X3.4-1968 has been replaced by newer versions with
slight modifications, but the 1968 version remains
definitive for the Internet.
[RFC1034] Mockapetris, P., "Domain names - concepts and
facilities", STD 13, RFC 1034, November 1987.
[RFC1035] Mockapetris, P., "Domain names - implementation and
specification", STD 13, RFC 1035, November 1987.
[RFC1123] Braden, R., "Requirements for Internet Hosts -
Application and Support", STD 3, RFC 1123, October 1989.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
Klensin Standards Track [Page 20]
^L
RFC 5890 IDNA Definitions August 2010
[Unicode-UAX15]
The Unicode Consortium, "Unicode Standard Annex #15:
Unicode Normalization Forms, Revision 31",
September 2009,
<http://www.unicode.org/reports/tr15/tr15-31.html>.
[Unicode52] The Unicode Consortium. The Unicode Standard, Version
5.2.0, defined by: "The Unicode Standard, Version
5.2.0", (Mountain View, CA: The Unicode Consortium,
2009. ISBN 978-1-936213-00-9).
<http://www.unicode.org/versions/Unicode5.2.0/>.
6.2. Informative References
[IDNA2008-Mapping]
Resnick, P. and P. Hoffman, "Mapping Characters in
Internationalized Domain Names for Applications (IDNA)",
Work in Progress, April 2010.
[RFC0952] Harrenstien, K., Stahl, M., and E. Feinler, "DoD
Internet host table specification", RFC 952,
October 1985.
[RFC2181] Elz, R. and R. Bush, "Clarifications to the DNS
Specification", RFC 2181, July 1997.
[RFC2616] Fielding, R., Gettys, J., Mogul, J., Frystyk, H.,
Masinter, L., Leach, P., and T. Berners-Lee, "Hypertext
Transfer Protocol -- HTTP/1.1", RFC 2616, June 1999.
[RFC2673] Crawford, M., "Binary Labels in the Domain Name System",
RFC 2673, August 1999.
[RFC2782] Gulbrandsen, A., Vixie, P., and L. Esibov, "A DNS RR for
specifying the location of services (DNS SRV)",
RFC 2782, February 2000.
[RFC3454] Hoffman, P. and M. Blanchet, "Preparation of
Internationalized Strings ("stringprep")", RFC 3454,
December 2002.
[RFC3490] Faltstrom, P., Hoffman, P., and A. Costello,
"Internationalizing Domain Names in Applications
(IDNA)", RFC 3490, March 2003.
[RFC3491] Hoffman, P. and M. Blanchet, "Nameprep: A Stringprep
Profile for Internationalized Domain Names (IDN)",
RFC 3491, March 2003.
Klensin Standards Track [Page 21]
^L
RFC 5890 IDNA Definitions August 2010
[RFC3492] Costello, A., "Punycode: A Bootstring encoding of
Unicode for Internationalized Domain Names in
Applications (IDNA)", RFC 3492, March 2003.
[RFC3986] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform
Resource Identifier (URI): Generic Syntax", STD 66,
RFC 3986, January 2005.
[RFC4690] Klensin, J., Faltstrom, P., Karp, C., and IAB, "Review
and Recommendations for Internationalized Domain Names
(IDNs)", RFC 4690, September 2006.
[RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer
Security (TLS) Protocol Version 1.2", RFC 5246,
August 2008.
[RFC5321] Klensin, J., "Simple Mail Transfer Protocol", RFC 5321,
October 2008.
[RFC5891] Klensin, J., "Internationalized Domain Names in
Applications (IDNA): Protocol", RFC 5891, August 2010.
[RFC5892] Faltstrom, P., Ed., "The Unicode Code Points and
Internationalized Domain Names for Applications (IDNA)",
RFC 5892, August 2010.
[RFC5893] Alvestrand, H. and C. Karp, "Right-to-Left Scripts for
Internationalized Domain Names for Applications (IDNA)",
RFC 5893, August 2010.
[RFC5894] Klensin, J., "Internationalized Domain Names for
Applications (IDNA): Background, Explanation, and
Rationale", RFC 5894, August 2010.
[Unicode-UTR36]
The Unicode Consortium, "Unicode Technical Report #36:
Unicode Security Considerations, Revision 7", July 2008,
<http://www.unicode.org/reports/tr36/tr36-7.html>.
Klensin Standards Track [Page 22]
^L
RFC 5890 IDNA Definitions August 2010
Author's Address
John C Klensin
1770 Massachusetts Ave, Ste 322
Cambridge, MA 02140
USA
Phone: +1 617 245 1457
EMail: john+ietf@jck.com
Klensin Standards Track [Page 23]
^L
|