<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-bertoldi-regext-rdap-reliability-scoring-00" category="exp" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="RDAP Reliability Assessment">RDAP Extension for Structured Reliability Assessment Metadata</title>
    <seriesInfo name="Internet-Draft" value="draft-bertoldi-regext-rdap-reliability-scoring-00"/>
    <author initials="A." surname="Bertoldi" fullname="Alessandro Bertoldi">
      <organization>Bertoldi Cybersecurity</organization>
      <address>
        <email>alessandro@bertoldicybersecurity.com</email>
      </address>
    </author>
    <author initials="S. P." surname="Romano" fullname="Simon Pietro Romano">
      <organization abbrev="UNINA">Universita' degli Studi di Napoli Federico II</organization>
      <address>
        <postal>
          <street>Via Claudio 21</street>
          <city>Naples</city>
          <code>80125</code>
          <country>Italy</country>
        </postal>
        <email>spromano@unina.it</email>
      </address>
    </author>
    <date year="2026" month="April" day="13"/>
    <area>Applications and Real-Time</area>
    <workgroup>REGEXT</workgroup>
    <abstract>
      <?line 99?>

<t>This document proposes an extension to the Registration Data Access Protocol
(RDAP) that enables the representation and exchange of structured reliability
assessment metadata for registrars and domain names. The extension defines a
structured assessment envelope through which any registry, registrar, or
third-party assessor can expose assessment results in a common,
machine-readable format within RDAP responses.</t>
      <t>The extension standardizes how assessment results are transported and
referenced, not how they are computed. Scoring methodologies, thresholds,
criteria, and governance frameworks are intentionally left to the operational
and policy layer.</t>
    </abstract>
  </front>
  <middle>
    <?line 113?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The domain registration ecosystem relies on registrars as critical
intermediaries between domain owners and the global DNS infrastructure.
Research <xref target="DEEPSEC2025"/> has identified recurring systemic vulnerabilities
in registrar processes, including credential recovery, identity verification,
and email authentication configurations, that represent structural risks
affecting large numbers of domains and their owners. These issues have in
several cases remained unaddressed for extended periods despite responsible
disclosure.</t>
      <t>The Registration Data Access Protocol (RDAP), defined in <xref target="RFC7480"/>,
<xref target="RFC7481"/>, <xref target="RFC9082"/>, <xref target="RFC9083"/>, and <xref target="RFC9224"/>, was designed as the
successor to WHOIS and introduces structured JSON responses, authentication
and authorization support, and a well-defined extensibility model. These
properties make RDAP a suitable foundation for exposing structured security
and reliability metadata in a standardized, interoperable way.</t>
      <t>This document defines an RDAP extension that provides an envelope for
carrying assessment results related to the security posture and reliability
of registrars and domain names. The extension standardizes the transport and
referencing of such results; it does not define scoring methodologies,
thresholds, or enforcement mechanisms. The protocol enables representation;
the ecosystem decides how to populate and consume the exposed fields.</t>
      <t>The proposal is intended as complementary to
<xref target="I-D.loffredo-regext-rdap-verified-contacts"/>, which establishes that contact data has been verified. The present extension adds a parallel layer:
structured metadata about the security posture of the registrar and the
domain itself.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
      <t>The following terms are used throughout this document:</t>
      <dl>
        <dt>Assessment Envelope:</dt>
        <dd>
          <t>The structured set of fields defined by this extension, representing the
result of a security or reliability assessment of a registrar or domain.
The envelope carries the result and points to the methodology; it does not
define the methodology itself.</t>
        </dd>
        <dt>Score Scheme:</dt>
        <dd>
          <t>An identifier or URI that denotes the scoring methodology used to produce
an assessment result. The scheme defines the semantics of the score value,
its range, and its criteria. Scheme definitions are maintained externally
to this document.</t>
        </dd>
        <dt>Score Issuer:</dt>
        <dd>
          <t>An opaque identifier for the entity that performed the assessment and
produced the score value. The format and resolution of this identifier
are defined by the scoreScheme.</t>
        </dd>
        <dt>Extension Identifier:</dt>
        <dd>
          <t>The RDAP extension string registered in the IANA RDAP Extensions Registry
that identifies this extension.</t>
        </dd>
      </dl>
    </section>
    <section anchor="motivation-and-problem-statement">
      <name>Motivation and Problem Statement</name>
      <t>Research <xref target="DEEPSEC2025"/> has identified recurring systemic vulnerabilities in
domain registrar processes that cannot be addressed by conventional technical
security controls. These vulnerabilities arise from weaknesses in the
interface between digital systems and human processes, and include
deficiencies in credential recovery, identity verification, and email
authentication configurations.</t>
      <t>A notable characteristic of these vulnerabilities is their persistence: in several documented cases, exploitable issues remained unresolved for extended periods following responsible disclosure, reflecting diffuse accountability and the absence of structured incentives for timely remediation.</t>
      <t>These findings suggest that while technical standards such as SPF <xref target="RFC7208"/>,
DKIM <xref target="RFC6376"/>, and DMARC <xref target="RFC7489"/> are sound, their adoption and correct
configuration cannot be reliably ensured without structured, machine-readable
signaling mechanisms. The full technical details of the underlying research
are documented in <xref target="DEEPSEC2025"/>.</t>
      <section anchor="why-protocol-level-representation-helps">
        <name>Why Protocol-Level Representation Helps</name>
        <t>Structured representation of assessment metadata at the protocol level offers
several complementary benefits relative to existing operational approaches.</t>
        <t>First, publicly accessible, machine-readable assessment data creates
reputational and commercial incentives for registrars and domain owners to
adopt and maintain security best practices, analogous to the role of
Certificate Transparency in the TLS ecosystem.</t>
        <t>Second, a standardized RDAP extension enables any registry, registrar,
browser, or security tool to consume assessment metadata through a common
interface, eliminating dependency on proprietary or registry-specific systems.</t>
        <t>Third, protocol-level representation does not replace operational scoring or
enforcement programs. Rather, it provides a standardized channel through
which the outputs of such programs can be expressed and consumed by the
broader ecosystem.</t>
      </section>
    </section>
    <section anchor="design-principles">
      <name>Design Principles</name>
      <t>The following principles guide the design of this extension.</t>
      <dl>
        <dt>Separation of concerns:</dt>
        <dd>
          <t>This document defines the structured assessment envelope and extension points. The governance of who computes scores, the specific scoring methodology, any thresholds applied, and any enforcement actions based on scores belong to the operational and policy layer and are intentionally outside the scope of this document.</t>
        </dd>
        <dt>Envelope, not methodology:</dt>
        <dd>
          <t>The extension standardizes how assessment results are transported and referenced within RDAP. It does not standardize how assessments are performed, what criteria are evaluated, or what thresholds apply.</t>
        </dd>
        <dt>Extensibility:</dt>
        <dd>
          <t>The extension is designed to accommodate additional fields without breaking backward compatibility, consistent with RDAP's existing extensibility model.</t>
        </dd>
        <dt>Interoperability:</dt>
        <dd>
          <t>The extension is not tied to any specific registry, registrar, or policy framework. Any conformant RDAP server may implement it independently.</t>
        </dd>
        <dt>Complementarity:</dt>
        <dd>
          <t>The extension is designed to coexist with and extend <xref target="I-D.loffredo-regext-rdap-verified-contacts"/>, rather than replace or duplicate it.</t>
        </dd>
      </dl>
    </section>
    <section anchor="rdap-extension-data-model">
      <name>RDAP Extension: Data Model</name>
      <section anchor="extension-identifier">
        <name>Extension Identifier</name>
        <t>This extension is identified by the string "rdap_reliability_scoring", to be
registered in the IANA RDAP Extensions Registry (see <xref target="iana"/>). RDAP responses
that include this extension MUST include the extension identifier in the
"rdapConformance" array.</t>
      </section>
      <section anchor="namespacing-approach">
        <name>Namespacing Approach</name>
        <t>This version of the document groups all extension fields under a single
top-level JSON object keyed by the extension identifier
("rdap_reliability_scoring"). This encoding is used for readability when the
extension defines multiple related fields. The authors welcome working group
guidance on the preferred namespacing approach; the encoding may be revised
in subsequent versions based on working group feedback.</t>
      </section>
      <section anchor="assessment-envelope">
        <name>Assessment Envelope</name>
        <t>The assessment envelope is a JSON object that MAY appear within entity objects
(objectClassName: "entity") and domain objects (objectClassName: "domain").
An entity is considered to represent a registrar when its "roles" array
includes the value "registrar" as defined in Section 10.2.4 of <xref target="RFC9083"/>.
All fields within the envelope are OPTIONAL. Implementers SHOULD populate
only those fields for which they have authoritative data.</t>
        <t>The envelope carries the result of an external assessment and points to
the methodology used. It does not define the methodology, the criteria, or
the thresholds.</t>
      </section>
      <section anchor="field-definitions">
        <name>Field Definitions</name>
        <t>The fields defined by this extension are described in the following table.
All fields are OPTIONAL.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Field</th>
              <th align="left">Type</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">scoreScheme</td>
              <td align="left">string (URI or identifier)</td>
              <td align="left">Identifies the scoring methodology used to produce the assessment. When expressed as a URI, it MUST conform to <xref target="RFC3986"/>. The scheme defines the semantics, range, and criteria of the score. Scheme definitions are maintained externally.</td>
            </tr>
            <tr>
              <td align="left">scoreValue</td>
              <td align="left">number or null</td>
              <td align="left">The non-negative numeric result of the assessment, as defined by the scoreScheme. If scoreMaxValue is present, scoreValue SHOULD NOT exceed scoreMaxValue unless the scoreScheme explicitly defines otherwise.</td>
            </tr>
            <tr>
              <td align="left">scoreMaxValue</td>
              <td align="left">number or null</td>
              <td align="left">The non-negative maximum possible value under the scoreScheme. Together with scoreValue, helps consumers interpret the numeric result.</td>
            </tr>
            <tr>
              <td align="left">scoreDate</td>
              <td align="left">string (date-time)</td>
              <td align="left">The date and time at which the assessment was last performed, in the format defined in <xref target="RFC3339"/>.</td>
            </tr>
            <tr>
              <td align="left">scoreIssuer</td>
              <td align="left">string</td>
              <td align="left">An opaque identifier for the entity that performed the assessment and issued the score. The format and resolution of this identifier are defined by the scoreScheme; it may be a local name, a URI, or a registered identifier.</td>
            </tr>
            <tr>
              <td align="left">evidenceUri</td>
              <td align="left">string (URI) or null</td>
              <td align="left">An OPTIONAL URI pointing to supporting documentation, a detailed report, or the full assessment record maintained by the scoreIssuer.</td>
            </tr>
          </tbody>
        </table>
        <t>Implementers MUST NOT infer normative meaning from the illustrative field
values used in the examples in this document or in
<xref target="example-rdap-responses"/>.</t>
      </section>
      <section anchor="registrar-object-extension">
        <name>Registrar Object Extension</name>
        <t>The following example illustrates how the assessment envelope MAY appear
within an entity object representing a registrar.</t>
        <artwork><![CDATA[
{
  "rdapConformance": [
    "rdap_level_0",
    "rdap_reliability_scoring"
  ],
  "objectClassName": "entity",
  "handle": "REGISTRAR-EXAMPLE",
  "roles": ["registrar"],
  "rdap_reliability_scoring": {
    "scoreScheme": "urn:example:registrar-security-assessment:v1",
    "scoreValue": 8,
    "scoreMaxValue": 10,
    "scoreDate": "2026-01-15T10:30:00Z",
    "scoreIssuer": "example-assessor",
    "evidenceUri": "https://example-assessor.org/reports/reg-example"
  }
}
]]></artwork>
      </section>
      <section anchor="domain-object-extension">
        <name>Domain Object Extension</name>
        <t>The following example illustrates how the assessment envelope MAY appear
within a domain object.</t>
        <artwork><![CDATA[
{
  "rdapConformance": [
    "rdap_level_0",
    "rdap_reliability_scoring"
  ],
  "objectClassName": "domain",
  "handle": "example.tld",
  "ldhName": "example.tld",
  "rdap_reliability_scoring": {
    "scoreScheme": "urn:example:domain-security-posture:v2",
    "scoreValue": 7,
    "scoreMaxValue": 10,
    "scoreDate": "2026-02-01T08:00:00Z",
    "scoreIssuer": "example-assessor",
    "evidenceUri": null
  },
  "events": [
    {
      "eventAction": "registration",
      "eventDate": "2024-01-01T00:00:00Z"
    }
  ]
}
]]></artwork>
      </section>
    </section>
    <section anchor="relationship-to-existing-work">
      <name>Relationship to Existing Work</name>
      <section anchor="relationship-to-draft-loffredo-regext-rdap-verified-contacts">
        <name>Relationship to draft-loffredo-regext-rdap-verified-contacts</name>
        <t>The <xref target="I-D.loffredo-regext-rdap-verified-contacts"/> extension establishes that
contact data associated with a domain or registrar has been verified. The
present extension adds a complementary and orthogonal layer: structured
metadata about the security posture of the registrar and the domain itself.</t>
        <t>The two extensions answer different questions. The verified-contacts extension
addresses whether the identity of the entity behind a domain has been
confirmed. The reliability-scoring extension addresses what the assessed
security posture of the entity managing that domain is. Both are expressible
within the RDAP framework and are designed to coexist within the same RDAP
response.</t>
      </section>
      <section anchor="relationship-to-pir-abuse-intervention-program">
        <name>Relationship to PIR Abuse Intervention Program</name>
        <t>PIR's Abuse Intervention Program (AIP) and Quality Performance Index (QPI)
<xref target="PIR-AIP"/> represent an example of a registry-specific operational
assessment program. This document does not standardize such a program; it
defines a generic RDAP representation that could carry outputs produced by
programs such as PIR/QPI or other assessment frameworks.</t>
        <t>An operational scoring system such as PIR/QPI could, in principle, expose its
outputs through the envelope defined in this document, enabling broader
interoperability without modifying its internal methodology.</t>
      </section>
      <section anchor="relationship-to-rdap-core-specifications">
        <name>Relationship to RDAP Core Specifications</name>
        <t>This extension is designed to be fully conformant with the RDAP core
specifications <xref target="RFC7480"/> <xref target="RFC7481"/> <xref target="RFC9082"/> <xref target="RFC9083"/> <xref target="RFC9224"/>.
It uses the JSON response format defined in <xref target="RFC9083"/>, the extensibility
model provided in <xref target="RFC7480"/>, and the security framework of <xref target="RFC7481"/>.
Query formats follow <xref target="RFC9082"/> and service discovery follows <xref target="RFC9224"/>.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The fields defined in this extension are informational. They do not constitute
enforcement mechanisms and MUST NOT be interpreted as authoritative security
certifications.</t>
      <dl>
        <dt>Score integrity:</dt>
        <dd>
          <t>Without appropriate authentication of the scoring entity, assessment
metadata fields are susceptible to manipulation. Access to fields that
can be modified programmatically SHOULD require mutual TLS authentication
between client and server.</t>
        </dd>
        <dt>Gaming and abuse:</dt>
        <dd>
          <t>Any publicly visible scoring system creates incentives for gaming. The
governance framework, which is outside the scope of this document, SHOULD
address verification, audit, and revocation mechanisms.</t>
        </dd>
        <dt>False assurance:</dt>
        <dd>
          <t>Consumers of assessment metadata MUST NOT treat scores as equivalent to
security certifications. A high score value does not guarantee the absence
of vulnerabilities. Consumers SHOULD treat scores as one signal among
many and SHOULD NOT make high-stakes trust decisions based solely on RDAP
assessment fields.</t>
        </dd>
        <dt>Staleness:</dt>
        <dd>
          <t>Scores reflect the state at the time indicated by the "scoreDate" field.
Consumers SHOULD check the freshness of assessment data and SHOULD treat
scores that have not been updated recently with appropriate skepticism.
Implementers MAY define an expiration policy based on the scoreScheme.</t>
        </dd>
        <dt>Scheme trust:</dt>
        <dd>
          <t>The reliability of assessment data depends on the trustworthiness of both
the scoreIssuer and the scoreScheme. Consumers SHOULD establish out-of-band
trust in the scoreIssuer before acting on assessment data.</t>
        </dd>
        <dt>Evidence URI:</dt>
        <dd>
          <t>The resource identified by evidenceUri is maintained by the scoreIssuer
and is outside the control of the RDAP server. Its content may change over
time, may be subject to access control, and may become unavailable.
Consumers SHOULD NOT assume that the evidence resource is publicly
accessible or immutable.</t>
        </dd>
      </dl>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The fields defined in this extension describe security posture at the
registrar and domain level and are not intended to expose personal data.
They are designed to be compatible with the access control framework defined
in <xref target="RFC7481"/>.</t>
      <t>Implementers MUST ensure that the presence or absence of assessment metadata
does not inadvertently reveal information about the identity of natural
persons. The separation between assessment metadata, which is intended to
be publicly accessible, and contact data, which is subject to access control
per <xref target="RFC7481"/>, MUST be maintained in conformant implementations.</t>
      <t>This extension is intended to be compatible with applicable data protection
regulations, including the General Data Protection Regulation <xref target="GDPR"/> and
equivalent frameworks.</t>
      <t>The evidenceUri field, if populated, SHOULD NOT point to resources that expose
personal data or operationally sensitive details beyond what is necessary for
the consumer to understand the assessment result.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document requests the registration of the following entry in the IANA
RDAP Extensions Registry:</t>
      <dl>
        <dt>Extension identifier:</dt>
        <dd>
          <t>rdap_reliability_scoring</t>
        </dd>
        <dt>Registry operator:</dt>
        <dd>
          <t>IANA</t>
        </dd>
        <dt>Published specification:</dt>
        <dd>
          <t>this document</t>
        </dd>
        <dt>Contact:</dt>
        <dd>
          <t>Alessandro Bertoldi (alessandro@bertoldicybersecurity.com)</t>
        </dd>
      </dl>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3339">
          <front>
            <title>Date and Time on the Internet: Timestamps</title>
            <author fullname="G. Klyne" initials="G." surname="Klyne"/>
            <author fullname="C. Newman" initials="C." surname="Newman"/>
            <date month="July" year="2002"/>
            <abstract>
              <t>This document defines a date and time format for use in Internet protocols that is a profile of the ISO 8601 standard for representation of dates and times using the Gregorian calendar.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3339"/>
          <seriesInfo name="DOI" value="10.17487/RFC3339"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC7480">
          <front>
            <title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <author fullname="B. Ellacott" initials="B." surname="Ellacott"/>
            <author fullname="N. Kong" initials="N." surname="Kong"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP). It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP). RDAP is a successor protocol to the very old WHOIS protocol. The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="7480"/>
          <seriesInfo name="DOI" value="10.17487/RFC7480"/>
        </reference>
        <reference anchor="RFC7481">
          <front>
            <title>Security Services for the Registration Data Access Protocol (RDAP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <author fullname="N. Kong" initials="N." surname="Kong"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>The Registration Data Access Protocol (RDAP) provides "RESTful" web services to retrieve registration metadata from Domain Name and Regional Internet Registries. This document describes information security services, including access control, authentication, authorization, availability, data confidentiality, and data integrity for RDAP.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="7481"/>
          <seriesInfo name="DOI" value="10.17487/RFC7481"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9082">
          <front>
            <title>Registration Data Access Protocol (RDAP) Query Format</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns. These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9082"/>
          <seriesInfo name="DOI" value="10.17487/RFC9082"/>
        </reference>
        <reference anchor="RFC9083">
          <front>
            <title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs). These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9083"/>
          <seriesInfo name="DOI" value="10.17487/RFC9083"/>
        </reference>
        <reference anchor="RFC9224">
          <front>
            <title>Finding the Authoritative Registration Data Access Protocol (RDAP) Service</title>
            <author fullname="M. Blanchet" initials="M." surname="Blanchet"/>
            <date month="March" year="2022"/>
            <abstract>
              <t>This document specifies a method to find which Registration Data Access Protocol (RDAP) server is authoritative to answer queries for a requested scope, such as domain names, IP addresses, or Autonomous System numbers. This document obsoletes RFC 7484.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9224"/>
          <seriesInfo name="DOI" value="10.17487/RFC9224"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.loffredo-regext-rdap-verified-contacts">
          <front>
            <title>Registration Data Access Protocol (RDAP) Extension for Verified Contact Information</title>
            <author fullname="Mario Loffredo" initials="M." surname="Loffredo">
              <organization>IIT-CNR/Registro.it</organization>
            </author>
            <author fullname="Maurizio Martinelli" initials="M." surname="Martinelli">
              <organization>IIT-CNR/Registro.it</organization>
            </author>
            <author fullname="James Gould" initials="J." surname="Gould">
              <organization>VeriSign, Inc.</organization>
            </author>
            <author fullname="Paweł Kowalik" initials="P." surname="Kowalik">
              <organization>DENIC eG</organization>
            </author>
            <date day="23" month="February" year="2026"/>
            <abstract>
              <t>   This document describes an extension to the Registration Data Access
   Protocol (RDAP) that allows the inclusion of verification status
   information for contact fields such as email addresses and phone
   numbers.  The goal is to improve data quality and trustworthiness of
   RDAP responses by indicating which pieces of contact data have been
   verified and how.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-loffredo-regext-rdap-verified-contacts-03"/>
        </reference>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC6376">
          <front>
            <title>DomainKeys Identified Mail (DKIM) Signatures</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
            <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
            <date month="September" year="2011"/>
            <abstract>
              <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
              <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="76"/>
          <seriesInfo name="RFC" value="6376"/>
          <seriesInfo name="DOI" value="10.17487/RFC6376"/>
        </reference>
        <reference anchor="RFC7208">
          <front>
            <title>Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1</title>
            <author fullname="S. Kitterman" initials="S." surname="Kitterman"/>
            <date month="April" year="2014"/>
            <abstract>
              <t>Email on the Internet can be forged in a number of ways. In particular, existing protocols place no restriction on what a sending host can use as the "MAIL FROM" of a message or the domain given on the SMTP HELO/EHLO commands. This document describes version 1 of the Sender Policy Framework (SPF) protocol, whereby ADministrative Management Domains (ADMDs) can explicitly authorize the hosts that are allowed to use their domain names, and a receiving host can check such authorization.</t>
              <t>This document obsoletes RFC 4408.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7208"/>
          <seriesInfo name="DOI" value="10.17487/RFC7208"/>
        </reference>
        <reference anchor="RFC7489">
          <front>
            <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
            <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
            <author fullname="E. Zwicky" initials="E." role="editor" surname="Zwicky"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</t>
              <t>Originators of Internet Mail need to be able to associate reliable and authenticated domain identifiers with messages, communicate policies about messages that use those identifiers, and report about mail using those identifiers. These abilities have several benefits: Receivers can provide feedback to Domain Owners about the use of their domains; this feedback can provide valuable insight about the management of internal operations and the presence of external domain name abuse.</t>
              <t>DMARC does not produce or encourage elevated delivery privilege of authenticated email. DMARC is a mechanism for policy distribution that enables increasingly strict handling of messages that fail authentication checks, ranging from no action, through altered delivery, up to message rejection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7489"/>
          <seriesInfo name="DOI" value="10.17487/RFC7489"/>
        </reference>
        <reference anchor="ISO27001">
          <front>
            <title>Information security, cybersecurity and privacy protection -- Information security management systems -- Requirements</title>
            <author>
              <organization/>
            </author>
            <date year="2022"/>
          </front>
          <seriesInfo name="ISO/IEC" value="27001:2022"/>
        </reference>
        <reference anchor="ISO27701">
          <front>
            <title>Privacy information management systems -- Requirements and guidelines</title>
            <author>
              <organization/>
            </author>
            <date year="2025"/>
          </front>
          <seriesInfo name="ISO/IEC" value="27701:2025"/>
        </reference>
        <reference anchor="GDPR" target="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32016R0679">
          <front>
            <title>Regulation (EU) 2016/679 of the European Parliament and of the Council on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation)</title>
            <author>
              <organization>European Parliament and Council of the European Union</organization>
            </author>
            <date year="2016" month="April"/>
          </front>
        </reference>
        <reference anchor="PIR-AIP" target="https://icann85.sched.com/event/2GwoE/ssac-work-session-pir-abuse-intervention-program">
          <front>
            <title>PIR Abuse Intervention Program and Quality Performance Index</title>
            <author>
              <organization>Public Interest Registry</organization>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="DEEPSEC2025" target="https://bcsec.io/research/deepsec2025/deepsec2025.pdf">
          <front>
            <title>Forever-Day at Scale: Hijacking Registrars, Defeating 2FA and Spoofing 17,000+ Domains (Even with DMARC p=reject)</title>
            <author initials="A." surname="Bertoldi" fullname="Alessandro Bertoldi">
              <organization/>
            </author>
            <author initials="S. P." surname="Romano" fullname="Simon Pietro Romano">
              <organization/>
            </author>
            <date year="2025"/>
          </front>
          <seriesInfo name="DeepSec" value="Vienna 2025"/>
        </reference>
      </references>
    </references>
    <?line 462?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors thank Pawel Kowalik, Mario Loffredo, Maurizio Martinelli,
James Gould, and James Galvin for their early engagement and feedback during
IETF 125.</t>
    </section>
    <section anchor="example-rdap-responses">
      <name>Example RDAP Responses</name>
      <t>The examples in this appendix are provided for illustrative purposes only.
Score values, scheme identifiers, and issuer names are fictional.</t>
      <section anchor="domain-lookup-with-assessment">
        <name>Domain Lookup with Assessment</name>
        <artwork><![CDATA[
{
  "rdapConformance": [
    "rdap_level_0",
    "rdap_reliability_scoring"
  ],
  "objectClassName": "domain",
  "handle": "example.tld",
  "ldhName": "example.tld",
  "rdap_reliability_scoring": {
    "scoreScheme": "urn:example:domain-security-posture:v2",
    "scoreValue": 9,
    "scoreMaxValue": 10,
    "scoreDate": "2026-01-01T00:00:00Z",
    "scoreIssuer": "example-assessor",
    "evidenceUri": "https://example-assessor.org/reports/example.tld"
  },
  "events": [
    {
      "eventAction": "registration",
      "eventDate": "2024-01-01T00:00:00Z"
    }
  ]
}
]]></artwork>
      </section>
      <section anchor="registrar-entity-lookup-with-assessment">
        <name>Registrar Entity Lookup with Assessment</name>
        <artwork><![CDATA[
{
  "rdapConformance": [
    "rdap_level_0",
    "rdap_reliability_scoring"
  ],
  "objectClassName": "entity",
  "handle": "REGISTRAR-EXAMPLE",
  "roles": ["registrar"],
  "rdap_reliability_scoring": {
    "scoreScheme": "urn:example:registrar-security-assessment:v1",
    "scoreValue": 10,
    "scoreMaxValue": 10,
    "scoreDate": "2026-01-01T00:00:00Z",
    "scoreIssuer": "example-assessor",
    "evidenceUri": null
  }
}
]]></artwork>
      </section>
      <section anchor="domain-lookup-without-assessment">
        <name>Domain Lookup without Assessment</name>
        <t>An RDAP response for a domain that has not been assessed simply omits the
extension member:</t>
        <artwork><![CDATA[
{
  "rdapConformance": [
    "rdap_level_0"
  ],
  "objectClassName": "domain",
  "handle": "unassessed.tld",
  "ldhName": "unassessed.tld",
  "events": [
    {
      "eventAction": "registration",
      "eventDate": "2025-06-01T00:00:00Z"
    }
  ]
}
]]></artwork>
      </section>
    </section>
    <section anchor="illustrative-scoring-dimensions">
      <name>Illustrative Scoring Dimensions</name>
      <t>This appendix describes possible dimensions that an operational scoring
program might evaluate when producing assessment results to be carried by
the envelope defined in this document. This content is entirely
non-normative. Nothing in this appendix constrains implementers or defines
mandatory evaluation criteria.</t>
      <t>The intent is to demonstrate that the envelope model is expressive enough
to carry results from real-world assessment programs, including those
derived from existing empirical research on registrar security posture
<xref target="DEEPSEC2025"/>.</t>
      <section anchor="possible-registrar-assessment-dimensions">
        <name>Possible Registrar Assessment Dimensions</name>
        <t>An operational program might evaluate registrars across dimensions such as:
the strength of customer identity verification procedures; the adoption
and enforcement of multi-factor authentication for customer-facing and
internal systems; the possession of recognized information security
certifications such as ISO/IEC 27001 <xref target="ISO27001"/> or ISO/IEC 27701
<xref target="ISO27701"/>; the correctness of email authentication configurations
including SPF <xref target="RFC7208"/>, DKIM <xref target="RFC6376"/>, and DMARC <xref target="RFC7489"/> on
registrar-operated domains; the existence of documented security policies;
and the regularity of cybersecurity training programs for staff.</t>
      </section>
      <section anchor="possible-domain-assessment-dimensions">
        <name>Possible Domain Assessment Dimensions</name>
        <t>An operational program might evaluate individual domains across dimensions
such as: the strength of owner identity verification at registration or
renewal; the level of SSL/TLS certificate used; the correctness of SPF,
DKIM, and DMARC configurations; the implementation of DNSSEC <xref target="RFC4033"/>;
and the absence of the domain from monitored abuse blacklists over a
defined observation period.</t>
      </section>
      <section anchor="note-on-existing-operational-programs">
        <name>Note on Existing Operational Programs</name>
        <t>Existing programs such as PIR's Quality Performance Index <xref target="PIR-AIP"/> focus
on observable abuse outcomes and operational metrics within a single registry
context. The assessment dimensions described above focus on structural
security posture. The envelope defined in this document is agnostic to the
methodology and could carry results from either type of program.</t>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
