<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-carter-high-assurance-dids-with-dns-01" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title abbrev="hiadid">High Assurance DIDs with DNS</title>
    <seriesInfo name="Internet-Draft" value="draft-carter-high-assurance-dids-with-dns-01"/>
    <author initials="J." surname="Carter" fullname="Jesse Carter">
      <organization>CIRA</organization>
      <address>
        <email>jesse.carter@cira.ca</email>
      </address>
    </author>
    <author initials="J." surname="Latour" fullname="Jacques Latour">
      <organization>CIRA</organization>
      <address>
        <email>jacques.latour@cira.ca</email>
      </address>
    </author>
    <author initials="M." surname="Glaude" fullname="Mathieu Glaude">
      <organization>NorthernBlock</organization>
      <address>
        <email>mathieu@northernblock.io</email>
      </address>
    </author>
    <author initials="T." surname="Bouma" fullname="Tim Bouma">
      <organization>Digital Governance Council</organization>
      <address>
        <email>tim.bouma@dgc-cgn.org</email>
      </address>
    </author>
    <date year="2024" month="March" day="22"/>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 84?>

<t>This document outlines a method for improving the authenticity, discoverability, and portability of Decentralized Identifiers (DIDs) by utilizing the current DNS infrastructure and its technologies. This method offers a straightforward procedure for a verifier to cryptographically cross-validate a DID using data stored in the DNS, separate from the DID document.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ciralabs.github.io/high-assurance-dids-with-dns/draft-carter-high-assurance-dids-with-dns.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-carter-high-assurance-dids-with-dns/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/CIRALabs/high-assurance-dids-with-dns"/>.</t>
    </note>
  </front>
  <middle>
    <?line 88?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In the ever-evolving digital world, the need for secure and verifiable identities is paramount. DIDs have emerged as a promising solution, providing a globally unique, persistent identifier that does not require a centralized registration authority. However, like any technology, DIDs face challenges in terms of authenticity, discoverability, and portability.</t>
      <t>This is where the Domain Name System (DNS), a well-established and globally distributed internet directory service, comes into play. By leveraging the existing DNS infrastructure, we can enhance the verification process of DIDs. Specifically, we can use Transport Layer Security Authentication (TLSA) and Uniform Resource Identifier (URI) DNS records to add an additional layer of verification and authenticity to DIDs.</t>
      <t>TLSA records in DNS allow us to associate a certificate or public key with the domain name where the record is found, thus providing a form of certificate pinning. URI records, on the other hand, provide a way to publish mappings from hostnames to URIs, such as DIDs.</t>
      <t>By storing crucial information about a DID, such as the DID itself and its Public Key Infrastructure (PKI) in these DNS records, we can provide a verifier with a simple yet effective method to cross-validate and authenticate a DID. This not only ensures the authenticity of the DID document but also allows for interaction with material signed by the DID without access to the DID document itself.</t>
      <t>In essence, the integration of DIDs with DNS, specifically through the use of TLSA and URI records, provides a robust solution to some of the challenges faced by DIDs, paving the way for a more secure and trustworthy digital identity landscape.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="securing-a-did-using-the-dns">
      <name>Securing a DID using the DNS</name>
      <t>Much like presenting two pieces of ID to provide a higher level of assurance when proving your identity or age, replicating important information about a DID into a different domain (like the DNS) enables a similar form of cross validation. This enhances the initial trust establishment between the user and the DID document, as the key information can be compared and verified across two segregated sets of infrastructure. This also acts as a form of ownership verification in a similar way to 2FA, as the implementer must have control over both the DNS zone and the DID document to properly duplicate the relevant information.</t>
      <artwork><![CDATA[
+----------------+     +----------------+
|                |     |                |
|   DNS Server   |     |   Web Server   |
|                |     |                |
|   +-------+    |     |   +-------+    |
|   |  DID  |<---+-----+-->|  DID  |    |
|   +-------+    |     |   +-------+    |
|   +-------+    |     |   +-------+    |
|   |  PKI  |<---+-----+-->|  PKI  |    |
|   +-------+    |     |   +-------+    |
|                |     |                |
+----------------+     +----------------+
]]></artwork>
      <t>The diagram above illustrates how a web server storing the DID document, and the DNS server storing the URI and TLSA records shares and links the key information about the DID accross to independant sets of infrastructure.</t>
      <section anchor="specifically-for-didweb">
        <name>Specifically for did:web</name>
        <t>With did:web, there’s an inherent link between the DNS needed to resolve the associated DID document and the domain where the relevant supporting DNS records are located. This means that the domain specified by the did:web identifier (for example, did:web:<strong>example.ca</strong>) is also the location where you can find the supporting DNS records.</t>
      </section>
      <section anchor="other-did-methods">
        <name>Other DID methods</name>
        <t>In the case of other DID methods, the association between a DID and a DNS domain is still possible although less obvious than with the aformentioned did:web. The W3C DID Core spec supports multiple ways of creating the association between a DID to a domain. This is most intuitively accomplished using one of two different fields.</t>
        <t><strong>alsoKnownAs</strong>: The assertion that two or more DIDs (or other types of URI, such as a domain name) refer to the same DID subject can be made using the <xref target="alsoKnownAs"/> property.</t>
        <t><strong>Services</strong>: Alternatively, <xref target="services"/> are used in DID documents to express ways of communicating with the DID subject or associated entities. In this case we are referring specifically to the "LinkedDomains" service type.</t>
      </section>
      <section anchor="dids-with-uri-records">
        <name>DIDs with URI records</name>
        <t>However, this association stemming only from the DID is unidirectional. By leveraging URI records as outlined in <xref target="DID-in-the-DNS"/>, we can create a bidirectional relationship, allowing a domain to publish their associated DIDs in the DNS.</t>
        <t><strong><em>Ex: _did.example-issuer.ca IN URI 1 0 “did:example:XXXXXXX”</em></strong></t>
        <t>This relationship enhances security, as an entity would require control over both the DID and the domain’s DNS server to create this bidirectional association, reducing the likelihood of malicious impersonation.</t>
        <t>The ability for an organization to publish a list of their DIDs on the DNS is also beneficial as it establishes a link between the DNS, which is ubiquitously supported, and the distributed ledger (or other places) where the DID document resides on which may not have the same degree of access or support, enhancing discoverability.</t>
        <section anchor="uri-record-scoping">
          <name>URI record scoping</name>
          <ul spacing="normal">
            <li>
              <t>The records <bcp14>MUST</bcp14> be scoped by setting the global underscore name of the URI RRset to <em>_did</em> (0x5F 0x64 0x69 0x64).</t>
            </li>
          </ul>
        </section>
        <section anchor="issuer-handles">
          <name>Issuer Handles</name>
          <t>An issuer may have multiple sub entities issuing credentials on their behalf, such as the different faculties in a university issuing diplomas. Each of these entities may have one or more DIDs of their own. For this reason, the introduction of an issuer handle, represented as a subdomain in the resource record name, provides a simple way to facilitate the distinction of DIDs, their public keys, and credentials they issue in their relationship to an issuer or root authority.</t>
          <t><strong><em>Ex: _did.diplomas.example-issuer.ca IN URI 1 0 “did:example:XXXXXXX”</em></strong></t>
          <t><strong><em>Ex: _did.certificates.example-issuer.ca IN URI 1 0 “did:example:XXXXXXX”</em></strong></t>
        </section>
      </section>
      <section anchor="pki-with-tlsa-records">
        <name>PKI with TLSA records</name>
        <t>The DID to DNS mapping illustrated in section 4 provides a way of showing the association between a DID and a domain, but no way of verifying that relationship. By hosting the public keys of that DID in its related domain’s zone, we can provide a cryptographic linkage to bolster this relationship while also providing access to the DID’s public keys outside of the infrastructure where the DID document itself resides, facilitating interoperability. If a verifier is presented with a credential issued or signed by a DID using a method they do not support, they would have the option to perform the cryptographic verification of the credential's signature using the public key stored in the DNS.</t>
        <t>TLSA records <xref target="RFC6698"/> provide a simple way of hosting cryptographic information in the DNS.</t>
        <section anchor="tlsa-record-scoping-selector-field">
          <name>TLSA Record Scoping, Selector Field</name>
          <t>When public keys related to DIDs are published in the DNS as TLSA records:</t>
          <ul spacing="normal">
            <li>
              <t>The records <bcp14>MUST</bcp14> be scoped by setting the global underscore name of the TLSA RRset to <em>_did</em> (0x5F 0x64 0x69 0x64).</t>
            </li>
            <li>
              <t>The Selector Field of the TLSA record must be set to 1, SubjectPublicKeyInfo: DER-encoded binary structure as defined in <xref target="RFC5280"/>.</t>
            </li>
          </ul>
        </section>
        <section anchor="issuer-handles-1">
          <name>Issuer Handles</name>
          <t>As mentioned in section 4.2, an issuer may have multiple sub entities issuing credentials on their behalf, likely with their own set or sets of keypairs. Because these keypairs will need to be represented in the DNS as TLSA records, the use of an issuer handle as outlined in section 4.2 will facilitate the distinction of the different public keys in their relation to the issuer.</t>
          <t><strong><em>Ex: _did.diplomas.example-issuer.ca IN TLSA 3 1 0 “4e18ac22c00fb9...b96270a7b2”</em></strong></t>
          <t><strong><em>Ex: _did.certificates.example-issuer.ca IN TLSA 3 1 0 “4e18ac22c00fb9...b96270a7b3”</em></strong></t>
        </section>
        <section anchor="instances-of-multiple-dids">
          <name>Instances of Multiple DIDs</name>
          <t>It is also likely an issuer may be using or wish to associate multiple DIDs with a single domain or subdomain. In this case it is possible to expand the name of the RRset using both the related DID method and identifier to more clearly associate the public key and its corresponding DID. In this circumstance, we propose using another 2 additional sub names, the first following the _did global identifier denoting the method, and the second denoting the DID's id.</t>
          <t><strong><em>Ex: _did.example.123abc.example-issuer.ca IN TLSA 3 1 0 “4e18ac22c00fb9...b96270a7b2”</em></strong></t>
          <t><strong><em>Ex: _did.example2.456abc.example-issuer.ca IN TLSA 3 1 0 “4e18ac22c00fb9...b96270a7b3”</em></strong></t>
        </section>
        <section anchor="instances-of-multiple-key-pairs">
          <name>Instances of Multiple Key Pairs</name>
          <t>Depending on the needs of the issuer, it is possible they may use multiple keypairs associated with a single DID to sign and issue credentials. In this case, a TLSA record will be created per <xref target="verificationMethod"/> and then be bundled into the corresponding TLSA RRset. A resolver can then parse the returned records for the corresponding verificationMethod they wish to interact with or verify.</t>
          <t><strong><em>Ex: _did.example-issuer.ca IN TLSA 3 1 0 "4e18ac22c00fb9...b96270a7b4"</em></strong>
            <strong><em>Ex: _did.example-issuer.ca IN TLSA 3 1 0 "4e18ac22c00fb9...b96270a7b5"</em></strong></t>
        </section>
        <section anchor="benefits-of-public-keys-in-the-dns">
          <name>Benefits of Public Keys in the DNS</name>
          <t>Hosting the public keys in TLSA records provides a stronger mechanism for the verifier to verify the issuer with, as they are able to perform a cryptographic challenge against the DID using the corresponding TLSA records, or against the domain using the corresponding <xref target="verificationMethod"/> in the DID document. The accessibility of the public keys is also beneficial, as the verifier does not need to resolve the DID document using a did method they do not support to access the key material. This limits the burden of having to interoperate with a multitude of different did methods and for credential verification, facilitating interoperability and adoption.</t>
        </section>
      </section>
    </section>
    <section anchor="role-of-dnssec-for-assurance-and-revocation">
      <name>Role of DNSSEC for Assurance and Revocation</name>
      <t>It is hihgly recommended that all the participants in this digital identity ecosystem enable DNSSEC signing for the DNS instances they operate. See <xref target="RFC9364"/>.</t>
      <t>DNSSEC provides cryptographic assurance that the DNS records returned in response to a query are authentic and have not been tampered with. This assurance within the context of the <em>_did</em> URI and <em>_did</em> TLSA records provides another mechanism to ensure the integrity of the DID and its public keys outside of infrastructure it resides on directly from the domain of its owner.</t>
      <t>Within this use-case, DNSSEC also provides revocation checks for both DIDs and public keys. In particular, a DNS query for a specific <em>_did</em> URI record or <em>_did</em> TLSA record can return an NXDOMAIN <xref target="RFC8020"/> response if the DID or public key has been revoked. This approach can simplify the process of verifying the current validity of DIDs and public keys by reducing the need for complex revocation mechanisms or implementation specific technologies.</t>
    </section>
    <section anchor="digital-signature-and-proof-value-of-the-did-document">
      <name>Digital Signature and Proof Value of the DID Document</name>
      <t>Digital signatures ensure the integrity of the DID Document, and by extent the public keys, authentication protocols, and service endpoints necessary for initiating trustworthy interactions with the identified entity. The use of digital signatures in this context provides a robust mechanism for verifying that the DID Document has not been tampered with and indeed originates from the correct entity.</t>
      <t>In accordance with W3C specifications, we propose including a data integrity proof such as those outlined in <xref target="dataIntegrityProofECDSA"/> and <xref target="dataIntegrityProofEdDSA"/>, with the mandatory inclusions of the "created" and "expiry" fields. The inclusion of which acts as a lifespan for the document, similar to the TTL for a DNS record. Depending on the use case and security requirement, a longer or shorter expiry period would be used as necessary.</t>
      <t><tt>javascript
"proof": {
    "type": "DataIntegrityProof",
    "cryptosuite": "ecdsa-jfc-2019",
    "created": "2023-10-11T15:27:27Z",
    "expires": "2099-10-11T15:27:27Z",
    "verificationMethod": "did:web:trustregistry.ca#key-1",
  }
</tt></t>
      <t>The data integrety proof <bcp14>SHOULD</bcp14> be signed using a verificationMethod that has an associated TLSA record to allow for the verification of the data integrity proof using data contained outside of the DID document. This provides an added layer of authenticity, as the information contained in the DID document would need to be supported accross 2 different domains.</t>
    </section>
    <section anchor="verification-process">
      <name>Verification Process</name>
      <t>Using the new DNS records and proof object in the DID document, we enable a more secure and higher assurance verification process for the DID. It is important to note that while not strictly necessary, DNSSEC verification should be performed each time a DNS record is resolved to ensure authenticity.</t>
      <ol spacing="normal" type="1"><li>
          <t><strong>Initial presentation:</strong> The user is presented with a DID document, ex. did:web:example.ca.</t>
        </li>
        <li>
          <t><strong>Verification of the DID:</strong> The user verifies the DID is represented as a URI record in the associated domain.
          </t>
          <ol spacing="normal" type="1"><li>
              <t>In the case of did:web, the domain to be queried is indicated by the last segment of the did. ex. <strong>did:web:example.ca -&gt; _did.example.ca</strong></t>
            </li>
            <li>
              <t>In the case of other did methods, the domain to be queried is indicated by the value held in the "alsoKnownAs" or "service" fields.
              </t>
              <ol spacing="normal" type="1"><li>
                  <t>ex.
<tt>javascript
{"alsoKnownAs": "example.ca"} -&gt; _did.example.ca
</tt></t>
                </li>
                <li>
                  <t>ex.
<tt>javascript
{"services": [{
"id":"did:example:123abc#linked-domain",
"type": "LinkedDomains",
"serviceEndpoint": "https://example.ca" -&gt; _did.example.ca
}]
}
</tt></t>
                </li>
              </ol>
            </li>
          </ol>
        </li>
        <li>
          <t><strong>Verification of the PKI:</strong> With the association between the DID and the domain verified, the user would then proceed to verify the key material between the DID and the domain.
          </t>
          <ol spacing="normal" type="1"><li>
              <t>The user would query for a TLSA record. Depending on the record/s returned, the user would verify either the hash of the verificationMethod or verificationMethod itself matches what was returned by the TLSA record content.
              </t>
              <ol spacing="normal" type="1"><li>
                  <t>Note: This may require some conversion, as TLSA records store key material as hex encoded DER format, and this representation is not supported by <xref target="verificationMethod"/>. However, there are many well supported cryptography libraries in a variety of languages that facilitate the conversion process.</t>
                </li>
              </ol>
            </li>
          </ol>
        </li>
        <li>
          <t><strong>Verification of the DID document's integrity:</strong> After verifying that the did's key material matches what is represented in the TLSA records of the associated domain, the user would then verify the "proof" object to ensure the integrity of the DID document.
          </t>
          <ol spacing="normal" type="1"><li>
              <t>This can be accomplished by using either the <xref target="verificationMethod"/> directly from the did document, or using the key material stored in the TLSA record. Using the TLSA record would provide a higher level of assurance as this confirms the key material is being accurately represented accross 2 different domains, both at the DID document level and the DNS level.</t>
            </li>
            <li>
              <t>As mentioned above, if using the TLSA record, some conversion will be necessary to convert the DER format public key to whatever is required by the proof's cryptosuite.</t>
            </li>
          </ol>
        </li>
      </ol>
      <section anchor="verification-failure">
        <name>Verification Failure</name>
        <t>If at any given step verification fails, the DID document should be deemed INSECURE. Whether it is due to the DID and DNS being out of sync with recent updates, or the DID document or DNS zone themselves have been compromised, it is highly advised that the user stop interacting with the given DID until verification succeeds and cross-verification is restored.</t>
      </section>
    </section>
    <section anchor="control-requirements">
      <name>Control Requirements</name>
      <t>This section defines a simple framework to define a set of technical controls that can be implemented and mapped into levels of assurance for did:web identifiers.</t>
      <t>To assist in decision-making and implementation, The controls are ordered in increasing level of security assurance and are grouped into levels of assurance from <strong>LOW-</strong> to <strong>HIGH+</strong></t>
      <ul spacing="normal">
        <li>
          <t><strong>Issuing Authority</strong> is the entity accountable for the did:web identifier.</t>
        </li>
        <li>
          <t><strong>Issuing Service</strong> is the entity responsible for operating the did:web identifier insfrastructure.</t>
        </li>
      </ul>
      <t>In many cases the <strong>Issuing Authority</strong> may delegate elements of providing a high assurance did:web identitifier to an <strong>Issuing Service</strong> that may be a commercial provider.</t>
      <t>In the simplest case, the <strong>Issuing Authority</strong> can be regarded as the same as the <strong>Issuing Service</strong>.</t>
      <t>Note that Controls 9, 10, and 11 CANNOT BE DELEGATED to an <strong>Issuing Service</strong></t>
      <t>11 technical controls are defined. These controls would be implemented in order of precedence for an increasing level of security assurance. (e.g., Control No. N would need to be implemented before implementing Control No. N+1)</t>
      <table>
        <thead>
          <tr>
            <th align="left">Control No.</th>
            <th align="left">Control Name</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">1</td>
            <td align="left">DID Resource Control</td>
            <td align="left">The Issuing Service <bcp14>MUST</bcp14> control the resource that generates the DID document. (i.e., website)</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">DID Document Management</td>
            <td align="left">The Issuing Service <bcp14>MUST</bcp14> have the ability to do CRUD operations on the DID document.</td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">DID Document Data Integrity</td>
            <td align="left">The Issuing Service <bcp14>MUST</bcp14> ensure the data integrity of the DID document by cryptographic means, typically a digital signature or other means. The use of approved or established cryptographic algorithmsis HIGHLY <bcp14>RECOMMENDED</bcp14></td>
          </tr>
          <tr>
            <td align="left">4</td>
            <td align="left">DID Document Key Control</td>
            <td align="left">The Issuing Service <bcp14>MUST</bcp14> control the keys required to sign the DID document.</td>
          </tr>
          <tr>
            <td align="left">5</td>
            <td align="left">DID Document Key Generation</td>
            <td align="left">With proper delegation from the Issuing Authority, the DID Document signing key <bcp14>MAY</bcp14> be generated by the Issuing Service. Otherwise, the signing key must be generated by the Issuing Authority.</td>
          </tr>
          <tr>
            <td align="left">6</td>
            <td align="left">Domain Zone Control</td>
            <td align="left">The Issuing Service <bcp14>MUST</bcp14> have control of the domain zone (or subdomain zone).If direct control of the domain is not feasible, the use of an accredited DNS provider is HIGHLY <bcp14>RECOMMENDED</bcp14></td>
          </tr>
          <tr>
            <td align="left">7</td>
            <td align="left">Domain Zone Mapping</td>
            <td align="left">There <bcp14>MUST</bcp14> be domain zone records that map the necessary URI, TLSA, CERT and/or TXT records to the specified did:web identifier.</td>
          </tr>
          <tr>
            <td align="left">8</td>
            <td align="left">Domain Zone Signing</td>
            <td align="left">The domain zone records <bcp14>MUST</bcp14> be signed according to DNSSEC. (RRSIG)</td>
          </tr>
          <tr>
            <td align="left">9</td>
            <td align="left">Domain Zone Signing Key Control</td>
            <td align="left">The Issuing Authority <bcp14>MUST</bcp14> have control over the domain zone keys used for signing and delegation. (KSK and ZSK)</td>
          </tr>
          <tr>
            <td align="left">10</td>
            <td align="left">Domain Zone Signing Key Generation</td>
            <td align="left">The signing keys <bcp14>MUST</bcp14> be generated under the control of the Issuing Authority.</td>
          </tr>
          <tr>
            <td align="left">11</td>
            <td align="left">Hardware Security Module</td>
            <td align="left">A FIPS 140-2 compliant hardware security module must be under the control of the Issuing Authority.</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="levels-of-assurance">
      <name>Levels of Assurance</name>
      <t>Many trust frameworks specify levels of assurance to assist in determing which controls must be implemented.</t>
      <t>The following table is not a definitive mapping to trust framework levels of assurance. It is intended to assist in determing mappings by grouping the controls within a range from <strong>LOW-</strong> to <strong>HIGH+</strong> relating to the appropriate risk level. Note that controls are additive in nature. (i.e.,, controls of the preceding level must be fulfilled).</t>
      <table>
        <thead>
          <tr>
            <th align="left">Level of Assurance</th>
            <th align="left">Controls</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>LOW-</strong></td>
            <td align="left">Control 1</td>
            <td align="left">
              <bcp14>SHOULD</bcp14> only be used for low risk transactions where attribution to originator is desireable.</td>
          </tr>
          <tr>
            <td align="left">
              <strong>LOW</strong></td>
            <td align="left">Control 2</td>
            <td align="left">
              <bcp14>SHOULD</bcp14> only be used for lower risk transactions where establishing the accountablity of the originator is desirable.</td>
          </tr>
          <tr>
            <td align="left">
              <strong>MEDIUM</strong></td>
            <td align="left">Controls 3, 4 and 5</td>
            <td align="left">
              <bcp14>MAY</bcp14> be used for medium risk commercial transactions, such as correspondence, proposals, etc.</td>
          </tr>
          <tr>
            <td align="left">
              <strong>MEDIUM+</strong></td>
            <td align="left">Controls 6 and 7</td>
            <td align="left">
              <bcp14>MAY</bcp14> be used for higher risk transcations, such as signing and verifying invoices, contracts, or official/legal docmentation</td>
          </tr>
          <tr>
            <td align="left">
              <strong>HIGH</strong></td>
            <td align="left">Controls 8, 9 and 10</td>
            <td align="left">
              <bcp14>MUST</bcp14> be high risk transactions, such as government transactions for signing and verifying licenses, certifications or identification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>HIGH+</strong></td>
            <td align="left">Control 11</td>
            <td align="left">
              <bcp14>MUST</bcp14> be used for extremely high risk transactions where there may be systemic or national security implications</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Per <xref target="RFC8552"/>, IANA is requested to add the following entries to the
"Underscored and Globally Scoped DNS Node Names" registry:</t>
      <artwork><![CDATA[
+---------+------------+-------------------------------------------+
| RR Type | _NODE NAME | Reference                                 |
+---------+------------+-------------------------------------------+
| TLSA    | _did       | [draft-ietf-high-assurance-dids-with-dns] |
| URI     | _did       | [draft-mayrhofer-did-dns-01]              |
+---------+------------+------------------------------------------+.
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="DID-Specification-Registries" target="https://www.w3.org/TR/did-spec-registries/#did-methods">
          <front>
            <title>DID Specification Registries</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="W3C-VC-Data-Model" target="https://www.w3.org/TR/vc-data-model/">
          <front>
            <title>Verifiable Credentials Data Model v1.1</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="alsoKnownAs" target="https://www.w3.org/TR/did-core/#also-known-as">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="services" target="https://www.w3.org/TR/did-core/#services">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="DID-in-the-DNS" target="https://datatracker.ietf.org/doc/html/draft-mayrhofer-did-dns-05#section-2">
          <front>
            <title>The Decentralized Identifier (DID) in the DNS</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="verificationMethod" target="https://www.w3.org/TR/did-core/#verification-methods">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="issuer" target="https://www.w3.org/TR/vc-data-model-2.0/#issuer">
          <front>
            <title>Verifiable Credentials Data Model v2.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="dataIntegrityProofECDSA" target="https://www.w3.org/TR/vc-di-ecdsa/#proof-representations">
          <front>
            <title>Data Integrity ECDSA Cryptosuites v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="dataIntegrityProofEdDSA" target="https://www.w3.org/TR/vc-di-eddsa/#proof-representations">
          <front>
            <title>Data Integrity ECDSA Cryptosuites v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC8020">
          <front>
            <title>NXDOMAIN: There Really Is Nothing Underneath</title>
            <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer"/>
            <author fullname="S. Huque" initials="S." surname="Huque"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document states clearly that when a DNS resolver receives a response with a response code of NXDOMAIN, it means that the domain name which is thus denied AND ALL THE NAMES UNDER IT do not exist.</t>
              <t>This document clarifies RFC 1034 and modifies a portion of RFC 2308: it updates both of them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8020"/>
          <seriesInfo name="DOI" value="10.17487/RFC8020"/>
        </reference>
        <reference anchor="RFC8552">
          <front>
            <title>Scoped Interpretation of DNS Resource Records through "Underscored" Naming of Attribute Leaves</title>
            <author fullname="D. Crocker" initials="D." surname="Crocker"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Formally, any DNS Resource Record (RR) may occur under any domain name. However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies. The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., "_name"). The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch. This specification explores the nature of this DNS usage and defines the "Underscored and Globally Scoped DNS Node Names" registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="222"/>
          <seriesInfo name="RFC" value="8552"/>
          <seriesInfo name="DOI" value="10.17487/RFC8552"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="Self-Sovereign-Identity">
          <front>
            <title>Self-Sovereign Identity</title>
            <author initials="D." surname="Reed" fullname="Drummond Reed">
              <organization/>
            </author>
            <author initials="A." surname="Preukschat" fullname="Alex Preukschat">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
          <seriesInfo name="ISBN" value="9781617296598"/>
        </reference>
      </references>
    </references>
    <?line 337?>

<section anchor="w3c-considerations">
      <name>W3C Considerations</name>
      <ol spacing="normal" type="1"><li>
          <t>We propose the inclusion of an optional data integrity proof for the DID document, as outlined in <xref target="dataIntegrityProofECDSA"/> and <xref target="dataIntegrityProofEdDSA"/>.</t>
        </li>
        <li>
          <t>We propose the inclusion of an optional TTL ("timeToLive") field in the DID document to indicate the amount of time a resolver should cache the document.</t>
        </li>
      </ol>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA71c63LbyJX+j6fopX/ElklKpK9SZSeRJXmsWJK9kjyTSWoq
AYEmiTEIMLhI5liuymts1W7VPss+Sp5kv3NOd6NBgh7PTLKquZAg0H369Ll8
59IYDAZBlVSpPlC9V8lsrg7Lsi7CLNLq+PS4VLdJNVfHF1e9IJxMCn2D2+ZJ
GCdxL4jCSs/yYnWgkmyaB0GcR1m4wEBxEU6rQRQWlS4Gcww6CO2gAzxZDmjQ
QZyVg71RUNaTRVKWSZ5Vq6WmsWK91PhPVgVZvZjo4iCIMdNBgLkfBe/16jYv
4oNADVSmP1RqpjNdhBWep0t1lkR5wR/LZVi8T5NspuKkrIpkUlc6VqmOZ7oI
bnRWY0ilZiClnmBVR6eXh2fhpNz9HME9PJGCmLIiPlTVsjzY3Y2SIkzx5FDG
Gib5Z8fY/WL2DOfVIu0FQVhX8xxsGGB28Kc8UH8YqiN+nq4I0/+gy1J7V/Ni
dqBoUfRFL8IkPVA/0D1Dmfn3RDY+t0c9C6u89kcNo7/VuvSud44rdw1Tvqtj
5POh+joN61g3I5+H1TzRtXedR77Ii2qui+xFmkfvvSkWcvvvM/P7hH4Hq71J
rofqRV4vwmaO62TRXOLhjxNsUpiqr/MbDMJifpTXWZSk3lxVshhO6LHfx7No
EM2yIZ4NApLyAnQkNyw56kqn08EVDaSTWTY4JZFNqhX/hj+rVe3blL2tZ26z
m6vM38B9Mss6HqpLrWPvsizuuKgXizyL279uPH44VG8LXb8vo3lYbQxymOoP
m7+Xukh0Sett6FKnVy8uDtT+s+ejp6Nn4/2nT/afmx9ZPdV4bzwKgqzFIpiQ
wdVSR8k0iVhHB5d6xtqoy3U+4V7Vulc191pmVWEx09A9q3q3t7fD20e0PbvX
l7tQnkGJEQaFe3D3Hl1caPA4LmmQbx8dDb45GhyHVTg4z2OdrpPxDdY+TcJJ
CskoNG9WmJaKHlD8gLoZDUdfRtBNNIhpogU9t0uPYKj8dZbfZoeb69cRJoMp
SX6EnRIxmSa6KNV9ssQPaN69L2cEzKDevUfzDd7ThDAygWztTRJ1cP9fMbud
zIpCkg2gvAO4k/Xpr+fwN1tIYAoeQJpVRXeRL+omg3iN56P3uhgmupoyQfBK
u2RHjdldhKtink9heYlM9kFPQGfEwjmmgW9YAEQEz1lw/l945U/rCyx8Y62L
XyCl4y+loSWlAzy2e08mDUS3w9MMjr6AzXpb5Pn05Oj46nCDJTSxu0/xPaBs
tazysk7gMH8GT4ieZKCjuAx37y1pSij0stAlVsnsKbcQFv//EBZ/hrBgMBgo
YAESwyoIrudJqSCB9QK3qLyugEcwZahkgxUcikoWGOqGcAqJN7kD2s0I1PYJ
uUTkOcJJkvKFEPZ+CRdoLqh8ulVtnDROVqqucPuPdo6oLgqiB6pE0K0IQW4d
VXWhefykKlWlo3mWp/kMNnSoeBmG5Hw6pbFDRWsEeKmwhtuwAFlFHumYBqFV
hUaPoL5VriJm+KwIl3OIeJqucCUvy8ENqCbvgdvJ/NclwzXasrKCVsSe0vdh
uoDo6OZpkS/kMp6x3B0K7xdJHKc6CO7Rphd5XLNmB8GpDKRB1UDf5OmNAENB
A0CUadznGzI4U14AbIJlyE2jbIl4b3AFiqmIngXgQzUUsDwPbzDFQkOIYhUS
k8AUoFuaq8zTmkjpK97umK6FapbmE+YHgCsgFH4Ec+G7aHuSxgJW8M1YKWbN
8koV+m91QrQpf+eN0xPXKagCEjJUr/JbWnVfpcl7Ws+q2VwIFNM9DYGD4P/T
VGczWhqYpYtFSeL18wRyaGQe/9wCpmnZphy4KlMXQBzqaoXFLSCaF1cP8LS6
1Wk6AJ4Gd5NyTmzDgI4rPnJPoMRFpsEHrD2CeKysM+urKF8w2RC1ZRpi0S9W
QPpE58wKvf6AsejLptT3QYWKwkzpbM6QkO737bHIdsn8IIYNG6ACKt3jNQD4
NXB8SQwBZF5h565IjEhTDy0fZcT712dXhw94te+yhIAl4E4J9Izpfdf37vL0
AZOMNSPuKUmbwpjYRP9LaCwIcMpzgboW1TS4v330LJOPTcLsbkjsDc2AteS3
WARPUZZ5lIhmRrqoZFANEK2WNbYqUgjEJDgkZsWyw4QpvX2X8UkWplASVjCM
7os/rxtk+1MskyzDr0OFpVsS+yoX/c0J/EPPaDQZiCi8DXltTFk5R6ywxCCz
UgzFPC8rIozXhTExWFlHc9JPwwwIC5kbIimCSMCTKof1iY2IBSqxUM2j1vzA
WALfO7v5VpjzGsw5bVvW+29fn1oQU2p/S538NAtytpM5DGsIJwHrs4L0a9jf
iAC2NchsXtvG1N93Z12NGScDkmfQLZ0h6NTlhteh/Vg3rmpCHACWFCEpxXGR
QoZsX4VO8At0g3slAh1oLByPHYh+Zy5GrEegeWMK4eSQTTXFqRkpNt2VsPeW
vTAK6NIS2BBPE3F7kdczkUnSRtzOks5q5ouTYTWZ6CKf1GXl7DPRVsKcWDZ4
ZpHMJK+KSMAYofPaJIDi9RZwW77vwP6X1S0FrSvnbowTgYnCHWUULvWQHNZR
nt3QD8AR/OixniZZYnAFAWRWOdbY3vm7q+teX/6vLt7w58uT/3h3enlyTJ+v
Xh2enbkPgbnj6tWbd2fHzafmyaM35+cnF8fyMK6q1qWgd374XU+Mfe/N2+vT
NxeHZz0RZh/ghKT4uZrInhWARhU7wgCcjmDHxaG/OHr7v/8zeqw+fvy3y5dH
49Fo/9Mn8+X56NljfIEJyWQ2llT5Cj6vAmi2Dkn0SBChNEtiKPYCGlnOEeUo
Mj7g5s6fiTPfH6jfTqLl6PFX5gItuHXR8qx1kXm2eWXjYWFix6WOaRw3W9fX
ON2m9/C71nfLd+/ib39HeFINRs9/91VAIiTehk1rg6cMgAqCc7JdjAIMaOVf
b2E4E2BI9m54iAypM0SUnoIZIl+aMhpw2UHaFGWR6wqOqxFrUoQZlBfgOGVf
hDtgwAglkJ53m1bx3iGUhAAmSZNxKveZYrOIBzBbBMRKMYpJCmFwToSsoDJW
EKMbg2ecemlsSUKRkqilcrhDbJyubrXOrPEoRH/XzFTfGn9SRn8pZMAh+EAi
QIUGxxgzji9CG/G6hC3Ts5AUo9QVM72NRgzZYm0j3MFA0i4SMg6EOE+WbVdP
CuEYYtzh+OWho5b9B9GPZS1o6QxVo5wwMjYWY6lJbpw5uaYf80x3rt+IB2Aq
wbNaNti6e4jJ2g5DFSmuejhY+3uoui/z3Xdq7e9OdV92dxPJVwCDWIZ/97d6
4l3+hWM/9Elu7m5fdnffcaYD//8t/SZ3DAZfucu/ZuyfTQkgRxclcvnXjP3l
HPzynWcXFychXP2CDAPkM0nTmkMaaC+sO4cLE0b92FEL2To01MotpKLjZgIC
dEsLA5fzkMAQXYdNfd+t42Ku7ITAMqLVuStakPRv0WqY53utsIEBQ5zEB1hT
EHxLgMZ8Y19X6H/8/T+JIAw0F4NIhLWsFC2QAlbNKBD0I64VXXT4PW5rr2WN
sa0+VjfKW9ZLstQ2UrL8Idee5qTrscsHINKRyNQb0cCxBv2ZNfnR7H1auf4Q
kk3q2xsOdnbMpWEU7uw8UNYG0iA8M+NMJhjuhu0t8JEsp5to4fkbDhmICzar
ZpMBUSgQMV+/o9/iIc1ruS6uigE2z2RWDVoRXAKRLCEQCSUKwpQAL6BoynHj
5CbJa+ZW1kRNIUmWID7wy/CBuKspTc0zHTGcBE/tEsH3Oq0SigZg5kvxe1p8
7OeJFu/K9JodpE1EcESet04opIBQQqjhwUwsLviBXAGBYTivxjljI1Pm8M6O
l9Pe2Tlg8kEFRXQctJF84FFsOWNjhu/38U24TkU/XgW0somuQj+ifID9nEoe
ifeagkxaUFlPfkAoZD3vIoy1h3g+fvToAqYUp8UZip2dK5OYJnoPU8orhLL+
Pp6zWWs8RFIPKMCw1dcjVnr9gWBU2exDvlhQ/VE2w+2yTyoho0YzbSppqE4N
kmaJRDRI8/Ki2Wi1QxzhQu8MxkDHklopezYVwvwUuW/iJC/yCQKXDuIJfXGh
xMxCNpysk59kw51YmSReOOOwnmHxpqD9M5lO5tvHj+3U/6dPLuBlySWYOfHH
Jlsk6VTAnL5EnIJpjVB4oT7GTIo1a1d6WUPe7Z2TDwfqL9CvobEwA8lvw9Co
0wumfaT21D/+/l+kg+aegz/K3z/+/t8YwaS1fMoaYFmaHA+jLU4jMQy+zes0
dsm6LVjLWJPGgrLV9zwXh/daMBYoaHPK2z6C23EdWfEn0Jwm85wzttAN4DS2
QACCwI95ZtEZa6tJJnMEm1GhNMySH0MbDVtehxgU1kLi4qQQVueNJ7IGe6Iz
RK6cRgE/Eg9mM2zv8mKQiHkC1Sc5myRgWAVaIYTG6Om4ceqbxXzPmixThOjl
Az/36Hs/qCsH/exIaL4FkDIlRBgNO+MSE0Rnm2fSFZQOFkr6ZtdNW4GfC2Wt
u+dpgsLPlIcKggEbRasfHIjCYNHP4icBGZwBl9wn1C3GPlFpSLJqJhtBo19e
4n7amB2S6R11f+/Dk5dq78PTx/Sfff70wFBzyoKuXoF7cERBcJiZghIvnZft
/AmMlPKy22UtCbGmuiR7jZ2f6HmYTtvJMM81hBENKXnkkAzHDSW1IWB20Bjz
Qdhh+E5CjCBrg+Vzszvi2Pf4nsNJH+z6UL3MC1ELaEiZZy5f5BL/vIluzXNm
AwemEgDbND2Wbj15ZuCQycWaraQ9aGWNTEbOhFpYMsmAjYRiTjVHfsaqb8hu
sqelyLTPYEpxCK2GDjzQMjnkw91qsPYih/A2uf62sXNc/hVWzx/PS9L+qjEh
lhSBsGvyMbgYIwNVyKCYPK4XBrBDMdVa9djfD9oIsJqSQD8NhQS/yY73ObeZ
5XYEDqtXMkZYtdjPTo/SyXYGbzNFMPGApDI4GczPErJrDDvF1R353lZ9jC1k
OJNUWp6WlXZC7okCDBjDzDL3M+rr6VWetEVmXZENtPZkrfy3xW6aJLcxn/1G
3Hl3KKlA2MraQXU69VPYVCdz2mby2Y3QizDHbGJd1tjPXrlaKStHnLO9dtaY
L4qjdTY8XzrPpQvOmzDYb7G4lTyxmV5H1G9KJiZknjSQ0qt8bJQn12sqks98
+nT/uWBPs9Ge2cCsVpbatPkRZ2sCMug8yaUYpSvxL33qROKKmHpJqBzBJOfm
vF23kmgKQIwvjVtvrYKsob+Mg3+m7xLSv8x5yaztdbXGMXaZc1lEjww6Ai8E
aksh5rVenVIXkzo+uRzoLMopVJ4kWUjFw6boXcLlTxu8Sjv3ZPx879OnbV6U
ol8bt/kWaTjuewb6n+FiGcc1lTZxfLxcrlFLqgF7vAyTAv70hY5CKnyIP7XX
8ThiUy5tS3red4Dbd7/v11HWveg6zPd4INN93ie2IYMvqxuez5oz42p+jpPj
1TyyPumxHj0Po/E42tubTvaHw+Fk/+n42V74bDL+Zf7uS4d/1Lg+6ksAHM5M
vv3cSgapZRCcVg5Fm41vS9PEmqOcSoMU//il2oU/WFM6zGapS88wkp3YLEAr
7Ex4bpfAkADXom5fj0WFhQ4XyFgL02RRpCbq9TDkAuOiVIeUPG7oXrOttpYK
GYSQLvOMXRtXMB3BSQHXJHxkd0rRfV5a7oSZhANjv0ZOusd1YBHrKfQCWDW3
0SVdo223RsyjHJ9yZ+NkcU08ArmnJszWPaAVLgQi1Bl9DkfjR+Ek+hdIrBlx
PHz85OmvnuELhJbK3G/JwATBMec/JXvgGmlKBzOYgP6GjJH3JrkmG+Ok11kt
L6xvC7PBiOSjRVoYMnt2tC3a1GfiOw02TxNt4uqYYAKs/mbfHyWAZJc5wTSp
ye7FUqhiwNAS0Ma9DdWhTcYWDPR4hGVYlDbXCreTccuOeNUphzHrA24SZOCO
UXxbfxfmYAiBrl+S8vBkoLddAh73aP//SYM96TlhesEJAnFdTcOEn7ahNFU3
zMY9LZzlh2QI+zLKByx0BB+VlAvHWL8XTbjkiSXzz1bKVoyNQmMBLYBcR+iu
KUCFM8q/NUWBBi12SEfTzVK0HjTGeduzW2TTsstvgpPsK0cBSdMiuMHEjUyN
KxQ6TrluMwsb/PJCKzqwOJ2M53aszq7KhCemtGL7RUw6Ok0W3Ho4J1UroMoM
kU2TRe7FGXAZxh6wzahqiWe8yrGjRCo6JAZeyOFz8yeCGQkVYwkpuEvjMk95
Nkjp1ckRD90cmQm5Hf/GVCusP58n8xkcHu3+YkFHW2IJFamFgbcmLKj1Bs62
KpumivVmETxdSvOclMAtBWQFiXQr69LfZs0174Th2hCAWht8u//o6WPGt2YU
p0dtQW/q/a7Q41eFnCUD1SKwpZZCw9+gWEaXbG8Rc4fxMInFhNN/IaUjjX23
he+mxQAXjZBT9pRO+xhhNsGDreSZr1sMgwEDjVUgaMPNTzZdZJqDvcYni0G2
hM5rYXPSSi1KgtZPoVvwNeUxuYQ/lJKf3W04wIG4KrMfXmCvic9WpmB6dPRe
XAaDL4nnqAuzIZXdn0hVnYZF3xSrZE+kT8nWFHxWGveI3zcZyn5Mtpsw6cUf
j9+cH8L4m76dvTGipUYEkoaT7Y7BOcwM7zyt6L2rJYZLLJVSgTQLx8jWRHud
l35mpmli5n4P2wrdwQuKUVuZcdfhy4Uu/cFnrpMRzvm6pglTH7EsazVHk02w
p4quXNKAiOCmdPVNmNbaF61jYzeheuYxl2sof1Iuj1tFbiwNSsFdGW0L3/f7
/0wDa5VHeWqSjrZaBGO0zBMyOxl1AJWhkQ9pkxEH7DWweR1/ZVPgckjZVLRW
4oVM3BhvLtIKvVXqzWa8tgdfS8mt84KFqtukiB7D4nKGCZRk3EvgFJP9LBCU
oZsrw1QBLWJngLgUW/rnkspWxIGYNq1NOyt3rjf7xkcEvCQ53d6ujG05XWGA
Z+fvMf/eb9i/wK0ht0MzKSVvjhGZnoG4PWndQ0CXFKueLd7yNrmH6BmpijRd
R1BDqDRV2o1zaZosbLORwcLX12fGsjT+Yag2ogISCo42RQpNb7SpkRnBVqnA
OIpV51T9oWYBIpzgWAJ0Ifm+iSnNhp7wYgf/+te//hDehNRvuKyCHu9B70B9
5G6UHpVHe+ZYSJuxvb7cETVnQ+hGPoYy+GEaDcZ7o/3mJmErbhjvjR8NRnuD
0eh69ORg/Az//MnexmTrUm7b39922ya6oydsXwQroGnuXwFy34OCD0b87Cda
rWmcaURPO9Ez3YiUH5PcqoVqnaFFKJpEneVN4OW7gMq0/67B6nYWtVMHvIMd
pPQha8BaKnodxyYtH06RPFX8bKN7+1iC7XLz+/HcPB042YiQlxFzlUbX1jPe
aEUUY/+Nv+i34p6C4F3Z+JfbdudMFhsu5NIE0EEPWxQD6zZ7iE0TZgOMOs8m
OPzHiRIGnk3TZcVY3KA4KR0wNq+KhKGK0yAHQFpzQA+NypmIiGw9+esqWeiW
ziuuU3CkEHtAy98ucHE0VDs7p6YX0z9BdbCzY51Hd+WgzTX9Yej6h5ruoWEw
pvG/6ZBOPN6awoQ7Xj9/uVkd9LCR2TtPQUwujTR5ZNIOTWeR39DldS+Aj4TF
yGPSLsFCcmOVbZlKQ+pH1zM5NGZzpTCntNydnc0Fq8FX7QwTdVARReMNigQL
ewHSz6TthuHMnNLxhhc9r8+mR0a7Z9CF8zPmcN2IF2C+tM20XPvYGoqMr1tO
71PHGu3ZZDKC8mn801PY7h6M/+ePzenmXgKj2/OrlpKlu5dyn81AGGQstmr5
knYnjn+HmevEoKye99IAb2mfWRlM/Pfm86dmVcGjbeL99vUpife3rsOsowTq
hzje1tteZZf0L4yRrEyjd2SMpZc/8YP4nxjfKsh1e3A/JPFcTQdykB92m5hz
g1BDmE5YxOlHuDPbXdDl8iy0bF81xU6sK6KGlVu2mKEX6xpNaAVHhGTpDKKT
9IuczsRLo2ToEI6cLInooEdRcvZhreQihcU2Y3HLHGGKLV8dn1wqcXM2Ce3b
LFM2LP3Ui9DcnUXyzgdWXPylkH1BpwTpZJ43gpcXWAEXToqwcC0eN/RZApU0
zGZ1ONOmM3StCNSs3LqtYfD4M7bamfrflA2mIAk/nFa6MzCAHuHeFv9aO7lm
340Na22BmX7DxndrhqcOBmxaP/8FaYbm8KrVDk5Zc7q51YlJZ3gZYXjSvSUt
2JF+SGLPZ0Lqm0Rji1HtonZLHRt400qkMxu+5LQIAzQJ+aYJnSzdmJx627Tp
YagpW8UZM88Tb4dlfcmEeKGhw3lCit8QzleGxjm2Crncc96n3EXdtdr+uvK6
OkITO1OzHv9uSHGq6udAcBOJIimdiCObBmdXWIh+YxNxHIhIQ2dLR16GSQrR
QsQ6pYWTws6SG81dnGtnQ6a41bj5Fm8aUIf4mBDd6QWA37vLk6H6dq5ZzKRe
E9faP7HHZ9PASdku6oinKHeVRYLRCj6PruolnUWUXPfG1LjmTpngxwUs7o02
56c5iifR56PTZOcTk0WdzalsGN/Q1UbjWSEhussmPeG33wpXODWPjU7XcG0d
RVynkk4sPkXZOlbDYJbVwh7R4ybOyyZgLU1rqK1/SyeB1yI2LcKFvs2L98RD
+ZV+1ALtKJVEnb22P9TYTWMDmmM7Uk6ljihbgWJBLttq5h0p8AqYfOCXC8UJ
d3uDiigp+T0T4Xupl8Zrya4+O2pHEzkFqIA25iHJKABmJXG67oL5sJUNpydn
RV5/nmyyVDs7Z2++HcC2U3PIzqvTr189pILRgCIF0ylxaDvdcFciNsQkx8lY
Yn85gHK5ig1GDFujmSbwjbFMFjOxY0n23FqEjvMMMEFrRz0AutmHEuqWsbsX
QdAg1imfB1Na+M+88Q9Jk+B7zGoT0BTXITFda2NxMr0DIfeo6yKSsIvNdjF0
5yFEYMvKFE23k22kk86xFbFESfw8NQmE6+t1pGCiCxeDHlnR2u+r0Z4gmdFI
HR1e0JnIFyewnWcnXx9enxxvXxviyFGXBpHMmYYeBpylJ8kud+SrFjdGxJJY
WJL9irXVpvBLpX2o7uvhbNh3NuIiBwrcTDT48070lNCeu0RTtB5/OHoQBHfe
peYzeH13rCW4gcLeBXeDAf6Rf4O70R2ZPPdKAfPYHWn1Gh+lp8u2pwvUNk/x
TpkXrHkxcpOluZ8M9ZCSF5MSbuoB5h3ftVKz52EGMEgft0/tGvdszY3sZK6O
Lt8dW93jlGZHuRMTPmpP2H7fy/ZJPWS2lrHqPP6+WquL8eGnPp22MMcyws1E
t3Jt6Xx3KyvOBY8b6Xv0336xVn1LZ6Ry8wUMtyKLePadf1wYq3/cXj01ZPys
rTbdgQaB2J6KLj4/2Zzpa/fqvTuOOOWIjTVoDD0sBN2wIg0ecUPaQiZhpPPD
70hZrOw5cLS2oKGc7rpNrL3yx7C9gVsHccTQ+p7emdeU/IlAyU8ysX1+dupH
0oxq7vudVnzpwfB0asD5lgdN1DYlYzNJ9Xr7HSFgHSfcZQXwZO232iYbz1or
OpdmalpRoV0fp0+ye8OIeIylyWZabMsHtAgPw8SdXF6Txd7FIq//eO2/m4Q3
wZ0B7HDBIOx5i7Ar2TJmdRc5ruVUUthSnjE9AZKrhB26vLw6/Zrsz37X2Fv1
wklA16be6GJjW1lfuOwwNR3LFj81Ug9yXl+95ot/unpNRI32tlLl6dB1W36b
lTcCzJ21riDuSVCnSI9Gd6/goG/JH7r30JzncZ3qu0P18vTtlRo93huMpRKa
hFxKM/c7B7fg+50y/SwKgJjPHNxzXRJBcM5vIeIj+A4dl0ZsVp0IsWrDV3o7
EaN8rlc5526J9HysOeLk9fnJe5xE1ULBCYm8T8UcNyApbtPWRZLLsVPmx5zA
7SLRvYwGxoeBcNPjYyGJ9AGECuPOPgeGTUesIZEcJnmRZcFNlEVSGjol+WTi
CB8TSTPkDR8uERdlPXi/udG2CzEMajCPZe20TqcIe3VMJ4zuziwecptrAUq5
AU58dGKXd+fgzujOFKv48KGt7ZGSUcGJF1fRq5Vc9VmSVZWcBTNdwrbEm7NR
jHUJa0vbPbRTYkY74fhzE0LEt03pvLU7ZuJCDw89dFDSEHJ+cnz67ryhpVSP
+uoxG4wnd8bzOWoQmCf1Qsjx0LtPWXMQq+kbk9fnSJGa35Ciq8if/aHH/FI9
5cmfbUxuEjoNL1wF3M7om8AmHZdkNzkl2Y1cUUGZEwH5VNrNdslWpoQvXMTJ
tJGgtwh73lf7Ehvs3VlzyPHQxvY0JM343a7ysgp//9YtdkNuClqzksl1Pd+C
OQvnuqI2lQ9bwjtyxDnW6Q8VJQggW930NmdtOOHKIij9XQB+eF5OaBKetJaY
22IMZXfN214qdm1USS3sSwiv3xy/cb/yu/AOLw437nrLba/cvvPkyZh6Cvg2
k5KCnBujFkvyrDGh9NK5RFt3H/TeufMekqX42r6+7UpOiRBauchjzUFL2bNv
qlsdrL8cpPVWiI1XRHzmz7435PJSXa+WGp/+cvHm+ERdHJ6f0GXNCUP4kZ/6
W39pxa+miBOI/Imby80s6s/yNlJ6S+lnXwH9vXvpBhUhtw/U8VrT0ff/mqU9
NG9anITRe5It6o9ZF63RUH3btMhU620mdMh4acS7s19g2pE07G8eLP/F7TNc
If5SCqm15X6PKt3X+RncZ++BFDY7GwvkZSDNS3Hk/ZDsFqRU7hrDTfo1CqO5
bvXWcKbxMKK39tIBZ0kyfjyQl6Hr+N97Uxh03ftk9Dx0d+ph8H/xcLGoz10A
AA==

-->

</rfc>
