<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chuang-dkim-replay-problem-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.1 -->
  <front>
    <title abbrev="DKIM Replay Statement">DKIM Replay Problem Statement and Scenarios</title>
    <seriesInfo name="Internet-Draft" value="draft-chuang-dkim-replay-problem-00"/>
    <author fullname="Weihaw Chuang">
      <organization>Google, Inc.</organization>
      <address>
        <email>weihaw@google.com</email>
      </address>
    </author>
    <author fullname="Allen Robinson">
      <organization>Google, Inc.</organization>
      <address>
        <email>arobins@google.com</email>
      </address>
    </author>
    <author fullname="Bron Gondwana">
      <organization>Fastmail Pty Ltd</organization>
      <address>
        <email>brong@fastmailteam.com</email>
      </address>
    </author>
    <date year="2022" month="October" day="21"/>
    <workgroup>Independent Stream</workgroup>
    <keyword>DKIM</keyword>
    <keyword>Replay</keyword>
    <abstract>
      <t>DKIM <xref target="RFC6376"/> is an IETF standard for the cryptographic protocol to sign and authenticate email at the domain level and protect the integrity of messages during transit.  In particular this enables DKIM to be able authenticate email through email forwarding.  Section 8.6 of <xref target="RFC6376"/> defines a vulnerability called DKIM Replay as a spam message sent through a SMTP MTA DKIM signer, that then is sent to many more recipients, leveraging the reputation of the signer. This document defines the damage this causes to email delivery and interoperability, and the impacted mail flows.  Part of the reason why this is such a difficult problem is that receivers have a hard time differentiating between legitimate forwarding flows and DKIM replay.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The SMTP protocol was originally designed without authentication, and to allow indirect email flow.</t>
      <t>In the years since, spam has become a major problem. In order to combat spam and help detect whether email has come from the source it claimed, various authentication mechanisms have been created. SPF, DKIM, ARC.</t>
      <t>SPF lists the IP address ranges from which email may be sent from a domain. This is a very strong signal of correctness, however it does not allow for indirect email flows, such as email forwarding services or mailing lists.</t>
      <t>DKIM adds a cryptographic signature over the contents and some of the headers of the email message, created with a private key only known to the sending service, and with the public key published in DNS to allow receiving systems to validate that the content hasn't been changed in transit. It is more robust in the face of indirect email flows, so long as they don't modify the content.</t>
      <t>SRS rewriting allows for email forwarding in the face strict SPF or modifications that break DKIM (i.e. mailing lists which add footers with unsubscribe links or links to permanent archive versions of the message)</t>
      <section anchor="the-problem">
        <name>The problem</name>
        <t>Since most domains (including bad actors) have SPF or DKIM records for their domain, receiving systems track reputation on SPF and DKIM (in addition to IP range) to help classify incoming emails.</t>
        <t>In early 2022, a particular type of DKIM replay attack became common. Attackers would create or compromise an account at a site with a high reputation - which allowed them to generate an email with the content that they wanted to broadcast widely. They would then send an email with this content to an external account under their control. This single message would be delivered to the attacker's mailbox, at which point they would have an email with a valid DKIM signature, and with the high reputation of the sending site associated.</t>
        <t>Due to the ability to BCC emails (which means that the ENVELOPE-TO does not match the To or Cc headers signed by the DKIM Signature), this message could then be replayed to arbitrary other mailboxes, sometimes thousands or millions of mailboxes would all have the same message delivered to them.</t>
        <t>ARC was created as an experiment in 2018, to provide additional authentication at every hop in the email flow.  It has the same "replay" issue however, as the DKIM signature is still present and an attacker can remove all ARC headers from the email before replaying it.  There are no external indicators that ARC is expected to be applied, so a recipient can't tell the difference between a message that used to have ARC and one that never had ARC.</t>
      </section>
      <section anchor="glossary">
        <name>Glossary</name>
        <t>This document borrows terminology from <xref target="RFC5321"/> and <xref target="RFC5598"/>.</t>
        <section anchor="administrative-management-domain-admd">
          <name>Administrative Management Domain (ADMD)</name>
          <t>Defined in <xref target="RFC5598"/>, this defines an actor who administrative policies are the same.  An ADMD can be a Mailbox Provider, Enterprise Service Provider, and Internet Service Provider.</t>
        </section>
        <section anchor="originating-sender">
          <name>Originating Sender</name>
          <t>This is a service that originates the email meaning is the first SMTP <xref target="RFC5321"/> MTA sender.  It also is described as the first ADMD.  Likely this was in response to a user submitting an email, but also potentially from automated systems. Regardless, it's up to the service operator to authenticate the user/system that is submitting mail to them, using whatever mechanisms make sense for them.  The originating sender typically DKIM signs the message.</t>
        </section>
        <section anchor="outbound-filtering-service">
          <name>Outbound filtering service</name>
          <t>This is a service that a sending service such as the originator can route some or all of their mail through, instead of sending directly to the recipient's configured server.  This should typically be transparent to mail flows. It may provide spam or data loss protection services, and may modify the message.</t>
        </section>
        <section anchor="destination-receiver">
          <name>Destination Receiver</name>
          <t>This is defined as the service that receives the email and does not elect to forward it elsewhere.  It is the last SMTP MTA receiver, and ADMD.  For simplicity, this excludes things like autoforwarding and mailing lists, as these behave differently with respect to authentication signals.</t>
        </section>
        <section anchor="inbound-filtering-service">
          <name>Inbound filtering service</name>
          <t>This is a service that is configured to accept inbound mail for a domain by being listed in the recipient's MX record. This service would also be configured with enough information to forward email along, either to a subsequent filtering service or to the destination service. These services are often used to do things like security scans and spam filtering, but may also modify messages before forwarding them.</t>
        </section>
        <section anchor="mailing-list-service">
          <name>Mailing list service</name>
          <t>This is a service that accepts mail sent to an address, and sends copies of it to a configured list of other recipients. This service may change the message prior to sending to list members, for example changing the subject or adding a message footer.  Mailing list message may be DKIM signed by the originating sender or sometimes when the message is modified by the mailing list.</t>
        </section>
        <section anchor="forwarder">
          <name>Forwarder</name>
          <t>This is a service that may be a standard destination service, but additionally performs forwarding of (some/all) mail for an address to another recipient. Split out explicitly due to challenges in authentication for flows involving this type of activity, and because flows involving the same service as both a forwarder and as a destination service can be thought of as two independent (though related) mail flows for the purposes of authentication signal propagation.</t>
          <t>Forwarders are very similar to mailing lists, but have a few differences that may be interesting:</t>
          <ul spacing="normal">
            <li>Different headers (List-XYZ, X-Forwarded-By, etc.)</li>
            <li>Different features: mailing lists often change subject, add footers, etc. but simple forwarders such as auto-forwarders often resend the message as-is</li>
            <li>Envelope from address may not be handled the same. Lists usually send as themselves, forwarders not so much</li>
          </ul>
        </section>
        <section anchor="esp-bulk-sender">
          <name>ESP Bulk Sender</name>
          <t>This is a forwarding service similar to mailing list service in that they send to a list of recipients.  However they are commercial in nature and they often disclose and DKIM sign for the recipient in the headers.  ESP Bulk Senders also typically do not modify the message body.</t>
        </section>
      </section>
    </section>
    <section anchor="mail-flow-scenarios">
      <name>Mail Flow Scenarios</name>
      <section anchor="direct-delivery">
        <name>Direct delivery</name>
        <t>This is the "standard" mail flow. In this case, the email is delivered directly to the MX servers for recipient.com, which stores the message for consumption by "someone@recipient.com" through their mail client. \</t>
        <t>In this flow:</t>
        <ul spacing="normal">
          <li>SPF is likely easy and safe, assuming IP ranges allowed by the policy are stable and aren't shared (ex. Cloud-based mail providers)</li>
          <li>DKIM is effective, as there is nothing in the mail flow that can break the DKIM signature</li>
          <li>DMARC is often aligned and a strong DMARC policy is an option for some senders</li>
          <li>ARC isn't really necessary because there is only a single SMTP transaction, and all authentication signals are available to that transaction</li>
        </ul>
        <t>ESP Bulk Sender</t>
        <t>ESP bulk senders will originate messages given a message body and a list of recipients that then become the RFC822 To recipient.  A ESP Bulk Sender may have DKIM signatures of the brand and the ESP Bulk Sender, or one or the other.  The ESP Bulk Sender will administratively apply policies to protect its reputation.</t>
        <ul spacing="normal">
          <li>SPF is likely easy and safe, assuming IP ranges allowed by the policy are stable and aren't shared (ex. Cloud-based mail providers)</li>
          <li>DKIM signatures should survive ESP Bulk Sender flow</li>
          <li>It may be feasible to apply strict DMARC policy assuming the brand aligns the RFC822 From with SPF or DKIM domains.  However in practice, many smaller brands do not pass DMARC though there is nothing technical that prevents them from doing so.</li>
        </ul>
      </section>
      <section anchor="delivery-through-an-outbound-filtering-service">
        <name>Delivery through an outbound filtering service</name>
        <t>In this case, the originating service decides to send the email to an endpoint other than the one specified in the recipient's MX record.</t>
        <t>In this flow:</t>
        <ul spacing="normal">
          <li>SPF is likely possible, but may not be advisable. The filtering service should be able to provide an SPF policy (ex. by publishing an SPF policy that covers their IPs and instructing users to reference it in their policy). More potential for IP sharing, which weakens the authentication.</li>
          <li>DKIM is likely possible, but may break if the filter performs any modifications of the message. Such modifications could be done if the filtering service has the ability to resign for DKIM after modifications on behalf of the sending domain.</li>
          <li>DMARC may not work, depending on whether SPF/DKIM work reliably.</li>
          <li>ARC could help in the absence of DKIM resigning capabilities, and may actually improve the state of things by removing the requirement that domain owners grant such services permission to sign on their behalf.</li>
        </ul>
      </section>
      <section anchor="delivery-through-an-inbound-filtering-service">
        <name>Delivery through an inbound filtering service</name>
        <t>In this case, the email is sent directly from the originating service, but the service listed in the recipient's MX record is not the destination service. The inbound filtering service that is listed in the MX record will forward directly to the destination service.  The envelope recipient and the header recipient remains the same.</t>
        <t>In this flow:</t>
        <ul spacing="normal">
          <li>The inbound filtering service can do the same authentication as a normal receiving service. There is nothing between the originating service and the filter that would break SPF/DKIM.</li>
          <li>DMARC can be applied at the inbound filter service in the same way that a destination service would apply it during direct delivery. SPF is available and there is no previous intermediary to break DKIM.</li>
          <li>The destination service would be unable to perform SPF authentication, because the required information (connecting IP) is only available during the SMTP transaction between the originating service and the inbound filtering service.</li>
          <li>The destination service may be unable to perform DKIM authentication, in cases where the filter mutates the message in a way that invalidates the signature.</li>
          <li>ARC could be interesting in this flow. The inbound filtering service could produce an ARC set describing the authentication results it computed, and the destination service could verify authentication results through that.</li>
        </ul>
        <section anchor="mailing-list">
          <name>Mailing List</name>
          <t>Messages are sent to a mailing list which expands the list of recipients and forwards the message to the envelope recipients.  Note that the envelope recipient changes, but header recipient usually remains the same.  The message may be modified such as when the subject is updated or a footer added to the message body.</t>
          <t>In this flow:</t>
          <ul spacing="normal">
            <li>The mailing list can do the same authentication as a normal receiving service.</li>
            <li>DMARC can be applied at the mailing list in the same way that a destination service would apply it during direct delivery. SPF is available and there is no previous intermediary to break DKIM.</li>
            <li>The destination service would be unable to perform SPF authentication, because the required information (connecting IP) is only available during the SMTP transaction between the originating service and the mailing list.</li>
            <li>The destination service may be unable to perform DKIM authentication, in cases where the mailing list mutates the message e.g. adding a footer, in a way that invalidates the signature.</li>
            <li>ARC could be interesting in this flow. The mailing list could produce an ARC set describing the authentication results it computed, and the destination service could verify authentication results through that.</li>
          </ul>
        </section>
        <section anchor="forwarder-1">
          <name>Forwarder</name>
          <t>Messages sent to a forwarder will have the envelope recipient updated to a different recipient at a different MX, and routed to that different MX.  A forwarder may add headers but typically doesn't break the DKIM signature.</t>
          <ul spacing="normal">
            <li>Forwarder can do the same authentication as a normal receiving service.</li>
            <li>DMARC can be applied at the forwarder in the same way that a destination service would apply it during direct delivery. SPF is available and there is no previous intermediary to break DKIM.</li>
            <li>The destination service would be unable to perform SPF authentication, because the required information (connecting IP) is only available during the SMTP transaction between the originating service and the forwarder, and it's not scalable (or secure) to have forwarders controlled by the recipient listed in a sender's SPF policy.</li>
            <li>DKIM signature should survive forwarding, unless the forwarder also performs modifications to the message's content or any signed headers.</li>
            <li>DMARC at the destination only works if the message was DKIM-signed, because SPF won't work.</li>
          </ul>
        </section>
        <section anchor="forwarder-rewrites-envelope-from">
          <name>Forwarder (rewrites envelope from)</name>
          <t>Similar to the normal forwarding case, but also updates the envelope from (MAIL FROM) address to be something related to the forwarder, instead of simply reusing the envelope from address from the initial SMTP conversation.</t>
          <ul spacing="normal">
            <li>Forwarder can do the same authentication as a normal receiving service.</li>
            <li>DMARC can be applied at the forwarder in the same way that a destination service would apply it during direct delivery. SPF is available and there is no previous intermediary to break DKIM.</li>
            <li>The destination service can perform SPF checks, but the check would have no relationship to the originating domain because the envelope address was rewritten to something owned by the forwarder.</li>
            <li>DKIM signature should survive forwarding, unless the forwarder also performs modifications to the message's content or any signed headers.</li>
            <li>DMARC at the destination only works if the message was DKIM-signed. While SPF may pass, it won't be for an aligned identifier, so the result will not be considered for DMARC evaluation.</li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="dkim-replay">
      <name><strong>DKIM Replay</strong></name>
      <section anchor="scenario">
        <name>Scenario</name>
        <t>A spammer will find a DKIM signer with a high reputation at a victim mailbox provider who the spammer intends to send spam messages to.  The spammer sends a message with spam content through the DKIM signer to some spammer controlled account where they can obtain the signed message.  This captured message is sometimes updated with additional headers such as To and Subject that do not damage the existing DKIM signature (such as leaving off those headers in the original message).  That message is then sent at scale aka amplified to the victim domain.  Because the signed message has a high reputation, the message with spam content gets through to the inbox.  This is an example of a spam classification false negative.</t>
        <t>The victim domain spam system starts to observe a large amount of spam, and reacts by dropping the reputation of the DKIM signer.  Benign mail from the signer's domain starts to go to the spam folder.  This is an example of a spam classification false positive.</t>
      </section>
      <section anchor="indistinguishable-from-forwarding-flows">
        <name>Indistinguishable from Forwarding Flows</name>
        <t>DKIM replay attacks always have a valid DKIM signature as this is needed to take advantage of the good reputation of the DKIM signer.  After that the spammer utilizes whatever other authentication needed to get past the spam filter.  Typically such a message has a DMARC aligned RFC822 FROM.  They often have a valid SPF though not aligned with the RFC822 FROM.  This DKIM pass and aligned and potential SPF pass but not aligned looks like an indirect forwarding flow message.  Legitimate indirect flows often look like this.  For unmodified messages, the often will have a valid DKIM signature that is aligned but will fail SPF or will be unaligned.  Example benign indirect flows are outbound and inbound gateway, mailing lists, forwarders, and ESP bulk senders.</t>
      </section>
    </section>
    <section anchor="proposed-solution-space">
      <name>Proposed Solution Space</name>
      <t>Here are some potential solutions to the problem, and their pros and cons</t>
      <ul spacing="normal">
        <li>
          <t>Include the ENVELOPE-TO in the signature somehow.
          </t>
          <ul spacing="normal">
            <li>This avoids replay to destination addresses not anticipated by the DKIM signer.</li>
            <li>Many indirect email flows are impacted just as badly as they are by SPF, since forwarding involves rewriting the ENVELOPE-TO.</li>
            <li>This will detect DKIM replays, but not distinguish them from all other forwarding.</li>
          </ul>
        </li>
        <li>
          <t>Cache       known DKIM signatures.
          </t>
          <ul spacing="normal">
            <li>Since the exact same signature is being replayed over and over, this allows a receiving site with many mailboxes to detect whether a message is part of a DKIM replay set, and suppress it.</li>
            <li>Mailing list traffic, exploder aliases, or regular BCCs will also show up as duplicates, so this is very much a heuristic guess of whether the amount of duplication is expected or not.  This may lead to spam filtering false positives.</li>
          </ul>
        </li>
        <li>
          <t>Strip DKIM signatures on mailbox delivery.
          </t>
          <ul spacing="normal">
            <li>Messages delivered to a mailbox are not able to be replayed any more.</li>
            <li>May require two signatures, one that's kept and one that's removed, with both required over the wire.</li>
            <li>Doesn't help against an evil mailbox server, as the attacker would just avoid stripping the headers. \</li>
          </ul>
        </li>
        <li>
          <t>Add a per-hop signature, specifying the destination domain for the next hop
          </t>
          <ul spacing="normal">
            <li>Messages with this kind of signature cannot be replayed down a different pathway, since the destination won't match.</li>
            <li>Requires every site along the path to support this spec, so it will need to detect whether the next stop is making a commitment to follow the spec.</li>
            <li>If email goes outside of sites with this spec (without disclosure), traversing a naive forwarder remains indistinguishable from replay.</li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="other">
      <name>Other</name>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="RFC6376" target="https://www.rfc-editor.org/info/rfc6376">
        <front>
          <title>DomainKeys Identified Mail (DKIM) Signatures</title>
          <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker">
            <organization/>
          </author>
          <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen">
            <organization/>
          </author>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy">
            <organization/>
          </author>
          <date month="September" year="2011"/>
          <abstract>
            <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message.  This can be an author's organization, an operational relay, or one of their agents.  DKIM separates the question of the identity of the Signer of the message from the purported author of the message.  Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key.  Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
            <t>This memo obsoletes RFC 4871 and RFC 5672.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="76"/>
        <seriesInfo name="RFC" value="6376"/>
        <seriesInfo name="DOI" value="10.17487/RFC6376"/>
      </reference>
      <reference anchor="RFC5321" target="https://www.rfc-editor.org/info/rfc5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin">
            <organization/>
          </author>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="RFC5598" target="https://www.rfc-editor.org/info/rfc5598">
        <front>
          <title>Internet Mail Architecture</title>
          <author fullname="D. Crocker" initials="D." surname="Crocker">
            <organization/>
          </author>
          <date month="July" year="2009"/>
          <abstract>
            <t>Over its thirty-five-year history, Internet Mail has changed significantly in scale and complexity, as it has become a global infrastructure service.  These changes have been evolutionary, rather than revolutionary, reflecting a strong desire to preserve both its installed base and its usefulness.  To collaborate productively on this large and complex system, all participants need to work from a common view of it and use a common language to describe its components and the interactions among them.  But the many differences in perspective currently make it difficult to know exactly what another participant means.  To serve as the necessary common frame of reference, this document describes the enhanced Internet Mail architecture, reflecting the current service.  This memo provides  information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5598"/>
        <seriesInfo name="DOI" value="10.17487/RFC5598"/>
      </reference>
    </references>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks goes to Emanuel Schorsch and Evan Burke for their advice.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1c3Y4jt5W+11Nw7Qv3GGplMka8zlyl5y9p7HQ8mB5svIvc
UFWUxHSpWClWtUYJDOQ1Fth9OT/Jnu+cQxZL6h47WCQIFjFgu1uqIg/Pz3d+
2ZeXl4vBD417bl792/WNee+6xh7Nuz6sG7c3t4Md3N61g7FtbW4r19reh7iw
63Xv7ufv5GcXFf2wDf3xufHtJiwWdahau6ct6t5uhstqN9p2e1nf+f1lz+9e
drLf5dOniziu9z5GH9rh2NE7168/vFm0437t+ueLmlZ+vqhCG10bx/jcDP3o
FkTIV4tD6O+2fRg7eqWtXefoP0T37dA7u18sfNfz03F49vTpL58+M4s7d6R3
6udmYS75IPi/nGVhx2EXevlqYeifzdg0cobfOb+zB/OSDyFfhn5rW/8nOxDR
z82vQ9g2bklUVCv+2u2tb56bA7/4qy1/varCnhY/WfuqaVxr3oe1b2No/4q1
bc/vfHLxF31oaYG2PtjWPrD2GxsHrGbeDUfzdqjL9df07vZXG31iII7yHotF
G/o9vX9PUllA2NNvl5eXxq7j0NtqWCxYUf785395/+bl11/969fff298JJ1i
6Zo4kHbZvjb0vhl2zlT9sRvCtrfdzleGlGMIVWjMEEz025Z1ERIi+XromlBp
7MAv14F+a03j7l3Dj+J9V8mXviXV7D2dMGzM3sVoty6aeuw9CZNobaMfVob4
azrb0+pjY0ESEUuqTyoaReWJkrUz+OAhQoYd6eF2p7/RoQ50ONqAFr4lQojb
5pvV16BgxpHabXxLO1hzPzat6+3aN6C0sqQW9czWLJ6Knd2nM5gIZU8bW3N7
8+GduflwJW+Ba65f0vfCoxbclzeC2dv2aPahd6Z3le88fRyXzL7ebpktO3zV
jQMrCsjGJ7LmynwAc8jCR4aJdAYWhN2DMuZeZceIj4MypXYNqUl/ZAFBKH3o
8omX/CmLa9+R+tDhhZNNOERi4jsSTSKDrJtMxRx2R9kIBxsrsKD2mw0EOBhF
F3zHHKBzOuwezc7ekwTpf6R8g987fsn1kCcdls6+dsPBOWjT1tMDkPEkTyGI
iWU2C5itjCj/3td148hGPid1GvpQjyz6xeIDkc3yyYp9IHmG3hO3SdRHYg4z
tzYHTzA0DqWO0QrKnmDo4XAg7tW+h367zKTVYkEaDPYcnaVjRt9WhBqsMDva
a+3IenHwvf0DmZzyZwW1J0R0PRanJ9bEK34H++1c0xFlbEmHnaPFe90RK/J6
mz7sRTfC2FckvcFUjSW21ktzD8cxxpOjkPpWO8KguFdZrMHsioRKQl+Z23dv
lszapbl6/5JORR+YxsdBFOz6nbF13ZMFGLJcGDJTcCDQSMa3J2NZq3Xwl1bx
QRXXs7lBEQmpCONYrW0D7apCD7aSNpM57MIBBoEj1YE2asOg7AdmPSACekf0
MJ7BAFHT3/vKQeas2PiMT7VSoKRTga45DDJlw0h2GkAJ4yQ5SZgrCyhCBGoV
O2dr6Lf+qrwQqFgm/rJ60TZd7++h2OQQTWhJ/+7acGihAyxLcqQF0aJ8/Ca+
7cZ1Q7ThVf4x7hzs2bz67e2koWJvvMgxUozAOHBvGw93nkEpnQb61P7wl/8a
VBl2EC0vmvH5eoDgBLPCmnw6f0tLbGzFPHhEIME0kLFl9SE7C7LPPpDZH0sa
oGrvb4nwA/kKEM4HiSzsM3GWe5MWedoWegrhYmFVdcUeipvsncDFhV+51VwB
VHdJ/rQBeS0SIbN6pGhnHaveky7T03esOvIDsZKQk0Cco7S+2hGyQaMj76kK
oKJ/AjT63ACA1ObpnMAGojQOahmRCGurZuSzrS252moIfXwiBqonU7wjG6lj
ctu+1xWWD0mc4oC7mRtpea0MnrQpzu35SzoUGTcb9RP8wuBDWEJxIQmKyAt7
LM6iiIJ2BHSkus+ePnu2hE4X3pvCSPChgGgKFQaQQzhIoRHAax8IEa74U2Z6
GJta7QTHpSeIYRSXOgQttqrCCG4P8MKeHlFL2nlyvsUZL5M8oT2OXdoex9k6
uPeBFxN1ygaVjCBZxZGcQwtjRcjRB1tXFITR4+RAj8AwPMDEsluHsZ4tCveb
Vg387UfSLKBcOsjY1i6JEI/2oVF8JM9BAWWOMmQrUkL130IX6LbKOzKoyDq9
Dh+X4JBwoAu+TefhNcTzzii1gglTyMJodwI4pyxO0UhCKUiD1CRUnl0IAero
Mo0aUNGvL16+VO0xF0Lh3tlko3j29W///fXbb9+9vvzw7YT45P8rIeNDgFq8
rDLSqsdeC4zwEW7TEZ4sRQqJi9UksLVTlRRO2n7tyVLIHQV2sMpIx+C1dwhR
QCM5UmKK+A/fNMnS89PKY1I74TNzCJqeKDgV354YRR6WA5HkHWwUXSF08Rzb
kYE+e/rzb5YMOX24Jx3MFgtlmnt24qNjx7oLXYLIIkIxAPGdILHQ9sNf/ltY
8cNf/ofgPZLc1OsuFbFPNINjvYHOT9S4mJJU2KfqIkWdLbF3H6Bq9BhOmOSV
YxWhae02EgGDAAZ1pAFkXvShpX/bMFkNnAsdkjBR1AXLIkEgTlXJUumtrms8
Ih/yOnYKrUETO53BNY2EyRpyVi5HmzYLijeg0JlXZVliN5wztPpty4HJjoBa
YiQg/K+bQO/3RwSbZXi+ppgGfoxOQgAamrA9CickEfnFV89+TokIltcPfvHL
b77/Xhb93FzV9JJHSoccz9xQHrmV6sArybkurl7dvCIn84qzAPbZ5TpqBjnP
acW1EEQQi+Zrd4HCCo+H+kl9SSJXrcEeLFkwmYhgnUfFAgpJuvIa2QTFNITV
txKzFF/iaNd4oHXD2dfpnN9KKM6O/xZ1hF75yNGiBkLCfI3aB015UqBFIS10
SD7c+J4gmyP+GZuRnkVeXqzBNqQqzB/x9HVSe1kA56YH3/o7gn7hJMzVQ8Vj
h5IIIwi0pTdcRRkkdFGQXZr1qJt0YeAUB8mGRMXjEPZs9eqvV5Rpbim+aTj6
9cMX0YzdFBIKBzhlgwCxb5kG4yGQ8TNZTVjFmVmmShJlAZ8lPYzPDvQYK3OR
FeztHaN7dCnM2IthZtZLcCoe7Nj5ik+VkSKW8U8W8DisyfFRkIViRl+Et48K
2p4Gwjm8HwpagmIOJW1OA/KeoUfclO9NWSAgxrbEH7Jc+jotL4Frc0zMzsjx
Bbvxjd+OwG1QwYojbnonLiWfn2yDo2WKg3KaP2XQ1wMnRgnEOccjQikctwbI
kUomwPGUrIjt4LUiXD7h6ytHeNwK/r/XJHviaK2okEC/ZK+m5KUVYbvseV3D
FZyQ4m4kYq6J7gCEFvNRa2tsMjbYV0r1hXo1oTd01uj3HSAG1Qap73xEzMsU
kBgiRdd3XNwJRaQvHCji9eSZIrCb4TkXEEgIHLTAOJX2Ew8pqWZMzLtu/1qd
9DONwAZV5To4alkpJSo56UV4snaJek2qTnTs5juN61MEqDumkCKydyv25VO6
lgtPuQQoMXwSlgoUydfSOM+hDWMVshr3x5Gz89NjGwEWdpGFXum3HPtGN+XS
cBRhQ7iW3WUdZrKMrhq58hcrRHqcMkPx88YCkNBwPqWqeS4SaohQqIMGTiy9
m0ItfhxMWE4SJ+c6nG1TNUOUFYAAAXdwg8hp5amS9bwZfSXB4lS+OxEdjiRp
dGm0yPuFxQl66Edece9QbScyON39aMlSnCyQyoEktz9AqaFbtZhGXlYSVzKz
GUvSt1qQmcqSOWZ+AM9hpznsPSBeLunnEgAS7GmN0jiJApXNGxHZJ9y4UmWn
UvQDKqcONEe8ZOHkAKHwsdQKkscFqP4ZPfGksMEsXhH2icxW5pbwiDhKW1Ak
ydCEUqBkL8R8tAaghkiT5ziC1aUS6dv70NyLkACHmvlSlEXJeKqrIukd4U7P
XtFAPHEGhcLAedkmMVAibLDvAf6koAz5yXbHigl0PAREzLkhcyFf08kbBBxP
CseU6//d2Hchito/CJpwUJ3d8kdkgVnAAgNSz/OUGtk+ub4CsiFFLfxu3KGI
v+NMGbgqzafcPidFWnxpjHmV0D3nERdvadHL7/7jP5fmu8tER335gpjthmr1
5OS1jePUJT4/qfsIcqmRqnUtyzqQLMe0s+tyk1BiDkXgri6Lz2VVTo7qmenY
eOkjk/a6vXcNBXIaB6qGggVwu8QGIqlupHahQfhbpniMI5uAlBzYC+6ja+6d
4EYiAasATIlCtcbXt+/Mi7G5eyC0Pq+RPibG/D17sFQqkXMCJBMylphofqNF
XH4WioLCj+srz0md0axSew9H5V7tY0UxkZsqVdyDSqo6JXbqS1UxaLuTg0Zx
K1OMRv6Jiwpn4RSZXX1kx8IYat6giDo1XznDeyX1zdRHmbiIdT5LMPaZKTJu
bglwLya6ZRFocWiW6gGn4SeFAxJqinVOeEW8W2pxJ1Lc62aBNj+LNu2479hs
CZ8/AyhS1vqr2Rqf5aZVER9XjUDi7xfayCAScYZsh6gcevHrRKqzURpJ0W5Q
L4q0LRQllRBjLsCpm+DsUlSAOMVdPCgxWegXpFk7C0ZcuI8r87IJY325tjG1
oDRk7qMaNvQBwSPZN0DWpYBQqhMA+aJCnGUhKstwyeXg89qGrH6jpQXRRNuI
v2RaU79CntEDSU81dNktcAoizlTMXRbEMWljKGFLATKXCrJfyNRzL8CmEiCH
1JxT2GrqQiG3eTisZe7aezoyM5jVCXY6rbBYnEEBPljjA6WZgkskTynJnoKx
LfG6rJPAYpQx56Zf9D218wWGUyL+zbNnqOQVTthcnZotYyG7i7mEcm193UvZ
SSDy5O0lYhiUahQu2OtrAnu6EZ91XgeBALoOgUaqh0jtjbtwnk42VUJX/5C2
UbBLc9Q4EnDfn58edsHvXWcPTM4yelUeYYO2V2ZKn49UCKPJmb9K+Q03BpGp
lA0MbXgUroEstcPEAod73BmPe4RevawcE2h3tKuSofHMmdGTjHYtoF7Ur+tp
A1FGtxdvWwf2dEGLdq9STzy38VuEg49mhed4Pg+hxUHWpNy1KE4OA1yqvqA2
1NZSnJeAlGgVsILSInOV+PqTieJPAmkK6FiYU5alAYat732EonFK90AeqIqT
Bi7K6rP0kFQRWCvXuRGpta/iAUHdwM5MvM31u6gTCKRZ6M/TOyhcMbt6l+qy
Pnl3ekXWerIyN8gGcyWN4ZaMChbCuaS4xgPBu1NVnOPkauZAHmWSOAi/0UIg
eDNlHTK5UfYY5/0+SioQGc4fqXIPByKerVxyPdXmi6ZJ73LoI23qDag5IaDl
SkizOe3MaNu9cGxJBzC5tTSSIXAC1eYBAxLez3grPIOUwZMKHFfZlclZuDuo
GmrXkUU2NfxAM5atbCdn8WUxi2xd4liPDl/qlQzc99uk+gEpFbcRpmmYP44U
J+1zo07LK+HQQne2BBWDBOW5PIEerYy15TGmkFRKGPYJFPCPl4Y+EdRxYSHH
c7nh8QBIiLqVRbmfUB9SrPtkgeZxynMFa77TtDp7w1RAOo1KH9yPN3Qpn5kC
8+SaJTIvvuid9LtzavMIkH36IAjj6jClz6d9MCQ2PCbXlG3xgklzt5F6QI/h
eTqNYgGzUduyDBXJZEpLS90SaUmlQbn5keYZlZ7lYI+p/P1Qwq81QXbNmIyR
Mbp6npqskiOYgkE9Qzo4+0aeDuKce+9qj4CUO95pWmKVJfE4IXTEsc0+QkBS
hgxO5qeKUDfZcj2rXV5Q7tI68QfX755M0XA+QhoZ3J1Hxj9ZhI/q1KcPq9HR
+VEFlE/OSuIENnD9THtpKvA9IseTvA3VpUnqvk1TOmokKZo7ReB5uURUSK3o
x3BAFuh4Po49OlaNbkhtsMTlE7OircaGoinMmIU9BcFotSbGPlic4n1IIZFs
P7LYlIra4bSwi6rHYnGTEhCOj1Pldl6a0Pmzjx0HjNyTOE9JQKqi21wCinDn
OIYw9behHJh6AOukgpSKXKeAl2o2Z8AnynZSo83F1VReyhXYVP716ArW3Dfk
LoPUqlBFmgZDZjUNlGQfhdgZE/9vqPqj2Dfb65+I9/dCvFl9/m8LcjMJPwR1
brVdTd0LUd3l3wwA58r9D455RcMkA94EdlM3gGO0PGH0ABwldOD3cmu0jM2G
2Rc338mBuIFe56JR+QDXaCYSOIav61yP50C2KLE6LnY9VmbLRZN84r818EyU
/xN1/l6ok3kuysXTLNyXICXhTS5QKkV7WKdNodFFD0NHIpupSDYp8JS+WC1a
0uJTzWH1QCnstBI2dT2WxNeGO4QzTZGZnZT0nwwVz7zsF9OoJ7ccj6nHmroS
hX7a89SNeY9UO6a6QB78tHLz5VLWm0SLox4CbAzvnQGIuZAZahcneEAm+gSD
x7mzg53UpooWkKS0eWhJsCTOoYaz2oubq+u35s37b2+elD3WtYzgSFql7ca0
W6ES5QwOOmsIj2Qe6XyntHpOpn3rufrDukmsR21pXo79J7L8JGTBmUooqXau
uotTYYJ/L2eH2yAyhRXsfJ5NK3EgDb0UKJTFmSQJxRYVRYsFpZmsMqjmZIvP
3P1/atEr87udb8SeeTbMyuCfGvfa5SEG7UJ5dPORH/Q84iqoiJBCogIt7qIH
iJ6Ak8t9QqejoGrMVvK5+fLL4m7bl19KHSz1OxeLK57T2ad4Y+O5zVNcbHts
/J61nrRr8Ps0G52bFDx0ylaia0NxOV/TOnl5uw6fao6UHpfpnKkBxSTwO9ME
f+5rzohVHcsrFd4lzePnKPbIdhHWg002LczP9V0Z9KlsN/BAUDEaMw3OpCBM
uDQNbOfRdU3vPgS55avJnRY2WZL5Kh9Z0EcvMe6JCVykZRpn72UOBgqHznna
yM9cdb6Q9ISPYYeS+kFvM3CECD9NFntnDUaRJCdVK1Hppjtd5kVh63NecUH7
TEeWc5s4E+LWlSFyyGWbj4n1XqfkZUgK8yq6gFxWyTM6ZPGEWW7LbT3Ogz+c
ki8v6shsHGw/sDaGNTfg0dm0PWY39qwjcFf0vMbLjkIirlPXfei6x29tForI
3GpRiJa+dL68x99+ETNVmZJtyBPAPDgXmnoaQf2rGNGF6JkRYuvXbS1KNfq4
Y//C1LyZYgGMQES9HTe7w4P+Jfm4fJXzoSsk0pMXGlvnUnECk8W2vrftANkr
g7Yh1D/Kt6tNLr2WEDIOlOP9ibNQHWSWntqJo59IIO0C0A4FT7k+Bp7mHEav
s87VWAFfsTg1OSkCEphKwyszpgDatVkp1xenS6ZMwOkqXi87c68zt1V1AGFq
fHGwi0fgqsuFmxDu0hxtO13JO7k/W2DZ2+mS7fQ0D4bJabCgrAdp6iDv2OY6
VUJrbYbyO1OK+ohupD5EohqnED8Dq9BuMX8gaU+j7tK8VlVfixGdUMzjqKl5
Ky1G+ZkQwJHCLk+n0qZ8Q0z6dBRCXOU7Mu+AjvttaEbWptvOog/0m3RThX3L
JJ2oz+W4Qi/+5cKB5/u/ImB46xS3XvMdQEHS8jJU4Yg09qENd7hzjL8XICEe
h4rB1zHZKqZxi6hEg690jxam4Tv2UeX9KTW3vO4Nop+HbnbyufNV8T/gPihm
F23dHPNdTzxCi/ONYr4OPb/BiSFIlyLBBJ/FsU9Ox/qgl6ELTNJ4lT3mBGhY
Szv+fBWAMaH4qwDM7peWIlwj/8j925P5iYkCubEpvpiOrEOb5a0omfHOF8v4
vjDfGbqXvwLgY7rQastUI99klD8JkG+TsfRmF79t6as7vY5vZ1csoxt0jnns
Og61/VDKsiiHUU6Pq/pLHnwNEh97lPN4eqZ3W77H+eLlS2U8R88Uch9wJ8Xi
zzdgXhbJoYaiAvXcRd0Leu4cZTYkkcpsR9BC5KazcKEt+9S0FtS0vNRFhJBY
Ey4iQm6QNCKYmw2Rnzg4jc9vh55SlLMBojaHpTnVmjiU/zhFeVfP5jfkVtqQ
ZyLKm4TpLzqU/D6mCgxP5E5ULPNNMr66eYcLBOX9Mv5ULtFR2s/qwVPBuZ6T
b6MffLnjK5Te+KYbt+ftFh2HgWOEe76YL8eQ4cJ8wy9f3ZNMT2wZUMKjP1Nk
k6csf79Qo5EE+apGbkCZ1SWuHRaXSGWU5ZjeL9FI45w00dm6jwMuLZ5LYrpP
e4cchAsGyeooTteUJ0uhhhWX1U2CuB1Df8wWXNJxSNfRcct0YuR7YXTU65Ry
w5XvsTOc24EDU1hZ6AchD4dlU/ApG3N6JWJuxvm4ccAlTb5tJeVwTMb6Ya81
X4r0ZGpRRoIm2q43isNbXNQhf4dkTxgzzBiG18xF+nsWOlOrV2N7y9fVed/W
+rL2ljtV/uEIUf/iBrvGb3Ek+dMba9Ih/uyqApZSarXFUSKCbotL80wuHew1
Id3oyM1Xu9BHIAU8L4WE5sXY3+UrZ77nKSU0Zv8XkRnuDDFJAAA=

-->

</rfc>
