<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chuang-identifying-email-forwarding-00" category="exp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.4 -->
  <front>
    <title abbrev="Identifying Email Forwarding">Identifying Email Forwarding</title>
    <seriesInfo name="Internet-Draft" value="draft-chuang-identifying-email-forwarding-00"/>
    <author fullname="Weihaw Chuang">
      <organization>Google, Inc.</organization>
      <address>
        <email>weihaw@google.com</email>
      </address>
    </author>
    <date year="2024" month="February" day="19"/>
    <workgroup>Independent Stream</workgroup>
    <keyword>DKIM</keyword>
    <keyword>ARC</keyword>
    <keyword>Email Authentication</keyword>
    <abstract>
      <?line 31?>

<t>Forwarded email often becomes unauthenticated because it breaks SPF (RFC7208) authentication and DKIM (RFC6376) authentication.  For example mailing-lists distribute email to multiple recipients through a separate server than the original sending server that breaks IP based SPF authentication and potentially may modify the message that breaks the DKIM signature.   This document calls for using ARC (RFC8617) to identify and authenticate forwarded emails by further specifying the naming of the two digital signatures present in ARC headers- the message signature and the seal.  Because this uses ARC digital signature, the receiver has confidence that a valid signature corresponding to some forwarder only could have been generated by the named domain.  This document also specifies that all forwarded mail flows have associated ARC headers and the means to characterize the mail flows.</t>
    </abstract>
  </front>
  <middle>
    <?line 35?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="purpose">
        <name>Purpose</name>
        <t>Forwarding has long complicated email authentication as forwarding email through a 3rd party server breaks SPF <xref target="RFC7208"/> IP based authentication and breaks DKIM <xref target="RFC6376"/> authentication when the message is modified.  The IETF DMARC WG published ARC <xref target="RFC8617"/> as a solution to the limitations of SPF and DKIM based authentication caused by forwarding.  ARC headers propagate the DKIM and SPF authentication as seen by the forwarder to the receiver.  Using those results,  the receiver may choose to override their own authentication result to overcome the SPF and DKIM limitations.  The key problem with using ARC this way is trusting that the forwarder didn't forge those results, and this trust problem has prevented further adoption of ARC.</t>
        <t>This document proposes a different, potentially complementary approach in utilizing ARC.  This document calls for identifying the forwarder and placing the responsibility on any forwarded spam on the forwarder.  This specification calls for using the ARC-Message-Signature d= domain to name the forwarder with the same identity as the DKIM-Signature d= domain.  This specification permits both DKIM and ARC headers identities, and provides rules and additional tools to help interpret their results.  For example, to assist the human reader in understanding the mail flow, this specification provides a new ARC header tag-value to name all the stages of the mail flow.</t>
        <t>Notably this approach does not require the original DKIM signature or all forwarded ARC message signatures to pass.  Only the most recent forwarded ARC message signatures must pass if the message is forwarded.  When no ARC headers are present, then the DKIM signature must pass.  Forwarders may still modify the message that breaks the prior signatures but the message must be then ARC message signed afterwards.   This document does not attempt to justify why those changes occur, and only broadly attempts to determine who made changes to the message.  It does require, as before, that all ARC seals must verify.  If they do not, this document calls for following the ARC <xref target="RFC8617"/> specification in not trusting the ARC chain.  However, unlike that document, this specification calls for the preservation of the invalid ARC chain results for forensics in a clearly distinguishable way.</t>
        <t>Delivery Status Notifications (DSN <xref target="RFC3461"/>) and auto-reply messages may be used in backscatter attacks.  Part of the difficulty in remedying this problem has been the lack of observability mail flow at scale.  This specification calls for DSN or auto-reply messages triggered by some other message delivery to be tracked as one mail flow by propagating the ARC headers to DNS or auto-reply messages and continue building the chain.  By treating the initial message and subsequent new message as part of the same mail delivery flow, a mail receiver of the DSN or auto-reply will be able to observe the initial forwarding flow potentially to the originator.   Incorporating DKIM and ARC headers should make it easier for automated systems to discover spam that attempts to hide behind backscatter attacks.</t>
        <t>This document uses mail flow descriptions from the Internet-Draft <eref target="https://datatracker.ietf.org/doc/draft-ietf-dkim-replay-problem/">draft-ietf-dkim-replay-problem</eref> which in turn is based on <xref target="RFC5598"/>.  The usage is this document are defined in section  <xref target="edge"/>.</t>
        <section anchor="existing-authentication-practices">
          <name>Existing Authentication Practices</name>
          <t>This section attempts to generalize the authentication practices of originators and forwarders at the time of writing.  Most email originators sign messages with DKIM following <xref target="RFC6376"/> on behalf of some responsible party's domain to permit authentication to that domain.  That domain is called the DKIM Signing Domain Identifier (SDID).  Many originators further specify the DKIM SDID to be the same as the payload From header sender's domain thus identifying the sender in the visible part of the email to be displayed by the email MUA client.  DMARC <xref target="RFC7489"/> calls this process <em>alignment</em>. Occasionally some forwarders resign DKIM, meaning that a DKIM header is added and possibly the old header is removed, which complicates attribution.  In some of those cases, the payload From header may be rewritten as well.  Forwarders may also generate ARC headers that follow <xref target="RFC8617"/> to report the DKIM and SPF authentication results in the ARC-Authentication-Result header.  In many cases the ARC-Seal d= domain and ARC-Message-Signature d= domain are the same.</t>
          <t>When there is a prior ARC header seal validation failure, forwarders in many cases do not follow ARC <xref target="RFC8617"/>, and generate a single ARC set indicating the failure.   In some cases, the ARC headers are removed.  In other cases, the forwarder stops generating new headers.  However, these actions permit a spammer to introduce an ARC header error to prevent valuable forensics information from being sent to the receiver.</t>
        </section>
        <section anchor="terminology-and-definitions">
          <name>Terminology and Definitions</name>
          <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in <xref target="RFC2119"/>.</t>
        </section>
      </section>
      <section anchor="characterizing-mail-flow">
        <name>Characterizing Mail Flow</name>
        <section anchor="arc-message-signature-and-arc-seal-domains">
          <name>ARC-Message-Signature and ARC-Seal Domains</name>
          <t>This specification calls for the ARC-Message-Signature d= domain to represent the responsible party that controls the forwarding of the message.  DKIM <xref target="RFC6376"/> calls this domain the SDID, and this document proposes using the same equivalent DKIM SDID of the controlling forwarder to represent the ARC-Message-Signature SDID.  The existing ARC specification <xref target="RFC8617"/> leaves that domain unspecified, which permits the refinement.  Moreover this specification calls for the ARC-Seal d= domain to represent the responsible party for generating the ARC headers and vouches for the truthfulness of the ARC-Authentication-Results.  This too would be a SDID corresponding to the party that generates the ARC headers.  In a cloud environment, the party that generates the ARC headers is often a different entity that controls message forwarding.</t>
          <t>Example:</t>
          <artwork><![CDATA[
ARC-Seal: i=1; d=cloudprovider.example.com ...
ARC-Message-Signature: i=1; d=mailinglist.example.com ...
]]></artwork>
        </section>
        <section anchor="interaction-between-dkim-and-arc">
          <name>Interaction Between DKIM and ARC</name>
          <t>As noted earlier, the more common arrangement between DKIM and ARC today is for the originator to generate DKIM header as specified in <xref target="RFC6376"/> and for forwarders to ARC specification <xref target="RFC8617"/>.  This specification calls for the originator to always DMARC <xref target="RFC7489"/> aligns the payload From header domain with the DKIM SDID domain.  This alignment permits a subsequent receiver to identify the originator.  Some originators may also generate ARC headers, and if so, this specification calls for the ARC-Message-Signature SDID to be the same as the From header to help clarify that the originator generated the ARC headers.  This specification also calls for the originator to clear the ARC-Authentication-Result header body as there are no authentication results at origination.  The advantage of generating ARC headers at origination is that a receiver may find it convenient to primarily work with one type of headers rather than both ARC and DKIM at the cost of extra headers size overhead.</t>
          <t>A forwarder may resign the message with DKIM and rewrite with the payload From header.  This specification calls the ARC-Message-Signature SDID to be the same as the new SDID that is the From header.  This makes it clear that the forwarder claims ownership of the message.</t>
          <t>DKIM originator and ARC forwarder example:</t>
          <artwork><![CDATA[
ARC-Seal: i=1; d=forwarder.example.com ...
ARC-Message-Signature: i=1; d=forwarder.example.com ...
ARC-Authentication-Result: i=1; dkim=pass header.i=@orig.example.com..
DKIM-Signature: d=orig.example.com ...
From: user@orig.example.com
]]></artwork>
          <t>DKIM and ARC originator example:</t>
          <artwork><![CDATA[
ARC-Seal: i=1; d=orig.example.com ...
ARC-Message-Signature: i=1; d=orig.example.com ...
ARC-Authentication-Result: i=1; 
DKIM-Signature: d=orig.example.com ...
From: user@orig.example.com
]]></artwork>
          <t>Forwarder claiming ownership example:</t>
          <artwork><![CDATA[
ARC-Seal: i=1; d=forwarder.example.com ...
ARC-Message-Signature: i=1; d=forwarder.example.com ...
ARC-Authentication-Result: i=1; dkim=pass header.i=@orig.example.com..
DKIM-Signature: d=forwarder.example.com ...
From: user@forwarder.example.com
DKIM-Signature: d=orig.example.com ...
]]></artwork>
        </section>
        <section anchor="edge">
          <name>Edge and Forwarder Characterization</name>
          <t>This document specifies the functional purpose of ARC-Message-Signature SDID as description is added as a tag-value to the ARC-Message-Signature with mail flow description tag of "m".  This serves two purposes- 1) to help a human reading the ARC headers understand the mail flow 2) let receivers know that this forwarder or originator participates in this specification.  Notably these values are not the source of truth about the mail flow characterization, and rather a receiver SHOULD infer them from the DKIM and ARC headers SDID and payload From alignment.</t>
          <t>The values of the "m" tag are characterized as a subset of the Mail Handling Services defined in <xref target="RFC5598"/> and clarified in the internet-draft <eref target="https://datatracker.ietf.org/doc/draft-ietf-dkim-replay-problem/">draft-ietf-dkim-replay-problem</eref>.  This document reuses that list and description from the latter document.  In a few cases, this document extends the description and a later section on discontiguous mail-flow further extends this list.  The list of Mail Handling Services are:</t>
          <t>Edge services:</t>
          <dl>
            <dt>originator:</dt>
            <dd>
              <t>Defined in Section 2.2.1.  This is the first component of the MHS and works on behalf of the author to ensure the message is valid for transport; it then posts it to the relay (MTA) that provides SMTP store-and-forward transfer. The Originator can DKIM sign the message on behalf of the author, although it is also possible that the author's system, or even the first MTA, does DKIM signing.  If specified, the ARC-Authentication-Result SHOULD be empty.</t>
            </dd>
            <dt>receiver:</dt>
            <dd>
              <t>Defined in Section 2.2.4 is the last stop in the MHS, and works on behalf of the recipient to deliver the message to their inbox; it also might perform filtering. If specified, this message SHOULD NOT be used subsequently in forwarded traffic and when found, may be processed by spam systems according to local policy.</t>
            </dd>
          </dl>
          <t>Forwarder services:</t>
          <dl>
            <dt>alias:</dt>
            <dd>
              <t>Defined in Section 5.1. A type of Mediator user, operating in between a delivery and a following posting. The Alias replaces the original RCPT TO envelope recipient address but does not alter the content address field header fields. Often used for Auto-Forwarding.</t>
            </dd>
            <dt>resender:</dt>
            <dd>
              <t>Defined in Section 5.2.  ReSender is a type of Mediator user, like an Alias; however, the ReSender updates the recipient address, and "splices" the destination header field and possibly other address fields as well.</t>
            </dd>
            <dt>mailing_list:</dt>
            <dd>
              <t>Defined in Section 5.3.  Mailing list is another Mediator; it receives a message and reposts it to the list's members; it might add list-specific header fields <xref target="RFC4021"/> e.g. List-XYZ: might modify other contents, such as revising the Subject: field, or adding content to the body.</t>
            </dd>
            <dt>esp:</dt>
            <dd>
              <t>Email Service Provider is often called a Bulk Sender - An originating third-party service, acting as an agent of the author and sending to a list of recipients. They may DKIM sign as themselves and/or sign with the author's domain name.</t>
            </dd>
            <dt>ofs:</dt>
            <dd>
              <t>Outbound Filtering Service: Rather than sending directly to recipients' servers, the Originator can route mail through a Filtering Service, to provide spam or data loss protection services. This service may modify the message and can have a different ADMD from the Originator.</t>
            </dd>
            <dt>ifs:</dt>
            <dd>
              <t>Inbound Filtering Service: The Receiver can also route mail through a Filtering Service, to provide spam, malware and other anti-abuse protection services. Typically, this is done by listing the service in an DNS MX record. This service may modify the message and have a different ADMD from the Receiver.</t>
            </dd>
          </dl>
          <t>Example:</t>
          <artwork><![CDATA[
ARC-Message-Signature: i=1; m=mailing_list; ...
]]></artwork>
        </section>
      </section>
      <section anchor="invalid-arc-headers">
        <name>Invalid ARC Headers</name>
        <t>The ARC specification <xref target="RFC8617"/> does not acknowledge the forensics value of invalid ARC headers.  Further spammers will intentionally invalidate ARC headers knowing that receivers will typically stop processing and publishing ARC headers.  This specification calls for the receiver to continue generating the ARC headers, but obfuscate the invalid ARC headers to be conformant with the ARC specification.</t>
        <t>When ARC verification finds prior ARC headers to be invalid, this specification calls for the prior ARC headers to be prefixed with <tt>X-Invalid-. </tt>The ARC signer continues the ARC instance number at the next instance number as if prior ARC headers were valid.  It also seals assuming the prior ARC headers lack the prefix.  The ARC signer generates a new set of normal ARC headers (without any prefix) with the ARC-Seal's having a tag <tt>cv=fail</tt> and ARC-Authentication-Result with the result <tt>arc=fail</tt>.  ARC validators unaware of this specification will ignore the prior ARC headers with the <tt>X-Invalid- </tt>prefix, and see that the new ARC headers seal will intentionally not validate correctly.  Aware validators will process the current and prior invalid ARC headers without the <tt>X-Invalid- </tt>prefix.  This specification also calls for supporting invalid headers without the <tt>X-Invalid- </tt>prefix to keep the very same forensics information if ARC signers don't follow this specification.  Humans and automated systems may be able to make use of the invalid headers to determine which participants in the mail flows contributed to observed potentially malicious messages.</t>
        <t>Example:</t>
        <artwork><![CDATA[
ARC-Seal: i=2; d=forwarder2.example.com; cv=fail; ...
ARC-Message-Signature: i=2; d=forwarder2.example.com ...
ARC-Authentication-Result: i=2; dkim=pass; arc=fail ...
X-Invalid-ARC-Seal: i=1; d=forwarder1.example.com; cv=none; ...
X-Invalid-ARC-Message-Signature: i=1; d=forwarder1.example.com ...
X-Invalid-ARC-Authentication-Result: i=1; dkim=pass...
DKIM-Signature: d=orig.example.com ...
From: user@orig.example.com
]]></artwork>
      </section>
      <section anchor="reporting-discontiguous-mail-flow">
        <name>Reporting Discontiguous Mail Flow</name>
        <t>Mail handling systems may automatically respond to messages by sending new messages with status notifications or by sending auto-replies.  In some cases, the original message content is copied over such as with Delivery Status Notification (DSN) RFC <xref target="RFC3461"/> or the subject as with auto-reply.   As a consequence, spammers have used these auto-reply and status notification messages to propagate spam.  These attacks are particularly difficult to respond to at scale because of the discontinuity between the original message that triggered the auto-reply and the subsequent message containing spam that is sent to the victim.  The discontinuity prevents appropriate attribution by automated systems.  This specification proposes that the ARC headers be preserved from the original message and propagated to the new auto-reply message.  The receiver that sends the response SHOULD continue the ARC chain as if the messages were simply forwarded between the original and the new response, and the ARC message set number should simply increment after the last ARC set in the original message.</t>
        <t>To help with human review of such messages, this proposes additional mail flow tag values:</t>
        <dl>
          <dt>ndr:</dt>
          <dd>
            <t>Non-Delivery Reports: This describes a mail flow for a special kind of Delivery Status Notification when the message is not delivered, and the originator should be notified.  This is commonly called a bounce.</t>
          </dd>
          <dt>dsn:</dt>
          <dd>
            <t>Delivery Status Notifications:  This describes a mail flow for all other delivery notifications besides Non-Delivery Reports, such as when the originator is informed of delivery of the message.</t>
          </dd>
          <dt>auto_reply:</dt>
          <dd>
            <t>For messages generated by a message handler working on behalf of a recipient.  Some examples of these are vacation responders, and calendar schedulers.</t>
          </dd>
        </dl>
        <t>Example after a bounce, as seen by the original sender that is now handling the bounce:</t>
        <artwork><![CDATA[
ARC-Seal: i=1; d=receiver.example.com; ...
ARC-Message-Signature: i=1; d=receiver.example.com; m=ndr; ...
ARC-Authentication-Result: i=1; dkim=pass header.i=@orig.example.com.
DKIM-Signature: d=receiver.example.com ...
From: no-reply@receiver.example.com
]]></artwork>
      </section>
      <section anchor="additional-examples">
        <name>Additional Examples</name>
        <t>These examples are informational.  These are more complex examples, to show how these various techniques may compose across the different participants in the mail flow.</t>
        <section anchor="originator-mailing-list-receiver-bounce">
          <name>Originator ⇒ Mailing-List ⇒ Receiver: Bounce</name>
          <t>This message is sent through a mailing-list to some receiver where the message bounces.  The initial sent message from the originator:</t>
          <artwork><![CDATA[
DKIM-Signature: d=orig.example.com ...
From: john.doe@orig.example.com
Subject: A really big announcement

It's Jane Doe's birthday tomorrow!
]]></artwork>
          <t>The inbound DKIM signature pass verification.  Next the mailing-list modifies the message by adding a Subject header prefix and message-body footer, then adds an ARC set with the DKIM authentication result.  As the mailing-list is hosted on forwarder.example.com, the ARC-Seal SDID is forwarder.example.com, while the ARC-Message-Signature SDID is mailinglist.example.com.  It also adds a new DKIM-Signature with a SDID of mailinglist.example.com.</t>
          <artwork><![CDATA[
ARC-Seal: i=1; d=forwarder.example.com; cv=none ...
ARC-Message-Signature: i=1; d=mailinglist.example.com;
    m=mailinglist ...
ARC-Authentication-Result: i=1; 
    dkim=pass header.i=@orig.example.com ...
DKIM-Signature: d=mailinglist.example.com ...
DKIM-Signature: d=orig.example.com ...
From: john.doe@orig.example.com
Subject: [school list] A really big announcement

It's Jane Doe's birthday tomorrow!

============
This is the school mailing-list.
]]></artwork>
          <t>When the receiver verifies the message, it finds that the original message DKIM signature fails verification, but the ARC-Message-Signature passes along with the ARC seals and the new DKIM signature.  As the ARC-Message-Signature contains a mail flow tag (<tt>m=mailinglist</tt>), the receiver knows the forwarder is participating in this specification, and can extract the SDID from the ARC-Message-Signature d= domain.  From this, the receiver understands that the message was forwarded by mailinglist.example.com and is responsible for this message.  At some point during delivery, the receiver sees that the message is being sent to a non-existent user, and bounces the message to the original sender.  It removes the original headers, except the ARC headers, and adds new ones indicating the bounce in a NDR.</t>
          <artwork><![CDATA[
ARC-Seal: i=2; d=receiver.example.com; cv=pass ...
ARC-Message-Signature: i=2; d=receiver.example.com;
    m=ndr ...
ARC-Authentication-Result: i=2;
    dkim=fail header.i=@orig.example.com;
    dkim=pass header.i=@mailinglist.example.com;
    arc=pass ...
ARC-Seal: i=1; d=forwarder.example.com; cv=none ...
ARC-Message-Signature: i=1; d=mailinglist.example.com;
    m=mailinglist ...
ARC-Authentication-Result: i=1;
    dkim=pass header.i=@orig.example.com ...
DKIM-Signature: d=receiver.example.com ...
From: no-reply@receiver.example.com
Subject: Delivery Status Notification

** Delivery incomplete **
]]></artwork>
          <t>The originator receives the bounce, and verifies the content.  The DKIM signature signed by the receiver passes, as does the ARC seals.  The originator can see from the ARC headers that this message was originally from it as the ARC-Authentication-Result at i=1 indicates the original DKIM SDID was <tt>orig.example.com</tt>, and is likely a bounce.  This is confirmed by the mail flow tag of <tt>m=ndr</tt> found in the ARC-Message-Signature at i=2.</t>
        </section>
      </section>
      <section anchor="security-considerations">
        <name>Security Considerations</name>
        <t>A spammer may remove all ARC and DKIM headers to confuse an ARC/DKIM aware receiver, however this specification calls for ARC headers to always be present on forwarded messages and that the message must always have a DKIM signature.  The lack of ARC and DKIM headers would indicate that this message cannot be authenticated with the method in this specification.  Valid DKIM header indicates that the message has not been tampered with since origination and can be authenticated.  If the DKIM header is invalid, then the message must have valid ARC headers with a forwarder that can be identified to be considered authenticated.</t>
        <t>A spammer may manipulate ARC headers to confuse an ARC aware receiver.   Modification of existing ARC headers will result in the seal not verifying, which the receiver will detect and handle using ARC <xref target="RFC8617"/>.  Manipulated ARC headers will not be used with authenticating the message.</t>
        <t>A spammer may choose to participate in ARC header generation with valid ARC seals but  misleading results e.g. results for a good mail attached to spammy one.  This then is forwarded to the receiver.  This will be confusing the receiver but it will also identify the spammy forwarder.</t>
        <t>A spammer may replay messages ARC signed by another party.  This document does not attempt to solve that problem and leaves that to subsequent work such as <eref target="https://datatracker.ietf.org/doc/draft-chuang-replay-resistant-arc/">draft-chuang-replay-resistant-arc</eref>.  `</t>
      </section>
      <section anchor="iana-considerations">
        <name>IANA Considerations</name>
        <t>There are no requests at this time.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC7208">
        <front>
          <title>Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1</title>
          <author fullname="S. Kitterman" initials="S." surname="Kitterman"/>
          <date month="April" year="2014"/>
          <abstract>
            <t>Email on the Internet can be forged in a number of ways. In particular, existing protocols place no restriction on what a sending host can use as the "MAIL FROM" of a message or the domain given on the SMTP HELO/EHLO commands. This document describes version 1 of the Sender Policy Framework (SPF) protocol, whereby ADministrative Management Domains (ADMDs) can explicitly authorize the hosts that are allowed to use their domain names, and a receiving host can check such authorization.</t>
            <t>This document obsoletes RFC 4408.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7208"/>
        <seriesInfo name="DOI" value="10.17487/RFC7208"/>
      </reference>
      <reference anchor="RFC6376">
        <front>
          <title>DomainKeys Identified Mail (DKIM) Signatures</title>
          <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
          <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
          <date month="September" year="2011"/>
          <abstract>
            <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
            <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="76"/>
        <seriesInfo name="RFC" value="6376"/>
        <seriesInfo name="DOI" value="10.17487/RFC6376"/>
      </reference>
      <reference anchor="RFC8617">
        <front>
          <title>The Authenticated Received Chain (ARC) Protocol</title>
          <author fullname="K. Andersen" initials="K." surname="Andersen"/>
          <author fullname="B. Long" initials="B." role="editor" surname="Long"/>
          <author fullname="S. Blank" initials="S." role="editor" surname="Blank"/>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
          <date month="July" year="2019"/>
          <abstract>
            <t>The Authenticated Received Chain (ARC) protocol provides an authenticated "chain of custody" for a message, allowing each entity that handles the message to see what entities handled it before and what the message's authentication assessment was at each step in the handling.</t>
            <t>ARC allows Internet Mail Handlers to attach assertions of message authentication assessment to individual messages. As messages traverse ARC-enabled Internet Mail Handlers, additional ARC assertions can be attached to messages to form ordered sets of ARC assertions that represent the authentication assessment at each step of the message-handling paths.</t>
            <t>ARC-enabled Internet Mail Handlers can process sets of ARC assertions to inform message disposition decisions, identify Internet Mail Handlers that might break existing authentication mechanisms, and convey original authentication assessments across trust boundaries.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8617"/>
        <seriesInfo name="DOI" value="10.17487/RFC8617"/>
      </reference>
      <reference anchor="RFC3461">
        <front>
          <title>Simple Mail Transfer Protocol (SMTP) Service Extension for Delivery Status Notifications (DSNs)</title>
          <author fullname="K. Moore" initials="K." surname="Moore"/>
          <date month="January" year="2003"/>
          <abstract>
            <t>This memo defines an extension to the Simple Mail Transfer Protocol (SMTP) service, which allows an SMTP client to specify (a) that Delivery Status Notifications (DSNs) should be generated under certain conditions, (b) whether such notifications should return the contents of the message, and (c) additional information, to be returned with a DSN, that allows the sender to identify both the recipient(s) for which the DSN was issued, and the transaction in which the original message was sent. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3461"/>
        <seriesInfo name="DOI" value="10.17487/RFC3461"/>
      </reference>
      <reference anchor="RFC5598">
        <front>
          <title>Internet Mail Architecture</title>
          <author fullname="D. Crocker" initials="D." surname="Crocker"/>
          <date month="July" year="2009"/>
          <abstract>
            <t>Over its thirty-five-year history, Internet Mail has changed significantly in scale and complexity, as it has become a global infrastructure service. These changes have been evolutionary, rather than revolutionary, reflecting a strong desire to preserve both its installed base and its usefulness. To collaborate productively on this large and complex system, all participants need to work from a common view of it and use a common language to describe its components and the interactions among them. But the many differences in perspective currently make it difficult to know exactly what another participant means. To serve as the necessary common frame of reference, this document describes the enhanced Internet Mail architecture, reflecting the current service. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5598"/>
        <seriesInfo name="DOI" value="10.17487/RFC5598"/>
      </reference>
      <reference anchor="RFC7489">
        <front>
          <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
          <author fullname="E. Zwicky" initials="E." role="editor" surname="Zwicky"/>
          <date month="March" year="2015"/>
          <abstract>
            <t>Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</t>
            <t>Originators of Internet Mail need to be able to associate reliable and authenticated domain identifiers with messages, communicate policies about messages that use those identifiers, and report about mail using those identifiers. These abilities have several benefits: Receivers can provide feedback to Domain Owners about the use of their domains; this feedback can provide valuable insight about the management of internal operations and the presence of external domain name abuse.</t>
            <t>DMARC does not produce or encourage elevated delivery privilege of authenticated email. DMARC is a mechanism for policy distribution that enables increasingly strict handling of messages that fail authentication checks, ranging from no action, through altered delivery, up to message rejection.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7489"/>
        <seriesInfo name="DOI" value="10.17487/RFC7489"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC4021">
        <front>
          <title>Registration of Mail and MIME Header Fields</title>
          <author fullname="G. Klyne" initials="G." surname="Klyne"/>
          <author fullname="J. Palme" initials="J." surname="Palme"/>
          <date month="March" year="2005"/>
          <abstract>
            <t>This document defines the initial IANA registration for permanent mail and MIME message header fields, per RFC 3864. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4021"/>
        <seriesInfo name="DOI" value="10.17487/RFC4021"/>
      </reference>
    </references>
    <?line 322?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks goes to Emanuel Schorsch.  The mail handler server list and content in section <xref target="edge"/> was written by David Crocker.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA91cW3Mbx5V+x6/oyA+SXAAl0Y6TUKWq0KIUadeUtCK9TtZJ
mY2ZBtDmYBqZniHEpJzXfd+fuL9kz60vMxiATOLa2lqXbZLAdPfp0+f6ndMz
m80mrW0rc6LelqZu7eLW1kv1aq1tpV67ZqubEj+Y6Pm8MTeHn5oUujVL19ye
KPNpM5mUrqj1GqYuG71oZ8Wq0/VyZtMMM4MzzBZxhtnTpxPfzdfWe+vq9naD
dL26fD2pu/XcNCeTElY4mRSu9qb2nT9RbdOZCdD1xWTrmutl47oNDKlLszE1
LqQu2sbo9WRiNw097dvjp09/8/RYTa7NLYwpT9REzdTZv749x5+nH1/iD97a
adeukFjYF5Az0fCna/j5iYJ/Fl1V8Q6/M3alt+olbZG/dM1S1/YvNPRE/c65
ZWWmQFpxRF/T1k/Ulgb+dklfHxVuTV8Wrqtb5ONkMqlds4ZJbmDfE1svsr9m
s5nSc982umgnEzkHU/LUyi1aU6u5gTmNV12t02bgGfhcd94o2yo4WH3t1cWH
1+rRx9cvf3X89NePle5tXem6JBbRE1998auvhk8cKRQEOHe93lRGIQV4npX1
rVcl/L+x8641Qlvr1LqrWouPNqawGwszedWu4PyWK6WVNxvdAKHwS3NjGvhG
1/A/A1y1S1vrCr6oSTLTA3Enbz+oufawSdzSyEY2rsVPdFXdAqHwnytBHml6
YJXXS9ObDj+nvXu7rHXbNQY2qy5XFjbmim6NUlbAZF7B4ajOI1UgRsSqX3/1
7FePcbtB6omA/CjUon9uXs1vQbAaeKJRfgPMYWVDKkDW8Fe3oL/arQPOLm2L
3AikebWB/yFJtiYqVkaXpvGz3vbi40QOfuONrmBbX4tYtLg7+MXTHDurTGkM
nJyxyPyV9iCy9QI3WQjztLrRlS2zpQrXAGkbx+cGPPEgmXH7jXI1nAdIflXC
hDcGRBTkd2lq07DE3gYewB+lA16h0PWPQVfeCdOs8UJIVWU8JvFbVG7reRHt
vSssLZBxK7JlbXTtkdZipVHNTGP/YvibONERa+LalmVlQGE/+wy0vG1c2RUk
cvTRZ+pD12ycN1FRkQnIuMrBL6Ckm0pUk1VkKLdeJTMZtCiqyxcNSLVu2tug
DplO//WvvxCt/umnpBojaiFjSNR5ECo6DBo8u4U/etIEJ0AqZE1JJ2LIZquz
c+Tod79Tm24OdmAlLOapUTFwao/K7qqOZgY+47yVXYO44SceZZ20ONifUepJ
ZklCEo+AkvxAN43b6CXqW1RnnHPMQnhgIlpOlrckn0JdkHpY4FvPmgnHCh97
sGh+qvqqgfalWDl8AsY7+KgBLcFnLEj8th6uztOEZ9F203w9HmT8EX6DK8Md
ziuzVlvbrjIrRJq8BSrgB7k/JhkUo7+70pb1wxY/IPPX2xJrQ5ggroTSC9bm
BsgH7gebpUu3oa3A0QEBQOFk0tdSPAuHtkXDqouFaeDDac8qkzoYfFg3YDI3
MEIXKzRpICiV/Ytsbkf/kxnOoozBRskDVLoI37BN8nYOE4MCkTLcZhbDb/Qa
P+3NElYWWxPlsO8FcAiQOTtnRZldRFtYvhAThieNJm1AJB0i2WX8jjcDxOnk
jcYmG6dqYxqQF/ArDuaMkp8rh8wPJpPPGth9A5951XSVYWOoy9LibBqdt6vI
Jq5MtYEzAaMIUtCKTIvQ9OOBKT4OphbiANrAqltrlHVcnk61RjpaLa4hN69T
lrzBlgKBWtVmm+1FtXo5A8fTmchYtP/ESfjK+OA84/wkn+9cq+fVLS8Vxa10
8HztWiD0z51tTD8A6YcE8PnA0yBRO/6W+LYBTsCy7+tKgg7nW7IYdXv3+DVp
IMyg7GJoheNgmP07tNK163s1oFPCA/Lg9UhskxbgI2SB9GTIwHjAFu8RLm0a
C/zIqIbYrzeAFpkbJmK4UzTwELzS0n431orHotvWrDdkLH9EwwZEbVe3YrzA
Ydd03kXRNSzWFGDM4WxL+CmD6UBK06KO1AbGQ2QKzIrDxegLeUDMWyFAZGKK
Ojk3wHkKiiTewB1hRCXHBZYciMPBdGS3MANuQER7xHotXAWimZmQvtfsK4Ot
iRuZcechsAUyCW/cFmw08KCrK3sthxUWHVWvRAgfpsGoQgejjp/ZmqO7uE7Q
eyEfTLq3hUfatCoqoxtgOaYBQGAHsQBom0GvRNp3Zir0lbeQq4G4eAXaGGnx
6tHZxTvZ/hdffvXsp58ehxjazRqzwRieD4dlFISKggFYea6La1/gQTd43PgX
rPcB4qSwDXQ/tgC6bxVtAUJL8RjW99wcxaIUm8AsONrNiSfiNKI1gXUULFmZ
uxwEbgpNxsguIFVaLsEpUkBDMbIjxxpUpAzsAtlEFYK49BpVBmS9zgwbjg5R
Ty4WwRjA6LN3F/uIQBZDSA8jwZTOO1tFyxzE6msgADQ+zm1ri947kokzQC7v
QU9QuNFOx688RavhFMjHEd1xa2z5NX8agyl5fpd3W7RLwAsSK4yd6HRMj64s
fCb25PGGaLnY9tahf8dU3UHI3vAWRx2nX1G6stbXlEkb7a0h8Sfi1hTO+1sP
lobtjPUFhnUcU7C1yMzQCiPDuVlZDMbHZHcYSFGClg4cHGLR2A2rzaJxa9rU
W3TQtWlnZ4jCqO8ZjLGmXczKa7smDurbmUj7nx6t2nbjT548KTVoI8lWc4RP
H0Fk+ASWfnJ4giePwYhaDtbA9tfolzhoB/lnNf7lL38DuYiErl1wXn1biK6q
NAtbsyp7w7mU+v5Pjz4z5dI8PpK06tUntioDsEZ9wHTNFsYL08IMOcM5uaxC
SjcIxTdhBtL3KBqsG4vkGSWUbi1q6kJtG9ty/nGOfl3AmGw4urikaBTpkXAl
o9/LvhyCOCtdLXByMgcxYgVhp6zvoc+iSQ73hpshCSe7HwPF+BdyHy2TKVM8
gNEliT0/IbAfSveji7O3Z49xexgn5xsboBbZZDAiWKug7xLKbvRtBQ5ZvUZx
lRgOoR3TZJtadX4noOeHSMrgrxub2BHMRISa5mjoPQppghH4y/NvT8E7IfgE
++F8VdLlL3/9G+A92+vgDUAUvPoB5GVZo4z+cKTeF4X2FBVXtwM4AyMEOmnk
wJSAhJh5aWaLbBdDzhIjPsamPO6EiXQIhcSHwD2B8Sinol8JMkARZHyNgbi3
tbiNRYiFQP/8dC+/xW02BkUXQUM4m62pqt0AkPCVAMn0vQnuiyW4H6sA/8FA
uKa9M/EOEYQcKSZOfZ2efeTkmNfkja5RCGl/cdAFBF5ZgiU2+2ASppskmRSS
fCfBcUOmSUtAm+UZGN0xwsXEL0CcCBjLBMD2yOOYL/BoGNNxhBpZqxUmkJWR
SBLRvJK4ENJZXo7dFJ92dsjDmF8khznGwUT2dMo6fes2PhCBS6HTlonyQBJG
gVTpgj1NMDjk1dYMlFgBwDAMyNlmmsbRA4IbIAs78tp5zCggN7IVxXRuGOit
2xEMRtzAJQXwrnJLhljP0HdYJhA9AGMkiPd79eD824vLB1P+qd69p98/vvq3
b99+fHWGv1+8Of3mm/hLeOLizftvvzlLv6WRL9+fn796d8aDz0//8IBP88H7
D5dv3787/eYBy/TQv7Fpigk0x3DsxOfs9lhCjp89A2PEDk+9TEAkcuWcSjAg
UcKHcUkPOkCqwSY9+sUDkf89sAvQbcGbe1hK8ExsFzCQbAg0SOKWAdkpudrF
HjMLHL2BIYeSwVK7yFLCX8jZYK4GkoaPJIckqwtxFQWGOdjX39o4L3AiCWRM
DERQZXtc7RlESIZuAjYtW+rqgFlH6x5AG+YqxkFr9lLnoCeOKx73OL2BLbzH
geHozALsmBPg+Y3rCrAAcSHIPNvVoqtq9I/C1b3W24fMqHUO9BHDZwzc+Uh2
SgTssqIgBfvoh3SxacNU03WlMvWNbVwd8tv7TYGGnmtmGSypBHjri3HIY3po
82TyisGuE1DFv/3tb5PA/xNlXzx7DqdAxAl01RwJNIY1P3V0dDQZFbA4Vgpq
WE/bGYmLifpTsM+GWX1t2i2mrXnmMpmcEnaCZQbIya1Yc7V2VKBZrzFCbhrE
Pkih5iNzwLmUjCcHAUhBYIqqW9MLcnSU1dyyhQIDB9S572zdHXp0V4K9S5eu
tvrWj4V5FNLtj0dFeSImm0xIH3aNkWHUXp1nwDGNzcuBO2nnBUVuWVR9MO5i
I2gxMbgHkrPfhu2JznMuBMC3qHTDlEvik3E5Vet29XPktGhbh46MkKN7RYNq
7sqAj6PDg/9qty/CBMLDOhwxo/3W5Y2uESNGE5ZZwJ716w3krJXi+V69Z4EJ
vCV7ATGOlbgFQsg1cK6iKOSapQkBG+xywCXDGrDsKlS8CbJHAmLtR3heYGoJ
g8wnSNETHIGZLDoH/IBM0mnm0pA0yUlyKDYloLgIJwEmCfuIQhxSvX9IzDDM
5K+Rm3ZH9sKCiLN44qzIxU4VC4TTrj0W1oAfK7sZhhiTCe00k7Jg1NIc5g4z
nopAf58JPzxuVLjD2Gu7fkGYv/DDvvgtbiGfCKbpl4VOYMnhQ7QaMvYEsaNm
ZxJxJT1rn/HqLs6MLneYKXuHHOLHz7fT133JoaA0ys7/I0HYv2TGo9GH7svr
LAh5VQr8m7ibZS3iygnF+2mIaOa9G6DXXV1I0XHD3RNSVN5nXmL+tAn2WZAV
dMW90uB+O0WWbxRUxRmQgAfrB9EEIszsqRVHKPQz9exxdJY6K3WOhdOp8Nmv
Sqrjx5AopJjBq+saPhWLl5X6GkTCMxXFSNcWdkMRbsg6e4YaSE/lTszjiSde
XCYbVO+6pmAACWN7pecuFPAihcXgSDkUEe+VeURJliGrJ69m1gmaHsXU+SAR
Css9T4ytpJ8gki0GHs6Ejgd3kffqyNlTGBaRQUqa38AalPRdwBkSzJvhzTlQ
zbUQinokeOWygsDq5f8SrL7T7NCYzodEEvMCojMX18jniusIYWRIlhbgdiMO
lM8MUYWpS9bBfEKqu+FsBIBxlgH/UlkDLNaycx3XI2YkIQEPTtPBIpTBcMRF
RMOR7DkOOEowvWRMvHyGpniSpP1kcsJADx/LhZB0fHR89CywS6KJhQU1I8wU
Yq46ScKbC9oVhmS+D7WHigBHothuKiBhVnDnIijFrpAzeYQ5n2N8QmVtsAYt
RSsRtILzVI/OL08f86HFLoaL88sPCL41ZgbEhH5YnnOB4Q9y631S8kLXqWrf
o2nPDkA3K/iJzWKWAiyKvAVrNimQ4qcfeilaTdG4IE6XsRDIn3IFPFLA+e/b
hcpQjMMxu9iEOeLwm5arwMFg4KHuO9Uvw3FWGkhBuDKoIxzk9NBJxi5TrvdX
nIjlLQx0SBYrCnP3iU6RmLS2yxUldAhKAg8qtCu44eF+bcIFEj4Yy9EpD6yo
1pz6POCUsQjNxKPcLBx4hWlA5aXuINVgrBuGgqIuCtcEoKRyBXpJV9kC2Ymw
aC+86WkQSK32e5Tnl6g6pzErOTelJZnDCAHkYRPSIqyvCzigU92WLUSqZKEO
ELdQgk9xWUV2rRAPH7tpPr78cKku3yN0YypYJTswcOENIkvYQ5J6P/AcIn6X
Pwbnkcom9Adkn+8J2KGTQG09xdJx6sM8QunjgtJerhwDVz+aC6k6UTwxziLq
sUDUG3f7XK0y0DxN0G3KiEHt7FTQY4/lHeMfBDPchrQz31u/aMTYfo8TPlVz
JhNBkf74A5revVv9gop79CTbaNxuzXOHzZKCiMoiM/KqP9Z7+qYPZ3mI+oFd
/J7Gsl4BqfTlLIQo/YMTP/zl0+Nn4IfNEQjSN/j07//wHycyg3QjSVWDZQE4
6LtipUjasDQokddFN/8RdnnCs5N1w7426r9lIRJ6EUwgo2T8BtnE1wHEM6kP
AuElxFCqp1p93VXXSs54pk7rBBdwV0lTzlKfLsw1pSoKfIdRCmjSMvNN4nyo
j8JERFRHt5ka50m9uJc9uQXOrdfeVDfcz/FEWrJSbh/NvSBc2C8HuuAWZBze
d+0cTZF6HYxe4MCJ+piBFIG40gJFLXdTJNoeSkuyFJsGXqxxeClg0M28s96U
8RPiuvRjQjQDgRSYPU+l2VaEN5i5oxSe44nt6fKnwA6o4E7wDPU9PTs/S+FT
ohmYY5k5b+u9vLkkRZfoF6cnP/IP7hT9QLXVUsMR/QZ/OtNz7NMf3/rtxqJE
3opbotCuNuhAKpt6xAJzqEZKvUDnv8eDA6dyf/bdwbrAhyP2RyMI+b40eR0g
b7JVz/s5JrA/9Z+94cSBs4I7ii/JfxSYUFWYhAYIScqPnCKCfuU9bgnGfB2b
HKjY6bn3yJL5CJ0AMnJYI8cVYw9AyuxogjacGUc14vXJMqCB5w76ARx5Hwg8
B51jP9f++s6UvKybLzpfhGb5ET4Ijod3PrBUC8cebcrOAaR6On5FrZCBVARK
/U5t3cfCKK17rw7F8Rk2WDn7BIaZqLv6/UzEZnakrqKwYMNpE3mTykK2xrwc
pJ/vngXktYZsZvc76sbdJWOLWDQtyZ2jfD+FGkO19906nMDuSOoz5K9wD5Ix
ZQSnOhb3QEt6S7fFqt5Uj3D3mL9jLwJP97h3XoRqPaQLMSRwlEhfFTcvsMvg
KhaPx0P5OJHcXLjSTcED5QaGqIIjtEOTKSMHt3OmrEjL2kmeNcLOsFZ2lOqK
tzQVR5llM/3WcM89GyPqivYgKiyVINGNIflEbbYBGhw6gSj47Bqyetw1j/SO
aUs4gD2k36s44rsNppccevMS95weleHamA19T1E6Ye/jDRd2kQkZ+Y2HsWdl
FEt6g/iWjy25/Z5HyWFCWyb1SXbeDLuIM63NW7GpDh7wrDp1BmV3uKgkSzcL
y6zvc3jFD+JoS9CENN2RSTpcsD3uAbXHOdz5XIlqPD+M9R6Y4m6w9zgDe5+r
oFM0Lp3wfkT62Q7BNUQAz0fG3wOmfrZDen+KeyHWRz9ngQJDgI8m6MNZD3/K
OmLo11UAlnKhFFEVlys9BySioS8Ts20JbLPWZbFBnhvV616jOihpNih2J1vj
j0a7tGLuG+KpkIRgO6bbINbIzcKSynCh7kCvPLXKP1YQ7fT65ZV4Sc/ZT5wq
9U8jYHCKjoQuViNKgZFojHAoxqPcmQHjrPGabO4uM7JmdpddvcMZ2ZPhLNzV
zJdSSMu7Sq4JSFM+JxLxaEJrfby7HJv4vXhv7NQIoMQoh9k1xP56yYHyzQij
Qs0+PxrIkEiMYu82RcgpaYRQubWyvwFR0u0md4vAUVCPX2raRMHZsZ57bnOF
Fqfo5nJPM4/XNRDpCFH4Dh/kkhcfSxk2gHK+exdANpQCSVzXR3xYOogi6BWD
zEAaXw/Rw/tKEhx5u8a1Ehw2en7hZJDCsOA0ftq7PwRhkARl0pwvK9i6aLin
he4WJRQxdViO8orrDVLOIb0JFZ0bC9RgTzbqZ9iVRKvpimO6N5dKJxhfcfmC
4Li6JNjpHdjOqN5s3fyJYP7SFOjDlQjG1xEdYPGA6a+x6wDIOWghxu7uYvgj
AB4imYGrWVFJODk3ouRyz5dTS+4awkubAQTBzLhAIKH0NYNMB+73nKg7twgx
Fye+EWbsG14YRDD6GAMTEhS3nm3MhuDHEOvi/DtdA6gWf/yB9AJ3hFcboxz3
rqgnJIz8Dl7ldM011ZVzSFonhCT0/IiXCxUtz00sNzr1rqAhjD0/aAnrUsPh
FCtTdhXng700WyQ9HMh0eLW59y6FoNkkENvkNRkOw/F76+CxG7cXc9xdBx8f
t34B+vD85yuHj0QdYwtnkUctFvC3Y89lEchp0u1X4fAIhfDZaeIhZgE2vWXh
Mh5v6LuDRz/FMQQCgc5tETyORdqGQtjWFKva/rmT225U0KJe7MZJSpKgmIOx
c7g/kwFy//2f/xVw3xnCrPRBQHBO1NckBVKxz+yHNJMGTCt/9Ud8y0P0Hltq
z8otEAtXuMkebmv53PsOHRmV/lgY/66Q8ke3qo9KZ3bDyogMn2KpHmPCuUXo
pSbi0G1MJm8Rwv4XDanJmTPw69w27Qo7IcFvQ9Lotr8Q2eB9MD44uFxLwppj
IFiNR0QhnE3knLxRwfd5dRsAax3A7ACYS66HpkGenlFL3MJBKtTIdV8Y7ENH
Pvq8fkvjaLfcEYWGO+TBua+cb/la12jjSKoBUhMylfXzxoX+s5DtVTFm2Nfe
Yb3a0webwSu8RwoVBvfkOeqNzd/7pvq72n1ibvWP9/A+p1f+rPOv79cFhcPu
YwLVeO51qKX451ar7z2+BKMi/PlP/6SSTV5k/0zyIr8skgtqAI3DhZ5kiVgL
+wo2xcoUo5LD9tYUPA9UekEv7cl1ehqvu4/LMh4XegZ680sfOGVoMIt2d148
dHqox1LSlH4MhdHmo6uefF09HrzBB6Hp3vUMrm6lbiIp+e5CQNNYRaFe1II3
TjoWzfYd90gQVedHrR/QlfqjshOJnava54nD7T6N5h5p37vswNBxcmTI2ZZ9
1cZZfMtAR3WZEBIO6IIwaoQgvOrau6sEZgi0lm6GyH1deRWBOL2RDoRhVMaW
jW9wDWrmEbM3nwqz2UkGp+HFHZ4kCWyUH14jYzL4lv67s49jpu94f6QGlo8s
z90o2Oh4MXsQ7d0HDkvWjoCw/dbu+V67eND+IsTW283/Zdv/z5r+fyoAjkb9
UF43mXz+eXoAkm+KcVujPv88i5KyVCz2EiS5ZAHu2WmByCRYHFhieXeIZDdR
V9ncUvZD5b+esZWZXL8sjWWE3Hr1r7n2en3QCAWNRCADR9k2dLbvr5tgqvXi
WVDIoWqnKyY4/9XwWK+mwaZhtwlCVyHpzvPyemEpsxWG9D0CBEBXpHxX3HCU
X7sduUCI1B6H65bYKwLmsb1VL9GellRMdHil8DReAuXbBmi14htR4iWGDO9H
KhHL46D0CcehW760yuc3DS00h+uAg+qfXPaZxxfe5HFqmZJ39rUDO04vbZEZ
pMC944cvV+llIKOb47tt4XxHJKfAyIfegtN/NWOMCNamXblybxfvv1PtpHeT
PBOmwZbwJSa8GsZBIEgEgDKYbdEH5PdagkcfkhbfYDO8v56Vagf4ErGSeDhe
FqNusXjpkm7Z8cI2vHGgTMVmErX+69+QqKHYrXVtN121c0V9KG0DQUMU/Jyy
riK+66Z3qTPRXVWh3ClaQ6VFqiPSq35gRLjI2TNFNBJLXEUr3ROIEWVvaxvc
cDuPOxlyrqrkOBmYD4B+NDThNVoRweqzKL2SLmsY778yMnYJOOkYSgfIYSoG
uWptfSW97eF2FbVp5a8D0mrpnLx6kVD/FR8qEYRvXItmi8Qnf5HVyIVvejC8
8IUPNL3KTfiMpNmWn6KksHffTtZNPn3XbmHrdTISsSLKEJ+0wlEj105X9tjb
qbyrbsQChJcK4ennN4HxqVR2oBtiAbj8vvf6XGkLx4tcGBe3Mwhc7t1dfmAO
ajC/ku6a03enO6b9Mr9Yh2+/Mr6Vl5/gyVlqHcMXYeKrawQgi002yBqaQ9fX
HsSBK0OvQFM7U6kLEMcGkjcxq+tYtpPGVfgRG9xjkSy9FCa+E4acZXiJBZzU
mb4BiX3ZOOLHZPI/lvlAzO5YAAA=

-->

</rfc>
