<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.4 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-denis-tls-aegis-01" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="draft-denis-tls-aegis-01">AEGIS-based Cipher Suites for TLS 1.3, DTLS 1.3 and QUIC</title>
    <seriesInfo name="Internet-Draft" value="draft-denis-tls-aegis-01"/>
    <author fullname="Frank Denis">
      <organization>Fastly Inc.</organization>
      <address>
        <email>fde@00f.net</email>
      </address>
    </author>
    <author fullname="Samuel Lucas">
      <organization>Individual Contributor</organization>
      <address>
        <email>samuel-lucas6@pm.me</email>
      </address>
    </author>
    <date year="2023" month="December" day="07"/>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>ciphersuite</keyword>
    <keyword>aegis</keyword>
    <keyword>tls</keyword>
    <keyword>dtls</keyword>
    <keyword>quic</keyword>
    <abstract>
      <?line 54?>

<t>This documents proposes new cipher suites based on the AEGIS family of authenticated encryption algorithms for integration into the TLS 1.3, DTLS 1.3, and QUIC protocols.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-denis-tls-aegis/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/jedisct1/draft-denis-tls-aegis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction-and-rationale">
      <name>Introduction and rationale</name>
      <t>AEGIS <xref target="I-D.irtf-cfrg-aegis-aead"/> is a family of authenticated encryption algorithms designed for high-performance applications. AEGIS caters to the same hardware class as AES-GCM, distinguishing itself through the following key attributes:</t>
      <ol spacing="normal" type="1"><li>
          <t>Reduced memory requirements: AEGIS eliminates the necessity for a key schedule and precomputation tables, resulting in lower memory demands. This characteristic proves particularly advantageous for servers managing a substantial volume of connections.</t>
        </li>
        <li>
          <t>Extended usage limits: AEGIS features higher usage limits, mitigating the need for frequent rekeying compared to other available options.</t>
        </li>
        <li>
          <t>Enhanced overall performance: AEGIS is very efficient on CPUs supporting AES-specific instructions.</t>
        </li>
      </ol>
      <t>AEGIS ciphers seamlessly integrate into established protocols like TLS 1.3 by adhering to the same interface standards as existing algorithms.</t>
      <t>This document introduces new cipher suites based on the AEGIS algorithms and outlines the procedures for their incorporation into the TLS 1.3 <xref target="RFC8446"/>, DTLS 1.3 <xref target="RFC9147"/>, and QUIC <xref target="RFC9000"/> protocols.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words “<bcp14>MUST</bcp14>”, “<bcp14>MUST NOT</bcp14>”, “<bcp14>REQUIRED</bcp14>”, “<bcp14>SHALL</bcp14>”, “<bcp14>SHALL
NOT</bcp14>”, “<bcp14>SHOULD</bcp14>”, “<bcp14>SHOULD NOT</bcp14>”, “<bcp14>RECOMMENDED</bcp14>”, “<bcp14>NOT RECOMMENDED</bcp14>”,
“<bcp14>MAY</bcp14>”, and “<bcp14>OPTIONAL</bcp14>” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="new-cipher-suites-and-preservation-of-tls-13-mechanisms">
      <name>New Cipher Suites and Preservation of TLS 1.3 Mechanisms</name>
      <t>The TLS 1.3 protocol includes a set of mandatory cipher suites listed in <xref section="9.1" sectionFormat="comma" target="RFC8446"/>.</t>
      <t>Each cipher suite denotes the Authenticated Encryption with Associated Data (AEAD) algorithm for record protection, along with the designated hash algorithm for use with the HMAC-based Key Derivation Function (HKDF).</t>
      <t>The cipher suites and cryptographic negotiation mechanisms established in TLS 1.3 are reused by the DTLS 1.3 and QUIC protocols.</t>
      <t>To accommodate AEGIS-based encryption algorithms, this document introduces additional cipher suites to those specified in <xref section="9.1" sectionFormat="comma" target="RFC8446"/>:</t>
      <table>
        <name>Proposed AEGIS-based cipher suites</name>
        <thead>
          <tr>
            <th align="left">Cipher Suite Name</th>
            <th align="left">AEAD Algorithm</th>
            <th align="left">Hash Algorithm</th>
            <th align="left">Confidentiality Level</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128L_SHA256</tt></td>
            <td align="left">AEGIS-128L</td>
            <td align="left">SHA256</td>
            <td align="left">128 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128X2_SHA256</tt></td>
            <td align="left">AEGIS-128X2</td>
            <td align="left">SHA256</td>
            <td align="left">128 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256_SHA512</tt></td>
            <td align="left">AEGIS-256</td>
            <td align="left">SHA512</td>
            <td align="left">256 bits</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256X2_SHA512</tt></td>
            <td align="left">AEGIS-256X2</td>
            <td align="left">SHA512</td>
            <td align="left">256 bits</td>
          </tr>
        </tbody>
      </table>
      <t>The rationale behind recommending the SHA512 hash function for variants employing a 256-bit key is based on the findings presented in <xref target="M23"/>.</t>
      <t>AEGIS algorithms support both 128-bit and 256-bit authentication tags. For all the cipher suites referenced herein, these algorithms <bcp14>MUST</bcp14> be utilized with a 128-bit authentication tag.</t>
      <t>With the inclusion of these new cipher suites, the cryptographic negotiation mechanism in TLS 1.3, as outlined in <xref section="4.1.1" sectionFormat="comma" target="RFC8446"/>, remains unchanged, as does the record payload protection mechanism specified in <xref section="5.2" sectionFormat="comma" target="RFC8446"/>.</t>
    </section>
    <section anchor="dtls-13-record-number-encryption">
      <name>DTLS 1.3 Record Number Encryption</name>
      <t>In DTLS 1.3, encryption of record sequence numbers follows the specifications detailed in <xref section="4.2.3" sectionFormat="comma" target="RFC9147"/>.</t>
      <t>For AEGIS-based cipher suites, the mask is generated using the AEGIS <tt>Stream</tt> and <tt>ZeroPad</tt> functions defined in <xref target="I-D.irtf-cfrg-aegis-aead"/> with:</t>
      <ul spacing="normal">
        <li>
          <t>a 128-bit tag length</t>
        </li>
        <li>
          <t><tt>sn_key</tt>, as defined in <xref section="4.2.3" sectionFormat="comma" target="RFC9147"/></t>
        </li>
        <li>
          <t><tt>ciphertext[0..16]</tt>: the first 16 bytes of the DTLS ciphertext</t>
        </li>
        <li>
          <t><tt>nonce_len</tt>: the AEGIS nonce length, either 16 or 32, depending on the chosen AEAD algorithm.</t>
        </li>
      </ul>
      <t>A 48-bit mask is computed as follows:</t>
      <artwork><![CDATA[
mask = Stream(5, sn_key, ZeroPad(ciphertext[0..16], nonce_len))
]]></artwork>
    </section>
    <section anchor="quic-header-protection">
      <name>QUIC Header Protection</name>
      <t>In QUIC, specific segments of the QUIC packet headers undergo encryption in accordance with the specifications outlined in <xref section="5.4" sectionFormat="comma" target="RFC9001"/>.</t>
      <t>For AEGIS-based cipher suites, the mask is generated following the same procedure as in DTLS 1.3, utilizing:</t>
      <ul spacing="normal">
        <li>
          <t>a 128-bit tag length</t>
        </li>
        <li>
          <t><tt>hp_key</tt>, as defined in <xref section="5.4" sectionFormat="comma" target="RFC9001"/></t>
        </li>
        <li>
          <t><tt>ciphertext[0..16]</tt>: the first 16 bytes of the ciphertext</t>
        </li>
        <li>
          <t><tt>nonce_len</tt>: the AEGIS nonce length, either 16 or 32, depending on the selected AEAD algorithm.</t>
        </li>
      </ul>
      <t>A 48-bit mask is computed as follows:</t>
      <artwork><![CDATA[
mask = Stream(5, hp_key, ZeroPad(ciphertext[0..16], nonce_len))
]]></artwork>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>On devices lacking hardware AES acceleration or protection against side-channel attacks, cipher suites dependent on the AES round function <bcp14>SHOULD NOT</bcp14> be prioritized. This recommendation encompasses the cipher suites outlined in this document</t>
      <t>On devices equipped with secure hardware AES acceleration, implementations <bcp14>SHOULD</bcp14> prioritize AEGIS-based cipher suites over AES-GCM ones of equivalent security levels.</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t><em>This note is to be removed before publishing as an RFC.</em></t>
      <t>A list of early implementations can be found at <eref target="https://github.com/jedisct1/draft-denis-tls-aead"/>,</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>A key update <bcp14>MUST</bcp14> be performed prior to encrypting 2<sup>48</sup> records with the same key. The prescribed mechanism is documented in <xref section="4.6.3" sectionFormat="comma" target="RFC8446"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to register the following identifiers in the TLS Cipher Suite Registry:</t>
      <table>
        <name>Requested IANA identifiers</name>
        <thead>
          <tr>
            <th align="left">Description</th>
            <th align="center">DTLS-OK</th>
            <th align="center">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128L_SHA256</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_128X2_SHA512</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256_SHA256</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="left">
              <tt>TLS_AEGIS_256X2_SHA512</tt></td>
            <td align="center">Y</td>
            <td align="center">N</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="M23" target="https://eprint.iacr.org/2023/913.pdf">
          <front>
            <title>Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal</title>
            <author initials="J. P." surname="Mattsson" fullname="John Preuß Mattsson">
              <organization>Ericsson Research</organization>
            </author>
            <date year="2023"/>
          </front>
          <seriesInfo name="DOI" value="10.1007/978-981-99-7563-1_12"/>
          <refcontent>Cryptology ePrint Archive, Paper 2023/913</refcontent>
        </reference>
        <reference anchor="I-D.irtf-cfrg-aegis-aead">
          <front>
            <title>The AEGIS Family of Authenticated Encryption Algorithms</title>
            <author fullname="Frank Denis" initials="F." surname="Denis">
              <organization>Fastly Inc.</organization>
            </author>
            <author fullname="Samuel Lucas" initials="S." surname="Lucas">
              <organization>Individual Contributor</organization>
            </author>
            <date day="5" month="December" year="2023"/>
            <abstract>
              <t>   This document describes the AEGIS-128L, AEGIS-256, AEGIS-128X, and
   AEGIS-256X AES-based authenticated encryption algorithms designed for
   high-performance applications.

   The document is a product of the Crypto Forum Research Group (CFRG).
   It is not an IETF product and is not a standard.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/cfrg/draft-irtf-cfrg-aegis-aead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-aegis-aead-09"/>
        </reference>
      </references>
    </references>
    <?line 180?>

<section anchor="examples">
      <name>Examples</name>
      <section anchor="tls-13-handshake">
        <name>TLS 1.3 Handshake</name>
        <section anchor="with-tlsaegis128lsha256">
          <name>With TLS_AEGIS_128L_SHA256</name>
          <artwork><![CDATA[
shared_key:           cbb2b72da2bc70eb85fae05a8f6bc929
                      6f3e2f9693e5972a7b2a3da608e5eda2

hello_hash:           b77594edb8abd3acc4db7f5ead5869e1
                      96fff7d0fb1beb2bffbaac850bf479d8

early_secret:         33ad0a1c607ec03b09e6cd9893680ce2
                      10adf300aa1f2660e1b22e10f170f92a

handshake_secret:     15614a4e6a6c590f16e9760dc20002a1
                      2af27d6ceda73c66a9477de4b690639f

client_secret:        6e60b228fdd7c8b08ac50e5018fa79ec
                      3f8cd2ee023386111b0d7a2027e5c1b8

client_handshake_key: 2474bdcd8e8c8dff18af9e169e4470ea

client_handshake_iv:  42fe48bd086cc5ddaf43be4500d0c7f2

server_handshake_key: e0d7ea14104a89cfdf253e1f0e0302b0

server_handshake_iv:  cc421814028367299508e120a7cb3ad2
]]></artwork>
        </section>
        <section anchor="with-tlsaegis256sha512">
          <name>With TLS_AEGIS_256_SHA512</name>
          <artwork><![CDATA[
shared_key:           724d41a7ccadc6435d4305dd6756bd01
                      5e26dd0544a19733a2c08430f128b218

hello_hash:           1a8fd72e2630e12817d768bae1248367
                      30c07141c4ab4cc3423d7f16c3c1a84b
                      91d4c4194453dbc85fca8738b4e9ea3c
                      783bb6d99f579fd6c2f599c69c1c79e1

early_secret:         fd4a40cb6252b3c08d9b88d5bde85339
                      03caa51a1dba1c79ce18eea0365d35d0
                      71e597a2b95214821100e812f7b79828
                      498f164707cd63c6f7464973cfa22046

handshake_secret:     55ef8c23352da78bf1daa4626445c883
                      b842bec578769fe9ae6fbf6de5c28953
                      02ec3cbb22b3a94ea1d047ab08cce64e
                      1079f3dbc9bf08152dc3b0bcd74ac977

client_secret:        728f1edab4426f4dac3f03180b0bc537
                      a0d555514b439ea4f4cccb5910834807
                      408d29b9c79dcbff8e3a3fb8bf220907
                      d96ce595eee7ffaf9f9735e4f6da1e60

client_handshake_key: 08a37693b14937177d75149422944c34
                      9019de948f6922c2c516d941c0bdafe4

client_handshake_iv:  e0a2155fedcb592a29588bdcf06334f0
                      4dc6b5c40e659051e62071cb87f8be2c

server_handshake_key: 366e1ebfb124508aa69137ccef542756
                      c0a748525c5bdc16acd79c66856e7c82

server_handshake_iv:  8f883c1bb0eae38960efdb717f6b19cf
                      c929d565ad596f1f4b3daab498a7fc29
]]></artwork>
        </section>
      </section>
      <section anchor="tls-13-nonces-for-record-encryption">
        <name>TLS 1.3 Nonces for Record Encryption</name>
        <section anchor="with-tlsaegis128lsha256-1">
          <name>With TLS_AEGIS_128L_SHA256</name>
          <artwork><![CDATA[
handshake_iv:         cc421814028367299508e120a7cb3ad2

sequence_number:      0102030405

nonce:                cc421814028367299508e121a5c83ed7
]]></artwork>
        </section>
        <section anchor="with-tlsaegis128lsha512">
          <name>With TLS_AEGIS_128L_SHA512</name>
          <artwork><![CDATA[
handshake_iv:         724d41a7ccadc6435d4305dd6756bd01
                      5e26dd0544a19733a2c08430f128b218

sequence_number:      0102030405

nonce:                724d41a7ccadc6435d4305dd6756bd01
                      5e26dd0544a19733a2c08431f32bb61d
]]></artwork>
        </section>
      </section>
      <section anchor="dtls-13-and-quic-header-protection-mask">
        <name>DTLS 1.3 and QUIC Header Protection Mask</name>
        <section anchor="with-tlsaegis128lsha256-2">
          <name>With TLS_AEGIS_128L_SHA256</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f

ciphertext[0..16]:    101112131415161718191a1b1c1d1e1f

nonce_len:            16

mask:                 60ede1c811
]]></artwork>
        </section>
        <section anchor="with-tlsaegis128x2sha256">
          <name>With TLS_AEGIS_128X2_SHA256</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f

ciphertext[0..16]:    101112131415161718191a1b1c1d1e1f

nonce_len:            16

mask:                 6bf2292472
]]></artwork>
        </section>
        <section anchor="with-tlsaegis256sha512-1">
          <name>With TLS_AEGIS_256_SHA512</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f
                      101112131415161718191a1b1c1d1e1f

ciphertext[0..16]:    202122232425262728292a2b2c2d2e2f

nonce_len:            32

mask:                 6e3a2ce297
]]></artwork>
        </section>
        <section anchor="with-tlsaegis256x2sha512">
          <name>With TLS_AEGIS_256X2_SHA512</name>
          <artwork><![CDATA[
key:                  000102030405060708090a0b0c0d0e0f
                      101112131415161718191a1b1c1d1e1f

ciphertext[0..16]:    202122232425262728292a2b2c2d2e2f

nonce_len:            32

mask:                 7a515cfb0c
]]></artwork>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank John Preuß Mattsson for suggesting how AEGIS should be used in the context of DTLS and QUIC.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
