<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.14 (Ruby 3.1.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-dkg-intarea-dangerous-labels-04" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title>Dangerous Labels in DNS and E-mail</title>

    <author initials="D. K." surname="Gillmor" fullname="Daniel Kahn Gillmor">
      <organization abbrev="ACLU">American Civil Liberties Union</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>dkg@fifthhorseman.net</email>
      </address>
    </author>

    <date year="2025" month="February" day="04"/>

    <area>sec</area>
    <workgroup>intarea</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 80?>

<t>This document establishes registries that list known security-sensitive labels in the DNS and in e-mail contexts.</t>

<t>It provides references and brief explanations about the risks associated with each known label.</t>

<t>The registries established here offer guidance to the security-minded system administrator, who may not want to permit registration of these labels by untrusted users.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://dkg.gitlab.io/dangerous-labels/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dkg-intarea-dangerous-labels/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Internet Area Working Group mailing list (<eref target="mailto:intarea@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/intarea/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/intarea/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://gitlab.com/dkg/dangerous-labels"/>.</t>
    </note>


  </front>

  <middle>


<?line 88?>

<section anchor="introduction"><name>Introduction</name>

<t>The Internet has a few places where seemingly arbitrary labels can show up and be used interchangeably.</t>

<t>Some choices for those labels have surprising or tricky consequences.
Reasonable admnistrators may want to be aware of those labels to avoid an accidental allocation that has security implications.</t>

<t>This document registers a list of labels in DNS and e-mail systems that are known to have a security impact.
It is not recommended to create more security-sensitive labels.</t>

<t>Offering a stable registry of these dangerous labels is not an endorsement of the practice of using arbitrary labels in this way.
A new protocol that proposes adding a label to this list is encouraged to find a different solution if at all possible.</t>

<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
</section>
<section anchor="dns"><name>DNS Labels</name>

<t>Note that <xref target="RFC8552"/> defines the use of "underscored" labels which are treated differently than normal DNS labels, and often have security implications.
That document also established the IANA registry for "Underscored and Globally Scoped DNS Node Names".
That registry takes precedence to the list enumerated here, and any label in that list or with a leading underscore ("<spanx style="verb">_</spanx>") <bcp14>MUST NOT</bcp14> be included in this list.</t>

<t>Note also that <xref section="2.2" sectionFormat="of" target="RFC8820"/> makes it clear that depending on specific forms of DNS labels in a given URI scheme in a protocol is strongly discouraged.</t>

<t>Below are some normal-looking DNS labels that may grant some form of administrative control over the domain that they are attached to.</t>

<t>They are mostly "leftmost" or least-significant labels (in the sense used in <xref section="8" sectionFormat="of" target="RFC8499"/>), in that if <spanx style="verb">foo</spanx> were listed here, it would be because granting control over the <spanx style="verb">foo.example.net</spanx> label (or control over the host pointed to by <spanx style="verb">foo.example.net</spanx>) to an untrusted party might offer that party some form of administrative control over other parts of <spanx style="verb">example.org</spanx>.</t>

<t>Note: where "&lt;key-tag&gt;" occurs in <xref target="dns-table"/>, it indicates any sequence of five or more decimal digits, as described in <xref target="RFC8509"/>.</t>

<texttable title="Dangerous DNS labels" anchor="dns-table">
      <ttcol align='left'>DNS Label</ttcol>
      <ttcol align='left'>Rationale</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c><spanx style="verb">autoconfig</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/>, <xref target="THUNDERBIRD"/></c>
      <c><spanx style="verb">autodiscover</spanx></c>
      <c>Hijack Microsoft Exchange client configuration</c>
      <c><xref target="AUTODISCOVER"/></c>
      <c><spanx style="verb">imap</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/>, <xref target="THUNDERBIRD"/></c>
      <c><spanx style="verb">imaps</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">mail</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/>, <xref target="THUNDERBIRD"/></c>
      <c><spanx style="verb">mta-sts</spanx></c>
      <c>Set SMTP transport security policy</c>
      <c><xref target="RFC8461"/></c>
      <c><spanx style="verb">openpgpkey</spanx></c>
      <c>Domain-based OpenPGP certificate lookup and verification</c>
      <c><xref target="I-D.koch-openpgp-webkey-service"/></c>
      <c><spanx style="verb">pop3</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">pop3s</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">root-key-sentinel-is-ta-</spanx>&lt;key-tag&gt;</c>
      <c>Indicates which DNSSEC root key is trusted</c>
      <c><xref target="RFC8509"/></c>
      <c><spanx style="verb">root-key-sentinel-not-ta-</spanx>&lt;key-tag&gt;</c>
      <c>Indicates which DNSSEC root key is not trusted</c>
      <c><xref target="RFC8509"/></c>
      <c><spanx style="verb">smtp</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/>, <xref target="THUNDERBIRD"/></c>
      <c><spanx style="verb">smtps</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">submission</spanx></c>
      <c>Hijack mail user agent autoconfiguration</c>
      <c><xref target="AUTOCONF"/></c>
      <c><spanx style="verb">wpad</spanx></c>
      <c>Automatic proxy discovery</c>
      <c><xref target="I-D.ietf-wrec-wpad-01"/></c>
      <c><spanx style="verb">www</spanx></c>
      <c>Popular web browsers guess this label</c>
      <c>FIXME: find a reference</c>
</texttable>

</section>
<section anchor="e-mail"><name>E-mail Local Parts</name>

<t><xref section="3.4.1" sectionFormat="of" target="RFC5322"/> defines the <spanx style="verb">local-part</spanx> of an e-mail address (the part before the "<spanx style="verb">@</spanx>" sign) as "domain-dependent".
However, allocating some specific <spanx style="verb">local-part</spanx>s to an untrusted party can have significant security consequences for the domain or other associated resources.</t>

<t>Note that all these labels are expected to be case-insensitive.
That is, an administrator restricting registration of a <spanx style="verb">local-part</spanx> named "<spanx style="verb">admin</spanx>" <bcp14>MUST</bcp14> also apply the same constraint to "<spanx style="verb">Admin</spanx>" or "<spanx style="verb">ADMIN</spanx>" or "<spanx style="verb">aDmIn</spanx>".</t>

<t><xref target="RFC2142"/> offers some widespread historical practice for common <spanx style="verb">local-part</spanx>s.
The CA/Browser Forum's Baseline Requirements (<xref target="CABForum-BR"/>) constrain how any popular Public Key Infrastructure (PKI) Certification Authority (CA) should confirm domain ownership when verifying by e-mail.
The public CAs used by popular web browsers ("web PKI") will adhere to these guidelines, but anyone relying on unusual CAs may still be subject to risk additional labels described here.</t>

<texttable title="Dangerous E-mail local-parts" anchor="e-mail-table">
      <ttcol align='left'>E-mail local-part</ttcol>
      <ttcol align='left'>Rationale</ttcol>
      <ttcol align='left'>References</ttcol>
      <c><spanx style="verb">abuse</spanx></c>
      <c>Receive reports of abusive public behavior</c>
      <c><xref section="2" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">administrator</spanx></c>
      <c>PKI Cert Issuance</c>
      <c>Section 3.2.2.4.4 of <xref target="CABForum-BR"/></c>
      <c><spanx style="verb">admin</spanx></c>
      <c>PKI Cert Issuance</c>
      <c>Section 3.2.2.4.4 of <xref target="CABForum-BR"/></c>
      <c><spanx style="verb">hostmaster</spanx></c>
      <c>PKI Cert Issuance, DNS zone control</c>
      <c>Section 3.2.2.4.4 of <xref target="CABForum-BR"/>, <xref section="7" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">info</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">is</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">it</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">noc</spanx></c>
      <c>Receive reports of network problems</c>
      <c><xref section="4" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">openpgp-ca</spanx></c>
      <c>Make authoritative-seeming OpenPGP certifications for in-domain e-mail addresses</c>
      <c><xref target="OPENPGP-CA"/></c>
      <c><spanx style="verb">postmaster</spanx></c>
      <c>Receive reports related to SMTP service, PKI Cert Issuance</c>
      <c><xref section="5" sectionFormat="of" target="RFC2142"/>, Section 3.2.2.4.4 of <xref target="CABForum-BR"/></c>
      <c><spanx style="verb">root</spanx></c>
      <c>Receive system software notifications, PKI Cert Issuance (historic)</c>
      <c><xref target="VU591120"/>, FIXME: find a reference for <spanx style="verb">root</spanx> (software config docs?)</c>
      <c><spanx style="verb">security</spanx></c>
      <c>Receive reports of technical vulnerabilities</c>
      <c><xref section="4" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">ssh-openpgp-auth</spanx></c>
      <c>Trust anchor for SSH host keys</c>
      <c><xref target="SSH-OPENPGP-AUTH"/></c>
      <c><spanx style="verb">ssladministrator</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">ssladmin</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">sslwebmaster</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">sysadmin</spanx></c>
      <c>PKI Cert Issuance (historical)</c>
      <c><xref target="VU591120"/></c>
      <c><spanx style="verb">webmaster</spanx></c>
      <c>PKI Cert Issuance, Receive reports related to HTTP service</c>
      <c>Section 3.2.2.4.4 of <xref target="CABForum-BR"/>, <xref section="5" sectionFormat="of" target="RFC2142"/></c>
      <c><spanx style="verb">www</spanx></c>
      <c>Common alias for <spanx style="verb">webmaster</spanx></c>
      <c><xref section="5" sectionFormat="of" target="RFC2142"/></c>
</texttable>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Allowing untrusted parties to allocate names with the labels associated in this document may grant access to administrative capabilities.</t>

<t>The administrator of a DNS or E-mail service that permits any untrusted party to register an arbitrary DNS label or e-mail <spanx style="verb">local-part</spanx> for their own use <bcp14>SHOULD</bcp14> reject attempts to register the labels listed here.</t>

<section anchor="additional-risks-out-of-scope"><name>Additional Risks Out of Scope</name>

<t>The lists of security concerns in this document cover security risks and concerns associated with interoperable use of specific labels.
They do not cover every possible security concern associated with any DNS label or e-mail localpart.</t>

<t>For example, DNS labels with an existing underscore are likely by construction to be sensitive, and are registered separately in the registry defined by <xref target="RFC8552"/>.</t>

<t>Similarly, where humans or other systems capable of transcription error are in the loop, subtle variations of the labels listed here may also have security implications, due to homomgraphic confusion (<xref target="Homograph"/>), but this document does not attempt to enumerate all phishing, typosquatting, or similar risks of visual confusion, nor does it exhaustively list all other potential risks associated with variant encodings.
See <xref target="UTR36"/> for a deeper understanding of these categories of security concerns.</t>

<t>Additionally, some labels may be associated with security concerns that happen to also commonly show up as DNS labels or e-mail local parts, but their risk is not associated with their use in interoperable public forms of DNS or e-mail.
For example, on some systems, a local user account named <spanx style="verb">backup</spanx> has full read access to the local filesystem so that it can transfer data to the local backup system.
And in some cases, the list of local user accounts is also aliased into e-mail local parts.
However, permitting the registration of <spanx style="verb">backup@example.net</spanx> as an e-mail address is not itself an interoperable security risk -- no external third party will treat any part of the <spanx style="verb">example.net</spanx> domain differently because of the registration.
This document does not cover any risk entirely related to internal configuration choices.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document asks IANA to establish two registries, from <xref target="dns-table"/> and <xref target="e-mail-table"/>.</t>

<section anchor="dangerous-dns-labels-registry"><name>Dangerous DNS Labels Registry</name>

<t>The table of Dangerous DNS Labels (in <xref target="dns-table"/>) has three columns:</t>

<t><list style="symbols">
  <t>DNS Label (text string)</t>
  <t>Rationale (human-readable short explanation)</t>
  <t>References (pointer or pointers to more detailed documentation)</t>
</list></t>

<t>Note that this table does not include anything that should be handled by the pre-existing "Underscored and Globally Scoped DNS Node Names" registry defined by <xref target="RFC8552"/>.</t>

<t>Following the guidance in <xref target="BCP26"/>, any new entry to this registry will be assigned using Specification Required.
The IESG will assign one or more designated experts for this purpose, who will consult with the IETF DNSOP working group mailing list or its designated successor.
The Designated Expert will support IANA by clearly indicating when a new DNS label should be added to this table, offering the label itself, a brief rationale, and a pointer to the permanent and readily available documentation of the security consequences of the label.
Updates or deletions of DNS Labels will follow the same process.</t>

</section>
<section anchor="dangerous-e-mail-local-parts-registry"><name>Dangerous E-mail Local Parts Registry</name>

<t>The table of Dangerous E-mail Local Parts (in <xref target="e-mail-table"/> also has three columns:</t>

<t><list style="symbols">
  <t>E-mail local part (text string)</t>
  <t>Rationale (human-readable short explanation)</t>
  <t>References (pointer or ponters to more detailed documentation)</t>
</list></t>

<t>Following the guidance in <xref target="BCP26"/>, any new entry to this registry will be assigned using Specification Required.
The IESG will assign one or more designated experts for this purpose, who will consult with the IETF EMAILCORE working group mailing list or its designated successor.
The Designated Expert will support IANA by clearly indicating when a new e-mail local part should be added to this table, offering the local part itself, a brief rationale, and a pointer to the permanent and readily available documentation of the security consequences of the local part.
Updates or deletions of of E-mail Local Parts will follow the same process.</t>

</section>
<section anchor="shared-considerations"><name>Shared Considerations</name>

<t>Having to add a new security-sensitive entry to either of these tables is likely to be a bad idea, because existing DNS zones and e-mail installations may have already made an allocation of the novel label, and cannot avoid the security implications.
For a new protocol that wants to include a label in either registry, there is almost always a better protocol design choice.</t>

<t>Yet, if some common practice permits any form of administrative control over a separate resource based on control over an arbitrary label, administrators need a central place to keep track of which labels are dangerous.</t>

<t>If such a practice cannot be avoided, it is better to ensure that the risk is documented clearly and referenced in the appropriate registry, rather than leaving it up to each administrator to re-discover the problem.</t>

</section>
</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="RFC8552">
  <front>
    <title>Scoped Interpretation of DNS Resource Records through "Underscored" Naming of Attribute Leaves</title>
    <author fullname="D. Crocker" initials="D." surname="Crocker"/>
    <date month="March" year="2019"/>
    <abstract>
      <t>Formally, any DNS Resource Record (RR) may occur under any domain name. However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies. The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., "_name"). The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch. This specification explores the nature of this DNS usage and defines the "Underscored and Globally Scoped DNS Node Names" registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="222"/>
  <seriesInfo name="RFC" value="8552"/>
  <seriesInfo name="DOI" value="10.17487/RFC8552"/>
</reference>

<reference anchor="RFC5322">
  <front>
    <title>Internet Message Format</title>
    <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
    <date month="October" year="2008"/>
    <abstract>
      <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5322"/>
  <seriesInfo name="DOI" value="10.17487/RFC5322"/>
</reference>

<referencegroup anchor="BCP26" target="https://www.rfc-editor.org/info/bcp26">
  <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
    <front>
      <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
      <author fullname="M. Cotton" initials="M." surname="Cotton"/>
      <author fullname="B. Leiba" initials="B." surname="Leiba"/>
      <author fullname="T. Narten" initials="T." surname="Narten"/>
      <date month="June" year="2017"/>
      <abstract>
        <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
        <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
        <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
      </abstract>
    </front>
    <seriesInfo name="BCP" value="26"/>
    <seriesInfo name="RFC" value="8126"/>
    <seriesInfo name="DOI" value="10.17487/RFC8126"/>
  </reference>
</referencegroup>




    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="AUTOCONF" target="https://roll.urown.net/server/mail/autoconfig.html">
  <front>
    <title>Mail Client Auto-Configuration</title>
    <author initials="A." surname="Wolf" fullname="Alain Wolf">
      <organization></organization>
    </author>
    <date year="2021" month="February" day="22"/>
  </front>
</reference>
<reference anchor="THUNDERBIRD" target="https://github.com/mdn/archived-content/tree/main/files/en-us/mozilla/thunderbird/autoconfiguration">
  <front>
    <title>Autoconfiguration in Thunderbird</title>
    <author initials="B." surname="Bucksch" fullname="Ben Bucksch">
      <organization></organization>
    </author>
    <date year="2021" month="May" day="03"/>
  </front>
</reference>
<reference anchor="AUTODISCOVER" target="https://docs.microsoft.com/en-us/exchange/client-developer/exchange-web-services/autodiscover-for-exchange">
  <front>
    <title>Autodiscover for Exchange</title>
    <author >
      <organization>Microsoft</organization>
    </author>
    <date year="2020" month="January" day="15"/>
  </front>
</reference>
<reference anchor="CABForum-BR" target="https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.8.4.pdf">
  <front>
    <title>CA/Browser Forum Baseline Requirements</title>
    <author >
      <organization>CA/Browser Forum</organization>
    </author>
    <date year="2022" month="April" day="23"/>
  </front>
</reference>
<reference anchor="VU591120" target="https://www.kb.cert.org/vuls/id/591120/">
  <front>
    <title>Multiple SSL certificate authorities use predefined email addresses as proof of domain ownership</title>
    <author >
      <organization>CERT Coordination Center</organization>
    </author>
    <date year="2015" month="April" day="07"/>
  </front>
</reference>
<reference anchor="UTR36" target="https://unicode.org/reports/tr36/">
  <front>
    <title>Unicode Security Considerations</title>
    <author initials="M." surname="Davis" fullname="Mark Davis">
      <organization></organization>
    </author>
    <author initials="M." surname="Suignard" fullname="Michel Suignard">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="OPENPGP-CA" target="https://openpgp-ca.org/background/details/">
  <front>
    <title>OpenPGP CA: Technical Details</title>
    <author >
      <organization>the OpenPGP CA project</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="SSH-OPENPGP-AUTH" target="https://codeberg.org/wiktor/ssh-openpgp-auth#technical-details">
  <front>
    <title>SSH OpenPGP Authenticator: Technical details</title>
    <author initials="W." surname="Kwapisiewicz" fullname="Wiktor Kwapisiewicz">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


<reference anchor="RFC8820">
  <front>
    <title>URI Design and Ownership</title>
    <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
    <date month="June" year="2020"/>
    <abstract>
      <t>Section 1.1.1 of RFC 3986 defines URI syntax as "a federated and extensible naming system wherein each scheme's specification may further restrict the syntax and semantics of identifiers using that scheme." In other words, the structure of a URI is defined by its scheme. While it is common for schemes to further delegate their substructure to the URI's owner, publishing independent standards that mandate particular forms of substructure in URIs is often problematic.</t>
      <t>This document provides guidance on the specification of URI substructure in standards.</t>
      <t>This document obsoletes RFC 7320 and updates RFC 3986.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="190"/>
  <seriesInfo name="RFC" value="8820"/>
  <seriesInfo name="DOI" value="10.17487/RFC8820"/>
</reference>

<reference anchor="RFC8499">
  <front>
    <title>DNS Terminology</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="A. Sullivan" initials="A." surname="Sullivan"/>
    <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
    <date month="January" year="2019"/>
    <abstract>
      <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
      <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8499"/>
  <seriesInfo name="DOI" value="10.17487/RFC8499"/>
</reference>

<reference anchor="RFC8509">
  <front>
    <title>A Root Key Trust Anchor Sentinel for DNSSEC</title>
    <author fullname="G. Huston" initials="G." surname="Huston"/>
    <author fullname="J. Damas" initials="J." surname="Damas"/>
    <author fullname="W. Kumari" initials="W." surname="Kumari"/>
    <date month="December" year="2018"/>
    <abstract>
      <t>The DNS Security Extensions (DNSSEC) were developed to provide origin authentication and integrity protection for DNS data by using digital signatures. These digital signatures can be verified by building a chain of trust starting from a trust anchor and proceeding down to a particular node in the DNS. This document specifies a mechanism that will allow an end user and third parties to determine the trusted key state for the root key of the resolvers that handle that user's DNS queries. Note that this method is only applicable for determining which keys are in the trust store for the root key.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8509"/>
  <seriesInfo name="DOI" value="10.17487/RFC8509"/>
</reference>

<reference anchor="RFC8461">
  <front>
    <title>SMTP MTA Strict Transport Security (MTA-STS)</title>
    <author fullname="D. Margolis" initials="D." surname="Margolis"/>
    <author fullname="M. Risher" initials="M." surname="Risher"/>
    <author fullname="B. Ramakrishnan" initials="B." surname="Ramakrishnan"/>
    <author fullname="A. Brotman" initials="A." surname="Brotman"/>
    <author fullname="J. Jones" initials="J." surname="Jones"/>
    <date month="September" year="2018"/>
    <abstract>
      <t>SMTP MTA Strict Transport Security (MTA-STS) is a mechanism enabling mail service providers (SPs) to declare their ability to receive Transport Layer Security (TLS) secure SMTP connections and to specify whether sending SMTP servers should refuse to deliver to MX hosts that do not offer TLS with a trusted server certificate.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8461"/>
  <seriesInfo name="DOI" value="10.17487/RFC8461"/>
</reference>


<reference anchor="I-D.koch-openpgp-webkey-service">
   <front>
      <title>OpenPGP Web Key Directory</title>
      <author fullname="Werner Koch" initials="W." surname="Koch">
         <organization>g10 Code GmbH</organization>
      </author>
      <date day="5" month="December" year="2024"/>
      <abstract>
	 <t>   This specification describes a service to locate OpenPGP keys by mail
   address using a Web service and the HTTPS protocol.  It also provides
   a method for secure communication between the key owner and the mail
   provider to publish and revoke the public key.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-koch-openpgp-webkey-service-19"/>
   
</reference>


<reference anchor="I-D.ietf-wrec-wpad-01">
   <front>
      <title>Web Proxy Auto-Discovery Protocol</title>
      <author fullname="Charles E. Perkins" initials="C. E." surname="Perkins">
         <organization>Sun Microsystems</organization>
      </author>
      <author fullname="Josh Cohen" initials="J." surname="Cohen">
         <organization>Microsoft Corporation</organization>
      </author>
      <author fullname="Martin Dunsmuir" initials="M." surname="Dunsmuir">
         <organization>RealNetworks, Inc.</organization>
      </author>
      <author fullname="Paul A. Gauthier" initials="P. A." surname="Gauthier">
         <organization>Inktomi Corporation</organization>
      </author>
      <author fullname="Ian Cooper" initials="I." surname="Cooper">
         </author>
      <author fullname="John W. Cohen M.A." initials="J. W. C." surname="M.A.">
         </author>
      <date day="29" month="July" year="1999"/>
      <abstract>
	 <t>A mechanism is needed to permit web clients to locate nearby web 
proxy caches. Current best practice is for end users to hand 
configure their web client (i.e., browser) with the URL of an &#x27;auto 
configuration file&#x27;. In large environments this presents a 
formidable support problem.  It would be much more manageable for 
the web client software to automatically learn the configuration 
information for its web proxy settings. This is typically referred 
to as a resource discovery problem.
	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-wrec-wpad-01"/>
   
</reference>

<reference anchor="RFC2142">
  <front>
    <title>Mailbox Names for Common Services, Roles and Functions</title>
    <author fullname="D. Crocker" initials="D." surname="Crocker"/>
    <date month="May" year="1997"/>
    <abstract>
      <t>This specification enumerates and describes Internet mail addresses (mailbox name @ host reference) to be used when contacting personnel at an organization. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2142"/>
  <seriesInfo name="DOI" value="10.17487/RFC2142"/>
</reference>

<reference anchor="Homograph">
  <front>
    <title>The homograph attack</title>
    <author fullname="Evgeniy Gabrilovich" initials="E." surname="Gabrilovich">
      <organization>Technion--Israel Institute of Technology</organization>
    </author>
    <author fullname="Alex Gontmakher" initials="A." surname="Gontmakher">
      <organization>Technion--Israel Institute of Technology</organization>
    </author>
    <date month="February" year="2002"/>
  </front>
  <seriesInfo name="Communications of the ACM" value="vol. 45, no. 2, pp. 128"/>
  <seriesInfo name="DOI" value="10.1145/503124.503156"/>
<refcontent>Association for Computing Machinery (ACM)</refcontent></reference>


<reference anchor="I-D.hoffman-dns-special-labels">
   <front>
      <title>IANA Registry for Special Labels in the DNS</title>
      <author fullname="Paul E. Hoffman" initials="P. E." surname="Hoffman">
         <organization>ICANN</organization>
      </author>
      <date day="1" month="October" year="2018"/>
      <abstract>
	 <t>   This document defines an new IANA registry for special labels in the
   DNS.  The registry is useful because the labels cause special
   handling in DNS entities such as stub resolvers, recursive resolvers,
   and applications that use DNS, and developers of software for those
   entities should be aware of the many types of special labels in use.

   [[ A GitHub repo for this document is at
   https://github.com/paulehoffman/dns-special-labels ]]

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-hoffman-dns-special-labels-00"/>
   
</reference>




    </references>


<?line 258?>

<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>Many people created these dangerous labels or the authorization processes that rely on them over the years.</t>

<t>Dave Crocker wrote an early list of special e-mail local-parts, from <xref target="RFC2142"/>.</t>

<t>Paul Hoffman tried to document a wider survey of special DNS labels (not all security-sensitive) in <xref target="I-D.hoffman-dns-special-labels"/>.</t>

<t>Rasmus Dahlberg, yuki, and Carsten Bormann reviewed this draft and gave feedback.</t>

<t>Tim Wicinski pointed out wpad.</t>

</section>
<section removeInRFC="true" anchor="document-considerations"><name>Document Considerations</name>

<section anchor="other-types-of-labels"><name>Other types of labels?</name>

<t>This document is limited to leftmost DNS labels and e-mail local-parts because those are the arbitrary labels that the author is familiar with.
There may be other types of arbitrary labels on the Internet with special values that have security implications that the author is not aware of.
If you are aware of some other system with a similar pattern, please send feedback.</t>

</section>
<section anchor="document-history"><name>Document History</name>

<section anchor="substantive-changes-from-03-to-04"><name>Substantive Changes from -03 to -04</name>

<t><list style="symbols">
  <t>Add <spanx style="verb">ssh-openpgp-auth</spanx> e-mail local part</t>
</list></t>

</section>
<section anchor="substantive-changes-from-02-to-03"><name>Substantive Changes from -02 to -03</name>

<t><list style="symbols">
  <t>Add <spanx style="verb">mail</spanx> DNS label (MUA autoconfiguration)</t>
  <t>Reference Thunderbird guidance about MUA autoconfiguration</t>
  <t>Add <spanx style="verb">openpgp-ca</spanx> e-mail local part</t>
</list></t>

</section>
<section anchor="substantive-changes-from-01-to-02"><name>Substantive Changes from -01 to -02</name>

<t><list style="symbols">
  <t>New dangerous DNS labels: WPAD, MS Exchange Autodiscover, common MUA
autoconfig (originally from Mozilla Thunderbird)</t>
</list></t>

</section>
<section anchor="substantive-changes-from-00-to-01"><name>Substantive Changes from -00 to -01</name>

<t><list style="symbols">
  <t>explicitly define IANA tables</t>
  <t>indicate that the tables use Specification Required</t>
  <t>clarify scope</t>
</list></t>

</section>
</section>
</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA9Vb63LbRpb+j6fooX+sNEWQkizlosqMQ1NypLJ1WV0mm5qZ
GjaBJtkjEI1BA6IZxe+yz7JPtt853bjwIsexs7W7qVRZBNHdp8/1OxeGYRgU
ukjUseicyHSqclNa8U6OVWKFTsXJ5a2QaSxOw7nUSSeITZTKOd6Oczkpwvhh
Guq0kLmSYVwtDxNeHu4dBpEs1NTky2PsNTFBoLP8WBR5aYuDvb1v9w4CWnks
rIqChckfplie0bu8Y/CglngaH4vztFB5qorwhE4NbDmea2u1Se+WGWg5P717
EzyqtFTHgRB+k061SAywVwdfFPxy50ccpNOp+IHeo+d0Mzz3p36vVTHpmXxK
X8k8muGrWVFk9rjfpzfpkX5Uveq1Pj3oj3OzsKrv9+jT2lxlprV2Ci7LcS8y
8z641l/nFq1IwC1btNbgxZ5fp83GEpwS2ALS+YdMTIqrLZUNMn0s/lqYqCus
yYtcTSz+Ws7pj78HgSyLmcnBpRDHCTDaHouTnnjbEz/oJJmbnB87CUMdtErE
WzlLV77FnY/FYK5yHclUDPWjTsQ7PVZ5oZUV9ynEwu9FpkwLEv397YAfyPE4
V49YO3x3zw+U4zxu+f1ET4oZSLN4lvYgtYAUJp/LArwGvYP7u6vh1eUbErAA
j6cKfKrYlJsk6ZWQAK/sW5U/qpyF1ceFTWTSiZ72ZsU84dVO3S/wtRgmWqXQ
ELwVDvm1MseR7gYxxHEsDvYO9sO9g/DggJ7VDGz4NEgkDOVHk0wCcXd2f3ly
evP6/OZkK6UQ5qx0SjCP077XpTgEiQUI6UNgighP+xOdKNtXaVja/tz8DP7L
PtamscrHOo9bF2tR7K82WP+OLPmuWfzMRV6rVLwuowcbzdavfxTuvXRCODm/
HV795fRm6/XgHWxvrqPcWDMp+JruBup9NCPt7UfM8DBWjyoxGaRUfRMu1Dgk
yekI96bbxdpGBoIMoQdh9draLat3BN4Rp613auL3wr39cP9o48qsxRcVqYEY
Dl6/MXk5D1+7q23cLZLjCb3ANr/IapGVWWJkbPvDQfianUAeVhuF+71veoe9
LJ64HR3dw0Hfvyj4RfFaWpXoVIkb9a9S52qObS2vqG9xAGcaHrx0ZtS+hrvH
+paB+Mv90bf7+wd7W8W0WCx6D9BCmCzf5rGEM9Fx3y3pt42kTAqdJUrc3r4T
9L6eaPLpngjNJl9aJbJcxWqCS8TOqoWM41xZi6+lxbfGTAT+jw0pt4ClqtzO
dNYW1f4RXXLv6+2iGp7e3ImhQTjQqdPpoSIHH4j7u5uXX229Z5nqyMSK70je
OC8sLOzlV+0b3rt3xK2KStxniTNSq2EofIhdJyYUnu/OZC5k/gBH+aidvMLV
L3U0gwO9LfU0lWR1V9enl9c/XIfDwVZyYQ9pNoVmSaZ4LCMOiGncj1UBnto2
3Z0rvI3NIPtjcaeiGe4hE3Hi3uxsZ2IxU6JZR2L5p4qg/Le3Z2FFHIz8bCt5
xCZ4+akzAP1QmLxv7SysyKbjXhQVJaGnuU0yjqmPh/XOIEDSJtDYukH83A0c
U3/kg8Xbhcy01Wqho5+DtAkUYRgiztgil7hXcDfTFjoXlWRSArFVjhNtZ1DK
XE013iL1LWayEHhciIcUiklghDUB3giaQNuKpMZDxMEKE+GjYlgk2Be8L2wv
CM4LYusjNIgOmahcpREZAd4f47iJUO+zRDoVxuOxKQveNNf2gWzFmkjDIGKx
QKgQSkYzTxbT0KM7qTb1zaViMcNpsDIcKqalBlyIlCgMb19faq4RBWJAAluo
OawUn2krkkJXLGYGaGgpUlOIhQTLsBpOeq6L6khnerBkbGprxoyXgmI9YB22
hjvIiRMkirmO40QFwQuCcLmJy4hDFV+ixmczeAgpJmohwBli1oIvYpUCcdNk
CRQ21jg6X1bnEfCwM7MQZeY4q+hUkgi2dEEATFmCiFszVyKaGYoqHCSgUA3d
Mwnh2jLPwH2ChPQ9YM3DkiRq4Y1ZeL3gRklrUmypiGM1wywzq2IUiJALyRJY
PQXfyUejY5AqZBRBNYAS4SGTxESOn6yCxIZKTELPs0S7b21vXZGdLMBlsI0V
FycmG5Dd66aTtFdzIs+pE4ji28uVM2E1PVJhnEY6kCuEcBxJGoMFEaAtfD+A
oHreSkDtFakg8RObF8w1rz3LRnNqMFtT7o4Ej3AeA0G6qnsfJgXKIEP6XLKo
NnSCjRObLCTkPhApqVNuCAgl7u74lBkOSHHsiOOVzkKwkDmJfyFzA9w0dXdG
TIPgRKwnbMsFYHVSOkw1EcTRJBHY1mpcE1d/8WIliiOTSqcl9nIqj4RGUEZj
Refi/vau03X/issr/vvm9N/vz29OT+jv27PBu3f1H4F/4/bs6v7dSfNXs3J4
dXFxCuzJX+KpWHkUdC4GP+Eb0ovO1fXd+dXl4F2n5lmtWaQfTpXZlBDVyaKl
DeDOohwgn73e6+H1f/3n/qF4evrDzZvhwf7+tx8++A/f7H99iA+w4NSdZlIY
sPsIQS4DmWVK5rQLcS6CF4ctIEch5Z+RYpLtg5F//Ctx5u/H4rtxlO0f/tk/
oAuvPKx4tvKQebb5ZGOxY+KWR1uOqbm58nyN06v0Dn5a+VzxvfXwu1cM/ML9
b179OSA3Scbrs++nF3FqPwTBpYHNsQZ7Fh8dHYDFDm5ZNg9CYLCMDiN8IGKA
sU5lF4sZYIgTLJtv3OgyJIN9U8HxM+Gz3SIvugkArveR2/3SHVHVKE9izUo8
ItLOB5eDxvzJA3fuGyr5nB8SM4YyLMVtBCwRMx2XhMkuEfFtxx9T71HIB0WQ
UkWAnK0Qx/arUtCS8zVJkdxFZOq9hFP4KtyDFg6ycARKskto+Cd2OqN/jDq7
olI6ZxNRUsbOBmqX0fMS4tt7MQFMsos46B2QXF6R1L452IPU5kw84mmUkBnw
+7ECJuLzscRmKiKQTayC18bqRixsNWIKX5uK+5tzgUQNbsY9rX0dyAKbDAdO
To+cLwOZr5FyLVgTLEVFJ/UwMYbLIa1jmCoKbdNcssfD20QOUdNCDOTzCfkg
/RachJEUPMLnLcjg+TxZFAAy7FAdgnGP58aSDnYSNSno7w6JBHyxRWiBmTnX
wPmeqh0Pvyjg1PG+xexvalYffguHtNutpQ1PPZoYMxILwhUktFo9IImFKROG
EGMVSbIkvjWxZONytEtPvZcwAkWlhpFXqx3QvfEyIACCjiFHypEEIGlj/S6D
g7SFnjKZw8zmejorPJRzwYsff7IkDAjIeRGr0Kg6E9B95BX22MOszt++Q1gK
Czn9258hgAiGbh1j4X5CDt8fPjCjEAk5+bNsUBU8ov0nRAB4wMgghgKTO4n1
VBfOs69Ej6cnFtLRHoQEWp6OXX7wp1b9sdHFjnjRkBHU3lH8Im7YCUmAC/xd
AW0Cnb+EG/+5R8GoKZqMsOpM/xMpFpf/GLQK2Am5sY3qyS+guSpAES+enlp1
ng8f3L5VKaK1c11eqEsTwtU/xPb9q9oKbQkWZr8vkbSj/YItgxGt+H1pmhcy
tAVTdYtM4Pbi7hphSqaWkvUm6mQGQWfJ2zkD/2qfVvvME+pLG5yw5wnHkjxD
lWa2axbk6XzCADm5pxWVr87Dk96DiZp0dqHGZBe+JEXHZSZ7+UX8ow2+TAK5
MUXoyCIXpZJQk3GEo5YRY9F5baku+sNubk+HglYzBkWMqPwNnVCb47YDAMo/
7wRC88+cYufF76zctOOXsbZpKnzRNotMxrQBVSepKBFRZH7vQzHUbtmoG3UQ
wgVwTEiLwj3W6cViQcuvTVYmAAjQQuF6C/DK01JZ65GH94Jvzv/j4vS4ylLq
ggNjSdezEe8MlVWuORY8vXBZIWBlEzhf9g57++TGCV0evTxYR5cjylOTkKLJ
iANPXffwRT6xwzkavkcMnVAMoM+d0fejjqBAvksxoOOQQejQDpgJYHdmFgo8
6da5MIIux7gaBbXPts8ES6oGOJTaAg2172hn8r4CUKMUU0XKVt0FFwJk4rS/
Bb0pWVkpeRB+Ue9BZhXd4dvheUKd1gmxB66a4fRqqYVOoUoD33i9tCJXOU51
L2RtI94AHGVEymgTuRRDeNxczhkB0DbalSM6o4FfQJh7NDi5OL+sPsiT+Tm+
oejLDvVg/5CEznjDOgksqIIFkC2BlECdybk4V+fhE0Y88zkoXhFRj/Pc9Xr0
v9ntRW6x8/TUKrwDtDWXEFTfIaCReVO4LpFXROItvMt5OsmBEvMyKkrC6tdv
z3fFsHb1xMeBL1Avxc5wsEu5JaE8tl3Ap/U6NGeoLiosSSTAak7F3X0yd/Rw
YB3uHDdUrRjoToc+ghokDgudkIEwxnIZCkHLEmwlNkAnxiVVO5YmpfJIsvT4
v0xLW4LTdBZBcFvQPmMqU42pWEt7Ua2QqxgOAVUq2aAsn0Nvg1beKTQyI4jl
7lqhrI1XnkNb9mNwC6hoDGaNeEGkCCH6GjzrOL6jR56zYwUD1tCpX9rZE71Y
a2cwWrEgdpJvz1nq4tyCZ4RFCUZUTg3JFxzbIW2ypmV+qy/bguD9XFIZbus+
XQaxP5N0K2T+aTt3Wxz4eo0D1BPdTvVOY6S7zMSqAcTL7OcsKj5jUWqiZwSO
bIc6/BQNoWTIbNuSPly7Z9MJod0ukDPXDSdOdkJfG94C87isTt6JQo2z8tVg
pdzRTS/GIbO2MNfJh3lK7+YZoXpM2N2qPc2tjlZu1f1EvSII1SbCV+opjeDq
MmBVc9NtJNQCWhdP9zm0wPzyB+/UBzmcQ+Ud+2oX+MgH1GfkWzd+xGOZwKvK
sU5ce/Bjgl7vH9HmdxTc4RkjyJspo7YRJ9MAln67tX6V2yr5BAfxUe2ttvi8
pXD9H/EHv7J8aT/35I8f2/2YMp/dNcr8Gd7paE2YHroOHSyQiZbOEldJfHY9
EOtzTdhgAHy4cBW6Nvbj9p2p0KNiqGRdUY8rgh6qNeBuo+DdVLlkFDG6NhuF
FZnVyuz7b6tYjiEbeXuaQfBNF89UV7vhDpqrmqxjV4rmvpvDILHuatQlENrV
e7AVWOihrM4JxXAF2Jeuc8U4QRZwG1lhV45ocaVVBnN9i0EDKG64GXlVcv+F
q7Lu3rSGrb2NruF7U7vJWTeXUb/o+5tp3CxZb3Zyy4GGQrhl5GvadSZQdZe4
ehgbTi/dGYrTqqoJs0Hbxjkkh23sZe4Sc8GPN/TYFc267dKo3wDfgRVrJWPJ
xcUHYDkCiA7IuoanTxDqzMCXpXNVS4Zasgpng0os95XOuuRdjVZgW59HUwuA
2pt6ThNpybLrq3mzci7B2jqxqbp/rMSJ601SfQVAMWPKVJ7jZSLFH5oYk3UJ
bQI4ikeZax9TfSduU3vYhjgfeb5V0BVxyTB4ZuZmDoPLZhApRZiSMm7KA16d
4Sv+5k8nV+e9/b3e/v7hUf9o7+X+wWGP/jn6iqu6Y+6Yt1UtNso3D53O00F1
I8B16PD+DOLq0hCgsf8q8SZ/xN2t46HXUFzzUTMCr6nrUqncHaILSH4mYcGQ
IgTFfQQ6wBdcDY0EaSze3s5ndtIkQhoZKvhDnW+Vgkx5hgUZGBm1hLiRI+de
tWjAj3ODqnPqZyrJ922zRGhFY8mkGJzOebGRqKhPvUbXpjn7jnSG2Ow8LMTr
8j3cum69tyu164bkqs+VuMhPcdpStXnXKHBvkM3rdM0R+BRhpR9Sn9VbtVRq
oHD9wKl9l3o7TIyr4UQ8k+gz6hEN2JTZiBvvkxJC5Gy3iQPOGmg1D+NVOMz3
FAquO7AxUZU+loVcXeS296T0goGbGGHyqFJgu03Xivr3G2RyS9zl+RRK3XiD
2cLjVh3FhRp2TC0HUlcW/JW/X2lh0PTFRkXHiwlhSyVc8VmVyYpbF2GIlyEE
mueQVCfReRXfOAvmxqPL5Smb9J5ktEKFx+rt3mTVj/Hvty/TW5uIqD2Aiwh0
FFNG1kjJdRv18E1Sb+BNIc8PifR4WIWalusYZPVESfbN7xWtpqdAktOazumK
SW7mq60Udv1PTysp9wcXgVcbIL4NfOODgIvAReXFt767s9632WXlLma5Ijyf
lPPUHgdB2KwROzS4RB1D6MwuvmkS/R2OJSEZhZP5jGryrfElfr0Zcdpxva6c
jNP/yWbkm0I01UXNZ89Av0OrxMY+3d2vFqfvuJJAi5nTarzpizlwZDMwM3GB
0Y2JqLCOzL+1z/wJ4faNqXAonVbPWDHX//B6eH3wFSFk0j4aP1Ept6v9eEm9
+8IXdOAC9TTlgSna8dYDHaeNvkoWu/rT+entD76gxIsElRWafhs9Yu2mgiRh
fIcNcWhW5jTz4ia7eAOCJWVSNCCZhueJFVfXNJrCrWCeoOfaN32qeuUEYVtn
2ZIdpckdiSfNN6dMhTvOlhm3cthSCBVR25sRDvcPaH8uvUnmWIPKGhHDIzm7
bfSj6yqVlRx8a59dFXl8N2eXV4rswValk5WTJlcpUzblNGbXr2nU7JFG/J0O
thS18kHbq8ptaNQL7rOYGyOEGVSiavTUslNmzYSVqSnfZrkhhq67gi1V/F91
CVvWONew6nUq1LbNQ5yuh5n/MU/xiY7iY7b3/9n0Ti8G5++GVzen//vmtwEt
fpsZNsv+D9hiTczzBon/txjKr9vm7UxSSFnHB2fykVlBBYTYc3TLlGStmkpz
zlDjeuYpIy+fRPqZUgBJQL9YyW6NiOoYV9WYbXviUyPxRJzzeRtBfjfpmRBj
l3jAAbU9f+qZlgI8+W6CExQQLoN1nl5d4fnqHNgbTls2Ry5pNNY6zOXjeDOH
5a9f2SajYcpCCfPSMBD+WcgljbiOVUG6Um/trMADNojkJ1V0acbHQWtXfaob
Ve3iy6dMzsg6D687gcKNFBBGXHkzXR9C7a4WhgBhFEEPEZHMSR1pvJnY8YAE
j1KH6IHIcR30Vl+xno2lefIJmfqMJ7z8lbxUSDdIMCp20zm2YhRnv7bMa1yl
6tSrMiSQVbkCZ3HeN8dVFQCZH9A+Jf+qJSJca+YmklKa02J9x9HwVnQmzaqv
Vsa49BTWP9JxEI3r/34+nPIRAtyDiKaS4fan/tcvwQWnC8rQj08iP7j4zOSw
7+n6DsHPTqW9xVbz/ZwE8KQ1criamCVYQEw+IfsYYsUDvljkPM4HDWX+VAka
F6IgRLXRQKtRfl3LxJbXskzEGRzknLNE7Zxnkz5wgzWn4fNHtWzv38qod9j4
yI1vuJFdP0lFcwQzd0pIuN/v4n8hyJTcSDunNEHOEvr5Rlcsywft7HuI69OM
52saBUxTcOlRqwVzmpSFfmzJ702JPxMoM8mLaqB6Ln7UERzNg65H3OiXDDTI
wI3HXM3BZZ3mk+gDjbVW9153mnCnV06nlpnz3o7yV+v5FrtFWLLjYzUx2OZW
ywO2hFP7TDeSL/1wwsb4eG0qTo3ovImcIwRLNyXKYdYXu2B5ZpXoje2cqjW/
cXBlFi/iR5mUqq6xPFcz20YSK4T/kUGPfMPSlG7CsvrlATvBdu2vmnGtylwZ
FcnytAtvpODXqCgZt2X7oiWtM+47LOkhwl45pmIUu8whT7NZp/jh3kuSCf3e
FzhvgOC3pa+zgS1+ddMDt+nLelM3ftbkCDsX94PNiZwVrNn+1WODGd2vbrau
rs5qdyB/O+n7jvQDIv0SUTHeMtl4LH68Hpx0xcVtMx3Y/kljtwploDMQLUpp
2lRPNVf33IEX7veh7cvu/iqNe47GfaKRoDrMmYouLvf1lQ1GJPi+mvxsVNKD
FW47bEXPWBVB3fRkKSw3EP4btKLYmGo+AAA=

-->

</rfc>

