<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-homburg-deleg-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="deleg">Extensible Delegation for DNS</title>
    <seriesInfo name="Internet-Draft" value="draft-homburg-deleg-01"/>
    <author fullname="Philip Homburg">
      <organization>NLnet Labs</organization>
      <address>
        <email>philip@nlnetlabs.nl</email>
      </address>
    </author>
    <author fullname="Tim Wicinski">
      <organization>Cox Communications</organization>
      <address>
        <email>tjw.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Jesse van Zutphen">
      <organization>University of Amsterdam</organization>
      <address>
        <email>Jesse.vanZutphen@os3.nl</email>
      </address>
    </author>
    <author fullname="Willem Toorop">
      <organization>NLnet Labs</organization>
      <address>
        <email>willem@nlnetlabs.nl</email>
      </address>
    </author>
    <date year="2025" month="April" day="03"/>
    <area>int</area>
    <workgroup>DNS Delegation</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>DNS</keyword>
    <keyword>Resolver</keyword>
    <keyword>Delegation</keyword>
    <keyword>Authoritative</keyword>
    <keyword>Deployable</keyword>
    <keyword>Extensible</keyword>
    <abstract>
      <?line 108?>

<t>This document proposes a mechanism for extensible delegations in the DNS.
The mechanism realizes delegations with resource record sets placed below a <tt>_deleg</tt> label in the apex of the delegating zone.
This authoritative delegation point can be aliased to other names using CNAME and DNAME.
This document proposes a new DNS resource record type, IDELEG, which is based on the SVCB and inherits extensibility from it.</t>
      <t>IDELEG RRsets containing delegation information will be returned in the authority section in referral responses from supportive authoritative name servers.
Lack of support in the authoritative name servers, forwarders or other components, does not obstruct obtaining the delegation information for resolvers, as it is originally authoritative information that can be queried for directly.
None, mixed or full deployment of the mechanism on authoritative name servers are all fully functional, allowing for the mechanism to be incrementally deployed on the authoritative name servers.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-homburg-deleg/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        deleg Working Group mailing list (<eref target="mailto:dd@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dd/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dd/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/NLnetLabs/incremental-deleg"/>.</t>
    </note>
  </front>
  <middle>
    <?line 119?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document describes a delegation mechanism for the Domain Name System (DNS) <xref target="STD13"/> that addresses several matters that, at the time of writing, are suboptimally supported or not supported at all.
These matters are elaborated upon in sections <xref format="counter" target="signaling"/>, <xref format="counter" target="outsourcing"/> and <xref format="counter" target="dnssec-protection"/>.
In addition, the mechanism described in this document aspires to be maximally deployable, which is elaborated upon in <xref target="deployability"/>.</t>
      <section anchor="signaling">
        <name>Signaling capabilities of the authoritative name servers</name>
        <t>A new IDELEG resource record (RR) type is introduced in this document, which is based on and inherits the wire and presentation format from SVCB <xref target="RFC9460"/>.
All Service Binding Mappings, as well as the capability signalling, that are specified in <xref target="RFC9461"/> are also applicable to IDELEG, with the exception of the limitations on AliasMode records in <xref section="6" sectionFormat="of" target="RFC9460"/>.
Capability signalling of <xref target="RFC7858">DNS over Transport Layer Protocol</xref> (DoT), <xref target="RFC8484">DNS Queries over HTTPS</xref> and <xref target="RFC9250">DNS over Dedicated QUIC Connections</xref>, on default or alternative ports, can all be used as specified in <xref target="RFC9461"/>.
The IDELEG RR type inherits its extensibility from the SVCB RR type, which is designed to be extensible to support future uses (such as keys for encrypting the TLS ClientHello <xref target="I-D.ietf-tls-esni"/>.)</t>
      </section>
      <section anchor="note-to-the-rfc-editor-please-remove-this-subsection-before-publication">
        <name><em>Note to the RFC Editor</em>: please remove this subsection before publication.</name>
        <t>The name IDELEG is chosen to avoid confusion with <xref target="I-D.wesplaap-deleg"/>.</t>
      </section>
      <section anchor="outsourcing">
        <name>Outsourcing operation of the delegation</name>
        <t>Delegation information is stored at an authoritative location in the zone with this mechanism.
Legacy methods to redirect this information to another location, possible under the control of another operator, such as (CNAME <xref section="3.6.2" sectionFormat="of" target="RFC1034"/>) and DNAME <xref target="RFC6672"/> remain functional.
One could even outsource all delegation operational practice to another party with a DNAME record on the <tt>_deleg</tt> label on the apex of the delegating zone.</t>
        <t>Additional to the legacy methods, a delegation may be outsourced to a set of third parties by having RRs in AliasMode.
Unlike SVCB, IDELEG allows for more than a single IDELEG RR in AliasMode in an IDELEG RRset, enabling outsourcing a delegation to multiple different operators.</t>
      </section>
      <section anchor="dnssec-protection">
        <name>DNSSEC protection of the delegation</name>
        <t>With legacy delegations, the NS RRset at the parent side of a delegation as well as glue records for the names in the NS RRset are not authoritative and not DNSSEC signed.
An adversary that is able to spoof a referral response, can alter this information and redirect all traffic for the delegation to a rogue name server undetected.
The adversary can then perceive all queries for the redirected zone (Privacy concern) and alter all unsigned parts of responses (such as further referrals, which is a Security concern).</t>
        <t>DNSSEC protection of delegation information prevents that, and is the only countermeasure that also works against on-path attackers.
At the time of writing, the only way to DNSSEC-validate and verify delegations at all levels in the DNS hierarchy is to revalidate delegations <xref target="I-D.ietf-dnsop-ns-revalidation"/>, which is done after the fact and has other security concerns (<xref section="7" sectionFormat="of" target="I-D.ietf-dnsop-ns-revalidation"/>).</t>
        <t>Direct delegation information (provided by IDELEG RRs in ServiceMode) includes the hostnames of the authoritative name servers for the delegation as well as IP addresses for those hostnames.
Since the information is stored authoritatively in the delegating zone, it will be DNSSEC-signed if the zone is signed.
When the delegation is outsourced, then it's protected when the zones providing the aliasing resource records <em>and</em> the zones serving the targets of the aliases are all DNSSEC-signed.</t>
      </section>
      <section anchor="deployability">
        <name>Maximize ease of deployment</name>
        <t>Delegation information is stored authoritatively within the delegating zone.
No semantic changes as to what zones are authoritative for what data are needed.
As a consequence, existing DNS software, such as authoritative name servers and DNSSEC signing software, can remain unmodified.
Unmodified authoritative name server software will serve the delegation information when queried for.
Unmodified signers will sign the delegation information in the delegating zone.
Support for IDELEG is only required for functionalities following delegations (like recursive resolvers), but they do not need of the components it queries.
None, mixed or full deployment of the mechanism on authoritative name servers are all fully functional, allowing for the mechanism to be incrementally deployed on the authoritative name servers.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>This document follows terminology as defined in <xref target="BCP219"/>.</t>
        <t>Throughout this document we will also use terminology with the meaning as defined below:</t>
        <dl newline="true">
          <dt>Deleg:</dt>
          <dd>
            <t>The delegation mechanism as specified in this document.</t>
          </dd>
          <dt>IDELEG delegation:</dt>
          <dd>
            <t>A delegation as specified in this document</t>
          </dd>
          <dt>Legacy delegations:</dt>
          <dd>
            <t>The way delegations are done in the DNS traditionally as defined in <xref target="STD13"/>.</t>
          </dd>
          <dt>Delegating zone:</dt>
          <dd>
            <t>The zone in which the delegation is administered.
Sometimes also called the "parent zone" of a delegation.</t>
          </dd>
          <dt>Subzone:</dt>
          <dd>
            <t>The zone that is delegated to from the delegating zone.</t>
          </dd>
          <dt>Delegating name:</dt>
          <dd>
            <t>The name which realizes the delegation.
In legacy delegations, this name is the same as the name of the subzone to which the delegation refers.
Delegations described in this document are provided with a different name than the zone that is delegated to.
If needed we differentiate by explicitly calling it IDELEG delegation name or legacy delegation name.</t>
          </dd>
          <dt>Deleg query:</dt>
          <dd>
            <t>An explicit query for IDELEG RRset at the delegating name as used for IDELEG delegations.</t>
          </dd>
          <dt>Delegation point:</dt>
          <dd>
            <t>The location in the delegating zone where the RRs are provided that make up the delegation.
In legacy delegations, this is the parent side of the zone cut and has the same name as the subzone.
With deleg, this is the location given by the IDELEG delegating name.
If needed we differentiate by explicitly calling it IDELEG delegation point or legacy delegation point.</t>
          </dd>
          <dt>Triggering query:</dt>
          <dd>
            <t>The query on which resolution a recursive resolver is working.</t>
          </dd>
          <dt>Target zone:</dt>
          <dd>
            <t>The zone for which the authoritative servers, that a resolver contacts while iterating, are authoritative.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="the-deleg-resource-record-type">
      <name>The IDELEG resource record type</name>
      <t>The IDELEG RR type is a variant of SVCB <xref target="RFC9460"/> for use with resolvers to perform iterative resolution (<xref section="5.3.3" sectionFormat="of" target="RFC1034"/>).
The IDELEG type requires registration in the "Resource Record (RR) TYPEs" registry under the "Domain Name System (DNS) Parameters" registry group (see <xref target="deleg-rr-type">IDELEG RR type</xref>).
The protocol-specific mapping specification for iterative resolutions are the same as those for "DNS Servers" <xref target="RFC9461"/>.</t>
      <t><xref section="2.4.2" sectionFormat="of" target="RFC9460"/> states that SVCB RRsets <bcp14>SHOULD</bcp14> only have a single RR in AliasMode, and that if multiple AliasMode RRs are present, clients or recursive resolvers <bcp14>SHOULD</bcp14> pick one at random.
Different from SVCB (<xref section="2.4.2" sectionFormat="of" target="RFC9460"/>), IDELEG allows for multiple AliasMode RRs to be present in a single IDELEG RRset.
Note however that the target of an IDELEG RR in AliasMode is an SVCB RRset for the "dns" service type adhering fully to the Service Binding Mapping for DNS Servers as specified in <xref target="RFC9461"/>.</t>
      <t><xref section="2.4.1" sectionFormat="of" target="RFC9460"/> states that within an SVCB RRset, all RRs <bcp14>SHOULD</bcp14> have the same mode, and that if an RRset contains a record in AliasMode, the recipient <bcp14>MUST</bcp14> ignore any ServiceMode records in the set.
Different from SVCB, mixed ServiceMode and AliasMode RRs are allowed in an IDELEG RRset.
When a mixed ServiceMode and AliasMode IDELEG RRset is encountered by a resolver, the resolver first picks one of the AliasMode RRs or all ServiceMode RRs, giving all ServiceMode RRs equal weight as each single AliasMode RR.
When the result of that choice is an AliasMode RR, then that RR is followed and the resulting IDELEG RRset is reevaluated.
When the result of that choice is all ServiceMode RRs, then within that set the resolver adheres to the ServicePriority value.</t>
      <t>At the delegation point (for example <tt>customer._deleg.example.</tt>), the host names of the authoritative name servers for the subzone, are given in the TargetName RDATA field of IDELEG records in ServiceMode.
Port Prefix Naming <xref section="3" sectionFormat="of" target="RFC9461"/> is not used at the delegation point, but <bcp14>MUST</bcp14> be used when resolving the aliased-to name servers with IDELEG RRs in AliasMode.</t>
    </section>
    <section anchor="delegation-administration">
      <name>Delegation administration</name>
      <t>An IDELEG delegation is realized with an IDELEG Resource Record set (RRset) <xref target="RFC9460"/> below a specially for the purpose reserved label with the name <tt>_deleg</tt> at the apex of the delegating zone.
The <tt>_deleg</tt> label scopes the interpretation of the IDELEG records and requires registration in the "Underscored and Globally Scoped DNS Node Names" registry (see <xref target="node-name">_deleg Node Name</xref>).
The full scoping of delegations includes the labels that are <strong>below</strong> the <tt>_deleg</tt> label and those, together with the name of the delegating domain, make up the name of the subzone to which the delegation refers.
For example, if the delegating zone is <tt>example.</tt>, then a delegation to subzone <tt>customer.example.</tt> is realized by a IDELEG RRset at the name <tt>customer._deleg.example.</tt> in the parent zone.
A fully scoped delegating name (such as <tt>customer._deleg.example.</tt>) is referred to further in this document as the "delegation point".</t>
      <t>Note that if the delegation is outsourcing to a single operator represented in a single IDELEG RR, it is <bcp14>RECOMMENDED</bcp14> to refer to the name of the operator's IDELEG RRset with a CNAME on the delegation point instead of a IDELEG RR in AliasMode <xref section="10.2" sectionFormat="of" target="RFC9460"/>.</t>
      <t>For reasons that will be explained in <xref target="unsigned-support"/>, operators <bcp14>SHOULD</bcp14> include the following in zones that include IDELEG records: <tt>*._deleg  86400  IN  IDELEG 0 .</tt></t>
      <section anchor="examples">
        <name>Examples</name>
        <section anchor="one-name-server-within-the-subzone">
          <name>One name server within the subzone</name>
          <figure anchor="zone-within">
            <name>One name server within the subzone</name>
            <sourcecode type="~"><![CDATA[
$ORIGIN example.
@                 IN  SOA    ns zonemaster ...
customer1._deleg  IN  IDELEG 1 ( ns.customer1
                                 ipv4hint=198.51.100.1,203.0.113.1
                                 ipv6hint=2001:db8:1::1,2001:db8:2::1
                               )
]]></sourcecode>
          </figure>
        </section>
        <section anchor="two-name-servers-within-the-subzone">
          <name>Two name servers within the subzone</name>
          <figure anchor="zones-within">
            <name>Two name servers within the subzone</name>
            <artwork><![CDATA[
$ORIGIN example.
@                 IN  SOA    ns zonemaster ...
customer2._deleg  IN  IDELEG 1 ns1.customer2 ( ipv4hint=198.51.100.1
                                               ipv6hint=2001:db8:1::1
                                             )
                  IN  IDELEG 1 ns2.customer2 ( ipv4hint=203.0.113.1
                                               ipv6hint=2001:db8:2::1
                                             )
]]></artwork>
          </figure>
        </section>
        <section anchor="outsourced-to-an-operator">
          <name>Outsourced to an operator</name>
          <figure anchor="outsourced-cname">
            <name>Outsourced with CNAME</name>
            <artwork><![CDATA[
$ORIGIN example.
@                 IN  SOA   ns zonemaster ...
customer3._deleg  IN  CNAME _dns.ns.operator1
]]></artwork>
          </figure>
          <t>Instead of using CNAME, the outsourcing could also have been accomplished with an IDELEG RRset with a single IDELEG RR in AliasMode.
The configuration below is operationally equivalent to the CNAME configuration above.
It is <bcp14>RECOMMENDED</bcp14> to use a CNAME over an IDELEG RRset with a single IDELEG RR in AliasMode (<xref section="10.2" sectionFormat="of" target="RFC9460"/>).
Note that an IDELEG RRset refers with TargetName to a DNS service <xref target="RFC9461"/>, which will be looked up using Port Prefix Naming <xref section="3" sectionFormat="of" target="RFC9461"/>, but that an CNAME refers to the domain name of the target SVCB RRset instead (or CNAME) which may have a <tt>_dns</tt> prefix.</t>
          <figure anchor="outsourced-svcb">
            <name>Outsourced with an AliasMode IDELEG RR</name>
            <artwork><![CDATA[
$ORIGIN example.
@                 IN  SOA    ns zonemaster ...
customer3._deleg  IN  IDELEG 0 ns.operator1
]]></artwork>
          </figure>
          <t>The operator SVCB RRset could for example be:</t>
          <figure anchor="operator-zone">
            <name>Operator zone</name>
            <artwork><![CDATA[
$ORIGIN operator1.example.
@                 IN  SOA    ns zonemaster ...
_dns.ns           IN  SVCB   1 ns ( alpn=h2,dot,h3,doq
                                    ipv4hint=192.0.2.1
                                    ipv6hint=2001:db8:3::1
                                    dohpath=/q{?dns}
                                  )
                  IN  SVCB   2 ns ( ipv4hint=192.0.2.2
                                    ipv6hint=2001:db8:3::2
                                  )
ns                IN  AAAA   2001:db8:3::1
                  IN  AAAA   2001:db8:3::2
                  IN  A      192.0.2.1
                  IN  A      192.0.2.2
]]></artwork>
          </figure>
        </section>
        <section anchor="dnssec-signed-name-servers-within-the-subzone">
          <name>DNSSEC-signed name servers within the subzone</name>
          <figure anchor="dnssec-zone">
            <name>DNSSEC-signed deleg zone</name>
            <artwork><![CDATA[
$ORIGIN
@                 IN  SOA    ns zonemaster ...
                  IN  RRSIG  SOA ...
                  IN  DNSKEY 257 3 15 ...
                  IN  RRSIG  DNSKEY ...
                  IN  NS     ns.example.
                  IN  RRSIG  NS ...
                  IN  NSEC   customer5._deleg NS SOA RRSIG NSEC DNSKEY
                  IN  RRSIG  NSEC ...

customer5._deleg  IN  IDELEG 1 ns.customer5 alpn=h2,h3 (
                                            ipv4hint=198.51.100.5
                                            ipv6hint=2001:db8:5::1
                                            dohpath=/dns-query{?dns}
                                            )
                  IN  RRSIG  IDELEG ...
                  IN  NSEC   customer7._deleg RRSIG NSEC IDELEG
                  IN  RRSIG  NSEC ...

customer7._deleg  IN  CNAME  customer5._deleg
                  IN  RRSIG  CNAME ...
                  IN  NSEC   customer5 CNAME RRSIG NSEC
                  IN  RRSIG  NSEC ...

customer5         IN  NS     ns.customer5
ns.customer5      IN  A      198.51.100.5
                  IN  AAAA   2001:db8:5::1
customer5         IN  DS     17405 15 2 ...
                  IN  RRSIG  DS ...
                  IN  NSEC   customer6 NS DS RRSIG NSEC
                  IN  RRSIG  NSEC ...

customer6         IN  NS     ns.customer6
ns.customer6      IN  A      203.0.113.1
                  IN  AAAA   2001:db8:6::1
customer6         IN  DS     ...
                  IN  RRSIG  DS ...
                  IN  NSEC   customer7 NS DS RRSIG NSEC
                  IN  RRSIG  NSEC ...

customer7         IN  NS     ns.customer5
                  IN  DS     ...
                  IN  RRSIG  DS ...
                  IN  NSEC   example. NS DS RRSIG NSEC
                  IN  RRSIG  NSEC ...
]]></artwork>
          </figure>
          <t><tt>customer5.example.</tt> is delegated to in an extensible way and <tt>customer6.example.</tt> is delegated only in a legacy way.
<tt>customer7.example.</tt>'s delegation is outsourced to customer5's delegation.</t>
          <t>The delegation signals that the authoritative name server supports DoH.
<tt>customer5.example.</tt>, <tt>customer6.example.</tt> and <tt>example.</tt> are all DNSSEC-signed.
The DNSSEC authentication chain links from <tt>example.</tt> to <tt>customer5.example.</tt> in the for DNSSEC conventional way with the signed <tt>customer5.example. DS</tt> RRset in the <tt>example.</tt> zone.
Also, <tt>customer6.example.</tt> is linked to from <tt>example.</tt> with the signed <tt>customer6.example. DS</tt> RRset in the <tt>example.</tt> zone.</t>
          <t>Note that both <tt>customer5.example.</tt> and <tt>customer6.example.</tt> have legacy delegations in the zone as well.
It is important to have those legacy delegations to maintain support for legacy resolvers, that do not support deleg.
DNSSEC signers <bcp14>SHOULD</bcp14> construct the NS RRset and glue for the legacy delegation from the IDELEG RRset.</t>
        </section>
      </section>
    </section>
    <section anchor="auth-support">
      <name>Authoritative name server support</name>
      <t>Deleg supporting authoritative name servers include the IDELEG delegation information (or the NSEC(3) records showing the non-existence) in the authority section of referral responses to legacy DNS queries.
For example, querying the zone from <xref target="dnssec-zone"/> for <tt>www.customer5.example. A</tt>, will return the following referral response:</t>
      <figure anchor="deleg-response">
        <name>A deleg referral response</name>
        <artwork><![CDATA[
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 54349
;; flags: qr ; QUERY: 1, ANSWER: 0, AUTHORITY: 5, ADDITIONAL: 2
;; QUESTION SECTION:
;; www.customer5.example.       IN      A

;; ANSWER SECTION:

;; AUTHORITY SECTION:
customer5.example.      3600    IN      NS      ns.customer5.example.
customer5.example.      3600    IN      DS      ...
customer5.example.      3600    IN      RRSIG   DS ...
customer5._deleg.example.       3600    IN      IDELEG 1 (
                ns.customer5.example. alpn=h2,h3
                ipv4hint=198.51.100.5 ipv6hint=2001:db8:5::1
                dohpath=/dns-query{?dns}
                )
customer5._deleg.example.       3600    IN      RRSIG   IDELEG ...

;; ADDITIONAL SECTION:
ns.customer5.example.   3600    IN      A       198.51.100.5
ns.customer5.example.   3600    IN      AAAA    2001:db8:5::1

;; Query time: 0 msec
;; EDNS: version 0; flags: do ; udp: 1232
;; SERVER: 192.0.2.53
;; WHEN: Mon Feb 24 20:36:25 2025
;; MSG SIZE  rcvd: 456
]]></artwork>
      </figure>
      <t>The referral response in <xref target="deleg-response"/> includes the signed IDELEG RRset in the authority section.</t>
      <t>As another example, querying the zone from <xref target="dnssec-zone"/> for <tt>www.customer6.example. A</tt>, will return the following referral response:</t>
      <figure anchor="no-incr-deleg-response">
        <name>Referral response without deleg</name>
        <artwork><![CDATA[
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 36574
;; flags: qr ; QUERY: 1, ANSWER: 0, AUTHORITY: 9, ADDITIONAL: 2
;; QUESTION SECTION:
;; www.customer6.example.       IN      A

;; ANSWER SECTION:

;; AUTHORITY SECTION:
customer6.example.      3600    IN      NS      ns.customer6.example.
customer6.example.      3600    IN      DS      ...
customer6.example.      3600    IN      RRSIG   DS ...
customer5._deleg.example.       1234    IN      NSEC    (
                customer7._deleg.example.  RRSIG NSEC IDELEG )
customer5._deleg.example.       1234    IN      RRSIG   NSEC ...
example.        1234    IN      NSEC    (
                customer5._deleg.example.  NS SOA RRSIG NSEC DNSKEY )
example.        1234    IN      RRSIG   NSEC ...

;; ADDITIONAL SECTION:
ns.customer6.example.   3600    IN      A       203.0.113.1
ns.customer6.example.   3600    IN      AAAA    2001:db8:6::1

;; Query time: 0 msec
;; EDNS: version 0; flags: do ; udp: 1232
;; SERVER: 192.0.2.53
;; WHEN: Tue Feb 25 10:23:53 2025
;; MSG SIZE  rcvd: 744
]]></artwork>
      </figure>
      <t>Next to the legacy delegation, the deleg supporting authoritative returns the NSEC(3) RRs needed to show that there was no IDELEG delegation in the referral response in <xref target="no-incr-deleg-response"/>.</t>
      <t>Querying the zone from <xref target="dnssec-zone"/> for <tt>www.customer7.example. A</tt>, will return the following referral response:</t>
      <figure anchor="alias-response">
        <name>Aliasing referral response</name>
        <artwork><![CDATA[
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 9456
;; flags: qr ; QUERY: 1, ANSWER: 0, AUTHORITY: 7, ADDITIONAL: 2
;; QUESTION SECTION:
;; www.customer7.example.       IN      A

;; ANSWER SECTION:

;; AUTHORITY SECTION:
customer7.example.      3600    IN      NS      ns.customer5.example.
customer7.example.      3600    IN      DS      ...
customer7.example.      3600    IN      RRSIG   DS ...
customer7._deleg.example.       3600    IN      CNAME   (
                customer5._deleg.example. )
customer7._deleg.example.       3600    IN      RRSIG   CNAME ...
customer5._deleg.example.       3600    IN      IDELEG   1 (
                ns.customer5.example. alpn=h2,h3
                ipv4hint=198.51.100.5 ipv6hint=2001:db8:5::1 )
customer5._deleg.example.       3600    IN      RRSIG   IDELEG ...

;; ADDITIONAL SECTION:
ns.customer5.example.   3600    IN      A       198.51.100.5
ns.customer5.example.   3600    IN      AAAA    2001:db8:5::1

;; Query time: 0 msec
;; EDNS: version 0; flags: do ; udp: 1232
;; SERVER: 192.0.2.53
;; WHEN: Tue Feb 25 10:55:07 2025
;; MSG SIZE  rcvd: 593
]]></artwork>
      </figure>
      <t>The delegation of <tt>customer7.example.</tt> is aliased to the one that is also used by <tt>customer5.example.</tt>
Since both delegations are in the same zone, the authoritative name server for <tt>example.</tt> returns both the CNAME realising the alias, as well as the IDELEG RRset which is the target of the alias in <xref target="alias-response"/>.
In other cases a returned CNAME or IDELEG RR in AliasMode may need further chasing by the resolver.
<!-- TODO: Add an AliasMode referral without expansion within the zone -->
      </t>
      <t>With unsigned zones, only if an IDELEG delegation exists, the IDELEG RRset (or CNAME) will be present in the authority section of referral responses.
<!-- TODO: Add a referral response for an unsigned zone -->
If there is no IDELEG delegation, then the IDELEG RRset (or CNAME) is simply absent from the authority section and the referral response is indistinguishable from an non deleg supportive authoritative.
<!-- TODO: Add a non deleg referral response for an unsigned zone -->
      </t>
      <section anchor="controlled-support-registration">
        <name>Registration of authoritative name server support</name>
        <t>When the authority section of a referral response contains an IDELEG RRset or a CNAME record on the IDELEG delegation name, or valid NSEC(3) RRs showing the non-existence of such an IDELEG or CNAME RRset, then IDELEG supporting resolver <bcp14>SHOULD</bcp14> register that the contacted authoritative name server supports deleg for the duration indicated by the TTL for that IDELEG, CNAME or NSEC(3) RRset, adjusted to the resolver's TTL boundaries (<xref section="4" sectionFormat="of" target="RFC8767"/>), but only if it is longer than any already registered duration.</t>
        <t>For example, in <xref target="deleg-response"/>, the IDELEG RRset at the IDELEG delegation point has TTL 3600.
The resolver should register that the contacted authoritative name server supports deleg for (at least) 3600 seconds (one hour).
All subsequent queries to that authoritative name server <bcp14>SHOULD NOT</bcp14> include deleg queries to be send in parallel.</t>
        <t>If the authority section contains more than one RRset making up the IDELEG delegation, then the RRset with the longest TTL <bcp14>MUST</bcp14> be taken to determine the duration for which deleg support is registered.</t>
        <t>For example, in <xref target="alias-response"/>, both a CNAME and an IDELEG RRset for the IDELEG delegation are included in the authority section.
The longest TTL must be taken for deleg support registration, though because the TTL of both RRsets is 3600, it does not matter in this case.</t>
        <t>If an proof of non-existence of an IDELEG delegation is returned in the authority section of a referral response, IDELEG supporting resolvers <bcp14>SHOULD</bcp14> register that the authoritative name server that returned that response supports IDELEG for the duration of the maximum of the TTL of the NSEC(3) covering the name of the IDELEG delegation and the minimum rdata field of the SOA for the zone, adjusted to the boundaries for TTL values that the resolver has (<xref section="4" sectionFormat="of" target="RFC8767"/>), but only if it is longer than any already registered duration.</t>
      </section>
      <section anchor="unsigned-support">
        <name>Support detection with unsigned zones</name>
        <t>An IDELEG RRset on an IDELEG delegation point, with an IDELEG RR in AliasMode, aliasing to the root zone, <bcp14>MUST</bcp14> be interpreted to mean that the legacy delegation information <bcp14>MUST</bcp14> be used to follow the referral.
All service parameters for such AliasMode (aliasing to the root) IDELEG RRs on the IDELEG delegation point, <bcp14>MUST</bcp14> be ignored.</t>
        <t>For example, such an IDELEG RRset registered on the wildcard below the <tt>_deleg</tt> label on the apex of a zone, can signal that legacy DNS referrals <bcp14>MUST</bcp14> be used for both signed and <em>unsigned</em> zones:</t>
        <figure anchor="wildcard-deleg">
          <name>Wildcard IDELEG delegation to control duration of detected support</name>
          <artwork><![CDATA[
$ORIGIN example.
@                 IN  SOA   ns zonemaster ...
*._deleg   86400  IN  IDELEG 0 .
customer1._deleg  IN  IDELEG 1 ( ns.customer1
                                 ipv4hint=198.51.100.1,203.0.113.1
                                 ipv6hint=2001:db8:1::1,2001:db8:2::1
                               )
customer3._deleg  IN  CNAME _dns.ns.operator1
]]></artwork>
        </figure>
        <t>Resolvers <bcp14>SHOULD</bcp14> register that an authoritative name server supports deleg, if such an IDELEG RRset is returned in the authority section of referral responses, for the duration of the TTL if the IDELEG RRset, adjusted to the resolver's TTL boundaries (<xref section="4" sectionFormat="of" target="RFC8767"/>), but only if it is longer than any already registered duration.
Note that this will also be included in referral responses for unsigned zones, which would otherwise not have signalling of deleg support by the authoritative name server.</t>
        <t>Also, signed zones need fewer RRs to indicate that no IDELEG delegation exists.
The wildcard expansion already shows the closest encloser (i.e. <tt>_deleg.&lt;apex&gt;</tt>), so only one additional NSEC(3) is needed to show non-existence of the queried-for name below the closest encloser.</t>
        <t>This method of signalling that the legacy delegation <bcp14>MUST</bcp14> be used, is <bcp14>RECOMMENDED</bcp14>.</t>
      </section>
      <section anchor="deregistering-authoritative-name-server-support">
        <name>Deregistering authoritative name server support</name>
        <t>If the resolver knows that the authoritative name server supports deleg, <em>and</em> a DNSSEC-signed zone is being served, then all referrals <bcp14>SHOULD</bcp14> contain either an IDELEG delegation, or NSEC(3) records showing that the delegation does not exist.
If a referral is returned that does not contain an IDELEG delegation nor an indication that it does not exist, then the resolver <bcp14>MAY</bcp14> deregister that the authoritative server supports IDELEG and <bcp14>MUST</bcp14> send an additional deleg query to find the delegation (or denial of its existence) (see also <xref target="without-support">Resolving without authoritative name server support</xref>).</t>
      </section>
    </section>
    <section anchor="without-support">
      <name>Resolving without authoritative name server support</name>
      <t>In two cases, resolvers do <strong>not</strong> need to do additional processing.</t>
      <ol spacing="normal" type="1"><li>
          <t>As part of the processing a recursive resolver does, it learns where the zone boundaries are in the DNS name tree.
If the triggering query name is already known to be the apex of a zone, then no further delegation point probing will need to be done for this name (subject to the TTL of this information).</t>
        </li>
        <li>
          <t>If a resolver encounters a non-referral response, then no delegations are involved and no further delegation probing is needed for this name (subject to the TTL of this information).</t>
        </li>
      </ol>
      <t>If a resolver encounters an referral that does not contain an IDELEG delegation nor an indication that it does not exist, then the resolver <bcp14>MUST</bcp14> find out whether the queried zone contains IDELEG delegations at all.</t>
      <ol spacing="normal" type="1"><li>
          <t>For DNSSEC signed zones, a direct query for the IDELEG delegation information suffices (see <xref target="deleg-query">The deleg query</xref>).</t>
        </li>
        <li>
          <t>For unsigned zones, if unknown, the presence of the <tt>_deleg</tt> label at the zone's apex needs to be detected in addition to a direct query for the IDELEG delegation information (see <xref target="presence"><tt>_deleg</tt> label presence</xref>).</t>
        </li>
      </ol>
      <t>Sub section <xref target="additional-summary">Summary</xref> contains an overview summarizing sub sections <xref target="deleg-query"/> and <xref target="presence"/></t>
      <section anchor="deleg-query">
        <name>The deleg query</name>
        <t>The deleg query name is constructed by concatenating the first label below the part that the triggering query name has in common with the target zone, a <tt>_deleg</tt> label and the name of the target zone.
For example if the triggering query is <tt>www.customer.example.</tt> and the target zone <tt>example.</tt>, then the deleg query name is <tt>customer._deleg.example.</tt>
For another example, if the triggering query is <tt>www.faculty.university.example.</tt> and the target zone <tt>faculty.university.example.</tt> then the deleg query name is <tt>www._deleg.faculty.university.example.</tt></t>
        <t>DNAME, CNAME and IDELEG in AliasMode processing happens as before, though note that when following an IDELEG RR in AliasMode the target RR type is SVCB (see <xref target="the-deleg-resource-record-type"/>).
The eventual deleg query response, after following all redirections caused by DNAME, CNAME and AliasMode IDELEG RRs, has three possible outcomes:</t>
        <ol spacing="normal" type="1"><li>
            <t>An IDELEG RRset in ServiceMode is returned in the response's answer section containing the delegation for the subzone.  </t>
            <t>
The IDELEG RRs in the RRset <bcp14>MUST</bcp14> be used to follow the referral.
The TargetName data field in the IDELEG RRs in the RRset <bcp14>MUST</bcp14> be used as the names for the name servers to contact for the subzone, and the ipv4hint and ipv6hint parameters <bcp14>MUST</bcp14> be used as the IP addresses for the TargetName in the same IDELEG RR.  </t>
            <t>
The NS RRset and glue, from the referral response, <bcp14>MUST NOT</bcp14> be used, but the signed DS record (or NSEC(3) records indicating that there was no DS) <bcp14>MUST</bcp14> be used in linking the DNSSEC authentication chain as which would conventionally be done with DNSSEC as well.</t>
          </li>
          <li>
            <t>The deleg query name does not exist (NXDOMAIN).  </t>
            <t>
There is no IDELEG delegation for the subzone, and the referral response for the legacy delegation <bcp14>MUST</bcp14> be processed as would be done with legacy DNS and DNSSEC processing.  </t>
            <t>
When the query was for an DNSSEC signed zone, the NXDOMAIN response will expose whether or not the <tt>_deleg</tt> label exists at the zone's apex.
If it does not exist, this should be registered for the duration of the maximum of the TTL of the NSEC(3) covering the <tt>_deleg</tt> label and the minimum rdata field of the SOA for the zone, adjusted to the boundaries for TTL values that the resolver has (<xref section="4" sectionFormat="of" target="RFC8767"/>).
For this period, deleg queries to this zone <bcp14>MUST NOT</bcp14> be made (see also <xref target="presence"/>).</t>
          </li>
          <li>
            <t>The deleg query name does exist, but resulted in a NOERROR no answer response (also known as a NODATA response).  </t>
            <t>
If the legacy query, did result in a referral for the same number of labels as the subdomain that the deleg query was for, then there was no IDELEG delegation for the subzone, and the referral response for the legacy delegation <bcp14>MUST</bcp14> be processed as would be done with legacy DNS and DNSSEC processing.  </t>
            <t>
Otherwise, the subzone may be more than one label below the delegating zone.  </t>
            <t>
A new deleg query <bcp14>MUST</bcp14> be spawned, matching the zone cut of the initial referral response.
For example if the triggering query is <tt>www.university.ac.example.</tt> and the target zone <tt>example.</tt>, and the legacy response contained an NS RRset for <tt>university.ac.example.</tt>, then the deleg query name is <tt>university.ac._deleg.example.</tt>
The response to the new deleg query <bcp14>MUST</bcp14> be processed as described above, as if it was the initial deleg query.  </t>
            <t>
If the legacy query was sent minimised and needs a followup query, then parallel to that followup query a new deleg query will be sent, adding a single label to the previous deleg query name.
For example if the triggering query is <tt>www.university.ac.example.</tt> and the target zone is <tt>example.</tt> and the minimised legacy query name is <tt>ac.example.</tt> (which also resulted in a NOERROR no answer response), then the deleg query to be sent along in parallel with the followup legacy query will become <tt>university.ac._deleg.example.</tt>
Processing of the responses of those two new queries will be done as described above.</t>
          </li>
        </ol>
      </section>
      <section anchor="presence">
        <name><tt>_deleg</tt> label presence</name>
        <t>Absence of the <tt>_deleg</tt> label in a zone is a clear signal that the zone does not contain any IDELEG delegations.
Recursive resolvers <bcp14>SHOULD NOT</bcp14> send any additional deleg queries for zones for which it is known that it does not contain the <tt>_deleg</tt> label at the apex.
The state regarding the presence of the <tt>_deleg</tt> label within a resolver can be "unknown", "known not to be present", or "known to be present".</t>
        <t>The state regarding the presence of the <tt>_deleg</tt> label can be deduced from the response of the deleg query, if the target zone is signed with DNSSEC.
<strong>No</strong> additional queries are needed.
If the target zone is unsigned, the procedure as described in the remainder of this section <bcp14>SHOULD</bcp14> be followed.</t>
        <section anchor="test-deleg-label-presence-unsigned-zones-only">
          <name>Test <tt>_deleg</tt> label presence (unsigned zones only)</name>
          <t>When the presence of a <tt>_deleg</tt> label is "unknown", a <tt>_deleg</tt> presence test query <bcp14>SHOULD</bcp14> be sent in parallel to the next query for the unsigned target zone (though not when the target name server is known to support _deleg, which is discussed in <xref target="auth-support">Authoritative name server support</xref>).
The query name for the test query is the <tt>_deleg</tt> label prepended to the apex of zone for which to test presence, with query type NS.</t>
          <t>The testing query can have three possible outcomes:</t>
          <ol spacing="normal" type="1"><li>
              <t>The <tt>_deleg</tt> label does not exist within the zone, and an NXDOMAIN response is returned.  </t>
              <t>
The non-existence of the <tt>_deleg</tt> label <bcp14>MUST</bcp14> be registered for the duration indicated by the "minimum" RDATA field of the SOA resource record in the authority section, adjusted to the boundaries for TTL values that the resolver has (<xref section="4" sectionFormat="of" target="RFC8767"/>).
For the period the non-existence of the <tt>_deleg</tt> label is cached, the label is "known not to be present" and the resolver <bcp14>SHOULD NOT</bcp14> send any (additional) deleg queries.</t>
            </li>
            <li>
              <t>The <tt>_deleg</tt> label does exist within the zone but contains no data.
A NOERROR response is returned with no RRs in the answer section.  </t>
              <t>
The existence of the <tt>_deleg</tt> name <bcp14>MUST</bcp14> be cached for the duration indicated by the "minimum" RDATA field of the SOA resource record in the authority section, adjusted to the resolver's TTL boundaries (<xref section="4" sectionFormat="of" target="RFC8767"/>).
For the period the existence of the empty non-terminal at the <tt>_deleg</tt> label is cached, the label is "known to be present".</t>
            </li>
            <li>
              <t>The <tt>_deleg</tt> label does exist within the zone, but is a delegation.
A NOERROR legacy referral response is returned with an NS RRset in the authority section.  </t>
              <t>
The resolver <bcp14>MUST</bcp14> record that the zone does not have valid IDELEG delegations deployed for the duration indicated by the NS RRset's TTL value, adjusted to the resolver's TTL boundaries (<xref section="4" sectionFormat="of" target="RFC8767"/>).
For the period indicated by the NS RRset's TTL value, the zone is considered to <strong>not</strong> to have valid IDELEG delegations, and <bcp14>MUST NOT</bcp14> send any (additional) deleg queries.</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="additional-summary">
        <name>Summary</name>
        <t>Table <xref target="xtraqueries"/> provides an overview of when additional queries, following a non-IDELEG referral response, are sent.</t>
        <table anchor="xtraqueries">
          <name>Additional queries to an non-IDELEG referral response</name>
          <thead>
            <tr>
              <th align="center"> </th>
              <th align="center">auth support</th>
              <th align="center">_deleg presence</th>
              <th align="left">|</th>
              <th align="center">&lt;sub&gt;._deleg.&lt;apex&gt; IDELEG</th>
              <th align="center">_deleg.&lt;apex&gt; A</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">1</td>
              <td align="center">Yes</td>
              <td align="center">*</td>
              <td align="left">|</td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="center">2</td>
              <td align="center">No</td>
              <td align="center">No</td>
              <td align="left">|</td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="center">3</td>
              <td align="center">No</td>
              <td align="center">Yes</td>
              <td align="left">|</td>
              <td align="center">X</td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="center">4</td>
              <td align="center">No</td>
              <td align="center">Unknown</td>
              <td align="left">|</td>
              <td align="center">X</td>
              <td align="center">only for unsigned zones</td>
            </tr>
          </tbody>
        </table>
        <t>The two headers on the left side of the table mean the following:</t>
        <dl newline="true">
          <dt>auth support:</dt>
          <dd>
            <t>Whether or not the target authoritative server supports incremental deleg.
"Yes" means support is registered and "No" means support is not registered.</t>
          </dd>
          <dt><tt>_deleg</tt> presence:</dt>
          <dd>
            <t>Whether or not the <tt>_deleg</tt> label is present in the target zone (and thus incremental delegations)
"Yes" means it is present, "No" means it is not present, "Unknown" means this is not yet known and "*" means it doesn't matter.</t>
          </dd>
        </dl>
        <t>On the right side of the table are the additional follow-up queries, to be sent in response to non-IDELEG referrals.
The <tt>_deleg</tt> presence test query (most right column) only needs to be sent to unsigned target zones, because its non-existence will be shown in the NSEC(3) records showing the non-existence of the incremental delegation (second from right column).</t>
        <t>If the query name is the same as the apex of the target zone, or the response is a non-referral response, no additional queries need to be sent.
Otherwise:</t>
        <ol spacing="normal" type="1"><li>
            <t>If the authoritative name server supports IDELEG (Row 1), no additional queries need to be sent.</t>
          </li>
          <li>
            <t>If the <tt>_deleg</tt> label is known not to exist in the target zone (Row 2), no additional queries need to be sent.</t>
          </li>
          <li>
            <t>If the <tt>_deleg</tt> label is known to exist in the target zone, but there was no authoritative name server support in the referral response (Row 3), an additional deleg query (<xref target="deleg-query"/>) needs to be sent.</t>
          </li>
          <li>
            <t>If it is not known whether or not the <tt>_delewg</tt> label exists, and there was no authoritative name server support in the referral response (Row 4), an additional deleg query (<xref target="deleg-query"/>) needs to be sent.
If the target zone is unsigned, presence of the <tt>_deleg</tt> label needs to be tested explicitly as well (<xref target="presence"/>).</t>
          </li>
        </ol>
        <section anchor="reduced-latency">
          <name>Reduced latency</name>
          <t>Latency can be reduced with one round trip when the deleg query is sent in parallel to the legacy query.
This will induce more additional queries since authoritative name server support (eliminating the need to send deleg queries), is detected from the legacy query.</t>
        </section>
      </section>
    </section>
    <section anchor="priming-queries">
      <name>Priming queries</name>
      <t>Some zones, such as the root zone, are targeted directly from hints files.
Information about which authoritative name servers and with capabilities, <bcp14>MAY</bcp14> be provided in an IDELEG RRset directly at the <tt>_deleg</tt> label under the apex of the zone.
Priming queries from an deleg supporting resolver, <bcp14>MUST</bcp14> send an <tt>_deleg.&lt;apex&gt; IDELEG</tt> query in parallel to the legacy <tt>&lt;apex&gt; NS</tt> query and process the content as if it was found through an referral response.</t>
    </section>
    <section anchor="limitations">
      <name>Limitations</name>
      <t>The presence of the <tt>_deleg</tt> label in the delegation information reduces that maximum length of a domain name for a zone to 248 bytes.
Note that names within zones are not limited and can still be 255 bytes.</t>
    </section>
    <section anchor="how-does-the-protocol-described-in-this-draft-meet-the-requirements">
      <name>How does the protocol described in this draft meet the requirements</name>
      <t>This section will discuss how deleg meets the requirements for a new delegation mechanism as described in <xref target="I-D.ietf-deleg-requirements-02"/></t>
      <ul spacing="normal">
        <li>
          <t>H1. DELEG must not disrupt the existing registration model of domains.  </t>
          <t>
The existing zone structure including the concept of delegations from
a parent zone to a child zone is left unchanged.</t>
        </li>
        <li>
          <t>H2. DELEG must be backwards compatible with the existing ecosystem.  </t>
          <t>
The new delegations do not interfere with legacy software.  </t>
          <t>
The behavior of deleg supporting resolvers includes a fallback to NS
records if no IDELEG delegation is present (See <xref target="deleg-query"/>).</t>
        </li>
        <li>
          <t>H3. DELEG must not negatively impact most DNS software.  </t>
          <t>
Deleg introduces a new RR type.
Software that parses zone file format needs to be changed to support the new
type.
Though unknown type notation <xref target="RFC3597"/> can be used in some cases if no support for the new RR type is present.
Existing authoritatives can serve IDELEG zones (though less efficiently), existing signers can sign IDELEG zones, existing diagnostic tools can query IDELEG zones.
Non-recursive DNSSEC validators can operate independently from (possibly legacy) recursive resolvers.</t>
        </li>
        <li>
          <t>H4. DELEG must be able to secure delegations with DNSSEC.  </t>
          <t>
IDELEG delegations as described in this document are automatically secured with DNSSEC
(if the parent zone is signed). A replacement for DS records is described in <xref target="I-D.homburg-deleg-incremental-dnssec"/>.</t>
        </li>
        <li>
          <t>H5. DELEG must support updates to delegation information with the same relative ease as currently exists with NS records.  </t>
          <t>
IDELEG delegations are affected by TTL like any other
DNS record.</t>
        </li>
        <li>
          <t>H6. DELEG must be incrementally deployable and not require any sort of flag day of universal change.  </t>
          <t>
IDELEG zones can be added without upgrading authoritatives.
IDELEG zones still work with old resolvers and validators.
Basically any combination of old and new should work, though with
reduced efficiency for some combinations.</t>
        </li>
        <li>
          <t>H7. DELEG must allow multiple independent operators to simultaneously serve a zone.  </t>
          <t>
Deleg allows for multiple IDELEG records. This allows
multiple operators to serve the zone.</t>
        </li>
        <li>
          <t>S1. DELEG should facilitate the use of new DNS transport mechanisms  </t>
          <t>
New transports are already defined for the DNS mode of SVCB (<xref target="RFC9461"/>).
The same parameters are used for IDELEG.</t>
        </li>
        <li>
          <t>S2. DELEG should make clear all of the necessary details for contacting a service  </t>
          <t>
Most of the needed SVCB parameters are already defined in existing standards.
The exception is a replacement for the DS records, which is described in <xref target="I-D.homburg-deleg-incremental-dnssec"/>.</t>
        </li>
        <li>
          <t>S3. DELEG should minimize transaction cost in its usage.  </t>
          <t>
Assuming Qname-minimisation, there are no extra queries needed in most cases
if the authoritative name server has deleg support. The exception
is when the parent zone is not signed and has no IDELEG records.
In that case, one extra query is needed when the parent zone is first
contacted (and every TTL).  </t>
          <t>
Additional queries may be needed to resolve aliases.</t>
        </li>
        <li>
          <t>S4. DELEG should simplify management of a zone's DNS service.  </t>
          <t>
Zone management can be simplified using the alias mode of IDELEG.
This allows the zone operator to change the details of the delegation
without involving the parent zone.  </t>
          <t>
Draft <xref target="I-D.homburg-deleg-incremental-dnssec"/> defines the dnskeyref parameter which offers the same simplification for DNSSEC delegations.</t>
        </li>
        <li>
          <t>S5. DELEG should allow for backward compatibility to the conventional NS-based delegation mechanism.  </t>
          <t>
NS records and glue can be extracted from the IDELEG record assuming no aliasing is used.  </t>
          <t>
The ds parameter in <xref target="I-D.homburg-deleg-incremental-dnssec"/> has the same value as the rdata of a DS record.</t>
        </li>
        <li>
          <t>S6. DELEG should be extensible and allow for the easy incremental addition of new delegation features after initial deployment.  </t>
          <t>
SVCB-style records are extensible by design.</t>
        </li>
        <li>
          <t>S7. DELEG should be able to convey a security model for delegations stronger than currently exists with DNSSEC.  </t>
          <t>
IDELEG delegations are protected by DNSSEC, unlike
NS records at the parent zone.</t>
        </li>
      </ul>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t><strong>Note to the RFC Editor</strong>: please remove this entire section before publication.</t>
      <t>We are using RR type code 65280 for experiments.</t>
      <t>Jesse van Zutphen has built a proof of concept implementation supporting IDELEG delegations as specified in a previous version of this document <xref target="I-D.homburg-deleg-incremental-deleg-00"/> for the Unbound recursive resolver as part of his master thesis for the Security and Network Engineering master program of the University of Amsterdam <xref target="JZUTPHEN"/>.
Jesse's implementation has been adapted to query for the IDELEG RR types (with code point 65280).
This version is available in the <tt>ideleg</tt> branch of the <tt>NLnetLabs/unbound</tt> github repository <xref target="IDELEG4UNBOUND"/>.
Note that this implementation does not yet respond to support in the authoritative <xref target="auth-support">Authoritative name server support</xref>, and also does not yet follow AliasMode IDELEG RRs.</t>
      <t>The ldns DNS library and tools software has been extended with support for IDELEG, which is available in the <tt>features/ideleg</tt> branch of the <tt>NLnetLabs/ldns</tt> github repository <xref target="IDELEG4LDNS"/>.
This includes support for IDELEG in the DNS lookup utility <tt>drill</tt>, as well as in the DNSSEC zone signer <tt>ldns-signzone</tt> and all other tools and examples included with the ldns software.</t>
      <t>Wouter Petri has built a proof of concept support for IDELEG in the NSD authoritative name server software as part of a research project for the Security and Network Engineering master program of the University of Amsterdam <xref target="WPETRI"/>.
The source code of his implementation is available on github <xref target="IDELEG4NSD"/>.</t>
      <t>Wouter's implementation is serving the <tt>ideleg.net.</tt> domain, containing a variety of different IDELEG delegations, for evaluation purposes.
We are planning to provide information about the deployment, including what software to evaluate these delegations, at <eref target="http://ideleg.net/">http://ideleg.net/</eref>, hopefully before the <eref target="https://datatracker.ietf.org/meeting/122/proceedings">IETF 122 in Bangkok</eref>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Deleg moves the location of  referral information to a unique  location that currently exists. However, as this is a new approach, thought must be given to usage.   There must be some checks to ensure that the registering a <tt>_deleg</tt> subdomain happens at the time the domain is provisioned. The same care needs to be addressed when a domain is de-provisioned that the <tt>_deleg</tt> is removed.  This is similar to what happens to A/AAAA glue records for NS records deployed in parent zones.</t>
      <t>While the recommendation is to deploy DNSSEC with deleg, it is not mandatory.  However, using deleg with unsigned zones can create possibilities of domain hijackings. This could  be hard to detect when not speaking directly to the authoritative name server.
This risk of domain hijacking is not expected to increase significantly compared to the situation without deleg.</t>
      <t>There are bound to be other considerations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="deleg-rr-type">
        <name>IDELEG RR type</name>
        <t>IANA is requested to update the "Resource Record (RR) TYPEs" registry under the "Domain Name System (DNS) Parameters" registry group as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">TYPE</th>
              <th align="left">Value</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">IDELEG</td>
              <td align="left">TBD</td>
              <td align="left">Delegation</td>
              <td align="left">[this document]</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="node-name">
        <name>_deleg Node Name</name>
        <t>Per <xref target="RFC8552"/>, IANA is requested to add the following entry to the DNS "Underscored and Globally Scoped DNS Node Names" registry:</t>
        <table>
          <name>Entry in the Underscored and Globally Scoped DNS Node Names registry</name>
          <thead>
            <tr>
              <th align="left">RR Type</th>
              <th align="left">_NODE NAME</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">IDELEG</td>
              <td align="left">_deleg</td>
              <td align="left">[this document]</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <referencegroup anchor="STD13" target="https://www.rfc-editor.org/info/std13">
          <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1034">
            <front>
              <title>Domain names - concepts and facilities</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1034"/>
            <seriesInfo name="DOI" value="10.17487/RFC1034"/>
          </reference>
          <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035">
            <front>
              <title>Domain names - implementation and specification</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1035"/>
            <seriesInfo name="DOI" value="10.17487/RFC1035"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC6672">
          <front>
            <title>DNAME Redirection in the DNS</title>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <author fullname="W. Wijngaards" initials="W." surname="Wijngaards"/>
            <date month="June" year="2012"/>
            <abstract>
              <t>The DNAME record provides redirection for a subtree of the domain name tree in the DNS. That is, all names that end with a particular suffix are redirected to another part of the DNS. This document obsoletes the original specification in RFC 2672 as well as updates the document on representing IPv6 addresses in DNS (RFC 3363). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6672"/>
          <seriesInfo name="DOI" value="10.17487/RFC6672"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8767">
          <front>
            <title>Serving Stale Data to Improve DNS Resiliency</title>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="P. Sood" initials="P." surname="Sood"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>This document defines a method (serve-stale) for recursive resolvers to use stale DNS data to avoid outages when authoritative nameservers cannot be reached to refresh expired data. One of the motivations for serve-stale is to make the DNS more resilient to DoS attacks and thereby make them less attractive as an attack vector. This document updates the definitions of TTL from RFCs 1034 and 1035 so that data can be kept in the cache beyond the TTL expiry; it also updates RFC 2181 by interpreting values with the high-order bit set as being positive, rather than 0, and suggests a cap of 7 days.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8767"/>
          <seriesInfo name="DOI" value="10.17487/RFC8767"/>
        </reference>
        <reference anchor="RFC3597">
          <front>
            <title>Handling of Unknown DNS Resource Record (RR) Types</title>
            <author fullname="A. Gustafsson" initials="A." surname="Gustafsson"/>
            <date month="September" year="2003"/>
            <abstract>
              <t>Extending the Domain Name System (DNS) with new Resource Record (RR) types currently requires changes to name server software. This document specifies the changes necessary to allow future DNS implementations to handle new RR types transparently. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3597"/>
          <seriesInfo name="DOI" value="10.17487/RFC3597"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IDELEG4UNBOUND" target="https://github.com/NLnetLabs/unbound/tree/ideleg">
          <front>
            <title>A proof of concept implementation of incremental deleg</title>
            <author initials="J." surname="van Zutphen" fullname="Jesse van Zutphen">
              <organization/>
            </author>
            <author initials="P." surname="Homburg" fullname="Philip Homburg">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="JZUTPHEN" target="https://nlnetlabs.nl/downloads/publications/extensible-deleg-in-resolvers_2024-07-08.pdf">
          <front>
            <title>Extensible delegations in DNS Recursive resolvers</title>
            <author initials="J." surname="van Zutphen" fullname="Jesse van Zutphen">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IDELEG4NSD" target="https://github.com/WP-Official/nsd">
          <front>
            <title>A proof of concept support for IDELEG in the NSD authoritative name server software</title>
            <author initials="W." surname="Petri" fullname="Wouter Petri">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WPETRI" target="https://nlnetlabs.nl/downloads/publications/extensible-delegations-in-authoritative-nameservers_2025-02-09.pdf">
          <front>
            <title>Extensible delegations in authoritative nameservers</title>
            <author initials="W." surname="Petri" fullname="Wouter Petri">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IDELEG4LDNS" target="https://github.com/NLnetLabs/ldns/tree/features/ideleg">
          <front>
            <title>A proof of concept support for IDELEG in the ldns DNS library and tools</title>
            <author initials="W." surname="Toorop" fullname="Willem Toorop">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="20" month="March" year="2025"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-24"/>
        </reference>
        <reference anchor="I-D.wesplaap-deleg">
          <front>
            <title>Extensible Delegation for DNS</title>
            <author fullname="Tim April" initials="T." surname="April">
              <organization>Google, LLC</organization>
            </author>
            <author fullname="Petr Špaček" initials="P." surname="Špaček">
              <organization>ISC</organization>
            </author>
            <author fullname="Ralf Weber" initials="R." surname="Weber">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="David C Lawrence" initials="" surname="Lawrence">
              <organization>Salesforce</organization>
            </author>
            <date day="18" month="February" year="2025"/>
            <abstract>
              <t>   A delegation in the Domain Name System (DNS) is a mechanism that
   enables efficient and distributed management of the DNS namespace.
   It involves delegating authority over subdomains to specific DNS
   servers via NS records, allowing for a hierarchical structure and
   distributing the responsibility for maintaining DNS records.

   An NS record contains the hostname of the nameserver for the
   delegated namespace.  Any facilities of that nameserver must be
   discovered through other mechanisms.  This document proposes a new
   extensible DNS record type, DELEG, for delegation the authority for a
   domain.  Future documents then can use this mechanism to use
   additional information about the delegated namespace and the
   capabilities of authoritative nameservers for the delegated
   namespace.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wesplaap-deleg-02"/>
        </reference>
        <reference anchor="I-D.ietf-dnsop-ns-revalidation">
          <front>
            <title>Delegation Revalidation by DNS Resolvers</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Paul A. Vixie" initials="P. A." surname="Vixie">
              <organization>SIE Europe, U.G.</organization>
            </author>
            <author fullname="Willem Toorop" initials="W." surname="Toorop">
              <organization>NLnet Labs</organization>
            </author>
            <date day="27" month="February" year="2025"/>
            <abstract>
              <t>   This document recommends improved DNS resolver behavior with respect
   to the processing of Name Server (NS) resource record (RR) sets
   (RRsets) during iterative resolution.  When following a referral
   response from an authoritative server to a child zone, DNS resolvers
   should explicitly query the authoritative NS RRset at the apex of the
   child zone and cache this in preference to the NS RRset on the parent
   side of the zone cut.  The (A and AAAA) address RRsets in the
   additional section from referral responses and authoritative NS
   answers for the names of the NS RRset, should similarly be re-queried
   and used to replace the entries with the lower trustworthiness
   ranking in cache.  Resolvers should also periodically revalidate the
   delegation by re-querying the parent zone at the expiration of the
   TTL of either the parent or child NS RRset, whichever comes first.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-ns-revalidation-09"/>
        </reference>
        <referencegroup anchor="BCP219" target="https://www.rfc-editor.org/info/bcp219">
          <reference anchor="RFC9499" target="https://www.rfc-editor.org/info/rfc9499">
            <front>
              <title>DNS Terminology</title>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
              <date month="March" year="2024"/>
              <abstract>
                <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
                <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="219"/>
            <seriesInfo name="RFC" value="9499"/>
            <seriesInfo name="DOI" value="10.17487/RFC9499"/>
          </reference>
        </referencegroup>
        <reference anchor="I-D.ietf-deleg-requirements-02">
          <front>
            <title>Problem Statement and Requirements for an Improved DNS Delegation Mechanism abbrev: DNS DELEG Requirements</title>
            <author fullname="David C Lawrence" initials="" surname="Lawrence">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Edward Lewis" initials="E." surname="Lewis">
         </author>
            <author fullname="Jim Reid" initials="J." surname="Reid">
         </author>
            <author fullname="Tim Wicinski" initials="T." surname="Wicinski">
              <organization>Cox Communications</organization>
            </author>
            <date day="12" month="October" year="2024"/>
            <abstract>
              <t>   Authoritative control of parts of the Domain Name System namespace
   are indicated with a special record type, the NS record, that can
   only indicate the name of the server which a client resolver should
   contact for more information.  Any other features of that server must
   then be discovered through other mechanisms.  This draft considers
   the limitations of the current system, benefits that could be gained
   by changing it, and what requirements constrain an updated design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-deleg-requirements-02"/>
        </reference>
        <reference anchor="I-D.homburg-deleg-incremental-dnssec">
          <front>
            <title>Incrementally Deployable DNSSEC Delegation</title>
            <author fullname="Philip Homburg" initials="P." surname="Homburg">
              <organization>NLnet Labs</organization>
            </author>
            <author fullname="Willem Toorop" initials="W." surname="Toorop">
              <organization>NLnet Labs</organization>
            </author>
            <date day="16" month="January" year="2025"/>
            <abstract>
              <t>   This document proposes a DNSSEC delegation mechanism that complements
   [I-D.homburg-deleg-incremental-deleg].  In addition this mechanism
   simplifies multi-signer setups by removing the need to coordinate for
   signers during key rollovers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-homburg-deleg-incremental-dnssec-00"/>
        </reference>
        <reference anchor="I-D.homburg-deleg-incremental-deleg-00">
          <front>
            <title>Incrementally Deployable Extensible Delegation for DNS</title>
            <author fullname="Philip Homburg" initials="P." surname="Homburg">
              <organization>NLnet Labs</organization>
            </author>
            <author fullname="Jesse van Zutphen" initials="J." surname="van Zutphen">
              <organization>University of Amsterdam</organization>
            </author>
            <author fullname="Willem Toorop" initials="W." surname="Toorop">
              <organization>NLnet Labs</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document proposes a mechanism for extensible delegations in the
   DNS.  The mechanism realizes delegations with SVCB resource record
   sets placed below a _deleg label in the apex of the delegating zone.
   This authoritative delegation point can be aliased to other names
   using CNAME and DNAME.  The mechanism inherits extensibility from
   SVCB.

   Support in recursive resolvers suffices for the mechanism to be fully
   functional.  The number of subsequent interactions between the
   recursive resolver and the authoritative name servers is comparable
   with those for DNS Query Name Minimisation.  Additionally, but not
   required, support in the authoritative name servers enables optimized
   behavior with reduced (simultaneous) queries.  None, mixed or full
   deployment of the mechanism on authoritative name servers are all
   fully functional, allowing for the mechanism to be incrementally
   deployed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-homburg-deleg-incremental-deleg-00"/>
        </reference>
        <reference anchor="RFC8552">
          <front>
            <title>Scoped Interpretation of DNS Resource Records through "Underscored" Naming of Attribute Leaves</title>
            <author fullname="D. Crocker" initials="D." surname="Crocker"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Formally, any DNS Resource Record (RR) may occur under any domain name. However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies. The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., "_name"). The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch. This specification explores the nature of this DNS usage and defines the "Underscored and Globally Scoped DNS Node Names" registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="222"/>
          <seriesInfo name="RFC" value="8552"/>
          <seriesInfo name="DOI" value="10.17487/RFC8552"/>
        </reference>
        <reference anchor="I-D.tapril-ns2">
          <front>
            <title>Parameterized Nameserver Delegation with NS2 and NS2T</title>
            <author fullname="Tim April" initials="T." surname="April">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="13" month="July" year="2020"/>
            <abstract>
              <t>   Within the DNS, there is no mechanism for authoritative servers to
   advertise which transport methods they are capable of.  If secure
   transport methods are adopted by authoritative operators, transport
   signaling would be required to negotiate how authoritative servers
   would be contacted by resolvers.  This document provides two new
   Resource Record Types, NS2 and NS2T, to facilitate this negotiation
   by allowing zone owners to signal how the authoritative nameserver(s)
   for their zone(s) may accept queries.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tapril-ns2-01"/>
        </reference>
      </references>
    </references>
    <?line 842?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The idea to utilize SVCB based RRs to signal capabilities was first proposed by Tim April in <xref target="I-D.tapril-ns2"/>.</t>
      <t>The idea to utilize SVCB for IDELEG delegations (and also the idea described in this document) emerged from the DNS Hackathon at the IETF 118.
The following participants contributed to this brainstorm session: Vandan Adhvaryu, Roy Arends, David Blacka, Manu Bretelle, Vladimír Čunát, Klaus Darilion, Peter van Dijk, Christian Elmerot, Bob Halley, Philip Homburg, Shumon Huque, Shane Kerr, David C Lawrence, Edward Lewis, George Michaelson, Erik Nygren, Libor Peltan, Ben Schwartz, Petr Špaček, Jan Včelák and Ralf Weber</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+192XYbyZXgO74imppziuQA4E6pWIvNElkl2hJFE5TlKtvH
SiATRJqJTFQuolAqzRfM/EP3B8xPjHv+a+4WWy4gqVra3Wd4XBaQyIi4cePG
3ePGYDDoPXr0qPdInaVllKdROTjJg2mpXgT5TZjdpuoqmi+SoIx6+NJllAbz
SJWzuFDTOInUNM/mKsQWgzILs8Eyq3J8ZbDIszKbZMlwHqoyU9dRqYoyyMso
HEI/PAb1Nc3yeVAq6HCN+/lc9/Hl4PPbLL+5zrNqAZ/pEXS3NiRQvs5yFadx
GQeJKqKyWvQVNFRZmixVGkU0ahTGJQALg8R5Uapxkk1uVDaFr1ESFgjIS3x9
rYzLJFqjZgW2G0dqMgvS6yj8TIVREpWRWgvG4zx6u6biKY6TK2qDYBezLC+x
r+N0qTIYLVeTDJCZlmoSpNgXghGFfTWuSuo6yKNplag0K3GwOC3zLKwm8F6e
ZzmBNcoQMwSluo2TBJvBJFVQlRlgK54ECcAdVnmcXvPsES4Ye6mgc1WlAj6j
6iRLPwEMp5OkCmEmg+3tNQXYWxvguhYlzCkVLCW0vgjB82AcJYX5BRZJ3WN5
pEcGooBFGC+hL+yhzLKEcAtzBwzBB3w6qfIcEfU2yos4Sz+DuQCAYTbB3tZw
WBW9C4AAI57JFRJeKRSJIxTqJg/mSKiDfDo5UrOyXBRHW1vXcTmrxsNJNt+a
BONsy30L+vkWKAUXJ4+gp0lEsAAccc5IkEVWCwY2UGE8hQ8IKZMrYugpodgg
DgCFNcdZ4OTgncnMoA7oe334bp7QhP704nlfReVkOBxu4KRg9xEtHam1U+5i
DL2dANldw0pDd9jo5Hy01mMShPeQJq/XehNAwnWWL49ga4W9nqDtSBZqls3H
VX49oJcH2zu9ohrP4wIhLJcLeO3s9OprpR6pICky6DROw2gRwf+l5VpfrSHR
ZjnsLvxydvwV/IM0c3Z59fVaL63m4yg/6gGhFwBxVRypMq+iHgC314PFD46Q
rHuGPo5wAs6cejfREn4Mj3pqUOM8+ARexn8uoyJLgDTokW0L346rEnZdXMKD
txH/vEiyZQCYw28Wj723UVpFMIwSOAgb8JVR8BoAxC30Df4IT+dBnMA74W/j
qJwOsxzfDPLJzBIWvoFPYNyhfmkLH2yN8+y2iLbCcAtHI/o7UufPYWKwl4ot
2H55NAfkBgkvSa8X0CwQB9BCKeAJCS/gxSxO4oV6xitIP8IwQRr/QBiQbnGP
FvRjxHAvqNlv0wR+TOC3YZo0+76K5+p1PInT4iZu6flp9g7+m8+rFJgMPvJG
KP9+S7P+7TV+x+3VHOB3UVFE6i3sru+qcjGL0pZRXqUxbflyiez4eF4ABYTB
3B2KuhlCN9LLb7Nir3VCr4E/RnN1lWV5trg3rm6plY+rXkp7FUA76vXidGq/
YcOzk9Pnp9/svzr/6uWr8xN+hn8g1UC6tbIeu/pVOs6qNNwq8yjaijURSgey
+4+B32SADvgf7KtJtACejayPiIY4AfzikJESNqD7MeRk/gbOZ6VWLY/+A7KA
V4Ydv7f110KrXmcXQ++333336uri2el5N/7cJdlCnp1kQVhsLapxoklyKzIb
XNhbDJxduEXxt93t3f3B9uPB9pPhIpw28Oxw2dBwFRJ1yKQuIxBKBay6Mh3+
OigW+jof3Y+2Xl8MXk6nsJGDZCstwvtQU1EtFqCrkEDh0bR8h0FlbsJTWTcr
ohzmr4psWt4CV38oHl5nFexrdRGVedxEweuh88vri9Ory7Oflyj4MZKGN7UB
AsczI1I5GGzvDrY/fSCpNLElXf6CSBIKeQ5k+kD2k4SAH+I90ygoK6DsBzCh
brLBbmnTJPE4D3JQPtOQNb0HY6HBxOtokJ96g8FAwZTKPJiUvR4phKD4VMgS
EfRFhkphoOYRqsBxMRclsmsdcRowgyH0FDmNQIVJ4h+gJ/f1W0AtcYUqnyB7
mIAGg9p3oUiLBG03SrJbGPzN36jZG5WgFq2HCRbRO8Qrftbdgu7xQ5ZGQ56I
T1R2aLXIYmtOAGRBwQYOmxtEfaANY29Pz49fnNI6nOCnYTeG0uiW1q4+IdSM
+rLQfXU7i0GRhS7GNGbGUxn98elXNEicAgAxYEBjGIQBCHUyC2NQk3tCMJeX
hCc0jAKw2gBQZ3ZG1MJnbe3kYNSAUhga5AlqloDwibRiWyIHSQhzWKAqWvDI
QrGIxE6uBnbW84DNQU3gtaGaTfpITMAJQ/iM2rC29uYwOGAXfg8zgAENuwxJ
tJrgBz1jd91rs0YaNeKmrwIgTTKJAYzrOCVjz4fKbVzOAkMb31ewHIA17DAE
c2ZSJsth7xzA66t5/A5XMCfdCSBBjZmIQmjSUn/Wxt80Esi4A5CoG1hqMDYR
jCDp49PsFqeKw/tdslXtaC9ovxIIlqpWrRXt+3kchqDTs7eCjGYyCGo0HkbF
JI/HROQOvn2OQPsebGlY83McaLQEHXSu1mFHbKj37/9ldHWys/fhAyM3CMMc
ZToY+xGAAwQHqC8RF/gzzJu9DGUMHQEyb2EOgIU+YQqsrmwBv9CMhdJ4GZBM
7AMcJkmID4HyoPvHHiLgIlke4EvVgglf9kABkH5exNeAfBjvw4c+fgd5Qhua
ntAmhYfAqKENeWW46YcPw95ZijOL8Wu/tlwah7L/XPQGxQIIS/tJ5sE7mVto
TDCHa7TA/v69fpN4BQICRrAa6WkAKS/4txhGEdpcQY7vH1kM9HrHxNeE69RZ
2/rl5QbxNwTN+F2ac2xjex63Q5Bu0VuATxcwjFHRxdwnNkRcEmjp8uunn+4f
buNMj2HfjADwGID6CixunO+LYLGAf3nf30bwRsAjGEQA4dAUE6IqJkkkrUU0
iacxT8CMs4OrTlu0yEDmLFBBQsEH62WYOgoy8nm8QwkvpgVJ9HgelyLu4Okx
ipoXWagxWPBII2HBh9jMnd7TNojxJYbu8ZODJ7TFVIZ65VUepAVx3ufBEnUg
8RluwAzWT7Krjb60e7L/ZJ/b/YH4W8Htn11dXYw2DJETILsH284IJ1GI6iFg
6A+vzp6CYZumsnM2cLfAFMJoGlRJifsxSNAPwRSGUMGCIFcNWCCROwsWphPp
rEIYeSd0pimmQ0YaYSoNHMqDLQgoZDk/jlwVBh4YnaxCbY49YetFBS0BxJto
WbDaA+x2uSi18Ll6PlJPkxho9RlQWQbQ/+ZscEIG/aBMikFUpDHMY4P24+Y5
sArtp4NJqlNyCG0egbITwaYAipgDjnnjAJPTYnkcwciAQKuZD3uEGdq0Wn8E
VWAGegj5yoK3WRyiajCtClYBgDoFtlsQ7EkQLFij17zipWVxKlsAQ3ZJ2GH5
7x+5zLDXO2mXvjgBmJow4brsS7KJbkL9o76mdxC0NDwT9AnofLKEJ9A8FGcn
C2F+1RPaMO+U9Qc9QB+oruAVrtIwYhmFGlOeJTg5/T7POMv7Si/4Omt9dmPu
DQ+Hu9gGFm5ne2//w4cNqxMK1R4ePt6FvZNHJAStGB/2XqY4bpWECqQd4FVw
yFLfQa9BPQjEBerjyNWciS2CHOicUBXI0MKIReDX9OTsHnpy71gkFowpxJl4
aO/XpH6wxN1j5kDbKSBnOg0RAzQIJzKV8VLNgrc4FqiruNyG/Q17r9IkvuG9
qpVjVnd4p82R5oExp9g39JC4nMDtiWzHVLlqcR/2KXBoImaHsL1poEsZ2FS8
QAvGOKM1JRS8LYDtjU6fKivkW7dEUxXo9V7jGgkeHYunL84BhlOrOYAuHLwA
C5LI0u3ekWDXSWXFhla52FQxXgfdMSAPtSF/4yHB4lOZFnNDEKGotaDkR4OT
ZCFaTpovLjICqWEZaF5e0r6qbUYcyWxVJHKwLtG3YsD2VwK6z64r30eCOxbx
iRAit7Mg4rjQBxhxEdAfTQxG+F4EmR5BDw8ESgxm/SKP3+JykBWep7x/GX5s
X6UiHZB4SU2yNpARBNMqp42osVE44iUAPWRSkUWlhwAqaiWhDqMF9J63aPVo
JRgVJFZcKAgHHAQd+3MQFhVvjpJ1EowKwPjXwHYKoOF0sAiQQ5QlmGOk6x93
qNOm61vY1LAODOzgLeh+IcaDEALAejz1iFg0ayDvt05EC1WEWQzbJ5/MlgQ3
cmvTldveFZOwebLFIC0G5l3SpV2xjasXTEvh39MASQoAm8F6MFssaniHBbOc
+zHO+M7xaKmYXDsWZx2W8C3sUAzBOdwGpy/6J3KjDR0V5HUDkVzyDr1b7W7Z
Gs7mP7twjCZ+FcS9HWDYG8HIHD3rEMXu0LDmsm41gdBHQ1n7DIQeZGNwQJR3
E3Yr7OM1bsW6KV44AqLPuzUuPyn0PoDebnUz7I9+AOxqxYo8MvilZnAUahOW
ftNph9jTrdhzZ3FNbh1rXnuzYQb/Ao2t+AdQBlEBo51pjHhg7J5ZdR9tp4Zi
lNTtaEYXAsA+D1KQ8RIbL8hMge2MG5tnR6B7JINLTy8A5QbM56MoJDaOLIji
h8AKgRRACr6LCxoR96b2OVslZ5VHglQbIyUoKG7ac5yXlJwqnWchKe8o0PXn
e3i+mcTo4So3DhGJ44LxRqGFzCWej19W9dS1DKMWX2zBTDEHRMa5+H6sOsdm
9DTTrhmXs62TTpM3Ix4bnKxACQVhRlKYciqEVK3HC7efiLL/Gm4m2GVXILTi
NEuy6yVbLmBPodCC7bz24tXoCgPi+K86f0mfL0/BuLw8PcHPo2fHz5+bDz15
Y/Ts5avnJ/aTbfn05YsXp+cn3BieKu9Rb+3F8bdrLFrXXl5cnb08P36+1uKS
ySMzcxA8IJjJo1T0PDfOV08v/s+/7uyL+r+7s/MpqP9iYO88BhuB6JdHYzFL
X5EIesFiEQU5Ka+wJJNgAehL2GNRzDBNCAQbauebf0bM/PVIfT6eLHb2v5QH
OGHvocaZ95Bw1nzSaMxIbHnUMozBpve8hmkf3uNvve8a787Dz38D2nqkBjtP
fvNlr+5+5K2GaSqGjBBNYTSNU+01+A2sxS7in2zjPKuuZ1lV1lb1VtgOKU1g
4Xs9GhcO6FfE8JwhKAxx1Ou9P1Jvi0Uwib5Y2177wPLgqHekrny+Y3dP3b3h
wWOd+bYt9nZcUwG6e+hpC9nhQRoeVOk8pQ1ImlQpR18DrVzbfkkTp9plO7SS
T9imHuMH6Y91taYOEISA3hhzEVBAKMrCQiW04CXApCu0H6HdmthA2ONa3QgC
AEbVuDGwNlXkRbZEjROoaeg6k6AYmfRF/IpnYIJU/lQQ9LO0w5wDAKgH0dQL
/CzuRnouTLrgCbB8b8EWWRQFjnTiLNoqrzH6hLRKKi4Ba8hKVmHgeFja0EUz
m4oKgfvD9BCj0g6abvQO/Z1xifaHeB9BQjXoVuaaN5GkOAGOsU+ibUlEnpqu
+aErgT3rOPSXDZFLrkPnfWdJhp6aRmE+vdB1v1ONQpA756yNoF7v4ZdwNw9A
tleLBxKH0EXNxjerMqmsNWPoJ3WISAgHhyGnAo3g920mdh2je2m8pKc13Aj6
fr4V5xBq65LTT8iJ8/j6OqKcSrPwuBK84Flqth1oSRWzuxblCad5y3ll2Ccp
+U02xIqx3lm+SmKijWwz254pfDoBrQtaYpZiSf43HWnyOkFVRjkO6bYoL9gM
MLhk0OgXBvzCAF/40Gv1aaPm/jbI44CVukaYgyaHAssEzEmpRGayiHLKJRXQ
NdoYm44ZfDDcG+75DkzPv06AiMZbwIfrGDMC3O2ydqlnfOkEf66+vTgt1nSD
peNoXeuMBl4EOTzDcJzTkNIJ1Trmq2JAizCYE9LUuo+vDQO7zokeiIicwB6l
0I+WmRMbDW5DEO9yn22jVY3vr6GAHEkKSi0u0bN43R3us2PYWa2ixKRdJjaJ
RVCwXnQqUgVnAfqttGuz5tNklZEZ9tT6Ka3P0zIoipSBTUZRCIqht1gfeuRF
jPF5dKeUKochsvmwd2IzcU2Ibb1lfmZ6G63u2nYYWYcWKEnZbThzATNo6JTo
y7jFYDDP29rz7Knv9P6isepg2Zgwa2EK61ZIaJDoKAhnzIzYAhJvd0f0UGcJ
axq4I1RVI4mdFSQhXgEPbLLBCGWyVEQfhjLnDaKA1jxfyQApmHXivvQpiX2h
k3iBBKLIdgBTOaNQ69J1XbkRSRoYF6aFOrRB6jZFyJrUSfTByKp56MVrFNzZ
lacQYPg7FS8o++EsK9cTFcbO5xOQ3gsieBG5PowZe37d0eFxH8UoGQDN3xQw
yCABsRlfzzBwr6IABI6QtNu54xYDmCgeOpW8klmG1MZ06zYRNxm9hFSufQxo
eKah0xXCVsdLHqE7swpKzyPXPXTbtGl447KC97FvD6u0gThTwdk5F3nMiUQI
AUWUfMXN6ArrzvED9WZSFSXYA/mQY1ZDfS7hzUbf+E7VQ52noi2x/GZ1SMiZ
9QYSRpcnx1fHfBoEuzYC3ZC/g5ph7wLdQxegn8fvUJYh9p24oGWNmCYQc64S
h7bbscCOINqHOghOXi5GsucAjUBpyPx5kgLge5+dmBoeTXFMR7G+WIz3MM7T
1OKIdsjq0VaE3ak1eY/ksE4Ut+FrJzpLj9gjmZJ6ORZVjtlxODmcQChxSWNr
09xM0FIwdkdaXyPKWUyyhdhsxlvjBbBrC8zBqVWazitUYqDbXPbeN0k2pnmN
cChyjapz3DdITq4SI+pLCr9RVqxa/wvDal+32gu58xB4SenwEymdKELCR4dM
msrmJmF8c7Mt5su8IsMAXZkBxWOAxMd3E7UhaWp9z8L5GOP1a7u/+zpcULey
gODemK0uTKcemdXjWR5hWngESxKgzWZkuurkMHqhHafDsHcsakHBa1w3O00M
cAXjYuAwNCjOCAkXtqR8iY5SYw5rsIc5TUTEfHdchThFZhUqHbrGI1isb4nk
bWhcfcmFdPx1jXNk7urrnj8pfFyL04FTJbKG9515PoYkoyBkl06HDmfZ6c52
XZkGhHxNkwoK3BeiQHF4Ci3VwPqrdAR3ILk8lJCkA/par9KH9iiUaHz40J4D
Lox3ecfnG0fqzaYsuVJPDve3t8GSPtdJ5GpbDd+Qt/uUyaHAL3ge0g+AOCEh
ofJe73/AX++/vbw8+wb6M8fzfqvqfzja6OUxJXkXBPA8QOeaGg6HPU2VOwZG
B7gdtQ5NhuadXqPv+l+8eLsPgJZf7Hz6ZHiwM9zZ3h7u9He394bw787e8H5d
HFIXu9vbO0fh+MnRztER9iHfduHbXb1sIHLQ7/oIpzvQ2MPc+i/W7sbt2gde
havbFjlaXwYcr7EK+PCBK4FPNaZ321cjLXbMYuzC2rRi+24M3xfnD+9po6NJ
bRa77bN4EJncZxL3IZW2SWjCKWqUcw960KTz0k90Sg1L+UiCWU0vex69MGv9
G1iyQ/ifHniHpmXj64MJe3tlU1h4iUFTHziZM8uJnZMNkgTiCBVOVCMHPRmh
4wgl9ARDlElczFr0RFcarMzVYr0HExPj60p0LlYeUbDZ5DeQwqifgT2BwlJE
EiPDbxyMM/TMnbXJM/SXGelE1stHQOy6QprCaWPoSOt696wU8SiO8UEymwLy
4ndw/Qg67UVLuCTLbijTW5bsAbaIDjgzZE8lWXAqbkOS1eyfc0W9eFwcd4qW
3+sghKmTDQER8wDFifUGKfQNHe6O3w1/GUa618ZIt9WqbVG8nYy7doVne5tl
WxP/rNGlHETwtnAt2DGeanXnaiAZ/tRZy5avN0FoFDFe4LZBski/mO32w6zs
z/bgn+/vzSEdcbMLjHr3AWy6yZv3HsKbw2yGyWlfbH3//jcwxw/3bLhKHAlW
dhkrjant/rSp3bc5Q+gtmYHwGP4QwntgrOP1Lijodf5411K2vLrLO0aodsAm
nuwXvQNcUeing92pTzla7UOV2XbwLy9HZ99wq+6XAMjfn36rdg8eA0PcObi7
O2nQ/R7waobS39adHcL7qzo7faosWzvQbA0dzTAv7oJeYrjuGgpexMF6jQ7r
qprR1A4M55jtqfUHaVVtaurBQ3uo7bGDh6p2hoUA/xhQJPFBrIT/2hiKg1fB
272X8bHGurN+3MdD1+9xiwLYoJbVnXKj+5OgNLCgP5jmat3TR5fieh75mTcN
O1pJTG0skYimffgTHn7n8f72Ae7/3XtwgAds2EOc38noJ2Dr8A5sHbrYOmxg
a7Vt1YasQxdZ/uiCrJ8VQ49/MoYe34GhLir5OWejWf3HTka7LeRwiCtbfTHK
u12L2Td2q3suTy/HieNpzvk1zPVCv69pfdjVmmLP5BWUrA1oOrSjPrbtPik6
HI8Mg4HTe09OpjkN+dRiYYO6K3KD2W1XqJPs2bAVE/32GdLUna/t+d5XM53Q
TjBgxoukB0xmaAclcXojx92dzmCq7Wti6njpTsEyxdMbfJIKV8R43WWlW/oB
0npjDC325tshxC0NhnjHvGFREGgn8c1p3Tn64UNGd+zbcQYdtuKik/TIPmxm
RnkH/+SMgzbi4znSQMBmvwTBMYLU0gtVBYsp+u2V1JBXneP/BL+kXes32Xff
c89CWS8xptFztQGE0x6rgonSKSwd32qmPpn8Qz/cjdXs7iJ89f4REqZxX+uc
OV18AUPS3RFQ17HdEuZzT7II8Mir1vc2TFwM8451/DHN0gEdH8CTBBvdNSPo
mFSjZgSsjGAGHR0mnd0LD5HmpofjDC5E3fv3DseUzKc3t7e3w5bNc/ymz54S
rm1R8+k34Dpik+Szz9Tgyy+fnR6fnF5+/vkArPZJFkZH6g+vTi+/7aucv52/
PL28fImxkvBIHezv7X+KDadJcF0cqe9z9Rm/f6R2+ur4fPT69PJIbcPHV1fP
wOS5gh8O4NvJyRnnOh+pXWwPbUb4QAHq8d8jfNgxOytb8O+4h6/ySLY1PdND
2sddve0dYtDCdiqi1ZOt1si5by8idr0oxF1tRFxqUVxXcOtYqDe3YY2GOG6d
i2PyNBq0GjX3NVTubYxsPHiOGkWOLULLbWjKrnf7nJtdigrpa9z3bsxqZU0J
J6qmdE5M7IY9oOawe/HpKVZV0oUo1bbZPMCHP1NVuICts7tHu2J0evlH3D/a
L3Gwh09fY1Ez9QLafh2N1e4+DHy0d3i0Cyr99u4BvvFi9I0anX0HBlI+eQvb
dP/g0OpdOgeTtr5WvSS1vskbtOev8YMusOH2hokebnxeJKyfk9PBMTE9pjAH
un8yNzz8D+CGe4cHj/cfyg0//RhuePizcsN6b/fghodNbnhXL23c8K42D+SG
sG/2fcDJZGlhhnWvgtNTw1NxDxZVH1jDbaye2vsfAWnL0F2uMQD4rvEaAN6D
gx7eh4O6Vvi929YZ6OGvwUCvQF0lBnqgdraPdveODvY6Gejj/X3DQNNsgKf+
Bu2M9LLBJ9HewCNXXEMT2Ok5GKi1ihJWIe3bbJFu/ZYZWeEpq5j0JocXMFEI
VFZjWuKp0gAT8Fr1X8lkbGXv7XOl5JM/fCRjfvwfwJg/RQH4QL78+GP48uOf
lS/Xe/s4LfWuXtr48l1tOvhyCzdtbS7e2wdxu40Hj6KBtG7fj9Sm1a+vT/9/
tfhn4eoHB0fbjzu5+sGne4arU15xUy225RY69GK3SNFUtfkLOa3cFNKkrBLn
1KE+c0tJm21eJKlfQV6m+rlVHVlEfwend6/2JBI3tpBpOUJ921QSSiMtvIzr
RsU4P2FElyTxD6eY1ixMfBRLWUApbMn1KGwtTslOybuyTzDJguoE6EzSyYwX
Ss74aR/XsPf5vwwG6urlycsjdRyGfn6DWVUto6N3iyA1pcFcb9xg8KUULzL1
cCh/qi+eY/cojkMT5CqS6kYeyty0EclpcU4DPcCn1JxhizDHdQ9SH3Sa0tlU
FIS4XT8wZy+6waeKJ0BQSyyWaw7EtM/AntdoqBtIJCGX5ajiYkZllqgngDul
8nmuSlSvt9qCBdvoAfjAPNVLN/Md03Pv4Z+U4mmJTbIduAn0WPhK47F1XdsW
zR5gqiVQIfBmq7pVztpPH9N1ClTTx1MWO72aXKh24may6dXWZ7KIKOQ3R0s1
52HEW8wocE+uybnS1aVQdLiDV8+U/6nMYQRdalE2+9XVc3kr0Odx+5aDOHOm
42Th34HHWl6sYf6koH6oeH5ABbOcDLd9nd725PHhYzrphzlkeudz1niSpdc8
1ZROkAUJ8NFwaZCAIS2ZguRu2xMBba6UFqYhSOw6coxHpXEOKImH4rWRBYHF
xiytn21B1qE5FmcsN1juAylnaQg4w40EY+UbXIGUyjVi2R1TvIXxHtRLsLnj
2RIbxnkfmkPysSkIC8yGEtwXQY71EhIsGzHt2GJmL9nyeQgpo3Ue0NUccr5j
FQ908iPJesMlL0pCuj64VAY3XGwSq7RhFY3Ip157HNvjaHxC4trUhGghkLr8
7LPcDpxK3HVOofdOk2JYeyDkdle+ZiJyZzmvitLOkmo/e7NwmR7iDeuNwPuT
gKqKyF6FvUSQy+lfmDnSEJ2+MFWtuSyxOSCCCgKvb5DauvENttUqgwmzd9X4
7qrl183kim4u103a9IqBRr4JvzfbTMZsMD5d1ghrc1Vz/VUw6voCJpjWa3i7
k8baQgcikfFEHHaaU/kscwQQf0Ifk4ZFzhDWeKjDNPFFhIiOPDrRbcOJkEn9
opwVKzybUKauLXjb1NxAajcOxrhnAUXWpu1EJUcWGxnf9ePq2oDQ0ibLSkGi
ZhhuISWM3EZBatHWjKO6AUvvsCSGusl54mlYwoYlpXphCgzQQpGUd1K626Dd
cE9VduoZgg4zJzpI3WBjNa1Cp4ObVZTuQSEOJ0GubzloOctXq98aCEqxABvn
VTAGnVirKUzpIw2xQLxIKAO3w6Ymi00mlCMvY/N+55CamZv2iFT7Gan/sueU
HnaCQ9vjmgbY9ajt8deaMpoUiKk3UsHYZZi6Vqrmrmi3X67m4I26zN26EB3m
bKXq+wqdpkHX72T8yFdjj5H/U+m0NiOGRLatKDb2VY22uzSwjEvNrpYDH6S3
kpfgNi64eC9lv/hV330tROyCzlXEWCNlD3nygP0J0S1MWEp0aEuDZ9XqP2cD
nxUlw7esG0EjDI0tKbWf4K0oJRZswE+gSsfDaKgZ3PBz5Glf4lF/QBwtBuUC
2VLUWsbHDXd/QxvC4aRG5AAxTBiwPLUOyVDqy3F5a7ICLY5XSCSXofZr542k
XHSkCWZlro5eP6PHG6XhJmX03T9VTrYnV0UNahn6+rz1OOJbLfEEvj5xTeEI
LSts1hMlU0Ux+ZraFIK+a2o2E4eaNQ+MpktLNiTV1m4Nl31Ikpa8rmFp1UpS
9msI3RJbJDdjWRvOMWkMjl8cfwtd3aXM1vGsK96A3CQ6IKMsSF2KtbYblZaZ
xqJyOnCvkyGR4g2rePMc3WBgcqyodgAxkvfvxVGnFTa1fmmqQ2gf3p3EwYUG
6I7ZB7cFpbEGAh0gVOVtxk7MvmMfhJna3AScb26ae2LhkYMZMGQmUVFw/a6d
oTouqMi23rv25/byX7imZDWBJY5uXFunjQjcYfuOrxiVIT4WmUd8YEM2W1mr
SWaq92kehpswFdu7Tfsikkrt4f6GfwLmM2ZswybTGBlL9UUWerpo4HpRjf9O
1xlkvpHj11PHddwdKtk7ghZTCqdgL+CgxazTsDYd6m+xk1BKwrfORWZhGfBH
g94NtyMlf63tj7uX9iZuBCAlmrcjQqQsn3akNCsMmouFkJS/tvm/vlgP5LYo
p7jh3ZmZRYVF8qngvFMGjXtYN2EY7lK29y7DUNcqQLWpUqLkvuwxdLpbeVkv
GlKa/QTKFFG8e3ez0S5jy/H4IOtHTFLmZiBar8Gif5AJjqqxUSTfv7dcBRjT
fI7XAayP+APeW+P6ktE58DaObhW/GP9AQtD2VvgINrfe6PE/fODixT7aqSy4
beREx2rsxKQQswMXS9ODipUG5vIYLlHFc7baCjFGWwGtlVnNONQ0yeZzbfM7
ESnxXbTXhYnajvtyqrdjwmr1uzE8Fm9xEwFqSeC1PpuFXsoOZHXXVCGwGuly
d8E3DSZVUi6HlbkW9y5IV7ZYDTsOKGCv6gXvgqAD99aPaS9/tN4JRxrOsEh0
SpXn+BIg42pMjQ1CtaNsNkl3oTxnxk7dSS73xzuyXF26UpctojsqqprCY0UO
39TgQESaJvMJ2nXkJKU90cBHW923vpRGBTFur/MB3g3UTz4L1CfqRqlXwavN
RtXgIrNLi1u+Q8L1oLdcL1grMcbn3K88I1V3z2Dcy20lfTgFAhzPZFwPSa4Y
wKk57N8OY04IiOsA789olkuTPaHdKXz5iDhGXH9a25gtd1N4M3LD92YuFn+N
4xV9G1tt0Wl0+XNri0llfS2BT0Y6XrjeYqxorcGxV2zi2Mlow5+hnAvS5LDq
/FBQeLa8exwoWRr9j7i17kYffUEp3ipHfH1GrZ//6eTli+Oz8w2Dve6Ydvci
tweKV1u9wpZ40XmG3pQcH6RzeYSn+QPAJjrMc0SsS4y6qUTJXUkyYzfREDhK
9I7qymn9TS5/bNFs2HHRouBom6BVa4wLHUqkm1ONF+hnilV0iOZ/luAEoeZr
re0vAO4MdlkjNkm/kvR0t+Q8QBe7Y8tafQqpdm8VpQv+cT9z6UpdwkzSHJHO
hV8bclinYdhow0tN4F0q76hfkK0i1p+QKQ0MU4pDXSMzTl2/hNk6VI27mo+R
xqa6EJ+tzC0lVHzHh0/cVvNZlZ/6T7hXX2pnZN+FTN//5geY61psregfd8g3
iboo0gAXi+A2RU4OJsJk5mXbYn102QOwO8o4SJooMfR6X/XVUc+CyQN0WP27
PWHopbCQPW3FGWWhdQx1lz7sN2soxSI5bR6fVO3rwK9HEPZOAaqexJcjEx+8
DQoP0U5XnZuIGlE+FHGvuNBOBTIfA1F6qoXecjRtncpgkiT8t+QubW8zSfIY
V7tGK5C8RVK7iclPkIC3qMVZVTQQ+4uSiVfW0ufohBMPZ2aZvW7XWX0gfnZf
9rfRQUgmdQR9FRlXODRYNxajQbu/ooxrVLDvQ4gX1mDJjD9bAh70AAU1Og5x
TbX40OsZyhHgGlGyP73DMQAmuJEpvd7xeJVjg9CnFyhQE3QherFTw2haXE/L
Fu/PsHfZXV8dRaB4hpftrmEtnjkUY5NkOA4lrse6M0tD1O24YYUGWQIVGkeV
JcjNbWp3OH90PXKrH8jd52viQsKrlBg0UrLcmu5rFBBYc32m+hepBfARAMnw
YcSXSTvGgLA7t4KtZixxw6VhL6lzte5hb3PzPNvcdNdHr4x7ndpZa3/az6a9
akD6IV7GGDTuaqH7fGHVQlYdWKcUhUvIZax3oFxHhzdlgZbfRfbrtcQODJtt
OBmXLlYb7h8Y3VlO52fTqsSxmQNY+HSmrs+xEUvv6l4/A52LsnXrsLA3/skL
btzBEr+9ivlvEtyyN0HGxaQqCl3v1T0sr9bvPF5vCy87TFgD70xe8rubq7CA
nW31bR0WqF8+knFfGq2SOyNcGb0u5yPZGfieFTpI9FLvYIWr46oJWc1GrGV0
93XCXNOQcvwi1hhvja7WRtRqxSrDqJG9uibWzVq9/Lo2b+oXqnSlE/xapk8k
lg/T+z3QQvl7k5lmDnbfdfFOt66/l1DsyZF1y6g2fEliHQdtJNFKDmRbGS85
RobA1Byydq61jDYCYSqG9x0nlO85syTUjSfacpp6GFf/sZTzURkkXTTSmHc0
X8DgSDqcIhsYef0wymnI1b0Hrjqb1KQBWVWmturGpmk5suBTgWvjrDjmbm0U
J/KmL0tqV72I/3EKf0vczVw7eTfJaPhkXYkb/IKrf8/xzYQlPBSHkRSK1/Fz
XfOmCwd9m4Fwfx5BmaIcK3v/qBlAwxgWHUN5//5dmQfS7sMHffuZH0zD66Mp
gaShPfVdpz9Rvamf3vDhoqJV8BWIPw4GA/zP+at9tc/afrijnfzS+xFW7Uei
U6Nf/NiiBP2o/vIj/vB5UY2/HHrJSrIcb2w7/cPxG8kChGGOBkfwn/NX+yrP
CKjmD3e007/AbHYAjG8jp9woQL5Zz0qU2az86/75x19vbXYBjPPMg8r7+p9r
NnvN2XhL5c7mT//0s9lvzuYVGxIPng0l+jWTIH+92WDKrcPkzPnXpinItd5X
cTF9NBZdG7MowBtjdMJ2Ek39qx5LYrCS8+6c/m/eKetyKLzf8HUzwiHm0+qE
NefGZl3qTKm1b/G2GgSjaD+Qwxcjn2ctL+Ho3smdBvPsALep69ROgHr2IqvE
VcsEWAJu1KbBjhNzD54De2zAtr8K4epX9CWa+NISQJAoAuJg0+kG9ZP0E31Y
B6b+Ugx8ugWsuc76UkFHRvKKD8TDSdLScdFRtrB15bZQXVG7+ajNal+f441Z
DNQkS6p5usE7zk3lKaSifpu1DkDpM0yYm+jbPMYDS7dTy9Ldu4Sc9eG3rSrG
i/BgHbt6vBnY026+69REZ8Rn7V4a5SXCiKbmqrOd6XJp1uYVclL4WGcxkRG2
yWun8VZk68qirl9mt2pn497j7ZoxmnvJsy1Z+W/bVjji7v1H3LtzxBWjmYC8
DXjdnXDaWaCFQN/b6K/Itl2vJXJtNCh+2NsfSrBXtjvPojN+fFsLIJvYz883
p/2fPCdlk1q7vJR3eFrdPpGTRKF7/a+uhbBeD+I+ouPj7J1NMKttsuz1nvMH
7b3N5XcyGRGuHM0rDLYsrCfQnXFcdHob3fDEkLP3iR2B3QVjcCyyhawLqihx
9zqtR0mM5rlJzdP7gewrz5za6HM9XcmHNK5pH8LeI3WRx3Pt3IvpFN6Cnwy0
gdXr4XXomvHq28WIYOzpORIltLh4BoWSqFCFwmExM6dQ0zhBI+/MSbAMxpza
SsGk7oKhSNC0OJNgEYzjBLCHgGB+/Ni5+rp5eaeFo92bYa8Adpkyx4HraNGl
D/yyB87x076fb/+m3SQTCuqknDfy/vlIv4uzl7AovYg+MbmZzQZDp0yys5x8
2EHLmR5a6+cwJ75xsOjJvcQrd13t/vFafixvHPFd6sSSJEqvcR+hZ9+9t4Wy
Z5S+nG93/4kaL0skCHtKiTPCxCPE+jbFOYDGkOxL0froUGEpQn734EB3BPN7
BtyKfDQS86A7l+vxDtwWeQB67zwy14bSHYso7Qs5c1OYc6owjrjz8d5fWX9s
WjTayiRNSJjRNI8msyCNi3kj9vL+/W/OBifDOCqnJp/R9jbY3sXM3v+unoHo
Zqqm096ID4Aorxal9eYxJTp1MvAiXjq8wYtQkJ/ryn2d1oIzfytz+FwzFswC
jhZl/bZH3AXQT+BeSMj51ZNZnNiDPGRXVClO/Jp0cJjFrjcLWLtxMLm5DVAb
wyubYASqEK5DvgZOULgKupTbTMFHcKELJtPB3SkJPid5pMimJYwSmdbjaBa8
jbO8cUzNP0xuCmcGago7FYHFmZ6PoBuTojftKOJmTYf1UT1BniUTIGSvsawp
dfA2wiN/gJEJ0ChqynQJkzuNEwI7xtOVvAWZ6CRdFuXtSF7nnQWrhUFujgDh
/fG8iT2pKmvlxrVYwtxCd7rbKw6SSXyOw0QAeCBJ7+h93Dv49DEmuLNw1bmJ
BUoQrirESHPrYMs4brqvoA/HPNWE4ImIgvkAigi9AMwydCAvQYYZ4TEFvE86
WYJANCSli2jr88leD857YRxcp7AC8QTQkiXcgNmy2wKhPCdFXQfcJVOJvKN8
q+PEXMiGWy3kGF1qZOS6hNGWQrYbLeeLCiab/fo+IlOOlIAJbmR3Z3jh5J5q
PSTSCAh793/mpJdkyPInlB/Ko3iRauh4XaLaLl8wUe2NocLYxyIJJsTauBj9
yG6jdr44y+bjKr8W1ugYZAMuaUhlDwEhBx5CNGFVi5BvMs+65JctPI8CKo8S
1j2ioCBjDaaZ8wpJaia9f27A7kQoomw6jfSBCvSrJ/ENX2NOxwN6So7AYz88
h8P6ojrTTZYSUWCbnQ5ClVrwUK9FxofUsEKbCoMlXZ3H+TCgAvDOdsHlnSJb
FPRRWU7UxqrFdR6Eze02rLdmEXyb5TeiOVM5G809EUpL/dj4q6AQCkKIgeOP
SZHl1FRszMlYtzqfFXs2xwhwBOK7rKrrbT1hJx0zF9ujbJTHHk7pjnf4mJQx
pVTZPejcvYq7KMZ3gjTKqoLIPaer40x2IPNe6o0FvunSv4UVI198gTm8CO3M
a/5o1L1VOwHukRH3golpMEGll889E0ulWiuAKqQiEPhpQRRvFI0C4TyH381v
+pp7PjgYRlPKAdS8F7tBfQG75XMW7lV/G0MRnLRNnAx77NIUbeDJ8wR2axOg
25o5owkPWYiumUao02KwB6yUIE4Ym5L4L1lzfDgCp/MCBaFpScf8CNQaPPUp
xqnD9WFVw4B2rlaFUMcRgR00OBShxmx3N73j45nVaK+OG0q8+yHitQr02Q72
V6BzqyoC2bzHRVGRTfIH1JQHkrJnSyLlkejLeONKHnhOE4aVtAmSwtBdfJc3
aBYUvoI09LGGfRTWRK6xfrrCwhbxmHkJxYaFAlORPDIEq0/2t4V+6Rzq7BqH
TqdBP7ZwFrlmo7fYHHgvp1W3OM4lP9ge2hfuJcUhmYmM9mvrRaX14ukSmqew
MEQs5sztJ4V7YSYN/B2nIpt3helKN3iMs/IrO5qdqHeUchmJDc2aqx/xtAxx
eLHVeC/V7k6n1dI8ng/Vmhw3925xZHBkHN2brGWrMWTw8CZagvFp96Vsm2zK
N3pqPqIRMLFp5aI0eTmMuAQHtSVgTk6VYsSCMAYE8smlNqm9e27OR4Mxlfxs
s8xo3lay2+tTZLWIIn0/ikfIoC7I1kR3my7ag/6tQlKWcOOEhYOVh3AOOVgm
mKMYvfHA0AkMIsATT6MYHdawxtPQFzFRrpXBI9lbQbH0vN7m/KwIG/cQQBSg
zVjIGTqbho1aypzD5Xzf5aAol0lkEZt7UIyRUSOTYJAfN0HWui2t5ZJEAuhl
uMhs4JqKZ6J8gT3rlEhpV+Hu0Idzdh0Y/Y1f74NChVpcjVDKli30SJ1h0jGh
kbMo4d8KhDLmc5YmBx4ErDoFFGf55uaRWiSkdwL2M1IIgHiQdin9gIUCn6xU
i2qcyK6BsV5HIoaR4LT9hBW31eHB7pNtuQYWsz/IpwAtfof59UBEqfquKhfI
VJG6xlWclGjX61Ju2gEQ+1NxTOV2W6JYRBPma5Spa3LcdR1hnWFqLIy7dwE9
2d6W4uWIulcppcC01WAIbMkGqp0SSPEMIDN75G+kiQi3wXlUkhZ7ml4DH+P0
emkG2ABt2JyWemVSzPHJ8RzfCQOssf67715dXTw7PUcpTwj+pKhjjrBMN1SH
wUJye1pPo8sqgiXLTk86a0v1GmhJN8SvrBGKouEtsHzaKTr3OhY33hiUCmK+
/Pj8eRqVz4NxsVUxBt+oaxijGqPukxVIi0uYDQOy/+r8q5evzk9wTrVSQrWp
mbSoZaTL53l+hFruFWsaH5MWKzmieO7AG1MOrLadypUU1gR4KcnmJAaciFuV
bXrtWbErRBxKG0Wep0IXMzWqYBP1mjdu3bkGCV1GvWIBngPAiP0rLlUh/qgm
PG4pEbyIG2/hLlkUvglzMNPeeOWi7dsobtkNSA4R9QZBoqI8+PSNlhJSFJrR
RcoVH6swQIVOCU5EtOOseg0KB7S9iMo8Xs1puud1PjpZFRzR6+dsfToiAPYG
4B3Goeofv9jef31xenV5xusEQHGC50SUuJbd4lENfBcCMKsOsyVjgTHXZCTk
nc6N+iZ7fQhUNXwj3t6+ezo8AGYPCi8DHsaohyHfbcvZI2mB+oVUVqlyPLwK
e0jEDNhHaSr1CCXu4nlUOKDDeqdWBfqOZ/kWOYhZL4zM8mCkuhaRDwy8+udZ
WS6OtrbsFLf+ut58ttFXM1CHpxWfX55mktbw57PTq6/Vzu4uEtJXoCLfZDfc
voAOUHNCte4myskFP8zy6y107AOkW9Boi6IuEQJecH0iQzpPJSdSh1LYJ4CS
m7WyJJsY14ZTQ8rBFPnMqzQGCaDs62wI1ZSWIYY1IoowBTYThD2+wQKADCYz
7Sgpjf/oGsiVhmH7Uekz2Pp39pnMoskN+SFAI6tyw+JtxjwTkAkL2ZOkpuSD
pPrEc7E/+Gdy4QKBoIgCFdj6Dyb66Ir2O+sD+WLhBU4PYTRwOrHAGXAoJQjR
DiOwlcTFz2FzkV1E9KYhhe/HW3QJAqn2WoWb0tF789Xk7nKMTqt1KEdez9B1
ztjBkiYgI8yOJC8jttRslRiinAuxwfw5eiCQyQO8ZlVZeWNLu60uKhohoA7h
NmEvsYRAbXQH2MzfgZCRUsXtNCEFGvE7Q/tIyh9P5GwL2eaLiMssmyCpPi/S
XaWPus7j4qZtaD1HVDcn5gJYBLxgAUPWHhE2mWu5zW8GtlpZn6y5nIdlt7g1
WONjmpFLCrxdCC+j5n18ftzYno8e1XQrUxsnz7lkSK9HDYmeYEvq3Gv2IROI
a5c6d/9SSjZcXm6oq28vTos1HXlbOhHltRNGD9WVGFH8Sq0DbWyoC+Oxchpe
5xlIbYrkkp1/xPnGXp6gly/YmnTY+5EgohTGP5KZ+KN6EQXEsukh3YZEAV8/
P5ObH/n/rhxHEAoDfnVCXZ9Y8/BH9Zc/e0r+X/7qjXP/+eDS/UVfPI8ildD5
/lEKnwdImrByF4BxMCIw8f3gYBeVxNa1BD7jpzSifZUbqkfdae0VLl8xyXSC
4TdJNiaX9WgC8oUOoFswnOWD1bLTq02lC4FAildIioCsv52/PDlVVFzmjiWq
pWLfsTjUNyNPUl9XLcu94H5/pFNRTwl7oqE9DHEGb5iZCt2SH4dunp1gXDGJ
wmuOxb8/4pIGUfjF2hTUfpPKCrs7oA2Kau4PEbuC2b8jpULl6KybMsKZElTM
CsQKajYcn4nn6ngBarLjkykDfDBIi11SxTqHdHRV1w5eN2ZKqVt2x9g2FCh3
+bXrXEJ0PQOcBMAMU3PLACkzO09Yz7RkjDpvPIkXAWYgUMndeFyZwyNYVTPH
BACQOnNg5AUK0yPgDiCIUnUczkA5XFZ9dQmi6xjoDh3dJwFoduqrBCHoqxdB
WqmvsB52ghWt/pgEYTz/x//O1b//zyr9x7+Bgvf7JAAL/wS0zIR80Rfk4UIX
w0n895u+ejrL0QUP308TmGoGTb7KxjBD6HAJr4NcjRcgD8kD0FejWYXlwp5V
3+NZlNEsAAPl96BCacCequfBbc5nFk9D8v89j25jAPybCHS4SL0A4yyIAP0A
y2ke36jz5TW831fP43GGtgjGdwAGkISjyQw6KH8goHP1f/91Efz7/4oA5t8B
tH+Ej8k//u2GSPoySKbqdQTU2Pt/vjDqqzvJAAA=

-->

</rfc>
