<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cdni-delegation-acme-05" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.1 -->
  <front>
    <title abbrev="CDNI delegation using ACME">CDNI delegation using Automated Certificate Management Environment</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cdni-delegation-acme-05"/>
    <author initials="F." surname="Fieau" fullname="Frédéric Fieau" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <street>40-48, avenue de la Republique</street>
          <city>Chatillon</city>
          <code>92320</code>
          <country>France</country>
        </postal>
        <email>frederic.fieau@orange.com</email>
      </address>
    </author>
    <author initials="E." surname="Stephan" fullname="Emile Stephan">
      <organization>Orange</organization>
      <address>
        <postal>
          <street>2, avenue Pierre Marzin</street>
          <city>Lannion</city>
          <code>22300</code>
          <country>France</country>
        </postal>
        <email>emile.stephan@orange.com</email>
      </address>
    </author>
    <author initials="S." surname="Mishra" fullname="Sanjay Mishra">
      <organization>Verizon</organization>
      <address>
        <postal>
          <street>13100 Columbia Pike</street>
          <city>Silver Spring</city>
          <code>MD 20904</code>
          <country>United States of America</country>
        </postal>
        <email>sanjay.mishra@verizon.com</email>
      </address>
    </author>
    <date year="2024" month="January" day="30"/>
    <area>Applications and Real-Time</area>
    <workgroup>Content Delivery Networks Interconnection</workgroup>
    <keyword>HTTPS</keyword>
    <keyword>delegation</keyword>
    <keyword>ACME</keyword>
    <keyword>STAR</keyword>
    <abstract>
      <?line 64?>

<t>This document defines metadata to support delegating the delivery of
HTTPS content between two or more interconnected Content Delivery Networks (CDNs).  Specifically, this
document defines a Content Delivery Network Interconnection (CDNI) Metadata interface object to enable delegation of
X.509 certificates leveraging delegation schemes defined in
RFC9115. Per RFC 9115, delegating entities can remain in full control of the delegation and can revoke it at any time. This avoids the need to share private cryptographic key material between the involved entities.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-cdni-delegation-acme/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Content Delivery Networks Interconnection Working Group mailing list (<eref target="mailto:cdni@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cdni/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cdni/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/FredericFi/cdni-wg"/>.</t>
    </note>
  </front>
  <middle>
    <?line 73?>

<section anchor="introduction">
      <name> Introduction</name>
      <t>Content delivery over HTTPS using two or more cooperating CDNs along the path requires
credential management, specifically when DNS-based redirection is used.  In such cases, an upstream CDN (uCDN) needs to delegate its credentials to a downstream (dCDN) for content delivery.</t>
      <t><xref target="RFC9115"/> defines delegation methods that allow a uCDN on behalf of the content provider, the holder of the domain, to generate on-demand an X.509
certificate that binds the designated domain name with a key-pair owned by the dCDN.  For further details, please refer
to <xref section="1" sectionFormat="of" target="RFC9115"/> and <xref section="5.1.2.1" sectionFormat="of" target="RFC9115"/>.</t>
      <t>This document defines CDNI Metadata to make use of HTTPS delegation between a
uCDN and a dCDN based on the mechanism specified in <xref target="RFC9115"/>.  Furthermore,
it adds a delegation method to the "CDNI Payload Types" IANA registry.</t>
      <t><xref target="fci-metadata"/> presents delegation metadata for the Footprint &amp; Capabilities Advertisement interface (FCI).  <xref target="mi-metadata"/> addresses the metadata for handling HTTPS delegation with the Metadata Interface.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document uses terminology from CDNI framework documents such as: CDNI
framework document <xref target="RFC7336"/> and CDNI
interface specifications documents: CDNI Metadata interface <xref target="RFC8006"/> and
CDNI Footprint and Capabilities Advertisement interface <xref target="RFC8008"/>.  It also uses terminology from
<xref section="1.2" sectionFormat="of" target="RFC8739"/> and <xref section="1.1" sectionFormat="of" target="RFC9115"/>, including Short-Term, Automatically Renewed (STAR), as applied to X.509 certificates.</t>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
    </section>
    <section anchor="fci-metadata">
      <name>Advertising Delegation Metadata for CDNI through FCI</name>
      <t>The Footprint and Capabilities Advertisement interface (FCI) defined in <xref target="RFC8008"/> allows a
dCDN to send a FCI capability type object to a uCDN.</t>
      <t>This document uses the CDNI Metadata capability object serialization from <xref target="RFC8008"/> for a CDN that supports
delegation methods.</t>
      <t>The following is an example of the supported delegated methods capability
object for a dCDN implementing the ACME delegation method.</t>
      <sourcecode type="json"><![CDATA[
{
  "capabilities": [
    {
      "capability-type": "FCI.Metadata",
      "capability-value": {
        "metadata": [
          // list of supported delegation methods
          "ACMEDelegationMethod"
        ]
      },
      "footprints": [
        "Footprint objects"
      ]
    }
  ]
}
]]></sourcecode>
    </section>
    <section anchor="mi-metadata">
      <name> ACME Delegation Metadata for CDNI</name>
      <t>When a uCDN delegates the delivery of HTTPS traffic to a dCDN using DNS Redirection
<xref target="RFC7336"/>, the dCDN must use a certificate bound to the origin's name to
successfully authenticate to the end-user (see also <xref section="5.1.2.1" sectionFormat="of" target="RFC9115"/>).</t>
      <t>To that end, this section defines the AcmeDelegationMethod object which
describes metadata for using the ACME delegation interface <xref target="RFC9115"/>.</t>
      <t>The ACMEDelegationMethod applies to both ACME STAR delegation, which provides a
delegation model based on short-term certificates with automatic renewal (<xref section="2.3.2" sectionFormat="of" target="RFC9115"/>), and
non-STAR delegation, which allows delegation between CDNs using long-term
certificates (<xref section="2.3.3" sectionFormat="of" target="RFC9115"/>).</t>
      <t><xref target="fig-call-flow"/> provides a high-level view of the combined CDNI and ACME
delegation message flows to obtain STAR certificate from the Certificate Authority (CA) bound to the Content Provider's (CP) name.</t>
      <figure anchor="fig-call-flow">
        <name>Example call-flow of STAR delegation in CDNI showing 2 levels of delegation</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="656" width="584" viewBox="0 0 584 656" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
              <path d="M 24,64 L 24,640" fill="none" stroke="black"/>
              <path d="M 48,32 L 48,64" fill="none" stroke="black"/>
              <path d="M 64,272 L 64,288" fill="none" stroke="black"/>
              <path d="M 64,352 L 64,368" fill="none" stroke="black"/>
              <path d="M 184,32 L 184,64" fill="none" stroke="black"/>
              <path d="M 200,64 L 200,544" fill="none" stroke="black"/>
              <path d="M 224,32 L 224,64" fill="none" stroke="black"/>
              <path d="M 352,32 L 352,64" fill="none" stroke="black"/>
              <path d="M 376,64 L 376,544" fill="none" stroke="black"/>
              <path d="M 392,32 L 392,64" fill="none" stroke="black"/>
              <path d="M 536,32 L 536,64" fill="none" stroke="black"/>
              <path d="M 560,64 L 560,640" fill="none" stroke="black"/>
              <path d="M 576,32 L 576,64" fill="none" stroke="black"/>
              <path d="M 8,32 L 48,32" fill="none" stroke="black"/>
              <path d="M 184,32 L 224,32" fill="none" stroke="black"/>
              <path d="M 352,32 L 392,32" fill="none" stroke="black"/>
              <path d="M 536,32 L 576,32" fill="none" stroke="black"/>
              <path d="M 8,64 L 48,64" fill="none" stroke="black"/>
              <path d="M 184,64 L 224,64" fill="none" stroke="black"/>
              <path d="M 352,64 L 392,64" fill="none" stroke="black"/>
              <path d="M 536,64 L 576,64" fill="none" stroke="black"/>
              <path d="M 24,96 L 88,96" fill="none" stroke="black"/>
              <path d="M 144,96 L 192,96" fill="none" stroke="black"/>
              <path d="M 32,144 L 88,144" fill="none" stroke="black"/>
              <path d="M 144,144 L 200,144" fill="none" stroke="black"/>
              <path d="M 24,192 L 64,192" fill="none" stroke="black"/>
              <path d="M 160,192 L 192,192" fill="none" stroke="black"/>
              <path d="M 32,240 L 64,240" fill="none" stroke="black"/>
              <path d="M 160,240 L 200,240" fill="none" stroke="black"/>
              <path d="M 24,272 L 64,272" fill="none" stroke="black"/>
              <path d="M 32,368 L 64,368" fill="none" stroke="black"/>
              <path d="M 24,416 L 64,416" fill="none" stroke="black"/>
              <path d="M 160,416 L 192,416" fill="none" stroke="black"/>
              <path d="M 200,448 L 240,448" fill="none" stroke="black"/>
              <path d="M 336,448 L 368,448" fill="none" stroke="black"/>
              <path d="M 376,480 L 416,480" fill="none" stroke="black"/>
              <path d="M 512,480 L 552,480" fill="none" stroke="black"/>
              <path d="M 384,512 L 408,512" fill="none" stroke="black"/>
              <path d="M 528,512 L 552,512" fill="none" stroke="black"/>
              <path d="M 32,544 L 56,544" fill="none" stroke="black"/>
              <path d="M 168,544 L 192,544" fill="none" stroke="black"/>
              <path d="M 208,544 L 232,544" fill="none" stroke="black"/>
              <path d="M 344,544 L 368,544" fill="none" stroke="black"/>
              <path d="M 384,544 L 408,544" fill="none" stroke="black"/>
              <path d="M 520,544 L 552,544" fill="none" stroke="black"/>
              <path d="M 24,592 L 552,592" fill="none" stroke="black"/>
              <path d="M 32,624 L 560,624" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="560,592 548,586.4 548,597.6" fill="black" transform="rotate(0,552,592)"/>
              <polygon class="arrowhead" points="560,544 548,538.4 548,549.6" fill="black" transform="rotate(0,552,544)"/>
              <polygon class="arrowhead" points="560,512 548,506.4 548,517.6" fill="black" transform="rotate(0,552,512)"/>
              <polygon class="arrowhead" points="560,480 548,474.4 548,485.6" fill="black" transform="rotate(0,552,480)"/>
              <polygon class="arrowhead" points="392,544 380,538.4 380,549.6" fill="black" transform="rotate(180,384,544)"/>
              <polygon class="arrowhead" points="392,512 380,506.4 380,517.6" fill="black" transform="rotate(180,384,512)"/>
              <polygon class="arrowhead" points="376,544 364,538.4 364,549.6" fill="black" transform="rotate(0,368,544)"/>
              <polygon class="arrowhead" points="376,448 364,442.4 364,453.6" fill="black" transform="rotate(0,368,448)"/>
              <polygon class="arrowhead" points="216,544 204,538.4 204,549.6" fill="black" transform="rotate(180,208,544)"/>
              <polygon class="arrowhead" points="200,544 188,538.4 188,549.6" fill="black" transform="rotate(0,192,544)"/>
              <polygon class="arrowhead" points="200,416 188,410.4 188,421.6" fill="black" transform="rotate(0,192,416)"/>
              <polygon class="arrowhead" points="200,192 188,186.4 188,197.6" fill="black" transform="rotate(0,192,192)"/>
              <polygon class="arrowhead" points="200,96 188,90.4 188,101.6" fill="black" transform="rotate(0,192,96)"/>
              <polygon class="arrowhead" points="40,624 28,618.4 28,629.6" fill="black" transform="rotate(180,32,624)"/>
              <polygon class="arrowhead" points="40,544 28,538.4 28,549.6" fill="black" transform="rotate(180,32,544)"/>
              <polygon class="arrowhead" points="40,368 28,362.4 28,373.6" fill="black" transform="rotate(180,32,368)"/>
              <polygon class="arrowhead" points="40,240 28,234.4 28,245.6" fill="black" transform="rotate(180,32,240)"/>
              <polygon class="arrowhead" points="40,144 28,138.4 28,149.6" fill="black" transform="rotate(180,32,144)"/>
              <g class="text">
                <text x="28" y="52">dCDN</text>
                <text x="204" y="52">uCDN</text>
                <text x="372" y="52">CP</text>
                <text x="556" y="52">CA</text>
                <text x="80" y="84">GET</text>
                <text x="132" y="84">metadata</text>
                <text x="116" y="100">[CDNI]</text>
                <text x="64" y="116">200</text>
                <text x="96" y="116">OK,</text>
                <text x="148" y="116">metadata</text>
                <text x="64" y="132">(inc.</text>
                <text x="108" y="132">dele</text>
                <text x="160" y="132">config)</text>
                <text x="116" y="148">[CDNI]</text>
                <text x="72" y="180">GET</text>
                <text x="132" y="180">delegation</text>
                <text x="88" y="196">[ACME</text>
                <text x="136" y="196">dele]</text>
                <text x="48" y="212">200</text>
                <text x="80" y="212">OK,</text>
                <text x="140" y="212">delegation</text>
                <text x="56" y="228">(inc.</text>
                <text x="96" y="228">CSR</text>
                <text x="152" y="228">template)</text>
                <text x="88" y="244">[ACME</text>
                <text x="136" y="244">dele]</text>
                <text x="68" y="308">create</text>
                <text x="112" y="308">key</text>
                <text x="148" y="308">pair</text>
                <text x="184" y="308">and</text>
                <text x="56" y="324">CSR</text>
                <text x="84" y="324">w/</text>
                <text x="136" y="324">delegated</text>
                <text x="60" y="340">name</text>
                <text x="84" y="404">POST</text>
                <text x="132" y="404">Order1</text>
                <text x="88" y="420">[ACME</text>
                <text x="136" y="420">dele]</text>
                <text x="256" y="436">forward</text>
                <text x="316" y="436">Order1</text>
                <text x="264" y="452">[ACME</text>
                <text x="312" y="452">dele]</text>
                <text x="436" y="468">POST</text>
                <text x="484" y="468">Order2</text>
                <text x="440" y="484">[ACME</text>
                <text x="488" y="484">STAR]</text>
                <text x="468" y="516">authorizations</text>
                <text x="76" y="548">wait</text>
                <text x="132" y="548">issuance</text>
                <text x="252" y="548">wait</text>
                <text x="308" y="548">issuance</text>
                <text x="428" y="548">wait</text>
                <text x="484" y="548">issuance</text>
                <text x="208" y="580">(unauthenticated)</text>
                <text x="296" y="580">GET</text>
                <text x="380" y="580">star-certificate</text>
                <text x="280" y="612">certificate</text>
                <text x="340" y="612">#1</text>
                <text x="280" y="644">...</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
.----.                .----.               .----.                 .----.
|dCDN|                |uCDN|               | CP |                 | CA |
'-+--'                '-+--'               '--+-'                 '--+-'
  |     GET metadata    |                     |                      |
  +--------[CDNI]------>|                     |                      |
  |   200 OK, metadata  |                     |                      |
  |  (inc. dele config) |                     |                      |
  |<-------[CDNI]-------+                     |                      |
  |                     |                     |                      |
  |    GET delegation   |                     |                      |
  +-----[ACME dele]---->|                     |                      |
  | 200 OK, delegation  |                     |                      |
  | (inc. CSR template) |                     |                      |
  |<----[ACME dele]-----+                     |                      |
  |                     |                     |                      |
  +----.                |                     |                      |
  |    |                |                     |                      |
  |  create key pair and|                     |                      |
  |  CSR w/ delegated   |                     |                      |
  |  name               |                     |                      |
  |    |                |                     |                      |
  |<---'                |                     |                      |
  |                     |                     |                      |
  |     POST Order1     |                     |                      |
  +-----[ACME dele]---->|                     |                      |
  |                     |   forward Order1    |                      |
  |                     +-----[ACME dele]---->|                      |
  |                     |                     |     POST Order2      |
  |                     |                     +-----[ACME STAR]----->|
  |                     |                     |                      |
  |                     |                     |<---authorizations--->|
  |                     |                     |                      |
  |<---wait issuance--->|<---wait issuance--->|<---wait issuance---->|
  |                                                                  |
  |              (unauthenticated) GET star-certificate              |
  +----------------------------------------------------------------->|
  |                          certificate #1                          |
  |<-----------------------------------------------------------------+
  |                              ...                                 |
]]></artwork>
        </artset>
      </figure>
      <aside>
        <t>Note: The delegation object defined in <xref section="2.3.1.3" sectionFormat="of" target="RFC9115"/> only allows DNS mappings to be specified using CNAME RRs.  A future document updating <xref target="RFC9115"/> could expand the delegation object to also include SVCB/HTTPS-based <xref target="RFC9460"/> mappings.</t>
      </aside>
      <t><xref target="acmedeleobj"/> defines the objects used for bootstrapping the ACME delegation
method between a uCDN and a delegate dCDN.</t>
      <section anchor="acmedeleobj">
        <name>ACMEDelegationMethod Object</name>
        <t>The ACMEDelegationMethod object allows a uCDN to define both STAR and non-STAR delegation. The dCDN, the consumer of the delegation, can determine the type of delegation by the presence (or absence) of the "lifetime" property. That is, the presence of the "lifetime" property explicitly means a short-term delegation with lifetime of the certificate based on that property (and the optional "lifetime-adjust" attribute). A non-STAR delegation will not have the "lifetime" property in the delegation.  See also the examples in <xref target="examples"/>.</t>
        <t>The ACMEDelegationMethod object is defined with the properties shown below.</t>
        <ul spacing="normal">
          <li>
            <t>Property: acme-delegation  </t>
            <ul spacing="normal">
              <li>
                <t>Description: a URL pointing at an ACME delegation object, either STAR or non-STAR, associated with the dCDN account on the uCDN ACME server (see <xref section="2.3.1.3" sectionFormat="of" target="RFC9115"/> for the details). The URL MUST use the https scheme.</t>
              </li>
              <li>
                <t>Type: String</t>
              </li>
              <li>
                <t>Mandatory-to-Specify: Yes</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Property: time-window  </t>
            <ul spacing="normal">
              <li>
                <t>Description: Validity period of the certificate. According to <xref section="4.3.4" sectionFormat="of" target="RFC8006"/>, a TimeWindow object is defined by a window "start" time, and a window "end" time. In case of STAR method, the "start" and "end" properties of the window MUST be understood respectively as the start-date and end-date of the certificate validity. In the case of the non-STAR method, the "start" and "end" properties of the window MUST be understood respectively as the notBefore and notAfter fields of the certificate.</t>
              </li>
              <li>
                <t>Type: TimeWindow</t>
              </li>
              <li>
                <t>Mandatory-to-Specify: Yes</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Property: lifetime  </t>
            <ul spacing="normal">
              <li>
                <t>Description: See lifetime in <xref section="3.1.1" sectionFormat="of" target="RFC8739"/></t>
              </li>
              <li>
                <t>Type: Integer</t>
              </li>
              <li>
                <t>Mandatory-to-Specify: Yes, only if a STAR delegation method is specified</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Property: lifetime-adjust  </t>
            <ul spacing="normal">
              <li>
                <t>Description: See lifetime-adjust in <xref section="3.1.1" sectionFormat="of" target="RFC8739"/></t>
              </li>
              <li>
                <t>Type: Integer</t>
              </li>
              <li>
                <t>Mandatory-to-Specify: No</t>
              </li>
            </ul>
          </li>
        </ul>
        <section anchor="examples">
          <name>Examples</name>
          <t>The following example shows an <tt>ACMEDelegationMethod</tt> object for a STAR-based
ACME delegation.</t>
          <sourcecode type="json"><![CDATA[
{
  "generic-metadata-type": "MI.ACMEDelegationMethod",
  "generic-metadata-value": {
    "acme-delegation": "https://acme.ucdn.example/delegation/ogfr",
    "time-window": {
      "start": 1665417434,
      "end": 1665676634
    },
    "lifetime": 345600,
    "lifetime-adjust": 259200
  }
}
]]></sourcecode>
          <t>The example below shows an <tt>ACMEDelegationMethod</tt> object for a non-STAR ACME
delegation. The delegation object is defined as per <xref section="4.3" sectionFormat="of" target="RFC8006"/>.</t>
          <sourcecode type="json"><![CDATA[
{
  "generic-metadata-type": "MI.ACMEDelegationMethod",
  "generic-metadata-value": {
    "acme-delegation": "https://acme.ucdn.example/delegation/wSi5",
    "time-window": {
      "start": 1570982234,
      "end": 1665417434
    }
  }
}
]]></sourcecode>
        </section>
      </section>
    </section>
    <section anchor="iana">
      <name> IANA Considerations</name>
      <t>This document requests the registration of the following entry under the
"CDNI Payload Types" registry:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Payload Type</th>
            <th align="left">Specification</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">MI.ACMEDelegationMethod</td>
            <td align="left">RFCthis</td>
          </tr>
        </tbody>
      </table>
      <t><cref anchor="to-be-removed">RFC Editor: please replace RFCthis with the RFC number of this RFC and remove this note.</cref></t>
      <section anchor="cdni-mi-acmedelegationmethod-payload-type">
        <name>CDNI MI ACMEDelegationMethod Payload Type</name>
        <dl>
          <dt>Purpose:</dt>
          <dd>
            <t>The purpose of this Payload Type is to distinguish AcmeDelegationMethod
MI objects (and any associated capability advertisement)</t>
          </dd>
          <dt>Interface:</dt>
          <dd>
            <t>MI/FCI</t>
          </dd>
          <dt>Encoding:</dt>
          <dd>
            <t>See <xref target="acmedeleobj"/></t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="sec">
      <name>Security Considerations</name>
      <t>The metadata object defined in this document does not introduce any new
security or privacy concerns over those already discussed in <xref target="RFC9115"/>,
<xref target="RFC8006"/> and <xref target="RFC8008"/>.</t>
      <t>The reader is expected to understand the ACME delegation trust model (<xref section="7.1" sectionFormat="of" target="RFC9115"/>) and security goal (<xref section="7.2" sectionFormat="of" target="RFC9115"/>).]). In particular, the reader is expected to understand the criticality of the protection of the user account associated with the delegation; this account authorizes all the security-relevant operations between a dCDN and a uCDN over the ACME channel.</t>
      <t>The dCDN's ACME account is also relevant to the privacy of the entire scheme;
for example, the <tt>acme-delegation</tt> resource in the Metadata object is only
accessible to the holder of the account key, who is allowed to fetch its
content exclusively via POST-as-GET (<xref section="2.3.1.2" sectionFormat="of" target="RFC9115"/>).</t>
      <t>In addition, the Metadata interface authentication and confidentiality
requirements defined in <xref section="8" sectionFormat="of" target="RFC8006"/> MUST be followed.</t>
      <t>Implementers MUST adhere to the security considerations defined in the CDNI Request Routing: Footprint and Capabilities Semantics, <xref section="7" sectionFormat="of" target="RFC8008"/>.</t>
      <t>When TLS is used to achieve the above security objectives, the general TLS
usage guidance in <xref target="RFC9325"/> MUST be followed.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8006">
          <front>
            <title>Content Delivery Network Interconnection (CDNI) Metadata</title>
            <author fullname="B. Niven-Jenkins" initials="B." surname="Niven-Jenkins"/>
            <author fullname="R. Murray" initials="R." surname="Murray"/>
            <author fullname="M. Caulfield" initials="M." surname="Caulfield"/>
            <author fullname="K. Ma" initials="K." surname="Ma"/>
            <date month="December" year="2016"/>
            <abstract>
              <t>The Content Delivery Network Interconnection (CDNI) Metadata interface enables interconnected Content Delivery Networks (CDNs) to exchange content distribution metadata in order to enable content acquisition and delivery. The CDNI Metadata associated with a piece of content provides a downstream CDN with sufficient information for the downstream CDN to service content requests on behalf of an upstream CDN. This document describes both a base set of CDNI Metadata and the protocol for exchanging that metadata.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8006"/>
          <seriesInfo name="DOI" value="10.17487/RFC8006"/>
        </reference>
        <reference anchor="RFC8008">
          <front>
            <title>Content Delivery Network Interconnection (CDNI) Request Routing: Footprint and Capabilities Semantics</title>
            <author fullname="J. Seedorf" initials="J." surname="Seedorf"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="R. van Brandenburg" initials="R." surname="van Brandenburg"/>
            <author fullname="K. Ma" initials="K." surname="Ma"/>
            <date month="December" year="2016"/>
            <abstract>
              <t>&lt;p&gt;This document captures the semantics of the "Footprint and Capabilities Advertisement" part of the Content Delivery Network Interconnection (CDNI) Request Routing interface, i.e., the desired meaning of "Footprint" and "Capabilities" in the CDNI context and what the "Footprint &amp; Capabilities Advertisement interface (FCI)" offers within CDNI. The document also provides guidelines for the CDNI FCI protocol. It further defines a Base Advertisement Object, the necessary registries for capabilities and footprints, and guidelines on how these registries can be extended in the future.&lt;/p&gt;</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8008"/>
          <seriesInfo name="DOI" value="10.17487/RFC8008"/>
        </reference>
        <reference anchor="RFC8739">
          <front>
            <title>Support for Short-Term, Automatically Renewed (STAR) Certificates in the Automated Certificate Management Environment (ACME)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="A. Pastor Perales" initials="A." surname="Pastor Perales"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>Public key certificates need to be revoked when they are compromised, that is, when the associated private key is exposed to an unauthorized entity. However, the revocation process is often unreliable. An alternative to revocation is issuing a sequence of certificates, each with a short validity period, and terminating the sequence upon compromise. This memo proposes an Automated Certificate Management Environment (ACME) extension to enable the issuance of Short-Term, Automatically Renewed (STAR) X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8739"/>
          <seriesInfo name="DOI" value="10.17487/RFC8739"/>
        </reference>
        <reference anchor="RFC9115">
          <front>
            <title>An Automatic Certificate Management Environment (ACME) Profile for Generating Delegated Certificates</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. López" initials="D." surname="López"/>
            <author fullname="A. Pastor Perales" initials="A." surname="Pastor Perales"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="September" year="2021"/>
            <abstract>
              <t>This document defines a profile of the Automatic Certificate Management Environment (ACME) protocol by which the holder of an identifier (e.g., a domain name) can allow a third party to obtain an X.509 certificate such that the certificate subject is the delegated identifier while the certified public key corresponds to a private key controlled by the third party. A primary use case is that of a Content Delivery Network (CDN), the third party, terminating TLS sessions on behalf of a content provider (the holder of a domain name). The presented mechanism allows the holder of the identifier to retain control over the delegation and revoke it at any time. Importantly, this mechanism does not require any modification to the deployed TLS clients and servers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9115"/>
          <seriesInfo name="DOI" value="10.17487/RFC9115"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7336">
          <front>
            <title>Framework for Content Distribution Network Interconnection (CDNI)</title>
            <author fullname="L. Peterson" initials="L." surname="Peterson"/>
            <author fullname="B. Davie" initials="B." surname="Davie"/>
            <author fullname="R. van Brandenburg" initials="R." role="editor" surname="van Brandenburg"/>
            <date month="August" year="2014"/>
            <abstract>
              <t>This document presents a framework for Content Distribution Network Interconnection (CDNI). The purpose of the framework is to provide an overall picture of the problem space of CDNI and to describe the relationships among the various components necessary to interconnect CDNs. CDNI requires the specification of interfaces and mechanisms to address issues such as request routing, distribution metadata exchange, and logging information exchange across CDNs. The intent of this document is to outline what each interface needs to accomplish and to describe how these interfaces and mechanisms fit together, while leaving their detailed specification to other documents. This document, in combination with RFC 6707, obsoletes RFC 3466.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7336"/>
          <seriesInfo name="DOI" value="10.17487/RFC7336"/>
        </reference>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
      </references>
    </references>
    <?line 318?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank authors of the <xref target="RFC9115"/>, Antonio Augustin Pastor Perales, Diego Lopez, Thomas Fossati and Yaron Sheffer. Additionally, our gratitude to Thomas Fossati who participated in the drafting, reviewing and giving his feedback in finalizing this document. We also thank CDNI co-chair Kevin Ma for his continual review and feedback during the development of this document.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA80723Ijt7Hv+AocqioreTkURV12l3Fsy5QUs6JbRK0dl2vP
MTgDkrCGA2YwQ5nmyt+S1/xG8mPpbgBzIanVrspJjsplD2eA7kbfG90OgoDN
u3yfsUxlsezy3slln0cylmORKZ3w3KhkzI/zTE9FJiPek2mmRiqEH/xCJGIs
pzLJ+GkyV6lO8JmJ4TCV80dB9S5OWaTDREwBXZSKURYomY2CMEpUUC4PRDiV
QfuQMcQ11umiy00WsVAnRiYmN12epblkJh9OlTGwI1vMAGL/9PaMMTVL6bvJ
Ou32m3aHiVSKLm8cz2YxEg/LDRdJxG+kiINbNZUNdq/Tu3Gq8xms6wE4PNeJ
jNVcpgt+KTP8bngfPqRARCJDhNJgd3IBX6Iu/+Gb29vrQbNy5CadtskHt8c3
7xgzGWD8PxHrBOhcSMNmCnZlOmxyo9MslSMDT4spPsBykWcTnXYZD7hl1ln6
z79H//x7qkJ+pqTIGedcp+Muv0pFMpb40wAUmXX5QTs4eN3kYi6TXAJFPBZw
1Fk+jNVfc1oZqgw42psAoTFQRK90BFjedPY7bfszTzJk+xmAD2mTnAoVd/ko
lZEEMlojJOMrTehboZ7imlSjHslIZTplJfGnUxVLPsjkbCKSD1DeKai+VjJN
UcvSX1RSknwukkRVCe509ttPECwRectY5FV6S/oGIvlJLPiFMpNUFPR9C8f8
xSLzBO7t77XbvKfjfDpUAqi8q/BzoGJQFz6YpaDrJYkXJ7wDanhQo/JtotCi
Bhnot+F6xI+nyFRRodsQUa0pEfXV3BJjCScegXLwZ6gs5xZ8A23uK7S+FpwW
349VNsmH8OXMifhM7ZJh3sNnlugUvABAR7w3Z73X7fZR+fjaP77af+Me3+zt
HfrH/Q48MpWMVoC82t8HIAxIRw7Cu8Hp+RlQAJ+yiTKANggCLobAfxFmjN3C
Sw4OJCfHE8mRSoB9U5mJSGSCZ5qbfDYDeyoMEbxONkErcIzRI0amCqKwLBsC
p6RMOPALxM6nGtROVZiGfu9R7m6DnzM7LaB7JkNyjXG8aHKkna2RKR4FtCol
gtvf4Rf+YETQSISS6+FPsAZPKhMxjGXVycLZ/tI6bL/hYemoDY8loBJj5ERl
rQkn4L2NIy4CDMzJrMWvQYvhB8dfzSonSU4KdoUi4SnqaQIb+SiPY+InmD/q
smO4R4Wu1m6Y6ztgbsYF/JMseAaut8VJpmKuVWRoZyKBHJTkBPw2B2OaY7wJ
08Us0+NUzCbgAsHvcoxJqRJxKcEJSm6uwQqjgtQWszo0VVEUS8a2/vG3PhIa
5cRpxrxMSg1BI7Y6YqNWVTNCrWfATeIGyp6jR7cqNhPZBM7411yl4N5DtCGg
AeibFqESPHxFT/j9BKg+uRwEQ2GAZNgBW60CAEtyeAea1QdZ5eEEOGgkhAjg
Yz5DdySmSADfzuHfO8Q0g1xzfEc2g5gKIuibANO5T9zm7Yg2gkUWpuBZADxb
Lp02PDwU+lsRKVjcRJO8UJQQQ+4BOFLC4eNQTkQ88orggc9SPVfgVpr0dqJj
eC6URaMqNZHGsUyQv6DoCSQEU9QdODKpNauotcU8VIlTmkgaNU4oS7HAyLPz
e3BpQBmoSzATCvDdo64PF3YP0AsMPgMOjPIU3qQAJgPnCGyexRL4DSIZyZQB
WcvlwElmD4kumYMElh8PW3utTqu+pPWY26Ic6aLiu6YCzAPEjtutAlZY7rVc
MOIzMYaOwK32aGsAUxlCmFNm6lWNbJtX5IlHtsdFjW4ytMcoQve0JmAkCoE2
iNRrsYi1iPgt5FqmwfvHl8fAoLEChbIqMwpV4H0xsGYGdgDnXVUce1zUOwR9
pnWGATPjv+M9MRNDFVsXcxzNUdzG5pilA9w+6/XR4y6X0xo2OAPgAxtxbKjg
AYZEMVrsGlNJP3B9IYa+R4SOY2uL3wKbVKJjPV7w5VZW/npYFWtOuCvLR6me
WiGPUlBGcvR+tbFGLYxNldn6CisyDJBOy2hdyYfCk9h8tgDcXdGrcgcBxLBt
ATJaV/KfcHyMBDyc16RLfXQARm8+PqvYTavjzAJzhDXL2VuxmiYgDOM8QrEN
IBXOApRE01cjzoPegLe4Bw3fxix7B7wjqDFm+TaCrAdDskVJ4QPzdsMbF28H
t42m/S+/vKLnm9M/v+3fnJ7g8+Cb4/Pz4oG5FYNvrt6en5RP5c7e1cXF6eWJ
3Qxvee0Va1wcf99o0tkbV9e3/avL4/MGGmhW0yWMfHCAoUtFwJLQswlIKqQJ
UzW0Rv117/off9s7AC7+D/Cts7eHbLU/Xu+9OoAfGGEsNp24gEP+d8GATVKk
CEVg8BYzlQl0fMBBMwE3ycE/gA18/iUYjuTB0ZdfoD0UOoFiOSnt6KJqbqRX
2QRS0/GEg7WC3dQ8g5XBMxSPTL+SsVQ10UYhED8jn4j5gyQXiQSEHjo4fnBe
lSTKRq01F517P1K3pQocB8JQCqJ+sWwgi68ShewQFKcpXrnkFMW4GkqdZo40
HgO5i0lRwuXPYgqxyAdKBwCjnIvzURGLS+KYI85iJ34ohIJH8wkxFqfrDh+o
+PXXX38ykBgtIRtvhBWxNKBexfKEL+nf1a+LANnawNKh1295doG6ry+cizjH
lR4IfPWKUSCwf7u7PIbYgkdfO3aFcZUdDTxUqZUXtKBRLHjnnh4KukZeB00N
d6PUTctJ44FYEA8Mnx6QVZRQEi8/aA3LrWnNAL7DzM9lTF6SZrVQceEKSp8R
uC+XwOEOm5ZC4gj+r0gZWSVeNIv8hk9zQ+oMe6vp0xAK0SK861RBefDC2Jwp
0wxiUwixFPP6BcerCFQcm3bZHWBaAQBN+baR0vr/TUkQK9z5Duq3tlYAm22J
BNZjd/iMiBQznMpVGXpru4fcf1L4QFOP8i5Z36DbK6GrkpbZtWvobAyhnHmo
IUMggBhiavc7RI3Pa8nzVJQTSv+4zMwMRTCMjvXazOanPqRBNgXhDCqG7ZKZ
ndZ+ETgdK8mhQz2eBI+Q5FzhhuSRShbLKKxbiCJWo2gF9X4dtU3z1DjA8BuM
AA3leZ4DfKLGkwALzpjPlbwva4DpkHw2GQP6e3sTWDVmY6BI4iOiHPiuhxlm
8XTCquKSiyXPXHl5TLdl6Ja3e8c7deX29d21qz9eYNV+vUO6bt2dEGY+Zi2o
EoMWX/nb+HbzUveavUe7e7/68X2+4e173rvma0vx9TF/z14EL4PgxerHjW9f
BPB2bal7zbjD8cfT29JkON+A+fG3QA/nLwP39wMK8p19/uKTweCnTrvNr/7U
rNDzHDDbkCS2SNGxzgTF3HkGmM83HCp4+ZxDfeyGp8CgoCrG8WxJ/VB4wnfP
lZSXU5WcZ4CxguoNbqBEgFQEjPbZklo51H9NUi83eoHnCXzdXTwDTJhKdIZY
3NBlB/jZ54BBId3vVhLM51FDucTHbPgP8Ab1Zs07Po+aj9zwJJjrK6g3r1II
SHvPA/ObWfhjGyCnuhdpVCHyk8F8Co3PZHHJx87zwFRppF6dC2q/tcA/Egyq
qm3+uaLS/NbUIIZ7oaCwNibHXhkh+Pi3H6Lmk/42gNnOk2q5Ee1QKDSZSINq
ErgGpkhMnv331KGq6Lf2njjU50/je+Lv5dMsbrXWU9B1arBGXXb5Vi1p5yKl
vlMgYjVO/tAIJVZIVOTSKMAfGqfu3qHcAqn8SrmBNzCU0OOFEZYUHeo1xdTP
LJc1oN5ddoWB5PuBfcEvdSa7/LbeInL1Xe1qp1qG7K0UIvY6y9U5WAhPoWQD
Eoy7NSvvvm2x07s8BvO+uTHAsmM+yrM8lZXbnllkOzrVrkeo8zji8ucZlivZ
RnKxIsfS195USj74tvf1LhXtrqOzXH6JAA+O2gDQk0g1FA44IECAVOmwUDFu
bxyo/UN17VDrDPuftHtTfcvcZX3RIeDVDoHvB0X2nmtra3PJe2WPtNyqUvaB
EtmxwN+6WZTUf8Kj2LKZ9AXJ2FCrtqwKwK6mbxMZkEa63j9sUvMwkvZuWdJX
e4s3qpW4tqljmw54WYiXX0N63vFAG7EaSew6NrBonYFJL5AOgf6tWd/++A7U
iViFYCcLqF4EzpJU6/vV7oIHUNTC1VuYsnMjshLBtlc5PUM4Ii7JCET0U26y
BhdZlqphDnl0CzR6A4MBexzDh4xPxFw+ehiVrLAbm9n+ToeueqwnMNYo/a8P
35845VBle7lotDjEeLti75mHEjQIgH2GFTrR1OU0/lNRcHBMn/ETuvYhjsAK
/vbmnM+0sjea1FBeu/exZDS5VNTcIwaBVnhm4WW30aGiJLcgkG7NREiTGr6p
RspN0I1M5/7a6wkX5Ttcrqe4YzUeyaZeA97JUSc0y2bGteNbdNBbmmUaZG6M
5DOctQIHpdNFkOnAThoAk76Xps410g9wxJG+38Cxb8HXR3hFAqsVymhNHUGR
4NgptVxqLc8DON6Bb95Q/whYx3Fw6jvCtkHeYI2CW1p4A+M3qCzS13RuyX+S
SdRwcwD9hHrcRaCxXs2apQdBfRPaU9EjdxIHkpgLISBPICc0mdbYWMd4gGMn
GDSsmyWAQYRWiEDxQpN+bLDSueMckUgfHZk0reAt799LLtjx13KEEwjWn2bH
I/A2HEJcHJlNsqxoUimoT9Em7ys2qBL6h8Kt1WI1msFerc1XoQNbq2OZfpiI
pg3tagRKsurRXJzDi2Mf3zfT7LzkE6S7Vb/pCS41htgtfuq95nKrcJmrHR7f
20E/SM2eHzc50x95rZuDPLHZBVtxd6u9G5qkUGHRdih6NBf91sZGSXPjrnrD
prHimhEeebDu7i5+auVhlLTcyXbLdbt6PEpdQ6hRcVSVTpAzmi7fOzo6PNh7
dbB/UDRq0Ibsh6NXR0f7B7YN48AVUa3L9w8Oj9rtlfc+ZnZ55/BNh8YFH3z3
5raMcDYSfZo0Cutfuc9uPZLgVjwkGDZobd3L1nzs/2953g/U4cfK8/BV+83r
TmejPK2gi7baQ6WtRgMmPcgL8drejTkst5RIxNrsBY5dSZNZX+lmUvxMHL2r
WB0OYFp3i1/YxtkWP9bSZex97RsUZYPq4AVUWO+hXINVj0gBNiyXv8OxRkgJ
3jP2w/+CuxjKIJVTPZfRu/U3XZq9O6UZ2m45iDSLbQPLwyoSFlyd5NOhz52B
L/gK44QFad9BzJA2/7c97f7m1K16WMau83SmjewyW7HN7M8CT40zys6fAd+A
zbkyk42tPJAxoPZFzrad71pUM7FKk11UBwF2GCuGc5Cgi/7uWa/P2GkSasxZ
8N2A0rJacYVTC2BiObWH1rTJyND55aIRsV6L1mczIi2Jm9hWpDlCSSdI5D0z
Hg84BxpcDBdY2EBcBmQ0VwgswF5snEoRLZBZYW7M2ohWk63M6tRmbiy9CAEA
AmVQj9g5VWC/SyN8AbGaEdNUvGtOlp0+9mpl+GaHcBanGet6T/LVakey9W6H
kqMZGLwK81i4Kb+PohGCM43zEN9GvkjIHC73hprNPivfmLYXh/y9lVex2F2m
YX8SCiLK/dzBwORiOReY588KnSir6Kisou1ooxWg4yqO2SUydtLAtS+M/eIx
IxFYRRVYXEfSa4Y7Gl52QV5nK4DfMwwszt9aJv644qJ/xARR52koffF2saK6
gBiTKCaoi69wStihro9dekLv5AJbx9pSDH7SygmiZzjBOVLmZzjlz2GcG5uY
znH+/WpwGwgT4CXd9mo5tKojaL44padsUV8jvOzQV67/itlh7Oy5OVacbnEz
tlM3W7jhyuh1LZAWObYNAhKnXPp+HgY00X4XEU48eUYVuh/WPUbNK7jxoBsb
fPiNztH1dT802jTAkVY4HeS5FXsqybX2TeMht+cDPwZMN03hRElXyIshuvXS
25DYQSzuEsPO0MYIgeXUVgd/HOH1beln9juHmzkD0YwPRXhH017hXaLvYxmN
idls2c0TG2pkhFMsUMXQLVms7hznRHLnLK6oSqp+jR8nmU6U5sf5OMdAASEE
ip4UR85FjPSfKDnW/BwM8pcmxBw9hTzpTBsD/Cdufi9S4NhgIkcjmULF6vTJ
zt2DVfAxiirD6zggaAUA6rj1UWpG7sPffuD/iQSia+KMupKUJyCysZrjI7qT
kZQRsoXm3VWCM1/2Oq4SGlr8u+LiBBlB2hHqAFyFSvmfAHQCZYMdSYVtaFUq
yUFQFiuhLPBEeVr+zwtgcXpG0ceH3gInY/8CR3Wswsg1AAA=

-->

</rfc>
