<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-iotops-mud-acceptable-urls-01" category="std" consensus="true" updates="8520" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="mud-acceptable-urls">Authorized update to MUD URLs</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-iotops-mud-acceptable-urls-01"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="E." surname="Lear" fullname="Eliot Lear">
      <organization>Cisco Systems</organization>
      <address>
        <email>lear@cisco.com</email>
      </address>
    </author>
    <date year="2025" month="November" day="04"/>
    <area>Operations</area>
    <workgroup>IOTOPS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 71?>

<t>This document provides a way for an RFC8520 Manufacturer Usage Description
(MUD) definitions to declare what are acceptable replacement MUD URLs for a device.</t>
      <t>RFCEDITOR-please-remove: this document is being worked on at: https://github.com/mcr/iot-mud-acceptable-urls</t>
    </abstract>
  </front>
  <middle>
    <?line 78?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC8520"/> provides a standardized way to describe how a specific purpose
device makes use of Internet resources and associated suggested network behavior.
The behaviors are described in a MUD file hosted in its manufacturer's server.
The device provides a MUD URL to the MUD controller, which can locate this MUD file
and determine the required network authorization of the device.</t>
      <t>In some cases, e.g., the firmware update, the network behaviors of the device may change,
and the description in the original MUD file will no longer apply.
To solve this problem, there are two common ways which the manufacturer can use.</t>
      <t>One is to change what is in the MUD file, i.e., update the MUD file in place, whenever the behavior of the firmware changes.
<xref target="updatemudfiles"/> discusses three scenarios for updating the MUD file and the corresponding potential issues.</t>
      <t>The other is to change which MUD file is processed by changing the MUD URL.
<xref target="updatemudurls"/> describes the common sources of MUD URLs and the problems and threats faced by each type of source when updating the MUD URL.
This document proposes an enhanced mechanism of how to securely update the MUD URL in <xref target="proposedmechanism"/>.</t>
      <t>There are also some assumptions and prerequisites in this document.</t>
      <t>While MUD files may include signatures, <xref target="RFC8520"/> does not mandate checking them, and
there is not a clear way to connect the entity which signed the MUD file to the device itself.
This document limits itself to situations in which the MUD file is signed,
and that the MUD controller has been configured to always check the signatures,
rejecting files whose signatures do not validate.</t>
      <t><xref target="RFC8520"/> does not specify how MUD controllers establish their trust in the manufacturers' signing key:
there are many possible solutions from manual configuration of trust anchors,
some kind of automatic configuration during onboarding,
or a Trust on First Use (TOFU) mechanism that accepts the signer on first use.
How this initial trust is established is not important for this document,
it is sufficient that some satisfactory initial trust is established.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
    </section>
    <section anchor="updatemudfiles">
      <name>Risk analysis of updating the MUD files in place</name>
      <t>This section explains three scenarios where updating the MUD file in place
could cause security issues for the devices involved.
This section explains why changing the MUD URL to point to a new file is important.</t>
      <section anchor="adding-capabilities">
        <name>Adding capabilities</name>
        <t>For situations where new capabilities are added to the firmware, the MUD file will detail the new access that the new firmware requires.
This may involve new incoming or outgoing connections that should be authorized.
Devices that have been upgraded to the new firmware will make use of the new features.
Devices that have not been upgraded to the new firmware may have new connections that are authorized, but which the device does not use (outgoing connections), or which the device is not prepared to respond to (new incoming connections).</t>
        <t>It is possible that older versions of the firmware have vulnerabilities that were not easily exploitable due to the MUD file preventing particular kinds of access.
For example, an older firmware could have no credentials required (or default credentials) access via telnet on port 23 or HTTP on port 80.
The MUD file protected the device such that it could either not be accessed at all, or access was restricted to connections from a controller only.</t>
        <t>Useful and needed upgrades to the firmware could add credentials to that service, allowing it to be opened up for more general access.
The new MUD file would provide for such access, but when combined with the weak security of the old firmware, it results in a compromised device.</t>
        <t>While there is an argument that old firmware was insecure and should be replaced, it is often the case that the upgrade process involves downtime, or can introduce risks due to needed evaluations not having been completed yet.</t>
      </section>
      <section anchor="removing-capabilities">
        <name>Removing capabilities</name>
        <t>For situations where existing capabilities prove to be a problem and are to be turned off or removed in subsequent versions of the firmware, the MUD file will be updated to disallow connections that previously were allowed.</t>
        <t>In this case, the new MUD file will forbid some connections, which the old firmware still expects to do.
As explained in the previous section, upgrades may not always occur immediately upon releasing the new firmware.</t>
        <t>In this case, the old device will be performing unwanted connections, and the MUD controller will be alerting the network owner that the device is misbehaving rather than not being upgraded.
This causes a false-positive situation (see <xref target="boycrieswolf"/>), leading to real security issues being ignored.
This is a serious issue as documented also in <xref target="boywolfinfosec"/>, and <xref target="falsemalware"/>.</t>
      </section>
      <section anchor="significant-changes-to-protocols">
        <name>Significant changes to protocols</name>
        <t><xref target="I-D.ietf-opsawg-mud-tls"/> suggests MUD definitions to allow examination of TLS protocol details.
Such a profile may be very specific to the TLS library which is shipped in a device.
Changes to the library (including bug fixes) may cause significant changes to
the profile, requiring changes to the profile described in the MUD file.
Such changes are likely neither forward nor backward compatible with other
versions, and in place updates to MUD files are therefore not advised.</t>
      </section>
      <section anchor="motivation-for-updating-mud-urls">
        <name>Motivation for updating MUD URLs</name>
        <t>While many small tweaks to a MUD file can be done in place, the situation
described above, particularly when it comes to removing capabilities will
suggest that changes to the MUD URL are in order.
A strategy for doing this securely is needed, and the rest of this document
provides a mechanism to do this securely.</t>
      </section>
    </section>
    <section anchor="updatemudurls">
      <name>Updating the MUD URLs</name>
      <t>MUD URLs can come from a number of sources:</t>
      <ul spacing="normal">
        <li>
          <t>IDevID Extensions</t>
        </li>
        <li>
          <t>DHCP option</t>
        </li>
        <li>
          <t>LLDP TLV</t>
        </li>
        <li>
          <t><xref target="RFC9238"/> standardizes scanning MUD URLs from QRcodes.</t>
        </li>
      </ul>
      <t>The IDevID mechanism provides a URL that is asserted cryptographically by a manufacturer.
However, it is difficult for manufacturers to update the IDevID of a device which is already in a box.</t>
      <t>The DHCP and LLDP mechanisms are not signed, but are asserted by the device.
A firmware update may update what MUD URL is emitted.
Sufficiently well targeted malware would also be able to change the MUD URL that is emitted.</t>
      <t>The QRcode mechanism is usually done via paper/stickers, and is typically not under the control of the device itself at all.
However, being applied by a human and not easily changed, a MUD URL obtained in this fashion is likely as trustworthy as the rest of the vendors packaging.
(It may not, due to mixups in labeling represent the correct device, but this is a human coordination issue, and is out of scope for this document.)</t>
      <t>The manufacturer can use all the four mechanisms above when manufacturing the device.
But when considering updating the firmware, it seems like only the DHCP and LLDP mechanisms
are sufficiently easy to send the new MUD URL.
Because of that sensitivity, they may also be easily changed by malware!</t>
      <t>There are mitigating mechanisms which may be enough to deal with this problem when MUD
files are signed by the manufacturer.</t>
      <t><xref section="13.2" sectionFormat="comma" target="RFC8520"/> explains how to verify MUD File Signatures.
That document does not define a way for a MUD controller to determine who should sign the MUD file for a particular device.</t>
      <t><xref target="RFC8520"/> leaves this for a local policy.
This document establishes one such local policy.
There are a number of other processes that could be used, it is expected that
many such industrial vertical will work out supply chain arrangements or other
heuristics to supply appropriate anchors.</t>
      <section anchor="leveraging-the-manufacturer-signature">
        <name>Leveraging the manufacturer signature</name>
        <t>The first time a signature of the MUD file related to a particular device-type
is verified by the MUD controller, the identity of the signing authority is recorded.
That it, the signing authority is pinned.
This policy means that subsequent MUD files must be signed by the same entity in order to be accepted.</t>
        <t>The trust and acceptance of the first signer may come from many sources.
The first signature could be from a manually configured trust anchor in the MUD controller.
The first signature could be Trust on First Use (TOFU), with the URL coming from a trusted IDevID certificate.</t>
        <t>Based upon this process, an update to the MUD URL would be valid if the new
MUD file was signed by the same entity that signed the previous entry.
This mechanism permits a replacement URL to be any URL that the same
manufacturer can provide.</t>
      </section>
      <section anchor="concerns-about-same-signer-mechanism">
        <name>Concerns about same-signer mechanism</name>
        <t>There is still a potential threat: a manufacturer which has many products may
have a MUD definition for another product that has the privileges that the
malware desires.</t>
        <t>The malware could simply change the MUD URL expressed by DHCP or LLDP to that
of another product, and it will be accepted by the MUD controller as valid,
since the MUD file is signed by the same manufacturer.
(e.g., The malware in a BrandName refriderator claims to be a BrandName Washing
Machine, and therefore gets the priviledges of the other device)</t>
        <t>This works as long as manufacturers use a single key to sign all products.
Some manufacturers could sign each product with a different key.
Such manufacturers would probably then collect all the signing keys into a certificate infrastructure (PKI), with a single manufacturer CA key.</t>
        <t>In this case, the question then becomes whether the MUD controller should pin the End-Entity (EE) certificate, or the CA certificate.</t>
        <t>Pinning the End-Entity (EE) certificate defends against malware that changes the product type, but prevents the manufacturer from being able to cycle the validity of the End-Entity certificate for cryptographic hygiene reasons.</t>
        <t>Pinning the CA certificate allows the EE certificate to change, but may not defend against product type changes.</t>
        <t>It is possible to invent policy mechanisms that would link the EE certificate to a value that is in the MUD file.
This could be a policy OID, or could involve some content in a subjectAltName.
Future work could go in that direction.
This document proposes a simpler solution.</t>
      </section>
    </section>
    <section anchor="proposedmechanism">
      <name>Proposed mechanism for updating MUD URLs</name>
      <t>The document proposes to limit what MUD URLs are considered valid from the device, limiting new MUD URLs to be variations of the initial (presumed to be secure) URL.</t>
      <t>The first MUD file which is defined for a device can come from an IDevID (which is considered more secure),
or via Trust on First Use with DHCP or LLDP or other mechanisms. This first, initially trusted, MUD file will be called the "root" MUD file.</t>
      <t>A MUD file contains a self-referential MUD-URL attribute that points to
the MUD file itself located on the vendor's website.
While the IDevID, DHCP and LLDP mechanisms only transmit a URL, there are
some newer, not yet standardized proposals that would fetch an entire MUD
file from the device, such as <xref target="I-D.jimenez-t2trg-mud-coap"/>.</t>
      <t>The MUD-URL MUST always be an Absolute URI: see <xref target="RFC3986"/> section 4.3.</t>
      <t>The URL found in the MUD-URL attribute is to be called the canonical MUD URL for the device.</t>
      <t>The MUD-SIGNATURE attribute in the MUD file SHOULD be a relative URI (see <xref target="RFC3986"/> section 4.2) with the (hierarchical) base URI for this reference being the MUD-URL attribute.</t>
      <t>When pinning the signature, the MUD manager SHOULD use the
SubjectKeyIdentifier (SKI) <xref section="4.2.1.2" sectionFormat="comma" target="RFC5280"/> of the Certificate
Authority (CA) when pinning the certificate authority.  With this, the chain of Subject
Names and/or SubjectAltNames leading to the (end entity) signing certificate
needs to be recorded.
The MUD manager may need additional trust anchors (including previously
pinned ones) in order to verify that CA certificate.
This process allows for the manufacturer to generate new end-entity signing
certificates, as the certificates for this key expire.</t>
      <section anchor="small-changes-to-the-mud-url">
        <name>Small Changes to the MUD URL</name>
        <t>Subsequent MUD files are considered valid if:</t>
        <ul spacing="normal">
          <li>
            <t>they have the same initial Base-URI as the MUD-URL, but may have a different final part</t>
          </li>
          <li>
            <t>they are signed by an equivalent End Entity (same trusted CA and same Subject Name) as the "root" MUD file.</t>
          </li>
        </ul>
        <t>Section 5.2 of <xref target="RFC3986"/> details many cases for calculating the Base-URI.</t>
        <t>Section 3.3 of <xref target="RFC3986"/> explains how the different parts of the URL are
described.
As explained in that section, a <em>path</em> component consists of a series of
<em>segment</em> seperated by slash ("/") characters.
The new URL is considered acceptable if it contains the same series of
segments in its path, excepting that the last segment may be different.</t>
        <t>For a simple example, if the canonical MUD-URL is <tt>http://example.com/hello/there/file.json</tt> then
any URL that starts with <tt>http://example.com/hello/there/</tt> would be acceptable, such as
<tt>http://example.com/hello/there/revision2.json</tt></t>
        <t>One problem with these small changes is that malware could still express a
MUD file that was previously valid, but which should no longer considered
accurate.
This is a rollback attack.
This might result in the malware being able to reach destinations that turned
out to be a mistake; a security fault.
In order to combat this, MUD managers SHOULD keep track of the list of
MUD-URLs that they have successfully retrieved, and if a device ever suggests a URL that was
previously used, then the MUD manager should suspect that is a rollback attack.
MUD managers are not typically resource constrained, and while the
list of URLs could grow without bound, it is unlikely to be a burden.
A site with thousands of similar devices could keep a common list of URLs.</t>
      </section>
      <section anchor="big-changes-to-the-mud-url">
        <name>Big Changes to the MUD URL</name>
        <t>Once a new MUD file is accepted, either by reloading an existing file from
the same URL, or via the Small Changes mechanism described above, then the
MUD-URL attribute in this file becomes the new canonical MUD file.
The contained MUD-URL attribute in the file need not be related in any way to
the existing MUD-URL.</t>
        <t>As a result, any subsequent updates MUST be relative to the new MUD-URL in
this file.</t>
        <t>This rule enables the location of the MUD file to change over time based upon
the needs of the organization.</t>
      </section>
      <section anchor="merger-acquisitions-and-key-changes">
        <name>Merger, Acquisitions and Key Changes</name>
        <t>The above process allows for a manufacturer to rework its file structure.
They can change web server host names, so long as they retain the old structure long enough for  all devices to upgrade at least once.</t>
        <t>The process also allows a manufacturer to change the EE certificate and Certification Authority used for signing.</t>
        <section anchor="file-structure-change">
          <name>Changing file structure</name>
          <t>A manufacturer has been hosting a MUD file at <tt>https://example.com/household/products/mudfiles/toaster.json</tt>
and wishes to move it to <tt>https://example.com/mudfiles/toasters/model1945/mud.json</tt></t>
          <t>The manufacturer creates a new MUD file at the new location.</t>
          <t>Then the manufacturer changes the MUD-URL contained with the files at the old location to have a value of ``https://example.com/mudfiles/toasters/model1945/mud.json<tt>
Note that in order for MUD controllers to reload the old file, it MUST have been served with an appropriate ETag, and appropriate Expires or Cache Control headers {{RFC9111, Section 5.3}}.
If control over caching is not possible for the manufacturer, then they need to do this in two steps, with the first step creating a new MUD file at an acceptable location (in the above example, perhaps: </tt>https://example.com/household/products/mudfiles/toaster0.json` ).
The device then will have to do two firmware updates: one to switch to the intermediate URL, and a second one to switch to the desired final URL.</t>
          <t>The manufacturer must continue to serve the files from the old location for some time, or to return an HTTP 301 (Moved Permanently) redirecting to the new location.</t>
        </section>
        <section anchor="changing-hosting-urls">
          <name>Changing hosting URLs</name>
          <t>A manufacturer has been hosting a MUD file at <tt>https://example.com/household/products/mudfiles/toaster.json</tt>
and wishes to move it to <tt>https://mud.example/hosthold/products/mudfiles/toaster.json</tt></t>
          <t>The scenario is much the same as for <xref target="file-structure-change"/>, and can be handled in the same fashion.
This situation is likely to occur when one company acquires another.</t>
          <t>Note, however, that a 301 Redirect that changed the hostname SHOULD NOT be accepted by MUD controllers.</t>
        </section>
        <section anchor="changing-signing-authority">
          <name>Changing Signing Authority</name>
          <t>A manufacturer has been signing MUD files using an EE Certificate with subjectAltName foo.example, issued by an internal Certification Authority BAZ.</t>
          <t>The manufacturer wishes to begin signing with an EE Certificate with subjectAltname foo.example, but now signed by a public CA (call it: Fluffy).</t>
          <t>The manufacturer first creates a new MUD file with a new detached signature file.
Within this signature file, the manufacturer places a certificate chain: Internal-CA BAZ-&gt;Fluffy,
and then the Fluffy Certificate, and then the foo.example certificate issued from Fluffy.</t>
          <t>This supports changing certification authorities, but it does not support changing the Subject Name of the signing entity.</t>
        </section>
      </section>
    </section>
    <section anchor="polling-for-changes-in-mud-files">
      <name>Polling for changes in MUD files</name>
      <t>The MUD file update mechanisms described in <xref target="updatemudfiles"/> requires that the MUD controller poll for updates.
The MUD controller will receive no signal about a change from the device because the URL will not have changed.</t>
      <t>The manufacturer SHOULD serve MUD files from a source for which ETag <xref section="2.3" sectionFormat="of" target="RFC7232"/> may be generated.
Static files on disk satisfy this requirement.
MUD files generated from a database process might not.
The use of ETag allows a MUD controller to more efficiently poll for changes in the file.</t>
      <t>A manufacturer should also serve MUD files with an HTTP Max-Age header as per <xref section="5.2.2.8" sectionFormat="of" target="RFC7234"/>.</t>
      <t>The MUD controller should take the Max-Age as an indication of when to next poll for updates to the MUD file.
Values of less than 1 hour, or more than 1 month should be considered out of range, and clamped into the range (1 hour, 1 month).</t>
      <t>MUD controllers SHOULD add some random jitter to the timing of their requests.
MUD controllers MAY use a single HTTP(S)/1.1 connection to retrieve all resources at the same destination.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The MUD URL could contain sensitive information such as the model number and even firmware revision numbers.
Thus, the MUD URL may identify the make, model and revision of a device.</t>
      <t><xref target="RFC8520"/> already identifies this privacy concern, and suggests use of TLS so that the HTTP requests that retrieve the MUD file do not divulge that level of detail.</t>
      <t>The requirement for the MUD controller to poll for changes to MUD files results in multiple interactions between the MUD controller and the manufacturer whereas a more naive implementation might only interact once.
Even if HTTPS used, an observer of the traffic to that manufacturer will be revealing, and <xref target="RFC8520"/> goes on to suggest use of a proxy as well.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no requests to IANA.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Prior to the standardization of the process in this document, if a device was infiltrated by malware, and said malware wished to make accesses beyond what the current MUD file allowed, the malware would have to:</t>
      <ol spacing="normal" type="1"><li>
          <t>arrange for an equivalent MUD file to be visible somewhere on the Internet</t>
        </li>
        <li>
          <t>depend upon the MUD controller either not checking signatures, or</t>
        </li>
        <li>
          <t>somehow get the manufacturer to sign the alternate MUD file</t>
        </li>
        <li>
          <t>announce this new URL via DHCP or LLDP, updating the MUD controller with the new permissions.</t>
        </li>
      </ol>
      <t>One way to accomplish (3) is to leverage the existence of MUD files created by the manufacturer for different classes of devices.
Such files would already be signed by the same manufacturer, eliminating the need to spoof a signature.</t>
      <t>With the standardization of the process in this document, then the attacker can no longer point to arbitrary MUD files in step 4, but can only make use of MUD files that the manufacturer has already provided for this device.</t>
      <t>Manufacturers are advised to maintain an orderly layout of MUD files in their web servers,
with each unique product having its own directory/pathname.</t>
      <t>The process described updates only MUD controllers and the processes that manufacturers use to manage the location of their MUD files.</t>
      <t>A manufacturer which has not managed their MUD files in the way described here can deploy new directories of per-product MUD files, and then can update the existing MUD files in place to point to the new URLs
using the MUD-URL attribute.</t>
      <t>There is therefore no significant flag day: MUD controllers may implement the new policy without significant concern about backwards compatibility.</t>
      <section anchor="updating-files-vs-updating-mud-urls">
        <name>Updating files vs Updating MUD URLs</name>
        <t>Device developers need to consider whether to make a change by updating a MUD file, or updating the MUD URL.</t>
        <t>MUD URLs can only be updated by shipping a new firmware.
It is reasonable to update the MUD URL whenever a new firmware release causes new connectivity to be required.
The updated mechanism defined in this document makes this a secure operation, and there is no practical limitation on the number of files that a web server can hold.</t>
        <t>In place updates to a MUD file should be restricted to cases where it turns out that the description was inaccurate: a missing connection, an inadvertent one authorized, or just incorrect information.</t>
        <t>Developers should be aware that many enterprise websites use outsourced content distribution networks, and MUD controllers are likely to cache files for some time.
Changes to MUD files will take some time to propagate through the various caches.
An updated MUD URL will however, not experience any cache issues, but can not be deployed with a firmware update.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3986" target="https://www.rfc-editor.org/info/rfc3986" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3986.xml">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC8520" target="https://www.rfc-editor.org/info/rfc8520" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8520.xml">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8520"/>
          <seriesInfo name="DOI" value="10.17487/RFC8520"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-opsawg-mud-tls" target="https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-mud-tls-18" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-opsawg-mud-tls.xml">
          <front>
            <title>Manufacturer Usage Description (MUD) (D)TLS Profiles for IoT Devices</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Blake Anderson" initials="B." surname="Anderson">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date day="23" month="August" year="2024"/>
            <abstract>
              <t>This memo extends the Manufacturer Usage Description (MUD) specification to allow manufacturers to define (D)TLS profile parameters. This allows a network security service to identify unexpected (D)TLS usage, which can indicate the presence of unauthorized software, malware, or security policy-violating traffic on an endpoint.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-mud-tls-18"/>
        </reference>
        <reference anchor="RFC9238" target="https://www.rfc-editor.org/info/rfc9238" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9238.xml">
          <front>
            <title>Loading Manufacturer Usage Description (MUD) URLs from QR Codes</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="J. Latour" initials="J." surname="Latour"/>
            <author fullname="H. Habibi Gharakheili" initials="H." surname="Habibi Gharakheili"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This informational document details a protocol to load Manufacturer Usage Description (MUD) definitions from RFC 8520 for devices that do not have them integrated.</t>
              <t>This document is published to inform the Internet community of this mechanism to allow interoperability and to serve as a basis of other standards work if there is interest.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9238"/>
          <seriesInfo name="DOI" value="10.17487/RFC9238"/>
        </reference>
        <reference anchor="RFC7232" target="https://www.rfc-editor.org/info/rfc7232" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7232.xml">
          <front>
            <title>Hypertext Transfer Protocol (HTTP/1.1): Conditional Requests</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application- level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP/1.1 conditional requests, including metadata header fields for indicating state changes, request header fields for making preconditions on such state, and rules for constructing the responses to a conditional request when one or more preconditions evaluate to false.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7232"/>
          <seriesInfo name="DOI" value="10.17487/RFC7232"/>
        </reference>
        <reference anchor="RFC7234" target="https://www.rfc-editor.org/info/rfc7234" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7234.xml">
          <front>
            <title>Hypertext Transfer Protocol (HTTP/1.1): Caching</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless \%application- level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7234"/>
          <seriesInfo name="DOI" value="10.17487/RFC7234"/>
        </reference>
        <reference anchor="IEEE_802.1AR-2018">
          <front>
            <title>IEEE Standard for Local and Metropolitan Area Networks - Secure Device Identity</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date year="2018" month="August"/>
          </front>
          <seriesInfo name="IEEE" value="802.1AR-2018"/>
          <seriesInfo name="DOI" value="10.1109/IEEESTD.2018.8423794"/>
        </reference>
        <reference anchor="boycrieswolf" target="https://fablesofaesop.com/the-boy-who-cried-wolf.html">
          <front>
            <title>The Boy Who Cried Wolf</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="January" day="18"/>
          </front>
        </reference>
        <reference anchor="boywolfinfosec" target="https://www.infosecurity-magazine.com/opinions/security-alerts-boy-cried-wolf/">
          <front>
            <title>Security Alerts - A Case of the Boy Who Cried Wolf?</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="January" day="18"/>
          </front>
        </reference>
        <reference anchor="falsemalware" target="https://www.scmagazine.com/home/security-news/false-malware-alerts-cost-organizations-1-27m-annually-report-says/">
          <front>
            <title>False malware alerts cost organizations $1.27M annually, report says</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="January" day="18"/>
          </front>
        </reference>
        <reference anchor="I-D.jimenez-t2trg-mud-coap" target="https://datatracker.ietf.org/doc/html/draft-jimenez-t2trg-mud-coap-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.jimenez-t2trg-mud-coap.xml">
          <front>
            <title>Using MUD on CoAP environments</title>
            <author fullname="Jaime Jimenez" initials="J." surname="Jimenez">
              <organization>Ericsson</organization>
            </author>
            <date day="9" month="March" year="2020"/>
            <abstract>
              <t>This document provides some guidelines on how to add Manufacturer Usage Descriptions (MUD) to CoAP environments.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-jimenez-t2trg-mud-coap-00"/>
        </reference>
        <reference anchor="RFC9111" target="https://www.rfc-editor.org/info/rfc9111" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9111.xml">
          <front>
            <title>HTTP Caching</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.</t>
              <t>This document obsoletes RFC 7234.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="98"/>
          <seriesInfo name="RFC" value="9111"/>
          <seriesInfo name="DOI" value="10.17487/RFC9111"/>
        </reference>
      </references>
    </references>
    <?line 446?>

<section anchor="appendices">
      <name>Appendices</name>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="J." surname="Yang" fullname="Jie Yang">
        <organization/>
        <address>
          <email>jay.yang@huawei.com</email>
        </address>
      </contact>
      <contact initials="T." surname="Tang" fullname="Tianqing Tang">
        <organization/>
        <address>
          <email>tangtianqing@huawei.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8187XYbR5Ll/3qKGnnPMdkLgCIlt2XunHHTEj3mjGRpRGp8
ev64E4UEkFahCl1ZRQrNo3fZZ9kn27gRkR8FQO3ZnT/TfboFAlVZmZHxceNG
ZE2n06J3fW0vy6uhX7ed+5tdlMN2YXpb9m355sOr8sP7174w83ln7y/LzbCY
mqqy297MazsdutoXi7ZqzIaGWHRm2U+d7ZdT1/bt1k+PXD59el4Ubttdln03
+P7i6dPvnl4UprPmsny7tZ3pXdv44mF1Wd68vXv77rb8pe0+umZV/nPXDtvi
4wP90PS2a2w/fYUnFjJff1m++ObiaVGZ/rL0/aIotu6ypP98VVamKQdvS9N1
ZleeuGVp6rrcWX9atl25Nn5drm1ni5LWXF3iB/ro267v7NJf8hALuzRD3XtI
RX/fbeRn/FkYFt9lMS1dQ9+9mZXvXbU23cK3DV0sAnqDr2w9/qntaKm3plnY
ekPzvG2X/QOJg5eN59iNcTVJvur+J0T7Jx8unVUmPO6XWfnOpOf8Yp3+zYP/
NJgH+ubOVuumrduVs9m4D66undnMtqahi/605mtnVbsJY1/PytfWdHHw65o2
N3zF4790vmrL253v7SYbuaZL/lThNx6uqNqm79x86CGnspzqeP/ibPln06wK
7JXe+pvZzXb0XT6d7JY7Z5q/QiXu9u7r6e9efxzd27TdhjTr3uLJ7398+ey7
F3/Uj1CaS1LJZplfczN9NWNNJjU2DyvW5L72es93F89e6MdvL55dpI/P+d7r
6+tfXzy9mJ1fvZ9ePD3nS0m3xNC+xs/lLU11QTpQ0lPL121l6pK+KN/Yvmu3
be3o5/KKjKL82fYP0IRyyoPc2mog5Xhl711ly5uFbWjY3df8W9BBfJ7K1uBZ
/Dcs5LLEZKZPX/A33nakCFi23CHzJiPKJq4/vHp7c1meP52dnz/97gxX3d69
muH32YvnF8++/e45Xzd0ZG/rvt/6y7MzZ639tK3bzs7wcUazOSNHMWxowmfp
rnm7qzCNh7ZejqT05G5tyx/aXfnLui1f0iULMoh6+USuMd3KkpU/CU9bwr34
dmno/7bY8bN+bac0+PRh3U7xhMUUj5it+039ZCSQi6fkkaa8VLoeF0Ek3lbj
6bDcSdLlVW07cgPT8qp8acintMuyPzrV778w14eHh5k+gkecbszK/M01lufd
bl0DB3gWfzb8QF5MWsjZFxexNLUna6jhQ8ZL+BG/lPpTKcOWVet7qIpp3N/E
9Zb/43x28e0bUsdmIDe5m5Sd3ZIvLL3Z+fGa8iX5arSOdbuxaQ2NffBnPLOp
Pj8sC8+fjp4/PZ9efLuZhsdP5elTPP3s+KKL6XRamrnvO1P1RXG3dr4MulZu
u/beLawvTflAzh/mRqaldl++Mc2wpLvIprrygzcrmJYnOW8xl+KEAuApfD9t
igiH3P/CVjUk+LA2fcmijBEOoqpNZfnJIXjKM+k2mOysKOjZ169u7t6+n27J
RZJIOrtpyeuQHuUTp89zCycH8yedapvSZDJfuX49zFnWFBrOyCcfi7Yim41b
LGpbFF8hcnbtYqh4dcXjo8rh8+dcTl59E4MBCI0XDanMbbluH3DJ1lZu6apy
O3RbUuVCVkfa9ZGGGMQuQpgmqfh26CoMTj7OeN9WjjZxUfphtbIenxpxc7Tk
tbl3bTcr4ADCX57lHOawoMBEc4B8l67GlHgI+tKRRm+yLf3aw83dWx1OJ5kt
VfcIK4QV408OU21N6jmhLaZIzfChJhcNTIQtCg8usJqFpUVuSO15gM7+dXBd
th6jsIp1OziLqAo3DcGMjaUneOsnpZ2tZhO+Yum6DZupYBv5cl9GfjwerXxX
ErBoVnbCU5OfojZDQPiKprNyDQWcKEBggLJpaZF0L+nqdlvvSGItTa6+10WT
0EipNjwT6Dz9j2ZD0tpsaGjSEq/SwiPyPQjoi5b7lqTk2IZkmmJC9I3OLExo
UrqZJUkEIJr9hEvZxLA5trG0t/x7kEkQSRSgPMnPSNllOLISDORJ5xcETgZP
oqdbOmtLX9nGdK4Vk+XLYYCj5wfBVm1Har1tmwUu2bY9IjEJ1Xk/4HGscC2E
tb9kCCkthyVLpuFJaea6f/lDSTtHc4dVY+pqC14nw7sQrIxkEJ1PmK/uX/iC
oAXZCu2RPNYa7Nxuy3Yrw7B8D4XA8zlwsfABGLq0DS0Ag24sluL8BiPCaZAI
OB7Yere/sbBA2tfHRx1pEW/+/FkkqRpHEaQViyEnMmy24pOxoi1pGmzPO8oE
RJ+yKdIgv6wh7iB3z8bimqoeFrTvbtUYKCvZYO4TFy1d2BDa3cAh9lAmW31U
aZAp0LeFmIOT60xZAfUGp0mupLFVz+sUoKbbjwfaxVix1AWpLZMns4RX9iRd
uw1cnPzIEnX9oGGb1pwMMNcveVhwCaY/4umQA5EJ0X7Td0u3GuDCaHjEajJs
Xjbflkmq6OxvtDhIQyRKUMvnV9C0WSj3pnaQ3mwccKJwJZbsWEnG0/IlBQeK
Zc7zqlwnOWNwF7mX8V/zkzGbj3Z3WSQvRVftyD69dwjQ5NEGkdeyazc8BBlt
WHXy0vwc0mRy3rRUVjna+AV+I5feIlGo9m4j08Tj22beIng2q0nBgf+Ox6IL
fnQdffhAQjq5e/vjh9PMRnhfJHb7KGjaF7pryXexA/0JZrRmf+nY2ag4Mjkh
DopY3Qa4yZDWwJmNzGFSOL7LD0uK4Q6axRPgZXpajYdY2273dx80A6C44+CH
rHInLo+kD8Sy8OWTNx9u755M5N/y57f8+f31v324eX/9Cp9vf7p6/Tp+KPSK
25/efnj9Kn1Kd758++bN9c+v5Gb6thx9VTx5c/XnJ2yU5ZO37+5u3v589frJ
gSuQyNWSttNPFLrJcQA8GF+M4MUPL9/9n/99/pzcwT+Qyl6cn39HKit/vDj/
9jn9AfcoT2ubeqd/0tbtCoqfcAIAKRRXK7OlbK4m10I25knJGyYbZsU/fl8D
Nkz/+P0/FRDle+cJL1Bg3nnHPvxoAPIxApaPX+1FNMW+3jK+K5GAGdccRrcH
No7j8S2MTun6UC9o9gBzAchrdFONCs4KU7oHUljMvjCBh/XxyIaN2LYO+kfO
hgDOQ/RaUX1nEM5X5dWCAy1J08wd5ccgMYofaR6ZC5R1YZT8Mokci4W4tBwc
TMZLZxhEeM64WvHWA9uk98lvyhQVWyja87psCSksCb6Owku7YZdAhjz0q5YX
IDFBkgk2ujULmvTRRApuVrxSyfIlBG2suOdhu+pMtpLRdHj+QOABgMcrrHjk
Y8PCVfz+0FiaXA7h7i+BBRwnPynnQ5/FIo1o0d9jcifH5HE6gaQOblR/Roa6
NRqXFHnh48lI0vlowNfss6Lz58m29YIcK+FGzwvYx4u8yvuhJu+bNIhvfGDl
oplQ0ubI4pnfcJL3LQab5xCsTjThe0R9wEPTUbwYKG3kKMJPFc2asQ7bT2az
Be4lBCXzS/iVtUO3qqxIAAI0fco1TmgE5SfzC06D8t47U/a2RiZGRsm5/MUz
iPqnu7t38asXTyVJyuZPoLbq7SLfDD/w5gC29zo36xjliiLpM+FRe7g/3lKd
x4PBpClNdzJqO9IkjscmByXwq7SJFDCXg9BjjbULJqhZVf2+PeuEyNZHguKr
YGmUCjpkDjSv9gH74noNBe3WNjwwu7ZNS2OtLFSgjvt0pzaR3AU/TJNJvo+F
I9cHI2BItZk7jP5AguL5PljzMflU1UDa98wxOc6amXHmZJcGoSdtHCQb00fB
tBGBkvKYbiVRLqh65h0MhhIIzsJMjkdZiwU/lmMPZTOSWIDiis5P5R4yluDs
EFwfSNYby7uNfM8pz0BjU1TzwT50/yxBwuCzoTZI3Wg3FIDCEqAfOwvfT67/
PfiR/6Tzt5+c7/ev5U0KUd+EVEjIiIgGyENik9rlEosQToahgB/mnkwNUv2S
1zgWSOYheWdNp1STte7QecJNuHbwwBCMWXEZo6sbhS7YhEn0yeOnkNrN3UJZ
hDT0JHOjIy0g4dBd5LroQmGz2llx5UOolhVLvijTCsF8kqwOwYCzHckO2opU
iuL1xi7A6nB6R06FEj04Sg34eTQ5ujTMUn1MEN/WduDkMcTQPBAUoNmN1hhy
271kJtzPFGOagJAnpKlMGahKpxhDtiUkAt1AiH4tVzXq13gSGiE13DM0Aokk
xCZFGYfqQdLJ8sQT7Hp8zEnuz58pypFgGMxwJCMXsw+v5HGUAZAfCk9zzMzZ
jveErwOeDKgW/ha5MWfRYx7782cR1ONjTg1zYk22dYukiZIA5AlKlTAoI9/f
Vi0IxMfHL9RCCAMrfyeU2B5NKuqOyOaamFfdvb6NYyvUItd6y34TP7BiQ79o
+8jYdoloVFePAWo370wXcmngzbUjyK20YPCOL9NqcGO46USSfvY3A1LXTygD
MnUmUPeoQAqlUISdksjLXmb8kLCCUSqRuwZda7gNFlm7j7CZRsMoafwD6kK0
9+XcVB/5DzhFkuGcrZ6CCPNKRfBGsr8xLdByaKjfStLAfg4ectkqijGLe0QT
UYM3Lamu7NKI+ooFYI01nEz7DfKaHlFMdjr5JPj+ObBekzN1ktCqVWR5lpmT
j51k6EjzKMEWG1lDd8z7s40Xqn5izXtbETIMLJxmQhkpWOCrElWC3q6kErBo
xT1IziLcFOAmh6nkXwBaxOVniWSR0chZIg+POh6R8+QPR3g0n2dwzOsVRfwJ
koQMAi5qhs3cdome85dF8YfyhgD9zavy+hMFbNYF+u7VTy8J1UkB4w/l69ev
3pHV/Dt9ZPYFpUtYbuL4aab0sCbfbnnov72v2kXkMvVRaanZ+jmVUy7XEPrr
2FV3u23fksvckp2ilAOi0YxYG6Y0wOEG5LFwYCQAZBmH5QQPRJvxhjodAOkY
N4I/MDW51cVO/MG8/aQrYMFgT1kmcSFiHMxECVPG0I1zmrAUmnjO21/t8/Ps
P/Qjc9qR1aTIunF9Dzu7jWwLh3qYENfRQJZqUU4gJXtyxK+50ILKHI/yZhV2
HJwXKBuWbZFDLYbLaGKSyAS2huLqGeGA6iNJVX2HB/mru8Q5WrNQYl3j6l6p
QRlIwfjZLkrkQgHBidhMuR7Q1sDoPeVOsiSYWFxSO+8zAOJATpNfR9nCBx9J
AY+JKArk/Vr+HFknYkazQGFkS57TgG2YFSc3fUAsk4BDN+7TsGVkXZu5rTnk
W0I8XqCzsvtVr8sVjehjGJYlVW0Lmk+8JkfkKEzKbtlSK8orDum32als17Eq
CVNGDC3Jykc6Cl8p3jHdFxxKUMwfUs5B7oC2UGBL5npGGQbBk40IVzis/u8Y
ScHoMVdh2sqdsPrqJgM65RLBD1biKW8MJ18N4yOCOUKT8aYEVR+rBRRHTeIf
cvqflN2tZC2ZZMTsFTTYph1Wa6lYErLSlCvVr0Q8NMsixUVl49XIx/4pUdYT
9F7wXp8/m12QC43sllY3yABAY0MCPyIW3kYmHBCORBApyEiFMGSyeWl6H8vy
QkKF8WHdhqwNcx4nHXJ7xjTENDFn3Ql63jOh4UJduubmE/ScVLv9ekNie0mn
G83+92+IxZksRknhK1S2NNOpQr5JehFzTUlFrJQmCsEXeIprFgOoAnrUPWB8
xbtJxiEonhTdD6hTQmfg57sOqoNZe+bbGCGtLdkIXB1HD72BvFPXbjvkKoHh
FxD0Gj7MRI5yZJ6xrCGmK6Q8Ul6g8vBb8EJxTyj8hwTwyNZMUXArSAasOS6p
4H4ZGt85bfUJzwjVDuXdOHmg51UAOgtVONdPvnzt1lEmFbIL2U2yKhNpyZT1
ZkUzVAHm+xbjzSbWtwLUCsk2lzRigApllUXomWgqm+XSvg91D8bjEf2IVgjs
mWXyT4KPqqVoSeo60I6snpXVdHJcniT9O2N/sZAzSdQOIplykToVfiw9XgFL
BWVGfsEFsR+MZ9qpbaKXEvbINFkbZh75H8JsuKxWusjyFokYMP7v7JDsbipA
xkSffu+CB8hQHnxPj6iX97Yod48dpq2JiCQ8qzgIbQoWxdBetrTvXcNBDYZM
d0zDxocHB78PIM2chcmK7FK/vtxDkxoJUMuUop+0ujBhUTCDavYSVW0Hit4K
lwdu3Kt0KGTVdmVTDaAIaI2wr7D/Gs3rjIP0brONAW20geTwuljuF6zeSbBV
nrIAph3PSYFFn6gNtavjHgPIiNVjUngHEzteEh5pxzjsnUgrSr4uBtM/kJdd
/IzrKZPsgDBMD8qPAuHGR4ItXfULMFyzKt6Yiv61MaXSPJTQ70jMi5WN3JoI
QDzlqVa2pBOSVodOldL4vQyB8VMJzqmWQiRXyFdShwvaQEC83Vuvj5tG13Ir
RNAFtmvDaQnNmRSfRtUcfjxAJIPnFDBZrABhtBlVHyFdVqAG9uSgkLkD+mrZ
GYp5Aw9anrz715vgWuKqRvr+8krmc4ROI8/tWcN5JnMr6TSBHyW2DlRGccVW
HeN1s5hei8M4ub4+zefJJC+uocePvdk7J2nk7wwAA7SogpgV8FMfVWycxwuf
IiZJgVJAuBZV/GGEZner+UdInHaV8ONiDVn0zGaXTwzuYJS2luvdiuAu1N14
wtR7ixxLQCgvmdr19eiXmMXJKgKDKoKIcsiXmxqXDqpYoPnuufEmRO2IhaVQ
xTtJWc3HL0zFQB6DjVnkAUkl/GasS4YHvb15JQw//xJKnYF77rlrEV6CsANa
Q67qHk5gVvw4sEIzcpN7V608FKjYdYKrv9xWJN4USqrdG0ypvNNmoSxYHeWu
ysevDvuKxGcfPoukw002ozRe0oSQU9ETJfayxqX0ayJ34tFZJhS84r0B4syL
B6G34gTxgKax0CuFNzqVNCpDJCm+B55D0ofFqMF0nzhqAvA4ibdlC+FKlz6Q
21XAEBzBOeyERsEqYOxM+2YlbyDPdhKWB2coCGhyWCAB4aAw5EnXtv2TTAeL
q4xWJO3iVAsUeL2cUvhgd+yki3HKRF8vpwtUrbmtIFK3KfgJcSHtnNxUm2iD
r8lB2jk6yGaptKbim3yZPZLUmUKeh94wGZZ1SUrvECkEgDxsfmf7cYet6B4X
KpP1Lm0PTrxh1NbZmLEeKp0UHUnLH78HUf8b5SSN/du0v+g7oeqr1mxDH12U
FvfkaAGHUVx5NWfrAoS9uSylcqEnJcAXau77fPZMR8Ioy3Zoco57byNcUP5s
n0k924azuQCIxs0k2Txvb/7556u7D++v8yH3sl7tEWIvxdkWKjC0glB7ObaC
i9OE10/WjjBMVzFFeVrOUe/E7ZG0UVWrrMaWoyvlWizF2W0WG2ICkYqDFK8M
Gmx10gPXVi3BCXaX/2p3cp6DUsGuPLml6K8dR99cvMjoB1rA7JwZCHUkL5N3
L65iinfy8upU2I58VqNwFa6dleUvgSiR2UpSTePr3Ao4cu60PCPB3I78u8/r
WSxTxDTJNk4j6MkeXIBfD6qRp6xjKXGQtJbr+YzWYx+aZu15LSdVUQtJbMFX
+NNRPqoEDVvZPna5y7KvEMeDYo5gBo0jnQG9EF601qlmVrrUIhtYur72BO+T
dgGkUkLgOs2Mbrm08vJoKaOAohzm5EdDk1tyeYB5Ns58Is4PUQeZ5xSarvNT
nU74RBOmBH2X3DQOFiOMPCbP4Kz+OjiaAK4mhFUG/McPDnkwSZ67D/CdKlIJ
NToNMzmMBEHzv5ldQCdzq9YaoiR83EYvIM7UYFoi7RlWmw32bPZsf7AxoweX
FBePZcfIrXWlVMk6VkJnzlNL56b8dWv69a9cyCPFRG0RW+ZlTKOHsehz8au3
K0CSX+k7Pg4pwvU1TimePDl7cgrjxEkX22VdKVpsyBQhO5XillJR0yAadSE9
VR/qwyEKzHZCK8IQIkPN7mkaWBdfHTjXKKWZNGUEvJbampSlGPn+qU75LzjR
cnl2phfL6SFLFnjGMfSMdeA3At9/4VymGBEOFEixL+zOf2+gvyTuJMkmxs/i
926Hg0GJ7UImI6cZIqus8QQFZDbhkMU4jep77EDowujY3STqRhCA8XlXiGTy
WVOdpmrpwEba9cKgGSN5NC5XIMNDKRnxiv4JFI9brUOTUeqollmO06iOU+IF
EsrGZJ0r0jFTgMIJmf+GVNp8tP+LVVqbGrgxbYYcNXpitESZXuNN5vN9CI0f
rd0CU9Gk1eZqx1WeQjUn0THqqWgb4buXAxBnZykwU6KoNVyXFQn5xEjsW8hK
lyT1IpO6cNScPe+H70DBD2hO6GMWdUTQo6WFKmOqtIVzUbyBtFrXhBk/BPhZ
6Lq1KCzJU0fuCRoHyc8BwQKZPjRaKQv7MR9I5A3XvV1vg5rSCo12IZKlusRI
hyew+E04VpJPQcLUD271xSD1FljJjFuVIB1lrCahX3CO9detIAfEjtC5FWFu
ER0VBybNTvDlOEym/O+gtSDsX3EEnIYyIx4XCJJQxhqj1JAUx0SEHvCFAa2M
x7hFOyJDEQCpMfkuORvCa4tL1sGQ9AjTCqOclFIMiTE/NHYwdg8Du/tIEavI
xbE2RVzdTNmzboBPbvisrNgUsqDsXFp+FkWZy5YPWKHOMY9UdSEPs4vE1WUH
OLWhxHYrZDxXlRzKiQd1COWGjROkL4XNI9DLHACvzjKFgADF04xcGW/OTlJf
PWZl53r0j48H8sFx8jW+jdQhu44O8EGPxbFfDuQbX6XFREyGSbxgJNyJIK2Q
ZPpoc0O6HHOXtBbfhgUdLiajhvcYGogpYXrsT0L1cEvSaypgk6X9lUg0Gk9a
xuNX+GIav5jKUz8jux5NKB4AgrTYIrMjb73EVr8fHcmP2DXJ7Sxwq2fhKMJZ
35JQbKexkl2alBFRfceGS+vt0XH3B6Fh24Wtz797/g1+C/H37qCEjqIA80Uj
55N17geFl406PEU0Ih+DKSWbj1mjIu8+Kk60JFqTAmeh2MhA/vJfWOTPbeAz
YiKDzd8/JsW2AV8aJ6THKHtxFukAAduErgRtGVkt9PrOrCT6jL7l7IRrqi8J
BlgUb7ghZE1JH579+Pg92orOz89TivrN7BkYh5tlah+550IQqgCr2NEfGM1j
iVby3ZoFZp1VsNiHltTcbv0k3xUu3NG3ogqixvu6gFUnaBw37kTdgLijiFwJ
gq8Nbd7/twU8Vex6OjqCzGtjFkyyM1kbrWmvsYgejLo76hi0zGodXD0fXdKG
W4mOvG8AXS2fSDpyj5SrFprHJXZxZABc4cWmuUZaZVhhMqWP/NNI7dkjgeiK
XeCskkCIEDgfNHj29Lw8ecNd1e9o8qbhNpJTukwp4MQg7NnqyMMFByVtif/N
3BgsV8c+wxT+U8PyLoTTWdyKPGjrNoMfI+Hw8fG4K9f2Xu28pO8Wdeo75QG0
kSoczortyamxipYgXdzMF0F7uOOU4Iep5IhTqEjSbsAnTZAiS8uXnADi3X2v
O5kXcsQlQRYNZ/zxTN9+GXPPp+1v+63ySDEUfnnvA+WUOJLBK8ikSJuxZeI6
xtUKknU7S4kr2roCu8FGB9v5UnD+4eo/jtlUUpm5Xbk0v+CE//6kmoNJIRNs
KAXIqJdyO8xrV4FcOUFuQXp5Wf5YD8vl7vTYlMRVfiFgasUR34FeqXCoNLVD
CKIEXxgQ9Pi3yWFU5b4Bv1ftZIoxvMvJ1FOaOslv+k8y6/gGA9Fj+TIXUywl
K+pOAhrXVGUD2WvJIAENoxuo5VegBBWrRtsa2FFn9TCPyxq39Obxocaczdpv
0xGKUOpWpOAM1dqEN1yTtDUS4LIbocM0FRxG3eVHXmsQjiUm1mav1rtt5eRI
CDKJe90/RUHWbJ0cPeNdrrVlwwT4uleOQCJllNeWdhV5tYQeNlSXcEwj1TFI
uEmWq000micv4/lAgBVaewAcF0Lm6fuYSAZKTQWqFu23PZ/ZlmFxXBvHbeWw
8y5Q/Sw3eWFAmkIcI0yGZGa4UBCAvlAptEoRpLY98hQj/D/s6+Pam80aKuO2
ZFoRAu/swN0pCyGvRNiTWvAsHHffmE/TK9oqAWwIJwRqMtl9M7ug/75I8nue
V4uO9AiA4RG10pGNF/e4cCmf5EjCR74+9QcKt39Wclb8O9Ay55O1nrdtynMK
G0PHaIJlpV9uaELr7PRaxnlq320nlXYOizX5BLYUfST/Vp6EsXU4OMl9UK0a
idOEDG3Q1EL7/xs6rruwAsI7fMKXrd11rENglmYHw725+vO4QQWbc3J7enY+
O8+ONSlwYvqKk87s5TmpwSpn4/iAdPmuc/em2gGee+nL4eMAcRslk+Ej3ZLP
xI5cbjyRd5/hHSJaTmQnjowkdHVCmui9yI8/CyOqV7AbGXwqd+GRfCZaqlqh
vfYjbY2MjCHjIFkn/17PamznD9Ux7V/d6pIraSeTDY/UnlohDgz5NrlCNomw
S/J1FPeIA9G3Vyzc/VCvNAmr6SpuhZeyg1pJ5jdiKnNo7gfWPTqfkx323NAH
t60V5Bs9Kzi3/YO1x7oW4zGVvV44i54VEA984sfwRiM+Yp6y1+K3uH4dnqU8
xjU22i1ZWrfKheJs8lw5FY1ufWeW8XAWs9wj2CNFfnTsGES8cA4t7eyqFV/M
zblylke3jU+DfeIefxyV4MB5c/Xz1RH9zntG5P1TTZvtcMv38QDxJW77g5Dx
tNGkU3F+RI6lQ6/l+GUaI3pZTtnSnvaxdKOkuqqncdlxD3lhB2IBXKoencZe
71omgVVnadZdXvQLZ0QD1MoPj2g+eVkU57PQFR3eepaV53KqD90pLrweZWPl
IK12RoR3eBUXM1riFpVd7VY9UMPsHHh8T07+Zp22K57N+Akor61sf7S4Ghvb
Tc3AsE8mWTyf4a107SAtjXxQSypf4IXz7pTJ4cstRshGCQPczv2tns9O6Ruq
9OU9tBs4iox3z5w8O9VehlpaxMVVMH1rtYU5mbKg6qPnCeTQWSwqUnDi/WaH
wtSi9hZqFNcAL97veNv1mDKx6EBqTHboVdTLb1spM4btQMNCkML/s75H0C1l
Du3wTeWo9EaPbu56PnU5ensJMzTPBVTjTnZA+Xsr0tXRbR9kekEs2li8yI7Z
hBjyZtShKW8B4TOPYnFOwqBRYo3mUJudIojRfCWyJ0bZTwpWIS6LDY0jTxNb
9/QAMShqvOlF8uG2252hotpwN9yII05YPkAjlsY+eMje4pWfqDhsf+WVNUFD
9wh+16WFHQLK1D2tr7wymr3ntwVMCiNJc2ePga0kF1G3O0kddelSYYadTYOQ
4mhZEldlHe97pZH9997kL40JZsxs0OAziz/o0LkL/eR9dg52dN53WRNiX5jd
5YH8GcaE4Jl8h7RFhlLc6OiwYBJNl8JBXh9P8uIc605KJfFoqCzz3qdv0vFb
feHrAgCk3WJKwbYD/E3NvSGchBxtvkvuMPFhjKuPv95tfAqVFTJ7mwG6EXDg
OtGr6WC/tKpKs2woHx952Vt8dd/4fn1ngA1H6/OXzdzz2QVtGZIXn2i2pdPK
q4DL0UHCPXTA32l9mt/8ITAg600XgpqMDeALRUBu7FRLEv1PR50yR2XyshNE
B/pP2rMPjmZnxGT+Io7R21G4nUXCsZNyuxwtzN5ekN7uKMgj1P8vpRjvxy/F
mUieRm4Q51qbnqm+/M09pBK/yRvWwgnILDeYsRoG/cveW5Sat7kNx8p7tZy3
oZ9S0fjQSyqziO3ClISLgXIaoa86lp04cIHprDzLpkqUdE4+jw7+5xkxn7f9
aNOV+p6DrVmJenZycnAtvbo4EcMPIU951UQtixrM3H3gQPlk66ct2mm4+s29
SJigvNAhhTotCYubjHWYfdYfGR3e2wq3Adx6tQXwAj4oiv8L0Ktkx7NdAAA=

-->

</rfc>
