<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.1) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-mls-pq-ciphersuites-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="MLS Cipher Suites with ML-KEM">ML-KEM and Hybrid Cipher Suites for Messaging Layer Security</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-mls-pq-ciphersuites-00"/>
    <author initials="R." surname="Mahy" fullname="Rohan Mahy">
      <organization/>
      <address>
        <email>rohan.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="R. L." surname="Barnes" fullname="Richard L. Barnes">
      <organization>Cisco</organization>
      <address>
        <email>rlb@ipv.sx</email>
      </address>
    </author>
    <date year="2025" month="July" day="24"/>
    <area>sec</area>
    <workgroup>MLS</workgroup>
    <keyword>ML-KEM</keyword>
    <keyword>Kyber</keyword>
    <keyword>post-quantum</keyword>
    <keyword>post quantum KEM</keyword>
    <keyword>KEM</keyword>
    <keyword>PQ/T</keyword>
    <keyword>hybrid</keyword>
    <keyword>hybrid KEM</keyword>
    <keyword>Key Exchange Mechanism</keyword>
    <abstract>
      <?line 52?>

<t>This document registers new cipher suites for Messaging Layer Security (MLS) based on "post-quantum" algorithms, which are intended to be resilient to attack by quantum computers.
These cipher suites are constructed using the new Module-Lattice Key Encapsulation Mechanism (ML-KEM), optionally in combination with traditional elliptic curve KEMs, together with appropriate authenticated encryption, hash, and signature algorithms.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://mlswg.github.io/mls-pq-ciphersuites/#go.draft-ietf-mls-pq-ciphersuites.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-mls-pq-ciphersuites/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        MLS Working Group mailing list (<eref target="mailto:mls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/mls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/mls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mlswg/mls-pq-ciphersuites/"/>.</t>
    </note>
  </front>
  <middle>
    <?line 57?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The potential availability of a cryptographically-relevant quantum computer has caused concern that well-funded adversaries could overturn long-held assumptions about the security assurances of classical Key Exchange Mechanisms (KEMs) and classical cryptographic signatures, which are fundamental to modern security protocols, including the MLS protocol <xref target="RFC9420"/>.</t>
      <t>Of particular concern are "harvest now, decrypt later" attacks, by which an attacker could collect encrypted traffic now, before a quantum computer exists, and later use a quantum computer to break the confidentiality protections on the collected traffic.</t>
      <t>In response to these concerns, the cryptographic community has defined "post-quantum" algorithms, which are designed to be resilient to attacks by quantum computers.
Symmetric algorithms can be made post-quantum secure simply by using longer keys and hashes.
For asymmetric operations such as KEMs and signatures, entirely new algorithms are needed.</t>
      <t>In this document, we define ciphersuites that use the post-quantum secure Module-Lattice-Based KEM (ML-KEM) <xref target="MLKEM"/> together with appropriate symmetric algorithms, and either traditional or Module-Lattice-Based Digital Signature Algorithm (ML-DSA) <xref target="MLDSA"/> post-quantum signature algorithms.
The traditional signature cipher suites address the risk of "harvest now, decrypt later" attacks, while not taking on the additional cost of post-quantum signatures.
The cipher suites with post-quantum signatures use only post-quantum KEMs.</t>
      <t>Following the pattern of base MLS, we define several variations, to allow for users that prefer to only use NIST-approved cryptography, users that prefer a higher security level, and users that prefer a PQ/traditional hybrid KEM over pure ML-KEM:</t>
      <ul spacing="normal">
        <li>
          <t>ML-KEM-768 + X25519 (128-bit security, Non-NIST, PQ/T hybrid)</t>
        </li>
        <li>
          <t>ML-KEM-768 + P-256 (128-bit security, NIST, PQ/T hybrid)</t>
        </li>
        <li>
          <t>ML-KEM-1024 + P-384 (192-bit security, NIST, PQ/T hybrid)</t>
        </li>
        <li>
          <t>ML-KEM-768 (128-bit security, NIST, pure PQ KEM)</t>
        </li>
        <li>
          <t>ML-KEM-1024 (192-bit security, NIST, pure PQ KEM)</t>
        </li>
        <li>
          <t>ML-KEM-768 (192-bit security, NIST, pure PQ)</t>
        </li>
        <li>
          <t>ML-KEM-1024 (256-bit security, NIST, pure PQ)</t>
        </li>
      </ul>
      <t>For all the cipher suites defined in this document, we use AES256 GCM <xref target="GCM"/> as the Authenticated Encryption with Authenticated Data (AEAD) <xref target="RFC5116"/> algorithm;
HMAC <xref target="RFC2104"/> with SHA-384 <xref target="SHS"/> as the hash function;
and SHAKE256 (Section 3.2 of <xref target="FIPS202"/>) as the Key Derivation Function (KDF).</t>
      <t>For the PQ/T hybrid KEMs and the pure ML-KEM HPKE integration, we use the KEMs defined in <xref target="I-D.ietf-hpke-pq"/>.
The signature schemes for ML-DSA-65 and ML-DSA-87 <xref target="MLDSA"/> are defined in <xref target="I-D.ietf-tls-mldsa"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="mls-cipher-suites">
        <name>MLS Cipher Suites</name>
        <t>This document requests that IANA add the following entries to the "MLS Cipher Suites" registry, replacing "XXXX" with the RFC number assigned to this document:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Name</th>
              <th align="left">Rec</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD1</td>
              <td align="left">MLS_128_QSF-X25519-MLKEM768_AES256GCM_SHA384_Ed25519</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">MLS_128_QSF-P256-MLKEM768_AES256GCM_SHA384_P256</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD3</td>
              <td align="left">MLS_192_QSF-P384-MLKEM1024_AES256GCM_SHA384_P384</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD4</td>
              <td align="left">MLS_128_ML-KEM-768_AES256GCM_SHA384_P256</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD5</td>
              <td align="left">MLS_192_ML-KEM-1024_AES256GCM_SHA384_P384</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD6</td>
              <td align="left">MLS_192_ML-KEM-768_AES256GCM_SHA384_MLDSA65</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD7</td>
              <td align="left">MLS_256_ML-KEM-1024_AES256GCM_SHA512_MLDSA87</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
          </tbody>
        </table>
        <t>The mapping of cipher suites to HPKE primitives <xref target="I-D.ietf-hpke-hpke"/>, HMAC hash functions, and TLS signature schemes <xref target="RFC8446"/> is as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">KEM</th>
              <th align="left">KDF</th>
              <th align="left">AEAD</th>
              <th align="left">Hash</th>
              <th align="left">Signature</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0xTBD1</td>
              <td align="left">0x647a</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ed25519</td>
            </tr>
            <tr>
              <td align="left">0xTBD2</td>
              <td align="left">0x0050</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ecdsa_secp256r1_sha256</td>
            </tr>
            <tr>
              <td align="left">0xTBD3</td>
              <td align="left">0x0051</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ecdsa_secp384r1_sha384</td>
            </tr>
            <tr>
              <td align="left">0xTBD4</td>
              <td align="left">0x0041</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ecdsa_secp256r1_sha256</td>
            </tr>
            <tr>
              <td align="left">0xTBD5</td>
              <td align="left">0x0042</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ecdsa_secp384r1_sha384</td>
            </tr>
            <tr>
              <td align="left">0xTBD6</td>
              <td align="left">0x0041</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">mldsa65</td>
            </tr>
            <tr>
              <td align="left">0xTBD7</td>
              <td align="left">0x0042</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">mldsa87</td>
            </tr>
          </tbody>
        </table>
        <t>The hash used for the MLS transcript hash is the one referenced in the cipher suite name. "SHA384" refers to the SHA-384 functions defined in <xref target="SHS"/>.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The first five ciphersuites defined in this document combine a post-quantum (or PQ/T hybrid) KEM with a traditional signature algorithm. As such, they are designed to provide confidentiality against quantum and classical attacks, but provide authenticity against classical attacks only.  Thus, these cipher suites do not provide full post-quantum security, only post-quantum confidentiality.</t>
      <t>The last two cipher suites also use post-quantum signature algorithms.</t>
      <t>For security considerations related to the KEMs used in this document, please see the documents that define those KEMs <xref target="I-D.ietf-hpke-pq"/> and <xref target="I-D.irtf-cfrg-hybrid-kems"/>.
For security considerations related to the post-quantum signature algorithms used in this document, please see <xref target="I-D.ietf-tls-mldsa"/> and <xref target="I-D.ietf-lamps-dilithium-certificates"/>.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="SHS">
          <front>
            <title>Secure hash standard</title>
            <author>
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.180-4"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="MLKEM">
          <front>
            <title>Module-lattice-based key-encapsulation mechanism standard</title>
            <author>
              <organization/>
            </author>
            <date month="August" year="2024"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.203"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="MLDSA">
          <front>
            <title>Module-lattice-based digital signature standard</title>
            <author>
              <organization/>
            </author>
            <date month="August" year="2024"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.204"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="FIPS202">
          <front>
            <title>SHA-3 standard :: permutation-based hash and extendable-output functions</title>
            <author>
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.202"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="GCM">
          <front>
            <title>Recommendation for block cipher modes of operation :: GaloisCounter Mode (GCM) and GMAC</title>
            <author fullname="M J Dworkin" initials="M." surname="Dworkin">
              <organization/>
            </author>
            <date year="2007"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-38d"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="RFC9420" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9420.xml">
          <front>
            <title>The Messaging Layer Security (MLS) Protocol</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="B. Beurdouche" initials="B." surname="Beurdouche"/>
            <author fullname="R. Robert" initials="R." surname="Robert"/>
            <author fullname="J. Millican" initials="J." surname="Millican"/>
            <author fullname="E. Omara" initials="E." surname="Omara"/>
            <author fullname="K. Cohn-Gordon" initials="K." surname="Cohn-Gordon"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>Messaging applications are increasingly making use of end-to-end security mechanisms to ensure that messages are only accessible to the communicating endpoints, and not to any servers involved in delivering messages. Establishing keys to provide such protections is challenging for group chat settings, in which more than two clients need to agree on a key but may not be online at the same time. In this document, we specify a key establishment protocol that provides efficient asynchronous group key establishment with forward secrecy (FS) and post-compromise security (PCS) for groups in size ranging from two to thousands.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9420"/>
          <seriesInfo name="DOI" value="10.17487/RFC9420"/>
        </reference>
        <reference anchor="RFC5116" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5116.xml">
          <front>
            <title>An Interface and Algorithms for Authenticated Encryption</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document defines algorithms for Authenticated Encryption with Associated Data (AEAD), and defines a uniform interface and a registry for such algorithms. The interface and registry can be used as an application-independent set of cryptoalgorithm suites. This approach provides advantages in efficiency and security, and promotes the reuse of crypto implementations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5116"/>
          <seriesInfo name="DOI" value="10.17487/RFC5116"/>
        </reference>
        <reference anchor="RFC2104">
          <front>
            <title>HMAC: Keyed-Hashing for Message Authentication</title>
            <author fullname="H. Krawczyk" initials="H." surname="Krawczyk"/>
            <author fullname="M. Bellare" initials="M." surname="Bellare"/>
            <author fullname="R. Canetti" initials="R." surname="Canetti"/>
            <date month="February" year="1997"/>
            <abstract>
              <t>This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2104"/>
          <seriesInfo name="DOI" value="10.17487/RFC2104"/>
        </reference>
        <reference anchor="I-D.ietf-hpke-pq">
          <front>
            <title>Post-Quantum and Post-Quantum/Traditional Hybrid Algorithms for HPKE</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <date day="30" month="June" year="2025"/>
            <abstract>
              <t>   Updating key exchange and public-key encryption protocols to resist
   attack by quantum computers is a high priority given the possibility
   of "harvest now, decrypt later" attacks.  Hybrid Public Key
   Encryption (HPKE) is a widely-used public key encryption scheme based
   on combining a Key Encapsulation Mechanism (KEM), a Key Derivation
   Function (KDF), and an Authenticated Encryption with Associated Data
   (AEAD) scheme.  In this document, we define KEM algorithms for HPKE
   based on both post-quantum KEMs and hybrid constructions of post-
   quantum KEMs with traditional KEMs, as well as a KDF based on SHA-3
   that is suitable for use with these KEMs.  When used with these
   algorithms, HPKE is resilient with respect to attacks by a quantum
   computer.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-hpke-pq-01"/>
        </reference>
        <reference anchor="I-D.ietf-tls-mldsa">
          <front>
            <title>Use of ML-DSA in TLS 1.3</title>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Sophie Schmieg" initials="S." surname="Schmieg">
              <organization>Google</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="16" month="May" year="2025"/>
            <abstract>
              <t>   This memo specifies how the post-quantum signature scheme ML-DSA
   (FIPS 204) is used for authentication in TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-mldsa-00"/>
        </reference>
        <reference anchor="I-D.ietf-hpke-hpke">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Karthikeyan Bhargavan" initials="K." surname="Bhargavan">
              <organization>Inria</organization>
            </author>
            <author fullname="Benjamin Lipp" initials="B." surname="Lipp">
              <organization>Inria</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Apple</organization>
            </author>
            <date day="24" month="June" year="2025"/>
            <abstract>
              <t>   This document describes a scheme for hybrid public key encryption
   (HPKE).  This scheme provides a variant of public key encryption of
   arbitrary-sized plaintexts for a recipient public key.  It also
   includes a variant that authenticates possession of a pre-shared key.
   HPKE works for any combination of an asymmetric KEM, key derivation
   function (KDF), and authenticated encryption with additional data
   (AEAD) encryption function.  We provide instantiations of the scheme
   using widely used and efficient primitives, such as Elliptic Curve
   Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation
   function (HKDF), and SHA2.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-hpke-hpke-01"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.irtf-cfrg-hybrid-kems">
          <front>
            <title>Hybrid PQ/T Key Encapsulation Mechanisms</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Paul Grubbs" initials="P." surname="Grubbs">
              <organization>University of Michigan</organization>
            </author>
            <date day="20" month="July" year="2025"/>
            <abstract>
              <t>   This document defines generic constructions for hybrid Key
   Encapsulation Mechanisms (KEMs) based on combining a traditional
   cryptographic component and a post-quantum (PQ) KEM.  Hybrid KEMs
   built using these constructions provide strong security properties as
   long as either of the underlying algorithms are secure.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-hybrid-kems-05"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="26" month="June" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-12"/>
        </reference>
      </references>
    </references>
    <?line 130?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This work would not be possible without the hard work of the CFRG Hybrid KEM design team: Aron Wussler, Bas Westerbaan, Deirdre Connolly, Mike Ounsworth, Nick Sullivan, and Stephen Farrell.
Thanks also to Joël Alwen, Marta Mularczyk, and Britta Hale.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
