<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.1) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-mls-pq-ciphersuites-01" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="MLS Cipher Suites with ML-KEM">ML-KEM and Hybrid Cipher Suites for Messaging Layer Security</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-mls-pq-ciphersuites-01"/>
    <author initials="R." surname="Mahy" fullname="Rohan Mahy">
      <organization/>
      <address>
        <email>rohan.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="R. L." surname="Barnes" fullname="Richard L. Barnes">
      <organization>Cisco</organization>
      <address>
        <email>rlb@ipv.sx</email>
      </address>
    </author>
    <date year="2025" month="November" day="04"/>
    <area>sec</area>
    <workgroup>MLS</workgroup>
    <keyword>ML-KEM</keyword>
    <keyword>Kyber</keyword>
    <keyword>post-quantum</keyword>
    <keyword>post quantum KEM</keyword>
    <keyword>KEM</keyword>
    <keyword>PQ/T</keyword>
    <keyword>hybrid</keyword>
    <keyword>hybrid KEM</keyword>
    <keyword>Key Exchange Mechanism</keyword>
    <abstract>
      <?line 52?>

<t>This document registers new cipher suites for Messaging Layer Security (MLS) based on "post-quantum" algorithms, which are intended to be resilient to attack by quantum computers.
These cipher suites are constructed using the new Module-Lattice Key Encapsulation Mechanism (ML-KEM), optionally in combination with traditional elliptic curve KEMs, together with appropriate authenticated encryption, hash, and signature algorithms.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://mlswg.github.io/mls-pq-ciphersuites/#go.draft-ietf-mls-pq-ciphersuites.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-mls-pq-ciphersuites/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        MLS Working Group mailing list (<eref target="mailto:mls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/mls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/mls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mlswg/mls-pq-ciphersuites/"/>.</t>
    </note>
  </front>
  <middle>
    <?line 57?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The potential availability of a cryptographically-relevant quantum computer has caused concern that well-funded adversaries could overturn long-held assumptions about the security assurances of classical Key Exchange Mechanisms (KEMs) and classical cryptographic signatures, which are fundamental to modern security protocols, including the MLS protocol <xref target="RFC9420"/>.</t>
      <t>Of particular concern are "harvest now, decrypt later" attacks, by which an attacker could collect encrypted traffic now, before a quantum computer exists, and later use a quantum computer to break the confidentiality protections on the collected traffic.</t>
      <t>In response to these concerns, the cryptographic community has defined "post-quantum" algorithms, which are designed to be resilient to attacks by quantum computers.
Symmetric algorithms can be made post-quantum secure simply by using longer keys and hashes.
For asymmetric operations such as KEMs and signatures, entirely new algorithms are needed.</t>
      <t>In this document, we define ciphersuites that use the post-quantum secure Module-Lattice-Based KEM (ML-KEM) <xref target="MLKEM"/> together with appropriate symmetric algorithms, and either traditional or Module-Lattice-Based Digital Signature Algorithm (ML-DSA) <xref target="MLDSA"/> post-quantum signature algorithms.
The traditional signature cipher suites address the risk of "harvest now, decrypt later" attacks, while not taking on the additional cost of post-quantum signatures.
The cipher suites with post-quantum signatures use only post-quantum KEMs.</t>
      <t>Following the pattern of base MLS, we define several variations, to allow for users that prefer to only use NIST-approved cryptography, users that prefer a higher security level, and users that prefer a PQ/traditional hybrid KEM over pure ML-KEM:</t>
      <ul spacing="normal">
        <li>
          <t>ML-KEM-768 + X25519 (128-bit security, Non-NIST, PQ/T hybrid)</t>
        </li>
        <li>
          <t>ML-KEM-768 + P-256 (128-bit security, NIST, PQ/T hybrid)</t>
        </li>
        <li>
          <t>ML-KEM-1024 + P-384 (192-bit security, NIST, PQ/T hybrid)</t>
        </li>
        <li>
          <t>ML-KEM-768 (128-bit security, NIST, pure PQ KEM)</t>
        </li>
        <li>
          <t>ML-KEM-1024 (192-bit security, NIST, pure PQ KEM)</t>
        </li>
        <li>
          <t>ML-KEM-768 (192-bit security, NIST, pure PQ)</t>
        </li>
        <li>
          <t>ML-KEM-1024 (256-bit security, NIST, pure PQ)</t>
        </li>
      </ul>
      <t>For all the cipher suites defined in this document, we use AES256 GCM <xref target="GCM"/> as the Authenticated Encryption with Authenticated Data (AEAD) <xref target="RFC5116"/> algorithm;
HMAC <xref target="RFC2104"/> with SHA-384 <xref target="SHS"/> as the hash function;
and SHAKE256 (Section 3.2 of <xref target="FIPS202"/>) as the Key Derivation Function (KDF).</t>
      <t>For the PQ/T hybrid KEMs and the pure ML-KEM HPKE integration, we use the KEMs defined in <xref target="I-D.ietf-hpke-pq"/>.
The signature schemes for ML-DSA-65 and ML-DSA-87 <xref target="MLDSA"/> are defined in <xref target="I-D.ietf-tls-mldsa"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="mls-cipher-suites">
        <name>MLS Cipher Suites</name>
        <t>This document requests that IANA add the following entries to the "MLS Cipher Suites" registry, replacing "XXXX" with the RFC number assigned to this document:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Name</th>
              <th align="left">Rec</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD1</td>
              <td align="left">MLS_128_MLKEM768X25519_AES256GCM_SHA384_Ed25519</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">MLS_128_MLKEM768P256_AES256GCM_SHA384_P256</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD3</td>
              <td align="left">MLS_192_MLKEM1024P384_AES256GCM_SHA384_P384</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD4</td>
              <td align="left">MLS_128_MLKEM768_AES256GCM_SHA384_P256</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD5</td>
              <td align="left">MLS_192_MLKEM1024_AES256GCM_SHA384_P384</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD6</td>
              <td align="left">MLS_192_MLKEM768_AES256GCM_SHA384_MLDSA65</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
            <tr>
              <td align="left">TBD7</td>
              <td align="left">MLS_256_MLKEM1024_AES256GCM_SHA512_MLDSA87</td>
              <td align="left">Y</td>
              <td align="left">RFCXXXX</td>
            </tr>
          </tbody>
        </table>
        <t>The mapping of cipher suites to HPKE primitives <xref target="I-D.ietf-hpke-hpke"/>, HMAC hash functions, and TLS signature schemes <xref target="RFC8446"/> is as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">KEM</th>
              <th align="left">KDF</th>
              <th align="left">AEAD</th>
              <th align="left">Hash</th>
              <th align="left">Signature</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0xTBD1</td>
              <td align="left">0x647a</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ed25519</td>
            </tr>
            <tr>
              <td align="left">0xTBD2</td>
              <td align="left">0x0050</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ecdsa_secp256r1_sha256</td>
            </tr>
            <tr>
              <td align="left">0xTBD3</td>
              <td align="left">0x0051</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ecdsa_secp384r1_sha384</td>
            </tr>
            <tr>
              <td align="left">0xTBD4</td>
              <td align="left">0x0041</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ecdsa_secp256r1_sha256</td>
            </tr>
            <tr>
              <td align="left">0xTBD5</td>
              <td align="left">0x0042</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">ecdsa_secp384r1_sha384</td>
            </tr>
            <tr>
              <td align="left">0xTBD6</td>
              <td align="left">0x0041</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">mldsa65</td>
            </tr>
            <tr>
              <td align="left">0xTBD7</td>
              <td align="left">0x0042</td>
              <td align="left">0x0011</td>
              <td align="left">0x0002</td>
              <td align="left">SHA384</td>
              <td align="left">mldsa87</td>
            </tr>
          </tbody>
        </table>
        <t>The hash used for the MLS transcript hash is the one referenced in the cipher suite name. "SHA384" refers to the SHA-384 functions defined in <xref target="SHS"/>.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The first five ciphersuites defined in this document combine a post-quantum (or PQ/T hybrid) KEM with a traditional signature algorithm. As such, they are designed to provide confidentiality against quantum and classical attacks, but provide authenticity against classical attacks only.  Thus, these cipher suites do not provide full post-quantum security, only post-quantum confidentiality.</t>
      <t>The last two cipher suites also use post-quantum signature algorithms.</t>
      <t>For security considerations related to the KEMs used in this document, please see the documents that define those KEMs <xref target="I-D.ietf-hpke-pq"/> and <xref target="I-D.irtf-cfrg-hybrid-kems"/>.
For security considerations related to the post-quantum signature algorithms used in this document, please see <xref target="I-D.ietf-tls-mldsa"/> and <xref target="I-D.ietf-lamps-dilithium-certificates"/>.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="SHS">
          <front>
            <title>Secure hash standard</title>
            <author>
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.180-4"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="MLKEM">
          <front>
            <title>Module-lattice-based key-encapsulation mechanism standard</title>
            <author>
              <organization/>
            </author>
            <date month="August" year="2024"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.203"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="MLDSA">
          <front>
            <title>Module-lattice-based digital signature standard</title>
            <author>
              <organization/>
            </author>
            <date month="August" year="2024"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.204"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="FIPS202">
          <front>
            <title>SHA-3 standard :: permutation-based hash and extendable-output functions</title>
            <author>
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.202"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="GCM">
          <front>
            <title>Recommendation for block cipher modes of operation :: GaloisCounter Mode (GCM) and GMAC</title>
            <author fullname="M J Dworkin" initials="M." surname="Dworkin">
              <organization/>
            </author>
            <date year="2007"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-38d"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="RFC9420" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9420.xml">
          <front>
            <title>The Messaging Layer Security (MLS) Protocol</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="B. Beurdouche" initials="B." surname="Beurdouche"/>
            <author fullname="R. Robert" initials="R." surname="Robert"/>
            <author fullname="J. Millican" initials="J." surname="Millican"/>
            <author fullname="E. Omara" initials="E." surname="Omara"/>
            <author fullname="K. Cohn-Gordon" initials="K." surname="Cohn-Gordon"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>Messaging applications are increasingly making use of end-to-end security mechanisms to ensure that messages are only accessible to the communicating endpoints, and not to any servers involved in delivering messages. Establishing keys to provide such protections is challenging for group chat settings, in which more than two clients need to agree on a key but may not be online at the same time. In this document, we specify a key establishment protocol that provides efficient asynchronous group key establishment with forward secrecy (FS) and post-compromise security (PCS) for groups in size ranging from two to thousands.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9420"/>
          <seriesInfo name="DOI" value="10.17487/RFC9420"/>
        </reference>
        <reference anchor="RFC5116" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5116.xml">
          <front>
            <title>An Interface and Algorithms for Authenticated Encryption</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document defines algorithms for Authenticated Encryption with Associated Data (AEAD), and defines a uniform interface and a registry for such algorithms. The interface and registry can be used as an application-independent set of cryptoalgorithm suites. This approach provides advantages in efficiency and security, and promotes the reuse of crypto implementations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5116"/>
          <seriesInfo name="DOI" value="10.17487/RFC5116"/>
        </reference>
        <reference anchor="RFC2104">
          <front>
            <title>HMAC: Keyed-Hashing for Message Authentication</title>
            <author fullname="H. Krawczyk" initials="H." surname="Krawczyk"/>
            <author fullname="M. Bellare" initials="M." surname="Bellare"/>
            <author fullname="R. Canetti" initials="R." surname="Canetti"/>
            <date month="February" year="1997"/>
            <abstract>
              <t>This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2104"/>
          <seriesInfo name="DOI" value="10.17487/RFC2104"/>
        </reference>
        <reference anchor="I-D.ietf-hpke-pq">
          <front>
            <title>Post-Quantum and Post-Quantum/Traditional Hybrid Algorithms for HPKE</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <date day="30" month="June" year="2025"/>
            <abstract>
              <t>   Updating key exchange and public-key encryption protocols to resist
   attack by quantum computers is a high priority given the possibility
   of "harvest now, decrypt later" attacks.  Hybrid Public Key
   Encryption (HPKE) is a widely-used public key encryption scheme based
   on combining a Key Encapsulation Mechanism (KEM), a Key Derivation
   Function (KDF), and an Authenticated Encryption with Associated Data
   (AEAD) scheme.  In this document, we define KEM algorithms for HPKE
   based on both post-quantum KEMs and hybrid constructions of post-
   quantum KEMs with traditional KEMs, as well as a KDF based on SHA-3
   that is suitable for use with these KEMs.  When used with these
   algorithms, HPKE is resilient with respect to attacks by a quantum
   computer.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-hpke-pq-01"/>
        </reference>
        <reference anchor="I-D.ietf-tls-mldsa">
          <front>
            <title>Use of ML-DSA in TLS 1.3</title>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Sophie Schmieg" initials="S." surname="Schmieg">
              <organization>Google</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="26" month="September" year="2025"/>
            <abstract>
              <t>   This memo specifies how the post-quantum signature scheme ML-DSA
   (FIPS 204) is used for authentication in TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-mldsa-01"/>
        </reference>
        <reference anchor="I-D.ietf-hpke-hpke">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Karthikeyan Bhargavan" initials="K." surname="Bhargavan">
              <organization>Inria</organization>
            </author>
            <author fullname="Benjamin Lipp" initials="B." surname="Lipp">
              <organization>Inria</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Apple</organization>
            </author>
            <date day="24" month="June" year="2025"/>
            <abstract>
              <t>   This document describes a scheme for hybrid public key encryption
   (HPKE).  This scheme provides a variant of public key encryption of
   arbitrary-sized plaintexts for a recipient public key.  It also
   includes a variant that authenticates possession of a pre-shared key.
   HPKE works for any combination of an asymmetric KEM, key derivation
   function (KDF), and authenticated encryption with additional data
   (AEAD) encryption function.  We provide instantiations of the scheme
   using widely used and efficient primitives, such as Elliptic Curve
   Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation
   function (HKDF), and SHA2.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-hpke-hpke-01"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.irtf-cfrg-hybrid-kems">
          <front>
            <title>Hybrid PQ/T Key Encapsulation Mechanisms</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Paul Grubbs" initials="P." surname="Grubbs">
              <organization>University of Michigan</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document defines generic constructions for hybrid Key
   Encapsulation Mechanisms (KEMs) based on combining a post-quantum
   (PQ) KEM with a traditional cryptographic component.  Hybrid KEMs
   built using these constructions provide strong security properties as
   long as either of the underlying algorithms are secure.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-hybrid-kems-07"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-13"/>
        </reference>
      </references>
    </references>
    <?line 130?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This work would not be possible without the hard work of the CFRG Hybrid KEM design team: Aron Wussler, Bas Westerbaan, Deirdre Connolly, Mike Ounsworth, Nick Sullivan, and Stephen Farrell.
Thanks also to Joël Alwen, Marta Mularczyk, and Britta Hale.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
