<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.25 (Ruby 3.1.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ohai-svcb-config-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="Oblivious Services in SVCB">Discovery of Oblivious Services via Service Binding Records</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-svcb-config-01"/>
    <author initials="T." surname="Pauly" fullname="Tommy Pauly">
      <organization>Apple Inc.</organization>
      <address>
        <email>tpauly@apple.com</email>
      </address>
    </author>
    <author initials="T." surname="Reddy" fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="March" day="05"/>
    <area>Security</area>
    <workgroup>Oblivious HTTP Application Intermediation</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document defines a parameter that can be included in SVCB and HTTPS
DNS resource records to denote that a service is accessible using Oblivious
HTTP, by offering an Oblivious Gateway Resource through which to access the
target. This document also defines a mechanism to learn the key configuration
of the discovered Oblivious Gateway Resource.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ohai-svcb-config/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Oblivious HTTP Application Intermediation Working Group mailing list (<eref target="mailto:ohai@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ohai/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ohai/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-ohai/draft-ohai-svcb-config"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Oblivious HTTP <xref target="OHTTP"/> allows clients to encrypt
messages exchanged with an Oblivious Target Resource (target). The messages
are encapsulated in encrypted messages to an Oblivious Gateway Resource
(gateway), which gates access to the target. The gateway is access via an
Oblivious Relay Resource (relay), which proxies the encapsulated messages
to hide the identity of the client. Overall, this architecture is designed
in such a way that the relay cannot inspect the contents of messages, and
the gateway and target cannot discover the client's identity.</t>
      <t>Since Oblivious HTTP deployments will often involve very specific coordination
between clients, relays, and gateways, the key configuration can often be
shared in a bespoke fashion. However, some deployments involve clients
discovering oblivious targets and their assoicated gateways more dynamically.
For example, a network might operate a DNS resolver that provides more optimized
or more relevant DNS answers and is accessible using Oblivious HTTP, and might
want to advertise support for Oblivious HTTP via mechanisms like Discovery of
Designated Resolvers (<xref target="DDR"/>). Clients can work with trusted
relays to access these gateways.</t>
      <t>This document defines a way to use DNS records to advertise that an HTTP service
supports Oblivious HTTP. This indication is a parameter that can be included in SVCB
and HTTPS DNS resource records <xref target="SVCB"/> (<xref target="svc-param"/>).
The presence of this parameter indicates that a service can act as an oblivious
target and has an oblivious gateway that can provide access to the target.</t>
      <t>The client learns the URI to use for the oblivious gateway using a well-known
URI <xref target="WELLKNOWN"/>, "ohttp-gateway", which is accessed on the
oblivious target (<xref target="gateway-location"/>). This means that for deployments that
support this kind of discovery, the gateway and target resources need to
be located on the same host.</t>
      <t>This document also defines a way to fetch an oblivious gateway's key
configuration from the oblivious gateway (<xref target="config-fetch"/>).</t>
      <t>This mechanism does not aid in the discovery of oblivious relays;
relay configuration is out of scope for this document. Models in which
this discovery mechanism is applicable are described in <xref target="applicability"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="applicability">
      <name>Applicability</name>
      <t>There are multiple models in which the discovery mechanism defined
in this document can be used.</t>
      <ul spacing="normal">
        <li>Upgrading non-oblivious HTTP to oblivious HTTP. In this model, the
client intends to communicate with a specific target service, and
prefers to use oblivious HTTP if it is available. The target service
has an oblivious gateway that it offers to allow access using oblivious
HTTP. Once the client learns about the oblivious gateway, it "upgrades"
to using oblivious HTTP to access the target service.</li>
        <li>Discovering alternative oblivious HTTP services. In this model,
the client has a default oblivious target service that it uses. For
example, this may be a public DNS resolver that is accessible over
oblivious HTTP. The client is willing to use alternative oblivious
target services if they are discovered, which may provide more
optimized or more relevant responses.</li>
      </ul>
      <t>In both of these deployment models, the client is assumed to already
know of an oblivious relay that it trusts and works with. This oblivious
relay either needs to provide generic access to oblivious gateways, or
provide a service to clients to allow them to check which gateways
are accessible.</t>
    </section>
    <section anchor="svc-param">
      <name>The ohttp SvcParamKey</name>
      <t>The "ohttp" SvcParamKey (<xref target="iana"/>) is used to indicate that a
service described in an SVCB record can be accessed as an oblivious target
using an associated gateway. The service that is queried by the client hosts
one or more target resources.</t>
      <t>In order to access the service's target resources obliviously, the client
needs to send encapsulated messages to the gateway resource and the gateway's
key configuration (both of which can be retrieved using the method described in
<xref target="config-fetch"/>).</t>
      <t>Both the presentation and wire format values for the "ohttp" parameter
<bcp14>MUST</bcp14> be empty.</t>
      <t>The "ohttp" parameter can be included in the mandatory parameter
list to ensure that clients that do not support oblivious access
do not try to use the service. Services that mark the "ohttp"
parameter as mandatory can, therefore, indicate that the service might
not be accessible in a non-oblivious fashion. Services that are
intended to be accessed either obliviously or directly
<bcp14>SHOULD NOT</bcp14> mark the "ohttp" parameter as mandatory. Note that since
multiple SVCB responses can be provided for a single query, the oblivious
and non-oblivious versions of a single service can have different SVCB
records to support different names or properties.</t>
      <t>The media type to use for encapsulated requests made to a target service
depends on the scheme of the SVCB record. This document defines the
interpretation for the "https" <xref target="SVCB"/> and "dns" <xref target="DNS-SVCB"/>
schemes. Other schemes that want to use this parameter <bcp14>MUST</bcp14> define the
interpretation and meaning of the configuration.</t>
      <section anchor="use-in-https-service-records">
        <name>Use in HTTPS service records</name>
        <t>For the "https" scheme, which uses the HTTPS RR type instead of SVCB,
the presence of the "ohttp" parameter means that the target
being described is an Oblivious HTTP service that is accessible using
the default "message/bhttp" media type <xref target="OHTTP"/>
          <xref target="BINARY-HTTP"/>.</t>
        <t>For example, an HTTPS service record for svc.example.com that supports
an oblivious gateway could look like this:</t>
        <artwork><![CDATA[
svc.example.com. 7200  IN HTTPS 1 . ( alpn=h2 ohttp )
]]></artwork>
        <t>A similar record for a service that only supports oblivious connectivity
could look like this:</t>
        <artwork><![CDATA[
svc.example.com. 7200  IN HTTPS 1 . ( mandatory=ohttp ohttp )
]]></artwork>
      </section>
      <section anchor="use-in-dns-server-svcb-records">
        <name>Use in DNS server SVCB records</name>
        <t>For the "dns" scheme, as defined in <xref target="DNS-SVCB"/>, the presence of
the "ohttp" parameter means that the DNS server being
described has a DNS over HTTP (DoH) <xref target="DOH"/> service that can
be accessed using Oblivious HTTP. Requests to the resolver are sent to
the oblivious gateway using binary HTTP with the default "message/bhttp"
media type <xref target="BINARY-HTTP"/>, containing inner requests that use the
"application/dns-message" media type <xref target="DOH"/>.</t>
        <t>If the "ohttp" parameter is included in an DNS server SVCB record,
the "alpn" <bcp14>MUST</bcp14> include at least one HTTP value (such as "h2" or
"h3").</t>
        <t>In order for DoH servers to function as oblivious targets, their
associated gateways need to be accessible via an oblivious relay.
DoH servers used with the discovery mechanisms described
in this section can either be publicly accessible, or specific to a
network. In general, only publicly accessible DoH servers will work
as oblivious targets, unless there is a coordinated deployment
with an oblivious relay that is also hosted within a network.</t>
        <section anchor="ddr">
          <name>Use with DDR</name>
          <t>Clients can discover that a DoH server support Oblivious HTTP using
DDR, either by querying _dns.resolver.arpa to a locally configured
resolver or by querying using the name of a resolver <xref target="DDR"/>.</t>
          <t>For example, a DoH service advertised over DDR can be annotated
as supporting oblivious resolution using the following record:</t>
          <artwork><![CDATA[
_dns.resolver.arpa  7200  IN SVCB 1 doh.example.net (
     alpn=h2 dohpath=/dns-query{?dns} ohttp )
]]></artwork>
          <t>Clients still need to perform some verification of oblivious DoH servers,
such as the TLS certificate check described in <xref target="DDR"/>. This certificate
check can be done when looking up the configuration on the gateway
as described in <xref target="config-fetch"/>, which can either be done directly,
or via the relay or another proxy to avoid exposing client IP addresses.
Since the oblivious gateway that is discovered dynamically uses a well-known
URI on the same host as the target, as described in <xref target="config-fetch"/>, the
certificate evaluation for the connection to well-known gateway URI also
covers the name of the target DoH server.</t>
          <t>Opportunistic discovery <xref target="DDR"/>, where only the IP address is validated,
<bcp14>SHOULD NOT</bcp14> be used in general with oblivious HTTP, since this mode
primarily exists to support resolvers that use private or local IP
addresses, which will usually not be accessible when using an oblivious
relay. If a configuration occurs where the resolver is accessible, but
cannot use certificate-based validation, the client needs to ensure
that the oblivious relay only accesses the gateway and target using
the unencrypted resolver's original IP address.</t>
          <t>For the case of DoH servers, clients also need to ensure that they are not
being targeted with unique DoH paths that would reveal their identity. See
<xref target="security"/> for more discussion.</t>
        </section>
        <section anchor="dnr">
          <name>Use with DNR</name>
          <t>The SvcParamKeys defined in this document also can be used with Discovery
of Network-designated Resolvers (DNR) <xref target="DNR"/>. In this
case, the oblivious configuration and path parameters can be included
in DHCP and Router Advertisement messages.</t>
          <t>While DNR does not require the same kind of verification as DDR, clients
that learn about DoH servers still need to ensure that they are not being
targeted with unique DoH paths that would reveal their identity. See <xref target="security"/>
for more discussion.</t>
        </section>
      </section>
    </section>
    <section anchor="gateway-location">
      <name>Gateway Location</name>
      <t>Clients that know a service is available as an oblivious target
via discovery through the "ohttp" parameter in a SVCB or HTTPS
record need to know the location of the associated oblivious gateway
before sending oblivious requests.</t>
      <t>By default, the oblivious gateway for an oblivious target is defined
as a well-known resource (<xref target="WELLKNOWN"/>) on the target,
"/.well-known/ohttp-gateway".</t>
      <t>Commonly, servers will not want to actually operate the oblivious gateway
on a well-known URI. In such cases, servers can use 3xx redirection responses
(<xref section="15.4" sectionFormat="of" target="HTTP"/>) to direct clients and relays to the correct
location of the oblivious gateway.</t>
      <t>Generally, the first request a client will make will be a GET request to
discover the key configuration, described in <xref target="config-fetch"/>.
This initial request also provides a convenient way for clients to learn
about the redirect from the well-known resource, if there is a redirect.
When clients work with their oblivious relays to send oblivious requests
to the gateway, clients can communicate this redirected gateway URI.</t>
    </section>
    <section anchor="config-fetch">
      <name>Key Configuration Fetching</name>
      <t>Clients also need to know the key configuration of an oblivious gateway before
sending oblivious requests.</t>
      <t>In order to fetch the key configuration of an oblivious gateway discovered
in the manner described in <xref target="gateway-location"/>, the client issues a GET request
to the URI of the gateway specifying the "application/ohttp-keys" (<xref target="OHTTP"/>)
media type in the Accept header.</t>
      <t>For example, if the client knows an oblivious gateway URI,
"https://svc.example.com/.well-known/ohttp-gateway", it could fetch the
key configuration with the following request:</t>
      <artwork><![CDATA[
GET /.well-known/ohttp-gateway HTTP/1.1
Host: svc.example.com
Accept: application/ohttp-keys
]]></artwork>
      <t>Oblivious gateways that coordinate with targets that advertise oblivious
support <bcp14>SHOULD</bcp14> support GET requests for their key configuration in this
manner, unless there is another out-of-band configuration model that is
usable by clients. Gateways respond with their key configuration in the
response body, with a content type of "application/ohttp-keys".</t>
      <t>Clients can either fetch this key configuration directly, or do so via
a proxy in order to avoid the server discovering information about the
client's identity. See <xref target="security"/> for more discussion of avoiding key
targeting attacks.</t>
    </section>
    <section anchor="security">
      <name>Security and Privacy Considerations</name>
      <t>Attackers on a network can remove SVCB information from cleartext DNS
answers that are not protected by DNSSEC <xref target="DNSSEC"/>. This
can effectively downgrade clients. However, since SVCB indications
for oblivious support are just hints, a client can mitigate this by
always checking for oblivious gateway configuration <xref target="config-fetch"/>
on the well-known gateway location <xref target="gateway-location"/>.
Use of encrypted DNS along with DNSSEC can also be used as a mitigation.</t>
      <t>When discovering designated oblivious DoH servers using this mechanism,
clients need to ensure that the designation is trusted in lieu of
being able to directly check the contents of the gateway server's TLS
certificate. See <xref target="ddr"/> for more discussion, as well as the Security
Considerations of <xref target="SVCBDNS"/>.</t>
      <t>For oblivious DoH servers, an attacker could use unique DoH path values
to target or identify specific clients. Clients can mitigate such
attacks in several ways. Some options include: only allow common DoH
paths (such as the de-facto default "/dns-query{?dns}"); performing
consistency checks by fetching the information about the resolver
over multiple resolution paths; or coordinating with a trusted
oblivious relay to validate that DoH paths are common across clients
using the same gateway.</t>
      <t>As discussed in <xref target="OHTTP"/>, client requests using Oblivious HTTP
can only be linked by recognizing the key configuration. In order to
prevent unwanted linkability and tracking, clients using any key
configuration discovery mechanism need to be concerned with attacks
that target a specific user or population with a unique key configuration.</t>
      <t>There are several approaches clients can use to mitigate key targeting
attacks. <xref target="CONSISTENCY"/> provides an analysis
of the options for ensuring the key configurations are consistent between
different clients. Clients <bcp14>SHOULD</bcp14> employ some technique to mitigate key
targeting attack. Oblivious gateways that are detected to use targeted
key configurations per-client <bcp14>MUST NOT</bcp14> be used.</t>
      <t>When clients fetch a gateway's configuration (<xref target="config-fetch"/>),
they can expose their identity in the form of an IP address if they do not
connect via a proxy or some other IP-hiding mechanism. In some circumstances,
this might not be a privacy concern, since revealing that a particular
client IP address is preparing to use an Oblivious HTTP service can be
expected. However, if a client is otherwise trying to obfuscate its IP
address or location (and not merely decouple its specific requests from its
IP address), or revealing its IP address will increase the risk of a key
targeting attack (if a gateway service is trying to differentiate traffic
across client IP addresses), a proxy or similar mechanism can be used to fetch
the gateway's configuration.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <section anchor="svcb-service-parameter">
        <name>SVCB Service Parameter</name>
        <t>IANA is requested to add the following entry to the SVCB Service Parameters
registry (<xref target="SVCB"/>).</t>
        <table>
          <thead>
            <tr>
              <th align="left">Number</th>
              <th align="left">Name</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD</td>
              <td align="left">ohttp</td>
              <td align="left">Denotes that a service operates an Oblivious HTTP target</td>
              <td align="left">(This document)</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="well-known-uri">
        <name>Well-Known URI</name>
        <t>IANA is requested to add one new entry in the "Well-Known URIs" registry <xref target="WELLKNOWN"/>.</t>
        <t>URI suffix: ohttp-gateway</t>
        <t>Change controller: IETF</t>
        <t>Specification document: This document</t>
        <t>Status: permanent</t>
        <t>Related information: N/A</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="OHTTP">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="15" month="December" year="2022"/>
            <abstract>
              <t>   This document describes a system for forwarding encrypted HTTP
   messages.  This allows a client to make multiple requests to an
   origin server without that server being able to link those requests
   to the client or to identify the requests as having come from the
   same client, while placing only limited trust in the nodes used to
   forward the messages.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-ohttp-06"/>
        </reference>
        <reference anchor="DDR">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Kinnear" initials="E." surname="Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Patrick McManus" initials="P." surname="McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="5" month="August" year="2022"/>
            <abstract>
              <t>   This document defines Discovery of Designated Resolvers (DDR), a
   mechanism for DNS clients to use DNS records to discover a resolver's
   encrypted DNS configuration.  An encrypted DNS resolver discovered in
   this manner is referred to as a "Designated Resolver".  This
   mechanism can be used to move from unencrypted DNS to encrypted DNS
   when only the IP address of a resolver is known.  This mechanism is
   designed to be limited to cases where unencrypted DNS resolvers and
   their designated resolvers are operated by the same entity or
   cooperating entities.  It can also be used to discover support for
   encrypted DNS protocols when the name of an encrypted DNS resolver is
   known.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-ddr-10"/>
        </reference>
        <reference anchor="SVCB">
          <front>
            <title>Service binding and parameter specification via the DNS (DNS SVCB and HTTPS RRs)</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google</organization>
            </author>
            <author fullname="Mike Bishop" initials="M." surname="Bishop">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Erik Nygren" initials="E." surname="Nygren">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="11" month="October" year="2022"/>
            <abstract>
              <t>   This document specifies the "SVCB" and "HTTPS" DNS resource record
   (RR) types to facilitate the lookup of information needed to make
   connections to network services, such as for HTTP origins.  SVCB
   records allow a service to be provided from multiple alternative
   endpoints, each with associated parameters (such as transport
   protocol configuration and keys for encrypting the TLS ClientHello).
   They also enable aliasing of apex domains, which is not possible with
   CNAME.  The HTTPS RR is a variation of SVCB for use with HTTP [HTTP].
   By providing more information to the client before it attempts to
   establish a connection, these records offer potential benefits to
   both performance and privacy.

   TO BE REMOVED: This document is being collaborated on in Github at:
   https://github.com/MikeBishop/dns-alt-svc
   (https://github.com/MikeBishop/dns-alt-svc).  The most recent working
   version of the document, open issues, etc. should all be available
   there.  The authors (gratefully) accept pull requests.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-svcb-https-11"/>
        </reference>
        <reference anchor="WELLKNOWN">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space.  It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="DNS-SVCB">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google LLC</organization>
            </author>
            <date day="11" month="August" year="2022"/>
            <abstract>
              <t>   The SVCB DNS resource record type expresses a bound collection of
   endpoint metadata, for use when establishing a connection to a named
   service.  DNS itself can be such a service, when the server is
   identified by a domain name.  This document provides the SVCB mapping
   for named DNS servers, allowing them to indicate support for
   encrypted transport protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-svcb-dns-07"/>
        </reference>
        <reference anchor="BINARY-HTTP">
          <front>
            <title>Binary Representation of HTTP Messages</title>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="6" month="July" year="2022"/>
            <abstract>
              <t>This document defines a binary format for representing HTTP messages.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-binary-message-06"/>
        </reference>
        <reference anchor="DOH">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="DNR">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Neil Cook" initials="N." surname="Cook">
              <organization>Open-Xchange</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="13" month="August" year="2022"/>
            <abstract>
              <t>   The document specifies new DHCP and IPv6 Router Advertisement options
   to discover encrypted DNS resolvers (e.g., DNS-over-HTTPS, DNS-over-
   TLS, DNS-over-QUIC).  Particularly, it allows a host to learn an
   authentication domain name together with a list of IP addresses and a
   set of service parameters to reach such encrypted DNS resolvers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-dnr-13"/>
        </reference>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding">
              <organization/>
            </author>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham">
              <organization/>
            </author>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes. </t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="DNSSEC">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends">
              <organization/>
            </author>
            <author fullname="R. Austein" initials="R." surname="Austein">
              <organization/>
            </author>
            <author fullname="M. Larson" initials="M." surname="Larson">
              <organization/>
            </author>
            <author fullname="D. Massey" initials="D." surname="Massey">
              <organization/>
            </author>
            <author fullname="S. Rose" initials="S." surname="Rose">
              <organization/>
            </author>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System.  This document introduces these extensions and describes their capabilities and limitations.  This document also discusses the services that the DNS security extensions do and do not provide.  Last, this document describes the interrelationships between the documents that collectively describe DNSSEC.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="SVCBDNS">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google LLC</organization>
            </author>
            <date day="11" month="August" year="2022"/>
            <abstract>
              <t>   The SVCB DNS resource record type expresses a bound collection of
   endpoint metadata, for use when establishing a connection to a named
   service.  DNS itself can be such a service, when the server is
   identified by a domain name.  This document provides the SVCB mapping
   for named DNS servers, allowing them to indicate support for
   encrypted transport protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-svcb-dns-07"/>
        </reference>
        <reference anchor="CONSISTENCY">
          <front>
            <title>Key Consistency and Discovery</title>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Matthew Finkel" initials="M." surname="Finkel">
              <organization>The Tor Project</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="17" month="August" year="2022"/>
            <abstract>
              <t>   This document describes the key consistency and correctness
   requirements of protocols such as Privacy Pass, Oblivious DoH, and
   Oblivious HTTP for user privacy.  It discusses several mechanisms and
   proposals for enabling user privacy in varying threat models.  In
   concludes with discussion of open problems in this area.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wood-key-consistency-03"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA61c63LjRnb+30/Rpn9YkyIpyzOb9cpx1hpp7FF5RppImrhc
qVSqCTRJRCCaQQPU0LL8LHmWPFnOpa8gNLW5zB8LINB9+ly/c4Fns5noqq7W
p3JyUdnC7HS7l2Yprxd1tatMb+WtbndVoa3cVcpfyNdVU1bNSt7owrSlnQi1
WLR6B6uMvFg18vafz19PRKE6vTLt/lTarhS2a7XanMrLN3c/ClGaolEboKNs
1bKbVbpbzsxaVTO7KxazwjTLajX7+kQoeAm2udVF31bdfiIeTHu/ak2/zTZ/
e3f3QZ5tt3UFm1amkZdNp9uNLiu6nIh7vYc3y1P+odHd7AI3Fjvd9PpUSPm/
WFPKbr9FVv4CNCF7fsI18P5GVTXcxwP9gEebm3aF91VbrOH+uuu29vT4GB/D
W9VOz/1jx3jjeNGaB6uPcYFjfHFVdet+cSqJTw8rYtUxs27INSFALi+FUH23
Ni0cbQbvS8ncvjObzV5+UH29p7uwoWqq3+hAp3RYDccs5vSj5mN0W3z8B4U/
zguzGaxYtf1G1do+qBb0oyzHFr4y95VK17w3TdlV7Q8rvKRFRWPaDTy+A2mI
qlkmV2I2m0m1AAVSRSfE3bqyEvSn3+imk6VeVg1onZJb1QJFICLZrVUnC9XI
hQZtLOq+1KVXS6makkR7Ky6ubmWrrelbUPGWVVt2BpZsTKd5FSWtswHYVBWg
37ZaAJN6iwIPyiJwxalcoDEtdYu/wfZRl34CU3hQe2CQ265bg66s1vJhXRVr
3JTXhvtadKpd6W4u84Oq2prktBtdrIHDdoMv11q1Db4rQc8l60HfEvMFWDf+
UDpzB048T9aceb2pyrLWQnyJKt+asi9oJTGwjcfHL67xj+8vZxfzoR0bVPKn
JyC7BlWWRV3BIYi9uina/bYTGzivWsFh9Cc8ygooewA1zxl3R7yIfDti5rxA
7mjpl0A3geuqre1rOBNJ2+0DF2En5PPnxCKOVnznxdRJBq9tEI4hVkb5aOme
j9pBflM1Ca9udJ1K/qjF67DBtjWfKk2Cz08Qzga7rqtS0xPw3wYcOPlsvGa2
zuU1SBY4PYWbSAn6lE4XXd+S3pbaVqtGl2BX0vawqZJIMyk4rkIUocGA3gPn
7BZe5eUNuDwUG2zn6ZmiBYkuOTtaFPPEr+GVLaHxKxuIBy27BbPUcqBPpd7W
Zr+hDR+quoZdYXcgaGfqnZYUq5C2alkVQBqYa9Wwji9096DhUadlUz4Rk+rJ
tNNxAyFHwTsttLBr1bL6KLi0W3Ov5VLZNTw4l2/NgwYqptKajc7I9TQ6AoRn
ADoCE07JTLLMsLWuWqmsNRhedCRTbgxIrdyDe4Vf6hrY9aNpwUjUBhwwHElC
9MIoCGa6WnfSbEH04K6U9P6s3nkfCMq1A667Nc22qzbVb6AHsB7dATbpnQLn
gq+qxj7olqn7rLOT7OzwOSJBPOASaFsl7NxVVoOWbbem7SS48aGU0T6C87Ky
roDDKRYRF6StxJMbdxorj8DZXFzcDF2NKstZWbZPT+AQzp2LQXkSf8ibdG1v
YSnBGpF7Wht02M6fjytkKgaYoB2HQ6CI5+VY0fAJXcQQjgl2wAHn2BFSOWBR
/e3hS4TwJUfDF7AJHxvyqWys2TJKIPABjhk4Ctcz2hb5J9CdbWFBjaZJ/gXo
ilQ5eslVZYERKYXADLqMHAja7sIYqcl68FtwHeGoTlPHPa0g2ti2ONaxv/x4
c+klg4qGtw63YOUFMeq6nt035qER+B4w6pc37979fHX9y9X3Nz+ef/v3J396
epoiaAMGzdzbE++mg0GAKAyFWjG0a+Soe21WGxYtKSaJe6NV41iHtKbOA296
ZWGuA5osUQTejezZd404XK8AFrwCkNYZ8IWSdg+ESgsSlGtjuwMlH2AKp+lL
3RXrUXmBEwf/KXL/uWzN5hneA0cclKc1Sc2EY4eHL6VB4iFoqIq0PAUrFOfi
smzD3wkXrzIqYE3Td/g8vLr1CpEcdi7fm1LXlJ+QTAX/HLaKJKGwGfej90Ns
AT60aKsF2+Hjo/+1qiGcPT3NESqdm2aH8c007EIvkK0VXbP+YuR5ICOdvP94
eweqRf+VV9f0982bf/p4efPmAv++fXv27l34Q7gnbt9ef3x3Ef+Kb55fv3//
5uqCX4a7MrslJu/Pfp2ww55cf7i7vL46ezdhXmfaAAcF8ZPXAYsHX4BKpCCa
pad/ff7hv/7z5BUaEJjNNycnfwFnwhffnvz5FVw8rHXDu5mm3rtLEOteAN/A
eim6QngHsFN1oIJTdB12DZYp1wBQgZt/9y/ImX89lf+wKLYnr/7R3cADZzc9
z7KbxLPDOwcvMxNHbo1sE7iZ3R9wOqf37Nfs2vM9uYlac5Zqknz8MtcsUpyW
VXDT112F+dkmV+OBwSSGRXZNoC+Xswst4DZLBPzy43bVKsrvG9PMTB6uQSHM
IHxdugWJEJKscL4Z9abh2Ag53aZvKGI4WB+xm/NdLoAwoARtW2Kgd/58QEW1
lFVHdrnDnBnMkuF3vpL4fJypOs7OOHZjXuLDDccIk2VzAKqbQicI1kcetUBH
M+rwprjHpCd+ajsRdJgcA3qmRhQyOASJ5CLBj6rGigUlw8N13Ct2KBORUE08
QWWALL47AKMhinsOAfNhOUCcIiBOXhi4uECUue1hiWIEbOaYEakXQ81JwnjF
GB8P6EQ+ek6Rk2lRE9CVsFcOOa0P00ilhxKIcEXAvPIA87YI7xs8rhDAvoUB
JeW0yqbg3tnbNNUEPKq1YE0lq1KrVbkXCC5whUwDOVZ57hIa5fiAENWSaTiE
EM/M72j4CXiLcZ001p9rpRtQjCKBSgd6CNSCAAOmikI2aSLOJgCbUA2hWOvi
Psl6cRnKq6NQKc6hDAkjydtd8QHh4c8aPVcEkxzuGEhNsqcAD1SqUYADkIXo
gHBnjywdsBSe2izsKFe+YaDrfVjAZEPDZ7URDvw1lGgVVZposTbm6m/lf/TA
W3hosU/ljeDJCtPooEVD+MU6BJShNWTW7Xb4yh5CtkBuvU/VSwSRAxYvx6sC
HiF7BxcSAZdbRsQmDjPeI6/rLG3HSwj3cPQdbMJc66jA0q1NmUlCjGG617hg
FxKIjvchNa9aAmMb4O9O1T2Q7rG615CQYwgK8kCK3mypTHA39tRYakS0wnaq
MxAD44J1ZTuuOVmshXC64S0AL0pD2NOj76hALEHhfu/akAMmMp3HojcttlGQ
dSYnE5FmZRP64AAkbwh5oEvTgQEkG7j8GilYpIbI9Yk8WocqRU4TWLDgsMzG
lhqN8zCJGqJ+lyCxoqv3IqKhg5PJ8ZPN5VWonFos8YiAWpzxOpfrZehcVEk6
ofCdFTyLRugsIjpFVKb8xFgYILiNPte/m2ala7XDIIExH62Y8uckffdCj09g
SdsiD4CuLab22jotpLI/1fvTjDMzzVYD3ejdN6qkp9QQnkBQIXjk8zJwuRvt
S3mJdxuWfn2GhkgrQHOXfHlborR+AkAc18G6K4J9SPvx1hcQrGdjZQEsn1BR
AB58ehJMEIT/a9ILd8ni9DUeNoGsMkBWyzSOkUh1Ish+CQctfV0xuiOMKl/K
j5a0mksbXohOWIIqYOkxmTQf9RGz0M/89s0NC6pqbAeBGTfFwzMqyiscYwqd
ZOoRnUFajfQnjtDmpeQUj43hIfKpRIGHYhPny48XTEGiYo+PVFgHkYDwXl9e
nd38OhurtOOLi8rOFlWj2v3MLUgJaV4zHGcsaQ/If+4exEaMM15XuhKjaLow
fV3K2ph7Lt+hPpwK8ccff4jBanP552++/lrKyytHwImcyyNAHtvm+/U3Dke8
oDfFGZjwBhtiKXUq5ykllKGuFikDhWrAacFVh+WJ/yN5wZ99zwRmZEZdRQiM
1IHOJMabaivZn9dVZX1KxkUEb5RYdRpopvibNDPZn7QzydMZ9OMDVIYn5Ty6
MG9fkDe4fksVr1ffYrae8Re8pkgjxFjldy5vvKdzICTkAQgXMfxjHepz1TjW
VyaLq7TP24XI7CIxBuQbNihURa6lAg1ooxOm47h4LSYqtnGPQSjeUgZGB4wh
27l8zjVQ2TaiDvWcDrCrmaCaT9g9utekojTSoiZrVw9HUCSPuC9jwcN9M0Hw
Plm/nLxIUSVaA0jQ7Ua8X/ZNwS7WHnYZptxiEIfIN9QKB6CCO1fD3GUu0l0J
s0eRHZYdbPSRofJgdRE6LQ5zYOynRBLsOZKAaUtSJoAQKlyzgzJcynxUPWU3
MPJ+xiBqIeG7Ypw9fVM7jM5dMhV7SrpMEkDhu5LjSZ3lKiqmCI41DM4c3egw
2GPQMhcXN5ArYctCiLRhkXTMqLgeDxJgyiDWcECB9aaBp3tGTmgN/wZaPvd2
OVftVjEiwdJwXceEgDojznpNvkTMAhAWMcgKz4KxXNyMBJpAOLqU0B8p2Q3h
4X3ihn1CZDQKx50wL5TQVj3pTaRkaTBnxSs2NOfWR04bPTvZ5QmgqXVw/Q1W
62keIYQi+HmruvX35B6IB49/RVSUO38vMtuhcnkzAqiIGQ63BbFqs/Sdnax8
nSjnVHh7x1PdvbuVBXJqyWkAp+KDmjPzm5Fh8rDghx1bS3QrWHCl8EdS3B4i
Lg9AnT8Qyg43yzO8aZIoRvulvXyyMMWeIjqQ2E/G6A1CxqexyU0JlNqZCvKO
T1tDInXp9eUHUJWyxZADeJt7w+Phw5tcMs2QdEoZCB60eoZtEM929gQuMH/2
+FTiTASk0WnnANwjENzMJBQE0pES9BSCCLeZYSVVwKgkYFvXZBc9+NUO/GH0
tk4bUC7ovMgd4hqRkcgkILIq0camaSrnKr94UOdP2TPltbop52+xqCi2bQVZ
YAU76U+VC/7eNbWhTxvCLjy+Q1YBe8jnAG0iCNkrFLno3vYkvMMslxQ5lHAG
9TGICEvy2ZliF0WPrp/YkkGTDI1P5aLvhBtWQGoT4c4WCtnjmAeLZpW/UJrh
ioIIYGwYHEgmDkfZ57p3MSnomziu4mn+ClPRagUBqU4kO4/4slCW1Cd1LKG8
QVHJe6i0/hHKp3B4l9YwOT6yg76BA6RV0SX6BJBQdat3Gsjh6YUw0CFvtYZU
xbopPUCVS18oQ6XtrfV5XhoKrygUNq0rGCaFwgwpd4cty6SD4dbypoHjTlcc
emfl6CABbMso+Gp8mgDoeQr1dIEsHlQiBiqH4kQ2RZhohxUqBEIXb88/0LM3
pkcoeeZjI9eYXVkPePTLukIgA8wJnVEEtZVTaPJivj+cxRpwY4QG/AwKSY0n
w7hlkYKjPIA9px4ur/j/UA+Zqod4Rj3CQNY71z8HBTloqccoTBtT1T0f0/M9
oueqwhinojP1o3jPQH4EcwQhTOvmBl166plHBODLnkLv0RPkfRDJwPCw9kcV
3iHu4QwGq6p7nxQNVdD7EkqRD0/IQ1/c/lN5RIyV4qPHxzABgRV5FyZdVBST
43l86zifigDazs1mgz5umuNtVJowDlR07Nn9iNLoGQSqbkogBEqyP0JIaH82
7oGGhf765adPcBAGH8jxUFgUcKpbd/PkT/NXKIsvqHQCGe9fTk6+xpPijCe9
Gp1lU8o4IcTxvMUnxFCoB/QDL37iOOqr+MuqtZ2XI4YoDh3En4261/wXNdN+
enMXHoScOZubO6jbTz8PU+bCzRVVXQU2GPZHhxkGwShg7nTDFDkNSnpC5C9E
bHF6JscpjxFVmrqunM+j/EtzcGZxKi8dyiL/MBzsCB2PQ2MQebsjRjlUiLTV
TMHC7x9TXlIqdDDYhTrP/PePyD00wccvM35GN5NF0mDth22VYevP782mLj5r
6mnziOdv/md7REAsYjsECyIDlTkcUBo0Nm1PWpIopuc9QellBmU4Vd/77Cwr
s7DHgBPYCboaV9B8kZZzHKVngJK2nVxrVRLqzTLKKh10Je4/0+IH8sBp+dH6
QaHvM76MevZcMgyMH+mZhZpHmoISf1wOihx7fhsKHccn8xPxFjKQ02HVVTAP
TuU4Bzn5vB6e2UXAWLZwVLoxUy4lhBnFiJ89bHdZgb9MZB6adGCmh7xwoEyw
io1UUlzaB05kZpYAqMGm8xWop+6zOdFbitaLvTfruQcC1nn2MvUbzxCkhY8C
cmFK8BFu7MQNMbPKgQI/p6XzvCLjEl2vE5Ud2Tdkv9Q3A+9lMAcWyiW8VdoR
pszX9/bQMJMRj/C9g2nieIk4HJw+AFJjOJt8BO6GK+O4HusDZVFdp4p7S57Q
f1JDse8DZmsFuUYLu/HxLHb1/VZCnNHLGIVNUuAiXrV6A0dhmJSehYJGgTGl
059oylj4KWPfnCTEAOzq2F+DDsBTt2/O4Zh/5b8wcr/6+uVLX/0QJJ3lkur9
GuBFCdZGEzdRfeKkNmWxjjA/cGsJf0YX4g0Ayfn3HmImxAOsEIbQjTtuIKyu
QohZ7IWqSUGp/oLMzdeMvZJUYYYxWzjQNVIvCMBjzGnPxUdO/WLWSCPctQFC
XHZFXKThXIxfPl0iOOjOwqibYnSqjUneNFq8CvW4dI5zKnxIfiapCMu6aU03
mI1GAi/22PXgZJR8QYBoWKukClc3+B4hi0NEGFjK3bvbtFDjDYZGxMdshYo/
yHxfE/JWIQaWABuCQqIeAWMpbxxpoLrYNV7xoykUZ0Iu3iCSHWRTbkaCYi5D
eeMTqWX69YNX9NRjBQ1F5CycrSN/rd5xnQcH3eUtVilxLgrP5VLUU1evoImg
gqA9kiQ4wTtKi5Wlni0B2ZvYrxmWTCcvvvMlUcweC+QkiLopnCjRetiveuAw
6v9CHUQQJA6TBElhmMj7DlkUPwfxBqDC6P9B3d6E0hhrZ0xl0QO446uiNTZ8
uCRiDZoy8Aj+z6zXJ4+xrkN3ir1HiKlj3TTyZsR8HNyumnt2gphjrprqN7/p
QeyhFMlHF5yexOFj0CZMvmAJXMlPlVLBqVXkpSJy9nW1/chI99g4adIzgocL
/IjSf7DFmuZqYW7qP+oqaDn1FrZmi5MSAUwpr/uHZ0vnXr3yQtRujQIFshn4
pxafibqPi4WA541gjsZ7fn11e3l79+bq/Nek8PNgTInxf5aoKfiKmDBhhUfV
e/jNf0rnbYcnQMDJPSskr1BuZayn0IdKIo6cHFiyA2V6g/0nbilAbFwzqwYn
PQjtc/kcSOQpdhdl/RyHq+scwl2LBjxz+utHr5Oh4Syvc98LJB8JDMbNDibG
qD+6Z5iFvQA9qBj5zIC6KpzypKVtNwLKs1nCVd65femQF7YRyc0Rhrv8MFsz
HArqzBUGfKSo2qLf2E6BTtspfxTAX1b5gjTXsou913uPKrjYxcKnpt0WcE5V
gJK34qCzgSEPrBQeSUden50g4QqiAO6QxBJEUy0jLsGpUTzhA32DxG07mgdd
9pbS4QrEEwvvvhjPUuGBKqw9toSiwOP06F/xnWC8MR9AKAc/iXikFwR7Ixd4
s3BgqnIAo1qt3NhcW9l77iOO6a48oqOlMd0V9OLJgt1U5LzBgoFIkbnqrJv0
YpqphJsviU4tLST7zDv9tnGoy4ScL8+uzg6RMg220ngIoU3/6fyHMIso6L0q
pP1ueLgsB2klnIGnDcNU2MFa2AJZgUtpaaSWh0hwWOB3edVvFqDxEv7CMBX/
/S7fuxmsz/z7Xd5o4m/hX/0d1pzxPxn+eu7G2L/Dh2jNu9cXbkfuryYkXNDn
1wefmbki4tjYlYs58O5RNjj3ArZCgfyC6PpnX1z8jCCwo9noBycC54Qm+et2
IgPzswoq8B9LJLYHnfx0KrP0H1JL+sSZEGwLotat/z8h3DpTc5HXkX6ajwDC
Y53qenuKfhnSbrqFHxYzgg7o6VReHZ/xR9wLMCnx3447or7xQQAA

-->

</rfc>
