<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.35 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ohai-svcb-config-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.3 -->
  <front>
    <title abbrev="Oblivious Services in SVCB">Discovery of Oblivious Services via Service Binding Records</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-svcb-config-04"/>
    <author initials="T." surname="Pauly" fullname="Tommy Pauly">
      <organization>Apple Inc.</organization>
      <address>
        <email>tpauly@apple.com</email>
      </address>
    </author>
    <author initials="T." surname="Reddy" fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="June" day="19"/>
    <area>Security</area>
    <workgroup>Oblivious HTTP Application Intermediation</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 35?>

<t>This document defines a parameter that can be included in SVCB and HTTPS
DNS resource records to denote that a service is accessible using Oblivious
HTTP, by offering an Oblivious Gateway Resource through which to access the
target. This document also defines a mechanism to learn the key configuration
of the discovered Oblivious Gateway Resource.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ohai-svcb-config/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Oblivious HTTP Application Intermediation Working Group mailing list (<eref target="mailto:ohai@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ohai/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ohai/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-ohai/draft-ohai-svcb-config"/>.</t>
    </note>
  </front>
  <middle>
    <?line 43?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Oblivious HTTP <xref target="OHTTP"/> allows clients to encrypt
messages exchanged with an Oblivious Target Resource (target). The messages
are encapsulated in encrypted messages to an Oblivious Gateway Resource
(gateway), which gates access to the target. The gateway is accessed via an
Oblivious Relay Resource (relay), which proxies the encapsulated messages
to hide the identity of the client. Overall, this architecture is designed
in such a way that the relay cannot inspect the contents of messages, and
the gateway and target cannot learn the client's identity from a single
transaction.</t>
      <t>Since Oblivious HTTP deployments typically involve very specific coordination
between clients, relays, and gateways, the key configuration is often shared
in a bespoke fashion. However, some deployments involve clients
discovering targets and their associated gateways more dynamically.
For example, a network might operate a DNS resolver that provides more optimized
or more relevant DNS answers and is accessible using Oblivious HTTP, and might
want to advertise support for Oblivious HTTP via mechanisms like Discovery of
Designated Resolvers (<xref target="DDR"/>). Clients can access these
gateways through trusted relays.</t>
      <t>This document defines a way to use DNS records to advertise that an HTTP service
supports Oblivious HTTP. This advertisement is a parameter that can be included in SVCB
and HTTPS DNS resource records <xref target="SVCB"/> (<xref target="svc-param"/>).
The presence of this parameter indicates that a service can act as a target and
has a gateway that can provide access to the target.</t>
      <t>The client learns the URI to use for the gateway using a well-known
URI <xref target="WELLKNOWN"/>, "ohttp-gateway", which is accessed on the
target (<xref target="gateway-location"/>). This means that for deployments that
support this kind of discovery, the gateway and target resources need to
be located on the same host.</t>
      <t>This document also defines a way to fetch an gateway's key
configuration from the gateway (<xref target="config-fetch"/>).</t>
      <t>This mechanism does not aid in the discovery of relays;
relay configuration is out of scope for this document. Models in which
this discovery mechanism is applicable are described in <xref target="applicability"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="applicability">
      <name>Applicability</name>
      <t>There are multiple models in which the discovery mechanism defined
in this document can be used.</t>
      <ul spacing="normal">
        <li>Upgrading regular (non-proxied) HTTP to Oblivious HTTP. In this model,
the client intends to communicate with a specific target service, and
prefers to use Oblivious HTTP if it is available. The target service
has a gateway that it offers to allow access using Oblivious
HTTP. Once the client learns about the gateway, it "upgrades"
to using Oblivious HTTP to access the target service.</li>
        <li>Discovering alternative Oblivious HTTP services. In this model,
the client has a default target service that it uses. For
example, this may be a public DNS resolver that is accessible over
Oblivious HTTP. The client is willing to use alternative
target services if they are discovered, which may provide more
optimized or more relevant responses.</li>
      </ul>
      <t>In both of these deployment models, the client is configured with
a relay that it trusts for Oblivious HTTP transactions. This
relay either needs to provide generic access to gateways, or
provide a service to clients to allow them to check which gateways
are accessible.</t>
    </section>
    <section anchor="svc-param">
      <name>The ohttp SvcParamKey</name>
      <t>The "ohttp" SvcParamKey (<xref target="iana"/>) is used to indicate that a
service described in an SVCB record can be accessed as a target
using an associated gateway. The service that is queried by the client hosts
one or more target resources.</t>
      <t>In order to access the service's target resources using Oblivious HTTP, the client
needs to send encapsulated messages to the gateway resource and the gateway's
key configuration (both of which can be retrieved using the method described in
<xref target="config-fetch"/>).</t>
      <t>Both the presentation and wire format values for the "ohttp" parameter
<bcp14>MUST</bcp14> be empty.</t>
      <t>The "ohttp" parameter can be included in the mandatory parameter
list to ensure that clients that do not support access via Oblivious HTTP
do not try to use the service. Services that mark the "ohttp"
parameter as mandatory can, therefore, indicate that the service might
not be accessible except through Oblivious HTTP. Services that optionally
support access using Oblivious HTTP <bcp14>SHOULD NOT</bcp14> mark the "ohttp" parameter
as mandatory. Note that since multiple SVCB responses can be provided for
a single query, the oblivious and non-oblivious versions of a single
service can have different SVCB records to support different names or properties.</t>
      <t>The media type to use for encapsulated requests made to a target service
depends on the scheme of the SVCB record. This document defines the
interpretation for the "https" <xref target="SVCB"/> and "dns" <xref target="DNS-SVCB"/>
schemes. Other schemes that want to use this parameter <bcp14>MUST</bcp14> define the
interpretation and meaning of the configuration.</t>
      <section anchor="use-in-https-service-records">
        <name>Use in HTTPS service records</name>
        <t>For the "https" scheme, which uses the HTTPS RR type instead of SVCB,
the presence of the "ohttp" parameter means that the target
being described is an Oblivious HTTP service that is accessible using
the default "message/bhttp" media type <xref target="OHTTP"/>
          <xref target="BINARY-HTTP"/>.</t>
        <t>For example, an HTTPS service record for svc.example.com that supports
a Oblivious HTTP could look like this:</t>
        <artwork><![CDATA[
svc.example.com. 7200  IN HTTPS 1 . ( alpn=h2 ohttp )
]]></artwork>
        <t>A similar record for a service that only supports Oblivious HTTP
could look like this:</t>
        <artwork><![CDATA[
svc.example.com. 7200  IN HTTPS 1 . ( mandatory=ohttp ohttp )
]]></artwork>
      </section>
      <section anchor="use-in-dns-server-svcb-records">
        <name>Use in DNS server SVCB records</name>
        <t>For the "dns" scheme, as defined in <xref target="DNS-SVCB"/>, the presence of
the "ohttp" parameter means that the DNS server being
described has a DNS over HTTP (DoH) <xref target="DOH"/> service that can
be accessed using Oblivious HTTP. Requests to the resolver are sent to
the gateway using binary HTTP with the default "message/bhttp"
media type <xref target="BINARY-HTTP"/>, containing inner requests that use the
"application/dns-message" media type <xref target="DOH"/>.</t>
        <t>If the "ohttp" parameter is included in an DNS server SVCB record,
the "alpn" <bcp14>MUST</bcp14> include at least one HTTP value (such as "h2" or
"h3").</t>
        <t>In order for DoH-capable recursive resolvers to function as Oblivious HTTP targets, their
associated gateways need to be accessible via a client-trusted relay.
DoH recursive resolvers used with the discovery mechanisms described
in this section can either be publicly accessible, or specific to a
network. In general, only publicly accessible DoH recursive resolvers will work
as Oblivious HTTP targets, unless there is a coordinated deployment
with a relay to access the network-specific DoH recursive resolvers.</t>
        <section anchor="ddr">
          <name>Use with DDR</name>
          <t>Clients can discover that a DoH recursive resolvers support Oblivious HTTP using
DDR, either by querying _dns.resolver.arpa to a locally configured
resolver or by querying using the name of a resolver <xref target="DDR"/>.</t>
          <t>For example, a DoH service advertised over DDR can be annotated
as supporting resolution via Oblivious HTTP using the following record:</t>
          <artwork><![CDATA[
_dns.resolver.arpa  7200  IN SVCB 1 doh.example.net (
     alpn=h2 dohpath=/dns-query{?dns} ohttp )
]]></artwork>
          <t>Clients still need to perform verification of oblivious DoH servers,
specifically the TLS certificate checks described in <xref section="4.2" sectionFormat="of" target="DDR"/>.
Since the gateway and target resources for discovered oblivious services
need to be on the same host, this means that the client needs to verify
that the certificate presented by the gateway passes the required checks.
These checks can be performed when looking up the configuration on the gateway
as described in <xref target="config-fetch"/>, which can either be done directly
or via the relay or another proxy to avoid exposing client IP addresses.</t>
          <t>Opportunistic discovery <xref target="DDR"/>, where only the IP address is validated,
<bcp14>SHOULD NOT</bcp14> be used in general with Oblivious HTTP, since this mode
primarily exists to support resolvers that use private or local IP
addresses, which will usually not be accessible when using a
relay. If a configuration occurs where the resolver is accessible, but
cannot use certificate-based validation, the client needs to ensure
that the relay only accesses the gateway and target using
the unencrypted resolver's original IP address.</t>
          <t>For the case of DoH recursive resolvers, clients also need to ensure that they are not
being targeted with unique DoH paths that would reveal their identity. See
<xref target="security"/> for more discussion.</t>
        </section>
        <section anchor="dnr">
          <name>Use with DNR</name>
          <t>The SvcParamKeys defined in this document also can be used with Discovery
of Network-designated Resolvers (DNR) <xref target="DNR"/>. In this
case, the oblivious configuration and path parameters can be included
in DHCP and Router Advertisement messages.</t>
          <t>While DNR does not require the same kind of verification as DDR, clients
that learn about DoH recursive resolvers still need to ensure that they are not being
targeted with unique DoH paths that would reveal their identity. See <xref target="security"/>
for more discussion.</t>
        </section>
      </section>
    </section>
    <section anchor="gateway-location">
      <name>Gateway Location</name>
      <t>Once a client has discovered that a service supports Oblivious HTTP
via the "ohttp" parameter in a SVCB or HTTPS record, it needs to be
able to send requests via a relay to the correct gateway location.</t>
      <t>By default, the gateway for a target is defined as a well-known
resource (<xref target="WELLKNOWN"/>) on the target, "/.well-known/ohttp-gateway".</t>
      <t>Some servers might not want to operate the gateway on a well-known URI.
In such cases, these servers can use 3xx redirection responses
(<xref section="15.4" sectionFormat="of" target="HTTP"/>) to direct clients and relays to the correct
location of the gateway. Such redirects would apply both to requests
made to fetch key configurations (as defined in <xref target="config-fetch"/>) and to
encapsulated requests made via a relay.</t>
      <t>If a client receives a redirect when fetching the key configuration from the
well-known gateway resource, it <bcp14>MUST NOT</bcp14> communicate the redirected
gateway URI to the relay as the location of the gateway to use.
Doing so would allow the gateway to target clients by encoding
unique or client-identifying values in the redirected URI. Instead,
relays being used with dynamically discovered gateways <bcp14>MUST</bcp14> use the
well-known gateway resource and follow any redirects independently of
redirects that clients received. The relay can remember such redirects
across oblivious requests for all clients in order to avoid added latency.</t>
    </section>
    <section anchor="config-fetch">
      <name>Key Configuration Fetching</name>
      <t>Clients also need to know the key configuration of a gateway before encapsulating
and sending requests to the relay.</t>
      <t>In order to fetch the key configuration of a gateway discovered
in the manner described in <xref target="gateway-location"/>, the client issues a GET request
to the URI of the gateway specifying the "application/ohttp-keys" (<xref target="OHTTP"/>)
media type in the Accept header.</t>
      <t>For example, if the client knows an oblivious gateway URI,
"https://svc.example.com/.well-known/ohttp-gateway", it could fetch the
key configuration with the following request:</t>
      <artwork><![CDATA[
GET /.well-known/ohttp-gateway HTTP/1.1
Host: svc.example.com
Accept: application/ohttp-keys
]]></artwork>
      <t>Gateways that coordinate with targets that advertise Oblivious HTTP
support <bcp14>SHOULD</bcp14> support GET requests for their key configuration in this
manner, unless there is another out-of-band configuration model that is
usable by clients. Gateways respond with their key configuration in the
response body, with a content type of "application/ohttp-keys".</t>
      <t>Clients can either fetch this key configuration directly, or do so via
a proxy in order to avoid the server discovering information about the
client's identity. See <xref target="consistency"/> for more discussion of avoiding key
targeting attacks.</t>
    </section>
    <section anchor="security">
      <name>Security and Privacy Considerations</name>
      <t>Attackers on a network can remove SVCB information from cleartext DNS
answers that are not protected by DNSSEC <xref target="DNSSEC"/>. This
can effectively downgrade clients. However, since SVCB indications
for Oblivious HTTP support are just hints, a client can mitigate this by
always checking for a gateway configuration <xref target="config-fetch"/>
on the well-known gateway location <xref target="gateway-location"/>.
Use of encrypted DNS along with DNSSEC can also be used as a mitigation.</t>
      <t>When clients fetch a gateway's configuration (<xref target="config-fetch"/>),
they can expose their identity in the form of an IP address if they do not
connect via a proxy or some other IP-hiding mechanism. In some circumstances,
this might not be a privacy concern, since revealing that a particular
client IP address is preparing to use an Oblivious HTTP service can be
expected. However, if a client is otherwise trying to hide its IP
address or location (and not merely decouple its specific requests from its
IP address), or if revealing its IP address facilitates key targeting attacks
(if a gateway service uses IP addresses to associate specific configurations
with specific clients), a proxy or similar mechanism can be used to fetch
the gateway's configuration.</t>
      <t>When discovering designated oblivious DoH recursive resolvers using this mechanism,
clients need to ensure that the designation is trusted in lieu of
being able to directly check the contents of the gateway server's TLS
certificate. See <xref target="ddr"/> for more discussion, as well as the Security
Considerations of <xref target="DNS-SVCB"/>.</t>
      <section anchor="consistency">
        <name>Key Targeting Attacks</name>
        <t>As discussed in <xref target="OHTTP"/>, client requests using Oblivious HTTP
can only be linked by recognizing the key configuration. In order to
prevent unwanted linkability and tracking, clients using any key
configuration discovery mechanism need to be concerned with attacks
that target a specific user or population with a unique key configuration.</t>
        <t>There are several approaches clients can use to mitigate key targeting
attacks. <xref target="CONSISTENCY"/> provides an overview
of the options for ensuring the key configurations are consistent between
different clients. Clients <bcp14>SHOULD</bcp14> employ some technique to mitigate key
targeting attacks, such as the option of confirming the key with a shared
proxy as described in <xref target="CONSISTENCY"/>. If a client detects that a gateway
is using per-client targeted key configuration, the client can stop using
the gateway, and potentially report the targeting attack to let other
clients avoid using this gateway in the future.</t>
      </section>
      <section anchor="dohpath-targeting-attacks">
        <name>dohpath Targeting Attacks</name>
        <t>For oblivious DoH servers, an attacker could use unique <tt>dohpath</tt> values
to target or identify specific clients. This attack is very similar to
the generic OHTTP key targeting attack described above.</t>
        <t>Clients <bcp14>SHOULD</bcp14> mitigate such attacks. This can be done with a
check for consistency, such as using a mechanism described in <xref target="CONSISTENCY"/>
to validate the <tt>dohpath</tt> value with another source. It can also be
done by limiting the the allowable values of <tt>dohpath</tt> to a single
value, such as the commonly used "/dns-query{?dns}".</t>
      </section>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <section anchor="svcb-service-parameter">
        <name>SVCB Service Parameter</name>
        <t>IANA is requested to add the following entry to the SVCB Service Parameters
registry (<xref target="SVCB"/>).</t>
        <table>
          <thead>
            <tr>
              <th align="left">Number</th>
              <th align="left">Name</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD</td>
              <td align="left">ohttp</td>
              <td align="left">Denotes that a service operates an Oblivious HTTP target</td>
              <td align="left">(This document)</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="well-known-uri">
        <name>Well-Known URI</name>
        <t>IANA is requested to add one new entry in the "Well-Known URIs" registry <xref target="WELLKNOWN"/>.</t>
        <t>URI suffix: ohttp-gateway</t>
        <t>Change controller: IETF</t>
        <t>Specification document: This document</t>
        <t>Status: permanent</t>
        <t>Related information: N/A</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="OHTTP">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="15" month="March" year="2023"/>
            <abstract>
              <t>   This document describes a system for forwarding encrypted HTTP
   messages.  This allows a client to make multiple requests to an
   origin server without that server being able to link those requests
   to the client or to identify the requests as having come from the
   same client, while placing only limited trust in the nodes used to
   forward the messages.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-ohttp-08"/>
        </reference>
        <reference anchor="DDR">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Kinnear" initials="E." surname="Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Patrick McManus" initials="P." surname="McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="5" month="August" year="2022"/>
            <abstract>
              <t>   This document defines Discovery of Designated Resolvers (DDR), a
   mechanism for DNS clients to use DNS records to discover a resolver's
   encrypted DNS configuration.  An encrypted DNS resolver discovered in
   this manner is referred to as a "Designated Resolver".  This
   mechanism can be used to move from unencrypted DNS to encrypted DNS
   when only the IP address of a resolver is known.  This mechanism is
   designed to be limited to cases where unencrypted DNS resolvers and
   their designated resolvers are operated by the same entity or
   cooperating entities.  It can also be used to discover support for
   encrypted DNS protocols when the name of an encrypted DNS resolver is
   known.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-ddr-10"/>
        </reference>
        <reference anchor="SVCB">
          <front>
            <title>Service binding and parameter specification via the DNS (DNS SVCB and HTTPS RRs)</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google</organization>
            </author>
            <author fullname="Mike Bishop" initials="M." surname="Bishop">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Erik Nygren" initials="E." surname="Nygren">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="11" month="March" year="2023"/>
            <abstract>
              <t>   This document specifies the "SVCB" and "HTTPS" DNS resource record
   (RR) types to facilitate the lookup of information needed to make
   connections to network services, such as for HTTP origins.  SVCB
   records allow a service to be provided from multiple alternative
   endpoints, each with associated parameters (such as transport
   protocol configuration), and are extensible to support future uses
   (such as keys for encrypting the TLS ClientHello).  They also enable
   aliasing of apex domains, which is not possible with CNAME.  The
   HTTPS RR is a variation of SVCB for use with HTTP [HTTP].  By
   providing more information to the client before it attempts to
   establish a connection, these records offer potential benefits to
   both performance and privacy.

   TO BE REMOVED: This document is being collaborated on in Github at:
   https://github.com/MikeBishop/dns-alt-svc
   (https://github.com/MikeBishop/dns-alt-svc).  The most recent working
   version of the document, open issues, etc. should all be available
   there.  The authors (gratefully) accept pull requests.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-svcb-https-12"/>
        </reference>
        <reference anchor="WELLKNOWN">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="DNS-SVCB">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google LLC</organization>
            </author>
            <date day="14" month="March" year="2023"/>
            <abstract>
              <t>   The SVCB DNS resource record type expresses a bound collection of
   endpoint metadata, for use when establishing a connection to a named
   service.  DNS itself can be such a service, when the server is
   identified by a domain name.  This document provides the SVCB mapping
   for named DNS servers, allowing them to indicate support for
   encrypted transport protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-svcb-dns-08"/>
        </reference>
        <reference anchor="BINARY-HTTP">
          <front>
            <title>Binary Representation of HTTP Messages</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a binary format for representing HTTP messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9292"/>
          <seriesInfo name="DOI" value="10.17487/RFC9292"/>
        </reference>
        <reference anchor="DOH">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="DNR">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Neil Cook" initials="N." surname="Cook">
              <organization>Open-Xchange</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="27" month="April" year="2023"/>
            <abstract>
              <t>   The document specifies new DHCP and IPv6 Router Advertisement options
   to discover encrypted DNS resolvers (e.g., DNS-over-HTTPS, DNS-over-
   TLS, DNS-over-QUIC).  Particularly, it allows a host to learn an
   authentication domain name together with a list of IP addresses and a
   set of service parameters to reach such encrypted DNS resolvers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-dnr-16"/>
        </reference>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="DNSSEC">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System.  This document introduces these extensions and describes their capabilities and limitations.  This document also discusses the services that the DNS security extensions do and do not provide.  Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="CONSISTENCY">
          <front>
            <title>Key Consistency and Discovery</title>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Matthew Finkel" initials="M." surname="Finkel">
              <organization>The Tor Project</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="24" month="October" year="2022"/>
            <abstract>
              <t>   This document describes the key consistency and correctness
   requirements of protocols such as Privacy Pass, Oblivious DoH, and
   Oblivious HTTP for user privacy.  It discusses several mechanisms and
   proposals for enabling user privacy in varying threat models.  In
   concludes with discussion of open problems in this area.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-key-consistency-00"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA61cbXPbRpL+Pr9iQn9Y+YqkItu7m+jWm8iSE6tiSz5JPlfq
6uoWBIbkrEmAhwEoM4ryW/a33C+7fpsXgKAvdXeqSoUEgZmenu6nn+5peDKZ
qMY2K3OqRxfW5dXW1DtdzfX1bGW3tmqdvjX11ubG6a3N/Bf9ypaFLRf6xuRV
XbiRymaz2mxhlIEHbalv//X81UjlWWMWVb071a4plGtqk61P9eXrux+UKqq8
zNYgR1Fn82ZiTTOfVMvMTtw2n03yqpzbxeTrFyqDh2CaW5O3tW12I3Vf1Z8W
ddVuOpO/ubt7r882m5WFSW1V6suyMfXaFJa+jtQns4Mni1P+oTTN5AInVltT
tuZUaf2/GFPrZrdBVX4EmVA9P+IYeH2d2RVcxwV9j0ubVvUCr2d1voTry6bZ
uNPjY7wNL9mtmfrbjvHC8ayu7p05xgGO8cGFbZbt7FSTnu4XpKpjVl1fa0rB
vjxXKmubZVXD0ibwvNas7btqvd7p91m72tFVmDAr7S+0oFNarIFl5lP60fAy
mg3e/n2GP07zat0b0dbtOlsZd5/VYB9FMTTwVfXJZumYn6qyaGz9/QK/0qCq
rOo13L6F3VC2nCff1GQy0dkMDCjLG6XultZpsJ92bcpGF2ZuS7C6TG+yGiSC
LdLNMmt0npV6ZsAa81VbmMKbpc7Kgrb2Vl1c3erauKqtwcRrNm3dVDBkWTWG
R8m0Ex+ASbMc7NvZGSipdbjhwVgUjjjWM3SmuanxN5g+2tKP4Ar32Q4UJNM1
S7CVxVLfL22+xEl5bLhuVJPVC9NMdXeh2cpVyWrXJl+Cht0aH16ZrC7xWQ12
rtkO2pqUr8C78YdC3B00cVisKet6bYtiZZR6giZfV0Wb00iq5xsPD19d44eX
l5OLad+PKzTyx0cQewWmrPOVhUWQek2Z17tNo9aw3mwBizGfcSkLkOwezLyr
uDvSRdTbESvnKWrHaD8EwgSOm21cu4I10W7LPPAlzIR6/tK2qKMFX3k6lp3B
7y5sTkWqjPtjtNwfrQOmQ+TMykRbN2aV7v1Rjd/DFJu6+mwNbX13DWF1MO/S
FobugP+XAOGE2vidFTvV17C3oOsxXERZEFUakzdtTZZbGGcXpSnAs7RrYdJM
o9Rk4jgKSYQuA5YPunMbeJSHrwD0cONgOi/PGH1INcnq0adYK36MaJEs4B9c
lHxeV2t0LPASsDLw6tJlZGFgfrfgr0b3DK0wm1W1W7MB7TaAx6sVqLzcVqut
0RTDUGI7tzkIDG5sS7b9mWnujSm99Y15nbwAL7wbDzsOqq2aw+K1W4J5keoy
QBS3qT4ZPc/cEiXWb6p7AxKMtavWpiOpl08mV94DERxYWY4VtzS21plzVW5p
371gel3B7hU7AFpe8lT9UNXgLtkaoBgWoSGOYTwEh10sG11twAQAuDLtkQ2m
FzQEI9vCBsiY1aaxa/sLLArGoyugGLPNAGbwUdiQe1OzdF+EPc2wh/eRCOoe
h0AvK2DmxjoD1rbZVHWjAdD724p+EmDM6ZUFvaasRF2Q1ZJObmQ1Th8B7Fxc
3PRBJyuKSVHUj48ADecCNhgCIq46o4JmPfw2detweLaL6eHgQt5SwfqNKDdE
i7hUDhglL07ChpL1u97iBd3DwzSd/f1hTIUwpgfDGCgJb+trqShdtWG2QCQE
ABr0Cd8nNC1qTyGsbWBAg55IKANyRamQCuaEir0AydqGK7gKQQMEiiVd8FAR
FiUWOYytiqRgz2EsYXz8cHPptwENKsUgNk3YKbNaTT6V1X2p8G5QxMfXb9/+
dHX98erlzQ/n3/zp5I+Pj2MkZ6CAiTw98mCc4nhVJuEY9SQ3T1YVM0IyNtrH
tclKUQjK1QEsuOitgHUJXLFAxXpA2I31ATD12+rA00GgpgJE0zR7EE872Be9
rFyzZ709xiAmPDdNTkFW5gNkBuxTXewjiE6FgtULKafnyVCULN0TkaJCQQH8
M0t2mtIOilfsZf+sJNrsoW3b4F3wwMZvb7KcqX5XFWZF+QXtleKfwwRRENxE
5u2IWcgNAPny2s7Yfx4e/K92BfHo8XGKVOe8KrcYoKqSge8CFWfpO1sjRoh7
cq7Ruw+3d2Ay9H99dU2fb17/y4fLm9cX+Pn2zdnbt+GDkjtu31x/eHsRP8Un
z6/fvXt9dcEPw1XduaRG785+HjHMjq7f311eX529HbGGO/sNC4UNJrQATwUf
RjPJIPKkq391/v6//nHyAh0D3OHZycm3AAL85ZuTP7+AL/dLU/JsVQlxlr/C
Zu4U6A18EUeBcARevLENGNkYXd4tweP0EggmaPOf/g018++n+i+zfHPy4q9y
ARfcueh11rlIOtu/svcwK3Hg0sA0QZud6z1Nd+U9+7nz3es9ufiX71bgWnpy
8s13f1VoQmepWemHJ10zIyuq2R7X7aqxmGytuzbd85nEt8iNiYR0N13iAyBi
gexdf9gs6oyS9dosgEjW+qisygmTzOIpByewkn44upSBSaCxisyNjKnkWAeJ
2rotCf6Fq0fiJZAl0YA5IpjgHGO2QHYv/tu5thz0tpgIg68yp+6ONBQ/bMN5
FgdgzDB8GBnKy4Acl7lJyKiPKNkMISeBuTGOPGpJhcaNFMm9z3i6+VpPXtqF
i4TrZSusOFAy2x9HHnFfUj8vH/YfsvCmN1fQBmgXBgF2qAI75OFAYzNkhJsW
Zs4HiGGX36HMap+pRFtwsO+rFVFY3tNkdaornMMNRthgBA75pw+1KJsnAchB
VWCleo+V1ki7S1ykUqCqWQW2xwmQS0m3uNM43WsQ2UcayTBVJvmO1x6xQDdE
UZPkxHGol+BlYBxQIYZlMkK/kIUpYdfzhNXENAN2J5CeuINVmhuzLcPQlNbn
S5N/ShJRHIZS3bhjFLpwg4jO6Ntt/h6Z2k8G8SfyOo5gzHlGnbsgsNuszCCg
o6YQRnBmT/KE4ykvbSeSZFJRYc7pkSjQp4QHKiFn5UCaw/bVNWin/7MFNcJN
s126l0hznKoAdL2F9IkS2weIg/bd8VKZAejOHrkazmrivCpsM5DiYjhJ9wTW
41Rg5JLiRbql9lPNI2/QvNeiSYjfoIMtTMICNlTxaJZV0dkHNUTNXuGATWDy
Dc+DstzbmtjVGhS9zVatcYFKe/sIZF9R1AZRzHrT7KZdK4opwUCOQrLCdFlT
QRyLA66sa7gI5LA0wdmAt3/8UlREIT1hlg3EVLG7P0pubOqQmCW7PI3laBp1
nUGWnCxRReEzlwgKK6GNh7gF1jXu+UEygeS7KMEs9UcsZplNExLMPpZ2xULE
q0pM7VVvwYNhJ9KbvQUlKk4XNNVXoZTpqLQSmIe4ruCq30MBqAJtQvkaDXmj
ZClVEAmNCalFvIL5OfFnsORQ30nTw2W2xUiAoRvdOUEP9i7RQbwDa8wOnR3k
2mCmbJxYIdXhqQCfJoQd16wNyI3Avs4KuivrUwuIHERtfCoFgLs2vrKWSNev
xfqkCtPDwLUlc/K+RPn1CJg1joOFUGTvkH/jpa8gDk+G8nOsYlB2Djc+PioW
CCLPNUUb+crb6UstbPmdFJ28lmUcEpHKNZCwooX5KmIKRxhTnugPDj1aagx+
E2WzFBWi0mWyaD60Ix2hn/npmxveKFu6xmSU++LimeZ0Sw1D8JIk15FuQSaM
8idA6Lq13ZRgDVEd8jCSwHOrkWD58YwlSEzs4YEq3bAlsHmvLq/Obn6eUOkb
sqZvn337jHLIbnFuWHVkH7DDU7kRzz7EPaVQpPpIB5vTrgpI+6tPXCPD3T5V
6rffflO9kab6z8++/lrryyuZ/ERP9RGwik35cvlMOMJTelKdgYOu8fwplSzr
aozyvwMVLPV/Fiug1EsWrCNetEDkrCgVWEIKGIkNkld5C8ycT5Y41/euhkWf
nr2p32Vvyfxkc0k6zdwcb0Bqy7t1dFG9eUo+fv2GCk4vvsGkuqNXwEKVUqUh
tJ/qG49fQi0CcUcKiEEdC0L7JbCZLTMIZSQMJWlfsHHVsfHEsFFbWPvPLMGE
LYHWRkClRUjIVaMsnpEew1ZMZIqeA4E6yEsuD7m5dR0GkR3aeYaNERr1iKFO
HtMZZXYO7dZIiRkJjj7iIw8HaPVshDR8tHw+eppSRbR92LcJRA+qGdV43uww
Y6tD4RlrZ22ZM4T2vcFX9MdczldD5Xyp4fUIA50WCQeadOrRUwUiDYpCND3u
7X69wEVgDCUDZ1h2DMSSvmDAp8QQ3DyKhJlKktdD3FRy0EB5KqU42WrM6DDw
vD4kNqaOWEL7pL6gv7ZcCWXno6ssHumYIsn1lBQgJJXrcH0RdxIWcUAiinQM
NDTaxcUNpE14jKBUeojgNexL3ocW6AlMb20camDwcVD8jjkV+tZ/gM9M/RjT
rN5kzFWwzovnXDF7VQEBqu4QMT9AwsT0K9wLrndxMxCgaBUelsJBRMFQhprw
CR0e6KHycddkhVxfgglaMql9ep6INK8wqeUn0H8lRgwsO4YJcvcTIFzLEEdK
rMFTD0GIZ/DzJmuWLwl1SBkP3yFx6kYSv5GuQfPzTghsEpMg5KxoIcyMQHGR
zXr1wMaOlbck2hFc1d3bW52jyuacIFCu7vqF5lvxuRfTZzi4bAQfcv6PNX86
SYjH9lEyX2BRCaL0TwN8AagbyySPDvksrX6n4u/JiiRzjEm4F3YD4Cb8DiOC
ReF4+XR45IIyfE7BqkbIWpqSGAMZ7WafevplyFQq29NoN9UdJxlzxLQC8b8A
ufIGMivQItpnPOZGngMmjTdjWZTBY1tZyOw/byqyW9HT5XtwjKLGII1YcU22
3wLANoApEXbFw1AYBC3CRZwuPo5ABrHIFuhHY5UkclK7xcUJsDIU9asRTmxG
aoRqU1vIAS3MZD5bIQkefpKY5QM13L7FTYW1E66AbCoszWuR8Ll1LRn5fmpL
uyeVHC6DQTyYE0B3tjBHYBRddHhLh4CP9axtlLQLoIiJ7U1mGTVSsMZg0PGg
9XIRQfW6GEj9Qq3cIS+L7L8tY6OIl/QPmHPaBcScVbKJ00g5c5CPHHo4EIxD
TYPO4LybpkWPUBiF5Usuw6L5yA5mBpBGMyDI+ayPSHdttgZE484B31eBxQUD
+YmTXjkgnXNfJkNbbZ3zyV0a8q4o5JW11AiT2mCHSDf7R4vJ0YOM5T0Cm46u
JAYXg4f4MC2T5Kvhk3yQ5zFUxRWqu19+6Bodbi2qKfJJ1y9LIRG6eHP+nu69
qVrknGed83dfywMdfVxaJDKgnHCqKVgXYdaf43ZCCCAWBXrf9UG7xt0wfNxw
kDt0wtMhU5EU5P/DVHRqKuqAqYQWqbdy5g3GsncMDsiI4JSlRxZJ4Or1CRzK
Jz1ID2QG2HlDlKCqJYOUVACr9wEOZkYRefd12pCuMMUORJGjTo3hIUCDXwuW
Tnc+W+qey3N+LPhho3NQDph0HYTK79HDQ2g9wPq6xDYeYaxHx9P41HG3HQE7
obCfSPiHNPjg/vuyj2/2SSVE80skwW6JKeY4lP6gD3F64uK46CKIvc8/fwb9
cMjETQ51QXUUSczJH6cv0N6/CpWPk5OvcWHYM0mPRtgrfU9NT+HKK9qXe8Ip
wC0K6WVwYr2YWu74uAfG8RuqfEGPexn26umAL/0qQK9CzqGgUl+oFyZGw1lr
MG8Q0IDvOvpZFk6xkUb3tHe/yu+bKlSyRf3jArJof1beOW/lAMfTAZj5B6Uj
Joa/jGPeAT1LxRBTSxQUUFwU7Q+e0ht9S59sKtBA0FeFh8tKIAdcQjJXhpY5
pSNyrCDHAFFoMkgAdaoCjpUYCAe/GEWShrcURUIaTdrxxYcvqJL2mJMP+LhL
bAtwmwq/IPGKGs3iT50DCdnogo+oQo8kfFqb9QwLsh2bVVleV8D1YowKFkXY
gS0TMrJNz6iIekLUg0WiIZb5jpAXT+fOOwb0g7evhycde445ToduoFoOmCJl
iF5hMzrsSGrnuMGoPERRztv6hShximQV7Iq/Y7a4pSqeE2F1qUf095utese6
riUX/PH1nRdQiXzoEz2z5/xt552zU7Ni6AWx3QgxWyq9T9PamEh6ltPhzhLM
F3LWXkJt04ZcUj5VpKM1JC47VuElgF6t9AtBgbCBq65B2wOHiaEulCbepB/J
vFFjh6ehAHt8Mj1RbyCNPO0XqxXr4FQPa5BT7h9jnyW6U6jfiGzS/Mq8ILRP
9uiAT2YkV/Jfk+0OB5fAbAbad4U7snUN1JUkBQRONqnmkHGAwXdHoGYCf3Sg
WkfkAkBQnHiqwzI5XMaS3GGBjPKhFaJasRv7Nhrps2ZrA9s9ZKDTbmFKcl5v
DtYNzOsTYSrrFRViPsQ2lUnyuw9F/pjTxPID14DlpYyqjJ0zaq+923NLEMJB
YopwNpyJECzghDg4tiCyXVB62TQZlRMABv2rPwTn7zGNzQkXHUzow/3Dk8Bk
lTqjh5HdEB/yPdIC3LAappLpcigy58jSG/OZeqCV74FmIxXyDRprOJKBGcBd
t6/PYaXf8SdkRC++fv4cE5c7zlpgg+ZzZE9bg8EMfI06i6IFxe5xSu9FsEI2
3qmBlpRwUAwy/b11gEaWWtsDPcFp17axC2YNFgO3ylZkqFSYQQ0zmfUu3zWY
PltSQlwHYm1gGUN4PVUfOEuOCTZ1l68qEECST1IhdQ5j5PLZJFFqWQOT8o/L
2MbvW1iTDtZeO8Ue36MzAw7eVOMxvYTIAzyVBNEuy07xRvqYuOUAW2VL5HzM
ENmLsGKOhJ0x5fL9ZMl2HSrylMzSLbmtIYt2TQY77sbcxRr5PXdriZnDTLmp
S28enMtxDKOUClKkxubY5af2KlaIcZvawC1pt9bBE1JOlhVohww8MU2bUF/s
0sUV3lO/Oxef/dspFnYmVpV8pYk3hHsFMMOuyRMge2uxCQGfCUX6COvojvCT
iqt5Suhl54kOeL6w3HmWY58ldaYjCO6hiTqyKQ/xC6ez6rTQR0Doj2/SF0vS
DINPH+KPbJlPxx2DkPPV2MWZVkw8Z0pP8PqW7A0/heGkntKtVQ8fFLG1pH3a
Y+X96ECxIUwhfdn+UAp8BB5skTAzZ/fZto8w0rDW9N4b6vAwiiuwzru3tyqp
+PmoQa9wDEULOthFBPIJjo8LqhcLYML00JebGZBL3wWD4AjhmEaHIAWRw/kJ
PQm9DmehPvUTEx06sSXAp+ojdunb8hPHCSxVLEr7y8HEkKDBx2DsmcU+dOAr
mOpjTgAj+Z5iSlvrjDA8Fhl9d91uoJN/qJk4OTYQhAnv3omrsCnIOxzRzMFw
6expU20oT/BsM/MlqP21pV3PztBLakgd6yoDY4nvBfpCBEgVYlfHi5XnBBhw
z6+vbi9v715fnf9M1UOqGwpo4ukEcqVJl4CEF6Bwj7bo++bevxvJbVhOOojA
Fw5ulaN1hJERrukNMxVblkJs9zxNCKxZ48klhwAgEUtWWG+9+xxorP3hdZQU
bZzEqteppL4jm19XYxjaP0BJdEcl1gTdC9PEJDggpbLewjamnsitoQC5p6JO
lobb6ppqk9TbQ6s1lWwr1KKlXB9iFb8iY/awm99xbTj2BPhitppAXHgZU4J5
i68/MgDIUeE+CHASN3zqRw2rwiYl8UIbFVv/m4z5N6l3qFgxqTyzmO/2YoR/
84sXZp28vyixwnd0SBsx4c9gOEu2Fcj41iSJgRhcsCs2IO8+NLsEIjooY7NR
jN3oAonjROvzr1elryQctivUhT/vor3oKcu/6ct0SV4+1pdNSgUVSQcAurK4
FDF0/I+KVRR8pNIE/hAnoMNzaT6k37suhDU1AmmKwqP+2fGIko7Ls6uz/SSD
GqXJnIio+38d4X1ovVT0nA2FH4ZZYBa9fBy2qQ6l6OGxsNF8AbtQU4s2xzJs
WflVX7VUe9LwCU8h4t+v+p109X3h71d9Ywipcv/orzDmhP90+HTowtDf/k00
5t2rC5mRj+MTES7oDfu9Nwilpj3UyCeOBc8edVoxn8JUuCEfMTf5yVe9v7AR
aFOluZctEKQYdR93Ix2U36nhg/6xtuTa+dx+PtWdugn4H73FTtSnhq02tf/H
Lm598wBHZBH9tNtUCrcBeW3dKcLsOivpEr45ztQrJKun+ur4jN/Tn4FHq/8G
arbPJNRDAAA=

-->

</rfc>
