<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ohai-svcb-config-06" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->
  <front>
    <title abbrev="Oblivious Services in SVCB">Discovery of Oblivious Services via Service Binding Records</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-svcb-config-06"/>
    <author initials="T." surname="Pauly" fullname="Tommy Pauly">
      <organization>Apple Inc.</organization>
      <address>
        <email>tpauly@apple.com</email>
      </address>
    </author>
    <author initials="T." surname="Reddy" fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="September" day="22"/>
    <area>Security</area>
    <workgroup>Oblivious HTTP Application Intermediation</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 35?>

<t>This document defines a parameter that can be included in SVCB and HTTPS
DNS resource records to denote that a service is accessible using Oblivious
HTTP, by offering an Oblivious Gateway Resource through which to access the
target. This document also defines a mechanism to learn the key configuration
of the discovered Oblivious Gateway Resource.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ohai-svcb-config/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Oblivious HTTP Application Intermediation Working Group mailing list (<eref target="mailto:ohai@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ohai/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ohai/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-ohai/draft-ohai-svcb-config"/>.</t>
    </note>
  </front>
  <middle>
    <?line 43?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Oblivious HTTP <xref target="OHTTP"/> allows clients to encrypt
messages exchanged with an Oblivious Target Resource (target). The messages
are encapsulated in encrypted messages to an Oblivious Gateway Resource
(gateway), which offers Oblivious HTTP access to the target. The gateway is
accessed via an Oblivious Relay Resource (relay), which proxies the encapsulated
messages to hide the identity of the client. Overall, this architecture is
designed in such a way that the relay cannot inspect the contents of messages,
and the gateway and target cannot learn the client's identity from a single
transaction.</t>
      <t>Since Oblivious HTTP deployments typically involve very specific coordination
between clients, relays, and gateways, the key configuration is often shared
in a bespoke fashion. However, some deployments involve clients
discovering targets and their associated gateways more dynamically.
For example, a network might operate a DNS resolver that provides more optimized
or more relevant DNS answers and is accessible using Oblivious HTTP, and might
want to advertise support for Oblivious HTTP via mechanisms like Discovery of
Designated Resolvers (<xref target="DDR"/>). Clients can access these
gateways through trusted relays.</t>
      <t>This document defines a way to use DNS resource records (RRs) to advertise that an HTTP
service supports Oblivious HTTP. This advertisement is a parameter that can be included in
SVCB and HTTPS DNS RRs <xref target="SVCB"/> (<xref target="svc-param"/>).
The presence of this parameter indicates that a service can act as a target and
has a gateway that can provide access to the target.</t>
      <t>The client learns the URI to use for the gateway using a well-known
URI suffix <xref target="WELLKNOWN"/>, "ohttp-gateway", which is accessed on
the target (<xref target="gateway-location"/>). This means that for deployments that
support this kind of discovery, the gateway and target resources need to
be located on the same host.</t>
      <t>This document also defines a way to fetch a gateway's key
configuration from the gateway (<xref target="config-fetch"/>).</t>
      <t>This mechanism does not aid in the discovery of relays;
relay configuration is out of scope for this document. Models in which
this discovery mechanism is applicable are described in <xref target="applicability"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="applicability">
      <name>Applicability</name>
      <t>There are multiple models in which the discovery mechanism defined
in this document can be used.</t>
      <ul spacing="normal">
        <li>Upgrading regular (non-proxied) HTTP to Oblivious HTTP. In this model,
the client intends to communicate with a specific target service, and
prefers to use Oblivious HTTP if it is available. The target service
has a gateway that it offers to allow access using Oblivious
HTTP. Once the client learns about the gateway, it "upgrades"
to using Oblivious HTTP to access the target service.</li>
        <li>Discovering alternative Oblivious HTTP services. In this model,
the client has a default target service that it uses. For
example, this may be a public DNS resolver that is accessible over
Oblivious HTTP. The client is willing to use alternative
target services if they are discovered, which may provide more
optimized or more relevant responses.</li>
      </ul>
      <t>In both deployment models, the client is configured with
a relay that it trusts for Oblivious HTTP transactions. This
relay either needs to provide generic access to gateways, or
provide a service to clients to allow them to check which gateways
are accessible.</t>
    </section>
    <section anchor="svc-param">
      <name>The ohttp SvcParamKey</name>
      <t>The "ohttp" SvcParamKey is used to indicate that a
service described in an SVCB RR can be accessed as a target
using an associated gateway. The service that is queried by the client hosts
one or more target resources.</t>
      <t>In order to access the service's target resources using Oblivious HTTP, the client
needs to send encapsulated messages to the gateway resource and the gateway's
key configuration (both of which can be retrieved using the method described in
<xref target="config-fetch"/>).</t>
      <t>Both the presentation and wire format values for the "ohttp" parameter
<bcp14>MUST</bcp14> be empty.</t>
      <t>Services can include the "ohttp" parameter in the mandatory parameter
list if the service is only accessible using Oblivious HTTP. Marking
the "ohttp" parameter as mandatory will cause clients that do not
understand the parameter to ignore that SVCB RR.
Including the "ohttp" parameter without marking it mandatory advertises
a service that is optionally available using Oblivious HTTP. Note also
that multiple SVCB RRs can be provided to indicate separate
configurations.</t>
      <t>The media type to use for encapsulated requests made to a target service
depends on the scheme of the SVCB RR. This document defines the
interpretation for the "https" <xref target="SVCB"/> and "dns" <xref target="DNS-SVCB"/>
schemes. Other schemes that want to use this parameter <bcp14>MUST</bcp14> define the
interpretation and meaning of the configuration.</t>
      <section anchor="use-in-https-service-rrs">
        <name>Use in HTTPS service RRs</name>
        <t>For the "https" scheme, which uses the HTTPS RR type instead of SVCB,
the presence of the "ohttp" parameter means that the target
being described is an Oblivious HTTP service that is accessible using
the default "message/bhttp" media type <xref target="OHTTP"/>
          <xref target="BINARY-HTTP"/>.</t>
        <t>For example, an HTTPS service RR for svc.example.com that supports
Oblivious HTTP could look like this:</t>
        <artwork><![CDATA[
svc.example.com. 7200  IN HTTPS 1 . ( alpn=h2 ohttp )
]]></artwork>
        <t>A similar RR for a service that only supports Oblivious HTTP
could look like this:</t>
        <artwork><![CDATA[
svc.example.com. 7200  IN HTTPS 1 . ( mandatory=ohttp ohttp )
]]></artwork>
      </section>
      <section anchor="use-in-dns-server-svcb-rrs">
        <name>Use in DNS server SVCB RRs</name>
        <t>For the "dns" scheme, as defined in <xref target="DNS-SVCB"/>, the presence of
the "ohttp" parameter means that the DNS server being
described has a DNS over HTTP (DoH) <xref target="DOH"/> service that can
be accessed using Oblivious HTTP. Requests to the resolver are sent to
the gateway using binary HTTP with the default "message/bhttp"
media type <xref target="BINARY-HTTP"/>, containing inner requests that use the
"application/dns-message" media type <xref target="DOH"/>.</t>
        <t>If the "ohttp" parameter is included in an DNS server SVCB RR,
the "alpn" <bcp14>MUST</bcp14> include at least one HTTP value (such as "h2" or
"h3").</t>
        <t>In order for DoH-capable recursive resolvers to function as Oblivious HTTP targets, their
associated gateways need to be accessible via a client-trusted relay.
DoH recursive resolvers used with the discovery mechanisms described
in this section can either be publicly accessible, or specific to a
network. In general, only publicly accessible DoH recursive resolvers will work
as Oblivious HTTP targets, unless there is a coordinated deployment
with a relay to access the network-specific DoH recursive resolvers.</t>
        <section anchor="ddr">
          <name>Use with DDR</name>
          <t>Clients can discover that a DoH recursive resolvers support Oblivious HTTP using
DDR, either by querying _dns.resolver.arpa to a locally configured
resolver or by querying using the name of a resolver <xref target="DDR"/>.</t>
          <t>For example, a DoH service advertised over DDR can be annotated
as supporting resolution via Oblivious HTTP using the following RR:</t>
          <artwork><![CDATA[
_dns.resolver.arpa  7200  IN SVCB 1 doh.example.net (
     alpn=h2 dohpath=/dns-query{?dns} ohttp )
]]></artwork>
          <t>Clients still need to perform verification of oblivious DoH servers,
specifically the TLS certificate checks described in <xref section="4.2" sectionFormat="of" target="DDR"/>.
Since the gateway and target resources for discovered oblivious services
need to be on the same host, this means that the client needs to verify
that the certificate presented by the gateway passes the required checks.
These checks can be performed when looking up the configuration on the gateway
as described in <xref target="config-fetch"/>, which can either be done directly
or via the relay or another proxy to avoid exposing client IP addresses.</t>
          <t>Opportunistic discovery <xref target="DDR"/>, where only the IP address is validated,
<bcp14>SHOULD NOT</bcp14> be used in general with Oblivious HTTP, since this mode
primarily exists to support resolvers that use private or local IP
addresses, which will usually not be accessible when using a
relay. If a configuration occurs where the resolver is accessible, but
cannot use certificate-based validation, the client needs to ensure
that the relay only accesses the gateway and target using
the unencrypted resolver's original IP address.</t>
          <t>For the case of DoH recursive resolvers, clients also need to ensure that they are not
being targeted with unique DoH paths that would reveal their identity. See
<xref target="security"/> for more discussion.</t>
        </section>
        <section anchor="dnr">
          <name>Use with DNR</name>
          <t>The SvcParamKeys defined in this document also can be used with Discovery
of Network-designated Resolvers (DNR) <xref target="DNR"/>. In this
case, the oblivious configuration and path parameters can be included
in DHCP and Router Advertisement messages.</t>
          <t>While DNR does not require the same kind of verification as DDR, clients
that learn about DoH recursive resolvers still need to ensure that they are not being
targeted with unique DoH paths that would reveal their identity. See <xref target="security"/>
for more discussion.</t>
        </section>
      </section>
    </section>
    <section anchor="gateway-location">
      <name>Gateway Location</name>
      <t>Once a client has discovered that a service supports Oblivious HTTP
via the "ohttp" parameter in a SVCB or HTTPS RR, it needs to be
able to send requests via a relay to the correct gateway location.</t>
      <t>By default, the gateway for a target is defined as a well-known
resource (<xref target="WELLKNOWN"/>) on the target, "/.well-known/ohttp-gateway".</t>
      <t>Some servers might not want to operate the gateway on a well-known URI.
In such cases, these servers can use 3xx redirection responses
(<xref section="15.4" sectionFormat="of" target="HTTP"/>) to direct clients and relays to the correct
location of the gateway. Such redirects would apply both to requests
made to fetch key configurations (as defined in <xref target="config-fetch"/>) and to
encapsulated requests made via a relay.</t>
      <t>If a client receives a redirect when fetching the key configuration from the
well-known gateway resource, it <bcp14>MUST NOT</bcp14> communicate the redirected
gateway URI to the relay as the location of the gateway to use.
Doing so would allow the gateway to target clients by encoding
unique or client-identifying values in the redirected URI. Instead,
relays being used with dynamically discovered gateways <bcp14>MUST</bcp14> use the
well-known gateway resource and follow any redirects independently of
redirects that clients received. The relay can remember such redirects
across oblivious requests for all clients in order to avoid added latency.</t>
    </section>
    <section anchor="config-fetch">
      <name>Key Configuration Fetching</name>
      <t>Clients also need to know the key configuration of a gateway before encapsulating
and sending requests to the relay.</t>
      <t>If a client fetches the key configuration directly from the gateway, it
will expose identifiers like a client IP address to the gateway. The
privacy and security implications of fetching the key configuration are
discussed more in <xref target="security"/>. Clients can use an HTTP proxy to
hide their IP addresses when fetching key configurations. Clients can
also perform consistency checks to validate that they are not receiving
unique key configurations, as discussed in <xref target="consistency"/>.</t>
      <t>In order to fetch the key configuration of a gateway discovered
in the manner described in <xref target="gateway-location"/>, the client issues a GET request
(either through a proxy or directly) to the URI of the gateway specifying
the "application/ohttp-keys" (<xref target="OHTTP"/>) media type in the Accept header.</t>
      <t>For example, if the client knows an oblivious gateway URI,
"https://svc.example.com/.well-known/ohttp-gateway", it could fetch the
key configuration with the following request:</t>
      <artwork><![CDATA[
GET /.well-known/ohttp-gateway HTTP/1.1
Host: svc.example.com
Accept: application/ohttp-keys
]]></artwork>
      <t>Gateways that coordinate with targets that advertise Oblivious HTTP
support <bcp14>SHOULD</bcp14> support GET requests for their key configuration in this
manner, unless there is another out-of-band configuration model that is
usable by clients. Gateways respond with their key configuration in the
response body, with a content type of "application/ohttp-keys".</t>
    </section>
    <section anchor="security">
      <name>Security and Privacy Considerations</name>
      <t>Attackers on a network can remove SVCB information from cleartext DNS
answers that are not protected by DNSSEC <xref target="DNSSEC"/>. This
can effectively downgrade clients. However, since SVCB indications
for Oblivious HTTP support are just hints, a client can mitigate this by
always checking for a gateway configuration (<xref target="config-fetch"/>)
on the well-known gateway location (<xref target="gateway-location"/>).
Use of encrypted DNS along with DNSSEC can also be used as a mitigation.</t>
      <t>When clients fetch a gateway's configuration (<xref target="config-fetch"/>),
they can expose their identity in the form of an IP address if they do not
connect via a proxy or some other IP-hiding mechanism. In some circumstances,
this might not be a privacy concern, since revealing that a particular
client IP address is preparing to use an Oblivious HTTP service can be
expected. However, if a client is otherwise trying to hide its IP
address or location (and not merely decouple its specific requests from its
IP address), or if revealing its IP address facilitates key targeting attacks
(if a gateway service uses IP addresses to associate specific configurations
with specific clients), a proxy or similar mechanism can be used to fetch
the gateway's configuration.</t>
      <t>When discovering designated oblivious DoH recursive resolvers using this mechanism,
clients need to ensure that the designation is trusted in lieu of
being able to directly check the contents of the gateway server's TLS
certificate. See <xref target="ddr"/> for more discussion, as well as the Security
Considerations of <xref target="DNS-SVCB"/>.</t>
      <section anchor="consistency">
        <name>Key Targeting Attacks</name>
        <t>As discussed in <xref target="OHTTP"/>, client requests using Oblivious HTTP
can only be linked by recognizing the key configuration. In order to
prevent unwanted linkability and tracking, clients using any key
configuration discovery mechanism need to be concerned with attacks
that target a specific user or population with a unique key configuration.</t>
        <t>There are several approaches clients can use to mitigate key targeting
attacks. <xref target="CONSISTENCY"/> provides an overview
of the options for ensuring the key configurations are consistent between
different clients. Clients <bcp14>SHOULD</bcp14> employ some technique to mitigate key
targeting attacks, such as the option of confirming the key with a shared
proxy as described in <xref target="CONSISTENCY"/>. If a client detects that a gateway
is using per-client targeted key configuration, the client can stop using
the gateway, and potentially report the targeting attack to let other
clients avoid using this gateway in the future.</t>
      </section>
      <section anchor="dohpath-targeting-attacks">
        <name>dohpath Targeting Attacks</name>
        <t>For oblivious DoH servers, an attacker could use unique <tt>dohpath</tt> values
to target or identify specific clients. This attack is very similar to
the generic OHTTP key targeting attack described above.</t>
        <t>Clients <bcp14>SHOULD</bcp14> mitigate such attacks. This can be done with a
check for consistency, such as using a mechanism described in <xref target="CONSISTENCY"/>
to validate the <tt>dohpath</tt> value with another source. It can also be
done by limiting the allowable values of <tt>dohpath</tt> to a single
value, such as the commonly used "/dns-query{?dns}".</t>
      </section>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <section anchor="svcb-service-parameter">
        <name>SVCB Service Parameter</name>
        <t>This document adds the following entry to the SVCB Service Parameters
registry (<xref target="SVCB"/>). The definition of this parameter is in <xref target="svc-param"/>.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Number</th>
              <th align="left">Name</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">8 (Early Allocation)</td>
              <td align="left">ohttp</td>
              <td align="left">Denotes that a service operates an Oblivious HTTP target</td>
              <td align="left">(This document)</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="well-known-uri">
        <name>Well-Known URI</name>
        <t>IANA is requested to add one new entry in the "Well-Known URIs" registry <xref target="WELLKNOWN"/>.</t>
        <t>URI suffix: ohttp-gateway</t>
        <t>Change controller: IETF</t>
        <t>Specification document: This document</t>
        <t>Status: permanent</t>
        <t>Related information: N/A</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="OHTTP">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="25" month="August" year="2023"/>
            <abstract>
              <t>   This document describes Oblivious HTTP, a protocol for forwarding
   encrypted HTTP messages.  Oblivious HTTP allows a client to make
   multiple requests to an origin server without that server being able
   to link those requests to the client or to identify the requests as
   having come from the same client, while placing only limited trust in
   the nodes used to forward the messages.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-ohttp-10"/>
        </reference>
        <reference anchor="DDR">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Kinnear" initials="E." surname="Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Patrick McManus" initials="P." surname="McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="5" month="August" year="2022"/>
            <abstract>
              <t>   This document defines Discovery of Designated Resolvers (DDR), a
   mechanism for DNS clients to use DNS records to discover a resolver's
   encrypted DNS configuration.  An encrypted DNS resolver discovered in
   this manner is referred to as a "Designated Resolver".  This
   mechanism can be used to move from unencrypted DNS to encrypted DNS
   when only the IP address of a resolver is known.  This mechanism is
   designed to be limited to cases where unencrypted DNS resolvers and
   their designated resolvers are operated by the same entity or
   cooperating entities.  It can also be used to discover support for
   encrypted DNS protocols when the name of an encrypted DNS resolver is
   known.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-ddr-10"/>
        </reference>
        <reference anchor="SVCB">
          <front>
            <title>Service binding and parameter specification via the DNS (DNS SVCB and HTTPS RRs)</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google</organization>
            </author>
            <author fullname="Mike Bishop" initials="M." surname="Bishop">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Erik Nygren" initials="E." surname="Nygren">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="11" month="March" year="2023"/>
            <abstract>
              <t>   This document specifies the "SVCB" and "HTTPS" DNS resource record
   (RR) types to facilitate the lookup of information needed to make
   connections to network services, such as for HTTP origins.  SVCB
   records allow a service to be provided from multiple alternative
   endpoints, each with associated parameters (such as transport
   protocol configuration), and are extensible to support future uses
   (such as keys for encrypting the TLS ClientHello).  They also enable
   aliasing of apex domains, which is not possible with CNAME.  The
   HTTPS RR is a variation of SVCB for use with HTTP [HTTP].  By
   providing more information to the client before it attempts to
   establish a connection, these records offer potential benefits to
   both performance and privacy.

   TO BE REMOVED: This document is being collaborated on in Github at:
   https://github.com/MikeBishop/dns-alt-svc
   (https://github.com/MikeBishop/dns-alt-svc).  The most recent working
   version of the document, open issues, etc. should all be available
   there.  The authors (gratefully) accept pull requests.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-svcb-https-12"/>
        </reference>
        <reference anchor="WELLKNOWN">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="DNS-SVCB">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <date day="26" month="June" year="2023"/>
            <abstract>
              <t>   The SVCB DNS resource record type expresses a bound collection of
   endpoint metadata, for use when establishing a connection to a named
   service.  DNS itself can be such a service, when the server is
   identified by a domain name.  This document provides the SVCB mapping
   for named DNS servers, allowing them to indicate support for
   encrypted transport protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-svcb-dns-09"/>
        </reference>
        <reference anchor="BINARY-HTTP">
          <front>
            <title>Binary Representation of HTTP Messages</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a binary format for representing HTTP messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9292"/>
          <seriesInfo name="DOI" value="10.17487/RFC9292"/>
        </reference>
        <reference anchor="DOH">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="DNR">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Neil Cook" initials="N." surname="Cook">
              <organization>Open-Xchange</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="27" month="April" year="2023"/>
            <abstract>
              <t>   The document specifies new DHCP and IPv6 Router Advertisement options
   to discover encrypted DNS resolvers (e.g., DNS-over-HTTPS, DNS-over-
   TLS, DNS-over-QUIC).  Particularly, it allows a host to learn an
   authentication domain name together with a list of IP addresses and a
   set of service parameters to reach such encrypted DNS resolvers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-dnr-16"/>
        </reference>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="DNSSEC">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="CONSISTENCY">
          <front>
            <title>Key Consistency and Discovery</title>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Matthew Finkel" initials="M." surname="Finkel">
              <organization>The Tor Project</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This document describes the consistency requirements of protocols
   such as Privacy Pass, Oblivious DoH, and Oblivious HTTP for user
   privacy.  It presents definitions for consistency and then surveys
   mechanisms for providing consistency in varying threat models.  In
   concludes with discussion of open problems in this area.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-key-consistency-01"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA61c63LbRpb+30/RYX5E2iKpyPHMJNrJJLLkxKrYkleS15Xa
2toBgSbZYxLgogHKjKI8yzzLPNmeW18Ags7U7uqPSRDoPn0u3/nO6YYnk4lq
bLMyZ3p0aV1ebU2909Vc38xWdmur1uk7U29tbpze2sx/0S9sWdhyoW9NXtWF
G6lsNqvNFkYZeNCW+u7fL16MVJ41ZlHVuzPtmkK5pjbZ+kxfvbz/Qamiysts
DXIUdTZvJtY080m1zOzEbfPZJK/KuV1MvvyjyuAhmObO5G1tm91IPVT1h0Vd
tZvO5K/u79/q881mZWFSW5X6qmxMvTaFpa8j9cHs4MnijH8oTTO5xInV1pSt
OVNa/y/G1LrZbVCV70EmVM+POAZeX2d2BddxQd/j0qZVvcDrWZ0v4fqyaTbu
7OQEb8NLdmum/rYTvHAyq6sHZ05wgBN8cGGbZTs706SnhwWp6oRV19eaUmCX
r5TK2mZZ1bC0CTyvNWv7vlqvd/pt1q52dBUmzEr7Cy3ojBZrYJn5lH40vIxm
g7d/n+GP07xa90a0dbvOVsY9ZDX4R1EMDXxdfbBZOuaHqiwaW3+/wK80qCqr
eg23b8Eaypbz5JuaTCY6m4EDZXmj1P3SOg3+065N2ejCzG0JXpfpTVaDRGAi
3SyzRudZqWcGvDFftYUpvFvqrCzItHfq8vpO18ZVbQ0uXrNr66aCIcuqMTxK
pp3EAEya5eDfzs5ASa1DgwdnUTjiWM8wmOamxt9g+uhLP0IoPGQ7UJBM1yzB
VxZL/bC0+RIn5bHhulFNVi9MM9XdhWYrVyWrXZt8CRp2a3x4ZbK6xGc1+Llm
P2hrUr6C6MYfCgl30MRhsaas67UtipVR6nN0+boq2pxGUr3YeHz87AY/fHs1
uZz247hCJ396ArFX4Mo6X1lYBKnXlHm92zRqDevNFrAY8xGXsgDJHsDNu4q7
J11EvR2xco5RO0b7IRAmcNxs49oVrImsLfPAlzAT6vlTZlFHC75yPBbLkDmd
7q3cG6si1UZ7GS3Pg7covgmmRyTtTHtrVqkvHNX4PUy5qauP1pArdNak0mUs
bWHoDvi3BEgnFMfvrOipvgFbg+7HcBE9F1GmMXnT1ujJqjDOLkrWk2th0kyj
1OTyOApJhCEEkQD3uA08ysNXAIJoSJjOyzNWGFNNsnr6zpaTMaKHsoBfuCj5
vK7WGGgQNeB1EOWly8jjwB3vIH5NX/2F2ayq3ZodarcBfF6tQOXltlptjaac
hhLbuc1BYAhrW3IszEzzYEzpvXHM64R/UWAR3o2HAwkBoJrD4rVbgrsVAFIg
9My4TfXB6HnmliixflU9GJBgrF21Nh1JvXwyufIRiWDBynJaFGlrnTlX5ZZ8
2Qum1xVYr9gB8PKSp+qHqobwydYAzbAIDXkN8yME8GLZ6GoDLgBAlmmPdDC9
oCM42RYMIGNWm8au7S+wKBiProBizDYD2MFHwSAPGAUo3SdhUDMM4n0kgnrA
ITDqCpi5sc6At202Vd1oAPi+WTFOAqw5vbKg15SlqEvyWtLJrazG6SOAocvL
2z4IZUUxKYr66Qmg4kLAB1NCxFlnVNCsh+Ombh0Oz34xPZxsKFoqWL/Rg2nk
6PbWHXdXzvmkpLUqn1VEHX2EEfAPD9Ps9p/Kcqqb5Ug8EAbRGn/p66koXbVh
/kC0BCAbNArfJzQT6k8hsG1giQZjkXAGRImCIDlEruf6KZP1DVdQcMEDEEwt
6YIHi7AO8clhdFUkBccOowkj5LvbK28IdKkUhdg5wVZmtZp8KKuHUuHdrp3P
7UfUx/uXr1//dH3z/vrb2x8uvv7j6R+ensbI2kAPExlk5FE5+D0oGZAkSobq
kpsnq4qpInkdWXBtslL0guJ1kAsuKh8OpFIgkQXq1yPDbnwIVb2/OQh5EKip
ANo0zU7i0WMOzKOXlWv23LhHJcSX56ahRCDTAUIDBqouBhJUpzLB4oWs0+Pk
LkpW7glKUaGckAQySwknpSOUtzja/lVJ1tlD3bbBu+CBjTdyspqpflMVZkV1
B5lK8c9hgigI2pD5PGIXcgZAwLy2M06Ej4/+V7uCvPT0NEUKdFGVW0xUVckA
eIl6s/SdfRIzxQMF/ejNu7t78Bj6V1/f0Ofbl//27ur25SV+vnt1/vp1+KDk
jrtXN+9eX8ZP8cmLmzdvXl5f8sNwVXcuqdGb859HDLejm7f3VzfX569HrOGO
uWGhYF+CCYhXiGT0koxYQFz9i4u3//j76XOMC4iGZ6en3wAU8JevT//0HL48
LE3Js1Ul5Fv+CsbcKdAbRCSOAmkJYnljG/CxMQa+W0Lc6SUQT9Dmv/wHauY/
z/SfZ/nm9Plf5AIuuHPR66xzkXS2f2XvYVbiwKWBaYI2O9d7mu7Ke/5z57vX
e3Lxz9+tILL05PTr7/6i0IXOU7fSj5933Yy8qGZ/XLerxmIRtu76dC9mktii
KCYy0jW6JAbAxQJZvX63WdQZFfG1WQChrPVRWZUTJpvFMWdg8JJ+HrqSgUmg
sYoMjpyp5IoJCrh1W1ISEA4fCZggluQE8h8FLki0WoC7xwPsXFvOdlsskCFW
mVt3RxrKIrbxhB0zL1YePpkM1WtAksvcJKTU55VshpCTwNwYRx61pELjRork
3mc+3TquJy9Z4TLhfNkKOxFU5PbHkUfcp9TPywf7Q3Xe9OYK2gDtwiDAElVg
iTwcaGyGzHDTwsz5AEHs8jyUWe1TlOgLDuy+WhGVZZsmq1Nd4RwaGGGDETjU
pT7TomyeCiAXVYGd6j12WiP9LnGRSoGqZhX4XsyxEkXj1MQgqU8wUnCqTMod
rzQigW6IoSa1ieMELznLwDigOUzG5Hte/oUpwdh5QmlilQFGCYwnGq5KS2V2
YRiaqvx8afIPoiQ/DFW+0VCUsdAuRGL03TZ/izTtJ4OwE0kdJy5mOqPOXdYR
ZOB0ntYJqwuUtZM1Mumq3N56xAksKWF9SqhYOVDWsB91Hdfp/25Bb3DTbJca
D9mMUxWAq/eEPh9iP4BsjH7ciUaZAWjNHocarmLivCrYFShw0W00pEV5SoxC
RdCrjb9war+0PCLHBY7DxhVNQp4GHWxhEhawoY5Hs6yKjg3UEAV7gQM2gbc3
PA/K8mBrYlFrUPQ2W7XGBeLsHSJQe0XZGUQx602zw3LchzCKKEXH8KOe6K1h
zqypIGnFUVfWNQICaXuNWMXvFJfA9jJqtqrhWTOXzIiQBJIiHIWgQv8qKqSj
qi3BS1zjDZRUVuD8i5LcC28XB5+CZ+GCvSn2J0c0wcyxZhERS6IwoZaDmN1z
d4S4qqQ2Rkh6B9Z/jb1JZPCKHg6MQaR03nsEW7qh7AxK25gurXdSXVFvm5ra
aUnVcffaQGQiOq6zgu7K+mkZ4Jdoga9CALXWxnenvCr1cF2N3c/AUaXi8L5J
1ekIGCmOgY1FZL1QveKlzyB/TYaqW+wCUG0LNz49KRYGoPuG4Fq+shV8q6Kl
Ur1T4FIUsIxDIlK7A+o8tJbvwqXqRVD+XL9zyL+lKPf2B3spauKkS2SxfDrE
FE4/85MAtGQgW7rGZFQu4sKZGnSL9CEXTerRSFGgeETZE1Bx3YZlSkqG6AF5
Kkng+chIcPFkxhIkrvX4SF1jMAcY7sXV9fntzxNqI0Ol8c2zb55R3dVtbO2r
jfwCLDuVm3APgSXzHZV+tzqv2lUBNXL1gTtLaOMzpX777TfVG2eq//Tsyy+1
vrqWaU/1VB9BzG3Kb5fPJLUe05PqXDvgJkinRaZebBOmHWjyqP+zSAFdvmWh
OqJFn0N2h1KB/T1KJF5HMeR9DvBTSgquiH1gYWek52EHELjnYcnc5GVJ0ckM
Fm9AAshWOrqsXh1TRN+8oq7M86+x9OzoFABOpURjGCdvPVJJYg70FhkTpkTs
muy3i2a2zACtSRgqZT7h1arj1Ykro7awU55ZAgVbAguM0EmLYJgxapTFHcYT
MMVEpuiFDKiD4uLqUGBb19nqyoasziAxQkceMaj5FJ5R7ePQX400Y5Ea6CPe
HHCATc9GyFhHy69GxynJQp8Hm00gR1DSqnGn1mFNU4cWLTaX2jJnsNzbTJHe
95gb32qo8S1NrkgvCXVoX0Uy+6TTuZ0qEGlQFCK30a77FbWLMBiKamdYdsys
wvQxwVLp1KEsSOqTyheyo5KWPFVyVA1kqzGjwsDz+pDYxGRwHPUJ/bXlSshu
zduVcfPDFElZpKREl6qnw5JF3ElYxAGJKKcxwNBol5e3UGFgw12ptN3uNexb
w4cW6PugvbVxYoHBx0HxO6oNdhhX/wXxMvVjTLN6kzEjwUYoUqlY6KkQ/VV3
iMiscTsb82YWkQLC7vJ2IB3RKjwkBV5XMIyhJnwphFtftHWXhRVyBwYmaMml
0IeH1kwizSus/+jgxa3khYElx9RAYX4KtGoZckeJDWraeQ/5C37eZM3yW0Ib
UsTjd0iPutnDG9E16Ho+ADemxtIB99jQO5j/gNKqsASvGjDqWHkvImvgiu5f
3+kc1TVnPkolreu3Ye8k3p5Pn+HgYgTeCvzdhji12eNmd5TMtx9Ugib9Vrlv
j3RzmFSfoQqk1e9U/D1ZkdRbsXT1wm4A2ITJYSawKBwvnzZYXFCG5++saoSr
pSmJJZDDbvYJpl+GTKWyPY12C8RxUmdGPCsQ+wuQK29WO9wIRN+Mm8HIbcCd
8WZsGjJwbCsL9fDHTUU+K3q6egtBUdSYnBEnbsjvWwDXBvAkQq5EFwqDgEWY
iNPFxxHEIA/ZAmNorGIX13c2cXECqgxD/Rreic9IB01tagvFmYWZzEcr5MBD
T5KvfIKG27doVFg7YQrIpsLSvBYJm1vXkpPjNkc3S5H1pP/B3SLIBXMC544J
cwRF0UWHr3So9ljP2kbJpjoVttH3JrOMjhuwxmDQ8aD3mtIBJKreXn9SfIuX
DkRZ5PltGY9XeEm/gKKvtgvIN6vEiNNINXOQjwJ6OAmMQ5VOG1Q+TFneEI3c
NsT6nasWFs1ndXAzgDSaAUHO13ZEtGuzNSAa76/70wdTfWcMVCJOTpgB2Zz7
5hL6agt6lxIuTXfXlO7KWlppSQutQ6Cb/X23pDEvY/mIwKM615J/i8GtbpiW
yfH18H43yPMUesYK1c0uEEGw63RoWlRT5JGuv6OMJOjy1cVbuve2apFrnne2
pX0HDHT0fmmRxIBywp6fYF2EWb/J2UkhgFiU5P3ZCLIanxnhZvxB3tBJT4dc
RUqP/w9X0amrqAOuEg4WvZYNYXCWvT1iQEYEpyxt6CeJq7eXfqiG9CA92IDL
mBJUdWge0E5GgIKZUUTafWczlChMrQNB5IxTY2oIsODXgc3Gna+QuhvWXA8L
dtgYGFT3JbvyoVd69PgY9uSfno59XuMRxnp0Mo1PnXT36bE5iSduhHvIERi0
vW/s+OMwqYToeokkeJoA23x8Jgrjh8sSF8fF8EDc/erjR9APp0s0cNiJUEeR
wJz+Yfocff2z0N84Pf0SF4anDOnRCHmlP3XSU7jyivZNndA3v0MhvQxOPBfL
yR1vhMA43qDKt+t4k3+vAw3Y0q/8ez1lTgOV+kQ3MHEarlSDa4OABuLW0c+y
cMqLNLqnu/t9cX/cQCUm6jfYyaP9LnJnJ5KTG08HQOYflBMjMfVlnO8O6Fl6
glhSoqCA4KJovzeT3ugPvYlRgQKCvipsGSuBGwgJqVgZVuZUhkgjXnrmUWhy
SAB06vWNlTgIJ76YQZIjYSmChPKZtOMbDp9QJdmYiw74uEt8CzCb2rog8YqO
YsWfuCUjCxZDF7ypE04Rwqe1Wc+w5drxWZXldQU8L+an4FGEHdi+l5FtuqtD
tBMyHiwSHbHMd4S6uIF10XGgH7x/PX7e8edY33SoBqrlgCtSZegVNjPzqnPi
FA2MykMU5Qqv33zaDwqSRLjW/nyeiO8duUF/V8Q5iXf7E6Bzi+hEbcRsn4j3
dqfIPIrYbc4Ez+c0bdehHUWHPH8nQiHBKsl9uBmGWiH0iDmye/yOtoa5nRvK
COUPs0KuTWuHHkTsg1ZnaEWW9AUq3OiA4KNr+LoKCzcpJgYYAntuEqj703F3
NCzWo6Sfh/tziZsy1v4T7hRjVsVdM2wZ9qq4/WNmva1t1xLG/vjy3nugOpIC
z59wzETtVCWzix1770Bk7IEfV/C7sOGWdis5AcPa3Agzt3T1j9PGpSznHOqK
DTAcADFT99spNj24TCFIuw8RExLgHqvw8kSvQ/4JakAZgnvtwSQDm7ChKxjb
LqJE6b2gWg9PQz59cjo9Va8qeKS/OaFYB2d6WIPcdPkxnkdFUA3dO5FNDgkz
MwznSnuE0JezUi37r4lPhA1fiLeBY85SPbALDnQVpQkArHxSzaHmBPTojkCn
Lvw2kWodUUxIhQLlUx2WyaQpNmQPC2SUJ1jAbQoAQelhynl09jbw3UMOSvnB
v0VEiPdW0O8CI7gwngc9fh6gS6nzpsnyDwisRBT98WrJaBCyzK/D6yqesuRY
ujTmIx2fVv74NNtN8AaisOEUD5qBu+5eXkCEf8efkCo+//KrrxA977mUK7WZ
z5FWbg1meXA/OowUlRoPnlPPQwQrPJargeMs3jdQpr+1DgLU0qn4kEBw2rVt
7IIx0yKjAZwl2xGqYpAwy/dR0DvYsMcjlXD6ARoSCNiBE7XqHbcPYueBDqev
KhBCqnJSIx07xmTgy2yqN2QdXLG8X8a3AAYOvv7eImgjhZmNJOFupehxj1IR
Qn3Z6WrJ8Sc5hgBjl0iImT4HdKb3BzjUrt5OIEWirsM2BVX5dEtu67xd4zGG
HF/F4F5XKH74kJe4OsyUm7r0LsJFLud2qjWhdmxsjocD1T6DwB3xGo8PpIe8
Dm4ScxdBgXbIyRP3tAkFwpMPuMIHOh/PHXn/cosFy8R2m2/BsUEwfnF1a8Ak
jAYD6I5nIPCZsHMR0Q5DEn5ScTXHtFNj54kOeL6w3HmW4/FMOtaOmMTgS108
AgWo82yaw/3Cabu+w2KQsPo9rfS9lJRa8JZM/JE983jccQjZaI6HP9NWkucb
6ZZm35O946dvniSNpm4Tf3j3jL0lPd49Vj6ODnRhwhRynNvv1EGMwIMtVhNc
0PhWRKC+fOCt6b121KEnVJXDOu9f36mkFepbNfQGyFBDj7gcYpCv/nxuUL18
ABOmu+B8lgMLjfvgEJwlHNcYgQ1C9thjizdhc9jXxeKiQ1vYBPrUlsWz/bb8
wLkC3zBZlPaXg5ycoMGTUDxqi8fXIY1jHwQLJhjJH0Wmmr7OCMdj99Uf1tsN
vAAwdAY52U8RhAmv8kmosCvICyDRzcFxaUNuU22oiPIkLNOHOPg0PSztDL3j
hoyqrjKqpfJeqQFShfzViWIlok0x6V7cXN9d3d2/vL74mdqq1FAV0MRtG6QQ
kw7Tj+9PoY22GPvmwb9qyYe5nByeglg4aCpH6wgjI1zTC2pQUuExZkrBPr/7
Ukd4nVnjdi6nACASS1ZYb71qD7XG2u/oR0nRx0msep1K6g9y89tuDEP7O0uJ
7qj3nKB7YZrYIQhIqaz3MKjVJnJr6MzuqahT4aBZXVNtko2IUBVTL7tCLVpq
hECu4hdrzB528yuzDeeeAF/cVUggLrzLKcm8xbcnGQBkD3UfBLi2Gd4OpfOv
wiilHkEfFV//q4z5V2kGqdhOqjyzmO/2coR/U4wXhhtm9Pqj5Ap/xEWOIRP+
DKazxKzZDBx6Gjsk4nDBr9iBfPjQ7JKIaAeR3UYxdmMIJIETvc+/m5W+yXDY
r1S3dt9Tln9xmOmSvMusr5qUCiqSDgB0ZXEp4ujUxaPEIy04iIU4OJ0mkPdS
6fdu+GCzkQCaMvCov6HORcfV+fX5fpFhszJ7Ilciou7/o4W34Yxs/5WtonC9
4hQu16E7PzwKHk9fgO5relGLM5i8Ol2E15iG3uhz0sWJrwHCWn7V1y018TR8
wq2c+PerfiMHID/x96u+NYRquX/0Vxhzwn86fDp0Yehv/yYa82t99DKrwTDn
K08aj0UEPuSQyHRJb/vvvbsouwVDByElKuHZo46RjmFutOh7LG1+8vsJSpEH
2NDb5GQJBqXDVqV5EEsKzIy6j7uRDjbs7I6AQeLbjGe604uA4KU36ok31eAx
pvb/8cadP5LB6VxEP+seyIXbgPm27gwxep2VdAnfWmfeFqrdM319cs7/Z8AM
4ED9Dx0BIOhgRAAA

-->

</rfc>
