<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-sml-trust-00" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="SML Trust">Trust and security considerations for Structured Email</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-sml-trust-00"/>
    <author initials="H.-J." surname="Happel" fullname="Hans-Joerg Happel">
      <organization>audriga</organization>
      <address>
        <email>happel@audriga.com</email>
        <uri>https://www.audriga.com</uri>
      </address>
    </author>
    <author initials="A." surname="Gulbrandsen" fullname="Arnt Gulbrandsen">
      <organization>ICANN</organization>
      <address>
        <postal>
          <street>6 Rond Point Schumann, Bd. 1</street>
          <city>Brussels</city>
          <code>1040</code>
          <country>Belgium</country>
        </postal>
        <email>arnt@gulbrandsen.priv.no</email>
        <uri>https://icann.org/ua</uri>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>Applications and Real-Time</area>
    <workgroup>sml</workgroup>
    <abstract>
      <?line 43?>

<t>This document discusses trust and security considerations for
structured email and provides
recommendations for message user agents on how to deal with structured
data in email messages.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Structured Email Working Group mailing list (sml@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/sml/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/arnt/sml-trust"/>.</t>
    </note>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Structured email, as described in <xref target="I-D.sml-structured-email"/>,
makes the content of some email messages machine-readable, such that
user agents can provide higher-level functions than
displaying/replying, for example "add this to calendar".</t>
      <t>Naturally, new functions bring new trust and security considerations,
or bring new urgency to existing issues.  This document recommends
security and trust mechanisms that should be applied when processing
machine-readable content in email messages, both by senders and
receivers.</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="types-of-security-concerns">
      <name>Types of security concerns</name>
      <t>This section gives an overview of the various types of security and
privacy concerns that arise when email messages contain structured
data. The same concerns often arise for other messages, of course.</t>
      <t>This section is informative. Or even unnecessary.</t>
      <section anchor="spamvirus-filters">
        <name>Spam/virus filters</name>
        <t>Structured email increases the syntactical and semantic complexity of
email messages. If a spam/virus filter parses structured email in
order to block malevolent messages, the filter's parser will
necessarily differ from that of the MUA that will finally act on the
structured data, creating a risk of misclassification.</t>
        <t>These risks are elevated when a structured data format has complex
syntax, syntax that offers several optional or alternative ways to
express the same substance, and of course by parsers that deviate from
the specification for better bug compatibiloty.</t>
      </section>
      <section anchor="formal-display-of-data">
        <name>Formal display of data</name>
        <t>A common example is displaying a received calendar invitation using
dates/times in the recipient's timezone, in a fixed format.</t>
        <t>Formal display introduces additional possibilities of discrepancy
between the different representations. For example, a single message
might contains a multipart/alternative containing a text/plain
description of a flight itinerary, a text/html description of the same
itinerary, and a structured representation. All three may be
different, leading to confusion (and in this example, perhaps to
missing a flight).</t>
        <t>Unintentional discrepancy is a risk for senders; some recipients may
be misinformed.</t>
        <t>If a message is sent to a group and there is a discrepancy, different
members of the group may see it differently.</t>
        <t>If a particular MUA displays the formal representation within the
message, a malevolent sender could try to mimic the visual
representation using HTML with CSS, but with misleading content.</t>
      </section>
      <section anchor="automated-processing">
        <name>Automated processing</name>
        <t>Automated processing covers actions that are taken as soon as the
message arrives rather than when a human user reads the message. For
example, a user might want flight reservations to be automatically
added to a travel itinerary application and/or a calendar.</t>
        <t>Such automation could be a custom MUA feature or a future extension of
the Sieve email filtering language (<xref target="RFC5228"/>). A related example
for abuse in automated processing is calendar spam (<xref target="CalSpam"/>).</t>
      </section>
      <section anchor="external-references">
        <name>External references</name>
        <t>Email messages with a text/html body part ("HTML email messages") may
contain image resources that link to web servers. Such links can be
used for tracking user interaction with the message.</t>
        <t>Similar concerns apply to structured data types which include image
references, such as the cover image of a music album or the teaser
image of a news article.</t>
        <t>RDF structured data can be partial by design and include references to
additional data. Using a "follow your nose" approach, tools can follow
URL references to obtain further structured data concerning a
resource. For example, a piece of structured data about an article
could reference the article's authors only by URL. For a meaningful
processing of author information, one might try to obtain further data
using that URL.</t>
      </section>
      <section anchor="social-engineering">
        <name>Social engineering</name>
        <t>While the risks of social engineering are hardly new and the
human-readable text in a message can in principle be used to persuade
the human reader to do anything, structured data widens the variety of
actions the human reader can easily perform. If there are more buttons
to click, then there's also a greater variety of attacks.</t>
        <t>Put differently: A user who might not be able to follow the
instructions in a long and involved text-based social engineering
attack may be able to follow simple instructions such as "click this
then that".</t>
      </section>
    </section>
    <section anchor="trust-mechanisms">
      <name>Trust mechanisms</name>
      <t>Several implementations of structured email restrict processing to
messages that are particularly trusted. That is to say, an incoming
message is in one of these three categories:</t>
      <ol spacing="normal" type="1"><li>
          <t>Spam. Structured data is not processed.</t>
        </li>
        <li>
          <t>Ordinary. Structured data is not processed.</t>
        </li>
        <li>
          <t>Trusted. Structured data is processed.</t>
        </li>
      </ol>
      <t>This section gives an overview of the trust mechanisms used to
differentiate between 2 and 3.</t>
      <t>It does not attempt to describe whether a trust-based mechanism is
appopriate in a particular case.</t>
      <section anchor="processing-structured-data">
        <name>Processing structured data</name>
        <t>MUAs <bcp14>SHOULD</bcp14> consider structured data in incoming email messages only
if either of these criteria hold:</t>
        <ul spacing="normal">
          <li>
            <t>The sender is trusted (e.g., part of the user's address book) and
the messsage either contains a valid personal or domain signature.</t>
          </li>
          <li>
            <t>The message is part of an ongoing thread with a trusted sender.</t>
          </li>
          <li>
            <t>The message's content indicate a connection with an older, trusted
message. For example, if a calendar invitation was accepted, then
updates or responses for the same event are connected with the
original.</t>
          </li>
        </ul>
        <t>If none of these criteria is fulfilled, MUAs should fall back to
alternative presentations, typically "text/html".</t>
        <t>Open issue 1: It's not clear that all types of structured data require
checking. Some may be 100% display-only. Is additional guidance for
display-only data worth the complexity?</t>
        <t>Open issue 2: Really <bcp14>SHOULD</bcp14>? I (Arnt) don't see this guidance as
clearly right. It doesn't match existing code all that well, and
doesn't seem to be where we want to go.</t>
        <t>Open issue 3: This does not distinguish between
- automatic processing
- actions available to a user in e.g. a MUA
- formal display</t>
      </section>
      <section anchor="inlining-data">
        <name>Inlining data</name>
        <t>Structured data included in an email message <bcp14>SHOULD</bcp14> be self-contained
in order to avoid privacy problems.  This implies that if an MUA is
able to provide meaningful user interaction (rather than mere
display), then the data <bcp14>SHOULD</bcp14> be self-contained, such that the
interaction will not need referenced resources from the web.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security considerations</name>
      <t>Security considerations are a core subject of this document.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy considerations</name>
      <t>Privacy considerations are a core subject of this document.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions at this time.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.sml-structured-email">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC5228">
          <front>
            <title>Sieve: An Email Filtering Language</title>
            <author fullname="P. Guenther" initials="P." role="editor" surname="Guenther"/>
            <author fullname="T. Showalter" initials="T." role="editor" surname="Showalter"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document describes a language for filtering email messages at time of final delivery. It is designed to be implementable on either a mail client or mail server. It is meant to be extensible, simple, and independent of access protocol, mail architecture, and operating system. It is suitable for running on a mail server where users may not be allowed to execute arbitrary programs, such as on black box Internet Message Access Protocol (IMAP) servers, as the base language has no variables, loops, or ability to shell out to external programs. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5228"/>
          <seriesInfo name="DOI" value="10.17487/RFC5228"/>
        </reference>
        <reference anchor="RFC6132">
          <front>
            <title>Sieve Notification Using Presence Information</title>
            <author fullname="R. George" initials="R." surname="George"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>This is a further extension to the Sieve mail filtering language Notification extension, defining presence information that may be checked through the notify_method_capability feature. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6132"/>
          <seriesInfo name="DOI" value="10.17487/RFC6132"/>
        </reference>
        <reference anchor="RFC6134">
          <front>
            <title>Sieve Extension: Externally Stored Lists</title>
            <author fullname="A. Melnikov" initials="A." surname="Melnikov"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Sieve email filtering language can be used to implement email whitelisting, blacklisting, personal distribution lists, and other sorts of list matching. Currently, this requires that all members of such lists be hard-coded in the script itself. Whenever a member of a list is added or deleted, the script needs to be updated and possibly uploaded to a mail server.</t>
              <t>This document defines a Sieve extension for accessing externally stored lists -- lists whose members are stored externally to the script, such as using the Lightweight Directory Access Protocol (LDAP), the Application Configuration Access Protocol (ACAP), vCard Extensions to WebDAV (CardDAV), or relational databases. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6134"/>
          <seriesInfo name="DOI" value="10.17487/RFC6134"/>
        </reference>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
        <reference anchor="CalSpam" target="https://standards.calconnect.org/csd/cc-18003.html">
          <front>
            <title>Calendar operator practices — Guidelines to protect against calendar abuse</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MachineReadable" target="https://csrc.nist.gov/glossary/term/Machine_Readable">
          <front>
            <title>NIST IR 7511 Rev 4</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 242?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors wish to thank Ben Bucksch, Alexey Melnikov, Phillip Tao,
Lisa Dusseault and others whose suggestions were made before this
paragraph was started.</t>
    </section>
    <section anchor="note-to-self">
      <name>Note to self</name>
      <t>RFC Editor: Please remove this section.</t>
      <t>The charter has this to say about what this document should contain:
"Recommendations for security and trust mechanisms that should be
applied when processing machine-readable content in email messages"
and "security and trust recommendations to prevent abuse of structured
email". No more, no less.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA5VZ624buRX+z6dgFRRJFpJ8SfamLjZ1HGfjwnZc20GxKIoF
NUNJrDlDlZyRrAYB9m//9wH6LH2UfZJ+55BzkeRgt3/s0Qx5eHgu3/kOORqN
RKhUmf+krCv1RFa+1sIsPT+F6vjw8NvDY5GpaiJDlYtQTwsTgnFltVli+PnZ
3VuhvFYTOThZLq3BSHwMEiLljVZ2dGcKPRDrOeYXVojcZaUqMDP3alaNjK5m
I3wY8WqjwyMhKlNZfL+jFywm6Kz2ptrIDIJNrn1aYua8vMW8rKq9zuVZoYwV
ajr1ejWRt5cXUYSwqsTiuhSqrhbOT8RIRg3eqTKM/uS0n+NxudRWSOk8xqo6
92au8FOTzIlc8Oc/pvfjzBX4Bp3wpaqWYXJwsF6vx/3PzRonvqzkD7Wdeuwk
QIm0xPnpydUVfoTKaw3bfiVvHLZ67QzG32aLulBlOZSv87E8wrAM25/I19hP
0DbQC5dD+tHhy0P+UZeVpwHazk1ddIorLP/Hebf8eOnNaly6XfXhtrIcQ7OD
WglROl/Axis9EcKUs+6XlOejN2NyV2jtPopL4dvN29Mvj4+/SY9fHb047h5f
psevv33Jb0+VvV2qgh6lrJSfkxEabTgglc/DOFMWTi91VrFyWcgPsmx09M3h
4YvxoipsnB4DBiI1TZNuSSGC4Fh6lVUm0+GXn//1y8//xt8fasSPNaUOsnL4
7iqIlmquTIlgyxoJaloHDdmXKltgMOI4V1OrH9c2Cz4blyZU47lbHcytC0H5
zUGlfXGQBPzUSOjre3V+eyfPb+TXXx4dIVVW8qUQo9EIi8O4UFyIu4UJEglT
FxpRkZuQkf9DzMxfSw3RuShGA0/AllcYF4TXCNOCttslU6Gh+lxLbB42mGPR
IF0pF25N1sqRzXJtqoXsJAtMV9KUaYUkIIzjTgqT59izeCLPEZ8uxySsJcTt
jmZDqbBPHTJvpngHcR8/fi7QPn0aikLdkxUWmrZdkW3cTAZX6B01ZBHNP/LJ
/EMZ6myBmaoS/U0i+hvLyIWZL7QfWb3SVs7qMov2wZxSwAVLqzamnB94vbT0
MGTL6QdVLK2WA5XnGGo4vJpwGsAcVwp7UNZuhrLU657cqYcQfverXh0KrNSN
rxGGZbahlfQDwo/eA5prmF/K7dBpnR1EK5sWiksWOsPmTCh4l5UMC1fbXE61
VITo8Mh6odlASKWAZcSuXVs/7EXCUE4dIma6waZK7IQLAwWfBqB4CpQniP1/
1Mbrgl1xAbSuMZOiX8t7vZFrBySQg8sPt3eDYfwvr97z883Znz+c35y9oefb
dycXF+2DSCNu373/cPGme+pmnr6/vDy7ehMn463ceiUGlyc/4gtZafD++u78
/dXJxYD2V21ZFqWPHABbAbi1X3pdwV4qiK1wfn16/d//HL1EWP8OGHh8dPTt
p0/pxzdHX7/ED7JwXM2VdpN+IsI3gkoPIAlSED6IqaWplA2cMnDUGumpvYYd
v/grWeZvE/ndNFsevfw+vaANb71sbLb1km22/2ZvcjTiI68eWaa15tb7HUtv
63vy49bvxu69l9+9IvSWKAGvvhcUPHegIYHzv5c0mfZlSPiJ95Q9co6Ao+iT
DoG3MkggTCIMWSlvXI3Y35NEoUoFU2Wd1JgimBJ0TIsdyKFMQDXZxcixpHAO
4ASdJDdDziRRBCJIFO17mQNVUNl9IO9ubQWPvbI8lu8BQCuIqqlSai4/lFhP
JJXYg5VBlsuZsYjPsA++EJUhj0NC1LCB/lQ1lU1YBCaCn1CFEO6B7OJmYgfv
5flMKhl2l5NL5UnwXikyJbAMcMC5Y112D6gG4jpLOdVZgBSKkp6GKMujAlkr
mn0a5EpuZjO8n3lXROckv15+OIm/aQbElAS/EnujmoYB/QJJLhpKsgPDqJJw
yj0JAtnNrALqzRKzZV9oeIxGBM5/Dc1V1cCkkjtyZfQUSGRojCjYyg/DaO2H
Ru0Z4WOAK1EpwGJoOXpAmSITlOxtuVYbqi5CPwBsQnIaxRWoORGnTCccaaKH
wDfaLgVvrlcG+rLFBE9f6qzdIIfiVFfkvmk9Z5XxYWqsq1JYvaUNWZmqIa1E
+xTihAYXENGUQ0LKtmSSVSPu5x3TMuUKeMbr1lxaIEmHgwpNQ4hoq2mWWRpE
BoKAPvwTjcqQARFefYC0aGDotqOYSayD8j7PTbLnEgSNtoPfMd+JWKGcw3Qb
gY2vtY7rxsCK9ZNsjadYiMdkgWaTQ/I4NMd2U+CKAhSiapAAa8uitpWBD6qD
vifTgGiaSj9UB9AamRFLB7uf1MMuLQuEwiVCw2+GzXiiwHJneBMPoj8c8bAV
l9sbGssTZEi1QCuCPNzA+6Ld+1BaFHnSkRiNK2c1NX/yGYlsqmFrCRBvtEoc
ntwl8s6i9s/hng+lYZoQ/dAzOwVKyjmKvkQV/hA5Xet+4nPkIUrKiH86h1SG
noa6MkrCY1BWybl39TISHSqScZXessPOxaLQxZQyJFkwTiVjBBjFVN1Iu2nW
JIearLYIY8KaFHUxI2cxErftzOw5BrVICpMre9AXd06Ja4mdMbkrTAH45Upl
Qq2s2BHKeSPf3aHhZXZ+ensL1lVX8Rds1TgwkbSYwyd15QpGrR6vE4+9xbwV
E7eOCSfeAxpeMg9xjv/39oUBngsuuCtVNaLPDT5ycxubDCKQ0WBpHqeW6KUW
D4sJtUYhanKBDOBXqXeJBExF3alyWdCmPMcuOAzQTRGXb/Mh0tqEdoiOA0LY
FpJgnltqEhpxGJO1fFiiA8Nr9vdME6fXjM8g9PyMpNRliJnI0HprAOep6MVK
Rha1ieTKZx8/pq7506fnSEPsy7L5kwUEpQN3o4x3j3nHhA5NqQCTzNRdk0x2
9tkDow7FIwcx5gpxtk1cOFr6uDJ1OReOSj4bcHRt1/zBc07Hhu+YgvYDt6Dm
ZDpFCbjaPflgraeS/EWMX7J16UvsuwA22B6DOHkqu6dNsdeZUceoi9r14wRe
Ql5Q7rV8itzKGbNbgCOzWy8MFgbbsTXaPNZXdPZIraFq+soVKcB7YggukGUZ
6vC0LsjhNKYi0uRFbxC6MmIECEFLCt68ebunStxxhA74A6UZ8G3mHIetbp1W
hKS90hWZ5IcErIOZsxa9+QYml6ULekAm8A7NGaiTczYaOI4SH24utgVLN2XP
zWrPKbqnarQrryUax+6VPiBzxtvfna6mrqZ2tjGIiFnUqsA2TN9Q2OPhXIjt
D8wCdeNahO2KtJjVVvTinizOczou7NAzgRskuEjwubNLZioRMjlEaZ3IlV1G
HtHlHDDBaSrEXxbGRkUj2+Njht1hjIUL5XMoTn15qjeCYa5rkSmxImlpIJKc
Y6ivht8N0aUpH70waqGSAutzzSASAZMkRcacA9XKDZWS+XDP7muT6zK0nY2O
fL0D7x1xpAQCmYg01iRDMpmPBZN2Vjj8QTmpMF0QBwB03jM1L+Mocp4Nsd4C
EiGzW1eqCt3EPfX51/VWEZ0A7DjL1wuXHFa6ikGWreVS3LIp6XTO12kLbEPr
yPCcMyidRCnJvqOpIvvt+0hEPRK72V0imMhW+6s0aDDg/TLPEWnPqhrwucXd
zukJIClxd5ZXtHxxJz0ijiKjKm/QjfRimnhTg8dtme1oBqEbrQnag3YSn+M5
U1BM8Qg+XMHHMx0ZgrEoIyKrCTqRPNQ+PXdwUpgIcTTmPnHcP0uPx3qBXZL0
Y651TM0myAR1mL9l/ItxtBJp/Mjw/tDf1qzvnVilhOkIK7c2DY0/5hh5QYwN
0ed01BDBoItlFQ814zENcRPGBxWXSJHULgRt6STGIVlJPsdgj/9lirt0wMh1
582dzBQCrCHIdF7SHO3t5a/pHLl7tkDYKMxMasOqtk7FDohYgFk5m8OjX8TD
hsglTWiCRj7T4/l4GGt6siel4FNuj7iZnDp3/5zPPWRbbTmU0pK9nmalrMkZ
p5ouNQc5oZMPlDNmRuNGk148NmuTa8u5izBMUNTyj6Rr1H5XxNPQO2rMicMx
KYtXBC1PIOEWs4eNNOymzy+7+mVmPebXb0bXighvppeYHcGOrkyW3J3SXmGt
JTyo48F524PTMUzM2qSTzlvqwlc/Zk7nELGDKLcys3UirIRSB7JoaWmOmXQi
O6MTwCnhGNGCXie51Z0Oie9EFiwHLZ0jyHq/1GU8IpZHE3lO/TSlAwqw8glv
qA9sz8F2ItPHc1qRLTSzNKQ09WcJU48OD3/f9EAjilTUka2+e16bnI4n+HKi
PzDVLecTxetOml5t6Xw84RtFTIg59Eqey2d0wfYcoVc+rbhV44a0XUoFwbvD
HE81BjpFHKDhoAzA+PbsnK7UogH40Ehby42zaIZDepFajTVXx7WOLQnezd22
eV9MmhP4BDl5XKQ2YdGAkxh1LUu/CRu1nZZaIf2bWqUaUiwpi/ETkYGxs60j
D4ag89LGU4WIOnu4G1kmt+9q5/yyQacpwYedjVK+I4OokDQndmrlKPXTyShU
h4pFe+tAxc80BcxwqlO7RACattJctXTEbp/wP+s3jgXM3YTM8457xP18TuXe
ZU8iEf12An4mv4Af9Dhp3mtg0nkiuXnK5f728VsZqvqPX8IRDBA4eT6b+zvd
NHK29+4PWPB1d8S8Jffx979Z7PnJ1Yk83ZG5fS9ER5KliyPboKvSBZYpdLrH
I8ghiSfZfenWgKV5vKyJdzQNc19TbMO75LF7+Rouel2D+lEzcoJ01ht5qW1p
7t1qKK9BrK1ZyjvlhuLCBCXf0NWmqm28AeOjcGrZ0NVgl3NUv6jdmhKvAHOF
v2dkAiZmqCpq7tVywbgdKhQZ5hRP5JWrOOQoNNCRvT2VZwAk5yfy2lL/BocX
4Bhxy4l9xCNeicrvic0uuCdsqVZqbNaLxlCtNRNKpwCciMHNI3es/8/9m/jM
/dvevebn798Ggm+wHll19wKY8zLVLz5w2KoA8cB/MIZBuSMYUtxYLDIW/wMl
oM7qQyIAAA==

-->

</rfc>
