<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-ech-keylogfile-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title>SSLKEYLOGFILE Extension for Encrypted Client Hello (ECH)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ech-keylogfile-00"/>
    <author initials="Y." surname="Rosomakho" fullname="Yaroslav Rosomakho">
      <organization>Zscaler</organization>
      <address>
        <email>yrosomakho@zscaler.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2024" month="October" day="03"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>encrypted client hello</keyword>
    <keyword>sslkeylog</keyword>
    <abstract>
      <?line 40?>

<t>This document specifies an extension to the SSLKEYLOGFILE format to support the logging of information about Encrypted Client Hello (ECH) related secrets. Two new labels are introduced, namely ECH_SECRET and ECH_CONFIG, which log the Hybrid Public Key Encryption (HPKE)-derived shared secret and the ECHConfig used for the ECH, respectively.</t>
      <t>This extension aims to facilitate debugging of TLS connections employing ECH.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://tlswg.github.io/draft-ietf-tls-ech-keylogfile/draft-ietf-tls-ech-keylogfile.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-ech-keylogfile/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tlswg/draft-ietf-tls-ech-keylogfile"/>.</t>
    </note>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Debugging protocols with TLS can be difficult due to encrypted communications. Analyzing these messages in diagnostic and debug tools requires inspecting the encrypted content. Various TLS implementations have informally adopted a file format to log the secret values generated by the TLS key schedule, aiding in this analysis.</t>
      <t>In many implementations, the file that the secrets are logged to is specified in an environment variable named "SSLKEYLOGFILE". <xref target="I-D.ietf-tls-keylogfile"/> standardizes this format.  With the introduction of <xref target="I-D.ietf-tls-esni"/> additional secrets are derived during the handshake to encrypt the ClientHello message using Hybrid Public Key Encryption (HPKE) <xref target="RFC9180"/>. This document extends the SSLKEYLOGFILE format to also offer support for the ECH extension to enable debugging of ECH-enabled connections. The proposed extension can also be used with all protocols that support ECH, including TLS 1.3 <xref target="RFC8446"/>, DTLS 1.3 <xref target="RFC9147"/> and QUIC <xref target="RFC9000"/><xref target="RFC9001"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="sslkeylogfile-labels-for-ech">
      <name>SSLKEYLOGFILE Labels for ECH</name>
      <t>This document defines two new labels for SSLKEYLOGFILE format: ECH_SECRET and ECH_CONFIG. The client <bcp14>SHOULD</bcp14> log the labels if it offered ECH regardless of server acceptance. The server <bcp14>MAY</bcp14> log the labels only if it successfully decrypted and accepted ECH offered by the client. The 32-byte random value from the Outer ClientHello message is used as the client_random value for these log records. The client <bcp14>MUST NOT</bcp14> log the labels for connections that use the GREASE ECH extension (see Section 6.2 of <xref target="I-D.ietf-tls-esni"/>).</t>
      <section anchor="echsecret">
        <name>ECH_SECRET</name>
        <t>This label corresponds to the KEM shared secret derived during the HPKE key schedule process. Length of the secret is defined by the KEM negotiated for use with ECH.</t>
      </section>
      <section anchor="echconfig">
        <name>ECH_CONFIG</name>
        <t>This label is used to log the ECHConfig used for construction of the ECH extension. Note that the value is logged in hexadecimal representation, similarly to other entries in the SSLKEYLOGFILE.</t>
      </section>
    </section>
    <section anchor="clientrandom-for-other-tls-13-sslkeylogfile-entries">
      <name>Client_random for other TLS 1.3 SSLKEYLOGFILE Entries</name>
      <t>The SSLKEYLOGFILE uses the random value from the ClientHello message as a "connection identifier". This creates ambiguity since the TLS handshake with ECH contains two different random values, one in the Outer ClientHello structure and the second one in the Inner ClientHello.</t>
      <t>The SSLKEYLOGFILE entries corresponding to TLS 1.3 secrets for connections that successfully negotiated ECH <bcp14>MUST</bcp14> use the random from the Inner ClientHello structure. In all other cases the random value from the Outer ClientHello structure <bcp14>MUST</bcp14> be used.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The applicability statement of <xref target="I-D.ietf-tls-keylogfile"/> also applies to this document: if unauthorized entities gain access to the logged secrets then the core guarantees that TLS provides are completely undermined.</t>
      <t>This specification extends the SSLKEYLOGFILE specification <xref target="I-D.ietf-tls-keylogfile"/> and therefore introduces the following threats:</t>
      <ul spacing="normal">
        <li>
          <t>Access to the ECH_SECRET record in the SSLKEYLOGFILE allows the attacker to decrypt the ECH extension and thereby reveal the content of the ClientHello message, including the payload of the Server Name Indication (SNI) extension.</t>
        </li>
        <li>
          <t>Access to the HPKE-established shared secret introduces a potential attack surface against the HPKE library since access to this keying material is not ncessarily available otherwise.</t>
        </li>
      </ul>
      <t>Implementers <bcp14>MUST</bcp14> take measures to prevent unauthorized access to the SSLKEYLOGFILE text file.</t>
      <t>According to SSLKEYLOGFILE specification <xref target="I-D.ietf-tls-keylogfile"/>, this extension is intended for use in systems where TLS only protects test data. While the access this information provides to TLS connections can be useful for diagnosing problems during development, this mechanism <bcp14>MUST NOT</bcp14> be used in a production environment.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-tls-keylogfile">
          <front>
            <title>The SSLKEYLOGFILE Format for TLS</title>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <date day="29" month="April" year="2024"/>
            <abstract>
              <t>   A format that supports the logging information about the secrets used
   in a TLS connection is described.  Recording secrets to a file in
   SSLKEYLOGFILE format allows diagnostic and logging tools that use
   this file to decrypt messages exchanged by TLS endpoints.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-keylogfile-02"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="15" month="September" year="2024"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-22"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
      </references>
    </references>
    <?line 112?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank Stephen Farrell, Martin Thomson and Peter Wu for their review comments.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA51Y7XLbuBX9z6dAlT9Jx6LjxLObaLabKLYcayJ/1FLqcTud
HYiERIxJgAuAUpSM36XP0ifruQApkbbW7fSPLYLAxf0499x72e/3IyddLgas
N51OvozuJlefz8aTERt9c0JZqRVbaMNGKjGb0omUneRSKMfORZ5r9nJ0cv6q
FyXciaU2mwGTaqGjKNWJ4gVkpoYvXF8Kt+i73PZFkvXvxSbXy4XMRf/168hW
80JausZtShwYj2ZnjL1gPLcaKkmVilLgj3K9A9YTqXTaSJ7Tw3j4Cf+gW298
MzvrRaoq5sIMohTKDKJEKwv9KztgzlQiWg3Y24gbwclQkVRGuk0vWmtzvzS6
KrE6M1zZUhvHJnwjDNvtgsrYmA4i1mdi64gkOCIjR9Aba/NgW7QSqoIKjP13
0YwFu3u30ESqJftMR2i94DLHOtz2kfwXa7OkZW6SDMuZc6UdHB7SLlqSKxE3
2w5p4XBu9NqKQ5w/pHNL6bJqHgSul4fPBob25/Cida2b/Lk4iImlfl7C82/j
zBV5L4p45TJtyK24kAE7CFbvLmY32uqC32e659cXVZ4HON1xo23OV7sdfgNs
5kp+5w4wGrC/24Tnwvg3InhxY5r9H7+Ht3Gii+beIPucKyUsm9kk0wuh5HKP
6K8KfjYWkWN6wYZlCQikbJoACAnOftJK9W8yIVV/KsWyrUGQHu+kf1wW32Il
XBQpbQrIXwExEaXP7inq9/uMz60zPMHGWSYtQ2pVBeHOliKRC4lruWJim6xO
M5cJ1s3lIJTe2ar0OKQ9iMaSIAdTtvdCAp/ryj2b8MwIgkfKrEiMcDZms7Vm
SqyBmrnIoZEREOmMTqtEpAfew/mG4exv09HJzWgGnVP/eHJ1eTb+fMDWmUwy
0shrdr6ZG5my62qey4R9EZtGHdLv5fn1l9GrfioMvAQdMtzWqOLlkgTIPtFq
IZessnhLFFYvH0B78h35ON/EtVt3DuSysOSpBU9kLh3sZKmYV1tXzSZTBnJR
JAEcgwCXud7QSwiPQ8wKmaa5iKIXbFx7gfZG0elWUGm004mGr9bIqCAUcZzj
MrlYyKTKHUsrQYq0GEcXRaVk4uMErw8VzzffSRxss4IVwlq+BCKkghi+VNo6
+I984k2ANLrRiN8rafy24IggoHORgjtczP7GjdSV9fpJGCoIeuF6lvGVaICT
I7o81f4wZ5TjLcw1Ua1DtOJ5hcuXQgnjUTTf+Nd0BziCIUVEWuXiAKFISTdY
4yhGnMy10sLJYwV+VJvHOh14Qf56l3HXujVgkhCPC6ETxDUJlNIFlENqJY1W
PrlWsJvPIYaQmz4qjb2Y/fjxp3H/NN7y247bHh6YdfA4N6n8DjO95sEXMWO3
FGzSSrZwQah6LFBYJSGKp6h42MLzjh0N9lNUkTp4Ge5EKty3IeNfhPQN2VsD
BDlBx/6HLINeH27OTt4fvXv98IA07zCQz5nUPss3VMdh3wJFr6GeVi52eUso
7/JOtmFTP6yn7awjVQQlUakpvXdiKIn8nXMRMt+nF/DZyjgPjUYbzwhSJXnl
sUYgPIrf1na/Oz7+6eHhgJ12l98fHf9MwUFe/fXr+KRZff0aTtr+PoLDiAFA
Q+gHQsrQiVOxkMoH1RL3CI95ai8s6118nc6otaH/7PLK/74Z4Y6b0Sn9np4P
J5Ptj6jeMT2/+jo53f3anTy5urgYXZ6Gw1hlnaWodzG8wxvSqnd1PRtfXQ4n
vW26beNMiHPeo0CtMCVgSGluo1TYxMh5yKBPJ9f//tfRMSEZDnhzdPQeLgoP
745+PsbDOhMq3KYV+CI8AgmbiJel4MbnISKV8BK8myObObI002uFJssIePPP
/yDP/HPAfpkn5dHxr/UCGdxZbHzWWfQ+e7ry5HBw4p6lPddsvdlZf+Tprr7D
u85z4/fW4i8fcqkE6x+9+/BrRBDqJtck1FjflZ+cP24LUoIX8U63ItPufTk6
+OOiHHKs7nJrDzRUXkuV6BxcSG/hj6K2LMF8OXiGstcKg36J8SQRJUgxEUFm
vQxXPBbogRGk2gqnrKXmbwOrmtJEOgZ59Y3N7XUVCfqGe96+6c83qN/ovlNd
hMLDFgY/aedVBTDvpUf403MHty2Rv3WlBBKzvqbA6oQSuOOxBpiPTaST7f7B
sxGu83s+34yG09EjanxphaCRwfPyT/GbP64Xr4hxXrRCWqPDX41bDbU+2nN2
aBO/jC4eNVB7SgtVgk5lJi6l2MRsItQS/AqFWgWe4OhRuA0KXaMwITrpCz65
gCz23By6plrrgLyO1k0wWo3EnuaOxj3Medt6+qTAxOxSu1ZbEMJIt4SeQBLJ
fOMAmkQ7g4iC5mzTWBwwKwsatABF6KEhwKBcOSNDs/WkAgbm7+CGtAwHm2Ly
aN4O4kJN6L6ClQGJ+4G8D8KALme9Hc6YpBma2h3Tq+s4YkUzHuPFXC4rmmnQ
FSRi24vtOoomTr4v5FIFdqFGFZkHqLfVAmtrJRqnPM2xEKUKJaVp1YEa7WvC
9tQYWndOxfu80vh/B2sPWL31b9Mx7c24Dr20sElm+tRtUrIJX+PtJ8rtTIrx
0lewEOeEPx+355zjVah7GA+m5pMB9RMWwTS81UJwmkQTPqeBZUP9p/NN8T6i
6HSqvlPyh0VNCa1SMiAirlQY0tHLpuRxNC7Uu3Mq1d6BDZPUadT4HEshloiO
YMuKwwVOiNr5FCFwyAp2hIYWkw0aeUdDYqVgXEHs0cxmdaMexp5nus7uvucN
D9gzYqHbo2qQutCIxTqwH+WIxSjeZ8OOua2qGch/Lw0QGPQ6SOXO8eQeAYeE
upztaYO3ioE5jVgJUFHwoh/IGmbbk/HtJpa2lBzm8rQ5MQ0l9xLjDECaNk56
Ob0cv2qR5FNDifxRXRxacGmzJ/N2y3WclZqUlNA5GIskMxijYTsBxrpdNcnl
3HDTME4bSYg3IkVWoDsR9K2PSFppx+gTi8VcRqPmij570bDgM20tLXWH42YY
FMaGBHLEXoXg0CMAvCSfwo8dWHeB3A2gg2/8QAn5cAwCXZPM/wu9g2DjLuLS
+rYaqN8VRmDJbiyS2FKXbAIf+96IphjwGLRFTFjKHY/ZbRYG3p0jMy9090ln
m2s1O7bZsP7sgGvBhV6D+tNB/ZkCXoYadTuQwn25LsnJtSGFSFAopC12DU8z
ehFHkIRmzG0N2J7SxsPL4R46a3ezGafYh528Hv3CJ5Y58EVChsm90muMh0s6
YKMfg/AdWKR/6S3Ab6L3EEW3qGG6ylPgLgzIYCF1z6ZOlMRTZxwVJM8P2AU3
DlrPMl3YOhmvBZH0bdV0fNJQXkp01vQ1hq6Mo/8AefSjaUUXAAA=

-->

</rfc>
