<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.13 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lenders-dns-over-coap-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="DoC">DNS over CoAP (DoC)</title>
    <seriesInfo name="Internet-Draft" value="draft-lenders-dns-over-coap-04"/>
    <author initials="M. S." surname="Lenders" fullname="Martine Sophie Lenders">
      <organization abbrev="FU Berlin">Freie Universität Berlin</organization>
      <address>
        <email>m.lenders@fu-berlin.de</email>
      </address>
    </author>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <author initials="C." surname="Gündoğan" fullname="Cenk Gündoğan">
      <organization>HAW Hamburg</organization>
      <address>
        <email>cenk.guendogan@haw-hamburg.de</email>
      </address>
    </author>
    <author initials="T. C." surname="Schmidt" fullname="Thomas C. Schmidt">
      <organization>HAW Hamburg</organization>
      <address>
        <email>t.schmidt@haw-hamburg.de</email>
      </address>
    </author>
    <author initials="M." surname="Wählisch" fullname="Matthias Wählisch">
      <organization abbrev="FU Berlin">Freie Universität Berlin</organization>
      <address>
        <email>m.waehlisch@fu-berlin.de</email>
      </address>
    </author>
    <date year="2022" month="July" day="11"/>
    <area>Applications</area>
    <workgroup>CoRE</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document defines a protocol for sending DNS messages over the
Constrained Application Protocol (CoAP). These CoAP messages are protected
by DTLS-Secured CoAP (CoAPS) or Object Security for Constrained RESTful
Environments (OSCORE) to provide encrypted DNS message exchange for
constrained devices in the Internet of Things (IoT).</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Constrained RESTful Environments Working Group mailing list (core@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/anr-bmbf-pivot/draft-dns-over-coap"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines DNS over CoAP (DoC), a protocol to send DNS
<xref target="RFC1035"/> queries and get DNS responses over the Constrained Application
Protocol (CoAP) <xref target="RFC7252"/>. Each DNS query-response pair is mapped into a
CoAP message exchange. Each CoAP message is secured by DTLS <xref target="RFC6347"/> or
Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/>
to ensure message integrity and confidentiality.</t>
      <t>The application use case of DoC is inspired by DNS over HTTPS <xref target="RFC8484"/>
(DoH). DoC, however, aims for the deployment in the constrained Internet of
Things (IoT), which usually conflicts with the requirements introduced by
HTTPS.</t>
      <t>To prevent TCP and HTTPS resource requirements, constrained IoT devices
could use DNS over DTLS <xref target="RFC8094"/>. In contrast to DNS over DTLS, DoC
utilizes CoAP features to mitigate drawbacks of datagram-based
communication. These features include: block-wise transfer, which solves
the Path MTU problem of DNS over DTLS (see <xref target="RFC8094"/>, section 5); CoAP
proxies, which provide an additional level of caching; re-use of data
structures for application traffic and DNS information, which saves memory
on constrained devices.</t>
      <t>To prevent resource requirements of DTLS or TLS on top of UDP (e.g.,
introduced by DNS over QUIC <xref target="RFC9250"/>), DoC allows
for lightweight end-to-end payload encryption based on OSCORE.</t>
      <figure anchor="fig-overview-arch">
        <name>Basic DoC architecture</name>
        <sourcecode type="drawing"><![CDATA[
                - FETCH coaps://[2001:db8::1]/
               /
              /
             CoAP request
+--------+   [DNS query]   +--------+   DNS query    +--------+
|  DoC   |---------------->|  DoC   |...............>|  DNS   |
| Client |<----------------| Server |<...............| Server |
+--------+  CoAP response  +--------+  DNS response  +--------+
            [DNS response]

]]></sourcecode>
      </figure>
      <t>The most important components of DoC can be seen in <xref target="fig-overview-arch"/>: A DoC
client tries to resolve DNS information by sending DNS queries carried within
CoAP requests to a DoC server. That DoC server may or may not resolve that DNS
information itself by using other DNS transports with an upstream DNS server.
The DoC server then replies to the DNS queries with DNS responses carried within
CoAP responses.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>A server that provides the service specified in this document is called a "DoC
server" to differentiate it from a classic "DNS server". Correspondingly, a
client using this protocol to retrieve the DNS information is called a "DoC
client".</t>
      <t>The term "constrained nodes" is used as defined in <xref target="RFC7228"/>.</t>
      <t>The terms "CoAP payload" and "CoAP body" are used as defined in <xref target="RFC7959"/>.</t>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="selection-of-a-doc-server">
      <name>Selection of a DoC Server</name>
      <t>In this document, it is assumed that the DoC client knows the DoC server and the DNS resource at the
DoC server.
Possible options could be manual configuration of a URI <xref target="RFC3986"/> or CRI <xref target="I-D.ietf-core-href"/>,
or automatic configuration, e.g., using a CoRE resource directory
<xref target="RFC9176"/>, DHCP or Router Advertisement options <xref target="I-D.ietf-add-dnr"/>.
Automatic configuration <bcp14>SHOULD</bcp14> only be done from a trusted source.</t>
      <t>When discovering the DNS resource through a link mechanism that allows describing a resource type
(e.g., the Resource Type Attribute in <xref target="RFC6690"/>), the resource type "core.dns" can be used to
identify a generic DNS resolver that is available to the client.</t>
    </section>
    <section anchor="basic-message-exchange">
      <name>Basic Message Exchange</name>
      <section anchor="sec_content-format">
        <name>The "application/dns-message" Content-Format</name>
        <t>This document defines the Internet media type "application/dns-message" for
the CoAP Content-Format. This media type is defined as in <xref target="RFC8484"/>
Section 6, i.e., a single DNS message encoded in the DNS on-the-wire format
<xref target="RFC1035"/>.
Both DoC client and DoC server <bcp14>MUST</bcp14> be able to parse contents in the "application/dns-message" format.</t>
      </section>
      <section anchor="dns-queries-in-coap-requests">
        <name>DNS Queries in CoAP Requests</name>
        <t>A DoC client encodes a single DNS query in one or more CoAP request messages the CoAP FETCH <xref target="RFC8132"/> method.
Requests <bcp14>SHOULD</bcp14> include an Accept option to indicate the type of content that can be parsed in the response.</t>
        <t>The CoAP request <bcp14>SHOULD</bcp14> be carried in a Confirmable (CON) message, if the transport used does not provide reliable message exchange.</t>
        <section anchor="request-format">
          <name>Request Format</name>
          <t>When sending a CoAP request, a DoC client <bcp14>MUST</bcp14> include the DNS query in the body of the CoAP request.
As specified in <xref target="RFC8132"/> Section 2.3.1, the type of content of the body <bcp14>MUST</bcp14> be indicated using the Content-Format option.
This document specifies the usage of Content-Format "application/dns-message" (details see <xref target="sec_content-format"/>).
A DoC server <bcp14>MUST</bcp14> be able to parse requests of Content-Format "application/dns-message".</t>
        </section>
        <section anchor="sec_req-caching">
          <name>Support of CoAP Caching</name>
          <t>The DoC client <bcp14>SHOULD</bcp14> set the ID field of the DNS header always to 0 to enable a CoAP cache (e.g., a CoAP proxy en-route) to respond to the same DNS queries with a cache entry.
This ensures that the CoAP Cache-Key (see <xref target="RFC8132"/> Section 2) does not change when multiple DNS queries for the same DNS data, carried in CoAP requests, are issued.</t>
        </section>
        <section anchor="examples">
          <name>Examples</name>
          <t>The following example illustrates the usage of a CoAP message to
resolve "example.org. IN AAAA" based on the URI "coaps://[2001:db8::1]/". The
CoAP body is encoded in "application/dns-message" Content Format.</t>
          <artwork><![CDATA[
FETCH coaps://[2001:db8::1]/
Content-Format: application/dns-message
Accept: application/dns-message
Payload: 00 00 01 20 00 02 00 00 00 00 00 00 07 65 78 61 [binary]
         6d 70 6c 65 03 6f 72 67 00 00 1c 00 01 c0 0c 00 [binary]
         01 00 01                                        [binary]
]]></artwork>
        </section>
      </section>
      <section anchor="dns-responses-in-coap-responses">
        <name>DNS Responses in CoAP Responses</name>
        <t>Each DNS query-response pair is mapped to a CoAP REST request-response
operation. DNS responses are provided in the body of the CoAP response.
A DoC server <bcp14>MUST</bcp14> be able to produce responses in the "application/dns-message"
Content-Format (details see <xref target="sec_content-format"/>) when requested.
A DoC client <bcp14>MUST</bcp14> understand responses in "application/dns-message" format
when it does not send an Accept option.
Any other response format than "application/dns-message" <bcp14>MUST</bcp14> be indicated with
the Content-Format option by the DoC server.</t>
        <section anchor="response-codes-and-handling-dns-and-coap-errors">
          <name>Response Codes and Handling DNS and CoAP errors</name>
          <t>A DNS response indicates either success or failure in the Response code of
the DNS header (see <xref target="RFC1035"/> Section 4.1.1). It is <bcp14>RECOMMENDED</bcp14> that
CoAP responses that carry any valid DNS response use a "2.05 Content"
response code.</t>
          <t>CoAP responses use non-successful response codes <bcp14>MUST NOT</bcp14> contain a DNS response
and <bcp14>MUST</bcp14> only be used on errors in the CoAP layer or when a request does not
fulfill the requirements of the DoC protocol.</t>
          <t>Communication errors with a DNS server (e.g., timeouts) <bcp14>SHOULD</bcp14> be indicated
by including a SERVFAIL DNS response in a successful CoAP response.</t>
          <t>A DoC client might try to repeat a non-successful exchange unless otherwise prohibited.
The DoC client might also decide to repeat a non-successful exchange with a different URI, for instance, when the response indicates an unsupported Content-Format.</t>
        </section>
        <section anchor="sec_resp-caching">
          <name>Support of CoAP Caching</name>
          <t>The DoC server <bcp14>MUST</bcp14> ensure that any sum of the Max-Age value of a CoAP response and any TTL in the
DNS response is less or equal to the corresponding TTL received from an upstream DNS server.
This also includes the default Max-Age value of 60 seconds (see <xref target="RFC7252"/>, section 5.10.5) when no Max-Age option is provided.
The DoC client <bcp14>MUST</bcp14> then add the Max-Age value of the carrying CoAP response to all TTLs in a DNS response on reception and use these calculated TTLs for the associated records.</t>
          <t>The <bcp14>RECOMMENDED</bcp14> algorithm to assure the requirement for the DoC is to set the Max-Age option of a response to the minimum TTL of a DNS response and to subtract this value from all TTLs of that DNS response.
This prevents expired records unintentionally being served from an intermediate CoAP cache.
Additionally, it allows for the ETag value for cache validation, if it is based on the content of the response, not to change even if the TTL values are updated by an upstream DNS cache.
If only one record set per DNS response is assumed, a simplification of this algorithm is to just set all TTLs in the response to 0 and set the TTLs at the DoC client to the value of the Max-Age option.</t>
          <!--
With short responses, a usable ETag might be almost as long as the response.
With long-lived responses, the client does not need to revalidate often.
With responses large enough to be fragmented,
it's best practice for servers to set an ETag anyway.
As specified in {{RFC7252}} and {{RFC8132}}, if the response associated with
the ETag is still valid, the response uses the "2.03 Valid" code and consequently
carries no payload.
-->

</section>
        <section anchor="examples-1">
          <name>Examples</name>
          <t>The following examples illustrate the replies to the query "example.org. IN
AAAA record", recursion turned on. Successful responses carry one answer
record including address 2001:db8:1::1:2:3:4 and TTL 58719.</t>
          <t>A successful response:</t>
          <artwork><![CDATA[
2.05 Content
Content-Format: application/dns-message
Max-Age: 58719
Payload: 00 00 81 a0 00 01 00 01 00 00 00 00 07 65 78 61 [binary]
         6d 70 6c 65 03 6f 72 67 00 00 1c 00 01 c0 0c 00 [binary]
         1c 00 01 00 01 37 49 00 10 20 01 0d b8 00 01 00 [binary]
         00 00 01 00 02 00 03 00 04                      [binary]
]]></artwork>
          <t>When a DNS error (SERVFAIL in this case) is noted in the DNS response, the CoAP
response still indicates success:</t>
          <artwork><![CDATA[
2.05 Content
Content-Format: application/dns-message
Payload: 00 00 81 a2 00 01 00 00 00 00 00 00 07 65 78 61 [binary]
         6d 70 6c 65 03 6f 72 67 00 00 1c 00 01          [binary]
]]></artwork>
          <t>When an error occurs on the CoAP layer, the DoC server <bcp14>SHOULD</bcp14> respond with
an appropriate CoAP error, for instance "4.15 Unsupported Content-Format"
if the Content-Format option in the request was not set to
"application/dns-message" and the Content-Format is not otherwise supported by
the server.</t>
        </section>
      </section>
    </section>
    <section anchor="coapcore-integration">
      <name>CoAP/CoRE Integration</name>
      <section anchor="doc-server-considerations">
        <name>DoC Server Considerations</name>
        <t>In the case of CNAME records in a DNS response, a DoC server <bcp14>SHOULD</bcp14> follow common DNS resolver
behavior <xref target="RFC1034"/> by resolving a CNAME until the originally requested resource record type is
reached. This reduces the number of message exchanges within an LLN.</t>
        <t>The DoC server <bcp14>SHOULD</bcp14> send compact answers, i.e., additional or authority sections in the DNS
response should only be sent if needed or if it is anticipated that they help the DoC client to
reduce additional queries.</t>
      </section>
      <section anchor="observing-the-dns-resource">
        <name>Observing the DNS Resource</name>
        <t>There are use cases where updating a DNS record might be necessary on the fly.
Examples of this include e.g. <xref target="RFC8490"/>, Section 4.1.2, but just saving messages by omitting the
query for a subscribed name might also be valid.
As such, the DNS resource <bcp14>MAY</bcp14> be observable as specified in <xref target="RFC7641"/>.</t>
      </section>
      <section anchor="oscore">
        <name>OSCORE</name>
        <t>It is <bcp14>RECOMMENDED</bcp14> to carry DNS messages end-to-end encrypted using OSCORE <xref target="RFC8611"/>.
The exchange of the security context is out of scope of this document.</t>
      </section>
    </section>
    <section anchor="considerations-for-unencrypted-use">
      <name>Considerations for Unencrypted Use</name>
      <t>While not recommended,
DoC can be used without any encryption
(e.g., in very constrained environments where encryption is not possible or necessary).
It can also be used when lower layers provide secure communication between client and server.
In both cases,
potential benefits of
unencrypted DoC usage over classic DNS are e.g. block-wise transfer or alternative CoAP
Content-Formats to overcome link-layer constraints.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="new-applicationdns-message-content-format">
        <name>New "application/dns-message" Content-Format</name>
        <t>IANA is requested to assign CoAP Content-Format ID for the DNS message media
type in the "CoAP Content-Formats" sub-registry, within the "CoRE Parameters"
registry <xref target="RFC7252"/>, corresponding the "application/dns-message" media
type from the "Media Types" registry:</t>
        <t>Media-Type: application/dns-message</t>
        <t>Encoding: -</t>
        <t>Id: TBD</t>
        <t>Reference: [TBD-this-spec]</t>
      </section>
      <section anchor="new-coredns-resource-type">
        <name>New "core.dns" Resource Type</name>
        <t>IANA is requested to assign a new Resource Type (rt=) Link Target Attribute, "core.dns" in the
"Resource Type (rt=) Link Target Attribute Values" sub-registry, within the "CoRE Parameters"
register <xref target="RFC6690"/>.</t>
        <t>Attribute Value: core.dns</t>
        <t>Description: DNS over CoAP resource.</t>
        <t>Reference: [TBD-this-spec] <xref target="selection-of-a-doc-server"/></t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P.V. Mockapetris" initials="P.V." surname="Mockapetris">
              <organization/>
            </author>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu">
              <organization/>
            </author>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.  This document updates DTLS 1.0 to work with TLS version 1.2.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander">
              <organization/>
            </author>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson">
              <organization/>
            </author>
            <author fullname="F. Palombini" initials="F." surname="Palombini">
              <organization/>
            </author>
            <author fullname="L. Seitz" initials="L." surname="Seitz">
              <organization/>
            </author>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE).  OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration.  Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC7959">
          <front>
            <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby">
              <organization/>
            </author>
            <date month="August" year="2016"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks.  Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates.  In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS).  These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
              <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs.  In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers.  Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
              <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations.  Therefore, this specification updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7959"/>
          <seriesInfo name="DOI" value="10.17487/RFC7959"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8132">
          <front>
            <title>PATCH and FETCH Methods for the Constrained Application Protocol (CoAP)</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="A. Sehgal" initials="A." surname="Sehgal">
              <organization/>
            </author>
            <date month="April" year="2017"/>
            <abstract>
              <t>The methods defined in RFC 7252 for the Constrained Application Protocol (CoAP) only allow access to a complete resource, not to parts of a resource.  In case of resources with larger or complex data, or in situations where resource continuity is required, replacing or requesting the whole resource is undesirable.  Several applications using CoAP need to access parts of the resources.</t>
              <t>This specification defines the new CoAP methods, FETCH, PATCH, and iPATCH, which are used to access and update parts of a resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8132"/>
          <seriesInfo name="DOI" value="10.17487/RFC8132"/>
        </reference>
        <reference anchor="RFC7641">
          <front>
            <title>Observing Resources in the Constrained Application Protocol (CoAP)</title>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <date month="September" year="2015"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful application protocol for constrained nodes and networks.  The state of a resource on a CoAP server can change over time.  This document specifies a simple protocol extension for CoAP that enables CoAP clients to "observe" resources, i.e., to retrieve a representation of a resource and keep this representation updated by the server over a period of time.  The protocol follows a best-effort approach for sending new representations to clients and provides eventual consistency between the state observed by each client and the actual resource state at the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7641"/>
          <seriesInfo name="DOI" value="10.17487/RFC7641"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC8094">
          <front>
            <title>DNS over Datagram Transport Layer Security (DTLS)</title>
            <author fullname="T. Reddy" initials="T." surname="Reddy">
              <organization/>
            </author>
            <author fullname="D. Wing" initials="D." surname="Wing">
              <organization/>
            </author>
            <author fullname="P. Patil" initials="P." surname="Patil">
              <organization/>
            </author>
            <date month="February" year="2017"/>
            <abstract>
              <t>DNS queries and responses are visible to network elements on the path between the DNS client and its server.  These queries and responses can contain privacy-sensitive information, which is valuable to protect.</t>
              <t>This document proposes the use of Datagram Transport Layer Security (DTLS) for DNS, to protect against passive listeners and certain active attacks.  As latency is critical for DNS, this proposal also discusses mechanisms to reduce DTLS round trips and reduce the DTLS handshake size.  The proposed mechanism runs over port 853.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8094"/>
          <seriesInfo name="DOI" value="10.17487/RFC8094"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema">
              <organization/>
            </author>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson">
              <organization/>
            </author>
            <author fullname="A. Mankin" initials="A." surname="Mankin">
              <organization/>
            </author>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="M. Ersue" initials="M." surname="Ersue">
              <organization/>
            </author>
            <author fullname="A. Keranen" initials="A." surname="Keranen">
              <organization/>
            </author>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks.  This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee">
              <organization/>
            </author>
            <author fullname="R. Fielding" initials="R." surname="Fielding">
              <organization/>
            </author>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="I-D.ietf-core-href">
          <front>
            <title>Constrained Resource Identifiers</title>
            <author fullname="Carsten Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="7" month="March" year="2022"/>
            <abstract>
              <t>   The Constrained Resource Identifier (CRI) is a complement to the
   Uniform Resource Identifier (URI) that serializes the URI components
   in Concise Binary Object Representation (CBOR) instead of a sequence
   of characters.  This simplifies parsing, comparison and reference
   resolution in environments with severe limitations on processing
   power, code size, and memory size.

   The present revision -10 of this draft contains an experimental
   addition that allows representing user information
   (https://alice@chains.example) in the URI authority component.  This
   feature lacks test vectors and implementation experience at the time
   of writing and requires discussion.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-href-10"/>
        </reference>
        <reference anchor="RFC9176">
          <front>
            <title>Constrained RESTful Environments (CoRE) Resource Directory</title>
            <author fullname="C. Amsüss" initials="C." role="editor" surname="Amsüss">
              <organization/>
            </author>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <author fullname="M. Koster" initials="M." surname="Koster">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>In many Internet of Things (IoT) applications, direct discovery of resources is not practical due to sleeping nodes or networks where multicast traffic is inefficient. These problems can be solved by employing an entity called a Resource Directory (RD), which contains information about resources held on other servers, allowing lookups to be performed for those resources. The input to an RD is composed of links, and the output is composed of links constructed from the information stored in the RD. This document specifies the web interfaces that an RD supports for web servers to discover the RD and to register, maintain, look up, and remove information on resources. Furthermore, new target attributes useful in conjunction with an RD are defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9176"/>
          <seriesInfo name="DOI" value="10.17487/RFC9176"/>
        </reference>
        <reference anchor="I-D.ietf-add-dnr">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="Mohamed Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy">
              <organization>Akamai</organization>
            </author>
            <author fullname="Dan Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Neil Cook">
              <organization>Open-Xchange</organization>
            </author>
            <author fullname="Tommy Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="11" month="July" year="2022"/>
            <abstract>
              <t>   The document specifies new DHCP and IPv6 Router Advertisement options
   to discover encrypted DNS resolvers (e.g., DNS-over-HTTPS, DNS-over-
   TLS, DNS-over-QUIC).  Particularly, it allows a host to learn an
   authentication domain name together with a list of IP addresses and a
   set of service parameters to reach such encrypted DNS resolvers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-dnr-11"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links.  Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type.  "RESTful" refers to the Representational State Transfer (REST) architecture.  A well-known URI is defined as a default entry point for requesting the links hosted by a server.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC1034">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P.V. Mockapetris" initials="P.V." surname="Mockapetris">
              <organization/>
            </author>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC8490">
          <front>
            <title>DNS Stateful Operations</title>
            <author fullname="R. Bellis" initials="R." surname="Bellis">
              <organization/>
            </author>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire">
              <organization/>
            </author>
            <author fullname="J. Dickinson" initials="J." surname="Dickinson">
              <organization/>
            </author>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson">
              <organization/>
            </author>
            <author fullname="T. Lemon" initials="T." surname="Lemon">
              <organization/>
            </author>
            <author fullname="T. Pusateri" initials="T." surname="Pusateri">
              <organization/>
            </author>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document defines a new DNS OPCODE for DNS Stateful Operations (DSO).  DSO messages communicate operations within persistent stateful sessions using Type Length Value (TLV) syntax.  Three TLVs are defined that manage session timeouts, termination, and encryption padding, and a framework is defined for extensions to enable new stateful operations.  This document updates RFC 1035 by adding a new DNS header OPCODE that has both different message semantics and a new result code.  This document updates RFC 7766 by redefining a session, providing new guidance on connection reuse, and providing a new mechanism for handling session idle timeouts.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8490"/>
          <seriesInfo name="DOI" value="10.17487/RFC8490"/>
        </reference>
        <reference anchor="RFC8611">
          <front>
            <title>Label Switched Path (LSP) Ping and Traceroute Multipath Support for Link Aggregation Group (LAG) Interfaces</title>
            <author fullname="N. Akiya" initials="N." surname="Akiya">
              <organization/>
            </author>
            <author fullname="G. Swallow" initials="G." surname="Swallow">
              <organization/>
            </author>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski">
              <organization/>
            </author>
            <author fullname="B. Decraene" initials="B." surname="Decraene">
              <organization/>
            </author>
            <author fullname="J. Drake" initials="J." surname="Drake">
              <organization/>
            </author>
            <author fullname="M. Chen" initials="M." surname="Chen">
              <organization/>
            </author>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document defines extensions to the MPLS Label Switched Path (LSP) Ping and Traceroute mechanisms as specified in RFC 8029.  The extensions allow the MPLS LSP Ping and Traceroute mechanisms to discover and exercise specific paths of Layer 2 (L2) Equal-Cost Multipath (ECMP) over Link Aggregation Group (LAG) interfaces. Additionally, a mechanism is defined to enable the determination of the capabilities supported by a Label Switching Router (LSR).</t>
              <t>This document updates RFC 8029.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8611"/>
          <seriesInfo name="DOI" value="10.17487/RFC8611"/>
        </reference>
      </references>
    </references>
    <section anchor="change-log">
      <name>Change Log</name>
      <section anchor="since-draft-lenders-dns-over-coap-03httpsdatatrackerietforgdochtmldraft-lenders-dns-over-coap-03">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-dns-over-coap-03">draft-lenders-dns-over-coap-03</eref></name>
        <ul spacing="normal">
          <li>Remove TBD on CoRE resource directory in <xref target="introduction"/>. Optional usage of CoRE-RD is already
discussed in <xref target="selection-of-a-doc-server"/></li>
          <li>Remove TBD on "request text duplication" in <xref target="change-log"/>. This issue will be handled in a
separate draft on a new CBOR-based content format</li>
          <li>Add note on OSCORE in <xref target="oscore"/></li>
          <li>Add note on Observe in <xref target="observing-the-dns-resource"/></li>
          <li>Change title from "DNS queries over CoAP" to "DNS over CoAP"</li>
          <li>Mention "application/dns-message" parsing requirement in <xref target="sec_content-format"/></li>
          <li>Remove obvious CoAP behavior restatements from <xref target="basic-message-exchange"/></li>
          <li>Remove ETag specifications in <xref target="sec_resp-caching"/></li>
          <li>Caching: specify Max-Age / TTL calculation including simplified version in <xref target="sec_resp-caching"/></li>
          <li>Remove subsection on "Proxies and caching". All relevant things on caching were discussed in
<xref target="sec_req-caching"/> and <xref target="sec_resp-caching"/>, considerations on proxy / DoC server behavior and
late responses are general CoAP problems.</li>
          <li>Be more precise when Confirmable (CON) messages <bcp14>SHOULD</bcp14> be used in <xref target="dns-queries-in-coap-requests"/></li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-dns-over-coap-02httpsdatatrackerietforgdochtmldraft-lenders-dns-over-coap-02">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-dns-over-coap-02">draft-lenders-dns-over-coap-02</eref></name>
        <ul spacing="normal">
          <li>Clarify server selection to be out-of-band and define "core.dns" resource type in
<xref target="selection-of-a-doc-server"/> and <xref target="new-coredns-resource-type"/></li>
          <li>Add message manipulation considerations for DoC servers in <xref target="doc-server-considerations"/></li>
          <li>Update Considerations for Unencrypted Use in <xref target="considerations-for-unencrypted-use"/></li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-dns-over-coap-01httpsdatatrackerietforgdochtmldraft-lenders-dns-over-coap-01">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-dns-over-coap-01">draft-lenders-dns-over-coap-01</eref></name>
        <ul spacing="normal">
          <li>Remove GET and POST methods</li>
          <li>Add note on ETag and response codes</li>
          <li>Provide requirement conflict for DNS over QUIC</li>
          <li>Clarify Content-Format / Accept handling</li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-dns-over-coap-00httpsdatatrackerietforgdochtmldraft-lenders-dns-over-coap-00">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-dns-over-coap-00">draft-lenders-dns-over-coap-00</eref></name>
        <ul spacing="normal">
          <li>Soften Content-Format requirements in <xref target="request-format"/> and <xref target="dns-responses-in-coap-responses"/></li>
          <li>Clarify "CoAP payload"/"CoAP body" terminology</li>
          <li>Fix nits and typos</li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-dns-over-coaps-00httpsdatatrackerietforgdochtmldraft-lenders-dns-over-coaps-00">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-dns-over-coaps-00">draft-lenders-dns-over-coaps-00</eref></name>
        <ul spacing="normal">
          <li>Clarification in abstract that both DTLS and OSCORE can be used as secure transport</li>
          <li>
            <t>Restructuring of <xref target="basic-message-exchange"/>:
            </t>
            <ul spacing="normal">
              <li>Add dedicated <xref target="sec_content-format"/> on Content-Format</li>
              <li>Add overview table about usable and required features for request method
types to <xref target="dns-queries-in-coap-requests"/></li>
              <li>Add dedicated <xref target="sec_req-caching"/> and <xref target="sec_resp-caching"/> on caching
requirements for CoAP requests and responses</li>
            </ul>
          </li>
          <li>Fix nits and typos</li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA71b3XLbyJW+x1N06Iu1EoISJVm2mZlJZEmOVStZikTFNeVx
pZpAk0QMAhw0IJnr0bzK7kUeI1c7+2D7ndPdQIM/srzlWpVLpsD+O//fOX0Q
hmFQJmWqBqJz/PZa5LeqEEf54aV4epwfbXUCORoV6nYg8FcQ51EmZxgaF3Jc
hqnKYlXoMM50SPPCKJfzcGc/iGSpJnmxGAhdxoGuRrNE6yTPysUck09Phq+D
IJkXA1EWlS53d3Ze7uwGslByIA7n8zTBfIzWwV1efJwUeTUf4EhXJ8FHtcCj
GEtkpSoyVYbHdJAg0KXM4r/LNM+w/kLpQM9kUf795yovlR6ILA/myUC8L/Oo
K3RelIUaa3xazOjDhyCQVTnNi0EgQiEMheeYn2RKXOfzaaLEmSE1EPjJi8lA
vC4UHt9kCejWSfnbP0vxShVpkvEQx7TXN/5TNZNJOhCznmXcn8dVOOKve7Hy
9j6aFokuE5mJw5n+7V9a+7Mj9+Wf5UxXSutelM/8ySr7KP7y27+yOP+f/5RZ
c+I3h+/EGzkbVcWktR7G9yYVTpRPsOhU3oVTM6p9qOE0n0ktjnriOprOkrj8
4splT5uRmxc9l2U5TbDsu9/+OU0TjP9GHL6TyqzX5nGQ5cUMynWrBtDAbOz9
FYRhiFV1WcgIGjWcJlpA36uZykoRqzGUQQsp5kUOLcpTgblCg2tJNhFkODOI
Qk4whi2onKrgCCqM1TAx9tVaXLolnpKdbfXAWqWVMbp6FVgD76WiUsXBaCGO
h2fX4bWKqgLLGQOl39db4Ja4GP0DAwV/nZQLPpy//dXJ9XBcpcFJdpsUeUY0
afH04vro4upkS5Q5bXWbxEqoLCoWc2zp0yTUp2gqM3zAukHkrRur2yTCaZOM
KK7NUuRjEAXOYJPTfLjVM9yFLsQphIBhRR5XEXEj+N772cT2NY6p68sCBJAo
aFzw+fPvrl4f9Xf2nt3fi58rVSTETXw5wblooULpOUjwJCU2SCpYkpQwaz/f
fbZ7f98TJzKa8oq0yyJ064q5TAoBMmZyPseCSYbjycAXb81Qu0jrO8zUVsxW
7Hbfg73956AJInikuMV6cZvVXhz09+7vA5xNZRq7NftDiBNelrgGaY+hGBk8
TopnPRKREtJT5wokRxK/IHRIhs6fZHqeOAKc7N4Mh5dEyp9o8/0X+9gcknwD
/cesrpjmdwrDINdkppkikkys5mm+YGWwOuarn6dvga9vXXE3TcDXSlcyTRdM
BM4LJtwl5ZSXKdTPFY5oWJNYheQTB3xQIpTMAmfC3sOjS+aGoQGSzqsiai/S
bZ8sHzrjgMFUacxsqnlhpcqs2Hm5T9p0mtECmK9L0ufW0C5H36pM0uQ/oLes
LmMlS4hN0+BZUiYTxFyKy3cjGX3UJIxYlnJSyFk4gnRiHGM2qzIrNed06lWS
LEqrGC55lObRx/AuwZc4TKbHJBPDTp2nt6CH2Hcpwcfz4Q3Z4ChVMxZ+i7qn
WqkWiV1Sa9aYZ1t/ZBoCTP4E83TrOyeEwCfjOKGxMhUpRJDS+hFMBTL+I9ge
VkbfiEQE/wK+hKkgtfF1ExSMx0nEsqPj1S4/z2qiJGiC8s+AV4I8E2vcW1sX
1kqf6SeycQD+D3vnc3p6cwyPpXqTXjdoqVnDrr/enB5ZTr3cfbZzf7/F8hZQ
3fxOB0RTmkym5Z2i3zDXOCzzkPzdXC7SXMbOaxPFLGva3lg7jv7rr7+yXoB1
AQdJ/ycUr0+GR28EITc92N5+DzDWH8SjF4NB/8P28vDlB0t/s14SV5Qugz+E
9ucP+OZ97SY/4K/WV/U3ovVN8ItgJgjxS7j080PzVa/9w99gPXyD+UdpQvL6
5bvlBX6B5yyI8798t7RA803r/JYw699b5/cjSuv8PmPe+6M+sEiCzwPxZJxM
GDjfJuoulAW0kaH4951XUkNrWQnwNCEUAP3u3AfG/c5yOIlkNgeSlaAQlo2V
azXErAgmNFIwOJWR3/z8eWWn+3tgbXYrkWFTyYESzoT0G3a+bC+ksj7ecaE1
kgX+j9mzAoX5OsDLST6QZraS15Gl9wAxckEmQ/9leVnvXfIwRHP/AEmpVTqm
c1SaTpHDERV8FnZUxA3r4EF9NYcVKznj7+3uzDtvc8zPsCXchaGcHJtPGq/V
hgzrqbXf9kg8qpglWZ7mk0XQQjaHza6gzbo6zXvSF/AzQs9VlIwTxgz4wkdC
CW2dpvhKIk+D1MxiHTp2nIzhpDlEIwQkpRgX+QzjolRqUqNOw4JOD7pcmAOT
JNMF4q3TAMNV3tdHVoUi1WChrCrFyrnMWh2LExCeZ6Lju9QsB9UdmleRowL0
NyAvNnr6J8ZXuy8QEZsVtOgwo62767A7N49GebzoMFheuxzDtZfPXtbLIYMU
lEJiyfOb62Gna/4Xby/489UJnPHVyTF9vn5zeHZWfwjsiOs3Fzdnx82nZubR
xfn5ydtjMxlPRetR0Dk//BHf8NEvLoenF28PzzqrgiZSwPSRwWEFgk7JdAVg
W1QkI0PZq6PL//6v/r6lcLffB4UO1/WfI9giuKnM7JZnQEDmT0hwERAqlQWt
AsFBevOklCliMHinAcIyAatSYNfv3xNnPgzEd6No3t//wT4gglsPHc9aD5ln
q09WJhsmrnm0Zpuam63nS5xun/fwx9bfju/ewyC4VqnFJXCexluZINBKTb5v
5ymnS3Lrkt3hb1gc/o6NkZfW3Vj7+pghnNcPrTcgCTnDqpGFmRt4jjO4zGHL
QFoi5zgPs2NUCT2ZyQwo1wD1SVXIhpSbq1NrUnsvXxxw6iCOzLPT8LiXqHIc
RjnQ1LRQYwC0gNBTVeZk21F7wa5gCGN9hORyTHPeGDAoKglAWRjTf35AgO/4
DXAzFr3KK+iyOIxBSglkyZruCPFPA9gXxllB5nq4/iDCqgdrNaiPEficw+Nq
EphvTgUVfkcOPk50RKHPOLclTpfTIq8miBiAWNlHwEDKyxI9MwI0CExY0zOU
N1MXcxUYZMfrXrkvhvhCHJbwmqOKHLLzawcHLw24M/mHtwy5SNhcnMEz2tDN
7qzMA5N7jZGMIYHNQEVUE5DW0YQU71YmqSQFsYHMKB2YYLDEuc3uTmzmuUG5
jZfseBh6m6p7NjfsUJZZYtnwNUcAwjafnwDWDyL73ESG+2AZcj30syHpbxUU
YFOJtLzaeDiqTph0HpGhfVJCHpSSN8skTaiQuhGSzUyvrUs4gGH3VI+qDaT5
qWrXRbII4Sx2qSkj+izER+RPBVdLsHWrItELXuUEKhqvwKlJ4w/YxUL+TpRz
WWhOekubqfJOD/KAyA0COsxfLZDBLObJlcVlD4qHoIp3PkOjbjPAAHYsS9ZH
+A3q24L/TSGrFohJNFyQ2tuFP5qpcprHvcCdyxm3TUYJxx1GkZo7Z0EMSQBc
qL7MC7MkKTU0/DHWYC2IOVfLxoE0iwNaZ7W7jlQN7yg4kgaNE3CTJPH06OLt
liMKOjE22zvcacw1zkEvwViXyBYqTXj6St0nCJ48eeLkIYyOWn/lQLZsHbJr
Q5OVCquJY5OPWxeOYEJGxJpyiVp4Vt1Gmi2ROMXf7e31+t21TLaL8gZOXZ1U
4hpFqmVfYUTYW7J2dxKjKBVzCRsszd2s709jVcLzUc2Myg1rfNH9Vs9q9IMm
VucsX7G7FeN1NWcl4JnkekyhwrpGLBza0sV9UKcgVo5W9bQyaOH0WIAXiOuW
xyTVqZIxAYX0Ti44TdkRXLTj41slofWVLTO4Z1RcWWBcWFD03bKpHQF/FyK0
nK1JeKRdDccrFlZcpkSoG1hT06nCfwektsWedXq01ZiFLSITFhWzKi2Tedre
31X96oNRfafrW2UrvewyWk4AuVRsRXHySc6wqjaMHucUwEkUyjwXSZpWlIuU
ywon20VYRF6Xi3bs3F5eTHri9K04xE+nKbTQMoS0Oq6G8pNfRPnpw3aHi21B
na8IZmgdOb4YbK176JnqzRfrNW3lHYgNy/NY410fHnNpsq6B2Nnhf32xaz7s
uif+v+fi4Jl4/kIc9MV7ICZZLD60i0QHsXi+Iw4iGrezJw7G4vmuOHhu5/cj
u0eE3/x5/SoYYcY98qdexQTGqzqhb0KjffIl6BIEj6z7c+3DrH0Ch2OVth4e
5HNV2Fpsu8Zgr34ogsQPeHMXzx72babg6K3+JQQRLDm/xzhYY9KWQrLFw5VY
VfGNJ13Tts/yJSQT8NJIrmovwjc9y8gAW2YLWxGqBWJWIKf10D6rIYzcYLAx
glEBqp3E1dHc7ntkABPdF+BX6ipm9IBlp4oiLzTjLL966A4A75AwIboCiVoT
wBpDBHRJY6VXb0VehG4/loKF54/tTZjzx/u9fq+/BT/GWYOXOLNvXypoOTxV
FHQZtBC3Mk3i9qGpEC9FZ7e388yxqxMU/vHAnaVVaU4GoGzpo5uq1gwtXKGB
MYdkNObvGhAreYxLAyvrjA1rHZt431QuwBHwkDVJ1qjPKVSA/ceIC6vXQi4I
Q9CuIMbEePcobkMbOZtKmwvGZTJTiL96y0OZtabRva4BcQbwXZ9c/e314enZ
sl4Q+G54tWT/bWOb8R0BIreJ93NFaewyt+v73CpLWcFI3fjKB3ROkemyES9B
FbOyTHWOxCkiePuYHSxj6holhcouB/okI3cQqa4RjA/SPVOgUi7ABwMsvvhu
ZXWPw196vgaA+Q7T3oCanB96rquZE/65/BQegg6ofuUDhfqokr3RQgyHZ1bt
grb0tEitEUO3ZFrn534dlmcXKlLJLYg05YyNNWzK9kkKFv5re1E6loBUq+c9
2KF7N2yjfa9g7rC9K7lef6f3zDryLK+XsS7PlIQ5Iq3oBXOQS+kyjtfzjOkl
L0KkttlHURK2B/q1WLFzsmjiijkEcZpcR8k3l5FMoyplf82THXaUWudRws8x
lUq9NuXzfZ1MJ3kBzZzx/tpKv2X+9YL2Tpt7DMoWfZY5rBQ+QTRmlmTJDGpE
gjV1RZ8uaUC4rkbcbmJqiYZdRviOJcw82W5csDpg7yMRLT6Zy3ZLLuwlYSPh
61N2j8R21p9Gt7i6zOWQUnk5BOJoffNKlwNJXQRz7DgZyok7Kh6ZXIEDgy0U
Ijc2tdAWQl5KHh0tXQ7pYIV1F0SSy66JdbyRgUTVPGapjhYrtmGPfjo28YCK
EoYZLLK5vSXyTdLWaU1dB+geKWhUV05LY2JORYzw/4G8gZfz1bXltDg1I8k6
PeFRq3VgqyEt62irFF0kffc7YM135D31lJxbHT7pzEhbCOCxLIxfJsyX8r2g
hMPJKZzopcIHL0ZfhSm7GW/FpmDY4KxMGRALNTPSpcNChnahJpynsuBaGBdS
zd3FuJATMiJwOEjKf4MuUMSdk67TRZfpnSJ/VtsVRMrUwJUiz91UpDBui5ns
Z5t1QaYxsMYL1GiO16fumpKiPRPVbc+qtPWmhGf2xN9oSMdgLNsLowk8ZGW6
CExSSqxy91I9pA4/PCoN1V4eak/QuoQ0hZzlxDOgxNMqdqdLH6pCc1WsKjK2
tB5C4Qqk0hbAkVXITN+pIrDG4UGPOC4oSNXZZB/55GB3sDfYZ8rJFJ+9eN5/
yXBjDW4bmOTUh4FfnYxaGxiYndblni/6QroktPn9/5171uPM773nYv8lz9/h
zBjP4aReNGM2ZLA+ISaV3uPf+1/KYN8ZHEsujdGneFrjRnedSP1YW6TrMOR2
fbpxvA4gN2jdGEaDvaycv4Vs1whyd50Iv60gNzLP4naRR2RDLkY16UJ3+ZrO
gndXQGOfQm1Kc8CiedEEUV62jW9FBznXM3GzEcV2gsQl9uvSzTrMmLTlTro0
mCJJsDmvdTeLS6sapfAgf3Os0SJw7Qic1BJF23zTd8o9gXKlYdO7N2ruTbkV
EVCxsF3cm0sppxYb2O7Bo7eH5yc1jFlBg64E3haJca7UAzMDs/y7sWCkpvI2
gSjM1Q4yYboZB34wI2yRnTetAJdMBoigP0kMcKoLGn7PF3tOe4ME0yHkEdvb
JYCwKrIRJKtmI0o7xyu1f22bR0gLz87e9lZSkromzCFnNieAaBy3rm+jmvY4
c2c7zblj08J57Vm8Z95TvjJ2KbPmvpIxx3mKHkWD3CS4ESVzDp+u5LsQU5XO
V7FMYKj2j2TLuaDsYsS9Ld7Nq7slfaDMRvwA3rNNHawdmhIThwGN3IykWRo1
AsoU+SvJwY53HKeAEi4Y19DO3ZtQhl5f+9HdbLdVJtntilFVWuAnmYr6VgtK
lM+SsrSkBSZic/shoXrXqkFd7n7iPLJQ2eCbKpp2V6+kzw9/pHE5s84U+ddj
oYP9Pve1mE6/wNnUamEntwig1abutRE2Td/m8sYs6Dhz0OdtSEnrrN6iVu0a
kBndf+Kd84pBvo7yuao57q572Kn4zoFZdpM1J7jRm66mW+7m3TRJlW0ZI9On
FyqANb3eN64IkaXRgShBb5ok3a09WHlLYvP7k5TfMm2UzuuutM5zXjdjFI3O
bfWI97S7E7U5AgUceCgYNoeWOpO2Xd6i1ZeLaeUdde15t8POH8NbjujymA2i
G8zz0rRlY06mxgkXrILK4yVxw15wkF9x/WBciyys+q9p92WXktLFO78bYUBC
O4owUqVFcXjFrROhKbPVrCzJ/OsG9aWIsLGtZnhxfFG3tSMJOj18e/iIyUHw
Vt09umvh65oTzBnYu7toYGoGySRb12nAd3iudOD1CnCuHZjAYUvwa2brDrmP
sFCTBHxEAm5jhR0Pq7yUBZwKpKOpzmqGLRV12qWlh/sFvGNxaYBHn3ObBPWx
4DxuE8BAfh4O+S2uTWgvOKGrLWw8EMQ8QL7hq+MguFJc/4sw86f3eBKSXwjJ
rf30wYqv6YFptdJ8oVnhIfFIWOfdUmPO06L8fkucUbfPkBLXsmnV6fpnsLW8
zqNnU7pYqf+LAFXR6hCiHKu96EC4cwFncTMSu6PB0osxLoT0Wuxuc/sD3+HY
jrcwH4cyhHMOjY+5v7fvQdE7BHDVxtmf5ZPAt7XrhFDt+wffAdz78HRalnxF
SXe4VOX6CB9GTV6Uzm5jz+1pOUu3H15l65G2ilNDzDNMJW2j6L+hQc2Ez8R7
AYnevbiYW+Ti9R9cnYRXxwyGUqC8eIEEhDrJKq1dEH6IjcvH6Tj4zmEyrmrb
6Zi1TFwN03xC52E0yffaUJ+UHLyY0k2S7UzBUbSay8K+8TEuaQej60evLq7M
+x51xc3eo4XiMI45H2zeDjB755q0iw/dGsIAxPav5Q7IcXcTicnxludZTeHu
deNHOv69fq2i3K/cfs+0g+nnplr5gJuiHg1yZn6B1gph9T6y4X4+Av6v7Bsz
dTqAo0Ml7SUPn/bz5xF1ybn9Qgd0/LW4fGRxmH1BtTlC65KBOWI+D+yMRV3h
2+ZiiqtemwTPlWFcKRLS45ce8+yBHeyxCG26/lVw8NK8UmPqVWZ0pycOUyrV
pOpWcpMUvylF77rYi5I7gjm+dkPD3K5N84qru62exrz75KE6rG3aT7b9xKYW
ANbBDlS8X7r25hZHmdYNLPRqEYBEKF4p02M2hx0TVmFUtbFBS3uXbVVtr6RQ
ViPDJDMuxrWSkOd7jF/b/SZ+bfdr/NpRKgtSIMvE2uvYUivgLfmfkbmHim1T
ox/J2q2mtXA3Oi8rZrgT7g72jT2kJWpPUUMbmSVzp83RKr5vVMBaTLNb2B7O
S99woV98OVGwrrM1jpxA6IFgelPsscLtfxPh9h8rXD9q/eVkyGy/vLge2rZI
veSPbXm8qdubu3KMuqzbDRvn6F55NALwXzXzVGoJuW67noqpbVt4HNt2vgnb
dr6Kbdd8FbFMwNJLnVAO13XjQoPVbavTxvN4zsA+MR7cMqn97sm2/95J6b3s
E4rXySeRURrGlbcFksTH8E9/Gwbqr+WgIc+lnQQr7LvvpuLDmSa/0UjUWLjg
p9bSvabcdMGyOru3MfkNrfEDkXXAJV2j40jebe/N+ohuEF0riWsmu/faRGmq
JSPK+O0NmbEX1oq4edl1zCDANSqTsdnyMrk3zm2/GC02n/1xIdMLv3bvlvKa
N7r9V+lanVMbtO0JDJjeMgFQ5Os3HXwemEKkir/vjGWq+R1CzrJlPRL5wv8C
r/ad1QZEAAA=

-->

</rfc>
