<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc docName="draft-liu-dnsop-protective-dns-00" xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="PDNS">Considerations for Protective DNS Server Operators</title>
    <seriesInfo name="Internet-Draft" value="draft-liu-dnsop-protective-dns-00"/>
    <author fullname="Haixin Duan">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>duanhx@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Mingxuan Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liumx@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author fullname="Baojun Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lbj@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Chaoyi Lu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lucy@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="May" day="26"/>
    <abstract>
      <?line 92?>

<t>Recent research work has delved deeply into a new type of DNS security service, Protective DNS, through various measurement methods, and it has been deployed in multiple DNS providers and even in national ISPs. Protective DNS identifies whether the domain names requested by customers are in the threat intelligence (blocklist) it maintains. For domain names listed in the blocklist, it rewrites the resolution results to secure resources to prevent users from accessing malicious resources, such as malicious servers (IP addresses), etc. This document summarizes the conclusions of these research works and provides specific and practical considerations and suggestions for the deployment and operation of Protective DNS. By following these considerations, Protective DNS service providers can effectively enhance the practicality and security of their services.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://MingxuanLiu.github.io/Protective-DNS-Draft/draft-ietf-dnsop-protective-dns.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-liu-dnsop-protective-dns/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/MingxuanLiu/Protective-DNS-Draft"/>.</t>
    </note>
  </front>
  <middle>
    <?line 96?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Currently, 90% of cyber attack activities originate from domain name resolution <xref target="Cisco"/>. Therefore, the approach of blocking unintended network resource interactions based on the Domain Name System (DNS) has become a crucial network defense measure. DNS Filter <xref target="RPZ"/> is the most common blocking method in the DNS. For domain names that match the blocklist, it prevents access to unintended (especially malicious) network resources by rewriting their DNS responses, that is, rewriting the resolution results of these domain names to a securely controlled host instead of the original host address. Considering that this method can intercept attacks at the initial stage, it is commonly referred to as Protective DNS and has been deployed and implemented by multiple national governments and DNS vendors <xref target="DNS4EU"/>, <xref target="US-Protect"/>, <xref target="Canada-Protect"/>.</t>
      <t>Recent research has explored the current deployment status and security properties of Protective DNS. This document summarizes the conclusions of these studies. These security considerations are applicable to all DNS resolvers that offer Protective DNS services (including DNS resolvers of international ISPs and well-known DNS resolution servers), aiming to provide practical deployment suggestions for Protective DNS service providers and effectively enhance the availability and security of this service.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="background">
      <name>Background</name>
      <t>As the Domain Name System (DNS) serves as the starting point for most network activities <xref target="RFC1034"/>, <xref target="RFC1035"/>, the defense mechanisms based on domain names have become one of the main approaches to defend against cyberattacks. The defense mechanisms at the domain name level are extremely diverse, and the nodes where blocking actions occur can be found among various domain name roles. For example, in the initial process of domain name registration, the registry and the registrar can use the method of Domain Seizure to delete malicious domain names from the registration data, thus preventing them from causing further harm. The Protective DNS defense mechanism that this document focuses on is implemented based on the DNS Filter <xref target="Error-Filter"/> technology and is mainly deployed on recursive servers. Since recursive servers are closer to the user side (compared with authoritative servers, registries, and registrars), the defensive effect of deploying this mechanism on recursive servers is more obvious, which is also the main focus of this document.</t>
      <figure anchor="figure1">
        <name>The workflow of Protective DNS.</name>
        <artwork><![CDATA[
          +----------------+
          | Threat         |
          | Intelligence   |
          +----------------+
                ^
                | query TI
          +----------------+
          | Protective DNS |
          +----------------+
      ^     |     ^
      |     |     | query & response
      |     |     v
+---------+  |  +----------------+
| Client  |  |  | Authoritative  |
+---------+  |  | Server         |
      |     |  +----------------+
      |     |
      |     | response (rewritten) for blacklisted domains
      |     | response for other domains
      |     v
+---------+
| Client  |
+---------+
]]></artwork>
      </figure>
      <t>Figure 1 shows the workflow of Protective DNS. First, when the Protective DNS resolver receives a DNS query request for domain name A, it will match this domain name against the blocklist <xref target="RFC5782"/> it maintains. Subsequently, once the domain name is found in the blocklist, Protective DNS will rewrite its DNS response, that is, resolve the query to a series of "safe" results (such as the safe IP address 127.0.0.1), thus effectively preventing clients from accessing the corresponding malicious resources. Conversely, if the queried domain name is not in the blocklist, a normal response will be returned. That is, it will query the authoritative server or use the locally cached results for the response.</t>
      <t>Through investigation, 28 out of 42 popular DNS providers have already offered Protective DNS services, which run on a total of 155 resolver IP addresses <xref target="NDSS24"/>, <xref target="USENIX24"/>. Among them, 8 providers support Protective DNS services and non-Protective DNS services on different resolver addresses respectively. For example, Cloudflare's Protectgive DNS service runs on 1.1.1.2 and 1.1.1.3, while 1.1.1.1 provides the original DNS service. At the same time, considering the defensive effectiveness of Protective DNS, countries and regions such as the United States <xref target="US-Protect"/>, the United Kingdom <xref target="DNS4EU"/>, and Canada <xref target="Canada-Protect"/> have listed Protective DNS as a defense infrastructure for national-level deployment and application.</t>
      <t>The defense strategies implemented by Protective DNS are diverse. The specific rewriting strategies mainly include secure IP addresses controlled by the providers, special-use IPs (e.g., 127.0.0.1), secure CNAMEs, responding with specific Response Codes (e.g., NXDomain, ServerFail), and providing an Empty Answer. Meanwhile, different providers' Protective DNS services focus on different types of malicious content, including advertisements, trackers, malware, phishing, and adult content.</t>
      <t>Protective DNS is implemented based on DNS Filter technology. The two protocols most closely related to it are as follows: 1) The <xref target="RPZ"/> protocol defines the response strategies of the DNS Filter, including the setting methods of the Root Zone and the response strategies; 2)The <xref target="Error-Filter"/> defines the structural definitions for stating the filtering results and the reasons in the response.</t>
      <t>Although the application requirements and deployment practices of Protective DNS are increasingly growing, due to the lack of guidance suggestions for deployment, Protective DNS faces serious security flaws. This document combines the conclusions of these research works with the measurement results to form some specific deployment suggestions, aiming to enhance the practicality and security of Protective DNS deployment. In the subsequent chapters, we will summarize the conclusions from the academic papers obtained through the measurement methods into conclusions that are helpful for Protective DNS service providers as a reference.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>Considering that deployment practice is the first step in using and even maintaining the security of Protective DNS, in this section, we propose a series of operational considerations that cover multiple aspects of deployment practice, including rewriting strategies, defense strategies, and transparency.</t>
      <section anchor="operational-consideration-1-select-an-appropriate-rewriting-mechanism">
        <name>Operational Consideration 1 - Select an appropriate rewriting mechanism</name>
        <t>The most crucial aspect for Protective DNS to achieve its defensive capability is to adopt the rewriting strategy for DNS filtering to prevent users from accessing malicious resources. Through summarizing the empirical analysis of popular Protective DNS providers and generalizing the DNS Filter technology, there are mainly five types of rewritings that occur in practice:</t>
        <t>1) Using the secure IP addresses in A record controlled by the provider:</t>
        <artwork><![CDATA[
    malicious_domain.com    A    10    controled_IP;
]]></artwork>
        <t>2) Using IP addresses with special purposes, such as the reserved address like 127.0.0.1, 0.0.0.0, 192.168.0.1 and so on:</t>
        <artwork><![CDATA[
    malicious_domain.com    A    10    127.0.0.1;
]]></artwork>
        <t>3) Utilizing the CNAME record to rewrite the request to the domain name controlled by the provider:</t>
        <artwork><![CDATA[
    malicious_domain.com    CNAME    10    controled_domain.com;
]]></artwork>
        <t>4) Using an empty Answer field in the response to prevent users from accessing malicious resources:</t>
        <figure anchor="figure2">
          <name>Format of empty Answer fileld in Protective DNS.</name>
          <artwork><![CDATA[
  0  1  2  3  4  5  6  7  8  9  0  1  2  3  4  5
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|                 ID (two octets)               |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|QR|   Opcode  |AA|TC|RD|RA|   Z    |   RCODE   |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|                QDCOUNT (one octet)            |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|                ANCOUNT (one octet)            |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|                NSCOUNT (one octet)            |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|                ARCOUNT (one octet)            |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
;--------------- Question Section --------------;
|  Domain Name (variable length)                |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|              QTYPE (two octets)               |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|              QCLASS (two octets)              |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
;-------------- Answer Section -----------------;
|  (empty, no resource records here)            |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
]]></artwork>
        </figure>
        <t>5) Using special response codes for the reply, such as NXDomain, ServerFail, etc:</t>
        <figure anchor="figure3">
          <name>Format of NXDomain Response in Protective DNS.</name>
          <artwork><![CDATA[
  0  1  2  3  4  5  6  7  8  9  0  1  2  3  4  5
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|               ID (two octets)                 |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|QR|   Opcode  |AA|TC|RD|RA|   Z    |   RCODE   |
|  |           |  |  |  |  |        | 0  0  1  0|
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|                QDCOUNT (one octet)            |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|                ANCOUNT (one octet)            |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|                NSCOUNT (one octet)            |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|                ARCOUNT (one octet)            |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
;--------------- Question Section --------------;
|  Queried Domain Name (variable length)        |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|              QTYPE (two octets)               |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|              QCLASS (two octets)              |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
;------------- Answer Section ------------------;
|empty (as NXDomain means no such domain exists)|
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
]]></artwork>
        </figure>
      </section>
      <section anchor="operational-consideration-2-provider-an-appropriate-blocklist-for-defense">
        <name>Operational Consideration 2 - Provider an appropriate blocklist for defense</name>
        <t>A necessary condition for Protective DNS to achieve its defensive capability is to construct a blocklist that includes a series of malicious domain names to be blocked. The structural components of the domain name blocking list are as described in <xref target="RPZ"/>. Through the empirical analysis of popular Protective DNS vendors, these vendors currently mainly focus on a series of items related to advertisements, privacy tracking, malware, phishing, and adult content.</t>
        <t>First, through the analysis of users of Protective DNS, Protective DNS providers <bcp14>SHOULD</bcp14> avoid using keywords for domain filtering, because this will increase the possibility of introducing false positives, which will affect the availability of Protective DNS.</t>
        <t>Second, Protective DNS providers <bcp14>SHOULD</bcp14> avoid using wildcard blocking methods and should carry out defense at the granularity of the minimum subdomain (that is, the Fully Qualified Domain Name), so that the collateral damage caused can be minimized.</t>
        <t>Finally, from the perspective of operational efficiency, the scale of the blocklist deployed on the Protective DNS <bcp14>SHOULD</bcp14> be carefully selected. It should not only avoid false positives but also choose an appropriate scale, as the scale of the blocklist will affect the response efficiency of the Protective DNS and the consumption of hardware resources of the device (such as CPU and memory).</t>
      </section>
      <section anchor="operational-consideration-3-offer-transparent-blocking-policies">
        <name>Operational Consideration 3 - Offer transparent blocking policies</name>
        <t>Protective DNS is a completely black-box service for users. Regardless of the rewriting strategy adopted by Protective DNS, users can only perceive the effect of defensive blocking, that is, the domain name cannot be accessed. Although Protective DNS providers can refine and improve the quality of the blocklist (filtering out false positives as much as possible), the existence of false positives that slip through the net can still severely damage the user experience. From the user's perspective, the website they want to access is inexplicably inaccessible, and it is difficult to distinguish from a large number of DNS tampering behaviors on the network (such as censorship, man-in-the-middle hijacking, etc.). Therefore, from the perspective of enhancing the availability of Protective DNS, we recommend that providers <bcp14>MUST</bcp14> ensure transparency as much as possible.</t>
        <t>On the one hand, to demonstrate that the blocking action originates from the Protective DNS, the service provider <bcp14>SHOULD</bcp14> provide a page to explain their rewriting strategy. In the results of the empirical analysis, we found that some providers rewrite by using a secure IP address and deploy a page on this IP address to indicate that the website the user is accessing may be malicious. However, using an IP address controlled by the service provider poses potential security risks, specifically the risk of Dangling resource takeover, which is elaborated in Security Consideration 3. Therefore, it is advisable for the service provider to use a dedicated page (this page should be explicitly deployed on the page provided by the service) to illustrate their defense strategy, helping users confirm that the DNS rewriting they encounter may be from the Protective DNS service provided by this provider.</t>
        <t>On the other hand, to avoid the impact of false positives, service providers <bcp14>SHOULD</bcp14> provide users with an appeal channel on the explanatory page, such as providing an email address. Through the analysis of the measurement results of academic papers, only 14 Protective DNS deploy explanatory pages on the secure IP addresses used for defense.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Furthermore, by integrating the operational considerations, we propose some security considerations to enhance the security of Protective DNS on the basis of improving its practicality. We put forward specific considerations covering multiple dimensions, and for each consideration factor, we provide specific recommended solutions, including aspects such as security blocking strategies, rewriting strategies, and privacy protection.</t>
      <section anchor="security-consideration-1-avoid-improper-configuration">
        <name>Security Consideration 1 - Avoid Improper Configuration</name>
        <t>To prevent the protection function from failing or even being bypassed, Protective DNS service providers need to fully configure the defense as much as possible, which mainly includes two aspects.</t>
        <t><strong>Avoid Redundant Configuration</strong>. According to the measurement of Protective DNS services, the configurations of Protective DNS by some providers have defects. Specifically, along with the secure rewriting records, providers may also include the original malicious records in the DNS response. For the local stub resolver of users, the selection of the resolution result is uncontrollable, and users still have a high possibility of accessing malicious resources. Therefore, Protective DNS providers <bcp14>SHOULD</bcp14> avoid such redundant configurations to ensure the completeness of the defense effect.</t>
        <t><strong>Avoid Configuration Gaps</strong>. While A records are the most common type of DNS resolution and are often the primary focus for defensive configuration by service providers—since they directly point users to malicious resources—empirical measurements have revealed that some Protective DNS providers fail to secure less common query types, such as TXT records. In these cases, the provider may return unfiltered responses, potentially exposing users to hidden threats. This oversight could be exploited to bypass PDNS protections, particularly when malicious domains embed harmful instructions within less scrutinized record types. Therefore, to ensure comprehensive defense, Protective DNS providers <bcp14>SHOULD</bcp14> configure defensive capabilities for all DNS record types, including TXT, MX, and others. However, situations such as DNSSEC also need to be considered, and detailed explanations can be found in Security Consideration 4.</t>
        <t><strong>Avoid Function Gaps</strong>. In addition to the defensive configuration of the response results, Protective DNS service providers should ensure that the defensive functions are effective in any functional scenario. Specifically, encrypted DNS should also have the same defensive effect as non-encrypted DNS, to prevent malicious domain names from bypassing the defense by merely using encrypted DNS.</t>
      </section>
      <section anchor="security-consideration-2-avoid-over-blocking">
        <name>Security Consideration 2 - Avoid Over-Blocking</name>
        <t>The primary defense objective of Protective DNS is to prevent users from accessing any malicious resources, that is, to intercept as many malicious domain names as possible. However, through practical analysis, some Protective DNS systems exhibit the phenomenon of over-blocking, which refers to the collateral damage caused by overly aggressive blocking. In empirical measurement and analysis, it has been found that some Protective DNS services adopt overly aggressive defense strategies for DNS queries of a group (no less than one) of malicious domain names. That is, they temporarily block the domain name resolution of all requests from a client, and even legitimate domain names cannot be resolved normally. This phenomenon is called the Denial of Resolution (DoR) attack caused by Protective DNS. Attackers can exploit this phenomenon to cause a DoR effect on any victim. Specifically, by forging the source address and sending a set of queries for malicious domain names, they can prevent the victim from normally completing any domain name resolution, thus achieving the effect of a denial-of-service attack.</t>
        <t>Therefore, Protective DNS service providers <bcp14>SHOULD</bcp14> avoid using aggressive defense strategies, such as the no-response strategy. At the same time, Protective DNS providers <bcp14>MUST</bcp14> pre-configure defense solutions against potential DoR risks. Specifically, when a client initiates a large number (higher than a certain threshold) of DNS query requests for malicious domain names to the Protective DNS server, the provider <bcp14>SHOULD NOT</bcp14> directly refuse to respond to any query requests for a certain period of time. Instead, it should send a relatively large DNS response to force the client to use DNS over TCP, effectively preventing attackers from launching DoR attacks constructed through IP spoofing.</t>
      </section>
      <section anchor="security-consideration-3-ensure-secure-resource-usage">
        <name>Security Consideration 3 - Ensure Secure Resource Usage</name>
        <t>Out of considerations for controllability, most Protective DNS providers will adopt domain names or IP addresses under their control as a rewriting strategy. However, improper management of these rewritten resources can expose serious security risks. For instance, after a third-party attacker takes over rewritten resources with vulnerabilities (such as those with expiration risks) and gains control over these resources, the attacker can trigger query requests for malicious domain names from victims to the Protective DNS server whose resources are under the attacker's control through means like phishing, and return modified malicious content to the victims, thereby establishing a connection between the victims and the attacker's server.</t>
        <t>Therefore, Protective DNS should strive to avoid using third-party resources as its rewriting infrastructure, such as cloud services. Even when using third-party resources, it is essential to use them with caution and regularly confirm the availability status of these resources.</t>
      </section>
      <section anchor="security-consideration-4-possess-compatibility">
        <name>Security Consideration 4 - Possess compatibility</name>
        <t>Since the defense mechanism implemented by Protective DNS requires rewriting the original DNS response content, this rewriting operation needs to ensure compatibility with other protocols and functions within the DNS architecture. Specifically, the rewriting performed by Protective DNS should not conflict with the processing of DNSSEC as specified in <xref target="RFC4033"/>. This is because if the rewriting of the DNS response by Protective DNS does not follow certain specifications, it may interfere with the verification process of DNSSEC. For example, if Protective DNS deletes or modifies DNSSEC-related records when rewriting the response, it may lead to the failure of DNSSEC verification. Therefore, when Protective DNS rewrites the response, it should handle DNSSEC records correctly and maintain their integrity to avoid conflicts with the DNSSEC mechanism. This item mainly focuses on DNSSEC-related records and does not conflict with Security Consideration 1.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1034">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RPZ" target="https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-dns-rpz-00">
          <front>
            <title>DNS Response Policy Zones (RPZ) draft-ietf-dnsop-dns-rpz-00</title>
            <author>
              <organization/>
            </author>
            <date year="2017" month="March"/>
          </front>
        </reference>
        <reference anchor="Error-Filter" target="https://datatracker.ietf.org/doc/draft-ietf-dnsop-structured-dns-error/">
          <front>
            <title>Structured Error Data for Filtered DNS draft-ietf-dnsop-structured-dns-error-13</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="April"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5782">
          <front>
            <title>DNS Blacklists and Whitelists</title>
            <author fullname="J. Levine" initials="J." surname="Levine"/>
            <date month="February" year="2010"/>
            <abstract>
              <t>The rise of spam and other anti-social behavior on the Internet has led to the creation of shared blacklists and whitelists of IP addresses or domains. The DNS has become the de-facto standard method of distributing these blacklists and whitelists. This memo documents the structure and usage of DNS-based blacklists and whitelists, and the protocol used to query them. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5782"/>
          <seriesInfo name="DOI" value="10.17487/RFC5782"/>
        </reference>
        <reference anchor="Cisco" target="https://umbrella.cisco.com/blog/dns-security-your-new-secret-weapon-in-your-fight-against-cybercrime">
          <front>
            <title>DNS Security – Your New Secret Weapon in The Fight Against Cybercrime</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="February"/>
          </front>
        </reference>
        <reference anchor="DNS4EU" target="https://www.joindns4.eu/">
          <front>
            <title>DNS4EU</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="May"/>
          </front>
        </reference>
        <reference anchor="US-Protect" target="https://www.nsa.gov/About/Cybersecurity-Col laboration-Center/PDNS/">
          <front>
            <title>Protective domain name system services</title>
            <author>
              <organization/>
            </author>
            <date year="2022" month="May"/>
          </front>
        </reference>
        <reference anchor="Canada-Protect" target="https://www.cira.ca/en/canadian-shield/faq-public/">
          <front>
            <title>Canadian shield offers dns-based protection against malware and phishing attacks</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="July"/>
          </front>
        </reference>
        <reference anchor="NDSS24" target="https://www.ndss-symposium.org/ndss-paper/understanding-the-implementation-and-security-implications-of-protective-dns-services/">
          <front>
            <title>Understanding the Implementation and Security Implications of Protective DNS Services</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="March"/>
          </front>
        </reference>
        <reference anchor="USENIX24" target="https://www.usenix.org/conference/usenixsecurity23/presentation/rodriguez">
          <front>
            <title>Two Sides of the Shield: Understanding Protective DNS adoption factors</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 308?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1d63LbRpb+j6fo1dRupAxJWbIySZS5hJbkiXZjS5bkymVr
Z6oJNMmOQYCDBiQzsafmHXYfYJ9lH2WeZM+lb7hQlpPM7I8dJ+WQINB9+vS5
fuc0Mh6Pk1rXuToWOydlYXSmKllr+CTmZSUuq7JWaa1vlTh9fi2uVXWrKnGx
xpvKyuwkcjar1C08fAm/7ySprNWirDbHwtRZkmRlWsgVjJ1Vcl6Pc92Ms8KU
6/Haj4sXxjk8ZurENLOVNgZmrzdreOr87OapEL8QMjclTKGLTK0V/FXUOyOx
ozINNGiZ45fz6RP4D1C8c35183QnKZrVTFXHSQYjHycprEcVpjHHoq4alQDB
jxMYt1ISxp1enU134OtdWb1aVGWzhmun5UrqQjwH6sX1xtRqZVeNrMGbX6kN
3J8dw0cxFoV6XYuFKuwdfLEpdFpW9otZy+pVrouFyLSpKz1rapWJXGULVSW3
qmiATFzrAwnAW5lJO/wF7s7hC7H3c63q+aSsFvyTrNIl/LSs67U53t/HO/ES
MH/ibtzHC/uzqrwzap/G2MdnF7peNjN49hkQ/rqRxZe62Q8yMYY9H5/i1uLN
vInRRNFDEx5posvBx/dZPpCaQQGZLOtVvpMksqmXJeyqGMN8QsybPGf5+kLq
18CtU5iNfoElHYsbAwQsGyleFjBOZXS9oR9T+HAsnij9HfzOV8qmqFFqT5a6
kHRJMUMzGHH5+vPaDjVRWTNJiz4Bbq0CFhso+HZZFosFXE4b+EXOSlKb96cC
FGf1+nP8PPl+keZytpWOJ7L8rulQ8XPwIZ99924mnCxludHiy78FB5p083l7
7UlRViuJInJMd149PTl49PjoGCTeKg9SZUD3QP1Tta6NkEUm5jLVua61MtFT
Hw08pVfrXK3A2JDO0bNmrVI91ykruX386NHjx/Q4Gci0qWBZ4hzWUWZN6h+9
Un9qdEXj2Ykvv2W68Y8zwTjGlTJrtFfissx1uhHflgXQswv374menqD1rNbf
jx892vGDkc0Tz1Clxacjcfjo4OMwkawWCpTU6SjcK+tKpq9UFYwBmO191Li+
WobpaMSzqiqr8VOd12hrW4sRsJprMLZp3VRg6OhOcQqzkV/hR+A6Lrg3i/HP
0YSKZjl43F3hdF3pXBwe4RIPP3r/JT5o3v0k0cW8J2kfffzJodv0JzkMnoNV
ZwH7aqlrRV/p5hNt0nJ4p720/PUv/ym+KZtKPFd3eLVStfhKSRADAQJ5s1TA
sMWyFtMFCKipxckGnFta6ZXq8uSpmlWNrDbi8GNiy9FWtoCDrFSey0mKBE7S
crU/y8sFWv+xsYSNN0DUuFB3eAWIGt8RUWNd8C9zpGosmapx6qmiSWGFR2cv
B1cO1/viunnHPt7d3U2+KyEIKMzRRDX7dOPL67F1KP2JouAlC6otDHtTA7GM
TpXZRsjhvYQURk4W5e3+dFY29T7th2faSZmDMyRTB9o/PgGVV9U+BkhM84ks
ZCa3002/a/AlZqlVnolyPofRBW7MTBpQGucc0bRYiVjJ/A7CGRLA9VLDkxBp
yLoGyeyt8F+bnJd4cO8SU12BcMh9VeynlqIxU7Q/l38ar5sZmCde0fPT6+vD
o/5KXkKwVpkaiEJyapDj875RDTYTfrO21cCih4LP4Q0DQ/cOYactywxI9ma1
Lg24U7ICdGktIa7ab2JSx0DquG3/x/BL0AsdkTou59141smWk9Gz5+dfD/Hn
5q4U1xBy03KRPdfE32PRZlyHETIr18Q9cGUchXfsYrNoTP0AjjQQFOvXxAlw
kSBkCvzkPl91Sz18vL+ulHFs2AevVulFo75PkvF4LOTMoG2tk+RKpXCTwHvJ
82A0LZYS5FbltyC0mVLrfAP2rC6FhID5juJXXDiuyU3n1HLUWfQI2AOR8WIp
bmWly8aIlZKmYYcKnyEuzMyI5EnXNO1MqQImXeflBmYH5V81ea1hS2k+2LBb
zHXYZCsIwAXZB1yjzMX59aWZdPmuMfMA9w/bdbeEGSETwj3L4rChAjcPUTDM
ONuIFLahXNEkoJpwD94O61CyRj6A9dULZLnYBcvLLmQPycfxatTriXgKzrI1
Ad7E68HB/HMjfK5Sd8BDuAl/go0o84bkBD7C2uFyyXzmH5sqVXQN9vcWuQgb
D6TOq3IlZAq/YbiHhkWnxHD/zEiYBjYYeBx+NJQZQphyfgnymcG9Rpm9kVB1
OgEHpkEMyrShzTLNagV7+L2lE4OzvDFO6eGSUW0p4j2yO2Z8EGavgvCBJuY4
Tpy9UrjWLBawGT6bpd0iiSBC8JbS5VR9gzMRTzbwWJ6Xd9Z6GdWZpSulTnoj
8QLTKRQYcLoH5F8VS4lbjrR44lHwiWCnBcwIXXkvNWF1W+ksy1UCKWUcYCbJ
SVOB8tZo1z999M/4ODlj6wEETnNLMS9E5XoBsXWteKNjxxhJzA8/UNjy9i1u
HtgF4J4aEc1yDWuTsDMwB0kf8gYyXRBnsFkZKHZNmu+khQSd1om7wP6rZOEd
SHF3gYl7Vn0hIoHpRAoxGST5fuBMzRVGx1b/J8R3jieBbIiS374VmkVrVYJn
hGFWMKGnlW2FUyDa556S1UuJWljDMvtaZtXFWCVBDYrWv6tIPmUOe+3VY6/H
FoP2gfXVChdsNq6kstG/GTEVGj607htSbK837VWgoWWFB2JAckFi8hxoXCJf
MGxQMnOex8pFzj9aFZ4Ihwnx5EBPjbpseYiyTduL2ZWLNgTdhPsOJMN44MUW
ihgHD/Jm5Lh0cDeYACCRpufhQBf6NpyMu3PKbGG9TfeWG4IyVRUr3qCCEwzY
rgz8JIgHx55v347gcwgd+Xs7LAPR7/s0pEm9BnKIcjRerHexVYH11o1pqzOo
DNgZ1r++mXl/82jqJoPBSDnxq5unawMr0leMVGbAI2R1njspK3My2LSpFGFu
sWVg0zWSQJFI+1mgh7a/5TZp5Xfg28avivKuCI+wyFpHAa5B6hVJVemsZWTM
Y352jPg7LS459C0WV94i+DXTWyyuNm68CdpYEH7UdO9PTtWcpBq+JwlmZa/U
Bj1UZsTOs5fXNwhE4n/F8wv6fHX24uX51dkpfr7+Yvrll/5DYu+4/uLi5Zen
4VN48uTi2bOz56f8MFwVrUvJzrPpNzsc7+xcXN6cXzyffrnDRi0WJpQAYPDM
mmEwXag40iTgSCFTm3Ek8eTk8n/+++AIdOCfILU9PDj4FGwof/nk4OMj+ALx
TsGzkfbyV2DoJgH5At3AUVC2UrnWtcwxEgNWLnH/0X0ANz/8d+TMfxyLX8/S
9cHRb+0FXHDrouNZ6yLxrH+l9zAzceDSwDSem63rHU636Z1+0/ru+B5d/PXv
cl0oMT745He/TRKUoSdgExHTLbIkmZr7/R7phkHW4W1gSCoy+mtIemuSfXJo
zpVETh38HoNfbMkspoVfOORxHjMFTdBmFfnhlsNYSlAq63jLQjnXQHc4v89+
hYbMfPZJwYa1/2SUhua0fiGOOHLwpDkJqXpdYywPspURRqlY2vCBosw44q5U
8OIuoChT0F9yRCDjc2SzkOBhFj5NaAU4Za5sTK1eS/QkIxcHOG8FiySnDktv
h0YLRO3Jzo2sF6YrG0+mu4WpgViaeceeErMcHu5a6e8b1kpIjEAdoyC6tRkU
nsUDk/lEMAsJgLttHGLDghU/kMqGwvZ5U1GCspTVinekYzd7GxS5d28+5vDB
oNMq0Hm3fG8rkIsjsBgTBMsBcy6LMi8XzCkMHmCNuM/OrVMcA7tokDTrHiaQ
FqPN7v1AwpLmpcHkq6TZMW0R6PbELkjuWqJvvtM1JChULdA1IXdugJHjp1Y2
X/Qbh04p6As+w26EhIGoZV5TAOS4NkQ9rRJiBFHObnFjRyC9GsIHuIylrKBU
xF/vehzbwVr++c9/9pm7EL8cd/78MvrxDewuZZT+QuvH8zjPbP9477D85w+9
K28EJLgg9jfnDyewI3oPouEP9tmYijetv5mOf/ER88BNt0kY/5d0cWC+N+Ik
1yjt+Dv9O20JDtDbHeWNq4R2ee4n37quN4P3uzWIXY71IZnYI4s/c9gyIihk
Hsy2R/H2kpR+6MYWK+I1t66j3P1wLH4x1wswUgcMVP1mB+0H+pw55MIDEezO
2yR5Sk+IA/L67MDueQLMRYXpFAYSdG9HRFyMibqlNDlFus57bkEWWnFspaeU
ZtxpCERc8qbbHsA5rFZWxx4TEf23HfTlupkZnIsz69JFkfGI2li300dkOmsi
uixEA/OYVrrXyvZo7TQar9cmcpXNH3aMnKsdn/ztOjSGggb4SQQMRhwcfjx5
BP8c7FmvEUfGkQdJSRx66A9nIBVTmW3BgyYcKIPTRi7puadce6H1vCrKeoBT
UlAtLw/CTMyaoQOom6pQGfowyx+3xZY3GNUPGHrsBXBOGCaifDzF+CXzjHOQ
kJt0gkE9g4wa1gM5x8I6/MNPRNmQHzg6hHBs3eSy6sCIFDvJHCxxtuF8Cmba
klE5f1A1BfoPCRsMQTMOf/DRR0H2YygNZJRBdpe7MqSMAM2U4h0MAUbik4gi
06zXZVVvTevQ9xVlMd72O0YbmhbCKTATFSiqCOlgUeoEVSd52WRzYJL6wOf2
i27GBqunSQ4m+M8h0cOfHxODIGPlrwcB+2shFdFgwIXayj/IWa1XQETagi76
bh0+FTbU62LNXIfWlkkYIGCsGevZS4gXYYOva2x66IEJ0R3/BtODDrSwBxyU
0YYB2IElyZr8Li6CdtBFbrqYV9KXLEmaXSI+5sC6g3VaKABvmXD+6oai8BJW
qUwXYOkSABPZAJ2jSg/GBowqGsyGeowfKAc+t+Q6gqVmG4uKWgkeCQuljVGR
zy/B1KnJYjJqGTU75snz6bMzNp7OUlEM6OnzVfUTSifsSM+/5rB8ZB36U6nz
vVGEN1OuUYiz1breiGlh7lQ1Ec+ULEhAR5GGeLI/2KpxNtyL9QprICSCwa4i
R+CnkQiwi8xuET4y3D4A8sXlbPhk634jX/Rj4mUGFs6NBJuddEsZW6L5KJIP
gTvvNCSdVHgs0zI3FlrFOJzAPOz9ISxPM+YgjUXOzbE42KPnHTbrxkDh00Uo
VvDuRMJjs89AUswR0nVV1wHR9Q9cleBjsGkiSs16o38mDveYqk6+ElPllEta
YnVAoRDlc3TM6Vn85jxLmFgafMJ6vMjRTHOgGT2NxdSdYlJs4/pEaJxIiS0+
NoQi2gpTijMCJbApi4rqFiCijXKpEgaT+Oyi0RlhYl1wLUzWC1/mEifGKITr
PRY3Ayt/Z7oYJuRhM8/FhxR4SFc5Xw5VvahshQ0YwiAu4RV6GCKMYcUHl1p6
qbEbeQLpE0uCDwQFJH7rmnTvzoYpHrHtLdfn8DKVmVoB1VRsBj7MMMIkELny
YjBQ0eRyaTwkhYm42UuVr+dN/kBMFB0HYe6YBxK46bsJQbrbnZ9J0kP9B4TQ
FVnmGMmDPqg1ijmjD76m6mLpoLLbuD7y4KXh1gbiLwLnYGNa4W8ZEd4BvInW
FCsAoTIgKUoxIYlvrSK2KUMubDTgIy00VckCmzqBoRu0sL+4h6WQFo3Bw+QI
JkiLpa0rjVW4MKnHFNg3s4W1xS9exNBeY26QLjVwm3KKEOSkcu2Abs21IGwb
sHaos9ANjUxa7m3ZjygMoxlgcXYq4fZdrda6ImQfop18YzTth4ukO0tqQ/nc
VZuHsQZ9FMVc6Hgq5aKOOY7n/atfsyt5EHAIMuck4ThJwFO9NC1R7QQrcPsU
U9Kyyu4JXGAkhwt4Jv2R8yBss8LrU/zr4BH+bcdR2R/PLz9LkkNHQ2viEMsg
RtlUqBRRHd46FwxhMp/65fqVCqHSSDyiD48gfPr0cHLwq0/wKpvCElz/+xHt
hwWKHwPFtY42iGIxxyYQI5fzMpWculuHFGeHP4mhPOcAU8NtQOqRYy4W5aOQ
DmQFG606bvrHqMCxw+6AjAMhDoV4LMSREB8J8SshPhaQoYlP+78iCPN+/yZv
RPfP+anYxSitTGtVm73Or29+zBwvrnCai3UKQTMMMZ2+uTl5c3X65mqK1791
8NLVycXp2Y+do7uMF6cnFy+f34hdKkHgWvZ+8jq6c0yf/+3neH79d1jH1c8+
x2cd4FK8aDi2wkY9+m/798+QqriktYulFyo456pY1MuuIP4cK39x883l2c8u
7Z05Tr6cXl/fM8nPwF1nf4ZZ67i7S7ZqJIoytNWweTVUXv3Je96GfQ8d7PuU
2p7Re3aMZW6t5QAO/JEzsc5beWuaUuIdQLc1ooXOgw0l4tQ99n9nUO83p38v
g/rGAfh20va/7uIjx4FH/zDB0Z//Tyb4hQXcH2SK/2GCH2yBkbts/nYjO4XJ
eoHlDLZgNo5Vr/HYx95PN8GP+ybYz+yRzGEDfG8eegh56KWNqruZaKiHMRJE
aW+STEWhMODFQyUpQqvcev5TMlHM2glag7w+zMoFMIaKTSvj39IhwY1NNAAX
iFqIHfYCgEoWvj2ylWz4RhKa2kKWraYoi1eGnPa981jbdjiykJfrQkxdr65P
VB0sHK8ZEqaViZHVLgYMu3Yr0w1jwQT0PRALtqXXGHmKF8OZzgA+szVLty1W
8rbUmQWA7OlYE5doPbQwwh4jycU5bRhDs9ClBetKyK+sxHCPIbU6U1+LzA3d
oJEQX0mjMSR3a/T6/Prl5yQBdQdZfr9FwSRZKiGn7fQS22bPZdnk2BNbgaJg
tdABR7bvaVHJAqUktHeLlS70qlkhumh5tOurwPj70warli8aEP95x7Rj5aN0
LTsYW+UoKIRUy5VcKGoEUpnrjKKZ9PegJrj/BVZDRwGdREjSlvK6AJuaz0H1
EONikgzIvm8MC7obN/MMlPMtM2dIVqXmtCxDcBgq7nntmIfVYWowZLZ3NlvM
gKvUQJMuS0IF2waMaBv5SvgwpV1J8eFpWKl7aKAp2QK8plmt3aGBJUgEHb0K
rd3O3ihCYX19/uTyJQ2yUquy2uxN3mGrH4OtvqDG3AA11kH21ng6FE+xDtR2
JFk/7C4DXlILyXhWvva48Jxr49hmdaUWQH9u66BbwEFCDofqgSNrLVDKaN/W
2AuubfNC3D3lfIEjP+p36OFAskA5mCmLtKCI+HLJVn1FEiqq3bg+cfjJNVHI
PNK6IAu7Ae1Ehe2KGx5wsVvHFilXtkOM/Dx1VMGY3cdoYSbX65aJLVRNNEIc
hyUD8JLUlW+11fexqddrdAEI0ounTj/xlw9MrKZMxp2aGQusbcSdLGr2wdTA
iBW+AnvVqfkba7AWt5rlyp+TwpqNRrlHD4EdibAs4EYD7sNiXSLHc2OCX6fg
DmvVcrVmts3UUt5q9GpW8V1zqhf6FDYefl/qNTooOjoK9435IItY6u+c98KT
Qnut4ybb7BPXdRzaeL+ppyoC5sqrlSL9lVGlVlAHMr4YAhsyIzx/aOtBXS94
jRjoAwXgPaiJc0XRjKR9kFFrUWhTDYduopJQ/3yb6hVunOF0DfJSrElaSjqF
IBmv1NWAzvrKVfuIyEAAQxziFiaWXKyyBRY58BZ039Z2+sh4VKd0JJa2mBPd
hNVhCB/TFqciEWYF0KYFsG7Ie7n4byK+KO9QdUa+0BTP0EeQewwl4Bz+xliI
Tqe4glSlzSvXcYAn/NFFEf/gOsm9LBa5rfEyAlPLV6okWnx3p7LHfjmC9Adb
O3a9JeSshRDcaUOJmsNHepTjMSOqhGWKmZgxp3eJz/TRetGZEqz4uu702ZIy
4Z121C6f9miT8rzxAo3S1amAQSSAtUc698XWvyzmulqFTeXGtujMEh7CoJ4a
LMzxnm7Rg+66LYW4QsuISA9th7PVRI4Z8Acw/pIdTy9c7JdGOyrGS+L+YQov
FOYSMEmhcsdCUr6CXmRB7AwwVqtphF5dEY5S3WwJuLeVveGnTtl4xE724Gi4
Yt2jy1vloVoWhYdRpkc1zC0yC0HGU24oX5HQzugcr1pUoQlie1W2VcjlGv6W
80qdmv09JXq7rpm0PGR3j7Rg6hkX+yfiK5i9oaT2DoN330DQmZzKxmR0XOU4
0yuMWriroGBmKTz62HrSnsJ2qyQhirqirOdRWGbjI1Cm1dljq9NOgPyavQuJ
687DFWruVuJsMLwagMPLLTYI69FT0pfzFR9OwxsIe+B3myQ3ofZlS3HulQPz
prAfUIXnIOMUQFVc8Z8pigs2a4mR2wMOyBaK81vOClJLhYpa9tSQO3ZWt91i
ZqhNyTIVTx19yKu8Uhk4OIyQWsv88EMILVME0m3Fu6uLfckLPZw2FwijDbXl
gKZ0HCq19+HCkEJxHfkb2Mm8dI1rkdqGXbeg/ygaDs0p5USuya7VIhlXKLle
EM69hnYkat70jbJ4unAWGj4dJOAilNyKgU8XOqdR0Z2BhFhXLH24yYaVw19u
loXoD8xhJ9l/Z4OB95wPS91JsSq//Z0NI4tjnLi5pKmI0iEngpzMRCLVEiTx
e7k2KE1fUd/q1LNb2qHjo8jxew8i9hFWg4dG5rVtigelXiHsxgBRsNUEqrWm
n236mvXXv/yX0daW4rEqIAnjAT5NxrsByx/gMjwYwsRIG6zsolWQuYrDxa1b
gdYheu1AzlEaccG2b2N/RvCfN1/fONa5CBYrR9I4hfPhEMo9N4eDtM3d64Si
09M+xsvJMZYmBCxA0BLyD+IyHp1x/WslvR0LX7STxoFUqS0Ex1ZNXNo1WoOI
c+FJvRTRHXs4sgdZQmy4QmARz2Nh15a2CChJISo86CVxx6QViEOBWI1voUAe
tQ/ie7FFka3U0gqFFdZ360YwswMwrbZlunBYOJAR+y7YrJF49rU9F4rRQRyg
Q8jVWC1zuwuDXZ+dsLlyZn8W3qmA7oIziRrEBn528Qz75/iM3/bo+ihS0afO
UzntBImCAIgRbNeBskWjgnljeMhGZQ9waDYK93bFnXv0EzkHytbBN6PTGdpi
439GSwzZM55j7PoJiKarDUEyRAJPSGwlDa1dI3zvJJs01PLfen4U97ncdxiR
xb/dTk+J4YqxDE7JWmPfG4Qc+iDkAiRm/MRGPNz+5myfm6acfRcQgD7i9a5W
HWTs4KtMAgxVxu8yQMfaeqTFjhgWCBLv4J5wjD3k2ENmkl9EhW8UWIIDtHEW
qDLcWrAEokEaB8jMnhpRc2vE7kV+YV/wcQRTFwuM+WP4jVRh0MizG/J0xy/T
6YIEWw+WUKNhf/KB0wau7ZBPC3HOw6/AFLtFyRYRJkR0EZLTraWg6HQQOTtg
6xry8ErnNpDugYyR38U56WQWdaY5ybEnokahlzUHkmsQyrrzmo2AV9qYKbOn
mfKN9SvRpuI7MGSe29dHnKpC88Gfq0DP7ml5tefe3BI2s3uCbko3+FfMsJ+y
qXKYD6ttknEDGNZDsmxpYLtgQV3jMqNu0IXvg2S0I4Z6jOITFggFUYzsto/O
qA/ukN0YJDVOK5gCZrljmgvDnNoOb5s9zsYVR99m6hFnhEmQt/hyLmeimaV8
9GVLELkVHojrQPeKdLspsyjH3cMHm6GzSlv9NSGUwLFx12OrkE/6U40B1sK9
JkSru7kUnDjhtqfeayq3toDeXQzN6f1Wkm5XVc1oI6xmWebZnotfWwcy7xMA
Z68GGM62s4964rsYfNiKZSNuybRHfAjyAfEYoCAQjDA1H79HPqPVo5fekF2z
btPQiwy40srHIpkTcYZkjyBYXMIyzwJyBEdgonRzcjnadrxSemUlUc8l+Hh6
RR9ulHtxji+LR+cCzi8FkFDO0Wbf50uxWHTGEcc1x9pXDqd8acArJMkFH2Ds
oB7IrpCrURY24mRlq0hyBY1sfGuDy86JRXqjnoUQ7RTuHEIfrfZOVDs8Avwv
0O2y8NqeGrGHo6Nim7V+BC51D6dYFcD0FhUEkSUw6HOEISWayiobY+i+8ftD
oC4nAoOTUWp+2+TYku5j5egAbklHV+EeoEjbrSEi9riXnTIBxwyaxS0sCkhU
IAcXV0Myv4DPD1c1kjE2rffrHZiDMp6dAlK/b56MDwLNTi65/YVazNvdBjYn
W5UZ16x759ocQZY+27gPTgdWJWe5e3Ul3l5YqGGm6jtlc2K3LFeNjWjkNSGO
eY+Bt0oPTL1VATVubFgbJCLiiSFQMUht++BlMPgpnnoNb2wTZxg1kMG9Z3hX
AUCdYdtt7UqN7/QgWQIH7gGCSi1smhlQ904NzL6AKj5qZdGT+wzIEXYGlai4
lKGv4SqPlyTX2h9877005P7jovYwW8y8FjzVsrH+3CPFMOGJ8Io+zBlNJ/n1
dDKvuCYQzikSbuvzLZtoOwCM3oKO9NJ75NqOsl0KBxLwCNrgIqPeBdwTEPc6
QHj2fTK0jrlPgP1LDH2rEb9GmtuNNFVvXY+M7pblo3ORnnd9qrJS8Wl7Pofp
PWLrFdYsfQilUOqDx8MC6QiHuxvj9+LwIrqv0Rk4RYdQGrkFawwcADB2XU0O
JCMd6b3kzr4XwRKY47vqrOlAVKmpVMTRmNYWUkJD96Sy/ZrMMJHdSiwp8XtC
cWxHJb0HgWIRauKwJ9usg+NyCIqhtylOGKLTjXZErz5ut/EVUHEzGFdutnCL
IBK3u22J24b2T/hdVOfT59NeYad9cnNJCAHfad+xhA9jo+QM7CyOMk3xxW74
fy7gl5n/cMxBo8p+s0P1NuxCvLk4vYAB3J1qkvwvt6C6UWpiAAA=

-->

</rfc>
