<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-mishra-iotops-iot-dns-guidelines-00" category="bcp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="IoT-DNS-Guidelines">IoT DNS Security and Privacy Guidelines</title>

    <author initials="A." surname="Mishra" fullname="Abhishek Mishra">
      <organization>Inria</organization>
      <address>
        <email>abhishek.mishra@inria.fr</email>
      </address>
    </author>
    <author initials="A." surname="Losty" fullname="Andrew Losty">
      <organization>UCL</organization>
      <address>
        <email>andrew.losty.23@ucl.ac.uk</email>
      </address>
    </author>
    <author initials="A. M." surname="Mandalari" fullname="Anna Maria Mandalari">
      <organization>UCL</organization>
      <address>
        <email>a.mandalari@ucl.ac.uk</email>
      </address>
    </author>
    <author initials="J." surname="Mozley" fullname="Jim Mozley">
      <organization>Infoblox</organization>
      <address>
        <email>jmozley@infoblox.com</email>
      </address>
    </author>
    <author initials="M." surname="Cunche" fullname="Mathieu Cunche">
      <organization>Inria</organization>
      <address>
        <email>mathieu.cunche@inria.fr</email>
      </address>
    </author>

    <date year="2025" month="July" day="20"/>

    <area>ops</area>
    <workgroup>iotops</workgroup>
    

    <abstract>


<?line 44?>

<t>This document outlines best current practices for Internet of Things (IoT) device providers regarding the implementation of DNS stub resolvers, with the aim of mitigating security threats, enhancing privacy, and resolving operational challenges. It also provides guidelines for network operators on mitigating the risks identified in this draft.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://miishra.github.io/IoT-DNS-Guidelines/draft-mishra-iotops-iot-dns-guidelines-latest.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mishra-iotops-iot-dns-guidelines/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/miishra/IoT-DNS-Guidelines"/>.</t>
    </note>


  </front>

  <middle>


<?line 48?>

<section anchor="introduction"><name>Introduction</name>

<t>Research into the DNS behavior of IoT devices shows widespread non-compliance with protocol standards, gaps in protocol support, and security vulnerabilities. This leads to unpredictable operational behavior and exposes devices to fingerprinting and denial-of-service attacks.</t>

<t>While the recommendations in this BCP may apply to all DNS stub resolver behavior, we treat IoT devices as a specific case where targeted recommendations are useful for the following reasons:</t>

<t><list style="symbols">
  <t>The recommendations address specific IoT-related security concerns not seen in the DNS behavior of general-purpose operating systems</t>
  <t>IoT devices have different resource characteristics from general-purpose devices, such as constrained power consumption, meaning incorrect software implementations can have an increased operational impact</t>
  <t>IoT devices do not typically have security agents installed on them</t>
  <t>There are many DNS RFCs, and this BCP can be used to identify those related to specific security issues observed through research into IoT devices, with the aim of making it easier to address these vulnerabilities</t>
  <t>IoT devices may be deployed at scale on dedicated networks, and these recommendations will be useful to network security teams in mitigating vulnerabilities, especially where device behavior cannot be changed</t>
  <t>Manufacturers may use standard software distributions aimed at IoT devices without considering DNS behavior. This BCP provides recommendations that can be used as part of the criteria to evaluate these distributions</t>
  <t>IoT devices typically perform the same set of DNS queries on start-up, which makes them both more vulnerable because of this predictable behavior and also more prone to fingerprinting</t>
</list></t>

<t>DNS terminology in this draft conforms to RFC 9499. In this context, Stub Resolver refers to the IoT device, and Resolver refers to the DNS server used by the IoT device.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="recommendations-for-iot-device-stub-resolvers"><name>Recommendations for IoT Device Stub Resolvers</name>

<section anchor="compliance-with-encrypted-dns-standards"><name>Compliance with Encrypted DNS Standards</name>

<t>The majority of IoT devices use unencrypted DNS over port 53, which means this traffic can be captured and is open to interception and manipulation.</t>

<t>IoT devices <bcp14>SHOULD</bcp14> support encrypted DNS protocols such as DNS over TLS (DoT) <xref target="RFC7858"/>, DNS over QUIC (DoQ) <xref target="RFC9250"/>, or DNS over HTTPS (DoH) <xref target="RFC8484"/> for enhanced privacy, security, and compatibility. To mitigate against fingerprinting IoT devices, DNS queries can be padded as detailed in <xref target="RFC7830"/> and <xref target="RFC8467"/>. Encrypted DNS protocols are not mandated for compliance with DNS standards, but the use of encrypted DNS may be mandated by some regulators and advised by competent authorities in deployment guidelines.</t>

</section>
<section anchor="configuration-of-dns-servers-used-by-iot-stub-resolvers"><name>Configuration of DNS servers used by IoT Stub Resolvers</name>

<t>IoT devices have been observed to fall back to hard-coded IP addresses for DNS resolvers or ignore addresses assigned to them via automated configuration methods such as DHCP Option 6, potentially bypassing network security mechanisms or giving rise to operational issues.</t>

<t>DNS resolvers on devices <bcp14>MUST</bcp14> be configurable via network configuration protocols such as DHCP <xref target="RFC2132"/> and <xref target="RFC8415"/>, IPv6 Router Advertisement (RA) options <xref target="RFC8106"/>, Discovery of Designated Resolvers <xref target="RFC9462"/>, device management software, or manual configuration. Stub resolvers <bcp14>MUST NOT</bcp14> fall back to hard-coded resolvers. This may result in an insecure communication channel, and the open resolvers used in these hard-coded configurations may be blocked by network policy, preventing the device from working.</t>

</section>
<section anchor="source-port-and-transaction-id-randomization"><name>Source Port and Transaction ID Randomization</name>

<t>Some IoT devices have been observed to have insufficient or no randomization in the source ports of DNS queries or DNS transaction IDs. This leaves them vulnerable to spoofed responses. A combination of Source Port and Transaction ID is used, amongst other criteria, by the stub resolver when accepting a DNS response.</t>

<t>IoT devices <bcp14>MUST</bcp14> undergo adequate Source Port and Transaction ID randomization in their DNS queries as a mitigation against cache poisoning from spoofed responses. Having both of these values correctly randomized decreases the chances of a successful spoofed attack. Stub resolvers <bcp14>MUST</bcp14> follow the recommendations of <xref target="RFC5452"/> as described in Section 4.5 to ensure Source Port randomization and Transaction ID randomization as required by <xref target="RFC1035"/>.</t>

</section>
<section anchor="handling-of-ttl-values"><name>Handling of TTL Values</name>

<t>IoT devices have been observed making unexpectedly high numbers of DNS queries even when DNS record Time-To-Live values (TTLs) would mean this should be unnecessary. Devices have also been observed issuing DNS queries at fixed, highly predictable intervals for the same domain names, regardless of operational changes or TTL values.</t>

<t>Unnecessary queries may lead to a drain of power in resource-constrained IoT devices. Conversely, very high TTLs may impact device operations such as communicating with management servers, receiving software updates, or other changes, which may lead to security issues. Deterministic querying behavior increases the risk of device fingerprinting by adversaries who can profile query timing to identify specific device models or firmware versions.</t>

<t>The ideal operational scenario is for the owners of the authoritative zones used to manage the devices setting TTL values appropriately for the zones and specific records within them. Devices would then query these records only as needed.</t>

<t>IoT devices <bcp14>MUST</bcp14> cache DNS responses and <bcp14>SHOULD</bcp14> honour TTLs when caching. If for operational reasons this is not ideal, such as the case where a management server record could be cached for an extended period preventing failover or change, then minimum and maximum TTLs <bcp14>MAY</bcp14> be configurable on the device but <bcp14>MUST NOT</bcp14> not be hardcoded values. Where IoT stub resolvers cannot be configured with minimum and maximum TTL values, this can be mitigated by setting these on the network resolver.</t>

<t>If certain device operational requirements necessitate periodic revalidation of critical domains (e.g. management servers), these repeated queries <bcp14>SHOULD</bcp14> use non-deterministic inter-query timing to avoid fixed intervals.</t>

<t>In case of unsuccessful resolution, such as when the resolver is unavailable, IoT devices should implement exponential back-off strategies.</t>

</section>
<section anchor="support-of-edns0"><name>Support of EDNS(0)</name>

<t>Devices have been observed having limited support for EDNS(0), causing them to revert to TCP for queries over 512 bytes, affecting the device's efficiency. Other research findings include consuming additional processing resources and failing to maintain their network connectivity when responses to DNS requests exceed 512 bytes.</t>

<t>IoT devices <bcp14>MUST</bcp14> support EDNS(0) and send a supported UDP packet size via OPT 41 <xref target="RFC6891"/>. To avoid fragmentation of UDP packets, which may be dropped by intervening networks, the maximum packet size <bcp14>SHOULD</bcp14> be set to 1220 bytes as a default, although device configuration <bcp14>MAY</bcp14> allow this to be configurable. Although the networks to which IoT devices connect may support larger packet sizes than 1220 bytes, the nature of these devices in being deployed on many network types and DNS queries traversing networks controlled by different operators means it is operationally more effective to use this value. In addition, IoT devices <bcp14>MUST</bcp14> support using TCP for queries when a TC bit is returned from the resolver <xref target="RFC1035"/>.</t>

</section>
<section anchor="improve-device-behavior-in-response-to-resolution-problems"><name>Improve Device Behavior in Response to Resolution Problems</name>

<t>When resolving domain names, IoT devices may be unable to obtain an answer, and as a result, surges in the number of queries and retries have been observed, or an increase in queries using an alternate protocol (more aggressively querying via IPv6 rather than IPv4).</t>

<t>The use of serve-stale <xref target="RFC8767"/> by resolver software on the IoT device may mitigate the impact of failed resolution, such as when authoritative servers are unavailable. If the stub-resolver has this capability, device manufacturers should consider the benefits and any impact of using this. Network operators <bcp14>SHOULD</bcp14> configure DNS resolvers to use serve-stale for networks supporting IoT devices, especially where these networks are dedicated to this type of device, to limit any operational impact on IoT devices when resolution fails. Network operators <bcp14>MUST</bcp14> support IoT devices with dual-stack resolvers, rather than providing only IPv4 resolvers when devices are configured with both IPv4 and IPv6.</t>

</section>
<section anchor="use-of-dnssec"><name>Use of DNSSEC</name>

<t>IoT devices can be induced to contact an adversary server or make large volumes of DNS queries via spoofed responses to queries. It would be difficult for manufacturers to mitigate this by implementing checks of data received via DNS queries, such as validating IP addresses in the A/AAAA record RDATA. In addition any validation of this type does not address the problem of MiTM attacks that could be the attack vector.</t>

<t>Devices <bcp14>MAY</bcp14> integrate robustness in their DNS stacks by utilizing DNSSEC validation <xref target="RFC9364"/>. Where the stub resolver is not capable of DNSSEC validation, or it is not operationally advisable for reasons such as power consumption, the resolver <bcp14>SHOULD</bcp14> be configured to validate responses. Manufacturers should consider the type of network the device is likely to be deployed on, such as a home network vs. other types, in determining the likelihood of DNSSEC being available on the network and thus making the device independently capable of validation rather than relying on a resolver. Manufacturers <bcp14>SHOULD</bcp14> sign public zones used for device management and services to ensure queries can be validated as a mitigation against spoofed responses. For privacy reasons, resolvers <bcp14>SHOULD</bcp14> be configured to copy the root DNS zone <xref target="RFC8806"/> as this will prevent leakage of private queries and also provides operational efficiency improvements.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This BCP discusses security considerations for IoT devices in section Recommendations for IoT Device Stub Resolvers and mitigations that can be implemented on DNS resolvers. More general DNS security considerations in managing networks with IoT devices are detailed here.</t>

<t>Most IoT devices do not have specific security software agents installed on them, as is typically the case with general-purpose operating systems and supply chain vulnerabilities may mean that these devices are compromised before reaching the consumer. Network operators can use DNS resolvers to mitigate these risks.</t>

<t>Private network operators <bcp14>MAY</bcp14> block DNS traffic to any resolvers other than those managed by the operator, so that traffic is not bypassing any DNS security controls such as response policy zones or DNS traffic logging. This is more likely to be the case on enterprise or other private networks rather than service providers that don't want to limit customers using alternate resolvers.</t>

<t>Providers <bcp14>SHOULD</bcp14> alter resolver configuration to mitigate some of the security risks or operational issues identified in this BCP where it does not impact the operation of other types of DNS clients. For instance the use of serve-stale <xref target="RFC8767"/> is likely to benefit all stub resolvers on a network.</t>

<t>Where operators have networks dedicated to IoT devices, they <bcp14>MAY</bcp14> limit DNS resolution to only domain names used by those IoT devices to mitigate any impact in the event of a compromise to the device. Manufacturers <bcp14>SHOULD</bcp14> provide domain names used for communication to facilitate this and other security measures used to secure devices and identify those that are compromised. Manufacturer Usage Descriptions (MUDs) could provide details of domain names used in device operations that can then be added to DNS security controls.</t>

<t>DNS queries are most commonly carried over UDP and compromised devices have been used in DoS attacks by sending queries with forged source addresses, hence network operators <bcp14>MUST</bcp14> implement <xref target="RFC2827"/> network ingress filtering. Network operators should implement DNS Response Rate Limiting (RRL) on resolvers to mitigate high query volumes from devices causing DoS to the DNS infrastructure.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC7858">
  <front>
    <title>Specification for DNS over Transport Layer Security (TLS)</title>
    <author fullname="Z. Hu" initials="Z." surname="Hu"/>
    <author fullname="L. Zhu" initials="L." surname="Zhu"/>
    <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <author fullname="D. Wessels" initials="D." surname="Wessels"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="May" year="2016"/>
    <abstract>
      <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
      <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7858"/>
  <seriesInfo name="DOI" value="10.17487/RFC7858"/>
</reference>

<reference anchor="RFC9250">
  <front>
    <title>DNS over Dedicated QUIC Connections</title>
    <author fullname="C. Huitema" initials="C." surname="Huitema"/>
    <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <date month="May" year="2022"/>
    <abstract>
      <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9250"/>
  <seriesInfo name="DOI" value="10.17487/RFC9250"/>
</reference>

<reference anchor="RFC8484">
  <front>
    <title>DNS Queries over HTTPS (DoH)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="P. McManus" initials="P." surname="McManus"/>
    <date month="October" year="2018"/>
    <abstract>
      <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8484"/>
  <seriesInfo name="DOI" value="10.17487/RFC8484"/>
</reference>

<reference anchor="RFC7830">
  <front>
    <title>The EDNS(0) Padding Option</title>
    <author fullname="A. Mayrhofer" initials="A." surname="Mayrhofer"/>
    <date month="May" year="2016"/>
    <abstract>
      <t>This document specifies the EDNS(0) "Padding" option, which allows DNS clients and servers to pad request and response messages by a variable number of octets.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7830"/>
  <seriesInfo name="DOI" value="10.17487/RFC7830"/>
</reference>

<reference anchor="RFC8467">
  <front>
    <title>Padding Policies for Extension Mechanisms for DNS (EDNS(0))</title>
    <author fullname="A. Mayrhofer" initials="A." surname="Mayrhofer"/>
    <date month="October" year="2018"/>
    <abstract>
      <t>RFC 7830 specifies the "Padding" option for Extension Mechanisms for DNS (EDNS(0)) but does not specify the actual padding length for specific applications. This memo lists the possible options ("padding policies"), discusses the implications of each option, and provides a recommended (experimental) option.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8467"/>
  <seriesInfo name="DOI" value="10.17487/RFC8467"/>
</reference>

<reference anchor="RFC2132">
  <front>
    <title>DHCP Options and BOOTP Vendor Extensions</title>
    <author fullname="S. Alexander" initials="S." surname="Alexander"/>
    <author fullname="R. Droms" initials="R." surname="Droms"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>This document specifies the current set of DHCP options. Future options will be specified in separate RFCs. The current list of valid options is also available in ftp://ftp.isi.edu/in-notes/iana/assignments. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2132"/>
  <seriesInfo name="DOI" value="10.17487/RFC2132"/>
</reference>

<reference anchor="RFC8415">
  <front>
    <title>Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</title>
    <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
    <author fullname="M. Siodelski" initials="M." surname="Siodelski"/>
    <author fullname="B. Volz" initials="B." surname="Volz"/>
    <author fullname="A. Yourtchenko" initials="A." surname="Yourtchenko"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="S. Jiang" initials="S." surname="Jiang"/>
    <author fullname="T. Lemon" initials="T." surname="Lemon"/>
    <author fullname="T. Winters" initials="T." surname="Winters"/>
    <date month="November" year="2018"/>
    <abstract>
      <t>This document describes the Dynamic Host Configuration Protocol for IPv6 (DHCPv6): an extensible mechanism for configuring nodes with network configuration parameters, IP addresses, and prefixes. Parameters can be provided statelessly, or in combination with stateful assignment of one or more IPv6 addresses and/or IPv6 prefixes. DHCPv6 can operate either in place of or in addition to stateless address autoconfiguration (SLAAC).</t>
      <t>This document updates the text from RFC 3315 (the original DHCPv6 specification) and incorporates prefix delegation (RFC 3633), stateless DHCPv6 (RFC 3736), an option to specify an upper bound for how long a client should wait before refreshing information (RFC 4242), a mechanism for throttling DHCPv6 clients when DHCPv6 service is not available (RFC 7083), and relay agent handling of unknown messages (RFC 7283). In addition, this document clarifies the interactions between models of operation (RFC 7550). As such, this document obsoletes RFC 3315, RFC 3633, RFC 3736, RFC 4242, RFC 7083, RFC 7283, and RFC 7550.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8415"/>
  <seriesInfo name="DOI" value="10.17487/RFC8415"/>
</reference>

<reference anchor="RFC8106">
  <front>
    <title>IPv6 Router Advertisement Options for DNS Configuration</title>
    <author fullname="J. Jeong" initials="J." surname="Jeong"/>
    <author fullname="S. Park" initials="S." surname="Park"/>
    <author fullname="L. Beloeil" initials="L." surname="Beloeil"/>
    <author fullname="S. Madanapalli" initials="S." surname="Madanapalli"/>
    <date month="March" year="2017"/>
    <abstract>
      <t>This document specifies IPv6 Router Advertisement (RA) options (called "DNS RA options") to allow IPv6 routers to advertise a list of DNS Recursive Server Addresses and a DNS Search List to IPv6 hosts.</t>
      <t>This document, which obsoletes RFC 6106, defines a higher default value of the lifetime of the DNS RA options to reduce the likelihood of expiry of the options on links with a relatively high rate of packet loss.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8106"/>
  <seriesInfo name="DOI" value="10.17487/RFC8106"/>
</reference>

<reference anchor="RFC9462">
  <front>
    <title>Discovery of Designated Resolvers</title>
    <author fullname="T. Pauly" initials="T." surname="Pauly"/>
    <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
    <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
    <author fullname="P. McManus" initials="P." surname="McManus"/>
    <author fullname="T. Jensen" initials="T." surname="Jensen"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9462"/>
  <seriesInfo name="DOI" value="10.17487/RFC9462"/>
</reference>

<reference anchor="RFC5452">
  <front>
    <title>Measures for Making DNS More Resilient against Forged Answers</title>
    <author fullname="A. Hubert" initials="A." surname="Hubert"/>
    <author fullname="R. van Mook" initials="R." surname="van Mook"/>
    <date month="January" year="2009"/>
    <abstract>
      <t>The current Internet climate poses serious threats to the Domain Name System. In the interim period before the DNS protocol can be secured more fully, measures can already be taken to harden the DNS to make 'spoofing' a recursing nameserver many orders of magnitude harder.</t>
      <t>Even a cryptographically secured DNS benefits from having the ability to discard bogus responses quickly, as this potentially saves large amounts of computation.</t>
      <t>By describing certain behavior that has previously not been standardized, this document sets out how to make the DNS more resilient against accepting incorrect responses. This document updates RFC 2181. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5452"/>
  <seriesInfo name="DOI" value="10.17487/RFC5452"/>
</reference>

<reference anchor="RFC1035">
  <front>
    <title>Domain names - implementation and specification</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1035"/>
  <seriesInfo name="DOI" value="10.17487/RFC1035"/>
</reference>

<reference anchor="RFC6891">
  <front>
    <title>Extension Mechanisms for DNS (EDNS(0))</title>
    <author fullname="J. Damas" initials="J." surname="Damas"/>
    <author fullname="M. Graff" initials="M." surname="Graff"/>
    <author fullname="P. Vixie" initials="P." surname="Vixie"/>
    <date month="April" year="2013"/>
    <abstract>
      <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
      <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="75"/>
  <seriesInfo name="RFC" value="6891"/>
  <seriesInfo name="DOI" value="10.17487/RFC6891"/>
</reference>

<reference anchor="RFC8767">
  <front>
    <title>Serving Stale Data to Improve DNS Resiliency</title>
    <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
    <author fullname="W. Kumari" initials="W." surname="Kumari"/>
    <author fullname="P. Sood" initials="P." surname="Sood"/>
    <date month="March" year="2020"/>
    <abstract>
      <t>This document defines a method (serve-stale) for recursive resolvers to use stale DNS data to avoid outages when authoritative nameservers cannot be reached to refresh expired data. One of the motivations for serve-stale is to make the DNS more resilient to DoS attacks and thereby make them less attractive as an attack vector. This document updates the definitions of TTL from RFCs 1034 and 1035 so that data can be kept in the cache beyond the TTL expiry; it also updates RFC 2181 by interpreting values with the high-order bit set as being positive, rather than 0, and suggests a cap of 7 days.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8767"/>
  <seriesInfo name="DOI" value="10.17487/RFC8767"/>
</reference>

<reference anchor="RFC9364">
  <front>
    <title>DNS Security Extensions (DNSSEC)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2023"/>
    <abstract>
      <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="237"/>
  <seriesInfo name="RFC" value="9364"/>
  <seriesInfo name="DOI" value="10.17487/RFC9364"/>
</reference>

<reference anchor="RFC8806">
  <front>
    <title>Running a Root Server Local to a Resolver</title>
    <author fullname="W. Kumari" initials="W." surname="Kumari"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="June" year="2020"/>
    <abstract>
      <t>Some DNS recursive resolvers have longer-than-desired round-trip times to the closest DNS root server; those resolvers may have difficulty getting responses from the root servers, such as during a network attack. Some DNS recursive resolver operators want to prevent snooping by third parties of requests sent to DNS root servers. In both cases, resolvers can greatly decrease the round-trip time and prevent observation of requests by serving a copy of the full root zone on the same server, such as on a loopback address or in the resolver software. This document shows how to start and maintain such a copy of the root zone that does not cause problems for other users of the DNS, at the cost of adding some operational fragility for the operator.</t>
      <t>This document obsoletes RFC 7706.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8806"/>
  <seriesInfo name="DOI" value="10.17487/RFC8806"/>
</reference>

<reference anchor="RFC2827">
  <front>
    <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
    <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
    <author fullname="D. Senie" initials="D." surname="Senie"/>
    <date month="May" year="2000"/>
    <abstract>
      <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="38"/>
  <seriesInfo name="RFC" value="2827"/>
  <seriesInfo name="DOI" value="10.17487/RFC2827"/>
</reference>




    </references>

</references>


<?line 159?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>We thank the researchers, reviewers, and engineers who contributed to the analysis and testing process.</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAOsGfWgAA5Vb23IbOZJ951fUeh7G3hDZlm9tO2ZnRmO5x9qwbI8kb8fE
xj4Uq0ASo7qwC1WS2R3+l/2W/bI9JxNAoUh6PdvhaFFFFJDIy8mTCWg+n896
21fmdfbgor3Jzj9cZ9emGDrb77K8KbNPnb3Li13218GWprKNcQ9m+XLZmTt9
Y4435umXRd6bddvtXmfLYjublW3R5DWmL7t81c9r6zZdPrdt324df8zLxs3X
8f3548czNywxzNm26XdbvHnx9uanWdE2zjRucK+zvhvMDMs/neWdyV9nmGl2
33a3664dtq8znXt2a3Z4WLrXsyybZ9yb8/uSBxBbfm51f/J5aVyfYUxnmh5f
5EVvCyPf/OXNp9mdaQbD2da23wxLbL+2spsfjqkhyyoowvUYtun7rXv9ww9+
+ELfX9j2yIs//JNq0skXm76uHsxm+dBv2k53qtp+cLbcYA5zm13KVBQoy9pu
Tas1nfUPTJ3bCo9yP3qhC//Zcshi1T2YTNmUnbnP3reu36XzfX7zfm82Gbio
OHDx5Omfh6Ja5MViuN2brsmzyxwL4f9NmVf4+H9Pu6jDuG9M+e+2zi7bXyuz
m+531S6r9st0tn/UMhBb1W8XRVtPJrvM+401Q/ZmaIqN+Y4Cax28KGRwor9Z
03b40t7BdbhU/GW2WCxms/l8nuVL19PZZrMbWCFDxAw1PbAdejH2cb90GSbL
LpredI3B4FWGt5u1yx7Cqx5lpbnDIIxu7+A0ncs6s867EiOyfmMyW28rw1Ug
TdvwbUa+64clBrq2usMrJ9k9PFWG51AsxtS2t2u8gUlCMOFrBGGPwabZ5E3B
73xMnQiA6HR83G5NJ8vlVVZs8qoyzdq4RXbRZ3nl2iCry0Y/lz1iewxv/36L
vUDiRBQK2Fl36zK81vR2ZU2Z2QbPqU3Gk1d0bcuyMrPZ76i2ri2HgtLMZlfG
mbwrNnipb2U6KmNpNvmdxfrYOOFDNeoyt2nvHVQDSbfYepk1bTOH82wri/0b
VRr20rdFW0Gl9Fng0Em2zreOco3fDdtt2/Wqp6jQu6FqsNGlrbBF6ke8osJK
LoN4Q4NVS1v0+bIyE51GgTmd+bJtHaQNUuPNFZRlOhinEbVxFPRl82rerubO
dOIwed/nxa2Dxn7eWCwgyjXYHpyllJVc1C1QMatz5IntttpxBdj00I+iXPAn
zEdvmegzx7/MbU0BwxVZkTuocGM6DM27telNebA+YD8bnFkNlfgHRVy1VdXe
c1uY32EQAmwOzR0Kn5cAJ+fGFQnCnSGgJkZAuikQWA7G7fHUNLrpQ89YGxqr
mm+HjgoPBmGE7FxvajebT3aLN01W2tXKSDRTSUMHvSMgGNgGjozohuN3bX0w
uZ/kBJ4Db4XimBWBHQiVMtu291A2nwz1lns9yWqTNxTFNkUL9CiwlXbV31N/
UwDATHmjsuXcakEtYs7UvfAGQWq6nbIVDSFR2wLW3+kcUY05dtDTYRAGiPeS
kQst1mobiEFRgOo70evVT2+cBkN0L4q1FGuXdDAf4EQd6iOYDd9Ec8a1QSEG
SNgu6doctAE/WG+o8iTak80cwbv8VtTXZ1CHhXbp495/MAwS7AXrnnYYHEua
bVu1O4gAz3dQk6EaSgaxSO/xLW7duEOvvbdV5RVBt4ccARVHIDZ5LbGZQOOe
eABp0ZNYSoPM54no0lA4DboUjwRelNgS0vOwgu2HjomEm4IYEdlGnyrhu51d
Dj7QbK1bTjVCDSOviZsyL1HINKQ82tH0MR3s66LfYNLUMRAI27yTHEjjFVCH
Ia2AlsxdXg3QslfrRMI9Y40+DKdnopbJHMgAdNyHFPnLgKmNpCAooOvnwxZ+
s7HwJ3iLEb+os2ULR6rbbnSQijoucipOxMQmUxyfYLdkQ3kbOmjMIXbPZhQF
m6xt01btejdNd9QuNyCoj6DKXj179Qp51o/Bt735grRzTZi+CjDdmRXN6zPg
qBl1y28ME7RnfHVqiuVu7+0F0+2btrlj4IpbYLJzg/1YNcKMIA2ynglbB+36
fH3z4ER/Zh8+yuert3/7fHH19pyfr9+dvX8fP8z8iOt3Hz+/Px8/jW+++Xh5
+fbDub6Mp9nk0ezB5dnfH+gWH3z8dHPx8cPZ+wejOgMXo3tjy/A4S8YF0/Xi
eDM4KPxtqYwDbvs//336LPvtt3+B2p+cnr76+tX/8vL0x2f4BUHX6GptozGI
X6Gx3QxJFLDEWZhFi3xrAZnEBGUcQGeEK7T5r/9JzfzX6+wPqK9On/3RP+CG
Jw+DziYPRWeHTw5eViUeeXRkmajNyfM9TU/lPfv75Peg9+ThH/5E/pfNT1/+
6Y8zutDVHggI+WXBqvg1cWU41e/odFNK9hZZbbel2aTIDbxMHbDO/9EKiu6R
Pcbr0JjJqy29ncQte/40xj4yrVOfQT5eKZMRhIIlCZylGB1fI6U2ksroR4WR
TC3fIQ3a7VDJ/mDnVAqve88Xs6k4gU66yAqikDfvr7OH5ywHfvvtT3DCH18+
f/n168k4AC7yhiP+Fka8evL8MUdAu3HQu5ubTzLPuzDq5bOXdGbaQFk/6Ucg
/SEhqZuTGGNLkoF2QPc2pCck2XVOYrDPSycZOYVcr9AtMrCCfml6VF8aemGD
TyG+LBwkffHj16+LPeOPKmNcM99JZcmvuad9Mq+UNvJ4pA8BOY/lU2v4lB/n
AyC6tmZCX9O2rF4E4ss76/GSqwFNCDJSxkum5paUNgj8jBXRwvt2s7LroZtW
b4LDLgIxFbkfFwdUdEluO3IkZBrCzxI1AH8BKS1R21DfF58C9fFlGZeMtSId
xq4b5qxxVO4cnum0khbvkJSxybYW1RSTTdQGmy8TJ34HDvBRw+PFCeKNKlLm
stxtOTV85YAE1Ya0xbpaJFpbKTzBqQW9J2xW2OFCM2myjSaqR1CVARzEZJ7m
DsKiU/mPhCF3oG745PTpkz2/PH3OOLv4dPciuwIjQpydlRChh6xi8odXZ48g
saKdf+n08QsJX+sKRqag1bmhkkWh0c4hmJ+9eMLxnuPBJ8HHZfJA2STQ8Xxg
SZ5uZ6GeMyom5Jhv+kcc6ikcAwHPhqqXnMaqQqxEhdb10JD8Um+0V2OqSH4V
IMeFxZu1+IIVkwUn8kauvaza4lb9P9hp21aWwISkLSzEtwy8VqTQ4jg81+C6
1orsE6GWQt10wPZcegXZxXl2hWdtbX/NtXlwzej+fljJU6hgYG6w0t7pgDxZ
l84WikxfExLs3QHx1MjrJ0IlXYK7wEET5in1Uduu1ExbtlLxxhktsbRNBJHv
bNyqMWCpum3WAG6QXFacnm6fBPI3rf5JcbK8kEzHrkPADZFiL8+Jkw0N6oI1
Cy3zi1D374h1TIO2m+hMWgyhLGK69ZmnyIsN1WxdK3Wy+MIRTb3LBUeE1WuR
wdIPlQWzklbWgKUgiGFfRStopwWJpEixZE50wGfHKi6spD2X4yGnjY2jbRhM
p3H+/NlzQRdmxISNXhvV0bPFcymF4HzdVJtT1X1XtzlrsV8G22l86eKnj58C
yTRy3mF4Ja2+VXZz8z77D1HRd7OOL7PBs76gOgWSsY9gUao3Q70UVJ6GAMNY
/Up9CSaA5Cg35zft/L29i7Z5CCHcI0T3UJVC0ZShgU/zActHQA+tkXfgJuep
hFKDTcVkygj1avQs0pcvDAoKzNoxKeqE4kEUF9tUUk1Co3A/aTODTWhftmJL
Advc65GyQcqIpzJ1T1D051HoKAfRjy1C6VCwCrQS0doTsk3sM83TjlFiloXW
aJ0zFZBScotYgAqUybX7E0AziumSVlREdehIeFOacJSbcLuF0awc2wbDllTJ
SS7ykKI7HwvrcXN77R1aTetg6ZuJPnYSq6GgDs0sF/vEVEwA/yn1hFPnTMJQ
LZV6v2mFdCK1r9gLlcmz3taSQpJuVGw+hUyLBFWJ4Va2q2WTnJX6Wmi9gVdh
4dTarjANlm0Js8FdUPZ595emlKeHcoCQ/do2xsXGmKo6yWuOTQvZ1Og7bNR2
LXYLdcNVwyo6k/Sgwz40prRdo4haj/Gh4dQz/rxGYsuK70hhC4dojEGaPobw
CrtpHtDlfZmzaRv4qrqeRDnHMztnFysROlWbb/dqYFvt14pyxyapQPDYVs4P
/TJgSBFwQSTUYgD2N1/APUk5sK5ty5RIrFCASJHUBq89Uc3QI+uh9pXdF/ks
O0Lxe8AqtSsae3GoLyLd8s048h6lPR4Gsp9lM3KuOU0bSQfPr4G3NB6Py+Sn
PPHdIa2yQpWmFYx3JTW0lzbQq7AyLb3KClDY3DYHQCGmktxRS0tYIYzObLxa
xe0gii0jISG1YE/OQyYA3SzgBoe48ugkOuHWiNQBGL1PsVbjOU05QQsB6Pl+
WOd3rS0V1kcI5+4adSMINjRJGhcFDNpxDz4nfqtJ2/Mgsqcmv4O/0OQn+0dK
dLzYk5fTm0brHeHa83a1yojbvVnbUARe+3YA5HmLYHr4+BGqmW9n2Y2SmAr7
lKMO/zZ93L9+krFB6Q1dUxV0dIzBpxvUMhwaaSj39Pz0CdxDsDtfrUg3Jtz6
90jVnu4WyK8fBdtj+x3YW8qBJRC6Gkrjjy6EJJal9U4DwBJHkZMdzWEKFow8
bzD6hjidMr+kPmso0x3ThRhkhBu8pfiD/Ti4o/lSAK7GDR2DraAxry1/asdi
PnyFGT6ff8qQKW8NfBNUUArGj59usmenni+9ePnqlB2Jm+hoXb6enMSOU0wy
IA8SgN5bDUl1TNMkVbBEsImRnUrho2CprWxs/vTJk8e6UyXHpVnlKNVgx4oN
emR+H8DTIpfglXtCap3viKZQhqoiTJBghIzUnaRa9QaS3QXlVjz061LhpeHf
JBLrNlG2kM5GOh4mtYQvaiWeurC5wCOm4Be8VeL70AmTQ3BJjk70KZ3yrpWD
K6h8PLUbT6K172d739kLWIcMKP17o1FxJyUYMUjUJngr/fjg6FM4mHibBuR+
+GlVhcfZUhfvDNRBUic1zAR5Dnn6Rc3DFROap38ZuRJ7CBIicnQQgS371LWw
bu14LBzLc9HyhMweOfwC6PkStF1KkOb858BLteQX99NGAeGzWxsXymCl/zRx
pNtyoaCXz4cQJwwyOb/kPOFNVSPXrnhjQtJOOId/KLbK12v2rWCsajfySMav
NGlgWsKX+CIePHvkmZzvAooEcx5zmtCt+ZGtRzpOtESkvD6FjuoSbcXOqL+h
QcKNqVfa5PxmmpnywtAFFGY9JhwhT6E6n0eJNrkLaX+rx4S7tF+UHPv5HBUO
7mSupWnMyva+pdnsEqFDHrGgKh8OLnB4PIoEZa+Z6IMl1WlyEcSF2DjoFh+c
bio0xPfkkDKeu0pX0srBnxlrghM+lyQpOzo8AafxJkeaMSA0VGiuo5uehPX+
oWhWDnnFvRYjo2K5lHidHohKeU2KTSdMdCZixDsV3SH7k+6FvERr0acVDD6r
A8MC12/fTNOe54JI1EOhCiMiUgcMJF8p7QKJllbirVEIz+6gj9oc1O6Mp4MO
C2f2A+Q60H3g4YRcW7CHuPKNytEh+zYNGNhxuRsZFLUECl/cigBglLmvPMmg
bZ6KNEZTIJ90q7Tb7eHo7Icz/Bdqhavzs5uzCYiLv0wJ7OhfZWu0OEnuD9Ci
RFWOvLQ3l+HyjT/hDkqQ2k++QRVZwJUWI89jQiYVWJMaZphucH3D6Sd9MKfT
QkFw0cr+6rsYsHcqr28aP33xjPzk5xBAe/08X2MJXlSJ5yQzCQ5rWuLQaV6U
kw95lSYN5VswwZFLLJNcNhKZxL3hCX5xk3btLr+LXyHyIzMYizA2U+2t0XtN
6R2OFH5z1Kr1WAndYVFtYAjFONFDHF9weGYsk9pNizJyVJ0SlojV+xWWdsYH
FxplqZioS7csTht2IBOjJHZNMaTDjhRBNOtq5banqnDcaNcAnWFZoVJKug00
2+GJgpLhLl42893GvbO7YKbymy3ZI93Xn7CgP10M/nKSAN+3XKJot9qP7lo4
IcOAmwjJ+SWPUrKQ/eR6jS/r2Wq6ZTOF/TMu25sJ/5jeVUzzw1jsEIjIsKTW
lSsQ8VL1G++Aebz+4O+7lNYVg+BNegstGRvPvBOq63yP9/91PK4NgKj76Y2a
CKHKnCeJGY5CpuSvpflDx+Oy2ka9Y8KnJQ9N7v5JQvanuP6Cw2Xr+mN3zPRm
2cE1r8ipvnXXTK5Q2PR+z9gQojzfvcGnvj3IJcdiQwq7d61KyZu2l/N+rx7R
VEx3qPXE16yoQziyNLVUGME7BuIha6BZSIYOGFLKFp2/AQv1ffIue3hrVjpP
PB4LB0hyTYENj2aXTN2OaKG37DTK492eMCFgsPUb9lN5vB+PZ8PFvtRJWFCN
eB/C3B/SeZwZz7hk3qpdr6X/d+ObfMLXJ/AcTQqjG72hw0Pf2FHeTrXiJqAY
7r6Ol6VlW2Xb/B5cJG/6kRIiQntAfhcLilhNjEFCG4SJPDjJsDGLTYvq1JZy
V8D3e6PW9HLzXuPTX288cuWZYKL01/Yj7/DkdbSgpyhJwgpcrais4JYgr8QT
r0L0/0Sxs5c1pTqQ+0x7PUpJP94WctWY0o6eKqEeTTVh7BO+z4tT4tZqnBgi
Q9CrEOW0RE1uqdG1J/f/0qspYy3jyZ+mBjnBG6M53ILzV92Op1HvVUfE8HdN
ksNwuX9REFYiq5W7YmKj5JJDzuQ6dv/9wXqEHN40mt6UFYfeg6KpvKgDmPTO
5QTRXzt4ePn53D3yTDTuQ/BaefXBlo50fpP0Ip3xpVwRUcGPgoO/lBFzLq8I
MydQVWLQIu86Orz0INktCxeNAsYenjUG4c7b68iypbEtPcixrcKEALMQ7vwh
fCwDTpCgGAdHgJWF3di89Vc+Xj5hRITRWEVo/8oSCgTNDrH+oA8st6IDRF7R
J97T0ynyw6ur948YSMeTgpzeaWc7VGLSGRpLOwUwKiS5y2mbVZe7vhvEKYS5
XJx9ODvOWuLtSHYRmlZH6uExjSh/c8HuNWc5K26b9h5pWXqdbvbba+3umPLf
HqxAqcyDr8ABcdTmNnB+aRT7Y8M7a+7lo/x1Q4OEYLTs1aJUbvXGq0YYlFc7
58OHfyqlf5civeTF7H8BzEXUNfY2AAA=

-->

</rfc>

