<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-tls-composite-mldsa-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="Use of Composite ML-DSA in TLS 1.3">Use of Composite ML-DSA in TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-01"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Timothy Hollebeek">
      <organization>DigiCert</organization>
      <address>
        <postal>
          <city>Pittsburgh</city>
          <country>USA</country>
        </postal>
        <email>tim.hollebeek@digicert.com</email>
      </address>
    </author>
    <author initials="J." surname="Gray" fullname="John Gray">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>john.gray@entrust.com</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2024" month="November" day="26"/>
    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>ML-DSA</keyword>
    <keyword>FIPS204</keyword>
    <keyword>Composite</keyword>
    <abstract>
      <?line 67?>

<t>This document specifies how the post-quantum signature scheme ML-DSA <xref target="FIPS204"/>, in combination with traditional algorithms RSA-PKCS#1v1.5,RSA-PSS, ECDSA, Ed25519, and Ed448 can be used for authentication in TLS 1.3. The composite ML-DSA approach is beneficial in deployments where operators seek additional protection against potential breaks or catastrophic bugs in ML-DSA.</t>
    </abstract>
  </front>
  <middle>
    <?line 71?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The advent of quantum computing poses a significant threat to current cryptographic systems. Traditional cryptographic algorithms such as RSA, Diffie-Hellman, DSA, and their elliptic curve variants are vulnerable to quantum attacks. During the transition to post-quantum cryptography (PQC), there is considerable uncertainty regarding the robustness of both existing and new cryptographic algorithms. While we can no longer fully trust traditional cryptography, we also cannot immediately place complete trust in post-quantum replacements until they have undergone extensive scrutiny and real-world testing to uncover and rectify potential implementation flaws.</t>
      <t>Unlike previous migrations between cryptographic algorithms, the decision of when to migrate and which algorithms to adopt is far from straightforward. Even after the migration period, it may be advantageous for an entity's cryptographic identity to incorporate multiple public-key algorithms to enhance security.</t>
      <t>Cautious implementers may opt to combine cryptographic algorithms in such a way that an attacker would need to break all of them simultaneously to compromise the protected data. These mechanisms are referred to as Post-Quantum/Traditional (PQ/T) Hybrids <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.</t>
      <t>Certain jurisdictions are already recommending or mandating that PQC lattice schemes be used exclusively within a PQ/T hybrid framework. The use of Composite scheme provides a straightforward implementation of hybrid solutions compatible with (and advocated by) some governments and cybersecurity agencies <xref target="BSI2021"/>.</t>
      <t>ML-DSA <xref target="FIPS204"/> is a post-quantum signature schemes standardised by NIST. It is a module-lattice based scheme.</t>
      <t>This memo specifies how a composite ML-DSA can be negotiated for authentication in TLS 1.3 via the "signature_algorithms" and "signature_algorithms_cert" extensions. Hybrid signatures provide additional safety by ensuring protection even if vulnerabilities are discovered in one of the constituent algorithms. For deployments that cannot easily tweak configuration or effectively enable/disable algorithms, a composite signature combining PQC signature algorithm with an traditional signature algorithm offers the most viable solution.</t>
      <t>The rationale for this approach is based on the limitations of fallback strategies. For example, if a traditional signature system is compromised, reverting to a PQC signature algorithm would prevent attackers from forging new signatures that are no longer accepted. However, such a fallback process leaves systems exposed until the transition to the PQC signature algorithm is complete, which can be slow in many environments. In contrast, using hybrid signatures from the start mitigates this issue, offering robust protection and encouraging faster adoption of PQC.</t>
      <t>Further, zero-day vulnerabilities, where an exploit is discovered and used before the vulnerability is publicly disclosed, highlights this risk. The time required to disclose such attacks and for organizations to reactively switch to alternative algorithms can leave systems critically exposed. By the time a secure fallback is implemented, attackers may have already caused irreparable damage. Adopting hybrid signatures preemptively helps mitigate this window of vulnerability, ensuring resilience even in the face of unforeseen threats.</t>
      <section anchor="sec-terminology">
        <name>Conventions and Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
These words may also appear in this document in
lower case as plain English words, absent their normative meanings.
<?line -8?>
        </t>
        <t>This document is consistent with the terminology defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. It defines composites as:</t>
        <ul empty="true">
          <li>
            <t><em>Composite Cryptographic Element</em>:  A cryptographic element that
     incorporates multiple component cryptographic elements of the same
     type in a multi-algorithm scheme.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="ml-dsa-signatureschemes-types">
      <name>ML-DSA SignatureSchemes Types</name>
      <t>As defined in <xref target="RFC8446"/>, the SignatureScheme namespace is used for
the negotiation of signature scheme for authentication via the
"signature_algorithms" and "signature_algorithms_cert" extensions.
This document adds new SignatureSchemes types for the composite ML-DSA as follows.</t>
      <artwork><![CDATA[
enum {
  mldsa44_ecdsa_secp256r1_sha256 (0x0907),
  mldsa65_ecdsa_secp384r1_sha384 (0x0908),
  mldsa87_ecdsa_secp384r1_sha384 (0x0909),
  mldsa44_ed25519 (0x090A),
  mldsa65_ed25519 (0x090B),
  mldsa44_rsa2048_pkcs1_sha256 (0x090C),
  mldsa65_rsa3072_pkcs1_sha256 (0x090D),
  mldsa65_rsa4096_pkcs1_sha384 (0x090E),
  mldsa44_rsa2048_pss_pss_sha256 (0x090F),
  mldsa65_rsa3072_pss_pss_sha256 (0x0910),
  mldsa65_rsa4096_pss_pss_sha384 (0x0911),
  mldsa87_ed448 (0x0912)
} SignatureScheme
]]></artwork>
      <t>Each entry specifies a unique combination of an ML-DSA parameter, an elliptic curve or RSA variant, and a hashing function. The first algorithm corresponds to ML-DSA-44, ML-DSA-65, and ML-DSA-87, as defined in <xref target="FIPS204"/>. It is important to note that the mldsa* entries represent the pure versions of these algorithms and should not be confused with prehashed variants, such as HashML-DSA-44, also defined in <xref target="FIPS204"/>. Support for prehashed variants is not required because TLS computes the hash of the message (e.g., the transcript of the TLS handshake) that needs to be signed.</t>
      <t>In TLS, the data used for generating a digital signature is unique for each TLS session, as it includes the entire handshake. Thus, ML-DSA can utilize the deterministic version. The context parameter defined in <xref target="FIPS204"/> Algorithm 2/Algorithm 3 MUST be an empty string.</t>
      <t>The signature MUST be computed and verified as specified in <xref section="4.4.3" sectionFormat="of" target="RFC8446"/>. The Composite-ML-DSA.Sign function, defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, will be utilized by the sender to compute the signature field of the CertificateVerify message. Conversely, the Composite-ML-DSA.Verify function, also defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, will be employed by the receiver to verify the signature field of the CertificateVerify message.</t>
      <t>Note: In the LAMPS WG, it is being discussed that the composite signature API should avoid using protocol-specific encoding.</t>
      <t>The corresponding end-entity certificate when negotiated MUST
use the First AlgorithmID and Second AlgorithmID respectively as
defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>The schemes defined in this document MUST NOT be used in TLS 1.2 <xref target="RFC5246"/>. A peer that receives ServerKeyExchange or CertificateVerify message in a TLS 1.2 connection with schemes defined in this document MUST abort the connection with an illegal_parameter alert.</t>
    </section>
    <section anchor="signature-algorithm-restrictions">
      <name>Signature Algorithm Restrictions</name>
      <t>TLS 1.3 removed support for RSASSA-PKCS1-v1_5 <xref target="RFC8017"/> in CertificateVerify messages, opting for RSASSA-PSS instead. Similarly, this document restricts the use of the composite signature algorithms mldsa44_rsa2048_pkcs1_sha256, mldsa65_rsa3072_pkcs1_sha256, and mldsa65_rsa4096_pkcs1_sha384 algorithms to the "signature_algorithms_cert" extension. These composite signature algorithms MUST NOT be used with the "signature_algorithms" extension. These values refer solely to signatures which appear in certificates (see <xref section="4.4.2.2" sectionFormat="of" target="RFC8446"/>) and are not defined for use in signed TLS handshake messages.</t>
      <t>A peer that receives a CertificateVerify message indicating the use of the RSASSA-PKCS1-v1_5 algorithm as one of the component signature algorithms MUST terminate the connection with a fatal illegal_parameter alert.</t>
    </section>
    <section anchor="selection-criteria-for-composite-signature-algorithms">
      <name>Selection Criteria for Composite Signature Algorithms</name>
      <t>The composite signatures specified in the document are restricted set of cryptographic pairs, chosen from the intersection of two sources:</t>
      <ul spacing="normal">
        <li>
          <t>The composite algorithm combinations as recommended in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, which specify both PQC and traditional signature algorithms.</t>
        </li>
        <li>
          <t>The mandatory-to-support or recommended traditional signature algorithms listed in TLS 1.3.</t>
        </li>
      </ul>
      <t>By limiting algorithm combinations to those defined in both <xref target="I-D.ietf-lamps-pq-composite-sigs"/> and TLS 1.3, this specification ensures that each pair:</t>
      <ul spacing="normal">
        <li>
          <t>Meets established security standards for composite signatures in a post-quantum context, as described in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
        </li>
        <li>
          <t>Is compatible with traditional digital signatures recommended in TLS 1.3, ensuring interoperability and ease of adoption within the TLS ecosystem.</t>
        </li>
      </ul>
      <t>This conservative approach reduces the risk of selecting unsafe or incompatible configurations, promoting security by requiring only trusted and well-vetted pairs. Future updates to this specification may introduce additional algorithm pairs as standards evolve, subject to similar vetting and inclusion criteria.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations discussed in Section 11 of <xref target="I-D.ietf-lamps-pq-composite-sigs"/> needs
to be taken into account.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests new entries to the TLS SignatureScheme registry,
according to the procedures in <xref section="6" sectionFormat="of" target="TLSIANA"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Recommended</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x0907</td>
            <td align="left">mldsa44_ecdsa_secp256r1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0908</td>
            <td align="left">mldsa65_ecdsa_secp384r1_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0909</td>
            <td align="left">mldsa87_ecdsa_secp384r1_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090A</td>
            <td align="left">mldsa44_ed25519</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090B</td>
            <td align="left">mldsa65_ed25519</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090C</td>
            <td align="left">mldsa44_rsa2048_pkcs1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090D</td>
            <td align="left">mldsa65_rsa3072_pkcs1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090E</td>
            <td align="left">mldsa65_rsa4096_pkcs1_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x090F</td>
            <td align="left">mldsa44_rsa2048_pss_pss_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0910</td>
            <td align="left">mldsa65_rsa3072_pss_pss_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0911</td>
            <td align="left">mldsa65_rsa4096_pss_pss_sha384</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0912</td>
            <td align="left">mldsa87_ed448</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
        </tbody>
      </table>
      <section anchor="restricting-composite-signature-algorithms-to-the-signaturealgorithmscert-extension">
        <name>Restricting Composite Signature Algorithms to the signature_algorithms_cert Extension</name>
        <t>IANA is requested to add a footnote indicating that the mldsa44_rsa2048_pkcs1_sha256, mldsa65_rsa3072_pkcs1_sha256, and mldsa65_rsa4096_pkcs1_sha384 algorithms are defined exclusively for use with the signature_algorithms_cert extension and are not intended for use with the signature_algorithms extension.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TLSIANA">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="3" month="November" year="2024"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   recommended column of the selected TLS registries and adds a
   "Comments" column to all active registries.

   This document updates the following RFCs: 3749, 5077, 4680, 5246,
   5705, 5878, 6520, 7301, and 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-10"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA For use in X.509 Public Key Infrastructure and CMS</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSA-PKCS#1v1.5, RSA-PSS, ECDSA, Ed25519,
   and Ed448.  These combinations are tailored to meet security best
   practices and regulatory requirements.  Composite ML-DSA is
   applicable in any application that uses X.509, PKIX, and CMS data
   structures and protocols that accept ML-DSA, but where the operator
   wants extra protection against breaks or catastrophic bugs in ML-DSA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-03"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="September" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-04"/>
        </reference>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS-204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="BSI2021" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Brochure/quantum-safe-cryptography.pdf">
          <front>
            <title>Quantum-safe cryptography - fundamentals, current developments and recommendations</title>
            <author>
              <organization>Federal Office for Information Security (BSI)</organization>
            </author>
            <date year="2021" month="October"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 198?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Bas Westerbaan, Alicja Kario, Ilari Liusvaara and Sean Turner for the discussion and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
