<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-uta-pqc-app-06" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="PQC Recommendations for TLS-based Applications">Post-Quantum Cryptography Recommendations for TLS-based Applications</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-uta-pqc-app-06"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2025" month="February" day="17"/>
    <area>Applications and Real-Time Area</area>
    <workgroup>uta</workgroup>
    <keyword>PQC</keyword>
    <keyword>DNS</keyword>
    <keyword>WebRTC</keyword>
    <keyword>HPKE</keyword>
    <keyword>ESNI</keyword>
    <keyword>PQ/T Hybrid</keyword>
    <abstract>
      <?line 58?>

<t>Post-quantum cryptography presents new challenges for applications, end users, and system administrators. This document highlights the unique characteristics of applications and offers best practices for implementing quantum-ready usage profiles in applications that use TLS and key supporting protocols such as DNS.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-uta-pqc-app/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        uta Working Group mailing list (<eref target="mailto:uta@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/uta/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/uta/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 62?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The visible face of the Internet predominantly comprises services operating on a client-server architecture, where a client communicates with an application service. When using protocols such as TLS 1.3 <xref target="RFC8446"/>, DTLS 1.3 <xref target="RFC9147"/>, or protocols built on these foundations (e.g., QUIC <xref target="RFC9001"/>), clients and servers perform ephemeral public-key exchanges, such as Elliptic Curve Diffie-Hellman (ECDH), to derive a shared secret that ensures forward secrecy. Additionally, they validate each other's identities through X.509 certificates, establishing secure communication.</t>
      <t>The emergence of a Cryptographically Relevant Quantum Computer (CRQC) would render current public-key algorithms insecure and obsolete. This is because the mathematical assumptions underpinning these algorithms, which currently offer high levels of security, would no longer hold in the presence of a CRQC. Consequently, there is an urgent need to update protocols and infrastructure with post-quantum cryptographic (PQC) algorithms. These algorithms are designed to remain secure against both CRQCs and classical computers. The traditional cryptographic primitives requiring replacement are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>, and the NIST PQC Standardization process has selected algorithms such as ML-KEM, SLH-DSA, and ML-DSA as candidates for future deployment in protocols.</t>
      <t>Historically, the industry has successfully transitioned between cryptographic protocols, such as upgrading TLS versions and deprecating older ones (e.g., SSLv2), and shifting from RSA to Elliptic Curve Cryptography (ECC), which improved security and reduced key sizes. However, the transition to PQC presents unique challenges, primarily due to the following:</t>
      <ol spacing="normal" type="1"><li>
          <t>Algorithm Maturity: While NIST has finalized a set of PQC algorithms, ensuring the correctness and security of implementations remains critical. Even the most secure algorithm is vulnerable if implementation flaws introduce security risks.</t>
        </li>
        <li>
          <t>Key and Signature Sizes: Many PQC algorithms require significantly larger key and signature sizes, which can inflate handshake packet sizes and impact network performance. For example, ML-KEM public keys are substantially larger than ECDH keys (see Table 5 in <xref target="I-D.ietf-pquip-pqc-engineers"/>). Similarly, public keys for SLH-DSA and ML-DSA are much larger than those for P256 (see Table 6 in <xref target="I-D.ietf-pquip-pqc-engineers"/>). Signature sizes for algorithms like SLH-DSA and ML-DSA are also considerably larger compared to traditional options like Ed25519 or ECDSA-P256, posing challenges for constrained environments (e.g., IoT) and increasing handshake times in high-latency or lossy networks.</t>
        </li>
        <li>
          <t>Performance Trade-Offs: While some PQC algorithms exhibit slower operations compared to traditional algorithms, others provide specific advantages. For instance, ML-KEM requires less CPU than X25519, and ML-DSA offers faster signature verification times compared to Ed25519, although its signature generation process is slower.</t>
        </li>
      </ol>
      <t>Any application transmitting messages over untrusted networks is potentially vulnerable to active or passive attacks by adversaries equipped with CRQCs. The degree of vulnerability varies in significance depending on the application and underlying systems. This document outlines quantum-ready usage profiles for applications designed to protect against passive and on-path attacks leveraging CRQCs. It also discusses how TLS client and server implementations, along with essential supporting applications, can address these challenges using various techniques detailed in subsequent sections.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document adopts terminology defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is useful to categorize cryptographic algorithms into three distinct classes:</t>
      <ul spacing="normal">
        <li>
          <t>Traditional Algorithm: An asymmetric cryptographic algorithm based on integer factorization, finite field discrete logarithms, or elliptic curve discrete logarithms. In the context of TLS, an example of a traditional key exchange algorithm is Elliptic Curve Diffie-Hellman (ECDH), which is almost exclusively used in its ephemeral mode, referred to as Elliptic Curve Diffie-Hellman Ephemeral (ECDHE).</t>
        </li>
        <li>
          <t>Post-Quantum Algorithm: An asymmetric cryptographic algorithm designed to be secure against attacks from both quantum and classical computers. An example of a post-quantum key exchange algorithm is the Module-Lattice Key Encapsulation Mechanism (ML-KEM).</t>
        </li>
        <li>
          <t>Hybrid Algorithm: We distinguish between key exchanges and signature algorithms:  </t>
          <ul spacing="normal">
            <li>
              <t>Hybrid Key Exchange: A key exchange mechanism that combines two component algorithms - one traditional algorithm and one post-quantum algorithm. The resulting shared secret remains secure as long as at least one of the component key exchange algorithms remains unbroken.</t>
            </li>
            <li>
              <t>PQ/T Hybrid Digital Signature: A multi-algorithm digital signature scheme composed of two or more component signature algorithms, where at least one is a post-quantum algorithm and at least one is a traditional algorithm.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>Digital signature algorithms play a critical role in X.509 certificates, Certificate Transparency Signed Certificate Timestamps, Online Certificate Status Protocol (OCSP) statements, remote attestation evidence, and any other mechanism that contributes signatures during a TLS handshake or in context of a secure communication establishment.</t>
    </section>
    <section anchor="timeline">
      <name>Timeline for Transition</name>
      <t>The timeline and driving motivations for transitioning to quantum-ready cryptography differ between data confidentiality and data authentication (e.g., signatures). The risk of "Harvest Now, Decrypt Later" (HNDL) attacks demands immediate action to protect data confidentiality, while the threat to authentication systems, although less urgent, requires forward-thinking planning to mitigate future risks.</t>
      <t>Encrypted payloads transmitted using Transport Layer Security (TLS) are vulnerable to decryption if an attacker equipped with a CRQC gains access to the traditional asymmetric public keys used in the TLS key exchange along with the transmitted ciphertext. TLS implementations typically use Diffie-Hellman-based key exchange schemes. If an attacker obtains a complete set of encrypted payloads, including the TLS setup, they could theoretically use a CRQC to derive the private key and decrypt the data.</t>
      <t>The primary concern for data confidentiality is the "Harvest Now, Decrypt Later" scenario, where a malicious actor with sufficient resources stores encrypted data today to decrypt it in the future, once a CRQC becomes available. This means that even data encrypted today is at risk unless quantum-safe strategies are implemented. The window of vulnerability—the effective security lifetime of the encrypted data—can range from seconds to decades, depending on the sensitivity of the data and how long it remains valuable. This highlights the immediate need to adopt quantum-resistant cryptographic measures to ensure long-term confidentiality.</t>
      <t>For data authentication, the concern shifts to potential on-path attackers equipped with CRQCs capable of breaking traditional authentication mechanisms. Such attackers could impersonate legitimate entities, tricking victims into connecting to the attacker’s device instead of the intended target, resulting in impersonation attacks. While this is not as immediate a threat as "Harvest Now, Decrypt Later" attacks, it remains a significant risk that must be addressed proactively.</t>
      <t>In client/server certificate-based authentication, the security window between the generation of the signature in the CertificateVerify message and its verification by the peer during the TLS handshake is typically short. However, the security lifetime of digital signatures on X.509 certificates, including those issued by root Certification Authorities (CAs), warrants closer scrutiny. Root CA certificates can have validity periods of 20 years or more, while root Certificate Revocation Lists (CRLs) often remain valid for a year or longer. Delegated credentials, such as CRL Signing Certificates or OCSP response signing certificates, generally have shorter lifetimes but still present a potential vulnerability window.</t>
      <t>While data confidentiality faces the immediate and pressing threat of "Harvest Now, Decrypt Later" attacks, requiring urgent quantum-safe adoption, data authentication poses a longer-term risk that still necessitates careful planning. Both scenarios underscore the importance of transitioning to quantum-resistant cryptographic systems to safeguard data and authentication mechanisms in a post-quantum era.</t>
    </section>
    <section anchor="confident">
      <name>Data Confidentiality</name>
      <t>Data in transit may require protection for years, making the potential emergence of CRQCs a critical concern. This necessitates a shift away from traditional algorithms. However, uncertainties regarding the security of PQC algorithm implementations, evolving regulatory requirements, and the ongoing development of cryptanalysis justify a transitional approach where well-established traditional algorithms are used alongside new PQC primitives.</t>
      <t>Applications utilizing (D)TLS that are vulnerable to "Harvest Now, Decrypt Later" attacks <bcp14>MUST</bcp14> transition to (D)TLS 1.3 and adopt one of the following strategies:</t>
      <ul spacing="normal">
        <li>
          <t>Hybrid Key Exchange: Hybrid key exchange combines traditional and PQC key exchange algorithms, offering resilience even if one algorithm is compromised. As defined in <xref target="I-D.ietf-tls-hybrid-design"/>, this approach ensures robust security during the migration to PQC. For TLS 1.3, hybrid Post-Quantum key exchange groups are introduced in <xref target="I-D.kwiatkowski-tls-ecdhe-mlkem"/>:  </t>
          <ol spacing="normal" type="1"><li>
              <t>X25519MLKEM768: Combines the classical X25519 key exchange with the ML-KEM-768 Post-Quantum Key Encapsulation Mechanism.</t>
            </li>
            <li>
              <t>SecP256r1MLKEM768: Combines the classical SecP256r1 key exchange with the ML-KEM-768 Post-Quantum Key Encapsulation Mechanism.</t>
            </li>
            <li>
              <t>SecP384r1MLKEM1024: Combines the classical SecP384r1 key exchange with the ML-KEM-1024 Post-Quantum Key Encapsulation Mechanism.</t>
            </li>
          </ol>
        </li>
        <li>
          <t>Pure Post-Quantum Key Exchange: For deployments that require exclusively Post-Quantum key exchange, <xref target="I-D.connolly-tls-mlkem-key-agreement"/> defines the following standalone NamedGroups for Post-Quantum key agreement in TLS 1.3: ML-KEM-512, ML-KEM-768, and ML-KEM-1024</t>
        </li>
      </ul>
      <t>Hybrid Key Exchange is generally preferred over pure PQC key exchange because it provides defense-in-depth by combining the strengths of both classical and PQC algorithms. This ensures continued security, even if one algorithm is compromised during the transitional period.</t>
      <t>However, Pure PQC Key Exchange may be required for specific deployments with regulatory or compliance mandates that necessitate the exclusive use of post-quantum cryptography. Examples include high-security environments or sectors governed by stringent cryptographic standards.</t>
      <section anchor="optimizing-clienthello-for-hybrid-key-exchange-in-tls-handshake">
        <name>Optimizing ClientHello for Hybrid Key Exchange in TLS Handshake</name>
        <t>The client initiates the TLS handshake by sending a list of supported key agreement methods in the key_share extension. One of the key challenges during the migration to PQC is that the client may not know whether the server supports hybrid key exchange. To address this uncertainty, the client can adopt one of the following three strategies:</t>
        <ol spacing="normal" type="1"><li>
            <t>Send Both Traditional and Hybrid Key Exchange Algorithms: In the initial ClientHello message, the client can include both traditional and hybrid key exchange algorithm key shares. This eliminates the need for multiple round trips but comes with its own trade-offs.</t>
          </li>
        </ol>
        <ul spacing="normal">
          <li>
            <t>Advantage: Reduces latency since the server can immediately select an appropriate key exchange method.</t>
          </li>
          <li>
            <t>Challenges:
            </t>
            <ul spacing="normal">
              <li>
                <t>The size of the hybrid key exchange algorithm key share may exceed the Maximum Transmission Unit (MTU), potentially causing the ClientHello message to be fragmented across multiple packets. This fragmentation increases the risk of packet loss and retransmissions, leading to potential delays. During the TLS handshake, the server will respond to the ClientHello with its public key and ciphertext. If these components also exceed the MTU, the ServerHello message may be fragmented, further compounding the risk of delays due to packet loss and retransmissions.</t>
              </li>
              <li>
                <t>Middleboxes that do not handle fragmented ClientHello messages properly may drop them, as this behavior is uncommon.</t>
              </li>
              <li>
                <t>Additionally, this approach requires more computational resources on the client and increases handshake traffic.</t>
              </li>
            </ul>
          </li>
        </ul>
        <ol spacing="normal" type="1"><li>
            <t>Indicate Support for Hybrid Key Exchange: Alternatively, the client may initially indicate support for hybrid key exchange and send a traditional key exchange algorithm key share in the first ClientHello message. If the server supports hybrid key exchange, it will use the HelloRetryRequest to request a hybrid key exchange algorithm key share from the client. The client can then send the hybrid key exchange algorithm key share in the second ClientHello message. However, this approach has a disadvantage in that the roundtrip would introduce additional delay compared to the previous technique of sending both traditional and hybrid key exchange algorithm key shares to the server in the initial ClientHello message.</t>
          </li>
          <li>
            <t>Use Server Key Share Preferences Communicated via DNS:  <xref target="I-D.ietf-tls-key-share-prediction"/> defines a mechanism where servers communicate their key share preferences through DNS responses. TLS clients can use this information to tailor their initial ClientHello message, reducing the need for additional round trips. By leveraging these DNS-based hints, the client can optimize the handshake process and avoid unnecessary delays.</t>
          </li>
        </ol>
        <t>Clients <bcp14>MAY</bcp14> also use information from completed handshakes to cache the server's key exchange algorithm preferences, as described in Section 4.2.7 of <xref target="RFC8446"/>. To minimize the risk of the ClientHello message being split across multiple packets, clients should avoid duplicating PQC KEM public key shares. Strategies for preventing duplication are outlined in Section 4 of <xref target="I-D.ietf-tls-hybrid-design"/>. By carefully managing key shares, the client can reduce the size of the ClientHello message and improve compatibility with network infrastructure.</t>
      </section>
    </section>
    <section anchor="use-of-external-psk-with-traditional-key-exchange-for-data-confidentiality">
      <name>Use of External PSK with Traditional Key Exchange for Data Confidentiality</name>
      <t><xref target="RFC8772"/> provides an alternative approach for ensuring data confidentiality by combining an external pre-shared key (PSK)
with a traditional key exchange mechanism, such as ECDHE. The external PSK is incorporated into the TLS 1.3 key schedule,
where it is mixed with the (EC)DHE-derived secret to strengthen confidentiality.</t>
      <t>While using an external PSK in combination with (EC)DHE can enhance confidentiality, it has the following limitations:</t>
      <ul spacing="normal">
        <li>
          <t>Key Management Complexity: Unlike ephemeral ECDHE keys, external PSKs require secure provisioning and lifecycle management.</t>
        </li>
        <li>
          <t>Limited Forward Secrecy: If an external PSK is static and reused across sessions, its compromise can retroactively expose
past communications if the traditional key exchange is broken by a CRQC.</t>
        </li>
        <li>
          <t>Scalability Challenges: Establishing unique PSKs for many clients can be impractical, especially in large-scale deployments.</t>
        </li>
        <li>
          <t>Quantum Resistance Dependence: While PSKs can provide additional secrecy against quantum threats, they must be
generated using a secure key-management technique. If a weak PSK is used, it may not offer sufficient security against
brute-force attacks.</t>
        </li>
      </ul>
      <t>Despite these limitations, external PSKs can serve as a complementary mechanism in PQC transition strategies, providing additional
confidentiality protection when combined with traditional key exchange.</t>
    </section>
    <section anchor="authentication">
      <name>Authentication</name>
      <t>Although CRQCs could potentially decrypt past TLS sessions, client/server authentication based on certificates cannot be retroactively compromised. However, the multi-year process required to establish, certify, and embed new root CAs presents a significant challenge. If CRQCs emerge earlier than anticipated, responding promptly to secure authentication systems would be difficult. While the migration to PQ X.509 certificates allows for more time compared to key exchanges, delaying these preparations should be avoided.</t>
      <t>The quantum-ready authentication property becomes critical in scenarios where an on-path attacker uses network devices equipped with CRQCs to break traditional authentication protocols. For example, if an attacker determines the private key of a server certificate before its expiration, they could impersonate the server, causing users to believe their connections are legitimate. This impersonation leads to serious security threats, including unauthorized data disclosure, interception of communications, and overall system compromise.</t>
      <t>The quantum-ready authentication property ensures robust authentication through the use of either a pure Post-Quantum certificate or a PQ/T hybrid certificate:</t>
      <ol spacing="normal" type="1"><li>
          <t>Post-Quantum X.509 Certificates</t>
        </li>
      </ol>
      <ul spacing="normal">
        <li>
          <t>ML-DSA Certificates: Defined in <xref target="I-D.ietf-lamps-dilithium-certificates"/>, these use the Module-Lattice Digital Signature Algorithm (ML-DSA). <xref target="I-D.tls-westerbaan-mldsa"/> explains how ML-DSA is applied for authentication in TLS 1.3.</t>
        </li>
        <li>
          <t>SLH-DSA Certificates: Defined in <xref target="I-D.ietf-lamps-x509-slhdsa"/>, these use the SLH-DSA algorithm. <xref target="I-D.reddy-tls-slhdsa"/> details how SLH-DSA is used in TLS 1.3 and compares its advantages and disadvantages with ML-DSA in Section 2 of the document</t>
        </li>
      </ul>
      <ol spacing="normal" type="1"><li>
          <t>Composite certificates are defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>. These combine Post-Quantum algorithms like ML-DSA with traditional algorithms such as RSA-PKCS#1v1.5, RSA-PSS, ECDSA, Ed25519, or Ed448, to provide additional protection against vulnerabilities or implementation bugs in a single algorithm. <xref target="I-D.reddy-tls-composite-mldsa"/> specifies how composite signatures, including ML-DSA, are used for TLS 1.3 authentication.</t>
        </li>
      </ol>
      <t>Determining whether and when to adopt PQC certificates or PQ/T hybrid schemes depends on several factors, including:</t>
      <ul spacing="normal">
        <li>
          <t>Frequency and duration of system upgrades</t>
        </li>
        <li>
          <t>The expected timeline for CRQC availability</t>
        </li>
        <li>
          <t>Operational flexibility to enable or disable algorithms</t>
        </li>
      </ul>
      <t>Deployments with limited flexibility benefit significantly from hybrid signatures, which combine traditional algorithms with PQC algorithms. This approach mitigates the risks associated with delays in transitioning to PQC and provides an immediate safeguard against zero-day vulnerabilities.</t>
      <t>Hybrid signatures enhance resilience during the adoption of PQC by:</t>
      <ul spacing="normal">
        <li>
          <t>Providing defense-in-depth: They maintain security even if one algorithm is compromised.</t>
        </li>
        <li>
          <t>Reducing exposure to unforeseen vulnerabilities: They offer immediate protection against potential weaknesses in PQC algorithms.</t>
        </li>
      </ul>
      <t>For example, telecom networks—characterized by centralized infrastructure, internal CAs, and close relationships with vendors are well-positioned to manage the overhead of larger PQC keys and signatures. These networks can adopt PQC signature algorithms earlier due to their ability to coordinate and deploy changes effectively.</t>
      <t>Conversely, the Web PKI ecosystem may delay adoption until more efficient and compact PQC signature algorithms, such as MAYO, UOV, HAWK, or SQISign, become available. This is due to the broader, more decentralized nature of the Web PKI ecosystem, which makes coordination and implementation more challenging.</t>
      <section anchor="optimizing-pqc-certificate-exchange-in-tls">
        <name>Optimizing PQC Certificate Exchange in TLS</name>
        <t>To address the challenge of large PQ or PQ/T hybrid certificate chains during the TLS handshake, the following mechanisms can help optimize the size of the exchanged certificate data:</t>
        <ul spacing="normal">
          <li>
            <t>TLS Cached Information Extension (<xref target="RFC7924"/>): This extension enables clients to indicate that they have cached certificate information from a prior connection. The server can then signal the client to reuse the cached data instead of retransmitting the full certificate chain. While this mechanism reduces bandwidth usage, it introduces potential privacy concerns, as it could allow attackers to correlate separate TLS sessions, compromising anonymity for cases where this is a concern.</t>
          </li>
          <li>
            <t>TLS Certificate Compression (<xref target="RFC8879"/>): This specification defines compression schemes to reduce the size of the server's certificate chain. While effective in many scenarios, its impact on PQ or PQ/T hybrid certificates is limited due to the larger sizes of public keys and signatures in PQC. These high-entropy fields, inherent to PQC algorithms, constrain the overall compression effectiveness.</t>
          </li>
          <li>
            <t>Abridged TLS Certificate ({?I-D.ietf-tls-cert-abridge}): This approach minimizes the size of the certificate chain by omitting intermediate certificates that are already known to the client. Instead, the server provides a compact representation of the certificate chain, and the client reconstructs the omitted certificates using a well-known common CA database. This mechanism significantly reduces bandwidth requirements while preserving compatibility with existing certificate validation processes. Additionally, it explores potential methods to compress the end-entity certificate itself, though this aspect remains under discussion within the TLS Working Group.</t>
          </li>
        </ul>
        <t>These techniques aim to optimize the exchange of certificate chains during the TLS handshake, particularly in scenarios involving large PQC-related certificates, while balancing efficiency and compatibility.</t>
      </section>
    </section>
    <section anchor="informing-users-of-pqc-security-compatibility-issues">
      <name>Informing Users of PQC Security Compatibility Issues</name>
      <t>When the server detects that the client does not support PQC or hybrid key exchange, it may send an insufficient_security fatal alert to the client. The client, in turn, can notify end-users that the server they are attempting to access requires a level of security that the client cannot provide due to the lack of PQC support. Additionally, the client may log this event for diagnostic purposes, security auditing, or reporting the issue to the client development team for further analysis.</t>
      <t>Conversely, if the client detects that the server does not support PQC or hybrid key exchange, it may present an alert or error message to the end-user. This message should explain that the server is incompatible with the PQC security features supported by the client.</t>
      <t>It is important to design such alerts thoughtfully to ensure they are clear and actionable, avoiding unnecessary warnings that could overwhelm or confuse users. It is also important to note that notifications to end-users may not be applicable or necessary in all scenarios, particularly in the context of machine-to-machine communication.</t>
    </section>
    <section anchor="pqc-transition-for-critical-application-protocols">
      <name>PQC Transition for Critical Application Protocols</name>
      <t>This document primarily focuses on the transition to PQC in applications that utilize TLS, while also covering other essential protocols, such as DNS, that play a critical role in supporting application functionality.</t>
      <section anchor="encrypted-dns">
        <name>Encrypted DNS</name>
        <t>The privacy risks associated with exchanging DNS messages in clear text are detailed in <xref target="RFC9076"/>. To mitigate these risks, Transport Layer Security (TLS) is employed to provide privacy for DNS communications. Encrypted DNS protocols, such as DNS-over-HTTPS (DoH) <xref target="RFC8484"/>, DNS-over-TLS (DoT) <xref target="RFC7858"/>, and DNS-over-QUIC (DoQ) <xref target="RFC9250"/>, safeguard messages against eavesdropping and on-path tampering during transit.</t>
        <t>However, encrypted DNS messages transmitted using TLS may be vulnerable to decryption if an attacker gains access to the public keys used in the TLS key exchange. If an attacker obtains a complete set of encrypted DNS messages, including the TLS handshake details, they could potentially use a CRQC to determine the ephemeral private key used in the key exchange, thereby decrypting the content.</t>
        <t>To address these vulnerabilities, encrypted DNS protocols <bcp14>MUST</bcp14> support the quantum-ready usage profile discussed in {#confident}.</t>
        <t>It is important to note that the Post-Quantum security of DNSSEC <xref target="RFC9364"/>, which provides authenticity for DNS records, is a distinct issue separate from the requirements for encrypted DNS transport protocols.</t>
      </section>
      <section anchor="hybrid-public-key-encryption-hpke-and-encrypted-client-hello">
        <name>Hybrid public-key encryption (HPKE) and Encrypted Client Hello</name>
        <t>Hybrid Public-Key Encryption (HPKE) is a cryptographic scheme designed to enable public key encryption of arbitrary-sized plaintexts using a recipient's public key. HPKE employs a non-interactive ephemeral-static Diffie-Hellman key exchange to derive a shared secret. The rationale for standardizing a public key encryption scheme is detailed in the introduction of <xref target="RFC9180"/>.</t>
        <t>HPKE can be extended to support PQ/T Hybrid Post-Quantum Key Encapsulation Mechanisms (KEMs), as described in <xref target="I-D.connolly-cfrg-xwing-kem"/>. This extension ensures compatibility with Post-Quantum Cryptography (PQC) while maintaining the resilience provided by hybrid cryptographic approaches.</t>
        <t>Client TLS libraries and applications can utilize Encrypted Client Hello (ECH) <xref target="I-D.ietf-tls-esni"/> to prevent passive observation of the intended server identity during the TLS handshake. However, this requires the concurrent deployment of Encrypted DNS protocols (e.g., DNS-over-TLS), as passive listeners could otherwise observe DNS queries or responses and deduce the same server identity that ECH is designed to protect. ECH employs HPKE for public key encryption.</t>
        <t>To safeguard against "Harvest Now, Decrypt Later" attacks, ECH deployments must incorporate support for PQ/T Hybrid Post-Quantum KEMs. In this context, the public_key field in the HpkeKeyConfig structure would need to accommodate a concatenation of traditional and PQC KEM public keys to ensure robust protection against quantum-enabled adversaries.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations outlined in <xref target="I-D.ietf-pquip-pqc-engineers"/> must be carefully evaluated and taken into account.</t>
      <t>Post-quantum algorithms selected for standardization are relatively new, and their implementations are still in the early stages of maturity. This makes them more susceptible to implementation bugs compared to the well-established and extensively tested cryptographic algorithms currently in use. Furthermore, certain deployments may need to continue using traditional algorithms to meet regulatory requirements, such as Federal Information Processing Standard (FIPS) <xref target="SP-800-56C"/> or Payment Card Industry (PCI) compliance.</t>
      <t>Hybrid key exchange provides a practical and flexible solution, offering protection against "Harvest Now, Decrypt Later" attacks while maintaining the ability to respond to potential catastrophic vulnerabilities in any single algorithm. This approach enables a gradual transition to PQC without the need to completely abandon traditional cryptosystems.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Dan Wing for suggesting a broader scope for the document, and to Mike Ounsworth, Scott Fluhrer, Russ Housley, Loganaden Velvindron, Bas Westerbaan, and Thom Wiggers for their helpful feedback and reviews.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa and Meta</organization>
            </author>
            <date day="14" month="January" year="2025"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-12"/>
        </reference>
        <reference anchor="I-D.kwiatkowski-tls-ecdhe-mlkem">
          <front>
            <title>Post-quantum hybrid ECDHE-MLKEM Key Agreement for TLSv1.3</title>
            <author fullname="Kris Kwiatkowski" initials="K." surname="Kwiatkowski">
              <organization>PQShield</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <date day="24" month="December" year="2024"/>
            <abstract>
              <t>   This draft defines three hybrid key agreements for TLS 1.3:
   X25519MLKEM768, SecP256r1MLKEM768, and SecP384r1MLKEM1024 which
   combine a post-quantum KEM with an elliptic curve Diffie-Hellman
   (ECDHE).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-kwiatkowski-tls-ecdhe-mlkem-03"/>
        </reference>
        <reference anchor="I-D.connolly-tls-mlkem-key-agreement">
          <front>
            <title>ML-KEM Post-Quantum Key Agreement for TLS 1.3</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <date day="6" month="November" year="2024"/>
            <abstract>
              <t>   This memo defines ML-KEM-512, ML-KEM-768, and ML-KEM-1024 as a
   standalone NamedGroups for use in TLS 1.3 to achieve post-quantum key
   agreement.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-connolly-tls-mlkem-key-agreement-05"/>
        </reference>
        <reference anchor="I-D.ietf-tls-key-share-prediction">
          <front>
            <title>TLS Key Share Prediction</title>
            <author fullname="David Benjamin" initials="D." surname="Benjamin">
              <organization>Google LLC</organization>
            </author>
            <date day="10" month="September" year="2024"/>
            <abstract>
              <t>   This document defines a mechanism for servers to communicate key
   share preferences in DNS.  Clients may use this information to reduce
   TLS handshake round-trips.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-key-share-prediction-01"/>
        </reference>
        <reference anchor="RFC8772">
          <front>
            <title>The China Mobile, Huawei, and ZTE Broadband Network Gateway (BNG) Simple Control and User Plane Separation Protocol (S-CUSP)</title>
            <author fullname="S. Hu" initials="S." surname="Hu"/>
            <author fullname="D. Eastlake" initials="D." surname="Eastlake"/>
            <author fullname="F. Qin" initials="F." surname="Qin"/>
            <author fullname="T. Chua" initials="T." surname="Chua"/>
            <author fullname="D. Huang" initials="D." surname="Huang"/>
            <date month="May" year="2020"/>
            <abstract>
              <t>A Broadband Network Gateway (BNG) in a fixed wireline access network is an Ethernet-centric IP edge router and the aggregation point for subscriber traffic. Control and User Plane Separation (CUPS) for such a BNG improves flexibility and scalability but requires various communication between the User Plane (UP) and the Control Plane (CP). China Mobile, Huawei Technologies, and ZTE have developed a simple CUPS control channel protocol to support such communication: the Simple Control and User Plane Separation Protocol (S-CUSP). S-CUSP is defined in this document.</t>
              <t>This document is not an IETF standard and does not have IETF consensus. S-CUSP is presented here to make its specification conveniently available to the Internet community to enable diagnosis and interoperability.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8772"/>
          <seriesInfo name="DOI" value="10.17487/RFC8772"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for ML-DSA</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="2" month="February" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   describes the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-07"/>
        </reference>
        <reference anchor="I-D.tls-westerbaan-mldsa">
          <front>
            <title>Use of ML-DSA in TLS 1.3</title>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Sophie Schmieg" initials="S." surname="Schmieg">
              <organization>Google</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="15" month="November" year="2024"/>
            <abstract>
              <t>   This memo specifies how the post-quantum signature scheme ML-DSA
   (FIPS 204) is used for authentication in TLS 1.3.

About This Document

   This note is to be removed before publishing as an RFC.

   The latest revision of this draft can be found at
   https://bwesterb.github.io/tls-mldsa/draft-tls-westerbaan-mldsa.html.
   Status information for this document may be found at
   https://datatracker.ietf.org/doc/draft-tls-westerbaan-mldsa/.

   Source for this draft and an issue tracker can be found at
   https://github.com/bwesterb/tls-mldsa.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tls-westerbaan-mldsa-00"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="22" month="November" year="2024"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document describes the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-03"/>
        </reference>
        <reference anchor="I-D.reddy-tls-slhdsa">
          <front>
            <title>Use of SLH-DSA in TLS 1.3</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="15" month="November" year="2024"/>
            <abstract>
              <t>   This memo specifies how the post-quantum signature scheme SLH-DSA
   [FIPS205] is used for authentication in TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-tls-slhdsa-00"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA For use in X.509 Public Key Infrastructure and CMS</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSA-PKCS#1v1.5, RSA-PSS, ECDSA, Ed25519,
   and Ed448.  These combinations are tailored to meet security best
   practices and regulatory requirements.  Composite ML-DSA is
   applicable in any application that uses X.509, PKIX, and CMS data
   structures and protocols that accept ML-DSA, but where the operator
   wants extra protection against breaks or catastrophic bugs in ML-DSA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-03"/>
        </reference>
        <reference anchor="I-D.reddy-tls-composite-mldsa">
          <front>
            <title>Use of Composite ML-DSA in TLS 1.3</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="25" month="November" year="2024"/>
            <abstract>
              <t>   This document specifies how the post-quantum signature scheme ML-DSA
   [FIPS204], in combination with traditional algorithms RSA-
   PKCS#1v1.5,RSA-PSS, ECDSA, Ed25519, and Ed448 can be used for
   authentication in TLS 1.3.  The composite ML-DSA approach is
   beneficial in deployments where operators seek additional protection
   against potential breaks or catastrophic bugs in ML-DSA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-01"/>
        </reference>
        <reference anchor="RFC7924">
          <front>
            <title>Transport Layer Security (TLS) Cached Information Extension</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>Transport Layer Security (TLS) handshakes often include fairly static information, such as the server certificate and a list of trusted certification authorities (CAs). This information can be of considerable size, particularly if the server certificate is bundled with a complete certificate chain (i.e., the certificates of intermediate CAs up to the root CA).</t>
              <t>This document defines an extension that allows a TLS client to inform a server of cached information, thereby enabling the server to omit already available information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7924"/>
          <seriesInfo name="DOI" value="10.17487/RFC7924"/>
        </reference>
        <reference anchor="RFC8879">
          <front>
            <title>TLS Certificate Compression</title>
            <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
            <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
              <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8879"/>
          <seriesInfo name="DOI" value="10.17487/RFC8879"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="SP-800-56C" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf">
          <front>
            <title>Recommendation for Key-Derivation Methods in Key-Establishment Schemes</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="13" month="February" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public-key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-09"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
        <reference anchor="RFC9076">
          <front>
            <title>DNS Privacy Considerations</title>
            <author fullname="T. Wicinski" initials="T." role="editor" surname="Wicinski"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>This document describes the privacy issues associated with the use of the DNS by Internet users. It provides general observations about typical current privacy practices. It is intended to be an analysis of the present situation and does not prescribe solutions. This document obsoletes RFC 7626.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9076"/>
          <seriesInfo name="DOI" value="10.17487/RFC9076"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="I-D.connolly-cfrg-xwing-kem">
          <front>
            <title>X-Wing: general-purpose hybrid post-quantum KEM</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Peter Schwabe" initials="P." surname="Schwabe">
              <organization>MPI-SP &amp; Radboud University</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This memo defines X-Wing, a general-purpose post-quantum/traditional
   hybrid key encapsulation mechanism (PQ/T KEM) built on X25519 and ML-
   KEM-768.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-connolly-cfrg-xwing-kem-06"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="15" month="September" year="2024"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-22"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA61923Ib13L2PZ5iQl9schcAWbJkyawkOzRJbbIkSjRBbWVX
KrVrMLMArHAwA8+BFOxSVR4iN7nLs+RR8iTpr7vXYQagLOf/L2yRwBx69epz
f704mUxGrW0Lc5wcXFdNO/mpS8u2Wyen9XbTVss63ay2yY3JqvXalHna2qps
kkVVJ7dvZ5N52pg8OdlsCpvJVwejdD6vzT0e99Pp77qRfjDLqt4eJ02bj0Z5
lZXpmujK63TRTmqT59tJ16aTzc/ZJN1sJgVd37SjppuvbdPQM9rthi6/PL99
PSq79dzUxyN6rzkeZfR8UzZdc5y0dWdGRN13o7Q2KVEZ05CkZU4kp8Xk1q5N
ckJXHIweqvpuWVfdhi6m1x+M7syWPsuPR8kkoTXin7N3M/zz0cxvbvmDi+s3
5/j3fPbuUq57cptcbOe1pZXdm7IjqpKk99gkEfoPPtILbblM/oxv8fk6tYVc
9U/WtItpVS/xcVpnK/p41bab5vjJE1yFj+y9mbrLnuCDJ/O6emjME7r/ycFo
NGpaWubf0qIq6W1b04w29jj5l7bKxklT1W1tFg39tF3rD21ts3acyD629Alt
zJr4TyT+62iUdu2qqsELoihJFl1RyK7d2rpbp4VpHtKaeEqbxxcQUWlpf2F+
Hyfvqjub8ueZbWnjf0zLJRFWG/6sNku+6k1al2mb3umVVVe2kJLLMtebjXLo
rirz1tb/tMTvU6L4wNFlS9r7i2ly22SramFKu+SPhdSLtCxNM/zOyfHF5Meb
2R7aP5TE6bohupNqIaJMIj3LrCkzetqPVVlOblbGlpOZNcs+6X829TottzHx
QsQ0EEGr+DQtTUs7VlZ0eUuvOx6NbLkIvyXJ7Hry6ttvJy++Pz3mpyVOmfua
x4r3xmwnZ6a29/LRlaGtyxviDX9zTnIxL2yzwjbTOlZmbZoDfWhaL017nDhZ
K++LTTdvpqVt2umyun+CH/DJk9nGZDYtrru516on7y5nt9PZ9VQJrZ9NN/lC
Hsz6mSzSojGjCZki/I84T0KXZrRytkg/q0XKYou0qU0DcUxK85Bkq7QoTLk0
YmDSSKXHCbEg6RraqTGrd7NtWrNO0nxtQXSdtlXdkGCsbAPJ7nj1K7tcFfQf
Pb9dmaQr7c+dwWtAFnGwaW3WYNvTofWoFgt6VTIny0Q00tU2U6rselMYPB26
rWsiq5bmWyIvXRq6vFpYUhhsSO+57SptsQRYTn4JWaCk6TYb0lY8jG4k7a2K
hj7MVknawB5NhZdrm+eFGY2+IXVp6yrvMjxzNLqlZd3bxs4LQ+zPDBaDpdJV
piapA4PzinhEdBZbaP+Glk3EESfveU3VxhDz8H6SpTTJSPzLdoKvTc22ybYm
a7vajJOHlamNv4ZNCbEU9r5JHmxLJPdW7N4xTT6uTEkr379IcOPp9Lvk11//
dPP69NXz599//jxOzvof//D0+Ut8TBsQnjDvbNGCbFoxsXVBaukc1KGZLqfj
5KcPl6fuCd9++/Tz56OxUi/bLMtsEuIB1DExG6hLnRbJhiV/gi0yn0hiIJVj
T/N5UdgNyURy2tEDkjO7WFgzuTBFQfYgOTw/PbugN7VVkkNPwbOGhM7ghVlN
u8KiAFdWi1SRcdXvsu00Oclzi2WQNmzHWNw2uU8LCyVLTEoUVPRZ/QeSsBxy
2FoD4SI3s1wl/zx98e0PSWZIpBayNaQ6ziRgA+gt9NZo8+hFUxEkLH0Js8cq
EYcOdB3RQva/MPckSYmPLkieOpK05PD05qfTo+Sh6oqcDH5J607oPTXkJGJl
WlBkQJKyhnYoJaxu86YqTGtUgS00L0uhKxBmMpO0LUQpUUHcb7r1Rna5w3vI
g5VYmAhBeAPk1RKzlIxiK0rNRiGhdZiCVZ+pIOs/VuLLKiGXusSFFf1qWbrU
TnnO0GKntHhaAhkUPJu3iRZjIVdJBza2ZNNox0kIug1vXRBcLJkcQJ2S4epY
uUR/No/YSRK0w2vwN6wOnOqvl5TVkLw1dlnKa2u4pNJteLqkX8iazUl4eAFC
RlYQQ5mxme6lPJoirNRJ4YAUsiBrC8fV0Ct+7mwN7tdmU5D9YbPLhNgm6xpE
h0QCaeDl5IzDGQr7Orvh4I8svSUW1Q0UG7SA0XAyCMeSGcIbUgt11OAemasm
WaUwXgXZJHp2tHqnmldvJ2/Or8bJ7O3F5Gx2Ik+mD+lnfJ3Rr6xJYs0XHXM/
J+qrLRNvy7BRpBcX5CToFZnXRbog72jftkJJl4EqxEtbsKxsmGdE2ty0D4bM
3pB3+uhgS7rNEqwmHsLkcSzivBCRRRZBrXMBnaoQ4ahxm83e3j87Une4sgu+
bFFX6+SG1koCMLBSvVSAbNTpkVMR8ml1dS/miZWBn0n2qsuMuin7C0U1yUX1
QIpTCyPCcvEy7Jn35sHTqkMfs9SktSU25fQN3YBHLKqiqB6IboqIKIx4SrbP
7WhylbZMyzG5D/KnIhng+YK8WUH05DCrZExJJfHyWPPZtKpRIMEmA5C1JaRH
jL4ukm703lz9hugMiQldgE2fJucU5osVIuX0yuSpJIW/74qSfAZcsB0+MVkU
6QOMnThtE15ObvgOAkbLfjZF5Ma0zUh7UxbJGTh+TFwot4PlqdbRs+hitvJs
3QoEdzXvFq/SP4n3zltDMk9kepB0ETPLnPzSHZmmNLsjTvKVYp3W9BEsWIu8
yfnHtIQ3f016Yz6lWOdY1U1tPF4udoiyOeQnrWW/oaSR1ysT+Ea57rAxFAsx
3158lZU4mhJX1kiPoIvxK6HKqvA9fSdK1lCzmACKljlYqJPrZy++j6n4/uup
6PFWotWwP4Ullj5CDoXIVYJElnw3ZMYzB+aXQwSoRmR7K/V1/NDz/NmLF09/
QBhEfJydTLCEMfwGhH0QP+Mt9CQLa2TKe1tXJad+zn5cVrdH6ooo8Ej5EUEk
WkqdOYaFv+Qkvcy2eHFRNc3WSYZK8HfT5DqISHJL9JvJ+8WiccrbVJSID8TY
fFrZuSWpIxMA0yaBKNb6GC9iFecYqIFBvSdWJg0SFtIFyggQoVAg3oikwumB
KC+qqj3EURiE0+sPIhb/zJztuQtNAhbkpom+oFBkASW4YtPHfIop1k2iRxUk
awjKLDE93E6xga7UOzWyIsIFYucJKXwcRbOZJYfL5p3ehSSDIheE50hDyRfR
a9124EmbqjVO8yLbRJQhjyFHgCAaXh+BaduS6lO4tQXjaLVkounpYNFmQ8/l
sISjBYkKcrOsDUdB7sm2gDW7l/sQbnijlLFfpVhQkwsY0Xhh4DRHcMWWA1PO
6HZyuKprCwuv98Vca5gv9gIhOF1yAD4E8otH5FlONilSF2UEAsM6XYIgXfZl
K0rrIhoKQaoH9tWaB4VEYuhOIAIUSwoXaedkW+Kcr5/jwjineV5DJCScjVRa
8icwuuroa5Ot2MliqW1KTOBIC3ZXYlJ4Gn7sFFkjxar3eLuLLM4MeVFWq0Zi
f7gNlMOa5ODqw+z2YCz/Ju/e888355RK3Zyf4efZxcnbt/6HkV4xu3j/4e1Z
+Cncefr+6ur83ZncTJ8mvY9GB1cnfz0QvTt4f317+f7dydsDibtjOYDxpL2c
IwAjdaRQgwPAZkQ7Td56Luv/8fT6v//r6XOy4n9HOd+zp09/+PxZf3n19OVz
+oWS2HKsW08KIr8ixxrRXpi05rS9oJg33dg2RaCGMI+2nCwhRfjEzT/+Czjz
r8fJ38+zzdPn/6gfYMG9Dx3Peh8yz3Y/2blZmLjnoz2v8dzsfT7gdJ/ek7/2
fnd8jz78+z9B7ZLJ01d/+scRZKS3GTm5JQhhvbZlVVRLiuogUY+H++1kxWXT
SXTP589iojnB6mryYqaRAkb0rjFZT1g1SgYpyoYIaIGZPO8guO5llxxhwlbl
KPOUpP6c6lBMRTvIHsp5FR9yHicntPfNdr02qJY+9vREqt5VyZII370gwwqC
WI/HCasWhRjWUAIJswFZJb+5TL3zogjKBecZB+d7LiPTU2oAS+/5xIEumR0I
r4u/JB2NXWRcsOiHqV9Xs9CEgKxEwQEvPavoYC0L2FzZX7izUClZVzk519qQ
r1QH+JsFknN/M7/2/AhalfT6Fr97U2KDPzfDrNeZd06POAV2afajSfDJgMu9
5PxxNmPDrijWL8zkLb3VkhdEcH9ekkFpusLVbHGrbdbJoUQlwgHpLMRr/+jk
d9nZZuWTyl5ZahDuBy3gpGrinspU6D3E1P4S1p4gLk0RG+bsdCmqYJ5Q3gm1
Dwo2QSq6PzhT42r6HPNfSyBBPq4r2AX2K2MuAXP713A1Bv8SWQVFqS0/Wsuc
gbT9GxISuq6c19WdKafCk6iRQ8K5hKUPUT24swZ1k0i89KIoreLSupDA9mDB
3CLVXld1TNq+rfHF1HhR0LpHmMY83b14L/9piWc71EYs2RTpFlVcTXGTukLm
Wu4tHZ6G32AzywZRLhKBmShb73tEwi1pDN33vmTvEX89o6CIApdrrYAkh+9P
Z9dHCd3RGm1J0WZRpAZlxYNYUwyiew7fmQMUG3PgvyuwFArbeYe6jl80ORGp
AqQcroXchtOC2Kyme8uioXAK+jiOwhp5ZdwBDQWQX79p9ZvPEk+5X6WOU9t7
jt6rVrs2ErGGCgrXKqpBjNvrlOSWq5fOAuRpm2IFC6kBp4Wr2vAXaOfhY12H
JnyBMUeqhLa5w/IPLlKy0iRY76qHMcWG/OKEzJepD5LDi3dnb4+8Bc1JoUq0
m8gg5xYbm2auBuQC7X3EsWsppKALx0ybBlfRJ1RzgCh14iRN6qnjkLppyXxC
kULJTVaS6dIxEcXJJQjT4p6rtJAJxrpIajfptqhSWoTPrUyu8bUIOUXntPwt
8Xvm6jWHJEJHHIX2c6pcuAXq7YI7IMwourWfREnVOGF/RCzjtE+rYD0tDp4u
LnA414vLIcsDc+eTDF+X00VlllxtDTGf8n3Dele73WhtH8X2vpvW7n7vVWL0
EJr011rNW1kY2z2U8l1pzuxwfYyCQ9Hlrj4HuujibqO9jozr8PQjmdE2ok45
GLoqUpiHRhlf9tLt4O8ghtrakOojnk22pJY+6l4VUg/+RY1oMlMiDQsdsTXd
nHFexpGg7EXTETczThFJZquuRrsN1WQk2J4rTEVb5WSTgzRxzCu7LUJMISPy
aWXBHE1hOP57gAVIEDVpXpvU9RnNvTMS4VXyFsuulFW/K1m9nNVp0oVJuJdq
lsjmIexeYEwuNuPBljnlv8MKwP/8+3+AWkNGSooMvtBZ2IWBNXQ+u790ug9Z
b83SxdEZ3VjBwAg30hxuaKeOABwIehBaxnW7zSKA9Jw1woZw4j4tuohRg8Zw
sGWuZcMJTmSOG8vlzEH0SfyWFh7dId08fjHnOEPJIkF87YSub/XGLshnyeRK
Pj/R13EGRQrUpPYUaJCxslEifszJvrJd7JmWvq31HpS0eca9CP900UDaevqF
bkVWQhJBm8gdSG05Etlkpfgt95b23GVdtJASMiDGmIs++uD/+ff/hP9AT5jL
cuTk3OYhkypz8J4hCuMoPkTC4SnhupF4oqmWFlvtGJZVizAx8kvOz9CnX9Rn
feA4Fpg0rq6LtrBerTv00Iwr08Cs1ZXU1QrsMaVsUhZ6oiWhKJ5Sg7pv9722
qHo5N4/vonqhciuEdWokojjrLyhObl2hUOq7JE+9muV8K7bTEH15aJT0gyQb
e4dmRS5x0P/Zq+E7cXIDld0XWsZOABV52zQd+mZbCkhpK8OSQPEJ45Ok1X14
etIgU01rshq0tKyg22uyynVHArOdJjd8/0nvfVxbW6VkmLiVDrJJpiyAM0T1
s2+TrUlJ8jV6d8HKgBKT3Jj7Skl6SyYBxNy8bY7oGSS/ruPKb5CSJD9Wqubo
KU9J9EiVUnbNlPWIfkfNQHoah9Zcf4zJp0cgXoZebNB3FvFE0b/HVJEV7Biv
lbeNeON2CJgJSkhaWxSuWccphzM0/aKuyCIJtSjaXn8J0MnQiELm8PRGNpd1
8LeiTK+DoaWsXfSed2K7zFqzL86VClKqzBYzHFRXlk22CZS1KhQ1V5Vc+DhN
fkRtwDl4RRg0GRI6WSNCw1SBAF8I3/f7Cw1vcSlWs+wA+/B+61H7zCXJfmJI
m8T5yBluPh3sya/f+F2ibIQvsaWjlmKVre8gasDukGWsA2O64s6ZhCAaPXCI
4gdCDqneS91rj8epuLQkfaAXs4ff39KJrEuHhyGgZH2vSWFqHy3G3dteQ2m3
+E66WtwLOGGJyktV+5VrwulQByQvFS7MAQupNtJ4WMjupUTmlvYz+Tcy/TCt
abTxWMGGPcBKg8EHCp4nPnGER9u7Wg6uOKrn6B3tQMbASRvdASzQDoq7GmTg
CvsLKD08O4K5ZsHeTUq+RtUSLlr3m/j6VOCuWCI5CorqLb5fH4WJx1Hlql9j
0g97CUSoLMVsoXdh4Y8UccbSiZOdbGzB0EyJcCnlAnm9ChyD3Kq1bRCynjT9
yvTf+cp0WzSuJi21Q8BQOJjwO+oQWnU171zzH6IX+cy1XapvFgyEVLSVieNE
XtAvbfZWydhhDbUdSCAm9e6BTOpd9dDcWabYZPnKTNbFnVl//uxRE9K8vHr7
5vzq5fevjoHLUi4jsvTVTbmsT4BPG6UQOaH7++R+oXo5VfQCJcloRNdPf5MC
f+X/ZyK+EyK+e/VciXj67bPnX6SCL/0yFXjG7yADJWzEZLt3eI3gDMBjjTRV
c8Y4LrU/KjBjJxgIs0kbtywVLA9A2E1S9Gfx8M+fVfCbHc0FsAqw8eRdSi77
zyKBDIgYvtU/DRKpQn3s2PPi6bNxtGG+de5YNxrtsQpQ0BCkbHzbgPvZG2bf
0BA4KKBtXbefdZqU00xsScq7oW2bb9W0eD/R1qZctiuO77jiH/bf2Zs+nM42
XuFRGrRlFyGixl9lb2LL0HMSEmsCT+Z83LVba487cM5z40RCgkgPbYglh2U1
8muVIEgKy8EJSnTsfFnAIncsGbgTNC6rEHsewx1SLH0uLZBGw3UjcBBvCXu4
EtBqUP+gLcZ+lhLOY/Sg5FBuEA0pwo871N8k7ymwW4tzO+UMCmWoijmwV45E
IC9cviJ1Hm3Jc29bGTDMa0CRFhMoUrQNe3ptyWu5K4j9OoDrW+mS/437FcTD
FiWIikKe98E/4uaoZf8FPyGFprRVy8RUY/ORxd6VlAFSNMGFbol5OJVUIhvn
VWItIQGuIuwAGqY+iFLgooNtM8jgUccuTdOeeycHQyaTdIaD49uB4963OSeh
B+WamLIlRW9vNUndIc/JGqvtMFDYs/hIHxmsiB3yKl1YwN+dLHCBBzLFDZ4N
53gdosDabiQ7ktIa6xcSZzT+W8YzURACUZ0kJw5idIyJmA4JkMNHUcqTmXjP
eDkuM0IizdBVRcrXFYV6rnoZ9eIgc1N60akXJZ4K+SMX4AA5c9v2lbxgyaIL
uLgF/5Z+smtS9VupFPPUFQZh2uTw6vbD0bgHIYLxdVK8Z/O037qo06WUCZM0
qysSQs9gARe6/XAXijIo9Ew3x/UjFI4IpJkiUduIUooHCyOI2V6VLDdFuqXX
nD1S0RjH+/KAXFCS6dzVqeLV+f0PVXhpFUcF9cuFQ+m4Xl8jUKGY1bcf5L0z
fm+fdWrtA+/GyaKrWe35kV3p0x7HGlmkw9D+BqOmIjVXPDwyrz45h5BXbGfA
maK3dXv2lyF2G4C0mNycfgFBa8bFsKGZm1V6b9FTY6NTrdeYKOA3DycZ4uDa
N3N8u7QToUiLqF6u9d4IahVEJgIr1ilq7aSdz6Y8UCYdR7GXj7mQYzJTmJJJ
pXg3HppitVgFftInNtET9+oeQ8GQOX0NKCPop6v125rc0Z5NcLL2NZ6Ay5gs
3m5+gh91Q6KxvQE2rGllOkB+TL/aiEju7nkk7YDIaqN6Iav/PabJuoI+qv77
1x5VHWMBAhY8BTzCQz7lYepU2a7DrOtgR8Bgp14qRZ36eFOZ9rjvo+xkUkTU
8f/JK7lXOMDgbzpHkmlKbj40zoKwCM+YddccPcuc4mkYxsqTe5tiduw42Ul4
kSIwIRMMhlku/USZQhr11aWc4SakomEvUGzraAs3ER1uDole72uVzTSCS0ol
VkQThXs3BymREZCMggiz9ZdDBp5OcNbRe/VoayO/Pk1+3MbITrHaRKJW5FeW
q0GDKKSSgFR0KMLKK2aXCyT3lQWIVSJsNBjVCY1Gp7raq5O/ilPgFCZaLauT
65bm4QWNYNyyVRxH/KF5TLQi5rNJ7sEhZ1rcez59Nn0JGVYoJA/ZcciI8Um/
SOdkHnP1c8MJJGUZ7WNePszXNStWO2FR3mkVi+7npKc3M+AjtlloPi541M/c
66SlfwAaQCRzCgvur1JX+KUSD4uCln3ZpZUiEoGKHTmQORhtvITYax+DdHQC
wzRiVFrra+lkNNw4RX/2iwu5HyQTO//EHqlIrmdv5J443O7F2GDQvvLvaKSb
/PLlM1JtnzIj5Az+LphRPMfPy+yt8fdyawYfKpG0PxOFb4F/h0T00UjRDo/6
P29honFKgADFn5iYAWwfsqomX8d2TVGdxs+M8q6RpgBuNx6JxRK46Np+ct1R
3HB4fnpE75gIciDMYVa+TmDKPR1baXxI/BsvnIkrlSsilPwqfQ2LjSlXnIvv
4GBsy66rn3YhS9HCNRdUsdVXEE7JQ0/ZTnzicagPJc+CBAQms49xIuMeidGk
kKCbWBYa7VdAVtEXyrZZYUQRjOCc/pi8BTXEptc6mjqT0dRjhX0MN4nBWplG
oFLUFuvQGBexI5QOhRLVqza0TumZ6N5Q2LgBwq2Hw2pQdhkCZXoyhSiU4X08
yCDzmbSMWZYWrpkV5VLJeTwQq7NqzC9ODAEyi33VnPs+MgSeFhinleF4Dgxl
fGfS0DfxGGGD17tK2o22g0gYzhjIAGvtJmP4vXiNm2SJXJhOBHsUqyvRSE+t
UbyMtqRxEIV0ij2YycPa4PbDDoewRnA8yYNJ79xeYvtYRl01QqZmIzBLGBIU
sujF87przYS4l/mREqAQiVNW4gXa8kjCh2KK5bOfY5ynOkVOEuttFJEQt+E7
opZFKFOMlX+8bM/B0dCURQ2vB1F5LhA7S/GIfLGFPum150ajEwdRU/QFe7s4
cXZYHhZoATk5behDBAaNPw8vH/avsRtcHIz1ptft6PXnBcLKDWgXs/i6IgAr
TgnG+qKtVHDNes4DRQ/a/T5pwlxnHxXhK10sRsIGaRMm9FJaok7cYQ6Q8uaU
E1zNufUsgPUGo4sww4r33YsH1Ah+bhgFaTNaWEB/7NTW9qANMNFRPah+czPX
KnTXhf2DQX8O40KoSAygK9UYaWADEAhiG5MrxqwP3hy2pjmJhjNV7JZvnWJq
x/ebFVBW7kB+oJeNDyAERLMfBoR6DOA/X8L+hAnn/jTnAMGYG5nW0PJMjLVT
0OwQ4kLLW1TshDHft7F1wLhs98CKQoA79nUmPuRDqkokQvcu3XCwIp5gqmNE
kjs0oAcSQoVIGu1GBqa81fLGMwBQulLOv+GhYg6BMI5RVA0j73jeKDMbh8Dp
+yadJbrnjoY7liQo5e+SjUG/cXCZS63ANC3cG8vFolQ7J3H7Jt4URqIw5F3T
1OhLqe/2bhX9ieEnAprXscj4i2OZJNvtrhbAgU9y+N6VpYXH2iiNVuiVq1AM
BiZ2EPnRWPihUHE0da9DkP9gMKI5T9Nysi7yJqW4l6SvYCQX4IBKuVQP+IAf
Thb7/A0trikv103w/o71fiLGTZpixSQMF+kngsMkhD5BDsXCQty9OtQn1Lsb
bcABx116NWMNK10YfxU4bFQd0aK240XIm555CKXOXHEZ7ZQHG+C/+5aUj0v4
Ag82P08yd+uE3EXDmaark8Lb9qVtODit9O045D1nPdxgAvrN6eybp/dPpy/G
8vtsNpbh6HGYxMW8dP78+auxotSHgVYUFrhYK4ZCWQFgDUb7591SoTmwW4X5
4sYGljgB1baezpP67yPkXGyihCvjABtZBJjBQJA58hLDjTtdIwniwDGPh7ci
mMoGILPYSijYW9G3XIttuIhS6MRbTOExOiOvuaqIRggLXxdgi2oY5bALMigT
zfY2cpBHG89VMMZZsc0cvNPV7910OF6OTEjDekbeCuy1ZmmfxxvRgBWDpmmh
uU38lDkFzgvbDk5U4AqN40W0K3qSggrzIzLK79rbZPaZtxtUCM2PBsfbVJnl
GJ6foPX+gN8KaDN+OEPtQoYfQHgBYOYk+hdTVxMgwAeiPfWN+gi06bLXCHAT
dTMdDM+BsOZb3v5rH4IP+/PH2G6UW8iZ+kNpuIH8NSgeevSNK/dxntjJMHCH
choZFnrEYE36PsldAlP26HnoHyELwiEhMsc+2DpBb/tAqUUbj6TDzd0Dxu6P
FftF+t4U1NGeyUkl/YqPxhSQGAqvxzqDCBBsbQRXQqnpRmWIGJSjpZ46cBnb
CTlkBtMunNYJio10c6Wgaj1VQsEUgxlBf3qQPzYgNIVxx96xMRfSh+NbKCpL
gxpmVQWUngOASi6cuBlFPxjAKGkeR68b33X5aObJ9ZvLhHiqhoJ7TVyc97LW
0TYVEr4bn4x6B5g9TnooNF2d/PX9OPnw/i/j5OLk4xt2DLOfLhFnjDUy3xmq
sE18Ys2cVDdHuMp0UIoXbbK+WJ3pzpqc4Vhzkdezyx2FMPAu0hXTDAvQ1CFI
AquNockDZATFnTEgIDpKwIsHcqWByY+jRroB8dNjAPHxoIIV4VUZa22KTb+E
HhdPXarVfyNCbxnPphedogSeJ5dRyfzcgS6SQ6lxvvzh2fPPn4+OtdXvvxaX
0PgyDm2e7+G5BpFCpDN5TUzGTpU+RepTxTmIFCujHr80vyB8RVw/5kabCwD1
VbkAcv38g2/ayhEfzNUOJxAM96I38RDKIrViEOa0Mw82J5PRSYuEh4i06RUd
CyJ5XOaHoaRvYFvNzzhVjoZBWLVrNkxYMefBZljPcMZaCotVuV0zOBw841at
5LVuVCP1eGG/2dFaEXjW8mi3z69evfwh7LMDRMkOud5VFt3mIhdm/97qvW+r
PMrlMMpECsVFQZ+mSzlTz0iqyi/rEa/YBR2RJVELLScIAfQQH6HUs9bqjpzR
ZgQWzE612cohAxyHgcMiccPTsPxBQN5L8AEXEb/8WuH/eFNOsAzo53B3DqPD
HTiwpe8mqVztdygKcaS91OxswA7f4TIrpwTsH53X7jHTI57TQpJpoKVKx1TX
mr4U9epBPkKc5D1GbbS01Ruv2SEtAMVVrWsjPCV3Liur3LxlTKorwrLXFjIF
HYHhFFgBVPr86J5T534MuqvcMYJdx1R4ETVD3fd0nSjM5RMEeuvSAyVtOIQI
UUEfr2FbzqJ5YDFYDweJaysvQmLSy3zCs2HbvjFtyc0vsBFavIB4QIPDrBUP
WbjzdVwvJRp27Z2kLAUVWNRwAk5q1yCn5218bwAVm9/j1cjAtSgx4pSxfnHO
lm6gwLnP04nYxXwwhiPbMk8LiqE5aNV4RROj3iZN5VRXuBxc+oHLXxpX++nj
0962XmJUqkF7ypSxhKNel7W7wMK8MjIf5/ArePZ+CIsv/QuMBVWRUPr/mw/b
F2nL6Q6teqh6ARUy5rSlq0s52YgIwPgE5ERrfI5MJZ+dMqs26RLO+JQ8R4el
PV4oldM748M7d1as1XKX6vfMbnbn2Kvs2HPiaowDKqqliC03o2V02KbLssLx
wf7gmnHUF+nwtHLJ4SWZGD3riYEe2Lk+x3pDJ2S01nowZa1Zu0yfDIJmbYj5
Jwz23cnD/2Hf/VhYqduLtKeuUTgPgD+n79hHb8DkW62Oa/lthyRt6Yo0FxHm
nvfDi5dRzxdwuTqzqFI2Gl1ym9cNZLUyLgzbqcE+aG/U6rR6Pqef0vWSlhVo
jzCUg+M6hI1jqetLYTggOx7SGpm3clliJfhSCm2KteCvy0Un9b5azg2zigfs
UVlWLghlhQjHQ1eRarjm29wfmaYljkCPnlMVBSVDy8X8CodcrMkhU6Q0aauJ
/rhzCvA3vA3RuRZcjnGdimgUyR/j0QyPhgrnfC7ooyZA+HaPC91/QDaPOBk5
6UjsqJ6ZeC8jQHL+RzhNbc+RqmfvZmN52mNnnew/go20rhQxcIb5myScGoG/
DuAOE+D4eX/FRjUKjwYIysMogRdgaeP9kDJqOLjNHVL9MgBz9BQLKSLzu8a/
dTwFjNQaebc/+I7NnyOYISNEU7+DMe2v8RGGTsD/ycXt7fUsOTyrLo48lujV
cz6w210Cd0oX3LoLXr568cqd8Osv4oO56aqf3FU/PHvxLa4KZSvPOFepMZSu
NcCfbhx8wTXJcOiMCIdz6yJr8byF6a3RP3zPCSBEvwJzv/akj32Henzt6R3/
p6M04iXsO04joNW0j9DrwMVN6uHBGtrwEwsfTkOPOn/xYvoeBIpp5r7xHc7f
xXA/NqNfkWjMsGo33KVwYjbPKjov1u401HqnQQ7Ono6GYfe7jWCQ2Q/FvYl4
2JQImp370+S/+56lXio6IbNwhXiX/QoMMsPBimPJfP1xdBIK+ITao2t78b2A
s2KetN4CxMdUk6HSGm58cH3pBfYQf8lETnsNyi4INoEH+xqw/MmHiU66De6X
3L0/xSPHYMXHr2lBPsL3RZSgcVzPLS2j3k4arptxpACrGFIm4pndgLo/xAj8
Kf9BFjVxIKUkC8Cpop5s6iV2opCkwcFzPdDQo8fz6+FI2m6QnkTjjyMXAvcv
Tplh+4dyCsI3/NkGgSnKnzV4RVYPZgrrUrARl7FyYWUI3MJ5ZV87kdgkh2/O
r3BUwhAWqgc0+hHCbFEvJ59QxZvwXOl0t57m5uJ2ssvH/9qQHFkvLtwV/v04
Q2grqPJwhOeqJ/0z/rSYYAKslo1cYee1HDvL8VscSTDEWAOJ/fIOqB77sH41
wzSl/fxZfKeE++6w2GqOCLZXJ/CHlrjYNtf897Hkcghl9ymNmkn3FxOi4+iB
CX3EJuqpXrHjlb12JGO4DYgwB07iyOkB8DtZDEOgyZKaWhucHrCtFfxQOUvX
ZmeVbDKJiyLuO8ftTvk7p6ss4Izp3ac44ht2W1Zfd2QE3hPPRjIgLgKO9sY2
Htck0hU9ctM2Lm4eR778b6BZDvVUpb7Y3BlSQAbg8ki8+2MO8pck3FlCGVd9
cjmTBtuMYbEgSXsG4YdHqofMRaEhexpZziOK9c3j85w5so9qCXr6OOuKhLTe
0WW9L3sw6988Gd0fjhPw1YYPXuKpMFTQUkA0GcULpnQcFFzvPfAw+iMPffMb
IODSK2MQXGkefI3O7hzDLCfS8+kfunGGU6RGUBGcGsnfGnC5rMDwV+hDVXya
fcP4Hw0E9+EAhiMkO8dAMLRODCqTjCMOzY6pC8sPf7bE8rjENHktJQE5n0Zn
O/tyj6RRhc5NMKtHfaRJjf6h4VM3HzkgwyUAr03OgWDcjbmWuiEe7/5YR3L4
+vJ6BrMa/qAVyQXULhV7doqrLt2f0Di8Pr08igaXQyu656mjyq3H4TJDpYfP
58sXnSDN/FERe1Tkq47F2O+wokZnNDUYqqKk0+jvVryNQ+wIEt1yuwcmcjs4
bkK6VmkCkESHTtJOzgyfS0rJNIW9ljyBZCVFnVgOjR/89RZ3vDpDWTNUo8lI
CB64Gf16LH9pz+T/cMB/xeuAj7FMyzuWkTNypx/5r4tAFbslaY2kzq4dSoFP
tZFAKcYRqU5WyRWAPe+7snkgM7waJ7OsatvkddGtajjDG4rWyTV2TWG24+Rt
tUxLemqZ/MWg3EopH+3rjySFHz3MS558u6KY+aMleurGvZzUH61HnOqzIP7M
Ue4TYPq9NQ9Y/2j0v3XeQu4ucQAA

-->

</rfc>
