<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rosenberg-mimi-taxonomy-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.1 -->
  <front>
    <title abbrev="MIMI Taxonomy">A Taxonomy for More Messaging Interop (MIMI)</title>
    <seriesInfo name="Internet-Draft" value="draft-rosenberg-mimi-taxonomy-00"/>
    <author initials="J." surname="Rosenberg" fullname="Jonathan Rosenberg">
      <organization>Five9</organization>
      <address>
        <email>jdrosen@jdrosen.net</email>
      </address>
    </author>
    <date year="2022" month="October" day="23"/>
    <area>Applications</area>
    <workgroup>Mimi</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document introduces a taxonomy and use cases for More Messaging Interop (mimi). This taxonomy includes how users initiate messaging, how recipients receive initial messages, and so on.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="problems">
      <name>Introduction</name>
      <t>The More Instant Messaging Interoperability (MIMI) working group will specify the minimal set of mechanisms required to make modern Internet messaging applications interoperable. Over time, messaging applications have achieved widespread use, their feature sets have broadened, and their adoption of end-to-end encryption (E2EE) has grown, but the lack of interoperability between these services continues to create a suboptimal user experience. The standards produced by the MIMI working group will allow for E2EE messaging applications for both consumer and enterprise to interoperate without undermining the security guarantees that they provide.</t>
      <t>There are many decisions that need to be made about how such interoperability will be provided. These include how users initiating communications will find and/or identify users they wish to communicate with, how recipients will receive initial communications, whether the communications services envisioned by MIMI are bilateral or multilateral, and so on. This document provides a taxonomy and outlines the solution space of decisions that will need to be taken. It is meant as an informative document to aid in discussions and decision making.</t>
    </section>
    <section anchor="initiator-knowledge">
      <name>Initiator Knowledge</name>
      <t>In the most basic case for mimi, there is one user (the initiator) that wishes to send a message to another user (the recipient). This can be a basic 1-1 messaging session, or it can be that the initiator is part of a group chat, and wishes to add the recipient to the group chat.</t>
      <t>Initiating communications requires the initiator to know something about the recipient, which is used to target the communications to that recipient. There are a finite set of things that the initiator is required to know in order to initiate communications, and this forms one dimension of taxonomization for mimi - initiator knowledge.</t>
      <ul spacing="normal">
        <li>Unique, Service Independent Identifier (SII): In this case, the initiator has an identifier for the recipient, but that identifier is independent of any specific communications service. There are two specific identifiers in this case - a mobile phone number, or an email address. For this use case to function, the recipient must be using a communications service that links users to this SII. This would be the case for communications services which require users to verify their mobile numbers or email addresses during the sign up process, even if those services don't actually use them for communications.</li>
        <li>Unique, Service Specific Identifier (SSI): In this case, the intitiator has two linked pieces of knowledge - they know the communications service used by the recipient, and they also know an identifier for the recipient on that service. In some services, the identifier is not globally unique across services. Examples of this case are Wire, Twitter and Skype, where user handles are flat - @jdrosen2 on Twitter, for example. In some services, the identifier is globally unique, and corresponds to the email address or mobile phone number for the recipient. Examples of this case are WhatsApp, iMessage, and Facetime.</li>
        <li>Non-Unique, Personally Identifying Information (PII): In this case, the initiator doesnt have a specific identity for the recipient, but they know something about them and use that information to perform a search. Typically this would be the first name and/or last name of the recipient. The search would provide a list of possible matches, along with additional information, such as display names and avatars, which help the initiator find the specific person to which communications is desired.</li>
      </ul>
      <t>Mimi support for these different use cases comes with different pros and cons.</t>
      <t>The SSI case has the benefit that it enables interop with communications services, such as Wire, that dont retain email address or mobile phone numbers for users. However, it has a drawback that is requires the user to know, in advance, what communications service the recipient is using. In cases where the identifier is a phone number or email address, it is unlikely that the initiator will know this information. A common use case is for the initiator to be on their mobile phone, using their mobile phone's native messaging function - iMessage on iPhone, Android Messages on Android - and wish to send a message to another user. In this case, today this use cases requires the initiator to only know the mobile number of the recipient. In other words, today's native mobile messaging experiences are SII based. If we want the mimi solution to work seamlessly with the user experiences mobile users already have, then SII is required.</t>
      <t>The PII solution has the obvious benefit of enabling user's to find each other with limited information, without requiring knowledge of an identifier. However, inter-domain search is fraught with privacy and security problems.</t>
      <t>It is helpful to understand which of these modes are used in some of the more popular consumer messaging applications:</t>
      <artwork><![CDATA[
Service                 Initiator Knowledge

iMessage                SII (mobile number, email)
RCS/SMS                 SII (mobile number)
WhatsApp                SII (mobile number)
Facebook Messenger      PII (Facebook graph search)
Twitter DM              SSI (twitter handle)
KaokaoTalk              SSI (KaokaoTalk) and SII (mobile number)

]]></artwork>
    </section>
    <section anchor="recipient-approval">
      <name>Recipient Approval</name>
      <t>Another aspect of the solution considers the experience of the recipient. Does the recipient need to approve the communications, or do they just receive it?</t>
      <t>The solution space for this is finite:</t>
      <ul spacing="normal">
        <li>No Approvals: The recipient doesnt need to approve anything. For a 1-1 message, the message will show up. For group communications, the recipient would be added to the group.</li>
        <li>Approval, no User Content: The recipient needs to approve the initiator communications. To reduce the likelihood of becoming a spam vector, no user generated content is shown to the recipient. For 1-1 messages, the recipient would see something like, "Alice Alexander wishes to send you a message, do you approve?". For group messages, the recipient would see something like, "Alice Alexander wishes to add you to group chat. Do you approve?". Only after approving, the recipient receives the message, or is added to the group. Note that group names count as user generated content, so when approving group addition, the user would not be shown the group name.</li>
        <li>Approval, with User Content: The recipient needs to approve the initiator communications, but to help them make a decision, initiator-generated content is shared. This would include some or all of the message content for a 1-1 message, and for addition to a group chat, would contain the name of the group.</li>
      </ul>
      <t>The choice for recipient approval is somewhat intertwined with the question on identity conveyance, as discussed in the next section.</t>
    </section>
    <section anchor="identity-conveyance">
      <name>Identity Conveyance</name>
      <t>When the recipient receives the message or group chat addition from the initiatior, they will see some information about the identity of the initiator. There are many options for what can be done:</t>
      <ul spacing="normal">
        <li>SII Only: In this case, the only thing seen by the recipient is the SII - the mobile number or email address. Whether the recipient can trust this information is a separate matter, and is yet another dimension of the solution. Independently of trust, using SII as an identifier means that the identifier can be matched against the recipient address book, and use any matches to render a trusted display name.</li>
        <li>SSI Only: In this case, the recipient sees the name of the service provider of the initiatior, along with their handle within that service. This identity will not generally be matchable against the local address book of the recipient.</li>
        <li>SSI (or SII) with Display Name: In this case, the recipient sees the identifier of the sender, but also sees a display name that is provided by the originating provider. This assumes that the originating provider can be trusted to ascertain and provide this display name. If the display name is entered by the user and never verified, it doesnt count as a display name and instead is considered user generated content per the "recipient approval" dimension described above.</li>
      </ul>
      <t>Identity conveyance is intertwined with the question of recipient approval. If the system is based on Approval, no User Content - the safest choice to reduce spam - then the only way in which the recipient can make a decision is based on the identity of the sender. If there is no useful information about the sender, it is difficult for the recipient to make a decision. SSI Only provides the least information. SII is a significant improvement, largely due to the possible match against the address book. SII with display name is better still, but depends on the ability of the display name to be trusted.</t>
    </section>
    <section anchor="federation-model">
      <name>Federation Model</name>
      <t>The mimi solution can be built on one of several federation models:</t>
      <ul spacing="normal">
        <li>Open: In the open model, service provider interconnection is open. Any provider can communicate with any other provider. No prior arrangements are needed, and mimi facilitates any discovery or bootstrapping needed. This is how email works today.</li>
        <li>Bilateral: On the opposite end of the spectrum is bilateral communications. In this model, each provider makes an independent decision about which other providers it interconnects with. A new provider must approach each and every other provider, requesting interconnection. The overall interconnection is the union of the bilateral arrangements.</li>
        <li>Multilateral: Halfway between the extremes of bilateral and open, is multilateral. In this model, there is some kind of forum the providers can elect to join, or not join. The forum imposes community defined standards for entry - perhaps on size of user base, adherance to spam standards, and so on. Once a provider is a member of the forum, they can interconnect with any other member. This is how the telephone network works today.</li>
      </ul>
    </section>
    <section anchor="sii-type">
      <name>SII Type</name>
      <t>There are only two SII types - email addresses and phone numbers. The choice about whether to support one, the other, or both, has many considerations.</t>
      <t>Phone numbers have the property that they are finite, whereas email addresses are infinite in supply. This is relevant when considering spam. When an identifier space is finite, it is much easier to introduce blacklists for blocking communications. When the identifier space is infinite, bad actors can mint new addresses, bypassing blacklists. Whitelist-based systems are unaffected by this.</t>
      <t>Email addresses contain user-identifying information within their structure. An email address like "joesmith23@aol.com" indicates that this user might be named Joe Smith. When recipient approval is without user content, and there is no display name in the identity conveyance, the only information present is the SII itself. If the SII is not matched to the address book, the email address can provide some clue about who the user is. Phone numbers, on the other hand, do not provide any such information. This is a dual-edged sword. While it may help users in making decisions on whether to approve communications, it can also be used as a source of spam. Consider a malicious initiator that knows that the recipient has a friend named "Joe Smith". The malicious initiator could mint email addresses like "joesmith4@gmail.com", and attempt communications. If rejected, they can try again with yet another email address - "joesmith87@gmail.com", and try again.</t>
      <t>Phone numbers have the property that they are not free to obtain. Email addresses are free to obtain. Identifiers which cost money, increase the expense required to use them as a source of spam. This argues in favor of mobile numbers. Of course, these costs continue to decline, but they remain non-zero. The finite supply of numbers also means that they are unlikely to ever go to zero.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="I-D.ietf-mls-architecture" target="https://www.ietf.org/archive/id/draft-ietf-mls-architecture-09.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-mls-architecture.xml">
        <front>
          <title>The Messaging Layer Security (MLS) Architecture</title>
          <author fullname="Benjamin Beurdouche" surname="Benjamin Beurdouche">
            <organization>Inria &amp; Mozilla</organization>
          </author>
          <author fullname="Eric Rescorla" surname="Eric Rescorla">
            <organization>Mozilla</organization>
          </author>
          <author fullname="Emad Omara" surname="Emad Omara">
            <organization>Google</organization>
          </author>
          <author fullname="Srinivas Inguva" surname="Srinivas Inguva">
            <organization>Twitter</organization>
          </author>
          <author fullname="Albert Kwon" surname="Albert Kwon">
            <organization>MIT</organization>
          </author>
          <author fullname="Alan Duric" surname="Alan Duric">
            <organization>Wire</organization>
          </author>
          <date day="19" month="August" year="2022"/>
          <abstract>
            <t>The Messaging Layer Security (MLS) protocol [I-D.ietf-mls-protocol] specification has the role of defining a Group Key Agreement protocol, including all the cryptographic operations and serialization/deserialization functions necessary for scalable and secure group messaging. The MLS protocol is meant to protect against eavesdropping, tampering, message forgery, and provide further properties such as Forward Secrecy (FS) and Post-Compromise Security (PCS) in the case of past or future device compromises. This document describes a general secure group messaging infrastructure and its security goals. It provides guidance on building a group messaging system and discusses security and privacy tradeoffs offered by multiple security mechanisms that are part of the MLS protocol (e.g., frequency of public encryption key rotation). The document also provides guidance for parts of the infrastructure that are not standardized by the MLS Protocol document and left to the application or the infrastructure architects to design. While the recommendations of this document are not mandatory to follow in order to interoperate at the protocol level, they affect the overall security guarantees that are achieved by a messaging application. This is especially true in case of active adversaries that are able to compromise clients, the delivery service, or the authentication service.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-mls-architecture-09"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA61a244cN5J9b6D/ISE/WFpU9UiaBXbdwGKs1QXTHsg2LA38
uGBlsrqozkzmkJldLi92v33PiSDzVtW2F5jWg6oqmWQwLidOBLndbq+vetfX
9rZ4U3w2v/jWN6di70Px0QdbfLQxmnvX3hd3bW+D74rnH+8+3r24vjK7XbCP
twW/ji9eX1W+bE2D2apg9v02+GjbnQ3328Y1btuncduXLzHU9Bj3+uXr19tX
L7ev/3x9dX31VRF701b/ZWrf4mEfBsufXRfkS+xfv3z5zcvXWD5YA5G7rnal
6Z1v4/XV8R7iYJnrq4fjrQrc2n77jpJcX2HYLWavOF/pK+zpthji1sTS4Y3O
3Rb4+6ooTYufbWFCMKfiudsXpq6Lk40vCijlYOKhONhgKWqxLXpfpk/Rhz7Y
fcxfT41+KzjmlhPwcx51K2tVdm+Guo8YMg7Q99IL2OfQH3y45SP+5f+LwrUY
9N1N8VPW8PRIDfCdb01/wG4ujPABm//gHu0302+2Ma6+Lb5UYrNv0/830OC0
+PVV60MDfT/aJNJPH96+fvXqm/Ttbvvuxtl+v21qaDaUB9fbsh8CR8OK7X72
9vXVdrstzC72wZQ9v38+uFjAgYbGtj022AdfDaWNhSmy4xRwDjFPaSIe/Jaf
0uFe3BQy6fi6a8t6qPDmwR85T4j4yfUOrlg0eY6NPA22dJ2DJJEfLYROQ+s0
0saNiBN94dubvKHGVVUtTnuXNkDvzEr+76+64He1beL/XF/9x+xP9291N3ct
o6A/35UNZudq159SGBZHHx74/D74oSuODq4aOwi+PxU9ZmsgcQOBo+0Lv4fc
JRzCxYZb+sfggq3oeo15wFBfIVzGqJm0UZhZkNEqWZDa3hQ/PNpQ9K6xm6de
OBgozsAT7CNWOzoov0PsihU3FNKFYm8NnYRiphd2wZvKtrZSFeswU/lOlImt
2Lba9n6L//CxDCd98Pz96/fvXzBKqZFjuyl2Qy+aqE35wPfcWpE72x+tbTko
UoLw6OhypW971w5WYrOEwHAQU8RhRxGoUjpPYX/BTPCR0tLRrIKXCVUsOvXd
qtipJQQmL1gL4AJfox9T9KeUyOc73x8oVkR4BNGK5V664CA3hJx2BlGPDrCB
rQ8trEovwIwUI9pyCNz2/WACXMxygwcjOjpR6EcY6CY5YyAKwjNMewJUlS6K
LDK8teo6Oz6uMG7H1Rg2cSgP51qWvWJwWqESdUWb4/E8HClw6ZtmaEclyBx7
h41j83+CRjARjARX1zdlC0cHgKbJxndVGWcxLbOtA3u54qY4HixmDaK6lTSj
p9j2UTSjthY7U2vYONYOmBSSNkD5/H0OGsUS8pJ2zgAPuq1dK6aCCX09iLPH
zpSWPr2yjexsZqAe4Y2l7gCpEQ5GYEF8IDHM8HiSAe8YV+FZUblYDlEnphR5
GeIFzCNeQpQTe2GTf2v9sbbVvV0i2xzh7lqFJR/7YmeiKwXHxb0J14IH0B3k
hD41xJ7zBZcXeZG3GA8ampEIYDIii/StF5tNb49Wz+mAOX7HeFYZXm1fzQIP
eYW73NBurs9jc5BMolDKzgQBVpNCGvDaq30nCU0l+DVJwR/5w/TKTTHT5AXP
T2AdVwJgnoeWIecbuKmAhoThYjU6sWNIRmpEfKI34d72l5xaJMNGx7clThMO
GAYfEnrOJrJkfEIz8/wiQsKhfKhsUKhKKXcdb4r1TgCvUSeokFzamFA/RYX7
VV4Y/QZ8a1r8IbuhOOi/FH9v3T8GpJpPGrDIcJXt4DW0xJ0iiKOnfLq7e0HW
qALQLzerbR1S2EwvUYCVtjXhQCWzYY6wNq1KhwGkaqJmDFxElrnq+6Ofhk8T
c9pJXGgBgeABPMDZA3XXDg14n3gy5BaCR3eEJ8Wb4oPIrm6h78My+6EVvrJZ
uWwzMGIZkuJmT4isGwdUPcSMyV7XgHJT7B39UFcaUXaK/qfAVX03OdM0J1hH
ojigBWnLutnIzS52ilkq5LycAN09+H1HqMX8cDnQEpiU3uzn+b/y7dfASZBX
ZGjJMHy9uSCsBu+5n33K9lo42aennKyfexntTTUifqB/ygOfGR2bdQdzncTV
06lJ4z3xj5mHJkKF1FLHFJy/49UIRDXt6JrYAVFn1FfaxcLlgcPFfe13qkDR
DhSKqmKy703x/hfTdLVucPJk+vzPsPim+Izk3Se+8+nh1FlJyskXoKu24ssc
v0d+hWZy4fKaQqe3N7Ilq0v9MeFXgqvWSh/gUZ1vq5hBfOFqkurPA/Bcob+5
byg6orDdFE75f1r8A7I9mXb2t+99u80+9yMcH+Ue5U3edtKqISV4UuMffxff
Km8jjK2MfY03/elptMu+eCERNWPFpqA4kwgaBEPkd65mWS4CI04d/Jgb6c/Q
Yu8CUIjVbWaAtck/iBrtKnGlWdMsiV1hsdpFQeEOvuhQx4DR9OVB6rnaQ3oS
RtrUUU4wuJnUGyW4iFHQo642J1leCZJ5NEitMWfcg627lYaFvQoMZeV2Yjnq
Ql9ahTLZoY1MpGr26ys2OCBD13lQj2SRyDS53yMsYL6pOsZchFBuZnoMLcTk
zMCuXHYCl9QDBX3www7F197lVNaD5bLgG+s/nfUJ1J50pDEscwBQySt649o/
FDRa9Aji3xR/9UfgNOLY9ZqF2V467ljTqYArjiTgkJjHhknSVI8GVRpNg+FP
Zq855klmJM9lzKhCFXnOwcIsw32dgURsTtfW7sGKa59RJiHtCdCFLowed1O8
EYF9O2VqZUjndBCBIlA9S4si2SYl7vMnXwOntQKYGHAmAaRVCYI4rftRp3rT
AmFRIqRHpGnjb9uR/P4+Ob9Zg5GvzGlJSX6L+vq2nqXABQm4gAZYSldGDV7F
tNhs8/r6pIOpstfsAgLDaoFxeLcvjigqWUdpj4UBmYsyBjKqfCJPg3iJ9UlD
ZfTK+cRpVaU1pmZb5CTwK8jcyqIzLj1GK6B8WjFHrN89Oj/EMXKlSYKg5W64
wteSswSBrEF4JnVQuBpb6G21xLncQtDVOctEQITBzoJgHqEEiG3lGwZ6wl+6
azDD/aHX9brgHk2pte3YkciNsVQMScQQQvdDTcGlkyH9lYSUauOonSs1khAe
l7J78oGGDbXOd0NtwtQ+udxnka7k/05//Jrp3PrvYt17fTUGzOqPpny+cNKN
gsSL66uf3n7606ePn86WOH8HgzM9+EODyRl23j9IrNr2HjuXPzrQ8/HhfTDd
IdkKL2XK9e7jagXkiOd9eqjMC6P/ZvyD8Z9N/XBh9PTwhTK4S0KeqRwaGVEY
O0XaNvWlngJHvkmAYphR+2z0MThocFel7tAs9i4gxDufUGZKAbmJYkQIe4Fr
S21VeeVAX1gkjS2l/i85XFcdm30uvBgWUlHfZkY3bjfeCn+ZREncbC0R6kgh
XFrOmVkrI7G7jL3aGpY2W6eDU/thtZ2lAkb6hUyWege5cZFpaJZ4A75f/J0I
9xaZHi+vd0DR41qbE6Kvi6rPHu+yhartWyZOd/C+ouV2FqO1EIVKG5SDJaYQ
CQRj7wGBbIMKyelTMufm27yFmd2pi5nantBBtHZGbynOpnj2piYyvKlRWRCd
1m2pkx+m7Lehm8gvuv2/PJub4Z+6ODtOXAkf5z2md2fr/8AUavZSX8mvcvix
lCD5c5x7k/bG4kWv+N73ievr2kqPSz9o2/GyfTbshx6Z8kY50uuZhW+mDKo6
YXUJx0xWHdtpXO5m7ZmSdP5pvpmqHj8S/EZPUMzYId1M726f8EUTtAk+1ji5
E665K8ipY05hKYbzBPvzUCe4ys9JXbKXRVNSV+EUxqnC5nXTLKQVs8qDdwmr
JjWZpFHZAuQ8akkH/0FaaOV4J1EdVKVRj2raqX7E4o/2pDxcCyj2lzVli0D2
F7YYSmW9qb2cX347vnyxvcyxPx/0HOd3vLeYwI/yjyrbB9/MDe8IKelQgeCZ
gnBRw04N13GXSaOjB8z7eHKUoodYyuC1HNEWc8Ujb3Vd5kkG56V6XXivIkHk
wdW6wUPj8AfOsb3EjcO6E/jz7JRjmoZSyZH7WUWiJU+0nZGzJvwoPRb6IJ6c
bD/S/GXzdpYKb+Zt2FqVxrVyoULhz7qtPLuY95unJ0mDWsaj5LiHj8dVI3ys
N8l5NmNbghZJ5T+DJlgBU6PiYK55mZ9zHrnNU+aZ1os2+d080HKtmZoRYeUu
4nOzJoQWbEq25Be37sQJhIzOp2c/bLwJ7LCPkvXC+n2hmdqXpl5o5QIrmjb8
HI7DHrkK9i6p5Xu5a/CH1DCz16gMKlvxVJqRMtYsdD4W+PnoMDu8Dw4EXs9L
sjaTOkwky5+5yqWx48lOMjQRM5aAMuIjvSP3i2RnSze4U/kXcrqoB7KThJKt
OFPL0kib1o5H2m7kc2NeXG1aYgmG4kG5iyONtdVTBKdL8fvsHK2fzcIQlVIZ
3I4xskOeu1mB7ITQembxm8i+v5AZRtXEE4RvOItUzdIjeIopJpiKZo+pc+bp
R/4nFG+rFfEIgEfDyxypFDwHrlVCXshxCa3VE7P0egSpbJLl52XEz96rzR12
2Fw51P2F9nm+YzEJdDNiyHToKzFp2dFcdH9SE8DI0QV7hmw8uEZ4SiPcqeZ5
HmaqBpvJ2LKzuQj7ecDr7KlDuPTlnZU6D7aua41QxeuYVZiP9v2FWEgHzxpZ
OZV/sBWdlkr8iJL9QkmXyceypZLidDe4Wk4i2GnDopFBBQDbT9OyE1DHlEN/
gLQJmTAeX/Tx5hyCxc/h+q1SDzl+7nhk/qY9LeFifatAsoemugmCUMZ1wZGM
hWBQczdy34DpnzQzX2mRPe5NSSViuihTkRLBrOFUyIUP3/NyVNcRtvTdjPd6
gUnzOPtNURtaGa//M182uIWPJQXAJXh4y8IkOz1L5jBolI7XFdaFWMb2pD3p
HY1KoVunuwTT+eYYdRorqV2z0FKUqJnpXfvU7HW29jibn/xDwIXLytpy80V1
tJhyI50qghO0tTKpngZ4cZj6kr0FrtsZUZn0Mbdi1u/H2X2O2+Kvpt4Tj2ZX
iQpQ2WAbPd+ZzUXlQ00buYoxm+RMzSMKCeV8cGo1wMKgHHVSJP3S1mx+IOq+
eKc3F8gB+EV3ru8BNHw6F6CFe97q2Qu6T/eW5KCs7aHdLXPKwXQS8NH9KkEn
2WcnWd5UEFFSBetdYvQ4y+KKyw8cYmbRFqUonvdpRbzEtUtxpslA6zjTN5dx
wDl66CB14WEGtmDP4uL6imj3+dTNSojlVSfl1kcvsNhjYIQa1qfJwg3mJxWq
45S3ss8nSu3HsxrpnUso8smmSFe6NtLAlcIgZ/kUeRTtx8WJiJzMJevDOP10
knDSI1DpJqUTUsx6JnmQ6kVvcbBPCtHq06TLAB0+Mr1IKZ7FkUoD9pVCoV1x
cm1pjZ2snA2bQcI1unzhI93lLHa8iMfzt3SpDST04fzGS1pqxRrHtfIekJfA
jwybPxoHjZNi/jjtGUNOHfgg15jW5vx4n5+3yguUr6Q2cmv2e7heZnIuxf37
lTpzMc2g2LrZueucL4yknUQecD7IfVjmltUxGNs6xbMv4IUNXnn952+Nr2+g
lmfEVkk5I6F1qY/SOLbUd1phVMV3HlVfIzAq6rtcuI9XAznD2H9JlwJG5rOk
AyvSNC/kR0Y233SHHa1KUddHW+9HfphYDWEqV22JuizLtP7sjJ12ztRcwLGs
hyns/MS8abZF/GwydVEkYVUlXTkKMR4O82KOXmGccbAcICBwg6m3bPbDZXiU
JJ5Us92LfZy0JZQvMqaLcrP7efSHCRlys2ndXkq3zqQi2qVTDSkRoh+C9q41
Ht+mCCWgmtqVcv4zOySjt/DQZlYJTT6h56h79sOr5EDPRg96pph2adZSGkkS
aWt8Wbrwv357z+fiw+pgbBQ03fr8VXwi2C8ScbMswCQkxFVTwLyvsPSI7bTm
v//b2aLjNBrE/z9EpWvsg5Uc53e9zLKGAUHe1Zi72R2tfLAPJtNg7RO7g7xR
rFeK5FCijXZxY268bnTR7FrjhvtBzuNBIh+9pNLlRShk3j2NFVJJziNVT9zN
V5u5EFyTN0tnFzmClZO71rfbX23wiT+ki3+SL7hU1p/46LIvc0oYms+6vbC1
4t7zo06pyXj693/GorcbhjIAAA==

-->

</rfc>
