<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rosomakho-tls-ech-keylogfile-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title>SSLKEYLOGFILE Extension for Encrypted Client Hello (ECH)</title>
    <seriesInfo name="Internet-Draft" value="draft-rosomakho-tls-ech-keylogfile-00"/>
    <author initials="Y." surname="Rosomakho" fullname="Yaroslav Rosomakho">
      <organization>Zscaler</organization>
      <address>
        <email>yrosomakho@zscaler.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2024" month="July" day="06"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>encrypted client hello</keyword>
    <keyword>sslkeylog</keyword>
    <abstract>
      <?line 40?>

<t>This document specifies an extension to the SSLKEYLOGFILE format to support the logging of information about Encrypted Client Hello (ECH) related secrets. Two new labels are introduced, namely ECH_SECRET and ECH_CONFIG, which log the Hybrid Public Key Encryption (HPKE)-derived shared secret and the ECHConfig used for the ECH, respectively.</t>
      <t>This extension aims to facilitate debugging of TLS connections employing ECH.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://yaroslavros.github.io/tls-ech-keylog/draft-rosomakho-tls-ech-keylogfile.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-rosomakho-tls-ech-keylogfile/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/yaroslavros/tls-ech-keylog"/>.</t>
    </note>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Debugging protocols with TLS can be difficult due to encrypted communications. Analyzing these messages in diagnostic and debug tools requires inspecting the encrypted content. Various TLS implementations have informally adopted a file format to log the secret values generated by the TLS key schedule, aiding in this analysis.</t>
      <t>In many implementations, the file that the secrets are logged to is specified in an environment variable named "SSLKEYLOGFILE". <xref target="I-D.ietf-tls-keylogfile"/> standardizes this format.  With the introduction of <xref target="I-D.ietf-tls-esni"/> additional secrets are derived during the handshake to encrypt the ClientHello message using Hybrid Public Key Encryption (HPKE) <xref target="RFC9180"/>. This document extends the SSLKEYLOGFILE format to also offer support for the ECH extension to enable debugging of ECH-enabled connections. The proposed extension can also be used with all protocols that support ECH, including TLS 1.3 <xref target="RFC8446"/>, DTLS 1.3 <xref target="RFC9147"/> and QUIC <xref target="RFC9000"/><xref target="RFC9001"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="sslkeylogfile-labels-for-ech">
      <name>SSLKEYLOGFILE Labels for ECH</name>
      <t>This document defines two new labels for SSLKEYLOGFILE format: ECH_SECRET and ECH_CONFIG. The client <bcp14>SHOULD</bcp14> log the labels if it offered ECH regardless of server acceptance. The server <bcp14>MAY</bcp14> log the labels only if it successfully decrypted and accepted ECH offered by the client. The 32-byte random value from the Outer ClientHello message is used as the client_random value for these log records. The client <bcp14>MUST NOT</bcp14> log the labels for connections that use the GREASE ECH extension (see Section 6.2 of <xref target="I-D.ietf-tls-esni"/>).</t>
      <section anchor="echsecret">
        <name>ECH_SECRET</name>
        <t>This label corresponds to the KEM shared secret derived during the HPKE key schedule process. Length of the secret is defined by the KEM negotiated for use with ECH.</t>
      </section>
      <section anchor="echconfig">
        <name>ECH_CONFIG</name>
        <t>This label is used to log the ECHConfig used for construction of the ECH extension. Note that the value is logged in hexadecimal representation, similarly to other entries in the SSLKEYLOGFILE.</t>
      </section>
    </section>
    <section anchor="clientrandom-for-other-tls-13-sslkeylogfile-entries">
      <name>Client_random for other TLS 1.3 SSLKEYLOGFILE Entries</name>
      <t>The SSLKEYLOGFILE uses the random value from the ClientHello message as a "connection identifier". This creates ambiguity since the TLS handshake with ECH contains two different random values, one in the Outer ClientHello structure and the second one in the Inner ClientHello.</t>
      <t>The SSLKEYLOGFILE entries corresponding to TLS 1.3 secrets for connections that successfully negotiated ECH <bcp14>MUST</bcp14> use the random from the Inner ClientHello structure. In all other cases the random value from the Outer ClientHello structure <bcp14>MUST</bcp14> be used.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The applicability statement of <xref target="I-D.ietf-tls-keylogfile"/> also applies to this document: if unauthorized entities gain access to the logged secrets then the core guarantees that TLS provides are completely undermined.</t>
      <t>This specification extends the SSLKEYLOGFILE specification <xref target="I-D.ietf-tls-keylogfile"/> and therefore introduces the following threats:</t>
      <ul spacing="normal">
        <li>
          <t>Access to the ECH_SECRET record in the SSLKEYLOGFILE allows the attacker to decrypt the ECH extension and thereby reveal the content of the ClientHello message, including the payload of the Server Name Indication (SNI) extension.</t>
        </li>
        <li>
          <t>Access to the HPKE-established shared secret introduces a potential attack surface against the HPKE library since access to this keying material is not ncessarily available otherwise.</t>
        </li>
      </ul>
      <t>Implementers <bcp14>MUST</bcp14> take measures to prevent unauthorized access to the SSLKEYLOGFILE text file.</t>
      <t>According to SSLKEYLOGFILE specification <xref target="I-D.ietf-tls-keylogfile"/>, this extension is intended for use in systems where TLS only protects test data. While the access this information provides to TLS connections can be useful for diagnosing problems during development, this mechanism <bcp14>MUST NOT</bcp14> be used in a production environment.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-tls-keylogfile">
          <front>
            <title>The SSLKEYLOGFILE Format for TLS</title>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <date day="29" month="April" year="2024"/>
            <abstract>
              <t>   A format that supports the logging information about the secrets used
   in a TLS connection is described.  Recording secrets to a file in
   SSLKEYLOGFILE format allows diagnostic and logging tools that use
   this file to decrypt messages exchanged by TLS endpoints.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-keylogfile-02"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Windy Hill Systems, LLC</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-18"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
      </references>
    </references>
    <?line 112?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank Stephen Farrell, Martin Thomson and Peter Wu for their review comments.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA51Y7XLbuBX9z6dAlT9Jx6LjxLObaLabKLYcayLbqaXUk3Y6
OxAJiRiTAAuAUpSM36XP0ifruQApkbLW2+kfWwSBi/tx7rn3st/vR066XAxY
bzqdfBp9ndx8vBhPRmz0zQllpVZsoQ0bqcRsSidSdpZLoRy7FHmu2fPR2eWL
XpRwJ5babAZMqoWOolQniheQmRq+cH2jrS74fab7Lrd9kWT9e7HJ9XIhc9F/
+TKy1byQlu5ymxKnxqPZBWPPGM+thl5SpaIU+KNc74j1RCqdNpLn9DAefsA/
KNgb384uepGqirkwgyiFRoMo0crCiMoOmDOViFYD9jriRnCyViSVkW7Ti9ba
3C+NrkqszgxXttTGsQnfCMN2u6AyNqaDiPWZ2HojCd7IyBv0xto82BathKqg
AmN/LJqxYHfvDppItWQf6QitF1zmWIfb3kvhFrE2S1rmJsmwnDlX2sHxMe2i
JbkScbPtmBaO50avrTjG+WM6t5Quq+Y4ueGISc5X+HvcjQlty+E861oXtLbH
QUYs9d7B4z+OdZy5Iu9FEa9cpg15EpcxYAbx6X2N2W1ztufXF1WeBxh9re/f
7fAbYCZX8jt3QM6A/d0mPBfGvxHBcZutNu+/h7dxoovm3iD7kislLJvZJNML
oeTygOgvCq41FsFiesGGZYmop2yaIPYJzn7QSvVvMyFVfyrFsq1BkB7vpL9f
Ft9iJVwUKW0KyF8BJBGlze4p6vf7jM+tMzzBxlkmLUNKVQVBzZYikQuJa7li
YpukTjOXCdbN4SCU3tmq9NCjPYjGklAGU7b3QgKf68o9mejMCIJGyqxIjHA2
ZrO1ZkqsgZi5yKGRERDpjE6rRKRH3sP5huHsb9PR2e1oBp1T/3h2c30x/njE
1plMMtLIa3a5mRuZss/VPJcJ+yQ2jTqk3/PLz59GL/qpMPASdMhwW6OKl0sS
IPtMq4VcssriLVFXvXwE7cl35ON8E9du3TmQy8KSpxY8kbl0sJOlYl5tXTWb
TBn4RJEE0AoCXOZ6Qy8hPA4xK2Sa5iKKnrFx7QXaG0XnW0Gl0U4nGr5aI4+C
UMRxjsvkYiGTKncsrQQp0iIZXRSVkomPE7w+VDzffCdxsM0KVghr+RKIkApi
+FJp6+A/8ok3AdLoRiP+VUnjtwVHBAGdixTc4WL2N26krqzXT8JQQdAL17OM
r0QDnBzR5an2hzmjHG9hrolqHaIVzytcvhRKGI+i+ca/pjvAEQwpItIqF0cI
RUq6wRpHMeJkrpUWTh4rUKLa7Ot05AX5613GXevWgElCPC6EThDXJFBKF1AO
qZU0WvnkWsFuPocYQm66VxJ7Mfvx40/j/rknWc9vO257eGDWwePcpPI7zPSa
B1/EjN1RsEkr2cIFoWpfoLBKQhRPUeSwhecdOxrspygcdfAy3IlUuG9Dxr8I
6RuytwYIcoKO/Q9ZBr3e3V6cvT158/LhAWneYSCfM6l9km+odMO+BepcQz2t
XOzyllDe5Z1sw6Z+WE/bWUeqCEqiUlN678RQEvk75yJkvk8v4LOVcR4ajTae
EaRK8spjjUB4Er+u7X5zevrTw8MRO+8uvz05/ZmCg7z665fxWbP68iWctP19
AocRA4CG0AKElKET52IhlQ+qJe4RHvPUUVjWu/oynVE3Q//Z9Y3/fTvCHbej
c/o9vRxOJtsfUb1jennzZXK++7U7eXZzdTW6Pg+Hsco6S1HvavgVb0ir3s3n
2fjmejjpbdNtG2dCnPMeBWqFKQFDSnMbpcImRs5DBn04+/yff5+cEpLhgFcn
J2/hovDw5uTnUzysM6HCbVqBL8IjkLCJeFkKbnweIlIJL8G7ObKZI0szvVbo
q4yAN//8D/LMPwfsl3lSnpz+Wi+QwZ3FxmedRe+zxyuPDgcnHlg6cM3Wm531
PU939R1+7Tw3fm8t/vIul0qw/smbd79GBKFuck1CjfXd+NnlfluQEryId7oV
mXYfytHB7xflkGN1Y1t7oKHyWqpE5+BCegt/FLVlCebLwTOUvVYY9EuMJ4ko
QYqJCDLrZbhiX6AHRpBqK5yylpq/DaxqShPpGOTVNza311Uk6Bvuef2qP9+g
fqPhTnURCg9bGPyknTcVwHyQHuFPzx3ctkT+1pUSSMz6mgKrE0rgjscaYO6b
SCfb/YNnI1zn93y8HQ2noz1qfG6FoCnB8/JP8avfrxcviHGetUJao8NfjVsN
tT7ac3ZoEz+NrvYaqAOlhSpBpzITl1JsYjYRagl+hUKtAk9w9CjcBoWuUZgM
nfQFn1xAFntuDl1TrXVAXkfrJhitRuJAc0cTHka7bT19VGBidq1dqy0IYaRb
Qk8giWS+cQBNop1BREFztmksjpiVBc1WgCL00BBgUK6ckaHZelQBA/N3cENa
hoNNMdmbs4O4UBO6r2BlQOJhIB+CMKDLWW+HMyZpbKZ2x/TqOo5Y0XzHeDGX
y4pmGnQFidj2YruOoomT7wu5VIFdqFFF5gHqbbXA2lqJximPcyxEqUJJaVp1
oEb7mrA9NYbWnVPxIa80/t/B2gNWb/3bdEwHM65DLy1skpk+dZuUbMLXePuR
cjuTYrz0FSzEOeFPx+0p53gV6h7Gg6n5SkD9hEUwDW+1EJwm0YTPaWDZUP/p
fFN8iCg6narvlPxhUVNCq5QMiIgrFYZ09LIpeRyNC/XunEq1d2DDJHUaNT7H
UogloiPYsuJwgROidj5FCByygh2hocVkg0be0ZBYKRhXEHs0s1ndqIex54mu
s7vvacMD9oxY6PaoGqQuNGKxDuxHOWIxivfZsGNuq2oG8j9IAwQGvQ5SuXM8
uUfAIaEuZwfa4K1iYE4jVgJUFLzoB7KG2Q5kfLuJpS0lh7k8bU5MQ8m9xjgD
kKaNk55Pr8cvWiT52FAif1QXhxZc2uzRvN1yHWelJiUldA7GIskMxmjYToCx
bldNcjk33DSM00YS4o1IkRXoTgR93iOSVtox+sRiMZfRqLmiL100LPhMW0tL
3eG4GQaFsSGBHLFXITj0CAAvyafwYwfWXSB3A+jgGz9QQj4cg0DXJPP/Qu8o
2LiLuLS+rQbqd4URWLIbiyS21CWbwMe+N6IpBjwGbRETlnLHY3aXhYF358jM
C9190tnmWs2ObTasPzvgWnCh16D+dFB/poCXoUbdDqRwX65LcnJtSCESFApp
i13D04xexBEkoRlzWwO2p7Tx8Hp4gM7a3WzGKfZhJ69Hv/CJZQ58kZBhcq/0
GuPhkg7Y6McgfPoV6V96C/Cb6D1E0R1qmK7yFLgLAzJYSN2zqRMl8dQFRwXJ
8yN2xY2D1rNMF7ZOxs+CSPquajo+aSgvJTpr+hpDV8bRfwGkF8zHPRcAAA==

-->

</rfc>
