<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.12 -->
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-thomson-ohai-ohttp-00" category="std" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.10.0 -->
  <front>
    <title>Oblivious HTTP</title>
    <seriesInfo name="Internet-Draft" value="draft-thomson-ohai-ohttp-00"/>
    <author initials="M." surname="Thomson" fullname="Martin Thomson">
      <organization>Mozilla</organization>
      <address>
        <email>mt@lowentropy.net</email>
      </address>
    </author>
    <author initials="C.A." surname="Wood" fullname="Christopher A. Wood">
      <organization>Cloudflare</organization>
      <address>
        <email>caw@heapingbits.net</email>
      </address>
    </author>
    <date year="2021" month="October" day="25"/>
    <area>ART</area>
    <workgroup>HTTPBIS</workgroup>
    <abstract>
      <t>This document describes a system for the forwarding of encrypted HTTP messages.
This allows a client to make multiple requests of a server without the server being able
to link those requests to the client or to identify the requests as having come
from the same client.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://github.com/unicorn-wg/oblivious-http"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>The act of making a request using HTTP reveals information about the client
identity to a server. Though the content of requests might reveal information,
that is information under the control of the client. In comparison, the source
address on the connection reveals information that a client has only limited
control over.</t>
      <t>Even where an IP address is not directly attributed to an individual, the use
of an address over time can be used to correlate requests. Servers are able to
use this information to assemble profiles of client behavior, from which they
can make inferences about the people involved. The use of persistent
connections to make multiple requests improves performance, but provides
servers with additional certainty about the identity of clients in a similar
fashion.</t>
      <t>Use of an HTTP proxy can provide a degree of protection against servers
correlating requests. Systems like virtual private networks or the Tor network
<xref target="Dingledine2004" format="default"/>, provide other options for clients.</t>
      <t>Though the overhead imposed by these methods varies, the cost for each request
is significant. Preventing request linkability requires that each request
use a completely new TLS connection to the server. At a minimum,
this requires an additional round trip to the server in addition to that
required by the request. In addition to having high latency, there are
significant secondary costs, both in terms of the number of additional bytes
exchanged and the CPU cost of cryptographic computations.</t>
      <t>This document describes a method of encapsulation for binary HTTP messages
<xref target="BINARY" format="default"/> using Hybrid Public Key Encryption (HPKE;
<xref target="HPKE" format="default"/>). This protects the content of both requests and
responses and enables a deployment architecture that can separate the identity
of a requester from the request.</t>
      <t>Though this scheme requires that servers and proxies explicitly support it,
this design represents a performance improvement over options that perform just
one request in each connection. With limited trust placed in the proxy (see
<xref target="security" format="default"/>), clients are assured that requests are not uniquely attributed to
them or linked to other requests.</t>
    </section>
    <section anchor="conventions-and-definitions" numbered="true" toc="default">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <dl>
        <dt>
Encapsulated Request:  </dt>
        <dd>
          <t>An HTTP request that is encapsulated in an HPKE-encrypted message; see
<xref target="request" format="default"/>.</t>
        </dd>
        <dt>
Encapsulated Response:  </dt>
        <dd>
          <t>An HTTP response that is encapsulated in an HPKE-encrypted message; see
<xref target="response" format="default"/>.</t>
        </dd>
        <dt>
Oblivious Proxy Resource:  </dt>
        <dd>
          <t>An intermediary that forwards requests and responses between clients and a
single oblivious request resource.</t>
        </dd>
        <dt>
Oblivious Request Resource:  </dt>
        <dd>
          <t>A resource that can receive an encapsulated request, extract the contents of
that request, forward it to an oblivious target resource, receive a response,
encapsulate that response, then return that response.</t>
        </dd>
        <dt>
Oblivious Target Resource:  </dt>
        <dd>
          <t>The resource that is the target of an encapsulated request.  This resource
logically handles only regular HTTP requests and responses and so might be
ignorant of the use of oblivious HTTP to reach it.</t>
        </dd>
      </dl>
      <t>This draft includes pseudocode that uses the functions and conventions defined
in <xref target="HPKE" format="default"/>.</t>
      <t>Encoding an integer to a sequence of bytes in network byte order is described
using the function <tt>encode(n, v)</tt>, where <tt>n</tt> is the number of bytes and <tt>v</tt> is
the integer value. The function <tt>len()</tt> returns the length of a sequence of
bytes.</t>
      <t>Formats are described using notation from <xref section="1.3" sectionFormat="of" target="QUIC" format="default"/>.</t>
    </section>
    <section anchor="overview" numbered="true" toc="default">
      <name>Overview</name>
      <t>A client learns the following:</t>
      <ul spacing="normal">
        <li>The identity of an oblivious request resource.  This might include some
information about oblivious target resources that the oblivious request
resource supports.</li>
        <li>The details of an HPKE public key that the oblivious request resource accepts,
including an identifier for that key and the HPKE algorithms that are
used with that key.</li>
        <li>The identity of an oblivious proxy resource that will forward encapsulated
requests and responses to the oblivious request resource.</li>
      </ul>
      <t>This information allows the client to make a request of an oblivious target
resource without that resource having only a limited ability to correlate that
request with the client IP or other requests that the client might make to that
server.</t>
      <figure anchor="fig-overview">
        <name>Overview of Oblivious HTTP</name>
        <artset>
          <artwork type="svg" name="" align="left" alt=""><svg xmlns="http://www.w3.org/2000/svg" class="diagram" version="1.1" height="336" width="528" viewBox="0 0 528 336" text-anchor="middle" font-family="monospace" font-size="13px">
              <g transform="translate(8,16 )">
                <path d="M 0,16 L 0,64 " stroke="black"/>
                <path d="M 40,64 L 40,304 " stroke="black"/>
                <path d="M 80,16 L 80,64 " stroke="black"/>
                <path d="M 144,16 L 144,64 " stroke="black"/>
                <path d="M 184,64 L 184,304 " stroke="black"/>
                <path d="M 232,16 L 232,64 " stroke="black"/>
                <path d="M 296,16 L 296,64 " stroke="black"/>
                <path d="M 336,64 L 336,304 " stroke="black"/>
                <path d="M 384,16 L 384,64 " stroke="black"/>
                <path d="M 424,16 L 424,64 " stroke="black"/>
                <path d="M 464,64 L 464,304 " stroke="black"/>
                <path d="M 512,16 L 512,64 " stroke="black"/>
                <path d="M 0,16 L 80,16 " stroke="black"/>
                <path d="M 144,16 L 232,16 " stroke="black"/>
                <path d="M 296,16 L 384,16 " stroke="black"/>
                <path d="M 424,16 L 512,16 " stroke="black"/>
                <path d="M 0,64 L 80,64 " stroke="black"/>
                <path d="M 144,64 L 232,64 " stroke="black"/>
                <path d="M 296,64 L 384,64 " stroke="black"/>
                <path d="M 424,64 L 512,64 " stroke="black"/>
                <path d="M 40,128 L 176,128 " stroke="black"/>
                <path d="M 184,160 L 328,160 " stroke="black"/>
                <path d="M 336,176 L 456,176 " stroke="black"/>
                <path d="M 344,224 L 464,224 " stroke="black"/>
                <path d="M 192,256 L 336,256 " stroke="black"/>
                <path d="M 48,288 L 184,288 " stroke="black"/>
                <polygon points="464,176 452,170.4 452,181.6 " fill="black" transform="rotate(0,456,176 )"/>
                <polygon points="352,224 340,218.4 340,229.6 " fill="black" transform="rotate(180,344,224 )"/>
                <polygon points="336,160 324,154.4 324,165.6 " fill="black" transform="rotate(0,328,160 )"/>
                <polygon points="200,256 188,250.4 188,261.6 " fill="black" transform="rotate(180,192,256 )"/>
                <polygon points="184,128 172,122.4 172,133.6 " fill="black" transform="rotate(0,176,128 )"/>
                <polygon points="56,288 44,282.4 44,293.6 " fill="black" transform="rotate(180,48,288 )"/>
                <g>
                  <text x="36" y="36">Client</text>
                  <text x="176" y="36">Proxy</text>
                  <text x="336" y="36">Request</text>
                  <text x="460" y="36">Target</text>
                  <text x="188" y="52">Resource</text>
                  <text x="340" y="52">Resource</text>
                  <text x="468" y="52">Resource</text>
                  <text x="100" y="100">Encapsulated</text>
                  <text x="80" y="116">Request</text>
                  <text x="244" y="132">Encapsulated</text>
                  <text x="224" y="148">Request</text>
                  <text x="376" y="164">Request</text>
                  <text x="420" y="212">Response</text>
                  <text x="276" y="228">Encapsulated</text>
                  <text x="292" y="244">Response</text>
                  <text x="124" y="260">Encapsulated</text>
                  <text x="140" y="276">Response</text>
                </g>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" name="" align="left" alt=""><![CDATA[
+---------+       +----------+       +----------+    +----------+
| Client  |       | Proxy    |       | Request  |    | Target   |
|         |       | Resource |       | Resource |    | Resource |
+----+----+       +----+-----+       +----+-----+    +----+-----+
     |                 |                  |               |
     | Encapsulated    |                  |               |
     | Request         |                  |               |
     +---------------->| Encapsulated     |               |
     |                 | Request          |               |
     |                 +----------------->| Request       |
     |                 |                  +-------------->|
     |                 |                  |               |
     |                 |                  |      Response |
     |                 |     Encapsulated |<--------------+
     |                 |         Response |               |
     |    Encapsulated |<-----------------+               |
     |        Response |                  |               |
     |<----------------+                  |               |
     |                 |                  |               |
]]></artwork>
        </artset>
      </figure>
      <t>In order to make a request to an oblivious target resource, the following steps
occur, as shown in <xref target="fig-overview" format="default"/>:</t>
      <ol spacing="normal" type="1"><li>The client constructs an HTTP request for an oblivious target resource.</li>
        <li>The client encodes the HTTP request in a binary HTTP message and then
encapsulates that message using HPKE and the process from <xref target="request" format="default"/>.</li>
        <li>The client sends a POST request to the oblivious proxy resource with the
encapsulated request as the content of that message.</li>
        <li>The oblivious proxy resource forwards this request to the oblivious request
resource.</li>
        <li>The oblivious request resource receives this request and removes
the HPKE protection to obtain an HTTP request.</li>
        <li>The oblivious request resource makes an HTTP request that includes the target
URI, method, fields, and content of the request it acquires.</li>
        <li>The oblivious target resource answers this HTTP request with an HTTP
response.</li>
        <li>The oblivious request resource encapsulates the HTTP response following the
process in <xref target="response" format="default"/> and sends this in response to the request from the
oblivious proxy resource.</li>
        <li>The oblivious proxy resource forwards this response to the client.</li>
        <li>The client removes the encapsulation to obtain the response to the original
request.</li>
      </ol>
      <section anchor="applicability" numbered="true" toc="default">
        <name>Applicability</name>
        <t>Oblivious HTTP has limited applicability.  Many uses of HTTP benefit from being
able to carry state between requests, such as with cookies (<xref target="RFC6265" format="default"/>),
authentication (<xref section="11" sectionFormat="of" target="HTTP" format="default"/>), or even alternative services
(<xref target="RFC7838" format="default"/>).  Oblivious HTTP seeks to prevent this sort of linkage, which
requires that applications not carry state between requests.</t>
        <t>Oblivious HTTP is primarily useful where privacy risks associated with possible
stateful treatment of requests are sufficiently negative that the cost of
deploying this protocol can be justified.  Oblivious HTTP is simpler and less
costly than more robust systems, like Prio (<xref target="PRIO" format="default"/>) or Tor
(<xref target="Dingledine2004" format="default"/>), which can provide stronger guarantees at higher operational costs.</t>
        <t>Oblivious HTTP is more costly than a direct connection to a server.  Some costs,
like those involved with connection setup, can be amortized, but there are
several ways in which oblivious HTTP is more expensive than a direct request:</t>
        <ul spacing="normal">
          <li>Each oblivious request requires at least two regular HTTP requests, which adds
latency.</li>
          <li>Each request is expanded in size with additional HTTP fields,
encryption-related metadata, and AEAD expansion.</li>
          <li>Deriving cryptographic keys and applying them for request and
response protection takes non-negligible computational resources.</li>
        </ul>
        <t>Examples of where preventing the linking of requests might justify these costs
include:</t>
        <ul spacing="normal">
          <li>DNS queries.  DNS queries made to a recursive resolver reveal information
about the requester, particularly if linked to other queries.</li>
          <li>Telemetry submission.  Applications that submit reports about their usage to
their developers might use oblivious HTTP for some types of moderately
sensitive data.</li>
        </ul>
      </section>
    </section>
    <section anchor="key-configuration" numbered="true" toc="default">
      <name>Key Configuration</name>
      <t>A client needs to acquire information about the key configuration of the
oblivious request resource in order to send encapsulated requests.</t>
      <t>In order to ensure that clients do not encapsulate messages that other entities
can intercept, the key configuration MUST be authenticated and have integrity
protection.</t>
      <t>This document describes the "application/ohttp-keys" media type; see
<xref target="ohttp-keys" format="default"/>.  This media type might be used, for example with HTTPS, as part
of a system for configuring or discovering key configurations.  Note however
that such a system needs to consider the potential for key configuration to be
used to compromise client privacy; see <xref target="privacy" format="default"/>.</t>
      <t>Specifying a format for expressing the information a client needs to construct
an encapsulated request ensures that different client implementations can be
configured in the same way. This also enables advertising key configurations in
a consistent format.</t>
      <t>A client might have multiple key configurations to select from when
encapsulating a request. Clients are responsible for selecting a preferred key
configuration from those it supports. Clients need to consider both the key
encapsulation method (KEM) and the combinations of key derivation function
(KDF) and authenticated encryption with associated data (AEAD) in this
decision.</t>
      <t>Evolution of the key configuration format is supported through the definition
of new formats that are identified by new media types.</t>
      <section anchor="key-config" numbered="true" toc="default">
        <name>Key Configuration Encoding</name>
        <t>A single key configuration consists of a key identifier, a public key, an
identifier for the KEM that the public key uses, and a set HPKE symmetric
algorithms. Each symmetric algorithm consists of an identifier for a KDF and an
identifier for an AEAD.</t>
        <t><xref target="format-key-config" format="default"/> shows a single key configuration, KeyConfig, that is
expressed using the TLS syntax; see <xref section="3" sectionFormat="of" target="TLS" format="default"/>.</t>
        <figure anchor="format-key-config">
          <name>A Single Key Configuration</name>
          <sourcecode type="tls-syntax"><![CDATA[
opaque HpkePublicKey[Npk];
uint16 HpkeKemId;
uint16 HpkeKdfId;
uint16 HpkeAeadId;

struct {
  HpkeKdfId kdf_id;
  HpkeAeadId aead_id;
} HpkeSymmetricAlgorithms;

struct {
  uint8 key_id;
  HpkeKemId kem_id;
  HpkePublicKey public_key;
  HpkeSymmetricAlgorithms cipher_suites<4..2^16-4>;
} KeyConfig;
]]></sourcecode>
        </figure>
        <t>The types HpkeKemId, HpkeKdfId, and HpkeAeadId identify a KEM, KDF, and AEAD
respectively. The definitions for these identifiers and the semantics of the
algorithms they identify can be found in <xref target="HPKE" format="default"/>. The Npk parameter
corresponding to the HpkeKdfId can be found in <xref target="HPKE" format="default"/>.</t>
      </section>
      <section anchor="ohttp-keys" numbered="true" toc="default">
        <name>Key Configuration Media Type</name>
        <t>The "application/ohttp-keys" format is a media type that identifies a
serialized collection of key configurations. The content of this media type
comprises one or more key configuration encodings (see <xref target="key-config" format="default"/>) that are
concatenated.</t>
        <dl>
          <dt>
Type name:  </dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>
Subtype name:  </dt>
          <dd>
            <t>ohttp-keys</t>
          </dd>
          <dt>
Required parameters:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Optional parameters:  </dt>
          <dd>
            <t>None</t>
          </dd>
          <dt>
Encoding considerations:  </dt>
          <dd>
            <t>only "8bit" or "binary" is permitted</t>
          </dd>
          <dt>
Security considerations:  </dt>
          <dd>
            <t>see <xref target="security" format="default"/></t>
          </dd>
          <dt>
Interoperability considerations:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Published specification:  </dt>
          <dd>
            <t>this specification</t>
          </dd>
          <dt>
Applications that use this media type:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Fragment identifier considerations:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Additional information:  </dt>
          <dd>
            <dl>
              <dt>Magic number(s):</dt>
              <dd>N/A</dd>
              <dt>Deprecated alias names for this type:</dt>
              <dd>N/A</dd>
              <dt>File extension(s):</dt>
              <dd>N/A</dd>
              <dt>Macintosh file type code(s):</dt>
              <dd>N/A</dd>
            </dl>
          </dd>
          <dt>
Person and email address to contact for further information:  </dt>
          <dd>
            <t>see Authors' Addresses section</t>
          </dd>
          <dt>
Intended usage:  </dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>
Restrictions on usage:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Author:  </dt>
          <dd>
            <t>see Authors' Addresses section</t>
          </dd>
          <dt>
Change controller:  </dt>
          <dd>
            <t>IESG</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="hpke-encapsulation" numbered="true" toc="default">
      <name>HPKE Encapsulation</name>
      <t>HTTP message encapsulation uses HPKE for request and response encryption.
An encapsulated HTTP message includes the following values:</t>
      <ol spacing="normal" type="1"><li>A binary-encoded HTTP message; see <xref target="BINARY" format="default"/>.</li>
        <li>Padding of arbitrary length which MUST contain all zeroes.</li>
      </ol>
      <t>The encoding of an HTTP message is as follows:</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
Plaintext Message {
  Message Length (i),
  Message (..),
  Padding Length (i),
  Padding (..),
}
]]></artwork>
      <t>An Encapsulated Request is comprised of a length-prefixed key identifier and a
HPKE-protected request message. HPKE protection includes an encapsulated KEM
shared secret (or <tt>enc</tt>), plus the AEAD-protected request message. An
Encapsulated Request is shown in <xref target="fig-enc-request" format="default"/>. <xref target="request" format="default"/> describes the
process for constructing and processing an Encapsulated Request.</t>
      <figure anchor="fig-enc-request">
        <name>Encapsulated Request</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Encapsulated Request {
  Key Identifier (8),
  KEM Identifier (16),
  KDF Identifier (16),
  AEAD Identifier (16),
  Encapsulated KEM Shared Secret (8*Nenc),
  AEAD-Protected Request (..),
}
]]></artwork>
      </figure>
      <t>The Nenc parameter corresponding to the HpkeKdfId can be found in <xref target="HPKE" format="default"/>.</t>
      <t>Responses are bound to responses and so consist only of AEAD-protected content.
<xref target="response" format="default"/> describes the process for constructing and processing an
Encapsulated Response.</t>
      <figure anchor="fig-enc-response">
        <name>Encapsulated Response</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Encapsulated Response {
  Nonce (Nk),
  AEAD-Protected Response (..),
}
]]></artwork>
      </figure>
      <t>The size of the Nonce field in an Encapsulated Response corresponds to the
size of an AEAD key for the corresponding HPKE ciphersuite.</t>
      <section anchor="request" numbered="true" toc="default">
        <name>Encapsulation of Requests</name>
        <t>Clients encapsulate a request <tt>request</tt> using values from a key configuration:</t>
        <ul spacing="normal">
          <li>the key identifier from the configuration, <tt>keyID</tt>, with the corresponding KEM
identified by <tt>kemID</tt>,</li>
          <li>the public key from the configuration, <tt>pkR</tt>, and</li>
          <li>a selected combination of KDF, identified by <tt>kdfID</tt>, and AEAD, identified by
<tt>aeadID</tt>.</li>
        </ul>
        <t>The client then constructs an encapsulated request, <tt>enc_request</tt>, as follows:</t>
        <ol spacing="normal" type="1"><li>Compute an HPKE context using <tt>pkR</tt>, yielding <tt>context</tt> and encapsulation
key <tt>enc</tt>.</li>
          <li>Construct associated data, <tt>aad</tt>, by concatenating the values of <tt>keyID</tt>,
<tt>kemID</tt>, <tt>kdfID</tt>, and <tt>aeadID</tt>, as one 8-bit integer and three 16-bit
integers, respectively, each in network byte order.</li>
          <li>Encrypt (seal) <tt>request</tt> with <tt>aad</tt> as associated data using <tt>context</tt>,
yielding ciphertext <tt>ct</tt>.</li>
          <li>Concatenate the values of <tt>aad</tt>, <tt>enc</tt>, and <tt>ct</tt>, yielding an Encapsulated
Request <tt>enc_request</tt>.</li>
        </ol>
        <t>Note that <tt>enc</tt> is of fixed-length, so there is no ambiguity in parsing this
structure.</t>
        <t>In pseudocode, this procedure is as follows:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
enc, context = SetupBaseS(pkR, "request")
aad = concat(encode(1, keyID),
             encode(2, kemID),
             encode(2, kdfID),
             encode(2, aeadID))
ct = context.Seal(aad, request)
enc_request = concat(aad, enc, ct)
]]></artwork>
        <t>Servers decrypt an Encapsulated Request by reversing this process. Given an
Encapsulated Request <tt>enc_request</tt>, a server:</t>
        <ol spacing="normal" type="1"><li>
            <t>Parses <tt>enc_request</tt> into <tt>keyID</tt>, <tt>kemID</tt>, <tt>kdfID</tt>, <tt>aeadID</tt>, <tt>enc</tt>, and <tt>ct</tt>
(indicated using the function <tt>parse()</tt> in pseudocode). The server is then
able to find the HPKE private key, <tt>skR</tt>, corresponding to <tt>keyID</tt>.  </t>
            <t>
a. If <tt>keyID</tt> does not identify a key matching the type of <tt>kemID</tt>, the server
   returns an error.  </t>
            <t>
b. If <tt>kdfID</tt> and <tt>aeadID</tt> identify a combination of KDF and AEAD that the
   server is unwilling to use with <tt>skR</tt>, the server returns an error.</t>
          </li>
          <li>Compute an HPKE context using <tt>skR</tt> and the encapsulated key <tt>enc</tt>,
yielding <tt>context</tt>.</li>
          <li>Construct additional associated data, <tt>aad</tt>, from <tt>keyID</tt>, <tt>kdfID</tt>, and
<tt>aeadID</tt> or as the first five bytes of <tt>enc_request</tt>.</li>
          <li>Decrypt <tt>ct</tt> using <tt>aad</tt> as associated data, yielding <tt>request</tt> or an error
on failure. If decryption fails, the server returns an error.</li>
        </ol>
        <t>In pseudocode, this procedure is as follows:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
keyID, kemID, kdfID, aeadID, enc, ct = parse(enc_request)
aad = concat(encode(1, keyID),
             encode(2, kemID),
             encode(2, kdfID),
             encode(2, aeadID))
context = SetupBaseR(enc, skR, "request")
request, error = context.Open(aad, ct)
]]></artwork>
      </section>
      <section anchor="response" numbered="true" toc="default">
        <name>Encapsulation of Responses</name>
        <t>Given an HPKE context <tt>context</tt>, a request message <tt>request</tt>, and a response
<tt>response</tt>, servers generate an Encapsulated Response <tt>enc_response</tt> as
follows:</t>
        <ol spacing="normal" type="1"><li>Export a secret <tt>secret</tt> from <tt>context</tt>, using the string "response" as context.
The length of this secret is <tt>max(Nn, Nk)</tt>, where <tt>Nn</tt> and <tt>Nk</tt> are the length
of AEAD key and nonce associated with <tt>context</tt>.</li>
          <li>Generate a random value of length <tt>max(Nn, Nk)</tt> bytes, called <tt>response_nonce</tt>.</li>
          <li>Extract a pseudorandom key <tt>prk</tt> using the <tt>Extract</tt> function provided by
the KDF algorithm associated with <tt>context</tt>. The <tt>ikm</tt> input to this
function is <tt>secret</tt>; the <tt>salt</tt> input is the concatenation of <tt>enc</tt> (from
<tt>enc_request</tt>) and <tt>response_nonce</tt></li>
          <li>Use the <tt>Expand</tt> function provided by the same KDF to extract an AEAD key
<tt>key</tt>, of length <tt>Nk</tt> - the length of the keys used by the AEAD associated
with <tt>context</tt>. Generating <tt>key</tt> uses a label of "key".</li>
          <li>Use the same <tt>Expand</tt> function to extract a nonce <tt>nonce</tt> of length <tt>Nn</tt> -
the length of the nonce used by the AEAD. Generating <tt>nonce</tt> uses a label of
"nonce".</li>
          <li>Encrypt <tt>response</tt>, passing the AEAD function Seal the values of <tt>key</tt>,
<tt>nonce</tt>, empty <tt>aad</tt>, and a <tt>pt</tt> input of <tt>request</tt>, which yields <tt>ct</tt>.</li>
          <li>Concatenate <tt>response_nonce</tt> and <tt>ct</tt>, yielding an Encapsulated Response
<tt>enc_response</tt>. Note that <tt>response_nonce</tt> is of fixed-length, so there is no
ambiguity in parsing either <tt>response_nonce</tt> or <tt>ct</tt>.</li>
        </ol>
        <t>In pseudocode, this procedure is as follows:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
secret = context.Export("response", Nk)
response_nonce = random(max(Nn, Nk))
salt = concat(enc, response_nonce)
prk = Extract(salt, secret)
aead_key = Expand(prk, "key", Nk)
aead_nonce = Expand(prk, "nonce", Nn)
ct = Seal(aead_key, aead_nonce, "", response)
enc_response = concat(response_nonce, ct)
]]></artwork>
        <t>Clients decrypt an Encapsulated Request by reversing this process. That is,
they first parse <tt>enc_response</tt> into <tt>response_nonce</tt> and <tt>ct</tt>. They then
follow the same process to derive values for <tt>aead_key</tt> and <tt>aead_nonce</tt>.</t>
        <t>The client uses these values to decrypt <tt>ct</tt> using the Open function provided by
the AEAD. Decrypting might produce an error, as follows:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
reponse, error = Open(aead_key, aead_nonce, "", ct)
]]></artwork>
      </section>
    </section>
    <section anchor="http-usage" numbered="true" toc="default">
      <name>HTTP Usage</name>
      <t>A client interacts with the oblivious proxy resource by constructing an
encapsulated request.  This encapsulated request is included as the content of a
POST request to the oblivious proxy resource.  This request MUST only contain
those fields necessary to carry the encapsulated request: a method of POST, a
target URI of the oblivious proxy resource, a header field containing
the content type (see (<xref target="media-types" format="default"/>), and the encapsulated request as the
request content.  Clients MAY include fields that do not reveal information
about the content of the request, such as Alt-Used <xref target="ALT-SVC" format="default"/>, or
information that it trusts the oblivious proxy resource to remove, such as
fields that are listed in the Connection header field.</t>
      <t>The oblivious proxy resource interacts with the oblivious request resource by
constructing a request using the same restrictions as the client request, except
that the target URI is the oblivious request resource.  The content of this
request is copied from the client.  The oblivious proxy resource MUST NOT add
information about the client to this request.</t>
      <t>When a response is received from the oblivious request resource, the oblivious
proxy resource forwards the response according to the rules of an HTTP proxy;
see <xref section="7.6" sectionFormat="of" target="HTTP" format="default"/>.</t>
      <t>An oblivious request resource, if it receives any response from the oblivious
target resource, sends a single 200 response containing the encapsulated
response.  Like the request from the client, this response MUST only contain
those fields necessary to carry the encapsulated response: a 200 status code, a
header field indicating the content type, and the encapsulated response as the
response content.  As with requests, additional fields MAY be used to convey
information that does not reveal information about the encapsulated response.</t>
      <t>An oblivious request resource acts as a gateway for requests to the oblivious
target resource (see <xref section="7.6" sectionFormat="of" target="HTTP" format="default"/>).  The one exception is that any
information it might forward in a response MUST be encapsulated, unless it is
responding to errors it detects before removing encapsulation of the request;
see <xref target="errors" format="default"/>.</t>
      <section anchor="informational-responses" numbered="true" toc="default">
        <name>Informational Responses</name>
        <t>This encapsulation does not permit progressive processing of responses.  Though
the binary HTTP response format does support the inclusion of informational
(1xx) status codes, the AEAD encapsulation cannot be removed until the entire
message is received.</t>
        <t>In particular, the Expect header field with 100-continue (see Section 10.1.1 of
<xref target="HTTP" format="default"/>) cannot be used.  Clients MUST NOT
construct a request that includes a 100-continue expectation; the oblivious
request resource MUST generate an error if a 100-continue expectation is
received.</t>
      </section>
      <section anchor="errors" numbered="true" toc="default">
        <name>Errors</name>
        <t>A server that receives an invalid message for any reason MUST generate an HTTP
response with a 4xx status code.</t>
        <t>Errors detected by the oblivious proxy resource and errors detected by the
oblivious request resource before removing protection (including being unable to
remove encapsulation for any reason) result in the status code being sent
without protection in response to the POST request made to that resource.</t>
        <t>Errors detected by the oblivious request resource after successfully removing
encapsulation and errors detected by the oblivious target resource MUST be sent
in an encapsulated response.</t>
      </section>
    </section>
    <section anchor="media-types" numbered="true" toc="default">
      <name>Media Types</name>
      <t>Media types are used to identify encapsulated requests and responses.</t>
      <t>Evolution of the format of encapsulated requests and responses is supported
through the definition of new formats that are identified by new media types.</t>
      <section anchor="messageohttp-req-media-type" numbered="true" toc="default">
        <name>message/ohttp-req Media Type</name>
        <t>The "message/ohttp-req" identifies an encapsulated binary HTTP request.  This
is a binary format that is defined in <xref target="request" format="default"/>.</t>
        <dl>
          <dt>
Type name:  </dt>
          <dd>
            <t>message</t>
          </dd>
          <dt>
Subtype name:  </dt>
          <dd>
            <t>ohttp-req</t>
          </dd>
          <dt>
Required parameters:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Optional parameters:  </dt>
          <dd>
            <t>None</t>
          </dd>
          <dt>
Encoding considerations:  </dt>
          <dd>
            <t>only "8bit" or "binary" is permitted</t>
          </dd>
          <dt>
Security considerations:  </dt>
          <dd>
            <t>see <xref target="security" format="default"/></t>
          </dd>
          <dt>
Interoperability considerations:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Published specification:  </dt>
          <dd>
            <t>this specification</t>
          </dd>
          <dt>
Applications that use this media type:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Fragment identifier considerations:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Additional information:  </dt>
          <dd>
            <dl>
              <dt>Magic number(s):</dt>
              <dd>N/A</dd>
              <dt>Deprecated alias names for this type:</dt>
              <dd>N/A</dd>
              <dt>File extension(s):</dt>
              <dd>N/A</dd>
              <dt>Macintosh file type code(s):</dt>
              <dd>N/A</dd>
            </dl>
          </dd>
          <dt>
Person and email address to contact for further information:  </dt>
          <dd>
            <t>see Authors' Addresses section</t>
          </dd>
          <dt>
Intended usage:  </dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>
Restrictions on usage:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Author:  </dt>
          <dd>
            <t>see Authors' Addresses section</t>
          </dd>
          <dt>
Change controller:  </dt>
          <dd>
            <t>IESG</t>
          </dd>
        </dl>
      </section>
      <section anchor="messageohttp-res-media-type" numbered="true" toc="default">
        <name>message/ohttp-res Media Type</name>
        <t>The "message/ohttp-res" identifies an encapsulated binary HTTP response. This
is a binary format that is defined in <xref target="response" format="default"/>.</t>
        <dl>
          <dt>
Type name:  </dt>
          <dd>
            <t>message</t>
          </dd>
          <dt>
Subtype name:  </dt>
          <dd>
            <t>ohttp-res</t>
          </dd>
          <dt>
Required parameters:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Optional parameters:  </dt>
          <dd>
            <t>None</t>
          </dd>
          <dt>
Encoding considerations:  </dt>
          <dd>
            <t>only "8bit" or "binary" is permitted</t>
          </dd>
          <dt>
Security considerations:  </dt>
          <dd>
            <t>see <xref target="security" format="default"/></t>
          </dd>
          <dt>
Interoperability considerations:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Published specification:  </dt>
          <dd>
            <t>this specification</t>
          </dd>
          <dt>
Applications that use this media type:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Fragment identifier considerations:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Additional information:  </dt>
          <dd>
            <dl>
              <dt>Magic number(s):</dt>
              <dd>N/A</dd>
              <dt>Deprecated alias names for this type:</dt>
              <dd>N/A</dd>
              <dt>File extension(s):</dt>
              <dd>N/A</dd>
              <dt>Macintosh file type code(s):</dt>
              <dd>N/A</dd>
            </dl>
          </dd>
          <dt>
Person and email address to contact for further information:  </dt>
          <dd>
            <t>see Authors' Addresses section</t>
          </dd>
          <dt>
Intended usage:  </dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>
Restrictions on usage:  </dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>
Author:  </dt>
          <dd>
            <t>see Authors' Addresses section</t>
          </dd>
          <dt>
Change controller:  </dt>
          <dd>
            <t>IESG</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="security" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>In this design, a client wishes to make a request of a server that is
authoritative for the oblivious target resource. The client wishes to make this
request without linking that request with either:</t>
      <ol spacing="normal" type="1"><li>The identity at the network and transport layer of the client (that is, the
client IP address and TCP or UDP port number the client uses to create a
connection).</li>
        <li>Any other request the client might have made in the past or might make in
the future.</li>
      </ol>
      <t>In order to ensure this, the client selects a proxy (that serves the oblivious
proxy resource) that it trusts will protect this information by forwarding the
encapsulated request and response without passing the server (that serves the
oblivious request resource).</t>
      <t>In this section, a deployment where there are three entities is considered:</t>
      <ul spacing="normal">
        <li>A client makes requests and receives responses</li>
        <li>A proxy operates the oblivious proxy resource</li>
        <li>A server operates both the oblivious request resource and the oblivious
target resource</li>
      </ul>
      <t>To achieve the stated privacy goals, the oblivious proxy resource cannot be
operated by the same entity as the oblivious request resource. However,
colocation of the oblivious request resource and oblivious target resource
simplifies the interactions between those resources without affecting client
privacy.</t>
      <t>As a consequence of this configuration, Oblivious HTTP prevents linkability
described above. Informally, this means:</t>
      <ol spacing="normal" type="1"><li>Requests and responses are known only to clients and targets in possession
of the corresponding response encapsulation key and HPKE keying material.
In particular, the oblivious proxy knows the origin and destination of an
encapsulated request and response, yet does not know the decapsulated
contents. Likewise, targets know only the oblivious request origin, i.e.,
the proxy, and the decapsulated request. Only the client knows both the
plaintext request and response.</li>
        <li>Targets cannot link requests from the same client in the absence of unique
per-client keys.</li>
      </ol>
      <t>Traffic analysis that might affect these properties are outside the scope of this
document; see <xref target="ta" format="default"/>.</t>
      <t>A formal analysis of Oblivious HTTP is in <xref target="OHTTP-ANALYSIS" format="default"/>.</t>
      <section anchor="client-responsibilities" numbered="true" toc="default">
        <name>Client Responsibilities</name>
        <t>Clients MUST ensure that the key configuration they select for generating
encapsulated requests is integrity protected and authenticated so that it can
be attributed to the oblivious request resource; see <xref target="key-configuration" format="default"/>.</t>
        <t>Since clients connect directly to the proxy instead of the target, application
configurations wherein clients make policy decisions about target connections,
e.g., to apply certificate pinning, are incompatible with Oblivious HTTP.  In
such cases, alternative technologies such as HTTP CONNECT
(<xref section="9.3.6" sectionFormat="of" target="HTTP" format="default"/>) can be used. Applications could implement related
policies on key configurations and proxy connections, though these might not
provide the same properties as policies enforced directly on target
connections. When this difference is relevant, applications can instead connect
directly to the target at the cost of either privacy or performance.</t>
        <t>Clients MUST NOT include identifying information in the request that is
encapsulated. Identifying information includes cookies <xref target="COOKIES" format="default"/>,
authentication credentials or tokens, and any information that might reveal
client-specific information such as account credentials.</t>
        <t>Clients cannot carry connection-level state between requests as they only
establish direct connections to the proxy responsible for the oblivious proxy
resource. However, clients need to ensure that they construct requests without
any information gained from previous requests. Otherwise, the server might be
able to use that information to link requests. Cookies <xref target="COOKIES" format="default"/> are
the most obvious feature that MUST NOT be used by clients. However, clients
need to include all information learned from requests, which could include the
identity of resources.</t>
        <t>Clients MUST generate a new HPKE context for every request, using a good source
of entropy (<xref target="RANDOM" format="default"/>) for generating keys. Key reuse not only risks
requests being linked, reuse could expose request and response contents to the
proxy.</t>
        <t>The request the client sends to the oblivious proxy resource only requires
minimal information; see <xref target="http-usage" format="default"/>. The request that carries the
encapsulated request and is sent to the oblivious proxy resource MUST NOT
include identifying information unless the client ensures that this information
is removed by the proxy. A client MAY include information only for the
oblivious proxy resource in header fields identified by the Connection header
field if it trusts the proxy to remove these as required by Section 7.6.1 of
<xref target="HTTP" format="default"/>. The client needs to trust that the proxy does not replicate the
source addressing information in the request it forwards.</t>
        <t>Clients rely on the oblivious proxy resource to forward encapsulated requests
and responses. However, the proxy can only refuse to forward messages, it
cannot inspect or modify the contents of encapsulated requests or responses.</t>
      </section>
      <section anchor="proxy-responsibilities" numbered="true" toc="default">
        <name>Proxy Responsibilities</name>
        <t>The proxy that serves the oblivious proxy resource has a very simple function
to perform. For each request it receives, it makes a request of the oblivious
request resource that includes the same content. When it receives a response,
it sends a response to the client that includes the content of the response
from the oblivious request resource. When generating a request, the proxy MUST
follow the forwarding rules in <xref section="7.6" sectionFormat="of" target="HTTP" format="default"/>.</t>
        <t>A proxy can also generate responses, though it assumed to not be able to
examine the content of a request (other than to observe the choice of key
identifier, KDF, and AEAD), so it is also assumed that it cannot generate an
encapsulated response.</t>
        <t>A proxy MUST NOT add information about the client identity when forwarding
requests. This includes the Via field, the Forwarded field
<xref target="FORWARDED" format="default"/>, and any similar information.  A client does not depend
on the proxy using an authenticated and encrypted connection to the oblivious request
resource, only that information about the client not be attached to forwarded
requests.</t>
        <section anchor="dos" numbered="true" toc="default">
          <name>Denial of Service</name>
          <t>As there are privacy benefits from having a large rate of requests forwarded by
the same proxy (see <xref target="ta" format="default"/>), servers that operate the oblivious request
resource might need an arrangement with proxies. This arrangement might be
necessary to prevent having the large volume of requests being classified as an
attack by the server.</t>
          <t>If a server accepts a larger volume of requests from a proxy, it needs to
trust that the proxy does not allow abusive levels of request volumes from
clients. That is, if a server allows requests from the proxy to be exempt from
rate limits, the server might want to ensure that the proxy applies a rate
limiting policy that is acceptable to the server.</t>
          <t>Servers that enter into an agreement with a proxy that enables a higher request
rate might choose to authenticate the proxy to enable the higher rate.</t>
        </section>
        <section anchor="ta" numbered="true" toc="default">
          <name>Linkability Through Traffic Analysis</name>
          <t>As the time at which encapsulated request or response messages are sent can
reveal information to a network observer. Though messages exchanged between the
oblivious proxy resource and the oblivious request resource might be sent in a
single connection, traffic analysis could be used to match messages that are
forwarded by the proxy.</t>
          <t>A proxy could, as part of its function, add delays in order to increase the
anonymity set into which each message is attributed. This could latency to the
overall time clients take to receive a response, which might not be what some
clients want.</t>
          <t>A proxy can use padding to reduce the effectiveness of traffic analysis.</t>
          <t>A proxy that forwards large volumes of exchanges can provide better privacy by
providing larger sets of messages that need to be matched.</t>
        </section>
      </section>
      <section anchor="server-responsibilities" numbered="true" toc="default">
        <name>Server Responsibilities</name>
        <t>A server that operates both oblivious request and oblivious target resources is
responsible for removing request encapsulation, generating a response the
encapsulated request, and encapsulating the response.</t>
        <t>Servers should account for traffic analysis based on response size or generation time.
Techniques such as padding or timing delays can help protect against such attacks;
see <xref target="ta" format="default"/>.</t>
        <t>If separate entities provide the oblivious request resource and oblivious
target resource, these entities might need an arrangement similar to that
between server and proxy for managing denial of service; see <xref target="dos" format="default"/>. It is
also necessary to provide confidentiality protection for the unprotected
requests and responses, plus protections for traffic analysis; see <xref target="ta" format="default"/>.</t>
        <t>An oblivious request resource needs to have a plan for replacing keys. This
might include regular replacement of keys, which can be assigned new key
identifiers. If an oblivious request resource receives a request that contains
a key identifier that it does not understand or that corresponds to a key that
has been replaced, the server can respond with an HTTP 422 (Unprocessable
Content) status code.</t>
        <t>A server can also use a 422 status code if the server has a key that
corresponds to the key identifier, but the encapsulated request cannot be
successfully decrypted using the key.</t>
      </section>
      <section anchor="replay-attacks" numbered="true" toc="default">
        <name>Replay Attacks</name>
        <t>Encapsulated requests can be copied and replayed by the oblivious proxy
resource. The design of oblivious HTTP does not assume that the oblivious proxy
resource will not replay requests. In addition, if a client sends an
encapsulated request in TLS early data (see <xref section="8" sectionFormat="of" target="TLS" format="default"/> and
<xref target="RFC8470" format="default"/>), a network-based adversary might be able to cause the request to
be replayed. In both cases, the effect of a replay attack and the mitigations
that might be employed are similar to TLS early data.</t>
        <t>A client or oblivious proxy resource MUST NOT automatically attempt to retry a
failed request unless it receives a positive signal indicating that the request
was not processed or forwarded. The HTTP/2 REFUSED_STREAM error code (Section
8.1.4 of <xref target="RFC7540" format="default"/>), the HTTP/3 H3_REQUEST_REJECTED error code (Section 8.1
of <xref target="QUIC-HTTP" format="default"/>), or a GOAWAY frame with a low enough
identifier (in either protocol version) are all sufficient signals that no
processing occurred. Connection failures or interruptions are not sufficient
signals that no processing occurred.</t>
        <t>The anti-replay mechanisms described in <xref section="8" sectionFormat="of" target="TLS" format="default"/> are generally
applicable to oblivious HTTP requests. Servers can use the encapsulated keying
material as a unique key for identifying potential replays. This depends on
clients generating a new HPKE context for every request.</t>
        <t>The mechanism used in TLS for managing differences in client and server clocks
cannot be used as it depends on being able to observe previous interactions.
Oblivious HTTP explicitly prevents such linkability.
Applications can still include an explicit indication of time to limit the span
of time over which a server might need to track accepted requests. Clock
information could be used for client identification, so reduction in precision
or obfuscation might be necessary.</t>
        <t>The considerations in <xref target="RFC8470" format="default"/> as they relate to managing the risk of
replay also apply, though there is no option to delay the processing of a
request.</t>
        <t>Limiting requests to those with safe methods might not be satisfactory for some
applications, particularly those that involve the submission of data to a
server. The use of idempotent methods might be of some use in managing replay
risk, though it is important to recognize that different idempotent requests
can be combined to be not idempotent.</t>
        <t>Idempotent actions with a narrow scope based on the value of a protected nonce
could enable data submission with limited replay exposure. A nonce might be
added as an explicit part of a request, or, if the oblivious request and target
resources are co-located, the encapsulated keying material can be used to
produce a nonce.</t>
        <t>The server-chosen <tt>response_nonce</tt> field ensures that responses have unique
AEAD keys and nonces even when requests are replayed.</t>
      </section>
      <section anchor="post-compromise-security" numbered="true" toc="default">
        <name>Post-Compromise Security</name>
        <t>This design does not provide post-compromise security for responses. A client
only needs to retain keying material that might be used compromise the
confidentiality and integrity of a response until that response is consumed, so
there is negligible risk associated with a client compromise.</t>
        <t>A server retains a secret key that might be used to remove protection from messages
over much longer periods. A server compromise that provided access to the
oblivious request resource secret key could allow an attacker to recover the
plaintext of all requests sent toward affected keys and all of the responses
that were generated.</t>
        <t>Even if server keys are compromised, an adversary cannot access messages
exchanged by the client with the oblivious proxy resource as messages are
protected by TLS.  Use of a compromised key also requires that the oblivious
proxy resource cooperate with the attacker or that the attacker is able to
compromise these TLS connections.</t>
        <t>The total number of affected messages affected by server key compromise can be
limited by regular rotation of server keys.</t>
      </section>
    </section>
    <section anchor="privacy" numbered="true" toc="default">
      <name>Privacy Considerations</name>
      <t>One goal of this design is that independent client requests are only linkable
by the chosen key configuration. The oblivious proxy and request resources can link
requests using the same key configuration by matching KeyConfig.key_id, or, if
the oblivious target resource is willing to use trial decryption, a limited set
of key configurations that share an identifier. An oblivious proxy can link
requests using the public key corresponding to KeyConfig.key_id.</t>
      <t>Request resources are capable of linking requests depending on how KeyConfigs
are produced by servers and discovered by clients. Specifically, servers can
maliciously construct key configurations to track individual clients. A specific
method for a client to acquire key configurations is not included in this
specification. Clients need to consider these tracking vectors when choosing a
discovery method.  Applications using this design should provide accommodations
to mitigate tracking using key configurations.</t>
    </section>
    <section anchor="deployment" numbered="true" toc="default">
      <name>Operational and Deployment Considerations</name>
      <t>Using Oblivious HTTP adds both cryptographic and latency to requests relative to
a simple HTTP request-response exchange.  Deploying proxy services that are on
path between clients and servers avoids adding significant additional delay due
to network topology.  A study of a similar system <xref target="ODoH" format="default"/> found that deploying
proxies close to servers was most effective in minimizing additional latency.</t>
      <t>Oblivious HTTP might be incompatible with network interception regimes, such as
those that rely on configuring clients with trust anchors and intercepting TLS
connections.  While TLS might be intercepted successfully, interception
middleboxes devices might not receive updates that would allow Oblivious HTTP to
be correctly identified using the media types defined in <xref target="media-types" format="default"/>.</t>
      <t>Oblivious HTTP has a simple key management design that is not trivially altered
to enable interception by intermediaries.  Clients that are configured to enable
interception might choose to disable Oblivious HTTP in order to ensure that
content is accessible to middleboxes.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>Please update the "Media Types" registry at
<eref target="https://www.iana.org/assignments/media-types">https://www.iana.org/assignments/media-types</eref> with the registration
information in <xref target="media-types" format="default"/> for the media types "message/ohttp-req",
"message/ohttp-res", and "application/ohttp-keys".</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="BINARY">
          <front>
            <title>Binary Representation of HTTP Messages</title>
            <author initials="M." surname="Thomson" fullname="Martin Thomson">
              <organization>Mozilla</organization>
            </author>
            <date year="2021" month="October" day="26"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-thomson-http-binary-message-00"/>
        </reference>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="Roy T. Fielding">
              <organization>Adobe</organization>
            </author>
            <author fullname="Mark Nottingham">
              <organization>Fastly</organization>
            </author>
            <author fullname="Julian Reschke">
              <organization>greenbytes GmbH</organization>
            </author>
            <date day="12" month="September" year="2021"/>
            <abstract>
              <t>   The Hypertext Transfer Protocol (HTTP) is a stateless application-
   level protocol for distributed, collaborative, hypertext information
   systems.  This document describes the overall architecture of HTTP,
   establishes common terminology, and defines aspects of the protocol
   that are shared by all versions.  In this definition are core
   protocol elements, extensibility mechanisms, and the "http" and
   "https" Uniform Resource Identifier (URI) schemes.

   This document updates RFC 3864 and obsoletes RFC 2818, RFC 7231, RFC
   7232, RFC 7233, RFC 7235, RFC 7538, RFC 7615, RFC 7694, and portions
   of RFC 7230.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-semantics-19"/>
        </reference>
        <reference anchor="QUIC">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar">
              <organization/>
            </author>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol.  QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances.  Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="TLS">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="HPKE">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="Richard L. Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Karthik Bhargavan">
              <organization>Inria</organization>
            </author>
            <author fullname="Benjamin Lipp">
              <organization>Inria</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="2" month="September" year="2021"/>
            <abstract>
              <t>   This document describes a scheme for hybrid public-key encryption
   (HPKE).  This scheme provides a variant of public-key encryption of
   arbitrary-sized plaintexts for a recipient public key.  It also
   includes three authenticated variants, including one which
   authenticates possession of a pre-shared key, and two optional ones
   which authenticate possession of a KEM private key.  HPKE works for
   any combination of an asymmetric key encapsulation mechanism (KEM),
   key derivation function (KDF), and authenticated encryption with
   additional data (AEAD) encryption function.  Some authenticated
   variants may not be supported by all KEMs.  We provide instantiations
   of the scheme using widely used and efficient primitives, such as
   Elliptic Curve Diffie-Hellman key agreement, HKDF, and SHA2.

   This document is a product of the Crypto Forum Research Group (CFRG)
   in the IRTF.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-hpke-12"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8470">
          <front>
            <title>Using Early Data in HTTP</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson">
              <organization/>
            </author>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <author fullname="W. Tarreau" initials="W." surname="Tarreau">
              <organization/>
            </author>
            <date month="September" year="2018"/>
            <abstract>
              <t>Using TLS early data creates an exposure to the possibility of a replay attack.  This document defines mechanisms that allow clients to communicate with servers about HTTP requests that are sent in early data.  Techniques are described that use these mechanisms to mitigate the risk of replay.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8470"/>
          <seriesInfo name="DOI" value="10.17487/RFC8470"/>
        </reference>
        <reference anchor="RFC7540">
          <front>
            <title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
            <author fullname="M. Belshe" initials="M." surname="Belshe">
              <organization/>
            </author>
            <author fullname="R. Peon" initials="R." surname="Peon">
              <organization/>
            </author>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2).  HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection.  It also introduces unsolicited push of representations from servers to clients.</t>
              <t>This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax.  HTTP's existing semantics remain unchanged.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7540"/>
          <seriesInfo name="DOI" value="10.17487/RFC7540"/>
        </reference>
        <reference anchor="QUIC-HTTP">
          <front>
            <title>Hypertext Transfer Protocol Version 3 (HTTP/3)</title>
            <author fullname="Mike Bishop">
              <organization>Akamai</organization>
            </author>
            <date day="2" month="February" year="2021"/>
            <abstract>
              <t>   The QUIC transport protocol has several features that are desirable
   in a transport for HTTP, such as stream multiplexing, per-stream flow
   control, and low-latency connection establishment.  This document
   describes a mapping of HTTP semantics over QUIC.  This document also
   identifies HTTP/2 features that are subsumed by QUIC, and describes
   how HTTP/2 extensions can be ported to HTTP/3.

DO NOT DEPLOY THIS VERSION OF HTTP

   DO NOT DEPLOY THIS VERSION OF HTTP/3 UNTIL IT IS IN AN RFC.  This
   version is still a work in progress.  For trial deployments, please
   use earlier versions.

Note to Readers

   Discussion of this draft takes place on the QUIC working group
   mailing list (quic@ietf.org), which is archived at
   https://mailarchive.ietf.org/arch/search/?email_list=quic.

   Working Group information can be found at https://github.com/quicwg;
   source code and issues list for this draft can be found at
   https://github.com/quicwg/base-drafts/labels/-http.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-quic-http-34"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="Dingledine2004" target="https://svn.torproject.org/svn/projects/design-paper/tor-design.html">
          <front>
            <title>Tor: The Second-Generation Onion Router</title>
            <author initials="R." surname="Dingledine">
              <organization/>
            </author>
            <author initials="N." surname="Mathewson">
              <organization/>
            </author>
            <author initials="P." surname="Syverson">
              <organization/>
            </author>
            <date year="2004" month="August"/>
          </front>
        </reference>
        <reference anchor="PRIO" target="https://crypto.stanford.edu/prio/paper.pdf">
          <front>
            <title>Prio: Private, Robust, and Scalable Computation of Aggregate Statistics</title>
            <author initials="H." surname="Corrigan-Gibbs">
              <organization/>
            </author>
            <author initials="D." surname="Boneh">
              <organization/>
            </author>
            <date year="2017" month="March" day="14"/>
          </front>
        </reference>
        <reference anchor="ODoH" target="https://www.petsymposium.org/2021/files/papers/issue4/popets-2021-0085.pdf">
          <front>
            <title>Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS</title>
            <author fullname="Sudheesh Singanamalla">
              <organization/>
            </author>
            <author fullname="Suphanat Chunhapanya">
              <organization/>
            </author>
            <author fullname="Marek Vavrusa">
              <organization/>
            </author>
            <author fullname="Tanya Verma">
              <organization/>
            </author>
            <author fullname="Peter Wu">
              <organization/>
            </author>
            <author fullname="Marwan Fayed">
              <organization/>
            </author>
            <author fullname="Kurtis Heimerl">
              <organization/>
            </author>
            <author fullname="Nick Sullivan">
              <organization/>
            </author>
            <author fullname="Christopher A. Wood">
              <organization/>
            </author>
            <date year="2021" month="January" day="07"/>
          </front>
        </reference>
        <reference anchor="OHTTP-ANALYSIS" target="https://github.com/cloudflare/ohttp-analysis">
          <front>
            <title>Tamarin Model of Oblivious HTTP</title>
            <author fullname="Jonathan Hoyland">
              <organization/>
            </author>
            <date year="2021" month="August" day="23"/>
          </front>
        </reference>
        <reference anchor="RFC6265">
          <front>
            <title>HTTP State Management Mechanism</title>
            <author fullname="A. Barth" initials="A." surname="Barth">
              <organization/>
            </author>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document defines the HTTP Cookie and Set-Cookie header fields. These header fields can be used by HTTP servers to store state (called cookies) at HTTP user agents, letting the servers maintain a stateful session over the mostly stateless HTTP protocol.  Although cookies have many historical infelicities that degrade their security and privacy, the Cookie and Set-Cookie header fields are widely used on the Internet.  This document obsoletes RFC 2965.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6265"/>
          <seriesInfo name="DOI" value="10.17487/RFC6265"/>
        </reference>
        <reference anchor="RFC7838">
          <front>
            <title>HTTP Alternative Services</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <author fullname="J. Reschke" initials="J." surname="Reschke">
              <organization/>
            </author>
            <date month="April" year="2016"/>
            <abstract>
              <t>This document specifies "Alternative Services" for HTTP, which allow an origin's resources to be authoritatively available at a separate network location, possibly accessed with a different protocol configuration.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7838"/>
          <seriesInfo name="DOI" value="10.17487/RFC7838"/>
        </reference>
        <reference anchor="ALT-SVC">
          <front>
            <title>HTTP Alternative Services</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <author fullname="J. Reschke" initials="J." surname="Reschke">
              <organization/>
            </author>
            <date month="April" year="2016"/>
            <abstract>
              <t>This document specifies "Alternative Services" for HTTP, which allow an origin's resources to be authoritatively available at a separate network location, possibly accessed with a different protocol configuration.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7838"/>
          <seriesInfo name="DOI" value="10.17487/RFC7838"/>
        </reference>
        <reference anchor="COOKIES">
          <front>
            <title>HTTP State Management Mechanism</title>
            <author fullname="A. Barth" initials="A." surname="Barth">
              <organization/>
            </author>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document defines the HTTP Cookie and Set-Cookie header fields. These header fields can be used by HTTP servers to store state (called cookies) at HTTP user agents, letting the servers maintain a stateful session over the mostly stateless HTTP protocol.  Although cookies have many historical infelicities that degrade their security and privacy, the Cookie and Set-Cookie header fields are widely used on the Internet.  This document obsoletes RFC 2965.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6265"/>
          <seriesInfo name="DOI" value="10.17487/RFC6265"/>
        </reference>
        <reference anchor="RANDOM">
          <front>
            <title>Randomness Requirements for Security</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd">
              <organization/>
            </author>
            <author fullname="J. Schiller" initials="J." surname="Schiller">
              <organization/>
            </author>
            <author fullname="S. Crocker" initials="S." surname="Crocker">
              <organization/>
            </author>
            <date month="June" year="2005"/>
            <abstract>
              <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts.  However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities.  The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult.  This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities.  It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
        <reference anchor="FORWARDED">
          <front>
            <title>Forwarded HTTP Extension</title>
            <author fullname="A. Petersson" initials="A." surname="Petersson">
              <organization/>
            </author>
            <author fullname="M. Nilsson" initials="M." surname="Nilsson">
              <organization/>
            </author>
            <date month="June" year="2014"/>
            <abstract>
              <t>This document defines an HTTP extension header field that allows proxy components to disclose information lost in the proxying process, for example, the originating IP address of a request or IP address of the proxy on the user-agent-facing interface.  In a path of proxying components, this makes it possible to arrange it so that each subsequent component will have access to, for example, all IP addresses used in the chain of proxied HTTP requests.</t>
              <t>This document also specifies guidelines for a proxy administrator to anonymize the origin of a request.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7239"/>
          <seriesInfo name="DOI" value="10.17487/RFC7239"/>
        </reference>
        <reference anchor="X25519">
          <front>
            <title>Elliptic Curves for Security</title>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <author fullname="M. Hamburg" initials="M." surname="Hamburg">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="January" year="2016"/>
            <abstract>
              <t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS).  These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7748"/>
          <seriesInfo name="DOI" value="10.17487/RFC7748"/>
        </reference>
        <reference anchor="ODOH">
          <front>
            <title>Oblivious DNS Over HTTPS</title>
            <author fullname="Eric Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Patrick McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Tanya Verma">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="2" month="September" year="2021"/>
            <abstract>
              <t>   This document describes an extension to DNS Over HTTPS (DoH) that
   allows hiding client IP addresses via proxying encrypted DNS
   transactions.  This improves privacy of DNS operations by not
   allowing any one server entity to be aware of both the client IP
   address and the content of DNS queries and answers.

   This experimental extension is developed outside the IETF and is
   published here to guide implementation, ensure interoperability among
   implementations, and enable wide-scale experimentation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-pauly-dprive-oblivious-doh-07"/>
        </reference>
      </references>
    </references>
    <section anchor="complete-example-of-a-request-and-response" numbered="true" toc="default">
      <name>Complete Example of a Request and Response</name>
      <!-- Generated using ohttp:
RUST_LOG=ohttp cargo test -p ohttp -\-lib -\- -\-nocapture request_response
-->

<t>A single request and response exchange is shown here. Binary values (key
configuration, secret keys, the content of messages, and intermediate values)
are shown in hexadecimal. The request and response here are absolutely minimal;
the purpose of this example is to show the cryptographic operations.</t>
      <t>The oblivious request resource generates a key pair. In this example the server
chooses DHKEM(X25519, HKDF-SHA256) and generates an X25519 key pair
<xref target="X25519" format="default"/>. The X25519 secret key is:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
cb14d538a70d8a74d47fb7e3ac5052a086da127c678d3585dcad72f98e3bff83
]]></artwork>
      <t>The oblivious request resource constructs a key configuration that includes the
corresponding public key as follows:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
01002012a45279412ea6ef11e9f839bb5a422fc1262b5c023d787e4e636e70ae
d3d56e00080001000100010003
]]></artwork>
      <t>This key configuration is somehow obtained by the client. Then when a client
wishes to send an HTTP request of a GET request to <tt>https://example.com</tt>, it
constructs the following binary HTTP message:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
00034745540568747470730b6578616d706c652e636f6d012f
]]></artwork>
      <t>The client then reads the oblivious request resource key configuration and
selects a mutually supported KDF and AEAD. In this example, the client selects
HKDF-SHA256 and AES-128-GCM. The client then generates an HPKE context that
uses the server public key. This results in the following encapsulated key:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
cd7786fd75143f12e03398dbe2bcfa8e01a8132e7b66050674db72730623ca3b
]]></artwork>
      <t>The corresponding private key is:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
c20afd33a2f2663faf023acf5d56fc08fddd38aada29b21b3b96e16f4326ccf7
]]></artwork>
      <t>Applying the Seal operation from the HPKE context produces an encrypted
message, allowing the client to construct the following encapsulated request:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
01002000010001cd7786fd75143f12e03398dbe2bcfa8e01a8132e7b66050674
db72730623ca3b68b9e75a0576745da12c4fa5053b7ec06d7f625197564a6087
ec299f8d6fffa2a8addfc1c0f64b4b05
]]></artwork>
      <t>The client then sends this to the oblivious proxy resource in a POST request,
which might look like the following HTTP/1.1 request:</t>
      <sourcecode type="http-message"><![CDATA[
POST /request.example.net/proxy HTTP/1.1
Host: proxy.example.org
Content-Type: message/ohttp-req
Content-Length: 78

<content is the encapsulated request above>
]]></sourcecode>
      <t>The oblivious proxy resource receives this request and forwards it to the
oblivious request resource, which might look like:</t>
      <sourcecode type="http-message"><![CDATA[
POST /oblivious/request HTTP/1.1
Host: example.com
Content-Type: message/ohttp-req
Content-Length: 78

<content is the encapsulated request above>
]]></sourcecode>
      <t>The oblivous request resource receives this request, selects the key it
generated previously using the key identifier from the message, and decrypts
the message. As this request is directed to the same server, the oblivious
request resource does not need to initiate an HTTP request to the oblivious
target resource. The request can be served directly by the oblivious target
resource, which generates a minimal response (consisting of just a 200 status
code) as follows:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
0140c8
]]></artwork>
      <t>The response is constructed by extracting a secret from the HPKE context:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
9c0b96b577b9fc7a5beef536e0ff3a64
]]></artwork>
      <t>The key derivation for the encapsulated response uses both the encapsulated KEM
key from the request and a randomly selected nonce. This produces a salt of:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
cd7786fd75143f12e03398dbe2bcfa8e01a8132e7b66050674db72730623ca3b
061d62d5df5832c6c9fa4617ceb848a7
]]></artwork>
      <t>The salt and secret are both passed to the Extract function of the selected KDF
(HKDF-SHA256) to produce a pseudorandom key of:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
a0ab55d3b1811694943bb72c386f59bd030e1278692a3db2f30d8aac2f89a5fc
]]></artwork>
      <t>The pseudorandom key is used with the Expand function of the KDF and an info
field of "key" to produce a 16-byte key for the selected AEAD (AES-128-GCM):</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
1dae9d7fe263d23e51a768bcaf310aa5
]]></artwork>
      <t>With the same KDF and pseudorandom key, an info field of "nonce" is used to
generate a 12-byte nonce:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
e520beec147740e4f8a3b553
]]></artwork>
      <t>The AEAD Seal function is then used to encrypt the response, which is added
to the randomized nonce value to produce the encapsulated response:</t>
      <artwork type="hex-dump" name="" align="left" alt=""><![CDATA[
061d62d5df5832c6c9fa4617ceb848a7a6f694da45accc3c32ad576cb204f7cd
3bf23e
]]></artwork>
      <t>The oblivious request resource then constructs a response:</t>
      <sourcecode type="http-message"><![CDATA[
HTTP/1.1 200 OK
Date: Wed, 27 Jan 2021 04:45:07 GMT
Cache-Control: private, no-store
Content-Type: message/ohttp-res
Content-Length: 38

<content is the encapsulated response>
]]></sourcecode>
      <t>The same response might then be generated by the oblivious proxy resource which
might change as little as the Date header. The client is then able to use the
HPKE context it created and the nonce from the encapsulated response to
construct the AEAD key and nonce and decrypt the response.</t>
    </section>
    <section numbered="false" anchor="acknowledgments" toc="default">
      <name>Acknowledgments</name>
      <t>This design is based on a design for oblivious DoH, described in
<xref target="ODOH" format="default"/>. David Benjamin and Eric Rescorla made
technical contributions.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAMw1d2EAA+1923bbVpbg+/kKtPIwUhVJU9TVTiXViqTE7sSWW5IrU6u7
JwKJQwllEGADoGSVy/0t8y3zZbOv5wKCUrKq18xLecWxRALnss++7332Hg6H
ps3bwr5Kti6mRX6fV6smeX19/X7LZNWsTBfwTVan83bY3lWLpiqH1V2aw//a
djkcj80sbe1tVT++Spo2M/myfpW09appJ+Pxy/HEpLVNXyUnl9fmoao/3tbV
avmKhv/uzZUxTZuW2S9pUZUwy6NtzDJ/lfxbW80GSVPVbW3nDfz0uOAfYD2L
dLnMy9v/MCZdwXrqVyZJhvA3SfKyeZW8HSXXvEr6jFf/Nq3bvIy+qOpb+Lz6
a14UKX1gF2levEoW7T8X1YMt27paPo5K28bDn45ORsnPVZUFo5/e1XnTVss7
WyfhtzTFaVGtsnkBQAhnmaUP/3xnU9zING8bmseUVb1I2/zevjLw7Hdv3p1c
/vkVvaXH811epvVjcmmXtW1gjfB0VSbVnMCZvLVNk97aZoveyeBUXiWT8WR3
uDseTg7pw8bWuW3ycl7xwEnypmxtDdMPz/CEuwdNRzylWYcLHh5PHF/00Mc/
Q/nXnUII6ycPYu0w4FPczqvkzfBslNt2TquY5s2wAeiVbT5r4JF//fDm9FVy
+f3pyzEt6PqnK/r1eH//0BjcYQjMMwB0YbO8tICU+zFQr2EXsCKbXNlZVWbD
H2xpa4bsRYn/v6xWAKMYquP94fiYh0nrWwuA28JVNq9evGjuy1Fb1cu6+oud
tSPYG370Qn5vXmRwALflcJkubf0CHhzyB6O7dlFs9YGWQXo5CnYRf/VuBIBt
7+yDh6l8836UXD3e2xq/gG/eX765iDf/vs4reKzO72FjA9jqFAh3kABNJlez
tEinhU1Oq8Vy5XHt5Pa2trfweHKFHzZ4IDFwdo+G473h7n4/fGb147KtRkj4
cEjZyGYrAE5evSCIjJbZ/AkovB7Bcuo6v03L4Q/5dNrEX5+Nku+Ak9zhZi/O
qtfxZj13O3t3lVQAF8K0q2Qbn90BJgWQSGewobRgmMwek/PyLi1ndgHklrQV
vrlGX2P47yjarO714eFhtLQt8K9l1eSrBWEDvvNinhe24S03L/KmWdn9F8sK
nx3ymOPjA4RFLyjmq6JggrpaZXfWNnfJFeBGCp+lys+6zy1hG2kLzGoFG1qm
5WPfY0Cf9mPyp/Qe+Hff99f4XvInC7TV8+17C3SS/LzqH/ghLZPv00eb9Xz9
4wr4Aggdmy9sXfQ88C6ffYRNFHCAadnzfR8PRhzA8x2evDv56c9Xb646dA/A
qoEZva0yWyBid4Vf95SPh5O93lO+zdu71XQ0qxYvZo7dv2D5CEAvHpu8eeYc
/6WCw4ETSl5XjwVQnzFmOBwm6bRpESONub4D+ID4WxEiAsuY1fnUNkkKwrFp
7SIBWkqAB+C/D2kNTOIW92RLIjebsYgQHt6MeDxAluoBx5gVueD3Iv1ok8Wq
aPMlkH5t/3Nlm7bBoVKUHkgzD7BdYIk0m3w0tTgfcgsDYxR5+RG+rZpgAPgY
n5eJcK1Vkmfwcz5/pG/ck2mT3KX3OB4A1Jp5XS14KgCUvD8S8CzyLIMpzVco
xuoqW82QSSGwbAJQw1XDfmhpOn6yavB3gkZt721aNImTFsDg0qlujacyvMj2
EResICAdY3V7x89VIEJLmsztYZHf3rUyfjj8wMAht0kez7kqM1u7seqKsNEv
YQS7Q1gsAV2BkQ8YGtWqnlmTZhmoAnA+pb5fWgJC7+Zocnfadym+VzzCeS1y
QBHjZsctGnN+b8vkASgKgFkmb94nOhksv6wACfMa5oL307YFZFwhliGQSpgz
A0rKVmnBi1011iAGlW4IYr5tjicKn07pEXp7BtzdFihdFJggwgjogBm4EpRI
bWXgeRi6A0icvQEtAZ8BeUs8FmEpG55aRKyqHiSEVA93+YyO8NHgIgjzYTTY
L/D7JsCEpa2QGPLyvirubTYibQEXAEMj/wbOg5jigd88QUn5AlZ2D+PDm7Ry
mGyQAPRwxQA0UIEb2S8SGkIsxzEBkWa2btO8BFz0a3Po6baJIEFMhUMFPmTm
aXMHr8N5fuAVI5NB7IfpPj0S+GVieCmzINt5X3XVCialtzApUI4sy+gRIR0F
h0RsqAFkgm3f53ULpw+jkGKRgIKJyn+TCJMCnUs/M58/x9rZly8Dt6KqRYZe
LRmoyOJkjyMkckeCiE2gTmcI3AoRaUo8Bfa7sMCHsia5T1HxHQiRwGZwLJvC
+csODKASqmH5HKQ/0tx7JKAy3CTxtXSaFwhu/Azwv2GaikZCzEiJYAsQiEAf
pX1A/TSkTmGHyk5OkCwXeZkvVgvkEbAYNwFTjeIAmE+gmwG9LeMx6NDlMf4m
bY2MofDQFRJDCR8WfnsHXCtB2itnjwQqpDcwXAK4wGyoJKMVgmAEiE7hjHBy
EP2LRhlXuVpM8eDm4dKnjy0gt/00Azl3C4tCJRMfPn3/gc8EUZiUw9s6XQJx
EgxF8+QT3yQD+ZhF4KXLZlUwQ8BTZvMlln+AdGxfffmiAuFxWudZ8n4FSsAs
+dGi4keLwWG2X7//8fxreOmf8IdvyDCpwTCZzevb4d3yo/3yZQe5AixP6Kbp
igYCk5dxIOHhbJewLzrhDNaNnK0hGlwW1SNtMa1ndzkOt6otIxqSa2NBEiBV
hfRP/FUnANA7salnHhAMovrsDlTaDhYr38H1IHcAiknspyUAJEc236yWSzDJ
k7wVFGXDBQYRcxRXH3A1ZXW0FWL4Ssg0mzyZ/AUsDgNKuyMzQCaiJ08uoNAh
KxQ5xd6FZFmkM/glZ8nH3Gy7sRaOCZB0VQNQ4FgGjiuS9ABFG+mBFuBPA75B
gbYqc/ikK9Bgr6BeASIh+bOQYrbkeB8qIKdVSewCt4fwO7NzIGf6nfWRj4BS
wO+AF229/XB1vTXgf5N3F/Tz5TlYtJfnZ/jz1euTn35yPxh54ur1xYefzvxP
/s3Ti7dvz9+d8cvwaRJ9ZLbenvx5i226rYv3128uQB3eYriF9IRQgL1NUdAB
BsGZ4v7TxiihEay/O33/f/737n4CtADW9mR39yWQEP9yvHsEzBs1hpJnI+WC
fyUpmy6XNmVOVYA0S5d5CxrKADW+5q56KBPkOKjbnTsihkkvGcxgx4OBVqrm
xqii2pQNX8Dx4Tmg1KFXf4Xyv04QQxJYsQzx5ctobT6my86E/OHfNyOPQVN6
Y+M9YS7MShqdzkpnsAChiLyLJhXFvom4SOK5yBTkqQWNzeE7fItWWkPSNanc
hAq8WqaMViPQ7qzHPeu5EOh+Nr8n1TCChYw+AM5BpkvICFE+wIpC6hvovoCt
iPboV8qGlpt84Cd1+x7AeMH8OrZ8iZPjUoGBlvFX0aaveZ5oz9fEO8Nd58zU
ZVGsSfVtfZSwKNC3YYVFdYtOBSAHkH0ZaaVIG7W9hVfrCKe7x4q/NZVYFFMc
DHhuVacsVlqviVaR+YqwrImN5q0TnejbA8yaFasMFdDGroD6wfzl/a0ayzuc
r8qZ52SzgLNlyNXAUgCEF2Go9FORxZky4t7aWs0l2BOKApSAKP6RVETxow+A
r6Ltw8KEuYxhgRwuJLmxOIPdBk5yv3MzEKvkprzRQ/EKB0+DC7+5x68NSUlZ
1H1arCzr737swpbbOzeCJTwcfHQLAkesXrcHQ4PDhr8nk4Mlh2ePvHCQJKJ8
oAj+/PlKVL7d0R4OiI5LAhoIjQsQive5fTDmRG2UAjikLGJeoXkOQwI+/o7W
HCr7EaGskbSgIGONnDig0YLwZ83c3UhxIqpJx+5OBiM5+hDVAEHDK80sWCpF
o/YGIEqyZNUK5eDmQf2Q6Wxml6Bg0oJx/Ypf7DTIUcchawKGwjFVm6S50uK2
AgXgbiEbYPc72ZhkVOlbo2chy3pFzAgechBfyrZCDkAg6aVi0dWfZMLXXXNW
3DOB30TNSu/O6K6XD9C4BXtnTRoAVxR+YkKp06vUtonMcGdI4GwCPLeeN+9R
MYrVIX+68hAjIa1bDROxe4z5r//6ryRNm/tb8/uh/vm9RAX8Jxs/Cn83f0tO
ecLkb/L430S4JuFHKuH4o78p84cfjT4UPy4w2/RR+Dvv4vdrS/79+i5+39mF
/G6i6f2f9U/WPvqbvhupM7/xXQed3zxvcBb859v1lWyed32S7kp+/btrK8Gl
xMM9Me9zw337W979Dfvd9JHqo8+9G8H6b3+IF/0r8MrP88San5wkQPFN+904
Sc/i9N21WbqTPPHusw/2vgtcyXx+lXw1z2+Hlchojht8s6Uyuydi8MWYN6Vo
NOuc+lnlNpL5CVjxy8ZUM7BkAwuJFK9wWV++gHawyyqN8FtQ2BowkWckhGJ7
CSXmU4sAjjyJxmK9i2VQNBL5GHtcKyqHKUgTyEYRC/qUOF1IVovgBkk7Q9ew
qE2hfbYXramxZYauhvcXYD4H0I0FbEdwq+TqLMsp7QjijssmXDAsYp8XsXEG
Z585913vurz2FEL9oDv4mj4kpk9neNYyFuhQxhGdAhS4b9FfMUW/cRcbYNrD
Z6dFJF7HI7aH1JDwVhGu4cPlm4E45MC4y22RNQM1JDxoA3cP7GLGbihY0VF3
RR0MhZGaB3RSERiiRbG7nFcq4FVT7/jZfXZQ1XbMfk+XgkOKrUSQ3rJnc40Q
VKITgeugivatHjocbRNSwdJf/ka0iydz8bLdcURDgjP0TOwy9ejCi43HA636
FoieQ7Qej8xXXyUnS/QUig4ZWtcESQw2OT0zfBJMlbdp+cjWp6ayTG0JlqbA
iIKLRgI/ySytgeU0Leqm6vJQ1XMAhghYvKmETmZV9RF9mNufP//x8vvTw8nh
AXoEKXEI1f0Z73g7sNF2dQnkOsQYAQbB0gKTZCidhJykORy9kVGPjveOyf3b
kQbo9vlIiv+SIwnieEUPKsxBsYRbO+AolHrq1VxhALHNjZ7JpzY9WoM1uaFz
jG4XBNf5qhCLeSlJDXXefMRIa1PNcuKCBK9l1TQ5xnBpInyrrW3aLrrRTbR6
m9V8ns8QlyjAccvA8ao/+/MNO7OZbsQ7Xs2qQqN+6PtFWy5bBx/FYzCEUhNN
FUBsBkctyHwsk0UFq6gpX0VC4HD8FHzCnBY8VMx2gZPBU7yuajyvbqBpR8Af
RcFAdlYlOgtuVym6WSzyv5aCI+TCluQgjMdVm8BPiwtXm0q0tBMD8gHl5Kpa
WImpGNoGB9A16KgY7d5ubLtaDhSQKczY5n+1GYcSg9gN4F4Na31IH4kb8X6r
/hXbT0tbNnKQwaJr54L9XXKeRu97RqrhKvJhoIx4qPodXAr0NMtQaEnAaeQG
d4KBog9w+OxhbWB7ayFRGliEDHsCJWYzZPMV3bBtmqVtyjLo5PzkjEdtOCj6
u+TMAlFQukEUe/poH8WHCsQoGCxpFoHwNV7MRDKXpGYJywDSKIBlIvMKolkY
yFMXC/rPPqWI6cT/lFBd9JH8UcAtJKOjk2PAFKThTsIfI4KZjgszneAFjH4C
kgW/gWTPLONgjeESOnZcVHFPxnw3dQF26qPOLs40SJaY0jfDUwZcz+drURKd
nDwttrBwHsjKVtNF3tAZJCo5gtgQfY1IRV4lP3FeAz9D/bGtyI+MH2Sw1ALJ
UkFC/tAYwfHU0PuVtI9LBvMC1FoMohWP6CJHrCcGhpjCvjkMAZ5WJejaK8kG
/PwV4MRwFn72JfDcldZmxO9Fm9mQVoK+qmgM0YfME8pJHlgVqFz0arAI4tD8
gD35sKHEBLKKxEnoMNeQKD/IZ0a+MDg0yougSAT64gYb1k9hLORBXqxKdPcu
vRffK0bjjCeQJ4K5OMdWIAAljwrJcSuhgAgdIodVPn/234KloF5P95Rzm5Pv
b8BRfyY2ZiWU/0f2FeIxB1GDhCrdKNEeoFrezNDwwl/X4ID09Q42mIChhkzX
CCYjp9MxHY6gjZZr1s+yQr04T8mp2ANgisoZnyGDYVWgHqfMiVQnkIA2Kr+S
5XS1tDNgD5wCxegoQMCYrXO0R6i6htDOoDQbIh6Ca4JDWT6nJBpFu4TE+ELz
lRuRWUY36YO4lOIFkkpi6WnRVD4wngFM27zphz2MYFKGKiXjyF5HAX0yKhBK
uqycnoGIxAqUepIkBKZsoCGHuWQjcTiyRiRygFg98RsahV8AYANIcKcfMdso
Ol2xA0jYt96T7sbGY4hQhlIJhBRNrLxLHsT2j+dvd5xhDQiDhjpvDzAcN51Z
ysyh+SUQYrZ/PPue34op2QtVEb9ebUR2mWyjUN3RgDKofLNchOs56C6rgMf1
4LbgJGp7vHOKztcutSdzcXQkTsykmUvsRR37PiJAeS74iGcAjRgn69zcxaxC
tk78XAKm62sV9JJsSPzeByMGeMouwoHKhlmLVNgEzsXryEFABI0fVlBQI2zZ
hm8eFygs85nx4YwRq0juKx/piFe3FidJEzhdnmFtZfA0HiGA6vNnhu4wAMkX
cj1RpukGwAwQvAzdgYZKjXAYFxajtK+frmDpwAc+Ka9Sw4tCY/A1MS0MCrRF
M+RHTbVMgdyS18uPltNzYLZ/e7f8+B9fmxUIl91D+upHu3iTxZ9k884nJzbN
8CPD7Cz5jHcN9MnkYzb/JYdvk+DZJIV/6NMv9OmVAv7EHUk8HM52jCAKhqKl
wWeL4DO3E0GDX+AV/a5nkmSWY27zL80KLOjmD/uj0eR/7R4O97/FhTnof+09
l91jVPflCWWKwymuUQS6L9FDwCqSW/fAQ4gxNACOS+BNEbMHiGJezaYEJzxe
UM8eRxIVdEkxShJNQL+SesRJbXLVQ7WjKKLnKe9RDaA55cVFcWmaEvAERTsI
FtBiOHUR2TRRvvg0PAZsHmsTF3lLnOYaVY3PXwW6CINyox7juV4aaitMOwoO
+BIDZaAXoGEHJFcUQi3CxLvqx3XXfxnpQoYUh5zcLCV6ctjmW2dzVjhjQ+lU
AISQGez4gCp8hAKiREmACh3ugLLZMX0i2DloIatpG33rYWHMpSYpumNq6Jl3
L07AtF6KudT9ErYQ5B2obGRI8BQY29w6nubtFu51i33VW+QcsTVYFxivNVeS
KdY3Am/e55Kheg0LIA+AREp73qJlE3U3d7CphhQwgQQ9wG6g8GMQOmsWkMtv
9gfoh/++Tm9JbQ4Y+aalnHhjOdDy6Ps/ZMW3wHL+kLXfvk1vQZhwFsV2s/Pq
Dy/gwz9k2bcwBvyc6XNnmOsnCn6Rg9qMR6rEjLkYuM5NL3+fF+hjaC0Z309N
8zadAR+tmrsEc7iZOCgBZNM7L3Ar5j3ddOJ8Srxo59LNWX1qMR0Jlzpf1WTn
dAGCJ35CdzSa/5Gc8Luwu8bKvQI8f3JHkBFKr2Ci3cU7xOIGObYoWWXwBJ+C
3Pz4FZOcUnqsXgUoLL/15vzqB7JLSTU4D7U+Y6IATKwRkluV3ul4Lrzfwut3
I3PSUfCjkSOHv/eIU1JNw2GoE4kJDTlwFA+gQl9Tb0cYbHqP3hx2baQ1UGuN
ESXJv2E/EdmXdHySOfhXIELLCcHWcaswtd0tmG6T8EpxgSgd3xeYQg9YqPcl
SWzrzz/xxNv5ziD4dHs0ot91rfFT+ik/9YVmQUD2ZTHikpQPZ6xH8l6HaCLk
n9hCCOma0/got1Ds58Du0ujUWtDHHVXXYgM5bZq7FPktYFwNuuY24AXmV93s
DJJlseLTRQH+1HwnZW+SJunxcaASRh76WF4Y2IuNfuPif2x3s07FST+Zhlsk
B6hvatYb+1eFJ4yy+40H6/YxnR0q5OGnu4f8MejKPR+T97Dn8/MOhJMrhvCV
QPj4d+8ADG6I4XsHWF1hiDsaeQ4gp9pb3+5Ub8MpvJhM/g5V59InH4KCMOUb
B9V6TqJYHCxq8WZojDSiioxMFCCLPT2//tD7k3T7T10YGx47KAozIOB3H/uh
L09uBr+Gv3rhz1/qAZCDWgxdnpYc05Id3L9Ef0qaI2Z0GLHKiB+o/RgfKhE9
GwZkF4iWGgkHHOlSXcafv1LiAzEj7oXQF+iTFW7khxux3pjHs68iXdcZydWs
Bn5oXeothI69eAPPvTnDRE6XUBbtDLlU0jHs4Z0FvqNTBebzxmmWHy9vyCLB
l1JxyRBqOpcIAojslu5sQCZnN96c6TwAy7tB2xCeEUGkKXqYcRynYPTnRyPP
/UXBPIgF1e5Ibl1blz5J1PRJ7y/Kzh4Rweh3+fpGLpOE6kGSEJCIx3OCx6ku
r+vLgVWlaQYDT+mARb1X812QAACm54dj67nEIFPg0MbQ3jgegnB3ibhs5+Fd
M7Bi4QscSL5rBkloOQ74Mkhv3jCnhshFHbRW0mInQF1CLtoQLqLrthJAKuBo
Lw6eTFUE8JtZe8PpH6fe4OnCg6FGIJb9z9rwfDoMwFAqlJBaiAcwEfmQyQag
4VCkwgykGwxZV8DSGBLio6uYSQrYfLtCgwTABCKg0YCreCZWdK3iTRmkfA9c
QHZms1XdryvB/AOHeN+AOGtXy+/Sxl5tA/oNki1Z9daOgf3DA4wy25KsvTtI
CE2I8wZ/5OsJfr148mvEp81fM4bt7JhZy3PjMkdXgATbsJyBUtqOCQDsF0mP
8AbhEdLZ9J5pZhmhNmgaSBwYH/NgVkk1Sn7IKV9gg3bUJXmJ/jLBv4dzA2yK
nkGaqDy3XCc1T2Yd3EOgbeM9XDbW+nLqEVEsZr7nIWLssB9BbxU2LplLEzDm
eZhprTc8yel50xBXWlM9ZAMjQ+OMkjeOgyRZZTnFIfAlIbcCq2x2p2sm+4/Z
Du+/dSsU5NDkfeS2dV3VPNVUpiJgRWwpnG5dGPhQsTprZRoPlVWJWeCyPzTW
mdkwAPzy+hY2eZa54yjOFRZJD8fIY3bluBhzxIC/e+t/E6sn4RmgmGfixN0V
YOgnFssvrzF9CcOlfNkCT6bDxIBbngkVITbqxjbw4lCQOdRnxzQBjVKkymQO
Jj2yMjxUodFcPm6eA/pvZ34EEeFRwouU5zjGAeyEqSjY/v9vZrjOri+3ablN
h2f7m1oIo4CFXixtyfzRscYNeqUaBKhYioZvjPLAGLW9oA3UTDXUbwKmSEEQ
Hc7c6E/wld5PveUKPXazWi3oKG/iJcZItzr/RBdZUzWBb/jfG6EFv1LPNtG7
Az9u6aBbiDAKMDyU6+jaEDv5eHT46WaRftp+Bxop2CH++tK7UpjSu483fP3S
jUEYP/cGAD5Wkk3RTdoKSR84yw8ONkkNL8F2SEuhlDNeXbQWpmBMIyoKGNFB
+xeaTNjJudzkS4WEZGDiRcv6400Apht59sbLGcmrEqWZw2DIYl3gavOOCKg3
+ccFyqjlSrJpuZiKGx/BK+f3Na+hSYtW38hdWq8qs4y7rFtt44ETmwv5FwdB
u7AgpvahsbpPzEzq36aPZeNGMRVDAehNOtGcHwEbgqNBRBgGaBDETRu+viSj
0zAecDhaF3ZaxwqZKk7ErsA0KdIp17vZgk+3OPdYt0WLXt9buAVBwxsGSrR4
QOehHnG8fn6nu4F4jTJgZ5U43hZ9tcX5yqrth4xhmfpUBoKMWzlqgz22i1gu
PCUwwMUSdGeRh8yAbpYOhfAdz5/YJ0nyqlHb4Ci2DbqY8ysMAse6AmSU7Y2S
wCLojvy8cUAqV599YHPyga8Nie5A3tZvl5nC8bwoYU677dkmsR0TzwnPM0vZ
DljTjkEyjuToIInf2zHAfeAJ4Tnb+MJAuC5IYYzcIo/CBxCht+HpAWM9r4Ke
0BVEzzDCwVOlWBdsVciILG35TXh4y69LbQ0RQ27x8boDuapemL/D5LjmgDvW
ZEBXCClnpJR0pSDbEptwk5jtI2v7fKieI6iXDt6nxBFHTuiXulGwBBq2Fx+B
Z0TvFzfudRpvTUvEaVEF6RchnnmIgomvcG7PkkpAWaf2DdYRFDMK6WK46jys
62w82EAB4tDCBw4ZfEUBTAryhDmAlCuXotvHObY2Ju6ziyX0eBrb4yjSpLbe
vCu6YUCe/qznAktqfssVGX9tnR+nsAu5diX2YjhJibNtk9IiSlB1Ak3KX7NW
NG84qtCCawJAG7nY8eHyjUqJTStDjRHL+6BDkTyqsiC8FhBumcxEillvf/5M
cdMhJTNQonevORVf/nHXXNVznbgkrLcnf3bXqAUAnOvGCZU96bJBIbHeey/+
rsJJ0Q4/oGj8/PmPJz9dD6/+dPqNu1iAlxDMWg0vrJWARVCap1GMnPZ40cNN
ZsLFo8pZYL6cS8A79fnlIcCFjjfO8yTar2WzTikDLkB890igbqdUnSaIqSp6
6/0VV2UCU1ONS6oKsCrvQqf3lvxayoQJiGtWLdHd6/3LUpDt6Ss5WtcFrW/z
VHE51WeDmzQ/o/vY2z8JfUk3v4JlbN7SIP7ebL4sFNztSWezqg7DRPVKktGj
WmFfmzhn62h06G/LjCjk+dTC8nlCKd1yjQ3v/PjrVWs7M2vXI/Xan2ShTcZj
/75nCGs07nQNOLWf+F7F+h0sOY9BEl+i+m9hgVJNBlaOS8arNasmYY0qNRFb
E3ed7iJkaxv5lx6hMrAAIIypJ0KU/vZF4BOSjSB3i2rwlfdgoaxxHeerW2d3
AWr3LvA59EiIe6BnKMHSsg/pY5ivsF4/oYsemqrUi5s7SrClFX4hdiNzwTLe
aq6pwq4wTUSQmu0ebnOQrMqCbgNS6mPs/CRNg77KLJcGm9o5XV5C1kyaeNex
EqCoEh2P4jLR3vgFw0E4R4yk1ccDumPjvCck5ltK/r63YYiV7pbIOAQwzMEl
+Rpe8w1uRFIKGw2ulcE4lRykZCMbycNlmu3dT592QgoQrx1fyonWPEtLXPFU
oIQe7LLNC0GwNq+tCZI8lEOKzeJupPDwoNljOndEakQSu+Mx5rUBwa0Egdw9
wPFod4R3Ac3nz4JDwZKQTkLdQNi9l2rhre/opmwaz2lpZbTjrzv4vUYgNEvo
+WINNp8/MSgjo4MNOfEIjyjNmX2lUhjEcWW8cZYWuatfJRnCyKzTRm97hOug
67YOLThDPNn/9Ck8aMwFZzJgGvB+gI1ClOKYve88dVOmS1pBSsy2LyPD5WpX
pRYTZRzrqR3o972Dc6yK1l1V8JuT4bACntFyK1Eqztot2kgt13tYUYWWXwOw
dR46x8QP0PSQpLG28KMDROeewGbgPnHzWjkfbZSTGjbxerCWfGYsuodDbdyY
tz4/n5RQFTwuKNN7vykuqdN3vUB4UlQGcuMA0Z0D03/nIPl77hwIAUniLywi
gInkB689shWl/3YAHPPh0Do0lEks3wsUtGaZ1OzSm+q+qkKcsCtL2ZisC2/+
I1f3H7m6/8jV/fW5uussoHmeBTS/gQWoYfMbWUBQhvK38oB/5Ov/gwf8gwf8
lnx9h7Gn0YGDTuQwlayWoKLywN/BfUCs9OXk47p/kQoPHIDbS+Qt1+LQnNHN
xZ7CgjCdiSJHmCq1WoUgrN/KCj/HknwlKldOUbxymrpHTow6LRsyF4v0kWt2
Bh6xbdnMQLNufKVBRQ4c5PqUKg9+OHuf0FBS/zMYaCVlF2dYwsRSJdygfMYO
R8tPQL+PqheGI4QXhlFH10rTWNwCb0/5soZ5qWHP+con263fxM+1Ar0WsirI
H5Bq9Wpfhbvjuuz48Xa6XmCqSCk2R7LWFmH6GHYFQbj2O8HDSyHOkAlCq4Ju
3WU+YY/tjDxuC8EM4hLnnArRar2ShJNCtQAB+2CZbmxGWcb+PjfV2Ojo9mLG
OiWfXmDgceWWLmQ7Zic9L/t0L7gL10/ZXuKe80eWdOkNpC0Wh7jL7b11NiTK
USnKc1ulmse00Sp2Tggjq4vzDZTqnvd8v+YiBQMzq4pqFnmentnlRn5iqF4P
6y3sCeKoALE7rVqkbWG0vqziWTqfy2156bsiUEHHIXWoweP0xYQJozrZ3p0y
PFJCpQnbNgS1zNMpmPwjdaQVxeNA5XdaSprQZb/diGj6scRLLqSzII8JSm4z
UKjWDtZTslTkRNJ52rVE9/ASVmCfa8oPZVDBLxTjhNPGy6CUbdTj5uriDC5R
8ICKdtGAsP82yHVMu2X6+rnBIHm0gfsXRxZDOU5p1jLfI/K0g0jBeITAg15i
gPXiGC9ykOQjOxooO6WdeN93OJ+3gC90UGEMvHElWirW5u589e1uRFJLlikE
Ri2MHG/p60Gk4iCdNoqU3D+AJrT1UFdjH+mqWp1iwaxE+0ExB2cZwrgvofEl
KazE/BDRgDaQ+/Hss2rpsN9o7RS9VdemHIVh5b/wM60VquSwMbwSt8ei18Fo
kSq6l1rPAikHi8GYyOEZlpeRFKVu2RLMJ9BaGiAwb12yT6/8aXhZUixGpZlU
kokrUjSVE4BwXgZrz0QtiJ7mYgqw9Wo+VDElx9NUihaNwfc6ktGZxLAtDrad
EdJmVB9Ed5871UVI3OW+SD+pD8sKHseaHFw4w9U7YvbqlZZmYOzodjSgIkNY
lYo6ArFZAqPkJQbABuyfKqlhVEvVSEhFi1FghCzEUFB4lnLxiaDGHQD+rqyw
aD059zlMTZhzevHu3fnptQlq5r0c7UXBlrCj0yiu7TSrVkXmy8EkUqPLEABy
upjeV5JF+5E8RrBAUSIeu0YL/QDpGq3jFmavOIpqEjeXRc6PHUTc2VLhLipj
GcwzSigky+q5VLaZSdShsPdpGR84V7dRxJBxTBd95GjjYnmakaX6AJBM0E1l
1KE/jC9rRoL6TVFMRKEsLeIYxiKaiPpGep+x52UJWmgZxc+f/3h6cfEjWDbf
uGqKa8UUQd3OuJgRN3uqPtpSS5uUj+vdyMJOaYapYqjGdvS0oiEGq1dYW8hP
FIBG2DcHY/0pDgssErahgKKoS48knQx8kpIzYL1iXxNTf7fgT48QNusKlyN9
revTYaRBVpBfoWhJpgtC7MyliQGo74T8DjD3AvFJxLDX310rCb3RsXJ9TeJe
apEQxBTHzXhABSFwjgXh8pRXMgfTy+3NYe3UZ4JqN6816BiFjqI43vsOl0d9
EnTr3cqCwmfkVVQCwvr+TvnskpSPapFHP0pfn3Mt0PrRp55wtkoKenuVaT8+
Cj1Q72CuOnry7uziLYJpf3x8iMwxFoSsHdDd5NriMSDycmsQrNBpHAJwiIlr
6w3kWd6l/bQMGi3GRpzqY3q1lHBSknl6DF6pW/tMJWXpXMLlHg01LYt9VSpf
gxQ5KcYSMSKkUTEVNtujZDeWz+au+RjscyxRAvXBrqPaZV3b2RCf5wi0GFoM
RG+Hhqlh4UwEJ+ELZuPC8zjTqulElnqTsoyki8w7eWA8tEv6EsmYul5yNGKQ
IRFHuCN3kKv9xr22fM0qmiJIBGHBx0SmRiL7aZ4RRrnvaBTQYW1FDj+T1tbX
fcOxARMHCj1z8TtAIS2IPF810ZBaEBFMkdaIPAF5TjkEVDQn05aljrw2Bhwp
hcUHLFG7du2eOsr1tT/ATV6gLhzuKF+GmBKXyvW13LDsMOsOo+T7TqvDMA1r
QOkuXOM79C0+k4ywXv+bLSPNOiKVKcr28rakyX0J925g3N2h7g6/lkMp2fK/
IiVOVhMwXbfTECOQg4SJz4HHjNPhyGLamPsW4BWVLXSyxJ2/U1hzunYNthsJ
OMkp0VQErE4JMr27aX842+yvpAK9VKubMIWfv6tytkTxgklYmy4qzLVDVwRy
Lj+Fa3Wr8TYVripI8ugyaJ/UFUBPUx6f7KfrXcNYWTGAsvGKhjTCCY7/T3nK
/JFP7Ht+C8U/fggs7I/fX1z+fHJ5dn5GqbOTvZeYOqtap/RCDReGmXG6JMfO
MrsExDRV2FJwpUVH1subWtfrbbbW2XO94L/PZBQvSEfhWoOUYkbbAvEyssx1
4x5axFW+Ss5siQVE4eyvuEB58vmrrMJki5MmcK+qbSEF1sW1Ie2A8NYN2CUJ
HXpYathNqwn4aldJy0XxPuz4K3pcTJZdlM/AQ003S1CFVdYYT2HnMFUl506U
WhM0+NopslEippZbl03h5LwtzBZZxBtjtWpWoJObRC5y1NIQyD86z6o2K3oT
xFykPZXCrO4bXapliBMr91LVPC1Vqe8T4MOKUvTIdGmCgWUqHt84FVrvgXBK
mC6TW0ite7KcroCpjJ/wAhQPRwdGhfqbHqPhIWVdrOv84dHIDGZmD6MYGoWS
sNi/odFoBp0aHxGEr0L0seg/5lsriBfYmdhjRRoKS988Vaq0OxyjCse0dGCO
FQuakJBjWFjJCIPPdKBUy6p8lfwUtP+9lnQhdeudqLPt81dACUp03OEaO4aR
WdKr5QYqgq/FTBX2qYIuYGNPti2V7dagmogA35XcDeN77Xr3+xO66FoMYz0A
4OopN+ICTY3kY3sWOMAQX+zsZFMlSDGm6/2d2tNoQoacJtC2AwGLI7mCzZRj
imgteg8lNwMbL6TavQvBgTTBPD7WU9OyKh8XeIxYa5UQTA4o9YsiTHVeReE+
vA+pWK9WVUUV9gtpZy6KbCvtzno6VspkzmOFcHkgnQ/78+kASGodxQIV1aUU
G6Oh6bYTQsly9AT4HjVXn6+dQDBS3Ew0ZI2syArONFFTBMCfNnBNTR/FzUZW
KTPAxrImHB+q2vFTy2fuElGZ1HsU4TgzNQ7CrWPmkxGpxmdjezeNyw3VIaLQ
y6CrKLq+r/1W6qBbcEdETqAjKVNr7gh71IFFpmGXUKYp1YULUka5HJR3GiD1
A6KNzDU6aTHg4F20ihw4MjBf+ElIAY/yzhZLFyN2Pd3pTRJ3jaaaSyABpJ3r
NO3isaFz9dfGCdevcrBh6gbdrACo4qZ9A5WNqXRzjmEE5gKgeMubVl1ImrWo
RwIVIrBz33C2BKq+Hc2BN0fuZ3EuBqEITQrGva9KF5/wTprI7JRiev7dpvfE
u9GbJy9JOKuckhJSjGuVgtPYDds7lCghLG7+qa04+FGrTV3w+bALypQqDOS3
6FtDJ1hsSTRUe+PJ1qOxzRf6e/gKDQC+WyVM7Q6nAK1KYNtNS1hU69tRobTU
9RE1aAVP2Z/LLcEjvYVbFdOLUYOoZH8ySbY/lHIBAuW+OWV7a6eTuX4SjkVY
g4w4pRHCNPB8Hk7Mxrlb5Xqht7UC4tP+CzRyJdEF/qP8brk+G1X44b6myGMv
ESKPyQnTd6fPtUNbOXa568ZIjO9tTNIPvNrXFJWlNvDrLYi9QksGplcXN43H
eSzqWEqdrxXRrnT3lkTDjbvB9V+eRR0Ai45b6k7C1erji0LHrvA4VbyRTub7
R2O+NKpK1pAZMzUhIHbhFCHfl2rVxJfLQM+n+ysMS9oCCTEJuHm5rQY+bVls
D9XFUIW+5ciSCQImqLUvMIkGF4XKomeU8X7DDgjYqvX5O4urtkItk9tVw2rI
NiB1Axu3pAbL7QQQ9jefAsJfVtJPBTGDdNfgZlsa9ZAxD6ncTmJKtETzTg9k
FEN0ejFJLs+//3B1fvbL1fXl+clbuQFDtLct52mOR7ujfQQon+TRwT6fZKuj
7CWv9365PP/XD+dX1/Dvv5yfXp+f9Q2VwFCGB8KezUN8+5s3w7NRbtv58D9X
+WyIHm5tFJYmP1yc/HzyZzCjqIsFGyloyNmSblIFDG8b0NIF+6QjFl3ux3sm
eJyoTvoOWwJF1agqLZVKoh4bRNYIp8BNLIWSyP9IWTj1aimh1JpjDH5w0xk8
6Ruc3ZNYkX0oaLqwqCbmzSLo3B27yELKgllZfwGcMtr+jemmwzM8xavapJrv
GmvkvBijeTF8e5BzMFzRzDAM4Nus8B7UpcBeHww+O+U70gGfjwUJfBxM2MwR
3hOrJi6CTPaJECY3DWQZU1TIquPLZri1vA0WKo4LD0N2AroQYJh6Ner2J7Of
EP45hqNdjhTpgUGi1ChOccYzaNqcYnASjyvdOI66JYUMzSCKHuJlQ5KIy5S6
d9A3aC1pA7DYuaCmAhbz+ChegkBOYUcUgE10VzO2K6mIbOhl1IRtcniSuaSR
CMyKpmQLQ0xxvmpkA469Os1Qi1jE6btcMtfJChdD1q7ZlT9zYnZ58xGDLcrk
ye2KKRxhGoOr51gt1con/V0N4eCmZmo86v2kfpb4tmylt/GadG6l/kITW50N
bKaZA55UfGeALdAwm6HT34tHFdclNabjA3bdvHBtJGZRRzPeL2G5K9ccD2bB
hNhZ0pS+piZdK+p75wHIQDMIw9CJjk7iBWb/ilMKjrS6LdFc6rQhCuZ0ISKn
9GDtP2eiSiFCeRqNIP+qZjIKZy/BTgHmzjlZzmxDaLiCW2mQxEQ1RYyEbNnN
RHAKQEcDa49MQRSK7lLNuxMpouSj91mmDktPiuoUCUIcWAcl35TZ6TMWjTea
U2peOKS8UFWnezivy0gMM35Q63F1WHjJQkCMDMMZolC5XoeGY5pRMNanXJK9
I+l1WkGr8UXRGm7TSREFb43VgfIlsbeqaYenvn+W5uZrNzJWZP19abEHl/ha
0HZLE/fF9HJxRlW0DDn4nbEGihNWru8CLdbmCHbBHOhv6NqhFBB3CXJyyuIm
0OvRAdg0eRpjO8gBjWcxvikhMaZuBTanXPsFhXYQb6jx9fPUyulsx0eiQwsa
PdDqIyLfWbIg4cNNN5cAHGAKI5+GHQEldadCjhS5K9I+fSk4WCUToDjYS1G2
2UWI7IPdTtb4hFGEclF4rJJsBIoUc94m04P0iiyKbohS1PYH63Qgbpdyjhib
z3WXPERtg+1Sv53A5BCdQLbtQBg4eaM02OcrEKVN5HE2nlvBSKC6jBIqDEeI
FiyLs5MLEqlh19o4ZtxNXK80GuTW5YCvNn70IbpfJSYak0XDfaTCFD1pXFS1
QFZyEwQXrcfjN6mfTB8DuIcYJq3plAtT2S3xm1StU3GCM+PLzu/FL7p2x0d7
8RlzUVrK8HfZ68JtNBUYlChS76zvmxexMuIprKEV1uhRMzNdy5ns7xnNpn1M
HKzb4bjej9Upw7Oe2TsN6vO65lMjeO7ff8kzlTgmxr3ubfKcb60EFXRbYou+
sCua33oQjaXmjH39+shzfkdWU9j1DC/3rEHgqb0G9eTXChivbXLE9yBjSBL5
pktCW2nxHKllfMCkwZXYJdIP2xgOzpLcDNCTuYq2nezkzF3pnUS6vNB4cwlM
ItQGYNtFmE3Y3+yQtW1U4YGrrlCY6/gn7tajkepd3EjO1y7STqd9/RilqrNW
J9PugNFFyieaHDKh0+Ko/4BFJbVhEU+hPLJ/jILmUbTJbjfZlS+YJ/QmXniV
7eiNXyyqTF0slXpcgslXG5pOMu1fBB2h8bTO/OWmNXbgLz4BR/hAw3aMM2yK
LG6iqB0x9cD2cSeHU2RvUM52ZVJNAwotad/DQgUF9gF2bbmZLrSpuQvEoTG8
TGEV6nEPr7g43LyvcvS9cdABoUsnW0Zlp9mCyUBxw2QXCVm21RLTyx8pC6Np
V5moM+rGknapnz9fnFWvwbriNiWs1uvSjSQGoMnMgV1dF3qUKA/VhcXInMBM
xfyvhDd+eb77dOcgnCqznkqvu3CdcXMK2NyCeetb0JvAVtKsNkUff81JK6ZR
PkBazvCWqdPzeGx4FuRdnJKe/HyH92xRDgbrlDeQXQY+4kG0TrPIs6yw0+qT
RZLgU/dGoYYrV8tM7sqh7hIoTR0osY+T+CXltwfZi56zBqUx4qvoUY2+9SNg
F7rgNBeFB4vQasNgpGbNKcC1t9jHm72WeJcBi3q4kH50VNNH/p2ml87Yyogc
AehZaZI2id1omG5eAfAimqt72aa/J7PR7C7JiGg4QkkMyJ0Qc5g3J+9OOrzE
mPcFxbP5oAjMW0HJlS3Cx4Y8tq35Azoqm1cvXjw8PIxyAOKoqm9fcJwHodm8
CE7iW6+hyRiSCRvncnZOz0XGwsPuqW8yMD0VDziIuqlbIgJhOByCkT37SPBA
C66wLVZ24lbOxDsuA5NWC2IZ84d/gje1KLYiJQ3+ylx+uLr+5aeLH76h3zEh
+RbkIY4xXPIzyfDfh0U+xX/wbwkW8ZIy2oW5uuqqsMBvg96xvdnYyn99kyy0
x0bJd1yzQWqibq91CB4EBoxeIPaZgT5d1bENOoJWq6zukG7hunLd2U8p3jQC
HSFOyo7W6hLG0mmDRXaQgUmq99eGtaWa8s5Vm9Wu2jl3UL6TLMpYiFUqKlVl
f8JoU1tJo2jLNK8phhJN5wNuhgmxSc5e/3j+dvt/Tg4Odl8Oktc/nn0/vHp9
Mjk45LLewbhlwk+58TGRkD+iLMKj/WNNi5YHA0syl5KyCNBhtloszWy6u58d
7B2nR+MM/ref7R/Np0d2L50djA8m6fj4MEt3J0ezw6PjbO/g+CCbpdnRZP7y
2O5N5/PjPS40+wxYws5CvXfuOpmznZangZLbrY3rNzLeHY8n491Jun8wOXq5
vzux6aGd7+7al7DKl9PpQbo/mcxnu5PDyfRgNp7sZUfHR3bfHu4d2qNxak22
lx0c2vF4fAx/d4O/bo9whOuLR7qoFhZxp5q2fLUlsmnpLMTPo3qo8ZULMBTo
4rtRoYQfzqMyuDfKDwWNRiDhbzjf24OXk4C1yWFYeEVIbg1ssL/9o/2Dg/3x
weHxEfx4ND7aG08PD46OD3cPs6Px4ezwYIJgmh9mAN+5P/GweVRt0+y5C9w9
0MPwpa8osFi1K5KFvq122NhkjZL6ChOYgHjkzavh7uR4+MPp2+i2QBskWDNh
RfESEnda/VmNZ4+JI607jPXVGr0n4EHfdT2u0V12BACeZ0cHu/t7c8DW8d7e
y+NsaifT2Tw9tuPd9Hh3b2KPpoeH44PxIVDm9GgCJ3M42Zule9PgFGJa8a1t
+qh9Mk7n2d5eOplPDg/35ukcCCGdzQ8A9eez8fE8yzLgBWmWTl5OJ7vTvenL
Q7t7ON/fmxzOZvMjaROJMQDVk6hYveORPlczAqYYiVoaiKP/WgxxwFqaqyDq
LDVvBT4BW0GyfnagVPzboW1icB8eT1/ao4N0fHAEXx4gT5ztz1PgkXvALWdj
IJT54QS47dHB4X56OD4+MnY2eQm8Jzucz+fpJD0G/R3Yz2w8P9yf7k/HB/10
JNeZ7vLn7zRRic+wKt/AhEl6RVV9BHNeisd66FFAGQtFdiCHqovWUqJRX2i0
RhkOmBAveA06hnldYaVsznfUx0BN06yUIep1r9aLyrnvuSnpq+ToGLSeQLnc
mFJCFRC+7ZM6Hei4wH5Yq5gYgksjzNvn/bBx4qOD6WaguaEUfF1gBez7/zGY
ns58CuE0cGVeXM5Pa5wj2IVsi8c4g6e3i6KncirlQMTfmOCbUXLSOSW6tVyz
11OzrdGpx1y4Wy56bUsuFuLvY4LlHFT+DMVqPFZvtaEgnYmziOv78Ab2hhqU
potCoXKoNxCd7rpNTqSmlVDpX8i0DoovG2pz9qT+sz+eHfsT7wZUiJGybiJt
UThRQLTDXr7dnePlbAwCYXpwdDR9OZ8dpQdTa+cHoECN5/O99HDfz47IQF0X
fFnSHlzVMFAT1qtZ6/wbNcsMCVm7BRVasUFDliKcvdRJqC1HNf9vl8Ljw93s
cJIdZPOD473J7HD2cp7uH+4ezez0eB/0aQ8RWgE7ogjg3KUWr4qkTePxXNsW
uTYSlSboyQZBuzHbkYHASaASvFxrdrS+6XScTg8Osr3p7vHu7uHL/Zf7e1PY
1WwPIHHwcpqN98YWVP7jw5eTdC+bTuZ7aBqks8n8+GV6MJ/5Pa1NlkvDH2eM
c4OStd2oVkdVB+aV3A3V9j7xjrDX5mPrs2MiaFBcdTtQ8Xa6u93NUvsSpLOd
HO5lkz17sJsegTSfpfO93XGaihj+WRfsOiBRmm5nfwNdcOIXzF1X3M7bygQ3
sncnvHZ6qLsyezAZAwHNdvfBaBvb/fkxYNTBQWBS0e5IwQobR5GeoLFK0aai
6J0ynJzcnOxSou9pI/lflUwk6B9AeyONrnGbZ/A+BWvh5X4Gxlg6m832ZnuT
NAPVaTadjPfnR7PMgPUIh/GrrMe225x2bVWhFHbqDfLOix/NGezjVfIzBiYn
R8m/wAFOxpPdZLz/av/g1fgo+eHttTnFu2rDUy6G90p16AFAadi0VW2fkdPN
mpzee15O8w6+DRnEIuDarG/Q1qdBDPbZCtR08ka9fOS5SbGaVNsWWnA/QZDI
rezIIlLcikssWBOp8nkr1ekyl+7JyORYdD+Tp5BoqM/3tYnzGkKE0OxRPJlh
kaTCZlSWssGe1xw3tdk3W/O00KbWUZjSJbmk+uE8yig9q14PomRAdKdcnF28
pqzJZboqHocZIoQdupeGWXWHPpaz9D7Pku9s+Re8/kqrP6/BPLyE4aq6SKkC
n6G6NBjw4mqLeDWHnUn/FzIxlF7EugAA

-->

</rfc>
