<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tomar-sconepro-privacy-00" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="SCONEPRO Privacy">SCONEPRO Privacy Properties and Incentives for Abuse</title>
    <seriesInfo name="Internet-Draft" value="draft-tomar-sconepro-privacy-00"/>
    <author initials="A." surname="Tomar" fullname="Anoop Tomar">
      <organization>Meta</organization>
      <address>
        <email>anooptomar@meta.com</email>
      </address>
    </author>
    <author initials="W." surname="Eddy" fullname="Wesley Eddy">
      <organization>Meta</organization>
      <address>
        <email>wesleyeddy@meta.com</email>
      </address>
    </author>
    <author initials="A." surname="Tiwari" fullname="Abhishek Tiwari">
      <organization>Meta</organization>
      <address>
        <email>atiwari@meta.com</email>
      </address>
    </author>
    <author initials="M." surname="Joras" fullname="Matt Joras">
      <organization>Meta</organization>
      <address>
        <email>mjoras@meta.com</email>
      </address>
    </author>
    <date year="2024" month="May" day="10"/>
    <area>Web and Internet Transport</area>
    <workgroup>SCONEPRO</workgroup>
    <keyword>Privacy</keyword>
    <abstract>
      <?line 74?>

<t>This document discusses privacy properties of the SCONEPRO metadata or
network-to-host signals.  This covers questions that were raised during the
IETF 119 BoF and subsequent discussions.  It is not intended to be published as
a separate RFC but might be incorporated as a part of the security
considerations or other content within eventual SCONEPRO RFCs together with
other documents covering security considerations.  Other documents will address additional aspects of the security considerations such as authentication, integrity protection, and encryption of SCONEPRO metadata.</t>
    </abstract>
  </front>
  <middle>
    <?line 83?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The general problem statement for Secure Communication of Network Properties (SCONEPRO) is described in the video optimization requirements document <xref target="I-D.joras-sadcdn-video-optimization-requirements"/>,
including the shaping or throttling that Communication Service
Providers (CSPs) perform <xref target="ABR-Video-Shaping"/>.</t>
      <t>There were questions rasied at the IETF 119 BoF on SCONEPRO regarding privacy considerations, include:</t>
      <ol spacing="normal" type="1"><li>
          <t>What are the privacy properties of the SCONE signal?  If making the signal available to applications is the goal, does that have unwanted properties?</t>
        </li>
        <li>
          <t>Can the signal be designed so that there is no incentive to fake it, similar to ECN?</t>
        </li>
      </ol>
      <t>This document provides additional context necessary, and then directly
addresses these questions.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="sconepro-context">
      <name>SCONEPRO Context</name>
      <t>SCONEPRO is focusing on streaming video optimization use-cases through network-assisted application-level self-adaptation of media/video bit rate.  SCONEPRO addresses the following high-level problem statement:</t>
      <ol spacing="normal" type="1"><li>
          <t>Currently Communication Service Provider (CSP) networks (mainly cellular and satellite networks) perform bit-rate throttling (either shaping or policing) of streaming video flows.  The motivation behind throttling may vary across CSPs. For example, the motivation can be:  </t>
          <ul spacing="normal">
            <li>
              <t>To support different data rates based on the subscribers' data plans;</t>
            </li>
            <li>
              <t>To reduce egress towards radio base-stations in downlink direction;</t>
            </li>
            <li>
              <t>To limit the overall capacity/bandwidth required and to manage capex requirements (e.g. need for more RF spectrum and deployment of more radio base-stations), etc.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>To perform throttling, CSP networks need to detect streaming video flows, which uses deep packet inspection and trial decryption of QUIC initial packets in order to decode and read the Server Name Indication (SNI) field present in initial ClientHello messages.  This requires significant compute resources.  Throttling (shaping or policing) also requires nontrivial compute and memory resources.  For details refer to <xref target="ABR-Video-Shaping"/>.</t>
        </li>
        <li>
          <t>Throttling in the CSP network has a significant negative impact on streaming video application quality of experience (QoE), and it also degrades mobile User Equipment (UE) battery performance.</t>
        </li>
        <li>
          <t>An equivalent reduction in network traffic can be achieved more intelligently via self-adaptation by Content Application Providers (CAPs), because CAPs can actually measure QoE parameters and can tune their self adaptation strategy much more effectively than the QoE-blind approach taken by CSP's network throttlers.  Hence, this approach of self-adaptation by CAPs is much superior in terms of end user QoE compared to CSP-led network throttling.</t>
        </li>
        <li>
          <t>CSPs currently use intentional (artificial) network throttling as a way to create service differentiation between users on different payment plans and to enforce fair usage plans.</t>
        </li>
        <li>
          <t>CAPs do not and should not have access to subscriber payment plan information.</t>
        </li>
        <li>
          <t>There is a need for a solution to the above multi-objective optimization problem which achieves both: (a) superior user QoE, and (b) differentiated data limitation consistent with subscriber plans.</t>
        </li>
        <li>
          <t>One potential solution to this problem is self-adaptation of video sessions by CAPs.  Since the subscriber plan information must live within the CSP network domain, the CSP network can abstract out the different traffic profiles suited to different subscriber plans and provide the abstracted information to application-clients running on the UEs for CAP self-adaptation implementations.</t>
        </li>
      </ol>
      <t>For details, refer to the proof of concept trial <xref target="SCONEPRO-MASQUE-POC"/> and YouTube plan aware streaming <xref target="YouTube"/>.</t>
      <t>The SCONEPRO network rate-limiting information (metadata) and the means of
conveying the information is to be defined by the IETF.</t>
    </section>
    <section anchor="privacy-properties">
      <name>Privacy Properties</name>
      <t>This document section describes the privacy properties of the SCONEPRO signal and considerations with regard to making the signal available to applications.</t>
      <t>It is required that the SCONEPRO signal shall not carry information that includes either:</t>
      <ul spacing="normal">
        <li>
          <t>Any Personal Identifiable Information (PII) that can be used to identify the subscriber such as International Mobile Subscriber Identity (IMSI). IMSI is a unique 15-digit number that identifies every user uniquely within a mobile network.</t>
        </li>
        <li>
          <t>Network’s policy associated with a subscriber - the CSP Network stores subscriber policies in network elements such as HSS (Home Subscriber Server)/UDM(Unified Data Management)/PCRF(Policy and Charging Rules function) to support various subscriber specific features in the network.</t>
        </li>
      </ul>
      <t>To help describe the SCONEPRO approach to meet these privacy requirements, as well as to ensure the signal does not have unwanted properties, the next subsections provide an example and then general approach.</t>
      <section anchor="mobile-network-example">
        <name>Mobile Network Example</name>
        <t>Using a mobile network as a reference, the diagram in <xref target="mobile-diagram"/> explains how CSP networks implement throttling to support different data rates based on the subscribers' data plans.</t>
        <figure anchor="mobile-diagram">
          <name>Mobile Network Data Flow</name>
          <artwork><![CDATA[
                 +-----+                                           
                 | HSS |                                           
                 +-----+                                           
                    |                                              
                 +-----+          +------+                         
                 | MME |          | PCRF |                         
                /+-----+\         +------+                         
               /         \            |                            
              /           \           |         ___  __            
             /             \          |        /   )(  \                  
+----+   +-----+        +------+  +------+    (         )   +-----+
| UE |---| eNB |--------| S-GW |--| P-GW |---( Internet )---| CDN |
+----+   +-----+        +------+  +------+    (        _)   +-----+
                                               (__(___)
]]></artwork>
        </figure>
        <t>In order to perform throttling to enable different data-rates based on the subscribers’ data plans, the CSP network need to support following high-level functionalities:</t>
        <ol spacing="normal" type="1"><li>
            <t>Detect the streaming video flows.</t>
          </li>
          <li>
            <t>Identify the bearer associated with the flow.  </t>
            <ul spacing="normal">
              <li>
                <t>Bearer is a logical pipe between UE (Mobile phone) and P-GW (PDN Gateway) to carry packets belonging to one or more IP flows. IP flows (aka service data flows -SDFs) may belong to one or more services. All the service data flows within a bearer gets the same level of QoS.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Identify the subscriber who is using this service/flow by using mapping between bearer and subscriber ID (IMSI).</t>
          </li>
          <li>
            <t>Extract the network’s policy associated with a subscriber.</t>
          </li>
          <li>
            <t>Activate throttling to limit the flow’s bit-rate according to subscribers’ data plans.</t>
          </li>
        </ol>
        <t>This is performed in the network element which is on the data path and has access to the subscriber policies through standard interface with PCRF (Policy Charging and Rule function). In a 4G network this network-element is P-GW (PDN Gateway) and in a 5G network this network-element is UPF (User Plane Function). 
Note - UPF is not shown in above diagram as above diagram is for 4G mobile network. UPF is equivalent to P-GW in the 5G mobile network.</t>
      </section>
      <section anchor="sconepros-approach">
        <name>SCONEPRO's Approach</name>
        <t>To meet the privacy requirements as well as to ensure that signal does not have unwanted properties, SCONEPRO proposes following approach:</t>
        <ol spacing="normal" type="1"><li>
            <t>Use an on-path interface between the user's application end-point and network element  to exchange the SCONEPRO signal. This should be the same on-path interface that has already been established between application end-point and network element to carry the video flow whose bit-rate needs to be regulated. Due to the usage of an on-path interface there is no need to exchange additional subscriber specific information (that could have been otherwise used to identify the subscriber) between CSP network and application end-point to establish association between the flow and scone signaling.</t>
          </li>
          <li>
            <t>Network element to be involved in SCONEPRO signaling should be on data-path and should have access to the subscriber policies. This network element should calculate the target bit-rate for the specific flow based on subscribers’ data plan, network configuration &amp; capacity and CSP network policy and share only the just enough information (for e.g. video/media bit-rate etc. Exact metadata and data-types to be defined during the solution definition phase of SCONEPRO) with application end-point via SCONEPRO signaling. This would ensure that SCONEPRO signal does not carry the network's policy associated with a subscriber and it does not carry unwanted network information/properties.</t>
          </li>
        </ol>
        <t>Note - Information such as video/media bit-rate, that is required to be shared by a network device with client application end-point using SCONEPRO signal can already be learnt by application end-point currently, through various mechanisms (the effect of on-path throttlers is clearly visible by observing application traffic by third party tools like PCAP). So as part of SCONEPRO scope we are not proposing, network to share any information with application endpoints which can not be known without SCONEPRO, rather objective is that such information be made explicit.</t>
      </section>
    </section>
    <section anchor="incentives-for-abuse">
      <name>Incentives for Abuse</name>
      <t>In early discussion, at the IETF 119 BoF session, it was pointed out that possible incentives for abuse need to be considered, and that a good example existing network-to-host signalling case is Explicit Congestion Notification (ECN), for which the impact of both lying/cheating hosts and network devices has been analyzed, and for which there are no strong incentives for either hosts or network devices to unnecessarily forge or tamper with ECN codepoints.</t>
      <t>ECN is an extension to the Internet Protocol.  ECN allows end-to-end
notification of network congestion without dropping packets. ECN is an optional
feature that may be used between two ECN-enabled endpoints when the underlying
network infrastructure also supports it.  In general both classic ECN <xref target="RFC3168"/> and L4S ECN <xref target="RFC9330"/> <xref target="RFC9331"/> <xref target="RFC9332"/> are mechanisms to
send end-to-end notification of network congestion. And it relies on following
principles:</t>
      <ol spacing="normal" type="1"><li>
          <t>Sender to set the ECT code-points correctly for a particular flow.</t>
        </li>
        <li>
          <t>Receiver to send the feedback back to the sender correctly based on CE value.</t>
        </li>
        <li>
          <t>Network elements to set the CE bit correctly based on actual congestion
conditions in the network.</t>
        </li>
        <li>
          <t>ECN codepoints are not bleached or remarked within the network, other than
to set the CE bit when appropriate.</t>
        </li>
      </ol>
      <t>The case of SCONEPRO is similar in many ways to ECN:</t>
      <ul spacing="normal">
        <li>
          <t>Any network device which can alter ECN bits can simply drop the packets. And packet drop may have more negative impact on application’s performance compared to using ECN bits to indicate congestion in the network.</t>
        </li>
        <li>
          <t>Similarly any network device which can send SCONEPRO signaling can throttle the application flow. Throttling may have a more negative impact on application’s performance compared to using SCONEPRO signaling to influence the incoming flow bit-rate from the sender. So like ECN, there should not be any incentive for the network device to fake the SCONEPRO signal.</t>
        </li>
        <li>
          <t>Regarding faking CE bit (either setting or clearing it), there is no incentive either way, because both cases may have more negative impact on application’s performance within the network faking the ECN signals</t>
        </li>
        <li>
          <t>Similarly, faking SCONEPRO signaling (sending incorrect meta-data)  there is no incentive because sending incorrect meta-data may have more negative impact on application’s performance within the network faking the SCONEPRO signals</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>General SCONEPRO security considerations are discussed in the other documents
covering the problem statement <xref target="I-D.joras-sadcdn-video-optimization-requirements"/> and specific network-to-host signaling methods.
This document provides answers to questions regarding privacy of the SCONEPRO signaling and metadata.  There are no additional security considerations raised by this.</t>
      <t>Other security considerations such as authentication, integrity protection, and encryption of SCONEPRO signalling will be covered in separate Internet-Drafts.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3168">
          <front>
            <title>The Addition of Explicit Congestion Notification (ECN) to IP</title>
            <author fullname="K. Ramakrishnan" initials="K." surname="Ramakrishnan"/>
            <author fullname="S. Floyd" initials="S." surname="Floyd"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="September" year="2001"/>
            <abstract>
              <t>This memo specifies the incorporation of ECN (Explicit Congestion Notification) to TCP and IP, including ECN's use of two bits in the IP header. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3168"/>
          <seriesInfo name="DOI" value="10.17487/RFC3168"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC9331">
          <front>
            <title>The Explicit Congestion Notification (ECN) Protocol for Low Latency, Low Loss, and Scalable Throughput (L4S)</title>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This specification defines the protocol to be used for a new network service called Low Latency, Low Loss, and Scalable throughput (L4S). L4S uses an Explicit Congestion Notification (ECN) scheme at the IP layer that is similar to the original (or 'Classic') ECN approach, except as specified within. L4S uses 'Scalable' congestion control, which induces much more frequent control signals from the network, and it responds to them with much more fine-grained adjustments so that very low (typically sub-millisecond on average) and consistently low queuing delay becomes possible for L4S traffic without compromising link utilization. Thus, even capacity-seeking (TCP-like) traffic can have high bandwidth and very low delay at the same time, even during periods of high traffic load.</t>
              <t>The L4S identifier defined in this document distinguishes L4S from 'Classic' (e.g., TCP-Reno-friendly) traffic. Then, network bottlenecks can be incrementally modified to distinguish and isolate existing traffic that still follows the Classic behaviour, to prevent it from degrading the low queuing delay and low loss of L4S traffic. This Experimental specification defines the rules that L4S transports and network elements need to follow, with the intention that L4S flows neither harm each other's performance nor that of Classic traffic. It also suggests open questions to be investigated during experimentation. Examples of new Active Queue Management (AQM) marking algorithms and new transports (whether TCP-like or real time) are specified separately.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9331"/>
          <seriesInfo name="DOI" value="10.17487/RFC9331"/>
        </reference>
        <reference anchor="RFC9332">
          <front>
            <title>Dual-Queue Coupled Active Queue Management (AQM) for Low Latency, Low Loss, and Scalable Throughput (L4S)</title>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This specification defines a framework for coupling the Active Queue Management (AQM) algorithms in two queues intended for flows with different responses to congestion. This provides a way for the Internet to transition from the scaling problems of standard TCP-Reno-friendly ('Classic') congestion controls to the family of 'Scalable' congestion controls. These are designed for consistently very low queuing latency, very low congestion loss, and scaling of per-flow throughput by using Explicit Congestion Notification (ECN) in a modified way. Until the Coupled Dual Queue (DualQ), these Scalable L4S congestion controls could only be deployed where a clean-slate environment could be arranged, such as in private data centres.</t>
              <t>This specification first explains how a Coupled DualQ works. It then gives the normative requirements that are necessary for it to work well. All this is independent of which two AQMs are used, but pseudocode examples of specific AQMs are given in appendices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9332"/>
          <seriesInfo name="DOI" value="10.17487/RFC9332"/>
        </reference>
        <reference anchor="I-D.joras-sadcdn-video-optimization-requirements">
          <front>
            <title>SADCDN Video Optimization Requirements</title>
            <author fullname="Matt Joras" initials="M." surname="Joras">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <author fullname="Anoop Tomar" initials="A." surname="Tomar">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <author fullname="Abhishek Tiwari" initials="A." surname="Tiwari">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <author fullname="Alan Frindell" initials="A." surname="Frindell">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <date day="5" month="January" year="2024"/>
            <abstract>
              <t>   These are the requirements for the "Video Optimization" use-case for
   the SADCDN topic, which broadly speaking seeks to optimize video
   playback experience in mobile networks by cooperative communication
   between video content providers and the providers of network services
   to end users.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/mjoras/sadcdn-video-optimization-requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-joras-sadcdn-video-optimization-requirements-00"/>
        </reference>
        <reference anchor="ABR-Video-Shaping" target="https://datatracker.ietf.org/meeting/119/materials/slides-119-sconepro-how-networks-shape-traffic-02">
          <front>
            <title>ABR Video Shaping</title>
            <author initials="M." surname="Ihlar" fullname="Marcus Ihlar">
              <organization/>
            </author>
            <date year="2024" month="March" day="21"/>
          </front>
        </reference>
        <reference anchor="SCONEPRO-MASQUE-POC" target="https://datatracker.ietf.org/meeting/119/materials/slides-119-sconepro-proof-of-concept-trial-02">
          <front>
            <title>SCONEPRO MASQUE POC</title>
            <author initials="M." surname="Joras" fullname="Matt Joras">
              <organization/>
            </author>
            <date year="2024" month="March" day="21"/>
          </front>
        </reference>
        <reference anchor="YouTube" target="https://datatracker.ietf.org/meeting/119/materials/slides-119-sconepro-youtube-plan-aware-streaming-01">
          <front>
            <title>YouTube Plan Aware Streaming</title>
            <author>
              <organization>YouTube</organization>
            </author>
            <date year="2024" month="March" day="21"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 260?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document represents collaboration and inputs from others, including:</t>
      <ul spacing="normal">
        <li>
          <t>Spencer Dawkins</t>
        </li>
        <li>
          <t>Alan Frindell</t>
        </li>
        <li>
          <t>Bryan Tan</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
