<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-voyager-smv-specification-00" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="SMVF">Secure Mobile Vault Format</title>
    <seriesInfo name="Internet-Draft" value="draft-voyager-smv-specification-00"/>
    <author initials="O." surname="Keskilammi" fullname="Ohto Keskilammi">
      <organization>Self-published</organization>
      <address>
        <email>voyager-2019@outlook.com</email>
      </address>
    </author>
    <date year="2026" month="January" day="03"/>
    <area>General</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 35?>

<t>The Secure Mobile Vault Format (SMVF) defines a binary container format for storing encrypted password vaults on mobile devices. The format is designed to be offline-first, zero-knowledge, cryptographically robust, and forward-compatible. SMVF specifies strict structural layout, authenticated encryption, and deterministic metadata handling suitable for constrained mobile environments.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/voyager-2021/smv-specification"/>.</t>
    </note>
  </front>
  <middle>
    <?line 39?>

<section anchor="status-of-this-memo">
      <name>Status of This Memo</name>
      <t>This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.</t>
      <t>Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF).  Note that other groups may also distribute
working documents as Internet-Drafts.</t>
      <t>Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time.  It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress".</t>
    </section>
    <section anchor="copyright-notice">
      <name>Copyright Notice</name>
      <t>Copyright (c) 2026 IETF Trust and the persons identified as the
document authors.  All rights reserved.</t>
      <t>This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents.</t>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The Secure Mobile Vault Format (SMVF) defines a binary container format for storing encrypted password vaults on mobile devices. The format is designed to be offline-first, zero-knowledge, cryptographically robust, and forward-compatible.</t>
      <t>SMVF follows strict principles including explicit headers, typed sections, cryptographic framing, and strict versioning, while remaining minimal and suitable for mobile environments.</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
      NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and
      "OPTIONAL" in this document are to be interpreted as described in
      <xref target="RFC2119"/>.</t>
    </section>
    <section anchor="design-goals">
      <name>Design Goals</name>
      <t>The format is designed to meet the following goals:</t>
      <ol spacing="normal" type="1"><li>
          <t>Provide zero-knowledge encryption where vault contents cannot be recovered without the master password.</t>
        </li>
        <li>
          <t>Support offline-only operation with no network dependencies.</t>
        </li>
        <li>
          <t>Be safe for mobile storage, including crash-safe atomic updates.</t>
        </li>
        <li>
          <t>Use authenticated encryption to ensure confidentiality and integrity.</t>
        </li>
        <li>
          <t>Allow future evolution without breaking existing vaults.</t>
        </li>
        <li>
          <t>Remain auditable and deterministic in layout.</t>
        </li>
      </ol>
    </section>
    <section anchor="file-overview">
      <name>File Overview</name>
      <t>An SMVF file consists of the following components, in order:</t>
      <ul spacing="normal">
        <li>
          <t>File Header (fixed-size)</t>
        </li>
        <li>
          <t>KDF Parameters Section</t>
        </li>
        <li>
          <t>Crypto Parameters Section</t>
        </li>
        <li>
          <t>Encrypted Vault Section</t>
        </li>
        <li>
          <t>Optional Footer</t>
        </li>
      </ul>
      <t>All multi-octet integer fields are encoded in network byte order (big-endian). The file is tightly packed and contains no padding.</t>
      <t>The standard file extension is ".smvf".</t>
    </section>
    <section anchor="file-header">
      <name>File Header</name>
      <t>The file header is a fixed-size structure of 32 octets.</t>
      <t>The header contains the following fields:</t>
      <ul spacing="normal">
        <li>
          <t>Magic (4 octets)
Identifies the file as an SMVF container. The value MUST be the ASCII string "SMVF".</t>
        </li>
        <li>
          <t>Major Version (2 octets)
Indicates the major format version. Readers MUST reject files with unsupported major versions.</t>
        </li>
        <li>
          <t>Minor Version (2 octets)
Indicates backward-compatible revisions.</t>
        </li>
        <li>
          <t>Header Length (4 octets)
Total length in octets of all sections except the Encrypted Vault Section length preceding the encrypted payload.</t>
        </li>
        <li>
          <t>Flags (4 octets)
Bitmask defining file properties.</t>
        </li>
        <li>
          <t>File UUID (16 octets)
Randomly generated UUID version 4 identifier as defined in <xref target="RFC9562"/>. This value is non-secret and MUST NOT be reused.</t>
        </li>
      </ul>
      <t>The following header flags are defined:</t>
      <ul spacing="normal">
        <li>
          <t>Bit 0: Encrypted payload present (MUST be set)</t>
        </li>
        <li>
          <t>Bit 1: Footer present</t>
        </li>
        <li>
          <t>Bits 2-31: Reserved and MUST be zero</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-model">
      <name>Section Model</name>
      <t>Sections follow a typed-length-value (TLV) model.</t>
      <t>Each section consists of:</t>
      <ul spacing="normal">
        <li>
          <t>Section Type (2 octets)</t>
        </li>
        <li>
          <t>Section Length (4 octets)</t>
        </li>
        <li>
          <t>Section Value (variable length)</t>
        </li>
      </ul>
      <t>The section length specifies the length of the section value only.</t>
      <t>Unknown section types MUST be skipped using the length field. The section order defined in this specification MUST be preserved.</t>
    </section>
    <section anchor="sec-types">
      <name>Section Types</name>
      <t>The following section types are defined:</t>
      <ul spacing="normal">
        <li>
          <t>0x0001: KDF Parameters Section (REQUIRED)</t>
        </li>
        <li>
          <t>0x0002: Crypto Parameters Section (REQUIRED)</t>
        </li>
        <li>
          <t>0x0003: Encrypted Vault Section (REQUIRED)</t>
        </li>
        <li>
          <t>0x0004-0x7FFF: Reserved for future use and MUST NOT be used</t>
        </li>
      </ul>
      <t>No section identifier may be reused for a different purpose.</t>
    </section>
    <section anchor="kdf-parameters-section">
      <name>KDF Parameters Section</name>
      <t>This section defines how the encryption key is derived from the master password.</t>
      <t>The section value contains the following fields:</t>
      <ul spacing="normal">
        <li>
          <t>KDF Algorithm (1 octet)</t>
        </li>
        <li>
          <t>Salt Length (1 octet)</t>
        </li>
        <li>
          <t>Salt (variable length)</t>
        </li>
        <li>
          <t>Cost Parameter A (4 octets)</t>
        </li>
        <li>
          <t>Cost Parameter B (4 octets)</t>
        </li>
        <li>
          <t>Cost Parameter C (4 octets)</t>
        </li>
      </ul>
      <t>The following KDF Algorithm identifiers are defined:</t>
      <ul spacing="normal">
        <li>
          <t>0x01: Argon2id as defined in <xref target="RFC9106"/></t>
        </li>
        <li>
          <t>0x02: scrypt as defined in <xref target="RFC7914"/></t>
        </li>
        <li>
          <t>0x03-0x7F: Reserved for future use and MUST NOT be used</t>
        </li>
      </ul>
      <t>The salt is not secret and MUST be generated randomly per vault.</t>
      <t>For Argon2id, the parameters are defined as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Parameter A: Memory cost in KiB</t>
        </li>
        <li>
          <t>Parameter B: Iteration count</t>
        </li>
        <li>
          <t>Parameter C: Degree of parallelism</t>
        </li>
      </ul>
      <t>For scrypt, the parameters are defined as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Parameter A: N (CPU/memory cost)</t>
        </li>
        <li>
          <t>Parameter B: r</t>
        </li>
        <li>
          <t>Parameter C: p</t>
        </li>
      </ul>
      <t>Implementations SHOULD tune parameters for mobile hardware while maintaining resistance to offline attacks.</t>
    </section>
    <section anchor="crypto-parameters-section">
      <name>Crypto Parameters Section</name>
      <t>This section defines the encryption algorithm and parameters used to protect the vault payload.</t>
      <t>The section value contains the following fields:</t>
      <ul spacing="normal">
        <li>
          <t>Cipher Algorithm (1 octet)</t>
        </li>
        <li>
          <t>Key Length (1 octet)</t>
        </li>
        <li>
          <t>Nonce Length (1 octet)</t>
        </li>
        <li>
          <t>Authentication Tag Length (1 octet)</t>
        </li>
        <li>
          <t>Nonce (variable length)</t>
        </li>
      </ul>
      <t>The following Cipher Algorithm identifiers are defined:</t>
      <ul spacing="normal">
        <li>
          <t>0x01: AES-256-GCM as defined in <xref target="RFC4106"/></t>
        </li>
        <li>
          <t>0x02: ChaCha20-Poly1305 as defined in <xref target="RFC8439"/></t>
        </li>
        <li>
          <t>0x03-0x7F: Reserved for future use and MUST NOT be used</t>
        </li>
      </ul>
      <t>For AES-256-GCM and ChaCha20-Poly1305, the Key Length MUST be 32 octets.</t>
      <t>Implementations MUST ensure that a nonce is never reused with the same derived key. The authentication tag is embedded in the AEAD ciphertext and is not stored separately.</t>
    </section>
    <section anchor="encrypted-vault-section">
      <name>Encrypted Vault Section</name>
      <t>This section contains the encrypted vault payload.</t>
      <t>The payload is produced using an AEAD construction with the following inputs:</t>
      <ul spacing="normal">
        <li>
          <t>The encryption key is derived from the master password using the KDF Parameters Section.</t>
        </li>
        <li>
          <t>The nonce is taken from the Crypto Parameters Section.</t>
        </li>
        <li>
          <t>The additional authenticated data consists of the File Header, the KDF Parameters Section, and the Crypto Parameters Section.</t>
        </li>
      </ul>
      <t>All metadata is authenticated but not encrypted. Any modification to these components MUST cause decryption failure.</t>
      <t>The AAD input MUST be the exact serialized octet sequence of the File Header followed by the serialized KDF Parameters Section and the serialized Crypto Parameters Section, in file order.</t>
    </section>
    <section anchor="vault-payload-structure">
      <name>Vault Payload Structure</name>
      <t>Before encryption, the vault payload is serialized JSON as defined in <xref target="RFC8259"/>. All JSON strings MUST be encoded in UTF-8.</t>
      <t>No canonicalization of the JSON payload is required, as integrity is provided by the enclosing AEAD construction.</t>
      <t>The top-level object contains the following fields:</t>
      <ul spacing="normal">
        <li>
          <t>vault_version: Integer indicating the logical vault schema version</t>
        </li>
        <li>
          <t>created: <xref target="RFC3339"/> timestamp</t>
        </li>
        <li>
          <t>updated: <xref target="RFC3339"/> timestamp</t>
        </li>
        <li>
          <t>entries: Array of vault entries</t>
        </li>
        <li>
          <t>metadata: Optional application-defined metadata</t>
        </li>
      </ul>
    </section>
    <section anchor="vault-entry-structure">
      <name>Vault Entry Structure</name>
      <t>Each vault entry is a <xref target="RFC8259"/> JSON object containing the following fields:</t>
      <ul spacing="normal">
        <li>
          <t>id: UUID version 4 string as defined in <xref target="RFC9562"/></t>
        </li>
        <li>
          <t>type: Entry type identifier</t>
        </li>
        <li>
          <t>title: Human-readable name</t>
        </li>
        <li>
          <t>fields: Key-value mapping of entry fields</t>
        </li>
        <li>
          <t>notes: Optional freeform text</t>
        </li>
        <li>
          <t>tags: Optional array of strings</t>
        </li>
        <li>
          <t>created: <xref target="RFC3339"/> timestamp</t>
        </li>
        <li>
          <t>updated: <xref target="RFC3339"/> timestamp</t>
        </li>
      </ul>
      <t>The type field allows future extension to support non-password secrets.</t>
    </section>
    <section anchor="authentication-and-integrity">
      <name>Authentication and Integrity</name>
      <t>The format relies exclusively on AEAD for security guarantees.</t>
      <t>The following properties are provided:</t>
      <ul spacing="normal">
        <li>
          <t>Confidentiality of vault contents</t>
        </li>
        <li>
          <t>Integrity of vault contents</t>
        </li>
        <li>
          <t>Integrity and authenticity of metadata</t>
        </li>
      </ul>
      <t>No separate MAC or digital signature is required.</t>
    </section>
    <section anchor="atomic-update-requirements">
      <name>Atomic Update Requirements</name>
      <t>Implementations MUST perform updates atomically to prevent vault corruption.</t>
      <t>A recommended procedure is as follows:</t>
      <ol spacing="normal" type="1"><li>
          <t>Write the updated vault to a temporary file.</t>
        </li>
        <li>
          <t>Flush and synchronize the file.</t>
        </li>
        <li>
          <t>Atomically rename the temporary file over the existing vault.</t>
        </li>
        <li>
          <t>Optionally retain a backup copy.</t>
        </li>
      </ol>
      <t>Mobile operating systems guarantee atomic rename operations within the same filesystem.</t>
    </section>
    <section anchor="memory-handling-requirements">
      <name>Memory Handling Requirements</name>
      <t>Implementations MUST enforce the following requirements:</t>
      <ul spacing="normal">
        <li>
          <t>Derived encryption keys MUST NOT be persisted.</t>
        </li>
        <li>
          <t>Keys MUST be zeroized on lock or application backgrounding.</t>
        </li>
        <li>
          <t>Decrypted vault data MUST reside only in memory and MUST be discarded on lock or suspension.</t>
        </li>
      </ul>
    </section>
    <section anchor="forward-compatibility-rules">
      <name>Forward Compatibility Rules</name>
      <t>Readers MUST reject files with unsupported major versions.</t>
      <t>Readers MUST ignore unknown section types.</t>
      <t>Writers MUST preserve section ordering and MUST NOT reuse section identifiers.</t>
    </section>
    <section anchor="explicit-non-goals">
      <name>Explicit Non-Goals</name>
      <t>The format intentionally excludes:</t>
      <ul spacing="normal">
        <li>
          <t>Cloud synchronization</t>
        </li>
        <li>
          <t>Compression</t>
        </li>
        <li>
          <t>Partial encryption</t>
        </li>
        <li>
          <t>Password reuse detection</t>
        </li>
        <li>
          <t>Replay protection</t>
        </li>
      </ul>
    </section>
    <section anchor="threat-model-summary">
      <name>Threat Model Summary</name>
      <t>The format mitigates:</t>
      <ul spacing="normal">
        <li>
          <t>Offline file theft</t>
        </li>
        <li>
          <t>Unauthorized modification</t>
        </li>
        <li>
          <t>Metadata tampering</t>
        </li>
      </ul>
      <t>The format does not mitigate:</t>
      <ul spacing="normal">
        <li>
          <t>Compromised or rooted operating systems</t>
        </li>
        <li>
          <t>Active runtime memory attacks</t>
        </li>
        <li>
          <t>Screen capture malware</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document specifies a cryptographic container format intended to protect sensitive data at rest. Security properties and assumptions are discussed throughout the document, including key derivation, authenticated encryption, and memory handling requirements.</t>
      <t>The format assumes a trusted execution environment and does not protect against compromised operating systems, runtime memory disclosure, or malicious software with sufficient privileges. Implementers are responsible for selecting appropriate cryptographic parameters and ensuring correct use of underlying cryptographic primitives.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC4106">
          <front>
            <title>The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (ESP)</title>
            <author fullname="J. Viega" initials="J." surname="Viega"/>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <date month="June" year="2005"/>
            <abstract>
              <t>This memo describes the use of the Advanced Encryption Standard (AES) in Galois/Counter Mode (GCM) as an IPsec Encapsulating Security Payload (ESP) mechanism to provide confidentiality and data origin authentication. This method can be efficiently implemented in hardware for speeds of 10 gigabits per second and above, and is also well-suited to software implementations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4106"/>
          <seriesInfo name="DOI" value="10.17487/RFC4106"/>
        </reference>
        <reference anchor="RFC8439">
          <front>
            <title>ChaCha20 and Poly1305 for IETF Protocols</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <date month="June" year="2018"/>
            <abstract>
              <t>This document defines the ChaCha20 stream cipher as well as the use of the Poly1305 authenticator, both as stand-alone algorithms and as a "combined mode", or Authenticated Encryption with Associated Data (AEAD) algorithm.</t>
              <t>RFC 7539, the predecessor of this document, was meant to serve as a stable reference and an implementation guide. It was a product of the Crypto Forum Research Group (CFRG). This document merges the errata filed against RFC 7539 and adds a little text to the Security Considerations section.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8439"/>
          <seriesInfo name="DOI" value="10.17487/RFC8439"/>
        </reference>
        <reference anchor="RFC9106">
          <front>
            <title>Argon2 Memory-Hard Function for Password Hashing and Proof-of-Work Applications</title>
            <author fullname="A. Biryukov" initials="A." surname="Biryukov"/>
            <author fullname="D. Dinu" initials="D." surname="Dinu"/>
            <author fullname="D. Khovratovich" initials="D." surname="Khovratovich"/>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="September" year="2021"/>
            <abstract>
              <t>This document describes the Argon2 memory-hard function for password hashing and proof-of-work applications. We provide an implementer-oriented description with test vectors. The purpose is to simplify adoption of Argon2 for Internet protocols. This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9106"/>
          <seriesInfo name="DOI" value="10.17487/RFC9106"/>
        </reference>
        <reference anchor="RFC7914">
          <front>
            <title>The scrypt Password-Based Key Derivation Function</title>
            <author fullname="C. Percival" initials="C." surname="Percival"/>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document specifies the password-based key derivation function scrypt. The function derives one or more secret keys from a secret string. It is based on memory-hard functions, which offer added protection against attacks using custom hardware. The document also provides an ASN.1 schema.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7914"/>
          <seriesInfo name="DOI" value="10.17487/RFC7914"/>
        </reference>
        <reference anchor="RFC3339">
          <front>
            <title>Date and Time on the Internet: Timestamps</title>
            <author fullname="G. Klyne" initials="G." surname="Klyne"/>
            <author fullname="C. Newman" initials="C." surname="Newman"/>
            <date month="July" year="2002"/>
            <abstract>
              <t>This document defines a date and time format for use in Internet protocols that is a profile of the ISO 8601 standard for representation of dates and times using the Gregorian calendar.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3339"/>
          <seriesInfo name="DOI" value="10.17487/RFC3339"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9562">
          <front>
            <title>Universally Unique IDentifiers (UUIDs)</title>
            <author fullname="K. Davis" initials="K." surname="Davis"/>
            <author fullname="B. Peabody" initials="B." surname="Peabody"/>
            <author fullname="P. Leach" initials="P." surname="Leach"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This specification defines UUIDs (Universally Unique IDentifiers) --
also known as GUIDs (Globally Unique IDentifiers) -- and a Uniform
Resource Name namespace for UUIDs. A UUID is 128 bits long and is
intended to guarantee uniqueness across space and time. UUIDs were
originally used in the Apollo Network Computing System (NCS), later
in the Open Software Foundation's (OSF's) Distributed Computing
Environment (DCE), and then in Microsoft Windows platforms.</t>
              <t>This specification is derived from the OSF DCE specification with the
kind permission of the OSF (now known as "The Open Group"). Information from earlier versions of the OSF DCE specification have
been incorporated into this document. This document obsoletes RFC
4122.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9562"/>
          <seriesInfo name="DOI" value="10.17487/RFC9562"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
      </references>
    </references>
    <?line 333?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
    </section>
    <section numbered="false" anchor="authors-addresses">
      <name>Authors' Addresses</name>
      <t>Ohto Keskilammi
Email: voyager-2019@outlook.com</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
