<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.9 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-bretelle-dprive-dot-spki-in-ns-name-00" category="std">

  <front>
    <title abbrev="dot-spki-in-ns-name">Encoding DNS-over-TLS (DoT) Subject Public Key Info (SPKI) in Name Server name</title>

    <author initials="M." surname="Bretelle" fullname="Emmanuel Bretelle">
      <organization>Facebook</organization>
      <address>
        <email>chantra@fb.com</email>
      </address>
    </author>

    <date year="2019" month="March" day="11"/>

    <area>Internet</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes a mechanism to exchange the Subject Public Key Info
(SPKI) (<xref target="RFC5280"/> Section 4.1.2.7) fingerprint associated with a DNS-over-TLS
(DoT <xref target="RFC7858"/>) authoritative server by encoding it as part of its name.
The fingerprint can thereafter be used to validate the certificate received
from the DoT server as well as being able to discover support for DoT on the
server.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>This document describes a mechanism to exchange the Subject Public Key Info
(SPKI) (<xref target="RFC5280"/> Section 4.1.2.7) fingerprint associated with a DNS-over-TLS
(DoT <xref target="RFC7858"/>) authoritative server by encoding it as part of its name.
The fingerprint can thereafter be used to validate the certificate received
from the DoT server as well as being able to discover support for DoT on the
server.</t>

</section>
<section anchor="terminology" title="Terminology">

<t>A server that supports DNS-over-TLS is called a “DoT server” to differentiate
it from a “DNS Server” (one that provides DNS service over any other protocol),
likewise, a client that supports this protocol is called a “DoT client”</t>

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”,
“SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”,
and “OPTIONAL” in this document are to be interpreted as described in
BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="validating-a-remote-dot-server" title="Validating a remote DoT server">

<t>While DoT provides protection against eavesdropping and on-path tampering of
the DNS queries exchanged with an authoritative server, a recursive server that
is talking to a remote DoT server needs a mechanism to authenticate that the
name server it is communicating with is indeed the one that the authority of the
zone manages or has delegated responsibility to.</t>

<t>A common mechanism is to have TLS certificates issued by “Certification
Authorities” (CAs), those CA public keys are used as trust anchors, and through
a chain of trust, a leaf TLS certificate can be validated. Any CA is able to
issue a certificate for any domain, which can have its drawbacks
(<xref target="RFC6698"/> Section 1.1).</t>

<t>Another method is to leverage DANE/TLSA (<xref target="RFC6698"/>), in which case
a recursive resolver would be provided the certificate or SPKI hash over DNS
and validate it using DNSSEC (<xref target="RFC4033"/>, <xref target="RFC4034"/>, and <xref target="RFC4035"/>).</t>

<t>This document describes a mechanism to signal to a recursive resolver that DoT
is supported by the authoritative name server as well as providing a fingerprint
of the SPKI to expect from the name server, this is done by formatting a special
first label for the name servers. Recursive servers that understand the naming
convention detailed in this document will be able to upgrade their connection to
the authoritative server to TLS, while the ones that don’t will transparently
use the name servers as a standard UDP/53 and TCP/53 servers.
This format is heavily inspired from <xref target="dnscurve"/>.</t>

</section>
<section anchor="encoding-data-in-a-domain-name-label" title="Encoding data in a domain name label">

<t>A label is limited to a maximum of 63 octets (<xref target="RFC1035"/> Section 2.3.4) and has a
limited set of characters that can be used (<xref target="RFC1035"/> Section 2.3.1), limiting
both the amount of data that can be embedded in a label as well as the encoding
format.</t>

<t>The set of character used by Base32 encoding (<xref target="RFC4648"/> Section 6), without
padding character, is suitable to be used in a label. Base32 encodes a 5-bit
group into 1 byte which allows to encode up to 39 bytes within the 63 bytes
space of a label.</t>

<figure><artwork><![CDATA[
floor(63 * 5 / 8)
]]></artwork></figure>

<t>While this limits what can be encoded in a label, there is enough space to store
the hash produced by sha256 which requires 32 bytes, leaving 7 bytes to spare.</t>

<section anchor="formatting-dot-spki-in-name-server-name" title="Formatting DoT SPKI in name server name.">

<t>The formatting of a name server is defined as follow:</t>

<figure><artwork><![CDATA[
<label> ::= <dot-header> <b32-spki-fingerprint>
<dot-header> ::= "dot-"
<b32-spki-fingerprint> ::= base32encode(<spki-fingerprint>)
<spki-fingerprint> ::= sha256(<spki>)
<spki> ::= der-encoded binary structure of SubjectPublicKeyInfo
]]></artwork></figure>

<section anchor="example" title="Example">

<t>For the zone example.com, having 2 name servers, one at IPv4 192.0.2.1 and one
at IPv6 2001:DB8::1, both of them providing DoT support and using certificate
cert.pem, the <spanx style="verb">&lt;b32-spki-fingerprint&gt;</spanx> can be generated using the following
command line:</t>

<figure><artwork><![CDATA[
openssl x509 -in /path/to/cert.pem  -pubkey -noout | \
openssl pkey -pubin -outform der | \
openssl dgst -sha256 -binary | \
base32 | tr -d '=' | tr '[:upper:]' '[:lower:]'
tpwxmgqdaurcqxqsckxvdq5sty3opxlgcbjj43kumdq62kpqr72a
]]></artwork></figure>

<t>To generate the full label, <spanx style="verb">dot-</spanx> get prefixed to the base32 encoded
fingerprint.</t>

<figure><artwork><![CDATA[
...
...
;; QUESTION SECTION:
;example.com.      IN      NS

;; AUTHORITY SECTION:
example.com. 3600  IN      NS      dot-tpwxmgqdaurcqxqsckxvdq5sty3opxlgcbjj43kumdq62kpqr72a.a.example.com.
example.com. 3600  IN      NS      dot-tpwxmgqdaurcqxqsckxvdq5sty3opxlgcbjj43kumdq62kpqr72a.b.example.com.

;; ADDITIONAL SECTION:
dot-tpwxmgqdaurcqxqsckxvdq5sty3opxlgcbjj43kumdq62kpqr72a.a.example.com. 3600 IN A 192.0.2.1
dot-tpwxmgqdaurcqxqsckxvdq5sty3opxlgcbjj43kumdq62kpqr72a.b.example.com. 3600 IN AAAA 2001:DB8::1
...
...
]]></artwork></figure>

</section>
</section>
<section anchor="handling-by-the-recursive-servers" title="Handling by the recursive servers">

<section anchor="servers-supporting-this-specification" title="Servers supporting this specification">

<t>When a recursive server gets the list of authoritative servers serving a
specific zone, it gets a list of name of hosts.</t>

<t>If:</t>

<t><list style="symbols">
  <t>the first label is 56 bytes long</t>
  <t>AND the first 4 bytes matches <spanx style="verb">dot-</spanx></t>
  <t>AND the remaining 52 bytes can be base32-decoded</t>
</list></t>

<t>the recursive server will attempt to connect to the name server using TLS over
port 853 and validate that the SHA256 hash of the SPKI in the certificate
provided by the name server matches what was previously decoded.</t>

<t>If the TLS session fail to establish, either unavailability of the service on
port 853, TLS authentication failure, the behaviour of the recursive server
depends on whether it is operating in strict or opportunistic mode (<xref target="I-D.ietf-dprive-dtls-and-tls-profiles"></xref>).</t>

<t>In strict mode, the resolver MUST stop using this authoritative name server, and
MUST try other servers of the DNS zone.  In opportunistic mode, the resolver
MUST use the authoritative name server despite the failure.  It MAY
try other name servers of the zone before, in the hope they will
accept TLS and be authenticated.</t>

</section>
<section anchor="servers-not-supporting-this-specification" title="Servers not supporting this specification">

<t>A server not supporting this specification will be unaware of anything special
with this name server and consider it like any other name servers.</t>

</section>
</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>TODO Security</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>TODO: This document requires IANA actions (new RR type).</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC1035" target='https://www.rfc-editor.org/info/rfc1035'>
<front>
<title>Domain names - implementation and specification</title>
<author initials='P.V.' surname='Mockapetris' fullname='P.V. Mockapetris'><organization /></author>
<date year='1987' month='November' />
<abstract><t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1035'/>
<seriesInfo name='DOI' value='10.17487/RFC1035'/>
</reference>



<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC4033" target='https://www.rfc-editor.org/info/rfc4033'>
<front>
<title>DNS Security Introduction and Requirements</title>
<author initials='R.' surname='Arends' fullname='R. Arends'><organization /></author>
<author initials='R.' surname='Austein' fullname='R. Austein'><organization /></author>
<author initials='M.' surname='Larson' fullname='M. Larson'><organization /></author>
<author initials='D.' surname='Massey' fullname='D. Massey'><organization /></author>
<author initials='S.' surname='Rose' fullname='S. Rose'><organization /></author>
<date year='2005' month='March' />
<abstract><t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System.  This document introduces these extensions and describes their capabilities and limitations.  This document also discusses the services that the DNS security extensions do and do not provide.  Last, this document describes the interrelationships between the documents that collectively describe DNSSEC.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4033'/>
<seriesInfo name='DOI' value='10.17487/RFC4033'/>
</reference>



<reference  anchor="RFC4034" target='https://www.rfc-editor.org/info/rfc4034'>
<front>
<title>Resource Records for the DNS Security Extensions</title>
<author initials='R.' surname='Arends' fullname='R. Arends'><organization /></author>
<author initials='R.' surname='Austein' fullname='R. Austein'><organization /></author>
<author initials='M.' surname='Larson' fullname='M. Larson'><organization /></author>
<author initials='D.' surname='Massey' fullname='D. Massey'><organization /></author>
<author initials='S.' surname='Rose' fullname='S. Rose'><organization /></author>
<date year='2005' month='March' />
<abstract><t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC).  The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS.  This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records.  The purpose and format of each resource record is described in detail, and an example of each resource record is given. </t><t> This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4034'/>
<seriesInfo name='DOI' value='10.17487/RFC4034'/>
</reference>



<reference  anchor="RFC4035" target='https://www.rfc-editor.org/info/rfc4035'>
<front>
<title>Protocol Modifications for the DNS Security Extensions</title>
<author initials='R.' surname='Arends' fullname='R. Arends'><organization /></author>
<author initials='R.' surname='Austein' fullname='R. Austein'><organization /></author>
<author initials='M.' surname='Larson' fullname='M. Larson'><organization /></author>
<author initials='D.' surname='Massey' fullname='D. Massey'><organization /></author>
<author initials='S.' surname='Rose' fullname='S. Rose'><organization /></author>
<date year='2005' month='March' />
<abstract><t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC).  The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS.  This document describes the DNSSEC protocol modifications.  This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC.  These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications. </t><t> This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4035'/>
<seriesInfo name='DOI' value='10.17487/RFC4035'/>
</reference>



<reference  anchor="RFC4648" target='https://www.rfc-editor.org/info/rfc4648'>
<front>
<title>The Base16, Base32, and Base64 Data Encodings</title>
<author initials='S.' surname='Josefsson' fullname='S. Josefsson'><organization /></author>
<date year='2006' month='October' />
<abstract><t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes.  It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4648'/>
<seriesInfo name='DOI' value='10.17487/RFC4648'/>
</reference>



<reference  anchor="RFC5280" target='https://www.rfc-editor.org/info/rfc5280'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author initials='D.' surname='Cooper' fullname='D. Cooper'><organization /></author>
<author initials='S.' surname='Santesson' fullname='S. Santesson'><organization /></author>
<author initials='S.' surname='Farrell' fullname='S. Farrell'><organization /></author>
<author initials='S.' surname='Boeyen' fullname='S. Boeyen'><organization /></author>
<author initials='R.' surname='Housley' fullname='R. Housley'><organization /></author>
<author initials='W.' surname='Polk' fullname='W. Polk'><organization /></author>
<date year='2008' month='May' />
<abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5280'/>
<seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>



<reference  anchor="RFC6698" target='https://www.rfc-editor.org/info/rfc6698'>
<front>
<title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<author initials='J.' surname='Schlyter' fullname='J. Schlyter'><organization /></author>
<date year='2012' month='August' />
<abstract><t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used.  This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers.  This requires matching improvements in TLS client software, but no change in TLS server software.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6698'/>
<seriesInfo name='DOI' value='10.17487/RFC6698'/>
</reference>



<reference  anchor="RFC7858" target='https://www.rfc-editor.org/info/rfc7858'>
<front>
<title>Specification for DNS over Transport Layer Security (TLS)</title>
<author initials='Z.' surname='Hu' fullname='Z. Hu'><organization /></author>
<author initials='L.' surname='Zhu' fullname='L. Zhu'><organization /></author>
<author initials='J.' surname='Heidemann' fullname='J. Heidemann'><organization /></author>
<author initials='A.' surname='Mankin' fullname='A. Mankin'><organization /></author>
<author initials='D.' surname='Wessels' fullname='D. Wessels'><organization /></author>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<date year='2016' month='May' />
<abstract><t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS.  Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626.  In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t><t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group.  It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t></abstract>
</front>
<seriesInfo name='RFC' value='7858'/>
<seriesInfo name='DOI' value='10.17487/RFC7858'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor="I-D.ietf-dprive-dtls-and-tls-profiles">
<front>
<title>Usage and (D)TLS Profiles for DNS-over-(D)TLS</title>

<author initials='S' surname='Dickinson' fullname='Sara Dickinson'>
    <organization />
</author>

<author initials='D' surname='Gillmor' fullname='Daniel Gillmor'>
    <organization />
</author>

<author initials='T' surname='Reddy' fullname='Tirumaleswar Reddy'>
    <organization />
</author>

<date month='September' day='11' year='2017' />

<abstract><t>This document discusses Usage Profiles, based on one or more authentication mechanisms, which can be used for DNS over Transport Layer Security (TLS) or Datagram TLS (DTLS).  These profiles can increase the privacy of DNS transactions compared to using only clear text DNS.  This document also specifies new authentication mechanisms - it describes several ways a DNS client can use an authentication domain name to authenticate a (D)TLS connection to a DNS server. Additionally, it defines (D)TLS protocol profiles for DNS clients and servers implementing DNS-over-(D)TLS.  This document updates RFC 7858.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-dprive-dtls-and-tls-profiles-11' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-dprive-dtls-and-tls-profiles-11.txt' />
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="dnscurve" target="https://dnscurve.org/">
  <front>
    <title>DNSCurve</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>


<section numbered="false" anchor="acknowledgments" title="Acknowledgments">

<t>TODO acknowledge.</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAHYMhlwAA+1ZbW/bRhL+vr9i4XyIXYiyJL/EUdPiFNu5GE3s1HauKHrF
ZUWuJMYkl+YuLbs532+/Z2aXFGU7aFHcAffhDKRckfsyL888M7ONoki41GV6
LI+L2CRpMZdHpxeRudFVdPnuQm4emcsteVFPP+vYyQ/1NEtj+YO+kyfFzMjN
iw8/nGzJtJCnKtfyQldYJwuMRWJieo5lUqmZi6aVdjrLdJSUVXqDh3GRLa/S
KC2iwkY0NRoMhJpi4g0WPf4sYuX03FR3Y2ldIoR1qkj+oTJT4BBX1VqItKx4
aN1oMHg5GAlVaTWGqE5XhXZiaaqreWXqcixPtaNf8if8h5T+K70WV8vV7OiI
BBeiTMfyF2finrSmcpWeWYzuchr8KoSq3cJUYyEjIfGXFnYs3/fl66Auv/R2
OM5zVdQ6W/9mqrkq0t+US00xlm9UrKfGXPEnnas0G8t4oQpXqb/Mpv3Y5EIU
psox/UbjUHn+5nA42NkLw9Fw+DIMdwc7O6vh7mrYzN3d3z0Iw73RwSAM9/df
Nm9fHOw1w4PhC97hJDrqp9rNWie6zEbwQkTPsjKzNNN2DD8AGx0hk8LGdeXH
Uga4AWWH9NK/U9Vcu7FcOFfa8fZ2s6IP82wLEUWRVFMLK8RwyOUitQBIXOe6
cDLRNq7SqbZSyVyTsVKbS2ekvqUfcy3dQn8NwCIAePPLl2CH+3ugOCZvyN3+
sD/qv9iSMwBEV1AZxylrTZwCiYlcpm6BQ7vhIihcJG9G5ru/35IeIKlja0jr
I2R6J3UTbiltKktVOWlm+GUZL32oqddOjlVBqgDRM0dbaFlbSAFNb1SWJhCJ
NY115dJZSsEiKx1rnJqIWWVy/kriBRlw6BIwpOdUkyBqmmnaLkltTApJW5cl
IC/hTF5oWADh1/e9W/I0SQBl8YzipjJJzbb7v5P+Z5z0TF7qKk8Lk5n5nRCT
Zme3UK5ZbNc5H56LFQgqgeE2VsJs+HNnM6hXODKvgFlYapp3ehH4f0NugpP9
ASCFmxTepwN4mzTWkuVWxZ00ZCqaA3o12VZPZOmVXqZW97BjnKUEnXU5HcGq
WfBYUL9mQ7BfroAfcHxi5cb7jxeXGz3/lKdnPD4//vHjyfnxEY0v3k7evWsH
fobAj7OP78J3Gq1WHp69f398euQX46188Or95GdsAGaUG2cfLk/OTifvNihL
urWoQHYikwIkKeWckvJCQq5uwiXBB/H68IMc7nq8EsED/DwmUsZ4udAFzIWj
TJHdhZ+w651QZalVRcfCRjBUCXxnSF44wC7MspCEU0bI3zw2GV/AY25cF4RC
/LQAsfOb1p/kgxCCaq6Q9pzU6kbbpDJlyRuxRFGpEH9O5aWu6K2ZCUY40HBd
4xV2aiigidXiyWjssWRICrYToYQNAYtCL07iMOYT8stC6+QR89AhBOPYx6Ry
HDYU1c0ygJsAZvK8LmgancAi4m1aJJriGrq0WKcfjeh3RBO04W/0GYlfzaEq
QnTB7s30nNmp0rY0hU2naUZrnOlThNKRsOtKXFLRYCk0p/jssAcksbbGTiCr
jcP2PVHwJIgCGyMiDyd2i3BhrJaHE1l6ikWIWIYhsxRE4+IJPoix1HpYuQVK
o/lCKKpEACZSjGaRRzLw3EORmAOB6Ybwkr6cINZxKNQI9CVYagryzjpiMGKF
xKDwAYiXizRe8G6sOZEuasnlVMVXVvhkQOVKJxkM+8MtsmDhiSXX0DcJ1ss0
fAovyKPJ6fE2ZJ7I7h4wDnRrjrRadOEGN5mMILE0dZaQciEOkkdsDh0oW5Gf
F57ogHVmgjYBAFe1DYX2xfFhEIMKtvv7nmx+7NIPWte82IOQ/T+cWG06L1TW
RMQjRRiwCBGKnkCuHkRdEPv464ZEJx15C3jK6GRA4XHvjcAJvqSU3ua2zm49
T4esDoIEh/uqMfCQxcJUZWKWVoBkpqYonQkiD3axfXn+gBesV69GjFbcJTRr
sLGITXFDcQ+4JNqhwmaWfcDMyxRKws1Ntq3LeaUSzt1phfgsioA4QPmxxRp2
MhQajONMN1QRZIPGz8MxqGoLi8oC52Z3AoH4SEMyN+xBmqgqkR+PPmzv7TA2
Lg952FjCg8Nbkey6ACWnSAqg5zKtoCi74cuXpry+v2f6bzs/wFNxvggx6KVg
0xMveR9g3yzNU+fLGsBO3aZ5nRMv7O9IEzuNQPWYHjJq2/Ac9Xf6u1ssONGg
Es0+VnNZBfhShd86MBAJc9NXNxwicnkfcu7UULYhh+SmLnhT1qm7nc6RWBPv
dRV06uCaVjdln/Cm7Pt64qGUXjDA9jX4Yme0KhZDQKPB6si6Dzkpe5jaiVIl
PLHdqic5DgGgALhG7ZWM/bVjOOD3omnqBDe0VEEYOYQ0IBjPYkj6ZsnU51cA
xPRj5yVPsiwMA1+T3/idAA6pPpu1hwrxL/yJWWZMtYlp38g9uS0PtvzrUBhw
7LAPsGvX0nxuV4meL45JW11QVpH+RCIsZyrNwcTUWXIv4e1rF2q0tx/UqvR1
DSxbCVOw0D3KQjdkzhdBM9qNAorA/Uy+WZEK1QRMTA207erCIji5Q0FshrWC
gFI3uM6nypkhA4+DhV6xft/L8fg7+YpuLxB7oJ/v5avpzshfZXRY8nuxNocW
bdCLDfH0dJ4xZf97o26+ejRnSzx+x+u8+fyKZpb/gsOjxknTtFAVbI3cHru6
YhSEhsz3Y2jHuBvznn8Gyx7foq6j5u9NoGUudrR/S5cVPcrcZMrRGp/1uGYC
Tk4+3OzK4ctRf4AebhhKRqRe/rIvR4PBcHz0+mA8HvYkh7ZPLnkn+XCZF1og
Wu8zaycjCxr3S50z9uSnpw38qcHsXBcoE4iU/E6OMUGe9smDLnESgL3QjedN
qQtrM3m7N3gpIyBrm2rebWe2m5OljFBvUTsSFQbxL/8p/94uK/k9vmNlhI8E
QHLM2qRkjhQYhTiIgqtogscEhq6SUSKff/fcj5//MoZRdDX+9TmNIT6PhSuX
t/n8OlF1FV/fXtv46vYmud6z7m7HlLfZPJ5+/ry7c1XnyfX+6Kq8rl6MVPD4
pWmN461SgzBDVH8i8H7Cd+r4ECK3PjnQtGmXtdDkrozekEu/3+d/334rf/x4
fEHtkkRdRM+x+LYDp77kv5NT/0RdRWsmHy/fnp2fXP68WrS2Zmd/MOgu8k8S
+M8Yo6/63d3/q0dN149iZY+OTnw/udL2P6SKlx7CT1Yh+ef3nn5lb/x147p1
vscY8fVbBFhGoReq0Yddn/XkcxFqoxD8PlYpi1LZ2DZByFC6eKp1nGvnc32W
Wk7rT5Vw1l9ZUDkqmn2Z5HpUxPMWqt2AGQ5PtFgOpZg4mYEhvvGh0ilhISJi
2CeqzIBTvpGT06POtN3wEWkoXuDpY6szraKL4YKk2gspsCEvH2tRon2siafM
54tOpDidl46CNFSzTbx2E56nQOrvqJMRTLIHofTs3GeF3vfi7YToyXc+nS4g
FBldTm7bp+Dj7qGN3lxJLLnT0DepqS0K2aAZW5cXkmxWW0sV1gzFPJc7lsqo
1C56UqfcCNaFusFHFdrsIFx7HVW0mvV4w87VQLMvEqLPH1NNKc3UVbPLQ/uK
RIO0E0sXccuF5vP9TQLIvPK3CLAI8mwKoyNxGsZvjcYNJ8qcKrXNX/7QTfuv
1A+etHvR0l6QKbR5fN+Fyqpssxn14F9r77jfFLzGVc3tXBMJQV26uaEIABfj
5MeyrwvgN2t6mq/3lahny7TJK97cdICT7yc/i5Usa01REIhrjqlG2tS9BmoL
mJrvwBjsQsWxBtbZtQW3793Ln6S/TiiFcb9HKu0l6u/ObTtJQHCpfFWlijuq
vOdth8uXSrx2rdeGqDFdDiUeQXQ32rk1XWuBqYu7ICASvA/DIhYAbHl5dnTW
fuWb+snp5MlZY7l+u9DW2rxCcSOD3q7QS3l+Lt1dqQmB/P8B6FaG9p7EV4VZ
oqme0w5WfBkXNRouNJ/fbcxUZvXGfZBItTNRe/8bPZjOLIgcAAA=

-->

</rfc>

