<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-carter-high-assurance-dids-with-dns-02" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title abbrev="hiadid">High Assurance DIDs with DNS</title>
    <seriesInfo name="Internet-Draft" value="draft-carter-high-assurance-dids-with-dns-02"/>
    <author initials="J." surname="Carter" fullname="Jesse Carter">
      <organization>CIRA</organization>
      <address>
        <email>jesse.carter@cira.ca</email>
      </address>
    </author>
    <author initials="J." surname="Latour" fullname="Jacques Latour">
      <organization>CIRA</organization>
      <address>
        <email>jacques.latour@cira.ca</email>
      </address>
    </author>
    <author initials="M." surname="Glaude" fullname="Mathieu Glaude">
      <organization>Northern Block</organization>
      <address>
        <email>mathieu@northernblock.ca</email>
      </address>
    </author>
    <author initials="T." surname="Bouma" fullname="Tim Bouma">
      <organization>Digital Governance Council</organization>
      <address>
        <email>tim.bouma@dgc-cgn.org</email>
      </address>
    </author>
    <date year="2024" month="April" day="09"/>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 87?>

<t>This document outlines a method for improving the authenticity, discoverability, and portability of Decentralized Identifiers (DIDs) by utilizing the current DNS infrastructure and its technologies. This method offers a straightforward procedure for a verifier to cryptographically cross-validate a DID using data stored in the DNS, separate from the DID document.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ciralabs.github.io/high-assurance-dids-with-dns/draft-carter-high-assurance-dids-with-dns.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-carter-high-assurance-dids-with-dns/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/CIRALabs/high-assurance-dids-with-dns"/>.</t>
    </note>
  </front>
  <middle>
    <?line 91?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In the ever-evolving digital world, the need for secure and verifiable identities is paramount. DIDs have emerged as a promising solution, providing a globally unique, persistent identifier that does not require a centralized registration authority. However, like any technology, DIDs face challenges in terms of authenticity, discoverability, and portability.</t>
      <t>This is where the Domain Name System (DNS), a well-established and globally distributed internet directory service, comes into play. By leveraging the existing DNS infrastructure, we can enhance the verification process of DIDs. Specifically, we can use Transport Layer Security Authentication (TLSA) and Uniform Resource Identifier (URI) DNS records to add an additional layer of verification and authenticity to DIDs.</t>
      <t>TLSA records in DNS allow us to associate a certificate or public key with the domain name where the record is found, thus providing a form of certificate pinning. URI records, on the other hand, provide a way to publish mappings from hostnames to URIs, such as DIDs.</t>
      <t>By storing crucial information about a DID, such as the DID itself and its Public Key Infrastructure (PKI) in these DNS records, we can provide a verifier with a simple yet effective method to cross-validate and authenticate a DID. This not only ensures the authenticity of the DID document but also allows for interaction with material signed by the DID without access to the DID document itself.</t>
      <t>In essence, the integration of DIDs with DNS, specifically through the use of TLSA and URI records, provides a robust solution to some of the challenges faced by DIDs, paving the way for a more secure and trustworthy digital identity landscape.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="securing-a-did-using-the-dns">
      <name>Securing a DID using the DNS</name>
      <t>Much like presenting two pieces of ID to provide a higher level of assurance when proving your identity or age, replicating important information about a DID into a different domain (like the DNS) enables a similar form of cross validation. This enhances the initial trust establishment between the user and the DID document, as the key information can be compared and verified across two segregated sets of infrastructure. This also acts as a form of ownership verification in a similar way to 2FA, as the implementer must have control over both the DNS zone and the DID document to properly duplicate the relevant information.</t>
      <artwork><![CDATA[
+----------------+     +----------------+
|                |     |                |
|   DNS Server   |     |   Web Server   |
|                |     |                |
|   +-------+    |     |   +-------+    |
|   |  DID  |<---+-----+-->|  DID  |    |
|   +-------+    |     |   +-------+    |
|   +-------+    |     |   +-------+    |
|   |  PKI  |<---+-----+-->|  PKI  |    |
|   +-------+    |     |   +-------+    |
|                |     |                |
+----------------+     +----------------+
]]></artwork>
      <t>The diagram above illustrates how a web server storing the DID document, and the DNS server storing the URI and TLSA records shares and links the key information about the DID across two independent sets of infrastructure.</t>
      <section anchor="specifically-for-didweb">
        <name>Specifically for did:web</name>
        <t>With did:web, there’s an inherent link between the DNS needed to resolve the associated DID document and the domain where the relevant supporting DNS records are located. This means that the domain specified by the did:web identifier (for example, did:web:<strong>example.ca</strong>) is also the location where you can find the supporting DNS records.</t>
        <section anchor="consideration-for-other-did-methods">
          <name>Consideration for other DID methods</name>
          <t>In the case of other DID methods, the association between a DID and a DNS domain is still possible although less inherent than with the aforementioned did:web. This association is currently out of scope at this time.</t>
        </section>
      </section>
      <section anchor="mapping-dids-to-domains-with-uri-records">
        <name>Mapping DIDs to Domains with URI records</name>
        <t>The association to a domain stemming only from the did is unidirectional. By leveraging URI records as outlined in <xref target="DID-in-the-DNS"/>, we can create a bidirectional relationship, allowing a domain to publish their associated DID in the DNS.</t>
        <t><strong><em>Ex: _did.example-issuer.ca IN URI 1 0 “did:web:XXXXXX”</em></strong></t>
        <t>This relationship enhances security, as an entity would require control over both the DID and the domain’s DNS server to create this bidirectional association, reducing the likelihood of malicious impersonation.</t>
        <section anchor="uri-record-scoping">
          <name>URI record scoping</name>
          <ul spacing="normal">
            <li>
              <t>The records <bcp14>MUST</bcp14> be scoped by setting the global underscore name of the URI RRset to <em>_did</em> (0x5F 0x64 0x69 0x64).</t>
            </li>
          </ul>
        </section>
        <section anchor="entity-handles">
          <name>Entity Handles</name>
          <t>An implementer may have multiple sub entities operating and issuing credentials on their behalf, like the different deparments in a university issuing diplomas or publishing research. For this reason, the introduction of an entity handle, represented as a subdomain in the resource record name, provides a simple way to facilitate the distinction of DIDs, their public keys, and credentials they issue in their relationship to another entity or root authority.</t>
          <t><strong><em>Ex: _did.diplomas.example-issuer.ca IN URI 1 0 “did:web:diplomas.XXXXXX”</em></strong></t>
          <t><strong><em>Ex: _did.certificates.example-issuer.ca IN URI 1 0 “did:web:certificates.XXXXXXX”</em></strong></t>
        </section>
      </section>
      <section anchor="pki-with-tlsa-records">
        <name>PKI with TLSA records</name>
        <t>The DID to DNS mapping illustrated in section 3.2 provides a way of expressing the association between a DID and a domain, but no way of verifying that relationship. By hosting the public keys of that DID in its associated domain’s zone, we can provide a cryptographic linkage to bolster this relationship while also providing access to the DID’s public keys outside of the infrastructure where the DID document itself resides, facilitating interoperability and increasing availability.</t>
        <t>TLSA records <xref target="RFC6698"/> provide a simple way of hosting cryptographic information in the DNS. Key material can be represented in TLSA records either hashed or unhashed depending on the requirements and use case of the implementer.</t>
        <section anchor="tlsa-record-scoping-selector-field">
          <name>TLSA Record Scoping, Selector Field</name>
          <t>When public keys related to DIDs are published in the DNS as TLSA records:</t>
          <ul spacing="normal">
            <li>
              <t>The records <bcp14>MUST</bcp14> be scoped by setting the global underscore name of the TLSA RRset to <em>_did</em> (0x5F 0x64 0x69 0x64).</t>
            </li>
            <li>
              <t>The Selector Field of the TLSA record must be set to 1, SubjectPublicKeyInfo: DER-encoded binary structure as defined in <xref target="RFC5280"/>.</t>
            </li>
          </ul>
        </section>
        <section anchor="instances-of-multiple-key-pairs">
          <name>Instances of Multiple Key Pairs</name>
          <t>Depending on the needs of the implementer, it is possible they may use multiple keypairs associated with a single DID to sign and issue credentials or enable other PKI related interactions. In this case, a TLSA record will be created per <xref target="verificationMethod"/> and then be bundled into the corresponding TLSA RRset. A resolver can then parse the returned records and match the key content to the verificationMethod they wish to interact with or verify.</t>
          <t><strong><em>Ex: _did.example-issuer.ca IN TLSA 3 1 0 "4e18ac22c00fb9...b96270a7b4"</em></strong></t>
          <t><strong><em>Ex: _did.example-issuer.ca IN TLSA 3 1 0 "5f29bd33d11gc1...b96270a7b5"</em></strong></t>
          <section anchor="security-consideration">
            <name>Security Consideration</name>
            <t>It is <bcp14>RECOMMENDED</bcp14> implementers limit the total number of TLSA records for a given domain to 255 to mitigate DoS style attacks, such as creating a problematic number of TLSA records to then be resolved and parsed by the verifier.</t>
            <t>If the total number of TLSA records returned to a verifier exceeds this threshold, it is <bcp14>RECOMMENDED</bcp14> they abort the verification process and deem the target DID insecure.</t>
          </section>
        </section>
        <section anchor="benefits-of-public-keys-in-the-dns">
          <name>Benefits of Public Keys in the DNS</name>
          <t>Hosting the public keys in TLSA records provides a stronger mechanism for the verifier to verify a did and its associated entity with, as they are able to perform a cryptographic challenge against the DID using the corresponding TLSA records, or against the domain using the corresponding <xref target="verificationMethod"/> in the DID document. The accessibility of the public keys is also beneficial, as the verifier does not need to resolve the DID document to accesss its associated key material, enhancing interoperability.</t>
        </section>
      </section>
    </section>
    <section anchor="role-of-dnssec-for-assurance-and-revocation">
      <name>Role of DNSSEC for Assurance and Revocation</name>
      <t>It is <bcp14>RECOMMENDED</bcp14> that all the participants in this digital identity ecosystem enable DNSSEC signing for the DNS instances they operate. See <xref target="RFC9364"/>.</t>
      <t>DNSSEC provides cryptographic assurance that the DNS records returned in response to a query are authentic and have not been tampered with. This assurance within the context of the <em>_did</em> URI and <em>_did</em> TLSA records provides another mechanism to ensure the integrity of the DID and its public keys outside of infrastructure it resides on directly from the domain of its owner.</t>
      <t>Within this use-case, DNSSEC also provides revocation checks for both DIDs and public keys. In particular, a DNS query for a specific <em>_did</em> URI record or <em>_did</em> TLSA record can return an NXDOMAIN <xref target="RFC8020"/> response if the DID or public key has been revoked. This approach can simplify the process of verifying the current validity of DIDs and public keys by reducing the need for complex revocation mechanisms or implementation specific technologies.</t>
    </section>
    <section anchor="digital-signature-and-proof-value-of-the-did-document">
      <name>Digital Signature and Proof Value of the DID Document</name>
      <t>Digital signatures ensure the integrity of the DID Document, and by extent the public keys, authentication protocols, and service endpoints necessary for initiating trustworthy interactions with the identified entity. The use of digital signatures in this context provides a robust mechanism for verifying that the DID Document has not been tampered with and indeed originates from the correct entity.</t>
      <t>In accordance with W3C specifications, we propose including a data integrity proof such as those outlined in <xref target="dataIntegrityProofECDSA"/> and <xref target="dataIntegrityProofEdDSA"/>, with the mandatory inclusions of the "created" and "expires" fields. The inclusion of which acts as a lifespan for the document, similar to the TTL for a DNS record. Depending on the use case and security requirement, a longer or shorter expiry period would be used as necessary.</t>
      <t><tt>json
   "proof": {
       "type": "DataIntegrityProof",
       "cryptosuite": "ecdsa-jfc-2019",
       "created": "2023-10-11T15:27:27Z",
       "expires": "2099-10-11T15:27:27Z",
       "proofPurpose": "assertionMethod",
       "verificationMethod": "did:web:trustregistry.ca#key-1",
     }
        </tt></t>
      <t>The data integrity proof <bcp14>SHOULD</bcp14> be signed using a verificationMethod that has an associated TLSA record to allow for the verification of the data integrity proof using data contained outside of the DID document. This provides an added layer of authenticity, as the PKI information contained in the DID document would need to be supported across 2 different domains.</t>
      <section anchor="use-of-alternative-cryptosuites">
        <name>Use of Alternative Cryptosuites</name>
        <t>While <xref target="dataIntegrityProofECDSA"/> and <xref target="dataIntegrityProofEdDSA"/> are the cryptosuites we have chosen to highlight in this specification, it is important to note that this implementation for a high assurance did is cryptosuite agnostic. It is interoperable with any new and existing cryptosuites and associated key types as required by the implementers and verifiers.</t>
      </section>
    </section>
    <section anchor="verification-process">
      <name>Verification Process</name>
      <t>Using the new DNS records and proof object in the DID document, we enable a more secure and higher assurance verification process for the DID. It is important to note that while not strictly necessary, DNSSEC verification <bcp14>SHOULD</bcp14> be performed each time a DNS record is resolved to ensure their authenticity.</t>
      <t>The process below outlines the general steps required to complete the higher assurance did verification process;</t>
      <ol spacing="normal" type="1"><li>
          <t><strong>Verification of the DID:</strong> The user verifies the DID is represented as a URI record in the associated domain.
          </t>
          <ol spacing="normal" type="1"><li>
              <t>In the case of did:web, the domain and record name to be queried is indicated by the last segment of the did. In example, <strong>did:web:example.ca</strong> would translate to a URI record with the name <strong>_did.example.ca</strong>.</t>
            </li>
          </ol>
        </li>
        <li>
          <t><strong>Verification of the PKI:</strong> With the association between the DID and the domain verified, the user would then proceed to verify the key material between the DID and the domain.
          </t>
          <ol spacing="normal" type="1"><li>
              <t>The user would query for a TLSA record. Depending on the type of TLSA record/s returned, the user would verify either the hash of the verificationMethod or verificationMethod itself matches what was returned by the TLSA record content.
              </t>
              <ol spacing="normal" type="1"><li>
                  <t>Note: This may require some conversion, as TLSA records store key material as hex encoded DER format, and this representation is not supported by <xref target="verificationMethod"/>. However, there are many well supported cryptography libraries in a variety of languages that facilitate the conversion process.</t>
                </li>
              </ol>
            </li>
          </ol>
        </li>
        <li>
          <t><strong>Verification of the DID document's integrity:</strong> After verifying that the did's key material matches what is represented in the TLSA records of the associated domain, the user would then verify the "proof" object to ensure the integrity of the DID document.
          </t>
          <ol spacing="normal" type="1"><li>
              <t>This can be accomplished by using either the <xref target="verificationMethod"/> directly from the did document, or using the key material stored in the TLSA record. Using the TLSA record would provide a higher level of assurance as this confirms the key material is being accurately represented across 2 different domains, both at the DID document level and the DNS level.
              </t>
              <ol spacing="normal" type="1"><li>
                  <t>Note: Unlike with matching the verificationMethod and TLSA record in step 2, DER is a widely supported encoding format for key material enabling a verifier to directly use the TLSA record content to verify the signature without having to convert the key back to its representation in the verificationMethod.</t>
                </li>
              </ol>
            </li>
          </ol>
        </li>
      </ol>
      <section anchor="verification-failure">
        <name>Verification Failure</name>
        <t>If at any given step verification fails, the DID document should be deemed INSECURE. Whether it is due to the DID and DNS being out of sync with recent updates, or the DID document or DNS zone themselves being compromised, a failed verification <bcp14>MAY</bcp14> indicate malicious activity. It is then up to the verifier to determine, according to their requirements and use case, the appropriate course of action regarding interactions with the target DID until successful verification is restored.</t>
      </section>
    </section>
    <section anchor="control-requirements">
      <name>Control Requirements</name>
      <t>This section defines a simple framework to define a set of technical controls that can be implemented and mapped into levels of assurance for did:web identifiers.
To assist in decision-making and implementation, The controls are ordered in increasing level of security assurance and are grouped into levels of assurance from <strong>LOW-</strong> to <strong>HIGH+</strong>
- <strong>Issuing Authority</strong> is the entity accountable for the did:web identifier.
- <strong>Issuing Service</strong> is the entity responsible for operating the did:web identifier infrastructure.
In many cases the <strong>Issuing Authority</strong> may delegate elements of providing a high assurance did:web identifier to an <strong>Issuing Service</strong> that may be a commercial provider.
In the simplest case, the <strong>Issuing Authority</strong> can be regarded as the same as the <strong>Issuing Service</strong>.
Note that Controls 9, 10, and 11 CANNOT BE DELEGATED to an <strong>Issuing Service</strong></t>
      <t>11 technical controls are defined. These controls would be implemented in order of precedence for an increasing level of security assurance. (e.g., Control No. N would need to be implemented before implementing Control No. N+1)</t>
      <table>
        <thead>
          <tr>
            <th align="left">Control No.</th>
            <th align="left">Control Name</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">1</td>
            <td align="left">DID Resource Control</td>
            <td align="left">The Issuing Service <bcp14>MUST</bcp14> control the resource that generates the DID document. (i.e., website)</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">DID Document Management</td>
            <td align="left">The Issuing Service <bcp14>MUST</bcp14> have the ability to do CRUD operations on the DID document.</td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">DID Document Data Integrity</td>
            <td align="left">The Issuing Service <bcp14>MUST</bcp14> ensure the data integrity of the DID document by cryptographic means, typically a digital signature or other means. The use of approved or established cryptographic algorithms is HIGHLY <bcp14>RECOMMENDED</bcp14></td>
          </tr>
          <tr>
            <td align="left">4</td>
            <td align="left">DID Document Key Control</td>
            <td align="left">The Issuing Service <bcp14>MUST</bcp14> control the keys required to sign the DID document.</td>
          </tr>
          <tr>
            <td align="left">5</td>
            <td align="left">DID Document Key Generation</td>
            <td align="left">With proper delegation from the Issuing Authority, the DID Document signing key <bcp14>MAY</bcp14> be generated by the Issuing Service. Otherwise, the signing key must be generated by the Issuing Authority.</td>
          </tr>
          <tr>
            <td align="left">6</td>
            <td align="left">Domain Zone Control</td>
            <td align="left">The Issuing Service <bcp14>MUST</bcp14> have control of the domain zone (or subdomain zone).If direct control of the domain is not feasible, the use of an accredited DNS provider is HIGHLY <bcp14>RECOMMENDED</bcp14></td>
          </tr>
          <tr>
            <td align="left">7</td>
            <td align="left">Domain Zone Mapping</td>
            <td align="left">There <bcp14>MUST</bcp14> be domain zone records that map the necessary URI, TLSA, CERT and/or TXT records to the specified did:web identifier.</td>
          </tr>
          <tr>
            <td align="left">8</td>
            <td align="left">Domain Zone Signing</td>
            <td align="left">The domain zone records <bcp14>MUST</bcp14> be signed according to DNSSEC. (RRSIG)</td>
          </tr>
          <tr>
            <td align="left">9</td>
            <td align="left">Domain Zone Signing Key Control</td>
            <td align="left">The Issuing Authority <bcp14>MUST</bcp14> have control over the domain zone keys used for signing and delegation. (KSK and ZSK)</td>
          </tr>
          <tr>
            <td align="left">10</td>
            <td align="left">Domain Zone Signing Key Generation</td>
            <td align="left">The signing keys <bcp14>MUST</bcp14> be generated under the control of the Issuing Authority.</td>
          </tr>
          <tr>
            <td align="left">11</td>
            <td align="left">Hardware Security Module</td>
            <td align="left">A FIPS 140-2 compliant hardware security module must be under the control of the Issuing Authority.</td>
          </tr>
        </tbody>
      </table>
      <t>In addition to the technical controls specified in the table it is advisable to add in DANE (DNS-based Authentication of Named Entities) <xref target="RFC6698"/> to secure TLS communications. TLS uses certificates to bind keys to names, which are published by public "Certification Authorities" (CAs). It is important to realize that the public CA model is fundamentally vulnerable because it allows any CA to issue a certificate for any domain name. Thus, a compromised CA can issue a fake replacement certificate which could be used to subvert TLS-protected websites. DANE offers the option to use the DNSSEC infrastructure to store and sign keys and certificates that are used by a TLS-protected website. The keys are bound to names in the Domain Name System (DNS), instead of relying on arbitrary keys and names issued in a potentially compromised certificate.</t>
    </section>
    <section anchor="levels-of-assurance">
      <name>Levels of Assurance</name>
      <t>Many trust frameworks specify levels of assurance to assist in determining which controls must be implemented.</t>
      <t>The following table is not a definitive mapping to trust framework levels of assurance. It is intended to assist in determining mappings by grouping the controls within a range from <strong>LOW-</strong> to <strong>HIGH+</strong> relating to the appropriate risk level. Note that controls are additive in nature. (i.e.,, controls of the preceding level must be fulfilled).</t>
      <table>
        <thead>
          <tr>
            <th align="left">Level of Assurance</th>
            <th align="left">Controls</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>LOW-</strong></td>
            <td align="left">Control 1</td>
            <td align="left">
              <bcp14>SHOULD</bcp14> only be used for low risk transactions where attribution to originator is desirable.</td>
          </tr>
          <tr>
            <td align="left">
              <strong>LOW</strong></td>
            <td align="left">Control 2</td>
            <td align="left">
              <bcp14>SHOULD</bcp14> only be used for lower risk transactions where establishing the accountability of the originator is desirable.</td>
          </tr>
          <tr>
            <td align="left">
              <strong>MEDIUM</strong></td>
            <td align="left">Controls 3, 4 and 5</td>
            <td align="left">
              <bcp14>MAY</bcp14> be used for medium risk commercial transactions, such as correspondence, proposals, etc.</td>
          </tr>
          <tr>
            <td align="left">
              <strong>MEDIUM+</strong></td>
            <td align="left">Controls 6 and 7</td>
            <td align="left">
              <bcp14>MAY</bcp14> be used for higher risk transactions, such as signing and verifying invoices, contracts, or official/legal documentation</td>
          </tr>
          <tr>
            <td align="left">
              <strong>HIGH</strong></td>
            <td align="left">Controls 8, 9 and 10</td>
            <td align="left">
              <bcp14>MUST</bcp14> be high risk transactions, such as government transactions for signing and verifying licenses, certifications or identification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>HIGH+</strong></td>
            <td align="left">Control 11</td>
            <td align="left">
              <bcp14>MUST</bcp14> be used for extremely high risk transactions where there may be systemic or national security implications</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Per <xref target="RFC8552"/>, IANA is requested to add the following entries to the
"Underscored and Globally Scoped DNS Node Names" registry:</t>
      <artwork><![CDATA[
+---------+------------+-------------------------------------------+
| RR Type | _NODE NAME | Reference                                 |
+---------+------------+-------------------------------------------+
| TLSA    | _did       | [draft-ietf-high-assurance-dids-with-dns] |
| URI     | _did       | [draft-mayrhofer-did-dns-01]              |
+---------+------------+------------------------------------------+.
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="DID-Specification-Registries" target="https://www.w3.org/TR/did-spec-registries/#did-methods">
          <front>
            <title>DID Specification Registries</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="W3C-VC-Data-Model" target="https://www.w3.org/TR/vc-data-model/">
          <front>
            <title>Verifiable Credentials Data Model v1.1</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="alsoKnownAs" target="https://www.w3.org/TR/did-core/#also-known-as">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="services" target="https://www.w3.org/TR/did-core/#services">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LinkedDomains" target="https://identity.foundation/.well-known/resources/did-configuration/#linked-domain-service-endpoint">
          <front>
            <title>Well Known DID Configuration</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="DID-in-the-DNS" target="https://datatracker.ietf.org/doc/html/draft-mayrhofer-did-dns-05#section-2">
          <front>
            <title>The Decentralized Identifier (DID) in the DNS</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="verificationMethod" target="https://www.w3.org/TR/did-core/#verification-methods">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="issuer" target="https://www.w3.org/TR/vc-data-model-2.0/#issuer">
          <front>
            <title>Verifiable Credentials Data Model v2.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="dataIntegrityProofECDSA" target="https://www.w3.org/TR/vc-di-ecdsa/#proof-representations">
          <front>
            <title>Data Integrity ECDSA Cryptosuites v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="dataIntegrityProofEdDSA" target="https://www.w3.org/TR/vc-di-eddsa/#proof-representations">
          <front>
            <title>Data Integrity ECDSA Cryptosuites v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC8020">
          <front>
            <title>NXDOMAIN: There Really Is Nothing Underneath</title>
            <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer"/>
            <author fullname="S. Huque" initials="S." surname="Huque"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document states clearly that when a DNS resolver receives a response with a response code of NXDOMAIN, it means that the domain name which is thus denied AND ALL THE NAMES UNDER IT do not exist.</t>
              <t>This document clarifies RFC 1034 and modifies a portion of RFC 2308: it updates both of them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8020"/>
          <seriesInfo name="DOI" value="10.17487/RFC8020"/>
        </reference>
        <reference anchor="RFC8552">
          <front>
            <title>Scoped Interpretation of DNS Resource Records through "Underscored" Naming of Attribute Leaves</title>
            <author fullname="D. Crocker" initials="D." surname="Crocker"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Formally, any DNS Resource Record (RR) may occur under any domain name. However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies. The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., "_name"). The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch. This specification explores the nature of this DNS usage and defines the "Underscored and Globally Scoped DNS Node Names" registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="222"/>
          <seriesInfo name="RFC" value="8552"/>
          <seriesInfo name="DOI" value="10.17487/RFC8552"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="Self-Sovereign-Identity">
          <front>
            <title>Self-Sovereign Identity</title>
            <author initials="D." surname="Reed" fullname="Drummond Reed">
              <organization/>
            </author>
            <author initials="A." surname="Preukschat" fullname="Alex Preukschat">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
          <seriesInfo name="ISBN" value="9781617296598"/>
        </reference>
      </references>
    </references>
    <?line 316?>

<section anchor="w3c-considerations">
      <name>W3C Considerations</name>
      <ol spacing="normal" type="1"><li>
          <t>We propose the inclusion of an optional data integrity proof for the DID document, as outlined in <xref target="dataIntegrityProofECDSA"/> and <xref target="dataIntegrityProofEdDSA"/>.</t>
        </li>
      </ol>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA71c63Ibx5X+j6fopX6sRAEgQV3JzSaBSdpiLFJakrLspFLJ
YKYBjDmYgedCCjFVldfYqt2qfZZ9lDzJfuec7p5uYCDL8SYqJ6KGPd2nT5/L
dy49g8GgV6d1po/Uzqt0NlfjqmrKKI+1Ojk7qdRdWs/VycXVTi+aTEp9i2Hz
NErSZKcXR7WeFeXqSKX5tOj1kiLOowUmSspoWg/iqKx1OZhj0kFkJx3gzWpA
kw6SvBrsH/SqZrJIqyot8nq11DRXopca/5fXvbxZTHR51Euw0lEPaz/p3ejV
XVEmRz01ULn+UKuZznUZ1XifHjV5Ghcl/1gto/ImS/OZStKqLtNJU+tEZTqZ
6bJ3q/MGUyo1AynNBLs6Prscv44m1d6nCN7BGxmIqWriQ10vq6O9vTgtowxv
DmWuYVp8co69z2bPcF4vsp1eL2rqeQE2DLA6+FMdqd8N1TG/T0+E6b/TVaW9
p0U5O1K0KfqHXkRpdqS+pzFDWfm3RDZ+Dmd9HdVF488axT80uvKed84ro4YZ
j+qY+XyovsqiJtHtzOdRPU914z3nmS+Ksp7rMldfZEV8462xkPG/zc2ACf0+
XOV6qL4omkXULnKdLtpHPP9JilOKMvVVcYtJWM6PiyaP08xbq04Xwwm99ttk
Fg/iWT7Eu70eiXkJOtJbFh11pbPp4Iom0uksH5yRzKb1in+HP1atwmHKDtsx
w+zpKvNn4H4y2zoZqkutE++xbO6kbBaLIk/C3268Ph6qt6Vubqp4HtUbk4wz
/WHz95UuU13Rflu61NnVFxdH6vDFy9Hz0YuDw+fPDl+aX7J+qoP9g1Gvlwcs
gg0ZXC11nE7TmJV0cKlnrI66WucTxqpgrGrHWmbVUTnTUD6re3d3d8O7J3Q8
e9eXe9CeQYUZBqV7ce8BPVxo8DipaJL3T44H3xwPTqI6GpwXic7WyfgGe5+m
0SSDZJSaDyvKKkUvKH5B3Y6Go88j6DYeJLTQgt7bo1cwVfF1Xtzl48396xiL
wZakf4GhEjGZprqs1EMyxY9o3f3PZwTsoN57QOsNbmhBWJmeHO1tGndw/x+x
ul2MXnud5jc6OSmgYvnG6u91linmC4kMVDKfprNG7Pq2RVOjSMMpFDjhoXvD
O0wk+90rdQVrhNUNQd6Uew8ypmaQMDkDQ+cAfmdZpHltRRe/grEZwP+tE3w9
h4PcwjLm2CNon6ppFDnP7h2QbOD9+EaXw1TXU2Yg3OgeGX7jJxbRqpwXU7gK
2gU7zWfga8zKdEAT37LAisqcs6D/U87WX9ZXMDjzRpd/h1YdfC4NgVYN8Nre
A1m0J7YoOsuBTEqIxtuyKKanxydX4w2W0MJunOIxoGy1rIuqSeHhfwZPiJ50
oOOkivYeLGlJGKAlxA+7ZPZUWwhL/jmEJZ8grDcYDBTAC4lh3etdz9NKQQKb
BYaooqmhJ1gyUnLACg5QpQtMdUvAisSb3BedZgxq+wS1YvJ00STN+EEE/7SE
yzYPVDHdqjZOGicr1dQY/he7RtyUJdEDVSKsWUYgt4nrptQ8f1pXqtbxPC+y
YgabP1S8DUNyMZ3S3JGiPQJt1djDXVSCrLKIdUKT0K4io0dQ37pQMTN8VkbL
OUQ8y1Z4UlTV4BZUk7fDcLJTTcX4ko6sqqEViaf0fZhaQFAaPC2LhTzGO5a7
Q+H9Ik2STPd6D+jQyyJpWLN7vTOZSIOqgb4tsltBsoJeAIGzpM8Dcjh/3gBs
gmXIbatsxkiCK1BMRfQsYC3roaD7eXSLJRYaQpSoiJgEpgCO01pVkTVESl/x
cSf0LFKzrJgwP4C0gfnwSzAXvpaOJ20tYA0sgZ1i1byoVal/aFKiTfknb5y0
uHpBQWTN1avijnbdV1l6Q/tZtYcLgWK6pxFwG/BKlul8RlsDs3S5qEi8fp5A
Do3M4787wEotx8ReQV0AIamrFTa3gGheXD3C24odDAIAcDet5sQ2TOi44oca
8COAmBp8wN5jiMfKOt++iosFkw1RW2YRNv3FCqEJ0TmzQq8/YC76x6bU90GF
iqNc6XzOEJbG+/ZYZLtifhDDhi2wApXu9QYRwzUCj4oYAoy/wsldkRiRpo4t
H2XGh9evr8aPeLfv8pSAMOCZONjA9b27PHvEJGPPCNQq0qYoITbRXynNBQHO
eC1QF1BNk/vHR+8y+TgkrO6mxNnQCthLcYdN8BJVVcSpaGasy1om1QD9atng
qGKFyFGiWWKW+H3GwN65y/wkCwwpSMEwuy/+vG+Q7S+xTPMcvx0qbN2S2FeF
6G9BwQr0jGaTiYjCu4j3xpRVc8Q2S0wyq8RQzIuqJsJ4X5gTk1VNPCf9NMyA
sJC5IZJiiAQ8qXKxCbERsUstFqp91ZofGEvEI85uvhXmfA3mnIWW9eHbr88s
iKm0f6ROftoNOdvJHIY1hJOA9VlB+jXsb0wBgTXIbF5DY+qfu7OuxoyTASly
6JbOESXrasPr0HmsG1c1IQ4A+4qQVOK4SCEjtq9CJ/gFusG9CoEZNBaOx05E
v2cuxqxHoHljCeHkkE01BdY5KTaNStl7y1kYBXR5FByIp4kYXhbNTGSStBHD
WdJZzXxxMqwmE10Wk6aqnX0m2iqYE8sGzyySmeRdEQmYI3JemwRQvN4Cbsv3
HTj/qr6jIHvl3I1F2lDbPKniaKmH5LCA0m/pF8AR/OqJnqZ5anAFAWRWOdbY
nfN3V9c7fflbXbzhny9P/+Pd2eXpCf189Wr8+rX7oWdGXL168+71SftT++bx
m/Pz04sTeRlPVfCot3M+/m5HjP3Om7fXZ28uxq93RJh9gBOR4hdqImdWAhrV
7Ah74HQMOy4O/Yvjt//7P6On6scf/+Xyy+OD0ejw40fzj5ejF0/xD5iQXFZj
SZV/gs+rHjRbRyR6JIhQmiUxFGcBjazmFO6Q8QE3d/9AnPnjkfrVJF6Onv7a
PKANBw8tz4KHzLPNJxsvCxM7HnUs47gZPF/jdEjv+Lvg35bv3sNf/YbwpBqM
Xv7m1z0SIfE2bFpbPGUAVK93TraLUYABrfzbOxjOFBiSvRteIkPqDBHl02CG
yJdmjAZcOpMORVnkuoLjasWaFGEG5QU4ztgXYQQMGKEE0vNu0yreO4KSEMAk
aTJO5SFTbDbxCGaLgFglRjHNIAzOiZAVVMYKYnZj8IxTr4wtSSlSErVUDneI
jdP1nda5NR6l6O+amepb40/K6G+FDDgEH0gEqNDgGGPG8Q+hjXhdwZbpWUSK
UemamR6iEUO2WNsYIxhI2k1CxoEQ5+kydPWkEI4hxh0efDl21LL/IPqxrQVt
naEqgnhgZBws5lKTwjhzck1/KXLduX8jHoCpBM8aOWDr7iEmaycMVaS46vFg
7c9j1f2YR9+rtT/3qvuxG00kXwEMYhv+6Pd64j3+O+d+7JPcjg4fu9H3nOnA
37+i38mIweDX7vEvmftnUwLI0UWJPP4lc38+Bz//5NnFJWkEV78gwwD5TLOs
4ZAG2gvrzuHChFE/TtRCtg4NtXILqegYTECAhgQYuJpHBIboOeWyunVczJVd
0FNqr8qyTathnh8EYQMDhiRNjrCnXu89ARrzL/Z1pf7bX/+TCMJEczGIRFhg
pWiDFLBqRoGUoMtuRRcdfk9C7bWsMbbVx+pGeatmSZbaRkqWP+Tas4J0PXH5
AEQ6Epl6Mxo41qI/syc/mn1IO9cfIrJJfTvgaHfXPBrG0e7uI2VtIE3CKzPO
ZILhbtjeAh/JdrqJZp4zrqqwukGQtLZEEcQYm2iz+YE4EtS4MaIfsJUmsgch
3osxNy9uGAHyEW8CpCwhJCnlDqKMMDDQaUYQ2J0qOJi3kVQE+thQYwkw0TDH
+gRvefzT5HEgSiSWoBqx+RJT1ALL6nRhxO5cAiKBzhQEStZYVvVwseigv4q4
ZHO0CNwXNA2DMpeEAYlETJOnEphzRLoegXuLkEsymTCGgz/+GKaGP350AVFc
aglfJv7cJKuSboMb7EtEIpjHEOqFgpgzLde1oU0qEVLc3T39cKT+hG0MjQAO
JP0JOVRnF0z6SO2rv/31v6yofst//vbX/8bLJuHh09RCjspE/+yHOcHAAOmu
aLLEpXG2eGEjVK1usT3wbBoHflq8LygIeeQdIgGxBGGtMX8Ep7J0XnAuDzEb
PHhaIC4HRACywMvGb5PqtMfGsoUper2BunaxfaUYVQP3sOix0sP+1XYtSeRA
NqB+FeW5JUVgQiua/fIS42kru3QCu+rh/odnX6r9D8+f0v8d8k+PDDWnwr1X
YAtUqNcb5yGuAexhWLNosjqleLlqJsrl6wizCBblYB1HLAF/mz2XHAPkZaIR
9E1Nxkxk3IFSSkLSgpVgLoj9LaXsQJedMsHaOLDKJUsgE3hMkDsq4/lQfVmU
cmQ4varIXZTr0pWMtJ20zHm/DKcFttvkIrZnjU1ujLjJIJkzI2YHsa7JIxiA
iHiWknYWvyWcIIv9OLtvGNLmfCpxrz7bKDCTMoWhAy8E6kBGJBeL2kYIZVHU
XpoyVETLws/WSPdCqJr+nF6O6fPnDV76NpwcEklIio2ojyXEip5IKEX6avJR
Hpxhw2eqTurJ8MA/IzocsF9/oNN2AdxPeR4RhD4navLCTsIxwkrmiOrgVNhC
U27MruCdsSgoXjDWMq0r34Z65ojihI78VZDvZ9yCgJBTA0VW1dqJvyckd/OU
fWRV+BnC9XQRLxpQ2tTk3K1JWStneDnozVQTqQvxvN8qAp8SGRM2FqbGwuYi
J1PLpxHdRoiy2nS3jyIli/H8+eHLjx89dnhqBzot00Mm+TjTc1CcSnSJNRNk
+pYAYwMSdGpSpJxNh6I1uflZIKo4cGMu2AGJNaNdUsrMIqC1qNGYYF7qUqzL
lXiEPjVucEJefZnqLAGW5dSAd0h80AJSGYIQmDSWMajxkFnzN3P0/+lthPTP
czeyarivYB5jYDmUJnpk0hF40Uy+x0uSB8bZnVHThzo5vRzoPC4IqU/SPKLa
RVtzq3A00xYOkQg9O3i5//GjYfpZXtWCJ0DCuXVuJBhvo7SEvTlZP1kKCqqO
U+xD9LlwZTEp225ynHT0zm/i0JY0s6/0LhOdzzJn3SjR69ypDp1paVI1BkuT
qbRy4GWOq6E6M2lEkjwqCfkMviMEPdEG6CRUHgOHNkv0UDcDllhBJg25zERy
SozrC0DlalkIl1pRGKqxjZtK1i6eAS6+smERjijn6poBr1gF6hjPXYBI8M0k
RtbrRucmQz/nWgnB0cLtXRgKLomN/hwkymQ/YRe181SPXkbxwUG8vz+dHA6H
w8nh84MX+9GLydOdDdf3k7M9mx4cTpInT5LRaBaP/Nme7Rhf9+BBW8sKIirE
TixTXh7TF7kK5n+RSoxYF5T+ljZEl5u3nJX8+QxwKveA/MGzZ/QXZkgpaYbQ
Bfi3XpGrqOsovvGqOSwjEgjA9ELyyJrG25aT4zLmlAVAcnZ89i56tYUYKktM
f3oPTlw4bnJVHP0hZoWUsGyO9eYFFZzTDcaxqEQTqh9uLUISlYnWEn1Jx4Jx
1FJ3MFbjC53Dqkguoi1LVZ657fVebfH/607Fh5CAqfmM4LaOgUzTasEn5zOL
di9SzfncxFXHPHNiIyEogU1SrtgvsMmgCE6XnPNcBxOuHqOiGQWxbT6mzXZ3
aHtbSCyDF42kbXt3i62xPPT7D9hlCGBJ2+6MDc6arMaET4dqjS5H69jnCv3c
jLCW2VlPxsqK1Tp/bzzY0DcBaRe64crTZZGxm4RMXJ0e83m2fcsRt0TemgxM
l7YzVKR6DG82KqmOuIxMiCQVovXKF06jkk4A4yTM0uRQiEwrUlKst+6PhUTi
OD2EOdLGWx4+ef6UvaWZxYlrKDpt8cJlrfwUl1NeUC0iUGlR5B9gNY102kIp
s4WjTTqoCWfkIoqgjatsMza2XoKHRmzYY3yorXgYKGLTkuafW/TPxFGt8oFA
qeR6tdK1Kq5Vvy24eQ0zp7UFxoQmJKcQ5HtEY+hFMi5UjxhK/tKeNrDEQJy5
OQ8P1WvisxUmKLOGCefT5sSHoEOywi2pDBBEqposKvsmzSZnIk7D1oB9VhoA
gd9vMpQ9vRw3xdkX3568OR/DJZoi5P4BsFcrAmnLybD9AbhaTp52dOMSo4j2
yiKCT6JVGPqTJWTdaNtI/Mis7cji4pXt6+rgBbmlIJnj2pWo7kS9xx5znYww
GHMuWX7pWBZ0epExsC3dV1DFyDWFcYed+ibKGu2L1omxRFA981plX6t+Ui5P
gow9tgalkIyoXss4hL0zYGNdxEVmchGmC0jZblPYTipnVpGRD6n5iZ/zqvE+
CG3zry5NbV2U2HXTTJBsbtIKvVXqzc6C0FGuheTrvGCh6jYpJhBNNMd1oCTn
wohTTPZcAJaGbs5pwztA3p0BonbttmOCt87RO1X0ChL1PM4a05vDbXjtuXG/
o9f+QsPDNO6WVlEDzTt/n/Dv+y37FxG1HlNvF5NS8eEYkdkxQcCO9CHoD0vY
pmpHTSk6q+Sc3Fv00h2M/tyroUIPodNR7rxLWzKypVMD4q+vXxvT0jqIodoI
s1y8LGJo0LEXVpOxygQuUUvhvKCrIoopXxHCSREdSDJ4wrNxYs9JrxRP//zn
P39f0XUcpXb4EHaO1I/2GsEO3fLZMX2uIXN3+m5Q3Pa70lhurR18P40HB/uj
w2CcMBhjDvYPngxG+4PR6Hr07OjgBf77vTfSMp9HHh5+YiST/LYpSb5oODwi
5dQsmPJGbiItGm8zcay6psdxhRDmAUzDYGRf/2g4ZaqIXaJrWjMoWpf2JMF8
UXfEFokmUptdC6p8F1KbXqg19Bu7PqV6GyFelysZjYg1aC2PtY4s0wADUOsf
Xb6yXX9hj6aBkxRwBw0Kbq0O9Gqk0ALOiSuptc0LBxutGVJgU+/ENo4z6s/k
uypBgzXlgyi19wsMhDQWkYnzG7dht6SLgWwRB4vUrZJRT7KzyoGtswFX24uC
d2BrHR6U3/luUowAzetBOVPx8ohBSJFTKBUDrMgSLczOtLXeK/D3jvfqmlGD
DXEmN4TwpN5svYxRcYFpEGF7vSalOPFvfGF8K7Cj13tXtbjhLizv5omRzoLz
V10ywp7CwPXNRjfTKdRyqTN2dbie+hHPPnUakg8mT0gtwAxBnWF0wDJYo1Vw
EzuSDyccRoXQwJQrTj6boD8A0FQs9JRpKPbEUj/RpPCujZ9zjnxfMqPi6NI7
JarNMSIztZUN7pAMdXHo33q90VDt7n7TYU3AtKPdXYtHSnvkXjNqtVkk8rCw
OdONTP6QjOfIJOLaDLDfjWBRP520V1wytoKwOCEmFvyEqyVOULOImiv1TG5A
TG3JmFdzPQC7u9bM+z0AxijV1FKdcZWqCDfkYAPTsrvrJ7t4BpzfwTZuwj4S
N9+7yntHhaW7EOv6uvoWBZSWVNMUFxs7arIgNlXo8vifnt+ex3U4uR/xeJ6o
A5eQ1VjLTe218e0G1YZKUzlgcY2queVTh3u0MDZ8aqoqnB0l88xaHHlxtZGI
IBCT5OnQgABs+qKgy4/SYRI5MCUtuTF1yJYVm/K1UoFcGAm5jCFzhEQ28X5y
eqnEHdoWIV9fXFcFmxzn/EBzdw7Iu1hRc5WJfNSCjDxdafBm8HIQK0DQSRmV
qTbV41v6WYKiLMpnTTTTpqVmrTbb7twaCoj2k08YCme1/7VqAQjJ+3ha684o
BLqDsQEDg6NcMy7GmARnYJbfMDDdeuIphwG21vl8Rk6jvfZjdYUrCJzPpaCH
om6uLtHtJ3Z7nnhvyep15DrSxHN/VExzHjRgVHhbKVDO1ucGdQ1mw+f02UaV
iy+nKd3J2Vicej+0qZbShUydrUI3sBW/9SXr4oWhDg8KJX4nHT/ZUNR3OTdJ
2P7/eG5322Eg1prulPQULdVBn3Uz5eo3+AH6W/Vh7TUpwQUpBk4h2D4jEh/J
SwLaHWZjSjkdZmfNRLuo3l1XmJsW/8IoYO24P4niGy7n1Js2JN/CAIHLgcJ+
GaUZFuTqAiVRYT6kAsKMCQDCFENNG1pwUogqTQBJRQG6AngBaPTu8nSo3s81
y7zA3qTR/sULvmKAcxXZsR1kqzyWwyz5WqFqlnSlRPLmG0vjmWsWxi8XsP+3
2koj6SDffiOPEzH5eg3znI+/c4DB60SipMwtp14EIbK1aJZhhc2csqaLaik1
IUiqwxxXbbpQthS4TTcfJeqWJV9zioumFNhjbrRQk7ZM150o8govDdAiWXzO
xE+bbK01m7EmGwh7zYPbvS494kwTme0IkXKw17AzLQFw7oryRvZMv6VfakFU
lMGjnlLbSWZciLGGbaSQmOrlcmlLo6zTVWhwvLZUr2kT/uaar4UhcCEJTxBX
VXxVObpxPVVB7NRn/OJIIveI89HGTnoNFc7ouQxKFBQf6M1ZWTSfpppM9u7u
6zfvB3ByVODffXX21avHu7u9AX4+M71ZY9twhEEiWbYSReKDg+ToxuWHNtgw
DGa7kszjxlwmdZzaudrWs+5ZN3qFgY0ZSpCsyszdWyCEBHvJ9wmUzoykgzH+
JbvN6HV9eW7Q6twXCxKtMuG2nmKx0CVfkDOuqxzazlmR1Kr29KubZtfDQvol
UQq/TxA+Wt+so2TYu3Ch4bGVqcO+Gu0LmBuN1PH4gu7TfHEKb/L69Kvx9enJ
9p0hzBp1aQ4Jm+nGYABeeSLsMnW+SlEphMRauA6jmWirRdHnivlQPdTD2bDv
bMNFAf+6mZPx151o6hRuH9ESweuPR496vXvvUfszWH1/wleylqSp9737wQD/
yf9696N7smruOqp57Z7UeY2P0pBjG1jrudeCyCdlvibkhahtUuthOtRDyilM
qrTWj7DuwX2QCT+PcuBh+nH70pwAYltuSq5kHwt1fPnuxGodZ5A76rVY8Em4
YPitgO2Leth0LcHXeXVytVaG5Mb5PgVp5iJAtFlXUK5LnUcHRQh2W7fS3OXf
nF4rdmYz0rj5gmvOZAtff+dXbbH9p+H2qaHoZ5216e1qUx7cDtTF6GebK33l
PjR1zyG4XCqy1owBj0XhG1akRUFuSls4JmxGsGKinfC5wHNtQ0P1hjh8l1p7
5c9hO7u2TuKIof09vzd33H9PUOgnmRhevpr6qQXGUg+pWOCae+nRo+HZ1EDa
LS+ayHVK1maSaRdymV5iuDccUsot8IBs1nxvlY0XwY7MBQLaUaldF55Psmur
EYexNFlGW4d7d3nWZwQOG3d6eU0mew+bvP72eq0hx7tA0uF9QdjLgLArOTJm
dRc5rmFQUv4BRpQcIgzR5eXV2VdkgA675t6qF04Cug71Vpcbx8r6wlUe/sCE
mV7aeazUg5yvr77mh7+/+pqIGu1vpcrToetQftudtwLMfZE2m+BLUKdIj0b3
r+Cg78ghusav8yJpMn0/Vl+evb1So6f7gwPJc6YRly7NeOfhFjzeKdPPooDL
l+YTB1Y4Ohx2Ky8m7hIIJyFPlNymle0oos8m0KcOxhen/P2JwSSis1j7MAMo
Iv+YyG2DVFePwq5eMnOS9YY4MyKij+RFppeRnjWE2fzGcfbedFWJD4ay3PQ5
gr6tTwbNsLAypvS9c+ymILosa+jrXerh8bh61JlAB9qgz4G0aR0z2/FY8fd9
+GsM9H0nxunkfW6bLDd1iomOIzIZaW3v+RMIxasU6HKHZ/g1CAE5K//zD+Sp
GirM+/EfTUGwz84xjW64iTmLYvbvwaTClTioihLTmwkH4ODwgBoAYAmpLi7o
AZznYzUfp6F9F0srODYBYGoGa+0uNDWnDrmGSw6MT4kvOQRnyE1OpSFospIk
7CYp4qplDoye0Jcv3Jm7ssrWL6JQs5OOuNm41NnKJHWjcpLWJRlSR5yZjzia
SDJxWdTSfEuf1/GY722DA9DXLnxyTV693jl/GIZvRbtg0yrXqjPiqsNwUOJw
otceoFFQq/weeDVllWlhr24ZnRUXFgkAT+UjF+buBBmAkLouovzyW26uRXYT
6b4RgpPk4LLt/7NoXzqaIoWZZ58KMM09Bpd4CPIKZVoZSiVjZkJzP9wQI3fL
t2cE/Vlw3G8H2lZCjjDacMIyd9pk0zTLdEJ3pe5f21DDHbDF/tUG7veBv93e
vYskRvemqsZ3/qw6kt5TJYw3x+UZlx6RVHgtX+0xCmibVQqGG4muUjY3Q7si
FrTrHXxqPfiObSs6HOzuy9hwPujE/CQl56cnZ+/OW2Iq9aSvnrKyPbs3mNKR
Aw+RNguhxwuLfdK8zmTXUypfNZF2G/5wha5jf/XHHvMr9ZwXf7GxuMkWbzCj
XdEHF22uP81vC/p+oJEr6ozhxB7MJrei7hEKyRxyj4yQiKQHlL3sq0OJu/fv
LdLgPMMnaJrxN0Klb9U/wXUw1NILx4VYi+n1faH0sxlUGIdUPg6kd+SIc7zT
H2pKukG6uult7wxxPYeFUFpV4UXxvtyPpFjNghzu8DOU3bdf4Vjvk6ck35uT
N+63/I2y8cV4Y9RbvuPAnYjPnh1QexQPSyXWgqQbu5ZIbr61ovQxsFRbJN3b
eecuwkjm7yv7Wa0ruT5DgcAFQAH7IaAK211ztP7RhuC2/sbV/U/8sd9zuLxU
11STvFd/unhzcqouxuen9FhzPQLO5Kf+rH9M4BdTxNUA/omKxu5LBn+Qr0TS
1yM/+S3hP7qPIVA5evtEHZ+bHP3xH7O1x+YLeFSZINmiVr910RoN1fu2269e
b5gDRBPYREagq3Vp2lEF6G9e6P67G30Yn4xj+uAofVlacuM/HsltC538+84U
RlPvfDSqFLmRQDb/B5C93Ut7WwAA

-->

</rfc>
