<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.1.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-dkg-mail-cleartext-copy-00" category="std" consensus="true" submissionType="IETF">
  <front>
    <title>Encrypted E-mail with Cleartext Copies</title>

    <author initials="D. K." surname="Gillmor" fullname="Daniel Kahn Gillmor">
      <organization></organization>
      <address>
        <email>dkg@fifthhorseman.net</email>
      </address>
    </author>

    <date year="2023" month="February" day="21"/>

    <area>sec</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>When an e-mail program generates an encrypted message to multiple recipients, it is possible that it has no encryption capability for at least one of the recipients.</t>

<t>In this circumstance, an e-mail program may choose to send the message in cleartext to the recipient it cannot encrypt to.</t>

<t>This draft currently offers several possible approaches when such a choice is made by the sender, so that the recipient can reason about and act on the cryptographic status of the message responsibly.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://dkg.gitlab.io/cleartext-copy/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dkg-mail-cleartext-copy/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secdispatch Working Group mailing list (<eref target="mailto:secdispatch@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/secdispatch/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/secdispatch/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://gitlab.com/dkg/cleartext-copy"/>.</t>
    </note>


  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>This document is concerned with end-to-end encrypted e-mail messages, regardless of the type of encryption used.
Both S/MIME (<xref target="RFC8551"/> and PGP/MIME (<xref target="RFC3156"/>) standards support the creation and consumption of end-to-end encrypted e-mail messages.</t>

<t>The goal of this document is to enable a receiving MUA to have solid, reliable behavior and security indicators based on the status of any particular received message, in particular when the sender of the message may have emitted a cleartext copy.</t>

<t>The document currently does not pick a single mechanism, as it is more of a survey/problem statement.</t>

<t>The final document should select at most a single mechanism with a clear default behavior.</t>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<section anchor="terminology"><name>Terminology</name>

<t>In this draft:</t>

<t><list style="symbols">
  <t>MUA is short for Mail User Agent; an e-mail client.</t>
</list></t>

</section>
</section>
<section anchor="scenarios"><name>Scenarios</name>

<t>The following scenarios are examples where an encrypted message might be produced but some copies of the message are sent or stored in the clear.
In all scenarios, Alice is composing a new message to Bob and at least one other copy is generated.
Alice has a cryptographic key for Bob, and knows that Bob is capable of decrypting e-mail messages.</t>

<t>In each of the following scenarios, Alice's MUA generates an e-mail, and knows that there is at least one cleartext copy of the message stored on a system not under Alice's personal control.</t>

<section anchor="simple-three-party"><name>Simple Three-Party E-mail</name>

<t>Alice sends a message to Bob and Carol, but Alice has no encryption-capable key for Carol.
She encrypts the copy to Bob, but sends a cleartext copy to Carol.</t>

</section>
<section anchor="drafts"><name>Cleartext Remote Drafts Folder</name>

<t>Alice's MUA stores all draft copies of any message she writes in the clear in a Drafts folder, and that folder is itself stored on an IMAP server.
When she composes a message, the IMAP server has a cleartext copy of the draft, up until and including when she clicks "Send".
Her MUA instructs the IMAP server to delete the draft version of the message, but it also knows that it had at one point a cleartext copy, and cleartext might persist forever.</t>

</section>
<section anchor="sent"><name>Cleartext Remote Sent Folder</name>

<t>Unlike in <xref target="drafts"/>, copies of messages sent to Alice's draft folder are encrypted or only stored locally.
But when sending an e-mail message to Bob, her MUA generates a cleartext copy an places it in her Sent folder, which is also stored on IMAP.</t>

</section>
<section anchor="mailing-list"><name>Public Mailing List</name>

<t>Alice "Replies All" to message from Bob on a public mailing list.
The public mailing list has on encryption-capable public key (it is archived publicly in the clear), so Alice cannot encrypt to it.
But Alice's MUA is configured to opportunistically encrypt every copy possible, so the copy to Bob is encrypted.</t>

</section>
<section anchor="trusted-mailserver"><name>Trusted Mailserver</name>

<t>Alice and Bob work in different organizations, and Alice's MUA has a policy of encrypting to outside peers that does not apply to members of her own organization.
Alice's co-worker David is in Cc on the message, and Alice and David both share a trusted mail server, so Alice does not feel the need to encrypt to Carol.
But she wants to defend against the possibility that Bob's mail server could read the contents of her message.</t>

</section>
</section>
<section anchor="problems"><name>Problems</name>

<t>Receiving MUA often needs to behave differently when handling a message with a different cryptographic status.</t>

<section anchor="reply-all"><name>Reply All</name>

<t>The most visible responsibility of an MUA that receives an encrypted message is to avoid leaking the contents of the message in the clear during a reply (see <xref target="I-D.ietf-lamps-e2e-mail-guidance"/>).</t>

<t>In scenarios where a recipient of the message cannot receive encrypted mail (e.g. the public mailing list example in <xref target="mailing-list"/>), a "Reply all" message is unlikely to be an act of effective communication.
In the example from that section, if Bob receives an encrypted copy of Alice's message, and he also chooses to "Reply All" to it, his MUA will either:</t>

<t><list style="symbols">
  <t>generate a cleartext copy to the mailing list, thereby leaking the contents of what appears to be an encrypted message, or</t>
  <t>send the mailing list a message encrypted only to Alice, which the rest of the mailing list cannot read.</t>
</list></t>

<t>Neither outcome is satisfactory.</t>

</section>
</section>
<section anchor="solutions"><name>Solutions</name>

<t>This document has not yet reached consensus on what the right solution is.
Two major classes of possible solution are:</t>

<t><list style="symbols">
  <t>A message that was generated with a cleartext copy can explicitly indicate that such a cleartext copy exists, which allows the recipient to reason about it differently than a normal end-to-end encrypted message.</t>
  <t>Forbid MUAs from generating a cleartext copy.</t>
</list></t>

<section anchor="explicit-indicator"><name>Explicit Indicator of Cleartext Copy</name>

<t>It seems plausible that a MUA generating an end-to-end encrypted e-mail message with a cleartext copy could indicate to its recipients that a cleartext copy was also generated.</t>

<t>Each recipient could then reason about it differently, as compared to an end-to-end-encrypted e-mail message without a cleartext copy.</t>

<t>For example, a recipient doing "reply all" to such an encrypted message could take a different strategy and permit re-sending cleartext copies.
For more discussion about how to use such an indicator, see <xref target="handling-explicit-indicator"/>.</t>

<t>The proposals here use e-mail headers, so see also <xref target="protected-headers"/> for security considerations.</t>

<section anchor="cleartext-copy"><name>Cleartext-Copy Header Field</name>

<t>This document could specify a new e-mail header field with the name <spanx style="verb">Cleartext-Copy</spanx>.
The only defined values of this field are <spanx style="verb">0</spanx> and <spanx style="verb">1</spanx>.</t>

<t>A MUA that creates an encrypted message with a cleartext copy <bcp14>MUST</bcp14> add this header field with a value of <spanx style="verb">1</spanx> to each encrypted copy of the message.</t>

<t>By default, any end-to-end encrypted message that does not have this header field is presumed to have the field with a value of <spanx style="verb">0</spanx> -- meaning that no cleartext copies made by the sending MUA.</t>

<t>FIXME: what if the default was <spanx style="verb">1</spanx> instead of defaulting to <spanx style="verb">0</spanx>?</t>

</section>
<section anchor="cleartext-copy-to"><name>Cleartext-Copy-To Header Field</name>

<t>This document could specify a new e-mail header field with the name <spanx style="verb">Cleartext-Copy-To</spanx>.</t>

<t>This header field's value is defined to be an <spanx style="verb">address-list</spanx>, as specified in <xref target="RFC5322"/>.</t>

<t>A MUA that creates an encrypted message with a cleartext copy to any recipient <bcp14>MUST</bcp14> add this header field to each encrypted copy of the message.
The contents of the field are the list of e-mail addresses that were sent cleartext copies of the message.</t>

<t>By default, any end-to-end encrypted message that does not have this header field, or that has it with empty contents, is presumed to have no cleartext copies made by the sending MUA.</t>

<t>FIXME: it is unclear how a MUA that uses a cleartext remote Drafts (see <xref target="drafts"/>) or Sent (see <xref target="sent"/>) folder should populate this field to indicate to the recipient that a cleartext copy was sent to the IMAP server.</t>

</section>
<section anchor="encrypted-to-header-field"><name>Encrypted-To Header Field</name>

<t>This document could specify a new e-mail header field with the name <spanx style="verb">Encrypted-To</spanx>.</t>

<t>This header field's value is defined to be an <spanx style="verb">address-list</spanx>, as specified in <xref target="RFC5322"/>.</t>

<t>A MUA that creates any encrypted message includes the full <spanx style="verb">address-list</spanx> of all recipients in <spanx style="verb">To</spanx> or <spanx style="verb">Cc</spanx> that it was able to successfully encrypt the message to.</t>

<t>The recipient of an encrypted message can then infer based on the contents of this header whether an additional cleartext copy was generated.</t>

<t>FIXME: it is unclear how a MUA that uses a cleartext remote Drafts (see <xref target="drafts"/>) or Sent (see <xref target="sent"/>) folder should populate this field to indicate to the recipient that a cleartext copy was sent to the IMAP server.</t>

<t>FIXME: if the recipient receives an encrypted copy of a message without this header in it, they know that the sender does not support this mechanism.
What should be the default assumption in that case: cleartext copy or no cleartext copy?</t>

</section>
</section>
<section anchor="forbid-cleartext-copy"><name>Forbid Cleartext Copy</name>

<t>Another approach would simply be to declare that a MUA that generates an end-to-end encrypted e-mail message <bcp14>MUST NOT</bcp14> store or transmit a cleartext copy.</t>

</section>
<section anchor="handling-explicit-indicator"><name>Handling an Encrypted Message with a Cleartext Copy</name>

<t>When one of the copies of the message is known to be sent or stored in clear, a MUA might treat "Reply All" differently.</t>

<t>For example, it might be willing to send an additional cleartext copy to some of the recipients.</t>

<t>FIXME: what other behaviors might need changing?</t>

</section>
</section>
<section anchor="picking-a-solution"><name>Picking a Solution</name>

<t>This draft currently does not choose a specific solution, but it should not be published as a final document without choosing at most one solution.
Factors to consider when choosing a solution among those presented include:</t>

<t><list style="symbols">
  <t>complexity of implementation for senders</t>
  <t>complexity of implementation for receivers</t>
  <t>minimizing information leakage</t>
</list></t>

</section>
<section anchor="user-experience-considerations"><name>User Experience Considerations</name>

<t>As noted in <xref target="I-D.ietf-lamps-e2e-mail-guidance"/>, representing the cryptographic status of a message is challenging even under good circumstances.</t>

<t>This is because storing a cleartext copy with a third party breaks most expectations of "end-to-end encryption" (see <xref target="I-D.knodel-e2ee-definition"/>).</t>

<t>When a single message has multiple cryptographic statuses depending on which copy of the message is being examined, it is even more challenging to represent the cryptographic status of any particular copy of the message.</t>

<t>Aside from changing its behavior around Reply All, how should an MUA treat such a message?</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>For example, if we go with <xref target="cleartext-copy"/>:</t>

<t>The IANA registry of <eref target="https://www.iana.org/assignments/message-headers/message-headers.xhtml">Message Headers</eref> should be updated to add a row with Header Field Name <spanx style="verb">Cleartext-Copy</spanx> , no template, protocol <spanx style="verb">mail</spanx>, status <spanx style="verb">standard</spanx>, and a reference to this document.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<section anchor="misrepresentations"><name>Misrepresentations By Sender are Out of Scope</name>

<t>This document describes security considerations between mutually-cooperating, end-to-end encryption-capable MUAs.
Either party could of course leak cleartext contents of any such message either deliberately or by accident.</t>

<t>In some cases, such as a <spanx style="verb">Bcc</spanx> scenario, the sending MUA is deliberately taking action on the sender's behalf that they do not want the (listed) recipient to know about.
Indicating to the listed recipient that a <spanx style="verb">Bcc</spanx>ed copy was emitted in the clear may violate the sender's expectations about what was done with the message.</t>

<t>This specification is not intended to detect fraud, misbehavior, or deliberate misrepresenation from one of the clients.</t>

</section>
<section anchor="protected-headers"><name>Cryptographic Guarantees</name>

<t>For the proposed solutions that require a header field, that header field itself needs cryptographic protections, or an intervening mail transport agent could inject it to tamper with the apparent cryptographic status of the message.</t>

<t>For this reason, any header field involved in this must be provided with header protection, as described in <xref target="I-D.ietf-lamps-header-protection"/>.</t>

<t>Additionally, since this is dealing with encrypted messages only, any relevant header field should probably be stripped from the message before sending, to avoid indicating to a mail transport agent that some cleartext copy of the message is available somewhere.</t>

</section>
</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC8551'>
<front>
<title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification</title>
<author fullname='J. Schaad' initials='J.' surname='Schaad'><organization/></author>
<author fullname='B. Ramsdell' initials='B.' surname='Ramsdell'><organization/></author>
<author fullname='S. Turner' initials='S.' surname='Turner'><organization/></author>
<date month='April' year='2019'/>
<abstract><t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 4.0.  S/MIME provides a consistent way to send and receive secure MIME data.  Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality.  Compression can be used to reduce data size.  This document obsoletes RFC 5751.</t></abstract>
</front>
<seriesInfo name='RFC' value='8551'/>
<seriesInfo name='DOI' value='10.17487/RFC8551'/>
</reference>



<reference anchor='RFC3156'>
<front>
<title>MIME Security with OpenPGP</title>
<author fullname='M. Elkins' initials='M.' surname='Elkins'><organization/></author>
<author fullname='D. Del Torto' initials='D.' surname='Del Torto'><organization/></author>
<author fullname='R. Levien' initials='R.' surname='Levien'><organization/></author>
<author fullname='T. Roessler' initials='T.' surname='Roessler'><organization/></author>
<date month='August' year='2001'/>
<abstract><t>This document describes how the OpenPGP Message Format can be used to provide privacy and authentication using the Multipurpose Internet Mail Extensions (MIME) security content types described in RFC 1847. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3156'/>
<seriesInfo name='DOI' value='10.17487/RFC3156'/>
</reference>


<reference anchor='I-D.ietf-lamps-e2e-mail-guidance'>
   <front>
      <title>Guidance on End-to-End E-mail Security</title>
      <author fullname='Daniel Kahn Gillmor' initials='D. K.' surname='Gillmor'>
         <organization>American Civil Liberties Union</organization>
      </author>
      <date day='6' month='February' year='2023'/>
      <abstract>
	 <t>   End-to-end cryptographic protections for e-mail messages can provide
   useful security.  However, the standards for providing cryptographic
   protection are extremely flexible.  That flexibility can trap users
   and cause surprising failures.  This document offers guidance for
   mail user agent implementers that need to compose or interpret e-mail
   messages with end-to-end cryptographic protection.  It provides a
   useful set of vocabulary as well as suggestions to avoid common
   failures.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-lamps-e2e-mail-guidance-05'/>
   
</reference>


<reference anchor='I-D.knodel-e2ee-definition'>
   <front>
      <title>Definition of End-to-end Encryption</title>
      <author fullname='Mallory Knodel' initials='M.' surname='Knodel'>
         <organization>CDT</organization>
      </author>
      <author fullname='Sofia Celi' initials='S.' surname='Celi'>
         <organization>Brave</organization>
      </author>
      <author fullname='Olaf Kolkman' initials='O.' surname='Kolkman'>
         <organization>Internet Society</organization>
      </author>
      <author fullname='Gurshabad Grover' initials='G.' surname='Grover'>
         </author>
      <date day='6' month='February' year='2023'/>
      <abstract>
	 <t>   End-to-end encryption is an application of cryptography mechanisms
   and properties in communication systems between endpoints.  End-to-
   end encrypted systems are exceptional in providing both security and
   privacy properties through confidentiality, integrity and
   authenticity features for users.  Improvements to end-to-end
   encryption strive to maximize the user&#39;s security and privacy while
   balancing usability and availability.  Users of end-to-end encrypted
   communications expect trustworthy providers of secure implementations
   to respect and protect them.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-knodel-e2ee-definition-08'/>
   
</reference>


<reference anchor='I-D.ietf-lamps-header-protection'>
   <front>
      <title>Header Protection for S/MIME</title>
      <author fullname='Daniel Kahn Gillmor' initials='D. K.' surname='Gillmor'>
         <organization>American Civil Liberties Union</organization>
      </author>
      <author fullname='Bernie Hoeneisen' initials='B.' surname='Hoeneisen'>
         <organization>pEp Foundation</organization>
      </author>
      <author fullname='Alexey Melnikov' initials='A.' surname='Melnikov'>
         <organization>Isode Ltd</organization>
      </author>
      <date day='24' month='January' year='2023'/>
      <abstract>
	 <t>   S/MIME version 3.1 introduced a mechanism to provide end-to-end
   cryptographic protection of e-mail message headers.  However, few
   implementations generate messages using this mechanism, and several
   legacy implementations have revealed rendering or security issues
   when handling such a message.

   This document updates the S/MIME specification to offer a different
   mechanism that provides the same cryptographic protections but with
   fewer downsides when handled by legacy clients.  Furthermore, it
   offers more explicit guidance for clients when generating or handling
   e-mail messages with cryptographic protection of message headers.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-lamps-header-protection-11'/>
   
</reference>




    </references>


<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The author would like to thank Daniel Huigens and Bart Butler for explaining the circumstances behind this situation.</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA91bbXMcuXH+vr8CIT+clNpdSvJdYjOpnCmJd2JZlBiRKsfl
coXYGewuzNnBeIDhaszif/Fv8S/L093AvOyuKFcSV6pSdT5zZzBAo1+efrqB
m81mk2BDYU7VeZnVbRVMrs5nG20LtbVhrd4URtfBfAnqjaus8ZPcZaXeYHxe
62WY5XcrHj3L0sBZ5qp29uLFJNPBrFzdniof8omt6lMV6saHVy9e/OrFq0nm
Sm9K3/hT1WJeXRuNkSabbF19t6pdU52qDybQL/Vb/MuWK/UzPZ7cmRZP81N1
UQZTlybM3pIsEx90mf+nLlxpZE7fLDbWe+vKm7bCs4vzm58m96ZszOlEqbjG
0bXJcusrHbL1ER4HHno0WpKe0y7x3Pejf21NWM5dvaLXus7WeL0OofKnJyc0
mh7ZezNPw07owcmidltvTgbznND3tanc4PsVjKIX88xtTqDik7F2aXwB7fow
+ALD5vEr63Y+wAq6CWtX075n+J9StoTi387Vb+bqZ1sUG1fzY7HtW11aU6jf
6HU5emtECVjq10u7DGvM6PGsnMMIk9lspvTCh1pnYTL57dqUSpfKiDNVtVvV
eqNWpjQ1ic7vOpfbGO/1yqjg1KYpgq0KA41kFi5XBj9VNijrVeVgzAVehbUO
9GytvSpdmgd2Vpmu9MIWNrRq6WqFYVCEDwo+odwSHw7nnU8mFyWeYerM1lmz
IQ/KzPSA3BvdqmztnGcZ4bg5z5Xktli5ixQMGK1Dkma6LF1IkmII1r6hhTmM
VNbUNUYWLYRcmtpjhXvoqei3rCuIorM1NLcl1fomWytNMtnMkHI2Ojdq0fLS
JJ+pp8o7UdVYHMiCX9pDXXrhmoDt5gpGg5J4JItI267WNkPw6tD4pLy04dr4
CgEM0VrshEy/sXlemMnkmMKydnmTkUHSLh20y6qAqh10jLDNBWEg6iy4GWm0
94eo/bgaHKA2K11jft9JQnFKfw+M33iTzyevHWa9Prm8uDxXzx4efvz005tf
/vDDy8dH3ufVz1ejV794+cM/PT4+VwweWAKqb6rK1SGqwmiemj4lxGo2shQv
/G3B2cpGrRxMyXLv6CKQ82q2LxnI2HvCnMvPZ/Rmre9hSlfYnPZfWB63MHhs
ybWxLkCkqcnXbZlb4C3CUS00tJBM2RtPl62q4KA2awBMcbE+8qbkwoP37GO9
K+2an8KBxTMbG2jfeuD/hDhx491eewfPnaGgDaqy2R2+89hxQTNna6CO3yD6
fIx3wA6bGIOa+t60JwgB6GDD2zI0b1xmaUsouFvMr11TkHYKA6+G/28cIGB/
KXHAKLrKzVIDezoNx7mRbRSlG6+OLj9f3xxN5f/Vh4/896fzf/988en8Lf19
/e7s/fvuj0kccf3u4+f3b/u/+i/ffLy8PP/wVj7GUzV6NDm6PPvd0ZQNffTx
6ubi44ez90dkp7EbIXOStywIhZAPq9qwQZCqjc9qu8APfPP6zdVf//Lye/Xw
8A/w+lcvX/4KASE/fvnyn7/HDzK5rOZK2El+wujtBNhDCsIsuigIYm3QhWdD
QdXbUq1NbaCuf/w9aeYPp+pfF1n18vt/iw9ow6OHSWejh6yz/Sd7H4sSDzw6
sEynzdHzHU2P5T373eh30vvgISDuWN2YemNLV7hV2ycRxvJTwCFHsGXtAEgo
EV0SKnz2iKQzpMDwL4MUkxVWPPlYXWdAg9o6H93aFYXbEiL49IKtbb7oDTIk
ZwL8PJhJN3a1Jl+mDAYsxpsFkN67jaH4BJPbDWma2JM/QVoPJBG3YRCk8JjT
Lsn8nShTdVbE3AOagkRFgmpVmu0wnb92C8kvo0yMaWvGCfo6cQJgt8xIaV3v
pCEKQ1Ik5hMnvSvBoyS90RokBeX+ghEjN5IUINE+ImMjBpk0KeCAluPWvvNs
yDFn4en2RAhsCQgx2ucYE3c1HrVM2UX51gPRGBcbBtwkQAU24AjdkH2QVos5
u9+1JQdQN+vamNkV1mgTa3849vxuFvgdQXr7OImKJTAn1R6wzxuNyafsJL0R
RtxqlvSbTMGfzCfX2FIc5cVfaK8ytUyYlt1RB4bEKWhLfaXxyWxcMIpJvVc/
uYL08XDM0eXTXqJtWIeeHTMyqc65KeN1qoZYW2RKvBk6NUNaWmjJC4ll2aby
gIxqA3LJcmiwUl1cnl1hZ8hLiA1mu573TpFgBkpmDB2OTu590Dd4E1PVVHCD
AHOSMLbMiiYnB912y0AFd55qlzI/mk/eYVaGnBL0G8TL760JXedIh8H0qyg8
95HLDNxSTIYEDIh3Qxdnvs2BTK5dOUu5Z2cbor3+maAQ+bD1DISG1aXUQYtf
E/x09iYwgrU/l4W9Y4b98BBd4HE6MHMKbAEv7DO5h2wyGpFhswNJOC/nuGjQ
wmVwIHCW19i56Bh6ZTgrd/Cj8+t1VPkAHHZNio+rQmdG6AxnSdli8rQtgG3N
oEGq7r2LDCdBcdUssBvOHiTOe9Liw/FGfs4K/Oxi++iTqQrSyVlRHHEhFSVe
1m7DYc5AU8mMcQpFU8w52Rx4wZ7qykMYEEcTFDwTshar3Ty+KtpRpD3nYkQk
3auFoB/R/TCypVJY2lVDWsEgx7S8AXEDSSV7dTOQU7Wi81QvxdpnBEY0ZecD
ot8bakhgelJwjJSH4yAP2e7ysFMyeTfNxF0J7C+3VK5J1lyBU/6ZqwUvYTDc
jcR8BTKftcOqBZqmrTXBW5RvlaHaj6Oto8kgX0Ur9tws6DW+Jk8i3jVcdN7h
YuZmJB/GvAWRzRnASvUmS0VBF+idkPyXDF5Q9eTXFC9aRU2wU0QkGdixE3Fp
TMEzl0ZMNTBtRHiyLoOwLoMXNFpS5aRXmkCLvxbbSfGe8vp3frg4tkbEHkVZ
Ho0LxksTRp3EnQnAqCupFkCmPo1KK7fERyyrF+LMlUxnysh9YbIyL4TTpFCK
9UJv9UOlsngWRWNLsShUjiuQeyu1fFc8y145V0nRR7uOpdlXOiRSNOp7B1sh
sLhHtauKnc5En+5yVIu8oZqle+aNAapezN5yj2pWgFb6mXklkDdbNTanfgjK
Y2FNPQuNxHPQVNhZNsZ43MtwH2TNZ2a+movND6BOpLcC+SOsewSMaEG6lnL+
0VAtDScKiZUFs2LuaSDWYK0skBjIzhsASBYD5kJ0k9ZjoGQTeMPNCxTFSw73
wyZJeTvF3SiuMC+jujSN2GhHnU8cCeghi1iBh60FgTGWWCTXDymrHCRNrOeB
wqbCPhftVx1iS5uSKs736tlzrikABYv33a2hVfooGOTRUtTNGkj5TJpNvneJ
4SydX2hC4A+yZcK/jCoTKplgG7+E5VzdSk3kioZBdbeVJAQ1qNbwfNnaSIuG
m8qEdduu9cUsxMeJsAoy3haAqv8IIpAV2nuhEl2zrRsKGGR7nPX5nybd6kHV
Muoi9IaiLpv5gpSc2VB0HZo4QerejT8xX6Ain/SoqSzxO707KHvUukPuHQIX
JqckX7p6g5LhYIeqw8gZqFa9AIzAAb04f9yTYMReQweodh43pC5Sw4n0Njok
aJFB075nXV8KGfSC4gpwTKSoGfRx9ZBHJdL17d7a19TOGaLXNsWZH/R805o7
n5FFOV4HxejknKrEQd+Upw6UG56wAbdFqAzQkbeMtjN7cjvcjN1XPOyUQGo6
At3ckb6O6h4PqTnNvnUod8QN6DszSmLUsg9m1TJuVdTYoICaJQ48EsdSBU3y
cG8utz5r+IAlqmLttiRC400nRucCUyXpJuXV2QEveYxNt6p2CEYYhFtLPF9U
1xrIARbENITmY6M9POCDANAGa4sDHh+5Ru06pIQMoFi1EDT25kEFMmPHfcef
qp+sgZoejsdnKI+7+CPa9BWssWxj42MkpFryROynzI40IO52vOatkG8GUlAi
S23xe100qT+DBWUWImS3L27ZRrcv8dnkrKcM3Kb+GmM4HCfcmNN5LmvsC6xF
DJICyzGpo2jYz36DrA+hXrepjzrlAvwpCNohuszC9qWhcx+kE+g875ri3LY5
LCtURIcRBryYEyFWKN2eD++dlkRuSMF28R+X56eSPGwsymNnmECClEGMlSgo
N5r4VeTxWP3HQ541u3FPOxd09PfxL6x8m46ahl+BrojOaMXodx0xuIVfQOWe
Sdet9HlZDCtNQWkb//CLV684YP9njsgI2Q5A7QnP/Bu98OYAH+6jiH4xFyFq
KPqM+zUxO2xN6oXu+c3f3+GJhMnAtRyEyCnZphIQC/FA9EBU/Lf8XIr3ppQC
gfBb9+Zs/E5fox615mL9kLoyz0lybnDEF9zBwePYg4nHMpWrmkKYUIdulKYH
KXuH83w1Y6eWz063K6J7d6NhN/z+lyJtOP//TZC1hwpE7hYaIY7LBnXFeCUu
N/F0QImw2i22QOa7fZPddu0+JkXM05hVZJiDJuwbL8OKLx5pm3FNeJiH6FJo
lC1BQcYnluO47RWKipNLBeK3eW4pi1NTfN8nhgTu/7ePp93tXGv4RrWq9xjn
UM1wBSsFZcu93/7+QDwI7tCrPyank9p0pEqtcN2dwC7MKH+i0Ern59yWIF+G
7U/3euH1Hpa1nFdTxTIuOBAcpZwopUsSaisRTSchLUtBDSdUevWo5uA/d26k
fLvuSEea0rBltK516Yk1Hy6a3nWNpHJwy+pynBX3aqinaHK8XjO41HL4TA+W
ISOWEXX2j/dY3GlUhzTrA6HLqFcxKG52ixEb+oNG6mFEHsQdhCcjlQZRxX/o
Ts6QgYld05G8j6txn5E8boUFyTPUlc3upGxN/YKv3K/p/Dfe5tEJdbOu6u9O
QKIX0+hFbFX5NZ+t47OdOwcpmHhaliReOyAjpZlROnFng5swqSKRbmP/3aD7
sHHMYUlOyvZYx6TjIOlLUJ1ZmC+xi8gHfySN3FmR+oei1v8tQyNs8OCNLe3G
/pnkAUZTN4GHUX8JfkUK57Ps8y8oF2G2zMBrh/UVQpK1nFLZj9/uMdIdl7jJ
roX1lYtIeujgcIOiMOwJdBBQxvPTlXP56FaXTxka/yxMprlGhS0ONTtSUALb
6pyvxQBFEBd3XmyKkESxKVslgY72cQOvjlKO4N0jEHNT0M7NjMkAR4b0VuWy
XH8/RTZH/K+7DXdIF4ZoRRVZHTe8qG906KiZ98waQuQSD0lX6lhjXMsP9chd
pmiMpy0xvlV0uCY847MNbjClmOWmTH+VqXYwWt8yn3KOjtGXWuMMS7FvFufm
yL84+3C2531jkFqC0cMhxKoPDzt1/eOp8BaeqDYrkKSad/H7BNHCHf0fnqW7
ltvtdm51qeVWp/d2VVIs+ZMoWGpC7P6ef1mHTfF8kB6bKuceIlVBOV2jqrFz
lnNUL3441DpQU0qTAaUBUY0pNU2CyxwIH4UWKGW0022623YrrWnqIDGgZ5GI
DLiwtFxT02RXrUhml9Z3rhEDACXQtZADyq8fGyZ+19CtobPKvfF7hW66p+S/
1q2BosLWkKM2oaGTPxgOs0u7cHogaQ9PKqm7OZ+cS6NZQln4PoTEHzVggGBt
hAA9BSUHZ6frmt8yEUIZEhNvKJivoMTSWQaRWYV0VsI3bcBuqFXFXktJ4/Z1
Bn6dzlGmu2WZFAqDmYP083Umlw6HV/K+kwAqlh1Fo+TGyYoO2XjkM2L8Jn8+
biAzr+N+HR2BMKeIQZ9KY5PvU1MWPfFIIqbp6t/ohIkuBiKmI/cdyDqCTGkW
blMrPacc2RVXPXCwm6T0rGPvnndIN90wcS7Ejjp/wBfdANbgbwlXuJLu1akG
rhizHkHSkEQViYJQB2cEeT83GiQvGDjpw/F+s1EQJ3SdS0iWsrhPp3p/aiyf
mY2Lfan0Rw0vuWwi55Nj4I0LyxEz3wGVO38AcbIg01Qmo8zM9aovbm35R1KS
lVICwEi8I2kctFl/9ThzH89lq9bHLrj0PcZbKO9dcZ98g+qDxqfLaPc2T2cm
8Zt+V1wFj64t7lMH+WjWfyTlccc0qQOPRJrF2osjSjMxjdeNd6pRz83XaWxC
Feaegme0m1TT1W4BROF6AinCVhUmiWeGfaZdGLrlkoJ62h/W2lGk6cPGksMh
ho4nr47RfYt7+k8M5LRqY7bxCibdxF7o7I5g/CyjSC9MvmKmFy8Vyn8IECsk
vlrDga/Lu3Tt/11jIYyXyw4QQr1uQkHa4KSKZGPLjqENCRbhkS1j385bQLVw
3v8CtIXKr2UyAAA=

-->

</rfc>

