<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-homburg-deleg-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="deleg">Extensible Delegation for DNS</title>
    <seriesInfo name="Internet-Draft" value="draft-homburg-deleg-00"/>
    <author fullname="Philip Homburg">
      <organization>NLnet Labs</organization>
      <address>
        <email>philip@nlnetlabs.nl</email>
      </address>
    </author>
    <author fullname="Tim Wicinski">
      <organization>Cox Communications</organization>
      <address>
        <email>tjw.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Jesse van Zutphen">
      <organization>University of Amsterdam</organization>
      <address>
        <email>Jesse.vanZutphen@os3.nl</email>
      </address>
    </author>
    <author fullname="Willem Toorop">
      <organization>NLnet Labs</organization>
      <address>
        <email>willem@nlnetlabs.nl</email>
      </address>
    </author>
    <date year="2025" month="April" day="03"/>
    <area>int</area>
    <workgroup>DNS Delegation</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>DNS</keyword>
    <keyword>Resolver</keyword>
    <keyword>Delegation</keyword>
    <keyword>Authoritative</keyword>
    <keyword>Deployable</keyword>
    <keyword>Extensible</keyword>
    <abstract>
      <?line 108?>

<t>This document proposes a mechanism for extensible delegations in the DNS.
The mechanism realizes delegations with resource record sets placed below a <tt>_deleg</tt> label in the apex of the delegating zone.
This authoritative delegation point can be aliased to other names using CNAME and DNAME.
This document proposes a new DNS resource record type, IDELEG, which is based on the SVCB and inherits extensibility from it.</t>
      <t>Support in recursive resolvers suffices for the mechanism to be fully functional.
The number of subsequent interactions between the recursive resolver and the authoritative name servers is comparable with those for DNS Query Name Minimisation.
Additionally, but not required, support in the authoritative name servers enables optimized behavior with reduced (simultaneous) queries.
None, mixed or full deployment of the mechanism on authoritative name servers are all fully functional, allowing for the mechanism to be incrementally deployed on the authoritative name servers.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-homburg-deleg/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        deleg Working Group mailing list (<eref target="mailto:dd@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dd/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dd/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/NLnetLabs/incremental-deleg"/>.</t>
    </note>
  </front>
  <middle>
    <?line 120?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document describes a delegation mechanism for the Domain Name System (DNS) <xref target="STD13"/> that addresses several matters that, at the time of writing, are suboptimally supported or not supported at all.
These matters are elaborated upon in sections <xref format="counter" target="signaling"/>, <xref format="counter" target="outsourcing"/> and <xref format="counter" target="dnssec-protection"/>.
In addition, the mechanism described in this document aspires to be maximally deployable, which is elaborated upon in <xref target="deployability"/>.</t>
      <section anchor="signaling">
        <name>Signaling capabilities of the authoritative name servers</name>
        <t>A new IDELEG resource record (RR) type is introduced in this document, which is based on and inherits the wire and presentation format from SVCB <xref target="RFC9460"/>.
All Service Binding Mappings, as well as the capability signalling, that are specified in <xref target="RFC9461"/> are also applicable to IDELEG, with the exception of the limitations on AliasMode records in <xref section="6" sectionFormat="of" target="RFC9460"/>.
Capability signalling of <xref target="RFC7858">DNS over Transport Layer Protocol</xref> (DoT), <xref target="RFC8484">DNS Queries over HTTPS</xref> and <xref target="RFC9250">DNS over Dedicated QUIC Connections</xref>, on default or alternative ports, can all be used as specified in <xref target="RFC9461"/>.
The IDELEG RR type inherits its extensibility from the SVCB RR type, which is designed to be extensible to support future uses (such as keys for encrypting the TLS ClientHello <xref target="I-D.ietf-tls-esni"/>.)</t>
      </section>
      <section anchor="note-to-the-rfc-editor-please-remove-this-subsection-before-publication">
        <name><em>Note to the RFC Editor</em>: please remove this subsection before publication.</name>
        <t>The name IDELEG is chosen to avoid confusion with <xref target="I-D.wesplaap-deleg"/>.</t>
      </section>
      <section anchor="outsourcing">
        <name>Outsourcing operation of the delegation</name>
        <t>Delegation information is stored at an authoritative location in the zone with this mechanism.
Legacy methods to redirect this information to another location, possible under the control of another operator, such as (CNAME <xref section="3.6.2" sectionFormat="of" target="RFC1034"/>) and DNAME <xref target="RFC6672"/> remain functional.
One could even outsource all delegation operational practice to another party with a DNAME record on the <tt>_deleg</tt> label on the apex of the delegating zone.</t>
        <t>Additional to the legacy methods, a delegation may be outsourced to a set of third parties by having RRs in AliasMode.
Unlike SVCB, IDELEG allows for more than a single IDELEG RR in AliasMode in an IDELEG RRset, enabling outsourcing a delegation to multiple different operators.</t>
      </section>
      <section anchor="dnssec-protection">
        <name>DNSSEC protection of the delegation</name>
        <t>With legacy delegations, the NS RRset at the parent side of a delegation as well as glue records for the names in the NS RRset are not authoritative and not DNSSEC signed.
An adversary that is able to spoof a referral response, can alter this information and redirect all traffic for the delegation to a rogue name server undetected.
The adversary can then perceive all queries for the redirected zone (Privacy concern) and alter all unsigned parts of responses (such as further referrals, which is a Security concern).</t>
        <t>DNSSEC protection of delegation information prevents that, and is the only countermeasure that also works against on-path attackers.
At the time of writing, the only way to DNSSEC-validate and verify delegations at all levels in the DNS hierarchy is to revalidate delegations <xref target="I-D.ietf-dnsop-ns-revalidation"/>, which is done after the fact and has other security concerns (<xref section="7" sectionFormat="of" target="I-D.ietf-dnsop-ns-revalidation"/>).</t>
        <t>Direct delegation information (provided by IDELEG RRs in ServiceMode) includes the hostnames of the authoritative name servers for the delegation as well as IP addresses for those hostnames.
Since the information is stored authoritatively in the delegating zone, it will be DNSSEC-signed if the zone is signed.
When the delegation is outsourced, then it's protected when the zones providing the aliasing resource records <em>and</em> the zones serving the targets of the aliases are all DNSSEC-signed.</t>
      </section>
      <section anchor="deployability">
        <name>Maximize ease of deployment</name>
        <t>Delegation information is stored authoritatively within the delegating zone.
No semantic changes as to what zones are authoritative for what data are needed.
As a consequence, existing DNS software, such as authoritative name servers and DNSSEC signing software, can remain unmodified.
Unmodified authoritative name server software will serve the delegation information when queried for.
Unmodified signers will sign the delegation information in the delegating zone.
Only the recursive resolver needs modification to follow referrals as provided by the delegation information.</t>
        <t>Such a resolver would explicitly query for the delegations administered as specified in <xref target="delegation-administration"/>.
The number of round trips from the recursive resolver to the authoritative name server is comparable to what is needed for DNS Query Name Minimisation <xref target="RFC9156"/>.
Additional implementation in the authoritative name server optimizes resolution and reduces the number of simultaneous in parallel queries to that what would be needed for legacy delegations.
None, mixed or full deployment of the mechanism on authoritative name servers are all fully functional, allowing for the mechanism to be incrementally deployed on the authoritative name servers.</t>
        <t>Implementation in the recursive may be less demanding with respect to (among other things) DNSSEC validation because there is no need to make additional exceptions as to what is authoritative at the parent side of a delegation.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>This document follows terminology as defined in <xref target="BCP219"/>.</t>
        <t>Throughout this document we will also use terminology with the meaning as defined below:</t>
        <dl newline="true">
          <dt>Deleg:</dt>
          <dd>
            <t>The delegation mechanism as specified in this document.</t>
          </dd>
          <dt>IDELEG delegation:</dt>
          <dd>
            <t>A delegation as specified in this document</t>
          </dd>
          <dt>Legacy delegations:</dt>
          <dd>
            <t>The way delegations are done in the DNS traditionally as defined in <xref target="STD13"/>.</t>
          </dd>
          <dt>Delegating zone:</dt>
          <dd>
            <t>The zone in which the delegation is administered.
Sometimes also called the "parent zone" of a delegation.</t>
          </dd>
          <dt>Subzone:</dt>
          <dd>
            <t>The zone that is delegated to from the delegating zone.</t>
          </dd>
          <dt>Delegating name:</dt>
          <dd>
            <t>The name which realizes the delegation.
In legacy delegations, this name is the same as the name of the subzone to which the delegation refers.
Delegations described in this document are provided with a different name than the zone that is delegated to.
If needed we differentiate by explicitly calling it IDELEG delegation name or legacy delegation name.</t>
          </dd>
          <dt>Deleg query:</dt>
          <dd>
            <t>An explicit query for IDELEG RRset at the delegating name as used for IDELEG delegations.</t>
          </dd>
          <dt>Delegation point:</dt>
          <dd>
            <t>The location in the delegating zone where the RRs are provided that make up the delegation.
In legacy delegations, this is the parent side of the zone cut and has the same name as the subzone.
With deleg, this is the location given by the IDELEG delegating name.
If needed we differentiate by explicitly calling it IDELEG delegation point or legacy delegation point.</t>
          </dd>
          <dt>Triggering query:</dt>
          <dd>
            <t>The query on which resolution a recursive resolver is working.</t>
          </dd>
          <dt>Target zone:</dt>
          <dd>
            <t>The zone for which the authoritative servers, that a resolver contacts while iterating, are authoritative.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="the-deleg-resource-record-type">
      <name>The IDELEG resource record type</name>
      <t>The IDELEG RR type is a variant of SVCB <xref target="RFC9460"/> for use with resolvers to perform iterative resolution (<xref section="5.3.3" sectionFormat="of" target="RFC1034"/>).
The IDELEG type requires registration in the "Resource Record (RR) TYPEs" registry under the "Domain Name System (DNS) Parameters" registry group (see <xref target="deleg-rr-type">IDELEG RR type</xref>).
The protocol-specific mapping specification for iterative resolutions are the same as those for "DNS Servers" <xref target="RFC9461"/>.</t>
      <t><xref section="2.4.2" sectionFormat="of" target="RFC9460"/> states that SVCB RRsets <bcp14>SHOULD</bcp14> only have a single RR in AliasMode, and that if multiple AliasMode RRs are present, clients or recursive resolvers <bcp14>SHOULD</bcp14> pick one at random.
Different from SVCB (<xref section="2.4.2" sectionFormat="of" target="RFC9460"/>), IDELEG allows for multiple AliasMode RRs to be present in a single IDELEG RRset.
Note however that the target of an IDELEG RR in AliasMode is an SVCB RRset for the "dns" service type adhering fully to the Service Binding Mapping for DNS Servers as specified in <xref target="RFC9461"/>.</t>
      <t><xref section="2.4.1" sectionFormat="of" target="RFC9460"/> states that within an SVCB RRset, all RRs <bcp14>SHOULD</bcp14> have the same mode, and that if an RRset contains a record in AliasMode, the recipient <bcp14>MUST</bcp14> ignore any ServiceMode records in the set.
Different from SVCB, mixed ServiceMode and AliasMode RRs are allowed in an IDELEG RRset.
When a mixed ServiceMode and AliasMode IDELEG RRset is encountered by a resolver, the resolver first picks one of the AliasMode RRs or all ServiceMode RRs, giving all ServiceMode RRs equal weight as each single AliasMode RR.
When the result of that choice is an AliasMode RR, then that RR is followed and the resulting IDELEG RRset is reevaluated.
When the result of that choice is all ServiceMode RRs, then within that set the resolver adheres to the ServicePriority value.</t>
      <t>At the delegation point (for example <tt>customer._deleg.example.</tt>), the host names of the authoritative name servers for the subzone, are given in the TargetName RDATA field of IDELEG records in ServiceMode.
Port Prefix Naming <xref section="3" sectionFormat="of" target="RFC9461"/> is not used at the delegation point, but <bcp14>MUST</bcp14> be used when resolving the aliased-to name servers with IDELEG RRs in AliasMode.</t>
    </section>
    <section anchor="delegation-administration">
      <name>Delegation administration</name>
      <t>An IDELEG delegation is realized with an IDELEG Resource Record set (RRset) <xref target="RFC9460"/> below a specially for the purpose reserved label with the name <tt>_deleg</tt> at the apex of the delegating zone.
The <tt>_deleg</tt> label scopes the interpretation of the IDELEG records and requires registration in the "Underscored and Globally Scoped DNS Node Names" registry (see <xref target="node-name">_deleg Node Name</xref>).
The full scoping of delegations includes the labels that are <strong>below</strong> the <tt>_deleg</tt> label and those, together with the name of the delegating domain, make up the name of the subzone to which the delegation refers.
For example, if the delegating zone is <tt>example.</tt>, then a delegation to subzone <tt>customer.example.</tt> is realized by a IDELEG RRset at the name <tt>customer._deleg.example.</tt> in the parent zone.
A fully scoped delegating name (such as <tt>customer._deleg.example.</tt>) is referred to further in this document as the "delegation point".</t>
      <t>Note that if the delegation is outsourcing to a single operator represented in a single IDELEG RR, it is <bcp14>RECOMMENDED</bcp14> to refer to the name of the operator's IDELEG RRset with a CNAME on the delegation point instead of a IDELEG RR in AliasMode <xref section="10.2" sectionFormat="of" target="RFC9460"/>.</t>
      <section anchor="examples">
        <name>Examples</name>
        <section anchor="one-name-server-within-the-subzone">
          <name>One name server within the subzone</name>
          <figure anchor="zone-within">
            <name>One name server within the subzone</name>
            <sourcecode type="~"><![CDATA[
$ORIGIN example.
@                 IN  SOA    ns zonemaster ...
customer1._deleg  IN  IDELEG 1 ( ns.customer1
                                 ipv4hint=198.51.100.1,203.0.113.1
                                 ipv6hint=2001:db8:1::1,2001:db8:2::1
                               )
]]></sourcecode>
          </figure>
        </section>
        <section anchor="two-name-servers-within-the-subzone">
          <name>Two name servers within the subzone</name>
          <figure anchor="zones-within">
            <name>Two name servers within the subzone</name>
            <artwork><![CDATA[
$ORIGIN example.
@                 IN  SOA    ns zonemaster ...
customer2._deleg  IN  IDELEG 1 ns1.customer2 ( ipv4hint=198.51.100.1
                                               ipv6hint=2001:db8:1::1
                                             )
                  IN  IDELEG 1 ns2.customer2 ( ipv4hint=203.0.113.1
                                               ipv6hint=2001:db8:2::1
                                             )
]]></artwork>
          </figure>
        </section>
        <section anchor="outsourced-to-an-operator">
          <name>Outsourced to an operator</name>
          <figure anchor="outsourced-cname">
            <name>Outsourced with CNAME</name>
            <artwork><![CDATA[
$ORIGIN example.
@                 IN  SOA   ns zonemaster ...
customer3._deleg  IN  CNAME _dns.ns.operator1
]]></artwork>
          </figure>
          <t>Instead of using CNAME, the outsourcing could also have been accomplished with an IDELEG RRset with a single IDELEG RR in AliasMode.
The configuration below is operationally equivalent to the CNAME configuration above.
It is <bcp14>RECOMMENDED</bcp14> to use a CNAME over an IDELEG RRset with a single IDELEG RR in AliasMode (<xref section="10.2" sectionFormat="of" target="RFC9460"/>).
Note that an IDELEG RRset refers with TargetName to a DNS service <xref target="RFC9461"/>, which will be looked up using Port Prefix Naming <xref section="3" sectionFormat="of" target="RFC9461"/>, but that an CNAME refers to the domain name of the target SVCB RRset instead (or CNAME) which may have a <tt>_dns</tt> prefix.</t>
          <figure anchor="outsourced-svcb">
            <name>Outsourced with an AliasMode IDELEG RR</name>
            <artwork><![CDATA[
$ORIGIN example.
@                 IN  SOA    ns zonemaster ...
customer3._deleg  IN  IDELEG 0 ns.operator1
]]></artwork>
          </figure>
          <t>The operator SVCB RRset could for example be:</t>
          <figure anchor="operator-zone">
            <name>Operator zone</name>
            <artwork><![CDATA[
$ORIGIN operator1.example.
@                 IN  SOA    ns zonemaster ...
_dns.ns           IN  SVCB   1 ns ( alpn=h2,dot,h3,doq
                                    ipv4hint=192.0.2.1
                                    ipv6hint=2001:db8:3::1
                                    dohpath=/q{?dns}
                                  )
                  IN  SVCB   2 ns ( ipv4hint=192.0.2.2
                                    ipv6hint=2001:db8:3::2
                                  )
ns                IN  AAAA   2001:db8:3::1
                  IN  AAAA   2001:db8:3::2
                  IN  A      192.0.2.1
                  IN  A      192.0.2.2
]]></artwork>
          </figure>
        </section>
        <section anchor="dnssec-signed-name-servers-within-the-subzone">
          <name>DNSSEC-signed name servers within the subzone</name>
          <figure anchor="dnssec-zone">
            <name>DNSSEC-signed deleg zone</name>
            <artwork><![CDATA[
$ORIGIN
@                 IN  SOA    ns zonemaster ...
                  IN  RRSIG  SOA ...
                  IN  DNSKEY 257 3 15 ...
                  IN  RRSIG  DNSKEY ...
                  IN  NS     ns.example.
                  IN  RRSIG  NS ...
                  IN  NSEC   customer5._deleg NS SOA RRSIG NSEC DNSKEY
                  IN  RRSIG  NSEC ...

customer5._deleg  IN  IDELEG 1 ns.customer5 alpn=h2,h3 (
                                            ipv4hint=198.51.100.5
                                            ipv6hint=2001:db8:5::1
                                            dohpath=/dns-query{?dns}
                                            )
                  IN  RRSIG  IDELEG ...
                  IN  NSEC   customer7._deleg RRSIG NSEC IDELEG
                  IN  RRSIG  NSEC ...

customer7._deleg  IN  CNAME  customer5._deleg
                  IN  RRSIG  CNAME ...
                  IN  NSEC   customer5 CNAME RRSIG NSEC
                  IN  RRSIG  NSEC ...

customer5         IN  NS     ns.customer5
ns.customer5      IN  A      198.51.100.5
                  IN  AAAA   2001:db8:5::1
customer5         IN  DS     17405 15 2 ...
                  IN  RRSIG  DS ...
                  IN  NSEC   customer6 NS DS RRSIG NSEC
                  IN  RRSIG  NSEC ...

customer6         IN  NS     ns.customer6
ns.customer6      IN  A      203.0.113.1
                  IN  AAAA   2001:db8:6::1
customer6         IN  DS     ...
                  IN  RRSIG  DS ...
                  IN  NSEC   customer7 NS DS RRSIG NSEC
                  IN  RRSIG  NSEC ...

customer7         IN  NS     ns.customer5
                  IN  DS     ...
                  IN  RRSIG  DS ...
                  IN  NSEC   example. NS DS RRSIG NSEC
                  IN  RRSIG  NSEC ...
]]></artwork>
          </figure>
          <t><tt>customer5.example.</tt> is delegated to in an extensible way and <tt>customer6.example.</tt> is delegated only in a legacy way.
<tt>customer7.example.</tt>'s delegation is outsourced to customer5's delegation.</t>
          <t>The delegation signals that the authoritative name server supports DoH.
<tt>customer5.example.</tt>, <tt>customer6.example.</tt> and <tt>example.</tt> are all DNSSEC-signed.
The DNSSEC authentication chain links from <tt>example.</tt> to <tt>customer5.example.</tt> in the for DNSSEC conventional way with the signed <tt>customer5.example. DS</tt> RRset in the <tt>example.</tt> zone.
Also, <tt>customer6.example.</tt> is linked to from <tt>example.</tt> with the signed <tt>customer6.example. DS</tt> RRset in the <tt>example.</tt> zone.</t>
          <t>Note that both <tt>customer5.example.</tt> and <tt>customer6.example.</tt> have legacy delegations in the zone as well.
It is important to have those legacy delegations to maintain support for legacy resolvers, that do not support deleg.
DNSSEC signers <bcp14>SHOULD</bcp14> construct the NS RRset and glue for the legacy delegation from the IDELEG RRset.</t>
        </section>
      </section>
    </section>
    <section anchor="minimal-implementation">
      <name>Minimal implementation</name>
      <t>Support in recursive resolvers suffices for the mechanism to be fully functional.
<xref target="recursive-resolver-behavior"/> specifies the basic algorithm for resolving IDELEG delegations.
In <xref target="presence"/>, an optimization is presented that will reduce the number of (parallel) queries especially for when authoritative name server support is still lacking and there are still many zones that do not contain IDELEG delegations.</t>
      <section anchor="recursive-resolver-behavior">
        <name>Recursive Resolver behavior</name>
        <t>As part of the processing a recursive resolver does, it learns where the zone boundaries are in the DNS name tree.
If the triggering query name is already known to be the apex of a zone, then no further delegation point probing will need to be done for this name (subject to the TTL of this information).</t>
        <t>Otherwise, the triggering query is below the target zone apex and it is unknown whether the triggering query name itself is the name of a delegation or zone.
In this case two parallel queries <bcp14>MUST</bcp14> be sent.
One for the triggering query in the way that is conventional with legacy delegations (which could be just the triggering query or a minimised query <xref target="RFC9156"/>), and one <em>deleg query</em> with query type IDELEG.</t>
        <t>The deleg query name is constructed by concatenating the first label below the part that the triggering query name has in common with the target zone, a <tt>_deleg</tt> label and the name of the target zone.
For example if the triggering query is <tt>www.customer.example.</tt> and the target zone <tt>example.</tt>, then the deleg query name is <tt>customer._deleg.example.</tt>
For another example, if the triggering query is <tt>www.faculty.university.example.</tt> and the target zone <tt>faculty.university.example.</tt> then the deleg query name is <tt>www._deleg.faculty.university.example.</tt></t>
        <t>DNAME, CNAME and IDELEG in AliasMode processing happens as before, though note that when following an IDELEG RR in AliasMode the target RR type is SVCB (see <xref target="the-deleg-resource-record-type"/>).
The eventual deleg query response, after following all redirections caused by DNAME, CNAME and AliasMode IDELEG RRs, has three possible outcomes:</t>
        <ol spacing="normal" type="1"><li>
            <t>An IDELEG RRset in ServiceMode is returned in the response's answer section containing the delegation for the subzone.  </t>
            <t>
The IDELEG RRs in the RRset <bcp14>MUST</bcp14> be used to follow the referral.
The TargetName data field in the IDELEG RRs in the RRset <bcp14>MUST</bcp14> be used as the names for the name servers to contact for the subzone, and the ipv4hint and ipv6hint parameters <bcp14>MUST</bcp14> be used as the IP addresses for the TargetName in the same IDELEG RR.  </t>
            <t>
The NS RRset and glue, in the response of the legacy query that was sent in parallel to the deleg query, <bcp14>MUST NOT</bcp14> be used, but the signed DS record (or NSEC(3) records indicating that there was no DS) <bcp14>MUST</bcp14> be used in linking the DNSSEC authentication chain as which would conventionally be done with DNSSEC as well.</t>
          </li>
          <li>
            <t>The deleg query name does not exist (NXDOMAIN).  </t>
            <t>
There is no IDELEG delegation for the subzone, and the referral response for the legacy delegation <bcp14>MUST</bcp14> be processed as would be done with legacy DNS and DNSSEC processing.</t>
          </li>
          <li>
            <t>The deleg query name does exist, but resulted in a NOERROR no answer response (also known as a NODATA response).  </t>
            <t>
If the legacy query, did result in a referral for the same number of labels as the subdomain that the deleg query was for, then there was no IDELEG delegation for the subzone, and the referral response for the legacy delegation <bcp14>MUST</bcp14> be processed as would be done with legacy DNS and DNSSEC processing.  </t>
            <t>
Otherwise, the subzone may be more than one label below the delegating zone.  </t>
            <t>
If the response to the legacy query resulted in a referral, then a new deleg query <bcp14>MUST</bcp14> be spawned, matching the zone cut of the legacy referral response.
For example if the triggering query is <tt>www.university.ac.example.</tt> and the target zone <tt>example.</tt>, and the legacy response contained an NS RRset for <tt>university.ac.example.</tt>, then the deleg query name is <tt>university.ac._deleg.example.</tt>
The response to the new deleg query <bcp14>MUST</bcp14> be processed as described above, as if it was the initial deleg query.  </t>
            <t>
If the legacy query was sent minimised and needs a followup query, then parallel to that followup query a new deleg query will be sent, adding a single label to the previous deleg query name.
For example if the triggering query is <tt>www.university.ac.example.</tt> and the target zone is <tt>example.</tt> and the minimised legacy query name is <tt>ac.example.</tt> (which also resulted in a NOERROR no answer response), then the deleg query to be sent along in parallel with the followup legacy query will become <tt>university.ac._deleg.example.</tt>
Processing of the responses of those two new queries will be done as described above.</t>
          </li>
        </ol>
      </section>
      <section anchor="presence">
        <name><tt>_deleg</tt> label presence</name>
        <t>Absence of the <tt>_deleg</tt> label in a zone is a clear signal that the zone does not contain any IDELEG delegations.
Recursive resolvers <bcp14>SHOULD NOT</bcp14> send any additional deleg queries for zones for which it is known that it does not contain the <tt>_deleg</tt> label at the apex.
The state regarding the presence of the <tt>_deleg</tt> label within a resolver can be "unknown", "known not to be present", or "known to be present".</t>
        <t>The state regarding the presence of the <tt>_deleg</tt> label can be deduced from the response of the deleg query, if the target zone is signed with DNSSEC.
<strong>No</strong> additional queries are needed.
If the target zone is unsigned, the procedure as described in the remainder of this section <bcp14>SHOULD</bcp14> be followed.</t>
        <section anchor="test-deleg-label-presence-unsigned-zones-only">
          <name>Test <tt>_deleg</tt> label presence (unsigned zones only)</name>
          <t>When the presence of a <tt>_deleg</tt> label is "unknown", a <tt>_deleg</tt> presence test query <bcp14>SHOULD</bcp14> be sent in parallel to the next query for the unsigned target zone (though not when the target name server is known to support _deleg, which is discussed in <xref target="authoritative-name-server-support"/>).
The query name for the test query is the <tt>_deleg</tt> label prepended to the apex of zone for which to test presence, with query type NS.</t>
          <t>The testing query can have three possible outcomes:</t>
          <ol spacing="normal" type="1"><li>
              <t>The <tt>_deleg</tt> label does not exist within the zone, and an NXDOMAIN response is returned.  </t>
              <t>
The non-existence of the <tt>_deleg</tt> label <bcp14>MUST</bcp14> be registered for the duration indicated by the "minimum" RDATA field of the SOA resource record in the authority section, adjusted to the boundaries for TTL values that the resolver has (<xref section="4" sectionFormat="of" target="RFC8767"/>).
For the period the non-existence of the <tt>_deleg</tt> label is registered, the label is "known not to be present" and the resolver <bcp14>SHOULD NOT</bcp14> send any (additional) deleg queries.</t>
            </li>
            <li>
              <t>The <tt>_deleg</tt> label does exist within the zone but contains no data.
A NOERROR response is returned with no RRs in the answer section.  </t>
              <t>
The existence of the <tt>_deleg</tt> name <bcp14>MUST</bcp14> be registered for the duration indicated by the "minimum" RDATA field of the SOA resource record in the authority section, adjusted to the resolver's TTL boundaries.
For the period the existence of the empty non-terminal at the <tt>_deleg</tt> label is registered, the label is "known to be present" and the resolver <bcp14>MUST</bcp14> send additional deleg queries as described in <xref target="recursive-resolver-behavior"/>.</t>
            </li>
            <li>
              <t>The <tt>_deleg</tt> label does exist within the zone, but is a delegation.
A NOERROR legacy referral response is returned with an NS RRset in the authority section.  </t>
              <t>
The resolver <bcp14>MUST</bcp14> record that the zone does not have valid IDELEG delegations deployed for the duration indicated by the NS RRset's TTL value, adjusted to the resolver's TTL boundaries.
For the period indicated by the NS RRset's TTL value, the zone is considered to <strong>not</strong> to have valid IDELEG delegations, and <bcp14>MUST NOT</bcp14> send any (additional) deleg queries.</t>
            </li>
          </ol>
        </section>
      </section>
    </section>
    <section anchor="optimized-implementation">
      <name>Optimized implementation</name>
      <t>Support for authoritative name servers enables optimized query behavior by resolvers with reduced (simultaneous) queries.
<xref target="authoritative-name-server-support"/> specifies how deleg supporting authoritative name servers return referral responses for delegations.
In <xref target="behavior-with-auth-support"/> we specify how resolvers can benefit from those authoritative servers.</t>
      <section anchor="authoritative-name-server-support">
        <name>Authoritative name server support</name>
        <t>Deleg supporting authoritative name servers include the IDELEG delegation information (or the NSEC(3) records showing the non-existence) in the authority section of referral responses to legacy DNS queries.
For example, querying the zone from <xref target="dnssec-zone"/> for <tt>www.customer5.example. A</tt>, will return the following referral response:</t>
        <figure anchor="deleg-response">
          <name>A deleg referral response</name>
          <artwork><![CDATA[
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 54349
;; flags: qr ; QUERY: 1, ANSWER: 0, AUTHORITY: 5, ADDITIONAL: 2
;; QUESTION SECTION:
;; www.customer5.example.       IN      A

;; ANSWER SECTION:

;; AUTHORITY SECTION:
customer5.example.      3600    IN      NS      ns.customer5.example.
customer5.example.      3600    IN      DS      ...
customer5.example.      3600    IN      RRSIG   DS ...
customer5._deleg.example.       3600    IN      IDELEG 1 (
                ns.customer5.example. alpn=h2,h3
                ipv4hint=198.51.100.5 ipv6hint=2001:db8:5::1
                dohpath=/dns-query{?dns}
                )
customer5._deleg.example.       3600    IN      RRSIG   IDELEG ...

;; ADDITIONAL SECTION:
ns.customer5.example.   3600    IN      A       198.51.100.5
ns.customer5.example.   3600    IN      AAAA    2001:db8:5::1

;; Query time: 0 msec
;; EDNS: version 0; flags: do ; udp: 1232
;; SERVER: 192.0.2.53
;; WHEN: Mon Feb 24 20:36:25 2025
;; MSG SIZE  rcvd: 456
]]></artwork>
        </figure>
        <t>The referral response in <xref target="deleg-response"/> includes the signed IDELEG RRset in the authority section.</t>
        <t>As another example, querying the zone from <xref target="dnssec-zone"/> for <tt>www.customer6.example. A</tt>, will return the following referral response:</t>
        <figure anchor="no-incr-deleg-response">
          <name>Referral response without deleg</name>
          <artwork><![CDATA[
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 36574
;; flags: qr ; QUERY: 1, ANSWER: 0, AUTHORITY: 9, ADDITIONAL: 2
;; QUESTION SECTION:
;; www.customer6.example.       IN      A

;; ANSWER SECTION:

;; AUTHORITY SECTION:
customer6.example.      3600    IN      NS      ns.customer6.example.
customer6.example.      3600    IN      DS      ...
customer6.example.      3600    IN      RRSIG   DS ...
customer5._deleg.example.       1234    IN      NSEC    (
                customer7._deleg.example.  RRSIG NSEC IDELEG )
customer5._deleg.example.       1234    IN      RRSIG   NSEC ...
example.        1234    IN      NSEC    (
                customer5._deleg.example.  NS SOA RRSIG NSEC DNSKEY )
example.        1234    IN      RRSIG   NSEC ...

;; ADDITIONAL SECTION:
ns.customer6.example.   3600    IN      A       203.0.113.1
ns.customer6.example.   3600    IN      AAAA    2001:db8:6::1

;; Query time: 0 msec
;; EDNS: version 0; flags: do ; udp: 1232
;; SERVER: 192.0.2.53
;; WHEN: Tue Feb 25 10:23:53 2025
;; MSG SIZE  rcvd: 744
]]></artwork>
        </figure>
        <t>Next to the legacy delegation, the deleg supporting authoritative returns the NSEC(3) RRs needed to show that there was no IDELEG delegation in the referral response in <xref target="no-incr-deleg-response"/>.</t>
        <t>Querying the zone from <xref target="dnssec-zone"/> for <tt>www.customer7.example. A</tt>, will return the following referral response:</t>
        <figure anchor="alias-response">
          <name>Aliasing referral response</name>
          <artwork><![CDATA[
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 9456
;; flags: qr ; QUERY: 1, ANSWER: 0, AUTHORITY: 7, ADDITIONAL: 2
;; QUESTION SECTION:
;; www.customer7.example.       IN      A

;; ANSWER SECTION:

;; AUTHORITY SECTION:
customer7.example.      3600    IN      NS      ns.customer5.example.
customer7.example.      3600    IN      DS      ...
customer7.example.      3600    IN      RRSIG   DS ...
customer7._deleg.example.       3600    IN      CNAME   (
                customer5._deleg.example. )
customer7._deleg.example.       3600    IN      RRSIG   CNAME ...
customer5._deleg.example.       3600    IN      IDELEG   1 (
                ns.customer5.example. alpn=h2,h3
                ipv4hint=198.51.100.5 ipv6hint=2001:db8:5::1 )
customer5._deleg.example.       3600    IN      RRSIG   IDELEG ...

;; ADDITIONAL SECTION:
ns.customer5.example.   3600    IN      A       198.51.100.5
ns.customer5.example.   3600    IN      AAAA    2001:db8:5::1

;; Query time: 0 msec
;; EDNS: version 0; flags: do ; udp: 1232
;; SERVER: 192.0.2.53
;; WHEN: Tue Feb 25 10:55:07 2025
;; MSG SIZE  rcvd: 593
]]></artwork>
        </figure>
        <t>The delegation of <tt>customer7.example.</tt> is aliased to the one that is also used by <tt>customer5.example.</tt>
Since both delegations are in the same zone, the authoritative name server for <tt>example.</tt> returns both the CNAME realising the alias, as well as the IDELEG RRset which is the target of the alias in <xref target="alias-response"/>.
In other cases a returned CNAME or IDELEG RR in AliasMode may need further chasing by the resolver.
<!-- TODO: Add an AliasMode referral without expansion within the zone -->
        </t>
        <t>With unsigned zones, only if an IDELEG delegation exists, the IDELEG RRset (or CNAME) will be present in the authority section of referral responses.
<!-- TODO: Add a referral response for an unsigned zone -->
If there is no IDELEG delegation, then the IDELEG RRset (or CNAME) is simply absent from the authority section and the referral response is indistinguishable from an non deleg supportive authoritative.
<!-- TODO: Add a non deleg referral response for an unsigned zone -->
        </t>
      </section>
      <section anchor="behavior-with-auth-support">
        <name>Resolver behavior with authoritative name server support</name>
        <t>Deleg supporting authoritative name servers will include the IDELEG delegation information (or the NSEC(3) records showing the non-existence) in the authority section of referral responses.
For an unsigned zone, an deleg supporting authoritative cannot return that an IDELEG delegation is absent (because of lack of an authenticated denial of existence), however with support from the served zone (the zone has the Resource Record provisioned <tt>*._deleg IN IDELEG 0 .</tt>), the authoritative name server can signal support also for unsigned zones (see <xref target="extra-optimized">Extra optimized implementation</xref>).</t>
        <t>If it is known that an authoritative name server supports deleg, then no direct queries for the IDELEG delegation need to be sent in parallel to the legacy delegation query.
A resolver <bcp14>SHOULD</bcp14> register that an authoritative name server supports deleg when the authority section, of the returned referral responses from that authoritative name server, contains IDELEG delegation information.</t>
        <t>When the authority section of a referral response contains an IDELEG RRset or a CNAME record on the IDELEG delegation name, or valid NSEC(3) RRs showing the non-existence of such an IDELEG or CNAME RRset, then the resolver <bcp14>SHOULD</bcp14> register that the contacted authoritative name server supports deleg for the duration indicated by the TTL for that IDELEG, CNAME or NSEC(3) RRset, adjusted to the resolver's TTL boundaries, but only if it is longer than any already registered duration.
Subsequent queries <bcp14>SHOULD NOT</bcp14> include deleg queries, as described in <xref target="recursive-resolver-behavior"/>, to be send in parallel for the duration support for deleg is registered for the authoritative name server.</t>
        <t>For example, in <xref target="deleg-response"/>, the IDELEG RRset at the IDELEG delegation point has TTL 3600.
The resolver should register that the contacted authoritative name server supports deleg for (at least) 3600 seconds (one hour).
All subsequent queries to that authoritative name server <bcp14>SHOULD NOT</bcp14> include deleg queries to be send in parallel.</t>
        <t>If the authority section contains more than one RRset making up the IDELEG delegation, then the RRset with the longest TTL <bcp14>MUST</bcp14> be taken to determine the duration for which deleg support is registered.</t>
        <t>For example, in <xref target="alias-response"/>, both a CNAME and an IDELEG RRset for the IDELEG delegation are included in the authority section.
The longest TTL must be taken for deleg support registration, though because the TTL of both RRsets is 3600, it does not matter in this case.</t>
        <t>With DNSSEC-signed zones, support is apparent with all referral responses.
With unsigned zones, support is apparent only from referral responses for which an IDELEG delegation exists, unless the zone has the Resource Record <tt>*._deleg IN IDELEG 0 .</tt> provisioned (see <xref target="extra-optimized">Extra optimized implementation</xref>).</t>
        <t>If the resolver knows that the authoritative name server supports deleg, <em>and</em> a DNSSEC-signed zone is being served, then all referrals <bcp14>SHOULD</bcp14> contain either an IDELEG delegation, or NSEC(3) records showing that the delegation does not exist.
If a referral is returned that does not contain an IDELEG delegation nor an indication that it does not exist, then the resolver <bcp14>MAY</bcp14> register that authoritative server does not support deleg and <bcp14>MUST</bcp14> send an additional deleg query to find the delegation (or denial of its existence).</t>
      </section>
    </section>
    <section anchor="extra-optimized">
      <name>Extra optimized implementation</name>
      <t>An IDELEG RRset on an IDELEG delegation point, with an IDELEG RR in AliasMode, aliasing to the root zone, <bcp14>MUST</bcp14> be interpreted to mean that the legacy delegation information <bcp14>MUST</bcp14> be used to follow the referral.
All service parameters for such AliasMode (aliasing to the root) IDELEG RRs on the IDELEG delegation point, <bcp14>MUST</bcp14> be ignored.</t>
      <t>For example, such an IDELEG RRset registered on the wildcard below the <tt>_deleg</tt> label on the apex of a zone, can signal that legacy DNS referrals <bcp14>MUST</bcp14> be used for both signed and <em>unsigned</em> zones:</t>
      <figure anchor="wildcard-deleg">
        <name>Wildcard IDELEG delegation to control duration of detected support</name>
        <artwork><![CDATA[
$ORIGIN example.
@                 IN  SOA   ns zonemaster ...
*._deleg   86400  IN  IDELEG 0 .
customer1._deleg  IN  IDELEG 1 ( ns.customer1
                                 ipv4hint=198.51.100.1,203.0.113.1
                                 ipv6hint=2001:db8:1::1,2001:db8:2::1
                               )
customer3._deleg  IN  CNAME _dns.ns.operator1
]]></artwork>
      </figure>
      <t>Resolvers <bcp14>SHOULD</bcp14> register that an authoritative name server supports deleg, if such an IDELEG RRset is returned in the authority section of referral responses, for the duration of the TTL if the IDELEG RRset, adjusted to the resolver's TTL boundaries, but only if it is longer than any already registered duration.
Note that this will also be included in referral responses for unsigned zones, which would otherwise not have signalling of deleg support by the authoritative name server.
Also, signed zones need fewer RRs to indicate that no IDELEG delegation exists.
The wildcard expansion already shows the closest encloser (i.e. <tt>_deleg.&lt;apex&gt;</tt>), so only one additional NSEC(3) is needed to show non-existence of the queried-for name below the closest encloser.</t>
      <t>This method of signalling that the legacy delegation <bcp14>MUST</bcp14> be used, is <bcp14>RECOMMENDED</bcp14>.</t>
    </section>
    <section anchor="fewer-queries">
      <name>Fewer queries</name>
      <t>The algorithm described in <xref target="recursive-resolver-behavior"/> is optimized for
low latency.
The additional queries required are sent at the same time as query for
legacy delegations.
It is also possible optimize for a lowest number of additional queries.
However, this may in some cases result in extra latency.</t>
      <t>To achieve this, the behavior of the recursive resolver is modified as follows.
If the state of the zone is known (the <tt>_deleg.&lt;apex&gt;</tt> is known to exist or not to exist), then queries are executed as
described in <xref target="recursive-resolver-behavior"/> and <xref target="behavior-with-auth-support"/>.</t>
      <t>If the state of the zone is unknown then initially only conventional queries
are sent. If a reply arrives that does not contain a legacy delegation then
the algorithm is done and no further queries are sent.</t>
      <t>If the reply contains a legacy delegation then the follow up query or queries
depend on whether the zone is DNSSEC signed or not.
If the zone is signed then a deleg query is sent that matches
the legacy delegation.
In a signed zone, the query is either successful and returns an IDELEG RRset or
the query contains a proof of non-existence from which it is possible to
deduce whether the zone contains an <tt>_deleg</tt> label or not.</t>
      <t>If the zone is not signed then two separate queries are needed.
One query just for the <tt>_deleg</tt> label and one deleg query that
matches legacy delegation.</t>
      <t>If the reply the <tt>_deleg</tt> query is NXDOMAIN then the zone does not contain any
IDELEG delegations and further queries are unnecessary.
See <xref target="presence"/> for processing the response to the <tt>_deleg</tt> query.
The response to the deleg query is processed as described in
<xref target="recursive-resolver-behavior"/>.</t>
      <t>The effect on the number of extra queries is the following.
If the response does not contain a legacy delegation then no extra queries
are sent.</t>
      <t>If the nameserver supports deleg and the zone is signed then no additional
queries will be sent independent of whether zone contains the <tt>_deleg</tt> label or
not.</t>
      <t>If the nameserver supports deleg, the zone is not signed and no IDELEG RRset
is returned in the response then two follow up queries need to be sent.
The response to the <tt>_deleg</tt> query will be cached until the TTL expires.</t>
      <t>If the nameserver does not support deleg but the zone is signed then one
follow up queries will be sent: a deleg query that matches the legacy
delegation.
Presence or absence of the <tt>_deleg</tt> label will be cached.
IF the <tt>_deleg</tt> label is absent then no further additonal queries will be sent.</t>
      <t>Finally, if the nameserver does not support deleg and the zone is not signed
then two follow up queries will be sent.
The response to the <tt>_deleg</tt> query will be cached until the TTL expires.</t>
    </section>
    <section anchor="priming-queries">
      <name>Priming queries</name>
      <t>Some zones, such as the root zone, are targeted directly from hints files.
Information about which authoritative name servers and with capabilities, <bcp14>MAY</bcp14> be provided in an IDELEG RRset directly at the <tt>_deleg</tt> label under the apex of the zone.
Priming queries from an deleg supporting resolver, <bcp14>MUST</bcp14> send an <tt>_deleg.&lt;apex&gt; IDELEG</tt> query in parallel to the legacy <tt>&lt;apex&gt; NS</tt> query and process the content as if it was found through an referral response.</t>
    </section>
    <section anchor="how-does-the-protocol-described-in-this-draft-meet-the-requirements">
      <name>How does the protocol described in this draft meet the requirements</name>
      <t>This section will discuss how deleg meets the requirements for a new delegation mechanism as described in <xref target="I-D.ietf-deleg-requirements-02"/></t>
      <ul spacing="normal">
        <li>
          <t>H1. DELEG must not disrupt the existing registration model of domains.  </t>
          <t>
The existing zone structure including the concept of delegations from
a parent zone to a child zone is left unchanged.</t>
        </li>
        <li>
          <t>H2. DELEG must be backwards compatible with the existing ecosystem.  </t>
          <t>
The new delegations do not interfere with legacy software.  </t>
          <t>
The behavior of deleg supporting resolvers includes a fallback to NS
records if no IDELEG delegation is present (See <xref target="recursive-resolver-behavior"/>).</t>
        </li>
        <li>
          <t>H3. DELEG must not negatively impact most DNS software.  </t>
          <t>
Deleg introduces a new RR type.
Software that parses zone file format needs to be changed to support the new
type.
Though unknown type notation <xref target="RFC3597"/> can be used in some cases if no support for the new RR type is present.
Existing authoritatives can serve IDELEG zones (though less efficiently), existing signers can sign IDELEG zones, existing diagnostic tools can query IDELEG zones.
Non-recursive DNSSEC validators can operate independently from (possibly legacy) recursive resolvers.</t>
        </li>
        <li>
          <t>H4. DELEG must be able to secure delegations with DNSSEC.  </t>
          <t>
IDELEG delegations as described in this document are automatically secured with DNSSEC
(if the parent zone is signed). A replacement for DS records is described in <xref target="I-D.homburg-deleg-incremental-dnssec"/>.</t>
        </li>
        <li>
          <t>H5. DELEG must support updates to delegation information with the same relative ease as currently exists with NS records.  </t>
          <t>
IDELEG delegations are affected by TTL like any other
DNS record.</t>
        </li>
        <li>
          <t>H6. DELEG must be incrementally deployable and not require any sort of flag day of universal change.  </t>
          <t>
IDELEG zones can be added without upgrading authoritatives.
IDELEG zones still work with old resolvers and validators.
Basically any combination of old and new should work, though with
reduced efficiency for some combinations.</t>
        </li>
        <li>
          <t>H7. DELEG must allow multiple independent operators to simultaneously serve a zone.  </t>
          <t>
Deleg allows for multiple IDELEG records. This allows
multiple operators to serve the zone.</t>
        </li>
        <li>
          <t>S1. DELEG should facilitate the use of new DNS transport mechanisms  </t>
          <t>
New transports are already defined for the DNS mode of SVCB (<xref target="RFC9461"/>).
The same parameters are used for IDELEG.</t>
        </li>
        <li>
          <t>S2. DELEG should make clear all of the necessary details for contacting a service  </t>
          <t>
Most of the needed SVCB parameters are already defined in existing standards.
The exception is a replacement for the DS records, which is described in <xref target="I-D.homburg-deleg-incremental-dnssec"/>.</t>
        </li>
        <li>
          <t>S3. DELEG should minimize transaction cost in its usage.  </t>
          <t>
Assuming Qname-minimisation, there are no extra queries needed in most cases
if the authoritative name server has deleg support. The exception
is when the parent zone is not signed and has no IDELEG records.
In that case, one extra query is needed when the parent zone is first
contacted (and every TTL).  </t>
          <t>
Additional queries may be needed to resolve aliases.</t>
        </li>
        <li>
          <t>S4. DELEG should simplify management of a zone's DNS service.  </t>
          <t>
Zone management can be simplified using the alias mode of IDELEG.
This allows the zone operator to change the details of the delegation
without involving the parent zone.  </t>
          <t>
Draft <xref target="I-D.homburg-deleg-incremental-dnssec"/> defines the dnskeyref parameter which offers the same simplification for DNSSEC delegations.</t>
        </li>
        <li>
          <t>S5. DELEG should allow for backward compatibility to the conventional NS-based delegation mechanism.  </t>
          <t>
NS records and glue can be extracted from the IDELEG record assuming no aliasing is used.  </t>
          <t>
The ds parameter in <xref target="I-D.homburg-deleg-incremental-dnssec"/> has the same value as the rdata of a DS record.</t>
        </li>
        <li>
          <t>S6. DELEG should be extensible and allow for the easy incremental addition of new delegation features after initial deployment.  </t>
          <t>
SVCB-style records are extensible by design.</t>
        </li>
        <li>
          <t>S7. DELEG should be able to convey a security model for delegations stronger than currently exists with DNSSEC.  </t>
          <t>
IDELEG delegations are protected by DNSSEC, unlike
NS records at the parent zone.</t>
        </li>
      </ul>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t><strong>Note to the RFC Editor</strong>: please remove this entire section before publication.</t>
      <t>We are using RR type code 65280 for experiments.</t>
      <t>Jesse van Zutphen has built a proof of concept implementation supporting IDELEG delegations as specified in a previous version of this document <xref target="I-D.homburg-deleg-incremental-deleg-00"/> for the Unbound recursive resolver as part of his master thesis for the Security and Network Engineering master program of the University of Amsterdam <xref target="JZUTPHEN"/>.
Jesse's implementation has been adapted to query for the IDELEG RR types (with code point 65280).
This version is available in the <tt>ideleg</tt> branch of the <tt>NLnetLabs/unbound</tt> github repository <xref target="IDELEG4UNBOUND"/>.
Note that this implementation does not yet support <xref target="behavior-with-auth-support">optimized behaviour</xref>, and also does not yet follow AliasMode IDELEG RRs.</t>
      <t>The ldns DNS library and tools software has been extended with support for IDELEG, which is available in the <tt>features/ideleg</tt> branch of the <tt>NLnetLabs/ldns</tt> github repository <xref target="IDELEG4LDNS"/>.
This includes support for IDELEG in the DNS lookup utility <tt>drill</tt>, as well as in the DNSSEC zone signer <tt>ldns-signzone</tt> and all other tools and examples included with the ldns software.</t>
      <t>Wouter Petri has built a proof of concept support for IDELEG in the NSD authoritative name server software as part of a research project for the Security and Network Engineering master program of the University of Amsterdam <xref target="WPETRI"/>.
The source code of his implementation is available on github <xref target="IDELEG4NSD"/>.</t>
      <t>Wouter's implementation is serving the <tt>ideleg.net.</tt> domain, containing a variety of different IDELEG delegations, for evaluation purposes.
We are planning to provide information about the deployment, including what software to evaluate these delegations, at <eref target="http://ideleg.net/">http://ideleg.net/</eref>, hopefully before the <eref target="https://datatracker.ietf.org/meeting/122/proceedings">IETF 122 in Bangkok</eref>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Deleg moves the location of  referral information to a unique  location that currently exists. However, as this is a new approach, thought must be given to usage.   There must be some checks to ensure that the registering a <tt>_deleg</tt> subdomain happens at the time the domain is provisioned. The same care needs to be addressed when a domain is de-provisioned that the <tt>_deleg</tt> is removed.  This is similar to what happens to A/AAAA glue records for NS records deployed in parent zones.</t>
      <t>While the recommendation is to deploy DNSSEC with deleg, it is not mandatory.  However, using deleg with unsigned zones can create possibilities of domain hijackings. This could  be hard to detect when not speaking directly to the authoritative name server.
This risk of domain hijacking is not expected to increase significantly compared to the situation without deleg.</t>
      <t>There are bound to be other considerations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="deleg-rr-type">
        <name>IDELEG RR type</name>
        <t>IANA is requested to update the "Resource Record (RR) TYPEs" registry under the "Domain Name System (DNS) Parameters" registry group as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">TYPE</th>
              <th align="left">Value</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">IDELEG</td>
              <td align="left">TBD</td>
              <td align="left">Delegation</td>
              <td align="left">[this document]</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="node-name">
        <name>_deleg Node Name</name>
        <t>Per <xref target="RFC8552"/>, IANA is requested to add the following entry to the DNS "Underscored and Globally Scoped DNS Node Names" registry:</t>
        <table>
          <name>Entry in the Underscored and Globally Scoped DNS Node Names registry</name>
          <thead>
            <tr>
              <th align="left">RR Type</th>
              <th align="left">_NODE NAME</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">IDELEG</td>
              <td align="left">_deleg</td>
              <td align="left">[this document]</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <referencegroup anchor="STD13" target="https://www.rfc-editor.org/info/std13">
          <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1034">
            <front>
              <title>Domain names - concepts and facilities</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1034"/>
            <seriesInfo name="DOI" value="10.17487/RFC1034"/>
          </reference>
          <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035">
            <front>
              <title>Domain names - implementation and specification</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1035"/>
            <seriesInfo name="DOI" value="10.17487/RFC1035"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC6672">
          <front>
            <title>DNAME Redirection in the DNS</title>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <author fullname="W. Wijngaards" initials="W." surname="Wijngaards"/>
            <date month="June" year="2012"/>
            <abstract>
              <t>The DNAME record provides redirection for a subtree of the domain name tree in the DNS. That is, all names that end with a particular suffix are redirected to another part of the DNS. This document obsoletes the original specification in RFC 2672 as well as updates the document on representing IPv6 addresses in DNS (RFC 3363). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6672"/>
          <seriesInfo name="DOI" value="10.17487/RFC6672"/>
        </reference>
        <reference anchor="RFC9156">
          <front>
            <title>DNS Query Name Minimisation to Improve Privacy</title>
            <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer"/>
            <author fullname="R. Dolmans" initials="R." surname="Dolmans"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="November" year="2021"/>
            <abstract>
              <t>This document describes a technique called "QNAME minimisation" to improve DNS privacy, where the DNS resolver no longer always sends the full original QNAME and original QTYPE to the upstream name server. This document obsoletes RFC 7816.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9156"/>
          <seriesInfo name="DOI" value="10.17487/RFC9156"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8767">
          <front>
            <title>Serving Stale Data to Improve DNS Resiliency</title>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="P. Sood" initials="P." surname="Sood"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>This document defines a method (serve-stale) for recursive resolvers to use stale DNS data to avoid outages when authoritative nameservers cannot be reached to refresh expired data. One of the motivations for serve-stale is to make the DNS more resilient to DoS attacks and thereby make them less attractive as an attack vector. This document updates the definitions of TTL from RFCs 1034 and 1035 so that data can be kept in the cache beyond the TTL expiry; it also updates RFC 2181 by interpreting values with the high-order bit set as being positive, rather than 0, and suggests a cap of 7 days.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8767"/>
          <seriesInfo name="DOI" value="10.17487/RFC8767"/>
        </reference>
        <reference anchor="RFC3597">
          <front>
            <title>Handling of Unknown DNS Resource Record (RR) Types</title>
            <author fullname="A. Gustafsson" initials="A." surname="Gustafsson"/>
            <date month="September" year="2003"/>
            <abstract>
              <t>Extending the Domain Name System (DNS) with new Resource Record (RR) types currently requires changes to name server software. This document specifies the changes necessary to allow future DNS implementations to handle new RR types transparently. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3597"/>
          <seriesInfo name="DOI" value="10.17487/RFC3597"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IDELEG4UNBOUND" target="https://github.com/NLnetLabs/unbound/tree/ideleg">
          <front>
            <title>A proof of concept implementation of incremental deleg</title>
            <author initials="J." surname="van Zutphen" fullname="Jesse van Zutphen">
              <organization/>
            </author>
            <author initials="P." surname="Homburg" fullname="Philip Homburg">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="JZUTPHEN" target="https://nlnetlabs.nl/downloads/publications/extensible-deleg-in-resolvers_2024-07-08.pdf">
          <front>
            <title>Extensible delegations in DNS Recursive resolvers</title>
            <author initials="J." surname="van Zutphen" fullname="Jesse van Zutphen">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IDELEG4NSD" target="https://github.com/WP-Official/nsd">
          <front>
            <title>A proof of concept support for IDELEG in the NSD authoritative name server software</title>
            <author initials="W." surname="Petri" fullname="Wouter Petri">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WPETRI" target="https://nlnetlabs.nl/downloads/publications/extensible-delegations-in-authoritative-nameservers_2025-02-09.pdf">
          <front>
            <title>Extensible delegations in authoritative nameservers</title>
            <author initials="W." surname="Petri" fullname="Wouter Petri">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IDELEG4LDNS" target="https://github.com/NLnetLabs/ldns/tree/features/ideleg">
          <front>
            <title>A proof of concept support for IDELEG in the ldns DNS library and tools</title>
            <author initials="W." surname="Toorop" fullname="Willem Toorop">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="20" month="March" year="2025"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-24"/>
        </reference>
        <reference anchor="I-D.wesplaap-deleg">
          <front>
            <title>Extensible Delegation for DNS</title>
            <author fullname="Tim April" initials="T." surname="April">
              <organization>Google, LLC</organization>
            </author>
            <author fullname="Petr Špaček" initials="P." surname="Špaček">
              <organization>ISC</organization>
            </author>
            <author fullname="Ralf Weber" initials="R." surname="Weber">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="David C Lawrence" initials="" surname="Lawrence">
              <organization>Salesforce</organization>
            </author>
            <date day="18" month="February" year="2025"/>
            <abstract>
              <t>   A delegation in the Domain Name System (DNS) is a mechanism that
   enables efficient and distributed management of the DNS namespace.
   It involves delegating authority over subdomains to specific DNS
   servers via NS records, allowing for a hierarchical structure and
   distributing the responsibility for maintaining DNS records.

   An NS record contains the hostname of the nameserver for the
   delegated namespace.  Any facilities of that nameserver must be
   discovered through other mechanisms.  This document proposes a new
   extensible DNS record type, DELEG, for delegation the authority for a
   domain.  Future documents then can use this mechanism to use
   additional information about the delegated namespace and the
   capabilities of authoritative nameservers for the delegated
   namespace.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wesplaap-deleg-02"/>
        </reference>
        <reference anchor="I-D.ietf-dnsop-ns-revalidation">
          <front>
            <title>Delegation Revalidation by DNS Resolvers</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Paul A. Vixie" initials="P. A." surname="Vixie">
              <organization>SIE Europe, U.G.</organization>
            </author>
            <author fullname="Willem Toorop" initials="W." surname="Toorop">
              <organization>NLnet Labs</organization>
            </author>
            <date day="27" month="February" year="2025"/>
            <abstract>
              <t>   This document recommends improved DNS resolver behavior with respect
   to the processing of Name Server (NS) resource record (RR) sets
   (RRsets) during iterative resolution.  When following a referral
   response from an authoritative server to a child zone, DNS resolvers
   should explicitly query the authoritative NS RRset at the apex of the
   child zone and cache this in preference to the NS RRset on the parent
   side of the zone cut.  The (A and AAAA) address RRsets in the
   additional section from referral responses and authoritative NS
   answers for the names of the NS RRset, should similarly be re-queried
   and used to replace the entries with the lower trustworthiness
   ranking in cache.  Resolvers should also periodically revalidate the
   delegation by re-querying the parent zone at the expiration of the
   TTL of either the parent or child NS RRset, whichever comes first.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-ns-revalidation-09"/>
        </reference>
        <referencegroup anchor="BCP219" target="https://www.rfc-editor.org/info/bcp219">
          <reference anchor="RFC9499" target="https://www.rfc-editor.org/info/rfc9499">
            <front>
              <title>DNS Terminology</title>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
              <date month="March" year="2024"/>
              <abstract>
                <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
                <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="219"/>
            <seriesInfo name="RFC" value="9499"/>
            <seriesInfo name="DOI" value="10.17487/RFC9499"/>
          </reference>
        </referencegroup>
        <reference anchor="I-D.ietf-deleg-requirements-02">
          <front>
            <title>Problem Statement and Requirements for an Improved DNS Delegation Mechanism abbrev: DNS DELEG Requirements</title>
            <author fullname="David C Lawrence" initials="" surname="Lawrence">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Edward Lewis" initials="E." surname="Lewis">
         </author>
            <author fullname="Jim Reid" initials="J." surname="Reid">
         </author>
            <author fullname="Tim Wicinski" initials="T." surname="Wicinski">
              <organization>Cox Communications</organization>
            </author>
            <date day="12" month="October" year="2024"/>
            <abstract>
              <t>   Authoritative control of parts of the Domain Name System namespace
   are indicated with a special record type, the NS record, that can
   only indicate the name of the server which a client resolver should
   contact for more information.  Any other features of that server must
   then be discovered through other mechanisms.  This draft considers
   the limitations of the current system, benefits that could be gained
   by changing it, and what requirements constrain an updated design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-deleg-requirements-02"/>
        </reference>
        <reference anchor="I-D.homburg-deleg-incremental-dnssec">
          <front>
            <title>Incrementally Deployable DNSSEC Delegation</title>
            <author fullname="Philip Homburg" initials="P." surname="Homburg">
              <organization>NLnet Labs</organization>
            </author>
            <author fullname="Willem Toorop" initials="W." surname="Toorop">
              <organization>NLnet Labs</organization>
            </author>
            <date day="16" month="January" year="2025"/>
            <abstract>
              <t>   This document proposes a DNSSEC delegation mechanism that complements
   [I-D.homburg-deleg-incremental-deleg].  In addition this mechanism
   simplifies multi-signer setups by removing the need to coordinate for
   signers during key rollovers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-homburg-deleg-incremental-dnssec-00"/>
        </reference>
        <reference anchor="I-D.homburg-deleg-incremental-deleg-00">
          <front>
            <title>Incrementally Deployable Extensible Delegation for DNS</title>
            <author fullname="Philip Homburg" initials="P." surname="Homburg">
              <organization>NLnet Labs</organization>
            </author>
            <author fullname="Jesse van Zutphen" initials="J." surname="van Zutphen">
              <organization>University of Amsterdam</organization>
            </author>
            <author fullname="Willem Toorop" initials="W." surname="Toorop">
              <organization>NLnet Labs</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document proposes a mechanism for extensible delegations in the
   DNS.  The mechanism realizes delegations with SVCB resource record
   sets placed below a _deleg label in the apex of the delegating zone.
   This authoritative delegation point can be aliased to other names
   using CNAME and DNAME.  The mechanism inherits extensibility from
   SVCB.

   Support in recursive resolvers suffices for the mechanism to be fully
   functional.  The number of subsequent interactions between the
   recursive resolver and the authoritative name servers is comparable
   with those for DNS Query Name Minimisation.  Additionally, but not
   required, support in the authoritative name servers enables optimized
   behavior with reduced (simultaneous) queries.  None, mixed or full
   deployment of the mechanism on authoritative name servers are all
   fully functional, allowing for the mechanism to be incrementally
   deployed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-homburg-deleg-incremental-deleg-00"/>
        </reference>
        <reference anchor="RFC8552">
          <front>
            <title>Scoped Interpretation of DNS Resource Records through "Underscored" Naming of Attribute Leaves</title>
            <author fullname="D. Crocker" initials="D." surname="Crocker"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Formally, any DNS Resource Record (RR) may occur under any domain name. However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies. The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., "_name"). The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch. This specification explores the nature of this DNS usage and defines the "Underscored and Globally Scoped DNS Node Names" registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="222"/>
          <seriesInfo name="RFC" value="8552"/>
          <seriesInfo name="DOI" value="10.17487/RFC8552"/>
        </reference>
        <reference anchor="I-D.tapril-ns2">
          <front>
            <title>Parameterized Nameserver Delegation with NS2 and NS2T</title>
            <author fullname="Tim April" initials="T." surname="April">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="13" month="July" year="2020"/>
            <abstract>
              <t>   Within the DNS, there is no mechanism for authoritative servers to
   advertise which transport methods they are capable of.  If secure
   transport methods are adopted by authoritative operators, transport
   signaling would be required to negotiate how authoritative servers
   would be contacted by resolvers.  This document provides two new
   Resource Record Types, NS2 and NS2T, to facilitate this negotiation
   by allowing zone owners to signal how the authoritative nameserver(s)
   for their zone(s) may accept queries.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tapril-ns2-01"/>
        </reference>
      </references>
    </references>
    <?line 858?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The idea to utilize SVCB based RRs to signal capabilities was first proposed by Tim April in <xref target="I-D.tapril-ns2"/>.</t>
      <t>The idea to utilize SVCB for IDELEG delegations (and also the idea described in this document) emerged from the DNS Hackathon at the IETF 118.
The following participants contributed to this brainstorm session: Vandan Adhvaryu, Roy Arends, David Blacka, Manu Bretelle, Vladimír Čunát, Klaus Darilion, Peter van Dijk, Christian Elmerot, Bob Halley, Philip Homburg, Shumon Huque, Shane Kerr, David C Lawrence, Edward Lewis, George Michaelson, Erik Nygren, Libor Peltan, Ben Schwartz, Petr Špaček, Jan Včelák and Ralf Weber</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+192XYcx5Xge35FNDjnCOBUFXaQgrUYJCARNglAKNBsyfYx
syqzUGlkZZZyIQhRnC+Y+YfuD5ifGPf819wttlywULLbp8/gyCZQlRlx48aN
u98bw+EwePToUfBIHWdVXGRxNTwswlmlXoXFVZRfZ+oiXizTsIoDfOg8zsJF
rKp5UqpZksZqVuQLFeEbwyqP8uFNXhf4yHBZ5FU+zdPRIlJVri7jSpVVWFRx
NIJxeA4aa5YXi7BSMOAKj/OFHuOr4RfXeXF1WeT1En6nj2C4lRGB8k1eqCRL
qiRMVRlX9XKg4EWVZ+mNyuKYZo2jpAJgYZKkKCs1SfPplcpn8GecRiUCcoqP
r1RJlcYr9FqJ701iNZ2H2WUc/UZFcRpXsVoJJ5MifreikhnOUyh6B8Eu53lR
4VgH2Y3KYbZCTXNAZlapaZjhWAhGHA3UpK5o6LCIZ3WqsrzCyZKsKvKonsJz
RZEXBNY4R8wQlOo6SVN8DRapwrrKAVvJNEwB7qgukuySV49wwdw3CgZXdSbg
M6oO8+wzwHA2TesIVjLc2FhRgL2VIe5rWcGaMsFSSvuLELwMJ3Famm9gk9Q9
tkdGZCBK2ITJDYyFI1R5nhJuYe2AIfgFP53WRYGIehcXZZJnv4G1AIBRPsXR
VnBaFb8PgQBjXskFEl4lFIkzlOqqCBdIqMNiNt1X86palvvr65dJNa8no2m+
WJ+Gk3zdfQrG+R4oBTeniGGkaUywABxJwUiQTVZLBjZUUTKDXxBSJlfE0HNC
sUEcAAp7jqvAxcEz07lBHdD36uj9IqUF/eurlwMVV9PRaLSGi4LTR7S0r1aO
eIgJjHYIZHcJOw3D4UuHJ+OVgEkQnkOavFwJpoCEy7y42YejFQWBoG1fNmqe
LyZ1cTmkh2HPg7KeLJISIaxulvDY8dHFN0o9UmFa5jBokkXxMob/y6qVgVpB
os0LOF34x/HBM/gHaeb4/OKblSCrF5O42A+A0EuAuC73VVXUcQDAbQew+eE+
knVg6GMfF+CsKbiKb+DLaD9QwwbnwU/gYfznPC7zFEiDPrLvwl8HdQWnLqng
g3cxf71M85sQMId/WTwG7+KsjmEaJXAQNuBPRsEbABCP0Lf4JXy6CJMUnol+
m8TVbJQX+GRYTOeWsPAJ/ATmHemH1vGD9UmRX5fxehSt42xEf/vq5CUsDM5S
uQ7Hr4gXgNww5S0JgpBWgTiAN5QCnpDyBp7NkzRZqhe8g/QlTBNmyU+EARkW
z2hJX8YM95Je+22WwpcpfDfK0vbYF8lCvUmmSVZeJR0jP8/fw/8WizoDJoMf
eTNUf72mVf/2Ev/G49We4HdxWcbqHZyuH+pqOY+zjlleZwkd+eoG2fHBogQK
iMKFOxUNM4JhZJTf5uV254LeAH+MF+oiz4t8eW9cXdNbPq6CjM4qgLYfBEk2
s3/hi8eHRy+Pvt15ffLs9PXJIX+GPyDVQLp1sh67+3U2yessWq+KOF5PNBHK
AHL6D4Df5IAO+A/O1TReAs9G1kdEQ5wAvnHISAkb0OMYcjI/Q+d3pW7bHv0D
ZAGPjHq+7xqvg1a9wc5G3ne/++H1xdmLo5N+/Llbso48O83DqFxf1pNUk+R6
bA64sLcEOLtwi/IvWxtbO8ONJ8ONp6NlNGvh2eGykeEqJOqQSZ3HIJRK2HVl
BvzHoFjo62R8P9p6czY8nc3gIIfpelZG96Gmsl4uQVchgcKzafkOk8rahKey
blbGBaxflfmsugau/lA8vMlrONfqLK6KpI2CNyPnmzdnRxfnx78uUfDHSBre
0oYIHK+MSGV3uLE13Pj8gaTSxpYM+XdEklDISyDTB7KfNAL8EO+ZxWFVA2U/
gAn1kw0OS4cmTSZFWIDymUWs6T0YCy0m3kSDfBUMh0MFS6qKcFoFASmEoPjU
yBIR9GWOSmGoFjGqwEm5ECWybx9xGbCCEYwUOy+BCpMmP8FI7uPXgFriCnUx
RfYwBQ0Gte9SkRYJ2m6c5tcw+du/0GtvVYpatJ4mXMbvEa/4ux4WdI+f8iwe
8UJ8orJTq2WeWHMCIAtLNnDY3CDqA20YR3t+cvDqiPbhEH8b9WMoi69p75oL
Qs1oIBs9UNfzBBRZGGJCc+a8lPEfnj+jSZIMAEgAAxrDIAxAqJNZmICaHIyF
eBJUtlucFWgLeRjAg7tUeVvAdhjKeRgPLBpERJjyRrH+icgEpbaMf6xxbQnq
keGU92oSV9dxzNC2J2ZCxT3pY3olrhkO0TIsUKvkvYdny1jr4+q7OgaSP8F3
XoElCro1bdYoOIhAdyZo0xu2+tDUKwBMMDDADiwtTu6AAcwxmLxU+bKC8X8i
EpuH7xKAQIgRDcdIrZbJok6rMIvzulxTgI8iicGSPAHaGqhF8h63riBkAlmh
qkzUIMRocZ53MTYDDVp1sKbWngzw0/waya9vGx21BQ1XAsGSU/+cIz7wiySK
QJlnNwVZy2QJNIg7istpkUyIup3D47MCOvBgRAPyaevGN6B8LtQq7Oia+vDh
X8YXh5vbHz/Cc2C1hVFUoDAHQo0BHNC5QCOsEBf4Nayb3QuwOTEi8xrWAFgY
EKaAMmnbaMWy5bwNSA32A5wmZboG4tLj4wgxsI+8CPGhegkLAZDLWOj7w4cv
yuQSkA/zffw4wL9BkNBJpk+IwuFD4NDwDrlj+NWPH0fBcYYrIxodNLZL4zBi
6nTRG5ZLoF/tIFmE72VtkbG9HHbRAfuHD/pJYhIICFi/aqyXAfxtyd8lSPKz
uw7Hh0cWA0FwQAxN5FOTp62en68RY0PQjMOlvcYufuexOQTpGt0E+OkSpjG6
udj5xPmIPQItnX/z/POdvQ1c6QGcmzEADsxOPQNTG9f7Klwu4d8S6AWESwxP
hDyDQQQQDi0xJapikkTSWsbTZJbwAsw8m7jrdETLHITNEjUjZF2wX4abMxdD
ZwWKdrEpSJQDf6lEzsGnByhjXuWRxmDJM42ZhtQevuYu73kXxPgQQ/fk6e5T
OmIqR+57UYRZSSzwZXiDyo84C9dgBauH+cXaQN57uvN0h9/7jlkav//i4uJs
vGaInADZ2t1wZjiMI9QLAUPfvT5+DhZtlsnJWcPTAkuI4lkILBPPY5iiA4Ip
DKGCDUFRG7LfjfxYsDG9SGeRJJR3fi50pimmRzgaKSovOJQHRxBQyAJ+Eru6
C3xglLEa1Th2ga2WNbwJIF7FNyxJY2C3N0tSL3Cii5dj9TxNgFZfAJXlAP3X
x8NDsuSHVVoO4zJLYB1rdB4fnwCr0A46WKQ6Ik/Q433QcmI4FEARC8AxHxwS
v0wTkxhmBgRalXwUsLDGQ6sVRxCqKETJSRa+y5MI1cxZTX4zok6B7TouQakK
l6zKa15xalkcyERgyC4JOyz/wyOXGQaB400zdj3+DguApQkTbsq+NJ/qV2h8
VNT0CYI3Dc8cBS9h8OkNfAKvR+LljIBLTCt+1J0T152x3qYnGADVlbzDdRbF
LKPQh1zkKS5OP88rzgvUIHjDV1ndswdze7Q32sJ3YOM2N7Z3Pn5cs8qgUO3e
3pMtODtFTELQVa1OM5y3TiMF0g7wKjhkqe+g16AeBOKSVK5p7C4MlCagc0JV
KFMLIxaB31CQ83soyI5WpYkz9dA+aEj98AZPj1kDHaeQvOg0RQLQIJzIVCY3
CrUqmOv8nDidYX+j4HWWJld8VrVWzOoOn7QF0jww5gzHhhFSlxO4I5HRmNkv
AZAB63dEzA5he8tAXzKwqWSJpovxQmtKKPlYANsbHz1XVsh3Hom2KhAEb3CP
BI+OqTMQrwDDqdUcQBdOXoLpSGTpDu9IsMu0tmJDq1xsoxh3gx4YkIfakH/w
kGDxU1kWc0MQoai1oORHS5NkIZpMmi8ucwKJPPaoqIFsXqJ3WvPyis5V4zDi
TOaoIpGDWYkGiQHb3wkYPr+sfecInljEJ0KI3M6CiPPCGGC9xUB/tDCYQXRz
M4OeHgiUGMzqWZG8w+0g87vI+Pwy/Ph+nYl0QOIlNUmv1BEEs7qgg6ixUTri
JQQ9BOwhlER6CqCiThKKutkm6D3AHiqjBKOCxIoLRd+Ag6AltgBhUfPhqFgn
wXAAzH8JbKcEGs6GyxA5RFWF0yvS9Q961Gkz9DUcatgHBnb4DnS/CANBCAFg
PZl5RCyaNZD3OyeUhSrCPIHjU0znNwQ3cmszlPu+Kybh8OTLYVYOzbOkS7ti
G3cvnFXCv2chkhQANof9YLZYNvAOG2Y59xNc8Z3z0VYxufZszips4Ts4oRh7
c7gNLl/0T+RGazocyPsGIrniE3q32t1xNJzDf3zmGE38KNrMZoJRMIaZOWzW
I4rdqWHPZd8aAmEAipUJjQo9yMHgSCifJhxW2MebeZw1AYevrYAY8GlNqs9K
fQ5gtGv9Go5HXwB2tWJFrhj8o2FwlOoxbP1j5z3Enn6LXXYW1+TPsea1txpm
8K/Q2AL7X5ECRifTGPHA2D2z6j7aTgPFKKm70YwuBIB9EWYg4yUoXpKZAscZ
DzavjkD3SAa3nh4Ayg2Zz8dxRGwcWRAFDtFtM4WdjN8nJc2IZ1M7m62Sc5tH
glQbIyUoGm7e5wAvKTl1tsgjUt5RoOvf7+HyZhKjD1u046CWiIQ5e4RL92ah
jSwkkI9/3DZS3zZQokKPM4vzFni+qRFWsxy1FCsCEJUub+gHgtx2iHs7xTVr
he/RqEwqAOVHcn61eQFMEy0SUIuBD3baTfbRoX6yCLVjwvftFRgyA5GcLEtr
NHWsX9TB/t30XXmadOFTpsm7PHra2tvc3SNT3iqijfjcXQ4948crGfjaVULq
qTBjx7npePVwcFxBmsZWiaCVw1JoPbxHk9hdVVu1+6/hFDzuRLylDdH+U5BD
MDCwL2LZ2oG/JMssV6vhIkflm6QzssDLck3zEyt1YaBpCIY2TlGQSMlyk2K0
CK9i40wDijCOFY9Ltnz7d2vUzPgvQI9KsjzNL2/YmAYTH/UoOO8rr16PLzA5
A/9VJ6f0+/nRd6+Pz48O8ffxi4OXL80vgTwxfnH6+uWh/c2++fz01aujk0N+
GT5V3kfByquD71dY21s5Pbs4Pj05eLnS4SUsYrO9wANAVyQnZxl4nsVnz8/+
z79t7sjJ2trc/BwsUvH5bD4Bs5VYKs/Gmh/9iRlOQbhcxmFB9hTQ3TRcAlJT
dqKVc0xZw20C9D3+I2Lmz/vqi8l0ubnzlXyAC/Y+1DjzPiSctT9pvcxI7Pio
YxqDTe/zBqZ9eA++9/7WeHc+/OJrMCBjNdx8+vVXQdMjzjIAU6YMGSGaoniW
ZJohfw17sYX4J3cN8NzLOehEjV29FklIejydBWdE41UElZ9ksDMFhcT2g+DD
vnpXLsNp/OXKxspHVlH2g3114UshyyKaksODBzkAq7b2XRztoKGV9o8QaKeN
wxo1PGhleBINSJq0e8eEAKFlgzwtnOoowsgqYyLJ9Rw/yXhsPrTVUleKjgJF
GYFoF5W8BZgAGHMIa0WYCI640sFFxvWkNbG2nuVBZmVGxLZ9L84iKF4rYxFT
5hWYgKm/FAT9OOvxMCAnxRHEeCzxd/GA0+ciiUpeADPTDmyRhlPiTIfOpt0W
yEA3pdaExEtlfSuS4Ro6Tr8udNHKZlrWXjvemQTtSFCwHG1pKg5xsFladCtr
7ZDVipMxGfuscRGRZ2ZoRw1zHUtavET+tiFyyZvtPO9pBq7lQCFnvdFNV2iD
QpA7F6wgo6np4ZdwR1KyXj6QOIQuGkLS7Mq0tga2oZ/MISIhHJyG/Fw0gz+2
Wdhlgh5PUYsbuBH0/Xo7zuH8zi2nr5ATF8nlZUz5vWbjcSd4w/PMHDurRnap
xrDMa85xxDHJ7myzIbbV9MnyFRVRuXTwyY6M/ulwClYsvIkZsxW5hHXw0xsE
VRnlxEi6Mg7AjIXJJZtLPzDkB4b4wMegM8yCxuS7sEhC1lxbkTdaHAosk7zB
iQfATJZxQXnNArpGG2PT8czsjrZH275P3Qv5ECAS3UfF/tKYNPq4rJzrFZ87
8ciL78+OyhX9wo3j+1/pDVCfgQUAggDzjOyLlNqqVjF3WuyrYVEQ0tSqj681
A7vOzx+KiJzCGaVopJaZUxPW7EQQn3KfbevkiBUUkGNJh2qEygKL163RDscq
nN0qK0wgZ2KT8Bgl2IhORargPEQFWnvbG272gaR2IMOeWde5dcNbBkXB24Ga
UmCsxOPYlaEiMy8TLB3ISHMvYIp8MQoObVa4ifqudqzPLG+tM4LQDSPr0AIl
Kbut+AJgBq25Ct1r1zFZwnOdkcBHnYJHvQEJ9J84WDZ22kqUwb6VEq0mOgqj
OTMjNvPE4u4JaBt7eqxtxFujpw2S2LyFJMRR5YFNhiahTLaK6MNQ5qJFFPA2
r5dYWIKkrDmRT0liUiZLJBBFtkNymeUU/b9xvalukJwmxo3poA5tdbuvImRt
6iT6YGQ1gkbiyAzvHMpTCDAjIxPHPLt/LCvXCxXGzrUySO8lEbyIXB/GnIMR
7uzw8QDFKBkA7e8UMEiwj6/j5HKOuSQqDkHgCEm7gzueWoCJQvQz3rvpPEdq
Y7p1XxHPLT2EVF6K4YOGpyR68VAIWxMvRYwe9jqsPCdx/9Rdy6bpjRcVnsex
PazSAdIeG3Nyzookp4gAQkBBTl9xM7rCqlMKo95O67ICe6AYcRh1pGtk3q4N
jDtfPdSfL9oSy29Wh4ScWW8gYXR+eHBxwJVJOLQR6Ib8HdSMgjPMVDgD/Tx5
j7IMse+Eqi1rxMwVcqtUkm3RjQXOpaNzqPMyyPHKSPZ88jEoDbm/TlIA/ICI
E+bFMinHdPQ8kwGGHttaHNEOWT3airAntSHvkRxWieLWfO1EZ4wSeyRTUm/H
si4wUxMXhwuIJFRubG1am4mjC8buSDFtBd7Lab4Um814a7ycisYGs6vyNk3n
NSoxMGwhZ+/bNJ/QusY4FXnr1QmeGyQnV4kR9SWD7yhDW63+iWG1j1vthXyW
CLxkGflJvU5gK+UyNpM59fgxYfwxh2Ya2GBekWPMuMqB4tEr6OO7jdqINLWB
Z+F8ivH6jT3fAx3BalpZQHBvzVEXptNMFtDzWR5h3vAIliRAl83IdNXLYfRG
O06HUXAgakHJe9w0O01Y+hbGxcBhqEKcERLB7shCFB2lwRxW4Axz5pKI+f5Q
H3GK3CpUOpsCywFZ3xLJ29K4KOoIIzn+ulZNo7v7euTPSh/X4nTg7J28FRBi
no9R8jiM2KXTo8NZdrq50VSm2YN8xCgu8Q+sd/UDEk7kTygnCP4H/AT/7fT8
+NvjE1t++VvV/IFv1fj0gJL4S6KERYgOKzUajQK905uy1fy4rGJTrcIrI/NM
0Bq7+ZMs3+0AoNWXm58/He1ujjY3Nkabg62N7RH8u7k9ut8QezTE1sbG5n40
ebq/ub+PY8hfW/DXXaOsIXLQl/kIlzvU2MPaiS9X7sbtykfehYvrDtnU3Aac
r7UL+OEDdwI/1Zje6t6NrNw0m7EFe9OJ7bsxfF+cP3yktZ5XGqvY6l7Fg8jk
Pou4D6l0LUITTtmgnHvQgyadUz+fLTMs5hMJ5nZ62fbohdnVX8A6HMF/euJN
WpZNoxhO2YMqh8LCS0yPxsDFHFvu5lSuSK6Pw6g5H5Gc3mTYTbCqI5xiPDdN
ynmH7uVy2FtT8liXwPzT5LIudKwPFTIUFjbHESQb6jygo6MAEjbPyPBfDic5
eruOu2QE+qAMx+cSlIdD7LoX2gx/beRIwObwrGjwLI5CT3KQ8i7Elndtc53d
pPNs0jy/ooR+2bIH6Pesu2vInktO6ExccST/2Oflik/xYjguCi0TV0Fa0yBr
AiIGfMUx9BYp9C0V7yfvR38fRrrdxUg31G3Honw3nfSdCs+eNdu2Ij5Po584
iOBj4VqFE6xadtdqIBn90lXLkW++gtAoYrzAbcN0mX053xpEeTWYb8M/P96b
QzriZgsY9dYD2HSbN28/hDdH+RxzEL9c//HD17DGj/d88TZxJFjZYqy0lrb1
y5Z239cZQm/LDIQH8IMQ3gNjPY/3QUGP8693bWXHo1t8YoRqh2w2yXnRJ8AV
hX7W3536lKPVPlSZ7Qb//Hx8/C2/1f8QAPn7o+/V1u4TYIibu3cPJy/0Pwe8
mqH0j3XvgPD8bYMdPVeWre1qtobOW1gXD0EPMVx3TQUP4mRBa8CmqmY0tV3D
OebbavVBWlWXmrr70BEaZ2z3oaqdYSHAP4YUnXsQK+GfLobi4FXwdu9tfKKx
7uwfj/HQ/XvSoQC2qOX2Qfml+5OgvGBBfzDNNYanX12KCzzyM08adnQrMXWx
RCKa7ukPefrNJzsbu3j+t+7BAR5wYPdwfYfjX4CtvTuwtedia6+Frdttqy5k
7bnI8mcXZP2qGHryizH05A4M9VHJr7kazeo/dTHabSE1QK5s9cUon3YtZt/a
o+65Eb28IY5ROWWKmD+FvlTz9l7f2xTPJU+bZELAqyM76xP73mdljzOPYTBw
es9JAaLzIhenljZQeksKOFdaluowfzHqxMSge4W0dOfP7rT+i7muWyAYMItE
Qu7TOdpBaZJdSdqzMxgstXtPTJ82PShYplikw1mpuCPGky073TEOkNZbY2ix
h9xOIa5eMMR71g2bgkA7yWTO272z7z1kdse+neQwYCcuekmP7MN2tpFX3yml
LNqITxZIAyGb/RJYxqhMxyiUDJxQRNlrmSKPmowCSaWJcrcPAI80CtySN5t8
gNUSVVFPmWRt9RwslIrtdMyonU5kcvr8EDKGuyjDvZXD/vfo2PHhgxnIdGka
6kYWGOGX3AD27E/CMpnCibnEYznnpg02wteVtnaMGQXsuZ/G6Gogtxhl2ht2
YR37kkiQppJ0r/yc+1WdZG/aaKjYj85RzPFOvsHlNjhNGk6pyZyEopEdYA0/
fbfATAKuoXGpQjITupP0Hj1ymlTpHnm2MciHR7dhO8D6Gywd1D6WZZHDbpZc
eNqRQRblcUlhjzQOsWTNpvrReaG2ZiGhCVflZMiyF7CI0SEm7pxGTpvJ/gzT
Ig6jG3WVYfo2k5Ebzgyl5IsiXpkNDrVCJrCYCSf6A251iv5EsneZYHXS6SoY
hn+VOgAKcl+8lMJgr0QUC+5OcbLrpJSUkNYysFsEuQ0dnxUzE4SfyiOJHOqM
FwgorOaS6tWDk6qM05lOUtQuMS/WJ8YwUT8BPcXSsOo6b1eJ6Ih5SZnTp5ll
GO2l8P5RnaUkvfqCpLteWK2yF26qS1D+Cuy3ewbMHFELrq6B/eEP3QKbNZ31
H6vHkc18fcxz8/OUk8SHw5XxDbIybJPjnVh1CVpHFpq+CJzqwsFfu4N0Omwm
VecGYc4p4GqaLxa6cUFj8wftPlA6F6XDxclb6QSBdQSzi9jeXl9fG+2zIfia
JNgKGFc9yOqPzRJYurS/GaPuhW8WTuu0uhnVptXjXZDe+sbtsOOEAvZto2CZ
MwUZbJcs29DMOmAdljjHYhOu5eH+FohFLJFANi2aCMkDTjhiNt/nvHdW7OSv
ctogZz/ckQKr0x+o/LrWHSAFGbbgnYuQHYhY1lHZMJ1WKmeiM9HCR1f+2EBS
rIGX204VoH8D9cflfhBsjtRBI9rgZwJxcL+qi0yn48cG3M8wq6S85vJo1n9Z
+OlD6mozfqoS+/a9rGCjzDEYXq6QrYnk+bkucqTHcIIiVLPKSU4y3L0mcGoX
/MYHxi+JlgrnTXekXcmZ0F4tFhzioCKmzom/nXN2lF17K9LOUKcVC2ba6bW3
VMpBc5tMnyDm/cKGifwxu1NyVI3o0TEdS58DpYuvNOw6JGRsgsOx6dcEK0Db
dXV7zUkuo5Y+TBbMnLE+N6RyvMPxmo8XsaA0Ed1maYWlDnOR9HLlXXpjtAfi
8XoYbSQEWyNbweQyJdSaSJOj2ma1evKvh6evDo5P1gzOTSVhO7GslzRazS1u
0fw1NoSZMamYElG7JHkTNTanmtqyQAB4+7ZF0gJ5KzlnUufOnJwenZ+fnuMS
5YAbqFcpnMvKEBZ4w7OUV6gfECwdt0luoKIk0smZSeY2/DBYozIQo89LBpgt
CZE4oxHw7rKQmmZ5YUWlpbB//m0CjDU0VZ0MJtWwtlcNfthUe9pVX3YLzEL8
zjtG8Djbrhdv8tOwLZuLY6ONLsPrDLkA9UrXB9VU9vj8poVSYtsP0ZccfSCc
PkBp0t9bM54xIVKK0hwt/8SNftsz1V0KmP9aSwsTVt3cij70egRli+EoRYFq
ZQFhCXNvkjpylYIzVO8htCzf6vHUs4f6EIQiZeulPrK0bF80hFXjqQ5CsRcf
YOov1liTjSoJEky+ggTsSJNgkXwTsX9XMvHyMc0TFicezsw2e8OK3UT88L7s
c62HkNjUpX0JU6xrdwWyMVEM2v0dZVyjRncfQjyzGnLucwjJOM/FFsU91Wao
3s9I/GwNomTPRsNk0l4d9eGRcfAEwcGEP5S52+12Q7NBoZqi40Icv5br0/dG
Smt/C3pjunwuHU3BlS3zRpxH9K7TCMDujO72xG4eW2zHTgHxeZCxXbUh6lif
k+vN5gBVyGAmdViYzjQGcd040oU0Tj0fNxdeEScF9gBg0OSaEluMJDdBuM4a
/Y0Y458AkEwfSUNbp92Hr396GmXSsqFtwx9XYRsFjx+f5I8fu/ujd8ZtTXPc
OZ7uuDWw/rIIG1uFrSLjWPrNRKx6cIdEsWqEXCaxqU0ZSTIoXpjSR/arpt0X
Uw8GTNYCW6biYrXdd7p0t9P52rxFl7UwB7Dw9SnzWfzeLTjGjwx0LspWrYVs
uyfJA42uLIaGtNP0L1Kja7tqJeW0LktdN9bu5D7k0YYygrGRHa5rvF12teJZ
a6OdbkCJTEsZcUA2y2RzHkvjcdDyTWFHcQIDn7NSBqlcogi3GNMXbcga9oST
32JVT9RDxMywx8axvK25l+XZkAa65UBqPYILNKhqzHT7qU3Rh+6yKoXTKyT8
6sVKs1AIv8SEkmbpb6Njzo0+Lijv0Ydot8JxNCMc6K6loiknlmd4GbornEzJ
HZ0m+fTJ3hMiEFEK6AQBG8jFL3cPtCSlgxHmCPaw9TFMtwqNIewSHquWO635
4sMaml1k0UkSZJCZAkdQItCnQQs/MKpFF5EwJcPzjqvD989YMurHFR27fzYK
0sj/rCTqsQTVRw+t9cWLJUyAZMLtT0IjjB9OJXdRCGGPaaNPqWgKoDvibNaS
vzcVsV2f+A3VG1TUZ6G1qco1lPq2zVKXjwndKqBbfyOeSh2bOtQ321nqbvLT
8AmNEIf5hZR0zznMoiRwkUSxlEI9fgxLxIq1/PZ1shQwXrb78ZVH6tTcLdAX
CUa0PeiSAhZ2JiI5caLf97u34F6C3okbz3NtOsq3ZCr2g8x02aZZli3t4LJe
CtVt0HUyDhjXuiH7DcFhl8o6bRbPkkortGgXdTbYYOvn4K6osm4Gc79l6iv/
HA+2m0Tjdg0Vmm06XbGhltbgPfG41nuCuSVtC7FAvY4Py+y0V/dIdON5gght
Hz44aUvS0sOLgTkZLAdvBzq4T1tsTV5u09mAa5/zgn/zGzX86qsXRweHR+df
fDEEUp7mUbyvvnt9dP79QBX8l3A8sDuifbW7s73zOb44S8PLcl/9WKjf8PP7
anOgDk7Gb47O99UG/Pr64sXp+fEFfLELfx0eHnMTr321he/DO2P8QAHq8d99
/LBndTbBC38OAnyUZ7Jv02d6Svtx32jbexsb7qCS3+YluNlM4/uOIrlvXing
Xe9IzprOh2tmmTax0Hzd1ha2cuI61+LkHbde6Mwsvm+28L0zgtcevEaNIich
mLbb0JTd7+41t4eUPE4/7fXeL3NuZyMTlqiabaEEL3faUAs4vfjpEV5dpW/7
VBvm8EQ5HJ46WsLR2dqmUzE+Ov8Dnh9dHLC7jZ++wZvj1Ct495t4orZ2YOL9
7b39rV2FF3nhE6/G36rx8Q9HCg7tOzimO7t7NvlRR1bFgcr5j9Izrs0bdPlN
h2aT2UY78hl2MHALz8UubgZF+3QebIrbjLB/Kjfc+0/ghtt7u092HsoNP/8U
brj3q3LD5mj34IZ7bW541yhd3PCudx7IDeHc7PiAU95wBzNspvY7I7XKBe7B
opoTa7hN6nHj+U+AtGPqvvoUAPiu+VoA3oOD7t2Hg7qp8Pd+t8lA9/4RDPSi
jpmB7qrNjf2t7f3d7V4G+mRnxzDQLB9iz95hNyM9b/FJ1Jaxlyg9j+z0BF2I
fgzRKqQDx8Hbq98yIys9ZRVdFdKVD12JcwpoNjMEuvTfnmgtsffutZIV/d0n
MuYn/wmM+XMUgA/ky08+hS8/+VX5cnO0T9NS7xqliy/f9U4PX+7gpp2vSwnV
g7jd2oNn0UDa2qtP1KbVP16f/v9q8a/C1Xd39zee9HL13c+3DVenhllttdhe
bdGjF7vJyDPVVbTDud3mtlJkcm47Xd1MmjxjXaUcclcIlXq4Dj0n05yyfUx2
+C1p+cSNLWRajtDY+KZuSQDwll4rsdbtfH7XBh2ocoJc7r0eErbyUCxXMLK6
P+W7P6yrVFpEFH1ZpJjMQ6ntOgt+OueNmtx4zslR8MW/DIfq4vTwdF8dRJHf
ZMDsqpbR8ftlmJlr2NxIwnD4lVwU5QcjB1K+5faYdGiCXEVyk5SHMrd3g6QE
OG0uH+BTaq+wJ/UqzHzQaUkc7O1Pw3OyLPrAp2AzENQN3khsOj12r6A/OSzh
3EaKE9ZJOadLKmikEINJWUMletfqrtvCgn3pAfjgupJmNQk77u8sdvnw6BYX
6cOclkQT/0Sey5Hkv/sooyKjO3TVaZjxxb+i4nldWfxqRqGfVX3VBCUuYsfZ
mb6XUNJWqUQzw0wt+MquaWBawNKGmfozTY/SQ1DH5+Vk687ZzXaF1LwbeQEW
6j3WJeAg3UyjE9Nqsp800PstWTcaHGL41JDZz2qQ7HcwDopwaMMIq0f4gRNX
8AMU3A4Qz3Erk6Z1l2NnYafkGlRSVSTXwDUvaOto2G4Li/pyJdqJnpJSd9CK
AetA4YMht8kVHcFPk5YlUqUr1MHEETav33NmHNgQ8q2ncOSkpHQeqy7ObNvv
NooHqEToece1kd298ykdiYNirkXYywD42vCp2zNKs3TdUbhy2sDesln4hOTz
336blL9vd4chMS7IT4W6f/zAKgbOKqn98X2jkxzN1UKbDw0mCvJyOPtNl+I5
QXsN5givktCXretT4iQyaJ7thRgHD41SD+zJiryT1cKaW2TLc3phd/NC774A
1fptN7vcuh0KjOx8X19/5KqIeLQKRoEXygaaxMzuX42KVkOqyyyrNbZB4MTl
GQi/VeLuwNPX+Obpsr1xOg23f767trZno5gld3MCc+T9VHRG6yKkcg1ponqb
PuY0TCNmizRcVoR0nXRShVd8yTDezom5GrFPPDaZyxPiPgl1EkhTlx+wDRE6
RVRNhtYvStiSIeT2p7IwEbmrXGB5pVmlPQB6FW5rXlOx5lxjpatdCXJpsQ8r
RxoaeGmofB296cKKxspIjAG/b4RYBA4aw6X0iGUVknxdbd2q067oGoXYFoms
nqi9ZFLfZorUGV0Idqf+06fzeIrRL1VaPPGCusvDulKI8sL3TIYdu8FlyXSj
Ayl/uiDD2Qi3wQBlG8cJWZRdSBy4kqetZLdbdvspi5Rc62gBbnKQVL63crG7
5D2r4roWLO/InJaCpLYIf3XwfVPZ6sjEsAN5rRlsbo3k1XSnZVEW/iwRW88B
fJXOqFbc+VJ4rbxTGs7tZAMGVoPQPrpdyUVv6kGaNE9v9clsXpyhPT5aj8hz
Xcqsuap7pRv2u4hDp5CqrfO6dtq9SjEP5LJNbETpVDzi8SaNzWmE2QXtmlun
2aszCjrMmuhKhxavb2iIuomm0S5keLBWo2lYRE4h1e2Xm+teBo55RBh0kmPs
8fSQhlgghi2HHCnysWadj5l37nt97u7Xvbnd786wP6We7u2gb9Prcvlft7vz
w/reageqpgGOFWkH6htNGW0KlDLgIk+tQkJd7OXOYeE86Gg9b9abfLK5SOUS
nVTdUZ19T9/IoK2Vi+GJCkbi3SHwD7dWbK8g0l3s/YUTX+fq0SeaSolbI0yu
W6yztNmnfJZT90ICI0HEqrvFEOG2Sp5ThH28MWZey31A2kzkRXXGNFnTYYXR
sCbr2tX4QrnNqs80zUvUKkEQ4W9gUiSjeKR52OgLZFtfobMH8EZ7QcVbVvRp
jSBphWA7s+nljuQhIpgQYNlmE5KRXGYJMmCeR3wdrkHxLULH5ZmDRiNmkrTf
EE61EfPhEeF4KH9LbMO2H3qI7cp9o7UEhzUGuLgUm45Mb3hTOiqQ5EKNiNsC
UfleZWMbGCtCG9oU3gStJZe6WxVRty0qEUjY5auw5givhTGV0W1QRsEL9iLK
JXkYasBuVlgVyHEKW3lN6ohdW3CRq3A6T2IqbknE72/cyMYd1XVDnb2PW1/c
U5paLC4lc6/9M56+VUfYakL1ioo4pR0pjSsy6G9dPenWf8XvAa6ua2rv2m8U
wbdnB1tdv3MluiUQgSQ1uHTI0hu/8Y6AG2gaGSnRpyn6UBQAoWkh1VSkOw4J
zhdUHqHTJRsZ3yLl9Fhy8VTK1at6M5cMpb5Eq3saJ7dBmWrf3AwMCMeaK77S
0PZF0ghyG6JFspeGOBoVf5VzIYqt86ITJbdQVtM5zNjJNygkFyrPxa85Fo0j
thFIUCx9ndWp3IbDccS2DzOwbzs4AgsSSAD+89kjGbZuWag5xVUecFFkGz2u
A7WpdAqimpgiu8bBFtboljGq2lXsbbUuicRuUbwIaumkxX1HZyMqyHANIUB5
ICjvQrdPRt6gBuemns0QUm/dbvtCYL6uqIuO6yyLcRND9MiPyYy37eNojU4L
IFFSvKJ7H1Lj5POeaZBhTz1+kt3VHk8KCePZDKMTYk1YLs58WK9OAtEmlWgU
NDs43Js9IBPwBg/aLIBa3XR6J3W4s+uIYkm7kT1BszxcQirMFuRCek36Ptl3
GVtF4NF9L4CDvmMh7M89zMEt7YvsMfJZXKI1OBsn6iaTBtFrLExBmOJVC8D/
U6NQgyKHN291Lq/HbaFb7HTtA7ZFb0Pt7sN+g526bNRRvwL3XJ+ZkuSCw5q3
FKG7awVS/abrKRsdrRrt/4iIPFXKhR0N+oR6+JhC8bvR1SRbSxjBLRvtT/vr
7fIjdVYkC10+zNrqkj9x9FW8Gtx6TvmmrYb/hu5qpeQUtJAozqm9qWg0g9qV
pDEVO1mHTTjBtBDxqvaH6xFj5FmahstwkqRwrBEQdLZNnGug2xdZWji6ayjt
dbjurXbcmqaJFp0t0QrI2zsuPd+drzUKWEbu9IZz38rzJ2P9LK5eOLuJ48gt
Zba/ygxtWvi6IDd82GFx0l6/wCK2XA6Wvp+32WIAtbQinMEpjM0Vk2Q+oKuw
FJNJ2+xEZlJB79TI4atl610xE0wXFqYC2921Hcf7+nh4OEriamaSZO1ow42t
j0Cb/1292Bwp3nUKWuCBAoiKesnQkwrEO+XcJoiXtpKjlJs1lVQVeuE+TgeU
uzvWJoaixTV2eoyXVfNmQKQSGCd0L6/jC3DAcEmt1zyNAb91hgu/JMcgrGLL
W8UE29ROr65DdILjVUQwA3W+1iEpA2c8zUu6wNkswUdwqVu+kmt1RgnLTr+n
Mp9VMEts3nYtql5qdy5BDNUMKBmBxZWejGEY01Bt1pMXbbrlqlVWjm7VT9YY
Qdutbc5owHcxOnAAQ6C8LPBeUrpsyF0WJwcl6A9DPbcUIpQWiVhSO5bHWf7A
7qEpyonXePc48yxpP8TyVvbObS1RMe5hOD3sBcfFjA2GjRsAcHG4U0vS7d3P
n4BKKN1JdGc5xyBmJLqhaJnHbfEo6MQ5jzRheCyVa0WJpeoNkcwYid1R3CrG
zst4F3F6A1asITHdLFp7lL0RnOeiJLzMYAeSKaAlT/kFZmPuGwjlCRgn1lYX
G4xSLNDzyW+yHzR2VTUtU1bFerkRMl7rMPxLJpud5rkK2ehBHoYH2z0pXkeX
QLVJt10S37g7km+mz1HCTcnQ5lm8ZjEw8KroCy6fMLrT2kgdkNESTonVcdP1
sT1W3Xxyni8mdXEprBJLCzi6kw65aoAUfUDIrocQTVj1MuJbsPO++IptsI7S
uYhTltUxdgUGrMAyC94hdhHy8ycG7F6EIsrI9ODsFFRQ0uSKr8AmN2igJGiB
4/Aa9pqb6iw3vZF6fNpo1rYrLYho1DLn7tSYBK2i8IauiOOWVCAy+WS74PJJ
kSMKOqFsJ2ov9fKyCKP2cRs13+Zu3Nd5ccWIySlLQ3NThNJSP778DJuU02IQ
YpAAkyQz/m98mfuhXeuMDxzZBOJxBuLDXASvj/WU++owc7EjykF54uGU7ge3
V8d75pLEJ4hY3Pp6IveCrkgzDf6Y93bdRu/f/It9I/jya3gQ3jOP+bPR8FZN
A7jHRvwLJmbhFJVEdmMTSyVvCKAKqQgUgKwkijeKR4lwnsD35jt9RTr7sqN4
Rm34NO/FYVB/wGG5t657pd3aSAQpHRMnxkh+AR1mM62lYQFbjQXQTb/cVAxj
6aKXGocCRnHCJGVsSlqPNK7jwCYu5xUKQvMmuc0J1AY8zSUmmcP1YVejkE6u
Vo1Q59H5pC0ORagxx93tsPTpzGq83cQN9b77Kea9CnXST0keYwx612Uoh/eg
LGvS4b+j5g7SNc9m+kib/KYTQqMryVibICkMwyV33HNOuR6ewjTysYZjlDal
ssH6Gw6CuVdTZlgoMBWJhyNYA3KJWehvnCBJ3zzUkRzGsflgqzgf+uSJ93Jn
1IN2EEFafNoYjHAvqb9gJjLeaewXZa9j44pFmMHGLMTdwgzis9K9GJIm/oG7
iZpnhenKMOjCr/3iCXMS9YlSLiOxpra54hBDo8ThxYfGZ6lx7zbtlubxSfbO
uf3du5caGRwZS/cmazlqDBl8eBXfgLFmz6Ucm3zGN1dqPqIRMLXJZaI0eVEa
3ILdxhYwJ6fYvlgUxqBAPnmjTVAvGnAyHk6oqqbLUqN1W8lurwmR3SKKJNpq
3g4i2bahPproqNNpFhisKKWJGB6cqHSw8hDOYbKuCHPU/cZ4LKjxNhHgoadR
jPcaWONl6AuHKOfO4JHsr7C8cbUO43DUwsZB3CwO0YYspW+67YSKWsqCPUl8
r+OwrG7S2CK28KCYIKNGJsEgP2mDrHVb2ssbEgmgl+Ems8HbaD6D9q0T8O5W
4e7Qhwt2JRj9jR+nVDjQ4hqEUnUcoUfq2M9EGsO/NQhlbKlYGQcXCFh1hO64
4vHjfbVMSe8E7OcSD1RIu+Q/ZqHA3fTVsp6kcmowrzAWMYwEp+0nLGpVe7tb
TzfkulPsq0Q+Bnjjd+hSByLK1A91tUSmitQ1qZO0coMt2iHQSKpyTOduW0J3
GJKerKbNrC7V000ejYVx9ymgTzY2JM6AqHudUdJDV3A0tHe1cDxWMj+AzGyB
wlgTER6Dk7giLfYouwQ+xh1u5TXABmjDC81MX5sur/jJwQKfiUIsY/7dD68v
zl4cnaCUJwR/VjYxR1imm5ijcCnZHH5rSJtlhruIN4SQk5DuV6A0adpSataY
WISiaHgHLJ9Oim5/mohfcAJKBTFf/vjkZRZXL8NJuV4zBt+qS5ijnqDuk5dI
i3izCAOy8/rk2enrk0NcUyMxpLE04xm+ia39dVuQV63amL88VRdrfA+R3Fzt
jSn+466bFiTWkwKvJNmbJrBmcTOyza49J3YHiANpo8fzROjCAaPqtVGred/6
nThO6VLlWxD8EgBG7F7wDTrif2rD494RhBdK423SFYu6t1EBZthbr+LSPo3i
lN1+5PBQbxEkynjFT99qKSB1lYwuUp44Cc4AFTmZ44hoxxn1BhQKePcsrork
dk7Sv66T8eFtOVl6/5yjTV14wZ4AvMM8dCnR3+1svzk7ujg/5n0CoDjteSpK
Wsdp8KgG/hYCMLsOqyVjgDHXZhTkjS6MeiZneQRUNXor3l1TZMRm0jvM/mLA
owT1LOSrXd3uSBqg/iBpnXWxzDmnnMUI2D9ZJhmiEofwPCYc4GC9Uov6geNJ
vkYOYfYL80d4MlJNy9gHBh7947yqlvvr63aJ639ebX9GtXrLmK9JEzGIQPzx
+OjiG7W5tYWE9AxU4Kv8it8vYQDUjFBtu4oLcrmP8uJyHR35AOk6vLROUYgY
AS85odiQznPpJsig6mJMlMwSw8unxnXhJGg7mCIfeZ0lwOGVfZwNnYZSMlIm
hYiUuqRkcxR1rnAJQIbTuXaEVMY/dAnkStOwfaj0DRn6e/aJzOPpFfkZQOOq
C8PCbYdRJiATR7KXPZhrfOROJ8ypoo3nrzk8rzP7R9Y/MNWpENqvrC9ZEQsu
dEaI4qFbHmCAM+BQFBnRDjOwFcT1w3C4yO4hetOQwt8H69RHgFR3raLNKAnf
/Gk6W3LMSqttJdXjoWucsYPXVIGMMCeSvIj4pmarxBB1lmilDd4FehiQyQO8
ZldZOZMCxHbxBhkZoO7gMWEvsIQEbTQH2Mxf+Uo87Vbia8MQv3O0f6RqZyrt
o8n2XsZcHWSChrpDc39OJQ1dJOVV19R6jahOTs1Fpgh4yQKGrDkibDLHCpux
Cmy1tj5X09+GZbe4LVijY5qROn/vFPIVjMcHJwet4/noUUN3Uh9057KCr4EK
Anox4dTBWGfTso+YQFxpVrSsnp+vqYvvz47KFR1pu3EirCuHjB66K2hM8Sq1
CrSxps6MR8p58bLIQWrbbL39IPh5KD8/N/5t/6E/C34miOCw/6z+QGbgz+pV
HBLLpg+poRDlD+ifn5159v1/b51HEAoTPjukoQ+t+fez+tMfPSX+T3/25rn/
enDr/qQvUEeRSuj88CiD36mFKezcGWAcjARsRr27u4VKYudeAp/xE3nQfioM
1aPutPIat6+c5oU4pb5N8wm5pMdTkC90R4wFw9k+2C27vMZS+hAIpHiBpAjI
+svJ6eGRopT4O7bI35u7NofG1mUH6q5tuRfcH/Z1Mv4RYU80tIchzuAN0/Fh
WPLT4Ok9mGLcMI2jS469f9jnrKw4+nJlBmq/aZQCpzukA4pq7k8xu3rZfyOZ
3VII4qZQcOYAXVAIYgU1G46/JAt1sAQ12fG5VCF+MMzKLZMt1jmlo6u6du6q
MVMq/WZ/DG1NgXJXXLrOI0TXC8BJCMwwM8WxpMxsPmU905Ix6rzJNFmGmHFA
RRDJpDblAFiyVmDAH6TOAhh5icJ0H7gDCKJMHURzUA5v6oE6B9F1AHSHjuxD
MLgi9QzbJYQD9SrMavUMK5RSrOL5QxpGyeJv/7tQ//E/6+xv/w4K3u/TECz4
Q9AyU/I1n5EHC10Ih8lfrwbq+bxAFzv8fZTCUnN45Vk+gRXCgDfwOMjVZAny
kCz8gRrPa7wC8kX9I3ZxHs9DMFB+DyqUBuy5ehleF3xLwFFE/r2X8TUmSH8b
gw4Xq1dgnIUxoB9gOSqSK3VycwnPD9TLZJKjLYLxG4ABJOF4OocBqp8I6EL9
339bhv/xv2KA+XcA7R/g1/Rv/35FJH0epjP1JgZqDP4fLm1mZ+PJAAA=

-->

</rfc>
