<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-intarea-proxy-config-03" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="Proxy Configuration PvDs">Communicating Proxy Configurations in Provisioning Domains</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-intarea-proxy-config-03"/>
    <author initials="T." surname="Pauly" fullname="Tommy Pauly">
      <organization>Apple, Inc.</organization>
      <address>
        <email>tpauly@apple.com</email>
      </address>
    </author>
    <author initials="D." surname="Damjanovic" fullname="Dragana Damjanovic">
      <organization>Microsoft</organization>
      <address>
        <email>ddamjanovic@microsoft.com</email>
      </address>
    </author>
    <author initials="Y." surname="Rosomakho" fullname="Yaroslav Rosomakho">
      <organization>Zscaler</organization>
      <address>
        <email>yrosomakho@zscaler.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 31?>

<t>This document defines a mechanism for accessing provisioning domain information
associated with a proxy, such as other proxy URIs that support different protocols
and a list of DNS zones that are accessible via a proxy.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://github.com/tfpauly/privacy-proxy"/>.</t>
    </note>
  </front>
  <middle>
    <?line 37?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>HTTP proxies that use the CONNECT method <xref section="9.3.6" sectionFormat="of" target="HTTP"/>
(often referred to as "forward" proxies) allow clients to open connections to
hosts via a proxy. These typically allow for TCP stream proxying, but can also support
UDP proxying <xref target="CONNECT-UDP"/> and IP packet proxying
<xref target="CONNECT-IP"/>. Such proxies are not just defined as
hostnames and ports, but can use URI templates <xref target="URITEMPLATE"/>.</t>
      <t>In order to make use of multiple related proxies, clients need a way to understand
which proxies are associated with one another.</t>
      <t>Client can also benefit from learning about additional information associated with
the proxy to optimize their proxy usage, such knowing that a proxy is configured
to only allow access to a limited set of destinations.</t>
      <t>These improvements to client behavior can be achieved through the use of
Provisioning Domains. Provisioning Domains (PvDs) are defined in <xref target="PVD"/>
as consistent sets of network configuration information, which can include proxy
configuration details <xref section="2" sectionFormat="of" target="PVD"/>. <xref target="PVDDATA"/> defines a JSON
<xref target="JSON"/> format for describing Provisioning Domain Additional Information,
which is an extensible dictionary of properties of the Provisioning Domain.</t>
      <t>This document defines several mechanisms to use PvDs to help clients understand how
to use proxies:</t>
      <ol spacing="normal" type="1"><li>
          <t>A way to fetch PvD Additional Information associated with a known proxy URI (<xref target="proxy-pvd"/>)</t>
        </li>
        <li>
          <t>A way to list one or more proxy URIs in a PvD, allowing clients to
learn about other proxy options given a known proxy (<xref target="proxy-enumeration"/>).</t>
        </li>
        <li>
          <t>A way to define a limited set of destinations that are accessible through the
proxy (<xref target="destinations"/>).</t>
        </li>
      </ol>
      <t>Additionally, this document partly describes how these mechanisms might be used
to discover proxies associated with a network (<xref target="network-proxies"/>).</t>
      <t>Using this mechanism a client can learn that a legacy insecure HTTP proxy that
the client is configured with is also accessible using HTTPS. In this way,
clients can upgrade to a more secure connection to the proxy.</t>
      <section anchor="background">
        <name>Background</name>
        <t>Other non-standard mechanisms for proxy configuration and discovery have been
used historically, some of which are described in <xref target="RFC3040"/>.</t>
        <t>Proxy Auto Configuration (PAC) files <xref section="6.2" sectionFormat="of" target="RFC3040"/> are Javascript
scripts that take URLs as input and provide an output of a proxy configuration
to use.</t>
        <t>Web Proxy Auto-Discovery Protocol (WPAD) <xref section="6.4" sectionFormat="of" target="RFC3040"/> allows
networks to advertise proxies to use by advertising a PAC file. This solution
squats on DHCP option 252.</t>
        <t>These common (but non-standard) mechanisms only support defining proxies by
hostname and port, and do not support configuring a full URI template
<xref target="URITEMPLATE"/>.</t>
        <t>The mechanisms defined in this document are intended to offer a standard
alternative that works for URI-based proxies and avoids dependencies
on executing Javascript scripts, which are prone to implementation-specific
inconsistencies and can open up security vulnerabilities.</t>
      </section>
      <section anchor="requirements">
        <name>Requirements</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
    </section>
    <section anchor="proxy-pvd">
      <name>Fetching PvD Additional Information for proxies</name>
      <t>This document defines a way to fetch PvD Additional Information associated with
a proxy. This PvD describes the properties of the network accessible through the proxy.</t>
      <t>In order to fetch PvD Additional Information associated with a proxy, a client
issues an HTTP GET request for the well-known PvD URI (".well-known/pvd") <xref target="PVDDATA"/>
and the host authority of the proxy. This is applicable for both proxies that are identified
by a host and port only (such as SOCKS proxies and HTTP CONNECT proxies) and proxies
that are identified by a URI or URI template.</t>
      <t>For example, a client would issue the following request for the PvD associated
with "https://proxy.example.org/masque{?target_host,target_port}":</t>
      <artwork><![CDATA[
:method = GET
:scheme = https
:authority = proxy.example.org
:path = /.well-known/pvd
accept = application/pvd+json
]]></artwork>
      <t>For a HTTP CONNECT proxy on "proxy.example.org:8080", the client would send the following
request:</t>
      <artwork><![CDATA[
:method = GET
:scheme = https
:authority = proxy.example.org:8080
:path = /.well-known/pvd
accept = application/pvd+json
]]></artwork>
      <t>Note that all proxies that are colocated on the same host and port share the same PvD
Additional Information. Proxy deployments that need separate PvD configuration properties
SHOULD use different hosts.</t>
      <t>PvD Additional Information is required to contain the "identifier", "expires", and
"prefixes" keys. For proxy PvDs as defined in this document, the "identifier" MUST
match the hostname of the HTTP proxy. The "prefixes" array SHOULD be empty by default.</t>
    </section>
    <section anchor="proxy-enumeration">
      <name>Enumerating proxies within a PvD</name>
      <t>This document defines a new PvD Additional Information key, <tt>proxies</tt>, that
is an array of dictionaries, where each dictionary in the array defines
a single proxy that is available as part of the PvD (see <xref target="proxies-key-iana"/>).
Each proxy is defined by a proxy protocol, a proxy location (i.e., a hostname and port or a URI template
<xref target="URITEMPLATE"/>), along with potentially other keys.</t>
      <t>This document defines two mandatory keys for the sub-dictionaries in the
<tt>proxies</tt> array, <tt>protocol</tt> and <tt>proxy</tt>. There are also optional keys, including
<tt>alpn</tt>, <tt>mandatory</tt>, and destination accessibility keys defined in <xref target="destinations"/>.
Other optional keys can be added to the dictionary to further define or restrict the
use of a proxy.</t>
      <table>
        <thead>
          <tr>
            <th align="left">JSON Key</th>
            <th align="left">Optional</th>
            <th align="left">Description</th>
            <th align="left">Type</th>
            <th align="left">Example</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">protocol</td>
            <td align="left">No</td>
            <td align="left">The protocol used to communicate with the proxy</td>
            <td align="left">String</td>
            <td align="left">"connect-udp"</td>
          </tr>
          <tr>
            <td align="left">proxy</td>
            <td align="left">No</td>
            <td align="left">String containing the URI template or hostname and port of the proxy, depending on the format defined by the protocol</td>
            <td align="left">String</td>
            <td align="left">"https://proxy.example.org:4443/masque{?target_host,target_port}"</td>
          </tr>
          <tr>
            <td align="left">alpn</td>
            <td align="left">Yes</td>
            <td align="left">An array of Application-Layer Protocol Negotiation protocol identifiers</td>
            <td align="left">Array of Strings</td>
            <td align="left">["h3","h2"]</td>
          </tr>
          <tr>
            <td align="left">mandatory</td>
            <td align="left">Yes</td>
            <td align="left">An array of optional keys that client must understand and process to use this proxy</td>
            <td align="left">Array of Strings</td>
            <td align="left">["matchDomains"]</td>
          </tr>
        </tbody>
      </table>
      <t>The values for the <tt>protocol</tt> key are defined in the proxy protocol
registry (<xref target="proxy-protocol-iana"/>), with the initial contents provided below.
For consistency, any new proxy types that use HTTP Upgrade Tokens (and use
the <tt>:protocol</tt> pseudo-header) SHOULD define the <tt>protocol</tt> value to match
the Upgrade Token / <tt>:protocol</tt> value.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Proxy Protocol</th>
            <th align="left">Proxy Location Format</th>
            <th align="left">Reference</th>
            <th align="left">Notes</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">socks5</td>
            <td align="left">hostname:port</td>
            <td align="left">
              <xref target="SOCKSv5"/></td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">http-connect</td>
            <td align="left">hostname:port</td>
            <td align="left">
              <xref section="9.3.6" sectionFormat="of" target="HTTP"/></td>
            <td align="left">Standard CONNECT method, using unencrypted HTTP to the proxy</td>
          </tr>
          <tr>
            <td align="left">https-connect</td>
            <td align="left">hostname:port</td>
            <td align="left">
              <xref section="9.3.6" sectionFormat="of" target="HTTP"/></td>
            <td align="left">Standard CONNECT method, using TLS-protected HTTP to the proxy</td>
          </tr>
          <tr>
            <td align="left">connect-udp</td>
            <td align="left">URI template</td>
            <td align="left">
              <xref target="CONNECT-UDP"/></td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">connect-ip</td>
            <td align="left">URI template</td>
            <td align="left">
              <xref target="CONNECT-IP"/></td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">connect-tcp</td>
            <td align="left">URI template</td>
            <td align="left">
              <xref target="CONNECT-TCP"/></td>
            <td align="left"> </td>
          </tr>
        </tbody>
      </table>
      <t>The value of <tt>proxy</tt> depends on the Proxy Location Format defined by proxy protocol.
The types defined here either use a hostname and port, or a full URI template.</t>
      <t>If the <tt>alpn</tt> key is present, it provides a hint for the Application-Layer Protocol Negotiation
(ALPN) <xref target="ALPN"/> protocol identifiers associated with this server. For HTTP proxies,
this can indicate if the proxy supports HTTP/3, HTTP/2, etc.</t>
      <t>The value of the <tt>mandatory</tt> key is a list of keys that the client must understand and process to be
able to use the proxy. A client that does not understand a key from the list or cannot fully process
the value of a key from the list MUST ignore the entire proxy definition. The list can contain
only keys that are registered in an IANA registry, defined in <xref target="proxy-info-iana"/> and that are marked
as optional.  The <tt>mandatory</tt> list MUST NOT include any entries that are not present in the sub-dictionary.</t>
      <t>When a PvD that contains the <tt>proxies</tt> key is fetched from a known proxy
using the method described in <xref target="proxy-pvd"/> the proxies list describes
equivalent proxies (potentially supporting other protocols) that can be used
in addition to the known proxy.</t>
      <t>Such cases are useful for informing clients of related proxies as a discovery
method, with the assumption that the client already is aware of one proxy.
Many historical methods of configuring a proxy only allow configuring
a single FQDN hostname for the proxy. A client can attempt to fetch the
PvD information from the well-known URI to learn the list of complete
URIs that support non-default protocols, such as <xref target="CONNECT-UDP"/> and
<xref target="CONNECT-IP"/>.</t>
      <section anchor="example">
        <name>Example</name>
        <t>Given a known HTTP CONNECT proxy FQDN, "proxy.example.org", a client could
request PvD Additional Information with the following request:</t>
        <artwork><![CDATA[
:method = GET
:scheme = https
:authority = proxy.example.org
:path = /.well-known/pvd
accept = application/pvd+json
]]></artwork>
        <t>If the proxy has a PvD definition for this FQDN, it would return the following
response to indicate a PvD that has two related proxy URIs.</t>
        <artwork><![CDATA[
:status = 200
content-type = application/pvd+json
content-length = 222

{
  "identifier": "proxy.example.org.",
  "expires": "2023-06-23T06:00:00Z",
  "prefixes": [],
  "proxies": [
    {
      "protocol": "http-connect",
      "proxy": "proxy.example.org:80"
    },
    {
      "protocol": "connect-udp",
      "proxy": "https://proxy.example.org/masque{?target_host,target_port}"
    }
  ]
}
]]></artwork>
        <t>The client would learn the URI template of the proxy that supports UDP using <xref target="CONNECT-UDP"/>,
at "https://proxy.example.org/masque{?target_host,target_port}".</t>
      </section>
    </section>
    <section anchor="destinations">
      <name>Destination accessibility information for proxies</name>
      <t>Destination accessibility information is used when only a subset of destinations is reachable through
a proxy. Destination restrictions are often used in VPN tunnel configurations such as split
DNS in IKEv2 <xref target="IKEV2SPLIT"/>.</t>
      <t>PvD Additional Information can be used to indicate that a proxy PvD only allows access to a limited
set of destinations.</t>
      <t>This document defines five optional keys for subdictionaries in the <tt>proxies</tt>
array that are used to signal information about destinations available through the proxy.</t>
      <table>
        <thead>
          <tr>
            <th align="left">JSON Key</th>
            <th align="left">Optional</th>
            <th align="left">Description</th>
            <th align="left">Type</th>
            <th align="left">Example</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">matchDomains</td>
            <td align="left">Yes</td>
            <td align="left">An array of FQDNs and wildcard DNS domains that can be accessed over this proxy</td>
            <td align="left">Array of Strings</td>
            <td align="left">[ "www.example.com", "*.internal.example.com" ]</td>
          </tr>
          <tr>
            <td align="left">excludeDomains</td>
            <td align="left">Yes</td>
            <td align="left">An array of FQDNs and wildcard DNS domains that cannot be accessed over this proxy. If matchDomains is specified, excludeDomains should list more specific domains within entries in the matchDomains array</td>
            <td align="left">Array of Strings</td>
            <td align="left">[ "public.example.com" ]</td>
          </tr>
          <tr>
            <td align="left">matchSubnets</td>
            <td align="left">Yes</td>
            <td align="left">An array of IP addresses and subnets that can be accessed over this proxy</td>
            <td align="left">Array of Strings</td>
            <td align="left">[ "2001:DB8::1", "192.168.1.0/24" ]</td>
          </tr>
          <tr>
            <td align="left">excludeSubnets</td>
            <td align="left">Yes</td>
            <td align="left">An array of IP addresses and subnets that cannot be accessed over this proxy. If matchSubnets is specified, excludeDomains should list more specific subnets within entries in the matchSubnets array</td>
            <td align="left">Array of Strings</td>
            <td align="left">[ "192.0.2.0/16", "192.51.100.1" ]</td>
          </tr>
          <tr>
            <td align="left">matchPorts</td>
            <td align="left">Yes</td>
            <td align="left">An array of TCP or UDP port ranges accessible over this proxy</td>
            <td align="left">Array of Strings</td>
            <td align="left">[ "80", "443", "1024-65535" ]</td>
          </tr>
        </tbody>
      </table>
      <t>When present in a PvD Additional Information dictionary that is retrieved for a proxy
as described in <xref target="proxy-pvd"/>, entries in the <tt>matchDomains</tt> array indicate specific FQDNs
and zones that are accessible using the proxy. If a hostname does match any entry,
then a client SHOULD assume that the hostname will not be accessible through the proxy.
If a hostname is included in the <tt>excludeDomains</tt> array, then the client SHOULD NOT
access it through the proxy. The <tt>excludeDomains</tt> parameter can be present even if <tt>matchDomains</tt>
is omitted. When this is the case, the client assumes that all domains except the domains
listed in the <tt>excludeDomains</tt> array are accessible through the proxy.</t>
      <t>Entries listed in <tt>matchDomains</tt> MUST NOT expand the set of domains that a client is
willing to send to a particular proxy. The list can only narrow the list of domains
that the client is willing to send through the proxy. For example, if the client
has a local policy to only send requests for "*.example.com" to a proxy
"proxy.example.com", and the <tt>matchDomains</tt> array contains "internal.example.com" and
"other.company.com", the client would end up only proxying "internal.example.com"
through the proxy.</t>
      <t>A wildcard prefix (<tt>*.</tt>) is used to indicate matching entire domains or subdomains instead of specific hostnames. Note
that this can be used to match multiple levels of subdomains. For example "<em>.example.com"
matches "internal.example.com" as well as "www.public.example.com".
Entries that include the wildcard prefix also SHOULD be treated as if they match
an FQDN that only contains the string after the prefix, with no subdomain. So,
an entry in <tt>matchDomains</tt> of "</em>.example.com" would match the FQDN "example.com",
unless "example.com" were specifically included in <tt>excludeDomains</tt>. This is
done to prevent commonly needing to include both "*.example.com" and "example.com"
in the <tt>matchDomains</tt> list.</t>
      <t>Entries in <tt>matchSubnets</tt> correspond to IP addresses and subnets that are available through the
proxy, while entries in <tt>excludeSubnets</tt> define IP addresses and subnets that SHOULD NOT be used
with the proxy. Subnet-based destination information SHOULD only be used when
applications are communicating with destinations identified by only an IP address and not a hostname.</t>
      <t><tt>matchPorts</tt> in a list of strings that can be used to instruct the client that only specific destination
TCP or UDP ports are accessible through the proxy. The list may contain individual port numbers
(such as "80") or inclusive ranges of ports. For example "1024-2048" matches all ports from 1024
to 2048, including the 1024 and 1028.</t>
      <section anchor="example-1">
        <name>Example</name>
        <t>Given a proxy URI template "https://proxy.example.org/masque{?target_host,target_port}",
which in this case is for UDP proxying, the client could request PvD additional information
with the following request:</t>
        <artwork><![CDATA[
:method = GET
:scheme = https
:authority = proxy.example.org
:path = /.well-known/pvd
accept = application/pvd+json
]]></artwork>
        <t>If the proxy has a PvD definition for this proxy, it could return the following
response to indicate a PvD that has one accessible zone, "*.internal.example.org".</t>
        <artwork><![CDATA[
:status = 200
content-type = application/pvd+json
content-length = 135

{
  "identifier": "proxy.example.org.",
  "expires": "2023-06-23T06:00:00Z",
  "prefixes": [],
  "proxies": [
    {
      "protocol": "http-connect",
      "proxy": "proxy.example.org:80"
    },
    {
      "protocol": "connect-udp",
      "proxy": "https://proxy.example.org/masque{?target_host,target_port}",
      "matchDomains": [ "*.internal.example.org" ]
    }
  ]
}
]]></artwork>
        <t>The client could then choose to use this proxy only for accessing names that fall
within the "*.internal.example.org" zone.</t>
      </section>
    </section>
    <section anchor="network-proxies">
      <name>Discovering proxies from network PvDs</name>
      <t><xref target="PVDDATA"/> defines how PvD Additional Information is discovered based
on network advertisements using Router Advertisements <xref target="RFC4861"/>. A network
defining its configuration via PvD information can include the <tt>proxies</tt>
key (<xref target="proxy-enumeration"/>) to inform clients of a list of proxies available
on the network.</t>
      <t>This association of proxies with the network's PvD can be used as a mechanism
to discover proxies, as an alternative to PAC files. However, client systems MUST
NOT automatically send traffic over proxies advertised in this way without
explicit configuration, policy, or user permission. For example, a client
can use this mechanism to choose between known proxies, such as if the client was
already proxying traffic and has multiple options to choose between.</t>
      <t>Further security and experience considerations are needed for these cases.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>Configuration advertised via PvD Additional Information, such DNS zones or associated
proxies, can only be safely used when fetched over a secure TLS-protected connection,
and the client has validated that that the hostname of the proxy, the identifier of
the PvD, and the validated hostname identity on the certificate all match.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="proxies-key-iana">
        <name>New PvD Additional Information key</name>
        <t>This document registers a new key in the "Additional Information PvD Keys" registry.</t>
        <t>JSON Key: proxies</t>
        <t>Description: Array of proxy dictionaries associated with this PvD</t>
        <t>Type: Array of dictionaries</t>
        <t>Example: [ {
  "protocol": "connect-udp",
  "proxy": "https://proxy.example.org/masque{?target_host,target_port}"
} ]</t>
      </section>
      <section anchor="proxy-info-iana">
        <name>New PvD Proxy Information Registry</name>
        <t>IANA is requested to create a new registry "Proxy Information PvD Keys", within the "Provisioning Domains (PvDs)" registry page.
This new registry reserves JSON keys for use in sub-dictionaries under the <tt>proxies</tt> key.
The initial contents of this registry are given in <xref target="proxy-enumeration"/> and <xref target="destinations"/>.</t>
        <t>New assignments in the "Proxy Information PvD Keys" registry will be administered by IANA through Expert Review <xref target="RFC8126"/>. Experts are
requested to ensure that defined keys do not overlap in names or semantics.</t>
      </section>
      <section anchor="proxy-protocol-iana">
        <name>New PvD Proxy Protocol Registry</name>
        <t>IANA is requested to create a new registry "Proxy Protocol PvD Values", within the "Provisioning Domains (PvDs)" registry page.
This new registry reserves JSON values for the <tt>protocol</tt> key in <tt>proxies</tt> sub-dictionaries.
The initial contents of this registry are given in <xref target="proxy-enumeration"/>.</t>
        <t>New assignments in the "Proxy Protocol PvD Values" registry will be administered by IANA through Expert Review <xref target="RFC8126"/>.
Experts are requested to ensure that defined keys do not overlap in names or semantics, and have clear format definitions.
The reference and notes fields MAY be empty.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="CONNECT-UDP">
          <front>
            <title>Proxying UDP in HTTP</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document describes how to proxy UDP in HTTP, similar to how the HTTP CONNECT method allows proxying TCP in HTTP. More specifically, this document defines a protocol that allows an HTTP client to create a tunnel for UDP communications through an HTTP server that acts as a proxy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9298"/>
          <seriesInfo name="DOI" value="10.17487/RFC9298"/>
        </reference>
        <reference anchor="CONNECT-IP">
          <front>
            <title>Proxying IP in HTTP</title>
            <author fullname="T. Pauly" initials="T." role="editor" surname="Pauly"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="A. Chernyakhovsky" initials="A." surname="Chernyakhovsky"/>
            <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
            <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>
            <date month="October" year="2023"/>
            <abstract>
              <t>This document describes how to proxy IP packets in HTTP. This protocol is similar to UDP proxying in HTTP but allows transmitting arbitrary IP packets. More specifically, this document defines a protocol that allows an HTTP client to create an IP tunnel through an HTTP server that acts as an IP proxy. This document updates RFC 9298.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9484"/>
          <seriesInfo name="DOI" value="10.17487/RFC9484"/>
        </reference>
        <reference anchor="URITEMPLATE">
          <front>
            <title>URI Template</title>
            <author fullname="J. Gregorio" initials="J." surname="Gregorio"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="M. Hadley" initials="M." surname="Hadley"/>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="D. Orchard" initials="D." surname="Orchard"/>
            <date month="March" year="2012"/>
            <abstract>
              <t>A URI Template is a compact sequence of characters for describing a range of Uniform Resource Identifiers through variable expansion. This specification defines the URI Template syntax and the process for expanding a URI Template into a URI reference, along with guidelines for the use of URI Templates on the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6570"/>
          <seriesInfo name="DOI" value="10.17487/RFC6570"/>
        </reference>
        <reference anchor="PVDDATA">
          <front>
            <title>Discovering Provisioning Domain Names and Data</title>
            <author fullname="P. Pfister" initials="P." surname="Pfister"/>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="W. Shao" initials="W." surname="Shao"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>Provisioning Domains (PvDs) are defined as consistent sets of network configuration information. PvDs allows hosts to manage connections to multiple networks and interfaces simultaneously, such as when a home router provides connectivity through both a broadband and cellular network provider.</t>
              <t>This document defines a mechanism for explicitly identifying PvDs through a Router Advertisement (RA) option. This RA option announces a PvD identifier, which hosts can compare to differentiate between PvDs. The option can directly carry some information about a PvD and can optionally point to PvD Additional Information that can be retrieved using HTTP over TLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8801"/>
          <seriesInfo name="DOI" value="10.17487/RFC8801"/>
        </reference>
        <reference anchor="JSON">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="SOCKSv5">
          <front>
            <title>SOCKS Protocol Version 5</title>
            <author fullname="M. Leech" initials="M." surname="Leech"/>
            <author fullname="M. Ganis" initials="M." surname="Ganis"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="R. Kuris" initials="R." surname="Kuris"/>
            <author fullname="D. Koblas" initials="D." surname="Koblas"/>
            <author fullname="L. Jones" initials="L." surname="Jones"/>
            <date month="March" year="1996"/>
            <abstract>
              <t>This memo describes a protocol that is an evolution of the previous version of the protocol, version 4 [1]. This new protocol stems from active discussions and prototype implementations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1928"/>
          <seriesInfo name="DOI" value="10.17487/RFC1928"/>
        </reference>
        <reference anchor="CONNECT-TCP">
          <front>
            <title>Template-Driven HTTP CONNECT Proxying for TCP</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   TCP proxying using HTTP CONNECT has long been part of the core HTTP
   specification.  However, this proxying functionality has several
   important deficiencies in modern HTTP environments.  This
   specification defines an alternative HTTP proxy service configuration
   for TCP connections.  This configuration is described by a URI
   Template, similar to the CONNECT-UDP and CONNECT-IP protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-connect-tcp-06"/>
        </reference>
        <reference anchor="ALPN">
          <front>
            <title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
            <author fullname="S. Friedl" initials="S." surname="Friedl"/>
            <author fullname="A. Popov" initials="A." surname="Popov"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Stephan" initials="E." surname="Stephan"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7301"/>
          <seriesInfo name="DOI" value="10.17487/RFC7301"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="PVD">
          <front>
            <title>Multiple Provisioning Domain Architecture</title>
            <author fullname="D. Anipko" initials="D." role="editor" surname="Anipko"/>
            <date month="June" year="2015"/>
            <abstract>
              <t>This document is a product of the work of the Multiple Interfaces Architecture Design team. It outlines a solution framework for some of the issues experienced by nodes that can be attached to multiple networks simultaneously. The framework defines the concept of a Provisioning Domain (PvD), which is a consistent set of network configuration information. PvD-aware nodes learn PvD-specific information from the networks they are attached to and/or other sources. PvDs are used to enable separation and configuration consistency in the presence of multiple concurrent connections.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7556"/>
          <seriesInfo name="DOI" value="10.17487/RFC7556"/>
        </reference>
        <reference anchor="RFC3040">
          <front>
            <title>Internet Web Replication and Caching Taxonomy</title>
            <author fullname="I. Cooper" initials="I." surname="Cooper"/>
            <author fullname="I. Melve" initials="I." surname="Melve"/>
            <author fullname="G. Tomlinson" initials="G." surname="Tomlinson"/>
            <date month="January" year="2001"/>
            <abstract>
              <t>This memo specifies standard terminology and the taxonomy of web replication and caching infrastructure as deployed today. It introduces standard concepts, and protocols used today within this application domain. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3040"/>
          <seriesInfo name="DOI" value="10.17487/RFC3040"/>
        </reference>
        <reference anchor="IKEV2SPLIT">
          <front>
            <title>Split DNS Configuration for the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document defines two Configuration Payload Attribute Types (INTERNAL_DNS_DOMAIN and INTERNAL_DNSSEC_TA) for the Internet Key Exchange Protocol version 2 (IKEv2). These payloads add support for private (internal-only) DNS domains. These domains are intended to be resolved using non-public DNS servers that are only reachable through the IPsec connection. DNS resolution for other domains remains unchanged. These Configuration Payloads only apply to split- tunnel configurations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8598"/>
          <seriesInfo name="DOI" value="10.17487/RFC8598"/>
        </reference>
        <reference anchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+0823LbRpbv/RUd+mHtWZKmqEtk1noziiRPNLFljSUnlUml
Rk2iKSIGAQYNUmZk5Vv2W/bL9lz6BhCUU45TW7W1U0lMA40+p8/91tPr9USV
VpkeyeNiPl/m6URVaX4jL8ri/Rqe5dP0ZlnCsyI3Ms3x+So18DdcdFLMVZob
ocbjUq9GbR/Ji9WJEUkxydUcgCSlmla9VFfTXppXqtSqt8CPehP6qDfYFYmq
9EgAGvqmKNcjaapEiHRRjmRVLk01HAyeDYbinV7fFmUykmd5pctcV70T3FoI
U6k8+ZfKihzArbURi3Qkf6yKSVeaoqxKPTXwaz3HHz8JoZbVrChHQvaEhP/B
aUbyqi8v1DJb0xPG+wqIs46eFuXNSB4tFpnuAgaTPj3UQI0M0Fzgsr8qfNuf
FPPa3id9eaLmP6scyDiJAAD2NypXzZcE51U6KQtTwOkiKEniV/517hZsgPuh
L9/Am7l6Nyvo6XSZZQzxBwXfZGrVWAAQVZ7+SswbyX+aicp0GQNel279X3/l
twRV9Ho9qcamKtUE2HA1S40Eti/nOq9koqdpro1Ucq4nM9jfzOW0KKWaTLQx
KEqLWK4Skis4AayZEyZCGVNMUhCKRN6m1Qx2IrkBVi4n8Dcji2qmS34o3745
M7KaqQreLhbAdZmk06kuERVYAcJQZCC1eQLbZKmpZDGVJ+eX8tcCkaQPQTQd
duNMy1WqHMg+H3WeJkmmhXiEElgWyXJCeIpvrq4uaGHqtloaDT+0PH59fn56
fAUkAJFL5N3dpaZv5LP+bv8AcfgCP37+5sXxs52dwf29eAws1bkEUdVlCSev
CjxpB6hyq8qk48A8kSrLils5yVI4ocFlxQK+A53KGQQ+E7PCwMv4JPJqphG5
9QLUPsvWdh/kzNXxBWge6Oec1wJbunK8rORE5bDMFI604u3JhV8Ch/rCHrMH
z+kow2eH9/cSiX0GC9Xkna78ehGtP+Ple4d79/d9eYlsdWREZuRFJX8G/bey
BKwzdCIUZkPbIzYmIIlkB0GQlZ4vMhAcg8jBg6vTVxcvj65OEdrB/pdAZ+Do
WQ6Cn4AAAe1AtjV9DRyZL7MqBT0GHmQkfBalrid2rhEXeavW+O0yh03IBInb
Wdo4QlOGQdoAcRJcQOGYNgz0HescTlrJaVnMZaZVSaqhxgWcTyVJinxVWawk
TQACpY41gkSiSufprySLqdOUpVE32irRu7y4RRAs/3YBaPHE2nOdCNwm93LC
+kFSCWo0TxGu0aRNiTbgRtht9NEaoJylc9RyPXdCyiSEg87UKgWZw6OPUe1m
qV6huM/KYnkzI+Vhfog299NvdUryMXqeJ0R4JzJgU+7uvrr47gR5/+X+/gHo
mKIDGrACiAugbxB/cCjgXt75szN9I1p3JfMXcU7zSbZMLKlF/ZNEV2A1TaTt
Q9wfcEApB4mEXydHV0eI0eHhYAdUJRjLv1++PkcVwT9pwXD/GSxgJEhNgc6T
Mh1bj90kgjwKcnIW4W5lM0W9kfo9nJytXJISiqpcI45wnIUuK5Re+BsyoQVE
f5upN8DCEuB6g08sRzYiX/D3TGcLr0ZBceSsuBV2qdWekRA7fXnklGyqK8Ae
ttlyvg1FUyTbefAO8vHdHccdi1Vyf/+kvj+7BFBOIPC8KHXsVYCoCkF3WQeQ
EMHsClJTq6OxQ0LdQyt8k6503kDHo6JzoCCLDaDUr+PEZH1Y0Vo9V6REwgOM
v2JYgZIZONWqxtKFKitQeitrwFvgEO4HDIq4O09vZqjMyDiyFElqJqDuZbCB
G2xxagYo2Z89u5ixemvYIAE2IXBQznCg7jHFrcnK9I2arDHy0ROwV9L74jWt
IHtov63ZNUYH1QENb0S8JcHHbS77IGGMCXCkKxzTydMsbkoF+k+GkATGwg8O
GN95awwHe/RIfg2u8AZ4A65CvCZZyYu8RyoAzj2mLCo6n6JuW1BZHJHXEoyo
BvLrXCADJGBaFSX7dQx95+TPWPHZJjI3nVUE87I72GNvyHH80RKQrgfzjy+O
jp/IaZrp2KId9Mmm+R1o/7+rlUIIi0rwH1Y8K/Sub9+8RHEA0Av0ZnnC8V+C
/lCC8uBT2FG1HdvaBkDzez2WAdXeiSfFhY3x5OPvL45OntRQ3WugilpshJU+
dmbJCs1eMD/OcI3X/h25YgnUIGJgIAWCYYpsSRiaX5YK/UguT76BOIq1Xw73
h94VQsQ8R3pisBKz/UnMd3K1PoJFA2AjZUJqvPbxjw9/uiwTBUVL7ktHPcYZ
E4BaXAQOJoqKiP+AY4xH5D7rhgH5DGmcBttNwWmBQTbAcKcRKsPkDNi20sx9
JjIKNMDsjZUJIRWhrlZFmiDEBW6aT+C5KNBHgUJRXhrESlqx6kZCDVvlpIcQ
amQUaJDI9MxCT9Ip5FTgqp2znziYqMIULy8XrLhptZarZZaDMR6nWYoekFX2
jf5lmZYcwDCVIA3FMwHKnVdvL686Xf5Tnr+m329O//H27M3pCf6+/Obo5Uv/
Q9gVl9+8fvvyJPwKXx6/fvXq9PyEP4ansvZIdF4d/dBhfndeX1ydvT4/etlp
Z1GFwSQxqlyUuuLYuab/Xx9f/Pd/7exhPAKqMdzZwTCD/3K48yUE5EBjnTM0
kkr+K1ittYA8F2wwOUaQrIlapBWY0S6qt5mhmwPTBtr6H19l6MB6B1/9p8Cs
6QU6cYpbtvtxZ/iQU3ePgsPenl5+YoQgoowINsYPg7ezdrsRCznX1e5qvaGP
E4tPiFtskutcnkiNWZLYsm/72+kVZCa/wCMOBxHyrc6yHgcYCIqinU4/PH0K
FOygTbSRJ8bAeUKfoj2RXBFBHbAnjSmDPnKxyMCt4IER5BjinHq+S1YBlLcC
jYNIAK2m3dlaKRahxy5zv3x9/O1lzQrQ2Vy6HJLc3NsK0QKIzDMdl62LN3DA
hRfwSL9Xc6rX+PjhtlhmIP5IUjrotHAhXZOmSMjAHEHM6cyqamFGT58yfez2
/aK8eTpX4AH03VeVKm909S88fNf+xvPfdyCg/e2338TIlgKeIyPFyExmYFvg
b7SzGAVOPJcbQMRooQCL5/Jpg7cCJRLM43PHKRQtfPHvPxvwTQiX6KE2ybxG
l9XZADU6HBwOOqTuddIZbQXHU05Yyn2GAxLUP3TK86Kybgct04aMQoBQTEjZ
MD6DUxh0pXVJNTMyoO4lyIFo192+jUTAc2XF2qa4CInqA0ZDDA2gSJDqQVyw
LMJ6AAw1Qr2KqjYYk203G6CUJXsm8sKwf6VSPlLH60eJbkS/X8Aqw35DAKfB
cL6Hv6Mfgzz6hQ80KUdT211/d2N3iX5PAEaTmbclFJtYKxJicSo7yQi4Kksw
2/b04KlAb0EkxkjMqVpmFTpfeeqyoygEQj10CZl3EHEatd1R5Pr2IUsM9OjK
awvnusvpA+fLjC2mXi5bpnrQLbo5qRUcP0qjLRv4GwsdnA3Gj5mOUhMyrCuV
ZmRXgfCYc/m0G/B8bLSWnCkCuB7g10tVrihNOlW20ETlGscyMof81NU8u/4J
ST5F9Glf97vWQtdiSUk2ohEpthfQnmA2XABjyDAuCiylpFRQ5CSYpGsbL8CN
yjnGi5CurGmpN7tmOe7FVLbkFJ4xTFjmFJ3wmtCn9+trEjTMhvFfzOw4EAdW
I5Surdug1bpW2SIHNl97RK5tKB0SZe/pMSS0iNYKS/Wkum+TuhpMX+JKbMSM
p4zEBYOEZUnf2YQfKAEKW0EiV9HRbV0y1KI/UJVIfguB6Af52gH7IE80x8eI
+Qd5tV5o+OOUzav8AJ9hEXvrf+G9Iyk8Oi9wCw4F+BmlmGRrXNNIM/NDyfGD
vKwo5/ggOzYR7i2TRcdtTktoZ7vO2i3O+Ou1WyRDi4BG8UnX5gz4tTXntkwW
6UMVHyHGb6srH+3t7e1+3J/TmVCGYLMfQE4/yKPIUBwFD9V7qdbAXJ+gnuub
AlTFeQJ+GKwq7eS2YXTx0Y+d2W6n25kNOz8R5KA+beDrEkjWxnrxOdbTo8qb
jbBcVZcbF6CzjlutqJDJt0VXwocSo5XKMFB1mhwpKKZMjaJsEBq3DOKIG8jS
yqg85l45u9cNAgdCg/aGJIg8r60mANM1xCV9indC4ocBdb4mF2AtMGhH1Kwh
V/XWFnWuincaq8lIG3hJNaTrUTjOwuhlUvRmGhaXT5wXs9rbODoRhVsMQDPa
qgZGPq1tTctJxTm2uAiiyw9eOiv+gkX9A2SoFDZMNOkWNj1aVR2eQTD7zuzD
A6dXI9KpD5j2UUS+2kcDv/NsiO2bD/QNqknP6nLrlxsdLSQlfX7p6lr1LljX
ltiWOSBdrhcYjRH543qZh23+HOBXLy9JuuD7reAjCwYb1mwTwo6aXp5a7pP0
wS/ONj+oJq1f+E7Z1fHF87PeSZ/a6EiXceopgx/bDYMeIjGsT7Rm0jgj2S5I
kc2s62WfNmV9cYs48EnJa6H6tMQSXQ4mNmpPmCCzEWcPTMaBDI42FGWmldNl
DNog2As52e+zquLx0cuLc0x3v8Af1PjZpTZLq7ltZuBk/owuV7rk8Dhu73YF
veYWUMJOMI18kqvAGfrq6W6X/xx2pa4m/QZ/iAgh/HCUCA3qYL2jPOwjFnys
BQWU3pj7bP7I7UA7JgXQF2uG8VaEAnUf8TtGg5p0uBBZuXagyJL5k7R9SEWx
9CYvbDaFFPeNFS5tchZ15b5AqtqIQFC9IJwfvQf7B12yA4G1Z0fnR9J5jW49
MmMHgt076zwkVzzsXnNVvoOsHocIrKvsS0Ik5kc4BtbiXMsP/Qicpawllkgf
K8HOu9UiWQzbvp9pl7iwR+ajGu8yOL61UkCVIzgNEbXWPhJL4wImm2s3CvtR
m8vzH7Gl8/gil8D8EThoJyRoxeM4kLeiTOGVa2zxHMUTewCObKn5gxyxeZWz
pBHKcHrq7k+UsY1x+AjkiTSbW6xxWw0kqtF8x/xIhc6HcNbcxwOgxcs5h75N
hVFZCZ6aVesWYWOAlPt63StkaGidWJoSEvUyuiuX+GZ49DokeC/+cXIerKGz
XE0VpJZ/hTaxCmVCDPZROuL+vtepqMZH5rTwfTDt7QWE5hDEQta2OQ2DHQeb
Wwc+hlGapjvDWkHdYXE53GYTQvyt1tZsKSshHbotlaVOVI2bYEnJ1Y8eys09
mzfqdf/bZbWz2PjPSEq5lOzsmxUBED6mSOoqaaWulmVePxXQwiwgaOWGhnMw
kc1ACJg9x+rBbeq+JQRY8mppAOfhYCBsdNxD773tGG4NGIIbIsNwOBTiTsha
rWfUwsp+p4urXIUJlgwHw93e4KA33L0aHIwGA/jnn7zIl35G8sef7BPSbHxA
s2Z39F9+QeKJG8bhJ23kVrxft6I0Ohx0aNV9d/umcWq6uecfqPEyZPjvT+Ke
xeOqWT8NSltPdmMxihXXSBy2YovfUNKugGV/BF0qsp1sLXekW9sytbKHEL9v
C9AAKiFgH8laUfSRbUMNVN1Uk5mKWiyhXxODc4US+oxtO47PESBwSd9dnMtq
CdzO6iVY4w2fAY2oBE4CwvKzb09XQ+yMw4/vhpcXL8+uaAZnH+fZHi7IRr6w
pru1ySr8PvgP0zZNJbZNU7XV0abYZK3n+sgooGpLCS2EGILrBD54cUgbiNaa
42U011JjTqhZtjW//rTaVFxzaK15oHnlXtJtmiUTzP2QrYn9JI5YmO7YBcBZ
lY/WO2Tn9vbWqxY4Wayr/6VP3VWMHOM3kssz+j0Fi58BX4wsH0C5L8ED1WiD
2Qv3vjUESA1EzIytEAYMPLZi2+Qeri2wuwjXyk4NAh9hG60WyzE4mTai0CaX
y3GOE3dtJDm7wCCyxIMyZYxd/IeYB45wZ3Ty9eFotIOM23k27O8cHPZ3+oOn
w70Gw/4Qdr+bVQ7KJ7LKwX2AVQ7Cw6xCUgz68O/TnQNHmv2d/s5g0N+pMe2C
PFEbUXBoGJuvOBGMcWap8htt4hb572UT9Rs7e3u7hMlguNc72N/f3Wc8OHmK
Miz1ULgYl9dtpwWirZJHTGkI3WZS1O7aljt1m5S9jrXANiKCpffsIcWmBvv2
4fKQwgXRiIoolJxzY82lm2ssPVDIbeMJW3akxEeHpMfvAVYlkzWR3DaxUIeN
LX9OdX2h9roumr4HQwhFmVaYZxHWtaVVC0BOtJt7YrsUonjth4IdtzVmGum0
QX5szRXgMsFn9uX3jAhPKxBCkGjWutdMJscMoIyzd4AGxvjUlbF3W1DlPnb4
B2YuvS88teIT9mtIkK8tQAjtBjKc/4/dgAojjALZSrJT2F48Bg/YOkwny0yV
MYl9UYViDlCHkoc4fb7oDtzMmHHisQlmk4u1CQtbBLMzK5wIYccxA7MA7oDH
0Wm4DXezyRuHK+BKa86CT0T62Qjw2fU6SrWqoy+qdNrdMzXBef4es2XQLrvr
xqQD4rlcMNILd9mhfVfRxv2j4Nc5+ZGPr//Sv37iA+E4TKSjIABbJXPst9Gc
c+05CJJKkHXe2vgLEX2q/jtepqYZkrI58bcbMlCrjKocAUCNp02+cKNfb6es
oRoFXVfBeKklDuh7lWCzbCtqVN5o0Iqat2E+AK+l8BSblbS1bajAGaniQhsS
r2plNcP9PjWttCvE4Pa2cJQX4fB9eVl0cTsyti3KCpRqSioLShiAIEw6NWkV
yzxDQ9ipf6gjf07FttjkNi2OH8QSiZ11hFOsuICCM6Wo3FonVl0dVWlKq4kx
zQ7WuNru29BCRBbMU8PGFdcAueRaBcnWw6ERmcq2rEHYPu7tLM107G2v6+HY
tWuuPQwnuB9flqw3qPGOEa63U6hxpz9Oeuw+RFinQJi1iqh+Yuw8UXyBkoDV
E9naqBqnfnl0CjoD+ujgf4Hq1yHmuuZYxxlsYwOmZvmV+Q5vl5OaIQ9aEeL8
gJ9oBG/m404t+JV5MLZkxlZpsiRrj8XG5XysSyP8vB8Gd08k1XqBrwbTVhso
4qUTBN0wPRT/DQd7hx3pzA4NdBGWVBPFFTgXjouiuQ7CFd8RaeHH4ZbCpa+c
hSLMH6ml+As2uTO+hkKpqaNv6W7UReyZ2EJgqH+23/IS/yfqn1bZ03DuTyyA
0iW6IKUYZbcn5Fhu/nx10Z3d/f+vi36ictjNaoMjI8z6tnBN/vRgLZUFiNKP
yawojG6ZXSGzV79xzBdHSY6mYE6ETaBprnEbIihdXCi1zad4GpEskRsLpwHK
u0fNW00gM2Hu2pfu8D7Vw/OdrtmFvgPdFV6K8BPo7r4KT51yNvmmWGKUc1R/
x/d89g4PdvD24ZHbQvjLJWllGvOpeF+42YeKLz3Wi4nYr9xyoY2VGDeJW3vB
nfnmngsOhB1RsEi6wqdr0SMi0WfeKtrl/8Zj/LFfVLUL6G1X1OjWAl3Aje6t
FP6eDzimb4pbvNjo7v9Ks4YofG54+hWDDbCuBZKJIzlOl0o1RW9bvwznOBOG
a/HyAh4DWCfAXoAVSqs6N7o2gaJ5CjgTbKfLeWoM9c5bp9yFuwvduEWHw3us
LWMgmAblCS1aooRz17VkDnA0wvVQfSLkDki3N+ETn1e4e48bwHAm3w46+is3
+DUcG5SKBphoXivRZRRhYWBrizYVX6PCFjIp5KXb5bj+2d0j2L9X3wu0sH6t
LeKFE/ctN2eZKuH/KwAtSrgX4Gnn8+wxDo5PdbaO2h2umU/ioNxdwfoQUrg5
2PW3MywHkMArlaUJ5UA2w2vWe+qjkTQj590U3qO2Y8Uhfw47htoPfVGt3ajQ
BGk0tU4Y4i+y30R8mr2oE57irPOPDlnbqe3aSHOzweFGPdzYNs1EWEO9ZWcE
+q1em46fCAE8XS9i5G+RiKgRMQqVSDuVEndNWueC8DaAwO5F9G38FaRMrI3o
3O7ERxzs52k63oOLjEnP810xbd64yUo3MB/mYiCCQ07a+wSaClWoupRvW+r7
wczO5tae7F0Ze9OL7dfzA4PkQt3oPrO+BgcLf+UKeED8830tNGkAYGNEnCaY
NqdoeHBtY1CU9ITOa6GhmeFb2lEFuObISGU2p70FUhzEJL3J2ddGp99GpgCW
6rM0GD4HHO1gE2SJxA+XeZ2icayAgasUYLnrecMD9OX8jsykqDFP52ZZ2pKw
G4ri2XW+JYpWKFMLRJcjIqwy6bkC1Z/Ya491WfJTdhuCVJ/Q/RRh8nsjuO9o
hPhPlKWHZ5Sx8uAlqClmn0+cPio5bTT5fIIjIsGRn09wujYWWKHbwuuh8TB+
ahvZSMLSDyzb6gd1snWWQEh19IO/DdQX/wPI6QEFqkoAAA==

-->

</rfc>
