<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="pre5378Trust200902" docName="draft-ietf-lamps-rfc5273bis-04" category="std" consensus="true" submissionType="IETF" obsoletes="5273, 6402" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CMC: Transport Protocols">Certificate Management over CMS (CMC): Transport Protocols</title>

    <author initials="J." surname="Mandel, Ed" fullname="Joseph Mandel">
      <organization>AKAYLA, Inc.</organization>
      <address>
        <email>joe@akayla.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner, Ed" fullname="Sean Turner (editor)">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>

    <date year="2025" month="April" day="30"/>

    <area>SEC</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Public Key Infrastructure</keyword> <keyword>Cryptographic Message Syntax</keyword> <keyword>Certificate Management</keyword> <keyword>Transport Protocols</keyword>

    <abstract>


<?line 68?>

<t>This document defines a number of transport mechanisms that are used
to move CMC (Certificate Management over CMS (Cryptographic Message
Syntax)) messages.  The transport mechanisms described in this
document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes RFCs 5273 and 6402.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5273bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG LAMPS mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/seanturner/cmcbis"/>.</t>
    </note>


  </front>

  <middle>


<?line 78?>

<section anchor="introduction"><name>Introduction</name>

<t>This document defines a number of transport methods that are used to
move CMC messages (defined in <xref target="CMC-STRUCT"/>).  The transport
mechanisms described in this document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes <xref target="CMC-TRANSv1"/> and <xref target="CMC-Updates"/>. This
document also incorporates <xref target="erratum3593"/>.</t>

</section>
<section anchor="requirements-terminology"><name>Requirements Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="changes-since-5273-and-6402"><name>Changes Since 5273 and 6402</name>

<aside>  <t>Note: For now, this section will be list of the changes introduced
  by each version. After WGLC, this section will be finalized.</t>
</aside>

<t>-04 WG version:</t>

<t><list style="symbols">
  <t>Added text to explain file extensions.</t>
</list></t>

<t>-03 WG version:</t>

<t><list style="symbols">
  <t>No changes.</t>
</list></t>

<t>-02 WG version:</t>

<t><list style="symbols">
  <t>Updated this section.</t>
</list></t>

<t>-01 WG version changes:</t>

<t><list style="symbols">
  <t>Added requirement that TLS 1.2 implementations follow <xref target="BCP195"/></t>
</list></t>

<t>-00 WG version changes:</t>

<t><list style="symbols">
  <t>Added pre-5378 boilerplate</t>
</list></t>

<t>-02 individual version changes:</t>

<t><list style="symbols">
  <t>Replaced TLS 1.0 with TLS 1.2 or later</t>
</list></t>

<t>-01 individual version changes:</t>

<t><list style="symbols">
  <t>Changed RFC 5272 references to draft-mandel-lamps-rfc5272bis</t>
  <t>Merged <xref target="erratum3593"/></t>
</list></t>

<t>-00 individual version changes:</t>

<t><list style="symbols">
  <t>Moved 2119-text to its own section</t>
  <t>Added "Changes Since 5273 and 6402" section</t>
  <t>Updated references</t>
  <t>Merged <xref target="CMC-Updates"/> text</t>
  <t>Updated and moved Acknowledgments</t>
</list></t>

</section>
<section anchor="file-based-protocol"><name>File-Based Protocol</name>

<t>Enrollment messages and responses may be transferred between clients
and servers using file-system-based mechanisms, such as when
enrollment is performed for an off-line client.  When files are used
to transport binary, Full PKI Request or Full PKI Response messages,
there <bcp14>MUST</bcp14> be only one instance of a request or response message in a
single file. crq and crp stand for Full PKI Request/Response,
respectively; for clarity we define file extensions for them. The
following file type extensions <bcp14>SHOULD</bcp14> be used:</t>

<texttable title="File PKI Request/Response Identification" anchor="file-id">
      <ttcol align='left'>Message Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <c>Simple PKI Request</c>
      <c>.p10</c>
      <c>Full PKI Request</c>
      <c>.crq</c>
      <c>Simple PKI Response</c>
      <c>.p7c</c>
      <c>Full PKI Response</c>
      <c>.crp</c>
</texttable>

</section>
<section anchor="mail-based-protocol"><name>Mail-Based Protocol</name>

<t>MIME wrapping is defined for those environments that are MIME native.
The basic mime wrapping in this section is taken from <xref target="SMIMEV4"/>.
When using a mail-based protocol, MIME wrapping between the layers of
CMS wrapping is optional.  Note that this is different from the
standard S/MIME (Secure MIME) message.</t>

<t>Simple enrollment requests are encoded using the "application/pkcs10"
content type.  A file name <bcp14>MUST</bcp14> be included either in a content-type
or a content-disposition statement.  The extension for the file <bcp14>MUST</bcp14>
be ".p10".</t>

<t>Simple enrollment response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  An smime-type parameter <bcp14>MUST</bcp14> be on the
content-type statement with a value of "certs-only".  A file name
with the ".p7c" extension <bcp14>MUST</bcp14> be specified as part of the content-
type or content-disposition statement.</t>

<t>Full enrollment request messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-request".  A file name with the ".p7m" extension
<bcp14>MUST</bcp14> be specified as part of the content-type or content-disposition
statement.</t>

<t>Full enrollment response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-response".  A file name with the ".p7m"
extension <bcp14>MUST</bcp14> be specified as part of the content-type or content-
disposition statement.</t>

<texttable title="MIME PKI Request/Response Identification" anchor="mime-id">
      <ttcol align='left'>Item</ttcol>
      <ttcol align='left'>MIME Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <ttcol align='left'>SMIME Type</ttcol>
      <c>Simple PKI Request</c>
      <c>application/pkcs10</c>
      <c>.p10</c>
      <c>N/A</c>
      <c>Full PKI Request</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-request</c>
      <c>Simple PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7c</c>
      <c>certs-only</c>
      <c>Full PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-response</c>
</texttable>

</section>
<section anchor="httphttps-based-protocol"><name>HTTP/HTTPS-Based Protocol</name>

<t>This section describes the conventions for use of HTTP <xref target="HTTP"/> as a
transport layer.  In most circumstances, the use of HTTP over TLS
<xref target="HTTP"/> provides any necessary content protection from eavesdroppers.</t>

<t>In order for CMC clients and servers using HTTP to interoperate, the
following rules apply.</t>

<ul empty="true"><li>
  <t>Clients <bcp14>MUST</bcp14> use the POST method to submit their requests.</t>
</li></ul>

<ul empty="true"><li>
  <t>Servers <bcp14>MUST</bcp14> use the 200 response code for successful responses.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients <bcp14>MAY</bcp14> attempt to send HTTP requests using TLS 1.2 <xref target="TLS"/> or
later, although servers are not required to support TLS. If
TLS 1.2 <xref target="TLS"/> (or later) is used then implementations <bcp14>MUST</bcp14> follow
the recommendations in <xref target="BCP195"/>.</t>
</li></ul>

<ul empty="true"><li>
  <t>Servers <bcp14>MUST NOT</bcp14> assume client support for any type of HTTP
authentication such as cookies, Basic authentication, or Digest
authentication.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients and servers are expected to follow the other rules and
restrictions in <xref target="HTTP"/>.  Note that some of those rules are for
HTTP methods other than POST; clearly, only the rules that apply
to POST are relevant for this specification.</t>
</li></ul>

<section anchor="pki-request"><name>PKI Request</name>

<t>A PKI Request using the POST method is constructed as follows:</t>

<t>The Content-Type header <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

<t>The body of the message is the binary value of the encoding of the
PKI Request.</t>

</section>
<section anchor="pki-response"><name>PKI Response</name>

<t>An HTTP-based PKI Response is composed of the appropriate HTTP
headers, followed by the binary value of the BER (Basic Encoding
Rules) encoding of either a Simple or Full PKI Response.</t>

<t>The Content-Type header <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

</section>
</section>
<section anchor="tcp-based-protocol"><name>TCP-Based Protocol</name>

<t>When CMC messages are sent over a TCP-based connection, no wrapping
is required of the message.  Messages are sent in their binary
encoded form.</t>

<t>The client closes a connection after receiving a response, or it
issues another request to the server using the same connection.
Reusing one connection for multiple successive requests, instead of
opening multiple connections that are only used for a single request,
is <bcp14>RECOMMENDED</bcp14> for performance and resource conservation reasons.  A
server <bcp14>MAY</bcp14> close a connection after it has been idle for some period
of time; this timeout would typically be several minutes long.</t>

<t>CMC requires a registered port number to send and receive CMC
messages over TCP.  The title of this IP Protocol number is
"pkix-cmc".  The value of this TCP port is 5318.</t>

<t>Prior to <xref target="CMC-Updates"/>, CMC did not have a registered port number and
used an externally configured port from the Private Port range.
Client implementations <bcp14>MAY</bcp14> want to continue to allow for this to
occur.  Servers <bcp14>SHOULD</bcp14> change to use the new port.  It is expected
that HTTP will continue to be the primary transport method used by
CMC installations.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA has assigned a TCP port number in the Registered Port Number
range for the use of CMC.</t>

<figure><artwork><![CDATA[
  Service name: pkix-cmc
  Port Number: 5318
  Transport protocol: TCP
  Description: PKIX Certificate Management using CMS (CMC)
  Reference: RFC 6402
  Assignee: iesg@ietf.org
  Contact: chair@ietf.org
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Mechanisms for thwarting replay attacks may be required in particular
implementations of this protocol depending on the operational
environment.  In cases where the Certification Authority (CA)
maintains significant state information, replay attacks may be
detectable without the inclusion of the optional nonce mechanisms.
Implementers of this protocol need to carefully consider
environmental conditions before choosing whether or not to implement
the senderNonce and recipientNonce attributes described in
<xref section="6.6" sectionFormat="of" target="CMC-STRUCT"/>.  Developers of state-constrained PKI clients are
strongly encouraged to incorporate the use of these attributes.</t>

<t>Initiation of a secure communications channel between an end-entity
and a CA or Registration Authority (RA) -- and, similarly, between an
RA and another RA or CA -- necessarily requires an out-of-band trust
initiation mechanism.  For example, a secure channel may be
constructed between the end-entity and the CA via IPsec <xref target="IPsec"/> or
TLS <xref target="TLS"/>.  Many such schemes exist, and the choice of any particular
scheme for trust initiation is outside the scope of this document.
Implementers of this protocol are strongly encouraged to consider
generally accepted principles of secure key management when
integrating this capability within an overall security architecture.</t>

<t>In some instances, no prior out-of-band trust will have been
initiated prior to use of this protocol.  This can occur when the
protocol itself is being used to download onto the system the set of
trust anchors to be used for these protocols.  In these instances,
the Enveloped Data content type (<xref section="3.2.1.3.3" sectionFormat="of" target="CMC-STRUCT"/>)
must be used to provide the same shrouding that TLS would have
provided.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">

<reference anchor="erratum3593" target="https://www.rfc-editor.org/errata/eid3593">
  <front>
    <title>RFC 5273 erratum 3593</title>
    <author >
      <organization></organization>
    </author>
    <date year="2013" month="April"/>
  </front>
</reference>


<reference anchor="BCP195">
  <front>
    <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
    <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
    <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
    <author fullname="T. Fossati" initials="T." surname="Fossati"/>
    <date month="November" year="2022"/>
    <abstract>
      <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
      <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="195"/>
  <seriesInfo name="RFC" value="9325"/>
  <seriesInfo name="DOI" value="10.17487/RFC9325"/>
</reference>


<reference anchor="CMC-STRUCT">
   <front>
      <title>Certificate Management over CMS (CMC)</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="19" month="March" year="2025"/>
      <abstract>
	 <t>   This document defines the base syntax for CMC, a Certificate
   Management protocol using the Cryptographic Message Syntax (CMS).
   This protocol addresses two immediate needs within the Internet
   Public Key Infrastructure (PKI) community:

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5272bis-03"/>
   
</reference>

<reference anchor="HTTP">
  <front>
    <title>HTTP Semantics</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
      <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="97"/>
  <seriesInfo name="RFC" value="9110"/>
  <seriesInfo name="DOI" value="10.17487/RFC9110"/>
</reference>

<reference anchor="IPsec">
  <front>
    <title>Security Architecture for the Internet Protocol</title>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <author fullname="K. Seo" initials="K." surname="Seo"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4301"/>
  <seriesInfo name="DOI" value="10.17487/RFC4301"/>
</reference>

<reference anchor="SMIMEV4">
  <front>
    <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="B. Ramsdell" initials="B." surname="Ramsdell"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="April" year="2019"/>
    <abstract>
      <t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 4.0. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 5751.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8551"/>
  <seriesInfo name="DOI" value="10.17487/RFC8551"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="TLS">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
    <author fullname="T. Dierks" initials="T." surname="Dierks"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2008"/>
    <abstract>
      <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5246"/>
  <seriesInfo name="DOI" value="10.17487/RFC5246"/>
</reference>


<reference anchor="CMC-TRANSv1">
   <front>
      <title>Certificate Management over CMS (CMC): Transport Protocols</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="19" month="March" year="2025"/>
      <abstract>
	 <t>   This document defines a number of transport mechanisms that are used
   to move CMC (Certificate Management over CMS (Cryptographic Message
   Syntax)) messages.  The transport mechanisms described in this
   document are HTTP, file, mail, and TCP.

   This document obsoletes RFCs 5273 and 6402.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5273bis-03"/>
   
</reference>

<reference anchor="CMC-Updates">
  <front>
    <title>Certificate Management over CMS (CMC) Updates</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="November" year="2011"/>
    <abstract>
      <t>This document contains a set of updates to the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This document updates RFC 5272, RFC 5273, and RFC 5274.</t>
      <t>The new items in this document are: new controls for future work in doing server side key generation, definition of a Subject Information Access value to identify CMC servers, and the registration of a port number for TCP/IP for the CMC service to run on. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6402"/>
  <seriesInfo name="DOI" value="10.17487/RFC6402"/>
</reference>




    </references>


<?line 338?>

<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>Obviously, the authors of this version of the document would like to
thank Jim Schaad and Michael Myers for their work on the previous
version of this document.</t>

<t>The acknowledgment from the previous version of this document follows:</t>

<t>The authors and the PKIX Working Group are grateful for the
participation of Xiaoyi Liu and Jeff Weinstein in helping to author
the original versions of this document.</t>

<t>The authors would like to thank Brian LaMacchia for his work in
developing and writing up many of the concepts presented in this
document.  The authors would also like to thank Alex Deacon and Barb
Fox for their contributions.</t>

</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="J." surname="Schaad" fullname="Jim Schaad">
      <organization>August Cellars</organization>
      <address>
      </address>
    </contact>
    <contact initials="M." surname="Myers" fullname="Michael Myers">
      <organization>TraceRoute Security, Inc.</organization>
      <address>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

