<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.3 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="o-*+"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-uta-rfc7525bis-00" category="bcp" obsoletes="7525">

  <front>
    <title abbrev="TLS Recommendations">Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>

    <author initials="Y." surname="Sheffer" fullname="Yaron Sheffer">
      <organization>Intuit</organization>
      <address>
        <email>yaronf.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="R." surname="Holz" fullname="Ralph Holz">
      <organization>University of Twente</organization>
      <address>
        <email>ralph.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="P." surname="Saint-Andre" fullname="Peter Saint-Andre">
      <organization>Mozilla</organization>
      <address>
        <email>stpeter@mozilla.com</email>
      </address>
    </author>

    <date year="2020" month="October" day="30"/>

    <area>Applications</area>
    <workgroup>UTA Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation.  This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t>

<t>This document was published as RFC 7525 when the industry was in the midst of its transition to TLS 1.2. Years later this transition is largely complete and TLS 1.3 is widely available. Given the new environment, we believe new guidance is needed.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>Transport Layer Security (TLS) <xref target="RFC5246"/> and Datagram Transport Security Layer (DTLS) <xref target="RFC6347"/> are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the years leading to 2015, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation.  For instance, both the AES-CBC <xref target="RFC3602"/> and RC4 <xref target="RFC7465"/> encryption algorithms, which together have been the most widely deployed ciphers, have been attacked in the context of TLS.  A companion document <xref target="RFC7457"/> provides detailed information about these attacks and will help the reader understand the rationale behind the recommendations provided here.</t>

<t>The TLS community reacted to these attacks in two ways:</t>

<t><list style="symbols">
  <t>Detailed guidance was published on the use of TLS 1.2 and earlier protocol versions. This guidance is included in the original <xref target="RFC7525"/> and mostly retained in this revised version.</t>
  <t>A new protocol version was released, TLS 1.3 <xref target="RFC8446"/>, which largely mitigates or resolves these attacks.</t>
</list></t>

<t>Those who implement and deploy TLS and DTLS, in particular versions 1.2 or earlier of these protocols, need guidance on how TLS can be used securely.  This document provides guidance for deployed services as well as for software implementations, assuming the implementer expects his or her code to be deployed in environments defined in <xref target="applicability"/>. Concerning deployment, this document targets a wide audience – namely, all deployers who wish to add authentication (be it one-way only or mutual), confidentiality, and data integrity protection to their communications.</t>

<t>The recommendations herein take into consideration the security of various mechanisms, their technical maturity and interoperability, and their prevalence in implementations at the time of writing.  Unless it is explicitly called out that a recommendation applies to TLS alone or to DTLS alone, each recommendation applies to both TLS and DTLS.</t>

<t>As noted, the TLS 1.3 specification resolves many of the vulnerabilities listed in this document. A system that deploys TLS 1.3 should have fewer vulnerabilities than TLS 1.2 or below. This document is being republished with this in mind, and with an explicit goal to migrate most uses of TLS 1.2 into TLS 1.3.</t>

<t>These are minimum recommendations for the use of TLS in the vast majority of implementation and deployment scenarios, with the exception of unauthenticated TLS (see <xref target="applicability"/>). Other specifications that reference this document can have stricter requirements related to one or more aspects of the protocol, based on their particular circumstances (e.g., for use with a particular application protocol); when that is the case, implementers are advised to adhere to those stricter requirements. Furthermore, this document provides a floor, not a ceiling, so stronger options are always allowed (e.g., depending on differing evaluations of the importance of cryptographic strength vs. computational load).</t>

<t>Community knowledge about the strength of various algorithms and feasible attacks can change quickly, and experience shows that a Best Current Practice (BCP) document about security is a point-in-time statement.  Readers are advised to seek out any errata or updates that apply to this document.</t>

</section>
<section anchor="terminology" title="Terminology">

<t>A number of security-related terms in this document are used in the sense defined in <xref target="RFC4949"/>.</t>

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="rec" title="General Recommendations">

<t>This section provides general recommendations on the secure use of TLS. Recommendations related to cipher suites are discussed in the following section.</t>

<section anchor="protocol-versions" title="Protocol Versions">

<section anchor="rec-versions" title="SSL/TLS Protocol Versions">

<t>It is important both to stop using old, less secure versions of SSL/TLS and to start using modern, more secure versions; therefore, the following are the recommendations concerning TLS/SSL protocol versions:</t>

<t><list style="symbols">
  <t>Implementations MUST NOT negotiate SSL version 2.
             <vspace blankLines="1" />
Rationale: Today, SSLv2 is considered insecure <xref target="RFC6176"/>.</t>
  <t>Implementations MUST NOT negotiate SSL version 3.
             <vspace blankLines="1" />
Rationale: SSLv3 <xref target="RFC6101"/> was an improvement over SSLv2 and plugged some significant security holes but did not support strong cipher suites. SSLv3 does not support TLS extensions, some of which (e.g., renegotiation_info <xref target="RFC5746"/>) are security-critical.  In addition, with the emergence of the POODLE attack <xref target="POODLE"/>, SSLv3 is now widely recognized as fundamentally insecure.  See <xref target="DEP-SSLv3"/> for further details.</t>
  <t>Implementations MUST NOT negotiate TLS version 1.0 <xref target="RFC2246"/>.
             <vspace blankLines="1" />
Rationale: TLS 1.0 (published in 1999) does not support many modern, strong cipher suites. In addition, TLS 1.0 lacks a per-record Initialization Vector (IV) for CBC-based cipher suites and does not warn against common padding errors. 
             <vspace blankLines="1" />
NOTE: This recommendation has been changed from SHOULD NOT to MUST NOT on the assumption that <xref target="I-D.ietf-tls-oldversions-deprecate"/> will be published as an RFC before this document.</t>
  <t>Implementations MUST NOT negotiate TLS version 1.1 <xref target="RFC4346"/>.
             <vspace blankLines="1" />
Rationale: TLS 1.1 (published in 2006) is a security improvement over TLS 1.0 but still does not support certain stronger cipher suites.
             <vspace blankLines="1" />
NOTE: This recommendation has been changed from SHOULD NOT to MUST NOT on the assumption that <xref target="I-D.ietf-tls-oldversions-deprecate"/> will be published as an RFC before this document.</t>
  <t>Implementations MUST support TLS 1.2 <xref target="RFC5246"/> and MUST prefer to negotiate TLS version 1.2 over earlier versions of TLS.
             <vspace blankLines="1" />
Rationale: Several stronger cipher suites are available only with TLS 1.2 (published in 2008). In fact, the cipher suites recommended by this document for TLS 1.2 (<xref target="rec-cipher"/> below) are only available in this version.</t>
  <t>Implementations SHOULD support TLS 1.3 <xref target="RFC8446"/> and if implemented, MUST prefer to negotiate TLS 1.3 over earlier versions of TLS.
             <vspace blankLines="1" />
Rationale: TLS 1.3 is a major overhaul to the protocol and resolves many of the security issues with TLS 1.2. We note that as long as TLS 1.2 is still allowed by a particular implementation, even if it defaults to TLS 1.3, implementers MUST still follow all the recommendations in this document.</t>
  <t>Implementations of “greenfield” protocols or deployments, where there is no need to support legacy endpoints, SHOULD support TLS 1.3, with no negotiation of earlier versions. Similarly, we RECOMMEND that new protocol designs that embed the TLS mechanisms (such as QUIC has done <xref target="I-D.ietf-quic-tls"/>) include TLS 1.3.
             <vspace blankLines="1" />
Rationale: secure deployment of TLS 1.3 is significantly easier and less error prone than the secure deployment of TLS 1.2.</t>
</list></t>

<t>This BCP applies to TLS 1.2, 1.3 and to earlier versions. It is not safe for readers to assume that the recommendations in this BCP apply to any future version of TLS.</t>

</section>
<section anchor="dtls-protocol-versions" title="DTLS Protocol Versions">

<t>DTLS, an adaptation of TLS for UDP datagrams, was introduced when TLS 1.1 was published.  The following are the recommendations with respect to DTLS:</t>

<t><list style="symbols">
  <t>Implementations MUST NOT negotiate DTLS version 1.0 <xref target="RFC4347"/>.
<vspace blankLines="1" />
Version 1.0 of DTLS correlates to version 1.1 of TLS (see above).
<vspace blankLines="1" />
NOTE: This recommendation has been changed from SHOULD NOT to MUST NOT on the assumption that <xref target="I-D.ietf-tls-oldversions-deprecate"/> will be published as an RFC before this document.</t>
  <t>Implementations MUST support and (unless a higher version is available) MUST prefer to negotiate DTLS version 1.2 <xref target="RFC6347"/></t>
</list></t>

<t><vspace blankLines="1" />
  Version 1.2 of DTLS correlates to version 1.2 of TLS (see above).
  (There is no version 1.1 of DTLS.)</t>

<t><list style="symbols">
  <t>Implementations SHOULD support and, if available, MUST prefer to negotiate DTLS version 1.3 as specified in <xref target="I-D.ietf-tls-dtls13"/>.
<vspace blankLines="1" />
Version 1.3 of DTLS correlates to version 1.3 of TLS (see above).</t>
</list></t>

</section>
<section anchor="rec-fallback" title="Fallback to Lower Versions">

<t>Clients that “fall back” to lower versions of the protocol after the server rejects higher versions of the protocol MUST NOT fall back to SSLv3 or earlier. Implementations of TLS/DTLS 1.2 or earlier MUST implement the Fallback SCSV mechanism <xref target="RFC7507"/> to prevent
such fallback being forced by an attacker.</t>

<t>Rationale: Some client implementations revert to lower versions of TLS or even to SSLv3 if the server rejected higher versions of the protocol. This fallback can be forced by a man-in-the-middle (MITM) attacker. TLS 1.0 and SSLv3 are significantly less secure than TLS 1.2 but at least TLS 1.0 is still allowed by many web servers. As of this writing, the Fallback SCSV solution is widely deployed and proven as a robust solution to this problem.</t>

</section>
</section>
<section anchor="strict-tls" title="Strict TLS">

<t>The following recommendations are provided to help prevent SSL Stripping (an attack that is summarized in Section 2.1 of <xref target="RFC7457"/>):</t>

<t><list style="symbols">
  <t>In cases where an application protocol allows implementations or deployments a choice between strict TLS configuration and dynamic upgrade from unencrypted to TLS-protected traffic (such as STARTTLS), clients and servers SHOULD prefer strict TLS configuration.</t>
  <t>Application protocols typically provide a way for the server to offer TLS during an initial protocol exchange, and sometimes also provide a way for the server to advertise support for TLS (e.g., through a flag indicating that TLS is required); unfortunately, these indications are sent before the communication channel is encrypted. A client SHOULD attempt to negotiate TLS even if these indications are not communicated by the server.</t>
  <t>HTTP client and server implementations MUST support the HTTP Strict Transport
    Security (HSTS) header <xref target="RFC6797"/>, in order to allow Web servers to 
    advertise that they are
    willing to accept TLS-only clients.</t>
  <t>Web servers SHOULD use HSTS to indicate that they are willing to accept TLS-only clients, unless they are deployed in such a way that using HSTS would in fact weaken overall security (e.g., it can be problematic to use HSTS with self-signed certificates, as described in Section 11.3 of <xref target="RFC6797"/>).</t>
</list></t>

<t>Rationale: Combining unprotected and TLS-protected communication opens the way to SSL Stripping and similar attacks, since an initial part of the communication is not integrity protected and therefore can be manipulated by an attacker whose goal is to keep the communication in the clear.</t>

</section>
<section anchor="rec-compress" title="Compression">

<t>In order to help prevent compression-related attacks (summarized in Section 2.6 of <xref target="RFC7457"/>), when using TLS 1.2 implementations and deployments SHOULD disable TLS-level compression (Section 6.2.2 of <xref target="RFC5246"/>), unless the application protocol in question has been shown not to be open to such attacks. Note: this recommendation applies to TLS 1.2 only, because compression has been removed from TLS 1.3.</t>

<t>Rationale: TLS compression has been subject to security attacks, such as the CRIME attack.</t>

<t>Implementers should note that compression at higher protocol levels can allow an active attacker to extract cleartext information from the connection. The BREACH attack is one such case. These issues can only be mitigated outside of TLS and are thus outside the scope of this document. See Section 2.6 of <xref target="RFC7457"/> for further details.</t>

</section>
<section anchor="rec-resume" title="TLS Session Resumption">

<t>If TLS session resumption is used in the context of TLS 1.2, care ought to be taken to do so safely. In particular, when using session tickets <xref target="RFC5077"/>, the resumption information MUST be authenticated and encrypted to prevent modification or eavesdropping by an attacker. Further recommendations apply to session tickets:</t>

<t><list style="symbols">
  <t>A strong cipher suite MUST be used when encrypting the ticket (as least as strong as the main TLS cipher suite).</t>
  <t>Ticket keys MUST be changed regularly, e.g., once every week, so as not to negate the benefits of forward secrecy (see <xref target="sec-pfs"/> for details on forward secrecy).</t>
  <t>For similar reasons, session ticket validity SHOULD be limited to a reasonable duration (e.g., half as long as ticket key validity).</t>
</list></t>

<t>Rationale: session resumption is another kind of TLS handshake, and therefore must be as secure as the initial handshake. This document (<xref target="detail"/>) recommends the use of cipher suites that provide forward secrecy, i.e. that prevent an attacker who gains momentary access to the TLS endpoint (either client or server) and its secrets from reading either past or future communication. The tickets must be managed so as not to negate this security property.</t>

</section>
<section anchor="tls-renegotiation" title="TLS Renegotiation">

<t>Where handshake renegotiation is implemented, both clients and servers MUST implement the renegotiation_info extension, as defined in <xref target="RFC5746"/>. Note: this recommendation applies to TLS 1.2 only, because renegotiation has been removed from TLS 1.3.</t>

<t>The most secure option for countering the Triple Handshake attack is to refuse any change of certificates during renegotiation.  In addition, TLS clients SHOULD apply the same validation policy for all certificates received over a connection.  The <xref target="triple-handshake"/> document suggests several other possible countermeasures, such as binding the master secret to the full handshake (see <xref target="SESSION-HASH"/>) and binding the abbreviated session resumption handshake to the original full handshake.  Although the latter two techniques are still under development and thus do not qualify as current practices, those who implement and deploy TLS are advised to watch for further development of appropriate countermeasures.</t>

</section>
<section anchor="server-name-indication" title="Server Name Indication">

<t>TLS implementations MUST support the Server Name Indication (SNI) extension defined in Section 3 of <xref target="RFC6066"/> for those higher-level protocols that would benefit from it, including HTTPS. However, the actual use of SNI in particular circumstances is a matter of local policy.  Implementers are strongly encouraged to support TLS Encrypted Client Hello (formerly called Encrypted SNI) once <xref target="I-D.ietf-tls-esni"/> has been standardized.</t>

<t>Rationale: SNI supports deployment of multiple TLS-protected virtual servers on a single
      address, and therefore enables fine-grained security for these virtual servers,
      by allowing each one to have its own certificate. However, SNI also leaks the 
      target domain for a given connection; this information leak will be plugged by 
      use of TLS Encrypted Client Hello.</t>

</section>
</section>
<section anchor="detail" title="Recommendations: Cipher Suites">

<t>TLS and its implementations provide considerable flexibility in the
         selection of cipher suites. Unfortunately, some available cipher
         suites are insecure, some do not provide the targeted security
         services, and some no longer provide enough security.  Incorrectly
         configuring a server leads to no or reduced security.  This section
         includes recommendations on the selection and negotiation of
         cipher suites.</t>

<section anchor="rec-cipher-guidelines" title="General Guidelines">

<t>Cryptographic algorithms weaken over time as cryptanalysis improves: algorithms that were once considered strong become weak. Such algorithms need to be phased out over time and replaced with more secure cipher suites. This helps to ensure that the desired security properties still hold. SSL/TLS has been in existence for almost 20 years and many of the cipher suites that have been recommended in various versions of SSL/TLS are now considered weak or at least not as strong as desired. Therefore, this section modernizes the recommendations concerning cipher suite selection.</t>

<t><list style="symbols">
  <t>Implementations MUST NOT negotiate the cipher suites with 
             NULL encryption.
             <vspace blankLines="1" />
             Rationale: The NULL cipher suites do not encrypt traffic and 
             so provide no confidentiality services. Any entity in the 
             network with access to the connection can view the plaintext 
             of contents being exchanged by the client and server.<vspace />
             (Nevertheless, this document does not discourage software from
             implementing NULL cipher suites, since they can be useful for 
             testing and debugging.)</t>
  <t>Implementations MUST NOT negotiate RC4 cipher suites. 
             <vspace blankLines="1" />
             Rationale: The RC4 stream cipher has a variety of cryptographic 
             weaknesses, as documented in <xref target="RFC7465"/>.
     Note that DTLS specifically forbids the use of RC4 already.</t>
  <t>Implementations MUST NOT negotiate cipher suites offering less 
             than 112 bits of security, including so-called “export-level” 
             encryption (which provide 40 or 56 bits of security).
             <vspace blankLines="1" />
             Rationale: Based on <xref target="RFC3766"/>, at least 112 bits 
             of security is needed.  40-bit and 56-bit security are considered 
             insecure today.  TLS 1.1 and 1.2 never negotiate 40-bit or 56-bit 
             export ciphers.</t>
  <t>Implementations SHOULD NOT negotiate cipher suites that use 
             algorithms offering less than 128 bits of security.
             <vspace blankLines="1" />
             Rationale: Cipher suites that offer between 112-bits and 128-bits 
             of security are not considered weak at this time; however, it is 
             expected that their useful lifespan is short enough to justify 
             supporting stronger cipher suites at this time.  128-bit ciphers 
             are expected to remain secure for at least several years, and 
             256-bit ciphers until the next fundamental technology 
             breakthrough.  Note that, because of so-called 
             “meet-in-the-middle” attacks <xref target="Multiple-Encryption"/>,
             some legacy cipher suites (e.g., 168-bit 3DES) have an effective 
             key length that is smaller than their nominal key length (112 
             bits in the case of 3DES).  Such cipher suites should be 
             evaluated according to their effective key length.</t>
  <t>Implementations SHOULD NOT negotiate cipher suites based on 
             RSA key transport, a.k.a. “static RSA”.
             <vspace blankLines="1" />
             Rationale: These cipher suites, which have assigned values starting 
             with the string “TLS_RSA_WITH_*”, have several drawbacks, especially
             the fact that they do not support forward secrecy.</t>
  <t>Implementations MUST support and prefer to negotiate cipher suites 
             offering forward secrecy, such as those in the Ephemeral 
             Diffie-Hellman and Elliptic Curve Ephemeral Diffie-Hellman (“DHE” 
             and “ECDHE”) families.
             <vspace blankLines="1" />
             Rationale: Forward secrecy (sometimes called “perfect forward 
             secrecy”) prevents the recovery of information that was encrypted 
             with older session keys, thus limiting the amount of time during 
             which attacks can be successful. See <xref target="sec-pfs"/> for 
             a detailed discussion.</t>
</list></t>

</section>
<section anchor="rec-cipher" title="Recommended Cipher Suites">

<t>Given the foregoing considerations, implementation and deployment of the following cipher suites is RECOMMENDED:</t>

<t><list style="symbols">
  <t>TLS_DHE_RSA_WITH_AES_128_GCM_SHA256</t>
  <t>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</t>
  <t>TLS_DHE_RSA_WITH_AES_256_GCM_SHA384</t>
  <t>TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384</t>
</list></t>

<t>These cipher suites are supported only in TLS 1.2 because they are authenticated encryption (AEAD) algorithms <xref target="RFC5116"/>.</t>

<t>Typically, in order to prefer these suites, the order of suites needs to be explicitly configured in server software. (See <xref target="BETTERCRYPTO"/> for helpful deployment guidelines, but note that its recommendations differ from the current document in some details.)  It would be ideal if server software implementations were to prefer these suites by default.</t>

<t>Some devices have hardware support for AES-CCM but not AES-GCM, so they are unable to follow the foregoing recommendations regarding cipher suites.  There are even devices that do not support public key cryptography at all, but they are out of scope entirely.</t>

<section anchor="detail-neg" title="Implementation Details">

<t>Clients SHOULD include TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 as the first proposal to any server, unless they have prior knowledge that the server cannot respond to a TLS 1.2 client_hello message.</t>

<t>Servers MUST prefer this cipher suite over weaker cipher suites whenever it is proposed, even if it is not the first proposal.</t>

<t>Clients are of course free to offer stronger cipher suites, e.g., using AES-256; when they do, the server SHOULD prefer the stronger cipher suite unless there are compelling reasons (e.g., seriously degraded performance) to choose otherwise.</t>

<t>This document does not change the mandatory-to-implement TLS cipher suite(s) prescribed by TLS. To maximize interoperability, RFC 5246 mandates implementation of the TLS_RSA_WITH_AES_128_CBC_SHA cipher suite, which is significantly weaker than the cipher suites recommended here. (The GCM mode does not suffer from the same weakness, caused by the order of MAC-then-Encrypt in TLS <xref target="Krawczyk2001"/>, since it uses an AEAD mode of operation.) Implementers should consider the interoperability gain against the loss in security when deploying the TLS_RSA_WITH_AES_128_CBC_SHA cipher suite. Other application protocols specify other cipher suites as mandatory to implement (MTI).</t>

<t>Note that some profiles of TLS 1.2 use different cipher suites. For example, <xref target="RFC6460"/> defines a profile that uses the TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 and TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 cipher suites.</t>

<t><xref target="RFC4492"/> allows clients and servers to negotiate ECDH parameters (curves).  Both clients and servers SHOULD include the “Supported Elliptic Curves” extension <xref target="RFC4492"/>.  For interoperability, clients and servers SHOULD support the NIST P-256 (secp256r1) curve <xref target="RFC4492"/>. In addition, clients SHOULD send an ec_point_formats extension with a single element, “uncompressed”.</t>

<t>​</t>

</section>
</section>
<section anchor="rec-keylength" title="Public Key Length">

<t>When using the cipher suites recommended in this document, two public keys are 
      normally used in the TLS handshake: one for the Diffie-Hellman key agreement
      and one for server authentication. Where a client certificate is used, a third 
      public key is added.</t>

<t>With a key exchange based on modular exponential (MODP) Diffie-Hellman groups (“DHE” cipher suites), DH key lengths of at least 2048 bits are RECOMMENDED.</t>

<t>Rationale: For various reasons, in practice, DH keys are typically generated in lengths that are powers of two (e.g., 2^10 = 1024 bits, 2^11 = 2048 bits, 2^12 = 4096 bits). Because a DH key of 1228 bits would be roughly equivalent to only an 80-bit symmetric key <xref target="RFC3766"/>, it is better to use keys longer than that for the “DHE” family of cipher suites. A DH key of 1926 bits would be roughly equivalent to a 100-bit symmetric key <xref target="RFC3766"/> and a DH key of 2048 bits might be sufficient for at least the next 10 years <xref target="NIST.SP.800-56A"/>. See <xref target="detail-alt"/> for additional information on the use of MODP Diffie-Hellman in TLS.</t>

<t>As noted in <xref target="RFC3766"/>, correcting for the emergence of a TWIRL machine would imply that 1024-bit DH keys yield about 65 bits of equivalent strength and that a 2048-bit DH key would yield about 92 bits of equivalent strength.</t>

<t>With regard to ECDH keys, the IANA “EC Named Curve Registry” (within the
   “Transport Layer Security (TLS) Parameters” registry <xref target="IANA_TLS"/>) contains 160-bit
elliptic curves that are considered to be roughly equivalent to only an 80-bit
symmetric key <xref target="ECRYPT-II"/>.   Curves of less than 192 bits SHOULD NOT be used.</t>

<t>When using RSA, servers SHOULD authenticate using certificates with at least a 2048-bit modulus for the public key.  In addition, the use of the SHA-256 hash algorithm is RECOMMENDED (see <xref target="CAB-Baseline"/> for more details). Clients SHOULD indicate to servers that they request SHA-256, by using the “Signature Algorithms” extension defined in TLS 1.2.</t>

</section>
<section anchor="detail-alt" title="Modular Exponential vs. Elliptic Curve DH Cipher Suites">

<t>Not all TLS implementations support both modular exponential (MODP) and elliptic curve (EC) Diffie-Hellman groups, as required by <xref target="rec-cipher"/>. Some implementations are severely limited in the length of DH values. When such implementations need to be accommodated, the following are RECOMMENDED (in priority order):</t>

<t><list style="numbers">
  <t>Elliptic Curve DHE with appropriately negotiated parameters (e.g., the curve to be used) and a Message Authentication Code (MAC) algorithm stronger than HMAC-SHA1 <xref target="RFC5289"/></t>
  <t>TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 <xref target="RFC5288"/>, with 2048-bit Diffie-Hellman parameters</t>
  <t>TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, with 1024-bit parameters</t>
</list></t>

<t>Rationale: Although Elliptic Curve Cryptography is widely deployed, there are some communities where its adoption has been limited for several reasons, including its complexity compared to modular arithmetic and longstanding perceptions of IPR concerns (which, for the most part, have now been resolved <xref target="RFC6090"/>).  Note that ECDHE cipher suites exist for both RSA and ECDSA certificates, so moving to ECDHE cipher suites does not require moving away from RSA-based certificates.  On the other hand, there are two related issues hindering effective use of MODP Diffie-Hellman cipher suites in TLS:</t>

<t><list style="symbols">
  <t>There are no standardized, widely implemented protocol mechanisms to negotiate the DH groups or parameter lengths supported by client and server.</t>
  <t>Many servers choose DH parameters of 1024 bits or fewer.</t>
  <t>There are widely deployed client implementations that reject received DH parameters if they are longer than 1024 bits.  In addition, several implementations do not perform appropriate validation of group parameters and are vulnerable to attacks referenced in Section 2.9 of <xref target="RFC7457"/>.</t>
</list></t>

<t>Note that with DHE and ECDHE cipher suites, the TLS master key only depends on the Diffie-Hellman parameters and not on the strength of the RSA certificate; moreover, 1024 bit MODP DH parameters are generally considered insufficient at this time.</t>

<t>With MODP ephemeral DH, deployers ought to carefully evaluate interoperability vs. security considerations when configuring their TLS endpoints.</t>

</section>
<section anchor="truncated-hmac" title="Truncated HMAC">

<t>Implementations MUST NOT use the Truncated HMAC extension, defined in Section 7 of <xref target="RFC6066"/>.</t>

<t>Rationale: the extension does not apply to the AEAD
      cipher suites recommended above. However it does apply to most other TLS cipher suites. Its use
      has been shown to be insecure in <xref target="PatersonRS11"/>.</t>

</section>
</section>
<section anchor="applicability" title="Applicability Statement">

<t>The recommendations of this document primarily apply to the implementation and deployment of application protocols that are most commonly used with TLS and DTLS on the Internet today.  Examples include, but are not limited to:</t>

<t><list style="symbols">
  <t>Web software and services that wish to protect HTTP traffic with TLS.</t>
  <t>Email software and services that wish to protect IMAP, POP3, or SMTP traffic with TLS.</t>
  <t>Instant-messaging software and services that wish to protect Extensible Messaging and Presence Protocol (XMPP) or Internet Relay Chat (IRC) traffic with TLS.</t>
  <t>Realtime media software and services that wish to protect Secure Realtime Transport Protocol (SRTP) traffic with DTLS.</t>
</list></t>

<t>This document does not modify the implementation and deployment recommendations (e.g., mandatory-to-implement cipher suites) prescribed by existing application protocols that employ TLS or DTLS. If the community that uses such an application protocol wishes to modernize its usage of TLS or DTLS to be consistent with the best practices recommended here, it needs to explicitly update the existing application protocol definition (one example is <xref target="TLS-XMPP"/>, which updates <xref target="RFC6120"/>).</t>

<t>Designers of new application protocols developed through the Internet
  Standards Process <xref target="RFC2026"/> are expected at minimum to conform to the best
  practices recommended here, unless they provide documentation of
  compelling reasons that would prevent such conformance (e.g.,
  widespread deployment on constrained devices that lack support for
  the necessary algorithms).</t>

<section anchor="security-services" title="Security Services">

<t>This document provides recommendations for an audience that wishes to secure their communication with TLS to achieve the following:</t>

<t><list style="symbols">
  <t>Confidentiality: all application-layer communication is encrypted with the goal that no party should be able to decrypt it except the intended receiver.</t>
  <t>Data integrity: any changes made to the communication in transit are detectable by the receiver.</t>
  <t>Authentication: an endpoint of the TLS communication is authenticated as the intended entity to communicate with.</t>
</list></t>

<t>With regard to authentication, TLS enables authentication of one or both endpoints in the communication.  In the context of opportunistic security <xref target="RFC7435"/>, TLS is sometimes used without authentication. As discussed in <xref target="oppsec"/>, considerations for opportunistic security are not in scope for this document.</t>

<t>If deployers deviate from the recommendations given in this document, they need to be aware that they might lose access to one of the foregoing security services.</t>

<t>This document applies only to environments where confidentiality is required. It recommends algorithms and configuration options that enforce secrecy of the data in transit.</t>

<t>This document also assumes that data integrity protection is always one of the goals of a deployment. In cases where integrity is not required, it does not make sense to employ TLS in the first place. There are attacks against confidentiality-only protection that utilize the lack of integrity to also break confidentiality (see, for instance, <xref target="DegabrieleP07"/> in the context of IPsec).</t>

<t>This document addresses itself to application protocols that are most commonly used on the Internet with TLS and DTLS. Typically, all communication between TLS clients and TLS servers requires all three of the above security services. This is particularly true where TLS clients are user agents like Web browsers or email software.</t>

<t>This document does not address the rarer deployment scenarios where one of the above three properties is not desired, such as the use case described in <xref target="oppsec"/> below.  As another scenario where confidentiality is not needed, consider a monitored network where the authorities in charge of the respective traffic domain require full access to unencrypted (plaintext) traffic, and where users collaborate and send their traffic in the clear.</t>

</section>
<section anchor="oppsec" title="Opportunistic Security">

<t>There are several important scenarios in which the use of TLS is optional, i.e., the client decides dynamically (“opportunistically”) whether to use TLS with a particular server or to connect in the clear.  This practice, often called “opportunistic security”, is described at length in <xref target="RFC7435"/> and is often motivated by a desire for backward compatibility with legacy deployments.</t>

<t>In these scenarios, some of the recommendations in this document might be too strict, since adhering to them could cause fallback to cleartext, a worse outcome than using TLS with an outdated protocol version or cipher suite.</t>

<t>This document specifies best practices for TLS in general.  A separate document containing recommendations for the use of TLS with opportunistic security is to be completed in the future.</t>

</section>
</section>
<section anchor="sec" title="Security Considerations">

<t>This entire document discusses the security practices directly affecting applications
    using the TLS protocol. This section contains broader security considerations related
    to technologies used in conjunction with or by TLS.
## Host Name Validation</t>

<t>Application authors should take note that some TLS implementations
  do not validate host names.  If the TLS implementation they are
  using does not validate host names, authors might need to write their
  own validation code or consider using a different TLS implementation.</t>

<t>It is noted that the requirements regarding host name validation (and, in general, binding between the TLS layer and the protocol that runs above it) vary between different protocols. For HTTPS, these requirements are defined by Section 3 of <xref target="RFC2818"/>.</t>

<t>Readers are referred to <xref target="RFC6125"/> for further details regarding generic host name validation in the TLS context. In addition, that RFC contains a long list of example protocols, some of which implement a policy very different from HTTPS.</t>

<t>If the host name is discovered indirectly and in an insecure manner (e.g., by an insecure DNS query for an MX or SRV record), it SHOULD NOT be used as a reference identifier <xref target="RFC6125"/> even when it matches the presented certificate.  This proviso does not apply if the host name is discovered securely (for further discussion, see <xref target="DANE-SRV"/> and <xref target="DANE-SMTP"/>).</t>

<t>Host name validation typically applies only to the leaf “end entity” certificate. Naturally, in order to ensure proper authentication in the context of the PKI, application clients need to verify the entire certification path in accordance with <xref target="RFC5280"/> (see also 
        <xref target="RFC6125"/>).</t>

<section anchor="sec-aes" title="AES-GCM">

<t><xref target="rec-cipher"/> above recommends the use of the AES-GCM authenticated encryption algorithm. Please refer to Section 11 of <xref target="RFC5246"/> for general security considerations when using TLS 1.2, and to Section 6 of <xref target="RFC5288"/> for security considerations that apply specifically to AES-GCM when used with TLS.</t>

</section>
<section anchor="sec-pfs" title="Forward Secrecy">

<t>Forward secrecy (also called “perfect forward secrecy” or “PFS” and defined in <xref target="RFC4949"/>) is a defense against an attacker who records encrypted conversations where the session keys are only encrypted with the communicating parties’ long-term keys.</t>

<t>Should the attacker be able to obtain these long-term keys at some point later in time, the session keys and thus the entire conversation could be decrypted.</t>

<t>In the context of TLS and DTLS, such compromise of long-term keys is not entirely implausible. It can happen, for example, due to:</t>

<t><list style="symbols">
  <t>A client or server being attacked by some other attack vector, and the private key retrieved.</t>
  <t>A long-term key retrieved from a device that has been sold or otherwise decommissioned without prior wiping.</t>
  <t>A long-term key used on a device as a default key <xref target="Heninger2012"/>.</t>
  <t>A key generated by a trusted third party like a CA, and later retrieved from it either by extortion or compromise <xref target="Soghoian2011"/>.</t>
  <t>A cryptographic break-through, or the use of asymmetric keys with insufficient length <xref target="Kleinjung2010"/>.</t>
  <t>Social engineering attacks against system administrators.</t>
  <t>Collection of private keys from inadequately protected backups.</t>
</list></t>

<t>Forward secrecy ensures in such cases that it is not feasible for an attacker to determine the session keys even if the attacker has obtained the long-term keys some time after the conversation. It also protects against an attacker who is in possession of the long-term keys but remains passive during the conversation.</t>

<t>Forward secrecy is generally achieved by using the Diffie-Hellman scheme to derive session keys. The Diffie-Hellman scheme has both parties maintain private secrets and send parameters over the network as modular powers over certain cyclic groups. The properties of the so-called Discrete Logarithm Problem (DLP) allow the parties to derive the session keys without an eavesdropper being able to do so. There is currently no known attack against DLP if sufficiently large parameters are chosen. A variant of the Diffie-Hellman scheme uses Elliptic Curves instead of the originally proposed modular arithmetics.</t>

<t>Unfortunately, many TLS/DTLS cipher suites were defined that do not feature forward secrecy, e.g., TLS_RSA_WITH_AES_256_CBC_SHA256.  This document therefore advocates strict use of forward-secrecy-only ciphers.</t>

</section>
<section anchor="diffie-hellman-exponent-reuse" title="Diffie-Hellman Exponent Reuse">

<t>For performance reasons, many TLS implementations reuse Diffie-Hellman and Elliptic Curve Diffie-Hellman exponents across multiple connections. Such reuse can result in major security issues:</t>

<t><list style="symbols">
  <t>If exponents are reused for too long (e.g., even more than a few hours), an attacker      who gains access to the host can decrypt previous connections. In other words, exponent reuse negates the effects of forward secrecy.</t>
  <t>TLS implementations that reuse exponents should test the DH public key they receive for group membership, in order to avoid some known attacks. These tests are not standardized in TLS at the time of writing. See <xref target="RFC6989"/> for recipient tests required of IKEv2 implementations that reuse DH exponents.</t>
</list></t>

</section>
<section anchor="certificate-revocation" title="Certificate Revocation">

<t>The following considerations and recommendations represent the current state of the art regarding certificate revocation, even though no complete and efficient solution exists for the problem of checking the revocation status of common public key certificates <xref target="RFC5280"/>:</t>

<t><list style="symbols">
  <t>Although Certificate Revocation Lists (CRLs) are the most widely supported mechanism for distributing revocation information, they have known scaling challenges that limit their usefulness (despite workarounds such as partitioned CRLs and delta CRLs).</t>
  <t>Proprietary mechanisms that embed revocation lists in the Web browser’s configuration database cannot scale beyond a small number of the most heavily used Web servers.</t>
  <t>The On-Line Certification Status Protocol (OCSP) <xref target="RFC6960"/> presents both scaling and privacy issues. In addition, clients typically “soft-fail”, meaning that they do not abort the TLS connection if the OCSP server does not respond. (However, this might be a workaround to avoid denial-of-service attacks if an OCSP responder is taken offline.)</t>
  <t>The TLS Certificate Status Request extension (Section 8 of <xref target="RFC6066"/>), commonly called “OCSP stapling”, resolves the operational issues with OCSP. However, it is still ineffective in the presence of a MITM attacker because the attacker can simply ignore the client’s request for a stapled OCSP response.</t>
  <t>OCSP stapling as defined in <xref target="RFC6066"/> does not extend to intermediate certificates used in a certificate chain. Although the Multiple Certificate Status extension <xref target="RFC6961"/> addresses this shortcoming, it is a recent addition without much deployment.</t>
  <t>Both CRLs and OCSP depend on relatively reliable connectivity to the Internet, which might not be available to certain kinds of nodes (such as newly provisioned devices that need to establish a secure connection in order to boot up for the first time).</t>
</list></t>

<t>With regard to common public key certificates, servers SHOULD support the following as a best practice given the current state of the art and as a foundation for a possible future solution:</t>

<t><list style="numbers">
  <t>OCSP <xref target="RFC6960"/></t>
  <t>Both the status_request extension defined in <xref target="RFC6066"/> and the status_request_v2 extension defined in <xref target="RFC6961"/> (This might enable interoperability with the widest range of clients.)</t>
  <t>The OCSP stapling extension defined in <xref target="RFC6961"/></t>
</list></t>

<t>The considerations in this section do not apply to scenarios where the DANE-TLSA resource record <xref target="RFC6698"/> is used to signal to a client which certificate a server considers valid and good to use for TLS connections.</t>

</section>
</section>
<section anchor="d1e1127" title="Acknowledgments">

<t>The following acknowledgements are inherited from <xref target="RFC7525"/>.</t>

<t>Thanks to RJ Atkinson, Uri Blumenthal, Viktor Dukhovni, Stephen Farrell, Daniel Kahn Gillmor, Paul Hoffman, Simon Josefsson, Watson Ladd, Orit Levin, Ilari Liusvaara, Johannes Merkle, Bodo Moeller, Yoav Nir, Massimiliano Pala, Kenny Paterson, Patrick Pelletier, Tom Ritter, Joe St. Sauver, Joe Salowey, Rich Salz, Brian Smith, Sean Turner, and Aaron Zauner for their feedback and suggested improvements. Thanks also to Brian Smith, who has provided a great resource in his “Proposal to Change the Default TLS Ciphersuites Offered by Browsers” <xref target="Smith2013"/>. Finally, thanks to all others who commented on the TLS, UTA, and other discussion lists but who are not mentioned here by name.</t>

<t>Robert Sparks and Dave Waltermire provided helpful reviews on behalf of the General Area Review Team and the Security Directorate, respectively.</t>

<t>During IESG review, Richard Barnes, Alissa Cooper, Spencer Dawkins, Stephen Farrell, Barry Leiba, Kathleen Moriarty, and Pete Resnick provided comments that led to further improvements.</t>

<t>Ralph Holz gratefully acknowledges the support by Technische Universitaet Muenchen.</t>

<t>The authors gratefully acknowledge the assistance of Leif Johansson and Orit Levin as the working group chairs and Pete Resnick as the sponsoring Area Director.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC5246" target='https://www.rfc-editor.org/info/rfc5246'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
<author initials='T.' surname='Dierks' fullname='T. Dierks'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2008' month='August' />
<abstract><t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5246'/>
<seriesInfo name='DOI' value='10.17487/RFC5246'/>
</reference>



<reference  anchor="RFC6347" target='https://www.rfc-editor.org/info/rfc6347'>
<front>
<title>Datagram Transport Layer Security Version 1.2</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<author initials='N.' surname='Modadugu' fullname='N. Modadugu'><organization /></author>
<date year='2012' month='January' />
<abstract><t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.  This document updates DTLS 1.0 to work with TLS version 1.2.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6347'/>
<seriesInfo name='DOI' value='10.17487/RFC6347'/>
</reference>



<reference  anchor="RFC7465" target='https://www.rfc-editor.org/info/rfc7465'>
<front>
<title>Prohibiting RC4 Cipher Suites</title>
<author initials='A.' surname='Popov' fullname='A. Popov'><organization /></author>
<date year='2015' month='February' />
<abstract><t>This document requires that Transport Layer Security (TLS) clients and servers never negotiate the use of RC4 cipher suites when they establish connections.  This applies to all TLS versions.  This document updates RFCs 5246, 4346, and 2246.</t></abstract>
</front>
<seriesInfo name='RFC' value='7465'/>
<seriesInfo name='DOI' value='10.17487/RFC7465'/>
</reference>



<reference  anchor="RFC8446" target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2018' month='August' />
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>



<reference  anchor="RFC4949" target='https://www.rfc-editor.org/info/rfc4949'>
<front>
<title>Internet Security Glossary, Version 2</title>
<author initials='R.' surname='Shirey' fullname='R. Shirey'><organization /></author>
<date year='2007' month='August' />
<abstract><t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='FYI' value='36'/>
<seriesInfo name='RFC' value='4949'/>
<seriesInfo name='DOI' value='10.17487/RFC4949'/>
</reference>



<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference  anchor="RFC6176" target='https://www.rfc-editor.org/info/rfc6176'>
<front>
<title>Prohibiting Secure Sockets Layer (SSL) Version 2.0</title>
<author initials='S.' surname='Turner' fullname='S. Turner'><organization /></author>
<author initials='T.' surname='Polk' fullname='T. Polk'><organization /></author>
<date year='2011' month='March' />
<abstract><t>This document requires that when Transport Layer Security (TLS) clients and servers establish connections, they never negotiate the use of  Secure Sockets Layer (SSL) version 2.0.  This document updates the  backward compatibility sections found in the Transport Layer Security (TLS). [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6176'/>
<seriesInfo name='DOI' value='10.17487/RFC6176'/>
</reference>



<reference  anchor="RFC5746" target='https://www.rfc-editor.org/info/rfc5746'>
<front>
<title>Transport Layer Security (TLS) Renegotiation Indication Extension</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<author initials='M.' surname='Ray' fullname='M. Ray'><organization /></author>
<author initials='S.' surname='Dispensa' fullname='S. Dispensa'><organization /></author>
<author initials='N.' surname='Oskov' fullname='N. Oskov'><organization /></author>
<date year='2010' month='February' />
<abstract><t>Secure Socket Layer (SSL) and Transport Layer Security (TLS) renegotiation are vulnerable to an attack in which the attacker forms a TLS connection with the target server, injects content of his choice, and then splices in a new TLS connection from a client.  The server treats the client's initial TLS handshake as a renegotiation and thus believes that the initial data transmitted by the attacker is from the same entity as the subsequent client data.  This specification defines a TLS extension to cryptographically tie renegotiations to the TLS connections they are being performed over, thus preventing this attack.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5746'/>
<seriesInfo name='DOI' value='10.17487/RFC5746'/>
</reference>



<reference anchor="I-D.ietf-tls-oldversions-deprecate">
<front>
<title>Deprecating TLSv1.0 and TLSv1.1</title>

<author initials='K' surname='Moriarty' fullname='Kathleen Moriarty'>
    <organization />
</author>

<author initials='S' surname='Farrell' fullname='Stephen Farrell'>
    <organization />
</author>

<date month='October' day='14' year='2020' />

<abstract><t>This document, if approved, formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents (will be moved|have been moved) to Historic status.  These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions.  TLSv1.2 has been the recommended version for IETF protocols since 2008, providing sufficient time to transition away from older versions.  Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance.  This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC6347), but not DTLS version 1.2, and there is no DTLS version 1.1.  This document updates many RFCs that normatively refer to TLSv1.0 or TLSv1.1 as described herein.  This document also updates the best practices for TLS usage in RFC 7525 and hence is part of BCP195.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-tls-oldversions-deprecate-08' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-tls-oldversions-deprecate-08.txt' />
</reference>



<reference anchor="I-D.ietf-tls-dtls13">
<front>
<title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>

<author initials='E' surname='Rescorla' fullname='Eric Rescorla'>
    <organization />
</author>

<author initials='H' surname='Tschofenig' fullname='Hannes Tschofenig'>
    <organization />
</author>

<author initials='N' surname='Modadugu' fullname='Nagendra Modadugu'>
    <organization />
</author>

<date month='May' day='29' year='2020' />

<abstract><t>This document specifies Version 1.3 of the Datagram Transport Layer Security (DTLS) protocol.  DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.  The DTLS 1.3 protocol is intentionally based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection/non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-tls-dtls13-38' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-tls-dtls13-38.txt' />
</reference>



<reference  anchor="RFC7507" target='https://www.rfc-editor.org/info/rfc7507'>
<front>
<title>TLS Fallback Signaling Cipher Suite Value (SCSV) for Preventing Protocol Downgrade Attacks</title>
<author initials='B.' surname='Moeller' fullname='B. Moeller'><organization /></author>
<author initials='A.' surname='Langley' fullname='A. Langley'><organization /></author>
<date year='2015' month='April' />
<abstract><t>This document defines a Signaling Cipher Suite Value (SCSV) that prevents protocol downgrade attacks on the Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) protocols.  It updates RFCs 2246, 4346, 4347, 5246, and 6347.  Server update considerations are included.</t></abstract>
</front>
<seriesInfo name='RFC' value='7507'/>
<seriesInfo name='DOI' value='10.17487/RFC7507'/>
</reference>



<reference  anchor="RFC6066" target='https://www.rfc-editor.org/info/rfc6066'>
<front>
<title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
<author initials='D.' surname='Eastlake 3rd' fullname='D. Eastlake 3rd'><organization /></author>
<date year='2011' month='January' />
<abstract><t>This document provides specifications for existing TLS extensions.  It is a companion document for RFC 5246, &quot;The Transport Layer Security (TLS) Protocol Version 1.2&quot;.  The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6066'/>
<seriesInfo name='DOI' value='10.17487/RFC6066'/>
</reference>



<reference  anchor="RFC3766" target='https://www.rfc-editor.org/info/rfc3766'>
<front>
<title>Determining Strengths For Public Keys Used For Exchanging Symmetric Keys</title>
<author initials='H.' surname='Orman' fullname='H. Orman'><organization /></author>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<date year='2004' month='April' />
<abstract><t>Implementors of systems that use public key cryptography to exchange symmetric keys need to make the public keys resistant to some predetermined level of attack.  That level of attack resistance is the strength of the system, and the symmetric keys that are exchanged must be at least as strong as the system strength requirements.  The three quantities, system strength, symmetric key strength, and public key strength, must be consistently matched for any network protocol usage.  While it is fairly easy to express the system strength requirements in terms of a symmetric key length and to choose a cipher that has a key length equal to or exceeding that requirement, it is harder to choose a public key that has a cryptographic strength meeting a symmetric key strength requirement.  This document explains how to determine the length of an asymmetric key as a function of a symmetric key strength requirement.  Some rules of thumb for estimating equivalent resistance to large-scale attacks on various algorithms are given.  The document also addresses how changing the sizes of the underlying large integers (moduli, group sizes, exponents, and so on) changes the time to use the algorithms for key exchange.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='86'/>
<seriesInfo name='RFC' value='3766'/>
<seriesInfo name='DOI' value='10.17487/RFC3766'/>
</reference>



<reference  anchor="RFC4492" target='https://www.rfc-editor.org/info/rfc4492'>
<front>
<title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)</title>
<author initials='S.' surname='Blake-Wilson' fullname='S. Blake-Wilson'><organization /></author>
<author initials='N.' surname='Bolyard' fullname='N. Bolyard'><organization /></author>
<author initials='V.' surname='Gupta' fullname='V. Gupta'><organization /></author>
<author initials='C.' surname='Hawk' fullname='C. Hawk'><organization /></author>
<author initials='B.' surname='Moeller' fullname='B. Moeller'><organization /></author>
<date year='2006' month='May' />
<abstract><t>This document describes new key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol.  In particular, it specifies the use of Elliptic Curve Diffie-Hellman (ECDH) key agreement in a TLS handshake and the use of Elliptic Curve Digital Signature Algorithm (ECDSA) as a new authentication mechanism.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='4492'/>
<seriesInfo name='DOI' value='10.17487/RFC4492'/>
</reference>



<reference  anchor="RFC5289" target='https://www.rfc-editor.org/info/rfc5289'>
<front>
<title>TLS Elliptic Curve Cipher Suites with SHA-256/384 and AES Galois Counter Mode (GCM)</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2008' month='August' />
<abstract><t>RFC 4492 describes elliptic curve cipher suites for Transport Layer Security (TLS).  However, all those cipher suites use HMAC-SHA-1 as their Message Authentication Code (MAC) algorithm.  This document describes sixteen new cipher suites for TLS that specify stronger MAC algorithms.  Eight use Hashed Message Authentication Code (HMAC) with SHA-256 or SHA-384, and eight use AES in Galois Counter Mode (GCM).   This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='5289'/>
<seriesInfo name='DOI' value='10.17487/RFC5289'/>
</reference>



<reference  anchor="RFC5288" target='https://www.rfc-editor.org/info/rfc5288'>
<front>
<title>AES Galois Counter Mode (GCM) Cipher Suites for TLS</title>
<author initials='J.' surname='Salowey' fullname='J. Salowey'><organization /></author>
<author initials='A.' surname='Choudhury' fullname='A. Choudhury'><organization /></author>
<author initials='D.' surname='McGrew' fullname='D. McGrew'><organization /></author>
<date year='2008' month='August' />
<abstract><t>This memo describes the use of the Advanced Encryption Standard (AES) in Galois/Counter Mode (GCM) as a Transport Layer Security (TLS) authenticated encryption operation.  GCM provides both confidentiality and data origin authentication, can be efficiently implemented in hardware for speeds of 10 gigabits per second and above, and is also well-suited to software implementations.  This memo defines TLS cipher suites that use AES-GCM with RSA, DSA, and Diffie-Hellman-based key exchange mechanisms.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5288'/>
<seriesInfo name='DOI' value='10.17487/RFC5288'/>
</reference>



<reference  anchor="RFC2818" target='https://www.rfc-editor.org/info/rfc2818'>
<front>
<title>HTTP Over TLS</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2000' month='May' />
<abstract><t>This memo describes how to use Transport Layer Security (TLS) to secure Hypertext Transfer Protocol (HTTP) connections over the Internet.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='2818'/>
<seriesInfo name='DOI' value='10.17487/RFC2818'/>
</reference>



<reference  anchor="RFC6125" target='https://www.rfc-editor.org/info/rfc6125'>
<front>
<title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
<author initials='P.' surname='Saint-Andre' fullname='P. Saint-Andre'><organization /></author>
<author initials='J.' surname='Hodges' fullname='J. Hodges'><organization /></author>
<date year='2011' month='March' />
<abstract><t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions.   [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6125'/>
<seriesInfo name='DOI' value='10.17487/RFC6125'/>
</reference>




    </references>

    <references title='Informative References'>



<reference anchor="DegabrieleP07" >
  <front>
    <title>Attacking the IPsec Standards in Encryption-only Configurations</title>
    <author initials="J." surname="Degabriele" fullname="Jean Paul Degabriele">
      <organization></organization>
    </author>
    <author initials="K." surname="Paterson" fullname="Kenneth G. Paterson">
      <organization></organization>
    </author>
    <date year="2007" month="May"/>
  </front>
  <seriesInfo name="2007 IEEE Symposium on Security and Privacy (SP" value="'07)"/>
  <seriesInfo name="DOI" value="10.1109/sp.2007.8"/>
</reference>

<reference anchor="triple-handshake" >
  <front>
    <title>Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS</title>
    <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
      <organization></organization>
    </author>
    <author initials="A." surname="Lavaud" fullname="Antoine Delignat Lavaud">
      <organization></organization>
    </author>
    <author initials="C." surname="Fournet" fullname="Cedric Fournet">
      <organization></organization>
    </author>
    <author initials="A." surname="Pironti" fullname="Alfredo Pironti">
      <organization></organization>
    </author>
    <author initials="P." surname="Strub" fullname="Pierre Yves Strub">
      <organization></organization>
    </author>
    <date year="2014" month="May"/>
  </front>
  <seriesInfo name="2014 IEEE Symposium on Security and" value="Privacy"/>
  <seriesInfo name="DOI" value="10.1109/sp.2014.14"/>
</reference>

<reference anchor="Soghoian2011" >
  <front>
    <title>Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL</title>
    <author initials="C." surname="Soghoian" fullname="Christopher Soghoian">
      <organization></organization>
    </author>
    <author initials="S." surname="Stamm" fullname="Sid Stamm">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
  <seriesInfo name="SSRN Electronic" value="Journal"/>
  <seriesInfo name="DOI" value="10.2139/ssrn.1591033"/>
</reference>



<reference  anchor="SESSION-HASH" target='https://www.rfc-editor.org/info/rfc7627'>
<front>
<title>Transport Layer Security (TLS) Session Hash and Extended Master Secret Extension</title>
<author initials='K.' surname='Bhargavan' fullname='K. Bhargavan' role='editor'><organization /></author>
<author initials='A.' surname='Delignat-Lavaud' fullname='A. Delignat-Lavaud'><organization /></author>
<author initials='A.' surname='Pironti' fullname='A. Pironti'><organization /></author>
<author initials='A.' surname='Langley' fullname='A. Langley'><organization /></author>
<author initials='M.' surname='Ray' fullname='M. Ray'><organization /></author>
<date year='2015' month='September' />
<abstract><t>The Transport Layer Security (TLS) master secret is not cryptographically bound to important session parameters such as the server certificate.  Consequently, it is possible for an active attacker to set up two sessions, one with a client and another with a server, such that the master secrets on the two sessions are the same.  Thereafter, any mechanism that relies on the master secret for authentication, including session resumption, becomes vulnerable to a man-in-the-middle attack, where the attacker can simply forward messages back and forth between the client and server.  This specification defines a TLS extension that contextually binds the master secret to a log of the full handshake that computes it, thus preventing such attacks.</t></abstract>
</front>
<seriesInfo name='RFC' value='7627'/>
<seriesInfo name='DOI' value='10.17487/RFC7627'/>
</reference>


<reference anchor="POODLE" target="https://www.us-cert.gov/ncas/alerts/TA14-290A">
  <front>
    <title>SSL 3.0 Protocol Vulnerability and POODLE Attack</title>
    <author >
      <organization>US-CERT</organization>
    </author>
    <date year="2014" month="October"/>
  </front>
</reference>




<reference  anchor="TLS-XMPP" target='https://www.rfc-editor.org/info/rfc7590'>
<front>
<title>Use of Transport Layer Security (TLS) in the Extensible Messaging and Presence Protocol (XMPP)</title>
<author initials='P.' surname='Saint-Andre' fullname='P. Saint-Andre'><organization /></author>
<author initials='T.' surname='Alkemade' fullname='T. Alkemade'><organization /></author>
<date year='2015' month='June' />
<abstract><t>This document provides recommendations for the use of Transport Layer Security (TLS) in the Extensible Messaging and Presence Protocol (XMPP).  This document updates RFC 6120.</t></abstract>
</front>
<seriesInfo name='RFC' value='7590'/>
<seriesInfo name='DOI' value='10.17487/RFC7590'/>
</reference>


<reference anchor="BETTERCRYPTO" target="https://bettercrypto.org/static/applied-crypto-hardening.pdf">
  <front>
    <title>Applied Crypto Hardening</title>
    <author >
      <organization>bettercrypto.org</organization>
    </author>
    <date year="2015" month="April"/>
  </front>
</reference>
<reference anchor="CAB-Baseline" target="https://www.cabforum.org/documents.html">
  <front>
    <title>Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 1.1.6</title>
    <author >
      <organization>CA/Browser Forum</organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="Heninger2012" >
  <front>
    <title>Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices</title>
    <author initials="N." surname="Heninger" fullname="Nadia Heninger">
      <organization></organization>
    </author>
    <author initials="Z." surname="Durumeric" fullname="Zakir Durumeric">
      <organization></organization>
    </author>
    <author initials="E." surname="Wustrow" fullname="Eric Wustrow">
      <organization></organization>
    </author>
    <author initials="J.A." surname="Halderman" fullname="J. Alex Halderman">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
  <seriesInfo name="Usenix Security Symposium" value="2012"/>
</reference>




<reference  anchor="DANE-SMTP" target='https://www.rfc-editor.org/info/rfc7672'>
<front>
<title>SMTP Security via Opportunistic DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS)</title>
<author initials='V.' surname='Dukhovni' fullname='V. Dukhovni'><organization /></author>
<author initials='W.' surname='Hardaker' fullname='W. Hardaker'><organization /></author>
<date year='2015' month='October' />
<abstract><t>This memo describes a downgrade-resistant protocol for SMTP transport security between Message Transfer Agents (MTAs), based on the DNS-Based Authentication of Named Entities (DANE) TLSA DNS record. Adoption of this protocol enables an incremental transition of the Internet email backbone to one using encrypted and authenticated Transport Layer Security (TLS).</t></abstract>
</front>
<seriesInfo name='RFC' value='7672'/>
<seriesInfo name='DOI' value='10.17487/RFC7672'/>
</reference>

<reference anchor="PatersonRS11" >
  <front>
    <title>Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol</title>
    <author initials="K." surname="Paterson" fullname="Kenneth G. Paterson">
      <organization></organization>
    </author>
    <author initials="T." surname="Ristenpart" fullname="Thomas Ristenpart">
      <organization></organization>
    </author>
    <author initials="T." surname="Shrimpton" fullname="Thomas Shrimpton">
      <organization></organization>
    </author>
    <date year="2011"/>
  </front>
  <seriesInfo name="Lecture Notes in Computer Science" value="pp. 372-389"/>
  <seriesInfo name="DOI" value="10.1007/978-3-642-25385-0_20"/>
</reference>



<reference  anchor="DANE-SRV" target='https://www.rfc-editor.org/info/rfc7673'>
<front>
<title>Using DNS-Based Authentication of Named Entities (DANE) TLSA Records with SRV Records</title>
<author initials='T.' surname='Finch' fullname='T. Finch'><organization /></author>
<author initials='M.' surname='Miller' fullname='M. Miller'><organization /></author>
<author initials='P.' surname='Saint-Andre' fullname='P. Saint-Andre'><organization /></author>
<date year='2015' month='October' />
<abstract><t>The DNS-Based Authentication of Named Entities (DANE) specification (RFC 6698) describes how to use TLSA resource records secured by DNSSEC (RFC 4033) to associate a server's connection endpoint with its Transport Layer Security (TLS) certificate (thus enabling administrators of domain names to specify the keys used in that domain's TLS servers).  However, application protocols that use SRV records (RFC 2782) to indirectly name the target server connection endpoints for a service domain name cannot apply the rules from RFC 6698.  Therefore, this document provides guidelines that enable such protocols to locate and use TLSA records.</t></abstract>
</front>
<seriesInfo name='RFC' value='7673'/>
<seriesInfo name='DOI' value='10.17487/RFC7673'/>
</reference>

<reference anchor="Kleinjung2010" >
  <front>
    <title>Factorization of a 768-Bit RSA Modulus</title>
    <author initials="T." surname="Kleinjung" fullname="Thorsten Kleinjung">
      <organization></organization>
    </author>
    <author initials="K." surname="Aoki" fullname="Kazumaro Aoki">
      <organization></organization>
    </author>
    <author initials="J." surname="Franke" fullname="Jens Franke">
      <organization></organization>
    </author>
    <author initials="A." surname="Lenstra" fullname="Arjen K. Lenstra">
      <organization></organization>
    </author>
    <author initials="E." surname="Thomé" fullname="Emmanuel Thomé">
      <organization></organization>
    </author>
    <author initials="J." surname="Bos" fullname="Joppe W. Bos">
      <organization></organization>
    </author>
    <author initials="P." surname="Gaudry" fullname="Pierrick Gaudry">
      <organization></organization>
    </author>
    <author initials="A." surname="Kruppa" fullname="Alexander Kruppa">
      <organization></organization>
    </author>
    <author initials="P." surname="Montgomery" fullname="Peter L. Montgomery">
      <organization></organization>
    </author>
    <author initials="D." surname="Osvik" fullname="Dag Arne Osvik">
      <organization></organization>
    </author>
    <author initials="H." surname="te Riele" fullname="Herman te Riele">
      <organization></organization>
    </author>
    <author initials="A." surname="Timofeev" fullname="Andrey Timofeev">
      <organization></organization>
    </author>
    <author initials="P." surname="Zimmermann" fullname="Paul Zimmermann">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
  <seriesInfo name="Advances in Cryptology – CRYPTO 2010" value="pp. 333-350"/>
  <seriesInfo name="DOI" value="10.1007/978-3-642-14623-7_18"/>
</reference>


<reference anchor="IANA_TLS" target="http://www.iana.org/assignments/tls-parameters">
  <front>
    <title>Transport Layer Security (TLS) Parameters</title>
    <author >
      <organization>IANA</organization>
    </author>
    <date />
  </front>
</reference>
<reference anchor="Smith2013" target="https://briansmith.org/browser-ciphersuites-01.html">
  <front>
    <title>Proposal to Change the Default TLS Ciphersuites Offered by Browsers.</title>
    <author initials="B." surname="Smith" fullname="Brian Smith">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="ECRYPT-II" target="http://www.ecrypt.eu.org/ecrypt2/">
  <front>
    <title>ECRYPT II Yearly Report on Algorithms and Keysizes (2011-2012)</title>
    <author initials="N." surname="Smart" fullname="Nigel Smart (ed.)">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
</reference>
<reference anchor="Krawczyk2001" target="https://www.iacr.org/archive/crypto2001/21390309.pdf">
  <front>
    <title>The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)</title>
    <author initials="H." surname="Krawczyk" fullname="Hugo Krawczyk">
      <organization></organization>
    </author>
    <date year="2001"/>
  </front>
  <seriesInfo name="CRYPTO" value="01"/>
</reference>


<reference anchor="Multiple-Encryption" >
  <front>
    <title>On the security of multiple encryption</title>
    <author initials="R." surname="Merkle" fullname="Ralph C. Merkle">
      <organization></organization>
    </author>
    <author initials="M." surname="Hellman" fullname="Martin E. Hellman">
      <organization></organization>
    </author>
    <date year="1981" month="July"/>
  </front>
  <seriesInfo name="Communications of the ACM" value="Vol. 24, pp. 465-467"/>
  <seriesInfo name="DOI" value="10.1145/358699.358718"/>
</reference>


<reference anchor="NIST.SP.800-56A" target="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar2.pdf">
  <front>
    <title>Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography</title>
    <author initials="E." surname="Barker" fullname="Elaine Barker">
      <organization></organization>
    </author>
    <author initials="L." surname="Chen" fullname="Lily Chen">
      <organization></organization>
    </author>
    <author initials="A." surname="Roginsky" fullname="Allen Roginsky">
      <organization></organization>
    </author>
    <author initials="M." surname="Smid" fullname="Miles Smid">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
  <seriesInfo name="NIST Special Publication" value="800-56A"/>
</reference>




<reference  anchor="DEP-SSLv3" target='https://www.rfc-editor.org/info/rfc7568'>
<front>
<title>Deprecating Secure Sockets Layer Version 3.0</title>
<author initials='R.' surname='Barnes' fullname='R. Barnes'><organization /></author>
<author initials='M.' surname='Thomson' fullname='M. Thomson'><organization /></author>
<author initials='A.' surname='Pironti' fullname='A. Pironti'><organization /></author>
<author initials='A.' surname='Langley' fullname='A. Langley'><organization /></author>
<date year='2015' month='June' />
<abstract><t>The Secure Sockets Layer version 3.0 (SSLv3), as specified in RFC 6101, is not sufficiently secure.  This document requires that SSLv3 not be used.  The replacement versions, in particular, Transport Layer Security (TLS) 1.2 (RFC 5246), are considerably more secure and capable protocols.</t><t>This document updates the backward compatibility section of RFC 5246 and its predecessors to prohibit fallback to SSLv3.</t></abstract>
</front>
<seriesInfo name='RFC' value='7568'/>
<seriesInfo name='DOI' value='10.17487/RFC7568'/>
</reference>



<reference  anchor="RFC3602" target='https://www.rfc-editor.org/info/rfc3602'>
<front>
<title>The AES-CBC Cipher Algorithm and Its Use with IPsec</title>
<author initials='S.' surname='Frankel' fullname='S. Frankel'><organization /></author>
<author initials='R.' surname='Glenn' fullname='R. Glenn'><organization /></author>
<author initials='S.' surname='Kelly' fullname='S. Kelly'><organization /></author>
<date year='2003' month='September' />
<abstract><t>This document describes the use of the Advanced Encryption Standard (AES) Cipher Algorithm in Cipher Block Chaining (CBC) Mode, with an explicit Initialization Vector (IV), as a confidentiality mechanism within the context of the IPsec Encapsulating Security Payload (ESP).</t></abstract>
</front>
<seriesInfo name='RFC' value='3602'/>
<seriesInfo name='DOI' value='10.17487/RFC3602'/>
</reference>



<reference  anchor="RFC7457" target='https://www.rfc-editor.org/info/rfc7457'>
<front>
<title>Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)</title>
<author initials='Y.' surname='Sheffer' fullname='Y. Sheffer'><organization /></author>
<author initials='R.' surname='Holz' fullname='R. Holz'><organization /></author>
<author initials='P.' surname='Saint-Andre' fullname='P. Saint-Andre'><organization /></author>
<date year='2015' month='February' />
<abstract><t>Over the last few years, there have been several serious attacks on Transport Layer Security (TLS), including attacks on its most commonly used ciphers and modes of operation.  This document summarizes these attacks, with the goal of motivating generic and protocol-specific recommendations on the usage of TLS and Datagram TLS (DTLS).</t></abstract>
</front>
<seriesInfo name='RFC' value='7457'/>
<seriesInfo name='DOI' value='10.17487/RFC7457'/>
</reference>



<reference  anchor="RFC7525" target='https://www.rfc-editor.org/info/rfc7525'>
<front>
<title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
<author initials='Y.' surname='Sheffer' fullname='Y. Sheffer'><organization /></author>
<author initials='R.' surname='Holz' fullname='R. Holz'><organization /></author>
<author initials='P.' surname='Saint-Andre' fullname='P. Saint-Andre'><organization /></author>
<date year='2015' month='May' />
<abstract><t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation.  This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t></abstract>
</front>
<seriesInfo name='BCP' value='195'/>
<seriesInfo name='RFC' value='7525'/>
<seriesInfo name='DOI' value='10.17487/RFC7525'/>
</reference>



<reference  anchor="RFC6101" target='https://www.rfc-editor.org/info/rfc6101'>
<front>
<title>The Secure Sockets Layer (SSL) Protocol Version 3.0</title>
<author initials='A.' surname='Freier' fullname='A. Freier'><organization /></author>
<author initials='P.' surname='Karlton' fullname='P. Karlton'><organization /></author>
<author initials='P.' surname='Kocher' fullname='P. Kocher'><organization /></author>
<date year='2011' month='August' />
<abstract><t>This document is published as a historical record of the SSL 3.0 protocol.  The original Abstract follows.</t><t>This document specifies version 3.0 of the Secure Sockets Layer (SSL 3.0) protocol, a security protocol that provides communications privacy over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  This document defines a  Historic Document for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='6101'/>
<seriesInfo name='DOI' value='10.17487/RFC6101'/>
</reference>



<reference  anchor="RFC2246" target='https://www.rfc-editor.org/info/rfc2246'>
<front>
<title>The TLS Protocol Version 1.0</title>
<author initials='T.' surname='Dierks' fullname='T. Dierks'><organization /></author>
<author initials='C.' surname='Allen' fullname='C. Allen'><organization /></author>
<date year='1999' month='January' />
<abstract><t>This document specifies Version 1.0 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2246'/>
<seriesInfo name='DOI' value='10.17487/RFC2246'/>
</reference>



<reference  anchor="RFC4346" target='https://www.rfc-editor.org/info/rfc4346'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.1</title>
<author initials='T.' surname='Dierks' fullname='T. Dierks'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2006' month='April' />
<abstract><t>This document specifies Version 1.1 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4346'/>
<seriesInfo name='DOI' value='10.17487/RFC4346'/>
</reference>



<reference anchor="I-D.ietf-quic-tls">
<front>
<title>Using TLS to Secure QUIC</title>

<author initials='M' surname='Thomson' fullname='Martin Thomson'>
    <organization />
</author>

<author initials='S' surname='Turner' fullname='Sean Turner'>
    <organization />
</author>

<date month='October' day='20' year='2020' />

<abstract><t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.  Note to Readers  Discussion of this draft takes place on the QUIC working group mailing list (quic@ietf.org), which is archived at https://mailarchive.ietf.org/arch/search/?email_list=quic.  Working Group information can be found at https://github.com/quicwg; source code and issues list for this draft can be found at https://github.com/quicwg/base-drafts/labels/-tls.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-quic-tls-32' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-quic-tls-32.txt' />
</reference>



<reference  anchor="RFC4347" target='https://www.rfc-editor.org/info/rfc4347'>
<front>
<title>Datagram Transport Layer Security</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<author initials='N.' surname='Modadugu' fullname='N. Modadugu'><organization /></author>
<date year='2006' month='April' />
<abstract><t>This document specifies Version 1.0 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4347'/>
<seriesInfo name='DOI' value='10.17487/RFC4347'/>
</reference>



<reference  anchor="RFC6797" target='https://www.rfc-editor.org/info/rfc6797'>
<front>
<title>HTTP Strict Transport Security (HSTS)</title>
<author initials='J.' surname='Hodges' fullname='J. Hodges'><organization /></author>
<author initials='C.' surname='Jackson' fullname='C. Jackson'><organization /></author>
<author initials='A.' surname='Barth' fullname='A. Barth'><organization /></author>
<date year='2012' month='November' />
<abstract><t>This specification defines a mechanism enabling web sites to declare themselves accessible only via secure connections and/or for users to be able to direct their user agent(s) to interact with given sites only over secure connections.  This overall policy is referred to as HTTP Strict Transport Security (HSTS).  The policy is declared by web sites via the Strict-Transport-Security HTTP response header field and/or by other means, such as user agent configuration, for example. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6797'/>
<seriesInfo name='DOI' value='10.17487/RFC6797'/>
</reference>



<reference  anchor="RFC5077" target='https://www.rfc-editor.org/info/rfc5077'>
<front>
<title>Transport Layer Security (TLS) Session Resumption without Server-Side State</title>
<author initials='J.' surname='Salowey' fullname='J. Salowey'><organization /></author>
<author initials='H.' surname='Zhou' fullname='H. Zhou'><organization /></author>
<author initials='P.' surname='Eronen' fullname='P. Eronen'><organization /></author>
<author initials='H.' surname='Tschofenig' fullname='H. Tschofenig'><organization /></author>
<date year='2008' month='January' />
<abstract><t>This document describes a mechanism that enables the Transport Layer Security (TLS) server to resume sessions and avoid keeping per-client session state.  The TLS server encapsulates the session state into a ticket and forwards it to the client.  The client can subsequently resume a session using the obtained ticket.  This document obsoletes RFC 4507.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5077'/>
<seriesInfo name='DOI' value='10.17487/RFC5077'/>
</reference>



<reference anchor="I-D.ietf-tls-esni">
<front>
<title>TLS Encrypted Client Hello</title>

<author initials='E' surname='Rescorla' fullname='Eric Rescorla'>
    <organization />
</author>

<author initials='K' surname='Oku' fullname='Kazuho Oku'>
    <organization />
</author>

<author initials='N' surname='Sullivan' fullname='Nick Sullivan'>
    <organization />
</author>

<author initials='C' surname='Wood' fullname='Christopher Wood'>
    <organization />
</author>

<date month='October' day='16' year='2020' />

<abstract><t>This document describes a mechanism in Transport Layer Security (TLS) for encrypting a ClientHello message under a server public key.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-tls-esni-08' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-tls-esni-08.txt' />
</reference>



<reference  anchor="RFC5116" target='https://www.rfc-editor.org/info/rfc5116'>
<front>
<title>An Interface and Algorithms for Authenticated Encryption</title>
<author initials='D.' surname='McGrew' fullname='D. McGrew'><organization /></author>
<date year='2008' month='January' />
<abstract><t>This document defines algorithms for Authenticated Encryption with Associated Data (AEAD), and defines a uniform interface and a registry for such algorithms.  The interface and registry can be used as an application-independent set of cryptoalgorithm suites.  This approach provides advantages in efficiency and security, and promotes the reuse of crypto implementations.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5116'/>
<seriesInfo name='DOI' value='10.17487/RFC5116'/>
</reference>



<reference  anchor="RFC6460" target='https://www.rfc-editor.org/info/rfc6460'>
<front>
<title>Suite B Profile for Transport Layer Security (TLS)</title>
<author initials='M.' surname='Salter' fullname='M. Salter'><organization /></author>
<author initials='R.' surname='Housley' fullname='R. Housley'><organization /></author>
<date year='2012' month='January' />
<abstract><t>The United States government has published guidelines for &quot;NSA Suite B Cryptography&quot; that define cryptographic algorithm policy for national security applications.  This document defines a profile of Transport Layer Security (TLS) version 1.2 that is fully compliant with Suite B.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='6460'/>
<seriesInfo name='DOI' value='10.17487/RFC6460'/>
</reference>



<reference  anchor="RFC6090" target='https://www.rfc-editor.org/info/rfc6090'>
<front>
<title>Fundamental Elliptic Curve Cryptography Algorithms</title>
<author initials='D.' surname='McGrew' fullname='D. McGrew'><organization /></author>
<author initials='K.' surname='Igoe' fullname='K. Igoe'><organization /></author>
<author initials='M.' surname='Salter' fullname='M. Salter'><organization /></author>
<date year='2011' month='February' />
<abstract><t>This note describes the fundamental algorithms of Elliptic Curve Cryptography (ECC) as they were defined in some seminal references from 1994 and earlier.  These descriptions may be useful for implementing the fundamental algorithms without using any of the specialized methods that were developed in following years.  Only elliptic curves defined over fields of characteristic greater than three are in scope; these curves are those used in Suite B. This document is not an Internet Standards Track specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='6090'/>
<seriesInfo name='DOI' value='10.17487/RFC6090'/>
</reference>



<reference  anchor="RFC6120" target='https://www.rfc-editor.org/info/rfc6120'>
<front>
<title>Extensible Messaging and Presence Protocol (XMPP): Core</title>
<author initials='P.' surname='Saint-Andre' fullname='P. Saint-Andre'><organization /></author>
<date year='2011' month='March' />
<abstract><t>The Extensible Messaging and Presence Protocol (XMPP) is an application profile of the Extensible Markup Language (XML) that enables the near-real-time exchange of structured yet extensible data between any two or more network entities.  This document defines XMPP's core protocol methods: setup and teardown of XML streams, channel encryption, authentication, error handling, and communication primitives for messaging, network availability (&quot;presence&quot;), and request-response interactions.  This document obsoletes RFC 3920.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6120'/>
<seriesInfo name='DOI' value='10.17487/RFC6120'/>
</reference>



<reference  anchor="RFC2026" target='https://www.rfc-editor.org/info/rfc2026'>
<front>
<title>The Internet Standards Process -- Revision 3</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1996' month='October' />
<abstract><t>This memo documents the process used by the Internet community for the standardization of protocols and procedures.  It defines the stages in the standardization process, the requirements for moving a document between stages and the types of documents used during this process. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='9'/>
<seriesInfo name='RFC' value='2026'/>
<seriesInfo name='DOI' value='10.17487/RFC2026'/>
</reference>



<reference  anchor="RFC7435" target='https://www.rfc-editor.org/info/rfc7435'>
<front>
<title>Opportunistic Security: Some Protection Most of the Time</title>
<author initials='V.' surname='Dukhovni' fullname='V. Dukhovni'><organization /></author>
<date year='2014' month='December' />
<abstract><t>This document defines the concept &quot;Opportunistic Security&quot; in the context of communications protocols.  Protocol designs based on Opportunistic Security use encryption even when authentication is not available, and use authentication when possible, thereby removing barriers to the widespread use of encryption on the Internet.</t></abstract>
</front>
<seriesInfo name='RFC' value='7435'/>
<seriesInfo name='DOI' value='10.17487/RFC7435'/>
</reference>



<reference  anchor="RFC5280" target='https://www.rfc-editor.org/info/rfc5280'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author initials='D.' surname='Cooper' fullname='D. Cooper'><organization /></author>
<author initials='S.' surname='Santesson' fullname='S. Santesson'><organization /></author>
<author initials='S.' surname='Farrell' fullname='S. Farrell'><organization /></author>
<author initials='S.' surname='Boeyen' fullname='S. Boeyen'><organization /></author>
<author initials='R.' surname='Housley' fullname='R. Housley'><organization /></author>
<author initials='W.' surname='Polk' fullname='W. Polk'><organization /></author>
<date year='2008' month='May' />
<abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5280'/>
<seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>



<reference  anchor="RFC6989" target='https://www.rfc-editor.org/info/rfc6989'>
<front>
<title>Additional Diffie-Hellman Tests for the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
<author initials='Y.' surname='Sheffer' fullname='Y. Sheffer'><organization /></author>
<author initials='S.' surname='Fluhrer' fullname='S. Fluhrer'><organization /></author>
<date year='2013' month='July' />
<abstract><t>This document adds a small number of mandatory tests required for the secure operation of the Internet Key Exchange Protocol version 2 (IKEv2) with elliptic curve groups.  No change is required to IKE implementations that use modular exponential groups, other than a few rarely used so-called Digital Signature Algorithm (DSA) groups.  This document updates the IKEv2 protocol, RFC 5996.</t></abstract>
</front>
<seriesInfo name='RFC' value='6989'/>
<seriesInfo name='DOI' value='10.17487/RFC6989'/>
</reference>



<reference  anchor="RFC6960" target='https://www.rfc-editor.org/info/rfc6960'>
<front>
<title>X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP</title>
<author initials='S.' surname='Santesson' fullname='S. Santesson'><organization /></author>
<author initials='M.' surname='Myers' fullname='M. Myers'><organization /></author>
<author initials='R.' surname='Ankney' fullname='R. Ankney'><organization /></author>
<author initials='A.' surname='Malpani' fullname='A. Malpani'><organization /></author>
<author initials='S.' surname='Galperin' fullname='S. Galperin'><organization /></author>
<author initials='C.' surname='Adams' fullname='C. Adams'><organization /></author>
<date year='2013' month='June' />
<abstract><t>This document specifies a protocol useful in determining the current status of a digital certificate without requiring Certificate Revocation Lists (CRLs). Additional mechanisms addressing PKIX operational requirements are specified in separate documents.  This document obsoletes RFCs 2560 and 6277.  It also updates RFC 5912.</t></abstract>
</front>
<seriesInfo name='RFC' value='6960'/>
<seriesInfo name='DOI' value='10.17487/RFC6960'/>
</reference>



<reference  anchor="RFC6961" target='https://www.rfc-editor.org/info/rfc6961'>
<front>
<title>The Transport Layer Security (TLS) Multiple Certificate Status Request Extension</title>
<author initials='Y.' surname='Pettersen' fullname='Y. Pettersen'><organization /></author>
<date year='2013' month='June' />
<abstract><t>This document defines the Transport Layer Security (TLS) Certificate Status Version 2 Extension to allow clients to specify and support several certificate status methods.  (The use of the Certificate Status extension is commonly referred to as &quot;OCSP stapling&quot;.)  Also defined is a new method based on the Online Certificate Status Protocol (OCSP) that servers can use to provide status information about not only the server's own certificate but also the status of intermediate certificates in the chain.</t></abstract>
</front>
<seriesInfo name='RFC' value='6961'/>
<seriesInfo name='DOI' value='10.17487/RFC6961'/>
</reference>



<reference  anchor="RFC6698" target='https://www.rfc-editor.org/info/rfc6698'>
<front>
<title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<author initials='J.' surname='Schlyter' fullname='J. Schlyter'><organization /></author>
<date year='2012' month='August' />
<abstract><t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used.  This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers.  This requires matching improvements in TLS client software, but no change in TLS server software.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6698'/>
<seriesInfo name='DOI' value='10.17487/RFC6698'/>
</reference>




    </references>


<section anchor="differences-from-rfc-7525" title="Differences from RFC 7525">

<t><list style="symbols">
  <t>Clarified some items (e.g. renegotiation) that only apply to TLS 1.2 - many more TBD.</t>
  <t>Changed status of TLS 1.0 and 1.1 from SHOULD NOT to MUST NOT.</t>
  <t>Added TLS 1.3 at a SHOULD level.</t>
  <t>Similar changes to DTLS, pending publication of DTLS 1.3.</t>
  <t>Fallback SCSV as a MUST for TLS 1.2.</t>
  <t>Added mention of TLS Encrypted Client Hello, but no recommendation to use yet.</t>
</list></t>

</section>
<section anchor="document-history" title="Document History">

<t>[[Note to RFC Editor: please remove before publication.]]</t>

<section anchor="draft-ietf-uta-rfc7525bis-00" title="draft-ietf-uta-rfc7525bis-00">

<t><list style="symbols">
  <t>Renamed: WG document.</t>
  <t>Started populating list of changes from RFC 7525.</t>
  <t>General rewording of abstract and intro for revised version.</t>
  <t>Protocol versions, fallback.</t>
  <t>Reference to ECHO.</t>
</list></t>

</section>
<section anchor="draft-sheffer-uta-rfc7525bis-00" title="draft-sheffer-uta-rfc7525bis-00">

<t><list style="symbols">
  <t>Renamed, since the BCP number does not change.</t>
  <t>Added an empty “Differences from RFC 7525” section.</t>
</list></t>

</section>
<section anchor="draft-sheffer-uta-bcp195bis-00" title="draft-sheffer-uta-bcp195bis-00">

<t><list style="symbols">
  <t>Initial release, the RFC 7525 text as-is, with some minor editorial
changes to the references.</t>
</list></t>

</section>
</section>


  </back>

<!-- ##markdown-source:
H4sIAA1Dm18AA91963IbWZLefzxFLedHk2MAIkiJkjhe71Iku8lpUeISVGt7
12tFATgAaliowlQVSKEZHeH/fgk/ix/FT+L8MvNc6kJJ09sR9rp/qAmg6lzy
5P12BoNBr0qq1BxHN2aar1Ymm8VVkmdlNM+LaGymm8JEH0oT5fPotoizcp0X
VfQ23hr9Nam20e7t2/FeFGez6Cyu4kURr77w7Bke7sWTSWHujyP60Jy5N8un
WbyiJc2KeF4NElPNB5sqHhTz6csXBy8mSTnY3+9N48os8mJ7HE2m614+KfPU
VKY8jvBMr5esi+OoKjZldbC//3r/oBcXJj6OTtbrNJnqRA95cbco8s36OPpw
exJ9pI9Jtoh+wFe9O7Ol32fH0WVWmSIz1eAMy+lN6U2TlRuaaR6npen1yoq2
/ilO84zWvDVlb50c96KIlmtmZbVN9dsoqvJp8GeSzUxW2S9KglVh5qX7vF3V
PlZFMnUPC7wq92uSpUnmpzGfq0GalNWABpnkKT2WD/74n+S9deyHKTeT2je9
eFMt84IWP6BfMSy9+vMwGi/NfG4K/k5O5ue4yLPa93mxiLPkF4Ysw2yTVPyD
WcVJSuPjjfkQh/mPC3w1pKlrE90Mo4s8/SWY5SZO10v/ZX2KD1lyb4oSOAXc
fCB4mHDCAi9/ab5r2licZNXgJJsVJpj2mvCoaP1Wn/0q/yVJ0zicsKzWePEf
V/ITz9fL8mJFr9ybY0LJbB58iqIzs4gnRWJSc73/8jg6e385HO0PR6P918/G
10NC25fDV3iOjn6dmsGSsKxcxnem49HR8+HoOZ4d54tlnsQZfTVyzx2MDl8/
K8siG45evB7tHx7yk+fj8eX7d4OLk/EFgfr705dHBy/xw/X792dvz495aw4h
6L8BQEBwHw9Oz29u+SuiWFrN+2mVTwhiWAZ/XcXFwhBOLatqXR4/e/bw8DDc
lIOpKarhIr9/lk3j8lmc0sfy2e3J6Png4PX+ibwpvGg8fhsdDvej6yInQsnT
6KdNmpkiniQpzhucRlYZnVRVPL3DsomTDP756vpa9vLi9T6+fHN+e3t+c3rz
8/Xt+yd3NDEVndu02K6rfEjfBFs7WRdJio296NxY881nxAqqZPosBpcxs4H8
QidXEKkTaxmuZ/Nwn9+dyIPRKT8YXdgHv8PiT0/eDN7EpWHafmrxpyfP3hT5
Q0nw/z4vNqtg8d/Rug+/e/JEpvFkjjd44cRzN8xShstqlYZrtCsgNv3XTVIY
foqlQ7U00WVZbuJsavhMruIsXvADIMnrzYRYbbod3IILY5N04Mkc3NeU0U+g
XeIho+FoeITdXvDGTUGLPujaLdPsu6F7jr+2JPsuniVx/Sd941+G0dmGdmmI
f9Ze+Zf4Likav+k758PoIy2ZwFp745weq/2gj/95eELLitOZIerOaq/8eRid
pOZz41d/PAff1dDhKsEGop/zTRFdlwzTf6IJzoivTMF3ANaPycyUaxJms+ij
ie+iH822pHVE70wFeUYP3ydTU8rAhBaJKcF4jnVdJMuz5LOXx+Ptap2XyWbl
FgTOdPLufDC+ulViOnp5wIyBll2UeXYzDnjLiNjUs9cvXw0OB0fPDwYHLw5f
vRjsfzrY9+Pc/GSHYcbzY2qS7C+bbEHT7T81zuj50cHh4OWnEXPAy5N3J5+I
wJ+kAjzQQnTFc+KGMeN4XJbJImP8fVal5WAdk6YCll2Gh/AVLee6/pIcpSoC
xFRXSbUE2T2JwW+G8lANTd4UtMjg+6/S7wQvlHiedzYRDjCYJuslrYxEryEd
adSiZeKndNhxSupHdEryZGGYiM/MPN6kFStjp8EQ0XuId6LcyTZSJlMOsc1z
5qiDy8svEep4FRdVnUqThUnl+2jXzIZ7T1BD+wwNc9Kh2fB25dPBs3BrsqTo
8jL62cRFuiV2xYdIRHOSkp5IoFoJRYFgkl9od7sQkgPMu8d4WcQP01+2dyR4
R0/u62Lonqtt7WKzyOu/uG3tj56iRZVL0Xf2kS42ncTTQtC3mC5JdXgmQgXj
PoNg3z/cf92SK7d0qu9JlhTgGOcZvwL+gf2f0K6IBlQLZk4OOQsOQ7znlFTL
TWZV5Gj3PanRF/mDNQWSEsL5H/aYTVwR0rBq4mcIdJPnL54dvnh19Pr1kP73
cvQq+g8gkJ+Sx1j6u8vx7ZC0rVf7+4MXRydPoghJjzdxcdeQUOdpDCEa/KKP
vx0SKZq62HibEAK7b/VBEjI3+YL+vNvWHj5JU5PVf9I3rpjXzGpPXyUpob77
usVp2liKfUfjtZkmxDhEqKsSrJDoItrsPl1vJuUwIzNEdD76A98805GCgcpn
DdAWB81zqZuIgrNxUgw+JmSaEkFH53TQNGC5ZO1jPF2SGlKSsANKnyXltCCW
Hb3NFzEzAj1fslTXyy0LqvPrAeH1/aFqj0ckdgaDQRRPSNqTfdT7HW3fiCzR
6IGkOJ3xpiRkI0RbCwHiOOLIfJ4yb55FOVk4UexNVn4OCnFJttt0GcVldHF7
e92PIKv70eXVCf17/R5fXNI/WBVU4mEUvcdI4PVpXFbR3DyQwRcXZZ/Om36h
g8W55xvikKxQl+CbEAfL+N6QgWPocGd9wqppupkBpsFjCamDq5xGxRHlmd2V
yKJIJQmWQtOTxrXKSX8BW8rXNDF2Rcu7XRJjsToodnkPLScqOnwSyYp/pjVg
O6WFLQ04M+s039LUtBfWgeiJuMJqeCt8RvTHMAJ3bA6NQ1FIT1KDM8Hwq/gv
uR0e45DhYiAC6+t9oHNYbxj9aHb6QDjEbojogWiYByJjH4rjlp9N5DuiwZI1
ZUCwAtIkfMg0N9Y7Gh4MWZiVdGgVH19Sey7BD3QwBHGY8XB/8Cbl5UP8rmgW
35OFin0Nox9IhMj0GSGBye4Tssuxi370YIjzEvu7l98Wm2TGqj2NkxkzI4Hd
i5gqaOGzlPSdP8DOL/LZhpXT3teI5PHx7wgwLw6eH/3661MU416REZRi5M2j
w+cv8eb/TfLZynmQ9s0YmLMo+n+Fir4HeWRwR01NP5rk1ZLXfHJOJvubU4Li
PxAUD4/2DxT+N6fPFbQvnx+9oC9NoCk4pYkQY5kQtIhfmgqL4d1MjKIRL1rP
w1GgKqL94FnZK/2m2D/NMziq2HkDooxOxD2VYXZHWrLml89f4OQdX5iZihCa
x1KXClY8yTcVhiY6tYDFLh+SNI2WJl3ztDCcaA+bjP5lx518y0PEKda6TOyX
DRah089osMIwExDGMhWViZCWBp9WgpL1dWDPDzkR/7Y8JskCi0424IiszkNy
gdFGHa/CDXg3UG4T2oBF5eheDOlyKEw0pFpBNA9yOlBSEghNFarEoRQTcIgp
1l9BS9EXEjDg+wRoqJMMaeknzBya0/P6C0OEUQLFLQsS7Hr1HCRv8cjyLLJe
kgX7AghtC1Pm6T2z7ABuDOScPj8sczD+VJwLWLGgWo2xg7IiMupI4dvQJA4y
DDuaw4KOICqzOHbQZwbnYUf7WZLOy4dLhtnECDGysKGlPy2w3AiQVG15RDB6
MISNsYiyMp9XD2BnbmuCacR6ynKzsjLO/UprN59JfSJWgelpBJDjlFgBMI5W
6WYkQASsHQQzt+f6+GjFHDvTfv2V9M+cllyw60FGEHlQ1fYoCh7tgYmdFN9Z
YrBTkgfQLNMtrZq2pksgJokzeyB0xtri2YxV5cDu2KX1JrDPzIDIImKWRzta
bapNnO71wR/mCTzkpCzSOoUdM4NPCBILFhLK91VoCmec1gwYJdMmKYOCgePx
HUQzvQuvPs0mfKClWdzHwtZXBqIlKcEUZTaafonJUlIVKnke68QSC2bNAuV+
wLrXRFTEaZhGs+bRE+bz7FWyYtJ/oCFhp0TRh4wU9xIgo1MhNKAjTECzNDcY
ifA+ejtubFYEIChL1AqOUwDS9PnMfdEn6iDafPpVliY1NarXOyHFgA5gxsBw
NF9CwZ/bY3aEvYqzrZJedB+4czE+ghUB17E4NyRmU27pp5VsTXCr9DMt8006
ExlDKi3RQnNgei1z7JP2TPpN/jBsUC/9PTFA/sJ4DvyQsPRkLkqsKpv1VZjQ
1zSmPYBokYs7ZZWQJlOpOCRuUYaMm1FMV01wA0qCyRXQAbNktVl1aroNCaBM
/B4KfKiX1jEoYI68uXJqMmAvxHiiCgFpSGZt/YmbLCBMI9rjbmlMm1HsDaP3
rADUTli17MLAVQSkrrMN8E8+IIlgGbD6wI9M7DRWialoucqhiZfC5hRfLKMm
pQbyRcUjaMlz+2lS0JSi/JTRrhkuhn0GI0AoxxY+3qUW7v3JKuwxYwWrKTRh
P2TBairMRDAybwM3EQYEWdW50WH0/aYA8LC9Jmt14iOO5mmeF32QFX2YGoJ8
tiD1MseoOXzbpPAFBksKjQJ8N3+gxeim6fQJkYDQ0KQS+PDwAVxno0emcKVt
kdItIm8eTb1RnEwxockWBLZ7Wjw0s02lSlKU5vFsD3h86jSfuyx/IDa0MF4N
8yMEHDSu++LmpC8ksLesogR0EfU9IuBN71JlnZB7hQgcovqH0vK6N4ao4XRT
FIDjNUx1ErTR7pvT6z0PX1mSY+gJAL3OEd5LsgFzWriJjLCc6IY1xNYxE0nc
MZcFHzNFAUkE7FrPWIeR9RBSbQUTQjbGngyylm7p+JMsT/PFlphnlG1WE1FH
7NIGjhzoybLFD3lJrIkkVkZlpakLd+hbz18/f01yXUTfnSGjMy9mZbRz9WF8
u9OX/0fv3vPfN+f/9OHy5vwMf48vTt6+dX/09InxxfsPb8/8X/7N0/dXV+fv
zuRl+jaqfdXbuTr5eUeOb+f99e3l+3cnb3e6NyXqC0vNNVw1sKJ7RBHTIpnI
zuhE/9f/HFl75WA0oh1a9XL08jl9AOnKbKxLyEeC0rZHx0K6H0aBhjKN10kV
p6xlMTJlVqGXc6KD+sFkbM41MxMej6M/EKf+VR0ApeoeXv3T95rcPFQpQp4+
bGVdBPywYfrRi7OknG7K4PznOSgfxK1LoU384Q9B2FQ1YHz7Bzhun4G7t3/W
fQ2sxkwbvGQOaBlEpdYk+FC+ph0wd0lJKLJSohtzCjftzk7Geg9eg9Nf3oPt
WtDZMKdvvPon7ItkiXLJcIuMJx263NRrrzThM8SOW8YRGV29P0aXDV3L0gFp
/4uc9EwS33jbmjQHQ/WAuv/+8325jom/TNI4u3tLRFf+/Xej7579l96NtR+P
o9t8FhPTgjfxACC0miWfmu5W/Rmjl0cg03CG37DMw9+0TPZ2qiF4NNofgYBi
MGV1sGkYF34P2QoOcp1uFnCslDl4ZrLIWAvIAt66zOFenhCbnCUzFmPlZs2e
HRFgdawe6jJmuSlrDwNzzOeK2JvYQzwh1GG2IFXOEc9XgNBDn+AKsC6ml7A3
xdHqWOsUmjQpy8ThLzMYJOxEC7Ui9s+oLMQXmmIgoomGls8wZGXV8IuRlai+
D6AlAeQX8QDON4SffIYp/WYPnuYes2bl/M0Edugoc1EO1LEBq+Wb0ABguneB
9H09zgP2sP025GUddT/a9YowsZrR69ev99qHxBq9Jebu461B2g6eimsmIok+
ANSKGT2XsJ0n6TXEmKYVQWX38qc9Bs/pm9OBaH5tf5hbFlnSNNsihgdMvWik
8M1YESJ5nRe0nm+GCcH5/FjshIZNtIxLcWhZL+O8yFeRF43gdu6olPGzOb9W
0zKGV+vvLgdnnJw0QCSaOKnlVAPS3mhGOl1QJFxXJBhrzmUiUfiXJ8wkm5rG
b8GbkeLN88N/J96MGnhzsL9/tCfqlle+mtzFYgV4Rllhwy1EQ+IQHavXgetY
9v/9oX6TgAhZJ2zOlredn1qznYbtPIUNB3Is1lkWynS2+n+LrLHe8c7zE0Xb
RihUeUvU24D1tJDq1R5zljlp+6Ik1MdzZyuZC3VtE+zEDfz4CK1H3iYosXdA
xAavwi/KKq3OD9pxCoot9XOou0DFNxSY7PCdfPFcMMLvfh5BgCgWVwLPsYw3
qQ18OQ0KK+704QTmVLkxZe3IhtFHw64hNYtKMhmhwZXeI1IqsVvblQ6qZp/X
vRp9sl6JOgE6uIE4XaX0gbLDhoUuBMHji/7Iin+X8thyOXWdLO14Z1EQe5gn
Jp3tBGEk5+VlIx8ebiNaqqRKZLk4lqEAK1qkZhFPyYDMZmyB0jvdeKOKSeYR
Qv01TUQgHSpZEZoWMJUfjLfBBPY1Zz3ZKKS0qbFqVjCtrOfOuzajXRscI8vw
lFnjDL4ZEhKOv8E2B5ODlqVRBu/f+g0YqXpx4Ldy3jNG00DXJLqE0wCRPUJN
Nj9YumOXmRGPX2BsdQ15YCO4ZFQ23aP0a59nVcOlDW6xjFg+xXPx9BfqMoA3
CFJB8f5LCGenZncByGq+qQJDyJE3W25n3WZbT6IeMZSseF05FMHTWNaHs2v2
mCPGCuTk0LMEbOHhhKvLCu5a+InjG99iejGKEneAs876k4+/UQc561Zen3OQ
d9h7EmuiIHV0H7s9kxhcIaYzH0Ko2yg82KUZT4jP7X1h8P+oGsLXlAIg8+5G
IghxtEwWS4/SLAaspNt7WhydNfWEWlS+920ndvDVEzvoPLEo2r0NuGrjgDke
gWzCr4vlGJ58kiNux18QwI0dH7LDSHzfzt1WO9AZ/TM6/Gb0PfwqMA47gcE8
4XsSaRMYpvTC2xzBj5Y7Z66P/NrrnRITg7+d8XAHP0T4ZQdvp/x2qFjUNYB5
pckPiGOyX/svGoMM0aj9oiMHNx1mE9vZh2OHXeIWjpyzIG5juTAP6QPBmM7B
YXw6/smLMZvY8GIf2Mk5IlAhqh4LNwsZDfwQSU1VB3GJCgXBOdRh4YGYMhRb
MTuMXFTdoMQmsAHOurG7T+ZteCKv4MsA1biVW7uGpoPFQ0Fjn/bSDCRJJ9q9
ury92vObcvYWWIKsht0kNQEbOvVqITQYaTGUGASh7Ehduhxrig9monsksXmi
+0FWkgQ1+x3nR4rmxiY3NZNK2AMF4zFjfhgV+WRDy3CvWL87PUN0vRJf6Jij
MVirxN0CqdaVAuZyPGgwzhlRtGGPG8Zar/HqrsMTFywiVr+KC/b/EGcYq2v4
QBhUmMayZxMrwawySSlTxTHOOuNSAtiyhXd17RMBo2WO8MfEVA8QVaXbu0TT
F5siiBFus3iVTKPNmtQDUt9Ynm0yTQESCKCmRmPs+KKI54QiXj8c357c3CJB
q6+UIR4ZPXLLeZWzPrUY+N0JEiedaVrVdg2fXbq1B4P0g3jrwqNKQYgeIszF
o882HO6CJ1O8Sh6ONjVMwgRwKiL6g6hUmX91hhjCukLCqZUl1pZUf2S1LPLN
YslRvHiBlD/eEGdxxLJz1is4Kjjb+xNBm0aoNhnxfSjvkpRiX7MYWQL7nNQ3
9fwG1kYyk3JOgD05hM2VU+kREKoaUkTa5qW1qrqnho7rp7PWtIWJHhwy6Ox0
/vRbuFpTRzAIv2ep0+b/KWX4xMGL8e14jyiRk7bUW/3y9Us4YYnKck5xx9mw
kffR8xt8qYP5c7NK+Ra701+ha2kqXzxFWJyRns1/xWndZzi4ghWBHCwQLyvs
GpN8w/D9SPUy906YxSOkxhipyawYjSd94OSHRPwgxGvjOzrLnD0tqbfOFTeT
yooL5Y5Ii8eq3B5Yly9NOh9AFsDVGpRrcaysFo+zDG6kSkp4NnvWBqxJ0NN8
NZH6pk3mmYomrAZspo7g+dpkEolnGOQNRswYJ/avjSH36QupSPMMAMEnlab1
4dWSa6UU6cpcMMpCj+Rast6klhoCdQH5TgRLzgdJGP/ujFl3Tan5jyRESRz3
WEoRbIhNlhD7Tnub6ncIxgWoXpNKU/+eix3bUPruUxLpqCWR+mIMCnI5F00z
M6mWWOKIYJaU7CLDIaa0qjRcVLRrpz0iq/tAJvZ+yb0Q+btFH638rxtT1m0w
idri4CRwDCQRJwuoRXMHo3c5ahuqDmOubfOzw69PY01jzvMOtuBmLcyKyEst
vyCbp+FZ63y33Ez+okayI02PrypPAYTTm8srG3OiwS9Dt5bmO3nHWjgVfVT9
0cGOj0NyKoRB4o8p6o891sLF8ZlrHAQjOSc3TKvl3WrCbqZRZnYPvLk5Pzm9
sGoQ8hEzI1uBSsPPQKaIdxBrYK4HGtLET05aQ2zU6snAMHE1bEr3GwucKZ2w
Ux99ehiCaV/A6+7QmmVNRHaYdKzwuzHWWHcUWOArA/qT9ZX6aOEexbbDhIx6
UrM4k6bsTybFwGJrxZya/p7lnNkTzzmn9DJMXq1RpJ2XfrtDCqbskSwbloPi
mPErCs6Ohe7ERPUML86nCdU8y01W+cwn7rHVdW/KWZELq21YRzahqa1GW69W
Y9nsGDrpChS6dTIoeeM2E11TYGUIUrtLtT1gictASjcrBIiY/IKB99gzcisv
36FQ1s5kvTiFWWzUdyqCEskEUItQqmHMHedexaXlNaQ9iYyHkp2ZeSI5agTx
h7jgBGGCxtbmz9HHwXpeKiIqAkZSvxQ+L8tE9r4VZQVtUgLfNRhG93GazLhs
V5gv7SSlV/QcY32P+fHMKvuqASzjdB564isHFTcq53TV3bJdCB8TMADiOyTK
K6a75gT9htxcwUQDCjqDUg/Mymb3ZjMtc/fxUUAGJ7NDsjJMi6zHfZglWi2+
AWLSgIY0gz4i6N4Q3hGHjokIWObR+UNhK0sbEWF1Wb32BNOEQaB6L06OVUOp
BANW8LwolAf7LLReRN9aA4OZNbHLt6YeCG+1lG6ht+LK+tkTyJiUXqisOe24
2g57jsPdhHkSvd5HNjUd2OtpFJr046NTnPfTZd11uGI6EjJcEodqkI1MNcnU
+HeJ6vryvyasb23FiiKjZFMyfU7zDcSsZTm33HUjunBw8oKO1kLYjcnh5dB0
RaBj2OBAzdDa8pq5J8yvFLbWVBPuCaEXr4yQpqpEOWlHYphyGls4GQHNJPeu
5KkmqxmhHh+bXUSIKzlSK5HWUzLWSqRWCHydl5KdqaBZEXchoAUayySRRFPh
wCUchYL4lmrmmzQgccsYw94jnKhDeBUOJd2BEpZWHTzIj6ezuMKW+nQoKkqr
JRvlUvtYsSvzIde8fWiWYmSz/4qLgghJSWvK167ShLUREtWgur9u6DzmW2x9
qkmna0065ZKAr9eq1JNKH+IK3siamuJnJ5QidCCCLthgb5yC02QChWYsxvc7
oM6ls+YJ7eF7+JpF3v0yqfDvLvc8IYdEbHWvQ6/YH+0fHanAE3CIUqqmQeDZ
AScWE1YlqZBqUoUFcnASjNEX6AGIKboOgZtOwYoAWlyj7KeeCK4xbj54ejzN
UashpARqbOZ1i1KBGGNG4C6Y6QbRW8Dx3KlO4lSPLgwp19Eu1C5T+IoM/xwD
kBWLMIaKgIEps4Sg5c0EVKSR2ILR1hTG2Kmuo2yENVdaiN+wpO+TgkFlWTbY
KYzjRWqcb2QG+6EptA2rECS86KAHi0JqwpyIUdcYwb8xQV9HhaZonaxcVsKB
2VzqAFhlIust4F/BAWOT7I0jNe9OZL0OKvVHRIis6TEXjBZczOqZ3Z9sxYZX
gTGOD6hp/iItUEcN6iu6zxVe5GaW7rF2yYjGrHiwvaCqSk9ozWoBTZqz2okr
NwJ3nafmc6KtjcSO8CH00qS+9Usjue5D3X3IOZI+ZUUeDkbyyTY2HVHfUd5m
18b6NgM7OPRwRVLM5n2oCMilkthjxzAZM137Nss9jnFNqzQYyzqC2ZNjPYco
rmUZS8NybF3C1cFYYfK1H0zzENpV4y772oISC69nVQRLeiK1jNmrzQv/YYPQ
BKJ63lvD7w0W7hegwmmtoiKofQi8dVLqBYGCh0nPS7elKGEIdRCuBa8J0zSc
nzQ1YWqxGkMTbN3w8GQds5D2b9tUFBDCUupoNlW4Bk71Wafx1NY/hRnaDeTj
M4Avio8KDfGKIOsBiSZFyDNULYUmJ7J2maezocsSdwwQhYufUQ1miyjjlNW1
g30tveZq1SANqcME8DXHYSYYjWyLUDrz1Nnf/RDCFFAEBrqAF1flhIanbpN1
dp+0HlQGSHYsd5v5Sup6zR52qKq+529Ip2jDgk+wmYzz7sPbt0GZ97cn6zSe
C31eNDMPW59euYrO5YJHOL/mYEHwJcubhZ+O4QyjE1Te0PeOT7ZGyrQJltR7
1ew3LyXYGXWfmAeJrqIxCzttmoOB48KfA+1c4sS+tYBGQlpxj2HUGmb3HYeH
iVZY0tbTEV2uK2o7ROHwZcFQiJqjOYmC9bTBbp3fHEzwtcukFzM1NUer4FlV
N/rMTEg6oth0r/7cN2Igugk0mMTvhF0YGcVk8cpOsOQAMOjZSBFkvXatOR4o
mSYrbSBDoR9aotIBwdHDO+dj5TQEV/GIUCQBcpLUHRFYYZzCzN/+pnqOOunk
tmSPXeOtM0NAfjQ6IItJvE+WyYaKc5kPVA3dMZ+hMooCvtMaLWj5sCvVFZYU
n++D+b04as2z93twjTe2kFPAf/jyiFsEOF7rNthBlWEln3YmiWi5A3qeMfnF
Ef/pHe1FTVa2SMqW5VQo3RlGLikOY8HhkIGAg9PSqRg6/FcLqJ8lb126YHwd
I4I0sqdwwrWyac4VCPg63gieHLxqnd/vcXyn7cVJBN7mHtD5DXhiBuLBq8FX
D9NHnOsSmFUKeF1IR/kT+jKIpSCF8B2Q12QFVUWSwvI/MtwN7ZNdXOUS56Na
KgmIv2yID863bckk9hZT1BPJ68HqCHV0p/bo26cF68qtEX4kNmcUAeehtmF9
MdqoqUtwHij+2dk2JBYkzzmDQAuKkMThwaWnrVEmxLfuNHlhGLA+72PDMTmG
0nx9Z2VMVc862nFByMfHjiZxROhtFYAUUM2NrgNY3dejIwHs4dk5EgKg4qEM
n3BOAlrNAeHXTqX82GXorLCBwqUIE2pk+Yr9RsHTu+A8LRCxMacxnlggwitB
RReHvGpr1kDdpL0sLcJGFGaKyifNDZDV+N349fwuzMNVzbcoenzCc1U2AYPw
bHg3jIfRjnTOwxM7v5OWWJqmriICRw6z1LQDAIithFjoriXLbb0eEoro9x3i
1p9olZ8+Xt5efPrjjvYcstQzK+KHiYRZOU85gQhvi1QjWRQ+eUPV1yDVJwwn
/I01OZK51k4wrZ9SmzkqO2/FMnzAOC+NxcvzNZreYc/Ngc4SUr3NAP6MVSzm
73maJmuc7+mG1Nbg3cazuztnF+dtrYFrus9P8dseQW6VwEf/e6DJ961ImkvS
svoM2ZEgEweVFiuRV2lhGujxtheH9dAyI3AQiU0dB/lT3SiXo4Ov80YjmNgX
1zAH4JznegUnLRunMKk1CNAakPE+7Hkw4dA57BUSVUOtEq3HD1tn4NtgaWF4
y6Bjp8VNYAS3/VZBAVSv55vDwZZd5GyYhp1xyv5X2o2oVe6TLOsoTlw46BEg
VdmgX0IkT8Mn5+NPJEc//XB69Wl8cUJCzj7GGPctD7Yeo9/sY4evnn9hvMaD
HpIdDEw8xkLjRtsOJEGyrEpPl9hVD8OHmvfJ+cnZXqjKaYh/NDqSRg42D7Ke
9mZ5Ci/NMlUJiGjvV10otORSfT9h7yD1v2mumfjfrPk5RPIO0DDs2aq4CMcP
dKrg5L3nq89pwj5LJanaPjlpSxIkl2g0xTflydQ5qWkbexEKb2zAIKK5kGc1
by665XF90N4sHaCCEa+1ZATiscwmjbpYhKBL7ENwxLxzbqZ3emW3yJ8JXzhP
wB30JrNNJLX8rE5STWDQ97GoAg37WfxKojSCMu3ypBtSXUJxsciUpXlgDCPL
CM54ORO3QHb8zTWvBijJbc2ksKAuybRVXejkHpAAC0oKVP8IysC+Tqc2CWCe
FCV7nl1barj25EzriZF8IusioSPwvWacv1GxgDgpQIKKpDzTlAhLjeKq+bTk
YA3JkzJeoOfHOAxnOyRB34bQIcdOUnbaNvV/ZKuweSj2iGwFgfOgYFGTDNsb
Hnoo8qnA4bQpSnh+jPFZzd2mh81YkRwh4CEB1nUwYhWmHwKnno6tGlR73ADq
inrIMjOSxqp5KVYp13aXnKTPWeQzFPWzbM2mZo+7mCxz6CgcUH5IStNqnuo8
YFPfkHyFKFiVF9tBlQ98LLWZ3rNbsoy3WamTrfRUuaXzjT+TVP7FdDRiQxEV
sg91EtMM0lgRVlMrLQafvjkFBtdWYdXYVpmi4ourSHy6Spn7z3CFU0Q0wl7j
sAq+zio5L8B6tJBexllT6pB0jP/q5BQGWWbNLiuYHh/DPudwuYjDMNGuZbRW
CCNZQ62/6F7UlYxo1QPN6alDm1NqXE8GDsHnZRlZgxdPMLqKGHGZF98KeduP
7IkWr+yz22ouQ0Nwlx7HOHvb4dju1e0l8qC8A5DFEA07587ZQVc3yHaRY5yK
W2fdyOYyn2OM27fJ0c+P9pF1wfFzboAhgzrfTum2LwyU/v0SC5XM6e5n62pM
M6rV0z5Rz19zK1ipLulK8qlZK5go8pcmRLtT2A4lbOA3T2UJNYQD9rczdhpT
3Qopd4Isg3CFrrVtk5a/MGOY2MAdzK/BHpGAMl3TH8VoL+LlNyaqpec0UnNK
g/zULDLTT5wF9kmMiDJYtfaZkxh7ZASn+tHOJrOpumYWmNO93v/+7/8jUNWl
KTo3NH/L1r9T0Umsiz/gV07gspmhX2YrzeL2Pqe+eEVBpI5tD4/NpLbvsNqU
tdS+Y47j28KYhqEIvSNGkTwmstkF3ItLXlEhVG8COowkGS22gZQgKcCm1vbp
V9qFN/QCRQfJHbOZpEp8FNDjaxum8X4P4macGwLHbCahJaL092fXe8198H1g
pbV7a7Dd60dEAN41w8zAuesO9p+rqxVADawc3JhRt3BdINKleSKDRfOI7CQy
ji+Akt5iGrOwC5D2CqhbQ+GhVNjREat4Pvhvo/3o76PR/sFzXhl/M6Jv3Fr5
mwP65vn+a3H0EzW/UbslttulUUcH1pHsVHD2FyJT5q+bhBuaVtLFMeU84Vfi
Iy+3hIwo8uGBtAO1+voTbb0pSVlSisIb12QCFZxx5XBODoX9DduOhIiTcMGv
D46+acExwedra5XM9GB0f9irBIndbL4jvpnYHiMOL5w3dmRD2I+PjfsOwHjE
1FIFO04rNbQsM4KxEzgt6v2hgchNPBZxD8KwXVol1hUegGZkqIuJR6w1wSLl
+ePlzVsSldMlLq/QiqOVZCjGFWMWg86i7BYNMrTf4tELF3kIIO6aQkrGETdx
BDSDYXSecKzXB18ay5G/GFI4VZZV1klj+H4gOKw4uW2mTq8bs0jQk38n2gXf
9qk3O998B9AOpuRBCLT2liJkNCJwzOnEoyNGrp6xok6EpqfcINwh9vm30FWv
iavuRh6WlipPOeHNh4IsEAOHsebcD2tChXSvflOchq4LfayWgCqCz+J8cKTM
eTe+oa3n3s1k2AChORvx4oQl9jIugyyWhgfJJpSGV6Up5XDuinoPiKm1rFVb
rpd7Zcc5f1GjicaiuoY+tGsvcHfGpObHnLrtrxba6c6QdA1xwizNK5VG54E0
QpfVhlOWMPipPDPmEKykci5wV3qnVYA4gfsL8o+rQWrIGe2enz4hFzl8bitY
AZV6B6WhlMm3KscK9cejnNvWK6iGkboWsbRd8f2zVqClj82hghwmBFBWtLHY
daCuNyypoQkL2ER7JsNG2oPzcdQB83PFZZ94S4t2SvCspgDbul+jgJOFgaL2
VGRciaOheenSKayrXbLRAqefN8eZXC9gwRECjlzF3KvXv/7Ka/4Gj6l/6RV3
3seWPJutH21wD9o3jq4DOvbfuElNED3QeVwWdgPa4TU8HRX//cAJwVaYvWkh
cRXzrG/NcpsXrllkFsdE8bzXnqxO17JJEnhZbk75DLzg6yeUD1uCkfuCTKWZ
S9BMOEcXr5Mlon20mdNeXt/YhK5Scyn6ju1xEhuSlDU8hVQzTVHj3lozayPu
v97nTttBBgobeA01n5PkeHSmb8TxOKwDK7BRuVtiN/caaOway3kalLDt4zHX
wcPtQMPb/ovB0LgXRS+WqCQpJ6sdGTRRW5SqZYC4W0O7UbtY5xeUmEbwgNmp
Bg3cLFley5ruWyQKqlh8RWTQ5apm2rJBc2GV/7zwGO1Ube/nn2w78r6wqCvv
vCyt46tuMkMxtdo4VwCha/2wvqHWXSrdTUe06zpXlbryj/psUtgvHt9Qp3ZL
aIpgSyvNuWyGsPj2akUJQYEKbY4BGC7BlnTaxvziFbeRL9c0vlGh/LpZyRma
zJ4wmAkBnxX1m5jt7yXQ2hTW3jMBLteSqR79JEOUVOG8cjnEQUtzfL6pU9uf
WOvI2XltgayIXTsYQER7RUsUJugQ7M2IWmqJarg8mPHR2ot+cOOGKzJFySlK
YbYu36DtmoPC4bxw9SCfOOXC5GzJTwhL4FrlJyg2KzaZxLYgvILi5Wbim0bF
Gi+ExWIdRSYvm0UmzQIJtl+8Ema5WtCU3bBvU1f8tN+E+yy5ogRuOYjB3EDM
zIXnNV3S3B+OHRc6S6Nm3TY614QfNsnCe1V5V3+w3VD0qMa2Oz1rgPVbGXrd
F5w0a6Wh/aAZAIyIEB5fjeZ2+1ad9dJxZZVrBGlvCrHEYy9Sd3l25+IfdRcV
SZDK5oH5wtZj34DDhvks5/XhMHvVjL0LjPuL2KxjuyZmtee4r/tvGcpdDHbY
B9PGbWHdI1/y5VvVQMJLkof5zbOcC+qCRV659/mqa9IR2CR3HQB3cS3ZHtbi
YHpDghZ3RtLAu5c3pFd2LvDGkOGAxASygpP4b1md3v/pBvAmsl/V+Ob2ujHx
Wa1H6ZOxH648334DRjbxXFXwJwJGdfddI1bEKhTD+GkUNytXuUfAltsDL2t9
RCrXmMXYW+WeaOIEiEohq6sKYA10wwaCbxXGJCN8gtkyiiEqn/Y0MWVQdNgK
I7FbzYX7g1i/XFShTPILOxfWKzcM7sJ7q1EM6OePj7d6y7q/zstegGFbyR+I
/trryRX3nNUlmg9akXbDWoseOW2zcOWaFrdpnLFqeCWwjbP6tdX5/sGRXgno
sirpMOytOnKxE+ssyu8APRrvS/ALo842F9pibFAv1BEVDWoabY259MOQNfA9
K4KwvYjVPL3HO+S4LHdx6SiLv1rAH33Tw1yEXqTORQCEC9adN2JPy7/9Nd9K
3E0K/OJVm8Bke82XYwqCwq45XOvKLc//uefRku+TrFnnws5P62Uex+zICNBj
kLLrrdWux6dpOZKQO5i4223ORtY2yMC0OufMaBy00vuPXMSSz15VaFHGz2rX
jB0HZd6IG85c3XG7sY/czqltnMA4eXoNztbmqHsEjjmwZNsL+BB0e/+NXh5l
fRtaHsOI7xp3MaTCzLCWu7QelumrpidFoI172xATlpua2PJ0+qBvgVLrZgAD
o6p3RskZgze4ERj3DFkUtfr+4QswF+2W5tP/nG7Bd/A0wkgnZf1ylMdHmoRG
Fi93TbcFYj+xAqt5ID7NmTFivdc7rV7OA417JlXqPjjfJCOpUO0IxIG7hM6s
hzion9tqWCGFBenLmBjuNsHOJhO51bs6qSaN2xYKrKJxsV5wM6C4UZo1V0Gf
Om54HLTfaNzgVG8saC+nEuGZcWtKl8upS9c7/CyttJeblraNss10evLWP9CD
3IEVwAbsQGJzAWcdNnst+vGSmvdj1ncKP2smaDMg9ywBdF4fsFfwSEIPiiaH
gRHvLiB191HUACwd4MLrC1mHqEin/0W4JTN7TlW1y+Q2dwQaTtdvnRgc4eJu
8jfAPj6eEYVPisSk5pr7oLbbFF1e0/HstQ9BCsOhm1doCsez/82mQFPxb5kG
BDKf2chdLWrszhaThH0y7A3H1s+ix1Zqi3ckTikesBnXQR9Su4pkLdc0AIRR
bIyiRm06ubCJhOGCP6cJ4QNMkUmRP5Ss2RSRqVkUT6c4KVSFU9CTYf9Of1Of
riLAaNmJbC6opFXE1SrUeh8xe1t1vWuf54v2KkSwTtvQx67gaaaA6aTiyvNV
9FfISWHM4cBwBZi2ET6zajCMRDx4JEaLhduY9g6HG9CaDVrgb32R3NHDs8Cw
QemuK910Rode0siTb/h0CEdTAh/fzShWjruI085Ya8jnbRVSn97X5IRVptgK
Vziy9W1d1N57ppdm+SOlOfQW5WX9UsdSeWacSosiDSeIz490FrnvWHq1srdo
d6cmvfDdzh62zEeoYXQM3b7zUHMw5O5PrYdttCMU2vC5CITScAVp6n233Nzp
YxsezzgMyF4yF3EWqS5tEUoddJXTubtGiorF4tIm3sep/eyRr2xvBN6Q1ggF
jQiH3B9RE3v9bZf2yqguqdy6g85F8as81061ro0krnf0ZTorpGgi741TJFwv
ZgDUts9DxgoRQclptlyPz15X313RXiJKP8/imn/adf+vJ6y1OIrtQl42zUHb
kpZ2qA5Gvlm7NPA+Vt6QsQHqrnTkjrtHpQKiW2tKSmetyiX0/no67m8VkJTV
PnuBZXJaU8+Ytkp/xZ7kJgesVLU8YXJBewELgFkiTSaiWAIMdStX4lM+lIu9
Ndpr29J9F8EnRh9L6Ue3s1RDHDxylftCu8T43oD0yl822dTbR8BySVcFn7mA
6OS+Oz85dzrbz2FXZGGkLvGS7y7O6lmKHXFgGkS99+qpN9ESs+HOZvb/e1Oj
4XmpfKNcAZgTYx0j9d3yhJSsaotW32om0jjwgAYBA765mjtvqSSReeIgq7K9
Lli27gqOoNCzea+sTal3awxn3pVrAByR9F37KatyWKCIFWrviXeEKtGXDYLb
LJsTkkH3sMHt+34LTlWSpFBuaWSbPdfWLEaj+L0n267mSgevRq+s3zu4pZTD
KBq4tFcL8tXuHf0vA8jw3omSOyEUJACqtjhspmsQBJBM7Qgllt6CuMyZE3XU
bxTcsl6/xi9okmWbm3GBlgcdm1XSAwp7Vlz1603E7EPAhenMEz/fwS0tgNVV
sUKj7MI6DKWZpfvx7N0YbWaLrfV7XP0ze3pvforkhro9tgramTPaid5dfiz6
0jzhbtXBSXA1AIdVkBODrl/Kwtbs3K3qoVUvh/P7pMybsYzky3Cw19RzSyp/
/q5GDHE+voTw5N35gLaogtl+cXV7zS2c6b+LLszwKYlNw1LyOeJ5tGMy64rY
qe/rHfJm2oVM2j9GdNumx6FttODj9Y+X/ZpJYjV2y3oIGNanrFLEr4RNmFg0
FCnEZeccs2YtvTp4hWRtuXcDZpeTYuG57smtsexr00ogK8EGsfQAatwxJuyi
u52lBKh4lKdrxZz9PYyukW2l5M+tsV1PbmEZ/v43IIK9nPaLQb9aC+i+vQTJ
NXEOGzgjs0QzLLoHDK5ErvXPoAHtLnXOIGo0DOKJthh0LA4EB1nURPZ6rVJR
PqanqkRtVSjIeuf6+/GORhaChpT/4K5O1ksL6Vc2/K0R32wYKqwhdEkSBKDC
eYiqERSWjfr75TpcmYH9iwyTmA2975ixDtD7j0eAd32sWsAy6OUceDvzCd+Y
KFKm/nbkahrY1wjlhe9Ghput37Fa2wIxJKRgm6oPT4z1sHI6YdvrF5r9fesX
R5OrVSLY31ilWpu2OI2lBenciI+xS0oull+vccvzPCy2mG2MixmetDq0aicf
hRkLWpFKzCS1x+c93z/aD8Q+WyqcP1Ag7ZLY+Uy8uPVl+19FdsXqwY+0MZWN
BecEMfghK62KAuzo5BOGe+DnlIK3hwQNmDvns24WN1GsiIuqRs0NvTBQ801x
sD86YO0Bw+Ann1LOFlhVbErRqJBtL350dnfE0emJAEOQpbFJeNSlsS1H1So0
zFAbxh/w4+M4XyzzJM5oGSO3jHrfHnZtDTQGxLHWgDvGtZxXTTmtJUyo1fn4
+GNKh0wK94Lm2te5xjlq/wmfFkTxYtE1nXTllvZPhzZD/AgxmAqXxkqwIg36
8AXooA1+k4y0sb9uJFnQN2CEabhZl2EAtMW2RPSV7rIH8VFq4aylgjmuvONe
gRqWCdq3I86Ae+U7OE1wvYd/BVgo7MEIdjcIj8lBGsK5m59CgmfqszemVHwT
1FMMknsxchtZXZUKucaMiPpLIxT45OjJe1c535q8A4JJGSTTaMRpVk/ZbST4
lFMk0AjwiuS+DjXpwNz9BlMwwh7KmbntOHNaixO277PzNYXZX/cKTuslQxma
JhraAg4uY9X7bqfbKXKlJStNlhV4/+w9nK4xyxlpeDS3id7mC8lbRLQUl31E
u2dvkerrapHt8j0EWrjjQi1Z0Afe808bVUMLe+v4TlxXXKTM5lyo6+5JsjhC
K+G6bUe2yAlmn2AjQWqK5haI7XC5TOzDYt1HwwH4RkEZ+8IRYdU3bZ9gIVIu
1O3I9ATJN3prcsdBdylZowLYBHZbWJlNRFtpV596+w4xQVpljqjZ0zJH+tPa
AM71Ubn2rPHsPpe0e71USTmkTjTQifSamXoTqkC9asDRZqNHNwbpSyCzsJrX
J9BaYHTcg4aFfL3bSOMJm5ROxz4tUB/q2tn6nn2ltrOUKSD70Q86Zfel3GDb
uI9WrqGch4OzpcwCkz1cuXQttRYh88pVbm88i5GbSSbWpkDdV8jY+D/fL77e
ZZBtMizPhpuRCMC1XrW94EIXlpgPUCD7bpW6P+nsrioX+7G6rhkYahuLp1JD
MZLfvnUbGa1JQkair6SrpOyB49NiLXAm5wqXxBblMlk37lu6zxNt/hoSeWlv
/ai4m7iNp4b5ubYoQp02LGfgEZAr4WwdFKeSvEbCu96vSljMIl4GdhUICGD9
eH7fvqwmAAFt1EGhgwpOg5LDG8OExd6321pBQcO0kVapzS4OasuL0NKGFmij
5OM4RRU2ewhmLtzMiomaMM/9MMWtKpUaTtlx195xNk9QYKMsH+VxSzO9syLQ
z8Br2pTSbgDhulrviLCqR01IWMKqT9tE/m6oRW95KbunN2/LPXdrLAcGNavZ
Z1H7mxr5cgzoWwkpAuKQdgMGRW8aNOf0eUG6kgQfA3IJAcjZGZIog8xBDfJI
8zeUyke7SLiBOxKyNyb8hvltY2YsESvRvrF8NQ/TKuaPckXHNac9G74dIkwl
99cpB0tPGRbqvAgiht+VjaA5wtvIrrftK7AtZCptcy4h4bZlUbYBJVpEYpAu
SS4nNtQaXE9m88mj99kAXZeCw8J0Yzl9n7b3/nRMyoElOq5RV0xWZcfCWdpY
kZ4ztVz2iYJp7yLaQVB0MI+TdIcEh4kzdx1eFXTZQoCuCv2NtlOr6q5YobXf
gmoF7vIxjHaD9vBJUJEZBwftmdaMrKE4HeTzgQaEnRmAW2EzmUvHhmFc6n09
+XyO6rLhnoUulhqSgcL1RmvHfCayuwPrVTODGRcn2oC5dVzIXqt4DZAT0Nzl
66zA2G4MfMmYv3cdLwVd1MVwkEbLtGZXaqHIuLYJpZwjgQtCQx+Ca1rkv4RA
K6XuM1lk7iZCPu3vSlcuJ03Zee20kwCQ3Pbjj1Fta533gejtAe6MGYgzuV+P
rz6YSd+0kEnZGEtcY6hEnAmUx/D+B9uKsOvYws4DSggjuOtcHoT0dUbfyCma
Bi4slGMWm5IykbgADzTnFVhLkIECEHCjBMdfGCBSixDxFRdkX9M5pRDFaSJt
3JUY7jUFJMynsCmYGnLJBetdB3jEJNWSwFU9koOZI57sbvDMzIO9W1M9D7WM
Q+tKpcON+Spq7tIu7cADIg0Ug0lOqyDFwUojSY+BlA8uBWwkn31ZCLVKUcPO
DkHFH06iFgzV3KsvCmMuT8GbczAJ4Y+Cxe7uE72kx4rbY66R44MLOSZ/y4fL
hhTj1H/9VLR4wVMYbz1N8qZ98RNpNk+8G+Do7q1ne5K01672cA5GTjsl5unu
rNFLLvek9s8xW0ulX53enert0jTVJBtntzFVy+7dDWGNlBfWSxGEIN56wpxv
U0yN+lntrKQXIpNJCR+joBxXmkdZd5/QRcgP3PUCdomlxDQY8os8n9nUCRtB
D/V1jlifTG3jKQ7XSTXuyIxGBy9/baqLsXs2iO0lGTIJKus208yIFwcvpMUb
aRN3bEfc/Dk6qYhiS4jUD0USvUnZAlwiTvlTclchSXxzt8zvs6RP/AvlQFn0
fYwrxOmJMxKyJo1+jJdZ9ANJgBU8mdfxJiX5MJ+TwUXvJCC4P5P9Oy95lo9x
VUJ9Ix7Wj97TIqO3xAfoh0syjRNS6zblfUzmeZ9e4htny+jKFHdwt77J6VSv
coPWqv3o5zy+j94l9NcVHDloDBmTDnsdp/TujyYjy9GWu2BRMF/vomu8XCV4
/xbVhgk6QmAqcGcyCeLNvfsc44pptHHCAdOnX2gF8A5EY9L5lrQ1g+uqN8Qe
1X97QgpAFv1LvEH0T9lSgso7M+PMDXbUyP1HZmavXZDEkkjPhJ1ddDC1iWAB
wh3kboyOyWYybHUo2hL2A/l3roP2Zqe+ydWZOmlZjxAjXRwK7zn8yR6sN5pk
tgP/KeY92Of75aPvxY3BYVhFG2iJbFSWvDYxTiqfhcd+9w+36snNG0FBVVfh
isPb1nTjTvMsGJhAaUkIB+Jq9HyCO8/HpDffiTA7g2L+MU7ZGxlepW2bBcIS
Ng9cdDcxfB2dcmJ7rcYJwQ/WBFrz36Lbu+WKLlnkjAO8nM3VD5LHuHfdmXgM
L8/HP+hUgiWQMm/ighsTntAuS9Loc/BGQpY11CCipvgB9NZBTPRigWY8yQT4
G1fLFP77q5wwoUAHIq7PMWwElRlw2e1a4W9NEmFVNhhbQzMUsaXrJZFn+gvh
EO1NavcCJqLpLrakf0vgwf1VcH1FH7KE04aq2FSk4tCOaAd61ZlNyugeVcRg
iRKTWNVB2ulcaByMQZQUxw5sbiHUak4gYB8BNC2tlKxBQh9m/S/no+HztUdI
KxwMBuwiB3c906A/JzFxzfH3pxGYI7vfwYXmiVGXA1HJSkt/6ver7QmwpVeG
FTK2XddAHFfs4rl9czbEuHqbgzeI7Z320vp9JEsJwv40nq1ixAAn6D5kr5fj
Vov2YW63j0fGeqWjrR+gESQEBq2Pg3ys97jk+jN3Wd0fCQ01vWx8Ov5JFBWe
3coodJZwq1BS/fJ1RrY3Z/OaPRV+W1Nx/eGZdTpeEG7kxbbX+9d/lbrbnA/m
fIZ8z+NobSPQuGzP3lIebGj4b//GsfFZEZMZyNdebap4UMynONpJUg729wkP
cEUhGrMcRx9/CHLtB1DO2VmwzvnS5SRIL7HwrCEL3rHcpDAP2mAbZs6klEtu
JTOkKnJ1LMlVbJp3h9evG7l4xBVslt+QV2pTPbia/uL9MNhguYStVXxxj8EN
HdGb02tr2DfaIGIqOVY4SFdr4n07T5LIjlWwnlrLZLoevQ6Wcql3bxKPw/lJ
1NeOFnHENi4HSal9HpjoyOZBlJUPnt7tBfgs7iW7NlrE/wF1xGogV7gAAA==

-->

</rfc>

