<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.1.7) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-johani-dnsop-transport-signaling-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DNS Transport Signaling">Authoritative DNS Transport Signaling</title>

    <author initials="J." surname="Stenstam" fullname="Johan Stenstam">
      <organization>The Swedish Internet Foundation</organization>
      <address>
        <postal>
          <country>Sweden</country>
        </postal>
        <email>johan.stenstam@internetstiftelsen.se</email>
      </address>
    </author>
    <author initials="L." surname="Fernandez" fullname="Leon Fernandez">
      <organization>The Swedish Internet Foundation</organization>
      <address>
        <postal>
          <country>Sweden</country>
        </postal>
        <email>leon.fernandez@internetstiftelsen.se</email>
      </address>
    </author>
    <author initials="E." surname="Bergström" fullname="Erik Bergström">
      <organization>The Swedish Internet Foundation</organization>
      <address>
        <postal>
          <country>Sweden</country>
        </postal>
        <email>erik.bergstrom@internetstiftelsen.se</email>
      </address>
    </author>

    <date />

    <area>Internet</area>
    <workgroup>DNSOP Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 40?>

<t>This document proposes a mechanism for authoritative DNS servers to
opportunistically signal their support for alternative transport
protocols (e.g., DNS over TLS (DoT), DNS over HTTPS (DoH) and DNS over
QUIC (DoQ)) directly within the Additional section of authoritative
DNS responses. This "hint-based" approach aims to enable resolvers to
discover and upgrade transport connections more efficiently, thereby
improving privacy, security, and performance for subsequent
interactions.</t>

<t>The mechanism is designed to not require any protocol change. It is
safe, backward-compatible, and effective even when DNSSEC validation
of the hint is not possible or desired.</t>

<t>This document proposes an improvement on the opportunistic (but blind)
testing of alternative transports suggested in RFC9539 by providing a
mechanism by which a responding authoritative server may signal what
alternative transports it supports.</t>

<t>TO BE REMOVED: This document is being collaborated on in Github at:
<eref target="https://github.com/johanix/draft-johani-dnsop-transport-signaling">https://github.com/johanix/draft-johani-dnsop-transport-signaling</eref>.
The most recent working version of the document, open issues, etc, should all be
available there.  The authors (gratefully) accept pull requests.</t>



    </abstract>



  </front>

  <middle>


<?line 65?>

<section anchor="introduction"><name><strong>1. Introduction</strong></name>

<t>The Domain Name System (DNS) primarily relies on UDP and TCP for
communication between resolvers and authoritative servers.  While
these protocols are well-established, there is a growing interest in
leveraging modern transport protocols like DNS over TLS (DoT)
<xref target="RFC7858"/>, DNS over HTTPS (DoH) <xref target="RFC9461"/> and DNS over QUIC
(DoQ) <xref target="RFC9250"/> to enhance privacy, security, and performance.</t>

<t>Existing efforts to signal service connection information, such as the
SVCB and HTTPS DNS records <xref target="RFC9460"/> <xref target="RFC9461"/>, primarily focus
on service discovery mechanisms where a client explicitly queries for
these records, often from a parent zone. While robust, this approach
can introduce additional latency and requires explicit configuration
at the parent zone level.</t>

<t>This document proposes an "DNS Opportunistic Transport Signaling" (DNS
OTS) mechanism. DNS OTS, aka an "OTS Hint" allows an authoritative DNS
nameserver to directly convey its transport capabilities as a hint
within the Additional section of responses to queries where it
identifies itself as an authoritative nameserver for the requested
zone. This direct, in-band signaling provides a low-latency discovery
path, even when a formal, validated signal is not available. Furthermore,
this is achieved without any changes to the DNS Protocol.</t>

</section>
<section anchor="prior-art"><name><strong>1.1. Prior Art</strong></name>

<t>An attempt at utilizing more modern, and in particular, more private
transports between resolvers and authoritative nameservers was introduced
in <xref target="RFC9539"/>. The idea there was to opportunistically try to send the
query to the authoritative nameserver over multiple transports with no 
prior knowledge of whether a transport was supported in the receiving end
or not.</t>

<t>The drawback with that approach is that without any significant deployment
of authoritative support the resolver end will mostly spend cycles and
traffic on a wasted effort. For this reason there seems not to be any known
implementations.</t>

<t>Furthermore, in Appendix B of <xref target="RFC9539"/> requirements for improving
the defense against an active attacker are listed. The first requirement is:</t>

<t><list style="symbols">
  <t>A signaling mechanism that tells the recursive resolver that the
authoritative server intends to offer authenticated encryption.</t>
</list></t>

<t>This document aims to provide exactly such a mechanism while staying within
the current DNS protocol. Therefore the transport signaling provided will
be opportunistic, and as such fit well as an improvement to <xref target="RFC9539"/>.</t>

</section>
<section anchor="rationale-for-using-the-additional-section"><name><strong>Rationale for Using the Additional Section</strong></name>

<t><strong>Note to the RFC Editor</strong>: Please remove this entire section before publication.</t>

<t>When designing a mechanism that rely on sending new information in DNS
responses without changing the current DNS protocol, the Additional section
has the major advantage of being ignored by legacy software. This property
makes it possible to essentially deploy the proposed mechanism immediately,
as it will not cause problems with existing DNS infrastructure.</t>

<t><list style="symbols">
  <t>Existing authoritative nameservers will not provide any OTS Hint in the
Additional section.</t>
  <t>Existing resolvers will actively ignore any OTS Hint in the Additional section.</t>
</list></t>

<t>Only DNS nameservers (authoritative or recursive) that are aware of the
proposed mechanism will use it.</t>

<t>The downside is that it is not possible to strictly rely on anything
specific being present in the Additional section, as it may be stripped off by
a middle man or even by the sending nameserver (eg. due to packet size
constraints). For this reason it is not possible to provide more than an
opportunistic transport signal.</t>

<t>Another issue is whether the data provided may be trusted or not. This is
usually a major issue and the primary reason that data in the Additional
section is actively ignored by resolvers. In this particular case, though,
even an untrusted transport signal is better than no signal at all. Furthermore,
the only effect of a forged or otherwise incorrect transport signal is a,
typically failed, connection attempt to an authoritative nameserver that
does not support the advertised transport. This will cause immediate fallback
to "Do53", i.e. traditional DNS over UDP/TCP and the non-availability of the
advertised transport will be remembered by the resolver (for some suitable time).</t>

<t>Hence, using the Additional section for opportunistic transport signaling has
vastly more benefits than drawbacks.</t>

</section>
<section anchor="terminology"><name><strong>2. Terminology</strong></name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in BCP
14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
capitals.</t>

<t><list style="symbols">
  <t><strong>Authoritative Nameserver (Auth Server):</strong> A DNS server that holds
the authoritative zone data for a specific domain.</t>
  <t><strong>Recursive Nameserver (Resolver):</strong> A DNS server that processes
user queries, performing iterative lookups to authoritative servers to
resolve domain names.</t>
  <t><strong>OTS Hint:</strong> An SVCB record included opportunistically in the
Additional section of an authoritative DNS response, intended to
signal the responding authoritative nameserver's transport
capabilities.</t>
  <t><strong>SVCB Record:</strong> Service Binding record, as defined in <xref target="RFC9460"/>.</t>
</list></t>

</section>
<section anchor="the-opportunistic-signaling-mechanism"><name><strong>3. The Opportunistic Signaling Mechanism</strong></name>

<t>The core of this proposal is for an authoritative nameserver to
include an SVCB record in the Additional section of its responses
under specific conditions.</t>

<t>This consists of three parts. The first two are the behaviour of the
authoritative nameserver receiving the query and the rehaviour of the
recursive nameserver receiving the response. The final part is a new
EDNS(0) option that defines an OPT-OUT capability.</t>

</section>
<section anchor="authoritative-nameserver-behaviour"><name><strong>4. Authoritative Nameserver Behaviour</strong></name>

<section anchor="trigger-conditions-for-including-the-ots-hint"><name><strong>4.1. Trigger Conditions for Including the OTS Hint</strong></name>

<t>An authoritative nameserver SHOULD include an OTS Hint when <em>all</em> of
the following conditions are met:</t>

<t><list style="numbers" type="1">
  <t><strong>NS RRset Presence:</strong> An NS Resource Record Set (RRset) for the
queried zone is present in either the Answer section or the Authority
section of the DNS response.</t>
  <t><strong>Self-Identification:</strong> The responding authoritative nameserver's
own Fully Qualified Domain Name (FQDN) (or one of its configured
aliases/identities) is found within the NS RRset mentioned in
condition 1.</t>
  <t><strong>Transport Capability:</strong> The responding authoritative nameserver
supports one or more alternative transport protocols (e.g., DoT, DoH,
DoQ) and is configured to advertise these capabilities.</t>
  <t><strong>Absence of the No-OTS Option:</strong> The query does not
include an EDNS(0) No-OTS option from the resolver.</t>
  <t><strong>Availability of RRSIG SVCB:</strong> If the zone in which the nameserver
name is located is signed, only include the SVCB record if it is
possible to also include the corresponding RRSIG SVCB.</t>
</list></t>

</section>
<section anchor="multiple-server-identities"><name><strong>4.2. Multiple Server Identities</strong></name>

<t>An authoritative nameserver may be known by multiple FQDNs (e.g.,
ns1.example.com, dns.customer.org, ns.cdnprovider.net). To facilitate
condition 2 ("Self-Identification"), authoritative server
implementations MAY include a configuration mechanism (e.g., an
identities list) where operators can list all FQDNs by which the
server is known. This allows the server to correctly identify itself
regardless of the specific name used in the NS RRset.</t>

</section>
<section anchor="format-of-the-ots-hint"><name><strong>4.3. Format of the OTS Hint</strong></name>

<t>The OTS Hint MUST be an SVCB record with the following
characteristics:</t>

<t><list style="symbols">
  <t><strong>OWNER:</strong> The owner name of the SVCB record MUST be the FQDN of the
authoritative nameserver itself, as identified in the NS RRset that
triggered its inclusion (e.g., ns.dnsprovider.com.).</t>
  <t><strong>CLASS:</strong> IN (Internet).</t>
  <t><strong>TYPE:</strong> SVCB.</t>
  <t><strong>TTL:</strong> The TTL of the SVCB record SHOULD be chosen by the
 authoritative server operator. Choice of TTL is a local configuration
 decision, but unless the supported transports are subject to frequent
 change a value on the order of 24h or more is suggested.</t>
  <t><strong>SVCB_PRIORITY:</strong> 1. The specific priority value is not critical
 for this hint mechanism, but 1 indicates the highest priority for the
 service.</t>
  <t><strong>SVCB_TARGET:</strong> . (root). This indicates that the DNS transport
 capabilities described by the SVCB record refer to the owner name of
 the record.</t>
  <t><strong>SVCB_PARAMS:</strong> A set of Service Parameters indicating the
 supported transport protocols. In this document only the "alpn"
 parameter <xref target="RFC9460"/> is described, as relevant for signaling DoT
 (alpn=dot), DoH (alpn=doh) and DoQ (alpn=doq).  <vspace blankLines='1'/>
If any of the "ipv4hint" and "ipv6hint" parameters are present in the
 SVCB parameter list then they SHOULD be ignored.</t>
</list></t>

<t><strong>Example 1:</strong></t>

<t>If ns.dnsprovider.net. responds to a query for www.example.com. and
ns.dnsprovider.net is listed in the NS RRset, it may respond with a
DNS message that contains:
~~~
Header: ...</t>

<t>Answer:
www.example.com.   IN A 1.2.3.4</t>

<t>Authority:
example.com.       IN NS ns1.example.com.
example.com.       IN NS ns.dnsprovider.net.</t>

<t>Additional:
ns.dnsprovider.net. IN A 5.6.7.8
ns.dnsprovider.net. IN RRSIG A ...
ns.dnsprovider.net. IN SVCB 1 . "alpn=doq,dot,do53"
ns.dnsprovider.net. IN RRSIG SVCB ...
~~~
<strong>Example 2:</strong></t>

<t>If the unsigned zone example.com uses ns.dnsprovider.net., but under the
vanity name "ns2.example.com." (with the same IP addresses), then a
possible response from ns.dnsprovider.net (aka ns2.example.com) may be:
~~~
Header: ...</t>

<t>Answer:
www.example.com.   IN A 1.2.3.4</t>

<t>Authority:
example.com.       IN NS ns1.example.com.
example.com.       IN NS ns2.example.com.</t>

<t>Additional:
ns2.example.com. IN A 5.6.7.8
ns2.example.com. IN SVCB 1 . "alpn=doq,dot,do53"
~~~
This requires that "ns2.example.com." is a name that ns.dnsprovider.net. is
aware of as one of its identities. Furthermore, as the zone example.com is
unsigned it is not possible to provide a DNSSEC signed OTS Hint.</t>

</section>
</section>
<section anchor="recursive-nameserver-behavior"><name><strong>5. Recursive Nameserver Behavior</strong></name>

<t>Recursive nameservers adopting this mechanism SHOULD implement the
following logic:</t>

<section anchor="when-sending-queries"><name><strong>5.1. When Sending Queries</strong></name>

<t><list style="numbers" type="1">
  <t><strong>OPT-OUT Possibility:</strong> If the resolver already thinks that it
knows the transport capabilities of the authoritative nameserver
it is about to send a query to it may opt out from DNS transport
signaling by including an EDNS(0) "No-OTS" option in the query.</t>
</list></t>

</section>
<section anchor="when-receiving-responses"><name><strong>5.2. When Receiving Responses</strong></name>

<t><list style="numbers" type="1">
  <t><strong>Opportunistic Parsing:</strong> When receiving an authoritative DNS
response, the resolver SHOULD parse the Additional section for SVCB
records.</t>
  <t><strong>Owner Check:</strong> If an SVCB record is found whose owner name
matches an authoritative nameserver identified in the Authority or
Answer sections of the <em>current</em> response, the resolver MAY consider
this an OTS Hint.</t>
  <t><strong>DNSSEC Validation (Optional but Recommended):</strong>
* The resolver SHOULD attempt to DNSSEC validate the OTS Hint. This
involves validating the SVCB record itself and its corresponding RRSIG
(if present) against the DNSSEC chain of trust for the zone that owns
the SVCB record (e.g., dnsprovider.com for ns.dnsprovider.com).</t>
</list></t>

<t><list style="symbols">
  <t>If validation succeeds: The OTS Hint is considered a <strong>trusted
signal</strong>. The resolver MAY then prefer the signaled alternative
transports for subsequent queries to that specific authoritative
nameserver.</t>
  <t>If validation fails, or no RRSIG is present: The OTS Hint MUST
be treated as an <strong>unvalidated hint</strong>. The resolver MAY still
opportunistically attempt to use the signaled alternative transports,
but MUST be prepared for immediate fallback to traditional transports
(UDP/TCP) if the connection fails. This is particularly relevant for
scenarios like vanity names (e.g., ns.customer.com where customer.com
is an unsigned zone, but the underlying server ns.dnsprovider.com is
capable).</t>
</list></t>

<t><list style="numbers" type="1">
  <t><strong>Prioritization:</strong>
* Any DNSSEC-validated SVCB record found via explicit query (e.g.,
ns.example.com for a queried domain MUST take precedence over any
unvalidated OTS Hint.</t>
</list></t>

<t><list style="symbols">
  <t>The OTS Hint is a mechanism to <em>discover</em> capabilities
opportunistically, not to override trusted delegation or service
configuration.</t>
</list></t>

<t><list style="numbers" type="1">
  <t>Fallback: Resolvers MUST always be prepared to fall back to
traditional UDP/TCP transport if an attempt to use an alternative
transport based on an OTS Hint (especially an unvalidated one) fails
or times out.</t>
</list></t>

</section>
<section anchor="validation-of-server-certificate-out-of-scope"><name>**5.3. Validation of Server Certificate: Out of Scope</name>

</section>
<section anchor="resolver-caching-strategies"><name><strong>5.3. Resolver Caching Strategies</strong></name>

<t>Resolvers implementing the DNS OTS Hint mechanism have several options
for caching the transport signals received via OTS Hints.</t>

<t>A suggested primary strategy is to set the EDNS(0) No-OTS option
when no transport signaling information is needed (because the resolver
already knows the authoritiative nameservers transport capabilities from
a previous response or for some other reason).</t>

<t>Three possible caching strategies are listed below. Each strategy has
different trade-offs in terms of efficiency, responsiveness to changes,
and resource usage:</t>

<t><list style="numbers" type="1">
  <t><strong>Standard DNS Cache:</strong> Treat the SVCB record like any other DNS
record, caching it according to its TTL. This is the simplest
approach and will simply cause the resolver to fall back to UDP for
one query if the transport signal data has expired.</t>
  <t><strong>Cache-Until-Fail:</strong> Cache the transport signal until a
connection attempt fails, then invalidate the cached entry. This
approach uses more aggressive caching based on the assumption that
changes to transport capabilites are expected to be rare, and there
is no risk of presenting any data that is no longer correct. The
possible downside is that with an "alpn=doq" the resolver will not
learn that, eg. the authoritative server later started to support
DNS-over-TLS (in addition to DoQ) if it is successfully using the
DNS-over-QUIC connection.</t>
  <t><strong>Success-Based Refresh:</strong> Refresh the transport signal cache entry
each time a successful connection is made using that
transport. This provides a balance between efficiency and
responsiveness but requires additional bookkeeping.</t>
</list></t>

<t>For a more detailed analysis of possible caching logic, see <xref target="RFC9539"/>,
section 4.</t>

<t>Note that the resolver always has the option of not using the EDNS(0)
No-OTS whenever the cache entry is getting close to expiry.</t>

<t>Given the variety of deployment scenarios and operational
requirements, this document does not mandate a specific caching
strategy. Implementers SHOULD choose a strategy that best fits their
operational needs, considering factors such as:</t>

<t><list style="symbols">
  <t>The importance of minimizing connection attempts</t>
  <t>The impact of failed connection attempts</t>
  <t>The computational cost of different caching strategies</t>
  <t>The memory requirements of maintaining cache state</t>
</list></t>

<t>The chosen strategy SHOULD be documented in the implementation's
configuration options to allow operators to make informed decisions
about its use.</t>

</section>
</section>
<section anchor="the-edns0-no-ots-option"><name><strong>6. The EDNS(0) No-OTS Option</strong></name>

<t>To provide a mechanism for resolvers to explicitly opt out of
receiving transport signals, this document defines a new EDNS(0)
option called "No-OTS" (NOTS). When included in a query, this
option signals to the authoritative server that the resolver does not
want to receive any transport signals in the response.</t>

<t>The typical use case is to set the EDNS(0) No-OTS option when
the resolver already has the transport information it needs.</t>

<t>The EDNS(0) No-OTS option is structured as follows:</t>

<figure><artwork><![CDATA[
                                               1   1   1   1   1   1
       0   1   2   3   4   5   6   7   8   9   0   1   2   3   4   5
     +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
 0:  |                            OPTION-CODE                        |
     +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
 2:  |                           OPTION-LENGTH                       |
     +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
]]></artwork></figure>

<t>Field definition details:</t>

<t>OPTION-CODE:
    2 octets / 16 bits (defined in <xref target="RFC6891"/>) contains the value TBD
    for No-OTS.</t>

<t>OPTION-LENGTH:
    2 octets / 16 bits (defined in <xref target="RFC6891"/>) contains
    the length of the payload in octets. For the No-OTS option,
    this value MUST be 0 as there is no payload.</t>

<t>When an authoritative server receives a query containing the EDNS(0)
No-OTS option, it SHOULD NOT include any OTS Hints in the
response, regardless of whether it would normally do so based on the
conditions described in Section 3.1.</t>

<t>This option provides a clean way for resolvers to opt out of receiving
transport signals, which may be useful in scenarios where:</t>

<t><list style="symbols">
  <t>The resolver has already established transport preferences for a
particular authoritative server</t>
  <t>The resolver does not support or does not want to use alternative
transports</t>
  <t>The resolver wants to minimize response sizes</t>
  <t>The resolver is operating in an environment where transport signals
are not needed or desired</t>
</list></t>

<t>The No-OTS option is designed to be a simple, lightweight
mechanism that can be used to disable transport signaling without
affecting the normal operation of DNS resolution.</t>

</section>
<section anchor="comparison-with-deleg"><name><strong>7. Comparison with DELEG</strong></name>

<t>The idea to use an SVCB alpn parameter for transport signaling
originated with the work on DELEG <xref target="I-D.draft-ietf-deleg"/>.  The
current document uses the same data format, but as an opportunistic
addition to the Additional section rather than as mandatory part of a
changed delegation mechanism.</t>

<t>Both mechanisms have distinct use cases, and pros and cons. The major
advantage of the DELEG mechanism is that is cannot be spoofed or
filtered, as it is an integral part of an upcoming protocol change.</t>

<t>The opportunistic mechanism described here has the major advantage of
being available immediately without any changes to the DNS
protocol. Furthermore, as it is a signal directly from an
authoritative nameserver, a single OTS Hint may allow the recipient
recursive nameserver to upgrade the transport used for all the zones
served by that authoritative nameserver (which may be millions)
without the need to make any changes to the zones, nor to the parent
zones.</t>

<t>Given the current DNS landscape with a limited number of very large
providers of authoritative DNS service and a limited number of large
providers of recursive DNS service the opportunistic model described
here has the potential of enabling upgrading the transport for a
significant fraction of the DNS traffic with a limited amount of
effort.</t>

</section>
<section anchor="security-considerations"><name><strong>8. Security Considerations</strong></name>

<t><list style="symbols">
  <t><strong>Spoofing of Unvalidated Hints:</strong> A OTS Hint that cannot be DNSSEC
validated (e.g., for ns.example.com where example.com is unsigned)
is susceptible to spoofing by an on-path attacker. Such an attacker
could insert a fake SVCB record advertising a non-existing transport,
thereby denying connection over that transport. However, since the
hint is opportunistic and not required for DNS resolution, the
worst-case scenario is that the resolver attempts a connection that
fails or falls back to traditional transports.  Security for the
actual DNS data remains unaffected. The cryptographic validation of
TLS/QUIC (via X.509 certificates) for DoT/DoQ would still protect the
integrity and privacy of the connection itself.</t>
  <t><strong>DNSSEC Validation:</strong> When a OTS Hint is signed by DNSSEC (e.g.,
the ns.dnsprovider.net SVCB record from a signed dnsprovider.net zone),
it provides a trusted signal. Resolvers SHOULD leverage DNSSEC validation
to distinguish between trusted and unvalidated hints.</t>
  <t><strong>No New Attack Vectors:</strong> This mechanism does not introduce new
attack vectors for DNS data itself, as it primarily concerns transport
discovery. It relies on the existing security properties of DoT, DoH
and DoQ for actual session security.</t>
  <t><strong>Safe Rollout:</strong> As existing recursive nameservers carefully avoid
data in the Additional section that they do not need, the OTS Hint
will be ignored by everyone except recursive nameservers that
understand the OTS Hint.</t>
</list></t>

</section>
<section anchor="operational-considerations"><name><strong>9. Operational Considerations</strong></name>

<t><list style="symbols">
  <t><strong>Response Size:</strong> Including an SVCB record in the Additional
section will increase the size of UDP responses. Authoritative server
operators should consider the potential for UDP fragmentation or TCP
fallback if responses become excessively large, though a single SVCB
record is typically small. Recursive nameservers should usually set
the EDNS(0) No-OTS when they already has the transport signaling
information.</t>
  <t><strong>Server Configuration:</strong> Authoritative server implementations will
need configuration options to enable this feature and manage the
identities list.</t>
  <t><strong>Rollout Strategy:</strong> This mechanism supports a gradual rollout.
Authoritative servers can begin sending hints without requiring
changes from resolvers, and resolvers can begin processing hints
without requiring all authoritative servers to implement the feature.</t>
</list></t>

</section>
<section anchor="iana-considerations"><name><strong>10. IANA Considerations</strong></name>

<section anchor="no-ots-edns0-option"><name>10.1. No-OTS EDNS(0) Option</name>

<t>This document defines a new EDNS(0) option, entitled "No-OTS",
assigned a value of TBD in the "DNS EDNS0 Option Codes (OPT)" registry.</t>

<figure><artwork><![CDATA[
   +-------+--------------------------+----------+----------------------+
   | Value | Name                     | Status   | Reference            |
   +-------+--------------------------+----------+----------------------+
   | TBD   | No-OTS                   | Standard | ( This document )    |
   +-------+--------------------------+----------+----------------------+
]]></artwork></figure>

<t><strong>Note to the RFC Editor</strong>: In this section, please replace
occurrences of "(This document)" with a proper reference.</t>

</section>
</section>
<section anchor="implementation-status"><name><strong>11. Implementation Status</strong></name>

<t><strong>Note to the RFC Editor</strong>: Please remove this entire section before publication.</t>

<t>The TDNS Framework of experimental DNS servers developed and maintained by the
Swedish Internet Foundation implements this draft (see <eref target="https://github.com/johanix/tdns">https://github.com/johanix/tdns</eref>). TDNS has support for both the authoritative nameserver and
recursive nameserver parts of the draft.</t>

</section>
<section anchor="acknowledgments"><name><strong>12. Acknowledgments</strong></name>

<t><list style="symbols">
  <t>The participants of the DELEG Working Group, Peter Thomassen and Christian Elmerot.</t>
</list></t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC7858">
  <front>
    <title>Specification for DNS over Transport Layer Security (TLS)</title>
    <author fullname="Z. Hu" initials="Z." surname="Hu"/>
    <author fullname="L. Zhu" initials="L." surname="Zhu"/>
    <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <author fullname="D. Wessels" initials="D." surname="Wessels"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="May" year="2016"/>
    <abstract>
      <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
      <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7858"/>
  <seriesInfo name="DOI" value="10.17487/RFC7858"/>
</reference>
<reference anchor="RFC9461">
  <front>
    <title>Service Binding Mapping for DNS Servers</title>
    <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9461"/>
  <seriesInfo name="DOI" value="10.17487/RFC9461"/>
</reference>
<reference anchor="RFC9250">
  <front>
    <title>DNS over Dedicated QUIC Connections</title>
    <author fullname="C. Huitema" initials="C." surname="Huitema"/>
    <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <date month="May" year="2022"/>
    <abstract>
      <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9250"/>
  <seriesInfo name="DOI" value="10.17487/RFC9250"/>
</reference>
<reference anchor="RFC9460">
  <front>
    <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
    <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
    <author fullname="M. Bishop" initials="M." surname="Bishop"/>
    <author fullname="E. Nygren" initials="E." surname="Nygren"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9460"/>
  <seriesInfo name="DOI" value="10.17487/RFC9460"/>
</reference>
<reference anchor="RFC9539">
  <front>
    <title>Unilateral Opportunistic Deployment of Encrypted Recursive-to-Authoritative DNS</title>
    <author fullname="D. K. Gillmor" initials="D. K." role="editor" surname="Gillmor"/>
    <author fullname="J. Salazar" initials="J." role="editor" surname="Salazar"/>
    <author fullname="P. Hoffman" initials="P." role="editor" surname="Hoffman"/>
    <date month="February" year="2024"/>
    <abstract>
      <t>This document sets out steps that DNS servers (recursive resolvers and authoritative servers) can take unilaterally (without any coordination with other peers) to defend DNS query privacy against a passive network monitor. The protections provided by the guidance in this document can be defeated by an active attacker, but they should be simpler and less risky to deploy than more powerful defenses.</t>
      <t>The goal of this document is to simplify and speed up deployment of opportunistic encrypted transport in the recursive-to-authoritative hop of the DNS ecosystem. Wider easy deployment of the underlying encrypted transport on an opportunistic basis may facilitate the future specification of stronger cryptographic protections against more-powerful attacks.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9539"/>
  <seriesInfo name="DOI" value="10.17487/RFC9539"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC6891">
  <front>
    <title>Extension Mechanisms for DNS (EDNS(0))</title>
    <author fullname="J. Damas" initials="J." surname="Damas"/>
    <author fullname="M. Graff" initials="M." surname="Graff"/>
    <author fullname="P. Vixie" initials="P." surname="Vixie"/>
    <date month="April" year="2013"/>
    <abstract>
      <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
      <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="75"/>
  <seriesInfo name="RFC" value="6891"/>
  <seriesInfo name="DOI" value="10.17487/RFC6891"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">




<reference anchor="I-D.draft-ietf-deleg">
   <front>
      <title>Extensible Delegation for DNS</title>
      <author fullname="Tim April" initials="T." surname="April">
         <organization>Google, LLC</organization>
      </author>
      <author fullname="Petr Špaček" initials="P." surname="Špaček">
         <organization>ISC</organization>
      </author>
      <author fullname="Ralf Weber" initials="R." surname="Weber">
         <organization>Akamai Technologies</organization>
      </author>
      <author fullname="David C Lawrence" initials="" surname="Lawrence">
         <organization>Salesforce</organization>
      </author>
      <date day="6" month="May" year="2025"/>
      <abstract>
	 <t>   A delegation in the Domain Name System (DNS) is a mechanism that
   enables efficient and distributed management of the DNS namespace.
   It involves delegating authority over subdomains to specific DNS
   servers via NS records, allowing for a hierarchical structure and
   distributing the responsibility for maintaining DNS records.

   An NS record contains the hostname of the nameserver for the
   delegated namespace.  Any facilities of that nameserver must be
   discovered through other mechanisms.  This document proposes a new
   extensible DNS record type, DELEG, for delegation the authority for a
   domain.  Future documents then can use this mechanism to use
   additional information about the delegated namespace and the
   capabilities of authoritative nameservers for the delegated
   namespace.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-deleg-00"/>
   
</reference>



    </references>

</references>


<?line 574?>

<section anchor="change-history-to-be-removed-before-publication"><name>Change History (to be removed before publication)</name>

<ul empty="true"><li>
  <t>Initial public draft</t>
</li></ul>

</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA81c63LjxpX+30/RK/+IqJCc0Vxsj6r2opE0HqVmJFni2JtK
UikQaJKIQIBBg5LpePJY+wL7Ynu+c7obDRKUnYpTta7SmASBRve5fufSPRqN
VJM3hTnRB6frZlHVeZM0+YPR51d3elInpV1VdaPv8nmZFHk5P1DJdFqbB7p/
7x1ZlZbJkobM6mTWjP5SLZIyH2WlrVajxj8wsv6B0fPnKksauv9v56eTi88q
pS/zqt6caNtkSuWr+kQ39do2L54/f/P8hUpqk5zoy7IxdWka9VjV9/O6Wq9O
MOnrG/09XaBx9Te4qO7Nhu7I2gdG55iWUrZJyuzPSVGV9OqNsWqVn+g/NFU6
1JYmWJuZpU+bJT78SamEyXOi9EhpnZf2RP9urO8aU9I4S7okS/4dFhtfruo5
rf5HImpVnujJwui7R5PldhHmo99V6zLjG+j+lL40WDtuM7hilklenGgm49i6
kf8rd0/bJp81prCGfjPR5D6M9Tu6gZZofgyz+2CqsnP5V5tdQSOPZ37kn53d
xVi/NfXcNvX//k9LvIs6v+9e/9XmZ2jo8VSGrvZRT5VVvWTxPyGxK2fRt9Fo
pJMpPZykJDqTRW41ifl6acpGr+pqVVljdaKXJoWw26Wmh3Wyo1HW1A+mtrqp
VLWCGqzp5iZPk6LYaNEI3SxMXmu75t9lnAKzlVGCAil6LQlrVVh9aMbz8ZBf
UNHwevLhTh+eV5NBdO39ZHLDV98PNPEo/KC+/XR5huvfDgY6y2uTNjSVx7xZ
5CWmok+zLAd1aWaWfqRPupp1l6YwWG1oWiWRYayZPAc0QDOaJtZkBzpZ0WyT
dKGTfInVa1Mm08LgoarwFCG+pjxXzG+9mtdJFq2XeFuWMgGrl1VttJnN8jQn
DhSbIaZam+lG5Ut60wPUf1XnD0lKP9G01zRV+oSBV6ZmxpapYeLa9dSav65p
GMVSkcgrxuCyiRgKjhuwyGRYQFk1NPu/roliNOxGe25o3D83Y33Z0CPKJjMz
1NMkvX9M6myUVssVkYyWLpOhJWBJxFfzYEr9uKB/iJh3F2f6gYyjk2uiNzgB
gmIaeDUJnMUwpCE8rdpk4/1yWWohi+HrlTC2I4D6cLpu9JTscTZQjaFLREHw
uU/0LBFtPqebiBQkJbfvzt68fvlGT5kKD3mGZxPVko5+eFzk4L6TErmjox2i
GXqZBD14XCSN2vP+vPEKwoy61m8v9O3Fx+vvLs5PdJcK9Hlq8D5iTpFMqzrB
tIkGNPNvSMzXU500J+oPi6ZZ2ZNnz+Z8bUyceiae64dnv8yP/enwnx5iMBah
qyyEK8X0H50zg5I43QPz/PKGxEaSmdzatSF3ZRp4r0W1LjJiXUErV8kDGUBW
NlaRsWYzKsQn0zEHPWZrsj9kF9LUrEhu6BvLNnEY5IXtW+ZZVpCF/EIfHR3/
cQzzW1fZmnXl6Eh05bwiW1vqK7Ll+m5D0rEku3J1N4AmLpM6J7tSmyIngaR1
fDq/YQ2YnN1ADRURa0mymLLE07ybR0Prau0D7u2TGDI3+vtFTnOj5VmjW6tI
MEE/mqIY0TJo/eQ0TObsBIQi0QQaHkFaVnu6iT6ogvSwTua4vKwyEr3IALVD
F/m96TG36m9/+zdShq++fv315897bK/c8ubVl8efP3cMsYYhVmyI/U0vXj+n
m9haLthe/bxJI3Zd/JCL+pJxYWWhAZxKgWQ5jdOaUh3cXFXSsGsoqQWR1N13
Z295dJm9mPiUkJRt14DpxQsaRqyekYRaRW/wL/XmfdMaVQuLBwOq0wKGXJsf
VgXZdLggEr8asgLhENa615PIk88u9YwcOT25Ij7Tkz8SjBuLJOi6mhJaBK/B
Z+d6CFZitSK29MrWrRWkAWW64cU6k27DTECrWT5f12KKk4bVL3qphsgUTxpf
hsrXHXPbB5xZW9T1hDQmUGjMhKdrxOn7hAejL/o9LeQAGl498ht2kIYConI2
lfgfHDut5sFsyH7a2LMmq2SaF0QPzBeqAVejfhYEBJePV3h+CUdz8qYEwAhe
4Rq9zhQzHnp7rtE84Y3xMmd6TKaEqUJYXsGQOEiYghgVbKbzOQy/iBwjz80g
boo87mIYOdhEs8gXQ+9jjR/Oe9dgMwlEr2uYDACOoWKBgkyli5zGyxgnVeQ4
gQDE8TMtsArw7cZZjLEznGOYzps6p4We1g3s5ilNpyFLSWaXRGvdEBd+FONT
G2eBRMeJESR0JDrrIqmH8jubg4YsX+sYf4nhbElO3CKeBKXICAF5fSaH/vnz
mH0FETdxdhO30/p2sSuBbrYzht4G6wFp2HhS7OU4273lumjyVdHx76ArcUIT
yAWx7svqsTDZ3EDqiIeYDLGxlWDMywECwSQiR6nJGQrSrBQNQ6x1sI7c8SNA
mbyoIaTRQtTcyoWYtxAPEmUyIQ3BrVVRbaDkahsIB9QurxcW4O00GPlU+HXg
/BWupJu0YPOQgX+AsnCLCZaCNYjxJvljpaA5UdBrBbnV8H1mKaJKJJ4KAgWR
SuDfgmFe4mFsLMEgzekK789/0G9BzZjd3vrhcTa8OqBpxaDDzCj6pLfNyc/b
hpVZ0CvJMFETTKHJkaulFYjszPLaNvG4RF4Kp470aaTBLVJkwlNAVljPwTXB
noeImHIHSZjuB5Bw5mUmUkrgWoIwGKKU9ZxMQ71ZgTQ7FtuHJs6ekAdI2GSK
U4wm+chOhkDFBpMXK8n0ocmyW4Dqe7DAZKjNDPqKe1qZ3bFgIiVqugXNRf9Z
wGkiM3JJQDXOmMa4nubeUV4xOreJGG6Jdj5ZvHDLpN+ZgOOOjq6qxnjFpbH0
Bd1W1UdHJ/qmIBEEK5YV0DiIB8KyOKYOtvE6V2uCW4LkaBLfw+ZK6MSwf5vd
hAk3mnGCxAWleYxRCUQWDq11Nl4x2eD65fTRfrjHd6mFYByKNv6C8Dp7IL1O
xLpIrEBzpYVkiFwKMyfIpS2BDgrhvDuCezd1s1HL5J4dXBuRAa9ZC8qwZRRz
IahBMEEWR5XLpclyEk2KYVXCA7GpgGqnyVoALY26dDbReHCHdRKVarIWNcHw
dQ3od6QD+HvC5PvxvaDDeHhQ4Wwnadcu2bovaD0MDyiGgNYrpOsbtH/I65Ie
wmriOR52p09MCqZg4Mw13gGGuIhI9RCXJwYa5sHuk4m0WLM38vluRA031tQ5
676XTVoNtHyuyHancAROTlZEBfPUAodamIq4dmp4YDK/GWwTCZdKXGBFv5dY
JYOUqUhL0IfWXx6a+Vhna57jCgYXVuRHQ8FTidQUkdoOdl1G/xo995dimWDL
y25SasdWjYFXKna+HHBiWO+N2T8kTdIaM7dkztxixeJ/RX1yq9Z2zfqROC2U
ERPBDy6O2LRej3jFw+9QWnnjw7isI4Ssv0FOEbQKXVogRTpmDcxEtZ4vhorJ
T5RAElFmvU0CSScQYquFZmWIrSCTRbEDGEk+IeCS6OGMCuzwXAjCtHzMIaEl
xTZAuL1vTGikzcpBrRlhU0SyURDnISSx9SmADSqqrDIiDDFWIRNI1iy38Yod
q1iJxBQFY0VzKArgJ0VvPDivXr88IGgxJuNITwcVCJEtxfrPEOd75pZVOXIQ
G1HHxqtw3yzk/VN2O2Y5NY6rHYB1yHm8agn8lTeS68iXZkDy+p4cPjF43ef2
vODg6acFHw+Tz1APCQM4VpmpKc2M4yjIgQeU1nndFwT0JyQFeVkV1XzjUyT3
FHs9cgx98PHT3YSoxv/XV9f8+fbi20+Xtxfn+Hz3/vTDh/BB7lD05frTB/c7
PrVPnl1//HhxdS4P01W9denj6e8PGEqog+ubyeX11emHA9GmDgiqjYOUnBUh
+wYtSDj3mdb5VND127MbdfzKoY0Xx8dvQh7g6+OvXtEXxFmCW1j65SuRfwOY
bRLANGgLxeQrYlhh2bUcHXVLUFeR4cMvhFPwZXByBPjYptPFOiyqIrNqN9zg
GJ1NB6fSdbDgGaer3JtvA9KM33rrJGzPK8nUpXD1MGZ0zUXAQ5+PYSCBjDLP
o6iq+/WKEWZvHgsZcCfRbmqium6C3pfyTErN2RlJiMB2FGtY3N2wzHnzPTn8
nrxBiOmHDklztlu1pYn9GdzW0PwmSi6oOLng1sKTv+XJYzl3LkH0NpdhZVlD
kbpZXorMxUknp2Qv/yhBRje1EhIq+qNHAl790srjBQfhKisGlkXjKctZKUdl
3NYl/hMJEpiHgFvVmqhZt/KXgoptrYFmATdOa7AyxdpwnqmxcSTVPFaiowtY
oEXykFfrOtjPfdNvI2E8J7G5N8b19iht0LV3BL8mPzMsG1OVvCoBeHVBsnT4
fEAiybQQ/83M5LCFLNDo+tOkzTxtHEtfEUv3WoG3fqrg5xd8O2dUJnU+n9Pv
Z4GizNBL5pifs1cgn3XZRytnVyN2BxjL2aMjUqwjohWbmlmFFJxUF8K7wZ+l
aSjMPR7THEmpbm8tQbUbBoupcSqM66Tv65pEX5SBNKEho4ObBz4bpsSqZGLH
WGwD5DR5gF6npX2EcHnZc1fdIjcqEkqfnApMVOoF5nlnitno0iXtJHrDTCe/
VOcVYWtCPzA73xK0Q+Yv69QEDt99e3410Idwt6Xx+uHzqyZT9BDBMftMMocw
GANRznWZxSXJQFG4LJomGwgVOKBJJpR6iTW1adazIGn/wKKULzLJhGvx/L01
Kb1bjq0m+Of9UHFOn5N48XLZE3jEoyXFvWUsX2ENp1OWGs+6q2oEgbxexQwS
lfbQLrZVXhHdY04fOXceYyh62Wt+2RYsu729u/yGDR5edSlTEFEsXVGPEV1L
MnzEQotKMi70UaqmQ8ECfm54rGNIZxKoqDhIIWhQdZ5glBz41s5uHAwCkNdH
n1IUxKAvg0D9nPa7oIVzacCZITkJ2fWsVaU9HpsfEqTaUOUb6oyMeEoRA2HQ
ekzwfqhxIStdMFSPS1JpMlQVIecUxEXathXYF/rwoEf9DgbDXqywneTThO1a
g9WtWEThsJNLCvNaBeNk3cAl7ZHSSBqUBVErwS9cRJSlhyIujJJPtlmhlAsV
XD1CgldfenBxDTgvi9u4cgA5mnlSU/BrrZft4BtZiNa2zeV6lW/5DOf/jpNE
/unYwk+i75oh9nTHdbvcb2TFFZEKDQBkcQElJFNJ2Ov7q4tbr2q0XFoYT9C9
Nx7TvwrXQbefdc1CC0kT+ILJzqolcmvEzeFnlMDBby4JO76SxJEYBokjuRwP
HOA6+3B6d8cKfKUPfeeM/3Hy+5sLhmGiRnxp8sEvlz72rdN5SVppuqhsSFoo
vSct60VrrM8WVS7WDEPnUrYhtLpVaKOBMhIGyzkU9CasS5YUFpOQ6Y9KBvC6
dj39C8fQpGe1a+qggaQyQy96SIq1Cf0PNeAYzePFq0Ww7XnU2xCh1T/++eb2
8vr2cvJ70OXY4c4grlylgMWUF7hsC8VLjMMxhZnPyXATR9BJWdqxBvKFubSu
0WO+QD06DOuxAA3kqqmduU1Ob7+5mGBmY31YVxWbGk6zRMO6yiU8fwvOQZy4
+NdGeS7Gjnlem5modLOtBhjH5evpxi7dTm9PP95J/ARJJnp7vH9DukY4CbGP
m6jDarzOXR63LrZN5YTAlX0L5nCQFKvyAEOs/PjdgnUeLZP1rjaFQQZY2oFC
9ED+G6McYrx/z4io7M3D94Xro6q+DZf+SnRXeOZyxvlPpzcH+erh1UIqtvQE
vn4pX1ctBRKu58XZRAzE5G/XwSYZ5QyJpVsldPkuUP7oQhyTPj6BIaSpbBkG
Uv2xBz8Sjjr4gOU/Pj7Gnm3MCYPdAdjB57bZNVVDn+10bxArm3CLGBk9izQ7
CyOpe4My0on6+9//rt6bhIY+0eMxJxkBZk/UzmQ0DNipPh6/GL8cv6IbPb49
UVv3abkXaeWurx4/decOnVQUOp/00GEsE3o9/nL81fjrfTcITDnlxe25hRl9
TPp74GVpSCJHf69fHjw9LD+JkUHGlvsvPPfBnHXpGtcYuUUEgI+1fQv3NjeT
+EKRfsAQsb4flPZFh6QH+jD4Uos7Lm/QX1FzbmQwFIlNWmDnIw+BoT3SdYhe
h623DBw2+/8kL10ybAtL99dtSdn99UkZwKInktR3HSqsRT28kBgcbOA7+oSH
UHaonSQ2jsZaZNjNZLuuoF0BQibfS9fThYbEdza6uz08c5H/a3KqvVk4F/Vz
0H/bk5ug5WYIa9h30PtbwOtDeY+WWZLbkL2o5nl64gDla84kcK3yzhVevpV8
Ht7LgbxPWtzw4kIs6XQsZKOToibhhDPKy/tQZoI1B1a2W1Xgjvt1DmNvOEpj
CI2TKQqgvuHCG3D67owv0UPjDlawHZff+ripj8c4Cm6jxQMJFw98vOiMPL9m
HCj2wlPsNmSHbn22q6VaJzlHPh+peNCNn2zzSr1dTDTZNiHZobLjLflGCZ73
JfahVDIMN4/5ZMc1w5ezhUnvHQ+383oh7wB8G8EdDEZBR7owT3cz7aL5YH0I
bWKUbs4mcP/IlbKP9i0d0R6nCjMRCWlzK2OF4uSHU7fvQiOxPpSsAZEI1h1J
p+WSc7xIcKuQFulQOKotdTuTTSfoEsSp8vIBT9vQvuyybx3Sum6wMnMJoJ2Q
Xh3mM4+GBqHdxMFXTIE0PJdkFup0oXOMrRMrHOq8avvFLlDaipL46d3gScIj
Eoy2ERsdGKkxmZWtCG152wZ+oFhCpHflQ5c3Pzoad0kLDrJTXDlMDcfJt+L5
Nr0Ud3Z1e9VDux3DcVpwiEW6nfmtQPYsB5VEtFOiMuvQRJtg3FojAlvF5VyT
uJIQidzR0bpsm+gWHHz3rJVUvyh6djxEsrV2atxHhijMGypIro+yaaroxMxc
r9J2dZKJExUk22HUoatJDpB3ksRSqKYyWUKhOqoWS0NAiBWUTU2ZUIzmGoIj
jGSjoDzkhSBrkmiJLylR3g5EE/QlyI2EquBGI2dXdiUVPpjdSMElT04a3kjo
6LfOsHaflhunP6OWZ7F+iMF7yJO2+1UcS0h7xVDD1dN8ftrVrJg1TXLPzEmx
CQfBvuzq2KhYWiJzdbSjT50uoUof+W7Oo47D3BWpoW+Kw811nrX9B5lBJ4/P
jrswWnWSDpIEfeek50TfhhYXXlVSPCYb25E7JBq4z16kTcXS5qvera/PpebW
FXpc6dN4zVtnpPmkJc2hYUUX7YHUtPQkuRmI7KLXEQVwCwzQumtkzCJn4CJx
uEHkoDnpaE709VqC9LRamc6jnhr6DO2vJJB3DfYOzB1EaokV8JY3/q6FWVbQ
8pVgHfJDaLgvHNCwCkKVuhf09ctZBxmMCKof1iLyPo32pfgGEiuT3HDHT6Ul
mWb60+KKCzxl1Vv/77SkEcolP0CvOZwa6Y2IPbTyELAFfN4q57v9WHuwIKCb
QjuNQcmrrSNCekO/gzTjSJPMgMuIXDX06NsT0gZORQ2aJMgEhMf6Ak2vgUxo
c8hydE4yYMYerFE1m1kGMRQMMEzxO6+wFcHNi1ZVcn6u8o3QQyUN9a7EtUbo
72tid9h7mdSy+wHyxEWxCXzLDlxg28rpFF5sgIVSJPZLJFuVpLjEglMxsphM
PrRmXJwLRNMyCG63pPn2XP51o3f5ua3mvHllJiAOiEOMpHMkO/073HuAjkMy
qm6fFkNQXvboE6lJMXqHTYpEAb7WP8waN1IUjZTdbuePc+UMKvKyg9BAIe58
bQi7C0qLl88ZAKlrzecI2SGfnqrBBrEMW7tetvXcNrNqnaPdFmMnbrRumq1Y
SzTyJLXb/QZ+Mp7mqFHXub2HdDkAIkHBRugnURTfVlQlir2ursBog7N9Xuh3
evwkA1W2YfVBl7u+IRKjFCapZXlDjWa73XDMuWFsM6jRBFy7lbmEJQYhER3B
/4x4ZxBaXVxswiAaxUBf7BJEaS1vwGq7lDqD8AbNluUe3d/Jk6O3zKJbM6P1
LCBD7mO/FLEwiCzgJQYSAFeBxpgwlc7+IBIO7MP0cxO+bzeJRXswpknBe5X8
ToTWVnAusY3ovMUA1AlJjWhbzrSq7u+NWdF70cXOYIPlNDMNt8DReEmxsTmb
pB2bx9E9dkqZTlf0MJTCX9Go0uzsc+NRCM+e3rcJuyCY3gJw0faSOSeinBOB
9zAPDs5HhAYN56ZhgU4LRJNoEYYxQCz9DejAjzwQljRSdm33GOgWZHI7FddR
pPEx7tYfbqXDQ5ffEoa2MXHjk6OQ8jZ/rC+9x4Y/cnFfuqgw1aR1DUynKQoT
ru/N5LWKJsQ+0Q5DLIT1zpKUC4puZ9mJx3pkakl6ElfXXuZlvpSNL7u2zbaP
JNJCKR2QT9yKbbbrxk8rxXZKEDW4tV2/6B5cGpKwTXcfBOaH1lr64wkyYy1X
cKWpSApggUxtVt5zo00BdAu3v7Fd/OlBkFS+yTlHFVm6hFZzB0MYz0p1zCpJ
BoEla+7mAGT7UqKwLZgj4T/XR+O8XHfXerwnO96Q53NKFSq3oRtoG57tCKJv
+uG+fq8xTqMA2WkpIdt0eIXdby6pFNraYEDFx8rg/mkPCHt3GcV9eh3dDk0S
j4nsmXB4kn3NLtoMe4lCswzo6rpxGcCjhfiXoEu2D6o3VegNTRQqxGizEc1y
7+4fHL7E7wTg6FzynNA4pI71P/bfcd+fH+S5u/CC/l7S3yv6e01/X9LfV/T3
Nf292XefDPLb0Wj0T/0p/fxE65+eWoN0uY7Ors8v9t3y0682mxc/Mxs3mQ8X
V99M3v+rZwOGq3e5KTJRP8Ee4jYhEBFlTvidL3RFAI0MyDN9/KWewpQc7rRe
fvn1m+PPnwehcOd8Fgrek7fnPA7Mh4jlOLxFlvxPvIefxLsKU84Jybk06SrZ
FFXCz8mgfuOD6WrG0D2fWzdZnzx67moatSvY+xH9lqWd5G6nFZJNmgB/N9E9
qMDNAlrctmxH7YXtNhlvbFSb9+22yPi9FtgkxFv8+bwS3mREtqfqoHUVNSR2
erfdZi/9cnzs+06dCYlAXEo4mAxWstn1CK0baJP3qscNSLOQ66ciOwlcSa9v
4QynwgIgCDYRttDbxWjnfqcNwLAfT41r3FU63tLR2zG19ZKdTRBVdM07Bs7O
RKkZHScQtwbEM+KkBcpERU7s0Nm5n6nOyIlTCxA2Uz7kdVWy15Q04Q5Vsemx
NjxJl39oj/8Q57DjFOIzS6YM5xiDDCmsni8IoeNftbUjD91fU9d/xZvHreyp
6MmKuL14KpGDTJwKiFy2YBXC4lpOq2LtohjAlK/+ONZnOBOFYj94SERq5xcf
Lr7xPVyy9zhkyuRQAgrjoqYITv7vTk2RDMzzklNjoTqN0zSgIPwOsjf/eTk6
H8vZHAS9ZyNOEmLfM0eVfk9hADMcK4cqt99UsESwiChGcuKdnKSKQ789ZSqi
0cLvJ0qsQ+yAodxSjRKtkji7k8RsjwhQ6m1F64tOVeDMWsYb9dImgBTrTouo
XSwBnC4wkXdgqc4+SM7bMZU6R+D4OJxEBFKILW2rqpqxJKpZDm1xXTWuUMln
Lph57TvEZd/BekUQ3W197RybI1zv7sZpJ9AaMtaP/ds4lWzPa88+ifZZ/sym
/XCu0m4B3C0pJHb8oQpyEkW5t8lvyM+U8yLKccMwCsZ3jVP5Cidg9HffQwH8
eUgdmMgqKkdEFaECZqU90/VwYV/avhrlYcdIL/OigL8YKE8h1mUjVoCjjx6S
8RuRdg+tYXI4Bh/eYDsBbrxHtyAJtGmyMi49Q/ZomUNXyzV2eUFO+KwQsuhz
3tzJ5Q67c/ZU2JSDjjLeKN0zUs8gLZ3jAZpd4atI51rBUx3BW1WN7PPlpCiO
tILUCat2E9jiq+KjBGbutKm4Ld8fBrBFlmSJo80g2u5kADGgX5MBvXOHwWD/
Awfe0hXM27mRKIKCuuOcPkX1AoYc0pgXpNKbf6fbUi1S7TOuquUqpnExSDxW
tzMkFLUGilNdFscLhT22flpTrmRU5QjndISTBGhZnDIowxVCNMA8hAgNEZMs
LwQyThT7ZnrZZY5NhmG3dGACb8nEQWHE0nKzlXCo2oixzW+9rx4N6zCNKxKi
/EFcXUmB8EWngoledr0eJ2hxYKFtRhw2ejQUTGs3PHRZDenp9rPkHBzne7kU
kOCwhKerneTOgoz4VlISvLXbo8l+rMZBeSVYJq7cH+DAxyVUJNArMhVx8Zgk
cfLh7pkcH4dSzH+PXz9/o9O2lmRlE8t5NXmGLkmBrFwKZrPPjbo0E/EPmJt4
Jz7iyGtEnInktgHXXLrT2xA6SpJOHdGBn6mvfPpSJlu23cazTjVUzhdyI2zf
Ces2GKq8iWGzrzW67dJRAdFBf3e8lNlqpUDtSYAWpHWN8w19+tQPyWfibdXa
/X66q0pfmUd9yoqivzOccpMG7k4/VEC47TFI2KslCkbmVlJ1Xmxlu3XUnt5E
pzsRX4jTZbzRLxy4w2fftSd9gdRBEf3BVf4ABdf15PfKKN9Sy7ZSRNSiJsHn
Q8ijvr04mRl9iyTHWjZF2vYtfU4UmKWWk84IF1R5pvr3kwdY5vWRoysPuYed
phflNydH+83B4Y10yfFpav1zYSXm4j4fQ9ptpRHT/oZM+3WUXe237r7hSt9R
mMGtTHE/15M7FUMmnFdB1q3m8z2kUPYjo0AUuqKDHU/7Qqs2R+kOnvP53y0X
ycePoHBGChBSoDBhk7MbFVo28vhYqSk6lISSXJcqHB7wO/ZbXMVtXm3rVrtb
3i55V35/46CbsD+KwJpG9aTvHkPD9f58XRt2RJk7L6muyh6nellie8+v2dra
w0fCMAbbmyp2Z2lyimNmEmQA2VxQICHd1mZ7w4/f9Cza4wv5mx6TETbA4bi8
JIM+1vLUWPXN37rgcZ63B7qwqQqoW9yj22zDQJINbcgxDLUvGxdb47nt1mFI
tTMkw+B9u6u7faCeUv5oruc41PD06rRHzb74Qh8/5/ZQJxBePiSdvn2OUG/G
O6SBmA9x0hvHvjgfEzaozJBR8wrLp8dhmOfuhTRFuJvD65vJ4AApIuIol5Jc
ohdJwJFLBu7577e9Hzt3YKSf4GBpQj/JBs7epCVJDxHS8sdbn5jZSWv+mnMC
bfB/x409c5L+gp/04dZ5oINfe06cbX3q3CS/VyUcCbPyBymtiiQ1qkolMErF
Fx4cdiZMLHahgLhMHbJfXnT5PM6O2XA8+Rcd6ARYOIFQvkMKRlIqM67yEzzA
FIrOWccZzkesVg7D+FJa2GKknjjRuVVZ68pKSNXoQxR1nzqwtSG09uRxrLhh
gF1SmOiiPTyOndS0ctmivXEzCtm9gTrv1w9ntGKynknolT5N/UF2vCRx4ROJ
mCmCyFdJ2T4tyZfOWeZDfcMZr8miWiY4Yooperbg3Yro3i6WpuYz7kgwOSbA
y89k99t7uglJpUPXhcFMz3o4PFDqP4gZOTttuS5LUf8HqssR9S5eAAA=

-->

</rfc>

