<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="exp" consensus="false" docName="draft-whited-tls-channel-bindings-for-tls13-01" indexInclude="true" ipr="trust200902" prepTime="2020-05-04T10:35:25" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="3" tocInclude="true" xml:lang="en">
  <front>
    <title abbrev="">Channel Bindings for SCRAM over TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-whited-tls-channel-bindings-for-tls13-01" stream="IETF"/>
    <author initials="S" surname="Whited" fullname="Sam Whited">
      <organization showOnFrontPage="true"/>
      <address>
        <postal>
          <street/>
          <city>Atlanta</city>
          <code>GA</code>
          <country>USA</country>
          <region/>
        </postal>
        <phone/>
        <email>sam@samwhited.com</email>
        <uri>https://blog.samwhited.com/</uri>
      </address>
    </author>
    <date month="05" year="2020" day="02"/>
    <area>Internet</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract pn="section-abstract">
      <t pn="section-abstract-1">
        This document defines a channel binding type, tls-scram-exporter, that
        is compatible with <xref target="RFC5802" format="default" sectionFormat="of" derivedContent="RFC5802">SCRAM</xref> and <xref target="RFC8446" format="default" sectionFormat="of" derivedContent="RFC8446">TLS 1.3</xref> in accordance with <xref target="RFC5056" format="default" sectionFormat="of" derivedContent="RFC5056">On Channel Binding</xref>.
      </t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t pn="section-boilerplate.1-1">
        This Internet-Draft is submitted in full conformance with the
        provisions of BCP 78 and BCP 79.
        </t>
        <t pn="section-boilerplate.1-2">
        Internet-Drafts are working documents of the Internet Engineering Task
        Force (IETF). Note that other groups may also distribute working
        documents as Internet-Drafts. The list of current Internet-Drafts is
        at <eref target="https://datatracker.ietf.org/drafts/current/" brackets="none"/>.
        </t>
        <t pn="section-boilerplate.1-3">
        Internet-Drafts are draft documents valid for a maximum of six months
        and may be updated, replaced, or obsoleted by other documents at any
        time. It is inappropriate to use Internet-Drafts as reference
        material or to cite them other than as "work in progress."
        </t>
        <t pn="section-boilerplate.1-4">
        This Internet-Draft will expire on 3 November 2020.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t pn="section-boilerplate.2-1">
            Copyright (c) 2020 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Simplified BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Simplified BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.1.2">
              <li pn="section-toc.1-1.1.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.1.2.1.1"><xref derivedContent="1.1" format="counter" sectionFormat="of" target="section-1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-conventions-and-terminology">Conventions and Terminology</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.2">
            <t keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-the-tls-scram-exporter-chan">The 'tls-scram-exporter' Channel Binding Type</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t keepWithNext="true" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t keepWithNext="true" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2">
              <li pn="section-toc.1-1.4.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.1.1"><xref derivedContent="4.1" format="counter" sectionFormat="of" target="section-4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-registration-of-channel-bin">Registration of Channel Binding Type</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.2">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.2.1"><xref derivedContent="4.2" format="counter" sectionFormat="of" target="section-4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-registration-of-channel-bind">Registration of Channel Binding TLS Exporter Label</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.5">
            <t keepWithNext="true" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2">
              <li pn="section-toc.1-1.5.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.5.2.1.1"><xref derivedContent="5.1" format="counter" sectionFormat="of" target="section-5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.2">
                <t keepWithNext="true" pn="section-toc.1-1.5.2.2.1"><xref derivedContent="5.2" format="counter" sectionFormat="of" target="section-5.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.6">
            <t keepWithNext="true" pn="section-toc.1-1.6.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-address">Author's Address</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t pn="section-1-1">
        After problems were found with the channel binding types defined in
        <xref target="RFC5929" format="default" sectionFormat="of" derivedContent="RFC5929"/> they were not defined for <xref target="RFC8446" format="default" sectionFormat="of" derivedContent="RFC8446">TLS 1.3</xref>.
        To facilitate channel binding with TLS 1.3, a new channel binding type
        using keying material obtained from <xref target="RFC5705" format="default" sectionFormat="of" derivedContent="RFC5705"/> is needed.
      </t>
      <section anchor="conventions-and-terminology" numbered="true" toc="include" removeInRFC="false" pn="section-1.1">
        <name slugifiedName="name-conventions-and-terminology">Conventions and Terminology</name>
        <t pn="section-1.1-1">
          Throughout this document the acronym "EKM" is used to refer to
          Exported Keying Material as defined in <xref target="RFC5705" format="default" sectionFormat="of" derivedContent="RFC5705"/>.
        </t>
        <t pn="section-1.1-2">
          The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
          "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
          "OPTIONAL" in this document are to be interpreted as described in BCP
          14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> when, and only when, they appear in all capitals,
          as shown here.
        </t>
      </section>
    </section>
    <section anchor="tls-scram-exporter" numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-the-tls-scram-exporter-chan">The 'tls-scram-exporter' Channel Binding Type</name>
      <t pn="section-2-1">
        IANA will register the 'tls-scram-exporter' channel binding type to
        match the description below.
      </t>
      <t pn="section-2-2">
        Description: The EKM value obtained from the current TLS connection.
      </t>
      <t pn="section-2-3">
        The EKM is obtained using the keying material exporters for TLS as
        defined in <xref target="RFC5705" format="default" sectionFormat="of" derivedContent="RFC5705"/> by supplying the following inputs.
        The definition of "client-first-message-bare" and "server-first-message"
        can be found in <xref target="RFC5802" format="default" sectionFormat="of" derivedContent="RFC5802"/>.
      </t>
      <dl newline="false" spacing="normal" pn="section-2-4">
        <dt pn="section-2-4.1">Label:</dt>
        <dd pn="section-2-4.2">
          The ASCII string "EXPORTER-SCRAM-Channel-Binding" with no terminating
          NUL.
        </dd>
        <dt pn="section-2-4.3">Context value:</dt>
        <dd pn="section-2-4.4">
          client-first-message-bare + "," + server-first-message
        </dd>
        <dt pn="section-2-4.5">Length:</dt>
        <dd pn="section-2-4.6">
          32 bytes.
        </dd>
      </dl>
      <t pn="section-2-5">
        When TLS renegotiation is enabled channel binding using the
        "tls-scram-exporter" type is not define and <bcp14>MUST NOT</bcp14> be
        supported.
      </t>
    </section>
    <section anchor="security-considerations" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t pn="section-3-1">
        While it is possible to use this channel binding mechanism with TLS
        versions below 1.3, extra precaution must be taken to ensure that the
        chosen cipher suites always result in unique master secrets.
        For more information see the Security Considerations section of <xref target="RFC5705" format="default" sectionFormat="of" derivedContent="RFC5705"/>.
      </t>
      <t pn="section-3-2">
        The Security Considerations sections of <xref target="RFC5056" format="default" sectionFormat="of" derivedContent="RFC5056"/>, <xref target="RFC5705" format="default" sectionFormat="of" derivedContent="RFC5705"/>, <xref target="RFC5802" format="default" sectionFormat="of" derivedContent="RFC5802"/>, and <xref target="RFC8446" format="default" sectionFormat="of" derivedContent="RFC8446"/> apply to this document.
      </t>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <section anchor="cb-type-registration" numbered="true" toc="include" removeInRFC="false" pn="section-4.1">
        <name slugifiedName="name-registration-of-channel-bin">Registration of Channel Binding Type</name>
        <t pn="section-4.1-1">
          This document adds the following registration in the "Channel-Binding
          Types" registry:
        </t>
        <dl newline="false" spacing="normal" pn="section-4.1-2">
          <dt pn="section-4.1-2.1">Subject:</dt>
          <dd pn="section-4.1-2.2">Registration of channel binding tls-scram-exporter</dd>
          <dt pn="section-4.1-2.3">Channel binding unique prefix:</dt>
          <dd pn="section-4.1-2.4">tls-scram-exporter</dd>
          <dt pn="section-4.1-2.5">Channel binding type:</dt>
          <dd pn="section-4.1-2.6">unique</dd>
          <dt pn="section-4.1-2.7">Channel type:</dt>
          <dd pn="section-4.1-2.8">
            <xref target="RFC8446" format="default" sectionFormat="of" derivedContent="RFC8446">TLS</xref></dd>
          <dt pn="section-4.1-2.9">Published specification:</dt>
          <dd pn="section-4.1-2.10">draft-whited-tls-channel-bindings-for-tls13-00</dd>
          <dt pn="section-4.1-2.11">Channel binding is secret:</dt>
          <dd pn="section-4.1-2.12">no</dd>
          <dt pn="section-4.1-2.13">Description:</dt>
          <dd pn="section-4.1-2.14">&lt;See specification&gt;</dd>
          <dt pn="section-4.1-2.15">Intended usage:</dt>
          <dd pn="section-4.1-2.16">COMMON</dd>
          <dt pn="section-4.1-2.17">
            Person and email address to contact for further information:
          </dt>
          <dd pn="section-4.1-2.18">Sam Whited &lt;sam@samwhited.com&gt;.</dd>
          <dt pn="section-4.1-2.19">Owner/Change controller name and email address:</dt>
          <dd pn="section-4.1-2.20">IESG.</dd>
          <dt pn="section-4.1-2.21">Expert reviewer name and contact information:</dt>
          <dd pn="section-4.1-2.22">IETF TLS WG (tls@ietf.org, failing that, ietf@ietf.org).</dd>
          <dt pn="section-4.1-2.23">Note:</dt>
          <dd pn="section-4.1-2.24">
            See the published specification for advice on the applicability of
            this channel binding type.
          </dd>
        </dl>
      </section>
      <section anchor="exporter-registration" numbered="true" toc="include" removeInRFC="false" pn="section-4.2">
        <name slugifiedName="name-registration-of-channel-bind">Registration of Channel Binding TLS Exporter Label</name>
        <t pn="section-4.2-1">
          This document adds the following registration in the "TLS Exporter
          Labels" registry:
        </t>
        <dl newline="false" spacing="normal" pn="section-4.2-2">
          <dt pn="section-4.2-2.1">Value:</dt>
          <dd pn="section-4.2-2.2">EXPORTER-SCRAM-Channel-Binding</dd>
          <dt pn="section-4.2-2.3">DTLS-OK:</dt>
          <dd pn="section-4.2-2.4">Y</dd>
          <dt pn="section-4.2-2.5">Recommended:</dt>
          <dd pn="section-4.2-2.6">N</dd>
          <dt pn="section-4.2-2.7">Reference:</dt>
          <dd pn="section-4.2-2.8">This document</dd>
        </dl>
      </section>
    </section>
  </middle>
  <back>
    <references pn="section-5">
      <name slugifiedName="name-references">References</name>
      <references pn="section-5.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5056" target="https://www.rfc-editor.org/info/rfc5056" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5056.xml" quoteTitle="true" derivedAnchor="RFC5056">
          <front>
            <title>On the Use of Channel Bindings to Secure Channels</title>
            <author initials="N." surname="Williams" fullname="N. Williams">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2007" month="November"/>
            <abstract>
              <t>The concept of channel binding allows applications to establish that the two end-points of a secure channel at one network layer are the same as at a higher layer by binding authentication at the higher layer to the channel at the lower layer.  This allows applications to delegate session protection to lower layers, which has various performance benefits.</t>
              <t>This document discusses and formalizes the concept of channel binding to secure channels.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5056"/>
          <seriesInfo name="DOI" value="10.17487/RFC5056"/>
        </reference>
        <reference anchor="RFC5705" target="https://www.rfc-editor.org/info/rfc5705" xml:base="https://www.rfc-editor.org/refs/bibxml/reference.RFC.5705.xml" quoteTitle="true" derivedAnchor="RFC5705">
          <front>
            <title>Keying Material Exporters for Transport Layer Security (TLS)</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="March"/>
            <abstract>
              <t>A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes.  This document describes a general mechanism for allowing that.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5705"/>
          <seriesInfo name="DOI" value="10.17487/RFC5705"/>
        </reference>
        <reference anchor="RFC5802" target="https://www.rfc-editor.org/info/rfc5802" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5802.xml" quoteTitle="true" derivedAnchor="RFC5802">
          <front>
            <title>Salted Challenge Response Authentication Mechanism (SCRAM) SASL and GSS-API Mechanisms</title>
            <author initials="C." surname="Newman" fullname="C. Newman">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Menon-Sen" fullname="A. Menon-Sen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Melnikov" fullname="A. Melnikov">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="N." surname="Williams" fullname="N. Williams">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="July"/>
            <abstract>
              <t>The secure authentication mechanism most widely deployed and used by Internet application protocols is the transmission of clear-text passwords over a channel protected by Transport Layer Security (TLS). There are some significant security concerns with that mechanism, which could be addressed by the use of a challenge response authentication mechanism protected by TLS.  Unfortunately, the challenge response mechanisms presently on the standards track all fail to meet requirements necessary for widespread deployment, and have had success only in limited use.</t>
              <t>This specification describes a family of Simple Authentication and Security Layer (SASL; RFC 4422) authentication mechanisms called the Salted Challenge Response Authentication Mechanism (SCRAM), which addresses the security concerns and meets the deployability requirements.  When used in combination with TLS or an equivalent security layer, a mechanism from this family could improve the status quo for application protocol authentication and provide a suitable choice for a mandatory-to-implement mechanism for future application protocol standards.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5802"/>
          <seriesInfo name="DOI" value="10.17487/RFC5802"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml" quoteTitle="true" derivedAnchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
      </references>
      <references pn="section-5.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="RFC5929" target="https://www.rfc-editor.org/info/rfc5929" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5929.xml" quoteTitle="true" derivedAnchor="RFC5929">
          <front>
            <title>Channel Bindings for TLS</title>
            <author initials="J." surname="Altman" fullname="J. Altman">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="N." surname="Williams" fullname="N. Williams">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Zhu" fullname="L. Zhu">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="July"/>
            <abstract>
              <t>This document defines three channel binding types for Transport Layer Security (TLS), tls-unique, tls-server-end-point, and tls-unique-for-telnet, in accordance with RFC 5056 (On Channel Binding).</t>
              <t>Note that based on implementation experience, this document changes the original definition of 'tls-unique' channel binding type in the channel binding type IANA registry.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5929"/>
          <seriesInfo name="DOI" value="10.17487/RFC5929"/>
        </reference>
      </references>
    </references>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.a">
      <name slugifiedName="name-authors-address">Author's Address</name>
      <author initials="S" surname="Whited" fullname="Sam Whited">
        <organization showOnFrontPage="true"/>
        <address>
          <postal>
            <street/>
            <city>Atlanta</city>
            <code>GA</code>
            <country>USA</country>
            <region/>
          </postal>
          <phone/>
          <email>sam@samwhited.com</email>
          <uri>https://blog.samwhited.com/</uri>
        </address>
      </author>
    </section>
  </back>
</rfc>
