<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-intarea-proxy-config-02" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="Proxy Configuration PvDs">Communicating Proxy Configurations in Provisioning Domains</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-intarea-proxy-config-02"/>
    <author initials="T." surname="Pauly" fullname="Tommy Pauly">
      <organization>Apple, Inc.</organization>
      <address>
        <email>tpauly@apple.com</email>
      </address>
    </author>
    <author initials="D." surname="Damjanovic" fullname="Dragana Damjanovic">
      <organization>Microsoft</organization>
      <address>
        <email>ddamjanovic@microsoft.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 26?>

<t>This document defines a mechanism for accessing provisioning domain information
associated with a proxy, such as other proxy URIs that support different protocols
and a list of DNS zones that are accessible via a proxy.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://github.com/tfpauly/privacy-proxy"/>.</t>
    </note>
  </front>
  <middle>
    <?line 32?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>HTTP proxies that use the CONNECT method <xref section="9.3.6" sectionFormat="of" target="HTTP"/>
(often referred to as "forward" proxies) allow clients to open connections to
hosts via a proxy. These typically allow for TCP stream proxying, but can also support
UDP proxying <xref target="CONNECT-UDP"/> and IP packet proxying
<xref target="CONNECT-IP"/>. Such proxies are not just defined as
hostnames and ports, but can use URI templates <xref target="URITEMPLATE"/>.</t>
      <t>In order to make use of multiple related proxies, clients need a way to understand
which proxies are associated with one another.</t>
      <t>Client can also benefit from learning about additional information associated with
the proxy to optimize their proxy usage, such knowing that a proxy is configured
to only allow access to a limited set of destinations.</t>
      <t>These improvements to client behavior can be achieved through the use of
Provisioning Domains. Provisioning Domains (PvDs) are defined in <xref target="PVD"/>
as consistent sets of network configuration information, which can include proxy
configuration details <xref section="2" sectionFormat="of" target="PVD"/>. <xref target="PVDDATA"/> defines a JSON
<xref target="JSON"/> format for describing Provisioning Domain Additional Information,
which is an extensible dictionary of properties of the Provisioning Domain.</t>
      <t>This document defines several mechanisms to use PvDs to help clients understand how
to use proxies:</t>
      <ol spacing="normal" type="1"><li>
          <t>A way to fetch PvD Additional Information associated with a known proxy URI (<xref target="proxy-pvd"/>)</t>
        </li>
        <li>
          <t>A way to list one or more proxy URIs in a PvD, allowing clients to
learn about other proxy options given a known proxy (<xref target="proxy-enumeration"/>).</t>
        </li>
        <li>
          <t>A way to define a limited set of destinations that are accessible through the
proxy (<xref target="destinations"/>).</t>
        </li>
      </ol>
      <t>Additionally, this document partly describes how these mechanisms might be used
to discover proxies associated with a network (<xref target="network-proxies"/>).</t>
      <t>Using this mechanism a client can learn that a legacy insecure HTTP proxy that
the client is configured with is also accessible using HTTPS. In this way,
clients can upgrade to a more secure connection to the proxy.</t>
      <section anchor="background">
        <name>Background</name>
        <t>Other non-standard mechanisms for proxy configuration and discovery have been
used historically, some of which are described in <xref target="RFC3040"/>.</t>
        <t>Proxy Auto Configuration (PAC) files <xref section="6.2" sectionFormat="of" target="RFC3040"/> are Javascript
scripts that take URLs as input and provide an output of a proxy configuration
to use.</t>
        <t>Web Proxy Auto-Discovery Protocol (WPAD) <xref section="6.4" sectionFormat="of" target="RFC3040"/> allows
networks to advertise proxies to use by advertising a PAC file. This solution
squats on DHCP option 252.</t>
        <t>These common (but non-standard) mechanisms only support defining proxies by
hostname and port, and do not support configuring a full URI template
<xref target="URITEMPLATE"/>.</t>
        <t>The mechanisms defined in this document are intended to offer a standard
alternative that works for URI-based proxies and avoids dependencies
on executing Javascript scripts, which are prone to implementation-specific
inconsistencies and can open up security vulnerabilities.</t>
      </section>
      <section anchor="requirements">
        <name>Requirements</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
    </section>
    <section anchor="proxy-pvd">
      <name>Fetching PvD Additional Information for proxies</name>
      <t>This document defines a way to fetch PvD Additional Information associated with
a proxy. This PvD describes the properties of the network accessible through the proxy.</t>
      <t>In order to fetch PvD Additional Information associated with a proxy, a client
issues an HTTP GET request for the well-known PvD URI (".well-known/pvd") <xref target="PVDDATA"/>
and the host authority of the proxy. This is applicable for both proxies that are identified
by a host and port only (such as SOCKS proxies and HTTP CONNECT proxies) and proxies
that are identified by a URI or URI template.</t>
      <t>For example, a client would issue the following request for the PvD associated
with "https://proxy.example.org/masque{?target_host,target_port}":</t>
      <artwork><![CDATA[
:method = GET
:scheme = https
:authority = proxy.example.org
:path = /.well-known/pvd
accept = application/pvd+json
]]></artwork>
      <t>For a HTTP CONNECT proxy on "proxy.example.org:8080", the client would send the following
request:</t>
      <artwork><![CDATA[
:method = GET
:scheme = https
:authority = proxy.example.org:8080
:path = /.well-known/pvd
accept = application/pvd+json
]]></artwork>
      <t>Note that all proxies that are colocated on the same host and port share the same PvD
Additional Information. Proxy deployments that need separate PvD configuration properties
SHOULD use different hosts.</t>
      <t>PvD Additional Information is required to contain the "identifier", "expires", and
"prefixes" keys. For proxy PvDs as defined in this document, the "identifier" MUST
match the hostname of the HTTP proxy. The "prefixes" array SHOULD be empty by default.</t>
    </section>
    <section anchor="proxy-enumeration">
      <name>Enumerating proxies within a PvD</name>
      <t>This document defines a new PvD Additional Information key, <tt>proxies</tt>, that
is an array of dictionaries, where each dictionary in the array defines
a single proxy that is available as part of the PvD (see <xref target="proxies-key-iana"/>).
Each proxy is defined by a proxy protocol, a proxy location (i.e., a hostname and port or a URI template
<xref target="URITEMPLATE"/>), along with potentially other keys.</t>
      <t>This document defines two mandatory keys for the sub-dictionaries in the
<tt>proxies</tt> array, <tt>protocol</tt> and <tt>proxy</tt>. There are also optional keys, including
<tt>alpn</tt>, and destination accessibility keys defined in <xref target="destinations"/>.
Other optional keys can be added to the dictionary
to further define or restrict the use of a proxy. Clients that do not
recognize or understand a key in a proxy sub-dictionary MUST ignore the entire
proxy definition, since the proxy might be only applicable for particular
uses. These keys are registered in an IANA registry, defined in <xref target="proxy-info-iana"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">JSON Key</th>
            <th align="left">Optional</th>
            <th align="left">Description</th>
            <th align="left">Type</th>
            <th align="left">Example</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">protocol</td>
            <td align="left">No</td>
            <td align="left">The protocol used to communicate with the proxy</td>
            <td align="left">String</td>
            <td align="left">"connect-udp"</td>
          </tr>
          <tr>
            <td align="left">proxy</td>
            <td align="left">No</td>
            <td align="left">String containing the URI template or hostname and port of the proxy, depending on the format defined by the protocol</td>
            <td align="left">String</td>
            <td align="left">"https://proxy.example.org:4443/masque{?target_host,target_port}"</td>
          </tr>
          <tr>
            <td align="left">alpn</td>
            <td align="left">Yes</td>
            <td align="left">An array of Application-Layer Protocol Negotiation protocol identifiers</td>
            <td align="left">Array of Strings</td>
            <td align="left">["h3","h2"]</td>
          </tr>
        </tbody>
      </table>
      <t>The values for the <tt>protocol</tt> key are defined in the proxy protocol
registry (<xref target="proxy-protocol-iana"/>), with the initial contents provided below.
For consistency, any new proxy types that use HTTP Upgrade Tokens (and use
the <tt>:protocol</tt> pseudo-header) SHOULD define the <tt>protocol</tt> value to match
the Upgrade Token / <tt>:protocol</tt> value.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Proxy Protocol</th>
            <th align="left">Proxy Location Format</th>
            <th align="left">Reference</th>
            <th align="left">Notes</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">socks5</td>
            <td align="left">hostname:port</td>
            <td align="left">
              <xref target="SOCKSv5"/></td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">http-connect</td>
            <td align="left">hostname:port</td>
            <td align="left">
              <xref section="9.3.6" sectionFormat="of" target="HTTP"/></td>
            <td align="left">Standard CONNECT method, using unencrypted HTTP to the proxy</td>
          </tr>
          <tr>
            <td align="left">https-connect</td>
            <td align="left">hostname:port</td>
            <td align="left">
              <xref section="9.3.6" sectionFormat="of" target="HTTP"/></td>
            <td align="left">Standard CONNECT method, using TLS-protected HTTP to the proxy</td>
          </tr>
          <tr>
            <td align="left">connect-udp</td>
            <td align="left">URI template</td>
            <td align="left">
              <xref target="CONNECT-UDP"/></td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">connect-ip</td>
            <td align="left">URI template</td>
            <td align="left">
              <xref target="CONNECT-IP"/></td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">connect-tcp</td>
            <td align="left">URI template</td>
            <td align="left">
              <xref target="CONNECT-TCP"/></td>
            <td align="left"> </td>
          </tr>
        </tbody>
      </table>
      <t>The value of <tt>proxy</tt> depends on the Proxy Location Format defined by proxy protocol.
The types defined here either use a hostname and port, or a full URI template.</t>
      <t>If the <tt>alpn</tt> key is present, it provides a hint for the Application-Layer Protocol Negotiation
(ALPN) <xref target="ALPN"/> protocol identifiers associated with this server. For HTTP proxies,
this can indicate if the proxy supports HTTP/3, HTTP/2, etc.</t>
      <t>When a PvD that contains the <tt>proxies</tt> key is fetched from a known proxy
using the method described in <xref target="proxy-pvd"/> the proxies list describes
equivalent proxies (potentially supporting other protocols) that can be used
in addition to the known proxy.</t>
      <t>Such cases are useful for informing clients of related proxies as a discovery
method, with the assumption that the client already is aware of one proxy.
Many historical methods of configuring a proxy only allow configuring
a single FQDN hostname for the proxy. A client can attempt to fetch the
PvD information from the well-known URI to learn the list of complete
URIs that support non-default protocols, such as <xref target="CONNECT-UDP"/> and
<xref target="CONNECT-IP"/>.</t>
      <section anchor="example">
        <name>Example</name>
        <t>Given a known HTTP CONNECT proxy FQDN, "proxy.example.org", a client could
request PvD Additional Information with the following request:</t>
        <artwork><![CDATA[
:method = GET
:scheme = https
:authority = proxy.example.org
:path = /.well-known/pvd
accept = application/pvd+json
]]></artwork>
        <t>If the proxy has a PvD definition for this FQDN, it would return the following
response to indicate a PvD that has two related proxy URIs.</t>
        <artwork><![CDATA[
:status = 200
content-type = application/pvd+json
content-length = 222

{
  "identifier": "proxy.example.org.",
  "expires": "2023-06-23T06:00:00Z",
  "prefixes": [],
  "proxies": [
    {
      "protocol": "http-connect",
      "proxy": "proxy.example.org:80"
    },
    {
      "protocol": "connect-udp",
      "proxy": "https://proxy.example.org/masque{?target_host,target_port}"
    }
  ]
}
]]></artwork>
        <t>The client would learn the URI template of the proxy that supports UDP using <xref target="CONNECT-UDP"/>,
at "https://proxy.example.org/masque{?target_host,target_port}".</t>
      </section>
    </section>
    <section anchor="destinations">
      <name>Destination accessibility information for proxies</name>
      <t>Destination accessibility information is used when only a subset of destinations is reachable through
a proxy. Destination restrictions are often used in VPN tunnel configurations such as split
DNS in IKEv2 <xref target="IKEV2SPLIT"/>.</t>
      <t>PvD Additional Information can be used to indicate that a proxy PvD only allows access to a limited
set of destinations.</t>
      <t>This document defines five optional keys for subdictionaries in the <tt>proxies</tt>
array that are used to signal information about destinations available through the proxy.</t>
      <table>
        <thead>
          <tr>
            <th align="left">JSON Key</th>
            <th align="left">Optional</th>
            <th align="left">Description</th>
            <th align="left">Type</th>
            <th align="left">Example</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">matchDomains</td>
            <td align="left">Yes</td>
            <td align="left">An array of FQDNs and wildcard DNS domains that can be accessed over this proxy</td>
            <td align="left">Array of Strings</td>
            <td align="left">[ "www.example.com", "*.internal.example.com" ]</td>
          </tr>
          <tr>
            <td align="left">excludeDomains</td>
            <td align="left">Yes</td>
            <td align="left">An array of FQDNs and wildcard DNS domains that cannot be accessed over this proxy. If matchDomains is specified, excludeDomains should list more specific domains within entries in the matchDomains array</td>
            <td align="left">Array of Strings</td>
            <td align="left">[ "public.example.com" ]</td>
          </tr>
          <tr>
            <td align="left">matchSubnets</td>
            <td align="left">Yes</td>
            <td align="left">An array of IP addresses and subnets that can be accessed over this proxy</td>
            <td align="left">Array of Strings</td>
            <td align="left">[ "2001:DB8::1", "192.168.1.0/24" ]</td>
          </tr>
          <tr>
            <td align="left">excludeSubnets</td>
            <td align="left">Yes</td>
            <td align="left">An array of IP addresses and subnets that cannot be accessed over this proxy. If matchSubnets is specified, excludeDomains should list more specific subnets within entries in the matchSubnets array</td>
            <td align="left">Array of Strings</td>
            <td align="left">[ "192.0.2.0/16", "192.51.100.1" ]</td>
          </tr>
          <tr>
            <td align="left">matchPorts</td>
            <td align="left">Yes</td>
            <td align="left">An array of TCP or UDP port ranges accessible over this proxy</td>
            <td align="left">Array of Strings</td>
            <td align="left">[ "80", "443", "1024-65535" ]</td>
          </tr>
        </tbody>
      </table>
      <t>When present in a PvD Additional Information dictionary that is retrieved for a proxy
as described in <xref target="proxy-pvd"/>, entries in the <tt>matchDomains</tt> array indicate specific FQDNs
and zones that are accessible using the proxy. If a hostname does match any entry,
then a client SHOULD assume that the hostname will not be accessible through the proxy.
If a hostname is included in the <tt>excludeDomains</tt> array, then the client SHOULD NOT
access it through the proxy. The <tt>excludeDomains</tt> parameter can be present even if <tt>matchDomains</tt>
is omitted. When this is the case, the client assumes that all domains except the domains
listed in the <tt>excludeDomains</tt> array are accessible through the proxy.</t>
      <t>Entries listed in <tt>matchDomains</tt> MUST NOT expand the set of domains that a client is
willing to send to a particular proxy. The list can only narrow the list of domains
that the client is willing to send through the proxy. For example, if the client
has a local policy to only send requests for "*.example.com" to a proxy
"proxy.example.com", and the <tt>matchDomains</tt> array contains "internal.example.com" and
"other.company.com", the client would end up only proxying "internal.example.com"
through the proxy.</t>
      <t>A wildcard prefix (<tt>*.</tt>) is used to indicate matching entire domains or subdomains instead of specific hostnames. Note
that this can be used to match multiple levels of subdomains. For example "<em>.example.com"
matches "internal.example.com" as well as "www.public.example.com".
Entries that include the wildcard prefix also SHOULD be treated as if they match
an FQDN that only contains the string after the prefix, with no subdomain. So,
an entry in <tt>matchDomains</tt> of "</em>.example.com" would match the FQDN "example.com",
unless "example.com" were specifically included in <tt>excludeDomains</tt>. This is
done to prevent commonly needing to include both "*.example.com" and "example.com"
in the <tt>matchDomains</tt> list.</t>
      <t>Entries in <tt>matchSubnets</tt> correspond to IP addresses and subnets that are available through the
proxy, while entries in <tt>excludeSubnets</tt> define IP addresses and subnets that SHOULD NOT be used
with the proxy. Subnet-based destination information SHOULD only be used when
applications are communicating with destinations identified by only an IP address and not a hostname.</t>
      <t><tt>matchPorts</tt> in a list of strings that can be used to instruct the client that only specific destination
TCP or UDP ports are accessible through the proxy. The list may contain individual port numbers
(such as "80") or inclusive ranges of ports. For example "1024-2048" matches all ports from 1024
to 2048, including the 1024 and 1028.</t>
      <section anchor="example-1">
        <name>Example</name>
        <t>Given a proxy URI template "https://proxy.example.org/masque{?target_host,target_port}",
which in this case is for UDP proxying, the client could request PvD additional information
with the following request:</t>
        <artwork><![CDATA[
:method = GET
:scheme = https
:authority = proxy.example.org
:path = /.well-known/pvd
accept = application/pvd+json
]]></artwork>
        <t>If the proxy has a PvD definition for this proxy, it could return the following
response to indicate a PvD that has one accessible zone, "*.internal.example.org".</t>
        <artwork><![CDATA[
:status = 200
content-type = application/pvd+json
content-length = 135

{
  "identifier": "proxy.example.org.",
  "expires": "2023-06-23T06:00:00Z",
  "prefixes": [],
  "proxies": [
    {
      "protocol": "http-connect",
      "proxy": "proxy.example.org:80"
    },
    {
      "protocol": "connect-udp",
      "proxy": "https://proxy.example.org/masque{?target_host,target_port}",
      "matchDomains": [ "*.internal.example.org" ]
    }
  ]
}
]]></artwork>
        <t>The client could then choose to use this proxy only for accessing names that fall
within the "*.internal.example.org" zone.</t>
      </section>
    </section>
    <section anchor="network-proxies">
      <name>Discovering proxies from network PvDs</name>
      <t><xref target="PVDDATA"/> defines how PvD Additional Information is discovered based
on network advertisements using Router Advertisements <xref target="RFC4861"/>. A network
defining its configuration via PvD information can include the <tt>proxies</tt>
key (<xref target="proxy-enumeration"/>) to inform clients of a list of proxies available
on the network.</t>
      <t>This association of proxies with the network's PvD can be used as a mechanism
to discover proxies, as an alternative to PAC files. However, client systems MUST
NOT automatically send traffic over proxies advertised in this way without
explicit configuration, policy, or user permission. For example, a client
can use this mechanism to choose between known proxies, such as if the client was
already proxying traffic and has multiple options to choose between.</t>
      <t>Further security and experience considerations are needed for these cases.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>Configuration advertised via PvD Additional Information, such DNS zones or associated
proxies, can only be safely used when fetched over a secure TLS-protected connection,
and the client has validated that that the hostname of the proxy, the identifier of
the PvD, and the validated hostname identity on the certificate all match.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="proxies-key-iana">
        <name>New PvD Additional Information key</name>
        <t>This document registers a new key in the "Additional Information PvD Keys" registry.</t>
        <t>JSON Key: proxies</t>
        <t>Description: Array of proxy dictionaries associated with this PvD</t>
        <t>Type: Array of dictionaries</t>
        <t>Example: [ {
  "protocol": "connect-udp",
  "proxy": "https://proxy.example.org/masque{?target_host,target_port}"
} ]</t>
      </section>
      <section anchor="proxy-info-iana">
        <name>New PvD Proxy Information Registry</name>
        <t>IANA is requested to create a new registry "Proxy Information PvD Keys", within the "Provisioning Domains (PvDs)" registry page.
This new registry reserves JSON keys for use in sub-dictionaries under the <tt>proxies</tt> key.
The initial contents of this registry are given in <xref target="proxy-enumeration"/> and <xref target="destinations"/>.</t>
        <t>New assignments in the "Proxy Information PvD Keys" registry will be administered by IANA through Expert Review <xref target="RFC8126"/>. Experts are
requested to ensure that defined keys do not overlap in names or semantics.</t>
      </section>
      <section anchor="proxy-protocol-iana">
        <name>New PvD Proxy Protocol Registry</name>
        <t>IANA is requested to create a new registry "Proxy Protocol PvD Values", within the "Provisioning Domains (PvDs)" registry page.
This new registry reserves JSON values for the <tt>protocol</tt> key in <tt>proxies</tt> sub-dictionaries.
The initial contents of this registry are given in <xref target="proxy-enumeration"/>.</t>
        <t>New assignments in the "Proxy Protocol PvD Values" registry will be administered by IANA through Expert Review <xref target="RFC8126"/>.
Experts are requested to ensure that defined keys do not overlap in names or semantics, and have clear format definitions.
The reference and notes fields MAY be empty.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="CONNECT-UDP">
          <front>
            <title>Proxying UDP in HTTP</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document describes how to proxy UDP in HTTP, similar to how the HTTP CONNECT method allows proxying TCP in HTTP. More specifically, this document defines a protocol that allows an HTTP client to create a tunnel for UDP communications through an HTTP server that acts as a proxy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9298"/>
          <seriesInfo name="DOI" value="10.17487/RFC9298"/>
        </reference>
        <reference anchor="CONNECT-IP">
          <front>
            <title>Proxying IP in HTTP</title>
            <author fullname="T. Pauly" initials="T." role="editor" surname="Pauly"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="A. Chernyakhovsky" initials="A." surname="Chernyakhovsky"/>
            <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
            <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>
            <date month="October" year="2023"/>
            <abstract>
              <t>This document describes how to proxy IP packets in HTTP. This protocol is similar to UDP proxying in HTTP but allows transmitting arbitrary IP packets. More specifically, this document defines a protocol that allows an HTTP client to create an IP tunnel through an HTTP server that acts as an IP proxy. This document updates RFC 9298.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9484"/>
          <seriesInfo name="DOI" value="10.17487/RFC9484"/>
        </reference>
        <reference anchor="URITEMPLATE">
          <front>
            <title>URI Template</title>
            <author fullname="J. Gregorio" initials="J." surname="Gregorio"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="M. Hadley" initials="M." surname="Hadley"/>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="D. Orchard" initials="D." surname="Orchard"/>
            <date month="March" year="2012"/>
            <abstract>
              <t>A URI Template is a compact sequence of characters for describing a range of Uniform Resource Identifiers through variable expansion. This specification defines the URI Template syntax and the process for expanding a URI Template into a URI reference, along with guidelines for the use of URI Templates on the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6570"/>
          <seriesInfo name="DOI" value="10.17487/RFC6570"/>
        </reference>
        <reference anchor="PVDDATA">
          <front>
            <title>Discovering Provisioning Domain Names and Data</title>
            <author fullname="P. Pfister" initials="P." surname="Pfister"/>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="W. Shao" initials="W." surname="Shao"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>Provisioning Domains (PvDs) are defined as consistent sets of network configuration information. PvDs allows hosts to manage connections to multiple networks and interfaces simultaneously, such as when a home router provides connectivity through both a broadband and cellular network provider.</t>
              <t>This document defines a mechanism for explicitly identifying PvDs through a Router Advertisement (RA) option. This RA option announces a PvD identifier, which hosts can compare to differentiate between PvDs. The option can directly carry some information about a PvD and can optionally point to PvD Additional Information that can be retrieved using HTTP over TLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8801"/>
          <seriesInfo name="DOI" value="10.17487/RFC8801"/>
        </reference>
        <reference anchor="JSON">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="SOCKSv5">
          <front>
            <title>SOCKS Protocol Version 5</title>
            <author fullname="M. Leech" initials="M." surname="Leech"/>
            <author fullname="M. Ganis" initials="M." surname="Ganis"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="R. Kuris" initials="R." surname="Kuris"/>
            <author fullname="D. Koblas" initials="D." surname="Koblas"/>
            <author fullname="L. Jones" initials="L." surname="Jones"/>
            <date month="March" year="1996"/>
            <abstract>
              <t>This memo describes a protocol that is an evolution of the previous version of the protocol, version 4 [1]. This new protocol stems from active discussions and prototype implementations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1928"/>
          <seriesInfo name="DOI" value="10.17487/RFC1928"/>
        </reference>
        <reference anchor="CONNECT-TCP">
          <front>
            <title>Template-Driven HTTP CONNECT Proxying for TCP</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <date day="2" month="August" year="2024"/>
            <abstract>
              <t>   TCP proxying using HTTP CONNECT has long been part of the core HTTP
   specification.  However, this proxying functionality has several
   important deficiencies in modern HTTP environments.  This
   specification defines an alternative HTTP proxy service configuration
   for TCP connections.  This configuration is described by a URI
   Template, similar to the CONNECT-UDP and CONNECT-IP protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-connect-tcp-05"/>
        </reference>
        <reference anchor="ALPN">
          <front>
            <title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
            <author fullname="S. Friedl" initials="S." surname="Friedl"/>
            <author fullname="A. Popov" initials="A." surname="Popov"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Stephan" initials="E." surname="Stephan"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7301"/>
          <seriesInfo name="DOI" value="10.17487/RFC7301"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="PVD">
          <front>
            <title>Multiple Provisioning Domain Architecture</title>
            <author fullname="D. Anipko" initials="D." role="editor" surname="Anipko"/>
            <date month="June" year="2015"/>
            <abstract>
              <t>This document is a product of the work of the Multiple Interfaces Architecture Design team. It outlines a solution framework for some of the issues experienced by nodes that can be attached to multiple networks simultaneously. The framework defines the concept of a Provisioning Domain (PvD), which is a consistent set of network configuration information. PvD-aware nodes learn PvD-specific information from the networks they are attached to and/or other sources. PvDs are used to enable separation and configuration consistency in the presence of multiple concurrent connections.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7556"/>
          <seriesInfo name="DOI" value="10.17487/RFC7556"/>
        </reference>
        <reference anchor="RFC3040">
          <front>
            <title>Internet Web Replication and Caching Taxonomy</title>
            <author fullname="I. Cooper" initials="I." surname="Cooper"/>
            <author fullname="I. Melve" initials="I." surname="Melve"/>
            <author fullname="G. Tomlinson" initials="G." surname="Tomlinson"/>
            <date month="January" year="2001"/>
            <abstract>
              <t>This memo specifies standard terminology and the taxonomy of web replication and caching infrastructure as deployed today. It introduces standard concepts, and protocols used today within this application domain. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3040"/>
          <seriesInfo name="DOI" value="10.17487/RFC3040"/>
        </reference>
        <reference anchor="IKEV2SPLIT">
          <front>
            <title>Split DNS Configuration for the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document defines two Configuration Payload Attribute Types (INTERNAL_DNS_DOMAIN and INTERNAL_DNSSEC_TA) for the Internet Key Exchange Protocol version 2 (IKEv2). These payloads add support for private (internal-only) DNS domains. These domains are intended to be resolved using non-public DNS servers that are only reachable through the IPsec connection. DNS resolution for other domains remains unchanged. These Configuration Payloads only apply to split- tunnel configurations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8598"/>
          <seriesInfo name="DOI" value="10.17487/RFC8598"/>
        </reference>
        <reference anchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+076XLbRpr/+yk69I+1Zkhaoo7IrPVmFEmeaCLLGktOKpty
jUCgSSIGAQYNUOZIyrPMs8yT7Xf0BRKUU7ZTW7W1qViCgD6+/u6re72eqNIq
U0N5XMxmdZ7GUZXmE3lZFh+W8C4fp5O6hHdFrmWa4/tFquEvHHRSzKI01yIa
jUq1GLZNkpeLEy2SIs6jGWySlNG46qWqGvfSvIpKFfXmOKkX06Te9kAkUaWG
AsBQk6JcDqWuEiHSeTmUVVnrarC9/RxGvVfL26JMhvIsr1SZq6p3gksLoaso
T/4RZUUO2y2VFvN0KH+uirgrdVFWpRpreFrO8OGdEFFdTYtyKGRPSPgPTjOU
1315GdXZkt4w3NeAnGXwtignQ3k0n2eqCxDEfXqpABsZgDnHYX+J8Gs/LmaN
tU/68iSa/RLlgMY42ACgn0R5tPqR9nmVxmWhCzhdsEuSuJF/mdkBtJ3o9Xoy
GumqjGJAyPU01RIIUM9UXslEjdNcaRnJmYqnUZ7qmRwXpYziWGmNRJ2HFE6I
wgA6jJkRQUWkdRGnQJ5E3qbVFFYiCgJS6xj+0rKopqrkl/LtmzMtq2lUwdf5
HPAvk3Q8ViWCAiOALEUG/JMnsEyW6koWY3lycSX/WSCQNBGYxEI3ypRcpJHd
ss9HnaVJkikhniAvlEVSxwSn+O76+pIGpnapWit4UPL49cXF6fE1oACIn8i7
uytFc+Tz/m7/AGH4Cie/ePPy+PnOzvbDg3gKyFW5BKZRZQknrwo8aQewchuV
ScdusyWjLCtuZZylcEKNw4o5zAPuznkLfCemhYaP4Unk9VQhcMs5CGCWLc06
SJnr40uQAZCUGY8FsnTlqK5kHOUwTBcWteLtyaUbAof6yhyzB+/pKIPnhw8P
EpF9BgOj+L2q3HgRjD/j4XuHew8PfXmFZLVoRGLkRSV/AUk0vASk03QiZGRN
yyM02gOJaAdGkJWazTNgHI3AwYvr01eX50fXp7jbwf7XgGeg6FkOTJ8AAwHu
ZtF7RbOBIrM6q1KQKKBBRsxnQOo6ZOcKYZG30RLn1jksQspA3E7TlSOs8jBw
GwBOjAsgHNOCHr8jlcNJKzkui5nMVFSSaESjAs4XJUmKdI2yUEhWNxDIdSwR
xBJVOkv/SbyYWkmpdTRRRoje58UtbsH8bwaAFMdGs6pE4DK54xOWD+JKEKNZ
ivtqRdKUKA0KnRV4H7UB8lk6QylXM8ukjEI46DRapMBzePQRit00VQtk92lZ
1JMpCQ/TQ7QZgn6reZBP0QZsEeIty4BOubv75vKHE6T91/v7ByBjER1QgxZA
WAB8jfCDagdF/96dnfEb4Lormb4Ic5rHWZ0YVIvmlERVoDh1IO0DXB9gQC4H
joSnk6PrI4To8HB7B0TFK8u/Xb2+QBHB3zRgsP8cBjAQJKaA57hMR8Z2riJB
Hnk+OQtgN7yZotxI9QFOzlouSQnEqFwijHCcuSor5F74C4nQskV/k6rXQMIS
9nUKn0iOZES64PNUZXMnRl5w5LS4FWaokZ6hEDt9eWSFbKwqgB6W2XC+NUGL
iLdzbx3k07s79gDmi+ThYau5PpsEEE5A8KwoVWhVAKkRbt1lGUBEeLUrSEyN
jIYGCWUPtfAkXah8BRwHisoBg8w2AFK/CROj9XFBa7VcgRAJt2E4i/fymMzA
qFYNks6jsgKhN7wGtAUK4XpAoIC6s3QyRWFGwpGmSFIdg7iXXgeukcWKGYBk
HntmMEP1VrNCAmi84xBZxYGyxxg3KitTkyheosujYtBX0tniJY0gfWjmNvQa
g4PigIo3QF5N++MyV33gMIYEKNIVluhkaeaTMgL5J0VIDGP29wYYvzltDAd7
8kR+C6ZwArQBUyFeE6/kRd4jEQDjHmIWBZ1P0dQtKCwWyUsJSlQB+lUukAAS
IK2Kku06OqEzsmcs+KwTmZpWK4J62d3eY2vIHvVRDUA33eqnl0fHW3KcZirU
aAd90mluBVr/b9Eiwh3mleBfhj0rtK5v35wjO8DWc7RmecL+X4L2UILw4FtY
MWo7ttENAOaPaiQ9qL0Th4pL4+PJpz9eHp1sNUDdWwEVpVgLw31szJIFqj2v
fqziGi3dNzLFErBByEBHChhDF1lNEOpf6wjtSC5PvgM/iqVfDvYHzhSCxzxD
fKKzEpJ9K6Q7mVrnwaICMJ4yATVaOv/HuT9d5omCvCU702KPYR7XWdbwi8DA
BF4R0R9gDOEIzGdTMSCdIaBSoLvJOS3QyYY97GlElGGYBGRbKKY+IxkZGvbs
jSLtXSoCPVoUaYI7znHRPIb3okAbBQJFEaJnK2nYqhswNSyVkxyCq5GRo0Es
09NzFadjiG7AVFtjH9s9UYTJX67nLLhptZSLOstBGY/SLEULyCL7Rv1apyU7
MIwlCAjxTABy59Xbq+tOl3/Li9f0/Ob072/P3pye4PPVd0fn5+5BmBFX371+
e37in/zM49evXp1enPBkeCsbr0Tn1dFPHaZ35/Xl9dnri6PzTjuJKnQmiVDl
vFQV+84N+f/2+PLf/9rZQ38ERGOws4NuBv9xuPM1OOSAY5XzbsSV/CdoraWA
iBN0MBlG4Kw4mqcVqNEuireeopkD1QbS+p/fZGjAegff/JfAqOklGnHyWzbb
cav4kFJ3T7zB3hxefqKHIIKICBbGid7aGb294gtZ09Vuap2iDwOLT/BbTJBr
TZ5Ita6Jbdm2/fX0GiKTX+EVu4O4863Ksh47GLgVeTudvn/7DDDYQZ1oPE/0
gfOEpqI+kZybQBkwJw0xgzZyPs/ArOCBccsR+DnNeJe0AghvBRIHngBqTbOy
0VLMQk9t5H71+vj7q4YWoLPZcNkHubnTFaJlI1LPdFzWLk7BARVewiv1IZpR
5sT5D7dFnQH7I0rpoOPCunSrOEVEeuIIIk5nWlVzPXz2jPFjlu8X5eTZLAIL
oO6+qaJyoqp/4OG75hnP/9ABh/a3334TQ5MKeIGEFEMdT0G3wF+0shh6SryQ
a5uI4TwCKF7IZyu0FciRoB5fWEoha+GHP/+iwTbhvoSPaB3NSzRZnbWthofb
h9sdEvcm6rQyjOMwJwzmvsABadfPOuVFURmzg5ppjUfBQShiEjb0z+AUGk1p
k1P1lBSo/Qh8INplt288EbBcWbE0IS7uRPkBrcCHhq2IkZpOnNcswlgAdDV8
voqyNuiTbVYbIJQlWyaywrB+FaV8pI6TjxLNiPowh1Ga7YYASoPi/AB/ox2D
OPqlczQpRos2m/7u2uoS7Z4AiOKp0yXkmxgt4n1xSjvJYPOoLEFtm9ODpQK5
BZYYITLHUZ1VaHzlqY2OAhcI5dAGZM5AhGHUZkORq9vHNDHgoytvzD43XQ4f
OF5maDH0stEy5YNu0cxJFcHxgzDakIHnmN3B2KD/mKkgNCHFuojSjPQqIB5j
Lhd2A5xPtVKSI0XYrgfw9dIojyhMOo1MoonSNZZkpA75rc15dt0b4nzy6NO+
6neNhm74kpJ0xIqn2J5A28JouADCkGKcF5hKSSmhyEEwcdcmWoAZlTP0FyFc
WdJQp3Z1PeqFWDboFI4wjFimFJ3whsCn78sbYjSMhvEfRnbsiAOpcZeuydug
1rqJsnl+Y7xnHxs7445eoIGtkUtqxtF9E8c1tnFZrcQ4yXgwzyEYzYzrkuaZ
GB8ODzJaQexWBakvn7Q9tvkG5Bv29UHtxsUkx+wezA5yKRF5qCQjTPgGSpck
tDKd5IXRcki40iYKOOTgbBdwbKy8O+Cjfc4HNn0CZN40rrOoxFhU2zwzoQOJ
UaoJuuAloxHwc3Z0cWTelkDOBo5ZqjH1ZjgeOOmeUmPyezjbvXxt0X0vTxQH
BUi7e3m9nCv4dco2Rd7DNMzcb/wJ3y0fwauLApfgA/M7iqtJwdqalWKO92i5
l1cVBVr3smOi/16dzDt2cRpCK5txRllzmqOZsEZStkhl4JR1TaCEs40NM7nB
QAlU4RFC+Db6L8O9vb3djzsxdCYUHFjsJxDOe3kUaMcjb5Z759ES2NtF5Rdq
UoB+sOaPX3pTQivZZRhcfPVzZ7rb6Xamg8472Jmir0WUoTds1UWgBZDrVzK/
nkh2mLAcF6QDzSerXLuewCQKwGVIMZI/k7IAJCtwfvrkVPnoEr32fEl2xqh5
4MagIkT28K3JHF0X7xWmrJHK8JESVTdDf5y5VnVS9KYKBpdb1lQafbFydEIK
1zHAFtNSjW3ks8bSNJxEih2YS88q/OLcmoqXzFr3EAaTbxIr4mWsrLSKFrwD
j/m93ocXlo+HxMP3GFuS27/YRyuy83yANaJ7moNs2TOy0zpzrWyGqKTpVzZ5
1iy1dU0er84B6HI5R5eP0B8m5dze+o/Z/Pr8irgL5m/cPtAYsGBDF+DeQWXN
YctOSR+dcbY+oYpbZ7hy3PXx5Yuz3kmfquaIl1HqMIOTzYJeDhEZxvAataSt
UmpnpEBHNeWyT4uyvNhB7F2lZCdRfFocli57LGsJLozCWWmymWeTiPILRgld
2bSysoyeIXiUPvD7fVpMPD06v7zAmPorfKDq0i7VclrV22qYT561VuVCleyD
hzXkrqDPXGdK2OikgQ2waT5Ns57tdvn3oCtVFWOSdKqsh0y6xxgc7dQGO1IG
J5SiALio6NioU4haWyNlgrqVDHJQT3HQoc9G1RSXTREYqAC/mFI8jXgaeozm
OGTSbAWFC/Zb5gDsT1GVAb0H48BbaQpAhtNTGTmOtKnAwiRgD6Iu1/LC+g3w
70qVFx3xyKfYhZVoZxOAkvWM3Q1ObvsIOcpK0NaE1OgW94blMTlpIHuFxsHn
6A1OCYhmvtbG5a7qGnz2kcTLv59ceImw3GscxqOwYBJVKBeVz0ehQ43cERaS
ifwrySQSqcIVXJTrnAB3CBwHCA/W2y4wtW2COE9H37OxqtIwKG0qLc67Gg9O
iL826mct+QvEQ7clhdEJ0j4x5i5souKxINCReS0x9L+dvzkLFcCUuJRzltZh
NywAzMcYSW3KplRVXebNUwEu9BwcF86cWyUT6AzcAcO0UDy4Hto3iIBoo6o1
wDzY3hbGQ+qhBt90DDsGFMGE0DAYDIS4E7KRVBi2kLLf6eIom8qAIYPtwW5v
+6A32L3ePhhub8P//82DXI5hKH9+Z96QZOML6mu6o5/8gdgTFwxdEFrIjviw
bAVpeLjdoVEP3c2LhuHA+pqfkUzkneHnO/HA7HG9mqjzQtsMMEI2CgVXS+zq
YY2/IqRdAcM+B1zK5pxsDLLTjfn/RrAtxO9bAiSAwjYsWBgtijFwW/Wc0mhR
PI2CXL4vDITb2fCcprFuxz4t2ghM0g+XF7KqgdpZM9enneLTIBGVwJYzGH72
/eligCVYePhhcHV5fnZNzR772Dj1eOYvsIUN2W208OB8bz90W9uO2NS205aw
GWM1r5njQEIBVltyNd7FEBwauvSrBVqnk7U+JmqgaBDHJ8faqix/WD6AYijb
UdQW5qJ65aLFbZolMfr/SNbETAk9FsY7ppuxKYKUs80ItIW7snN7e+tEC4ws
JnD/1KcyHpyu8UW+I2jVB2pE+gLwYv34EZD7EixQAzfowXKRVYGDtAKInrIW
QoeB+yNMPdbtazK5wGYh7zR24CNswtW8HoGRaUMKLXJVj3Js7WpDydklOpEl
HpQxo83gzyIeGMKd4cm3h8PhDhIOQtz+zsFhf6e//Wywt0Kwz4Lud5PK7vKJ
pLL7PkIqu8PjpEJUbPfh37OdA4ua/Z3+zvZ2f6dBtEuyRG1Iwe5UrPJh6yn6
mWWUT5QOa7G/l0xU2Ors7e0SJNuDvd7B/v7uPsPBwZOJE13r1yZlHKRVbUof
vK2Sexmp29lEUlRX2RQ7dVcxexNKgcl4e03vyEOCTZXczV3MPoTzrBEE0kkB
87iCg9EJwrHE8JNcbuNPmNQTBT7KBz1uDdAqmWyw5KbSeHNvrC1zG6VL1t00
WdMl+wmgINLyjRPCmLa0atmQcrlra2JdDrx45bpPLbUVRhoQaDfRjzWgAkwm
2My+/JEB4bI4AQSBZqNMymiyxADMWH0HYKCPT7UAc50BRe5jh3+kuc/ZwlPD
Pn69FQ6yDSoAxNxW/q39D81A5HvlBJKVeKcwRV90HnyaP0QxqQ7qqUGfA8Sh
5G5BFy/aA69GzNhat7rNOhUbpXyTCDHNERwIYWkrA7UA5oD7nqmLClczwRu7
K2BKG8aCT0TyueLgs+m1mGoVR5dU6bSbZ6q2cqM3RssgXWbVtZI6wlnPGei5
7apvX1W0Uf/I23UOfuTTmz/1b7acIxy6iXQU3IDLPo78xpuzpj0HRooSJJ3T
Nq7zvk8ZYEvLVK+6pKxOXBt9BmKVUZbDb9Cg6SpduKKsNmNWU46C7kWgv9Ti
B/SdSLBaNt3alN5YwRVVCX0hGu8/cLuU4bSlSarDGSnjQgsSrRppNc01lmhc
KZuIweVN4igv/OH78qro4nKkbFuEFTC1yqnMKL7STpB0Gtwq6jxDRdhpTlSB
PadkW6hyVzWO6/gRiWmqg1MsOIGCzYso3EolRlwtVqkdaBVialJrULXdtqGG
CDSYw4bxK25g55JzFcRbj7tGpCrbogZhame30zRTobW9abpjN7bA8vg+3vy4
tGSzKIiXWXC8aXcM68th0GPWIcRaAcKoVQT5E20aV8I7c7RZM5Bt9ERx6JcH
p6AzoI329hewfuN9rhv2dazC1sZhWk2/Mt3hax03FLmXCu/ne/jEivOmP27U
vF2ZeWVLamyRJjVpe0w21rORKrVwjWXo3G1JyvUCXTWGrcZRxNsNuPWK6iH/
b7C9d9iRVu1Q5xBBSTlRHIElexwUNBAQrPiNUAsPhxsSly5z5pMwn5NLcTc5
cqt8NblSY4vf0l7dCsgTm0Sgz3+2XycS/yfyn0bYU3/uT0yA0m0tz6XoZbcH
5Jhu/nJ50Z3d/f/Pi36icJjFQiODB9xINfnu0VwqMxCFH/G0KJhd+HanizNJ
7TWvtvINReKjMagTYQJoaqDbBAhyFydKTfEpbHsjTWT7j6lT7+7J6vUZ4Bnf
4OtSd3hx5/FGQlvsQtuB5gq7712rs70Ywe2NHE2+KWr0co6a3/hCyd7hwQ5e
czuySwh3iyGt9EojJF5MXa1DhbfrmslErFduuDnFQoyLhKU9b85ccc86B8KU
qQ2QNvFpy7QISDDNaUUz/D+4Xzy0i1HjpnPbXShqj6ebnsEFicJdKAHD9F1x
izfo7EVTqZfghc80t1miswHatUA0sSfH4VIZjdHaNm9dWcr4Lk7sksdjAOkE
6AvQQmnVpEbXBFBUU4czwXKqnKVaU6trazu1sJduV65rYcMUS8sIEKZAeHyJ
ljBhzXUjmAMYtbA1VBcI2QPSNUGY4uIKe8FubTNs/jbtde5uB86GY4NQURML
9ewkqgw8LHRsTdKm4vs6WEImgbyyqxw3p909gfV7zbVACpv3pwJaWHbfcEWT
seIvpaNG8Q3oDncuzh5hh/JYZcug3GGL+cQOkb2U1mxE8VfUuu4agKEAIngR
ZWlCMZCJ8FbzPc12NOqTcmYKL+ya/lUfP/sVfe6HZlRL2y4SI47GxgiD/0X6
m5BPfYJNxJOfdfHRbl7THtzonV0tcNi2RNsfbFonSVFvWBk3/V4tdcd1LwKc
thYxdNcVRFCIGPpMpGmzDKsmrb0h2HYusHoRzA1nQcjE0ojG7U58xMB+maLj
A5jIEPXc4xPi5o3trrOd2b6HEzw4pKRpXFeUqELRpXjbYN8153XWl3Zo78rQ
ml5uvgfuCSTn0UT1mfSNfTDxVy6ABkQ/V9dClQYbrPUiU5ftehcNNy+tNQuS
nNB5zW6oZvg6cJABbhgyEpn1HmOBGAc2SSc529rg9JvQ5Lel/Cy1I88ARtOE
C1Ei0cNGXqeoHCsg4CKFvew9sMEB2nL+RmpSNIincl2XJiVsu7a4Y5qvI6IW
yqI5gsseEWaZ1CwC0Y/N/bomL7lOqzVGanZpfgozubVxux+ojfQP5KXH+1Qx
8+A4aJXNvhw7fZRz2nDy5RhHBIwjvxzjdI0vsECzhfcQwwbo1BSyEYWla1o1
2Q+qZKssAZfq6Cd37aQv/gdlS/FUnUgAAA==

-->

</rfc>
