<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.13 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-webtrans-overview-04" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="WebTransport">The WebTransport Protocol Framework</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-webtrans-overview-04"/>
    <author initials="V." surname="Vasiliev" fullname="Victor Vasiliev">
      <organization>Google</organization>
      <address>
        <email>vasilvv@google.com</email>
      </address>
    </author>
    <date/>
    <area>Applications and Real-Time</area>
    <workgroup>WEBTRANS</workgroup>
    <abstract>
      <t>The WebTransport Protocol Framework enables clients constrained by the Web
security model to communicate with a remote server using a secure multiplexed
transport.  It consists of a set of individual protocols that are safe to expose
to untrusted applications, combined with a model that allows them to be used
interchangeably.</t>
      <t>This document defines the overall requirements on the protocols used in
WebTransport, as well as the common features of the protocols, support for some
of which may be optional.</t>
    </abstract>
    <note>
      <name>Note to Readers</name>
      <t>Discussion of this draft takes place on the WebTransport mailing list
(webtransport@ietf.org), which is archived at
&lt;https://mailarchive.ietf.org/arch/search/?email_list=webtransport&gt;.</t>
      <t>The repository tracking the issues for this draft can be found at
&lt;https://github.com/ietf-wg-webtrans/draft-ietf-webtrans-overview/issues&gt;.
The web API draft corresponding to this document can be found at
&lt;https://wicg.github.io/web-transport/&gt;.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The WebTransport Protocol Framework enables clients constrained by the Web
security model to communicate with a remote server using a secure multiplexed
transport.  It consists of a set of individual protocols that are safe to expose
to untrusted applications, combined with a model that allows them to be used
interchangeably.</t>
      <t>This document defines the overall requirements on the protocols used in
WebTransport, as well as the common features of the protocols, support for some
of which may be optional.</t>
      <section anchor="background">
        <name>Background</name>
        <t>Historically, web applications that needed a bidirectional data stream between a
client and a server could rely on WebSockets <xref target="RFC6455"/>, a message-based
protocol compatible with the Web security model.  However, since the
abstraction it provides is a single ordered stream of messages, it suffers from
head-of-line blocking (HOLB), meaning that all messages must be sent and
received in order even if they are independent and some of them are no longer
needed.  This makes it a poor fit for latency-sensitive applications which rely
on partial reliability and stream independence for performance.</t>
        <t>One existing option available to Web developers are WebRTC data channels
<xref target="RFC8831"/>, which provide a WebSocket-like API for a peer-to-peer SCTP
channel protected by DTLS.  In theory, it is possible to use it for the use
cases addressed by this specification. However, in practice, its use in
non-browser-to-browser settings has been quite low due to its dependency on ICE
(which fits poorly with the Web model) and userspace SCTP (which has very few
implementations available).</t>
        <t>An alternative design would be to open multiple WebSocket connections over
HTTP/3 <xref target="I-D.ietf-httpbis-h3-websockets"/> in a manner similar to how they are
currently layered over HTTP/2 <xref target="RFC8441"/>.  That would avoid head-of-line
blocking and provide an ability to cancel a stream by closing the corresponding
WebSocket object.  However, this approach has a number of drawbacks, which all
stem primarily from the fact that semantically each WebSocket is a completely
independent entity:</t>
        <ul spacing="normal">
          <li>Each new stream would require a WebSocket handshake to agree on application
protocol used, meaning that it would take at least one RTT to establish each
new stream before the client can write to it.</li>
          <li>Only clients can initiate streams.  Server-initiated streams and other
alternative modes of communication (such as the QUIC DATAGRAM frame
<xref target="I-D.ietf-quic-datagram"/>) are not available.</li>
          <li>While the streams would normally be pooled by the user agent, this is not
guaranteed, and the general process of mapping a WebSocket to a server is
opaque to the client.  This introduces unpredictable performance properties
into the system, and prevents optimizations which rely on the streams being on
the same connection (for instance, it might be possible for the client to
request different retransmission priorities for different streams, but that
would be much more complex unless they are all on the same connection).</li>
        </ul>
        <t>The WebTransport protocol framework avoids all of those issues by letting
applications create a single transport object that can contain multiple streams
multiplexed together in a single context (similar to SCTP, HTTP/2, QUIC and
others), and can be also used to send unreliable datagrams (similar to UDP).</t>
      </section>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
        <t>WebTransport is a framework that aims to abstract away the underlying transport
protocol while still exposing a few key transport-layer aspects to application
developers.  It is structured around the following concepts:</t>
        <dl>
          <dt>WebTransport session:</dt>
          <dd>
            <t>A WebTransport session is a single communication context established between a
client and a server.  It may correspond to a specific transport-layer
connection, or it may be a logical entity within an existing multiplexed
transport-layer connection.  Transport sessions are logically independent
from one another even if some sessions can share an underlying
transport-layer connection.</t>
          </dd>
          <dt>WebTransport protocol:</dt>
          <dd>
            <t>A WebTransport protocol is a specific protocol that can be used to establish
a WebTransport session.</t>
          </dd>
          <dt>Datagram:</dt>
          <dd>
            <t>A datagram is a unit of transmission that is treated atomically.</t>
          </dd>
          <dt>Stream:</dt>
          <dd>
            <t>A stream is a sequence of bytes that is reliably delivered to the receiving
application in the same order as it was transmitted by the sender.  Streams
can be of arbitrary length, and therefore cannot always be buffered entirely
in memory. WebTransport protocols and APIs are expected to provide partial
stream data to the application before the stream has been entirely received.</t>
          </dd>
          <dt>Message:</dt>
          <dd>
            <t>A message is a stream that is sufficiently small that it can be fully buffered
before being passed to the application.  WebTransport does not define messages
as a primitive, since from the transport perspective they can be simulated
by fully buffering a stream before passing it to the application.  However,
this distinction is important to highlight since some of the similar protocols
and APIs (notably WebSocket <xref target="RFC6455"/>) use messages as a core abstraction.</t>
          </dd>
          <dt>Server:</dt>
          <dd>
            <t>A WebTransport server is an application that accepts incoming WebTransport
sessions.</t>
          </dd>
          <dt>Client:</dt>
          <dd>
            <t>A WebTransport client is an application that initiates the transport
session and may be running in a constrained security context, for instance,
a JavaScript application running inside a browser.</t>
          </dd>
          <dt>User agent:</dt>
          <dd>
            <t>A WebTransport user agent is a software system that has an unrestricted
access to the host network stack and can create transports on behalf
of the client.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="common-requirements">
      <name>Common Transport Requirements</name>
      <t>Since clients are not necessarily trusted and have to be constrained by the
Web security model, WebTransport imposes certain requirements on any specific
protocol used.</t>
      <t>All WebTransport protocols MUST use TLS <xref target="RFC8446"/> or a semantically
equivalent security protocol (for instance, DTLS <xref target="I-D.ietf-tls-dtls13"/>).
The protocols SHOULD use TLS version 1.3 or later, unless they aim for
backwards compatibility with legacy systems.</t>
      <t>All WebTransport protocols MUST require the user agent to obtain and maintain
explicit consent from the server to send data.  For connection-oriented
protocols (such as TCP or QUIC), the connection establishment and keep-alive
mechanisms suffice.  STUN Consent Freshness <xref target="RFC7675"/> is another example of
a mechanism satisfying this requirement.</t>
      <t>All WebTransport protocols MUST limit the rate at which the client sends data.
This SHOULD be accomplished via a feedback-based congestion control mechanism
(such as <xref target="RFC5681"/> or <xref target="RFC9002"/>).</t>
      <t>All WebTransport protocols MUST support simultaneously establishing multiple
sessions between the same client and server.</t>
      <t>All WebTransport protocols MUST prevent clients from establishing transport
sessions to network endpoints that are not WebTransport servers.</t>
      <t>All WebTransport protocols MUST provide a way for the user agent to indicate
the origin <xref target="RFC6454"/> of the client to the server.</t>
      <t>All WebTransport protocols MUST provide a way for a server endpoint location to
be described using a URI <xref target="RFC3986"/>.  This enables integration with various
Web platform features that represent resources as URIs, such as Content
Security Policy <xref target="CSP"/>.</t>
    </section>
    <section anchor="session-establishment">
      <name>Session Establishment</name>
      <t>WebTransport session establishment is an asynchronous process.  A session is
considered <em>ready</em> from the client's perspective when the server has confirmed
that it is willing to accept the session with the provided origin and URI.
WebTransport protocols MAY allow clients to send data before the session is
ready; however, they MUST NOT use mechanisms that are unsafe against replay
attacks without an explicit indication from the client.</t>
    </section>
    <section anchor="transport-features">
      <name>Transport Features</name>
      <t>All transport protocols MUST provide datagrams, unidirectional and
bidirectional streams in order to make the transport protocols interchangeable.</t>
      <section anchor="features-session">
        <name>Session-Wide Features</name>
        <t>Any WebTransport protocol SHALL provide the following operations on the
session:</t>
        <dl>
          <dt>establish a session</dt>
          <dd>
            <t>Create a new WebTransport session given a URI <xref target="RFC3986"/> and the origin
<xref target="RFC6454"/> of the requester.</t>
          </dd>
          <dt>terminate a session</dt>
          <dd>
            <t>Terminate the session while communicating to the peer an unsigned 32-bit
error code and an error reason string of at most 1024 bytes.  The error code
and string are optional; the default values are 0 and "".</t>
          </dd>
        </dl>
        <t>Any WebTransport protocol SHALL provide the following events:</t>
        <dl>
          <dt>session terminated event</dt>
          <dd>
            <t>Indicates that the WebTransport session has been terminated, either by the
peer or by the local networking stack, and no user data can be exchanged on
it any further.  If the session has been terminated as a result of the peer
performing the "terminate a session" operation above, a corresponding error
code and an error string can be provided.</t>
          </dd>
        </dl>
      </section>
      <section anchor="features-datagrams">
        <name>Datagrams</name>
        <t>A datagram is a sequence of bytes that is limited in size (generally to the path
MTU) and is not expected to be transmitted reliably.  The general goal for
WebTransport datagrams is to be similar in behavior to UDP while being subject
to common requirements expressed in <xref target="common-requirements"/>.</t>
        <t>A WebTransport sender is not expected to retransmit datagrams, though it may
end up doing so if it is using a TCP-based protocol or some other underlying
protocol that only provides reliable delivery.  WebTransport datagrams are not
expected to be flow controlled, meaning that the receiver might drop datagrams
if the application is not consuming them fast enough.</t>
        <t>The application MUST be provided with the maximum datagram size that it can
send.  The size SHOULD be derived from the result of performing path MTU
discovery.</t>
        <t>In the WebTransport model, all of the outgoing and incoming datagrams are
placed into a size-bound queue (similar to a network interface card queue).</t>
        <t>Any WebTransport protocol SHALL provide the following operations on the
session:</t>
        <dl>
          <dt>send a datagram</dt>
          <dd>
            <t>Enqueues a datagram to be sent to the peer.  This can potentially result in
the datagram being dropped if the queue is full.</t>
          </dd>
          <dt>receive a datagram</dt>
          <dd>
            <t>Dequeues an incoming datagram, if one is available.</t>
          </dd>
          <dt>get maxiumum datagram size</dt>
          <dd>
            <t>Returns the largest size of the datagram that a WebTransport session is
expected to be able to send.</t>
          </dd>
        </dl>
      </section>
      <section anchor="features-streams">
        <name>Streams</name>
        <t>A unidirectional stream is a one-way reliable in-order stream of bytes where the
initiator is the only endpoint that can send data.  A bidirectional stream
allows both endpoints to send data and can be conceptually represented as a pair
of unidirectional streams.</t>
        <t>The streams are in general expected to follow the semantics and the state
machine of QUIC streams (<xref target="RFC9000"/>, Sections 2 and 3).
TODO: describe the stream state machine explicitly.</t>
        <t>A WebTransport stream can be reset, indicating that the endpoint is not
interested in either sending or receiving any data related to the stream.  In
that case, the sender is expected to not retransmit any data that was already
sent on that stream.</t>
        <t>Streams SHOULD be sufficiently lightweight that they can be used as messages.</t>
        <t>Data sent on a stream is flow controlled by the transport protocol.  In addition
to flow controlling stream data, the creation of new streams is flow controlled
as well: an endpoint may only open a limited number of streams until the peer
explicitly allows creating more streams.  From the perspective of the client,
this is presented as a size-bounded queue of incoming streams.</t>
        <t>Any WebTransport protocol SHALL provide the following operations on the
session:</t>
        <dl>
          <dt>create a unidirectional stream</dt>
          <dd>
            <t>Creates an outgoing unidirectional stream; this operation may block until the
flow control of the underlying protocol allows for it to be completed.</t>
          </dd>
          <dt>create a bidirectional stream</dt>
          <dd>
            <t>Creates an outgoing bidirectional stream; this operation may block until the
flow control of the underlying protocol allows for it to be completed.</t>
          </dd>
          <dt>receive a unidirectional stream</dt>
          <dd>
            <t>Removes a stream from the queue of incoming unidirectional streams, if one is
available.</t>
          </dd>
          <dt>receive a bidirectional stream</dt>
          <dd>
            <t>Removes a stream from the queue of incoming unidirectional streams, if one is
available.</t>
          </dd>
        </dl>
        <t>Any WebTransport protocol SHALL provide the following operations on an
individual stream:</t>
        <dl>
          <dt>send bytes</dt>
          <dd>
            <t>Add bytes into the stream send buffer.  The sender can also indicate a FIN,
signalling the fact that no new data will be send on the stream.  Not
applicable for incoming unidirectional streams.</t>
          </dd>
          <dt>receive bytes</dt>
          <dd>
            <t>Removes bytes from the stream receive buffer.  FIN can be received together
with the stream data.  Not applicable for outgoing unidirectional streams.</t>
          </dd>
          <dt>abort send side</dt>
          <dd>
            <t>Sends a signal to the peer that the write side of the stream has been aborted.
Discards the send buffer; if possible, no currently outstanding data is
transmitted or retransmitted.  An unsigned 8-bit error code can be supplied
as a part of the signal to the peer; if omitted, the error code is presumed
to be 0.</t>
          </dd>
          <dt>abort receive side</dt>
          <dd>
            <t>Sends a signal to the peer that the read side of the stream has been aborted.
Discards the receive buffer; the peer is typically expected to abort the
corresponding send side in response.  An unsigned 8-bit error code can be
supplied as a part of the signal to the peer.</t>
          </dd>
        </dl>
        <t>Any WebTransport protocol SHALL provide the following events for an individual
stream:</t>
        <dl>
          <dt>send side aborted</dt>
          <dd>
            <t>Indicates that the peer has aborted the corresponding receive side of the
stream.  An unsigned 8-bit error code from the peer may be available.</t>
          </dd>
          <dt>receive side aborted</dt>
          <dd>
            <t>Indicates that the peer has aborted the corresponding send side of the
stream.  An unsigned 8-bit error code from the peer may be available.</t>
          </dd>
          <dt>Data Recvd state reached</dt>
          <dd>
            <t>Indicates that no further data will be transmitted or retransmitted on the
local send side, and that the FIN has been sent.  Data Recvd implies that
aborting send-side is a no-op.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="transport-properties">
      <name>Transport Properties</name>
      <t>WebTransport defines common semantics for multiple protocols to allow them to
be used interchangeably.  Nevertheless, those protocols still have
substantially different performance properties that an application may want to
query.</t>
      <t>The most notable property is support for unreliable data delivery.  The
protocol is defined to support unreliable delivery if:</t>
      <ul spacing="normal">
        <li>Resetting a stream results in the lost stream data no longer being
retransmitted, and</li>
        <li>The datagrams are never retransmitted.</li>
      </ul>
      <t>Another important property is pooling support.  Pooling means that multiple
transport sessions may end up sharing the same transport layer connection, and
thus share a congestion controller and other contexts.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Providing untrusted clients with a reasonably low-level access to the network
comes with risks.  This document mitigates those risks by imposing a set of
common requirements described in <xref target="common-requirements"/>.</t>
      <t>WebTransport mandates the use of TLS for all protocols implementing it.  This
has a dual purpose.  On one hand, it protects the transport from the network,
including both potential attackers and ossification by middleboxes.  On the
other hand, it protects the network elements from potential confusion attacks
such as the one discussed in Section 10.3 of <xref target="RFC6455"/>.</t>
      <t>One potential concern is that even when a transport cannot be created, the
connection error would reveal enough information to allow an attacker to scan
the network addresses that would normally be inaccessible.  Because of that, the
user agent that runs untrusted clients MUST NOT provide any detailed error
information until the server has confirmed that it is a WebTransport endpoint.
For example, the client must not be able to distinguish between a network
address that is unreachable and one that is reachable but is not a WebTransport
server.</t>
      <t>WebTransport does not support any traditional means of HTTP-based
authentication.  It is not necessarily based on HTTP, and hence does not support
HTTP cookies or HTTP authentication.  Since it requires TLS, individual
transport protocols MAY expose TLS-based authentication capabilities such as
client certificates.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>There are no requests to IANA in this document.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC6454">
          <front>
            <title>The Web Origin Concept</title>
            <author fullname="A. Barth" initials="A." surname="Barth">
              <organization/>
            </author>
            <date month="December" year="2011"/>
            <abstract>
              <t>This document defines the concept of an "origin", which is often used as the scope of authority or privilege by user agents.  Typically, user agents isolate content retrieved from different origins to prevent malicious web site operators from interfering with the operation of benign web sites.  In addition to outlining the principles that underlie the concept of origin, this document details how to determine the origin of a URI and how to serialize an origin into a string.  It also defines an HTTP header field, named "Origin", that indicates which origins are associated with an HTTP request.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6454"/>
          <seriesInfo name="DOI" value="10.17487/RFC6454"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee">
              <organization/>
            </author>
            <author fullname="R. Fielding" initials="R." surname="Fielding">
              <organization/>
            </author>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="CSP" target="https://www.w3.org/TR/CSP/">
          <front>
            <title>Content Security Policy Level 3</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
        </reference>
        <reference anchor="RFC6455">
          <front>
            <title>The WebSocket Protocol</title>
            <author fullname="I. Fette" initials="I." surname="Fette">
              <organization/>
            </author>
            <author fullname="A. Melnikov" initials="A." surname="Melnikov">
              <organization/>
            </author>
            <date month="December" year="2011"/>
            <abstract>
              <t>The WebSocket Protocol enables two-way communication between a client running untrusted code in a controlled environment to a remote host that has opted-in to communications from that code.  The security model used for this is the origin-based security model commonly used by web browsers.  The protocol consists of an opening handshake followed by basic message framing, layered over TCP.  The goal of this technology is to provide a mechanism for browser-based applications that need two-way communication with servers that does not rely on opening multiple HTTP connections (e.g., using XMLHttpRequest or &lt;iframe&gt;s and long polling).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6455"/>
          <seriesInfo name="DOI" value="10.17487/RFC6455"/>
        </reference>
        <reference anchor="RFC8831">
          <front>
            <title>WebRTC Data Channels</title>
            <author fullname="R. Jesup" initials="R." surname="Jesup">
              <organization/>
            </author>
            <author fullname="S. Loreto" initials="S." surname="Loreto">
              <organization/>
            </author>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen">
              <organization/>
            </author>
            <date month="January" year="2021"/>
            <abstract>
              <t>The WebRTC framework specifies protocol support for direct, interactive, rich communication using audio, video, and data between two peers' web browsers. This document specifies the non-media data transport aspects of the WebRTC framework. It provides an architectural overview of how the Stream Control Transmission Protocol (SCTP) is used in the WebRTC context as a generic transport service that allows web browsers to exchange generic data from peer to peer.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8831"/>
          <seriesInfo name="DOI" value="10.17487/RFC8831"/>
        </reference>
        <reference anchor="I-D.ietf-httpbis-h3-websockets">
          <front>
            <title>Bootstrapping WebSockets with HTTP/3</title>
            <author fullname="Ryan Hamilton">
              <organization>Google</organization>
            </author>
            <date day="8" month="February" year="2022"/>
            <abstract>
              <t>The mechanism for running the WebSocket Protocol over a single stream of an HTTP/2 connection is equally applicable to HTTP/3, but the HTTP-version-specific details need to be specified.  This document describes how the mechanism is adapted for HTTP/3.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-h3-websockets-04"/>
        </reference>
        <reference anchor="RFC8441">
          <front>
            <title>Bootstrapping WebSockets with HTTP/2</title>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <date month="September" year="2018"/>
            <abstract>
              <t>This document defines a mechanism for running the WebSocket Protocol (RFC 6455) over a single stream of an HTTP/2 connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8441"/>
          <seriesInfo name="DOI" value="10.17487/RFC8441"/>
        </reference>
        <reference anchor="I-D.ietf-quic-datagram">
          <front>
            <title>An Unreliable Datagram Extension to QUIC</title>
            <author fullname="Tommy Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="David Schinazi">
              <organization>Google LLC</organization>
            </author>
            <date day="4" month="February" year="2022"/>
            <abstract>
              <t>This document defines an extension to the QUIC transport protocol to add support for sending and receiving unreliable datagrams over a QUIC connection.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-quic-datagram-10"/>
        </reference>
        <reference anchor="I-D.ietf-tls-dtls13">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla">
              <organization>RTFM, Inc.</organization>
            </author>
            <author fullname="Hannes Tschofenig">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Nagendra Modadugu">
              <organization>Google, Inc.</organization>
            </author>
            <date day="30" month="April" year="2021"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.

 The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.

 This document obsoletes RFC 6347.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-dtls13-43"/>
        </reference>
        <reference anchor="RFC7675">
          <front>
            <title>Session Traversal Utilities for NAT (STUN) Usage for Consent Freshness</title>
            <author fullname="M. Perumal" initials="M." surname="Perumal">
              <organization/>
            </author>
            <author fullname="D. Wing" initials="D." surname="Wing">
              <organization/>
            </author>
            <author fullname="R. Ravindranath" initials="R." surname="Ravindranath">
              <organization/>
            </author>
            <author fullname="T. Reddy" initials="T." surname="Reddy">
              <organization/>
            </author>
            <author fullname="M. Thomson" initials="M." surname="Thomson">
              <organization/>
            </author>
            <date month="October" year="2015"/>
            <abstract>
              <t>To prevent WebRTC applications, such as browsers, from launching attacks by sending traffic to unwilling victims, periodic consent to send needs to be obtained from remote endpoints.</t>
              <t>This document describes a consent mechanism using a new Session Traversal Utilities for NAT (STUN) usage.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7675"/>
          <seriesInfo name="DOI" value="10.17487/RFC7675"/>
        </reference>
        <reference anchor="RFC5681">
          <front>
            <title>TCP Congestion Control</title>
            <author fullname="M. Allman" initials="M." surname="Allman">
              <organization/>
            </author>
            <author fullname="V. Paxson" initials="V." surname="Paxson">
              <organization/>
            </author>
            <author fullname="E. Blanton" initials="E." surname="Blanton">
              <organization/>
            </author>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document defines TCP's four intertwined congestion control algorithms: slow start, congestion avoidance, fast retransmit, and fast recovery.  In addition, the document specifies how TCP should begin transmission after a relatively long idle period, as well as discussing various acknowledgment generation methods.  This document obsoletes RFC 2581.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5681"/>
          <seriesInfo name="DOI" value="10.17487/RFC5681"/>
        </reference>
        <reference anchor="RFC9002">
          <front>
            <title>QUIC Loss Detection and Congestion Control</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar">
              <organization/>
            </author>
            <author fullname="I. Swett" initials="I." role="editor" surname="Swett">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes loss detection and congestion control mechanisms for QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9002"/>
          <seriesInfo name="DOI" value="10.17487/RFC9002"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar">
              <organization/>
            </author>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol.  QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances.  Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1cW3MbR3Z+n1/RkR8ipQBSN9synWSXJqUVU7owJGXX1u6W
q4FpALMazGCnZwhhXfrv+c6lLwNCttZx8pJseSUSmOk+fa7fubSm02nRV33t
TszNypkf3Oyms43ftF1vLru2b+dtbV50du22bfe+sLNZ525PRs8VZTtv8MCJ
KTu76KeV6xfTrZv19MC0vXXdbeW204dPi9L2eOqn89Ob5x+LOX5Ztt3uxPi+
LGj1ZdcOG6z9/Lubq9M310VRbboT03eD7x8/fPjNw8eF7Zw9MaebTV3h9apt
vLFNaa6crac31doVhe/xwY+2bhvstHO+2FQn5k84xsR40Nq5hcdPuzX98Jei
sEO/aruTwkwLg/9VjT8x3x+Z762v6srd8odytu+red9242/abmmb6u9MyYn5
Q9sua8dfuLWt6hNzSw/f3v5+yd8czds1ztQs2m6NV24dtjVn15cn/Epvu6Xr
T8yq7zf+5Ph4u90ebZ8cYYvjm6tjPHYsj4ms7p21Te+a3ly7+dBV/c5ctuDJ
zrxyt642T+7xw/F0RqkFc5+c8a8iih/A9apZmnMSXFFMp1NjZx6Cm+O3z9AH
4xo7q503c/Ck6fE3RILXq8aVZrYzvSxR+EDlui1BXt/iwfV6aEiKzmyrfmWs
6dy6xW8e+uI6M3gizBp+1Zn1UPfVpnYfXFn0gaIjYy563rPy2Lxd8PM9/VA1
ZXVblYOtzUbJ9iDH9gY6ZLxdOKLCfdi03hX4aWhYz0C2zbRrQnTO+DRKpB6A
F6rrdkuLujWtNXOgGdRVEEw3X9lm6cCb3RExsvIGRjKsSWKlW2BBfs+QcWAZ
HP1vQ4XzMw/bhr9LZNOyOFCRC2NirDdbh3etLEUMxZsLZ3vwi5kxWgVaP2xY
jNA/2AKMBY9sV9V8ZdZ2R+S3Gzq0rY9EExpI48c39Eff/ggTK13ni+K88vPB
ezwoW9DRSHugwO+x7aa2cxeOMNIeMgkSaQ1ZFfeDf6Cvfk8egzT9wUQJwqIW
PISNQB598ed/DVZBi+g3R+GtY/rg2Dv+63dsej/SJv+W7/Hnfz8Sje4cRF7B
lKGd0HNWf6K18n4A/cSc7FBz2xBnFu3Q7FGyhD4MM7LpY3F4y+jzjn/ODx7L
RkQPkYPvzenlRdiu7SC7TQvlJbJaJSWozqep2Vbz5ZGSVLXHWHUaj37MZyeJ
rquyhIcqvjAXUPe2HOYk8P+39P/Llv7FF+Y7mAHF3qYsipfgb9uBK3W9m7B2
5lwSdjTOlcQ+M6tKnGUua1FIgVAQYu0ae/Rb5xpjC9EXDtM2SHzeDnUJVtQ7
YgEOe93O3zsw5Keffnf14uyrp19++fHjhGTgvLdLN51Z4nc4IXFgA4KgjyIs
VT4zVj7ozMt2i3jYgSNVA7eE54oQ38iBVT1xDcoDLpLLoccQqBEp4etwQj0M
uKeEgLd4xw+LBXyhWXQI6Cs4xmm7mMK3OTOrW/Eo91++ffUd3NnaASCwhxE1
igtBzX1PovDKnQKMdOzwqkYIMCAdNLJ0d6zMUHW3cfhDGUqyVfGv+YGmNUA+
S9cVIiOwgFVyzb4ZpFuzaaEUi0qUo4ZRNvPdFETAJ2L3sbRFZ0hOBbi1sV1f
WVLhurIzOHMwmqkQLiXi5o4X37iOoQ5+h569BXvcB2gXsUP0z9hbcuckRlgV
CbAk9NJuiLl0HHx0dXMmikV21rjaF6Ijz549eUQ6IiSqFHG8qEwQyHvHrpVo
wbmd66Z9O6W/zfXZzWWhK7LhQInFj53fvLomZ8OWiSDBAgcH4T18pZTCSo0y
kDQPvwLMejDYliUM0gePiNf8xs2rhTL0KOkjZLxhLZw72sHLmk3RtM101sHZ
CLH6I7k64ps3K/iAGRkWvAg8KNySKQcmihaJAmC7ujh7jjjL/FnQtyR5WNzI
YthQHrAYQUHnNxS9iTtG36QNQfEO7mZbVGv4ZXJdAXsH+T2AgE8hzxoOsWFs
C1p8tWzMlk19xiRCsE1070lS5NYb8SKe/WTx8ubm8vgJeYOL6TnH+SkFulnl
p6snFFK9+IuPH4mRcBMkSHCpWhM6oK1WYEwwmwJOoQPROHttd2zYtIvhXR6r
z3n29Cn0ie0FlipU29u2Kk1u4EU0cOJY1DrQoPZA8Y4UvjbJFe4QM1sfcMYo
xBeJCe3sr+BB7rNYgWCPXWtVENY0w3oG0mHzAAzbGRy3DzYA74LsB45g01Vr
21U4Ljko3nQBVRMf5IGPml78u3G0cCKBXSD51tr1ZPO5u8H/cb6TovgX85ze
atw2HHCr3pwDW26CoLkp/Qq+h/hil51jZJi5GKQi0alT7NtzmFWQBGFLAB5T
OwuvidzOXN3ccFhHvjcD2FvxWbBcRtfMwUKdMF2CEOGnbUeGwwZzhMO8bepd
wjT4vmrgCAmryCoeErnmqDUN3wSPJ7lni/U7bJzrPlkVx+WEfcjd3fcDyUmi
+H++uzgzyIRP/3B1+hqSAs7CKrnKg5/zKfm+Jb78+PGBevg+mR0d4IdVVcsh
A1XCsoZcLwkZtgfLrxNMI0OHNHBi1TH8h2Wx+3KwQB29I0HQ2ehpPEfIheQ0
h2/jYAgJCmRLoiYBh/BeeazVbuzfxDMlAYRwVCn6BJOGZgODRG7NYSALGbQh
fu0rR6vhDVnI70jHJ2p/FCEJRyGcrDUPz6NWAFiBMzPHwYfUjj8GzzPnY+6T
R68aKiGIWwZgXq564aC6/+D0VaP6FmuR6kMRTVkRLqCPO8fIdV1JogSLBKai
o/D76TklbGJmg9gnVosec03asiYVFpv8AGbVJIKIBwhQhCOOz/Lg6ACqj6a2
iKieXZyXhQhHtD5mQtCWWsJOMQIFc5DcuwSWIkZXFyamS6YEcnokCMnl63GL
DOKDg0tHJiSeXNekN92HHhaTXDpFpYk67YmYD8Emtj//QDRCEyRb+1awNN4D
tkFwawS1YO1gUX60+rvzyweChs/ahrQqFpfOCcVX/Lvw9L3bgXfg2r3X765v
7k3kb/PmLf989RykXT0/p5+vX56+ehV/CE9cv3z77hW+L/Sn9ObZ29evn785
l5fxqdn76PXpH+/JQe+9vby5ePvm9NU94htZcRHTDtIMyVI4QYGVcLJD8MDP
u2omEPO7s0vz6Ckczj8h+j1+9OgbBFP55dmjr59+/FhsV66RzVrykfKrqN5m
g2SbBQa9mdtN1VtKO7CFR+BtEDI7gnwj5ePgkhRPAHEFKZDnUExu7Naqj0LU
AVjhSBDrjFF/t+zzACWxPSd24o0AUUg46Y0px3vQBRTWy05Z7ElgU7JLgmtI
DeeUVYFfnBBJ9Gwp/6M9oJdzt+n9yd7hAP7I0PHxiTk1h74a5RfjsBCUPcYy
ctUxfzLmQAYlBFMyl+CEumAFnPtMoHWid5gYcnR9yAYtcOSSIIFGeYaIJN0m
IfY8Kzd3OJyWJhe/f3YB87oHVCnDFViLQQqFdNuwLce0h7ObuASZNrBEx3Ar
qcfPE7MnpqBALKd9QUXtEkkFPsaPo1vT9H8EP6imag8KHjScq8dR9QgOSDaC
HnAZYxQwBP1AY9nXUq2nXQvzsNw1e1FdLCRfTDPFIQqdWG62652P66jz28EF
1AAonVDfczmMsk5hZGYc4lU0rEg2ajmB3BJ8EVL7PmEKcrKsltfq4k1gFZVq
ulmFdzoKKM2yX0Vw0QlCw5MMa2pYPwVpREMOkCXrI6efhACADRENd0eHxSbO
GvmeaBvcguR0OGfA6ZrAYjHlGieWyoj88Bly1Cdj3hUoMiFdh0BeS06vEtEM
X0Uirwc5UOWgmleSjHjCZxHohtrewJhNGQBSlRaBLhvrfZJdRjI4P+JK2ToG
dVqDimUHkjLRRTkCJ/yhNBJThRTOyTMSEwnRst9XEhE1ByocMHW7EcVayBvh
b6KZPq/6w3SHfIdBGZXP2ONogQY6tyZiLGMtswIeqxmTCdVZASRmf1Eh6KxB
Je6DF2wACbHmtaYHnH/H2oyVRIh8TaoWkeWx8z3s5RX5cjKYqZLEuTlHDegw
PD/xYtQ+M9HJYYszdvaHttAw8IktQnLix0JMizMv1OF3Q8NJFkOuvJAbC2ga
kyZmBImJo+Y/kH5cA0ds+hEVaU0vlRitXeBM72LCcehcKR1Rk2kX/ZZLtwz1
5Xic/TYM40BsNRftI756H9QK4JVqkz3jC1A8fx8xoWLWyBYuvc7cytYLSlUW
eY5C5fEzKbEmIq/ysq356QupwU7zau5H6AcrZcgmQ7qGYESKxRl5LD2DsJW9
DUDtbjG9uFvPnIz5RoZBRac5kiRC2fuVZdvsYhQrRlk2FWvgeT7hRhnMkjnc
vLoOiPDp068AD7mOlhcQCtry1tacygRa41Z76dS5rJfy27720xJ/PHoCA5Ru
SKJCoXGgA8bFSvzo6InRumU3GedD1ZqUtaCaCNSn9LFKLJUZLnvVbmnnO9Us
/xl8CFWNcd7MxawZc12squJEp0DQgT1U0qig56JXVf8Q0hEKPHB9L9ocrUyR
I+KlrNDtU8ngBnAdT1Pa82CihaSYuEYYsg5A8b1zm6mlWF+sHRU6K78O4cdR
mL5594YyHabyBYxq1RAnxSd+/dXXX1JpzSdI9sFSBgpLKagorwsCHfSVXwhK
XzHMiCr4GbytKQQJCOGEstfMPUuviVleuCW9FVULAq1zzooFLt9WlvG/K0n8
0i4gBsGZR4jdtXUivYiMlSN/+dWzR6Lh8vs3Dx8+Zq38xVOEXgtHRai6awdP
pbUgkhw8FxHNBnyfUvcE8hXi//LWWv+IDoe1bbRxigNxZ6hg8JFg7qat6M3Y
LiN/dSCwfY6ppBo8JXFZcTwzGurVUSOw4JZYVy1hQeJiEIefkgByVxwc+z/A
kH0SYk0qnBVpSAibbTFzWU4c2pDvri6UpiffPPtKa8JQvdAApaQa8J3XYKdy
C9cOobPH3sAzUQUrdeeYtZ2DrLxUhnw7dHMBGdiKu3WiiTrSUeyPdPzp7Pry
LxyWrjWUP8/t/XAquucTFDX4XTNfdW0DckNB74gSoZSkFtxjlfbXj4ia5e7H
5MVELP/sR9CQCgO5j6NQjUUWVbemDq7CWxCwRbqubW0BRPqWbB3bEirEMugH
mQQYdXQ4lYPkT/8oDdpoB7mXHWH5dEo+2bfUJgi1doSQUMZRMBjdZrSOoeF2
sl1aCmskVWSche0Ja3g+QTv0kjZrIFCFp133uMgCTed5ofoiSt7/kobHIhYF
wVEXlmpi475sqH7GviL4s+ai/Bjux53GfW0nZTHVvekPtH2glqBQ0PSpsvcj
tYJ2n8itpRAWTjEurlApRmuMUtQsUlkl1fltECOQ5FkoRVLV/6AVLCsqJtw1
6ljeFiXjyvtdN6SFXfY9+BPQXSufkYKb+OlIl7k+lVV5wjCH4zakIFlqj0HL
nzyeIjsGAa7rGA5wQ6lkLeJPcEaPNQn2EpMWFCjXBHUfPXz8VPJ8dlEuW0FT
H32HVDd0/L9lKpAVWsQkuK6aSr30wEOpK947+rXik1o8ZBW4EDlWyndg14X6
f7WpOzNC4dWYbqc1JsZVjEUUHxthZRs+YMdeh9hGBHEKILWGppVAJJ1kSWPd
B1HxUhoC1BxvKJvtaBcqsC1GMj1AkuSJUH1iZZjCcFxr00ZGaPrdO6A995LC
I81sKRW3ewNALFCu3O0rhUpWjxJcpljqeSxw59YZPQbZ514N6tOFI8ZoUjD2
1d+dua/toHoXFdr2q+L1zTtpIksraVR9mblRwSiUolRnQ3tp2eIPwu/jMkY8
SuV1rZDmV5LA3VZtqN+r2UmlxA/cjCh0AKndy49AoHbqGYEcSuc+kiXsqydV
uQ4dMjZ8+tw1UzxYrrTSWnAfYmPKlulrqcQpgTEgD2B8ha7R4HSAR7qMedlz
XJbkCn0cZUmtDqn27e5UhyJbFfMVewJbcDgV0FzfacumuiFokhZZ2bWbtGwh
QyvjgqIwjeDFEOwCMIn6ua4hNmnHKn+HQ16m3wkkrO0H4O110mPWzqyWVpCs
VMf4u5Q5gIc8ZxMDcrLgzGxJrw30uigrP2+Zi0VxcWiuUXLz2EKDsIZ+2YYh
gVjzGTG94DnJUvqalimczrjhAEsc3Kg1ZSNg58C8oBGNOTJcefTBr3bYPxdv
GT/ZSDNc9/OGt/PZp8EiM6hO7i8AZnJOm5YgbcUOQ9lchfZrXEYsllRoQywR
JgofsAzVF3FGVbgxUecuENXcZfSElqLGQuXzlnmxdD3rz3BHgbDilYO7bKSK
VtNItu9Ff1S26ewMCj/V66F4PjapMObEeimISnHZCEPJZ+yj94BdXunHqaaU
4kRLr6h6QL4pjayJI99SlZ2FqxXClv0Xqyk5jZgXxfZGXqA4NYegZKHzkDN4
pTyJzGF31o3VptmgSqCZUAifG1t1NJ948LRenUIcuOAhuBg0chaLXmvIlhKV
jygPUABJ59rOV1QMx27cPg6r3o85/0MaKbsOs0iP+f0nVJt6e/72JOaKeWOA
VzZh5YD7uU+zHzzkBWUKMaGfxPwgd61RJDqXwVbvvIZhRUHEaTbiLrVwGMAw
96EXtk+NAtmax9oKlbN3k6xxQ1vlzCRPnYW0uC6/TC0gW3MGVbDthxq0bhM6
VHm1ZtT44Ar+1nHgCKfejVpr2CEU47V/ZsJONjOEvTAVkODdnEYm+mxZch+f
QMHoVUGLsSWk9TVKLnTMPU0V+QP7Fjqge8L4LEiPau1sYjz2ZiOUSiNcYcUB
ylon9JiUKAweCylUSKJUNg0mvQgRLM/HRyWUSREmfPbMLkUcF2IOz1KrD03m
99vHljhActDkY1rHTj2G0oPPfitlx4Sjub9BI3qJp9RhzsQV2JMNGMQDKbcX
0hwPlXkZhyOfHQk/6BQP033o0f9lslPk/BTDr9waCCfrV0ZodFczDvvpLNZS
7plF27T7J7j2P7n5b6G8wJLZFQMfmu8c6jjGUkur1J+zQTWND/wYN0cDGhWP
S+6O55RCTRQMeHHxhnpsVBmwWisbDW82LXsidsVUTVP0VY7n3LDPGx7nUygd
xtZ+gYuZrMKxgmjkaKmZIUeLT4fTgfwU3nSYPYx30WBbAO+ZqxVa9yn9easn
SpEwaz5mqFoJWq+5VWCVeaNyS4ysMvvJ/cnQNN5r7/O6ZDXG0EUn7iOFMKkH
/Za0LcwDTkgmab4YhPMFxABDRSPz9JfjdfYBgaysGvSMikF5KSj03AfikDQ9
BTV1fWp875+YSWxlAwlm2YoaC4a1TPKwu3gYWRqE+g9wlZDAr2LqWIG+TUsT
QN1twpByhkuERnGP41JJVAXDrVD63LvPYy5ZnLL3c5j73yyQSVuiya4tFWOf
Iu1zYdnhkhnziDvi8pS2A3N25GLUo8Sxl1/iyiKhCsrvdUbsgEv/TShNZ/6t
yWTYeOXmt6Wi9I5mxA+RChvWut/Yt/6c4QZcY7TwGM8RppuUBeQUoyV4GYLO
KKMrFZXSQcZNfApsmYo+89x/O203ey2DyzQgvVc103tnWvhK6RCpXhzGzS7L
tdpA6eWCWxFg+P4FNzhrapfgMeq7c33L5wvJRCbNNRR+mJEn1NQ/TTwfnvDW
bHo810Ii3crgTwEo0O00GeTit8zzxDV2Ml2Vrr3tDfzmpTCskcpnNHDE7JJZ
YV0hf1tfhEvl2w9XTi/jJMAihQ0fZuZqoi+fMIu3sqTSwRPjmSaxwmDlm5Xb
r8wRt/fiBXkfqQamyaicCTTrLwXQjV6cvNRPqIannI4N6X6/duGZ7VqqpHnL
gEK4S50e3x+1lEP0q8GHKc0D/feaex96ZyLMGHltbWrT80z7j1Ynri/ZlwoY
CNMzodEXr5NSh4THu6DF05qvwI9ng7SCVsAknL7XVf69D7WqODxNU3FL9Qyk
3PwUJZY8bhMuqlJ4KA7VlUcj1p+uK+9djG7KOLlFrUc4Qpp54UBR57da4/0r
madT4gu5GiQ3YIeOpoLwzduGITFdwZnoRcdepqBHGXL0osqhCcDuvB6Y4Vzf
iRU8I31OvptHMoS6LOLA5E7vFs/aD9yOeivOUQR9mIY4hVAr75iUtB31kAeZ
XJMGa5Ffn6GzlXIVXZitVRvz6CGNCC1G4316/XC09tx1jVTCYA88csyNbJvx
RudSZ1oLUCxV5IM3HI7CBahbxyPUUvMP/8wDTxqof7VNZCJ7G6pT56wI9weV
qrsXeapG1JqgJ7j8nZtbVRh6QcjLJy549gAh9IDtxGZ3usVG48E94ic17Ljz
lB8iFSkO9flN1uffK4qGgshRQeNOOkk0yWoUchVWOR3KpDIFuhyo5RuH4aMZ
K6Nim4r8NWI7vyw3Flz8Ln1Dl2y0DTGmsYgTJoeHaENYIBZBPaSKZGv1qOA+
3UrRS8r0b244HpDT+daLuGk+CCh9HvCVXhXIsOIW3P6mfBkSjG7fU5xs5dqi
ubOLjB5WfXBHnlzIJEeZB2cKTv+oN+PpcW0+jdem+x1yu5H2VxMMt7pp9lC8
gBM3fnH65vSOC7/hGrTeT9aeOntmflrvr0QXrP9WAQ1yFf8F8MgtLp5GAAA=

-->

</rfc>
