<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-jt-add-dns-server-redirection-02" category="std" consensus="true" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="EDSR">Handling Encrypted DNS Server Redirection</title>
    <seriesInfo name="Internet-Draft" value="draft-jt-add-dns-server-redirection-02"/>
    <author initials="J." surname="Todd" fullname="J. Todd">
      <organization>Quad9</organization>
      <address>
        <email>jtodd@quad9.net</email>
      </address>
    </author>
    <author initials="T." surname="Jensen" fullname="T. Jensen">
      <organization>Microsoft</organization>
      <address>
        <email>tojens@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Mosher" fullname="C. Mosher">
      <organization>Innate, Inc.</organization>
      <address>
        <email>cmosher@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="October" day="22"/>
    <area>Internet</area>
    <workgroup>ADD</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 44?>

<t>This document defines Encrypted DNS Server Redirection (EDSR),
a mechanism for encrypted DNS servers to redirect clients to
other encrypted DNS servers. This enables dynamic routing
to geo-located or otherwise more desirable encrypted DNS servers
without modifying DNS client endpoint configurations or the use 
of anycast by the DNS server.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://example.com/LATEST"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-jt-add-dns-server-redirection/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:add@ietf.org"/>),
        which is archived at <eref target="https://example.com/WG"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/add/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/johnhtodd/draft-DOH-redirect"/>.</t>
    </note>
  </front>
  <middle>
    <?line 53?>

<section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Encrypted DNS Server Redirection (EDSR) is a protocol that allows an encrypted
DNS resolver whose configuration is well known to clients to redirect them to other,
more desirable resolvers without having to support anycast and without having to
configure clients with these other resolvers ahead of time. It uses the mechanism
defined by DDR <xref target="I-D.ietf-add-ddr"/> to redirect an encrypted DNS client from one encrypted DNS
resolver to another encrypted DNS resolver. Where DDR uses a threat model that
presumes the initial DNS traffic is unencrypted, EDSR applies when the initial
DNS traffic is already encrypted.</t>
      <t>One example of what makes redirection to another resolver
desirable is geolocation. A DNS service may document one or a few well known resolver 
configurations even though it routes traffic to hundreds or thousands of resolvers
that are closer to the client, reducing latency and making DNS resolutions more
applicable to the client.</t>
      <t>This document describes two modes of redirection - Strict Origin Redirection and Overlapping
Origin Redirection. The latter enables additional use cases such as transitions between
organizations, but may have security trade-offs explored later.</t>
    </section>
    <section anchor="dns-client-behavior">
      <name>DNS client behavior</name>
      <section anchor="discovering-redirections">
        <name>Discovering redirections</name>
        <t>When a DNS client first opens a connection to an encrypted DNS server, it <bcp14>MUST</bcp14>
send a SVCB query for the name of the resolver to discover its encrypted DNS configuration.
The DNS client <bcp14>SHOULD</bcp14> open a connection to the server returned in the SVCB query using the
TargetName and one of the IP addresses returned in additional A/AAAA records for the same
name. Once a connection has been successfully opened, as subsequently described by reaching
a suitable server at the end of the redirection chain, the client <bcp14>SHOULD</bcp14> close the first
connection. There are two methods defined to determine whether the redirection was suitable.</t>
        <section anchor="strict-origin-redirection">
          <name>Strict Origin Redirection</name>
          <t>The default method of redirection EDSR-compliant clients and servers <bcp14>MUST</bcp14> support is
Strict Origin Redirection. Using this method, if the returned SVCB record indicates a
server with a different domain name than the current encrypted DNS connection, the 
redirection <bcp14>MUST NOT</bcp14> be followed by the client. Clients <bcp14>MAY</bcp14> choose to treat this as an
upstream attack, though consideration should be taken in case the server is using 
Overlapping Origin Redirection as defined in the next section.</t>
          <t>The destination server <bcp14>MAY</bcp14> use delegated credentials (TODO: ref here). This is valid
so long as the delegated credential is valid for the same domain name used by the
referring server. This is an encouraged practice for servers which need to redirect
clients to servers owned by other entities, as is the case with CDN contracts, when
the clients and server do not have a pre-existing relationship that would justify
other custom behavior such as use of the optional Overlapping Origin Redirection
mechanism described in the next subsection.</t>
        </section>
        <section anchor="overlapping-origin-redirection">
          <name>Overlapping Origin Redirection</name>
          <t>An alternative method of redirection EDSR-compliant clients and servers <bcp14>MAY</bcp14> choose to
support is Overlapping Origin Redirection. Using this method, the domain name associated
with a redirection can change so long as each redirection hop is authoritative for both
the new name and the previous name. Normative language in this section applies only to
Overlapping Origin Redirection, meaning it only applies if the client chooses to implement
this optional mode of EDSR operation.</t>
          <t>Overlapping Origin Redirection can facilitate changes in ultimate resolution endpoints for
those unable to implement Delegated Credentials, so as to retain configuration agility while
still retaining encryption security. The intended use cases are to support temporary
configuration during transition or migration periods when immediate reconfiguration of all
client endpoints is not feasible, or to retain long term support of statically configured
endpoints such as through an organizational acquisition. Organizations should evaluate their
specific needs and capabilities carefully when choosing to implement/enable Overlapping Origin.</t>
          <t>The client checks the server's SVCB response for the presence of SVCB keys "edsr-domain"
or "edsr-apex-domain" defined by this document. The presence of the
"edsr-domain" key indicates that the redirection is going to a server with a different
domain name than the current server. For DoT and DoQ redirection, this is sufficient. For DoH,
the "dohpath" <bcp14>MUST</bcp14> also be present as it is not guaranteed that simple swapping
the domain name into the current server's DoH template will work.</t>
          <t>The presence of the "edsr-apex-domain" key indicates that the domain name of the redirection
destination is not specifically known but will be a child of a given domain name. If both
"edsr-domain" and "edsr-apex-domain" are present, clients supporting Overlapping Origin
Redirection <bcp14>MUST</bcp14> prefer the "edsr-domain" value and validate the redirection accordingly.
If only "edsr-apex-domain" is present between these two, but there is also a "dohpath"
value, the client can use the DoH template with whatever child domain is discovered upon
redirection assuming it passes the validation described later in this section.</t>
          <t>Let's say a client is configured to use a DoH server with template
"https://first.doh.server.example/doh-query". In this example, Overlapping Origin Redirection
would enable a redirection to a server with domain name "second.doh.server.example":</t>
          <ol spacing="normal" type="1"><li>
              <t>Client establishes a DoH connection to first.doh.server.example</t>
            </li>
            <li>
              <t>Client sends a SVCB query for "first.doh.server.example"</t>
            </li>
            <li>
              <t>Server replies with "edsr-domain" = "second.doh.server.example" with accompanying DoH template and additional A/AAAA records</t>
            </li>
            <li>
              <t>Client initiates a TLS handshake with the second.doh.server.example server</t>
            </li>
            <li>
              <t>Server sends a certificate that claims both domain names in its SAN field</t>
            </li>
            <li>
              <t>Client accepts the redirection and considers the new server to be identified as "second.doh.server.example"</t>
            </li>
            <li>
              <t>Client sends a SVCB query for "second.doh.server.example"</t>
            </li>
            <li>
              <t>Server replies with no "edsr-domain" value with accompanying DoH template and additional A/AAAA records</t>
            </li>
            <li>
              <t>Client initiates a TLS handshake with the second.doh.server.example server (on a different IP address)</t>
            </li>
            <li>
              <t>Server sends a certificate that claims only "second.doh.server.example" in its SAN field</t>
            </li>
            <li>
              <t>Client accepts the redirection because this exactly matches the domain name of the previous resolver</t>
            </li>
          </ol>
          <t>Clients <bcp14>MUST</bcp14> reject redirections using this method if the redirection points to a server with
a different domain name than the current server and the destination server presents a
certificate that cannot claim both the domain name of the server that offered the redirection and the
name the redirecting server indicated in its SVCB response.</t>
          <t>Clients implementing only Strict Origin Redirection will safely avoid accidentally validating
Overlapping Origin Redirection SVCB responses by the nature of ignoring SVCB keys it does not support
per guidance in (TODO: SVCB doc ref). The first redirection will still work as expected (because
Overlapping Domain Redirection requires the first hop to be valid for the original domain name) but
will not change the domain name treated as the server's identity. Additional redirections that try to
use the edsr-domain value that the client ignored will fail Strict Origin Redirection at that point.</t>
          <section anchor="example-use-cases">
            <name>Example Use Cases</name>
            <t>Mergers or acquisitions between organizations may require immediate transition of DNS services
to the acquiring company, but reconfiguring all client devices may not be feasible in a given
timeframe. Overlapping Origin Redirection allows the acquired company's DNS servers to redirect
clients to the acquirer's servers while clients gradually update their configurations,
preventing service interruptions during the transition period.</t>
            <t>Home devices or those managed under bring-your-own-device corporate policies may not be
easily updatable by IT groups. Overlapping Origin Redirection allows legacy client
configurations on these devices to be maintained through organizational transitions
with the EDSR server redirecting traffic without needing to modify individual devices.</t>
            <t>Smaller organizations or DNS/CDN service providers may lack the expertise or resources
to implement Delegated Credentials for secure redirection between organizations. Overlapping
Origin Redirection gives these organizations a simpler mechanism to redirect traffic to partners
when immediate reconfiguration of the client base is infeasible.</t>
          </section>
        </section>
        <section anchor="redirection-away-from-ddr-discovered-servers">
          <name>Redirection away from DDR-discovered servers</name>
          <t>Both Strict Origin Redirection and Overlapping Origin Redirection assume that the original server
is identified by domain name from the client's perspective. Examples include when the client was configured
with the resolver through endpoint management or DNR discovery (TODO: ref). However, when server was discovered using
DDR (TODO: ref), this is not the case. Due to the threat model DDR operates under, where it has to
start from an unencrypted resolver, the identity of the server used for verification is its IP address.
The risks involved with using the domain name of a DDR-discovered resolver are further explored in the
Security Considerations section (TODO: self ref).</t>
          <t>When clients use Strict Origin redirection discovery with a DDR discovered resolver, the only difference
is that the destination server it was redirected to <bcp14>MUST</bcp14> be able to claim the IP address of the previous
server in its SAN field. This is the equivalent of not changing origins in the DDR threat model.</t>
          <t>Clients <bcp14>MUST NOT</bcp14> use Overlapping Origin Redirection with resolvers discovered using DDR, even if
they otherwise support Overlapping Origin Redirection.</t>
        </section>
      </section>
      <section anchor="scope-of-overlapping-origin-redirection">
        <name>Scope of Overlapping Origin Redirection</name>
        <t>Clients <bcp14>SHOULD NOT</bcp14> use Overlapping Origin Redirection unless they have a policy configuration
that indicates this is acceptable behavior. Such a client, if it is human-facing, <bcp14>MUST</bcp14> have
an indication that the DNS server in use has a different identity than the one that was
originally configured.</t>
      </section>
      <section anchor="identifying-self-redirections">
        <name>Identifying self-redirections</name>
        <t>If the set of IP addresses that are valid for the server being redirected to include
the IP address of the current server, the client <bcp14>SHOULD</bcp14> ignore the redirection, treating
it the same as receiving no response or a NODATA response from the SVCB query.
However, clients receiving preferable encryption parameters as part of the SVCB response
<bcp14>MAY</bcp14> choose to reconnect to negotiate to upgrade to the preferred encryption method. When
doing so, there is no need for the client to repeat EDSR as the redirection from the
server to itself has terminated the redirection chain.</t>
      </section>
      <section anchor="waiting-for-redirections">
        <name>Waiting for redirections</name>
        <t>The client does not need to wait for the results of the redirection discovery
query before sending other DNS queries on the connection, though they <bcp14>SHOULD</bcp14>
gracefully close the connection as soon as it has successfully established a
connection to the server it was redirected to and received or timed out the
outstanding queries on the original connection.</t>
        <t>See the considerations section for reasons a client <bcp14>MAY</bcp14> choose to decline a
redirection.</t>
      </section>
      <section anchor="refreshing-redirections">
        <name>Refreshing redirections</name>
        <t>EDSR allows a client to be redirected from an encrypted DNS resolver it was somehow
configured to use. When the redirection TTL expires, the client <bcp14>SHOULD</bcp14> return to
using its originally configured server unless it can refresh the redirection beforehand.
This allows the client to honor the intention of whatever configuration method was
used to instruct it to use the original encrypted DNS resolver.</t>
        <t>If a chain of redirections was followed, the effective TTL of the redirection is the
minimum of the TTLs encountered along the chain. Clients <bcp14>SHOULD</bcp14> however cap this value
to some minimum value at their discretion to avoid frequent redirection checking when
latency plus an incidentally low TTL along the chain results in near-zero effective TTLs.</t>
      </section>
      <section anchor="multiple-redirections">
        <name>Multiple redirections</name>
        <t>When clients receive more than one valid SVCB response, they <bcp14>SHOULD</bcp14> prefer using
the redirections that match their configuration (such as supported IP address family or
desired encrypted DNS protocol) in ascending order of the SVCB priority. Once a successful
connection is made to a redirected destination, clients <bcp14>MAY</bcp14> choose to discard other results
in favor of restarting EDSR with the originally configured resolver.</t>
        <t>Redirections are considered to be a one-to-one relationship (starting with one recursive
resolver and following its redirections should result in one replacement recursive resolver).
It is not expected that a stub resolver ends up using more recursive resolvers than it
was originally configured with when using EDSR.</t>
      </section>
      <section anchor="network-changes">
        <name>Network changes</name>
        <t>When a client device changes what network it is connected to, it <bcp14>SHOULD</bcp14> forget
pre-existing redirections and start EDSR over with the originally configured
resolvers. This ensures that a resolver which redirects clients based on their
source network can behave accordingly.</t>
        <t>Note that this is unrelated to what resolvers a client is originally configured with. 
For example, a client which is configured to always used the resolvers advertised by 
DHCP will likely start with different original resolvers when changing networks. How a 
client is configured with DNS resolvers is out of scope for this document. EDSR only 
provides a mechanism for clients to discover redirections from resolvers they were 
previously configured to use.</t>
      </section>
    </section>
    <section anchor="dns-server-behavior">
      <name>DNS server behavior</name>
      <t>DNS resolvers who want to redirect clients to other resolvers <bcp14>MUST</bcp14> respond to
SVCB <xref target="I-D.ietf-add-svcb-dns"/> queries for their own domain names with records that
describe the configuration of the destination server.</t>
      <t>Guidance in <xref section="5" sectionFormat="of" target="I-D.ietf-dnsop-svcb-https"/> to improve performance by
including additional A/AAAA records with the SVCB response <bcp14>SHOULD</bcp14> be followed.</t>
      <section anchor="ensuring-compatibility">
        <name>Ensuring compatibility</name>
        <t>Redirections <bcp14>MUST</bcp14> only redirect to resolvers which support at least the same
protocol, address family, port, and TLS minimum versions as the referring resolver.
This ensures that redirections do not lead clients to resolvers that are not compatible
with the client. In addition, servers <bcp14>SHOULD</bcp14> avoid redirecting to servers which will also
redirect clients unless they are actively coordinating to ensure a positive
client experience. See the Deployment Considerations section for more details.</t>
        <t>Servers <bcp14>SHOULD</bcp14> be prepared for clients to reject Overlapping Origin redirections
which is an optional redirection mode (whereas support for Strict Origin Redirection is
<bcp14>REQUIRED</bcp14>).</t>
      </section>
      <section anchor="dealing-with-persistent-clients">
        <name>Dealing with persistent clients</name>
        <t>Servers <bcp14>SHOULD</bcp14> be prepared for clients to not follow the redirection immediately
as connection failures, other technical issues, or even client policy affecting server
choice may lead to clients being unable to follow the redirection promptly or at all.
Servers who are redirecting due to being overloaded <bcp14>MAY</bcp14> respond as they normally would
to overwhelming traffic.</t>
      </section>
      <section anchor="strict-versus-overlapping-domain-redirection">
        <name>Strict versus Overlapping Domain Redirection</name>
        <t>Servers <bcp14>SHOULD</bcp14> only offer Overlapping Domain Redirection when they reasonably expect
clients will have been configured to use it, implying an out-of-band relationship
between the server operator and the client operator.</t>
        <t>Server operators ought to consider using delegated credentials (TODO: ref) when they
wish to redirect general clients to other servers operated by other entities. This
allows the server operator to avoid giving access to their domain's private key to
third parties but also ensure general clients have a secured, same-origin redirection
experience.</t>
        <t>Overlapping Domain Redirection is only defined for the limited scenarios where
the server and client administrators are either the same or have an out-of-band
relationship and redirection is needed to server operators who do not support
TLS delegated credentials (TODO: ref).</t>
      </section>
    </section>
    <section anchor="deployment-considerations">
      <name>Deployment Considerations</name>
      <section anchor="large-trees-of-redirections">
        <name>Large trees of redirections</name>
        <t>It is possible for DNS servers to redirect clients to DNS servers which also
redirect clients. Clients which are presented with long chains of redirections
<bcp14>MAY</bcp14> choose to stop following redirections to reduce connection thrashing. DNS
server operators <bcp14>SHOULD</bcp14> deploy redirection behavior mindfully to avoid long
chains of redirection.</t>
        <t>Servers <bcp14>SHOULD</bcp14> ensure their redirections do not create loops, where clients
are redirected to a server it already encountered earlier in the process.
Clients <bcp14>MAY</bcp14> stop following redirections when they detect this, but may also
take a simpler approach, following only a maximum number of redirections.</t>
      </section>
      <section anchor="redirection-ttls">
        <name>Redirection TTLs</name>
        <t>Servers <bcp14>SHOULD</bcp14> provide sufficiently long TTLs for clients to avoid the need to
constantly repeat EDSR queries. Server operators should be mindful of redirection
chains because unless they collaboratively control the TTLs of one another's
redirections, redirection chains will end up with greatly reduced effective TTLs
because the client will always use the lowest.</t>
      </section>
      <section anchor="including-ip-addresses-in-edsr-responses">
        <name>Including IP addresses in EDSR responses</name>
        <t>If a recursive resolver does not include additional A/AAAA records per
<xref section="5" sectionFormat="of" target="I-D.ietf-dnsop-svcb-https"/>, stub resolvers might end up failing
the redirection if the redirection destination name cannot be resolved. Additionally,
the recursive resolver <bcp14>SHOULD</bcp14> ensure records conntaining the same IP version as the
existing connection are returned (if the stub is currently connected over IPv4, one or
more A records <bcp14>SHOULD</bcp14> be included, and if the stub is currently connected over IPv6,
one or more AAAA records <bcp14>SHOULD</bcp14> be included).</t>
      </section>
      <section anchor="delegated-credentials-vs-overlapping-origin-redirection">
        <name>Delegated Credentials vs Overlapping Origin Redirection</name>
        <t>Delegated Credentials with SOR should be used preferentially where feasible to reduce risks.
Use of OOR should be time-bound to the period where Delegated Credentials are not feasible,
if possible.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="trusting-the-redirected-connection">
        <name>Trusting the redirected connection</name>
        <t>EDSR does not provide novel authentication or security mechanisms. Redirection
is trusted by virtue of the server authentication via PKI through TLS <xref target="RFC5280"/>.
The DNS stub resolver implementing EDSR <bcp14>SHOULD</bcp14> use whatever policies it uses for
other TLS connections for encrypted DNS traffic to determine if a given TLS cert
chain is trustworthy before proceeding with EDSR.</t>
        <t>EDSR <bcp14>MUST NOT</bcp14> be used with encrypted DNS protocols that are not based on TLS.
This scenario will require future standards work.</t>
        <t>EDSR should not introduce any additional security considerations beyond use of
the original encrypted resolver prior to redirection. Because the original
connection was trusted, information sent over it about a new connection to use
should be as trusted. However, clients that wish to time bound vulnerabilities
to attackers who compromise the original resolver <bcp14>MAY</bcp14> choose to implement a
maximum TTL to honor on SVCB records that redirect to other servers.</t>
      </section>
      <section anchor="use-with-unencrypted-dns">
        <name>Use with unencrypted DNS</name>
        <t>EDSR <bcp14>MUST NOT</bcp14> be used to redirect unencrypted DNS traffic to any other resolver.
This use case is called designation and is covered by Discovery of Designated
Resolvers (DDR) as defined in <xref target="I-D.ietf-add-ddr"/>. Not following DDR opens up a DNS client
to malicious redirection to an attacker-controlled DNS server. For more information,
see <xref section="7" sectionFormat="of" target="I-D.ietf-add-ddr"/>.</t>
        <t>EDSR also <bcp14>MUST NOT</bcp14> be used to redirect encrypted DNS traffic to a resolver that
advertises support for unencrypted DNS. This would reduce the security posture of
the client. Clients <bcp14>MUST NOT</bcp14> follow an encrypted DNS redirection and then send
unencrypted DNS traffic to the new resolver.</t>
      </section>
      <section anchor="use-with-ddr-discovered-resolvers">
        <name>Use with DDR-discovered resolvers</name>
        <t>When a resolver is discovered using DDR (todo: ref), the server's identity used for
TLS purposes is its IP address, not its domain name. This means servers and clients
<bcp14>MUST</bcp14> use the original server's IP address, not the IP address of the previous server
in the event of redirection chains, in the SAN field of destination servers to
validate the redirection.</t>
        <t>The reason for this is due to an attack where the DDR SVCB query response is modified
by an active attacker to have a different domain name in its "dohpath" SVCB key. When
the client uses it to issue the EDSR query to the (valid) DDR-designated resolver, it
will innocently forward the query upstream and return the result. The result may even
be DNSSEC signed since it was issued by the valid owner of the attacker's domain name.
If this redirection is then followed and validated with the attacker's domain name, 
it will succeed and the client will have been maliciously redirected to use an attacker's
server at the low cost of a port 53 attack without breaking encryption or compromising
the encrypted DNS server DDR designated.</t>
        <t>There is no harm in using the name of the server for the EDSR query so long as the
validation of the destination server is performed using the original IP address and
not the name. This ensures EDSR clients can consistently use the domain name of a 
server for redirection discovery. Use of the DDR-defined SUDN "resolver.arpa" was
considered and rejected because this would conflate DDR configuration and EDSR
configuration by placing them in the same zone, using the same DNS record type.</t>
      </section>
      <section anchor="delegated-credentials">
        <name>Delegated Credentials</name>
        <t>Delegated Credentials are a more secure transition mechanism for redirection than Overlapping
Origin Redirection, and may be further secured by additional practices such as using a trimmed
certificate authority (CA) database.</t>
      </section>
      <section anchor="overlapping-origin-redirection-1">
        <name>Overlapping Origin Redirection</name>
        <t>Overlapping Origin Redirection provides an alternative when Delegated Credentials are not
feasible, but has less protection against malicious redirections during domain transition.</t>
        <t>Clients concerned about these risks can disable or restrict Overlapping Origin Redirection
through local policy.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>A client <bcp14>MAY</bcp14> choose to not send other name queries until redirection is complete,
but there should be no issue with sending queries to intermediate resolvers before
redirection takes place. This is because the intermediate resolvers are considered
to be appropriate destinations by the client even if the resolver wants to substitute
another resolver for reasons other than name resolution results such as latency
optimization or load balancing.</t>
    </section>
    <section anchor="data-flow-considerations">
      <name>Data Flow Considerations</name>
      <section anchor="data-scope">
        <name>Data Scope</name>
        <t>EDSR does not result in any additional data being shared by the end user, as the
DNS queries going to the new resolver were already going to go to the original
resolver.</t>
      </section>
      <section anchor="data-visibility">
        <name>Data Visibility</name>
        <t>EDSR results in a 1:1 replacement of DNS resolvers used (future queries sent to
the new resolver will not be sent to the original resolver anymore). This means the
number of servers which see any given query remain the same.</t>
        <t>This is only true if clients only use one redirected DNS server per original DNS
server. If the DNS server offers more than one redirection, and the client validates
and uses two or more of those redirections, then there will be greater data
visibility (more destinations). This is however entirely within the client's choice
following their own policy as a redundancy versus volume of exhausted data trade-off.</t>
        <t>EDSR requires the redirection to another server to also use encrypted DNS, so no
third-party will be introduced to the data flow unless the encryption is broken.</t>
      </section>
      <section anchor="data-centralization">
        <name>Data centralization</name>
        <t>EDSR can only increase data centralization if multiple resolver operators choose to
redirect DNS clients to the same, other DNS resolver. To prevent the reduction of
their resolution redundancy, DNS clients <bcp14>MAY</bcp14> choose to ignore redirections if they
find that they point to resolvers they are already configured to use, by a previous
redirection or some other configuration.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>(TODO: request the addition of "edsr-domain" and "edsr-apex-domain"
to the SVCB DNS registry)</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-add-ddr">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Kinnear" initials="E." surname="Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Patrick McManus" initials="P." surname="McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="5" month="August" year="2022"/>
            <abstract>
              <t>   This document defines Discovery of Designated Resolvers (DDR), a
   mechanism for DNS clients to use DNS records to discover a resolver's
   encrypted DNS configuration.  An encrypted DNS resolver discovered in
   this manner is referred to as a "Designated Resolver".  This
   mechanism can be used to move from unencrypted DNS to encrypted DNS
   when only the IP address of a resolver is known.  This mechanism is
   designed to be limited to cases where unencrypted DNS resolvers and
   their designated resolvers are operated by the same entity or
   cooperating entities.  It can also be used to discover support for
   encrypted DNS protocols when the name of an encrypted DNS resolver is
   known.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-ddr-10"/>
        </reference>
        <reference anchor="I-D.ietf-add-svcb-dns">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <date day="26" month="June" year="2023"/>
            <abstract>
              <t>   The SVCB DNS resource record type expresses a bound collection of
   endpoint metadata, for use when establishing a connection to a named
   service.  DNS itself can be such a service, when the server is
   identified by a domain name.  This document provides the SVCB mapping
   for named DNS servers, allowing them to indicate support for
   encrypted transport protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-svcb-dns-09"/>
        </reference>
        <reference anchor="I-D.ietf-dnsop-svcb-https">
          <front>
            <title>Service binding and parameter specification via the DNS (DNS SVCB and HTTPS RRs)</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google</organization>
            </author>
            <author fullname="Mike Bishop" initials="M." surname="Bishop">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Erik Nygren" initials="E." surname="Nygren">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="11" month="March" year="2023"/>
            <abstract>
              <t>   This document specifies the "SVCB" and "HTTPS" DNS resource record
   (RR) types to facilitate the lookup of information needed to make
   connections to network services, such as for HTTP origins.  SVCB
   records allow a service to be provided from multiple alternative
   endpoints, each with associated parameters (such as transport
   protocol configuration), and are extensible to support future uses
   (such as keys for encrypting the TLS ClientHello).  They also enable
   aliasing of apex domains, which is not possible with CNAME.  The
   HTTPS RR is a variation of SVCB for use with HTTP [HTTP].  By
   providing more information to the client before it attempts to
   establish a connection, these records offer potential benefits to
   both performance and privacy.

   TO BE REMOVED: This document is being collaborated on in Github at:
   https://github.com/MikeBishop/dns-alt-svc
   (https://github.com/MikeBishop/dns-alt-svc).  The most recent working
   version of the document, open issues, etc. should all be available
   there.  The authors (gratefully) accept pull requests.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-svcb-https-12"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
      </references>
    </references>
    <?line 494?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank the following individuals for their invaluable feedback
to this document: Ben Schwartz, Eric Orth, Erik Nygren, Ralph Weber, Ted Hardie, Tommy
Pauly, Viktor Dukhovni, and Vittorio Bertola.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA61d63LcxpX+30+BZX5E2poZW46d2KxsElqUI2V1i0jZlUql
Uj1AzwwsDDBGA6TGLr/LPss+2Z7vnL5iQNKpbCopkSDQl3P9zqU7y+VS2UG3
1T9107XmvDgaq+pDf14M/WiHzz799KtPP1OlHsy264/nhR0qpXujz4sX7WD6
1gzqtus/bPtuPJwXF5eXSlVd2eo9DVX1ejMsvx+WuqqWVWuX1vQ3pl/2pqp7
Uw511y5pcDXUQ0Ovnz2nZTR1uy2etWV/PAymKi5fXxVX/FXxLn51pvR63Zsb
+ubZ5dW7M9XodntemFapD+ZI66ni8paXWIW6Me1ozlVRuJV+92f6eTgeaN7v
aP2Y9c/4Cz3d67o5L2jNf6rNsFl1/ZYe6r7cnRe7YTjY808+MR/1/tCYVdnt
P+GRtvWwG9fnxffdrt0NXVV9Ipu/fPM8bJdea4iOdpgf5+XF9bOra6XsXvfD
P38YO3r1vGg7dajPi78PXbkobNcPvdlY+um4xw//UEqPw67rsbMl/a8ohPR/
WRXXtAp+QhvQbf2jBuXOi7+OuvqKnxvZ6PdY7p9+wOMV2JkPdL0q/mJaS6Q9
HepVXfad7TZDOtzQfU/v/2nv/4a9TcZ8uipedXZn+pkxX7Qt0WhB/5ardNhy
z1/8aYtfecy26/f00Q1xVdXtJvlNLZfLQq/t0Guiurre1bYgoRz3ph2Kymzq
1tgHZax4BNF6vFC62JtyR0u0+4JmISlLPxSRtrTtwvO5KJuaZsIz1Q206PlP
iENYmGn1uqH1VEciTl0WJIQDSaOiAbemWzYddK8iKhU81m1tTbHvekMbsXWP
b+eHV7ckkjQWvVzVmyMEHH+VtdEn1aGr6Yeyazf1duyZ/BbT0CzFSJOoblPo
9lhqOxTrIz+Ow6+EyPu6qhqj1K+Kp11LKiaDkBoXlyBzzb+DA6YgxSygmbY4
e/X+6vpsIf8Wr9/wz++e/fX9i3fPLvHz1fOLly/DD8q9cfX8zfuXl/Gn+OXT
N69ePXt9KR/T0yJ7pM5eXfyN/oJVnb15e/3izeuLl2dF3dKWUsEgqwYurg39
iUzHoTegqLaKCF329Zp+oW++fvr2f//nyefFTz/9x7tvnn725MlXP//sfvny
ye8+p19ud6aV2bq2ObpfiXpHpQ8Ho3uMopumKPWhHnRDyqxtYXfdbVsQfw1R
9j//Dsr847z4/bo8PPn8D+4BNpw99DTLHjLNTp+cfCxEnHk0M02gZvZ8Qul8
vRd/y373dE8e/v6PZOtNsXzy5R//oCBCZLH7rhpZ+5T6hfpZEAt1ceg7MpBd
Q3TWA6jb3UIMo2YoDNIb2zUY5nbXkYBnoo9xbg2x5UMLTpAgRC2Omk1s3OMB
q+JCTfTQj08jOd3b6RsoHn1hx8OBrHfQKMjHyVvKL8mE2fEOpqX1ii2Jk+id
0SRkm2Ko92ZVvBigtpYVNVgsJeauggZfXr6DpL5YXq7g2MQrVz2JbLrFlGqp
xdj03Z4kemJtVKApjaHbOXPn31gV30G+eRm8UE1LJSTBFsoI6xRpnSV1lF2w
AdENj0K2fLMh80hsGtswwaKAEBSkWLRIy7qWfqkmX+qG5quOcYGkbG+wJXHD
oOUtBGivP9BoCUxJd+f3oyLjaWiy1Wyq6eVVcREsZV0SM/QxWhlQkIysLjbm
NhW4QEc1scjmhvfUjdtdUQ/sHkAetyla125sK1qqs93daEm0LLYSJEWJVrBU
keAzr0Al4ewCGx1LSCDgSVseWTiJBt5n8ECjLAcir5jeJW89G2p16mzFdNKC
bzvms1tZpOyyuBr6mgTvTV9vyTSmKo51vKEdNDQhfOLpK3CiBuseWO7ElZJg
s+ch0YEjI32jh3Ysd7C0RLnWimMiWz/cGoI2KQQhe7yG1ySmkV4a4mI59vVw
xIeVWXabDfHk46EhOlRMMPjCX6WasjZQ6K6nx/S8tmVHWwAtk22TU/wOwqoz
Fat7sgzdwcCHwjy1qfTNuvkFZALOQRFEI29VXH379Ovih9H0RwYr4A1AF5uJ
XTRRGLJyS6Mh7FTnUxlcsf9O1un8BBZ6sk5MIkujuYaxb8Vt4nGytNGywdsZ
da37rRleY4niMsNSX7wFI2nBlnUxjpWw9+KTC/oP/bVkZOF3bGk4hW2vijct
aWC2yJ0G42npJBEljb4ZG3LT2AzsCXzxuLaG1tkO9Dw6f7KgZD3KHQRR00vk
vKEAbrOanQNwVSR1FGSyxrWggAkNWSH5OTNfxXWyZJPKMiyB8hhSbtqjN+hg
ICGUfg8nSoaPbdN03lvejqwUYkoCeae2CUyj4fXYDG66qbLC2i4JfJP66zYC
XXDOA2FGKt7b1VbdOd+qeO+kgCyGTEfS7Gnn2M0yI+wl1lc1wDDNpxzV2Ttq
kuTNhmgFg9NRfNCKyJPVE8EjBe4F9E5k3JFaGKPSjXq8BTi46YAnRAISW1c8
dbsnrEMM7piRpADs0nhTGpRR48Hi2Z5EZNDlh4U35jS/rSvj4AcBwLGpMN1A
zqeFnMNupfoE18cUU4lNnDWbUUqc6rXm4wBLJursGG0pznCTywTYCAwmeWOz
5aijJJoA1RNMLR5dv7l8c07M2DBOfeziF/rvjW7qStmuaDpakBbnPTdIeDnT
1IxpNL8nNDGEuMqW0wUdYUaxhh0ZqC29fkCcB0+LUb0c3u5qMvitEVUJMXiC
6vyb5H5lTo9eBjIvRnB5LZthVrCwPb18Dc5xaEmvAHGoKBSpKtC2KHofxIsA
opql+ViD6PAEjTibXX0QzHrL7P9+pL9vji5sLOk3Al3enwQXBh45I9MdnCW8
XyRUDGGzaCbKBmyeFw+YiQfGUxcIYpBh4aD73zAXqfKoaDceWMCs8WCxS2RJ
W9uVNWRQOUOR2WTNdrndkhRG0YWFz17bdQeWOE6zkCXl7ULQ1sQkJQS8dfPR
vvCAWE38Gm0hLui1T00USFONJLIh+LReYx2A5YiR6HD/5he0Y2Im/a0e5BP/
vTOfzscIXVnWa+BbQDLF8waxASQD1xhGkw/0Hv8hEwPibXRZN6CIcXS02Bc5
j3qPZxE1hmwDe2haAbg9th4/hrUVl8FmPI2GB2kvNirQ4gHMzQM3vcUqEGjX
jVGkP4Sp5UWs3dl8sXKC5AQzIshvK5oqQkSXAfBCOJg9/av7Yw7Ji2pkmxSB
JJD3vt66PxMRazhqDkbq/Z6oJuTIR0F2pWnUJB/DFgdWY2O0rYlAC4b1Yess
pvD6YZU0joVUlhowJgSQlYpDBui769nz6DZLupEY6PKHsZbNEGRK0bB3TIbs
9oh9kHzVvbIHU9YIQGBgRaNLfdBrsAKCWBItBVgxGVgSXSQc2P2J4PUZTXcu
KoixKT/YxBP+2npcYA+0RBO8CaJHA8BHROE3PpijLc5ohf1SDMMZYX33QB/M
R/+0SMLkLCskspKOC8eUjciZrYhN2JpPcRgCxM7tXxd3gBd1L3jxLvAb2sBl
dy1Jtu6v6TQLWTvsyojoUGCKfPB8wbbqrOp2Bz3szgThkHpxxks2OLDHG7wI
kqkiER/Yg2JTljlX2FsXjU3NLclaN7Nk4hZNz9qEcIm2TQqKmoHj8oS4c9y5
g8Lp5KegW6UIx23Jiy3rigTeCPZ4SWuOE8iIsBvTxbZG5J3MsSpebMTq5/zn
xOLpomFNHF0XwfU5rWVRPxF79W6KQA8MgRKy+MGhjeJwGE85xcxkTpdAzTR6
c1wpWjk7ipl1Emk8+1087PJNFHVILDxwIML5E5jiKESKl5HFNXAMo8OtE7aT
tCO7YiD7QmdHXOibi0Vhj0mnMyxObnzcO2930NbnuNzG2SIHTMMB+dS9kqC9
NAPJoaWgXvuV0t+jtYRiYtmaF50qqN+AOvNFG47UVkSDldNJlz76hB4tOb49
I1FxS3B/WzwEqAT/OYuYA5UTm5HK/ZmFX6lmlnN2rtQTH6UUpAs0dG13nHjD
JvO4/a5Nqc/CEMgw2NMUw9ldn56p36x84rY3LkOH9eei/F/37cEZyRIgUrdS
xUilChpwZz5AfR7WLglBjh2L65dXBMppLzuKtEKCtbhzEY726ouwG0+J0pAq
b9gsiVUqG13vLRuJlEsMjJBlubp4TZQ2TaV+G5ZGmzOHwZ7qL3yqixFt4YGm
kwNXqGCMRAOiTnEfGdXvHuTiPR9/Oc/Gtps1Sv8Wx776/+RY8QhkTLIDMaX0
WD359BezUyznPUJ6wt0nTx5k79qUWgylWIkS2SYCzuXO2bcZ7xYCi5CDViEJ
AXfRm++Rwk/zjCHVFuKkmGOJi3FAcWpp1C9OrfgsmIuAZpILzscgeXNKZ93C
OzO5RXnuIICXfnzU8cKqWb0BSHMLTf4YEgkBTFSBdSmeXEWyBrCKj1kO7s5W
M4qwemMQkN10dQXes4oy3PD+Cnns+4OrbDHWp52InCgMESXqbdtxCBIxbg3+
GAdyBGMoCkQIw9GcAFc0hUvg8EeEb5HJeSz4VhLP/cleBg/VODL+SOAJJHvk
RDfbxqUwK91Gbyio6J00yxQIpsV05WmgjolA5iDh+WNgD8ULYeGQUH0qGJxu
E/uXBQhiGhHsXURjkymGwMie422PWBJz5qxZAJseNYD2phICbXTd3Fe+GORz
1i7Jq/yqeOZM1Hua8inCTqVemX7Liag+DcRCeSIL1ixXJhxpk/AyjUY3afnJ
KofKeWgWG2eaBdzFuBR/4sK07LQy/DnPBwYgE+qCUs7CC0BWKD5uesm1P5CW
lLJsXAtyg7IUxAjzzRRpwi75EixOMn1NTMBRGF6NrHDjoQoB66TPYYFC441T
a1+n47J/Px6EzD7K32W0leCeePm8Q+LSkUgqb2jM0C1nJMeWnHaxxgjLYzf2
S4o0lvI2raRHWoFWdugaBGkpiRUo7NfOWJC0/8W1dC3ZX0piZFHKoyPJtKDY
eXzvVy8KCZlHioEtquQJJkmCpHKmgg/mxFEo+ERD6wuUvsaNPIELgKUhhW3w
TQ1e+ZUQWa/2tAUaKhd5RLCvrz5B7tUz69B3N4KMQLxGlx9EgclIkXOxXGSF
lxx7pwIPZJlc7riEic3d9IwOrh6oSrJqWF+2z7aiXRjdJ11FWYdBLOwedD+0
3MnzYCYpMVBrpKqRBWi9trqMbiYnt0Q0ruhfXr5bJsGXbx5SX8ML/+LK7HwV
ApX8aECDjXdwurYpfl0fM7POa4u7Im0nviJ6Rx515Y0odlk2Y2Vi5d9RAYWv
JBcWxDXWP52Mh0YoUV2p0UPc3oWY9JiUPshhPu9uDVdeeU6PlnQewwJ0KXQ6
JJ/G9Ax03ZcVVsXlGMroWUMEPpeUrLFiUXhOmP2Bq5hImA8kJEItBN6xMyLs
VKJz7w4nQIqrLZB8VKgZkblkCTBRRMtSAe5r+wEUv8G40r0SC7lTtKankhUo
j7zIZuyl1uIL6VKLUFe+2P40LY7FPLmjpjXNRrjhyuje+MOP50Kb6nJkqEu9
gcIzSxSSMdrz8Lc0qk4zT6f4thah8/NJSoFRORJLLtUtCDevbk/BvQoYNQ8q
YvWLDR25QUIoLK6bCJAYpvLOra/vYJOpXK0mQQOqnKDbA+rMJIvNR1NhxzQL
aVapN0gNHpN+RZ+rfqCmww0TVyXJPPb0UAXKbyJ2rf2SbYxtA5rzAn1lDm74
mCMEaZlJc46u8MjRnDhmV5ajMJLz66GdhuIrSaLuRjIqS5RJ2u1CiI0plW79
yJx88UIVERDXUWgvUPI0BAtaHOIv9EtI/VBb5S1sVgcQqr4QS3sUvNNs0h5s
svYvvFVgaco6L0Lv0KRwKwtdm7SxRYTe2WQ1L+Z5xDjXEyEQexrXLQTqw67W
Q6wds8qVpuYOuraLNQFusnr95vLi+iIpFHi3ErMfKxUMurcicUDJv6ZNtgwC
NfDuwD14lt2031wWuam8MYDddss+viM4tO0GAe4dgT2A1uAEZFJoVjKnxO7c
Q9eqimsJtlvE1GzbSa3b88eRlOc9QPelUe40D+FJomJmicwODCy7GG4wYbA0
29Mi0vWdrhn0bbq+yAUrKeOE+NTX5G/pq7Be9P01g51rnglmW0m6am02kA9k
bdjcsSeB8uDPUkUVEmQNHuztWe1FzBTRvHQ1qtiFkyRF0TrTyb/O32YNQzGh
WiGlcVcT1KxbAHoSIZPObsRQ9IOk2hX9yycysLnJlgKGSvqECDSbsPg5pylc
0Vbgp+NGLpuVKbkZV6eJd+HtO4rujN2d9q+JQLlW20Te1ibdrYcm8z2hnjyW
oqldd6tOEvIi8CcicX39EtgB2YU5CyLtQxLYS+HAFrPGMeAg8Qq11C962fJM
yg6Ch0TkSvock4g27n/XtU6mucTsIXosfWTg3eXkYL4ZjLH9tEM/kp2oB1+W
yHh/R3stW3EtajlpxLBMZN/HJBQz5FQYTTMxZ9ROgIYi9a/3496/QS9b6b1B
tAzZl5L0zjiDUEz88k6sK8rD4kU5r4KIDEwv/PCuoDW4cB06T1z05Q/Opm16
6cqbWCFTcqMqd+L4BtZDM3KTELmimICjzfNeJysOpgfo1eh++aPpu5w8VlTh
FXobDo2ZKEKGQJ1ayxENdtNw0eI7M++wSI2RL/RJ3DDhhPPBnBuey2YUj3yB
3+Es4kridzd6j4xC5xqWo1txAuR75x9zVseW3qz2SGGkfu3Q1530T7imymgP
U/uHRLPzZjq1BAlmjq52YoaI67qvYqc7+KJqtJrcdL3raUbEw4fEYH9CYDev
3olyvEsJyr3QzlqK0nH1l1i1HLolOJZ1aD0Kk/J88ncCMpY4HTvgYdVFx7zN
yZjoGilkV6C1DHNoyA3tRazdkGHZFN+8COX4kH8VRFbYYVxHQ8oljPHgwDhL
3+l4ViSyHhTswTzJXJ3WtG4okFnE/7UZOBfsmn1CB3OWLwytQNxI37pPal9u
bb0P5MZlJ/xkVbeGe//TDrmUXWgY40hX+pRicfYuzgeuxGNWduwDnE2PgtRJ
w5cNgok0SuXcLvpdOJEU9gMvwfjf5GV29bobQspDIoaxZVFykAd/SU5wJLXo
u7mxKhR6OEIlOXwlaz+pY+vmVh+txPZpzgON8TeSHeN8i7p8/vStJLKb+gOq
FkJjqTGHoCP4neR4i/T0uHjTEcVyaoRWp+KmpnKVOiymDjAPOpg46BMsmHXf
CL8RiSuX8QPV8gN5SYY4tLRn4sMYJNUBHEUDblY+5s6J7qCHb+sPoY5v6893
cbsDlPVY++QI4MmxHVepgxfAVIpt6/Rcjr0p1zgy+/PPAQI6pEzWH20rWXXZ
xebSBM/naHxHhMeFp+nC0xQGyZn6c1Iv+umnK2fSv8BHcYG0ru4gS+SeCDlB
VO/BIYNEHR/GxCjro5JokGsLd/btB13O27qceUhasMUQPYMuh0LGUHPX2XFi
4pnMLDkxt9plbIPyhGNZQ9EYnMvygaXybnExcaSLAh/IAT/UpQOAoUHFWPkY
yzcvRyd0aokyOXUNww2OdWWnzxLrLbE453vc5hsT05u+Nf1FPCWxCHUSR04B
U1muvktrKUQVtglo9lEnAp3mT7ASzSCJ9YfNoPYjyjY5vYKiATlK3+qIFH2N
lBoK8K5TiNxgd2QveEfmD9LvjtsNum64VpDvS9rYKBp3UXBGQa6Lz6SGMiQX
7ClQm++QTcEmd8s+4hxsRFs82d2Z8toqf07zsYjvpdFNwBJIa5PLM7E9+l/Z
GHeKsm6cwndfL2iOSts0sEXVcuTISUzTQNa0RU8crdWO/LyXTJ7jmEuQaYHE
oYquCLj5820ss8mhSckLxR7fOxZJSrY/DIxOCzm4uQq7h13VfV6+r0Z3RpcR
KtjZafTwAkZ6k6qddPL5cO5ABe5CwIEPiHnNPilQuaSjsA/zjnnr+Wld+4Q/
bGS4G+GBL0OV4ujicaLO0eG6UOdk3WNkwYeUTlvUaqQYCQlwLg+SOg7LbrNc
S1IholaVdPN5HyblhC42ajgO++dBq8ITuOjtjm2nB8wOGD50SuRx3C4ZKITT
iX/cmpbGb079ZDiUIYWPmXMZAuhUEntPNxcixq1k8TSHKS4xg+CSOYOaUl/f
IAeH/lLyxIQ9KPhAPg/+FsVxbnh0lmy6ZJc9lpohBdXwGsvuxKyoxN6ph1om
atds5NuRfXasqfc1iIHoTFMYZqUQpJLdc7uYazmq4JRw/QEzEEpk6sGfD+O0
KY0r68/kR2VRjwhUtjik7kQS7VRMoK7OgfkGFLjHB6VEYNZd9p+18yXOCCL9
e3J6FKlrBprkZKQzYSO14gfuZcheEbM/6+5iNsO9FHt6PaTlZAInEk4Xl0e3
dugOSYCYR/i8zLHMMpDDrteceVvxUesTkjv7UzHxJpkqd2SIBKGSfGVQCixY
zS741Kc60Re1mcMqJbff0JjdwfrqpPdjqfF2kUmSFU3OYodcktE9fdv7yhV5
h5Krj+lJu/uoGO0rjkaWEoTF87zMYhyvS6rwpIt9p8vdIhlTjtTQJx8Z2bXj
fm36KXN9djRLSp46bxe1JB35nImiWTiTNvHnwiHu9pIkORIrSAYPjGNjIt8F
BaGFMQpFPEjoeD9ZuGe97z9MAR3B3Uav0ZziMR2uZGhi4q/bcNbCHYX/tU3T
xXZxWh5w7gynYseD6MsWEiOonMS9miTaVGyLjLV8QaM+qBWDSNGAHVxtK0QY
WeGqlvNnsZHOJUhP0yKxNOHbCe4OVYjO6l8IjBZ5msbinNBu8AQBEptJ+M11
aKbhGtfYXc/kOmyjSlvdKE5xo55sNldtvy+YHX9mKngJoqcLaxyqUiE/kxZK
+uTA7iO3dt42MgBS7hNhctkfjtBfvL35fOGuQ5CLNCKRI/B1DKkk3voXxv7t
QrmrFmTslIenwwdkPtcZdPPQYUSl5j9keb968y7RSU7KSLJX3pITUn3SWxdd
ATdcrNR7Oe75JhsIJaPlmixnFcqG3JrmRptfkA8dw+EyRRT1rpMd8R0NGEyd
a1wI5uUjMexRFFxRKKiTN34tcaXhI5RYiat7+34rzBYSOmTRUsKiBoFZBQfe
1P0wTnuBJ6Pe1Lp4+98vQn8PMMhPP/3x3TdPv/jsy09//jleZpDnT7NGX96F
kxJYnFC7CR17tbtsBecZBZ5iokgJO3NVVNLaFU/u1/GoEY9gCDdJWcLv/Zag
1C5UPdknSisdi5dLz/KK00PrLGj8xny2f5JMCOlOWoTLU3isKfbXd5xuRu5C
5gKl5twNTnIVbgVOPsWUym0+8BbH1KAGpk/KlWtzRPgmh5vVHRWvwC8uRqTo
Dvil+DrxHv7rtDZxq4NALYpwaRhnwBAFeWiyRlpS83mLvLCLrueog3GwpCss
eHPuynBxD7S1EG29GRvEEf6kJOJSuRjAx7zI61BYXE/LfmHrOaqMfY1aecSC
KleoRMaG8pgfzHJiWeAlhvC9P+6edpQBg94haCnKnnySij0kIU+HOlnzZ3DZ
qqMDlMtF9dY5PLb98FHScIS7jEIrF7qd3aumUu+Co310efnu8eQqhNnbj3BA
e0jQn2u7a7mckt7PAlbtNQyAHMGY3A4U2Lh0sKnJbmqRg5jsjBLBWxCqN0mm
9Xc5oIiLDPV2291P/ruJHyWIU8ShGJBnsibsc+WTW1e7YoUW6+u0mNyHO5eQ
3IOQXI7h1+oyQDOtACdHN1gdK3WPIA3uNFRS30ul9o7Ww1iyimZ/vpOteDR0
VRfbNmcOFoTeSQ5zD2N/4LP2J72TC7GGg82Pkl7LgRzdxj72GMFT5AiynVT+
wyKmw9/fURg6biWs4sb36VUNAtcX4a4e33WI905LBdx7etfJU3euV1JcsagD
Ukv6LuiKAyu+SzE5khZqAKAS+sVrUu71kT+VaMFrGxs6ScXMn1VyfZTx5LM/
NeOaqZJIg126dF1wKpRXFuKto5e8R7zzxyJmwfYEoVpwgRVOsyaIXgpCJTLc
orSN790dSOFeGM6zSMdK6ISSgzmuWIzgFVyj6AiacPXsaYFZkRCquVgjXTS8
5nBNjfQc4HKTUMb3NPt1LozS/lfnNk3aP9p4+0162LiKJZv5MRcFuvTkFBG6
BNz306gu5jmDYU0KNsmx3DaZxydCXNskrErZ2UG6jtmOffGbIGDu+MGaKP1h
ch8EQm/va30UNnfHlrQJBz6LeIeuu53u99Kv6aHxzIE1n8dLZCm/Lkclp5nv
LNBxokuqa8FYZfYhMQHI5nnLkFgcX3zihXiowjehAIxxHaI5BsNz0tOtkv3M
tuitivfxchrRD/G+V+8vXxdnwV7r/qDPuOspacMQRfheOJ+djxT3g1w4nyEF
QyaXgNCn2NPkqo41WoG4/xYL2nvrxsHtjxQfLhIq8kPxSHzdFC4HvicsvCvo
46KY+Hl3nCQ5PpQXrjMIgcaM+0+VLNy9fEeuiLoOepd+xk4TjO1vRLLJnUGc
CafFcGEoO4Pp77Y5Fo+eXjwu+OSRtm7zD4W+D/Rbx6p9fmEQp+rujVJVvAJl
PUoDJmeqEMF4vLCF0xrmUVk4wuWkOLIh6YAncSkNJy4E9A98ZEdOOkAtSLC5
hCWniVyR736K+MgT10E2rnbGsfVbVBvK09D6Yr4nkzPpfJ8cM5qV0PcCjESq
Zmqu+aIlCiwXKl7aEIOV1vs0tty+edYPyG2HiEnDGSOPoyXuzC5kGPh6TG5c
iocS0sTdHUPlXVfKdV0hAUvRHF5NTJ7Nb1vzJwuyhhZuu5CrvMY1fTmMA5rr
8wgja391BU/oGtMzuaPIdwF6hXGthAqF4L07vgUxQMWRwuVGtzArUr0ghSm+
gR+ayZrwH/lQwzQ7EjvBJhEyFNDVOO1O99GlG4mP+4X3GmnXc7hgZgqOpdfF
59vDa9vOvxwi5XhVa1z6t+QcfYOFz6f6dkldPDl/kvWwubOnkeeMkh+5rIFf
qpVWWXW6Un/ad238S3cEwUQy2NjHGZIGSWK2Pq/vIM4CnSXX4lGmWAZn/f31
pb4KR8E9J2i8n+SHnJ9oswRYAhUOfHbRLTYWbfjqmCE/48EVYztpFO2n5j5R
AQ++rNIiB3Krqo8q2enCduQ5+cHVRHoTrrnhFDzS3sRfdRP4Wzzy9xkHJUwu
+fN9vLDSPYoDsCN1euiOEKB0BKgYTMeGJd9EYKUrdGzRZ3T0JfcbUkMBGebj
TkvGj9Ug3Lq6CuKXnCo/CcLTXIb0wllBkBmw4yvFWlfwXaLgewzECXmrkFjl
dWyg3rFWkuJIGL+++2BcwzxrDVB/T/wSu+GWXjKTGxx9Rd3MuqHzdyFw+9ho
7MQ91nfiZXkh5I8pinBM2jIGj0cjomZfd4U7++wpKDduuwC+7nOj6Bm1yGaZ
pKDkwE7me8VUHxWhv8o3RJqjHIWfNjX5ViJnoU5aHhaMbuIBuZTryCKjj9zd
mJjdW1vwreIXry9O7HKoP5MdcE1f3v5CBn/J/U7+WD1Hk0LiLWrux8fu/4Bg
TfEHFnBR4qKpxlTbvbT3ILATyOWBLdovhXO6lXPMSR9xOCadtgDWLd/HxhVv
Cq54Lh4g6Z48L74m1b8qdxR4Dj8uimeEXgiwDDv+8UPx+kiGgMzMO90cdsV3
Zg3Hck1Uf06Bak1Uv+72+6N6q0d0vX1bf0BvxeX4YdfdtLVYp2/rgR7WHc3U
D12jV+r/AGt1rsFQZAAA

-->

</rfc>
