<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.13 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-jt-add-dns-server-redirection-04" category="std" consensus="true" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="EDSR">Handling Encrypted DNS Server Redirection</title>
    <seriesInfo name="Internet-Draft" value="draft-jt-add-dns-server-redirection-04"/>
    <author initials="J." surname="Todd" fullname="J. Todd">
      <organization>Quad9</organization>
      <address>
        <email>jtodd@quad9.net</email>
      </address>
    </author>
    <author initials="T." surname="Jensen" fullname="T. Jensen">
      <organization>Microsoft</organization>
      <address>
        <email>tojens@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Mosher" fullname="C. Mosher">
      <organization>Innate, Inc.</organization>
      <address>
        <email>cmosher@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="June" day="03"/>
    <area>Internet</area>
    <workgroup>ADD</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 44?>

<t>This document defines Encrypted DNS Server Redirection (EDSR),
a mechanism for encrypted DNS servers to redirect clients to
other encrypted DNS servers. This enables dynamic routing
to geo-located or otherwise more desirable encrypted DNS servers
without modifying DNS client endpoint configurations or the use 
of anycast by the DNS server.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://example.com/LATEST"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-jt-add-dns-server-redirection/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:add@ietf.org"/>),
        which is archived at <eref target="https://example.com/WG"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/add/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/johnhtodd/draft-DOH-redirect"/>.</t>
    </note>
  </front>
  <middle>
    <?line 53?>

<section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Encrypted DNS Server Redirection (EDSR) is a protocol that allows an encrypted
DNS resolver whose configuration is well known to clients to redirect them to other,
more desirable resolvers without having to support anycast and without having to
configure clients with these other resolvers ahead of time. It uses a similar mechanism to the one
defined by Section 4 of DDR <xref target="I-D.ietf-add-ddr"/> to redirect an encrypted DNS client from one encrypted DNS
resolver to another encrypted DNS resolver. Where DDR uses a threat model that
presumes the initial DNS traffic could be unencrypted, EDSR only ever applies when the initial
DNS traffic is already encrypted.</t>
      <t>One example of what makes redirection to another resolver
desirable is geolocation. A DNS service may document one or a few well known resolver 
configurations even though it routes traffic to hundreds or thousands of resolvers
that are closer to the client, reducing latency and making DNS resolutions more
applicable to the client.</t>
      <t>This document describes only one mode of redirection - Strict Origin Redirection. Previous
versions of this draft defined an additional mode of redirection that allowed servers to 
redirect to servers that presented a different domain name than the original server. While
the scenario's validity has some interest, there is no consensus in the WG for how it can 
be addressed.</t>
    </section>
    <section anchor="dns-client-behavior">
      <name>DNS client behavior</name>
      <section anchor="discovering-redirections">
        <name>Discovering redirections</name>
        <t>When a DNS client first opens a connection to an encrypted DNS server, it <bcp14>MUST</bcp14>
use the Discovery Using Resolver Names mechanism defined in <xref section="5" sectionFormat="of" target="RFC9462"/> to
send a SVCB query for the name of the resolver to discover its encrypted DNS configuration.
The DNS client <bcp14>SHOULD</bcp14> open a connection to the server returned in the SVCB query using the
same domain name as the original server and one of the IP addresses returned in additional
A/AAAA records for the same
name. Once a connection has been successfully opened, as subsequently described by reaching
a suitable server at the end of the redirection chain, the client <bcp14>SHOULD</bcp14> close the first
connection.</t>
        <section anchor="use-of-delegated-credentials">
          <name>Use of Delegated Credentials</name>
          <t>If the DNS client's TLS dependency supports Delegated Credentials <xref target="RFC9345"/>, it <bcp14>SHOULD</bcp14>
present the "delegated_credential" TLS extension in its ClientHello as described in 
<xref section="4.1.1" sectionFormat="of" target="RFC9345"/> to maximize compatibility with EDSR-supporting servers. This
is because some server operators <bcp14>MAY</bcp14> redirect to servers controlled by other entities which
do not have access to its private key but which nevertheless have the ability to terminate
TLS connections for the server's name.</t>
        </section>
        <section anchor="redirection-after-discovery-using-resolver-ip-addresses">
          <name>Redirection after Discovery Using Resolver IP Addresses</name>
          <t>EDSR assumes that the original server
is identified by domain name from the client's perspective. Examples include when the client was configured
with the resolver through endpoint management or DNR discovery <xref target="RFC9463"/>. However, when the server was discovered using
DDR's Discovery Using Resolver IP Addresses <xref section="4" sectionFormat="of" target="RFC9462"/>, this is not the case. Due to the threat model
that mode of DDR operates under, where it has to
start from an unencrypted resolver, the identity of the server used for verification is its IP address.
The risks involved with using the domain name of resolvers discovered by Discovery Using Resolver IP
Addresses are further explored in the Security Considerations section <xref target="seccon"/>.</t>
          <t>When clients use EDSR with a resolver discovered using DDR's 
Discovery Using Resolver IP Addresses <xref section="4" sectionFormat="of" target="RFC9462"/>, the only difference
is that the destination server it was redirected to <bcp14>MUST</bcp14> be able to claim the IP address of the previous
server in its SAN field.</t>
          <t>This section applies to both the Verified and Opportunistic forms of DDR's Discovery Using
Resolver IP Addresses mechanism.</t>
        </section>
      </section>
      <section anchor="identifying-self-redirections">
        <name>Identifying self-redirections</name>
        <t>If the set of IP addresses that are valid for the server being redirected to include
the IP address of the current server, the client <bcp14>SHOULD</bcp14> ignore the redirection, treating
it the same as receiving no response or a NODATA response from the SVCB query.
However, clients receiving preferable encryption parameters as part of the SVCB response
<bcp14>MAY</bcp14> choose to reconnect to negotiate to upgrade to the preferred encryption method. When
doing so, the client <bcp14>SHOULD NOT</bcp14> immediately repeat EDSR as the redirection from the
server to itself has terminated the redirection chain.</t>
      </section>
      <section anchor="waiting-for-redirections">
        <name>Waiting for redirections</name>
        <t>The client does not need to wait for the results of the redirection discovery
query before sending other DNS queries on the connection, though they <bcp14>SHOULD</bcp14>
gracefully close the connection as soon as it has successfully established a
connection to the server it was redirected to and received or timed out the
outstanding queries on the original connection.</t>
        <t>See the Deployment Considerations section for reasons a client <bcp14>MAY</bcp14> choose to decline a
redirection.</t>
      </section>
      <section anchor="refreshing-redirections">
        <name>Refreshing redirections</name>
        <t>If a chain of redirections was followed, the effective TTL of the redirection is the
minimum of the TTLs encountered along the chain. If the effective TTL of the redirection
is considered to be too short for the client's performance (because it would require frequent
repetition of EDSR), clients <bcp14>MAY</bcp14> refuse to follow the redirection. Servers <bcp14>SHOULD NOT</bcp14> redirect
clients in a way that results in short effective TTLs.</t>
        <t>When the redirection TTL expires or connectivity to the server the client was redirected to fails,
the client <bcp14>MUST</bcp14> close the connection and return to using the servers it is currently configured to
use by its local configuration before using EDSR again. 
This allows the client to honor the intention of whatever configuration method was
used to provide it with a set of DNS servers to use.</t>
        <t>If the client DNS server remains the same, it <bcp14>SHOULD</bcp14> repeat the EDSR mechanism
before the effective TTLS expires so that if the same redirection is valid, it can avoid needing
to tear down the current connection by refreshing its effective TTL.</t>
      </section>
      <section anchor="multiple-redirections">
        <name>Multiple redirections</name>
        <t>When clients receive more than one valid SVCB response, they <bcp14>SHOULD</bcp14> prefer using
the redirections that match their configuration (such as supported IP address family or
desired encrypted DNS protocol) in ascending order of the SVCB priority. Once a successful
connection is made to a redirected destination, clients <bcp14>MUST</bcp14> discard results for other
servers. Entries returned for the same IP address <bcp14>MAY</bcp14> be retained for multi-protocol path
diversity to what is presumed to be the same server. Later unsuitability of all connections
to the server <bcp14>MUST</bcp14> result in restarting EDSR.</t>
        <t>Redirections are considered to be a one-to-one relationship (starting with one recursive
resolver and following its redirections should result in one replacement recursive resolver).
It is not expected that a stub resolver ends up using more recursive resolvers than it
was originally configured with when using EDSR.</t>
      </section>
      <section anchor="network-changes">
        <name>Network changes</name>
        <t>When a client device changes what network it is connected to, it <bcp14>SHOULD</bcp14> forget
pre-existing redirections and start EDSR over with the originally configured
resolvers. This ensures that a resolver which redirects clients based on their
source network can behave accordingly.</t>
        <t>Note that this is unrelated to what resolvers a client is originally configured with. 
For example, a client which is configured to always used the resolvers advertised by 
DHCP will likely start with different original resolvers when changing networks. How a 
client is configured with DNS resolvers is out of scope for this document. EDSR only 
provides a mechanism for clients to discover redirections from resolvers they were 
previously configured to use.</t>
      </section>
    </section>
    <section anchor="dns-server-behavior">
      <name>DNS server behavior</name>
      <t>DNS resolvers who want to redirect clients to other resolvers <bcp14>MUST</bcp14> respond to
SVCB <xref target="I-D.ietf-add-svcb-dns"/> queries for their own domain names with records that
describe the configuration of the destination server.</t>
      <t>Guidance in <xref section="5" sectionFormat="of" target="I-D.ietf-dnsop-svcb-https"/> to improve performance by
including additional A/AAAA records with the SVCB response <bcp14>SHOULD</bcp14> be followed.</t>
      <t>If the server knows it supports Discovery Using Resolver IP Addresses, or does not know for sure,
it <bcp14>MUST</bcp14> be prepared for clients to connect without an SNI because clients might have discovered the
server that way. Otherwise, if the server knows it does not support Discovery Using Resolver IP Addresses,
it <bcp14>MAY</bcp14> refuse connections without an SNI instead.</t>
      <t>The destination server <bcp14>MAY</bcp14> use Delegated Credentials <xref target="RFC9345"/> if the DNS client
advertises its support for Delegated Credentials as described in <xref section="4.1.1" sectionFormat="of" target="RFC9345"/>.
This is valid
so long as the delegated credential is valid for the same domain name used by the
referring server. This is an encouraged practice for servers which need to redirect
clients to servers owned by other entities, as is the case with CDN contracts.</t>
      <section anchor="ensuring-compatibility">
        <name>Ensuring compatibility</name>
        <t>Redirections <bcp14>MUST</bcp14> only redirect to resolvers which support at least the same
protocol, address family, port, and TLS minimum versions as the referring resolver.
This ensures that redirections do not lead clients to resolvers that are not compatible
with the client. In addition, servers <bcp14>SHOULD</bcp14> avoid redirecting to servers which will also
redirect clients unless they are actively coordinating to ensure a positive
client experience. See the Deployment Considerations section for more details.</t>
      </section>
      <section anchor="dealing-with-persistent-clients">
        <name>Dealing with persistent clients</name>
        <t>Servers <bcp14>SHOULD</bcp14> be prepared for clients to not follow the redirection immediately
as connection failures, other technical issues, or even client policy affecting server
choice may lead to clients being unable to follow the redirection promptly or at all.
Servers who are redirecting due to being overloaded <bcp14>MAY</bcp14> respond as they normally would
to overwhelming traffic.</t>
      </section>
      <section anchor="redirection-to-servers-controlled-by-third-parties">
        <name>Redirection to servers controlled by third parties</name>
        <t>Server operators ought to consider using delegated credentials <xref target="RFC9345"/> when they
wish to redirect general clients to other servers operated by other entities. This
allows the server operator to avoid giving access to their domain's private key to
third parties but also ensure general clients have a secured, same-origin redirection
experience.</t>
      </section>
    </section>
    <section anchor="deployment-considerations">
      <name>Deployment Considerations</name>
      <section anchor="large-trees-of-redirections">
        <name>Large trees of redirections</name>
        <t>It is possible for DNS servers to redirect clients to DNS servers which also
redirect clients. Clients which are presented with long chains of redirections
<bcp14>MAY</bcp14> choose to stop following redirections to reduce connection thrashing. DNS
server operators <bcp14>SHOULD</bcp14> deploy redirection behavior mindfully to avoid long
chains of redirection.</t>
        <t>Servers <bcp14>SHOULD</bcp14> ensure their redirections do not create loops, where clients
are redirected to a server it already encountered earlier in the process.
Clients <bcp14>MAY</bcp14> stop following redirections when they detect this, but <bcp14>MAY</bcp14> also
take a simpler approach, following only a maximum number of redirections.</t>
      </section>
      <section anchor="redirection-ttls">
        <name>Redirection TTLs</name>
        <t>Servers <bcp14>SHOULD</bcp14> provide sufficiently long TTLs for clients to avoid the need to
constantly repeat EDSR queries. Server operators should be mindful of redirection
chains because unless they collaboratively control the TTLs of one another's
redirections, redirection chains will end up with greatly reduced effective TTLs
because the client will always use the lowest.</t>
      </section>
      <section anchor="including-ip-addresses-in-edsr-responses">
        <name>Including IP addresses in EDSR responses</name>
        <t>If a recursive resolver does not include additional A/AAAA records per
<xref section="5" sectionFormat="of" target="RFC9460"/>, stub resolvers might end up failing
the redirection if the redirection destination name cannot be resolved. Additionally,
the recursive resolver <bcp14>SHOULD</bcp14> ensure records conntaining the same IP version as the
existing connection are returned (if the stub is currently connected over IPv4, one or
more A records <bcp14>SHOULD</bcp14> be included, and if the stub is currently connected over IPv6,
one or more AAAA records <bcp14>SHOULD</bcp14> be included).</t>
      </section>
      <section anchor="comparison-to-discovery-using-resolver-names">
        <name>Comparison to Discovery Using Resolver Names</name>
        <t>Discovery Using Resolver Names as defined in <xref section="5" sectionFormat="of" target="RFC9345"/> describes
discovery of the encrypted DNS configuration for
a server using its domain name. The technical mechanism described there and EDSR are
the same in the context of on-wire behavior; they differ by how clients and servers
deploy them.</t>
        <t>For Discovery Using Resolver Names, servers are free to return whatever subset of 
valid configurations for the domain name provided by the client it wishes, such as
those it sees as valid for the client's apparent geolocation. In the case of EDSR,
servers are expected to only return configurations if it wants the client to be
redirected to another resolver. Servers implementing EDSR <bcp14>SHOULD</bcp14> only answer SVCB
queries for its own domain name in the EDSR context following its requirements.</t>
        <t>For Discovery Using Resolver Names, clients are querying for encrypted DNS
configurations available for a given server domain name. EDSR does not restrict
clients from issuing these queries whenever they want. However, clients ought
to consider that querying an encrypted DNS server for its own configuration that
supports EDSR (which is not inherently discoverable by the client) might only
return configuration it is ok with the client using to immediately reconnect.</t>
      </section>
    </section>
    <section anchor="seccon">
      <name>Security Considerations</name>
      <section anchor="trusting-the-redirected-connection">
        <name>Trusting the redirected connection</name>
        <t>EDSR does not provide novel authentication or security mechanisms. Redirection
is trusted by virtue of the server authentication via PKI through TLS <xref target="RFC5280"/>.
The DNS stub resolver implementing EDSR <bcp14>SHOULD</bcp14> use whatever policies it uses for
other TLS connections for encrypted DNS traffic to determine if a given TLS cert
chain is trustworthy before proceeding with EDSR.</t>
        <t>EDSR <bcp14>MUST NOT</bcp14> be used with encrypted DNS protocols that are not based on TLS.
This scenario will require future standards work.</t>
        <t>EDSR should not introduce any additional security considerations beyond use of
the original encrypted resolver prior to redirection. Because the original
connection was trusted, information sent over it about a new connection to use
should be as trusted. However, clients that wish to time bound vulnerabilities
to attackers who compromise the original resolver <bcp14>MAY</bcp14> choose to implement a
maximum TTL to honor on SVCB records that redirect to other servers.</t>
      </section>
      <section anchor="use-with-unencrypted-dns">
        <name>Use with unencrypted DNS</name>
        <t>EDSR <bcp14>MUST NOT</bcp14> be used to redirect unencrypted DNS traffic to any other resolver.
This use case is called "designation" and is covered by Discovery of Designated
Resolvers (DDR) as defined in <xref target="RFC9462"/>, specifically Section 4: "Discovery Using
Resolver IP Addresses". Not following that security guidance opens up a DNS client
to malicious redirection to an attacker-controlled DNS server. For more information,
see <xref section="7" sectionFormat="of" target="RFC9462"/>.</t>
        <t>EDSR also <bcp14>MUST NOT</bcp14> be used to redirect encrypted DNS traffic to a resolver that
advertises support for unencrypted DNS. This would reduce the security posture of
the client. Clients <bcp14>MUST NOT</bcp14> follow an encrypted DNS redirection and then send
unencrypted DNS traffic to the new resolver.</t>
      </section>
      <section anchor="use-with-ddr-discovery-from-ip-addresses">
        <name>Use with DDR discovery from IP addresses</name>
        <t>When a resolver is discovered using DDR's Discovery Using Resolver IP Addresses mechanism 
defined in <xref section="4" sectionFormat="of" target="RFC9462"/>, the server's identity used for
TLS purposes is its IP address, not its domain name. This means servers and clients
<bcp14>MUST</bcp14> use the original server's IP address, not the IP address of the previous server
in the event of redirection chains, in the SAN field of destination servers to
validate the redirection.</t>
        <t>The reason for this is due to an attack where the DDR SVCB query response is modified
by an active attacker to have a different domain name in its "dohpath" SVCB key. When
the client uses it to issue the EDSR query to the (valid) DDR-designated resolver, it
will innocently forward the query upstream and return the result. The result may even
be DNSSEC signed since it was issued by the valid owner of the attacker's domain name.
If this redirection is then followed and validated with the attacker's domain name, 
it will succeed and the client will have been maliciously redirected to use an attacker's
server at the low cost of a port 53 attack without breaking encryption or compromising
the encrypted DNS server DDR designated.</t>
        <t>There is no harm in using the name of the server for the EDSR query so long as the
validation of the destination server is performed using the original IP address and
not the name. This ensures EDSR clients can consistently use the domain name of a 
server for redirection discovery. Use of the DDR-defined SUDN "resolver.arpa" was
considered and rejected because this would conflate DDR configuration and EDSR
configuration by placing them in the same zone, using the same DNS record type.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>A client <bcp14>MAY</bcp14> choose to not send other name queries until redirection is complete,
but there should be no privacy issue with sending queries to intermediate resolvers before
redirection takes place. This is because the intermediate resolvers are considered
to be appropriate destinations by the client even if the resolver wants to substitute
another resolver for reasons other than name resolution results such as latency
optimization or load balancing.</t>
    </section>
    <section anchor="data-flow-considerations">
      <name>Data Flow Considerations</name>
      <section anchor="data-scope">
        <name>Data Scope</name>
        <t>EDSR does not result in any additional data being shared by the end user, as the
DNS queries going to the new resolver were already going to go to the original
resolver.</t>
      </section>
      <section anchor="data-visibility">
        <name>Data Visibility</name>
        <t>EDSR results in a 1:1 replacement of DNS resolvers used (future queries sent to
the new resolver will not be sent to the original resolver anymore). This means the
number of servers which see any given query remain the same.</t>
        <t>This is only true if clients only use one redirected DNS server per original DNS
server. If the DNS server offers more than one redirection, and the client validates
and uses two or more of those redirections, then there will be greater data
visibility (more destinations). This is however entirely within the client's choice
following their own policy as a redundancy versus volume of exhausted data trade-off.</t>
        <t>EDSR requires the redirection to another server to also use encrypted DNS, so no
third-party will be introduced to the data flow unless the encryption is broken.</t>
      </section>
      <section anchor="data-centralization">
        <name>Data centralization</name>
        <t>EDSR can only increase data centralization if multiple resolver operators choose to
redirect DNS clients to the same, other DNS resolver. To prevent the reduction of
their resolution redundancy, DNS clients <bcp14>MAY</bcp14> choose to ignore redirections if they
find that they point to resolvers they are already configured to use, by a previous
redirection or some other configuration.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This draft has no IANA considerations.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-add-ddr">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Kinnear" initials="E." surname="Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Patrick McManus" initials="P." surname="McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="5" month="August" year="2022"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration.  An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver".  These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known.  These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities.  It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-ddr-10"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC9345">
          <front>
            <title>Delegated Credentials for TLS and DTLS</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="S. Iyengar" initials="S." surname="Iyengar"/>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>The organizational separation between operators of TLS and DTLS endpoints and the certification authority can create limitations. For example, the lifetime of certificates, how they may be used, and the algorithms they support are ultimately determined by the Certification Authority (CA). This document describes a mechanism to overcome some of these limitations by enabling operators to delegate their own credentials for use in TLS and DTLS without breaking compatibility with peers that do not support this specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9345"/>
          <seriesInfo name="DOI" value="10.17487/RFC9345"/>
        </reference>
        <reference anchor="I-D.ietf-add-svcb-dns">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <date day="26" month="June" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service.  DNS itself can be such a service, when the server is identified by a domain name.  This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-svcb-dns-09"/>
        </reference>
        <reference anchor="I-D.ietf-dnsop-svcb-https">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google</organization>
            </author>
            <author fullname="Mike Bishop" initials="M." surname="Bishop">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Erik Nygren" initials="E." surname="Nygren">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="11" month="March" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins.  SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello).  They also enable aliasing of apex domains, which is not possible with CNAME.  The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics").  By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-svcb-https-12"/>
        </reference>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
      </references>
    </references>
    <?line 416?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank the following individuals for their invaluable feedback
to this document: Ben Schwartz, Eric Orth, Erik Nygren, Manu Bretelle, Ralph Weber,
Ted Hardie, Tommy Pauly, Viktor Dukhovni, and Vittorio Bertola.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA61c7XIbx7H9P08xoX9YSgGw5chOzJuKTZOyxVyJUkTKrlQq
lRrsDoA1FzvIzi4pWKV3uc9yn+z26Z6ZnV2AslN1XeUSCezOR0/36dMfw/l8
rnxnmvJfpnaNPdV761W1a0911/a+++Lzz7/+/AtVmM6uXbs/1b4rlWmtOdWX
TWfbxnbq3rW369b1u1N9dnGhVOmKxmxpqLI1q27+czc3ZTkvGz/3tr2z7by1
ZdXaoqtcM//8qVJd1dX0+MlzWkZdNWv9rCna/a6zpb64utbX/JZ+M7x1osxy
2do7eufZxfWbE1WbZn2qbaPUrd3TesphefMLrELd2aa3p0rrsNKffqCfu/2O
5v2J1o9Zf8A39OnWVPWppjV/W9lutXDtmj40bbE51Zuu2/nTzz6z78x2V9tF
4baf8Ujrqtv0y1P9s9s0m86V5Wey+YtXz9N26bGa5Oi74+O8OLt5dn2jlN+a
tvvXv3tHj57qxqlddar/0blipr1ru9auPP203+KHfypl+m7jWuxsTv9rLaL/
60Lf0Cr4E9qAaapfDCR3qv/Wm/Jr/tzKRn/Gcr/9Nz5e4DjHA90s9F9t40m0
h0O9rIrWebfq8uE69zM9/+02foe9TcY8X+iXzm9se2TMy6YhGc3o32KRD1ts
+Y1v1/iVx2xcu6WX7uhUVdWsst/UfD7XZum71pDU1c2m8pqUst/aptOlXVWN
9b+qY/oRVOvxTBm9tcWGlui3mmYhLctfFJX2tG0dz1kXdUUz4TPlOlr08Vfo
hLAw25hlTesp9yScqtCkhB1po6IB19bNawfbK0lKmse6r7zVW9da2oivWrx7
fHh1TypJY9HDZbXaQ8HxrayNXil3rqIfCtesqnXfsvg9pqFZdE+TKLfSptkX
xnd6ueePh+EXIuRtVZa1VeoTfe4aMjEZhMxYX0DMFf+OE7CaDFPDMr0+efn2
+uZkJv/qq1f885tnf3t7+ebZBX6+fn724kX6QYUnrp+/evviYvhpePP81cuX
z64u5GX6VI8+Uicvz/5O32BVJ69e31y+ujp7caKrhraUKwahGk5xaekrgo5d
ayFR4xUJumirJf1C73x3/vp//+fJU/3+/e/efH/+xZMnX3/4EH7505M/PqVf
7je2kdlcU+/DryS9vTK7nTUtRjF1rQuzqzpTkzEbr/3G3TeazteSZH//D0jm
n6f6z8ti9+TpX8IH2PDowyiz0Ycss8NPDl4WIR756Mg0SZqjzyeSHq/37O+j
36Pcsw///A1hvdXzJ3/65i8KKkSI3bqyZ+tT6jfap6YjNHrXOgJIV5OcTQfp
unuo4WAZCoO01rsaw9xvHCn4SPUxzr2lY7ltcBKkCIMVD5ZNx7jFB2yKMzWx
wzg+jRRsb2PuYHj0hu93O0LvZFHQj4OnVFySTbPjGUxL6xUsGSYxG2tIyVa6
q7Z2oS87mC2k4attVZOiDbhFC4D9koNXgn8lTPo6SPIpBrm4eAM9vpxfLOD2
xGeXLSl0LoBcpjmerFq3xfDjb1WSOI1hmmNgGJ9Y6J+g/byMsI1uQzyD8cvK
wSqySU/G6nkzDC+m5lEI6VcrAs/C9XUJE+6bNM1MQ1HEGC3WQmZIi/ZsmflI
Kh8JalXT/OV+WDCZ5itsUZw2hHYPdduaWxotIzX5buP+1KAmNDQhOwM7PbzQ
ZwlXq4Kw3ewHTIJECZKNXtn7XD2TXNUEv2mD2JPr1xtddexMIK6wKVrXpm9K
WmpAetd7UkSPrSS9UmJDrINkJm1UHjnpGTbaF9BXkJmm2LMqkwyih+GBelkO
DESxvAve+mioxaFrFqD1cljYPA5fVjdId66vu7YiZXzVVmsC0wwUFvo10cKK
tqWwFXFpqwD0IGQ6qj8pMmk4OyjSoWPTDFBCj2duXg1o4IbP8TDUk/aB0TX5
3BXpM3bliLI0TH3wmKic46XTzMGdkvZX5EjxlS+IErSV+9TrO1NXtMY9IQS5
CLcNrokoJHuUlnWpcUAymtj3XryaJXbLVIWcCrSgoEkVGQVtmN71rMif5Na7
tIAg19LH9HnlC0drwnlm8iA3/hMMxozMvmoJy9zOwutjGU1uAUeJyQwrgjtT
IBnMKsKEe/3WY9I3UbmvDGx9QLF4drTJ9+8jeH2Jc4P7/frpV18wWimSBY7g
+sfz7/S/ewy8CryGD4EVYkBrrLUMS6C1+SnA5Qa2YCqTCSC4TEjgQAB8mOK3
iEv0bVg6Ps6W1vOe6UPlsbhcW4w/piuBWqR9XL5OB+tHEw36rc4+O6P/6NuC
GVgUB2ZUmGqhXzWEPaMdQOeWlvbl+6Kg0Vd9DaOknQJToZD90lvaRNPR5wNJ
IsdCuFlsQGLJF/VEcmD6cfHsRME/h3MYbI5OuhK2NBEwQxF/ziqnhnVCl0lr
33oWyIWt7ZoJ8zmNC0JKDEupy1XirzIuGdfNi2taNW2nZBQLDtofH4IU7hvo
2B+efvnhA6uwLEwFm+fhT8r46r+K9OoJT2TfEVZ65hkNK9k5L+M5QbqDLEcc
Uw3a/XTxZPEkaTjPDtXamnfk438Bh9nuSDOXVQ2YYLIAbzcPu4FqjcINVeFQ
CwPbY0AJx0LHShruCMmIueljCEcSJ3pW13LC0ZVT6C6utCo2FPgTGDGdIVVi
ncEA2O2ure5ILhwELInx8PO6gTumgWo8yW9BiiZsBhZk222FeFBBhsOZZxrM
q6PTZC0WVchJIkE+rfNBhCHbOYu2Q5QTPMH4SDGCqk7MDxKs+GxXlcgiN1nm
QYP60sJIsH6H1dyRlT0T6gCcLuqefE7iIEHd741PiEOsNbK/DKw2LTv3FMBt
TWPWVtgC7fTqTQKzfVTap1/94cOHhX5OnowBOE0aDh+TxpdoS4xIiogYrf43
SS5DY6aS3yQ0nonrZS8l0iTyS3K46BMXyFmeUI/ojEEFRS9pCqItYenweh2j
E6C+M21gn+RvMtaXJCZoIidGWhVAJ+yczKBkXYK/I4aUQgEo7QCsAvtt5W9x
cncYV9j7gN4jLcjpVC5ZUpaPCFQNAgX7WvWtGNm7Xe3azHfYom+xFQq5Pe0r
Uj8fjuD9e/qJdIiOPLjsGEvA6FnHeelmUKrp4Ws5fPX/cPpWuFykQ4WF/STb
ItjrYOB4ORxJJUYQIYiWRIrC4S8YTCCRRW2q7cT7xaPdRQYYBxTAvT67It9h
6zLSziivGA4g9nfB3H5kdWCaWOpXDKU9UZCOODQSTT6o56GBqOMiShyGIUpf
Cn7sBZ7r1XzMsy6jjnaYZ+TfEzdnajiBQZJQTtpEdAFp1HFhkSoxSY3c7NDz
VusGUe7EU9OTMFvsuOoSl9B8cIWtOJ5tEDf6HbipBDFXry7Obs6GDxNYDnRo
oRJKRa0dBqSTJSXKU144v51paeqOI2KP37q4OR42zqbg2IqNYx7hmAqxO8Ev
jV078tUdf9Pv1q0pEz7JpDCNbE6ab+NKjlkbcnt8ju6Y9JAjqbZbEhyNXoMZ
7YB2wdMc8J8okai74j5JQwTvojssjxMnUa6fTMV+H7ox1qubYXmls4LJjRU1
uae3kjohzK47f4yhJeeihL4u7QrqAcqNSYUXgGfh64pDORFLct6zGJ8iJxZp
FIm8sMIwB6qXkVGOf+TfAP4jVkowQmpR+Q1MVj1Iw49iC0xcdEzSrMim0A89
q7Wif7k8gs1NtpSIwYiMXtsQ1ViC7T375QeAWg7IeCfBkxzMWEtLW3CSzKjs
DOSY39gVHdPmMEoj9DCiD5OI1vPmV05CWtFWS7DM3ETf3Lw4dt6M1laR3lXb
fhufoIc5TnI9x6Mk9NoFPyiaqAOG/dr48AZFEI8cxxIbd0iItoNC5myKM/2I
Vh5FIotj5cRPS+FIBdfZSlyiYG4dB0GYWxL6CViE6a56EbXIZbq+Rcg8+tyg
U0EnjoRgi4S7F3iO1kOfyi5GQvDRK08lDQGRr6ffOTkTleoucuFBjSd8cazO
K1PVfqayZ9h5HrcqVn1EjAx8ictEzk+CxfmIj4BpJmYK7gXBEaOBc0Uyq54k
VAMyyKgCeGtWDXG/IUmbrRPZKdeEE0eio4kHhzQbp+7GMwgKQwaKiRwNsGvd
HekSq4SQnOBFJ7Uaen6RHG2Yf3iEhAIy55NjyyK+COH4ineVfLsKOz7Q++t0
rt6JilSrwWdOrI0d+yymbcydIzcPkA41oQ4VhJJT1Jn7zs6Uw+8EDZzPyNci
4PGSFLTa1XYCHSO2GDBRik2cuELSQXjHyLPOciQP/jIEERMdD/xla7qC4b+a
nugjQvWN5BaYdNGhZpxlZbYVUhAhmTq45JCqiVWAx2yQyKOJT2pLRLgZJ6Bw
1IFCp7TH4Exy50GnsQ1MwORWlrHWDE1gZfCOpi0TBKxi2U6lKPwZhdFVnqnJ
kzH5bgFPS4ivM1V8botzm6dqB4X+FHVXnOoUlOCEdOV1yJQnRI3jx3TjC4O4
uG8kPSMBN+p9de7NvBrjDm9RtgYJIw9pJMcAQyDNepMfNWeQp9BuoETzzs2h
S62txSVuqh0dfRyMDVe+J/32tL2hjgDEEqSO2j1SL8Jb8QNxjTLMriZ2wa44
DZmCn8cLddnFCJXsNAAp82ztu345hEkWqfJ+FyCN7eJwPC+2UnUK2Bw5whg8
eYcchQ/oKIZ5ZTu0U8CLNms75FwjbbNcIwjfymk34ZUA1nJ6LPActUh71pYr
KHP7DpHMhDewZCWalnIJJwZi+uHoNtKpDKVs37cpSMnLbcj2xNl8MpmlAWoL
m6rIRFzf0ubifgB/nJjmZBIZMS25pgBBXbnOxhBSkgt9w6oUmGzwwbFKFmVX
few0yCt9j9q+5Gdmw1uy9sqPfR8ZCrl7L/mDPD9D85VIalVewn118fz8Nc1A
dlVXt4gARMYs2aFGkKhkVkJkLMZBcywlQvGcxaHVqWFTU73Kq2osHVBZsm3i
7Tsb0Caruiyy8pgK7hNSGzc9ZMXQlCsfqQ9HLrkNoNyPXI2K8fiUPwQf/Enu
d4dCxHgX9xtEKMIRjrRZHJRGI1KRf2Kqwqg/rW76u2KJtqQPHxKzD1hMfgke
NkvphEJsTKBzNTLmbCOryvxYcDaH6Q3SM/VDX5VMYI/UMdICaV1uJ0vkZiHJ
+1ZbnJAd0eDlXkmMDz3JalqTnH+y5ZHvjvCwtCkwWGQJCD4UlByZCw4p8t+S
F5qBxaY4E4OweAERMxVqQJiX9IOC9uDgsjON8XmskhMcXF9dpux1fHJbrTch
55ylsfIYGnhA1krOPjbQzBIBm+wwLTeW63/bTnk7QzSRJ6onqydSSQxOclBH
018YBmP8ehUi7mEoaqiEPZLAjJuAYI+PN608fLTwsBDiHjkq4bXmqC/kMVLx
Qw/Fj/TwmOXkudI+ICVOTFItQ9Ei+JUq9nKQgzBrenyHxi44QlaowOpjTUHA
5SBGy0oZZNvHqhhc1Kp8SlOLyZxfXEntg6b04qSfwc9hlaPqy4T+sHozqubV
lBzSsNzUFtLp2qIvJJXlIsmbTejvTOMFaTBCaBEj81TvTmmlKMvUYqEOvfQI
w0P9pkZbyaj7JWM2kn3EY3HztR3KFKGwry+H6uMsiT1AjYQ0aeLQHjM6RPaX
pJ9OHYB933C1iP0LVmI4smHfwhTBxBFlm+gNckSOQSJj6xtxPAJ7gk4E9/9J
sia0+3SIsEUTLqypE2VFpYeYFcdjslpkg0Z7/wjcQaTHcxB5AlEZnwd7CPZx
mLOgyh057aYq2PB8HzCYe0LC5neurtCyISFhMjRVbFxsPuHjz/qfJKncNzH3
/sAiSV+3u47DMy2NE4u0e7hv09rRoZd9aLfjEI0eqx3FWmXAUfHcJhw0t3qC
tXGaB1EJXiCGVG/5tKW9JebFRn04x8uXxIAoSkOuuLLplLIiKPKTXXBCrA2B
qB/DuAkqx+LanqzCb0aEZW0bmqA+JC4JmKTadQSbQvU2S5pMCrdMStmy1pIs
HwqwQmgEcz8d12KJGo1EwcVZGF40n+mShY7DKsDiZgxVc2Gvo7ReZmRM8R6y
Lz6yF4ZiExQUrJ+mLFUIzsiIPaBGfNmv9t2OHhFMOQoni1CHTw+1NuviYatm
F8dJzcPFjZO1vnO7LDgd5z2c9E2N0m/dpjWcpllws9xBKT6ARsnCGxlb5MlA
/1JS4On8sWB1dMGLAzwKpywacswXFKjyWBrT7XysvkZwyy06REVZoj3rnktZ
YmtaereNlUyCjIKrq/EQIM+PSTHZFlBY+jErWhaUFq/yEXfm1koPJAVy3OzX
OlNsZtmY7JWNNFGQ52z67VISRPlkh2iC5O2BBGPC0feAoErypKwznCOfgLyc
EPYeeArSTagvdJPaUAhIYvo5U4qQ4iBPEs5+svB49JEn5w6T6ERtlq41yWcy
KA4pfRoKGZPQvPipz8sOfnZYcfLiqtHN0+/EXtbQGGE9pO7lJPmt4rLyHLZ4
+xhQ81eIRHwXqqUpuhmVQkmJWFQxlImlj8OUzEDrY9vFw2ESyVkdby77HAXt
UUIoBh9h+3DGR5KekaePqmgZ8WcWXJgG61umRZcLxBdhkcT6wqgHWxsbctwF
QAZpw5TQD7nFQBKDY1UpE5TXBHiYkJt8FOMkbHtaCgh5Jifh0N3TWWhXlbbo
QaQD9wniL4W9/gdjfzVToRVWxs5P7HD4x6I35yCobeWFCHy8y1A93OsgXYgc
KX20/VDcf+phVUMbTsgGfKSvEDihEnoK10AElwVKYAA2I3h5W2SM4DrGZ8hW
6i1t6Cg13Dka8xSdfdeJpc/vUS2LzuS/ArRyVgoUBO2jEbw4PRhulgSHRE9v
kc9A4uzj0htiACPVuVCC58pTKu5wPyGvTEnMOOltjiFkHj0G+I0RZMr1AVX8
hmeWigIJwkmp0Fs5znFcmiqM5DAM5+RGPdqXzRAWhkriTOWbGjLHLkZ9vLvJ
HkjnuQjN/mBU+lpaNXGmkw7yoRTJrg1kKlXWYhsqO7bG3wMYfjz/TuV5LejT
JKsVlYLHiJoxTa9zSXXLbOm3nXVSGRILNwnEboTx3YCJZMwdwaeJFM+AxtqU
FRnZAa82QTqqEOgGT4E+ZyIR/gTw8zal98AfbKig7vkUsq64+D5zf5Vzfw57
004e6GseyXhs3JwtTMkzXv6jlFcWt7SxAfsiarAkRkr9OHgbHLI6pl2hAuBu
9SQej5VdN2lFCTjLDP2hrrL3n4RuMobUG9wJjU4lU9fBf4QuynQ8kR81tCny
8j29SHobGu04exPmTXhGpCdjXdwuhlnFxu+qtutT63PsKR6PelcZ/fq/L3Vs
lUSWREK0L7/40+eSxwp32UblnQfNCqQkoRRH0BVn2OSiCqBbLPVYk+pYVbKL
GGCwaOexwISo7jyCbTshcTru/Z4UZ5N6bZg2c0F4aPhdBLnHe2J8B8bHGOZ4
mXSSz0nVGFpESBXFqwhC0VJ3Rd+Ba3BbjOHUsmtv4Qh4BYGfilrLhS64pH3O
udKhF2NlW9o9wv6eQVaNemwOGzulipsHgIzU32UEM76dF3VRlQsKNdPp3ign
YFGIidHLkpO2RNPvJ139NLYaOPgw2BEkkcxzyAKgrUjTqLS/u75GVM1pQ+Qf
APZdZ4rbmCtBao1QrJpsY9j6OPBMiquNikENuklSQwWtPGT9h/LFKC05SkMI
e3obE6B5Uy1w+wFFywPxySu52kMTJn5NdI0T53CvoIKGEzUnKPOvhSafCGUE
tT3SS8ud//KsLVMPptePLi7ePD7gbr/LOlTRm82dv4ihU/L7VJ/8psbOk4W+
crnLZMkm9V7HSo/ckKEYIb89o7iRH2ji+iP3x5JOzLPcVXYDV38f6XCmxSAl
NqOnfxzfjokwwSmejx7hwwc4aCH7tazmkNcbJioQMvmxTYtBQRA8iGrnPKNK
sPuYSE6ZgbjWkH08cMK5+KAp8Ajclag+oowSiN9nqjjSfDSgDyyeeUUegabi
/OBBDvvoj7cJP9BJPXB6dTTYONpfna5ApB732NXOtyZ2fUuytf6wq30mIH0Y
ZqDvxRpOfgeC26SCgOKTmALssIjp8N1He7TTnQrhochUd9N7eJJomKX299jH
jecOC2h8K4CpPbfzTrr5pOwmTZdDKRzHJtnoZHUh1cW1AdKC7L5WqpxCSrha
XxHiLPf8quQ5ot0y/kq+9PhtwNCZflK6DTp5TmSaW7sPjcUjBieMA2iPzP5A
22VVQZkf8c4fY83zMgFiUtAZt6XAl1dNQySCGSeJ4R49S3g/XEnbeXR3b0f9
gaktWALR0GKDggFODdcLybiun51rzIobkxWXuKVFkdecgjSJvFCFS21ZUWaf
jpVRKtHVGB2lRNekgjUvMx55OZDf42POtKpCzom7vsL703wUHxxff0sQnZXy
UgNDjtOfpisHoT0QQFU4zxptuGynv/xDUrBQGF6SpPnubNZezu2fgQLEjNLR
mIMRKp2zqHe6Fbox7RY6NvR15tcfs6hlokvjum40po+2NXCKXnoSEvCN8CGD
AJK2isiQIU4sS0osGmAfPUDMEbmsVu8T8Exu2xitsv0c7VdfxCuCwabnEWGv
315c6ZPkAky7MyfcU5o1r4kh/CwnP6Qwk0dDHIYGJD6QcVAWszHjeBemgK60
IKhtRDdO1fziGlLTrB0XH4qTA3/jP1vDQdtrlHKKacym1NnxbnJubOCbl0zA
WHgxNO7JddRTM4MS1hSnzNRS2uFB+xP3bZzUkmgBgklsefEmQByYr6Ag1JHA
M0ueSjijRsSHr9Jzu95Q+89Txg8MNe41VKHXEKl/WiEezVTWT3JFXB6tJneC
Q4bGcVKKnGrfWTVNyIwa+EP9Fa1/jXT1xlvwqRk09raGe/PKkbFvwx++gcmj
AEpRWE2METUhrpuZzujvgSNHymb85TW6uqZB99D/OAm8SrwiJVe/Me0AyVbC
rnYWrT6/wrF2IX0w5UvS4RUrPemxtUt/cCIGYEMSa1j6jwRusXUiZvJj47zR
T06fjDo3Qw/3cObMch6FYDQuVe7iOnW4UoB6SLGHhx6IrUhkYNWPR0wIIhnq
ROPKIhg35CwhfGQJjE/ReuOdsyr8aQOKGTnuTzmnJmCb9KsmJ5NB/Q5Tx8UO
5cJ00yJ71IFs+Enj9ujy1sTjRefplRE9oA3fu5RuZ9AEhoyrQV2oxrVWpEuS
5eIP8nV0vuouna9+FP9SSjLCx4N9byRu5lp3i8wUcKTKr8WSB5cGBZVHWrFN
L/Y0eOnSpgjb4EI3TogY5h2ZoTgJ+25jJJHEZtDhltecZLVI6sf5jcNbWVky
driXxSEUjmzkmPE3uvA3u7iqPkdVfZ+Ek9IhZVQ+XscK5j1U6XIeAPBr3a0N
V37YasDaWjovwY2w9IIPmURHpAuIFIYePwuF2w6N/0Hdh8pichRDmXwIVmMn
QbgOMdzzGiz7xjGvj7fhOcoLtEHFCnMGivGgZqNZJpkNuXw4KgILVO8Vee/Q
p83ZXLkNPWlXik1CAaEO+k9nwD8zXBnNTx3JSdyQl62O/wyE5r9XdHZ1doDL
N8OfGsEtNfKR/Ng40bUIf6NsSUQQI50V6ECk+H69lbYhMGz5w26RYaB7WI7A
NLcs3yxPTx73rip79KIMHaxVQ2bdS0adWC7PxQNkzb+n+juy4etiQxFA98tM
P2spMH7Vdhv+8VZf7cmiCS9emqbX3+EvYtXojn5j6t1G/2SX+CNINyTN5xRA
VPTFjdtu9/q16dGn9mN1i8aUi/524+6aSlDnx6qjDytHE7edq81C/R9QHLjS
glAAAA==

-->

</rfc>
