<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.37 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-prodrigues-extar-01" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="extar">draft-prodrigues-extar-01</title>
    <seriesInfo name="Internet-Draft" value="draft-prodrigues-extar-01"/>
    <author initials="P." surname="Rodrigues" fullname="Patricia Rodrigues">
      <organization/>
      <address>
        <email>patriciarodrigues@protonmail.com</email>
      </address>
    </author>
    <date year="2023" month="July" day="10"/>
    <area>Network</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 20?>

<t>The shift to multi-cloud environments brought data leakage prevention challenges for organisations. The current Cross-Tenant Access Restriction (XTAR) mechanisms do not cover critical scenarios where users can connect to multiple tenants (organisational and personal), facilitating data exfiltration.
The goal, similar to previously proposed, reviewed and accepted protocols that have been published as RFC standards and are now widely adopted, is to help organisations keep their data under control when using one or more Cloud Service Providers (CSPs). This can be done by incentivising CSPs to adopt the proposed protocol, Extended-Cross-Tenant Access Restriction (E-XTAR), consisting of a globally readable header specifying the allowed &lt;CSP, tenantID&gt; combinations allowed by the home organisation. The work gathers scenarios contributing to the importance of a cloud-agnostic, universally embraced protocol.</t>
    </abstract>
  </front>
  <middle>
    <?line 25?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Organisations' dynamic has evolved into a hybrid, multi-cloud setting (1). A subset of those will have granted their colleagues company-owned devices, the assumption often being, to access cloud tenants associated with their work in the said company (2). Segregation of business and personal environments, being a direct consequence of this, improves the level of Data Leakage Prevention (DLP) policies. Additionally, the dynamics within a single organisation, or even inter-organisations, have contributed to the adoption of multi-cloud environments, that is, organisations instantiating organisational tenants in multiple Cloud Service Providers (CSPs) (3). 
The keyword there is "tenant". Employees/colleagues can, rightfully, instantiate their tenants in those CSPs.</t>
      <t>An approach that can be taken (and it indeed works in specific scenarios) is inserting a header in the authentication-related network traffic originating from the company-owned devices (2). The device itself, or a network proxy, injects custom CSP-specific headers either directly containing a list of allowed, uniquely identified, tenants or providing an indirect mechanism (look-up) to get such a list. The CSP, capable of interpreting its custom header, decides whether to emit or not, a valid authentication token. Looks at which tenant the user is trying to access and only issues a valid token if such a tenant is present in the list of allowed tenants.</t>
      <t>The catch: This is not something that all CSPs have adopted. In fact, to my knowledge, only a couple have such mechanisms, and, it, itself, has scope for improvement. This Internet-Draft exposes the need for the standardisation of a cross-tenant access restriction protocol and consequent adoption by CSPs.</t>
      <t>Take the widely adopted Sender Policy Framework (SPF - <xref target="rfc7208"/>), Domain-Keys Identified Mail (DKIM - <xref target="rfc6376"/>) and Domain-based Message Authentication Reporting &amp; Conformance (DMARC - <xref target="rfc7489"/>) protocols that, together with the Domain Name Server (<eref target="https://rfcs.io/dns">DNS</eref>) protocol, help ensure the authenticity and integrity of electronic mail - related to yet another RFC-defined protocol: SMTP - <xref target="rfc5321"/>.
A noteworthy characteristic of these, and other, protocols defined in standards is: They are optional. There is no central body enforcing the adoption of the standards. What has happened, and still is, is that the community itself is pressured to adopt certain standards to guarantee reliable Internet communication between services.</t>
      <t>We can follow a similar strategy for data protection, to secure organisational (potentially sensitive) data from exfiltration, this document suggests a cloud-agnostic protocol that consists of having a single header, interpretable by any CSP's Identity Provider, to verify if the authentication request is coming from a company-owned device and, if it is, only to emit an authentication token if the tenant being reached in that CSP is allowed by the home organisation, owner of the company-owned device.</t>
      <t>Because we cannot guarantee every existing and new CSP will implement this sort of mechanism, the standardisation process incentivises it, and, if adopted by the CSPs and organisations, it restricts the attack vector where colleagues, intentionally or not, exfiltrate data from an organisational tenant into an external tenant (personal or B2B).</t>
    </section>
    <section anchor="background">
      <name>Background</name>
      <t>Organisations deal with sensitive data and therefore follow strict data governance rules. Many introduce data leakage prevention policies, which are eased or not fully effective on organisationally-owned devices (work devices), as these are usually within a corporate network and are trusted.</t>
      <t>As we will see from the <xref target="usecases"/>, a multi-cloud organisation cannot block access to a whole CSP. And even in a single cloud environment, except for specific CSPs that allow/understand an XTAR mechanism to restrict access to specific tenants within that CSP, there is no widely adopted protocol to restrict access to specific tenants across CSPs. This appears to be essential when organisations are looking to have clear isolation between organisational and personal tenants.</t>
      <section anchor="protocol">
        <name>Proposed protocol</name>
        <t>In <xref target="usecases"/>, the <xref target="proposed"/> protocol accommodates scenarios of single- and multi-cloud organisations with the need to restrict access to organisational tenants within them. These organisations are assumed to have provided their colleagues with a corporate device that should only access organisational tenants.</t>
        <t>This approach is an extension of the approach taken by one specific CSP, which includes allowing an organisation to inject an optional header ("allowed-tenants-list") in the authentication-related network traffic destined for that CSP, which will then be read and interpreted by the CSP itself. This header will contain a list of organisationally allowed tenants (within that CSP). Once the traffic reaches the CSP's Identity Provider (the service granting the authentication token), the token will only be emitted if the tenant being accessed is present in the "allowed-tenants-list" network header.</t>
        <t>Limitations of this "legacy" protocol:</t>
        <ul>
          <li>Adopted by a single CSP, hence not apt for multi-cloud environments;</li>
          <li>Allow list of tenants must be fully declared on the header, rendering management and configuration difficulties.</li>
        </ul>
        <t>The proposed protocol (E-XTAR) extends the legacy protocol as follows:</t>
        <ul>
          <li>Instead of having a vendor-specific header, readable only by that specific CSP, introduce a new vendor-agnostic header "global-allowed-tenants-list";</li>
          <li>The new header can either (1) explicitly list all allowed &lt;CSP, tenantID&gt; pairs (similar to the legacy protocol's header) or (2) specify an endpoint for the target CSP to retrieve the allowed list of &lt;CSP, tenantID&gt; pairs;</li>
          <li>The effectiveness of this proposed protocol is dependent on the wide adoption by CSPs;</li>
          <li>This header would still be optional both for the organisation injecting it and for the CSPs that interpret it (organisational choice whether to fully restrict access to CSPs that do not implement the proposed E-XTAR verification based on the "global-allowed-tenants-list" header).</li>
          <li>Taking the organisational choice to fully restrict access to CSPs that do not implement the proposed E-XTAR verification, diminishes the need to implement network restrictions.</li>
        </ul>
      </section>
    </section>
    <section anchor="usecases">
      <name>Use Cases</name>
      <t>For the following use cases, letters are used to identify organisations and colleagues, numbers are used to identify CSPs and a combination of &lt;letter, number&gt; specified the tenant owned by the letter entity in the numbered CSP.</t>
      <t>Across the use cases, assume the base scenario:</t>
      <ul>
        <li>The organisation has fully or partially migrated data and processes to the cloud (to a CSP);</li>
        <li>The organisation has a Mobile Device Management (MDM) program to manage the company-owned devices given to each employee;</li>
        <li>Due to data sensitivity, colleagues are restricted to access some of these data and processes through their company-owned devices.</li>
      </ul>
      <section anchor="single-csp-organisation-with-no-controls">
        <name>Single CSP organisation with no controls</name>
        <t>Perhaps the most common, in this scenario the organisation's (lack of) controls allow an employee to connect from the work device both to the organisational tenant (using work credentials) and to personal tenants.</t>
        <ul>
          <li>Organisation A has a single cloud environment on CSP 1, with tenant A1;</li>
          <li>Employee B has personal tenants B1, also hosted in CSP 1, and B2, hosted in an alternative CSP, CSP 2;</li>
          <li>Employee B can access tenant A1 with its organisational account;</li>
          <li>Organisation A has no cross-tenant restriction (XTAR) mechanism in place.</li>
        </ul>
        <t>Because organisation A has no XTARs, employee B can access the organisational tenant A1 from the work device (expected) but it can also access both personal tenants B1 and B2 (malicious).</t>
        <t>Employee B can effectively download data into its work device from organisational tenant A1 and subsequently upload it to personal tenants B1 (hosted in the same CSP as the organisational tenant A1) and B2 (hosted in a different CSP).</t>
        <t><strong>Consequences</strong>:</t>
        <ol type="%d. " group="consequences6">
  <li>Colleagues have personal tenants in CSP 1 and CSP 2 and conduct data exfiltration to both.</li>
        </ol>
      </section>
      <section anchor="single-cloud-organisation-network-restrictions-applied">
        <name>Single-cloud organisation, network restrictions applied</name>
        <t>Following the previous use case, now consider that, because organisation A has a single cloud environment within CSP 1, it implements a network restriction that aids with XTAR:</t>
        <ul>
          <li>Organisation A blocks any traffic going to CSPs other than CSP 1.</li>
        </ul>
        <t>In this scenario, employee B can still access tenant A1 from CSP 1, using its work device. Employee B will not be able to access its tenant B2 from CSP 2, as network traffic is blocked when trying to access CSP 2. However, employee B is still able to connect to personal tenant B1 (hosted in the same CSP as the organisational tenant A1).</t>
        <t>The organisation cannot fully restrict network access to CSPs itself uses. So, if organisation A is using CSP 1, traffic to it will have to be allowed, at a network level.</t>
        <t><strong>Consequences</strong>:</t>
        <ol type="%d. " group="consequences5">
  <li>Colleagues cannot access personal tenants blocked by network traffic restrictions (these exclude organisational tenants' CSPs);</li>
          <li>Governance and configuration effort to keep the network access restrictions up to date is required;</li>
          <li>Colleagues that have personal tenants in the same CSP used by the organisation, can conduct data exfiltration to it.</li>
        </ol>
      </section>
      <section anchor="single-cloud-organisation-csp-xtar-network-restrictions-applied">
        <name>Single-cloud organisation, CSP XTAR &amp; network restrictions applied</name>
        <t>Further building on top of the second use case, consider that CSP 1 (used by organisation A and employee B), allows the organisation to insert metadata in the network traffic, specifying the list of allowed tenants within such CSP 1.</t>
        <ul>
          <li>Organisation A blocks any traffic going to CSPs other than CSP 1;</li>
          <li>Organisation A now inserts a header into the network traffic with destination to CSP 1, specifying the allowed tenant - tenant A1.</li>
        </ul>
        <t>Employee B can still access tenant A1 from CSP 1, using its work device. Employee B will not be able to access either personal tenants, B1 (XTAR implemented by injecting the network header) or B2 (network traffic is still blocked when trying to access CSP 2).</t>
        <t>Shortcomings of this approach include:</t>
        <ul>
          <li>XTAR mechanism of including a list of allowed tenants is not widely adopted and can be improved according to the proposed protocol (in fact, only a single CSP seems to have such a mechanism, and the header is vendor-specific - as in, it is only understandable by that vendor);</li>
          <li>Organisation A will not be able to collaborate or have a multi-cloud environment, or, if it does, it will not be able to introduce the same XTAR mechanism as CSP 1.</li>
        </ul>
        <t><strong>Consequences</strong>:</t>
        <ol type="%d. " group="consequences4">

  <li>Colleagues cannot access personal tenants blocked by network restrictions (these exclude the organisational tenant's CSP);</li>
          <li>Governance and configuration effort to keep the network access restrictions up to date is required;</li>
          <li>Colleagues cannot access personal tenants in CSPs where XTARs are applied;</li>
          <li>Governance and configuration effort to keep these XTARs up to date is required;</li>
          <li>Organisation A is not multi-cloud ready.</li>
        </ol>
      </section>
      <section anchor="single-cloud-organisation-csp-xtar">
        <name>Single-cloud organisation, CSP XTAR</name>
        <t>Consider the scenario where organisation A is still single-cloud and decides to drop the network traffic to other CSPs restrictions, but implements its tenant's CSP's XTARs. This results in less strict access than the previous one but does reduce the Governance required.</t>
        <t><strong>Consequences</strong>:</t>
        <ol type="%d. " group="consequences3">
  <li>Colleagues can access any personal tenants hosted outside the organisation's own tenant's CSP;</li>
          <li>Colleagues cannot access personal tenants where XTARs are being applied (organisation's own tenant's CSP);</li>
          <li>Governance and configuration effort to keep these XTARs up to date is required;</li>
          <li>Organisation A is not multi-cloud ready.</li>
        </ol>
      </section>
      <section anchor="multi-cloud-organisation-csp-xtar-network-restrictions-applied">
        <name>Multi-cloud organisation, CSP XTAR &amp; network restrictions applied</name>
        <t>Changing the scenario to illustrate one of the shortcomings of the third use case:</t>
        <ul>
          <li>Organisation A has a multi-cloud environment, using both CSP 1 and CSP 2, with tenants A1 and A2, respectively;</li>
          <li>Organisation A blocks any traffic going to CSPs other than CSP 1 or CSP 2;</li>
          <li>Only CSP 1 understands the XTAR mechanism where organisation A inserts a header into the network traffic with destination to CSP 1, specifying the allowed tenant - tenant A1.</li>
        </ul>
        <t>Employee B can still access tenant A1 from CSP 1, using its work device. Employee B will not be able to access personal tenant B1 (XTAR implemented by injecting the network header). But because there is no XTAR mechanism understood by CSP 2 and organisation A cannot block network traffic to it (since it hosts an organisational tenant A2 in CSP 2). Employee B will be able to access organisational tenants A1 and A2, but it will also be able to exfiltrate data through its tenant B2, hosted in CSP 2.</t>
        <t>Even if CSP 2 had yet another vendor-specific XTAR mechanism, which is a plausible scenario in the current times, this would add to the governance and implementation effort.</t>
        <t><strong>Consequences</strong>:</t>
        <ol type="%d. " group="consequences2">
  <li>Colleagues cannot access personal tenants blocked by network restrictions (these exclude organisational tenants' CSPs);</li>
          <li>Governance and configuration effort to keep the network access restrictions up to date is required;</li>
          <li>Colleagues cannot access personal tenants in CSPs where XTARs are applied;</li>
          <li>Governance and configuration effort to keep these XTARs up to date is required;</li>
          <li>Being multi-cloud, and unable to apply XTARs to all the CSPs presents gaps: Employee B can access and exfiltrate data to any personal tenant that is both not network traffic restricted and has no XTARs applied;</li>
          <li>Even if we can configure XTARs in all CSPs we use, there is an edge case emerging from identity federation.</li>
        </ol>
      </section>
      <section anchor="edgeCase">
        <name>Edge Case: Multi-cloud organisation, identity federation, CSP XTAR &amp; network restrictions applied</name>
        <t>It's worth defining the below edge case to highlight a potential misperception of the tenant restriction's scope: Tenant restrictions are applied on the IdP' side.</t>
        <ul>
          <li>Organisation A has a multi-cloud environment, using both CSP 1 and CSP 2, with tenants A1 and A2, respectively;</li>
          <li>CSP 1 understands the XTAR mechanism XTAR 1 where organisation A inserts a header into the network traffic with destination to CSP 1, specifying the allowed tenant - tenant A1.</li>
          <li>Organisation A has configured identity federation, nominating CSP 1, tenant A1, to be the Identity Provider (IdP). To access both CSP 1 and CSP 2, the IdP is CSP 1, tenant A1.</li>
          <li>Organisation A has only configured XTAR mechanism XTAR 1 (understood by the IdP tenant A1).</li>
        </ul>
        <t>Employee B can still access tenant A1 from CSP 1, using its work device. Employee B will not be able to access personal tenant B1 (XTAR implemented by injecting the network header). But we shall consider, which Identity Provider is employee B using for its own tenant? Consider the following cases following the scenario described above:</t>
        <ol spacing="normal" type="1"><li>Employee B could have CSP 1 tenant B1 as its central IdP to manage access to tenant B2 on CSP 2;</li>
          <li>Employee B could have CSP 1 tenant B1 as its IdP to manage access to tenant B1 on CSP 1 and CSP 2 tenant B2 as its IdP to manage access to tenant B2 on CSP 2;</li>
          <li>Employee B could have IAM Service Provider 3 as its central IdP to manage access to tenants B1 and B2.</li>
        </ol>
        <t>Case 1, assuming Organisation A has configured mechanism XTAR 1 (understood by the IdP tenant A1), when employee B tries to authenticate to its tenant B2, using CSP 1 as the central IdP, the authentication flow will not go through and the token won't be issued (this is the expected, correct, behaviour).</t>
        <t>Case 2, assuming Organisation A has configured mechanism XTAR 1 (understood by the IdP tenant A1), when employee B tries to authenticate to its tenant B1, using CSP 1 as the IdP, the authentication flow will not go through and the token won't be issued. Issuance of the authentication token by CSP2 to employee B when accessing tenant B2, using CSP 2 as the IdP, depends if CSP 2, itself, supports a mechanism equivalent to CSP 1's XTAR 1. If not, B authenticating to personal tenant B2 goes through.</t>
        <t>Case 3, regardless of Organisation A having configured any kind of XTAR mechanism (understood by the CSPs 1 or CSP 2), when employee B tries to authenticate to its personal tenants, using any external IAM Service Provider 3, the authentication flow will go through and the token will be issued. B authenticating to any personal tenant using an external IdP that is out of the CSP's tenant restrictions' scope is successful.</t>
        <t>This amplifies the need for a mechanism that is widely adopted, as the restrictions should be applied closer to the system performing the authentication and issuing the token.</t>
      </section>
      <section anchor="proposed">
        <name>Multi-cloud organisation, E-XTAR</name>
        <t>Now consider the implementation of the proposed <xref target="protocol"/>, extended-XTAR (E-XTAR), following the scenario:</t>
        <ul>
          <li>Organisation A has a multi-cloud environment on CSP 1 and CSP 2, with tenants A1 and A2, respectively;</li>
          <li>Organisation A blocks any traffic going to CSPs that do not implement an E-XTAR verification based on the "global-allowed-tenants-list" header;</li>
          <li>The "global-allowed-tenants-list" contains either (a) the explicit list of &lt;CSP, tenantID&gt; pairs that are allowed by the organisation or (b) the endpoint that should allow the destiny CSP to retrieve the (centrally managed) allowed tenant list.</li>
        </ul>
        <t>Employee B can access tenants any tenants, as long as these are specified either on (a) the "global-allowed-tenants-list" header explicitly or (b) on the allowed tenants list returned by the endpoint specified in the header.</t>
        <t><strong>Consequences</strong>:</t>
        <ol type="%d. " group="consequences1">
  <li>Network restrictions not required ("traffic only to CSPs that implement the E-XTAR mechanism, allowing header-based validation");</li>
          <li>Governance and configuration effort associated not required;</li>
          <li>Colleagues cannot access tenants not allowed in the E-XTARs configuration;</li>
          <li>Governance and configuration level of effort to keep E-XTARs valid is low-medium: Having to either (1) keep the "global-allowed-tenants-list" updated or (2) specify an endpoint that allows the target CSP to retrieve the allowed list of &lt;CSP, tenantID&gt; pairs;</li>
          <li>Organisation is multi-cloud ready.</li>
        </ol>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The proposed mechanism aims to prevent data exfiltration via the attack vectors specified. Current implementations (and non-implementations) of XTAR are exploitable. E-XTAR aims to make it harder to exploit but requires us to consider factors, such as identity federation, E-XTAR adoption, Bring Your Own Device (BYOD) policies, authentication mechanisms and alternative attack vectors.</t>
      <section anchor="identity-federation">
        <name>Identity federation</name>
        <t>The restriction must be applied at the identity provider (IdP) level. Whichever vendor/CSP is being accessed, the authentication can happen against a range of external identity providers that include other CSPs and identity platforms' IAM products. When applying a tenant restriction mechanism, it shall be applied close to the IdP, where the authentication is happening and the token is being issued.</t>
        <t>An example of this scenario is depicted in <xref target="edgeCase"/>.</t>
      </section>
      <section anchor="proposed-protocol-adoption">
        <name>Proposed protocol adoption</name>
        <t>A CSP/CSP-like service might not adopt the protocol here proposed. To make sure E-XTARs configurations are validated, the organisation can:</t>
        <ul>
          <li>Deny traffic to CSPs that do not implement the proposed protocol (via network restrictions);</li>
          <li>Or (preferably) have a verification step in the protocol. As the authentication request into a CSP is made with the proposed, globally readable optional header, the complete authentication process is only completed if we know for sure that the target CSP has adopted the protocol.</li>
        </ul>
        <t>Elaborating on the latter the organisation would have a choice of only allowing traffic to CSPs that have adopted E-XTAR.</t>
        <t>This could be done by (i) having a central authority maintaining a list of CSPs that adopt the proposed protocol (verification process and management overhead needed) or (ii) implementing a mechanism that verifies if the CSP is adopting and implementing E-XTAR, independent of a central authority.</t>
      </section>
      <section anchor="byod-policies-and-authentication-traffic">
        <name>BYOD policies and authentication traffic</name>
        <t>All mechanisms presented here mostly rely on intercepting devices' modern authentication traffic, in some cases, even accessing the device's admin configuration itself. They, therefore, cannot be applied to personal devices, most of the time.</t>
      </section>
      <section anchor="verifying-e-xtar-implementation">
        <name>Verifying E-XTAR implementation</name>
        <t>To achieve a mechanism that thoroughly verifies if the CSP is adopting and implementing E-XTAR, without relying on a central authority, perhaps a challenge-response mechanism, through which the target CSP can prove that it is implementing the proposed protocol, is worth considering.</t>
      </section>
      <section anchor="alternative-attack-vector-upload-portals">
        <name>Alternative attack vector: Upload portals</name>
        <t>One can consider an actor to create an internet-accessible upload portal (not recognised by typical website classification tools), where it can upload data from its corporate device into it, effectively exfiltrating data from an organisation. This is an attack vector achievable now and not covered by the protocol.</t>
        <t>To tackle this, we always rely on Data Leakage Prevention mechanisms. Alternatively, would need a per-website allow-list, which may be hard to achieve in very dynamic organisations. Plus it includes management overhead.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="rfc7208">
        <front>
          <title>Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1</title>
          <author fullname="S. Kitterman" initials="S." surname="Kitterman"/>
          <date month="April" year="2014"/>
          <abstract>
            <t>Email on the Internet can be forged in a number of ways. In particular, existing protocols place no restriction on what a sending host can use as the "MAIL FROM" of a message or the domain given on the SMTP HELO/EHLO commands. This document describes version 1 of the Sender Policy Framework (SPF) protocol, whereby ADministrative Management Domains (ADMDs) can explicitly authorize the hosts that are allowed to use their domain names, and a receiving host can check such authorization.</t>
            <t>This document obsoletes RFC 4408.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7208"/>
        <seriesInfo name="DOI" value="10.17487/RFC7208"/>
      </reference>
      <reference anchor="rfc6376">
        <front>
          <title>DomainKeys Identified Mail (DKIM) Signatures</title>
          <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
          <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
          <date month="September" year="2011"/>
          <abstract>
            <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
            <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="76"/>
        <seriesInfo name="RFC" value="6376"/>
        <seriesInfo name="DOI" value="10.17487/RFC6376"/>
      </reference>
      <reference anchor="rfc7489">
        <front>
          <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
          <author fullname="E. Zwicky" initials="E." role="editor" surname="Zwicky"/>
          <date month="March" year="2015"/>
          <abstract>
            <t>Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</t>
            <t>Originators of Internet Mail need to be able to associate reliable and authenticated domain identifiers with messages, communicate policies about messages that use those identifiers, and report about mail using those identifiers. These abilities have several benefits: Receivers can provide feedback to Domain Owners about the use of their domains; this feedback can provide valuable insight about the management of internal operations and the presence of external domain name abuse.</t>
            <t>DMARC does not produce or encourage elevated delivery privilege of authenticated email. DMARC is a mechanism for policy distribution that enables increasingly strict handling of messages that fail authentication checks, ranging from no action, through altered delivery, up to message rejection.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7489"/>
        <seriesInfo name="DOI" value="10.17487/RFC7489"/>
      </reference>
      <reference anchor="rfc5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin"/>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
    </references>
    <?line 267?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to the people who helped in the learning and exploring of tenant restrictions.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+Vc+48bx5H+XYD+h8YKF5EGubJWiZNsHCcrrX0RYj1gKecL
DOPQnGmSfRpO86ZndkUI+79fvfoxD64ky+dL7gzD3l1yerrr8dVX1dW9XC7v
3mltW5lzVTZ63S73jSsbu+mMX5q3rW6Wnz+8e0evVo25Olf0l7t3SlfUenf7
I4VuzcY1h3Nl67W7e+fuHbtvzlXbdL49+/zz339+BsM2Rp+r56a9ds2bu3fe
mAP8UJ6rp3Vrmtq0y0scH5/1ra7L/9CVq+GtB+Pv3tnbc/VD64qF8q5pG7P2
8NNhhz/8iE/ort265vzuHQUrVPAPz/ilbhtbWK2+C3PmT81O2+pc7eXjuKI/
w+JaV+Onp4Xb4ch37yyXS6VXvm10QbN7vTXKb+26Va1Tu65q7bKoXFcqU1/Z
Bp42devVqnHdZtuqUrdaVUa/0Ruj9iBX+NS6WhVbXVWm3hiv1q5Rrtno2nqN
n/lThe8ouqaBL6snjfN++drUGn65KArjvfrOeJw6jTT799cX383VzsCQMMTO
q9Kp2rWqcFemUUVjW1voSvkChmis8+p6axqjOm8arwoNc3F1bYq0nn1lVEvv
82qWzwxGAc2oPTyIv8wXaq0LW9kWPq03vFbzdm0rEBZ+/5SltXG6An3Zna10
g29BOVjX+eoAP7q986ZcKPybuTYlvULDOvct/EIaKVzlVbvVrdrqK6NWxtRq
360q67f4fZDHN08UWY1uSs8DwAprd62ubWngNbp0ONxCWY8T2Jpq35e5emPM
Ht5hbMPr6OoSpefqtnEViqwGieEqwSrhUbVz8IYnpPhXprmyhVEvG3cFrwOp
zp68eunnqEfLIl4Z0Ao8uDqAhxRoA1eWRsMv4oxogvj+KJG49IX6+i2oozTl
8r228PWSrGGBE/fWk1rcWmm1qdwKLO4AYtalXoGGt/ADrNDvTWHXB/wivh2+
41AJX8LEFmIFTy+/gvF2K1uLrMKXYDX4zNbtTE+abMDo52qj4RsgkWR9JFK7
6mhusHIcwe724NcaJMOzJYda6k3tYAng9V1twZY9LcDsVuCKmXxOg5fubFlW
Bn+7h6gCbt2RWPAvL3Jl31flARDCFmBPXpkrV13BeLZGPajtYdVYsJTctb1p
abqzh6DUC+W7FfwFpwqw42GltqrYNDcNyAvGYkOCyYHrI7Kg/Pa6PizddQ0f
lwYNBkCMRO59t9uT/twaJA7GAu9akFWwinkSwSXh+w5QC19zbdutvIukbWsa
0Wtbhjeq2RnM+ZXZNGaj5SVqhaaMI+fu3AOwBc8C5FHaBsEBDcr8V2dERy1Y
9gL1BjZvPL21AnCr8LNL9J9vBfNeJsybXX77cq72rgLQNYByF2VpGVaqA4tC
1OJpYbAYrdBJqr51LdD9cFDUmGmWPT9esB6ikaEu2MbIw2T9x2B7wSiDS+uj
g60RXlrLQDfAxKAYmHDEz9uRQc0egVIYHSUQ4hwBUQAvTni8k1P19W5fuYMx
/kFuSRokAPFq2647ElyamxFbyCbEBoovJTe5AJnuQWe62PJSBZxa/QbkOUNz
sLB+ABu0LjApGoQxAtwlevEcJwovNk3LViJoIgaI8RiVXpCIlo2pyFxrDv7A
C/Qah3OwDAIVGGLduB09O+kpbMUoLv4DzNKbak2moOO4sLC3JJD/BIsFSQH7
gEFh8cu4Ap4nOL1FeYtxA6qgwWhb82IgsJB3C84R/oDpw9dAibCstcU/BinD
FPakX3oYrVJcJoZkNauce7Ps9nM0xg1Ah+9AAfwiXhbBbaH3BM3wajJtiJMk
G5sWw/NfgBgKmAvFcloIjGt2oDqYDMT+BYx9pStAgb4m4Gug51P1LUwHnL+F
xy1aAgcUlD6yAgqSzUHwWTAITcPVKAKAK3hxeAGNqOw6LEnGgiFg9h4JjNjE
QKhBfKeBU8EMi+05h0z4FxmMh8CCOLBhW4UnOV6Si0tIPwWoRxrSEmDuDuoN
hP3KlBuz4PlCNHEduiQ9RbNMXGmB6wKLaRfRojAk+MLtDREzQThEBwnnfb4K
fAejNSNgjV6DTxEICx8RnJDARgFcZCSSbbIAHmIaiTtCbpvAC0IuObMisYHX
0rv6LAdgh8jLS0Tag/qmATJM/jF79fIbtVTv3v2pWRe/Pfv8dzc3QBUuHRDe
evlXc4DFRftWz4AFA2T/9emz+MgXj377BTxCk5OnVhqpyjNYB4L9Rd/avjMY
1lF/v1JPHGQGzY5i/Ozy2cV3T9JMfv273+Owfa6H+tywcYcwJy9Vz2FBhK3w
2eyHy+evfvzh4Y/zjDARvzO17xrTxyPbHmj26F6bBn8DtZgKvBVCAMADUn+Y
VwAssKgDeKsGY8R5AM1clmZt64x9nKtXz16/jGv5zaOzhzc3YNQXaMEo9nZ7
QLaP6YNpkJIVHD/BORbsVTj2Ilt9eAUibyS11qNvmAMxWzYGXRF2cNSonUJe
2UA8WrkSaBKKu4i0Lgt+uXGCIX3PvBq9ar83NSIbzgomCu5GQV64t4DzDsAQ
5MbuEvwcJV0mHltAXNC96SPudZrYkUHxWgK64EthXLGbFeA5cnzP4ZMx4ntD
wWrtED+IGXA+gZkZKPNAjkfUHSVpCqYK8F5vCrSDQdCe7eFLGDWRUwJOeaAi
V2bOI1AwyjOZBREe4PBFh1AAMLKB1A3J2ICrJg/m8Mo03KPcAX84vAinCVAe
oZ5EskIDJSe/H9wRpB0IBC0IzB4YO2LuONaCbAExPAEwCDVGVj0ZVwX91hT0
vQBmCCUg7KnoEd4rIMY0EbKKYssmS+uG6eMM3pcowBthNk2wyqkpku4fm0J3
SLTJBjA0JGMCJtiAub+VbAdttzbXNAPi5YDgFeE3qxALCEQBQwxYTKI1qJHA
OWVrgPEYJoLEAtbK0igukTf32SjIMeA7xwjdtrp4AzosWrBXTsUTu2NrqAMr
juE82qLJDBQUNMlEJZOpsYID7pX+PotUH8Z9fPZ4TsIF7DxX27bd+/MHDwDC
/Kl1D8racyL1GGa7aRykw6M0CjQEQxE4Rwfi6aEgiM+uMUsWl2Up8Bc2WJuo
KRg0XYXJwDO0eitZmzlaNwnZw0KoC6KhoRjEolJEipVZrxEBYD5uKKRqRC0p
NspvEA+1Z3SmsTvfkSJiQlK4BoIaKiKwzlBuoGoXEBLi2R5tlezPg41Gcvvu
HZhxAfP1NzdI0vJEJJ9mMPNV5cBYhChQenq9dRWZG+RP8GLJgxKqjJIaNB4s
phA+Rh7MdQdhVe76AZU7yAnQcLCIkNFXeHEw4mwucaxAhEVGAQAWKaWB4DSg
KAkmP2xsTcxJuA/xMIxWuqFvQwIDzzGac6mmn72hdpCBC6PlDBGMC5muq/ox
55Z6V4+y3ruHoNyv1Kh398KPN/gdYKZ9hbMJhArPzU3G9woMgQ7M3uTFEgAq
1uuSZnLMXHyiSMRBp4V6JG2NajM74hPeTIiPihQ8MomPM56pSgfNJPcTCTVk
Fn7rukoSCZnY9KwkLWA9c76KPzOmAdYkKpPyWcphAY+x0JYbesAKwPKqw6SJ
TF6ytZ7Xweo4eaRPhGSF3HZ2IuFM+LtfYkpzMv/IpBcm0BK940Qh+ApPkRAD
h0GbxlJdZKvEEHrxRiiYuINMkgaQZDbLZIcQOMzCAAT7zgvZ9ou6YPYcZs5B
3of3T/ETNaNgKmUPqoZFCjrBJebsEswraOpkGejPwEBwuVNkgw0HPxwlmdMq
ijpgIZFtfQv0sRUDl3qWOqnMRheHk0Tu7975squ+wl2DLyv71UWK+RFvSXlb
KoshYGsB2mMVpj98+QAGigNSYAxKCrrYQRxBGXAog0wfaC4GOF5ioI0NJXko
D0iqIEoSxZG0cW03HRNXVVrUHc4Goqy8/MsHtCjOu0f15lhFZl8rQ3UPRZMB
lpe47gdCelpDFATDzRkvBKnSNcMqzCIVo1ntBwGJnu8mTqCJ2MlYkXCL4Z9w
hXs5aQB9qb8mmLwOT2JWIeWg2UNc9B4pBhaFSDFYdThWFd9rizW9bGtjQlT3
g3POkaPMzuah5k5wVpd7B0uMZYNWN1ggQv8mFAcQhxjfq80He5mczXipkQtR
xTfY+ljtmN+YPVoVTEeMDaP2qPgwfEWGPoTunDquUpoKGSnEhLDCHuIy3HKR
i6w3fCsRlIh++JXhflSxdYg0WRmMvWYi/KURZYMszwwyP2Dr5ywrZqRMMQVk
bjO1oOvTvpD0m4CD0wv4H5r4AvwfkkDcKMtKVBjm4hABG7My1Bgo7qm/YRkZ
eQyQnEhp8KNvRGGMBrhKzNTo8wW4AqB444VKy6u5xnQYsgyCrpQI1d1udfTR
mG7pfGeKnIJfGZ7/KqAJU5UQSDgDkFjKTygJZRJJ+HH4ElJtovTMQKVIGhbI
vIj+ijYSqdsAFF8P7R4LLqxwLB/rRgoRO7tpiDXENEoSUeMDunBMmVEygIF6
7PCjF2n1zK0swOwlU7FnKWDMnl0+o8oZvJeIPgeTWyrxG0QSKhIg6TKyRdGf
xWVHFk2LCKkhyHaR80TUa7A5qR2xxXuqEkiJbFIQW9pcj9RzYpZjA76nXsWA
3ZcQEVYsn/FeL+S9L02z1XvW9Q6iDJWn0JnINmwi6COHBqyfVZjfu/U8DsjA
TWgv0sLVhl33mBtmaSgDZjseP8vleTeaHirATjn78VycxT32cdKSG2SeyKsL
sZJjKSQCH4rt4ULyDNmAftjXetiuUo9pvOEM1GN4HqYIGYTzLReLZFSc8+Oz
RfYBFp8qql5QFk+RDr98dvSVGMYDZob58XRtO8oyMN3q6rY/2IRM0Czykn1z
S+MFTnsPyjcj4wvlKzf5AhwGkMRML+WoAcDqJk1nBgTGoEvN1aqjmEnDodxl
TDKuCe2IGtRsp5EBuc5zgWgg5MgnkJyC11VOC15R3Qmlnc+HJnl0CVRqxu10
2ueAEbs9jWfbKSPGSc6SkfBe9459Wt8urHlcXWZkxI4Nt9lgzsMdP5999iRt
dvvPPkMsx0rFYW/+ePIv5ak6UVgR2//xJNsU91+coMpB8U8SxnGqPFxEsHua
ERl14O3YsDBuo6ESB+gs2ZUbgNpESWAxGdgxW64gFmLYDuGaOQR35MTQtqDu
GSpfI7HjDZnVcTu+BTwksxRXtxl98dnebe5ZXJeypRQT0EHOb4UvKpN5KpyH
ZHXjpNpDVIH3b2BcmcfIRZ8OkH3kj0xqRwBD1i1LY0Qe2H/axYeBKMWluh6w
asx7UtTDx2RYMNI47BnVI4c1BJgoLRk36bFYMNqtpUdP1V+An14hGcoWg4vk
tcgEsvavgal+irvJDuWQjkhdc8B1Yym1z3lljwlMzp+qV47q7gPbs17ELjoI
EiIgyhpzuEoYN/TRvuJbqXGF5/vTXP83E64vC5UVjTAgqA8o6FC5PX+dMQsy
b6l0daRYdp/EFZkgzuRfU4F9XBMABMddEJBJ6HobaqA3h24vZI5qubjBZIFw
5G/L1p3a9KZwr2dCxOqFg/ehS7oSj8OhbUdg+D44xDdSfvSr9yAjYGPXEF6s
OluV3PMHL93HzVODc8ugsgeTgu2zsLqBwaI2kjfidgMVUcaZMdUiscEGGEar
Jb72dCUGsxj28B3ptAhATC0QjILq50XVW+kUxhNekM/7hYTkDp2AgJ9LpVEc
4uJHOhYFepYJg0Yg//UvC+lSVBr6wYJglUwxRkI2lVQMyUWSFY+QvkzEAim4
vD8iCCq/2oL78+5wKgilOjuXyQcRd7AlRC1K+L3Jjqnk8tzIM9j8IUTixjPp
r6GOX9eUWU/oRF3Shk4faexJJVjcZdv5uDshvUjZHq/sSEa786Oa5BJDmq2Z
oXh+RdoVC3vz5OH86PxWc5+yC8x+9Yp3RUCb3MZ0rFSMvW1hb750hveSp0ZN
BdKIrgNlaX+E9UyEuw8KeL8+occ/OeTdFuqOsov7vlf3+F+Ndu9ZMtPe0HFP
iR7vpnGs+YQl+DDc+6f7YsSYcMq51WEZ/vDTAyp+9UkKgakIJuseUzYGLJ+P
jYsOTY24IPD+ycCA+5gEqyTYXHMLzndTcpEoNZsM/JdkJjtm8CzIgJRUUd2p
X3fFqNZLjah/v2NnhIejx2WaC+I//elc8tE0l0xtmIexmQlFd12LOpgqSkGa
3hPFTzPnoRnLdhwbc780P/HOT/HYX8DcwdifHdle/yjy+AQMZxNieCoUAk5X
VcfNanyGRMjkKBajAm2T+OXtqS8n30djCBMYqvgMag69Wp4PtZiLM9yVw6DI
FZ5bY9xHE0SMehNVvBcYa/kLKeIyJR5EsmlA+X/FKqdy9I8mk6fqcdfGek7e
pzMQuOjDuVJ2/6RYNVBBr11pArJx585jLx3+hHDlj3evXZyFChny1aFQxgI5
0taSGbTUQel5KoRmgww768LmQq8esxiUrM+4LnrF3ZAsla0ue83CQ37ZF2zs
SUGz3VegBosTinghqV44BNjaHR8Xsl42WXUZT7Zs+lga7SAH008pb5z9LOWN
f+6yxj8D0XtM4TgLBZz2dHV0GJjNQYbDX7nXiGcujTRebfTen6vpjRUqXgwd
xk2REtm6l80GFN2xMpfkg/lmyJTYgrNxC3AUW5AOVvPD8ZBr2qHN2g9x06Lc
cDRV4BrNJvZF29DBtDYAdHx6cYIZfI2P4/b3+S0kYWKsD2YO6t09nCK+glsH
kTTR6QE+DhBwfGVwKzGtBjNeu9lWeB4MkSQ0taudBeRpsPEz65Ub72Ldl8Mu
5+r16LOeCYfmh6fly/sKaeaHbCj+QrTkg6gD/frwH4lBHBVcNO5y2qZqpIt8
bC6UvcPYC6l0s6pG3XmgPTxH198KHGlA9IyuMxz/vXOnukm2gGktzPq8Irww
2z74v8OyrpHka27L9HyIg2P/WD8g8GynhhdAp9DaPJ36k+pl26nxhnpSst97
GQgYbdHYFcLtCkIQlXoe9sRRELGgqhSbRFq75mw6nDAiXcVekbRrkzawpGPg
7A/AO84+8i3vG/1h7EfIdlDTqz9wlGyOd+88OjbFpxfPRqd41aOPk0e2t068
EUGeuh6wdwj1dDsEfLzzLLgGnJkSdhFyzE9duFw87NPcbC8t7PBla1xMNfKu
K7pmQTxp4yKDDiVX6e6FWEOORudHsYFJDnriV0LLAm6lNHh2FveasXvUdc08
yezsH09mDydl9vPK6lQ9hf/rePJ+upda8rMzPr+VMA5XxRZJkDCl67PevLkJ
1MfMJh2N9d0eD3T6vLSukIhe6YqyFImFUmjDDaanaz7A9Lg3Zy4RjDD2DESS
+ruS3h9h8N/opqykg3WkfOozzvSPjPSNrakLeRCBJiyBWGMqTnysLYw3eFi0
OIl4BGsaSN5jJcctRFLhYCBT4p1i5WFi2bzQC4Sru64NFsbl0jFfhKSMD0dj
Fbcjs1p3VXZaA2SG3ZaDA9G5wYS3Da9mERvsEVA5L7JKNBTIpDex1dofIC3f
4TLxcPGRowaUFIOgwsd8CP69NT9pp6UzPXxeBx953m+LMcN0W+QXd6/ouA8f
CbpZSEe9KXnodF3LdMz+hMrfRIj8JQp+013KYG8/S1P1uNX19qfkHEzciZ3p
eQg31OJ/eye9tCE1ZniMtZc8YEv/SoYNvfz5USfu/cSPOWs4TLb2zyTKYgsw
kYhyPkwg6K6I97DiHh8WPQVMAmupHDp/frwxNUeLiLCvUaT0IRrJT0uIJESf
w51gEjWsuWuyzusosTQPm59y+YR9lIehaPV8KutG+wwlFDU7iReSyPnn7PBB
r9VerDjfVw5+yxOW+xDoagyyj5OPLl9l1/vks/ygulQQNv1JFCAC5an7/js/
eG7xbp9BgSqMyneBWDSx6+XOlLbbnau/cFhGPpKO18TS3O3m1e1LEsEtJ2bS
6VUOHD/XyZkR7ln/IdtHEN2Ljq6UCNkZH2wYnbPK9uUt9yzI+eaJVqcrq3kB
+alxn9zlVD2RCnE/DHm+y6d29XLwwTxSIjo6De7rLN08cBqsO8xqh7eLYLke
iJfcMMPfpnq62CW230kTIYdEbNCAKS6kB8NPVzDCq+RkEfBDOsn2d+D76gUk
unJQYfb47y8u59mh70Fkzy69o8MgWcd4X2Ih2j8dTyb2KeYdqOEIXmAdcv1F
XMu+V1EJHYTfY1qPDZdS/H8g1yD0jy1Ocj5Eb76AQ+kNxiys5jW63hDnj2xt
NIF4RkoK6WlrnFhP/HqlW2RIQN+QiO75bjS6/cPUXBfmRp6JPvcM7WwrpYwh
IQt8jBIILrFNLNKGS0bCRQ2J0EYpCaOVy6rMWySU8caxbH+EDqtx+djiMetY
Pb05jc0L4wPa8SgbXtACYkINAeK8SWdWd1RJJQDNr+Tjx2lhwZGpjkZOQvfM
TAIsl1AlHATVDxtiBzTv0mT06iOOf6U+KUSNqWLzqGNJzQB61uAIq+owD/1I
PY4G9HofQki8cE9d+Cn1xqtH6nA4iaAT4mI6np7uexzfSDg4cM3CwuM9lWlH
L4sXdMSSI3+vlE0CvAaKrzzgS4DEg7MgQfxZOtJ6yxuRLGnaCp2g2GKp6cjY
SJvXqXKkw9E+PH5dhyPXFBCndJvfaSW2lLKqImRB4RLJmZ2n07WhQsO3oKK7
4y1J4+vMsjsfjt82CdaT6z+ImW4fSMfGkCuglijDQ7KKcdrCpKJt8qsHWR8P
bXw41h2uiSGvFEzojcCCWNCNdPFo6npqzQHhMWLEgMFRYVAsEekTwgCUZTFE
9sBAGuToePSL7BPJrdw2SBsqeNcpnzO7D18CUx3flBNac7HfFs+zyXFBuq4j
q8Zsw/UI91EKkMAOeFc64m8OsqGFV6os4oZ7wuG8oBLvl6TTa2Hzx+5MkNK/
0RVCScID+kCGh7XwLVGokR5R5liVAMH8ZJUiJDgiEhx7XD2l1gUuig7j6XRn
7hITVuT6/Vt8uFAiV9r1fR3DKzWaSrikAkRvWpPOQJdf8S5cIDjw3SDEi2N0
41z9jU8x0a2meKLwRR23LZkmUbKGNwAhdwIERIATE8O75cREEBW7fCg145yg
cBtYtSRShz1d8HttVt62eAIHUojkwa1zlZ+HqCzHwWTQdJcQVbOHV3bIea5F
78hX4qfhyt+py4hO40V+uNLenUdsVYT4NR2LLNN1xSk17N3uCraII1TUGoV3
/yClv9YHH53z2J2jybtPc33hvZmM1VSi0mhlyyBAAmrKQ8JOzU7TpRTIhHmP
iP0C3JUunwq3yQ5ucX5ZdZ6v05R7RyYANJAVoGXPLyYzh/zaMdkkp+9qOaod
br9dgYB4qIsi3oFIjZB377w7D8eZ/3iyBoM0Jzc8uK7fxIPFe+OQal1v+X7k
lDriTTmRslEO0Mi9whP1QWw0+W9jDAXOaVwAAA==

-->

</rfc>
