<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.4 (Ruby 2.6.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-richardson-saag-onpath-attacker-03" category="info" updates="4949" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.1 -->
  <front>
    <title abbrev="MITM">A taxonomy of eavesdropping attacks</title>
    <seriesInfo name="Internet-Draft" value="draft-richardson-saag-onpath-attacker-03"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="J." surname="Hoyland" fullname="Jonathan Hoyland">
      <organization>Cloudflare Ltd.</organization>
      <address>
        <email>jhoyland@cloudflare.com</email>
      </address>
    </author>
    <date year="2022" month="October" day="23"/>
    <area>Security</area>
    <workgroup>Security Area Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>The terms on-path attacker and Man-in-the-Middle Attack have been used in a variety of ways, sometimes interchangeably, and sometimes meaning different things.</t>
      <t>This document offers an update on terminology for network attacks.
A consistent set of terminology is important in describing what kinds of attacks a particular protocol defends against, and which kinds the protocol does not.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>A number of terms have been used to describe attacks against networks.</t>
      <t>In the <xref target="dolevyao"/> paper, the attacker is assumed to be able to:</t>
      <ul spacing="normal">
        <li>view messages as they are transmitted</li>
        <li>selectively delete messages</li>
        <li>selectively insert or modify messages</li>
      </ul>
      <t>Some authors refer to such an attacker as an "on-path" attacker [reference], or a "Man-in-the-Middle" [reference].
This type of attack is also refered to as a "monster-in-the-middle" attack.</t>
      <t>Despite a broad consensus on what is meant by a MITM attack, there is less agreement on the how to describe its variants.
The term "passive attacker" has been used in many cases to describe situations where the attacker can only observe messages, but can not intercept, modify or delete any messages.</t>
      <t>Another variant is the case where an eavesdropper is not on the network path between the actual correspondants, and thus cannot drop messages, they may be able to inject packets faster than the correspondants, and thus beat legitimate packets in a race.</t>
      <t>As summarised, there are three broad  variations of the MITM attacker:</t>
      <ol spacing="normal" type="1"><li>An on-path attacker that can view, delete and modify messages.  This is the Dolev-Yao attack.</li>
        <li>An off-path attacker that can view messages and insert new messages.</li>
        <li>An off-path attacker that can only view messages.</li>
      </ol>
    </section>
    <section anchor="three-kinds-of-attack">
      <name>Three kinds of attack</name>
      <t>The attacks are numbered in this section as no consensus on naming the attacks yet.
In the diagrams below, the sender is named "Alice", and the recipient is named "Bob",
as is typical in many cryptographic protocols <xref target="alicebob"/>, as first introduced by <xref target="digisign"/>.</t>
      <t>The attacker is named "Mallory"</t>
      <figure anchor="alicebobdiag">
        <name>Alice communicating with Bob</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="80" width="288" viewBox="0 0 288 80" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
              <path d="M 72,32 L 72,64" fill="none" stroke="black"/>
              <path d="M 232,32 L 232,64" fill="none" stroke="black"/>
              <path d="M 280,32 L 280,64" fill="none" stroke="black"/>
              <path d="M 8,32 L 72,32" fill="none" stroke="black"/>
              <path d="M 232,32 L 280,32" fill="none" stroke="black"/>
              <path d="M 80,48 L 224,48" fill="none" stroke="black"/>
              <path d="M 8,64 L 72,64" fill="none" stroke="black"/>
              <path d="M 232,64 L 280,64" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="232,48 220,42.4 220,53.6 " fill="black" transform="rotate(0,224,48)"/>
              <g class="text">
                <text x="40" y="52">Alice</text>
                <text x="256" y="52">Bob</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
.-------.                   .-----.
| Alice |------------------>| Bob |
'-------'                   '-----'
]]></artwork>
        </artset>
      </figure>
      <section anchor="first-kind-of-attack">
        <name>First Kind of attack</name>
        <t>In this attack, the attacker is involved with the forwarding of the packets.
A firewall or network router is ideally placed for this attack.</t>
        <figure anchor="firstkind">
          <name>The first kind of attack</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="80" width="328" viewBox="0 0 328 80" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,64" fill="none" stroke="black"/>
                <path d="M 128,32 L 128,64" fill="none" stroke="black"/>
                <path d="M 208,32 L 208,64" fill="none" stroke="black"/>
                <path d="M 272,32 L 272,64" fill="none" stroke="black"/>
                <path d="M 320,32 L 320,64" fill="none" stroke="black"/>
                <path d="M 8,32 L 72,32" fill="none" stroke="black"/>
                <path d="M 128,30 L 208,30" fill="none" stroke="black"/>
                <path d="M 128,34 L 208,34" fill="none" stroke="black"/>
                <path d="M 272,32 L 320,32" fill="none" stroke="black"/>
                <path d="M 80,48 L 120,48" fill="none" stroke="black"/>
                <path d="M 216,48 L 264,48" fill="none" stroke="black"/>
                <path d="M 8,64 L 72,64" fill="none" stroke="black"/>
                <path d="M 128,62 L 208,62" fill="none" stroke="black"/>
                <path d="M 128,66 L 208,66" fill="none" stroke="black"/>
                <path d="M 272,64 L 320,64" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="272,48 260,42.4 260,53.6 " fill="black" transform="rotate(0,264,48)"/>
                <g class="text">
                  <text x="40" y="52">Alice</text>
                  <text x="168" y="52">Mallory</text>
                  <text x="296" y="52">Bob</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
.-------.      .=========.       .-----.
| Alice |------| Mallory |------>| Bob |
'-------'      '========='       '-----'
]]></artwork>
          </artset>
        </figure>
        <t>In this case Mallory can:</t>
        <ul spacing="normal">
          <li>view all packets</li>
          <li>selectively forward or drop any packet</li>
          <li>modify any packets that is forwarded</li>
          <li>insert additional packets</li>
        </ul>
      </section>
      <section anchor="second-kind-of-attack">
        <name>Second Kind of attack</name>
        <t>In this attack, the attacker is not involved with the forwarding of the packets.
The attacker receives a copy of packets that are sent.
This could be from, for instance, a mirror port or SPAN <xref target="span"/>.
Alternatively, a copy of traffic may be obtained via passive (optical) tap <xref target="fibertap"/>.
This kind of attack is often associated with Pervasive Monitoring <xref target="RFC7258"/>.</t>
        <figure anchor="secondkind">
          <name>The second kind of attack</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="144" width="328" viewBox="0 0 328 144" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,64" fill="none" stroke="black"/>
                <path d="M 112,96 L 112,128" fill="none" stroke="black"/>
                <path d="M 152,48 L 152,80" fill="none" stroke="black"/>
                <path d="M 192,96 L 192,128" fill="none" stroke="black"/>
                <path d="M 272,32 L 272,64" fill="none" stroke="black"/>
                <path d="M 320,32 L 320,64" fill="none" stroke="black"/>
                <path d="M 8,32 L 72,32" fill="none" stroke="black"/>
                <path d="M 272,32 L 320,32" fill="none" stroke="black"/>
                <path d="M 80,48 L 264,48" fill="none" stroke="black"/>
                <path d="M 8,64 L 72,64" fill="none" stroke="black"/>
                <path d="M 272,64 L 320,64" fill="none" stroke="black"/>
                <path d="M 112,94 L 192,94" fill="none" stroke="black"/>
                <path d="M 112,98 L 192,98" fill="none" stroke="black"/>
                <path d="M 112,126 L 192,126" fill="none" stroke="black"/>
                <path d="M 112,130 L 192,130" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="272,48 260,42.4 260,53.6 " fill="black" transform="rotate(0,264,48)"/>
                <polygon class="arrowhead" points="160,80 148,74.4 148,85.6 " fill="black" transform="rotate(90,152,80)"/>
                <g class="text">
                  <text x="40" y="52">Alice</text>
                  <text x="296" y="52">Bob</text>
                  <text x="152" y="116">Mallory</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
.-------.                        .-----.
| Alice |---------.------------->| Bob |
'-------'         |              '-----'
                  v
             .=========.
             | Mallory |
             '========='
]]></artwork>
          </artset>
        </figure>
        <t>In this case Mallory can:</t>
        <ul spacing="normal">
          <li>view all packets</li>
        </ul>
      </section>
      <section anchor="second-kind-of-attack-with-bypass">
        <name>Second Kind of attack with bypass</name>
        <t>In some cases, Mallory may be able to send messages to Bob via another route which due to some factor will arrive at Bob prior to the original message from Alice.</t>
        <figure anchor="racedkind">
          <name>The second kind of attack with bypass</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="176" width="360" viewBox="0 0 360 176" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,64" fill="none" stroke="black"/>
                <path d="M 80,128 L 80,160" fill="none" stroke="black"/>
                <path d="M 120,56 L 120,112" fill="none" stroke="black"/>
                <path d="M 160,128 L 160,152" fill="none" stroke="black"/>
                <path d="M 200,48 L 200,112" fill="none" stroke="black"/>
                <path d="M 224,32 L 224,96" fill="none" stroke="black"/>
                <path d="M 264,32 L 264,112" fill="none" stroke="black"/>
                <path d="M 288,48 L 288,112" fill="none" stroke="black"/>
                <path d="M 304,32 L 304,64" fill="none" stroke="black"/>
                <path d="M 336,72 L 336,144" fill="none" stroke="black"/>
                <path d="M 352,32 L 352,64" fill="none" stroke="black"/>
                <path d="M 8,32 L 72,32" fill="none" stroke="black"/>
                <path d="M 248,32 L 264,32" fill="none" stroke="black"/>
                <path d="M 304,32 L 352,32" fill="none" stroke="black"/>
                <path d="M 80,48 L 192,48" fill="none" stroke="black"/>
                <path d="M 8,64 L 72,64" fill="none" stroke="black"/>
                <path d="M 304,64 L 352,64" fill="none" stroke="black"/>
                <path d="M 200,112 L 224,112" fill="none" stroke="black"/>
                <path d="M 80,126 L 160,126" fill="none" stroke="black"/>
                <path d="M 80,130 L 160,130" fill="none" stroke="black"/>
                <path d="M 168,144 L 336,144" fill="none" stroke="black"/>
                <path d="M 80,158 L 160,158" fill="none" stroke="black"/>
                <path d="M 80,162 L 160,162" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="344,72 332,66.4 332,77.6 " fill="black" transform="rotate(270,336,72)"/>
                <polygon class="arrowhead" points="272,88 260,82.4 260,93.6 " fill="black" transform="rotate(90,264,88)"/>
                <polygon class="arrowhead" points="232,112 220,106.4 220,117.6 " fill="black" transform="rotate(0,224,112)"/>
                <polygon class="arrowhead" points="128,112 116,106.4 116,117.6 " fill="black" transform="rotate(90,120,112)"/>
                <g class="text">
                  <text x="236" y="36">-&gt;</text>
                  <text x="40" y="52">Alice</text>
                  <text x="296" y="52">&gt;</text>
                  <text x="328" y="52">Bob</text>
                  <text x="276" y="116">-&gt;</text>
                  <text x="112" y="148">Mallory</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
.-------.                  .->--.    .-----.
| Alice |---------------|  |    |  .>| Bob |
'-------'     |         |  |    |  | '-----'
              |         |  |    v  |     ^
              |         |  |    |  |     |
              v         '-->    '->|     |
         .=========.                     |
         |Mallory  |---------------------'
         '=========.
]]></artwork>
          </artset>
        </figure>
        <t>In that case Mallory can:</t>
        <ul spacing="normal">
          <li>view all packets</li>
          <li>insert additional/copied packets into the stream</li>
        </ul>
        <t>But Mallory will be unable to drop or modify the original packets.
Bob however, may be unable to distinguish packets from Alice vs packets sent from Mallory that purport to be from Alice.</t>
      </section>
      <section anchor="third-kind-of-attack">
        <name>Third Kind of attack</name>
        <t>The third kind of attack is one in which Mallory can not see any packets from Alice.
This is usually what is meant by an "off-path" attack.
Mallory can usually forge packets purporting to be from Alice, but can never see Alice's actual packets.</t>
        <figure anchor="thirdkind">
          <name>The third kind of attack</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="176" width="360" viewBox="0 0 360 176" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,64" fill="none" stroke="black"/>
                <path d="M 304,32 L 304,64" fill="none" stroke="black"/>
                <path d="M 336,72 L 336,144" fill="none" stroke="black"/>
                <path d="M 352,32 L 352,64" fill="none" stroke="black"/>
                <path d="M 8,32 L 72,32" fill="none" stroke="black"/>
                <path d="M 304,32 L 352,32" fill="none" stroke="black"/>
                <path d="M 80,48 L 296,48" fill="none" stroke="black"/>
                <path d="M 8,64 L 72,64" fill="none" stroke="black"/>
                <path d="M 304,64 L 352,64" fill="none" stroke="black"/>
                <path d="M 168,144 L 336,144" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="344,72 332,66.4 332,77.6 " fill="black" transform="rotate(270,336,72)"/>
                <polygon class="arrowhead" points="304,48 292,42.4 292,53.6 " fill="black" transform="rotate(0,296,48)"/>
                <circle cx="80" cy="128" r="6" class="closeddot" fill="black"/>
                <circle cx="80" cy="144" r="6" class="closeddot" fill="black"/>
                <circle cx="80" cy="160" r="6" class="closeddot" fill="black"/>
                <circle cx="88" cy="128" r="6" class="closeddot" fill="black"/>
                <circle cx="88" cy="160" r="6" class="closeddot" fill="black"/>
                <circle cx="128" cy="128" r="6" class="closeddot" fill="black"/>
                <circle cx="128" cy="160" r="6" class="closeddot" fill="black"/>
                <circle cx="152" cy="128" r="6" class="closeddot" fill="black"/>
                <circle cx="152" cy="160" r="6" class="closeddot" fill="black"/>
                <circle cx="160" cy="128" r="6" class="closeddot" fill="black"/>
                <circle cx="160" cy="144" r="6" class="closeddot" fill="black"/>
                <circle cx="160" cy="160" r="6" class="closeddot" fill="black"/>
                <g class="text">
                  <text x="40" y="52">Alice</text>
                  <text x="328" y="52">Bob</text>
                  <text x="108" y="132">****</text>
                  <text x="140" y="132">**</text>
                  <text x="120" y="148">Mallory</text>
                  <text x="108" y="164">****</text>
                  <text x="140" y="164">**</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
.-------.                            .-----.
| Alice |--------------------------->| Bob |
'-------'                            '-----'
                                         ^
                                         |
                                         |
         ***********                     |
         * Mallory *---------------------'
         ***********
]]></artwork>
          </artset>
        </figure>
        <t>In this case Mallory can:</t>
        <ul spacing="normal">
          <li>insert additional packets</li>
        </ul>
      </section>
    </section>
    <section anchor="three-proposals-on-terminology">
      <name>Three proposals on terminology</name>
      <t>This document aspires to pick a single set of terms and explain them.</t>
      <section anchor="quic-terms">
        <name>QUIC terms</name>
        <t><xref target="quic"/> ended up with a different taxonomy:</t>
        <ul spacing="normal">
          <li>on-path   [Dolev-Yao]</li>
          <li>Limited on-path (cannot delete)</li>
          <li>Off-path</li>
        </ul>
      </section>
      <section anchor="maloryman-in-various-places">
        <name>Malory/Man in various places</name>
        <t><xref target="malory"/> proposes:</t>
        <ul spacing="normal">
          <li>man-in-the-middle   [Dolev-Yao]</li>
          <li>man-on-the-side</li>
          <li>man-in-the-rough</li>
        </ul>
        <t>Alternatively:</t>
        <ul spacing="normal">
          <li>Malory-in-the-middle   [Dolev-Yao]</li>
          <li>Malory-on-the-side</li>
          <li>Malory-in-the-rough</li>
        </ul>
      </section>
      <section anchor="council-of-attackers">
        <name>Council of Attackers</name>
        <t><xref target="alliteration"/> proposes the "the council of attackers"</t>
        <ul spacing="normal">
          <li>malicious messenger [Dolev-Yao: who rewrites messages sent]</li>
          <li>oppressive observer [who uses your information against you]</li>
          <li>off-path attacker</li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document introduces a set of terminology that will be used in many Security Considerations sections.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no IANA requests.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The SAAG mailing list.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC4949" target="https://www.rfc-editor.org/info/rfc4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author fullname="R. Shirey" initials="R." surname="Shirey">
              <organization/>
            </author>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="36"/>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="dolevyao" target="https://www.cs.huji.ac.il/~dolev/pubs/dolev-yao-ieee-01056650.pdf">
          <front>
            <title>On the Security of Public Key Protocols</title>
            <author>
              <organization/>
            </author>
            <date year="1983"/>
          </front>
        </reference>
        <reference anchor="quic" target="https://mailarchive.ietf.org/arch/msg/saag/wTtDYlRAADMmgqd6Vhm8rFybr_g/">
          <front>
            <title>QUIC terms for attacks</title>
            <author>
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="malory" target="https://mailarchive.ietf.org/arch/msg/saag/b26jvEz4NRHSm-Xva6Lv5-L8QIA/">
          <front>
            <title>Man-in-the-Middle</title>
            <author>
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="span" target="https://en.wikipedia.org/wiki/Port_mirroring">
          <front>
            <title>Port Mirroring</title>
            <author>
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="fibertap" target="https://en.wikipedia.org/wiki/Room_641A">
          <front>
            <title>Fiber Tap</title>
            <author>
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="alliteration" target="https://mailarchive.ietf.org/arch/msg/saag/R0uevzT0Vz9uqqaxiu98GtK1rks/">
          <front>
            <title>Council of Attackers</title>
            <author>
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="alicebob" target="https://en.wikipedia.org/wiki/Alice_and_Bob">
          <front>
            <title>Alice and Bob</title>
            <author>
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="digisign" target="https://doi.org/10.1145/359340.359342">
          <front>
            <title>A method for obtaining digital signatures and public-key cryptosystems</title>
            <author initials="R. L." surname="Rivest" fullname="R. L. Rivest">
              <organization>MIT Lab. for Computer Science and Department of Mathematics, Cambridge, MA</organization>
            </author>
            <author initials="A." surname="Shamir" fullname="A. Shamir">
              <organization>MIT Lab. for Computer Science and Department of Mathematics, Cambridge, MA</organization>
            </author>
            <author initials="L." surname="Adleman" fullname="L. Adleman">
              <organization>MIT Lab. for Computer Science and Department of Mathematics, Cambridge, MA</organization>
            </author>
            <date year="1978" month="February"/>
          </front>
        </reference>
        <reference anchor="RFC7258" target="https://www.rfc-editor.org/info/rfc7258">
          <front>
            <title>Pervasive Monitoring Is an Attack</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="May" year="2014"/>
            <abstract>
              <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="188"/>
          <seriesInfo name="RFC" value="7258"/>
          <seriesInfo name="DOI" value="10.17487/RFC7258"/>
        </reference>
      </references>
    </references>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="E." surname="Rescola" fullname="Eric Rescola">
        <organization/>
        <address>
          <email>ekr@rtfm.com</email>
        </address>
      </contact>
      <contact initials="L." surname="Berger" fullname="Lou Berger">
        <organization/>
        <address>
          <email>lberger@labn.net</email>
        </address>
      </contact>
      <contact initials="A." surname="DeKok" fullname="Alan DeKok">
        <organization/>
        <address>
          <email>aland@deployingradius.com</email>
        </address>
      </contact>
      <contact initials="C." surname="Huitema" fullname="Christian Huitema">
        <organization/>
        <address>
          <email>huitema@huitema.net</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
