<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wesplaap-deleg-01" category="std" consensus="true" submissionType="IETF" updates="1035" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="DELEG">Extensible Delegation for DNS</title>
    <seriesInfo name="Internet-Draft" value="draft-wesplaap-deleg-01"/>
    <author initials="T." surname="April" fullname="Tim April">
      <organization>Google, LLC</organization>
      <address>
        <email>ietf@tapril.net</email>
      </address>
    </author>
    <author initials="P." surname="Špaček" fullname="Petr Špaček">
      <organization>ISC</organization>
      <address>
        <email>pspacek@isc.org</email>
      </address>
    </author>
    <author initials="R." surname="Weber" fullname="Ralf Weber">
      <organization>Akamai Technologies</organization>
      <address>
        <email>rweber@akamai.com</email>
      </address>
    </author>
    <author initials="D." surname="Lawrence" fullname="David C Lawrence">
      <organization>Salesforce</organization>
      <address>
        <email>tale@dd.org</email>
      </address>
    </author>
    <date/>
    <area>Internet</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 113?>
<t>A delegation in the Domain Name System (DNS) is a mechanism that enables efficient and distributed management of the DNS namespace. It involves delegating authority over subdomains to specific DNS servers via NS records, allowing for a hierarchical structure and distributing the responsibility for maintaining DNS records.</t>
      <t>An NS record contains the hostname of the nameserver for the delegated namespace. Any facilities of that nameserver must be discovered through other mechanisms. This document proposes a new extensible DNS record type, DELEG, which contains additional information about the delegated namespace and the capabilities of authoritative nameservers for the delegated namespace.</t>
    </abstract>
  </front>
  <middle>
    <?line 117?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In the Domain Name System <xref target="STD13"/>, subdomains within the domain name hierarchy are indicated by delegations to servers which are authoritative for their portion of the namespace.  The DNS records that do this, called NS records, contain hostnames of nameservers, which resolve to addresses.  No other information is available to the resolver. It is limited to connect to the authoritative servers over UDP and TCP port 53. This limitation is a barrier for efficient introduction of new DNS technology.</t>
      <t>The proposed DELEG record type remedies this problem by providing extensible parameters to indicate capabilities that a resolver may use for the delegated authority, for example that it should be contacted using a transport mechanism other than DNS over UDP or TCP on port 53.</t>
      <t>DELEG records are served with NS and DS records in the Authority section of DNS delegation type responses.  Standard behavior of legacy DNS resolvers is to ignore the DELEG type and continue to rely on NS and DS records (see compliance testing described in Appendix A).  Resolvers that do understand DELEG and its associated parameters can efficiently switch to the new mechanism.</t>
      <t>The DELEG record leverages the Service Binding (SVCB) record format defined in <xref target="RFC9460"/>, using a subset of the already defined service parameters, however as DELEG creates a zone cut and requires special processing from authoritative name servers as well as resolvers it has to be a new record type similar in handling to the DS record type.</t>
      <t>DELEG can use AliasMode, inherited from SVCB, to insert a level of indirection to ease the operational maintenance of multiple zones by the same servers.  For example, an operator can have numerous customer domains all aliased to nameserver sets whose operational characteristics can be easily updated without intervention from the customers.  Most notably, this provides a method for addressing the long-standing problem operators have with maintaining DS records on behalf of their customers. This type of facility will be handled in separate documents.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in <br/>
BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in
all capitals, as shown here.</t>
        <t>Terminology regarding the Domain Name System comes from <xref target="BCP219"/>, with addition terms defined here:</t>
        <ul spacing="normal">
          <li>
            <t>legacy name servers: An authoritative server that does not support the DELEG record.</t>
          </li>
          <li>
            <t>legacy resolvers: A resolver that does not support the DELEG record.</t>
          </li>
        </ul>
      </section>
      <section anchor="motivation-and-design-requirements-for-deleg">
        <name>Motivation and Design Requirements for DELEG</name>
        <t>NS based delegation supports DNS over UDP and TCP, but does not have the ability to provide additional connection information like how to contact an authoritative server over an encrypted transport or which port to use when contacting the delegated server. DELEG was designed to support communicating this type of information and more, taking into account various design goals and tradeoffs. The design requirements for DELEG were:</t>
        <ul spacing="normal">
          <li>
            <t>Deliberate and Extensible Protocol: A distinct DNS record served from the parent was selected to provide a deliberate and new signal that additional information was available for how a resolver can communicate with an authoritative nameserver. The record existing in the parent eliminates the need for a resolver to send additional queries to a delegated authoritative nameserver in an attempt to learn connection parameters. Introducing a new resource record type rather than using reserved fields from another record type enables future expansion of functionality beyond one or a small number of bits of information for a delegation. This tradeoff does have the limitation that adoption at the root and TLD levels of the hierarchy may be delayed, but this approach can lead to a cleaner and easier to support solution.</t>
          </li>
          <li>
            <t>Extensibility: DELEG as described in this document could be implemented through an existing Resource Record like the TXT record, but doing so would limit the ability to build on the record in the future. To support extending the data that can be communicated, the SVCB record format was used for DELEG to support future growth.</t>
          </li>
          <li>
            <t>Support for Abstract Delegation: the SVCB record format has support for an Alias Form record. In the case of DELEG, the AliasForm record enables a domain owner to indicate that their zone will be hosted elsewhere, like a DNS service provider, in a way that enables the service provider to update their authoritative information without coordination with the domain owner, domain registrar.</t>
          </li>
          <li>
            <t>Authenticated and Parent Centric: While NS records are authoritative at the child, some resolver algorithms are parent centric while others are child centric. With DELEG, this ambiguity is removed and parent centricity and authority is specified. This decision also enables the records to be signed in the parent zone, reducing the potential risk of a denial of service for clients when being delegated. Additionally, a parent centric record is required to support resolution with a cold cache and duplication of data in the child zone can lead to inconsistencies as the records change over time.</t>
          </li>
          <li>
            <t>Able to coexist in the ecosystem: DELEG is defined as being a record in the parent, signifying a zone cut. As a result of that design decision, additional effort and time will be required to deploy DELEG to all levels of the DNS hierarchy, especially when considering the Root zone and TLDs. To support the deployment, DELEG must be able to coexist within the ecosystem with the existing NS based methods of resolution. Testing has been done to show that many deployed resolvers can handle DELEG and NS records side-by-side to enable a rollout.</t>
          </li>
          <li>
            <t>While DELEG can be used in an unsigned zone, it is recommended to use DNSSEC. The DELEG record must be signed or denied in the parent zone when it is signed. Without DNSSEC, certain security properties might not be available and hence certain features only will work when the DELEG record is signed.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="deleg-record-type">
      <name>DELEG Record Type</name>
      <t>The DELEG record wire format is the same as the SVCB record defined in <xref target="RFC9460"/>, but with a different value for the resource record type of TBD. For extensions SVCB and DELEG use Service Parameter Keys (SvcParamKeys) and new SvcParamKeys that might be needed also will use the existing IANA Registry.</t>
      <t>The SVCB record allows for two types of records, the AliasMode and the ServiceMode. The DELEG record uses both. The Target Name either points to a set of name servers answering for the delegated domain if used in ServiceMode or to an SVCB record in AliasMode that then has to be interpreted further to get to the actual name server. The AliasMode DELEG record might point to another AliasMode SVCB record or a CNAME. In order to not allow unbound indirection of DELEG records the maximum number of indirections, CNAME or AliasMode SVCB is 4. The SvcPriority field either can be 0 for AliasMode or 1 for ServiceMode. Different priorities are not used for DELEG delegations as all DELEG records are considered equally important and selection amongst can be decided by the resolver for a good user experience.</t>
      <section anchor="including-deleg-rrs-in-a-zone">
        <name>Including DELEG RRs in a Zone</name>
        <t>A DELEG RRset MAY be present at a delegation point.  The DELEG RRset MAY contain multiple records. DELEG RRsets MUST NOT appear at a zone's apex.</t>
        <t>A DELEG RRset MAY be present with or without NS or DS RRsets at the delegation point.</t>
        <t>Construction of a DELEG RR requires knowledge which implies communication between the
operators of the child and parent zones. This communication is an operational matter not covered by this document.</t>
      </section>
      <section anchor="difference-between-the-records">
        <name>Difference between the records</name>
        <t>This document uses two different resource record types. Both records have the same functionality, with the difference between them being that the DELEG record MUST only be used at a delegation point, while the SVCB is used as a normal resource record and does not indicate that the label is being delegated. For example, take the following DELEG record:</t>
        <artwork><![CDATA[
Zone com.:
example.com.  86400  IN DELEG 1   config2.example.net.
]]></artwork>
        <t>When a client receives the above record, the resolver should send queries for any name under example.com to the nameserver at config2.example.net unless further delegated. By contrast, when presented with the records below:</t>
        <artwork><![CDATA[
Zone com.:
example.com.  86400  IN DELEG 0   config3.example.org.

Zone example.org.:
config3.example.org.  86400  IN SVCB 1 . ( 
                ipv4hint=192.0.2.54,192.0.2.56
                ipv6hint=2001:db8:2423::3,2001:db8:2423::4 )
]]></artwork>
        <t>A resolver trying to resolve a name under example.com would get the first record above from the parent authoritative server, .COM, indicating that the SVCB records found at config3.example.org should be used to locate the authoritative nameservers of example.com, and other parameters.</t>
        <t>The primary difference between the two records is that the DELEG record means that anything under the record label should be queried at the delegated server while the SVCB record is just for redirection purposes, and any names under the record's label should still be resolved using the same server unless otherwise delegated.</t>
        <t>It should be noted that both DELEG and SVCB records may exist for the same label, but they will be in different zones. Below is an example of this:</t>
        <artwork><![CDATA[
Zone com.:
example.com.  86400  IN DELEG 0   c1.example.org.

Zone example.org.:
c1.example.org.  86400  IN DELEG  1   config3.example.net. (
                            ipv6hint=2001:db8:2423::3 )
c1.example.org.  86400  IN NS test.c1.example.org.
test.c1.example.org. 600 IN A 192.0.2.1

Zone c1.example.org:
c1.example.org.  86400  IN SVCB 1   config2.example.net. (
                    ipv6hint=2001:db8:4567::4  )
c1.example.org.  86400  IN NS test.c1.example.org.
test.c1.example.org. 600 IN A 192.0.2.1
]]></artwork>
        <t>In the above case, the DELEG record for c1.example.org would only be used when trying to resolve names at or below c1.example.org. This is why when an AliasMode DELEG or SVCB record is encountered, the resolver MUST query for the SVCB record associated with the given name.</t>
      </section>
      <section anchor="use-of-dnssec">
        <name>Use of DNSSEC</name>
        <t>While DNSSEC is RECOMMENDED, unsigned DELEG records may be retrieved in a secure way from trusted, Privacy-enabling DNS servers using encrypted transports.</t>
        <t>FOR DISCUSSION: This will lead to cyclical dependencies. A DELEG record can introduce a secure way to communicate with trusted, Privacy-enabling DNS servers. For that, it needs to be DNSSEC signed.</t>
        <section anchor="signing-deleg-rrs">
          <name>Signing DELEG RRs</name>
          <t>A DELEG RRset MUST be DNSSEC signed if the zone is signed.</t>
          <t>If a signed zone contains DELEG records, the referral response containing DELEG records MUST be signed with a DNSKEY that has the DELEG flag set.</t>
        </section>
        <section anchor="preventing-downgrade-attacks">
          <name>Preventing downgrade attacks</name>
          <t>A flag in the DNSKEY record signing the delegation is used as a backwards compatible, secure signal to indicate to a resolver that DELEG records are present or that there is an authenticated denial of a DELEG record. Legacy resolvers will ignore this flag and use the DNSKEY as is.</t>
          <t>Without this secure signal an on-path adversary can remove DELEG records and its RRsig from a response and effectively downgrade this to a legacy DNSSEC signed response.</t>
        </section>
      </section>
      <section anchor="multiple-service-providers">
        <name>Multiple Service Providers</name>
        <t>Some zone owners may wish to use multiple providers to serve their zone, in which case multiple DELEG AliasMode records can be used. In the event that multiple DELEG AliasMode records are encountered, the resolver SHOULD treat those as a union the same way this is done with NS records, picking one at random for the first lookup and eventually discovering the others. How exactly DNS questions are directed and split between configuration sets is implementation specific:</t>
        <artwork><![CDATA[
example.com.    86400    IN  DELEG     0   config1.example.net.
example.com.    86400    IN  DELEG     0   config1.example.org.
]]></artwork>
        <t>[ DRAFT NOTE: SVCB says that there "SHOULD only have a single RR". This ignores that but keeps the randomization part. Section 2.4.2 of SVCB ]</t>
      </section>
      <section anchor="loop-prevention">
        <name>Loop Prevention</name>
        <t>The TargetName of an SVCB or DELEG record MAY be the owner of a CNAME record. Resolvers MUST follow CNAMEs as well as further alias SVCB records as normal, but MUST NOT allow more then 4 total lookups per delegation, with the first one being the DELEG referral and then 3 SVCB/CNAME lookups maximal.</t>
        <t>Special care should be taken by both the zone owner and the delegated zone operator to ensure that a lookup loop is not created by having two AliasMode records rely on each other to serve the zone. Doing so may result in a resolution loop, and likely a denial of service. The mechanism on following CNAME and SVCB alias above should prevent exhaustion of server resources. If a resolution can not be found after 4 lookups the server should reply with a SERVFAIL error code.</t>
      </section>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>To introduce DELEG record, this example shows the authority section of a DNS response that delegates a subdomain to another nameserver.</t>
      <artwork><![CDATA[
example.com.  86400  IN DELEG  1 ns1.example.com. (
                ipv4hint=192.0.2.1 ipv6hint=2001:DB8::1 )
example.com.  86400  IN NS     ns1.example.com.
ns1.example.com.    86400   IN  A  192.0.2.1
ns1.example.com     86400   IN  AAAA    2001:DB8::1
]]></artwork>
      <t>In this example, the authoritative nameserver is delegating using the same parameters as regular DNS, but the delegation as well as the glue can be signed.</t>
      <t>Like with SVCB, DELEG also offer the ability to use the Alias form of delegation. The example below shows an example where example.com is being delegated with a DELEG AliasMode record which can then be further resolved using standard SVCB to locate the actual parameters.</t>
      <artwork><![CDATA[
example.com.  86400  IN DELEG 0   config2.example.net.
example.com.  86400  IN NS     ns2.example.net.
]]></artwork>
      <t>The example.net authoritative server may return the following SVCB records in response to a query as directed by the above records.</t>
      <artwork><![CDATA[
config2.example.net 3600    IN SVCB . (
                ipv4hint=192.0.2.54,192.0.2.56
                ipv6hint=2001:db8:2423::3,2001:db8:2423::4 )
]]></artwork>
      <t>The above records indicate to the client that the actual configuration for the example.com zone can be found at config2.example.net</t>
      <t>Later sections of this document will go into more detail on the resolution process using these records.</t>
    </section>
    <section anchor="implementation">
      <name>Implementation</name>
      <t>This document introduces the concept of signaling capabilities to clients on how to connect and validate a subdomain. This section details the implementation specifics of the DELEG record for various DNS components.</t>
      <section anchor="deployment-considerations">
        <name>Deployment Considerations</name>
        <t>The DELEG and SVCB records are intended to replace the NS record while also adding additional functionality in order to support additional transports for the DNS. Below are discussions of considerations for deployment.</t>
        <section anchor="aliasmode-and-servicemode-in-the-parent">
          <name>AliasMode and ServiceMode in the Parent</name>
          <t>Both the AliasMode and ServiceMode records can be returned for the DELEG record from the parent. This is different from the SCVB  <xref target="RFC9460"/> specification and only applies for the DELEG RRSet in the parent.</t>
        </section>
        <section anchor="rollout">
          <name>Rollout</name>
          <t>When introduced, the DELEG and SVCB records might not initially be supported by the DNS root or TLD operators. So for initial usage zone owners may place DELEG records into their zones for delegating down the tree into child domains of their zones, as the only way to discover new delegations is with the DELEG record at the parent. When AliasMode is used to the SVCB record the Target SVCB has to exists.</t>
        </section>
        <section anchor="availability">
          <name>Availability</name>
          <t>If a zone operator removes all NS records before DELEG and SVCB records are implemented by all clients, the availability of their zones will be impacted for the clients that are using non-supporting resolvers. In some cases, this may be a desired quality, but should be noted by zone owners and operators.</t>
        </section>
      </section>
      <section anchor="signaling-deleg-support">
        <name>Signaling DELEG support</name>
        <t>For a long time there will be both DELEG and NS needed for delegation. As both methods should be configured to get to a proper resolution it is not neccassary to send both in a referral response. We therefore purpose an EDNS flag to be use similar to the DO Bit for DNSSEC to be used to signal that the sender understands DELEG and does not need NS or glue information in the referral.</t>
        <t>This bit is referred to as the "DELEG" (DE) bit.  In the context of the EDNS0 OPT meta-RR, the DO bit is the first bit of the third and fourth bytes of the "extended RCODE and flags" portion of the EDNS0 OPT meta-RR, structured as follows:</t>
        <artwork><![CDATA[
            +0 (MSB)                +1 (LSB)
     +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
  0: |   EXTENDED-RCODE      |       VERSION         |
     +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
  2: |DO|DE|                 Z                       |
     +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
]]></artwork>
        <t>Setting the DE bit to one in a query indicates to the server that the resolver is able to accept delegations using DELEG only. The DO bit cleared (set to zero) indicates the resolver is unprepared to handle DELEG and hence can only be served NS, DS and glue in a delegation response. The DE bit of the query MUST be copied in the response.</t>
      </section>
      <section anchor="response-size-considerations">
        <name>Response Size Considerations</name>
        <t>For latency-conscious zones, the overall packet size of the delegation records from a parent zone to child zone should be taken into account when configuring the NS, DELEG and SVCB records. Resolvers that wish to receive DELEG and SVCB records in response SHOULD advertise and support a buffer size that is as large as possible, to allow the authoritative server to respond without truncating whenever possible.</t>
        <t>As</t>
      </section>
      <section anchor="authoritative-name-servers">
        <name>Authoritative Name Servers</name>
        <section anchor="including-deleg-rrs-in-a-response">
          <name>Including DELEG RRs in a Response</name>
          <t>If a DELEG RRset is present at the delegation point, the name server MUST return both the DELEG RRset and its associated RRSIG RR in the Authority section along with the DS RRset and its associated RRSIG RR and the NS RRset.</t>
          <t>If no DELEG RRset is present at the delegation point, and the delegation was signed with a DNSKEY that has the DELEG flag set, the name server MUST return the NSEC or NSEC3 RR that proves that the DELEG RRset is not present including its associated RRSIG RR along with the DS RRset and its associated RRSIG RR if present and the NS RRset, if present.</t>
          <t>Including these DELEG, DS, NSEC or NSEC3, and RRSIG RRs increases the size of referral messages. If space does not permit inclusion of these records, including glue address records, the name server MUST set the TC bit on the response.</t>
        </section>
        <section anchor="responding-to-queries-for-type-deleg">
          <name>Responding to Queries for Type DELEG</name>
          <t>DELEG records, when present, are included in referrals. When a parent and child are served from the same authoritative server, this referral will not be sent because the authoritative server will respond with information from the child zone. In that case, the resolver may query for type DELEG.</t>
          <t>The DELEG resource record type is unusual in that it appears only on the parent zone's side of a zone cut.  For example, the DELEG RRset for the delegation of "foo.example" is part of the "example" zone rather than in the "foo.example" zone.  This requires special processing rules for both name servers and resolvers because the name server for the child zone is authoritative for the name at the zone cut by the normal DNS rules, but the child zone does not contain the DELEG RRset.</t>
          <t>A DELEG-aware resolver sends queries to the parent zone when looking for a DELEG RR at a delegation point. However, special rules are necessary to avoid confusing legacy resolvers which might become involved in processing such a query (for example, in a network configuration that forces a DELEG-aware resolver to channel its queries through a legacy recursive name server).  The rest of this section describes how a DELEG-aware name server processes DELEG queries in order to avoid this problem.</t>
          <t>The need for special processing by a DELEG-aware name server only arises when all the following conditions are met:</t>
          <ul spacing="normal">
            <li>
              <t>The name server has received a query for the DELEG RRset at a zone cut.</t>
            </li>
            <li>
              <t>The name server is authoritative for the child zone.</t>
            </li>
            <li>
              <t>The name server is not authoritative for the parent zone.</t>
            </li>
            <li>
              <t>The name server does not offer recursion.</t>
            </li>
          </ul>
          <t>In all other cases, the name server either has some way of obtaining the DELEG RRset or could not have been expected to have the DELEG RRset, so the name server can return either the DELEG RRset or an error response according to the normal processing rules.</t>
          <t>If all the above conditions are met, however, the name server is authoritative for the domain name being searching for, but cannot supply the requested RRset. In this case, the name server MUST return an authoritative "no data" response showing that the DELEG RRset does not exist in the child zone's apex.</t>
        </section>
        <section anchor="priority-of-deleg-over-ns-and-glue-address-records">
          <name>Priority of DELEG over NS and Glue Address records</name>
          <t>DELEG-aware resolvers SHOULD prioritize the information in DELEG records over NS and glue address records. Glue records MUST NOT be considered for a DELEG delegation. If there is an in domain name server for a non alias mode DELEG record ipv4hint and ipv6hint MUST be used to convey the IP address. An a alias mode DELEG record can not have an in domain name server.</t>
        </section>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>All of the information handled or transmitted by this protocol is public information published in the DNS.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO: Fill this section out</t>
      <section anchor="availability-of-zones-without-ns">
        <name>Availability of Zones Without NS</name>
      </section>
      <section anchor="resolution-procedure">
        <name>Resolution Procedure</name>
        <t>An example of a simplified DNS interaction after priming. This is a query for www.example.com type AAAA with DELEG-aware com and example.com authoritative servers.</t>
        <ul spacing="normal">
          <li>
            <t>Ask www.example.com qtype AAAA to a.root-servers.net the answer is:
  Answer section: (empty)
  Authority section:
      com.   172800 IN NS a.gtld-servers.net.
  Additional section:
      a.gtld-servers.net. 172800 IN AAAA 2001:db8:a83e::2:30</t>
          </li>
          <li>
            <t>Ask www.example.com qtype AAAA to a.gtld-servers.net the answer is:
      Answer section: (empty)
      Authority section:
          example.com.   172800 IN NS ns1.example.com.
          example.com.   172800 IN DELEG   1 config1.example.com.
                                      ( ipv6hint=2001:db8:440:1:1f::24 )
      Additional section:
          ns1.example.com. 172800 IN AAAA 2001:db8:322c::35:42</t>
          </li>
          <li>
            <t>Ask www.example.com qtype AAAA to config1.example.com (2001:db8:1:1f::24) the answer is:
          Answer section:
              www.example.com.  3600 IN AAAA 2001:db8:a0:322c::2
          Authority section: (empty)
          Additional section: (empty)</t>
          </li>
        </ul>
        <t>TODO: more resolution examples (e.g out of bailiwick)</t>
        <section anchor="failures-when-deleg-delegation-is-present">
          <name>Failures when DELEG Delegation is Present</name>
          <t>When a delegation using DELEG to a child is present, the resolver MUST use it and SERVFAIL if none of the configurations provided work.</t>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>DELEG will use the SVCB IANA registry definitions in section 14.3 of <xref target="RFC9460"/>.</t>
      <t>The IANA has assigned a bit in the DNSKEY flags field (see Section 7 of <xref target="RFC4034"/> for the DELEG bit (N).</t>
      <t>EDNS0 <xref target="RFC6891"/> defines 16 bits as extended flags in the OPT record. This draft adds the DE bit.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <referencegroup anchor="STD13" target="https://www.rfc-editor.org/info/std13">
          <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1034">
            <front>
              <title>Domain names - concepts and facilities</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1034"/>
            <seriesInfo name="DOI" value="10.17487/RFC1034"/>
          </reference>
          <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035">
            <front>
              <title>Domain names - implementation and specification</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1035"/>
            <seriesInfo name="DOI" value="10.17487/RFC1035"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC4034">
          <front>
            <title>Resource Records for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4034"/>
          <seriesInfo name="DOI" value="10.17487/RFC4034"/>
        </reference>
        <reference anchor="RFC6891">
          <front>
            <title>Extension Mechanisms for DNS (EDNS(0))</title>
            <author fullname="J. Damas" initials="J." surname="Damas"/>
            <author fullname="M. Graff" initials="M." surname="Graff"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
              <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="75"/>
          <seriesInfo name="RFC" value="6891"/>
          <seriesInfo name="DOI" value="10.17487/RFC6891"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <referencegroup anchor="BCP219" target="https://www.rfc-editor.org/info/bcp219">
          <reference anchor="RFC9499" target="https://www.rfc-editor.org/info/rfc9499">
            <front>
              <title>DNS Terminology</title>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
              <date month="March" year="2024"/>
              <abstract>
                <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
                <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="219"/>
            <seriesInfo name="RFC" value="9499"/>
            <seriesInfo name="DOI" value="10.17487/RFC9499"/>
          </reference>
        </referencegroup>
        <reference anchor="I-D.tapril-ns2">
          <front>
            <title>Parameterized Nameserver Delegation with NS2 and NS2T</title>
            <author fullname="Tim April" initials="T." surname="April">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="13" month="July" year="2020"/>
            <abstract>
              <t>   Within the DNS, there is no mechanism for authoritative servers to
   advertise which transport methods they are capable of.  If secure
   transport methods are adopted by authoritative operators, transport
   signaling would be required to negotiate how authoritative servers
   would be contacted by resolvers.  This document provides two new
   Resource Record Types, NS2 and NS2T, to facilitate this negotiation
   by allowing zone owners to signal how the authoritative nameserver(s)
   for their zone(s) may accept queries.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tapril-ns2-01"/>
        </reference>
      </references>
    </references>
    <?line 401?>

<section anchor="Testing">
      <name>Legacy Test Results</name>
      <t>In December 2023, Roy Arends and Shumon Huque tested two distinct sets of requirements that would enable the approach taken in this document.</t>
      <ul spacing="normal">
        <li>
          <t>legacy resolvers ignore unknown record types in the authority section of referrals.</t>
        </li>
        <li>
          <t>legacy resolvers ignore an unknown key flag in a DNSKEY.</t>
        </li>
      </ul>
      <t>Various recent implmentations were tested (BIND, Akamai Cacheserve, Unbound, PowerDNS Recursor and Knot) in addition to various public resolver services (Cloudflare, Google, Packet Clearing House). All possible variations of delegations were tested, and there were no issues.
Further details about the specific testing methodology, please see test-plan.</t>
    </section>
    <section anchor="acknowledgments-unnumbered">
      <name>Acknowledgments {:unnumbered}</name>
      <t>This document is heavily based on past work done by Tim April in 
<xref target="I-D.tapril-ns2"/> and thus extends the thanks to the people helping on this which are:
John Levine, Erik Nygren, Jon Reed, Ben Kaduk, Mashooq Muhaimen, Jason Moreau, Jerrod Wiesman, Billy Tiemann, Gordon Marx and Brian Wellington.</t>
    </section>
    <section anchor="differences-to-draft-homburg-deleg-incremental-deleg">
      <name>Differences to draft-homburg-deleg-incremental-deleg</name>
      <t>The draft mentioned above uses a similar yet different method to achieve a new delegation method. The main difference is that it does not use a new RR type, but instead uses SVCB under a different label (_deleg). This has the following issues:</t>
      <ul spacing="normal">
        <li>
          <t>The DNS tree now is no longer consistent as names under e.g _deleg.com decide where example.com is delegated. That is a big deviation from a consistent naming structure.</t>
        </li>
        <li>
          <t>It is also possible delegate the _deleg label making resolution even more complex</t>
        </li>
        <li>
          <t>As it is an SVCB record only one alias mode is allowed per delegation</t>
        </li>
        <li>
          <t>Every resolver supporting it would immediately have to send two queries for every iteration possibly causing a huge traffic increase to authorities</t>
        </li>
      </ul>
    </section>
    <section anchor="todo">
      <name>TODO</name>
      <dl>
        <dt>RFC EDITOR:</dt>
        <dd>
          <t>PLEASE REMOVE THE THIS SECTION PRIOR TO PUBLICATION.</t>
        </dd>
      </dl>
      <ul spacing="normal">
        <li>
          <t>Write a security considerations section</t>
        </li>
        <li>
          <t>worked out resolution example including alias form delegation</t>
        </li>
      </ul>
    </section>
    <section anchor="change-log">
      <name>Change Log</name>
      <dl>
        <dt>RFC EDITOR:</dt>
        <dd>
          <t>PLEASE REMOVE THE THIS SECTION PRIOR TO PUBLICATION.</t>
        </dd>
      </dl>
      <section anchor="since-draft-wesplaap-deleg-00">
        <name>since draft-wesplaap-deleg-00</name>
        <ul spacing="normal">
          <li>
            <t>Clarified SVCB priority behaviour</t>
          </li>
          <li>
            <t>Added section on differences to draft-homburg-deleg-incremental-deleg</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="C." surname="Elmerot" fullname="Christian Elmerot">
        <organization>Cloudflare</organization>
        <address>
          <email>christian@elmerot.se</email>
        </address>
      </contact>
      <contact initials="E." surname="Lewis" fullname="Edward Lewis">
        <organization>ICANN</organization>
        <address>
          <email>edward.lewis@icann.org</email>
        </address>
      </contact>
      <contact initials="R." surname="Arends" fullname="Roy Arends">
        <organization>ICANN</organization>
        <address>
          <email>roy.arends@icann.org</email>
        </address>
      </contact>
      <contact initials="S." surname="Huque" fullname="Shumon Huque">
        <organization>Salesforce</organization>
        <address>
          <email>shuque@gmail.com</email>
        </address>
      </contact>
      <contact initials="K." surname="Darilion" fullname="Klaus Darilion">
        <organization>nic.at</organization>
        <address>
          <email>klaus.darilion@nic.at</email>
        </address>
      </contact>
      <contact initials="L." surname="Peltan" fullname="Libor Peltan">
        <organization>CZ.nic</organization>
        <address>
          <email>libor.peltan@nic.cz</email>
        </address>
      </contact>
      <contact initials="V." surname="Čunát" fullname="Vladimír Čunát">
        <organization>CZ.nic</organization>
        <address>
          <email>vladimir.cunat@nic.cz</email>
        </address>
      </contact>
      <contact initials="S." surname="Kerr" fullname="Shane Kerr">
        <organization>NS1</organization>
        <address>
          <email>shane@time-travellers.org</email>
        </address>
      </contact>
      <contact initials="D." surname="Blacka" fullname="David Blacka">
        <organization>Verisign</organization>
        <address>
          <email>davidb@verisign.com</email>
        </address>
      </contact>
      <contact initials="G." surname="Michaelson" fullname="George Michaelson">
        <organization>APNIC</organization>
        <address>
          <email>ggm@algebras.org</email>
        </address>
      </contact>
      <contact initials="B." surname="Schwartz" fullname="Ben Schwartz">
        <organization>Meta</organization>
        <address>
          <email>bemasc@meta.com</email>
        </address>
      </contact>
      <contact initials="J." surname="Včelák" fullname="Jan Včelák">
        <organization>NS1</organization>
        <address>
          <email>jvcelak@ns1.com</email>
        </address>
      </contact>
      <contact initials="P. van" surname="Dijk" fullname="Peter van Dijk">
        <organization>PowerDNS</organization>
        <address>
          <email>peter.van.dijk@powerdns.com</email>
        </address>
      </contact>
      <contact initials="P." surname="Homburg" fullname="Philip Homburg">
        <organization>NLnet Labs</organization>
        <address>
          <email>philip@nlnetlabs.nl</email>
        </address>
      </contact>
      <contact initials="E." surname="Nygren" fullname="Erik Nygren">
        <organization>Akamai Technologies</organization>
        <address>
          <email>erik+ietf@nygren.org</email>
        </address>
      </contact>
      <contact initials="V." surname="Adhvaryu" fullname="Vandan Adhvaryu">
        <organization>Team Internet</organization>
        <address>
          <email>vandan@adhvaryu.uk</email>
        </address>
      </contact>
      <contact initials="M." surname="Bretelle" fullname="Manu Bretelle">
        <organization>Meta</organization>
        <address>
          <email>chantr4@gmail.com</email>
        </address>
      </contact>
      <contact initials="B." surname="Halley" fullname="Bob Halley">
        <organization>Cloudflare</organization>
        <address>
          <email>bhalley@cloudflare.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA719+3LjRnb3/3yKzviPaLIUP908a7MqFVGiZq21bhHlcdbZ
VKoJNEmsQIBGA9LQY79B8g7JA+QpNnmvnFtfAEIz493Up7JrRBB9O32uv3O6
tb+/P6izOjdjdfG+NoXN5rlRU5Obpa6zslCLslLTm9lAz+eVeRqr6cXVxe8G
aZkUeg2N0kov6v1nYze51pv9FBvuHxwOUl3Dtx+mk4eLXwYJfFiW1XasbJ0O
mg1+acfq8OD4y8Eg21RjVVeNrY8ODr4+OBrYZr7OrIXB6+0GOrm8eHg70JXR
8GtRm6ow9eDRbJ/LKg1P9qc4kcHA1rpI/1XnZQEtt8YONtlY/XNdJkNly6qu
zMLCb9s1/vIvg4Fu6lVZjQf7AwU/WQGzehipyabKcnrCi3zI1tGzslrqIvuJ
yDNWvyvLZW6G6urqnL41a53lY5WZenFaa2w0wglHA9yN/uc/Nvq//908RkPc
mbpSreftYS5nre43dqMT83ia2WQEL8bd34++N3NTRX3f63yhwsN2x5NHDV2q
B5OsijIvlxnQLBqoesZ2p5reGiXlOh5qOrrSz5UpEhONNtVPWarOVeur9pgz
nRsLjCVfylA1PD1NU1rPIIHdr7J5U4fd4e7PV1Vm60wX6iJfm6qse/o/z8sm
XeTAM3H/iWt5arjlyJpW1xfps65SdWWeM9u3BeeTm5u4Q0Pvj3J8/zRLdFFE
eyGkL7dqAmRIP6vDqtyONL39QnezVbMGmfym+bH5fLraFb5+usRP0Q5yj9/m
urGwZ8Cn0EVPn0WWjHQd9/eITUapNDmVF+JOr7I5aI07k4Mw9m3PDyNoFHeZ
Y4PRhhpQh8lPrQ7f5TrN1n/+r0r99781xZ//s3fTd3p9olZZNUqaQtd9/c5W
ujDqW1P1ScbN7LBNRnj3tM7WZr+u9JPJc1PZnR1i7j/LdfKoe/p8Z4AHs2UR
d5xik/npk3y1s0W/M9CHUddZstImt727NLm7uWwpiOVyfarzpZlXeneSZ6ZQ
s2QF3Fv/1NPZtal13Ncc/rXJ6Roe70zu9yCI70Bn5X/+zz611aHhn54Sk+vH
08Ie7vQEGtBU6gn6m2Z/6uvrrnw2FZqiWA9ioxE0GqXQ6HSDr6SF3e18Bcy6
Ud+U63kDxOiZ6BVoadBZ85b221Cz0yKHL3P4blTkbY1RZY/qZrsEmf31qhX2
+/E3ZCcK6mFnm96BKQNyTNLVk662Tc8ID0avg1GMWZ+anmppOmoeWz1f66JR
ZxUQD7j4MzgAOA/U8ckLOuSsnKtvNPS0/WxdPF/R+6eJ/5Z6Hezv7yugMwhY
Ug8mKg1+SFaoegWeSQkdFOoGBlazra3NWu0BT7xWmVVarQ3ONLNreFfXyhQa
vBmrzGKRJZkpagVkUSlYATItJlVrXeilWeNX5YIHuJnRssjAjtRlDSM/lfkT
dONmUywV+w1ZvVUlyK0ClyWliVlVl8puTJLBiNSXNRW8YdVTpkEaVGUS8FvA
B4H1l8/YFTpYWq0yU+kqWYHez8FLqpqkbirTni++jVOsYHIlemrAnDAD7ADH
ruF/fGUahhkNBpMiDKvQqvIsoZtVaWtcqVs5rZpmS13iI1kxECoiyaSAMXWC
gwNHc2sgdtR8Dc4caA2ceYL0gfb1qiqb5UqV0G0V9smO1MMKtg78yYZ2YVOV
m9Ia3MzCPCsT+aRhGegXDtkTHapnoNkqrEynaYYMA2TMCljHmtlHz8umfmlN
RGb8LtEbPY8W5rYZ+niKCWQ/SiHi4nWWpiBbgy9QPqsyhQ1FAzu4fJGPP3z4
m9nD9PD4l1+GMUM9Z/VKmJ8f0UieYbYKhAeWmmYJTWO+jaSG2VGmzITCt9vL
kqVkldqAh4zEihmC9xx2Kd4By1uelvBvBsycoDSnLf6WDfFcRvSMKOg2DpgZ
pQsnClsHn2DzYbybUlgl3kSU8SfQHyjV2ECEAdtXLKoWXIl1hnSAr2EKhUlq
92Z71Y4qJL/fTe+IBx7O74gI6stjYUzqLoyu5rqqMpGQoFayaItpncC6SK3a
qf7tSA0GSEPh75S5N2Zo+H1tUmQ8pCm+CKtc437Cr+AhoGhH4rDRFRCzxiXA
+tz+tzmYNkl7EoGW2KrGmh7m9fpsyCt7r9cbpDF2kNXg+5RNnqJI07Ym2KSx
pAghdNOFJaIF7ctbB60LIoOnMXSNJAYiOSoPBjEhLLEnbU1KjI8shRszDZwn
sjDxGtgaT3ccLLIZQlbSlsRVM4wO0cefmxV4XTAdaISvJ1vhbqaUxc1Gsi6L
sjIssDRN6hEnhHTIiobYsDL5Fte0O9c9a5BkQEsIO0DPQNhLWjw1NgGVDouE
1Uw2G3D5s/dq8hqmeO+n4ESsKVL4WFPXNAn8LauBVtaWSUb7F3EDBA6BM2Fi
FugIciZCgJzp92nEPNlixdzA4GAT2UbMYCsymPgZMhhMfG/27vzstXuXJRNW
s8gKXsuHD/9w//b865M3B6jFHIuANrPGW1idQyyfbn0zK2OENQxBazzjPGCJ
MrsE2tRkFn6C0F4lDdvyyvzYZLBrbHNB54OsJKBDyLBW5bpHg3vJh76fwf/B
f6N9r9VK094Ds7MNimXUgjoAbwWXCiRMczLJTNlpyzx5xsbtQJmbAAvY6zIF
w5UVIB2kpGiKSNIhCzFMDQUW9yBHciHVK2FveMFoy8xYbmCPxMqR6QdPB/kL
mqybvM5QdpFOFtUHNrDRwoHJ3gYZB0+kkP7gIc4WJAMo1WCIDKFhAra8hN+V
s0caSYaLYSUbmX3YY7QyoN5aEwRmQ3fOUPSdMIMCcWExGbAno0Es7WiicTHQ
W8HgE9KHDLPMAid/DRZFFWUNVgDUlVOWoCENu4DQT8peFdsT5zblZbHcJznC
J06/uqVbXjcpnZY3FaS5LEhv5AvhZLCY0bzIXBCTwLfiH22hPyAXrJa4hWXE
GuT02ninB920L74AZ75aZ2wtWC4fDbSnkV9dfzd7eDXkf9XNLf1+f/GP313e
X0zx99k3k6sr/wu/MYAPt99dyff4W2h5fnt9fXEz5cbwVHUeXU/+8Ao5Ix28
ur17uLy9mVy9Ys0bO2uorFlSaNc2GFCkKE8t/fbHPw7OQOkfnoh2ODo8/PqX
X+TDV4e/PYEPzytT0HhAZGAK/ggkBu8GtCMJ3AAZD8wbyHKO/rNFq/QM7Ar+
JSqyQD3YsCUoebfvPa4WqGRgFuIumAbM7ginNOTddx4kaOtqbb2awnHGg8Hf
OXsR6xKI9Ype/8IpcRgNOBYU4YYMX93RuqPQrVdF0Gew3J/bDfLRdQkTEK8X
bYZBVAHsCmlK4jcGdQnIHYDRmpMsR3ZT+rdt4y0O0lBBKBLmQlJDal3CEWAI
EcfYFxdfjCO54NHl2SMGIs/irqFrgfqol5Q0ETRuRVJtN+TjedcD1sPuJNOl
JJWLXOR6dcwQXB7udSQEfGauBUqxWnMkBk5ZNwX6VtxDJOOt8AJoswZXAZhW
P+KbIBDg0CZJ2YCcQAyeoS7lAdSyBA7mmKPSqSkXC1Ifxn1f9W4VGCthwKnJ
QbZIhWAnEW5/V5V1mZQ58g6GjVkB9IwCJ/GsvFrdINpY0+ItECYRx9nvH5Ir
HgrNIU4RNpR9y/5gC/sLjjquALc4ckTRBATKitbd2fdgWpg8sgjzPmMvSjxB
WYRBV70gJ4EdHSNWIJIiDIZgGdG0f2zALhky+LrHH+5OBMfEedagRTbEaDlo
pyJm7+DGjHzox24QOxO2bKrEtD1/Hfxl9pkq47YqM3kqqkoX7FfHTR3EsWgI
LzDvNyAS4g0vmiLhZaJczs22JP1qFFHFrlGhgp2fG3KD5+hSdtia6Rc0g7Ny
wrasBbwGiGIl4Y5yw9LBqqoqS/baHsAUkY9jnU8YolmMUeYkp3prUlY2JHZg
CKpSY6gPVAKqp7xnCfxakGJIyaWQbRbxhY1vaOIgNk5OSE2NnS/dMVZtA5e4
sCdDVwkfRVAGqiLHivduW+/Fi0a9hgt7+KcH2S+nN/F1W4Jhx66JZF31OW+y
HDdK4lvqUHidtxm2ISyRYkJv7MCZ0kx9cbMiMUuH7NODv9nx4FFgGysCI5FO
GEF4a1mVz/UKKTlzX8DbE0Hropzh+KVh0LO2UVsEN9GTRH907WyYEoQkQWcX
YzqGeSjmw5ejdz33aweNgEPADOADYqIFO2sUOXiHDLxIWDDwoHlG0z7kPdMe
tKOQhBVhNSS5BzJt28Aiudadd8n6kFMrw7Z1SUtPis+blCW6K+FhjPbQkobu
E7g2CAdqUImwERgEo6vM0A+KwB0rw3OD6bNkrL5fZaCCI+BmF/8R6UzgzRSz
pOsAqoCjv8QXV2tuKKo24d7R5ELnpJT4e+rDfT1S3+NS/P6hDK/n2bJBNs8w
6FqXTzLtdsf4Aj4NKGtmHapqUgcZwkfSdGBMy9aOeIyKXFOx6W1jgawwhBdF
N9M3ZY2kBJsAgcojoX8wRoEP4He3y8i2SZ6RaSb/Ym44oBfLMVITb1wwPNFd
mjl5ts7Mt9wNInwT+AD0W4kUBb0nYHCzyckbYRVP4i5LY+JzeBypSPABECwG
bi8StHS6TSSEApaGnStMbqF8TwRfS0pScG4AaGHJf3bKMwveMfTKlNAdjcXL
H9I2ZIstv+JieKCWZQMNUatHksUNchs8jO21WSyQTuQ8wWy9OMfETM0mL7dB
j6Gda5sblHFvcobKCHogkYcigoEoO9a4R8NFcxbrZVsamP1KHHNNS+WBHQiu
O8SM8FxP0CD03qJ4v5wDWpp64A4YX6CkFVEeJp3i/JCVyJ1GOq51sZWJmTTC
ODjIx3g0ApQiFYFr359v9/Ffgh1ItnCfyjwvcdeAR1ixBIwDVkoWhB2kphCx
Y0HLamZ4NEZgrHib0EWHjZhdnLN714KhHPWkG5A6lMVeOeY94yH4ddY8qFm5
/yFIX0VotDVJQwoFcVh4hgKxzpYrAhRot7zbikRZYQGDb7wwGg2hlRgVOQ/C
80cevxuLRbPBJAB/Jd7BA3huPdDbMzCwM5WZDbiNSGxsUF+E3NDHEM2RZouF
ISo96bwJqG+vCwrc9XA2HQkyRI4Spg9ozIA84pY5SPDO+bnqW7O1am/2lNAj
/PTaRwvxU+FKIvecPXTUHKi+iZiNoFteBi4nNxOgGVk8j6DHZKAkmiRjnkta
iQiKZCG814DIm0/zyBLwWQ/rNZh+moNV4+8edLU0NcMHJiMHfANOXC0xgwCb
bWSxsM+sPXaRdrHj2cKLSzQb5HPstWitMiuiNTh/pohwyhh9WTQVBxOlwmm7
3EdSN6A9o1ny4kK/bemjPaJl8nw48Ahvx9OjGOH8ZnJ9Qb4bPOLhUaJog0Ab
zCEOTltwpvPsooySAY31Pls36ygqiZrAdtIoOGBnJiAtJ7wg5DcItknGKXZy
eyY66oCdVt8cPhzSoxZPTL3obLgzMpwgnbimjqMcZ9s0w6O7KQ1nUdDj/LEh
SwMhBRgPLUlpDr/JnVmXxdJ6/x2tYMp5vTjdJaHZsiyJYVFoNxjJFph/RBTo
skjyhsICUT33lp3YH0BlDgaT8Bi45HryBxxrg2EnTqhuRX3MCC4J2Gnm8nwe
d3ap5/hNqxxw6fA8GgK1999iZGfejz4xJdJpiPKIYkdgqkJwVvrXreRuNOnB
4BxoTwl1YTvtxwnpg8eifM5NujQCI2G8h3sewT+E/tbPhnX9IODG4lOw+xU5
swTAi7Pa7gc94aID4teoSZG9XMacNjwKRoFCuK+ONUEDR9NxVEcVGQewpMtQ
NQZj0Kf+YZpnIOKeZX1IT/anhSMMowCldyprcQSdomprFuIDsp/OYehltqHE
Ft7uZRKgaqoMQBuZ76yE/GOHS+4EgArMusmxox2XvZUOqbWE7ovSlWjEKxgP
qI7lB/Jgy/VozGUt3BqLWEBOvnpzcnCg1OWNtDyEN0BOFtnyaOTeLAzu6Peo
yLVEFDiCyZ4kitFzYASPHbRkX9KxhGU5AIvjaYGlKWUYT8qn/wKShRDB7pyg
KYRR1puRiEpnWxL2SlvaHpi4CKfL1cZhBZC6fP5LaHXgaXXs51VWy1HUVfyY
u+xrEHdNLHSoRmpP0fvdn2zzdAJOef33h18fjQ5GR6MvT4b+1zcvNXlDTY4O
Dg7H6fyr8dHJ0fF4fDzsPDhRr1G3BRCy2krW0JU+6Jc2jTEiMuPIj1lla8/r
xB1dILcPNx+q0fnt9dAJREs0IzOOHIQ22rNFi5pRBUAjib+8FPHq4glxmQzo
xmhBkuFhHyrApK4yIlvravuCViEl5ksA7AvaZW104coeii3GWUshawSlsR4I
C2IJSjsmxGcIupoouPd/whgF5Q7UtfdrNk1FBUy8VieRdmcaYPdaEwGP10Wy
xBWuwKKTvXXySUR8zmw0X6DjZVyqAVqQ0EpYF3qzUazX2nYEXDkydc4qDUeT
c/CrCYlMMPXBloiJO0NhF6vmSkfIKmb2L1YBh79C+g9fFHzuMFLAxy0FrPZ6
Zfuz5BzE+hODUwGQrUfdtWCzvi/UG2gI7SbK6Z7DmHqtlz+5clF5/YbnI+ve
Xe/Jl29+i2rs/9OCBf5lBYcg8HBXzgmFa/UlurLlWXBcvqNuWR41JQ3JTO0s
iXyoDAE+AYR0sRMpYcjQVgegsjDbh85bx16T04NqZutlrBXFhjoeb0eXoEm5
0o/d+e8EDCc8A/2GLHfoCY4dpe+HAXxpxyGSWYEwEdTdk0A1jIgYgrbZmuBJ
HFwBhFFPOtnuE/rj6kqdXmfd1JOJRW3+9vZeTS9n59/NZpe3N2MmJ+kPh0km
2ySnStfUYO0TI5MjNWnvMkZArrLOtKdKeFonf/hZM2dnD5UioVKIQbgoWqjp
ICQk+xdqhrBlHETtxCm4t93WGN7jLhI8FQNBlxh+RNBYqFtt7ZXjH1CzFTu6
VMLm3u76pNbPQroWBAjm9O3FH9gErARF4naLXC8RuhjxKu8qQyU36BaXz8US
83uY5NTJIy2YXncV2NypyygLfTrBV8tdn0M3eFKGwqANvDBHP1t206WT45RN
2Ura4ux3I2oXGMpu4gQqIzZIt9IiAcTXrX5G6qpTcsFM6ov+oDNaOJpMh03J
6jXqB/TfJRyll9srwgiv2IflYkUJ9o7ODbI05z26S5KaPmCqzJWuhX2n5CYY
3QQdLNBwYZO4IqGkojFXxhjxoetBgsdrF6R7EE+SVrDLM0z8EE9Sxon1BXgY
K4fV+gjfZbpCdXGUYKNUmdRk67gVrzeoUZ+ACOCxz/0RNwpc+Kn2yAwvq14p
fKqxfBC+wdo04knQHJJgJW+HM3us9VNOE3LxqRfITZZQYQdlAcANhy2BPXLq
nH3zvCwfmw3vFq6AgR5XBe/EhPNlI/VNifXtOsEiTdRQYCCswEgVBtcV12MQ
OrSB0Nu7w2zRm0qKdRD+wJm7FLU8lkMI4oC1PS5vtMlsOy8JfkL0ddiOVP/K
PtiH++M/q+n95C0BQRdjtoFWb20swa5UjSw54RCoMIslcMD9/Stnm0lEpR26
qI/GbCSvRRsjx08wygBvZya++dHoZHSEioBG/uO/kExcleXGK0Cs0A+g742c
jnB4rMf8HJjBGBVtKiWeSccwSOl0TKjnJR3NoAK/0ypBdQE3lVa2PXRtBfFg
dzxAadTVWiqUC3UC8liD5mE2tGoT4ndKo3nngrkVOdlBNUEdickRqLxQxzSX
/8eLcj0TTqtz2NKZ1N0mVLjtYw8EUQqEsCjy8KaQqeRg+BBp8ZeuCJVSTrap
BLvRTq5y3KmM4R2uByaUDCu5cREQIO5qB1ebbbBypHTIuFdaNPJITV1VBuo8
yUaSdxTlY3F0DuqwUAB67UkPMwYd1cEXEYrEJPTxF280u7lCuA1zIQjaSjfW
4ZUS+Dm0C8uKFu2poQqV/JUE8QtEE0/8frk6hYAdVWZDOSzyE2YX9+/eTi6v
FOw9etaIgWPSSl2w+CKsWEauWCwEktl3YR9mH20LFGgV6GtXZs92TdK9zAaW
K8UlQRKlHaI6sEGfNusJ9/CAYeul/oBnB/c57MQ/07OvxuNDiXxeGhVWhD/d
MQd9D2O9iWpzoqLYp6eB2mkAP/gsmp7ETGEXhh9FZTht74+ydWCG6CQBFcYv
G6x3h13zWEDs50UKjKIWzDOKQfc+7xXW1RCncaW74BCY9isRSFCd8ifnanFp
EOZDqdKhVYTmYQCJ4JjtIviBanpaYNou8Ovd5F7PwjsxBStCFC7R0R2IxrpT
JSTXHWiME28ttOvTHBxM6NGnzHAPG3ZB5ohcBPH2Vtey5qubquiA3y1TRBVI
TnjR6+SoFqvonL8iiaoYvnaL7sObj994H4JG+mxR/b+GaB+6k24FJJThYZTe
Q4+yt213zHmEMev5mpygoHvBd5AVXdNBCk54OhAt5HMoQFmWXF5Mlj81EBHm
oVrQGwU5CRPk28bbgecSWw5jN3PktT1LNsw2MRtKdXN8g522D5uVvjCqLKKa
bjqCh1bvCRpRWVyk5sWfcxaCF8MjvuDPhhqeLiDkqqzRwmCgCUT3ZyumvjxH
nUsqllO2cRnGDjTKJytrX7GCRhOPi+Lwoaia8WHSZ1iohAVOoV6pXYObRelx
Vz0UvRxQFM9GsBiHr3JUYJPGWsccSWst1CgUIkls3y5/iIsNJKDnksHB4My5
ai+36MRsrC8kG767J+3kRIDVAn7sX5mdvztTrVIWv+GhwJ5CAr3hzGx7yPv7
manbtUEc8n6h7rloSXJtnq3TGFbcBcV9TVBWZDWXhqFN4z0LWo68GawOw5ON
GLW4rDAEHSXNUdqDGOrlbnzN/NSGAki2Q0DtttUbbAz+OSVSGcNvc+7ZndDy
p5Oo+dAZZ65aYvDMxaRUoxNXMGQ2hAmt3RSd5/aSiBkYxeE9oiljdLMONTT0
WMpWKOVg3SZNuOyKfABBydoxAYMmXF4RlarNzQKV4MfkN6rchk2jQ0SspsRL
ikbuUC7kPNYbPvPqmM4pOo5PKiNKtiiLfWERKeLn0I9wDSqsRUjEissseKym
ekfM+GNhCGXY0dHq5nFg7jHzkDx4ZiMdN/N6mckhMxkM3lKpCB5/45pJDrTd
4jq5Ibz+gAuzYrZDr2vCVVG+ILF1KJgsIDOAlB1pqbGLbRIX6aFYgVUAWhAm
5k5lUOcSdXWAT+A3mTZtt+TY0N+7QAkklI5BXHQe3SFNdzDzVp1ltbvICsEx
/yrX3kYHWjhQolRdOHZrI/L4+gI6X8JVKOT1ts6pO2PMyxiJbZ27Mkh8zGOL
aL6iAV6pvenFa3wN/DpXBV8C5773Z2dxuQfq9u4Bd0Hv398P3RKl8xDe4wNp
Bewm5RHgfYALC8xUG29IX/EJApjQ/fntlCNUpKh91b0QoGd0f1UFYb3sNbqk
X/zzmwO1dz07e73z/FDtXcHz0OA3+/u/7j9pejBWP8M/F//0QGmQfV4M/fws
Xb+7uMeMhB/q579+1CMYdXr78/TiZ9X9+aHPJ/1rRx2AnasDZkO7DHxEeYbC
++POc7VOBuLTiC18FAFzKVDWCXl4sTVgtSYJLzAfUi3J3IYnb3Df9ywL/E+m
Kl/HQ3fGaYpNhUdfmfN3CpCl1pZgc7G2fAQKQ88pH60XSWsXDAUl8RBoIhzL
5HDZkaTcRCXEETaOboILa2bZT2bHSUQVmmssod/uo9OVkKcp9pWMK56azzHQ
Sx6BHBY7kTm0piqlFozvx0XM3orTpy6S1jpO6GrUSec6XiAq9ZrBGIMkBnCg
vpQbvWQ941hPQFlKZNSZZCS8BwsGiwJ5WjXfGUHoQY5mH38BbW0568Pl+FSh
3n8jh2RqN3hWzRX7gY4ppHQF1043A7gusXDQUrLOXwnB3fF5X876sZPxYkmk
23vxPOL0Hh0u91WRne2UUjVXWOVWQOwmsbTHP+NOey5wAAf2kkoSX7zeQpMB
D87Z7DM6c0jrjbzMGcii/NVL7EC27pDnr003fpxWPFOwzyBs+O8xLoF6w4yT
2Sn68dNHe+yWkPlNfpEofwEhs0WgUYemw+hLzBoHLuOYW84/TUE+W4tjoroR
kBMR07buVJkoEO8KrSGWx2s5CP3lW4u8L7LBs++ydBvsdQj4hxFZSIfK1Qjt
fPPOvlipPHs4Z53aozed4kylyOIfo3JEPObgjpl30ttx+eBQ4mycIGtnt2gr
cYbXlHTzCtfZhntifBDJhyV6S+DI4fa0JNdXAHPa07lJtIMde5UStYjVUvuY
rL+mwmtwSWXSOUxXwtK6hycqB/Fk6tzH0nNMg8xoYxs6cK3c9TxcUy3nUsqd
AzJ/y0d6GH8PR686Za8dseqcXBCuerUoS4dYvSLNoas6ciTlCxokPtUsWq3d
nOnEsMDHLnKpmlw4irRp56hFfLIp3seYm33cFiwsWqi+a7C4negZf9eMhPtS
eExRP04qYOJRz14sXWl8h7Sh1H1fPyMfh7pevPozPpLe2UgWG0zqhIvjfC37
C0X73/BNOkNPWKYmHWYwSGEJwfRTmdG1Rgt2+rrXUQgc7k7v4A0a7mY8ktlo
v2yD94wJh+8tYi4jc1uYms5NtYFTYma6vNS6ZXXpQz6SLgos464jQrkD2WHS
SVPZzoU/r+UAA/RWe2A1AI98BtzKTQXx8DEjySqNCwndFGJgjykZX+Ilcu2v
JOjhcYQmXhyVga8qw3G5Hi3POyh9gio4VA9AfEZXRTx0BGFFOR1y+1K/RV0o
jYxhHeuKvq5eFKBICb7Qjk4G9baNmL23sZctzhzJRuP5fsyBIVk4ZehxlnZz
OQtE59BLKfsAVijnrqqqSwbKhqIn7q86obOWeNjGXZbhz0pE7fAY9c7gXPtD
no7Mo2c0TGFREjbU/iRJWTnzGimhroKU6jLhDCmf3OEKf7XWLnFe3ND42kFO
oVlDd1WyEmIliPcVy9U0uTuqRBUt5Eah2lMuSxks4kue4M5VIK/AZ8Wzzq8C
XTDl13POhCnp+aR1gDlwZjh1xOVvcmLMH0ojbFTuc/sdOkyTtsMkDk1HQVkX
J7lTYz8xZ3SwoTbcGw/V55uNeAKtSj+s/pi3TpXFxiAG7S4XAvdxZRxWb0e7
GZlHPFVTSFHCeudAoMu+sZMseTUfVzskDebzZHjzL+/cOkZ0N9KLPbvaBS71
eWGGVI0gZZ07sfkkz50HEhPa3biFTIx5FfCQPXDPqpmuyiEnppnnWdJqTY/s
KqAFmIjBWczcCeKdPNLt9Has3mYkgJFpodxDB+LG+f5AEPP3/jybQyEcVnqH
8p02laE7XKOyeqyHwuNpeBcCuSJ0/FNLlEiVH3iWAmQjpFxiVf/8/NyqMCDH
ksoKnv19DcLYCd06k7aSmb3XaGLg83dqYh93ev8xdI+2cYTZkn3XqpAAgw/M
KjwugLDYhD8KBcdqDy/b2TJGuBMYjz2cJvUVh789+orrylGqRss6T+MBOYke
bmnY7aenTdQpLcUnkPVXx2Y8PhofH3zm+rtd963/UzT4BB3wp1Nz0qJJb6HK
Jxu6Ar/DneK+nT4+9rPXd8Lg5GB8OD5cACFPVLTEj+wR/uzU1ry0ScdHR8l4
fPzl+OTos3apZ4Fqz/fmZvr6pa3r2b4d8nQmAKQ+ftPLXwcy+6N29zu7v8Mg
L1DQvycKi4oIohSNTMrCe6MlKi+6GwpUV/acJY+v2WC+hc90EwJ5o8wZ01b1
9x3H9v6EYxSYxKAyX+FEZjnAUH2nJzCqy9j8+Gq1DKGswuOsrXDC3wmZ0h0N
pLrpOoGu2pa71eL7BwgFpZflth25q1Q8Kb5GgpZyeDI6xuE/fPgbn7gWZ5/a
o6OpraBkmnM0rSp6yrPIQXW6LNaVqv42dHtycIxXJLa9dOxq7+Y1yN2AszL8
7puvvj6Ed/l6CKsO3/C1Xtoqn+ThIWUamMtxlapc/4F/RgVNt4PvKB0FTEWX
WmMlP1JSCufxDhI0WU0OY3z4Qq4k+YV88SlEGXSI/+jg6HgY/SEM3sPoD1nQ
0SB0IOiYslxaR1XNhH9Fd+Exek3+uNxJQhLoLgZzULnqnpvevVzRFfk3BZ78
LmKMxdOmt4AxQFMf6ZUuQOGO8Q5Pd3rCIaQwo3dSq4KxGIKWIHK+1MXSTX+O
KntnlzfToftbAud4ERBZj6H6jm9VGPo/jIDXi0A4VHKF7bfgVb2mYf19lqWv
kRGPJ0IeqMgDpD7c1z/0f9vmjpMa55jwQdn9BrowEE+j5+VweOpa+7KlOIsU
LccjyZiANnShAgi+bTB8eeuPHHMRULiy3V+o7+5P5hQ0XfY5VKCt8KABSg9+
v7/JdUHyPkncsX5mnw/jpuCbJUz6y069E4T+Rj/hlbR87w5Vj+N9PQhV0JkA
cB39XwJCwg4+fPiHy/3piP/Mz35hj0D0eH2NEzgrCVhdPAZEx5Toyq1MvuET
Bcyw/n728eD35aoAIXvK8DxF9Ecmhur3JV7liYTEP+LxrU6bx6G61hAMlT+q
62alszW9pi28eA3MqBv4hCFlCr6msWsN355lWM/ykBn4VOA2Vym+rav3NP2z
Cv+8zvcmx2KCumRihnsHaB38d59W/Pc05M8+EYJNbJzzE9aErFLWXF5v3NHl
hi/5d7n6LQZtvi5ILvGlnNcKD6vJ7YmRFeFXpOBaR6dSE+PPB2dRIIjKnTvB
pAL9AYE5XTcMbKnl0hdS/HxQN74+h8/p7v0rjf5aFKVLcAQIhvnYwy50/ztW
6BR8NrYoqQQDgQB3H1dNpf3R8WA0uTwM+Rx890d/LWt0MP/BZdxAV2N561MW
wdI6Hg7G4oJVSdqTbuR786l+zQuz652WyDMSMqz5ftPYY8CTiuRG0E3n5j2H
AlLs0bnLRiBqE8eDNDoQEe8xbx1ZwI4unjBuCYoqlNdkzhZka7w4H2brToy4
ihK0KPH9CIb6ymqx/m65eCzLXVW+apZYWKXxAnWfkiFGFGuAf8QFxAGdp8EA
LK66mF4+3N6PB2N1d3UxmV2o+4vr23cX6uEb/P9yBv7KOd6grO7uL2/voaG6
++7s6vJ8gg9pA77Hy8Dd+Ua0N52yPjE/8CbqIlRNTd3jskU5Hh1Kp2NqwrzP
+bq3q3L5fzN7cAaBcol54Q/BHeD6zkHAOVolTtg4tEUu4W8qYpg0pSP3Ymlj
ef41Cud/AUkGdNjQbgAA

-->

</rfc>
