<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnsop-svcb-dane-04" category="std" consensus="true" updates="6698" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="SVCB-DANE">Using DNSSEC Authentication of Named Entities (DANE) with DNS Service Bindings (SVCB) and QUIC</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-svcb-dane-04"/>
    <author initials="B. M." surname="Schwartz" fullname="Benjamin M. Schwartz">
      <organization>Meta Platforms, Inc.</organization>
      <address>
        <email>ietf@bemasc.net</email>
      </address>
    </author>
    <author initials="R." surname="Evans" fullname="Robert Evans">
      <organization>Google LLC</organization>
      <address>
        <email>evansr@google.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="22"/>
    <area>ops</area>
    <workgroup>dnsop</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 32?>

<t>Service Binding (SVCB) records introduce a new form of name indirection in DNS.  They also convey information about the endpoint's supported protocols, such as whether QUIC transport is available.  This document specifies how DNS-Based Authentication of Named Entities (DANE) interacts with Service Bindings to secure connections, including use of port numbers and transport protocols discovered via SVCB queries.  The "_quic" transport name label is introduced to distinguish TLSA records for DTLS and QUIC.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/bemasc/svcb-dane"/>.</t>
    </note>
  </front>
  <middle>
    <?line 36?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The DNS-Based Authentication of Named Entities specification <xref target="RFC7671"/> explains how clients locate the TLSA record for a service of interest, starting with knowledge of the service's hostname, transport, and port number.  These are concatenated, forming a name like <tt>_8080._tcp.example.com</tt>.  It also specifies how clients should locate the TLSA records when one or more CNAME records are present, aliasing either the hostname or the initial TLSA query name, and the resulting server names used in TLS or DTLS.</t>
      <t>There are various DNS records other than CNAME that add indirection to the host resolution process, requiring similar specifications.  Thus, <xref target="RFC7672"/> describes how DANE interacts with MX records, and <xref target="RFC7673"/> describes its interaction with SRV records.</t>
      <t>This document describes the interaction of DANE with indirection via Service Bindings <xref target="SVCB"/>, i.e. SVCB-compatible records such as SVCB and HTTPS.  It also explains how to use DANE with new TLS-based transports such as QUIC.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The contents of this document apply equally to all SVCB-compatible record types, such as SVCB and HTTPS records.  For brevity, the abbrevation "SVCB" is used to refer to these record types generally.</t>
    </section>
    <section anchor="using-dane-with-service-bindings-svcb">
      <name>Using DANE with Service Bindings (SVCB)</name>
      <t><xref section="6" sectionFormat="of" target="RFC7671"/> says:</t>
      <ul empty="true">
        <li>
          <t>With protocols that support explicit transport redirection via DNS MX records, SRV records, or other similar records, the TLSA base domain is based on the redirected transport endpoint rather than the origin domain.</t>
        </li>
      </ul>
      <t>This document applies the same logic to SVCB-compatible records.  Specifically, if SVCB resolution was entirely secure (including any AliasMode records and/or CNAMEs), then for each connection attempt derived from a SVCB-compatible record,</t>
      <ul spacing="normal">
        <li>
          <t>The initial TLSA base domain <bcp14>MUST</bcp14> be the final SVCB TargetName used for this connection attempt.  (Names appearing earlier in a resolution chain are not used.)</t>
        </li>
        <li>
          <t>The transport prefix <bcp14>MUST</bcp14> be the transport of this connection attempt (possibly influenced by the "alpn" SvcParam).</t>
        </li>
        <li>
          <t>The port prefix <bcp14>MUST</bcp14> be the port number of this connection attempt (possibly influenced by the "port" SvcParam).</t>
        </li>
      </ul>
      <t>Resolution security is assessed according to the criteria in <xref section="4.1" sectionFormat="of" target="RFC6698"/>.</t>
      <t>If the initial TLSA base domain is the start of a secure CNAME chain, clients <bcp14>MUST</bcp14> first try to use the end of the chain as the TLSA base domain, with fallback to the initial base domain, as described in <xref section="7" sectionFormat="of" target="RFC7671"/>.  However, domain owners <bcp14>SHOULD NOT</bcp14> place a CNAME record on a SVCB TargetName, as this arrangement is unusual, inefficient, and at risk for deprecation in a future revision.</t>
      <t>If any TLSA QNAME is aliased by a CNAME, clients <bcp14>MUST</bcp14> follow the TLSA CNAME to complete the resolution of the TLSA records.  (This does not alter the TLSA base domain.)</t>
      <t>If a TLSA RRSet is securely resolved, the client <bcp14>MUST</bcp14> set the SNI to the TLSA base domain of the RRSet.  In usage modes other than DANE-EE(3), the client <bcp14>MUST</bcp14> validate that the certificate covers this base domain, and <bcp14>MUST NOT</bcp14> require it to cover any other domain.</t>
      <t>If the client has SVCB-optional behavior (as defined in <xref section="3" sectionFormat="of" target="SVCB"/>), it <bcp14>MUST</bcp14> use the standard DANE logic described in <xref section="4.1" sectionFormat="of" target="RFC6698"/> when falling back to non-SVCB connection.</t>
    </section>
    <section anchor="protocols">
      <name>Adding a TLSA protocol prefix for QUIC</name>
      <t><xref section="3" sectionFormat="of" target="RFC6698"/> defines the protocol prefix used for constructing TLSA QNAMEs, and says:</t>
      <ul empty="true">
        <li>
          <t>The transport names defined for this protocol are "tcp", "udp", and "sctp".</t>
        </li>
      </ul>
      <t>When this text was written, there was exactly one TLS-based protocol defined for each of these transports.  However, with the introduction of QUIC <xref target="RFC9000"/>, there are now multiple TLS-derived protocols that can operate over UDP, even on the same port.  To distinguish the availability and configuration of DTLS and QUIC, this document updates the above sentence as follows:</t>
      <ul empty="true">
        <li>
          <t>The transport names defined for this protocol are "tcp" (TLS over TCP <xref target="RFC8446"/>), "udp" (DTLS <xref target="RFC9147"/>), "sctp" (TLS over SCTP <xref target="RFC3436"/>), and "quic" (QUIC <xref target="RFC9000"/>).</t>
        </li>
      </ul>
    </section>
    <section anchor="operational-considerations">
      <name>Operational considerations</name>
      <section anchor="recommended-configurations">
        <name>Recommended configurations</name>
        <t>Service consumers are expected to use a CNAME or SVCB AliasMode record to point at provider-controlled records when possible, e.g.:</t>
        <sourcecode type="Zone"><![CDATA[
alias.example.                  HTTPS 0 xyz.provider.example.
www.alias.example.              CNAME xyz.provider.example.
xyz.provider.example.           HTTPS 1 . alpn=h2 ...
xyz.provider.example.           A     192.0.2.1
_443._tcp.xyz.provider.example. TLSA  ...
]]></sourcecode>
        <t>If the service needs its own SvcParamKeys, it cannot use CNAME or AliasMode, so it publishes its own SVCB ServiceMode record with SvcParams that are compatible with the provider, e.g.:</t>
        <sourcecode type="Zone"><![CDATA[
_dns.dns.example. HTTPS 1 xyz.provider.example. ( alpn=h2 ...
                                                  dohpath=/doh{?dns} )
]]></sourcecode>
        <t>For ease of management, providers may want to alias various TLSA QNAMEs to a single RRSet:</t>
        <sourcecode type="Zone"><![CDATA[
_443._tcp.xyz.provider.example. CNAME dane-central.provider.example.
dane-central.provider.example.  TLSA  ...
]]></sourcecode>
        <t>Any DANE certificate usage mode is compatible with SVCB, but the usage guidelines from <xref section="4" sectionFormat="of" target="RFC7671"/> continue to apply.</t>
      </section>
      <section anchor="unintended-pinning">
        <name>Unintended pinning</name>
        <t>As noted in <xref section="6" sectionFormat="of" target="RFC7671"/>, DANE encounters operational difficulties when the TLSA RRset is published by an entity other than the service provider.  For example, a customer might copy the TLSA records into their own zone, rather than publishing an alias to the TLSA RRset hosted in the service provider's zone.  When the service subsequently rotates its TLS keys, DANE authentication will fail, resulting in an outage for this customer.  Accordingly, zone owners <bcp14>MUST NOT</bcp14> publish TLSA records for public keys that are not under their control unless they have an explicit arrangement with the key holder.</t>
        <t>To prevent the above misconfiguration and ensure that TLS keys can be rotated freely, service operators <bcp14>MAY</bcp14> reject TLS connections whose SNI does not correspond to an approved TLSA base domain.</t>
        <t>Service Bindings also enable any third party consumer to publish fixed SvcParams for the service.  This can cause an outage or service degradation if the service makes a backward-incompatible configuration change.  Accordingly, zone owners should avoid publishing SvcParams for a TargetName that they do not control, and service operators should exercise caution when making incompatible configuration changes.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The use of TLSA records specified in this document is independent for each SVCB connection attempt.  In environments where DANE is optional, this means that the client might use DANE for some connection attempts but not others when processing a single SVCB RRSet.</t>
      <t>This document only specifies the use of TLSA records when all relevant DNS records (including SVCB, TLSA, and CNAME records) were resolved securely.  If any of these resolutions were insecure (as defined in <xref section="4.3" sectionFormat="of" target="RFC4035"/>), the client <bcp14>MUST NOT</bcp14> rely on the TLSA record for connection security.  However, if the client would otherwise have used an insecure plaintext transport, it <bcp14>MAY</bcp14> use an insecure resolution result to achieve opportunistic security.</t>
      <t>Certain protocols that can run over TLS, such as HTTP/1.0, do not confirm the name of the service after connecting.  With DANE, these protocols are subject to an Unknown Key Share (UKS) attack, in which the client believes it is connecting to the attacker's domain, but is actually connecting to an unaffiliated victim domain <xref target="I-D.barnes-dane-uks-00"/>.  Clients <bcp14>SHOULD NOT</bcp14> use DANE with vulnerable protocols.  (HTTP/1.1 and later and encrypted DNS are not normally vulnerable to UKS attacks, but see <xref target="uks"/> for some important exceptions.)</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>The following examples demonstrate Service Binding interaction with TLSA base domain selection.</t>
      <t>All of the RRSets below are assumed fully-secure with all related DNSSEC record types omitted for brevity.</t>
      <section anchor="https-servicemode">
        <name>HTTPS ServiceMode</name>
        <t>Given service URI <tt>https://api.example.com</tt> and record:</t>
        <artwork><![CDATA[
api.example.com. HTTPS 1 .
]]></artwork>
        <t>The TLSA QNAME is <tt>_443._tcp.api.example.com</tt>.</t>
      </section>
      <section anchor="https-aliasmode">
        <name>HTTPS AliasMode</name>
        <t>Given service URI <tt>https://api.example.com</tt> and records:</t>
        <artwork><![CDATA[
api.example.com.     HTTPS 0 svc4.example.net.
svc4.example.net.    HTTPS 0 xyz.cdn.example.
xyz.cdn.example.     A     192.0.2.1
]]></artwork>
        <t>The TLSA QNAME is <tt>_443._tcp.xyz.cdn.example</tt>.</t>
      </section>
      <section anchor="quic-and-cname">
        <name>QUIC and CNAME</name>
        <t>Given service URI <tt>https://www.example.com</tt> and records:</t>
        <artwork><![CDATA[
www.example.com.  CNAME api.example.com.
api.example.com.  HTTPS 1 svc4.example.net alpn=h2,h3 port=8443
svc4.example.net. CNAME xyz.cdn.example.
]]></artwork>
        <t>If the connection attempt is using HTTP/3, the transport label is set to <tt>_quic</tt>; otherwise <tt>_tcp</tt> is used.</t>
        <t>The initial TLSA QNAME would be one of:</t>
        <ul spacing="normal">
          <li>
            <t><tt>_8443._quic.xyz.cdn.example</tt></t>
          </li>
          <li>
            <t><tt>_8443._tcp.xyz.cdn.example</tt></t>
          </li>
        </ul>
        <t>If no TLSA record is found, the fallback TLSA QNAME would be one of:</t>
        <ul spacing="normal">
          <li>
            <t><tt>_8443._quic.svc4.example.net</tt></t>
          </li>
          <li>
            <t><tt>_8443._tcp.svc4.example.net</tt></t>
          </li>
        </ul>
      </section>
      <section anchor="dns-servicemode">
        <name>DNS ServiceMode</name>
        <t>Given a DNS server <tt>dns.example.com</tt> and record:</t>
        <artwork><![CDATA[
_dns.dns.example.com. SVCB 1 dns.my-dns-host.example. alpn=dot
]]></artwork>
        <t>The TLSA QNAME is <tt>_853._tcp.dns.my-dns-host.example</tt>.  The port and protocol are inferred from the "dot" ALPN value.</t>
      </section>
      <section anchor="dns-aliasmode">
        <name>DNS AliasMode</name>
        <t>Given a DNS server <tt>dns.example.com</tt> and records:</t>
        <artwork><![CDATA[
_dns.dns.example.com.     SVCB 0 dns.my-dns-host.example.
dns.my-dns-host.example.  SVCB 1 . alpn=doq
]]></artwork>
        <t>The TLSA QNAME is <tt>_853._quic.dns.my-dns-host.example</tt>.  The port and protocol are inferred from the "doq" ALPN value.</t>
      </section>
      <section anchor="new-scheme-servicemode">
        <name>New scheme ServiceMode</name>
        <t>Given service URI <tt>foo://api.example.com:8443</tt> and record:</t>
        <artwork><![CDATA[
_8443._foo.api.example.com. SVCB 1 api.example.com.
]]></artwork>
        <t>The TLSA QNAME is <tt>_8443._$PROTO.api.example.com</tt>, where $PROTO is the appropriate value for the client-selected transport as discussed in <xref target="protocols"/> .</t>
      </section>
      <section anchor="new-scheme-aliasmode">
        <name>New scheme AliasMode</name>
        <t>Given service URI <tt>foo://api.example.com:8443</tt> and records:</t>
        <artwork><![CDATA[
_8443._foo.api.example.com. SVCB 0 svc4.example.net.
svc4.example.net.           SVCB 1 .
svc4.example.net.           A    192.0.2.1
]]></artwork>
        <t>The TLSA QNAME is <tt>_8443._$PROTO.svc4.example.net</tt> (with $PROTO as above).  This is the same if the ServiceMode record is absent.</t>
      </section>
      <section anchor="new-protocols">
        <name>New protocols</name>
        <t>Given service URI <tt>foo://api.example.com:8443</tt> and records:</t>
        <artwork><![CDATA[
_8443._foo.api.example.com. SVCB 0 svc4.example.net.
svc4.example.net. SVCB 3 . alpn=foo,bar port=8004
]]></artwork>
        <t>The TLSA QNAME is <tt>_8004._$PROTO1.svc4.example.net</tt> or <tt>_8004._$PROTO2.svc4.example.net</tt>, where $PROTO1 and $PROTO2 are the transport prefixes appropriate for "foo" and "bar" respectively.  (Note that SVCB requires each ALPN to unambiguously indicate a transport.)</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to add the following entry to the "Underscored and Globally Scoped DNS Node Names" registry (<xref section="4" sectionFormat="comma" target="RFC8552"/>):</t>
      <table>
        <thead>
          <tr>
            <th align="left">RR Type</th>
            <th align="left">_NODE NAME</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLSA</td>
            <td align="left">_quic</td>
            <td align="left">(This document)</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7671">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Protocol: Updates and Operational Guidance</title>
            <author fullname="V. Dukhovni" initials="V." surname="Dukhovni"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document clarifies and updates the DNS-Based Authentication of Named Entities (DANE) TLSA specification (RFC 6698), based on subsequent implementation experience. It also contains guidance for implementers, operators, and protocol developers who want to use DANE records.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7671"/>
          <seriesInfo name="DOI" value="10.17487/RFC7671"/>
        </reference>
        <reference anchor="SVCB">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google</organization>
            </author>
            <author fullname="Mike Bishop" initials="M." surname="Bishop">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Erik Nygren" initials="E." surname="Nygren">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="11" month="March" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins.  SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello).  They also enable aliasing of apex domains, which is not possible with CNAME.  The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics").  By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-svcb-https-12"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC3436">
          <front>
            <title>Transport Layer Security over Stream Control Transmission Protocol</title>
            <author fullname="A. Jungmaier" initials="A." surname="Jungmaier"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <date month="December" year="2002"/>
            <abstract>
              <t>This document describes the usage of the Transport Layer Security (TLS) protocol, as defined in RFC 2246, over the Stream Control Transmission Protocol (SCTP), as defined in RFC 2960 and RFC 3309. The user of TLS can take advantage of the features provided by SCTP, namely the support of multiple streams to avoid head of line blocking and the support of multi-homing to provide network level fault tolerance. Additionally, discussions of extensions of SCTP are also supported, meaning especially the support of dynamic reconfiguration of IP- addresses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3436"/>
          <seriesInfo name="DOI" value="10.17487/RFC3436"/>
        </reference>
        <reference anchor="RFC4035">
          <front>
            <title>Protocol Modifications for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4035"/>
          <seriesInfo name="DOI" value="10.17487/RFC4035"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7672">
          <front>
            <title>SMTP Security via Opportunistic DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS)</title>
            <author fullname="V. Dukhovni" initials="V." surname="Dukhovni"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This memo describes a downgrade-resistant protocol for SMTP transport security between Message Transfer Agents (MTAs), based on the DNS-Based Authentication of Named Entities (DANE) TLSA DNS record. Adoption of this protocol enables an incremental transition of the Internet email backbone to one using encrypted and authenticated Transport Layer Security (TLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7672"/>
          <seriesInfo name="DOI" value="10.17487/RFC7672"/>
        </reference>
        <reference anchor="RFC7673">
          <front>
            <title>Using DNS-Based Authentication of Named Entities (DANE) TLSA Records with SRV Records</title>
            <author fullname="T. Finch" initials="T." surname="Finch"/>
            <author fullname="M. Miller" initials="M." surname="Miller"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>The DNS-Based Authentication of Named Entities (DANE) specification (RFC 6698) describes how to use TLSA resource records secured by DNSSEC (RFC 4033) to associate a server's connection endpoint with its Transport Layer Security (TLS) certificate (thus enabling administrators of domain names to specify the keys used in that domain's TLS servers). However, application protocols that use SRV records (RFC 2782) to indirectly name the target server connection endpoints for a service domain name cannot apply the rules from RFC 6698. Therefore, this document provides guidelines that enable such protocols to locate and use TLSA records.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7673"/>
          <seriesInfo name="DOI" value="10.17487/RFC7673"/>
        </reference>
        <reference anchor="I-D.barnes-dane-uks-00">
          <front>
            <title>Unknown Key-Share Attacks on DNS-based Authentications of Named Entities (DANE)</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Mozilla</organization>
            </author>
            <date day="9" month="October" year="2016"/>
            <abstract>
              <t>   Unknown key-share attacks are a class of attacks that allow an
   attacker to deceive one peer of a secure communication as to the
   identity of the remote peer.  When used with traditional, PKI-based
   authentication, TLS-based applications are generally safe from
   unknown key-share attacks.  DNS-based Authentication of Named
   Entities (DANE), however, proposes that applications perform a
   different set of checks as part of authenticating a TLS connection.
   As a result, DANE as currently specified is likely to lead to unknown
   key-share attacks when clients support DANE for authentication.  We
   describe these risks and some simple mitigations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-barnes-dane-uks-00"/>
        </reference>
        <reference anchor="RFC8552">
          <front>
            <title>Scoped Interpretation of DNS Resource Records through "Underscored" Naming of Attribute Leaves</title>
            <author fullname="D. Crocker" initials="D." surname="Crocker"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Formally, any DNS Resource Record (RR) may occur under any domain name. However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies. The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., "_name"). The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch. This specification explores the nature of this DNS usage and defines the "Underscored and Globally Scoped DNS Node Names" registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="222"/>
          <seriesInfo name="RFC" value="8552"/>
          <seriesInfo name="DOI" value="10.17487/RFC8552"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC8441">
          <front>
            <title>Bootstrapping WebSockets with HTTP/2</title>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="September" year="2018"/>
            <abstract>
              <t>This document defines a mechanism for running the WebSocket Protocol (RFC 6455) over a single stream of an HTTP/2 connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8441"/>
          <seriesInfo name="DOI" value="10.17487/RFC8441"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC8094">
          <front>
            <title>DNS over Datagram Transport Layer Security (DTLS)</title>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="P. Patil" initials="P." surname="Patil"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>DNS queries and responses are visible to network elements on the path between the DNS client and its server. These queries and responses can contain privacy-sensitive information, which is valuable to protect.</t>
              <t>This document proposes the use of Datagram Transport Layer Security (DTLS) for DNS, to protect against passive listeners and certain active attacks. As latency is critical for DNS, this proposal also discusses mechanisms to reduce DTLS round trips and reduce the DTLS handshake size. The proposed mechanism runs over port 853.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8094"/>
          <seriesInfo name="DOI" value="10.17487/RFC8094"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC9103">
          <front>
            <title>DNS Zone Transfer over TLS</title>
            <author fullname="W. Toorop" initials="W." surname="Toorop"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="S. Sahib" initials="S." surname="Sahib"/>
            <author fullname="P. Aras" initials="P." surname="Aras"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>DNS zone transfers are transmitted in cleartext, which gives attackers the opportunity to collect the content of a zone by eavesdropping on network connections. The DNS Transaction Signature (TSIG) mechanism is specified to restrict direct zone transfer to authorized clients only, but it does not add confidentiality. This document specifies the use of TLS, rather than cleartext, to prevent zone content collection via passive monitoring of zone transfers: XFR over TLS (XoT). Additionally, this specification updates RFC 1995 and RFC 5936 with respect to efficient use of TCP connections and RFC 7766 with respect to the recommended number of connections between a client and server for each transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9103"/>
          <seriesInfo name="DOI" value="10.17487/RFC9103"/>
        </reference>
      </references>
    </references>
    <?line 263?>

<section anchor="uks">
      <name>Unknown Key-Share Attacks</name>
      <t>In the Unknown Key-Share (UKS) Attack <xref target="I-D.barnes-dane-uks-00"/>, a hostile domain ("attacker.example") claims the IP addresses and TLSA records of another domain ("victim.example").  A client who attempts to connect to "attacker.example" will actually be connecting to "victim.example".</t>
      <t>The client then sends some commands or requests over this connection.  If the server rejects these requests, or if the attacker could have forwarded these requests itself, the attack confers no advantage.  However, if the client issues commands that the attacker could not have issued, and the victim does not ignore these requests, then the attack could change state at the victim server, reveal confidential information to the attacker (e.g., via same-origin data sharing in the client), or waste resources.</t>
      <t>Here are some examples of requests that the attacker likely could not have issued themselves:</t>
      <ul spacing="normal">
        <li>
          <t>Requests authenticated using a TLS Client Certificate or other credential that is bound to the connection but not the domain.</t>
        </li>
        <li>
          <t>Requests that are only permitted if they appear to come from a particular IP range.</t>
        </li>
      </ul>
      <t>This section lists some protocols that can be used with SVCB, analyzes their vulnerability to this attack, and indicates any resulting restrictions on their use:</t>
      <ul spacing="normal">
        <li>
          <t>HTTP/0.9 and HTTP/1.0: <strong>Vulnerable</strong>
          </t>
          <ul spacing="normal">
            <li>
              <t>Clients <bcp14>MUST NOT</bcp14> use TLS Client Authentication with DANE and these protocol versions.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Example attack: "https://attacker.example/" fetches "/profile" in Javascript.  The second request is directed to "victim.example" and authenticated by a client certificate, revealing the user's profile to the attacker.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Use of these protocol versions with DANE is <bcp14>NOT RECOMMENDED</bcp14>.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>HTTP/1.1 and later: <strong>Slightly Vulnerable</strong>
          </t>
          <ul spacing="normal">
            <li>
              <t>The CONNECT method (<xref section="3.6" sectionFormat="comma" target="RFC9110"/>) <bcp14>MUST NOT</bcp14> be used on a connection authenticated with DANE.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Example attack: "attacker.example" advertises a CONNECT proxy service to existing customers of the "victim.example" proxy, which is access-controlled by client IP.  To reduce its own operating costs, "attacker.example" uses UKS to send users back to "victim.example", resulting in the attacker's service appearing to work but silently consuming clients' transfer quota on "victim.example".</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Clients <bcp14>MAY</bcp14> use all other methods with DANE, including Extended CONNECT <xref target="RFC8441"/>.  These methods are defended from misdirection attacks by server verification of the <tt>Host</tt> or <tt>:authority</tt> header (<xref section="7.4" sectionFormat="comma" target="RFC9110"/>).</t>
            </li>
          </ul>
        </li>
        <li>
          <t>DNS over TLS, DTLS, or QUIC <xref target="RFC7858"/><xref target="RFC8094"/><xref target="RFC9250"/>:
          </t>
          <ul spacing="normal">
            <li>
              <t>For resolution: <strong>Not Vulnerable</strong>
              </t>
              <ul spacing="normal">
                <li>
                  <t>DNS resolution does not change state at the server, reveal confidential information to the attacker, or waste significant resources.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>For other uses: <strong>Mitigation Required</strong>
              </t>
              <ul spacing="normal">
                <li>
                  <t>When using DNS for other purposes such as zone transfers <xref target="RFC9103"/>, clients relying on DANE for server authentication <bcp14>MUST NOT</bcp14> use a client certificate that is authorized by multiple potentially hostile servers.</t>
                </li>
              </ul>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA81b63LbRpb+j6fopbcqkoukJUu2Ze0kGVpSYu3YkkaUk81O
TVlNoEn2GAQQNECaVpRn2WfZJ9tz6W40QMr2ZPfHqsoJCfTl9Hfu5zQHg0FU
6SpVx6L3zuhsJk4vxuOzEzGqq7nKKh3LSueZyKfiQi5UIs7gWaWVETuno4uz
XbHS1RzniLEqlzpW4pXOElgHBox/Onm1K2SWiL++Oz/pRXIyKdUSNsIXA5ze
i2B5NcvL9bEwVRJFSR5nsM2xSEo5rQZaVdNBkpm8GJhlPBkkMlODvcNIF+Wx
qMraVE/39l7uPY1kqeSxyAsTrfLyw6zM6wLWwInRB7WGZ8mxOM8qVWaqGpzi
2lFdJLC3ORbPn788iiJTAaHvZZpnsPtamcgsZFm9/7XOaVCWR4U+Fn+r8rgv
TF5WpZoa+LRe4Ie/R5EEvPLyOBKDSMAfn+KVyv4hFzoTb4diHM9XsOInep2X
M5npT4TtsXirKimuUllN83IBq55n8ZCGqYXU6bFAGP48gS8mHsIB2ntc5xNV
VuJsKTOzZe0f83yWKvHmzUm4osLR5Z9n9HIY54soymBvmLNUx1Gks2nwLRoM
BkJOTFXKuIqiDqMdn0sVA8xG6Kwq86SGAVJkaiVwJRQfpFbgFBhIIgWwgNwM
hbiZq7WQqclFnGdL+Oy3h1FykteVAFkUKkuKHFb/xghTFwXwAMSxKHNgSZ4i
L+p4LqQRq7mC4SUJHQgJHBTHCm2EXMLh5QROjJvCAxC3egFSLkyhYj1FsZ7n
KyRr8EoaWP5rtUCjbAE6hvVhQxeqXBgV16XCI2YMAJCsszitCcTaKFydKM3q
BbDUkOY09PuTikSbOF+qEuhYaikQfvFrrUqgh9EUPZBbHfeC2YQ+nF2lCITn
UYKUwXoV0FBrMxc3b8Yjz0rggjiFJ16HhywLC50kqYqiR6hTtBCeJ4pw638C
Owu6fX939y/XP5y8eP5i//5eqI9FKnXG7IhTDesYkeZoLUgWAjKJSgnwMuSw
DTFDmQpEogKNQ3iJKx+yfJWqZEaDcBU75xvcxlQIUb+BrE+nDhjC2AKfJLMR
icngX9InGcdtpMVZf1Di9v3R3tHe8H0VF0P1US4KVrRbWOa8YnFvS507ppnn
dZo8cFoSbwAzg0OUYpEDKScXo7dn/jUSV8DpYSk4QaolGXWlSSVwMXdUnI/f
dQbckClvgmK0FowEiR8MgMXqlFBEvGAVfG1QYhPUYZQPKydDEoGSEVrKUue1
Id/giMstFTKzVMNHwCJJWoYBRNIRipvnaU2PQQFiZUBrSgXSXRJBegEKXbYl
iZWghoF3d9+zSD0FkUqUiUs9cSoOatvV2rf/4Qjlw/vpB63pujJ+JtLFGn/9
k5tMKITGpZnKeDdTQQ6JEFoihID0umtEQENQ1789H5wOt/vHeVUV5v4eDMsQ
bBy5WRC5AmABo+e54AwlGQ486Oubm6txIJct7QNuoHFq6ESjDsweTEjLvb40
61pL8UicoDnPiCe0z6makrTBdzYW4JvFimjqvX03vun1+f/i4pI+X5/BUtdn
p/h5/Hr05o3/ENkR49eX796cNp+amSeXb9+eXZzyZHgqWo+i3tvRLz1mc+/y
6ub88mL0pofiXLVYh4IMAEws20Cx0OlIEzmekgq8Orn67//aP7Qm7On+/ksQ
GP5ytP/iEL6g0vJueZau7VeQhnUki0KBBMMqMk1FLAtdSfRmkgzBKhOoUIDm
478hMn8/Fn+axMX+4Xf2AR649dBh1npImG0+2ZjMIG55tGUbj2breQfpNr2j
X1rfHe7Bwz99n2owbYP9o++/i1hGwNJWZBfJaLeYUxSAJRgDQG6NbEIEtwu9
qNaFCmKEtuh7zRXiBzBlGKXqak0MEhy0souiwLWHDpSMH+wIwR8aNDJYpr2Z
mKkMFB1II12wwbXXogfC5Si6uxtbI/Acj9z4RCPXBqKx78TPOL8JB8iG2oiI
VFfHugpcP8QJLbuCBjk0dYHp6qMlZyPtTKt/4x0R6j0wAQLJDKFgM4Bmm3wF
7xUaBh+4iVI29h9H56WewSK81obZRPZqazQNudV8pmME+wHDBuwbO0cAsIMV
nDKjAyeyAuajSSoViIwNyXaaMExmazFCp/k2TxqDCYLyBIAhl2V2CYqMwg4l
QZyaiE7IqlKLAi1+CaEzhCZlvhDyAXr7oNQUrbU8cIguKfiEYwCwnJKlW9zI
cqYqDKZYDqfkyQG6TUoAkp0LctdsZygWkCXgyiYnhCae455o8bK8opWHu5bC
MAoFG/6xRVnz0mnoFkR2itwYODwF92mtMow9J2taoCfTIuuJ8TK+kqVc7A7t
rg9tGMRkf3hLXKO1ZXTdIEFyARaAcgZjIOhAox8j0xBAG5+A/QeXAAqlMXh1
Sns43Eei0PZjYnl/D0ufTzcjrY4WkZBjtIqTpZNMDpKIMX0fHxIUU10aVPK1
8882Q3KhrWWm2aq2fTZBU9CSiYw/uAM5+lojYYmWr2tO+qJlnkDSXucrBfFh
3x0LvBemMY0HERBWUF4YhqxoOmRXsPtMOuJfgnjNFFkENLxZbcDeY+qkpqDo
muNcODgYwVKbD6QNiQKxsXkFifm0rhBPNOwGHjJPUNkJmr8SObgZqj5LiSWy
C3uephgTOVBtFIuZKwb4Nl4PlMqyI4zgUSetpQO9RF2TaWWD8y6nQAOJUn5x
fT1WhAKLB0g27bTEFISYTqQypUZx1jy+OHf83ZA7Sxwti+FfBpIkIT1agPFr
BevotgZnZzsHu5sbLQG0hDMVyVvGCpIuisbRey9RBoiVbbkClrkAxkb0IIEV
Y4lZBnKHSfD+weqR3X1u/fggLxBqFFw1l0sN/N8hqQWT2ZXZAzwzTrq/h6No
ewSnP1QDkiCS5KbZ3Twg/FbNvZZzWoYahRbCaVWWZwOS7MY8wTEgGhgl7G6Y
J86XO2OHIkzVi7tH3s3fh5HBQdvE2LOysncX8y4CaDBVibk67NzIvU12fHTR
tvec6zksvafxm6C76EGKi1F2nRQupDZxVfTgqD8jKjSjUh8r8r4rMJuVDX9h
Mjnkj5APgTRjVttkFn6PcHfyuCy3JqDThOaHjJtNtXx1AicxphSXv9zb28NE
qfL5agZ6vcBEF/SYqHBOvBNpxaAPeQGRHUg3Ceq706u+gJ0zFwRRsIJUYSLa
Lq9QRMlVKJ2ih0G0gDFTPatLXydp1Vz6najX1i1tcAoUCMz10buhzWQD9b/i
JFgnTOnxaDcnVy6POTx8TjpDXBY7RKKFcv/wBb8irgfTxyc3bv7B4QHPJ/Hg
6tTOBj92KVS+JHRZpVFodWK/Q9b46JG4BjO6ACgS1YHONLVJnAZwlVwPgaDY
xqTsK50DAgxIO7sRH47jiFVS3W2JFAwwESkBXlinVYuxYQb4LDWcDQH533//
XfwnyHJE7sQXf8TGHycfe+Lj+tPQbeOHR6vVavi5FfgM2+dufbqx874YCoy9
vp0/FcPhl2eN6L/7L58O94ZPh/vR+8PDAy5wbZ9JRoZWBki8+XaVukyphKsp
mOa6UOwvam3IMoOe2Ti04ZZnFNbgcVBRT1LQKxWsgwy1YhCylJMuu4lVZS7k
+bDc2w13kk2Ovk8yM8R//owOye0I7LTw3ZSAL/0l+Ryom3/7BD7cfQ8b34td
BvMHMoZcNV7ITHKI1Pe0G3i6BuuaVZwZA3C+JBcYf3opMDdNbSDQOu4XGMyM
oa5MDLtDtrtFFj//WnSlZAR+n/xvGEY0cYmgYL/NM+R5X0xsn4DHgr1NVEpe
kbKwwHU752nzatRrndVU6KGSwpDMzLsMSz5kZQqdwZcZ0EbxWjcWeN5esM/k
g0XOaywaGesu2KAlGsNW9DPK2g8fml1fGw7vnFRzIJpRwlqtw4As1CMPKVcv
LLBgaUVcmyoHKygWejYHjcqL9WY9GU5J4aEuSX8+Ad/7rUzdUsPpsZWkMKJk
srFay8Bso+0bQwsDiT+7I7shpp4YCP/gjBjP5hU5N9RmdCMfyBoQnrLdTljp
NIV4S6f9oECNsT540LpCCWjSYgsD7D5ySRyWBz5RFZ2TFB+K2tNuNkLoRUwU
NdaDLBTISGkRtD4CnqWQNVKFD+JU8NHIRVeaCVMab3OwFDrPU+RjFEHUANEb
1k4DN7/Atk8YKaArVeDnSht7O8AoRIFcmcHEKoRSeF7fIiFxzPHUo1/gjP8A
OabJQW8KRDM3nD34NAWwAKiLPCMHibJQIH9hh420ZaNLaGxlOcP2G8X2wBow
ywWkvGvvrsnxWgZA7AorNxZ7avsV9hSuhYdnjSV5dc95GOnOmqhZKRObCbb9
z0J+wLoIBesriPoHOgsMSxtqSKeBY58TINu1kctcJ6HKtA8gw+KNS5jWgJoF
mKTHBuQb3LJbqI+qjDUcGI7NqoAqBadhDfjCGQwnIGNX4jjpBFg3ZEHJrbRU
wPWqks0iOTUUIeVGYwlffZjeyXyCmtQ52rSlLvNsQbn1iqJw7smguWRbaSPf
hYIQNsguOftjk+Y7E7ipASXfsp8hz4D4kgF1URt3kzgLs/6PCOZsuFuMpLJ9
06+rHkCJlsYyNGTn2GOvWu2voNDILgvnMrdbTbxdsVKl8sm9T/cROS5b+Ayo
KTUYnqQzV9V8KAc+HPr08XDv4BlF5d2knpNySsm29lsDlF2xLMzAdCtRX5HY
EvgrlFsyiJSWyqyhl1pOlCUGLVjM0MFGWfX2Y4MCCxt/MkjxXMP2ID44t84w
7Yob8qLoBAIKLHtsSejKOrMZz5tx0yXA2O7J/nCvHyjoVJcLOhz3UNsmRU6x
kOPAyWbo7+h+DIho33Ks2R0dCHg/Mr9sUN9l2KPOBATBYjzH9zvv/jLeRUkG
I4VFL5AwHc9DdCcQ5cCx0WeKoBDa1Cl5MvlgV3xBhcByV1xx76Q9CQipMwlh
Crj6ii4ZwKuFKxrd3X2PDciJLCG24hs59QczwPQNjntiq2VB0a/dPVzWKbZF
0Dx5JLAiZrHeJ21IZUUVIPRvcbkukApUJOdy6a4KEh6sBoQDVva0hs9olAJ6
gTwI87yF0AuUD9RN9TFWBbeMd9EonnHoZK0gp9JUMbfPQZ8WVETBkLR7DWaj
JbxRbjNgE1wNaAQ2Iiy/GeRjvqITSoPOEBSthiMOrMjTktaySIsH3tNqtZzy
BdZWWEVtF4uDWc5SgrQoin7UWLJwkvvu+lzcUvv4+MkTWejWlQXiBG/E2UHU
GdGkQTaIv3E2w5dWb5tcort8SKLP8P4ogeYhCsOE2yzjQ/82Q3O/8aSbn8dJ
1k6vwwdbs+MvA9FZxgJBVRHvEz6LA5YIvoBDZ8jQ1Q26+GwBzPG0i43Lafvz
AypzfXsEJ9qCYFOgaIEX1gK2tG2ou4oKRRbhoN/pMfk7TFTgzgFOLCbd/lvg
X24R3FvXpuVLKe3mCzOD/RIEyhTGTY+xH3f7/ojYg4tu8Cd4v419dKosbzlL
jXEfZAh8DN9x+Weo6ALbJWPzPUpRcCUzVCdu/9qLPLdhJWO7om8UPEg0KFDa
xwuWw8UaL6AMMP1r1IEEJMmrh3Xg6Jml/oE1bu1NNuI5XcQK65Q6m6qydA1W
aujBbj0xenN1gQ2JWg09CBsW5ashMJ/FAP8Ih70HcYgeBMgh6KH69QtQkST8
32H16yZWF2olTDyHtPSLfmKa55tG+BglcpsEsaTCnK7h93K0YYsexoLW+ter
68ubyw0/0rd5BL92XVVKUosSQxk+rs8kOYAasFtu3ViQfMmyNsYFz00f5l5s
4PV5p/V1aJmvheurvZf9c5L22UGjr3RdLfw3DI/YoSjF4g8gUuFi16XqOrjL
YTOELYVajEsn2NJoYPbg///Bl4YeOP2F1foQEFtvuLd3+BkE4a1DcH8LhCCb
7UFPNwe1BZ1DZjuYb6xtubLBV0C8JqAO9IDsHjdkgPgeplLYJwGEKdXcuchd
V9feoqEmreHknswH9lMgD5roWZ3Xhm5aJFywlQ0BGFvjVeHRxWij2kAPARdc
WxnbosH7oFU7AM/sTQcyX++w4GaAqZRBJuLHNJ9QNjCO88JmChcoUXTzBc81
g1wQFtjhG51Hz5497QufDkMCDLLxG8Th4gaiaPGbeH9xeXomiGfwGK94UXuN
/36DoQP+E/5T94t9AkO5ui1wVbThdg1/A4DLC7swlG5WY3BAt8WaRHDAieCI
8xpx9wjTGUCOE/PNgZwx8vDPJWtYIEYvolOfoOz0XK7oxK23C1ZS6gVr7vkV
8qbE+zB8obNV+8CLK1nYsYf1OHVsVsMKmi8LzPOmRENtf4oF8eMmHVzv9Qnr
RHVy1u5ONuqzW9GFLbApWMfiItFiIfFbXjrRM5z/dy4TccXFpfiqtNVS46sv
PJfuzVmT5kiHVTCwo2IHaBtWGFXSmYd1bpVO+8FEqjFglSpDRcASkqTC4wO1
FQ25ojLNgXyZrEMGZs1ECk1ImtvdPrm3RV49y3I2Ia3zVa5s76nEVbmkiPcm
UOWrcEHGC4vzS8V93KnG8iDG4OHvOzpFCrGDLbc+XVRERzFwdwRlBQ/mfIPN
NhkYgl0CfyXBelBdqC5jKnK+do194rhP4UFKPfqbYOHNfaqHbMEMRy6AXUtl
KEi/dssEnQkYVRt/s8NWQ8RJ0MnyFyxjMF8WD6IDL8hgpuCvlzWpkatf4mNX
YA/2990IKlIWqrRVAJaUtb36Z28pKXcpESvv2IiCN6DX1JFwVU9j9001Lk/4
bamZTWwRL2jByUym609cH9Wlr87wVQc6F3p3W8xCCXT+wlBVs2nk4M83Sm1b
EVyDhPVgO0KeMsO94Ut/gxeLdMfi8eOffDno8eNIiIEvR/miJhajAs6Muk0l
W6xz6hHU6wReZKJaEfVxB65aZM9zLHq+OtExXk96YqqqGLvUvSew3FSjQQMh
/ne5lHi7iGriN2Rk4pwiFuIsikRznXbTxvG1t5bw0cU1axqC/qlTQzKWXLrG
cqClpauDQ4LunVFNmXkDhAAqoLJz63voeNSq5yGDximW7UFKNziFxz+5vLg4
O7kRC1XN88S565f7+3uNuz4Y4j2ShqFOCukWYVhOaOHiqX2QeZseB6wvIki+
zpMGQHxc+/izwt9K8PUe32U0rq63wS6a27cVXCq/YgcivFcC7LPMO7/iy0Ng
JPCndO52g+0k43Y52eUtdNdIMZZC6UdnWULcNv5OWpesTv+0UzH2lW1/fRiW
wN9Ycn0VpIf6ttzAI7pY477h+A9vx+NPKCXyZ9NHt1TU1fmxMkoWksUgELXw
B3NnH21z3nHGxnaHh3wZ9Ybk1i2B1jGBQI5mkAFcaNNci7dFY8Tf+nn41/w0
zTL09jVgzhH6Mf/cE8zarZgriQ3grdL6YnhIt5oeU1DadBhO6b/+mh//0Ojo
2dH9vT3G3stD9/nl02cQrh0TWD9QwOKaH6hREKR3lQkHctvJd0maHu4Wj/0H
XXXgdw1EDQRXVoU+2FHM7ES5RIrf6krPeMVrTikSTzbdDqjd75ApS+HJRV0W
OQq2681Q79XJmBEO/L0DjGzdnV1sYeFaeRZ0CZnBnesELQexzYR6J205/4nV
1d8YLPKKIUvXPqzmrQxdahvF7ueH1PKM7o75BrtKvu1NZWpUD4L6m8tTyJv9
SHDI/wPrKmHxoD0AAA==

-->

</rfc>
