<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.24 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-benecke-cfbl-address-header-07" category="exp">
  <front>
    <title abbrev="CFBL Address Header">Complaint Feedback Loop Address Header</title>

    <author initials="J." surname="Benecke" fullname="Jan-Philipp Benecke">
      <organization>CleverReach GmbH &amp; Co. KG</organization>
      <address>
        <postal>
          <street>Schafjueckenweg 2</street>
          <city>Rastede</city>
          <code>26180</code>
          <country>Germany</country>
        </postal>
        <phone>+49 4402 97390-16</phone>
        <email>jpb@cleverreach.com</email>
      </address>
    </author>

    <date year="2022" month="June" day="15"/>

    <area>art</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes a method that allows an email sender to specify a complaint feedback loop (FBL) address as an email header.
Also it defines the rules for processing and forwarding such a complaint.
The motivation for this arises out of the absence of a standardized and automated way to provide mailbox providers with an address for a complaint feedback loop.
Currently, providing and maintaining such an address is a manual and time-consuming process for email senders and providers.</t>

<t>It is unclear, at the time of publication, whether the function provided by this document has widespread demand, and whether the
mechanism offered will be adopted and found to be useful. Therefore, this is being published as an Experiment, looking for a constituency
of implementers and deployers, and for feedback on the operational utility. The document is produced through the Independent RFC stream
and was not subject to the IETF's approval process.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction-and-motivation" title="Introduction and Motivation">
<t>For a long time there has been a way for a mailbox provider to forward manual complaints back to the email sender.
The mailbox provider provides what is called a feedback loop <xref target="RFC6449"/>. 
This feedback loop is used to give operators of, e.g. broadcast marketing lists, feedback on resulting complaints from their marketing mailings.
These complaints are based on manual user interaction, e.g. IMAP movement to "junk" or by clicking on a "This is spam" button.</t>

<t>As described in <xref target="RFC6449"/> the registration for such a feedback loop needs to be done manually by a human at any mailbox provider who provides a FBL.
This can be quite time-consuming if there are new feedback loops rising up, or the email sender wants to add new IP addresses or DKIM domains.
In addition, a manual process is not well suited and/or feasible for smaller mailbox providers.</t>

<t>Because of the manual process involved, the email sender has to go through all providers again, delete his existing subscriptions and register with their new complaint address.</t>

<t>This document addresses this issue with a new email header.
It extends the recommendations for the complaint feedback loop described in <xref target="RFC6449"/> with an automated way to submit the necessary information to mailbox providers.</t>

<t>Mail senders can add this header, willing mailbox providers can use it to forward the generated report to the specified complaint address.
The email sender only needs to add an email header and does not need to manually register with each feedback loop provider.
The elimination of a manual registration and verification process would be another advantage for the mailbox providers.</t>

<t>A new email header has been chosen in favour of a new DNS record to easily distinguish between
multiple broadcast marketing list operators / email senders without requiring user or administrator intervention.
For example, if a company uses multiple mailing systems, each system can set this header itself without requiring any change by the users or administrators within their DNS.
No additional DNS query is required on the mailbox provider side to obtain the complaint address.</t>

<t>This document has been prepared in compliance with the GDPR and other data protection laws to address the resulting issues
when providing an automated address for a complaint feedback loop, as the email may contain personal data.</t>

<t>Nevertheless, the described mechanism bellow potentially permits a kind of man-in-the-middle attack between the domain owner and the recipient.
A bad actor can generate forged reports to be "from" a domain name the bad actor is attacking and send this reports to the complaint FBL address.
These fake messages can result in a number of actions, such as blocking of accounts or deactivating recipient addresses.
This potential harm and others are described with potential countermeasures in <xref target="security-considerations"></xref>.</t>

<t>In summary, this document has the following objectives:</t>

<t><list style="symbols">
  <t>Allow email senders to signal that a complaint address exists without requiring manual registration with all providers.</t>
  <t>Allow mailbox providers to obtain a complaint address without developing their own manual registration process.</t>
  <t>Be able to provide a complaint address to smaller mailbox providers who do not have a feedback loop in place</t>
  <t>Provide a GDPR-compliant option for a complaint feedback loop.</t>
</list></t>

<section anchor="scope-of-this-experiment" title="Scope of this Experiment">
<t>The CFBL-Address header and the CFBL-Feedback-ID header are an experiment. 
Participation in this experiment consists of adding the CFBL-Address-Header on email sender side or by using the CFBl-Address-Header to send FBL reports to the provided address on mailbox provider side.
Feedback on the results of this experiment can be emailed to the author, raised as an issue at https://github.com/jpbede/rfc-cfbl-address-header/ or can be emailed to the IETF cfbl mailing list (cfbl@ietf.org).</t>

<t>The goal of this experiment is to answer the following questions based on real-world deployments:</t>

<t><list style="symbols">
  <t>Is there interest among email sender and mailbox providers?</t>
  <t>If the mailbox provider adds this capability, will it be used by the senders?</t>
  <t>If the email sender adds this capability, will it be used by the mailbox provider?</t>
  <t>Does the presence of the CFBL-Address/CFBL-Feedback-ID field introduce additional security issues?</t>
  <t>What additional security measures/checks need to be performed at the mailbox provider before a complaint report is sent?</t>
  <t>What additional security measures/checks need to be performed at the email sender after a complaint report is received?</t>
</list></t>

<t>This experiment is considered successful if the CFBL-Address header has been implemented by multiple independent parties (email sender and mailbox provider)
and these parties successfully use the address specified in the header to exchange feedback loop reports.</t>

<t>If this experiment is successful and these headers prove to be valuable and popular, it may be taken to the IETF for
further discussion and revision. One possible outcome could be that a working group creates a specification for the standard track.</t>

</section>
<section anchor="difference-to-one-click-unsubscribe" title="Difference to One-Click-Unsubscribe">
<t>For good reasons, the One-Click-Unsubscribe <xref target="RFC8058"/> signaling already exists, which may have several interests in common with this document.
However, this header requires the List-Unsubscribe header, whose purpose is to provide the link to unsubscribe from a list.
For this reason, this header is only used by operators of broadcast marketing lists or mailing lists, not in normal email traffic.</t>

<t>The main interest of this document now is to provide an automated way to signal mailbox providers an address for a complaint feedback loop.
It is the obligation of the email sender to decide for themselves what action to take after receiving a notification; this is not the subject of this document.</t>

</section>
</section>
<section anchor="definitions" title="Definitions">
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this 
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

<t>The keyword "CFBL" in this document is the abbreviation for "complaint feedback loop" and will hereafter be used.</t>

<t>The keyword "MBP" in this document is the abbreviation for "mailbox provider", it is the party who receives an email, and will be used hereafter.</t>

<t>The keyword "email sender" in this document is used to describe the party who sends an email, this can be an MBP, a broadcast marketing list operator or any other email sending party. It will be used hereafter.</t>

</section>
<section anchor="requirements" title="Requirements">

<section anchor="received-email" title="Received email">
<t>This section describes the requirements that a received email, i.e. the email that is sent from the email sender to the MBP and about which a report is to be sent later, must meet.</t>

<section anchor="strict" title="Strict">
<t>If the domain in the <xref target="RFC5322"/>.From and the domain in the CFBL-Address header are identical, this domain MUST be covered by a valid
<xref target="DKIM"/> signature. In this case, the DKIM "d=" parameter and the <xref target="RFC5322"/>.From field have identical DNS domains.
This signature MUST meet the requirements described in <xref target="received-email-dkim-signature"></xref>.</t>

<t>The following example meets this case:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

</section>
<section anchor="relaxed" title="Relaxed">
<t>If the domain in CFBL-Address is a child domain of the <xref target="RFC5322"/>.From, the <xref target="RFC5322"/>.From domain MUST be covered by a valid <xref target="DKIM"/> signature. 
In this case, the DKIM "d=" parameter and the <xref target="RFC5322"/>.From domain have a identical (Example 1) or parent (Example 2) DNS domains.
This signature MUST meet the requirements described in <xref target="received-email-dkim-signature"></xref>.</t>

<t>Example 1:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@mailer.example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com;
      h=Content-Type:Subject:From:To:Message-ID:
      CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Example 2:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@mailer.example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@mailer.example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com;
      h=Content-Type:Subject:From:To:Message-ID:
      CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

</section>
<section anchor="complex" title="Complex">
<t>If the domain in <xref target="RFC5322"/>.From of differs from the domain in the CFBL-Address header,
the domain of the CFBL-Address header MUST be covered by an additional valid <xref target="DKIM"/> signature.
Both signatures MUST meet the requirements described in <xref target="received-email-dkim-signature"></xref>.</t>

<t>This double DKIM signature ensures that both the domain owner of the From: domain and the domain owner of the CFBL-Address: domain
agree to receive the complaint reports on the address from the CFBL-Address: header.</t>

<t>The following example meets this case:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@super-saas-mailer.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@super-saas-mailer.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;
DKIM-Signature: v=1; a=rsa-sha256; d=super-saas-mailer.com; s=system;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

</section>
<section anchor="received-email-dkim-signature" title="DKIM signature">
<t>The CFBL-Address header MUST be included in the "h=" tag of the aforementioned valid DKIM-Signature.
When the CFBL-Feedback-ID header is used, it MUST also be included in the "h=" tag of the aforementioned valid DKIM signature.</t>

<t>If the domain has neither the required coverage by a valid DKIM signature nor the required header coverage by the "h=" tag, the MBP SHALL NOT send a report email.</t>

</section>
</section>
<section anchor="report-email" title="Report email">
<t>The report email (sent by MBP to email sender) MUST have a valid <xref target="DKIM"/> signature. 
The aforementioned valid DKIM signature MUST cover the From: header <xref target="MAIL"/> domain, from which the report is sent to the email sender.</t>

<t>If the message does not have the required valid <xref target="DKIM"/> signature, the email sender SHALL NOT process this complaint report.</t>

<t>As part of this experiment, it is recommended to determine what plausibility and security checks are useful and achievable.</t>

</section>
</section>
<section anchor="implementation" title="Implementation">

<section anchor="mail-senders" title="Email senders">
<t>An email sender who wishes to receive complaints about their emails MUST include a CFBL-Address header in their messages.</t>

<t>The receiving complaint FBL address specified in the messages MUST accept <xref target="ARF"/> compatible reports by default.
The email sender can OPTIONALLY request a <xref target="XARF"/> compatible report if they want one, as described in <xref target="xarf-report"></xref>.
The MBP MAY send a <xref target="XARF"/> compatible report if it is technically possible for them to do so, otherwise a <xref target="ARF"/> compatible report will be sent.</t>

<t>It is strongly RECOMMENDED that these reports be processed automatically. Each sender must decide for themselves what action to take after receiving a report.</t>

<t>The email sender MUST take action to address the described requirements in <xref target="requirements"></xref>.</t>

</section>
<section anchor="mailbox-provider" title="Mailbox provider">
<t>If the MBP wants to process the complaints and forward it, they MUST query the CFBL-Address header and forward the report to the complaint FBL address.</t>

<t>By default, an <xref target="ARF"/> compatible report MUST be sent.
Per <xref target="RFC6449"/> Section 3.2, a complaint report MUST be sent when a manual action has been taken e.g., when a receiver marks a mail as spam, 
by clicking the "This is spam"-button in any web portal or by moving a mail to junk folder, this also includes <xref target="IMAP"/> and <xref target="POP3"/> movements. 
The MBP SHALL NOT send any report when an automatic decisions has been made e.g., spam filtering.</t>

<t>The MBP MUST send a <xref target="XARF"/> compatible report when the email sender requests it as described in <xref target="xarf-report"></xref>.
If it is not possible for the MBP to send a <xref target="XARF"/> compatible report as requested, a <xref target="ARF"/> compatible report MUST be sent.</t>

<t>The MBP MUST validate and take action to address the described requirements in <xref target="requirements"></xref>.</t>

</section>
</section>
<section anchor="complaint-report" title="Complaint report">
<t>The complaint report MAY be a <xref target="XARF"/> report if the email sender requests it, and it is technically possible for the MBP to do so, otherwise the complaint report MUST be a <xref target="ARF"/> report.</t>

<t>The report MUST contain at least the Message-ID <xref target="MAIL"/>. If present, the header "CFBL-Feedback-ID" of the complaining email MUST be added additionally.</t>

<t>The MBP MAY omit or redact, as described in <xref target="RFC6590"/>, all further headers and/or body to comply with any data-regulation laws.</t>

<t>It is highly RECOMMENDED that, if used, the CFBL-Feedback-ID includes a hard to forge component such as an <xref target="HMAC"/> using a secret
key, instead of a plain-text string.</t>

<section anchor="xarf-report" title="XARF compatible report">
<t>A email sender wishing to receive a <xref target="XARF"/> compliant report MUST append "report=xarf" to the <xref target="cfbl-address-header"></xref>.
The resulting header would look like the following:</t>

<figure><artwork><![CDATA[
CFBL-Address: fbl@example.com; report=xarf
]]></artwork></figure>

</section>
</section>
<section anchor="header-syntax" title="Header Syntax">

<section anchor="cfbl-address-header" title="CFBL-Address">
<t>The following ABNF imports fields, WSP, CRLF and addr-spec from <xref target="MAIL"/>.</t>

<figure><artwork type="abnf"><![CDATA[
fields /= cfbl-address

cfbl-address = "CFBL-Address:" 0*1WSP addr-spec
               [";" 0*1WSP report-format] CRLF

report-format = "report=" ("arf" / "xarf")
]]></artwork></figure>

</section>
<section anchor="cfbl-feedback-id" title="CFBL-Feedback-ID">
<t>The following ABNF imports fields, WSP, CRLF and atext from <xref target="MAIL"/>.</t>

<figure><artwork type="abnf"><![CDATA[
fields /= cfbl-feedback-id

cfbl-feedback-id = "CFBL-Feedback-ID:" 0*1WSP fid CRLF

fid = 1*(atext / ":")
]]></artwork></figure>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">
<t>This section discusses possible security issues, and their possible solutions, of a complaint FBL address header.</t>

<section anchor="attacks-on-the-fbl-address" title="Attacks on the FBL address">
<t>Like any other email address, a complaint FBL address can be an attack vector for malicious emails.
For example, complaint FBL addresses can be flooded with spam.
This is an existing problem with any existing email address and is not created by this document.</t>

<t>The email sender must take appropriate measures.
One possible countermeasure would be a rate limit for the delivering IP.
However, this should be done with caution; normal FBL email traffic must not be affected.</t>

</section>
<section anchor="automatic-suspension-of-an-account" title="Automatic suspension of an account">
<t>Sending an FBL report against a mailbox can cause the account holder to be unreachable if an automatic account suspension occurs too quickly.
An example: someone sends an invitation to his friends. For some reason, someone marks this mail as spam.
Now, if there is too fast automatic account suspension, the sender's account will be blocked and the sender will not be able to access his mails.</t>

<t>MBPs and email senders must take appropriate measures to prevent this.
MBPs and email senders therefore have, mostly proprietary, ways to assess the trustworthiness of an account.
For example, MBPs and email senders may take into account the age of the account and/or any previous account suspension before suspending an account.</t>

</section>
<section anchor="enumeration-attacks-provoking-unsubscription" title="Enumeration attacks / provoking unsubscription">
<t>A malicious person may send a series of spoofed ARF messages to known complaint FBL addresses and attempt to guess a Message-ID/CFBL-Feedback-ID or any other identifiers.
The malicious person may attempt to mass unsubscribe/suspend if such an automated system is in place.
This is also an existing problem with the current FBL implementation and/or One-Click Unsubscription <xref target="RFC8058"/>.</t>

<t>The sender of the received email must take appropriate measures.
As a countermeasure, it is recommended that the CFBL-Feedback-ID, if used, use a hard-to-forge component such as a <xref target="HMAC"/> with a secret
key instead of a plaintext string to make an enumeration attack impossible.</t>

<t>If it is impossible for the email sender to use a component that is difficult to fake, they should take steps to avoid enumeration attacks.</t>

</section>
<section anchor="gdpr-and-other-data-regulation-laws" title="GDPR and other data-regulation laws">
<t>The provision of such a header itself does not pose a data protection issue.
The resulting ARF report sent by the MBP to the email sender may violate a data protection law because it may contain personal data.</t>

<t>This document already addresses some parts of this problem and describes a privacy-safe way to send a FBL report.
As described in <xref target="complaint-report"></xref>, the MBP can omit the entire body and/or header and send only the required fields.
As described in <xref target="RFC6590"/>, the MBP can also redact the data in question.
Nevertheless, each MBP must consider for itself whether this implementation is acceptable and complies with existing privacy laws.</t>

<t>As described in <xref target="complaint-report"></xref>, it is also strongly RECOMMENDED that the Message-ID and, if used, the CFBL-Feedback-ID.
contain a component that is difficult to forge, such as a <xref target="HMAC"/> that uses a secret key, rather than a plaintext string.
See <xref target="hmac-example"></xref> for an example.</t>

<t>Using HMAC, or any other hard to forge component, ensures that only the email sender has knowledge about the data.</t>

</section>
<section anchor="abusing-for-validity-and-existence-queries" title="Abusing for Validity and Existence Queries">
<t>This mechanism could be abused to determine the validity and existence of an email address, which exhibits another potential privacy issue.
Now, if the MBP has an automatic process to generate a complaint report for a received email, it may not be doing the mailbox owner any favors.
As the MBP now generates an automatic complaint report for the received email, the MBP now proves to the email sender that this mailbox exists for sure, because it is based on a manual action of the mailbox owner.</t>

<t>The receiving MBP must take appropriate measures. One possible countermeasure could be, for example, pre-existing reputation data, usually proprietary data.
Using this data, the MBP can assess the trustworthiness of an email sender and decide whether to send a complaint report based on this information.</t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<section anchor="cfbl-address" title="CFBL-Address">
<t>The IANA is requested to register a new header field, per <xref target="RFC3864"/>, into the "Provisional Message Header Field Names" registry:</t>

<figure><artwork type="abnf"><![CDATA[
Header field name: CFBL-Address
  
Applicable protocol: mail

Status: provisional

Author/Change controller: Jan-Philipp Benecke <jpb@cleverreach.com>

Specification document: this document
]]></artwork></figure>

</section>
<section anchor="cfbl-feedback-id-1" title="CFBL-Feedback-ID">
<t>The IANA is requested to register a new header field, per <xref target="RFC3864"/>, into the "Provisional Message Header Field Names" registry:</t>

<figure><artwork type="abnf"><![CDATA[
Header field name: CFBL-Feedback-ID

Applicable protocol: mail

Status: provisional

Author/Change controller: Jan-Philipp Benecke <jpb@cleverreach.com>

Specification document: this document
]]></artwork></figure>

</section>
</section>
<section anchor="examples" title="Examples">
<t>For simplicity the DKIM header has been shortened, and some tags have been omitted.</t>

<section anchor="simple" title="Simple">
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 111:222:333:4444
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-IP: 192.0.2.1

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822; charset=UTF-8
Content-Transfer-Encoding: 7bit

Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 111:222:333:4444
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
<section anchor="gdpr-safe-report" title="GDPR safe report">
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 111:222:333:4444
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report contains only the CFBL-Feedback-ID:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-IP: 2001:DB8::25

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822-headers; charset=UTF-8
Content-Transfer-Encoding: 7bit

CFBL-Feedback-ID: 111:222:333:4444
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
<section anchor="hmac-example" title="GDPR safe report with HMAC">
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 3789e1ae1938aa2f0dfdfa48b20d8f8bc6c21ac34fc5023d
       63f9e64a43dfedc0
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report contains only the CFBL-Feedback-ID:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-IP: 2001:DB8::25

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822-headers; charset=UTF-8
Content-Transfer-Encoding: 7bit

CFBL-Feedback-ID: 3789e1ae1938aa2f0dfdfa48b20d8f8bc6c21ac34fc5023d
       63f9e64a43dfedc0
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
</section>
<section anchor="acknowledgments" title="Acknowledgments">
<t>Technical and editorial reviews were provided by the colleagues at CleverReach, 
the colleagues at Certified Senders Alliance and eco.de, Levent Ulucan (Inxmail), 
Arne Allisat and Tobias Herkula (1&amp;1 Mail &amp; Media) and Sven Krohlas (BFK Edv-consulting).</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

<reference anchor="XARF" >
  <front>
    <title>eXtended Abuse Reporting Format</title>
    <author >
      <organization>Abusix</organization>
    </author>
    <date />
  </front>
  <seriesInfo name="Web" value="https://github.com/abusix/xarf"/>
</reference>




<reference anchor='RFC6449' target='https://www.rfc-editor.org/info/rfc6449'>
<front>
<title>Complaint Feedback Loop Operational Recommendations</title>
<author fullname='J. Falk' initials='J.' role='editor' surname='Falk'><organization/></author>
<date month='November' year='2011'/>
<abstract><t>Complaint Feedback Loops similar to those described herein have existed for more than a decade, resulting in many de facto standards and best practices.  This document is an attempt to codify, and thus clarify, the ways that both providers and consumers of these feedback mechanisms intend to use the feedback, describing some already common industry practices.</t><t>This document is the result of cooperative efforts within the Messaging Anti-Abuse Working Group, a trade organization separate from the IETF.  The original MAAWG document upon which this document is based was published in April, 2010.  This document does not represent the consensus of the IETF; rather it is being published as an Informational RFC to make it widely available to the Internet community and simplify reference to this material from IETF work. This document is not an Internet Standards Track specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='6449'/>
<seriesInfo name='DOI' value='10.17487/RFC6449'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC5322' target='https://www.rfc-editor.org/info/rfc5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference anchor='DKIM' target='https://www.rfc-editor.org/info/rfc6376'>
<front>
<title>DomainKeys Identified Mail (DKIM) Signatures</title>
<author fullname='D. Crocker' initials='D.' role='editor' surname='Crocker'><organization/></author>
<author fullname='T. Hansen' initials='T.' role='editor' surname='Hansen'><organization/></author>
<author fullname='M. Kucherawy' initials='M.' role='editor' surname='Kucherawy'><organization/></author>
<date month='September' year='2011'/>
<abstract><t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message.  This can be an author's organization, an operational relay, or one of their agents.  DKIM separates the question of the identity of the Signer of the message from the purported author of the message.  Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key.  Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t><t>This memo obsoletes RFC 4871 and RFC 5672.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='76'/>
<seriesInfo name='RFC' value='6376'/>
<seriesInfo name='DOI' value='10.17487/RFC6376'/>
</reference>



<reference anchor='MAIL' target='https://www.rfc-editor.org/info/rfc5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference anchor='ARF' target='https://www.rfc-editor.org/info/rfc5965'>
<front>
<title>An Extensible Format for Email Feedback Reports</title>
<author fullname='Y. Shafranovich' initials='Y.' surname='Shafranovich'><organization/></author>
<author fullname='J. Levine' initials='J.' surname='Levine'><organization/></author>
<author fullname='M. Kucherawy' initials='M.' surname='Kucherawy'><organization/></author>
<date month='August' year='2010'/>
<abstract><t>This document defines an extensible format and MIME type that may be used by mail operators to report feedback about received email to other parties.  This format is intended as a machine-readable replacement for various existing report formats currently used in Internet email.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5965'/>
<seriesInfo name='DOI' value='10.17487/RFC5965'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC8058' target='https://www.rfc-editor.org/info/rfc8058'>
<front>
<title>Signaling One-Click Functionality for List Email Headers</title>
<author fullname='J. Levine' initials='J.' surname='Levine'><organization/></author>
<author fullname='T. Herkula' initials='T.' surname='Herkula'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes a method for signaling a one-click function for the List-Unsubscribe email header field.  The need for this arises out of the actuality that mail software sometimes fetches URLs in mail header fields, and thereby accidentally triggers unsubscriptions in the case of the List-Unsubscribe header field.</t></abstract>
</front>
<seriesInfo name='RFC' value='8058'/>
<seriesInfo name='DOI' value='10.17487/RFC8058'/>
</reference>



<reference anchor='IMAP' target='https://www.rfc-editor.org/info/rfc9051'>
<front>
<title>Internet Message Access Protocol (IMAP) - Version 4rev2</title>
<author fullname='A. Melnikov' initials='A.' role='editor' surname='Melnikov'><organization/></author>
<author fullname='B. Leiba' initials='B.' role='editor' surname='Leiba'><organization/></author>
<date month='August' year='2021'/>
<abstract><t>The Internet Message Access Protocol Version 4rev2 (IMAP4rev2) allows a client to access and manipulate electronic mail messages on a server.  IMAP4rev2 permits manipulation of mailboxes (remote message folders) in a way that is functionally equivalent to local folders.  IMAP4rev2 also provides the capability for an offline client to resynchronize with the server. </t><t>IMAP4rev2 includes operations for creating, deleting, and renaming mailboxes; checking for new messages; removing messages permanently; setting and clearing flags; parsing per RFCs 5322, 2045, and 2231; searching; and selective fetching of message attributes, texts, and portions thereof.  Messages in IMAP4rev2 are accessed by the use of numbers. These numbers are either message sequence numbers or unique identifiers. </t><t>IMAP4rev2 does not specify a means of posting mail; this function is handled by a mail submission protocol such as the one specified in RFC 6409.</t></abstract>
</front>
<seriesInfo name='RFC' value='9051'/>
<seriesInfo name='DOI' value='10.17487/RFC9051'/>
</reference>



<reference anchor='POP3' target='https://www.rfc-editor.org/info/rfc1939'>
<front>
<title>Post Office Protocol - Version 3</title>
<author fullname='J. Myers' initials='J.' surname='Myers'><organization/></author>
<author fullname='M. Rose' initials='M.' surname='Rose'><organization/></author>
<date month='May' year='1996'/>
<abstract><t>The Post Office Protocol - Version 3 (POP3) is intended to permit a workstation to dynamically access a maildrop on a server host in a useful fashion.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='53'/>
<seriesInfo name='RFC' value='1939'/>
<seriesInfo name='DOI' value='10.17487/RFC1939'/>
</reference>



<reference anchor='RFC6590' target='https://www.rfc-editor.org/info/rfc6590'>
<front>
<title>Redaction of Potentially Sensitive Data from Mail Abuse Reports</title>
<author fullname='J. Falk' initials='J.' role='editor' surname='Falk'><organization/></author>
<author fullname='M. Kucherawy' initials='M.' role='editor' surname='Kucherawy'><organization/></author>
<date month='April' year='2012'/>
<abstract><t>Email messages often contain information that might be considered private or sensitive, per either regulation or social norms.  When such a message becomes the subject of a report intended to be shared with other entities, the report generator may wish to redact or elide the sensitive portions of the message.  This memo suggests one method for doing so effectively.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6590'/>
<seriesInfo name='DOI' value='10.17487/RFC6590'/>
</reference>



<reference anchor='HMAC' target='https://www.rfc-editor.org/info/rfc2104'>
<front>
<title>HMAC: Keyed-Hashing for Message Authentication</title>
<author fullname='H. Krawczyk' initials='H.' surname='Krawczyk'><organization/></author>
<author fullname='M. Bellare' initials='M.' surname='Bellare'><organization/></author>
<author fullname='R. Canetti' initials='R.' surname='Canetti'><organization/></author>
<date month='February' year='1997'/>
<abstract><t>This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key.  The cryptographic strength of HMAC depends on the properties of the underlying hash function.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind</t></abstract>
</front>
<seriesInfo name='RFC' value='2104'/>
<seriesInfo name='DOI' value='10.17487/RFC2104'/>
</reference>



<reference anchor='RFC3864' target='https://www.rfc-editor.org/info/rfc3864'>
<front>
<title>Registration Procedures for Message Header Fields</title>
<author fullname='G. Klyne' initials='G.' surname='Klyne'><organization/></author>
<author fullname='M. Nottingham' initials='M.' surname='Nottingham'><organization/></author>
<author fullname='J. Mogul' initials='J.' surname='Mogul'><organization/></author>
<date month='September' year='2004'/>
<abstract><t>This specification defines registration procedures for the message header fields used by Internet mail, HTTP, Netnews and other applications.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='90'/>
<seriesInfo name='RFC' value='3864'/>
<seriesInfo name='DOI' value='10.17487/RFC3864'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source:
H4sIAN/fqWIAA+1de3PbxrX/H59iLz3Ta+USFEk9LNFVE1qyYjWWrUpy006m
k1kCCxIRCLBYQBLrcT97z2N38SBkOYnbprfxJDEJArtnz/N3zp5FfN/3irhI
1ET0jrPlKpFxWohTpcKZDG7E6yxbiWkY5kpr8UrJUOU9T85mubrFB05fvN74
NcyCVC5hvDCXUeHPVKqCG+UH0SzxJd/rL+hef/jMC2Sh5lm+ngh1v/K8eJVP
RJGXuhgPh4fDsSdzJSdC5oV3l+U38zwrVxPxRhX4TXwL/4nTufgaL3s3ag1X
w4k4SwuVp6rwT5ACz9OFTMPvZZKlQNVaaU8vYcDv/1pmhdITkWbeKp6I74os
6Aud5UWuIg2f1kv88BfPk2WxyPKJJ0Scwv2/H4gXvCi4wkv9vUz9i0WcxKtV
7bcsn8s0/pss4iydiONE3ar8UslgIb5ezl6J34jjbCC++Rru1DCnKibiKljI
6IcSn0/v1FyM4bcgLoA7l1IXKsRRgyyEGcf7o4MhfSvTAtn3tcqXMl3DpdWC
Fvp/u4did3c4FofPdg6H/mgfflJLGScT8cNq9lVA5ORIziDIlp6XZjBAEd8q
XOifppen+LcQRjnUnwqVhioU01mplbhUK2AU8v6UHqNbKz7hH1j9hO6O7+lK
CJKeiEgmWtF3rfJY6TiNMvvEt2o2EYuiWOnJ9vY8LhblDEnbljTI9r3MI9AQ
eMAR6vm+L+QM2CcDEPT1ItYC9K9cKlDiUOkgj2dKCymWCkgLRbGQhZBJkt3B
xZTZAYTAwnJRZEKvVBBHa7g/cKYQWVNI0BSegsZvCaPGQtZGYZUeeNNEZyLG
2aM4hbmLhRJ5mcAnoFus8iyAJ5FxoJN46U7mIX7VJehFbeIBrEaJZQYLJQWi
xwtcoMxjDcNlZSGyiMYHDqg0UPhVCtJ2HPRvIC2cBMSSAcPg251c4zKBiNs4
hMGB7ll2b7/nWtwB03FJdoE454PMGHjHJShQWiTrvhnDrmuJd8O/1cKqMWOS
h0xLmdC9RbwE75Clulzi7YZDNHVdPppudqQOPO+swLHKFDRZ5n0BkkVe4HDI
iFU5S+KAWNcXdwuQP8oYbojgCWKoGSsUszUz1mnOQiIrQH9WYB8hiBLIDftE
QG0kb6nAXNNYL2G+SOXI4DhJxAwEEmarwrA/AgsNke1wHUwnKpOBANGCb8ly
1eeZ4Z+ZotUj1XqBj5JuvbxfgZkgUX3kOXk7K5RUg22WIPi1B+uNQUYKb7Ss
CtUqydbwrW9VrRIfrB5ZkcHgxCEQRVmA+yrWRFvFCSAM2BSWgULjATc7X9CT
ZyCSFcoF7rk8PSYHJpcecQgoT7MC5D77QQUFrpyeeHl9+r9A2QrZDvMZOQ/Y
hpdxGCbK856g86YJSUQ43rkzAe+UVg5+fM5iRkkoktZMKbibFJzZ09ZtJMNY
m1U+p9bwODLFEFpXOmOE7bHMB1AS9CfAowB8Csqs5S3ev/8fYM7+7u7hhw8D
we6peQcqsFakHnPwaEYiGYgwi/pCDeYDMcszGQbg/oGO/EaR0wUdKUCudXmC
bZUJ/VhbV5RnS1xUnNcexuXA35oWB768dj9EW+AFEgQjGjYBfTkEPtArGbA1
EVln59MLcE+3pHNIf++HMr3pgdtHewrA9khZUYiid22UXK/ksidmZVFkKUh+
qp2TDmGKBr/Ycap5jM7dOUDjJZtMTOGbNhYWQuwzlCdrpESKRblE9wOOP11v
yvJukVXylAL8+4AFFcBDMOBfy7hQbScVR0b3kGGpumsSpAV4aLytXPVFlm9o
FagpMhsIBp9Ij59dWPeIjj0XJ9+cncNS0I2CmM7IecbMfOc7raOM2dzuFLge
jcSS29kmc5c6niWKObdEHc03nT7I4YUKJEZ1E07aE6S3WXKrwv7mQtD0UHUz
5xxgklo8kXNYQR+EnChgInJV3YNAOSzMUPIrXBU7LBY2sgejEGstMqcKP4ZH
g3akr3hnvKkulYllNEIzQkPcUPeIZkxwVjABDBNKJiUyEnsIAjyssS56tgMu
rHUZc3gCbAiUynwtHJBBZ5x1yuW8Hv4CjqG8RF5LnwKOtelmKMfbUaZxUXd9
SMIcAGpO5OWE4qzjY/QTw/UOjl+3RZ+lYF/O8pCwFhTiIJQpVk+8k5dpTLMp
bULFTT7bpZi5kxgsj7lFMMcoacND4IwAamERHPidCt9lZRJSYAZaMHzL8BZs
UM6VE3cX/6cb2lMFm2CRASdQByJ5m5U5U4X3n7y5IqXKacFog7DckNW+hOAO
zxd3MIS3RIcNUftBF18LB9stMIRcQwSYK3BQOTkb9NMY+0JgFPMkM477Fowk
Ro+LAVTdS4QKfXRijO3QL5ZoPY4gEyIgBwIRLSHSkHz4G2mWVkVdEUHLtEqi
DqpwbERJwGmCWYSBcr1BKK8oTo3dAw8H3pvM+T2QNLL1r6VCy9FmAo5TXdIT
GgEusD+bIQ5tGfRDfsQJF3DfSuZs4vRYLBFfW8ckvj65uCRtY20C1yFx6kIx
bEnknbUKgrzsZmx8JvekPUCSaQM21/zGJ+HvPmLEyiUvwddAhKLlgtpoYhpS
Bst8g7ke3AppiGY3XnmxCsXOFGZGYgXrAH0hK4WBwHNhYIRoHqKOg935cerD
GD6DNoisBZJktJpHp9AlsrvU+AHjaONVrDC1mQLKgFUGqKGoTtYl4YLnzjHZ
mN5DGNMDGsywmHPTiNUgmFQQGTYDQTthDa2N1dQCLF7U/Rs4y0jegC6hg54r
dqEsNtQDMO5yOVNs6CRnLBIQHgGtSTKDd/BHSspJx0OFtyJ8hd8cA6qAZbCG
YzmoYL6sNIsRWSUrUsDqZpoHJAQ+poTxkMrv/vL0iVZBmQOWJ8CC1sCRbQtz
JjDdcgleZt3vyHkoPcpQCWgphN8BlWpItL8QU1KOphfC2BbPUdE4s960MQ74
Xf6qy4FzBK1DiIGbeTPEVebdNbGdMQTdT7IVTsm+BbSyc3KXkXwhXmBOnah6
stw1BS7/IVhFwDLMKPgt5K3aQK1opokMFEx34eZAx+Jbj4P+3yHfj6Th3pMn
4iqAWMEADqRapY0UPLFO59s6XS06F/Y3W+/zz07c74huU6zKmZEggbmQeRGD
DjO/yK0SpLO3UFJK4kYzCEPD88b8PtcJ0XE38AQ5bE4eSl17MGk/iExH40bz
bdm2y+itgCiL6YgMEAlbqTDbuXYcrC+KEwGilkEM1Vyo2NUXuYy1S9cZeYIl
dFSxfliBBavtPAq6aqHbwrjCzZkwcxb4iAvLhA2e4qWvYlVEA3CaWxTMANxl
oNYdi4g5IKX6zpZBnJ1DUNUMfV3qB8l84t9leWLLCDgGugFfnGmT+hCygCeF
XGJC3hCmqQE1LeJLfDrqDtfADAPeA7mSMypFMLpFAMuVk9AiCON9auM1J/8x
Y7UpwUFPMlO3AxjgCmttPd7eMByAzgkiBq5fqDp2sR7ZxH6c5FtymB23WG++
HSxUcKMdcgbCQZqYM6C6Fd18nFFVqeEsDMjH7BuE+NmmbrI8QiTfPStEPQVB
JPzSoK2mUtoQBQNDLEX/G5WJya87/ZbDaFXBi4TpsGtcK02t0GGBMJ8+qp1b
nnGIgALsUxVBCQFktntDTpUtGXi5cO5J3RvE23T4xllhFO60z9r6K1p4VKrC
3Soji1uZlBSeqCKarcoE659xQRAQfi8AxaQN7wGi86IyZ7Aa66DU2uZLubqN
8ctAvE1h6ZnmkgFEThAmwiWTOZkAf2e2XGgnRgTgKAqqmxh2BPVatXK1aIEF
+huOVCcxFUvRrIBEmNQ/xmKR/y41JYGZojxlnmVIndQEtHC0znshBf8SUvCD
4d4BpOCMRggEJli7XRv8gSXgGKAacoiisUZEDLpvvZg2UH9pUUgDHQ28V9kd
PtFvZD0mC2Fn8RrmaRDmcnTMFMWqzFf4NztiiyrwQSCXio9l7Vkq3Ely9Jy1
GSiL3GjSEGtOxa1Tq1cQH64dYrSpRxNgEAIVBNdYlEiMeYPYIhCqiS0Evp3b
t0HGIcgUQFpzdZ21EMaLm3jp07cduPBPBexZEs9dUWDDLcF0Iahl6LL8JWSp
t7ZuyyCe7ARhP/sw9lakQMgRp9LPXaEe+US6berbbT6glosT3P0h/6qJdTdq
jaYDgal3/u7qutfnv8Wbt/T58uUf3p1dvjzBz1evpq9fuw/2jqtXb9+9Pqk+
VU8evz0/f/nmhB+Gq6J16Xz65x5vAfTeXlyfvX0zfd1z2M2rami5dS8kYQh9
BcOaRr3rxfGFGO2astd4NMKyF385GD3bxRoYZLU8G2klfwV2rbHyr2ROmRRE
YgjNcSETTUmsXiAmR1RhNM1s5fIOc0VtfVuC971wIzqufE7vAZ3p8d4NQgCc
hUVtkEB7yvMXFz9mxrYi98gTm9sxkqwpEzBRsNow7FckWUjiSGuTVFfqbtrs
JoIVVmt2TdXOauqiVuCG/8KSsbD8aBmKqjbp2lQ9Kqpo5wonGwiwzQfX9ERc
ssMkNEnB4NKAAzPY+ycWLfh04QNDBm3qKtWOLkP2ajAbnvLGeCCKgRrU/EJh
9msQCbnNkQ2fgdeAJbx5OsMckoOHrKEaNhUaJwH3Bm5+WSLjlCIHgBlZkcdB
4RmEakoXBiuwyeztjMcfPgxOydebdKx5X2fihtgb0Q14psRl8fQUuZQZBu1b
QlS0/QFoIQ49mBE3FY6wWr3zbN+GygLgHggttRqhFYda2oDohUc9lKtcqqKW
MW4Sz8iX4qqjjOp1bguDxWhnZEKRV5uCbLgbrGY0NcIPb+Kl70ayaU+VzZjy
Jo2uq2VB7vL3v//du1TwVOpfyGIxEb9lkX9F6VY+ME9isvY7D9c1EdM7pREF
vVF3OlEFcuG3qfv8VeOJ62xi1a/6BTIz74oDxURclStkoxkzhByLQ906K726
pCcCM7va4M+N4h1hB8Q5l6cg44AVyJ1nam80i/yd4d7QH0s580fjnV1/b3dH
Dg/GB+FoV3au7zhLsYrkX69XaiIKdV9sk+N8jtXaXKviqCwi/8BDRfCvLLsn
4vZo9FzIo1xLXy/keG//uQiPGqTqI+TQc9PTIRZHdv3EUuBSbQHtHGpSZ8Nz
kzBQw4Bu8K6SwYDESgZ3qRJ5r8JNi2tYEY0WLGJMbU2VMupW6/4D2v6osYmP
Gpv3c63NzG+KSpXBPX1pVH+0hY4aC9jgndzV8da/ziQdJf95ZrdJ1X+S9XnW
6BozfMQCzQOfzRCdtv1TJN/14K8K8ItSAPTE1Eiq7jc98aYzA+cbUkGgalZ5
HAP1vfom08O1oi4XndYrX4+7a+8FgN3qu/7c0IXAW4kVFwoClT9WKe/pEGSd
ZWbjsbGxZlbOlmN+aeHIxo1NXec7PDnPFWV+htjWJpmtsJsyucvQrayaY9oW
i5+PyUjLfC2l9o39/ELiQydhP9ND/Ochs0+a/AFW6SNuJPg3QMSWjbXTzZaF
fnhw88w6ljgNkjKsasC9BWC4Qs5dYy5W45fcfQF3sbtp8m7gfbtQNU/XsRVn
8nsqLNDMEnuMf870dQfX8tJYX09VXNh2WddpQU5Uch+H7BwLa4fNZ8wC6o/W
6ey7VNvVunhvz2XaJJaBKRVUV0gw9VvEU0rFYXwcDWvwtZx+i7lmAPOnQPTr
T2Mej0urq3lis2iY4Xx69vrIBTzD4T47Ty4pFNU6bFmiqw1VOCmZ5oSqsYpW
1WD6owvsaOSr+G9bpthLt+IA92xiqadjj9EWvlxDnS1JYYtCnCquusJ4pY55
V850apjdJ7PphPUN7pPmAgzkauoWtzuognRmd324IxgV42WjJeH9E7Jk8/WD
N23tM2M57A5brHU96NV7YKniw60C9KSJ+cbYQIO6PILrXLLdIyYIVvXkzsaT
zW0k133Clh4EalWgMKeXp6RKh/t7IEtq2ypop8ZGaND9UEWyTIqObj2s9dnq
7+s/k67Q1i2MjEc9ukY0m3Br6laF+K/6G9VgxDh4KsPnJ7Z4YrTA8+mfrSV/
fAZTK1XBIsUkFluO7BaUrdmTEmVCZ30uPIL0FI37GE9cJVJzWZ73DXSRZ+kc
JqrVyRll8Y6b46eytqDcGQomcSBeUjscs5bqfj9nm8GZ1obUSAX4KTdIvaes
EkYDh6Jk6pVWQqLV1y32p+ftvWO2HLjk20sfrNdBkbqm5cpDNO2mOs8CUjVF
f1oBd+09WM+sPVdzhx9v1/JeOG3HQvqnKION2awMF+yhq+bdK1Nj3hmM+107
2fXHaVujdoqFn3Q707z/il3yfXunRaBUWdfmfAJtfazksi+8ess8RchGx7zP
HfO0d5KCQaqZQJqw04MaZpaZUSUucmcCW/ERf4dux5Igg3FhGvdMsX8f+XU4
3BvB8lEKcPXi7cUOXh0d7iBTbH+/NjGxK1Sna2dutNa0MhYyC02tJY45SxC6
4Q2uTURxAgYB5BsDIO+BvH7cfdxZ4NQwGuPbNLqWxx3WmXVBGEvbrseCicdJ
kdrOizjtk5xTUx+ba6cQjv2QlM79UxyAOG5r+PsnTukNfxgAb5oCOPeZqjOk
ETEeFAdveT3u8S3bN5x+V2rq+NjB9IZnrd9u+2TBPScKN7xoVpd0bGK3AXYa
cTsQuzbrvXpt0N6z4NsSGrvmKEdpaHrUTBkCIorXiJwZnhbIkHchyH0z7nLL
w/7e4fDDhz5tp9rmDtsuYk6AzLKQNt2JlrU9oLCmtmCQ8bxMpGtYdgFyEc8X
HeGRGsY5D+lMVpxzkdjEGppTB3NmBMCHtHDdsuSwv3x1Pj0+om3kIe4cc9ef
RDyYqwJP8/bxvG2BJ/Cot5646WNCjDEcPYagQIY62GFf7+uWDjiwBQMBApKz
rTBgy8C5A7OuNbiDjdvoJtfH4Xs2Tn3X0eMIZtfR6WdQUtUPbjSJzyjgIT+R
xDes7K6EYkoln7ZLRAdlOec1p7LF1RoU/p7Y1YjB77so/NAq30xfvDnFdiuC
RbTXp/vi26uLvji+fH3KKB0G8BHLcnKzaT9EP2DrNPJ4BLF9JOpze179mzgy
lmUX2xPDL0YwZzWTrR7YP9/1nrubmBE+H7D5C5HpeY2LOIFhV0887ZEot0WP
ZLplCwYbSv4TGEP6+qOZYrsX/Dg0jKldccypl0Xc2iO4gRcc0a2jL54yEbC8
iVsb4h1Ou44bTeKgEQ+0j7f34rmNTOnKfbe6HPu2GAlZUXVPlpSmdz6LGjir
nhW5OiLIYEp9/a4CWbvNe4120m5IMD/2Hxy86nswJxduFZ0hiKgnClBYnJXa
pH6tIzOdAyo3ZATWG9o2fUQ3g6o8lVZH3wBAAyuWlTt2vzRWwNGSkQk32m0e
Ve7KGighYdCAh21XeYxIwvZ2DrxGn1/zCEHtoJSg8xh46qpwcTlUCYJYpPTs
ot0Tpxf2WTqDSYsLZMnNU6arDLnW6CxjYnGFOGcUgSSoIwfl7lCkLsHeU22P
fqX2hIV3ZXpP4FLVDc6HDim5tb05KB4+4UhVMX5aLAgf25PZKb0Kgdoq46iJ
Yu0DdToCUHXMhjI8IBrcYAjHSgMrykRgCRK54Bpv4vQ2LtxhPzoInMf44wDf
oED3u/Y++zDnCsTcerqAB6Pu+tUZ1JjpiBDHfIxojtusJHgS29xgk2Q6wmLO
rFc38s9WQOZMhKRGVWEJo6OKLy5YYZsHRD6ui5xNqlsqe8Fog4eGKex5eSp3
9SEv0QUCRxpRFXSc5U6uuccdLZLhMb1I5A50YoGvYtBN7WmZ9kMLwK5FpB+M
PnM8IzWau75we9mgLjRpXBb5kQ7lMU3afMUd/rJUUUkrBeu2hxqN/9umTJ1f
AeBaRfl8CICbynHx2S8i3OQt/KYNJFavsizCl3gAYnKFJljXTYoNeA95N45j
hVquKC2fl+Scanh5sxe+0SjGLQoQ4XJtD9R3EFubYQkyrLfDbhtWoc6710m4
xlJzLDHW7khNze1i2vug7yWYzu+woCXHjeKiFadrOxbvmmyvdx4bR2wPx0am
lNHobnvMMU+pNaXhkDtrqqZWtYFOagi9pBIZ4nC/yPwHcXgHDDfHpisU3gHC
axicxXXDZ4U2tJbAEUca3mjg1VRXXWhp9+DxAiqSbecebhbHAR7Jw/wCJjaF
JhN9iLtA7opdwW0GEGiTLM1W1nGKs50UkVCpHGbDj3kDQfPcq6vGU4u33DgQ
SoCojfvRCE3IspsXteR3gyloI+BSEioLdB05Bb/CQc6cBHjoMGjr7Lzpk6/M
nWIR1vir01DWavi9ItVrdUCFb2Ww9rWMlGvwZqdTBeTBxnsesAzTrjVsVZtB
GK4ze2AeXQe+lQIzWWOQtcIhTUadxo0tEEbTmxM3E+f6fOQoON9mqIP8hSfs
4ahB6wwtHYjGh8moLVImdbZnod2bYljj654l1qay745xcMapzCt4au6KGGwT
9E9kJFsZLemj1e56yYPecPPRDH/gubLJo4aJDqf/UT9Dz9Gpc+tsBKX8YKjM
NRTKhrsZAOZTtOzFUga+id5bfGLA4S/g1DuqJuCc/WYweqA20W82XDiV2njd
BYbKRIVzVW0UWcNC0DrjMgbS80cs4tldrpcoUTr08oeSwjGbYXX42h20wbdd
tXfOcJLb+nDKDceYppX68Oaiul/EMzq9bd56UJ0ctnplHFMNUJJSL7hIU6FJ
V/PPqrPaHUVyPrix0YTN/siAyDCzRW4Lz+0x8TW9SiFnu7Wk4KkSO2WLqM7p
N+NuvzEWHaTSnR7WmIVBtUiZObzMb57BaFxzsXHtvGR7KyCLNhe4sSHovMfD
kEB8LFezGtPnd2VZIAvI03f+AxhTGp+DSorAgF+/UYPORn3fmVO3aMt0a8M9
PgaqNw7YmR0x5wVdYNiQmuMie8rqtSi84Tt9M23VKDbKWMRYujGu1eG5tmfe
MsKv5jCRg8JDHwOjiQg7B/u7GBEI5NP+y4WN+SBU4yVtLe2Uut3fSADQPXuC
fD2p1XJe1WYxLwhsUCsAsK9W+HYylCoG8SzIkgmpi+ddgbxKPalQh4SLUzpt
vH3M5wrRD+cZnjvvfPWg+G3HC/5+ByM3zuhZBDBpVhQ+Xvv65TO5TvEvn83C
9MtqSkY1woQYX/hYtYW3j70C0M3BiyvzPjoCa4Wca24EoVsQO7kyyhVBD4+b
JKqQ1dohd+8E+tc0bC+Vu5ZClvGZT0hs1EbFaDSajMfjyc7OzmQX/vzSu3j/
PYcoLjtSE6MPPv05+h7fAPH9eHc43B8e7o+/Hw0PdnYO9nZ29wajvcPx4eHO
aH90OBy2OGNKDduuhs1jV3flMtWRyv2XaZBhQWQingFw8dxbGsw4BI0gUMGd
0znZFKx0ezgYeX+EHIfesopf3ubxPAZ79rHFwWcNfVCFvWmOWCjxT+j9pNcl
hNDxjvh9mYrxcDwUw/3JzmiycyC+Pr/2uAdNhf4JtXJNRH2gq6zMA5DIBejb
4XgwHIyBlp/JOdKpPAoOxuNKqd5dn4JSPcq8X234v8uGf6Sm+b4L9VQIoRze
GOav0eJXTfsp0cLWnHSVQG+y99eI8hMiyng4HE1OXhxMJuO9zxhUzI6//tHB
5ROs5vP5Iy6KYTFHvG8Ufj78l3uqnWcHh2ok1ehw50DKcTQMozCSuwez8TA8
iA5mwX4wHslgZzcK9objndB6iP2d6FDt78rdnTBSYTD81cN9Tg/3q4P7f+ng
Ppux/VTHKKaBrT7zGzSubRMl14TDuMjymF5reBuDMos7bA9ovuYeqxpJoiRu
4mL7Y+3/StEXXsfvKi/4fMKV2RGfJuZtqDRnkA1CEP9r3sR/l5RYLXx6lt6j
2mzBkNM8VfSMpjdwh+I6m8US/3ch+U2ZSPF09JsR9aKL34hzWILcoruuYDzx
TZ4tErj36YvTb8TL8JbfwE0muWVeHI/S8f4BQ/4r7sVkAAA=

-->

</rfc>

