<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.20 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chuang-relay-flow-identifier-03" category="exp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="Relay Flow Identifier">Relay Flow Identifier</title>
    <seriesInfo name="Internet-Draft" value="draft-chuang-relay-flow-identifier-03"/>
    <author fullname="Weihaw Chuang">
      <organization>Google, Inc.</organization>
      <address>
        <email>weihaw@google.com</email>
      </address>
    </author>
    <date year="2023" month="January" day="20"/>
    <workgroup>Independent Stream</workgroup>
    <keyword>DKIM</keyword>
    <keyword>ARC</keyword>
    <keyword>Relay</keyword>
    <abstract>
      <t>To prevent spammers from using relay forwarding, we propose to identify relay flows.  We do this by having relays categorize their authenticated traffic flows and publish to receivers identifiers associated with those flows.  This is a unique, persistent over time, relay flow identifier name that is secured by some digital signature.  Receivers can use this identifier to help categorize traffic through the relay and use that identifier to apply fine-grain anti-abuse policies instead of on the entire traffic through the relay.  This document provides a specification for DKIM (RFC6376) for originating traffic and ARC (RFC8617) for forwarded traffic.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Spammers utilize relays to obfuscate their identities and often to spoof some other identity with email receivers.  For example a spammer may exploit the shared tenancy vulnerability of SPF <xref target="RFC7208"/> to spoof some identity as follows.  It finds a relay that hosts many different enterprise customers who include the relay's IPs in their SPF policies.  The spammer then sends traffic through the relay assuming the identity of one of those customers i.e. it spoofs the MAIL FROM identity of the victim domain. While the SPF validation (if done) of the initial send by the spammer to the relay fails, a subsequent SPF validation when forwarded to some other victim receiver from the relay will pass SPF because the IPs are contained in the victim's SPF policy.  At some point, the receiver notices the spam via the relay and wants to apply anti-abuse counter measures.  With existing authentication methods, this policy would impact all mail flows through that relay, both innocent and malicious.  A better approach would be to selectively apply anti-abuse counter measures to the spammer's flow which is what this proposal enables.  Better yet, the receiver is enabled to cluster traffic to a spammer controlled domain and apply policies scoped to what the spammers have control over.</t>
      <section anchor="terminology-and-definitions">
        <name>Terminology and Definitions</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in <xref target="RFC2119"/>.</t>
        <t>Acronyms</t>
        <ul spacing="normal">
          <li>Authenticated Received Chain (ARC) <xref target="RFC8617"/> - is a protocol that is meant to resolve some of the issues for DMARC <xref target="RFC7489"/> to fix the problems that DMARC policy rejects caused by mail forwarding, and is based on DKIM, but suffers from similar issues as DKIM replay. ARC defines digital signatures and Authentication-Results by ADMD and a versioning mechanism for them.</li>
          <li>Authentication-Results <xref target="RFC8601"/>- A header containing a list of validation results and comments.</li>
          <li>
            <t>DomainKeys Identified Mail (DKIM) <xref target="RFC6376"/>- IETF standard for the cryptographic protocol to authenticate email at the domain level and protect the integrity of messages during transit.
            </t>
            <ul spacing="normal">
              <li>DKIM replay- <xref target="RFC6376"/> section 8.6 defines a vulnerability called DKIM Replay as a spam message sent through a SMTP MTA DKIM signer, that then is sent to many more recipients, leveraging the reputation of the signer.</li>
            </ul>
          </li>
          <li>Sender Policy Framework (SPF) <xref target="RFC7208"/>- IETF standard for authenticating sending servers typically based on IP address.</li>
        </ul>
      </section>
    </section>
    <section anchor="relay-flow-identifier-specification">
      <name>Relay Flow Identifier Specification</name>
      <t>This specification defines an identifier name for mail traversing a relay.  Typically the relay uses password authentication such as methods provided for in <xref target="RFC4954"/> but other methods MAY be possible.  This identifier MAY also be used for authenticated forwarding flows such as mailing lists and with other authentication methods such DKIM or SPF that verify who the sender is.  Because some traffic may have originated at the relay, which traditionally may be DKIM signed, this document provides a specification for DKIM <xref target="RFC6376"/>.  In other instances, the relay forwards traffic originated elsewhere, and these are typically not DKIM signed by the relay, so instead this document provides a specification using ARC <xref target="RFC8617"/>.</t>
      <t>Email Service Providers can delegate relay and forwarding services to enterprise customers, typically associated with some customer domain.  Spammers utilize these features either by acting as an enterprise customer or by hijacked accounts.  This specification proposes naming flows by enterprise customers to help the email receiver with categorization and application of anti-abuse counter measures.  As some mechanisms for mail forwarding such as mailing lists are often opaque after being sent and problematic for debug and abuse protection, this offers a naming scheme to help identify those mechanisms.</t>
      <section anchor="flow-identification">
        <name>Flow Identification</name>
        <t>The relaying service choosing to use this specification MUST categorize and name relayed traffic flows such that receivers can do anti-abuse analysis upon them if necessary.  In order for the identifier to be effective, it SHOULD be persistent in time and uniquely named across all flows through the relay.  As relayed traffic flow is often associated with a delegated domain, the first part of the identifier MUST either include a domain associated url-safe base64 <xref target="RFC4648"/> token, or be empty if no such delegated domain is present.  It MAY include a local part url-safe base64 <xref target="RFC4648"/> token after the domain token and separated by a period '.'.  This local part token can help describe the mail forwarding mechanism.  Combined the domain token and the optional local token form the relay flow identifier name.  If a message is associated with more than one flow, the relay SHOULD select the more specific flow based on local policy.  That name MUST NOT be any relay internal name though MAY be a secure cryptographic hash of such.  Also that name MUST NOT contain or be associated with any Personally Identifiable Information (PII).  The parser should ignore commas '+' whose use may be specified in the future.</t>
        <t>Example valid names:</t>
        <artwork><![CDATA[
0123456789
0123456789.abcdwxyz
.abcdwxyz
<empty>
]]></artwork>
      </section>
      <section anchor="dkim">
        <name>DKIM</name>
        <t>This proposes a new DKIM <xref target="RFC8617"/> DKIM-Signature tag-value that identifies the presence of a relay flow and a relay flow identifier name.  The tag is defined "rfid", while the value name consists of a domain url-safe base64 token and the optional local url-safe base64 token separated by a period.   The token parsers MUST ignore a reserved plus that may be further specified in the future.</t>
        <t>Example:</t>
        <artwork><![CDATA[
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=example.com; 
    s=20230116; h=...; bh=...; b....=; rfid=0123456789.abcdwxyz
]]></artwork>
      </section>
      <section anchor="arc">
        <name>ARC</name>
        <t>This proposes a new ARC <xref target="RFC8617"/> ARC-Authentication-Result defined method <xref target="RFC8601"/> that identifies the presence of a relay flow and its property that identifies a relay flow identifier name.  The defined method is "relay", which when present, takes a single result value of "pass" that indicates the relay was authenticated.   The relay method will have a propspec tag-value with a policy ptype with a "rfid" property i.e "policy.rfid" that takes a single token value.  That token value consists of a domain url-safe base64 token and the optional local url-safe base64 token separated by a period.  The token parsers MUST ignore a reserved plus that may be further specified in the future.</t>
        <t>Example:</t>
        <artwork><![CDATA[
ARC-Authentication-Results: i=1; auth.example.com; 
    relay=pass (comments) policy.rfid=0123456789.abcdwxyz
]]></artwork>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions yet.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="RFC7208">
        <front>
          <title>Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1</title>
          <author fullname="S. Kitterman" initials="S." surname="Kitterman">
            <organization/>
          </author>
          <date month="April" year="2014"/>
          <abstract>
            <t>Email on the Internet can be forged in a number of ways.  In particular, existing protocols place no restriction on what a sending host can use as the "MAIL FROM" of a message or the domain given on the SMTP HELO/EHLO commands.  This document describes version 1 of the Sender Policy Framework (SPF) protocol, whereby ADministrative Management Domains (ADMDs) can explicitly authorize the hosts that are allowed to use their domain names, and a receiving host can check such authorization.</t>
            <t>This document obsoletes RFC 4408.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7208"/>
        <seriesInfo name="DOI" value="10.17487/RFC7208"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner">
            <organization/>
          </author>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8617">
        <front>
          <title>The Authenticated Received Chain (ARC) Protocol</title>
          <author fullname="K. Andersen" initials="K." surname="Andersen">
            <organization/>
          </author>
          <author fullname="B. Long" initials="B." role="editor" surname="Long">
            <organization/>
          </author>
          <author fullname="S. Blank" initials="S." role="editor" surname="Blank">
            <organization/>
          </author>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy">
            <organization/>
          </author>
          <date month="July" year="2019"/>
          <abstract>
            <t>The Authenticated Received Chain (ARC) protocol provides an authenticated "chain of custody" for a message, allowing each entity that handles the message to see what entities handled it before and what the message's authentication assessment was at each step in the handling.</t>
            <t>ARC allows Internet Mail Handlers to attach assertions of message authentication assessment to individual messages.  As messages traverse ARC-enabled Internet Mail Handlers, additional ARC assertions can be attached to messages to form ordered sets of ARC assertions that represent the authentication assessment at each step of the message-handling paths.</t>
            <t>ARC-enabled Internet Mail Handlers can process sets of ARC assertions to inform message disposition decisions, identify Internet Mail Handlers that might break existing authentication mechanisms, and convey original authentication assessments across trust boundaries.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8617"/>
        <seriesInfo name="DOI" value="10.17487/RFC8617"/>
      </reference>
      <reference anchor="RFC7489">
        <front>
          <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy">
            <organization/>
          </author>
          <author fullname="E. Zwicky" initials="E." role="editor" surname="Zwicky">
            <organization/>
          </author>
          <date month="March" year="2015"/>
          <abstract>
            <t>Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</t>
            <t>Originators of Internet Mail need to be able to associate reliable and authenticated domain identifiers with messages, communicate policies about messages that use those identifiers, and report about mail using those identifiers.  These abilities have several benefits: Receivers can provide feedback to Domain Owners about the use of their domains; this feedback can provide valuable insight about the management of internal operations and the presence of external domain name abuse.</t>
            <t>DMARC does not produce or encourage elevated delivery privilege of authenticated email.  DMARC is a mechanism for policy distribution that enables increasingly strict handling of messages that fail authentication checks, ranging from no action, through altered delivery, up to message rejection.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7489"/>
        <seriesInfo name="DOI" value="10.17487/RFC7489"/>
      </reference>
      <reference anchor="RFC8601">
        <front>
          <title>Message Header Field for Indicating Message Authentication Status</title>
          <author fullname="M. Kucherawy" initials="M." surname="Kucherawy">
            <organization/>
          </author>
          <date month="May" year="2019"/>
          <abstract>
            <t>This document specifies a message header field called "Authentication-Results" for use with electronic mail messages to indicate the results of message authentication efforts.  Any receiver-side software, such as mail filters or Mail User Agents (MUAs), can use this header field to relay that information in a convenient and meaningful way to users or to make sorting and filtering decisions.</t>
            <t>This document obsoletes RFC 7601.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8601"/>
        <seriesInfo name="DOI" value="10.17487/RFC8601"/>
      </reference>
      <reference anchor="RFC6376">
        <front>
          <title>DomainKeys Identified Mail (DKIM) Signatures</title>
          <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker">
            <organization/>
          </author>
          <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen">
            <organization/>
          </author>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy">
            <organization/>
          </author>
          <date month="September" year="2011"/>
          <abstract>
            <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message.  This can be an author's organization, an operational relay, or one of their agents.  DKIM separates the question of the identity of the Signer of the message from the purported author of the message.  Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key.  Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
            <t>This memo obsoletes RFC 4871 and RFC 5672.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="76"/>
        <seriesInfo name="RFC" value="6376"/>
        <seriesInfo name="DOI" value="10.17487/RFC6376"/>
      </reference>
      <reference anchor="RFC4954">
        <front>
          <title>SMTP Service Extension for Authentication</title>
          <author fullname="R. Siemborski" initials="R." role="editor" surname="Siemborski">
            <organization/>
          </author>
          <author fullname="A. Melnikov" initials="A." role="editor" surname="Melnikov">
            <organization/>
          </author>
          <date month="July" year="2007"/>
          <abstract>
            <t>This document defines a Simple Mail Transport Protocol (SMTP) extension whereby an SMTP client may indicate an authentication mechanism to the server, perform an authentication protocol exchange, and optionally negotiate a security layer for subsequent protocol interactions during this session.  This extension includes a profile of the Simple Authentication and Security Layer (SASL) for SMTP.</t>
            <t>This document obsoletes RFC 2554.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4954"/>
        <seriesInfo name="DOI" value="10.17487/RFC4954"/>
      </reference>
      <reference anchor="RFC4648">
        <front>
          <title>The Base16, Base32, and Base64 Data Encodings</title>
          <author fullname="S. Josefsson" initials="S." surname="Josefsson">
            <organization/>
          </author>
          <date month="October" year="2006"/>
          <abstract>
            <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes.  It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4648"/>
        <seriesInfo name="DOI" value="10.17487/RFC4648"/>
      </reference>
    </references>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks goes to Emil Gustafsson for suggesting a DKIM specification.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA71ZXXfbNhJ956/Aug9JdiWt7aRO4qz3rBrHrU/jxGu7p2cf
IRKUUJMEFyCtqD3pb987M+CHZDXtvrQnjRQSGMzHnZk70HQ6TRrbFOZU3ZhC
b9RF4dbqMjNVY3NrvEr0YuHNw2+8TlLdmKXzm1NlPtVJkrm00iWEZV7nzTRd
tbpaTj1tnebYOrX91unh8yS0i9KGYF3VbGrsunx3d5FUbbkw/jTJIPo0SV0V
TBXacKoa35oEmjxP1s7fL71ra2ypMlObisSq28YbXSaJrT2vDs3x4eHrw2OV
3JsN9mSnKlFTdf795RV9zm/e0gcblui2WTkvCxKF//K2KMSWH41d6bV6y8bI
S+eXurI/6waqn6pvnVsWZgJd0hm/NqW2xala88Z/Lfn1LHUlv0xdWzXksSRJ
KudLCHmAoYmt8tG/ptOp0ovQeJ02SXLnVI0okJGh1mVpfFC5d6Vqg4VO7GCF
7WvtMzyY4GhscLULRjVORa9vuoWIRJgpGKYyp5qVDWqxUSv90MsKKgbW/gwB
K2O9IgeRFHqRwbs6z20qopSuMlW3i8KGFR3nTWpgBXQcwo1FIbjU8u61bbBw
Rdp1utyRFvijVVvZ/7bwZo1NNjRks4Mw1dgSTwcLRsIVBQoCdUMigklbj1Ng
U3B4ntmlbXShgl1WusErHHfTq5jqCl404oaRSNixMkW95YhodLMC9pZkgYn6
kANECKmwJUTXdQGFbWWmS69thbWNneoFLa9dYVNrcG4FQ3WmXK5cxXJJhP/C
kZ3LkHFtST5CuB9wMnkw1CbF+SnDk2DBkFdPby7enjx/efKMH8GkpYU/KObd
KWQGsoJXvjo5eikrI66GqONsAWhps6wwwPFXwH7jXdamfCRe33YwbRtbkPMi
ruARt8jbQG6NyBJ/NeQHUsDliDmtC7WDPziEDiv7hRvBDyfZgDUodQFlzSdd
1oVhL7AGqkR8UJwKZxt2X1hpQgcO0VW6UQ9tURmvF9ASknHg7fWF+uWXv8AF
L48PX33+vKNKr4RGCroiwveyoRBn5H1BBCMBCG8CFKg2AGGeG0+Bwv/G194i
/ilKlGMvrVfI0iot2swMMX4S1OU1gSM6ijTrIMPxN72RlJsAPmnwBZSG0JYc
79XIDsacoQ/JyEEpO0Oq2EasD7zran75Xl3cfLza2k9vHixiXwKPCEs1Uz+u
bCGmkNYPurCZwPGpzbGoMs+6jbZC7Ck9oT3lbDM2y43UzxHvMKHItotgUCOo
5G8LX5MbRnh1Y/hEDTvESAEdxK9tUagaPmKhC5NqyWjDQQBmULmrBsZBsIQk
SnwShshQXs4bObV2tmom8YR4ZuVQQU3ojYQIvVNH1igQYagco3LBnYMQbXRA
GeMSzpnwCXWS4jqq0eSN0iCiWZhIbRP91Nq1BQwoazQWpWEyp5HU8QEyAC9r
NFELOA/2Vi4lf5OCpSYIupbOn8NRDekEZb3T6SrKX3DfCaYwKTU0suP3rOmC
HWMPr3KVX68spFpKEd1ES7izATJI4UXBfvhGtNiYXYdjuaxiNCDBAq3rc8SN
CgWF1yOjsVRQzNaK3n2lDqmrRVbUxwwdGR3UdFK4Z82oNH6l7oxH2rnCLSXC
5yZn0IPaoLVDAuiJIn4S1MHVD7d3BxP5VB8+8vebd//+4fLm3Tl9v/1u/v59
/6Vbcfvdxx/enw/fhp1vP15dvftwLpuv5v/BB6lw8PH67vLjh/n7A8HyuJMQ
1GHfglKTS5Whno1yh+6SersQ/EuJPD46ev35M+ycp95VmxIGJclfwXLmW3Qh
ttsMJIr8+hRN5lmUQH0GRXYqzR+hbVwK93XNHOiASkwqgivgX0noWDpQ0EyQ
DndFjSvW7RevXkvdzu0nXgixgEAZRKysjfngzU/AKPEAgJILkCTEiEyRw4gj
aVqAvKJuisRokectVfXIxYItbaF9pxUcxm3Xm5r7NZ2ZUeTx7hElkdY338rf
6Y0JbdEwOZufX50LHBU1O7ylfC9NugIPDSW7AHvL2a7zx3I6hx8eff4M+gt+
o7OIe0SFC4gCh2vIvaOi6uN2Oh4kljAS5JxzTpPvDfp6PxNk6or895Rs72JM
rIOOJH6vQgNBcG2ns0r9pm4cyFGNVB8hwG1xztjvY87FBC3AiQuhn9iGOMaO
AsrmY28qTQh6ST5vfeQ6VbDNTIg8WzFEabqlMDFJ9sCr2UkfOr3DGFLNFYOF
3LAQirxUle5w6m1NX121ur26u1ZXd3PZRSAwfiLY5EbOJFZgz+ShdJ5Lmq0t
OX/Cdnu97Ho5lG8bCVbMDJEpUbql8cira8H7hQdXpgFKPUXXerZFdfZFaNxT
cBx1afn0TJ8xuFlywWZIj8trpbMMqAlMFEEO94+Wt2OaSoWQzN6irr3Pq0dk
n1RjQCCenBGM3p4a91oNvRXpHbi/U6XdbZWhRZPRoWuZHZsWF/TV7sXrr18A
FpT5Qim65SisVC/RlYJFoennmUFpWqGLwGWVC82Ob+VJLDmxHfdKwU56Srkp
acgEWFTY3/NlL8PLCXFkdMFTNAYS22SUCDKsdFAhPFxfu/5I3Jm7WjctUCNo
BqdOYnvG+owbGvucdsHMAdzZZKfF/P6wMs5D4tdVNwNUhE5QqMkotNFzA/cd
qWuKYEALvZE6jk0wkltcjxGQsrGyHQmNFgbXj2d/0AgZyod+JC2Ok+EdY/YW
yQMaqK5FQpxCM7ClJVW6gQuOIBFkD9OkfSPEZGTQ7qjNMe1W9hRdPZrRxDm5
iS3JWHY53AGuyAnGqbjndAIZXSHYn3R6TxhJmd31g/22f+LNRKBMHtCO/XtH
o24Q56l4a+YT4/oBXYR3nK07DAXxyxR6HsQ/fTMNQ3EZ+39/MnoTB1ZXa4wk
SuckfmFirWy65kT0AwqlLDszi3Ypmso9gDQvqBsTxQmt0J2HQorebnpX9Pc5
MrENmkfCuVVph/oakTVCk0pXzjFaIbq/BdmOFjPR0S0Iqc0lmIU9ugtiP8UB
YnzHkrlxHDQqxSbgrLaWC49SYS6ssAMN029ixnuqTh1N2L5WQX0xcBJPFxMa
UiPxpSo8XBwRt7Wl6Cz3SpTuUJ4g6lGteQLaHX6GKxZgY5+VikNEUd/NNN1n
cTdESJ3KrQevqrVveu466g3k4Zhs3SWA7meQ4YTWF9Ogc8Ot9uRF15ROXsgt
xb3BYZSIlCc1qAl51ElAdrVSPEYZQqjcXlB/Gs4uHAqJqPv7h0bMj2hZfAyn
BwMhfC5VEQqNdZl6MnvSVYbRSbKLsMIg76YNFrybjT3kIeetKxc8le/VgB66
WnpTPE1e0m3ruIfsuVIk16B89DTOPr7FZGoGuFd8iUJCxo0pglLmYDGE1ncJ
Jof2xCn6ortHuKMk4kzrhkEKLfFBEc7TGVkVbz8ZvZGJ6HgLukOuVzqsCICE
CYI3EZLm8TFxIohgeoRxaHCNHIvdvqszNGQja+MlNt30XF9ePov3VAgwSo4K
K7l9WFaO71PKEhX1yd+eECMJTIw68hBdNNy15G28ukUTjXd8PKOw6uEUhe/X
X39NDo+On7/4+uTlq9ejrzO9SLP1p83PyfDtH5wi/+RNUjT5ZwFhoX2DQgE2
6zEhidMqPZnedsObavRyCmXa3QvgEIdPyrOUp1Y9RpvMc1+EH/kO0gl5QoYx
uvvcZgfMvOINmxzNIaSfS7gx8VkxGXZT+IvJsX/x3jyGfqIgL5EQB0FRjDBZ
x5MCemDRxvE7RjhvPVe8PxDpLrrbbj9VD2dHb5Q+80FPw0off33yRqVn5M9P
Jvt7/HyjsrN4KUw/wbyRuS+cHR8ePz88OsKW1dlsNnujFt0n/p6dvVHk5rN9
IBogQ78g7UXMLvejB9O9U3kfViHuWzP6/48m24gqxjebR7v/ANR2lIFhB7zn
oCP6fMEaGwcKnb4X+ouSXJh4URDhCPUOaNo6iHpgbCQSEcY3rsQnxyNQByh5
HZXge1keQvh6qCa8jDIutt14m1PTD4ndM8mUwSF2ZqCTlFd5JSP3thWCZhbe
FeHRoz89w/7UBPtNmIZTZTnZ8HL2OJ04YGd8ef60uyJ6pkau/mIiYQ6yDxrR
e0u+BefT8W4Ur26pjdE9y553l/MP80fPt38VQ8MjDsQrNTPsQJfEM/n9aoFp
hSXN0/vKrQuTLVl1kqKr+6CWTgaudyXox7cYSXSOZihjamiXSxPv3eP4OObN
OOJ/7gc9wF0fAAA=

-->

</rfc>
