<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dnsop-structured-dns-error-10" category="std" consensus="true" submissionType="IETF" updates="8914" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="Structured DNS Error">Structured Error Data for Filtered DNS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-structured-dns-error-10"/>
    <author fullname="Dan Wing">
      <organization abbrev="Citrix">Citrix Systems, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Neil Cook">
      <organization>Open-Xchange</organization>
      <address>
        <postal>
          <country>United Kingdom</country>
        </postal>
        <email>neil.cook@noware.co.uk</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <street>Rennes</street>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2024" month="November" day="27"/>
    <area>Internet</area>
    <workgroup>DNS Operations Working Group</workgroup>
    <keyword>Customer experience</keyword>
    <keyword>Informed decision</keyword>
    <keyword>transparency</keyword>
    <keyword>enriched feedback</keyword>
    <abstract>
      <?line 89?>

<t>DNS filtering is widely deployed for various reasons, including
network security. However, filtered DNS responses lack structured information
for end users to understand the reason for the filtering.
Existing mechanisms to provide explanatory details to end users cause harm
especially if the blocked DNS response is for HTTPS resources.</t>
      <t>This document updates RFC 8914 by signaling client support for structuring the EXTRA-TEXT field of
the Extended DNS Error to provide details on the DNS filtering. Such
details can be parsed by the client and displayed, logged, or used for
other purposes.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-dnsop.github.io/draft-ietf-dnsop-structured-dns-error/draft-ietf-dnsop-structured-dns-error.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-dnsop-structured-dns-error/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        dnsop Working Group mailing list (<eref target="mailto:dnsop@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dnsop/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dnsop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-dnsop/draft-ietf-dnsop-structured-dns-error"/>.</t>
    </note>
  </front>
  <middle>
    <?line 102?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>DNS filters are deployed for a variety of reasons, e.g., endpoint
security, parental filtering, and filtering required by law
enforcement. Network-based security solutions such as firewalls and
Intrusion Prevention Systems (IPS) rely upon network traffic
inspection to implement perimeter-based security policies and operate
by filtering DNS responses. In a home network, DNS filtering is used for the
same reasons as above and additionally for parental control. Internet
Service Providers (ISPs) typically block access to some DNS domains due to a
requirement imposed by an external entity (e.g., law enforcement
agency) also performed using DNS-based content filtering.</t>
      <t>Users of DNS services that perform filtering may wish to receive more
explanatory information about such a filtering to resolve problems with the filter
-- for example to contact the administrator to allowlist a DNS domain that
was erroneously filtered or to understand the reason a particular
domain was filtered. With that information, a user can choose
to use another network, open a trouble ticket with the DNS administrator to
resolve erroneous filtering, log the information, etc.</t>
      <t>For the DNS filtering mechanisms described in <xref target="existing-techniques"/>, the DNS
server can return extended error codes Blocked, Filtered, or
Forged Answer defined in <xref section="4" sectionFormat="of" target="RFC8914"/>. However, these codes
only explain that filtering occurred but lack detail for the user to
diagnose erroneous filterings.</t>
      <t>No matter which type of response is generated (forged IP address(es),
NXDOMAIN or empty answer, even with an extended error code), the user
who triggered the DNS query has little chance to understand which
entity filtered the query, how to report a mistake in the filter, or
why the entity filtered it at all. This document describes a mechanism
to provide such detail.</t>
      <t>One of the other benefits of the approach described in this document is to eliminate the need to
"spoof" block pages for HTTPS resources. This is achieved since
clients implementing this approach would be able to display a
meaningful error message, and would not need to connect to such a
block page. This approach thus avoids the need to install a local root
certificate authority on those IT-managed devices.</t>
      <t>This document describes a format for computer-parsable data in the
EXTRA-TEXT field of <xref target="RFC8914"/>. It updates <xref section="2" sectionFormat="of" target="RFC8914"/> which
says the information in EXTRA-TEXT field is intended for human
consumption (not automated parsing).</t>
      <t>This document does not recommend DNS filtering but provides a
mechanism for better transparency to explain to the users why some DNS
queries are filtered.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in DNS Terminology <xref target="RFC8499"/>.</t>
      <t>"Requestor" refers to the side that sends a request. "Responder"
refers to an authoritative, recursive resolver or other DNS component
that responds to questions.</t>
      <t>"Encrypted DNS" refers to any encrypted scheme to convey DNS messages,
for example, DNS-over-HTTPS <xref target="RFC8484"/>, DNS-over-TLS <xref target="RFC7858"/>, or
DNS-over-QUIC <xref target="RFC9250"/>.</t>
      <t>The document refers to an Extended DNS Error (EDE) using its purpose, not its
INFO-CODE as per Table 3 of <xref target="RFC8914"/>. "Forged Answer",
"Blocked", and "Filtered" are thus used to refer to "Forged Answer (4)",
"Blocked (15)", and "Filtered (17)".</t>
    </section>
    <section anchor="existing-techniques">
      <name>DNS Filtering Techniques and Their Limitations</name>
      <t>DNS responses can be filtered by sending, e.g., a bogus (also called
"forged") response, NXDOMAIN error, or empty answer. Also, clients can be informed that filtering has occured by sending an
Extended DNS Error code defined in <xref target="RFC8914"/>. Each of these
methods have advantages and disadvantages that are discussed below:</t>
      <ol spacing="normal" type="1"><li>
          <t>The DNS response is forged to provide a list of IP addresses that
points to an HTTP(S) server alerting the end user about the reason for
blocking access to the requested domain (e.g., malware). When an
HTTP(S) enabled domain name is blocked, the network security device
(e.g., Customer Premises Equipment (CPE) or firewall) presents a block page instead of the HTTP
response from the content provider hosting that domain. If an HTTP
enabled domain name is blocked, the network security device intercepts
the HTTP request and returns a block page over HTTP. If an HTTPS
enabled domain is blocked, the block page is also served over
HTTPS. In order to return a block page over HTTPS, man in the middle
(MITM) is enabled on endpoints by generating a local root certificate
and an accompanying (local) public/private key pair. The local root
certificate is installed on the endpoint while the network security
device stores a copy of the private key. During the TLS handshake,
the on-path network security device modifies the certificate provided by the
server and (re)signs it using the private key from the local root
certificate.  </t>
          <ul spacing="normal">
            <li>
              <t>However, this approach is ineffective when DNSSEC is deployed given that DNSSEC
ensures the integrity and authenticity of DNS responses, preventing forged DNS
responses from being accepted.</t>
            </li>
            <li>
              <t>The HTTPS server will have access to the client's IP address and the hostname being requested.
This information will be sensitive, as it will expose the user's identity and the
domain name that a user attempted to access.</t>
            </li>
            <li>
              <t>Configuring a local root certificate on endpoints is
not a viable option in several deployments like home networks,
schools, Small Office/Home Office (SOHO), or Small/Medium
Enterprise (SME). In these cases, the typical behavior is that
the filtered DNS response points to a server that will display
the block page. If the client is using HTTPS (via a web browser or
another application) this results in a certificate validation
error which gives no information to the end-user about the reason
for the DNS filtering.</t>
            </li>
            <li>
              <t>Enterprise networks do not assume that all the connected devices
are managed by the IT team or Mobile Device Management (MDM)
devices, especially in the quite common Bring Your Own Device
(BYOD) scenario. In addition, the local root certificate cannot
be installed on IoT devices without a device management tool.</t>
            </li>
            <li>
              <t>An end user does not know why the connection was prevented and,
consequently, may repeatedly try to reach the domain but with no
success. Frustrated, the end user may switch to an alternate
network that offers no DNS filtering against malware and
phishing, potentially compromising both security and
privacy. Furthermore, certificate errors train users to click
through certificate errors, which is a bad security practice. To
eliminate the need for an end user to click through certificate
errors, an end user may manually install a local root certificate
on a host device. Doing so, however, is also a bad security
practice as it creates a security vulnerability that may be
exploited by a MITM attack. When a manually installed local root
certificate expires, the user has to (again) manually install the
new local root certificate.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>The DNS response is forged to provide a NXDOMAIN response to cause
the DNS lookup to terminate in failure. However, this approach does not
work with DNSSEC. In scenarios without DNSSEC, an end user does not know why
a domain name cannot be reached and may repeatedly try to reach that domain name
but without success. Frustrated, an end user may use insecure connections
to reach the domain name, potentially compromising both security and privacy.</t>
        </li>
        <li>
          <t>The extended error codes Blocked and Filtered defined in
<xref section="4" sectionFormat="of" target="RFC8914"/> can be returned by a DNS server to provide
additional information about the cause of a DNS error.</t>
        </li>
        <li>
          <t>These extended error codes do not suffer from the limitations
discussed in bullets (1) and (2), but the user still does not know the
exact reason nor is aware of the exact entity blocking the
access to the domain. For example, a DNS server may block access to a
domain based on the content category such as "Malware" to protect the
endpoint from malicious software, "Phishing" to prevent the user from
revealing sensitive information to the attacker, etc. A user may need to
know the contact details of the IT/InfoSec team to raise a complaint.</t>
        </li>
      </ol>
    </section>
    <section anchor="name-spec">
      <name>I-JSON in EXTRA-TEXT Field</name>
      <t>DNS servers that are compliant with this specification and have received an indication that the client also supports this specification as per <xref target="client-request"/> send data in the EXTRA-TEXT field <xref target="RFC8914"/> encoded using the Internet JSON (I-JSON)
message format <xref target="RFC7493"/>.</t>
      <ul empty="true">
        <li>
          <t>Note that <xref target="RFC7493"/> was based on <xref target="RFC7159"/>, but <xref target="RFC7159"/> was replaced by <xref target="RFC8259"/>.</t>
        </li>
      </ul>
      <t>This document defines the following JSON names:</t>
      <dl>
        <dt>c: (contact)</dt>
        <dd>
          <t>The contact details of the IT/InfoSec team to report mis-classified
DNS filtering. This information is important for transparency and also to ease unblocking a legitimate domain name that got blocked due to wrong classification.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is structured as an array of contact URIs, using 'tel' <xref target="RFC3966"/> or 'sips' <xref target="RFC5630"/> or  'mailto' <xref target="RFC3966"/> schemes. At least one contact URI <bcp14>MUST</bcp14> be included.</t>
        </dd>
        <dt/>
        <dd>
          <t>New contact URI schemes may be added to the IANA registry following the instructions in <xref target="IANA-Contact"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is mandatory.</t>
        </dd>
        <dt>j: (justification)</dt>
        <dd>
          <t>'UTF-8'-encoded <xref target="RFC5198"/> textual justification for this particular
DNS filtering. The field should be treated only as diagnostic
information for IT staff.</t>
        </dd>
        <dt/>
        <dd>
          <t>Whether the information provided in the "j" name is meaningful or considered as garbage data
(including empty values) is local to each IT teams. Returning garbage data
would indicate that a DNS server is misbehaving. Note also that the provided
justification is useful for cross-validation with another DNS server.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is mandatory.</t>
        </dd>
        <dt>s: (suberror)</dt>
        <dd>
          <t>The suberror code for this particular DNS filtering.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is optional.</t>
        </dd>
        <dt>o: (organization)</dt>
        <dd>
          <t>'UTF-8'-encoded human-friendly name of the organization that filtered this particular DNS query.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is optional.</t>
        </dd>
        <dt>l: (language)</dt>
        <dd>
          <t>The "l" field indicates the language used for the JSON-encoded "j" and "o" fields.  The value of this field <bcp14>MUST</bcp14> conform to the
language tag syntax specified in <xref section="2.1" sectionFormat="of" target="RFC5646"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>This field is optional but <bcp14>RECOMMENDED</bcp14> to aid in localization.</t>
        </dd>
      </dl>
      <t>New JSON names can be defined in the IANA registry introduced in <xref target="IANA-Names"/>. Such names <bcp14>MUST</bcp14>
consist only of lower-case ASCII characters, digits, and hyphen-minus (that
is, Unicode characters U+0061 through 007A, U+0030 through U+0039, and
U+002D). Also, these names <bcp14>MUST</bcp14> be 63 characters or shorter and it is
<bcp14>RECOMMENDED</bcp14> they be as short as possible.</t>
      <t>The text in the "j" and "o" names can include international
characters. The text will be in natural language, chosen by the DNS administrator
to match its expected audience.</t>
      <t>To reduce DNS message size the generated JSON <bcp14>SHOULD</bcp14> be as short as
possible: short domain names, concise text in the values for the "j"
and "o" names, and minified JSON (that is, without spaces or line
breaks between JSON elements).</t>
      <t>The JSON data can be parsed to display to the user, logged, or
otherwise used to assist the end-user or IT staff with troubleshooting
and diagnosing the cause of the DNS filtering.</t>
      <ul empty="true">
        <li>
          <t>An alternate design for conveying the suberror would be to define new EDE codes for these errors. However, such design is suboptimal because it requires replicating an error code for each EDE code to which the suberror applies (e.g., "Malware" suberror in <xref target="reg"/> would consume three EDE codes).</t>
        </li>
      </ul>
    </section>
    <section anchor="protocol-operation">
      <name>Protocol Operation</name>
      <section anchor="client-request">
        <name>Client Generating Request</name>
        <t>When generating a DNS query the client includes the EDE option (<xref section="2" sectionFormat="of" target="RFC8914"/>) in the OPT pseudo-RR <xref target="RFC6891"/> to
elicit the EDE option in the DNS response. It <bcp14>MUST</bcp14> use an
OPTION-LENGTH of 2, the INFO-CODE field set to "0"
(Other Error), and an empty EXTRA-TEXT field.  This signal indicates
that the client desires that the server responds in accordance with
the present specification.</t>
      </section>
      <section anchor="server-response">
        <name>Server Generating Response</name>
        <t>When the DNS server filters its DNS response to a
query (e.g., A or AAAA record query), the DNS response <bcp14>MAY</bcp14> contain an empty answer, NXDOMAIN, or (less
ideally) forged response, as desired by the DNS
server. In addition, if the query contained the OPT pseudo-RR the DNS
server <bcp14>MAY</bcp14> return more detail in the EXTRA-TEXT field as described in
<xref target="client-processing"/>.</t>
        <t>Servers <bcp14>MAY</bcp14> decide to return small TTL values in filtered DNS
responses (e.g., 2 seconds) to handle domain category and reputation
updates. Short TTLs allow for quick adaptation to dynamic changes in domain filtering decisions,
but can result in increased query traffic. In cases where updates are less frequent,
TTL values of 30 to 60 seconds <bcp14>MAY</bcp14> provide a better balance, reducing server load while
still ensuring reasonable flexibility for updates.</t>
        <t>Because the DNS client signals its EDE support (<xref target="client-request"/>)
and because EDE support is signaled via a non-cached OPT resource
record (<xref section="6.2.1" sectionFormat="of" target="RFC6891"/>) the EDE-aware DNS server can
tailor its filtered response to be most appropriate to that client's
EDE support.  If EDE support is signaled in the query as per <xref target="client-request"/>, the server <bcp14>MUST
NOT</bcp14> return the "Forged Answer" extended error code because the client
can take advantage of EDE's more sophisticated error reporting (e.g.,
"Filtered", "Blocked").  Continuing to send "Forged
Answer" even to an EDE-supporting client will cause the persistence of
the drawbacks described in <xref target="existing-techniques"/>.</t>
      </section>
      <section anchor="client-processing">
        <name>Client Processing Response</name>
        <t>On receipt of a DNS response with an EDE option from a
DNS responder, the following ordered actions are performed on the EXTRA-TEXT
field:</t>
        <ul spacing="normal">
          <li>
            <t>Servers which don't support this specification might use plain text
in the EXTRA-TEXT field. Requestors <bcp14>SHOULD</bcp14> properly handle
both plaintext and JSON text in the EXTRA-TEXT field. The requestor verifies that
the field contains valid JSON. If not, the requestor <bcp14>MUST</bcp14> consider
the server does not support this specification and stop processing
rest of the actions defined in this section, but may instead choose
to treat EXTRA-TEXT as per <xref target="RFC8914"/>.</t>
          </li>
          <li>
            <t>The response <bcp14>MUST</bcp14> be received over an encrypted DNS channel. If not,
the requestor <bcp14>MUST</bcp14> discard data in the EXTRA-TEXT field.</t>
          </li>
          <li>
            <t>The DNS response <bcp14>MUST</bcp14> also contain an extended error code of
"Blocked by Upstream Server", "Blocked" or "Filtered" <xref target="RFC8914"/>, otherwise
the EXTRA-TEXT field is discarded.</t>
          </li>
          <li>
            <t>If either of the mandatory JSON names "c" and "j" are missing or
have empty values in the EXTRA-TEXT field, the entire JSON is
discarded.</t>
          </li>
          <li>
            <t>If the "c" field contains any URI scheme not registered in the
<xref target="IANA-Contact"/> registry, it <bcp14>MUST</bcp14> be discarded.</t>
          </li>
          <li>
            <t>If a DNS client has enabled opportunistic privacy profile (<xref section="5" sectionFormat="of" target="RFC8310"/>) for DoT, the DNS client will either fall back to an
encrypted connection without authenticating the DNS server provided
by the local network or fall back to clear text DNS, and cannot
exchange encrypted DNS messages. Both of these fallback mechanisms
adversely impact security and privacy. If the DNS client has enabled
opportunistic privacy profile for DoT and the identity of the DNS server
cannot be verified but the connection is encrypted, the DNS client <bcp14>MUST</bcp14>
ignore the "c", "j", and "o" fields but <bcp14>MAY</bcp14> process the "s" field
and other parts of the response.</t>
          </li>
          <li>
            <t>Opportunistic discovery <xref target="I-D.ietf-add-ddr"/>, where only the IP address is
validated, the DNS client <bcp14>MUST</bcp14> ignore the "c", "j", and "o" fields
but <bcp14>MAY</bcp14> process the "s" field and other parts of the response.</t>
          </li>
          <li>
            <t>If a DNS client has enabled strict privacy profile (<xref section="5" sectionFormat="of" target="RFC8310"/>) for DoT, the DNS client requires an encrypted connection
and successful authentication of the DNS server. In doing so, this mitigates both
passive eavesdropping and client redirection (at the expense of
providing no DNS service if an encrypted, authenticated connection
is not available). If the DNS client has enabled strict privacy
profile for DoT, the DNS client <bcp14>MAY</bcp14> process the EXTRA-TEXT field of the
DNS response.</t>
          </li>
          <li>
            <t>The DNS client <bcp14>MUST</bcp14> ignore any other JSON names that it does not support.</t>
          </li>
          <li>
            <t>When a forwarder receives an EDE option, whether or not (and how) to
pass along JSON information in the EXTRA-TEXT on to their client is
implementation dependent <xref target="RFC5625"/>. Implementations <bcp14>MAY</bcp14> choose to
not forward the JSON information, or they <bcp14>MAY</bcp14> choose to create a new
EDE option that conveys the information in the "c", "s", and "j"
fields encoded in the JSON object.</t>
          </li>
          <li>
            <t>The application that triggered the DNS request may have a local policy to override the contact information
 (e.g., redirect all complaint calls to a single contact point). In such a case, the content of the
 "c" attribute can be ignored.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Note that the strict and opportunistic privacy profiles as defined in <xref target="RFC8310"/> only apply to DoT; there has been
no such distinction made for DoH.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="new-sub-error-codes-definition">
      <name>New Sub-Error Codes Definition</name>
      <t>The document defines the following new IANA-registered Sub-Error codes.</t>
      <section anchor="policy-reserved">
        <name>Reserved</name>
        <ul spacing="normal">
          <li>
            <t>Number: 0</t>
          </li>
          <li>
            <t>Meaning: Reserved. This sub-error code value <bcp14>MUST NOT</bcp14> be sent. If received, it has no meaning.</t>
          </li>
          <li>
            <t>Applicability: This code should never be used.</t>
          </li>
          <li>
            <t>Reference: This-Document</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
        </ul>
      </section>
      <section anchor="policy-network">
        <name>Network Operator Policy</name>
        <ul spacing="normal">
          <li>
            <t>Number: 5</t>
          </li>
          <li>
            <t>Meaning: Network Operator Policy. The code indicates that the request was filtered according to a policy imposed by the operator of the local network (where local network is a relative term, e.g., it may refer to a Local Area Network or to the network of the ISP selected by the user).</t>
          </li>
          <li>
            <t>Applicability: Blocked</t>
          </li>
          <li>
            <t>Reference: This-Document</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
        </ul>
      </section>
      <section anchor="policy-dns">
        <name>DNS Operator Policy</name>
        <ul spacing="normal">
          <li>
            <t>Number: 6</t>
          </li>
          <li>
            <t>Meaning: DNS Operator Policy. The code indicates that the request was filtered according to policy determined by the operator of the DNS server. This is different from the "Network Operator Policy" code when a third-party DNS resolver is used.</t>
          </li>
          <li>
            <t>Applicability: Blocked</t>
          </li>
          <li>
            <t>Reference:  This-Document</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="extended-dns-error-code-tba1-blocked-by-upstream-dns-server">
      <name>Extended DNS Error Code TBA1 - Blocked by Upstream DNS Server</name>
      <t>The DNS server (e.g., a DNS forwarder) is unable to respond to the request
because the domain is on a blocklist due to an internal security policy
imposed by an upstream DNS server. This error code
is useful in deployments where a network-provided DNS forwarder
is configured to use an external resolver that filters malicious
domains. Typically, when the DNS forwarder receives a Blocked (15) error code from the upstream DNS server, it will replace it with "Blocked by Upstream DNS Server" (TBA1) before forwarding the reply to the DNS client.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>An example showing the nameserver at 'ns.example.net' that filtered a
DNS "A" record query for 'example.org' is provided in <xref target="example-json"/>.</t>
      <figure anchor="example-json">
        <name>JSON Returned in EXTRA-TEXT Field of Extended DNS Error Response</name>
        <artwork><![CDATA[
{
  "c": [
    "tel:+358-555-1234567",
    "sips:bob@bobphone.example.com"
  ],
  "j": "malware present for 23 days",
  "s": 1,
  "o": "example.net Filtering Service"
  "l": "tzm",
}
]]></artwork>
      </figure>
      <t>In <xref target="example-json-minified"/> the same content is shown with minified JSON (no
whitespace, no blank lines) with <tt>'\'</tt> line wrapping per <xref target="RFC8792"/>.</t>
      <figure anchor="example-json-minified">
        <name>Minified Response</name>
        <artwork><![CDATA[
{::include-fold68left0 ./examples/minified.json}
]]></artwork>
      </figure>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>Security considerations in <xref section="6" sectionFormat="of" target="RFC8914"/> apply to this
document, except the guard against using EDE content to alter DNS protocol
processing. The guard is relaxed in the current specification as it mandates
encryption and recommends the use of an authenticated connection to the DNS
server, while <xref target="RFC8914"/> assumes that EDE information is unauthenticated
and sent over clear text.</t>
      <t>To minimize impact of active on-path attacks on the DNS channel, the
client validates the response as described in <xref target="client-processing"/>.</t>
      <t>A client might choose to display the information in the "c", "j", and
"o" fields if and only if the encrypted resolver has sufficient
reputation, according to some local policy (e.g., user configuration,
administrative configuration, or a built-in list of respectable
resolvers). This limits the ability of a malicious encrypted resolver
to cause harm. For example, an end user can use the details in the "c" field to contact an attacker
to solve the problem of being unable to reach a domain. The attacker can mislead the end user to
install malware or spyware to compromise the device security posture or mislead the end user to reveal
personal data.
If the client decides not to display all of the
information in the EXTRA-TEXT field, it can be logged for diagnostics
purpose and the client can only display the resolver hostname that
blocked the domain, error description for the EDE code and the
suberror description for the "s" field to the end-user.</t>
      <t>When displaying the free-form text of "j" and "o", the browser <bcp14>MUST
NOT</bcp14> make any of those elements into actionable (clickable) links and these
fields need to be rendered as text, not as HTML. The contact details of "c" can be made
into clickable links to provide a convenient way for users to initiate, e.g., voice calls. The client might
choose to display the contact details only when the identity of the DNS server is verified.</t>
      <t>An attacker might inject (or modify) the EDE EXTRA-TEXT field with a
DNS proxy or DNS forwarder that is unaware of EDE. Such a DNS proxy or
DNS forwarder will forward that attacker-controlled EDE option.  To
prevent such an attack, clients can be configured to process EDE from
explicitly configured DNS servers or utilize RESINFO
<xref target="I-D.ietf-add-resolver-info"/>.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document requests four IANA actions as described in the following subsections.</t>
      <ul empty="true">
        <li>
          <t>Note to the RFC Editor: Please replace RFCXXXX with the RFC number assigned to this document and "TBA1" with the value assigned by IANA.</t>
        </li>
      </ul>
      <section anchor="media-type-registration">
        <name>Media Type Registration</name>
        <t>This document requests IANA to register the
"application/json+structured-dns-error" media type in the "Media
Types" registry <xref target="IANA-MediaTypes"/>. This registration follows the
procedures specified in <xref target="RFC6838"/>:</t>
        <artwork><![CDATA[
   Type name: application

   Subtype name: json+structured-dns-error

   Required parameters: N/A

   Optional parameters: N/A

   Encoding considerations: as defined in Section 4 of RFCXXXX.

   Security considerations: See Section 10 of RFCXXXX.

   Interoperability considerations: N/A

   Published specification: RFCXXXX

   Applications that use this media type: Section 4 of RFCXXXX.

   Fragment identifier considerations: N/A

   Additional information: N/A

   Person & email address to contact for further information: IETF,
      iesg@ietf.org

   Intended usage: COMMON

   Restrictions on usage: none

   Author: See Authors' Addresses section.

   Change controller: IESG

   Provisional registration?  No
]]></artwork>
      </section>
      <section anchor="IANA-Names">
        <name>New Registry for JSON Names</name>
        <t>This document requests IANA to create a new registry, entitled "EXTRA-TEXT JSON Names"
under "Domain Name System (DNS) Parameters, Extended DNS Error Codes"
registry <xref target="IANA-DNS"/>. The registration request for a new JSON name must include the
following fields:</t>
        <dl>
          <dt>JSON Name:</dt>
          <dd>
            <t>Specifies the name of an attribute that is present in the JSON data enclosed in EXTRA-TEXT field. The name must follow the guidelines in <xref target="name-spec"/>.</t>
          </dd>
          <dt>Short description:</dt>
          <dd>
            <t>Includes a short description of the requested JSON name.</t>
          </dd>
          <dt>Mandatory (Y/N?):</dt>
          <dd>
            <t>Indicates whether this attribute is mandatory or optional.</t>
          </dd>
          <dt>Specification:</dt>
          <dd>
            <t>Provides a pointer to the reference document that specifies the attribute.</t>
          </dd>
        </dl>
        <t>The registry is initially populated with the following values:</t>
        <table anchor="reg-names">
          <name>Initial JSON Names Registry</name>
          <thead>
            <tr>
              <th align="center">JSON Name</th>
              <th align="left">Full JSON Name</th>
              <th align="left">Description</th>
              <th align="left">Mandatory</th>
              <th align="center">Specification</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">c</td>
              <td align="left">contact</td>
              <td align="left">The contact details of the IT/InfoSec team to report mis-classified DNS filtering</td>
              <td align="left">Y</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">j</td>
              <td align="left">justification</td>
              <td align="left">UTF-8-encoded <xref target="RFC5198"/> textual justification for a particular DNS filtering</td>
              <td align="left">Y</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">s</td>
              <td align="left">suberror</td>
              <td align="left">the suberror code for this particular DNS filtering</td>
              <td align="left">N</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">o</td>
              <td align="left">organization</td>
              <td align="left">UTF-8-encoded human-friendly name of the organization that filtered this particular DNS query</td>
              <td align="left">N</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
            <tr>
              <td align="center">l</td>
              <td align="left">language</td>
              <td align="left">Indicates the language of the "j" and "o" fields as defined in <xref target="RFC5646"/></td>
              <td align="left">No</td>
              <td align="center">
                <xref target="name-spec"/> of RFCXXXX</td>
            </tr>
          </tbody>
        </table>
        <t>New JSON names are registered via IETF Review (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
      <section anchor="IANA-Contact">
        <name>New Registry for Contact URI Scheme</name>
        <t>This document requests IANA to create a new registry, entitled "Contact URI Schemes"
under "Domain Name System (DNS) Parameters, Extended DNS Error Codes"
registry <xref target="IANA-DNS"/>. The registration request for a new Contact URI scheme has to include the
following fields:</t>
        <ul spacing="normal">
          <li>
            <t>Name: URI scheme name.</t>
          </li>
          <li>
            <t>Meaning: Provides a short description of the scheme.</t>
          </li>
          <li>
            <t>Reference: Provides a pointer to an IETF-approved specification that defines
the URI scheme.</t>
          </li>
          <li>
            <t>Change Controller: Indicates the person or entity, with contact information if appropriate.</t>
          </li>
        </ul>
        <t>The Contact URI scheme registry is initially be populated with the
following schemes:</t>
        <table>
          <thead>
            <tr>
              <th align="center">Name</th>
              <th align="left">Meaning</th>
              <th align="center">Reference</th>
              <th align="center">Change Controller</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">sips</td>
              <td align="left">SIP Call</td>
              <td align="center">
                <xref target="RFC5630"/></td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">tel</td>
              <td align="left">Telephone Number</td>
              <td align="center">
                <xref target="RFC3966"/></td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">mailto</td>
              <td align="left">Internet mail</td>
              <td align="center">
                <xref target="RFC6068"/></td>
              <td align="center">IETF</td>
            </tr>
          </tbody>
        </table>
        <t>New Contact URI schemes are registered via IETF Review (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
      <section anchor="new-registry-for-dns-suberror-codes">
        <name>New Registry for DNS SubError Codes</name>
        <t>This document requests IANA to create a new registry, entitled "SubError Codes"
under "Domain Name System (DNS) Parameters, Extended DNS Error Codes"
registry <xref target="IANA-DNS"/>. The registration request for a new suberror codes <bcp14>MUST</bcp14> include the
following fields:</t>
        <ul spacing="normal">
          <li>
            <t>Number: Is the wire format suberror code (range 0-255).</t>
          </li>
          <li>
            <t>Meaning: Provides a short description of the sub-error.</t>
          </li>
          <li>
            <t>Applicability: Indicates which RFC8914 error codes apply to this sub-error code.</t>
          </li>
          <li>
            <t>Reference: Provides a pointer to an IETF-approved specification that registered
the code and/or an authoritative specification that describes the
meaning of this code.</t>
          </li>
          <li>
            <t>Change Controller: Indicates the person or entity, with contact information if appropriate.</t>
          </li>
        </ul>
        <t>The SubError Code registry is initially be populated with the
following suberror codes:</t>
        <table anchor="reg">
          <name>Initial SubError Code Registry</name>
          <thead>
            <tr>
              <th align="center">Number</th>
              <th align="left">Meaning</th>
              <th align="left">RFC8914 error code applicability</th>
              <th align="left">Reference</th>
              <th align="center">Change Controller</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">0</td>
              <td align="left">Reserved</td>
              <td align="left">Not used</td>
              <td align="left">
                <xref target="policy-reserved"/> of this document</td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">1</td>
              <td align="left">Malware</td>
              <td align="left">"Blocked", "Blocked by Upstream Server", "Filtered"</td>
              <td align="left">Section 5.5 of <xref target="RFC5901"/></td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">2</td>
              <td align="left">Phishing</td>
              <td align="left">"Blocked", "Blocked by Upstream Server", "Filtered"</td>
              <td align="left">Section 5.5 of <xref target="RFC5901"/></td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">3</td>
              <td align="left">Spam</td>
              <td align="left">"Blocked", "Blocked by Upstream Server", "Filtered"</td>
              <td align="left">Page 289 of <xref target="RFC4949"/></td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">4</td>
              <td align="left">Spyware</td>
              <td align="left">"Blocked", "Blocked by Upstream Server", "Filtered"</td>
              <td align="left">Page 291 of <xref target="RFC4949"/></td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">5</td>
              <td align="left">Network operator policy</td>
              <td align="left">"Blocked"</td>
              <td align="left">
                <xref target="policy-network"/> of this document</td>
              <td align="center">IETF</td>
            </tr>
            <tr>
              <td align="center">6</td>
              <td align="left">DNS operator policy</td>
              <td align="left">"Blocked"</td>
              <td align="left">
                <xref target="policy-dns"/> of this document</td>
              <td align="center">IETF</td>
            </tr>
          </tbody>
        </table>
        <t>New SubError Codes are registered via IETF Review (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
      <section anchor="new-extended-dns-error-code">
        <name>New Extended DNS Error Code</name>
        <t>IANA is requested to assign the following Extended DNS Error code from the "Domain Name System (DNS) Parameters, Extended DNS Error Codes"
registry <xref target="IANA-DNS"/>:</t>
        <table anchor="reg-ede">
          <name>New DNS Error Code</name>
          <thead>
            <tr>
              <th align="center">INFO-CODE</th>
              <th align="left">Purose</th>
              <th align="center">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">TBA1</td>
              <td align="left">Blocked by Upstream Server</td>
              <td align="center">RFCXXXX</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8914">
          <front>
            <title>Extended DNS Errors</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="E. Hunt" initials="E." surname="Hunt"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <author fullname="D. Lawrence" initials="D." surname="Lawrence"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document defines an extensible method to return additional information about the cause of DNS errors. Though created primarily to extend SERVFAIL to provide additional information about the cause of DNS and DNSSEC failures, the Extended DNS Errors option defined in this document allows all response types to contain extended error information. Extended DNS Error information does not change the processing of RCODEs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8914"/>
          <seriesInfo name="DOI" value="10.17487/RFC8914"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7493">
          <front>
            <title>The I-JSON Message Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>I-JSON (short for "Internet JSON") is a restricted profile of JSON designed to maximize interoperability and increase confidence that software can process it successfully with predictable results.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7493"/>
          <seriesInfo name="DOI" value="10.17487/RFC7493"/>
        </reference>
        <reference anchor="RFC7159">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="March" year="2014"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7159"/>
          <seriesInfo name="DOI" value="10.17487/RFC7159"/>
        </reference>
        <reference anchor="RFC3966">
          <front>
            <title>The tel URI for Telephone Numbers</title>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <date month="December" year="2004"/>
            <abstract>
              <t>This document specifies the URI (Uniform Resource Identifier) scheme "tel". The "tel" URI describes resources identified by telephone numbers. This document obsoletes RFC 2806. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3966"/>
          <seriesInfo name="DOI" value="10.17487/RFC3966"/>
        </reference>
        <reference anchor="RFC5630">
          <front>
            <title>The Use of the SIPS URI Scheme in the Session Initiation Protocol (SIP)</title>
            <author fullname="F. Audet" initials="F." surname="Audet"/>
            <date month="October" year="2009"/>
            <abstract>
              <t>This document provides clarifications and guidelines concerning the use of the SIPS URI scheme in the Session Initiation Protocol (SIP). It also makes normative changes to SIP. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5630"/>
          <seriesInfo name="DOI" value="10.17487/RFC5630"/>
        </reference>
        <reference anchor="RFC5198">
          <front>
            <title>Unicode Format for Network Interchange</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="M. Padlipsky" initials="M." surname="Padlipsky"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Internet today is in need of a standardized form for the transmission of internationalized "text" information, paralleling the specifications for the use of ASCII that date from the early days of the ARPANET. This document specifies that format, using UTF-8 with normalization and specific line-ending sequences. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5198"/>
          <seriesInfo name="DOI" value="10.17487/RFC5198"/>
        </reference>
        <reference anchor="RFC5646">
          <front>
            <title>Tags for Identifying Languages</title>
            <author fullname="A. Phillips" initials="A." role="editor" surname="Phillips"/>
            <author fullname="M. Davis" initials="M." role="editor" surname="Davis"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the structure, content, construction, and semantics of language tags for use in cases where it is desirable to indicate the language used in an information object. It also describes how to register values for use in language tags and the creation of user-defined extensions for private interchange. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="47"/>
          <seriesInfo name="RFC" value="5646"/>
          <seriesInfo name="DOI" value="10.17487/RFC5646"/>
        </reference>
        <reference anchor="RFC6891">
          <front>
            <title>Extension Mechanisms for DNS (EDNS(0))</title>
            <author fullname="J. Damas" initials="J." surname="Damas"/>
            <author fullname="M. Graff" initials="M." surname="Graff"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Domain Name System's wire protocol includes a number of fixed fields whose range has been or soon will be exhausted and does not allow requestors to advertise their capabilities to responders. This document describes backward-compatible mechanisms for allowing the protocol to grow.</t>
              <t>This document updates the Extension Mechanisms for DNS (EDNS(0)) specification (and obsoletes RFC 2671) based on feedback from deployment experience in several implementations. It also obsoletes RFC 2673 ("Binary Labels in the Domain Name System") and adds considerations on the use of extended labels in the DNS.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="75"/>
          <seriesInfo name="RFC" value="6891"/>
          <seriesInfo name="DOI" value="10.17487/RFC6891"/>
        </reference>
        <reference anchor="RFC8310">
          <front>
            <title>Usage Profiles for DNS over TLS and DNS over DTLS</title>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor"/>
            <author fullname="T. Reddy" initials="T." surname="Reddy"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document discusses usage profiles, based on one or more authentication mechanisms, which can be used for DNS over Transport Layer Security (TLS) or Datagram TLS (DTLS). These profiles can increase the privacy of DNS transactions compared to using only cleartext DNS. This document also specifies new authentication mechanisms -- it describes several ways that a DNS client can use an authentication domain name to authenticate a (D)TLS connection to a DNS server. Additionally, it defines (D)TLS protocol profiles for DNS clients and servers implementing DNS over (D)TLS. This document updates RFC 7858.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8310"/>
          <seriesInfo name="DOI" value="10.17487/RFC8310"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC6068">
          <front>
            <title>The 'mailto' URI Scheme</title>
            <author fullname="M. Duerst" initials="M." surname="Duerst"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <author fullname="J. Zawinski" initials="J." surname="Zawinski"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>This document defines the format of Uniform Resource Identifiers (URIs) to identify resources that are reached using Internet mail. It adds better internationalization and compatibility with Internationalized Resource Identifiers (IRIs; RFC 3987) to the previous syntax of 'mailto' URIs (RFC 2368). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6068"/>
          <seriesInfo name="DOI" value="10.17487/RFC6068"/>
        </reference>
        <reference anchor="RFC5901">
          <front>
            <title>Extensions to the IODEF-Document Class for Reporting Phishing</title>
            <author fullname="P. Cain" initials="P." surname="Cain"/>
            <author fullname="D. Jevans" initials="D." surname="Jevans"/>
            <date month="July" year="2010"/>
            <abstract>
              <t>This document extends the Incident Object Description Exchange Format (IODEF) defined in RFC 5070 to support the reporting of phishing events, which is a particular type of fraud. These extensions are flexible enough to support information gleaned from activities throughout the entire electronic fraud cycle -- from receipt of the phishing lure to the disablement of the collection site. Both simple reporting and complete forensic reporting are possible, as is consolidating multiple incidents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5901"/>
          <seriesInfo name="DOI" value="10.17487/RFC5901"/>
        </reference>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="36"/>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IANA-MediaTypes" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="IANA-DNS" target="https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml#extended-dns-error-codes">
          <front>
            <title>Domain Name System (DNS) Parameters, Extended DNS Error Codes</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RPZ" target="https://dnsrpz.info">
          <front>
            <title>Response Policy Zone</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Impl-1" target="https://datatracker.ietf.org/meeting/116/materials/slides-116-dnsop-dns-errors-implementation-proposal-slides-116-dnsop-update-on-dns-errors-implementation-00">
          <front>
            <title>Use of DNS Errors To improve Browsing User Experience With network based malware protection</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
        <reference anchor="RFC8499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="A. Sullivan" initials="A." surname="Sullivan"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="January" year="2019"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8499"/>
          <seriesInfo name="DOI" value="10.17487/RFC8499"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="I-D.ietf-add-ddr">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Kinnear" initials="E." surname="Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Patrick McManus" initials="P." surname="McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Jensen" initials="T." surname="Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="5" month="August" year="2022"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration.  An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver".  These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known.  These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities.  It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-ddr-10"/>
        </reference>
        <reference anchor="RFC5625">
          <front>
            <title>DNS Proxy Implementation Guidelines</title>
            <author fullname="R. Bellis" initials="R." surname="Bellis"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document provides guidelines for the implementation of DNS proxies, as found in broadband gateways and other similar network devices. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="152"/>
          <seriesInfo name="RFC" value="5625"/>
          <seriesInfo name="DOI" value="10.17487/RFC5625"/>
        </reference>
        <reference anchor="RFC8792">
          <front>
            <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="E. Auerswald" initials="E." surname="Auerswald"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document defines two strategies for handling long lines in width-bounded text content. One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line. The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy. Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8792"/>
          <seriesInfo name="DOI" value="10.17487/RFC8792"/>
        </reference>
        <reference anchor="I-D.ietf-add-resolver-info">
          <front>
            <title>DNS Resolver Information</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <date day="26" month="April" year="2024"/>
            <abstract>
              <t>   This document specifies a method for DNS resolvers to publish
   information about themselves.  DNS clients can use the resolver
   information to identify the capabilities of DNS resolvers.  How DNS
   clients use such an information is beyond the scope of this document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-resolver-info-13"/>
        </reference>
      </references>
    </references>
    <?line 721?>

<section anchor="interoperation-with-rpz-servers">
      <name>Interoperation with RPZ Servers</name>
      <t>This appendix provides a non-normative guidance for operation with an Response Policy Zones (RPZ) server <xref target="RPZ"/> that
indicates filtering with a NXDOMAIN response with the Recursion
Available bit cleared (RA=0). This guidance is provided to ease interoperation with RPZ.</t>
      <t>When a DNS client supports this specification, it includes the
EDE option in its DNS query.</t>
      <t>If the server does not support this specification and is performing
RPZ filtering, the server ignores the EDE option in the DNS query and
replies with NXDOMAIN and RA=0. The DNS client can continue to accept
such responses.</t>
      <t>If the server does support this specification and is performing RPZ
filtering, the server can use the EDE option in the query to identify
an EDE-aware client and respond appropriately (that is, by generating
a response described in <xref target="server-response"/>) as NXDOMAIN and RA=0
are not necessary when generating a response to such a client.</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <ul empty="true">
        <li>
          <t>Note to the RFC Editor: please remove this appendix prior publication.</t>
        </li>
      </ul>
      <t>At IETF#116, Gianpaolo Scalone (Vodafone) and Ralf Weber (Akamai) presented an implementation of this specification. More details can be found at <xref target="Impl-1"/>.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Vittorio Bertola, Wes Hardaker, Ben Schwartz, Erid Orth,
Viktor Dukhovni, Warren Kumari, Paul Wouters, John Levine, Bob
Harold, Mukund Sivaraman, Stephane Bortzmeyer, Gianpaolo Angelo Scalone, and Daniel Migault for the comments.</t>
      <t>Thanks to Ralf Weber and Gianpaolo Scalone for sharing details about their implementation.</t>
      <t>Thanks Di Ma and Matt Brown for the DNS directorate reviews, and Joseph Salowey for the Security directorate review.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA81963bbyLXm/3qKGnqtsZiQtGRbbltzko5syWkl1mUkOUkn
kzUHJIskWiDAA4CS1bbPs8yzzJPN/vbeVSiAlNudTmbG6+S0CKJu+34tDodD
U6d15g5s76ou15N6XbqpPS7LorRHSZ3YGf3xNs1qh+dHZ1c9k4zHpbttD6Av
ZFDPTJLazYvy/sBW9dSsV1P6XB3Yl6/2nhszLSZ5sqTVpmUyq4epq2fDaV4V
q2EVJsODocNkwwxja1Otx8u0qtIir+9XNPjk+PqtydfLsSsPDOY/MJMir1xe
rWklmsgZ2t8zk5QuoX2e5LT73NU9c1eUN/OyWK/oKbZ8vnJlUtO8lf0zfZXm
c/t7fN0zN+6eXp4eGDu0b9ZVXSxdad0Hej91+cTh8UlOsFnS4adukmJzeFiX
SV6taOF8co/PLi/TyYJemjk3HSeTG2NuXb6mHVvrd8IA6NEDOV2vsxVrl0ma
+fd+B5iNinKOL5JysqAvFnW9qg6ePMF7eJTeupF/7QkePBmXxV3lnvAMTzBy
ntaL9ZjGMgru5oKFJ1+FFowXzERrt+YZyfSjtPi6Gb/urdGiXmY9Y6o6yaf/
M8mKnKB17yqzSg/s3+piMrBVUdalm1X01/1S/6gJA/XATorl0uU1PSEiXCar
FYH478Yk63pRlMAzncra2TrLhEKPktz+md7hxwTIJE9/ZFo5sG9SmvODvbqv
arekCU/yyYhf86whL/CjSbHOa3DD+zytiQ6uakDOFjN7SCSVThJ+y3kUJ/kd
rfm7OT6PaMu9zY1dp+V6mWSuuktKe+mm0/stWzwrblKZepLWtPrrJJ8TxErH
z0o357f+mJQ5MflN0t7qST5N2/u6KfJpnZZf3NeZSzP7pihutmyHGC0f/mWy
oF24rWD5I516Wixbi+aO1ypufpcXdFZHf4/WN1tWPi0WCRjxdbGeJNMkLbft
oAxrE0U4R7R76fKcqEe2M6V5nu3v7u62t/eWhk1ca1tLWW009qv9ruC5BSzG
5CQVaNFb4nGTsozQT9aeHJ4dDk8dQfeaWL064HmtCmB+bvkLeR5IU/4N/R/d
o/UwbU/nSso5zubZ8u7ubpQmeSKigGToPGcueLLEasO6WY3lqJ0lWeWM3yrJ
yPYejwoCQm7PCABK/naHXurbi6SkZyRniR2OP9Qun8Zagchi+n/lVJAVq7CV
zsfRBwiQR063F+mZSbO9DhguL/7ahsClq1bQNfaiyNLJvf0rSaHtm6Tpy9WP
I5DAdggvV9lwrz177z3NTLIhQK6y14VNl6uyuHX2NaQ4NAO9VRKYvTYiOVUv
LGk46Dc7TiqCPUkI8IylkbWbAKQPwJJ2lZDWmty4slEaS2IQWujJ3t4L0ioE
vJR2/aTKUoLTkB6qlA4QrIa0x8wBCYy+IS27KqokG26MEYtgSO88PFq5UCH2
bHe4+2z4dPfpM2OGwyFJ2Qobro0BmGZsnAAqaWXvaLHsnjTyKivuoXWJ9m6T
Mi3WFQm9pCLMDWyaT7L1FKLdg6xyk3VJcnJkvyvu3K0rBzqtEnGpSK9I701u
bKOcbGBwUv9YjCjLrgk7la0LuyYyK1lb2XrhdAO8J3wMGx+Z4w9pBXjbpYOM
TKsljwfW6UCwOzKi9pqsKjpaTWKIv27WmiT0X7tIyqWhnZI5kmQEhXTG64yz
gpDbPghghX18d319wU+LdTlx1ciY6wV9RRpyDWxYNd/s5ds3bMHZ8b0FtyUZ
djvJUrxUrVcr0rs8oQcNvsbix3+5vjwcXtN/6LwumxJxG36+KSOiA/tDErTw
cgvNI3u1niyMf2VCanpMZJ6UoHraHgboxgD4aVoR8IgWBjYr5nP8l9ZaV0Ic
pqDXS7tal0StfH4Q2DKdTjPi0UekCeuymK6Zf2Jyqyx4q0VmCROaq+/Bv4HW
3Gg+GgBTqyLNyZJVQhtYthHrJGsONuD9NuRcuv9Yp6UcKkvujAOpTZhLRqRs
mXKHwux+WrJ/srXYsxUBySaEZZrijsihwuwG51nDVrUXZKjQTPhT7Ri7c3JB
krwEA62JSoJAIWabzdIJKTPQFg+pWSgJy1qIIZaw3d2sICJTx0vbgm1tZ+g0
zRlbzDUicBMYF2Rr+7UHdoPFPeqAaFNBESmwcdpkDDmJ5ZLpNMVWmRPwegA4
uQqE1AyriV9grlx5m5IYvRDyKwGKq4uqD4OcLDTMwExkkwkxCfNehU1ib1PW
iMQya4fniVG0MWQIRoWSJZEpFA/ZW5kF3Ak8O0IchFsb4dYkczgPfUsStwBs
1ctYVwowhTKOgTUiMWLeszRQ/VHJqWi7i6T2E0WwXCb3JC+rBbZduokjG8Uu
YSHG4iaSbwDuulbCiubh4UR4t6xsxhlI6Q4KqRFyxFWMA/chAdVgCLZPMpxf
SqbLlIQe0VktcoBAXtxl9IQWaoDMBzF3hGZojdyRUM/uG0EtQ7fL3ATor9PJ
mvwjo7PdMXfI4JGoUIZUdGRiSZawLGUmi4KQabBGBRoT0REIlegb6xBprcc4
YkpCt24AgWN0z2k83MJ5YmlA4opHtvbjanI1zFtVIW3miJQHqdxJmY5ZQdmP
H53qlyGZAos8/Y+1qz5/HvgpDChFD1k6Et5CqiyeWT+zeVzZ16JIBiEeAFGK
vZBUtYd5dUdzTN0szf2yVyotnoMk/wvpEKiQz58jLUs7IFiK+VXkhE2mPUV1
dLRiQiKFZSFRIOtgkf9BmTKWCKJk1M5zQtM2kEK8nxVE9zV9tncLcszZ5RaB
3ShG4j8WVVO7M5PDnVxAntA71Y6r+gNz9pej89PDkzPQnFuuarA3jk/4IaEq
SE+2QrE/CNs1d4uCyCUlpYSTeXwScojvFkScWVqTUWiB1Inr0Dbv3qggCSyA
OXj8gKTonXAmq+aEdBoNvAE1RXzJCLxbiNLsTpbSsBqsOLJto8ATV4VpPc2Z
SH2ziBAEEcjPc4YwlhCWGRN8Z2ld+afki5dFwkMiqq1ba6Zi8WQpcRChhsfl
DkcuTI9QV8x6KqNXJD+3GzdyDPo/WislRJGmSuHcibVQNRpNjBe86Hd2V6zJ
diE7IxmL+FKzguT90tH58zl5o4rmJZEJ7UHUuQwkWeF3C8GXOwi+QkWpafat
WwzL1gui3+S2SKdVfGICDyEzywj+NJQUSlkUtZk4knCkpwEecbKATjahwBAn
18MlSfU5B6xYMWxYezFiReYwHMmvXa2h3mFkMQDgMyglmS0WHrF+zO0njR3Z
yISnbZmgBF0l91VX6GGhjUWAyFy5C3tcrOlwHAVcEz9i1A6ATnAolszK2Duh
qb956IL2hXdJB3KIaNoRqxA5StkV41spntcdOxYmcdiPCdWLsSKwOynFxX2w
GwzYlE2j0jVayBgYnW+KXE0zsZyOIFPZmKmweWdvHGnuoiSi6J2+v7ruDeS/
9uyc/748/u/vTy6Pj/D31XeH796FP4y+cfXd+ft3R81fzcg356enx2dHMpie
2tYj0zs9/L4nlN07v7g+OT87fNfb5FYcio4+doykckVahVCQVKbF4a/fXPzv
/0U+hVDL0729V0QHSjp73whRuFxWY+UgHwmg94ZYxCUlZgEfTJJVSgxB9jaJ
zYpEX25J0DiC56/+Bsj8/cD+23iy2nv+W32AA7ceepi1HjLMNp9sDBYgbnm0
ZZkAzdbzDqTb+z38vvXZwz16+G/fkj/m7HDv5be/NRs+HPxWwgKbBUE7g8av
6WGaF2Ro3BPcvwXcn78iJBDcepcOVgLZKT1ijJk6tKDlChKe1XNFvAJRUcqr
I6If1qKkpHqmGUSK0IsjDoQNwGlr4sZb5w3HEopUlAP2BYFDyptsYV5HdPOU
J+OVwAnY43E+Ke9XtSYmbLwkWRLhy2qyILGusveWeAdrqJSuBiYyTNndGJIL
UQ5FeXiovHwOeyl8ef3Of/XNy/2X+Ir0aPiWKOmNfv3q6f4uwxNsGzDSgs0W
T3jn+Oi4rwY/9KS6pwMWU/TAnJy9PR++OT86Br2TZW+vWSw/25S9vZZ5Bg5W
K85zsbflesK0UDjsYbHtMGOjqjOJ3XnejyayO3v7/e5s9PCbfm8EaYZjvQ3C
9DoYoDyAwJKW9h1p9VrzMB8fbTNWxfduwjDq9QdbBWEJgiLbzeJVJXZczOkw
O+xGwYlzU9MTe67XD1MNbLDlWHsPuibdyB7SBAPrjQRdOfXJn46hCruNjdXW
pmguswXPMAjbFnOMumNYAGIikdtBDvaiIB5YJHBwp7cJuU9zhSIZI9ET3hGH
J9Jqsq7Y/3TkTx0YswcDw22LBM0F5d6CI8MC3het3pi+OrXhSIanXrDJzlXf
qguRZDBCNPbj41PqOLZDYGL1MGyCUy1vMIvDShE3Tb1kjWf2yVNbwNHKjV/a
5SD+8D5SAjjU2HsrYji1A31qAhmdPGT4LshxT3HSY3LiV8ysO28uiBkJWz6S
0icoEUYAgySyOdkoc8nUW7XYnglQnpXFUkJT6rYrpMlyKSqFWFLrGchkmnng
ml9wPNG+E7cikeG35AHMhCPeXucckGH8aryNq+4+uluIAVFJ7IJpYsrzMbKu
OMBDdotIFXU1t699BYzn3lvRgNzO6cn1aR/z+80QLfnYWgV+U9eNySqyjW1k
GxuODuUgO1IzpCnw8g6/S5gl3z2dPFmV6S3MaBhaqyQthW0esLXZFGV7XDak
pM+bglmbua04Mooj6Fi2uCfF6t4TT7SBkT1qwqlQPGR9TqsF+XIDRiqC7UkU
/u/SwLKY0k6dmNXxvpUCfdDURwEAnh1iNIR5KziBooc6u2oIejtURshw2F/F
nn7s2DDM3GwGZ4DkGQw7SKWr4zf4KsRV5yncaeYM+VbSAkj0l847CrWb83kZ
r2RowHSepBKHbWmNARj3Vv07lXkwxa2kRL1u4ZONnRdNMCH8aa6Via68vLtL
yfoUkdySYqItHleR+LQ+JAWGZy6WNYLAkxSyOqmR+8NrkMpBfUMqBlTCiOEv
yNOAd+e9DFqScCqevC6oqZRIfIiGUNlM/suSzSQIdD6EPy35IbN0LsT3EDe1
OTDVJBq7XvY2ZaukWHkvrgIp0CSCX87YkZ65ca2QL1lkPEeFeBtM+qslTPxz
hKDdk+/wpvxtd67Ovzvvs8bmd54gg7qWHLI9FseDhDm9d3rcZ9mj4aaEiQEg
0wAvgZeQmNJEqSo5SZUt3PY8kI10oCcFBiqjRGMDzRyxg38yizMUHM8GfIWq
dghkNOOdG1up2IBhrGlTjTcSC2WAPIG0L0xFm1pnAD5kaYya2yRLp5KaErZh
o0PiXuAsuL0tSlPiJXwOt+ptmWa2LfjoaSYCu8cnkZ4QREW+uSc+ApNqQwRD
mpiEHpasFx+s0JTOyTX5MMkSyD4txhCqRyLfTvk9UdWnR6d9JXeZjqzBKB+W
a4AsrR2Xg9CRXzN1f1+sS3tOXqPMKVPsvP7+/IgsmwkpmzItJDuhWYVBR/S1
4E4mIp1XJhm7tnI4Ka793jhMCAAnQVQ3R6mJ9j1MD/PGlArRipu8uLM+dKdg
ZGkBj0DEHFzufKrsxAVSJGnyOrsfcOy/dORC00sEmbq8F40sQSfnpQVCHxzM
zDWFXa1FQti35Zrj2F79hw1i5orGTBbe98s461ErVENSCWRQzNgRIjJsh1yS
OXIqdUhiI3XFo1dE8Au28lcFzChBLBQ5Ce2UOWlMfNIowWYkdNeEtOnbdQlG
QqZj0EKbpKIRyqGThxwuMerkxrNyWazniy2DBspVKZtSSZwCQ6KacEsWhIJw
SwyT04cRkv2y21aMWBnhjrwNeaKgtdL6ZoRwc5pC8m1VrRRItkYBGMLhWXjN
7c259sk8VOV4qpEmpeMwX9IA4HadwSQjjsUnxjo2OvYH+UCqgCuAkCOzMPCg
kpLJjTf0N85E70Y2hxB3jJEPKzLUqybOzj4ZgXSHqaq/CaOgI3N39wC4iBWf
fr3vFFzK8CIwihy98YIzK4qb9YolLgdh2JAkxyhJMzJtRg/ZTZ79uZJRWFMM
I5ZOXlQ1okW+bNPJhggxScs6EPEFycXyQKTIT0iM4LrwFMbLDc0XboqMLt0i
o0boANHE0qwy26QSlvg5AiDwvjHPBIlfSm/xiBDHaLxz82A+y8cExKHxpOxT
sC6ubDBNWnpLapVFOZdy0PwygxQ+GvOcN149sHXVsNUa8jQyzZu4immCASzX
iY3IZNjZ64u9/5TMqLHugJFCPiksmRapgE/cByRt1Y3PxWBKWEar5yIvqAUa
fHwMbVvI3tN9G0ffWlBjMdFJuyc+eSs5cPW2vE/tS49D8UPvVBRIT1FQO8k4
m+CfMaxIzZDHgFxhVcxqDBjY3oWqGh3LGrWBD8YZPJRKmGCbb7OnRJ5xdrCe
jOxhQ/Y+g+XBG7LioQBmpsbPE1QbE/2JEQSuSGBjJUz6SDXUHGw7Gf7h6vys
kzF5yxmTj4/AN0OYQxpOEzhHASOeK03ykLYm5LL5NFOLk4mF3R0tGGBPOs2n
/nueKq7A4TiA1AdVWyeU+OXHjzJgqN4QMRVCZ3GiaTMHFIfLEO4tpqFMgoGm
5R2WQbIjoOkbDfz6BJdM8s3zV884Tvtbe1bUaqTGX7FdFYhOv9nbf4XYLxgn
fsLvkqzMkokIA40iP91/pbHgdtINEkac2VmBwgccgPcMhFUHxkwO7I5SRt8c
sAT7GYQiGWASjsNJhlpJAt60XTk32nQ6U06H0kBQA1v8cYaLXW2gFqkuAopd
5004z2ZuTryAtNum1zmHZlFBqyUzd2XBtWSyN6GLER8T6tVn+6KaO9T5EOWU
ZcI+vgfF+8sT0vqC/8e1yx4rUp69evGCkEJneFylq8o/3n/xbFce28eo7K2L
zgBJG5DiOqzpSAnCobmLV7OcSWILHwWFHCZAGfRd6yWdRq0eeBBiLjC6Ds8O
uRi7gj5tsC+BDTkyR8U5OMwluW9kahBSF0Rk2Ey5aof28QORzA+kbwNEQTiP
31+/Hb58PPS8ooDYe/WSjluTZiG7yLZGqbNHk0f1Mxu043QP1cKnyWs2BDVt
R/jSsoyaq8gaKsPs5NiRGTab4Txk8bGT280Ah1CVioLeD70QCI3y76wPcySo
lEzmSTkGr0OMmJ1Q96kBfvKPSdZwPFGsPqZm0hzqaxLqL1mlY0hrKsnqq9wL
8ZRId2FfaSVRBcCIhYpwjJeQ/kymDXCpcMNpOPVeFlU1bBx5X1rS5MpkwS8T
Q0XEUK3HbDF4AeI/SxJiC5q7/n13AQnrJPBSC5o/Lt7eRmucoB/OULAM+5Gx
56tCoqFxPoWzK5t74gKXL+4no/1kST5fE8L8eXtZz7+raBOR699r1RWy+A1b
B7VxdqvQKYgweE4mIDlF2AnLBKJCLrYTNud2GV2lTshYuCcW/uAVYbdY6ulo
z5uX+y+ev9jG6P6orHmitDFbSCnPxwStMEXZEwmlRqV4gzVKPW1Ko1RLX/3+
WPqg8L9Ccgo1uDoZTsyVF5wxAsPT9kmQuXKISJs9vHpzcoIqJviK3CAwTUlB
VJIyXNyvyM0bkguEZB3H3lL66n2eMmE2w+z7X+/uvtgLPvHu7jeHA374bDc8
5I+veGaDv58e9X0CT2J/zZYBgBfP4gVQvrwgladB8BThOdMC78KJDK/kRbZe
iEHTceY0xwspGkspTzcN3FVZSG4mTwSTptmGCFSex0d+WYOSICKMe0IaoByR
TCQfHtsoL4TnRNITQQmyvNC5xmG2hAQgWgawXdgGQHCcD7dV+qNEJpoqOCYc
LWhon9740x/oo0jfV2i5yiewUmOgiNANjEYwMi0YCVXgIMwaYrtJXSbCLN6p
XCWIoNEkKHwwY1I3NxWKce4cwYQHOanlqvqKGX7I9mS7ZDwq5oqqdeJqcSkS
v8NJfGoctkpVt6OlkS5T+1lKQQkyBVIORlK1rAi9kg/e3raA6m8R+QvhM1Rn
pfNcK7JQx+AnCaI8VKnhTMzbHNI4PjpWP1GhXvm4VRRn0Jo9XgLm1noMKbPk
2LjsMq19SbpYt6yxOLdtO5qElahflU08qbWM98pxbJpJM7CNpxbeYKlD4ggG
NR9MqrtAnaVzzan67PlckHdXTIqs6emkp4/sG/FDft/kBbWwhfyhjsthDAec
WinEpiAzDtoLB4v+wDY0w7HzYHVb31P/+cW1XVVuPS2Gl5dqf72gd2B/FcbB
Da2706ZNE4SPJ3FNHQsxKUU2UhM0fHd89vvr77D2U4l/NYUiaqE5Ljzs7fbM
zjnbEFyJ0BeuAybZMuq6WiNNS0nrR6NBTdffAwGVvgaB8S32UCjhSSXxWk65
phVsYsQY4ox62zkcMQavZIYWBjWq9vGRTD/0cPE49PDS1X3PBiRhK37HEQXB
r9LhIdj4kP5xOWA5Fez3BxsosKeH34udjyPlnTJgHwHk5NQOyYDKkK2HWFXf
RwybCpSkUrhNI2mu6dhO1kFbemTLurrW/bZJqz0Lb1bz7Qh8++rphzzrpF1B
boJ7TkYrQjGEBfZkrzSCgOnRBS3crgtVnLe7vn7nZT7im1E2zTQpVwX+U4Tt
QCZ9TIM8dxZcyBDbkbqF1VoCW77BnCwSVkC0XCXtAyyJSFwhfjRNVnUIyUzv
SdGkEyvdqLwtXaNJQPiW7mrAsUypjEeaDW8T/yMA5qZeNEh/DKOKc4vIZxOQ
fdErQisgATsrJQMzMBFUiFlhwBT2xa4/PsOzCSdrjek4ycA0A9HaEnVi5GZF
MpVCAyNhO86PS24ZcTrOws4y9yHVKDwg4+FmzGuV757CfVcX87owDaSR7/La
2YzV9Fm1eT0RvxxkBgFLcpt5kZNZyGFlUKyvzjbKbpEMfTFSU/jbICT7XjYO
JeYY8TihyICmoTjqprGjxetjVEOg9AXh9FWZsu+mLpnP2Jto+yT2TmYPniek
E0EDD8axBrEYZFMZtZ7KImwBtSv0tgV4A2gbSWtAklzQHyq/ACra6+NKWLwq
kCyrWVD7ySQWxAUvzHGmKf8jFewrA8lkRu6f3ltrfw/H4nSjJmyUazOkhpEw
oiCK+gLZfG02TvCB0cQNq9oFOC2TO1yK8HUNK6NYo18ESRTrg00xhf4DiVau
6iasHqjCt2pE+pZDwklUcDjVTpUoQMNFTDCnNT7DnbahVavoilXDYvXAmF9Z
LzLFJJoW+eOmgXJLfHSZzhdcwmu1oJzIg/zJBwT3yIay3cpb7CB1V2b3Kk9p
MCdIJGgMwxy8y8ZxbKZvznzdFOehqZbkpFYVcbVEHYJAqpUqKT/gmbnqIS/q
gdYS+Em8r8wRG51EOSVkHr4AG2yc5lnZBt2GC3nq0Fmi6Gk5uphHRIyEbhGY
87V72uNlWSwghhUDIvB4VKUJlApkvFmgrmUIkBdSVBXVI7OQJWzkLguQ0dN3
YIOkTVJ+OQwettC2TjBcSl8jG2WLaCFOtIH1YX+8X+F+hGSplBoLBhgzUcFw
DIiBDU6SHmVby4aex8mm6eguZSNU0RViVnGsojdRL/oHKVHmm2CYBWkhzkXE
0byHoOSrFGoys2R2rlXa2BBL5EmvS8soKG+CudougkCJdErlGubpxmhDNGUA
78mTxsaiSax3ka0O5Y1M++uc5bhPY4LcZyiAiXTlPi3uPY5ne7vQlFDyR8X1
oKvXpWpM4D6DhQYBLHLc2IhK45oSX6jiq+uSUOMbaeAQ0LTejJWoqq/4KDrr
TTJ0cLDQoVnEAwmlM+6DmGcdtvFV+yP7GkLMV0fzxDxv0wOJ63GmELXoZ06X
K8Tjt2aFPdq34wCA/SIWFM6hvC+U30VevUCIpmpy6ypApyHtGsGbC1z12Bv4
YxuCNMA8L0rn6XUA9hh0opQ8tZqSkkDFy5V+DfigsYYJASHWkEQKXibI87x1
eJAuBBrntE6GR3xjxJD8k+F0WkIKiOXLUUD2P5vyR+Y3jWQ/cKyvORSo60vH
+qpDfYnn5L6gLzLb17JaCJe0xH+DaEWBVkgg5h9zGK20QULsY0xDjQ4rsyX5
hnN2NKDYac4VolOQiyQcqymp/5WEaabNvqa0LTnMjjrqiBDmleoDYWWM0tIs
7SWH/xmfZRBvuHu0VBR4cotbqQi0/Z/gtA7kZRsxi23STIcItrUiimBuBU9i
hbmF+iDrhYAiLSQRyHrDLuHJtFCJtnmXcHW7Kv+qbVkyd4i+K3mOHQ6AF3dw
dxVvFtdaafq30wPZOWGoL0jLppoUYG9dpYJaW+j8vNYs9P6Lp/vclNl6TVxO
sX5kM9ifHihkRNqt6BJLvG+P1BIwOHrujqaJ7GpxszhyubXHs+H6ynP9D7iz
RoWZz8bom7yfYvwDkVtAaFQbqxGoje5q3/0Ao0/qtlVLreQ6HzoB5FspTW5N
uje+58WHKzwbSQuir8PgXiNfGkwslDWTcMmJVCLrLQoIFwzCQsCSJ1k2e2o6
AEk7F7qOmEK5TzQuVGC7WZhHbtr4gr6qJLjT7TliSabpWoIiA4JY7r9h7tIx
m46dy02uXctT9s9EhCyTqefR70bcwYp009V6PIwuf4q6WDvdcNsLIBC4ZmMq
srOaKTnwK/4geX/SZ/LxkeAQ0UB+8hn1s7+yZ3JRoN2Vj6eSLz4IA7X6oaLJ
I7tYcnu+V1Tr72sWYd60Z6MOkCGgaBZ6JGscCiFKuEWzdzyrZshzxNwxJ/IJ
OuYS3XZwjuX94ZHCR759I9bQG7m7JMN5+BZEBoFeBqOhbzqB3k0VIKImWAcg
+x2APDDNSAtOOGfVpE4TXxkuDBXfpqEhXg0eJJ63ottQOO3rl1Et17YWd8SS
aD9Mpd004z5Srpz07X5prRWK2rKY2Hc88pDEUTiY3BCCtYJNqmUzVxeE3kxS
ZLo95HT62/Gp/tAvxltzBeUWnE3zqoOvFx18bRn+S3GlmJo6qUp9GFmxSeKv
VZimMwZF3VQg9h6gqZ7s8U4UJ5kx5RS3C9T3XlNLV7Be9/PzsPCz0PDoodvq
7PXrwz07tNs8Y7wp3rGIssgJ2vHdp5zM8wYB15isc395hIaVOi2PJo7yNV12
RWiR45ZMf89Q7hPIWee+pXvTvnVoHe+6hbJG2pmm6iTNW+05woWJZ5hhqMRp
nc+wfJNuIUmQSl6qufIooDSq76iawkst60Ty21+5NBDqCInRLcaVjVuQW0lI
T39bDj8IrVNaoiefyZvcGgVpcN2zO6CJPsntGexE3ZH3hDFbSCE3puVIaIwL
XCtj0MuhlyDhngI/mI1M7b+r7WMChL41IsA/tu2iGIlN9g57rRwVa+DHflhR
zh+DeuLKKYRV+dvhD1WRc/DqP/HPfEQIaNI7sH/jOvhe7bKDXz/bfznc398f
7j199nz/xTc96SPpoYTuYFyMf0f/Wy2K3IWdyq2g9u94kSw33JQZ7iCU7B52
+PSZnSb3FU9Hht6B3eO/CrwfnTlqGdfbuTB3L8Nr9Y9LGv7Zb/7APorPJVcp
/qbHBuKlL8neVhGLePkm8/toco+k70kXaENfmICELawuLphX0y31d08wNXVK
GPLC3C1SEseoXEAnP/F0kt9w/ULVlyH//u///vh/PKb/z0/tXSm31GrUkWtI
v3n1NEbcwYEmo4dkOU1fvMzcrN61oye65+qJ38WIUf4AyMKpPOxO/ecYGEjF
qqB5ozHb0LPvRdBn5AT1pUn7pVaR04tOBX2wOeHRGm8aDhAGcitRXvM1XBHf
GSRlnlIDINDna8NqrYpbaTWAaULDohplFu6ay5IPjTvB10t1E9Da1SJhSeJe
9Xt97DlcGFN5g4ETDPmDTnEkHYwXRtIg3CpllkY51ds4YqcwlxRJvAAn35i/
ONTchNWkxge4XaKoR2Ng2KJ03frOYalPb922qOFpdk30fqQQu6la8ZRurtg+
lCs+9F6qpDQajzFU33zJJdRAkImiWxyL0BJTzYs3QZagb2Cfoy8CFxGSNdBk
jgdty4cv5mm5gqrK5f43VW4y0kSVVgBk+1vLl0GO1yTAhqjE04sUSu5ErGED
+Hvfyqqvqpg7NQSwvlWKc1VNZ8Lm0YxvKuKLP7udFFGDDZzHYFdovXgDXA2V
RFfygYK1ZcEwZHBFnVRp8PV+2Jr0LscmTcIOrW/rYHdcJ+ENLNMqQ4ZF0BQa
3YxvwvK6AkV4q/s7vUEoNPb43UvLfGPwVCgJx6AH5rfSo2GQfOSSSaRSRqbd
hSulCxLXie/2om2pO/7lUIxmGNLa++lSO8b6rql8roze4xJCxbo8BjEVx5zQ
ELBvF+dMm6+db2zEgRo+woSrqGq7qZEKreChuGrb200MtdMIPNKyGt2fN1pm
pYPeQZ0rgvgEqqjiUW+F0C7mkPhecso61+g4X9SndXqwZwvN2DFV7XAPJEcO
oQ9vQgd95YyKAH8fGufb8lD2je0MtOfYfnd9+m70UM8E6F9xhiiG4T2EdXXZ
Vm8fB7ByyaQkWkrhe0U5vkES0jultwWoleNBuoNIAprtEnBjk/7iq59ILkAx
+JzCiO3MwH4icNMcsTIUasuVEPehmGIzbipZcaOa9MM9GKxthGtFJiSA7/6i
mbQuOLHxSNMeyaZ3E1lE5bxudDjx7tk0ihui9qwwvgFL4mb+cBvX8rSdEB8b
xmTcsIVuU5TYcctgeDPuhQI6axLApC8vj69QPme6mQ7PmUMIBalKkNLpDasI
Tz93+33U20Mx5rqUgaGKoKNK2xEx4l3NW1dRo5JwKu5nPp6m5GAf2IuMW3K8
d0Nf/YX+NTeR4l358QwrV6f7fpTWDW7gYrg7vWaghMTCGPKSsHuJwjWX15PN
OFfVKKG+rYfnc7N4lugeS6deFMB9AsP011t/fsLy3fVydafXY7y+4cvze00N
u+Zjmxv3Efm+lksTmk0qjFn9isE45etFOgX6Uqv57OXnzwfe/sZ1HdiF/AxB
tHvu3L9aj+vm2wfPw+9e+suem+vqD+zZk0P+8tzX+2/78hhxca66aZHfQSfO
2+pdVZqQCwYeMNgP6AsXhu3tbozj/jqOC6nF0h3vd3iBS3UqVHy1rOsDPx2/
dNgATy1fMVm4w8ej++ALx3hbJnO5KpRlJOGtfHBHh1u7cKMds7Vg/6v85kNI
YUY2EuT+TG4SaE+BsJJeuWBTV83D77UEmOXSppjM6TjoLTg/UwqQED4DoMj9
Gzl+X4D3LL+bwFiRv6vHOIhezaWiQWCh4a5JK9x19Xs5G1RZJYePueBbSxJF
6RoczUH8y6Y3TdNh3AGisk3bQX6SyeOcUFQSwaoMwr4XKaBmkZ7h+25t7xf9
6ARuImxLA3pBxIBrSwEfHZXL3PO4Y8Yu11Wo+2Yx0YhlMUVIJISdHxjCksqO
KoR3vG8YcjpehfroSJzY4oIfMvmzotoIXkT1WM3eZD/qKONHEDilwnKrafvl
kl3p02jMP+z2xFe0J76PIzIPQwLdX8wWwELTnYaSnZ3vn5x925fZfOT5LvTz
IXIfTh63p/HNj03r1lVLQtBkF+HmVUmfubIJm2rIt6E8uZayBfqwqraBNP1N
ldpruEBgVazWGXvrzc3lAcNSWUQY/tRQp/1k367JkIkfHEVA2/rvk23A9cna
1lntJ/PpYOj/HUR/y7+NB5v/4le2vX5AS9gJraxC7NM/o5O4c3PLJ/s9/a9F
dJGkxiHtD/RCu+fxk+VmwZ/bl5o82K34Nduo6IXgDn2SaN7P64mkUWc/tUpB
L7T6G7tn/Sf3RX7NnjJ6ITQkCl2ebO+J1I1sNkBuTSJLuyJ2UHx5C4g/Eh8O
tbSCY46PT4QZYy3jtc/jzxsdjPA5oswwasuheWnIbUpvRtU6z0cvQ7Bx7ylt
sD/yWdOOfnsTdW1fSaGf6jlf0PfLNd3mGv8f6Lk3G+3q/s6cn1B5vxJ91yqN
FL0QpSkjCf6gcpHBPC7K5G2X/aREgeohV/Hfdq1KYRStKdBS1GZ7vMK2ZGCL
/iVYxDfBsrctfYfbakE4CNl0E6iO2QLP7WoHXYgbmicCtN4dwKqHycKrEYFt
S7UEuOnnjVP+lIbZ1Brb3mElgiSQX/fq5MK+Qags3kzrioVP/JDZs3mFZqld
FgZcu8xxOkmz3dEseh3DQ7PI3Q1ejOmVH2y2t/byYvfFywdnCRJJUdxIoy38
2hJLLJc28f2LBdQ2+cSpyPU4/kW1XyyP2vP9vxdFLRWsjdo/LYS0QOJE2Pcu
LcP1Lm2VvsM/1Gd3h0/39/v/gJTyJUI8tFOOEFu9aO3QfE7rnqZWmqtTcfTP
E34N2an88yHgJ3LPXOs29u3S0/8OhFRPanFTuOkgbPdfLklb5PmPCtEWSYks
FRnTCNJPW9Dl4zka3Ygl7Cf7RfEayc1/ltm+y+tLwRoMrFpa0SHdulVvnwOe
glz4JLIHE+2xFyK5lk82ug3+J3pAmraPTyEIsz/ab26c33+1u8cCNiz1lD74
W7T+1Ws9w6srmuUfXecC9u7Tl69kEeTan796/qq9yHNe5P4XwU7WebXXHGZz
nX3Y0L5CzRdOaVYyWjfGvq/w+zLyX8BLJWH9lZOiBO1LE6rW7FrwbabtGvFt
jfNP0pMPqCJjWBFyvNdHL/T2hnk3vP7Q/fxNLdu/QimyOGq69Ik+1iWyQg//
a8mhn7ToHpY1LFa4yE2nfZiGm5XVhbORE+egmYUAgIn2sYF0WsvKL18/imLG
zW1Glxd/9V2Ras/gx11IjXyIfnaH+4bDL+tyjItvEJhx+Kg1H2m4bT/SWtkd
Win8UsHHj/SJq3hw40xQWo1zL3NtucuzSaTIz5gUuTn0PQ52jCQwKjBQlXZ5
+Jtdn+EPO46Lsvz1ael2sPi8a6tX5Qu36XEKOr6dwrSvkfD3H+gNSj4L/jNb
LtPKt7qi4RLYi360LppPitU3bsmIrrPQ1ul8avg+Eb0SuQE5VgMMR912Df45
PulQdv7e8hV+J57srubnJLce8OccDjgw2w8X11RsHk7vBSh8LuLeaJO0JEuj
nyf1paCR6UMmTXPhTes3DUzSUGGn5qZ7EcbnPkI0G5A0WF5+jQyZ0aTU3HLr
0pO4Zd73KTS1jO3GEf4983X1pXzkyucjl8WtZnQiBsel6/KrC/7Oj8OaNcCj
vb0XA/v7NMlXSZEV5H3xL77bnT8V02RGf8nVpZdJNrN/djDndg5vEpLQ4fc5
nNxO2d6v12btm0bsaXMrRvPrMsUamEHnjPxWMwfQAYPDCW7sJAdKbuuuSBhK
RtVNf9PjH3jucawo0fKBP6U1gSIt7GtX1kWWDGjHlf0uKacJ3wv6mlBA3iUR
R/0jqZAyndrzsl4MzJ/SG6jpo/XNorjNUxqXoE7N/nG9TEr6eJGsM/vnYi26
5w/FIrfvSHHmjuYsxoZWKFCZcrq+wVGu0ltoqoQExVVN7nZC4HxNzPDj0t1j
Gw2wD8m2bWAu3ThHZCqTx36azhNchOGrRqQGrpZfk/MHjrCCoZtY5N8KXiR6
2YaAPVyCm5YdrDVzH6VkvfKcp0ld8y9iNwUs/FOh3JJT4OYq1P6QDaFXSv2B
1OpqYa8SXE12H8aE7OfmQEb2/wFiYKBDIoMAAA==

-->

</rfc>
