<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-benecke-cfbl-address-header-08" category="exp" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CFBL Address Header">Complaint Feedback Loop Address Header</title>

    <author initials="J." surname="Benecke" fullname="Jan-Philipp Benecke">
      <organization>CleverReach GmbH &amp; Co. KG</organization>
      <address>
        <postal>
          <street>Schafjueckenweg 2</street>
          <city>Rastede</city>
          <code>26180</code>
          <country>Germany</country>
        </postal>
        <phone>+49 4402 97390-16</phone>
        <email>jpb@cleverreach.com</email>
      </address>
    </author>

    <date year="2022" month="November" day="14"/>

    <area>art</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes a method that allows an email sender to specify a complaint feedback loop (FBL) address as an email header.
Also, it defines the rules for processing and forwarding such a complaint.
The motivation for this arises out of the absence of a standardized and automated way to provide mailbox providers with an address for a complaint feedback loop.
Currently, providing and maintaining such an address is a manual and time-consuming process for email senders and providers.</t>

<t>It is unclear, at the time of publication, whether the function provided by this document has widespread demand, and whether the
mechanism offered will be adopted and found to be useful. Therefore, this is being published as an Experiment, looking for a constituency
of implementers and deployers, and for feedback on the operational utility. The document is produced through the Independent RFC stream
and was not subject to the IETF's approval process.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction-and-motivation"><name>Introduction and Motivation</name>
<t>For a long time there has been a way for a mailbox provider to forward manual complaints back to the email sender.
The mailbox provider provides what is called a feedback loop <xref target="RFC6449"/>. 
This feedback loop is used to give operators of, e.g. broadcast marketing lists, feedback on resulting complaints from their marketing mailings.
These complaints are based on manual user interaction, e.g. IMAP movement to "junk" or by clicking on a "This is spam" button.</t>

<t>As described in <xref target="RFC6449"/> the registration for such a feedback loop needs to be done manually by a human at any mailbox provider who provides a FBL.
This can be quite time-consuming if there are new feedback loops rising up, or the email sender wants to add new IP addresses or DKIM domains.
In addition, a manual process is not well suited and/or feasible for smaller mailbox providers.</t>

<t>Because of the manual process involved, the email sender has to go through all providers again, delete his existing subscriptions and register with their new complaint address.</t>

<t>This document addresses this issue with a new email header.
It extends the recommendations for the complaint feedback loop described in <xref target="RFC6449"/> with an automated way to submit the necessary information to mailbox providers.</t>

<t>Mail senders can add this header, willing mailbox providers can use it to forward the generated report to the specified complaint address.
The email sender only needs to add an email header and does not need to manually register with each feedback loop provider.
The elimination of a manual registration and verification process would be another advantage for the mailbox providers.</t>

<t>A new email header has been chosen in favour of a new DNS record to easily distinguish between
multiple broadcast marketing list operators / email senders without requiring user or administrator intervention.
For example, if a company uses multiple mailing systems, each system can set this header itself without requiring any change by the users or administrators within their DNS.
No additional DNS query is required on the mailbox provider side to obtain the complaint address.</t>

<t>This document has been prepared in compliance with the GDPR and other data protection laws to address the resulting issues
when providing an automated address for a complaint feedback loop, as the email may contain personal data.</t>

<t>Nevertheless, the described mechanism bellow potentially permits a kind of man-in-the-middle attack between the domain owner and the recipient.
A bad actor can generate forged reports to be "from" a domain name the bad actor is attacking and send this reports to the complaint FBL address.
These fake messages can result in a number of actions, such as blocking of accounts or deactivating recipient addresses.
This potential harm and others are described with potential countermeasures in <xref target="security-considerations"></xref>.</t>

<t>In summary, this document has the following objectives:</t>

<t><list style="symbols">
  <t>Allow email senders to signal that a complaint address exists without requiring manual registration with all providers.</t>
  <t>Allow mailbox providers to obtain a complaint address without developing their own manual registration process.</t>
  <t>Be able to provide a complaint address to smaller mailbox providers who do not have a feedback loop in place</t>
  <t>Provide a GDPR-compliant option for a complaint feedback loop.</t>
</list></t>

<section anchor="scope-of-this-experiment"><name>Scope of this Experiment</name>
<t>The CFBL-Address header and the CFBL-Feedback-ID header are an experiment. 
Participation in this experiment consists of adding the CFBL-Address-Header on email sender side or by using the CFBl-Address-Header to send FBL reports to the provided address on mailbox provider side.
Feedback on the results of this experiment can be emailed to the author, raised as an issue at https://github.com/jpbede/rfc-cfbl-address-header/ or can be emailed to the IETF cfbl mailing list (cfbl@ietf.org).</t>

<t>The goal of this experiment is to answer the following questions based on real-world deployments:</t>

<t><list style="symbols">
  <t>Is there interest among email sender and mailbox providers?</t>
  <t>If the mailbox provider adds this capability, will it be used by the senders?</t>
  <t>If the email sender adds this capability, will it be used by the mailbox provider?</t>
  <t>Does the presence of the CFBL-Address/CFBL-Feedback-ID field introduce additional security issues?</t>
  <t>What additional security measures/checks need to be performed at the mailbox provider before a complaint report is sent?</t>
  <t>What additional security measures/checks need to be performed at the email sender after a complaint report is received?</t>
</list></t>

<t>This experiment is considered successful if the CFBL-Address header has been implemented by multiple independent parties (email sender and mailbox provider)
and these parties successfully use the address specified in the header to exchange feedback loop reports.</t>

<t>If this experiment is successful and these headers prove to be valuable and popular, it may be taken to the IETF for
further discussion and revision. One possible outcome could be that a working group creates a specification for the standard track.</t>

</section>
<section anchor="difference-to-one-click-unsubscribe"><name>Difference to One-Click-Unsubscribe</name>
<t>For good reasons, the One-Click-Unsubscribe <xref target="RFC8058"/> signaling already exists, which may have several interests in common with this document.
However, this header requires the List-Unsubscribe header, whose purpose is to provide the link to unsubscribe from a list.
For this reason, this header is only used by operators of broadcast marketing lists or mailing lists, not in normal email traffic.</t>

<t>The main interest of this document now is to provide an automated way to signal mailbox providers an address for a complaint feedback loop.
It is the obligation of the email sender to decide for themselves what action to take after receiving a notification; this is not the subject of this document.</t>

</section>
</section>
<section anchor="definitions"><name>Definitions</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this 
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

<t>The keyword "CFBL" in this document is the abbreviation for "complaint feedback loop" and will hereafter be used.</t>

<t>The keyword "MBP" in this document is the abbreviation for "mailbox provider", it is the party who receives an email and provides an email mailbox to end users. It will be used hereafter.</t>

<t>The keyword "ESP" in this document is the abbreviation for "email service provider", it is used to describe a party who provides email services to a third party e.g. broadcast marketing list operator, 
in most cases an ESP does not provide mailbox services. It will be used hereafter.</t>

<t>The keyword "email sender" in this document is used to describe the party who sends an email. This can be an MBP, a broadcast marketing list operator or any other email sending party. 
It will be used hereafter.</t>

</section>
<section anchor="requirements"><name>Requirements</name>

<section anchor="received-email"><name>Received email</name>
<t>This section describes the requirements that a received email, i.e. the email that is sent from the email sender to the MBP and about which a report is to be sent later, must meet.</t>

<section anchor="strict"><name>Strict</name>
<t>If the domain in the <xref target="RFC5322"/>.From and the domain in the CFBL-Address header are identical, this domain MUST be covered by a valid
<xref target="DKIM"/> signature. In this case, the DKIM "d=" parameter and the <xref target="RFC5322"/>.From field have identical DNS domains.
This signature MUST meet the requirements described in <xref target="received-email-dkim-signature"></xref>.</t>

<t>The following example meets this case:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

</section>
<section anchor="relaxed"><name>Relaxed</name>
<t>If the domain in CFBL-Address is a child domain of the <xref target="RFC5322"/>.From, the <xref target="RFC5322"/>.From domain MUST be covered by a valid <xref target="DKIM"/> signature. 
In this case, the DKIM "d=" parameter and the <xref target="RFC5322"/>.From domain have a identical (Example 1) or parent (Example 2) DNS domains.
This signature MUST meet the requirements described in <xref target="received-email-dkim-signature"></xref>.</t>

<t>Example 1:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@mailer.example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com;
      h=Content-Type:Subject:From:To:Message-ID:
      CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Example 2:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@mailer.example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@mailer.example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com;
      h=Content-Type:Subject:From:To:Message-ID:
      CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

</section>
<section anchor="third-party-address"><name>Third Party Address</name>
<t>If the domain in <xref target="RFC5322"/>.From differs from the domain in the CFBL-Address header,
the domain of the CFBL-Address header MUST be covered by an additional valid <xref target="DKIM"/> signature.
Both signatures MUST meet the requirements described in <xref target="received-email-dkim-signature"></xref>.</t>

<t>This double DKIM signature ensures that both, the domain owner of the <xref target="RFC5322"/>.From domain and the domain owner of the CFBL-Address domain,
agree to receive the complaint reports on the address from the CFBL-Address header.</t>

<t>The following example meets this case:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@super-saas-mailer.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@super-saas-mailer.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=super-saas-mailer.com; s=system;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;
       
This is a super awesome newsletter.
]]></artwork></figure>

<t>If an ESP does not have full control over the signing process and wants to accept pre-signed mails from its email senders,
the double signature described above can be omitted and the ESP can sign with its domain.
Therefor the pre-signed email MUST NOT include "CFBL-Address" and "CFBL-Feedback-ID" in its h= tag.</t>

<t>This way the ESP has the possibility to accept the emails and can inject their own CFBL-Address.</t>

<t>Due to this granted exception a malicious actor can destroy this possibility with over-signing.
This potential harm is described in <xref target="security-considerations"></xref>.</t>

<t>The following example meets this case:</t>

<figure><artwork><![CDATA[
Return-Path: <newsletter@example.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@super-saas-mailer.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID;
DKIM-Signature: v=1; a=rsa-sha256; d=super-saas-mailer.com; s=system;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

</section>
<section anchor="received-email-dkim-signature"><name>DKIM signature</name>
<t>The CFBL-Address header MUST be included in the "h=" tag of the aforementioned valid DKIM-Signature.
When the CFBL-Feedback-ID header is used, it MUST also be included in the "h=" tag of the aforementioned valid DKIM signature.</t>

<t>If the domain has neither the required coverage by a valid DKIM signature nor the required header coverage by the "h=" tag, the MBP SHALL NOT send a report email.</t>

</section>
</section>
<section anchor="report-email"><name>Report email</name>
<t>The report email (sent by MBP to email sender) MUST have a valid <xref target="DKIM"/> signature. 
The aforementioned valid DKIM signature MUST cover the From: header <xref target="MAIL"/> domain, from which the report is sent to the email sender.</t>

<t>If the message does not have the required valid <xref target="DKIM"/> signature, the email sender SHALL NOT process this complaint report.</t>

<t>As part of this experiment, it is recommended to determine what plausibility and security checks are useful and achievable.</t>

</section>
</section>
<section anchor="implementation"><name>Implementation</name>

<section anchor="mail-senders"><name>Email senders</name>
<t>An email sender who wishes to receive complaints about their emails MUST include a CFBL-Address header in their messages.</t>

<t>The receiving complaint FBL address specified in the messages MUST accept <xref target="ARF"/> compatible reports by default.
The email sender can OPTIONALLY request a <xref target="XARF"/> compatible report if they want one, as described in <xref target="xarf-report"></xref>.
The MBP MAY send a <xref target="XARF"/> compatible report if it is technically possible for them to do so, otherwise a <xref target="ARF"/> compatible report will be sent.</t>

<t>It is strongly RECOMMENDED that these reports be processed automatically. Each sender must decide for themselves what action to take after receiving a report.</t>

<t>The email sender MUST take action to address the described requirements in <xref target="requirements"></xref>.</t>

</section>
<section anchor="mailbox-provider"><name>Mailbox provider</name>
<t>If the MBP wants to process the complaints and forward it, they MUST query the CFBL-Address header and forward the report to the complaint FBL address.</t>

<t>By default, an <xref target="ARF"/> compatible report MUST be sent.
Per <xref target="RFC6449"/> Section 3.2, a complaint report MUST be sent when a manual action has been taken e.g., when a receiver marks a mail as spam, 
by clicking the "This is spam"-button in any web portal or by moving a mail to junk folder, this also includes <xref target="IMAP"/> and <xref target="POP3"/> movements. 
The MBP SHALL NOT send any report when an automatic decisions has been made e.g., spam filtering.</t>

<t>The MBP MUST send a <xref target="XARF"/> compatible report when the email sender requests it as described in <xref target="xarf-report"></xref>.
If it is not possible for the MBP to send a <xref target="XARF"/> compatible report as requested, a <xref target="ARF"/> compatible report MUST be sent.</t>

<t>The MBP MUST validate and take action to address the described requirements in <xref target="requirements"></xref>.</t>

</section>
</section>
<section anchor="complaint-report"><name>Complaint report</name>
<t>The complaint report MAY be a <xref target="XARF"/> report if the email sender requests it, and it is technically possible for the MBP to do so, otherwise the complaint report MUST be a <xref target="ARF"/> report.</t>

<t>The report MUST contain at least the Message-ID <xref target="MAIL"/>. If present, the header "CFBL-Feedback-ID" of the complaining email MUST be added additionally.</t>

<t>The MBP MAY omit or redact, as described in <xref target="RFC6590"/>, all further headers and/or body to comply with any data-regulation laws.</t>

<t>It is highly RECOMMENDED that, if used, the CFBL-Feedback-ID includes a hard to forge component such as an <xref target="HMAC"/> using a secret
key, instead of a plain-text string.</t>

<section anchor="xarf-report"><name>XARF compatible report</name>
<t>A email sender wishing to receive a <xref target="XARF"/> compliant report MUST append "report=xarf" to the <xref target="cfbl-address-header"></xref>.
The resulting header would look like the following:</t>

<figure><artwork><![CDATA[
CFBL-Address: fbl@example.com; report=xarf
]]></artwork></figure>

</section>
</section>
<section anchor="header-syntax"><name>Header Syntax</name>

<section anchor="cfbl-address-header"><name>CFBL-Address</name>
<t>The following ABNF imports fields, WSP, CRLF and addr-spec from <xref target="MAIL"/>.</t>

<figure><sourcecode type="abnf"><![CDATA[
fields /= cfbl-address

cfbl-address = "CFBL-Address:" 0*1WSP addr-spec
               [";" 0*1WSP report-format] CRLF

report-format = "report=" ("arf" / "xarf")
]]></sourcecode></figure>

</section>
<section anchor="cfbl-feedback-id"><name>CFBL-Feedback-ID</name>
<t>The following ABNF imports fields, WSP, CRLF and atext from <xref target="MAIL"/>.</t>

<figure><sourcecode type="abnf"><![CDATA[
fields /= cfbl-feedback-id

cfbl-feedback-id = "CFBL-Feedback-ID:" 0*1WSP fid CRLF

fid = 1*(atext / ":")
]]></sourcecode></figure>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>
<t>This section discusses possible security issues, and their possible solutions, of a complaint FBL address header.</t>

<section anchor="attacks-on-the-fbl-address"><name>Attacks on the FBL address</name>
<t>Like any other email address, a complaint FBL address can be an attack vector for malicious emails.
For example, complaint FBL addresses can be flooded with spam.
This is an existing problem with any existing email address and is not created by this document.</t>

<t>The email sender must take appropriate measures.
One possible countermeasure would be a rate limit for the delivering IP.
However, this should be done with caution; normal FBL email traffic must not be affected.</t>

</section>
<section anchor="automatic-suspension-of-an-account"><name>Automatic suspension of an account</name>
<t>Sending an FBL report against a mailbox can cause the account holder to be unreachable if an automatic account suspension occurs too quickly.
An example: someone sends an invitation to his friends. For some reason, someone marks this mail as spam.
Now, if there is too fast automatic account suspension, the sender's account will be blocked and the sender will not be able to access his mails.</t>

<t>MBPs and email senders must take appropriate measures to prevent this.
MBPs and email senders therefore have - mostly proprietary - ways to assess the trustworthiness of an account.
For example, MBPs and email senders may take into account the age of the account and/or any previous account suspension before suspending an account.</t>

</section>
<section anchor="enumeration-attacks-provoking-unsubscription"><name>Enumeration attacks / provoking unsubscription</name>
<t>A malicious person may send a series of spoofed ARF messages to known complaint FBL addresses and attempt to guess a Message-ID/CFBL-Feedback-ID or any other identifiers.
The malicious person may attempt to mass unsubscribe/suspend if such an automated system is in place.
This is also an existing problem with the current FBL implementation and/or One-Click Unsubscription <xref target="RFC8058"/>.</t>

<t>The sender of the received email must take appropriate measures.
As a countermeasure, it is recommended that the CFBL-Feedback-ID, if used, use a hard-to-forge component such as a <xref target="HMAC"/> with a secret
key instead of a plaintext string to make an enumeration attack impossible.</t>

<t>If it is impossible for the email sender to use a component that is difficult to fake, they should take steps to avoid enumeration attacks.</t>

</section>
<section anchor="gdpr-and-other-data-regulation-laws"><name>GDPR and other data-regulation laws</name>
<t>The provision of such a header itself does not pose a data protection issue.
The resulting ARF report sent by the MBP to the email sender may violate a data protection law because it may contain personal data.</t>

<t>This document already addresses some parts of this problem and describes a privacy-safe way to send a FBL report.
As described in <xref target="complaint-report"></xref>, the MBP can omit the entire body and/or header and send only the required fields.
As described in <xref target="RFC6590"/>, the MBP can also redact the data in question.
Nevertheless, each MBP must consider for itself whether this implementation is acceptable and complies with existing privacy laws.</t>

<t>As described in <xref target="complaint-report"></xref>, it is also strongly RECOMMENDED that the Message-ID and, if used, the CFBL-Feedback-ID.
contain a component that is difficult to forge, such as a <xref target="HMAC"/> that uses a secret key, rather than a plaintext string.
See <xref target="hmac-example"></xref> for an example.</t>

<t>Using HMAC, or any other hard to forge component, ensures that only the email sender has knowledge about the data.</t>

</section>
<section anchor="abusing-for-validity-and-existence-queries"><name>Abusing for Validity and Existence Queries</name>
<t>This mechanism could be abused to determine the validity and existence of an email address, which exhibits another potential privacy issue.
Now, if the MBP has an automatic process to generate a complaint report for a received email, it may not be doing the mailbox owner any favors.
As the MBP now generates an automatic complaint report for the received email, the MBP now proves to the email sender that this mailbox exists for sure, because it is based on a manual action of the mailbox owner.</t>

<t>The receiving MBP must take appropriate measures. One possible countermeasure could be, for example, pre-existing reputation data, usually proprietary data.
Using this data, the MBP can assess the trustworthiness of an email sender and decide whether to send a complaint report based on this information.</t>

</section>
<section anchor="over-signing-when-accepting-pre-signed-emails"><name>Over-Signing when accepting pre-signed emails</name>
<t>When accepting pre-signed mails, a malicious actor can destroy the possibility of adding the CFBL-Address header by the ESP, with "over-signing".
This methode "over-signing" is described in <xref target="DKIM"/> Section 5.4.</t>

<t>The ESP must take appropriate measures.
ESPs therefore have - mostly proprietary - methods for assessing the trustworthiness of an account and decide on this basis whether to accept pre-signed emails.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="cfbl-address"><name>CFBL-Address</name>
<t>The IANA is requested to register a new header field, per <xref target="RFC3864"/>, into the "Provisional Message Header Field Names" registry:</t>

<figure><sourcecode type="abnf"><![CDATA[
Header field name: CFBL-Address
  
Applicable protocol: mail

Status: provisional

Author/Change controller: Jan-Philipp Benecke <jpb@cleverreach.com>

Specification document: this document
]]></sourcecode></figure>

</section>
<section anchor="cfbl-feedback-id-1"><name>CFBL-Feedback-ID</name>
<t>The IANA is requested to register a new header field, per <xref target="RFC3864"/>, into the "Provisional Message Header Field Names" registry:</t>

<figure><sourcecode type="abnf"><![CDATA[
Header field name: CFBL-Feedback-ID

Applicable protocol: mail

Status: provisional

Author/Change controller: Jan-Philipp Benecke <jpb@cleverreach.com>

Specification document: this document
]]></sourcecode></figure>

</section>
</section>
<section anchor="examples"><name>Examples</name>
<t>For simplicity the DKIM header has been shortened, and some tags have been omitted.</t>

<section anchor="simple"><name>Simple</name>
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 111:222:333:4444
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-IP: 192.0.2.1

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822; charset=UTF-8
Content-Transfer-Encoding: 7bit

Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 111:222:333:4444
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
<section anchor="gdpr-safe-report"><name>GDPR safe report</name>
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 111:222:333:4444
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report contains only the CFBL-Feedback-ID:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-IP: 2001:DB8::25

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822-headers; charset=UTF-8
Content-Transfer-Encoding: 7bit

CFBL-Feedback-ID: 111:222:333:4444
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
<section anchor="hmac-example"><name>GDPR safe report with HMAC</name>
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 3789e1ae1938aa2f0dfdfa48b20d8f8bc6c21ac34fc5023d
       63f9e64a43dfedc0
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report contains only the CFBL-Feedback-ID:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-IP: 2001:DB8::25

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822-headers; charset=UTF-8
Content-Transfer-Encoding: 7bit

CFBL-Feedback-ID: 3789e1ae1938aa2f0dfdfa48b20d8f8bc6c21ac34fc5023d
       63f9e64a43dfedc0
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>
<t>Technical and editorial reviews were provided by the colleagues at CleverReach, 
the colleagues at Certified Senders Alliance and eco.de, Levent Ulucan (Inxmail), 
Arne Allisat and Tobias Herkula (1&amp;1 Mail &amp; Media) and Sven Krohlas (BFK Edv-consulting).</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>

<reference anchor="XARF" >
  <front>
    <title>eXtended Abuse Reporting Format</title>
    <author >
      <organization>Abusix</organization>
    </author>
    <date />
  </front>
  <seriesInfo name="Web" value="https://github.com/abusix/xarf"/>
</reference>




<reference anchor='RFC6449' target='https://www.rfc-editor.org/info/rfc6449'>
<front>
<title>Complaint Feedback Loop Operational Recommendations</title>
<author fullname='J. Falk' initials='J.' role='editor' surname='Falk'><organization/></author>
<date month='November' year='2011'/>
<abstract><t>Complaint Feedback Loops similar to those described herein have existed for more than a decade, resulting in many de facto standards and best practices.  This document is an attempt to codify, and thus clarify, the ways that both providers and consumers of these feedback mechanisms intend to use the feedback, describing some already common industry practices.</t><t>This document is the result of cooperative efforts within the Messaging Anti-Abuse Working Group, a trade organization separate from the IETF.  The original MAAWG document upon which this document is based was published in April, 2010.  This document does not represent the consensus of the IETF; rather it is being published as an Informational RFC to make it widely available to the Internet community and simplify reference to this material from IETF work. This document is not an Internet Standards Track specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='6449'/>
<seriesInfo name='DOI' value='10.17487/RFC6449'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC5322' target='https://www.rfc-editor.org/info/rfc5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference anchor='DKIM' target='https://www.rfc-editor.org/info/rfc6376'>
<front>
<title>DomainKeys Identified Mail (DKIM) Signatures</title>
<author fullname='D. Crocker' initials='D.' role='editor' surname='Crocker'><organization/></author>
<author fullname='T. Hansen' initials='T.' role='editor' surname='Hansen'><organization/></author>
<author fullname='M. Kucherawy' initials='M.' role='editor' surname='Kucherawy'><organization/></author>
<date month='September' year='2011'/>
<abstract><t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message.  This can be an author's organization, an operational relay, or one of their agents.  DKIM separates the question of the identity of the Signer of the message from the purported author of the message.  Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key.  Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t><t>This memo obsoletes RFC 4871 and RFC 5672.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='76'/>
<seriesInfo name='RFC' value='6376'/>
<seriesInfo name='DOI' value='10.17487/RFC6376'/>
</reference>



<reference anchor='MAIL' target='https://www.rfc-editor.org/info/rfc5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference anchor='ARF' target='https://www.rfc-editor.org/info/rfc5965'>
<front>
<title>An Extensible Format for Email Feedback Reports</title>
<author fullname='Y. Shafranovich' initials='Y.' surname='Shafranovich'><organization/></author>
<author fullname='J. Levine' initials='J.' surname='Levine'><organization/></author>
<author fullname='M. Kucherawy' initials='M.' surname='Kucherawy'><organization/></author>
<date month='August' year='2010'/>
<abstract><t>This document defines an extensible format and MIME type that may be used by mail operators to report feedback about received email to other parties.  This format is intended as a machine-readable replacement for various existing report formats currently used in Internet email.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5965'/>
<seriesInfo name='DOI' value='10.17487/RFC5965'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC8058' target='https://www.rfc-editor.org/info/rfc8058'>
<front>
<title>Signaling One-Click Functionality for List Email Headers</title>
<author fullname='J. Levine' initials='J.' surname='Levine'><organization/></author>
<author fullname='T. Herkula' initials='T.' surname='Herkula'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes a method for signaling a one-click function for the List-Unsubscribe email header field.  The need for this arises out of the actuality that mail software sometimes fetches URLs in mail header fields, and thereby accidentally triggers unsubscriptions in the case of the List-Unsubscribe header field.</t></abstract>
</front>
<seriesInfo name='RFC' value='8058'/>
<seriesInfo name='DOI' value='10.17487/RFC8058'/>
</reference>



<reference anchor='IMAP' target='https://www.rfc-editor.org/info/rfc9051'>
<front>
<title>Internet Message Access Protocol (IMAP) - Version 4rev2</title>
<author fullname='A. Melnikov' initials='A.' role='editor' surname='Melnikov'><organization/></author>
<author fullname='B. Leiba' initials='B.' role='editor' surname='Leiba'><organization/></author>
<date month='August' year='2021'/>
<abstract><t>The Internet Message Access Protocol Version 4rev2 (IMAP4rev2) allows a client to access and manipulate electronic mail messages on a server.  IMAP4rev2 permits manipulation of mailboxes (remote message folders) in a way that is functionally equivalent to local folders.  IMAP4rev2 also provides the capability for an offline client to resynchronize with the server. </t><t>IMAP4rev2 includes operations for creating, deleting, and renaming mailboxes; checking for new messages; removing messages permanently; setting and clearing flags; parsing per RFCs 5322, 2045, and 2231; searching; and selective fetching of message attributes, texts, and portions thereof.  Messages in IMAP4rev2 are accessed by the use of numbers. These numbers are either message sequence numbers or unique identifiers. </t><t>IMAP4rev2 does not specify a means of posting mail; this function is handled by a mail submission protocol such as the one specified in RFC 6409.</t></abstract>
</front>
<seriesInfo name='RFC' value='9051'/>
<seriesInfo name='DOI' value='10.17487/RFC9051'/>
</reference>



<reference anchor='POP3' target='https://www.rfc-editor.org/info/rfc1939'>
<front>
<title>Post Office Protocol - Version 3</title>
<author fullname='J. Myers' initials='J.' surname='Myers'><organization/></author>
<author fullname='M. Rose' initials='M.' surname='Rose'><organization/></author>
<date month='May' year='1996'/>
<abstract><t>The Post Office Protocol - Version 3 (POP3) is intended to permit a workstation to dynamically access a maildrop on a server host in a useful fashion.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='53'/>
<seriesInfo name='RFC' value='1939'/>
<seriesInfo name='DOI' value='10.17487/RFC1939'/>
</reference>



<reference anchor='RFC6590' target='https://www.rfc-editor.org/info/rfc6590'>
<front>
<title>Redaction of Potentially Sensitive Data from Mail Abuse Reports</title>
<author fullname='J. Falk' initials='J.' role='editor' surname='Falk'><organization/></author>
<author fullname='M. Kucherawy' initials='M.' role='editor' surname='Kucherawy'><organization/></author>
<date month='April' year='2012'/>
<abstract><t>Email messages often contain information that might be considered private or sensitive, per either regulation or social norms.  When such a message becomes the subject of a report intended to be shared with other entities, the report generator may wish to redact or elide the sensitive portions of the message.  This memo suggests one method for doing so effectively.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6590'/>
<seriesInfo name='DOI' value='10.17487/RFC6590'/>
</reference>



<reference anchor='HMAC' target='https://www.rfc-editor.org/info/rfc2104'>
<front>
<title>HMAC: Keyed-Hashing for Message Authentication</title>
<author fullname='H. Krawczyk' initials='H.' surname='Krawczyk'><organization/></author>
<author fullname='M. Bellare' initials='M.' surname='Bellare'><organization/></author>
<author fullname='R. Canetti' initials='R.' surname='Canetti'><organization/></author>
<date month='February' year='1997'/>
<abstract><t>This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key.  The cryptographic strength of HMAC depends on the properties of the underlying hash function.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind</t></abstract>
</front>
<seriesInfo name='RFC' value='2104'/>
<seriesInfo name='DOI' value='10.17487/RFC2104'/>
</reference>



<reference anchor='RFC3864' target='https://www.rfc-editor.org/info/rfc3864'>
<front>
<title>Registration Procedures for Message Header Fields</title>
<author fullname='G. Klyne' initials='G.' surname='Klyne'><organization/></author>
<author fullname='M. Nottingham' initials='M.' surname='Nottingham'><organization/></author>
<author fullname='J. Mogul' initials='J.' surname='Mogul'><organization/></author>
<date month='September' year='2004'/>
<abstract><t>This specification defines registration procedures for the message header fields used by Internet mail, HTTP, Netnews and other applications.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='90'/>
<seriesInfo name='RFC' value='3864'/>
<seriesInfo name='DOI' value='10.17487/RFC3864'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source:
H4sIAHc7cmMAA+1de3PbxrX/H59iLz3Ta+USFEk9ItHVTWjJTtRYtirJTTuZ
TmYJLEhEIMBiAUmsx/3s9zx2Fw9Ckp24aXrrTJuYJLB79jx/5+zZte/7XhEX
iZqI3nG2XCUyTgvxUqlwJoNr8SrLVmIahrnSWnyrZKjynidns1zd4Asvn7/a
+DXMglQuYbwwl1Hhz1SqgmvlB9Es8SU/6y/oWX944AWyUPMsX0+Eult5usiV
XE5EnIZqpeBfaeF58SqfiCIvdTEeDg+HY0/CQxMh88K7zfLreZ6Vq4l4rQr8
JL6Hf8XpXHyDX3vXag3fhhNxmhYqT1XhnyBVHswk0/BHmWQpULpW2tNLGPDH
v5VZofREpJm3iifihyIL+kJnOdAVafjTeol/+KvnybJYZPnEE0ArPP+HgXjO
C4VvePl/kKl/voiTeLWq/Zblc5nGf5dFnKUTcZyoG5VfKBksxDfL2bfid+I4
G4jvvoEnkReqmIjLYCGjn0p8P71VczGG34K4AI5dSF2oEEcNshBmHO+PDob0
qUwLZOk3Kl/KdA1frRa00P/ZPRS7u8OxOPxy53Doj/bhJ7WUcTIRP61mXwdE
To7kDIJs6XlpBgMU8Y3Chf55evES/yuEURj15wJlFIrprNRKXKgVMAp5/5Je
o0crPuE/sPoJPR3f0TchSH8iIploRZ+1ymOl4zTK7Bvfq9lELIpipSfb2/O4
WJQzJG1b0iDbdzKPQEPgBUeo5/u+kDNgnwxA0FeLWAvQyXIJyiRCpYM8nikt
pFgqIC0UxUIWQiZJdgtfpswOIAQWlosiE3qlgjhaw/OBM4/ImkeC5vEUrGBL
GNUWsjYKq/nAmyY664sYp4/iFCYvFkrkZQJ/AsLFKs8CeBU5B0qJX93KPMSP
ugTFqM08gOUoscxgpaRB9HqBK5R5rGG4rCxEFtH4wAKVBgo/SkHqjoP+HcSF
k4BcMuAYfLqVa1wnEHEThzA4ED7L7uznXItb4Dquya4Q57yXGwPvuAQNSotk
3Tdj2HUt8Wn4f7WwasyYBCLTUib0bBEvwWVkqS6X+LjhEE1dF5Cmhx2pA887
LXCsMgVVlnlfgGiRFzgcMmJVzpI4INb1xe0CFACFDA9E8AYx1IwVitmaGetU
ZyGRFaBAKzCQEEQJ5IZ9IqA2krdUYK9prJcwX6RyZHCcJGIGAgmzVWHYH4GJ
hsh2+B5sJyqTgQDRgnPJctXnmeF/M0WrR6r1Al8l5XpxtwI7QaL6yHNyd1Yo
qQbjLEHwaw/WG4OMFD5oWQVuNcnW8KlvVa0SH6weWZHB4MQhEEVZgP8q1kRb
xQkgDNgUloFC6wE/O1/Qm6eV1xYXL48Fe3OPOASUp1kBcp/9pIICV05vvLh6
+d9A2QrZDvMZOQ/YiJdxGCbK856g96YJSUQ43pkzAe8lrRwc+ZzFjJJQJK2Z
UvA0KTizp63bSIaxNqt8Tq3hdWSKIbSudMYI22OZP4CSoEMBHgXgVFBmLXfx
7t1/AXP2d3cP378fCPZPzSdQgbUi9ZiDSzMSyUCEWdQXajAfiFmeyTAA/w90
5NeKvC7oSAFyrcsTbKtM6MfauqI8W+Ki4rz2Mi4H/qtpceDMa89DuAVeIEEw
omET0JdD5AO9kgFbE5F1ejY9B/d0QzqH9Pd+KtPrHvh9tKcAbI+UFYUoeldG
yfVKLntiVhZFloLkp9p56RCmaPCLHaeax+jdnQM0XrLJxBQ+aWNhIQQ/Q3my
RkqkWJRLdD/g+dP1pixvF1klTynAwQ9YUAG8BAP+rYwL1XZScWR0DxmWqtsm
QVqAh8bHylVfZPmGVoGaIrOBYPCJ9PrpuXWP6NhzcfLd6RksBd0oiOmUnGfM
zHe+0zrKmM3tVoHr0UgsuZ1tMnep41mimHNL1NF80+mDHJ6rQGJYN+GkPUF6
kyU3KuxvLgRND1U3c84BJqnFEzmHFfRByIkCJiJX1R0IlMPCDCW/wlWxw2Jh
I3swCrHWInOq8GN4NGiH+op3xpvqUplYRiM0QzTEDXWHcMYEZwUTwDChZFIi
I7H7MMD9GuuiZzvgwlqXMYcnAIdAqczXwiEZdMZZp1zO6uEv4BjKS+S19Cng
WJtuhnJ8HGUaF3XXhyTMAaHmRF5OMM46PoY/MXzfwfGrtuizFOzLWR4S1sJC
HIQyxeqJT/IyjWk2pU2wuMlnuxQzdxKD5TG3COYYJW14CJwRUC0sggO/U+Hb
rExCCsxAC4ZvGd6ADcq5cuLu4v90Q3uqYBMsMuAE6kAkb7IyZ6rw+ZPXl6RU
OS0YbRCWG7LalxDc4f3iFobwluiwIWrf6+Jr4WC7BYaQa4gAcwUOKidng34a
Y18IjGKeZMZx34CRxOhxMYCqO4lQoY9OjLEd+sUSrccRZEIEJEEgoiVEGpIP
fyLN0qqoKyJomVZJ1EEVjo0oCThNMIswUK43COUVxamxe+DhwHudOb8Hkka2
/q1UaDnaTMBxqkt6QiPABfZnM8ShLYO+z4844QLuW8mcTZxeiyXia+uYxDcn
5xekbaxN4DokTl0ohi2JvLVWQZCX3YyNz+SetAdIMm3A5prf+CD83UeMWLnk
JfgaiFC0XFAbTUxDymCZrzHZg0chDdHsxisvVqHYmcLUSKxgHaAvZKUwEHgu
DIwQzUPUcbA7P059GMNn0AaRtUCSjFbz6BS6RHabGj9gHG28ihWmNlNAGbDK
ADUU1cm6JFzw3DkmG9N7CGN6QIMZFpNuGrEaBJMKIsNmIGgnrKG1sZpagBWN
un8DZxnJa9AldNBzxS6UxYZ6AMZdLmeKDZ3kjFUCwiOgNUlm8A7+SFk56Xio
8FGEr/CbY0AVsAzWcCwHFcyXlWYxIqtkRQpYPUzzgITAx5QwHlL5w1+fPtEq
KHPA8gRY0Bo4sm1hzgSmWy7By6z7HTkPpUcZKgEthfA7oFINmfYXYkrK0fRC
GNviOSoap9abNsYBv8tfdTlwjqB1CDFwM2+GuMq8uya2M4ag+0m2winZt4BW
dk7uMpIvxHPMqRNVT5a7psDl3werCFiGGQW/hbxRG6gVzTSRgYLpzt0c6Fh8
63HQ/zvk+0Aa7j15Ii4DiBUM4ECqVdpIwROLd74t3tWic2F/s0VA//TE/Y7o
NsVSnRkJEphzmRcx6DDzi9wqQTr7CCWlJG40gzA0PG/M73PxEB13A0+Qw+bk
odS1F5P2i8h0NG4035Ztu4zeCoiymI7IAJGwlQqznWvHwfqiOBEgahnEUM2F
ql19kctYu3SdkSdYQkcZ66cVWLDazqOgq0C6LYwr3JwJM2eBr7iwTNjgKX71
dayKaABOc4uCGYC7DNS6YxExB6RU39oyiLNzCKqaoa9L/SCZT/zbLE9sGQHH
QDfgi1NtUh9CFvCmkEtMyBvCNDWgpkV8hW9H3eEamGHAeyBXckalCEa3CGC5
chJaBGG8T2285uQfM1abEhz0JDN1O4ABrrDW1uPtDcMB6JwgYuD6hapjF+uR
TezHSb4nh9nxiPXm28FCBdfaIWcgHKSJOQOqW9HNxxlVlRrOwoB8zL5BiJ9s
6ibLI0Ty3bNC1FMQRMKvDNpqKqUNUTAwxFL0v1GZmPy60285jFYVvEiYDrvW
NhTECh0WCPPpo9q55RmHCCjAvlURlBBAZrs35FTZkoGXC+ee1J1BvE2Hb5wV
RuFO+6ytv6KFR6Uq3I0ysriRSUnhiSqi2apMsP4ZFwQB4fcCUEza8B4gOi8q
cwarsQ5KrW2+lKubGD8MxJsUlp5pLhlA5ARhIlwymZMJ8Ldmz4W2YkQAjqKg
uolhR1CvVStXixZYob/mSHUSU7EUzQpIhEn9YywW+W9TUxKYKcpT5lmG1ElN
QAtH63wWUvCvIAU/GO4dQArOaIRAYIK127XBH1gCjgGqIYcoGmtExKD71otp
A/WXFoU00NHA+za7xTf6jazHZCHsLF7BPA3CXI6OmaJYlfkK/8uO2KIKfBHI
peJjWXuXCneSHD1nbQbKIjeaNMSaU3Hr1OoVxPtrhxht6tEEGIRABcE1FiUS
Y94gtgiEamILgW/n9m2QcQgyBZDWXF1nLYTx4iZe+vBtBy78UwF7lsRzVxTY
cEswXQhqGbosfwlZ6o2t2zKIJztB2M8+jL0VKRByxKn0M1eoRz6Rbpv6dpsP
qOXiBHd/yL9qYt21WqPpQGDqnb29vOr1+b/i9Rv688WLP749vXhxgn++/Hb6
6pX7g33i8ts3b1+dVH+q3jx+c3b24vUJvwzfitZXZ9O/9HgLoPfm/Or0zevp
q57Dbl5VQ8uteyEJQ+grGNY06l3Pj8/FaNeUvcajEZa9+MPB6MtdrIFBVsuz
kVbyR2DXGiv/SuaUSUEkhtAcFzLRlMTqBWJyRBVG08xeLm87V9TWtyV43wt3
p+PK5/Tu0Zke790gBMBZWNQGCbSnPHt+/jEzthW5R57YPI6RZE2ZgImCtR3D
2nZW7Vs7HIYReICKJQMBGm+3lsjO3SLaxL+4/CjirbXkN3GgNpdgtyasCoBN
VCtytDcGYZiJ8wM5/PCDuxjOX/WFB3QvM42AWzNLYDVVBbG9a2kn/Aju1J1D
N5s2VtyUoqaqsRUW7pVVGwXwb1AdLNA/ulaqfqVrUz2qqKIdQJwMcq2HFvVE
XHDkIVhOUfXCoCwz2rsnFnb59MV7xl7aFKiqvXHOfarBbJzPG+OBQgzUoOZg
C7PxhZDS7TJtOF/8DnjCu9AzTMY5CssaPGSfQ+MkECdAD5Ylck4p8qSY2hZ5
HBSegfqmBmRAF/uevZ3x+P37wUsKmiavbT7XmQFjEoMwEVx84soh9Bb55hmi
nxuCprSPBLArDj2YEXdnjrDsv/PlvsUcBeBm0MTUJh5aMWahnZxeeNRDwcql
Kmqp9ybxnEIQQHGUUeHT7QWxGO2MTCjyalOQDb+NZaGmRvjhdbz03Ug2f6zS
QlMnptF1tSxIAv/xj394FwreSv1zWSwm4vcs8q8pb80H5k3Mev/Xw3VNxPRW
aYSTr9WtTlSBXPh96v78deONq2xi1a/6BVJc75Ij7kRclitkoxkzhGSVMcM6
K726pCcCU+Ta4M+M4h1hL8kZ1/kgdYMVyJ0v1d5oFvk7w72hP5Zy5o/GO7v+
3u6OHB6MD8LRruxc33GWYjnOv1qv1EQU6q7Ypgj0DMveuVbFUVlE/oGHiuBf
WnZPxM3R6JmQR7mWvl7I8d7+MxEeNUjVR8ihZ6Y7RiyO7PqJpcCl2gLayeik
zoZnJvOizgvd4F0lgwGJlQzuQiXyToWbFtewIhotWMRYIzDl3qhbrfv3aPuj
xiYeNDbvl1qbmd9U5yqDe/rCqP5oCz017gSAd3Lfjrd+PZN0lPz7md0mVf9O
1udZo2vM8IAFmhc+mSE6bfunSL7rxc8K8JtSAPTEVwSjzwl/miE2vXKHY6MS
S9X+8zgY6nv1bbv7q29dvjqt1xIf99vec4C91Wf9qTEMobgSa1gUDSrHrFLe
JSPsOgMi+pt7lfeFMPtUC102Xmrwix/oe3KeK0qsDeWtPUi7gWF2IVwBxAqu
QwafAqiR6vlaSu0bo/qNBI1Own6h2/jn+Yt7qNVH3CnxSaDbvxQ3miE+3GmB
c2rn7QSvsIZO3Ql5lgj0HVxCg2XVe365fdT2xgWBWmHar8jCFdfsjW1gT0Jj
K9o6MDL8yuYrBwL5J9BhcvVsGRe2PxffQ4KprQVe5PIvTsA2TL0B1K1r94Qs
PUyAreOBiwqSMlRctLI85MpTr81nqj7gHIsjUci5dVxUIzX02A15LsnTLlaN
LS7dZq4h8XHK/bZuk7tOB8xwUipOymGieS5p40Td4Wi0FwDsTeIgzkpda8wA
/oHITH90nRJiEgrSN0Ls7mSIO3z4A+0JP9+x3eegPru0XycD/UBH9Wt4zI+D
WC2Q0C6ctSDG+3v7KSwyMl7AbQv2FpCNgom7sxq4Qbvkhjx4ivFSk3cD7/uF
qkG1ju4MU6qkQi3NDDqY/aLp6withTHRE6UqLuwJCtd8RyhQcmuf7BwLt5Oa
75gF1F+t09l3RUO3/cHtHq5myKVXU/SsviHB1B8RT6moCOPjaFhPr8WLLeaa
Sf0/pNhw9WHM43EDF+LY/5hFwwxn09NXRw5bWpjIQY2Lo0W1Dltg7TqZIJyU
TL9aK+I2mP7oAjt6uyv+2/DMHriFXbmNH6vWHW0ndiPB9Vjb6jp2rcWp4o04
GK90gYWb90xDgulDwEotH53hUnKwiNUN7oBTLfzUNgLwIRFUjBeNLrV3T8iS
zcf33rTVeoSV/Vs8daPrQL1+LIJq1xxYTdAlMduILzs9gmtmtQ2FJsBVW4yd
vYibnQWuIZEtnQEACHN68ZJU6XB/D2RJnbwFbd7brAJ0P1SRLJOio4Ebw7vd
EHz1F9IV6uaBkfH4X9eIpi9jTSANchbV39ggxACPJ/V8fmOLJ0YLPJv+xVry
wzOY7TMVLFIsx2EXqu1KsNu4pESZwKN2tIcC0lM07mM8cXsqmndqeSsZMU46
h4lqW6ecJnIThuOnsrag3LE6JnEgXlCHNLOWdjB+yc6zM60NqZEK8FtukHqb
cSWMRiKNkqnvGVEqXX3cYn961m4nYsuBr3z71XvrdVCkDqtXHqJpN9URR5Cq
2QemFXAj9707M7X3au7w4Q5e77nTdtyA/hBlsDGbleGcPXR1nuPS7JbtDMb9
ruam+uu001072MhvumYlbsnBndC+fdJiTNok1ObIGu2Gr+SyL7z6KSqKkI1D
VD4foqLt9BQMUs0E0oTNf9RDucyMKvF2XSbwdBZi69A1sRBkMC5MYxsNHulC
fh0O90awfJQCfHv+5nwHvx0d7iBT7JEvbWJiV6hO187caK1pZSxkFpq6DR1z
liB0wxtcm4jiBAyCcorKeyCvH3cftxY4NYzG+DaNruVxh3VqXRDtOrdcjwUT
j5MitZ0XcdoHOaemPjbXTiEcW+QpZ/2nOABx3Nbwd0+c0hv+MADeNAVw7jNV
Z0gjYtwrDm4VedzjW7ZvOP2ucprjYwfTG561/rg9OgHuOVG4d0+zuqRjE7sN
sPmUO0TZtVnv1ZHsG/BtCY1dv6yjNDRty6aOChHFa0ROrFigaQOaA7lvxl3u
gtvfOxy+f9+nDhvb72c7CM2hwFkWUh2BaFnbM2trOikCMp6XiXRnWFyAXMTz
RUd4pDNEnId0JivOuUisBoTmINqcGQHwIS3cAQpy2F99ezY9PqLOoiE2E3Ej
uEQ8mKsCb3jo4x0MBR7KpuNWxE0fU16M4egxBAUy1MEO+3pXt3TAgS0YCBCQ
nG2FAVsGzk35da3Bpias75hsHofv2Tj1Q0fbO5hdR/O3QUnVESGjSXxsDc99
iyS+ZmV35RFTBvmw/W66PIFzXnN7h7hcg8LfEbsaMfhdF4XvW6WZ6fPXL7ED
l2ARdS3ovvj+8rwvji9evWSUDgP4iGU5udm0H6IfsHUaeTyC2D4S9bk9r/5J
HDUra5OeGH4xgjmrmWz1wP7zQ++Ze4gZ4fOZy78SmZ7X+BInMOzqiac9EuW2
6JFMt2zBYEPJfwZjSF8/mim2oc2PQ8OY2jeOOfWyiFt7BA/wgiN6dPTFUyYC
ljdxa0O8w2nXcaMwBxpxT8mu3VXEncVKV+671fjetxVXyIqqZ7KkNMepsqiB
s+pZkdv8ABlM6aiX2zWpPea9Qjtp91aZH/v3Dl61cJnDbDeKSqARtcnasiin
fq1TlJ0DKjdkBNYb2pNbiG4GVXkqrU5DA4AGViwrd+x+aayAoyUjE+693ry9
oitroISEQQPev7DKY0QStt1/4DVav5unympnZwUd0cODuIWLy6FKEMQipafn
7TZpvbDv0rF8WlwgS+6nNY3GyLVGszETiyvEOaMIJEFNmih3hyJ1Cfaeansa
OLWH7rxL00YHX1UHhPgcOiW3tnsQxcOH3qkqxm+LBeFje1lHStfjUKd9HDVR
rH2hTkcAqo7ZUIZ3BgTXGMKx0sCKMhFYgkQuuB7COL2JC3f+m+6GyGP8cYC3
6tDzruPbvsy5AjG3ni7gWdnbfnUtQcx0RIhjHiKa4zYrCV7OYR6wSTKdaqxt
k7hACT9bAZljcpLOLghLGJ1ef37OCts8M/iwLnI2qW6o7AWjDe4bprBXqHC5
y6fWUUSONKQq8Ii9jxsqvJmENskAma6XugWtWOD9PLqpPy3jvm8JuE2DKwCz
zxzXSJHm7rCQ/drgLjRqXJjZYNlQH3Nyh79xJ4ItVVTUSsG+7Ul34wG3KVfn
e2Hc+QHe0AF4U7kuPhBMhJvMhe9fQmL1KssivNoJMJMrNcG6rlPcRLrPv3Ek
K9RyRYn5vCT3VEPMmwekGl2v3G4FMS7X9paVDmJrMyxBhvUzEtuGVaj17o4h
d9rAnFWPtTtnWXO8mPje630JqPPFRrTkuFFetOJ0Z1HE2ybb68dRjCu2NyZE
ppjR6NR9zDVPqc2u4ZI7q6qmWrWBT2oYvaQiGSJxv8j8e5F4BxA3d2lUOLwD
htdQOIvrmg+QbmgtwSOONbzVwKupvnXBpd1PzAuoSLZdyNjvEgd4ThszDJjY
lJpM/CHuArkrdgU3GYCgTbI0W1nH0f52WkRCpYKYDUDmWprmZQhV53pGdLdv
CSBI1Eb+aIQmaNnti1r6u8EUtBFwKQkVBrruIQC/wmHOHA+774aA1oUq5vBU
Ze4UjbDKXx2RtVbDl01Vl62BCt/IYO1rGSl36oedThWSBxuX/2Ahpl1t2Kq2
gzBgZ/YWFXQdeFUR5rLGIGulQ5qMjp80NkEYT29O3Eyd6/ORo+CMm8EO8hfe
sCdmB62LFeiWDHyZjNpiZVJne0GGuz6MNb7uWWJtavvubB/nnMrcy1ZzV8Rg
m6J/ICPZymhJD9a760UPuvbswRx/4LnCyaOGiQ6n/6CfoffoKhLrbAQl/WCo
zDUUyoa7GQDqU7TsxVIGvoneW3yMzCEw4NRbqifgnP1mMLqnOtFv9ow5ldq4
AwlDZaLCuaq2iqxhIWydcSED6fkTlvHsPtcLlCidhPxjSeGYzbC6kcOdvsQ7
ENt7ZzjJTX045YZjTNNKfnh7Ud0t4hld6WGuwqk6NqxeGcdUg5Sk1Asu01R4
0lX9s+oCj44yOZ/m2zhQwv7IwMgws2VuC9Dt3SFrul8nZ7u1pOBRQztli6jO
6Tfjbr8xFp2u1Z0e1piFwbVImbnRgq8jw2hcc7Fx7RB9ezMgizYXuLEl6LzH
/ZBAPJStWY3p8wWKFshi15LzH8CY0vgcVFIEBnwnUx07s/q+NVcxoC3Tow33
+Bio3jh1bfbEnBd0gWFDao6L7Cmru7LYpN5g59GlaR/jTQZynewemx1amtsp
Oh+g3/uPNj81u7Duv9zCRqGZa+Pqs+/u1VulegNr53grqWr9uNEztbltbzem
9ga7RoGwYewxJAnPfGjaxJSZg7gkZbvaB7Onuoyt6ECQ2NhWSXyzr8/WVXAv
f/p62io/bVQoacH0YFzbYuGyrblTjC/iMsKguN9HxGNC/c7B/i6GesreaGvt
3II5sFYT/myZ9CUdyXotITPq2fti1pName7b2izmPuAGtQIysdUK7yJFc0V0
lgVZMiHV87xLMMRSTyo4KeHLKd0tsn3MtwiYtslE5Z03DYvfd9zn+78wcuNE
voV2k2ax6OGy5m+fyXWKf/tsFuZQh6Yqg0b8FwfU12nPLrUvuYAMJofwrMzt
s4TCCznXbL30iOllNdcAEab0uP+lwiKt5gd3A+Cvc6poqdx3KaSPn/gY30bZ
W4xGo8l4PJ7s7OxMduGf3/pRk3/NSb+LjpzT6INP/xz9iAdPfhzvDof7w8P9
8Y+j4cHOzsHezu7eYLR3OD483Bntjw6HwxZnTA1p221P8NjVU7lMdQQR70Ua
ZBhGJ+JLQKSeu5PJjEOYFxAIPDmdk03BSreHg5H3J0he6VJ1/PAmj+cx2LOP
3Ss+a+i9KuxNcwS5iX9C15FflYCNxjviD2UqxsPxUAz3Jzujyc6B+ObsyuP2
QhX6J9SlNxH1gS6zMg9AIuegb4fjwXAwBlp+IedIp/IoOBiPK6V6e/USlOpR
5n224f8sG/5ITfN9F+qpwkXFGWOYn6PFZ037OdHCFhN1VRnZZO/niPIzIsp4
OBxNTp4fTCbjvU8YVEwzh/7o4PIBVvPp/BFnzFilE+8aFb33/+GeaufLg0M1
kmp0uHMg5TgahlEYyd2D2XgYHkQHs2A/GI9ksLMbBXvD8U5oPcT+TnSo9nfl
7k4YqTAYfvZwn9LDfXZw/y8d3Ccztp/rGMU0sNsKfM3Tle2P5WJ/GBdZHtMl
xjcxKLO4xc6P5l9qg1WNJFESd+exs7X2l1D1hdfxu8oLPnpyaVodpom5+5zm
DLJBCOJ/xf0Zb5MSy6RPT9M7VJstGHKap4re0ZKrgVfZLJb4N4bl12UixdPR
70Z0zED8TpzBEuQWPXUJ44nv8myRwLNPn7/8TrwIb/jv2yCT3DJ/TQxKx/s/
7KXfcshsAAA=

-->

</rfc>

