<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.26 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-campling-ech-deployment-considerations-04" category="info" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="ECH Deployment Considerations">Encrypted Client Hello Deployment Considerations</title>
    <seriesInfo name="Internet-Draft" value="draft-campling-ech-deployment-considerations-04"/>
    <author initials="A. J." surname="Campling" fullname="Andrew Campling">
      <organization>419 Consulting Limited</organization>
      <address>
        <email>Andrew.Campling@419.Consulting</email>
        <uri>https://www.419.Consulting/</uri>
      </address>
    </author>
    <author initials="P." surname="Vixie" fullname="Paul Vixie">
      <organization>Red Barn</organization>
      <address>
        <email>paul@redbarn.org</email>
        <uri>http://www.redbarn.org/</uri>
      </address>
    </author>
    <author initials="D." surname="Wright" fullname="David Wright">
      <organization>UK Safer Internet Centre</organization>
      <address>
        <email>david.wright@swgfl.org.uk</email>
        <uri>https://saferinternet.org.uk/</uri>
      </address>
    </author>
    <author initials="A." surname="Taddei" fullname="Arnaud Taddei">
      <organization>Broadcom</organization>
      <address>
        <postal>
          <street>1320 Ridder Park Dr</street>
          <city>San Jose</city>
          <region>CA</region>
          <code>95131</code>
          <country>US</country>
        </postal>
        <phone>41795061129</phone>
        <email>Arnaud.Taddei@broadcom.com</email>
        <uri>https://www.linkedin.com/in/arnaudtaddei/</uri>
      </address>
    </author>
    <author initials="S." surname="Edwards" fullname="Simon Edwards">
      <organization>Broadcom</organization>
      <address>
        <postal>
          <street>1320 Ridder Park Dr</street>
          <city>San Jose</city>
          <region>CA</region>
          <code>95131</code>
          <country>US</country>
        </postal>
        <email>Simon.Edwards@broadcom.com</email>
        <uri>https://www.linkedin.com/in/simononsecurity/</uri>
      </address>
    </author>
    <date year="2023" month="March" day="13"/>
    <area>SEC</area>
    <workgroup>secdispatch</workgroup>
    <keyword>ECH</keyword>
    <keyword>Enterprises</keyword>
    <keyword>Operational Security</keyword>
    <abstract>
      <t>This document is intended to inform the community about the impact of the deployment of the proposed
Encrypted Client Hello (ECH) standard that encrypts Server Name
Indication (SNI) and other data.  Data encapsulated by ECH (ie data
included in the encrypted ClientHelloInner) is of legitimate interest
to on-path security actors including those providing inline malware detection, parental
controls, content filtering to prevent access to malware and other risky traffic, mandatory security controls etc.</t>
      <t>The document includes observations on current use cases for SNI data
in a variety of contexts.  It highlights how the use of that data is
important to the operators of both public and private networks and shows how the loss
of access to SNI data will cause difficulties in the provision of a
range of services to end-users, including the potential weakening of cybersecurity defences.
Some mitigations are identified that may be useful for inclusion by those considering the adoption
of support for ECH in their software.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>In order to establish its handshake, the TLS protocol needs to start with a first handshake message called the Client Hello. As this handshake message is in clear text, it exposes metadata, e.g. the Server Name Indication (SNI) which allow middleboxes on path to make policy decisions, in particular but not only for security reasons. As part of a wider initiative to achieve pervasive encryption, a proposed extension to TLS 1.3 called Encrypted Client Hello (ECH) <xref target="I-D.draft-ietf-tls-esni"/> is attempting to encrypt all the remaining metadata in the clear.</t>
      <t>The Internet was envisaged as a network of networks, each able to
determine what data to transmit and receive from their peers.
Developments like ECH mark a fundamental change in the architecture
of the Internet, allowing opaque paths to be established from
endpoints to commercial services, some potentially without the
knowledge or permission of the device owners.  This change should not
be undertaken lightly given both the architectural impact on the
Internet and potentially adverse security implications for end users.
Given these implications, it certainly should not be undertaken
without either the knowledge of or consultation with end users, as
outlined in <xref target="RFC8890"/>.</t>
      <t>There are use cases where encryption of the SNI data may be a useful precaution to reduce the risk of pervasive monitoring and offers some benefits (e.g Enterprises offering services for their own customers will appreciate that their customers privacy be better protected). However ECH presents challenges for other use cases (e.g. Enterprises in need for network security controls for compliance reasons).</t>
      <t>The objective of this document is to list and describe the various operational impacts of ECH and not to consider solutions to this problem nor to question the development of the ECH proposal.</t>
      <t>Whilst it is reasonable to counter that VPNs also establish opaque
paths, a primary difference is that the use of a VPN is a deliberate
act by the user, rather than a choice made by client software,
potentially without either the knowledge and/or consent of the end-
user or device owner.</t>
      <t><xref target="RFC7258"/> discusses the critical need to protect users'
privacy when developing IETF specifications and also recognises that
making networks unmanageable to mitigate pervasive monitoring is not
an acceptable outcome.</t>
      <t><xref target="RFC8404"/> discusses current security and network operations
as well as management practices that may be impacted by the shift to
increased use of encryption to help guide protocol development in
support of manageable and secure networks.  As <xref target="RFC8404"/> notes, "the
implications for enterprises that own the data on their networks or
that have explicit agreements that permit the monitoring of user
traffic are very different from those for service providers who may
be accessing content in a way that violates privacy considerations".</t>
      <t>This document considers the implications of ECH for private network
operators including enterprises and education establishments. The
data encapsulated by ECH is of legitimate interest to on-path
security actors including those providing inline malware detection,
firewalls, parental controls, content filtering to prevent access to malware
and other risky traffic, mandatory security controls (e.g. Data Loss Prevention) etc.</t>
      <t>This document will focus specifically on
the impact of encrypting the SNI data by ECH on public and private networks,
but it should be noted that other elements in the client hello may also be relevant for some
on-path security methods.</t>
    </section>
    <section anchor="why-is-the-sni-used-by-middleboxes">
      <name>Why is the SNI used by middleboxes?</name>
      <t>(Editor note: this section is experimental). For middleboxes to be able to perform their job they need to identify the destination of the requested communication. Before TLS1.3 a middlebox could rely on 3 metadata sources: The certificate, the DNS name and the SNI. A middlebox may have used some or all of these metadata to determine the destination in the best possible way. Yet, as part of the current initiative to complete pervasive encryption, the certificate was encrypted into TLS1.3, then DoH/DoT/DoQ are encrypting the DNS flow to its resolver making it harder for middleboxes to use these information. Regardless of the easiness to access the data, the DNS could be misleading in some situations (would it point to the real destination, or just the site hosting server name, or a proxy?) and the SNI was invented precisely to extend on what the DNS name could not achieve by design.</t>
    </section>
    <section anchor="encrypted-server-name-indication">
      <name>Encrypted Server Name Indication</name>
      <t><xref target="RFC8744"/> describes the general problem of encrypting the
Server Name Identification (SNI) TLS extension.  The document
includes a brief description of what it characterises as
"unanticipated" usage of SNI information (section 2.1) as well as a
brief (two paragraph) assessment of alternative options in the event
that the SNI data is encrypted (section 2.3).</t>
      <t>The text in <xref target="RFC8744"/> suggests that most of the unanticipated SNI
usage "could also be implemented by monitoring DNS traffic or
controlling DNS usage", although it does then acknowledge the
difficulties posed by encrypted DNS protocols.  It asserts, with
limited evidence, that "most of 'the unanticipated usage' functions
can, however, be realized by other means", although without
considering or quantifying the affordability, operational complexity,
technical capability of affected parties or privacy implications that
might be involved.  It is unclear from the document whether any
stakeholders that may be impacted by the encryption of SNI data have
been consulted; it certainly does not appear to be the case that any such
consultation has taken place.</t>
      <t>The characterisation of "unanticipated usage" of SNI data could be
taken to imply that such usage was not approved and therefore
inappropriate in some manner.  The reality is that the development of
the Internet has many examples of permissionless innovation and so
this "unanticipated usage" of SNI data should not be dismissed as lacking in
either importance or validity.</t>
      <t>This document is intended to address the above limitations of <xref target="RFC8744"/>
by providing more information about the issues posed by the
introduction of ECH due to the loss of visibility of SNI data on
private networks.  To do so it considers the situation within schools,
enterprises and public service providers, building on information previously documented in a
report from a roundtable discussion <xref target="ECH_Roundtable"/> in places.</t>
    </section>
    <section anchor="the-education-sector">
      <name>The Education Sector</name>
      <section anchor="context">
        <name>Context</name>
        <t>Focusing specifically on the education sector, the primary issue
caused by ECH is that it is likely to circumvent the safeguards
applied to protect children through content filtering, whether in the
school or home environments, adding to adverse impacts already
introduced through the use of encrypted DNS protocols such as DNS
over HTTPS <xref target="RFC8484"/>.</t>
        <t>Content filtering that leverages SNI information is used by education
establishments to protect children from exposure to malicious, adult,
extremist and other content that is deemed either age-inappropriate
or unsuitable for other reasons.  Any bypassing of content filtering
by client software on devices will be problematic and may compromise
duties placed on education establishments.  For example: schools in
England and Wales have obligations to provide "appropriate
filtering systems" <xref target="KCSE"/>; schools in the US use Internet
filters and implement other measures to protect children from harmful
online content as a condition for the receipt of certain federal
funding, especially E-rate funds <xref target="CIPA"/>.</t>
      </section>
      <section anchor="why-content-filtering-matters-to-schools">
        <name>Why Content Filtering Matters to Schools</name>
        <t>The impact that ineffective content filtering can have on an
educational institutions should not be underestimated.  For example, a
coroner in the UK in 2021 ruled that a school's failure to prevent a
pupil from accessing harmful material online on its equipment
contributed to her taking her own life <xref target="Coroner"/>.  In this particular
instance, the filtering software installed at the school was either
faulty or incorrectly configured but the case highlights the harmful risks
posed if the filtering is bypassed by client software using ECH.</t>
      </section>
      <section anchor="mitigations">
        <name>Mitigations</name>
        <t>Whilst it may be possible for schools to overcome some of the issues
ECH raises by adopting similar controls to those used by enterprises,
it should be noted that most schools have a very different budget for
IT compared to enterprises and usually have very limited technical
support capabilities.  Therefore, even where technical solutions
exist that may allow them to continue to meet their compliance
obligations, affordability and operational expertise will present
them with significant difficulties.</t>
        <t>Absent funding and technical expertise, schools will need to consider
the best way forward that allows them to remain compliant.  If client
software does not allow ECH to be disabled, any such software that
implements support for ECH may need to be removed from school devices
and replaced, assuming that suitable alternatives are available.
This will have a negative impact on budgets and may be operationally
challenging if institutions have made a significant investment in the
deployment and use of particular applications and technologies.</t>
        <t>There are instances where policies in education establishments allow
for the use of equipment not owned by the institution, including
personal devices and the devices of contractors and site visitors.
These devices are unlikely to be configured to use the institution's
proxy but can nevertheless connect to the school network using a
transparent proxy (see below).  Transparent proxies used for
filtering will typically use SNI data to understand whether a user is
accessing inappropriate data, so encrypting the SNI field will
disrupt the use of these transparent proxies.</t>
        <t>In the event that transparent proxies are no longer effective,
institutions will either have to require more invasive software to be
installed on third party devices before they can be used along with
ensuring they have the capability to comprehend and adequately manage
these technologies or will have to prevent those devices from
operating.  Neither option is desirable.</t>
      </section>
    </section>
    <section anchor="transparent-proxies">
      <name>Transparent Proxies</name>
      <t>A proxy server is a server application that acts as an intermediary
between a client requesting a resource and the server providing that
resource.  Instead of connecting directly, the client directs the
request to the proxy server which evaluates the request before
performing the required network activity.  Proxies are used for
various purposes including load balancing, privacy and security.</t>
      <t>Traditionally, proxies are accessed by configuring a user's
application or network settings, with traffic diverted to the proxy
rather than the target destination.  With "transparent" proxying, the
proxy intercepts packets directed to the destination, making it seem
as though the request is handled by the target destination itself.</t>
      <t>A key advantage of transparent proxies is that they work without
requiring the configuration of user devices or software.  They are
commonly used by organisations to provide content filtering for
devices that they don't own that are connected to their networks.
For example, some education environments use transparent proxies to
implement support for “bring your own device” (BYOD) without needing to load software on third-
party devices.</t>
      <t>Transparent proxies use SNI data to understand whether a user is
accessing inappropriate content without the need to inspect data
beyond the SNI field.  Because of this, encryption of the SNI field,
as is the case with ECH, will disrupt the use of transparent proxies, requiring far more intrusive data inspection to be undertaken instead.</t>
    </section>
    <section anchor="impact-of-ech-on-enterprises-and-organizations">
      <name>Impact of ECH on Enterprises and Organizations</name>
      <section anchor="the-main-requirements">
        <name>The main requirements</name>
        <t>Enterprises and Organizations need to protect themselves for a vast number of reasons, mainly:</t>
        <ul spacing="normal">
          <li>Reduce their Risks. And in particular as part of any Cyber Resilience strategy.</li>
          <li>Protect their Reputation. The term Reputation includes many aspects way beyond the traditional enterprises and organization assets (data, etc.).</li>
          <li>Comply to a growing diverse set of Policies, Regulations, Certifications, Labeling and Guidelines. These requirements are growing in both scope and complexity as they are added to by various bodies in countries and regional authorities around the world.</li>
        </ul>
      </section>
      <section anchor="a-degrading-threat-landscape">
        <name>A degrading threat landscape</name>
        <t>In addition, the general threat landscape which was already very large (see <xref target="I-D.draft-mcfadden-smart-threat-changes"/>), has significantly increased in three ways:</t>
        <ul spacing="normal">
          <li>COVID crisis generally accelerated the overall attack landscape. Indeed as the crisis forced many enterprises and organizations to accelerate their digital transformation, it increased the opportunity for cyber criminals and nation states to launch more attacks, leverage innovations to their advantages, better select their targets, increase their efficiency and increase their rewards, in particular with Ransomware based attacks.</li>
          <li>The Supply Chain is under stress as per the <xref target="SOLARWIND"/> attack</li>
          <li>Nation State attacks are continuing to evolve, for example as noted to those linked to the current Ukraine crisis.</li>
        </ul>
        <t>Attacks are now damaging enterprises and other organizations with ransomware being the number 1 issue by a considerable margin. The attacks are increasing in severity, to the extent that this is now being measured at macroscopic level in some countries:</t>
        <ul spacing="normal">
          <li>EUR1B loss of revenue for French organizations from January to August 2022 <xref target="LOSSINREVENUE"/></li>
          <li>Loss in capitalisation between 1-5% <xref target="LOSSINCAP"/></li>
          <li>Degradation by credit notation agencies <xref target="LOSSINCREDITSCORE"/></li>
        </ul>
        <t>Another implication from the COVID crisis is the acceleration of BYOD
with the current reliance on remote working. This has created two side effects for remote employees, contractors and third parties that need to connect to one or more enterprise
networks on a temporary basis:</t>
        <ul spacing="normal">
          <li>need to use a VPN access to the corporate network, which brings all the benefits (e.g. protected access to corporate network) and risks that VPNs may open (e.g. lateral movement when the end point is compromised),</li>
          <li>need to access a cloud proxy which requires an agent to be installed on the device to steer the traffic to the right place.</li>
        </ul>
        <t>In such circumstances, requiring
software or custom configurations to be installed on those devices
may be problematic (see <xref target="I-D.draft-taddei-smart-cless-introduction"/>.</t>
        <t>This is why network security solutions are required and this is why ECH preventing the access to the SNI makes it impossible for blue teams to defend (see the next sections for details).</t>
        <t>Finally there is a major lack of manpower in cybersecurity with a lack of professionalization which is not compensated anymore by the vocational aspect of cybersecurity so far, so any expansion of technical requirements that ECH would cause will exacerbate the problem.</t>
        <t>All the above conditions are weighing on capabilities to defend, both:</t>
        <ul spacing="normal">
          <li>Directly: a lack of visibility on a key meta data like the SNI will cause significant issues to enterprises and organizations</li>
          <li>Indirectly: should ECH happen and should alternative be provided, managing migrations to any alternative not requiring access to the SNI, in these conditions, is undesirable from a timing, resources, capacities and risks perspectives.</li>
        </ul>
      </section>
      <section anchor="examples-of-regulatory-implications">
        <name>Examples of regulatory implications</name>
        <t>Regulators are accelerating their lawfare capabilities at accelerated pace and new legislations are showing an increased precision on what enterprises can and cannot do. The EU GDPR had ripple effects to Financial Institutions to implement Data Loss Prevention which requires selective decrypt. The recent indication that US regulators are in the process of levying fines of $200m each on a number of institutions because they were unable to track all communications by their employees using WhatsApp or Signal , <xref target="Bloomberg"/>, creates new auditability constraints. It is with growing concern that an ECH enabled ecosystem may clash with future regulatory requirements.</t>
      </section>
      <section anchor="impact-of-ech-deployment-on-network-security-operations">
        <name>Impact of ECH deployment on Network Security Operations</name>
        <section anchor="reminders-on-network-security">
          <name>Reminders on Network Security</name>
          <t>Network Security is a set of security capabilities which is articulated as part of a defense strategy, e.g. Defense In Depth <xref target="NIST-DID"/>, Zero Trust, SASE/SSE, etc. and can trigger and enable other security capabilities such as sandboxing, Data Loss Prevention, Cloud Access Service Broker (CASB), etc. One constituency is a Web Proxy, combining both a TLS proxy and an application level (HTTP) proxy.</t>
          <t>In the same way that <xref target="I-D.draft-ietf-opsec-ns-impact"/> showed the impact of TLS1.3 on operational security, a loss of visibility of the SNI as indicator of compromise (see <xref target="I-D.draft-ietf-opsec-indicators-of-compromise"/>) has two main implications</t>
        </section>
        <section anchor="implications-from-loss-of-meta-data">
          <name>Implications from loss of Meta Data</name>
          <t>The loss of visibility of the SNI, at TLS level, will prevent transparent proxies from applying corporate policies to manage risk and compliancy. Typical examples:</t>
          <ul spacing="normal">
            <li>categories of compromised sites cannot be applied anymore, exposing employees and their organisations to potential cybersecurity risks; alternative approaches to block access to theses sites need to be found</li>
            <li>corporate lists of excluded sites for compliance or policy reasons need alternatives ways to be blocked.</li>
          </ul>
        </section>
        <section anchor="implications-from-loss-of-selective-decrypt">
          <name>Implications from loss of Selective Decrypt</name>
          <t>TLS proxies also have the ability to selectively intercept, avoiding any visibility into or modification of the original application protocol payload - but such selective intercept relies heavily on knowledge of the origin content server hostname, which can be extracted in plaintext from the TLS ClientHello SNI (server name) field.</t>
          <t>This capability allows the application proxy, in particular an HTTPS proxy to engage efficiently specific security controls, e.g. Data Loss Prevention, Sandboxing, etc.</t>
          <t>The loss of SNI visibility will make it more difficult for corporate user flows to be intercepted, with it becoming impossible for BYOD use cases.</t>
          <t>This will create inefficiencies, will require more resources and will increase security risks. It will also be counter productive for privacy as it may require the proxy to decrypt the whole TLS connection.</t>
        </section>
      </section>
    </section>
    <section anchor="specific-implications-for-smbs">
      <name>Specific implications for SMBs</name>
      <t>Small and Medium Business (SMBs) form a particularly vulnerable subset of enterprises and organizations and span from Small Office Home Office (SOHO, sometimes a one person business) to Medium Business with strong variations depending on the country (a 50 employee company is considered the upper range of SMB business in developing countries while it is up to 25'000 in some developed countries).</t>
      <t>Similarly to the above education use case and irrespective of definitions, many SMBs have very limited in-house capabilities to defend themselves, with security often outsourced to Managed Security Service Providers (typically network operators, mid range and small service providers).</t>
    </section>
    <section anchor="public-network-service-providers">
      <name>Public Network Service Providers</name>
      <t>In Public Networks the national, regional and international legislator has to balance between freedom of access to the information on the one hand, and safety of the internet and the protection of other fundamental rights on the other hand.</t>
      <t>There are mainly 2 different approaches:</t>
      <ul spacing="normal">
        <li>First, there are countries which do not have any specific legislation on the issue of blocking, filtering and takedown of illegal internet content: there is no legislative or other regulatory system put in place by the state with a view to defining the conditions and the procedures to be respected by those who engage in the blocking, filtering or takedown of online material. In the absence of a specific or targeted legal framework, several countries rely on an existing "general" legal framework that is not specific to the internet to conduct - what is, generally speaking - limited blocking or takedown of unlawful online material. here the approach has been differentiated in relying on self regulation from the private sector or limited political or legislative intervention to specific areas.</li>
        <li>The other approach has been to set up a legal framework specifically aimed at the regulation of the internet and other digital media, including the blocking, filtering and removal of internet content. Such legislation typically provides for the legal grounds on which blocking or removal may be warranted, the administrative or judicial authority which has competence to take appropriate action and the procedures to be followed.</li>
      </ul>
      <t>In relation to specific areas where the public interest has to be protected more strongly, such as child abuse crimes, terrorism, criminality and national security, many states have a framework for the urgent removal of internet content regarding the above materials without the need of a court order. In such circumstances, administrative authorities, police authorities or public prosecutors are given specific powers to order internet access providers to block access without advance judicial authority. It is common to see such orders requiring action on the part of the internet access provider within 24 hours, and without any notice being given to the content provider or host themselves.</t>
      <t>Particularly in relation to material concerning child abuse and other serious crimes, many countries adopt a “list” system, whereby a central list of blocked URLs or domain names are maintained and updated by the relevant administrative authority. This is notified to the relevant internet access providers, who are required to ensure that blocking is enforced.
Additionally in some states the authorities can request the removal of content that infringes intellectual property, privacy or defamation rights. In this case the removal need to be requested by a court order.</t>
      <t>Generally speaking, the grounds relied on broadly correspond to the interests protected under Article 10(2) of the European Convention of Human Rights (ECHR), namely: the protection of national security, territorial integrity or public safety, the prevention of disorder or crime, the protection of health or morals, the protection of the reputation or rights of others, and the prevention of the disclosure of information received in confidence.
From the methodology we have to distinguish between blocking or takedown of content.</t>
      <ul spacing="normal">
        <li>The blocking, filtering or prevention of access to internet content are generally technical measures intended to restrict access to information or resources typically hosted in another jurisdiction. Such action is normally taken by the internet access provider through hardware or software products that block specific targeted content from being received or displayed on the devices of customers of the internet access provider.</li>
        <li>Takedown or removal of internet content, on the other hand, will instead broadly refer to demands or measures aimed at the website operator (or "host") to remove or delete the offending website content or sub content.</li>
      </ul>
      <t>In these considerations we will refer to blocking only.</t>
      <t>This can be achieved through a number of techniques, including the blocking of the Domain Name System (DNS), the analysis of the SNI field or the Uniform Resource Locator (URL).
Given the increasing adoption of encryption techniques often a mixture of the above techniques is needed.</t>
      <t>In particular for the most serious crimes such as child abuse or national security many countries adopt a “list” methodology, where a central list of blocked Domains or URLs is maintained by the authorities and updated on a regular basis (daily or even hourly) and shared with Public Network Operators that have to enforce the blocking.</t>
      <t>In many jurisdictions there are legal consequences for the Operator not complying with the blocking order.</t>
      <t>Technically the blocking can be implemented using some techniques that have been adapted during time based on the new technologies introduced.</t>
      <t>Historically  depending on the content of the list the technique have been based on DNS or proxy blocking.</t>
      <t>DNS is effective on Domains (the whole domain is blocked), while proxy is effective either on Domain (for encrypted traffic) or URL (for unencrypted traffic).</t>
      <t>Given that nowadays the vast majority of traffic is encrypted, the capability of blocking based on URL is limited to a small portion of traffic and proxy blocking is as effective as that based on the DNS.</t>
      <t>Theoretically DNS blocking would be the preferred option for operators given the more limited investments necessary to implement blocking of the Domains, but given the increased usage of external encrypted DNS services DNS blocking is becoming less effective and operators need to use SNI analysis as well in order to fulfil legal obligations.</t>
      <t>The adoption of ECH will cause additional problems and limit the possibility of implementing operators fulfilling their legal blocking obligations, exposing the population to illegal content related to crimes such as Child Sex Abuse Material (CSAM), malware and other malicious content, and possibly even content deemed to be detrimental to National Security.</t>
    </section>
    <section anchor="threat-detection">
      <name>Threat Detection</name>
      <t><xref target="RFC8404"/> identifies a number of issues arising from increased
encryption of data, some of which apply to ECH.  For example, it
notes that an early trigger for DDoS mitigation involves
distinguishing attacker traffic from legitimate user traffic; this
become more difficult if traffic sources are obscured.</t>
      <t>The various indicators of compromise (IoCs) are documented in <xref target="I-D.draft-ietf-opsec-indicators-of-compromise"/>, which also describes how they
are used effectively in cyber defence. For example, section 4.1.1 of
the document describes the importance of IoCs as part of a defence-
in-depth strategy; in this context, SNI is just one of the range of
indicators that can be used to build up a resilient defence (see
section 3.1 in the same document on IoC types and the 'pyramid of
pain').</t>
      <t>In the same Internet-Draft, section 6.1 expands on the importance of
the defence in depth strategy.  In particular, it explains the role
that domains and IP addresses can play, especially where end-point
defences are compromised or ineffective, or where endpoint security
isn't possible, such as in BYOD, IoT and legacy environments.  SNI
data plays a role here, in particular where DNS data is unavailable
because it has been encrypted; if SNI data is lost too, alongside
DNS, defences are weakened and the attack surface increased.</t>
    </section>
    <section anchor="potential-further-development-of-this-work">
      <name>Potential further development of this work</name>
      <t>This work could consider several potential developments:</t>
      <ul spacing="normal">
        <li>If ECH is enforced what are the solutions to all the above problems and what are the migration paths?</li>
        <li>Elaborate on endpoint security complications as <xref target="I-D.draft-taddei-smart-cless-introduction"/> as well as <xref target="MAGECART"/> <xref target="MITB"/> <xref target="MITB-MITRE"/> <xref target="MALVERTISING"/> showed that in some cases, the only way to detect an attack is through the use of network-based security. The loss of visibility of the SNI data will make it much harder to detect attacks. The endpoints components (operating system, applications, browsers, etc.) cannot be judge and party.</li>
        <li>There are need for further clarifications from the ECH draft, e.g. The link between the Client Facing and the backend servers are not clear enough and need further description. It can't be just 'left to the implementation'</li>
        <li>Will there be any impact to the DNS by adding so many new RRs?</li>
        <li>What happens if Client Facing servers are controlled by malicious actors?</li>
        <li>The Client Facing servers are acting as a new category of middleboxes. In this shift left movement, until the attack surface is minimal and complexities are removed, you have to rely on third parties for inspection. In these conditions, on which basis can they be more trusted than any other middleboxes? Is this creating a concentration problem?</li>
        <li>What prevents a Client Facing server providing security solutions to protect the data path?</li>
        <li>Consolidation considerations - the use of ECH may accelerate the move of content away from standalone servers and on to CDNs, reducing infrastructure resilience.</li>
        <li>Find missing sources to illustrate a number of points, e.g. show how adversaries use digital transformation to accelerate their attacks, how ECH will increase security risks.</li>
        <li>Keep streamlining, clarifying the text e.g. the 2 approaches in the public network service providers section, "Technically the blocking ...".</li>
      </ul>
    </section>
    <section anchor="conclusion">
      <name>Conclusion</name>
      <t>Access to SNI data is sometimes necessary in order for institutions,
including those in the education and finance sectors, to discharge
their compliance obligations.  The introduction of ECH in client
software poses operational challenges that could be overcome on
devices owned by those institutions if policy settings are supported
within the software that allows the ECH functionality to be disabled.</t>
      <t>Third-party devices pose an additional challenge, primarily because
the use of ECH will render transparent proxies inoperable.  The most
likely solution is that institutions will require the installation of
full proxies and certificates on those devices before they are
allowed to be connected to the host networks.  They may alternatively
determine that such an approach is impractical and instead withdraw
the ability for network access by third-party devices.</t>
      <t>An additional option that warrants further consideration is the
development of a standard that allows a network to declare its policy
regarding ECH and other such developments.  Clients would then have
the option to continue in setting up a connection if they are happy
to accept those policies, or to disconnect and try alternative
network options if not.  Such a standard is outside of the scope of
this document but may provide a mechanism that allows the interests
and preferences of client software, end-users and network operators
to be balanced.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>In addition to introducing new operational and financial issues, the
introduction of SNI encryption poses new challenges for threat
detection which this document outlines.  These do not appear to have
been considered within either <xref target="RFC8744"/> or the current ECH Internet-
Draft <xref target="I-D.draft-ietf-tls-esni"/> and should be addressed fully within
the latter's security considerations section.</t>
      <t>This I-D should help improve security in deployments of ECH.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="acknowledgment">
      <name>Acknowledgment</name>
      <t>In memory of Simon Edwards who passed away in the night of 8th-9th of January 2023.</t>
      <t>In addition to the authors, this document is the product of an
informal group of experts including the following people. :</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="CIPA" target="https://www.fcc.gov/consumers/guides/childrens-internet-protection-act/">
          <front>
            <title>Children's Internet Protection Act (CIPA)</title>
            <author>
              <organization>FCC</organization>
            </author>
            <date year="2019" month="December" day="30"/>
          </front>
        </reference>
        <reference anchor="Coroner" target="https://www.judiciary.uk/publications/frances-thomas-prevention-of-future-deaths-report/">
          <front>
            <title>Prevention of future deaths report</title>
            <author initials="" surname="Henderson" fullname="Henderson">
              <organization/>
            </author>
            <date year="2021" month="November" day="26"/>
          </front>
        </reference>
        <reference anchor="ECH_Roundtable" target="https://419.consulting/encrypted-client-hello/">
          <front>
            <title>Encrypted Client Hello - Notes from an ECH Roundtable</title>
            <author>
              <organization>419 Consulting</organization>
            </author>
            <date year="2021" month="August" day="18"/>
          </front>
        </reference>
        <reference anchor="KCSE" target="https://419.consulting/encrypted-client-hello/">
          <front>
            <title>Keeping children safe in education 2021</title>
            <author>
              <organization>DfE</organization>
            </author>
            <date year="2021" month="November" day="01"/>
          </front>
        </reference>
        <reference anchor="Bloomberg" target="https://www.bloomberg.com/news/articles/2022-08-16/wall-street-sticker-shock-whatsapp-fines-were-years-in-making">
          <front>
            <title>Wall Street's Record Fines Over WhatsApp Use Were Years in the Making</title>
            <author initials="S." surname="Spezzati" fullname="Stefania Spezzati">
              <organization>Bloomberg</organization>
            </author>
            <author initials="M." surname="Robinson" fullname="Matt Robinson">
              <organization>Bloomberg</organization>
            </author>
            <author initials="L." surname="Beyoud" fullname="Lydia Beyoud">
              <organization>Bloomberg</organization>
            </author>
            <date year="2022" month="August" day="16"/>
          </front>
        </reference>
        <reference anchor="MAGECART" target="https://en.wikipedia.org/wiki/Web_skimming#Magecart">
          <front>
            <title>Magecart</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2022" month="April" day="03"/>
          </front>
        </reference>
        <reference anchor="MALVERTISING" target="https://en.wikipedia.org/wiki/Malvertising">
          <front>
            <title>Malvertising</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2022" month="June" day="02"/>
          </front>
        </reference>
        <reference anchor="MITB" target="https://owasp.org/www-community/attacks/Man-in-the-browser_attack">
          <front>
            <title>Man-in-the-browser attack</title>
            <author>
              <organization>OWASP</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MITB-MITRE" target="https://attack.mitre.org/techniques/T1185/">
          <front>
            <title>Browser Session Hijacking - T1185</title>
            <author>
              <organization>MITRE</organization>
            </author>
            <date year="2022" month="February" day="25"/>
          </front>
        </reference>
        <reference anchor="NIST-DID" target="https://csrc.nist.gov/glossary/term/defense_in_depth#:~:text=Definition(s)%3A,and%20missions%20of%20the%20organization.">
          <front>
            <title>Glossary - defense-in-depth</title>
            <author>
              <organization>NIST</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SOLARWIND" target="https://symantec.broadcom.com/en/solarwinds-sunburst-attacks">
          <front>
            <title>SolarWinds (Sunburst) Attack What You Need to Know</title>
            <author>
              <organization>Symantec, a Division of Broadcom Software Group</organization>
            </author>
            <date year="2020" month="December"/>
          </front>
        </reference>
        <reference anchor="LOSSINCAP" target="https://www.amf-france.org/sites/default/files/2020-02/etude-sur-la-cybercriminalite-boursiere-_-definition-cas-et-perspectives.pdf">
          <front>
            <title>La cybercriminalité boursière – définition, cas et perspectives</title>
            <author initials="A." surname="Neyret" fullname="Alexandre Neyret">
              <organization/>
            </author>
            <author>
              <organization>Autorité des Marchés Financiers</organization>
            </author>
            <date year="2019" month="October" day="10"/>
          </front>
        </reference>
        <reference anchor="LOSSINCREDITSCORE" target="https://www2.deloitte.com/content/dam/Deloitte/global/Documents/Risk/gx-risk-gra-beneath-the-surface.pdf">
          <front>
            <title>Beneath the surface of a cyberattack – A deeper look at business impacts</title>
            <author>
              <organization>Deloitte</organization>
            </author>
            <date year="2016"/>
          </front>
        </reference>
        <reference anchor="LOSSINREVENUE" target="https://anozrway.com/wp-content/uploads/dlm_uploads/2022/09/ANOZR-WAY_Barometre-Ransomware_edition-septembre-2022.pdf">
          <front>
            <title>BAROMÈTRE ANOZR WAY DU RANSOMWARE</title>
            <author>
              <organization>ANOZR WAY</organization>
            </author>
            <date year="2022" month="September" day="04"/>
          </front>
        </reference>
        <reference anchor="RFC8890">
          <front>
            <title>The Internet is for End Users</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <date month="August" year="2020"/>
            <abstract>
              <t>This document explains why the IAB believes that, when there is a conflict between the interests of end users of the Internet and other parties, IETF decisions should favor end users. It also explores how the IETF can more effectively achieve this.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8890"/>
          <seriesInfo name="DOI" value="10.17487/RFC8890"/>
        </reference>
        <reference anchor="RFC7258">
          <front>
            <title>Pervasive Monitoring Is an Attack</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="May" year="2014"/>
            <abstract>
              <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="188"/>
          <seriesInfo name="RFC" value="7258"/>
          <seriesInfo name="DOI" value="10.17487/RFC7258"/>
        </reference>
        <reference anchor="RFC8404">
          <front>
            <title>Effects of Pervasive Encryption on Operators</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty">
              <organization/>
            </author>
            <author fullname="A. Morton" initials="A." role="editor" surname="Morton">
              <organization/>
            </author>
            <date month="July" year="2018"/>
            <abstract>
              <t>Pervasive monitoring attacks on the privacy of Internet users are of serious concern to both user and operator communities.  RFC 7258 discusses the critical need to protect users' privacy when developing IETF specifications and also recognizes that making networks unmanageable to mitigate pervasive monitoring is not an acceptable outcome: an appropriate balance is needed.  This document discusses current security and network operations as well as management practices that may be impacted by the shift to increased use of encryption to help guide protocol development in support of manageable and secure networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8404"/>
          <seriesInfo name="DOI" value="10.17487/RFC8404"/>
        </reference>
        <reference anchor="RFC8744">
          <front>
            <title>Issues and Requirements for Server Name Identification (SNI) Encryption in TLS</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema">
              <organization/>
            </author>
            <date month="July" year="2020"/>
            <abstract>
              <t>This document describes the general problem of encrypting the Server Name Identification (SNI) TLS parameter. The proposed solutions hide a hidden service behind a fronting service, only disclosing the SNI of the fronting service to external observers. This document lists known attacks against SNI encryption, discusses the current "HTTP co-tenancy" solution, and presents requirements for future TLS-layer solutions. </t>
              <t>In practice, it may well be that no solution can meet every requirement and that practical solutions will have to make some compromises.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8744"/>
          <seriesInfo name="DOI" value="10.17487/RFC8744"/>
        </reference>
        <reference anchor="I-D.draft-ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>RTFM, Inc.</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="3" month="October" year="2022"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-15"/>
        </reference>
        <reference anchor="I-D.draft-ietf-opsec-indicators-of-compromise">
          <front>
            <title>Indicators of Compromise (IoCs) and Their Role in Attack Defence</title>
            <author fullname="Kirsty Paine" initials="K." surname="Paine">
              <organization>Splunk Inc.</organization>
            </author>
            <author fullname="Ollie Whitehouse" initials="O." surname="Whitehouse">
              <organization>Binary Firefly</organization>
            </author>
            <author fullname="James Sellwood" initials="J." surname="Sellwood">
         </author>
            <author fullname="Andrew S" initials="A." surname="S">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="3" month="February" year="2023"/>
            <abstract>
              <t>   Cyber defenders frequently rely on Indicators of Compromise (IoCs) to
   identify, trace, and block malicious activity in networks or on
   endpoints.  This draft reviews the fundamentals, opportunities,
   operational limitations, and recommendations for IoC use.  It
   highlights the need for IoCs to be detectable in implementations of
   Internet protocols, tools, and technologies - both for the IoCs'
   initial discovery and their use in detection - and provides a
   foundation for approaches to operational challenges in network
   security.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsec-indicators-of-compromise-04"/>
        </reference>
        <reference anchor="I-D.draft-mcfadden-smart-threat-changes">
          <front>
            <title>BCP72 - A Problem Statement</title>
            <author fullname="Mark McFadden" initials="M." surname="McFadden">
              <organization>internet policy advisors</organization>
            </author>
            <date day="22" month="January" year="2022"/>
            <abstract>
              <t>   RFC3552/BCP72 describes an Internet Threat model that has been used
   in Internet protocol design. More than eighteen years have passed
   since RFC3552 was written and the structure and topology of the
   Internet have changed. With those changes comes a question: has the
   Internet Threat Model changed? Or, is the model described in RFC3552
   still mostly accurate?  This draft attempts to describe a non-
   exhaustive list of changes in the current threat environment. It
   finds that there are both qualitative and quantitative differences
   from the environment described in RFC3552 and is intended as input
   to the IAB program on the Internet threat model started in 2020.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mcfadden-smart-threat-changes-04"/>
        </reference>
        <reference anchor="I-D.draft-ietf-opsec-ns-impact">
          <front>
            <title>Impact of TLS 1.3 to Operational Network Security Practices</title>
            <author fullname="Nancy Cam-Winget" initials="N." surname="Cam-Winget">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Eric Wang" initials="E." surname="Wang">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Roman Danyliw" initials="R." surname="Danyliw">
              <organization>Software Engineering Institute</organization>
            </author>
            <author fullname="Roelof DuToit" initials="R." surname="DuToit">
              <organization>Broadcom</organization>
            </author>
            <date day="26" month="January" year="2021"/>
            <abstract>
              <t>   Network-based security solutions are used by enterprises, the public
   sector, internet-service providers, and cloud-service providers to
   both complement and enhance host-based security solutions.  As TLS is
   a widely deployed protocol to secure communication, these network-
   based security solutions must necessarily interact with it.  This
   document describes this interaction for current operational security
   practices and notes the impact of TLS 1.3 on them.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsec-ns-impact-04"/>
        </reference>
        <reference anchor="I-D.draft-taddei-smart-cless-introduction">
          <front>
            <title>Capabilities and Limitations of an Endpoint-only Security Solution</title>
            <author fullname="Arnaud Taddei" initials="A." surname="Taddei">
              <organization>Broadcom</organization>
            </author>
            <author fullname="Candid Wueest" initials="C." surname="Wueest">
              <organization>Acronis</organization>
            </author>
            <author fullname="Kevin A. Roundy" initials="K. A." surname="Roundy">
              <organization>Norton Lifelock</organization>
            </author>
            <author fullname="Dominique Lazanski" initials="D." surname="Lazanski">
              <organization>Last Press Label</organization>
            </author>
            <date day="13" month="July" year="2020"/>
            <abstract>
              <t>   In the context of existing, proposed and newly published protocols,
   this draft RFC is to establish the capabilities and limitations of
   endpoint-only security solutions and explore benefits and
   alternatives to mitigate those limits with the support of real case
   studies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-taddei-smart-cless-introduction-03"/>
        </reference>
      </references>
    </references>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="E." surname="Chien" fullname="Eric Chien">
        <organization>Broadcom</organization>
        <address>
          <email>Eric.Chien@broadcom.com</email>
          <uri>https://www.linkedin.com/in/eric-chien-66b4b258/</uri>
        </address>
      </contact>
      <t>Eric contributed to the analysis of the Man in the Browser attacks.</t>
      <contact initials="G." surname="Scalone" fullname="Gianpaolo Scalone">
        <organization>Vodafone</organization>
        <address>
          <email>gianpaolo-angelo.scalone@vodafone.com</email>
          <uri>https://www.linkedin.com/in/gianpaoloscalone/</uri>
        </address>
      </contact>
      <t>Contributed the research on the conflicts of ECH with local legislations to block.</t>
      <contact initials="D." surname="Engberg" fullname="Daniel Engberg">
        <organization>Skandinaviska Enskilda Banken AB (SEB)</organization>
        <address>
          <email>daniel.engberg@seb.se</email>
          <uri>https://www.linkedin.com/in/daniel-engberg-1561aaa/</uri>
        </address>
      </contact>
      <t>Validate the issues for his organization.</t>
      <contact initials="C." surname="Leroy" fullname="Celine Leroy">
        <organization>Eight Advisory</organization>
        <address>
          <email>celine.leroy@8advisory.com</email>
          <uri>https://www.linkedin.com/in/celine-leroy-1a534252/</uri>
        </address>
      </contact>
      <t>Thank you to Céline for her work on cybersecurity financial impacts on enterprises.</t>
      <contact initials="D." surname="Engberg" fullname="Daniel Engberg">
        <organization>Skandinaviska Enskilda Banken AB (SEB)</organization>
        <address>
          <email>daniel.engberg@seb.se</email>
          <uri>https://www.linkedin.com/in/daniel-engberg-1561aaa/</uri>
        </address>
      </contact>
      <t>Validate the issues for his organization.</t>
      <contact initials="G." surname="Tavano" fullname="Gianpiero Tavano">
        <organization>Broadcom</organization>
        <address>
          <email>Gianpiero.Tavano@broadcom.com</email>
          <uri>https://www.linkedin.com/in/gianpiero-tavano-5b975383/</uri>
        </address>
      </contact>
      <t>Review the text, provided feedback and reminded us on the budgetary issues</t>
      <contact initials="R." surname="duToit" fullname="Roelof duToit">
        <organization>Broadcom</organization>
        <address>
          <email>roelof.dutoit@broadcom.com</email>
          <uri>https://www.linkedin.com/in/roelof-du-toit-a66831/</uri>
        </address>
      </contact>
      <t>Roelof contributed many things including research, former I-D, text, the newly setup github, etc.</t>
      <contact initials="D." surname="Lopez" fullname="Diego Lopez">
        <organization>Telefonica</organization>
        <address>
          <email>diego.r.lopez@telefonica.com</email>
          <uri>https://www.linkedin.com/in/dr2lopez/</uri>
        </address>
      </contact>
      <t>Diego contributed in several aspects including MCPs.</t>
      <contact initials="G." surname="Tomic" fullname="Gary Tomic">
        <organization>Broadcom</organization>
        <address>
          <email>gary.tomic@broadcom.com</email>
          <uri>https://www.linkedin.com/in/garytomic/</uri>
        </address>
      </contact>
      <t>Gary contributed many things including research, keep us on scope, critique for when issues where not impacted by ECH as we initially thought.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9V9224k19XefT1FYRRDpNPdPMyMPBojsDgkJdGeU9gjDfwH
gbC7and3idVVrTqwp61MYOQq97lJgD/3MZC38Jv4SbK+tdY+VHdzbP1JgMSA
bQ5Zh73XXodvHWs8Hidd0ZX2efrousqa7bqzeXpZFrbq0m9tWdbplV2X9XaF
X1zWVVvktjFdQT89Ssxs1th73Hr57aeuy+usMit6R96YeTfOzGpdFtVibLPl
OPe3jbPBbePTJ0lSrJvnadf0bXd+evrl6XmSme55WlTzOmn72apoW7q0267p
2TfX775OTGPN83R6fZlsFs/T1mZ50a5Nly2TpO1Mlf9gyrqii7e2TdqVabof
furrzrbP06pO1sXz9N91dTZK27rpGjtv6aftCj/8+yQpTUWPtFVyt3mepOk4
pU3L/1edbdZN0dIz8e83a92CKdOpzfqm6LaJ6btl3TxPxrR4etvF5PeT9FLp
QHcJeS6qvLGb+Pd1Q+98cvYlk7QvO/pt+rJYFXRK9Fe7MkXpbpu4276i6yfh
erqOlvA8XXbdun1+crLZbCbDK07cqt5O0u+LD4X1C3pr+tL/itdyS+zxwjRV
ePuarvmqsfmMfjuha+L36euiv/p3XU3S902xWHb+ZVfmvsjDL/l13/0hnZq5
bdIbELmyxFvEKY0Nr89x12TDd33VbhbzEq+Z9He7+27xnEIfo9echPNI35k8
t0U4i6YyfR5+y8t50dQmz+oV/bulVVjixbPH56fpbUFXNUSu5i69auivGZ05
8aGp0t/XLVbb2AVxxPP08gJ/rXN6w5dPzx6f8b962hJd/t00/SztW5u+e3mV
HtkPmV13RIFjere7iBdH96yXzMb/+snZb758evrF2dn5lxE/8NInsvSvZrrm
iax7jxeIZe5sXlT4+0lRnRi+u+ObPX2mk/Q635gmbz2BpsWqrqLf/r9FICUF
L3Kii/zFpGhxN4mJCvFJQhqqa4pZ35Eo01Km9C7ss8+6vrGpaVMR87Qs2m6U
0nXporYtkbCr0+jelsgqRLxuiiy9XJK6PUBB3QOumfA1v3gDxPDZOMOt4y++
mD2ZnT99dsIE1aUwxf8D/SaVlfg/kJTTkrslbYrU2LYt2rSe879f0ZEVFf9I
S920dKqm60x21078rr4pTLU2NRmPacYK123u+zo3c/m3bm7hLh2TerVlPWnl
jq/u9dJ/dKv+QfqAh/Z5GW+RNtHY1pomW6a1bIrumZdF1vGGYdc2RbdMy5qe
mpbEo20p5gn0mdGv78K2r0xV2JLswWJmG6+9p3dkd4qK1FR7Z+iP7V1R5oaU
KK2/Si9epEfT6xfHsULDUyZWnvJVa2cTFpC/SwG5caw3js+efnFmjNmjA1Ph
e1MWueksb5msaE9cOifGXeKgmwU96U+8zbC5S0vvs+lL29Rbt7VrKN30Iqet
1c02bCHjayclrv3qmdG//6MnKXeP+e7xmXn6+Mn50/OHjvPdkuiYbuse53H5
17/wInknxJibmtQNnWu2JYo4KU7ndBhVVtB5Fqu14ZOuyK57I/7/24EqJX75
kbKYFkRmsnL3hgDQgyrIXzmRK3+xIlq4B4w7fsD46ezL3zx9/OzxQ7u5tfcF
QSHspbMfSJmum5oMPQnt3AJNZHekmXKS3lVR4bd96wR41ucL2xkyBUIEv93b
mvTLPM37d3XRPbzXhi+b5KSoi+4Xb1TuHuf9GLePzRdfPHt89uAmZUWx1l2Z
akvbIFQGs5GVfQ7I55TUCCe6AhwaX42UMNhzZTflluBu169Jo3bLfjZKbZdF
nFzYRZ2+rNf2T27n72xpScEWmYlYFZdNmkmJC7/q/BX/6O7z5pxvfWjDsox4
v2RKWntPgLkk87m2kMaw7VeXb2OrgjN9V6+K7OHDW9A1kw7X/HIWpVv5zocW
z+//JWd1Z+1aGbPNiCyjNCMFVPzUi4baLEldqKDSzwQgqrpTnURPn23Z/BCo
2JA8V3SjKUu8r+5J606SpCJWIIm+t1Dpt19fPnvy7MnzhHymah7/5fLm7YUo
fXX0CEqU5DBUn7cBVb9tyAvKsNv0IuvSI9x0LDeZZgEYF5NunmWTRX1/Aoet
J3ZsTxY9yWZ7kumj27ED2uO1f/KY9nXCz3TOEH4ey1F+fXnJ/4QGe56en559
OT47Hz8+xQbqhux5M9jDW/I7SWVjvSRA857xV25Nt2zpANbkvj24+B/pmEj7
E58Q/l/3MzL2YtFP5g3ZBduOaXEr09LK3TvGJNHyjrG8YyzvOLQb4dVvLWml
pq2rwabOz8ZnZ+PzL+iXdLQ/3BJkJaA9K+1gbw/44eP0NTzVdN7UK9J9zBzh
CQe3CzcvC26edQ8eZ/zg8RIPfvBIhm7n7kZOn43PntEv/3A5vR4s/w/E9ZAD
xwspHC/Iuc17oTQ/4P/Cgq/m1wfIfYpXvSjregUrOljqe5KodMp+CgnDrc3q
Jk+/JgTRpm9IJ6Xvl6ZrL9br9DvyOd5DQv9Iot06/PvK3DnCHGK0mXsnaxhS
0S35Vl2RlSQotLhzJuEXJxtaxFicJfq/IruzzbhdErAcb/B6s16P51jSeEML
GG+xAJKu8Sq8/BADTjs7J5Nv0impYxh+/qvTm25lg1teEY4njpqRw6d8+8nL
X25zevwLS9grf/hqfxa6Xfrlq4tvri8vbt89P0g5W002xV2xJtVsOGCAf528
t7MfCGetyNovPntlFjYzTsTlKAe/O8Ab790z91b1ZHz6mFf18vvr23c305vX
3/ySlb0yJbFKV7SeFdyCdn7/ixb1xfj0HIu6effi8GLqDZlLWcVmMyYGW/UV
XFT1xWhZFbiE2HQ8EzftB/nTcI27F6XRRQcW/Ob9xfRtWKyucEz/c3t9eJ3y
vMmqIAbn5ZIxWFawge3Ju7OzZ09P4gU5j3JqObCXflv8SHdDm4xTvvqhhfEK
9qh4Pj7HHa9vpu/GVzdXh1eYtU02qchhZ5O2IAeyJeNA62xWJ7mdkzGzPxTV
D7ldd8vPnv/H50Bd/+bKztkk19VRe/yrxxcjAqO/Oj/VgGRLP9Zz+h+iLH4c
oO9ou9/oy2gX+iYcB7/poY1iL4MDmL55eXH7/ub1A7trt4RSiOaTGA4RK5+0
dWmaDYHndtz21axvWkKrwjzxEqe47D0uI7dGrztOL/hC1o/pH8n3em0lYPCH
qt48tPKprmSUGsKB5Dyp8XYgjl417zaGlOw3Td2vh4d5SmiAfvPyzZTk8/Li
7eHNQuuaFdlqNuTMbm1BNhPnaMimnMwLVb6nxBwnBJdzS7tvxqUZs49I+Iw0
DDlSHUlETXstoHN/oCNxxz3OCBkA1pB1B1wlkNVO1vn8QUV8UdoPBgFaItK2
sV1MkvQC0aCi++tf6PxbEkeCjX/9SwsTBA+VXhEfxUuT7iyS7pNV/vV/0PP/
9uf/kuZ//YtbKaFNwo6E7eKl7mEsIuxpIOzt9dXNu+nlGyfNh4wsuSxF19mB
2NoKsIiNIpFzbjKLk9X1Clfx8i5on5bWk5KNIAeuI2ethW1rnSs+XN8XD53y
+STXZTA7A5QTPCCHeXXi1gdJnpny5KrOemQX2pNb8tdPFh/G5OTfjReNGc9k
2az/dNl6lEKO2+vvr19/9zApLl6/+afb9P3FH/cUz5dIXsQEurh98+qv/5l0
VLgpvfouvb14PX3z6v2F6q495VnVf2o2hiMnJ5v12O2zX5ckM8TW5eoH9zNe
fHL65Qk/f0zP/+GFIaRoSe+Obw2Z9BVk6weyNszGLSkZu5rRH3Ejb1u9iGdf
nqpD8Zvzp8+8b3H6xP34myf8I7mgE8nnFLabj7uS5KKtigN/qtetzUiz5UDa
NcEXgtO0I/IMSF/a4Q2rbI7IMy0Q2Rk6moaOaJwtER1sH3w2HA5moOEVEsTW
RwF3sV/S1AREJRRG/xmPx6mZEf6iu5PkHaIlubIMOWcI3VoOMJB2E8dKo4Rq
cOneuu8k5sIrcHHSkNdyv6H9ruvW5skDAP+IEP1xymkq0yA4SfKhCLgli9gA
kb5GdPtGKAn9eTR9fXPMkZC6Q8SLmNBMyM+m/8O9Zk1Q2kTe5FFh+ZpE/FVx
wLE4u7MmXtJNRX7XcSrBXwQ/u2KFCBM7d7btEiIK8dIasu/Da0SDuokdYpKb
1mr8Bv8uKg7SrUzJ2j636h+O0jX9u+pMKXH2umxHqbJ8Spq7Q/pmgYNQz4xe
lUF30G/cwwIlIOXkLRMfzAuyOStQlRa2DQt1L5FICR29jU5eyEMbnxEeudeQ
L0KJfYM1chaC9KvG2OgUHFlJ692bhnhzm2poh/BCS2dy06XLYrEsETNt02Ut
wS08h/mDDhtPIGInxEjkXJKxdDH4mjOKoCpdOqP9peK38nbXTXGPQyFnG/HO
ln9JDsQmvAQwI4FC9vRyC043BblAmcEy8gKkgutlvYvDp+YstUkaiCF+BFEK
ehieRfIxpvsbOq340OnmGkeHQOvGmjtb4fegySAay8AnQ9R1StoqJaBYLJTc
ONAixyPmhVWBWJltOmOyzfuSac/v5CXOtsprLpHsFmLyeo1HggZtvwZ1+VZI
hGy0aNJW4cdEdMKqyHNyq/GfzxAn8VojIfkj/Y90Fjbfwv0u2mVa4FSJ9u2S
9iphuXcvp6BgV2d1Sedjc6YX3UHv57SCIb4mQBXuS1d0QOTK0JGUpWYoYiUx
SS9ahJzaA7ewtkpJzZlGQ4MFKZAP0DktXUTKkA58lNrJYsLPjVRKuqdSNssi
o/XRKzdKiln9wbIIsLizzN3hjIkPcYoZswnzAOS4AyfRQpADQ1irrsot09wf
PCl28jNb3hFuEMSwwblpuAuIBS8yyGDRj2tIYotfqrZipWG8YqXNEsMxK9Bd
IP7Z5LGj5CeV7s8/P2DNPn4EWQnB2NW6U+2jLwdxNIO0MgUztyOykx4+C1Ut
PtS2ASqrSKrozHLOGTrRBQWcFNM5GRzArAQJEijJZgW1ufGaAsqBBLIlkdFY
eGZBHA4QCU+vLUnaJLki6pX1mmFQWhZ0bOD8FZKxxIE9acYV691U7KxbPuBo
AeXcNzZRI+a2MRLeYJFeG4Q01xx8Q1bMBqlAvJ6Wk5COWNcFXs+Z0NWKYCwU
g9MjKLlYRRqDmAUCoqY1uSO/gg4RugebatTPCrYWD0nrTYXtIilEh6Z7IU3Y
lzl4MIHeQFiugzJKWRHTexZEs0q06s6mfYZIUwuJP0PWu9FaTX4PlRaYu0Ap
hsYVme2JACkryUnyDb+QntfawXUsrxmWV0BYwsLTwcITRxhbsKHDoiP6zCUZ
zjE0EWjWNP79dHBkC/oONpit/88/K+r7+FFYFWa0sZGFk+B0kDlHdm9EVCkb
p5bJPpNJ6VQQGwT+JC0Fo4y7gySvahL1mjU12+75nNYozAB4PodWPSKVFVfZ
yFW4xZshkFhYnpiAjHTb1YhLi3kzayyokNyY6fTCcBFb0Iy3MLMk6k2qQWub
H0/Sb+sNEhQsMmsE98HFxFykVYBJ+dUCOQLFjljJxksmQsMA8NVO3PeRyJzP
DjwBB9apyGNVIfXsR3Hj5AB2kCpRGmUHTEZCLuQlzoTogCM10hBRXZLPfEqO
G/eA0aRMgW0nnUHZ+0w3v42oQupoRVey6UMMR85YRNCpGMceQjCoZlPSDt4v
i5KWV/BiZWeq3aR2g1mZTuf7t69JJ5ZtbFtFxSSsYkTjExAlLAfIQrwJWoEC
ergOVBk8i/U3La8s2BW1CeSZkQJf14xS+q3IkQF4y5Y1dMnK5BaXSeDZg4NR
ckhFHZREoumJimJEFIClBO+FmMZ6iyjEkgini6xOXrTEoOAcNiTIG6ECodJA
izKoiPTnieNgTinpUUA+UBOXwvknBOW0Ec6ayUsyUS+qQt5hukQiygFH9hWB
ZjJS7pQUmtnD0ktkho4FDTPU5fBdRBxiZ+v2Bi9ysDeHpoPzAEZ01tDxa5tw
EgyS3KayJuazNXw2QaERNIwTaByQWBZzcDZcHrAdJ4uZPyKNRttb2nKdch4r
YLaYq4sqcdiR7o1Iw3gbGwgYnGwQoZp4zxVyN6P0EczIAeMQFAVvBUqMpQra
tXYI1Z9M3SR82dIAC33A04ABFo21YuP5r2wnRSCic6K1g2kS9YxY1ZN6C7LU
OQABJC2IjZWsy8BDqy6B/rYwqOJScL5HPTV2gTZmK4u4L2o4oEHJDos8H012
fW7399b51IFUqqywph2nJwkeUnBBYqrijEL+ySsWptaE8IJN8odc5ge93zR4
v8n/Ae83IVfAIhnUBkc4/Zc6wsm/yBEWs8XBg5fkMkZZ1mPvJMdnxdZ1Tv9q
g5KBXiQnaRgQcZKm/pgHDkpiOBUPO7SjBE4EcbIiohknyp1DKJu0pXK+R96s
tjlfyIqBNd4MJrW093CtmbNJNyV7AQxC8cs6J6BGjt/75VYsiyy6b4UvIo/o
d0lydJ1DunhVz8VUtppMpx9JPum8BGATnPiaLowdKgHMTsfSpS7GRAL/Yz3D
T1uv9tUb3qrJJfNbmRiRNZaNMl2sASph+En6wtJj2SGFS2TCCmB7S/gOfGzp
4+DDtHXfZKiMBvQALBUboq7t1espB7j5xJQ85MpFDwbVWUEx0RjR0dbhNMli
WxveRVsLHs7u3vRIZxA5AhNtAVohKpr+kf2Q4D7yyatJGbqQDKps95AP2Q23
qD6acxi5fFNIx5dW6VX97clV/Y7++29Zge7wN4gzh+eMI+uAdghMAUOqiS2g
ujmCMN/nBhgndQ5cIQdO8NYu6BbEMD2UMBo7ZxdZFIDajHBGmRMZcpnIG1UV
JMfRFl2vqvVow9cVoHARAk9kL8v4LEY4wh/7VqwKcispqbfOQXHaEHiCr2K3
/MP2d8cxhzBhiwpKxebsJpB2RlFLLb57Dh7cOBjneSzznpALBcwQcmiLRTXh
+Exw7g8HNRIHQH7zhAGIwmMh2IL8DPh6Dt7u6atk8FANSA2iJYg1+OADO6Ah
lpj4WCLpu6awc329d6V4v3D9iCeAXNRitcmjviJNRbZ9DXv0iDjDiIcHSkbM
kR45dXM+OTtOI7BkEnnjEWlSSAlBBLNe4hJ6RevAuoFFqURWJFDm9Sjr/8QD
a6+4i1g+otc/dr4KAlDBuxSyt/2CHCYHT1bEOI6VBxvFWxLZ6yM5eae8gQZY
z6sWDqgGrOIQDaEjtWil+xM/7RFiFlI+BXLntZw/AGtA7TjuQSBUIkv0trBf
PNFBRI3sgqBNR2YaLkFSSocGUQ8KO2OVSTt+5Lb8+f6eeYWfIxiTCeTNDEnb
UnzPkVguUxZ/krWI0VtZQwgq2pX6I0kc/yRR/Kk3bDV8OHROrJObWVGSuRsN
/ELRkx/w+0Qy9fA6CBTp1cwuhBMZYHOYD+5449HdAK+JV8E1wji86h5KMBeC
FfAvJFbp4lURrlha3qCptmjbubPLulRI+DDOH8YnPKfCBBFQpWPWoIjNfzsM
tDAjsHJZrzl2yrzGJsG0GjJApV/bZ8tkEFlZkohJMGldInkorB/JsTfOjw6c
9qPBOp2iTuSBsBxES0XReLWKPzSoLpYwJSKIol4btvCkbPgPdB4CVUXTE+iD
iymKiRmp2w485qH7nsSRPt4llzraD+gw4vhLFIRjk1RUVS1ZEnGH6oRh0N/f
9jDKRZ4hnipx0VJLP8jxUgfbJUYyhhL3KHimjezB0p20ncnzxhlHMyOapSyf
wamIdFRCzBSw+gqYKVa0UbJP6ja9dmC/LsoSOGcl760zpsjC4NdIqARp8pQg
K7WLfHFghIxqoiez7MA18tabxR4nnS1ruArJruOj2HrPj0OHSlHyThlmhX3C
r0DMiKVDqCrBQpNI5aNWIaaNL0B0Xj1u//nnYXkjougqIwKrwYbX3h2bWjhN
9PvPuDuDLEeSfA2vgnHF0LEQUfe3tnzrSHNVEhTio0k4pxU7cZ2a2UJC4II6
sqKh7bEPxTQ1c7vouaGJxKgshsEWX9HYLRvWt3s+2cirLrGfiZwJuHUJOUTc
v6krdlVGYEz141z82IXlTElCmm89R7GzI++M4lsPWCTRFiRA9NukBnD59t27
t1MXjnj2hAO9l/v+JAhUcjE24pq7IAMa25lCR/9k6EkfJBZzCqehECERF5U0
AnEXKEC6lBj2Q4dCfg1einFztJVja1E4soJJFU1AKxwPVF1CJO5JNRfCjCEo
69NM6QWpsNl2bSRc4ZKzMQmS/YAfWE7CdBpMnlkHFIkC4rDCIIV6hiTvBTiA
3RnQPhx4YG9Q1epzJ8BQeNfVouRAHf33vYHOZVeK3uuzo0JrSHL6KCZEONB2
S67gqn1EJ48q3Y8ffxu9ghnpuynzklP1eq9oDQ+2AtrACX7ikMnureZ9SR41
hzgceTnFRf+QyhMXqpd01ZrxkNridG4RGCoTpKRYmixLP4v+9RjRW85WIbKG
AnXm48/ESXfs/LXfPcpZWVeiC413LeZZoxLCV5VlMAPkux9gIQimZIdVS/wx
In5ekdfTaXz8QKYGLhOCRfnwjInjCUFwObs/gj/gJxQrp01fuqiG0ZP6vE3n
pihVcny4J1n366JUJewjcEr/FC9ukF3Tg4DwknDan/qCLXxoYxT9xrFr8Uzx
I4KPZTG3oLKslQhNoK3SLIBP7iagglF8ayPCeeHhCzj9qjhD9SH71yzJCRfm
bVNJ5Nfku2dIyqELr1jQtnPOIHswFlVQ4Hdux4hxtYkY42K+sxpas4i9KK9d
ARczQ0aCXcnP0lehAiGJsxYKO30EggNIKk6IBJLezNir5kjHPEIJCSxQY9ge
z7ZajQAyEQxBjtzH3xgoIFzoFW2w5KPkoQgYexVuJcyvZjeiKz1RWHJy8451
lWnk7HexQt/2LG78HH6Kc2a8O+DD4N4tIHUn2FJA6IjdRk0bBi/CJ5RI3xdt
F8C8VBkQvVaagCLqCGxaWevTdT4tlkRacDR0ZsR+RP4MB9862p0ob83fJfwu
zosihsDwgqgU+33EDBczTtyoMhKc7TfjHzzypOc3uEidw2qJD10hJE5L3fja
Lt526/ctZQR+nx1Ebq7cmnhuDc4KEw2cJf4KwS9YvnzkfZXA4uyIeX3e7tXA
4BDcwtnTXLFnwepFJVZtYCKFBmLbEHtr+5XHDt76RgEFqeIx96TE8KeJQHUm
lbJqZRcSegi5dmHX1hvXmY0PtdwmLv3K4j0famN+LKfvzOB0EXZqO03liJ8f
SvSE9Vluo+IVxoBx3ozPvy7rhXBISJY7TeiS5VwWo3VUD5l/OcLE2UMH6pyW
lrKZTRU83GibUalVsuZGI+PPyAfc3L9di6HmJthBQ+gOjgh+g0NBvNHfD61Y
BZA8s7E+DiHKeEGfk/pFvI/VNQxnBSBJF7F7SLdXwAvqCSlPuUSfaGCTcDWL
pD4keIjIEqSHyHQMBbPzd9CXNSX0WtD3zFzddq0+AxbrnSwsnjuzUGUZ4gyc
EkPpXTCmQ0dagqptfSiTMS8s6WS8NSEhbPr1IAktodzdrQn/3ERBNvXFD2zR
cGcguY/VApkOB1hGyYDtedeKjlkEWKUQMzXW+bEa+A5qAUebBBvN3lXRSGBn
69lhJrkDTkTgZGdqn9Bmv5CAlyXk7art1HaIyfZxI43BN3ZpFdaShP5EDix4
TJKpiZIqkjHAgqArIgQkZtKtkEuMVENUC+KU10oIiWaK+9AWjWgg+J8Rmd8K
mcnWXyjXaSibCwf050gTqPJmNw3CJPnAFdp4GqREuw2CTcbhDE3JMIdzIgBZ
FS+i+vgQcmBV7S5j1EUY3uQqwxAiXJUXgpNGcbJLfskGJdG3OoEb7EtK++y9
KXvOzEaJIz3rRNNQjsuVj0JqHnn3e4ReUkc+VzIkwuhKTtZ9I+WHIR+KavV0
Zko0OADiu8ihz6JrRKcx4i9AhkcDWRAZVTCneknICyn+XF13PaxBuU0H4mmQ
1oeL8wKKKgy8YFolcVEIfiul+XEuhPb+Hs95FMnsI7mbN4ZjELozg6AmAuA5
u4Nlk7MKLx3kWEKWiNTfCsUPGt+NT0pLQMtgHvaXCNhvyzmwTHpnuUyNLKEm
EQ6pmigkuJXpCS6kLCzgGMKR3cc3WX96exMV0zIs3OLcEqQkuQzUoVvpi2r3
/dl9VwxM5R4fVpiT3XHFEpDJxjoh8ZSNyiYmycATY5we2eYoNCMG7gB9UEXi
3eIYRf3tz/8844VuSXB5RbLav/35v6dHL/745urYFwsBaGnYh2UhjjSw+h0n
A/0rwnDI8P3vmzVH6KjWMuSaK+4akrr2md3WURqPTR6d7QsrpeNajzZ6oEiQ
Lx+BkTWXzr4cSyHBz5Go+EO2c3/fozRw4pwgmpo2jAiDbdPqW+l3krqeYdVn
IfqUrcCNr0/QIoTrHWfoTdS417JziAACw3RVicwuSfLJG/eKtoD4SS7vtXgQ
DQMk0FWPrlmsRkNWI35TuX2eJL/G3C0toiSORicTCqerfKfaOsqFwwu4RKU9
3doWsBAZzyqiY1+Qgv21a/l3j7TrvlO9Jvm7ZhX9MjREcCbAjWrYMDj3rNEF
pb3nWMZNkJwuQ2GnVqR32eQYS7qsJeVRE00WjVQXs3rm0lre1lsF1iMkxPvS
eYGXPnkv/35pZrZ0Xts3KOpCJERKfVo7OD1WG+5thVYC87wGvjlkxFJWxKLM
ELtVf2nrCyxnda6QX4ZRFbp1GW2FCRfcQ8b+Mj0E4XEmG2mnMpdQFhrkFo1R
KIDepxRxwJaQlGW8iJhxqFlwqevdS9XGI8yioWT15WEiBFXHJe+fbLr6+PF4
xDmgyJkqYdRcNR17U43lmoyWmfXyzfc3VyhaxNwoXSOqpEkLlVyEKfuuee5H
qT3HYfUTZO6tJIE6qX7Eg0hWMjd141Pc5Qsi5F3K4HmxKFBRxTrFR7W55jps
hVfFWl2au7gel4XINV3K69S8krrtJCBamr4igrM20i7akY+lR9mxNpglb4yR
h5GyY1IKQSLFnEtTDS9Pf2+BWiDOgpl2/ooSsibfa8NgXRvaAAmAMYJ3g7t+
zTI/JYNGx3S5hILjBC3XAXecPYNq0RrXn3/2TccfP7qO8V+nrzWbA6K4Rzub
jIiOa5/gNPBICh/FGKeS03RGG9BeprM4eOSKer67awyHlpkjgGui11T1hvT/
yiwOFf9JDHvIJkyUJiKKdfhGdfGZBPA4aBcKFxHhIDmh14iqjLeqp+GqbMAA
nGPXfXCNiHP1EAjhqtmNvlkj7BwsXZmsqaGFCKGCj0qfy/W6hUXtb//pf569
8KlF9o50vMzXqIte7myZQzq/N1WPRBkt6qJfoJoHPaB0rIO2148f6fFcBgiF
ZtaQHpfRdl7O2fjpr/x9lxdv+Z4r1mB6IUH0Bj2nOF/V/aQQODTi7wtdx3R/
clHVLtnrUbwvERhoFgUTXtRdQznBrUQgfsQ6jdWi+rriAFfHeveO/cV30lDV
Yq2inTZ1isNWb1vstN5lV4gaWas1mXFUJXjPhcOpUTzQRUDqitPXrCsCmyah
uhfeIxqO6ganRKJayFm7ZwEdSW17qPsUVN7gnpBAHqkdYGja+oalQWPFJDQ7
RI/be5SUcXGcPQ1l+gjOkaGs9Emom4U5QvjQFXK49tJcK8vQmeNzZfnxKNqX
vh6uc93n6rTKDtRgs78NBuoU2e0EL3wrELfZWdVXztNzRW1ckeIqNsimcrBU
MsEaxYtQZgi91q5nZOj+tIeXEsUnEpc6iPKGezb47/Qqa3OOcP1mud1vIgn9
Glisd9mVL/192sbCdb2uHmjARQDsaO1r2TSuBvmOWYm4vDWrVko25zhX3op4
Dh86V/kqIpPbzhQlN7BgpoHMr0J8lGMrK/MjZmXC9ktF/breSGJs2CKqrZLu
QiLjXOaDoCBKSyCYS6QHgfnLVi1LMoEFFjT1ke9rn8ITDLvfkNrWcCw42CdF
L2tT+WYzH/8fIEgWCJ4VyekZ8YkkIPeBuKyZubF8ygEwXCqLUpDis6NyeBtL
LKplGXGSJRB9xDCVtcKVxoKeRySKS0ygTeD8o9hW/CPuAHRHHTUAD6LlUt9y
IEM0MCj0flRZuhVofgqkWKKaqnLNyFLFF8oMZ74MJR9J+I8NYLGIZIodjege
HG1w/vaYdqRh/TYm58jhGI3+ubqVDmhuMfIBOShzInSm2NyrusGYD8kPXkdV
UI34IKimjyvfkuTW/SGErEoNTypQK81mzuAoPl/TDUDy2miosLKb4fBR3Ike
b3FxIgQrNbXMrlpJG58fwrfs1JgK1MxrQTDX36XfXL29pTPDvtdAZM7wEX2/
9vMyb+KAs1aoiaI/1DOwq7oF3bKXbjlKMNFytExyMvkgwPrdNFDXYSsnQ5lW
QRMw4qJGno+FX/yr89PTlXTOMt8Hn3oQK59p2ELCXJbTHa4CHwb9jk3loIS+
VQ0CAO4AgCYu/JQwDAIgESJCjUi1+zlYHz+OFFi0fJCmz5EnE/EEquwAalEO
InWRrO6cQ0p/JwXiAlwy9c3yYvPUZrWUeEgFSmlaKQF18/Ai7ozVlXiaw+BH
PK2iSl+rbXHTy8NIc46CfEa+N4/dbNpDVyfJ3v0aSu9kdIBrO4k53ytw57N0
4v+FznCdkORjGNrJfqW/Jjt+hcFJRHk37wmE/yceb4oB8qN0ejG9PplOryXi
4ASBTrxYLLjaNFfSqrdweKWuuqql62f1B1Yjh9h/lF4yjLkQRTXV6rsXTX1H
zz66vJi+ONaVvJFqGeZQduyYXu/tjKPrWwDN1UxazDk6YdxkgQ/iA0Kqo5i3
+AtHqPo6lqtCrqlFDbvvztrre98Zp4KibdQgi2cc+nm0jwRaJkq2O3qhQ/Nw
saMzOtwFoONgJLXhEOE+MPoHRsh8/HgstbibWqJzQ2X8mbB71HMHI+BW+Ap2
EQco5UGfXPgIGhq0ZxKPfFGB5KQORGnF3MCtFmF2qNrnh7keDtkv6Y32ESf4
KltSkJLG9KW3bPHRorKoObw0oJ2kdVun3dFWpEWMioJGUofH/rFXYpqKKpoD
8Xg/wGMIkdg2/nZgnDmqTHrXhsHYQxMN8yPLiyoN5oiBYUeeMGhh5m3ZDzqg
Rm7a6YxGyblMntBgqTx1UHiAcJS+h9djJcb2KV6YehN1JSaKeEIljc0z+hB8
djNKbXrTVkbZHmKW+7rQ2pFtzFDcUMQuYB46SZTL6FwXBePTSKJ9Q+rabDlp
MOY8u1R5+DX7N7Ozi5pBa+4LKZsdTAgI7/EZAM0NoptHWnhEIWu+FwWaUmwv
dbwFV+kGtxxEiuYGsYwfRR1Bx5oxUBcmyguHIpjdDUPv7US3K61kFc3H2HQB
0XEhMcQlXb3wfnujMxgHdfU00uZhHpDnC9pPdH4s9jz+BHVhcC986ZAyqmNn
TsDMZYvqJeoZAfiysS4gqcTaHDMauluIZISpAo56gtgZUEgBo4QDOSjOfxuk
/T3CZUHnv/uQ4VCgGX/IwATtt3F9+Wt1Q+9taL7NOB6udXHujSHXzJ6KzEnh
EPeyLoVNXBYboxCTzzCeVI5rryl6+uoF6e7piiPEtPRXNi/6VfrCTYw7wgXH
PBAbzWaeTYgH7vuy0kBd288Ud3w6ZMx+Cnl6wtPy1jcgrU2/RdRNfz6avvn2
jeQOyYXgni6Ec6QEx0+zO8b2d9cr5WbEiXTOyBjoiwl52crV4EsURz5kcWTS
p6deT0vRXrWV+IlEItUs92sEZv1oJiJLNFZvMA4gpCVIukur1fD9Gss9f/r5
6empjzLqXdxJqjfBi59KyaIkaYL/GtKojlslNt001rlPWFoYo8jJLdoNzvBA
rWFRjclnbO0D3m+UQVMh8pxcz0mdYe6AcD0bmldsYPMARx0We+s72o9CvdBw
/ECNNolVkSt9mU2YOfa6KY6Zn99Kr0VAwDtvYiA2vEi0X6UoahSlizi8rxaN
f+N8QPQTGFEpXElhfUR23pAdrLmJceghx6X8ymngXNQQjGRbZm4D2HHzu32l
SpjjzTNmGCDHo4Maqcp1j9Y6pCoflMlJQjM9j0pTA3BgbPM15mGNNEokyYOI
Z8ki5TUHAqR4sIr0feQfu1VI9B4z02D/WbeHkgLeGOnwHNl6eIglPYFLu3Xn
ahqfh5AVqrDcW+4ZhLgeA+9oqUO27jvf8uIHUXBiRINZ8nWDWkUilFX4MFAg
O3Gxq7vn4kyWKFf2gTAjxjGoJXS90gf2WzeD7dZuDoHUik9SdRAMql7d/E5P
3Nrlo+i9QqZ5QycvQWY3wD8clWsnJ33Ktb54/9/+/M+aCkRRxM5DUtfmgbP1
b/WsqycicXSYIp4mKo2zJJ8hxUi3Gp0X7HSJo8UuAfoKIZi+3KeE1C0vA6hl
YeMeQs+3hVE0hK2q9katjeOFQdbC9XVJt1LKHwiSxQHEymQX/DLiLd6zC6QA
YTqa4AtngAKSshP+218nY9IOqt3skXrQUWWKVajOj9Z+SA3oiElNpHLF2+7I
v4cEjUuKTSmRmKF8TdIpYGwsvkEZq3b1A550MwtOnrepDzLFh+zepVH3jWka
DB7OJWVuckJaBQcRVIb1gwAhPe+SDpwRQiy5Y4kANwLzxQU0JvM9jweldV4D
37LnccO8Yg4fqCuWxzPEOPgpI07R2yhRw8hOsASq41xIgttxSILZcmLmRIuP
hDQNbapdjdIwOHgbZbEHjjsbZU1ra312YBxfqdwsJKP24JmCk0zjuUJAghOw
dr/cSIYFk8XuZLIia6NDaZmd04sKKkbiEA5+x26ikJNoh136YKJMffOHwJkH
6eNoZACh43sxomH2za536/bC6Xx6/T43ubie1L+JaFrZHb+sHUS1Y/sVz7V4
aEWu+/P8CTlvPc93Y5yvq6LjJJVaZC67Lfv2CUM5Lf+sWjzACF8R476NoXUx
5GLfaqRxysJ9+EG5MKgNwktcJOP4kjktqpNBUwwxAVkJhABgIsSUjkQ0JAVv
kW8tZc6ZM+vEPt/dvuSzJuCD6A88ztbjDXSWaR6sX+cm6hj3s2Ae4KqtZobF
LOkQ0np464OMMmKzPEjFscMqXZCwXF5n8TAFqW6ZJBd5qHsNkzo6X6kbsze8
c1/pu7SxRA7bJ6s5uEu+REcOOqYbysALNLFsQxEup+zmRmGiQLqJ7/zSdvjw
nkHPiJs8o8USQZaT5Js9+6zlS6rGOVzBeVOeUs/9X+w6cGFZBAJ4ekRQg1Kg
ciEf1UjPTo/Oj/3wuR6bI/pc1lX0pZhve+K79FawKmZ/3h6PmF+QvdqHuQc0
JPQpT51QqLgQt8MrGoHRriM5/kpNjq+gqZSxFIwOvHFpMc1B6wMMghb718gR
+NI8mDwF3wrMVQnsL4Ez5EWbldKMy5o7uAU6QDSXCrZqLsMrJsnXDsfIZCTU
5iNt4ovyc0F4PSb1OT/kIdTljL4DMA8g1eGygyezZ2hYl3v2CvlZ360aTwIA
/zRF1g0eGLlFTRQtCRgEGlG737U05UfihZbUvJRLMnwxft4Tf5aJF8MFp753
5wH17fq6MRDIlRn4kgMNvLSRwojQsQPkvlwa5yRq3h8lJLpoyQ/Z7tZISPDY
D8H8O2ZGDswfZPMp6z/a9wJHLvIk3QxOzBs7lzHKucVcMlbi/uQG0HRjZ9yz
5Lzy9EiqrnE4ZCyOtYOuFkiXWx72xGuYzzW+4h7hyAVC97OII2+i/HE0ow6s
rnE1XW1gbvJmQ1CTQ6U6oSg07MdZyPDxk4eAszuHKzFlPHJoKj7l0dXr6bGC
2J2PcoY2JIVo31UFB8ZuXcPJy1qSLUdkK4+jGbRxxZobk707G9EvWqMrGB/2
oVMFEvBddF0h8XiHe6MYrsOQ0rQ6wAQHYSz6N3aV8D+AHSJNpQDiE/BBaM3M
x0iiaGPgoAI8qN2NsATnmcVxaqRWC2XNHHVvpA8WsKzcHmspBDfechBgJ1T0
xo8wDLMdGTEwMhgwiVCVqRCrojYKm4ifxMNHf+p5wLonvXuRr5URB9ZXzEWq
WwT/ndOqUr4TLlCWj8cy6dAOgJaIH8KO2Ds1ueGxFbk2jRUrV5GqigNp8kEf
WBiEQev5ls6PjkIWdCiAqvItzFkWio78eqKV+LdiggbbHe5hDHTG74HP/JgA
XKv8chQi24o80WouTHU80hirtgDFj3DNae5J6ZEMAXXTPLRe7VgZUv7cV/sX
AFqpIKPUsN4QYbcCE7mlgAusXAZTi+DiyV3aPjaY7uQP15MGS+ChKdoHjup8
iYGiUNohCzdOtMp3iMjJ7Hj7xpmz+MSJzhIpJM+206MF7f1TNq7zXVENqWJI
kmosnvfhBWjhtRs7yiGq7DqAoZ5g3rQKNtSxHFbDrX7LeVdpupFGkq/kQG25
M5XFT6gebKZoQ86HG2Qj6vgOduwkLvnkxLlT/G7IWxF9i2DelwSiVPSjJnlN
ZsXqXT5s7Cu/jHc6XImaKDmmnFCc81KeSzzFmFZ+ubKCMqpy4rUEqsad+z4X
Lc9f98GtdLHYEE6QghAEAIe2gj9mmU7th/SC7cUr55AeXU4vXh2PDnwZxM+f
CXhF5rlz5m0rStu9WcfOaI+97dwkT/zmtTNM09C3yMONuBnjyk12HQ4/9h+0
aIf1SVJvZxr+YJxAOc9lybCtyjUjy5wJ/VLDWjtnMMhiZ+ZI0SU8ftgXEVnJ
4GjdC2Tn6qqeRt/ecMPa2iTC9gwRuNYd7KbyLunzMByXE576x9+y25gwp9vd
PGkRdIZPUAJRzFpMUta0gW+tCZUfu+UiN/Vle5zKaIR4UtUvLiFxKW9OfoYJ
kfoNlW3iG1y9rIqDLv0h+hmTyZDybjDik8nZ5MwNVvNzyoZjKOPhZvMU2zpQ
/5TZceI+EecroX4rYf+idZ+bGcnwplZGdXK9uXqNmiRMInoyU8R93eB1zAWT
6HGj3WOdWwBX6CRuZ49pX0VUWuQ3R3+jPcCNiiYSfL7eNgbZNFrCmhTr58c7
lUluEtH4CgcXCPgFvYYrcXOfYhrQSwirC+SkZ0wgmV4TUKj7MkrJZpwJQ0Zc
xlzmatyx5Ju3bnicBlvgRw2mErlPI+Rjrm5P3NdsNHUVKnN4vk3o3U/l+79y
rxTGO3SbFC26Wl0hQIju0rZQEDAiur4T7Uw6MtsOOldpp5ieyWW+WGzLM9oI
huBde01BvAAYJjfTs6/8pI7EFUkWXUgreNv2W8hvPA205LBhXY9kLADcJ2Cn
UTqgiHwHKAwtdK1f7qNxXuOJJn3r64/mfSPJh93PDKAeAgPAtTQCQFomKYbv
GGh2KhQzRQ+RpOPN3A2Jc3E4yS0ZDckPPoVgBpXbA3M5uMkXM8uXUX6HF10T
aaUwhDuOd05eC5z8wJH2lzUIxINff/7ZfWWVfk//uHn3wv8gn+uUf0YfPY1r
/ThmqO1GKD0Zab4YHG+0uIObR1F5KEfIzTh7I+o0mT4WrOf7+9O4uOZwiWD4
OpUvtOmzpZubHK1Ae9j4keEzMyAlKT78eOQnQ/iQcjzYZZTqt09b7USN6ud+
7PVLDjISg4MgaUhn+y96OPbMSKyiTy34BCCX2IpG4xok3n5R3flwGS7S7xJ9
bTKfnoazBXvLsxFQTeU63Tr9zpOtJMbANeJYjJcTP2KY0w+0pb/9+b/pnlqk
T/9raed+PoSHc7xwuhIbfV8Ip3NnHGcS3Oi02kF2GWeVi8snDilct9tbYff3
4vahEaCFwhjuMN6RG9gr/nZAaNJc9TsXLXz4AUYGY+jnlDauRpJZKhqwHYLZ
8lkIJoJrVxqR/uuK8qBialOkCFZaleGbgt1MCh2ZNEL/fzR+xY2sjNvC5Jtl
rkPd5d13uhZCYpMjCplMoeB8JuMo9LvrALCKj0ahbTSXPr3RL4VxqZgMyOAs
TdU5vSS6KxyVRl1Bw0OUjsaUHOg6Gja4i/xC8/Hj8R3xuiy0K3AnvjaONYab
RzVs4E0lshfyGobHafGAKv5gYgmU4xlCBonTii6vXnMzFylJ6cmcN+QYN32m
BfKuM34itSeYN1W0GsLQODB7I71AiQFkF02jEg3VyVhRRnmaxs1oONx3fLBF
2TcOL3Wy1yer9bBifGudG3TNquQykpGqID/rmes0/SffzuM6XddPIWGo0E+2
+7WP1n2e8dGDgaDJZIIvecBm00nr9/iS5GL/e4NFGxXPBSfcu7EqHb5XY5Ts
fkrDTSb3JWc47Tn3qLgKi3akaQmMYpbBQsWwfDhyjmUo8qHZvfw1veH4NZlm
M5iYHb4EJUjaxSn8QECihI+4h3FespWoKaWYu5JmN6hGunxkygg5gZroFUAS
TXaLa2j5+yg6Q9y46uRoOpwEqxuCq4MRT9gW2/IQB/D7GulgXYQ0FRMmO/Kq
0XHOxh0cK1MxxTB9SaiN6G+iA8acBgkzevfGWsXlpdpm6apUknnPJfhaoA3d
HL7j0O61Yg6GWfF3UqQ+I4w5G0yPkWx4PI4Z98nMQl9pXm6T+OMVbly3NGVI
XU7BHziWzxX5wj5JheBUCRpsEsGUgoPir4RpIoaZZu/k0Ek4ODYN8fAytPKl
DfAk1rvaPp3sQGqz8wVaZa7wkUKp7C25IwvZWObZJBR8uO+JadofpIgBNxFR
bEurIb0OPcI8pZ0xpv8ek58DyY30LBHikYYKYp31KRM5gDO2ierVtRsRtvbz
QuSjZVAK2orNCKsZHGUSij+9UBLYglfFRxpog9xL33GPuIJWGRnCrmg8jByB
QzCMm21k0pXFZI2iXe1Jr89xJxJGtfpxMwl67HyJLHx39cBXs0gHJtr6IAWi
MvHGV8BeDizwYLKIpllZG4LmQFOxwgvqllPgHLeSaVe7OhRKP4pcie5kcDb8
ep7MG0n8p5AU+gzpqJ8sVCGERNc7Q/uHk/61QFqVpobc469RaDbEzQcA2/ro
Q8Lhh09+FjRqbJ1ZHyYAAndfhivkK0glzyH+vB00JMTwp/Xl8OzD0ivdg/mT
ZFAcAD/h25JV1K7nvoolA40uXl/sHe1wNv6SR23IlZKzlonsF/4bGDwhmPNL
hGkFQE8LFC5d5zxahOtadJwuozC1SRW31dPVz7rl+EvUMMz9pInz0/PHkz0u
C2k1ZqDd7xkuff5b5hklmquX8r+1BN1RwDL83JYrusO/1rZew+g8T/4XXZ7R
7+mWAAA=

-->

</rfc>
