<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.3.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-crocker-dnsop-dnssec-algorithm-lifecycle-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="DNSSEC Algorithm Lifecycles">Documenting and Managing DNSSEC Algorithm Lifecycles</title>
    <seriesInfo name="Internet-Draft" value="draft-crocker-dnsop-dnssec-algorithm-lifecycle-02"/>
    <author initials="S." surname="Crocker" fullname="Steve Crocker">
      <organization>Edgemoor Research Institute</organization>
      <address>
        <email>steve@shinkuro.com</email>
      </address>
    </author>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization abbrev="Google">Google, LLC</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>
    <date year="2025" month="November" day="01"/>
    <area>Operations and Management</area>
    <workgroup>Domain Name System Operations</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 54?>

<t>Cryptographic algorithms for DNSSEC go through multiple phases during their
lifetime.  They are created, tested, adopted, used, and deprecated over a
period of time.  This RFC defines phases for the DNSSEC algorithm lifecycle,
and it defines the criteria for moving from one phase to the next.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-crocker-dnsop-dnssec-algorithm-lifecycle/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Domain Name System Operations Working Group mailing list (<eref target="mailto:dnsop@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dnsop/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dnsop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/russhousley/draft-crocker-dnsop-dnssec-algorithm-lifecycle"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="background">
      <name>Background</name>
      <t>Each DNSSEC cryptographic algorithm is used in two distinct but interconnected
ways.  The first is to sign.  The second is to validate a signature.  If someone
uses an algorithm to sign, the party that receives that signed message should be
able to validate the signature.  This means the receiving parties need to
implement the validation algorithm before the sending parties can expect to
use it effectively.  Equally, the receiving parties have to keep the
validation algorithm in service even after the signing parties stop using it.</t>
      <t>These relationships seem obvious, but there has not been an organized
way to communicate within the Internet community regarding these
algorithm transitions.  This document builds upon the enhancements
defined in <xref target="I-D.ietf-dnsop-rfc8624-bis"/> to the IANA "DNS Security
Algorithm Numbers" registry <xref target="DNSKEY-IANA"/> and  the IANA "DNSSEC
Delegation Signer (DS) Resource Record (RR) Type Digest Algorithms"
registry <xref target="DS-IANA"/>; the values in these registries tell the phase
that the algorithm is in with respect to this lifecycle. This document
discusses both the expected phasing in and
out of algorithms individually using these IANA registries, as well
the need for how the DNSSEC ecosystem as a whole should ensure it is
left in a resilient cryptographic state.</t>
    </section>
    <section anchor="phases">
      <name>Seven phases in the lifecycle of a DNSSEC algorithm</name>
      <t>We define seven phases in the lifecycle of an individual DNSSEC algorithm.</t>
      <ol spacing="normal" type="1"><li>
          <t>Experimental:
The algorithm is under development by the cryptographic community and is not yet ready for general use.</t>
        </li>
        <li>
          <t>Adopted:
The algorithm is ready to be used by the Internet community.  It is listed in the IANA registry.  Implementers are expected to support the algorithm for signature validation.</t>
        </li>
        <li>
          <t>Available:
The algorithm is ready for use by all parties.  Implementers are expected to support the algorithm for signing and signature validation.</t>
        </li>
        <li>
          <t>Mainstream:
The algorithm has reached "recommended" status.  Implementers are expected to support the algorithm for signing and signature validation.</t>
        </li>
        <li>
          <t>Phaseout:
The algorithm is nearing the end of its lifecycle, but it is still in use.  Implementers are advised to transition to other recommended algorithms.  Signing should be phased out.</t>
        </li>
        <li>
          <t>Deprecated:
All use for signing should have stopped, but signature validation is still supported.</t>
        </li>
        <li>
          <t>Obsolete:
No support for signing or signature validation is expected.</t>
        </li>
      </ol>
    </section>
    <section anchor="criteria">
      <name>Process and Criteria for transitions</name>
      <t>The previous section does not specify the process and criteria for advancing a
DNSSEC algorithm through these lifecycle phases.  There are six transition points,
labelled A through F, between these seven lifecycle phases.  We propose the
following process and criteria for these transitions.</t>
      <t>A. Algorithm Inclusion</t>
      <ul spacing="normal">
        <li>
          <t>Prerequisites:
          </t>
          <ul spacing="normal">
            <li>
              <t>Algorithm has been given a Mnemonic and number in the "DNS Security Algorithm Numbers" registry.</t>
            </li>
            <li>
              <t>Cryptographic community has determined that the algorithm as suitable to use for DNSSEC.</t>
            </li>
            <li>
              <t>Documentation and implementations are widely available and stable.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>IETF determines the algorithm is suitable for use with DNSSEC.</t>
        </li>
        <li>
          <t>Action: IETF publishes notice that the algorithm is suitable for use and should be deployed for signature validation.</t>
        </li>
      </ul>
      <t>B. Ready for Use</t>
      <ul spacing="normal">
        <li>
          <t>Prerequisites:
          </t>
          <ul spacing="normal">
            <li>
              <t>Deployment has been measured.</t>
            </li>
            <li>
              <t>Deployment is deemed to have reached an acceptable level.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>IETF reaches consensus that algorithm has been widely deployed for DNSSEC.</t>
        </li>
        <li>
          <t>Action: IETF publishes notice that algorithm is available for DNSSEC signing.</t>
        </li>
      </ul>
      <t>C. Mainstream</t>
      <ul spacing="normal">
        <li>
          <t>IETF reaches consensus that algorithm has reached mainstream status; deployment is essentially universal.</t>
        </li>
        <li>
          <t>Actions:
          </t>
          <ul spacing="normal">
            <li>
              <t>IETF publishes notice that algorithm has reached mainstream status.</t>
            </li>
            <li>
              <t>Signers using older algorithms, particularly algorithms in the Phaseout or later phases should transition to a mainstream algorithm.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>D. Phaseout</t>
      <ul spacing="normal">
        <li>
          <t>Prerequisites:
          </t>
          <ul spacing="normal">
            <li>
              <t>Cryptographic community has determined the algorithm is reaching its end of life.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>IETF determines it is time to announce the phaseout.</t>
        </li>
        <li>
          <t>Action: IETF publishes notice to signing operators to transition away from the algorithm and begin signing with a mainstream algorithm.</t>
        </li>
      </ul>
      <t>E. Deprecation</t>
      <ul spacing="normal">
        <li>
          <t>Prerequisites:
          </t>
          <ul spacing="normal">
            <li>
              <t>Measure signing activity.</t>
            </li>
            <li>
              <t>Signing activity is deemed to have largely subsided.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>IETF determines it is time to deprecate the algorithm for use with DNSSEC.</t>
        </li>
        <li>
          <t>Action: IETF publishes notice that use of the algorithm is now inappropriate for DNSSEC signing.</t>
        </li>
      </ul>
      <t>F. Obsolescence</t>
      <ul spacing="normal">
        <li>
          <t>Prerequisite: Measurement of signing is at the lowest achievable level.</t>
        </li>
        <li>
          <t>IETF determines the algorithm is obsolete.</t>
        </li>
        <li>
          <t>Action: IETF publishes notice that algorithm is obsolete and ought be removed from implementations.</t>
        </li>
      </ul>
    </section>
    <section anchor="lifecycle-phase-and-the-iana-registry">
      <name>Lifecycle Phase and the IANA Registry</name>
      <t>The enhancements to the IANA registry of DNSSEC algorithms defined in
<xref target="I-D.ietf-dnsop-rfc8624-bis"/>.  Table 1 suggests the values to be
placed into each of the IANA registry columns "Use for DNSSSEC
Signing", "Use for DNSSSEC Validation", "Implement for DNSSSEC
Signing", and "Implement for DNSSSEC Validation" for each phase in the
algorithms lifecycle defined in <xref target="phases"/>.  The IETF is encouraged to
follow Table 1 when assigning the values in both of these IANA
registries algorithms as each algorithm progresses through the
lifecycle.</t>
      <artwork><![CDATA[
+=======+===========================+===========================+
|       |    DNSSEC Validation      |      DNSSEC Signing       |
|       +-------------+-------------+-------------+-------------+
| Phase |  Implement  |     Use     |  Implement  |     Use     |
+=======+=============+=============+=============+=============+
| 1     |     MAY     |     MAY     |     MAY     |     MAY     |
+-------+-------------+-------------+-------------+-------------+
| 2     | RECOMMENDED |     MAY     | RECOMMENDED |     MAY     |
+-------+-------------+-------------+-------------+-------------+
| 3     |     MUST    | RECOMMENDED |     MUST    |     MAY     |
+-------+-------------+-------------+-------------+-------------+
| 4     |     MUST    |     MUST    |     MUST    | RECOMMENDED |
+-------+-------------+-------------+-------------+-------------+
| 5     |     MUST    | RECOMMENDED | RECOMMENDED |     NOT     |
|       |             |             |             | RECOMMENDED |
+-------+-------------+-------------+-------------+-------------+
| 6     | RECOMMENDED |     NOT     |     NOT     |   MUST NOT  |
|       |             | RECOMMENDED | RECOMMENDED |             |
+-------+-------------+-------------+-------------+-------------+
| 7     |     NOT     |   MUST NOT  |   MUST NOT  |   MUST NOT  |
|       | RECOMMENDED |             |             |             |
|       |  -- or --   |             |             |             |
|       |  MUST NOT   |             |             |             |
+-------+-------------+-------------+-------------+-------------+

  Table 1.  Determine lifecycle phase from the IANA registry.

]]></artwork>
    </section>
    <section anchor="considerations-for-maintaining-a-robust-dnssec-algorithm-state">
      <name>Considerations for maintaining a robust DNSSEC algorithm state</name>
      <t>The above considers the values associated with a particular algorithm
in the IANA registry for "DNS Security Algorithm Numbers" <xref target="DNSKEY-IANA"/>
and the IANA registry for "DNSSEC Delegation Signer (DS) Resource Record (RR)
Type Digest Algorithms" <xref target="DS-IANA"/>.  It is equally as important to ensure
that as algorithms come into favor and out of favor that the current set
of available algorithms always include some that are the Mainstream
state.  As the IETF community considers transitioning a particular
algorithm beyond the Mainstream state, it must simultaneously ensure
that at least one other algorithm is already present in the Mainstream state
or that one other algorithm is in the Ready to Use state and available
to become a Mainstream algorithm.  Specifically, at no time should
there be zero algorithms in the Mainstream state.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is asked to amend the <xref target="DNSKEY-IANA"/> and <xref target="DS-IANA"/> registries
to show the current phase of each algorithm.  In addition, IANA is asked
to show the history of future transitions through each phase.</t>
      <t>The IESG is asked to name a panel of at least three designated experts (see
<xref section="5" sectionFormat="of" target="RFC8126"/>) to advise IANA when an algorithm is under
consideration to be moved from one phase to the next.  These designated
experts should be familiar with hash functions, digital signature algorithms,
and the DSNSEC protocol.</t>
      <t>IANA has no actions related to this document.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document proposes a lifecycle for DNSSEC algorithms.  By following
the criteria presented in <xref target="criteria"/>, Internet-wide deployment of new
DNSSEC algorithm will occur in a smooth manner that ensures all implementations
will be able to validate signatures.  Likewise, following the criteria will
ensure that out-of-date DNSSEC algorithm are retired in a graceful manner.  The
criteria associated with the transition between phases of the lifecycle will
depend on the process that makes changes to the IANA registry as defined in
<xref target="I-D.ietf-dnsop-rfc8624-bis"/>.</t>
      <t>If the industry fails to achieve global consensus on the state of any
one algorithm such that domain owners deploying signing zones disagree
with the deployed validating resolvers then it likely that DNS
resolutions will fail, rendering the DNS unusable.  As such, vendors
of both authoritative and recursive resolvers, and the operating
systems that deploy them, are encouraged to strictly follow the
current guidance to avoid DNS interoperability issues.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="DNSKEY-IANA" target="https://www.iana.org/assignments/dns-sec-alg-numbers">
          <front>
            <title>DNS Security Algorithm Numbers</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="DS-IANA" target="https://www.iana.org/assignments/ds-rr-types">
          <front>
            <title>Delegation Signer (DS) Resource Record (RR) Type Digest Algorithms</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-dnsop-rfc8624-bis">
          <front>
            <title>DNSSEC Cryptographic Algorithm Recommendation Update Process</title>
            <author fullname="Wes Hardaker" initials="W." surname="Hardaker">
              <organization>USC/ISI</organization>
            </author>
            <author fullname="Warren Kumari" initials="W." surname="Kumari">
              <organization>Google</organization>
            </author>
            <date day="4" month="June" year="2025"/>
            <abstract>
              <t>   The DNSSEC protocol makes use of various cryptographic algorithms to
   provide authentication of DNS data and proof of non-existence.  To
   ensure interoperability between DNS resolvers and DNS authoritative
   servers, it is necessary to specify both a set of algorithm
   implementation requirements and usage guidelines to ensure that there
   is at least one algorithm that all implementations support.  This
   document replaces and obsoletes RFC8624 and moves the canonical
   source of algorithm implementation requirements and usage guidance
   for DNSSEC from RFC8624 to an IANA registry.  This is done both to
   allow the list of requirements to be more easily updated, and to
   allow the list to be more easily referenced.  Future extensions to
   this registry can be made under new, incremental update RFCs.  This
   document also incorporates the revised IANA DNSSEC considerations
   from RFC9157.

   The document does not change the status (MUST, MAY, RECOMMENDED,
   etc.) of the algorithms listed in RFC8624; that is the work of future
   documents.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-rfc8624-bis-13"/>
        </reference>
      </references>
    </references>
    <?line 257?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Wes Hardaker and Warren Kumari for constructive comments.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA7VabXPjthH+jl+x43xJGkmXXF7aqtOZOLaTeppzMtalN51O
pwORKxJjEGAAUIriOL+9swuQBC3Jd06v/mBbIrnY12ffOJ/PRVBB4xIubdE1
aIIyFUhTwitpZEUfLm9Wq6sLONeVdSrUDXynNljsC41eyPXa4Xb55D2lLYxs
cAmlk5swL5wt7tDNS+NtS789FnPZPzjX/YPzT14K360b5b2yJuxbXML11etv
hOmaNbqlKGXApShkwMq6/RKU2VhRWOPR+M4vIbgOxXYJnwnpUC7h7PsWnQzK
Gj8KiCTymVCt4wd8ePnJJ3/+5KXYWXdXOdu1Szi7tI1UBm5kg7Da+4ANjKTO
xB3ud9aVS7g2AZ3BML8kQYXwQZryP1Jbg0vYoxetWsK/gi1m4K0LDjd+Bn7f
0D//FmKLpsOlAHjHcwGiUs7eWHdHhvqWnqPvG6n0Es5Yw18pDJuFdRVdqFSo
u/USzlznfW07r3H/4nlmORNCdqG2binmEO26CrhFuIgEBIB11RKuygobax3c
okfpihqujQ8qdAEFAEYWPT35la+VueucXRS2GYjedt7D3yKLPc1/qEppWGHR
ORX2M/juuwsB0Pvg9Op4SJLzqy1d91hMjnmDHv4mXSkz1r+1ttL4mHz8diRL
ev2qTo/6hcEghLGukUFtyYy331z86dOXXy4FBcffr/45vz6/OSfzQpCuwrCE
OoTWL1+82O12CyWNJCu9kN6rypBX+hel8fNkhnn0es/Px4A9u7xZDeJmoXcT
7yR7Q28qAJhH4YgLAZer38OOnzs3J6ebsoEaK3ZKWKnKoIMPL1cfkd1t5wqE
WyysK+HD29uP4PW+RbhUFfowcvwkq4LCetTq9fxyQZpPfuo2xZ++fPn5fK38
Uoj5fA5y7YOTRRDiwu3bYCsn21oVMLiyh411PWBVFkLtbFfV0HQ6qFYjtLX0
6KHsHAVVqFE5Qe4fVIMLgNc17kE6hMKhDFjOIKDnv7K0Lf/Tef5oSiixdUgQ
VYLdogMpWnTKlmA3MNBTnpwFStwog74/n7gMNfacDvzDEIozQUeoMDxJtxdO
BXRK8vON3ZIMG2cbsCaJBsHynQZ/DouotEaVpUYhxAfwtSwY+EwpxJUs6v78
4rg2QXkWF5SBsLNQKh+UKQKsuwCKALGwxmARsBQ7ufdRgbBRzgd6NlggB0tf
eywsicTfb6VWhPEg+RYZOkf6ut6Atw1ag6IjPUmTcZPIzVjAVrqwh1DLAA4L
VFtWkQx8C5bQoPeyQiAk1CWsUci1xsnRRCY/nI3VoDRR2ZEsqZjOUujBIJYQ
rFBNqzm38H2JHoXIyOsaN9alI9CUOZVCGsCfWywC0eo8kpVxs8GCwkDvFwBX
P3VS6/3sBB+13LIkd4gt3SKOsqAMeHRbVSDgFg3ITUA3CJ3T88G20Hn6SpHX
vK7R07k6ZqNatR48YgN2vVW28zN2gFCjQ6ilB2MDrJGOMBTc0qhfokcQk4Vt
ms4oihPYqVCTL9U45NP+etiDw0q6MsWlR5FZ3knjFTPT26lMFQ2sO6VLD11r
I2E0tTQFm8eLGDzswPf3p+Hl4aGPG4KlKfiKQ/AlTpUPbg/39xn+PzwwLEzp
rK4uxPsA0fzIVTruL73/degh6pXtxneSYQNqHaOFsEFwfNDHSYQrw3YBhz45
JQTS8ABFi6nGRal80XkKz7UNdVQ6+zOWfBD7ETlDKWwXCA0zfFamVFtVsn8n
n4tss8ZG3mcgPexQaxHhDEsGvdrucuDEwvpYPEkPEna11UPIU6XoOLiUFxo3
gZkiMZVW5DlT1PNBBlwQSq44XBJSJ3cdlMHiHOL2/Qfx/gch3mDCbPBvJWQy
fRwQXQgBny7g6mdKK6R5qTmDMppOQdqU6KDELWrbxqjYp4SRiziGmoxATIG7
R0JQWe5ZvxUadFIT7NPxLxdwHhPfiZPjk8HCGmOqSAcfhjehO2cFrSij9vrI
zc739NiKznMmHlyL4L9rW+se+zDxPeB4BsckwGcLON9KpQn8nxSBiBAWr/cg
te6h8X9jqO+2TjH3+QJeSWV8cCibY9wRuDqURY0lnDkkXaIpsTxjb+3+z+x9
sYAfyHdtF06ozqDs6yhAw4WPChlyxETBEQg+KK3J6uRaR/iW5Vb5yPYI9/TJ
UqKBTPoMThbAiEo8DIk+BlwJtqNcBl8u4HIo1KIc55odfKKI9DinVsqHLVV5
xP0x7YzyJA1jSUf9cQHfr73VGJKv3YwmyM864a9Etbfeguu1H5wt0MeO9iKv
/bKECPcf9GXhA6duaB1ymqaKi+mWFmOsE8CrTYzQNqM9qStluZWmYOcQBzjX
F9QRs0cwiyAXKz0ypqMq4+fckq1VJviZ0HKNWmMJ5wOxb2awxrCjCiLSjcB5
hPob5ru1nksrsbFa2x2XMqekiQTzAkIIOF9kLdW1KXRHYwghYA4/OHT4U6e8
CuijFf+Q3UwRyaVOpbimglcGG2uoajYlxD6uh7a39XAj7KVjLk6gNR1aYkDX
cDFzJI1LD75ToS9xe+eO5uvJ90OgVChSCuiDsJ+cOKrRStR7kD1qRohg0gtS
EI1pRm78YT0xMNJDKlcXAytzOGevjAMfaLu1Vr6ODkq16vEi5YAoczWEfImt
tvtUI5zCs68XcDtg/Y8eT9v7kslxIh0M3qCkeqJcHN5DxRFiE8GLEaQHbepf
igLbyLumBD0qMd7kYRhrRdnlobMlm0ykfJ5CJ8ocbZt1ywmcSFEXeV4Sz+O3
l7wZCKRc9ZfEfq8x9J4GkrEONGqLzkudiTMY452kevLo3mSx+Pap7LSaiqYx
l8xi0i86LR0FQF6zskP2yZDwW0tqplJpl/xwmrZkzsekprsc8+ppF3xnLDis
Zoo6dnK+z8kEpEdjN2ZmmlUwx8bYzhQ4dgycQt/uYHbMbDzCtM4/SuOSmkGe
VDzCLUPhW1GrmigwWJzW3dWYzZ9E7FcxWsc6h5prqkIzV8i/PxLDmkZneg++
W3tVcuC/TYPDROhIxfU7kZAeo3nSQelld6CMbCkdOkVHHo/lb/qaxBdoikPM
W/aq4ri0m0FjhBMRiLXdUTdKfoXbY0D2VDawqSD6XUDVP8x+QqUCzRnAYWO3
hILkT49SWKybhgVFDDR+fGg2blPWjcVSPi6YDAGGhttuDjozD+NgQTw9WKCS
iHX2Kfiuorbe5107d06i1bJgYsECxW9v8SkjhdVdYzyc/Zild5ovJGc+mx1c
gn8MGZCuDkX3icdJT8dvygnx98xmHDlGeBSZdsbKbTKASS3yQxoIshdQJjCF
7Zys4nAt1nSD0nY1lVm+98rpwIPnD1FXaYIgsulHxpD0keHRu1pnK4c8xchq
WjEOPYT47bffhPj4r/Gn/3vs58lr4leIP/w3edKozezacLUHp3RtoPDxPP95
xifxawqEX7PGqz+VXCbxcPraCT0845P4FT7NZH11/s/nfhIfv4usb9HDy0T5
9uri+1evrm4ury4PTn3i2nvh4bNcuh9Xr0+eOlx7/zx8fpSHpz5N+HsvPHzx
Dno41MrN968fxUX/910+vX8pvjzpNQOnB59YWv7itBRv08Nw53uR4o9v5/Sp
T5kUT3D61KdcD3NaEtLvZ9k2pzCy9iwK/7smxZDvFwCXfWH0eJYx1sLT+WdK
Oh/AhTVUdPavNPC+TyoTpIplKzi77nw4HETzGDuWNnJtt8jdGlGalB3Se1so
Xl2mgnvsfUZi4tiMlnl562jj0WJETCqwA1IkwjOWJOLEkiTfjQzjZoy7NCoB
VEOjOGl4xxHXA3EnIifFQmEbjLXYRm5pIMbFJxfH8YthRFF0zlG29BgEjfPH
mUlWemhajYKiKVOJvN5MlW7aD2atdtxBAJxHY3GBNLZ+mSWHzio6w2i8bGm2
xr1NWn817YhxRn1LQ/7jFa3GpUF6j2I/VUoAjdIHXi7HIex0iqDj5Lx16Lmn
N0fPEr3CTpBJj932iwQqOfhB1vugUsGVMptG5meM3SHAisebqoi7UxnA2Nia
xQZdxI3lGuEXdPZIg/+Ydd4GscdOw1EI/pJ04O9ixyhpNM1Ejq0EM7/MVlwk
ku8XWr0rRXiwm0f1KrmzAVmWbPUZTBiYEKqVDza2LZuOp2D5sLivdcfyPe57
4fpq9e1EInqFhl3LoOZdVe8OoXZIhX0cs2HJM2sXPHzoEcX9/SpNnb+gp9KL
Mg8PH7GWeMYfmY+FvZk6Ay+yRJFrOy2Xspbv+MsO3FP4nDHRMzbOCTeyUVpJ
F1Gvlr6GTWfivGkGpapUkDobIGbToQHCLlc3hFets8EWVi+SN8RFOA8USNG8
PU/rjHx7mjaMCTkf+9V0tZ1G3bTZHPNH1uZP9iBfE5ymcbiYvCySArTvwoZt
wcNsfKuNJoz5gM5uwODucP6/o6WHLYrOxW2qbyz1YI00BlOcRwzxvEZ71J0L
fnxNqenRuxiDykmU79Qd7pTH2SjR9PUXIiPSfjdiSxfmdjNnUgc8E9A6DMpF
DUionCxw0+nEdnQdMVB/nBzp6GyW1a8q0vAvteqjgZi5ElsevpnJroV5beQd
DVFraSo8MXKQzxkwCHEdWVCm7GJalUoz5TiyQai0XUudDW4TXxFneRG9FxRW
WR3RFXXkt4xvKtodz06jj/DGLHWpv1ga/JTKy8ohikFlw7S6n8KbipbvVm9T
MWIoC2l1R0M2PunyZiX4ji7GEHsLCTMDR5u/YddI1UdnOs9LCU6XxO4MtmhK
6zzlYh4NxNfOVOAXzBiJHUWeVzyiT6zMhvFQnF5S/MSXCpLBoiB0RzOLK9Z8
YAEE5kXQffjxGKFH86pTpTRxRiq3VpXMOr86xYetlY7DR9+hT+9rrWVxRyBx
XtwZu9NYVvFdlvtlXC9h+dezjdQez3jfJ80d2zp/2ZEleiOJB/h710inGDbI
/sF1/J4RxHVq8AvxX/wSA68oLAAA

-->

</rfc>
