<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-grant-ntp-ntpv5-algorithms-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>NTPv5 Algorithms</title>
    <seriesInfo name="Internet-Draft" value="draft-grant-ntp-ntpv5-algorithms-01"/>
    <author fullname="Sarah Grant">
      <organization/>
      <address>
        <email>sarah.grant.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="November" day="04"/>
    <area>Internet</area>
    <workgroup>Network Time Protocols</workgroup>
    <abstract>
      <?line 42?>

<t>This document describes considerations of synchronisation algorithms with version 5 of the Network Time Protocol (NTP), and provides guidance on the use of NTP version 4's algorithms when used with NTP version 5.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://signalsforgranted.github.io/draft-grant-ntp-ntpv5-algorithms/draft-grant-ntp-ntpv5-algorithms.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-grant-ntp-ntpv5-algorithms/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Network Time Protocols Working Group mailing list (<eref target="mailto:ntp@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ntp/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ntp/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/signalsforgranted/draft-grant-ntp-ntpv5-algorithms"/>.</t>
    </note>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>NTP version 4 (NTPv4) <xref target="RFC5905"/> defines various algorithms and logic which handle several different aspects of acquiring and maintaining synchronisation of NTP clients including filtering of measurements, security mechanisms, source selection, and clock control, amongst others. Over time NTPv4 has seen additional algorithms be defined to improve security and accuracy, with Khronos <xref target="RFC9523"/> defining a companion method to run alongside with NTPv4 clients that aims to detect and mitigate time-shifting based attacks, and interleaved modes <xref target="RFC9769"/> which defines additional operational modes for both clients and servers by holding additional state and performing additional checks on timestamp values.</t>
      <t>However, NTP version 5 (NTPv5) <xref target="I-D.draft-ietf-ntp-ntpv5"/> explicitly does not define these algorithms in conjunction with the wire protocol to allow for the creation and evolution of new algorithms and implementations which may be optimised for specific deployment use case or system constraints. For all implementations there are many factors that should be taken into consideration in the development of both new algorithms as well as the porting of existing algorithms to NTPv5, such as trade-offs between precision and security, costs of complexity, etc.</t>
      <t>The decoupling of algorithms to their dependent wire protocol is not new - PTP <xref target="IEEE1588"/> has the concept of "profiles", each of which define different behaviours and algorithms adapted for specific deployments (for example in automotive or power industries), and may even include additional capabilities to the protocol, for example the "daily jam" function in SMPTE ST-2059 <xref target="SMPTE2059"/> where discontinuity is deliberately transmitted to remove built up discrepancies in values.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses the terminology established in <xref target="I-D.draft-ietf-ntp-ntpv5"/>.</t>
    </section>
    <section anchor="algorithm-considerations">
      <name>Algorithm Considerations</name>
      <t><strong>TODO</strong>: General considerations, including interop (When Algorithms Collide)</t>
      <section anchor="extension-fields">
        <name>Extension Fields</name>
        <t>Algorithms may choose to use additional information be sent by either client or server, however this brings the risk of these fields not being correctly handled by peers which do not support them. Algorithms must have explicit behaviours defined when any required extension fields are not present.</t>
      </section>
      <section anchor="non-utc-timescales">
        <name>Non-UTC timescales</name>
        <t>In addition to UTC, NTPv5 includes support for the transmission of TAI, UT1, and leap-smeared UTC timescales. Algorithms may choose to support a limited subset of timescales, and use different logic depending on the timescale supported. Implementations shouldn't mix timestamps from different timescales when performing calculations, and it's recommended they minimise the conversion of timescales where possible to reduce potential confusion and aide in accuracy.</t>
      </section>
      <section anchor="leap-seconds-and-leap-second-smearing">
        <name>Leap Seconds and Leap Second Smearing</name>
        <t>Existing NTP implementations commonly use one of several known approaches to applying leap seconds to system time: they may "freeze" the clock where the leap second is inserted at the beginning of the last second of the day, or the system clock is "slewed" or "smeared" either before or commencing from the leap second <xref target="RFC7164"/>, keeping system time monotonic but less accurate during the period.</t>
        <t>Server implementations which use drifting mechanisms to smooth the leap second insertion such as slewing or smearing must only apply it to only to UTC, and must set the timescale flag in packets to clients as "Leap-smeared UTC".</t>
      </section>
    </section>
    <section anchor="use-of-ntpv4-algorithms-with-ntpv5">
      <name>Use of NTPv4 Algorithms with NTPv5</name>
      <t>NTPv5 implementations may use NTPv4 algorithms. Those supporting both versions of NTP may find it easy to include as a default or fall-back option in configurations where others are not set. All implementations both new and existing should also be mindful of the various algorithm specific verified errata.</t>
      <t>NTPv5 introduces several key differences to NTPv4 that implementations should be aware of when either building new implementations of the NTPv4 algorithms or when adapting existing. Most notably, the timestamp format has been changed with NTPv5 to ensure longevity and prevent rollover in the immediate future, which should be taken into consideration when processing and producing packets.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>General security considerations for time protocols are discussed in RFC 7384 <xref target="RFC7384"/>, and security considerations specific to NTPv5 <xref target="I-D.draft-ietf-ntp-ntpv5"/> should also be noted. Not all threats can be sufficiently mitigated through the use of algorithms, for example packet manipulation, spoofing, and cryptographic performance attacks may be better mitigated through the use of authenticated encryption via NTS <xref target="RFC8915"/>.</t>
      <t>Designers of new algorithms should take into consideration the expected threat model of deployments and should define which threats could potentially be mitigated from those which are not in scope for the intended use cases, for example closed network deployments may have a reduced risk of man in the middle adversaries compared to deployments on public internet.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet. This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family. NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs. It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required. It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC7164">
          <front>
            <title>RTP and Leap Seconds</title>
            <author fullname="K. Gross" initials="K." surname="Gross"/>
            <author fullname="R. Brandenburg" initials="R." surname="Brandenburg"/>
            <date month="March" year="2014"/>
            <abstract>
              <t>This document discusses issues that arise when RTP sessions span Coordinated Universal Time (UTC) leap seconds. It updates RFC 3550 by describing how RTP senders and receivers should behave in the presence of leap seconds.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7164"/>
          <seriesInfo name="DOI" value="10.17487/RFC7164"/>
        </reference>
        <reference anchor="RFC7384">
          <front>
            <title>Security Requirements of Time Protocols in Packet Switched Networks</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>As time and frequency distribution protocols are becoming increasingly common and widely deployed, concern about their exposure to various security threats is increasing. This document defines a set of security requirements for time protocols, focusing on the Precision Time Protocol (PTP) and the Network Time Protocol (NTP). This document also discusses the security impacts of time protocol practices, the performance implications of external security practices on time protocols, and the dependencies between other security services and time synchronization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7384"/>
          <seriesInfo name="DOI" value="10.17487/RFC7384"/>
        </reference>
        <reference anchor="RFC8915">
          <front>
            <title>Network Time Security for the Network Time Protocol</title>
            <author fullname="D. Franke" initials="D." surname="Franke"/>
            <author fullname="D. Sibold" initials="D." surname="Sibold"/>
            <author fullname="K. Teichel" initials="K." surname="Teichel"/>
            <author fullname="M. Dansarie" initials="M." surname="Dansarie"/>
            <author fullname="R. Sundblad" initials="R." surname="Sundblad"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This memo specifies Network Time Security (NTS), a mechanism for using Transport Layer Security (TLS) and Authenticated Encryption with Associated Data (AEAD) to provide cryptographic security for the client-server mode of the Network Time Protocol (NTP).</t>
              <t>NTS is structured as a suite of two loosely coupled sub-protocols. The first (NTS Key Establishment (NTS-KE)) handles initial authentication and key establishment over TLS. The second (NTS Extension Fields for NTPv4) handles encryption and authentication during NTP time synchronization via extension fields in the NTP packets, and holds all required state only on the client via opaque cookies.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8915"/>
          <seriesInfo name="DOI" value="10.17487/RFC8915"/>
        </reference>
        <reference anchor="RFC9523">
          <front>
            <title>A Secure Selection and Filtering Mechanism for the Network Time Protocol with Khronos</title>
            <author fullname="N. Rozen-Schiff" initials="N." surname="Rozen-Schiff"/>
            <author fullname="D. Dolev" initials="D." surname="Dolev"/>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="M. Schapira" initials="M." surname="Schapira"/>
            <date month="February" year="2024"/>
            <abstract>
              <t>The Network Time Protocol version 4 (NTPv4), as defined in RFC 5905, is the mechanism used by NTP clients to synchronize with NTP servers across the Internet. This document describes a companion application to the NTPv4 client, named "Khronos", that is used as a "watchdog" alongside NTPv4 and that provides improved security against time-shifting attacks. Khronos involves changes to the NTP client's system process only. Since it does not affect the wire protocol, the Khronos mechanism is applicable to current and future time protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9523"/>
          <seriesInfo name="DOI" value="10.17487/RFC9523"/>
        </reference>
        <reference anchor="RFC9769">
          <front>
            <title>NTP Interleaved Modes</title>
            <author fullname="M. Lichvar" initials="M." surname="Lichvar"/>
            <author fullname="A. Malhotra" initials="A." surname="Malhotra"/>
            <date month="May" year="2025"/>
            <abstract>
              <t>This document specifies interleaved modes for the Network Time Protocol (NTP). These new modes improve the accuracy of time synchronization by enabling the use of more accurate transmit timestamps that are available only after the transmission of NTP messages. These enhancements are intended to improve timekeeping in environments where high accuracy is critical. This document updates RFC 5905 by defining these new operational modes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9769"/>
          <seriesInfo name="DOI" value="10.17487/RFC9769"/>
        </reference>
        <reference anchor="I-D.draft-ietf-ntp-ntpv5">
          <front>
            <title>Network Time Protocol Version 5</title>
            <author fullname="Miroslav Lichvar" initials="M." surname="Lichvar">
              <organization>Red Hat</organization>
            </author>
            <author fullname="Tal Mizrahi" initials="T." surname="Mizrahi">
              <organization>Huawei</organization>
            </author>
            <date day="16" month="October" year="2025"/>
            <abstract>
              <t>   The Network Time Protocol (NTP) is a widely deployed protocol that
   allows hosts to obtain the current time of day from time servers.
   This document specifies version 5 of the protocol (NTPv5), which
   adopts a client-server model as its sole mode of operation.  Legacy
   operational modes supported in earlier versions have been removed to
   improve protocol robustness and clarity.  While this specification
   defines the protocol used for time distribution, it does not define
   the algorithms or heuristics employed by clients to determine or
   adjust their local time.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ntp-ntpv5-07"/>
        </reference>
        <reference anchor="IEEE1588">
          <front>
            <title>IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems</title>
            <author>
              <organization/>
            </author>
            <date month="June" year="2020"/>
          </front>
          <seriesInfo name="DOI" value="10.1109/ieeestd.2020.9120376"/>
          <seriesInfo name="ISBN" value="[&quot;9781504463416&quot;]"/>
          <refcontent>IEEE</refcontent>
        </reference>
        <reference anchor="SMPTE2059" target="https://pub.smpte.org/pub/st2059-2/st2059-2-2021.pdf">
          <front>
            <title>SMPTE Profile for Use of IEEE-1588 Precision Time Protocol in Professional Broadcast Applications</title>
            <author>
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 115?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge that perhaps this was not the smartest idea.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA41Z3XLbNha+51NglYsmGUm2HLuJNd22buy0nk3sbKxMp5Px
BURCEmqQYAFQjjaTd9ln2Sfb7xyAFCUnm73wiATxc36/8x14NBplQQejpmJw
NXu7PhFnZmmdDqvSD7JcBoW3zVToamGzwuaVLDG1cHIRRksnqzCqQk1/65OR
7FaODieZb+al9l7bKmxqrLm8mL3KqqacKzfNCmw8zXJbeVX5xk9FcI3K1lPx
LJNOSQhzWQXlKhUG2b11d0tnm5pEVIFexUyXSrx1NtjcGgi6VlWDDYX41kQh
ojSD3/FVV0vxKy2g8VJqg3Go8rNWYTG2bknD0uUrDK9CqP304IBm0ZBeq3E7
7YAGDubO3nt1gPUHtG4JQzRzrPR6WUnjF5hI9lLFwbesR8sNDORD7+AH24zj
CWNtv7nhNyeMV6E0g0w2YWXhHTGCBEIsGmOiv2+kkyuYCuv5i4rG8jQ85m3Z
GD8vaXyc2zLLKutKGWCmaZZR8HRvQrx79fLk9PAkPT6ffH/cPj570T6+OJ20
E05Pjp61j8+/P6XHy9H5OOpEx25V4m8XFxeTkxcvpuL8+nI8ORxPJoenBzR6
MzsfHx0eHY5PJ0eHz55/j8k3b97OLo4OT3hXxEbKBB6msFloowSEF++9EnbB
m49od3xUuabo3g0xJAqvUxz50ohfnJVFLn0QZ3VtNDIK4+xiITgLBESaxNOl
Wyr4vHV5De/6sg6KgwxvBz6QrKOj7mFEi8d1sciy8XicZaPRSMi5D07mIctm
K+0FkrYpVRVEoXzu9Fx5QXmnC+WiLKSX31T5ytlKex4T29AQ9/gRa+VY1xOa
HFZKfDG/xGNAyJOhkFUhamfXOMOLZaMLWeUwX8Urm2hJzOx2Pf7O75y4UhVN
K+LZ/ZknScdSF4VRWfZIACecLZqcxM6ynV1ZnPXxE/EhRdwtbLDQFYRaS6dt
s3MqCW3sUuc4X+crscIAnO8V9oMfC71YKEd2lL5WeWCzyfyvRjuCEVqN4K8C
/uh936BJ49xobOERJblpCpqICAPQ0ROmlEr6xilylx/i6LyBcBsM55BG+5IG
beNyEsso1jlaOzc2vyO/whgGQ6Wtlgg5C4M7PxbX0AHBDVexRaCbxw6wsiwK
HWKg9kwxV8lQhQhW6JJ8qbbi0IEyx4vMN8Poo3+QrtazpSlfk6XZMhCrrCE+
rFAqAAxv6hoKMpISQdL5GaK1FgorCVNrSIPZhQrQNhoZ8i6RN6zOyK/0ItAp
c0nxIkOQ+Z2PNtFUQYySa3woLYXihwQht8nFbTT0rGDrlBZ4joso++cwZCcZ
7e2VozAT841YWcOO7G3iAwnIWaAcQd/e93ylICUnBJTA7LJGRJpGeYT3b/ae
Qm64G/cxlk8Qy1/DvluhPhLAAMI2SHpIXtmQVKTEQ9r1XAyYQrT82VQcRNEB
lJ332inK3ZjPML00xt6zEehzjuIcAQLKqbU1TRvdlbrfzyYEjuFYTjgTjV7K
DQWYraG7JqfR3pRSeoHcK1Rt7IbxioACwImp+L7xQZUMXMA2eBZB/QrjkO7B
MRTz0BV/paw2YgEotC4FlF/ZxhR0fpB3iH/sZHfhkCxDmhZwgrE1SwL1OAL2
dYRKCgJIPlPU1oWUx+qj9vzcm42D2IVI4QZmoEVOFmpkFwvKuHBP+Vh3VSVG
Wcy4IUT0EXEolwy2p0EV8jGBPAmbg8WYdPruoRBNO7KrqgpSZtfDOoYJaTYS
bxFxH9r6ecsowU63gO+azTCoY030AxwvoQbG+rnUg8m5Wsk1QNbFYOjbrZAo
al91vBeP6Yv6KElV8gd4iS0t0QeKhRoJ4jBcNIgFrXwqOBRX8FmVsFXtJJys
5VwbvKrWJp0JhqJ/Gn0ZFGAxG/GnLAfgQClDIEZkBTezEdVe8aHjDgQnFHKF
9oTAumoIJan0KoN6i7hS2A7erjzQK0RUBcoTqM4b4L9oal7sFHAyJxlxWgcI
j8RLW0GxGN2k6jljK79H/9+pjUA5LrwYvHl/M4Nz+FdcXfPzu4t/vr98d3FO
zze/nb1+3T1kacbNb9fvX59vn7YrX16/eXNxdR4XY1TsDGWDN2d/DKIDBtdv
Z5fXV2evBzGH+tyDshFKz1VEZYQ5mUH6rCUlBNfil5dv//PvybH49OlvQOqj
yeT08+f08mLy/BgvRA3iabaCTeMrfLbJZF0r6ThaDDtcB9DlIeUZkv6+EuQi
WPPpB7LM7VT8MM/ryfGPaYAU3hlsbbYzyDZ7OPJgcTTiF4a+cExnzZ3xPUvv
ynv2x857a/fe4A8/GcrG0eTFTz9m+0QQwBoTG55AabJgPUgdlKG50X4VXfHp
09fqzOfPHJNdm0jR2WOTsPDT2fX59dOnU/Grqpg77fLNYY/9cDTYWjz+nTjf
tvXEpsZgyRMI/+iRuPgY0CdSGr7SyhQ4pDeVEj9fWes5xKhq9DK/az2wdk4c
hpAJ2mqqEqmkc4Hhgj5ENefqG8N3Trwsmsppf5e4Lw5YsBSMnHNFeuTWAbmp
8kbaWNAhtSKKkODR8mzf1FQmaJty3Ne3BJhhLRChreJ9AG3ZGDNjKmpOEfHE
iOosk2SiTKOTkGKk7Jjtd2Wr0fvZy0g3cgn8zrLLLfsju+HzMBaoFkB9J21b
/ROEcWtDxpidXQ6xcBIzElSrHnlQWJJr97RdVXf81Z4hhQEfIFTwzdwrrjbb
DeIJ5NttgYlkPRY2rnyxcHeL2q3RKovLPY4QeUD1XQCf/LhlYWB7zpa9M7YS
RNv3+BxG88a0Ic18J6CPQRjYsqRaWzAw4YCKiU5bSltKt6NfqiC1hW3nRsUC
ga6GhgJBf8yiRdNxA0m8mdAuEfHo6NfwgbiBCFURS0VvQNyQbyB6ll20/IQ4
5j5/IvkZXblTq7hba7ugu4qgFFiLrhYslosp3syGNqMAIM7Ch5NrI2kjLafJ
FnD9YOGU+pcaRHtw3xKVp/feFlRAdYW85ErBKYOUWOqqSjSH51NjneanoUKC
GqWAbWkjn4L9Bt6oe1UM6PsgheqgBYO5gmuZYUQP5tyeUTzsS/YhXVvcDlF5
VR37vU5X9A1IQLR+Oao7wlR5n7yEpqBouNdjAoK2zxbw2w1jz1foMse8S13O
thFk+5bWJtq+Yzc2GsVJSzRJazYacC7FQAQcdjP7D8FLW/JAiwbMqho2cNhL
rYWRBN6iRrulAkvTtUcw8+s9KBhwyXjfdf7o8872bhgYeriBJwTaMwXFDRki
Lu3dW4nZinAkZTo3gnZ7XeHbtpvWA0EpRUFbPavY0USITAArG8OVYAH+MJpD
L25RIvOj1NPLxnWeoXiNzXUHuDASwdzDfmTbOlDP1GZe6kTAUZgWASWKRWPa
IH5wP7ElytANvwT9DvLIcWezdBFCuN1mK1KuxbJcdS3IceyF9uXc9kbynpRi
ag/Ma9MDTJVxllTZX9veCu35h+wZaxZRflrc6j8Wb9DSkOHAOjbDbXhxMxxr
Njcgc2qLKOqXvfsgqAtd6OoYctItglq3FxOoe8SVhQOBsJxWsSxopHShKQUX
TcCyYcqv/6MjjMjvbE6Xeumup2Zb01tKAY7wm/aKZJ8TtUyou0PZu4LjCkvY
0XYlMa6oKWi8j5QMoCPohjTCDx5uhztd4v6eXcS0nef/ujvYC0f4hcrmFeKa
6HRYUd+P0iAji2oW2JfS3Wy6Cxkqd842y1X/lm8bCrttVjQaNei6TkUUfXFt
0VxWy3Sl5TZ1sEsna/ipLbx8kZhuedqbBPTOIJHfkKPBC8pozhOQDbQ5+Xat
JYxzwzalO+db+PFc0WU75fbDe41kJ4qVL4UKHQkCByoY5YDV+BqJE7vf4rLj
4l6pc47h2FmaP3XF32wiSLQqprJE2BfXtSiEOEETWquOsxHDZjLSXqfseQK1
keKrSve5fRnJvkxJZSIjRUeD4Yg2seJVLDKcQFdSQx4v/Fzsc/sbwkB1gyYj
j7wfZ3LWXJ5dnT3ImN2WhZCgsnGm5Ibcp5tgQmruR3LiJmDeSz4r+zSN/2tS
xd8HgHSvBp+xKRoTrG9nqgiEiK2VrH3k/Pcy8nqmD6V09G8YAcEAtP8FFENB
9SwbAAA=

-->

</rfc>
