<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC3110 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3110.xml">
<!ENTITY RFC4033 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4033.xml">
<!ENTITY RFC4034 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4034.xml">
<!ENTITY RFC4035 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4035.xml">
<!ENTITY RFC4509 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4509.xml">
<!ENTITY RFC5155 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5155.xml">
<!ENTITY RFC5702 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5702.xml">
<!ENTITY RFC6840 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6840.xml">
<!ENTITY RFC2065 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2065.xml">
<!ENTITY RFC2535 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2535.xml">
<!ENTITY RFC2536 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2536.xml">
<!ENTITY RFC4470 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4470.xml">
<!ENTITY RFC5011 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5011.xml">
<!ENTITY RFC6014 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6014.xml">
<!ENTITY RFC6605 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6605.xml">
<!ENTITY RFC6698 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6698.xml">
<!ENTITY RFC6725 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6725.xml">
<!ENTITY RFC6781 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6781.xml">
<!ENTITY RFC6975 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6975.xml">
<!ENTITY RFC7129 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7129.xml">
<!ENTITY RFC7344 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7344.xml">
<!ENTITY RFC7583 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7583.xml">
<!ENTITY RFC7646 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7646.xml">
<!ENTITY RFC8027 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8027.xml">
<!ENTITY RFC8078 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8078.xml">
<!ENTITY RFC8080 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8080.xml">
<!ENTITY RFC8145 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8145.xml">
<!ENTITY RFC8198 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8198.xml">
<!ENTITY RFC8509 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8509.xml">
<!ENTITY RFC8624 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8624.xml">
<!ENTITY RFC8901 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8901.xml">
<!ENTITY RFC9077 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9077.xml">
<!ENTITY RFC9157 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9157.xml">
<!ENTITY RFC9276 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9276.xml">
<!ENTITY RFC9499 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9499.xml">
<!ENTITY RFC9558 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9558.xml">
<!ENTITY RFC9615 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9615.xml">
<!ENTITY RFC9718 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9718.xml">
<!ENTITY I-D.ietf-dnsop-compact-denial-of-existence SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-dnsop-compact-denial-of-existence.xml">
<!ENTITY I-D.ietf-dnsop-rfc8624-bis SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-dnsop-rfc8624-bis.xml">
<!ENTITY I-D.ietf-dnsop-must-not-sha1 SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-dnsop-must-not-sha1.xml">
<!ENTITY I-D.ietf-dnsop-must-not-ecc-gost SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-dnsop-must-not-ecc-gost.xml">
]>


<rfc ipr="trust200902" docName="draft-hoffman-rfc9364bis-01" category="bcp" consensus="true" submissionType="IETF" obsoletes="9364">
  <front>
    <title abbrev="DNSSEC">DNS Security Extensions (DNSSEC)</title>

    <author initials="P." surname="Hoffman" fullname="Paul Hoffman">
      <organization>ICANN</organization>
      <address>
        <email>paul.hoffman@icann.org</email>
      </address>
    </author>

    <date year="2025" month="July" day="06"/>

    
    
    

    <abstract>


<?line 64?>

<t>This document describes the DNS Security Extensions (commonly called
"DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as
a handful of others.  One purpose is to introduce all of the RFCs in
one place so that the reader can understand the many aspects of
DNSSEC.  This document does not update any of those RFCs.  A second
purpose is to state that using DNSSEC for origin authentication of
DNS data is the best current practice.  A third purpose is to provide
a single reference for other documents that want to refer to DNSSEC.</t>

<t>This document obsoletes RFC 9364.</t>

<t>This document is being tracked at (https://github.com/paulehoffman/rfc9364bis).</t>



    </abstract>



  </front>

  <middle>


<?line 79?>

<section anchor="introduction"><name>Introduction</name>

<t>The core specification for what we know as DNSSEC (the combination of
<xref target="RFC4033"/>, <xref target="RFC4034"/>, and <xref target="RFC4035"/>) describes a set of protocols
that provide origin authentication of DNS data.  <xref target="RFC6840"/> updates
and extends those core RFCs but does not fundamentally change the way
that DNSSEC works.</t>

<t>This document lists RFCs that should be considered by someone
creating an implementation of, or someone deploying, DNSSEC as it is
currently standardized.  Although an effort was made to be thorough,
the reader should not assume this list is comprehensive.  It uses
terminology from those documents without defining that terminology.
It also points to the relevant IANA registry groups that relate to
DNSSEC.  It does not, however, point to standards that rely on zones
needing to be signed by DNSSEC, such as DNS-Based Authentication of
Named Entities (DANE) <xref target="RFC6698"/>.</t>

<section anchor="dnssec-as-a-best-current-practice"><name>DNSSEC as a Best Current Practice</name>

<t>Using the DNSSEC set of protocols is the best current practice for
adding origin authentication of DNS data.  To date, no Standards
Track RFCs offer any other method for such origin authentication of
data in the DNS.</t>

<t>More than 15 years after the DNSSEC specification was published, it
is still not widely deployed.  Recent estimates are that fewer than
10% of the domain names used for websites are signed, and only around
a third of queries go to recursive resolvers that validate.  However,
this low level of deployment does not affect whether using DNSSEC is
a best current practice; it just indicates that the value of
deploying DNSSEC is often considered lower than the cost.
Nonetheless, the significant deployment of DNSSEC beneath some top-
level domains (TLDs) and the near-universal deployment of DNSSEC for
the TLDs in the DNS root zone demonstrate that DNSSEC is applicable
for implementation by both ordinary and highly sophisticated domain
owners.</t>

</section>
<section anchor="implementing-dnssec"><name>Implementing DNSSEC</name>

<t>Developers of validating resolvers and authoritative servers, as well
as operators of validating resolvers and authoritative servers, need
to know the parts of the DNSSEC protocol that would affect them.
They should read the DNSSEC core documents and probably at least be
familiar with the extensions.  Developers will probably need to be
very familiar with the algorithm documents as well.</t>

<t>As a side note, some of the DNSSEC-related RFCs have significant
errata, so reading the RFCs should also include looking for the
related errata.</t>

</section>
</section>
<section anchor="dnssec-core-documents"><name>DNSSEC Core Documents</name>

<t>What we refer to as "DNSSEC" is the third iteration of the DNSSEC
specification; <xref target="RFC2065"/> was the first, and <xref target="RFC2535"/> was the second.
Earlier iterations have not been deployed on a significant scale.
Throughout this document, "DNSSEC" means the protocol initially
defined in <xref target="RFC4033"/>, <xref target="RFC4034"/>, and <xref target="RFC4035"/>.</t>

<t>The three initial core documents generally cover different topics:</t>

<t><list style="symbols">
  <t><xref target="RFC4033"/> is an overview of DNSSEC, including how it might change
the resolution of DNS queries.</t>
  <t><xref target="RFC4034"/> specifies the DNS resource records used in DNSSEC.  It
obsoletes many RFCs about earlier versions of DNSSEC.</t>
  <t><xref target="RFC4035"/> covers the modifications to the DNS protocol incurred by
DNSSEC.  These include signing zones, serving signed zones,
resolving in light of DNSSEC, and authenticating DNSSEC-signed
data.</t>
</list></t>

<t>At the time this set of core documents was published, someone could
create a DNSSEC implementation of signing software, of a DNSSEC-aware
authoritative server, and/or of a DNSSEC-aware recursive resolver
from the three core documents, plus a few older RFCs specifying the
cryptography used.  Those two older documents are the following:</t>

<t><list style="symbols">
  <t><xref target="RFC2536"/> defines how to use the DSA signature algorithm (although
it refers to other documents for the details).  DSA was thinly
implemented and can safely be ignored by DNSSEC implementations.</t>
  <t><xref target="RFC3110"/> defines how to use the RSA signature algorithm (although
refers to other documents for the details).  RSA is still among
the most popular signing algorithms for DNSSEC.</t>
</list></t>

<t>It is important to note that later RFCs update the core documents.
As just one example, <xref target="RFC9077"/> changes how TTL values are calculated
in DNSSEC processing.</t>

<section anchor="addition-to-the-dnssec-core"><name>Addition to the DNSSEC Core</name>

<t>As with any major protocol, developers and operators discovered
issues with the original core documents over the years.  <xref target="RFC6840"/> is
an omnibus update to the original core documents and thus itself has
become a core document.  In addition to covering new requirements
from new DNSSEC RFCs, it describes many important security and
interoperability issues that arose during the deployment of the
initial specifications, particularly after the DNS root was signed in
2010.  It also lists some errors in the examples of the core
specifications.</t>

<t><xref target="RFC6840"/> brings a few additions into the core of DNSSEC.  It makes
NSEC3 <xref target="RFC5155"/> as much a part of DNSSEC as NSEC is.  It also makes
the SHA-256 and SHA-512 hash functions defined in <xref target="RFC4509"/> and
<xref target="RFC5702"/> part of the core.</t>

</section>
</section>
<section anchor="additional-cryptographic-algorithms-and-dnssec"><name>Additional Cryptographic Algorithms and DNSSEC</name>

<t>Current cryptographic algorithms typically weaken over time as
computing power improves and new cryptoanalysis emerges.  Two new
signing algorithms have been adopted by the DNSSEC community:
Elliptic Curve Digital Signature Algorithm (ECDSA) <xref target="RFC6605"/> and
Edwards-curve Digital Signature Algorithm (EdDSA) <xref target="RFC8080"/>.  ECDSA
and EdDSA have become very popular signing algorithms in recent
years.  The GOST signing algorithm <xref target="RFC9558"/> was also adopted but
has seen very limited use, likely because it is a national algorithm
specific to a very small number of countries.</t>

<t>Implementation developers who want to know which algorithms to
implement in DNSSEC software should refer to <xref target="RFC8624"/>.  Note that
this specification is only about what algorithms should and should
not be included in implementations, i.e., it is not advice about
which algorithms zone operators should or should not use for signing,
nor which algorithms recursive resolver operators should or should
not use for validation.</t>

</section>
<section anchor="extensions-to-dnssec"><name>Extensions to DNSSEC</name>

<t>The DNSSEC community has extended the DNSSEC core and the
cryptographic algorithms, both in terms of describing good
operational practices and in new protocols.  Some of the RFCs that
describe these extensions include the following:</t>

<t><list style="symbols">
  <t><xref target="RFC5011"/> describes a method to help resolvers update their DNSSEC
trust anchors in an automated fashion.  This method was used in
2018 to update the DNS root trust anchor.</t>
  <t><xref target="RFC6781"/> is a compendium of operational practices that may not be
obvious from reading just the core specifications.</t>
  <t><xref target="RFC7344"/> describes using the CDS and CDNSKEY resource records to
help automate the maintenance of DS records in the parents of
signed zones.</t>
  <t><xref target="RFC8078"/> extends <xref target="RFC7344"/> by showing how to do initial setup of
trusted relationships between signed parent and child zones.</t>
  <t><xref target="RFC8198"/> describes how a validating resolver can emit fewer
queries in signed zones that use NSEC and NSEC3 for negative
caching.</t>
  <t><xref target="RFC9077"/> updates <xref target="RFC8198"/> with respect to the TTL fields in
signed records.</t>
</list></t>

</section>
<section anchor="additional-documents-of-interest"><name>Additional Documents of Interest</name>

<t>The documents listed above constitute the core of DNSSEC, the
additional cryptographic algorithms, and the major extensions to
DNSSEC.  This section lists some additional documents that someone
interested in implementing or operating DNSSEC might find of value:</t>

<t><list style="symbols">
  <t><xref target="RFC4470"/> "describes how to construct DNSSEC NSEC resource records
that cover a smaller range of names than called for by <xref target="RFC4034"/>.
By generating and signing these records on demand, authoritative
name servers can effectively stop the disclosure of zone contents
otherwise made possible by walking the chain of NSEC records in a
signed zone".</t>
  <t><xref target="RFC6975"/> "specifies a way for validating end-system resolvers to
signal to a server which digital signature and hash algorithms
they support".</t>
  <t><xref target="RFC7129"/> "provides additional background commentary and some
context for the NSEC and NSEC3 mechanisms used by DNSSEC to
provide authenticated denial-of-existence responses".  This
background is particularly important for understanding NSEC and
NSEC3 usage.</t>
  <t><xref target="RFC7583"/> "describes the issues surrounding the timing of events
in the rolling of a key in a DNSSEC-secured zone".</t>
  <t><xref target="RFC7646"/> "defines Negative Trust Anchors (NTAs), which can be
used to mitigate DNSSEC validation failures by disabling DNSSEC
validation at specified domains".</t>
  <t><xref target="RFC8027"/> "describes problems that a Validating DNS resolver,
stub-resolver, or application might run into within a non-
compliant infrastructure".</t>
  <t><xref target="RFC8145"/> "specifies two different ways for validating resolvers
to signal to a server which keys are referenced in their chain of
trust".</t>
  <t><xref target="RFC9499"/> contains lists of terminology used when talking about
DNS; Sections 10 and 11 cover DNSSEC.</t>
  <t><xref target="RFC8509"/> "specifies a mechanism that will allow an end user and
third parties to determine the trusted key state for the root key
of the resolvers that handle that user's DNS queries".</t>
  <t><xref target="RFC8901"/> "presents deployment models that accommodate this
scenario [when each DNS provider independently signs zone data
with their own keys] and describes these key-management
requirements".</t>
  <t><xref target="RFC9276"/> "provides guidance on setting NSEC3 parameters based on
recent operational deployment experience".</t>
  <t><xref target="RFC9615"/> "allows managed DNS operators to securely announce
DNSSEC key parameters for zones under their management, including for
zones that are not currently securely delegated".</t>
  <t><xref target="RFC9718"/> "describes the format and publication mechanisms IANA
has used to distribute the DNSSEC trust anchors".</t>
</list></t>

<t>There will certainly be other RFCs related to DNSSEC that are
published after this one.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA already has three registry groups that relate to DNSSEC:</t>

<t><list style="symbols">
  <t><eref target="https://www.iana.org/assignments/dns-sec-alg-numbers">DNSSEC algorithm numbers</eref></t>
  <t><eref target="https://www.iana.org/assignments/dnssec-nsec3-parameters">DNSSEC NSEC3 parameters</eref></t>
  <t><eref target="https://www.iana.org/assignments/ds-rr-types">DNSSEC DS RRtype digest algorithms</eref></t>
</list></t>

<t>The rules for the DNSSEC algorithm registry were set in the core RFCs
and updated by <xref target="RFC6014"/>, <xref target="RFC6725"/>, and <xref target="RFC9157"/>.</t>

<t>This document does not update or create any registry groups or
registries.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>All of the security considerations from all of the RFCs referenced in
this document apply here.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

&RFC3110;
&RFC4033;
&RFC4034;
&RFC4035;
&RFC4509;
&RFC5155;
&RFC5702;
&RFC6840;


    </references>

    <references title='Informative References' anchor="sec-informative-references">

&RFC2065;
&RFC2535;
&RFC2536;
&RFC4470;
&RFC5011;
&RFC6014;
&RFC6605;
&RFC6698;
&RFC6725;
&RFC6781;
&RFC6975;
&RFC7129;
&RFC7344;
&RFC7583;
&RFC7646;
&RFC8027;
&RFC8078;
&RFC8080;
&RFC8145;
&RFC8198;
&RFC8509;
&RFC8624;
&RFC8901;
&RFC9077;
&RFC9157;
&RFC9276;
&RFC9499;
&RFC9558;
&RFC9615;
&RFC9718;
&I-D.ietf-dnsop-compact-denial-of-existence;
&I-D.ietf-dnsop-rfc8624-bis;
&I-D.ietf-dnsop-must-not-sha1;
&I-D.ietf-dnsop-must-not-ecc-gost;


    </references>

</references>


<?line 299?>

<section anchor="changes-since-rfc-9364"><name>Changes Since RFC 9364</name>

<t>This document obsoletes RFC 9364, which is BCP 237.
The changes from that document are:</t>

<t><list style="symbols">
  <t><xref target="RFC9558"/> was added to this document</t>
  <t>RFC 7958 became <xref target="RFC9718"/></t>
  <t>RFC 8499 became <xref target="RFC9499"/></t>
  <t><xref target="RFC9615"/> was added to this document</t>
</list></t>

<t>The following drafts are currently in the RFC Editor's queue and will added here when they become RFCs.</t>

<t><list style="symbols">
  <t><xref target="I-D.ietf-dnsop-compact-denial-of-existence"/>, "Compact Denial of Existence in DNSSEC"</t>
  <t><xref target="I-D.ietf-dnsop-rfc8624-bis"/>, "DNSSEC Cryptographic Algorithm Recommendation Update Process"</t>
  <t><xref target="I-D.ietf-dnsop-must-not-sha1"/>, "Deprecating the use of SHA-1 in DNSSEC signature algorithms"</t>
  <t><xref target="I-D.ietf-dnsop-must-not-ecc-gost"/>, "Deprecate usage of ECC-GOST within DNSSEC"</t>
</list></t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The DNS world owes a depth of gratitude to the authors and other
contributors to the core DNSSEC documents and to the notable DNSSEC
extensions.</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA51aXXPbOJZ9x69gpWtrO1OSI9mWZadf1u14plM76+lqZ3Zr
a2YeIBKSMKFIDUFaUU/lv885FwAJyk46uw/doSkQuLgf5557gel0qlrbluZt
9u7hMXs0edfY9pjdf2pN5Wxduex7/PB4f/da6dWqMU8yEH+ros4rvcOHRaPX
7XRbr9c7XU2bdX5zcXW5sm46myu7b95mbdO59nw2u5mdK9etdtZx5va4x8fv
7z/8XuW6fZut8r2qV64uTWvc24yTKKW7dls3b1WWTfFfltkKP/18lv3kV5N3
XoqfdVeOXtfNRlf2V91iLaxzd/vwIO/NTtvybbbH+LMg9H/YXFfVGb5Qqqqb
Hb55Mlz0l9/fXczns/B4Obu4GB4vh8dFfFzMbsLjYr6IbxfL2Xl4vLq+xGTK
VuuTVc5nV3H4+eIiebyKU18uoxiL2Xwe55vNoxhXV7NF/3hzHR+X5/3b5XX/
2c0yvl3Oz6PIy4vLONlycR13ury6jDJcz86X/ePyun+8jpJdzy8X/WMvw/Wg
leur87jE9c0sinMzW8Z5b+aL/vF8GRe+ubyJM9wsFnHem6t5XO1mOZe376fv
zqxp19OicvV+mte7vc7baWEqq8tpvZ6aT9bBs3Pzwmh4LuWbwnVf+HUHH55W
dTt1Wz3/2u8mz6eb2rUco9R0Os30yrUN5FDqw9a6DIHT7UzVZoVxeWNXxmXt
1nw5/rCLXV2VxyzXZWkK9coH4KvX+Ey3mW5M5vYmt2trCgQI9eEy+uqE/7+c
ZLoq+LTAk8sOpizxr9LZFu/XCJp6ndUQoHFnWfanymT7rtnXzmQQta0xYdvU
RZebDKtzLGWVJWylag4vNX50tZeGvzZGF6aBuFXWVXhyLSXgL4i1IxaHtK3D
XMrvBOueKKaGTqDLrNsXusXK+EpWplhcG1/cZs7kdVWosbhYCx+IKJ2z1Sag
VYaAAyLYDfRDTMEqiHlCQxAjw0Ja5oCYMEmbwRINhdnTdDY3sma7tU1xoqF9
Uz/ZwkCjXLDk/temoZP5Vanbfm/Oy3bQmBnfylA+BE2cukgPiNy2YOKzIXhe
Ge6UPvYRLoDpv9+27d69ffNmY9tttzqDC70h4JkAeG8GlH595p10Z4uiNEp9
B88OJqd6uJrJ8npwsqA2bu0gWzHZx6o+0LeCrr9v5ZPdyla9iv/5zwCgnz9P
svjHJf+gb8QXi8+fXydhAY2alpaHits6r0unRHtB4180aBYNCpvJ1MTdz5+D
O8H3saRhhBUuOJVsULx61SX+t4b/amoZvo/4Q8RsjHjIQR+9KGHLh7r56J6Z
pgTYOD+tDHbbuisLmAvrIboRGjDX6ojg2RmEksoROS1Nicixu31pZOmwqQm2
G0dCR/uyPmLoJEoA9Vs6gwp+C3kl7nRT2F9NQe8tsddus+XsZg370Q0dYhKa
hAeuuLO64YiJSsI4CE11aOewMQaBk73R94ixjdkSrZ4YI+8ZeNBxa5qdreqy
3hyzdVPvgqKHODhYikMUXNtK/FfwY/jsTGEuXQJZ9rWVyKkDvJTmifHz/vbh
Fn9tIElzzDYQfR8UjSECA/WAMO8Hs06ybX0wT6aZ+JkDboiuhgkAOVX2K5Tt
VGVMIRKKlpzdVN5ufvJJ5rp8G/x/+qN2+PH2GcY8wI+K7B7vWmvIqm4f7l8H
70S+/vwZ3vMdgm8wp85+JA7dBRz6OeCQUn92Xl0mDj6Nkq/iGCNX6UI29C0B
9KHmk5lAc9lj1JL6QLDxrg1IgZsIRgvU7QwMWwhAiGK+CLsecqu4EyjgvxiG
MECVzRfZ0egGWli3RMhksyMYogfvuxW8cWuKCUJAYe+utchV9NgDggyW9OEi
UfCLyakNaMbuCAaSP8Xma3OQlcAf57N/i6muqMEXKyGZjp7tN3YwK2fj194h
PJJJotZwRWQmHdIFZvpHZxqafVN71IdRGC94Ar7DE4PbPenSUtmQ86fgospH
GwAWXm8kA/vdjDOlhhFy7HdrxAaj3GeZ7V/0hR+IGX/vGMlVQZUaN6RxCNMZ
sVMEm2FCvAZ8pjAGCYP2Mg//rj1TDwgf/FUa5ybymqoS4wn96bfhPY5Tr0wF
DNwK0EFV+6ny2/ZmQNx8+OM79zqLhAKDm2lXWapQly9PSX/nWH6ZuFvW1NDb
rx5NQbDI0SJ1GPap9/sS4q6QGmn3E1QGBqzg9HBxhJMGCFGurd1sib71HpYT
f4d6vPyqPlQkWj7U38fJBtUq9Y7brfd0CWwhOAQHDK7CRXxhZFspIgAADX/p
CZ7Cv5xDt/X/bx4inoKnSmanwva6EcqWRmLEm0BpJE0EP8So3RmpwzHmD2aT
9GPJuEM2oCyYbwVNH8lgSqPhlStoXe9saXUj+UImMD03Rpgk6jow6Ps5uAMP
2ApbQg56No8uN9z5dpeK4fUHA90K/SDLQHgB/cQhR/uf+ixTeBTc6qeReyvT
QP2aH8reI2TL4KATSW62yssOy5R1/ZGD6GYYqOLsfp4zYWZBd3fU3bsotFL/
E3hYzyaxjVglxFzgoQiY1fQgP2xFjUD1B5+WWJOCNBFhOXJtQeQTusY6NfnZ
s/Ezda+b0kKKfqWgGoLUygAzIhYzveoRIDgUOIZeIySE3KBN6dRk2NPO6Mov
2/sgOERrSdOUEApfCn0z6zzzPLfdNsbEqU5ddANoajwRrJ9I6e1aeD75w97m
KBrV77J0ScEPaBqDn6w5DJA0CUanuUFFCMI7gEYbGGZgXwjTLs3HIYecpatg
L33xN5SR/LZrck6CPRQhb0EfCRsaei2+KhO/1Ctq3QQTEgrEgL3go7VpfdGE
X3hXF70H9VyN0iQmkvxD6pRWfoaVVAgCcQdoRXjXRPCIfwbK5d8qj2B8jy2V
orhEtRHVItfosXXqZxHawQD3WQ40IDDawKJOrH5CMCIBzxnAnrADSfqEcUra
+w05JMwDyMKEL+P4qeYr9RIGyz7esHw8Hf4Ce1CBYEcHHm8BLLfsiGZr+mBJ
Tu9BSPzmGIAJeznu23rT6P32KA4jxiFnbw91+C4BysYXQuu6RObHHIn3s20F
3/Bx6MTD4Q6d81+8e7wVrei2a1IQ/l6H+kTZ1iOZeNFp+RzgEbO32pYoXzOZ
0cOQBftSvRFYC8MZ2Idwek0eCPaOlesmpe8nRkvii62/L+/jl9/cx/9pE5yu
p64afGSjfFQhDe7rfVcidUVn6hfzM/W9g/dSkWE/qO1Cg4HJy+dnZpNg+dBW
abenrnLGtCd8kD5uPmmqJiAnu3SMeIEor40PH/7oWaL3B8B33knSUj3WMPpz
0D+IHVjPLUoPiY4BImJOk6wr+ZmItNN/x+YiekygrD7VC9Pu+U1hneAQ10WF
atyQ433t8RzLBcA5QIqMkzYB+TKCd1fZVTcoq/7qhJ6QdizCnSnXyHlOrYC+
O6LDaCzRF5kv0YIIT7tWCNDG/KOzjfGZXeKab4OSaD0WOUmPRMB7MLmLHUQI
BCvA5KKnFbgPXgb1hL6h1ONdE5nJmDwTEmIiHLED4gnIoKWpG5K1tEDzpJrB
GCAbnPd8Np/5Alz4jm+KCJ0CtaH9AicP7tazTGptTExInFNDrSh7RLaoUc4X
jCV6H5KXyLDTH1HRP+DvC290duoxFzshUsbL7pLyAT88+GIg2YSfhWs8/nQ7
PV9ciQPweTE/p/G37B3lXp5nhGQxu+GKsJCXYDk7x99x3Si5p3wxXGCGuwGh
bZ7dDiDAtWP9ENsF+WhwghjtEWRFaMzBYBdViAWmQfgs2zmdJM29FHTwrAYD
/Br0RD+vhjxHB7CBozaAA+YKZAkMUC+AlBBAIX+6qPetR99RLbDboYhrj2/V
fVnaPZyLbQ989A7R1mLrjz3Q3g5Ae38H5O97KLNF0Ol9cWCLYpp/wwzFMAPP
MUAEs0ymlR6h/Byll1iWUuIrcAwTN9JgUBFYSCv/8KfHD89HB1hdLK4DjRbP
6jXUtWrLOKLaZNnS7ix/QQKa4I+PPqHlmglJWn/wXd9wxXb7VfoIkrrAz+R2
7OVX3W5lGk95uqr13FK9H1OYBHQP27rvW0tdeIBnbUeuVQ/Jd6CbPfcZSsFQ
pni9X51fit4fYqryLY9xn4ctB2mtCEOVxnOycKynYDP/qHy5EXmlxN5JngeO
npmzSVCd9FCKJ/bHZAn1bHPSKRiSTliyHjVIaQrpe3lbT3ia+FxNzwncV+ZV
6byxjK8rDw7JMVF/huArmdPIIiaFnrd5XoeHdor6EmhMfJuDQG2anfNNKMlA
9OhNXRfK78A7X2wvedRg9wzA0XcnYerHpJju2+MqJjW+dmmd35cHX2KcPBIV
pjacHIQuJNSyNeU+6XoM5MdG6qTkhBrC5tuQj7T0K+udVOBrwDlVHo6pwsyM
2FBXMcVdCzcciFWfDNO5B27J09hQIUoLHXax3U7O4l5UpKTsnT6GOhrV25Ot
QTeEIcT+gjC3PvGdps64NM95R8rq+n4ykE9Mdgfp//P+f58XkohwUWdUTjjV
I9GoNE+8mDcf++EhsyOzeda1VmklN4jE42SIFM9kUjFX0kE6xFIZSi7qvkJH
ydbtOa0o2RS+8c/tbu2e52LtgfAZFvVi+Jpga8vnUszZh08UwwX1S70zqSkM
4Ng3jVVs79pqVKrGc0jjGQQX9sSDsVyZjRR8KteQhvQ4yhGYdjitGskmxBZS
7KXJ5lkOWTjK/1L0HRUcLCAwkVCIdwMDXvOcD6TZtR4xBi5LhsbaaYXELy3e
1rZdWi8k1TZRQw/zfxlAhiNgsnqTAtfJMTAorEB+QhSTFU4OUuPRmQ17OYF6
f8gRY2roYPt2C2hZEbqjnUnbN5dL0stXY08Qps42cZf3HWKx62mU+JNB3yTS
PtniqZHDQ6zmjxKkU+5P9MUd4OdJU+dM/XgMDadwIFj0BMKjYwwxydEoAnj+
kPYRFJeJDV3vr9KaxU9yNFjvPelH7VTWrvNW/dW3NhjNqD6kaj1YZ/wZ4b5G
GbcqDUU96PJjBA1UhFZ6HUEZfejrNNpfJdh3syRXezU0rjQPVEcZDnMDCqbu
CJPu0mOSWiaFIwid8fsLKbYIVC+pytmOJxkfPJGkHfvv9qyYEqF4EYZChbNl
l/rcSucfN3KmIwmVFCL0+ul+ShT2qe2r+pNg3xnWzNbtQr4YOg/YTDzKTjpW
PC14fmFFoh7uZ9yrECgqEQthMyrKhoKQQg23MKjXKF4ogjqnNybRw+L6Yuz7
3FIoHOEnsl40PaoGibB1BppIlwmA3yBHhx909hH6pjf0bTjSn+dewYtGfmHf
bnkI+Jh9kAR6G5Lz9w8fbt3rSTA5/RrZUPQKhwAi2w3TUlDwwJeQxG2JZR3V
D6fXqzI5dUnGEVP62zTh1OlVmqnOl2P18MQBYBOr6uy/Bw+OvdhSDvJc262m
/Z+EpXC4JOt6RGq6ypevBHpRWlVXU6nKSquFVa8b7TEIu0kFm1+eBBXbdkOP
GgHmTiOsDyse9XwxrGA/39/p77UUIbGDQMXg9xk4kYd3tqRBjGDhwZ1Hc3K+
5GKA2O0Ax8/aACiefENxP/AylK+f5zOJpvk8YOppL/ra19MjPOmDLhxOSVeN
xFFuP1RSRTUSBeFKD6PHCI0ujBfRJ7zILOjF/nJRDHNhd3itApE9Ocvl9aqy
v4pkmn93aRc/tdzNbO6RB7jOxJY0YnZ1YcroWrncBAsME/HvUGjqxtbZX/8i
OjQgErHjTlBpeKprSC3DfRBYONQx7IGr2CWDGetDJXb+699E1aPgB/7jpyly
DICCUqm0R5Wa/Hx5NYLQTQdPE1ZYkaq1EX0uqG6kp5bKWsmFibpSvnAe8d9E
E+bTnorDbOmKV3NxerGs9MIgovRCkoqKvi2Qw/KxqoBfuQmUQ6yayELTeuYm
kBmUM+w8PbjhsXLC8hgg5ObJ9Zu4KExILDNFKvlyfv0cZv21UH8YyjOHiA1D
BuGdF+kLRMgrePvFrrqh7JDMkhY0r/zpFgSUMMhNw5D07XDfmZYaLB449pVk
vzHVH4D03T6px32LSq7h3IWbAJ59KyUvdcnKxNee/mTi67d1wrqeif0l9t/6
folvWLi/9bfbDofDGVBR8+buG+3o3+KTb4rKMc1M8e00fPU6nfPUCb9tSs6I
BJxfTIcvR9Oi8vnlF95rJhXhfYuBdnzLCm7aNFN+jlmFkjcd26ERb57po1fm
gbbl8ZWNly/CbTbpYvk6ougZJi8N9+ehvCA8Og/lDdxwHvq1K5mQKR5+Vcdn
ZkVohFe+qfTdcLP11FFuh1ulfe86H43xNe7p7dNRMlKjg2LJq/A6Iz1UXm4k
U6IUd+Hw4tESleKVyt++dBnpBkb9ePdzdn6xPPP3IsN84fxNt4kMDSuK6fMm
X1H4GBuJjIFca3mzuJaeHqh7AhPh12uk1PGvkmP7RTwYfmURkbnvn/iL++Ho
pket4EJc7x4EuGbeQs7qPJn2eVRm94AiuZuMOjRI5Xau3/e3X8amA766879n
7+R32vq+5759L/HVSzMnF7dlpnii9HK7nDfAhMQHwvdn79A/+3OqFxcY3f32
Sxhk63C6THWxxofEPACYp53P5+eDv7FCvD0+WsV4ki46ububSjs5EMSoFiWF
fs6+LCrKTTg/iq1A3k9lU/Eg3AhZlXeW1ohWzdK+6E+3fAUZzteYGaS2kfQS
MmkPL2GHJydgfgA2whtTkV0nF3bUvwB5kDKFcTIAAA==

-->

</rfc>

