<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-drip-registries-29" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="DET in DNS">DRIP Entity Tags in the Domain Name System</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-29"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter" role="editor">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2025" month="May" day="21"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 90?>

<t>This document describes the discovery and management of DRIP Entity Tags (DETs) in DNS. Authoritative Name Servers, with DRIP specific DNS structures and standard DNS methods, are the Public Information Registries for DETs and their related metadata.</t>
    </abstract>
  </front>
  <middle>
    <?line 94?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Registries are fundamental to Unmanned Aircraft System (UAS) Remote Identification (RID). Only very limited operational information can be sent via Broadcast RID, but extended information is sometimes needed. The most essential element of information from RID is the UAS ID, the unique key for lookup of extended information in relevant registries (see <xref target="rfc9434-fig4"/>; Figure 4 of <xref target="RFC9434"/>).</t>
      <figure anchor="rfc9434-fig4">
        <name>Global UAS RID Usage Scenario (Figure 4 of RFC9434)</name>
        <artwork align="center"><![CDATA[
***************                                        ***************
*    UAS1     *                                        *     UAS2    *
*             *                                        *             *
* +--------+  *                 DAA/V2V                *  +--------+ *
* |   UA   o--*----------------------------------------*--o   UA   | *
* +--o--o--+  *                                        *  +--o--o--+ *
*    |  |     *   +------+      Lookups     +------+   *     |  |    *
*    |  |     *   | GPOD o------.    .------o PSOD |   *     |  |    *
*    |  |     *   +------+      |    |      +------+   *     |  |    *
*    |  |     *                 |    |                 *     |  |    *
* C2 |  |     *     V2I      ************     V2I      *     |  | C2 *
*    |  '-----*--------------*          *--------------*-----'  |    *
*    |        *              *          *              *        |    *
*    |        o====Net-RID===*          *====Net-RID===o        |    *
* +--o--+     *              * Internet *              *     +--o--+ *
* | GCS o-----*--------------*          *--------------*-----o GCS | *
* +-----+     * Registration *          * Registration *     +-----+ *
*             * (and UTM)    *          * (and UTM)    *             *
***************              ************              ***************
                               |  |  |
                +----------+   |  |  |   +----------+
                | Public   o---'  |  '---o Private  |
                | Registry |      |      | Registry |
                +----------+      |      +----------+
                               +--o--+
                               | DNS |
                               +-----+

DAA:  Detect And Avoid
GPOD: General Public Observer Device
PSOD: Public Safety Observer Device
V2I:  Vehicle-to-Infrastructure
V2V:  Vehicle-to-Vehicle
]]></artwork>
      </figure>
      <t>When a DRIP Entity Tag (DET) <xref target="RFC9374"/> is used as the UAS ID in RID, extended information can be retrieved from a DRIP Identity Management Entity (DIME), which manages registration of and associated lookups from DETs. In this document it is assumed the DIME is a function of UAS Service Suppliers (USS) (Appendix A.2 of <xref target="RFC9434"/>) but a DIME can be independent or handled by another entity as well.</t>
      <section anchor="general-concept">
        <name>General Concept</name>
        <t>DRIP Entity Tags (DETs) embed a hierarchy scheme which is mapped onto the Domain Name System (DNS) <xref target="STD13"/>. DIMEs enforce registration and information access of data associated with a DET while also providing the trust inherited from being a member of the hierarchy. Other identifiers and their methods are out of scope for this document.</t>
        <t>Authoritative Name Servers of the DNS provide the public information such as the cryptographic keys, endorsements and certificates of DETs and pointers to private information resources. Cryptographic (public) keys are used to authenticate anything signed by a DET, such as in the Authentication defined in <xref target="RFC9575"/> for Broadcast RID. Endorsements and certificates are used to endorse the claim of being part of the hierarchy.</t>
        <t>This document does not specify AAA mechanisms used by Private Information Registries to store and protect Personally Identifiable Information (PII).</t>
      </section>
      <section anchor="scope">
        <name>Scope</name>
        <t>The scope of this document is the DNS registration of DETs with the DNS delegation of the reverse domain of IPv6 Prefix, assigned by IANA for DETs <tt>2001:30::/28</tt> and RRsets used to handle DETs.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <section anchor="required-terminology">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="additional-definitions">
        <name>Additional Definitions</name>
        <t>This document makes use of the terms and abbreviations (e.g., USS) defined in <xref section="2.2" sectionFormat="of" target="RFC9153"/>. Other terms and abbreviations (e.g., DRIP Identity Management Entity (DIME) and Endorsement) are from <xref section="2" sectionFormat="of" target="RFC9434"/>, while others (e.g., Registered Assigning Authority (RAA) and HHIT Domain Authority (HDA)) are from <xref section="2" sectionFormat="of" target="RFC9374"/>.</t>
      </section>
    </section>
    <section anchor="det-hierarchy-in-dns">
      <name>DET Hierarchy in DNS</name>
      <t><xref target="RFC9374"/> defines the HHIT and further specifies an instance of them used for UAS RID called DETs. The HHIT/DET is a 128-bit value that is as an IPv6 address intended primarily as an identifier rather than locator. Its format is in <xref target="hhit-fig"/>, shown here for reference, and further information is in <xref target="RFC9374"/>.</t>
      <figure anchor="hhit-fig">
        <name>DRIP Entity Tag Breakdown</name>
        <artwork align="center"><![CDATA[
+-------------+--------------+---------------+-------------+
| IPv6 Prefix | Hierarchy ID | HHIT Suite ID | ORCHID Hash |
| (28 bits)   | (28 bits)    | (8 bits)      | (64 bits)   |
+-------------+--------------+---------------+-------------+
             /                \
            /                  \
           /                    \-----------------------------\
          /                                                    \
         /                                                      \
        +--------------------------------+-----------------------+
        | Registered Assigning Authority | HHIT Domain Authority |
        | (14 bits)                      | (14 bits)             |
        +--------------------------------+-----------------------+
]]></artwork>
      </figure>
      <t><xref target="RFC9374"/> assigns the IPv6 prefix <tt>2001:30::/28</tt> for DETs. Its corresponding domain name for reverse lookups is <tt>3.0.0.1.0.0.2.ip6.arpa.</tt>. The IAB has administrative control of this domain name.</t>
      <t>Due to the nature of the hierarchy split and its relationship to nibble reversing of the IPv6 address, the upper level of hierarchy (i.e., Registered Assigning Authority (RAA)) "borrows" the upper two bits of their respective HHIT Domain Authority (HDA) space for DNS delegation. As such the IPv6 prefix of RAAs are <tt>2001:3x:xxx0::/44</tt> and HDAs are <tt>2001:3x:xxxy:yy00::/56</tt> with respective nibble reverse domains of <tt>x.x.x.x.3.0.0.1.0.0.2.ip6.arpa.</tt> and <tt>y.y.y.x.x.x.x.3.0.0.1.0.0.2.ip6.arpa.</tt>.</t>
      <t>This document preallocates a subset of RAAs based on the ISO 3166-1 Numeric Nation Code <xref target="ISO3166-1"/>. This is to support the initial use case of DETs in UAS RID on an international level. See <xref target="iana-raa"/> for the RAA allocations.</t>
      <t>The HDA values of 0, 4096, 8192 and 12288 are reserved for operational use of an RAA (a by-product of the above mentioned borrowing of bits), specifically when to register with the apex and endorse delegations of HDAs in their namespace.</t>
      <t>The administration, management and policy for the operation of a DIME at any level in the hierarchy (Apex, RAA or HDA) is out of scope for this document. For RAAs or DETs allocated on a per-country basis, these considerations should be be determined by the appropriate national authorities, presumably the Civil Aviation Authority (CAA).</t>
      <section anchor="use-of-existing-dns-models">
        <name>Use of Existing DNS Models</name>
        <t>DRIP relies on the DNS and as such roughly follows the registrant-registrar-registry model. In the UAS ecosystem, the registrant would be the end user who owns/controls the Unmanned Aircraft. They are ultimately responsible for the DET and any other information that gets published in the DNS. Registrants use agents known as registrars to manage their interactions with the registry. Registrars typically provide optional additional services such as DNS hosting.</t>
        <t>The registry maintains a database of the registered domain names and their related metadata such as the contact details for domain name holder and the relevant registrar. The registry provides DNS service for the zone apex which contains delegation information for domain names. Registries generally provide services such as WHOIS <xref target="RFC3912"/> or RDAP <xref target="STD95"/> to publish metadata about the registered domain names and their registrants and registrars.</t>
        <t>Registrants have contracts with registrars who in turn have contracts with registries. Payments follow this model too: the registrant buys services from a registrar who pays for services provided by the registry.</t>
        <t>By definition, there can only be one registry for a domain name. Since that registry is a de facto monopoly, the scope of its activities is usually kept to a minimum to reduce the potential for market distortions or anti-competitive practices. A registry can have an arbitrary number of registrars who compete with each other on price, service and customer support.</t>
        <section anchor="dns-model-considerations-for-dimes">
          <name>DNS Model Considerations for DIMEs</name>
          <figure anchor="dns-model-fig">
            <name>Example DRIP DNS Model</name>
            <artwork align="center"><![CDATA[
Apex
Registry/Registrar
(IANA)
                         +=========================+
                         | 3.0.0.1.0.0.2.ip6.arpa. |
                         +============o============+
                                      |
--------------------------------------|-------------------------
National                              |
Registries/Registrars                 |
(RAA)                                 |
                                      |
        +--------------+--------------o-+---------------+
        |              |                |               |
  +=====o====+    +====o=====+    +=====o====+    +=====o====+
  | 0.0.0.0. |    | 1.0.0.0. |    | 2.0.0.0. |    | 3.0.0.0. |
  +====o=====+    +====o=====+    +====o=====+    +====o=====+
                                       |
---------------------------------------|------------------------
Local                                  |
Registries/Registrars                  |
(HDA)                                  |
                                       |
        +--------------+---------------o--------...-----+
        |              |               |                |
  +=====o====+    +====o=====+    +====o=====+    +=====o====+
  |  1.0.0.  |    |  2.0.0.  |    |  3.0.0.  |    |  f.f.f.  |
  +====o=====+    +=====o====+    +====o=====+    +====o=====+
                                       |
---------------------------------------|------------------------
Local                                  |
Registrants                            |
                 +=====================o================+
                 | x.x.x.x.x.x.x.x.x.x.x.x.x.x.x.x.5.0. |
                 +======================================+
]]></artwork>
          </figure>
          <t>While the registrant-registrar-registry model is mature and well understood, it may not be appropriate for DRIP registrations in some circumstances. It could add costs and complexity; developing policies and contracts as outlined above. On the other hand, registries and registrars offer customer service/support and can provide the supporting infrastructure for reliable DNS and WHOIS or RDAP service.</t>
          <t>Another approach could be to handle DRIP registrations in a comparable way to how IP address space gets provisioned. Here, blocks of addresses get delegated to a "trusted" third party, typically an ISP, who then issues IP addresses to its customers. For DRIP, blocks of IP addresses could be delegated from the <tt>3.0.0.1.0.0.2.ip6.arpa.</tt> domain (reverse domain of prefix allocated by <xref target="RFC9374"/>) to an entity chosen by the appropriate Civil Aviation Authority (CAA). This third party would be responsible for the corresponding DNS and WHOIS or RDAP infrastructure for these IP address blocks. They would also provision the Hierarchical Host Identity Tag (HHIT, <xref target="RFC9374"/>) records for these IP addresses. In principle a manufacturer or vendor of UAS devices could provide that role. This is shown as an example in <xref target="dns-model-fig"/>.</t>
          <t>Dynamic DRIP registration is another possible solution, for example when the operator of a UAS device registers its corresponding HHIT record and other resources before a flight and deletes them afterwards. This may be feasible in controlled environments with well-behaved actors. However, this approach may not scale since each device is likely to need credentials for updating the IT infrastructure which provisions the DNS.</t>
          <t>Registration policies (pricing, renewals, registrar and registrant agreements, etc.) will need to be developed. These considerations should be determined by the CAA, perhaps in consultation with local stakeholders to assess the cost-benefits of these approaches (and others). All of these are out of scope for this document. The specifics for the UAS RID use case are detailed in the rest of document.</t>
        </section>
      </section>
    </section>
    <section anchor="dns">
      <name>Public Information Registry</name>
      <t>Per <xref target="RFC9434"/> all information classified as public is stored in the DNS, specifically Authoritative Name Servers, to satisfy REG-1 from <xref target="RFC9153"/>.</t>
      <t>Authoritative Name Servers use domain names as identifiers and data is stored in Resource Records (RR) with associated RRTypes. This document defines two new RRTypes, one for HHIT metadata (HHIT, <xref target="hhit-rr"/>) and another for UAS Broadcast RID information (BRID, <xref target="bcast-rr"/>). The former RRType is particularly important as it contains a URI (as part of the certificate) that points to Private Information resources.</t>
      <t>DETs, being IPv6 addresses, are to be under <tt>ip6.arpa.</tt> (nibble reversed per convention) and MUST resolve to an HHIT RRType. Depending on local circumstances or additional use cases other RRTypes MAY be present. For UAS RID the BRID RRType MUST be present to provide the Broadcast Endorsements (BEs) defined in <xref section="3.1.2.1" sectionFormat="of" target="RFC9575"/>.</t>
      <t>DNSSEC is strongly RECOMMENDED. When a DIME decides to use DNSSEC they SHOULD define a framework for cryptographic algorithms and key management <xref target="RFC6841"/>. This may be influenced by frequency of updates, size of the zone, and policies.</t>
      <t>UAS specific information, such as physical characteristics, MAY also be stored in DNS but is out of scope for this document.</t>
      <t>A DET IPv6 address gets mapped into domain names using the scheme defined in <xref target="STD88"/>. However DNS lookups of these names query for HHIT and/or BRID resource records rather than the PTR resource records conventionally used in reverse lookups of IP addresses. For example, the HHIT resource record for the DET <tt>2001:30::1</tt> would be returned from a DNS lookup for the HHIT QTYPE for <tt>1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.1.0.0.2.ip6.arpa.</tt>.</t>
      <t>The HHIT RRType provides the public key for signature verification and URIs via the certificate. The BRID RRType provides static Broadcast RID information such as the Broadcast Endorsements sent following <xref target="RFC9575"/>.</t>
    </section>
    <section anchor="resource-records">
      <name>Resource Records</name>
      <section anchor="hhit-rr">
        <name>HHIT Resource Record</name>
        <t>The HHIT Resource Record (HHIT, RRType 67) is a metadata record for various bits of HHIT specific information that isn't available in the pre-existing HIP RRType. The HHIT RRType does not replace the HIP RRType. The primary advantage of the HHIT RRType over the existing RRType is the mandatory inclusion of a certificate containing an entity's public key signed by the registrar, or other trust anchor, to confirm registration.</t>
        <t>The data MUST be encoded in CBOR <xref target="RFC8949"/> bytes. The CDDL <xref target="RFC8610"/> of the data is provided in <xref target="hhit-wire-cddl"/>.</t>
        <section anchor="hhit-rr-text">
          <name>Text Representation</name>
          <t>The data are represented in base64 <xref target="RFC4648"/> and may be divided into any number of white-space-separated substrings, down to single base64 digits, which are concatenated to obtain the full object. These substrings can span lines using the standard parenthesis. Note that the data has internal subfields but these do not appear in the master file representation; only a single logical base64 string will appear.</t>
          <section anchor="hhit-rr-presentation">
            <name>Presentation Representation</name>
            <t>The data MAY, for display purposes only, be represented using the Extended Diagnostic Notation as defined in Appendix G of <xref target="RFC8610"/>.</t>
          </section>
        </section>
        <section anchor="hhit-rr-fields">
          <name>Field Descriptions</name>
          <figure anchor="hhit-wire-cddl">
            <name>HHIT Wire Format CDDL</name>
            <artwork><![CDATA[
hhit-rr = [
    hhit-entity-type: uint,
    hid-abbreviation: tstr .size(15),
    canonical-registration-cert: bstr
]
]]></artwork>
          </figure>
          <t>All fields of the HHIT RRType MUST be included to be properly formed.</t>
          <dl>
            <dt>HHIT Entity Type:</dt>
            <dd>
              <t>The <tt>HHIT Entity Type</tt> field is a number with values defined in <xref target="iana-hhit-type"/>. It is envisioned that there may be many types of HHITs in use. In some cases, it may be helpful to understand the HHITs role in the ecosystem like described in <xref target="drip-dki"/>. This field provides such context. This field MAY provide a signal of additional information and/or different handling of the data beyond what is defined in this document.</t>
            </dd>
            <dt>HID Abbreviation:</dt>
            <dd>
              <t>The <tt>HID Abbreviation</tt> field is a string that provides an abbreviation to the HID structure of a DET for display devices. The convention for such abbreviations is a matter of local policy. Absent of such a policy, this field MUST be filled with the four character hexadecimal representations of the RAA and HDA (in that order) with a separator character such as a space. For example, a DET with an RAA value of 10 and HDA value of 20 would be abbreviated as: <tt>000A 0014</tt>.</t>
            </dd>
            <dt>Canonical Registration Certificate:</dt>
            <dd>
              <t>The <tt>Canonical Registration Certificate</tt> field is for a certificate endorsing registration of the DET. It MUST be encoded as X.509 DER <xref target="RFC5280"/>. This certificate MAY be self-signed when the entity is acting as a root of trust (i.e., an apex). Such self-signed behavior is defined by policy, such as in <xref target="drip-dki"/>, and is out of scope for this document.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="bcast-rr">
        <name>UAS Broadcast RID Resource Record</name>
        <t>The UAS Broadcast RID Resource Record (BRID, RRType 68) is a format to hold public information typically sent of the UAS Broadcast RID that is static. It can act as a data source if information is not received over Broadcast RID or for cross validation. The primary function for DRIP is the inclusion of one or more Broadcast Endorsements as defined in <xref target="RFC9575"/> in the <tt>auth</tt> field. These Endorsements are generated by the registrar upon successful registration and broadcast by the entity.</t>
        <t>The data MUST be encoded in CBOR <xref target="RFC8949"/> bytes. The CDDL <xref target="RFC8610"/> of the data is provided in <xref target="bcast-wire-cddl"/>.</t>
        <section anchor="bcast-rr-text">
          <name>Text Representation</name>
          <t>The data are represented in base64 <xref target="RFC4648"/> and may be divided into any number of white-space-separated substrings, down to single base64 digits, which are concatenated to obtain the full object. These substrings can span lines using the standard parenthesis. Note that the data has internal subfields but these do not appear in the master file representation; only a single logical base64 string will appear.</t>
          <section anchor="bcast-rr-presentation">
            <name>Presentation Representation</name>
            <t>The data MAY, for display purposes only, be represented using the Extended Diagnostic Notation as defined in Appendix G of <xref target="RFC8610"/>. All byte strings longer than a length of 20 SHOULD be displayed as base64 when possible.</t>
          </section>
        </section>
        <section anchor="bcast-rr-fields">
          <name>Field Descriptions</name>
          <figure anchor="bcast-wire-cddl">
            <name>BRID Wire Format CDDL</name>
            <artwork><![CDATA[
bcast-rr = {
    uas_type => nibble-field,
    uas_ids => [+ uas-id-grp],
    ? auth => [+ auth-grp],
    ? self_id => self-grp,
    ? area => area-grp,
    ? classification => classification-grp,
    ? operator_id => operator-grp
}
uas-id-grp = [
    id_type: &uas-id-types, 
    uas_id: bstr .size(20)
]
auth-grp = [
    a_type: &auth-types,
    a_data: bstr .size(1..362)
]
area-grp = [
    area_count: 1..255,
    area_radius: float,  # in decameters
    area_floor: float,   # wgs84-hae in meters
    area_ceiling: float  # wgs84-hae in meters
]
classification-grp = [
    class_type: 0..8,
    class: nibble-field,
    category: nibble-field
]
self-grp = [
    desc_type: 0..255,
    description: tstr .size(23)
]
operator-grp = [
    operator_id_type: 0..255,
    operator_id: bstr .size(20)
]
uas-id-types = (none: 0, serial: 1, session_id: 4)
auth-types = (none: 0, specific_method: 5)
nibble-field = 0..15
uas_type = 0
uas_ids = 1
auth = 2
self_id = 3
area = 4
classification = 5
operator_id = 6
]]></artwork>
          </figure>
          <t>The field names and their general typing are borrowed from the ASTM <xref target="F3411"/> data dictionary (Table 1 and Table 2). See that document for additional context and background information on aviation application-specific interpretation of the field semantics. The explicitly enumerated values included in the CDDL above are relevant to DRIP for its operation. Other values may be valid but are outside the scope of DRIP operation. Application-specific fields, such as UAS Type are transported and authenticated by DRIP but are regarded as opaque user data to DRIP.</t>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="det-prefix-delegation">
        <name>DET Prefix Delegation</name>
        <t>This document requests that IANA manage delegations in the <tt>3.0.0.1.0.0.2.ip6.arpa.</tt> domain. The IAB is requested to appoint a Designated Expert (DE) to coordinate these delegations and liaise with IANA and CAAs as appropriate.</t>
        <t>The DE will check delegation requests for DET address space that get submitted to IANA. Since there is no control over who submits these delegation requests or the address space they refer to, a degree of checking is necessary. The DE will liaise with IANA on the outcome of these checks.</t>
        <t>For delegation requests relating to a country’s DET address space, the DE will liaise with that country’s CAA to verify these requests are genuine. This will ensure delegations don’t go to impostors and the CAA is aware about what’s being done with its National Resources, ie the IPv6 addresses for its DET address space.</t>
        <t>Parts of the DET address space are allocated for experimental use. The DE is expected to process these delegation requests on a first-come, first-served basis. They would not need engagement with ICAO or CAAs.</t>
        <t>The DE will have the discretion to perform minimal technical checks on delegations - for instance that there are at least two name servers that answer authoritatively, SPoF avoidance, etc - but not enforce these.</t>
        <t>The DE will be expected to liaise with IANA to develop a DNSSEC Practice Statement for delegations in <tt>3.0.0.1.0.2.ipv6.arpa.</tt> if/when there’s a demand for DNSSEC deployment for DRIP.</t>
      </section>
      <section anchor="iana-drip-registry">
        <name>IANA DRIP Registry</name>
        <section anchor="iana-raa">
          <name>DRIP RAA Allocations</name>
          <t>This document requests a new registry for RAA Allocations under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref> to be managed by IANA.</t>
          <dl>
            <dt>RAA Allocations:</dt>
            <dd>
              <t>a 14-bit value used to represent RAAs. Future additions to this registry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126"/>). The following values/ranges are defined:</t>
            </dd>
          </dl>
          <table>
            <thead>
              <tr>
                <th align="left">RAA Value(s)</th>
                <th align="left">Allocation</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0 - 3</td>
                <td align="left">Reserved</td>
                <td align="left">N/A</td>
              </tr>
              <tr>
                <td align="left">4 - 3999</td>
                <td align="left">ISO 3166-1 Countries</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">4000 - 15359</td>
                <td align="left">Unallocated</td>
                <td align="left">N/A</td>
              </tr>
              <tr>
                <td align="left">15360 - 16383</td>
                <td align="left">Experimental Use</td>
                <td align="left">This RFC</td>
              </tr>
            </tbody>
          </table>
          <t>To support DNS delegation in <tt>ip6.arpa.</tt> a single RAA is given 4 delegations by borrowing the upper two bits of HDA space (see <xref target="raa-borrowing"/> for an example). This enables a clean nibble boundary in DNS to delegate from (i.e., the prefix <tt>2001:3x:xxx0::/44</tt>). These HDAs (0, 4096, 8192 and 12288) are reserved for the RAA.</t>
          <figure anchor="raa-borrowing">
            <name>Example Bit Borrowing of RAA=16376</name>
            <artwork align="center"><![CDATA[
 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 0 0 0 0 0 0 0 0 0 0
 2 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 9 8 7 6 5 4 3 2 1 0
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|           0           | x |         RAA=16376         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    0   |   0   |   0   |   0   |   E   |   F   |   F     HDA=0,x=00
    0   |   0   |   0   |   1   |   E   |   F   |   F     HDA=4096,x=01
    0   |   0   |   0   |   2   |   E   |   F   |   F     HDA=8192,x=10
    0   |   0   |   0   |   3   |   E   |   F   |   F     HDA=12288,x=11
]]></artwork>
          </figure>
          <t>The mapping between ISO 3166-1 Numeric Nation Codes and RAAs is specified as a CSV file on <eref target="https://github.com/ietf-wg-drip/draft-ietf-drip-registries/blob/main/iso3166-raa.csv">GitHub</eref>. Each Nation is assigned four RAAs that are left to the national authority for their purpose. For RAAs under this range, a shorter prefix of <tt>2001:3x:xx00::/40</tt> MAY be delegated to each CAA, which covers all 4 RAAs (and reserved HDAs) assigned to them.</t>
          <section anchor="raa-guidance">
            <name>Expert Guidance</name>
            <t>A request for a value and/or range is judged on the specific application of its use (i.e., like the ISO 3166 range for UAS). Common applications should reuse existing allocated space if possible before allocation of a new value/range.</t>
            <t>Single point allocations are allowed to individual entities but it is recommended that allocations are made in groupings of 4 to maintain a cleaner nibble boundary.</t>
          </section>
          <section anchor="raa-form">
            <name>Registration Form</name>
            <t>For registration the following template is to be used:</t>
            <ul spacing="normal">
              <li>
                <t>Allocation Title.</t>
              </li>
              <li>
                <t>Contact Information: contact point such as email or person operating allocation.</t>
              </li>
              <li>
                <t>Reference: public document reference for allocation, containing required information to register for HDAs under it.</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="iana-hhit-type">
          <name>HHIT Entity Type</name>
          <t>This document requests a new registry for HHIT Entity Type under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl>
            <dt>HHIT Entity Type:</dt>
            <dd>
              <t>numeric, field of the HHIT RRType to encode the HHIT Entity Type. This is broken into three ranges and future additions to this registry are as follows:</t>
            </dd>
          </dl>
          <table>
            <thead>
              <tr>
                <th align="left">Range</th>
                <th align="left">Registration Mechanism</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0 - 4294967295</td>
                <td align="left">Expert Review (Section 4.5 of <xref target="RFC8126"/>)</td>
              </tr>
              <tr>
                <td align="left">4294967296 - 18446744069414584319</td>
                <td align="left">First Come First Served (Section 4.4 of <xref target="RFC8126"/>)</td>
              </tr>
              <tr>
                <td align="left">18446744069414584320 - 18446744073709551615</td>
                <td align="left">Experimental Use</td>
              </tr>
            </tbody>
          </table>
          <t>The following values are defined by this document:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Value</th>
                <th align="left">HHIT Type</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0</td>
                <td align="left">Not Defined</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">1</td>
                <td align="left">DRIP Identity Management Entity (DIME)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">2 - 4</td>
                <td align="left">Reserved</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">5</td>
                <td align="left">Apex</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">6 - 8</td>
                <td align="left">Reserved</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">9</td>
                <td align="left">Registered Assigning Authority (RAA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">10 - 12</td>
                <td align="left">Reserved</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">13</td>
                <td align="left">HHIT Domain Authority (HDA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">14 - 15</td>
                <td align="left">Reserved</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">16</td>
                <td align="left">Uncrewed Aircraft (UA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">17</td>
                <td align="left">Ground Control Station (GCS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">18</td>
                <td align="left">Uncrewed Aircraft System (UAS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">19</td>
                <td align="left">Remote Identification (RID) Module</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">20</td>
                <td align="left">Pilot</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">21</td>
                <td align="left">Operator</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">22</td>
                <td align="left">Discovery &amp; Synchronization Service (DSS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">23</td>
                <td align="left">UAS Service Supplier (USS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">24</td>
                <td align="left">Network RID Service Provider (SP)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">25</td>
                <td align="left">Network RID Display Provider (DP)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">26</td>
                <td align="left">Supplemental Data Service Provider (SDSP)</td>
                <td align="left">This RFC</td>
              </tr>
            </tbody>
          </table>
          <section anchor="hhit-guidance">
            <name>Expert Guidance</name>
            <t>Justification should be provided if there is an existing allocation that could be used. Future additions to this registry MUST NOT be allowed if they can be covered under an existing registration.</t>
          </section>
          <section anchor="hhit-form">
            <name>Registration Template</name>
            <t>For registration the following template is to be used:</t>
            <ul spacing="normal">
              <li>
                <t>HHIT Type: title (and optional abbreviation) to be used for the requested value.</t>
              </li>
              <li>
                <t>Reference: public document allocating the value and any additional information such as semantics. This can be a URL pointing to an Internet-Draft, IETF RFC, or web-page.</t>
              </li>
            </ul>
            <t>For registration in the FCFS range, a point of contact MUST also be provided (if not part of the reference).</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="dns-operational-registration-considerations">
        <name>DNS Operational &amp; Registration Considerations</name>
        <t>The Registrar and Registry are commonly used concepts in the DNS. These components interface the DIME into the DNS hierarchy and thus operation SHOULD follow best common practices, specifically in security (such as running DNSSEC) as appropriate. The following RFC provide suitable guidance: <xref target="RFC7720"/>, <xref target="RFC4033"/>, <xref target="RFC4034"/>, <xref target="RFC4035"/>, <xref target="RFC5155"/>, <xref target="RFC8945"/>, <xref target="RFC2182"/>, <xref target="RFC4786"/>, <xref target="RFC3007"/>.</t>
        <t>If DNSSEC is used, a DNSSEC Practice Statement SHOULD be developed and published. It SHOULD explain how DNSSEC has been deployed and what security measures are in place. <xref target="RFC6841"/> documents a Framework for DNSSEC Policies and DNSSEC Practice Statements. A self-signed entity (i.e. an entity that self-signed it certificate as part of the HHIT RRType) MUST use DNSSEC.</t>
        <t>The interfaces and protocol specifications for registry-registrar interactions are intentionally not specified in this document. These will depend on nationally defined policy and prevailing local circumstances. It is expected registry-registrar activity will use the Extensible Provisioning Protocol (EPP) <xref target="STD69"/>. The registry SHOULD provide a lookup service such as WHOIS <xref target="RFC3912"/> or RDAP <xref target="STD95"/> to publish public information about registered domain names.</t>
        <t>Decisions about DNS or registry best practices and other operational matters that influence security SHOULD be made by the CAA, ideally in consultation with local stakeholders.</t>
        <t>The guidance above is intended to reduce the likelihood of interoperability problems and minimize security and stability concerns. For instance, validation and authentication of DNS responses depends on DNSSEC. If this is not used, entities using DRIP will be vulnerable to DNS spoofing attacks and could be exposed to bogus data. DRIP DNS responses that have not been validated by DNSSEC could contain bogus data which have the potential to create serious security problems and operational concerns for DRIP entities. These threats include denial of service attacks, replay attacks, impersonation or cloning of UAVs, hijacking of DET registrations, injection of corrupt metadata and compromising established trust architecture/relationships. Some regulatory and legal considerations are expected to be simplified by providing a lookup service for access to public information about registered domain names for DETs.</t>
        <t>When DNSSEC is not in use, due to the length of the ORCHID hash selected for DETs (<xref section="7.5" sectionFormat="of" target="RFC9374"/>), clients MUST "walk" the tree of certificates locating each certificate by performing DNS lookups of HHIT RRTypes for each DET verifying inclusion into the hierarchy. The collection of these certificates (which provide both signature protection from the parent entity and the public key of the entity) is the only way without DNSSEC to prove valid registration. The data within the BRID RRType has no direct endorsement when not protected by DNSSEC. The contents of the BRID RRType <tt>auth</tt> key, containing the Endorsements, SHOULD be validated, similiar to the certificates mentioned previously.</t>
      </section>
      <section anchor="det-public-key-exposure">
        <name>DET &amp; Public Key Exposure</name>
        <t>DETs are built upon asymmetric keys. As such the public key must be revealed to enable clients to perform signature verifications. <xref target="RFC9374"/> security considerations cover various attacks on such keys. While unlikely, the forging of a corresponding private key is possible if given enough time (and computational power).</t>
        <t>When practical, it is RECOMMENDED that no RRTypes under a DET's specific domain name be published unless and until it is required for use by other parties. Such action would cause at least the HHIT RRType to not be in DNS, protecting the public key in the certificate from being exposed before its needed. The combination of this "just in time" publishing mechanism and DNSSEC is out of scope for this document.</t>
        <t>Optimally this requires that the UAS somehow signal the DIME that a flight using a Specific Session ID will soon be underway or complete. It may also be facilitated under UTM if the USS (which may or may not be a DIME) signals when a given operation using a Session ID goes active.</t>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Stuart Card (AX Enterprize, LLC) and Bob Moskowitz (HTT Consulting, LLC) for their early work on the DRIP registries concept. Their early contributions laid the foundations for the content and processes of this architecture and document.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking.</t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs). HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement.</t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="F3411" target="https://www.astm.org/f3411-22a.html">
          <front>
            <title>Standard Specification for Remote ID and Tracking</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3411-22A"/>
          <seriesInfo name="DOI" value="10.1520/F3411-22A"/>
        </reference>
        <reference anchor="ISO3166-1" target="https://www.iso.org/iso-3166-country-codes.html">
          <front>
            <title>Codes for the representation of names of countries and their subdivisions</title>
            <author>
              <organization>International Standards Organization (ISO)</organization>
            </author>
            <date year="2020" month="August"/>
          </front>
          <seriesInfo name="ISO" value="3166-1:2020"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="drip-dki">
          <front>
            <title>The DRIP DET public Key Infrastructure</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <date day="22" month="April" year="2025"/>
            <abstract>
              <t>   The DRIP Entity Tag (DET) public Key Infrastructure (DKI) is a
   specific variant of classic Public Key Infrastructures (PKI) where
   the organization is around the DET, in place of X.520 Distinguished
   Names.  Further, the DKI uses DRIP Endorsements in place of X.509
   certificates for establishing trust within the DKI.

   There are two X.509 profiles for shadow PKI behind the DKI, with many
   of their X.509 fields mirroring content in the DRIP Endorsements.
   These PKIs can at times be used where X.509 is expected and non-
   constrained communication links are available that can handle their
   larger size.  It is recommended that a DRIP deployment implement both
   of these along side the Endorsement trees.

   C509 (CBOR) encoding of all X.509 certificates are also provided as
   an alternative for where there are gains in reduced object size.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-dki-08"/>
        </reference>
        <reference anchor="RFC6841">
          <front>
            <title>A Framework for DNSSEC Policies and DNSSEC Practice Statements</title>
            <author fullname="F. Ljunggren" initials="F." surname="Ljunggren"/>
            <author fullname="AM. Eklund Lowinder" initials="AM." surname="Eklund Lowinder"/>
            <author fullname="T. Okubo" initials="T." surname="Okubo"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document presents a framework to assist writers of DNS Security Extensions (DNSSEC) Policies and DNSSEC Practice Statements, such as domain managers and zone operators on both the top level and secondary level, who are managing and operating a DNS zone with Security Extensions implemented.</t>
              <t>In particular, the framework provides a comprehensive list of topics that should be considered for inclusion into a DNSSEC Policy definition and Practice Statement. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6841"/>
          <seriesInfo name="DOI" value="10.17487/RFC6841"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC9434">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Zhao" initials="S." role="editor" surname="Zhao"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture for protocols and services to support Unmanned Aircraft System Remote Identification and tracking (UAS RID), plus UAS-RID-related communications. This architecture adheres to the requirements listed in the Drone Remote Identification Protocol (DRIP) Requirements document (RFC 9153).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9434"/>
          <seriesInfo name="DOI" value="10.17487/RFC9434"/>
        </reference>
        <reference anchor="RFC9575">
          <front>
            <title>DRIP Entity Tag (DET) Authentication Formats and Protocols for Broadcast Remote Identification (RID)</title>
            <author fullname="A. Wiethuechter" initials="A." role="editor" surname="Wiethuechter"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>The Drone Remote Identification Protocol (DRIP), plus trust policies and periodic access to registries, augments Unmanned Aircraft System (UAS) Remote Identification (RID), enabling local real-time assessment of trustworthiness of received RID messages and observed UAS, even by Observers lacking Internet access. This document defines DRIP message types and formats to be sent in Broadcast RID Authentication Messages to verify that attached and recently detached messages were signed by the registered owner of the DRIP Entity Tag (DET) claimed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9575"/>
          <seriesInfo name="DOI" value="10.17487/RFC9575"/>
        </reference>
        <referencegroup anchor="STD13" target="https://www.rfc-editor.org/info/std13">
          <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1034">
            <front>
              <title>Domain names - concepts and facilities</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1034"/>
            <seriesInfo name="DOI" value="10.17487/RFC1034"/>
          </reference>
          <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035">
            <front>
              <title>Domain names - implementation and specification</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1035"/>
            <seriesInfo name="DOI" value="10.17487/RFC1035"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="STD69" target="https://www.rfc-editor.org/info/std69">
          <reference anchor="RFC5730" target="https://www.rfc-editor.org/info/rfc5730">
            <front>
              <title>Extensible Provisioning Protocol (EPP)</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <date month="August" year="2009"/>
              <abstract>
                <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository. Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects. This document includes a protocol specification, an object mapping template, and an XML media type registration. This document obsoletes RFC 4930. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="69"/>
            <seriesInfo name="RFC" value="5730"/>
            <seriesInfo name="DOI" value="10.17487/RFC5730"/>
          </reference>
          <reference anchor="RFC5731" target="https://www.rfc-editor.org/info/rfc5731">
            <front>
              <title>Extensible Provisioning Protocol (EPP) Domain Name Mapping</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <date month="August" year="2009"/>
              <abstract>
                <t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet domain names stored in a shared central repository. Specified in XML, the mapping defines EPP command syntax and semantics as applied to domain names. This document obsoletes RFC 4931. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="69"/>
            <seriesInfo name="RFC" value="5731"/>
            <seriesInfo name="DOI" value="10.17487/RFC5731"/>
          </reference>
          <reference anchor="RFC5732" target="https://www.rfc-editor.org/info/rfc5732">
            <front>
              <title>Extensible Provisioning Protocol (EPP) Host Mapping</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <date month="August" year="2009"/>
              <abstract>
                <t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet host names stored in a shared central repository. Specified in XML, the mapping defines EPP command syntax and semantics as applied to host names. This document obsoletes RFC 4932. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="69"/>
            <seriesInfo name="RFC" value="5732"/>
            <seriesInfo name="DOI" value="10.17487/RFC5732"/>
          </reference>
          <reference anchor="RFC5733" target="https://www.rfc-editor.org/info/rfc5733">
            <front>
              <title>Extensible Provisioning Protocol (EPP) Contact Mapping</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <date month="August" year="2009"/>
              <abstract>
                <t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of individual or organizational social information identifiers (known as "contacts") stored in a shared central repository. Specified in Extensible Markup Language (XML), the mapping defines EPP command syntax and semantics as applied to contacts. This document obsoletes RFC 4933. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="69"/>
            <seriesInfo name="RFC" value="5733"/>
            <seriesInfo name="DOI" value="10.17487/RFC5733"/>
          </reference>
          <reference anchor="RFC5734" target="https://www.rfc-editor.org/info/rfc5734">
            <front>
              <title>Extensible Provisioning Protocol (EPP) Transport over TCP</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <date month="August" year="2009"/>
              <abstract>
                <t>This document describes how an Extensible Provisioning Protocol (EPP) session is mapped onto a single Transmission Control Protocol (TCP) connection. This mapping requires use of the Transport Layer Security (TLS) protocol to protect information exchanged between an EPP client and an EPP server. This document obsoletes RFC 4934. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="69"/>
            <seriesInfo name="RFC" value="5734"/>
            <seriesInfo name="DOI" value="10.17487/RFC5734"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="STD95" target="https://www.rfc-editor.org/info/std95">
          <reference anchor="RFC7480" target="https://www.rfc-editor.org/info/rfc7480">
            <front>
              <title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
              <author fullname="A. Newton" initials="A." surname="Newton"/>
              <author fullname="B. Ellacott" initials="B." surname="Ellacott"/>
              <author fullname="N. Kong" initials="N." surname="Kong"/>
              <date month="March" year="2015"/>
              <abstract>
                <t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP). It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP). RDAP is a successor protocol to the very old WHOIS protocol. The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="7480"/>
            <seriesInfo name="DOI" value="10.17487/RFC7480"/>
          </reference>
          <reference anchor="RFC7481" target="https://www.rfc-editor.org/info/rfc7481">
            <front>
              <title>Security Services for the Registration Data Access Protocol (RDAP)</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <author fullname="N. Kong" initials="N." surname="Kong"/>
              <date month="March" year="2015"/>
              <abstract>
                <t>The Registration Data Access Protocol (RDAP) provides "RESTful" web services to retrieve registration metadata from Domain Name and Regional Internet Registries. This document describes information security services, including access control, authentication, authorization, availability, data confidentiality, and data integrity for RDAP.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="7481"/>
            <seriesInfo name="DOI" value="10.17487/RFC7481"/>
          </reference>
          <reference anchor="RFC9082" target="https://www.rfc-editor.org/info/rfc9082">
            <front>
              <title>Registration Data Access Protocol (RDAP) Query Format</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <author fullname="A. Newton" initials="A." surname="Newton"/>
              <date month="June" year="2021"/>
              <abstract>
                <t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns. These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="9082"/>
            <seriesInfo name="DOI" value="10.17487/RFC9082"/>
          </reference>
          <reference anchor="RFC9083" target="https://www.rfc-editor.org/info/rfc9083">
            <front>
              <title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <author fullname="A. Newton" initials="A." surname="Newton"/>
              <date month="June" year="2021"/>
              <abstract>
                <t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs). These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="9083"/>
            <seriesInfo name="DOI" value="10.17487/RFC9083"/>
          </reference>
          <reference anchor="RFC9224" target="https://www.rfc-editor.org/info/rfc9224">
            <front>
              <title>Finding the Authoritative Registration Data Access Protocol (RDAP) Service</title>
              <author fullname="M. Blanchet" initials="M." surname="Blanchet"/>
              <date month="March" year="2022"/>
              <abstract>
                <t>This document specifies a method to find which Registration Data Access Protocol (RDAP) server is authoritative to answer queries for a requested scope, such as domain names, IP addresses, or Autonomous System numbers. This document obsoletes RFC 7484.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="9224"/>
            <seriesInfo name="DOI" value="10.17487/RFC9224"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC5155">
          <front>
            <title>DNS Security (DNSSEC) Hashed Authenticated Denial of Existence</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="G. Sisson" initials="G." surname="Sisson"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="D. Blacka" initials="D." surname="Blacka"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Domain Name System Security (DNSSEC) Extensions introduced the NSEC resource record (RR) for authenticated denial of existence. This document introduces an alternative resource record, NSEC3, which similarly provides authenticated denial of existence. However, it also provides measures against zone enumeration and permits gradual expansion of delegation-centric zones. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5155"/>
          <seriesInfo name="DOI" value="10.17487/RFC5155"/>
        </reference>
        <reference anchor="RFC8945">
          <front>
            <title>Secret Key Transaction Authentication for DNS (TSIG)</title>
            <author fullname="F. Dupont" initials="F." surname="Dupont"/>
            <author fullname="S. Morris" initials="S." surname="Morris"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="B. Wellington" initials="B." surname="Wellington"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document describes a protocol for transaction-level authentication using shared secrets and one-way hashing. It can be used to authenticate dynamic updates to a DNS zone as coming from an approved client or to authenticate responses as coming from an approved name server.</t>
              <t>No recommendation is made here for distributing the shared secrets; it is expected that a network administrator will statically configure name servers and clients using some out-of-band mechanism.</t>
              <t>This document obsoletes RFCs 2845 and 4635.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="93"/>
          <seriesInfo name="RFC" value="8945"/>
          <seriesInfo name="DOI" value="10.17487/RFC8945"/>
        </reference>
        <reference anchor="RFC4034">
          <front>
            <title>Resource Records for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4034"/>
          <seriesInfo name="DOI" value="10.17487/RFC4034"/>
        </reference>
        <reference anchor="RFC4035">
          <front>
            <title>Protocol Modifications for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4035"/>
          <seriesInfo name="DOI" value="10.17487/RFC4035"/>
        </reference>
        <reference anchor="RFC3007">
          <front>
            <title>Secure Domain Name System (DNS) Dynamic Update</title>
            <author fullname="B. Wellington" initials="B." surname="Wellington"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This document proposes a method for performing secure Domain Name System (DNS) dynamic updates. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3007"/>
          <seriesInfo name="DOI" value="10.17487/RFC3007"/>
        </reference>
        <reference anchor="RFC2182">
          <front>
            <title>Selection and Operation of Secondary DNS Servers</title>
            <author fullname="R. Elz" initials="R." surname="Elz"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <author fullname="M. Patton" initials="M." surname="Patton"/>
            <date month="July" year="1997"/>
            <abstract>
              <t>This document discusses the selection of secondary servers for DNS zones.The number of servers appropriate for a zone is also discussed, and some general secondary server maintenance issues considered. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="16"/>
          <seriesInfo name="RFC" value="2182"/>
          <seriesInfo name="DOI" value="10.17487/RFC2182"/>
        </reference>
        <reference anchor="RFC7720">
          <front>
            <title>DNS Root Name Service Protocol and Deployment Requirements</title>
            <author fullname="M. Blanchet" initials="M." surname="Blanchet"/>
            <author fullname="L-J. Liman" surname="L-J. Liman"/>
            <date month="December" year="2015"/>
            <abstract>
              <t>The DNS root name service is a critical part of the Internet architecture. The protocol and deployment requirements for the DNS root name service are defined in this document. Operational requirements are out of scope.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="40"/>
          <seriesInfo name="RFC" value="7720"/>
          <seriesInfo name="DOI" value="10.17487/RFC7720"/>
        </reference>
        <reference anchor="RFC3912">
          <front>
            <title>WHOIS Protocol Specification</title>
            <author fullname="L. Daigle" initials="L." surname="Daigle"/>
            <date month="September" year="2004"/>
            <abstract>
              <t>This document updates the specification of the WHOIS protocol, thereby obsoleting RFC 954. The update is intended to remove the material from RFC 954 that does not have to do with the on-the-wire protocol, and is no longer applicable in today's Internet. This document does not attempt to change or update the protocol per se, or document other uses of the protocol that have come into existence since the publication of RFC 954. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3912"/>
          <seriesInfo name="DOI" value="10.17487/RFC3912"/>
        </reference>
        <reference anchor="RFC4786">
          <front>
            <title>Operation of Anycast Services</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="K. Lindqvist" initials="K." surname="Lindqvist"/>
            <date month="December" year="2006"/>
            <abstract>
              <t>As the Internet has grown, and as systems and networked services within enterprises have become more pervasive, many services with high availability requirements have emerged. These requirements have increased the demands on the reliability of the infrastructure on which those services rely.</t>
              <t>Various techniques have been employed to increase the availability of services deployed on the Internet. This document presents commentary and recommendations for distribution of services using anycast. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="126"/>
          <seriesInfo name="RFC" value="4786"/>
          <seriesInfo name="DOI" value="10.17487/RFC4786"/>
        </reference>
        <referencegroup anchor="STD88" target="https://www.rfc-editor.org/info/std88">
          <reference anchor="RFC3596" target="https://www.rfc-editor.org/info/rfc3596">
            <front>
              <title>DNS Extensions to Support IP Version 6</title>
              <author fullname="S. Thomson" initials="S." surname="Thomson"/>
              <author fullname="C. Huitema" initials="C." surname="Huitema"/>
              <author fullname="V. Ksinant" initials="V." surname="Ksinant"/>
              <author fullname="M. Souissi" initials="M." surname="Souissi"/>
              <date month="October" year="2003"/>
              <abstract>
                <t>This document defines the changes that need to be made to the Domain Name System (DNS) to support hosts running IP version 6 (IPv6). The changes include a resource record type to store an IPv6 address, a domain to support lookups based on an IPv6 address, and updated definitions of existing query types that return Internet addresses as part of additional section processing. The extensions are designed to be compatible with existing applications and, in particular, DNS implementations themselves. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="88"/>
            <seriesInfo name="RFC" value="3596"/>
            <seriesInfo name="DOI" value="10.17487/RFC3596"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
      </references>
    </references>
    <?line 521?>

<section anchor="example-zone-files-rrtype-contents">
      <name>Example Zone Files &amp; RRType Contents</name>
      <t>An example zone file <tt>ip6.arpa.</tt>, run by IANA, is not shown. It would contain NS RRTypes to delegate to a respective RAA. To avoid any future collisions with production deployments an apex of <tt>ip6.example.com.</tt> is used instead of <tt>ip6.arpa.</tt>. All hexadecimal strings in the examples are broken into the lengths of a word, for document formatting purposes.</t>
      <t>The RAA of <tt>RAA=16376, HDA=0</tt> and HDA of <tt>RAA=16376, HDA=10</tt> were used in the examples.</t>
      <section anchor="example-raa">
        <name>Example RAA</name>
        <section anchor="raa-hhits">
          <name>Authentication HHIT</name>
          <figure>
            <name>RAA Auth HHIT RRType Example</name>
            <artwork><![CDATA[
$ORIGIN 5.0.0.0.0.0.e.f.f.3.0.0.1.0.0.2.ip6.example.com.
7.b.0.a.1.9.e.1.7.5.1.a.0.6.e.5. IN HHIT (
    gwppM2ZmOCAwMDAwWQFGMIIBQjCB9aAD
    AgECAgE1MAUGAytlcDArMSkwJwYDVQQD
    DCAyMDAxMDAzZmZlMDAwMDA1NWU2MGEx
    NTcxZTkxYTBiNzAeFw0yNTA0MDkyMDU2
    MjZaFw0yNTA0MDkyMTU2MjZaMB0xGzAZ
    BgNVBAMMEkRSSVAtUkFBLUEtMTYzNzYt
    MDAqMAUGAytlcAMhAJmQ1bBLcqGAZtQJ
    K1LH1JlPt8Fr1+jB9ED/qNBP8eE/o0ww
    SjAPBgNVHRMBAf8EBTADAQH/MDcGA1Ud
    EQEB/wQtMCuHECABAD/+AAAFXmChVx6R
    oLeGF2h0dHBzOi8vcmFhLmV4YW1wbGUu
    Y29tMAUGAytlcANBALUPjhIB3rwqXQep
    r9/VDB+hhtwuWZIw1OUkEuDrF6DCkgc7
    5widXnXa5/uDfdKL7dZ83mPHm2Tf32Dv
    b8AzEw8=
)
]]></artwork>
          </figure>
          <figure>
            <name>2001:3f:fe00:5:5e60:a157:1e91:a0b7 Decoded HHIT RRType CBOR and Certificate</name>
            <artwork><![CDATA[
[
    10,  # Reserved (RAA Auth from DKI)
    "3ff8 0000",
    h'308201423081F5A00302010202013530
    0506032B6570302B312930270603550403
    0C20323030313030336666653030303030
    3535653630613135373165393161306237
    301E170D3235303430393230353632365A
    170D3235303430393231353632365A301D
    311B301906035504030C12445249502D52
    41412D412D31363337362D30302A300506
    032B65700321009990D5B04B72A18066D4
    092B52C7D4994FB7C16BD7E8C1F440FFA8
    D04FF1E13FA34C304A300F0603551D1301
    01FF040530030101FF30370603551D1101
    01FF042D302B87102001003FFE0000055E
    60A1571E91A0B7861768747470733A2F2F
    7261612E6578616D706C652E636F6D3005
    06032B6570034100B50F8E1201DEBC2A5D
    07A9AFDFD50C1FA186DC2E599230D4E524
    12E0EB17A0C292073BE7089D5E75DAE7FB
    837DD28BEDD67CDE63C79B64DFDF60EF6F
    C033130F'
]

Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 53 (0x35)
        Signature Algorithm: ED25519
        Issuer: CN = 2001003ffe0000055e60a1571e91a0b7
        Validity
            Not Before: Apr  9 20:56:26 2025 GMT
            Not After : Apr  9 21:56:26 2025 GMT
        Subject: CN = DRIP-RAA-A-16376-0
        Subject Public Key Info:
            Public Key Algorithm: ED25519
                ED25519 Public-Key:
                pub:
                    99:90:d5:b0:4b:72:a1:80:66:d4:09:2b:52:c7:d4:
                    99:4f:b7:c1:6b:d7:e8:c1:f4:40:ff:a8:d0:4f:f1:
                    e1:3f
        X509v3 extensions:
            X509v3 Basic Constraints: critical
                CA:TRUE
            X509v3 Subject Alternative Name: critical
                IP Address:2001:3F:FE00:5:5E60:A157:1E91:A0B7,
                URI:https://raa.example.com
    Signature Algorithm: ED25519
    Signature Value:
        b5:0f:8e:12:01:de:bc:2a:5d:07:a9:af:df:d5:0c:1f:a1:86:
        dc:2e:59:92:30:d4:e5:24:12:e0:eb:17:a0:c2:92:07:3b:e7:
        08:9d:5e:75:da:e7:fb:83:7d:d2:8b:ed:d6:7c:de:63:c7:9b:
        64:df:df:60:ef:6f:c0:33:13:0f
]]></artwork>
          </figure>
        </section>
        <section anchor="delegation-of-hda">
          <name>Delegation of HDA</name>
          <figure>
            <name>HDA Delegation Example</name>
            <artwork><![CDATA[
$ORIGIN c.d.f.f.3.0.0.1.0.0.2.ip6.example.com.
a.0.0. IN NS ns1.hda-10.example.com
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="example-hda">
        <name>Example HDA</name>
        <section anchor="hda-hhits">
          <name>Authentication &amp; Issue HHITs</name>
          <figure>
            <name>HDA Auth/Issue HHIT RRType Example</name>
            <artwork><![CDATA[
$ORIGIN 5.0.a.0.0.0.e.f.f.3.0.0.1.0.0.2.ip6.example.com.
0.a.9.0.7.2.4.d.5.4.e.e.5.1.6.6.5.0. IN HHIT (
    gw5pM2ZmOCAwMDBhWQFHMIIBQzCB9qAD
    AgECAgFfMAUGAytlcDArMSkwJwYDVQQD
    DCAyMDAxMDAzZmZlMDAwMDA1NWU2MGEx
    NTcxZTkxYTBiNzAeFw0yNTA0MDkyMTAz
    MTlaFw0yNTA0MDkyMjAzMTlaMB4xHDAa
    BgNVBAMME0RSSVAtSERBLUEtMTYzNzYt
    MTAwKjAFBgMrZXADIQDOaB424RQa61YN
    bna8eWt7fLRU5GPMsfEt4wo4AQGAP6NM
    MEowDwYDVR0TAQH/BAUwAwEB/zA3BgNV
    HREBAf8ELTArhxAgAQA//gAKBWYV7kXU
    JwmghhdodHRwczovL3JhYS5leGFtcGxl
    LmNvbTAFBgMrZXADQQAhMpOSOmgMkJY1
    f+B9nTgawUjK4YEERBtczMknHDkOowX0
    ynbaLN60TYe9hqN6+CJ3SN8brJke3hpM
    gorvhDkJ
)
8.2.e.6.5.2.b.6.7.3.4.d.e.0.6.2.5.0. IN HHIT (
    gw9pM2ZmOCAwMDBhWQFHMIIBQzCB9qAD
    AgECAgFYMAUGAytlcDArMSkwJwYDVQQD
    DCAyMDAxMDAzZmZlMDAwYTA1NjYxNWVl
    NDVkNDI3MDlhMDAeFw0yNTA0MDkyMTA1
    MTRaFw0yNTA0MDkyMjA1MTRaMB4xHDAa
    BgNVBAMME0RSSVAtSERBLUktMTYzNzYt
    MTAwKjAFBgMrZXADIQCCM/2utQaLwUhZ
    0ROg7fz43AeBTj3Sdl5rW4LgTQcFl6NM
    MEowDwYDVR0TAQH/BAUwAwEB/zA3BgNV
    HREBAf8ELTArhxAgAQA//gAKBSYO1Ddr
    JW4ohhdodHRwczovL2hkYS5leGFtcGxl
    LmNvbTAFBgMrZXADQQBa8lZyftxHJqDF
    Vgv4Rt+cMUmc8aQwet4UZdO3yQOB9uq4
    sLVAScaZCWjC0nmeRkgVRhize1esfyi3
    RRU44IAE
)
]]></artwork>
          </figure>
          <figure>
            <name>2001:3f:fe00:a05:6615:ee45:d427:9a0 Decoded Auth HHIT RRType CBOR and Certificate</name>
            <artwork><![CDATA[
[
    14,  # Reserved (HDA Auth from DKI)
    "3ff8 000a",
    h'308201433081F6A00302010202015F30
    0506032B6570302B312930270603550403
    0C20323030313030336666653030303030
    3535653630613135373165393161306237
    301E170D3235303430393231303331395A
    170D3235303430393232303331395A301E
    311C301A06035504030C13445249502D48
    44412D412D31363337362D3130302A3005
    06032B6570032100CE681E36E1141AEB56
    0D6E76BC796B7B7CB454E463CCB1F12DE3
    0A380101803FA34C304A300F0603551D13
    0101FF040530030101FF30370603551D11
    0101FF042D302B87102001003FFE000A05
    6615EE45D42709A0861768747470733A2F
    2F7261612E6578616D706C652E636F6D30
    0506032B6570034100213293923A680C90
    96357FE07D9D381AC148CAE18104441B5C
    CCC9271C390EA305F4CA76DA2CDEB44D87
    BD86A37AF8227748DF1BAC991EDE1A4C82
    8AEF843909'
]

Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 95 (0x5f)
        Signature Algorithm: ED25519
        Issuer: CN = 2001003ffe0000055e60a1571e91a0b7
        Validity
            Not Before: Apr  9 21:03:19 2025 GMT
            Not After : Apr  9 22:03:19 2025 GMT
        Subject: CN = DRIP-HDA-A-16376-10
        Subject Public Key Info:
            Public Key Algorithm: ED25519
                ED25519 Public-Key:
                pub:
                    ce:68:1e:36:e1:14:1a:eb:56:0d:6e:76:bc:79:6b:
                    7b:7c:b4:54:e4:63:cc:b1:f1:2d:e3:0a:38:01:01:
                    80:3f
        X509v3 extensions:
            X509v3 Basic Constraints: critical
                CA:TRUE
            X509v3 Subject Alternative Name: critical
                IP Address:2001:3F:FE00:A05:6615:EE45:D427:9A0,
                URI:https://raa.example.com
    Signature Algorithm: ED25519
    Signature Value:
        21:32:93:92:3a:68:0c:90:96:35:7f:e0:7d:9d:38:1a:c1:48:
        ca:e1:81:04:44:1b:5c:cc:c9:27:1c:39:0e:a3:05:f4:ca:76:
        da:2c:de:b4:4d:87:bd:86:a3:7a:f8:22:77:48:df:1b:ac:99:
        1e:de:1a:4c:82:8a:ef:84:39:09
]]></artwork>
          </figure>
          <figure>
            <name>2001:3f:fe00:a05:260e:d437:6b25:6e28 Decoded Issue HHIT RRType CBOR and Certificate</name>
            <artwork><![CDATA[
[
    15,  # Reserved (HDA Issue from DKI)
    "3ff8 000a",
    h'308201433081F6A00302010202015830
    0506032B6570302B312930270603550403
    0C20323030313030336666653030306130
    3536363135656534356434323730396130
    301E170D3235303430393231303531345A
    170D3235303430393232303531345A301E
    311C301A06035504030C13445249502D48
    44412D492D31363337362D3130302A3005
    06032B65700321008233FDAEB5068BC148
    59D113A0EDFCF8DC07814E3DD2765E6B5B
    82E04D070597A34C304A300F0603551D13
    0101FF040530030101FF30370603551D11
    0101FF042D302B87102001003FFE000A05
    260ED4376B256E28861768747470733A2F
    2F6864612E6578616D706C652E636F6D30
    0506032B65700341005AF256727EDC4726
    A0C5560BF846DF9C31499CF1A4307ADE14
    65D3B7C90381F6EAB8B0B54049C6990968
    C2D2799E4648154618B37B57AC7F28B745
    1538E08004'
]

Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 88 (0x58)
        Signature Algorithm: ED25519
        Issuer: CN = 2001003ffe000a056615ee45d42709a0
        Validity
            Not Before: Apr  9 21:05:14 2025 GMT
            Not After : Apr  9 22:05:14 2025 GMT
        Subject: CN = DRIP-HDA-I-16376-10
        Subject Public Key Info:
            Public Key Algorithm: ED25519
                ED25519 Public-Key:
                pub:
                    82:33:fd:ae:b5:06:8b:c1:48:59:d1:13:a0:ed:fc:
                    f8:dc:07:81:4e:3d:d2:76:5e:6b:5b:82:e0:4d:07:
                    05:97
        X509v3 extensions:
            X509v3 Basic Constraints: critical
                CA:TRUE
            X509v3 Subject Alternative Name: critical
                IP Address:2001:3F:FE00:A05:260E:D437:6B25:6E28,
                URI:https://hda.example.com
    Signature Algorithm: ED25519
    Signature Value:
        5a:f2:56:72:7e:dc:47:26:a0:c5:56:0b:f8:46:df:9c:31:49:
        9c:f1:a4:30:7a:de:14:65:d3:b7:c9:03:81:f6:ea:b8:b0:b5:
        40:49:c6:99:09:68:c2:d2:79:9e:46:48:15:46:18:b3:7b:57:
        ac:7f:28:b7:45:15:38:e0:80:04
]]></artwork>
          </figure>
        </section>
        <section anchor="registratant-hhit-brid">
          <name>Registratant HHIT &amp; BRID</name>
          <figure>
            <name>Registrant HHIT/BRID RRType Example</name>
            <artwork><![CDATA[
$ORIGIN 5.0.a.0.0.0.e.f.f.3.0.0.1.0.0.2.ip6.example.com.
2.b.6.c.b.4.a.9.9.6.4.2.8.0.3.1. IN HHIT (
    gxJpM2ZmOCAwMDBhWQEYMIIBFDCBx6AD
    AgECAgFUMAUGAytlcDArMSkwJwYDVQQD
    DCAyMDAxMDAzZmZlMDAwYTA1MjYwZWQ0
    Mzc2YjI1NmUyODAeFw0yNTA0MDkyMTEz
    MDBaFw0yNTA0MDkyMjEzMDBaMAAwKjAF
    BgMrZXADIQDJLi+dl+iWD5tfFlT4sJA5
    +drcW88GHqxPDOp56Oh3+qM7MDkwNwYD
    VR0RAQH/BC0wK4cQIAEAP/4ACgUTCCRp
    mkvGsoYXaHR0cHM6Ly9oZGEuZXhhbXBs
    ZS5jb20wBQYDK2VwA0EA0DbcdngC7/BB
    /aLjZmLieo0ZFCDbd/KIxAy+3X2KtT4J
    todVxRMPAkN6o008gacbNfTG8p9npEcD
    eYhesl2jBQ==
)
2.b.6.c.b.4.a.9.9.6.4.2.8.0.3.1. IN BRID (
    owAAAYIEUQEgAQA//gAKBRMIJGmaS8ay
    AogFWIkB+t72Zwrt9mcgAQA//gAABV5g
    oVcekaC3mZDVsEtyoYBm1AkrUsfUmU+3
    wWvX6MH0QP+o0E/x4T8gAQA//gAABV5g
    oVcekaC3vC9m1JguvXt7W2o4wxPumaT1
    IP3TQN3fQP28hpInSIlsSwq8UCNjm2ad
    7pdTvm2EqfOJQNPKClvRZm4qTO5FDAVY
    iQGX4PZnp+72ZyABAD/+AAoFZhXuRdQn
    CaDOaB424RQa61YNbna8eWt7fLRU5GPM
    sfEt4wo4AQGAPyABAD/+AAAFXmChVx6R
    oLfv3q+mLRB3ya5TmjY8+3CzdoDZT9RZ
    +XpN5hDiA6JyyxBJvUewxLzPNhTXQp8v
    ED71XAE82tMmt3fB4zbzWNQLBViJAQrh
    9mca7/ZnIAEAP/4ACgUmDtQ3ayVuKIIz
    /a61BovBSFnRE6Dt/PjcB4FOPdJ2Xmtb
    guBNBwWXIAEAP/4ACgVmFe5F1CcJoIjy
    CriJCxAyAWTOHPmlHL02MKSpsHviiTze
    qwBH9K/Rrz41CYix9HazAIOAZO8FcfU5
    M+WLLJZoaQWBHnMbTQwFWIkB3OL2Z+zw
    9mcgAQA//gAKBRMIJGmaS8ayyS4vnZfo
    lg+bXxZU+LCQOfna3FvPBh6sTwzqeejo
    d/ogAQA//gAKBSYO1DdrJW4ogOfc8jTi
    mYLmTOOyFZoUx2jOOwtB1jnqUJr6bYaw
    MoPrR3MlKGBGWsVz1yXNqUURoCqYdwsY
    e61vd5i6YJqnAQ==
)
]]></artwork>
          </figure>
          <figure>
            <name>2001:3f:fe00:a05:1308:2469:9a4b:c6b2 Decoded HHIT RRType CBOR and Certificate</name>
            <artwork><![CDATA[
[
    18,  # Uncrewed Aircraft System (UAS)
    "3ff8 000a",
    h'308201143081C7A00302010202015430
    0506032B6570302B312930270603550403
    0C20323030313030336666653030306130
    3532363065643433373662323536653238
    301E170D3235303430393231313330305A
    170D3235303430393232313330305A3000
    302A300506032B6570032100C92E2F9D97
    E8960F9B5F1654F8B09039F9DADC5BCF06
    1EAC4F0CEA79E8E877FAA33B3039303706
    03551D110101FF042D302B87102001003F
    FE000A05130824699A4BC6B28617687474
    70733A2F2F6864612E6578616D706C652E
    636F6D300506032B6570034100D036DC76
    7802EFF041FDA2E36662E27A8D191420DB
    77F288C40CBEDD7D8AB53E09B68755C513
    0F02437AA34D3C81A71B35F4C6F29F67A4
    470379885EB25DA305'
]

Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 84 (0x54)
        Signature Algorithm: ED25519
        Issuer: CN = 2001003ffe000a05260ed4376b256e28
        Validity
            Not Before: Apr  9 21:13:00 2025 GMT
            Not After : Apr  9 22:13:00 2025 GMT
        Subject:
        Subject Public Key Info:
            Public Key Algorithm: ED25519
                ED25519 Public-Key:
                pub:
                    c9:2e:2f:9d:97:e8:96:0f:9b:5f:16:54:f8:b0:90:
                    39:f9:da:dc:5b:cf:06:1e:ac:4f:0c:ea:79:e8:e8:
                    77:fa
        X509v3 extensions:
            X509v3 Subject Alternative Name: critical
                IP Address:2001:3F:FE00:A05:1308:2469:9A4B:C6B2,
                URI:https://hda.example.com
    Signature Algorithm: ED25519
    Signature Value:
        d0:36:dc:76:78:02:ef:f0:41:fd:a2:e3:66:62:e2:7a:8d:19:
        14:20:db:77:f2:88:c4:0c:be:dd:7d:8a:b5:3e:09:b6:87:55:
        c5:13:0f:02:43:7a:a3:4d:3c:81:a7:1b:35:f4:c6:f2:9f:67:
        a4:47:03:79:88:5e:b2:5d:a3:05
]]></artwork>
          </figure>
          <figure>
            <name>2001:3f:fe00:a05:1308:2469:9a4b:c6b2 Decoded BRID RRType CBOR</name>
            <artwork><![CDATA[
{
    0: 0,
    1: [4, h'012001003FFE000A05130824699A4BC6B2'],
    2: [
        5,
        h'01FADEF6670AEDF6672001003FFE0000
        055E60A1571E91A0B79990D5B04B72A180
        66D4092B52C7D4994FB7C16BD7E8C1F440
        FFA8D04FF1E13F2001003FFE0000055E60
        A1571E91A0B7BC2F66D4982EBD7B7B5B6A
        38C313EE99A4F520FDD340DDDF40FDBC86
        922748896C4B0ABC5023639B669DEE9753
        BE6D84A9F38940D3CA0A5BD1666E2A4CEE
        450C',
        5,
        h'0197E0F667A7EEF6672001003FFE000A
        056615EE45D42709A0CE681E36E1141AEB
        560D6E76BC796B7B7CB454E463CCB1F12D
        E30A380101803F2001003FFE0000055E60
        A1571E91A0B7EFDEAFA62D1077C9AE539A
        363CFB70B37680D94FD459F97A4DE610E2
        03A272CB1049BD47B0C4BCCF3614D7429F
        2F103EF55C013CDAD326B777C1E336F358
        D40B',
        5,
        h'010AE1F6671AEFF6672001003FFE000A
        05260ED4376B256E288233FDAEB5068BC1
        4859D113A0EDFCF8DC07814E3DD2765E6B
        5B82E04D0705972001003FFE000A056615
        EE45D42709A088F20AB8890B10320164CE
        1CF9A51CBD3630A4A9B07BE2893CDEAB00
        47F4AFD1AF3E350988B1F476B300838064
        EF0571F53933E58B2C96686905811E731B
        4D0C',
        5,
        h'01DCE2F667ECF0F6672001003FFE000A
        05130824699A4BC6B2C92E2F9D97E8960F
        9B5F1654F8B09039F9DADC5BCF061EAC4F
        0CEA79E8E877FA2001003FFE000A05260E
        D4376B256E2880E7DCF234E29982E64CE3
        B2159A14C768CE3B0B41D639EA509AFA6D
        86B03283EB4773252860465AC573D725CD
        A94511A02A98770B187BAD6F7798BA609A
        A701'
    ]
}
]]></artwork>
          </figure>
        </section>
      </section>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1963bbSJLmfz4F1rWnSxrdcCeAObU7IAFasnUXZVvq7dMF
kqAIiyRoABRFlb1nX2Nfb59kIyIzgQRJXaq6Zk7vnJWqZBJI5CUyMuKLyMjA
3t5eo58Okumdp8yL4Z7TaBRJMY49Jbg8OlfCKXxbKt3oLleSqVKMYiVIJxF8
PI0msXK1zIt40oh6vSx+gEfCLpYKTq8ag7Q/hRKeMsiiYbGXxFD3IEtme1l8
l+RFlsT5nu42+lER36XZ0lPyYtBoJLPMU4psnhe6qrqq3oiyOPKUo2kRZ9O4
aCzusMJkpnxOs3vos/I+S+ezxv2iKrMXYINYMa8zL6Lp4O/ROJ1Cb5Zx3pgl
nvLXIu3vKnmaFVk8zOHTcsI+9NPJJJ4W+d8ajWhejNLMa+wpipKlSJJ4kBRp
1oDvMMzcU/x95TOMbDSP+yNonW6wUfuDaLJ+L82g//4XpGqczbLkKd5Vjo/b
dA9oEsfQZ9M1m0obe5H1k2isBFnyEFOJPsyEp9zAyB+S8ZhdQ2qmU085vWFF
0gE0rhmma/Hv82mB1L2+8ulCDHM39pQIure/kLr3b9FjXHZqH4hAo6ZBfthX
LuNkIA3uQzKpLtGYLrudE2U8ntVGclUo/nSQxYtcOUznuTwIw9GVQxgETGGR
TpXLNBrsKu/HUX6XLpSrflqMYc6kEb23NMVsHa+M6aM8pK/J5N+yYV9TDYv6
35im2SQqgHgeFbvstE3bdDzlJ6UX5bFtiquOa7p4td/jUwvXXKNp4jXi2EFc
KMrentI9C862QmKBbeS3oWjgvzfouY5hahprTFH4IrpC5ouygXI1i/vJMAG2
hPlS4FGg4CQtYuUoUKCI0s2iPnI0f1zwnsJ/9spPgouuuiec56nKaCwajrI7
pP6oKGa5d3CwWCz2o7yY7MNjB0Ps4p6uR/ujYiKeGMAahEmdj5eKruo6v5rH
uEYTGGXVC2zUY+OESvzyenB2BFyn7muWrh7Ubx9dnRmabe+tEqYN85oTHVCm
ZPEsi3PgQEaedEicluMHNt3QFSITFE4yJZ/3BslDkkPZ/K0Eq9GqnJdcOcvu
omnyxBregu5uv0DIJE+JjvDvHg2LM+Mesmm+TlR/fgeyDMmqvkBWaBSWBKMS
FW0kFXOxYowR70FyHe0F+5U0hUsNwbS2Y2rEtNM8j/vKLB0n/WXJ5Zpu480k
mkZ7d/NkEMPii/Pytq2ptAgGg3G5CDTLKBdBFn+bJ1lMsrEsYBrVKomy/qi8
YTWt6gbMDOvjT8ooHs+G8zFqCAUWK6vpqhto0BDrubhiu3Qlns3EFdeiK9kg
mpULWjWMcnVbmmWVX2BRV1+gmCl/qe4Yqtosv+iao5dfmk1drYq5WnXHbDq2
JzrlOFX7ugNPNPZAUkQ9kIFRv2g0uqMkV0AXzpFwCvBIP0t6wMvI9IMk76cP
cbYkzp7AxNwRfZHr15TvFujWfJtr131gLGT3pCAW4bo4zqAyUGGLpBixCnIu
dIje0KV5v5hnfCXlQjLhvQlognQAz4K+pb6dz3vAPZWQQyFdKm5attgfaUlm
8Rg4foA1gXIpon1GiUkCDBU3Gj/h+svSAfQA6mo0pMqwyeEc+oJjh6VZpMr1
FKgxhdr8JOujOudAQ9m69q+2S8k5gAcqmbp1eRRs7ytnU5BjRNVxMkmwS+ks
zsS6T6QB9aOp0osVFDvKQxIprQzUUB9kpQI17Sq9eaHEj0U8HUAd8nMwo3kK
40xQQk3jGO7vK10g2iSFZ+McK0TNHY/L6ZQfH2bpBFvAepDUMCQF28PP82ny
bR4r9/GSaDxO0/v5DCvY3JEpkj1+iKCRClYpW3kcK7/9BusLF+jeMLkzf/z4
V6WT3MHkKyZW99tvfPn++LENM/WbB4UAFWTFAtDFXjRO7qa/vOsTInj3o/E/
4afxL/Uf5Y0/K4816EEYssbuvrkahT+n07fGv2y4++Zqym9Qzc4e/9nZVE3g
+wef9E8bqpGew2q+U+/gT7q39y97b/yBgql47rvoTUr/bezN84OSnuO0+U7/
8SHvlEPEn2Piqpw+S3dYe+K5TdV8V96fnwU4RPzZx8v77HOqnF/Bne9vqqbe
m+/ln9/Zm/qPXE2dNivVtPXVaj7pR7zwKn9Xd6pq4PmqNz+LeaxNq9T82oTD
z89rg5IbUTZ8fe7OxmrSX+DnFAwhkDHwSa6mfiddq2ZH8N6mNoWBtbk3OxL7
AZ+0rzib/E7apPTod2lpit5wjcEkX402G+6IR9cFxRaqrOvuyfYaiZ+7w2jz
kvR72x2UfsrLP4wxv68V26nItFMVW7mx9tR3ocVJKnG2+5mtVjAqQV1vauu7
oOdSsNT39Ruv9VBZXdKbe7heSfqGYt8Jsqz3YWOXdhoNEOKAHIO4iPtkkSr+
QwrGK8oysCzjKaCDsSDVWS8nGAXFH5J+3ECx5ombV9EwBjy2WgakBNT/KR4l
/XG8V6R7gJqyqIRbcP9T/T7/yPQq6V7lJ1lbMxvpl3fvx2kPuoYAAfHCdQ4A
EazjeBplSapsyQqdq/Nt0NaNz6N4qkSrEJIQ5DbX/GDe/viBAATM8oESyUAE
UQXhn42Qg2OmLEao8QA3Cc3wxhggg+ZOKizLO7AVHJ2E24BNYeQjjnVzAVpK
ow9XYJTnaT8hLDnmioraQLy5D0IIuipD6qTAYcBD8HXA/FPQEl1DVNkXVePg
ECHDhClX89lsnABWBjx5BXhyy5/NYKjJo+Lv66vwiHBgxGrlo0+ALPgAgbtM
GUG3x9B4D4F8Cl3IFE4HIOwiHo8BYf30U8lp7XTaj2dgGzyH8eNJDydFGUEX
0apaKnl/BNTkxIOhTSLoMADbKWDlzS45qOv0CmebjKsfP/ZpADl0DOayH9cp
j2SXJznq9wHFIiEQycszQqZFRH4+6Mw4VqJxniqzLH1I0IVInSH3HdQHdCD4
TbPXi/F2BOYBDC7DqrFoOUKA7US3hEN6nJvKtuDWCVkK6ZwANVhOs5i7DyR2
AEo/bxmJVlF6sC4zW2fGVrdMgXwOhObLop8tZ0V6l0UzID9CczCTYPLTLGfW
MHW0H2fcFGFei9I6mqUJ6s0czZoZl7pyS2COpXOYEeDtdq2hLdatbWqRhk5r
FapBgxrJhI1BG0ugANA2B8zOmRBb3y3HwN22fvUUtjuIh8mUFjfndjDZQSQg
RWt20D5w6EtjlTvGqcKoNo6SCVKCzfwMbIv1WV+zj1O0qNKCG65Lxfd9mP0+
rLAkn3BpBSMU6usZ8xS6khdpFrMJyFIS/OcwCWgCgnUoDMeoN67XsXV+dLTN
VusVMhj2L+a8Rp2vSZ685KZVOUazT2tFlBiAnXZX3mcuL+TJGOqjtQtXj84f
bBgaTMzjLi66ckKP/FO/srl/1VVV8wzV8w5051ca4+VlHhd5OQ9MIDGJiaZ3
N84myTQdp3dL5befiurbDxrqJXPtDORybORoh4JFCEvv3cn1VffdLvtXOT2j
z5fhxfXRZRjg56tD//i4/CBKXB2eXR8H1afqyfbZyUl4GrCH4aqycunEv4F/
cHDvzs67R2en/vE7xsryHJC7ImUymbzXccH0mfC0EIO32ueKZgKf/xfy8mgu
MDr74mikCBewMlhjKXoP2FeYJFhLIGijDCsBzgH5PwPBMkY/Sa7ko3QxVUBq
xYxj/MEg4V6GABcXfclXWXwS3cc0U4IPcDrYumK7KAlxCSiDeP9uf1chBVVb
rFcxU2o601XcUYcinsnQVyp8m6am56WVv83cNCjKpR5IyOPHj12uEkgDls2x
ZRkje/nE0igNhIyG1i59nzV2eHjUFYpMun8Y+NsvN05Yhvgc1dJhqTT5RlRD
RjyMkGzhUoPY8nCeEeG4t4z8Y7j1UUSgqPk0TdjiwkUo4FgfOAIuMVzS5RUe
0BYYgg9Nd/Z6gE4eovEcRWLEgQpWTis9GgwyVLPIuYSzQD1MANmNl7xUpQwV
EC00tbCyARWB5E0zwEIFeeImrGbijdEoKRBC4mxU/EndBrkCH2FEu7VBrzi2
SnUgqEoYVQLxCKn3Xvq68n2n8V0WbADeqxk6Qo8BTcPVPGFbId+Vs8v2IXw4
jPIRYPzvypbuKEDHfJuQv/wNv0rf6LttVoX/sW7XbImDVePifzRevL1SYMN9
KLH30o/8/MbHX/uRKvhDz8s1rNJq7ee5AhUZv78mCb4/IwG+S1VsaaY836s/
zxX4/mcMRDbWxDIThtqqqdXK4uh+AMsPzTFZ/jCtzuQPrYoZWxUrOl3oerbG
+2kGgmKWTglic7yA+2N8XTMcIYwlWMS/Gvsq/Gr0V99PZvZ+lM2i/V+ZnDry
WwARQMQMQNtz3AJQuZ+ih34sAZ2yIZADwZw0LXZ8GqFZu4bmQH6OQd6RMVHk
bEMAFc8omeGT06SHcIt1FwfCn5dlIXeCg87NlDEUpM5UDWwl+/EbVcq28q4H
ZEsX+TupzmKREnvwtmnbAqU+jf8FBQRDi/qM3HUwtw89YEB7dUZROfk+w8d8
dh+9x8dHnGLTZLANql4vsPSWSxVLWfavDENKfawRUWBHGs6vj/vs97m5pxZ/
Xe7j72tl14A5DAq0XcohP+6/AuAsx4j76QidGBGuzvhepnIKD2dgypwy9YJb
vqBdyh1hhCzUTMIgO8xRClYCVkLoCYAU4iSwROISVMPcCP1LhivDfeW2LjHN
Phh82BBtdWZRxM0arBe6q/CBIGvuM5gL88DUNFFS3VVM1bV3FUdzdaKapuuO
QxOFm9TZAwcC8r4SB3TQIWxiKwLYvjdj+12C0aNeCjOI5IRHENgTf/KVQEJr
t9ywIzMFYSgSJuP8XlkU0Sx+pJ4Ji6viSBoCMRaz+4DHaSsdGZgPV173KQBd
aeeRWay4b1ySrBwljY/5QSIsueRLlNuX0jL1oXu7RAiog9YPzPArhrvSwZAI
5KZyb5EzHHFWpEA3xG47MlzChEVOcisHqJTx4QPsmY8HaBL0kC7M2mF2FCMd
TAsgLTQfS7aJ+HIH7LeLvJ7PJ2AbsgfayUMyVnwOo2XJ0AY5w6D/NZv98BGo
ihOKQuIEuH2ccy8PCEPElXyJ4G3m6mKyI0vnd6MxkhyGvMi5echMymkhIqai
THxaKhOsnHvDmOMu7qc5eX52Vx4HA47TA68DwyCvAi+NUgUUVH7AxT53Aa5u
vJLGWDIrf1wAPi1i6ChTR3mCskjwCQJfGhQwRroGLQn/3qGRSm6NfMSsGU6N
/dKHP2VmrAIMiR/vp4hho8pTyBwpjGM5e5MEiPps9sslIkhVVY2PLmd8bQn/
TzoTLFBZbzlzE+alBwXna5TS1PIlVE0EyN+CZHBEzrJeVFl2WaWnJF360qZ5
3e8EEwPDQh6OkjHbdJeV/ygdA9eL2tZ2gqOMafuyq3zIbDh8jOXsPYFIYmKF
ORmpcRyW5LiobWLXO5Pvy/6XO+bplMi8RtLPh2dHV8zUwOAKENG4/AP/nLks
XfRFoceMMUtFIBCi8+LN1K14Cq9WPLRfBiDQzVEk4A/QOxdKt+QaXCrIq/Ns
+lLRBKlwHi2Zo4ytZSbkaLXCcFJvdW325su8Ig73pZdNU8uzaMnmvizGiVqK
tJLVG43Wkpm4CZPsBVl/6LUmvwbIAJzmkiOw1qiG85SrBG1eWq1lMTJnYRKH
MGRYe+k0BRWxZHKm9I0hqsJF+EBSlG0tzIkH7uNZQW5LBdXOZD5hOg1UI3e/
pgUPmMD+gAV8D9BikKAHjys0ZPIiAek/mcWAsREIzWjFk9vUr3qKI6UZgn+j
DHQqEHGpTOfC57wyqazCmM1iHAFnMsEF/A0aAi1lsUzI7TmHLk3QT8CACon+
nypZj459WRERWkSnOzeiUSsKtlselFKpsYXuve3nd7N2fnnu54Wdsu/KM9ju
pX2zWkvpG1tasbReM7DYz/dn7zROhVJ+paFK3hxIEn69HPMwvd7xtw5QfHrZ
nZCu+xckO7Ze5VobG9rcqeaE9ld3qimqvq/e598bWKW6z35FoIS28l1f+W6U
3xvPtPbG728k7JtZ53neaRwDXnyFb1hLb+MdZB5Cr2+o8c2DFJ9e8Ual4sP+
/v7vY591dnor+zzDTsQ+nF+qOBt95bux8n24j7/K8+zzxt78E7MPYYcXC65d
2izL09ULG0b9XXncf/nXEqv1TW2u/dQ9XINpvkewRXZzhY/RZIYbS2jSlHqP
hRyg5/+NdgvbwSYfEupV3CFX5lNQnKBf08EubulPoiXtA/bqBhupVGZPVRtu
ZOliQKbSB6NlPmF+e/KdYfA42D6A7eFTLrYvUxzEI5hw/wqoBizYdEY7lGj2
ijDzCuFFZLmOyYQkCx4jTJlhTFgB99p25ejLOtIE1DGEUhV2YIDiQDg7qLFo
WtuP5vewU0ktkoT7+8Zs41JYkQxKC/jMG8CNcB6LQASMCNMLQ7DaItxIzIho
FGXUzAKmAh8AMAtlxaYFc4gxgw67npNPY185BMC5q/TAcr8nTwQvT0ZBIYwJ
vo2tvKNQgXiALrokG9AmMeLK0krDrZKr810Ca7h7DZyTo5em6gjb7UXwKUic
M1cCjkzuSO2RkhJVhwh7I/WfdZ4KoLy1vnPLfX6VxwKQueT23abhTkVUSB9s
SRjLBofEK74G5i2TaFXZ9pss8rrfeDO7bGAw5lWR5poRkXsCWItV2EeecKeG
2NbBqVMOMRK63GSk6CN0r+7WqZLFfdpc3tRqzIJ9gDDTfoJCJ0Krf442CHQ0
wwE8kPdLBPcMYmYdsbmt1hNaMuk4rlyNbF+MbbHFXKLRtldN5tHmV7AEqwjD
51eXCdlEfH3N0pzRPU/Hc2Z34YBE1cyLVzrSWIcjqculJZszPq7NGjmlGZ3Y
/jQ1WQaNwNQPKdBBGY6TuxGTJ8jUBdvkBHNyCDUv8KQLpwCKVmCYYRyxXsPQ
uQsIdzPj6UOSpVNmw5JdhOJ5rxejWTVACy/FFXaYLnAR7DL7tpQwQmznwANA
D7Ilya7iI4Wy4+QePUi4IRBDhX0wBJn1x9hgPgMzX0QSHXVX+ZM5J0rGKyMw
JIOepqcU5ltoyEF9KKKn8YL27iv7WpbV6P28y2IW57KrxEV/fxsoALqJOsqi
DLi+4AH/Lzkf1z2PsIR30Ys5imY5p3o+H/MTT0TqMQEQ0F/3MXPukHCLcDEI
l1BewFxMQdqUmxh5XNIfx1sySQ7ywh+PpVKvR0+Rw0j4oKvTWcLjXnrjsSrm
lqrceMCTVLcUivXTC8dIMBIFFhxgh3NgaCngjgItaiGHY9w1GyYssEMEa+Us
xEf2Iq64z186IoPbDXA9Hy6Vy/D9niaCC6pgihcDyeaV9OdOp3wtdI3cVbVu
XvJVCx+Y3Nu6vNzmIXVViN3lZXc5i8VqlY4O8ciFBa6chSi2Sx4dnCiSFKWf
rBS3tFWZZShumXeWSRARyFCL9aqRfatFUaC//dbD26wKxiBYBqpgPcAhoi5K
+vNxlAHZkwmCF1pOKNAqTyLIvMsjYNC8FgwmBZNtM2lNEXPE+ZvCvKp4ORDP
YRcIwALM5G3EWBxkojVL0FL5VVLkW/VttAGuSuznA9ubYZSiQCdsbfwQc/1N
JGbD3lcCCgGl7ZspX7k1/Eluq8qpLNZOzkU4nz/lxL/BTvLjjwy7iPWG9MFZ
EKSmLlWFWUhhhRuruayF7G21wvyZECIDYI6+r4lIGgoBRLqeXl2Fbca8oAzu
xks5OmtfEQHGuBU0gBU3YCgMh8gfpdgpHvLFWkYVlcFawQNGxH31sMpofIdr
bcQjlzDwTNqWooWJxxvLLUOuxYBhx3MMaiEpO8RDivBtiQMiTYKckCdPpUse
3dy71S5XQmyE5C5PyklLoAqhnI2WOeGa/ihCsyDOcKOnD5Xj9BEYwoNk5UpH
rIVhw69ve4GYoZ2TWkQQwWoe45tgjG9N1sxzoR95WHB9avFMIpKJq2jqi4gN
KHUBqwmIxb3AIhbqAMM/kePEMisxmhyBRAcEu5frhao1RBKYQqbokFo9RGEF
jjOm53hpt4rNWqm+ttNUBUxov8ooGJ30UlR6OfbyYar5ontzHtKlX4Uf7O2/
L26ax7KQqLZcpDBjcbYPAxeYEQzEqU4x0iGUy6OcTiSuCEgmfmWJUDaQo5rq
vyDO5Z2lZwQFyRS2b4EcJoUFky5fVV+088lGW78Dml1oHZkkK4W4huIDsZvb
bJ+h1GDSpD/geYd5XoZuUH2bVqwIs5v+DNrnAeBJxBEu0T+L92KxQ3sIDCgk
+eqslVHIWTwbR3yXYvUBFqwHJuoAN91wN5KLGLkmPN3Ltl1Fu5XSxMsTPIIL
UgODFfvjeV7uskuTLhQoxc8LG/LnXGanKlJY9sAAOkdjgy1biskHvQSIhtAP
VDpMsknNqOEMTNQXqgakacrOgCjt1tklYwrMmABArbcsYh762A6CY37P1lTc
zWPEECCo3LKqohQXCcwHHjdn7PUThik/At/WMwGUrLRXwN0fUg9ZOAYvzGpm
eR1YPzDXA4JJOllNugIzBgyERMVd6mpfCMyKIt4jn8ZeHqPnA2vEKJcC7M87
kPMYzEWoEb4CS/GWBsldgsYCM0uwR0BXnLSpcHKkPZw7osVwjmi89xV0r7Ae
qhbICQQdAChBME8S8uKcNnQLRgrPJUD0UzwATdxeknkU5SIaZow1AxQdg0zu
sf1SQqzE1VVIM2NBCi0ZJuPVLAz/yjYNIzHmcXpHOpCPnXWcWUisSjaNP2Gk
ZzWBz86nfFmeV9CozIAeJDksvyUwegYmNkVP4K5jrz7tFaFCcV4pSKK7KW7X
95FMXKzmsposz/u8L0/7ML7lnNhB0gHCwxjyGbPsqo4zuv7gu3r8qvKL8ldy
vdJ3tkj3CljqnjKHSdll95LBnhyT7SkFUFHZR4SypVnbrBRwQjpFSu/Ji3MP
RYKnIL80/iZctTwSsVxKwlFLMugzXEXNivHBuD7RT4sGIeeLDeJKLHoSRoPS
6EX/VJxRfAoA/wHQiB4S8Y44yEbDIznw6+qdX1lzTLbzBUcWD4+3qmEXCtii
ESHlEMQcEYZCpwRzMJYsn8ViWU9wKReEpblqIOsasAc5kJhjOCKbgDuW4SGR
hwJRK/M8izAKVgF6jMQKKSNryHdRP1nw228iC0eJTNl4K8U859EUIL5qJRA5
CvQeMTQw5h5TYTPUzmQxcDZIhhTGXTAPrhRHSYunFy9TdKnzaHOJuquwE2Os
fZkXqylcuVObQr7qmaEmxoi77dIDIk4UK6pcNyx6DKCbvLa5044pkQo9MoBE
iKV2hIEhhKgomNhmVheLV9uHPuc82wJ7kt/gPipOdM7hw4S8XWW00BCgSQXu
gT0eIzRsJlB9XSiW64YiCVkMp7KVcOQBgCXOhEmvcE2SyjULGBYxD/oK9OUn
6+hxFknITg9Am5paNlde09UK+paEIjeJp/yqqqqvAEg2EZi2hUypH5ZuVzCj
mv/Xy0ocwUJIZLjCQhKRSVZPRXHsTqt6FV8ASb7sW6oLBTjIwHQq5aKSG+AW
cx6Ph3sc+ZQ+Vu5wTlgsCiImJHWWpszfQCiIRxEj087ix+195QrnRK6OvJ0J
jExaQgCuBD9JB+vk9c/syreYfBgxuOZ7WQfRpeOFacfXH+EuGwGpHQ6p+RkR
2sRB0bR+3LHacRFLqNjYoDjFwqwNtsOGdOwXjNAsho31KalnPUkEpO7HCXqS
CRrXa08z7hhIwQYGJk8GPMZaxtvlmd5yL5Bj6RqCRqcYBhOhb/wZaydaUT7V
GUgu93/FqFDO6gKw1WvIYh7qVmxA38p8xswuPEuLumbtyG2v7Bh/lnHvfxgM
Z/z1VhwuuPH/A/H/JEC8nNB/TiROmxfI24qYmXE6vRMuqEgZx9M70JNMDXJX
IzEX9ZWpFE4hUg9im+4liF+SpI7xxWUA+b8RRJ9H+d8Rciq//Dd+JIM9sVve
TWDC4eZfd/DbHuD+u2z2N3b7v1O4Ob+LH2v3UA/B03ibVBLcKx/L4giv47/y
dbFBwj1IUKJ+RS4rNiF5E+IrFmn8aFR9Le2ZZPB3Zsb8hd8s2LaDNFJmlXAz
Rle3wT4RwyqriUQtdIfVwW8gr9Wq0Pb3DVunavhIq2rgwt/pFICnQDHdsnar
61k0SOYAfYbjNCp2MVdcgufc+9EE9+LyqiAUSLOqHBRc3OWOuTeKCPSvFgeN
Nab8qPTAc8X/1linetlvusVJoO7vO7vVVW8DB1VZUeV70IRgibJitEaqekt6
DCq+rhmZuoFklWe9rEnijA0VSnc3TLfMGlDh1pRyraoUP5tEY5gr/JijdqYK
zO1GxQf1B7hX7+8s54OnWNsNmQZQGLqlWY1qCSpqo1xxitZgi0vRG+VKUowG
WzqK2VhdK4rVqC0Jxa5s6xX9KIxr8r9uMq5pb4w6uRqJzgPiCWchKIVn2ekf
OfCEMnr+9hulz8SjyiiCBwmBHQQ+W11yZmosWyh91rfZUSdSP+VO4bC+8cRt
T4Y4ov79XQbLp57vA6WysN0iTI3COVhysfLD9TUsz8YKaAijs/scgsSP+DxQ
agmgBc9/kQLm1n7pWOA6j/AKOxfFUAQ/wgD6mqAdDoV8vuIMkjjjzuvjgIKw
IsvTwva48zKUSoSnU3VSNf6mYTKpXwF8BMAEpWkzMYumOW5txiwSQ87CQeiP
mhCdALAHUIFpoXQWYVI/OnZDs8qHR151yu1QjxwnAwENQX5kOiiPYKwey6P9
LoxrIw6gqvjRGPlAmMCzrwQ2VYdDk1zUzCO1ZrQni+ZpzLYt4Hr4CNQsMGfN
NnMogwWS4C0BcqQeIL3GSZTkPNaeeooX23REMpeDoDj8DUKGaPqjuH8vn0Ip
x8wPya6EpImDRgi8JknBR4ANVocb0HtE9kh15vWBH4liT+VrY6ia5ftIq63G
S3bCHlrbpeMSGEtC+WtxABTLh8ki0RiI8FSSPMY10vCQKuDkPrqvym07qgu3
LNFrsKlz7NAtwrCUovjouNz/+V//O1+n1C63x9e7QCSUn4VZwgppn2rJu1I2
ya2gOSA6bqxThfE0n2d1LhikU6gOZielmL0JIDKMJipPMGEzaLAusEp20Acd
WdQFtsk/QLuO+ohzVJ4UEHYwuvjYuq9HA5RyZI0IQMrzKCtyyT2xMrPUlzKu
jwV2AeMnPFkpuRn5XKKn8hFP6jKeA47u88Cd51gJcewwyUDL4Dzv8s/8iCkd
cqxF3aHRQMFIAH3F1jhjmrZ/hoyJy2ll/dBxGDJNEoAEsfDPwRBQ/rMjOaiZ
4v5oyre4YwqZnNbmbo/RUCTFkNywRKAC4DgashSdgpEyOY+UoYIgOBcYiCoH
1KABcXWedkDzpGDoU16KuOhDQyhCcaQiVRXRb2VUvbhG6rUFhHvmLFSL7QJj
TMI5PzKEuZ+LuFSVK5JSkpIoIx9KIZkMD4SbKYuJJ3GVTyiXBjsXjo0M4tk4
XZaVCzHP5TypCBEAxY8P0SXgfL86lgyWSHl2+VmRH1EYUO0s12o1LPIFJ/+v
cgTjUkEMMPvbVi2zNTRIqa1ZigLycBygc4v+7D9iauttviHAdEyZmgiD7+ot
kzMxUjRTyoAikhOVJiOd9t1XOnMWCc4RS868x0le9bYK5ZlEpNfpvKxQQJfx
QwKE2BIxLea+VZmSmm5LYUtiZ5uhhwNQ6Hc8gxW3SKHf34mKn7DEFqaR+C6N
a0NQ/qXIqrIh/p9KQIW1UwbKyve33+QloEIVVolR6wQXGRvaV04P/Gf6VvXQ
xApd1xXPSGf422X6dXGT+BGI+2KFqoqd1CzDcvGZ62klQ/9QD6Emm2q0DceA
Z0JZCOPxa7nC13vY6Fb5BlbSc6EMkLMmCK/LJdNOdyC7gMlqYgPWQXWYH5fb
erYJ9NszhSKyM0fRXvkQz1BQBSSLWO94ikAfF3sfBOxU5H/oIYSPMpHjiIk7
FsnO7Anu4+ZhD1KGETkHxbbwflG6gK1n8h5sryc+4PsfIjuQ0lRsxQKaGIoO
9omquIqzdm3DbwNu1X+1Db8bKmvs7P3B34Z8OkqtMc2jdHIKBvcLcFrTlljm
j7cp2vr+wr8h/7cj/avgxPyi7j7+oqovVqK9WglNLNSjvViP/mo9yBpQj/Zy
f4xX6yHOwoq0ehJUeVGsnjpqgSppyTkzylkSxjeGzOG9Xlws4nj6SioSBjwp
5QRuafDkXwO2k9G++sRcsVD4r++T4nDeq/TlHeCMeQ/fMnJAb2JY3O1xTfnc
q24OeuO0d4BWFr46gvoEY93v5w+wCEOMkD+tzhWIzH+0KUn9YygKluE4HhZS
Gp569ooyZ0eSCVetlFZDgAHUrKj40ErJR2jPZlLOGklMUBIaU/1VbLjVDu9Q
VD9FtIt8AQT3MHbbZO1tseB6LjZQxGxXQ2NDmAhHNVfl7+cMCQL+QU64418x
bkHgHr7hyCAF3xOn4SDlvs4Hd1UimtKsl1wa4qQ6hqpyGUmb+mQzcG7h9fEI
aZgffBlP3TNSBvpnMdZURndVSo7J+mRYnQ4RJzUqNEE74gjiaDQMjgBFrpi+
4Sa3BOeEKbJgBEymtJEyxzcN4MYR6mgKOi2YAc/eZDQQQROrNRGWAv1BWJD8
69Afk2XXYDkthNYBBlnRO2LeahvE6A3jM4emxQ9mpdZ2vYoaDAMQPhtTPtRc
hGrnhMH2ZMzVRSmwD9faPB+GFA3ulUkyGLWE44ZeCYQG0YySfgrHTzVDFO22
V6E3T+yKSjhbADviuPKxXTkeLxOZM2ubqVLGniFLgCNWXyKSBqyGyQjEXwW/
/B7cv1bbnw78n4v5mTKxust9gRtiiigtLG5eVnekSqpTWb0svY+nbE8QED5g
JAHPKVnhW2yESGTdyBmOp2X8vc6kJyKZbIXMN4LuEmebumu6dlN3LYE632Ry
MBQsnrURuTqmaTdNU7VdUzMtxzQ0F6rsoMmPIibmH6+YwJQqNzdWvl6frsrN
NI2m6lqWZmvWJrz8nfurV4wi2Rpi29ISExJZyTSScBNNKU31qz8r5tLvs41e
sZX4hNWbO00Llot1o220UrhmNRCFVwq8MXPqM7XpyEw1UjxrtL2hb9ZKAUwu
8oaanqkN+dP50/rmrhR4UwrYZ2vTiKv1P6lvmlEv8FLSvzfUZpKR+2f1za4X
uJ72s3ghJePC1x9tzkaxqbZmvcB7tu/T5h7vK76Xs/W+fbVa56banHqB9b7V
3tD0Wm1uvcALL3TCHAPzcfxSbbpar+08GcO6f9PPptq0eoEzcWz3j9Wm1wsE
5Tu//gIUm/ZHWVq+fE68nmArwJzPG2tb4d5NLzXg7zR4S9/MeoHTmF7/RLFY
otZzFjEEtV6db79cm/V8bQEPIKlqC16rbWUt0Ohirr8C3ETb0MOA+rhW23M2
BoEtycj4MM8l7quO8lZRU8Nq84h8NXXYXx5AKdMLIJ59i4dTJFWnQE6O8Flj
S/HOCeIajLKZsqRvVesrRzjWgXlX4Gw+5H8YnZcq32M2Oj91XKbSk2J2t6Vn
pbc9is1FAh2vIHFBXe5bK00/Ch17JlpaGAK1zekkF8TEo6jHzGYQm2XTlRfI
7ipHYbeDXETHaBZxb28WkX22Rje+v9ppd64q05oZJPT+Smah0ByLo4IlS23B
NONmh3wktjQ9KLskMHp/Tlpp0y7x6RUXUIwGf1mJ2V15AhHfZe30+6UMoPtk
6IqDe332npLqvb+Yp7HLT71PZumUgiApNGAoTkmxd6+UryXBvIllWlC2zTeX
dvNF2BbPlddD+571ocrvtnKoG1O9CHpsiVnO5tMpT3FxFba3VzeUV7z/KBjK
vITzpKBQCiEGPAa08e2PGNHLIhhVw5C/mPIXq/yC758sv+D7J8sv+GLJ6pmm
Y5df8P2TFHd5NFSqU7dI/t0XN66keDeRkYCdahXJNSk2l5fCkAzEN5jChVeJ
IYo9dJGx/Sr+NB0bKMk7iaOcvS0yI0cBnYXbl8/ilmsUrdJO7XSv6LqcVOfZ
4VASPzkAm0Ns8tBIiVMK1r+qHB4vlyLDV46WS2boNlt+1Qllvp9Ycm9evisk
7QM6yuW39eY87w5bKVVao3rmUUalQjr+Wr3IJNl0BoOvJdrPZO8TQs+V8OqN
l6UZxhPysg7GeKwR2XjDkfPyvIzYGt3QZ56jccnanfO3tVDEJvNTnYvkGtjI
uSDIVnh+zl8nZLssLF9KJMkZrTrOwg/divSJfzDr54ZIdRYW8EzuTzy6DuRm
mUFYSRRB0uQxGVMKFymlipzMmZ0w4W7X8oh5tTKq1UdONDm/BwxfyKm35Pfg
bCikD4+FSqSXQtRzZVL2lGSUpgP2VlHoJnW8BzxRULpVmEJ+hp629vHse9lv
/tpXXpjkezblx6/F1v6uFHm/GufEnZbsjTeUb4hOcCHrUsAAX1rKEc8gz2P+
mTgrfZQsTpiMabGX/zAfY4Acsh/GRmF+2lmaDglbFaA970VWLo6rgMFTvp3c
S+9ApdAbZ6u8ZFXvaAopBoKlEwORx8fHg7aYTGI1c8+eVCf3bpdBFFWuUgx5
ymKUOhjjiKeTSzLXZkHmK0Hx6uyCIIoQBuj5iooyUA6IO03YsbAyEymjxy47
nLysvicT5uzk05Qp/TFbw5Qf6ROUGCVf2TvGeTb1euIvqGH6NS7fl4ZpiOaz
Qsq8y1OnZekkoRmMkZV4Kmd+vhjTP+HLlkBtHMj5/2F8V+jhggbnY3bgmULC
4jtGFTmFDspRObYDj/rA2MZMivZETmH2OrEVOUOuWvbyMiFGfof4qF67wN+h
V2lkZB52qHBXGVRvQqhi0PEbf3PJCN9cAlqKjaB8bdNWlXajyfyFVSasXZis
hPQoqal3i2h8z95bUIgoMvmdWyUepl0YWQMieVhkj0j5JeVckPQhGys9jozA
IrtYwjlxiqZEcdJL2tgpvfG4YhMelyb3bktK0oTSEeSrlOyAv44rES9CplVF
ByrKl+bxcDDpgDsnMCuwLU78sHc1RUsSrlzYU/IRlhZFxIXW7COlPN2AD3Fk
K2dUQGQ0TZVBkuFLw6T3vLFTBITV2RBkAVIeYCxoFnl/5Xr5aSIYTW0HgZSv
dKhoV1IupaDCHCYTENpRJhivRvDqlQIID1AWjdkODc3tX0QSpo9AyBAFJ76T
ssFS7GMg8jwZF+ywUpQvJxN8syN7zV395RbSdExwsfdY/pxozDcEKVKh5GMp
xGxzoot8v/YqylJ4rkgDMnvLBBBCGQgLj/WSJZ+cT1lqsV1ux2Z3XNJFKynV
xFv4cCR4Jkps0IElxoI74inFF+H7vZlli2JvXggpPgPzPNsWMoJjiWi8yzfe
pEw5TPsAN4lFx413nJef82qDUs7q3oulDPkwJpRl2Ic5zPG43Nvj206UMS2n
Zc9z0WEmJlQndKaRQVMePNiPKK9+Gam3vk/DE26ymJLdcqVyLpXmny8bWfBI
L3kUyplveOJ2q/ySdCBmL5lGlQCBAb37yl4ZSTR/JwiAlZUv/5MtiLecsTyb
4dsKxuOlcLUQyfLqqBZl/QGlhFYRP31dWrBsw1Tk1GOAJVKuxHxdsaMM+L4q
QjB5mk7LTFMokFD7UpZRtD6P2KlzYfqDtYH4iwAI44fr7gn39uDb3oT8nLB6
5EyoCttgYL3NmUCKONNWRnXZ3aqXd5jRhJA/HX9S/D6+WAFWLtvAIM9ANL2n
ZXtVzNGGauNJty3/C25uYOw/AMld5fi4zZJjtdKecpLm92BRF0/K1mG3S74G
fEUE5tqjclUwQkyJwcg2FG/AkHYlE0raSL4G4pDyAQrOTnpzJgnAhB2Is9rT
gWSYFZXkFUZcn4X9CvaScQnLzVbxCW4d4bEIJIuINLnFMONOgoFXfxHro81l
O+ZVLXM70lsTKExEChnbRX+EiI3cFeiBsk4SMyxqWBNUtJAOchQXxW9LL/7B
cCulm7JoWfJ88T1RVMfc4iEbg790JkmnUixqLk47U4gHdpWPAGNYMLY1F7ma
ABZFg7KUeGsUHsWTz8SLE3kiQwKrjOuT2kauwEgsGSy9TJKfKZSOq6C9RZKZ
ny/kVhG9QAZ6Usb57LKAqPLlSZvuanB7EYuXkq50kGlFMc3wJNuNX3k1KolF
FsiA/tLyGOB/Pbs8en90qlhSMqiY0lyvn6yQ6dto7vfgRgQFXHhA2wf8B38j
uAYF4bMClVKjWxRWdbeYzU7028lZ21+cBP7i80Xn/cnRUevia7vlRn5Ahfy7
sA3/ayf+9Xt/WYz7gZ+dXN0vPixugk8XF6xQ0PaXUMMj/P90O7kdY23wv3b6
+Vo/eR8+UqHTbv/xtnv/eNNtJadPftxZqMvTrq+eBPfw8LVOhU6+3ka1G12o
Aa6dtNTH90/+LRVq3Z1+avmg/O4vr64++cX1fad1fB0WJ92bp9Onm4LVFPjf
yk77JyP/w+RC67WO+9/e+7fFxQcq9FE7PtQ+jM8Lp5NpO19bbhgcfDttnTtx
eJCqiwUVuvrqn2OTh5cnLX/ohK2uH/gXhwcnQf+9r10PqFB4EbYOFhfFSXt+
CBRr+cHBju/7nS+T9ujTo33JTrcdx+87+kgdHLaezhLnoT/pjI4nn8ybz9qi
9/56ToVudLeoOn7a8o+vz7+OjlpGtvj25SKeUaHMPfgUtHZGo2Ix/3x7tNDO
ru/DeZB17KB9f9dvUiFrkQy+TL9E1sE8GA4+HjcHt44xOT+c6N2hoQcPVKjn
+E/hwvmlsV2eSOMBcRRsjafcZP3NmfqdYFZ2qE9T6RxkuS+5VT7L3qn98Yi9
eOKdMRw6igo/73iqmp8N1dFVzdThX61j+apqqPAd/oe/hmXwCEBLtVVDb9lW
E++3DE134d8mXrUs1VQNVqytQykDihga/TVs/LHoM/1SMajWgou2odqagY00
DQ2+u/AXHrN1g5HPULVQa6oB1Ig1mPC/S7Xjo7phWz4b+3oRrSoClbA1Ymha
C764VZfVtqabpqWbrqXqgcUWgKmZmh7g/1CLbRjQNxs+46ihLqQDGyknBvyr
qarrumpgtVSz1dR9zVFtOzBZMVdvWXq7GZiua3ZazbZmt4Jm6LS1jmmqnY7v
sPWrmp0ODNbo+IbZNlQTm+qwnmoB0ITHc2qdDnQcRgrd0fAb9KtZFtNqxbDT
estp4lRCYdXodEKceNWyQipmq75mNbXQ1Xy11XRsrWk7TRN+1aZh+HpH71Cx
pm7DtOghjBbK2AG017Yt+G7YwOxIEtaoXZHEhOZaltpxQg2YKAhbbd232Cyo
Td/1O0EnsID6HaAVrBc9tFwX5jUwQ5gMNqd6qIYtrekDR7k6dKgVNlXHDayw
aQV+2Oy0qJhjNINAd1phENjNdgB9ajfdlm1C/R1bDTs2G0IbGBGI2Pm58bdG
o5YLhYiP55LLdPqf8K2FGHFmKFvqo169r+WKjrhigGkvzjzFovuGJRUo7R9f
JLn0lDDQYW7cstARJjaHx9uneHaVTcxwGPOJiW01wjmJXS1Se82qU2ghgtVU
S/qPQS8twt6e4s8yRXGhQs+yPd2GD7qlvD/prj3gY5popXpAe+6BqzklTuA9
RRy3BzJlz98jHbynrhaUrU+M3PNqTUs3XyCO+OHX+VN78JS3VgZsh/WL+OO6
nqt6A8vrqZ7Z85q6F2meo3q27Q1MT3U9vedZutdv4tfnajCHXq/p9TXP7nmD
phc7+HloeqbqDYde5HgDFcsMtc01xJpnDMs7XyzVfTAAnJDvnY7NyIX57VaU
A4UQXRcZBmbmntLHV9WBybnWRtv3upfX4aZqxHT4Y/6+RJ7T+IXaAKL77Cyc
x6KCOx6KCs/yrNBWPZQSHooJD+XE7trj15dHngg0xGBnCRIx9f3auqgKUMxZ
RZ2e5alDz4k9TfegX4PY6/U9PfKsgac2vcj1oqE3GOJcq31PG9JE29XjAygc
exbwg44ZRGG6Y8vTTawtVr2452lQier1dSwAFRo9L25Wj6uO5w48K/aaljeI
8Naw5zmG1xx4A91zoDB8sL1mHztmG8hRrsSTtkl9G3pAwhj+Dr2+6hmGpxkw
qFVVz+gODBUzuoMg8CKiO4gCD2WBEsQsNYwMBihHDJ2vrYTaux/8wFntTfQA
mVfQbX9/8BZMG7H3vcADYMFMc21/NIj2NLU2yyuDQcQutS4hFgmUU4c2gPK/
MBHJ87P99hM29yw6j34POsfiLtxqwk0TBm/B35hwuQb43GbvVVlF6JaE0Fsj
QOiHhNCfAKF/qyH0zvDfGaF3/SeGq7vjOkL/6j/htZOW+QhEjeoIXWUI/Sq8
3IDQu/7i41e/07o7yW6/+MHRRXAWtUzdvLyIbO3mlMHTaeTEn4vm8Pjy2np/
fpIPw8JcpKZ/8d4/t09PWE1hughwuJdqF5F5y79e+AsA5E++gV2hQoeXIcH3
466fjR79O//CPzi48z+2Pt98at5/uaZCHxaTu9FokA4OLxf9p/Th2Pgwurmy
xoDbi/77Rya8jienD71u1fGLC390Mju7Opvcndx/uGEoaLjTcqfdu2hx/fWj
eRMCAYr+08n99DC4P0sXX5gCW0570fGprXZvYnf07dTeaX8wrk6dXvbhPjZG
MzY6EFoPo+D+AyB0B3gnJl7RwdazgZcM4qWYbDx9Mw+5b+ahm9/NQzdd4KGv
N4+nnz8x2pwGn+5PgyPjJBiPoMAqD2l85i9XeUjDa2/gofvXeKjdPjnQ58VF
dLy4HjF7Ub08u2sOn0zDj1vdr8bVYGxln83ju+5FvzP+c3jo6uZMCwYZ46HP
ZlrjIX10/wYeakXO+HY5LB4PP3wLGHD8dPdgXhY7/ZPrSd+JLhZxYV7fDs6M
5cVZy51/Y1g1P/7kX/Wj2/bnr211Ookv7+8+XY6Sp1iL8+EyYZbR5eW1aR75
4bqVh9ISZeBBJfdesfXMFVtP1PCcrRet2noG2Xp23dazOv+Eth7WjNjdfd7W
06siWImw9cCKArtGtvWMytYzmdllmhttPa2y9tZMG7T22qHtaKFhhxrYin7Y
srhJGNhh026BBWK3mmDqtUzLDE0wSdotrQNthJxuvuGg8eaoz1l73Ih7zdqr
FXvG2vP5EGxbs8LQtAIT5tH11XVrj4rpndesvTUOYdaerhnAJGDE+bajtl1W
zLUNqwndaAZuYDia39ZMp+2HmqOpSPmW1WbWWbvt6k2YMFcNgRJWx2z7TTvw
dTDoWqYZOIxDWoFj+0bT7zi63myaTtDRWn7bdbUwCDXfbDvMfnf8sOOYUJf7
Z1p7roX3reE/l7WneSrgSfft1p7+3AMbrD2QKqW1p/3zmnt9wN4OwGTPsD0w
uzSA9xFiezBr1YFnA3q30WpoumjKbayh2UMM3zM9CwwEk5A8fNXQuNMHXgxw
PfIMBw0Q9RlzD6zL/wTmHsgKD+WEh4LCQ0nhgaT4j7T3gKENMMYMMtginFew
68CYd23PsLzmEM02sL7AKoP5gGkGm9x0qsf7EXKAA/MEhjrwATBBH+eyDzY/
WFJ9z3A9NfYimFELjXko35TNxcjTyZYDVjAHntP0egO0J6F8M/KGjgfLp9nE
FsGog8oj6JtbPQ4sCM9Cr8y+54B9GKHV55jUqPuivRcJwscxEH5AhI/U0uBb
cwE/Z/XJGMHagBEYwPjHQILzZ4IERAACJICCQXhgI1gw4V8T/gI4QCVfFXse
JFjw13wZJPAifxAkuL8TJDi6YXQCRAeq7bRQ9VExywXNbfhqGHTaHSdoq01H
M0MjCPSmbYV2y+KOTT1UzUBtqpbb/A8DCboN3TJB3rd0yw5151mQYDu2+QdA
guV3oOKm3gyDtglAg1k+atuybLUFStsOOm7b0EzXbXdAoxtq0wfVzkC2bQUG
YCpXNZApQ7/ltNSWZaqm27ZdUPY2I29bB0K6bojJaDULOum0jGbLavrtZkd3
Wk3T4svDcELVUVXzzwQJjkMgwfnTQAIIBpQLKBYGBNyiSg//HpBggVr8XSBh
8wPPgISjf36QAPLYMLzhwItAulueaqP7jmkPy/UGGjrlIhUdesP+5hpA/A/6
6CQE9WIC2CAfIGgPK0ZcYfVQ5IN2MskzubEGIKpbYbz/l0ECygkPBYWHksJD
UfEyShgN/kyUYIEy1hHfNWEGYpwWswl9IleuRbivh9ratFFPu6D1YcYkPQ1X
ANlFJrqEQa+jzgbQB3rXIJe/ixAZJnkIcDLyeg5uIwDLlI+bKtbWt1H3qy5i
lL5OvOB6boyNAk+BKocPGjwL0AG4Q+IIAA2AY3QH2wJlDyUBygDjAIRUzVdR
AlAeBkyU7yHlY90pYcK6++Al73B5fAjTcNJDf6Ewxn/UycrcYn34a5K71YVv
JhR06IVa2ppz7PHDinMsvEHnWCdotx7tunPs+g85x06+3ixuP18w2XTy1Ndv
vh5pp5Pr5dmacyzkDtagteIcC5/w2onPXF3cOVb6TD8cJzuD8U7yObCKYWfc
NfMPPlMzO4Os/9lx3h9+ezwPzmaWfTYydr6dNKHWxSl0nvmYLtVL8ne11cVH
s39x5If++YHpt++uu+32JQs3mNw/vM/Tmy/R4aXaPzyxj5duevs+nN9+GY16
X1osifHtlfW1p6uL1sVN8FH/tACU4atBrz+Y3rWbBy2GLA6i46+3k+MkTtXb
TjvoDQ4+Hj36yx3ji/6x6JosLKNIB58eL0/O/ftTOwUscxf1e6fD7ntn5k5n
YZ91PL4ZxflY/9q6+AWDF94y8xQoy2Y+Xfi+f3MUXl+ElRfv8uTow/tJdOVE
TK/56V3n89F9a6do6reLrHAnfVHYb32y7lhNn/rxfdQ2JrfBpzwslulNa6L5
99l1PryeXO8wpLT4/PDFPjlUL853UjU8eDS7zvM1PbTdifbhbv7wpWh+1lNz
8Xg+n0RdBqaOzo3uxakxvDjXndHsaHp1NM6vFt+c6/bp14kesWiU5mzQfZjo
4bfh2YeL0/OP7fHD5e3E/NY9swAUfrqhQsnF+y/m+e10tgOjW4qQlbRzO/oy
vxxcTBmiiepO+VV/PHNByk755bPBL8MH49vO5PiyZSwjqzv5euPsGO2nQRrc
dt1L5qrd+TI7tUZB4tsflsvH1oeH63jxePx0fjrqfrmYOSxkJQya2hc/dPTi
ZFIYw5b51Hv6fHpx3PqUfPAvshHz/kz6UfPgdirx8yQoLoxo+Wn+8ejoiXOj
rbXSh9ZVZ3oZ2kFxcP613zI7Z+eDD/qXSdFjQmLeOm0tPn+pavo06cRWR2v3
P6RHXxmrtLPkQxsY2f/cPTs8n4wPj1X95OPVLD98SJLuU0yFvi1ah+7Hg8vs
ydTaN8mjexg9+Udn/u2Z0+kPr9mqPdn5fHz84TaNLj63Dqcnve7FgpjQODvW
b3eeFmJ0G9l2eWU+TG+HKRUa3+30vjzeXu8cty/OhtPI6Dyct0Z23l08fYvj
r6zQ4CBdc2OjB/vubNh3vnYTtv5vjifds7Nl5za9ftS/np0tipb2dfrt+kNm
924i1qeT9Dy7NE7GH9+33n/OPz1pyy+n366vL9P2t5vBImdMF9vaw8BK7JsP
36Y+W7mrYUfVi5JRUh/I0e3PeKQdsjZfzhXwsrkJ9iaYm+3mirlp/nuZmzp5
pJmZSSadrZPJiIV1w3nZ3NTgEajvJXOzLAKGmTBeRQDRijfZ1UO94wYcHIaO
a6sdtwXsbVtmB8wcsHlcuO8HbavV7vD4Iy3022ZHbYd+0w2d0Gk2O75vGC3q
AFmAjCBlZNBzFiAVE2aghpNhgkHlm602gLvKAmRSrYwMes4CZLZaGRm0agEG
qmEH7SbrW9NR9RA7pYFI1EOcKqBE03cCzdVMXQ2Ywmqi5ea0TbWNYT7NwPFb
lhGqbgs6ZlltS5jCHVUHYAREMAOj7Wh+U2sZ6Eu2O7rbsZs+GwKYskbTdRwr
BOgaoLv5T7UATbIAzT/TAkTMh5APER8Cvj9iAWLMgfp7LMBnHhAW4D+toYeu
vtjTh+gjdClux7UxhsQFFD70NBt9vEPC9K66uQbD9YYuxnuAXQFmXX+I1qIW
o7fPHKI/EqwCwPpQc+w8409uesPodxp6f7KFhuvYw4Xs4Ur2cCn/R1poAxW9
8UBAMJCbjqfq6AodguGkkQ2uo1Pdtj0bPuhogzkDT5M9qSaMyBv00NsKlp4D
JpaJlO+B7TNAB7AToUlmxGiA9Wz01FqShda3WIwNtmuS7zYy0DA3+mjXRU30
3RrMAWxj/e7Qs2ULzUR7EoxAmGVoGgz8no4RR+Q2ftVCkygfmcA+sGp/V+QO
q59JNHxRBhP2nvJXcxd0paqtOu5WJfbP/AUzusdf94E/VjX5WEfHD8KObTdV
Pwzw33p8aFkUA0XrMaKrYa5lUYx3fTnUtSyKMa9VuOt6aKpdFZWbbrVB6UAr
rqOHUC1csFq2XxY1nDao3DBEOnQsXe0EgWGqQRB0TPjcajt2Zf/retN0QMu2
zZbqt9qWilgA1IntBlBB0zLKoi2ApI7pux3DcaE2o+2rvtUKNNBUoe6b7bDy
tpiW2v559zmKu81QRUr7zTBco7gvUXx1n3Z1q7lqwH5tu7ksGhrylvObKR52
gtDv+LYeaGqz2Xb90DJcieLQEsyy2gLN5KgBTHlgWoBTQNEGoa2poV4NCzBD
U4duqabbCsxmSwXSt9sdw9bMoGmCei6L6h1NNcIO6HVVM9qAeQwdRgfNAxEA
VRhWpf6A41rPUxx4W0NKA9E6L1J8zem94revZth5zXdf9aUl++9XlyzOcTU5
8qa8A7Pjt4A3VaCVAfjXBh6rxGK74/qW1m4FiF194MuW2mxBl12gVOi3pKVr
Njum3wk0v2OEBmgYxwGeMGGMAMoc4AXbrDrQUWHOOxiRYYSW09Lbrg3ozlUt
R9PCpqFVw4IBvcDjQTvEJdoMAaO+SPFVkVUBYIZ9q5X6Aghm+LeqtQaEVymO
cyzxjTTZatgM2h3dMEPdRdGCBJfWv65Zrq+ZgFgduN5SW6YWgKwIfaApro1q
kTl2C2bMMcKW2WwaugXQWTVty29bTSNo6la7Kuq7pqXBEtN9F3oLU+00wWC3
O03ApS3fVqVF5jdV7Wf69rfGj39I98hGHOoe0DX/F8KpX0MSwAAA

-->

</rfc>
