<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.35 (Ruby 3.0.2) -->
<?rfc RFCedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-knodel-e2ee-definition-11" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.3 -->
  <front>
    <title abbrev="e2ee">Definition of End-to-end Encryption</title>
    <seriesInfo name="Internet-Draft" value="draft-knodel-e2ee-definition-11"/>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>CDT</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>
    <author initials="S." surname="Celi" fullname="Sofía Celi">
      <organization>Brave</organization>
      <address>
        <email>cherenkov@riseup.net</email>
      </address>
    </author>
    <author initials="O." surname="Kolkman" fullname="Olaf Kolkman">
      <organization>Internet Society</organization>
      <address>
        <email>kolkman@isoc.org</email>
      </address>
    </author>
    <author initials="G." surname="Grover" fullname="Gurshabad Grover">
      <organization/>
      <address>
        <email>gurshabad@cis-india.org</email>
      </address>
    </author>
    <date year="2023" month="June" day="21"/>
    <area>sec</area>
    <workgroup>sec</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 102?>

<t>This document provides a definition of end-to-end encryption (E2EE) from both the perspective of a regular internet user as well as from the perspective of required properties for implementers.</t>
    </abstract>
  </front>
  <middle>
    <?line 106?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>End-to-end encryption is an application of cryptography mechanisms and properties in communication systems between endpoints. End-to-end encrypted systems provide security and privacy through confidentiality, integrity, authenticity and forward secrecy for communication amongst people. Such communication can include messages, email, video, audio, and other forms of media.</t>
      <t>Improvements to end-to-end encryption strive to maximize the user's security and privacy while balancing usability and availability.</t>
      <t>End-to-end encryption, irrespective of the content or the specific methods employed, relies on two important and rigorous technical concepts: the end-to-end principle as defined in the IETF; and encryption, an application of cryptographic mechanisms and the primary means employed by the IETF to secure internet protocols and maintain the confidentiality of content delivered via these internet protocols. Where end-to-end encryption is comprised of these necessary constituent parts, a systems approach also defines their interplay.</t>
      <section anchor="end-point">
        <name>End point</name>
        <t>An "end" either sends messages or receives them, usually both. Other systems on the path are just that: other systems. Other systems MAY be used to facilitate the sending of messages between both "ends", but are not "ends" themselves.</t>
        <t>It is, however, not trivial to establish the definition of an end point in isolation. <xref target="hale"/> Depending on the context, an "end" may be a user; a device colocated with the user; or a set of devices controlled by a user that want to simultaneously participate in the conversation.</t>
      </section>
      <section anchor="end-to-end-principle">
        <name>End-to-end principle</name>
        <t>The end-to-end principle is a core architectural guideline of the Internet. <xref target="RFC3724"/></t>
        <t>The principle has evolved to an understanding that the "network's job is to transmit datagrams as efficiently and flexibly as possible", and the rest should be done at the ends.  <xref target="RFC1958"/> This principle can also be extended to the design of applications itself. <xref target="saltzer"/><xref target="RFC3724"/><xref target="RFC3238"/></t>
      </section>
      <section anchor="encryption">
        <name>Encryption</name>
        <t>Encryption is the process of using cryptographic methods to convert plaintext to ciphertext that is decipherable only by authorized parties. Encryption can help extend the end-to-end principle in application design, where the function of the network is limited to efficiently transporting messages, but additionally the network cannot access any part of the message itself.</t>
        <t>Encryption can be applied in an end-to-end context in many ways. For example, applications may use the double-ratchet algorithm (which uses an authenticated encryption scheme) and of an Authenticated Key Exchange (AKE). The usage of these algorithms (or variants of these) is present in many modern messenger applications such as those adopted in the IETF Messaging Layer Security working group, whose charter is to create a document that satisfies the need for several internet applications for group key establishment and message protection protocols <xref target="mls"/>. OpenPGP, mostly used for email, uses a different technique to achieve security and privacy. It is also chartered in the IETF to create a specification that covers object encryption, object signing, and identity certification <xref target="openpgp"/>. Both protocols rely on the use of asymmetric and symmetric encryption, and exchange long-term identity public keys amongst end points.</t>
      </section>
    </section>
    <section anchor="formal-definition-of-end-to-end-encryption">
      <name>Formal definition of end-to-end encryption</name>
      <t>An end-to-end-encryption service provides confidentiality, integrity, authenticity and forward secrecy between ends.</t>
      <t>In the context of messaging, confidentiality implies that a system that uses "end-to-end [...] encryption would conceal communications between one user's instant messaging application through any intermediate devices and servers all the way to the recipient's instant messaging application." <xref target="dkg"/> Confidentiality is broken if content can be decrypted at any intermediate point.</t>
      <t>As for integrity and authenticity, permission of data manipulation or creation of pseudo-identities for third parties to allow access under the user's identity also violate end-to-end encryption. In other words, the application functions only for the end user and does not perform functions for any other entity coverly, nor overtly, say even if that entity claims to have obtained the consent of the end user. Thus, end point authenticity must be established as (sub-)identities of the end user, and end-to-end integrity must also be maintained by the system. There is considerable system design flexibility available in the mechanisms for authentication and integrity, specifically data authentication, that still meet this requirement.</t>
    </section>
    <section anchor="end-to-end-encryption-implementations">
      <name>End-to-end encryption implementations</name>
      <t>When looking at implementations of end-to-end encryption from a design perspective, the first consideration is the list of fundamental features that distinguish an end-to-end encrypted system from one that does not employ end-to-end encryption. Secondly, one must consider the development goals for improving the features of end-to-end encryption, in other words, the challenges defined by the designers, developers and implementers of end-to-end encryption.</t>
      <t>The features and challenges listed below are framed comprehensively rather than from the perspective of their design, development, implementation or use.</t>
      <section anchor="properties">
        <name>Properties</name>
        <t>This section defines the security properties of an end-to-end encrypted system. The properties of end-to-end encryption from an implementation perspective can be split into two categories: 1) the required core properties of confidentiality, integrity, authenticity and forward secrecy; and 2) recommended additional properties for improved security, such as availability, deniability and post-compromise security, which are desirable enhancements.</t>
        <section anchor="necessary-properties">
          <name>Necessary properties</name>
          <dl>
            <dt>Confidentiality</dt>
            <dd>
              <t>A system provides message confidentiality if only the sender and intended recipient(s) can read the message plaintext, i.e. messages sent between participants can only be read by the agreed upon participants in the group and all participants share the identical group member list.</t>
            </dd>
            <dt>Integrity</dt>
            <dd>
              <t>A system provides message integrity when it guarantees that messages have not been modified in transit. If a message has been modified, it must be detected in a reliable way by the recipient.</t>
            </dd>
            <dt>Authentication</dt>
            <dd>
              <t>A system provides authentication if the recipient and sender can verify each other's identities in relation to the contents of their communications.</t>
            </dd>
            <dt>Forward secrecy</dt>
            <dd>
              <t>Forward secrecy is a security property that prevents attackers from decrypting encrypted data they have previously captured over a communication channel before the time of compromise, if the attacker compromises one of the endpoints. Forward secrecy is usually achieved by regularly deriving new encryption/decryption keys, and destroying old keys that are no longer required to encrypt or decrypt messages.</t>
            </dd>
          </dl>
        </section>
        <section anchor="optionaldesirable-properties-and-features">
          <name>Optional/desirable properties and features</name>
          <t>There is a set of optional/desirable features that a end-to-end system can provide. These properties can be related to the network, to the user interface or specialized variants of the previous features.</t>
          <dl>
            <dt>Availability</dt>
            <dd>
              <t>A system provides high availability if the user is able to decrypt the contents of the message when they so desire and potentially from more than one device. For example, a message can arrive to a recipient even after they have been offline for a long time. Note that applications that use this feature often implement a threshold for this property: number or aggregate size of messages; or messages from a month ago can be read by a user that has been offline, but not messages from a year ago.</t>
            </dd>
            <dt>Loss Resilience</dt>
            <dd>
              <t>If a message is permanently lost by the network, sender(s) and/or recipient(s) should still be able to communicate.</t>
            </dd>
            <dt>Deniability</dt>
            <dd>
              <t>Deniability ensures that anyone able to decrypt a record of the transcript, including message recipients, cannot cryptographically prove to others that a particular participant of a communication authored a specific message. As demonstrated by widely implemented protocols, this optional property must exist in conjunction with the necessary property of authentication, i.e. participants in a communication must be assured that they are communicating with the intended parties but this assurance cannot be transmitted to any other parties.</t>
            </dd>
            <dt>Post-compromise security</dt>
            <dd>
              <t>Post-compromise security is a security property that seeks to guarantee future confidentiality and integrity in the face of a passive end-point compromise and consequently that communication sent post-compromise is protected with the same security properties that existed before the compromise. It is usually achieved by adding new ephemeral key exchanges, ie new randomness, to the derivation of encryption/decryption keys every 'x' amount of time or after 'n' messages sent. Note that post-compromise security is not met in the face of active attackers that compromise an end-point. This property can add a level of complexity to a protocol as deriving new key material can be expensive, and, therefore, it has to be carefully evaluated as part of a system's design.</t>
            </dd>
            <dt>Metadata obfuscation</dt>
            <dd>
              <t>Digital communication inevitably generates data other than the content of the communication itself, such as IP addresses, user identifiers, group memberships, date and time of messages and size of messages. Inferred metadata includes interaction between IP addresses, time of first contact and frequencies of contact, login, and messages. To enhance the privacy and security of end-to-end encryption, steps should be taken to minimize, obscure or delete metadata.</t>
            </dd>
            <dt>Disappearing messages</dt>
            <dd>
              <t>For confidential conversations, deleting one-by-one sensitive messages typically depends on a level of client-side security that is unsustainable. For example, endusers can still copy text or screenshot images outside the secured client application.  A certain level of trust among users of the system is required.  That said, manual actions like "delete for me" and "delete for everyone", or time-based automated deletion of content with "disppearing messages" still provide a valuable defense amongst trusted parties in the event of a compromise of a device of one of the participants.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="challenges">
        <name>Challenges</name>
        <t>Below is a list of some challenges currently faced by designers of end-to-end encrypted systems.</t>
        <ul spacing="normal">
          <li>Making messaging applications interoperable is an important goal for a healthy and user-centric internet ecosystem, however it requires careful design of protocols and systems, such as content type negotiation; provisions of global services, such as discovery; and a great deal of cooperation amongst implementers.</li>
          <li>Public key verification is very difficult for users to manage. Authentication of the two ends is required for secure and private conversations. Therefore, solving the problem of verification of public keys is a major concern for any end-to-end encrypted system design. Some applications bind together the account identity and the key, and leave users to establish a trust relationship between them, assisted by public key fingerprint information.</li>
          <li>Users want to smoothly switch application use between devices, but this comes at a cost to the security and privacy of the communication. Thus, there is a problem of availability in end-to-end encrypted systems because the account identity's private key is generated by and stored on the end-user's original device and to move the private key to another device can compromise the security of one of the end-points of the system, eg by opening the door to key-impersonation attacks.</li>
          <li>Existing protocols are vulnerable to metadata analysis, even though metadata is often as sensitive as message content. Metadata is unencrypted (and sometimes unencryptable) information that travels through the network and includes delivery-relevant details that servers require such as the account identity of end-points, timestamps, message size or more. Metadata is difficult to eliminate or obfuscate entirely.</li>
          <li>Confidential and secure communications systems should also maintain the privacy of users but this is necessarily balanced with authentication and is related to the metadata problem for account identity.</li>
          <li>Users need to communicate in groups, but this presents scalability problems for traditional end-to-end encryption systems. Message Layer Security protocol <xref target="mls"/> is a modern end-to-end encrypted message protocol that addresses this scalability concern.</li>
          <li>The whole communication should remain secure if only one message is compromised. However, for encrypted communication, in some schemes, you must currently choose between forward secrecy or the ability to fully communicate asynchronously. This presents a problem for application design that uses end-to-end encryption for asynchronous messaging over email, RCS, etc.</li>
          <li>Users of end-to-end encrypted systems should be able to communicate with any medium of their choice, such as text, audio, video, or miscellaneous files. However, there is often a resource problem because there are no open protocols to allow users to securely share the same resource in an end-to-end encrypted system.</li>
          <li>Usability, accessibility and internationalisation features often need careful design and implementation with respect to security and privacy, such as message read status, typing indicators, URL/link previews, third-party input/output applications.</li>
          <li>End user security tools like anti-virus plugins, spam filters, fraud protections are in conflict with the security and privacy considerations of the end-to-end application.</li>
          <li>Deployment is notoriously challenging for any software application where maintenance and updates can be particularly disastrous for obsolete cryptographic libraries.</li>
        </ul>
      </section>
    </section>
    <section anchor="end-user-expectations">
      <name>End-user expectations</name>
      <t>While the formal definition and properties of an end-to-end encrypted system relate to communication security and privacy, they do not draw from a comprehensive threat model or speak to what users expect from end-to-end encrypted communication. It is in this context that some designs and architectures of end-to-end encryption may ultimately run contrary to user expectations of end-to-end encrypted systems <xref target="GEC-EU"/>. Although some system designs do not directly violate "the math" of encryption algorithms, they do so by implicating and weakening other important aspects of an end-to-end encrypted <em>system</em>.</t>
      <section anchor="a-conversation-is-confidential">
        <name>A conversation is confidential</name>
        <t>Users talking to one another in an end-to-end encrypted system should be the only ones that know what they are talking about <xref target="RFC7624"/>.</t>
      </section>
      <section anchor="providers-are-trustworthy">
        <name>Providers are trustworthy</name>
        <dl>
          <dt>Trustworthy</dt>
          <dd>
            <t>A system is completely trustworthy if and only if it is completely resilient, reliable, accountable, and secure in a way that consistently meets users’ expectations.</t>
          </dd>
        </dl>
        <t>This definition is complete in its positive and negative aspects: what it is, e.g. "Worthy of confidence" and what it is not, e.g. in RFC 7258: "behavior that subverts the intent of communicating parties without the agreement of those parties" <xref target="RFC7258"/>.</t>
        <t>Therefore, a trustworthy end-to-end encrypted communication system is the provider of the set of functions needed by two or more parties to communicate among each other in a confidential, authenticated and integrity-preserving fashion without any third party having access to the content of that communication.</t>
        <t>A proper implementation of end-to-end encryption significantly reduces the need of a user to trust a provider. However, this is contingent on users having some guarantee that the system actually works in conformance to the stated specification and security properties of end-to-end encryption. One way by which users can increase their trust in the system and confirm their system is performing in accordance to cryptographic protocols' specifications is using systems that are releasing their software as open source.  Open source software allows technical users to analyse the system and be assured of its functioning.  While most users will not be able to do so, as typical users lack the technological knowledge needed to analyse source code, technical communities can do so.  It is vital that systems provide publicly accessible security analyses of their source code, enabling reproducible builds and audits and investigations that can be published and peer reviewed.</t>
      </section>
      <section anchor="access-by-a-third-party-is-impossible">
        <name>Access by a third-party is impossible</name>
        <t>No matter the specifics, any methods used to access to the content of the messages by a third party would violate a user's expectations of end-to-end encrypted messaging. "[T]hese access methods scan message contents on the user’s [device]", which are then "scanned for matches against a database of prohibited content before, and sometimes after, the message is sent to the recipient" <xref target="GEC-EU"/>. Third party access also covers cases without scanning -- namely, it should not be possible for any third-party end point, even those under the user's identity as per Section 2.1, to access the data regardless of reason.</t>
        <t>If a method makes secure and private communication, intended to be sent over an encrypted channel between end points, available to parties other than the sender and intended recipient(s), that method violates the understood expectation of that security property.</t>
      </section>
      <section anchor="pattern-inference-is-minimised">
        <name>Pattern inference is minimised</name>
        <t>Analyses such as traffic fingerprinting or other encrypted or unencrypted data analysis techniques, outside of or as part of end-to-end encrypted system design, allow third parties to draw inferences from communication that was intended to be confidential. "By allowing private user data to be scanned via direct access by servers and their providers," the use of these methods should be considered an affront to "the privacy expectations of users of end-to-end encrypted communication systems" <xref target="GEC-EU"/>.</t>
        <t>Not only should an end-to-end encrypted system value user data privacy by not explicitly enabling pattern inference, it should actively be attempting to solve issues of metadata and traceability (enhanced metadata) through further innovation that stays ahead of advances in these techniques.</t>
      </section>
      <section anchor="the-end-to-end-encryption-is-not-compromised">
        <name>The end-to-end encryption is not compromised</name>
        <t>RFC 3552 talks about the Internet Threat model such as the assumption that the user can expect any communications systems, but perhaps especially end-to-end encrypted systems, to not be intentionally compromised <xref target="RFC3552"/>. Intentional compromises of end-to-end encryption are usually referred to as "backdoors" but are often presented as additional design features under terms like "key escrow" or "exceptional access". Users of end-to-end encryption would not expect a front, back or side door entrance into their confidential conversations and would expect a provider to actively resist -- technically and legally -- compromise through these means.</t>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>From messaging to video conferencing, there are many competing features in an end-to-end encrypted implementation that is secure, private and usable. The most well designed system cannot meet the expectations of every user, nor does an ideal system exist from any dimension. End-to-end encryption is a technology that is constantly improving to achieve the ideal as defined in this document.</t>
      <t>Features and functionalities of end-to-end encryption should be developed and improved in service of end user expectations for privacy preserving communications.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Fred Baker, Stephen Farrell, Richard Barnes all contributed to the early strategic thinking of this document and whether it would be useful to the IETF community.</t>
      <t>The folks at Riseup and the LEAP Encryption Access Project have articulated brilliantly the hardest parts of end-to-end encryption systems that serve the end users' right to whisper.</t>
      <t>Ryan Polk at the Internet Society has energy to spare when it comes to organising meaningful contributions, like this one, for the technical advisors of the Global Encryption Coalition.</t>
      <t>Adrian Farrel, Eric Rescorla and Paul Wouters are acknowleded for their review, comments, or questions that lead to improvement of this document.</t>
      <t>Chelsea Komlo and Britta Hale have contributed their deep expertise and consice and rigourous writing to this draft.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not specify new protocols and therefore does not bring up technical security considerations.</t>
      <t>Because some policy decisions may affect the security of the internet, a clear and shared definition of end-to-end encryption is important in policy related discussions. This document aims to provide that clarity.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no actions for IANA.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="RFC1958">
        <front>
          <title>Architectural Principles of the Internet</title>
          <author fullname="B. Carpenter" initials="B." role="editor" surname="Carpenter"/>
          <date month="June" year="1996"/>
          <abstract>
            <t>The Internet and its architecture have grown in evolutionary fashion from modest beginnings, rather than from a Grand Plan.  While this process of evolution is one of the main reasons for the technology's success, it nevertheless seems useful to record a snapshot of the current principles of the Internet architecture.  This is intended for general guidance and general interest, and is in no way intended to be a formal or invariant reference model.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="1958"/>
        <seriesInfo name="DOI" value="10.17487/RFC1958"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC3238">
        <front>
          <title>IAB Architectural and Policy Considerations for Open Pluggable Edge Services</title>
          <author fullname="S. Floyd" initials="S." surname="Floyd"/>
          <author fullname="L. Daigle" initials="L." surname="Daigle"/>
          <date month="January" year="2002"/>
          <abstract>
            <t>This document includes comments and recommendations by the IAB on some architectural and policy issues related to the chartering of Open Pluggable Edge Services (OPES) in the IETF.  OPES are services that would be deployed at application-level intermediaries in the network, for example, at a web proxy cache between the origin server and the client.  These intermediaries would transform or filter content, with the explicit consent of either the content provider or the end user.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3238"/>
        <seriesInfo name="DOI" value="10.17487/RFC3238"/>
      </reference>
      <reference anchor="RFC3724">
        <front>
          <title>The Rise of the Middle and the Future of End-to-End: Reflections on the Evolution of the Internet Architecture</title>
          <author fullname="J. Kempf" initials="J." role="editor" surname="Kempf"/>
          <author fullname="R. Austein" initials="R." role="editor" surname="Austein"/>
          <author>
            <organization abbrev="IAB">Internet Architecture Board</organization>
          </author>
          <date month="March" year="2004"/>
          <abstract>
            <t>The end-to-end principle is the core architectural guideline of the Internet.  In this document, we briefly examine the development of the end-to-end principle as it has been applied to the Internet architecture over the years.  We discuss current trends in the evolution of the Internet architecture in relation to the end-to-end principle, and try to draw some conclusion about the evolution of the end-to-end principle, and thus for the Internet architecture which it supports, in light of these current trends.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3724"/>
        <seriesInfo name="DOI" value="10.17487/RFC3724"/>
      </reference>
      <reference anchor="RFC3552">
        <front>
          <title>Guidelines for Writing RFC Text on Security Considerations</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <author fullname="B. Korver" initials="B." surname="Korver"/>
          <date month="July" year="2003"/>
          <abstract>
            <t>All RFCs are required to have a Security Considerations section.  Historically, such sections have been relatively weak.  This document provides guidelines to RFC authors on how to write a good Security Considerations section.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="72"/>
        <seriesInfo name="RFC" value="3552"/>
        <seriesInfo name="DOI" value="10.17487/RFC3552"/>
      </reference>
      <reference anchor="RFC4949">
        <front>
          <title>Internet Security Glossary, Version 2</title>
          <author fullname="R. Shirey" initials="R." surname="Shirey"/>
          <date month="August" year="2007"/>
          <abstract>
            <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security.  The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026).  The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="FYI" value="36"/>
        <seriesInfo name="RFC" value="4949"/>
        <seriesInfo name="DOI" value="10.17487/RFC4949"/>
      </reference>
      <reference anchor="RFC7258">
        <front>
          <title>Pervasive Monitoring Is an Attack</title>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="May" year="2014"/>
          <abstract>
            <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="188"/>
        <seriesInfo name="RFC" value="7258"/>
        <seriesInfo name="DOI" value="10.17487/RFC7258"/>
      </reference>
      <reference anchor="RFC7624">
        <front>
          <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes"/>
          <author fullname="B. Schneier" initials="B." surname="Schneier"/>
          <author fullname="C. Jennings" initials="C." surname="Jennings"/>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="B. Trammell" initials="B." surname="Trammell"/>
          <author fullname="C. Huitema" initials="C." surname="Huitema"/>
          <author fullname="D. Borkmann" initials="D." surname="Borkmann"/>
          <date month="August" year="2015"/>
          <abstract>
            <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered.  In this document, we develop a threat model that describes these attacks on Internet confidentiality.  We assume an attacker that is interested in undetected, indiscriminate eavesdropping.  The threat model is based on published, verified attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7624"/>
        <seriesInfo name="DOI" value="10.17487/RFC7624"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC3935">
        <front>
          <title>A Mission Statement for the IETF</title>
          <author fullname="H. Alvestrand" initials="H." surname="Alvestrand"/>
          <date month="October" year="2004"/>
          <abstract>
            <t>This memo gives a mission statement for the IETF, tries to define the terms used in the statement sufficiently to make the mission statement understandable and useful, argues why the IETF needs a mission statement, and tries to capture some of the debate that led to this point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="95"/>
        <seriesInfo name="RFC" value="3935"/>
        <seriesInfo name="DOI" value="10.17487/RFC3935"/>
      </reference>
      <reference anchor="saltzer" target="https://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf">
        <front>
          <title>End-to-end arguments in system design</title>
          <author initials="J. H." surname="Saltzer, et al">
            <organization/>
          </author>
          <date year="1984"/>
        </front>
      </reference>
      <reference anchor="dkg" target="https://tools.ietf.org/html/draft-dkg-hrpc-glossary-00">
        <front>
          <title>Human Rights Protocol Considerations Glossary</title>
          <author initials="D." surname="Gillmor">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="mls" target="https://datatracker.ietf.org/doc/charter-ietf-mls">
        <front>
          <title>Messaging Layer Security</title>
          <author initials="" surname="IETF">
            <organization/>
          </author>
          <date year="2018"/>
        </front>
      </reference>
      <reference anchor="openpgp" target="https://datatracker.ietf.org/doc/charter-ietf-openpgp">
        <front>
          <title>Open Specification for Pretty Good Privacy</title>
          <author initials="" surname="IETF">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="GEC-EU" target="https://www.globalencryption.org/2020/11/breaking-encryption-myths/">
        <front>
          <title>Breaking encryption myths: What the European Commission’s leaked report got wrong about online security</title>
          <author initials="" surname="Global Encryption Coaliation">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="hale">
        <front>
          <title>On End-to-End Encryption</title>
          <author>
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA7Vc247cRpJ9F6B/IHoeZHmrqi3ZXts9WGBkuX1ZW7ZgaTBY
GMYgi8yqoptk1jDJLtUIBuY35iP2K/ZP5ks2TkTkheyqloDF6sHuqiKTmZFx
OXEiksvl8uGDoR4ae1V8ZTd1Vw+16wq3Ka67ajm4pe0q+rPsj3v88PCBWa97
e3tV2KfWPnxQubIzLd1b9WYzLG86V9lmid+WVRxt+eTJwwelGezW9cerou42
7uGDhw/qfX9VDP3oh6cfffTFR09p7N6aq8Lb8uGDg+tvtr0b9/r5xh7pq+qq
+K4bbN/ZYfkVnvjwgR9MV/3VNK6jWRytf/hgX189fFAUP3/93FZ+ODbh+6IY
XJn/XXeV7Yb4jXf90NuNT18c2+nnoa/LdH3p2pbuT7/XXVN32dPsm2HZ1H5Y
0kBr19CFS/fhv2HpZhx2rr/Cn0tcyv/qjq54sSq+ZyHGr0W+L0zTkPTmP7p+
a7r67wZiviqef/U6/mJbUzdXRStb8qeyGlZ08YknvloVz21Tz573ym3+57/N
9Jfpw77sza2dP67c2d52N+72T33t7bhf0U6deOZPtErX3LSmmz32p8Zs7vw0
fW5QAJpiWdvhOJ/Cjdz9p9q78sySv1kV3/Tu1vazp38z9n5n1qaa/6xDb8Pv
fyprvyT1qU14Quf6liZ4a3lToeL554LV8ckXn35+FT48ffLki/jh46cfp18+
/uzpJ+nDp58+jR8++eKTdM9nT7PRPvv37J7Pn3yWDfDFx5+GOXjTDH+3/ZWu
S83+IrN0029HVmoSFOm/H2xbVNbX2+5Cb6rIjq+KJ198/ol+EXVZZVUsRcj/
uSq+XRWv5JGLgjbMBL0d6DGWDGk3DHt/dXl5sOtVWw8rW42XesPl4XC43I/r
pi553/0lTW9w9J/4x2pfbXRh1c12vqhvR1KC4ud6u6PFvOwd2btriuc0Ul3Z
XsYsvmmc96Y/Thf39KMnn75jcV+RBtVN07r+zJIGRwa/Iv3cQEMud0PbXIqP
pLkud/2+XG714cuPPtJltOQjZst4Yemabd1tix/M0fbFK1uOfT3cnfHn75jx
d9evvz4zVxrDDL0pb2yfZkye/bLcmZ6MbYkvlzQ5nabb226/3c+n+hN9Xbza
27Le6KYVZAUkezsMx+Ib5yr6u7415Z3JP/3o/3vyOmVdwDfXz5fXf57P/0uK
PjeQtI3hrmiPw46e/5edGYphZ4vrsaehSLGek/Ovvadr/vWPf/qioVttVfR2
T0Gk2LqhOPSOhjJrNw6F48CAQHZy7965fFLTtWmyMEyPN01tJCKfNqnDYbXl
29JqWDR43OWTJ5drXe0y/b7k1V7qiPy/Hd1/Z5+7gA2uJ9jgzrKesOtdLkkK
HlvEkeD1rvYF7Q+7mWJPfpbs0RemqCbowyaflG3HB9dPr68fF5vetcXaDTve
k73tPWkdnC3uNLQL27ExPclOI8XoyXKMLw62afB/vv/Erb3921j3tI977HI/
1DQxqHDd7huL+dLlq7Cotq6qxuITRaTeVWMp2/Ef2T/8en1yJSQE0iKz3wcH
h+fzr27bm/3uWLSWNLirfYsrJ1Mi1wzsMXbhVnHUvljb4WDJCOlZe0er96vi
7tNpeeF6lX5UTH0Q2yjJh+DXdkeP6jY1gFJNKjccFyzWbc9/QmHxSxluJmkd
TF9hxN7SIJDedK6mJbvwtPPWkVApQIzlbnZJSZKpu7IZaWot+z/rFxKDFwUm
7PDkqsb/6JmkB7S9CLgeQmwtwjLvS4sFWolngzujU0B1tP30e2ve1G39d8uq
AZ155E+L5rCrG1uQbZmuhMMYvVnXTbjK3NJE9YtVcVYFSJB9b3P1w2NJ2gMM
g+SGj17dKa2KXEPlSQr7xh1ttSBlbaAMtILh4KCi5HkM3Ykp9DVBbTfSqkmJ
INcGA5d2D7SKcTNR0KJoFbQXsAw2QtIQUjFcBr/7Rx4xn/e9istznWguG1pf
txTq6CfTpUUU62N8DDaAhW2T3e41bMs4tP/dYHRmM63kSajoCO6SQGHGt7XB
xf7UkCty6nTRGaUg8ySd3APEVro1NEpnS8shG8/y5A9H9mEUZ0g/TTQrEk7v
DKm1abxTkXoMUatP2jcmaUbBpso+Rf7h+2ddcUFTuihszdrt6YOPxgDtIPOy
tEwet12QCo6UIRzZK66Kn+QmnY8Tke0NOUxKsYrfKOWibwyFC5dfOL/vxbP/
IpcCS6iwOxtTQqfJu4tq0pSg/GxyOq/ggNg3YwH+YlGsKQLisR1FRfmO5+xt
Q9MXQx1I4Iti5w72FlgRV8IqaW/ZbinHIyDoxd1P44RhbycyhNYS6m9YLVfF
27eIXr//TnntPsy1S0b2ZmBNFjG35oilGjb7P3I0uq1LXNk4ZK5Vcag13MgV
tAO04aRQNAe51vOwvWsaUWwZi+VcHGCYUPC6HRuyUku2SZsFzSHfuYdIk16T
CLwsYeY7oqVmypL9Q2w9Y9mINjQ0bYLpy11NXmEYexLudqxhLV10PyG5gvQ0
Ffn9dwnbNhtvR67C3jraQNYMEuNIuXTPuTjkPAS8dEFjIZUnT/qbW2MedDlh
gc4T3gdSMOQ0YDI03ob8XE0G1Wgoaeybeo0PFKgIKdPf9mIRPQq5zqHwOzc2
FXauovy/0IdCx1ZF8YumXL8WjDnS7BFf2DTpPlIDulyWIdqFZIc1K7k4CrkD
qetmVfyiKdSvmXh+0QTuV9muRJXkW3M98S3iEh28CR41eght7kTF4dO8RCfI
0TTwgDRj/rLek63KJ0gbqMrKl2QsFpjzyGrImJKiWiXqZhkUxMlAFjvb7FUQ
54NDPXX6IqcFhUI4Udy1GbsyWCU+685jYg2F1UFknO8y6wHCFlafAj37i6pi
E2eflo9G84V3MCXLznRiROGZOkjYrumG8Fph5FiGxDjxHmGx6hbwQ4uRD+ZI
wvqaTN2+MYCAi6lSwGmQjYveOMpV7ZISy3LHqS4FYPIYbfEBgQUKBXSdIL6A
mNip5DCE7mvtY0E07NeeTS793h6L6zcIrLS+D559f/14Vbxmd4QFxxAVH+yL
D2jit6avDeBPuOBxwaZAf3Vpoa0j4+1YepaG76fL9EBoBkrr8IDKMYbMEEJx
LkktsGX4mpk8KAtG0MRMnQHhRLg/k3ICVmd4QL+pJb7R7lvGluRxyRLIccV4
PpkpruBHFTckrRg2eFRGEKoeAAFWlDVBjLdvKcP9/XcKghQtXn7zckFi8VBT
jn8YWhGobGVR1ZsNyK5BQdbfRgaRFPdrmuRJ4LgqONKJ81ExzESZS8RPcmkW
SwlainZz/RvNfwLK9CtYJUlc/KQAJJpDicwhjvT2rabDWO2XCNVJCoQqjyFM
Qrehiv7YkjfqySlh0PRpiglJm4N6NgTxl7S2Ns1AqBzsi48pQAzcggK+BmXW
vE8eOE2y7v+naCqNs8yNzvYc5mMa+n9KdrL0S3HNBG4kpMQbNEewSDJF32mf
A5iUT6xxF5koflmtVr/m3uPAcZAxPmP9LJ1KqAwhUtOauvOcLMT5TJx7SP3g
G9jSOKcabEQ6rAckO+giuWheJXnLEER7BCI4+Xc9aXVByljdbAmkPZ+Lg+bd
uxuadp2gvXpwCnSayUJU80mySrH8n2n6HvZQ0rNsGxdgAJTHYSRHgAQusd6P
jSY3vdijXrD3dqzcUtU68APDru5jeGUn0DTuEIIUQ6M8p4xGwX7gtgZiPZOI
kMfoFKSj/EHREePkexXCrpeIv9HEEcMI7UF/VI6mhbBJq0WenN2E6yFBeUZw
F/AyzRFAvC/w94APnjaYPBtvCKtluJpgScvL3hkksmskabYKqs+RRuNzmBVC
14icPkL3iXG1SFAAzoIHx05TQPPjevk4k/1sVPVCSY5p43nEgPlCIpkSUDE2
Dqi9leRPeWJAqQkPrrhU031J9ZsI37PUlyWbQjhzH/mcFsm/A+Sw6k2vX2go
HGoysdZahMbaB5YKUW2eIeQZbOCsxAm8p8vEeJQXd+TCHUduIMvpSOfZOabV
TJBTxq2J1m5qShCSZHMsjCoZxiW9rAw/qik2ZHVjHxxiRVfQfEZkgVPUNqe1
ZBrwdXJj0H0hHc6ZGUEW11VQc9zJ6hJmqnnBrW3cnqHE1pEmBWIQkYMzHptm
fE5CCCd3rZk0hnLGDvlzoF9ULUWSJMdFeD47XGhRxkiefdwqJG5xYrg1exzE
jqdZ9lak+RtKxmwl1IclNfC0eaSbtFk7SWW7s9yp0BshLcjEtZgpEFwqWStP
7mUkNafZktLEXkFaRqEkXJURopEHOKcTApWnd9ynw3PzmSxWg5AnHwwIjZh3
INQm9W0a/Kp48ljDoNLJnHlPn/5/ARrCyD19jDjLNWjkryljOsFegwatougW
EdLnVCU2ratzIpOy7mHJuuAoRtrsfslpoDHYcPGStiP1KIVt5c39wx/+UPwY
GbN9ttUPH8yi/cMHV8WzYL8RjAW4fgcpbSTWBRZKoxwkyKKI8OMD/5h3iwJ4
NckPYyZNcl/ZVSKwOFgFvBTpGSRQGEdyaivjqY2abY/kZNy72Q0aESQfYeBB
Xnxyhd8ZzZ1ldaBp5fLWtmtaFexTgaQqx/2CSvHuAB9O6rkdDSXZgw1uNC6U
QzXc4horpQSQApGmIsjK64GQB2opYWgwPpNLFxg+BOrKIp/SnJqZaVYJQEIV
U9wTAWaTOHd6UbPYWW+m4ygG5d3H3hBKqTfk3sG7sotNQEtrJjQthbcup9p9
8l5T3BySktz0MNXZV0Kuzd3SUeRNbvSWn2GGgWuUWnxSBJtVG0l4DAFoJkfZ
HdxbC1FYmj0ceMVgjKm8Sb2EDK+zDW3ExqlCDXVrxc0E610ECYaZZL95DnoJ
TYXi0YmVBp5Z01w2A623AcRYsLa0qM4eMq96GZZLk0UGKECNNnno3ZF5WUpe
ODWU5IfJYs4ibZ+8KFdweByEEB0yanR0OT/txQ1eJteUOUR2pxoONTz2Nmwh
YxB39/4pFDF56FCthQaq5nKs8ZOHasRgBUxUo1Jai/CZ4TpnMhtDOSnYDgBE
8nkg72ZMTtSOODkxrMyhnzarXY3ELrss6IU8ngSBFQ8uCviEqUSvwG6GNZYL
HSQvq5FjEHeNjAT63opiGklCJY2cU2vJ34Mn60NVzmQ2z+mH2QwCytRO2C25
zYZ5bEbdrDpsA6viRzcoEpxQRSGvFkitMqRRBpvF/gLmSKLdQT810fPRwq+K
bmQ3jUduKQxskcZ5FBCzmgiXCqLbVYjckjxpF7YuqYa5UzSILlfXJswofPZ8
uKM1mIJjFfjBUc75M+1FQyIrLbRg4smxAkp6TSckbOPgwo9TjRS/ivBJu3kp
1aYUUpV1l7wEhKpqTPJKgu6+SngCs8g+kgX5zKC6I7P3M8XjjSeYHJSOA1PZ
13tEbS4PZ7xxmiF5FyWJJ4Q66yIDITyDI0S0Z4nK3DOQBWhpJphVr5lNB9zK
S7M8g1XxDAC+RWWwZzsnqR5QXzlmcL1KXNtC1Cn4mxQ5OKpSkukHKfV3vwVq
PRahujmu4groPH1kbDMHJfMlhRhuvOcQE2o3R/bD2bUk7Pj8iLUC6QHV5OXw
MACCYRfWNhZ8hlAuCnxDqEhwLnAGbUJ1zv12b+z11t4wLRFBEOWXbOZzQDnJ
ywNwEye8YfXwSITY7QtbkU3FSOHAU5TSqobwtJP+DC4Tz9YgnkRxUxSspwTs
ZI4jjMubkLHFSJ9GDOzyqRCN7CCE5T0KDSDRmSRXzpa0sbb8O4mqci2lW36R
imLgrxMley6uwz+TSj568wgc76i8D0ORXt32o+7RFG3nHvpcwoFVid8b7uyO
5GQJXgXxp/1J+7YKlUBVEw40FYy5Qb4aABMInuEosSdYqzRHZOgGwmvJzHsU
qdWL2zd7yZkZ4HB23/NOMViGPx+YgCrJsjYj9sjemmZkZ4Eqp1ayAvn7yGs+
zfbxwg6GEaJbb0afkPNX9bYe5qQviYliLNizY7G1HegW0At8e8rlJw0nof9k
MgrX0VK++N1LyKtHncgvFDGwHVFGAJYiz178rt6DuOBaBiqLCknj7jOAn0VL
8J0b28MPtWG92grkBRsZ8YQhR5vOKDwjUk2kFZIpbHo20DKl3/hpQeFvW2v5
Is3htQvZbGhe4bYfyThUJc9zPLR1e5+VpgcDFhv9RXXH/UUo1njudGEc21Dy
FFcrgbP2BFYoqOeFUU09Js5r0i7ALBENJo0Odrk+Lh13HSKdg5FEyQ/HfWAd
uTWCW0RyIwB0GJZ+0hsWqswjhW4P+hTxeobhaCwohSBewQel2x8LKX8QoKU8
gqazc2AVpZNlHPgxkdoBXdJIgpfVCQpCsihiof0nTpPPDkg1qZDHqhIr5k1c
aUUDvJayYk12SeCHXGRhlANv6htbXOhGbBiuXfBm59+xayN5Xiy4N4sUbbk2
qAxS0HUtm7BIXzui1KzYsV9Utb+znxcqoNCEZwr2BQBBld2QlGwslPFCs2Cr
PpBTy4hSgsPjz9q+gnQmZXY5EmA9ex6pwDn99iVTghxdAzfrXTvhKmmveol4
8MUcZSJfedo6UuehND99WLyQhtuTtSG1d7hqYdi98nLa5wYWVuH+zppm2ImB
QhGWJU0MFcpYJiYgKY+OXUbwyKodPjjkrPtj2nqm006OMGwvWRKi5tYN0o37
R9lOH4hyacENdcZsANIIrrIomWfIdVqw1Sjfsfrwuicdk3e6UD8sXsaqqvAf
0W/7giMxatQAtgMLSmyEGx07AaxTiiXg7AO3SvrcfrT4zk4rFrSHabuS1/qJ
BDzvmkiMk0xoB1s8YDJNyDmrC7O6teY3cXIlWhJCeeo+vl9jZPEKCjpRoHWN
uOO2VkOeRUmOcUkqwWnPC01AokBjkVNGUaXeM6P+JtBIiG8xDEkTHnCiV+Sf
FkbRCEQGWmmGIp4MUXq++LD4Mz8rtoi1jiI0WZUn1wFdyWp9yFfDE7UUu0jI
m3wAourA7sAPAbyd7GA9Fe1DUW5IlEi2cVPK4F62HWlraUJnzFzkj3zUHgiH
nhMAiiBVmNvAOZa2IeBJWjl1PYGdjpsE2L/x7pE+c1YXIrUOzImGgJ3QzGe6
3FFOhDP1lBExzkIKRbgtJon+iaDclUM8cHjmkkyU9pKyOTFcBqU+7PP1G6lh
5b6FBH07Np26OCwloB4y0ebo0RbJpAelnajIJ1DklawwPovwZkKaDwyvX2S3
jF3aqw9Y0qQziGXZT5jJ41xPNSPEca/Gx96AvClL8idFadp+e1ySoRC85YZc
ituND1mZtA2oZ8m6i05Yp4YR2QqBd2SPLXBlWKcgyJ4Zpulik/ODHaMHrYNu
oKStCNpyCRstL2GP8rpEwnszQ/FRzxXkcWF50p6c2Zm4kmilSGU0ea9RTeAm
8pABnqoX+zlvGHUgWCc7yZnops6F+6emDA1smOF67kK0MYwWRvAwGLs+Rlsd
ehPrTGf66UOIf6E7NOsJixmVNlyp25cWtJNeJW/b4juFtgmwX6aez1ijR5AB
an+HnWvm2Y3uXo++ri42n2txicvAiTJLfoOw5LehUZmBYZznZHSu9TJmks4+
EvPRjVpZjtCp3DmXOfV5R5E2c4R1oQmb08Z8H40/diUZZcelgpji6kbOtORO
B2fWYHSmIIrbskdkYI2LEdoU9/PzVzjjV0717h0wMEuSTnCIahLoT7RVPbZZ
nWbnyJ8nMKXN3HIkRA+IwCUQxrJNI+3WFIUb5HZx72KYUz+KjmI39mWCK1kU
485prkrA9WcePDb7RMQgeoQAHst7TOrE4e/0nd6pVkcZxtKstBLVWXFWoK0R
U6y9NgOlDgSsic1+hm0n3QMmsYp6FCWuYIYYkrAT4WoQqemB8MyUUZJG4Egs
bZ0DF/Dnn3+4bOruRioV9iB8Z0/e3PQMIfbjcEnp336cUvMxXIYOppSB4kyl
ZGsUVurlbU2ArNg3I2kjoPXetNjlgamITU/6kHV6SrAVPnVDDxsyzu0UQiqn
J0UzYBCOymbpqU75K4sWE64cCGNFeEULeJo3QUgB03rapAMmlVul9FNzLLEd
MxCc1OwrJnCUZ0p8NVJ42nwU0kZx0G5NyBtJ67SdvKnXvekD13qtkIoZq/L+
FiFpCcKBJ+bd7jRpzg6nvbMXQ8PZ1NiFJT2ldsxEV475v6o3h1DzmPSocJkG
5W2cddfKmbnBIw7q3sg2Za1y/8n5zdCwsKkc0GsfmzgFxMCvi0FJgpgdq7iv
u4Q7xhuCMSQA9NWMnRwaAZFPk72zJe90oG/fyllWdPI+axQkStTJkyMfJUho
p0TgCV2HF4wozLC7mFK7WSN52gO0z2mjqhYEsPYDzr4yHBa0nR1FY5dyr078
Veb5V6leTvJJ7cOLeOz0qZcpbyFhZzAN8woo9KCwpGnAOx1vTtrtbMQBilxv
OnLzh0l1JDxIjvnymRCcxKfd0O4mBKNeXA9njwSXh93xnpVwTTq/MqvhKgyB
dfPpiXgVQAufG8CE6e96mF3bazlwWMTmjEWAjPohYV2uEXE3r1DpHSe1DFfQ
hOjFnP71j39OVHWVDvcm35DNgg9nDXyUR3MVemKHmqkkLqwpVyLfWs6D2dV2
VVz8RZaY9UyVSs+la6Hbej09hnah4LcjFBdruzOk6lpR9eMazaw+lbAG5fyz
Glcg2RAe3DikJp820uSAbHrZhe46PU53PeNAzGST3u1zso1W2oT1J+agNjRJ
akRDfNduwYMLSVDehzzBicyTpv6YUAtMBraYnU6ZlMWWDCl75nQ2xu8CcICI
EM1SDzSX5dkqpP952m4ji5mXyNT8JY7caRg85075sAPYJFbO3lZjmR8YYSZU
6ukukMVRqBMkKHkZZgiqBpPsNGjoUtilpjpiPN+mG2bI8TOfjnTYB5SBUMk1
BCViBpbq9FTHpKbwHg2Kq+KnLjZWxaNFyrhTDk5hUBBr3euSNSMNM5Vy5abu
W70q6Zx2hwuQY/fQV2EBUzQR8e+j6XK81B9ZYhqhYkcP6ADjlTXBcyP88QKq
BR6vCj6Ao5+yq4Cy8wPNEXALU2Lnq8xK2m7DricYDs2BniKYBmd8dKgD2Hit
WMdeBAS9BecYUjPRaxtT3ghZivk4VJHwI0JEY6utDaaZTU8XVBJEWUzOZbMZ
xD4hfiJNT9DHLZf2xHnNDu0Lwch1XskNmgmS5YdmvW2Tx1sUb7AVvd3zqwv4
7vVYN5XiGcqlBm01pojsh3qbN84EHDrG7nxANsvdWsD6lCSzQYsD4L6WCfb3
DBJk0u8K61lg/BEsy6DdP1HzuJ3sGA9MhuPK93ifrBSW5qa+S07SBHhkwpmN
90JlMTWmsPXL61/lQJ5MI8zOQ3Qzjs5nB656fp3IL8JY/nqRt9rCNRcXGKBT
Qr7l04a0TVuDYzao+xiK50aqQLSzO8oYJcrI6tchME2oP67MLyaNXbW2ws4P
9FxMEOfrTG7hRCYfbZNTaqXxWRzliUPnlkt+3RJ67et4hFftLihFTJJytYmn
RRInSiu953gNuzQwT+xqn66eLHLFAHcLGg2NW33V6FlcOFCNR9o2hY0jUd9Y
f7oCMiN90nnitRUhStNml0f92LEZT4wVgeRMZ0poiBDLZ0X7d3U968kRnbsq
syxZD2rjbTyZTseofKeXRpAsWx0CDB95LFlBpJxN1vY+wPxZcEiRs+kN6Nm8
OMIpRB+PIgVhoXKV8dYTdjydvSTJhVoyuPw+b6h4d/VooSzOnZNcnHLGZWvH
3RS06Ql/P9/7HFqRQ/jyKM+QCoAoD4MTafsVdVHjxosrJFUL2kp+Kh64k5IV
+fSAZfziIhhAOgkcPU7MaQKlwf6arJ7WIiZ+kVPWc0833svknXwRzcRLiOMe
JDkJhPn9aRgK4blwwtRICHyS5w0S0BqYLway/VxDc+ciTULSu4/rWum8BtWF
dxiQMvvR6stjYvmlgoqWNnCvH2hHSGpMeRxrIZuxV0TdudtMKQjx4bjrDkwZ
wGh1a1iJBJJ5m2lvPKtz9n0k3NGYWOj3CZsYE8kQXiLHuarXTHXIXvVAXjzj
TiblGBJLu89KQKFLGDFM2RT46NPFESkrkA/ZmT3FT+1lbu6t5UrLmcYCSdBq
fQlAtnR9NwUtCkHou3TZtKX9XNaAWBp65ChTk24jxAVP+SLhOhT0SIXDa0uE
SlVCXRq1srM24VBgIF41Glm8jEj6SuQoetm7wwXc0oV9g/fwyN1i3Ber++jy
dLxXdZ/FXrDxkowBREF4wfFxKRKtD4za5WiSHmw41zMkiTQPH4eOeScHSzUd
UAgEMSh4R+yqL+poKH7ib/ppUl2NdUJ2RkYpgucOhUJ/h3DkwxbcKh7rC4MT
Mp+nz1bNB6cTHd+q9u2l6Sluwj1Ezyy1DE1NEtgX0TFLJ4l0OMEqOU3g14dp
j0ve+S+tiVZfPjIHityIIcdTcZyWzyMiV+NWDx1Emn317Bko3Ra8JrK9M4c7
UdiJqUfqzeLXEkk2nB1NTC8lGOSskWnuvOspeymbnHvJjwyGxAndsveensve
x6LnFatQcJAjaHU6cy+DnOA8Af2Cx89IhxOHc56VMeHiY2d3GWzRKnrwl4Tf
aAdeDWh/7YqvDVl9g7pVjfcw4PceRJ/hjjU0D5H5p5KrZaZd+rop04O8uht9
+dFEdspLScMJBaBDkActE0UYHY9f9RAyv2M6p+nYRQ80K7w8NTan/HD97GX+
0hbNq172jt/5wKcgQkmA2yh6SmVro+3IOLzV47CNvKnqnt3LU3ZGG6HmISDg
Ed4rthuEVq/Jofc885+PpM4vaerh/TvzN7TK64I622+Z5fZ72G44oSZdK2Bq
+S2vXvrBDDIFCCxuhjQ4skuVtnkciAin3VM6TTG29i61Ap55dWLinCocq1F9
WBTX6Br7mdy16xsBAS8NzeIvFDQDj2uC0tlwJgQeVvLeRRFeCswFSAT2LGtu
+BiiC9aQ+MS58T3f2cZbU3zv2sbxLL4kTE6o5FvDL1+6tVMl1aO3ds+GRIqQ
9aWHNhm8Em7kKtGBxlK/II/Ga0n5ubFGP31N6tmz43ff5xhPW0tyfuRW6Wkv
XWyKThevuTGSFD7tY8xDpnW4lTQnSl2WSbm9Iyx45HcfSdcdaiyEbbmWOevw
CbQvlBPsbNnwwRkkw6jVVu/1DkolL6TCQf5MJxCaNNDYN/ILJbzW4pNv0Nck
BAZHqJTG9MEHUMr57Mdn7yP9u5KHjXUu9rRCMzEYjfu/aphsYeNbAAA=

-->

</rfc>
