<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.24 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-benecke-cfbl-address-header-06" category="exp">
  <front>
    <title abbrev="CFBL Address Header">Complaint Feedback Loop Address Header</title>

    <author initials="J." surname="Benecke" fullname="Jan-Philipp Benecke">
      <organization>CleverReach GmbH &amp; Co. KG</organization>
      <address>
        <postal>
          <street>Schafjueckenweg 2</street>
          <city>Rastede</city>
          <code>26180</code>
          <country>Germany</country>
        </postal>
        <phone>+49 4402 97390-16</phone>
        <email>jpb@cleverreach.com</email>
      </address>
    </author>

    <date year="2022" month="March" day="04"/>

    <area>art</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes a method that allows an email sender to specify a complaint feedback loop (FBL) address as an email header.
Also it defines the rules for processing and forwarding such a complaint.
The motivation for this arises out of the absence of a standardized and automated way to provide mailbox providers with an address for a complaint feedback loop.
Currently, providing and maintaining such an address is a manual and time-consuming process for email senders and providers.</t>

<t>It is unclear, at the time of publication, whether the function provided by this document has widespread demand, and whether the
mechanism offered will be adopted and found to be useful. Therefore, this is being published as an Experiment, looking for a constituency
of implementers and deployers, and for feedback on the operational utility. The document is produced through the Independent RFC stream
and was not subject to the IETF's approval process.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction-and-motivation" title="Introduction and Motivation">
<t>For a long time there has been a way for a mailbox provider to forward manual complaints back to the email sender.
The mailbox provider provides what is called a feedback loop <xref target="RFC6449"/>. 
This feedback loop is used to give operators of, e.g. broadcast marketing lists, feedback on resulting complaints from their marketing mailings.
These complaints are based on manual user interaction, e.g. IMAP movement to "junk" or by clicking on a "This is spam" button.</t>

<t>As described in <xref target="RFC6449"/> the registration for such a feedback loop needs to be done manually by a human at any mailbox provider who provides a FBL.
This can be quite time-consuming if there are new feedback loops rising up, or the email sender wants to add new IP addresses or DKIM domains.
In addition, a manual process is not well suited and/or feasible for smaller mailbox providers.</t>

<t>Because of the manual process involved, the email sender has to go through all providers again, delete his existing subscriptions and register with their new complaint address.</t>

<t>This document addresses this issue with a new email header.
It extends the recommendations for the complaint feedback loop described in <xref target="RFC6449"/> with an automated way to submit the necessary information to mailbox providers.</t>

<t>Mail senders can add this header, willing mailbox providers can use it to forward the generated report to the specified complaint address.
The email sender only needs to add an email header and does not need to manually register with each feedback loop provider.
The elimination of a manual registration and verification process would be another advantage for the mailbox providers.</t>

<t>A new email header has been chosen in favour of a new DNS record to easily distinguish between
multiple broadcast marketing list operators / email senders without requiring user or administrator intervention.
For example, if a company uses multiple mailing systems, each system can set this header itself without requiring any change by the users or administrators within their DNS.
No additional DNS query is required on the mailbox provider side to obtain the complaint address.</t>

<t>This document has been prepared in compliance with the GDPR and other data protection laws to address the resulting issues
when providing an automated address for a complaint feedback loop, as the email may contain personal data.</t>

<t>Nevertheless, the described mechanism bellow potentially permits a kind of man-in-the-middle attack between the domain owner and the recipient.
A bad actor can generate forged reports to be "from" a domain name the bad actor is attacking and send this reports to the complaint FBL address.
These fake messages can result in a number of actions, such as blocking of accounts or deactivating recipient addresses.
This potential harm and others are described with potential countermeasures in <xref target="security-considerations"></xref>.</t>

<t>In summary, this document has the following objectives:</t>

<t><list style="symbols">
  <t>Allow email senders to signal that a complaint address exists without requiring manual registration with all providers.</t>
  <t>Allow mailbox providers to obtain a complaint address without developing their own manual registration process.</t>
  <t>Be able to provide a complaint address to smaller mailbox providers who do not have a feedback loop in place</t>
  <t>Provide a GDPR-compliant option for a complaint feedback loop.</t>
</list></t>

<section anchor="scope-of-this-experiment" title="Scope of this Experiment">
<t>The CFBL-Address header and the CFBL-Feedback-ID header are an experiment. 
Participation in this experiment consists of adding the CFBL-Address-Header on email sender side or by using the CFBl-Address-Header to send FBL reports to the provided address on mailbox provider side.
Feedback on the results of this experiment can be emailed to the author or raised as an issue at https://github.com/jpbede/rfc-cfbl-address-header/.</t>

<t>The goal of this experiment is to answer the following questions based on real-world deployments:</t>

<t><list style="symbols">
  <t>Is there interest among email sender and mailbox providers?</t>
  <t>If the mailbox provider adds this capability, will it be used by the senders?</t>
  <t>If the email sender adds this capability, will it be used by the mailbox provider?</t>
  <t>Does the presence of the CFBL-Address/CFBL-Feedback-ID field introduce additional security issues?</t>
  <t>What additional security measures/checks need to be performed at the mailbox provider before a complaint report is sent?</t>
  <t>What additional security measures/checks need to be performed at the email sender after a complaint report is received?</t>
</list></t>

<t>This experiment is considered successful if the CFBL-Address header has been implemented by multiple independent parties (email sender and mailbox provider)
and these parties successfully use the address specified in the header to exchange feedback loop reports.</t>

<t>If this experiment is successful and these headers prove to be valuable and popular, it may be taken to the IETF for
further discussion and revision. One possible outcome could be that a working group creates a specification for the standard track.</t>

</section>
<section anchor="difference-to-one-click-unsubscribe" title="Difference to One-Click-Unsubscribe">
<t>For good reasons, the One-Click-Unsubscribe <xref target="RFC8058"/> signaling already exists, which may have several interests in common with this document.
However, this header requires the List-Unsubscribe header, whose purpose is to provide the link to unsubscribe from a list.
For this reason, this header is only used by operators of broadcast marketing lists or mailing lists, not in normal email traffic.</t>

<t>The main interest of this document now is to provide an automated way to signal mailbox providers an address for a complaint feedback loop.
It is the obligation of the email sender to decide for themselves what action to take after receiving a notification; this is not the subject of this document.</t>

</section>
</section>
<section anchor="definitions" title="Definitions">
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this 
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

<t>The keyword "CFBL" in this document is the abbreviation for "complaint feedback loop" and will hereafter be used.</t>

<t>The keyword "MBP" in this document is the abbreviation for "mailbox provider", it is the party who receives an email, and will be used hereafter.</t>

<t>The keyword "email sender" in this document is used to describe the party who sends an email, this can be an MBP, a broadcast marketing list operator or any other email sending party. It will be used hereafter.</t>

</section>
<section anchor="requirements" title="Requirements">

<section anchor="received-email" title="Received email">
<t>This section describes the requirements that a received email, i.e. the email that is sent from the email sender to the MBP and about which a report is to be sent later, must meet.</t>

<section anchor="strict" title="Strict">
<t>If the domain in the <xref target="RFC5322"/>.From and the domain in the CFBL-Address header are identical, this domain MUST be covered by a valid
<xref target="DKIM"/> signature. In this case, the DKIM "d=" parameter and the <xref target="RFC5322"/>.From field have identical DNS domains.
This signature MUST meet the requirements described in <xref target="received-email-dkim-signature"></xref>.</t>

<t>The following example meets this case:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

</section>
<section anchor="relaxed" title="Relaxed">
<t>If the domain in CFBL-Address is a child domain of the <xref target="RFC5322"/>.From, the <xref target="RFC5322"/>.From domain MUST be covered by a valid <xref target="DKIM"/> signature. 
In this case, the DKIM "d=" parameter and the <xref target="RFC5322"/>.From domain have a identical (Example 1) or parent (Example 2) DNS domains.
This signature MUST meet the requirements described in <xref target="received-email-dkim-signature"></xref>.</t>

<t>Example 1:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@mailer.example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com;
      h=Content-Type:Subject:From:To:Message-ID:
      CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Example 2:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@mailer.example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@mailer.example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com;
      h=Content-Type:Subject:From:To:Message-ID:
      CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

</section>
<section anchor="complex" title="Complex">
<t>If the domain in <xref target="RFC5322"/>.From of differs from the domain in the CFBL-Address header,
the domain of the CFBL-Address header MUST be covered by an additional valid <xref target="DKIM"/> signature.
Both signatures MUST meet the requirements described in <xref target="received-email-dkim-signature"></xref>.</t>

<t>This double DKIM signature ensures that both the domain owner of the From: domain and the domain owner of the CFBL-Address: domain
agree to receive the complaint reports on the address from the CFBL-Address: header.</t>

<t>The following example meets this case:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@super-saas-mailer.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@super-saas-mailer.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;
DKIM-Signature: v=1; a=rsa-sha256; d=super-saas-mailer.com; s=system;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

</section>
<section anchor="received-email-dkim-signature" title="DKIM signature">
<t>The CFBL-Address header MUST be included in the "h=" tag of the aforementioned valid DKIM-Signature.
When the CFBL-Feedback-ID header is used, it MUST also be included in the "h=" tag of the aforementioned valid DKIM signature.</t>

<t>If the domain has neither the required coverage by a valid DKIM signature nor the required header coverage by the "h=" tag, the MBP SHALL NOT send a report email.</t>

</section>
</section>
<section anchor="report-email" title="Report email">
<t>The report email (sent by MBP to email sender) MUST have a valid <xref target="DKIM"/> signature. 
The aforementioned valid DKIM signature MUST cover the From: header <xref target="MAIL"/> domain, from which the report is sent to the email sender.</t>

<t>If the message does not have the required valid <xref target="DKIM"/> signature, the email sender SHALL NOT process this complaint report.</t>

<t>As part of this experiment, it is recommended to determine what plausibility and security checks are useful and achievable.</t>

</section>
</section>
<section anchor="implementation" title="Implementation">

<section anchor="mail-senders" title="Email senders">
<t>An email sender who wishes to receive complaints about their emails MUST include a CFBL-Address header in their messages.</t>

<t>The receiving complaint FBL address specified in the messages MUST accept <xref target="ARF"/> compatible reports by default.
The email sender can OPTIONALLY request a <xref target="XARF"/> compatible report if they want one, as described in <xref target="xarf-report"></xref>.
The MBP MAY send a <xref target="XARF"/> compatible report if it is technically possible for them to do so, otherwise a <xref target="ARF"/> compatible report will be sent.</t>

<t>It is strongly RECOMMENDED that these reports be processed automatically. Each sender must decide for themselves what action to take after receiving a report.</t>

<t>The email sender MUST take action to address the described requirements in <xref target="requirements"></xref>.</t>

</section>
<section anchor="mailbox-provider" title="Mailbox provider">
<t>If the MBP wants to process the complaints and forward it, they MUST query the CFBL-Address header and forward the report to the complaint FBL address.</t>

<t>By default, an <xref target="ARF"/> compatible report MUST be sent.
Per <xref target="RFC6449"/> Section 3.2, a complaint report MUST be sent when a manual action has been taken e.g., when a receiver marks a mail as spam, 
by clicking the "This is spam"-button in any web portal or by moving a mail to junk folder, this also includes <xref target="IMAP"/> and <xref target="POP3"/> movements. 
The MBP SHALL NOT send any report when an automatic decisions has been made e.g., spam filtering.</t>

<t>The MBP MUST send a <xref target="XARF"/> compatible report when the email sender requests it as described in <xref target="xarf-report"></xref>.
If it is not possible for the MBP to send a <xref target="XARF"/> compatible report as requested, a <xref target="ARF"/> compatible report MUST be sent.</t>

<t>The MBP MUST validate and take action to address the described requirements in <xref target="requirements"></xref>.</t>

</section>
</section>
<section anchor="complaint-report" title="Complaint report">
<t>The complaint report MAY be a <xref target="XARF"/> report if the email sender requests it, and it is technically possible for the MBP to do so, otherwise the complaint report MUST be a <xref target="ARF"/> report.</t>

<t>The report MUST contain at least the Message-ID <xref target="MAIL"/>. If present, the header "CFBL-Feedback-ID" of the complaining email MUST be added additionally.</t>

<t>The MBP MAY omit or redact, as described in <xref target="RFC6590"/>, all further headers and/or body to comply with any data-regulation laws.</t>

<t>It is highly RECOMMENDED that, if used, the CFBL-Feedback-ID includes a hard to forge component such as an <xref target="HMAC"/> using a secret
key, instead of a plain-text string.</t>

<section anchor="xarf-report" title="XARF compatible report">
<t>A email sender wishing to receive a <xref target="XARF"/> compliant report MUST append "report=xarf" to the <xref target="cfbl-address-header"></xref>.
The resulting header would look like the following:</t>

<figure><artwork><![CDATA[
CFBL-Address: fbl@example.com; report=xarf
]]></artwork></figure>

</section>
</section>
<section anchor="header-syntax" title="Header Syntax">

<section anchor="cfbl-address-header" title="CFBL-Address">
<t>The following ABNF imports fields, WSP, CRLF and addr-spec from <xref target="MAIL"/>.</t>

<figure><artwork type="abnf"><![CDATA[
fields /= cfbl-address

cfbl-address = "CFBL-Address:" 0*1WSP addr-spec
               [";" 0*1WSP report-format] CRLF

report-format = "report=" ("arf" / "xarf")
]]></artwork></figure>

</section>
<section anchor="cfbl-feedback-id" title="CFBL-Feedback-ID">
<t>The following ABNF imports fields, WSP, CRLF and atext from <xref target="MAIL"/>.</t>

<figure><artwork type="abnf"><![CDATA[
fields /= cfbl-feedback-id

cfbl-feedback-id = "CFBL-Feedback-ID:" 0*1WSP fid CRLF

fid = 1*(atext / ":")
]]></artwork></figure>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">
<t>This section discusses possible security issues, and their possible solutions, of a complaint FBL address header.</t>

<section anchor="attacks-on-the-fbl-address" title="Attacks on the FBL address">
<t>Like any other email address, a complaint FBL address can be an attack vector for malicious emails.
For example, complaint FBL addresses can be flooded with spam.
This is an existing problem with any existing email address and is not created by this document.</t>

<t>The email sender must take appropriate measures.
One possible countermeasure would be a rate limit for the delivering IP.
However, this should be done with caution; normal FBL email traffic must not be affected.</t>

</section>
<section anchor="automatic-suspension-of-an-account" title="Automatic suspension of an account">
<t>Sending an FBL report against a mailbox can cause the account holder to be unreachable if an automatic account suspension occurs too quickly.
An example: someone sends an invitation to his friends. For some reason, someone marks this mail as spam.
Now, if there is too fast automatic account suspension, the sender's account will be blocked and the sender will not be able to access his mails.</t>

<t>MBPs and email senders must take appropriate measures to prevent this.
MBPs and email senders therefore have, mostly proprietary, ways to assess the trustworthiness of an account.
For example, MBPs and email senders may take into account the age of the account and/or any previous account suspension before suspending an account.</t>

</section>
<section anchor="enumeration-attacks-provoking-unsubscription" title="Enumeration attacks / provoking unsubscription">
<t>A malicious person may send a series of spoofed ARF messages to known complaint FBL addresses and attempt to guess a Message-ID/CFBL-Feedback-ID or any other identifiers.
The malicious person may attempt to mass unsubscribe/suspend if such an automated system is in place.
This is also an existing problem with the current FBL implementation and/or One-Click Unsubscription <xref target="RFC8058"/>.</t>

<t>The sender of the received email must take appropriate measures.
As a countermeasure, it is recommended that the CFBL-Feedback-ID, if used, use a hard-to-forge component such as a <xref target="HMAC"/> with a secret
key instead of a plaintext string to make an enumeration attack impossible.</t>

<t>If it is impossible for the email sender to use a component that is difficult to fake, they should take steps to avoid enumeration attacks.</t>

</section>
<section anchor="gdpr-and-other-data-regulation-laws" title="GDPR and other data-regulation laws">
<t>The provision of such a header itself does not pose a data protection issue.
The resulting ARF report sent by the MBP to the email sender may violate a data protection law because it may contain personal data.</t>

<t>This document already addresses some parts of this problem and describes a privacy-safe way to send a FBL report.
As described in <xref target="complaint-report"></xref>, the MBP can omit the entire body and/or header and send only the required fields.
As described in <xref target="RFC6590"/>, the MBP can also redact the data in question.
Nevertheless, each MBP must consider for itself whether this implementation is acceptable and complies with existing privacy laws.</t>

<t>As described in <xref target="complaint-report"></xref>, it is also strongly RECOMMENDED that the Message-ID and, if used, the CFBL-Feedback-ID.
contain a component that is difficult to forge, such as a <xref target="HMAC"/> that uses a secret key, rather than a plaintext string.
See <xref target="hmac-example"></xref> for an example.</t>

<t>Using HMAC, or any other hard to forge component, ensures that only the email sender has knowledge about the data.</t>

</section>
<section anchor="abusing-for-validity-and-existence-queries" title="Abusing for Validity and Existence Queries">
<t>This mechanism could be abused to determine the validity and existence of an email address, which exhibits another potential privacy issue.
Now, if the MBP has an automatic process to generate a complaint report for a received email, it may not be doing the mailbox owner any favors.
As the MBP now generates an automatic complaint report for the received email, the MBP now proves to the email sender that this mailbox exists for sure, because it is based on a manual action of the mailbox owner.</t>

<t>The receiving MBP must take appropriate measures. One possible countermeasure could be, for example, pre-existing reputation data, usually proprietary data.
Using this data, the MBP can assess the trustworthiness of an email sender and decide whether to send a complaint report based on this information.</t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<section anchor="cfbl-address" title="CFBL-Address">
<t>The IANA is requested to register a new header field, per <xref target="RFC3864"/>, into the "Provisional Message Header Field Names" registry:</t>

<figure><artwork type="abnf"><![CDATA[
Header field name: CFBL-Address
  
Applicable protocol: mail

Status: provisional

Author/Change controller: Jan-Philipp Benecke <jpb@cleverreach.com>

Specification document: this document
]]></artwork></figure>

</section>
<section anchor="cfbl-feedback-id-1" title="CFBL-Feedback-ID">
<t>The IANA is requested to register a new header field, per <xref target="RFC3864"/>, into the "Provisional Message Header Field Names" registry:</t>

<figure><artwork type="abnf"><![CDATA[
Header field name: CFBL-Feedback-ID

Applicable protocol: mail

Status: provisional

Author/Change controller: Jan-Philipp Benecke <jpb@cleverreach.com>

Specification document: this document
]]></artwork></figure>

</section>
</section>
<section anchor="examples" title="Examples">
<t>For simplicity the DKIM header has been shortened, and some tags have been omitted.</t>

<section anchor="simple" title="Simple">
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 111:222:333:4444
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-IP: 192.0.2.1

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822; charset=UTF-8
Content-Transfer-Encoding: 7bit

Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 111:222:333:4444
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
<section anchor="gdpr-safe-report" title="GDPR safe report">
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 111:222:333:4444
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report contains only the CFBL-Feedback-ID:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-IP: 2001:DB8::25

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822-headers; charset=UTF-8
Content-Transfer-Encoding: 7bit

CFBL-Feedback-ID: 111:222:333:4444
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
<section anchor="hmac-example" title="GDPR safe report with HMAC">
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 3789e1ae1938aa2f0dfdfa48b20d8f8bc6c21ac34fc5023d
       63f9e64a43dfedc0
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report contains only the CFBL-Feedback-ID:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-IP: 2001:DB8::25

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822-headers; charset=UTF-8
Content-Transfer-Encoding: 7bit

CFBL-Feedback-ID: 3789e1ae1938aa2f0dfdfa48b20d8f8bc6c21ac34fc5023d
       63f9e64a43dfedc0
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
</section>
<section anchor="acknowledgments" title="Acknowledgments">
<t>Technical and editorial reviews were provided by the colleagues at CleverReach, 
the colleagues at Certified Senders Alliance and eco.de, Levent Ulucan (Inxmail), 
Arne Allisat and Tobias Herkula (1&amp;1 Mail &amp; Media) and Sven Krohlas (BFK Edv-consulting).</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

<reference anchor="XARF" >
  <front>
    <title>eXtended Abuse Reporting Format</title>
    <author >
      <organization>Abusix</organization>
    </author>
    <date />
  </front>
  <seriesInfo name="Web" value="https://github.com/abusix/xarf"/>
</reference>




<reference anchor='RFC6449' target='https://www.rfc-editor.org/info/rfc6449'>
<front>
<title>Complaint Feedback Loop Operational Recommendations</title>
<author fullname='J. Falk' initials='J.' role='editor' surname='Falk'><organization/></author>
<date month='November' year='2011'/>
<abstract><t>Complaint Feedback Loops similar to those described herein have existed for more than a decade, resulting in many de facto standards and best practices.  This document is an attempt to codify, and thus clarify, the ways that both providers and consumers of these feedback mechanisms intend to use the feedback, describing some already common industry practices.</t><t>This document is the result of cooperative efforts within the Messaging Anti-Abuse Working Group, a trade organization separate from the IETF.  The original MAAWG document upon which this document is based was published in April, 2010.  This document does not represent the consensus of the IETF; rather it is being published as an Informational RFC to make it widely available to the Internet community and simplify reference to this material from IETF work. This document is not an Internet Standards Track specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='6449'/>
<seriesInfo name='DOI' value='10.17487/RFC6449'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC5322' target='https://www.rfc-editor.org/info/rfc5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference anchor='DKIM' target='https://www.rfc-editor.org/info/rfc6376'>
<front>
<title>DomainKeys Identified Mail (DKIM) Signatures</title>
<author fullname='D. Crocker' initials='D.' role='editor' surname='Crocker'><organization/></author>
<author fullname='T. Hansen' initials='T.' role='editor' surname='Hansen'><organization/></author>
<author fullname='M. Kucherawy' initials='M.' role='editor' surname='Kucherawy'><organization/></author>
<date month='September' year='2011'/>
<abstract><t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message.  This can be an author's organization, an operational relay, or one of their agents.  DKIM separates the question of the identity of the Signer of the message from the purported author of the message.  Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key.  Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t><t>This memo obsoletes RFC 4871 and RFC 5672.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='76'/>
<seriesInfo name='RFC' value='6376'/>
<seriesInfo name='DOI' value='10.17487/RFC6376'/>
</reference>



<reference anchor='MAIL' target='https://www.rfc-editor.org/info/rfc5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference anchor='ARF' target='https://www.rfc-editor.org/info/rfc5965'>
<front>
<title>An Extensible Format for Email Feedback Reports</title>
<author fullname='Y. Shafranovich' initials='Y.' surname='Shafranovich'><organization/></author>
<author fullname='J. Levine' initials='J.' surname='Levine'><organization/></author>
<author fullname='M. Kucherawy' initials='M.' surname='Kucherawy'><organization/></author>
<date month='August' year='2010'/>
<abstract><t>This document defines an extensible format and MIME type that may be used by mail operators to report feedback about received email to other parties.  This format is intended as a machine-readable replacement for various existing report formats currently used in Internet email.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5965'/>
<seriesInfo name='DOI' value='10.17487/RFC5965'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC8058' target='https://www.rfc-editor.org/info/rfc8058'>
<front>
<title>Signaling One-Click Functionality for List Email Headers</title>
<author fullname='J. Levine' initials='J.' surname='Levine'><organization/></author>
<author fullname='T. Herkula' initials='T.' surname='Herkula'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes a method for signaling a one-click function for the List-Unsubscribe email header field.  The need for this arises out of the actuality that mail software sometimes fetches URLs in mail header fields, and thereby accidentally triggers unsubscriptions in the case of the List-Unsubscribe header field.</t></abstract>
</front>
<seriesInfo name='RFC' value='8058'/>
<seriesInfo name='DOI' value='10.17487/RFC8058'/>
</reference>



<reference anchor='IMAP' target='https://www.rfc-editor.org/info/rfc9051'>
<front>
<title>Internet Message Access Protocol (IMAP) - Version 4rev2</title>
<author fullname='A. Melnikov' initials='A.' role='editor' surname='Melnikov'><organization/></author>
<author fullname='B. Leiba' initials='B.' role='editor' surname='Leiba'><organization/></author>
<date month='August' year='2021'/>
<abstract><t>The Internet Message Access Protocol Version 4rev2 (IMAP4rev2) allows a client to access and manipulate electronic mail messages on a server.  IMAP4rev2 permits manipulation of mailboxes (remote message folders) in a way that is functionally equivalent to local folders.  IMAP4rev2 also provides the capability for an offline client to resynchronize with the server. </t><t>IMAP4rev2 includes operations for creating, deleting, and renaming mailboxes; checking for new messages; removing messages permanently; setting and clearing flags; parsing per RFCs 5322, 2045, and 2231; searching; and selective fetching of message attributes, texts, and portions thereof.  Messages in IMAP4rev2 are accessed by the use of numbers. These numbers are either message sequence numbers or unique identifiers. </t><t>IMAP4rev2 does not specify a means of posting mail; this function is handled by a mail submission protocol such as the one specified in RFC 6409.</t></abstract>
</front>
<seriesInfo name='RFC' value='9051'/>
<seriesInfo name='DOI' value='10.17487/RFC9051'/>
</reference>



<reference anchor='POP3' target='https://www.rfc-editor.org/info/rfc1939'>
<front>
<title>Post Office Protocol - Version 3</title>
<author fullname='J. Myers' initials='J.' surname='Myers'><organization/></author>
<author fullname='M. Rose' initials='M.' surname='Rose'><organization/></author>
<date month='May' year='1996'/>
<abstract><t>The Post Office Protocol - Version 3 (POP3) is intended to permit a workstation to dynamically access a maildrop on a server host in a useful fashion.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='53'/>
<seriesInfo name='RFC' value='1939'/>
<seriesInfo name='DOI' value='10.17487/RFC1939'/>
</reference>



<reference anchor='RFC6590' target='https://www.rfc-editor.org/info/rfc6590'>
<front>
<title>Redaction of Potentially Sensitive Data from Mail Abuse Reports</title>
<author fullname='J. Falk' initials='J.' role='editor' surname='Falk'><organization/></author>
<author fullname='M. Kucherawy' initials='M.' role='editor' surname='Kucherawy'><organization/></author>
<date month='April' year='2012'/>
<abstract><t>Email messages often contain information that might be considered private or sensitive, per either regulation or social norms.  When such a message becomes the subject of a report intended to be shared with other entities, the report generator may wish to redact or elide the sensitive portions of the message.  This memo suggests one method for doing so effectively.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6590'/>
<seriesInfo name='DOI' value='10.17487/RFC6590'/>
</reference>



<reference anchor='HMAC' target='https://www.rfc-editor.org/info/rfc2104'>
<front>
<title>HMAC: Keyed-Hashing for Message Authentication</title>
<author fullname='H. Krawczyk' initials='H.' surname='Krawczyk'><organization/></author>
<author fullname='M. Bellare' initials='M.' surname='Bellare'><organization/></author>
<author fullname='R. Canetti' initials='R.' surname='Canetti'><organization/></author>
<date month='February' year='1997'/>
<abstract><t>This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key.  The cryptographic strength of HMAC depends on the properties of the underlying hash function.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind</t></abstract>
</front>
<seriesInfo name='RFC' value='2104'/>
<seriesInfo name='DOI' value='10.17487/RFC2104'/>
</reference>



<reference anchor='RFC3864' target='https://www.rfc-editor.org/info/rfc3864'>
<front>
<title>Registration Procedures for Message Header Fields</title>
<author fullname='G. Klyne' initials='G.' surname='Klyne'><organization/></author>
<author fullname='M. Nottingham' initials='M.' surname='Nottingham'><organization/></author>
<author fullname='J. Mogul' initials='J.' surname='Mogul'><organization/></author>
<date month='September' year='2004'/>
<abstract><t>This specification defines registration procedures for the message header fields used by Internet mail, HTTP, Netnews and other applications.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='90'/>
<seriesInfo name='RFC' value='3864'/>
<seriesInfo name='DOI' value='10.17487/RFC3864'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source:
H4sIAPLnIWIAA+1de3PbxrX/H59iLz3Ta+USFEk9ItFVE1qyYjWWrUpy006m
k1kCCxIRCLBYQBLrcT97z2N38SBkOYnbprfOtI1ILnbPnufvnD2L+r7vFXGR
qInoHWfLVSLjtBCnSoUzGdyIV1m2EtMwzJXW4qWSocp7npzNcnWLD5w+f7Xx
a5gFqVzCfGEuo8KfqVQFN8oPolniSx7rL2isP9z3AlmoeZavJ0LdrzwvXuUT
UeSlLsbD4eFw7MlcyYmQeeHdZfnNPM/K1US8VgV+Et/B/8TpXHyDX3s3ag3f
hhNxlhYqT1XhnyAFnqcLmYY/yCRLgaq10p5ewoQ//LXMCqUnIs28VTwR3xdZ
0Bc6y4tcRRr+Wi/xj794niyLRZZPPCHiFMb/fiCe86bgG97q72XqXyziJF6t
ar9l+Vym8d9kEWfpRBwn6lbll0oGC/HNcvZS/EYcZwPx7TcwUsOaqpiIq2Ah
ox9LfD69U3Mxht+CuADuXEpdqBBnDbIQVhzvjw6G9KlMC2TfNypfynQNX60W
tNH/2z0Uu7vDsTj8cudw6I/24Se1lHEyET+uZl8HRE6O5AyCbOl5aQYTFPGt
wo3+aXp5iv8WwiiH+lOh0lCFYjortRKXagWMQt6f0mM0tOIT/gO7n9Do+J6+
CUHSExHJRCv6rFUeKx2nUWaf+E7NJmJRFCs92d6ex8WinCFp25Im2b6XeQQa
Ag84Qj3f94WcAftkAIK+XsRagP6VSwVKHCod5PFMaSHFUgFpoSgWshAySbI7
+DJldgAhsLFcFJnQKxXE0RrGB84UImsKCZrCU9D4LWHUWMjaLKzSA2+a6EzE
uHoUp7B2sVAiLxP4C+gWqzwL4ElkHOgkfnUn8xA/6hL0orbwAHajxDKDjZIC
0eMFblDmsYbpsrIQWUTzAwdUGij8KAVpO076N5AWLgJiyYBh8OlOrnGbQMRt
HMLkQPcsu7efcy3ugOm4JbtBXPNBZgy84xIUKC2Sdd/MYfe1xNHw32pj1Zwx
yUOmpUxobBEvwTtkqS6XONxwiJauy0fTYEfqwPPOCpyrTEGTZd4XIFnkBU6H
jFiVsyQOiHV9cbcA+aOMYUAETxBDzVyhmK2ZsU5zFhJZAfqzAvsIQZRAbtgn
AmozeUsF5prGegnrRSpHBsdJImYgkDBbFYb9EVhoiGyH78F0ojIZCBAt+JYs
V31eGf4zU7R7pFov8FHSrRf3KzATJKqPPCdvZ4WSarDNEgS/9mC/MchI4UDL
qlCtkmwNn/pW1Srxwe6RFRlMThwCUZQFuK9iTbRVnADCgE1hGSg0HnCz8wU9
eQYiWaFcYMzl6TE5MLn0iENAeZoVIPfZjyoocOf0xIvr0/8FylbIdljPyHnA
NryMwzBRnvcEnTctSCLC+c6dCXintHPw43MWM0pCkbRmSsFoUnBmT1u3kQxj
bVb5nFrD48gUQ2hd6YwRtucyf4CSoD8BHgXgU1BmLW/x7t3/AHP2d3cP378f
CHZPzRGowFqReszBoxmJZCDCLOoLNZgPxCzPZBiA+wc68htFThd0pAC51uUJ
tlUm9GNtX1GeLXFTcV57GLcD/9a0OfDltfEQbYEXSBDMaNgE9OUQ+ECvZMDW
RGSdnU8vwD3dks4h/b0fy/SmB24f7SkA2yNlRSGK3rVRcr2Sy56YlUWRpSD5
qXZOOoQlGvxix6nmMTp35wCNl2wyMYVP2lhYCLHPUJ6skRIpFuUS3Q84/nS9
Kcu7RVbJUwrw7wMWVAAPwYR/LeNCtZ1UHBndQ4al6q5JkBbgoXFYueqLLN/Q
KlBTZDYQDD6RHj+7sO4RHXsuTr49O4etoBsFMZ2R84yZ+c53WkcZs7ndKXA9
Goklt7NN5i51PEsUc26JOppvOn2Qw3MVSIzqJpy0F0hvs+RWhf3NjaDpoepm
zjnAIrV4Iuewgz4IOVHAROSqugeBcliYoeRXuCt2WCxsZA9GIdZaZE4VfgyP
Bu1IX/HOeFNdKhPLaIZmhIa4oe4RzZjgrGABmCaUTEpkJPYQBHhYY130bAdc
2Osy5vAE2BAolflaOCCDzjjrlMt5PfwFHEN5i7yXPgUca9PNUI7DUaZxUXd9
SMIcAGpO5OWE4qzjY/QTw/cdHL9uiz5Lwb6c5SFhLSjEQShTrJ44krdpTLMp
bULFTT7brZi1kxgsj7lFMMcoacND4IoAamETHPidCt9lZRJSYAZaMHzL8BZs
UM6VE3cX/6cb2lMFm2CRASdQByJ5m5U5U4XjT15fkVLltGG0QdhuyGpfQnCH
54s7mMJbosOGqP2gi6+Fg+0WGEKuIQLMFTionJwN+mmMfSEwinmSGcd9C0YS
o8fFAKruJUKFPjoxxnboF0u0HkeQCRGQA4GIlhBpSD78iTRLq6KuiKBlWiVR
B1U4N6Ik4DTBLMJAud4glHcUp8bugYcD73Xm/B5IGtn611Kh5WizAMepLukJ
jQAX2J/NEIe2DPohP+KEC7hvJXM2cXosloivrWMS35xcXJK2sTaB65C4dKEY
tiTyzloFQV52MzY+k3vSHiDJtAGba37jo/B3HzFi5ZKX4GsgQtF2QW00MQ0p
g22+xlwPhkIaotmNV16sQrEzhZmRWME+QF/ISmEi8FwYGCGah6jjYHd+nPow
h8+gDSJrgSQZrebZKXSJ7C41fsA42ngVK0xtpoAyYJcBaiiqk3VJuOG5c0w2
pvcQxvSABjMt5tw0YzUJJhVEhs1A0E5YQ2tzNbUAixd1/wbOMpI3oEvooOeK
XSiLDfUAjLtczhQbOskZiwSER0BrkszgHfyRknLS8VDhUISv8JtjQBWwDNZw
LAcVzJeVZjEiq2RFClgNpnVAQuBjSpgPqfz+L0+faBWUOWB5AixoDRzZtjBn
AtMtl+Bl1v2OnIfSowyVgLZC+B1QqYZE+wsxJeVoeiGMbfEcFY0z600b44Df
5a+6HDhH0DqEGLiVN0NcZd5dC9sVQ9D9JFvhkuxbQCs7F3cZyRfiOebUiaon
y11L4PYfglUELMOMgt9C3qoN1IpmmshAwXIXbg10LL71OOj/HfL9QBruPXki
rgKIFQzgQKpV2kjBE+t0vq3T1aJzYX+z9T7/7MT9jug2xaqcmQkSmAuZFzHo
MPOL3CpBOjuEklISN5pBGBqeN9b3uU6IjruBJ8hhc/JQ6tqDSftBZDoaN5pv
y7ZdRm8FRFlMR2SASNhKhdnOteNgfVOcCBC1DGKo5kLFLqQ4l7F2CTtjT7CF
jjrWjyuwYbWdR0FXNXSbwhHAswwUs4OMmENKqu9sIcNZKoRFzeDVJW+Qjif+
XZYnthCAc6Ah++JMm+SFsAE8KeQSU+qGOEwVp6nTX+HTUXfAhc0Y+B3IlZxR
MYHxKUJQrn2EFgMY/1Gbr7n4T5mrTQlOepKZyhsEclcaa2vi9obqA/hNMOZz
BULV0Yf1qSZ64yLfkcvrGGL98XawUMGNdtgXCAdpIupHdSm6+TijulDD3A1M
x/wZhPjJlm6yPEIs3r0qxC0FYSD8yuClplLaIAMTQzREDxqVicmQOz2PQ1lV
yYqE6dBnXCsurdDlgDCfPqqdW55xaRDH7VMVQQlBXLZcQ06V7xiAuHAORt0b
zNp02cbdYBzttM/a/itaeFaqo90qI4tbmZQUYKimma3KBCuYcUEgDn4vAIek
9coZhgAvKnOGm7EOSq1txpOr2xg/DMSbFLaeaU76IfaBMBHwmNzHhOg7c2hC
ZykiAEdRUOXDsCOoV5uVqyYLLLHfcKw5ianciWYFJMKi/jGWe/y3qUnqZ4oy
jXmWIXVSE1TC2TrHQhL9FSTRB8O9A0iiGU8QjEuw+ro2CAKLuDGALeQQxVON
mBZ033oxbcD60uKIBr4ZeC+zO3yi38hbTB7BzuIVrNMgzGXZmOuJVZmv8N/s
iC0uwAeBXCoflrVnqfQmKY3jvMuAUeRGk4ZYczJtnVq9Bvhw9Q8jj03TTDkQ
oQbCYywrJMa8QWwRCNXEFoLPzu3bIOMwYAowq7m7zmoGI75NxPPxBwdcuqcS
9CyJ5y6t33BLsFwIahm6PH0JeeatrbwyDCc7QeDOPoy9FSkQcsSp9DNXakc+
kW6bCnWbD6jl4gTPb8i/amLdjVqj6UBg6p2/vbru9fnf4vUb+vvyxR/enl2+
OMG/r15OX71yf9gRVy/fvH11Uv1VPXn85vz8xesTfhi+Fa2vzqd/7nERv/fm
4vrszevpq55DX15VBcuteyEJQ+grGJY0KlbPjy/EaNcUrsajERau+MPB6Mtd
rGJBXsqrkVbyR2DXGmv3SuaUC0EkhtAcFzLRlIbqBaJqRBVG08xhLJ8RV9TW
Dxb45AqPkuPK5/Qe0Jken74gBMBVWNQGCbSXPH9+8VNWbCtyjzyxGY6RZE1Y
3kTB6sivX5FkIYkjrU1SXam7abPHAFZYrdU11SurpYtaiRr+F7aMpeFHC0lU
d0nXpm5RUUVnT7jYQIBtPrinJ+KSHSahSQoGlwYcmMnePbFowacv3jNk0KYy
Up3JMuiuJrPhKW/MB6IYqEHNLxTmxAWRkDve2PAZ+B2whI8/Z5gFcvCQNVTD
pkLzJODewM0vS2ScUuQAMKcq8jgoPINQTfHBYAU2mb2d8fj9+8Ep+XqTUDXH
daZeiL0R3YBnSlweTk+RS5lh0L4lREUHGIAW4tCDFfFY4AjrzTtf7ttQWQDc
A6GlViO04lBLRwi98KiHcpVLVdRyvk3iGflSXHWUUcXNHUKwGO2KTCjyalOQ
DXeD9YimRvjhTbz03UxbxlSqbMYUKGl2XW0Lcpe///3v3qWCp1L/QhaLifgt
i/xrSs3ygXkSk63febiviZjeKY0o6LW604kqkAu/Td3fXzeeuM4mVv2qX7J8
7l1xoJiIq3KFbDRzhpBjcahbZ6VXl/REQH5Xn/yZUbwj7GE45wITZBywA7nz
pdobzSJ/Z7g39MdSzvzReGfX39vdkcOD8UE42pWd+zvOUqwD+dfrlZqIQt0X
2+Q4n2G9NdeqOCqLyD/wUBH8K8vuibg9Gj0T8ijX0tcLOd7bfybCowap+gg5
9Mx0ZYjFkd0/sRS4VNtAO4ea1NnwzCQMdOSvG7yrZDAgsZLBXapE3qtw0+Ia
VkSzBYsYU1tTZ4y61br/gLY/amzig8bm/VJrM+ubslBlcE9fGNUfbaGjxhI0
eCf37XjrX2eSjpL/PLPbpOo/yfo8a3SNFT5ggeaBT2aITtv+KZLvevCzAvyq
FAA9MbWCqvtNT7zpzMD5hlQQqNpNHsdAfa9+TPRwrajLRaf1ytfj7tp7DmC3
+qw/NXQh8FZixYWCQOWPVcqnMgRZZ5k5OmwcjZmds+WYX1o4sjGwqes8wpPz
XFHmZ4htHXPZGrkpdLsM3cqqOadtkvjlmIy0zNdSat/Yz68kPnQS9gs9xH8e
MvuoxR9glT7iVoB/A0Rs2Vg73WxZ6PsHj7+sY4nTICnDqgbcWwCGK+TctdZi
NX7J/RMwit1Nk3cD77uFqnm6jsM0k99TYYFWltgl/EuWrzu4lpfG+nqq4sI2
vLpeCXKikjsxZOdcWDtsPmM2UH+0Tmffpdqu1sWncy7TJrEMTKmg+oYEUx8i
nlIqDvPjbFiDr+X0W8w1A5g/BqJffxzzeF7aXc0Tm03DCufTs1dHLuAZDvfZ
eXJJoaj2YcsSXY2kwknJtBdUrVG0qwbTH91gRytexX/b9MReuhUHuOsSSz0d
Z4y28OVa4mxJCpsM4lRx1RXmK3XMp3Km18KcPplDJ6xvcKczF2AgV1O3eNxB
FaQze+rDPb2oGC8aTQXvnpAlm4/vvWnrpBjLYXfYJK3rQa/exUoVHz7spydN
zDfGBhrU5RFc75Ht/zBBsKond7aObB4juf4RtvQgUKsChTm9PCVVOtzfA1lS
41VBJzU2QoPuhyqSZVJ09Nthrc9Wf1/9mXSFjm5hZrys0TWjOYRbU78pxH/V
36gGI8bBexU+P7HFC6MFnk//bC35wyuYWqkKFikmsdg0ZI+gbM2elCgTOutz
4RGkp2jex3jiKpGay/J8bqCLPEvnsFCtTs4oi0/cHD+VtQXlbkEwiQPxghra
mLVU9/slxwzOtDakRirAT7lJ6l1hlTAaOBQlU6+0EhKtPm6xPz1vnx2z5cBX
vv3qvfU6KFLXdlx5iKbdVDdSQKqm6E874L67B+uZtedq7vDDDVfec6ftWEj/
GGWwMZuV4YI9dNV+e2VqzDuDcb/rJLv+OB1r1O6h8JPuZJrPX7HPvW9HWgRK
lXVtbhjQ0cdKLvvCqze9U4Rs9Lz73PNOZycpGKSaCaQJOz2o5WWZGVXiIncm
sJke8XfoTiwJMhgXpvHMFDvwkV+Hw70RbB+lAN9evLnYwW9HhzvIFNuhr01M
7ArV6dqZG+01rYyFzEJTa4ljzhKEbniDexNRnIBBAPnGAMh7IK8fdx93Fjg1
jMb4No2u5XGHdWZdEMbStuuxYOJxUqS26yJO+yjn1NTH5t4phGNHI6Vz/xQH
II7bGv7uiVN6wx8GwJumAM59puoMaUSMB8XBR16Pe3zL9g2n35WaOj52ML3h
WevDbacruOdE4YEXreqSjk3sNsBOI24HYtdmvVevDdp7FnxbQmPXHOUoDU2X
mSlDQETxGpEzw35/7A1TIch9M+5yy8P+3uHw/fs+Hafa5g7bLmLucMyykA7d
iZa1vWKwpsZekPG8TKRrOXYBchHPFx3hkVq+OQ/pTFacc5HYhhqaewNzZgTA
h7Rw/a7ksL96eT49PqJj5CGeHHPfnkQ8mKsC7+P28cZsgXfoqDueuOljQowx
HD2GoECGOthhX+/qlg44sAUDAQKSs60wYMvAuYeyrjV4go3H6CbXx+l7Nk59
39GlCGbX0alnUFLV0W00iW8Z4DU9kcQ3rOyuhGJKJR93SkRXXTnnNfeqxdUa
FP6e2NWIwe+6KHzfKt9Mn78+xXYrgkV01qf74ruri744vnx1yigdJvARy3Jy
s2k/RD9g6zTyeAaxfSTqa3te/ZM4MpZlN9sTwy9GsGa1kq0e2H++7z1zg5gR
Pl+R+QuR6XmNL3EBw66eeNojUW6LHsl0yxYMNpT8ZzCG9PUnM8V2L/hxaBhT
+8Yxp14WcXuPYABvOKKhoy+eMhGwvYnbG+IdTruOG23eoBEPNIC3z+K5jUzp
yn23uhz7thgJWVE1JktK0/2eRQ2cVc+KXB0RZDClznxXgawN816hnbQbEsyP
/Qcnr/oezN2DW0W3ACLqiQIUFmelNqlf69JL54TKTRmB9Ya20R7RzaAqT6XV
5TUA0MCKZeWO3S+NHXC0ZGTCjXabl427sgZKSBg04HXZVR4jkrC9nQOv0efX
vARQu+ok6EYF3psqXFwOVYIgFik9u2j3xOmFfZZuUdLmAlly85TpKkOuNTrL
mFjcIa4ZRSAJ6shBuTsUqUuw91Tby1upvSPhXZneE/iq6ufma4OU3NreHBQP
31Gkqhg/LRaEj+3d6pReZkBtlXHURLH2gTodAag6ZkMZXvEMbjCEY6WBFWUi
sASJXHCNN3F6Gxfuuh5d5c1j/HGA70Cg8a69zz7MuQIxt54u4NWmu351izRm
OiLEMR8imuM2KwnepTYDbJJMl1DMrfNqIP9sBWRuNUhqVBWWMLps+PyCFbZ5
xePDusjZpLqlshfMNnhomsLeeKdyVx/yEl0gcKQZVUEXUu7kmnvc0SIZHtOr
QO5AJxb4MgXd1J6WaT+0AexaRPrB6DPHM1KjuesLt18b1IUmjdsiP9KhPKZJ
m79x17csVVTSSsG67bVE4/+2KVPnS/yuVZRveAC4qRwX394iwk3ewu/KQGL1
KssifA0HICZXaIJ93aTYgPeQd+M4VqjlitLyeUnOqYaXN3vhG41i3KIAES7X
9kp8B7G1FZYgw3o77LZhFeq8eyGEayw1Fwtj7S7F1Nwupr0P+l6C6fwWCtpy
3CguWnG6tmPxtsn2euexccT2emtkShmN7rbHHPOUWlMaDrmzpmpqVRvopIbQ
SyqRIQ73i8x/EId3wHBz8blC4R0gvIbBWVw3fNtnQ2sJHHGk4YMG3k31rQst
7R483kBFsu3cw8PiOMBLdZhfwMKm0GSiD3EXyF2xK7jNAAJtkqXZyjruYbaT
IhIqlcNs+DHvEGjeXHXVeGrxlhtXOgkQtXE/GqEJWfbwopb8bjAFbQRcSkJl
ga5Lo+BXOMiZmwAPXeds3X43ffKVuVMswhp/dZ/JWg2/GaR6MQ6o8K0M1r6W
kXIN3ux0qoA82HhTA5Zh2rWGreowCMN1Zq+8o+vA90pgJmsMslY4pMWo07hx
BMJoenPhZuJcX48cBefbDHWQv/CEvRw1aN2CpSvN+DAZtUXKpM72NrN71wtr
fN2zxNpU9t01Ds44lXmJTs1dEYNtgv6RjGQroy19sNpdL3nQO2o+mOEPPFc2
edQw0eH0P+hn6Dm6N26djaCUHwyVuYZC2XA3A8B8ira9WMrAN9F7i28MOPwF
nHpL1QRcs98MRg/UJvrNhgunUhsvrMBQmahwrqqDImtYCFpnXMZAev6IRTx7
yvUCJUqXXv5QUjhmM6yuT7uLNvi+qvbJGS5yW59OuekY07RSHz5cVPeLeEb3
r817C6q7v1avjGOqAUpS6gUXaSo06Wr+WXXbuqNIzhc3Npqw2R8ZEBlmtsht
4bm96L2mlyHkbLeWFLxVYpdsEdW5/Gbc7TfmootUutPDGrMwqBYpM9eP+d0x
GI1rLjau3ZdsHwVk0eYGNw4Enfd4GBKID+VqVmP6/LYrC2QBefrOfwBjSuNz
UEkRGPALNGrQ2ajvW3NvFm2Zhjbc42OgeuOCnTkRc17QBYYNqTkusqesXmzC
B77T19NWjWKjjEWMpYFxrQ7PtT3znhB+uYaJHBQe+hgYTUTYOdjfxYhAIJ/O
Xy5szAehGi9pa2mn1O3+WgKA7tk74OtJrZbzsraKecVfg1oBgH21wveLoVQx
iGdBlkxIXTzvCuRV6kmFOiR8OaX7wtvHfK8Q/XCe4c3xzpcHit92vKLvdzBz
446eRQCTZkXhw7WvXz+T6xT/+tksTL+spmRUI0yI8ZWNVVt4+9orAN0cvLgy
b5QjsFbIueZGEBqC2MmVUa4IenjcJFGFrNYJuXurz7+mYXup3HcpZBmf+IbE
Rm1UjEajyXg8nuzs7Ex24Z9fexfvv+cSxWVHamL0wad/jn7Adzj8MN4dDveH
h/vjH0bDg52dg72d3b3BaO9wfHi4M9ofHQ6HLc6YUsO2q2Hz3NWoXKY6Urn/
Ig0yLIhMxJcAXDz3ngUzD0EjCFQwcjonm4Kdbg8HI++PkOPQe1Lxw5s8nsdg
zz62OPisoQ+qsDfNEQsl/gm9YfS6hBA63hG/L1MxHo6HYrg/2RlNdg7EN+fX
HvegqdA/oVauiahPdJWVeQASuQB9OxwPhoMx0PILOUc6lUfBwXhcKdXb61NQ
qkeZ99mG/7ts+Cdqmu+7UE+FEMrhjWF+jhafNe3nRAtbc9JVAr3J3s8R5WdE
lPFwOJqcPD+YTMZ7nzComBN//ZODy0dYzafzR1wUw2KOeNco/Lz/L/dUO18e
HKqRVKPDnQMpx9EwjMJI7h7MxsPwIDqYBfvBeCSDnd0o2BuOd0LrIfZ3okO1
vyt3d8JIhcHws4f7lB7us4P7f+ngPpmx/VzHKKaBrT7zGzSubRMl14TDuMjy
mF5MeBuDMos7bA9ovqgeqxpJoiQe4mL7Y+3/V6IvvI7fVV7w/YQrcyI+Tcz7
TGnNIBuEIP5XfIj/NimxWvj0LL1HtdmCKad5qugZTe/QDsV1Nosl/h9+5Ddl
IsXT0W9G1IsufiPOYQtyi0ZdwXzi2zxbJDD26fPTb8WL8JbfoU0muWVe/Y7S
8f4B/CRrv4dkAAA=

-->

</rfc>

