<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.23 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-benecke-cfbl-address-header-09" category="exp" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CFBL Address Header">Complaint Feedback Loop Address Header</title>

    <author initials="J." surname="Benecke" fullname="Jan-Philipp Benecke">
      <organization>CleverReach GmbH &amp; Co. KG</organization>
      <address>
        <postal>
          <street>Schafjueckenweg 2</street>
          <city>Rastede</city>
          <code>26180</code>
          <country>Germany</country>
        </postal>
        <phone>+49 4402 97390-16</phone>
        <email>jpb@cleverreach.com</email>
      </address>
    </author>

    <date year="2023" month="February" day="20"/>

    <area>art</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes a method that allows a Message Originator to specify a complaint feedback loop (FBL) address as a message header field.
Also, it defines the rules for processing and forwarding such a complaint.
The motivation for this arises out of the absence of a standardized and automated way to provide Mailbox Providers with an address for a complaint feedback loop.
Currently, providing and maintaining such an address is a manual and time-consuming process for Message Originators and Mailbox Providers.</t>

<t>It is unclear, at the time of publication, whether the function provided by this document has widespread demand, and whether the
mechanism offered will be adopted and found to be useful. Therefore, this is being published as an Experiment, looking for a constituency
of implementers and deployers, and for feedback on the operational utility. The document is produced through the Independent RFC stream
and was not subject to the IETF's approval process.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction-and-motivation"><name>Introduction and Motivation</name>
<t>The topic and goal of this document is to extend the complaint feedback loop recommendations described in <xref target="RFC6449"/> with an automated way to provide the necessary information to Mailbox Providers, 
to report message handling actions taken by message recipients, such as "mark as spam", back to the Message Originator.</t>

<t>As described in <xref target="RFC6449"/> the registration for such a complaint feedback loop needs to be done manually by a human at any Mailbox Provider who provides a complaint feedback loop.
The key underpinning of <xref target="RFC6449"/> is that access to the complaint feedback loop is a privilege, and the Mailbox Providers are not prepared to send feedback to anyone it cannot reasonably believe are legitimate.
However, a manual registration and management can be quite time-consuming if there are new feedback loops rising up, or the Message Originator wants to add new IP addresses or DKIM domains.
In addition, a manual process is not well suited and/or feasible for smaller Mailbox Providers.
Because of the manual process involved, the Message Originator has to go through all providers again, delete his existing subscriptions and register with their new complaint address.</t>

<t>Message Originators can add a header field, willing Mailbox Providers can use it to send the Feedback Messages to the specified complaint address.
The Message Originator only needs to add a message header field and does not need to manually register with each Feedback Provider.
The simplification or extension of a manual registration and verification process would be another advantage for the Mailbox Providers.</t>

<t>A new message header field, rather than a new DNS record, was chosen to easily distinguish between multiple Message Originators without requiring user or administrator intervention.
For example, if a company uses multiple systems, each system can set this header field on its own without requiring users or administrators to make any changes to their DNS.
No additional DNS lookup is required on the Mailbox Provider side to obtain the complaint address.</t>

<t>The proposed mechanism is capable of being operated in compliance with the data privacy laws.</t>

<t>Nevertheless, the described mechanism below potentially permits a kind of man-in-the-middle attack between the domain owner and the recipient.
A bad actor can generate forged reports to be "from" a domain name the bad actor is attacking and send this reports to the complaint feedback loop address.
These fake messages can result in a number of actions, such as blocking of accounts or deactivating recipient addresses.
This potential harm and others are described with potential countermeasures in <xref target="security-considerations"></xref>.</t>

<t>In summary, this document has the following objectives:</t>

<t><list style="symbols">
  <t>Allow Message Originators to signal that a complaint address exists without requiring manual registration with all providers.</t>
  <t>Allow Mailbox Providers to obtain a complaint address without developing their own manual registration process.</t>
  <t>Be able to provide a complaint address to smaller Mailbox Providers who do not have a feedback loop in place</t>
  <t>Provide a data privacy safe option for a complaint feedback loop.</t>
</list></t>

<section anchor="scope-of-this-experiment"><name>Scope of this Experiment</name>
<t>The CFBL-Address header field and the CFBL-Feedback-ID header field are an experiment. 
Participation in this experiment consists of adding the CFBL-Address header field on Message Originators side or by using the CFBL-Address header field to send Feedback Messages to the provided address on Mailbox Provider side.
Feedback on the results of this experiment can be emailed to the author, raised as an issue at https://github.com/jpbede/rfc-cfbl-address-header/ or can be emailed to the IETF cfbl mailing list (cfbl@ietf.org).</t>

<t>The goal of this experiment is to answer the following questions based on real-world deployments:</t>

<t><list style="symbols">
  <t>Is there interest among Message Originator and Mailbox Providers?</t>
  <t>If the Mailbox Provider adds this capability, will it be used by the Message Originators?</t>
  <t>If the Message Originator adds this capability, will it be used by the Mailbox Providers?</t>
  <t>Does the presence of the CFBL-Address and CFBL-Feedback-ID header field introduce additional security issues?</t>
  <t>What additional security measures/checks need to be performed at the Mailbox Provider before a Feedback Message is sent?</t>
  <t>What additional security measures/checks need to be performed at the Message Originator after a Feedback Message is received?</t>
</list></t>

<t>This experiment will be considered successful if the CFBL-Address header field is used by a leading Mailbox Provider in a country and by at least two Message Originators within the next two years
and these parties successfully use the address specified in the header field to exchange Feedback Messages.</t>

<t>If this experiment is successful and these header fields prove to be valuable and popular, it may be taken to the IETF for
further discussion and revision. One possible outcome could be that a working group creates a specification for the standards track.</t>

</section>
<section anchor="difference-to-one-click-unsubscribe"><name>Difference to One-Click-Unsubscribe</name>
<t>For good reasons, the One-Click-Unsubscribe <xref target="RFC8058"/> signaling already exists, which may have several interests in common with this document.
However, this header field requires the List-Unsubscribe header field, whose purpose is to provide the link to unsubscribe from a list.
For this reason, this header field is only used by operators of broadcast marketing lists or mailing lists, not in normal email traffic.</t>

<t>The main interest of this document now is to provide an automated way to signal Mailbox Providers an address for a complaint feedback loop.
It is the obligation of the Message Originator to decide for themselves what action to take after receiving a notification; this is not the subject of this document.
Nevertheless, there is discussion about possible actions and their possible harm in <xref target="security-considerations"></xref>.</t>

</section>
</section>
<section anchor="definitions"><name>Definitions</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this 
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

<t>The key word "CFBL" in this document is the abbreviation for "complaint feedback loop" and will hereafter be used.</t>

<t>Unless otherwise noted, the terminology used in this document is taken from <xref target="RFC6449"/>.</t>

</section>
<section anchor="requirements"><name>Requirements</name>

<section anchor="received-message"><name>Received Message</name>
<t>This section describes the requirements that a received message, the message that is sent from the Message Originator to the Mailbox Provider and about which a report is to be sent later, must meet.</t>

<section anchor="strict"><name>Strict</name>
<t>If the domain in the <xref target="RFC5322"/>.From and the domain in the CFBL-Address header field are identical, this domain MUST be covered by a valid
<xref target="DKIM"/> signature. In this case, the DKIM "d=" parameter and the <xref target="RFC5322"/>.From field have identical DNS domains.
This signature MUST meet the requirements described in <xref target="received-message-dkim-signature"></xref>.</t>

<t>The following example meets this case:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

</section>
<section anchor="relaxed"><name>Relaxed</name>
<t>If the domain in CFBL-Address is a child domain of the <xref target="RFC5322"/>.From, the <xref target="RFC5322"/>.From domain MUST be covered by a valid <xref target="DKIM"/> signature. 
In this case, the DKIM "d=" parameter and the <xref target="RFC5322"/>.From domain have a identical (Example 1) or parent (Example 2) DNS domains.
This signature MUST meet the requirements described in <xref target="received-message-dkim-signature"></xref>.</t>

<t>Example 1:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@mailer.example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com;
      h=Content-Type:Subject:From:To:Message-ID:
      CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Example 2:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@mailer.example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@mailer.example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com;
      h=Content-Type:Subject:From:To:Message-ID:
      CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

</section>
<section anchor="third-party-address"><name>Third Party Address</name>
<t>If the domain in <xref target="RFC5322"/>.From differs from the domain in the CFBL-Address header field, the domain of the CFBL-Address header field MUST be covered by an additional valid <xref target="DKIM"/> signature.
Both signatures MUST meet the requirements described in <xref target="received-message-dkim-signature"></xref>.</t>

<t>This double DKIM signature ensures that both, the domain owner of the <xref target="RFC5322"/>.From domain and the domain owner of the CFBL-Address domain, agree who should receive the Feedback Messages.</t>

<t>The following example meets this case:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@super-saas-mailer.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@super-saas-mailer.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=super-saas-mailer.com; s=system;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;
       
This is a super awesome newsletter.
]]></artwork></figure>

<t>An Email Service Provider may accept pre-signed messages from its Message Authors, making it impossible for it to apply the double signature described above, 
in which case the double signature MUST BE omitted and the Email Service Provider MUST sign with its domain.
Therefore, the pre-signed message MUST NOT include "CFBL-Address" and "CFBL-Feedback-ID" in its h= tag.</t>

<t>This way the Email Service Provider has the possibility to accept the pre-signed messages and can inject their own CFBL-Address.</t>

<t>Due to this granted exception a malicious actor can destroy this possibility with over-signing. This potential harm is described in <xref target="security-considerations"></xref>.</t>

<t>The following example meets this case:</t>

<figure><artwork><![CDATA[
Return-Path: <newsletter@example.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@super-saas-mailer.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID;
DKIM-Signature: v=1; a=rsa-sha256; d=super-saas-mailer.com; s=system;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

</section>
<section anchor="received-message-dkim-signature"><name>DKIM Signature</name>
<t>The CFBL-Address header field MUST be included in the "h=" tag of the aforementioned valid DKIM-Signature.
When the CFBL-Feedback-ID header field is present, it MUST also be included in the "h=" tag of the aforementioned valid DKIM signature.</t>

<t>If the domain has neither the required coverage by a valid DKIM signature nor the required header field coverage by the "h=" tag, the Mailbox Provider SHALL NOT send a report message.</t>

</section>
</section>
<section anchor="cfbl-feedback-id-header-field"><name>CFBL-Feedback-ID Header Field</name>
<t>The Message Originator MAY include a CFBL-Feedback-ID header field in its messages out of various reasons, e.g. their feedback loop processing system can't do anything with the Message-ID header field.</t>

<t>It is highly RECOMMENDED that the header field includes a hard to forge component such as an <xref target="HMAC"/> using a secret key, instead of a plain-text string.</t>

</section>
<section anchor="receiving-report-address"><name>Receiving Report Address</name>
<t>The receiving report address provided in the CFBL-Address header field MUST accept <xref target="ARF"/> reports.</t>

<t>The Message Originator can OPTIONALLY request a <xref target="XARF"/> report, as described in <xref target="xarf-report"></xref>.</t>

</section>
<section anchor="complaint-report"><name>Feedback Message</name>
<t>The Feedback Message (sent by Mailbox Provider to the address provided in the CFBL-Address header field) MUST have a valid <xref target="DKIM"/> signature.</t>

<t>If the message does not have the required valid <xref target="DKIM"/> signature, the Message Originator SHALL NOT process this Feedback Message.</t>

<t>The Feedback Message MUST be a <xref target="ARF"/> or <xref target="XARF"/> report.
If the Message Originator requests it (described in <xref target="xarf-report"></xref>), and it is technically possible for the Mailbox Provider to do so, the Feedback Message MUST be a <xref target="XARF"/> report, otherwise the Feedback Message MUST be a <xref target="ARF"/> report.</t>

<t>The <xref target="ARF"/> or <xref target="XARF"/> report MUST contain the Message-ID <xref target="MAIL"/>.
If present, the header field "CFBL-Feedback-ID" of the received message MUST be added additionally to the <xref target="ARF"/> or <xref target="XARF"/> report.</t>

<t>The Mailbox Provider MAY omit or redact, as described in <xref target="RFC6590"/>, all further header fields and/or body to comply with any data-regulation laws.</t>

<section anchor="xarf-report"><name>XARF Report</name>
<t>A Message Originator wishing to receive a <xref target="XARF"/> report MUST append "report=xarf" to the <xref target="cfbl-address-header-field">CFBL-Address header field</xref>.
The report parameter is separated from the report address by a ";".</t>

<t>The resulting header field would look like the following:</t>

<figure><artwork><![CDATA[
CFBL-Address: fbl@example.com; report=xarf
]]></artwork></figure>

</section>
</section>
</section>
<section anchor="implementation"><name>Implementation</name>

<section anchor="message-originator"><name>Message Originator</name>
<t>A Message Originator who wishes to use this new mechanism to receive Feedback Messages MUST include a CFBL-Address header field in their messages.</t>

<t>It is strongly RECOMMENDED that these Feedback Messages be processed automatically. Each Message Originator must decide for themselves what action to take after receiving a Feedback Message.</t>

<t>The Message Originator MUST take action to address the described requirements in <xref target="requirements"></xref>.</t>

</section>
<section anchor="mailbox-provider"><name>Mailbox Provider</name>
<t>A Mailbox Provider who wants to collect user actions that indicate the message was not wanted and send a Feedback Message to the Message Originator, 
they MAY query the CFBL-Address header field and forward the report to the provided complaint feedback loop address.</t>

<t>The Mailbox Provider MUST validate and take action to address the described requirements in <xref target="requirements"></xref>.</t>

</section>
</section>
<section anchor="header-field-syntax"><name>Header Field Syntax</name>

<section anchor="cfbl-address-header-field"><name>CFBL-Address</name>
<t>The following ABNF imports fields, WSP, CRLF and addr-spec from <xref target="MAIL"/>.</t>

<figure><sourcecode type="abnf"><![CDATA[
fields =/ cfbl-address

cfbl-address = "CFBL-Address:" 0*1WSP addr-spec
               [";" 0*1WSP report-format] CRLF

report-format = "report=" ("arf" / "xarf")
]]></sourcecode></figure>

</section>
<section anchor="cfbl-feedback-id"><name>CFBL-Feedback-ID</name>
<t>The following ABNF imports fields, WSP, CRLF and atext from <xref target="MAIL"/>.</t>

<figure><sourcecode type="abnf"><![CDATA[
fields =/ cfbl-feedback-id

cfbl-feedback-id = "CFBL-Feedback-ID:" 0*1WSP fid CRLF

fid = 1*(atext / ":")
]]></sourcecode></figure>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>
<t>This section discusses possible security issues, and their possible solutions, of a complaint feedback loop address header field.</t>

<section anchor="attacks-on-the-feedback-loop-address"><name>Attacks on the Feedback Loop Address</name>
<t>Like any other email address, a complaint feedback loop address can be an attack vector for malicious messages.
For example, complaint feedback loop addresses can be flooded with spam.
This is an existing problem with any existing email address and is not created by this document.</t>

</section>
<section anchor="automatic-suspension-of-an-account"><name>Automatic Suspension of an Account</name>
<t>Receiving a Feedback Message regarding a Message Author can cause the Message Author to be unreachable if an automatic account suspension occurs too quickly.
An example: someone sends an invitation to their friends. For some reason, someone marks this message as spam.
Now, if there is too fast automatic account suspension, the Message Author's account will be blocked and the Message Author will not be able to access their emails 
or is able to send further messages, depending on the account suspension the Message Originator has chosen.</t>

<t>Message Originators must take appropriate measures to prevent too fast account suspensions.
Message Originators therefore have - mostly proprietary - ways to assess the trustworthiness of an account.
For example, Message Originators may take into account the age of the account and/or any previous account suspension before suspending an account.</t>

</section>
<section anchor="enumeration-attacks-provoking-unsubscription"><name>Enumeration Attacks / Provoking Unsubscription</name>
<t>A malicious person may send a series of spoofed ARF messages to known complaint feedback loop addresses and attempt to guess a Message-ID/CFBL-Feedback-ID or any other identifiers.
The malicious person may attempt to mass unsubscribe/suspend if such an automated system is in place.
This is also an existing problem with the current feedback loop implementation and/or One-Click Unsubscription <xref target="RFC8058"/>.</t>

<t>The Message Originator must take appropriate measures, a countermeasure would be, that the CFBL-Feedback-ID header field, 
if used, use a hard-to-forge component such as a <xref target="HMAC"/> with a secret key instead of a plaintext string to make an enumeration attack impossible.</t>

</section>
<section anchor="data-privacy"><name>Data Privacy</name>
<t>The provision of such a header field itself does not pose a data privacy issue.
The resulting ARF/XARF report sent by the Mailbox Provider to the Message Originator may violate a data privacy law because it may contain personal data.</t>

<t>This document already addresses some parts of this problem and describes a data privacy safe way to send a Feedback Message.
As described in <xref target="complaint-report"></xref>, the Mailbox Provider can omit the entire body and/or header field and send only the required fields.
As recommended in <xref target="RFC6590"/>, the Mailbox Provider can also redact the data in question.
Nevertheless, each Mailbox Provider must consider for itself whether this implementation is acceptable and complies with existing data privacy laws in their country.</t>

<t>As described in <xref target="complaint-report"></xref> and in <xref target="cfbl-feedback-id-header-field"></xref>, it is also strongly RECOMMENDED that the Message-ID and, if used, the CFBL-Feedback-ID.
contain a component that is difficult to forge, such as a <xref target="HMAC"/> that uses a secret key, rather than a plaintext string.
See <xref target="hmac-example"></xref> for an example.</t>

</section>
<section anchor="abusing-for-validity-and-existence-queries"><name>Abusing for Validity and Existence Queries</name>
<t>This mechanism could be abused to determine the validity and existence of an email address, which exhibits another potential data privacy issue.
Now, if the Mailbox Provider has an automatic process to generate a Feedback Message for a received message, it may not be doing the mailbox owner any favors.
As the Mailbox Provider now generates an automatic Feedback Message for the received message, the Mailbox Provider now proves to the Message Originator that this mailbox exists for sure, because it is based on a manual action of the mailbox owner.</t>

<t>The receiving Mailbox Provider must take appropriate measures. One possible countermeasure could be, for example, pre-existing reputation data, usually proprietary data.
Using this data, the Mailbox Provider can assess the trustworthiness of a Message Originator and decide whether to send a Feedback Message based on this information.</t>

</section>
<section anchor="over-signing-when-accepting-pre-signed-emails"><name>Over-Signing when Accepting Pre-Signed Emails</name>
<t>When accepting pre-signed mails, a malicious actor can destroy the possibility of adding the CFBL-Address header field by the Email Service Provider, with "over-signing".
The methode "over-signing" is described in <xref section="5.4" sectionFormat="of" target="DKIM"/>.</t>

<t>The Email Service Provider must take appropriate measures.
Email Service Providers therefore have - mostly proprietary - methods for assessing the trustworthiness of an account and decide on this basis whether to accept pre-signed messages.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="cfbl-address"><name>CFBL-Address</name>
<t>The IANA is requested to register a new header field, per <xref target="RFC3864"/>, into the "Provisional Message Header Field Names" registry:</t>

<figure><sourcecode type="abnf"><![CDATA[
Header field name: CFBL-Address
  
Applicable protocol: mail

Status: provisional

Author/Change controller: Jan-Philipp Benecke <jpb@cleverreach.com>

Specification document: this document
]]></sourcecode></figure>

</section>
<section anchor="cfbl-feedback-id-1"><name>CFBL-Feedback-ID</name>
<t>The IANA is requested to register a new header field, per <xref target="RFC3864"/>, into the "Provisional Message Header Field Names" registry:</t>

<figure><sourcecode type="abnf"><![CDATA[
Header field name: CFBL-Feedback-ID

Applicable protocol: mail

Status: provisional

Author/Change controller: Jan-Philipp Benecke <jpb@cleverreach.com>

Specification document: this document
]]></sourcecode></figure>

</section>
</section>
<section anchor="examples"><name>Examples</name>
<t>For simplicity the DKIM header field has been shortened, and some tags have been omitted.</t>

<section anchor="simple"><name>Simple</name>
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 111:222:333:4444
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-IP: 192.0.2.1

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822; charset=UTF-8
Content-Transfer-Encoding: 7bit

Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 111:222:333:4444
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
<section anchor="data-privacy-safe-report"><name>Data Privacy Safe Report</name>
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 111:222:333:4444
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report contains only the CFBL-Feedback-ID:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-IP: 2001:DB8::25

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822-headers; charset=UTF-8
Content-Transfer-Encoding: 7bit

CFBL-Feedback-ID: 111:222:333:4444
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
<section anchor="hmac-example"><name>Data Privacy Safe Report with HMAC</name>
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 3789e1ae1938aa2f0dfdfa48b20d8f8bc6c21ac34fc5023d
       63f9e64a43dfedc0
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report contains only the CFBL-Feedback-ID:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-IP: 2001:DB8::25

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822-headers; charset=UTF-8
Content-Transfer-Encoding: 7bit

CFBL-Feedback-ID: 3789e1ae1938aa2f0dfdfa48b20d8f8bc6c21ac34fc5023d
       63f9e64a43dfedc0
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>
<t>Technical and editorial reviews were provided by the colleagues at CleverReach, 
the colleagues at Certified Senders Alliance and eco.de, Levent Ulucan (Inxmail), 
Arne Allisat and Tobias Herkula (1&amp;1 Mail &amp; Media) and Sven Krohlas (BFK Edv-consulting).</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>

<reference anchor="XARF" >
  <front>
    <title>eXtended Abuse Reporting Format</title>
    <author >
      <organization>Abusix</organization>
    </author>
    <date />
  </front>
  <seriesInfo name="Web" value="https://github.com/abusix/xarf"/>
</reference>




<reference anchor='RFC6449'>
<front>
<title>Complaint Feedback Loop Operational Recommendations</title>
<author fullname='J. Falk' initials='J.' role='editor' surname='Falk'><organization/></author>
<date month='November' year='2011'/>
<abstract><t>Complaint Feedback Loops similar to those described herein have existed for more than a decade, resulting in many de facto standards and best practices.  This document is an attempt to codify, and thus clarify, the ways that both providers and consumers of these feedback mechanisms intend to use the feedback, describing some already common industry practices.</t><t>This document is the result of cooperative efforts within the Messaging Anti-Abuse Working Group, a trade organization separate from the IETF.  The original MAAWG document upon which this document is based was published in April, 2010.  This document does not represent the consensus of the IETF; rather it is being published as an Informational RFC to make it widely available to the Internet community and simplify reference to this material from IETF work. This document is not an Internet Standards Track specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='6449'/>
<seriesInfo name='DOI' value='10.17487/RFC6449'/>
</reference>



<reference anchor='RFC2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference anchor='DKIM'>
<front>
<title>DomainKeys Identified Mail (DKIM) Signatures</title>
<author fullname='D. Crocker' initials='D.' role='editor' surname='Crocker'><organization/></author>
<author fullname='T. Hansen' initials='T.' role='editor' surname='Hansen'><organization/></author>
<author fullname='M. Kucherawy' initials='M.' role='editor' surname='Kucherawy'><organization/></author>
<date month='September' year='2011'/>
<abstract><t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message.  This can be an author's organization, an operational relay, or one of their agents.  DKIM separates the question of the identity of the Signer of the message from the purported author of the message.  Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key.  Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t><t>This memo obsoletes RFC 4871 and RFC 5672.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='76'/>
<seriesInfo name='RFC' value='6376'/>
<seriesInfo name='DOI' value='10.17487/RFC6376'/>
</reference>



<reference anchor='ARF'>
<front>
<title>An Extensible Format for Email Feedback Reports</title>
<author fullname='Y. Shafranovich' initials='Y.' surname='Shafranovich'><organization/></author>
<author fullname='J. Levine' initials='J.' surname='Levine'><organization/></author>
<author fullname='M. Kucherawy' initials='M.' surname='Kucherawy'><organization/></author>
<date month='August' year='2010'/>
<abstract><t>This document defines an extensible format and MIME type that may be used by mail operators to report feedback about received email to other parties.  This format is intended as a machine-readable replacement for various existing report formats currently used in Internet email.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5965'/>
<seriesInfo name='DOI' value='10.17487/RFC5965'/>
</reference>



<reference anchor='MAIL'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC8058'>
<front>
<title>Signaling One-Click Functionality for List Email Headers</title>
<author fullname='J. Levine' initials='J.' surname='Levine'><organization/></author>
<author fullname='T. Herkula' initials='T.' surname='Herkula'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes a method for signaling a one-click function for the List-Unsubscribe email header field.  The need for this arises out of the actuality that mail software sometimes fetches URLs in mail header fields, and thereby accidentally triggers unsubscriptions in the case of the List-Unsubscribe header field.</t></abstract>
</front>
<seriesInfo name='RFC' value='8058'/>
<seriesInfo name='DOI' value='10.17487/RFC8058'/>
</reference>



<reference anchor='HMAC'>
<front>
<title>HMAC: Keyed-Hashing for Message Authentication</title>
<author fullname='H. Krawczyk' initials='H.' surname='Krawczyk'><organization/></author>
<author fullname='M. Bellare' initials='M.' surname='Bellare'><organization/></author>
<author fullname='R. Canetti' initials='R.' surname='Canetti'><organization/></author>
<date month='February' year='1997'/>
<abstract><t>This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key.  The cryptographic strength of HMAC depends on the properties of the underlying hash function.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind</t></abstract>
</front>
<seriesInfo name='RFC' value='2104'/>
<seriesInfo name='DOI' value='10.17487/RFC2104'/>
</reference>



<reference anchor='RFC6590'>
<front>
<title>Redaction of Potentially Sensitive Data from Mail Abuse Reports</title>
<author fullname='J. Falk' initials='J.' role='editor' surname='Falk'><organization/></author>
<author fullname='M. Kucherawy' initials='M.' role='editor' surname='Kucherawy'><organization/></author>
<date month='April' year='2012'/>
<abstract><t>Email messages often contain information that might be considered private or sensitive, per either regulation or social norms.  When such a message becomes the subject of a report intended to be shared with other entities, the report generator may wish to redact or elide the sensitive portions of the message.  This memo suggests one method for doing so effectively.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6590'/>
<seriesInfo name='DOI' value='10.17487/RFC6590'/>
</reference>



<reference anchor='RFC3864'>
<front>
<title>Registration Procedures for Message Header Fields</title>
<author fullname='G. Klyne' initials='G.' surname='Klyne'><organization/></author>
<author fullname='M. Nottingham' initials='M.' surname='Nottingham'><organization/></author>
<author fullname='J. Mogul' initials='J.' surname='Mogul'><organization/></author>
<date month='September' year='2004'/>
<abstract><t>This specification defines registration procedures for the message header fields used by Internet mail, HTTP, Netnews and other applications.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='90'/>
<seriesInfo name='RFC' value='3864'/>
<seriesInfo name='DOI' value='10.17487/RFC3864'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source:
H4sIAIir82MAA+1deXPjxrH/H59iHl2VrPxIiqQOS9woNldaeRXvFWk3TsqV
cg2BAQkLBGgMIInZ2nz218fM4KS0tjeO87KuHCIJzPT0dP/6mO7xYDDw8iiP
1VT0TtPVOpZRkotzpYK59K/F8zRdi1kQZEpr8UzJQGU9T87nmbrBF86fPG/9
GqR+IlcwXpDJMB/MVaL8azXww3k8kPzsYEnPDkbHni9ztUizzVSou7Wn80zJ
1VRESaDWCv4nyT0vWmdTkWeFziej0fFo4kl4aCpklnu3aXa9yNJiPRUvVY6f
xLfwP1GyEF/j19612sC3wVRcJLnKEpUPzpAqD2aSSfC9jNMEKN0o7ekVDPj9
j0WaKz0VSeqto6n4Lk/9vtBpBnSFGv7arPCPv3ueLPJlmk09AbTC838aiie8
UPiGl/8nmQxeL6M4Wq8rv6XZQibRP2QepclUnMbqRmWXSvpL8fVq/kz8Tpym
Q/HN1/Ak8kLlU3HlL2X4Q4HvJ7dqISbwmx/lwLFLqXMV4Kh+GsCMk8Px0Yg+
FUmOLP1aZSuZbOCr9ZIW+r/7x2J/fzQRx1/sHY8G40P4Sa1kFE/FD+v5Vz6R
kyE5Qz9deV6SwgB5dKNwoX+dXZ7j/wthBEb9Ncc9CsRsXmglLtUaGIW8P6fX
6NGST/gPrH5KT0d39E0Auz8VoYy1os9aZZHSURKm9o1v1Xwqlnm+1tPd3UWU
L4s5krYraZDdO5mFICHwgiPUGwwGQs6BfdKHjX6zjLQAmSxWIEwiUNrPornS
QoqVAtICkS9lLmQcp7f45QsQT7lQ4lUWLaJE5mkm8lTotfKjcAO/+05HQqsj
MerII1CFHWHkW0gen4diYRdhpOJg6M1infZFhKSEUQKE5EslsiKGv2ARYp2l
PryHXAQBxa9uZRbgR12AkFQIGMLSlFilsGqSJno9x9XKLNIwXFrkIg1pfGCH
SnyFH6Ug0cdB/wFbh5PAHqXAPfh0Kze4XCDiJgqUeAGSMU/vxGv+nGlxCzsA
77iF4pxbmTL0TguQpiSPN30zpl3XCp+G/5YLK8eMiHkyKWRMz+bRCuAjTXSx
wscNh2jq9m5peqVF+NDzLnIcuUhAyGXWF7DpyBkcHNmyLuZx5BMj++J2CaKh
MnoghDeIvYYpgZhvmM1OqJYSGQOitQbVCWBjgfigT4RURvJWCjQ5ifQK5gtV
huyO4ljMYXuCdJ2bzQhBeQPcBPgetCos4qGAjQbYSTPV55nhP3NFvECq9RJf
xYWLp3dr0CAkqo87QEBotyjRoLYFiMHGg/VGsGMKH1SGZQC4cbqBT30reOVm
wuqRFSkMThyCjSlyQLZ8Q7SVnADCgE1B4SvUK0DgxZLevCjxXFyenwrGeY84
BJQnaQ5SMP9B+TmunN54+ub890DZGtkO85ldH7J6r6IgiJXnfYa4ThPSFtHW
O4Ug/cjTdeTTD4sUhiF9qO4d/A0zqjtEMpp4m4JnCn6BVwIaWzskCcAAiHfv
/geWdbi/f/z+fakj29QKpwF7gLKbbYQDL+Ry2hbdvvDg64zAtcQUWFFMyuQz
ObkE84CiaZ8AeqN1BEtEs0UapkUPbNw1/qHXctXrC1qdYXhblYDXs/vWScCl
FhEirQOgJko1uJjAJ22kOwCTZPQ83iDpUiyLFTIO8DjZtDgByuR4qO9DHdx3
MPyg6/DWOkoIZWDna9TjxhPy+4Qmhgvb6CZMWmfRTRSrhWIVIa61EBKcE5Jn
wIK1RCVH84HC5QaEL2B5uHiwAr5M8GlQBw16NUdGqDgCM0wDwWQRIBQI0dB7
lt6ide6X4FhjPqNqAltIcg3jIo9/LKJcNRE0IqOQ8RSJuq2vVQswH/hYse6L
NNsiHCDTIFq0liCgQS5eWwRH25OJs28uXsAeI9KD2l4QvkeMr24FFssjxoBb
BXiokWTCwl3CIKmjeaxYuFYgKiAIHfD+RPkSnRBj8JrjJzdpfKOC/rbVIITD
Whapgy2YyQob7uoCltEHZYgV8BMRRN0B79l8zVFD1qyHuA28LyiwiAQwY5QR
h0rhMowCDeuyYD4bQ9SHiuvQJ3OBM7aFDt/A1Ue5EzdcqHPjzSxOzNmfiYDN
HTS96WZRmoBwOv1l+rpcHLYmqeItxRfweafndeaQ5+vItAtiGjTaKKCSrTKK
FMG0pg/hPWoAWlK+ZkXgNi2ANjS2QBaaZBncgAgj9aGV8g6vYUY717XOvoAp
2bbjftFzZy+vyFBkuFsgUv4yhc0gCwNiDKsPWGgKMNpAS36r4NdVEecRWONO
bwa5hI5cpkCVM1JLcJKRGTIAZeaFw6cILfkNaD6seeidE7Mk2vg+qjuDJYJq
gdrpZtQb2IoVWAjaB/5EwqRVzoaytrPAzgiUPr1NttClW4Rp3vxrRZCODlAp
hqAWwLCh9zJ12ADbiTxE36Ug1OXxVWB9kJZR0GRRU5HO0Z9sgHipZyhQIApr
2A/ASeeJRag7a4kAAyLFThW7OWzwaKhIou9slRmDFrYF0t+IWN7i8C8RmuFH
cOM1g0xpN8vZANrTW7GGEBP2ibQBplohS6UAXy1AGkCoB1EygCEG7OWAOcxR
Oay40OAEq7gRKMhG253FhyADTHuAvgFsB27nAuJPXBOK+kIFxpuwhrgXZumq
BzSYYTF+pRHLQdD+ERnWgTcYQzvkxrrPglbhBZAqRJFYWVhCGuFXEEtkOuhS
sZqjlIfWvyl9mHmcMhX0I4W6JHWBwkfR84PfHCtKkzTkSNAxHyA/W9FSCA7Y
cJebRrtdPkzzwF6BGhcwHlL53d8ffaaVX2TgBpNxRXFk53AHww1QomIFDtem
3xEuUGSRYtBJSyHXF6JXDeHr52KG33eiAYJ7tEAtYd+lLepsl7pwowst2VWt
WrphOX/LypRa1jWxnTEAVYjB64YpWccRLromdy795+IJhqixqjrJXVPg8re5
AOQdBikZnaVE/6npwsGMsfQVTPfazVHTZS1DDHKcL3uPi+l99pm48gEpXERR
hl6ENZgaG9jUWMs85vYJa/oGF2eNp9A9SzApZkYdCu+1zPIIBJvZR2BHjoh9
hII82n3UjSAwW3APLTBMl5gRpgID5mgvHh7Fuhxb3Q0XOtuNxHm7gBwsVyPm
ZFTQjs3V1bKLS/krdjIo1UEJJzTOkXZxcaR1gUDalUn6YQ36rnaz0O/KUe4K
A6HtmTBEFfgKZjPIMYNYPBeP8KuvIpWHQwDbHWN7atFnZREcf8pE39p8g0OF
Hwul2amcS80WEMKEeHCbZrGN13EMBI2BuNDGqSdPAN4UcpWis9j25DozJF/i
GGG3jQWWaKacjCVF/uyOosfJiQqTF+n0Yqpjd5Dzk0bvovssNXk0CLpcoqsl
s7js+5UuMskEVfVHLMazENF83xL4djxi7cOuv1T+tXbeLywCdhzjfBTJvJvL
c0rxAOo09QiFBJaVf7ypOzYhRJ+8e26wpgqMU/ClyaZWxNdmsKz9gznAUCOs
h0VsAs17kAMTcmZzJQS7MugKb4QxOJTUpl3Ex3N8HqQ8v023Os7GH0wgbqDn
Nkpm2jMADE7IGgEVRKckOSYPmYHEEFzGSma4JvapO3Zr2/iHbkCnyld4VFJT
HZfyaDfKbOCNjAuyj/jwOl0XMWYwQTlWEvMFJvlThSXYby8sMopPIObwC61t
dJSpmwg/DMWrBFiQao6vwXQDGuJOmjjJeBi35jyFjlmEDwiUU/bFsMWv5p6V
yy2DOmbACTaUZxHlO1EvgUaYdXAaR6B+bxMTO88VRSyLNA1MJsQ40Z3Pinfv
vrw8Pz0aHRy9f2/8IXJLY0y/bowHhFncCFxGZBH5AxpddNAYi4/a+Pcr6wfV
vLRKvqUdB5mghDHnOcxWI68RtGMIKNZFhqGHgftqIhBIp5RQURkB/XFUCBiZ
YznjaCNnuuiJNEfnVpc4gkEtwKAmS2Xgo6pg9k/l1lCR11y1XMAydJ4wAMCE
ZMz2DjcyhH02dowCBGdiWunUBBzH+hq7EqHGh+1Inn3wyQJn8ykrPY+jhUkR
bLUxMGkA8hq4YH+lVQz+NmwP5QBt9jWnSJWwkFGPBAv54mT9scvBI7dI6E3q
usmNYTsszEgEqho5R5/ZaaFN5xpUAO/Z/UTxysNxB6gbHiyRfdAuFYqHoFr0
Xry9etPr8/+Ll6/o78unf357cfn0DP++ejZ7/tz9YZ+4evbq7fOz8q/yzdNX
L148fXnGL8O3ovHVi9nfepws7b16/ebi1cvZ855zXD0nNejsMtKRZIEVz9l1
qyWfn5y+FuN9k8WdjMeYxeUPR+Mv9jHxvlQJz0bawB+Bixs8RgDoJ0MC9grc
jCiXMZ50ABQvMT7BnTESbtnFx9slubUjAzpTw1PwqMS/3hZh7fFJEFpKnIal
y7g1MOfbJCaXGKXjFnxWFCubqcSQM0rSOF0Y5e4khtCfMKOa4SZZuGSkIjeR
sPjS2HKnJO8+s+Z9YMLx92zltWKtKI9M2R8vB7Qmwg5g43mm3ebM6CHjwTCV
23W02/vEI0pSE0Z0aQ9DIpvAoKFjQBhA61WBSKdUTrYHorQ8i/zcM+6nyXAY
S87sOtibTIBd5wS6JjirP3dPMIcKjcdaAA6xC/TpXdIxco1uyC8iHwcseRR4
MC9mx09wr/a+OLRWLAf/bSguEusMa8NJyqT3gpMeOixypfJK0qe9BCaMTJ6j
jJJqLhfP22tnZEKRY+0NrukfAk9TVgbBdbQauLFstFMGMSYLSePrcmEQsvzz
n//0LhW8lQxey3w5FX/AIFJlX1GUlQ3Nmxij/dHDlU3F7FZp9FFeqlsdqxz5
8IfE/f1V7Y036dQKZvkLBGTeFaP1VFwVa2SkGTOA0IqtziYtvOqOTwUGdJXB
HxsBPMHiAyPIEEvACuTeF+pgPA8He6OD0WAi5XwwnuztDw729+ToaHIUjPdl
5/pO0wRTTYM3m7Wagtrf5bsEJY8xZZpplZ8UeTg48lAUBleW3VNxczJ+LORJ
puVAL+Xk4PCxCE5qpOoT5NBjU04hlid2/cRS4FJlAc3oaFplw2Pj/dNRmK7x
rtyDIW0rKd6liuWdCtqaV9MmGs1fRhjRmqRm2C3Y/S3y/qC6iXvVzful+mbm
NzmnUuUePTWiP95BTwsPAwGl3LeTnV9TKR0t/3mK16bqP0n/PKt2tRnu0UHz
wkdTRSdv/5Kd73rxkwD8pgQAsRgeBocW88cbW6/ZxuUOaKPAXZde2we6Rf3a
IdVDSaAu5E6qOa6HUdx7Au5z+Vl/fJ+G/LoC4zCyDiVQq4RPhMjNnQMZ9cXT
Cd02k2afanidtZdqfOMHIG5ZZErRiQeELwVlJGgN3af+H8MpIyEbaCn1wKjP
b8Q8dBL2CwHiX4cMW6jVJ3z2/lHctH+rj2iG+HB4miXiKeWZrlR2E/mqjPsw
c4fVWWsqpiKFLGNMA0p4dm5DyRmd/EBUv5KUsYxyrHK06ROUIC6Pket1vDH6
RhpdKnOJDRBw3oA76IE6ctSJCtL9EmHNk6ciXUW5reLEB7csix7HtznriCtg
taaj8bLOU3WsWtjEDWCXHxeB4iSFZT9nGnrNLaIcBs6zPBG5XFg8o2Tcdjrt
MTVzkE5liHu8I930ceIKj8uihKs53QlwlU6g4KxQHPADIYtMJsg4dYdDU1YM
9jCO/CgtdKWKAXYnz1JTfVslixiJ1oPIgb3HstT2YX/UAf73ZNJ+PmZuw75P
aPnrBLIfiIG/Bhj/ND+NfAtHdkduruGbvH+g1sC6VgYt3BFWbwnBLUCB6w9A
0Flx9Rg8xQ5XnYdD79ulqvh92w9RtTmGzemIikgAoUx/ER1VX6/huSJOJSrK
bcG+qxgjfxJBs5IKaDhvSdp4p7aS6gBVavvdeUqXM+dqCJemNFvHZ2Et3nHb
lDinGd99RiUINn08iALbKkUUvd9Wm/li9jdnEeSDh9xkCxximzaRG5kR3Lrz
NzUEGGX8rhfSVFpUyorB3+dYfCOTDZ66LspiuVJTGn0w5gRnGS2WYI0r5wbs
SbcOWs3yUJEASOjglYrZ6IgIpCXJXYmYxFjmy2cvZqcndFIwwsMBLmSRmNbO
ICy4Vps+tm7l2LFB1aQEUwNELGxPQCNSSZjju9zf5OKnN1xyZ340e21Pr1zF
y4MZZNYPNqoQIMwuz5Hog+PDAyDa1NYZY9Sx8WgW7cnK87+RHFPpBwyF7Vpu
iH7rNAWNH3ZPDfiBHV5t6/gfJNKeapgnWQhbDz6iJPy8o2zfFub8VNbsMG9M
Yu0DgkALDNZZckXINERNzx8cbWuleKnltrKYfIEmP8yWtdhkEVm2NxsGb+za
0NteNWO2WiPGPrp3Z3f4TCziAxPlLxPMT2LxadU37oS0nErqsGGtK7CsLaYh
buVx1oNvdsq84d8HMInHAvfN1f9WMAfefzG7eH5Sxt3IUmefWijT4Tsb09Q8
5CqXEJjKNpOuiDdW4j9oh1mzm4xHQMd4QtBOB+ADtzWYyyAOD45H79/36WDT
VnzUK0lMJ8U8DYgy0ueN7VLaUAkkiMqiiPko01Q0ozuCpFrYe1eVqfferLMn
JNKE/tSvxAmJlmgYwFtjO5joGccTh+5Ztn23FRFAsLvaiBkthgaRaZIycU8n
j/gRIwyXyGrANXkIvcc9sx1cdIgrqQkHtxBgbbqIo2tVL9czgcCHHRxR2yp7
feLCduJx0xqicJu1W/i9TInnXGnJhUtYl0AdC7bovLIZ7QJN2oyG59BdqZUY
X8D6Dc6CY0yWLLbYcN016VxZ7FSu+ZQhaSieYiNCx1LpWPeXlHBsAeguZwp5
wqO4QV0Fcq2yv5ZXROStHrdTZrH8aAxsU9NxY7v63Fx7lQ8ChpE0tX24bj86
U08CLElRNZtn2ylvOaR2pfodlX1bG/+w4xCrJhCEwMhkm4cOwctG5apyNYt/
H+wM2AKFuB1kr3GtlFz5l+xN3RO/2oBC3pUuu134u+0I9L6RMZg9eXlOGSjs
jmAs7otvr173xenl83Mua4BhBlhJ58o3mtYKUULIeRJ6Bs1PdkWVAs+rfhIn
9YTQtCdGn49hznImG9Taf74D2LMP8cYNuB/170Sm59W+xAkMhvXEox7B9q7o
EX7v2Di2FYD8DMaQH/6TmVIJnAxjKt845lSjdbf2EB7gBYf06PjzR0wELG/q
1iaubL3taS1fBHKxJZPUrKbh0i+lS++rUWDc7yr+0mlcmEaYNNxeF+d0oRFr
wZ7MqH1H27r6zhs+vOeRadTiFjkuADRj9j9gWlMoTz281LR0oyh7F1Kpoc3o
lSak1qf2wODKDR/C14Ht0cFW5mGZZUnKxkwAHmDdqvR03C+1dbFzzKjJ5a3t
Fn/DQmuqxFUBqlR2IiZixp1I3uU9Fge7X8xdDrKRtKaVcQNrFZLNj+YygIQu
5qA64Cis1FVifztPDxFwSZcPUoUWJMUmYP8ajCvm2g23pwKTUNiDjNaBeySS
myh3begm8M8i/HmIN3rQG64I1b6ONaUmBLImyPSXY1/fbb9sNo6YmBArUe+j
vN/BArwJwDxoK86pD6ySbW/wjB7DLZ2XrUW21ZuWRjKghWea28wj3Klt3Ggr
p9j3i+4qtWqx+nQwfEuctnRtoFu6fcmzYZOGlx2sswjtnOs0o1JahZ2dFfa1
Zgdd6uwXswcKHAIPxCrVOUZ+NI/K8f6BAR4EcBcKKhnbUbpu5xYAeol3lGgj
5Wbeht52LgrPFnBNoM6po5c4t3DdGfZrE6CgiuJSTda/xWDTH8HfmJtESpJQ
QZ8moK2mu8zi3S55EnwVhqvS5lMG8L1KUFqrDASbCDcOE19Gg8TqdZqGeM8N
hEMubwbruk7wZONh3GKLlqvVmryiRUGwU4lTd1spO8MPxmEuKgIwz0x7difZ
lRlWsJXVivJdwzTURnfdiqvKNlm8SLseuQqgYuZ2K6riLvp8x0uz264W1dgt
dvX8za2olvRv98zvV5W+7RJxfZqu6btfJhXvTY7igV9IlbZ9Cqc41zjI08HW
XGNHqpENTiXT2JForOQZKx3SQlUk2JjQ8gzTdFNgy+Jrblm0bc3c0UGiyvdv
1GO3HCKlsEyHUSdCo/eRfI9hI/oFed+lHIDx6G2Kb1uuaAsEonCCVsfkv7fa
p2F72PKZfhabyWHJljG9MGxe5GSbPUolI/OEHT1ls6CVVb7fprz5qd31aRsT
ukOlYesiFMyxNROjO1vOBdC2Uy4Hf0VFBsGkZIxRilYsRVRQCXstZ8m+LtHi
LqPpygRtJYJ0mbNJHCwhG+B122jY7FegSwFaI5ESWh/XHKuTfJV3HSF01PU/
0ibH7dqYuLNemSulHLy0muvLzIPpAOu4lqZzN9ivMz/ed6qy0ze5UeLPvemM
amqR7nhyaNEFLUPPyrKsIIeth8fiqsjHlnd7lNG/F1XoPbq+oX6IUb+Fogku
Q+9KKeLBciX9gTHaO9xe49xB49/O+ZAEf/sLBtwYlCAXn+LuUP/WnwsyiqyM
ZY7JNY3htWzcdxgobl5gj/amOpxyw7Fb0QgzuN5C3S2jOV2NYO7rKA/zu4Cr
4mu2RXbJh0Kl1+lS92l5NUKHw849SO32BoNUxr0MUtsivTIT23sZNuCu3aQZ
62wnZdgvZSlo0NhJTVcmeovG49DURKjvgWYj2LiZ5n1zfwDf5YTnIBV4jiqt
yOUVbX6196rGApdOtUFRN5hsteiNFsWGcfedcQ+r7ihWpTg4ASwoDASh1KBV
52toqh4wG5i3ptMdVZMe3Y6j9/vJ21quTfbSweRWc1MymaG0vCCM9fQVVrpc
caULdTlh+ImVM/DxNaz+imtyqK5H87G9dA9Ui3bw9/6DxTb1EqAPvVpgfl9x
UZ9Rv1et2ekZ15ZuZVSN31q1O+/eXZmMysFwH4nCgzznO26rKLtf2rzu1z40
jGLKTeciiYjl0r3RVFU27JaDAGCBVikp2+vgKHV5MXs5a2SkWqlLYgw9aK7V
UXh7KB8PmCuZ+BKjukOMNSvsX+wdHe6jf0EhHdVDvLaeJzZzGtmtZVFfSiCz
Z6/92EwrmbtnVWHhG1Nr1AoIz9ZrvJMRVR84nad+Gk9JaD3vCpS60NPS95Xw
JYf+u6fcjY22N8PkedZ5F6v4Q8eNp3+EkWt9zdbfnNbzQfdnOn/7TK5S/Ntn
szA9DJryDnwtmE/liLZZp4Y8aO3neFOSBjLBZ1DmLk4KEHK50KzF9Iip2TQX
upDTalCAOw4rxxk28WTNdfDrtNKslPsuUfnH7l5r5cPFeDyeTiaT6d7e3nQf
/vmt91f8exrcLqsxsmGokYcB/XPyPXZbfD/ZH40OR8eHk+/Ho6O9vaODvf2D
4fjgeHJ8vDc+HB+PRg3OGFjfdcEKj10+lclEh2AZnyZ+imZ4Kr4AN9lzF+eY
ccgRB58GnpwtSLNgpbuj4dj7C1g0unwaPxgXJR6gozNgCd0qwt4sQ6c7HpzR
tc1vCvC2JnviT0UiJqPJSIwOp3vj6d6R+PrFG4/LBlQwOKMyvamoDnSVFpkP
O/Ia5O14MhwNJ0DLL+QcyVQW+keTSSlUb9+cg1A9yLxPOvzfpcM/UdIGA2fw
q9k3cYWpIxb0T1bjk8T9LKth8526zPi12fvJsvwMyzIZjcbTsydH0+nk4CMa
F5M71D/ZyHyA1nx8XOJAG1OJ4l0tBfj+vxyx9r44OlZjqcbHe0dSTsJREAah
3D+aT0bBUXg09w/9yVj6e/uhfzCa7AUWKQ73wmN1uC/394JQBf7oE9J9TKT7
BHT/L4HuoynbzwVIMfPxsD5WwYLvQnpj6+D5RCKI8jSL6IbamwiEWdxiyUr9
X/mhuBZT4vE93j9Y+Zf3cMVk83eV5Xxx4BWJg8aLdfkuaZrTT4cBbP9zLu54
GxeYdn10kdyh2OzAkLMsUfSOlpwlfJPOI4n/pqXsuoileDT+3Zgy1OJ34gUs
QfKZ1xWMJ77J0mUMzz56cv6NeBrc8PX/pJI75l+igbvj/R9bAMmSAGoAAA==

-->

</rfc>

