<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-richardson-saag-onpath-attacker-04" category="info" updates="4949" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="MITM">A taxonomy of eavesdropping attacks</title>
    <seriesInfo name="Internet-Draft" value="draft-richardson-saag-onpath-attacker-04"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="J." surname="Hoyland" fullname="Jonathan Hoyland">
      <organization>Cloudflare Ltd.</organization>
      <address>
        <email>jhoyland@cloudflare.com</email>
      </address>
    </author>
    <date year="2024" month="December" day="13"/>
    <area>Security</area>
    <workgroup>Security Area Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 113?>

<t>The terms on-path attacker and MITM Attack have been used in a variety of ways, sometimes interchangeably, and sometimes meaning different things.</t>
      <t>Increasingly people have become uncomfortable with the gendered term "Man" in the middle and have sought alternatives.</t>
      <t>This document offers an update on terminology for network attacks, retaining some acronyms terms while redefining the expansion, and clarifying the different kinds of attacks.
Consistent terminology is important in describing what kinds of attacks a particular protocol defends against, and which kinds the protocol does not.</t>
    </abstract>
  </front>
  <middle>
    <?line 122?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A number of terms have been used to describe attacks against networks.</t>
      <t>In the <xref target="dolevyao"/> paper, the attacker is assumed to be able to:</t>
      <ul spacing="normal">
        <li>
          <t>view messages as they are transmitted</t>
        </li>
        <li>
          <t>selectively delete messages</t>
        </li>
        <li>
          <t>selectively insert or modify messages</t>
        </li>
      </ul>
      <t>Some authors refer to such an attacker as an "on-path" attacker [reference], or a "Man-in-the-Middle" [reference].</t>
      <t>Despite a broad consensus on what is meant by a MITM attack, there is less agreement on the how to describe its variants.
The term "passive attacker" has been used in many cases to describe situations where the attacker can only observe messages, but can not intercept, modify or delete any messages.</t>
      <t>Another variant is the case where an eavesdropper is not on the network path between the actual correspondants, and thus cannot drop messages, they may be able to inject packets faster than the correspondants, and thus beat legitimate packets in a race.</t>
      <t>As summarised, there are three broad  variations of the MITM attacker:</t>
      <ol spacing="normal" type="1"><li>
          <t>An on-path attacker that can view, delete and modify messages.  This is the Dolev-Yao attack.</t>
        </li>
        <li>
          <t>An off-path attacker that can view messages and insert new messages.</t>
        </li>
        <li>
          <t>An off-path attacker that can only view messages.</t>
        </li>
      </ol>
    </section>
    <section anchor="three-kinds-of-attack">
      <name>Three kinds of attack</name>
      <t>The attacks are numbered in this section as no consensus on naming the attacks yet.
In the diagrams below, the sender is named "Alice", and the recipient is named "Bob",
as is typical in many cryptographic protocols <xref target="alicebob"/>, as first introduced by <xref target="digisign"/>.</t>
      <t>Alice and Bob were named as expansions of "A" and "B", which would otherwise be very abstract concepts of the two end points.</t>
      <t>The attacker has historically been named "Mallory", but this document proposes that the expansion be named "Meddler"</t>
      <figure anchor="alicebobdiag">
        <name>Alice communicating with Bob</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="48" width="8" viewBox="0 0 8 48" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <g class="text">
</g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
]]></artwork>
        </artset>
      </figure>
      <section anchor="active-on-path-attacker-or-meddler-in-the-middle-mitm">
        <name>Active On-Path Attacker, or Meddler in the Middle (MITM)</name>
        <t>In this attack, the attacker is involved with the forwarding of the packets.
A firewall or network router is ideally placed for this attack.</t>
        <figure anchor="firstkind">
          <name>On Path Attacker</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="96" width="320" viewBox="0 0 320 96" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,64" fill="none" stroke="black"/>
                <path d="M 264,32 L 264,64" fill="none" stroke="black"/>
                <path d="M 312,32 L 312,64" fill="none" stroke="black"/>
                <path d="M 8,32 L 72,32" fill="none" stroke="black"/>
                <path d="M 264,32 L 312,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 72,64" fill="none" stroke="black"/>
                <path d="M 264,64 L 312,64" fill="none" stroke="black"/>
                <g class="text">
                  <text x="168" y="36">╭─────────╮</text>
                  <text x="40" y="52">Alice</text>
                  <text x="104" y="52">──────│</text>
                  <text x="168" y="52">Meddler</text>
                  <text x="232" y="52">│─────&gt;</text>
                  <text x="288" y="52">Bob</text>
                  <text x="168" y="68">╰─────────╯</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
   .-------.      ╭─────────╮      .-----.
   | Alice |──────│ Meddler │─────>| Bob |
   '-------'      ╰─────────╯      '-----'
]]></artwork>
          </artset>
        </figure>
        <t>In this case the Meddler can:</t>
        <ul spacing="normal">
          <li>
            <t>view all packets</t>
          </li>
          <li>
            <t>selectively forward or drop any packet</t>
          </li>
          <li>
            <t>modify any packets that is forwarded</t>
          </li>
          <li>
            <t>insert additional packets</t>
          </li>
        </ul>
      </section>
      <section anchor="passive-on-path-attack">
        <name>Passive On-Path attack</name>
        <t>In this attack, the attacker is not involved with the forwarding of the packets.
The attacker receives a copy of packets that are sent along the path.
This could be from, for instance, a mirror port or SPAN <xref target="span"/>.
Alternatively, a copy of traffic may be obtained via passive (optical) tap <xref target="fibertap"/>.
This kind of attack is often associated with Pervasive Monitoring <xref target="RFC7258"/>.</t>
        <figure anchor="secondkind">
          <name>Passive On-Path attack</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="176" width="320" viewBox="0 0 320 176" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,64" fill="none" stroke="black"/>
                <path d="M 168,64 L 168,96" fill="none" stroke="black"/>
                <path d="M 264,32 L 264,64" fill="none" stroke="black"/>
                <path d="M 312,32 L 312,64" fill="none" stroke="black"/>
                <path d="M 8,32 L 72,32" fill="none" stroke="black"/>
                <path d="M 264,32 L 312,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 72,64" fill="none" stroke="black"/>
                <path d="M 264,64 L 312,64" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="176,96 164,90.4 164,101.6 " fill="black" transform="rotate(90,168,96)"/>
                <g class="text">
                  <text x="40" y="52">Alice</text>
                  <text x="168" y="52">──────────────────────&gt;</text>
                  <text x="288" y="52">Bob</text>
                  <text x="168" y="116">╭─────────╮</text>
                  <text x="128" y="132">│</text>
                  <text x="168" y="132">Meddler</text>
                  <text x="208" y="132">│</text>
                  <text x="168" y="148">╰─────────╯</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
   .-------.                       .-----.
   | Alice |──────────────────────>| Bob |
   '-------'           |           '-----'
                       |
                       v
                  ╭─────────╮
                  │ Meddler │
                  ╰─────────╯
]]></artwork>
          </artset>
        </figure>
        <t>In this the meddler can:</t>
        <ul spacing="normal">
          <li>
            <t>view all packets</t>
          </li>
        </ul>
        <t>Note that they have no way to inject new packets, and this attack may occur seconds to decades after the data was exchanged.</t>
      </section>
      <section anchor="passive-on-path-attack-with-bypass">
        <name>Passive On-Path attack with bypass</name>
        <t>In some cases, the Meddler is be able to send messages to Bob via another route.
Due to some other factor (such as shorter or higher cost routing), these messages arrive at Bob prior to the original message from Alice.</t>
        <figure anchor="racedkind">
          <name>Passive On-Path attack with bypass</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="176" width="360" viewBox="0 0 360 176" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,64" fill="none" stroke="black"/>
                <path d="M 120,64 L 120,96" fill="none" stroke="black"/>
                <path d="M 304,32 L 304,64" fill="none" stroke="black"/>
                <path d="M 352,32 L 352,64" fill="none" stroke="black"/>
                <path d="M 8,32 L 72,32" fill="none" stroke="black"/>
                <path d="M 304,32 L 352,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 72,64" fill="none" stroke="black"/>
                <path d="M 304,64 L 352,64" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="128,96 116,90.4 116,101.6 " fill="black" transform="rotate(90,120,96)"/>
                <g class="text">
                  <text x="228" y="36">╭──╮</text>
                  <text x="40" y="52">Alice</text>
                  <text x="136" y="52">──────────────╮</text>
                  <text x="216" y="52">│</text>
                  <text x="240" y="52">│</text>
                  <text x="284" y="52">╭──&gt;</text>
                  <text x="328" y="52">Bob</text>
                  <text x="192" y="68">│</text>
                  <text x="216" y="68">│</text>
                  <text x="240" y="68">│</text>
                  <text x="272" y="68">│</text>
                  <text x="192" y="84">│</text>
                  <text x="216" y="84">│</text>
                  <text x="256" y="84">╰───╯</text>
                  <text x="328" y="84">^</text>
                  <text x="192" y="100">│</text>
                  <text x="216" y="100">│</text>
                  <text x="328" y="100">│</text>
                  <text x="120" y="116">╭─────────╮</text>
                  <text x="204" y="116">╰──╯</text>
                  <text x="328" y="116">│</text>
                  <text x="80" y="132">│</text>
                  <text x="120" y="132">Meddler</text>
                  <text x="244" y="132">│────────────────────╯</text>
                  <text x="120" y="148">╰─────────╯</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
   .-------.                 ╭──╮       .-----.
   | Alice |──────────────╮  │  │   ╭──>| Bob |
   '-------'     |        │  │  │   │   '-----'
                 |        │  │  ╰───╯      ^
                 v        │  │             │
            ╭─────────╮   ╰──╯             │
            │ Meddler │────────────────────╯
            ╰─────────╯
]]></artwork>
          </artset>
        </figure>
        <t>In that the Meddler can:</t>
        <ul spacing="normal">
          <li>
            <t>view all packets</t>
          </li>
          <li>
            <t>insert additional/copied packets into the stream</t>
          </li>
        </ul>
        <t>But the Meddler is unable to drop or modify the original packets.
Bob however, may be unable to distinguish packets from Alice vs packets sent from the Meddler that purport to be from Alice.</t>
        <t>To be effective or useful, this type of attack needs to occur in real time.</t>
      </section>
      <section anchor="passive-off-path-attacker">
        <name>Passive Off-path attacker</name>
        <t>The third kind of attack is one in which the Meddler can not see any packets from Alice.
This is usually what is meant by an "off-path" attack.
The meddler can forge packets purporting to be from Alice, but can never see Alice's actual packets.</t>
        <figure anchor="thirdkind">
          <name>Passive Off-path attacker</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="176" width="352" viewBox="0 0 352 176" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,64" fill="none" stroke="black"/>
                <path d="M 296,32 L 296,64" fill="none" stroke="black"/>
                <path d="M 344,32 L 344,64" fill="none" stroke="black"/>
                <path d="M 8,32 L 72,32" fill="none" stroke="black"/>
                <path d="M 296,32 L 344,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 72,64" fill="none" stroke="black"/>
                <path d="M 296,64 L 344,64" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Alice</text>
                  <text x="184" y="52">──────────────────────────&gt;</text>
                  <text x="320" y="52">Bob</text>
                  <text x="320" y="84">^</text>
                  <text x="320" y="100">│</text>
                  <text x="120" y="116">╭─────────╮</text>
                  <text x="320" y="116">│</text>
                  <text x="80" y="132">│</text>
                  <text x="120" y="132">Meddler</text>
                  <text x="240" y="132">│───────────────────╯</text>
                  <text x="120" y="148">╰─────────╯</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
   .-------.                           .-----.
   | Alice |──────────────────────────>| Bob |
   '-------'                           '-----'
                                          ^
                                          │
            ╭─────────╮                   │
            │ Meddler │───────────────────╯
            ╰─────────╯
]]></artwork>
          </artset>
        </figure>
        <t>In this the Meddler can:</t>
        <ul spacing="normal">
          <li>
            <t>insert additional packets</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="existing-uses-of-the-terms">
      <name>Existing uses of the terms</name>
      <section anchor="ietf-quic-terms">
        <name>IETF QUIC terms</name>
        <t><xref target="quic"/> ended up the following taxonomy:</t>
        <dl>
          <dt>on-path:</dt>
          <dd>
            <t>[Dolev-Yao] MITM, Active On-Path attacker</t>
          </dd>
          <dt>Limited on-path (cannot delete):</dt>
          <dd>
            <t>Active Off-Path attacker</t>
          </dd>
          <dt>Off-path:</dt>
          <dd>
            <t>Passive Off-Path attacker</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document introduces a set of terminology that will be used in many Security Considerations sections.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no IANA requests.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The SAAG mailing list.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="36"/>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="dolevyao" target="https://www.cs.huji.ac.il/~dolev/pubs/dolev-yao-ieee-01056650.pdf">
          <front>
            <title>On the Security of Public Key Protocols</title>
            <author>
              <organization/>
            </author>
            <date year="1983"/>
          </front>
        </reference>
        <reference anchor="quic" target="https://mailarchive.ietf.org/arch/msg/saag/wTtDYlRAADMmgqd6Vhm8rFybr_g/">
          <front>
            <title>QUIC terms for attacks</title>
            <author>
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="malory" target="https://mailarchive.ietf.org/arch/msg/saag/b26jvEz4NRHSm-Xva6Lv5-L8QIA/">
          <front>
            <title>Man-in-the-Middle</title>
            <author>
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="span" target="https://en.wikipedia.org/wiki/Port_mirroring">
          <front>
            <title>Port Mirroring</title>
            <author>
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="fibertap" target="https://en.wikipedia.org/wiki/Room_641A">
          <front>
            <title>Fiber Tap</title>
            <author>
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="alliteration" target="https://mailarchive.ietf.org/arch/msg/saag/R0uevzT0Vz9uqqaxiu98GtK1rks/">
          <front>
            <title>Council of Attackers</title>
            <author>
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="alicebob" target="https://en.wikipedia.org/wiki/Alice_and_Bob">
          <front>
            <title>Alice and Bob</title>
            <author>
              <organization/>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="digisign" target="https://doi.org/10.1145/359340.359342">
          <front>
            <title>A method for obtaining digital signatures and public-key cryptosystems</title>
            <author initials="R. L." surname="Rivest" fullname="R. L. Rivest">
              <organization>MIT Lab. for Computer Science and Department of Mathematics, Cambridge, MA</organization>
            </author>
            <author initials="A." surname="Shamir" fullname="A. Shamir">
              <organization>MIT Lab. for Computer Science and Department of Mathematics, Cambridge, MA</organization>
            </author>
            <author initials="L." surname="Adleman" fullname="L. Adleman">
              <organization>MIT Lab. for Computer Science and Department of Mathematics, Cambridge, MA</organization>
            </author>
            <date year="1978" month="February"/>
          </front>
        </reference>
        <reference anchor="RFC7258">
          <front>
            <title>Pervasive Monitoring Is an Attack</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="188"/>
          <seriesInfo name="RFC" value="7258"/>
          <seriesInfo name="DOI" value="10.17487/RFC7258"/>
        </reference>
      </references>
    </references>
    <?line 292?>

<section anchor="monster-in-the-middle">
      <name>Monster in the Middle</name>
      <t>As a special case for the MITM, if the Meddler steals cookies (whether they are HTTP Cookies, IKE nonces, or TCP SYN Cookies), then this kind of attack is a Monster in The Middle.
This is otherwise known as a: nom-nom-nom-nom attack.</t>
      <artset>
        <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="288" width="376" viewBox="0 0 376 288" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
            <path d="M 88,192 L 88,200" fill="none" stroke="black"/>
            <path d="M 104,160 L 104,168" fill="none" stroke="black"/>
            <path d="M 216,160 L 216,168" fill="none" stroke="black"/>
            <path d="M 232,192 L 232,200" fill="none" stroke="black"/>
            <path d="M 312,272 L 312,280" fill="none" stroke="black"/>
            <path d="M 120,32 L 152,32" fill="none" stroke="black"/>
            <path d="M 168,32 L 200,32" fill="none" stroke="black"/>
            <path d="M 120,80 L 152,80" fill="none" stroke="black"/>
            <path d="M 168,80 L 200,80" fill="none" stroke="black"/>
            <path d="M 64,112 L 96,112" fill="none" stroke="black"/>
            <path d="M 224,112 L 256,112" fill="none" stroke="black"/>
            <path d="M 304,160 L 344,160" fill="none" stroke="black"/>
            <path d="M 136,176 L 152,176" fill="none" stroke="black"/>
            <path d="M 168,176 L 184,176" fill="none" stroke="black"/>
            <path d="M 120,208 L 144,208" fill="none" stroke="black"/>
            <path d="M 176,208 L 200,208" fill="none" stroke="black"/>
            <circle cx="144" cy="64" r="6" class="opendot" fill="white" stroke="black"/>
            <circle cx="176" cy="48" r="6" class="opendot" fill="white" stroke="black"/>
            <circle cx="304" cy="208" r="6" class="opendot" fill="white" stroke="black"/>
            <circle cx="320" cy="176" r="6" class="opendot" fill="white" stroke="black"/>
            <circle cx="344" cy="192" r="6" class="opendot" fill="white" stroke="black"/>
            <g class="text">
              <text x="112" y="52">:</text>
              <text x="160" y="52">:</text>
              <text x="208" y="52">:</text>
              <text x="252" y="52">me</text>
              <text x="284" y="52">want</text>
              <text x="336" y="52">cookie!</text>
              <text x="96" y="68">_..-:</text>
              <text x="160" y="68">:</text>
              <text x="224" y="68">:-.._</text>
              <text x="280" y="68">/</text>
              <text x="60" y="84">.-''</text>
              <text x="96" y="84">'</text>
              <text x="216" y="84">"</text>
              <text x="260" y="84">``-.</text>
              <text x="36" y="100">.'</text>
              <text x="72" y="100">"</text>
              <text x="104" y="100">'</text>
              <text x="128" y="100">"</text>
              <text x="152" y="100">.</text>
              <text x="192" y="100">"</text>
              <text x="216" y="100">.</text>
              <text x="232" y="100">'</text>
              <text x="256" y="100">"</text>
              <text x="284" y="100">`.</text>
              <text x="24" y="116">:</text>
              <text x="56" y="116">'</text>
              <text x="160" y="116">,,.,...,.,.,.,.</text>
              <text x="280" y="116">'</text>
              <text x="296" y="116">;</text>
              <text x="28" y="132">`.</text>
              <text x="48" y="132">"</text>
              <text x="68" y="132">`.</text>
              <text x="252" y="132">.'</text>
              <text x="272" y="132">"</text>
              <text x="292" y="132">.'</text>
              <text x="36" y="148">`.</text>
              <text x="72" y="148">'`.</text>
              <text x="244" y="148">.'</text>
              <text x="264" y="148">'</text>
              <text x="284" y="148">.'</text>
              <text x="44" y="164">`.</text>
              <text x="100" y="164">`-._</text>
              <text x="220" y="164">_.-'</text>
              <text x="248" y="164">"</text>
              <text x="276" y="164">.'</text>
              <text x="60" y="180">`.</text>
              <text x="80" y="180">"</text>
              <text x="124" y="180">'"</text>
              <text x="160" y="180">.</text>
              <text x="196" y="180">"'</text>
              <text x="224" y="180">.</text>
              <text x="240" y="180">'</text>
              <text x="260" y="180">.'</text>
              <text x="292" y="180">.'</text>
              <text x="356" y="180">`.</text>
              <text x="80" y="196">.'`-._'</text>
              <text x="144" y="196">"</text>
              <text x="160" y="196">.</text>
              <text x="208" y="196">"</text>
              <text x="244" y="196">_.-'`.</text>
              <text x="280" y="196">:</text>
              <text x="368" y="196">:</text>
              <text x="16" y="212">jgs</text>
              <text x="44" y="212">.'</text>
              <text x="108" y="212">``</text>
              <text x="160" y="212">...</text>
              <text x="212" y="212">''</text>
              <text x="256" y="212">'</text>
              <text x="280" y="212">`:_</text>
              <text x="368" y="212">:</text>
              <text x="28" y="228">.'</text>
              <text x="72" y="228">"</text>
              <text x="120" y="228">'</text>
              <text x="200" y="228">"</text>
              <text x="248" y="228">"</text>
              <text x="280" y="228">;</text>
              <text x="332" y="228">`.;";";";'</text>
              <text x="16" y="244">;</text>
              <text x="96" y="244">'</text>
              <text x="160" y="244">"</text>
              <text x="224" y="244">'</text>
              <text x="272" y="244">.</text>
              <text x="288" y="244">;</text>
              <text x="308" y="244">.'</text>
              <text x="328" y="244">;</text>
              <text x="344" y="244">;</text>
              <text x="360" y="244">;</text>
              <text x="8" y="260">;</text>
              <text x="56" y="260">'</text>
              <text x="136" y="260">'</text>
              <text x="200" y="260">'</text>
              <text x="232" y="260">"</text>
              <text x="276" y="260">.'</text>
              <text x="344" y="260">.-'</text>
              <text x="8" y="276">'</text>
              <text x="32" y="276">"</text>
              <text x="80" y="276">"</text>
              <text x="112" y="276">'</text>
              <text x="168" y="276">"</text>
              <text x="264" y="276">"</text>
              <text x="316" y="276">_.-'</text>
            </g>
          </svg>
        </artwork>
        <artwork type="ascii-art"><![CDATA[
              .---. .---.
             :     : o   :    me want cookie!
         _..-:   o :     :-.._    /
     .-''  '  `---' `---' "   ``-.
   .'   "   '  "  .    "  . '  "  `.
  :   '.---.,,.,...,.,.,.,..---.  ' ;
  `. " `.                     .' " .'
   `.  '`.                   .' ' .'
    `.    `-._           _.-' "  .'  .----.
      `. "    '"--...--"'  . ' .'  .'  o   `.
      .'`-._'    " .     " _.-'`. :       o  :
jgs .'      ```--.....--'''    ' `:_ o       :
  .'    "     '         "     "   ; `.;";";";'
 ;         '       "       '     . ; .' ; ; ;
;     '         '       '   "    .'      .-'
'  "     "   '      "           "    _.-'
]]></artwork>
      </artset>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="E." surname="Rescola" fullname="Eric Rescola">
        <organization/>
        <address>
          <email>ekr@rtfm.com</email>
        </address>
      </contact>
      <contact initials="L." surname="Berger" fullname="Lou Berger">
        <organization/>
        <address>
          <email>lberger@labn.net</email>
        </address>
      </contact>
      <contact initials="A." surname="DeKok" fullname="Alan DeKok">
        <organization/>
        <address>
          <email>aland@deployingradius.com</email>
        </address>
      </contact>
      <contact initials="C." surname="Huitema" fullname="Christian Huitema">
        <organization/>
        <address>
          <email>huitema@huitema.net</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8Va63bbuBH+z6dAlR9KWol2skmaKKdttE6ym26cdW33smfP
1oFISEJMEgxASqtN0tPTZ2gfo5dn6pP0mwEokrKdxL2cKl5bIoDBYC7ffAPt
eDyOKl1laiKmopLfm8LkG2HmQsmVcqk1ZamLhZBVJZNzF8nZzKrVRBw+Pz2M
6jKVlXITcffh3YdRapJC5pCTWjmvxlYnS2lTZ4qxk3IxNkUpq+XYC1J2vH83
ilwli/RMZqbAssrWKop0afmtq+7s7z/cvxNJq+REnKiktrraROtF+0FMMSZ+
a+w5qfiFNXUZna8n4nlRKVuoavyENIkSWU2ELuYmiko9EXjdEIksRO2UkNbK
jbip50Jmmdgod0sYK5bSLcVSWRUJUZlkQgN464ytrJq7CYtI1VzWWeUwoxnf
5H6YPkayrpbGTqJojM3x8DAWx1ubYLY31iE9Ull/yFg6JWyjshyKnph5tYYd
+Ki0kcqlziYiT+xPtKrmj10zNU7kdr9fxuJLs8kwtN3sl6aADyCxHeCtDjJT
p/OMtnhRpXG7w+uln/g42c6IE5NHhbG5rPRKTTD3+NkBBQBOSkbuDKQmU6uN
NPQehpR2oeCJwbKqSjfZ21uv13Hi4mX9WscyiXW29wdesVfWM7fHb8dYPdZK
qfH+7f179+/f24/LdD7w8nzUDr4uRLVUbVAgdo/qWaYT8ZXaiCNr4EGTOb+I
jstvhDfS86dPn/JniuSJuP3wwWcRPr+pdXKF1mQYaZMlzhiT8WOI3KMHe7lb
7FGo761PqyffZMfT6ZPDfPEmvf+bZf7APtvM7Nlir6/7r379/EAgWHMnYLkm
y65S9fRZR9U7+3f2SdUc6WM3/76yszv3X6+e/nD35fGXJ/n4dyt5/8Xq3vjF
g189n+4oeyiLsS7GMPb4UKdppq6lpytlcYWWqojX+lyXKtWSNaRPe0fItrNc
W2ss0ruvCo0hdXpju3r8thF5iTJzPVO2kuW1FDo2Jj+7f/f2tK/LM5IlTmV5
XTXwAKCj4X5kjLnKOJ/gwuP9Wq1+ON3/zQ8P6zdv5Pe6fvjgi+qr2wCLHRce
mLpIdEY5Mg1AfL1ok8grNTOzaxluSovOCOo/N7O+QjwkMCS2Q9fxY6oX2ulF
Y7tGqMgVsDflnDKzSuqCCgRNrmQmaIGsaqscb1wyWIzPARaJ3ZSVcRtXqTzY
5cIRU6P5ZLf349u3797b++zew8/u7sf8545f0yC/P8Q4/G1AeHAcixdUC1Bf
q8F2kIF4gLoqXshZzKofmLysER7iJNGqCHZ6okppq1wVFXnxEHiuCHETNxIH
Mp9ZnS7USBxOB1dtP43FyVIisf4Pe+PcUwAHKtX/evPdKELo53ld6IRzzZEI
qhrTg8NBJ64Gz9TM1tJuUAl++mAQRYkpKqtndeX9OQ4HeQp2I46VQ2HxYRnq
pTq3j201z7lIttNfmFp8rhBItjs5m/Gjx5mcFTHoSmfBFEUXB/7KnHcXSC7F
qSozs0FAW5nq2u1sdbC02lWaanwNaMl76i39o8fhL28KvjAeCzlzlZUJPp7C
Kr4igbkRZRMNZWMvEPEL2AGatFJiphRTqRR2FlKspAVKcRVeyw184wySUedI
Nk20DCynWCg5yzYjltcO50qGNJ3PQb3g5mqJzy6OoudFAqbn8CnbiFKZMlPN
5ji9EgA1kyNwKshVYq2hNDl3oUCLLDSj83D9GpCSNJRzAWMNWJAz9WJZwcLE
HJnA0L6nS+3AYpI6RB30IswQnvjCQCxZFyYziw1HLiy6BklrKvlIWNXAD51U
yMSaYgPjehOvlxpaQEU195NIN/U9SqVDlHoLJYB/Pd80o615wHpTDuSwWRwd
ILLhfbZdRzEcQuclmQcDMECKwEVQk8T1Ul4UBDdSqumkxtaiDAyKCK+iiXKB
E7nKa4cTJMsggdRrZxv4tDBV7APMGzyKbhA7tyatE8rDKJqKos6pgFJCsk12
ogrsOuirWv28Bo21fYjw9t82nPM7HKFUdsRPtxEMS0jn4E6WSxIpYCow1OjH
YqXVGlHonFxQaeDzbASRYqRG4XJdVSrFPKcylVCIIBhBuxUioVm1MwolQTOo
o8gN/LZp50UnHA1cKBwCAC4ljVwNYyLA2pTjeBuEVBy0A9/yGgLH70a0gbyM
n3VnwUZPlCuR+Jg7s0YishAuqnA1pbqPBO3TsBIzHNznut+R7QhLYEKGM8AD
VimfFd7wS7PuuUqjMSIsgDC4pwEVMShhfxhne5ABNVt9EEF1QCmWTrmeRKer
OoD3mnXpeZYaOlPA5mYGm69al4wE0JuHEYwBg1SJ6A0uge2CE2nbZhWsNcV8
7NOcgo5OO5JiQQHIbLtkH120R7BIAwWMoTN8oDOyzgkOksH6FhSkNEVKNvLZ
VC3hDOhKYkhq5xQcjDma1TZqcZrXiDXsABPA3nPpqGhyh8eqXrXDTMHXmQId
0jkBWSOAERxlQNHxHaIxz3F4uKVxPyfDEq4PEeSN06uonaBR1P3eRskvLtaS
isKNvEJZN2pdkO6mSiwEw3Aw/xNuC7+RJoiKozt+g/n8Qzt08rpIm7wsOs/j
6LOPyeHw6gmLCc9O2R47GOrr6BavYDYPcz7CKzqQUwyBlOKF6eciSnkD942I
jQKSBpADF0bxz8mPmVl7iHNc6zgEJcGbZ9aDxulUZBJdauUDOcwhzj2KpDfu
pgQ5ytoEZC6MfUog/BbWnXj7tukB3r8fkfJzbR0nFqM6xAI73r5tmPn79xRL
XZYv1hRJXgMs31Y7tt5gOuB5g8+huq8ta1NnqeBcXCMWKf5XCgytoSxkOsro
bQQi7YQiYm80g0/HFYrvdgTMD0JHx802HnuCQQ7xBN30wING1Sv/MEFpGJQo
IHqFmnRqJChCXnDr6A94CSndauHf+1f0diJuNBYkR/qu5WehE0palkrVmZgM
Oek9aNqNG2LKhUV8XYyPKESbFo4LQNi4ITi+AoiblI63Qnmk6teiea8q6mJl
shUOsCVPYDNraVNSI9g1oESMmg2fqzXdmHUojzVM2UlYqtiyZSYpHogXdTaP
e6YBOY3H/hV7uv7Pv/z1n3/+45U/f/mbn+ZX0V2VeCe88d5dtuJPW8vg/c7o
z99xQL4jIcOgxbDR4h8f1OLvfppfNdx1MOcEQULj3a8L0XMZebTxCVcU9llQ
NKGbkoaQkJWD5aMdehFcxCWMigWlrZ9KMwOOtg9D5GrXLASbwbwAhjJNNeGR
7GyHkDsK9bqJuQbePhZQvtheI6h6SQqwUsTBUY4SU3I30TsDAaqjpKS740UQ
VC1jz9gTRgzk5NyafMTxR3RRAiaAWMLfKQkixGS6k6PpSwAW3U8RWE3bFoB7
lK0CAJv5HFAYarC/V8DhVprosrfSTVNWBCu3RCVLCG3umUgwq8Yxsa0SZCgz
B18nVmoSVNLGWEfgMJJFHppCV3zNBXm/OH528NM79x4wqn4wiy68PjVfrvfz
gQzi17vO+yZXrlDw3VUDq0sGPgoSl63pY8GlUj+S9Lt5jhoOdtVN9MvzpZvu
3H5+NNNfmkptK83GN0WgCeipO8SPCExY0RT6bUpynJokqa3wWgY2nciU8mru
maKiiw8JsVSIfW+exh9IfB+dsw0FPB+Ju1om66MehmnXJarETloKhgcUNJQ4
MpBsLh5x9KT200moH5ijwiNJb/rOCKwJDROpTt/S6AXNSAzoB61HitxiJZzq
0D1rfbvBW5ZWG260SFUk1UIT3oXJDBc+Na6RXW0kNpXpP001kkOx6n+1G1yd
a9ssa5eFtfz7ysS7bF03BZoq9/uLS1cXl/ZTrbfkU2p6u3Oz7VXCPljTr/eD
lO7reU0AoGbpE/K/mzZbLAgs8lOq/oUavYeqpFEs2s4tBDU4sZJ5FH1eV7v5
WBdNOjJbaG8lesmwLcgUa+jq1YoIZih6HRF0y1gsau2Wbf+5zR+xctunXKd5
qKsPH7+sLVdhfxfTS79TfqTmc892SNvaqXmdjQKKbkrVKaSFUh7gPOKBBMMM
maCbxTjq49lugxeuPJcaTOqS8lwokuZbkR13MclxSvU4VvcUTeNau5oJ8cU7
FrrbCQoNtvz4tF8hiMAs2iY9GI0bxB27de46yG2sGw8MXXPrsHXvNemDEP8r
CnEdOrH7+giluOR1CZRd+fp3UOyjMv5b4PWfIhcH/KXItZsgu+RlF7A+1ECI
p997oKDsbTt0uujlrKSvGUX7LXgUfUtfvX9H/TvQrS5D14CufM0BH/4HFewb
bpQm0UR8u70U+o6vn0a7jXKb6i90rolkN/dRN5vLNr5/ukXSmrUww87ixjI0
q2utnWk32v8XgS/k0/AFr9v9QmF7Z0J9jlNVcwfe3NszRq41SgFBb/d29IoN
mjslfzH1fPpy+hENcnnOt/R+rlVvauUqv3qanBdmnal0wfe8zsPkyXT6haAv
k8gbGVzLcw+YOELn8G3SjFvEG9S78I1k706CrxZx3lKh4cl89+uvCFTwnp73
4gwiZEZdnTnX0PbmeqmYGm6v5788PT3CQXl4JJ5/9RQnQq/n+F7k9OBInHzz
shn3DDFE80W4l12dT7c6t1De3kORefj2Tk6wXz7u/HfVTUfnFTPWxg2etq9J
+G2a96DCayoX/vw/amefxfGYZphmzTiOz+jNXhS2GAI78fOKUdT/HmDg1Su/
aUzQSg+G/Iehn//6z69oEokespqjUTyK43gU/vkDYOqjiKZiwavLa0dMm8aM
0TRjeOk0TBqGSUEOdDzrTDiLvfKkczzumI23JiUHeEZaDYb+CDxzKNiQr5rZ
8ZDkDv1JvSIDlg0xk7AVFkyi1wvn7cP2esWySfpwyA9hzskZi2bLR8GYXhXR
lqzB9vcjKPFowP9wzEfbGcPezOZzjBmQ+Ij+RY92hA47fwfBen4VSuGwu+mw
L3v7nk7MsRn9C/NDlW8AKAAA

-->

</rfc>
