<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wing-opsawg-authenticating-network-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.14.2 -->
  <front>
    <title abbrev="Resolver-based Network Identity">Asserting Wireless Network Connections Using DNS Revolvers' Identities</title>
    <seriesInfo name="Internet-Draft" value="draft-wing-opsawg-authenticating-network-00"/>
    <author initials="D." surname="Wing" fullname="Dan Wing">
      <organization>Citrix</organization>
      <address>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author initials="T." surname="Reddy" fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2022" month="September" day="22"/>
    <workgroup>Operations and Management Area Working Group</workgroup>
    <keyword>network</keyword>
    <keyword>security</keyword>
    <abstract>
      <t>This document describes how a host uses the encrypted DNS server identity to reduce
an attacker's capabilities if the attacker is emulating a wireless network.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://example.com/LATEST"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-wing-opsawg-authenticating-network/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        OPSAWG Working Group mailing list (<eref target="mailto:opsawg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/opsawg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/opsawg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/danwing/authenticating-network"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>When a user connects to a wireless network the user
or their device want to be sure the connection is to the expected
network, as different networks provide different services in terms of
performance, security, access to split-horizon DNS servers, and so on.  Although 802.1X provides layer 2
security for both Ethernet and Wi-Fi networks, 802.1X is not widely deployed
-- and often applications are
unaware if the underlying network was protected with 802.1X.</t>
      <t>An attacker can operate a rogue WLAN access point
with the same SSID and WPA-PSK as a victim's network <xref target="Evil-Twin"/>.  Also,
there are many deployments (for example, coffee shops and bars) that offer free Wi-Fi connectivity
as a customer incentive.  Since these businesses are not
Internet service providers, they are often unwilling and/or
unqualified to perform advanced (sometimes, complex) configuration on their network.  In
addition, customers are generally unwilling to do complicated
provisioning on their devices just to obtain free Wi-Fi.  This leads
to a popular deployment technique -- a network protected using a
shared and public Pre-Shared Key (PSK) that is printed on a sandwich
board at the entrance, on a chalkboard on the wall or on a menu.  The
PSK is used in a cryptographic handshake, defined in <xref target="IEEE802.11"/>,
called the "4-way handshake" to prove knowledge of the PSK and derive
traffic encryption keys for bulk wireless data. The same deployement
technique is typically used in residential or small office/home office
networks. If the PSK for the wireless authentication is
the same for all devices that connect to the same WLAN, the shared key
will be available to all nodes, including attackers, so it is possible
to mount an active on-path attack.</t>
      <t>This document describes how a wireless client can utilize
network-advertised encrypted DNS servers to ensure that the attacker has no
more visibility to the client's DNS traffic than the legitimate
network. In cases where the local network provides its own encrypted
DNS server, the client can even ensure it has re-connected to the same
network, offering the client enough information to positively detect a
significant change in the encrypted DNS server configuration -- a
strong indicator of an attacker operating the network.</t>
      <t>The proposed
mechanism is also useful in deployments using Opportunistic Wireless
Encryption <xref target="RFC8110"/> and in LTE/5G mobile networks where the long-term
key in the SIM card on the UE can be compromised (Section 1 of <xref target="AKA"/>).</t>
      <t>The theory of operation is described mainly from the perspective of a host that connects to a network. Further interactions may be considered
to seek for specific actions from a user (e.g., consent, validation). Whether and how such interactions are supported is implementation-specific and are, as such,
out of scope.</t>
      <t>The document assumes that the host supports at least one encrypted DNS scheme (e.g., DNS over TLS or DNS over HTTPS).</t>
      <t>The current version of the specification focuses on wirless networks. The applicability to other network types may be assessed in future versions.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="theory-of-operation">
      <name>Theory of Operation</name>
      <t>A host connects to a network and obtains network-related information via DHCPv4, DHCPv6, or RA.
The network indicates its encrypted DNS server using either <xref target="DNR"/> or <xref target="DDR"/>. If the host supports an encrypted DNS scheme that is advertised by the network, the host then connects
to at least one of the designated encrypted DNS servers, completes the TLS handshake, and performs public key validation of
the presented certificate following conventional procedures.</t>
      <t>The host can associate the network name with the encrypted DNS server's
identity that was learned via <xref target="DNR"/> or <xref target="DDR"/>. The type of the network name is
dependent on the access technology to which the host is attached.
For networks based on IEEE 802.11, the network name will be the SSID of
the network and the PSK. The PSK is used along with SSID to uniquely identify the network to deal with common Wi-Fi names such as
"Airport WiFi" or "Hotel WiFi" or "Guest" but are distinct networks with different PSK. The combination of SSID and PSK is useful
in deployments where the same Wi-Fi name is used in many locations around the world, such as branch offices of a corporation.
It is also useful in Wi-Fi deployments that have multiple Basic Service Set Identifiers (BSSIDs) where 802.11r coordinates session keys amongst access points.
However, in deployments using Opportunistic Wireless Encryption, the network name will be the SSID of the network
and BSSID. For 3GPP access-based networks, it
is the Public Land-based Mobile Network (PLMN) Identifier of the access network, and for 3GPP2 access,
the network name is the Access-Network Identifier (see <xref target="RFC7839"/>).</t>
      <t>If DDR is used for discovery, the host would have to perform verified discovery as per Section 4.2 of <xref target="DDR"/>
and the encrypted DNS server identity will be the encrypted DNS server's IP address.</t>
      <t>If DNR is used, the encrypted DNS server identity will be the Authentication Domain Name (ADN).</t>
      <t>If this is the first time the host connects to that encrypted DNS server, the hosts follows <xref target="DNR"/> or <xref target="DDR"/> validation procedures,
which will authenticate and authorize that encrypted DNS server's identity.</t>
      <t>Better authentication can be performed by verifying the encrypted DNS
server's certificate with the identity provided in an extended Wi-Fi
QR code (<xref target="qr"/>), consulting a crowd-sourced database, reputation
system, or -- perhaps best -- using a matching SSID and SubjectAltName
described in <xref target="avoid-tofu"/>.</t>
      <t>After this step, the relationship of SSID, PSK, encrypted resolver
discovery mechanism, and SubjectAltName are stored on the host.</t>
      <t>For illustrative purposes, <xref target="example"/> provides an example of the data stored for
two Wi-Fi networks, "Example WiFi 1" and "Example WiFi 2" (showing hashed
PSK),</t>
      <figure anchor="example">
        <name>An Example of Data Stored for Two WiFi Networks</name>
        <artwork><![CDATA[
{
  "networks": [
    {
      "SSID": "Example WiFi 1",
      "PSK-ID": 12,
      "Discovery": "DNR",
      "Encrypted DNS": "resolver1.example.com"
    },
    {
      "SSID": "Example WiFi 2",
      "PSK-ID": 42,
      "Discovery": "DDR",
      "Encrypted DNS": [
           "8.8.8.8",
           "1.1.1.1"
      ]
    }
  ]
}
]]></artwork>
      </figure>
      <t>For illustrative purposes, <xref target="example2"/> provides an example of the data stored for
two 3GPP2 networks,</t>
      <figure anchor="example2">
        <name>An Example of Data Stored for Two 3GPP2 Networks</name>
        <artwork><![CDATA[
{
  "networks": [
    {
      "realm": "ims.mnc015.mcc234.3gppnetwork.org",
      "Discovery": "DNR",
      "Encrypted DNS": "resolver2.example.com"
    },
    {
      "realm": "ims.mnc016.mcc235.3gppnetwork.org",
      "Discovery": "DDR",
      "Encrypted DNS": [
           "8.8.8.8",
           "1.1.1.1"
      ]
    }
  ]
}
]]></artwork>
      </figure>
      <t>If this is not the first time the host connects to this same SSID, then the Wi-Fi
network name, PSK identifier, encrypted resolver disovery mechanism, and
encrypted DNS server's identity should all match for this
re-connection.  If the encrypted DNS server's identity differs, this
indicates a different network than expected -- either a different
network (that happens to also use the same SSID), change of the
network's encrypted DNS server identity, or an Evil Twin
attack. The host and/or the user can then take appropriate actions.
Additionally, in a mobile network, the UE can send the discovered encrypted resolver's
identity securely to the Mobile Core Network to assist it in identifying
compromised base stations <xref target="NIST.SP.800-187"/>. It complements existing techniques
<xref target="TR33.809"/> used to identify fake base stations.</t>
    </section>
    <section anchor="avoid-tofu">
      <name>Avoiding Trust on First Use</name>
      <t>Trust on First Use can be avoided if the SSID name and DNS server's
Subject Alt Name match.  Unfortunately such a constraint disallows
vanity SSID names.  Also, social engineering attacks gain additional
information if the network's physical address
(123-Main-Street.example.net) or name (John-Jones.example.net) is
included as part of the SSID.  Thus the only safe SSID name provides
no information to assist social engineering attacks such as a customer
number (customer-123.example.net), assuming the customer number can
safely be disclosed to neighbors.  Such attacks are not a concern in
deployments where the network name purposefully includes the business
name or address (e.g., Public WiFi hotspots;
123-Main-Street.example.com, coffee-bar.example.com).</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The network-designated resolver may or may not be local to the network.
DDR is useful in deployments where the local network cannot be upgraded
to host a encrypted resolver and the CPE cannot be upgraded to support DNR.
For example, DDR is typically used to discover the ISP's encrypted resolver
or a public encrypted resolver. The encrypted resolver discovered using DNR may
be a public encrypted resolver or hosted by the local network or by the ISP.
The mechanism specified in this document does not assist the client to
identity if the network-designated resolver is hosted by the local network.
However, it significantly reduces the attacker's capabilities if the attacker
is emulating a network (that is, operating a look-alike network).</t>
      <t>More and more content delivery networks, sensitive domains and
endpoints are migrating to TLS 1.3 and ECH.  If the attacker's network
conveys the same encrypted revolver's identity as the legitimate
network, it will not have any visibility into the private and
sensitive information about the target domain. However, the attacker's
network will still have visibility into the traffic metadata like
the destination IP address, sequence of packet lengths, inter-
arrival times, etc.</t>
      <t>The network authentication mechanism relies upon an attacker's inability
to obtain an application PKI certificate for the victim's configured encrypted DNS
server.</t>
      <t>Neither a plain-text PSK nor hash of the PSK is necessary for the
mechanism described in this document; rather, an implementation can
use a key identifier.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="DNR">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="Mohamed Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Neil Cook">
              <organization>Open-Xchange</organization>
            </author>
            <author fullname="Tommy Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="13" month="August" year="2022"/>
            <abstract>
              <t>   The document specifies new DHCP and IPv6 Router Advertisement options
   to discover encrypted DNS resolvers (e.g., DNS-over-HTTPS, DNS-over-
   TLS, DNS-over-QUIC).  Particularly, it allows a host to learn an
   authentication domain name together with a list of IP addresses and a
   set of service parameters to reach such encrypted DNS resolvers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-dnr-13"/>
        </reference>
        <reference anchor="DDR">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="Tommy Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Patrick McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Jensen">
              <organization>Microsoft</organization>
            </author>
            <date day="5" month="August" year="2022"/>
            <abstract>
              <t>   This document defines Discovery of Designated Resolvers (DDR), a
   mechanism for DNS clients to use DNS records to discover a resolver's
   encrypted DNS configuration.  An encrypted DNS resolver discovered in
   this manner is referred to as a "Designated Resolver".  This
   mechanism can be used to move from unencrypted DNS to encrypted DNS
   when only the IP address of a resolver is known.  This mechanism is
   designed to be limited to cases where unencrypted DNS resolvers and
   their designated resolvers are operated by the same entity or
   cooperating entities.  It can also be used to discover support for
   encrypted DNS protocols when the name of an encrypted DNS resolver is
   known.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-add-ddr-10"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="Evil-Twin" target="https://en.wikipedia.org/wiki/Evil_twin_(wireless_networks)">
          <front>
            <title>Evil twin (wireless networks)</title>
            <author initials="" surname="Wikipedia" fullname="Wikipedia">
              <organization/>
            </author>
            <date year="2022" month="June"/>
          </front>
        </reference>
        <reference anchor="IEEE802.11" target="https://en.wikipedia.org/wiki/IEEE_802.11">
          <front>
            <title>IEEE802.11</title>
            <author initials="" surname="Wikipedia" fullname="Wikipedia">
              <organization/>
            </author>
            <date year="2022" month="August"/>
          </front>
        </reference>
        <reference anchor="TR33.809" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3539">
          <front>
            <title>Study on 5G Security Enhancement against False Base Stations</title>
            <author initials="" surname="3GPP" fullname="3GPP">
              <organization/>
            </author>
            <date year="2022" month="June"/>
          </front>
        </reference>
        <reference anchor="NIST.SP.800-187" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-187.pdf">
          <front>
            <title>Guide to LTE Security</title>
            <author initials="" surname="NIST" fullname="NIST">
              <organization/>
            </author>
            <date year="2017" month="December"/>
          </front>
        </reference>
        <reference anchor="RFC8792">
          <front>
            <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <author fullname="E. Auerswald" initials="E." surname="Auerswald">
              <organization/>
            </author>
            <author fullname="A. Farrel" initials="A." surname="Farrel">
              <organization/>
            </author>
            <author fullname="Q. Wu" initials="Q." surname="Wu">
              <organization/>
            </author>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document defines two strategies for handling long lines in width-bounded text content.  One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line.  The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy.  Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8792"/>
          <seriesInfo name="DOI" value="10.17487/RFC8792"/>
        </reference>
        <reference anchor="RFC8110">
          <front>
            <title>Opportunistic Wireless Encryption</title>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins">
              <organization/>
            </author>
            <author fullname="W. Kumari" initials="W." role="editor" surname="Kumari">
              <organization/>
            </author>
            <date month="March" year="2017"/>
            <abstract>
              <t>This memo specifies an extension to IEEE Std 802.11 to provide for opportunistic (unauthenticated) encryption to the wireless media.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8110"/>
          <seriesInfo name="DOI" value="10.17487/RFC8110"/>
        </reference>
        <reference anchor="RFC7839">
          <front>
            <title>Access-Network-Identifier Option in DHCP</title>
            <author fullname="S. Bhandari" initials="S." surname="Bhandari">
              <organization/>
            </author>
            <author fullname="S. Gundavelli" initials="S." surname="Gundavelli">
              <organization/>
            </author>
            <author fullname="M. Grayson" initials="M." surname="Grayson">
              <organization/>
            </author>
            <author fullname="B. Volz" initials="B." surname="Volz">
              <organization/>
            </author>
            <author fullname="J. Korhonen" initials="J." surname="Korhonen">
              <organization/>
            </author>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document specifies the format and mechanism that is to be used for encoding Access-Network Identifiers in DHCPv4 and DHCPv6 messages by defining new Access-Network-Identifier options and sub-options.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7839"/>
          <seriesInfo name="DOI" value="10.17487/RFC7839"/>
        </reference>
        <reference anchor="AKA">
          <front>
            <title>Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)</title>
            <author fullname="Jari Arkko">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Karl Norrman">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Vesa Torvinen">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Mattsson">
              <organization>Ericsson</organization>
            </author>
            <date day="11" month="July" year="2022"/>
            <abstract>
              <t>   Many different attacks have been reported as part of revelations
   associated with pervasive surveillance.  Some of the reported attacks
   involved compromising the smart card supply chain, such as attacking
   SIM card manufacturers and operators in an effort to compromise
   shared secrets stored on these cards.  Since the publication of those
   reports, manufacturing and provisioning processes have gained much
   scrutiny and have improved.  However, the danger of resourceful
   attackers for these systems is still a concern.  Always assuming
   breach such as key compromise and minimizing the impact of breach are
   essential zero-trust principles.

   This specification is an optional extension to the EAP-AKA'
   authentication method which was defined in [RFC9048].  The extension,
   when negotiated, provides Forward Secrecy for the session key
   generated as a part of the authentication run in EAP-AKA'.  This
   prevents an attacker who has gained access to the long-term pre-
   shared secret in a SIM card from being able to decrypt any past
   communications.  In addition, if the attacker stays merely a passive
   eavesdropper, the extension prevents attacks against future sessions.
   This forces attackers to use active attacks instead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-emu-aka-pfs-07"/>
        </reference>
      </references>
    </references>
    <section anchor="qr">
      <name>Extending WiFi QR Code</name>
      <t>This section is non-normative and merely explains how extending the Wi-Fi QR code could work.</t>
      <t>QR codes come with their
own security risks, most signficant that an attacker can place their own QR code over a legitimate QR code.</t>
      <t>Several major smartphone operating systems support a QR code with the following format for the SSID "example" with WPA-PSK "password",</t>
      <artwork><![CDATA[
  WIFI:T:WPA;S:example;P:password;;
]]></artwork>
      <t>This could be extended to add a field containing the identity of the encrypted DNS server.
As several DNS servers can be included in the QR code with "D:", each DNS server with its own identity
using <xref target="RFC8792"/> line folding,</t>
      <artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

  WIFI:T:WPA;S:example;P:password; \
  D:ns1.example.net,D:ns.example.com;;
]]></artwork>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document was inspired by both Paul Wouters and Tommy Pauly during review of other documents.</t>
      <t>Thanks to Mohamed Boucadair for the review.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA71b63Ibt5L+j6fAMj8snSIpS3Jih97sHlqUbZ1YsiLK5T2l
40qBMyA50XAwGcyQZlTKs+yz7JPt1w1gLjKdKLVVK5ctcgaXRl+/7oYHg4Eo
kzLVI9kbW6uLMskW8mNS6FRbKy90uTHFrTwxWaajMjGZlR8sDZlcTOWVXpt0
rQv7RJ7FOsM6ibY9oWazQq+x4JW2/H4wU1bH9WJ+7LYnIlXqhSm2I5lkcyNE
bKJMrUBLXKh5Odhgo4HJrdosBqoqlzQNU+hp5tYaPH0qbDVbJdaCtnKbY+7Z
6fVrKb+RKrUGRCRZrHOd0Z69vuydjV/hlynw6er6dU9k1Wqmi5GIQcpIRDig
zmxlR7IsKi1wimOBpQqtRvL95VQI2nVRmCrH0u9zXSjHFJXF8lxlaqFX2EiO
MUF+xFBi1Rsa3hO3eovJ8UjIgfTk00ero6oAN4QQa51VIEJKvwE2HH98g+/u
YJ318HSlknQkHX/+nuhyPjTFAs9VES1HclmWuR0dHNAoepKs9TAMOqAHB7PC
bKw+cAsc0LZJuaxm4L7KiPUHu3mOgSmYZctmD/1ZrfJUDyOzOng3vj6dXgv3
QyuYgo6MWRJSBmMnQ+hXtuAH8ypNncQnKmseg0SVJb8xb0fyJCmL5DO/0O7M
PU/h3xf0nbbtdba4HkI343j7YI/rpKhWCoq9UUVrQHe3C3ObqM5mtyaLy6Ro
b4afzBQrTFmzwCYXVyOacjaYMJMHKo4HcVbQq8muV3EhBOl8a43TdZIOrnGs
Ee8erJIeyxKP5d4mmKWXhN3v8VDWXXn09Oho8PQ7N1kVCw0B9WoJZcNNcpvk
Ok4UawB9O6C1f6a1f67X/vnB2rUE+Wfgf0vpOPoxrCnw4uz09PTF06Ph4aEf
Ho7QvHBrdgh+4cc+jmJa6ufOWl0CWxR+SSJeXV8dHw9fPP2+y+NpWcVbaTL5
7Rs59fYoT7OlyiJnz2qhoFilfA2nouUruDM5LZ3pP1oEuSlKlQ6PF3nO54m1
vS1NvjJxBcYfTHMdJXO2Naza/TrRJVTPDpXNP/+nbb85i384/vb4+8fI6vjN
5SWx4OJsej2cXoILTweHL553OfGmSmItSyPfXZ/WrOge8fD54PBo9xGzdZpX
MzvMElsOF2Z9QB/oiTuOSi+rWVof8QEhwzyeP+YcNI1lefX65MXz749G4YN/
dHj4dBQ+uEfPXxx/Pwof8Gj847hrknpVDdStGuRzK8RgMJBqZstCRaUQ18vE
SsSlivUAMouKZKatXJqNVPgXSlFZfIenlDqLim1eItRRdEQwReyTiY92xNRC
x1WkBVydKksV3eriiZWRytUsSTl4ymTOK4XXEpuDuJQdMPZ76AGGjtxVEsep
BlO+kWdZWUCjOFYL8RH+G9NAYSEjF8MtEfLlSrwtjROIjficFDjsOom03Cgc
HHNmWtqq0DwwqvEAUYiXfPzPEDJOL/ySfanAumQ+1wXxLjgWmRdmTVrWvCJW
YSscP5OlLlZWmrlAcGX/CBvs11ESa0YRkY09bQ6mDaApyW+go2G57XM4tgYW
PYS0U2hTtVhKdhv/Fba3iGJbsOVIhLUltpMzUy7lKY5TgF5e52MyeJ3U1PfD
Mjh3ZkrwMdbpFrzKU7PF2Ul5MMnMS+J8ntfqTiBCVJlC7NFBzBVgSZFuSbZB
DBvFDCqZk1i9DHRD1ONGb6A1GUI/4Q9oiyzMotLy47vxReBPbpKsFDyfdrIw
HTmdnk3ckS7Hg8vpjyQfJcH5Mlk9aTThpo5En5h91vQFMUTTEYA6snBcMgkr
94htHgH0oRkQKvZbAlbwXjNV2H3QoEpJrwo5L/DeMTWo0ZrwDxMTVbY0K1J8
iD2j0AgSpvSFjgG3O6sAP3FAzQwlEQiovJOWV6MgYVIETNryQCeQCrAhTdmW
svjAFBDIr5VK4U7BbKiU1zmp4jXpXSz3LKgBe7Slo9ERP+8T2fNkUTnsR2HD
2UuwSTiWTCDKJ/S6Xx/JEbzQGYSWQmUaWrBxbNzypC3QIj4BQVp6XW/gDNLK
X7AiTTIzhIWsxVBszf4q1Sq2gu08NzncR9GSGCwsWmbJr1AYUtZa7I3WVYzw
lbBLUByzFHN23PKy0IOpe/ojGLsHJfKyTUhtoXJ4Y8jlWMzaJNFSzIwqsEbp
PSTcKhs0D4qWKr11A9whof5pSuicX4Paio+kBWkrtqgoj0h4KnlasyhUvgRd
iNQxqL3FwrGeQ0F41E0DPD71kWykKUkZu/SeDTZq28zqsezBcy1vM7PBsAVp
DI9lOwEHoE/QRgH65wi+wdeTAgDYW+c7qvS2cayIl2pIxDvj8x6CJCAaCZD3
3OZJ5DTCn67Q1kUNxbywK2YKbasPllAl/zn4WTuUZw2tc+e/GzraKJ79tagd
Ao2ltYNisSS9UQavzgPJs/TdVyd9nFmQ+lJUUGtKMWYp4wZaLjMx2QusNq1i
ViXvtfAQXjlx2mKQs2ESqenKVASyIFdyBjhfNsgVPJebN/yzKFwfNUoTek++
sSoRUn+reQTUvabklji8K0xzQKHMjwOc19ba2S4VOXuxMnhLdsnhehs45HaF
A6Xlgn5gEafRqUZalQDm17RAXBloJBe2YbfKwwx0oG2LLkYlcLBmkzU0i4bm
fmt3PrNGAhkOASYT1bBXL0/n4IJEmxjNTpm9ULOYzjhg1gkKGachiSUkHg53
5CrIRSSLjMEokYAjw26S7OtgqOs5yf0IAC2D3ZGmk4aS6c9lCyD5IBcIbHAP
GRbYBKLAlJWmzRO7Is2ixJ9sCYkfEdOOVc6zvc8Ji1cETiGpUOwQp41J33j8
+IlNH4sADh8gOVgZiF43UKYtP2TIhF0ozw88mJ6dQzCNd/twynKaaXb2hVmx
Pu5NPZQ6pLPfAJ1+2vcHxCRTbOmxCbUGOmEwgJhqABnkMcdavANGUX7grGge
EGrbrj3+q3XxdVVQcJfkuwnyMlZZwTsylRl5Ihg8WanV+pZdRshAZBjO23uY
uaeHi2FfukpK2ZdrhNeYKd9H4r/UvBlxlWzXVtGyuzPFSFuxgMgZwgIo6JL0
eI1BszeWwGAGmbRMX5iKIIa0EXjl+Ve7DGUtPtjGtpkvfiNL4QkxE09M9oXm
RktsH45FTwxp8vW7Kfnm+vvb6+vLaRAb8CTjWnIsDBGce+5kbuBkxJkDPsKB
dfJ6FzY8emycjWHe1YB9m+taUooQkQ8f86okD+A3t0NKC05MtqYgEGpVE4qS
DFCsI5m0lspTVvbOP0yvqVRGv+XFe/58dfrTh7Or0wl9nr4dv3tXfxB+xPTt
+w/vJs2nZubJ+/Pz04uJm4ynsvNI9M7H/+w5yN57f3l99v5i/K7nLKjt9Ekx
XBbC+pIXmiSkrGiMAXNenVz+z38fPpN3d/8GEz46PPz+/t5/eXH4/Bm+wGQz
t5shy3FfCSYK8FurguEFghjSsgT5unUKtiQnTMYObv7thjjzaST/fRblh8/+
wz+gA3ceBp51HjLPvnzyxWTHxB2PdmxTc7Pz/AGnu/SO/9n5HvjeesjZ5HXt
f+paJ9IQZzw7/YljLOPSWp0H8K+KrbkVT9aJkpO3J5frZ333+zuuyl6Nh6yO
YTkfFnwk3BlTnE/XCRvHzeTi6hMtdDOZXH2qgdEDa89223gAsi2sMNu2w06/
WYwwVc0ChtptF+INHqqJ+Mhn3wk6Qk5R+gICOZUWlGXg7TISGxA42WnjUilP
ZrcPyKgZfEdEOfsYgndpaqhOSoR68wfIQOBBagMXYb27cuKkoGutiRKa2jo0
l11knUnuOsgTK5oyBzGRslhwoyAgTpJ+KBaObfBfgVGdrRKyaV+yD5EzZP0E
nE1qFuwPN4D+y0YkJDlCDUsdD8VrUzRh2vUfsBQlBC6fPuzvOqMDtBy6KVf2
3G3rtofZ7gjtrEQRAnBs4rmgr2KMDyfjmDPv6BJnfRri4CnQg5XJQq1BUaji
2Aj/1hsnBektXr5Oety6eItMLW19f1NpW/aQfzg3GROwyaJWyYX3aOot9QGw
7SzJgio1BYLmYABR4gGIakCPyw1qmtsZGpcJCNSGsA6I77gHitK4H44nZ5QQ
Ln1KYx1oiQydmKcOxVm5A9S5TdtUsd4tFXDPqkrLBFZFdVpYzNRXBaa69K0n
ZPsA/Huv6Lh235/HaQVBVERB4gmJQHNfyWV4CgJaQM3aBRZY0Fuz0QzG/wLU
lA3UfJwatgcJEhDTDvAG6VNd1xPlG21NrSopReJci6u8yneY7EedOywbunJ7
l+/OL/ZbHArb+vM2RT1sP/f7Hvm3fbHDinn22BHW7f3x8nvAkwy0qSrLiBfO
Gu6h1iLaBKocEb7atlzvxlRp7ETdKtlgkCvj1FNIu/BWBnj9bHjEAJtckAi2
/Mc127Yodjs+eQbmxzGcqfUnuKhP0P+LO4y7mfrEELqXF8TNvfHkwrOIYZHn
7jwpKBYlK92wpx2X2Sh2EdCw0/owYR846XaUaSJGXziny2S3Kgva4XEu3CPt
/vrG4Fg4O47zSpclpQPdg/scyUvWRWEW7zakgZ2VRb1yO/jVAatmtU+qXQEJ
EOBzSTHGF3jFT1fgXAxO3939Wtzf77sUhlwJV96jwmzigTVVQWVBqu2QFfWR
YOeVS02E3dpSrxjGILMF9UuVw7/BNdN3X1SDYyyjJX2sne20mv0CgY3TkkTd
xbN3d2ptknhQmnl1f0814DkxjHUAu+VOjgywyM8ukzz48T458X6LU4XvxovG
QOq0ub+DEJeKISPXdf5K+gIayOtA/hX1SDjTzKuC8nA4nLs7XwkG0q6LGMxs
floDI/AvrA0ZCziHL+rsvVM/h+KcPOy5DKHz8KgHL7J0EGepLAI/FQr3+0L8
/vvv4k5I2Qvr9UbyhhtJd76d1CMm9UZfbNMP77HSgEccHtXPJoF1NBHm0ow+
bWskvQ3sPhy2uuOuv3XffwQlRzsoefY1SiZ/QMlN0xHF2xdD/lMPd08Ph/zH
t1TlJ0emoE/3jpcj+U2QIfcKf+iNM3naSHVCEp3WEpXXLFGc4yII4P5xinP0
1zXHRaJacx4l/QLQa0W8S1Z2uMqip4ffDldRdHT8jDu0oTxiikXv/yL9oz+X
/peUfOco+faxlPx/Sv/o8eJ3YmnLvx2+qHn2uBBGri60r/ou8aKRzm23MUff
4dYaYuzyfgQPdjk/8SfBikoABDuoNMAu3Bfakaw0NdaEG44+5/yzBR0c5x4V
FmkSXfVlz9RVk0N/laKJT3dbY2tO7HkknCOFcsm5h87dRiAFOFewdZYV5j/5
Spod6Ob4Bmr4Xgo1CYWv0ss6lXS9tbqjzPHciQ1pLZW1CpMXnGb6qt9QjH27
jPogfdfh6dZa++0CKnJdh95CKOsk2EHU7ayUe7yUivkauAe/J1TRv2gSMiTA
CWWSJZEQsja6ldSu11Lghwvymc3Ng2sMVHQofV7vMgH9mfOxRdN4s+ImXET5
5LAu9q6TxDlxqbPJkIsxY0ICtM51UXGdQb5m2/mAkXfftHACsvovR3hQxcMI
W8yb/ILxOlcF2xm9RwPUP3cYlNUe+v2ByjjIaSBAMNTlcQyW4NUTas8kVjGi
FGvYF5hfb2JDP1lynSGF0BZJpl3/wamRlXTVRqpaH0S7apR0MiGoar7cWuqe
BQwu9g6PjgfnWGIwLQuty9r/Ys4+qS4fdu8fZpkN/mEykNQZwJZIbSuuLcpc
FWWIPC7jgpZXDntz+dCqeZuJIXCJzDzsnnjV+oODh4y46YL724lyLzwY4HQd
gvuusl33b0L73E+E0AWRmHKRmKwlNV7dMp0sljNTkEymvLMnw7fVnUyBqMH1
TOzO/zsJn4/ldN1u63t/vqwVevaCx5H7cMIKRXWfmzJcWJrS5vj7UnxNkDCt
cM0AmWzRfr7vDKW+wnXi+xeqVegORclWba6ODVRMN+4XcWAW2nLeadTNpyZL
3dFj+lpPD7Lwi1b5olCxa6o4h7krUIUM9eTydMdcvgDjCpqUcrqCV30LwxP4
oLVMFSfvMHnls+llx9vXGQKJKBQcv3ztPP3u0Bq8ceUvCV8RMwX5na+vRywn
NjTl1i7jqLO+DQS78nDT7/M9FZctdTsGsdEOZnjTazU4S9OEhq5P2akXif0j
Ats1IBh40xEF392NL9tpJ//JnS/x4M5XN64nAAxNS1SBEnM7QKZ+W5+AjOCc
4hopELesYcel65unCUOfJsmi287c1AW3Vly0d1goduUtd+MnWYQOrOES9eHw
mBc/PXnbwJ3W6UKhiqvOW9vgjrbs1z5GN4BI2a80zJmvXHEgaXLhh6qLrU48
aHUmClyx9tUI0Zyt7YrVjPqENNZdX/QHH8paiN3T1LiKCUAgx79Mwq7tQ/d/
pUvFmQoJRvhWQBkqrU3JiAQAPEDXmxBlctqS2gjZolzyBQrk+gOhCjpUKv01
JF1Gw44re1g+aYwDiIcUrMpNJruXDkGKo10094hU58KavPzx7EE3wXmN+r5Y
aOY/7G74egyIvKhhap6SJy/1Zy4+Q458qWLZvmRDOYGmYqEqtmGzVmO/Uxbp
GPpLCfVckuRwgm67mAMgQV/FjZMmNXCB4mx8Md4RJNpOxF39cCNrtOpuXc7A
TFrllAtJ7v9NIIL9dIUlY4Jkvxb3fjnbXJbMTDao7447G9WMTAHvU7ZAaozr
es061ZGhQhVxIuKvQfiHJI1WlyaBD99k9a1JWSSWrH3FbTA4KH9jgz2KenCr
EFS423ZJwVdPwrYcNlTLPMMbUDEly1GUGf3iLiwVZb7kRljtqlx1zNZBS9UL
15W6pl/lzLVWOQZYPR/dem5CuMPYy+HeqXPd84m/lB/PXp+NrkcY8XI68rNe
Xo7CwJcveZyTjGPmTDflQMJqMdAfMlONV+Q8IZYgitpbma9neUhnSOSOJe07
Rh6D1wjTXxPpMKI3GfVg5AqIrJV98atwGSjQIFyUvfH3nz/B22TMRVIcz40f
uj/UPT4dySf/euIGbwqYPC1ChXKsI2kh+WDSD+IRTJX/ov/sMMrsYRug9ulJ
G6IF5nNCE4XbdoycxN3IwVYd/9Cb00373v1Dc6TGImwkTwoXjPm67qUCCvsI
t86XLGFR12a12vJjpNkVg2wEnERv+CYNu6SwouuBquyWU+Vzs1RUcH5lqggO
HBYQVNDNJ9P/X0stvlUzNQAA

-->

</rfc>
