<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hardaker-dnsop-root-zone-publication-points-01" category="std" consensus="true" submissionType="IETF" updates="RFC8806" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="IANA root zone publication point list format">An IANA root zone publication source list format</title>
    <seriesInfo name="Internet-Draft" value="draft-hardaker-dnsop-root-zone-publication-points-01"/>
    <author fullname="Wes Hardaker">
      <organization>Google, Inc.</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>
    <author fullname="Warren Kumari">
      <organization>Google, Inc.</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <author initials="G." surname="Huston" fullname="Geoff Huston">
      <organization>APNIC</organization>
      <address>
        <postal>
          <street>6 Cordelia St</street>
          <city>South Brisbane</city>
          <code>QLD 4101</code>
          <country>Australia</country>
        </postal>
        <email>gih@apnic.net</email>
      </address>
    </author>
    <date year="2026" month="March" day="15"/>
    <area>Operations and Management</area>
    <workgroup>Domain Name System Operations</workgroup>
    <keyword>DNS</keyword>
    <keyword>DNSSEC</keyword>
    <keyword>zone cut</keyword>
    <keyword>delegation</keyword>
    <keyword>referral</keyword>
    <abstract>
      <?line 77?>

<t>This document describes a machine readable format to be used by IANA to publish
a list of sources where the contents of the IANA DNS Root Zone may be fetched
from.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-hardaker-dnsop-root-zone-publication-points/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Domain Name System Operations Working Group mailing list (<eref target="mailto:dnsop@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dnsop/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dnsop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/https://github.com/hardaker/draft-hardaker-dnsop-root-zone-publication-points"/>.</t>
    </note>
  </front>
  <middle>
    <?line 83?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>DNS recursive resolvers implementing functionality such as LocalRoot
<xref target="draft-wkumari-dnsop-localroot-bcp"/> need to obtain the contents of
the IANA DNS root zone on a regular basis. This document describes a machine
readable format that can be used by IANA to publish a list of sources that can be
used for obtaining the contents of the IANA DNS Root Zone.</t>
    </section>
    <section anchor="iana-root-zone-list">
      <name>IANA maintained list of root zone publication points</name>
      <t>The list of IANA root zone data publication points, available at TBD-URL, may
be used to discover where the IANA root zone data can be fetched from.</t>
      <t>It is expected that this will be used as described in
<xref target="draft-wkumari-dnsop-localroot-bcp"/>, and may be used by the resolver software
directly, or by the operating system a resolver is deployed on, or by a network
operator when configuring a resolver.</t>
      <t>The contents of the IANA DNS root publication points file MUST be verifiable as
to its integrity as having come from IANA and MUST be verifiable as being
complete.</t>
      <section anchor="root-zone-publication-points">
        <name>Root zone publication points</name>
        <t>NOTE: this is but an example format that is expected to spur
discussions within IETF working groups like DNSOP.  Whether this is a
list in a simple line-delimited format like below or signed JSON or
signed PGP or ... is subject to debate.</t>
        <t>The IANA root zone data publication points file is structured into two distinct
segments, divided by a line consisting of four dashes followed by a newline
("----\n"). The first segment contains a list of URLs, one per line. The second
segment provides a signature or cryptographic checksum.</t>
        <t>While this specific format was originally designed for IANA's maintained list
of root zone publication points, it may also be used by other publication point
aggregation lists.</t>
        <t>The list may include URLs using any protocol capable of transferring
DNS zone data, including HTTP or HTTPS <xref target="RFC9110"/> (DNS zone file
presentation format over HTTP or HTTPS), AXFR
<xref target="draft-hardaker-dnsop-dns-xfr-scheme"/>, XoT
<xref target="draft-hardaker-dnsop-dns-xfr-scheme"/>, "XoH" (DNS AXFR over HTTP)
<xref target="draft-hardaker-dnsop-dns-xfr-scheme"/>, etc.  URLs using http or
https schemes are for transferring zone file contents in presentation
format, not for indicating an AXFR transfer over DNS over HTTPS.  URLs
for performing an AXFR over the protocol DNS over HTTPS should use the
"xoh" scheme instead.</t>
        <t>Each URL MUST occur on its own line.  Lines beginning with the "#" character are
considered comments and MUST be ignored.  Leading and trailing whitespace on
each line SHOULD be ignored.</t>
        <t>Any URLs that reference an unknown transfer protocol in the LocalRoot
implementations SHOULD be discarded.  If after filtering the list
there are no acceptable list
elements left, the resolver MUST revert to using regular DNS queries
to the IANA root zone instead of operating as a LocalRoot.</t>
        <t>The first line of the cryptographic checksum section will contain a
checksum or signature type string specifying what the remaining lines
in the checksum or signature section will contain.
(Ed note: this section is underspecified.  We expect to
refine this as we get feedback from the working group.)</t>
        <t>A minimal example publication point file, containing a single
AXFR publication point with a target of b.root-servers.net:</t>
        <artwork><![CDATA[
http://www.internic.net/domain/root.zone
https://www.internic.net/domain/root.zone
axfr:lax.xfr.dns.icann.org/.
axfr:iad.xfr.dns.icann.org/.
axfr:b.root-servers.net/.
----
SHA256
500c443200c172d81f9811710530c1c244c0b45e702b53ad5bc3a83234f460b3
]]></artwork>
        <t>Future note: this should eventually be a signature from an identity,
regardless of format, that can be traced back to IANA being the
authoritative publisher and not just a simple checksum.</t>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>Implementations SHOULD optimize retrieval to minimize impacts on the
server.  Because the list is not expected to change frequently,
implementations SHOULD refrain from querying IANA's source more than
once a week.</t>
      <t>TBD</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>It is critical that LocalRoot implementations (or other any code
bases) making use of the publication point list format described in
this document verify the contents using the encoded checksum to ensure
it has not been tampered with.</t>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD: describe the request for IANA to support a list of root server
publication points at TBD-URL.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <referencegroup anchor="BCP237" target="https://www.rfc-editor.org/info/bcp237">
          <reference anchor="RFC9364" target="https://www.rfc-editor.org/info/rfc9364">
            <front>
              <title>DNS Security Extensions (DNSSEC)</title>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <date month="February" year="2023"/>
              <abstract>
                <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="237"/>
            <seriesInfo name="RFC" value="9364"/>
            <seriesInfo name="DOI" value="10.17487/RFC9364"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC8976">
          <front>
            <title>Message Digest for DNS Zones</title>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Barber" initials="P." surname="Barber"/>
            <author fullname="M. Weinberg" initials="M." surname="Weinberg"/>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>This document describes a protocol and new DNS Resource Record that provides a cryptographic message digest over DNS zone data at rest. The ZONEMD Resource Record conveys the digest data in the zone itself. When used in combination with DNSSEC, ZONEMD allows recipients to verify the zone contents for data integrity and origin authenticity. This provides assurance that received zone data matches published data, regardless of how the zone data has been transmitted and received. When used without DNSSEC, ZONEMD functions as a checksum, guarding only against unintentional changes.</t>
              <t>ZONEMD does not replace DNSSEC: DNSSEC protects individual RRsets (DNS data with fine granularity), whereas ZONEMD protects a zone's data as a whole, whether consumed by authoritative name servers, recursive name servers, or any other applications.</t>
              <t>As specified herein, ZONEMD is impractical for large, dynamic zones due to the time and resources required for digest calculation. However, the ZONEMD record is extensible so that new digest schemes may be added in the future to support large, dynamic zones.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8976"/>
          <seriesInfo name="DOI" value="10.17487/RFC8976"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5936">
          <front>
            <title>DNS Zone Transfer Protocol (AXFR)</title>
            <author fullname="E. Lewis" initials="E." surname="Lewis"/>
            <author fullname="A. Hoenes" initials="A." role="editor" surname="Hoenes"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The standard means within the Domain Name System protocol for maintaining coherence among a zone's authoritative name servers consists of three mechanisms. Authoritative Transfer (AXFR) is one of the mechanisms and is defined in RFC 1034 and RFC 1035.</t>
              <t>The definition of AXFR has proven insufficient in detail, thereby forcing implementations intended to be compliant to make assumptions, impeding interoperability. Yet today we have a satisfactory set of implementations that do interoperate. This document is a new definition of AXFR -- new in the sense that it records an accurate definition of an interoperable AXFR mechanism. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5936"/>
          <seriesInfo name="DOI" value="10.17487/RFC5936"/>
        </reference>
        <reference anchor="RFC7766">
          <front>
            <title>DNS Transport over TCP - Implementation Requirements</title>
            <author fullname="J. Dickinson" initials="J." surname="Dickinson"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="R. Bellis" initials="R." surname="Bellis"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <date month="March" year="2016"/>
            <abstract>
              <t>This document specifies the requirement for support of TCP as a transport protocol for DNS implementations and provides guidelines towards DNS-over-TCP performance on par with that of DNS-over-UDP. This document obsoletes RFC 5966 and therefore updates RFC 1035 and RFC 1123.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7766"/>
          <seriesInfo name="DOI" value="10.17487/RFC7766"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="draft-hardaker-dnsop-dns-xfr-scheme" target="https://datatracker.ietf.org/doc/draft-hardaker-dnsop-dns-xfr-scheme/">
          <front>
            <title>The DNS XFR URI Schemes</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="draft-hardaker-dnsop-root-zone-publication-list-guidelines" target="https://datatracker.ietf.org/doc/draft-hardaker-dnsop-root-zone-publication-list-guidelines">
          <front>
            <title>Guidelines for IANA DNS Root Zone Publication List Providers</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="draft-wkumari-dnsop-localroot-bcp" target="https://datatracker.ietf.org/doc/draft-wkumari-dnsop-localroot-bcp/">
          <front>
            <title>Populating resolvers with the root zone</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="NOROOTS" target="https://www.icir.org/mallman/pubs/All19b/All19b.pdf">
          <front>
            <title>On Eliminating Root Nameservers from the DNS</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 192?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA61ZWW8bORJ+568oKA87AaT2nUPAAnHs+JhxbK+lIMFiX9hk
dTfH3WQPyZaiCZLfvqhi60qUTGaxT7bZZLHOr76iR6ORiCbWOIbBqYXr09tT
8M5F+NNZhLbLa6NkNM5CcJ1XCLUJEQrnGxkHQua5x9kYBj841zpj4/YxJSOW
zi/GEKIWQjtlZYNj0F4WcVRJr+Uj+pG2wbUjkjoiqaMNqSOWGka1jBiiCF3e
mBCMs3HR4hiu30wvhHI2oA1dGEP0HYrZGI6E9CjHMLhr0bOgANJqeCutLLFB
Gwdi7vxj6V3XjmFw7hppLNzKBmGyCBEbWJ8ciEdczJ3XYwEjOL+d9D8mb87o
N3aE6iL9rrHGkk/RXx4L9F7Woms16T+Gh4uzFy/2n4kZ2g7HAuAnFQBI9g7e
O/9obAmXdI7WG2nqMQzYha8MxiJzvqQP0qtqDIMqxjaM9/ZoHy2ZGWbLbXu0
sJd7Nw+4xxL26GRpYtXlG2fTQqZcs7eM2d7fDuFACNnFynkyeyQAAIqurlNC
vMcAV70s/uR8Ka35kwWM4dK5ssYhXFuV8WdMZpMhr5Y6hMxi3CVbeo8Wfusa
6c3fED7nc68e+dyWbGPDGH7N4AGN5oV00a+mWS85X47hYXrxFuq65ZUQPWIc
wyTCqdUe5wGuXBeQPyoTF2M4enEIV6aujS2js/DgpB7CZS1D6eYwUS7W0ibx
ymkcw+XJARy/vulXOhup1N79tmnF76Z55Qt1sH90QgHctuEyg6suRMrWLZdd
oiuKzU/bHju9v70+27ykNNUr2VqjejetjX0GZ85rrI2ESdywdOK6WMFrb0Iu
LW6Y9K+bczg+2D/Ytum0C9HL2kghLGOLmXH5vD67Pzx6Tr89XJwd7x8djQGe
rGqTy+3l82e8+O+72zdvz4UwttiU8HBxdvLy6NnyHPybqnnqpQ0Fp+LDxdnz
58/W3/lT63wEN0MP07P7tOnlwcE+b7qaTu9hgo200agedTBWTgchYDfyaRtG
Hws/CqrChrUC6LF6WiFf++HiAd49XMOEt4S0RfqSfLwsUy2jjF6qR/TrEtdO
7a7V7Uv3vqfb7pImlB+VnaHIWgxbKl+ulqkPpE5DJjxQ12D33m90jRvqF/fe
zYxG//+w66cUXlk7T+Xdn62dkjULyFW7ZdS9a7taRoJej8HVM/QB5iZWECtc
N8T/Rf8fqEBRub17uLubTra0ubPwpjaNsUkj9iy1joCeFSu8a1gxblY7VJrP
55lRxrMqjazrRtq9tsvD3mldH7zM+x9ZqwshRqMRyJwKUEUhppUJoJ3qqIuC
xqC8yTGAhEaqylgEj1LLvMaeBkB0kCN0ATXki5QP0SXqECohE2VwRU88Aswr
9MjqK2cj2hjoK/29I5cauSDpBUZVoRZkeZZUbozWNQrxBK5t9E53ivuyoPMe
VeeDmeFGNE3T1kwNyKVFZ3m7rE1cQOhUBTLADQWH7hafPv1l8D5/BouoyVaX
R+ruX5kktkxakypnQYLHsqulh1wGEzL4S6+Lb7xeyQhK2h/4Hr71/cYpwaeo
hJP65JafC0rGTqdlIjV0FvXqph+QxwDw6YmRVm4UMR37TFmHKwlfcVAqrx2y
hiBnxHnIJTLC9PX56N3DzZASRixdEh1oExQj+TrrdsnvHdmnGfRpdh3BBMCP
LapI4ir2uyFkqOuV42VYBUyDsT+XO0PuHH12L+PHWNMnLARXxLn0KLTxqGK9
GILzy10ukUdbQkhsUq4PUiZhW7sFanB2eUqCxUicWKSzjl1iKdyFKTtPstZC
shSS7+YCu29HgAtTI7x9N5mSWTP0pjApQkFEByYGMDZi6anqZIBKzuhe5RpM
oMYXcE/dJQNyNLYUylEpR8pD8eRJysvvZJwQt3fTN+MUNRMg7yJIC/hRkoit
WtqKtIPQdl5Q9nQ8j6RuYCyPJDDvaTrT+wC1eWQsvrvPAN5XGCv0qyul4MQ2
VPWBQQioR42oVTUmphokLVhKjrWbU8iCKamsfp3c3YLzov/z/vKePmZZRqJD
l/+OihFYYy7ZI9PvZPj3gkViou9U7Dynb3QQ51w30VgVRcCSMCkMQRtq4jol
E5lA6RF4X0kJUrjOg5ahYmZQ126+3GxxTvvFL4PRaDT6jx08zZj5FMaHCP0N
nGzS0CS3goJ3DzdhCBxa9HxnOhhQOauXukGb+EVgD5dWki3kJuUXbXSll21l
FKgK1WPoqLDfV2Q6Ryi0qExh1DIKcxnAeVMaK+t6QZWdPL/kOv8IX6Oe+AvU
G4KJXOmyDlut0nGefHNAyLL0/ZjJF4RsAyBJkLGq7jSye6ALXLp2QW6ITrka
lGy5Yqhqe6pL9c2tcZURw14MnWZS6zz/nMCnTz3h/fwZflmdoWwRrceANibd
eo8xvG5JeDqE0w8XDysk/CE1JSz84KY/v3nwwV0NkmJ0y/r+pz8vA6PKYNN/
xJyozphBQdoYQHrGiC0vrr2xhkdjYdMzInlmCNbxYwkYqznEHKik9VJkUp+M
Wdkx6VUjMZT4JG3zKG8kOF4FfPs4hMp1taY8o21i8NFVg94mGgwjSp0J8Uaq
iu5JWOuU6jxxEwJpN7d9tcENM/0cS2OZIqxI8eDJAFQliTWiJ0/xQw3RfNSE
6IwaW1huSus8ahKKUieLNDnC1Cy5MhFDKxVRJIGkHaPM5Oru3c35pgAhTu0i
RY+hmx9i0CokF3X20ZL+KwevvNRTtDXLW1HC/glpfRMBv/Salb0uQBZkY2Hq
iH7Jk7j0I7MKShPrQCqFbeTK44+YhAeosYjD7e7OPvE4Q8/wnZJwSQopnH90
6A1y29xBWvooUoWvqYAkAFxZ14NGwlh2ZN/Ed6MiYSpXNXObHotBitX3vicl
cKXnKuobzEAYQRcphNxNyc6mp5RpHluy453Cdt2ciV/eaKof7Jv3cpMJ0Fma
JRNuc4TeY9+6ITrhsSBj+ZAMMEcoMUKBqHOpHtez01YPz54KcQqNsaaR9Yoe
fPv8SWU/XOqYKBNFrkbBlfntAS4X2Q9oFIE8YxLYj3L0oDIW4suXL18Yepaz
m43o+/eWPc1vh3t0LOMhdGvK++FO+bHw41p+zD4WPtM2ZEZJa3kqzNJHI/X3
P36r615Gs9dITK5OD0+eiZP9fXV8fHS4v68Onh/qFwfFyxcHB88P9k+O9tWB
Ojw+Vvv58Qk+3z/MT46kPsnVkXxxdHh0XBw/28+PkuHiouM82Ix2QjCcoY0d
N+Ict7o7h1FaMJomurgYCmqZXtcYQiIjCYE3xySacKnzUhpEl0qKGSWjZHq9
NJGfjpYjFCGb5TyE37sQ1xRug0w8WT/lyhrOehBMkCLE9W6McW00jfmTKiV6
gzNZk0qcgLRqmlYqAmKuG5EikAG8RiV7WE90wARWbpO5qkrakjyEf3RoaXD4
HtB5LDxVOTuTAIeLuGc5/f8JGsdjk7TCMcDCHPGRsOX1OZk+oUmb2Pw3drNu
yptoFBlHcVhhE3yt0C80hsbk7gU/FYpcBgxPoZFcpWR0j18//KfE9igWt8Zq
niUW20NuAl5aQkvX6jVGRQf0bwePwkSoZHJ0jmghyqblNkfVvfYFJ9TXfpi+
Ph+vlOqx8Y8Ok8KriT10LT86yu05OsVd7ODu65G3fw6hrKZ5CE4V9b8adeLt
4tPYdk1O6v5zUMg64OBz0vi/vMWk4TMaAAA=

-->

</rfc>
