<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.11 (Ruby 3.1.2) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nottingham-feed-privacy-00" category="bcp" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.10 -->
  <front>
    <title abbrev="Web Feed Privacy">Privacy Considerations for Web Feed Readers</title>
    <seriesInfo name="Internet-Draft" value="draft-nottingham-feed-privacy-00"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization/>
      <address>
        <postal>
          <postalLine>Prahran</postalLine>
          <postalLine>Australia</postalLine>
        </postal>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <date/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This specification collects privacy-enhancing guidelines for Web feed readers.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-nottingham-feed-privacy/"/>.
      </t>
      <t>
         information can be found at <eref target="https://mnot.github.io/I-D/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mnot/I-D/labels/feed-privacy"/>.</t>
    </note>
    <note>
      <name>Note to Readers</name>
      <t>This draft is a quick straw-man; it is intended to assess implementer and community interest in the topic, not to state concrete requirements (yet). Feedback much appreciated.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Many web sites offer a feed of updates to their content, using <xref target="ATOM"/> or <xref target="RSS"/>. While they are consumed in a variety of ways and for a variety of purposes, web feeds are often presented to users by dedicated software, colloquially known as a "feed reader."</t>
      <t>Feed readers use HTML and HTTP, and can be considered as part of the web, but one that is distinct from web browsers. Unlike browsers, feed readers do not easily facilitiate cross-site tracking or behavioural advertising, because their capabilities are more limited, thereby establishing an alternative, more privacy-respecting web platform.</t>
      <t>At the same time, browsers are protecting privacy in increasingly sophisticated ways; for example, by taking steps to prevent active fingerprinting <xref target="FINGERPRINTING"/>.</t>
      <t>This specification seeks to codify these privacy-enhancing distinctions while incorporating browser's privacy advances by offering a definition for "feed reader" in <xref target="reader"/>, providing guidelines for how they make requests in <xref target="requests"/>, and providing guidelines for their handling of content in <xref target="content"/>.</t>
      <section anchor="notational-conventions">
        <name>Notational Conventions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="reader">
      <name>Feed Readers</name>
      <t>A feed reader acts as a user agent (per <xref target="HTTP"/>) that consumes and presents information from documents in <xref target="ATOM"/>, <xref target="RSS"/>, and/or similar formats to users.</t>
      <t>A feed reader might be local software program on a host that the user controls, or a remote service that they access over the Internet, such as through a web browser. Typically, a feed reader will allow the user to subscribe to URIs that identify feeds, and regularly poll those URIs for new content. When a feed entry has already been seen, a reader might keep this state.</t>
      <t>Feed readers make HTTP requests and parse, render and display HTML content (including some embedded content). Users can also follow links from content in a feed reader.</t>
    </section>
    <section anchor="requests">
      <name>Making Feed Requests</name>
      <t>When a feed reader makes a request for a feed document, privacy can be impacted in several ways. This section contains guidelines for such requests; note that they do not apply to requests for embedded content and user-initiated navigation to links in content (see <xref target="content"/>).</t>
      <section anchor="encryption">
        <name>Encryption</name>
        <t>In HTTP, encryption protects communication from observation and modification, and is used to establish the identity of the server. Feed readers, therefore, are expected to follow best current practice for encryption, as captured in the relevant RFCs and industry practice.</t>
        <t>This includes implementation of the most recent version of TLS (as of this writing, <xref target="TLS13"/>), the Strict-Transport-Security mechanism <xref target="HSTS"/>, and Certificate Transparency checking <xref target="TRANS"/>.</t>
      </section>
      <section anchor="cookies">
        <name>Cookies</name>
        <t>The HTTP Cookie mechanism has aspects that are problematic for privacy; see, eg., <xref section="xx" sectionFormat="of" target="COOKIES"/>. Therefore, when making feed requests feed readers <bcp14>MUST NOT</bcp14> send the Cookie header field, and when receiving feed responses, they <bcp14>MUST NOT</bcp14> process the Set-Cookie header field.</t>
      </section>
      <section anchor="etags">
        <name>ETags</name>
        <t>HTTP ETags (see <xref section="x.x" sectionFormat="of" target="HTTP"/>) are especially useful to feed readers, as they enable more efficient transfers when there have been no changes to a feed. However, they can also be used to track user activity. Therefore, feed readers <bcp14>SHOULD</bcp14> periodically send requests without If-None-Match header fields, to asure that ETags are changed.</t>
      </section>
      <section anchor="user-agent">
        <name>User-Agent</name>
        <t>Feed readers <bcp14>SHOULD NOT</bcp14> include more significant detail than an identifier for the software being used and its version. In particular, detail about libraries used and other aspects of the environment can contribute to the formation of an identifier for the user.</t>
      </section>
      <section anchor="client-ip-address">
        <name>Client IP Address</name>
        <t>Feed readers <bcp14>SHOULD</bcp14> take steps to prevent servers hosting feeds from using the client's IP address to identify them or track their activity. For example, <xref target="MASQUE"/> might be used to this end.</t>
      </section>
    </section>
    <section anchor="content">
      <name>Handling Feed Content</name>
      <t>When a feed reader displays a feed content (including an individual feed entry) to its user, interaction with the feed's server is limited in several ways to reduce privacy impact. This section outlines those limits.</t>
      <section anchor="requesting-remote-resources">
        <name>Requesting Remote Resources</name>
        <t>Feed readers <bcp14>MAY</bcp14> make requests for remote resources that are explicitly part of the feed or feed entry's metadata. For example, a feed reader might fetch the URL in the atom:logo element (defined in <xref section="4.2.7" sectionFormat="of" target="ATOM"/>) in order to present it to the user.</t>
        <t>Feed readers <bcp14>MAY</bcp14> make requests for remote resources that are embedded in feed content. However, the user <bcp14>MUST</bcp14> be able to control this behaviour.</t>
      </section>
      <section anchor="executing-scripts">
        <name>Executing Scripts</name>
        <t>When handling feed content, feed readers <bcp14>MUST NOT</bcp14> execute embedded or linked scripts.</t>
      </section>
      <section anchor="reporting">
        <name>Reporting</name>
        <t>Feed readers <bcp14>MUST NOT</bcp14> trigger reporting mechanisms designed for Web browsers when handing feed content. For example, <xref target="NEL"/>, <xref target="CSP"/>.</t>
      </section>
      <section anchor="following-links">
        <name>Following Links</name>
        <t>When a user explicitly follows a link in a feed reader, their expectation will be that it either opens in their preferred Web browser, or that the resulting functionality is equivalent (e.g., a browser embedded in the feed reader). Once a link is followed, the feed reader is no longer handling feed content; the user's activity is now either in a separate Web browser, or in an embedded web browser that is considered a distinct context.</t>
        <t>Therefore, the context used to follow a link <bcp14>MUST</bcp14> be separate from that used to make requests for feed documents. In particular, separate underlying connections are to be used, and no state such as cookies is to be shared.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no actions for IANA.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t><em>TBD</em></t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="TLS13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TRANS">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie">
              <organization/>
            </author>
            <author fullname="E. Messeri" initials="E." surname="Messeri">
              <organization/>
            </author>
            <author fullname="R. Stradling" initials="R." surname="Stradling">
              <organization/>
            </author>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962.  It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="HSTS">
          <front>
            <title>HTTP Strict Transport Security (HSTS)</title>
            <author fullname="J. Hodges" initials="J." surname="Hodges">
              <organization/>
            </author>
            <author fullname="C. Jackson" initials="C." surname="Jackson">
              <organization/>
            </author>
            <author fullname="A. Barth" initials="A." surname="Barth">
              <organization/>
            </author>
            <date month="November" year="2012"/>
            <abstract>
              <t>This specification defines a mechanism enabling web sites to declare themselves accessible only via secure connections and/or for users to be able to direct their user agent(s) to interact with given sites only over secure connections.  This overall policy is referred to as HTTP Strict Transport Security (HSTS).  The policy is declared by web sites via the Strict-Transport-Security HTTP response header field and/or by other means, such as user agent configuration, for example. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6797"/>
          <seriesInfo name="DOI" value="10.17487/RFC6797"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding">
              <organization/>
            </author>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham">
              <organization/>
            </author>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes. </t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="COOKIES">
          <front>
            <title>Cookies: HTTP State Management Mechanism</title>
            <author fullname="Lily Chen">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Steven Englehardt">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Mike West">
              <organization>Google LLC</organization>
            </author>
            <author fullname="John Wilander">
              <organization>Apple, Inc</organization>
            </author>
            <date day="24" month="April" year="2022"/>
            <abstract>
              <t>   This document defines the HTTP Cookie and Set-Cookie header fields.
   These header fields can be used by HTTP servers to store state
   (called cookies) at HTTP user agents, letting the servers maintain a
   stateful session over the mostly stateless HTTP protocol.  Although
   cookies have many historical infelicities that degrade their security
   and privacy, the Cookie and Set-Cookie header fields are widely used
   on the Internet.  This document obsoletes RFC 6265.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-rfc6265bis-10"/>
        </reference>
        <reference anchor="ATOM">
          <front>
            <title>The Atom Syndication Format</title>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham">
              <organization/>
            </author>
            <author fullname="R. Sayre" initials="R." role="editor" surname="Sayre">
              <organization/>
            </author>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document specifies Atom, an XML-based Web content and metadata syndication format.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4287"/>
          <seriesInfo name="DOI" value="10.17487/RFC4287"/>
        </reference>
        <reference anchor="MASQUE">
          <front>
            <title>Proxying UDP in HTTP</title>
            <author fullname="David Schinazi">
              <organization>Google LLC</organization>
            </author>
            <date day="17" month="June" year="2022"/>
            <abstract>
              <t>   This document describes how to proxy UDP in HTTP, similar to how the
   HTTP CONNECT method allows proxying TCP in HTTP.  More specifically,
   this document defines a protocol that allows an HTTP client to create
   a tunnel for UDP communications through an HTTP server that acts as a
   proxy.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-masque-connect-udp-15"/>
        </reference>
        <reference anchor="RSS" target="https://www.rssboard.org/rss-specification">
          <front>
            <title>RSS 2.0 Specification</title>
            <author>
              <organization>RSS Advisory Board</organization>
            </author>
            <date year="2009" month="March"/>
          </front>
        </reference>
        <reference anchor="FINGERPRINTING" target="https://www.w3.org/TR/2019/NOTE-fingerprinting-guidance-20190328">
          <front>
            <title>Mitigating Browser Fingerprinting in Web Specifications</title>
            <author fullname="Nick Doty" initials="N." surname="Doty">
              <organization/>
            </author>
            <date day="28" month="March" year="2019"/>
          </front>
          <seriesInfo name="World Wide Web Consortium NOTE" value="NOTE-fingerprinting-guidance-20190328"/>
        </reference>
        <reference anchor="NEL" target="https://www.w3.org/TR/2018/WD-network-error-logging-1-20180925">
          <front>
            <title>Network Error Logging</title>
            <author fullname="Douglas Creager" initials="D." surname="Creager">
              <organization/>
            </author>
            <author fullname="Ilya Grigorik" initials="I." surname="Grigorik">
              <organization/>
            </author>
            <author fullname="Julia Tuttle" initials="J." surname="Tuttle">
              <organization/>
            </author>
            <author fullname="Alois Reitbauer" initials="A." surname="Reitbauer">
              <organization/>
            </author>
            <author fullname="Arvind Jain" initials="A." surname="Jain">
              <organization/>
            </author>
            <author fullname="Jatinder Mann" initials="J." surname="Mann">
              <organization/>
            </author>
            <date day="25" month="September" year="2018"/>
          </front>
          <seriesInfo name="World Wide Web Consortium WD" value="WD-network-error-logging-1-20180925"/>
        </reference>
        <reference anchor="CSP" target="https://www.w3.org/TR/2016/REC-CSP2-20161215">
          <front>
            <title>Content Security Policy Level 2</title>
            <author fullname="Mike West" initials="M." surname="West">
              <organization/>
            </author>
            <author fullname="Adam Barth" initials="A." surname="Barth">
              <organization/>
            </author>
            <author fullname="Daniel Veditz" initials="D." surname="Veditz">
              <organization/>
            </author>
            <date day="15" month="December" year="2016"/>
          </front>
          <seriesInfo name="World Wide Web Consortium Recommendation" value="REC-CSP2-20161215"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA6VZ23LbOBJ951dgnYdJtkT5EuembG2txnY2rvVtLLmmpqam
UhAJSSiTBAOAVrQu/8t+y37Znm6AFCV7nvYlISkA7Mvp06fpNE0Tr32hRuLG
6geZrcWJqZzOlZVe40rMjRW/qpn4olQubpXELy6Rs5lVD6PND3FzkpuskiVO
y62c+7Qy3utqsZRlOseytA7L0oODJJceyx5Px9OzpyTDzcLY9UjMsjpJdG1H
wtvG+aODg08HR8m9Wq+MzUfivPLKVsqnp3R+kjgvq/ybLEyFw9bKJa6U1n/7
3hiv3EhUJqn1SPzuTTYQ+EdXuar8QDhjvVVzh6t1GS+81Rl+ykxZy3hRYjF+
0lWhK/VHkjyoqlGjRIilIR/3lt7XbrS/X8LP4UL7ZTMbarN/np7u72GVVbXp
rYoLcC5v4GWFnKnC7feDs5ckYWWqnWtUyktGor8kSWTjl8bClBTvEbAQzl4O
xVUXb34cUnEp7f3uL8YuZKX/zTke8ZPaIJZFuBYiRUbl0sqK7zPTVJ6yM0ZK
rCy05MeqlBqWkTP/4BAgMfxDYxH01u3VajVsf91PksrYEq994Djefjk5Ojz8
RJfTi8nh2xE9+Xh8/J4e3I6vJvzg0+H7Izz4OpmG+/cfPn0ASKp5/6iv0+lN
XH14gPuT6+t/nZ9hA8I81MrPUzJopl1q59n7o/fvcIll4+n1JW87Pvr4AfeX
48kvd2e9XaV035GFzFSVynza5DXZPZmESHlpF8pvO2udmxlp8yGCvI+b1NUq
03OdcbTDtlByOEYcDQ/E5NmCUB1vDyh52VJQGfDzLu+cpJgsTmc4bZw/aIB7
LX4mC/D7l/Orf57d3tyeX01xhYp9ezK8up6epXOgQVkAqiJcpItG57LKVHp0
cPjp4O3RR+y9OrsIG349TZE8VOB9qqw1Ni3MYkG7Dmn5x4NPR+8o4pObsPz2
7CTFzRH9+P7w6PBdkqRpKuSMwJOhaqdL7cRWVACxokB8nWgpQlVL2IOXCDJN
UQVuyIiKAeXFZDQMpwNh6tsV/ePNt5anwpuYiwQupPje6Oyeal2ukNnqs9D8
A4KgQA05OEJI55TDo7IuFBGAsgIcw3TQVNqvebFVDhsr4ZcKe2oNeoEBtB1V
5BVWV5lVuLAKr7R8kBOv18q/GTJjziTsKBvkVta1RSSwK4cr7Eup87xQSfKK
+M6avMkYGMmlrNZiBf+dBr0JM5+TcSEaZi6ammDjyArYpS1Z4ZnvGkeBfHwk
tD89AS64Blyenobi16UuFK1fC2nZcNeUOA/OSfEgLYpgTYev5NpxICgHW7/U
jQV5KBDlKqbG8VFmjpcjn8pRFDm2jUNWxGwtEGvKPJ46LFth+YAhYBAtWRRr
cV+ZFSygnO31sj0EO37pJZ9OROlfXrBpxAGDkC1ZiVnwhnoZNuCoGq2BDKak
wdSBmDW4r8h7yTDItUMxZF7MrSnZm5k1K7J5KO7QBO5V92CwhUGRG86/kk7D
+LnMdKG9ZiRYQxSAhAlC/z0lAhGcqaV80KYBmwqZPyjrNeUINqlMklMxg7KW
Mz5LhaCWBv8UusR5+YAWWYVwAo1yVmi3pNPhuiyoTTI3DsKWtqyQDdQdlTz7
VxfSE40CeWPPgXHoGeCnEhtbX/nFtUVthY3xLIKIJphLshxuO1MvKYIhsQSY
z4wW9UNSMQ0o8V5yBJxXNQMV8EBX9QK8AGPFNisBpdv8BcC+yB5OqXs+LjO5
nq/JEadeoJI2waxsVox83Brgl+QOFkSXf+p4iJJDvMio5YLjEAPAMFXzy8nF
Pkb3KDCPj+Hm6WlAoXvQ+QtUtjSrUHmlvA9UgUS6dnu4owMI0X96SAAKPMwL
xta8LftwTrzhyCWvXpEQ4JgBd1B6FHsKBkVVCcgsQTrLib3Lu8l0bxD+F2gY
dH179svd+e3ZKV1Pvo4vLrqLJK6YfL2+uzjdXG12nlxfXp5dnYbNeCq2HiV7
l+Pf9oKje9c30/Prq/HFXiBYqkuTNSWjxBLdUmUzCddEsVTaSa5cZvUs8NbP
Jzf//c/hMZz/SxQY4Lxw8/HwwzFuVktVhbeZCsANt5SJBGyspGX2KwoqPw1V
hGoHfbglURJVHEL5198pMn+MxN+gWA+P/x4fkMNbD9uYbT3kmD1/8mxzCOIL
j154TRfNrec7kd62d/zb1n0b995DgsyW8hePryKuQRh9CqQCdoGvieSFXFC+
XteKWg3x8tPTm8CzscO4iGruDoT5qOaooIh925zHcgida9D2LU7ePtDvQIUF
EhZ2u67JDHftK/Vi6Qk5hcmA/bbtUF0trCwBBJi+hAgOVhIVsiNUP9YQBLjv
oZWDB0E49kFnqlsLnsgykg0GVM6b20kFkwV3eZi2tKZZ4LLfWYZiuoZ8oJ43
aFt5tHilgUD8EEgiWEMCo5kFrNPN3e25i+2LJhviPm7AAdxWLRoEBwiv0Vux
Dm06bCHiqNSqpQqSAapq369I7INRkKKCbFkjbIpJlopmO6D3StWhSFn4DHfa
MxMbpX/Dbpx2aR36gSXRFeQVmBm9aB16eUtgr0HORcOk5zBxYeBAhZNMiwug
pe64QWXc85yBXxwvMCH6AeOoR4Zb4R0GcF+GfhQxHk0kkEf2TZJ+ZFrX4ZXj
SPCqKIl4RQvbQddAohTRPFYGgnLoedT4qUUCABw9lUUdXHmJcW6X5RlErVWf
We32wBflB8gLuQYsumBz+92JGseb0JRyB+NmXUGMLEL1YXsIn642iUDu+73k
zZB7yRm6/7oO2vS8ivJLdQ9bzeBa8Zz16tvMqIbCAzKopM4dVwT0alZ3rBs7
fcOVEKAexCdLFhxEldRHXtRG8B84ozpXP0j3hOMiSmaUu6yxllysaTShkuaQ
dT4w86MN+MaG3NELrSoUVIGnuTEAWlc5jcbr7phWpwQEq948EVyOppdEOJD/
ZAF8cPEnDMPitXRhFU5ZWe1ZHT4+8pyMDLCDYsJfLdIpJnUHEePTiYJDFJtS
ZdAE2pXEv5icWx1xQlKTA61E2IboVITTpQrqFO+g0ZsVA5J8Ysw91GdQCFzK
4UnvDUwVrCsjGUVincFjuJtxTGM9fCYeAUoWQ/JmEmH/4wf5Gmd2Gkumm+xR
d6aSI9tiFbbo7lNN235xPtyk4EQ7l6Fo51oVeYgBn0hR1w+9QxHAiscYLqnu
OPjBzM7hVj594dRYDVO5QJg4RHzdlk3n5JC9bLsho5J1LE88wPq8KRieWzjm
zgGDVIUSiAOAmiODmkDjKYVz8p+dYtAjH5DSzNkVJDGStAhTYeCoofhqVsRA
0dOOPGeqKzgeVWInJ2UORG3lZCvyUZOg12uTh14WktAlaqXRezBsnc/TKwxc
6aX0oLN+CCnsNHs3NvJaiCCPpOxADDLxfTomcbHTaTbCqK25ECqnFxXjHcHK
FbiV+iB5XLUtUyvbCumNLJgpQgaHg+sbTsT6HKK18yipM2qug/ZUOSMPCz2z
NBq7zV5DSenqIxa+qh60NRWrWkoAywyNgVTF8V1s9BC2vGwt5ScWacFoOL8R
4zwHlN3L0fHUjp/NXoE/Haufth5i9wwfDuhdGb8BgxHeIcM76IxOdmBNSRIp
ICcMJRvofOmPgY+P4SsbhHinyjrgEd0BOzytiK/tVMPOnMRu9PiqbUQvduco
JVz7+AU1QeGsctiWN2jDG9Hzhl3ynDw7CEOGDMVLEA55weqfXAwaNak4je82
9tCH8yZTm4GZNcBOxwdqQpsP8oxPcyGrUZCQxbdBd94qZxqbqd38QsvvDJGE
kShWbbtpQ87ohgUYxJM07H0VCV+SbC8i8LQEvnPp5U4W5Qvyeq6orumku9uL
tltKb8pRYRZo46EDitc8PYeQbejxeHg0/ECWBK3/hn7FMBpUbxwU6HtdrI8I
/v8vDK00wqv6WNmmyMCD3BCAVGZh/tTAg0FAbPc5J07ZZz/QhzlxE2j12ruI
1G5M779t8CeNTPEhPSvhC0kz+moWTo1vu1XU+3Hsbjjak0Ati4Wy/BcJXrhp
3piuFXGkyruvq913n1Vr8q7Fzwr66uwiTGcnk5vuU8MXllm094IEZVesHM4e
AoMco3ol754p9UFkk6DgZKxGzDOz9sudF0ozyZpaVS7iTpPkUGiNJNx6bvEg
1814AEVTBNZrwochWfBHXrDQ9wZlWzBg1ZD0imzP2AJOVzjBXAwl1xWKvvXG
Rf/i97qtqsGP6NCFoY9eL2PjcwdAVGLLp2HfqvWaA+YUCplE3a6rmntdZ3Bv
9uy+e/Y/k24+grIFPzwr2a7xcysIP3ScHeV0dLitk84gbiT8qnbD8xLdmp3c
sxbbndXQwFisKUrxLzL8KW/zXYheEURe1X6Lb+fvLAhZcjisdUvs407DzeZ8
fDXe+etn+weE9vsTCV2cK7PN30ZpF7G16JT37hHfpj+ffotf9umzf/I/3qZy
BHUdAAA=

-->

</rfc>
