<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.3.0) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-wendt-stir-certificate-transparency-01" category="info" consensus="true" submissionType="IETF" number="1" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="STI CT">STI Certificate Transparency</title>

    <author fullname="Chris Wendt">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>chris@appliedbits.com</email>
      </address>
    </author>
    <author fullname="Rob Sliwa">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>robjsliwa@gmail.com</email>
      </address>
    </author>
    <author fullname="Alec Fenichel">
      <organization>TransNexus</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>alec.fenichel@transnexus.com</email>
      </address>
    </author>
    <author fullname="Vinit Anil Gaikwad">
      <organization>Twilio</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>vanilgaikwad@twilio.com</email>
      </address>
    </author>

    <date year="2024" month="March" day="17"/>

    <area>Applications and Real-Time</area>
    <workgroup>Secure Telephone Identity Revisited</workgroup>
    <keyword>stir</keyword> <keyword>certificates</keyword> <keyword>delegate certificates</keyword>

    <abstract>


<?line 61?>

<t>This document describes a framework for the use of the Certificate Transparency (CT) protocol for publicly logging the existence of Secure Telephone Identity (STI) certificates as they are issued or observed. This allows any interested party that is part of the STI eco-system to audit STI certification authority (CA) activity and audit both the issuance of suspect certificates and the certificate logs themselves. The intent is for the establishment of a level of trust in the STI eco-system that depends on the verification of telephone numbers requiring and refusing to honor STI certificates that do not appear in a established log. This effectively establishes the precedent that STI CAs must add all issued certificates to the logs and thus establishes unique association of STI certificates to an authorized provider or assignee of a telephone number resource. The primary role of CT in the STI ecosystem is for verifiable trust in the avoidance of issuance of unauthorized duplicate telephone number level delegate certificates or provider level certificates.  This provides a robust auditable mechanism for the detection of unauthorized creation of certificate credentials for illegitimate spoofing of telephone numbers.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://appliedbits.github.io/draft-wendt-stir-certificate-transparency/draft-wendt-stir-certificate-transparency.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-wendt-stir-certificate-transparency/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Telephone Identity Revisited Working Group mailing list (<eref target="mailto:stir@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/stir/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/stir/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/appliedbits/draft-wendt-stir-certificate-transparency"/>.</t>
    </note>


  </front>

  <middle>


<?line 65?>

<section anchor="introduction"><name>Introduction</name>

<t>Certificate Transparency (CT) aims to mitigate the problem of misissued certificates by providing append-only logs of issued certificates. The logs do not themselves prevent misissuance, but ensure that interested parties (particularly those named in certificates or certificate chains) can detect such misissuance. <xref target="RFC9162"/> describes the core protocols and mechanisms for use of CT for the purposes of public TLS server certificates associated with a domain name as part of the public domain name system (DNS). This document describes the direct use of the same fundamental protocols and processes of certificate transparency but applies them to Secure Telephone Identity (STI) certificates <xref target="RFC8226"/> and delegate certificates <xref target="RFC9060"/>.</t>

<t>Telephone numbers (TNs) and their management and assignment by telephone service providers and Responsible Organizations (RespOrgs) for toll-free numbers share many similarities to the Domain Name System (DNS) where there is a global uniqueness and established association of telephone numbers to regulatory jurisdictions that manage the allocation and assignment of telephone numbers under country codes and a set of numeric digits for routing telephone calls and messages over telephone networks. STI Certificates use a TNAuthList extension defined in <xref target="RFC8226"/> to specifically associate either telephone service providers or telephone numbers to the issuance of STI certificates and certificate change that are intended to represent the authorized right to use a telephone number. This trusted association can be establish via mechanisms such as Authority tokens for TNAuthList defined in <xref target="RFC9448"/>. Certificate transparency is generally meant to provide a publically verifiable and auditable representation of the creation of certificates in order to establish transparency and trust to interested parties as part of a stir related eco-system.</t>

<t>There is three primary actors in the certificate transparency framework. There is the STI Certification Authorities (CAs) that submit all certificates to be issued to one or more log services. The log services are network services that implement the protocol operations for submissions of STI certificates and subsequent queries. They are hosted by interested parties in the STI ecosystem and can accept certificate log submissions from any other CA participant.  Monitors play the role of monitoring the CT logs to check for potential misissuance as well as auditing of the log services.  This role can be played by any STI ecosystem participant interested in the trust of the ecosystem or the integrity of the telephone number or provider level certificates produced in the eco-system.</t>

<t>The details that follow in this document will try to provide a high level overview of the use of Certificate Transparency for STI certificates.  It will provide only the necessary details related to STI certificates. The details of the use of Merkel Tree and API interfaces largely follow the protocols defined in <xref target="RFC9162"/> and only when there is specific details and differences to <xref target="RFC9162"/> will that be noted and defined in this document.</t>

<t>This general mechanism could also be used for transparently logging other important stir related metadata associations perhaps via JWTClaimConstraints defined in <xref target="RFC8226"/> and <xref target="RFC9118"/> or other ways defined in potential future extensions of this document.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="the-use-of-certificate-transparency-for-sti-certificates"><name>The Use of Certificate Transparency for STI Certificates</name>

<t>Each log contains certificate chains, which can be submitted by any CA authorized in the stir eco-system. It is expected that these CAs will contribute all their newly issued certificates to one or more logs.  Note, in <xref target="RFC9162"/> it is possible for certificate holders to directly contribute their own certificate chains or interested third parties, however because in stir eco-systems that generally consist of regulated entities or are authorized to be assigned telephone number resources, this does not seem to be a likely scenario. Generally, many stir eco-systems have a controlled set of CAs that are authorized to participate as valid trust anchors. It is required that each chain ends with a trust anchor that is accepted by the log which would include those authorized trust anchors or a subset of them. When a chain is accepted by a log, a signed timestamp is returned, which is later used to provide evidence to STIR verification services (VS), defined in <xref target="RFC8224"/>, that the chain has been submitted. A VS can thus require that all certificates they accept as valid are accompanied by signed timestamps.</t>

<t>Those concerned about misissuance of stir certificates can monitor the logs, asking them regularly for all new entries, and can thus check whether the providers or telephone numbers for which they are responsible have had certificates issued that they did not expect. What they do with this information, particularly when they find that a misissuance has happened, is beyond the scope of this document. However, broadly speaking, because many existing STI ecosystems have a connection to regulated and industry environments that govern the issuance of STI certificates, they can invoke existing mechanisms for dealing with issues such as misissued certificates, such as working with the CA to get the certificate revoked or with maintainers of trust anchor lists to get the CA removed.</t>

</section>
<section anchor="submitters"><name>Submitters</name>

<t>Submitters submit certificates or preannouncements of certificates prior to issuance (precertificates) to logs for public auditing. In order to enable attribution of each logged certificate or precertificate to its issuer, each submission <bcp14>MUST</bcp14> be accompanied by all additional certificates required to verify the chain up to an accepted trust anchor. The trust anchor (a root or intermediate CA certificate) <bcp14>MAY</bcp14> be omitted from the submission.</t>

<t>If a log accepts a submission, it will return a Signed Certificate Timestamp (SCT) (see Section 4.8 <xref target="RFC9162"/>). The submitter <bcp14>SHOULD</bcp14> validate the returned SCT, as described in Section 8.1 of <xref target="RFC9162"/>, if they understand its format and they intend to use it to construct an STI certificate.</t>

<section anchor="certificates"><name>Certificates</name>

<t>Any entity can submit a certificate (Section 5.1 of <xref target="RFC9162"/>) to a log. Since it is anticipated that verification services could reject certificates that are not logged, it is expected that certificate issuers and subjects will be strongly motivated to submit them.</t>

<t>Author note: consider the exclusive use of precertificates, so this section may not be needed</t>

</section>
<section anchor="precertificates"><name>Precertificates</name>

<t>CAs may preannounce a certificate prior to issuance by submitting a precertificate (Section 5.1 of <xref target="RFC9162"/>) that the log can use to create an entry that will be valid against the issued certificate. If the CA is submitting the precertificate to only one log, it <bcp14>MUST</bcp14> incorporate the returned SCT in the issued certificate. The returned SCT <bcp14>MAY</bcp14> not be incorporated in the issued certificate is when a CA sends the precertificate to multiple logs and only incorporates the SCTs that are returned first.</t>

<t>A precertificate is a CMS <xref target="RFC5652"/> signed-data object that conforms to the profile detailed in Section 3.2 of <xref target="RFC9162"/>.</t>

</section>
</section>
<section anchor="log-format-and-operation"><name>Log Format and Operation</name>

<t>A log is a single, append-only Merkle Tree of submitted certificate entries.  Log procedures <bcp14>MUST</bcp14> follow log format and operation procedures defined in Section 4 of <xref target="RFC9162"/>.</t>

<t>Author note: Do we need a separate IANA registry for Log OIDs specific to STI eco-system?</t>

</section>
<section anchor="log-client-messages"><name>Log Client Messages</name>

<t>Log Client Messages and API <bcp14>MUST</bcp14> follow same protocols, formats and procedures as described in Section 5 of  <xref target="RFC9162"/></t>

</section>
<section anchor="stir-authentication-services"><name>STIR Authentication Services</name>

<t>STIR Authentication Services <xref target="RFC8224"/> <bcp14>MUST</bcp14> present on or more SCTs from one or more logs by the inclusion of the stir certificate that has CT information encoded as an extension in the X.509v3 certificate (see Section 7.1.2 of <xref target="RFC9162"/>).</t>

</section>
<section anchor="sti-certification-authorities"><name>STI Certification Authorities</name>

<t>A certification authority <bcp14>MUST</bcp14> include a Transparency Information X.509v3 extension in a certificate.  All included SCTs and inclusion proofs <bcp14>MUST</bcp14> be for a precertificate that corresponds to this certificate.</t>

</section>
<section anchor="clients"><name>Clients</name>

<t>There are various different functions clients of logs might perform. In this document, the client generally refers to the STI verification service defined in <xref target="RFC8224"/>, or more generally an entity that performs the verification of a PASSporT defined in <xref target="RFC8225"/>. We describe here some typical clients and how they should function.</t>

<section anchor="sti-verification-service"><name>STI Verification Service</name>

<section anchor="receiving-scts"><name>Receiving SCTs</name>

<t>When a STIR Verification Service receives a signed PASSporT referencing a stir certificate, the verification service should check that the certificate has CT information encoded as an extension and that is a valid signed SCT or multiple SCTs.</t>

</section>
<section anchor="reconstructing-the-tbscertificate"><name>Reconstructing the TBSCertificate</name>

<t>Validation of an SCT for a certificate (where the type of the TransItem is x509_sct_v2) uses the unmodified TBSCertificate component of the certificate.</t>

<t>Before an SCT for a precertificate (where the type of the TransItem is precert_sct_v2) can be validated, the TBSCertificate component of the precertificate needs to be reconstructed from the TBSCertificate component of the certificate as follows:</t>

<t>Remove the Transparency Information extension (see Section 7.1 of <xref target="RFC9162"/>).</t>

</section>
<section anchor="validating-scts"><name>Validating SCTs</name>

<t>In order to make use of a received SCT, the STI Verification Service <bcp14>MUST</bcp14> first validate it as follows:</t>

<t><list style="symbols">
  <t>Compute the signature input by constructing a TransItem of type x509_entry_v2, depending on the SCT's TransItem type. The TimestampedCertificateEntryDataV2 structure is constructed in the following manner:</t>
  <t>timestamp is copied from the SCT.</t>
  <t>tbs_certificate is the reconstructed TBSCertificate portion of the server certificate, as described in Section 8.1.2 of <xref target="RFC9162"/>.</t>
  <t>issuer_key_hash is computed as described in Section 4.7 of <xref target="RFC9162"/>.</t>
  <t>sct_extensions is copied from the SCT.</t>
  <t>Verify the SCT's signature against the computed signature input using the public key of the corresponding log, which is identified by the log_id. The required signature algorithm is one of the log's parameters.</t>
</list></t>

<t>Note that SCT validation is not a substitute for the normal validation of the server certificate and its chain.</t>

</section>
</section>
<section anchor="monitor"><name>Monitor</name>

<t>Monitors watch logs to check for correct behavior, for certificates of interest, or for both. For example, a monitor may be configured to report on all certificates that apply to a specific domain name when fetching new entries for consistency validation.</t>

<t>A monitor <bcp14>MUST</bcp14> at least inspect every new entry in every log it watches, and it <bcp14>MAY</bcp14> also choose to keep copies of entire logs.</t>

<t>To inspect all of the existing entries, the monitor <bcp14>SHOULD</bcp14> follow the steps detailed in Section 8.2 of <xref target="RFC9162"/>.</t>

</section>
<section anchor="auditing"><name>Auditing</name>

<t>Auditing ensures that the current published state of a log is reachable from previously published states that are known to be good and that the promises made by the log, in the form of SCTs, have been kept. Audits are performed by monitors or STI Verification Services.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>TODO Security</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions, yet.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC5652">
  <front>
    <title>Cryptographic Message Syntax (CMS)</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="September" year="2009"/>
    <abstract>
      <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="70"/>
  <seriesInfo name="RFC" value="5652"/>
  <seriesInfo name="DOI" value="10.17487/RFC5652"/>
</reference>

<reference anchor="RFC8224">
  <front>
    <title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="C. Jennings" initials="C." surname="Jennings"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context. This document defines a mechanism for securely identifying originators of SIP requests. It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t>
      <t>This document obsoletes RFC 4474.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8224"/>
  <seriesInfo name="DOI" value="10.17487/RFC8224"/>
</reference>

<reference anchor="RFC8225">
  <front>
    <title>PASSporT: Personal Assertion Token</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8225"/>
  <seriesInfo name="DOI" value="10.17487/RFC8225"/>
</reference>

<reference anchor="RFC8226">
  <front>
    <title>Secure Telephone Identity Credentials: Certificates</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers. This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8226"/>
  <seriesInfo name="DOI" value="10.17487/RFC8226"/>
</reference>

<reference anchor="RFC9060">
  <front>
    <title>Secure Telephone Identity Revisited (STIR) Certificate Delegation</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="September" year="2021"/>
    <abstract>
      <t>The Secure Telephone Identity Revisited (STIR) certificate profile provides a way to attest authority over telephone numbers and related identifiers for the purpose of preventing telephone number spoofing. This specification details how that authority can be delegated from a parent certificate to a subordinate certificate. This supports a number of use cases, including those where service providers grant credentials to enterprises or other customers capable of signing calls with STIR.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9060"/>
  <seriesInfo name="DOI" value="10.17487/RFC9060"/>
</reference>

<reference anchor="RFC9118">
  <front>
    <title>Enhanced JSON Web Token (JWT) Claim Constraints for Secure Telephone Identity Revisited (STIR) Certificates</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="August" year="2021"/>
    <abstract>
      <t>RFC 8226 specifies the use of certificates for Secure Telephone Identity Credentials; these certificates are often called "Secure Telephone Identity Revisited (STIR) Certificates". RFC 8226 provides a certificate extension to constrain the JSON Web Token (JWT) claims that can be included in the Personal Assertion Token (PASSporT), as defined in RFC 8225. If the PASSporT signer includes a JWT claim outside the constraint boundaries, then the PASSporT recipient will reject the entire PASSporT. This document updates RFC 8226; it provides all of the capabilities available in the original certificate extension as well as an additional way to constrain the allowable JWT claims. The enhanced extension can also provide a list of claims that are not allowed to be included in the PASSporT.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9118"/>
  <seriesInfo name="DOI" value="10.17487/RFC9118"/>
</reference>

<reference anchor="RFC9162">
  <front>
    <title>Certificate Transparency Version 2.0</title>
    <author fullname="B. Laurie" initials="B." surname="Laurie"/>
    <author fullname="E. Messeri" initials="E." surname="Messeri"/>
    <author fullname="R. Stradling" initials="R." surname="Stradling"/>
    <date month="December" year="2021"/>
    <abstract>
      <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
      <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
      <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9162"/>
  <seriesInfo name="DOI" value="10.17487/RFC9162"/>
</reference>

<reference anchor="RFC9448">
  <front>
    <title>TNAuthList Profile of Automated Certificate Management Environment (ACME) Authority Token</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="D. Hancock" initials="D." surname="Hancock"/>
    <author fullname="M. Barnes" initials="M." surname="Barnes"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>This document defines a profile of the Automated Certificate Management Environment (ACME) Authority Token for the automated and authorized creation of certificates for Voice over IP (VoIP) telephone providers to support Secure Telephone Identity (STI) using the TNAuthList defined by STI certificates.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9448"/>
  <seriesInfo name="DOI" value="10.17487/RFC9448"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>



<?line 197?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors would like to thank the authors and contributors to the protocols and ideas around Certificate Transparency <xref target="RFC9162"/> which sets the basis for the STI eco-system to adopt in a very straight forward way, providing trust and transparency in the telephone number world.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

