<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 4.0.1) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-herr-dkim2-bcp-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DKIM2 BCP">DKIM2 Best Practices</title>

    <author initials="T." surname="Herr" fullname="Todd Herr">
      <organization>GreenArrow Email</organization>
      <address>
        <email>todd@someguyinva.com</email>
      </address>
    </author>

    <date year="2026" month="March" day="16"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 41?>

<t><xref target="DKIM2"></xref> and associated documents describe the DomainKeys Identified Mail v2 (DKIM2) email authentication protocol. 
DKIM2 is designed to address shortcomings in email authentication protocols and mechanisms released prior to DKIM2,
specifically SPF <xref target="RFC7208"></xref>, DKIM <xref target="RFC6376"></xref>, DMARC <xref target="RFC7489"></xref>, and ARC <xref target="RFC8617"></xref>. Those shortcomings most commonly
manifested themselves in email messages that passed through one or more intermediary hosts (e.g., forwarders or
mailing list servers) while transiting from origination to final destination. Although these messages were properly
authenticated when sent, the alteration of their path and/or content by the intermediary hosts would cause authentication
checks to fail at the final destination. In addition, DKIM was susceptible to "replay" of signatures, when attackers
would construct abusive messages in such a way that they would pass validation checks for a DKIM signature that had
been imported from another message entirely.</t>

<t>To address these shortcomings, DKIM2 provides methods not only for intermediary systems to provide details of the changes that
they make to a message in transit, but also for receiving hosts to validate those changes in addition to the original message.
DKIM2 also allows recipients to detect when messages have been unexpectedly "replayed" and can also ensure that delivery status
notifications (DSNs) are only sent to entities that were involved in the transmission of a message.</t>

<t>This document describes the recommended usage of the DKIM2 protocol for sending hosts, intermediary hosts, and receiving
hosts.</t>



    </abstract>



  </front>

  <middle>


<?line 61?>

<section anchor="introduction"><name>Introduction</name>

<t>DomainKeys Identified Mail v2 (DKIM2) permits a person, role, or
organization to document that they have handled an email message by
associating a domain name <xref target="RFC1034"></xref> with the message <xref target="RFC5322"></xref>. A
public key signature is used to record that they have been able
to read the contents of the message and write to it.</t>

<t>Verification of claims is achieved by fetching a public key stored
in the DNS under the relevant domain and then checking the signature.</t>

<t>Message transit from author to recipient is through
Forwarders that typically make no substantive change to the message
content and thus preserve the DKIM2 signature. Where they do make
a change the changes they have made are documented so that
these can be "undone" and the original signature validated.</t>

<t>When a message is forwarded from one system to another an
additional DKIM2 signature is added on each occasion. This chain
of custody assists validators in distinguishing between messages that
were intended to be sent to a particular email address and those
that are being "replayed" to that address.</t>

<t>The chain of custody can also be used to ensure that delivery status
notifications are only sent to entities that were involved in the
transmission of a message.</t>

<t>Organizations that process a message can add to their signature
a request for feedback as to any opinion (for example, that the
email was considered to be spam) that the eventual recipient of
the message wishes to share.</t>

<t>This document discusses best practices for signing, handling, and validating
messages that have a DKIM2 signature. These best practices are based in large
part on the many years of experience the email community has with the 
authentication protocols that DKIM2 is intended to replace.</t>

</section>
<section anchor="terminology-and-definitions"><name>Terminology and Definitions</name>

<t>This section defines terms used in the rest of the document.</t>

<t>DKIM2 is designed to operate within the Internet Mail service, as
defined in <xref target="RFC5598"></xref>.  Basic email terminology is taken from that
specification.</t>

<t>DKIM2 inherits many ideas from DKIM (<xref target="RFC6376"></xref>) which, for clarity
we refer to in this specification as DKIM1. In addition, some features
were influenced by experience from (see <xref target="CONCLUDEARC"></xref>) the experimental
ARC protocol (<xref target="RFC8617"></xref>).</t>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
<xref target="RFC2119"></xref>.  These words take their normative meanings only when they
are presented in ALL UPPERCASE.</t>

<section anchor="administrative-management-domains-admds"><name>ADministrative Management Domains (ADMDs)</name>

<t>The terms "ADMD" and "ADMDs" as used in this document  are defined 
in <xref target="RFC5598"></xref>.</t>

</section>
<section anchor="signers"><name>Signers</name>

<t>Elements in the mail system that sign messages on behalf of a domain
are referred to as Signers.  These may be MUAs (Mail User Agents),
MSAs (Mail Submission Agents), MTAs (Mail Transfer Agents), or other
agents such as mailing list "exploders".  In general, any Signer will
be involved in the injection of a message into the message system in
some way.  The key point is that a message must be signed before it
leaves the administrative domain of the Signer.</t>

</section>
<section anchor="forwarder-admds"><name>Forwarder ADMDs</name>

<t><xref target="RFC5598"></xref> defines a Relay as transmitting or retransmitting a message
but states that it will not modify the envelope information or the
message content semantics. It also defines a Gateway as a hybrid of
User and Relay that connects heterogeneous mail services. In this
document we define a Forwarder as an ADMD that receives
a message and then, as an alternative to delivering it into a
destination mailbox, relays (or forwards) it on to another ADMD in
an automated, pre-determined, manner.</t>

</section>
<section anchor="reviser"><name>Reviser</name>

<t>As will be seen, a Forwarder may alter the message content or header
fields, in such a way that existing signatures on the message will
no longer validate. If so, then a record will be made of these
changes. We call a Forwarder that makes such changes a Reviser.</t>

</section>
<section anchor="verifiers"><name>Verifiers</name>

<t>Elements in the mail system that verify signatures are referred to as
Verifiers.  These may be Forwarders, Revisers, MTAs, Mail Delivery
Agents (MDAs), or MUAs.  It is an expectation of DKIM2 that a recipient
of a message will wish to verify some or all signatures before determining
whether or not to accept the message or pass it on to another entity.</t>

</section>
<section anchor="signing-domain"><name>Signing Domain</name>

<t>A domain name associated with a signature. This domain may be
associated with the author of an email, their organization, a
company hired to deliver the email, a mailing list operator, or
some other entity that handles email. What they have in common is
that at some point they had access to the entire contents of the
email and were in a position to add their signature to the email.</t>

</section>
<section anchor="selectors"><name>Selectors</name>

<t>To support multiple concurrent public keys per signing domain, the
key namespace is subdivided using "selectors".</t>

<t>The number of public keys and corresponding selectors for each domain
is determined by the domain owner. Many domain owners will use just one
selector, whereas administratively distributed organizations can choose
to manage disparate selectors and key pairs in different regions or on 
different email servers.</t>

<t>Selectors can also be used to delegate a signing authority, which
can be withdraw at any time. Selectors also make it possible to
seamlessly replace keys on a routine basis by signing with a new
selector, while keeping the key associated with the old selector
available.</t>

</section>
<section anchor="sender-admds"><name>Sender ADMDs</name>

<t><xref target="RFC5598"></xref> defines a path for messages that starts with hops from an Author
to an Originator to a Relay, before transiting additional hops on the way 
to their final destination. In this document, we will collectively refer 
to those first three hops (Author--&gt;Originator--&gt;Relay) as Sender or Sender
ADMD.</t>

</section>
</section>
<section anchor="algorithms"><name>Signing and Verification Cryptographic Algorithms</name>

<t>DKIM2 supports multiple hashing and digital signature algorithms. One
hash function (SHA256) if specified here and two signing algorithms
are defined by the DKIM2 protocol: RSA-SHA256 and Ed25519-SHA256.
Signers and Verifiers <strong>MUST</strong> implement SHA256. Signers <strong>SHOULD</strong> implement
both RSA-SHA256 and Ed25519-SHA256. Verifiers <strong>MUST</strong> implement both
RSA-SHA256 and Ed25519-SHA256.</t>

<section anchor="the-sha256-hashing-algorithm"><name>The SHA256 Hashing Algorithm</name>

<t>The SHA256 hashing algorithm is used to compute body and
header hashes as defined in <xref target="DKIM2"></xref> and
<xref target="DKIM2"></xref> The resultant
values are stored within Message-Instance header fields.</t>

</section>
<section anchor="the-rsa-sha256-signing-algorithm"><name>The RSA-SHA256 Signing Algorithm</name>

<t>The RSA-SHA256 Signing Algorithm computes a hash over all the Message-Instance
and DKIM2-Signature header fields as described in <xref target="DKIM2"></xref> using
SHA-256 (FIPS-180-4-2015) as the hash-alg.  That
hash is then signed by the Signer using the RSA algorithm (defined in
PKCS#1 version 1.5 <xref target="RFC8017"></xref>) as the crypt-alg and the Signer's
private key.  The hash <strong>MUST NOT</strong> be truncated or converted into any
form other than the native binary form before being signed.  The
signing algorithm <strong>MUST</strong> use a public exponent of 65537.</t>

<t>Signers <strong>MUST</strong> use RSA keys of at least 1024 bits.  Verifiers <strong>MUST</strong> be able
to validate signatures with keys ranging from 1024 bits to 2048 bits, and
they <strong>MAY</strong> be able to validate signatures with larger keys.</t>

</section>
<section anchor="the-ed25519-sha256-signing-algorithm"><name>The Ed25519-SHA256 Signing Algorithm</name>

<t>The Ed25519-SHA256 Signing Algorithm computes a hash over all the Message-Instance
and DKIM2-Signature fields as described in <xref target="DKIM2"></xref> using
SHA-256 (FIPS-180-4-2015) as the hash-alg. It signs the hash with the PureEdDSA
variant Ed25519, as defined in Section 5.1 of <xref target="RFC8032"></xref>.</t>

</section>
<section anchor="other-algorithms"><name>Other Algorithms</name>

<t>Other algorithms <strong>MAY</strong> be defined in the future.  Verifiers <strong>MUST</strong> ignore
any hashes or signatures using algorithms that they do not implement.</t>

</section>
<section anchor="key_management"><name>Key Management</name>

<t>Some level of assurance is required that
a public key is associated with the claimed Signer. DKIM2
does this by fetching the key from the DNS for the domain specified
in the d= field.</t>

<t>DKIM2 keys are stored in a subdomain named "_domainkey".  Given a
DKIM2-Signature field with a "d=" tag of "example.com" and an "s1=" tag
of "foo.bar", the DNS query will be for "foo.bar._domainkey.example.com".</t>

<t>NOTE: these keys are no different, and are stored in the same locations
as those for DKIM1 (<xref target="RFC6376"></xref>).</t>

<t>Further details can be found in <xref target="DKIMKEYS"></xref>.</t>

</section>
</section>
<section anchor="sender-admd-actions"><name>Sender ADMD Actions</name>

<t>In order to participate in DKIM2, Sender ADMDs <em>*MUST</em> be Signers. The following sections 
describe best practices for such Senders.</t>

<section anchor="sign-all-outgoing-messages-with-dkim2-and-dkim1-signatures"><name>Sign all outgoing messages with DKIM2 and DKIM1 signatures.</name>

<t>Because it is expected that the transition from DKIM1 to DKIM2 across the email ecosystem will be gradual, Sender
ADMDs <strong>SHOULD</strong> sign messages with both DKIM1 and DKIM2 keys until such time as the deployment of DKIM2 is effectively 
ubiquitous.</t>

</section>
<section anchor="sign-with-multiple-keys"><name>Sign with multiple keys</name>

<t>To ensure maximum interoperability, Sender ADMDs <strong>SHOULD</strong> sign messages with multiple DKIM2 signatures, with each 
such signature using a different cryptographic algorithm.</t>

</section>
<section anchor="sender-sign-on-exit"><name>Only Sign On Exit</name>

<t>Many Sender ADMDs originate messages from infrastructure that requires the message transit multiple hops before reaching
its egress point to travel to its destination. Sender ADMDs <strong>MUST</strong> only apply DKIM2 signatures to messsages only at this
last hop before it leaves their infrastructure.</t>

</section>
<section anchor="regularly-rotate-dkim-signing-keys"><name>Regularly Rotate DKIM Signing Keys</name>

<t>Sender ADMDs <strong>SHOULD</strong> follow best practices for rotating DKIM keys, both for DKIM1 and DKIM2 - 
https://www.m3aawg.org/sites/default/files/m3aawg-dkim-key-rotation-bp-2019-03.pdf</t>

</section>
</section>
<section anchor="forwarder-actions"><name>Forwarder Actions</name>

<t>A Forwarder participating in DKIM2 <strong>MUST</strong> be a Signer. Further, as mentioned above, a Forwarder might also 
function as a Reviser and/or a Verifier before passing a message along to the next hop. This section describes 
the best practices for a Forwarder participating in DKIM2.</t>

<section anchor="attempt-verification-of-existing-dkim-signatures"><name>Attempt Verification of Existing DKIM Signatures</name>

<t>A Forwarder <strong>MUST</strong> attempt to Verify the DKIM signatures found in a message when it first arrives to the Forwarder.</t>

</section>
<section anchor="sign-all-outgoing-messages-with-dkim2-and-dkim1-signatures-1"><name>Sign all outgoing messages with DKIM2 and DKIM1 signatures.</name>

<t>Forwarders participating in DKIM2 <strong>MUST</strong> be Signers, In addition, for the reason mentioned above in the Sender ADMD Actions 
section of this document, Forwarders <strong>SHOULD</strong> sign messages with both DKIM1 and DKIM2 keys until such time as the 
deployment of DKIM2 is effectively ubiquitous.</t>

</section>
<section anchor="sign-even-if-just-forwarding-and-not-revising"><name>Sign Even If Just Forwarding and Not Revising</name>

<t>Forwarders participating in DKIM2 <strong>MUST</strong> DKIM2 sign any message they handle, regardless of whether or not they 
Revise the message.  Such signatures maintain a proper DKIM2 "chain of custody" and allow for cleaner verification 
and unwinding of changes at future hops.</t>

</section>
<section anchor="sign-with-multiple-keys-1"><name>Sign with multiple keys</name>

<t>To ensure maximum interoperability, Forwarders <strong>SHOULD</strong> sign messages with multiple DKIM2 signatures, with each 
such signature using a different cryptographic algorithm.</t>

</section>
<section anchor="forwarder-sign-on-exit"><name>Only Sign On Exit</name>

<t>As with Sender ADMDs, if the Fowarder's infrastructure requires the message to transit multiple hops before reaching
its egress point to travel to its destination, then the Forwarder <strong>MUST</strong> only apply DKIM2 signatures to messsages
only at this last hop before it leaves their infrastructure.</t>

</section>
<section anchor="regularly-rotate-dkim-signing-keys-1"><name>Regularly Rotate DKIM Signing Keys</name>

<t>Forwarders <strong>SHOULD</strong> follow best practices for rotating DKIM keys, both for DKIM1 and DKIM2 - 
https://www.m3aawg.org/sites/default/files/m3aawg-dkim-key-rotation-bp-2019-03.pdf</t>

</section>
<section anchor="continue-doing-from-munging"><name>Continue doing From munging</name>

<t>When a message reaches a Forwarder, if the Forwarder determines that the Domain Owner of the RFC5322.From header 
domain has published a DMARC record for that domain, the Fowarder <strong>SHOULD</strong> alter the RFC5322.From header in 
such a way as to ensure that the message will not fail DMARC validation when it reaches its destination. Some 
strategies for doing this are discussed in Section 7.4 of <xref target="DMARCbis"></xref></t>

</section>
<section anchor="brons-idea-privacy-preseving-forwarder-remove-mention-of-forward-target-from-bounces"><name>Bron's idea - Privacy preseving forwarder - remove mention of forward target from bounces</name>

<t>Need some text for this...</t>

</section>
</section>
<section anchor="receiver-admd-actions"><name>Receiver ADMD Actions</name>

<t>Receiving ADMDs in the DKIM2 ecosystem are those that host mailboxes for the domain to which the message
is ultimately routed. Receiving ADMDs are Verifiers, and depending on local policy, the disposition of the
message may be influenced by whether or not the message passes DKIM2 verification checks.</t>

<t>Verification of messages will rely in part on whether or not a full DKIM2 "chain of custody" exists for
the message, meaning whether or not the Verifier can reliably determine if each hop that handled the message
prior to its reaching the Receiving ADMD applied a proper DKIM2 signature to the message. We will define
three conditions, as follows:</t>

<t><list style="symbols">
  <t>A message that was DKIM2 signed at its point of egress (as described in <xref target="sender-sign-on-exit"></xref> and <xref target="forwarder-sign-on-exit"></xref>)
by each ADMD handling the message prior to its reaching the Receiving ADMD is one that "Never Left The DKIM2 Ecosystem"</t>
  <t>A message that was DKIM2 signed at its point of egress by some, but not all, ADMDs handling the message prior to its reaching
the Receiving ADMD is one that was "In and Out of The DKIM2 Ecosystem"</t>
  <t>A message that contains no DKIM2 signatures when reaching the Receiving ADMD is one that "Never Entered The
DKIM2 Ecosystem"</t>
</list></t>

<t>Each condition will come with its own set of recommendations for the Receiving ADMD.</t>

<section anchor="never-left-dkim2"><name>Messages That Never Left The DKIM2 Ecosystem</name>

<t>If such a message passes DKIM2 Verification performed by the Receiving ADMD, the Receiving ADMD should apply 
local policy for determining message handling and disposition.</t>

<t>If such a message fails DKIM2 Verification performed by the Receiving ADMD, the Receiving ADMD <strong>MAY</strong> safely 
reject the message under assumption that the DSN(s) will only be sent to entities responsible for transmission 
of the message. The Receiving ADMD's local policy, however, will dictate final handling and disposition.</t>

</section>
<section anchor="in-and-out-ecosystem"><name>Messages That Were In and Out of the DKIM2 Ecosystem</name>

<t>Examples of messages that match this condition would be:</t>

<t><list style="symbols">
  <t>The message was DKIM2 <xref target="sender-sign-on-exit">signed on exit</xref> by the Sender ADMD, and passed through one or 
more Forwarders on its way to the Receiver ADMD, and at least one Forwarder ADMD did not DKIM2 sign the message.</t>
  <t>The message was not DKIM2 signed by the Sender ADMD, and passed through one or more Forwarder ADMDs on its way
to the Receiver ADMD, and at least one Forwarder ADMD did DKIM2 sign the message.</t>
</list></t>

<t>(Need text on how to detect that message left DKIM2 Ecosystem)</t>

<t>For such messages, local policy will dictate handling. Receiver ADMDs will have to decide whether or not a 
successful DKIM2 Verification is a condition of message acceptance or whether or not a failed Verification
might not preclude acceptance but might influence message disposition. Receiver ADMDs that can verify DKIM
as well as DKIM2 can set a policy to attempt to verify DKIM signatures found in lieu of DKIM2 siganturs for
a given ADMD in the message's transit chain. As DKIM2 deployment widens and protocol usage matures, Receiver
ADMDs might alter their local policies to be more reliant solely on DKIM2 Verification.</t>

</section>
<section anchor="messages-never-entered-the-dkim2-ecosystem"><name>Messages Never Entered The DKIM2 Ecosystem</name>

<t>Receiver ADMDs participating in DKIM2 will have to establish local policy to dictate what to do with messages
that arrive bearing no DKIM2 signatures. Those Receiver ADMDs that can verify DKIM signatures as well as DKIM2
signatures fall back to their existing policies for message disposition based on DKIM verification success or
failure. This policy may change over time, as Receivers observe what percentage of mail arrives each day bearing
DKIM2 signatures vice the percentage that arrives without, and how their mailbox holders engage with each kind.</t>

</section>
</section>
<section anchor="interoperability-with-other-email-authentication-protocols-and-mechanisms"><name>Interoperability With Other Email Authentication Protocols and Mechanisms</name>

<t>It is anticipated that DKIM2 deployment will happen gradually across the email ecosystem, and that other
authentication protocols and mechanisms will co-exist alongside DKIM2 for some time. This section discusses
various interoperability scenarios.</t>

<section anchor="dkim1-and-dkim2-interoperability"><name>DKIM1 and DKIM2 Interoperability</name>

<t>(might fold this into the preceding sections; alternatively, might want to flesh out the text about treating
 DKIM and DKIM2 equivalently, the backscatter and anti-replay stuff, etc.)</t>

<t>After DKIM2 is published, there will be a period of time during which the ecosystem will contain a mix of 
DKIM-only <xref target="RFC6376"></xref> and DKIM2-capable participants; this will mean that there will be a significant volume
of email messages that meet our definition of <xref target="in-and-out-ecosystem">"In and Out of the DKIM2 Ecosystem'</xref>.</t>

<t>The preceding sections describe actions for each type of ADMD to take, which can be boiled down to "sign
with both DKIM and DKIM2 on exit" and "verify both DKIM and DKIM2 for a while, but gradually maybe move to 
just DKIM2".</t>

<t>DKIM2-capable receivers should verify both DKIM and DKIM2 signatures when found, but that said, should not 
treat results equivalently.  When forwarding, DKIM2-capable sender should perform DKIM2 signing only when
the DKIM2 security properties to protect against replay and backscatter are met. This property is met when
any prior DKIM2 signatures are be valid per <xref target="DKIM2"></xref>.</t>

<t>DKIM does not provide the same anti-replay and backscatter protections that DKIM2 can.  Consequently DKIM2-capable
participant should not DKIM2 sign a forwarded message with the same consideration if there is only DKIM signatures
available.  Under certain circumstances a DKIM2-capable forwarder may choose to DKIM2 sign a message with 
a prior DKIM signature if it can be certain that the message was not replayed or introduce backscatter 
using local-policy.   Some properties to consider are looking for the same anti-replay and backscatter
properties described in <xref target="DKIM2"></xref> except signed with the DKIM signature.  Typically this only is only apparent
for DKIM signed messages at origination, meaning when the payload From header is DMARC aligned with the
DKIM signed domain and the signature is valid.  Forwarders may wish to consider other validations under
local-policy as well.</t>

</section>
<section anchor="dmarc-and-dkim2-interoperability"><name>DMARC and DKIM2 Interoperability</name>

<t>For messages that <xref target="never-left-dkim2">never left the DKIM2 ecosystem</xref>, it can be argued that DMARC is
unnecessary, especially in the case where the Receiver ADMD has a policy of rejecting such messages when
they fail DKIM2 verification.</t>

<t>Since DKIM2 is meant to address the shortcomings of its predecessor email authentication protocols, it
seems unlikely that DKIM2 will be added to the list of Authentication Mechanisms underpinning DMARC, as
discussed in Section 4.3 of <xref target="DMARCbis"></xref>. However, since DKIM2 could fulfill such a role, Receiver ADMDs
participating in DMARC should be prepared to include DKIM2 verification checks in DMARC validation logic
should it come to that.</t>

<t>Even if DKIM2 both does not become an Authentication Mechanism underpinning DMARC and is generally agreed
to render DMARC validation obsolete, the reporting component of DMARC still might come into play. DKIM2
is designed to route bounces back along the chain of custody to the message's origination point, so by 
definition a Domain Owner (as defined in <xref target="DMARCbis"></xref>) will not see bounces for messages that were not
originated by the Domain Owner. Therefore, if DKIM2 support is added to <xref target="DMARCagg"></xref>, Receiver ADMDs 
participating in DMARC should consider supporting such reporting.</t>

</section>
<section anchor="implications-of-requesting-feedback"><name>Implications of Requesting Feedback</name>

<t>???</t>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC1034">
  <front>
    <title>Domain names - concepts and facilities</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1034"/>
  <seriesInfo name="DOI" value="10.17487/RFC1034"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC5322">
  <front>
    <title>Internet Message Format</title>
    <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
    <date month="October" year="2008"/>
    <abstract>
      <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5322"/>
  <seriesInfo name="DOI" value="10.17487/RFC5322"/>
</reference>
<reference anchor="RFC6376">
  <front>
    <title>DomainKeys Identified Mail (DKIM) Signatures</title>
    <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
    <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
    <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
    <date month="September" year="2011"/>
    <abstract>
      <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
      <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="76"/>
  <seriesInfo name="RFC" value="6376"/>
  <seriesInfo name="DOI" value="10.17487/RFC6376"/>
</reference>
<reference anchor="RFC7208">
  <front>
    <title>Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1</title>
    <author fullname="S. Kitterman" initials="S." surname="Kitterman"/>
    <date month="April" year="2014"/>
    <abstract>
      <t>Email on the Internet can be forged in a number of ways. In particular, existing protocols place no restriction on what a sending host can use as the "MAIL FROM" of a message or the domain given on the SMTP HELO/EHLO commands. This document describes version 1 of the Sender Policy Framework (SPF) protocol, whereby ADministrative Management Domains (ADMDs) can explicitly authorize the hosts that are allowed to use their domain names, and a receiving host can check such authorization.</t>
      <t>This document obsoletes RFC 4408.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7208"/>
  <seriesInfo name="DOI" value="10.17487/RFC7208"/>
</reference>
<reference anchor="RFC7489">
  <front>
    <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
    <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
    <author fullname="E. Zwicky" initials="E." role="editor" surname="Zwicky"/>
    <date month="March" year="2015"/>
    <abstract>
      <t>Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</t>
      <t>Originators of Internet Mail need to be able to associate reliable and authenticated domain identifiers with messages, communicate policies about messages that use those identifiers, and report about mail using those identifiers. These abilities have several benefits: Receivers can provide feedback to Domain Owners about the use of their domains; this feedback can provide valuable insight about the management of internal operations and the presence of external domain name abuse.</t>
      <t>DMARC does not produce or encourage elevated delivery privilege of authenticated email. DMARC is a mechanism for policy distribution that enables increasingly strict handling of messages that fail authentication checks, ranging from no action, through altered delivery, up to message rejection.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7489"/>
  <seriesInfo name="DOI" value="10.17487/RFC7489"/>
</reference>

<reference anchor="DMARCbis">
   <front>
      <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
      <author fullname="Todd Herr" initials="T." surname="Herr">
         <organization>Valimail</organization>
      </author>
      <author fullname="John R. Levine" initials="J. R." surname="Levine">
         <organization>Standcore LLC</organization>
      </author>
      <date day="4" month="April" year="2025"/>
      <abstract>
	 <t>   This document describes the Domain-based Message Authentication,
   Reporting, and Conformance (DMARC) protocol.

   DMARC permits the owner of an email&#x27;s Author Domain to enable
   validation of the domain&#x27;s use, to indicate the Domain Owner&#x27;s or
   Public Suffix Operator&#x27;s message handling preference regarding failed
   validation, and to request reports about the use of the domain name.
   Mail receiving organizations can use this information when evaluating
   handling choices for incoming mail.

   This document obsoletes RFCs 7489 and 9091.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-dmarc-dmarcbis-41"/>
   
</reference>

<reference anchor="DMARCagg">
   <front>
      <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC) Aggregate Reporting</title>
      <author fullname="Alex Brotman" initials="A." surname="Brotman">
         <organization>Comcast, Inc.</organization>
      </author>
      <date day="17" month="March" year="2025"/>
      <abstract>
	 <t>   Domain-based Message Authentication, Reporting, and Conformance
   (DMARC) allows for Domain Owners to request aggregate reports from
   receivers.  This report is an XML document, and contains extensible
   elements that allow for other types of data to be specified later.
   The aggregate reports can be submitted by the receiver to the Domain
   Owner&#x27;s specified destination as declared in the associated DNS
   record.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-dmarc-aggregate-reporting-32"/>
   
</reference>

<reference anchor="DKIM2">
   <front>
      <title>DomainKeys Identified Mail Signatures v2 (DKIM2)</title>
      <author fullname="Richard Clayton" initials="R." surname="Clayton">
         <organization>Yahoo</organization>
      </author>
      <author fullname="Wei Chuang" initials="W." surname="Chuang">
         <organization>Google</organization>
      </author>
      <author fullname="Bron Gondwana" initials="B." surname="Gondwana">
         <organization>Fastmail Pty Ltd</organization>
      </author>
      <date day="2" month="March" year="2026"/>
      <abstract>
	 <t>   DomainKeys Identified Mail v2 (DKIM2) permits a person, role, or
   organization that owns a signing domain to document that it has
   handled an email message by associating their domain with the
   message.  This is achieved by providing a hash value that has been
   calculated on the current contents of the message and then applying a
   cryptographic signature that covers the hash values and other details
   about the transmission of the message.  Verification is performed by
   querying an entry within the signing domain&#x27;s DNS space to retrieve
   an appropriate public key.  As a message is transferred from author
   to recipient systems that alter the body or header fields will
   provide details of their changes and calculate new hash values.
   Further signatures will be added to provide a validatable &quot;chain&quot;.
   This permits validators to identify the nature of changes made by
   intermediaries and apply a reputation to the systems that made
   changed.  DKIM2 also allows recipients to detect when messages have
   been unexpectedly &quot;replayed&quot; and will ensure that Delivery Status
   Notifications are only sent to entities that were involved in the
   transmission of a message.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-clayton-dkim2-spec-08"/>
   
</reference>

<reference anchor="DKIMKEYS">
   <front>
      <title>Domain Name Specification for DKIM2</title>
      <author fullname="Wei Chuang" initials="W." surname="Chuang">
         <organization>Google</organization>
      </author>
      <date day="20" month="October" year="2025"/>
      <abstract>
	 <t>   The updated DomainKeys Identified Mail (DKIM2) permits an
   organization that owns the signing domain to claim some
   responsibility for a message by associating the domain with the
   message through a digital signature.  This is done by publishing to
   Domain Name Service (DNS) of the domain a public key that is then
   associated to the domain and where messages can be signed by the
   corresponding private key.  Assertion of responsibility is validated
   through a cryptographic signature and by querying the Signer’s domain
   directly to retrieve the appropriate public key.  This document
   describes DKIM2 DNS record format and how to find the record.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-chuang-dkim2-dns-03"/>
   
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC5598">
  <front>
    <title>Internet Mail Architecture</title>
    <author fullname="D. Crocker" initials="D." surname="Crocker"/>
    <date month="July" year="2009"/>
    <abstract>
      <t>Over its thirty-five-year history, Internet Mail has changed significantly in scale and complexity, as it has become a global infrastructure service. These changes have been evolutionary, rather than revolutionary, reflecting a strong desire to preserve both its installed base and its usefulness. To collaborate productively on this large and complex system, all participants need to work from a common view of it and use a common language to describe its components and the interactions among them. But the many differences in perspective currently make it difficult to know exactly what another participant means. To serve as the necessary common frame of reference, this document describes the enhanced Internet Mail architecture, reflecting the current service. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5598"/>
  <seriesInfo name="DOI" value="10.17487/RFC5598"/>
</reference>
<reference anchor="RFC8017">
  <front>
    <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
    <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
    <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
    <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
    <author fullname="A. Rusch" initials="A." surname="Rusch"/>
    <date month="November" year="2016"/>
    <abstract>
      <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
      <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
      <t>This document also obsoletes RFC 3447.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8017"/>
  <seriesInfo name="DOI" value="10.17487/RFC8017"/>
</reference>
<reference anchor="RFC8032">
  <front>
    <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
    <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
    <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
    <date month="January" year="2017"/>
    <abstract>
      <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8032"/>
  <seriesInfo name="DOI" value="10.17487/RFC8032"/>
</reference>
<reference anchor="RFC8617">
  <front>
    <title>The Authenticated Received Chain (ARC) Protocol</title>
    <author fullname="K. Andersen" initials="K." surname="Andersen"/>
    <author fullname="B. Long" initials="B." role="editor" surname="Long"/>
    <author fullname="S. Blank" initials="S." role="editor" surname="Blank"/>
    <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
    <date month="July" year="2019"/>
    <abstract>
      <t>The Authenticated Received Chain (ARC) protocol provides an authenticated "chain of custody" for a message, allowing each entity that handles the message to see what entities handled it before and what the message's authentication assessment was at each step in the handling.</t>
      <t>ARC allows Internet Mail Handlers to attach assertions of message authentication assessment to individual messages. As messages traverse ARC-enabled Internet Mail Handlers, additional ARC assertions can be attached to messages to form ordered sets of ARC assertions that represent the authentication assessment at each step of the message-handling paths.</t>
      <t>ARC-enabled Internet Mail Handlers can process sets of ARC assertions to inform message disposition decisions, identify Internet Mail Handlers that might break existing authentication mechanisms, and convey original authentication assessments across trust boundaries.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8617"/>
  <seriesInfo name="DOI" value="10.17487/RFC8617"/>
</reference>

<reference anchor="CONCLUDEARC">
   <front>
      <title>Concluding the ARC Experiment</title>
      <author fullname="J. Trent Adams" initials="J. T." surname="Adams">
         <organization>Proofpoint</organization>
      </author>
      <author fullname="John R. Levine" initials="J. R." surname="Levine">
         <organization>Taughannock Networks</organization>
      </author>
      <date day="4" month="December" year="2025"/>
      <abstract>
	 <t>   This document calls for a conclusion to the experiment defined by
   “The Authenticated Received Chain (ARC) Protocol,” (RFC8617) and
   recommends that ARC no longer be deployed or relied upon between
   disparate senders and receivers.  The document summarizes what ARC
   set out to do, reports on operational experience, and explains how
   the experience gained during the experiment is being incorporated
   into the proposed DKIM2 work as the successor to DomainKeys
   Identified Mail (DKIM).  To avoid any future confusion, it is
   therefore requested that ARC (RFC8617) be marked “Obsolete” by the
   publication of this Internet-Draft.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-adams-arc-experiment-conclusion-01"/>
   
</reference>



    </references>

</references>


<?line 442?>

<section anchor="changes-from-earlier-versions"><name>Changes from Earlier Versions</name>

<t>[[This section to be removed by RFC Editor]]</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA81cW5PbxpV+71/RNX7wyEXSGsnyRVvZ7EQzirW2LqsZx5WS
Vakm0CQRgQCDBmbETe1/3/Odc7rR4FCyknJq1w/ykGx0n/u9MZ/PTV/1tX9s
L3549vyB/YMPvX3VuaKvCh+MWy47f5N+fPLKlG3RuC2tLzu36ucb33Xz8l21
fTBfFrv5/TMThuW2CqFqm+v9jtY9u7x+agrX+3Xb7R/b0Jdm2JX0OTw27TK0
tec/q1332PbdEPoH9+9/d/+Beef3t21X0gZN77vG9/MLnGhC75ryL65uG9p8
TzDuqsf2Td8WMxvaru/8KtBf+y3+eGuMG/pN2z02dm4s/Vc14bG9XtjvCW7+
QpC5bsty/K7t1o/tHzvvm/Oua2/t5dZVNf/i8RfBScv/I7Rbvx72VXPjFkW7
NaZpu63rqxv/mNe+fvrk7P7Dr9KHB2dn36UPjx4+eJA+fP3wm6/Th28e3P92
/PDVt/rMxfPz10+WFUH/bH6xEOJXvl/Ny63rCvmXfh7XuvX6A2vpl86viQPz
zu+IZFWzlsfAZHmmqN2+bxvlbNj5wqYlP1z++UpXbQbXrHVR2QRjqmZ1hwiP
Hn03IvTt/bNvsg8PRyJ8+3X85cnLF09+/OnikpCQc1zptmEO0P37ne+qrW/6
edE2RT1Azowx8/ncumXoIbjGvGFM3loSFOtCaIuKkC0tie6AR4MtfSi6ault
v/H2oiWmNj/4fbDPSvq5WlW0+Dkx2t48sKe81z3hvIU0YQnJMx1sd11LgtfW
C2tEQyreu1o3tEPfWleWnQ/BBhLBnmSEKB1IBD++WWC4t77YuKYK22A7X3sX
aMddV7Ud9uXDZgZ8IWgLV9d7e/XqqX2j8vN2xkv4M4QLnyETsoBkir7AIfEr
0P7twl5v2uCnwG5bsgf0Yds29d5sCaIVWQhgt/Hb4OsbnyG0JVzdmr7pN663
OyI9L+zaYb2xpK+kWLRh5+kJUumtLyvX7S0dSiw59Yv1YmZJfG5dV/ou0GKD
XQkMW1cERfDdDX1/z95uqppY17kmVBBeu+raLS2v1lUjpCQSrejvGszo9cuF
Pa/JFAAUgp3wTNDeegKJqE+iRThmXCHob+lvOrnpZywrribA5Yx2hW+qjvDs
N6Dml4QdCWVPi+1yz8uP4HnbDnVpCzcQBFMBMMXGF+8CA8/i0fMeRxB51kCy
KnxQRt86ErIhFH7XV0sQp7UnpNykxScAFBLp+oFkcSYYub53xTuiplF42oaU
Zyh60iLSqZuMOsTdMBSEIR2yF84SWHtFBEy2N66uSqGK4kBspAcYtHS2PLtx
pVmSZbXVFraHSMzcc01Lu3bxWAuykNzvF8Zcj3okjMsFdKauidh3UxGRaANi
chks7WchswzKhA9hTwK8ZTrrU0TdnigelKcWmhfF2DCyW/eOieoSgEQWlcCZ
XQ5Etzq0fFbnC1/dQCyF4fSU0gcUgILF7auRjViFk1WIkyot1K7w7qTm7S3M
QVHtKrZj9BSB7oltzNXEs40jDjKVhwYmsyA6EylUJHx5wtpfuEY29k1I/Cl9
TewHmXriWiCn1rOJAZSkpRdXL0gDHa1m4kIzAAXY1VdR81mhyC+2ZB5KptRG
9VUjAxDajTia6w0Mp5rnZJ2Z30CXzI9vStpqYNIrlxLj2Woy7QmcMlF+dkT9
xOwlFhn+ciH+Y1uVZe2N+QwRR9eWpA3sXD7NP5Dx2FbEEoe/AhSzo9BmBitG
4QTZzf9OpikhOioTM4zEggAgl3VgT8mamOjGgJ2jHQASxy5svxFnvLW3Vc+2
LT33RgMNMu3nZjcs66qwFFZlKklkH4L4KtC5Kw9hYiFyZFIML3GlKIiYuaQw
8UAQ97aretaVqifC/oncdRQfrKbAoiLdo3Ndsak85INs5cr39IlRy8HsyVeU
RuXn4sUVSTN5BpWK2t84CIuQAifDmIoBwlZYlRAlSJ4rjKq1anY4OlT0RasA
m/os83T0RkKX/U69LRuEpiXTuERAioBH9TqqstLERJcgEA6BJNazK8uEeITT
/rzxrIqEf9nyMcalnSe2KbJo68iCQSOjXBFNQ5uMFwwOSRQFOydEPvLCJ5FY
o7UZBSKaqpIo9jN7itHiheSd1WjDpYs1ZduoJtw1Jpo12voAQeZ8iR1IHjzJ
gG2LwgV2a2wFCL+qMZAUSgXaco8AroIdVcjajg1nWcEfrocqsNwsfX/rcwvI
2Ksd6sV4EIhEhGixSNIchb7FULsuxmPqZYQ8ZKkNMx2kXXqcktnPXggcn2Eb
5gV4mwGfTCydHBXt063tP2FmzcfM7MvMEMUgrWsLxjmxmUEuSxVjim8S70gQ
O/+3ARkijO3K+3JJUQRxSNi/t+2uanDuKX737912BxMYTYoRMiNWQbxBjrcb
2bJz23tppSXD0PQDic+olu3K5Kbmljjv+eCwcd0RJ1IFYkKgJUsAvIsprfgJ
QokYOhOTy3+B6TGOIccwDWVZz9xdZb1m9To4gOWF43ViCUkX2QCIGgSeEQCh
9t51bD0lofFNIdotFILDG5qqh4KH0aybDyYMDGTKQHKJZ4ktQJ7P7DVcVNPW
7XrP6F54ii1ZT4NSL3j2eSSW9AuQpyfUQ6gV7oCrWv1Ia9r8aPaDgBpRDxDQ
x2MuL+4TZpBIRsQPRo7kc95o0khuy/6BbEOhZOkz+GGkyTY2YohY21M2xEFy
gqkhmwTHzHQnmSOK8jMcnJ6mDInTimLDGQi8FD2zJwNCCK88OwjGADTKj4Hs
Y6Ozg6ActQFSEIm5ox1a1QMYzR4v4ztDcxo8+ess8317TwQiJbyuNkjXUrxz
mhK3e2p93nFU3lHwe/L8p6vrk5n83754yX+/vvyvn569vrzA31ffn//4Y/pD
Vhj68PKnH/V3/DU++eTl8+eXLy7kYfrWHnz1/PzPJ6xD5uTlq+tnL1+c/3iS
KJZ0Epoh6s6RGTlC+Co35uNgv3mjtRKwXxRMkOo5BmeTlCotZA5cw4kq20mO
guEZjeOUzgdxhwQJ0Pzp1avL10/Ory6hDp/Z8wsSpwpFA97quWtI4xlQCfko
3D2/eH4R7gl5RRlO8JW4UP4znACBUUVyfMUrq2CbiWQzAFdQFcrBzGXtpTBR
RRsB7VDPCt2GUo3OrYU737h6JQZeQiBGmaVVrSqBpQckQm4pgyPqP//pnHBj
FfyJdNCer3H4vZl5fpV+uEplvPSzfX6dfr6Gm1llzyK3Z/9vHH+jSWOwkxz+
hOS5bhFQnRBQpDK0loxEPWP3IeCSvahrs7ybQVTNX9U+5X4NsjSJuCLhiCSs
hpS2CgFYQXZtFWM8uO/00JY8NjsiMV9Lv+JCRW9q7240FXHlRGA09FRrKMAL
Y1PcaFlEjEmMT6bV2deeYgl2nuKyew7uOYOcfJNgNMgzEShEt0RRLGjFue62
LauVVB18c+NrMr42VeNAMo6bTfLyGpUGMq3wKCQjzzSJHSH8Ix11KzA6u9kv
u6qEG2aZgQIIBgwK7dcQcyj1JJ3uWrC1HYIKspj5wDYSGmKShtxG/aADRqLh
vIZJJ5tLvoZy9CTTgDOc6WIuzDTCF86KOa4C+YhILCHOZDUUBmzZvp8hkXCU
2Z0ioBEAKL+txFuPMS3DAh1rkDIQ38mqzGBg5si/4ZbwmUiZROC1v6kIcWPO
gzCJY08GOMMUCsmgTwQ4Modg2lDKRbtQylmXnNHeKcb49xIKZ0WeFGqkWIkU
ipKVuqXUoUsxPvFjRZ5qJomTixlghJbzChFuCoU176AEBSEircjRYECQq6ja
xyTFRTIITSQZ/DSLB+6t9jlSd+2bSRseWrgxcZtFEILYr5mEHhcaeBuxX2TV
Ls7VisE6wjixlUAuzgWUlMFKWKHWI4WnZmKSmISIULn6o5jAFqEsVtc5Vmpo
ohgh9iQvxkLXdqzZQLVAZW/C07aT2tsdUeUcYT86GIiG+DOSxUnlICuNc4zp
pqEtezJeLUQ1h+vZJEoCDey1ajFTH51XPUjoKQ/e7mDkN5XyT3V0jHuhGhNv
IQFk23EVReiXoRhDcxRNguyA9HlSviDgpXhNvNRsrhdOiB/QlSVTOISYu0v1
8bDMofkLFzkkokMW2YZUweO0aZozpR0ZPGGKr0meWmjBNQoIO9RByf/UfUXp
Eg4tBpJxgm6shQRUlWLaomxhQqNNxtykBKrg7DoMy7JCVRPlMs5aQzzwRAPF
ZtguPTMtP4FLgi2dHHatlNHSgxwUc7ausQZH+tHwxWp39Ie3MIIIp/aTr9QO
ovD9VzjbtvEmnsBl6Q6x+dTHUkyHTJ9iwwFi104SWGSqxablRB2lEoRvWE7Z
FtKOEXpgxr7fVbF6sCI7AhJ3fs17QYYba8YffHJdMC/GJK4dzelJlrmjpjrE
bps1g+R0JpmF0SoMVKfs3C0kESTqKbpfjEIhW3N5iVSbpCtoQZ9o5bYk6YFo
olmd8K1l290OPdwoJZ7Em+U+gaGa3fjbCbHRQXnn/S5WykCeY/rd1mUipHE3
RBMUA6MgNynEscdjHO6NQHim+TQFMV2vme2m3YXYA7DnTDTD5sy+1I6OFOg0
YJpFi5n1f7JyE++m7g8u0qQyxvE+yiRgnyEeYSGlBAs4iwRKCig7oX6/IimC
6egoZePzTgXs+fzfR5DpA8N7j+NwoRQhIn8Z0Ixz8mihIaKTWumTbr/r23Xn
diQ89rxeQ5Y2lID8/TOXPvxPzHLVioTRjGycVMawcUlA9ZMy37jFwr4kPcRq
uxoaCa9PKSt88OhrioNWMd0lmeDCJMddt+0o5Wkjkyc7ahGmJfrH9vXV+Vz2
5o0uywePHp19p18tjKYrGTHw6YsvkMV+8QU6RhI1WH0g5je0RBLWfJFZkrP4
lRM/fgo2ML8CMvQAJlWXfK9UT/wSg6u/Jp7EX/P6O/wjGTk6teTyjJHQjx+C
LgWbl0jGDnfqdl9LeYYEgCJ6Q0HeoEGT1NFjGUbr4PNnDQrXZET0HAkxR4wy
xKOQHmD1sRURHc4cIFwtXD1iH8jFIQyGy1FAY36VZHQC12GVIFGAfZwhMOaA
4/Tps1dX87Nv78+/mj+4f/aItQ8nAoY50Z0DRdeLwHMWiP6u5nz7LJFT59kL
nhnLTkc2mFc/PLn67AwRHifKZ4tH0k6/j6pMPLqAJuPsVHeXEz4PZtdVN/Aa
ZH01RWW4RBZRfSF5xJRCR5rpxAEiPqDzpKohZVeDLE9DIzKvYvw0F1qSNeq4
CbqNhlNq2YKznGruaPOoDtynjnEChcLktbkYa79+9OjhN3CMSQezJ0AycU4r
+DnML/T27P6DrwigHtH1EcUjRGOjKTVMs0CZnQXvSYZ/ndr+aVPo0IP7X33L
H6QWxdEd7X/+53F7+7HtuVrb8SmjIkxV/kPK8GurfgOF+K014ZnUlcavR7f/
is67LC+uzsmOdBX6bIrf7MAQXWlF5tHiDLx+o1M9WuB6Kcnz6COMfDN6jZw9
2bY8+DBIJnLUSK+bFg2JZh/tY9vl3BTlzY4Z25ply1lVMvMC6Q/0S1YA/Ptn
JAN/2aYvyNFeIWuoPUUELNQhDB2bzypwV0SyGpiWSQ8TKeSRsIrboPSFFo2E
1aZsOUCSAC71RGN4ppVu6YSupJ4TA+zkpWO3tPydiEuqg0uIP3oDTl6QK4wJ
YWlP/iIfaTHqc38kC0LLzFFBjJHlSfm7E9u7Nahyoj0fzMNJjZSs0Uk4kxXI
kU9WbbtYuu5kllD524AGWKw6ALG4aDGCs8h3JqTINl4+1nmQhFrTjpG9dHSm
CHNLGJlv3WqLzbBScFBH53IlP+8J0EFPh45FNo6IaBS/aodm1D6MxL2VeG6M
ie15ob2VZyi/ldJGkK5jtYP5ocdlkmsaSquU45hUwIWJWbUYAJHETLa2Jk2y
HetyoRQjO4exHsA2h7KFdYudxiEocFOHTdT2nGUataAA/w9expYqrozEuZKx
aRcj8rYZOyxnaVyNUuyulRkeTa580WrFJzKfwt1yQDU4C5Mn0d20Ds4wc5gn
RyWjKSIxUBZfCxWQZEUDWFLy1O636sZS58qT4MSI3wzLilS6b4eccHxcCrBx
BGfw2s/duvfVdthKa4MrF8uq5vTvgLkfQybtftBqxNwWfucc3DBKYzCvxi7L
aotJ8pDMoBpldEoYoZeNvXxfwdoFBnGOPedtM/f0LZk8TuEn0Mchu2w+jFld
NavOyQRZ6m2rVQyTslWcvhjzFCRQGpl0QA9ODO7cr7kZr3WaFk/C9vJgSZjm
cce05wvpCLndjv49pCZ2AUSxnYKFvZSma0QqBNTYAbBjB6DqDjCNtd41xgho
l9ctyvPSW4whwA8sKB8SAlHqY+rbYS+u3mE3iNtMhH00VaPAz63Z9P0uPP7y
y9vb28X2oXO360Xbrb8kavvwJflWRyT/ckWJf/hSfubB3TltPJejiPHLHYKF
7+b3Hy525QoGLWtlRHN2nn05mjOutatBmwZ1ycupLeUYAvpH26H/t6RQ6KAs
Xq032o0wKSt1WT05zlu6FBxEfqEoOumaWIyKr2MdrvHvmb1a4Bwb3nHkjIcM
jnDD/SrS2lTsyaDtens4+HQZy/RJNrQ5PCFnopvTbQjsP0n9OObTuRgnL5SV
npHQYLyJixSu66obn+qa6aDfwh1kw1GfIAXqyWbTPnkMY1D6Q1dmKhTRZx9x
qmQEx17gQREnA+w3dh3mE3zHUddxiUDq2cr+JwqfCl+szrygaJTFGpbvH6Hq
aNW4kJhMrNS0URZHe2tNu6FsCIAPOwtYaUSlcitNod/VxMVwI6/pnVS82bvp
6SeHI08a9rFRk1EK75BO3+T6wOnN0FAsw1TA07Fj1Gvcz47hN3C+nywM/1eu
N028H3rfcwUs9xwzlOREk+Whz8Oh7z3udtt/hefVzuHEsvzj/tfk/tf+q/zv
cTn4f+59P7NPWrJEzYBED8A8RbC1Hbj+cWdAk5nIBYaEbCYvkT+pbzMmxdof
tC/RponzDDo7vOAjtRZnNFvEWBonuZR6lxiM48sl2j8Wm+76vE2V5DUn/tj4
PnYWHWOyXrcMGeazk4cdbjZpfHNCwMluJUSnGCl0N4JEcm+46+TXlYqAkJyl
kmvbOlE4qXt8s/iK6x7xetZb5tofuraBZpbekWy8QpWv2Ms8Et8MSDpPv3Z+
2/IgUxPdmf5KKXO39jqovCRPjwt55oXn8d4t5pHe90rsKiwWnH6+lkmJwwT0
dbqTIPFnHKlm4R3TMJ7P4mxYWqu4+6ODEkqSrORA3OC+Vs4H9AVhXjAfgcZJ
i67dwh4ej3NSUUcSdXKsOrtPNEB6XpP9qatiL+KDrl5stGozNg3uSMd/Ol53
19ElUeFrSUFxn3glubtyZGg9cxQ1RlIJNSJAHOo8OMuRA6vrD7tHntdgaubz
rLM4yXYM9BTjovhAx1duicZoVGToOHsnmM2sKV5OWJMuj0H4o70X7Zuwh012
xWo98fR3WtopWPhZ9U/qd0YaYwV6yCx+HO6LoQ2PjfnCnmehCsaYXciOwME9
wyj+BzOy4o9O7xQ+354eS1zvsUDhx+Ou9d49Y3kEEyRjjOMU8FROPpVeVeBB
eMbl5IWH9v3oVz2XbASvy6hhJ/889kuZIJHLRixndT1Tffp0+AnzX8EA8Jw8
kwsVLweG4NMQwbAED0027V1/zwb4HyTiJWI5IggaFPYuAOYS/EtiFvu2W+mw
M9btLe7uMQ7pFpHODkRjNgVDwonnUd3RKbIf5ygFcA0WzGtaIDdhKXTDXJW4
rqNWZ2JfSMPQnRn7T1OQZseoFTZ8+U6CK5ObS3Fc4zBRAiDJiDSEkzldHIN2
xaXO3wjYWOEPbsW1tc5jjHMiq3KvBzV1ynl5mCZFJlcvTnHlE8zlODG7wpFu
Q8jIigxKMGPzOxBmekdJSqlTEMlVT13Opr0FU2dq16qCo0qZIPgIIe/Izs9o
mU+VqT8qQ1UzpzVz8pfz5I5Jji6l6B0mTkiH7Xp2vVXIVYClYunZyl7n4VEy
Mm/UyuD2DdnCD1nQ2AodUw9x08fv9JJ68rXeLMbGxBUmPDCl2GZSMdktdQax
z3RmlihbspnLktyci0cQnK7O+rmfhsQUg1jvTGjAcv7TiHwICXPK4RxHcnQU
iV12pVP4rAjCvBzKzT3OakR3o3TMJpI8ld8ouYspChrW8Lwcn17gSuydqAbB
OGbkKLo5ZhkQJGeiOAqsDi9yr4w2uxstka3x0+EXI/U//E4xc1EP5WQXeEBZ
kYK+dFiukIdoipuiEEonMoEFGkC3HuOsUUOwAE7DRRqiyT5W47Jnj1biKHQa
xtoQrXANrZB4z9k1d9R0mjiXhc9DStA5ZFzY8whQVnO6Jc40Mh+T7oEMGgVr
rSLirL2TWEnVTIsS6Ew+KsnEMesrRYCaW714JwdZ2rY5wucDK3fHUx/KaMw9
EhM+UNSaiCBlZo6Ty6kwQzhVlG/ZP+AqrRZvFKB4Y6/j2QfveAL8SEAS33Xw
CRIyGUE+EBaTSwAKqXwfLo2cpdHsRO1sFG6S08h9MaX4NCtRtcMILFRlHM5V
qiD/0fuhPFKAeiWH3BE3enQpF06ZauTCC1wnkovUMtGqVWKZ8OR8iiln7sRx
mONnsc12yUguFSvyYmIW2Z4xJTSLpG9qdg++WUvaHgtr76qmXOjd60kFz/6M
NTI2wO9h4RnB7Bbcq8lrM56n12ZQXKMT3LHfqq3KI1rFsrejDDR2IFGQ+mC7
cqaDPLSX3nj5xBd5aIg6Z7mQvgRuQSpE3LLlxJ4nQqf9iXibkecxcLPisNJp
A/EDv2nR9LBEdUhX8j1iG1YY8eRAIl2kgdH1Zd5o/rf8gkVNEZI8e+skEltR
jLJBF0H6wHBnbskfKeaX98uwYI/goEh542qiWq0pPlQnFLC0nU4O9NVcLtza
0A+r1cz6vliQ0ztf9SkrrbJCFO/T+dRN5qv4VVty2IUqfjl0kmHHssVBB1pT
GATC1Xs8xQow57gzDQWMSMwLt+ORomTTmp4oxbTk/ZDSp1B2AhgPXEHFiX43
bT1sPcLUY29R2XokMEMn2XVyrm9OfjWs/JyCu2NxZbwueJfL43txXDGmSayf
/X7H9kIu5bR8GU8Hm+NIxLJlR14i68L7R4CjmfZZMgHQAFRv0qm9PbZQmm88
sSzJ76iiZPrYd4nXMDxVzg+doD815VGXrKEmTx858jBxZecuh8v4sqvoo+6D
KMWwnOv0ZZgI98Lan2WP2PSZHUiPBOBxO82wMkikKKa3G83IaOLagPlyLdP0
6s1hfRA+ujWy8d6qCgG7iYqha+L76EtkC55Xom/lKDSVpIpwhyxyJ15KrHw1
QYfQdNzI8iSTxG/yhpU0epOr9SFMCvp4Oz1FZETFJ/Qtbp+DqFMKmkz/cq7k
/bHs1QVjzViHsRiueCNdo9mVqmyl4wEHkUA2Cm/tT8y/gugH41FUXTFsZYwv
xEvjidmrydUvub0wjsgorBMIMU+WmJC/SGGFirbqXjz8bmFcE6P45gLE3ZW+
3mRqc430sjjimktsQbhJZXwqYZFULAV1277TkvYnMdlkex0dY/Tv+a6T5nCJ
SVPsMbea3sXBBpe5FP9PvtyhG2dWOd1G3nOfMXth1KT6KnH5zu3r1pV20pII
2logsZ9AZ/Izpm8kmb76ghWGgM8yZchBvCqWKCvDvGMHI0iJxOTcidEobSce
X0D7iMd/eucixhsuXkl2eaQjQB7ksLp1b5aJnevWQwqr+PgqmAE3QXFKR57d
82Qis0kTnsIFL7d97mbT3FhKiReX7fjKL3xUnuUmU7jXhs+dYj4PJiMxTGEC
ONznL2Vj5uTvOmtXUnmlVIYRaNOLQT4Q34EUJni8TGpo6uqdr/e53UruvtSX
MeBEudi2Ooxix7hVOL2rGrm5B6rKCxKOtZ++Wjyctp8W9vtYuwoZ/gUbRUrd
V4BJq33ygqJpCmTu5mfMVzWrSw4boFylvBNBkvMPNlPGDbJuXN2uq8LojlUv
RVt9oQrxjWclqphBs39O7mTpebHeFDpGvyPkY50gCdC75rAP6877Ul5pxMb7
DozxzZQzHU/R9yTyFHcagVfS9BzrcUDM0HEcDdsX53oP3ovBbbHY0ZOUUWeU
NkdeITPttnwecrslXQK8bgLFLpOFiG7a0z09vD4S5eXe2DrFGygiUHevbPGN
R1pm0gjgeMsnO4nLqx237mcjE+Mlx/TyH0LqTXxL5dtDGbS/IoTJSuq2yTwk
NkkK9Gy7q9O7dIiir+XlNdxH13fXGPP73/9e3x8pn80TnUThtuul62o03v4k
NzyC+d3H/jPmlze/vJkkblJekR4vE4zSCHtZVn3b/fL2l7fG/C+oAWSAglUA
AA==

-->

</rfc>

