<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.38 (Ruby 3.1.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-acme-dns-account-label-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="ACME-DNS-CHALLENGE">Automated Certificate Management Environment (ACME) DNS Labeled With ACME Account ID Challenge</title>

    <author fullname="Antonis Chariton">
      <organization>Independent Contributor</organization>
      <address>
        <email>daknob@daknob.net</email>
      </address>
    </author>
    <author fullname="Amir A. Omidi">
      <organization>Independent Contributor</organization>
      <address>
        <email>amir@aaomidi.com</email>
      </address>
    </author>
    <author fullname="James Kasten">
      <organization>Snowflake</organization>
      <address>
        <email>james.kasten@snowflake.com</email>
      </address>
    </author>
    <author fullname="Fotis Loukos">
      <organization>Google</organization>
      <address>
        <email>fotisl@google.com</email>
      </address>
    </author>
    <author fullname="Stanislaw A. Janikowski">
      <organization>Google</organization>
      <address>
        <email>stanwise@google.com</email>
      </address>
    </author>

    <date year="2026" month="May" day="15"/>

    <area>Security</area>
    <workgroup>Automated Certificate Management Environment</workgroup>
    <keyword>acme</keyword>

    <abstract>


<?line 54?>

<t>This document outlines a new DNS-based challenge type for the ACME protocol that enables multiple independent systems to authorize a single domain name concurrently. By adding a unique label to the DNS validation record name, the dns-account-01 challenge avoids CNAME delegation conflicts inherent to the dns-01 challenge type. This is particularly valuable for multi-region or multi-cloud deployments that wish to rely upon DNS-based domain control validation and need to independently obtain certificates for the same domain.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://github.com/aaomidi/draft-ietf-acme-dns-account-challenge"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-acme-dns-account-label/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:acme@ietf.org"/>),
        which is archived at <eref target="https://datatracker.ietf.org/wg/acme/about/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/acme/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/aaomidi/draft-ietf-acme-dns-account-challenge"/>.</t>
    </note>


  </front>

  <middle>


<?line 58?>

<section anchor="introduction"><name>Introduction</name>

<t>The <spanx style="verb">dns-01</spanx> challenge specified in section 8.4 of <xref target="RFC8555"/> uses a single DNS authorization label (<spanx style="verb">_acme-challenge</spanx>) for domain validation. This single-label approach creates a limitation in domain validation: each domain can only delegate its validation to one ACME client at a time. Since delegation requires the use of CNAME records, of which only one can exist per DNS name, operators are forced to choose a single ACME challenge solver for their domain name.</t>

<t>This limitation becomes particularly problematic in modern deployment architectures. In multi-region deployments, separate availability zones serve the same content while avoiding cross-zone dependencies. These zones need to independently obtain and manage certificates for the same domain name. Similarly, during zero-downtime migrations, two different infrastructure setups may coexist for extended periods, with both requiring access to valid certificates. Other use cases include multi-CDN deployments and the provision of backup certificates for use when an active certificate must be quickly revoked.</t>

<t>This document specifies a new challenge type: <spanx style="verb">dns-account-01</spanx>, which addresses these operational needs. The <spanx style="verb">dns-account-01</spanx> challenge incorporates the ACME account URL into the DNS validation record name, allowing multiple independent ACME clients to perform domain validation concurrently. Since these authorization labels depend on the ACME account KID (<xref section="7.3" sectionFormat="comma" target="RFC8555"/>), operators can generate and configure the necessary DNS records in advance.</t>

<t>This document does not deprecate the <spanx style="verb">dns-01</spanx> challenge specified in <xref target="RFC8555"/>. The ability to complete the <spanx style="verb">dns-account-01</spanx> challenge requires ACME server operators to deploy new code, making adoption of this challenge an opt-in process.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="dns-account-01-challenge"><name>DNS-ACCOUNT-01 Challenge</name>

<t>The <spanx style="verb">dns-account-01</spanx> challenge allows a client to prove control of a domain name by provisioning a TXT resource record containing a designated value for a specific validation domain name. It leverages the ACME account URL to construct a unique but stable validation domain name. The ACME server validates control of the domain name by performing one or more DNS queries to this validation domain name, following CNAME records, to arrive at one or more TXT resource records. The ACME server verifies that the contents of one or more of these TXT record(s) match the digest value of the key authorization that is constructed from the token value provided in the challenge.</t>

<section anchor="challenge-definition"><name>Challenge Definition</name>
<t>The challenge object contains the following fields:</t>

<t><list style="symbols">
  <t>type (required, string): The string "dns-account-01".</t>
  <t>token (required, string): A random value that uniquely identifies the challenge. This value <bcp14>MUST</bcp14> have at least 128 bits of entropy. It <bcp14>MUST NOT</bcp14> contain any characters outside the base64url alphabet, including padding characters ("="). See <xref target="RFC4086"/> for information on additional requirements for secure randomness.</t>
</list></t>

<t>Example challenge object:</t>

<figure><artwork><![CDATA[
{
    "type": "dns-account-01",
    "url": "https://example.com/acme/chall/i00MGYwLWIx",
    "status": "pending",
    "token": "ODE4OWY4NTktYjhmYS00YmY1LTk5MDgtZTFjYTZmNjZlYTUx"
}
]]></artwork></figure>

</section>
<section anchor="challenge-fulfillment"><name>Challenge Fulfillment</name>

<t>To fulfill this challenge, a client performs the following steps:</t>

<t><list style="numbers" type="1">
  <t>Construct Key Authorization  <list style="symbols">
      <t>Construct a key authorization <xref section="8.1" sectionFormat="comma" target="RFC8555"/> from the <spanx style="verb">token</spanx> value provided in the challenge and the client's account key</t>
      <t>Compute the SHA-256 digest <xref target="FIPS180-4"/> of the key authorization</t>
    </list></t>
  <t>DNS Record Creation  <list style="symbols">
      <t>Construct the validation domain name by prepending the following two labels to the domain name being validated:      <vspace blankLines='1'/>
        <figure><artwork><![CDATA[
"_" || base32(SHA-256(<ACCOUNT_URL>)[0:10]) || "._acme-challenge"
]]></artwork></figure>
      <list style="symbols">
          <t>SHA-256 is the SHA hashing operation defined in <xref target="FIPS180-4"/></t>
          <t><spanx style="verb">[0:10]</spanx> is the operation that selects the first ten bytes (bytes 0 through 9 inclusive) from the previous SHA-256 operation</t>
          <t>base32 is the operation defined in <xref target="RFC4648"/> and its use throughout this document is case-insensitive</t>
          <t>ACCOUNT_URL is defined in <xref section="7.3" sectionFormat="comma" target="RFC8555"/> as the value in the <spanx style="verb">Location</spanx> header field</t>
          <t>The <spanx style="verb">||</spanx> operator indicates concatenation of strings</t>
        </list></t>
      <t>Provision a DNS <spanx style="verb">TXT</spanx> record under the constructed validation domain name, containing the base64url encoding (per Section 5 of <xref target="RFC4648"/>, without padding) of the SHA-256 digest computed in step 1.</t>
    </list></t>
  <t>Challenge Response  <list style="symbols">
      <t>Respond to the ACME server with an empty object ({}) to acknowledge that the challenge can be validated by the server</t>
    </list></t>
</list></t>

<t>Example DNS record for domain <spanx style="verb">example.org</spanx> with account URL <spanx style="verb">https://example.com/acme/acct/ExampleAccount</spanx>:</t>

<figure><artwork><![CDATA[
_ujmmovf2vn55tgye._acme-challenge.example.org. 300 IN TXT "LoqXcYV8...fm21mqTI"
]]></artwork></figure>

<t>Example response to server:</t>

<figure><artwork><![CDATA[
POST /acme/chall/Rg5dV14Gh1Q HTTP/1.1
Host: example.com
Content-Type: application/jose+json

{
  "protected": base64url({
    "alg": "ES256",
    "kid": "https://example.com/acme/acct/ExampleAccount",
    "nonce": "SS2sSl1PtspvFZ08kNtzKd",
    "url": "https://example.com/acme/chall/Rg5dV14Gh1Q"
  }),
  "payload": base64url({}),
  "signature": "Q1bURgJoEslbD1c5...3pYdSMLio57mQNN4"
}
]]></artwork></figure>

</section>
<section anchor="server-validation"><name>Server Validation</name>

<t>Upon receiving the challenge response, the server:</t>

<t><list style="numbers" type="1">
  <t>Performs the typical JWS validation according to <xref section="6.2" sectionFormat="comma" target="RFC8555"/></t>
  <t>Constructs and stores the key authorization</t>
  <t>Computes the SHA-256 digest <xref target="FIPS180-4"/> of the stored key authorization</t>
  <t>Computes the validation domain name using the KID value from the JWS message</t>
  <t>Queries for TXT records at the validation domain name</t>
  <t>Verifies that at least one TXT record matches the computed digest value</t>
</list></t>

<t>The validation succeeds only if all verifications pass. The server <bcp14>MUST</bcp14> mark the challenge as invalid if any verification fails.</t>

<t>The client <bcp14>SHOULD</bcp14> de-provision the resource record(s) provisioned for this challenge once the challenge is complete, i.e., once the "status" field of the challenge has the value "valid" or "invalid".</t>

</section>
<section anchor="errors"><name>Errors</name>

<t>The server <bcp14>SHOULD</bcp14> follow the guidelines set in <xref section="6.7" sectionFormat="comma" target="RFC8555"/> for error conditions that occur during challenge validation.</t>

<t>If the server is unable to find a <spanx style="verb">TXT</spanx> record for the validation domain name, it <bcp14>SHOULD</bcp14> include the account URL it used to construct the validation domain name in the problem document. Clients <bcp14>MUST NOT</bcp14> use or rely on the presence of this field to construct the validation domain name.</t>

</section>
<section anchor="implementation-considerations"><name>Implementation Considerations</name>

<t>As this challenge creates a strong dependency on the <spanx style="verb">kid</spanx> account identifier, the server <bcp14>SHOULD</bcp14> ensure that the account identifier is not changed during the lifetime of the account. This contains the entire URI, including the ACME endpoint domain name, port, scheme, and full HTTP path. URL normalization <bcp14>MUST NOT</bcp14> be used differently by the server in the <spanx style="verb">Location</spanx> header and while validating challenges.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The same security considerations apply for the integrity of authorizations (<xref section="10.2" sectionFormat="comma" target="RFC8555"/>) and DNS security (<xref section="11.2" sectionFormat="comma" target="RFC8555"/>) as in the original specification for <spanx style="verb">dns-01</spanx>.</t>

<t>To allow for seamless account key rollover without the label changing, the dynamic part of the label depends on the ACME account and not the account key. This allows for long-lived labels, without the security considerations of keeping the account key static.</t>

<t>In terms of the construction of the account label prepended to the domain name, there is no need for a cryptographic hash. The goal is to simply create a long-lived and statistically distinct label of minimal size. SHA-256 was chosen due to its existing use in the <spanx style="verb">dns-01</spanx> challenge (<xref section="8.1" sectionFormat="comma" target="RFC8555"/>).</t>

<t>The first 10 bytes were picked as a tradeoff: the value needs to be short enough to stay lower than the size limits for DNS (<xref section="2.3.4" sectionFormat="comma" target="RFC1035"/>), long enough to provide sufficient probability of collision avoidance across ACME accounts, and just the right size to have Base32 require no padding. As the algorithm is used for a uniform distribution of inputs, and not for integrity, we do not consider the trimming a security issue.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="acme-validation-method"><name>ACME Validation Method</name>

<t>The "ACME Validation Methods" registry is to be updated to include the following entries:</t>

<figure><artwork><![CDATA[
label: dns-account-01
identifier-type: dns
ACME: Y
Reference: This document
]]></artwork></figure>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

<reference anchor="FIPS180-4" target="https://csrc.nist.gov/publications/detail/fips/180/4/final">
  <front>
    <title>Secure Hash Standard (SHS)</title>
    <author >
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <date year="2015" month="August"/>
  </front>
</reference>


<reference anchor="RFC8555">
  <front>
    <title>Automatic Certificate Management Environment (ACME)</title>
    <author fullname="R. Barnes" initials="R." surname="Barnes"/>
    <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
    <author fullname="D. McCarney" initials="D." surname="McCarney"/>
    <author fullname="J. Kasten" initials="J." surname="Kasten"/>
    <date month="March" year="2019"/>
    <abstract>
      <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8555"/>
  <seriesInfo name="DOI" value="10.17487/RFC8555"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="RFC4086">
  <front>
    <title>Randomness Requirements for Security</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <author fullname="J. Schiller" initials="J." surname="Schiller"/>
    <author fullname="S. Crocker" initials="S." surname="Crocker"/>
    <date month="June" year="2005"/>
    <abstract>
      <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
      <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="106"/>
  <seriesInfo name="RFC" value="4086"/>
  <seriesInfo name="DOI" value="10.17487/RFC4086"/>
</reference>

<reference anchor="RFC4648">
  <front>
    <title>The Base16, Base32, and Base64 Data Encodings</title>
    <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
    <date month="October" year="2006"/>
    <abstract>
      <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4648"/>
  <seriesInfo name="DOI" value="10.17487/RFC4648"/>
</reference>

<reference anchor="RFC1035">
  <front>
    <title>Domain names - implementation and specification</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1035"/>
  <seriesInfo name="DOI" value="10.17487/RFC1035"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">




<reference anchor="I-D.draft-ietf-dnsop-domain-verification-techniques">
   <front>
      <title>Domain Control Validation using DNS</title>
      <author fullname="Shivan Kaul Sahib" initials="S. K." surname="Sahib">
         <organization>Brave Software</organization>
      </author>
      <author fullname="Shumon Huque" initials="S." surname="Huque">
         <organization>Salesforce</organization>
      </author>
      <author fullname="Paul Wouters" initials="P." surname="Wouters">
         <organization>Aiven</organization>
      </author>
      <author fullname="Erik Nygren" initials="E." surname="Nygren">
         <organization>Akamai Technologies</organization>
      </author>
      <author fullname="Tim Wicinski" initials="T." surname="Wicinski">
         <organization>Cox Communications</organization>
      </author>
      <date day="2" month="March" year="2026"/>
      <abstract>
	 <t>   Many application services on the Internet need to verify ownership or
   control of a domain in the Domain Name System (DNS).  The general
   term for this process is &quot;Domain Control Validation&quot;, and can be done
   using a variety of methods such as email, HTTP/HTTPS, or the DNS
   itself.  This document focuses only on DNS-based methods, which
   typically involve the Application Service Provider requesting a DNS
   record with a specific format and content to be visible in the domain
   to be verified.  There is wide variation in the details of these
   methods today.  This document provides some best practices to avoid
   known problems.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-domain-verification-techniques-12"/>
   
</reference>




    </references>

</references>


<?line 216?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA51a63LbRpb+j6foZX6sNCNCpCw5CiuTsSLJthJdbImOR5ma
CptAk2wRQCPdgGjacZ5ln2WfbL/TFxCUKCfZKpdFAt2nz/U7l2a3240qWWVi
wDpHdaVyXomUHQtdyYlM8IVd8IJPRS6Kip0W91Krwn7eOjq+ON1mJ5c37JyP
RYZd72U1Y/SYHSWJqrHo7IQdz3iWiWIqOhEfj7W4p4Owpoud3ePXR+fnp5ev
TjsRnTVVejlgpkojU49zaYxURbUswdvZ6fBlFKUqKXiOr6nmk6orRTXp8iQX
3bQw+GDP7GbETbf3LMJJzyKuBR+wG5HUWlbLaKH0fKpVXQ7YX5E2mosltqYD
RsdFstQDVunaVHu93je9veheFLUYRIx52u9f4bPj/D1OlMWUvaI3eJpzmTky
L4j/WOkpnnKdzAZsVlWlGezuprzilebJXOg4LNpdTHdp1y4fq7rapbOg7noM
WlzlMpW7X1JKEqyAfRnkNNXqNEcnTlS++9dIRbyuZkpD7i7IMjaps8zZ56io
VCENGR9qV4V9DSF4IT/yClaFRYtUlAL/QdPHMLOWYxhE25XCKSnl80KNX7g/
cSGqDQflUrOjmF0R2/+/UzhIvPCCkxIeH/ID/jfsR24qsUmSm0ItJhmfizbV
O9oTz+2eFyas2Ez/paqgq3NVz5XZQP+VUtNsjfiENmQvpvbFZpo3FSiYjC9I
Oz/g81wtzHyTih6TN9i7kEa0D4gKpREt8t66+cuzNzf9w153f2D3BQCxYSbY
a25mloGU65Rt3by+2e7YdfBrLNvr9Q+6vUO3k+upaPliYnQSg/Eqnqr73bIe
ZxSW4NPspqICd7sTWZpdnL27j48FzyyZxhGZl2/ALu02nsEFDPirEdtq0nBl
GP6yoUhmhcrUdBlFspi0JTzrnsStKEAAqLKbAjBk0b0X2sEFDuhWREP+Wgsz
iKJut8v42FDsVlE0nMGswKzawgmiNpMFHImzQiwIOLtjbgA/TUBZxIBxNatm
wgFpqVWlEpXhCa+YKPg4A4W8zipZZoLJlnubJXwtN6xSXh3yo8BZBuCDlY51
Rs7BElXAThqbsmXMvl8ynqYEUZzVVhJmIZQIER+E8Pc8k6mVl2mRAAgtoR37
vo0NvX5LGn6vJBR9fHkEQVJkiKmjgOMnMGtlwP5MEBvhKCK1RoIUEjOrR/wr
OXA6qTOusyWxVJM2rL6sQrpaTIl+8z3JVJ3i5DJTSzKBcVqEa8/oRC1Api6x
Y2ULr6aEoAJab8lN/lIILMHOltpBQo0ru2eVRUxjREP6dkRj5x6AmRThFn0F
x8QZaZ0QeXIWwUZOAaOWBkwpElDFuTjCCLuYHcb75MyfPv3X9cvjw4ODg8+f
WW2sa3lzk9GCFzj+nU23Rr9YQG8OGG1bXr3cK3m91h05l1MZL+GOPJmxBEm1
ssdlMpeVOwDbH1EZMEHrg1Y5jFNAY94Z4L+wSUvHUK0qvOcnmSTPgL048CWH
G9zIIhFtR9Li11pqYaymIT/pxHmbc1KzQ08WMwkW7LlEnJgQH4AwrBTa6sm5
ssJXjtQAqbR1qsTZOpkpZVqB5Jhb2UdlgINgb6nbgRZ7CGgpaQzGKJmsuTK0
Ckcm7ElIi7lKhS5afmurAwmgqYCuJobjrDt8y8N34COgTbrl94BLPpYZ6h72
URHyGKHvxcovycuJPDSU+XAlGEi0MqZLO1hw80TSuXBRaMKR+mIoUKzktpD6
w6hwioJtc2mVscNSVGrg4qPQCoC7KMj4iJqpdnkAoLNQLJWTiYMO4LZGltW1
1Q5ErOoSCMmXEM/ZmU4VHypiMiWjS0WesaBidazwn3MjC4BJIoxFUOuUa8yj
xgDr2vpZwinY4I5ZnQpvi+OTyzWoIR2QrDDuvTQWlyZsjJquLh8rhYguZoI0
ByYoB7XX4ASIMRYMfCZzqBlVtJqLNH6YYgJYhByzDqQDhy8rrB7t+OAA/sOx
jIskiiMbCy59kqGd7R9tb9GHLpQulbYSNdnLr2Xvrs+x4k/kE5BTC7LExgzX
wgVrJHBJOfsx7DzIcA44nGgbQNF4N2eEQA9Z/xEtzNYKaHeolbBbv46fff68
3cYNQpapKISLPtCjRCen5JVEthDkXFwvrQY8QlG88/Seg8FH1kwVxZmqiD0s
J6rVn0gS7azg7BZAgNBM5dBqm9JmezbQapVhcUO3RAUl5+vOzQBYOwg52+fw
VJWVd/eK5GkVBHhYoqAqKChIGRAZeRB1OfonG9xWbScChZ20311aRPPFFlZb
nYt3N8POjvvLLq/s5+vTt+/Ork9P6PMNNZTNh8ivuHl99e78ZPVptfP46uLi
9PLEbcZTtvYo6lwc3eINcdW5ejM8u7o8Ou+Qkqs1S1HGgErG5K6V0LAWtZXc
RKkwCVoOZ5jvj9/87//0972B9vr9b5C2vbX6X+/jC0GAO82mK/cVllpGSL2C
a+stWQZPK5FQMqAYB6jPAJKMCimo82//Js38Z8C+HSdlf/87/4AEXnsYdLb2
0Ors8ZNHm50SNzzacEyjzbXnDzS9zu/R7dr3oPfWw2//SZU06/YP//mddSEq
4I6Oj6/eXQ6pgDxetah/gFsWcAgufblBqALAFk0FCC/ma8XzeLmCdFc0D/81
RLwYVaNkCHBG27HFLYAXyGlhRw1UtbqSlYeoTdrAtZYUzyqWCQQe8ugToGoj
unDZb1W+o8WlHo6K46dIDwM1H9p+Hc5pCW5L8geiO8gluag+oFJbaYfpOFlT
6rEwL80TR+9A+ADyD2o1aly0ptyHoq9NfYOCzQYRbFcmfJFPvPv6xpAsbXpO
NBMIE70tsw0Aq5ALrdASGq+8sbwiCITWk4c9R5qVBWDfiVa5XV4hQReegvWX
1IGA5Su4n8W/r1bu2oI+67grP1XjO+Sd4FbOG1aKhNhZSv3n31wLueXhO0U5
WFFlsz2w6nJfWGc9Hjox7bP8btp4xDQQCWI5YazUztEAUZISc1B7WzLXPrgt
FoFm3Bk2E6jWWH/vkI2lM40ghyuX1t8DWAVJAYZLokoNtUDiQRNtcKY9jDq2
5/u1RmOSlTNk8mrH12QkZOmb2tbmrc4/OtsoB4TwsLvfO3wO2KVwbNp/ylyF
7Yh9AeRV4qo6WmrclMNppXBp7PQDp8T6yGKwye+//x59spOJDhmnM3ik/x33
FpLQyzAKEY6km8vR4M/S3pW93sWr28X5+7MPYSNivaoN7aUyBkKHF9ao9Pzq
5HT/6v3t/uVwXt3ezfLbm17vNr/tnw/nBxcn0+rn4cu72+HP+eXdz9nt8N2H
TvTZ8r3unS/rbCKzzA5Eo6GiaRN9f5Dmd1Zo6tHiobuaSpTkrf2Ycr9Hrx8R
X0ft+IpIhm5rBd8Qg5sqs8O4T0YNkTiyWhj9USw2Bbvj/b9NA7Q4NbCSl7Wv
nZAZu3sHzwNUfPrUjMRw9lOQEUV7scXKa5cljqmP3iQq7d6Mny7/CG/oB4ql
zsiXtGGi0t4paE1A+nQQ+XEZecovHfbbbzainu1tedm2vvUp9Rekmu+2/90b
9Hv/2aZ1nfjBFKHjaXUbvUgT1ITINzObMEJXgYQImAvVaktxgcjInTUKVFY7
LfoYkYmk8l4lNdQPmIdiKH1tuT89vNSqns7YNw4TDPLK9sopoMJ7qWrT8Nsc
EXhwunjMwRrvFkSe7x/C5uQ+BGjUyvmzAVYPCkWKE9BFCWxEYSQ1euG8lq5p
2aNjNnQfVP15T6lFcOjRuXKTyRFqQp7SbIKyQzjG1kO//TZqinnqsHwnSl0T
PhQ81O8uBxjvnm+aTpZbJx4hfY5CwVMXdJTPuk06fKoGaJVH60gu0Edax96i
6UyQ9mA17XLadu076dfD/HaIuQdxmbiQddMzwA7rA6yfxS1QuxamBMfCC+m+
piF+2gWGnRjQ9Cgvq2XIyFufPm/byiWZF2qRiXQqWgVIcwr1hmOxCj4KYzsJ
saRX+WPVGrbHcqOQC5SejjwfrSpw9GTKwKpq19P2d3Ijn5J+qe/yXN1P9u6L
g4NquhQPYzpuHRqzZ70eO7u0FVPnXP36r+T2p8M4jif5Xj//dXjWcekiiKG9
UkkzTkR/6psr5Pd2OrueHqQ/9fdfzfpv2evh8M1uP+5HrxXdT7WkiY5dKdcd
2jkGuqFwL7B7p4z4+50hEKUs26GJuSDnQ95r/GrLJ2CeTSkdnt7ARUKSnMv0
i2l3gw7D1gIBYxP6zc2eucn6bypT3r/8uXc4v6w+/pj+tcTe0gTdlnze3rHi
8GWm+ANh/DvXVaAWIepv++N319Mf1KnJxif95ADGeVbepjcX51IdfJ2/vbzc
b2f1G+fTPzUBGkXvSjeOEfI+BGZ7IOAsutNyW5fC37STPCocGCZjP7xfG/KQ
t2qXsNRGPHse7wH+91oFgZsFGCCUry0fZ1OKYxff5k/nZEsw3UBs/wGxJ9Jv
bYJuaDLk27mQVUjqnIY86DwPYvbWd0QUyatWwzD+pQQfPY/ZT2utTFM0Uw+z
ouP6lVB4B5xrty6u+20dY+okoXGeGy/IiR0mtG+zaDBtfG/lUc9W5DnX84fl
Es2u3JiUCKFMbxNiEy4zEzsOfDXoZwSp6K5mokTzQWtHrVizQKR+aLw2SFJ+
ntceQJpmtoUuIBbxzmpVKJBdJgyesNo7W8ujHStUh7rFjpcQHRLFzKnWSvuZ
lNeOl8mVYJbItEZ56S76jKieyt/P46994yGIKCVE13B4m6sEPUYYha84bd3P
RNHZpBWLpIDaXg9SiKF2SJGl1zJ0GL4/lZNlY6Ew2KbVayPciqqbdH3q8IVY
8RWJv95oqiAEmp/hNt2evbzR7kZOhV3o0MmCYY7ojPcnz3YGOyOHoCPde8IW
GMdfJETRkXnoWKuLLZygoPrmAqTha4R8MWrU0vS/ug2MQZGo8dz010f8411k
NhrxggWcnwaL0+JMToS9+/D+6jf7znptEkDUcM6767N2B9zUL5CgVNJOlFv2
LpVGw2wAIXbyDoehXw/YJAwUqGaxtbm99s9Cu9UYbCycKzT3MDDcWknzdDlK
J7kbp2C6tosTZnzV/F7nkcmG4fbIhBXJ2gpbGiwbX6dx7NQuozleG+/N5ql+
v0eJaNvNoVGLNcdsXt33q00QF/Sn9KuEZrjn0RD8hLl9bHtnO3j04wSeZ3Tt
1Oo3mSZACUWn6yPCtbx1FejM374vYU2Z2AvF4ClunXNds/FWw15mq3WnxLHe
t/xQlJjLEATdDG1K6hvLnTWOnrICGJkLUQYvbEtGWCwTgi/wJahuCHgcwrq5
PFhtdBL5vlekG7pbqw0tXDy520k3ZU30sqzUVPNyBjVRL+rS21TBStI2ykbm
5DQu+OlSeyW0q0HAsamorqG7a/pYJIEnMJqjkcnJ5PIj3WT6ImTBCVhQnAKX
agvK1B3aG0lSCyFeCJHHFzobvc3ONbZ9TnV9b7/n294FyY7Sa27vHejKXCPY
1GQyaGU2e5XnLyoMQoF+UGJ7ZNJBxZcQfGGbOO4YI4Hc5bVzBgoIz1m/96zF
2V78LN63t2GkuhZVP21B4TFBLLiZELJBuJCC8hI4um8q6f6ZLsJgdbqBXvNY
4xDqji5Cbc0gp7PKMYhj7Gzxe9ew+3EdeYHvDWN25GAS1T/is5rlNlmaxkXq
Qrp7RGncD8S8B8oCNZU/maLFzQk9oiAQyAEdenvvdyWwlnnuBv9NeEhjapuT
2NnR5dEjVEOqssKuqnF2IRBlqbN1Z/NLFDT0AwDwvPSOTKhcuv7SXs2v0vhq
RkTTVml/rEStgHXiwYPf8ESr/NR1F8d4HxETA3YbXQuL+IkYsLX7Stda2N+4
0DU3CXvUNMV2ehp9GhR1Psbu9B+dCc+M6HyO/g8JssqZgSoAAA==

-->

</rfc>

