<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-radext-radiusdtls-bis-16" category="std" consensus="true" submissionType="IETF" obsoletes="6614, 7360" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="RadSec: RADIUS over TLS and DTLS">RadSec: RADIUS over Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-radext-radiusdtls-bis-16"/>
    <author initials="J.-F." surname="Rieckers" fullname="Jan-Frederik Rieckers">
      <organization abbrev="DFN">Deutsches Forschungsnetz | German National Research and Education Network</organization>
      <address>
        <postal>
          <street>Alexanderplatz 1</street>
          <city>Berlin</city>
          <code>10178</code>
          <country>Germany</country>
        </postal>
        <email>rieckers@dfn.de</email>
        <uri>www.dfn.de</uri>
      </address>
    </author>
    <author initials="M." surname="Cullen" fullname="Margaret Cullen" role="editor">
      <organization>Painless Security</organization>
      <address>
        <postal>
          <street>4 High Street, Suite 206</street>
          <city>North Andover, MA</city>
          <code>01845</code>
          <country>USA</country>
        </postal>
        <email>margaret@painless-security.com</email>
      </address>
    </author>
    <author initials="S." surname="Winter" fullname="Stefan Winter">
      <organization abbrev="RESTENA">Fondation Restena | Restena Foundation</organization>
      <address>
        <postal>
          <street>2, avenue de l'Université</street>
          <city>Esch-sur-Alzette</city>
          <code>4365</code>
          <country>Luxembourg</country>
        </postal>
        <email>stefan.winter@restena.lu</email>
        <uri>www.restena.lu</uri>
      </address>
    </author>
    <date year="2026" month="May" day="05"/>
    <area>Security</area>
    <workgroup>RADIUS EXTensions</workgroup>
    <keyword>RADIUS</keyword>
    <keyword>TLS</keyword>
    <abstract>
      <?line 56?>

<t>This document defines transport profiles for running RADIUS over Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS), allowing the secure and reliable transport of RADIUS messages.
RADIUS/TLS and RADIUS/DTLS are collectively referred to as RadSec.</t>
      <t>This document obsoletes RFC6614 and RFC7360, which specified experimental versions of RADIUS over TLS and DTLS.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-radext-radiusdtls-bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        RADIUS EXTensions Working Group mailing list (<eref target="mailto:radext@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/radext/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/radext/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 62?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines transport profiles for running RADIUS over Transport Layer Security (TLS) <xref target="RFC8446"/> <xref target="RFC5246"/> over TCP, and Datagram Transport Layer Security (DTLS) <xref target="RFC9147"/> <xref target="RFC6347"/> over UDP, allowing secure and reliable transport of RADIUS messages.
RADIUS/TLS and RADIUS/DTLS are collectively referred to as RadSec.  This document obsoletes <xref target="RFC6614"/> and <xref target="RFC7360"/>, which specified experimental versions of RADIUS over TLS and DTLS.</t>
      <t>RADIUS is a widely deployed Authentication, Authorization and Accounting (AAA) protocol defined in <xref target="RFC2865"/>, <xref target="RFC2866"/>, and <xref target="RFC5176"/>, among others.
Deployment experience has shown several shortcomings, such as dependency on the unreliable transport protocol, UDP, and a lack of confidentiality for large parts of RADIUS messages.
Additionally, the confidentiality and integrity mechanisms in RADIUS rely on the MD5 algorithm <xref target="RFC1321"/>, which does not meet modern security expectations.
Although RadSec does not remove the MD5-based mechanisms, it adds confidentiality and integrity protection through the TLS layer.
For an experimental version of RadSec without the need for MD5 see <xref target="RFC9765"/>.</t>
    </section>
    <section anchor="conventions-and-terminology">
      <name>Conventions and Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The following terminology is used in this document:</t>
      <dl>
        <dt>RadSec:</dt>
        <dd>
          <t>A collective term for RADIUS/TLS and RADIUS/DTLS.</t>
        </dd>
        <dt>RADIUS/TLS:</dt>
        <dd>
          <t>A RADIUS exchange transmitted using TLS over TCP.</t>
        </dd>
        <dt>RADIUS/DTLS:</dt>
        <dd>
          <t>A RADIUS exchange transmitted using DTLS over UDP.</t>
        </dd>
        <dt>RADIUS/UDP:</dt>
        <dd>
          <t>RADIUS transported over UDP as defined in <xref target="RFC2865"/>.</t>
        </dd>
        <dt>RADIUS packet:</dt>
        <dd>
          <t>As defined in <xref section="3" sectionFormat="comma" target="RFC2865"/>.</t>
        </dd>
        <dt>RADIUS packet type:</dt>
        <dd>
          <t>As defined in <xref section="4" sectionFormat="comma" target="RFC2865"/>.</t>
        </dd>
        <dt>(D)TLS handshake message:</dt>
        <dd>
          <t>As defined in TLS <xref target="RFC8446"/> and DTLS <xref target="RFC9147"/>.</t>
        </dd>
        <dt>TLS record:</dt>
        <dd>
          <t>As defined in TLS <xref target="RFC8446"/>.</t>
        </dd>
        <dt>DTLS record:</dt>
        <dd>
          <t>As defined in DTLS <xref target="RFC9147"/>.  A DTLS record is always contained in one UDP datagram.</t>
        </dd>
        <dt>(D)TLS connection:</dt>
        <dd>
          <t>A single (D)TLS communication channel (with DTLS this is a synonym for association).</t>
        </dd>
        <dt>UDP datagram:</dt>
        <dd>
          <t>A UDP packet, including the header and data.</t>
        </dd>
        <dt>UDP (datagram) data:</dt>
        <dd>
          <t>The data payload of a UDP datagram.</t>
        </dd>
        <dt>RadSec client:</dt>
        <dd>
          <t>A RadSec instance that initiates a new connection.</t>
        </dd>
        <dt>RadSec server:</dt>
        <dd>
          <t>A RadSec instance that listens on a RADIUS-over-(D)TLS port and accepts new connections.</t>
        </dd>
        <dt>RadSec endpoint:</dt>
        <dd>
          <t>A RadSec client or server</t>
        </dd>
        <dt>RadSec peer:</dt>
        <dd>
          <t>A RadSec endpoint connected to the RadSec endpoint that is the primary subject of discussion.</t>
        </dd>
      </dl>
      <t>Whenever "(D)TLS", "RADIUS/(D)TLS" or "RadSec" is mentioned, the specification applies for both RADIUS/TLS and RADIUS/DTLS.
Where "TLS" or "RADIUS/TLS" is mentioned, the specification applies only for RADIUS/TLS.  Where "DTLS" or "RADIUS/DTLS" is mentioned, it only applies to RADIUS/DTLS.</t>
    </section>
    <section anchor="radsec-packet-and-connection-handling">
      <name>RadSec Packet and Connection Handling</name>
      <t>This section defines the behavior of RadSec endpoints for the establishment and handling of (D)TLS connections and sending and receiving RADIUS packets.</t>
      <t>Server implementations <bcp14>MUST</bcp14> support both RADIUS/TLS and RADIUS/DTLS.
Client implementations <bcp14>SHOULD</bcp14> implement both, but <bcp14>MUST</bcp14> implement at least one of RADIUS/TLS or RADIUS/DTLS.</t>
      <section anchor="portusage">
        <name>RadSec Packet Format, Default ports and shared secrets</name>
        <t>The format of RADIUS packets in RadSec is unchanged from the format specified in <xref target="RFC2865"/>, <xref target="RFC2866"/> and <xref target="RFC5176"/>.</t>
        <t>IANA has reserved server ports for RADIUS/TLS and RADIUS/DTLS.
Since authentication of peers, confidentiality, and integrity protection are provided by the (D)TLS layer, the shared secret for the RADIUS packets is set to a static string, which is different for each of TLS and DTLS (see <xref target="shared_secrets"/>).
The calculation of security-related fields such as Response-Authenticator, Message-Authenticator or encrypted attributes <bcp14>MUST</bcp14> be performed using the static shared secret.</t>
        <table anchor="shared_secrets">
          <name>RADIUS shared secrets for RadSec</name>
          <thead>
            <tr>
              <th align="left">Protocol</th>
              <th align="left">Server Port</th>
              <th align="left">Shared Secret</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">RADIUS/TLS</td>
              <td align="left">2083/tcp</td>
              <td align="left">"radsec"</td>
            </tr>
            <tr>
              <td align="left">RADIUS/DTLS</td>
              <td align="left">2083/udp</td>
              <td align="left">"radius/dtls"</td>
            </tr>
          </tbody>
        </table>
        <t>RadSec does not use separate ports for authentication, accounting and dynamic authorization changes.
The client source port used for RadSec connections is not fixed -- it is typically an ephemeral port picked by the client Operating System.
For considerations regarding the multipurpose use of one port for authentication and accounting see <xref target="radius_packets"/>.</t>
        <t>RadSec clients <bcp14>MAY</bcp14> open multiple connections to the same RadSec server and RadSec servers <bcp14>MUST</bcp14> be able to accept multiple connections from a single client.</t>
        <t>RadSec endpoints <bcp14>MUST NOT</bcp14> use the old RADIUS/UDP or RADIUS/TCP ports for RADIUS/DTLS or RADIUS/TLS.</t>
      </section>
      <section anchor="dtls-requirements">
        <name>(D)TLS requirements</name>
        <t>RadSec clients <bcp14>MUST</bcp14> establish a (D)TLS session immediately upon connecting to a new server, that is without any non-protected negotiations such as done by SMTP STARTTLS or other signalling prior to the (D)TLS handshake.
All data received over a TCP or UDP port assigned for RadSec is opaque for the RADIUS client or server application and must be handled by the TLS or DTLS implementation.
Closing TLS connections and discarding invalid UDP datagrams are done by the (D)TLS implementation.</t>
        <t>RadSec does not provide for negotiation of (D)TLS in ongoing RADIUS communication.
Instead, a server port is configured to always require (D)TLS.  Connection attempts to a (D)TLS port which do not use (D)TLS are not accepted by the server.
As RADIUS has no provisions for capability signaling, there is also no way for a server to indicate to a client that it should transition to using TLS or DTLS.
Servers and clients therefore need to be preconfigured to use RADIUS/(D)TLS for a given endpoint.
This action has to be taken by the administrators of the two systems.</t>
        <t>Implementations <bcp14>MUST</bcp14> follow the recommendations given in <xref target="RFC9325"/>, especially in regards to TLS versions, recommended cipher suites, and TLS session resumption.
Additionally, the following requirements have to be met for the (D)TLS connection:</t>
        <ul spacing="normal">
          <li>
            <t>Negotiation of a cipher suite providing for confidentiality as well as integrity protection is <bcp14>REQUIRED</bcp14>.</t>
          </li>
          <li>
            <t>The endpoints <bcp14>MUST NOT</bcp14> negotiate compression.</t>
          </li>
          <li>
            <t>The connection <bcp14>MUST</bcp14> be mutually authenticated (see <xref target="mutual_auth"/>).</t>
          </li>
        </ul>
        <t>RadSec endpoints <bcp14>MUST NOT</bcp14> use the 0-RTT feature of (D)TLS.</t>
      </section>
      <section anchor="mutual_auth">
        <name>Mutual authentication</name>
        <t>RadSec servers <bcp14>MUST</bcp14> authenticate clients, and RadSec clients <bcp14>MUST</bcp14> authenticate servers.
RADIUS is designed to be used by mutually trusted systems.
Allowing anonymous clients would ensure privacy for RadSec traffic, but would negate all other security aspects of the protocol, including security aspects of RADIUS itself, due to the fixed shared secret.</t>
        <t>RADIUS/(D)TLS allows for the following modes of mutual authentication, which will be further specified in this section:</t>
        <ul spacing="normal">
          <li>
            <t>TLS-X.509-PKIX</t>
          </li>
          <li>
            <t>TLS-PSK</t>
          </li>
        </ul>
        <t>Independent of the chosen mode of authentication, the mutual authentication <bcp14>MUST</bcp14> be performed during the initial handshake.
Alternative methods, such as post-handshake certificate-based client authentication (see <xref section="4.6.2" sectionFormat="comma" target="RFC8446"/>) with TLS 1.3 or renegotiation with TLS 1.2, <bcp14>MUST NOT</bcp14> be used to achieve mutual authentication.</t>
        <section anchor="tlsx509pkix">
          <name>Authentication using X.509 certificates with PKIX trust model (TLS-X.509-PKIX)</name>
          <t>All RadSec server implementations <bcp14>MUST</bcp14> implement this model.
RadSec client implementations <bcp14>SHOULD</bcp14> implement this model, but <bcp14>MUST</bcp14> implement either this model or TLS-PSK.</t>
          <t>If implemented, the following rules apply:</t>
          <ul spacing="normal">
            <li>
              <t>Implementations <bcp14>MUST</bcp14> allow the configuration of a trust base (i.e., a set of trusted Certification Authorities (CAs)<xref target="RFC5280"/>) for new TLS connections.  This list <bcp14>SHOULD</bcp14> be application-specific and not use a global system trust store.</t>
            </li>
            <li>
              <t>Certificate validation <bcp14>MUST</bcp14> include the verification rules as per <xref target="RFC5280"/>.</t>
            </li>
            <li>
              <t>Implementations <bcp14>MAY</bcp14> indicate their trust anchors when opening or accepting TLS connections.
See <xref section="7.4.4" sectionFormat="comma" target="RFC5246"/> and <xref section="6" sectionFormat="comma" target="RFC6066"/> for TLS 1.2 and <xref section="4.2.4" sectionFormat="comma" target="RFC8446"/> for TLS 1.3.</t>
            </li>
            <li>
              <t>When the configured set of trusted CAs changes or updated revocation information becomes available (e.g., fetching of a new CRL), implementations <bcp14>MUST</bcp14> reassess the continued validity of the certificate path of all connected peers.  This can either be done by caching the peer's certificate for the duration of the connection and re-evaluating the cached certificate or by renegotiating the (D)TLS connection, either directly or by opening a new (D)TLS connection and closing the old one.</t>
            </li>
            <li>
              <t>Implementations <bcp14>SHOULD NOT</bcp14> keep a connection open beyond the validity period of the peer certificate.  At the time the peer certificate expires, the connection <bcp14>SHOULD</bcp14> be closed and then possibly re-opened with updated credentials.</t>
            </li>
          </ul>
          <t>RadSec endpoints <bcp14>SHOULD NOT</bcp14> be preconfigured with a set of trusted CAs by the vendor or manufacturer that are enabled by default.
Instead, the endpoints <bcp14>SHOULD</bcp14> start off with an empty CA set as the trust base.
The addition of a CA <bcp14>SHOULD</bcp14> be done only when manually configured by the administrator.
This does not preclude vendors or manufacturers including their set of trusted CAs in their products, but the enabling of those lists should require an explicit act by an administrator.</t>
          <t>RadSec clients <bcp14>MUST</bcp14> follow <xref target="RFC9525"/> when validating RadSec server identities. RadSec servers also follow <xref target="RFC9525"/> when validating RadSec client identities with some additional rules.</t>
          <t>Specific details are provided below:</t>
          <ul spacing="normal">
            <li>
              <t>Certificates <bcp14>MAY</bcp14> include a single wildcard in the identifiers of DNS names and realm names, but only as the complete, left-most label.</t>
            </li>
            <li>
              <t>RadSec clients validate the server's identity to match their local configuration, accepting the identity on the first match:
              </t>
              <ul spacing="normal">
                <li>
                  <t>If the expected RadSec server is associated with a specific NAI realm, e.g., by dynamic discovery <xref target="RFC7585"/> or static configuration, that realm is matched against the presented identifiers of any subjectAltName entry of type otherName whose name form is NAIRealm as defined in <xref section="2.2" sectionFormat="comma" target="RFC7585"/>.</t>
                </li>
                <li>
                  <t>If the expected RadSec server was configured as a hostname, or the hostname was yielded by a dynamic discovery procedure, that name is matched against the presented identifiers of any subjectAltName entry of type dNSName <xref target="RFC5280"/>.  Since a dynamic discovery might by itself not be secured, implementations <bcp14>MAY</bcp14> require the use of DNSSEC <xref target="RFC4033"/> to ensure the authenticity of the DNS result before considering this identity as valid.</t>
                </li>
                <li>
                  <t>If the expected RadSec server was configured as an IP address, the configured IP address is matched against the presented identifier in any subjectAltName entry of type iPAddress <xref target="RFC5280"/>.</t>
                </li>
                <li>
                  <t>The Common Name RDN <bcp14>MUST NOT</bcp14> be used to identify a server.</t>
                </li>
                <li>
                  <t>Clients <bcp14>MAY</bcp14> use other attributes of the certificate to validate the server's identity, but they <bcp14>MUST NOT</bcp14> accept any certificate without validation.</t>
                </li>
                <li>
                  <t>Clients which also act as servers (i.e., proxies) may be susceptible to security issues when a ClientHello is mirrored back to themselves.  More details on this issue are discussed in <xref target="security_considerations"/>.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>RadSec servers validate the certificate of the RadSec client against a local database of acceptable clients.
The database may enumerate acceptable clients either by IP address or by a name component in the certificate.
              </t>
              <ul spacing="normal">
                <li>
                  <t>For clients configured by DNS name, the configured name is matched against the presented identifiers of any subjectAltName entry of type dNSName <xref target="RFC5280"/>.</t>
                </li>
                <li>
                  <t>For clients configured by their source IP address, the configured IP address is matched against the presented identifiers of any subjectAltName entry of type iPAddress <xref target="RFC5280"/>.</t>
                </li>
                <li>
                  <t>Some servers <bcp14>MAY</bcp14> be configured to accept a client coming from a range or set of IP addresses.  In this case, the server <bcp14>MUST</bcp14> verify that the client IP address of the current connection is a member of the range or set of IP addresses, and the server <bcp14>MUST</bcp14> match the client IP address of the current connection against the presented identifiers of any subjectAltName entry of type iPAddress <xref target="RFC5280"/>.</t>
                </li>
                <li>
                  <t>Implementations <bcp14>MAY</bcp14> consider additional subjectAltName extensions to identify a client.</t>
                </li>
                <li>
                  <t>If configured by the administrator, the identity check <bcp14>MAY</bcp14> be omitted after a successful <xref target="RFC5280"/> certification path validation, e.g., if the client used dynamic lookup there is no configured client identity to verify.  The client's authorization <bcp14>MUST</bcp14> then be validated using a certificate policy extension <xref section="4.2.1.4" sectionFormat="comma" target="RFC5280"/> unless both endpoints are part of a trusted network.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Implementations <bcp14>MAY</bcp14> allow configuration of a set of additional properties of the certificate to check for a peer's authorization to communicate (e.g., a set of allowed values presented in  subjectAltName entries of type uniformResourceIdentifier <xref target="RFC5280"/> or a set of allowed X.509v3 Certificate Policies).</t>
            </li>
          </ul>
        </section>
        <section anchor="tlspsk">
          <name>Authentication using TLS-PSK (TLS-PSK)</name>
          <t>RadSec server implementations <bcp14>MUST</bcp14> support the use of TLS-PSK.
RadSec client implementations <bcp14>SHOULD</bcp14> support the use of TLS-PSK, but <bcp14>MUST</bcp14> implement either this model or TLS-X.509-PKIX.</t>
          <t>Further guidance on the usage of TLS-PSK in RadSec is given in <xref target="RFC9813"/>.</t>
        </section>
      </section>
      <section anchor="connecting-client-identity">
        <name>Connecting Client Identity</name>
        <t>In RADIUS/UDP, clients are uniquely identified by their IP addresses, as the shared secret is associated with the origin IP address.
With RadSec, the shared secret has a fixed value and multiple distinct RadSec clients can connect from the same IP address.
This requires changing the method of identifying individual clients from RADIUS/UDP.</t>
        <t>Depending on the trust model used, the RadSec client identity is determined as follows.</t>
        <t>With TLS-PSK, a client is uniquely identified by its TLS-PSK identifier (<xref section="6.2" sectionFormat="comma" target="RFC9813"/>).</t>
        <t>With TLS-X.509-PKIX, a client is uniquely identified by the tuple of the issuer and the serial number of the presented client certificate.</t>
        <t>In practice, identification of unique clients is not always necessary and could be based on the subject of the presented certificate or a subjectAltName entry.
While this identification technique could match multiple distinct certificates and therefore distinct clients, it is often sufficient, e.g., for the purpose of applying policies.</t>
        <t>Note well: having identified a connecting entity does not mean the server necessarily wants to communicate with that client.
For example, if the Issuer is not in a trusted set of Issuers, the server may decline to perform RADIUS transactions with this client.</t>
        <t>Additionally, a server <bcp14>MAY</bcp14> restrict individual clients or groups of clients to certain IP addresses or address ranges.
One example of this can be to restrict clients configured by DNS name to only the IP address(es) that this DNS name resolves to.</t>
        <t>A client connecting from outside the allowed range would be rejected, even if the mutual authentication otherwise would have been successful.
To reduce server load and to prevent probing the validity of stolen credentials, the server <bcp14>SHOULD</bcp14> abort the (D)TLS handshake immediately with a TLS alert access_denied(49) after the client transmitted identifying information, i.e., the client certificate or the PSK identifier, and the server recognizes that the client connects from outside the allowed IP address range.</t>
        <t>See <xref section="6.2.1" sectionFormat="comma" target="RFC9813"/> for further discussion on this topic.</t>
      </section>
      <section anchor="tls_session_resumption">
        <name>TLS Session Resumption</name>
        <t>Session resumption lowers the time and effort required to start a (D)TLS connection and increases network responsiveness.
This is especially helpful when using short idle timeouts.</t>
        <t>RadSec clients and servers <bcp14>SHOULD</bcp14> implement session resumption.
Implementations supporting session resumption <bcp14>MUST</bcp14> cache data during the initial full handshake, sufficient to allow authorization decisions to be made during resumption.
For RadSec servers, this should preferably be done using stateless session resumption as specified in <xref target="RFC5077"/> for TLS 1.2 or <xref target="RFC8446"/> for TLS 1.3, to reduce the resource usage for cached data.</t>
        <t>When establishing a (D)TLS connection with session resumption, both client and server <bcp14>MUST</bcp14> re-authorize the connection by using the original, cached data.
In particular, this includes the X.509 certificate (when using a PKIX trust model) as well as any policies associated with that identity such as restrictions on source IP address.
The re-authorization <bcp14>MUST</bcp14> give the same result as if a full handshake was performed at the time of resumption.</t>
        <t>If cached data cannot be retrieved securely, resumption <bcp14>MUST NOT</bcp14> be done, by either immediately closing the connection or reverting to a full handshake.
If a connection that used session resumption is closed by the server before the resumed DTLS session can be established, the RadSec client <bcp14>MUST NOT</bcp14> re-attempt session resumption but perform a full TLS handshake instead.</t>
      </section>
      <section anchor="application-layer-protocol-negotiation">
        <name>Application-Layer Protocol Negotiation</name>
        <t>RadSec clients <bcp14>SHOULD</bcp14> use Application-Layer Protocol Negotiation (ALPN) to signal RadSec support.  The ALPN name assigned to RadSec is "radius/1.0".  Clients implementing ALPN for RadSec <bcp14>MUST</bcp14> use that name.</t>
        <t>A client which signals RadSec support via the ALPN name "radius/1.0", but which does not receive any ALPN response from the server, <bcp14>MUST</bcp14> treat the connection as RadSec.  A client which signals RadSec support via the ALPN name "radius/1.0" and receives an ALPN resonse of "radius/1.0" <bcp14>MUST</bcp14> treat the connection as RadSec.</t>
        <t>RadSec servers <bcp14>SHOULD</bcp14> implement support for ALPN.  A server which does not receive an ALPN name from the client <bcp14>MUST</bcp14> treat that connection as RadSec.  Servers which do not support ALPN will not send any ALPN name in response.  Servers which support ALPN <bcp14>MUST</bcp14> echo back an ALPN name which is compatible with both the ALPN list that the client sent, and with the servers configuration.</t>
        <t>Where both parties agree on the ALPN name "radius/1.0", the connection <bcp14>MUST</bcp14> be treated as RadSec.</t>
        <t>That is, the presence (or not) of the ALPN name "radius/1.0" does not change the behavior of RadSec clients or servers.  However, using ALPN will assist with future changes to RADIUS, and as such, its use is <bcp14>RECOMMENDED</bcp14>.</t>
        <t>Other ALPN names are possible, such as "radius/1.1" <xref target="RFC9765"/>.  RadSec implementations are not required to support <xref target="RFC9765"/>, but implementation of ALPN for RadSec <bcp14>MUST NOT</bcp14> prevent the use of future ALPN names for RADIUS.  The ALPN negotiation requirements in this section are compatible with the rules in <xref section="3" sectionFormat="comma" target="RFC9765"/>.</t>
      </section>
      <section anchor="radius_packets">
        <name>RADIUS packets</name>
        <t>The use of (D)TLS transport does not change the calculation of security-related fields (such as the Response-Authenticator) in RADIUS <xref target="RFC2865"/> or RADIUS Dynamic Authorization <xref target="RFC5176"/>.
Calculation of attributes such as User-Password <xref target="RFC2865"/> or Message-Authenticator <xref target="RFC3579"/> also does not change.</t>
        <t>The changes to RADIUS implementations required to implement this specification are largely limited to the portions that send and receive packets on the network and the establishment of the (D)TLS connection.</t>
        <t>The RadSec specification does not change the client/server architecture of RADIUS.
RadSec clients transmit the same packet types on the connection they initiated as a RADIUS/UDP client would, and RadSec servers transmit the same packet types on the connections the server has accepted as a RADIUS/UDP server would.
As noted in <xref target="portusage"/>, RadSec uses the same port for Authentication and Accounting packets.
As non-exhaustive example, a RadSec client can transmit packets of type Access-Request, Accounting-Request, Status-Server, Disconnect-ACK over the same connection, and a RadSec server can transmit packets of type Access-Accept, Access-Reject, Access-Challenge, Accounting-Response, Disconnect-Request.</t>
        <t>However, special considerations apply for mixing Authentication and Accounting packets over the same connection.
Traditional RADIUS/UDP uses different ports for Authentication and Accounting, where RadSec uses the same connection for all RADIUS packets.
Due to the use of one single port for all packet types, clients might send packets to the server which it cannot process.
Without a response from the server, the client has to wait for the requests to time out before reusing the request ID, leading to resource exhaustion of the limited ID space.</t>
        <t>A server <bcp14>MAY</bcp14> therefore respond with a Protocol-Error packet as defined in <xref section="4" sectionFormat="comma" target="RFC7930"/>, to alleviate this situation and signal that it was unable to process a packet.
The Error-Cause attribute of this packet <bcp14>SHOULD</bcp14> be set to the value 406 ("Unsupported Extension"), if the server does not support the packet type, or the value 502 ("Request Not Routable (Proxy)"), if the request cannot be routed.
Future specifications may recommend other Error-Cause attribute values for specific scenarios.</t>
        <t>RadSec clients <bcp14>MUST</bcp14> accept Protocol-Error as a valid response and thus stop any retransmission of the original packet over the current connection.
Further details of handling the Protocol-Error reply on the client side are outside of the scope of this document, see <xref target="I-D.dekok-protocol-error"/> for a more detailed description of Protocol-Error.</t>
        <t>Note that sending Protocol-Error in response to unwanted packets replaces the use of CoA-NAK, Disconnect-NAK and Accounting-Response in these situations as specified in <xref target="RFC6614"/>.
See further details in <xref target="unwanted_packet_handling"/> below.</t>
        <t>RadSec clients, for both reliability and compatibility reasons, <bcp14>SHOULD NOT</bcp14> mix authentication and accounting requests within the same connection. RadSec clients <bcp14>SHOULD</bcp14> use a separate pool of connections on which to send accounting packets in the event the RadSec server does not support sending Protocol-Error.</t>
      </section>
      <section anchor="detecting-live-servers">
        <name>Detecting Live Servers</name>
        <t>RadSec implementations <bcp14>MUST</bcp14> utilize the existence of a TCP, TLS or DTLS connection where applicable in addition to the application-layer watchdog defined in <xref section="3.4" sectionFormat="comma" target="RFC3539"/> when determining the liveness of each connection.</t>
        <t>As RADIUS is a "hop-by-hop" protocol, proxies hide information about the topology downstream to the client.
While the client may be able to deduce the operational state of the next-hop (i.e., proxy), it is unable to determine the operational state of any hops beyond it.
This is particularly problematic for topologies that aggregate multiple routes for differing realms behind a proxy where the absence of a reply could lead to a client to incorrectly deduce that the proxy is unavailable when the cause was an unresponsive downstream hop for a single realm.
A similar effect may also be seen on home servers that use different credential backends for each realm they service.</t>
        <t>To avoid these issues, RadSec clients <bcp14>MUST</bcp14> only mark a connection 'DOWN' (as labeled by <xref section="3.4" sectionFormat="comma" target="RFC3539"/>) if one or more of the following conditions are met:</t>
        <ul spacing="normal">
          <li>
            <t>The network stack indicates that the connection is no longer viable; such as the destination being no longer routable or the underlying TCP connection being closed by the peer.</t>
          </li>
          <li>
            <t>The transport layer, D(TLS), provides no usable connection</t>
          </li>
          <li>
            <t>The application-layer watchdog algorithm has marked it 'DOWN'.</t>
          </li>
        </ul>
        <t>When a client opens multiple connections to a server, it is also possible that only one of the connections is unresponsive, e.g., because the server deleted the DTLS connection shared state or the connection was load balanced on the server side to a backend server that is now unresponsive.
Therefore, the liveness check <bcp14>MUST</bcp14> be done on a per-connection basis, and a failure on one connection <bcp14>MUST NOT</bcp14> lead to all connections to this server being marked down.</t>
        <t>RadSec clients <bcp14>MUST</bcp14> implement the Status-Server extension as described in <xref target="RFC5997"/> as the application level watchdog to detect the liveness of the peer in the absence of responses.
RadSec servers <bcp14>MUST</bcp14> be able to answer to Status-Server requests.
Since RADIUS has a limitation of 256 simultaneous "in flight" packets due to the length of the ID field (<xref section="2.4" sectionFormat="comma" target="RFC3539"/>), it is <bcp14>RECOMMENDED</bcp14> that RadSec clients reserve ID zero (0) on each connection for Status-Server packets.
This value was picked arbitrarily, as there is no reason to choose any other value over another for this use.</t>
        <t>For RADIUS/TLS, the endpoints <bcp14>MAY</bcp14> send TCP keepalives as described in <xref section="3.8.4" sectionFormat="comma" target="RFC9293"/>.
For RADIUS/DTLS connections, the endpoints <bcp14>MAY</bcp14> send periodic keepalives as defined in <xref target="RFC6520"/>.
This is a way of proactively and rapidly triggering a 'Connection DOWN' notification from the network stack.
These liveness checks are essentially redundant in the presence of an application-layer watchdog, but may provide more rapid notifications of connectivity issues.</t>
      </section>
      <section anchor="client-timers">
        <name>Client Timers</name>
        <t>RadSec clients may need to reconnect to a server that rejected their connection attempt and retry RADIUS packets which did not get an answer.
The following sections define the client behavior.</t>
        <section anchor="reconnection-attempts">
          <name>Reconnection attempts</name>
          <t>RadSec endpoints establish a (D)TLS connection before transmitting any RADIUS packets.
Therefore, in addition to retransmission of RADIUS packets, RadSec clients also have to perform connection retries.</t>
          <t>Except in cases where a connection attempt with session resumption was closed by the RadSec server, RadSec clients <bcp14>MUST NOT</bcp14> immediately reconnect to a server after a failed connection attempt.
A connection attempt is treated as failed if it fails at any point until a (D)TLS connection is established successfully.
Typical reconnections <bcp14>MUST</bcp14> have a lower bound for the time in between retries.
The lower bound <bcp14>SHOULD</bcp14> be configurable, but <bcp14>MUST NOT</bcp14> be less than 0.5 seconds.
In cases where the server closes the connection on an attempted TLS session resumption, the client <bcp14>MUST NOT</bcp14> use TLS session resumption for the following connection attempt.</t>
          <t>RadSec clients <bcp14>MUST</bcp14> implement an algorithm for handling the timing of such reconnection attempts that includes an exponential back-off.
Using an algorithm similar to the retransmission algorithm defined in <xref section="2.2.1" sectionFormat="comma" target="RFC5080"/> is <bcp14>RECOMMENDED</bcp14>.
If a different algorithm is used, it <bcp14>SHOULD</bcp14> include a configurable lower and upper bound for the time between retries, a configurable timeout after which the client gives up reconnecting, and a jitter.</t>
          <t>When a reconnection attempt is queued on a reconnection timer, adding subsequent RADIUS packets to be sent <bcp14>SHOULD NOT</bcp14> trigger an immediate reconnection attempt or reset the reconnection timer.
Instead, the algorithm <bcp14>SHOULD</bcp14> continue as it would have without the new RADIUS packet.
However, a client <bcp14>MAY</bcp14> reset the timeout for giving up reconnecting when a new RADIUS packet is queued.</t>
          <t>Where the connection to a RadSec server is configured to be static and always kept open, the reconnect algorithm <bcp14>SHOULD</bcp14> have an upper limit for the time between retries (e.g., 60 seconds) and not give up trying to reconnect.</t>
        </section>
        <section anchor="client_retransmission_timers">
          <name>RADIUS packet retransmission</name>
          <t>RadSec clients <bcp14>MUST</bcp14> implement timers for managing packet retransmissions and timeouts, such as the ones defined in <xref section="2.2.1" sectionFormat="comma" target="RFC5080"/>.
Other algorithms than the one defined in <xref target="RFC5080"/> are possible, but any timer implementation <bcp14>MUST</bcp14> have similar properties of including jitter, exponential backoff and a maximum retransmission count (MRC) and/or maximum retransmission duration (MRD).</t>
          <t>The following description uses "retransmission" to mean the sending of the exact same packet over the same connection and "retry" to mean the sending of a new RADIUS packet with the same logical contents, but over a different connection or with other details changed.
When a packet is retransmitted, the previously encoded packet contents are sent without change.
When a packet is retried, it goes through the usual RADIUS processing (e.g., allocation of a new RADIUS ID, new Authenticator) and is re-encoded and re-signed.</t>
          <t>When a connection fails or is closed, a RadSec client <bcp14>SHOULD</bcp14> retry packets over a different connection, either a different connection to the same server or a different configured server in the same load-balancing/failover pool.
In order to keep the timers consistent, the timers associated with a packet <bcp14>SHOULD NOT</bcp14> be changed when a packet is moved from one connection to another.
At least the MRD timer <bcp14>SHOULD</bcp14> be preserved to prevent packets staying in the queue indefinitely due to regular connection closure.
A RadSec client <bcp14>MUST</bcp14> associate a packet with exactly one connection until either the connection is closed, in which case the association moves to a new connection, or the timers reach MRC or MRD, in which case the packet is discarded.</t>
          <t>The requirements for actions from timers differ for RADIUS/TLS and RADIUS/DTLS.</t>
          <t>As UDP is not a reliable transport, RADIUS/DTLS clients <bcp14>MUST</bcp14> retransmit packets when indicated by the timers to deal with packets dropped by the network.
When the timers reach MRC or MRD, the packet is discarded.</t>
          <t>Since TCP is a reliable transport, RADIUS/TLS clients <bcp14>MUST NOT</bcp14> retransmit packets when indicated by the timers.
They <bcp14>SHOULD</bcp14> still run the full timer algorithm to determine if the maximum retransmission count (MRC) has been reached.
RADIUS/TLS clients will then use MRC or MRD to determine that a packet has not received a response and the ID of this packet can be re-used for new packets.</t>
          <t>See <xref target="duplicates_retransmissions"/> for more discussion on retransmission behavior.</t>
        </section>
      </section>
      <section anchor="dtls-connection-limits-and-timeout">
        <name>(D)TLS connection limits and timeout</name>
        <t>While RADIUS/UDP could be implemented mostly statelessly (except for the requests in flight and possibly <xref section="2.2.2" sectionFormat="comma" target="RFC5080"/> deduplication), both TCP/TLS as well as DTLS require additional state tracking of the underlying (D)TLS connection and are thus subject to potential resource exhaustion.
This is aggravated by the fact that RADIUS client/servers are often statically configured and thus form long-running peer relationships with long-running connections.</t>
        <t>Implementations <bcp14>SHOULD</bcp14> have configurable limits on the number of open connections.
When this maximum is reached and a new (D)TLS connection is needed, the server <bcp14>MUST</bcp14> either drop an old connection in order to open the new one or else not create a new connection.</t>
        <t>The close notification of (D)TLS or underlying connections are not fully reliable, or connections might be unnecessarily kept alive by heartbeat or watchdog traffic, occupying resources.
Therefore, both RadSec clients and servers <bcp14>MAY</bcp14> close connections after they have been idle for some time (no traffic except application layer watchdog).
This idle timeout <bcp14>SHOULD</bcp14> be configurable within reasonable limits and it <bcp14>SHOULD</bcp14> be possible to disable idle timeouts completely.</t>
        <t>On the server side, this mostly helps avoid resource exhaustion.
For clients, proactively closing connections can also help mitigate situations where watchdog mechanisms are unavailable or fail to detect non-functional connections.
Some scenarios or RADIUS protocol extensions could also require that a connection be kept open at all times, so clients <bcp14>MAY</bcp14> immediately re-open the connection.
These scenarios could be related to monitoring the infrastructure or to allow the server to proactively send packets to the clients without a preceding request.</t>
        <t>The value of the idle timeout to use depends on the exact deployment and is a trade-off between resource usage on clients/servers and the overhead of opening new connections.
Very short timeouts that are at or below the timeouts used for application layer watchdogs, typically in the range of 30-60s can be considered unreasonable.
In contrast, the upper limit is much more difficult to define but may be in the range of 10 to 15 min, depending on the available resources, or never (disabling idle timeout) in scenarios where a permanently open connection is required.</t>
      </section>
      <section anchor="behavior-on-dtls-connection-closure-of-incoming-connections">
        <name>Behavior on (D)TLS connection closure of incoming connections</name>
        <t>If an incoming (D)TLS connection or the underlying transport channel is closed or broken, then there is no way to send a RADIUS response packet to the client.
The RadSec server behavior then depends on the types of packets being processed, and on the role of the server.</t>
        <t>A RadSec server <bcp14>MUST</bcp14> discard or stop all requests that are associated with the closed connection.  This requirement also applies to proxied requests which are associated with the incoming request.
As no response can be sent over the now-closed (D)TLS connection, any further processing of those requests is pointless.
A discarded request may have a cached RADIUS response packet (<xref section="2.2.2" sectionFormat="comma" target="RFC5080"/>), in which case the cached response also <bcp14>MUST</bcp14> be discarded.
If there is no cached response packet, then the request might still be processed by the home server.
The RADIUS proxy <bcp14>MUST</bcp14> discard any response to these requests and <bcp14>SHOULD</bcp14> stop processing the requests.</t>
        <t>A home server which receives Access-Request packets <bcp14>MUST</bcp14> behave as defined above for a proxy and discard those requests and stop processing them.
Where a RADIUS packet is part of a multi-packet authentication session (e.g., EAP), the underlying authentication session could be continued, or the underlying authentication session data could be discarded.
The server may be able to receive and process another packet for that authentication session via a different incoming connection.
It is difficult to make more recommendations for managing partially processed authentication sessions, as such recommendations depend strongly on the authentication method being used.
As a result, further behavior is implementation defined and outside the scope of this specification.</t>
        <t>A home server which receives other kinds of packets (for example Accounting-Request, CoA-Request, Disconnect-Request) <bcp14>MAY</bcp14> finish processing outstanding requests, and then discard any response.
This behavior ensures that the desired action is still taken, even if the home server cannot inform the client of the result of that action.</t>
      </section>
      <section anchor="malformed-packets-and-unknown-clients">
        <name>Malformed Packets and Unknown clients</name>
        <t>The RADIUS specifications say that an implementation should "silently discard" a packet in a number of circumstances.
This action has no further consequences for UDP based transports, as the "next" packet is completely independent of the previous one.</t>
        <t>When TLS is used as transport, decoding the "next" packet on a connection depends on the proper decoding of the previous packet.
As a result the behavior with respect to discarded packets has to change, since a malformed RADIUS packet could impact the decoding of succeeding packets.</t>
        <t>With DTLS, the "next" packet does not depend on proper decoding of the previous packet, since the RADIUS packets are sent in independent DTLS records (see <xref target="radius_packet_handling"/>).
However, since both TLS and DTLS provide integrity protection and ensure that the packet was sent by the peer, a protocol violation at this stage implies that the peer is misbehaving.</t>
        <t>Subject to the discussion below, implementations of this specification <bcp14>SHOULD</bcp14> treat the text on "silently discard" packets in the RADIUS specifications as "silently discard the packet and close the connection".
That is, the implementation <bcp14>SHOULD</bcp14> send a (D)TLS close notification and, in the case of RADIUS/TLS, the underlying TCP connection <bcp14>MUST</bcp14> be closed if any of the following circumstances are seen:</t>
        <ul spacing="normal">
          <li>
            <t>Connection from an unknown client</t>
          </li>
          <li>
            <t>Packet where the RADIUS <tt>Length</tt> field is less than the minimum RADIUS packet length</t>
          </li>
          <li>
            <t>Packet where the RADIUS <tt>Length</tt> field is more than the maximum RADIUS packet length</t>
          </li>
          <li>
            <t>Packet where an Attribute <tt>Length</tt> field has the value of zero or one (0 or 1)</t>
          </li>
          <li>
            <t>Packet where the attributes do not exactly fill the packet</t>
          </li>
          <li>
            <t>Packet where the Request Authenticator fails validation (where validation is required)</t>
          </li>
          <li>
            <t>Packet where the Response Authenticator fails validation (where validation is required)</t>
          </li>
          <li>
            <t>Packet where the Message-Authenticator attribute fails validation (when it occurs in a packet)</t>
          </li>
        </ul>
        <t>After applying the above rules, there are still situations where the previous specifications allow a packet to be "silently discarded" upon receipt, but in which it is reasonable that a connection <bcp14>MAY</bcp14> remain open:</t>
        <ul spacing="normal">
          <li>
            <t>Packet with an invalid code field (see <xref target="radius_packets"/> for details)</t>
          </li>
          <li>
            <t>Response packets that do not match any outstanding request</t>
          </li>
          <li>
            <t>A server lacking the resources to process a request</t>
          </li>
        </ul>
        <t>These requirements reduce the possibility for a misbehaving client or server to wreak havoc on the network.</t>
      </section>
      <section anchor="cross-protocol-considerations">
        <name>Cross Protocol Considerations</name>
        <t>A client may be configured to use multiple servers, and therefore needs to be able to distinguish servers from one another.  Those servers may use different transport protocols, in any combination.  For example, a client may be configured with a RADIUS/UDP server, and RADIUS/DTLS server, and a RADIUS/TLS server all at the same time.  These servers may share IP addresses, but not the same UDP or TCP ports.  These considerations also affect RADIUS servers.</t>
        <t>RADIUS implementations <bcp14>MUST</bcp14> be able to distinguish servers by at least the 3-tuple of:</t>
        <ul spacing="normal">
          <li>
            <t>protocol (one of RADIUS/UDP, RADIUS/DTLS, or RADIUS/TLS)</t>
          </li>
          <li>
            <t>server IP address,</t>
          </li>
          <li>
            <t>server port number.</t>
          </li>
        </ul>
        <t>Implementations <bcp14>MUST NOT</bcp14> exchange both insecure and secure traffic on the same UDP or TCP port.  It is <bcp14>RECOMMENDED</bcp14> that implementations make it impossible for such a configuration to be created.</t>
        <t>Where a server accepts packets on multiple different 3-tuples (protocol, server IP address, server port number), it <bcp14>MUST</bcp14> track clients independently for each 3-tuple combination.  A RADIUS client has no way of knowing if different 3-tuple combinations are all managed by the same RADIUS server.  Therefore, the server behavior has to be compatible with the clients expectations.</t>
        <t>When a server receives a packet from a source IP address on a 3-tuple, it <bcp14>MUST</bcp14> process that packet according to the profile for that 3-tuple.  This requirement means that (for example), a server can be configured to accept RADIUS/UDP traffic on multiple UDP ports, and then have a completely different (and non-overlapping) set of clients configured for each port.</t>
        <t>While this behavior is not required by previous specifications, it codifies long-standing practices.  As such, existing server implementations likely do not need to do anything in order to support the requirements of this section.</t>
      </section>
    </section>
    <section anchor="radiustls-specific-specifications">
      <name>RADIUS/TLS-specific specifications</name>
      <t>This section discusses all specifications that are only relevant for RADIUS/TLS.</t>
      <section anchor="sending-and-receiving-radius-traffic">
        <name>Sending and receiving RADIUS traffic</name>
        <t>The TLS layer of RADIUS/TLS provides a stream-based communication between the two peers instead of the packet-based communication as with RADIUS/UDP.
As a result, the way RADIUS packets are sent and received has to change.</t>
        <t>Instead of relying on the underlying transport protocol to indicate the start of a new packet, the RADIUS/TLS endpoints have to keep track of the packet borders by examining the header of the received RADIUS packets.</t>
        <t>After the TLS connection is established, a RADIUS/TLS endpoint <bcp14>MUST NOT</bcp14> send any data except for RADIUS packets over the connection.
Since the RADIUS packet header contains a <tt>Length</tt> field, the end of the current RADIUS packet can be deduced.
The next RADIUS packet <bcp14>MUST</bcp14> be sent directly after the current RADIUS packet, that is, the endpoints <bcp14>MUST NOT</bcp14> add padding before, between, or after RADIUS packets.</t>
        <t>When receiving RADIUS packets, a RADIUS/TLS endpoint <bcp14>MUST</bcp14> determine the borders of RADIUS packet based on the <tt>Length</tt> field in the RADIUS header.
Note that, due to the stream architecture of TLS, it is possible that a RADIUS packet is first received only partially, and the remainder of the packet is contained in following fragments.
Therefore, RADIUS/TLS endpoints <bcp14>MUST NOT</bcp14> assume that the packet length is invalid solely based on the currently available data in the stream.  More data may come at a later time.</t>
        <t>It is <bcp14>RECOMMENDED</bcp14> that RADIUS/TLS implementations pass a RADIUS packet to the TLS library as one unit, instead of in multiple fragments.  This behavior avoids unnecessary overhead when sending or receiving (especially if every new write generates a new TLS record) and wait times on the other endpoint.</t>
      </section>
      <section anchor="duplicates_retransmissions">
        <name>Duplicates and Retransmissions</name>
        <t>As TCP is a reliable transport, RADIUS/TLS endpoints <bcp14>MUST NOT</bcp14> retransmit RADIUS packets over a given TCP connection.
However, if the TLS connection or TCP connection is closed or broken, retries over new connections are permissible.
RADIUS request packets that have not yet received a response <bcp14>MAY</bcp14> be transmitted by a RADIUS/TLS client over a new connection.
As this procedure involves using a new connection, the ID of the packet <bcp14>MAY</bcp14> change.
If the ID changes, any security attributes such as Message-Authenticator <bcp14>MUST</bcp14> be recalculated.</t>
        <t>Despite the above discussion, RADIUS/TLS servers <bcp14>SHOULD</bcp14> still perform duplicate detection on received packets, as described in <xref section="2.2.2" sectionFormat="comma" target="RFC5080"/>.
This detection can prevent duplicate processing of packets from non-conforming clients.</t>
        <t>RADIUS clients <bcp14>MUST NOT</bcp14> perform retries by sending a packet on a different protocol or connection proactively.
However, when a connection fails, a RADIUS client <bcp14>MAY</bcp14> send packets associated with that connection over a different configured connection or server.
This requirement does not, therefore, forbid the practice of putting servers with the same IP address and port number but different protocols into a failover or load-balancing pool.
In that situation, RADIUS requests <bcp14>MAY</bcp14> be sent to another server that is known to be part of the same pool.</t>
      </section>
    </section>
    <section anchor="dtls_spec">
      <name>RADIUS/DTLS-specific specifications</name>
      <t>This section discusses all specifications that are only relevant for RADIUS/DTLS.</t>
      <section anchor="radius_packet_handling">
        <name>RADIUS packet handling</name>
        <t>The DTLS encryption adds an overhead to each packet sent.
RADIUS/DTLS implementations <bcp14>MUST</bcp14> support sending and receiving RADIUS packets of 4096 bytes in length, with a corresponding increase in the maximum size of the encapsulated DTLS packets.
This larger packet size may cause the UDP packet to be larger than the Path MTU (PMTU), which causes the packet to be fragmented.
Implementers and operators should be aware of the possibility of fragmented UDP packets.
For details about issues with fragmentation see <xref target="RFC8900"/>.</t>
        <t>RADIUS/DTLS endpoints <bcp14>MUST</bcp14> send exactly one RADIUS packet per DTLS record.
This ensures that the RADIUS packets do not get fragmented at a point where a re-ordering of UDP packets would result in decoding failures.
The DTLS specification mandates that a DTLS record must not span multiple UDP datagrams (<xref section="4.3" sectionFormat="comma" target="RFC9147"/>).
A single UDP datagram may, however, contain multiple DTLS records.
RADIUS/DTLS endpoints <bcp14>MAY</bcp14> use this behavior to send multiple RADIUS packets in one UDP packet.</t>
        <t>For the receiving RADIUS/DTLS endpoint, the length checks defined in <xref section="3" sectionFormat="comma" target="RFC2865"/> still apply.
That is, a receiving RADIUS/DTLS endpoint <bcp14>MUST</bcp14> perform all the length checks, but <bcp14>MUST</bcp14> use the length of the decrypted payload of the DTLS record instead of the UDP packet length.
Exactly one RADIUS packet is encapsulated in a DTLS record, and any data outside the range of the RADIUS length field within the decrypted payload of a single DTLS record <bcp14>MUST</bcp14> be treated as padding, as it would be with a RADIUS/UDP packet, and be ignored.  RADIUS implementations <bcp14>MUST NOT</bcp14> discard packets simply due to the existence of padding.
For UDP datagrams containing multiple DTLS records, each DTLS record <bcp14>MUST</bcp14> be parsed individually.</t>
        <t>If a RADIUS packet needs to be re-transmitted, either as retransmission due to a missing response by the client or as retransmission of a cached response by the server, the RADIUS/DTLS endpoints <bcp14>MUST</bcp14> re-process the RADIUS packet through DTLS.
That is, for the purpose of retransmissions, RADIUS/DTLS endpoints cache the RADIUS packet, as a RADIUS/UDP endpoint would, and do not cache the DTLS record that contains the RADIUS packet.</t>
      </section>
      <section anchor="server-behavior">
        <name>Server behavior</name>
        <t>When a RADIUS/DTLS server receives packets on the configured RADIUS/DTLS port, all received packets <bcp14>MUST</bcp14> be treated as being RADIUS/DTLS.
RADIUS/UDP packets <bcp14>MUST NOT</bcp14> be accepted on this port.</t>
        <t>Some servers maintain a list of allowed clients per destination port.
Others maintain a global list of clients that are permitted to send packets to any port.
As such, a RADIUS/DTLS server <bcp14>MUST</bcp14> maintain a "DTLS Required" flag per client.</t>
        <t>This flag indicates whether or not that client is required to use DTLS.
When set, the flag indicates that the only traffic accepted from the client is over the RADIUS/DTLS port.  All non-DTLS traffic <bcp14>MUST</bcp14> be silently discarded.</t>
        <t>This flag is normally set by an administrator.
However, if the server receives DTLS traffic from a client, it <bcp14>SHOULD</bcp14> notify the administrator that DTLS is available for that client.
A server <bcp14>MAY</bcp14> automatically mark the client as "DTLS Required".</t>
      </section>
      <section anchor="client-behavior">
        <name>Client behavior</name>
        <t>When a RADIUS/DTLS client sends packet to a RADIUS/DTLS port, all packets <bcp14>MUST</bcp14> be DTLS.
RADIUS/UDP packets <bcp14>MUST NOT</bcp14> be sent to this port.</t>
        <t>RADIUS/DTLS clients <bcp14>SHOULD NOT</bcp14> probe servers to see if they support DTLS transport.
Instead, clients <bcp14>SHOULD</bcp14> use DTLS as a transport layer only when administratively configured.</t>
      </section>
    </section>
    <section anchor="implementation-considerations">
      <name>Implementation Considerations</name>
      <t>This section discusses topics related to the internal behavior of RadSec implementations that should be considered by RadSec implementers.</t>
      <section anchor="radius-implementation-changes">
        <name>RADIUS Implementation Changes</name>
        <t>The RADIUS packet format is unchanged from <xref target="RFC2865"/>, <xref target="RFC2866"/> and <xref target="RFC5176"/>.
Specifically, all of the following portions of RADIUS remain unchanged when using RadSec:</t>
        <ul spacing="normal">
          <li>
            <t>Packet format</t>
          </li>
          <li>
            <t>Permitted codes</t>
          </li>
          <li>
            <t>Request Authenticator calculation</t>
          </li>
          <li>
            <t>Response Authenticator calculation</t>
          </li>
          <li>
            <t>Minimum packet length</t>
          </li>
          <li>
            <t>Maximum packet length</t>
          </li>
          <li>
            <t>Attribute format</t>
          </li>
          <li>
            <t>Vendor-Specific Attribute (VSA) format</t>
          </li>
          <li>
            <t>Permitted data types</t>
          </li>
          <li>
            <t>Calculation of dynamic attributes such as CHAP-Challenge, or Message-Authenticator</t>
          </li>
          <li>
            <t>Calculation of "encrypted" attributes such as Tunnel-Password.</t>
          </li>
        </ul>
        <t>The use of (D)TLS transport does not change the calculation of security-related fields (such as the Response-Authenticator) in RADIUS <xref target="RFC2865"/> or RADIUS Dynamic Authorization <xref target="RFC5176"/>.
Calculation of attributes such as User-Password <xref target="RFC2865"/> or Message-Authenticator <xref target="RFC3579"/> also does not change.</t>
        <t>The changes to RADIUS implementations required to implement this specification are largely limited to the portions that send and receive packets on the network, and to the establishment of the (D)TLS connection.
The fact that RADIUS remains largely unchanged ensures the simplest possible implementation and widest interoperability of the specification.
This reuse includes the usage of the outdated security mechanisms in RADIUS that are based on shared secrets and MD5.
The use of MD5 here is not considered a security issue, since integrity and confidentiality are provided by the (D)TLS layer.  See <xref target="security_considerations"/> of this document or <xref target="RFC9765"/> for more details.  See also <xref section="1" sectionFormat="comma" target="RFC9765"/> for a discussion of issues related to the continued use of MD5, even in situations where its use is known to be safe.</t>
        <t>Note that for RADIUS/DTLS the DTLS encapsulation of RADIUS means that UDP datagrams include an additional overhead due to DTLS.
This is discussed further in <xref target="dtls_spec"/>.</t>
        <section anchor="unwanted_packet_handling">
          <name>Differences from RFC 6614 unwanted RADIUS packet handling</name>
          <t>The previous specification of RADIUS/TLS in <xref target="RFC6614"/> recommended sending a reply to unwanted RADIUS packets that depends on the request type:</t>
          <ul spacing="normal">
            <li>
              <t>For unwanted CoA-Requests or Disconnect-Requests, the servers should respond with a CoA-NAK or Disconnect-NAK, respectively.</t>
            </li>
            <li>
              <t>For unwanted Accounting-Requests, the servers should respond with an Accounting-Response containing an Error-Cause attribute with the value 406 ("Unsupported Extension").</t>
            </li>
          </ul>
          <t><xref target="RFC6614"/> also recommended that a RADIUS/TLS client observing this Accounting-Response should stop sending Accounting-Request packets to this server.
This behavior, however, could lead to problems, especially in proxy fabrics, since the RADIUS client cannot determine whether the reply came from the correct server or a RADIUS proxy along the way.</t>
          <t>Compared to the <xref target="RFC6614"/> recommended replies (CoA-NAK, Disconnect-NAK and Accounting-Response), the Protocol-Error packet is explicitly only applicable to one RADIUS hop and must not be forwarded, which gives the RADIUS client the opportunity to re-route the unwanted packet to a different RADIUS server.
This also is backwards compatible with existing implementations, since RADIUS clients must ignore any incoming RADIUS packets with an unknown packet type.
Therefore, these <xref target="RFC6614"/> recommended reply message types are now replaced with the Protocol-Error packet type.</t>
        </section>
      </section>
      <section anchor="forwarding-radius-packets-between-udp-and-tcp-based-transports">
        <name>Forwarding RADIUS packets between UDP and TCP based transports</name>
        <t>When a RADIUS proxy forwards packets, it is possible that the incoming and outgoing links have substantially different properties.
This issue is most notable in UDP to TCP proxying, but there are still possible issues even when the same transport is used on both incoming and outgoing links.
<xref section="1.2" sectionFormat="comma" target="RFC2866"/> noted this issue many years ago:</t>
        <artwork><![CDATA[
A forwarding server may either perform its forwarding function in a
pass through manner, where it sends retransmissions on as soon as it
gets them, or it may take responsibility for retransmissions, for
example in cases where the network link between forwarding and remote
server has very different characteristics than the link between NAS
and forwarding server.
]]></artwork>
        <t>These differences are most notable in throughput, and in differing retransmission requirements.</t>
        <section anchor="throughput-differences-lead-to-network-collapse">
          <name>Throughput Differences lead to Network Collapse</name>
          <t>An incoming link to the proxy may have substantially different throughput than the outgoing link.
Perhaps the network characteristics on the two links are different, or perhaps the home server is slow.
In both situations, the proxy may be left with a difficult choice about what to do with the incoming packets, if the rate of incoming packets exceeds throughput on the outgoing link.</t>
          <t>As RADIUS does not provide for connection-based congestion control, there is no way for the proxy to signal on the incoming link that the client should slow its rate of sending packets.
As a result, the proxy generally will accept the packets, buffer them, and hope that they can be sent outbound before the client gives up on the request.  Other courses of action are possible, but are implementation specific.  See <xref target="I-D.dekok-protocol-error"/> for more discussion on this topic.</t>
        </section>
        <section anchor="differing-retransmission-requirements">
          <name>Differing Retransmission Requirements</name>
          <t>Since UDP datagrams can be lost, RADIUS/UDP and RADIUS/DTLS transports are required to perform retransmissions as per <xref section="2.2.1" sectionFormat="comma" target="RFC5080"/>.
In contrast, RADIUS/TCP and RADIUS/TLS transports are reliable, and do not perform retransmissions.
These requirements lead to an issue for proxies when they send packets across protocol boundaries with differing retransmission behaviors.</t>
          <t>When a proxy receives packets on an unreliable transport, and forwards them across a reliable transport, it receives retransmissions from the client, but <bcp14>MUST NOT</bcp14> forward those retransmissions across the reliable transport.
The proxy <bcp14>MAY</bcp14> log information about these retransmissions, but it does not perform any other action.</t>
          <t>When a proxy receives RADIUS packets on a reliable transport, and forwards them across an unreliable transport, the proxy <bcp14>MUST</bcp14> perform retransmissions across the unreliable transport as per <xref section="2.2.1" sectionFormat="comma" target="RFC5080"/>.
That is, the proxy takes responsibility for the retransmissions.
Implementations <bcp14>MUST</bcp14> take care to not completely decouple the two transports in this situation.
See <xref target="radius_packet_handling"/> for details on retransmitting RADIUS packets over DTLS.</t>
          <t>That is, if an incoming connection on a reliable transport is closed, there may be pending retransmissions on an outgoing unreliable transport.
Those retransmissions <bcp14>MUST</bcp14> be stopped, as there is nowhere to send the reply.
Similarly, if the proxy sees that the client has given up on a request (such as by re-using an Identifier before the proxy has sent a response), the proxy <bcp14>MUST</bcp14> stop all retransmissions of the old request and discard it.</t>
          <t>The above requirements are a logical extension of the common practice where a client stops retransmission of a packet once it decides to "give up" on the packet and discard it.
Whether this discard process is due to internal client decisions, or interaction with incoming connections is irrelevant.
When the client cannot do anything with responses to a request, it <bcp14>MUST</bcp14> stop retransmitting that request.</t>
        </section>
        <section anchor="acct-delay-time-and-event-timestamp">
          <name>Acct-Delay-Time and Event-Timestamp</name>
          <t>In order to avoid congestion, it is <bcp14>RECOMMENDED</bcp14> that RadSec clients which originate Accounting-Request packets (i.e., not proxies) do not include Acct-Delay-Time (<xref section="5.2" sectionFormat="comma" target="RFC2866"/>) in those packets.
Instead, those clients <bcp14>SHOULD</bcp14> include Event-Timestamp (<xref section="5.3" sectionFormat="comma" target="RFC2869"/>), which is the time at which the original event occurred.
The Event-Timestamp <bcp14>MUST NOT</bcp14> be updated on any retransmissions, as that would both negate the meaning of Event-Timestamp, and create the same problem as with Acct-Delay-Time.</t>
          <t>Not using Acct-Delay-Time allows for RADIUS Accounting-Request packets to be retransmitted without change.
In contrast, updating Acct-Delay-Time would require that the client create and send a new Accounting-Request packet without signaling the server that the previous packet is no longer considered active.
This process can occur repeatedly, which leads to multiple different packets containing effectively the same information (except for Acct-Delay-Time).
This duplication contributes to congestion of the network, if one or more RADIUS proxies performs retransmission to the next hop for each of those packets independently.
See <xref target="proxy_rationale"/> for a more detailed explanation of the problem and its implications.</t>
          <t>Additionally, the different properties of the RADIUS/TLS transport as well as cross-protocol proxying change the assumption of a negligible transmission time of the RADIUS packet, on which the value of Acct-Delay-Time is based.
While a single UDP packet may have a negligible transmission time, application data sent via TLS could arrive at the server with a significant delay due to the underlying TCP retransmission mechanism.
If the packet is proxied from RADIUS/TLS to RADIUS/DTLS or RADIUS/UDP, the proxy has to retransmit on its own without changing the value of Acct-Delay-Time, which again introduces non-negligible transmission delays.</t>
          <t>Using Event-Timestamp instead of Acct-Delay-Time also removes an ambiguity around retransmitted packets for RADIUS/TLS.
Since there is no change to the packet contents when a retransmission timer expires, no new packet ID is allocated, and therefore no new packet is created.</t>
          <t>Where RadSec clients do include Acct-Delay-Time in RADIUS packets, the client <bcp14>SHOULD</bcp14> use timers to detect packet loss, as described in <xref target="client_retransmission_timers"/>.
Where RadSec clients do include Acct-Delay-Time in RADIUS packets, the client can rely on the Event-Timestamp to signal delays, and therefore <bcp14>SHOULD NOT</bcp14> update the Acct-Delay-Time. If the timer has determined that the original packet has been completely lost, the client <bcp14>SHOULD</bcp14> then create a new RADIUS packet with the same information, and <bcp14>MAY</bcp14> update Acct-Delay-Time.
This behavior ensures that there is no congestive collapse, since a new packet is only created if following hops have also given up on retransmission.
The Event-Timestamp is then interpreted as the time at which the event occurred.  Where Acct-Delay-Time exists, it is then interpreted as the delay between the event and when the packet was sent. Systems <bcp14>MUST NOT</bcp14> subtract the Acct-Delay-Time from Event-Timestamp to derive a time at which the event occurred; that time is exactly Event-Timestamp.  The existence of Acct-Delay-Time instead serves as an additional indication of delays in sending the packet.
Leaving the Acct-Delay-Time static reduces the granularity of Acct-Delay-Time to the retransmission timeout, compared to the different approach of updating the Acct-Delay-Time on each retransmission.</t>
        </section>
      </section>
      <section anchor="additional-verification-of-peers">
        <name>Additional Verification of Peers</name>
        <t>There are numerous trust models in PKIX environments, and it is beyond the scope of this document to define how a particular deployment determines whether a client is trustworthy.
Implementations that want to support a wide variety of trust models should expose as many details of the presented certificate to the administrator as possible so that the trust model can be implemented by the administrator.
As a suggestion, at least the following information from the TLS connection and the X.509 client certificate should be exposed:</t>
        <ul spacing="normal">
          <li>
            <t>Originating IP address</t>
          </li>
          <li>
            <t>Certificate Fingerprint</t>
          </li>
          <li>
            <t>Issuer</t>
          </li>
          <li>
            <t>Subject</t>
          </li>
          <li>
            <t>all X.509v3 Extended Key Usage</t>
          </li>
          <li>
            <t>all X.509v3 Subject Alternative Name</t>
          </li>
          <li>
            <t>all X.509v3 Certificate Policy</t>
          </li>
        </ul>
        <t>Similar to the PKIX trust model, clients using TLS-PSK may have additional policies to determine whether a client should be allowed to connect.
Therefore, in TLS-PSK operation, at least the following information from the TLS connection should be exposed:</t>
        <ul spacing="normal">
          <li>
            <t>Originating IP address</t>
          </li>
          <li>
            <t>TLS-PSK Identifier</t>
          </li>
        </ul>
      </section>
      <section anchor="tcp-applications-are-not-udp-applications">
        <name>TCP Applications Are Not UDP Applications</name>
        <t>Implementers should be aware that programming a robust TCP-based application can be very different from programming a robust UDP-based application.</t>
        <t>Additionally, differences in the transport like head-of-line blocking and the possibility of increased transmission times should be considered.</t>
        <t>When using RADIUS/UDP or RADIUS/DTLS, there is no ordering of packets.
If a packet sent by an endpoint is lost, that loss has no effect on subsequent packets sent by that endpoint.</t>
        <t>Unlike UDP, TCP is subject to issues related to head-of-line blocking.
This occurs when a TCP segment is lost and a subsequent TCP segment arrives out of order.
While the RADIUS endpoints can process RADIUS packets out of order, the semantics of TCP makes this impossible.
This limitation can lower the maximum packet processing rate of RADIUS/TLS.
In severe cases, this may have a noticeable effect on all authentications that run over the congested connection, especially authentications with multiple round trips such as EAP-based authentications.
In contrast, when a RADIUS/UDP or RADIUS/DTLS packet is lost, only this authentication session is affected.
Additionally, due to the architecture of TCP as reliable stream transport, TCP retransmissions can occur significantly later, even multiple seconds, after the original data was passed to the network stack by the application.
In contrast, RADIUS/UDP packets are usually received either quickly, or not at all, in which case the RADIUS/UDP stack triggers a retransmission of the packet on the application layer.
This can impact or distort the accuracy of RADIUS attributes for timing which assume a negligible network delay, namely Acct-Delay-Time.</t>
      </section>
      <section anchor="dtls-session-management">
        <name>DTLS Session Management</name>
        <t>Where RADIUS/TLS can rely on the TCP state machine to perform session tracking, RADIUS/DTLS cannot.
As a result, implementations of RADIUS/DTLS may need to perform session management of the DTLS session in the application layer.
This subsection describes logically how this tracking is done.
Implementations <bcp14>MAY</bcp14> choose to use the method described here, or another, equivalent method.
When implementations do not use the 5-tuple described below, note that IP address based policies <bcp14>MUST</bcp14> still be applied for all incoming packets, similar to the mandated behavior for TLS Session Resumption in <xref target="tls_session_resumption"/>.</t>
        <t><xref section="2.2.2" sectionFormat="comma" target="RFC5080"/> already mandates a duplicate detection cache.
The session tracking described below can be seen as an extension of that cache, where entries contain DTLS sessions instead of RADIUS/UDP packets.</t>
        <section anchor="server-session-management">
          <name>Server Session Management</name>
          <t>A RADIUS/DTLS server using the 5-tuple method <bcp14>MUST</bcp14> track ongoing DTLS sessions for each client, based on the following 5-tuple:</t>
          <ul spacing="normal">
            <li>
              <t>source IP address</t>
            </li>
            <li>
              <t>source port number</t>
            </li>
            <li>
              <t>destination IP address</t>
            </li>
            <li>
              <t>destination port number</t>
            </li>
            <li>
              <t>protocol (fixed to <tt>UDP</tt>)</t>
            </li>
          </ul>
          <t>Note that this 5-tuple is independent of IP protocol version (IPv4 or IPv6).</t>
          <t>Each 5-tuple points to a unique session entry, which usually contains the following information:</t>
          <dl>
            <dt>DTLS Session:</dt>
            <dd>
              <t>Any information required to maintain and manage the DTLS session.</t>
            </dd>
            <dt>DTLS Data:</dt>
            <dd>
              <t>An implementation-specific variable that may contain information about the active DTLS session.
This variable may be empty or nonexistent.</t>
            </dd>
            <dt/>
            <dd>
              <t>This data will typically contain information such as idle timeouts, session lifetimes, and other implementation-specific data.</t>
            </dd>
          </dl>
          <section anchor="session-opening-and-closing">
            <name>Session Opening and Closing</name>
            <t>Session tracking is subject to Denial-of-Service (DoS) attacks due to the ability of an attacker to forge UDP traffic.
RADIUS/DTLS servers <bcp14>SHOULD</bcp14> use the stateless cookie tracking technique described in <xref section="4.2.1" sectionFormat="comma" target="RFC6347"/> for DTLS 1.2 and <xref section="5.1" sectionFormat="comma" target="RFC9147"/> for DTLS 1.3.
DTLS sessions <bcp14>SHOULD NOT</bcp14> be tracked until a ClientHello packet has been received with an appropriate Cookie value.
Server implementation <bcp14>SHOULD</bcp14> have a way of tracking DTLS sessions that are partially set up.
Servers <bcp14>MUST</bcp14> limit both the number and impact on resources of partial sessions.</t>
            <t>Sessions (both 5-tuple and entry) <bcp14>MUST</bcp14> be deleted when the DTLS session is closed for any reason.
When a session is deleted due to it failing security requirements, the DTLS session <bcp14>MUST</bcp14> be closed, any TLS session resumption parameters for that session <bcp14>MUST</bcp14> be discarded, and all tracking information <bcp14>MUST</bcp14> be deleted.</t>
            <t>Since UDP is stateless, the potential exists for the client to initiate a new DTLS session using a particular 5-tuple, before the server has closed the old session.
For security reasons, the server <bcp14>MUST</bcp14> keep the old session active until either it has received secure notification from the client that the session is closed or the server decides to close the session based on idle timeouts.
Taking any other action would permit unauthenticated clients to perform a DoS attack, by reusing a 5-tuple and thus causing the server to close an active (and authenticated) DTLS session.</t>
            <t>As a result, servers <bcp14>MUST</bcp14> ignore any attempts to reuse an existing 5-tuple from an active session.
This requirement can generally be reached by simply processing the packet through the existing DTLS session, as with any other packet received via that 5-tuple.
Non-compliant, or unexpected packets will be ignored by the DTLS layer.</t>
          </section>
        </section>
        <section anchor="client-session-management">
          <name>Client Session Management</name>
          <t>RADIUS/DTLS clients <bcp14>SHOULD NOT</bcp14> send both RADIUS/UDP and RADIUS/DTLS packets to different servers from the same source socket.
This practice causes increased complexity in the client application and increases the potential for security breaches due to implementation issues.</t>
        </section>
      </section>
    </section>
    <section anchor="security_considerations">
      <name>Security Considerations</name>
      <t>As this specification relies on the existing TLS and DTLS specifications, all security considerations for these protocols also apply to the (D)TLS portions of RadSec.</t>
      <t>For RADIUS however, many security considerations raised in the RADIUS documents are related to RADIUS encryption and authorization.
Those issues are largely mitigated when (D)TLS is used as a transport method, since encryption and authorization is achieved on the (D)TLS layer.
The issues that are not mitigated by this specification are related to the RADIUS packet format and handling, which is unchanged in this specification.</t>
      <t>A few remaining security considerations and notes to administrators deploying RadSec are listed below.</t>
      <section anchor="mixing-secure-and-insecure-traffic">
        <name>Mixing Secure and Insecure Traffic</name>
        <t>It is <bcp14>RECOMMENDED</bcp14> that servers do not accept both secure and insecure traffic from the same source IP address.  Allowing RADIUS/UDP and RADIUS/DTLS from the same client exposes the traffic to downgrade attacks and is <bcp14>NOT RECOMMENDED</bcp14>.</t>
        <t>Administrators of a client can place servers into a load-balance or fail-over pools, no matter what the combination of values in the 3-tuple which identifies a server. However, administrators should limit these pools to servers with a similar security profile, e.g., all UDP, or all (D)TLS. Mixing insecure traffic with secure traffic will likely create security risks.</t>
      </section>
      <section anchor="radius-proxies">
        <name>RADIUS Proxies</name>
        <t>RadSec provides authentication, integrity and confidentiality protection for RADIUS traffic for a single hop between two RADIUS endpoints.
In the presence of proxies, intermediate proxies can still inspect the individual RADIUS packets, i.e., "end-to-end" encryption on the RADIUS layer is not provided.
Where intermediate proxies are untrusted, it is desirable to use other RADIUS mechanisms to prevent critical RADIUS attributes from inspection by such proxies.
One common method is to protect user credentials by using the Extensible Authentication Protocol (EAP) and EAP methods that utilize TLS.
However, in typical use cases there still remain attributes potentially containing confidential data (such as personally identifiable information or cryptographic keys) which cannot be protected from inspection by proxies.</t>
        <t>Additionally, when RADIUS proxies are used, the RADIUS client has no way of ensuring that the complete path of the RADIUS packet is protected, since RADIUS routing is done hop-by-hop and any intermediate proxy may be configured, after receiving a RADIUS packet via RadSec from one endpoint, to forward this packet to a different endpoint using the RADIUS/UDP transport profile.
Since with RADIUS/UDP, the packet is sent in cleartext, an eavesdropper can observe the packet over the RADIUS/UDP hops.
There is no technical solution with the current specification that enforces that a RADIUS packet is transported only via secure RADIUS transports over the whole path.
If the confidentiality of the full contents of the RADIUS packet across the whole path is required, organizational solutions need to be in place that ensure that every intermediate RADIUS proxy is configured to forward the RADIUS packets using RadSec as transport.</t>
        <t>One possible way to reduce the attack surface is to reduce the number of proxies in the overall proxy chain.
For this, dynamic discovery as defined in <xref target="RFC7585"/> can be used.</t>
        <section anchor="loopback-attack-on-endpoints-acting-as-server-and-client">
          <name>Loopback-Attack on endpoints acting as Server and Client</name>
          <t>RadSec endpoints that are configured to act both as client and server, typically in a proxy configuration, may be vulnerable to attacks where an attacker mirrors back all traffic to the endpoint.
Therefore, endpoints that are capable of acting as both client and server <bcp14>SHOULD</bcp14> implement mitigations to avoid accepting connections from itself.
One example of a potentially vulnerable configuration is a setup where the RadSec server is accepting incoming connections from any address (or a wide address range).
Since the server may not be able to verify the certificate subject or subject alternate names, the trust is based on the certificate issuer and/or on the contents of the certificate policies extension <xref section="4.2.1.4" sectionFormat="comma" target="RFC5280"/>.
However, in this case, the client certificate which the RadSec endpoint uses for outgoing connections on the client side might also satisfy the trust check of the server side.
Other scenarios where the identification of an outgoing connection satisfies the trust check of an incoming one are possible, but are not enumerated here.</t>
          <t>Either through misconfiguration, erroneous or spoofed dynamic discovery, or an attacker rerouting TLS packets, a proxy might thus open a connection to itself, creating a loop.
Such attacks have been described for TLS-PSK <xref target="RFC9257"/>, dubbed a selfie-attack, but are much broader in the RadSec case.
In particular, as described above, they also apply to certificate based authentication.</t>
          <t>Server implementations <bcp14>SHOULD</bcp14> therefore detect connections from itself, and reject them.
There is currently no detection method that works universally for all use-cases and TLS implementations.
Some possible detection methods are listed below:</t>
          <ul spacing="normal">
            <li>
              <t>Comparing client or server random used in the TLS handshake.  While this is a very effective method, it requires access to values which are normally private to the TLS implementation.</t>
            </li>
            <li>
              <t>Sending a custom random number in an extension in the TLS client hello.  Again, this is very effective, but requires extension of the TLS implementation.</t>
            </li>
            <li>
              <t>Comparing the incoming server certificate to all server certificates configured on the proxy.  While in some scenarios this can be a valid detection method, using the same server certificate on multiple servers would keep these servers from connecting with each other, even when this connection is legitimate.</t>
            </li>
          </ul>
          <t>The application layer RADIUS protocol also offers some loop detection, e.g., using a Proxy-State attribute.
However, these methods are not capable of reliably detecting and suppressing these attacks in every case and are outside the scope of this document.</t>
        </section>
      </section>
      <section anchor="usage-of-null-encryption-cipher-suites-for-debugging">
        <name>Usage of NULL encryption cipher suites for debugging</name>
        <t>Some TLS implementations offer cipher suites with NULL encryption, to allow inspection of the plaintext with packet sniffing tools.
Since with RadSec the RADIUS shared secret is set to a static string ("radsec" for RADIUS/TLS, "radius/dtls" for RADIUS/DTLS), using a NULL encryption cipher suite will also result in complete disclosure of the whole RADIUS packet, including the encrypted RADIUS attributes, to any party eavesdropping on the conversation.
Following the recommendations in <xref section="4.1" sectionFormat="comma" target="RFC9325"/>, this specification forbids the usage of NULL encryption cipher suites for RadSec.</t>
        <t>For cases where administrators need access to the decrypted RadSec traffic, different approaches should be used, like exporting the key material from TLS libraries according to <xref target="I-D.ietf-tls-keylogfile"/>.</t>
      </section>
      <section anchor="possibility-of-denial-of-service-attacks">
        <name>Possibility of Denial-of-Service attacks</name>
        <t>Both RADIUS/TLS and RADIUS/DTLS have a considerable higher amount of data that the server needs to store in comparison to RADIUS/UDP.
Therefore, an attacker could try to exhaust server resources.</t>
        <t>With RADIUS/UDP, any invalid RADIUS packet would fail the cryptographic checks and the server would silently discard that packet.
For RadSec, the server needs to perform at least a partial TLS handshake to determine whether or not the client is authorized.
Performing a (D)TLS handshake is more complex than the cryptographic check of a RADIUS packet.
An attacker could try to trigger a high number of (D)TLS handshakes at the same time, resulting in a high server load and potentially a Denial-of-Service.
To prevent this attack, a RadSec server <bcp14>SHOULD</bcp14> have configurable limits on new connection attempts, and where configured, <bcp14>MUST</bcp14> enforce those limits.</t>
        <t>Both TLS and DTLS need to store connection information for each open (D)TLS connection.
Especially with DTLS, a bogus or misbehaving client could open an excessive number of DTLS connections.
This connection tracking could lead to a resource exhaustion on the server side, triggering a Denial-of-Service.
Therefore, RadSec servers <bcp14>SHOULD</bcp14> have a configurable limit of the number of connections they can track, and where configured, <bcp14>MUST</bcp14> enforce those limits.
When the total number of connections tracked is going to exceed the configured limit, servers <bcp14>MAY</bcp14> free up resources by closing the connection that has been idle for the longest time.
Doing so may free up idle resources that then allow the server to accept a new connection.</t>
        <t>RadSec servers <bcp14>MUST</bcp14> limit the number of partially open (D)TLS connections and <bcp14>SHOULD</bcp14> expose this limit as configurable option to the administrator.</t>
        <t>To prevent resource exhaustion by partially opening a large number of (D)TLS connections, RadSec servers <bcp14>SHOULD</bcp14> have a timeout on partially open (D)TLS connections.
A limit of a few seconds is recommended, implementations <bcp14>SHOULD</bcp14> expose this timeout as a configurable option to the administrator.
If a (D)TLS connection is not established within this timeframe, it is likely that this connection is either not from a valid client, or it is from a valid client with unreliable connectivity.
In contrast, an established connection might not send packets for longer periods of time, but since the endpoints are mutually authenticated, leaving a connection available does not pose a problem other than the problems mentioned before.</t>
        <t>A different means of prevention is IP address filtering.
If the IP address range that the server expects clients to connect from is restricted, then the server can simply reject or drop all connection attempts from outside those ranges.
If every RadSec client is configured with an IP address range, then the server does not even have to perform a partial TLS handshake if the connection attempt comes from outside every allowed range, but can instead immediately drop the connection.
To perform this lookup efficiently, RadSec servers <bcp14>SHOULD</bcp14> keep a list of the accumulated permitted IP address ranges, individually for each transport.</t>
      </section>
      <section anchor="tls-connection-lifetime-and-key-rotation">
        <name>TLS Connection Lifetime and Key Rotation</name>
        <t>The RadSec TLS connections may have a long lifetime.
Especially when dealing with high volume of RADIUS traffic, the encryption keys have to be rotated regularly, depending on both the amount of data which was transferred, and on the encryption method.
See <xref section="5.5" sectionFormat="comma" target="RFC8446"/> and <xref target="I-D.irtf-cfrg-aead-limits"/> for more information.</t>
        <t>Implementers <bcp14>SHOULD</bcp14> be aware of this issue and determine whether the underlying TLS library automatically rotates encryption keys or not.
If the underlying TLS library does not perform the rotation automatically, RadSec implementations <bcp14>SHOULD</bcp14> perform this rotation manually, either by a key update of the existing TLS connection or by closing the TLS connection and opening a new one.</t>
      </section>
      <section anchor="connection-closing-on-malformed-packets">
        <name>Connection Closing On Malformed Packets</name>
        <t>If malformed RADIUS packets are received or the packets fail the authenticator checks, this specification requires that the (D)TLS connection be closed.
The reason is that the connection is expected to be used for transport of RADIUS packets only.</t>
        <t>Any non-RADIUS traffic on that connection means the other party is misbehaving and is potentially a security risk.
Similarly, any RADIUS traffic failing authentication vector or Message-Authenticator validation means that two parties do not have a common shared secret.
Since the shared secret is static, this again means the other party is misbehaving.</t>
        <t>On the other hand, a third party should not be able to trigger such a connection closure, e.g., by sending a RADIUS packet with attributes the RadSec server does not understand.
If a RadSec endpoint would close the connection when receiving such packets, an attacker could repeatedly send such packets to disrupt the RadSec connection.
Leaving the connection open and ignoring unknown attributes also ensures forward compatibility.</t>
      </section>
      <section anchor="migrating-from-radiusudp-to-radsec">
        <name>Migrating from RADIUS/UDP to RadSec</name>
        <t>Since RADIUS/UDP security relies on the MD5 algorithm, which is considered insecure, using RADIUS/UDP over insecure networks is risky.
Migrating from RADIUS/UDP to RadSec is therefore recommended.
Within this migration process, however, there are a few items that need to be considered by administrators.</t>
        <t>Firstly, administrators may be tempted to simply migrate from RADIUS/UDP to RadSec with (D)TLS-PSK and reuse the RADIUS shared secret as (D)TLS-PSK.
While this may seem like an easy way to upgrade RADIUS/UDP to RadSec, the cryptographic problems with the RADIUS/UDP shared secret render the shared secret potentially compromised.
Using a potentially compromised shared secret as TLS-PSK compromises the whole TLS connection.
Therefore, as defined in <xref section="4.1.3" sectionFormat="comma" target="RFC9813"/>, any shared secret used with RADIUS/UDP before <bcp14>MUST NOT</bcp14> be used with RadSec and (D)TLS-PSK.
As implementation note, it is also strongly recommend to not reuse the configuration option for the RADIUS/UDP shared secret in the existing user interfaces for the (D)TLS-PSK too.
Instead, these should be separate input fields in order to prevent accidental reuse of an existing shared secret when switching to (D)TLS-PSK.</t>
        <t>When upgrading from RADIUS/UDP to RadSec, there may be a period of time, where the connection between client and server is configured for both transport profiles.
If the old RADIUS/UDP configuration is left configured, but not used in normal operation, e.g., due to a fail-over configuration that prefers RadSec, an attacker could disrupt the RadSec communication and force a downgrade to RADIUS/UDP.
To prevent this it is <bcp14>RECOMMENDED</bcp14> that, when the migration to RadSec is completed, the RADIUS/UDP configuration is removed.
RadSec clients <bcp14>MUST NOT</bcp14> fall back to RADIUS/UDP if the RadSec communication fails, unless explicitly configured this way.</t>
        <t>Special considerations apply for clients behind a NAT, where some clients use RADIUS/UDP and others use RadSec.
A RADIUS server might not be able to detect if a RadSec client falls back to RADIUS/UDP; they will appear with the same source IP address to the server and use the same shared secret.
It is therefore <bcp14>NOT RECOMMENDED</bcp14> to use both RADIUS/UDP and RadSec clients behind a NAT at the same time.</t>
      </section>
      <section anchor="client-subsystems">
        <name>Client Subsystems</name>
        <t>Many traditional clients treat RADIUS as subsystem-specific.
That is, each subsystem on the client has its own RADIUS implementation and configuration.
These independent implementations work for simple systems, but break down for RADIUS when multiple servers, fail-over and load-balancing are required.
With (D)TLS enabled, these problems are expected to get worse.</t>
        <t>In these situations, clients should use a local proxy that arbitrates all RADIUS traffic between the client and all servers.
This proxy will encapsulate all knowledge about servers, including security policies, fail-over and load-balancing.
All client subsystems should communicate with this local proxy, perhaps via an internal API, or over a loopback address.</t>
        <t>The benefit of this configuration is that there is one place in the client that arbitrates all RADIUS traffic.
So long as the proxy implements RadSec, other subsystems that do not implement RadSec do not need to be updated to support it.  They can instead leverage the functionality of the local proxy to leverage the benefits of (D)TLS.
(D)TLS connections opened by the proxy can remain open for a long period of time, even when client subsystems are restarted.
The proxy can be configured to do RADIUS/UDP to some servers and RadSec to others.</t>
        <t>Delegation of responsibilities and separation of tasks are important security principles.
By moving all RadSec knowledge to a (D)TLS-aware proxy, security analysis becomes simpler, and enforcement of correct security becomes easier.</t>
      </section>
    </section>
    <section anchor="design_decisions">
      <name>Design Decisions</name>
      <t>Many of the design decisions of RADIUS/TLS and RADIUS/DTLS can be found in <xref target="RFC6614"/> and <xref target="RFC7360"/>.
This section will discuss the rationale behind significant changes from the experimental specification.</t>
      <section anchor="design_supported_transports">
        <name>Mandatory-to-implement transports</name>
        <t>With the merging of RADIUS/TLS and RADIUS/DTLS the question of mandatory-to-implement transports arose.
In order to avoid incompatibilities, there were two possibilities: Either mandate one of the transports for all implementations or mandate the implementation of both transports for either the server or the client.
As of the time writing, RADIUS/TLS is widely adopted for some use cases.
However, TLS has some serious drawbacks when used for RADIUS transport.
Especially the sequential nature of the connection and the connected issues like head-of-line blocking could create problems.</t>
        <t>Therefore, the decision was made that RADIUS servers must implement both transports.
For RADIUS clients, that may run on more constrained hardware, implementers can choose to implement only the transport that is better suited for their needs.</t>
      </section>
      <section anchor="design_trust_profiles">
        <name>Mandatory-to-implement trust profiles</name>
        <t><xref target="RFC6614"/> mandates the implementation of the trust profile "certificate with PKIX trust model" for both clients and servers.
The experience of the deployment of RADIUS/TLS as specified in <xref target="RFC6614"/> has shown that most actors still rely on RADIUS/UDP.
Since dealing with certificates can create a lot of issues, both for implementers and administrators, for the re-specification the goal was to create an alternative to insecure RADIUS transports like RADIUS/UDP that can be deployed easily without much additional administrative overhead.</t>
        <t>As with the supported transports, the assumption is that RADIUS servers are less constrained than RADIUS clients.
Since some client implementations already support using certificates for mutual authentication and there are several use cases, where pre-shared keys are not usable (e.g., a dynamic federation with changing members), the decision was made that, analog to the supported transports, RadSec servers must implement both certificates with PKIX trust model and TLS-PSK as means of mutual authentication.
RadSec clients again can choose which method is better suited for them, but must, for compatibility reasons, implement at least one of the two.</t>
      </section>
      <section anchor="design_changes_in_tls">
        <name>Changes in application of TLS</name>
        <t>The original specification of RADIUS/TLS does not forbid the usage of compression in the TLS layer.
As per <xref section="3.3" sectionFormat="comma" target="RFC9325"/>, compression should not be used due to the possibility of compression-related attacks, unless the application protocol is proven to be not open to such attacks.
Since some attributes of the RADIUS packets within the TLS tunnel contain values that an attacker could at least partially choose (i.e., username, MAC address or EAP message), there is a possibility for compression-related attacks, that could potentially reveal data in other RADIUS attributes through length of the TLS record.
To circumvent this attack, this specification forbids the usage of TLS compression.</t>
        <t>Since usage of 0-RTT may have implications on forward secrecy and replay protection, this specification prohibits its use.
Protection against replay attacks is necessary, since a replayed RADIUS packet in the early data would be processed as new packet.
The additional effort that is needed to protect 0-RTT data against replays outweighs the benefit of the reduced processing time.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="service-name-and-transport-protocol-port-number-registry">
        <name>Service Name and Transport Protocol Port Number Registry</name>
        <t>Upon approval, IANA should update the Reference and the Assignment Notes to radsec in the Service Name and Transport Protocol Port Number Registry at <eref target="https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml">https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml</eref>:</t>
        <t>For TCP:</t>
        <ul spacing="normal">
          <li>
            <t>Service Name: radsec</t>
          </li>
          <li>
            <t>Port Number: 2083</t>
          </li>
          <li>
            <t>Transport Protocol: tcp</t>
          </li>
          <li>
            <t>Description: Secure RADIUS Service</t>
          </li>
          <li>
            <t>Assignment notes: The TCP port 2083 was already previously assigned by IANA for "RadSec", an early implementation of RADIUS/TLS, prior to issuance of the experimental RFC 6614.
[RFCXXXX] updates RFC 6614 (RADIUS/TLS).</t>
          </li>
          <li>
            <t>Reference: [RFCXXXX] (this document)</t>
          </li>
        </ul>
        <t>For UDP:</t>
        <ul spacing="normal">
          <li>
            <t>Service Name: radsec</t>
          </li>
          <li>
            <t>Port Number: 2083</t>
          </li>
          <li>
            <t>Transport Protocol: udp</t>
          </li>
          <li>
            <t>Description: Secure RADIUS Service</t>
          </li>
          <li>
            <t>Assignment notes: The UDP port 2083 was already previously assigned by IANA for "RadSec", an early implementation of RADIUS/DTLS, prior to issuance of the experimental RFC 7360. [RFCXXXX] updates RFC 7360 (RADIUS/DTLS).</t>
          </li>
          <li>
            <t>Reference: [RFCXXXX] (this document)</t>
          </li>
        </ul>
      </section>
      <section anchor="tls-application-layer-protocol-negotiation-alpn-protocol-ids">
        <name>TLS Application-Layer Protocol Negotiation (ALPN) Protocol IDs</name>
        <t>IANA is requested to update the "TLS Application-Layer Protocol Negotiation (ALPN) Protocol IDs" registry at <eref target="https://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml#alpn-protocol-ids">https://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml#alpn-protocol-ids</eref> to update one entry, and change the reference from <xref target="RFC9765"/> to THIS DOCUMENT.</t>
        <ul spacing="normal">
          <li>
            <t>Protocol: RADIUS/1.0</t>
          </li>
          <li>
            <t>Identification Sequence: 0x72 0x61 0x64 0x69 0x75 0x73 0x2f 0x31 0x2e 0x30
  ("radius/1.0")</t>
          </li>
          <li>
            <t>Reference: [RFCXXXX] (This document)</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
        <reference anchor="RFC2866">
          <front>
            <title>RADIUS Accounting</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying accounting information between a Network Access Server and a shared Accounting Server. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2866"/>
          <seriesInfo name="DOI" value="10.17487/RFC2866"/>
        </reference>
        <reference anchor="RFC5176">
          <front>
            <title>Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="M. Chiba" initials="M." surname="Chiba"/>
            <author fullname="G. Dommety" initials="G." surname="Dommety"/>
            <author fullname="M. Eklund" initials="M." surname="Eklund"/>
            <author fullname="D. Mitton" initials="D." surname="Mitton"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document describes a currently deployed extension to the Remote Authentication Dial In User Service (RADIUS) protocol, allowing dynamic changes to a user session, as implemented by network access server products. This includes support for disconnecting users and changing authorizations applicable to a user session. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5176"/>
          <seriesInfo name="DOI" value="10.17487/RFC5176"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6066">
          <front>
            <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document provides specifications for existing TLS extensions. It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2". The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6066"/>
          <seriesInfo name="DOI" value="10.17487/RFC6066"/>
        </reference>
        <reference anchor="RFC9525">
          <front>
            <title>Service Identity in TLS</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="R. Salz" initials="R." surname="Salz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Transport Layer Security (TLS) with Internet Public Key Infrastructure using X.509 (PKIX) certificates. This document specifies procedures for representing and verifying the identity of application services in such interactions.</t>
              <t>This document obsoletes RFC 6125.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9525"/>
          <seriesInfo name="DOI" value="10.17487/RFC9525"/>
        </reference>
        <reference anchor="RFC7585">
          <front>
            <title>Dynamic Peer Discovery for RADIUS/TLS and RADIUS/DTLS Based on the Network Access Identifier (NAI)</title>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="M. McCauley" initials="M." surname="McCauley"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document specifies a means to find authoritative RADIUS servers for a given realm. It is used in conjunction with either RADIUS over Transport Layer Security (RADIUS/TLS) or RADIUS over Datagram Transport Layer Security (RADIUS/DTLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7585"/>
          <seriesInfo name="DOI" value="10.17487/RFC7585"/>
        </reference>
        <reference anchor="RFC3579">
          <front>
            <title>RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
            <date month="September" year="2003"/>
            <abstract>
              <t>This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms. In the proposed scheme, the Network Access Server (NAS) forwards EAP packets to and from the RADIUS server, encapsulated within EAP-Message attributes. This has the advantage of allowing the NAS to support any EAP authentication method, without the need for method- specific code, which resides on the RADIUS server. While EAP was originally developed for use with PPP, it is now also in use with IEEE 802. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3579"/>
          <seriesInfo name="DOI" value="10.17487/RFC3579"/>
        </reference>
        <reference anchor="RFC7930">
          <front>
            <title>Larger Packets for RADIUS over TCP</title>
            <author fullname="S. Hartman" initials="S." surname="Hartman"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The RADIUS-over-TLS experiment described in RFC 6614 has opened RADIUS to new use cases where the 4096-octet maximum size limit of a RADIUS packet proves problematic. This specification extends the RADIUS-over-TCP experiment (RFC 6613) to permit larger RADIUS packets. This specification compliments other ongoing work to permit fragmentation of RADIUS authorization information. This document registers a new RADIUS code, an action that required IESG approval.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7930"/>
          <seriesInfo name="DOI" value="10.17487/RFC7930"/>
        </reference>
        <reference anchor="RFC3539">
          <front>
            <title>Authentication, Authorization and Accounting (AAA) Transport Profile</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Wood" initials="J." surname="Wood"/>
            <date month="June" year="2003"/>
            <abstract>
              <t>This document discusses transport issues that arise within protocols for Authentication, Authorization and Accounting (AAA). It also provides recommendations on the use of transport by AAA protocols. This includes usage of standards-track RFCs as well as experimental proposals. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3539"/>
          <seriesInfo name="DOI" value="10.17487/RFC3539"/>
        </reference>
        <reference anchor="RFC5997">
          <front>
            <title>Use of Status-Server Packets in the Remote Authentication Dial In User Service (RADIUS) Protocol</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>This document describes a deployed extension to the Remote Authentication Dial In User Service (RADIUS) protocol, enabling clients to query the status of a RADIUS server. This extension utilizes the Status-Server (12) Code, which was reserved for experimental use in RFC 2865. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5997"/>
          <seriesInfo name="DOI" value="10.17487/RFC5997"/>
        </reference>
        <reference anchor="RFC5080">
          <front>
            <title>Common Remote Authentication Dial In User Service (RADIUS) Implementation Issues and Suggested Fixes</title>
            <author fullname="D. Nelson" initials="D." surname="Nelson"/>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="December" year="2007"/>
            <abstract>
              <t>This document describes common issues seen in Remote Authentication Dial In User Service (RADIUS) implementations and suggests some fixes. Where applicable, ambiguities and errors in previous RADIUS specifications are clarified. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5080"/>
          <seriesInfo name="DOI" value="10.17487/RFC5080"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6614">
          <front>
            <title>Transport Layer Security (TLS) Encryption for RADIUS</title>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="M. McCauley" initials="M." surname="McCauley"/>
            <author fullname="S. Venaas" initials="S." surname="Venaas"/>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6614"/>
          <seriesInfo name="DOI" value="10.17487/RFC6614"/>
        </reference>
        <reference anchor="RFC7360">
          <front>
            <title>Datagram Transport Layer Security (DTLS) as a Transport Layer for RADIUS</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="September" year="2014"/>
            <abstract>
              <t>The RADIUS protocol defined in RFC 2865 has limited support for authentication and encryption of RADIUS packets. The protocol transports data in the clear, although some parts of the packets can have obfuscated content. Packets may be replayed verbatim by an attacker, and client-server authentication is based on fixed shared secrets. This document specifies how the Datagram Transport Layer Security (DTLS) protocol may be used as a fix for these problems. It also describes how implementations of this proposal can coexist with current RADIUS systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7360"/>
          <seriesInfo name="DOI" value="10.17487/RFC7360"/>
        </reference>
        <reference anchor="RFC1321">
          <front>
            <title>The MD5 Message-Digest Algorithm</title>
            <author fullname="R. Rivest" initials="R." surname="Rivest"/>
            <date month="April" year="1992"/>
            <abstract>
              <t>This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. This memo provides information for the Internet community. It does not specify an Internet standard.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1321"/>
          <seriesInfo name="DOI" value="10.17487/RFC1321"/>
        </reference>
        <reference anchor="RFC9765">
          <front>
            <title>RADIUS/1.1: Leveraging Application-Layer Protocol Negotiation (ALPN) to Remove MD5</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="April" year="2025"/>
            <abstract>
              <t>This document defines Application-Layer Protocol Negotiation (ALPN) extensions for use with RADIUS/TLS and RADIUS/DTLS. These extensions permit the negotiation of an application protocol variant of RADIUS called "RADIUS/1.1". No changes are made to RADIUS/UDP or RADIUS/TCP. The extensions allow the negotiation of a transport profile where the RADIUS shared secret is no longer used, and all MD5-based packet authentication and attribute obfuscation methods are removed.</t>
              <t>This document updates RFCs 2865, 2866, 5176, 6613, 6614, and 7360.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9765"/>
          <seriesInfo name="DOI" value="10.17487/RFC9765"/>
        </reference>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC9813">
          <front>
            <title>Operational Considerations for Using TLS Pre-Shared Keys (TLS-PSKs) with RADIUS</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="July" year="2025"/>
            <abstract>
              <t>This document provides implementation and operational considerations for using TLS Pre-Shared Keys (TLS-PSKs) with RADIUS/TLS (RFC 6614) and RADIUS/DTLS (RFC 7360). The purpose of the document is to help smooth the operational transition from the use of RADIUS/UDP to RADIUS/TLS.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="243"/>
          <seriesInfo name="RFC" value="9813"/>
          <seriesInfo name="DOI" value="10.17487/RFC9813"/>
        </reference>
        <reference anchor="RFC5077">
          <front>
            <title>Transport Layer Security (TLS) Session Resumption without Server-Side State</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="H. Zhou" initials="H." surname="Zhou"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document describes a mechanism that enables the Transport Layer Security (TLS) server to resume sessions and avoid keeping per-client session state. The TLS server encapsulates the session state into a ticket and forwards it to the client. The client can subsequently resume a session using the obtained ticket. This document obsoletes RFC 4507. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5077"/>
          <seriesInfo name="DOI" value="10.17487/RFC5077"/>
        </reference>
        <reference anchor="I-D.dekok-protocol-error">
          <front>
            <title>Standardising Protocol-Error</title>
            <author fullname="Alan DeKok" initials="A." surname="DeKok">
              <organization>InkBridge Networks</organization>
            </author>
            <date day="24" month="June" year="2025"/>
            <abstract>
              <t>   We extend and standardise the Protocol-Error packet Code, first
   defined in RFC 7930 for the Remote Authentication Dial In User
   Service (RADIUS) protocol.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-dekok-protocol-error-00"/>
        </reference>
        <reference anchor="RFC9293">
          <front>
            <title>Transmission Control Protocol (TCP)</title>
            <author fullname="W. Eddy" initials="W." role="editor" surname="Eddy"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies the Transmission Control Protocol (TCP). TCP is an important transport-layer protocol in the Internet protocol stack, and it has continuously evolved over decades of use and growth of the Internet. Over this time, a number of changes have been made to TCP as it was specified in RFC 793, though these have only been documented in a piecemeal fashion. This document collects and brings those changes together with the protocol specification from RFC 793. This document obsoletes RFC 793, as well as RFCs 879, 2873, 6093, 6429, 6528, and 6691 that updated parts of RFC 793. It updates RFCs 1011 and 1122, and it should be considered as a replacement for the portions of those documents dealing with TCP requirements. It also updates RFC 5961 by adding a small clarification in reset handling while in the SYN-RECEIVED state. The TCP header control bits from RFC 793 have also been updated based on RFC 3168.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="7"/>
          <seriesInfo name="RFC" value="9293"/>
          <seriesInfo name="DOI" value="10.17487/RFC9293"/>
        </reference>
        <reference anchor="RFC6520">
          <front>
            <title>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Heartbeat Extension</title>
            <author fullname="R. Seggelmann" initials="R." surname="Seggelmann"/>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes the Heartbeat Extension for the Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) protocols.</t>
              <t>The Heartbeat Extension provides a new protocol for TLS/DTLS allowing the usage of keep-alive functionality without performing a renegotiation and a basis for path MTU (PMTU) discovery for DTLS. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6520"/>
          <seriesInfo name="DOI" value="10.17487/RFC6520"/>
        </reference>
        <reference anchor="RFC8900">
          <front>
            <title>IP Fragmentation Considered Fragile</title>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="O. Troan" initials="O." surname="Troan"/>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This document describes IP fragmentation and explains how it introduces fragility to Internet communication.</t>
              <t>This document also proposes alternatives to IP fragmentation and provides recommendations for developers and network operators.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="230"/>
          <seriesInfo name="RFC" value="8900"/>
          <seriesInfo name="DOI" value="10.17487/RFC8900"/>
        </reference>
        <reference anchor="RFC2869">
          <front>
            <title>RADIUS Extensions</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="W. Willats" initials="W." surname="Willats"/>
            <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes additional attributes for carrying authentication, authorization and accounting information between a Network Access Server (NAS) and a shared Accounting Server using the Remote Authentication Dial In User Service (RADIUS) protocol described in RFC 2865 and RFC 2866. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2869"/>
          <seriesInfo name="DOI" value="10.17487/RFC2869"/>
        </reference>
        <reference anchor="RFC9257">
          <front>
            <title>Guidance for External Pre-Shared Key (PSK) Usage in TLS</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="J. Hoyland" initials="J." surname="Hoyland"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document provides usage guidance for external Pre-Shared Keys (PSKs) in Transport Layer Security (TLS) 1.3 as defined in RFC 8446. It lists TLS security properties provided by PSKs under certain assumptions, then it demonstrates how violations of these assumptions lead to attacks. Advice for applications to help meet these assumptions is provided. This document also discusses PSK use cases and provisioning processes. Finally, it lists the privacy and security properties that are not provided by TLS 1.3 when external PSKs are used.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9257"/>
          <seriesInfo name="DOI" value="10.17487/RFC9257"/>
        </reference>
        <reference anchor="I-D.ietf-tls-keylogfile">
          <front>
            <title>The SSLKEYLOGFILE Format for TLS</title>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
              <organization>Zscaler</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <date day="9" month="June" year="2025"/>
            <abstract>
              <t>   A format that supports logging information about the secrets used in
   a TLS connection is described.  Recording secrets to a file in
   SSLKEYLOGFILE format allows diagnostic and logging tools that use
   this file to decrypt messages exchanged by TLS endpoints.  This
   format is intended for use in systems where TLS only protects test
   data.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-keylogfile-05"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-aead-limits">
          <front>
            <title>Usage Limits on AEAD Algorithms</title>
            <author fullname="Felix Günther" initials="F." surname="Günther">
              <organization>IBM Research Europe - Zurich</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="4" month="December" year="2025"/>
            <abstract>
              <t>   An Authenticated Encryption with Associated Data (AEAD) algorithm
   provides confidentiality and integrity.  Excessive use of the same
   key can give an attacker advantages in breaking these properties.
   This document provides simple guidance for users of common AEAD
   functions about how to limit the use of keys in order to bound the
   advantage given to an attacker.  It considers limits in both single-
   and multi-key settings.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-aead-limits-11"/>
        </reference>
        <reference anchor="RFC6613">
          <front>
            <title>RADIUS over TCP</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>The Remote Authentication Dial-In User Server (RADIUS) protocol has, until now, required the User Datagram Protocol (UDP) as the underlying transport layer. This document defines RADIUS over the Transmission Control Protocol (RADIUS/TCP), in order to address handling issues related to RADIUS over Transport Layer Security (RADIUS/TLS). It permits TCP to be used as a transport protocol for RADIUS only when a transport layer such as TLS or IPsec provides confidentiality and security. This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6613"/>
          <seriesInfo name="DOI" value="10.17487/RFC6613"/>
        </reference>
      </references>
    </references>
    <?line 1066?>

<section anchor="changes-from-rfc6614-radiustls-and-rfc7360-radiusdtls">
      <name>Changes from RFC6614 (RADIUS/TLS) and RFC7360 (RADIUS/DTLS)</name>
      <t>The following list contains the most important changes from the previous specifications in <xref target="RFC6613"/> (RADIUS/TCP), <xref target="RFC6614"/> (RADIUS/TLS) and <xref target="RFC7360"/> (RADIUS/DTLS).</t>
      <ul spacing="normal">
        <li>
          <t>The protocols RADIUS/TLS and RADIUS/DTLS are now collectively referred to as RadSec.</t>
        </li>
        <li>
          <t><xref target="RFC6614"/> referenced <xref target="RFC6613"/> for TCP-related specification, RFC6613 on the other hand had some specification for RADIUS/TLS.
These specifications have been merged into this document, and therefore removes <xref target="RFC6613"/> as normative reference.</t>
        </li>
        <li>
          <t>RFC6614 marked TLSv1.1 or later as mandatory, this specification now references <xref target="RFC9325"/> for recommended TLS versions, which mandates TLS 1.2 and recommends TLS 1.3</t>
        </li>
        <li>
          <t>RFC6614 allowed use of TLS compression, this document forbids it.</t>
        </li>
        <li>
          <t>RFC6614 only requires support for the trust model "certificates with PKIX" (<xref section="2.3" sectionFormat="comma" target="RFC6614"/>).  This document changes this.  For servers, TLS-X.509-PKIX (<xref target="tlsx509pkix"/>, equivalent to "certificates with PKIX" in RFC6614) and TLS-PSK (<xref target="tlspsk"/>) is now mandated and clients must implement at least one of the two.</t>
        </li>
        <li>
          <t>The recommendation for TLS-X509-FINGERPRINT (<xref section="2.3" sectionFormat="comma" target="RFC6614"/>) is removed since the model has not been implemented by any known implementation of the experimental RADIUS/(D)TLS specifications.</t>
        </li>
        <li>
          <t>The mandatory-to-implement cipher suites are not referenced directly, this is replaced by a pointer to <xref target="RFC9325"/>.</t>
        </li>
        <li>
          <t>The specification regarding steps for certificate verification has been updated.</t>
        </li>
        <li>
          <t><xref target="RFC6613"/> mandated the use of Status-Server as watchdog algorithm, <xref target="RFC7360"/> only recommended it.  This specification mandates the use of Status-Server for both RADIUS/TLS and RADIUS/DTLS.</t>
        </li>
        <li>
          <t><xref target="RFC6613"/> only included limited text around retransmissions, this document now gives more guidance on how to handle retransmissions and retries, especially across different transports.</t>
        </li>
        <li>
          <t>The rules for verifying the peer certificate have been updated to follow guidance provided in <xref target="RFC9525"/>.  Using the Common Name RDN for validation of server certificates is now forbidden.</t>
        </li>
        <li>
          <t>The response to unwanted packets has changed. Endpoints should now reply with a Protocol-Error packet, which is connection-specific and should not be proxied.</t>
        </li>
      </ul>
      <t>The rationales behind some of these changes are outlined in <xref target="design_decisions"/>.</t>
    </section>
    <section anchor="proxy_rationale">
      <name>Rationale for Event-Timestamp vs. Acct-Delay-Time</name>
      <t>This appendix gives an example of a setup where using Acct-Delay-Time in Accounting-Requests can cause or contribute to congestion in proxy environments.</t>
      <t>The Acct-Delay-Time attribute is intended to carry information about the delay between the time of the event (e.g., when the traffic was measured) and the time when the Accounting-Request was sent.
If an Accounting-Request does not receive an answer, the client can resend the request with an updated Acct-Delay-Time.</t>
      <t>The example setup here consists of three RADIUS endpoints.
Client A acts as a simple RADIUS client, Proxy B acts as RADIUS proxy and Server C acts as RADIUS server.
The connection A-B uses RADIUS/TLS, B-C uses RADIUS/UDP.</t>
      <t>In this scenario, Client A sends accounting updates that are proxied via Proxy B to Server C.
Unknown to the client and the proxy, Server C may be able to accept a high load, but also has extreme high latency in those situations.</t>
      <t>RADIUS does not have link-layer signaling, so there is no way for the server to signal that it received the packet and is processing it.
Without any response, a client has to assume that the packet was lost and triggers a retransmission.
While RADIUS/TLS forbids retransmissions, since it is based on a reliable transport protocol, a RADIUS packet with an updated Acct-DelayTime attribute is not a retransmission per RADIUS definitions, and therefore permissable.
Since it is a new RADIUS packet, a new ID might also be allocated.</t>
      <t>Now, the following scenario might happen (simplified):</t>
      <ul spacing="normal">
        <li>
          <t>Client A sends an Accounting-Request with ID 1 to Proxy B via RADIUS/TLS</t>
        </li>
        <li>
          <t>Proxy B proxies the Accounting-Request and sends it with ID 101 to Server C via RADIUS/UDP</t>
        </li>
        <li>
          <t>Server C receives the Accounting-Request and adds the request to its processing queue.</t>
        </li>
        <li>
          <t>Client A did not receive a response and and after a second sends a new Accounting-Request with ID 2 and an Acct-Delay-Time of 1s to Proxy B</t>
        </li>
        <li>
          <t>Proxy B proxies the Request and sends it with ID 102 to Server C</t>
        </li>
        <li>
          <t>Proxy B also retransmits the Request with ID 101 to Server C, because it did not receive a response</t>
        </li>
        <li>
          <t>Server C receives retransmission of packet with ID 101, recognizes it as duplicate</t>
        </li>
        <li>
          <t>Server C also receives packet with ID 102, and adds it to the processing queue, since it is not a duplicate packet</t>
        </li>
        <li>
          <t>Client A still did not receive a response and sends a new Accounting-Request with ID 3 and Acct-Delay-Time of 2s to Proxy B</t>
        </li>
        <li>
          <t>Proxy B proxies the Request and sends it with ID 103 to Server C</t>
        </li>
        <li>
          <t>Proxy B also retransmits the Requests with ID 101 and ID 102 to Server C, because those requests did not receive a response</t>
        </li>
        <li>
          <t>Server C recognizes the requests with ID 101 and 102 as duplicates, but has to add 103 to its processing queue.</t>
        </li>
      </ul>
      <t>This scenario is simplified and includes only one accounting event, to give a basic understanding of the problem.
If the client wants to send updates for multiple accounting events, each of these updates will generate their own packets.
Especially in scenarios where the server is already under high load, this behavior contributes to congestion and could eventually lead to congestive collapse.</t>
      <t>One cause of the problem is that RADIUS does not have the possibility for a client to signal explicitly that it has given up on a request.
Implicitly, a client could indicate that it has given up by re-using the same ID, in which case a RADIUS proxy will also stop retransmissions on the next connection.
In the case of proxying from a reliable transports to unreliable transports (e.g., from RADIUS/TLS to RADIUS/UDP or RADIUS/DTLS), the proxy is in charge of retransmissions over the unreliable transport.
In the given scenario, re-using the same ID would stop the retransmission of the outdated packets.
But if there are multiple hops with mixed transports (e.g., first RADIUS/TLS, then RADIUS/UDP, then RADIUS/TLS again, then RADIUS/UDP again), this is not possible.
There is no guarantee that a proxy will also re-use the ID on the next hop, making it impossible for proxies down the path to reliably detect that the client has given up.
The first proxy would stop retransmissions because the client re-used the same ID, but the next two proxies have no way of knowing that the client has given up on the packet if the ID was not re-used, and will continue retransmitting the packet until it gets an answer or its timed out.
Until this happens, it cannot use the ID for another request, and if the ID space is exhausted, it must open a new connection to the server, or drop incoming requests.</t>
      <t>If instead the Accounting-Request packets used Event-Timestamp instead of Acct-Delay-Time, the packet content does not need to be updated, and it can be retransmitted using the well-defined retransmission rules.
Any retransmission will be treated as duplicate, and the server can process the event once and send one response after.</t>
      <t>Other solutions to this problem, e.g., adding a globally unique identifier to requests that can be used by implementations to detect duplicate packets based on content instead of link-layer headers, would require changes in the RADIUS protocol and are therefore out of scope for this document.</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to the original authors of RFC 6613, RFC 6614 and RFC 7360: Alan DeKok, Stefan Winter, Mike McCauley, Stig Venaas and Klaas Wierenga.</t>
      <t>Thanks to Arran Curdbard-Bell for text around keepalives and the Status-Server watchdog algorithm.</t>
      <t>Thanks to Alan DeKok for his constant review of this document over its whole process and his many text contributions, like text around forwarding issues between TCP and UDP based transports.</t>
      <t>Thanks to the following people for their feedback and suggested text changes: Alexander Clouter, Mark Donnelly, Fabian Mauchle, Valery Smyslov, Heikki Vatiainen, Paul Wouters.</t>
    </section>
    <section numbered="false" anchor="notes-to-rfc-editor">
      <name>Notes to RFC Editor</name>
      <t><em>This section is to be removed before publishing as an RFC.</em></t>
      <ul spacing="normal">
        <li>
          <t>The references to RFC8446 can be replaced with RFC9846 if I-D.ietf-tls-rfc8446bis is published before this document.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+2963IbV5Yu+B9PkUNHTJEVACyJkmyrT59umpTampJkHlEq
V0VHhzsBJIAsApnozAQpVJXnWebvvMbMi51132vvTFByd9VMxMR0dJRFALlz
X9del299azKZjIqqK7vDi1GW3bx88+pFdvKv719d/gH+799ORvDNpoCP3ueL
m2L+Int/cfX6401W3xVN9qHJq3ZXN132Jj/A3/CDfQMtZacf3tycZXm1yK7y
Ll81+faB317hj09G+WzWFHfH3vTmhpuDf5yM5nlXrOrm8CJru8VoVM/aelN0
Rfsie/788dNx9s3580ej0aKeV/kW+r5o8mU3KYtuOWnyRfGpw/+U+3bRbdrJ
rGwnj5+P2v1sW7ZtWVfdYQfPvH754dUIenM+ypsih15pf09G93Vzu2rq/Q77
yn18+YcPRYUPtyej2+IAv1jAbE5kCPgv6Pforqj2Bc7yA09nGb//5Cd4S1mt
sn/B3+Ln27zcwOc8gn/G0UzrZnUyGuX7bl032O4k4wH/b3k1edUUi6Ipb7P3
ZTG/LZoWvs8yeOJFdlXsu3a+LtrsVd3AP/bVqq2K7s/ZX7N/KZptXmXv8g66
k2+y90Vb5M18TZP/crGf0xfZu6LDWaAm264piu5FdrEpPsGvima3yaGtx/Tl
vF5Afx4/evzNt/w37rPs+6LZlJX8YF91uJL85gN9WPBYG+n5Py+W1XRR0Fe6
S65evaO/YU1eZPf391P7jU7C27xZwdp12eV+symqMPzrvKw2RdvaFoyG8TT7
oVytsxv6c5zd7MuuyJ48eu66/w528Tq7qBa4NcfZ2ws31EePv336LB7Zx5sL
P6qt9Oufd9KPSSv9mM7rLf2yqfHIFYuyqxs3opuuWMLi/FRWXdGE8byqqwUv
C6xWV1Q5rKP+6xV0gr+MBvlknOW0G7NFkW1+87EqYSRt2f3f/6cbytPz58/c
qF/CTpm0+2Zysflz0XVFPMg3+0/Fdlbvm5Ufa0s9nt5Tj/+54U5NN/toKd+/
vPnw8t1FvJzut6Oqhq3RQRdfjEZltXR/jSaTCbQDw8rn3Wj0YV22GRz7/RYk
GgxtWVawyTuTPLumXpYw5Rm0kTX7qsID9ncSaDDDm019j2/o1kVGa1xQC02x
KfPZpnAdq5fajS1siHxVtNMRf/C1Sj7584r+hpbmNezqOc7D5gBNLosGDnzW
1VneZixBp+mEmJzMQLyjpOSGX12ivBxn9+sSDnq7K+blsoS2ik87ECD4JAgC
2h8goVxXe4J5SsuxLReLTTEa/eXFn5awA2BLzIt/PAGRtIQOnvwyGn2VvYY9
U4MwoX35d1+1v/zlf4Exfvv06fNffpE/nj2hP/jpy+vxr1pZaeO7x0+/sQaf
n9Mf1ODHq2u3+P9vLHyWHVv4v/zln2TtobfYOn+AG+CXX/4mW0C6n8H78+y+
XGAvF8VuUx+gvQu4qlDZ4GtkTH/XTflnFl/YyMWcRArO3OnFxcUZrn5Xw5hl
YyyyspI5f/Lt82fYafvrOf7Fg6JFfvwNf7KtobUa3tzA7F5RX2haeHRFNS+y
NUxeu67vK1gvGBOMFv5qOhDI0JN2nLV7vANbHEkBd1w1P2TQYTzY+2pgWbXT
Y9kM0Kc82+TzW5y7eV0tYV5gkPkGdxVu6w1cCkW2y5uuHdwTFwu4DOhK3hzG
9N60FXwHitkV7dRtMV/nVdluW5wvaa7BtZBuv716BnsUlKiyW29lFzw+f/I4
7IJFDfulqjtoCy7RLVwJTZXpVUVzN+9o3bB7G1jHPVybvAHDs02xhT2ib5zM
8hZWMHRunJVdli8W7WeGg/NZkLiAphp6EzaJO2+DR3Q6Ak0GnhncsDSh3K/7
EvvZ0cNVAV3BucepaItCJuG7b3BXTVFMXdbVHfYI9zz25wOoKGVVb+rVAaVW
kYGql6Gu12Ynbz/efDgZ83+zdz/Sv9+//B8fX79/eYX/vvnh4s0b+8dIfnHz
w48f31yFf4UnL398+/bluyt+GD7Noo9GJ28v/njCG+vkx+sPr398d/HmBJe6
iw4+yguQDLOC5rLZgdoBg87b0aJo50054+P0/eX1//V/wG0gB+nx4+9Mrn37
+BuUFPdwavltdQV7iP+ESTyM8t0OFERsBbZmNs93Jcw8rKudJzh1Bczmb/8V
Z+bfXmT/bTbfPX763+UDHHD0oc5Z9CHNWf+T3sM8iQMfDbzGZjP6PJnpuL8X
f4z+1nl3H/63fwK9tsgmj7/9p/8+4j2yrE0NCNsHpeO+5dmPVgx0GjF/RqBR
O1lPT9N2PX49mPDFL7kBOfnFJzxxKxFR27LDbbBvsVfYjt6DoYGrX9HClTUB
wi40AX9gC/K8yUZ4TH/LAtVJdRPq4RrZgdAEjRW7MvzjMV7PJBnO+8+xMfUl
Dz+lh0+vznAwMNJFu85vC5XA/SbwZ9SM6BV6AfKHrBugAvYGxe6c7MHPNAG/
vnro573WM1gd9wTduJv7/EDCtMv1uRo2JE72QtSbMEz4WcXD56XG1YRrzL7d
bveVXNUZrn5VbLJTFKH8Wtq4dM23h6quDrw987at5yU9dAav8m/mt+AnvDog
/av5Zr9QHXldgG3b0FTiI/L0qT5+Rp9iI3iu8N/QzmFT5wuU8Hk6SBH5801J
54r2Mn9UVm2X463frfMO/oKbNUflKIc74d7NSmikLRrYsw80sinRXGnxds1l
y09wm09kMkkrIDVgPi92cMnHb2rDq0C92NVl0mMeBJh70hP79a5IuqWPa+Os
GuLspj/gwbf03Q7uzLw5gJoz+xM8hPO5KNv5nhwi0LefQOCjXpSd8HjojuJj
Lh9g38Rzc4KtbvniLBasrYhKKZsJLg0YECv0M1DMHpRpP+ENkp2El9hvv/xF
dGvFwhOOj7R8lTZ9NdA26CnUiLYIkxpL3q90gq9Z8uA4Lm2Bsx/gb7gbVmLu
tPKxWTvQ9Vmxzu9K6EfQV3SxeKrwR2AWg65Ztmu+3+Ela2kZH+sdbFZcWmgH
f8FGyLwo75wJxWcRd+AN7a2s3O42BalQ3ALd0+1+R3v4s8t1yVs1bUTuYfuY
GhpnM1DGqP3wBZ6mIm87ElymC9PLwgLqpKez/oqcA+Psqljm+01H507mYJ2j
nQQTD0pQC9Zp9hV+uUfx/ote1fiw079lakiFllMP93bFNyEoj029pUWRB4Pd
FN9mY/vjuVldZp/AKF5fvLsgC6Qp6Hgv5JRL7z936d+UKIbyyLTCQaBsAE0s
0azHx1Vr1Bbhzzv49SKbHWhosqNIy5YT5ifS9mU6Y7jFO7JKsxb3wBx9T7Dr
1LpAnadcgvGKS46NFDl8Cr321mR2yno5v/JnWbtffoGLBddrnm/m+42NV22T
Cdg5OQo+WIoN6OZqu70vQAGp2mLirNAa/Xd8x8cf414DM6857Ehj7qDzsFcL
OQ2gUIOdgctuWhBNjYzUzxCs71+v1Yb9ayZn7BrPEvzFv7zhufzr6K8T/b/w
L/sDvvb74K/Zk0ffnn/dzXfwT3QLtyh63Y+u3K/2C/1VuW+/Rsc3/hQPQTy3
Gbn7/1E90/Gh4Z3IMv4Xu4LM1gOFFn4JNixMvtu6eWLz58HCp5v+UOVbmLQ8
cgXwEWtlnVmksCuJr1JSnkN3IolXcneW5Sf4zWSCohuvucMOurBBEQ5m4m4N
wgbNfDbXS9i1tuXldT/CCufUzZsDXO5btjHhRS2cj0bEWlOs8sYUmC2InHK3
b3Y1TAVOB+xKlGL0kv5cqEKg08GbndfoZzlJrNN6LQC24MUfs3pXVPK+TREN
X677Nt/anS/ihCSH/yTsZvZf1KKeDDdM4i5XLZE709dbpE00pHAGsCv1xiQW
6mhOnF1e92XcVSzpTdCLJGqK/9iXDV0VbX9m8NV2RUJn5aG2IE0Gbhk4sKjs
wTbY73CfyfhwAWtRAHluxqYgqdMgrw6wsaqJSEzYMFWxqrtStoK5iHDFYSvd
vP1wnd18uHj/QQZEHiiYvhV6cfCNoHWh9Ky9oDXTA50qG9Zy+cpWwylHSw3b
I0Wa9MoWG40PBPS73uX/sS9SCZ2qkqzRuA253cPdOytYrwinQgZBqxNf7njn
12ZLproH6pFyRMrqDq6gRaSot3Tr6Jy5iUjf0RM3clPR+NxCODWIjJ9V7XSd
yKaZjl6DDg82xxh3dbhxce7o0lzt1bPKZpVsPWkeFEin38ENUWxRsadt5LV+
9aaZjJQvcdz4ER+5MNHcE1j+VnuNqkFV84DZA4tjnue7fFaSs4z3FN2uHem0
ZAq2+MoMes6iR4cIHSxBHcQYKndWdgRv9w7dNns4sGSwl+xyq72voBFH742I
EFxkPX/0dnibeNfY9bRD+9RPJ05CZD1IB1ewySsTJFPWlHOeX5wDbq6Dw1Hp
ZOWLLdhvGP+BO5tcp/hpd1+DTYpCG9Xa10P6LLtl6NfYPZALEidrpRvmZv7u
/AnpcAWpd3SDwHcs+KlPOAD1jY9DazDWebmjI48xxJYVLy+NQN3bw56hrdh3
8AbHkRd5MBF36tPbOv1rwKQf/TZ7F5+LPOqRnCB8w5JvttgDC5KvABGUt8Pa
IqyNOuum8Cq8qAfuAD2ZeJVsYSeIRcm/D721i2i77/Z8S4erEmZSFEH+9mf8
jrTAL7h8Hk1AAGfLIu8wDGPCge+Ut9Reci2TWuTelP2S+AHkLb6HegLG/pKN
bqXo19LO1AVLFoUIcV5bUnBgk9t8dA3IZdTFdF9f6PbIyflS71t74T2d4KJq
96TRl3f5/OAvBzguS7CR2fziH8M6YcfQiSv3lHr6c9z3nZ2tENoIzpuh3+rI
urbYLMfZYl/oTceKWaokxwKBwmfB6g1nAeMQ1P52aOnUurgvYRwwi8t9w4Px
llnnDHA6JfDCyR+mzx59N7n+3es/yAfXN78D0VFpwKfT8c/XoNxV1A86Usn7
WQ0c6NqA4bDYN6o5shNqE1//XdFUFOnGk76uFy4OBRpmNwluynnRdOz1KCTG
IkI96YMcI/E5Ou/n9Pn0CZwo0nVIRj2enqOoB/PMiRD37ZNxOGq6XUl/XJfF
3ZEpoDP3VRIElKuF5t+Pg/WuDFeE9z5N+YZium61zui0gj3zCT7Z3Zaf8LSi
5hSrvoM+jeBzoC1B7U9jlfLzfozw6KA3oyhpA4Zf4azK/sK7aRl+qy4sJ/j3
GPZGBe1AG3XwJsvtItNb1sl7njncEtlpOS2mrOrwZhaBcmlzjk9JRLZDH9fp
5UV7pgHzbx/h/mBl6z7V9DTijG5QnSK0KoJqOVHHHAlIVYXgzt/UM4y2klST
7rZwlxd4R4SuFRmpju4ksfRhGQ8rHEYgk9biQct876dDMwimVNCG1kXZSB/y
Cg46SHoMdZGxRR62RrS1AWV3iug5Ol0KMAjH65vp02kIuBNe4NFz9z26hZa8
L/Boud+lx/QJtRN+e46DQu9stAFIrsaLDNqk2NQ4iv1uQddqU9zVMm0GrIF/
z1CHwUm8y8sNmYanxXQFm2dZdHDA2dfIxtLl+zdn4+Hj1RRgmCDOSroGs7aH
d9JC4mWhAtUt8i7vyAlEsURzYJMjS7fYHM13PlSzYDjMc+4X3VDw89+0Ubt6
jyzc4ehiBYR9o5MCurdns59+AO2iNHVtoc/64AWj/LSngY21nwtQ3uYdxt7p
Ud1NPIG9x0Shrs2rhOYzDHNo+4boZnZbFDtU8EI75CKYFYca2qNTohOPIfJ6
YRc6TJcfIMaVOELeldti8CcYZocxteN0EsPRxwGg44zfXeGF1ZYzQqxMsGPw
Hcl33YlzhCuS7jkQC4kG2rMoqJ2+WIMdL0YCqPML9uht82q/BIsCnmvY4EEr
rKhwj5O6tWC/sTMNu0ivlX60XU7gnaW8HLYkKPIHeCl1I+c9H4Qv+7Fy0fH5
9MBvw3TRPrbYOvWTtD43zCGLZ6rgKbOJC5aKPOQ2HXMbR9zKZmjWSEXC73YM
0mr5YuOJQM8Kn/8OFSGS+K3ajGogMxADRD+iO+Yddh0+Sno+6LsRs0wsr2do
efGMqPhHWz6+2Wnb4H01TZ1bZAL/ihb1yrcWeXVbkIW2dnBX0QWD4RK90RZF
B3KyTfznBbyWbu1Lr9TwhcOLZL40UFcX6CSRqZcegL7KJu3VuxtCgLYipPLN
lv/mheG4lIpZlBBdMc42xbKbbEFNzECCo17z29QskQkonNcBxKaM/oDaHFwH
87Vshg1cFJtYxRi72zB0uzOM0bJsUG3DRhCdDOKLJQ5jh4pFupKtBY/dqdZJ
fnfxmocOYpXuIjyt4jtGHxP6xg6yzN88+xaXGX1c7JFPuk0nn+cR1TLsIMqq
VY5BXbFyipZUsnQt0AkoUVJQ0N+hk7VABCydiMOuYOuJPr+nA4ILRQEifBUM
4j29dgD5gJ0OV/0T1MenXzBr93nkrcoxjA0v7vC940zuPf2Afn3AsAgLlHxg
CmEHzwu4KAuZJ3rubz5Ni3c39GmkoIEGxbGsgW5ty9WaJAlblCTuZoqrXQyo
IHDQVB4RTo/d8XCWbl5eCtbr6aPzc9gnsNPFViYBq+aJ01HwBKK3ZoPvJP+W
xgF475fu3ORysv6Ti1dlr69R2qCrxCH9+Afhq1+zIoTO+tyClNcX0nKsM+Mg
8PK6rLdbRP5TWOHq3aD1J688mLORH790cQtaBtKKXExtQBOE1h6WT3YpHUJX
JHqBY/VtqQM/mBBxv9hnQLcF3lYIXZMbRGwmOBKf4Do4gxk/0KbbtyT3JGhi
7o+ybfeF2Ay5NP9DAfcPrVbZNDVd5IgDZV/IFrbyHd5c2VvcVHqR1JWCa6A9
dpAzGkPFhb7x5zgcxTZOcgtG0xgpskuPC1GHgeylXAQ++unJfMRDTdNL9oDc
ITiPCsahX+EEFdUeY2voTeo9YKr7we9l1otzFjV4hYE2hBdxlfaZ143icNJe
rCDpTdk7OP8PCrHPdFHULo5l/s2P+pf1+6GzfoPajvk54cTOijQaIqdMtwyD
pDU82BBKsDbNMoyD9vlr2dpz2C1jd7L5EJMhf+B7x4Vi/VYRUbFvmiKgnMQf
nWfbYjsrGv3VQ30Zq20SdcA0nl/16r//qgz5LfTse900fcGnTjLLEvGs0Vu5
oj5jZoxj9Q52Ikgw2Ru1YEHzZUfByXYP26Ntl/uNoFxoFO4Q44SRnR/Esap0
5dJPPd0qqghs6vp2vwvhrar2nY41d9JdeStNWT7x93B7xCgDWnIyT2fmYDJA
Rx57JmowZw5hQsPgYvfMY3LQ7DnBjMBSwXgk+4ANR3XNURCZcumOeafYvTfg
2pM97RYfrqkddvnojcoLx8E28ZLEE4K/sRCpeX3Cu7Av7MLBe85t9Sob2tva
E9zd0CZqwe8LFn2vg3bit4kEKqO3kbP37jzyBl7jcuCV/JBPWdys7DKGf5iv
eNfe9oI6D8PenAZpztsvchQfb+DXuYuDxxtG/ErCGqs97FhUmDUXBXFM7hUx
cM3FNSnR4dvHjJj+6isLZMOkCX7vtRwljIE48MbYbjXczLCm/7FHLIWJOnfF
JcK2HQCPDVh85PBqylXp9eDp6Cf8jocyhEJbk9nDgSXanIJkEBQLaE8wNlDt
EgsYfYkixgOYj4Az/t3kYhFTQryoBvihuAzOuMpWxjksyrtygQEQfRO1HqYR
sd4UWCJfSuW8RbzoKPrGA9qZCTgKGHJCAdsN7OZAt8RPEqThPWa3NCEXB5cL
DKqwYcKxPA3bxHmqKUzk3xI25he9jEa6x0UREUU6buMvY4yDgQrp7vEgaFTl
8Coh7tAdJoCWc1Ap9HUBB8k9saUQeJhgOmDtEf7XcMbRnNxYcBlwEE1WxqGi
k97EbuF88H5HBHOJhkKwEq13XTFfS+/ozax+9PdtFBeTqRKgRfiNRqAZ71bD
fVxBhzDQi1/oHauucIWpoaDFABMBkkSqwpy+q9FwAtvlBSIOaFeHdQxuZvhc
dqRLF8srr1fpDJfo3Mwrhsj4W0bOfd6ZVoLac/EpR6loSsFr3ieyemjRhpC4
aHf0izbSKtEeWRRzysqB10rsNUpKyQWsJN0oW+tGAsowBA27FhDPOu+GDjv0
njL86fIzaExNq5hHgo2jMapgNoJ5/LEqdPi85yTsMaMx2JsfNoHwp+QZpMmz
N56iGSv6NTRrv4bvajRF4TEceNDtbZ1JhIEZjTonq4hyP7OWfa9Hpyn+RK4O
2HB03ywfiImTJ+C+bPVxArfMCtq4qkaCAMZBL/ZzW1XK+aBjgKgofA3BwWYq
ln2Iqe3qDbTn4gvRBpFrOp/pJd1LAfKYQXFKMkKhaBi81bY/Q9NwLk6ffncm
erBTY33CVHxLWMANNjn5GdxTiWjBb2L53LNfMCayqso/UzZBbD/JKrbH19CZ
ObSclA1QZEeugOljCUIqviIki5jvoqt35Zy1C5yuG8E8vTfMEyhjqIv9LGio
nwMa6hd8eQqRyrCjTRsCUzj8YrnEdZPLmfYDh2byI3E1kJQYlkRRxWo3vgFR
4agbhdse/t/BvdbFZof2DPl1WLWk7GBYjQ13Bqe0H9Hg1Au2pHu4gSEQWKr/
i/LIEJvehJDqSAFKhokOwEmg1w5TMnbXAcMa0bSILQAQlqUZjIjHyheFtuy7
+iqgiWSIY153CQXtKDM9x4ifhrdk5jo8SrjRBoaErrc4iQL337NH33yTRMjr
Jsq+cwHxMctIEhfkAxCDQ5RjRk6SL0VyzCh6bphhtvz6m4cjQb0ej9nGU+eZ
LbhGwCc6u0UaKgVRHRIHWOPNN+O4b6jYwG4uMcuhkfmV4BEfhB5qJjt1mzTv
oWfOPKoPHRJ64w/o4blTNxV2pHcPbRAYRM+NxYFON25naK9KyQRv5cJBdzqi
C9GajXcqOcYDUCp38WgQ6X4fIoLGzRnekxIZALugQSzSQmIEeIWnp0f817g9
KaAk5pcX+T4S74PrKHDviiZAx+MRTLFjUTieZpR8GgMbn7SOuk1RwBptkI28
x8m48hBSUQts+w6bDTZWXBgGKg91Au1R1ZBkPMlVyEFxluoXDtzDPBmW5uJg
pz2hKIIQbeEvayE7vXhz/e6MZDvhnE3usHQUFw/+iFUZg8Njjp5Zv5r78nj6
6ASh22oNqMjFdaQ2HE6S5o2BpBII87qRkGVQn9qkU9ldmdNChG75DgjyMuZZ
EJg/nUt6TK6mwtmmkprAjiu4ybp0X3oSkL9FT13OIJke1jPqGBzG6Mdf0q8e
mLZ/NUrPcCXwdTQUjZgdmzPXf5suv/21V3l3bLoU0B4B9rUv1DrBSunTAjN3
dJ04uFDZevXaihrhHJX5uuZAUNRzy43DIEjOASYSx3TL2CoRzC5V8loy8nC5
zJGiMxx5D/nKA6FCbdL9giu7agrzIx3btMmaKqKVppbdEI55iJJnxs5ihovi
FOGDdXempvSRPWfLq5wD68HsWGdvKaA6y34ANZHOCN+BYd1QLMC00eQs94QG
V0ScJfMKVQsn84zJM4LHn6DuRgoBo/uRrgnrvbh2GeJUBJRuGNTjk5heJDPJ
lKh8mhUSqbSyfXwLLEHip3FqBkUYin61k5wjUmbBDSOkYUVS1QnjKBchAVML
PVG8c+nqIkhm8Dx+06dtwEzeKIUUzYMkFY6zdKXzoqIFzp2hTfOFGaKnumB0
dQ6miZ45Hh2X2hsS1bIriVTEnEZRpu9l3B0XAdcOfISNPLmGrYq0MumLhhNV
OVh0/uwbZG2hIHYyE1Oet95m7+09v+cSgHOSVg/rTIxFoB9tSrBtA8sA2Stk
PqAAEDlpN4jlB4ugUSNMTdk4u12ERE8ZlwHpNRJ1bXAXkJz4WvPdmvm6xCQW
yQeR/Z7qKWq2B43VUYrYACL9rjgYmYQAcVzWo17FaB1FWSIqpH/tC1uvJ5ID
XBPJ0lfr1YmvprwymB+1r0IOPIgU6dG+FfOCe2FXcT951bF1GY0AtV9Nik/r
HOwOXHRz5eWJXoraqw3btoYEjC7ItTJ5D5sStsXYvSt8dgNbd99ObkQtukK0
EM3P5OLyd5wuaePwwFwm5IrjP1/SmQua4nHoG7q67M/LdY5Mk6si6SzLk6h7
MgLYyXZfib8hzTAm5yzN/7b8RDfalyzD0bGDgYZSVSKGbpPQooeU/JCW++D7
MOEGdYnBneMOB8UcN5tExk9HVyEtyOVLCywypE3Dk/4whCgUo8JIzOjINf/Z
64tlp4Yhods0okRZvQ+o2U67kvzD+7wMOXcNLyK/kmzTveHDmiJY9/K77PUV
wjLzhZiM5pnQoxJw6SpUX1/BtsjnbHY473Nw/3PnDS6pBtTkJYKNdNJStCFh
JL87fxTRH43FJVTclYwWQrFfdvuw7GJ+aaIo2uj7SjPHZWIxskwvZU8AdWNy
mVOyh1535tSW7gUYtHBGiA8X9sbTR8+z05OPlahAMICXGoE/ObPYgMyMyX4f
dHX7xuCQ3PazR0+gbTmJ2Tt47j0sIKc7wDx+Opy5V+gaOv8C/LgAefqKtajo
Gmop8GCpoIJ4G54MCabjpjKwazsvqrwp6wGnIuf8MAQnWW2S+5xibXuab9Z9
i37wHZks6BchKde2bsepB0rny+RHH+4ytfiz4dWWgYWGPNVxv5piF4gH1VpB
DzTqEeqNln6AhNyFDaK0aGMl6Hs9uZouitv6dqJ5iJMC3yE+wDzbBhwduoSI
5m6nRyvul0a5TFPB7iddd1YdZS5XGMEqgrDBocH5bL0Eu6wvJu8ufhfJe/g7
kZx2LwjMDckz9LS1A45Qo+2ckmd+mSwB/Ua7Jxrzz7ooMDsER+/tpnGgYGIW
y9LIF1WP50/QaU7pzS4RA+6jzxBamIBE6SRovvQ+So055x/KPZ1IvRHuTFN/
0CtL0p0gmPGbHXMP6ZVm+sR3fk9iDG8Dtk+uik5CYW9QqxET36Z0ED+y72D+
xPlbfCKSsDnHXJl31rMqeG8zXaqSPocCCeOdmj0iAtIn1xE9Dwjkbr5e1Ku+
sD9/dv6ds7imyuloIAI9uRuJg2AXiZEn0roDJQGB7U7W9W4yO0zgPycuL1jQ
stkaj7VPK8tnyr0Jsoh5EBf1fYWk1PlWh6XBVw2am8QQ7K3eN4vg4q93oi0h
AK5z0NYKud6hdx7HezjTCHm4uwxKcbw5lJzQUqsJVWUXQkXBR78h+Dy0uqW0
A1IUeKilhuXy1arhXGsL89NNwjcAK2B8dvLNFl8HBweVVeq7bAxa/lkb9hJL
WMYQoIYREzsg4cO8biQJzSYuV8AiNszzYfl+95ZSSLfVPSPTketWo2V+6XCK
hWOCNTfq/BR1FlBkYF4wUIcIClxDMlHpri8oWrj2gFN1kjtNNERuyWEGB7QN
hFGcxEGmFzZRkqr0AQZ/V5cLEauMyh6ngobOJ0XItzmaoP78/ebqx5/e/SY7
hWFT9gz75Y+epTPUEiiDq+ELSPZfyOSFtvn0sodni5SWQoKgNjBstfmtJaP6
IG6Eca3qbFODjdGg4xaW6h8y77yACw8klGZx4pvD7xvVbkQL2iNZPwM/kFHG
x6boyTgggXhB5W0IThfhBbs6ZcpzyX6iXoJVOYsYhOThB+RWICRGdRuXBYVY
J8uhsTrb2JhH2B4lQcpNjefjTvtOfXQ8u7T6QjOXGtd0IMJ2t6yjgk+EVzuL
DdHq4kepIFeYWufi+F7O4wZDMMMs3yCQL0COuGmO0+NYZOsbiYtwE1X1fdRN
0rrZNBjHAl1Au+KylXxDwoE2E7/0eVu2aiAvQRyQl4RZRFPXLyoBJm1Cxq4u
gLgGJY5F5A28oig5jii23u1UxOa9w96SPeMIjAUv/d13GCaWk+BpjcCmKTZh
m4nEn3e9K083uuoNTsiqGthOB8lAPIdW1d4zz07cf9WGlLHPsfvkbPGZZ/DJ
s+coOmFn51WBzB4n0KHlBo3dE9NtHKUGeh04cxr/AquRHJsI4esJLMogtzvQ
ubV5TyWLIoyE2OSfi6bOTh+d4W5IVAOSx/FgzcKnS5INLgrqMtVa3sxKkCII
ClNsqOG6WddkvHJdtxwQYwuK22EarIo/YmOc+ZQRGhsxh6Xpu2g7k6qIAg8z
pvMNx7V6G4r81E++O/eS/tspqd/uFclxb4++j1OuQSVIX+oUNWLmf/aEMP8f
jFsX+ZuQzLGpcyX9J4dqvisXRAtTrlasMeTZbxwhFd9gMEnBN2r+jejKIZHR
ppKC7ymEqNHVS4nbC6wlEvJyLKpD6tEDcp1jFXj3K2cXXZI0hKiHrVfx70JG
lYCUWep/KLde7TZPEDSvpFOUHk6oXncPZJL1+SdhxSWQsg8FSmCc3dWYmJFw
WkpckPucrYjjVQ77NKH6blUM8gJ7NVbjWAJcf1/0u9AOJMAPkNpFFzbDBBRq
xrRA6QiiyyGxKPpegfjZnvpE16mSUSlqwHWJ4Re4dC8/kbOirCjpp1XjZmju
j6BsOE8yUkciGTys2+H15JEcw7tC81aW7DHodwrV2IGuIsQtxD3laVAD0T/I
2eCdIGyQbBnN0s3g0pWtR2843OPmAOvFpJWh68GypKnPGRUHFjwcTfNLki+y
xF3R3aOSbUuBm9Q/4OgaNEJM8UtLTBB8zIZZPGC7P5pirQTUZluCJ/kVdXoL
rVWbajvkINAJLI5xoUVu14jOa/j3AyRRQ4v4GXUDO2baJ7YYObRgRoX1gJTt
ZujQik6m8CzmQKBERjVdJvVyOR19ZGyWf59aSXKbJ2cx/C5NGX/2yKcfPRFg
ZhqtJiBSsKdCc1KEgHQBBWEYNYHfEbJpUDLud7vh/ZZstnHahMAk5byJ4yYs
9IquxP3OzS1GF1gP/ROiZ5ug/w/NP44G9Ks969DJb/DliJhdMF3ZHtQ6+C28
NhHxnVimVecdXXLH4pqZPBnuAzk7yYm9LgZ6kNCKhJWQlylJDqHiOo+JjguX
3Mf9noYgktlGglEvAnIOH8cVWzH7dzLVmrTcazzMqwFH0sBn3Yul9Rg0Z0aO
TCvKuRe3eC2gETeO56s/MSzsKtl9pCs/uPs0c+35I5VWZ8Y7RTBETCVsDhaI
kRfrnRyNPz6NCEvgKf45/uJnWuH2l8/aNfQzDujlVb4K3srkTZLoIejicWTm
18gZ/0XSYCpYFZtSEeTSymAjaERFeJaZsN9S31PQSbiNVIzFeYiBcYaP8bgn
F5FHhw/6Nv8EVs82lYDk1s1O376/pGX8muZu8JdG8AQ/vjqbpiVYfDyAYpUn
8fMnxHoSElgkQUs5HJAdwEfmjwVZuS4PKZFHWxw6agG4he2h11A4Vzp21hPb
C3MAO/9YBEqlJuooNCB09VOVnuFc2+A7I59DmFAJFucG8/ixDqDGOqwbtDdI
RKpQUpjJYPulXDCrmhSCULxp3+7zEBDm6CGV/ZKk082mDjlc0WxhHBX/TAA6
hO9vicRLei6cXgwHde4jZ7hy/KoJANw+SkFkENsEUXx9eBmM9+vIKnmCbpGX
de/HgceNBWrl90W+mLDDCObraxxCzdzF9YaUsrpZsP+BOMFURjIOsKUYRDf2
H/dZd+LArGiBWvbgPl1mLPEl1RASNxF5Q2g3ghatdR3wzXA6RZoEHXRn5Q98
Wo/MN9wekjVDz9ONhM5SFF8lqffiDmmKFXrifS9wYffIKJjWU+FYqo4+jIlm
gY67+AddY6zJW55u6p7VTVRqcAo1ZL7tQ2EcmrE2MI77veNutQY3M3paQPAR
/uv91VDDYSGEa5v2+gcJWhtYjxz0nspdXsHb7vOlpS5aIu7W9MmsX/ZuHLtF
/P0XJI0zpykbeSEMv5obyp0iFx2IB1oJc3jBvbILP7XEeeM/PDppx6eJXXHo
DiJvywOD6o2JAfW/alxkgh0CixziUpu9sGUh3p7PRNB/ouCUptJ9/pJEn+KM
9SHKjYiKShpLML6943SRwk1XGhFDQ1Znj6nIDXe98PAZBfG9vkoBHpKlAKLY
6jbgtveVZzC6v9izB6loE92qlfD+tg5UOGJQJpMQeVcGrG1SHSPNaiSRRg/V
01RGR82aIZUaSANLX4J/nxbs2ejhgcxZSy8y6kPNZkrVtCcwPIzKmf/sTNKK
YFvyYQxJO1euBkJE/EERBqyDe+tUFhfiGc6HowKBBA+RHGcUvXUnytkAQsm5
JlerJr/zexxZBsWL7GsNfG18fBQZo7RksgVShkPDqpAvCaNWEy33Sk55Qu3i
dliXO8nXjX4UsbH2kum8KREbt7wnFJJqmefEnxm1KYKG+Hj4DJatHjHRYIcp
PVFoFsXCilS5HDHlCG0InkNkn/5Bd5tTf9QAlGhjsWkZLz4nX9RQCbMPa2Hj
jJ3BAUKNfLBhn3hHk4LRyRtlspHuKP8zoWbD7eaTvcm8I183bpB1kTfdDHMw
ahfxMybyej7f7w6SZUibLnZXct2p4/mVRIhDo4wGoMm4B5daTFmbBLfCyDOZ
j6dVrV3J5FBH8aPInX2mZ8Blfx5xpSnwhUMafreRsuofC5HJGkUcoz58fqlx
O6JjcPRjL04o+YEipzBntZUw+OAxdgxV4yi6oAlvfh7n5K5Chy80C+vdlYRg
cIAldgHaurr6s0wUEqAFmDYM/3ZROIQLL/fVXERZdOSYjkrhcA5ub3WBHccR
C27qaKD+o+sr8pUHxwM5aeXaRRO7jmrsxM7jiZ2/CE3LyC3r4DykwXOKAZp/
dYWV3ENy7rIBPbjZCwS9Cbm4bkkZUmmrMgRxDRe5QlmR/7VYOOiVnH+Jmwnj
ht+3Uo6Dae5NCLKpuwilksW2Qs6FfFGgI9O5XKIEW9K3qV9B7otigFYK1nhU
4UrwhLQO4u+R7JHTq23nG1MvSw/Csnm/VhvqQR0/thicsxpQYkYIQdgyO380
ef7IWBYUgo1cUFU4u+zxBjMYl48luXdI4eFDH41oKShMMMOV9jlFgTQKNit6
73/8CH/3+BmcLbABFik3TDg9Jh1JCnNRxlOWF0zSEdaWUlbCztSwC3R4m6P7
ZXNIr7gsEN1Ikuf3lnVVDVxrYliJl4dp4NxiUnIuOk31u34LfShKwJZoydGQ
G4tr39S34jCsoqgxxkkNCBgqXotuqijgGGP2oQcItCyzjtFx0amQRIylnUNG
NYjvolhohWRe2jpw3CgZZjBAvQYg5gjT1aIWgEaBQctt6w8QJcm0eDRl5tmK
+OgSr2UoW8nwvIUDZzL95ZF32OKZRLmQKL1MrZwZ8giZQ6yq7yfSuwFedPQl
KoDVeX6MVDoo0i3HzzYE2b8IlpvhsfE8SShM0sCPLP3pER/pE0ZD9KxqaS1Y
NziNBp8JFiQTvAZSuuQxrXSr+zV0nDMXOqlUYptIlWkHi5ONavfep0O8cRjV
HVDKHd1JNol5iPTR/nIz7q0W2p7urTIhlvsb5+PYGZAp4TUITul8hnXfhWqO
uuyKgaXLTIpcv2tbLf6a90MSgUeP8F8TzXSI8cgaLRSf4suL67NxKnCOPGIX
uQZlFuMBaXXkYaYi0BbcbvkQLvgEzxoymRchl0IwLjI4tjPzo6PETG7vRhyQ
ybBfO629adfTlipdczZJXAoriVI0AgUJm3W4J1L/XUOlvkUWqVgMFCy3kBWQ
tCO8aixf8W4nqZMLacTYhIeJ67JNwxK2EVEkO8abOMEgytr43AngxQD7ehHd
AqfLQFc1mKWGCQH2Rz8J7IyUTfRjtutIHEKvu7zy6lxgLa0GT79YJjYtTGvt
sKRYZYpMbbvvWQJRUbWYsclPhGS9MJjbh22VaJXJPOivvJPWpcRWvhEWj2uZ
LxzBx+oWrghTFUdewiWZNG0uhLAUfo3WWLhmTtpyw/qMzMmJc09TUNNs+nnZ
zPdbrtzd9ivMgQDXrYU6IAWJ5wLNRs8Q08KZihJ4DU8Qan7i5FMw1shLnRSR
0igL1/VgvwJVLBRNNm+9A3IBZ8hqjMZvqpN4RqKxcCQuNJC+XuPH7nDRD2wD
kRrQEBdSJ5apXMC6+yUxjoMDYwSAE4H71pY9Ft0sFGEd87nuyNA3Ar+w/RJ8
gz9pwfnxwPgtgUPkSl194Zi1p926V7vY4ltlFa2duN7mdUMp4/1irS7f5szF
5PlF7NDzxY0VDDdci7laBFL6PEpluyeC8qrzyOwxX7NsEcM4Jclcad5gw6/Y
nVl6acBQV3TgtLzi1QqdscEVSAsU/K1kePWp9geFqaocgQ2kg4XDBRo4rkm6
zrAgQEKF9FE/L1o3JwUonExjNopEiKhqxIaDaqt9hxk0PzZKcmFET5GmxyH1
qjmKUlxyRkk/T8DLJ9mJBVepc9hOptrGWJSXovAbqYIe8Fgyk//+hgDC/y64
YKzUZZAuCinA5YPuzPisMqr4VzW7ZbYibVa8pF/SLPKgWE5k0vBapKy5MQiL
TFZpkZ0+wn89Phvqp2NYED4XjeotJfghnRocpGi6Md0CR4xdNbJTfsJ94qzo
wV5Z5t/fvOVhhoiQazr4igodkeh/pfJAdnWegTbE2EilB6UZJb2eCD202Czt
UtIiev7ASPCmx5nZ55xpDsejd8ALkA5UqZm0MMy9J96TKiR2swte3at9fx8j
obZIvInuDjpLOnFSvEkLEyNqQKHzw8W4OUmLgRW4Au9jO09kq+w1ZnOlc95X
5eBhS+neSNRGVCl28MRJ1fqUOByjyK5ju2MvMudsSkJskO392s+Y0Q6Td4sm
dD1PWDkEdd1Ak4GY6zJiJ3BsWGLOzHuVfi0/x3gCYwJbDIwo8i4PDnBUofeo
EasX0fAFiihAX0fdhtwx7EGcOhZ8SXo3tmMthgIK2kwypaCliHE2Pz4mwUf0
yDXGacA8+jz3MWTFHWM8z5F9oNOOSXeSIVEKUcKmjWcAd5g9LXXVraC6tZSy
SZAziJPx9JbVWrRWjHYokfUzi4PlOzy+43yiJM903kw1OZVsK88o7mZtHBd+
xxMm0+UqZYQPaWlZuT9W5xmD9MUnIYMhHaysmA9Qwkf0T4391NXRKcXaFcMp
M+l8kTld0uca06FoE+H3EiZ/3vYcvAsAywBOpzz/1qQLmsaBHFq3uUw2KKUh
Cbc/bQOTxmlAQo+G2YfGkR3UXiEfIUiFrmp8di6S0vJiSEniCmoo5Jle9nvs
G2JtB08FORwcEyJVHPJ7lTe3z3JLvbehWvgQHZXVoqGiTLkGjAUdFuh0hfPO
3C9c4KTHeclGmAwpzKjKbtojqqLO0XoQ2KkYaMtyUwTXjjQz5MhFFKE0510O
Z46ZOsQv+vVanMxy2922E36uNq26GNSxGmzZsISnjKetJujz3YCOAKM6Uyru
AWpq20R0mEaeFN17cSLus9nhmPZA04wG3hINGkIB2AWrXPAoBC+Uyo2S7zk1
Z7Daw6a8pfHxza2JRAvErx26tSDPLBTvCUaiq9hMIQu/f+XkWSiCG49mxI4I
pVHTYk+kI6VqkwUEKHm1KTbFHeZkxfAtvrpvJIgUCLio2KFxn+MeYM8L3ksc
LYuMmpDPm2ec6q3VpY2+nc1CjgSSkXdfc71WJQs1+5tOwODzuYA5fH2EyN2H
z6M4OWaoO4axReyQoOoA1g8kgXVRtcGok11VlDYfKgNbzU/BWDjHvp+xkLGl
uVEMwiTxGk0F3Ea4nejuxKMcSBgwRuqKGOnA0mQuUc87Wb+jOUXjWP/QHob7
0dgsyW3tQE3JfAdOGOdPvhl2o+gg0HuOxZGgD7FRZ6mSaV2lxF/EEo1JC8SB
jh6g5Geqo9B2sHq7jot9qHEpcFj20zatoNwCHV2cNTJTJArvdlJV+AW9haGb
pHfiLJPugeWImSh0h6TZeHF5itQKj3wovAzTwHQz9nnDwt+QUuKRJsamVZww
PxCI4SKftklJKlmkIJDUswXmtrV3ldIW4SSE4ApZNvmKhGqEAxo8amG9WuRI
7nnMJD2a2LPZ0mvrDYr7aB5lj+C+sXA7nQgFX9NkWa0+/Ab18zmVh6WKeTlt
t5Jogo8oi67/6RW0y9u2N8OyUCSgy1lDhUrIbYxlTbqxl7Klu83D5IkiYXcs
QYJaB9U6BFwGOQMsR6FxW/jU0eGDJldQSU4Ug/cNbJxsVVRU8a8V4Rg8pQzL
J9o0AtnoZHMsRZdQCHYM/8nWVIwBxcybBxCiBFD+UhzvwNZxSN4hsZdL+aTY
ree8vBI16eMbEkfgIJpB05ZqLpgSQWI4FwelAp9ExfJaJDlyPdCtgyrMoRhG
6UrZNl+Vgmov9gDCOu4UUHjRsopjdWLxUHHtEKWdTzHtnUMF26EkxJ5c0q+N
uEBYShkjYIU1B5hSh11deg/AyIVrlcyqKxh92SlxDnqwglc72hgJJzW7tTS7
2XafANcMgiyzHAR8j07gGPRAC3hbe3jfae5DeF8MktAFJ4MEVXBUs+tmG1w8
zprvQdZ1NLrnZgc78mbqkEXjyCBVJ4qAnx6f5g7C/XCSTbj2fIpiBGsbrEHg
D9NAzo1VAIzOXMBNJDaUxovGwQFFHGizUkIJYjvQNO87ZzG0SXaWs/8Y5G1W
NXln+pOHlw8XCtCEnbpJcnlCCg9z0qk7VbdoQEzIKW6F30mBAgk7DEcH2BBW
wIQNgN8V7JOrhwwULJy3oGot8Hn2y9/WYLkyiyVRISWcRm8fjrRlQgp9xVJ9
3hykkMhiQSnYdrVhjWeyPrnplvBf3l/3YPm/9iFLynHFPn303XM4UB2zXbPa
MVanIVFwEVsnm5NciUa1C42VtEgXpxmH1TzftSzFJGYY0aoQB7PBQ+hJ0kiM
oYiMeu9flycsQnONhTjffviYnV7D/56NDQVlTK7R46pWEPDJkiME4sm8aXVj
NWDQZ3ifBzos75xG+nFrzPWzZWSy5i4yZZzWVSbqdnlKASdapOjb7x4Rc0q0
qMk9T9LG53XF+w3Dxi7IK5Pcw1Akyy4ugxV5iGxEnDRDir0CLxFC3EjJcBi+
G7NkeksAvqxC8FoYmIS7gR3LUZR1myO0xsjlfP9BG2zZTdzu8sTTg9rrqsm3
reDivnv89BtfyPScQtgXyufmH8EtNs7WKu5Few/N+zD59NhqSCXw2P2j8E1r
KpnpkmmowsQJ30+wksOpjN8oXFhsBgi/TZr5jDzrESu93P4U/nIh5Pwz7xLv
n9ZRkTBj9G7HsKEnNWZwgvVHSUY6xYEIwuQLv7yJg8WddW5sOnp5dKvTvnbC
heJ+rnGJW6hPwAOoDLPszoL0ng1QR/Y5OA5jCfSDGaglIYb3OGJDmBUDMRg1
57HPCK5eVVhoHYssPBDRQF1IUQSWZYq/PHgLOSLtlB6xiIqPkRwDYjkbOglj
vn6Ghgw3Mxd210KClOBBrB3xovlIGQiTKHdbU45dUrdmxAuDHH3A+TVsCYh/
PQQF+w/TaqWQ1qhCUeQAG5K50NHgCU+3oeaDswZgR2ygRmVi7o2PvJLLofVe
NO5x4ttpdYT8IslDG361VBllb1bvDepxjeIQFlPoBwZDfMHFdsS3pjqtf4pN
WIaGx+bG0NFh4GSkXvWOizsGeFFr8YBaMtzETR+Vg0cXDgn7nEvQuCLNamYw
9CqQUHIzxEERPb/a1KD2WjNWdUGVRTJ4O0mgSZNfmFepYeAa+/cH51hKuttL
T+jL9xJeOMmWm3xFPbaKn3Tj08eBiBPubzpbXLsmc5VKPR5Dw9082z+xJ0Uu
nqRB0yS4PqcEY2wF0vJFpfO8plsCQxxUk6iaXEk5FGrM/KE9OEU8SDSGmi25
dTB0g56AKq793ndxpBs4erEEybjrnlmIsFQDteV5Nq4E/Rg8bxYR07WJCPDz
fVdvLYeUCFzdjCFSLF7qiEHuweMZqiktWqf85kdOY3oIv+iwqdnmD9pQ6rzj
X0BaYUeTW5PmywtyMDNFV4I9Xo5taIBc+0oSi/OUzZV3JVvxYaEkN9CEE1mO
ccS9hw05YiNSZdDWJ8gRKg8NCUz/Gyj0lN7fbB2vHUJf07VgA6fPMLYhGJdp
p9nhFCGQA95+mwtVtJJf0P52dXnG9gfWocRbJKr4c6PKOjvDN5s+5M8q5gQv
v8CVwltdUUcenkcxcTfxb5OZCGRqCZ40BGFzVZE8hOmhH70VgGAK4XsrVmv6
eYDyWe9+DyeqbiY6I+4np7+/uTgbGgbpnpR1hfjHuHjSQsotDbgGL3+4uPbF
WI6VTuo3eiIuBLwcBhr+gF7zjdVnmv7/Ban+P1qQaqzVpckE+MKiVDimHgUC
H+XWehfOdPArFGx3kC9fw20JSJnL+qFixYKSfC3BlUJtxKks4vqk8nW+ZKxk
6UrVj323yLmEunjaXeJ22F+mlVm8THmtwb7TlI63V8+m/jzA31lIjOu8lM7D
+8i1oxj5gITnChRw2Qj1O33WFApIMHCQLANdXFR2Ed1B2vjPMfgN92xSV8Tq
CHNRPUcywv4naZI2sf0uOAkeW9kRT0qyVH9VcsNZIpmbIU25qfrYWVd80Ptx
23xZRJVLEkdqMFyCgS/dktV0OKLYhjXyx8ozi5gLVSxJtdWYBUSv9YUlzpA/
xXzFUtzvq+xKHOKUToOXKMxmhhVNQlGVB7y/xyqbqP93GCaUoFniOiohNY02
skZAuJSCr/WSckQSwjfOs9FQHN5VdDW/IlINacDlfxGDQT8FLKpJb/7TpLaT
1JVJWqBKM5KhI6GY9P39nLQveV81WKzG+TngF8MVjSxQ8gU1nKC3fk2EuyEs
TAQ7iKKTMyr4QJCZsh3sqwyLMkt1gftzEbMqGGV9kkoXeTx9mQ2p94EOHhci
ryTpdZnPGlB2B7KNQgk8Tl9S3Idam7ytqKxHXNOWC3lEzHFRanCOaDiFTMH0
XiICsgli6NgRwJcRdeavrF8kGbXDlcdKQllijXH2QyK4IlS1QVKb4JpcEwOO
c1vPSHu8J7NVIxPME9ufR7rNaH8hLuLAGbUTqqzC115cuYlNuhCki/GlkheI
exG3ADyBnehX5TVQYaK46HInIVgaGDsnyYVh+bkp0bicP03v0S6DcEnrO7QP
ryfe56SiCXcBE/rcZ1K2yqX5Dy8fvxKNp1e8EAO9VfQf3iW5UOuneZKJpa2H
g9s0F9gw5oiNQ5kpyeZd1fgHXAC3grNDSt8uV6r6KPgqVKR2ZbX7IhOeHNxl
Wl6JcLE1w72xd+R5njHlbpTkElQ0vuXpArd6OYzlNxtAEzoRJcng86MDmY7M
knQaBpGDcb3OLvR/i9vnUOQYeVvVcOP87/B/owudUYdzxXig+IY1JIGKhfuh
Mu9QDGBEICR1y26RgKMZm0IiXpGUp5YhnG3N/y270YrvyWJLtlfJiRSYYqxO
ZJ+i0vPswocjTacu+xTjWrwAJ802nxsPa/dbmLKRK45KgCWHHAD9FVT1osED
PHeZcFGr7y5uRjkTXcfTOuUJl2SchVNtqLpPsrVkOnd7CVFggM/VeYo87h5N
LJrTB3s8UqL0Anon83FZbzag7xWj0YWjXKHxBLD5p0NgzDh2ZkJ3w7REW3U6
AhN9De+K1iOd0joAgvmg5o1LWqCdsXPN+HRzvISpXN1rOTZBOR4nIyF2+qWm
cjleg/m6RhwHB5DvSZAQnrtPbBKkjwBupeRX+gNCxlIEJkxQPTg9rlCamb6a
7buMMDSGh0ZLmAFAyC+EGRxdQm5jQREaO3oAuRyndCFZ8bQ4vKhCmHKH51/H
qGqRBd97uGt+HQP8cJ9wLXVOKQj4AAppEo8oH3vc5mskWtCOHGKemH3HFPJa
uCL01IjgY9UaLDEmsgb9o2mZhkcS9we4qpueAa12gRmJnyslOcA1SQKYvJeR
TUN3YnyK37tTrByjSbyQZ2NTtwGZqDdoZM3ZHUqj8h4RD+SKaMM5CiNFkYZJ
wSMiK1WuL6PXD75dGQBduOxIN6ZDmYpWLaqSiwxnWusF6h2akJ3lc8pANAwa
bZycoGt0lo+KUlXdXW4Pb+ah0JtUt+ujRp385ztNOzQMMi270Hy6MElgJ6mz
IS/JlBsnWVR+KZ+I9LVTsYGJGejij8gcPlx4sd+w5NM6b6UhF6zqktF5DM9i
CoOqjkzN8Zk8NvdB/kSYigfmZqidcCCOn4eIIEAkLOgr7ZDCwmuQbPbB5ENS
eebEsSqhZZdJBao65cDpJenOWimyxq69qTDkHqOb8GnJESsuIxiHAM0CurOB
lzFVW1K2ZWBBPds131VyHyt33ZCaWIWrcmipcCGGdr+FMztigE5LholyKIFi
s5wxOYUqEmDspVy6tW2LqMBiyFtkkDffPpZ0HdzxMyKC3GsFl9fknVyWFPK3
i4xfsVaWjoC9PuvtaMf3lsyV+Gc3genM82eVSuwo6fhexlIapRUPCEXzrMbh
dkvYXQG6WjUmURQ6LHI6BAMxaPCcTAHYv5QZBrN+IiU1Tox2JhBy+B7/ZK6N
QMJtaZKlFbSzSKB0Cd8ksooqMsO3cvOT/B9iHqRUj0axpo4hPPG6uPQ+Y7qh
In/sH2iUtElzOmm9ksMlZcWUbhP1gov5vJtcFZv8MMFqZTQRLxHSTX+C0r3d
jSKifuZpDVrgl5bnY5+I1O7uhtinAksVl8AVVRQv3DO9wdXvm3b7lJGVsUX6
jBjzWETVgfggKm1DNLxxyFnfkUyDe8d3/h3nxMonHA8s2omoN+9c6SCrWc5w
eaKwaDRJLH2Rj7/vdxz1qKusXxFdSZ1yg5yhBVJxzV58LfrPBcOZvITvOKFi
Nm+AeAgtzTGZZnbmS3S3t3MwStz6ZLyHHZizwm9PcfD4Gh2R4kfzMPRaxaM6
Dl1/eoRrulooaw5V4zjWMesDGyya5eix6p134QfXYahd64NH5OcWd45KD1Sn
af1R8hMMCmU+bxVUOmlyBlLndeqcW5tLFTPewdbQa1Oe9j2ZOKWGdlzuPN0S
VcW81GDqWZVqiTkmRYSdrwyVXdF+esJZjHtKitRCzIQ1NDrNgJ91Wf2qUtBt
9LMWvC4souXCYBis/LTb5FXuu23bmpismX9PQf9oAlsECVcCHxjyysU40tjm
8LT3pOGZoWYeOh9ap9y/nYWy8cRuQD6YfmHzhRs8hq8qSLCunHQxsqH0cJBL
uOWCOpjDnnuUtGxeR0v6UD/GEV8xwR1IZ0AmRw4vE6F10xAzZOfPjTg88ExR
vIsuSuijB68mdFTJxrFQr+VfOXpNIYnlSJ1bnDqyTkPokZg8Yu3HV5UkTwmx
7N9XsUxScXBsuvUU56uc+Ni6psZU4JYwb8fmlmYCdyEX20vvAoec7gtcCkBx
gRYMhG5n5WrP4WfyWMTi1VKxkvR7y4oOxLCyU2s/01ZT6V4L2/W2CPI87EAK
t3h3u8xzTJYrWy2TpOTDXaDViX6MunpCMpKoEov6qB4QgADm7HG3gcOU+eIt
xOyusKC6HcyKe7CQ2i/Tv3FH8Y5ABgDVUtNdEVxqvH3SGXVoPFYgqJX0Ns/k
LPHarfM2xPYW4bIz1cWC3VKwxVmI7BvqzzRibeJ6D3HgPM5TczcXD4hyL7j/
PU3kYfbQsJflDqNKGux1DsyP8a6jkJ9sPbzgAu5tjYYGy0g8c97yijfEsD7H
WmHF9gDoDoJ8HtYUEwUxy3hnpfuH4nkWhjrWPItZT3rBzRNGRw2NhKtxmt0c
QOZsHQ603c+QFaIb2kUsdwc2KKYP0a3yuTH+g6yaXFia9JQ0yUw6cZJD/1Cx
sKR7h7yLMT5EcM0Ky6OjQ4AWcQOE2ZiO3hT5nX6WvkfqQzKZGc/0CnYBFvMS
lFP6xHC5VGG/H3O01gW+XQnUHaWukopkOvBQn2opdZ5uSAqJBg0n+z0siwed
XBdUovqDhQ6rPUgDVG67BoPA2xrmiWbp+nev/wAH7a5s6ors97GWBqGTeKjF
oRHTFht+KRQXWAuZHqhVcyqA5qo3mAQKYPbcocupT6CCdutD35HFhlDO71Kg
cU5gNLizm7IQBJofl0QbsM5jS6zgFK80/5QRsracKzdHXXApTCu8VjFEPHcx
4bYOUtS9VB3qvmTTbABuLhGOdr8yUzsiLgvyyav85rkdKKGEH/9h+uzRd3bP
uOEEkDJPxoLQQT+KwY6vCXnECEd1j74q0fLZNSUxe75GdzkiVoWdFf6FfiN6
8d05I2ow6v+74pB9xIh/8gMldb3YkHOFZPc7uB+Sn/kOXNegmR5G6kTTpaEd
62Y+oMvZhMU04uub3zkVOJyTHTYpdQj6kJc8iVbNCksvYcOJa7Q6BERZ2es4
+/S/uqC/cr305cERSJIBle2LoNi32QWIADTy0ULwX4ziLNo0b5apw5oaQ0Zb
gafVM5x5eIOEDr0BIWcgiXXTWAdbge70W+nZbj68LXl9LmWgvGXCokm9nGyo
ygkopLcaiKeDHqf9auLzom8OtYOgfg08CP49xMpi4GMcMfWZtsFF5fyYyqCM
dbo1FwxTqkXpyllrVTI7dgoQ8jUUj7aswULJmOEpR2nysaLZIdNImElcmbU+
SHRwGkUpE35WsROwtbagXGPttBBNuu75H7EJ2aL3narvNEQKpBxsZgj7RLrK
nCtp+MC1oTjCLeII5iTb8bVbip0wYMVYEDVpHfHZYb9yaXHyq8W5BI7zQqPV
3sJ6jRrGHS44AUS0+pWzu2v0b1N8IawesW5GtQbkhsMqjJ7fCm+HiFYiwvel
TZDKbe4lNhS7BqvUaeTg5YUdtfjZxCV3H2Uk9Xe5U615q3IOGeHVhqtC4Dc0
fqqiEJ/s4CroUUBhMLgNYR9hinLBub5HwbvhnF8CTZmcCz+jiu/4YKky99jR
dJlZRK6Q+5xJkYIKp1gT0BXnt3a/e9k1FNj2aVhUjaylJNuQSSkAqf/Yl/Nb
nBfJ9OPiYEPFYTz/K3VFSsS3fRs+Jr0R07NXpUrOxpxrHKBVgAE9UFqUZTDH
Wc3nB4fjdtkaFJYsSbiLt4SJsCLvk04eqejjrILbHyah741GYAPutBvZQG+J
jxPFiLkOHBo3MapJ6FAtyi0ozkRkFpAKuiW1TGVSMJaCMgkEZYBr3j+D513J
GtO3bK3fUfa8nYuHl4IEqRZVYK9Fq1E1rK9HFchIeRbyZlLLsZxDLxRMREd1
zcV5NOFfSpwEjwjOLJPKMZkLHBfYkHc5JnDKryWQlc6JhHG05WdCrhqaFt7+
ynIGHHkNCyVTzCTMJVWJuGyUVFbbbAYwU22sHAodxSI4EfBRv5veF+amJR8Q
JQrwdz839h2lDRynTYLOgDhaHAL9RT7IzkSp3Fp1J9576fQEfFJRiZGbxE5z
SQ1XPGRRMYGSMmD43RXRX/bFkMQJJV186KBdRNtcfL57K9qkayy7yFH4wtVF
4fW4NxYUMOiJZ74LOrK0S1pvj+g2fObYjuBDn+8d/TpNBA+PBELoZfmJj++/
w/z8+5nPbKHzpSMto/gFTuvra1fyAmQvxWZeX989xUME/32OyQUvcdDahug2
FNvdVyWoSbYtcDEtYqQXRJTuP2hIwER5Wfli9CK7IGR3MDU8ZCvkoiPOnZa7
J5im0uQVXIHcXnLgA0kT2t+B9Z7JCLn9QfSPhM6St5G0s5YEw1HAMTzwPViJ
dwg12hdMJsi3M1VQsIqKQ29W5SeqYzq2Od+Uy0IqbxIcmi7hY2PFd/Kx+coO
zI9SRBKfvuSypVhLOjnosdp9BY/kG1Sz8fQhAuL0qr45w9s0J1oYpxMFowVd
XvQDjtfDEFcc75G895joJmGRU8FstaNhsurb0pVrBnm15v2YeMgRwvf8PObm
IcgSnWh62ePpk5B3HPP4PEt/eT4dxXLB+bRn0h/MT6Ma97nky/9QwMbvOapN
edJsBXKq7Rrkb8sueXwU08FA4wDlclSPOVe2cJuRuJuBFsJqkCFdwX6njcvF
xYU4KWBP6iLzsZFDTbSqUK9UanhRe/amqe2fNjuldlR2cEEeEBJnoQpgsSG/
sDl9Y/3CiB7p9iScAZapmAaicfuhtqQImI6InxhvLomSHuMz7r8tri/D9In+
+3C14phB9SOHg5EspM0YXYQQAeFRt/PkTngyFVMPduW6Q7zjJTZolcXZ025w
Ok3iwdAO2CchshGNUeklnZPzmbKuO/yVQ/3LAiiUymTeK+IItJnFZYlS4nhc
zNwcP6sylI+IGA4lnws7ElJVICoflLJ6mBOzv19kUqQrDmgVqhvpQ3aNRyIW
hHouLpgYwynADiZXwarMwWR0HC5Ol84zEI4i+sYMf9NV8AeDqrYjaVwK7tA+
5zZxxBsfvfcsvf4iA6D159slT0Gf8JKSMPOe32EJWdo5rZQkL48vPU8Midpf
ALkTjIZpj5Aek1mhkrqZCYVRp3GUVHqNDfgTVkOetQ2D8X7aENJv5GtGWk+E
VOSSLLGvuF6Bizrfi5ouhFdqEF+FlGjWM4X3ZEjP/AztCOF7uPb6cYy6wx8F
r2NUtsWikaI/tjXHgwTDI1BEYR0MDkIOhn6iPPEIv+eNNs6o4UfaRMws/Tmf
8ZIGnGF8H7E/jnhNbvSRhNEEM5GPJZePjBg3TkFGD0qgPbYdElWCS2sbEIum
9iGp4CIisy0csaiV+D2o6iJ58RG3CIXRhTLPUi4lp3Ub0e0mr2zykgnKvKtQ
Q1CWGaBeTHMlBjJOOfFGQqEwX3GBevYGrS0vt6qMw9VF9Hw1bP1o6PmhN5IX
bL4ui7tg9UTcAWQjSn9M26AiTtah2WFofZPR91BFyiJDGTEC2HbIxsAHYaDv
XknSZXEvPBKRRpCW9qF6HIIyi2JercQCA30MT3nZdmr9Sq3O8hP+5ibUx3mt
xXI+aLmII7zmetzFFyEJQpy8FZqz2jsRXVQqHYINyfRWbHU9IIDiVkRGcACn
1XgFvY5SwO6rFRaxN41fatujuHPDojBINIlMhhewJJRCawMXcl9H6EtIPtTj
qEQK8e0yiGeLd1cjSWnrqAoOvoS0Zgu1aKkc2TEaaGqt6Ms0M4KuZNUlmMJK
scgM7AQj5R2pcW5uHNtcUphmnHHlZJRIFMcQRxCfnanumN66UrO9zzYbrbMi
8JWgg5XtbUzTdM2wR7iheMeGUiSRm3v8GdIQV1LTgWht+xHUUeB7CJ40VMd9
3YuJCDGzRq6FEpK7yd3Aeqel8HUTZhO3CTvTYIa4hiqKGWN67MGVGKR9Au+c
dPUE/nPixVodSWBm6yqj9MKFgqYGu0PO74pit6jZM8iASgJrOj4xk5CKYmQh
xgdDZAeMMgETlbjXhlzReBZltKShHtgNIH2Yjn6sLAlBvFel1rojzBh0ocH9
IYtISRdBsRTqCOzuRRzvsBJ1p1jmmzH3F9fyDhHqe1gLZEmmCFLgtavUj0Hj
n6siYSnfwsflRmkqRvB8SAqC7T72kljqCGjULcdd7BBLfnCwpjA1FNcaQ7U7
OO9ggRzaMws+VEKKIDOl8Mx4sm2ek1gPXacJpJiDIZLAkxAqxFW8CApm2Q4i
tAioBns38Nb2SGatqwklAhIzOKc5nr3J7DBRCghmR0h2sCX8BhY6jR0FRt6U
MxU1a5EgVkDQsQLXLu2ujPn+gipr8eGwDd1lFJUOQpmp6M+kptHYWw2lRI0x
v31TgD1bfKIMuazI74p20WCaE5fzYp6TIgoiJWyQ2AtE0wk0QiLg7FPCTd3W
m33Il6HFk3I4sSoj8WuYkXkglO4tqY1Xq73gFIuoD+JVU9msr/fresObxeDG
qaxWarw9HDlDxg7uLJfxF9r1bJx4Ua1Abv1ZcO02B62Fi2aEF+VLXEYeyi1z
gZNoC0bUFWVU2yzaRj3aas/bF1X2hjOKwtCgTXjWyJq1cp6sooAAbZbYzbJN
vg+FzfVIi9aA0070lNRbEOGleD1wm4+NPA/dPDUNNe8TYn/z7FvkxJK4yL5l
0ke4od/U9Q5JUSYX3L26csABtOXwHLYa3WDnbMnWJk9C+LWp2mnJOtEdyYdT
KrrSKIfN61yGfNSosOJYZcXdfoNGvVxvqvJZyWFz6m5LzP1mshd1d6nKSIab
wToc/GhoHPmOXibp6TwTNJTeOCw1ypjtxNZgl6dmhbEqnSa4seTv2mKz5CtV
GTM4V89dT24G4tqTJeuQoF762sS8QoGIIbx+MNFOHCwHiyeekkpF8ED9iBjD
z3ypMEdOIneartAdIimFmNrj6MSBT3U0+Z+5INkKimSL+45xaZqhYZzKriWy
8WhXfk0FpFUSRdLGP2Ch0RAO5MDkEx+YJLf89CnGLSO9gqP6bREj0V3zAcCb
HI6MnCGooVrKrJ/4OnKIEDv7tlytO3YGtLDErcwjzwkxzxtXIM8/PiXkzFk7
L6q8KWtPtaKKSgC2+gReD5uj15VmbUUv9GnFVL93kK+BinMTTJZMaewDhu/Y
wWqENMRI5Y85UjZUBSJrcWuAebNEN3oq3iSuHo57U6gG4hxYY5MlPJPk1cSa
0XE5G3LQ48EbsxnDascGhCJscdL2RMpQaIOCJSGqI+FwQg1y6uN3T559gzyy
i/1sJtyIG5jKiTldZYK22PSsqamsnvpiJDUCNhhZJ8EznqRbUJ4w7cFD4i3y
e3EIoEQRkcGSmSEdQRIkJOnjiJgaCzPPn8QM2jp1JZReq2oXvhf7QHIxm1t0
l5RotpJgU1ACnJMJ6+xEP9Wv5TJlFnO7Z9MXtD13yIvRaJIxcVpZDdTNBom2
gIHtnVsM34v+nXad3xaUYWD1TUnQ0i1ruYXmuiqt3CmL2pYkv7gABMtDp0NY
undNeedw0v3RTqHnVvgTJrbtoKPSX1EXKP7sxJkbgSr/GPJD5wsmXY1tFPEY
eGta73uZ5sN9C7PKprAIBi1gG0PB2RGafhPpXppyjufWph3TD4hPyIRap/Aq
vGsyLgKY7oOxU/DZH9XvVF31CppLUEWjRa58N+1+PQ6aY865mYLwcdxhrFK6
MnGbYgX6AJiGSpjbgyo5nZRNXzraNdotLU8ASqUwTvXmaAgHfSyHyQ3Btcy4
dRcYj8YfEq6PYCqOwAMP+gqJxWOaQBNCJW3wtcHCsGpNUDoy9ZoiKi8ynOjA
rqGPyl377uObN94xMi93dIftS0XDLYrZfrViQABOxFCJJ5qo5FlaoqT5sWxF
5E4KtrYC+zaI6cDkW3pU0cUVElHh8NHhFluELLOdoRCR6bJpKDao5MS0HR2Y
05MmX8CvTpJ0w3F2wsQgXyPtavQtukfPwoI/NG/C7MT5j1qIyKx8vEo3dbsP
1ZzY8EoyaDkzTw+RsWn3/URjq+MAV9bBmb2sJahWRsK+k5iteoI7SvoRpkNZ
SzVavjt/8sxrZY/xah1w23PNt4QS+fPbKgqieGa6xPVKRmaQ5/iWUAtHdwBb
GOOBxKQICc8eGoKSo0+7sWyl2wJdIsi4hqEulDWhTGjJ90moNi6MV2XRLSew
Sybw8KZeob9CKHqz6xin3wfKyCEejb53AUENZHl/vNUNlwAFSos1qFSod2+R
JIAyxYjcPUTBG659KSVuEPla6A6E4bSseAWPR2SIedWOc6a7hrSb4tM6R2XU
alYI9gNzClL3DDud+GpIMiqpSXTl876MfHRSTkqzHTQ9m/nWkvIbmSsGz/Y4
74Xx4BxYEF7zWXLDq0TaxnA2jZUr8YVENCiGtvw1N8+SQYJhoU2iyGzUz/cp
MyrAgdGz0ZnUw7k4tiaClYYncE84H0bah9ZS3olUk5LBWTSxOaotyLxRfSmu
xRis37y/j2HnBE82I+dF1c4T89dDlMzuwM1MIRWyweJSp4ZKGGs2aBO7KwnF
IC62jNkZuK2pnKooLqyuKj4MXjvwqUzG97ALAVPPS/8y5C3QBcTJMnk2q1ds
NoFVxXDdoOrygrHtUxHxIciGO+9wuopfo/yq3k5SwFBMmJzbKdTT6UIbzjAd
60bhDTq0jK4stF+3NsGW9ZfOqDdsON5o6ZSukEbwn1hKoxvq6g4O65G3CNgO
Jo3taRJX80LwSk7FpWYdEubijyDtC6SxcWC22YGgNno3+HXgusCC2yOgkOKu
NpzoIjWrr6gbbU1+GX0D/T68RgV2JQpRDPaRsG+/aPAoWSCH1kv8mAbwG97O
LGhlfSXBtLO0IvIX+tWud2qykzs1zgT1cmBoT84OSXfE0keoQl9suT5+Zj8K
TCurq88PF+se2ZbNCQogeTPs7ja+536qxMAk6ZsJR/HlE0V5c72+aejR6mMU
rvafvGyJUEONNErsN2C747YETIdNShUpvosVss5UwmU79C1LNkcpp03fgTaT
ZAWhQHNddp1gtw9VzPQMlEsq1Es8RHAll2gLofyg+2hGvEbq13RucPLYdPs0
XYxUOcmCj7xKrua8MTEScs6IdmpxheVm8RLxfIZLDi0UyqZKmJGgU3K5BwoR
0FaX2XYpIKAEdiRmQyHu69h529PTGIrWesigjEVcPsScCAKcY3+d0WOLRY1x
cUbViUMITbZGyPAG7lMJ3pmdSCSBVD6G+sw2ZUQUkoRoFKWcjqzfN5t+Ms7p
yEaAyGEVrFymYle6jgpUkfSfu6u5zdIP3EmU/yWJI+VWIk+oPuLUxO2zFiO9
YglY17cgsAs0KkpSO4/JIXJVhBp+neSXbaUYaKi9l84W4RxCmcqge/iYFiZA
w9xchql4I0B/kt2Yof6+ZiElVbe4k6mgd7mcVNJA0wVijWZN7lWmFaNFJpXw
rt7sty5nNBhbzi7FrmGE3RYZYZ/YM2LPX+2FOZKTTsQuNWx5Ysiwq+5ew3tw
9hoFTyv0L7xUs7mYgQuLFz99GlHsPbNaYmy0NWC0zZfNapJjijCrGZ6n2OmD
0ySnXJY8rsVsRPJE0ThYe8JzR5lVeUgK7/Fstb0JZdvDxMmRtnqUs2TY11ry
yL9pfKwUnAwvOgjWxDav9vy03C2Y701msxDgaJ1tj8qMK8knatUA/0NQDFDp
oQxAqjUYfiWpKdmPCL3dYD9hg3HxtpYKvW7t0yR0zOBCAQkr/7feSmqO5nHd
NqkwPAhFFVetSfP+nW4pBIyIZGw8s+EY8CO6tBWTzMdnr/kOARURzmBgCKYq
NZgohSReCSZLNVZ/L0vFosLg0w2VjoosF4HxxcZfBDCL+GDR2k/RYJJzkSRS
30Ev6uZ4vTPSQ/KoozhV9zVfFYWBIs0cIfBT5PWLgqM9dyB5AWVJmQftS2aE
4AXuN3hZod0HzVDJY3xCvExJEFYtdMYu+ZUQH6A6kmcHVzlpgIXKIab6wWU7
/iQesBTBQlTNNBLKzpSQ/eA6RPI/wH8YambhvJ4LIrBDsornf8/49bbZC7O9
qhPuyvX8RV5OsJ28YCA+kxtz6RY3AeRZVUothYtoRRnyuikId9VwUNGT70l5
Eu6TZtn4NPSQzeLx5liELd+soFPdeutgx45PU7Gb4wGCDQr7KbZT8sfZ8IDj
BP39gr4Kk5aECJ3BMiUPnBoLW26pNtYJV3CpMxolNoBKItKiU+bAPHEV0Ngf
iw7bErYYHfzYUys4EdLVxNvCiin3qHhgZLTFWYRSPJfjm/uIIyA5zaAfhAcC
AYcwV7QFqPnk6CUkWHtQSNB+x5DloW6MB7xyZhsY4stvlahHDS5GMyB4Yojj
FprclnQvfNQ0rOEf9Ees8xN+5KFbA2UUza2bgJIoXP7t4/PIwY9cwSzO4xfT
VZRg8DRNLCIDDr8TiBYso1+kizZNFUGYvRq1DLfoGtBQmVKC97cyvof9EINv
xN5WR8zR5SmTvBFCxxIuDRFhIYPObcOuriM25iKUQqP8dsz/QyBMhQVMpOBo
6cio1SUCJgEBQPKNjIKxHNaVuKMkiFuYx/lanFl+DoXBh7bxg+Ii4ZLPxeIO
BndAp0RaC8O2+xir2ArE2WINPgVttqasYrKf61kPM0XlZrwjEA034V+gfcqx
ek9IxZelpB3lLicgblzongoK3+p09O+wwTtqu91XPiOK3ZK5S3dIoyeJD3yY
cHwckluDhI5ku0YIIxDx8MwxrSpIkITRM5TAQOufEHhRZ9W4HhwsTiZcFvuK
EqtdsTmPKMQBcjW8G7Yce8kzBIeh2jzSKdCiSmJUenfxQXcdhdQD21k0Wstg
l28kUHhh94BA3szF5PQtAc6UTveRnYwz0g5MyT+wk5pDtjvQaZqE9rOXSqOu
vTagMi0vnR6I1dHXXXxxJ9kxmiswmBoYr66fyF5AJ6rLfrOftcySORq9RYHe
obQQAK95mhByZfFk5mmhh4wqwFXzIN+E/SLBzK2pWBlTEg8WIA4JJbqLtaiN
Z6JILVLi2KHEQ/omkyGxnMAcxFs6lD4dhc5YCisZOzmBHXGZRXT/umpArEqp
NVdUuK9M9JsugE94c21Fkc0GoWOS2YIXhau0pVMulwfl2GZIN6y4YkG9zkpU
pkjF3aQ2ladJddI5AHvawOT+STZ0KFxLBIBU/hYGtNJqXjZBAW0Q8pYErfnw
7MG53Fh9CdsfNtIgYayYKfnXbORjK12G4Pe8CjUrLq5fk6eaX0z4G4YUS0Ib
e7xmRQV6TWfOmJ6ojCl3ETXJQPU4Dfbz84/QN/aeCXmtwNd1z4Z7hm1ENxdc
51YqRBhEWQ63fO7Ub62p4FhCy475ZQ+RX3ODSr0Sn2jxwSgBINpidfyAzFwb
Ai/T0UCQCC2ykBAtAHGiqqJMHjLYOPmLJidVMgIuq79H+OCBudp06iUJ7UfZ
KVJxLlZz2lDnrvXiEr7i6wP5X4pNsTLMbVSCqBSYo6hxCkTKWymwh3R7DVb1
86l8cE5QskDT34NdU7O7BPcKvzqcL1JPRG9jd6Fsd2ssh6U6tMRNy45tlnLN
WAgySO9Qzq1Qq1ZTsOUhsG1Kzk7PrgqkioP/SJEXSrJe0Ic/W+WXX+RCkA3C
X4fCMEmd5xSOIguzJFq+pAi0eFkx3eH8+SMuBUUILK0wA9MkVeDYPamFEvRe
8wT8WtHe8lFR3DbllpXoNLEXbX2ir6qbA2b7uQr3oXCqmw2rn/xz+P4XwbGQ
glY0K2G8fGAy8JdUnUO2zvZzXUDie4EXJ/VqCLxp7otSMPiwae5JRUcHmEGK
4NsXmaC5hbSLi10IW3p4nXGNpWi98CA+kVzV0E6s2AvnleLHTfGJGEfIuNMu
UOETTGx0xHSSfI7pDOhPXNTkJKDbHc+xpQs60CTHhVo76FTTZNHk9zNNPamC
mzRNmIpiG9xrIvNElbXKOwe/G2Ahlo8IU0CJ7A+Qs7IpIWm4qiJMR0l5YTti
FNnYkhmxzpNyyVrY2PZOshBTzzggOoVQrKKVR8yblYKNKnTMkMUP+ugCRZAL
bOO78DAHNr3wUuHB9Ny0HauBqIN0CuNbqMVcCtDqMwcRR6Ymoj+M9M3P+s0v
cRVzY6Ub3qid5UjI89lJlBGCBzplWT4JtquqZcHK5cw/kTaamczLZxzgiVSw
2EDRE4m0edeoovIaEbnsnDPKJR2W+R69OckOySgQFyO2c1ezYFNTf3iXjnlU
OLxooUlNjHx1Y1d+b5KmLhbZqoZDcs+FR6xEkaUJlXdSXOxoqiKdFn9ZM+Nf
xfxGOJFIFQo3lwCpUBWlpAxHcO06jC9ELRDPH5PaBAtNJbl7PZ83V8RGtcDk
rFGqAnOIhbNCoID4hOmSOJu1J1KVRVEVNnYAR+tGIUbCMaRhESuOwbWxSUlz
CdRqM+9wrdi2pNCgosj3LVm/p8IvYDk7y0KtctlFWiRmWyDgpj17SDCNST+p
V2bsDk50EhQfkl7RHAweSE02Yc9vG2AWg7PV83lwGMcJM3bNh4z4QaG1ZSsS
ezyWSsIufhCYrMJoDDvqL9v7Wuxu0VfKKsotQPrfNzde2oli83MJgm+D0g7F
jZH1xkcxFjQW5GHANYeDFW9NDuGYjtUxsly4sp0xrPucfb7+8TiQRferY/JL
KMjdgxPlbhFws3mSuiThwnIs2FZFA4ENH3wl2RNk+YT0r+gAujjQUEJzG4BT
PAXdHq7yjZEqSj4Q23s9h6CtcUCTyaaSon/oNK4IiPX24tIcQrB9mCCBgppn
jj89jyZM99nRGZNwLTGLuZgAeheVBgFtrs7RSkSBQc7t2xTVKjAJ4CSgM71Z
kKtyXjbz/baP2P1SZD/bhzYG46mzHzyavP/wIUBOfDGzrLb68uwemx8k1LPD
QjCBYWSwO/D1GmayY1/THjXp68BJQmKg7bQtS5PBDAKMguWYu6iVdfhHKUrA
QgQY1xYwijr7JZbGzEmhMA+rC+7aKpZLrzChYiScykLKwdNDjcddJjr4+6Jc
rVtvn+sycq66VfmkyIC4/bLXF+8uUoYtlEqZ5htgfQoWs6bSGcnHNf71jjGY
74sVXrmH0ejjrhYiSjgxY36Deq9Cyab3hdQzMM35okUxRwLznVIoca6Nzu5/
tk94OP913XW79sXXX9/f309LuKGmdbP6Ord3tl+33PqEMpkn2OqE8aUPfTX9
tO62m387/Xu2fvaCU10+XF4TJ7CfhhcyRfCxG/mL7Mmjb8+xNkZvgl5k3XwH
31xRWippOS+UbEq2tLQPP3JLQqxWL6hSEdKLU5v4Err7VYfR8pFoptGj7P6h
LYAS7IQv4BNh2cCz0tfMfU7VrkH6ainUkDulOjLq4W7KUG+ejjK4qf7Xm5dv
XoEKzZuttW+z09Dy2RRGZ1vwhXvqNEp5O+OZB030bzHz+8V/ceaJvfrvPvNX
v3Lq0WkzPTLx+J1N/NWvm3nBMLpaLZM3lHFph/1dsaqRqRT7f3rx5vrdWfju
9RXiunD8QknCxSQokG9S6OS/9oIThCj+ChGDOV+WotsddsWElYqjX7AA+Crf
7CorvDmBi/ULBM7f7F1nbs6YuYdYuikuEyp/NibPyfEmOIFvniOKEp7/8MPr
m+zqx8uPb1+++zDFsxSOheyOx9NHWGMppju4IdcLbpRHn755Av/z/DH+z1P8
n+/ws2f4P+fwP09Af/h0jt8+KfBfj0AYZJyuiVmZ0PrJ2dGt9yHZepPJhAJ+
eEVeeoeiWOiRLGH3Hjsv473OOnogLSewb0RoToZ98Bf3nJdWkDemp/TugnMc
gHbn8hp0SO9I6HWUaWXIz5oeTBRba89p+YALk01ITDDZbKxUL20CpY9pLf76
W9kO0iXbKovw+bkgabGmkuq20ZDHMvXnGkAMeDr4n4V4+lIlNKpWQ3GQtkin
MjBEoPOWXDFksbgdkVah1NqkfgmIqovwv3fuNJC0kz2zzRvMNYK+3D2ePkbV
n0qySG02dn0Nqq84z9ZiG4wxmTOH5yKBKTz8rULNzBPmmcrtIf343PVUUfEC
OEkU93E8OabsY3n50Ab5Ag3tqt4NdR55I/5k2NA/0brk2JyvPoF1ySmo5Tuh
Jwe7Bl++Mp6IlrzBEyquNiEHwikVvPgEf+9uy09oxLoiH7D0R/uDpU25O2eR
54Eb3LW3VJS9pfWyIhwkJ8XhkHg5jvoF+BzG6dXGWvIHHMir1+/+5eX76/ev
333A1x+ZJQf4cAkyPOvMLddJQlpcsQ/DPIydHHacxioAHzEJAMaHS4dyJMAR
53arV8rJh0WJsavNIdBfkMUzl25yMQkOh7hToW9NkdernDOxQRHYsVfNu3zv
fP1IS9WTkCoLsXDabXnZwqXlQw6HfTtRyi1Eu3Tz9aJeefSnj3PpGQnHV6K1
PQkQObMHX2ee6eMyOx0DvV3K+EqCIw4IaRTSOsutCJT44OM+X1FJMwocrPbl
ghXFikvz1Ey2m1YHbUUAUeWWuKQXU8qFvCkfwJBDsd+IR5RZqowJvEhIQoJY
d1FxvopDT5WxMxR6+O4Z7aAs+2j5BpeMFSer8/3VO355wJvDUgzRo4gcYOEI
Sk041RRJZqbPCot6OjJx4stnLuJp9tIS2cyxdk/7/6CMsapDTV4icZoRQHiE
scSnQg0PilhEjjqpMy6wCAuuGmqIrlY++ehYFkErnCGbgAztBYyJ0wC0AI3W
4sSl9XTvQFon5a/I6Ukx759DpJf8nSWBxBDs/kk2HmEhHemap1JjT/pAfWr4
CPOG4NvJezYMJDaS09FqOE+RXGOSVCd1SomskHAGvlqsTFyvirm617hsjtQG
xfbyponL04TqMP26xhQSVblLzjdx1xso0Lh92QOO4PbFmblVOKSqv+0PPZRH
Jtz/0OwEB7LkwZD/s2rvtfZgVNybMP1sEsgLJO1Pz2G/2hkHzngZeQU107ul
EhU0fMyF7tMBC2ztAqNjXBhZMV9RKGbMPDvZ9/a7iEqS8pn5EF+mvxCGZ+qk
C/heTL5ndjjvr/h+chl9SGE5BnahTBcmpHFmvW5JA8ttys14DtVW+HQSyEnH
AJtIezsdfZQ0B3GzO4CXwW7GYXCK6VUyRk0Wp4w9BGgJ2RkiqlEawW2A1Rnk
+xwrVEshgDpCqk21jEHYLCSBQT7cTpgoiQu7U2SfCggHmlRE2KtmGBLZpRA8
O0RdoYbOErAs3yh4NlEJ/UkCg1zvhcXtOPCGrzk8KeX5LKfKVQu3Wp5HSwpq
2oC7bVUN7l2arHmVMSViHso6RjhokufjI5k8Q2eoL2uI+z0tgbgLfn+C85eC
L4wNG8o6bSkqqKETQdj3a9yP5cPXV570UOoFz1lpGr3DmnddZATrKZCn1iTR
s1M6tRQLPyNfW3pEBgUTTQt04DEuqJ4Oohu2dWFXA32h/KxHBCHH8imr37X8
6LE/br5xONziE6RvZH8+2Hy+kKCIykbmMfQbGD7fk9loE7AoF7HwDToE8zQv
hIE5F1oCnTJangdm7Yk83y+5vswet25Kj8zhZybuiZ8414TQW8n27OK2jsw7
Fhfi6xlecXxCBtejXwzUHyp+15jU8FVV/rmgUWDWi9Yy9I1K36XlXjtPxmGZ
y84in8nqxiKBj2uonMiNRiegYwTcg9vgC9f8nH48sOBP/usLfv6fWPA2WnEq
d9HbO2HxhXRAH/3ijaAr645e/8X4Vr/uAhfX62Kx0CEOn1gBLap0KwWWyfAe
KZCDphbn3jILa7j3SbUjQrYVjwRuCtDpQlqmoAplPyFULHB4C/1GLiwQpIGp
IsHgEYG1py9UeL5p9/oUYS65FhO7ysuGMPpWO9NB5JDocYC41tEXS5CCBuM1
DdKKrEpp0LrbRO3mHAA0WajXzHugXEb6O+KH2mzyHYHpqcJBLqaym7QU0hNr
KylOgeHJoTKaqCQuw0W1E9wluHJ4Rev9TvuMa9Hyr50SwsNBIgfm2Rxqhkp9
TRI+zNdXaTHkPNZlA4Vg29W7nu0t7tMKzXyf8id1NahF4TI/WJbYkLbSsgU7
9IVYKD7BjAAVEQ67R5AYUOJkMKGl2ayE4jIZgxLaD73ehsLzGJTuoblUjrhO
uD2GC0eDMslql23/7/edZEQJ9sqOGBYBkFrkXFW1Py2YBRuZDV2oC2FVCqrI
k6McsNHv+OOz4BwTwhqr9B407NU+b9DVIDst7+0Vmhw+ADArfpPAgJDJncsO
dq6WPJ0OvR4WjFWUKgDEkB/RkgY922nhutPZuOJ5kY6FZUkXP9wF1hZ3fhEf
kpmY1DQIAkJLV+mkh7IaaD3FVTX6HTSGW0F7LHWi7nM1jCf7VslGaFZRmpXV
3m2pzkgjpRmuXwhzuiKeCbWpmWSJuZsWuPfQxuuIaKJsRV9uKfVVypG4hVuG
2tUqgLhPocvtTsoYCMuWVKEh37QQbSeEelHW2thogow3WG/UKRFpaI7JETU4
VGSAwaXeIFewOVFRosodQhUfhHc/B0ZGbeBRtwoU2NCluC82m4kmOCenn3yN
U+LISL7Ron+UCMfIHlMbzKbyREuiLjgvTq3YF7qtURsI6hxq83iH0TKGqhka
lpKrzOpCLYT8YbWpZ3Q1Sl1lK1TV8IEUvcdjamkVZikYoHUJkali6mxYXQa3
as7cR8wthV/uhfWBQkHmP4wr2QX2ZKEjDjYpsbQthZN4KeUzIlJi2CuaPkMO
udFfXjCAplj848kSxFtxQu7DvLq1FEwDTjIbJ6evMFLkfBwwIxLaJRzDi+xi
k2OWzO/q23F20xVL+OsnCkCMs7cIXH47v8xhz6C/pStX2e/h5snZ2/27Df7r
pxLd2qt86ntz0cDOyi73zWKWN4vJ97AheZjOEY9kUflGPJ68uWL3fz/UEL/D
Ok5NS7pbSzFnjDAjaU7C9izEE6gnc3UX2cEUcCWuBEwOFS2C9Tb2KBCE23de
cHtcaohyItS/iUgibI9YAWhXeYd/smLBg7Ar6l0gUATNdAnHnzP8iE5ktRKs
B/WO9xsuXvEpJw30cgN7ihYtb26zKxR0RFD0Kp+VOfID7edrLIvw+3yDHGE3
20O7qe/G2Q9FeXtbwsddiZBvuJCvYbmzn6g1rlppyDXcNC8XZVc3w7vxt1GK
ExeVmWlkWVnkst2eGPKkhElO8cfpb0cWSrCYML8RKayCwJNAGdMqIGkDfAnX
QMRA3Czn+NCM9Qd5XXh/ctT+Jw9WEbWocAEA

-->

</rfc>
