<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.24 -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-pearg-ip-address-privacy-considerations-00" category="info" tocInclude="true" sortRefs="true" symRefs="true" obsoletes="" updates="" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.0 -->
  <front>
    <title abbrev="IP Address Privacy Considerations">IP Address Privacy Considerations</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-pearg-ip-address-privacy-considerations-00"/>
    <author initials="M." surname="Finkel" fullname="Matthew Finkel">
      <organization>The Tor Project</organization>
      <address>
        <email>sysrqb@torproject.org</email>
      </address>
    </author>
    <author initials="B." surname="Lassey" fullname="Bradford Lassey">
      <organization>Google</organization>
      <address>
        <email>lassey@chromium.org</email>
      </address>
    </author>
    <author initials="L." surname="Iannone" fullname="Luigi Iannone">
      <organization abbrev="Huawei">Huawei Technologies France S.A.S.U</organization>
      <address>
        <email>luigi.iannone@huawei.com</email>
      </address>
    </author>
    <author initials="J.B." surname="Chen" fullname="J. Bradley Chen">
      <organization>Google</organization>
      <address>
        <email>bradchen@google.com</email>
      </address>
    </author>
    <date year="2022" month="January" day="26"/>
    <area>General</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document provides an overview of privacy considerations related to user IP addresses. It includes an analysis of some current use cases for tracking of user IP addresses, mainly in the context of anti-abuse. It discusses the privacy issues associated with such tracking and provides input on mechanisms to improve the privacy of this existing model. It then captures requirements for proposed 'replacement signals' for IP addresses from this analysis. In addition, existing and under-development techniques are evaluated for fulfilling these requirements.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    mailing list (),
  which is archived at <eref target=""/>.</t>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://github.com/ShivanKaul/draft-ip-address-privacy"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>The initial intention of this draft is to capture an overview of the problem space and research on proposed solutions concerning privacy considerations related to user IP addresses (informally, IP privacy). The draft is likely to evolve significantly over time and may well split into multiple drafts as content is added.</t>
      <t>Tracking of IP addresses is common place on the Internet today, and is particularly widely used in the context of
anti-abuse, e.g. anti-fraud, DDoS management, and child protection activities. IP addresses are currently used in determining
"reputation" <xref target="RFC5782" format="default"/> in conjunction with other signals to protect against malicious traffic, since these addresses are usually a relatively stable
identifier of a request's origin. Servers use these reputations in determining whether or not a given packet, connection,
or flow likely corresponds to malicious traffic. In addition, IP addresses are used in investigating past events and attributing responsibility.</t>
      <t>However, identifying the activity of users based on IP addresses has clear privacy implications (<xref target="WEBTRACKING1" format="default"/>, <xref target="WEBTRACKING2" format="default"/>), e.g. user fingerprinting and cross-site identity linking. Many technologies exist today that allow users to obfuscate their external IP address to avoid such tracking, e.g. VPNs (<xref target="VPNCMP1" format="default"/>, <xref target="VPNCMP2" format="default"/>) and Tor (<xref target="TOR" format="default"/>, <xref target="VPNTOR" format="default"/>). Several new technologies are emerging, as well, in the landscape, e.g. Apple iCloud Private Relay <xref target="APPLEPRIV" format="default"/>, Gnatcatcher <xref target="GNATCATCHER" format="default"/>, and Oblivious technologies (ODoH <xref target="I-D.pauly-dprive-oblivious-doh" format="default"/>, OHTTP <xref target="I-D.thomson-ohai-ohttp" format="default"/>).</t>
      <t>General consideration about privacy for Internet protocols can be found in <xref target="RFC6973" format="default"/>. This document builds upon <xref target="RFC6973" format="default"/> and more specifically attempts to capture the following aspects of the tension between valid use cases for user identification and the related privacy concerns, including:</t>
      <ul spacing="normal">
        <li>An analysis of the current use cases, attempting to categorize/group such use cases where commonalities exist.</li>
        <li>Find ways to enhance the privacy of existing uses of IP addresses.</li>
        <li>Generating requirements for proposed 'replacement signals' from this analysis (these could be different for each category/group of use cases).</li>
        <li>Research to evaluate existing technologies or propose new mechanisms for such signals.</li>
      </ul>
      <t>With the goal of replacing IP addresses as a fundemental signal, the following sections enumerate existing use cases and describe applicable substitution signals. This description may not be exhaustive due to the breadth of IP address usage.</t>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <t>(Work in progress)</t>
      <t>This section defines basic terms used in this document, with references to pre-existing definitions as appropriate. As in <xref target="RFC4949" format="default"/> and <xref target="RFC6973" format="default"/>, each entry is preceded by a dollar sign ($) and a space for automated searching.</t>
      <ul spacing="normal">
        <li>$ Identity: Extending <xref target="RFC6973" format="default"/>, an individual's attributes may only identify an individual up to an anonymity set within a given context.</li>
        <li>$ Reputation: A random variable with some distribution. A reputation can either be "bad" or "good" with some probability according to the distribution.</li>
        <li>$ Reputation context: The context in which a given reputation applies.</li>
        <li>$ Reputation proof: A non-interactive zero knowledge proof of a reputation signal.</li>
        <li>$ Reputation signal: A representative of a reputation.</li>
        <li>$ Service provider: An entity that provides a service on the Internet; examples services include hosted e-mail, e-commerce sites, and cloud computing platforms.</li>
      </ul>
      <section anchor="categories-of-interaction" numbered="true" toc="default">
        <name>Categories of Interaction</name>
        <t>Interactions between parties on the Internet may be classified into one (or more) of three categories:</t>
        <ul spacing="normal">
          <li>$ Private Interaction: An interaction occuring between mutually consenting parties, with a mutual expectation of privacy.</li>
          <li>$ Public Interaction: An interaction occuring between multiple parties that are not engaged in a Private Interaction.</li>
          <li>$ Consumption: An interaction where one party primarily receives information from other parties.</li>
        </ul>
      </section>
    </section>
    <section anchor="ip-address-tracking" numbered="true" toc="default">
      <name>IP address tracking</name>
      <section anchor="ip-address-use-cases" numbered="true" toc="default">
        <name>IP address use cases</name>
        <section anchor="antiabuse" numbered="true" toc="default">
          <name>Anti-abuse</name>
          <t>IP addresses are a passive identifier used in defensive operations. They allow correlating requests, attribution, and recognizing numerous attacks, including:</t>
          <ul spacing="normal">
            <li>account takeover</li>
            <li>advertising fraud (e.g., click-fraud)</li>
            <li>disinformation operations (e.g., detecting scaled and/or coordinated attacks)</li>
            <li>financial fraud (e.g., stolen credit cards, email account compromise)</li>
            <li>malware/ransomware (e.g., detecting C2 connections)</li>
            <li>phishing</li>
            <li>real-world harm (e.g., child abuse)</li>
            <li>scraping (e.g., e-commerce, search)</li>
            <li>spam (e.g., email, comments)</li>
            <li>vulnerability exploitation (e.g., "hacking")</li>
          </ul>
          <t>Malicious activity recognized by one service provider may be shared with other services <xref target="RFC5782" format="default"/> as a way of limiting harm.</t>
        </section>
        <section anchor="ddos-and-botnets" numbered="true" toc="default">
          <name>DDoS and Botnets</name>
          <t>Cyber-attackers can leverage the good reputation of an IP address to carry out specific attacks that wouldn't work otherwise. Main examples are Distributed Denial of Service (DDoS) attacks carried out by spoofing a trusted (i.e., having good reputation) IP address (which may or may not be the victim of the attack) so that the servers used to generate the DDoS traffic actually respond to the attackers trigger (i.e., spoofed packets). Similarly botnets may use spoofed addresses in order to gain access and attack services that otherwise would not be reachable.</t>
        </section>
        <section anchor="multi-platform-threat-models" numbered="true" toc="default">
          <name>Multi-platform threat models</name>
          <t>As siloed (single-platform) abuse defenses improve, abusers have moved to multi-platform threat models. For example, a public discussion platform with a culture of anonymity may redirect traffic to YouTube as a video library, bypassing YouTube defenses that otherwise reduce exposure of potentially harmful content. Similarly, a minor could be solicited by an adult impersonating a child on a popular social media platform, then redirected to a smaller, less established and less defended platform where illegal activity could occur. Phishing attacks are also common. There are many such cross-platform abuse models and they cause significant public harm. IP addresses are commonly used to investigate, understand and communicate these cross-platform threats. There are very few alternatives for cross-platform signals.</t>
        </section>
        <section anchor="rough-geolocation" numbered="true" toc="default">
          <name>Rough Geolocation</name>
          <t>A rough geolocation can be inferred from a client's IP address, which is commonly known as either IP-Geo or Geo-IP. This information can have several useful implications. When abuse extends beyond attacks in the digital space, IP addresses may help identify the physical location of real-world harm, such as child exploitation.</t>
          <section anchor="legal-compliance" numbered="true" toc="default">
            <name>Legal compliance</name>
            <t>Legal and regulatory compliance often needs to take the jurisdiction of the client into account. This is especially important in cases where regulations are mutually contradictory (i.e. there is no way to be in legal compliance universally). Because Geo-IP is often bound to the IP addresses a given ISP uses, and ISPs tend to operate within national borders, Geo-IP tends to be a good fit for server operators to comply with local laws and regulations</t>
          </section>
          <section anchor="contractual-obligations" numbered="true" toc="default">
            <name>Contractual obligations</name>
            <t>Similar to legal compliance, some content and media has licensing terms that are valid only for certain locations. The rough geolocation derived from IP addresses allow this content to be hosted on the web.</t>
          </section>
          <section anchor="locally-relevant-content" numbered="true" toc="default">
            <name>Locally relevant content</name>
            <t>Rough geolocation can also be useful to tailor content to the client's location simply to improve their experience. A search for "coffee shop" can include results of coffee shops within reasonable travel distance from a user rather than generic information about coffee shops, a merchant's website could show brick and mortar stores near the user and a news site can surface locally relevant news stories that wouldn't be as interesting to visitors from other locations.</t>
          </section>
        </section>
      </section>
      <section anchor="implications-of-ip-addresses" numbered="true" toc="default">
        <name>Implications of IP addresses</name>
        <section anchor="next-user-implications" numbered="true" toc="default">
          <name>Next-User Implications</name>
          <t>When an attacker uses IP addresses with "good" reputations, the collateral damage poses a serious risk to legitimate service providers, developers, and end users. IP addresses may become assocaited with a "bad" reputation from temporal abuse, and legitimate users may be affected by blocklists as a result. This unintended impact may hurt the reputation of a service or an end user <xref target="RFC6269" format="default"/>.</t>
        </section>
        <section anchor="privacy-implications" numbered="true" toc="default">
          <name>Privacy Implications</name>
          <t>IP addresses are sent in the clear throughout the packet journey over the Internet.
As such, any observer along the path can pick it up and use it for various tracking purposes. Beside basic information about the network or the device, it is possible to associate an IP address to an end user, hence, the relevance of IP addresses for user privacy. A very short list of information about user, device, and network that can be obtained via the IP address.</t>
          <ul spacing="normal">
            <li>Determine who owns and operates the network. Searching the WHOIS database using an IP address can provide a range of information about the organization to which the address is assigned, including a name, phone number, and civic address;</li>
            <li>Through a reverse DNS lookup and/or traceroute the computer name can be obtained, which often contains clues to logical and physical location;</li>
            <li>Geo-localisation of the device (hence the user) through various techniques <xref target="GEOIP" format="default"/>. Depending on the lookup tool used, this could include country, region/state, city, latitude/longitude, telephone area code and a location-specific map;</li>
            <li>Search the Internet using the IP address or computer names. The results of these searches might reveal peer-to-peer (P2P) activities (e.g., file sharing), records in web server log files, or glimpses of the individual's web activities (e.g., Wikipedia edits). These bits of individuals' online history may reveal their political inclinations, state of health, sexuality, religious sentiments and a range of other personal characteristics, preoccupations and individual interests;</li>
            <li>Seek information on any e-mail addresses used from a particular IP address which, in turn, could be the subject of further requests for subscriber information.</li>
          </ul>
        </section>
      </section>
      <section anchor="ip-privacy-protection-and-law" numbered="true" toc="default">
        <name>IP Privacy Protection and Law</name>
        <t>This section aim at providing some basic information about main example of laws adopted worldwide and related to IP address privacy (usually these laws area by product of the broader user privacy protection).</t>
        <t>Possible content (to focus only on technical IP address related aspects):</t>
        <ul spacing="normal">
          <li>GDPR (General Data Protection Regulation) - EUROPE: Europe considers IP addresses as personal identification information that should be treated like any other personal information e.g. social security number.</li>
          <li>The United States has opted for a different approach to data protection. Instead of formulating one all-encompassing regulation such as the EU's GDPR, the US chose to implement sector-specific privacy and data protection regulations that work together with state laws to safeguard American citizens' data.</li>
          <li>In 2020, China released the first draft of Personal Information Protection Law (PIPL). The PIPL is the equivalent of European GDPR and will have significant influence.</li>
          <li>Japan Protection of Personal Information (APPI) Act (recent changes put the act close to the GDPR model).</li>
        </ul>
      </section>
      <section anchor="mitigations-for-ip-address-tracking" numbered="true" toc="default">
        <name>Mitigations for IP address tracking</name>
        <t>The ability to track individual people by IP address has been well understood for decades. Commercial VPNs and Tor are the most common methods of mitigating IP address-based tracking.</t>
        <ul spacing="normal">
          <li>Commerical VPNs offer a layer of indirection between the user and the destination, however if the VPN endpoint's IP address is static then this simply substitutes one address for another. In addition, commerial VPNs replace tracking across sites with a single company that may track their users' activities.</li>
          <li>Tor is another mitigation option due to its dynamic path selection and distributed network of relays, however its current design suffers from degraded performance. In addition, correct application integration is difficult and not common.</li>
          <li>
            <t>Address anonymization (e.g. <xref target="GNATCATCHER" format="default"/> and similar):
            </t>
            <ul spacing="normal">
              <li>
                <xref target="GNATCATCHER" format="default"/> is a single-hop proxy system providing more protection against third-party tracking than a traditional commercial VPN. However, its design maintains the industry-standard reliance on IP addresses for anti-abuse purposes and it provides near backwards compatibility for select services that submit to periodic audits.</li>
              <li>
                <xref target="APPLEPRIV" format="default"/> iCloud Private Relay is described as using two proxies between the client and server, and it would provide a level of protection somewhere between a commercial VPN and Tor.</li>
            </ul>
          </li>
          <li>Recent interest has resulted in new protocols such as Oblivious DNS (<eref target="{{I-D.pauly-oblivious-doh-02.html}}">ODoH</eref>) and Oblivious HTTP (<eref target="{{I-D.thomson-http-oblivious}}">OHTTP</eref>). While they both prevent tracking by individual parties, they are not intended for the general-purpose web browsing use case.</li>
          <li>Temporary addresses</li>
        </ul>
      </section>
    </section>
    <section anchor="replacement-signals-for-ip-addresses" numbered="true" toc="default">
      <name>Replacement signals for IP addresses</name>
      <t>Fundamentally, the current ecosystem operates by making the immediate peer of a connection accountable for bad traffic, rather than the source of the traffic itself.  This is problematic because in some network architectures the peer node of the connection is simply routing traffic for other clients, and any client's use of that node may be only temporary.  Ideally, clients could present appropriate identification end-to-end that is separate from the IP address, and uniquely bound to a given connection.</t>
      <section anchor="signals" numbered="true" toc="default">
        <name>Signals</name>
        <t>There are 7 classes of signals identified in this document that may be used in place of IP addresses. A signal's provenance is a critical property and will be discussed in <xref target="provenance" format="default"/>.</t>
        <ul spacing="normal">
          <li>ADDRESS_ESCROW: Provides sufficient information for retroactively obtaining a client's IP address.</li>
          <li>IDENTITY_TRANSPARENCY: Reveals a person's identity within a context.</li>
          <li>IS_HUMAN: Informs the recipient that, most likely, a human recently proved their presence on the opposite end of the connection.</li>
          <li>PEER_INTEGRITY: Provides a secure, remote attestation of hardware and/or software state.</li>
          <li>REIDENTIFICATION: Provides a mechanism for identifying the same user across different connections within a time period.</li>
          <li>REPUTATION: Provides the recipient with a proof of reputation from a reputation provider.</li>
          <li>SOURCE_ASN: Reveals the ASN from which the client is connecting.</li>
        </ul>
        <t>In some situations one of the above signals may be a sufficient replacement signal in isolation, or more than one signal may be needed in combination.</t>
        <t>Separately, there are three signal categories that are out-of-scope for this document but are important improvements for mitigating abuse on platforms.</t>
        <ul spacing="normal">
          <li>publisher norms: Standard expections of publishers including identity transparency and conflicts of interest.</li>
          <li>protocol improvements: Increasing security of existing protocols.</li>
          <li>ecosystem improvements: Reducing reliance on less secure systems, for example, migrating user authentication from password-based to WebAuthn <xref target="WEBAUTHN" format="default"/> and relying on multiple factors (MFA).</li>
        </ul>
        <section anchor="adoption" numbered="true" toc="default">
          <name>Adoption</name>
          <t>Adoption of replacement signals requires coordination between user agents, service providers, and proxy services. Some user agents and proxy services may support only a subset of these signals, while service providers may require additional signals. A mechanism of negotiation may be needed for communicating these requirements.</t>
          <t>In addition, service providers should only require a signal within the scope it will be used. In the same way that service provides only require user authentication when the user requests access to a non-public resource, a signal should not be pre-emptively requested before it is needed. The categories of interaction described above may help define scopes within a service, and they may help communicate to the user the reasoning for requiring a signal.</t>
        </section>
        <section anchor="privacy-considerations" numbered="true" toc="default">
          <name>Privacy Considerations</name>
          <t>A signal should not be required without clear justification, service providers should practice data minimization <xref target="RFC6973" format="default"/> wherever possible. Requiring excessive signals may be more harmful to user privacy than requiring IP address transparency. This section provides a more details analysis of some signals.</t>
          <t>ADDRESS_ESCROW gives service providers a time period within which they may obtain the client's IP address, but the information-in-escrow is not immediately available. Service providers should not gain access to the information in secret. A service provider may misuse the information-in-escrow for tracking and privacy-invasion purposes.</t>
          <t>PEER_INTEGRITY partitions users into two groups with valid and invalid hardware/software state, at a minimum. If the signal reveals more information, then it may allow more granular tracking of small sets of devices.</t>
          <t>IDENTITY_TRANSPARENCY may expose significant information about a user to a service provider; the resulting privacy invasion may be significantly worse than IP address transparency causes.</t>
          <t>IS_HUMAN depends on the mechanism used for proving humanness.</t>
          <t>REIDENTIFICATION explicitly allows a service provider to associate requests across unlinkable connections. This signal allows for profiling user behavior and tracking user activity without requesting more identifying information. First-party reidentification is a use case for this signal.</t>
          <t>REPUTATION partitions users into a set based on their reputation. The privacy invasion associated with this signal is intentionally small.</t>
          <t>SOURCE_ASN allows for identifying request patterns originating from an ASN without providing IP address transparency. However, ASNs are not guaranteed to serve large populations, therefore revealing the source ASN of a request may reveal more information about the user than intended.</t>
        </section>
        <section anchor="provenance" numbered="true" toc="default">
          <name>Provenance</name>
          <t>Replacement signals are only useful if they are trustworthy.</t>
          <t>[[OPEN ISSUE: https://github.com/ShivanKaul/draft-ip-address-privacy/issues/24]]</t>
        </section>
        <section anchor="applying-appropriate-signals" numbered="true" toc="default">
          <name>Applying Appropriate Signals</name>
          <t>As previous discussed, IP addresses are used for various reasons; therefore, describing a one-size-fits-all replacement signal is not appropriate. In addition, the quality and quantity of replacement signals needed by a service depends on the category of interaction of its users and potential attacks on the service.</t>
          <t>As an example, the attacks listed above in <xref target="antiabuse" format="default"/> can be organized into six groups based on the signals that may sufficiently replace IP addresses:</t>
          <ol spacing="normal" type="1"><li>
              <t>IS_HUMAN, REPUTATION, REIDENTIFICATION, PEER_INTEGRITY
              </t>
              <ul spacing="normal">
                <li>advertising fraud (e.g., click-fraud)</li>
                <li>phishing</li>
                <li>scraping (e.g., e-commerce, search)</li>
                <li>spam (e.g., email, comments)</li>
              </ul>
            </li>
            <li>
              <t>IS_HUMAN, REPUTATION, REIDENTIFICATION, ecosystem improvements
              </t>
              <ul spacing="normal">
                <li>account takeover</li>
              </ul>
            </li>
            <li>
              <t>IS_HUMAN, REPUTATION, SOURCE_ASN
              </t>
              <ul spacing="normal">
                <li>influence (e.g., brigading, astroturfing)</li>
              </ul>
            </li>
            <li>
              <t>publisher norms, (publisher) IDENTITY_TRANSPARENCY, PEER_INTEGRITY
              </t>
              <ul spacing="normal">
                <li>disinformation operations (e.g., detecting scaled and/or coordinated attacks)</li>
              </ul>
            </li>
            <li>
              <t>publisher norms, (publisher) IDENTITY_TRANSPARENCY, ADDRESS_ESCROW
              </t>
              <ul spacing="normal">
                <li>real-world harm (e.g., child abuse)</li>
              </ul>
            </li>
            <li>
              <t>IDENTITY_TRANSPARENCY, protocol improvements
              </t>
              <ul spacing="normal">
                <li>financial fraud (e.g., stolen credit cards, email account compromise)</li>
              </ul>
            </li>
          </ol>
          <t>The remaining two attack categories fall outside of the scope of this document.</t>
          <ul spacing="normal">
            <li>malware/ransomware (e.g., detecting C2 connections)</li>
            <li>vulnerability exploitation (e.g., "hacking")</li>
          </ul>
          <t>Note, IP addresses do not provide a perfect signal in their existing usage, and the above replacement signals do not provide a better signal in all cases.</t>
        </section>
      </section>
      <section anchor="evaluation-of-existing-technologies" numbered="true" toc="default">
        <name>Evaluation of existing technologies</name>
        <t>Technologies exist that are designed to solve some of the problems described in this document.</t>
        <t>Privacy Pass <xref target="I-D.ietf-privacypass-protocol" format="default"/> is a useful building block for solving numerous problems. Its design involves an interaction between a client and server where, at the end, the client is issued a set of anonymous tokens. These tokens may be redeemed at a later time, and this redemption should not be linkable with the initial issuance interaction. One existing use case is substituting a CAPTCHA challenge with a token, where successfully solving a CAPTCHA challenge results in a client being issued a set of anonymous tokens, and these tokens may be used in the future to bypass solving another CAPTCHA challenge. Therefore, Privacy Pass may be acceptable as an IS_HUMAN signal by some service providers. The current token design can't carry additional metadata like a user's reputation or an expiration date, and the tokens are not bound to an identity. The unlinkability property of the tokens is dependent on the implementation of key consistency <xref target="I-D.wood-key-consistency" format="default"/>.</t>
        <t>Trust Token <xref target="TRUSTTOKEN" format="default"/> is an extension of Privacy Pass where the issuance and redemption functionality are provided in the browser setting. The tokens are allowed to carry public and private metadata as extensions.</t>
        <t>Private Access Tokens <xref target="I-D.private-access-tokens" format="default"/> provide a technique for partitioning clients based on a per-origin policy within a time period. Its use cases include rate-limiting access to content and geo-location. PATs could be used as a REIDENTIFICATION signal or a replacement signal for GeoIP, depending on requirements.</t>
      </section>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>This draft discussses IP address use cases, underlying requirements, and possible replacement signals. Adoption challenges and privacy considerations for those signals are also discussed. Further work is needed to build and evaluate these signals as suitable replacements for IP addresses.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC5782">
          <front>
            <title>DNS Blacklists and Whitelists</title>
            <author fullname="J. Levine" initials="J." surname="Levine">
              <organization/>
            </author>
            <date month="February" year="2010"/>
            <abstract>
              <t>The rise of spam and other anti-social behavior on the Internet has led to the creation of shared blacklists and whitelists of IP addresses or domains.  The DNS has become the de-facto standard method of distributing these blacklists and whitelists.  This memo documents the structure and usage of DNS-based blacklists and whitelists, and the protocol used to query them.  This document  is not an Internet Standards Track specification; it is published for  informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5782"/>
          <seriesInfo name="DOI" value="10.17487/RFC5782"/>
        </reference>
        <reference anchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <author fullname="B. Aboba" initials="B." surname="Aboba">
              <organization/>
            </author>
            <author fullname="J. Peterson" initials="J." surname="Peterson">
              <organization/>
            </author>
            <author fullname="J. Morris" initials="J." surname="Morris">
              <organization/>
            </author>
            <author fullname="M. Hansen" initials="M." surname="Hansen">
              <organization/>
            </author>
            <author fullname="R. Smith" initials="R." surname="Smith">
              <organization/>
            </author>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications.  It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices.  It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author fullname="R. Shirey" initials="R." surname="Shirey">
              <organization/>
            </author>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="36"/>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>
        <reference anchor="RFC6269">
          <front>
            <title>Issues with IP Address Sharing</title>
            <author fullname="M. Ford" initials="M." role="editor" surname="Ford">
              <organization/>
            </author>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair">
              <organization/>
            </author>
            <author fullname="A. Durand" initials="A." surname="Durand">
              <organization/>
            </author>
            <author fullname="P. Levis" initials="P." surname="Levis">
              <organization/>
            </author>
            <author fullname="P. Roberts" initials="P." surname="Roberts">
              <organization/>
            </author>
            <date month="June" year="2011"/>
            <abstract>
              <t>The completion of IPv4 address allocations from IANA and the Regional Internet Registries (RIRs) is causing service providers around the world to question how they will continue providing IPv4 connectivity service to their subscribers when there are no longer sufficient IPv4 addresses to allocate them one per subscriber.  Several possible solutions to this problem are now emerging based around the idea of shared IPv4 addressing.  These solutions give rise to a number of issues, and this memo identifies those common to all such address sharing approaches.  Such issues include application failures, additional service monitoring complexity, new security vulnerabilities, and so on.  Solution-specific discussions are out of scope.</t>
              <t>Deploying IPv6 is the only perennial way to ease pressure on the public IPv4 address pool without the need for address sharing mechanisms that give rise to the issues identified herein.  This  document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6269"/>
          <seriesInfo name="DOI" value="10.17487/RFC6269"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="WEBTRACKING1">
          <front>
            <title>A Survey on Web Tracking: Mechanisms, Implications, and Defenses</title>
            <author fullname="Tomasz Bujlow" initials="T." surname="Bujlow">
              <organization/>
            </author>
            <author fullname="Valentin Carela-Espanol" initials="V." surname="Carela-Espanol">
              <organization/>
            </author>
            <author fullname="Beom-Ryeol Lee" initials="B." surname="Lee">
              <organization/>
            </author>
            <author fullname="Pere Barlet-Ros" initials="P." surname="Barlet-Ros">
              <organization/>
            </author>
            <date month="August" year="2017"/>
          </front>
          <seriesInfo name="Proceedings of the IEEE" value="Vol. 105, pp. 1476-1510"/>
          <seriesInfo name="DOI" value="10.1109/jproc.2016.2637878"/>
        </reference>
        <reference anchor="WEBTRACKING2">
          <front>
            <title>Don’t Count Me Out: On the Relevance of IP Address in the Tracking Ecosystem</title>
            <author fullname="Vikas Mishra" initials="V." surname="Mishra">
              <organization/>
            </author>
            <author fullname="Pierre Laperdrix" initials="P." surname="Laperdrix">
              <organization/>
            </author>
            <author fullname="Antoine Vastel" initials="A." surname="Vastel">
              <organization/>
            </author>
            <author fullname="Walter Rudametkin" initials="W." surname="Rudametkin">
              <organization/>
            </author>
            <author fullname="Romain Rouvoy" initials="R." surname="Rouvoy">
              <organization/>
            </author>
            <author fullname="Martin Lopatka" initials="M." surname="Lopatka">
              <organization/>
            </author>
            <date month="April" year="2020"/>
          </front>
          <seriesInfo name="Proceedings of The Web Conference" value="2020"/>
          <seriesInfo name="DOI" value="10.1145/3366423.3380161"/>
        </reference>
        <reference anchor="VPNCMP1">
          <front>
            <title>Performance Comparison of VPN Solutions</title>
            <author fullname="Lukas Osswald" initials="L." surname="Osswald">
              <organization/>
            </author>
            <author fullname="Marco Haeberle" initials="M." surname="Haeberle">
              <organization/>
            </author>
            <author fullname="Michael Menth" initials="M." surname="Menth">
              <organization/>
            </author>
            <date month="May" year="2020"/>
          </front>
          <seriesInfo name="Universität Tübingen" value="article"/>
          <seriesInfo name="DOI" value="10.15496/PUBLIKATION-41810"/>
        </reference>
        <reference anchor="VPNCMP2">
          <front>
            <title>Virtual private networks: an overview with performance evaluation</title>
            <author fullname="S. Khanvilkar" initials="S." surname="Khanvilkar">
              <organization/>
            </author>
            <author fullname="A. Khokhar" initials="A." surname="Khokhar">
              <organization/>
            </author>
            <date month="October" year="2004"/>
          </front>
          <seriesInfo name="IEEE Communications Magazine" value="Vol. 42, pp. 146-154"/>
          <seriesInfo name="DOI" value="10.1109/mcom.2004.1341273"/>
        </reference>
        <reference anchor="GEOIP">
          <front>
            <title>IP Geolocation Using Traceroute Location Propagation and IP Range Location Interpolation</title>
            <author fullname="Ovidiu Dan" initials="O." surname="Dan">
              <organization/>
            </author>
            <author fullname="Vaibhav Parikh" initials="V." surname="Parikh">
              <organization/>
            </author>
            <author fullname="Brian D. Davison" initials="B." surname="Davison">
              <organization/>
            </author>
            <date month="April" year="2021"/>
          </front>
          <seriesInfo name="Companion Proceedings of the Web Conference" value="2021"/>
          <seriesInfo name="DOI" value="10.1145/3442442.3451888"/>
        </reference>
        <reference anchor="TOR" target="https://www.torproject.org/">
          <front>
            <title>The Tor Project</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="VPNTOR" target="Journal of Physics Conference Series">
          <front>
            <title>Anonymity communication VPN and Tor: A comparative study</title>
            <author initials="E." surname="Ramadhani">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="GNATCATCHER" target="https://github.com/bslassey/ip-blindness">
          <front>
            <title>Global Network Address Translation Combined with Audited and Trusted CDN or HTTP-Proxy Eliminating Reidentification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="APPLEPRIV" target="https://appleinsider.com/articles/21/06/10/how-apple-icloud-private-relay-works">
          <front>
            <title>Apple iCloud Private Relay</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TRUSTTOKEN" target="https://github.com/WICG/trust-token-api">
          <front>
            <title>Trust Token API Explainer</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WEBAUTHN" target="https://www.w3.org/TR/webauthn-2/">
          <front>
            <title>Web Authentication: An API for accessing Public Key Credentials Level 2</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.pauly-dprive-oblivious-doh">
          <front>
            <title>Oblivious DNS Over HTTPS</title>
            <author fullname="Eric Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Patrick McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Tanya Verma">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="5" month="January" year="2022"/>
            <abstract>
              <t>   This document describes a protocol that allows clients to hide their
   IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS
   (DoH) messages.  This improves privacy of DNS operations by not
   allowing any one server entity to be aware of both the client IP
   address and the content of DNS queries and answers.

   This experimental protocol is developed outside the IETF and is
   published here to guide implementation, ensure interoperability among
   implementations, and enable wide-scale experimentation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-pauly-dprive-oblivious-doh-09"/>
        </reference>
        <reference anchor="I-D.thomson-ohai-ohttp">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="Martin Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="25" month="October" year="2021"/>
            <abstract>
              <t>   This document describes a system for the forwarding of encrypted HTTP
   messages.  This allows a client to make multiple requests of a server
   without the server being able to link those requests to the client or
   to identify the requests as having come from the same client.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/unicorn-wg/oblivious-http.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-thomson-ohai-ohttp-00"/>
        </reference>
        <reference anchor="I-D.ietf-privacypass-protocol">
          <front>
            <title>Privacy Pass Protocol Specification</title>
            <author fullname="Sofía Celi">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Alex Davidson">
              <organization>LIP</organization>
            </author>
            <author fullname="Armando Faz-Hernandez">
              <organization>Cloudflare</organization>
            </author>
            <date day="22" month="February" year="2021"/>
            <abstract>
              <t>   This document specifies the Privacy Pass protocol.  This protocol
   provides anonymity-preserving authorization of clients to servers.
   In particular, client re-authorization events cannot be linked to any
   previous initial authorization.  Privacy Pass is intended to be used
   as a performant protocol in the application-layer.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-protocol-01"/>
        </reference>
        <reference anchor="I-D.wood-key-consistency">
          <front>
            <title>Key Consistency and Discovery</title>
            <author fullname="Alex Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Matthew Finkel">
              <organization>The Tor Project</organization>
            </author>
            <author fullname="Martin Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="19" month="August" year="2021"/>
            <abstract>
              <t>   This document describes the key consistency and correctness
   requirements of protocols such as Privacy Pass, Oblivious DoH, and
   Oblivious HTTP for user privacy.  It discusses several mechanisms and
   proposals for enabling user privacy in varying threat models.  In
   concludes with discussion of open problems in this area.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wood-key-consistency-01"/>
        </reference>
        <reference anchor="I-D.private-access-tokens">
          <front>
            <title>Private Access Tokens</title>
            <author fullname="Scott Hendrickson">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Jana Iyengar">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Steven Valdez">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="25" month="October" year="2021"/>
            <abstract>
              <t>   This document defines a protocol for issuing and redeeming privacy-
   preserving access tokens.  These tokens can adhere to an issuance
   policy, allowing a service to limit access according to the policy
   without tracking client identity.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tfpauly/privacy-proxy.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-private-access-tokens-01"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments" toc="default">
      <name>Acknowledgments</name>
      <t>[[OPEN ISSUE: TODO]]</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIABWf8WEAA618+2/bSLLu7/oreDMHiH0hyYmTnYcXF3c9jpN4d2IbtnOC
xWAwoMSWxAlFatikFU2Q//18X1U12ZSdfeEczNnIUrO7uroeXz2ak8lk1ORN
4U6SJxfXyWmW1c775LrO79P5LjmrSp9nrk6bHJ+ejNLZrHb3/9rYrJqX6RoT
Z3W6aCZ53SwmG5fWy0m+maT68GSjD0/mg4cnz56N5mnjllW9O0nyclGNRvmm
PkmauvXN8bNnPzw7HqW1S0+SN67EU8VoW9Ufl3XVbk6SS9fwr+QD/icvl8kb
fj366Hb4NjtJLsrG1aVrJq9I12jkm7TMfk2LqgStO+dHfp3Wza+/t1Xj/ElS
VqNNfpL83FTzceKruqndwuPTbs0Pv4xGadusqvpklExGCf4vL/HQu2nyOi8/
ukK+Uja8S5tm5bbxD1W9TMv8D9n0SXK3csldVYOh1W9u3sgIt07z4gSr+fr3
2V+aqt7oj1M8Oljxx2nyU+q920Ur/lin2QJ7jn8ZLvmmqpaFi1cqZOhf5qu6
Wuftul9HVvlpmlykZQlWjcIiP7X5Mo++xQMnyds23bo8uXPzVVkV1TJ3Pnld
p+XcJbfT0+nt9D1GBmHSwaOeBM44zXXGv6zk1+m8Wg/2+9cpt3y2cmW0YX6J
PRdu1//yzzY8wwNzDP7LUn7ShUajsqrXeObenUD0IID9X0ny4fzHu5vTs79d
XL55fpK8urqYPn82ff782Q9Hf72+uTqbHj97/u30+NsX333/3ffD4cfR8Jd/
Onrx4ttvXx6/mL548T0eeY6x/319efbuOpr1Ty9/+PZo086K/KNsYfLy+ffP
n3Ujj4frvzu7eofln72cPn/x8vnxdy8w8M351cX13rovXx7jv+mLl396/v33
pPHu6uZEuGLG4DFZbKC7rjlJVk2z8SdHR9vtdjqUyCOla3+yJ6c4yd06b3YJ
uLtuy3wue+HYBMrHlU6SU/64SWvhc+KbNts9kVk6BUu60z+fJjfpOs1WONoB
bX+t2rpMi6RaJNernc/nnnZp4WonsudqSCJ5cnl6d4b/3p7vUfqmqGZ4PJiQ
YOPuILu+UKLPqvUsL12WbPNmlZy2Wd7gD9kGrRM+n726hNglb+/uridg4Kdd
cl7k67zE8zBHNw6GrmzyhXHhyaPMXWLydkZpPJp5Vcoj2E3IQZmVIAkPnV5f
/3R+fXPx33vM3mwKl+RnRdVmapwbh0WLdPf4SinH52p+ZT1Yv3xeOH90/Pzo
2bdHz58drartRIZN8AOmVbPduEnNaSdkFQm6u3l/e3d39bfzyyFFwhcc8kdX
guiL5PzTpkjBwvqfbv3DxdmbIzH6k4aPg4pcNer0/d3bvWU+uBmOAzYWzJ2b
vp/qitDfJJ3PwTeewDXVaZ78jWaidnIYaeGTn9y9K5Ljx4misG9fiJDf3Rxt
3YxSWU6Oj0ajyWQCW+abOoWijO5WuU/g+9o15k2gHPdgrId8JNW9q+9zeAAI
p/m9ZOj3EvKTEtRUSetdncDNmqd0Hqa3gfTPi9bmSyHoEHHP+Xy1dsm8rWsu
ikeTeYpHZN+kS/wghj2YdJzACpbFDhMn4BzpadynhmNTsGWSzvCIrJzlft7y
ERkX6M+9b0mN99U8F9JFK3w7X/ULUzc6RuTlpsX8ZbKGc4D6+rXndvM1R7jB
5CCiITfdp9yL6qyrzBVCDU8Ze9w0LfYBtv3e5rUjx3XPmGtTeVDztHaQtbn8
lPh8CZb5pzIk5kKygLfTtQJTsUrJATkPZtyTwL20JU5sklFcqo3M3NDR5b8L
K2qXuPu0aIUbXGnRFou8KPg0yMbZxORORypA6zyD3xqNviE+qausnXNhihN0
ucwpofi3oayCd4EzAq1wCOSgcWNf0pSh1axw68RvwArZAvYNKIZDwmQds3xV
tCqHEIM5QBJJ/g8kNTkwj1kUuzF/sTkOp+JXOqLh0xxED1O4+6qg0ccBiV0s
G3zPXUC510rxOt0lW1cU2ESRUxHw2LotmpzWTqakGKoAlzI96HEZ+HsXKcCA
zNyLPyILKCPkBbkVACIIy1JsgKtj6EbsYlukNWjbghX4pyXbHqjOqFcdSM50
OVVdWtRpm42TV6+qW+ymTJciATr/fJUXoiSQJDlh2JL8Hscueh8TTfkyRY8I
yBxohovBNkdPIPNto74l+fz5/9y8PvvTd98ff/nCgaDyt7bUNURVK9BeB9Xg
WRgRSbqEZYDdxjHm87xqPRV6gdMB+M3pTVWYh5S1vuWpJ6kKCDw5/gDChviN
gtvDcjQvogbON09hwGogvnJK/4wz92LAgqqErfi9bSbblRPSoWFlBXKTJVbD
UeKwHbiKjZbKy/GISlhU2yBw8wrs85uqzGTDDza4p/sP2B+Ynpf3oD9fql/f
pGAWbAJtEI8UcL/OZ638psv5fJZDdneQybfVFkPrcWJM2Zl1COe+C9baJ7OU
y+G4BnSsKOsFdLg3xWsoxtx4dfD5c4xSv3wZJ4NvIA2HJpuivgus7wDloFbB
ys3rCgGaB7oxIkEUjBg1aYpgptyp1QvwXiykqgw2kuJACrJc9wAuV7NF6xnU
cZt5jfHUMli1flsclt5XeTb0H0YnwKLsyyCybslQMHYTgCSHAIB2P8vnQ8rW
PQPFpIRZHBAuBnvt6qUsBbbSyoyDVheYFmRvgiZ/HV1huQ6RcfU3wHvY75wy
+vlzhDj5I4m9Agq5V7mL6Tm4elW9xRP//2LyarpJ22I3yXjGblKFByZZteIs
V4SYYShA8tojQKhWaY7/AW7hvkcji5CHBhyApWqbTnbEIQazRwNQzStYAxji
ZObwa1uKwKsx+faH7158+UJbHiOdWQsLBtWFnA/GqfGuwGS/cXOx7mIgmsat
N83Ac5Hfi4piIzLI8Y0PPgxW3ZPwGaC5g57DxUJQhlBHRHmIrmV5Ph8cVuTP
6OL82DAVlkRw93+JGGNgJZZ9H1eNA/mitdyA5CryP9yR5CBUfnvaYKpotcXX
gOym05cpFnwNRJ9s052wwpWr1GxrDIM6+NFyuj0/xkn0kM3W/Jtg6AH2SQ7U
+M6rFk4JApDlCwmhGpnPpdhcSM/YhtVa6XYPSdBNABji3RUO9dsYCHxPoihn
hAu5mrDSiIU0f6DPIneWlYZ5uidOOrTT+A/IC0iNu8VQnWK8J2ReXQSOo4QY
1wMi+/OjDAG7zmHPYaE3Ymfh0UAbYH/eCGjqaDS9kOEb+YXQhS5qxslXKaIZ
RrhZ68gc0jOrXZrRF8cHi/UBEaaEhHfi9Miv3Wh0wLwWtRFMW3LgoQUdthcs
DWvuxHEgyqHD9BFQiXR2rAigdhYfm/t3k44FMlWuHCJHNzyomkAfltD3JuHl
Dy9/MFWPdX+ssoKl6p1AqNrNEW9BpogQMpxCqtAjOfgvNeCpYVQJ2NqmWovO
qijR8QAsJ/+VXJg/OkEoCbtA3d1bN6V3zmAtM+ARIIzgjLFHnkYlIY+53uFg
WDDxQzQDIWvhYRXJKuw3wAxDe1Oh56ZDKUxj1NgIVOo+BaMoJRoRMUBDDGWY
oALaOY3QjZhalwuggZg8maXZEyrGk2VV4VM/BaF8qjCCEW1VZ2aDKEeD+fco
CxRrbieAVexou8pxRmFfEUki6DQvexOBhGrBjYI/E8YktYAWl/zh6ir5WFbb
wmVLp+MC1OueVjV5MKl+faJMYXRSNpoI2nteHyRQzOcuRJW1BPqGUQR89HE3
Dk/H7qH7P0MXU0Am58MIH6LrZFVJHsdNmCKEEE9oul09Z4TSiPknPhIIwJyV
YjyYoYZRD63UN98kZ+YTzF4HNjGmi/7wnT+T8IKD94IQiiskYs4cEMFzpqFP
VbrkAAJCz3qojqp2rvNEzp+oqgSIEq0pzMr7v5NqDg/HLQRa1m2jMJ6YwZUG
b4U+sxmpjQET6aXTEJWaz9JTsjzLv7m0hXSBH4ol4T5pQV25hE0US5Y+tjVd
l5WIdr15dEF1xeQeF9iR4DUUFXulbYLA+aRL92K4OEcNkYwgMcgxZjWUKoc+
sN7mPfjDNyAjhITJ528YDsrnLxCG/egiZSThKfpRwNTHeQviIOrFJsTiElXv
DG9LbFP0SAABisKVYBfGFv/PK8Taf3CYeD7CUIzCXvYQ0UTMTMskR/rRMSbn
Vxn+bXLJpklYmxwQHSPqwoF/1Ej3EOMyDum52dMcxjOgmwuxANmF5lGPINbz
SiybWH8ji/PBGwEeMRcyWNU3VUGbXDvEbOB6nWETkt/viKeesqThHedByLcF
r4+Y1q3W/PiQoLPjKIaU1TdwnvRC+AiHXTDvCXy0Sut1t30J4+Vo+QAgQLrh
XPZzb0jG5tNk1CbtJnBqcWQY8Bt/vm8LYjuz+dC3ospN4eyhJysVwSdAAu+6
YLaLJMNZq9+l6Ps98xmMjMdeQgrP8gLBNA7yCAKutqlAU2a2hV/kw1SFXVIc
FLMfqwY2DCpwtpu5eqInyYCQ7q6QiGzpDM5VWewmJAG5FxviYIEjGLeEUCLI
hlqJLfFq+ZQfgJBkA9uc6ct3KVSnM/c87VfBU2K7r1yZK5YMbuWAGzjsJue6
NLxcGRxEKF8tJELReiR+OcinDgexSu/5/d5eDuNtHKi7FRBSx8iQTMDiTb4O
YYcufwi/r9vjd77PkEjubam4Xx8XtlsOg8evNtxSHQEj9GcABiwR9AfiZVsM
kCSB4hky42g13TXTcxR6acLC2CiXhiOrKUokiuzWdHvIhGDOXpZkN93x6LEF
NtREjIRNJkrv6A8mwbeKl8PDkgiGWAGD+ryoeAK0RYXrRh6qFprBJIGaYB7r
9zUzKLCia3wlrFn/g3WmyWuGPSo/YxpodWyWEs81gagPmnecYzqGtCLGAUaS
ezRRNdNr4Zyw9t+r9q5lZEG1okJW0KpZnda7MeRNvAGkKozqdrTHRszczhlh
IJKypTdVo8UNHCHVc9EWIUEanS53xPCi7gM+X9GKNIbUmQzDfshCMK6yOlZq
1o5IESttWgHzlVjnNXaZdkwZa7o+bF0ZDmDGBDFzYAUFxUmWEAbWimnypeyV
AUPPX/HfOR5cpkVv45RyQRPT5NrsdKfA4lYL6JGG4OIw+RX+f81ElsSYmu/q
FlLxUQEISQSsk4r493nqIAti/R7J1MqCIVHLOkeXM4QkSSFB+g8UUXbF0ZD+
3KNJpdLH9MMa7JIFwua0kHxaIxCG4dPes30ITbW6qdrlKnnjEFNqngS6lNTy
5bL/MiSAclZQ6RkEDqX08hAhhFX9fscWR3Q5deyZoUBJqbbA5uJ6ghVp9/DP
5OLaQuUYIXBBUUxv6TrwjVIbJzenyQeKkx6QkwCQMHpXdabGh+xdli9zCf4Z
VO5lcqmNK1ds+jhQki5SNcYjHQ8kxzDw9mMVGGZgRQNin6z8/Sb5SeSTqKPI
mdEZjfQbBV9LKEtT1btoANbBTpLSOc1KE20JRb8BIPssn/eFH2cHoJGAIZzA
TGoSvaMoPdhW1U0qQwe5KCNBA3uqQYT4YZm4HMkT18AVqXMeNlq8PhYVoUiK
vU1CoHO6J84E//GjU3XR004kocY9ziSfaP5oqDIWhV7cXkuqS8Eq/mKOVJ9R
DOlCPF7KJkDFTNwPnrDVVCyU1FRd8iLXBJY6UZup0vS0bGKn5ptHDwFItz4+
LvLKDvdMmCQONmFSdhl+NZvKCfd5M7YardWnJCsqVpKZfMg2Yb1kxpiu6YIe
zXKKNolOA3XTuQbhVFPwiOKCFfl9UNghiyVMkDxQoEWZZEGvxZ9bN+tEuZob
kABiSwVLy3Oj0c2jBkMs7cwF1RVZhpOu4/V6IYYV6Z72uRzCsBwstYINOzfA
RWZNLLFIfjyZV4uFI3CtNk9k8RDCY7dwWRJ7R2N8EBtoNB0Z0zM4Sdb9mTsR
GTYbJ7lkyAcNF46jVKgFSx+bK82ixwuIMwXCxxPcGtgoFRT1TxixTWaY5GPI
ijf0mZBBHEzJYg75IitrMqx0W5/oBKAAbn3B5FixfyA6rNFswxAKK6yQCNj5
kK++R1gmgh+Ft71IaSQbV5P2Es7qQi5heifvpfYbjR2N1DiXHdDUnPVABkXL
LLUVVfjGVkctmKmn8c/SNeMDpoYtkyORDezhR1MxhB5MET6IaDwjOanPy2dy
k/ZDkN/0oR+YIURinZltDGnetTGkloiL4hLNljvaVVpzrfEqXumIUXxpMRVQ
nmIeIKkZmPwRGKex/LQKqVlu2E6qB9EOpB/WRT1UWzdWvxjERn1ai7LSbS6k
QY+//eHLF/P1oUFzeEwPoIpXj2KqqcIohoUiLq5RAoPkN7ZYuVCej1JVU4Hj
8IxkCH6fmZ1la+XSZmhWIskbqgCscbvRhgo4CbPNzJpaKVaL9pu2lvOnO2H9
ytLaD7WQC5TWt1UpZRCBnJY3l34ATONz0fiqb1h5GGVG3ERE58R0WwGJ2iae
eq97JJSeQvYLRkpwGfQdp8cD5zMPSdY1ApXkRNiAKLGhr2pGmw+xuIe3GLpM
yYe/sqI4jPYK/nFbqtsyR+ljxrAMaql0+frD26uLW6gZoDfAAejR4m/METku
1SpKbFou3eOb4XxxsyV5qZhQwk6bLpdmIWBRl0V5Jpq6dA0ebFbMT5TtekbO
CCgGwJ+Hx/+M7d6pVIr6EGwg7r28hfmqPqo0HVnPE3NaFhhrkhYHxEX22RqQ
q2IT+ij2PUAFWi2IsEo1N+T2AB2SIAIOMcm5T2OQpueaHIgMdZb9MKhVL+p9
89Dnz9KtyerqK7exyoZ5ZNthU1WCirNxcOL0LMHtCRRk3AjQAlKO4NMYaCCW
w3cEMQ1GHVEh5RPmgFQr09lPjeczZ74nbHHSJVvW6Yb7vbXCXpylVskZCmci
Lj/ifEArvWvWKEcdOk1xvlw1cqxg8ca5etJUE/6bHFwfXx9GTTEh9bXIC01b
YfnDsaS66kzgPzxvAHo4QRkIRwCSlgXMq5VRG+muiupEfOrhKh/yj/lGwBoT
jF77mED4LNdt9FP4pwRr1EWcjUBoDfplRwpmNhUrwHPp5wIEKoPvk6PibCuM
bVbMEH5qWS2W0wTIFGGRdPy6bzLpNdKy1BqhA3mCKdgJXCbc/hzzb2rH+HgT
UL+U9LuqV0AIXk/YfRxouNTRd1YQiSyfRLUGmPr+qFgGRLe0mwJuY9ynGCSb
1c7YOkzqF/BzpD/krK32O9Oiax1TMw2p9uDYrqO2qZLd7tu9imiag8BQFJJk
M7391xzJOsoWSoZTAoGs2gguYBS4zbPQRtd1wUV7DoX7g9ANpWKu81DLZqw7
SI9fEMJZXaWZG7qRqB2MfRzXwX0FGH2AVRfVvPUaH9BMiCWZD5tqAo3WT3Eo
Of03r65vkoPQGvIKDiDm4k0X8Rwmk+T8/c3V9flJct7W8CldH4l/UHDvZG+v
BSNmsTg2+MUgBUxogDh2ZilqGEpx/Kj031iCCSeLsLjZmauYil9wyftSwNtt
I46PkZWempSTozYGKWSn2p1A7xexms1fCITSTKQSi7dWTREbWRQTWHP2qWtS
ro8Nu5wAj/P8PWwJeazQ4f0t1JH9DRrZFNaB4Rhk9+Y1HLt0GwyJGsTrBvCJ
Eqql9sBpfVgMiEgZ1vHpAs+kdZacrhm3wOnBC+R/IM58KtOTZxdlcvzs+Nk4
OQMkkJ49J91m0iSR18At2qzJdvpwJBfRkUQyA62Dlb64/sm6PPlROlPxmR0p
iGS5acykcgR6RAi5221eFJb2iTJrOHv4YAZ9oPSv6SYdrPc1kg5Or68vDpNT
6NYBS3qMV1e0kZBPQynE1vPCzoNfCCGS6jtU4/Iub0JQv9csHNX7uMtQluFE
/CE2qRtX0YJA2aPHKZMzFjqll9USgJKcwDKZm8MKwE2eaZmIki5tb6G3LbUu
qTVi9dC7uoYIVJn4oXXedSP2S060gTDQLZBR5xdLIfMzgKWGFOlOuzO5jdo4
HUqzg9hUAQ4jylSriivtaExyNWi82gH8sqnyvUQhZYKSytT3yllHigX+XT+N
1MF70CjqW4pp2OvN1HpaxydrcIpazyULqmX7ENNppUBvm5TWL0AvrQeoTlpC
uKdxFy4tDMiQNik1UutOSGhlJOuiLT1EBdkOiIdKzZDHQ696/5RFtacuYFmI
nd75iJGYJXSegdPskvEtz8nC9swt61Ry464W8Zf0yB53aqk1WMuSGeOGD+pn
LzaRXlszUizCWI4c+w23X6yC8UdUdNzvaJSnvWa/DnktY/JgRO473k9W1YbW
7dOON9sQTUeuWVoF40Zoa0OGnNTZRIv23fFKYoZluFS3rBm3SHWmSd9p2/jA
R3p4RfkGAFucyG4imXhaTMItjfTKh5Fe39zdxaYKpqKuE8nlzEDklrVoFbXG
un8tBUmJ2CuJQfwhU9KExUxHxriH14sgfMrQqL/08RbUrvFsJg4/wPKtdHV/
IqKNldmyyHJ0gpTHYSNakuvDvkKuxkh/R3cwxFCaTA5zpnvMD2aLsnSjpjjA
TLGDGghoYwM7//rG0+BL+xZZxngHP7M19peDz5/71thBT+zk2fF01ayLL18O
D/dabKVTFhPw3zBD6Jhlr2w/ER9miYGRhdR8ZlB3oud7yV0G0ZvtBrY+dMfI
E6FdpUvoLCwhoeXaYmKCI+EGoN/Wx/2GYmo0w4T4Ic66sWFqv4HzwWWW0eg1
3EqqbY+s7sUtrIiPTOO69MCMMcrHEL7la8lKQ6Ik7pJUU98GEYoNkjjlwrM0
668FxNlSgfdVW2u6RBp4reAJeXbFYpp09Qq7nSIuYWYlg1zlq7OPkrSg5Ml9
H8klkbyS4WqoifRU9h6FOQDZmi1OmtV6q/BbbpB+oEtHc32ZEyopC1gmT1B2
Ew4GG7jInHLY5rLgxtrX4m7JfUQMqWBoKyUNLiOxitx9dKEf1w2Ka3rtiEkC
qcZb/SRqRrStK3y5VdEQiGJ1wu+0g0zD3iA6XYPRw97Q3i3O+gsPdk1mr/2Y
KXmZ8KmcJQgS2yn2HqZIY12ywtF2d3hP+or1Tpk1l/cPS+4SDujVq5vz29tf
z2/Pbq4+nBD+qX2lI8znVgOLurUqBpANob1dPdEkj5WrH1YtBQO/Or+8u7j7
+693N6eXt9enN+eXZ38/gaoxZuceNBh56vtrEF0vaNQFenH769v3704vTwyN
eksazvNNHvg5VuCm11BYKVi1cNuJwtRip9zLQp5AxKhvXKw2MBksBVBqHsg8
Sbg+P7/59eLy7vzNDfYTsSvVeMkxkbCuGmkCcb7PJq/gpaQJytJnvlo08reE
FGK+z5VNry/g0C+uLgeTdx3bcgD7N1o8c26KGxWM9WFY1F/V81RufKkD1JWv
39/trzlkreG6rt90P10/6D8NFQLOfXv1/ubs/NfT28v+vDk1vtAn+/xlqLj6
jmiB0hdmp3AwbSiWlJ1JSmeVxTScORQEYul92JEvF4t8VRisthZPNarSu6Wj
bDKWi1V95nItOSRIbs2amP03I6A9ojZD3yralxthLSfVYuLnDPTVaQ3veOiw
qKysdbr+skEUgihGippjNF0tDRN+JdYb350wWlfYpb2koeLUjfNRnrhTwYat
e9gjNGRnzRMIF/N5SMgpzOAhB1QxoJVaOmcR0C4BaDIhvmnRgRHO0bvN4SQ3
7LnRPECPGKVzRRXO4C0M+CLuIFrnS7usoXoxuLSskscEA99XEaK3KvngZrzd
XCY/h+vPv4Qc1M7SxF3z7CKdS33v4N3r00MrA51mGqWMRuFTf31iiCjsBonv
uzDjMFBJXqrzfKTuZrd9ie0N3U6T26qzAcsudzkcJBLt2w0lS11tKvGga6JE
sRIoGfvikaKfJVuF+i4M6u5+iKfqbRVmLaEATZ52lzR6hVpo7jq8q+BrV3cH
0dZDcizPJbvpyAr6ZwZPTKToG3G3OUY6XInlOgO6Ddfq9lbxw9kfk6ftKg7e
uwSrNegJjGAnvzUy4dwFto17Sm0b1qEnF0TYXS0O1qZjfdMtaKi01qZs1EzQ
fNAJHzdjR7GKWMquJUevsChfItdgex/3/VjdE4PeqarfrnoKFvulV7mqjVUK
CcJlhEGddPgiGzZGPcoHY7mWiqUNQIqmv/F6TwB6/0AoNsIE/CKpPt5p7SLs
wfU5CbGYDwjlyymsTtiB+yTvNHjoZMRnhJa/cEc7JBjFl/RsGCa3OqtqZemQ
Q49uVMjkmWNXR3RpLLyFoG80G8I3war+EYYMXH447M7z6hkrjhu2jcT4eGap
vQgNTvJyQvmqttq61PSxDY3LPaiXPtMHl0l8fNBxL6vJVYw4Gac4OJJGG1Me
aate596uM3+FuME7GtQu6juR8vI+1ebSUAIfjYYQT8NO9ZjadCAdYYz35Vqe
pby0iUgLPvo5AL6jIdLjRYHEhLFlO6PCGBP/2hCSHH+0F2vvzDVc0P4iGQMn
V0o9KH4FhXR98kaVSIzWSMWUPgbDZUbpaH2QGt4r2ljDjjaW7p3Dn80KMNsQ
v9KgY3Bofx+8fgDe1xvu+oqGaDeoEG/gH/vZSN+ZYfbe22ilTK86SpO4QP9S
a/j76Fo6CtmAWxg//SO7GrYxRGZdQHbLKuTH1OpFAWUHndYDtamNqkVedIhk
5tjKXlmqN5yegXhruQ1mz1bucncx/o+rdslrFhQsg1e7/RqR1yOUDEgPPTsD
3YcBXxH6VG7pdZflNYaK7o2JK3pw8vsvLokWTXLfv3FDyngiugTXXdgQszDe
t/GE2V8WyMMbDhRJaExSSpQRmNjnP79qjbtEJp7zXYqJJR7Iq1OMKGm8pOC7
a6wlu2+sqtU/qxZ3wZmmaEhK/E6GuGq9r+5Ru4d52LTsMl2dK+3SAJ+/icJ6
nOMjeFMiD2uSlmbfRZ9GkxsWUMVmxdcm/Pzz1fX5JWLt2/fnj74w6HaFAy7/
lrbFkb127sG75o70nTVHxy9/+cWQ8WajEPo0yth0OZRTubeqWcQuYfG1t0LE
LUwKO/yfe+aPA+JR9IFwbuLzP9xkkTd+QrP4WDiovmtw9XYAO3kQv2ujgKgr
PmuI9BV0bwhXruAGm7JntsLl7n28xj+boHXiqsIFg67x2mawiafCvrTsQ5/+
CoqXxqgO+0kGqL8Y96Vr09GWonDv0eefgm+Ldb1/gUlIW/VBtqBUTV3Fh3Yy
Gj2fdmmbcZRoGD9Id4z3cit8RdS/egtOhnZXx+Svf+VemA78R1fD/g3qH49f
bRf71/u+Om9v9/TJrkAbSJzByqWZvUejQQDd1rwoJaTuhf3j5KD75vDxHNzj
TP/fvVL4HxI2RLZK2L9yJZCsfXzGR7MUOvH/zqXHkbZerS0dSoxo97Ki+GxB
IwTrLo2WlsTS4LR745TlgqYjJe4/uUkpD/571xovq2b//kZWiWHsi1Ssg0pR
rcujhe7x7oUO6bIPHs3uPGYiH0w9c/Tj0czkk9yn0IT7ub7hwmzko6+5wAE8
8rqckHjTwqQ5cX0XFmOp4fu74uLefr6esUFohwKoCS+FyR3fuqo/MKU0CXIW
CrLmcuXtLVLWYouylihBxuB6cKCCL2DrSqlAUiTXJ+nwnnVUE9yvMmpIK7GG
NIeU2XgvxSoeOjNI112hk15JvgXQh/47/SvAd77KD+eYaRAjPeQSWYYTz70M
0Yvhe8F8B5a34f0i3UvXQIvWM6Jr5slV+ciLQqSM070SRFz82en13dnbU7ag
FNDWpQvJaiF9bLdxfCsBJg6CKNP4/tjDoXUyjxg7c4K0/wnLOrF/wLb4HWaL
Vl/EU9m9w54Y63l4QJLdRVN0M5DAkO7G1jZaMExFSrpYybSJN2olb7Afhlv2
yCqXQnSQOmCDp43dB47yfGvXpJJO0XYyASpP/aB1XrvlP21ya4HINOw1k2Cc
CeC6L7SVXeZZqQrhlVqvrrgVSp06jVTjCayk8am0+qq1f3XW4qOzl+vBPzOo
NM3dVlU2wW+T6Dcpi8Vv0/z8uX/npml0qVfifOiRio9EpU3ICFKtGeROKxb2
bjiDk3V3HJ2ISLlaboY3UgMRdkR8k4hIDZmej+UVu8xG4/pz4t3AQK0PJgwD
TjXhcqfThndh2UtHNRujLwT12HVvprtOao1pQ5xIAQ4l2g40ir+YaFwmPbnz
3eM1KLF2/buAugtGJKW7/N5niOILXkvrDFebcX165/v+V1E7uQXyIPo3xZCe
xUcigoVeoLy4Hpt4WfZ/Lzf9TXIb6hr7Gc27/t2RFtEMr+jEb7qSFrWii2rD
ApbnDz2pj3jRaVdx6K2FjxNc+6+U1KC/6vP8/b3dLu6aJq+tUVjaArpMs5is
VpAWr/qEF04Nygbktm9ztUURwQ9bKPQdH6eXp1/hXKiHsYmlrHSkvc9lqq/z
ZO8PJzmdh/fhKKD7fKINqy77f08Atrx78mU/qr27enWFyPR/AM/JzPSaXQAA

-->

</rfc>
