<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.0.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-webtrans-overview-05" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="WebTransport">The WebTransport Protocol Framework</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-webtrans-overview-05"/>
    <author initials="V." surname="Vasiliev" fullname="Victor Vasiliev">
      <organization>Google</organization>
      <address>
        <email>vasilvv@google.com</email>
      </address>
    </author>
    <date/>
    <area>Applications and Real-Time</area>
    <workgroup>WEBTRANS</workgroup>
    <abstract>
      <t>The WebTransport Protocol Framework enables clients constrained by the Web
security model to communicate with a remote server using a secure multiplexed
transport.  It consists of a set of individual protocols that are safe to expose
to untrusted applications, combined with a model that allows them to be used
interchangeably.</t>
      <t>This document defines the overall requirements on the protocols used in
WebTransport, as well as the common features of the protocols, support for some
of which may be optional.</t>
    </abstract>
    <note>
      <name>Note to Readers</name>
      <t>Discussion of this draft takes place on the WebTransport mailing list
(webtransport@ietf.org), which is archived at
&lt;https://mailarchive.ietf.org/arch/search/?email_list=webtransport&gt;.</t>
      <t>The repository tracking the issues for this draft can be found at
&lt;https://github.com/ietf-wg-webtrans/draft-ietf-webtrans-overview/issues&gt;.
The web API draft corresponding to this document can be found at
&lt;https://wicg.github.io/web-transport/&gt;.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The WebTransport Protocol Framework enables clients constrained by the Web
security model to communicate with a remote server using a secure multiplexed
transport.  It consists of a set of individual protocols that are safe to expose
to untrusted applications, combined with a model that allows them to be used
interchangeably.</t>
      <t>This document defines the overall requirements on the protocols used in
WebTransport, as well as the common features of the protocols, support for some
of which may be optional.</t>
      <section anchor="background">
        <name>Background</name>
        <t>Historically, web applications that needed a bidirectional data stream between a
client and a server could rely on WebSockets <xref target="RFC6455"/>, a message-based
protocol compatible with the Web security model.  However, since the
abstraction it provides is a single ordered stream of messages, it suffers from
head-of-line blocking (HOLB), meaning that all messages must be sent and
received in order even if they are independent and some of them are no longer
needed.  This makes it a poor fit for latency-sensitive applications which rely
on partial reliability and stream independence for performance.</t>
        <t>One existing option available to Web developers are WebRTC data channels
<xref target="RFC8831"/>, which provide a WebSocket-like API for a peer-to-peer SCTP
channel protected by DTLS.  In theory, it is possible to use it for the use
cases addressed by this specification. However, in practice, its use in
non-browser-to-browser settings has been quite low due to its dependency on ICE
(which fits poorly with the Web model) and userspace SCTP (which has very few
implementations available).</t>
        <t>An alternative design would be to open multiple WebSocket connections over
HTTP/3 <xref target="RFC9220"/> in a manner similar to how they are
currently layered over HTTP/2 <xref target="RFC8441"/>.  That would avoid head-of-line
blocking and provide an ability to cancel a stream by closing the corresponding
WebSocket object.  However, this approach has a number of drawbacks, which all
stem primarily from the fact that semantically each WebSocket is a completely
independent entity:</t>
        <ul spacing="normal">
          <li>Each new stream would require a WebSocket handshake to agree on application
protocol used, meaning that it would take at least one RTT to establish each
new stream before the client can write to it.</li>
          <li>Only clients can initiate streams.  Server-initiated streams and other
alternative modes of communication (such as the QUIC DATAGRAM frame
<xref target="RFC9221"/>) are not available.</li>
          <li>While the streams would normally be pooled by the user agent, this is not
guaranteed, and the general process of mapping a WebSocket to a server is
opaque to the client.  This introduces unpredictable performance properties
into the system, and prevents optimizations which rely on the streams being on
the same connection (for instance, it might be possible for the client to
request different retransmission priorities for different streams, but that
would be much more complex unless they are all on the same connection).</li>
        </ul>
        <t>The WebTransport protocol framework avoids all of those issues by letting
applications create a single transport object that can contain multiple streams
multiplexed together in a single context (similar to SCTP, HTTP/2, QUIC and
others), and can be also used to send unreliable datagrams (similar to UDP).</t>
      </section>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
        <t>WebTransport is a framework that aims to abstract away the underlying transport
protocol while still exposing a few key transport-layer aspects to application
developers.  It is structured around the following concepts:</t>
        <dl>
          <dt>WebTransport session:</dt>
          <dd>
            <t>A WebTransport session is a single communication context established between a
client and a server.  It may correspond to a specific transport-layer
connection, or it may be a logical entity within an existing multiplexed
transport-layer connection.  Transport sessions are logically independent
from one another even if some sessions can share an underlying
transport-layer connection.</t>
          </dd>
          <dt>WebTransport protocol:</dt>
          <dd>
            <t>A WebTransport protocol is a specific protocol that can be used to establish
a WebTransport session.</t>
          </dd>
          <dt>Datagram:</dt>
          <dd>
            <t>A datagram is a unit of transmission that is treated atomically.</t>
          </dd>
          <dt>Stream:</dt>
          <dd>
            <t>A stream is a sequence of bytes that is reliably delivered to the receiving
application in the same order as it was transmitted by the sender.  Streams
can be of arbitrary length, and therefore cannot always be buffered entirely
in memory. WebTransport protocols and APIs are expected to provide partial
stream data to the application before the stream has been entirely received.</t>
          </dd>
          <dt>Message:</dt>
          <dd>
            <t>A message is a stream that is sufficiently small that it can be fully buffered
before being passed to the application.  WebTransport does not define messages
as a primitive, since from the transport perspective they can be simulated
by fully buffering a stream before passing it to the application.  However,
this distinction is important to highlight since some of the similar protocols
and APIs (notably WebSocket <xref target="RFC6455"/>) use messages as a core abstraction.</t>
          </dd>
          <dt>Server:</dt>
          <dd>
            <t>A WebTransport server is an application that accepts incoming WebTransport
sessions.</t>
          </dd>
          <dt>Client:</dt>
          <dd>
            <t>A WebTransport client is an application that initiates the transport
session and may be running in a constrained security context, for instance,
a JavaScript application running inside a browser.</t>
          </dd>
          <dt>User agent:</dt>
          <dd>
            <t>A WebTransport user agent is a software system that has an unrestricted
access to the host network stack and can create transports on behalf
of the client.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="common-requirements">
      <name>Common Transport Requirements</name>
      <t>Since clients are not necessarily trusted and have to be constrained by the
Web security model, WebTransport imposes certain requirements on any specific
protocol used.</t>
      <t>All WebTransport protocols MUST use TLS <xref target="RFC8446"/> or a semantically
equivalent security protocol (for instance, DTLS <xref target="RFC9147"/>).
The protocols SHOULD use TLS version 1.3 or later, unless they aim for
backwards compatibility with legacy systems.</t>
      <t>All WebTransport protocols MUST require the user agent to obtain and maintain
explicit consent from the server to send data.  For connection-oriented
protocols (such as TCP or QUIC), the connection establishment and keep-alive
mechanisms suffice.  STUN Consent Freshness <xref target="RFC7675"/> is another example of
a mechanism satisfying this requirement.</t>
      <t>All WebTransport protocols MUST limit the rate at which the client sends data.
This SHOULD be accomplished via a feedback-based congestion control mechanism
(such as <xref target="RFC5681"/> or <xref target="RFC9002"/>).</t>
      <t>All WebTransport protocols MUST support simultaneously establishing multiple
sessions between the same client and server.</t>
      <t>All WebTransport protocols MUST prevent clients from establishing transport
sessions to network endpoints that are not WebTransport servers.</t>
      <t>All WebTransport protocols MUST provide a way for the user agent to indicate
the origin <xref target="RFC6454"/> of the client to the server.</t>
      <t>All WebTransport protocols MUST provide a way for a server endpoint location to
be described using a URI <xref target="RFC3986"/>.  This enables integration with various
Web platform features that represent resources as URIs, such as Content
Security Policy <xref target="CSP"/>.</t>
    </section>
    <section anchor="session-establishment">
      <name>Session Establishment</name>
      <t>WebTransport session establishment is an asynchronous process.  A session is
considered <em>ready</em> from the client's perspective when the server has confirmed
that it is willing to accept the session with the provided origin and URI.
WebTransport protocols MAY allow clients to send data before the session is
ready; however, they MUST NOT use mechanisms that are unsafe against replay
attacks without an explicit indication from the client.</t>
    </section>
    <section anchor="transport-features">
      <name>Transport Features</name>
      <t>All transport protocols MUST provide datagrams, unidirectional and
bidirectional streams in order to make the transport protocols interchangeable.</t>
      <section anchor="features-session">
        <name>Session-Wide Features</name>
        <t>Any WebTransport protocol SHALL provide the following operations on the
session:</t>
        <dl>
          <dt>establish a session</dt>
          <dd>
            <t>Create a new WebTransport session given a URI <xref target="RFC3986"/> and the origin
<xref target="RFC6454"/> of the requester.</t>
          </dd>
          <dt>terminate a session</dt>
          <dd>
            <t>Terminate the session while communicating to the peer an unsigned 32-bit
error code and an error reason string of at most 1024 bytes.  The error code
and string are optional; the default values are 0 and "".</t>
          </dd>
        </dl>
        <t>Any WebTransport protocol SHALL provide the following events:</t>
        <dl>
          <dt>session terminated event</dt>
          <dd>
            <t>Indicates that the WebTransport session has been terminated, either by the
peer or by the local networking stack, and no user data can be exchanged on
it any further.  If the session has been terminated as a result of the peer
performing the "terminate a session" operation above, a corresponding error
code and an error string can be provided.</t>
          </dd>
        </dl>
      </section>
      <section anchor="features-datagrams">
        <name>Datagrams</name>
        <t>A datagram is a sequence of bytes that is limited in size (generally to the path
MTU) and is not expected to be transmitted reliably.  The general goal for
WebTransport datagrams is to be similar in behavior to UDP while being subject
to common requirements expressed in <xref target="common-requirements"/>.</t>
        <t>A WebTransport sender is not expected to retransmit datagrams, though it may
end up doing so if it is using a TCP-based protocol or some other underlying
protocol that only provides reliable delivery.  WebTransport datagrams are not
expected to be flow controlled, meaning that the receiver might drop datagrams
if the application is not consuming them fast enough.</t>
        <t>The application MUST be provided with the maximum datagram size that it can
send.  The size SHOULD be derived from the result of performing path MTU
discovery.</t>
        <t>In the WebTransport model, all of the outgoing and incoming datagrams are
placed into a size-bound queue (similar to a network interface card queue).</t>
        <t>Any WebTransport protocol SHALL provide the following operations on the
session:</t>
        <dl>
          <dt>send a datagram</dt>
          <dd>
            <t>Enqueues a datagram to be sent to the peer.  This can potentially result in
the datagram being dropped if the queue is full.</t>
          </dd>
          <dt>receive a datagram</dt>
          <dd>
            <t>Dequeues an incoming datagram, if one is available.</t>
          </dd>
          <dt>get maxiumum datagram size</dt>
          <dd>
            <t>Returns the largest size of the datagram that a WebTransport session is
expected to be able to send.</t>
          </dd>
        </dl>
      </section>
      <section anchor="features-streams">
        <name>Streams</name>
        <t>A unidirectional stream is a one-way reliable in-order stream of bytes where the
initiator is the only endpoint that can send data.  A bidirectional stream
allows both endpoints to send data and can be conceptually represented as a pair
of unidirectional streams.</t>
        <t>The streams are in general expected to follow the semantics and the state
machine of QUIC streams (<xref target="RFC9000"/>, Sections 2 and 3).
TODO: describe the stream state machine explicitly.</t>
        <t>A WebTransport stream can be reset, indicating that the endpoint is not
interested in either sending or receiving any data related to the stream.  In
that case, the sender is expected to not retransmit any data that was already
sent on that stream.</t>
        <t>Streams SHOULD be sufficiently lightweight that they can be used as messages.</t>
        <t>Data sent on a stream is flow controlled by the transport protocol.  In addition
to flow controlling stream data, the creation of new streams is flow controlled
as well: an endpoint may only open a limited number of streams until the peer
explicitly allows creating more streams.  From the perspective of the client,
this is presented as a size-bounded queue of incoming streams.</t>
        <t>Any WebTransport protocol SHALL provide the following operations on the
session:</t>
        <dl>
          <dt>create a unidirectional stream</dt>
          <dd>
            <t>Creates an outgoing unidirectional stream; this operation may block until the
flow control of the underlying protocol allows for it to be completed.</t>
          </dd>
          <dt>create a bidirectional stream</dt>
          <dd>
            <t>Creates an outgoing bidirectional stream; this operation may block until the
flow control of the underlying protocol allows for it to be completed.</t>
          </dd>
          <dt>receive a unidirectional stream</dt>
          <dd>
            <t>Removes a stream from the queue of incoming unidirectional streams, if one is
available.</t>
          </dd>
          <dt>receive a bidirectional stream</dt>
          <dd>
            <t>Removes a stream from the queue of incoming unidirectional streams, if one is
available.</t>
          </dd>
        </dl>
        <t>Any WebTransport protocol SHALL provide the following operations on an
individual stream:</t>
        <dl>
          <dt>send bytes</dt>
          <dd>
            <t>Add bytes into the stream send buffer.  The sender can also indicate a FIN,
signalling the fact that no new data will be send on the stream.  Not
applicable for incoming unidirectional streams.</t>
          </dd>
          <dt>receive bytes</dt>
          <dd>
            <t>Removes bytes from the stream receive buffer.  FIN can be received together
with the stream data.  Not applicable for outgoing unidirectional streams.</t>
          </dd>
          <dt>abort send side</dt>
          <dd>
            <t>Sends a signal to the peer that the write side of the stream has been aborted.
Discards the send buffer; if possible, no currently outstanding data is
transmitted or retransmitted.  An unsigned 8-bit error code can be supplied
as a part of the signal to the peer; if omitted, the error code is presumed
to be 0.</t>
          </dd>
          <dt>abort receive side</dt>
          <dd>
            <t>Sends a signal to the peer that the read side of the stream has been aborted.
Discards the receive buffer; the peer is typically expected to abort the
corresponding send side in response.  An unsigned 8-bit error code can be
supplied as a part of the signal to the peer.</t>
          </dd>
        </dl>
        <t>Any WebTransport protocol SHALL provide the following events for an individual
stream:</t>
        <dl>
          <dt>send side aborted</dt>
          <dd>
            <t>Indicates that the peer has aborted the corresponding receive side of the
stream.  An unsigned 8-bit error code from the peer may be available.</t>
          </dd>
          <dt>receive side aborted</dt>
          <dd>
            <t>Indicates that the peer has aborted the corresponding send side of the
stream.  An unsigned 8-bit error code from the peer may be available.</t>
          </dd>
          <dt>Data Recvd state reached</dt>
          <dd>
            <t>Indicates that no further data will be transmitted or retransmitted on the
local send side, and that the FIN has been sent.  Data Recvd implies that
aborting send-side is a no-op.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="transport-properties">
      <name>Transport Properties</name>
      <t>WebTransport defines common semantics for multiple protocols to allow them to
be used interchangeably.  Nevertheless, those protocols still have
substantially different performance properties that an application may want to
query.</t>
      <t>The most notable property is support for unreliable data delivery.  The
protocol is defined to support unreliable delivery if:</t>
      <ul spacing="normal">
        <li>Resetting a stream results in the lost stream data no longer being
retransmitted, and</li>
        <li>The datagrams are never retransmitted.</li>
      </ul>
      <t>Another important property is pooling support.  Pooling means that multiple
transport sessions may end up sharing the same transport layer connection, and
thus share a congestion controller and other contexts.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Providing untrusted clients with a reasonably low-level access to the network
comes with risks.  This document mitigates those risks by imposing a set of
common requirements described in <xref target="common-requirements"/>.</t>
      <t>WebTransport mandates the use of TLS for all protocols implementing it.  This
has a dual purpose.  On one hand, it protects the transport from the network,
including both potential attackers and ossification by middleboxes.  On the
other hand, it protects the network elements from potential confusion attacks
such as the one discussed in Section 10.3 of <xref target="RFC6455"/>.</t>
      <t>One potential concern is that even when a transport cannot be created, the
connection error would reveal enough information to allow an attacker to scan
the network addresses that would normally be inaccessible.  Because of that, the
user agent that runs untrusted clients MUST NOT provide any detailed error
information until the server has confirmed that it is a WebTransport endpoint.
For example, the client must not be able to distinguish between a network
address that is unreachable and one that is reachable but is not a WebTransport
server.</t>
      <t>WebTransport does not support any traditional means of HTTP-based
authentication.  It is not necessarily based on HTTP, and hence does not support
HTTP cookies or HTTP authentication.  Since it requires TLS, individual
transport protocols MAY expose TLS-based authentication capabilities such as
client certificates.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>There are no requests to IANA in this document.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC6454">
          <front>
            <title>The Web Origin Concept</title>
            <author fullname="A. Barth" initials="A." surname="Barth">
              <organization/>
            </author>
            <date month="December" year="2011"/>
            <abstract>
              <t>This document defines the concept of an "origin", which is often used as the scope of authority or privilege by user agents.  Typically, user agents isolate content retrieved from different origins to prevent malicious web site operators from interfering with the operation of benign web sites.  In addition to outlining the principles that underlie the concept of origin, this document details how to determine the origin of a URI and how to serialize an origin into a string.  It also defines an HTTP header field, named "Origin", that indicates which origins are associated with an HTTP request.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6454"/>
          <seriesInfo name="DOI" value="10.17487/RFC6454"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee">
              <organization/>
            </author>
            <author fullname="R. Fielding" initials="R." surname="Fielding">
              <organization/>
            </author>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="CSP" target="https://www.w3.org/TR/CSP/">
          <front>
            <title>Content Security Policy Level 3</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC6455">
          <front>
            <title>The WebSocket Protocol</title>
            <author fullname="I. Fette" initials="I." surname="Fette">
              <organization/>
            </author>
            <author fullname="A. Melnikov" initials="A." surname="Melnikov">
              <organization/>
            </author>
            <date month="December" year="2011"/>
            <abstract>
              <t>The WebSocket Protocol enables two-way communication between a client running untrusted code in a controlled environment to a remote host that has opted-in to communications from that code.  The security model used for this is the origin-based security model commonly used by web browsers.  The protocol consists of an opening handshake followed by basic message framing, layered over TCP.  The goal of this technology is to provide a mechanism for browser-based applications that need two-way communication with servers that does not rely on opening multiple HTTP connections (e.g., using XMLHttpRequest or &lt;iframe&gt;s and long polling).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6455"/>
          <seriesInfo name="DOI" value="10.17487/RFC6455"/>
        </reference>
        <reference anchor="RFC8831">
          <front>
            <title>WebRTC Data Channels</title>
            <author fullname="R. Jesup" initials="R." surname="Jesup">
              <organization/>
            </author>
            <author fullname="S. Loreto" initials="S." surname="Loreto">
              <organization/>
            </author>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen">
              <organization/>
            </author>
            <date month="January" year="2021"/>
            <abstract>
              <t>The WebRTC framework specifies protocol support for direct, interactive, rich communication using audio, video, and data between two peers' web browsers. This document specifies the non-media data transport aspects of the WebRTC framework. It provides an architectural overview of how the Stream Control Transmission Protocol (SCTP) is used in the WebRTC context as a generic transport service that allows web browsers to exchange generic data from peer to peer.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8831"/>
          <seriesInfo name="DOI" value="10.17487/RFC8831"/>
        </reference>
        <reference anchor="RFC9220">
          <front>
            <title>Bootstrapping WebSockets with HTTP/3</title>
            <author fullname="R. Hamilton" initials="R." surname="Hamilton">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>The mechanism for running the WebSocket Protocol over a single stream of an HTTP/2 connection is equally applicable to HTTP/3, but the HTTP-version-specific details need to be specified. This document describes how the mechanism is adapted for HTTP/3.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9220"/>
          <seriesInfo name="DOI" value="10.17487/RFC9220"/>
        </reference>
        <reference anchor="RFC8441">
          <front>
            <title>Bootstrapping WebSockets with HTTP/2</title>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <date month="September" year="2018"/>
            <abstract>
              <t>This document defines a mechanism for running the WebSocket Protocol (RFC 6455) over a single stream of an HTTP/2 connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8441"/>
          <seriesInfo name="DOI" value="10.17487/RFC8441"/>
        </reference>
        <reference anchor="RFC9221">
          <front>
            <title>An Unreliable Datagram Extension to QUIC</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly">
              <organization/>
            </author>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear">
              <organization/>
            </author>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi">
              <organization/>
            </author>
            <date month="March" year="2022"/>
            <abstract>
              <t>This document defines an extension to the QUIC transport protocol to add support for sending and receiving unreliable datagrams over a QUIC connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9221"/>
          <seriesInfo name="DOI" value="10.17487/RFC9221"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC7675">
          <front>
            <title>Session Traversal Utilities for NAT (STUN) Usage for Consent Freshness</title>
            <author fullname="M. Perumal" initials="M." surname="Perumal">
              <organization/>
            </author>
            <author fullname="D. Wing" initials="D." surname="Wing">
              <organization/>
            </author>
            <author fullname="R. Ravindranath" initials="R." surname="Ravindranath">
              <organization/>
            </author>
            <author fullname="T. Reddy" initials="T." surname="Reddy">
              <organization/>
            </author>
            <author fullname="M. Thomson" initials="M." surname="Thomson">
              <organization/>
            </author>
            <date month="October" year="2015"/>
            <abstract>
              <t>To prevent WebRTC applications, such as browsers, from launching attacks by sending traffic to unwilling victims, periodic consent to send needs to be obtained from remote endpoints.</t>
              <t>This document describes a consent mechanism using a new Session Traversal Utilities for NAT (STUN) usage.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7675"/>
          <seriesInfo name="DOI" value="10.17487/RFC7675"/>
        </reference>
        <reference anchor="RFC5681">
          <front>
            <title>TCP Congestion Control</title>
            <author fullname="M. Allman" initials="M." surname="Allman">
              <organization/>
            </author>
            <author fullname="V. Paxson" initials="V." surname="Paxson">
              <organization/>
            </author>
            <author fullname="E. Blanton" initials="E." surname="Blanton">
              <organization/>
            </author>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document defines TCP's four intertwined congestion control algorithms: slow start, congestion avoidance, fast retransmit, and fast recovery.  In addition, the document specifies how TCP should begin transmission after a relatively long idle period, as well as discussing various acknowledgment generation methods.  This document obsoletes RFC 2581.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5681"/>
          <seriesInfo name="DOI" value="10.17487/RFC5681"/>
        </reference>
        <reference anchor="RFC9002">
          <front>
            <title>QUIC Loss Detection and Congestion Control</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar">
              <organization/>
            </author>
            <author fullname="I. Swett" initials="I." role="editor" surname="Swett">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes loss detection and congestion control mechanisms for QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9002"/>
          <seriesInfo name="DOI" value="10.17487/RFC9002"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar">
              <organization/>
            </author>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol.  QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances.  Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1cW3MbR3Z+n1/RkR8ipQCSutiW6SS7NCmtmJJEhoTs2trd
cjWABjCrwQx2eoYQ1qX/nu9c+jIgZGsdJy/JllcigZnu0+f6nUtrPB4XXdlV
7tRMVs784KaT1tZ+07SduW6brpk1lXnZ2rXbNu37wk6nrbs7HTxXzJtZjQdO
zby1i25cum4x3rppRw+MmzvX3pVuOz75spjbDk/9dHE2efGxmOGXZdPuTo3v
5gWtvmybfoO1X3w3uTl7e1sU5aY9NV3b++7Jyck3J08K2zp7as42m6rE62VT
e2PrublxthpPyrUrCt/hgx9t1dTYaed8sSlPzZ9wjJHxoLV1C4+fdmv64S9F
Yftu1bSnhRkXBv8ra39qvj8y31tfVqW74w/lbN+Xs65ph9807dLW5d+ZklPz
h6ZZVo6/cGtbVqfmjh6+u/v9kr85mjVrnKleNO0ar9w5bGvOb69P+ZXOtkvX
nZpV12386fHxdrs92j49whbHk5tjPHYsj4msHpw3defqzty6Wd+W3c5cN+DJ
zrx2d64yTx/ww/F0RqkFc5+e868iih/A9bJemgsSXFGMx2Njpx6Cm+G3z9AH
42o7rZw3M/Ck7vA3RILXy9rNzXRnOlmi8IHKdTMHeV2DB9frviYpOrMtu5Wx
pnXrBr956ItrTe+JMGv4VWfWfdWVm8p9cPOiCxQdGXPZ8Z6lx+bNgp/v6Iey
npd35by3ldko2R7k2M5Ah4y3C0dUuA+bxrsCP/U16xnItpl2jYjOKZ9GidQD
8EJV1WxpUbemtaYONIO6EoJpZytbLx14szsiRpbewEj6NUls7hZYkN8zZBxY
Bkf/W1/i/MzDpubvEtm0LA5U5MIYGevN1uFdK0sRQ/HmwtkO/GJmDFaB1vcb
FiP0D7YAY8Ej21U5W5m13RH5zYYObasj0YQa0vjxLf3RNT/CxOau9UVxUfpZ
7z0elC3oaKQ9UOD32HZT2ZkLRxhoD5kEibSCrIqHwT/QV78nj0Ga/mikBGFR
Cx7CRiCPrvjzvwaroEX0m6Pw1jF9cOwd//U7Nr0faZN/y/f4878fiUa3DiIv
YcrQTug5qz/RWnrfg35iTnaoma2JM4umr/coWUIf+inZ9LE4vGX0ecc/5weP
ZSOih8jB9+bs+jJs17SQ3aaB8hJZjZISVOfT1GzL2fJISSqbY6w6jkc/5rOT
RNflfA4PVXxhLqHuzbyfkcD/39L/L1v6F1+Y72AGFHvreVG8An+bFlypqt2I
tTPnkrCjdm5O7DPTco6zzGQtCikQCkKsXWOPbutcbWwh+sJh2gaJz5q+moMV
1Y5YgMPeNrP3Dgz56aff3bw8/+rZl19+/DgiGTjv7dKNp5b4HU5IHNiAIOij
CEuVzwyVDzrzqtkiHrbgSFnDLeG5IsQ3cmBlR1yD8oCL5HLoMQRqREr4OpxQ
DwPuKSHgLd7x/WIBX2gWLQL6Co5x3CzG8G3OTKtGPMrDV1evv4M7WzsABPYw
okZxIai570gUXrlTgJGOHV5ZCwEGpINGlu6OlRmq7jYOfyhDSbYq/jU/UDcG
yGfp2kJkBBawSq7ZN4N0azYNlGJRinJUMMp6thuDCPhE7D6UtugMyakAtza2
7UpLKlyVdgpnDkYzFcKlRNzM8eIb1zLUwe/Qsyuwx32AdhE7RP+MvSN3TmKE
VZEA54Remg0xl46Dj24m56JYZGe1q3whOvL8+dPHpCNCokoRx4vKBIG8d+xa
iRac27l23DVj+tvcnk+uC12RDQdKLH7sYvL6lpwNWyaCBAscHIT38KVSCis1
ykDSPPwKMOvBYDufwyB98Ih4zW/crFwoQ4+SPkLGG9bCmaMdvKxZF3VTj6ct
nI0Qqz+SqyO+ebOCD5iSYcGLwIPCLZl5z0TRIlEAbFeX5y8QZ5k/C/qWJA+L
G1gMG8ojFiMoaP2Gojdxx+ibtCEo3sHdbItyDb9Mritg7yC/RxDwGeRZwSHW
jG1Biy+XtdmyqU+ZRAi2ju49SYrcei1exLOfLF5NJtfHT9UbfPPkycnHj8Qx
+AOSGNhRrgkG0JorcCDYRwHrb0EdDlnZHVswLWd4uSe63PNnz6A4bBgwSSHP
3jXl3OSWXERLJtZE9QINqvgU2EizK5N83g7BsfEBUAxieZFO20z/isPmzok1
BYbXNlY5bk3dr6cgHcYNZLCdwkP7oOxwI0hzYPGbtlzbtsRxyRPxpgvolDgb
DyBUd+LIjaOFEwns68iJVq4j4879Cv6P850Wxb+YF/RW7bbhgFt12xzBclsD
zfXcr+BkiC922TqGgJkvQc4RvTcFuT3PWAZJEIgEsjGVs3CPSOLMzWTC8RuJ
3RSobsVnwXIZXVMHU3TCdIk2BJS2LVkIW8YRDnNVV7sEXvB9WcPjESiRVTwk
csvhaRy+Ca5NkswG67fYOFdyMh8OwAnkkF976HuSk4Tr/3x3eW6Q8p794ebs
DSQFQIVVom5DGR+p7+6SQRHFP6zKSk4VyBAe1eRUSaqwKth0lQAYmTDYjyOq
UuE/LIvtlr0FnugccZ4OQ0/jOcIkJJgZvBaHOYhMwFiSLUk0BO7SY61mY/8m
PidxPASaUnEluNLXG1ggsmZ28FkwoA3xa1c6Wg1vyEJ+R0o9UoOj2EcICYFi
rRl2Ho8CdAqcmToOK6Rn/DGYnLkV85B8NZL7jvZnl74ul6tOOKiOPbhzVaGu
wVqk69A8My8p4tPHrWNMui4lBYIJAi3RUfj99JwSNjLTXgwSq0VfuCb1WJPO
ihF+ALMqEkGM9AQVwhGHZ3l0dACvR9taRLzOPs3LQoQQGh9zHGhLJQGlGIT7
GUjuXIJBEX2rzxJbJdsBOR2gf3LmetwiA+/g4NKRzYjr1jXpTfehg4kkH07x
ZqReeiT2QoCIDc4/Eo3Q1MdWvhGUjPeAWhC2asEjWJtwwrIldchXf3dx/Uhw
7nlTk1bFstEF4fOSfxeevnc78A5ce/Dm3e3kwUj+Nm+v+OebFyDt5sUF/Xz7
6uz16/hDeOL21dW71/i+0J/Sm+dXb968eHshL+NTs/fRm7M/PpCDPri6nlxe
vT17/YD4RlZcxISCNEPyD049YCWcxlDg97O2nAp4/O782jx+Bg/zT/AwTx4/
/gbRU355/vjrZx8/FtuVq2Wzhpyi/Cqqt9kgjWaBQW9mdlN2lhIKbOERaWvE
yJbA3ED5OJokxROoW0IK5DkUbRu7teqjEGYAQ9j1xwpi1N8t+zyARGzPKZt4
I4APEk56Y8wBHnQBX3WyUxZsEoyUvJGAGJK+GeVL4BenOhIuG8rsaA/o5cxt
On+6dzjAOjJ0fHxqzsyhrwaZwzAOBGWPwYtcdcyMjDmQGwnBlKYl/KAuWKHk
PhNonegdRoYcXRfyPAuEuCQMoGGdwR9Jt05YPM+3zT0Op6XJxe+fXWC67gFV
yoAE1mJUQjHc1mzLMaHhvCUuQaYN8NAyvkrq8fPE7IkpKBDLaV9QUbtEUoGP
8ePo1jSxH+ANqpbag4IHDRfqcVQ9ggOSjaAHXKAYBAyBO9BY9rVUxWnWwjws
d8teVBcLaRXTTHGIQieWm+465+M66vx2cAEVEEkr1Hdc6KJ8UhiZGYd4FQ0r
kmdaTg23hFeE1K5LmIKcLKvlrbp4E1hFRZh2WuKdlgJKvexWEVy0AsnwJMOa
CtZPQRrRkAPknPWRE0tCAACDiIa7o8NiE2eNTE60DW5BsjWcMwBzTU2xmHKN
U0ZlRH74DCrqkzGjChSZkIhDIG8kW1eJaO6uIpHXgxyoJlDOSsk+POGziGxD
1a5nzKYMAKlKi0CXjfU+yS4jGZwfcGXeOAZ1Wl2KBQWSMtFFSQGn8qHoEXOD
FM7JMxITCcKy31cSETV7KgkwdbsBxVqiGwBuopk+L7vDdIcEh0EZFcbY42jp
BTq3JmIsYy2zAh6rGJMJ1VlpI6Z7USHorEElHoIXbAAJseZVpEecWceqi5XM
h3xNqgOR5bHzPezlFfly9pepksS5GUcN6DA8P/Fi0Bgz0clhi3N29oe20DDw
iS1CNuKHQkyLMy/U4bd9zVkVQ668RBtLYxqTRmYAiYmj5j+QftwCR2y6ARVp
TS81Fq1K4EzvYsJx6FwpHVGTaRbdlouyDPXleJzu1gzjQGw5E+0jvnof1Arg
laqOHeMLUDx7HzGhYtbIFi6qTt3KVgtKVRZ5jkKF73MpniYib/KCrPnpC6mu
jvM67UfoBytlSB9DuoZgRIrFKXgsKoOwlb0LQO1+mby4X6kcDflGhkHlpBmS
JELZ+zVjW+9iFCsGaTWVYeB5PuFGGcySOUxe3wZE+OzZV4CHXCHLKwYFbXln
K05lAq1xq7106kLW44T28bOvYXTS20g7KxwOe8OgWHEfHz01WoVsR8McqFyT
ghZU+IDKzH2s+Ur5hYtYlVva2U61yX/G2UPpYpgrc2lqypwWSyo5uSkQaGAD
pbQd6LnoSdUnhBSEgg3c3csmRyhj5IV4KStb+1QXmACi42lKdR6NtFoUk9UI
PdYBHL53bjO2FN+LtaOyZenXIeQ4Cs2Td28pu2EqX8KQVjVxUkTy9Vdff0n1
M59g2AdLWSeso6ASuy4IRNCVfiHIfMXQIqrdZ/C2orAjwIOTyE6z9SylJmZ5
4ZZ0SlQtCKjOOBMWiHxXWsb8bk7il+I/MQgOPMLqtqkS6UVkrBz5y6+ePxat
Vq08OXnCWvmLpwidE46EUG/X9J7qZ0EkOWAuIoINmD6l6wnYK6z/5a215hGd
DGvbYOPk++POUMHgF8HcTVPSm7H5RT7qQDD7HFNJFXVK3LJSd2Y01Hmjtl7B
Da62XMKCxK0g9j4jAeTuNzjzf4Ah+yTEOlQ4K1KPECqbYuqyPDg0Fd/dXCpN
T795/pUWfqF6oZ1JiTQgO6/BTuUO7hxCZy+9gWeiqlXqtTFrWwdZeakG+aZv
ZwIssBX33kQTdUCj2B/Q+NP57fVfOBTdavh+kdv74fRzzycoUvC7erZqmxrk
hiLeESU/KTEtuGMqzawfESnnux+TFxOx/LMfwEEqBuQ+jsIzFlmU7Zr6sQpp
QcAWKbo2qQUE6VuydWwyqBDnQT/IJMCoo8PpGyR/9kdpt0Y7yL3sAL+nU/LJ
vqVeQCioI4SE0o0CwOg2o3X0NTeH7dJSKCOpIsssbEf4wvMJmr6TVFkDgSo8
7brHRRZoOs9L1RdR8u6XNDwWrigIDnqqVAcbdllDxTN2CcGfNVfehxA/7jTs
UjsphanujX+g7QO1BH+Cpo+VvR+psbP7RD4txa9wimFBhcovWleUQmaRSimp
mG+DGIEez0P5kUr7B61gWVIB4b5Rx5K2KBmX1++7IS3msu/Bn4DrWu2MFEzi
pwNd5ppUVtkJoxmOm4qCXqnZBS1/+mSMjBgEuLZlOMBdozlrEX+CM3qsSVCX
mLSgQLkmePv45Mkzye3ZRblsBU139B1S3dC//5apQCZoEZPguioq79IDJ1JL
fHD0a8Un9XfIKnAhcmwu34Fdl+r/1abuTfyEV2OKndYYGVcyFlFMbISVTfiA
HXsVYhsRxLBf6gt1I4FI+sKSuroPouJzaQJQq7umDLalXaiothjI9ABJkhtC
9YmVYabCcX1Nmxehs/fggPY8SAqP1LKh9NvujfOwQLlat68UKlk9SnCZYqkX
saidW2f0GGSfe3WnTxeLGKNJkdiXf3fmobaAql1UaNutijeTd9ISlvbRoOIy
dYMiUSg/qc6GltKywR+E34eli3iU0utaIbUvJWm7K5tQs1ezk+qI77kBUeg4
UbOXE4FA7bszAjmUwn0kS9hXT6psHTpkbPJ0uWumeLBcaXW14N7Dxswbpq+h
sqYExoA8gPEVukaD03EcaSXmpc5hKZKr8nEwJbU3pMK3u1cRimxVzFfsCWzB
4VRAc3Wv95pqhaBJ2mLzttmkZQsZQRkWEYVpBC/6YBeASdS0dTWxSbtU+Tsc
8jL9TiBhbT8Ab6+THrN2ZvWzgmSlOsbfpcwBPOSpmRiQkwVnZkt6baDXxbz0
s4a5WBSXh6YUJR+PbTMIq++WTZgEiHWeAdMLnnqcSy/TMoXjKTcZYIm9G7Sj
bATsHJgXNHAxQ4Yrjz761Q775+It4ycbaYbrflHzdj77NFhkBtXJ/QXATM5p
0xCkLdlhKJvL0HKNy4jFkgptiCXCROEDlqGaIs6oCjck6sIFour7jB7RUtRM
KH3eJi+WrmP96e8pEFa8cXCXtVTOKhqw9p3oj8o2nZ1B4af6OxTPhyYVhpZY
LwVRKS4bYCj5jH30HrDLq/s41ZhSnGjpJVUPyDelATRx5FuqrLNwtSrYsP9i
NSWnEfOi2NLICxRn5hCULHS6cQqvlCeROezOOrDaKOtVCTQTCuFzY8uWpg0P
ntarU4hTFTzSFoNGzmLRaw3ZUpbyEeUBCiDpXNvZigrg2I1bxmHVhzHnP6EB
sdswWfSE339Ktamri6vTmCvmzQBe2YSVA+7n3sx+8JAXlCnEhG4U84PctUaR
6CwGW73zGoYVBRGn2Yjb1LZhAMPch17YLjUHZGseUitUzt6NsmYNbZUzkzx1
FtLiuvwytX1sxRlUwbYf6s66TehK5dWaQbODq/Zbx4EjnHo3aKdhh1CA156Z
CTvZzBD2wlRAgvdzGpnPs/M59+4JFAxeFbQY20BaX6PkQofW0+iQP7BvoeO2
p4zPgvSovs4mxkNsNkKpNKcVVuyhrFVCj0mJwhixkEKFJEpl0/TRyxDB8nx8
UEIZFWGqZ8/sUsRxIebwZLT60GR+v31siUMjB00+pnXs1GMoPfjst1J2TDia
exo0h5d4Sl3lTFyBPdlQQTyQcnshDfFQjZeZN/LZkfCDTvEw3Yce/V8mO0XO
TzH8xq2BcLIeZYRG9zXjsJ/OYi3lnlm0Tbt/gmv/k5v/FsoLLJldGPCh4c6h
jmMstbHm+nM2nKbxgR/jhmhAo+Jxyd3xbFKoiYIBLy/fUl+NKgNWa2WDCc26
YU/ErpiqaYq+5sPZNuzzlkf4FEqHUbVf4GImq3CsIBo5WmpmyNHi0+F0ID+F
Nx1NDyNdNMwWwHvmaoXWfUp/3uqJUiTMmo8ZqlaC1ltuFVhl3qDcEiOrDHhy
TzI0ivda+rwuWY0xdG2J+0ghTOpBvyVtCzOAI5JJGiIG4XydMMBQ0cg8/eV4
nX1AICurBj2nYlBeCgp99p44JI1OQU1tl5rd+ydmEhvZQIJZtqLGgn4t0zvs
Lk4iS4NQ/wGuEhL4VUwdKtC3aWkCqLtNmETOcInQKO5xWCqJqmC4/Umfe/d5
zCWLU/Z+DnP/mwUyaUvU2SWkYuhTpGUuLDtcMmMecRdcntJ2YM6OXIx6lDjq
8ktcWSRUQfm9zoUdcOm/CaXpzL81mQwbb9zsbq4ovaVB8EOkwoa17jf0rT9n
uAHXGC08xnOEiSZlATnFaAleBp8zyuiCRKl0kHETnwJbxqLPPNzfjJvNXsvg
Og1F71XN9BaZFr5SOkSqFwdws6tvjTZQOrmuVgQYvn9dDc6a2iV4jPruXN/y
+UIyhUmzDIXvp+QJNfVPU86Hp7o1mx7OspBItzLsUwAKtDtNBrn4LTM8cY2d
TFSlS2x7Q755KQxrpPIZDRkxu2Q+WFfI39YX4VL5isON06s1CbBIYcOHObmK
6MunyuIdK6l08JR4pkmsMFh5snL7lTni9l68IO8j1cA0DZUzgeb7pQC60WuQ
1/oJ1fCU07Eh3e3XLjyzXUuVNGMZUAh3qdPj++OVcohu1fswmXmg/15x70Mv
RoS5Iq+tTW16nmv/0eqU9TX7UgEDYWImNPri5VDqkPBIF7R4XPGF9uE8kFbQ
CpiE0/fa0r/3oVYVB6ZpEm6pnoGUm5+ixJJHbMK1UwoPxaG68mCs+tN15b1r
zvU8TmtR6xGOkGZeOFBU+R3VeJtKZuiU+ELu/8h91r6lSSB8c1UzJKZ7NiO9
ttjJ5PMgQ45eVDk0AtidVT0znOs7sYJnpM/JN+1IhlCXRRyS3OlN4WnzgdtR
V+IcRdCHaYhTCJXyjklJ21EPuZdpNWmwFvkdGTrbXC6WC7O1amMen9CI0GIw
0qeXCQdrz1xbSyUM9sBjxtzIthlvdBZ1qrUAxVJFPnjD4SjccrpzPDYtNf/w
jzbwpIH6V1tHJrK3oTp1zopwG1Cpun95p6xFrQl6gsvfuZlVhaEXhLx84oJn
DxBCD9hObHanq2o0EtwhflLDjjtP+SFSkeJQn99kff69omgoiBwVNO6kk0Sj
rEYhF1uV06FMKpOfy55avnEAPpqxMiq2qchfI7bzy3JLwcXv0jd0sUbbEEMa
izhhcnhwNoQFYhHUQ6pItlKPCu7TTRS9ckz/gobjoTidab2Mm+bDf9LnAV/p
VYEMK27B7W/KVxvB6OY9xclG7iaae7vIuGHZBXfkyYWMcpR5cKbg7I96z50e
1+bTcG260yFXGGl/NcFwR5vmDcULOHHjl2dvz+658AnXoPW2sfbU2TPz03pn
Jbpg/ZcHaJCr+C8maeDjbEYAAA==

-->

</rfc>
