<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.2.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-axu-dnsop-catalog-zone-xfr-properties-02" category="std" consensus="true" submissionType="IETF" updates="9432" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="catalog-zone-xfr-properties">DNS Catalog Zone Properties for Zone Transfers</title>

    <author initials="A." surname="Suhonen" fullname="Aleksi Suhonen">
      <organization abbrev="TREX">TREX Regional Exchanges Oy</organization>
      <address>
        <postal>
          <street>Kuninkaankatu 30 A</street>
          <city>Tampere</city>
          <code>33200</code>
          <country>FI</country>
        </postal>
        <email>i-d-2025@ssd.axu.tm</email>
      </address>
    </author>
    <author initials="W." surname="Toorop" fullname="Willem Toorop">
      <organization>NLnet Labs</organization>
      <address>
        <postal>
          <street>Science Park 400</street>
          <city>Amsterdam</city>
          <code>1098 XH</code>
          <country>NL</country>
        </postal>
        <email>willem@nlnetlabs.nl</email>
      </address>
    </author>
    <author initials="A." surname="Buddhdev" fullname="Anand Buddhdev">
      <organization>RIPE NCC</organization>
      <address>
        <postal>
          <street>Stationsplein 11</street>
          <city>Amsterdam</city>
          <code>1012 AB</code>
          <country>NL</country>
        </postal>
        <email>anandb@ripe.net</email>
      </address>
    </author>
    <author initials="K." surname="Dyson" fullname="Karl Dyson">
      <organization>Nominet UK</organization>
      <address>
        <postal>
          <street>Oxford Science Park</street>
          <city>Oxford</city>
          <code>OX4 4DQ</code>
          <country>UK</country>
        </postal>
        <email>karl.dyson@nominet.uk</email>
        <uri>https://nominet.uk</uri>
      </address>
    </author>
    <author initials="A." surname="Sargsyan" fullname="Aram Sargsyan">
      <organization>Internet Systems Consortium</organization>
      <address>
        <email>aram@isc.org</email>
      </address>
    </author>

    <date year="2026" month="March" day="27"/>

    <area>Operations and Management Area</area>
    <workgroup>DNSOP Working Group</workgroup>
    <keyword>DNS</keyword> <keyword>authoritative</keyword> <keyword>catalog zones</keyword> <keyword>properties</keyword>

    <abstract>


<?line 80?>

<t>This document specifies DNS Catalog Zones Properties that define the primary name servers from which specific or all member zones can transfer their associated zone, as well as properties related to zone transfers such as access control.</t>

<t>This document also defines a <spanx style="verb">groups</spanx> property, for the apex of the catalog zone, as a location to assign the additional properties to certain catalog zone groups.</t>

<t>Besides the additional properties, this document updates RFC9432 by explicitly allowing CNAME and DNAME records.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-axu-dnsop-catalog-zone-xfr-properties/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        dnsop Working Group mailing list (<eref target="mailto:dnsop@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dnsop/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dnsop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/DNS-Hackathon/catalog-extensions-draft"/>.</t>
    </note>


  </front>

  <middle>


<?line 88?>

<section anchor="introduction"><name>Introduction</name>

<t><xref target="RFC9432">DNS Catalog Zones</xref> described a method for automatic DNS zone provisioning among DNS name servers by the catalog of zones to be provisioned as one or more regular DNS zones.
Configuration associated with the member zones, such as from which primary name servers and with which <xref target="RFC8945">TSIG keys</xref> to transfer the zones, and from which IP addresses and with which TSIG keys <xref target="RFC1996">DNS notifies</xref> are allowed, were assumed to be preprovisioned at the catalog consumer.</t>

<t>This document specifies DNS Catalog Zones Properties to specify primary name servers from which to transfer the member zones, as well as properties to specify which IP addresses, using which cryptographic keys, are allowed to notify the secondary name server serving the member zones, in order to:</t>

<t><list style="symbols">
  <t>remove the necessity to preprovision those at the catalog consumers,</t>
  <t>to facilitate ad-hoc changes, and</t>
  <t>to facilitate exceptions for individual member zones.</t>
</list></t>

<section anchor="requirements-language"><name>Requirements language</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
</section>
<section anchor="catalog-zone-structure"><name>Catalog Zone Structure</name>

<t>The new properties, specified in <xref target="new-properties"/>, <bcp14>MAY</bcp14> be at the apex of the catalog zone, where they will affect all member zones, or under a member zone label, where they will affect just that member zone. Any property under a member zone label will override that same property at the apex, which, in its turn, <bcp14>MAY</bcp14> override any default value coming from the configuration file. If the catalog consumer's configuration does not allow overriding its default values by a catalog zone (e.g., because of security considerations), then the catalog consumer <bcp14>SHOULD</bcp14> communicate to the operator (e.g., through a log message) information about the properties that are ignored because of the configuration.</t>

<t>When a property is overriden, the new property replaces all RRs of the old property. For example, both TXT and AAAA RRs defined at the apex are ignored for <spanx style="verb">ZONELABEL1</spanx>, but not ignored for <spanx style="verb">ZONELABEL2</spanx>, because <spanx style="verb">ZONELABEL2</spanx> does not override the <spanx style="verb">primaries</spanx> property:</t>

<figure><artwork type="ascii-art"><![CDATA[
label.primaries.$CATZ            0 IN AAAA 2001:db8:35::53
label.primaries.$CATZ            0 IN TXT "TSIG key"

ZONELABEL1.zones.$CATZ           0 IN PTR example.com.
primaries.ZONELABEL1.zones.$CATZ 0 IN A 192.0.2.53

ZONELABEL2.zones.$CATZ           0 IN PTR example.net.
]]></artwork></figure>

<section anchor="binding-additional-attributes"><name>Binding additional attributes</name>

<t>It is possible to distinguish groups of values with all the properties from <xref target="new-properties"/>, by adding an additional label before the property.
This allows binding additional attributes within the group, for example binding TSIG keys to certain IP addresses.</t>

</section>
<section anchor="cname-and-dname-records"><name>CNAME and DNAME Records</name>

<t>This document updates <xref target="RFC9432"/> by explicitly allowing CNAME <xref target="RFC1035"/> and DNAME <xref target="RFC6672"/> anywhere in the catalog.
The CNAME and DNAME RRs in a catalog zone <bcp14>MUST</bcp14> refer to names within the same (catalog) zone.
When a CNAME and DNAME RRs refer to owner names outside of the (catalog) zone, they <bcp14>MUST</bcp14> be considered invalid and <bcp14>MUST</bcp14> be ignored.</t>

<t>For example, using some of the properties from <xref target="new-properties"/>:</t>

<figure><artwork type="ascii-art"><![CDATA[
ZONELABEL1.zones.$CATZ                0 IN PTR example.com.
ZONELABEL1.zones.$CATZ                0 IN DNAME ( 
                                             customer1.config.$CATZ )

primaries.customer1.config.$CATZ      0 IN A 192.0.2.53
primaries.customer1.config.$CATZ      0 IN TXT "TSIG key"
allow-transfer.customer1.config.$CATZ 0 IN CNAME ( 
                                         internal.acls.config.$CATZ )

internal.acls.config.$CATZ            0 IN APL ( 1:10.0.0.0/8
                                             2:fd00:0:0:0:0:0:0:0/8 )
]]></artwork></figure>

</section>
</section>
<section anchor="schema-version-version-property"><name>Schema Version (version property)</name>

<t>For this memo, the value of the version.$CATZ TXT resource record is unchanged.</t>

<t><xref section="3" sectionFormat="of" target="RFC9432">DNS Catalog Zones</xref> is clear that "Catalog
consumers <bcp14>MUST</bcp14> ignore any RRs in the catalog zone for which no
processing is specified or which are otherwise not supported by the
implementation." and as such the addition of the records outlined in
this document will be ignored by implementations that do not
recognise them.</t>

</section>
<section anchor="new-properties"><name>New Properties</name>

<section anchor="primaries"><name>Primaries</name>

<t>This property defines which server(s) the member zone(s) will be fetched from. The RR types on this property <bcp14>MUST</bcp14> be either A or AAAA. If there are multiple RRs, the order in which they are used or tried is undefined.
The order may be used following the default selection process in use by the catalog consumer name server software.</t>

<t>Different primaries <bcp14>MAY</bcp14> be distinguished by an additional label, which will allow binding additional attributes to each server.</t>

<figure><artwork type="ascii-art"><![CDATA[
primaries.$CATZ                  0 IN A 192.0.2.53

ZONELABEL1.zones.$CATZ           0 IN PTR example.com.
primaries.ZONELABEL1.zones.$CATZ 0 IN AAAA 2001:db8:35::53
]]></artwork></figure>

<t>If there are any RRs attached to the <spanx style="verb">primaries</spanx> that are not defined by this document, they <bcp14>SHOULD</bcp14> be ignored.</t>

<section anchor="tsig-key-name"><name>TSIG Key Name</name>

<t>The <spanx style="verb">primaries</spanx> property, with or without the extra label, <bcp14>MAY</bcp14> also have a TXT resource record set (RRset), which <bcp14>MUST</bcp14> consist of a single TXT RR, which will contain the name of the TSIG key to use to protect zone transfers. The key(s) <bcp14>MUST</bcp14> be defined elsewhere, such as in the configuration file of the consumer.
If the key cannot be found, the consumer <bcp14>MUST NOT</bcp14> attempt a zone transfer from the name server addresses for which the TXT RRset was an additional attribute.
A TXT RRset for a <spanx style="verb">primaries</spanx> property containing more than a single TXT RR indicates a broken catalog zone that <bcp14>MUST NOT</bcp14> be processed (see <xref section="5.1" sectionFormat="of" target="RFC9432"/>).</t>

<figure><artwork type="ascii-art"><![CDATA[
ZONELABEL2.zones.$CATZ               0 IN PTR example.net.
ns1.primaries.ZONELABEL2.zones.$CATZ 0 IN AAAA 2001:db8:35::53
ns1.primaries.ZONELABEL2.zones.$CATZ 0 IN TXT "keyname-for-ns1"
ns2.primaries.ZONELABEL2.zones.$CATZ 0 IN AAAA 2001:db8:35::54
ns2.primaries.ZONELABEL2.zones.$CATZ 0 IN TXT "keyname-for-ns2"
]]></artwork></figure>

</section>
<section anchor="signalling-encrypted-transports"><name>Signalling encrypted transports</name>

<t>The <spanx style="verb">primaries</spanx> property, <em>with</em> the extra label, <bcp14>MAY</bcp14> also have a TLSA RRset with one or more TLSA RRs <xref target="RFC6698"/>.
The presence of a TLSA RRset signals support of DNS over TLS (DoT) <xref target="RFC7858"/> or DNS over QUIC (DoQ) <xref target="RFC9250"/> by the primary and the means by which the catalog consumer can successfully authenticate the primary.
TLSA RRsets <bcp14>MUST</bcp14> be prepended by two labels (below the <spanx style="verb">property</spanx> label <em>with</em> the extra label) indicating the decimal representation of the port number (see <xref section="3" sectionFormat="of" target="RFC6698"/>) and the protocol name of the transport (see <xref section="4" sectionFormat="of" target="I-D.draft-ietf-dnsop-svcb-dane-05"/>).
Catalog consumers <bcp14>MUST</bcp14> transfer member zone and incremental updates over either DoT or DoQ in the presence of a TLSA RRset.</t>

<t>An authentication domain name (see <xref section="2" sectionFormat="of" target="RFC8310"/>) <bcp14>MAY</bcp14> be provided by a PTR RRset, which <bcp14>MUST</bcp14> consist of a single PTR RR, at the same name as the TLSA RRset.
When an authentication domain name is provided, catalog consumer <bcp14>MUST</bcp14> send the TLS SNI extension containing that name.</t>

<t>For the same reasons as given in <xref section="3.1.3" sectionFormat="of" target="RFC7672"/>, the TLSA RRs with certificate usage PKIX-TA(0) or PKIX-EE(1) <bcp14>SHOULD NOT</bcp14> be included. Catalog consumers <bcp14>SHOULD</bcp14> treat such RRs as "unusable" and ignore the affected <spanx style="verb">primaries</spanx> property. Catalog consumers <bcp14>SHOULD</bcp14> also communicate the error to the operator (e.g., through a log message).</t>

<figure><artwork type="ascii-art"><![CDATA[
ZONELABEL2.zones.$CATZ                          0 IN PTR example.net.
ns1.primaries.ZONELABEL2.zones.$CATZ            0 IN AAAA (
                                                    2001:db8:35::53 )
_853._quic.ns1.primaries.ZONELABEL2.zones.$CATZ 0 IN PTR (
                                                   ns1.example.net. )
_853._quic.ns1.primaries.ZONELABEL2.zones.$CATZ 0 IN TLSA (
                                              3 1 1 \<SHA-256 pin\> )
]]></artwork></figure>

</section>
</section>
<section anchor="notify"><name>Notify</name>

<t>This property <bcp14>MAY</bcp14> be used to define the DNS NOTIFY <xref target="RFC1996"/> message sending behavior of the consumer for the target zone(s).
A and AAAA RRsets list hosts that the consumer will send DNS NOTIFY messages to when it loads a new version of the target zone(s).</t>

<t>An additional label below the property name <bcp14>MAY</bcp14> be used to distinguish different groups of addresses, which will allow binding additional attributes to each group.</t>

<section anchor="tsig-key-name-1"><name>TSIG Key Name</name>

<t>The <spanx style="verb">notify</spanx> property, with or without the extra label, <bcp14>MAY</bcp14> also have a TXT RRset, which <bcp14>MUST</bcp14> consist of a single TXT RR, which will contain the name of the TSIG key to use to sign the NOTIFY message.
The key(s) <bcp14>MUST</bcp14> be defined elsewhere, such as in the configuration file of the consumer.
If the key cannot be found, the consumer <bcp14>MUST NOT</bcp14> notify the name server addresses for which the key was an additional attribute.
A TXT RRset for a <spanx style="verb">notify</spanx> property containing more than a single TXT RR indicates a broken catalog zone that <bcp14>MUST NOT</bcp14> be processed (see <xref section="5.1" sectionFormat="of" target="RFC9432"/>).</t>

<figure><artwork type="ascii-art"><![CDATA[
notify.$CATZ                      0 IN A 192.0.2.49
notify.$CATZ                      0 IN TXT "name-of-default-key"

ZONELABEL3.zones.$CATZ            0 IN PTR example.org.
notify.ZONELABEL3.zones.$CATZ     0 IN AAAA 2001:db8:35::53
notify.ZONELABEL3.zones.$CATZ     0 IN TXT "keyname-for-ns4"

ns5.notify.ZONELABEL4.zones.$CATZ 0 IN AAAA 2001:db8:35::54
ns5.notify.ZONELABEL4.zones.$CATZ 0 IN TXT "keyname-for-ns5"
]]></artwork></figure>

<t>If there are any RRs attached to the <spanx style="verb">notify</spanx> property that are not defined by this document, they <bcp14>SHOULD</bcp14> be ignored.</t>

</section>
</section>
<section anchor="allow-query"><name>Allow Query</name>

<t>The <spanx style="verb">allow-query</spanx> property <bcp14>MAY</bcp14> be used to define an access list of hosts or networks that are allowed to send queries for the target zone(s).
The property <bcp14>MAY</bcp14> contain a RRset of type <xref target="RFC3123">APL</xref>, which <bcp14>MUST</bcp14> consist of only a single APL RR.
The prefixes listed in the APL RR are processed in order:
  - An IP address is allowed to query the zone when it matches a prefix.
  - An IP address is denied to query the zone when it matches a negated prefix.</t>

<t>The absence of an <spanx style="verb">allow-query</spanx> property at both apex of the catalog as well as at a member zone, means that the default policy applies, which may be that the member zone is allowed to be queried from any IP address without TSIG key.</t>

<t>Additional attributes (such as TSIG keys) can be bound to specific APL RRs by an additional label below the property label.
The prefixes (with or without attributes) will be processed in <xref section="6" sectionFormat="of" target="RFC4034">canonical order</xref>, which means that the RRsets at the <spanx style="verb">allow-query</spanx> property label will be processed first, followed by the RRsets with the additional label in canonical order.
When a catalog consumer encounters an APL RRset containing more that a single APL RR, it <bcp14>MUST</bcp14> be interpreted as an APL RRset containing a single APL RR denying all IP addresses, i.e.: <spanx style="verb">APL !1:0.0.0.0/0 !2:0:0:0:0:0:0:0:0/0</spanx>.</t>

<section anchor="tsig-key-name-2"><name>TSIG Key Name</name>

<t>The <spanx style="verb">allow-query</spanx> property <bcp14>MAY</bcp14> also have a TXT RRset, which will (further) restrict the zone to be queryable only with the TSIG keys indicated in any of the TXT RRs in the set.
The key(s) <bcp14>MUST</bcp14> be defined elsewhere, such as in the configuration file of the consumer.</t>

<t>If a TXT RRset is present together with an APL RR, then first the policies in the APL are applied, and if that results in queries being allowed for the IP address, then in addition a TSIG key <bcp14>MUST</bcp14> match any of the TXT RRs in the TXT RRset.
If a TXT RRset is present without an APL RRset, then only a TSIG key <bcp14>MUST</bcp14> match in any of the TXT RRs in the TXT RRset, regardless of the querying IP address.</t>

<t>If an <spanx style="verb">allow-query</spanx> property is present <em>and</em> contains APL RRsets and/or TXT RRsets (either directly below the property label or below the additional label), <em>and</em> none of the ACLs and/or TSIG keys matched or could be found, then the consumer <bcp14>MUST NOT</bcp14> allow queries for the member zone to which the property applies.</t>

<figure><artwork type="ascii-art"><![CDATA[
ZONELABEL5.zones.$CATZ                         0 IN PTR (
                                                     example.local. )
00-internal.allow-query.ZONELABEL5.zones.$CATZ 0 IN APL (
                                1:10.0.0.0/8 2:fd00:0:0:0:0:0:0:0/8 )
50-external.allow-query.ZONELABEL5.zones.$CATZ 0 IN TXT "keyname"
]]></artwork></figure>

</section>
</section>
<section anchor="allow-transfer"><name>Allow Transfer</name>

<t>The <spanx style="verb">allow-transfer</spanx> property <bcp14>MAY</bcp14> be used to define an access list of hosts or networks that are allowed to transfer the target zone(s) from the consumer.
The property <bcp14>MAY</bcp14> contain a RRset of type <xref target="RFC3123">APL</xref>, which <bcp14>MUST</bcp14> consist of only a single APL RR.
The prefixes listed in the APL are processed in order:
  - An IP address is allowed to query the zone when it matches a prefix.
  - An IP address is denied to query the zone when it matches a negated prefix.</t>

<t>The absence of an <spanx style="verb">allow-transfer</spanx> property at both apex of the catalog as well as at a member zone, signifies that transfers of the zone from the consumer <bcp14>MUST NOT</bcp14> be allowed.
Additional attributes (such as TSIG keys) can be bound to specific APL RRs by an additional label below the property label.
The prefixes (with or without attributes) will be processed in <xref section="6" sectionFormat="of" target="RFC4034">canonical order</xref>, which means that the RRsets at the <spanx style="verb">allow-transfer</spanx> property label will be processed first, followed by the RRsets with the additional label in canonical order.
When a catalog consumer encounters an APL RRset containing more that a single APL RR, it <bcp14>MUST</bcp14> be interpreted as an APL RRset containing a single APL RR denying all IP addresses, i.e.: <spanx style="verb">APL !1:0.0.0.0/0 !2:0:0:0:0:0:0:0:0/0</spanx>.</t>

<section anchor="tsig-key-name-3"><name>TSIG Key Name</name>

<t>The <spanx style="verb">allow-transfer</spanx> property <bcp14>MAY</bcp14> also have a TXT RRset, which will (further) restrict the zone to be transferable only with the TSIG key indicated in any of the TXT RRs in the set.
The key(s) <bcp14>MUST</bcp14> be defined elsewhere, such as in the configuration file of the consumer.
If a TXT RRset is present together with an APL RR, then first the policies in the APL are applied, and if that results in transfers being allowed for the IP address, then in addition a TSIG key <bcp14>MUST</bcp14> match any of the TXT RRs in the TXT RRset.
If a TXT RRset is present without an APL RRset, then only a TSIG key <bcp14>MUST</bcp14> match in any of the TXT RRs in the TXT RRset, regardless of the querying IP address.</t>

<t>If an <spanx style="verb">allow-transfer</spanx> property is present <em>and</em> contains APL RRsets and/or TXT RRsets (either directly below the property label or below the additional label), <em>and</em> none of the APLs and/or TSIG keys matched or could be found, then the consumer <bcp14>MUST NOT</bcp14> allow transfers of the member zone to which the property applies.</t>

<figure><artwork type="ascii-art"><![CDATA[
ZONELABEL5.zones.$CATZ                            0 IN PTR (
                                                     example.local. )
00-internal.allow-transfer.ZONELABEL5.zones.$CATZ 0 IN APL (
                                1:10.0.0.0/8 2:fd00:0:0:0:0:0:0:0/8 )
50-external.allow-transfer.ZONELABEL5.zones.$CATZ 0 IN TXT "keyname"
]]></artwork></figure>

<t>If there are RRs other than APL, CNAME, or TXT attached to the allow-transfer property, or if neither an APL RR, nor a TXT RR can be found and there is also no CNAME that points to a meaningful RR (APL or TXT), then the most restrictive access list possible <bcp14>SHOULD</bcp14> be assumed.</t>

</section>
</section>
</section>
<section anchor="groups"><name>Assigning properties to groups</name>

<t>It is possible to assign the properties from this document to catalog groups (see <xref section="4.3.2." sectionFormat="of" target="RFC9432"/>).
To this end this document introduces the <spanx style="verb">groups</spanx> property.</t>

<section anchor="groups-the-groups-property"><name>Groups (the <spanx style="verb">groups</spanx> property)</name>

<t>The list of catalog groups that have properties assigned to it, is specified as a collection of member nodes represented by TXT RRs under the owner name "groups" where "groups" is a direct child domain of the catalog zone.
The names of member zones are represented on the RDATA side of a TXT record (instead of being represented as a part of owner names) so that all valid group names may be represented.
This TXT record <bcp14>MUST</bcp14> be the only record in the TXT RRset with the same name.
The presence of more than one record in the RRset indicates a broken catalog zone that <bcp14>MUST NOT</bcp14> be processed (see <xref section="5.1." sectionFormat="of" target="RFC9432"/>).
For example, if a catalog zone lists two catalog groups ("foo" and "bar"), the member node RRs would appear as follows:</t>

<figure><artwork type="ascii-art"><![CDATA[
<unique-1>.groups.$CATZ 0 IN TXT "foo"
<unique-2>.groups.$CATZ 0 IN TXT "bar"
]]></artwork></figure>

<t>where <spanx style="verb">&lt;unique-N&gt;</spanx> is a label that tags each record in the collection and has a unique value.
When different <spanx style="verb">&lt;unique-N&gt;</spanx> labels hold the same TXT value (i.e., provide more than a single place to assign properties to the same group), the catalog zone is broken and <bcp14>MUST NOT</bcp14> be processed (see <xref section="5.1." sectionFormat="of" target="RFC9432"/>).</t>

<t>Properties assigned to a catalog group, below an entry below the <spanx style="verb">groups</spanx> property extends the configuration that was already associated with that group.
If the existing configuration for the group had a configuration value that is also targeted with property assigned for the group, then the assigned property's value <bcp14>MUST</bcp14> override the original value.
If there was no existing group yet, then an entry below the <spanx style="verb">groups</spanx> property defines the new group.</t>

</section>
</section>
<section anchor="implementation-and-operational-notes"><name>Implementation and Operational Notes</name>

<t>One of the rationales for allowing CNAME and DNAME records is that a large and complex catalog may have large and complex access lists repeated many times. But if there are only a few different access lists, they could be defined separately and then be referenced many times, reducing both the size and processing effort of the catalog zone.</t>

<t>Alternatively, a group property may be used for this, which will or will not have additional properties assigned to it under the <spanx style="verb">groups</spanx> property (see <xref target="groups"/>).</t>

</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>IANA is requested to add the following entries to the "DNS Catalog Zones Properties" registry under the "Domain Name System (DNS) Parameters" page:</t>

<texttable>
      <ttcol align='left'>Property Prefix</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Status</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>groups</c>
      <c>List of catalog groups</c>
      <c>Standards track</c>
      <c>[this document]</c>
      <c>primaries</c>
      <c>Primary name servers</c>
      <c>Standards Track</c>
      <c>[this document]</c>
      <c>notify</c>
      <c>Send DNS NOTIFY behavior</c>
      <c>Standards track</c>
      <c>[this document]</c>
      <c>allow-transfer</c>
      <c>Allow zone transfer from</c>
      <c>Standards track</c>
      <c>[this document]</c>
      <c>allow-query</c>
      <c>Allow queries from</c>
      <c>Standards track</c>
      <c>[this document]</c>
</texttable>

</section>
<section anchor="implementation-status"><name>Implementation Status</name>

<t><strong>[NOTE to the RFC Editor: Please remove this section before publication]</strong></t>

<t>This section records the status of known implementations of the protocol defined by this specification at the time of posting of this Internet-Draft <xref target="RFC7942"/>.</t>

<t>The existing BIND 9 implementation of <spanx style="verb">primaries</spanx>, <spanx style="verb">allow-transfer</spanx> and <spanx style="verb">allow-query</spanx> was a major inspiration for writing this draft.</t>

</section>
<section anchor="security-and-privacy-considerations"><name>Security and Privacy Considerations</name>

<t>The original RFC for Catalog Zones already covers a lot of security and privacy considerations, and they are all still valid, but there are also new security considerations introduced by this document.</t>

<section anchor="private-zone-exfiltration"><name>Private Zone Exfiltration</name>

<t>If the Catalog Zone producer and consumer are different organizations, the producer may be able to use a crafted Catalog Zone to exfiltrate a private zone on another server within the consumer's network by listing it in the Catalog Zone with more permissive query or transfer access lists. The producer needs to know the exact name of the private zone and an address of the primary where the consumer may fetch it from.</t>

<t>There are two ways to approach this security issue. One is to make sure that the consumer organisation does not allow zone transfers for private zones on the consuming server. Another approach is to sanitize the incoming Catalog Zone before consuming it, removing anything sensitive from it.</t>

</section>
</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC9432">
  <front>
    <title>DNS Catalog Zones</title>
    <author fullname="P. van Dijk" initials="P." surname="van Dijk"/>
    <author fullname="L. Peltan" initials="L." surname="Peltan"/>
    <author fullname="O. Surý" initials="O." surname="Surý"/>
    <author fullname="W. Toorop" initials="W." surname="Toorop"/>
    <author fullname="C.R. Monshouwer" initials="C.R." surname="Monshouwer"/>
    <author fullname="P. Thomassen" initials="P." surname="Thomassen"/>
    <author fullname="A. Sargsyan" initials="A." surname="Sargsyan"/>
    <date month="July" year="2023"/>
    <abstract>
      <t>This document describes a method for automatic DNS zone provisioning among DNS primary and secondary name servers by storing and transferring the catalog of zones to be provisioned as one or more regular DNS zones.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9432"/>
  <seriesInfo name="DOI" value="10.17487/RFC9432"/>
</reference>

<reference anchor="RFC8945">
  <front>
    <title>Secret Key Transaction Authentication for DNS (TSIG)</title>
    <author fullname="F. Dupont" initials="F." surname="Dupont"/>
    <author fullname="S. Morris" initials="S." surname="Morris"/>
    <author fullname="P. Vixie" initials="P." surname="Vixie"/>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
    <author fullname="B. Wellington" initials="B." surname="Wellington"/>
    <date month="November" year="2020"/>
    <abstract>
      <t>This document describes a protocol for transaction-level authentication using shared secrets and one-way hashing. It can be used to authenticate dynamic updates to a DNS zone as coming from an approved client or to authenticate responses as coming from an approved name server.</t>
      <t>No recommendation is made here for distributing the shared secrets; it is expected that a network administrator will statically configure name servers and clients using some out-of-band mechanism.</t>
      <t>This document obsoletes RFCs 2845 and 4635.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="93"/>
  <seriesInfo name="RFC" value="8945"/>
  <seriesInfo name="DOI" value="10.17487/RFC8945"/>
</reference>

<reference anchor="RFC1996">
  <front>
    <title>A Mechanism for Prompt Notification of Zone Changes (DNS NOTIFY)</title>
    <author fullname="P. Vixie" initials="P." surname="Vixie"/>
    <date month="August" year="1996"/>
    <abstract>
      <t>This memo describes the NOTIFY opcode for DNS, by which a master server advises a set of slave servers that the master's data has been changed and that a query should be initiated to discover the new data. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="1996"/>
  <seriesInfo name="DOI" value="10.17487/RFC1996"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="RFC1035">
  <front>
    <title>Domain names - implementation and specification</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1035"/>
  <seriesInfo name="DOI" value="10.17487/RFC1035"/>
</reference>

<reference anchor="RFC6672">
  <front>
    <title>DNAME Redirection in the DNS</title>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <author fullname="W. Wijngaards" initials="W." surname="Wijngaards"/>
    <date month="June" year="2012"/>
    <abstract>
      <t>The DNAME record provides redirection for a subtree of the domain name tree in the DNS. That is, all names that end with a particular suffix are redirected to another part of the DNS. This document obsoletes the original specification in RFC 2672 as well as updates the document on representing IPv6 addresses in DNS (RFC 3363). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6672"/>
  <seriesInfo name="DOI" value="10.17487/RFC6672"/>
</reference>

<reference anchor="RFC6698">
  <front>
    <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
    <date month="August" year="2012"/>
    <abstract>
      <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6698"/>
  <seriesInfo name="DOI" value="10.17487/RFC6698"/>
</reference>

<reference anchor="RFC7858">
  <front>
    <title>Specification for DNS over Transport Layer Security (TLS)</title>
    <author fullname="Z. Hu" initials="Z." surname="Hu"/>
    <author fullname="L. Zhu" initials="L." surname="Zhu"/>
    <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <author fullname="D. Wessels" initials="D." surname="Wessels"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="May" year="2016"/>
    <abstract>
      <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
      <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7858"/>
  <seriesInfo name="DOI" value="10.17487/RFC7858"/>
</reference>

<reference anchor="RFC9250">
  <front>
    <title>DNS over Dedicated QUIC Connections</title>
    <author fullname="C. Huitema" initials="C." surname="Huitema"/>
    <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <date month="May" year="2022"/>
    <abstract>
      <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9250"/>
  <seriesInfo name="DOI" value="10.17487/RFC9250"/>
</reference>

<reference anchor="RFC8310">
  <front>
    <title>Usage Profiles for DNS over TLS and DNS over DTLS</title>
    <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
    <author fullname="D. Gillmor" initials="D." surname="Gillmor"/>
    <author fullname="T. Reddy" initials="T." surname="Reddy"/>
    <date month="March" year="2018"/>
    <abstract>
      <t>This document discusses usage profiles, based on one or more authentication mechanisms, which can be used for DNS over Transport Layer Security (TLS) or Datagram TLS (DTLS). These profiles can increase the privacy of DNS transactions compared to using only cleartext DNS. This document also specifies new authentication mechanisms -- it describes several ways that a DNS client can use an authentication domain name to authenticate a (D)TLS connection to a DNS server. Additionally, it defines (D)TLS protocol profiles for DNS clients and servers implementing DNS over (D)TLS. This document updates RFC 7858.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8310"/>
  <seriesInfo name="DOI" value="10.17487/RFC8310"/>
</reference>

<reference anchor="RFC7672">
  <front>
    <title>SMTP Security via Opportunistic DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS)</title>
    <author fullname="V. Dukhovni" initials="V." surname="Dukhovni"/>
    <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
    <date month="October" year="2015"/>
    <abstract>
      <t>This memo describes a downgrade-resistant protocol for SMTP transport security between Message Transfer Agents (MTAs), based on the DNS-Based Authentication of Named Entities (DANE) TLSA DNS record. Adoption of this protocol enables an incremental transition of the Internet email backbone to one using encrypted and authenticated Transport Layer Security (TLS).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7672"/>
  <seriesInfo name="DOI" value="10.17487/RFC7672"/>
</reference>

<reference anchor="RFC3123">
  <front>
    <title>A DNS RR Type for Lists of Address Prefixes (APL RR)</title>
    <author fullname="P. Koch" initials="P." surname="Koch"/>
    <date month="June" year="2001"/>
    <abstract>
      <t>The Domain Name System (DNS) is primarily used to translate domain names into IPv4 addresses using A RRs (Resource Records). Several approaches exist to describe networks or address ranges. This document specifies a new DNS RR type "APL" for address prefix lists. This memo defines an Experimental Protocol for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3123"/>
  <seriesInfo name="DOI" value="10.17487/RFC3123"/>
</reference>

<reference anchor="RFC4034">
  <front>
    <title>Resource Records for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4034"/>
  <seriesInfo name="DOI" value="10.17487/RFC4034"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">




<reference anchor="I-D.draft-ietf-dnsop-svcb-dane-05">
   <front>
      <title>Using DNSSEC Authentication of Named Entities (DANE) with DNS Service Bindings (SVCB) and QUIC</title>
      <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
         <organization>Meta Platforms, Inc.</organization>
      </author>
      <author fullname="Robert Evans" initials="R." surname="Evans">
         <organization>Google LLC</organization>
      </author>
      <date day="3" month="March" year="2025"/>
      <abstract>
	 <t>   Service Binding (SVCB) records introduce a new form of name
   indirection in DNS.  They also convey information about the
   endpoint&#x27;s supported protocols, such as whether QUIC transport is
   available.  This document specifies how DNS-Based Authentication of
   Named Entities (DANE) interacts with Service Bindings to secure
   connections, including use of port numbers and transport protocols
   discovered via SVCB queries.  The &quot;_quic&quot; transport name label is
   introduced to distinguish TLSA records for DTLS and QUIC.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-svcb-dane-05"/>
   
</reference>

<reference anchor="RFC7942">
  <front>
    <title>Improving Awareness of Running Code: The Implementation Status Section</title>
    <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
    <author fullname="A. Farrel" initials="A." surname="Farrel"/>
    <date month="July" year="2016"/>
    <abstract>
      <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
      <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="205"/>
  <seriesInfo name="RFC" value="7942"/>
  <seriesInfo name="DOI" value="10.17487/RFC7942"/>
</reference>




    </references>


<?line 384?>

<section anchor="example-catalog-with-one-of-everything"><name>Example Catalog with One of Everything</name>

<figure><artwork type="ascii-art"><![CDATA[
primaries.$CATZ                       0 IN A 192.0.2.53

ZONELABEL1.zones.$CATZ                0 IN PTR example.com.
primaries.ZONELABEL1.zones.$CATZ      0 IN AAAA 2001:db8:35::53

ZONELABEL2.zones.$CATZ                0 IN PTR example.net.
ns1.primaries.ZONELABEL2.zones.$CATZ  0 IN AAAA 2001:db8:35::53
ns1.primaries.ZONELABEL2.zones.$CATZ  0 IN TXT "keyname-for-ns1"
ns2.primaries.ZONELABEL2.zones.$CATZ  0 IN AAAA 2001:db8:35::54
ns2.primaries.ZONELABEL2.zones.$CATZ  0 IN TXT "keyname-for-ns2"

notify.$CATZ                          0 IN A 192.0.2.49

ZONELABEL3.zones.$CATZ                0 IN PTR example.org.
notify.ZONELABEL3.zones.$CATZ         0 IN AAAA 2001:db8:35::53
notify.ZONELABEL3.zones.$CATZ         0 IN TXT "no default notifies"

ZONELABEL4.zones.$CATZ                0 IN PTR sub.example.org.
notify.ZONELABEL4.zones.$CATZ         0 IN AAAA 2001:db8:35::54
notify.ZONELABEL4.zones.$CATZ         0 IN TXT ""

ZONELABEL5.zones.$CATZ                0 IN PTR example.local.
allow-query.ZONELABEL5.zones.$CATZ    0 IN APL 1:10.0.0.0/8 (
                                  !1:0.0.0.0/0 !2:0:0:0:0:0:0:0:0/0 )
allow-transfer.ZONELABEL5.zones.$CATZ 0 IN APL !1:0.0.0.0/0 (
                                               !2:0:0:0:0:0:0:0:0/0 )
]]></artwork></figure>

</section>
<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>Thanks everybody who helped making this work possible.</t>

</section>
<section numbered="false" anchor="contributors"><name>Contributors</name>

<t>Thanks to all of the contributors.</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA+1c63LbRrL+j6eYMKdqJRcJi7okFisnCS0psSqypEjKyWWT
WoPAkMQKBBgMIIlxnGfZZzlPdvoyA8yAIE3ZyW7qVOxKLAFz6enpy9c9Pej1
el4RF4kciM7x+bU4CoogySbihyyV4jLP5jIvYqnEOMv52U0epGosc9XxgtEo
l3cDEXKf3i/wvvcwznvzqp8H7+QkyxcDoYrI87woC9NgBrNFeTAuesFD2YtS
lc17awbp7ex6qhzNYqXiLC0Wc+h+enLzhZeWs5HMB14Ekwy8MEuVTFWpBqLI
S+kBZXtekMtgIC5gpKCAzkoEaSReBmkwkTOZFmII7737LL+d5Fk5HwjgwcWl
+BYexOlEfIkPvVu5gBbRwBM9fI//BGUxzfK4gEHvJD7Q5AskX+EDiwd3Mi2B
PiH0HLRg+JVX4s4lxCyIE93m81gWYz/LJ/A4yMPpQEyLYq4GT59iI3wCs/um
0VN88HSUZ/dKPqX+T3HOuJiWI1pY70UQ3gZAePrUcFs+FMAyZEyPNgQ6JMBM
VQy8co5sBWYe7u/teh6vGHkAbYQYl0nCGzlM5K2KxXUJ48qUXsYpdBv6zjMg
cCBurk6+E1dyAhMGiTh5CKdBOgHpulhQGyNQ2IweqCKXshiIr8o0Tm+DAP4r
SrG3I4b0OowLEKybYAaclvwki4Ckvb3dnR39e5kWKH1fnNLvkrkb96Le7s7u
wedKRT7IoF/MzMJ4Ud/GSSJn4ibLctoqvaZvffsRLen8LJWFOAtGyqH4Ooxl
GoIKBfmt2K+oQer6O4fPxHcvrBUMZ6qQeRTMXJrPz2ya74mkz9ME5ktgOj9N
XJqHKcr28zKKppG8czbCeUhkX51enojzoyOX6IKVZJ7IOBX9vkN0f1cMnz+W
6ABpGn2ex3PpA90uwV8FeSKOFyqzpOYr33rCDM5mMbL4m68cWl/Cw/wuEC+y
UknnzUk0K4ERLwLg10JcZUHkvL54AFsWORtkrYrfWgu/+G5f7B9/7S5S06IX
eQvr8COk+vOUifVLHrPM41pn7XfOvuXBTFwH+UQtgob+2A+JGacp8By5cb0A
7s+UOILtysDMlDOH7TDk57EKte3w0iyfkakaeF6cjq3fej0wZiPgTRAWnncz
jZUAE12SbVRzGcZjtP5Nz6Bs11BMg0JEcgyLg58lWL54FuQLWp1QsEngLMQ4
z2bifhqHUzNsCCsSsEdiJtGKs+UEO5qC9WYXg6PF0EapLIzBFkXUpgsPxL2E
jvBvbWVFLhNqU2TUrBpFCVXCrNA4CEOpYArwIXmW+M3lBonK9DqgrXhF1lq9
MnMsuuQEcYXBXD6IbEw/24afSAtEkoWkR0gKEB9PUu4VRXHBls8iG9qE8GMA
CmcPxb5CAZHPpYojYvOKIbrwyl6HNtzi6osjNN1itBDyYZ7EIODJAjme3aO/
OTofvjwhd3hMP+UyBMnHGVEmZnEUJdLzPkSRy7OoDHFez3v9+gMz7taSVGy/
eQMMVGEej2AjAthZ8BkRsQ3cR4ZCF5Is0QphBXcx+h6kJphl8H9854gN0G4z
GXjOYgJcG1kj4GxK4KAw1SzLJaxmUoKHrGaDdYGqjONJyUDAlqp7cJE0jS2J
3UpsLNFtFW1kIQ3BbZhDzw73D8TWzfXplwLgA3EGaLYl20yD3a0pTi9xl3MQ
VLk0dDWcnqR/ePgRb0OaFaSpOA9AHt5lGXVBUfA3pUA0oopr0mFc4bAYURQ0
zpfUY1NrkOmWi7cagiZDXPa3a7k1/DK/uqJUKEz8JswX8yKb5MEcfiW2dW3e
4FDENhYxBeKfRg1y6R8ccZk80FdQF6Q8AzMqAPHlcpbdsQlMJVoacCg4ic1v
eJspuYrnqksDQZ9xEMYJwkvU+d40C4WGSiQvLa3kQyjnjHBR3eI0iu/iqAxc
8wqb+uGHAMB+LuOc8K8CuJdOSkDDuN0SuSQQ6yrRefnN9U2ny/+K8wv6+erk
629Or06O8efrF8Ozs+oHT7e4fnHxzdlx/VPd8+ji5cuT82PuDE+F88jrvBx+
32Ft6Fxc3pxenA/POshl17jhBrIYx+gKgbcFKb9X2x3o8/zo8n//1d/XarLb
7x+CXmjF7H+8D7/cT2XKs2VpstC/wp4svGA+lwFykJxTGMyBwQnLo5pm96mY
gkoBI5/8HTnz00B8Mgrn/f1P9QNcsPPQ8Mx5SDxbfrLUmZnY8qhlmoqbzvMG
p116h987vxu+Ww8/+SxBv97rP/vsUw/dgRMgXkOgFRZlrqUnlfeOXzImg/bk
9Wt4bUV1b950BRCAW6nVYbVbvUee0/YQDBbBeCzDYgk9dNH8A/aD3wP7BQj5
SCYrh/lnqQpGMVYfH/D0ovL9q0flkUDx8xzcNA+j0IJUXa3Vddk0kfWIQfmA
dSlzoRoggFkBhARlUoi7ICmBFYgbJ2w4iTWOHxvHCdB6Om41KH9TjdZRBjYU
rB4bQTMrDo/kOPOS8w1cULIl/YnfhS0LA0DduFdgNgHkwipxSqBfh9nbpExp
K1FCSzCsC4B6jBkCcgXQNKM4HTZRT1RMAQVNpoSpJsB7pcBSbYsKwqIfH2Vl
oXGnC0nRVAD2AjQQ2RQvsRB0+VukNai3DCyO2RA2C7ZoL8DSz5MgRP8MW391
pcywWRJVjXzxBaxDPkBwmoAEjzLw4jff3ZDJGcIf6sdoM3IUwCYbTfmrHy7O
T86Gz0/O+q9gHFgs7l97i91X9ebYT+t9twQVmrCHBo7VKBec2W+//QbWLozj
XpAXHkm5X7X0/+toePODsP7siNNzXhJE3f1BNHo22DsYDA72NuyKXOkYaNPx
vHq9PjutZjfqdXlzZbjrgyT5Xj3NigGYTtE/3PV3/F0f6Kun2t10KgzgkEHk
SJ+jm0XwWsPyoCjAC5WAvz3vtEBBmmeABEYJyXgUqwI6lLGaaoCPoqPVjYAe
SlRDmEnx26wn6mfEBKQ2DWyXRnKc5dIebOEzpCPdB/VeRz1RE7MCE6Uc/Wg2
VH1rRGrFMTYkY8TRjDWuONZoQkwTudRBBnjqteGLxsE7ewcIfKvx+fFHH328
S48XbPhjxx755LKWKAOtRNfv2j1y7LkkoJoRQHQYRPZ+S/fYZvdhbErbBNVI
ACfgBx4PzBgaUGNL3OEYmzAdI1kZW/KsID5xxHlN/VobB+C9Y4MYHKtsVk3y
dilbMgdv1c41KvqIvsysLeE13679E4Inh+XlfZ8tvJ5g27Osw4o2limzTcQj
+jXsGElqzwQ4q7pTz6NHL5bAL2isH4SJWlrsmrdNPg8vz2Di/qC/49Pfp88e
x/HdwTja2Rk4f58+AyLYRorrcCpngfgfCG7QW2/d6R+MSdpmGSWQD9gqY2/L
wEcLqe6iF4BcBtOSlXkodc4CrWyZcoCEQv/69bWkdIXYwzHekrCAzmGCiJ9A
Q0e/96qYjLWKVYrQmTYRTZRK9pEjzzQDuckoBERkpSwgXLVBNw+YQOb3MThr
dM2qnM+zHMMZznp4MWoOGkaGKR3S8UDns+x0kOGUTuGgKUkIV8Sp54ZPBFZH
Fi4CrOPMYtJ5FBt7OOAkRQJh+BnacnEOQKgO98m6Xxod0fa8wkkmmabzfhRS
b6ntZjSNjwxhY1mAxHBGxBdooa+u6KAE0zssJtXwxtzJGPkIegvMRRxi4DDu
F/w3A0gbo9OCjWPx4sAd9lDnIdC0YkuATbRD4ASlliqN0NhZcL9ZsMBZqfE4
M/4IxzX4WclEC6AWA5wLMVkjnVUhYiflkI2L+4BCzOMYApQc960yQyZkspAE
b2MLBNDRho51CPCv9/ngkWRQ7ZTfNP1rgNwq8/kHg7k20EmGxxEAo7Sw0oCE
S0cbNvytIgbURAPLabss9dFeWMcvjqP9EPSAbP9X0OActpMj4jaE3WWkh5YA
/jXRi3wAV2H2DTeZ0tHT4A7obzV6ShZiC5Yli22z0aQQhA0goAWbEAg0QCD5
2P/qypEHzIIH2oyR+GkbYhwYMglFlhJYWYFxsptWZ+2Elqi+RhUN52SiJIGu
Oo1qTOZS9GoFZTrzqKNZpCIMUtwRtAwZaGPXaSlMwgW3Vs7msIMukXXQbGtY
nV+tTTYtnbiEfL3HPH7aqiW+N7QaUmq7dZcNg1HbZgzEcUR3RyhPFxLmDcQo
z25l4xSAxLJaJae80aAAi7eUlKJ2dQd+33Z2b95sL+nvW6OdVn2kiCdVfb9F
J3c31MnNuxOIgo3H/eoBd3vQtQP9d999+v1HdG+Zfrdj4j1AM6DwYEhxT2VK
+WW0Jihs6LnVOp1/gsr+ZANVP7seGikkM2Edaph3VXxz+OzNG3ZNc5BoOs8k
tbcGUUSyMugC3yMMwjwANgNQlN1s6wE/fnYAA+J0VZOvvzk9wjZfmzaHuwc7
HJXZZ32ITNirAy/wZa1VS84Oj/jAKKAYYxXBgoopwLrqTFA9KqysWoeqTAym
0yX4ZTbP9xkzUokt+D94OG3Yme2vdCzczvxto361/w5h4gTzO8ROhkRVsITs
45KTpvJVOJO3ZLviB5rOLMwSx8RWAtMcZh9bfHbaO/a5OgYrO3R5jLoLR70o
SGVv54B0+6h5dsAMqiyfnahEamKQV4Z5SRVn0w5r9ARiQBuffW0s9SqRArsy
TO1N48TiDL0JLbOxql3DnGd7/R1kjoYwdCii9zEgk0PDv9WZccuuSZpR8E3z
BnxIalPKQfhaahlREiXdZWElKoANkRlaXJ+fiqpsxrbyZKtxSN/ENJq4XAaK
So+UmMR3QBBlwyvZ8ft+JT8fU8qi66yD7QAmV/DUHHWkxDSouPzq9LvezXBr
Zxs3jn47Odnqb4v6hIDPScKkhMX5YllkdMsCKCzYURNOUqJTpjDJKJEcdOjo
h2IOypnDrrWZuTVzkI1zUr6ojHme5Y9L/r6bV/t9HNwS1EVns/W4gNnEza6H
hID5H88O9vx//FzGob+5u8R1vBMBOIXNgHclgIT0sRTsiT78/fGT6xfD3u7B
R2Iepz9+WuUMIMakY9lmNKnNBsVdRWZXnKC3Amk//eJ762AcnJSWGdJf1NCR
BCcbg4Q1EGdV2FEE+UQWJihFqGen69ELJWiNppkqdKDsDEPAmoyFRZEmgqIr
PGYUcQECHUQI+fBUwWREjHNokEC2djm3a1xdxR2yZU0WWenmqIol68SzdXD+
jpEijbUm/OED9veOfTZzDO8X5VR1Ou6++eZc/M8Q5lj1CpsENHSa/8hQprlj
f8I4hklcZ+cbiYj9w037EP4n8J8B8uJ0Tq9xLLW31ifYniXLJ76ZeU33NXHT
Zn1bopZ9oDhVB35zhP2NQ6aN+rbMfNB5TApmSdzeMxEj0H8MyYJ9Xcp8oe0Q
J+N/xiev3uZRULy5UjDRFobtPegHeEqsFbcOmK1iIjL8OIWpl28z5ze2zcb5
jYUKtBqilVjMpXZke/3dPbE1vDzbRlTYbv+ogKVSSEzoX11VQeE4fpC8EK7C
QJq4CZFfq6GpZxpQcdHQPsUT5syQ10lcrCrYKp82CzBzq+gYHaf12weKZBpv
OE4qJ1SfZ8ajNQWjOihJV20sbA4duLdVlFh1ZbiHdqDU1fFr5dlNQneeJXEI
w87nSVx7S50IrlrbIZfLMmjFgqFL/VAdLLYYX2i8Enr9Vre7ZbxMXVhI4TSM
P0K/UZfHxaHeZrUiOdyGIfi83hWdrabDrsmps/aOGNW2/CNjyfd39vbxRDPN
EPwnLGmWSDfYrrGW/m3FHlvVNw4F4zhXRVdn5qvDFDNmVeu5xA8qwHUIrM5w
l6JCkEAsBefqT8NoUN4WX1k0VbOLQl6d1DpFbCsHawyBSrSg57B4twAy9qU/
EK+w3Qf9gTnU2xEf7A6ap3Q7r9YAt9UGcy02o+3YGpc5mv5tzFmDsIRFreW1
MiwwvNTVd2ZT6nICAyhIolBdDHDjGY0poyD/DwNo6MOsRXKqgBJDsA4w61OZ
66qNtNpcKnsiGdRJI6xckMq2veQ3yJREXIIYj1lSYGywNtTW+JGR1PtMsmy8
Sr3nesK4VnCk2KBbYgcZ1DU8rNbnr1lvpf2WhOq5tf9pm3Tt3lnCk4Olz6ME
baFuSxKCS6+XqvdjpdG3qH0CXH1iFEjVFFNF9VNgYjU3GDidAIviHMxWslhp
GNEI1u+a9mO7q2dNKWPLqxgendVTVrLNHo5OGsGMJJEL+1NHCK0jDgI1TXxh
+xwKMA32r30hO63VeZODjfIm75duEBUmxssRCaYbdnZ6dZ1CvaH+CrrqaoW3
zm9XM6wuUDjYodtvj5rfhrvVsYCGm+ZipGNATTr2DwOdTgG9CzadilFt0f4s
8PP/EfZs2eJ3hp+Yg+A7FoyFqitMehCuM2luqxNYa2b5fyHIJQTZslN/gcg/
HkSusIG/B440Q6+Bkn8OJPmfA5K1DfkLSq6Eki0i+mdEk5e/N5pccjD/Njj5
70GUVfXtfw5UbkRCC6500qd0x4TkirLvQHGXi4bpxhNdK2kkVt3JrfMXvBw4
BnjDYmrZm5Ty/zqfryEByZEpZsh1VkthbaiuWSZrM89ivEmIt53JD4OujUu8
GEPQUVNo3wiaAbStbHqMHsCCvtV9iTq7q++vUv3pkC5Uozq7t0L1qdbrD/mH
N23XL6zL2M3Kd7dMFi8zaHetx21Wavh7/q6/dFBxk/FAXC9gjxjrW9T6IvfS
5XK+J/Glnqy1yTZ7VRMfNAiknSB3ai2NF8xSEYNxdEqR6a56CAhHrwnG1Oqf
ZhFdqNcGkPGPMbl8E44O7KvbC6LDVHT0FbvqVxQYbQtFOI3BOunSi5Zrfux+
9WWIsftZgICudNf0ZLyLV8fDm6Ew1yZMnSSVR26BqS5kEOEL9nx2f1r7POB6
KOsWxrZQmQZcAED4ZgWtRdOlU77WUPpOjTWzQQ7EInRopkq94atqrFKVsCzX
ctVHbmiS3ZG0Z/09j96WRdq5QRKPmzdjUBoVlWE1FaYzzjKuHumMgrzD+m9L
GNe2kMvSd27xsj0hbrV07eSTMo3Bkff6n/r6ywhN84nTVc12VzZDWtjCsqi+
Ml3OP33F4srumUOJYKL4oNvlvKU1uMApiROPw3cXNOqvD92daXTF2hTvC1b7
j9TxvYctxN9dU5XUdupK1w8ti+aawmpIYoFmvLNrsE4tKtW1oXcSDu+y3dYE
rjR0NdKBJUj8gIoFfJasHNdWRaoFWtOW0Hl2koNmL1q+4RAUpiRBH67LB66B
aKJ0jX5Zt6dBRKbQbsFbQSMar8fpFTNZjYjMwp1BLXdXNTBd/qb08MR550pm
lseTGGGgFqMKBuC6we1W62HKFxV03oi35kIGvsXak6p8Q5w6t0BILKqPZgE1
5xndaLyowah5pXORb/usCDJRB7IJspFahBnO+lAJC1pXcmHLTSyEQJ5J0q7P
MCQoYrDM+I2jguMfA5p0MDGGddZ6aI+jT5Er1GxCPSXBM8D4SVXXmrLRpzFC
Z14MOMCtU3VRZsx5/AsTb10CkuOxrr5ddnveMCHIiFAoAYgW6M2tts29ccK3
pZxIOdO1R3hmziF167dmXDhgefJlSdHar8EU6ToIyfB8SF8cqi96A+DCpwi3
8GWMmwNmTukv8QAdNEF9TwaF1LJTSx+dsz8m0sFoDnYqX1i0do4ZQWCeQX8G
iW52beOnnOAZJlQ64Nsn+HmjX81oC/gB81HiV3FMX4qgj2W4EP9X+gBWqewn
V2bT62fer73mn+Una161NYZBjeO0Jj9rh3qaUvxaCdrJPAhv4cmPf3cQ548/
IaXWxSEz6GXbV1lEY9CbtYPqMiSbcY2it6rSbnNKGxELtOO8esuFjscOytle
pnToHqPgcGJp+esGXTaWLDWe9+TJj/i5jRMj2+ApxQnoYZYPxGUiAyXrb8Qg
EteeVV/UnpejRNcn//jTkye6+tE0MmaU7AtLKQjGbYofJGne4Ksv93LtebOK
xuR3tann/BJaM+wJ8RL5FxoEGpsvjvWOsSQdTMJnWKZ8uL+LNw8IrlYu6fnp
+bE4bJCDA1mlwt3llAtaSvdIj3w8WL1/0pds1Dy2vPZ9Hut6fdwYpIlM07X5
DgWOBiJ+F4SLhqny9B0+7WBxd3BA1/gYaBFm/G0nkWSF850Ltus8vvvNi67x
FgtzSAM7FZswgj/dUHsnjqPBN634gkYdMS6XP/nm2uUdFlLTl1hOHsZxUnBf
kzxwv9Uy59Fy7VZ1QghJqb1jlk8gfP/FrEdLEXfTTijQsTRWTQJmwg0ACp2Z
sDjUkCPpTIYJJU0mcMG5DF29aF2kt75bok+9cO2Jlq+4MPjbmY7QGIFkMPT0
kdA7nfTju5zactien++uVUtLpYzII6E+adgYhIVTMeosgi7iptXRUt2ELGv1
mZmazcg8utqKi6C7rSSNWhYwfLoP+CMKEArlWUBZN1Z/Fg5YFsBBccHgHdrN
gluwBGVu1R9Vs/E2qtZPvjS+jYcaYC9NmdCaB6MPBvBtUDHU21ZRyIQomKpA
xIO94lR/rcbZIW3h6iFjStSCKeSPVyxQAHAiUADKB5FZjgv9LboRGGPU8RP9
8QkzNm28hqQnQCIP8+hbq/TnXa6u1h0ff3/VmrSt8HPDWw3vc5fhPW/rvfd1
vfe9r7fuwt4G5b4tm75/uEmVbyvfN6z0Xb/pj+jPdcpZVaBovv9n1ynvb7QC
VY78tatoH2bN5m3en1Zhk7z27GCJ6Zz49zYo3hDW1y6cRP4mRw9vPQIV282P
fbztuMEZ8tHHHyto0F/cGIboxRIZ8Reulfd6wJcWZfTfnTHADtl5g84nSG+V
kGg2R1mETisTU5nMKbq9rRAW+WCTQyekdYSfT8Xj+yxfPzY6M4xNq7PQqhuM
83/p5o0LeFwAAA==

-->

</rfc>

