<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-mozley-aidiscovery-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="AID PS">AI Agent Discovery (AID) Problem Statement</title>

    <author initials="J." surname="Mozley" fullname="Jim Mozley">
      <organization>Infoblox, Inc.</organization>
      <address>
        <email>jmozley@infoblox.com</email>
      </address>
    </author>
    <author initials="N." surname="Williams" fullname="Nic Williams">
      <organization>Infoblox, Inc.</organization>
      <address>
        <email>nic@infoblox.com</email>
      </address>
    </author>
    <author initials="B." surname="Sarikaya" fullname="Behcet Sarikaya">
      <organization>Unaffiliated</organization>
      <address>
        <email>sarikaya@ieee.org</email>
      </address>
    </author>
    <author initials="R." surname="Schott" fullname="Roland Schott">
      <organization>Deutsche Telekom</organization>
      <address>
        <email>roland.schott@telekom.de</email>
      </address>
    </author>

    <date year="2025"/>

    <area>AREA</area>
    
    

    <abstract>


<?line 32?>

<t>With the deployment of AI agents comes a need for mechanisms to support agent-to-agent discovery. This document presents requirements and considerations for agent-to-agent discovery.</t>



    </abstract>



  </front>

  <middle>


<?line 36?>

<section anchor="introduction"><name>Introduction</name>

<t>AI Agents play a crucial role in modern telecommunications by enabling intelligent automation,
decision-making, and adaptive network management. These agents are software-driven entities
that leverage artificial intelligence, including machine learning and natural language processing,
to interact with users, applications, and network components.</t>

<t>Organisations require robust automatable mechanisms for the secure advertisement and discovery of AI agents on public and private networks.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="scope-of-discovery-processes"><name>Scope of Discovery Processes</name>

<t>The scope of the agent-to-agent discovery could include:</t>

<t><list style="symbols">
  <t>Dynamic registration, deregistration, and advertisement of agent capability</t>
  <t>Context-aware discovery by other agents (domain, geography, operational constraints like batch versus real-time)</t>
  <t>Standardisation of the discovery process with privacy preservation
  <list style="symbols">
      <t>Having a known entry point such as an index of an organisation's agents</t>
    </list></t>
  <t>Standard schemas to describe agent capabilities
  <list style="symbols">
      <t>Versioning and lifecycle management</t>
    </list></t>
  <t>Resiliency in advertising agents</t>
  <t>Ensuring trust and verification mechanisms built into the discovery process</t>
  <t>Using the same mechanisms on both public and private networks</t>
  <t>Interoperability and integration with existing technologies and datasets (backward compatability)</t>
</list></t>

<t>Considerations and constraints on these processes may include:</t>

<t><list style="symbols">
  <t>Organisations needing control over the process of advertising their agents</t>
  <t>Scalability owing to the large number of agents</t>
  <t>Energy and resource efficiency</t>
  <t>Adversarial use of agents (i.e. using inputs from an index to modify agent reasoning)</t>
  <t>Agent decision variance based on temperature, context, or model state</t>
  <t>Requirements for organisations and agents to operate independently</t>
  <t>Legislation and regulatory frameworks that could include constraints such as sovereignty of data and operational considerations (human in the loop governance)</t>
  <t>Legal issues with ownership of names and brands, or having mechanisms to deal with disputes</t>
  <t>Ethical concerns with respect to agent capabilities, access, and/or advertised metadata</t>
</list></t>

</section>
<section anchor="autonomy-and-governance"><name>Autonomy and Governance</name>

<t>Due to the wide range of services agents could be used for, organisations will need autonomy when advertising agents and may need to work within regulatory frameworks that stipulate such things as operational requirements and sovereignty of data, or such regulations may not be acceptable to some organisations. Discovery mechanisms will need to allow each organisation to publish its own agents' capabilities independently of others. A centralised directory of all possible public agents does not facilitate this. An adversarial centralized directory is also able to stifle competitor advertisement capabilities. The needed autonomy ensures that discovery remains resilient to governance disputes, competitive interference, and jurisdictional constraints.</t>

<t>Given that organisations will need to be autonomous but still facilitate agents discovering other agents and being able to communicate securely with them, a well known entry point is needed. This further allows organizations to delegate authority to others for specific jobs or capabilities.</t>

</section>
<section anchor="agent-registration-advertisement-and-discovery"><name>Agent Registration Advertisement and Discovery</name>

<t>Organisations will need to advertise agents and their capabilities to other entities via a predictable entry point. This will facilitate any entity's agents discovering the organisation's agent capabilities, and subsequently performing any verification, tests prior to initiating service provided by the agent. To achieve this, the entry point <bcp14>MUST</bcp14> be based on a mechanism that is both ubiquitous and interoperable across public and private networks.</t>

<t>It is likely this will mean a directory service at or referenced by the entry point that an organisation uses to describe agent capabilities based on a standard schema.</t>

<t>Once an agent discovers another agent e.g. via a directory service, it will communicate with it using protocols such as (A2A, MCP, ACP, etc.) via properties it has discovered from the index service.</t>

<t>All communication will need to be secured through public key infrastructure mechanisms. While in‑process agent communication avoids network concerns (co-located agents), any external, cross‑host agent interaction still routes through existing network infrastructure requiring the entry point.</t>

</section>
<section anchor="regulation-and-compliance-features"><name>Regulation and Compliance Features</name>

<t>Services provided by agents may be subject to legislation and regulation because they are time critical, relate to health care, financial in nature, etc. The agent discovery process, protocols and communication will need to take this into account as otherwise organizations will not be able to deploy them.</t>

<t>Compliance considerations include, but are not limited to, availability, auditability, and security. Discovery protocols <bcp14>MUST</bcp14> provide mechanisms to ensure high availability, as service outages in regulated environments can have severe legal and operational consequences. Similarly, auditability <bcp14>MUST</bcp14> be supported through verifiable logging of discovery and registration events, enabling organizations to demonstrate compliance during regulatory reviews or incident investigations. These should be considered during the choices of using existing protocols or developing new ones for agent discovery to avoid barriers to implementation.</t>

</section>
<section anchor="scalability"><name>Scalability</name>

<t>Given the large number of agents, volume of transactions, legal and regulatory considerations, the discovery mechanisms need to be both highly scalable and devolved to the organizations advertising agent capabilities. Any solution that introduces centralized bottlenecks or single points of failure is inherently unsuitable for this purpose, which should also be weighed for how a solution is developed.</t>

</section>
<section anchor="schema-evolution"><name>Schema Evolution</name>

<t>Agents will advertise machine‑readable capabilities that evolve over time. The discovery system <bcp14>MUST</bcp14> support explicit versioning, content negotiation, and backward compatible evolution of capability schemas. It <bcp14>MUST</bcp14> place constraints on payload size and complexity to ensure efficient transport and caching while allowing extensibility for domain‑specific metadata. Mechanisms for deprecation, sunset notices, and compatibility matrices are needed to prevent negotiation failures at runtime.</t>

</section>
<section anchor="abuse"><name>Abuse</name>

<t>Open discovery surfaces are targets for abuse including amplification attacks, scraping, and denial of service. The system <bcp14>MUST</bcp14> support rate limiting, request authentication when appropriate, abuse detection, and response shaping to minimize amplification potential. Economic considerations, such as preventing cost shifting to responders and preserving fairness across tenants, <bcp14>SHOULD</bcp14> be incorporated into protocol and operational guidance.</t>

</section>
<section anchor="connectivity"><name>Connectivity</name>

<t>Discovery alone is insufficient without practical reachability. The problem statement <bcp14>SHOULD</bcp14> acknowledge challenges introduced by NATs, carrier‑grade NAT, firewalls, split‑horizon networks, and dual‑stack IPv4/IPv6 environments. Agents may exist behind egress‑only boundaries or at the edge with intermittent connectivity. The system <bcp14>MUST</bcp14> not assume stable, symmetric, or publicly routable paths and <bcp14>SHOULD</bcp14> define expectations for relay, proxy, or rendezvous patterns where direct connectivity is infeasible.</t>

</section>
<section anchor="attestation-and-provenance"><name>Attestation and Provenance</name>

<t>Agents may be required to prove properties about their software and runtime environment. The discovery layer <bcp14>SHOULD</bcp14> carry or reference attestations such as software bill of materials, model/version identifiers, supply‑chain provenance, or trusted‑execution environment evidence. Safety classifications, permissible‑use statements, and risk tiers can be part of discovery metadata to enable policy‑aware client behavior.</t>

</section>
<section anchor="challenges-with-existing-proposed-mechanisms"><name>Challenges with Existing Proposed Mechanisms</name>

<t>Several alternative approaches to agent discovery have been proposed, including centralized registries, blockchain-based naming systems, and proprietary service directories. While these models may offer novel features, they introduce significant architectural, operational, and governance challenges. Centralized registries concentrate control and introduce single points of failure, limiting resilience and scalability.</t>

<t>Blockchain-based systems often lack integration with existing internet infrastructure, suffer from latency and cost constraints, and present jurisdictional ambiguity due to decentralized governance. Proprietary directories fragment the discovery ecosystem and inhibit interoperability across agent frameworks and administrative domains. Furthermore, organizations securely delegating authority to AI solution providers requires interfacing between this central authority as opposed to business-to-business which can be used to suppress innovation.</t>

<t>The introduction of a novel discovery protocol would require the establishment of new governance structures, security models, and operational tooling. Early implementations would likely be centralized among a limited set of stakeholders, introducing bottlenecks in protocol evolution and risk mitigation, and could result in centralization.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>All agent discovery mechanisms need to be secured through public key infrastructure.</t>

<t>All agent discovery mechanisms need to have thread detection.</t>

<t>All agent discovery mechanisms and security mechanisms need to work in real-time.</t>

<t>All agent discovery mechanisms need to use standardized interfaces or APIs in case external security instances are used.</t>

<t>Protection needed against
   * DoS attacks
   * Unauthorized access and control
   * Secure communication framework e.g., TLS 1.3 etc.
   * Continuous monitoring of the agent discovery mechanism</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>




<?line 172?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>TODO acknowledge.</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAE/P72gAA41a25IbR3J9768ojx5WVGAgUSvb64n1riAOtRoHb+aQVmw4
/FDoLgClaXTBXdUYggpF+Bf8B/4Wf4q/xOdkVt8ww5X0QAE91VV5PXkyC5eX
l0XyqXZX5mJ1Y1Zb1yRz7WMZjq49mc9XN9dPzJs2rGu3N7fJJrfHiovCrtet
O8pL1+bN7UVR4k/b0J6ujG82oSiqUDZ2j22r1m7S5T58rN3p0vqq3/vyq6+K
2K33PkYfmnQ6OL5auYPDPxDCfGZsHQOOmDy9WJgLV/kUWm9rfrlZfYf/hRaf
3r77/qKoIMaV+fqrr/++KEMTXRO7eGU22MkVEPf3hW2dvTKrt89XRWG7tAvt
VWEujVFh/8XvzUsRtTD4L7TbK3MDfdZ1+LDAp3Ipz93e+vrK/KRafevzimUZ
9pPNXvnS/Ojr2tt9/C3bNb781FbfuV3pkrm1rb+zJzvu9r6xm43HEclV071i
Xvmtd84tsXSy2dtQ26Yyt+UupDRude26FMudM+9c7e54/LhdK68so7zybdIF
y8oVRRPavU3+6K4Kyj58KZbLZVFcXl4au46ptWUqih992pmEE+DPOpwYSSZs
DOLOMu6igdIuGmsa5yqDzczelTvb+LiPJgUTu8MhtElXX6ZwKR/MEFJL827n
o0HodbL3oXVR9m3df3a+ldDF9tCdseEr10JYfJKjPrmparH3VVVD38/gttSG
qiv5alH0SRPNobYnyF62XYngpMkcAtrsA85pDG0G9fYdvJxPXZ+Ma+y69s0W
C7Gg9nI0wjLsZc2iqFzpmR+Xe3uHdQuR3lb2QCvDTuk+tHdmbxtITfVoAijd
GxTRbmLYpHt8uKxavNPgTCS8d7FIO5tM7aAkVmNp8hsvoo/ClG6Bb2XdVRRy
b8udbxzesW3DBxSmsalr8RICZNtxo0MbSoekhrQFnMbN6H5zT+930bURWhwO
dW8H1alXBTY6hIbCw/Cv2y29n+2VvQjLrrs4mAkGdNM4oS8ZY9GVHRbbCvol
H8U6ctLg2XnshcYcOjijlEUH2Ao51YtFYT4zz0JzpPUoDBddu41vvHwvCtjd
3LmTwfIqmouX72/fEaD4f/PqtXx++/xf39+8fX7Nz7c/rF68GD4UecXtD6/f
v7geP41vPnv98uXzV9f6Mp6a2aPi4uXqrxdqyYvXb97dvH61enHB8EuzjGA8
wCdrp25BggA3jI2Is1i2fo0veOe7Z2/+93+efmN+/vnv3n7/7OunT//pl1/y
lz88/cdv8OV+5xo9LTT1KX+F1U8FPIvo4C62rk1pDz4BfLE2mrgL943ZudbB
ml/8Oy3zH1fmj+vy8PSbP+UHVHj2sLfZ7KHY7OGTBy+rER959MgxgzVnz88s
PZd39dfZ997uk4d//HPNhLl8+oc//6lgCN2W4eAYeGONfaP54nIMxX4Fg/hT
oIQ06eoqpybR9gtzfQK6I3pbt/UEXMEPIO38u8LHNCVwkm4OX9k1Skk6YTeE
enIf0qUlckzOBWYFCNb2WfN5hRz02Hjrwra1h90J1fiQgRWoQKDF4Z5ra3/n
zNqmcmewFwozZLX1ZfJ79wRHgl00lW2rnO+9CcazM7AokEiClifF+PYor6Bi
fWF+sEeBJnPXMNwgJV8NkAD1A0db5q4wjQ+ie8PqN6DM72LWbCKQYVXcWylB
fZ6c24x4ytP/DYphmx4ca79x5akkQg0QjZ3fuoiXAK8nSZTsD3mpP/w5mEvL
J6kVsMNmWEWEVutMEG/d+ToxocPjBsNu72VzgUVQgOnL2GodaM9PYx/evyFa
iF81QmQdIWSrnlafuA+INDkI+zehDlvvFClBy2x0jJe1Le/uaVQCPdFb9nuC
5Hg2r8l9me6jJxDLWNoOfb7ApqdZCszLBUkEhcEmKNi1oU3EBH0c0fsT0+NP
vp14v7R1r224lwVq39q2qHJNt19jvz571GWu3appEJSha0tn3IY1lZ7GghVP
IzNDYqAQji+bz/3SLfFMqcABRMxs2rAfIxVng0j4zSkHHjInSpgxc5S191TB
HHkCSjdyLbpKDOf2kpMoiAuxB1JbWDPJSW0ieb2E5YQmsY6GmUEFO1ReiKNZ
7qacvaaSL4g3tUaFmmLb4StaA6iE4JOQMsI9ZiA2c3afqZFOc37bJKnWDCOt
OmcQM4mbz3fdXsymzgrhYLbcpaFJnqiA5Dgxdi5jCXACftn5A88gR1Zd1y3+
jWKnnYLKnI5WQC/dACkHnzkJAhTcUqUqcWg+AfFwcOBAeOshcACVSwakoPOX
pKI9QFc4MVlqzdqxAuFpwl4j7C+DTkVx3bk+OO9hCQO5txJdREZfujjyaxoc
6NVFJdiLMxffo11R9m37w1jbH4EoEYIJKKtxurA3KgvL/w2fAyAO/JtTH3P5
NtLVU5c+4OuPxIH4RfbIp4kCIlFI1JFGPSg9ZO+A1mKu7HJSgyeOHU1AZ9V1
uDcOvHf2Lv8kgBl3xhObUGjULL+beXaeHJRciieOXpmSlcnW4uUKypZiLkIC
zj8EEGhK3sOy2rwK2JPqbWzJI2hGEjzsl32U0aXf/ONsczBBttRmsAkYf+0E
iV1iU31GDaaqSGMhdpkGB/trxLa6diw8LdtGYexa5yTwxywc8mUxnM1uRijp
Bn6WtoNu/wklMFa+fEgmwCD/It2MnPypIFaqm6UNHUulRCD+PrFgb9wsPmN8
xnEEC5yEfjbc2Mj1fQZJcO5u95Dd3KOBeoSB+JhNmFvVTdfqSYyzmPX4mPUQ
iKmBVkl02IWWtYjQK0EkCE1YISkwP4U135/7TFBD8ObthAVqHZr1REMmnPdc
82zo35taRsvmLOp7EYdW0xw9cJtcjc4UK06skm1xf+6W5qQbnAZSNvMR4e4x
6naOrYSPbh0BKZqFwBnOKZSinWasCj2Mi2zlW88uks0rdrHCaTKWkj0cPZMA
VHig6FAB5kF3jG5aMlK6oZnrpbtZT4qyHVFHoxg2ECrWrT3gLzFee5qVuVdN
VGuBDb/Sqt7IZuTb9Uk7QDHu3lkeOwJCr5OkELI1J9+g21R+EfGMLbOO/Bot
nioc54yaHT7hwGb0HNxLxScpaNxyu8wx9ED4BRBY1ZtmpSQj/qCUCj5LoQz1
SCw+X329WpiXz94szIr/uFQun8gRB7G1ondC4R+DjiWTpIyWUVaWRYAeq9n5
yojnKKQ4wXxpQ7cdCDdHBr5BlUR2diUZ2qQYLc2POy9jpP/7r//uaWs28eww
ewy+ipMhSiYfn5fhsg60SE/dniw0sT4kgnENBGY8YftdiHmyNoxsuLOiJURO
AvMq+0D0+wPPNND63SfpNNWJSG+Hei3x+wwloFbC+r0TjopO+LZnLtN0yyDA
Gk+DduufMqeqH+ec/Lp2pSXX5nBCxx9oN6E0YrOk+oBuqaLB7EDnEDSlJUne
eFYqHYbpiMtpkEgZPO/Gs2sWk0DT9uWTAZHsnQKF9m3gKqEjFkdFznuC7Lwa
6OuZ2uQ6pHNUKTpLNlCDIc84cabYC6l/NAL3qf3eJ5EGIXG0vu928K2rfBq/
EUAZvPg25UyjrgJt2VFnHFkJgtl5RM3ZIXGAHwQXLEoxe89BLNccfRsa5YAl
IAIcnFnERKTD4ZrHOgGB+ZJ85Rb6oVerzxQagDhPkycpqaVAjIvedStEYDNx
cw6tsZA6jgPh9mGM+0gB3ytpScqzsn8q7e0nPLl1R++EAtBbvtI8PKIc+W3P
V3W0G3c9i++9TJLXDelW7oJkDkRX9BuydfQYTqkgfB0OmsX3wGc3mYNPlGZ0
El2A423ric2si9BE2IOIttTJ1tAvj9zsU93ywhxD3e11zoV2JSra4Pno2Ylx
5uG8OBtzTCJugrdSShl3KIFRZGP15CzC4exjTsPdeZo96HTOWPAK4Bkhu7YB
UrbzfQDsN6XdOD/VrnHlnZibG5LPBx1mbMB0fM3UEAjgUFTISYd88cqQdJDt
Wetb9API3nu0lrve/8Lkoec92qJdvi7ZoVmxo3ic/KqXQTjVRyy75vkxr0Dd
UkgVcBnpXR70oyq0Du0npZkTPOqtZsxjFYCqQuPolniKye013fqbG/eBc3/U
1eMwJ8sDCRi6cdsgbKsfVJ7NiqQhcr3stOE4suxndEtzk6nWobalO58gHeyp
DhZ4Bhf1EI1I/pCJdUarfmiTNDb1zomLxSxb+oGxRM6u+QXx0a6pIPSDDkVh
voGe93380rycX1UAwkFostIR7neJ6MwMXgwSUnfdfW9Tqx19O3RjbEZbgaKp
CfsAi2R3LYoLXSQNwRr1EMwLfenUW10L7p03TkzaPAOyXD65BLIEsWEMaVOC
kyAq+J89DDdUgC/WznEEocHxWEgINEotkrdJHZze7uzI/vviKVOIA8lZy8vO
RZarcsmVY8RwzsIigCQRaWRuBhK/F3/PJD8EBh2kXJrnJftDeOkcZ3q2mM2r
00QIF3d+k/L2emSlpLXq59H8IxzQNsLYlLPjPCvYl+8g5BamDEjuViqeMIEe
ox8Ut23nK9aOZZGvohoqfhS4HYuyrQHkiimxG8KYbBhFFpsTZ0uZsCCWc+6o
bw75kj/2l/y9mPAv+tjaVVvWFkS9a7RYZ9gTavZq9Y7dvJYIBP62teACeEoq
1bp7vEZ7wgFJuGbrP8IHfcuSg6azNXOGEWVu3hy/+RL//MOMCCz7y1ZyQKlr
sCJyEnRhC8OTx8qF1BpsCo0GsYohnJSHUgNtDEhwEXFJmfRoyodhSqZkY2St
ioLL0OK0RzojDWUEpTweZ5IjC1QiXXcaDNmCFe8JHcEP50yunMk9T0IaP5wW
2oEhkD4e2flhk6TzQ9aG3PbMZFUvb5yVSZGGxSqxgR2J8BuQMpenhKsZe84j
toweWDVtfOya0aKdfX99rPmlODL1yTnsQyUUhKw5A+I06y2JGL2I0zlvPmTN
QgTYAM45TrIQGjKj/jIXDCPMCFks18jEkPoEpyMuQR4Pg7ZiTbk5cRX+7D6A
vypjGwVHKeFmxKZbu3EwaFnD0wNCkM4zSnQSh12IN0N25JhtfbxD9WP2k6Ou
6f02zWljj/1aYTREAmKGguv9WqlDMoSyPfrQ6mXzmGoSs897Fgefkg5Uk0rC
fonX+ECNWvo6macJXCLNtUU/53VCp9fOidlkw+lV/5TJZMor05Q1usk7sfal
9vW8dOR0RFImG0VRGlpPRgx93y4kSrtavc4R92pYhg2CBBkHymI2uRXUa+UR
bVC6t434SK6zUZBZAPgLhNnFowoyGTmOyLU0zx5VTrvmpufqemmUBzDD2Y+T
uMVQwIaRZ6kJE0dWDK9+d269bDZsBShC6pR3f+NWTVALkHnWbTMNxHAynGDz
xHtFpQ4xTRnQYqxQMN7ZcNXu1x41BmlQdbm5nAbBaMqlRGDv34lfOevfSmbN
+bmDHIqoas0dyEyajrXylaJWSY3TybWBXlmzimvfhbBVfgVPfq/z031o3eKM
yA9z2TxDFe4ynaKubkamnJvXdviRSczTaFvyvTXqlHP5xxTZKpPN5PZCc5K9
B7su1CJe2/efM3XPENHllYQvVi2chaDvW6l3Ml4af2MkXVPOiupB923upRvo
fxsjdU4KlY+7/n6f/d0kFYbIIYLmxj6n4eIB7UghsLMFSWIrfdb4xXx6njSy
JZ2EjEXry4v4ftBAaktGyNnHLtSVQHivqZh50jIpnKuKI+cfIJfZtp20CmW2
QuzkKnyUY9Kg9qrOL5p1dneOjo/3lL95hrf8zbsKDGM/9Fkjmf3116dDmce2
zVO58RcWv12iXOb0txgfXTVkgpKp1Zsb8U4JABvGiKMsSMvEKNNGgpGOkwEY
WbPhBmnLBJZfH35hrsNt30jog/dNTi4Jo1LHnvp7AKKyLrrVH3jNh2wDbsjM
eGHevbg1T5e/l9GdvsZftvimI8dCfMpPSXXOkx4Z7A3mKYRe3axerR6Ez/w3
hxwYN0FX5qEGqRl/Qsh2VkjaQKiFSBQ/X+l4xFX/fCG/VL34Bbu+vn49pd7L
4v8BIhAHA6srAAA=

-->

</rfc>

