<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.2 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-quic-transport-03" category="std">

  <feedback xmlns='http://purl.org/net/xml2rfc/ext' template="mailto:quic@ietf.org?subject={docname},%20%22{section}%22&amp;body=%3c{ref}%3e:"/><front>
    <title abbrev="QUIC Transport Protocol">QUIC: A UDP-Based Multiplexed and Secure Transport</title>

    <author initials="J." surname="Iyengar" fullname="Jana Iyengar" role="editor">
      <organization>Google</organization>
      <address>
        <email>jri@google.com</email>
      </address>
    </author>
    <author initials="M." surname="Thomson" fullname="Martin Thomson" role="editor">
      <organization>Mozilla</organization>
      <address>
        <email>martin.thomson@gmail.com</email>
      </address>
    </author>

    <date year="2017" month="5" day="21" />

    <area>Transport</area>
    <workgroup>QUIC</workgroup>
    

    <abstract>


<t>This document defines the core of the QUIC transport protocol.  This document
describes connection establishment, packet format, multiplexing and reliability.
Accompanying documents describe the cryptographic handshake and loss detection.</t>



    </abstract>


    <note title="Note to Readers">


<t>Discussion of this draft takes place on the QUIC working group mailing list
(quic@ietf.org), which is archived at
<eref target="https://mailarchive.ietf.org/arch/search/?email_list=quic">https://mailarchive.ietf.org/arch/search/?email_list=quic</eref>.</t>

<t>Working Group information can be found at <eref target="https://github.com/quicwg">https://github.com/quicwg</eref>; source
code and issues list for this draft can be found at
<eref target="https://github.com/quicwg/base-drafts/labels/transport">https://github.com/quicwg/base-drafts/labels/transport</eref>.</t>


    </note>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>QUIC is a multiplexed and secure transport protocol that runs on top of UDP.
QUIC aims to provide a flexible set of features that allow it to be a
general-purpose transport for multiple applications.</t>

<t>QUIC implements techniques learned from experience with TCP, SCTP and other
transport protocols.  Using UDP as the substrate, QUIC seeks to be compatible
with legacy clients and middleboxes.  QUIC authenticates all of its headers and
encrypts most of the data it exchanges, including its signaling.  This allows
the protocol to evolve without incurring a dependency on upgrades to
middleboxes.
This document describes the core QUIC protocol, including the conceptual design,
wire format, and mechanisms of the QUIC protocol for connection establishment,
stream multiplexing, stream and connection-level flow control, and data
reliability.</t>

<t>Accompanying documents describe QUIC’s loss detection and congestion control
<xref target="QUIC-RECOVERY"/>, and the use of TLS 1.3 for key negotiation <xref target="QUIC-TLS"/>.</t>

</section>
<section anchor="conventions-and-definitions" title="Conventions and Definitions">

<t>The words “MUST”, “MUST NOT”, “SHOULD”, and “MAY” are used in this document.
It’s not shouting; when they are capitalized, they have the special meaning
defined in <xref target="RFC2119"/>.</t>

<t>Definitions of terms that are used in this document:</t>

<t><list style="hanging">
  <t hangText='Client:'>
  The endpoint initiating a QUIC connection.</t>
  <t hangText='Server:'>
  The endpoint accepting incoming QUIC connections.</t>
  <t hangText='Endpoint:'>
  The client or server end of a connection.</t>
  <t hangText='Stream:'>
  A logical, bi-directional channel of ordered bytes within a QUIC connection.</t>
  <t hangText='Connection:'>
  A conversation between two QUIC endpoints with a single encryption context
that multiplexes streams within it.</t>
  <t hangText='Connection ID:'>
  The identifier for a QUIC connection.</t>
  <t hangText='QUIC packet:'>
  A well-formed UDP payload that can be parsed by a QUIC receiver.  QUIC packet
size in this document refers to the UDP payload size.</t>
</list></t>

<section anchor="notational-conventions" title="Notational Conventions">

<t>Packet and frame diagrams use the format described in <xref target="RFC2360"/> Section 3.1,
with the following additional conventions:</t>

<t><list style="hanging">
  <t hangText='[x]'>
  Indicates that x is optional</t>
  <t hangText='{x}'>
  Indicates that x is encrypted</t>
  <t hangText='x (A)'>
  Indicates that x is A bits long</t>
  <t hangText='x (A/B/C) …'>
  Indicates that x is one of A, B, or C bits long</t>
  <t hangText='x (*) …'>
  Indicates that x is variable-length</t>
</list></t>

</section>
</section>
<section anchor="a-quic-overview" title="A QUIC Overview">

<t>This section briefly describes QUIC’s key mechanisms and benefits.  Key
strengths of QUIC include:</t>

<t><list style="symbols">
  <t>Low-latency connection establishment</t>
  <t>Multiplexing without head-of-line blocking</t>
  <t>Authenticated and encrypted header and payload</t>
  <t>Rich signaling for congestion control and loss recovery</t>
  <t>Stream and connection flow control</t>
  <t>Connection migration and resilience to NAT rebinding</t>
  <t>Version negotiation</t>
</list></t>

<section anchor="low-latency-connection-establishment" title="Low-Latency Connection Establishment">

<t>QUIC relies on a combined cryptographic and transport handshake for
setting up a secure transport connection.  QUIC connections are
expected to commonly use 0-RTT handshakes, meaning that for most QUIC
connections, data can be sent immediately following the client
handshake packet, without waiting for a reply from the server.  QUIC
provides a dedicated stream (Stream ID 0) to be used for performing
the cryptographic handshake and QUIC options negotiation.  The format
of the QUIC options and parameters used during negotiation are
described in this document, but the handshake protocol that runs on
Stream ID 0 is described in the accompanying cryptographic handshake
draft <xref target="QUIC-TLS"/>.</t>

</section>
<section anchor="stream-multiplexing" title="Stream Multiplexing">

<t>When application messages are transported over TCP, independent application
messages can suffer from head-of-line blocking.  When an application multiplexes
many streams atop TCP’s single-bytestream abstraction, a loss of a TCP segment
results in blocking of all subsequent segments until a retransmission arrives,
irrespective of the application streams that are encapsulated in subsequent
segments.  QUIC ensures that lost packets carrying data for an individual stream
only impact that specific stream.  Data received on other streams can continue
to be reassembled and delivered to the application.</t>

</section>
<section anchor="rich-signaling-for-congestion-control-and-loss-recovery" title="Rich Signaling for Congestion Control and Loss Recovery">

<t>QUIC’s packet framing and acknowledgments carry rich information that help both
congestion control and loss recovery in fundamental ways.  Each QUIC packet
carries a new packet number, including those carrying retransmitted data.  This
obviates the need for a separate mechanism to distinguish acknowledgments for
retransmissions from those for original transmissions, avoiding TCP’s
retransmission ambiguity problem.  QUIC acknowledgments also explicitly encode
the delay between the receipt of a packet and its acknowledgment being sent, and
together with the monotonically-increasing packet numbers, this allows for
precise network roundtrip-time (RTT) calculation.  QUIC’s ACK frames support up
to 256 ACK blocks, so QUIC is more resilient to reordering than TCP with SACK
support, as well as able to keep more bytes on the wire when there is reordering
or loss.</t>

</section>
<section anchor="stream-and-connection-flow-control" title="Stream and Connection Flow Control">

<t>QUIC implements stream- and connection-level flow control.  At a high level, a
QUIC receiver advertises the maximum amount of data that it is willing to
receive on each stream.  As data is sent, received, and delivered on a
particular stream, the receiver sends MAX_STREAM_DATA frames that increase the
advertised limit for that stream, allowing the peer to send more data on that
stream.</t>

<t>In addition to this stream-level flow control, QUIC implements connection-level
flow control to limit the aggregate buffer that a QUIC receiver is willing to
allocate to all streams on a connection.  Connection-level flow control works in
the same way as stream-level flow control, but the bytes delivered and the
limits are aggregated across all streams.</t>

</section>
<section anchor="authenticated-and-encrypted-header-and-payload" title="Authenticated and Encrypted Header and Payload">

<t>TCP headers appear in plaintext on the wire and are not authenticated, causing a
plethora of injection and header manipulation issues for TCP, such as
receive-window manipulation and sequence-number overwriting.  While some of
these are mechanisms used by middleboxes to improve TCP performance, others are
active attacks.  Even “performance-enhancing” middleboxes that routinely
interpose on the transport state machine end up limiting the evolvability of the
transport protocol, as has been observed in the design of MPTCP <xref target="RFC6824"/> and
in its subsequent deployability issues.</t>

<t>Generally, QUIC packets are always authenticated and the payload is typically
fully encrypted.  The parts of the packet header which are not encrypted are
still authenticated by the receiver, so as to thwart any packet injection or
manipulation by third parties.  Some early handshake packets, such as the
Version Negotiation packet, are not encrypted, but information sent in these
unencrypted handshake packets is later verified as part of cryptographic
processing.</t>

<t>PUBLIC_RESET packets that reset a connection are currently not authenticated.</t>

</section>
<section anchor="connection-migration-and-resilience-to-nat-rebinding" title="Connection Migration and Resilience to NAT Rebinding">

<t>QUIC connections are identified by a 64-bit Connection ID, randomly generated by
the client.  QUIC’s consistent connection ID allows connections to survive
changes to the client’s IP and port, such as those caused by NAT rebindings or
by the client changing network connectivity to a new address.  QUIC provides
automatic cryptographic verification of a rebound client, since the client
continues to use the same session key for encrypting and decrypting packets.
The consistent connection ID can be used to allow migration of the connection to
a new server IP address as well, since the Connection ID remains consistent
across changes in the client’s and the server’s network addresses.</t>

</section>
<section anchor="benefit-version-negotiation" title="Version Negotiation">

<t>QUIC version negotiation allows for multiple versions of the protocol to be
deployed and used concurrently. Version negotiation is described in
<xref target="version-negotiation"/>.</t>

</section>
</section>
<section anchor="versions" title="Versions">

<t>QUIC versions are identified using a 32-bit value.</t>

<t>The version 0x00000000 is reserved to represent an invalid version.  This
version of the specification is identified by the number 0x00000001.</t>

<t>Version 0x000000001 of QUIC uses TLS as a cryptographic handshake protocol, as
described in <xref target="QUIC-TLS"/>.</t>

<t>Versions with the most significant 16 bits of the version number cleared are
reserved for use in future IETF consensus documents.</t>

<t>Versions that follow the pattern 0x?a?a?a?a are reserved for use in forcing
version negotiation to be exercised.  That is, any version number where the low
four bits of all octets is 1010 (in binary).  A client or server MAY advertise
support for any of these reserved versions.</t>

<t>Reserved version numbers will probably never represent a real protocol; a client
MAY use one of these version numbers with the expectation that the server will
initiate version negotiation; a server MAY advertise support for one of these
versions and can expect that clients ignore the value.</t>

<t>[[RFC editor: please remove the remainder of this section before
publication.]]</t>

<t>The version number for the final version of this specification (0x00000001), is
reserved for the version of the protocol that is published as an RFC.</t>

<t>Version numbers used to identify IETF drafts are created by adding the draft
number to 0xff000000.  For example, draft-ietf-quic-transport-13 would be
identified as 0xff00000D.</t>

<t>Implementors are encouraged to register version numbers of QUIC that they
are using for private experimentation on the
<eref target="https://github.com/quicwg/base-drafts/wiki/QUIC-Versions">github wiki</eref>.</t>

</section>
<section anchor="packet-types-and-formats" title="Packet Types and Formats">

<t>We first describe QUIC’s packet types and their formats, since some are
referenced in subsequent mechanisms.</t>

<t>All numeric values are encoded in network byte order (that is, big-endian) and
all field sizes are in bits.  When discussing individual bits of fields, the
least significant bit is referred to as bit 0.  Hexadecimal notation is used for
describing the value of fields.</t>

<t>Any QUIC packet has either a long or a short header, as indicated by the Header
Form bit. Long headers are expected to be used early in the connection before
version negotiation and establishment of 1-RTT keys, and for public resets.
Short headers are minimal version-specific headers, which can be used after
version negotiation and 1-RTT keys are established.</t>

<section anchor="long-header" title="Long Header">

<figure title="Long Header Format" anchor="fig-long-header"><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+
|1|   Type (7)  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+                       Connection ID (64)                      +
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                       Packet Number (32)                      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                         Version (32)                          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                          Payload (*)                        ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>Long headers are used for packets that are sent prior to the completion of
version negotiation and establishment of 1-RTT keys. Once both conditions are
met, a sender SHOULD switch to sending short-form headers. While inefficient,
long headers MAY be used for packets encrypted with 1-RTT keys. The long form
allows for special packets, such as the Version Negotiation and the Public Reset
packets to be represented in this uniform fixed-length packet format. A long
header contains the following fields:</t>

<t><list style="hanging">
  <t hangText='Header Form:'>
  The most significant bit (0x80) of the first octet is set to 1 for long
headers and 0 for short headers.</t>
  <t hangText='Long Packet Type:'>
  The remaining seven bits of first octet of a long packet is the packet type.
This field can indicate one of 128 packet types.  The types specified for this
version are listed in <xref target="long-packet-types"/>.</t>
  <t hangText='Connection ID:'>
  Octets 1 through 8 contain the connection ID. <xref target="connection-id"/> describes the
use of this field in more detail.</t>
  <t hangText='Packet Number:'>
  Octets 9 to 12 contain the packet number.  {{packet-numbers} describes the use
of packet numbers.</t>
  <t hangText='Version:'>
  Octets 13 to 16 contain the selected protocol version.  This field indicates
which version of QUIC is in use and determines how the rest of the protocol
fields are interpreted.</t>
  <t hangText='Payload:'>
  Octets from 17 onwards (the rest of QUIC packet) are the payload of the
packet.</t>
</list></t>

<t>The following packet types are defined:</t>

<texttable title="Long Header Packet Types" anchor="long-packet-types">
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Section</ttcol>
      <c>01</c>
      <c>Version Negotiation</c>
      <c><xref target="packet-version"/></c>
      <c>02</c>
      <c>Client Initial</c>
      <c><xref target="packet-client-initial"/></c>
      <c>03</c>
      <c>Server Stateless Retry</c>
      <c><xref target="packet-server-stateless"/></c>
      <c>04</c>
      <c>Server Cleartext</c>
      <c><xref target="packet-server-cleartext"/></c>
      <c>05</c>
      <c>Client Cleartext</c>
      <c><xref target="packet-client-cleartext"/></c>
      <c>06</c>
      <c>0-RTT Protected</c>
      <c><xref target="packet-protected"/></c>
      <c>07</c>
      <c>1-RTT Protected (key phase 0)</c>
      <c><xref target="packet-protected"/></c>
      <c>08</c>
      <c>1-RTT Protected (key phase 1)</c>
      <c><xref target="packet-protected"/></c>
      <c>09</c>
      <c>Public Reset</c>
      <c><xref target="packet-public-reset"/></c>
</texttable>

<t>The header form, packet type, connection ID, packet number and version fields of
a long header packet are version-independent. The types of packets defined in
<xref target="long-packet-types"/> are version-specific.  See <xref target="version-specific"/> for
details on how packets from different versions of QUIC are interpreted.</t>

<t>(TODO: Should the list of packet types be version-independent?)</t>

<t>The interpretation of the fields and the payload are specific to a version and
packet type.  Type-specific semantics for this version are described in the
following sections.</t>

</section>
<section anchor="short-header" title="Short Header">

<figure title="Short Header Format" anchor="fig-short-header"><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+
|0|C|K| Type (5)|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+                     [Connection ID (64)]                      +
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                      Packet Number (8/16/32)                ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                     Protected Payload (*)                   ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>The short header can be used after the version and 1-RTT keys are negotiated.
This header form has the following fields:</t>

<t><list style="hanging">
  <t hangText='Header Form:'>
  The most significant bit (0x80) of the first octet of a packet is the header
form.  This bit is set to 0 for the short header.</t>
  <t hangText='Connection ID Flag:'>
  The second bit (0x40) of the first octet indicates whether the Connection ID
field is present.  If set to 1, then the Connection ID field is present; if
set to 0, the Connection ID field is omitted.</t>
  <t hangText='Key Phase Bit:'>
  The third bit (0x20) of the first octet indicates the key phase, which allows
a recipient of a packet to identify the packet protection keys that are used
to protect the packet.  See <xref target="QUIC-TLS"/> for details.</t>
  <t hangText='Short Packet Type:'>
  The remaining 5 bits of the first octet include one of 32 packet types.
<xref target="short-packet-types"/> lists the types that are defined for short packets.</t>
  <t hangText='Connection ID:'>
  If the Connection ID Flag is set, a connection ID occupies octets 1 through 8
of the packet.  See <xref target="connection-id"/> for more details.</t>
  <t hangText='Packet Number:'>
  The length of the packet number field depends on the packet type.  This field
can be 1, 2 or 4 octets long depending on the short packet type.</t>
  <t hangText='Protected Payload:'>
  Packets with a short header always include a 1-RTT protected payload.</t>
</list></t>

<t>The packet type in a short header currently determines only the size of the
packet number field.  Additional types can be used to signal the presence of
other fields.</t>

<texttable title="Short Header Packet Types" anchor="short-packet-types">
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Packet Number Size</ttcol>
      <c>01</c>
      <c>1 octet</c>
      <c>02</c>
      <c>2 octets</c>
      <c>03</c>
      <c>4 octets</c>
</texttable>

<t>The header form, connection ID flag and connection ID of a short header packet
are version-independent.  The remaining fields are specific to the selected QUIC
version.  See <xref target="version-specific"/> for details on how packets from different
versions of QUIC are interpreted.</t>

</section>
<section anchor="packet-version" title="Version Negotiation Packet">

<t>A Version Negotiation packet has long headers with a type value of 0x01 and is
sent only by servers.  The Version Negotiation packet is a response to a client
packet that contains a version that is not supported by the server.</t>

<t>The connection ID field contains a server-selected connection ID that the client
MUST use for subsequent packets, see <xref target="connection-id"/>.</t>

<t>The packet number and version fields echo corresponding values from the
triggering client packet.  This allows clients some assurance that the server
received the packet and that the Version Negotiation packet was not carried in a
packet with a spoofed source address.</t>

<t>The payload of the Version Negotiation packet is a list of 32-bit versions which
the server supports, as shown below.</t>

<figure title="Version Negotiation Packet" anchor="version-negotiation-format"><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                    Supported Version 1 (32)                 ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                   [Supported Version 2 (32)]                ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                               ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                   [Supported Version N (32)]                ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>See <xref target="version-negotiation"/> for a description of the version negotiation
process.</t>

</section>
<section anchor="cleartext-packet" title="Cleartext Packets">

<t>Cleartext packets are sent during the handshake prior to key negotiation.</t>

<t>All cleartext packets contain the current QUIC version in the version field.</t>

<t>The payload of cleartext packets also includes an integrity check, which is
described in <xref target="QUIC-TLS"/>.</t>

<section anchor="packet-client-initial" title="Client Initial Packet">

<t>The Client Initial packet uses long headers with a type value of 0x02.
It carries the first cryptographic handshake message sent by the client.</t>

<t>The client populates the connection ID field with randomly selected values,
unless it has received a packet from the server.  If the client has received a
packet from the server, the connection ID field uses the value provided by the
server.</t>

<t>The packet number used for Client Initial packets is initialized with a random
value each time the new contents are created for the packet.  Retransmissions of
the packet contents increment the packet number by one, see
(<xref target="packet-numbers"/>).</t>

<t>The payload of a Client Initial packet consists of a STREAM frame (or frames)
for stream 0 containing a cryptographic handshake message, plus any PADDING
frames necessary to ensure that the packet is at least the minimum size (see
<xref target="packetization"/>).  This stream frame always starts at an offset of 0 (see
<xref target="stateless-retry"/>).</t>

<t>The client uses the Client Initial Packet type for any packet that contains an
initial cryptographic handshake message.  This includes all cases where a new
packet containing the initial cryptographic message needs to be created, this
includes the packets sent after receiving a Version Negotiation
(<xref target="packet-version"/>) or Server Stateless Retry packet
(<xref target="packet-server-stateless"/>).</t>

</section>
<section anchor="packet-server-stateless" title="Server Stateless Retry Packet">

<t>A Server Stateless Retry packet uses long headers with a type value of 0x03.
It carries cryptographic handshake messages and acknowledgments.  It is used
by a server that wishes to perform a stateless retry (see
<xref target="stateless-retry"/>).</t>

<t>The connection ID field in a Server Stateless Retry packet contains a server
selected value, see <xref target="connection-id"/>.</t>

<t>The packet number field echoes the packet number of the triggering client
packet.  This allows a client to verify that the server received its packet.</t>

<t>After receiving a Server Stateless Retry packet, the client uses a new Client
Initial packet containing the next cryptographic handshake message.  The client
retains the state of its cryptographic handshake, but discards all transport
state.  In effect, the next cryptographic handshake message is sent on a new
connection.  The new Client Initial packet is sent in a packet with a newly
randomized packet number and starting at a stream offset of 0.</t>

<t>Continuing the cryptographic handshake is necessary to ensure that an attacker
cannot force a downgrade of any cryptographic parameters.  In addition to
continuing the cryptographic handshake, the client MUST remember the results of
any version negotiation that occurred (see <xref target="version-negotiation"/>).  The client
MAY also retain any observed RTT or congestion state that it has accumulated for
the flow, but other transport state MUST be discarded.</t>

<t>The payload of the Server Stateless Retry packet contains STREAM frames and
could contain PADDING and ACK frames.  A server can only send a single Server
Stateless Retry packet in response to each Client Initial packet that is
receives.</t>

</section>
<section anchor="packet-server-cleartext" title="Server Cleartext Packet">

<t>A Server Cleartext packet uses long headers with a type value of 0x04.  It is
used to carry acknowledgments and cryptographic handshake messages from the
server.</t>

<t>The connection ID field in a Server Cleartext packet contains a connection ID
that is chosen by the server (see <xref target="connection-id"/>).</t>

<t>The first Server Cleartext packet contains a randomized packet number.  This
value is increased for each subsequent packet sent by the server as described in
<xref target="packet-numbers"/>.</t>

<t>The payload of this packet contains STREAM frames and could contain PADDING and
ACK frames.</t>

</section>
<section anchor="packet-client-cleartext" title="Client Cleartext Packet">

<t>A Client Cleartext packet uses long headers with a type value of 0x05, and is
sent when the client has received a Server Cleartext packet from the server.</t>

<t>The connection ID field in a Client Cleartext packet contains a server-selected
connection ID, see <xref target="connection-id"/>.</t>

<t>The Client Cleartext packet includes a packet number that is one higher than the
last Client Initial, 0-RTT Protected or Client Cleartext packet that was sent.
The packet number is incremented for each subsequent packet, see
<xref target="packet-numbers"/>.</t>

<t>The payload of this packet contains STREAM frames and could contain PADDING and
ACK frames.</t>

</section>
</section>
<section anchor="packet-protected" title="Protected Packets">

<t>Packets that are protected with 0-RTT keys are sent with long headers.  Packets
that are protected with 1-RTT keys MAY be sent with long headers.  The different
packet types explicitly indicate the encryption level and therefore the keys
that are used to remove packet protection.</t>

<t>Packets protected with 0-RTT keys use a type value of 0x06.  The connection ID
field for a 0-RTT packet is selected by the client.</t>

<t>The client can send 0-RTT packets after having received a packet from the server
if that packet does not complete the handshake.  Even if the client receives a
different connection ID from the server, it MUST NOT update the connection ID it
uses for 0-RTT packets.  This enables consistent routing for all 0-RTT packets.</t>

<t>Packets protected with 1-RTT keys that use long headers use a type value of 0x07
for key phase 0 and 0x08 for key phase 1; see <xref target="QUIC-TLS"/> for more details on
the use of key phases.  The connection ID field for these packet types MUST
contain the value selected by the server, see <xref target="connection-id"/>.</t>

<t>The version field for protected packets is the current QUIC version.</t>

<t>The packet number field contains a packet number, which increases with each
packet sent, see <xref target="packet-numbers"/> for details.</t>

<t>The payload is protected using authenticated encryption.  <xref target="QUIC-TLS"/> describes
packet protection in detail.  After decryption, the plaintext consists of a
sequence of frames, as described in <xref target="frames"/>.</t>

</section>
<section anchor="packet-public-reset" title="Public Reset Packet">

<t>A Public Reset packet is only sent by servers and is used to abruptly terminate
communications. Public Reset is provided as an option of last resort for a
server that does not have access to the state of a connection.  This is intended
for use by a server that has lost state (for example, through a crash or
outage). A server that wishes to communicate a fatal connection error MUST use a
CONNECTION_CLOSE frame if it has sufficient state to do so.</t>

<t>A Public Reset packet uses long headers with a type value of 0x09.</t>

<t>The connection ID and packet number of fields together contain octets 1 through
12 from the packet that triggered the reset.  For a client that sends a
connection ID on every packet, the Connection ID field is simply an echo of the
client’s Connection ID, and the Packet Number field includes an echo of the
client’s packet number.  Depending on the client’s packet number length it might
also include 0, 2, or 3 additional octets from the protected payload of the
client packet.</t>

<t>The version field contains the current QUIC version.</t>

<t>A Public Reset packet sent by a server indicates that it does not have the
state necessary to continue with a connection.  In this case, the server will
include the fields that prove that it originally participated in the connection
(see <xref target="public-reset-proof"/> for details).</t>

<t>Upon receipt of a Public Reset packet that contains a valid proof, a client MUST
tear down state associated with the connection.  The client MUST then cease
sending packets on the connection and SHOULD discard any subsequent packets that
arrive. A Public Reset that does not contain a valid proof MUST be ignored.</t>

<section anchor="public-reset-proof" title="Public Reset Proof">

<t>TODO: Details to be added.</t>

</section>
</section>
<section anchor="connection-id" title="Connection ID">

<t>QUIC connections are identified by their 64-bit Connection ID.  All long headers
contain a Connection ID.  Short headers indicate the presence of a Connection ID
using the CONNECTION_ID flag.  When present, the Connection ID is in the same
location in all packet headers, making it straightforward for middleboxes, such
as load balancers, to locate and use it.</t>

<t>The client MUST choose a random connection ID and use it in Client Initial
packets (<xref target="packet-client-initial"/>).  If the client has received any packet from
the server, it uses the connection ID it received from the server.</t>

<t>When the server receives a Client Initial packet, it chooses a new value for the
connection ID and sends that in its response.  The server MUST send a new
connection ID in any packet that is sent in response to a Client Initial packet.
This includes Version Negotiation (<xref target="packet-version"/>), Server Stateless Retry
(<xref target="packet-server-stateless"/>), and the first Server Cleartext packet
(<xref target="packet-server-cleartext"/>).  The server MAY choose to use the value that the
client initially selects.</t>

<t>A server MUST NOT propose a different connection ID in response to a Client
Cleartext packet (<xref target="packet-client-cleartext"/>).  A Client Cleartext packet is
only sent after the server has committed to maintaining connection state.</t>

</section>
<section anchor="packet-numbers" title="Packet Numbers">

<t>The packet number is a 64-bit unsigned number and is used as part of a
cryptographic nonce for packet encryption.  Each endpoint maintains a separate
packet number for sending and receiving.  The packet number for sending MUST
increase by at least one after sending any packet, unless otherwise specified
(see <xref target="initial-packet-number"/>).</t>

<t>A QUIC endpoint MUST NOT reuse a packet number within the same connection (that
is, under the same cryptographic keys).  If the packet number for sending
reaches 2^64 - 1, the sender MUST close the connection by sending a
CONNECTION_CLOSE frame with the error code QUIC_SEQUENCE_NUMBER_LIMIT_REACHED
(connection termination is described in <xref target="termination"/>.)</t>

<t>To reduce the number of bits required to represent the packet number over the
wire, only the least significant bits of the packet number are transmitted over
the wire, up to 32 bits.  The actual packet number for each packet is
reconstructed at the receiver based on the largest packet number received on a
successfully authenticated packet.</t>

<t>A packet number is decoded by finding the packet number value that is closest to
the next expected packet.  The next expected packet is the highest received
packet number plus one.  For example, if the highest successfully authenticated
packet had a packet number of 0xaa82f30e, then a packet containing a 16-bit
value of 0x1f94 will be decoded as 0xaa831f94.</t>

<t>The sender MUST use a packet number size able to represent more than twice as
large a range than the difference between the largest acknowledged packet and
packet number being sent.  A peer receiving the packet will then correctly
decode the packet number, unless the packet is delayed in transit such that it
arrives after many higher-numbered packets have been received.  An endpoint MAY
use a larger packet number size to safeguard against such reordering.</t>

<t>As a result, the size of the packet number encoding is at least one more than
the base 2 logarithm of the number of contiguous unacknowledged packet numbers,
including the new packet.</t>

<t>For example, if an endpoint has received an acknowledgment for packet 0x6afa2f,
sending a packet with a number of 0x6b4264 requires a 16-bit or larger packet
number encoding; whereas a 32-bit packet number is needed to send a packet with
a number of 0x6bc107.</t>

<t>Version Negotiation (<xref target="packet-version"/>), Server Stateless Retry
(<xref target="packet-server-stateless"/>), and Public Reset (<xref target="packet-public-reset"/>)
packets have special rules for populating the packet number field.</t>

<section anchor="initial-packet-number" title="Initial Packet Number">

<t>The initial value for packet number MUST be selected from an uniform random
distribution between 0 and 2^31-1.  That is, the lower 31 bits of the packet
number are randomized.  <xref target="RFC4086"/> provides guidance on the generation of
random values.</t>

<t>The first set of packets sent by an endpoint MUST include the low 32-bits of the
packet number.  Once any packet has been acknowledged, subsequent packets can
use a shorter packet number encoding.</t>

<t>A client that receives a Version Negotiation (<xref target="packet-version"/>) or Server
Stateless Retry packet (<xref target="packet-server-stateless"/>) MUST generate a new initial
packet number.  This ensures that the first transmission attempt for a Client
Initial packet (<xref target="packet-client-initial"/>) always contains a randomized packet
number, but packets that contain retransmissions increment the packet number.</t>

<t>A client MUST NOT generate a new initial packet number if it discards the server
packet.  This might happen if the information the client retransmits its Client
Initial packet.</t>

</section>
</section>
<section anchor="version-specific" title="Handling Packets from Different Versions">

<t>Between different versions the following things are guaranteed to remain
constant:</t>

<t><list style="symbols">
  <t>the location of the header form flag,</t>
  <t>the location of the Connection ID flag in short headers,</t>
  <t>the location and size of the Connection ID field in both header forms,</t>
  <t>the location and size of the Version field in long headers, and</t>
  <t>the location and size of the Packet Number field in long headers.</t>
</list></t>

<t>Implementations MUST assume that an unsupported version uses an unknown packet
format. All other fields MUST be ignored when processing a packet that contains
an unsupported version.</t>

</section>
</section>
<section anchor="frames" title="Frames and Frame Types">

<t>The payload of cleartext packets and the plaintext after decryption of protected
payloads consists of a sequence of frames, as shown in <xref target="packet-frames"/>.</t>

<figure title="Contents of Protected Payload" anchor="packet-frames"><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                          Frame 1 (*)                        ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                          Frame 2 (*)                        ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                               ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                          Frame N (*)                        ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>Protected payloads MUST contain at least one frame, and MAY contain multiple
frames and multiple frame types.</t>

<t>Frames MUST fit within a single QUIC packet and MUST NOT span a QUIC packet
boundary. Each frame begins with a Frame Type byte, indicating its type,
followed by additional type-dependent fields:</t>

<figure title="Generic Frame Layout" anchor="frame-layout"><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   Type (8)    |           Type-Dependent Fields (*)         ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>Frame types are listed in <xref target="frame-types"/>. Note that the Frame Type byte in
STREAM and ACK frames is used to carry other frame-specific flags.  For all
other frames, the Frame Type byte simply identifies the frame.  These frames are
explained in more detail as they are referenced later in the document.</t>

<texttable title="Frame Types" anchor="frame-types">
      <ttcol align='left'>Type Value</ttcol>
      <ttcol align='left'>Frame Type Name</ttcol>
      <ttcol align='left'>Definition</ttcol>
      <c>0x00</c>
      <c>PADDING</c>
      <c><xref target="frame-padding"/></c>
      <c>0x01</c>
      <c>RST_STREAM</c>
      <c><xref target="frame-rst-stream"/></c>
      <c>0x02</c>
      <c>CONNECTION_CLOSE</c>
      <c><xref target="frame-connection-close"/></c>
      <c>0x03</c>
      <c>GOAWAY</c>
      <c><xref target="frame-goaway"/></c>
      <c>0x04</c>
      <c>MAX_DATA</c>
      <c><xref target="frame-max-data"/></c>
      <c>0x05</c>
      <c>MAX_STREAM_DATA</c>
      <c><xref target="frame-max-stream-data"/></c>
      <c>0x06</c>
      <c>MAX_STREAM_ID</c>
      <c><xref target="frame-max-stream-id"/></c>
      <c>0x07</c>
      <c>PING</c>
      <c><xref target="frame-ping"/></c>
      <c>0x08</c>
      <c>BLOCKED</c>
      <c><xref target="frame-blocked"/></c>
      <c>0x09</c>
      <c>STREAM_BLOCKED</c>
      <c><xref target="frame-stream-blocked"/></c>
      <c>0x0a</c>
      <c>STREAM_ID_NEEDED</c>
      <c><xref target="frame-stream-id-needed"/></c>
      <c>0x0b</c>
      <c>NEW_CONNECTION_ID</c>
      <c><xref target="frame-new-connection-id"/></c>
      <c>0xa0 - 0xbf</c>
      <c>ACK</c>
      <c><xref target="frame-ack"/></c>
      <c>0xc0 - 0xff</c>
      <c>STREAM</c>
      <c><xref target="frame-stream"/></c>
</texttable>

</section>
<section anchor="life-of-a-connection" title="Life of a Connection">

<t>A QUIC connection is a single conversation between two QUIC endpoints.  QUIC’s
connection establishment intertwines version negotiation with the cryptographic
and transport handshakes to reduce connection establishment latency, as
described in <xref target="handshake"/>.  Once established, a connection may migrate to a
different IP or port at either endpoint, due to NAT rebinding or mobility, as
described in <xref target="migration"/>.  Finally a connection may be terminated by either
endpoint, as described in <xref target="termination"/>.</t>

<section anchor="version-negotiation" title="Version Negotiation">

<t>QUIC’s connection establishment begins with version negotiation, since all
communication between the endpoints, including packet and frame formats, relies
on the two endpoints agreeing on a version.</t>

<t>A QUIC connection begins with a client sending a handshake packet. The details
of the handshake mechanisms are described in <xref target="handshake"/>, but all of the
initial packets sent from the client to the server MUST use the long header
format and MUST specify the version of the protocol being used.</t>

<t>When the server receives a packet from a client with the long header format, it
compares the client’s version to the versions it supports.</t>

<t>If the version selected by the client is not acceptable to the server, the
server discards the incoming packet and responds with a Version Negotiation
packet (<xref target="packet-version"/>).  This includes a list of versions that the server
will accept.</t>

<t>A server sends a Version Negotiation packet for every packet that it receives
with an unacceptable version.  This allows a server to process packets with
unsupported versions without retaining state.  Though either the initial client
packet or the version negotiation packet that is sent in response could be lost,
the client will send new packets until it successfully receives a response.</t>

<t>If the packet contains a version that is acceptable to the server, the server
proceeds with the handshake (<xref target="handshake"/>).  This commits the server to the
version that the client selected.</t>

<t>When the client receives a Version Negotiation packet from the server, it should
select an acceptable protocol version.  If the server lists an acceptable
version, the client selects that version and reattempts to create a connection
using that version.  Though the contents of a packet might not change in
response to version negotiation, a client MUST increase the packet number it
uses on every packet it sends.  Packets MUST continue to use long headers and
MUST include the new negotiated protocol version.</t>

<t>The client MUST use the long header format and include its selected version on
all packets until it has 1-RTT keys and it has received a packet from the server
which is not a Version Negotiation packet.</t>

<t>A client MUST NOT change the version it uses unless it is in response to a
Version Negotiation packet from the server.  Once a client receives a packet
from the server which is not a Version Negotiation packet, it MUST ignore other
Version Negotiation packets on the same connection.  Similarly, a client MUST
ignore a Version Negotiation packet if it has already received and acted on a
Version Negotiation packet.</t>

<t>A client MUST ignore a Version Negotiation packet that lists the client’s chosen
version.</t>

<t>Version negotiation uses unprotected data. The result of the negotiation MUST be
revalidated as part of the cryptographic handshake (see <xref target="version-validation"/>).</t>

<section anchor="using-reserved-versions" title="Using Reserved Versions">

<t>For a server to use a new version in the future, clients must correctly handle
unsupported versions. To help ensure this, a server SHOULD include a reserved
version (see <xref target="versions"/>) while generating a Version Negotiation packet.</t>

<t>The design of version negotiation permits a server to avoid maintaining state
for packets that it rejects in this fashion.  However, when the server generates
a Version Negotiation packet, it cannot randomly generate a reserved version
number. This is because the server is required to include the same value in its
transport parameters (see <xref target="version-validation"/>).  To avoid the selected
version number changing during connection establishment, the reserved version
SHOULD be generated as a function of values that will be available to the server
when later generating its handshake packets.</t>

<t>A pseudorandom function that takes client address information (IP and port) and
the client selected version as input would ensure that there is sufficient
variability in the values that a server uses.</t>

<t>A client MAY send a packet using a reserved version number.  This can be used to
solicit a list of supported versions from a server.</t>

</section>
</section>
<section anchor="handshake" title="Cryptographic and Transport Handshake">

<t>QUIC relies on a combined cryptographic and transport handshake to minimize
connection establishment latency.  QUIC allocates stream 0 for the cryptographic
handshake.  Version 0x00000001 of QUIC uses TLS 1.3 as described in
<xref target="QUIC-TLS"/>; a different QUIC version number could indicate that a different
cryptographic handshake protocol is in use.</t>

<t>QUIC provides this stream with reliable, ordered delivery of data.  In return,
the cryptographic handshake provides QUIC with:</t>

<t><list style="symbols">
  <t>authenticated key exchange, where  <list style="symbols">
      <t>a server is always authenticated,</t>
      <t>a client is optionally authenticated,</t>
      <t>every connection produces distinct and unrelated keys,</t>
      <t>keying material is usable for packet protection for both 0-RTT and 1-RTT
packets, and</t>
      <t>1-RTT keys have forward secrecy</t>
    </list></t>
  <t>authenticated values for the transport parameters of the peer (see
<xref target="transport-parameters"/>)</t>
  <t>authenticated confirmation of version negotiation (see <xref target="version-validation"/>)</t>
  <t>authenticated negotiation of an application protocol (TLS uses ALPN
<xref target="RFC7301"/> for this purpose)</t>
  <t>for the server, the ability to carry data that provides assurance that the
client can receive packets that are addressed with the transport address that
is claimed by the client (see <xref target="address-validation"/>)</t>
</list></t>

<t>The initial cryptographic handshake message MUST be sent in a single packet.
Any second attempt that is triggered by address validation MUST also be sent
within a single packet.  This avoids having to reassemble a message from
multiple packets.  Reassembling messages requires that a server maintain state
prior to establishing a connection, exposing the server to a denial of service
risk.</t>

<t>The first client packet of the cryptographic handshake protocol MUST fit within
a 1232 octet QUIC packet payload.  This includes overheads that reduce the space
available to the cryptographic handshake protocol.</t>

<t>Details of how TLS is integrated with QUIC is provided in more detail in
<xref target="QUIC-TLS"/>.</t>

</section>
<section anchor="transport-parameters" title="Transport Parameters">

<t>During connection establishment, both endpoints make authenticated declarations
of their transport parameters.  These declarations are made unilaterally by each
endpoint.  Endpoints are required to comply with the restrictions implied by
these parameters; the description of each parameter includes rules for its
handling.</t>

<t>The format of the transport parameters is the TransportParameters struct from
<xref target="figure-transport-parameters"/>.  This is described using the presentation
language from Section 3 of <xref target="I-D.ietf-tls-tls13"/>.</t>

<figure title="Definition of TransportParameters" anchor="figure-transport-parameters"><artwork><![CDATA[
   uint32 QuicVersion;

   enum {
      initial_max_stream_data(0),
      initial_max_data(1),
      initial_max_stream_id(2),
      idle_timeout(3),
      truncate_connection_id(4),
      (65535)
   } TransportParameterId;

   struct {
      TransportParameterId parameter;
      opaque value<0..2^16-1>;
   } TransportParameter;

   struct {
      select (Handshake.msg_type) {
         case client_hello:
            QuicVersion negotiated_version;
            QuicVersion initial_version;

         case encrypted_extensions:
            QuicVersion supported_versions<2..2^8-4>;
      };
      TransportParameter parameters<30..2^16-1>;
   } TransportParameters;
]]></artwork></figure>

<t>The <spanx style="verb">extension_data</spanx> field of the quic_transport_parameters extension defined in
<xref target="QUIC-TLS"/> contains a TransportParameters value.  TLS encoding rules are
therefore used to encode the transport parameters.</t>

<t>QUIC encodes transport parameters into a sequence of octets, which are then
included in the cryptographic handshake.  Once the handshake completes, the
transport parameters declared by the peer are available.  Each endpoint
validates the value provided by its peer.  In particular, version negotiation
MUST be validated (see <xref target="version-validation"/>) before the connection
establishment is considered properly complete.</t>

<t>Definitions for each of the defined transport parameters are included in
<xref target="transport-parameter-definitions"/>.</t>

<section anchor="transport-parameter-definitions" title="Transport Parameter Definitions">

<t>An endpoint MUST include the following parameters in its encoded
TransportParameters:</t>

<t><list style="hanging">
  <t hangText='initial_max_stream_data (0x0000):'>
  The initial stream maximum data parameter contains the initial value for the
maximum data that can be sent on any newly created stream.  This parameter is
encoded as an unsigned 32-bit integer in units of octets.  This is equivalent
to an implicit MAX_STREAM_DATA frame (<xref target="frame-max-stream-data"/>) being sent on
all streams immediately after opening.</t>
  <t hangText='initial_max_data (0x0001):'>
  The initial maximum data parameter contains the initial value for the maximum
amount of data that can be sent on the connection.  This parameter is encoded
as an unsigned 32-bit integer in units of 1024 octets.  That is, the value
here is multiplied by 1024 to determine the actual maximum value.  This is
equivalent to sending a MAX_DATA (<xref target="frame-max-data"/>) for the connection
immediately after completing the handshake.</t>
  <t hangText='initial_max_stream_id (0x0002):'>
  The initial maximum stream ID parameter contains the initial maximum stream
number the peer may initiate, encoded as an unsigned 32-bit integer.  This is
equivalent to sending a MAX_STREAM_ID (<xref target="frame-max-stream-id"/>) immediately
after completing the handshake.</t>
  <t hangText='idle_timeout (0x0003):'>
  The idle timeout is a value in seconds that is encoded as an unsigned 16-bit
integer.  The maximum value is 600 seconds (10 minutes).</t>
</list></t>

<t>An endpoint MAY use the following transport parameters:</t>

<t><list style="hanging">
  <t hangText='truncate_connection_id (0x0004):'>
  The truncated connection identifier parameter indicates that packets sent to
the peer can omit the connection ID.  This can be used by an endpoint where
the 5-tuple is sufficient to identify a connection.  This parameter is zero
length.  Omitting the parameter indicates that the endpoint relies on the
connection ID being present in every packet.</t>
</list></t>

</section>
<section anchor="zerortt-parameters" title="Values of Transport Parameters for 0-RTT">

<t>Transport parameters from the server MUST be remembered by the client for use
with 0-RTT data.  If the TLS NewSessionTicket message includes the
quic_transport_parameters extension, then those values are used for the server
values when establishing a new connection using that ticket.  Otherwise, the
transport parameters that the server advertises during connection establishment
are used.</t>

<t>A server can remember the transport parameters that it advertised, or store an
integrity-protected copy of the values in the ticket and recover the information
when accepting 0-RTT data.  A server uses the transport parameters in
determining whether to accept 0-RTT data.</t>

<t>A server MAY accept 0-RTT and subsequently provide different values for
transport parameters for use in the new connection.  If 0-RTT data is accepted
by the server, the server MUST NOT reduce any limits or alter any values that
might be violated by the client with its 0-RTT data.  In particular, a server
that accepts 0-RTT data MUST NOT set values for initial_max_data or
initial_max_stream_data that are smaller than the remembered value of those
parameters.  Similarly, a server MUST NOT reduce the value of
initial_max_stream_id.</t>

<t>A server MUST reject 0-RTT data or even abort a handshake if the implied values
for transport parameters cannot be supported.</t>

</section>
<section anchor="new-transport-parameters" title="New Transport Parameters">

<t>New transport parameters can be used to negotiate new protocol behavior.  An
endpoint MUST ignore transport parameters that it does not support.  Absence of
a transport parameter therefore disables any optional protocol feature that is
negotiated using the parameter.</t>

<t>New transport parameters can be registered according to the rules in
<xref target="iana-transport-parameters"/>.</t>

</section>
<section anchor="version-validation" title="Version Negotiation Validation">

<t>The transport parameters include three fields that encode version information.
These retroactively authenticate the version negotiation (see
<xref target="version-negotiation"/>) that is performed prior to the cryptographic handshake.</t>

<t>The cryptographic handshake provides integrity protection for the negotiated
version as part of the transport parameters (see <xref target="transport-parameters"/>).  As
a result, modification of version negotiation packets by an attacker can be
detected.</t>

<t>The client includes two fields in the transport parameters:</t>

<t><list style="symbols">
  <t>The negotiated_version is the version that was finally selected for use.  This
MUST be identical to the value that is on the packet that carries the
ClientHello.  A server that receives a negotiated_version that does not match
the version of QUIC that is in use MUST terminate the connection with a
QUIC_VERSION_NEGOTIATION_MISMATCH error code.</t>
  <t>The initial_version is the version that the client initially attempted to use.
If the server did not send a version negotiation packet <xref target="packet-version"/>,
this will be identical to the negotiated_version.</t>
</list></t>

<t>A server that processes all packets in a stateful fashion can remember how
version negotiation was performed and validate the initial_version value.</t>

<t>A server that does not maintain state for every packet it receives (i.e., a
stateless server) uses a different process. If the initial and negotiated
versions are the same, a stateless server can accept the value.</t>

<t>If the initial version is different from the negotiated_version, a stateless
server MUST check that it would have sent a version negotiation packet if it had
received a packet with the indicated initial_version.  If a server would have
accepted the version included in the initial_version and the value differs from
the value of negotiated_version, the server MUST terminate the connection with a
QUIC_VERSION_NEGOTIATION_MISMATCH error.</t>

<t>The server includes a list of versions that it would send in any version
negotiation packet (<xref target="packet-version"/>) in supported_versions.  This value is
set even if it did not send a version negotiation packet.</t>

<t>The client can validate that the negotiated_version is included in the
supported_versions list and - if version negotiation was performed - that it
would have selected the negotiated version.  A client MUST terminate the
connection with a QUIC_VERSION_NEGOTIATION_MISMATCH error code if the
negotiated_version value is not included in the supported_versions list.  A
client MUST terminate with a QUIC_VERSION_NEGOTIATION_MISMATCH error code if
version negotiation occurred but it would have selected a different version
based on the value of the supported_versions list.</t>

</section>
</section>
<section anchor="stateless-retry" title="Stateless Retries">

<t>A server can process an initial cryptographic handshake messages from a client
without committing any state. This allows a server to perform address validation
(<xref target="address-validation"/>, or to defer connection establishment costs.</t>

<t>A server that generates a response to an initial packet without retaining
connection state MUST use the Server Stateless Retry packet
(<xref target="packet-server-stateless"/>).  This packet causes a client to reset its
transport state and to continue the connection attempt with new connection state
while maintaining the state of the cryptographic handshake.</t>

<t>A server MUST NOT send multiple Server Stateless Retry packets in response to a
client handshake packet.  Thus, any cryptographic handshake message that is sent
MUST fit within a single packet.</t>

<t>In TLS, the Server Stateless Retry packet type is used to carry the
HelloRetryRequest message.</t>

</section>
<section anchor="address-validation" title="Proof of Source Address Ownership">

<t>Transport protocols commonly spend a round trip checking that a client owns the
transport address (IP and port) that it claims.  Verifying that a client can
receive packets sent to its claimed transport address protects against spoofing
of this information by malicious clients.</t>

<t>This technique is used primarily to avoid QUIC from being used for traffic
amplification attack.  In such an attack, a packet is sent to a server with
spoofed source address information that identifies a victim.  If a server
generates more or larger packets in response to that packet, the attacker can
use the server to send more data toward the victim than it would be able to send
on its own.</t>

<t>Several methods are used in QUIC to mitigate this attack.  Firstly, the initial
handshake packet is padded to at least 1280 octets.  This allows a server to
send a similar amount of data without risking causing an amplification attack
toward an unproven remote address.</t>

<t>A server eventually confirms that a client has received its messages when the
cryptographic handshake successfully completes.  This might be insufficient,
either because the server wishes to avoid the computational cost of completing
the handshake, or it might be that the size of the packets that are sent during
the handshake is too large.  This is especially important for 0-RTT, where the
server might wish to provide application data traffic - such as a response to a
request - in response to the data carried in the early data from the client.</t>

<t>To send additional data prior to completing the cryptographic handshake, the
server then needs to validate that the client owns the address that it claims.</t>

<t>Source address validation is therefore performed during the establishment of a
connection.  TLS provides the tools that support the feature, but basic
validation is performed by the core transport protocol.</t>

<section anchor="client-address-validation-procedure" title="Client Address Validation Procedure">

<t>QUIC uses token-based address validation.  Any time the server wishes to
validate a client address, it provides the client with a token.  As long as the
token cannot be easily guessed (see <xref target="token-integrity"/>), if the client is able
to return that token, it proves to the server that it received the token.</t>

<t>During the processing of the cryptographic handshake messages from a client, TLS
will request that QUIC make a decision about whether to proceed based on the
information it has.  TLS will provide QUIC with any token that was provided by
the client.  For an initial packet, QUIC can decide to abort the connection,
allow it to proceed, or request address validation.</t>

<t>If QUIC decides to request address validation, it provides the cryptographic
handshake with a token.  The contents of this token are consumed by the server
that generates the token, so there is no need for a single well-defined format.
A token could include information about the claimed client address (IP and
port), a timestamp, and any other supplementary information the server will need
to validate the token in the future.</t>

<t>The cryptographic handshake is responsible for enacting validation by sending
the address validation token to the client.  A legitimate client will include a
copy of the token when it attempts to continue the handshake.  The cryptographic
handshake extracts the token then asks QUIC a second time whether the token is
acceptable.  In response, QUIC can either abort the connection or permit it to
proceed.</t>

<t>A connection MAY be accepted without address validation - or with only limited
validation - but a server SHOULD limit the data it sends toward an unvalidated
address.  Successful completion of the cryptographic handshake implicitly
provides proof that the client has received packets from the server.</t>

</section>
<section anchor="address-validation-on-session-resumption" title="Address Validation on Session Resumption">

<t>A server MAY provide clients with an address validation token during one
connection that can be used on a subsequent connection.  Address validation is
especially important with 0-RTT because a server potentially sends a significant
amount of data to a client in response to 0-RTT data.</t>

<t>A different type of token is needed when resuming.  Unlike the token that is
created during a handshake, there might be some time between when the token is
created and when the token is subsequently used.  Thus, a resumption token
SHOULD include an expiration time.  It is also unlikely that the client port
number is the same on two different connections; validating the port is
therefore unlikely to be successful.</t>

<t>This token can be provided to the cryptographic handshake immediately after
establishing a connection.  QUIC might also generate an updated token if
significant time passes or the client address changes for any reason (see
<xref target="migration"/>).  The cryptographic handshake is responsible for providing the
client with the token.  In TLS the token is included in the ticket that is used
for resumption and 0-RTT, which is carried in a NewSessionTicket message.</t>

</section>
<section anchor="token-integrity" title="Address Validation Token Integrity">

<t>An address validation token MUST be difficult to guess.  Including a large
enough random value in the token would be sufficient, but this depends on the
server remembering the value it sends to clients.</t>

<t>A token-based scheme allows the server to offload any state associated with
validation to the client.  For this design to work, the token MUST be covered by
integrity protection against modification or falsification by clients.  Without
integrity protection, malicious clients could generate or guess values for
tokens that would be accepted by the server.  Only the server requires access to
the integrity protection key for tokens.</t>

<t>In TLS the address validation token is often bundled with the information that
TLS requires, such as the resumption secret.  In this case, adding integrity
protection can be delegated to the cryptographic handshake protocol, avoiding
redundant protection.  If integrity protection is delegated to the cryptographic
handshake, an integrity failure will result in immediate cryptographic handshake
failure.  If integrity protection is performed by QUIC, QUIC MUST abort the
connection if the integrity check fails with a QUIC_ADDRESS_VALIDATION_FAILURE
error code.</t>

</section>
</section>
<section anchor="migration" title="Connection Migration">

<t>QUIC connections are identified by their 64-bit Connection ID.  QUIC’s
consistent connection ID allows connections to survive changes to the client’s
IP and/or port, such as those caused by client or server migrating to a new
network.  Connection migration allows a client to retain any shared state with a
connection when they move networks.  This includes state that can be hard to
recover such as outstanding requests, which might otherwise be lost with no easy
way to retry them.</t>

<section anchor="migration-linkability" title="Privacy Implications of Connection Migration">

<t>Using a stable connection ID on multiple network paths allows a
passive observer to correlate activity between those paths.  A client
that moves between networks might not wish to have their activity
correlated by any entity other than a server. The NEW_CONNECTION_ID
message can be sent by a server to provide an unlinkable connection ID
for use in case the client wishes to explicitly break linkability
between two points of network attachment.</t>

<t>A client which wishes to break linkability upon changing networks MUST
use the NEW_CONNECTION_ID as well as incrementing the packet sequence
number by an externally unpredictable value computed as described in
<xref target="packet-number-gap"/>. Packet number gaps are cumulative.  A client
might skip connection IDs, but it MUST ensure that it applies the
associated packet number gaps in addition to the packet number gap
associated with the connection ID that it does use.</t>

<t>A client might need to send packets on multiple networks without receiving any
response from the server.  To ensure that the client is not linkable across each
of these changes, a new connection ID and packet number gap are needed for each
network.  To support this, a server sends multiple NEW_CONNECTION_ID messages.
Each NEW_CONNECTION_ID is marked with a sequence number.  Connection IDs MUST be
used in the order in which they are numbered.</t>

<t>A server that receives a packet that is marked with a new connection ID recovers
the packet number by adding the cumulative packet number gap to its expected
packet number.  A server SHOULD discard packets that contain a smaller gap than
it advertised.</t>

<t>For instance, a server might provide a packet number gap of 7 associated with a
new connection ID.  If the server received packet 10 using the previous
connection ID, it should expect packets on the new connection ID to start at 18.
A packet with the new connection ID and a packet number of 17 is discarded as
being in error.</t>

<section anchor="packet-number-gap" title="Packet Number Gap">

<t>In order to avoid linkage, the packet number gap MUST be externally
indistinguishable from random. The packet number gap for a connection
ID with sequence number is computed by encoding the sequence number
as a 32-bit integer in big-endian format, and then computing:</t>

<figure><artwork><![CDATA[
Gap = HKDF-Expand-Label(packet_number_secret,
                        "QUIC packet sequence gap", sequence, 4)
]]></artwork></figure>

<t>The output of HKDF-Expand-Label is interpreted as a big-endian
number. “packet_number_secret” is derived from the TLS key exchange,
as described in <xref target="QUIC-TLS"/> Section 5.6.</t>

</section>
</section>
<section anchor="address-validation-for-migrated-connections" title="Address Validation for Migrated Connections">

<t>TODO: see issue #161</t>

</section>
</section>
<section anchor="termination" title="Connection Termination">

<t>Connections should remain open until they become idle for a pre-negotiated
period of time.  A QUIC connection, once established, can be terminated in one
of three ways:</t>

<t><list style="numbers">
  <t>Explicit Shutdown: An endpoint sends a CONNECTION_CLOSE frame to
initiate a connection termination.  An endpoint may send a GOAWAY frame to
the peer prior to a CONNECTION_CLOSE to indicate that the connection will
soon be terminated.  A GOAWAY frame signals to the peer that any active
streams will continue to be processed, but the sender of the GOAWAY will not
initiate any additional streams and will not accept any new incoming streams.
On termination of the active streams, a CONNECTION_CLOSE may be sent.  If an
endpoint sends a CONNECTION_CLOSE frame while unterminated streams are active
(no FIN bit or RST_STREAM frames have been sent or received for one or more
streams), then the peer must assume that the streams were incomplete and were
abnormally terminated.</t>
  <t>Implicit Shutdown: The default idle timeout is a required parameter in
connection negotiation.  The maximum is 10 minutes.  If there is no network
activity for the duration of the idle timeout, the connection is closed.  By
default a CONNECTION_CLOSE frame will be sent.  A silent close option can be
enabled when it is expensive to send an explicit close, such as mobile
networks that must wake up the radio.</t>
  <t>Abrupt Shutdown: An endpoint may send a Public Reset packet at any time
during the connection to abruptly terminate an active connection.  A Public
Reset packet SHOULD only be used as a final recourse.  Commonly, a public
reset is expected to be sent when a packet on an established connection is
received by an endpoint that is unable decrypt the packet.  For instance, if
a server reboots mid-connection and loses any cryptographic state associated
with open connections, and then receives a packet on an open connection, it
should send a Public Reset packet in return.  (TODO: articulate rules around
when a public reset should be sent.)</t>
</list></t>

<t>TODO: Connections that are terminated are added to a TIME_WAIT list at the
server, so as to absorb any straggler packets in the network.  Discuss TIME_WAIT
list.</t>

</section>
</section>
<section anchor="frame-types-and-formats" title="Frame Types and Formats">

<t>As described in <xref target="frames"/>, Regular packets contain one or more frames.
We now describe the various QUIC frame types that can be present in a Regular
packet. The use of these frames and various frame header bits are described in
subsequent sections.</t>

<section anchor="frame-stream" title="STREAM Frame">

<t>STREAM frames implicitly create a stream and carry stream data. The type byte
for a STREAM frame contains embedded flags, and is formatted as <spanx style="verb">11FDOOSS</spanx>.
These bits are parsed as follows:</t>

<t><list style="symbols">
  <t>The first two bits must be set to 11, indicating that this is a STREAM frame.</t>
  <t><spanx style="verb">F</spanx> is the FIN bit, which is used for stream termination.</t>
  <t>The <spanx style="verb">D</spanx> bit indicates whether a Data Length field is present in the STREAM
header.  When set to 0, this field indicates that the Stream Data field
extends to the end of the packet.  When set to 1, this field indicates that
Data Length field contains the length (in bytes) of the Stream Data field.
The option to omit the length should only be used when the packet is a
“full-sized” packet, to avoid the risk of corruption via padding.</t>
  <t>The <spanx style="verb">OO</spanx> bits encode the length of the Offset header field as 0, 16, 32,
or 64 bits long.</t>
  <t>The <spanx style="verb">SS</spanx> bits encode the length of the Stream ID header field as 8, 16, 24,
or 32 bits.</t>
</list></t>

<t>A STREAM frame is shown below.</t>

<figure title="STREAM Frame Format" anchor="stream-format"><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       [Data Length (16)]      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                    Stream ID (8/16/24/32)                   ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                      Offset (0/16/32/64)                    ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Stream Data (*)                      ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>The STREAM frame contains the following fields:</t>

<t><list style="hanging">
  <t hangText='Data Length:'>
  An optional 16-bit unsigned number specifying the length of the Stream Data
field in this STREAM frame.  This field is present when the <spanx style="verb">D</spanx> bit is set to
1.</t>
  <t hangText='Stream ID:'>
  The stream ID of the stream (see <xref target="stream-id"/>).</t>
  <t hangText='Offset:'>
  A variable-sized unsigned number specifying the byte offset in the stream for
the data in this STREAM frame.  When the offset length is 0, the offset is 0.
The first byte in the stream has an offset of 0.  The largest offset delivered
on a stream - the sum of the re-constructed offset and data length - MUST be
less than 2^64.</t>
  <t hangText='Stream Data:'>
  The bytes from the designated stream to be delivered.</t>
</list></t>

<t>A STREAM frame MUST have either non-zero data length or the FIN bit set.  When
the FIN flag is sent on an empty STREAM frame, the offset in the STREAM frame
MUST be one greater than the last data byte sent on this stream.</t>

<t>Stream multiplexing is achieved by interleaving STREAM frames from multiple
streams into one or more QUIC packets.  A single QUIC packet MAY bundle STREAM
frames from multiple streams.</t>

<t>Implementation note: One of the benefits of QUIC is avoidance of head-of-line
blocking across multiple streams.  When a packet loss occurs, only streams with
data in that packet are blocked waiting for a retransmission to be received,
while other streams can continue making progress.  Note that when data from
multiple streams is bundled into a single QUIC packet, loss of that packet
blocks all those streams from making progress.  An implementation is therefore
advised to bundle as few streams as necessary in outgoing packets without losing
transmission efficiency to underfilled packets.</t>

</section>
<section anchor="frame-ack" title="ACK Frame">

<t>Receivers send ACK frames to inform senders which packets they have received and
processed, as well as which packets are considered missing.  The ACK frame
contains between 1 and 256 ACK blocks.  ACK blocks are ranges of acknowledged
packets.</t>

<t>To limit ACK blocks to those that have not yet been received by the sender, the
receiver SHOULD track which ACK frames have been acknowledged by its peer.  Once
an ACK frame has been acknowledged, the packets it acknowledges SHOULD not be
acknowledged again.</t>

<t>A receiver that is only sending ACK frames will not receive acknowledgments for
its packets.  Sending an occasional MAX_DATA or MAX_STREAM_DATA frame as data is
received will ensure that acknowledgements are generated by a peer.  Otherwise,
an endpoint MAY send a PING frame once per RTT to solicit an acknowledgment.</t>

<t>To limit receiver state or the size of ACK frames, a receiver MAY limit the
number of ACK blocks it sends.  A receiver can do this even without receiving
acknowledgment of its ACK frames, with the knowledge this could cause the sender
to unnecessarily retransmit some data.  When this is necessary, the receiver
SHOULD acknowledge newly received packets and stop acknowledging packets
received in the past.</t>

<t>Unlike TCP SACKs, QUIC ACK blocks are cumulative and therefore irrevocable.
Once a packet has been acknowledged, even if it does not appear in a future ACK
frame, it is assumed to be acknowledged.</t>

<t>QUIC ACK frames contain a timestamp section with up to 255 timestamps.
Timestamps enable better congestion control, but are not required for correct
loss recovery, and old timestamps are less valuable, so it is not guaranteed
every timestamp will be received by the sender.  A receiver SHOULD send a
timestamp exactly once for each received packet containing retransmittable
frames. A receiver MAY send timestamps for non-retransmittable packets.
A receiver MUST not send timestamps in unprotected packets.</t>

<t>A sender MAY intentionally skip packet numbers to introduce entropy into the
connection, to avoid opportunistic acknowledgement attacks.  The sender MUST
close the connection if an unsent packet number is acknowledged.  The format of
the ACK frame is efficient at expressing blocks of missing packets; skipping
packet numbers between 1 and 255 effectively provides up to 8 bits of efficient
entropy on demand, which should be adequate protection against most
opportunistic acknowledgement attacks.</t>

<t>The type byte for a ACK frame contains embedded flags, and is formatted as
<spanx style="verb">101NLLMM</spanx>.  These bits are parsed as follows:</t>

<t><list style="symbols">
  <t>The first three bits must be set to 101 indicating that this is an ACK frame.</t>
  <t>The <spanx style="verb">N</spanx> bit indicates whether the frame has more than 1 range of acknowledged
packets (i.e., whether the ACK Block Section contains a Num Blocks field).</t>
  <t>The two <spanx style="verb">LL</spanx> bits encode the length of the Largest Acknowledged field as 1, 2,
4, or 6 bytes long.</t>
  <t>The two <spanx style="verb">MM</spanx> bits encode the length of the ACK Block Length fields as 1, 2,
4, or 6 bytes long.</t>
</list></t>

<t>An ACK frame is shown below.</t>

<figure title="ACK Frame Format" anchor="ack-format"><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|[Num Blocks(8)]|   NumTS (8)   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Largest Acknowledged (8/16/32/48)            ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|        ACK Delay (16)         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                     ACK Block Section (*)                   ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                     Timestamp Section (*)                   ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>The fields in the ACK frame are as follows:</t>

<t><list style="hanging">
  <t hangText='Num Blocks (opt):'>
  An optional 8-bit unsigned value specifying the number of additional ACK
blocks (besides the required First ACK Block) in this ACK frame.  Only present
if the ‘N’ flag bit is 1.</t>
  <t hangText='Num Timestamps:'>
  An unsigned 8-bit number specifying the total number of &lt;packet number,
timestamp&gt; pairs in the Timestamp Section.</t>
  <t hangText='Largest Acknowledged:'>
  A variable-sized unsigned value representing the largest packet number the
peer is acknowledging in this packet (typically the largest that the peer has
seen thus far.)</t>
  <t hangText='ACK Delay:'>
  The time from when the largest acknowledged packet, as indicated in the
Largest Acknowledged field, was received by this peer to when this ACK was
sent.</t>
  <t hangText='ACK Block Section:'>
  Contains one or more blocks of packet numbers which have been successfully
received, see <xref target="ack-block-section"/>.</t>
  <t hangText='Timestamp Section:'>
  Contains zero or more timestamps reporting transit delay of received packets.
See <xref target="timestamp-section"/>.</t>
</list></t>

<section anchor="ack-block-section" title="ACK Block Section">

<t>The ACK Block Section contains between one and 256 blocks of packet numbers
which have been successfully received. If the Num Blocks field is absent, only
the First ACK Block length is present in this section. Otherwise, the Num Blocks
field indicates how many additional blocks follow the First ACK Block Length
field.</t>

<figure title="ACK Block Section" anchor="ack-block-format"><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|              First ACK Block Length (8/16/32/48)            ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  [Gap 1 (8)]  |       [ACK Block 1 Length (8/16/32/48)]     ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  [Gap 2 (8)]  |       [ACK Block 2 Length (8/16/32/48)]     ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                             ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  [Gap N (8)]  |       [ACK Block N Length (8/16/32/48)]     ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>The fields in the ACK Block Section are:</t>

<t><list style="hanging">
  <t hangText='First ACK Block Length:'>
  An unsigned packet number delta that indicates the number of contiguous
additional packets being acknowledged starting at the Largest Acknowledged.</t>
  <t hangText='Gap To Next Block (opt, repeated):'>
  An unsigned number specifying the number of contiguous missing packets from
the end of the previous ACK block to the start of the next.  Repeated “Num
Blocks” times.</t>
  <t hangText='ACK Block Length (opt, repeated):'>
  An unsigned packet number delta that indicates the number of contiguous
packets being acknowledged starting after the end of the previous gap.
Repeated “Num Blocks” times.</t>
</list></t>

</section>
<section anchor="timestamp-section" title="Timestamp Section">

<t>The Timestamp Section contains between zero and 255 measurements of packet
receive times relative to the beginning of the connection.</t>

<figure title="Timestamp Section" anchor="timestamp-format"><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+
| [Delta LA (8)]|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                    [First Timestamp (32)]                     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|[Delta LA 1(8)]| [Time Since Previous 1 (16)]  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|[Delta LA 2(8)]| [Time Since Previous 2 (16)]  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                       ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|[Delta LA N(8)]| [Time Since Previous N (16)]  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>The fields in the Timestamp Section are:</t>

<t><list style="hanging">
  <t hangText='Delta Largest Acknowledged (opt):'>
  An optional 8-bit unsigned packet number delta specifying the delta between
the largest acknowledged and the first packet whose timestamp is being
reported.  In other words, this first packet number may be computed as
(Largest Acknowledged - Delta Largest Acknowledged.)</t>
  <t hangText='First Timestamp (opt):'>
  An optional 32-bit unsigned value specifying the time delta in microseconds,
from the beginning of the connection to the arrival of the packet indicated by
Delta Largest Acknowledged.</t>
  <t hangText='Delta Largest Acked 1..N (opt, repeated):'>
  This field has the same semantics and format as “Delta Largest Acknowledged”.
Repeated “Num Timestamps - 1” times.</t>
  <t hangText='Time Since Previous Timestamp 1..N(opt, repeated):'>
  An optional 16-bit unsigned value specifying time delta from the previous
reported timestamp.  It is encoded in the same format as the ACK Delay.
Repeated “Num Timestamps - 1” times.</t>
</list></t>

<t>The timestamp section lists packet receipt timestamps ordered by timestamp.</t>

<section anchor="time-format" title="Time Format">

<t>DISCUSS_AND_REPLACE: Perhaps make this format simpler.</t>

<t>The time format used in the ACK frame above is a 16-bit unsigned float with 11
explicit bits of mantissa and 5 bits of explicit exponent, specifying time in
microseconds.  The bit format is loosely modeled after IEEE 754.  For example, 1
microsecond is represented as 0x1, which has an exponent of zero, presented in
the 5 high order bits, and mantissa of 1, presented in the 11 low order bits.
When the explicit exponent is greater than zero, an implicit high-order 12th bit
of 1 is assumed in the mantissa.  For example, a floating value of 0x800 has an
explicit exponent of 1, as well as an explicit mantissa of 0, but then has an
effective mantissa of 4096 (12th bit is assumed to be 1).  Additionally, the
actual exponent is one-less than the explicit exponent, and the value represents
4096 microseconds.  Any values larger than the representable range are clamped
to 0xFFFF.</t>

</section>
</section>
<section anchor="ack-frames-and-packet-protection" title="ACK Frames and Packet Protection">

<t>ACK frames that acknowledge protected packets MUST be carried in a packet that
has an equivalent or greater level of packet protection.</t>

<t>Packets that are protected with 1-RTT keys MUST be acknowledged in packets that
are also protected with 1-RTT keys.</t>

<t>A packet that is not protected and claims to acknowledge a packet number that
was sent with packet protection is not valid.  An unprotected packet that
carries acknowledgments for protected packets MUST be discarded in its entirety.</t>

<t>Packets that a client sends with 0-RTT packet protection MUST be acknowledged by
the server in packets protected by 1-RTT keys.  This can mean that the client is
unable to use these acknowledgments if the server cryptographic handshake
messages are delayed or lost.  Note that the same limitation applies to other
data sent by the server protected by the 1-RTT keys.</t>

<t>Unprotected packets, such as those that carry the initial cryptographic
handshake messages, MAY be acknowledged in unprotected packets.  Unprotected
packets are vulnerable to falsification or modification.  Unprotected packets
can be acknowledged along with protected packets in a protected packet.</t>

<t>An endpoint SHOULD acknowledge packets containing cryptographic handshake
messages in the next unprotected packet that it sends, unless it is able to
acknowledge those packets in later packets protected by 1-RTT keys.  At the
completion of the cryptographic handshake, both peers send unprotected packets
containing cryptographic handshake messages followed by packets protected by
1-RTT keys. An endpoint SHOULD acknowledge the unprotected packets that complete
the cryptographic handshake in a protected packet, because its peer is
guaranteed to have access to 1-RTT packet protection keys.</t>

<t>For instance, a server acknowledges a TLS ClientHello in the packet that carries
the TLS ServerHello; similarly, a client can acknowledge a TLS HelloRetryRequest
in the packet containing a second TLS ClientHello.  The complete set of server
handshake messages (TLS ServerHello through to Finished) might be acknowledged
by a client in protected packets, because it is certain that the server is able
to decipher the packet.</t>

</section>
</section>
<section anchor="frame-max-data" title="MAX_DATA Frame">

<t>The MAX_DATA frame (type=0x04) is used in flow control to inform the peer of
the maximum amount of data that can be sent on the connection as a whole.</t>

<t>The frame is as follows:</t>

<figure><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+                        Maximum Data (64)                      +
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>The fields in the MAX_DATA frame are as follows:</t>

<t><list style="hanging">
  <t hangText='Maximum Data:'>
  A 64-bit unsigned integer indicating the maximum amount of data that can be
sent on the entire connection, in units of 1024 octets.  That is, the updated
connection-level data limit is determined by multiplying the encoded value by
1024.</t>
</list></t>

<t>All data sent in STREAM frames counts toward this limit, with the exception of
data on stream 0.  The sum of the largest received offsets on all streams -
including closed streams, but excluding stream 0 - MUST NOT exceed the value
advertised by a receiver.  An endpoint MUST terminate a connection with a
QUIC_FLOW_CONTROL_RECEIVED_TOO_MUCH_DATA error if it receives more data than the
maximum data value that it has sent, unless this is a result of a change in the
initial limits (see <xref target="zerortt-parameters"/>).</t>

</section>
<section anchor="frame-max-stream-data" title="MAX_STREAM_DATA Frame">

<t>The MAX_STREAM_DATA frame (type=0x05) is used in flow control to inform a peer
of the maximum amount of data that can be sent on a stream.</t>

<t>The frame is as follows:</t>

<figure><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Stream ID (32)                         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+                    Maximum Stream Data (64)                   +
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>The fields in the MAX_STREAM_DATA frame are as follows:</t>

<t><list style="hanging">
  <t hangText='Stream ID:'>
  The stream ID of the stream that is affected.</t>
  <t hangText='Maximum Stream Data:'>
  A 64-bit unsigned integer indicating the maximum amount of data that can be
sent on the identified stream, in units of octets.</t>
</list></t>

<t>When counting data toward this limit, an endpoint accounts for the largest
received offset of data that is sent or received on the stream.  Loss or
reordering can mean that the largest received offset on a stream can be greater
than the total size of data received on that stream.  Receiving STREAM frames
might not increase the largest received offset.</t>

<t>The data sent on a stream MUST NOT exceed the largest maximum stream data value
advertised by the receiver.  An endpoint MUST terminate a connection with a
QUIC_FLOW_CONTROL_RECEIVED_TOO_MUCH_DATA error if it receives more data than the
largest maximum stream data that it has sent for the affected stream, unless
this is a result of a change in the initial limits (see <xref target="zerortt-parameters"/>).</t>

</section>
<section anchor="frame-max-stream-id" title="MAX_STREAM_ID Frame">

<t>The MAX_STREAM_ID frame (type=0x06) informs the peer of the maximum stream ID
that they are permitted to open.</t>

<t>The frame is as follows:</t>

<figure><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                    Maximum Stream ID (32)                     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>The fields in the MAX_STREAM_ID frame are as follows:</t>

<t><list style="hanging">
  <t hangText='Maximum Stream ID:'>
  ID of the maximum peer-initiated stream ID for the connection.</t>
</list></t>

<t>Loss or reordering can mean that a MAX_STREAM_ID frame can be received which
states a lower stream limit than the client has previously received.
MAX_STREAM_ID frames which do not increase the maximum stream ID MUST be
ignored.</t>

<t>A peer MUST NOT initiate a stream with a higher stream ID than the greatest
maximum stream ID it has received.  An endpoint MUST terminate a connection with
a QUIC_TOO_MANY_OPEN_STREAMS error if a peer initiates a stream with a higher
stream ID than it has sent, unless this is a result of a change in the initial
limits (see <xref target="zerortt-parameters"/>).</t>

</section>
<section anchor="frame-blocked" title="BLOCKED Frame">

<t>A sender sends a BLOCKED frame (type=0x08) when it wishes to send data, but is
unable to due to connection-level flow control (see <xref target="blocking"/>). BLOCKED
frames can be used as input to tuning of flow control algorithms (see
<xref target="fc-credit"/>).</t>

<t>The BLOCKED frame does not contain a payload.</t>

</section>
<section anchor="frame-stream-blocked" title="STREAM_BLOCKED Frame">

<t>A sender sends a STREAM_BLOCKED frame (type=0x09) when it wishes to send data,
but is unable to due to stream-level flow control.  This frame is analogous to
BLOCKED (<xref target="frame-blocked"/>).</t>

<t>The STREAM_BLOCKED frame is as follows:</t>

<figure><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Stream ID (32)                         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>The STREAM_BLOCKED frame contains a single field:</t>

<t><list style="hanging">
  <t hangText='Stream ID:'>
  A 32-bit unsigned number indicating the stream which is flow control blocked.</t>
</list></t>

<t>An endpoint MAY send a STREAM_BLOCKED frame for a stream that exceeds the
maximum stream ID set by its peer (see <xref target="frame-max-stream-id"/>).  This does not
open the stream, but informs the peer that a new stream was needed, but the
stream limit prevented the creation of the stream.</t>

</section>
<section anchor="frame-stream-id-needed" title="STREAM_ID_NEEDED Frame">

<t>A sender sends a STREAM_ID_NEEDED frame (type=0x0a) when it wishes to open a
stream, but is unable to due to the maximum stream ID limit.</t>

<t>The STREAM_ID_NEEDED frame does not contain a payload.</t>

</section>
<section anchor="frame-rst-stream" title="RST_STREAM Frame">

<t>An endpoint may use a RST_STREAM frame (type=0x01) to abruptly terminate a
stream.</t>

<t>After sending a RST_STREAM, an endpoint ceases transmission of STREAM frames on
the identified stream.  A receiver of RST_STREAM can discard any data that it
already received on that stream.  An endpoint sends a RST_STREAM in response to
a RST_STREAM unless the stream is already closed.</t>

<t>The RST_STREAM frame is as follows:</t>

<figure><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Error Code (32)                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Stream ID (32)                         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+                       Final Offset (64)                       +
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>The fields are:</t>

<t><list style="hanging">
  <t hangText='Error code:'>
  A 32-bit error code which indicates why the stream is being closed.</t>
  <t hangText='Stream ID:'>
  The 32-bit Stream ID of the stream being terminated.</t>
  <t hangText='Final offset:'>
  A 64-bit unsigned integer indicating the absolute byte offset of the end of
data written on this stream by the RST_STREAM sender.</t>
</list></t>

</section>
<section anchor="frame-padding" title="PADDING Frame">

<t>The PADDING frame (type=0x00) has no semantic value.  PADDING frames can be used
to increase the size of a packet.  Padding can be used to increase an initial
client packet to the minimum required size, or to provide protection against
traffic analysis for protected packets.</t>

<t>A PADDING frame has no content.  That is, a PADDING frame consists of the single
octet that identifies the frame as a PADDING frame.</t>

</section>
<section anchor="frame-ping" title="PING frame">

<t>Endpoints can use PING frames (type=0x07) to verify that their peers are still
alive or to check reachability to the peer. The PING frame contains no
additional fields. The receiver of a PING frame simply needs to acknowledge the
packet containing this frame. The PING frame SHOULD be used to keep a connection
alive when a stream is open. The default is to send a PING frame after 15
seconds of quiescence. A PING frame has no additional fields.</t>

</section>
<section anchor="frame-new-connection-id" title="NEW_CONNECTION_ID Frame">

<t>A server sends a NEW_CONNECTION_ID to provide the client with alternative
connection IDs that can be used to break linkability when migrating connections
(see <xref target="migration-linkability"/>).</t>

<t>The NEW_CONNECTION_ID is as follows:</t>

<figure><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Sequence (16)           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+                        Connection ID (64)                     +
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>The fields are:</t>

<t><list style="hanging">
  <t hangText='Sequence:'>
  A 16-bit sequence number.  This value starts at 0 and increases by 1 for each
connection ID that is provided by the server.  The sequence value can wrap;
the value 65535 is followed by 0.  When wrapping the sequence field, the
server MUST ensure that a value with the same sequence has been received and
acknowledged by the client.  The connection ID that is assigned during the
handshake is assumed to have a sequence of 65535.</t>
  <t hangText='Connection ID:'>
  A 64-bit connection ID.</t>
</list></t>

</section>
<section anchor="frame-connection-close" title="CONNECTION_CLOSE frame">

<t>An endpoint sends a CONNECTION_CLOSE frame (type=0x02) to notify its peer that
the connection is being closed.  If there are open streams that haven’t been
explicitly closed, they are implicitly closed when the connection is closed.
(Ideally, a GOAWAY frame would be sent with enough time that all streams are
torn down.)  The frame is as follows:</t>

<figure><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Error Code (32)                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   Reason Phrase Length (16)   |      [Reason Phrase (*)]    ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>The fields of a CONNECTION_CLOSE frame are as follows:</t>

<t><list style="hanging">
  <t hangText='Error Code:'>
  A 32-bit error code which indicates the reason for closing this connection.</t>
  <t hangText='Reason Phrase Length:'>
  A 16-bit unsigned number specifying the length of the reason phrase.  Note
that a CONNECTION_CLOSE frame cannot be split between packets, so in practice
any limits on packet size will also limit the space available for a reason
phrase.</t>
  <t hangText='Reason Phrase:'>
  A human-readable explanation for why the connection was closed.  This can be
zero length if the sender chooses to not give details beyond the Error Code.
This SHOULD be a UTF-8 encoded string <xref target="RFC3629"/>.</t>
</list></t>

</section>
<section anchor="frame-goaway" title="GOAWAY Frame">

<t>An endpoint uses a GOAWAY frame (type=0x03) to initiate a graceful shutdown of a
connection.  The endpoints will continue to use any active streams, but the
sender of the GOAWAY will not initiate or accept any additional streams beyond
those indicated.  The GOAWAY frame is as follows:</t>

<figure><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Largest Client Stream ID (32)                |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Largest Server Stream ID (32)                |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>The fields of a GOAWAY frame are:</t>

<t><list style="hanging">
  <t hangText='Largest Client Stream ID:'>
  The highest-numbered, client-initiated stream on which the endpoint sending
the GOAWAY frame either sent data, or received and delivered data.  All
higher-numbered, client-initiated streams (that is, odd-numbered streams) are
implicitly reset by sending or receiving the GOAWAY frame.</t>
  <t hangText='Largest Server Stream ID:'>
  The highest-numbered, server-initiated stream on which the endpoint sending
the GOAWAY frame either sent data, or received and delivered data.  All
higher-numbered, server-initiated streams (that is, even-numbered streams) are
implicitly reset by sending or receiving the GOAWAY frame.</t>
</list></t>

<t>A GOAWAY frame indicates that any application layer actions on streams with
higher numbers than those indicated can be safely retried because no data was
exchanged.  An endpoint MUST set the value of the Largest Client or Server
Stream ID to be at least as high as the highest-numbered stream on which it
either sent data or received and delivered data to the application protocol that
uses QUIC.</t>

<t>An endpoint MAY choose a larger stream identifier if it wishes to allow for a
number of streams to be created.  This is especially valuable for peer-initiated
streams where packets creating new streams could be in transit; using a larger
stream number allows those streams to complete.</t>

<t>In addition to initiating a graceful shutdown of a connection, GOAWAY MAY be
sent immediately prior to sending a CONNECTION_CLOSE frame that is sent as a
result of detecting a fatal error.  Higher-numbered streams than those indicated
in the GOAWAY frame can then be retried.</t>

</section>
</section>
<section anchor="packetization" title="Packetization and Reliability">

<t>The Path Maximum Transmission Unit (PTMU) is the maximum size of the entire IP
header, UDP header, and UDP payload. The UDP payload includes the QUIC public
header, protected payload, and any authentication fields.</t>

<t>All QUIC packets SHOULD be sized to fit within the estimated PMTU to avoid IP
fragmentation or packet drops. To optimize bandwidth efficiency, endpoints
SHOULD use Packetization Layer PMTU Discovery (<xref target="RFC4821"/>) and MAY use PMTU
Discovery (<xref target="RFC1191"/>, <xref target="RFC1981"/>) for detecting the PMTU, setting the PMTU
appropriately, and storing the result of previous PMTU determinations.</t>

<t>In the absence of these mechanisms, QUIC endpoints SHOULD NOT send IP packets
larger than 1280 octets. Assuming the minimum IP header size, this results in
a QUIC packet size of 1232 octets for IPv6 and 1252 octets for IPv4.</t>

<t>QUIC endpoints that implement any kind of PMTU discovery SHOULD maintain an
estimate for each combination of local and remote IP addresses (as each pairing
could have a different maximum MTU in the path).</t>

<t>QUIC depends on the network path supporting a MTU of at least 1280 octets. This
is the IPv6 minimum and therefore also supported by most modern IPv4 networks.
An endpoint MUST NOT reduce their MTU below this number, even if it receives
signals that indicate a smaller limit might exist.</t>

<t>Clients MUST ensure that the first packet in a connection, and any
retransmissions of those octets, has a QUIC packet size of least 1232 octets for
an IPv6 packet and 1252 octets for an IPv4 packet.  In the absence of extensions
to the IP header, padding to exactly these values will result in an IP packet
that is 1280 octets.</t>

<t>The initial client packet SHOULD be padded to exactly these values unless the
client has a reasonable assurance that the PMTU is larger.  Sending a packet of
this size ensures that the network path supports an MTU of this size and helps
reduce the amplitude of amplification attacks caused by server responses toward
an unverified client address.</t>

<t>Servers MUST ignore an initial plaintext packet from a client if its total size
is less than 1232 octets for IPv6 or 1252 octets for IPv4.</t>

<t>If a QUIC endpoint determines that the PMTU between any pair of local and remote
IP addresses has fallen below 1280 octets, it MUST immediately cease sending
QUIC packets on the affected path.  This could result in termination of the
connection if an alternative path cannot be found.</t>

<t>A sender bundles one or more frames in a Regular QUIC packet (see <xref target="frames"/>).</t>

<t>A sender SHOULD minimize per-packet bandwidth and computational costs by
bundling as many frames as possible within a QUIC packet.  A sender MAY wait for
a short period of time to bundle multiple frames before sending a packet that is
not maximally packed, to avoid sending out large numbers of small packets.  An
implementation may use heuristics about expected application sending behavior to
determine whether and for how long to wait.  This waiting period is an
implementation decision, and an implementation should be careful to delay
conservatively, since any delay is likely to increase application-visible
latency.</t>

<t>Regular QUIC packets are “containers” of frames; a packet is never retransmitted
whole.  How an endpoint handles the loss of the frame depends on the type of the
frame.  Some frames are simply retransmitted, some have their contents moved to
new frames, and others are never retransmitted.</t>

<t>When a packet is detected as lost, the sender re-sends any frames as necessary:</t>

<t><list style="symbols">
  <t>All application data sent in STREAM frames MUST be retransmitted, unless the
endpoint has sent a RST_STREAM for that stream.  When an endpoint sends a
RST_STREAM frame, data outstanding on that stream SHOULD NOT be retransmitted,
since subsequent data on this stream is expected to not be delivered by the
receiver.</t>
  <t>ACK and PADDING frames MUST NOT be retransmitted.  ACK frames are cumulative,
so new frames containing updated information will be sent as described in
<xref target="frame-ack"/>.</t>
  <t>All other frames MUST be retransmitted.</t>
</list></t>

<t>Upon detecting losses, a sender MUST take appropriate congestion control action.
The details of loss detection and congestion control are described in
<xref target="QUIC-RECOVERY"/>.</t>

<t>A packet MUST NOT be acknowledged until packet protection has been successfully
removed and all frames contained in the packet have been processed.  For STREAM
frames, this means the data has been queued (but not necessarily delivered to
the application).  This also means that any stream state transitions triggered
by STREAM or RST_STREAM frames have occurred. Once the packet has been fully
processed, a receiver acknowledges receipt by sending one or more ACK frames
containing the packet number of the received packet.</t>

<t>To avoid creating an indefinite feedback loop, an endpoint MUST NOT generate an
ACK frame in response to a packet containing only ACK or PADDING frames.</t>

<t>Strategies and implications of the frequency of generating acknowledgments are
discussed in more detail in <xref target="QUIC-RECOVERY"/>.</t>

<section anchor="special-considerations-for-pmtu-discovery" title="Special Considerations for PMTU Discovery">

<t>Traditional ICMP-based path MTU discovery in IPv4 <xref target="RFC1191"/> is potentially
vulnerable to off-path attacks that successfully guess the IP/port 4-tuple and
reduce the MTU to a bandwidth-inefficient value. TCP connections mitigate this
risk by using the (at minimum) 8 bytes of transport header echoed in the ICMP
message to validate the TCP sequence number as valid for the current
connection. However, as QUIC operates over UDP, in IPv4 the echoed information
could consist only of the IP and UDP headers, which usually has insufficient
entropy to mitigate off-path attacks.</t>

<t>As a result, endpoints that implement PMTUD in IPv4 SHOULD take steps to
mitigate this risk. For instance, an application could:</t>

<t><list style="symbols">
  <t>Set the IPv4 Don’t Fragment (DF) bit on a small proportion of packets, so that
most invalid ICMP messages arrive when there are no DF packets outstanding, and
can therefore be identified as spurious.</t>
  <t>Store additional information from the IP or UDP headers from DF packets (for
example, the IP ID or UDP checksum) to further authenticate incoming Datagram
Too Big messages.</t>
  <t>Any reduction in PMTU due to a report contained in an ICMP packet is
provisional until QUIC’s loss detection algorithm determines that the packet is
actually lost.</t>
</list></t>

</section>
</section>
<section anchor="streams" title="Streams: QUIC’s Data Structuring Abstraction">

<t>Streams in QUIC provide a lightweight, ordered, and bidirectional byte-stream
abstraction modeled closely on HTTP/2 streams <xref target="RFC7540"/>.</t>

<t>Streams can be created either by the client or the server, can concurrently send
data interleaved with other streams, and can be cancelled.</t>

<t>Data that is received on a stream is delivered in order within that stream, but
there is no particular delivery order across streams.  Transmit ordering among
streams is left to the implementation.</t>

<t>The creation and destruction of streams are expected to have minimal bandwidth
and computational cost.  A single STREAM frame may create, carry data for, and
terminate a stream, or a stream may last the entire duration of a connection.</t>

<t>Streams are individually flow controlled, allowing an endpoint to limit memory
commitment and to apply back pressure.  The creation of streams is also flow
controlled, with each peer declaring the maximum stream ID it is willing to
accept at a given time.</t>

<t>An alternative view of QUIC streams is as an elastic “message” abstraction,
similar to the way ephemeral streams are used in SST
<xref target="SST"/>, which may be a more appealing description
for some applications.</t>

<section anchor="stream-id" title="Stream Identifiers">

<t>Streams are identified by an unsigned 32-bit integer, referred to as the Stream
ID.  To avoid Stream ID collision, clients initiate streams using odd-numbered
Stream IDs; streams initiated by the server use even-numbered Stream IDs.</t>

<t>Stream ID 0 (0x0) is reserved for the cryptographic handshake.  Stream 0 MUST
NOT be used for application data, and is the first client-initiated stream.</t>

<t>A QUIC endpoint cannot reuse a Stream ID.  Streams MUST be created in sequential
order.  Open streams can be used in any order.  Streams that are used out of
order result in lower-numbered streams in the same direction being counted as
open.</t>

<t>Stream IDs are usually encoded as a 32-bit integer, though the STREAM frame
(<xref target="frame-stream"/>) permits a shorter encoding when the leading bits of the
stream ID are zero.</t>

</section>
<section anchor="life-of-a-stream" title="Life of a Stream">

<t>The semantics of QUIC streams is based on HTTP/2 streams, and the lifecycle of a
QUIC stream therefore closely follows that of an HTTP/2 stream <xref target="RFC7540"/>,
with some differences to accommodate the possibility of out-of-order delivery
due to the use of multiple streams in QUIC.  The lifecycle of a QUIC stream is
shown in the following figure and described below.</t>

<figure title="Lifecycle of a stream" anchor="stream-lifecycle"><artwork><![CDATA[
                            +--------+
                 recv RST   |        |    send RST
              ,-------------|  idle  |---------------.
             /              |        |                \
            |               +--------+                 |
            |                    |                     |
            |        send STREAM / recv STREAM         |
            |                    |                     |
            |                    v                     |
            |    recv FIN/  +--------+    send FIN/    |
            |    recv RST   |        |    send RST     |
            |     ,---------|  open  |-----------.     |
            |    /          |        |            \    |
            v   v           +--------+             v   v
         +----------+                          +----------+
         |   half   |                          |   half   |
         |  closed  |                          |  closed  |
         | (remote) |                          |  (local) |
         +----------+                          +----------+
             |                                        |
             |   send FIN/  +--------+    recv FIN/   |
              \  send RST   |        |    recv RST   /
               `----------->| closed |<-------------'
                            |        |
                            +--------+

   send:   endpoint sends this frame
   recv:   endpoint receives this frame

   STREAM: a STREAM frame
   FIN:    FIN flag in a STREAM frame
   RST:    RST_STREAM frame
]]></artwork></figure>

<t>Note that this diagram shows stream state transitions and the frames and flags
that affect those transitions only.  For the purpose of state transitions, the
FIN flag is processed as a separate event to the frame that bears it; a STREAM
frame with the FIN flag set can cause two state transitions.</t>

<t>The recipient of a frame which changes stream state will have a delayed view of
the state of a stream while the frame is in transit.  Endpoints do not
coordinate the creation of streams; they are created unilaterally by either
endpoint.  Endpoints can use acknowledgments to understand the peer’s
subjective view of stream state at any given time.</t>

<t>In the absence of more specific guidance elsewhere in this document,
implementations SHOULD treat the receipt of a frame that is not expressly
permitted in the description of a state as a connection error (see
<xref target="error-handling"/>).</t>

<section anchor="idle" title="idle">

<t>All streams start in the “idle” state.</t>

<t>The following transitions are valid from this state:</t>

<t>Sending or receiving a STREAM frame causes the identified stream to become
“open”.  The stream identifier for a new stream is selected as described in
<xref target="stream-id"/>.  The same STREAM frame can also cause a stream to
immediately become “half-closed” if the FIN flag is set.</t>

<t>Receiving a STREAM frame on a peer-initiated stream (that is, a packet sent by a
server on an even-numbered stream or a client packet on an odd-numbered stream)
also causes all lower-numbered “idle” streams in the same direction to become
“open”.  This could occur if a peer begins sending on streams in a different
order to their creation, or it could happen if packets are lost or reordered in
transit.</t>

<t>A RST_STREAM frame on an “idle” stream causes the stream to become
“half-closed”.  Sending a RST_STREAM frame causes the stream to become
“half-closed (local)”; receiving RST_STREAM causes the stream to become
“half-closed (remote)”.</t>

<t>An endpoint might receive MAX_STREAM_DATA frames on peer-initiated streams that
are “idle” if there is loss or reordering of packets.</t>

<t>Receiving any frame other than STREAM, MAX_STREAM_DATA, STREAM_BLOCKED, or
RST_STREAM on a stream in this state MUST be treated as a connection error
(<xref target="error-handling"/>) of type YYYY.</t>

<t>An endpoint MUST NOT send a STREAM or RST_STREAM frame for a stream ID that is
higher than the peers advertised maximum stream ID (see
<xref target="frame-max-stream-id"/>).</t>

</section>
<section anchor="open" title="open">

<t>A stream in the “open” state may be used by both peers to send frames of any
type.  In this state, endpoints can send MAX_STREAM_DATA and MUST observe the
value advertised by its receiving peer (see <xref target="flow-control"/>).</t>

<t>From this state, either endpoint can send a frame with the FIN flag set, which
causes the stream to transition into one of the “half-closed” states.  An
endpoint sending an FIN flag causes the stream state to become “half-closed
(local)”.  An endpoint receiving a FIN flag causes the stream state to become
“half-closed (remote)” once all preceding data has arrived.  The receiving
endpoint MUST NOT consider the stream state to have changed until all data has
arrived.</t>

<t>A RST_STREAM frame on an “open” stream causes the stream to become
“half-closed”.  Sending a RST_STREAM frame causes the stream to become
“half-closed (local)”; receiving RST_STREAM causes the stream to become
“half-closed (remote)”.</t>

<t>Any frame type that mentions a stream ID can be sent in this state.</t>

</section>
<section anchor="half-closed-local" title="half-closed (local)">

<t>A stream that is in the “half-closed (local)” state MUST NOT be used for sending
on new STREAM frames.  Retransmission of data that has already been sent on
STREAM frames is permitted.  An endpoint MAY also send MAX_STREAM_DATA and
RST_STREAM in this state.</t>

<t>An endpoint that closes a stream MUST NOT send data beyond the final offset that
it has chosen, see <xref target="state-closed"/> for details.</t>

<t>A stream transitions from this state to “closed” when a STREAM frame that
contains a FIN flag is received and all prior data has arrived, or when a
RST_STREAM frame is received.</t>

<t>An endpoint can receive any frame that mentions a stream ID in this state.
Providing flow-control credit using MAX_STREAM_DATA frames is necessary to
continue receiving flow-controlled frames.  In this state, a receiver MAY ignore
MAX_STREAM_DATA frames for this stream, which might arrive for a short period
after a frame bearing the FIN flag is sent.</t>

</section>
<section anchor="state-hc-remote" title="half-closed (remote)">

<t>A stream is “half-closed (remote)” when the stream is no longer being used by
the peer to send any data.  An endpoint will have either received all data that
a peer has sent or will have received a RST_STREAM frame and discarded any
received data.</t>

<t>Once all data has been either received or discarded, a sender is no longer
obligated to update the maximum received data for the connection.</t>

<t>An endpoint that receives a RST_STREAM frame (and which has not sent a FIN or a
RST_STREAM) MUST immediately respond with a RST_STREAM frame, and MUST NOT send
any more data on the stream.</t>

<t>Due to reordering, an endpoint could continue receiving frames for the stream
even after the stream is closed for sending.  Frames received after a peer
closes a stream SHOULD be discarded.  An endpoint MAY choose to limit the period
over which it ignores frames and treat frames that arrive after this time as
being in error.</t>

<t>An endpoint will know the final offset of the data it receives on a stream when
it reaches the “half-closed (remote)” state, see <xref target="final-offset"/> for details.</t>

<t>A stream in this state can be used by the endpoint to send any frame that
mentions a stream ID.  In this state, the endpoint MUST observe advertised
stream and connection data limits (see <xref target="flow-control"/>).</t>

<t>A stream can transition from this state to “closed” by completing transmission
of all data.  This includes sending all data carried in STREAM frames up
including the terminal STREAM frame that contains a FIN flag and receiving
acknowledgment from the peer for all data.</t>

<t>A stream becomes “closed” when the endpoint sends and receives acknowledgment of
a RST_STREAM frame.</t>

</section>
<section anchor="state-closed" title="closed">

<t>The “closed” state is the terminal state for a stream.</t>

<t>Once a stream reaches this state, no frames can be sent that mention the stream.
Reordering might cause frames to be received after closing, see
<xref target="state-hc-remote"/>.</t>

</section>
</section>
<section anchor="stream-concurrency" title="Stream Concurrency">

<t>An endpoint limits the number of concurrently active incoming streams by
adjusting the maximum stream ID.  An initial value is set in the transport
parameters (see <xref target="transport-parameter-definitions"/>) and is subsequently
increased by MAX_STREAM_ID frames (see <xref target="frame-max-stream-id"/>).</t>

<t>The maximum stream ID is specific to each endpoint and applies only to the peer
that receives the setting. That is, clients specify the maximum stream ID the
server can initiate, and servers specify the maximum stream ID the client can
initiate.  Each endpoint may respond on streams initiated by the other peer,
regardless of whether it is permitted to initiated new streams.</t>

<t>Endpoints MUST NOT exceed the limit set by their peer.  An endpoint that
receives a STREAM frame with an ID greater than the limit it has sent MUST treat
this as a stream error of type QUIC_TOO_MANY_OPEN_STREAMS (<xref target="error-handling"/>),
unless this is a result of a change in the initial offsets (see
<xref target="zerortt-parameters"/>).</t>

<t>A receiver MUST NOT renege on an advertisement; that is, once a receiver
advertises a stream ID via a MAX_STREAM_ID frame, it MUST NOT subsequently
advertise a smaller maximum ID.  A sender may receive MAX_STREAM_ID frames out
of order; a sender MUST therefore ignore any MAX_STREAM_ID that does not
increase the maximum.</t>

</section>
<section anchor="sending-and-receiving-data" title="Sending and Receiving Data">

<t>Once a stream is created, endpoints may use the stream to send and receive data.
Each endpoint may send a series of STREAM frames encapsulating data on a stream
until the stream is terminated in that direction.  Streams are an ordered
byte-stream abstraction, and they have no other structure within them.  STREAM
frame boundaries are not expected to be preserved in retransmissions from the
sender or during delivery to the application at the receiver.</t>

<t>When new data is to be sent on a stream, a sender MUST set the encapsulating
STREAM frame’s offset field to the stream offset of the first byte of this new
data.  The first byte of data that is sent on a stream has the stream offset 0.
The largest offset delivered on a stream MUST be less than 2^64. A receiver
MUST ensure that received stream data is delivered to the application as an
ordered byte-stream.  Data received out of order MUST be buffered for later
delivery, as long as it is not in violation of the receiver’s flow control
limits.</t>

<t>An endpoint MUST NOT send data on any stream without ensuring that it is within
the data limits set by its peer.  The cryptographic handshake stream, Stream 0,
is exempt from the connection-level data limits established by MAX_DATA.  Stream
0 is still subject to stream-level data limits and MAX_STREAM_DATA.</t>

<t>Flow control is described in detail in <xref target="flow-control"/>, and congestion control
is described in the companion document <xref target="QUIC-RECOVERY"/>.</t>

</section>
<section anchor="stream-prioritization" title="Stream Prioritization">

<t>Stream multiplexing has a significant effect on application performance if
resources allocated to streams are correctly prioritized.  Experience with other
multiplexed protocols, such as HTTP/2 <xref target="RFC7540"/>, shows that effective
prioritization strategies have a significant positive impact on performance.</t>

<t>QUIC does not provide frames for exchanging prioritization information.  Instead
it relies on receiving priority information from the application that uses QUIC.
Protocols that use QUIC are able to define any prioritization scheme that suits
their application semantics.  A protocol might define explicit messages for
signaling priority, such as those defined in HTTP/2; it could define rules that
allow an endpoint to determine priority based on context; or it could leave the
determination to the application.</t>

<t>A QUIC implementation SHOULD provide ways in which an application can indicate
the relative priority of streams.  When deciding which streams to dedicate
resources to, QUIC SHOULD use the information provided by the application.
Failure to account for priority of streams can result in suboptimal performance.</t>

<t>Stream priority is most relevant when deciding which stream data will be
transmitted.  Often, there will be limits on what can be transmitted as a result
of connection flow control or the current congestion controller state.</t>

<t>Giving preference to the transmission of its own management frames ensures that
the protocol functions efficiently.  That is, prioritizing frames other than
STREAM frames ensures that loss recovery, congestion control, and flow control
operate effectively.</t>

<t>Stream 0 MUST be prioritized over other streams prior to the completion of the
cryptographic handshake.  This includes the retransmission of the second flight
of client handshake messages, that is, the TLS Finished and any client
authentication messages.</t>

<t>STREAM frames that are determined to be lost SHOULD be retransmitted before
sending new data, unless application priorities indicate otherwise.
Retransmitting lost STREAM frames can fill in gaps, which allows the peer to
consume already received data and free up flow control window.</t>

</section>
</section>
<section anchor="flow-control" title="Flow Control">

<t>It is necessary to limit the amount of data that a sender may have outstanding
at any time, so as to prevent a fast sender from overwhelming a slow receiver,
or to prevent a malicious sender from consuming significant resources at a
receiver.  This section describes QUIC’s flow-control mechanisms.</t>

<t>QUIC employs a credit-based flow-control scheme similar to HTTP/2’s flow control
<xref target="RFC7540"/>.  A receiver advertises the number of octets it is prepared to
receive on a given stream and for the entire connection.  This leads to two
levels of flow control in QUIC: (i) Connection flow control, which prevents
senders from exceeding a receiver’s buffer capacity for the connection, and (ii)
Stream flow control, which prevents a single stream from consuming the entire
receive buffer for a connection.</t>

<t>A receiver sends MAX_DATA or MAX_STREAM_DATA frames to the sender to advertise
additional credit by sending the absolute byte offset in the connection or
stream which it is willing to receive.</t>

<t>A receiver MAY advertise a larger offset at any point by sending MAX_DATA or
MAX_STREAM_DATA frames.  A receiver MUST NOT renege on an advertisement; that
is, once a receiver advertises an offset, it MUST NOT subsequently advertise a
smaller offset.  A sender could receive MAX_DATA or MAX_STREAM_DATA frames out
of order; a sender MUST therefore ignore any flow control offset that does not
move the window forward.</t>

<t>A receiver MUST close the connection with a
QUIC_FLOW_CONTROL_RECEIVED_TOO_MUCH_DATA error (<xref target="error-handling"/>) if the
peer violates the advertised connection or stream data limits.</t>

<t>A sender MUST send BLOCKED frames to indicate it has data to write but is
blocked by lack of connection or stream flow control credit.  BLOCKED frames are
expected to be sent infrequently in common cases, but they are considered useful
for debugging and monitoring purposes.</t>

<t>A receiver advertises credit for a stream by sending a MAX_STREAM_DATA frame
with the Stream ID set appropriately. A receiver could use the current offset of
data consumed to determine the flow control offset to be advertised.  A receiver
MAY send MAX_STREAM_DATA frames in multiple packets in order to make sure that
the sender receives an update before running out of flow control credit, even if
one of the packets is lost.</t>

<t>Connection flow control is a limit to the total bytes of stream data sent in
STREAM frames on all streams.  A receiver advertises credit for a connection by
sending a MAX_DATA frame.  A receiver maintains a cumulative sum of bytes
received on all streams, which are used to check for flow control violations. A
receiver might use a sum of bytes consumed on all contributing streams to
determine the maximum data limit to be advertised.</t>

<section anchor="edge-cases-and-other-considerations" title="Edge Cases and Other Considerations">

<t>There are some edge cases which must be considered when dealing with stream and
connection level flow control.  Given enough time, both endpoints must agree on
flow control state.  If one end believes it can send more than the other end is
willing to receive, the connection will be torn down when too much data arrives.</t>

<t>Conversely if a sender believes it is blocked, while endpoint B expects more
data can be received, then the connection can be in a deadlock, with the sender
waiting for a MAX_DATA or MAX_STREAM_DATA frame which will never come.</t>

<t>On receipt of a RST_STREAM frame, an endpoint will tear down state for the
matching stream and ignore further data arriving on that stream.  This could
result in the endpoints getting out of sync, since the RST_STREAM frame may have
arrived out of order and there may be further bytes in flight.  The data sender
would have counted the data against its connection level flow control budget,
but a receiver that has not received these bytes would not know to include them
as well.  The receiver must learn the number of bytes that were sent on the
stream to make the same adjustment in its connection flow controller.</t>

<t>To avoid this de-synchronization, a RST_STREAM sender MUST include the final
byte offset sent on the stream in the RST_STREAM frame.  On receiving a
RST_STREAM frame, a receiver definitively knows how many bytes were sent on that
stream before the RST_STREAM frame, and the receiver MUST use the final offset
to account for all bytes sent on the stream in its connection level flow
controller.</t>

<section anchor="response-to-a-rststream" title="Response to a RST_STREAM">

<t>Since streams are bidirectional, a sender of a RST_STREAM needs to know how many
bytes the peer has sent on the stream.  If an endpoint receives a RST_STREAM
frame and has sent neither a FIN nor a RST_STREAM, it MUST send a RST_STREAM in
response, bearing the offset of the last byte sent on this stream as the final
offset.</t>

</section>
<section anchor="fc-credit" title="Data Limit Increments">

<t>This document leaves when and how many bytes to advertise in a MAX_DATA or
MAX_STREAM_DATA to implementations, but offers a few considerations.  These
frames contribute to connection overhead.  Therefore frequently sending frames
with small changes is undesirable.  At the same time, infrequent updates require
larger increments to limits if blocking is to be avoided.  Thus, larger updates
require a receiver to commit to larger resource commitments.  Thus there is a
tradeoff between resource commitment and overhead when determining how large a
limit is advertised.</t>

<t>A receiver MAY use an autotuning mechanism to tune the frequency and amount that
it increases data limits based on a roundtrip time estimate and the rate at
which the receiving application consumes data, similar to common TCP
implementations.</t>

</section>
</section>
<section anchor="stream-limit-increment" title="Stream Limit Increment">

<t>As with flow control, this document leaves when and how many streams to make
available to a peer via MAX_STREAM_ID to implementations, but offers a few
considerations.  MAX_STREAM_ID frames constitute minimal overhead, while
withholding MAX_STREAM_ID frames can prevent the peer from using the available
parallelism.</t>

<t>Implementations will likely want to increase the maximum stream ID as
peer-initiated streams close.  A receiver MAY also advance the maximum stream ID
based on current activity, system conditions, and other environmental factors.</t>

<section anchor="blocking" title="Blocking on Flow Control">

<t>If a sender does not receive a MAX_DATA or MAX_STREAM_DATA frame when it has run
out of flow control credit, the sender will be blocked and MUST send a BLOCKED
or STREAM_BLOCKED frame.  These frames are expected to be useful for debugging
at the receiver; they do not require any other action.  A receiver SHOULD NOT
wait for a BLOCKED or STREAM_BLOCKED frame before sending MAX_DATA or
MAX_STREAM_DATA, since doing so will mean that a sender is unable to send for an
entire round trip.</t>

<t>For smooth operation of the congestion controller, it is generally considered
best to not let the sender go into quiescence if avoidable.  To avoid blocking a
sender, and to reasonably account for the possibiity of loss, a receiver should
send a MAX_DATA or MAX_STREAM_DATA frame at least two roundtrips before it
expects the sender to get blocked.</t>

<t>A sender sends a single BLOCKED or STREAM_BLOCKED frame only once when it
reaches a data limit.  A sender MUST NOT send multiple BLOCKED or STREAM_BLOCKED
frames for the same data limit, unless the original frame is determined to be
lost.  Another BLOCKED or STREAM_BLOCKED frame can be sent after the data limit
is increased.</t>

</section>
</section>
<section anchor="final-offset" title="Stream Final Offset">

<t>The final offset is the count of the number of octets that are transmitted on a
stream.  For a stream that is reset, the final offset is carried explicitly in
the RST_STREAM frame.  Otherwise, the final offset is the offset of the end of
the data carried in STREAM frame marked with a FIN flag.</t>

<t>An endpoint will know the final offset for a stream when the stream enters the
“half-closed (remote)” state.  However, if there is reordering or loss, an
endpoint might learn the final offset prior to entering this state if it is
carried on a STREAM frame.</t>

<t>An endpoint MUST NOT send data on a stream at or beyond the final offset.</t>

<t>Once a final offset for a stream is known, it cannot change.  If a RST_STREAM or
STREAM frame causes the final offset to change for a stream, an endpoint SHOULD
respond with a QUIC_STREAM_DATA_AFTER_TERMINATION error (see
<xref target="error-handling"/>).  A receiver SHOULD treat receipt of data at or beyond the
final offset as a QUIC_STREAM_DATA_AFTER_TERMINATION error, even after a stream
is closed.  Generating these errors is not mandatory, but only because
requiring that an endpoint generate these errors also means that the endpoint
needs to maintain the final offset state for closed streams, which could mean a
significant state commitment.</t>

</section>
</section>
<section anchor="error-handling" title="Error Handling">

<t>An endpoint that detects an error SHOULD signal the existence of that error to
its peer.  Errors can affect an entire connection (see <xref target="connection-errors"/>),
or a single stream (see <xref target="stream-errors"/>).</t>

<t>The most appropriate error code (<xref target="error-codes"/>) SHOULD be included in the
frame that signals the error.  Where this specification identifies error
conditions, it also identifies the error code that is used.</t>

<t>Public Reset is not suitable for any error that can be signaled with a
CONNECTION_CLOSE or RST_STREAM frame.  Public Reset MUST NOT be sent by an
endpoint that has the state necessary to send a frame on the connection.</t>

<section anchor="connection-errors" title="Connection Errors">

<t>Errors that result in the connection being unusable, such as an obvious
violation of protocol semantics or corruption of state that affects an entire
connection, MUST be signaled using a CONNECTION_CLOSE frame
(<xref target="frame-connection-close"/>). An endpoint MAY close the connection in this
manner, even if the error only affects a single stream.</t>

<t>A CONNECTION_CLOSE frame could be sent in a packet that is lost.  An endpoint
SHOULD be prepared to retransmit a packet containing a CONNECTION_CLOSE frame if
it receives more packets on a terminated connection.  Limiting the number of
retransmissions and the time over which this final packet is sent limits the
effort expended on terminated connections.</t>

<t>An endpoint that chooses not to retransmit packets containing CONNECTION_CLOSE
risks a peer missing the first such packet.  The only mechanism available to an
endpoint that continues to receive data for a terminated connection is to send a
Public Reset packet.</t>

</section>
<section anchor="stream-errors" title="Stream Errors">

<t>If the error affects a single stream, but otherwise leaves the connection in a
recoverable state, the endpoint can sent a RST_STREAM frame
(<xref target="frame-rst-stream"/>) with an appropriate error code to terminate just the
affected stream.</t>

<t>Stream 0 is critical to the functioning of the entire connection.  If stream 0
is closed with either a RST_STREAM or STREAM frame bearing the FIN flag, an
endpoint MUST generate a connection error of type QUIC_CLOSED_CRITICAL_STREAM.</t>

<t>Some application protocols make other streams critical to that protocol.  An
application protocol does not need to inform the transport that a stream is
critical; it can instead generate appropriate errors in response to being
notified that the critical stream is closed.</t>

<t>An endpoint MAY send a RST_STREAM frame in the same packet as a CONNECTION_CLOSE
frame.</t>

</section>
<section anchor="error-codes" title="Error Codes">

<t>Error codes are 32 bits long, with the first two bits indicating the source of
the error code:</t>

<t><list style="hanging">
  <t hangText='0x00000000-0x3FFFFFFF:'>
  Application-specific error codes.  Defined by each application-layer protocol.</t>
  <t hangText='0x40000000-0x7FFFFFFF:'>
  Reserved for host-local error codes.  These codes MUST NOT be sent to a peer,
but MAY be used in API return codes and logs.</t>
  <t hangText='0x80000000-0xBFFFFFFF:'>
  QUIC transport error codes, including packet protection errors.  Applicable to
all uses of QUIC.</t>
  <t hangText='0xC0000000-0xFFFFFFFF:'>
  Cryptographic error codes.  Defined by the cryptographic handshake protocol
in use.</t>
</list></t>

<t>This section lists the defined QUIC transport error codes that may be used in a
CONNECTION_CLOSE or RST_STREAM frame. Error codes share a common code space.
Some error codes apply only to either streams or the entire connection and have
no defined semantics in the other context.</t>

<t><list style="hanging">
  <t hangText='QUIC_INTERNAL_ERROR (0x80000001):'>
  Connection has reached an invalid state.</t>
  <t hangText='QUIC_STREAM_DATA_AFTER_TERMINATION (0x80000002):'>
  There were data frames after the a fin or reset.</t>
  <t hangText='QUIC_INVALID_PACKET_HEADER (0x80000003):'>
  Control frame is malformed.</t>
  <t hangText='QUIC_INVALID_FRAME_DATA (0x80000004):'>
  Frame data is malformed.</t>
  <t hangText='QUIC_MULTIPLE_TERMINATION_OFFSETS (0x80000005):'>
  Multiple final offset values were received on the same stream</t>
  <t hangText='QUIC_STREAM_CANCELLED (0x80000006):'>
  The stream was cancelled</t>
  <t hangText='QUIC_CLOSED_CRITICAL_STREAM (0x80000007):'>
  A stream that is critical to the protocol was closed.</t>
  <t hangText='QUIC_MISSING_PAYLOAD (0x80000030):'>
  The packet contained no payload.</t>
  <t hangText='QUIC_INVALID_STREAM_DATA (0x8000002E):'>
  STREAM frame data is malformed.</t>
  <t hangText='QUIC_UNENCRYPTED_STREAM_DATA (0x8000003D):'>
  Received STREAM frame data is not encrypted.</t>
  <t hangText='QUIC_MAYBE_CORRUPTED_MEMORY (0x80000059):'>
  Received a frame which is likely the result of memory corruption.</t>
  <t hangText='QUIC_INVALID_RST_STREAM_DATA (0x80000006):'>
  RST_STREAM frame data is malformed.</t>
  <t hangText='QUIC_INVALID_CONNECTION_CLOSE_DATA (0x80000007):'>
  CONNECTION_CLOSE frame data is malformed.</t>
  <t hangText='QUIC_INVALID_GOAWAY_DATA (0x80000008):'>
  GOAWAY frame data is malformed.</t>
  <t hangText='QUIC_INVALID_WINDOW_UPDATE_DATA (0x80000039):'>
  WINDOW_UPDATE frame data is malformed.</t>
  <t hangText='QUIC_INVALID_BLOCKED_DATA (0x8000003A):'>
  BLOCKED frame data is malformed.</t>
  <t hangText='QUIC_INVALID_PATH_CLOSE_DATA (0x8000004E):'>
  PATH_CLOSE frame data is malformed.</t>
  <t hangText='QUIC_INVALID_ACK_DATA (0x80000009):'>
  ACK frame data is malformed.</t>
  <t hangText='QUIC_INVALID_VERSION_NEGOTIATION_PACKET (0x8000000A):'>
  Version negotiation packet is malformed.</t>
  <t hangText='QUIC_INVALID_PUBLIC_RST_PACKET (0x8000000b):'>
  Public RST packet is malformed.</t>
  <t hangText='QUIC_DECRYPTION_FAILURE (0x8000000c):'>
  There was an error decrypting.</t>
  <t hangText='QUIC_ENCRYPTION_FAILURE (0x8000000d):'>
  There was an error encrypting.</t>
  <t hangText='QUIC_PACKET_TOO_LARGE (0x8000000e):'>
  The packet exceeded kMaxPacketSize.</t>
  <t hangText='QUIC_PEER_GOING_AWAY (0x80000010):'>
  The peer is going away. May be a client or server.</t>
  <t hangText='QUIC_INVALID_STREAM_ID (0x80000011):'>
  A stream ID was invalid.</t>
  <t hangText='QUIC_INVALID_PRIORITY (0x80000031):'>
  A priority was invalid.</t>
  <t hangText='QUIC_TOO_MANY_OPEN_STREAMS (0x80000012):'>
  Too many streams already open.</t>
  <t hangText='QUIC_TOO_MANY_AVAILABLE_STREAMS (0x8000004c):'>
  The peer created too many available streams.</t>
  <t hangText='QUIC_PUBLIC_RESET (0x80000013):'>
  Received public reset for this connection.</t>
  <t hangText='QUIC_INVALID_VERSION (0x80000014):'>
  Invalid protocol version.</t>
  <t hangText='QUIC_INVALID_HEADER_ID (0x80000016):'>
  The Header ID for a stream was too far from the previous.</t>
  <t hangText='QUIC_INVALID_NEGOTIATED_VALUE (0x80000017):'>
  Negotiable parameter received during handshake had invalid value.</t>
  <t hangText='QUIC_DECOMPRESSION_FAILURE (0x80000018):'>
  There was an error decompressing data.</t>
  <t hangText='QUIC_NETWORK_IDLE_TIMEOUT (0x80000019):'>
  The connection timed out due to no network activity.</t>
  <t hangText='QUIC_HANDSHAKE_TIMEOUT (0x80000043):'>
  The connection timed out waiting for the handshake to complete.</t>
  <t hangText='QUIC_ERROR_MIGRATING_ADDRESS (0x8000001a):'>
  There was an error encountered migrating addresses.</t>
  <t hangText='QUIC_ERROR_MIGRATING_PORT (0x80000056):'>
  There was an error encountered migrating port only.</t>
  <t hangText='QUIC_EMPTY_STREAM_FRAME_NO_FIN (0x80000032):'>
  We received a STREAM_FRAME with no data and no fin flag set.</t>
  <t hangText='QUIC_FLOW_CONTROL_RECEIVED_TOO_MUCH_DATA (0x8000003b):'>
  The peer received too much data, violating flow control.</t>
  <t hangText='QUIC_FLOW_CONTROL_SENT_TOO_MUCH_DATA (0x8000003f):'>
  The peer sent too much data, violating flow control.</t>
  <t hangText='QUIC_FLOW_CONTROL_INVALID_WINDOW (0x80000040):'>
  The peer received an invalid flow control window.</t>
  <t hangText='QUIC_CONNECTION_IP_POOLED (0x8000003e):'>
  The connection has been IP pooled into an existing connection.</t>
  <t hangText='QUIC_TOO_MANY_OUTSTANDING_SENT_PACKETS (0x80000044):'>
  The connection has too many outstanding sent packets.</t>
  <t hangText='QUIC_TOO_MANY_OUTSTANDING_RECEIVED_PACKETS (0x80000045):'>
  The connection has too many outstanding received packets.</t>
  <t hangText='QUIC_CONNECTION_CANCELLED (0x80000046):'>
  The QUIC connection has been cancelled.</t>
  <t hangText='QUIC_BAD_PACKET_LOSS_RATE (0x80000047):'>
  Disabled QUIC because of high packet loss rate.</t>
  <t hangText='QUIC_PUBLIC_RESETS_POST_HANDSHAKE (0x80000049):'>
  Disabled QUIC because of too many PUBLIC_RESETs post handshake.</t>
  <t hangText='QUIC_TIMEOUTS_WITH_OPEN_STREAMS (0x8000004a):'>
  Disabled QUIC because of too many timeouts with streams open.</t>
  <t hangText='QUIC_TOO_MANY_RTOS (0x80000055):'>
  QUIC timed out after too many RTOs.</t>
  <t hangText='QUIC_ENCRYPTION_LEVEL_INCORRECT (0x8000002c):'>
  A packet was received with the wrong encryption level (i.e. it should
have been encrypted but was not.)</t>
  <t hangText='QUIC_VERSION_NEGOTIATION_MISMATCH (0x80000037):'>
  This connection involved a version negotiation which appears to have been
tampered with.</t>
  <t hangText='QUIC_IP_ADDRESS_CHANGED (0x80000050):'>
  IP address changed causing connection close.</t>
  <t hangText='QUIC_ADDRESS_VALIDATION_FAILURE (0x80000051):'>
  Client address validation failed.</t>
  <t hangText='QUIC_TOO_MANY_FRAME_GAPS (0x8000005d):'>
  Stream frames arrived too discontiguously so that stream sequencer buffer
maintains too many gaps.</t>
  <t hangText='QUIC_TOO_MANY_SESSIONS_ON_SERVER (0x80000060):'>
  Connection closed because server hit max number of sessions allowed.</t>
</list></t>

</section>
</section>
<section anchor="security-and-privacy-considerations" title="Security and Privacy Considerations">

<section anchor="spoofed-ack-attack" title="Spoofed ACK Attack">

<t>An attacker receives an STK from the server and then releases the IP address on
which it received the STK.  The attacker may, in the future, spoof this same
address (which now presumably addresses a different endpoint), and initiate a
0-RTT connection with a server on the victim’s behalf.  The attacker then spoofs
ACK frames to the server which cause the server to potentially drown the victim
in data.</t>

<t>There are two possible mitigations to this attack.  The simplest one is that a
server can unilaterally create a gap in packet-number space.  In the non-attack
scenario, the client will send an ACK frame with the larger value for largest
acknowledged.  In the attack scenario, the attacker could acknowledge a packet
in the gap.  If the server sees an acknowledgment for a packet that was never
sent, the connection can be aborted.</t>

<t>The second mitigation is that the server can require that acknowledgments for
sent packets match the encryption level of the sent packet.  This mitigation is
useful if the connection has an ephemeral forward-secure key that is generated
and used for every new connection.  If a packet sent is protected with a
forward-secure key, then any acknowledgments that are received for them MUST
also be forward-secure protected.  Since the attacker will not have the forward
secure key, the attacker will not be able to generate forward-secure protected
packets with ACK frames.</t>

</section>
<section anchor="slowloris-attacks" title="Slowloris Attacks">

<t>The attacks commonly known as Slowloris <xref target="SLOWLORIS"/> try to keep many
connections to the target endpoint open and hold them open as long as possible.
These attacks can be executed against a QUIC endpoint by generating the minimum
amount of activity necessary to avoid being closed for inactivity.  This might
involve sending small amounts of data, gradually opening flow control windows in
order to control the sender rate, or manufacturing ACK frames that simulate a
high loss rate.</t>

<t>QUIC deployments SHOULD provide mitigations for the Slowloris attacks, such as
increasing the maximum number of clients the server will allow, limiting the
number of connections a single IP address is allowed to make, imposing
restrictions on the minimum transfer speed a connection is allowed to have, and
restricting the length of time an endpoint is allowed to stay connected.</t>

</section>
<section anchor="stream-fragmentation-and-reassembly-attacks" title="Stream Fragmentation and Reassembly Attacks">

<t>An adversarial endpoint might intentionally fragment the data on stream buffers
in order to cause disproportionate memory commitment.  An adversarial endpoint
could open a stream and send some STREAM frames containing arbitrary fragments
of the stream content.</t>

<t>The attack is mitigated if flow control windows correspond to available
memory.  However, some receivers will over-commit memory and advertise flow
control offsets in the aggregate that exceed actual available memory.  The
over-commitment strategy can lead to better performance when endpoints are well
behaved, but renders endpoints vulnerable to the stream fragmentation attack.</t>

<t>QUIC deployments SHOULD provide mitigations against the stream fragmentation
attack.  Mitigations could consist of avoiding over-committing memory, delaying
reassembly of STREAM frames, implementing heuristics based on the age and
duration of reassembly holes, or some combination.</t>

</section>
<section anchor="stream-commitment-attack" title="Stream Commitment Attack">

<t>An adversarial endpoint can open lots of streams, exhausting state on an
endpoint.  The adversarial endpoint could repeat the process on a large number
of connections, in a manner similar to SYN flooding attacks in TCP.</t>

<t>Normally, clients will open streams sequentially, as explained in <xref target="stream-id"/>.
However, when several streams are initiated at short intervals, transmission
error may cause STREAM DATA frames opening streams to be received out of
sequence.  A receiver is obligated to open intervening streams if a
higher-numbered stream ID is received.  Thus, on a new connection, opening
stream 2000001 opens 1 million streams, as required by the specification.</t>

<t>The number of active streams is limited by the concurrent stream limit transport
parameter, as explained in <xref target="stream-concurrency"/>.  If chosen judisciously, this
limit mitigates the effect of the stream commitment attack.  However, setting
the limit too low could affect performance when applications expect to open
large number of streams.</t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<section anchor="iana-transport-parameters" title="QUIC Transport Parameter Registry">

<t>IANA [SHALL add/has added] a registry for “QUIC Transport Parameters” under a
“QUIC Protocol” heading.</t>

<t>The “QUIC Transport Parameters” registry governs a 16-bit space.  This space is
split into two spaces that are governed by different policies.  Values with the
first byte in the range 0x00 to 0xfe (in hexadecimal) are assigned via the
Specification Required policy <xref target="RFC5226"/>.  Values with the first byte 0xff are
reserved for Private Use <xref target="RFC5226"/>.</t>

<t>Registrations MUST include the following fields:</t>

<t><list style="hanging">
  <t hangText='Value:'>
  The numeric value of the assignment (registrations will be between 0x0000 and
0xfeff).</t>
  <t hangText='Parameter Name:'>
  A short mnemonic for the parameter.</t>
  <t hangText='Specification:'>
  A reference to a publicly available specification for the value.</t>
</list></t>

<t>The nominated expert(s) verify that a specification exists and is readily
accessible.  The expert(s) are encouraged to be biased towards approving
registrations unless they are abusive, frivolous, or actively harmful (not
merely aesthetically displeasing, or architecturally dubious).</t>

<t>The initial contents of this registry are shown in
<xref target="iana-tp-table"/>.</t>

<texttable title="Initial QUIC Transport Parameters Entries" anchor="iana-tp-table">
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Parameter Name</ttcol>
      <ttcol align='left'>Specification</ttcol>
      <c>0x0000</c>
      <c>initial_max_stream_data</c>
      <c><xref target="transport-parameter-definitions"/></c>
      <c>0x0001</c>
      <c>initial_max_data</c>
      <c><xref target="transport-parameter-definitions"/></c>
      <c>0x0002</c>
      <c>initial_max_stream_id</c>
      <c><xref target="transport-parameter-definitions"/></c>
      <c>0x0003</c>
      <c>idle_timeout</c>
      <c><xref target="transport-parameter-definitions"/></c>
      <c>0x0004</c>
      <c>truncate_connection_id</c>
      <c><xref target="transport-parameter-definitions"/></c>
</texttable>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>

<reference anchor="QUIC-RECOVERY" >
  <front>
    <title>QUIC Loss Detection and Congestion Control</title>
    <author initials="J." surname="Iyengar" fullname="Jana Iyengar" role="editor">
      <organization>Google</organization>
    </author>
    <author initials="I." surname="Swett" fullname="Ian Swett" role="editor">
      <organization>Google</organization>
    </author>
    <date />
  </front>
  <seriesInfo name="Internet-Draft" value="draft-ietf-quic-recovery-latest"/>
</reference>
<reference anchor="QUIC-TLS" >
  <front>
    <title>Using Transport Layer Security (TLS) to Secure QUIC</title>
    <author initials="M." surname="Thomson" fullname="Martin Thomson" role="editor">
      <organization>Mozilla</organization>
    </author>
    <author initials="S." surname="Turner" fullname="Sean Turner" role="editor">
      <organization>sn3rd</organization>
    </author>
    <date />
  </front>
  <seriesInfo name="Internet-Draft" value="draft-ietf-quic-tls-latest"/>
</reference>




<reference  anchor="RFC2119" target='http://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor="I-D.ietf-tls-tls13">
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>

<author initials='E' surname='Rescorla' fullname='Eric Rescorla'>
    <organization />
</author>

<date month='April' day='28' year='2017' />

<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-tls-tls13-20' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-tls-tls13-20.txt' />
</reference>



<reference  anchor="RFC3629" target='http://www.rfc-editor.org/info/rfc3629'>
<front>
<title>UTF-8, a transformation format of ISO 10646</title>
<author initials='F.' surname='Yergeau' fullname='F. Yergeau'><organization /></author>
<date year='2003' month='November' />
<abstract><t>ISO/IEC 10646-1 defines a large character set called the Universal Character Set (UCS) which encompasses most of the world's writing systems.  The originally proposed encodings of the UCS, however, were not compatible with many current applications and protocols, and this has led to the development of UTF-8, the object of this memo.  UTF-8 has the characteristic of preserving the full US-ASCII range, providing compatibility with file systems, parsers and other software that rely on US-ASCII values but are transparent to other values.  This memo obsoletes and replaces RFC 2279.</t></abstract>
</front>
<seriesInfo name='STD' value='63'/>
<seriesInfo name='RFC' value='3629'/>
<seriesInfo name='DOI' value='10.17487/RFC3629'/>
</reference>



<reference  anchor="RFC4821" target='http://www.rfc-editor.org/info/rfc4821'>
<front>
<title>Packetization Layer Path MTU Discovery</title>
<author initials='M.' surname='Mathis' fullname='M. Mathis'><organization /></author>
<author initials='J.' surname='Heffner' fullname='J. Heffner'><organization /></author>
<date year='2007' month='March' />
<abstract><t>This document describes a robust method for Path MTU Discovery (PMTUD) that relies on TCP or some other Packetization Layer to probe an Internet path with progressively larger packets.  This method is described as an extension to RFC 1191 and RFC 1981, which specify ICMP-based Path MTU Discovery for IP versions 4 and 6, respectively.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4821'/>
<seriesInfo name='DOI' value='10.17487/RFC4821'/>
</reference>



<reference  anchor="RFC1191" target='http://www.rfc-editor.org/info/rfc1191'>
<front>
<title>Path MTU discovery</title>
<author initials='J.C.' surname='Mogul' fullname='J.C. Mogul'><organization /></author>
<author initials='S.E.' surname='Deering' fullname='S.E. Deering'><organization /></author>
<date year='1990' month='November' />
<abstract><t>This memo describes a technique for dynamically discovering the maximum transmission unit (MTU) of an arbitrary internet path.  It specifies a small change to the way routers generate one type of ICMP message.  For a path that passes through a router that has not been so changed, this technique might not discover the correct Path MTU, but it will always choose a Path MTU as accurate as, and in many cases more accurate than, the Path MTU that would be chosen by current practice.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='1191'/>
<seriesInfo name='DOI' value='10.17487/RFC1191'/>
</reference>



<reference  anchor="RFC1981" target='http://www.rfc-editor.org/info/rfc1981'>
<front>
<title>Path MTU Discovery for IP version 6</title>
<author initials='J.' surname='McCann' fullname='J. McCann'><organization /></author>
<author initials='S.' surname='Deering' fullname='S. Deering'><organization /></author>
<author initials='J.' surname='Mogul' fullname='J. Mogul'><organization /></author>
<date year='1996' month='August' />
<abstract><t>This document describes Path MTU Discovery for IP version 6.  It is largely derived from RFC 1191, which describes Path MTU Discovery for IP version 4.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='1981'/>
<seriesInfo name='DOI' value='10.17487/RFC1981'/>
</reference>



<reference  anchor="RFC5226" target='http://www.rfc-editor.org/info/rfc5226'>
<front>
<title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
<author initials='T.' surname='Narten' fullname='T. Narten'><organization /></author>
<author initials='H.' surname='Alvestrand' fullname='H. Alvestrand'><organization /></author>
<date year='2008' month='May' />
<abstract><t>Many protocols make use of identifiers consisting of constants and other well-known values.  Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication transform for IPsec).  To ensure that such quantities have consistent values and interpretations across all implementations, their assignment must be administered by a central authority.  For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA).</t><t>In order for IANA to manage a given namespace prudently, it needs guidelines describing the conditions under which new values can be assigned or when modifications to existing values can be made.  If IANA is expected to play a role in the management of a namespace, IANA must be given clear and concise instructions describing that role.  This document discusses issues that should be considered in formulating a policy for assigning values to a namespace and provides guidelines for authors on the specific text that must be included in documents that place demands on IANA.</t><t>This document obsoletes RFC 2434.  This document specifies an Internet Best  Current Practices for the Internet Community, and requests discussion and  suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='26'/>
<seriesInfo name='RFC' value='5226'/>
<seriesInfo name='DOI' value='10.17487/RFC5226'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="EARLY-DESIGN" target="https://goo.gl/dMVtFi">
  <front>
    <title>QUIC: Multiplexed Transport Over UDP</title>
    <author initials="J." surname="Roskind">
      <organization></organization>
    </author>
    <date year="2013" month="December" day="02"/>
  </front>
</reference>
<reference anchor="SLOWLORIS" target="https://web.archive.org/web/20150315054838/http://ha.ckers.org/slowloris/">
  <front>
    <title>Welcome to Slowloris...</title>
    <author initials="R." surname="RSnake Hansen">
      <organization></organization>
    </author>
    <date year="2009" month="June"/>
  </front>
</reference>




<reference  anchor="RFC2360" target='http://www.rfc-editor.org/info/rfc2360'>
<front>
<title>Guide for Internet Standards Writers</title>
<author initials='G.' surname='Scott' fullname='G. Scott'><organization /></author>
<date year='1998' month='June' />
<abstract><t>This document is a guide for Internet standard writers.  It defines those characteristics that make standards coherent, unambiguous, and easy to interpret.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='22'/>
<seriesInfo name='RFC' value='2360'/>
<seriesInfo name='DOI' value='10.17487/RFC2360'/>
</reference>



<reference  anchor="RFC6824" target='http://www.rfc-editor.org/info/rfc6824'>
<front>
<title>TCP Extensions for Multipath Operation with Multiple Addresses</title>
<author initials='A.' surname='Ford' fullname='A. Ford'><organization /></author>
<author initials='C.' surname='Raiciu' fullname='C. Raiciu'><organization /></author>
<author initials='M.' surname='Handley' fullname='M. Handley'><organization /></author>
<author initials='O.' surname='Bonaventure' fullname='O. Bonaventure'><organization /></author>
<date year='2013' month='January' />
<abstract><t>TCP/IP communication is currently restricted to a single path per connection, yet multiple paths often exist between peers.  The simultaneous use of these multiple paths for a TCP/IP session would improve resource usage within the network and, thus, improve user experience through higher throughput and improved resilience to network failure.</t><t>Multipath TCP provides the ability to simultaneously use multiple paths between peers.  This document presents a set of extensions to traditional TCP to support multipath operation.  The protocol offers the same type of service to applications as TCP (i.e., reliable bytestream), and it provides the components necessary to establish and use multiple TCP flows across potentially disjoint paths.  This  document defines an Experimental Protocol for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='6824'/>
<seriesInfo name='DOI' value='10.17487/RFC6824'/>
</reference>



<reference  anchor="RFC4086" target='http://www.rfc-editor.org/info/rfc4086'>
<front>
<title>Randomness Requirements for Security</title>
<author initials='D.' surname='Eastlake 3rd' fullname='D. Eastlake 3rd'><organization /></author>
<author initials='J.' surname='Schiller' fullname='J. Schiller'><organization /></author>
<author initials='S.' surname='Crocker' fullname='S. Crocker'><organization /></author>
<date year='2005' month='June' />
<abstract><t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts.  However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities.  The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t><t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult.  This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities.  It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='106'/>
<seriesInfo name='RFC' value='4086'/>
<seriesInfo name='DOI' value='10.17487/RFC4086'/>
</reference>



<reference  anchor="RFC7301" target='http://www.rfc-editor.org/info/rfc7301'>
<front>
<title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
<author initials='S.' surname='Friedl' fullname='S. Friedl'><organization /></author>
<author initials='A.' surname='Popov' fullname='A. Popov'><organization /></author>
<author initials='A.' surname='Langley' fullname='A. Langley'><organization /></author>
<author initials='E.' surname='Stephan' fullname='E. Stephan'><organization /></author>
<date year='2014' month='July' />
<abstract><t>This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection.</t></abstract>
</front>
<seriesInfo name='RFC' value='7301'/>
<seriesInfo name='DOI' value='10.17487/RFC7301'/>
</reference>



<reference  anchor="RFC7540" target='http://www.rfc-editor.org/info/rfc7540'>
<front>
<title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
<author initials='M.' surname='Belshe' fullname='M. Belshe'><organization /></author>
<author initials='R.' surname='Peon' fullname='R. Peon'><organization /></author>
<author initials='M.' surname='Thomson' fullname='M. Thomson' role='editor'><organization /></author>
<date year='2015' month='May' />
<abstract><t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2).  HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection.  It also introduces unsolicited push of representations from servers to clients.</t><t>This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax.  HTTP's existing semantics remain unchanged.</t></abstract>
</front>
<seriesInfo name='RFC' value='7540'/>
<seriesInfo name='DOI' value='10.17487/RFC7540'/>
</reference>

<reference anchor="SST" >
  <front>
    <title>Structured streams</title>
    <author initials="B." surname="Ford" fullname="Bryan Ford">
      <organization></organization>
    </author>
    <date year="2007" month="October"/>
  </front>
  <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="Vol. 37, pp. 361"/>
  <seriesInfo name="DOI" value="10.1145/1282427.1282421"/>
</reference>




    </references>


<section anchor="contributors" title="Contributors">

<t>The original authors of this specification were Ryan Hamilton, Jana Iyengar, Ian
Swett, and Alyssa Wilk.</t>

<t>The original design and rationale behind this protocol draw significantly from
work by Jim Roskind <xref target="EARLY-DESIGN"/>. In alphabetical order, the contributors to
the pre-IETF QUIC project at Google are: Britt Cyr, Jeremy Dorfman, Ryan
Hamilton, Jana Iyengar, Fedor Kouranov, Charles Krasic, Jo Kulik, Adam Langley,
Jim Roskind, Robbie Shade, Satyam Shekhar, Cherie Shi, Ian Swett, Raman Tenneti,
Victor Vasiliev, Antonio Vicente, Patrik Westin, Alyssa Wilk, Dale Worley, Fan
Yang, Dan Zhang, Daniel Ziegler.</t>

</section>
<section anchor="acknowledgments" title="Acknowledgments">

<t>Special thanks are due to the following for helping shape pre-IETF QUIC and its
deployment: Chris Bentzel, Misha Efimov, Roberto Peon, Alistair Riddoch,
Siddharth Vijayakrishnan, and Assar Westerlund.</t>

<t>This document has benefited immensely from various private discussions and
public ones on the quic@ietf.org and proto-quic@chromium.org mailing lists. Our
thanks to all.</t>

</section>
<section anchor="change-log" title="Change Log">

<t><list style='empty'>
  <t><spanx style="strong">RFC Editor’s Note:</spanx> Please remove this section prior to publication of a
final version of this document.</t>
</list></t>

<t>Issue and pull request numbers are listed with a leading octothorp.</t>

<section anchor="since-draft-ietf-quic-transport-02" title="Since draft-ietf-quic-transport-02">

<t><list style="symbols">
  <t>The size of the initial packet payload has a fixed minimum (#267, #472)</t>
  <t>Define when Version Negotiation packets are ignored (#284, #294, #241, #143,
#474)</t>
  <t>The 64-bit FNV-1a algorithm is used for integrity protection of unprotected
packets (#167, #480, #481, #517)</t>
  <t>Rework initial packet types to change how the connection ID is chosen (#482,
#442, #493)</t>
  <t>No timestamps are forbidden in unprotected packets (#542, #429)</t>
  <t>Cryptographic handshake is now on stream 0 (#456)</t>
  <t>Remove congestion control exemption for cryptographic handshake (#248, #476)</t>
  <t>Version 1 of QUIC uses TLS; a new version is needed to use a different
handshake protocol (#516)</t>
  <t>STREAM frames have a reduced number of offset lengths (#543, #430)</t>
  <t>Split some frames into separate connection- and stream- level frames
(#443)
  <list style="symbols">
      <t>WINDOW_UPDATE split into MAX_DATA and MAX_STREAM_DATA (#450)</t>
      <t>BLOCKED split to match WINDOW_UPDATE split (#454)</t>
      <t>Define STREAM_ID_NEEDED frame (#455)</t>
    </list></t>
  <t>A NEW_CONNECTION_ID frame supports connection migration without linkability
(#232, #491, #496)</t>
  <t>Transport parameters for 0-RTT are retained from a previous connection (#512)
  <list style="symbols">
      <t>A client in 0-RTT no longer required to reset excess streams (#425, #479)</t>
    </list></t>
  <t>Expanded security considerations (#440, #444, #445, #448)</t>
</list></t>

</section>
<section anchor="since-draft-ietf-quic-transport-01" title="Since draft-ietf-quic-transport-01">

<t><list style="symbols">
  <t>Defined short and long packet headers (#40, #148, #361)</t>
  <t>Defined a versioning scheme and stable fields (#51, #361)</t>
  <t>Define reserved version values for “greasing” negotiation (#112, #278)</t>
  <t>The initial packet number is randomized (#35, #283)</t>
  <t>Narrow the packet number encoding range requirement (#67, #286, #299, #323,
#356)</t>
  <t>Defined client address validation (#52, #118, #120, #275)</t>
  <t>Define transport parameters as a TLS extension (#49, #122)</t>
  <t>SCUP and COPT parameters are no longer valid (#116, #117)</t>
  <t>Transport parameters for 0-RTT are either remembered from before, or assume
default values (#126)</t>
  <t>The server chooses connection IDs in its final flight (#119, #349, #361)</t>
  <t>The server echoes the Connection ID and packet number fields when sending a
Version Negotiation packet (#133, #295, #244)</t>
  <t>Defined a minimum packet size for the initial handshake packet from the client
(#69, #136, #139, #164)</t>
  <t>Path MTU Discovery (#64, #106)</t>
  <t>The initial handshake packet from the client needs to fit in a single packet
(#338)</t>
  <t>Forbid acknowledgment of packets containing only ACK and PADDING (#291)</t>
  <t>Require that frames are processed when packets are acknowledged (#381, #341)</t>
  <t>Removed the STOP_WAITING frame (#66)</t>
  <t>Don’t require retransmission of old timestamps for lost ACK frames (#308)</t>
  <t>Clarified that frames are not retransmitted, but the information in them can
be (#157, #298)</t>
  <t>Error handling definitions (#335)</t>
  <t>Split error codes into four sections (#74)</t>
  <t>Forbid the use of Public Reset where CONNECTION_CLOSE is possible (#289)</t>
  <t>Define packet protection rules (#336)</t>
  <t>Require that stream be entirely delivered or reset, including acknowledgment
of all STREAM frames or the RST_STREAM, before it closes (#381)</t>
  <t>Remove stream reservation from state machine (#174, #280)</t>
  <t>Only stream 1 does not contribute to connection-level flow control (#204)</t>
  <t>Stream 1 counts towards the maximum concurrent stream limit (#201, #282)</t>
  <t>Remove connection-level flow control exclusion for some streams (except 1)
(#246)</t>
  <t>RST_STREAM affects connection-level flow control (#162, #163)</t>
  <t>Flow control accounting uses the maximum data offset on each stream, rather
than bytes received (#378)</t>
  <t>Moved length-determining fields to the start of STREAM and ACK (#168, #277)</t>
  <t>Added the ability to pad between frames (#158, #276)</t>
  <t>Remove error code and reason phrase from GOAWAY (#352, #355)</t>
  <t>GOAWAY includes a final stream number for both directions (#347)</t>
  <t>Error codes for RST_STREAM and CONNECTION_CLOSE are now at a consistent offset
(#249)</t>
  <t>Defined priority as the responsibility of the application protocol (#104,
#303)</t>
</list></t>

</section>
<section anchor="since-draft-ietf-quic-transport-00" title="Since draft-ietf-quic-transport-00">

<t><list style="symbols">
  <t>Replaced DIVERSIFICATION_NONCE flag with KEY_PHASE flag</t>
  <t>Defined versioning</t>
  <t>Reworked description of packet and frame layout</t>
  <t>Error code space is divided into regions for each component</t>
  <t>Use big endian for all numeric values</t>
</list></t>

</section>
<section anchor="since-draft-hamilton-quic-transport-protocol-01" title="Since draft-hamilton-quic-transport-protocol-01">

<t><list style="symbols">
  <t>Adopted as base for draft-ietf-quic-tls</t>
  <t>Updated authors/editors list</t>
  <t>Added IANA Considerations section</t>
  <t>Moved Contributors and Acknowledgments to appendices</t>
</list></t>

</section>
</section>


  </back>

<!-- ##markdown-source:
H4sIAEycIlkAA+y9a3vcxpUu+r1+BUb+EDLTTZHUxbKcyWxapGLu6DYi7Zw8
TkYGu9EkRt2NHgBNipG1f/tZ91oFoEl6Ys32yRzNxRIJFOqyat3Xu8bjcWjL
dl48ze7923fHz55mB9l3h2/G3+RNMc1erudtuZoXH+Dv+XKanRSTdV1kp3W+
bFZV3d4L+dlZXVw+zfDd+PPsTV211aSah2k1WeYLGH1a57N2XBbtbPyf63Iy
bvXZ8Txvi6YNU/jP0+zj4cHp0acwgX+cV/X106xpp6Fc1U+ztl437f7u7le7
+yGvi/xp/Fy4qur353W1XvFEQmhamO67fF4tYczrogmr8mn2A0xplDXwQl3M
Gvjb9YL/ApNc5KtVuTz/awj5ur2o6qchy8bwf1lWLpun2f/eyY6vi+V5XtPP
eEn/O1/myY+r+vxp9oeqOp8X9O9ikZfzp9l/1OX/Oqef7kyqBf2mrnDHi2nZ
VnX6pZc72elFtWiqpfvSy7xuy2XyC/rWy+pv5Xye+48t6NGdlh/9X+f40+HP
hmVVL/K2vCyeBvgtbtz47dGz198fvf3zU3rcE0b2omqa7LBoi0lbVksih2fV
8hyODv8Jf21h9Hv0XnKU+IOmqMuiKZezigfOsuNlW9TLoh0fIl30yaMuJtVl
UV8rdeA78WTwz1j+O3xCN5zS0EkNnMnAN453spOrom07XzjOl52f3zq87vfp
i5N0q7+DXTp3F+lFfl3UfO/K9jrbghe2s7bSm4iD/GJ73s6bO293h0xvJNVB
cr3bjp/AZ9Yw5+6hnhSw553f0Cea5YN6umHPcS88xR8dvH3x5/Hh0cnxH171
Cf5pwv3iibwGskQWeW9ok4wW31bN+3I5dUezv7v3YLy3Pwb2RZ/K6/MCDuHe
Rduumqf37wOH2Dmf35++/L59Xt7D+Z28eP2nF6/fHndI5E/FHO5zQVQwr67m
VV02Ozs7N8znLcznZJm/L7JvYRXFMpnV7lfj3cd+SvyuzeuqONvJ68kF7NoO
bDH++z6s5dHuA/i/Rw+fPHhyHx+FJy/yncn7om7osUandh/WEsbjcZafNcD0
J20Ipxdlg0x3vSiWbTYtZuWyaLL2osgmFRB1NaO/E9cxMZGtRKTsZFnyfpgW
zaQuz2CESbVcCnsCIs7P5mVzgY+MslUOM2szPv9RttCTxcuGnKwu5mV+Vs7h
ju2Egwns7ypfXuNv9TPwQfkOT7S+XrXVeZ2vLspJdgFjNBe4wTjYHDnlVDnl
jix/WbXFu1f4/9rq3dsin8JOhXBYNpN10+CUadm4MLyWcBjvYUWreT6BDVnG
DUFRh/MicZchd8d/wUrbsIW3+H/hfcYT2B5lVzC3iwyGlPMDId6G3+nB4rt6
sPrSffzB/aag//wriZR3OPa/4NC/h6X8ST7/B/q83SiY4QRuJGzOrFov8TuZ
fee8bC/WZyiD7uMoV+e//xqE8LqeFGFSTXnLyqZZw3LxU3hIfiM644bN494/
A6VlTG819+f5WTFv7hv94OTxGBbldApcOXyB7LCupms6pBBoc3GrInGI0tMw
q+1TIswS1lmvlw2dULXCIwTOsMOD5eWiwUsKj1+WuM5shhR3Ni9gyBafnRV5
C0M3PFA+hyuTlS2+AwvOw3kB7C2fj1frelU1fga4RTrNDDSXeTmhQ2h2dCEL
+A2TLZDhxbL8T9peONclrGpWV4us+LBCCbEE+rqCncxOn70ZZSfPTt/Qoisg
uDr019zA9WMZBQvNcr61zZqudluMmEabonjfyDLoKrW46kCfmRfn+eQ6m8xL
mh1+i4/krPpQ4Oi8d8DG4Pe4LJg37AxuVwnPX/DFwfcCzB1vYZMtqqZVrgFs
LcdNLD5M4FaCejICKp3M11OcM47QlOfLHC+NMhLa9ybgy/Fkq6y4rOaXvDfV
usVB1nVN/ALu9qpYTuHz13jw6xWwgSmeYhX8UnpsTtmUMTpaqn7Tz5OfgKNZ
tet8jq/CpEewgXVhPIx2rsBFlg0Qmmeatgykk41MEZRkUKMXCTMEpZh/iKPH
N8fz4rKA4ZBAJ6zp8QRwt0PCPG/lnjjD3zQdJqnfU3VSPhI+fkzU0k+f+LO4
0nVDkgIUomxv5wEt9X1xnS3BbmhLZknyNjzy6ROy4S9QTb1EuoKrQgMdouwp
6d8olgpkr9Mmu/fyu5PTeyP+b/bqNf395NvX3704vMczuPfy4M/3gK/SPIB/
LYVlyXp3wnELiwSenzVIPrAXXwM7LoiRX9N7k3xVtkCIfyumI/7pRX7JwqVZ
FZMSzn0BWg68GVhC0lc+fvynt8+f7e/tfUVLcvMnCijqhXKTTVMD1ecZXT74
C9hQ8Dmg5VVVLpHGS9o6InKipEgC8LGTogbdp/9aPkFCpfu1hLPHv3ReRr50
JI/b+8wCQG1DVRWVqgL5zgw+nX6VCJLeOgCqOQeeAMR3Vo6ncBvoIdgpvAbL
grgEHGBRw7rPrpF14PWFHRhazjP7hww+QeKoG6ads6K9KvC8rip+V5fLY8KI
yAXnuA3EhZRqiw+oPdMRREHSyLWy+ZRtMoHs+NC2BUQFEOishA1Bmh6aOV9y
Umlk6lfFfD5GzgALR8a8yq/nVT7leYgEXeV1Q/uiY8L2FSD8a2W6PCLMvgGi
7NENPD5DzgusEWnUfwWfp/v1RQYKTi5n4u5aCG9YAcOrM6tBhc+mZQ5sE3YE
7zEOyHzN+IRQ+78itT94vPvpE5o8tFcPdvZGLEv4NWTfRLLTaankED8NG/SX
Hz785a+wTcfLqQgU2pYPKO6rFb8CT3388JdPG56SMy6mIXzItg62Nzx2AGTZ
ImuDO0sP3v/m/rPtDJTzTV9fEg87GGXfjPAiPOsM8NubXr7Ma2C78wKY8/K8
vSD+dsAniTbKZVlciardyM6dgbyfza+dKBJmjIzTyRI8pTNQPmYwGSCOPxbX
JCvwK8RmWMUgaYWW1G+zF9UVWY4oETfJG3zupde7VbKiSB9XszHI5CI7m1cT
VDDx6QOnBLAqZucgegD9UKgQ33iL+q4JeBV/HaESdXR1MuCrJ0NyL5F4+JS7
sosS6NdkF2hx5Zy1Kbggrw5O4SdnYADKUr6Hm4OPOunE9wV37oXsnBv8KN05
ua7wAVI1kUMuzkgkpHYIyUbT2aJVAhsRQOckHg1qe97XaR1/yXrcG4VJQH1x
glsP64PPL6olUBJe3t3x29PT+DFQuERuMa2SrooKGnnm3Kgj1tWEOzXIYsoF
MDDYngKGjhe7NWER4pKYWY2Miq7ystUzz2GvVjgE6rkkUEnAyMqCKOQNaXJT
IS/Re7aEDo4Ps91tUWFJjOK4oDAjl8Izvc0GpC1k5tL4UyelU5ld8EqbPswk
jTyyRXZLH5+uSfP0ug0eScIrE2YNAhL2BMd2OzZktgS3XmQqnSELFO5Rnduw
4sCWWkfdAuqWwf21BxMS1SBntAC5NE1+XhCZRZKEKeDlZLsEbpLo3K1/Ndir
SEXNejZDqYmnPshUYPP5453vRzkdFrBSE9Y52nTw/d80IuzHpFQIpxB3BowA
KiEzFNJe4AUguHO6ucAWYPAGN1MnQQ+BQYNGUwFmGaxInobDBm43J/KlbViU
7BnIwfC4hIsVyhoGxGsI/1SN369EJ24aIPCVfAVTIBIvl+6jQT+q971YNtEW
neOF5SuGe1vXrM3jfaULtsQTKeEWoXnCXw3EEMDwhD3hQUiNnQGh8APwoUMc
QNSOKXIyMjNt2niIyGzL5boIfPfgF01TLEDMsQSYAhO8JP1O9BC3fKY5kgEn
iQzo+6lpLPJovzUZILJQXUVwA9U7BD9ZVlcwBTkm2pCsJueK84DQoi+K+So7
g3WFu0gePJPZejnNcWDYyqv8Gg/kKIehvU6GXyyJYy2LK53icr04K+rUbkQ/
gZ2XkVGLx4+nJzZvqM4uS1EnChhS+BvKBWQ9bRG1Adznadkgb12DPOrtBYqW
lFwb5bs4Fxy2qsvzEtWy5Cm4NJdVSdOmKxa6RA8SDj7ZXiPjgvNfmG+gM4N8
3lTozQAyKFsgQaD5aloQhwZqya+jKn9RMPGtWr6pq6iUotqVDgyv4dwa4qbo
bgDGVxC5mu4JMhBY6hItkvn1GI4BqRVfSg6oGTFvZj8DbdgKplE2uPMt+vOy
Gp1bbV2uxm0JuvEWCNRtOMb5BG9ulMlAnQfP/sgKNLCk9YpE93qFd2X/0WP6
JbEZDG6J2VKie6QuTEEh91JdkJUkMnpJLItWdQJDBBl4hO4dNCzwv6ho4pvv
i2LFA7J9Ja5J8kyofQt/LRv3jQA0gFSfyASJH6nC8xwVrWeqaHV9WMwgxrd7
JWCjDuBAs4vyHF1N8GtYRUisHbAT4P+3sP1M/Yv8Q7lYw4QWcAhEGMTm6DKX
La7kqpwTK2mrIIPgsgu8o8bZDhrxPDVCMcrlRh22hZQdVhgkwcNV3jeKxIlT
hCGmTfby4P95d3L69ujg5bvDg9MDPXeeGRMbmU7BVgTcpYTbLi5UZMEyeu51
qVUBn4CzxK/wWdLUhYOJWwgO63hpNhVz29JOYsgf1D207kEF/zgOyHMlJn5+
XhfnyHfOWIazAEvN1M5R4JJQdcORSJ6KEBH92Kmzz26iGHKoo4AmhtGgaQpM
GEn+hqWqcsV3IB6u+KYCrYz1GVsaipEaeb+bLN+Ivp1zZHbOt9HOeaN2Dt5W
84OuVgVQEYiR1Twvyf2Q3EkSX/Bf9ER5pyrQ5SRfE7MCcpwXGDXKycm6/A/n
khMzC7SiciW8SH31SGOkmzVruAh5o3djDHQ2hc1K3mE/Oioek2LMbJG0u6ua
tHZSzEp0jGNgq5rhWQBt48SdWboW94VzsuLhA8mBQl8QExMNPYfPjFi5YOMl
Z5Upb1vgzCRhL4FX3XOPj4slfGcCk7mXfoCUZXLhgVUScIvZGy+7HE0oMNlQ
cAJbQJ0T7xaYWkQJevHIpSyeUlHfBlzsxHcv4P/OUGhVZ2S8mD7OvmB8++Ub
XDG7SB4/2X/46ROJKfIuNV69BNV5Xl3rd/n4gPL+wOGF+fXIqxpCtXPURFKK
Mc+run3gPrbXK5Z+Ybaes+xlwhU7Bxmd+aZFKgpNcXBKaTNa9nhcoG6g2Em+
DgfveSRJuFzcUVfwmQw1d/lEJGIQtgkh0ihlTSZWW1LA4QRpDi7R/DrrmpeN
UTedlVrxr5wdpnZobyHMJbx+yCYuHWNThPXSeTO638W9RaW9zmCp6Ayc4hxw
zriZiRmG5uwEzCC8RiG8+e6bF8fP3r09Ojk6tcGYhguMOnnWyG7oNdgUS9Sb
eiyCuZMT0i8Tl8fbnsvjbXR5DLkQomtTvJCPH47PQAIkflCQnDB4tYAJcfyL
zz5EJ0BUhmD8BlRT3NaJH0NVLf99lHfr+hJIJ0hgSC0IHhWGO+bQF+s+8dxZ
pVbmk7h2GqQvIUxxZ9PgbKyzbqeTuMTLh7KKVHgQrHAgZnypSwKzjyokl0nH
1mYyEDOPlFeYBIVE+bsjtFAnhfeVqCVFC1UvKwm4pmAVG91+yMbVhS3mzrSw
fwoF7VBsZON2iwuHtoilMfJ/Ixa5/u4dFN+0DeL5x53nDVGd068noQ9Y9wIE
nT/8IIJVz1U4pZ2r8i3+GIZl5Gjkm8QNkdSH7vfHL8QTOr7k346dF+aTEPpl
373n1P0YqpXnIkd08cYz9OcgoxZOS7uJQUC9oDtDXsSuzyZ8/Dg0Twl/fa/f
//iFTqWzhN5FFR0he7BPd/Uyn6/R14/0oKve/bArf1jvF4FFdsYK/4lOG/QY
wMvlVF9TU1RHkS1Rp4GtLmUaZK+y/mCf3YP5fN+by555qteo6mOcEO2YjV47
L35DJwqR+LVsE50d2LTkdqaJw2r3HrMjX9Zk5METn2AcXiSd7RbSCV5Scghg
VkB2fHT6nKgcPTPRtdf4KYiHlS4ci9gWc7xgG/415/+h8xz8SlWjthOGaJd9
L8WHokYzlYU5Gh1otIOU7aznikw+/DxMI8yqdW2rp8j9pBWJtre7t5ttoS+s
XOb19TbaTf0w4MuDP0cbTY1RcTup2tS4NSnlwr687fxMLXCyG8iPAHYsxojx
O4440c00Nwr4GqmEeSjOhQLNyyJ+uT+40AG7yJ0zKHIdmkGQAGsxxDC+JvdL
fwcyvwN+HiFeWRQDcMP4+xL0kwQLoMpKTkfv7l9++MsPoDNKXtxTsBzIkgTG
WkkAmnksammalGQhpAKmUYTV+sy8bn/9a8oOhCrYBi2yGbl+kluO4yXXfCve
5e0RUEp6LfwV6jFOpsuMJtRcsJ4EWwHrc1xBT0ollPCUa75jnDHE2hAQgiib
aPqK3k4PBFkXvL77YTbj6QIFP0cB+iFHu3d0Q5bz3gOwNNdzDKwFx9Jgtjba
Idrcaj9XbLmQN2td5+fKUM9R5tU9GlRep2R3HTgBQF2gq7q8RMLjrB/yNrJs
JlkZfuBkKqDS9+Vft+6WYYXP3ifOqOxom6WMxHpPr1cF0+ZzUoGbEP6E5FA3
bS8bRPT21l6BSZW1hEkaVQbIOmSuOQOWAz/qOLWdtYiZKHDnYX9gvROm/bij
U35TFQG04zlxINtqldOdledgFE7LfLlNhhXyMjizOce7RVAuidVpYGEq2XyU
CmH+cWWG9DJ5A4uAVy6VGWfsbKKliX8bbUD4KVLZt0BioJeVCxhvKTF2fFxj
UyqxlGRpvfGjuBvAPJ2dRxZmUZJDM6eIc8Ye4AsKHZKNRpZouZymFhi7JAIe
Kk5vJ3uBL5tDolY+yGtQvZANLFXNokYnDGVQg8KIrw+E4nr2KNoImmvDnjUi
buJGbOHAUk/cEnhCC2C8i8iFxhaZkIc0VdIrskDjsMpN84rT4BXrNNVqoj2R
nQr/B/+EbDfr/9kb+Nn+wM8e4Ot78KsH2cPsUfY4+zJ7kn31c34W/nnc+Z/w
095PMDTe02zry+0s+6n/zM/9n/DTwOR/zh+Yw4bfpGbA1uOH28PP/SJz+Gz7
IMzxFQuTrQf7G1bxec9CBePm73/+OahDk9JcNvzB7Je/fw58/z4+zb6YAU9H
XjcWJxTl1P/LPXdbRVjdA7uox9diIoB3rOBvSI0EGVvV5lWoUJKL/ftfYW87
2WuUeRhKRH45LWMqxoIcTuS/x+IQykvMGlBDgYWJX59CV8gHKStMV7EjbtYS
LFpgf+Q4CHO/TFQ9zwZWGn1VpO36aZ6S4s96xiI4s1fTGId8aYO2thrqb5if
ozbfBttriQeL0u6SHtYgQ3GRs/JDMZVsqDTjf4dSB8HYkWNH1wg5EdIMMpaV
T0NwpGB5eT0jD0UzKK5PdrdVK2XdhuwdDgRRsG2PNoM+n/n8ZWDKtEteWu0I
1TkVyibASjnHJNF7HdWK+FXyDNFhqCe08a5X1K92guQ9sy4zkVg+hVLEvNjb
f5JoZOLMZe1MZKfp5qCtZ6aO4l3AJH41nOmu8VBjep0s6H7i42u2EfdgvLpa
n1+A0JIz6uoLx4c7MK6LLZXTT5/S5GqYjyQHt3GdMBKHuooWK+IsI5EZsZ/E
V3Ro+8kEkoAubMfHj7Io0b87M8DvwyxgBmkkOJokyaof0BcfJ19sijnrUGbq
pH4TW5YkBsLnWIdxlpIGgGFI3BD27WGOMNXbXIjPAO5T27WrYDS+DKLlYtCj
LtgnLGzbr4AC/ntfAv1c5Zg/veXHdUrnNqf4uBiCREEyeUA8S/FKpoYBnR/l
QsPXf2LN5afsFfo0NwsxSxwdFnE/PR3jH/nPxj83/x6GyXb36GtDjM3PxkhH
Dgqo188m292nxzhHOzsmj8G8vygbhg39MbsW5jQaDfNA1k4ehROMTc0Lyndp
6+uBYdj1MG70QRiIhnnoh3mGniuKMW6ajQwz0Qd1mEd+UbcPI4vqDfOYHuOM
Q6wx5iuycZiVPhI3mYb5kh7b6wyzhf7w1QX6QoCn32GYJ7cNs3enYb6iYbzQ
G6BTNww9OCZrR0b6iZSbHrMdUm+8cY5KDl43kYooK0f+xo1SxjtKuRnxE+U2
wi1A1RH5I2Nqik1tLpyxy+XbcXLFmGWTxXqHMChCkuHUlsNIXlFk0f+tv4Dn
2UBGxk/5Acj59FvEuqbljBwKbeKh52yjHv/bOn19+PppBlYmunPI7Vkyp0uY
1dngiv91m7fchkxCJMpzO4FW0jDVZKUQksnb5TR42c7WXLRvG9AZMJzXxKo6
L6q72Z4hMt4mVm5Q1g5pKb96g3b3p2c//VEEw9aj7V+zQftD35796/AIv2qD
tmPPPrm/9/j+gFH5yxhyw3OIrPdmi/JzGJNsY6XWpL8rzpzEa++V/b63KfF0
D3iZ1HpENkQ6oGPc5M/7fOaMz5cUm4I/jpoijKtaqXgxxfTZNf+9X3jXAsie
z/NzmxgwngrrT3g6DzdYV1YPc3XBSZm9QLGqsBQdYJsRJnk8M7OMHLHLgQhz
97Wvs3KGVVGyptFNr1ScbAtL/CNoAW9IC/imjEVvnHwii9u/bXH4G9Mm1Ekp
9aoZha0m5aoU14Gdjw9wOONF1A8J/HfKBLFmrdJH3FsmVWMIlM5UpCnW59HJ
3mywPkrCoelaqYpILc8H+6nhGdDU4jvWUQFQ5vIGiaqjq1HlIdrWlsQwYHge
zwZOE+lRqHiUZszAL6vJZL2iQpyezcom38Dmdc1Vrokxa7QZNEfJr8LOjDSB
SgNsRHOsWVgibkcZMEMRpibsBuh+H139D3UBpK7xMFSesHQXNvEbhB6jpXm+
EU1KyyI9i5M8Mj3lXDiaacKq4ojd5z6XUdVmyi8tVclZsVR1QBPGokUxJwc2
CmPNsUCQaaaTt8KFY2IH482fUC4i1yhYHMXMzlTyneDnb7YmnZG4J+SfyGiz
/fb1aDq/ZZPu4dBvUR7178mgRLrVAkjpfYaXoVMWh9dg1j0eKVXYqOp3eILz
L3jdNvF9ULlW9HvcpN9nd9Lvwx30+02ZQLJvH7/o2O8hHAw+7+JsiYtV7gkR
uYXpdj8AZTASRiBnMtH12bWkBKgL7obvEHYFlgdhxghbCZLEoLeK0gLU8xlt
CA2hU7E65xrEYJ9UzgVNAOvJPDeguhD09NLHLSFCUyuwtH4tJSIuhBu9xUOs
M2UUmw3RYnKBZYo1bwgxNgkBa1FgaOvy/JyLICQHxbi2w4WwRAoOPjfNus45
MS3J7whW1eS4MNtx8twNR3eV8+5zlQ8ZY7memnLVVVXNsEyRgFMsfVB3wzvT
biUSNVc1pcvymVC9CC5nRaihoTgw3PUrZJewKTtkAf767L9fxp44sTugG7k3
HCf7fDbND/057NMcehbiLzOHoW34v7XQV59zoWq6DeRIjgWAQETmZgmAMjOV
REmmpVTSsWtl5b07A0FATd4WsRMdo6pUffzCfKAi2T8hfoc+5nP2SWxIpXDb
qfyVwGQHIEVyZCa94ZLYC2tdWZLoKr9LmG6fGfUHplo90QYbTgpti3OCtptc
FJP3EbPqxhRM2Ksvuh7yrnju+MV5cp13hCtSguidZPQ+ArtkWo0ZjZlNSaVS
n8xnkySKq0gVyVNRhYKBA/XlLM3IUuNNxrJQG4X1krz7JesbJozMJuyXwovl
IxNI3wrDb402zm6t1XS8WZLOrlpESLSIVHZbpHnwaBoOX9GPEClHD4Y3IvDX
qBKPCicpO7jgQi2uDXU5feqKMCn/tlO2ynVHOj8bg0rtKD7ft8HOEAGqIF0l
bPWCgp+2+3ci30CDks4uNeRc9idQKVtVLbV/24GUJa6g3NVrygnat5DgKFvN
1w2l0L45ODw8fvWHIPWEcJj4SE3VCVwFHrUWpze0GSetUcYzJlStF2x0beHq
dfHl34QPbqseJdPltYhB2LRUGJRTYng1mwkg2q6OZWGoMVYFX8edFHI1ehtm
AnRvNWN4WP1dSjLu/LaN02VEroUsM2/Y94S1UkhywVGNHElLbv6hbyhXwMJr
w0ljKuVa4WAfi2fAhaXiKOSrygc/IKkcLVqUcRuN/g3hQDHdtm6IBm4r290w
RJf99kZAM+nGz/8MNvwgYcO3HGAzVMOPDLDVBMpA1Uii9BKdXGEqH6P3cYkg
/t5mTTR5O6kOeQjRqXHzLvQMqpAy+59jGPFH0RZKSEl/LXpJzxAKg4aQ2pO4
K1SOdN1LcjcJgt4+i+gf9Ej2xh0YeblENMG1QnzVQ59v+gu3RG3jLjfa7FCM
wWkqEJdwCtTghlG4rg8zfSnVAbmBZXkHGgBpa5kVsxkcz+jOs9LScS5gRpaS
FDGfimgblh76LtFXajnCS/PrwAKTRGjfdiZuTCfTEp0Tv3ZcmT2nWExmcDwb
1lLeIE4QdYXqb4GkJ/kSDV6sQUEGOgXTkkAUSfoBz07Hj3A4vLWuKl2r3G6Z
WEJT5HlAkc75/JyqQjAtGL729S2+JAaXgL5fSs7eajYbANspfVExB6q9TGhc
xKJFvegMTUGqmAQVfQDVshw+uhAIFwxkk9YJN5IJkb2T3SpkWuJZoWRaDCjn
OMwdOZHXRhh6c0KxbzUTRKEgWooAFVTdI4wBPa3k0SLMAcPO4++HDd+Hkb0/
i9S8YfIXF5Y6YZqOrOqaVT0pFfNMnJTqWlk/Qz49VPES1LfMkDF5F7pk2UXw
GpBe5rC61RfnpUtv9k6uJO8G9f9NsNJ1mTr+lNA7wkZFHBs/d/jiJvZjRYC0
eWVjuBasrjPGRtc3mFhTMs+8VwbZ1cWHbkDZ3E7r2UZaD47WU5t0M8H1EpuQ
4Hpv/WyCezRKnMeKxDJs3W08sK6ReAulbZr2ZpdwmKT5RDdpMptGj3p4R5Ip
HWMoEfFf+Eec1zJHwyXlHaNeGlk0QnsfZaUwZym7M6Bplc5OvJF42Vb8v0Ke
SaKEupd6uWkainQh1RiuI/rbTbMSmOII29mR6o6mhjRh0zguu0HSzjcOhVsT
gzhJnpVDfrI8ZqRhh8vKEC6SVVVTwZGG1t3slFVLHWQvar4Td2bzhlCebf9+
PladIOG8fJfYX8hjeHVOlP4bvEYEeocC1b/ciIl4kV8yBtgtrqBQzvik5ddT
tBUoGsEVDEXqTFTslDJxH6ngzfIQc+k6jKPrSypFE3v1+jRbr6Z6bulbZRuI
C+ImJatU46RYIjRVggXBaC0CBQnqefrexlN05Ej7gUeZMN8NZ/tlUOxpyR3l
5P4Pu0+y9Bd7XwvD6+RS+EwAhGRsLwzd2l5uhggoiwTUUmVycjFwc4P35PKk
u4Slx3ETL078vFJPGiP45qjb5C6+wTZ1siL5tTmCRR8Q0Yc8Va8/42zxtLvc
tJOj4jlr6Q9e0A0SoJnIOCjR3x2W5fiHHnNAiSilBaD20gVUGA3EhyTb2wCa
El9fUFwkquUgdj3qqjMwDf6Ner/TbOGukpFkCKOCkTwdeYxq5K0LNIseEcE8
zur1CpkrZ1zADgVEf10vreVAOjpvL3t/uRS7siAISWGYldXzB+9zMcZDOOgI
Kt4YRosZ5h1oL/bMNRRGWMIngwIc9Dw6HIZv1EDamvmybc3gQS9q3lwgqgvw
ENC+t3eiDdNxDMVdoNYOecu404Z9XNfwBQty5+HZ61evjp6dHr9+9e7Zi9cn
R+IQLWdq5yF8KddkqRFYwZ5kTbWz6Qjvrh9+NajLMdRsxyMkAXRDO1QO0k13
Cnv7kad7NUncSRIKJyKUMvnoQSJsOspbylOdkJD1LouOM2hDsl2DaHPXSGMU
7pfkH8N96eAKWXVZkrej+mwMSQ2O1bVaDrv5UsNPagIXHPECVNI2+AAYphLu
E+73Aw9eXrmaGs5F6iRLpZNLK2dSTp3UuW3gzMOkpVzBLlGZIpCX3ftKBiqR
beIAUhAipczk9h5LAd+EshudNSdgGbxLHGVjoiQ9pWaYCp6FgovOrxnSa1Ku
FOw21SaCmLKeOaLaW81ScYG27XeraplChQ7tUS+hhuBtaMhRpHUSwy2C9KGX
S6523jTVhDJ5I3pIz93n3VUooLIJSsKg5Z0qeKtejRy16uOqUHEAkdepn2RD
SwgML4ycLlllypSVDSTLND8To4xw7XtXOOGDQJxUNHEoWo60uJlOLeMqveIf
v0gVkTsBirWEGTEEKoYyGRRBzypDXFD30RQ/IDEqXF5g98XAugSxq8jqJYFO
ASIko3iIq5UGXIUYXYHALUWxQCVWs8kUsGCRv+eONuivzZG3AA1j9R2rlBHB
kMtuA4k/4B1n+RzzlwiVtsoEQlPwprgtRZf0gB1WpPmyE2dAhvCrONPUxLba
3a2N1Wrbt0SiY/wO+aFLTiL7wcKAXaMhjtD3afxJnSNp0KLZFJqlL/EmaCiC
Ravo3aG/ISzaBKiVggnqyJSrrUA/uL/iEk09/rSMZS9+6fz8aarf4MylSsCE
21BOy1CkcLTBMXxzgDBK2Bvdgv1BXJXfdmd/Dv6s5Ocw7Hj3NfakYlBIypIj
CPMk2Wg0NIFtrZiaN9mpG7a2l3TTJ+rOOjb79RCA21TvWPkhc8ULgMolo3bD
FDBjVmNcbq4caxJzwOs0zq2jBtGQAUa5gMIt10tMfobPuaiQGgEOeBKUtcRb
vcQeVQ4nILWdCMXcugTpKhoHM95N1K5qAy/gphoSMjQ00U1Pk5A1TGTUWzRb
Ab2BvMVx5KhcStoMBVGuCGxLq9tVXRCyGicbyh7wg7QxUCSyumBXQTpfaf2j
HN4fJYEOBQQdWhOkQ3wm2W70TTiGuXE7Qo12Mlz4/X9//DAbS6mL4kUwU59X
Tc/fcnYdN2mTvRLBzsjAoQ5+uA3vTo7+7bujV8+O3r367uU3R2/fvTh+eXz6
7u3RwbNvjw7Dlkd/FEuyrHrwhbDh7rdg7WK5JLrkpmsBg4yGyhnz1f9cl3UX
bXAg1M0WXEE91EaxamAQh6mLWKuXQttTyNXEMUki8ZjrFU7iwb4iQiHF5hNq
4NY/KXIOR3aA/QCWIMjXpOdLUN2Ar88oICJ63hy7dFp3Bh3TN1UAs3pN1jNj
8qbejRiV77ODacHIWEAHMwY4HdgFx31RdUc6wqSgKlig2+CfXBrB8K+slAzd
9U2U2h2+QJlLcJG7aGvig9S3N69ax7vIp71rSQZynj/Znz3YLaQmzJ5JMqz2
HiOvDM6u3pt99ZCxBTHWKrtHkG4w4AP8rehT/uoN8QbKo1KM/UjHC/ZUYxDj
qsRIeRPo+FkZO9ffOec4Isa4dgdKLDHwGPfe1Q5rNpt1PCDxRTjxMW3DkQIt
mU0STLGftPPrwMvvE4wxWfcborV5fi12Gt6psmV4GLHrxChRZza1ZeGgjrBg
53kk+5PAspV+cPpLx5gP/hx412k/6qHNx/qffFacr8laOkdBJTOKjQzw1kiV
xXouSrwrO+oMSzhzpKM3qTiyU6Urg5c728fOdnkNvHWhg0XyJBv6fF2tEepm
6CS1z0RIO0jGViEw8e7Fyd3+dFTubiMMJ993PzzOZ/n+bGRWaC/dxN2qx2cP
90EACY9u7AqhyyM5idDZsq85tY7wWqVKocesMHlO6rZYgXbzCN15TPZ2v3R4
kJ9TAU6M360NqA3bISFeRUqq13OJdUhC8DAL1nRrMrY7qY/i1vr4xbDiougD
/E60Y9IPqFlvsQKyooAyFGpJ8m+xMQyI7rUg+THf4fjH/r8/2BvveeRY4kfV
FQz/YG9AygYnZWO6ALngEeH+4e6Tx58+GVB2dr4up1SII2JRwMLZ0yzpTpId
nSQrSE6Tbr/5uZYdPc57nxBdl8lQ55wyTpgkYXU5a83w+/19HQ25YEDpEOZE
1XQ97qR3gkS29586u/WudB1TQDfl3NxI4LwzCssutnCZ2PppXkfaVCqahmmj
H1CmFiuJCGzI8rvBgaApxTdlmwQVRZgx5X1f5tbqtjC6IenbH4Sp/MOb0uVa
5Ou31EEXg3WaEjbsQXcOkNBqFQOtaaMpF3hVjbQhP8Pg9omR+C1sC3VP0QAo
3epDs4MVxjWig8cayxC+kes9gJVCB+va9REyPt5jlKagUxcWWIetDqTp5tQI
9rdyvSYJCopHNUDn2WjTg52wAFVtL1NAtf675J9xQnswtrBk3D03kzuM9H3i
e4cxvL+Re0jdNsRwbCLNhnAgwRyBYyrE0sRFTLUEi95KqzQowMm0+DvkSVoU
GAwjD8G621js3PXuclpRbDfhEAe8JzwMf52xgZ/HxBX6q6AEf/xC4pt3qSFS
dByLp+adeCsxeI2aBBmsScOu2YawK5c5kiUqHMdFXv+Bqx75D5/J3ueH5Lx1
Dvuffw6bp/DfudBX/y34p1T1mBC0Fjo+0zonuAc9gAesdXzTjT8KY7AAirdt
aGxWhMl5K89oB4zgEtesKwY7lgTwIwiHoE/MyjZ28JacYY9hTZ9REdyscmv0
LZyNOqTk9fUO+yL5Q2fFebm0UHnkQoQCPtJ4DwdXGsZBE1ysCAzvYCTGsTOp
Ae784/AJRtJ6QgTqSZlgxg5t5c9ZYHhK/mVJl45uPM+vsdevUC41sAJTi4/w
Bf0OCfZ5pKceICmPo1Ck2K7cFbt1aAHziCXfMs1s9/kxnNgtYpMGNzQLVEga
TX2Yz4N7SMyh7gclocHCmqJa4VPsRWsKS/3klswoA4suuqlg7F5L7w/DyueO
UtpITPqJREiT78kahGN20xJszZ+yQ4TVKYdxNA325AaszDvgZ37YtSvzkyWy
uq/Y8a24N4NHzsxkhL349NuTU2mf2B8BjJAx17l0sBg/7O7Hp3sucDeCi0+T
DxTHkREexBH+8PrgT8AGB1dxXuVguCSL0BEexqexCSR1fxwYYZF/GGPrxh6E
6AfC23Qj+DaS3RGkz6ENJCM8HhwBVOT+HGSEcmpwlDTCl+4006NMT7N7lHGE
J/Hpb168fvbHo8PBEajnqYfVjCN8FZ+WFbiB4giygmQgGSHvjXB8+O7V0dEh
jtEboZyO2THl6OEsjvDq6E/v0uyAOALYjeM060FATz/ku9kY/nM2g6eRC23a
SRB63Y2UESY8wmxmqxgeoXsneITIgBNUIafAI9v9IntRznqZERYmcwEgijyK
OIcfo4GQJy6k9qpKY2vaKO03jY+Rp+jphOLTXhEq1FAFV0y0SdrnkTlh5VOx
jT1brBR32vhJZKjLyfVQyygbCMUMu4dck4gOrNgiv5Z+aRxzdknUx28ycgdi
g8NWG3botoyy6dq671lXuoxyirnd49DUrDMbTe25ZE/1JgSGn+V8kuLDHw/x
4/0s1TR4d0NTtaHKOWvBvXG/veo2cMTaJwaFbZKkmsREjKZ852ynULKWaK1n
6mIOgjiI2wUp0wbI8vO6KCQJME9y6roknyqd4ryJPvRuA0gGxpWMtKB+EVcb
Zk1RezCuCemxx4u6cLHfsuzAK5D/03JkYoGvy0ewoBV7LswTIX6DqISz4sNx
VYdCrjmMBGLOISZUnm7OxPG1CrZfdoM9wjDPApN08MxXea0pQZqQaThXlZ8Z
YWUowBH6VFKMluHyC4XJwuTkVavxOp+U1FqdXurnA0qrFh1CE2wqo4qhQv6e
/zM6c/vABIbs5DxzKUoVBe549j49RlJxb0KOoqC1S8y1BEw9tMCrWFKMyrYn
grelpeSaU12pP8kokuI3A/4j/g2q/1xIS6FKKbc+vaD0beGOrYtwpBBonWZi
y/4yN2ZZTaR5FyWRj1w7Ug6GUgwqBtwwUteCIl52otKOwi0jzGgvjTkPQbTd
SHfmS8YNLaauL11kHFsJdzAS4nQj75GW8UMyA7dovR/+FvdqgW6kp4FyoIYg
tQXvgAORtt6BNgiybTJhBgRNXtLZj/ozl6uhy+PrKJEITu8nPI5EKlqGZ3wx
0p6k0pgrxVgYO/MphZb6k6JV6RPMBuVYkj2cNHvvhhSkPqqTNk+7iZc6luFF
pw3lY0s+XVI9gB7qXvALiToCD/fPoZ8wOiArMicrdHDqUm3QFiovliFmu7pb
hPE0j4aM49wR6ygopBSz7huIcjCyI6fm+YZmnkbQJU7eTfIGb+gWPYDGxPHD
gSukPvr0jezOa4p1dtIJkrwQN0zOEso7SWqYGF0uyjn2ceumt8vQN174WOiS
z4Gap9c+5QDxWVrNXvoZB3SXD9N9jXDBphdwvXuIdPz9gFiQc441GGgm7wiU
KWaBWLqGe0niJnDNKVeem6fHLMqeDeIZdAosIe+LwOeA/3fEhazVqUbtOMXD
S1aOKlO+cgrbxg1mRwZtuVgjhJlm8tBs5sWgDIaVV3Cl56uI7EFNYfWrUnUQ
8X61kacJknSBFFW+op5UGsDfhGmU1rmAvgNn73SdVJijGdKmekZ+WZXTJJeW
tIfQ6+dFOs1/kIzQDlOzvLngK/BtdVVccnliqrtqALgJt95GAT/p9Tl326Wr
ChpO10K3s4Jakfsvl2kWpOfddIUFW4Hy0EO0dCOoys1El+GR8+bxR6WU3/Zd
mhpr33NBINxkw40ktbGzTiGcs8J1faf0n9l6OdGYniC4SiEeZ93ll2Ai9TWi
QOfDDk9HWSVl3KS2FieKr5piPa0kb8Q+ymoPuQOE7Wifch+P33Kd47lX6ICm
FHUNfHkFeiz3g+0grtUMBGS1gOEyr8ucjXmDXXT7YCS+5j7mkT8e/LmTGaWt
vLub38nZSFGxQ1NReb2zLgZUc7HTrMYCC3oSDofbc2q0960dwccvoj4qRT5s
cLNJDYrpGTm4J73RBnw2lCyPyHTl34rNfiJx2ohHiUwSLmwzXD1FCkwdRb4E
Xm947Fvc7za+t/NgAJYklhN/nRQhpH3k5U4RgbgCJDrviINwWyvz2PtrR/bW
0qdah8zH0JKw63iNRtwHFyUd/IRUSlgZSz0s2APja10vxQDa/H3+Cn0Th6dc
jzQRGUvbiw+sXY043y9gSPa3ruaw0eSe5NWRPRetci4yznuZv/osK8eOJmCO
6Ntr0EwH1jBh3XS9hH3Q6TX6Mvwdb84CuQkalRT+IZ7jUudcLTj+lPJHGHnA
OnlwxFm4jiSE0AecZkv5gFrK1RSg+E+u+5unWNZCqINcXV0vhcD4UC+F2JA6
PonpiL0vwFbNSmVwG8TsTXKjP6J/k2C+sny10i7ikWa38O7QJTp48eZV0Py/
Lx/s7kmhJgOjrGss5KHvWJMRZwwry7QQHZJwZgWkRJ59NG9skxCxNURBTdUD
dLiJEPDVm/EIVEJQTUfGSfJ5uej5kmT35PHu7vk0zduQ42K6pkLAiXNdVSbs
/Sx9VTTbTl0KsVqbQ9s09TgXyS3CqmX5QOgG5NPcNdIUGkUfIR86bHOxwNuS
24ypmM8SAFQOIySrPEz3TRGwLIE4lXiqy4kiZyjHxu4FGNUu/QjrDyor03S6
ITC7Je40Sjf4aTkB5b1s3ieZo0m59W16vJFzJ48BtMO9/QfS4CHJZdBOGF2v
HlaZoBHdaNanlcI08GYRegrQbVOCRWkZLiwCeyXgjRMQhfM6FiVr+0jDc+hE
mTvyTLIMo5R/YxwGvnibVkj8MnrWFzjjlH9MC7hHHLhQl3hZD7I+i5X7V7gR
OGIMrpclKYYkLTCugaAi+mmsW4v+fYqfR92aIHGu46XHFpd1KQXJGLvnSmQU
joTGohP6miPuKSS4lADJM/HAYxI4KuwXkrRpnTHJj2LInQN8X2pq7BziMWRc
YcS37+PHWXkOmud4WCQ4cI2owcQSZ6lQYSf1HGT4Wq+1tdt8gLP8+PGfjseH
O2XRzsbtvMH/23sQc+mybA0bDffh39blRJSqr0koFqADZR8lR0sY4btF/uEd
Ky3vkJ1v7W6PBp6gX+0N/kpeLqdb+/H3YOy+Q/joat1uPbAfw1YtkfDeRZrF
9x7aA1uPHz168Ggb//VpYLePp7wQ2XNdytCD8fS+lqeqVf6fa1H0f7e7s7P/
73uPx3u//3rTxwY/JX7ULdO2dxbN+TsM4W7bM1lG6AvC3N6BaT+vniaZce5k
nB/w3aUe1qZnddsv/am6L1pH6XfFB1DIyY7Y/GWzOXS85nf7uC1Pxg9/r3P4
9PXGPXb343cP7rCfzdfBdXnbdEs0EO5yY4DkB0bTNjs/2lKJSH+UDF+5zcBn
Ju/sO+/cd+y1tDWmgyZyQYOhi0+EhFcaOL3VJTGjwUSi1mDRNK2JHio2Mhm1
J/ixZgMjWpJo9Ym2jG1incwYh22pUB8RtWNYhKmfNI1pKE4Z51QNezhYEEQV
jJRi0uRUenbrlYO67jbh2hPEccFQ+kvBHlnDR0aDfR5URYsOwZuUZ3jSQOpc
/KGT7yAZzWytYWF7Uc+vbTtIzCtdNrHoVIhNCWlwu7gpkp1JGLQbxtM4fOzK
MCD+Xe4YaAIHN1Xa+MbPjo5os5nWpmGAvsG83CAisM0e2ufb1lJNlWoxfuF5
QrKnh6M0TpBz+uVSbCok73IOPPtODMd5ec34y9aEgL+qwtVJf2zoJysU3Cyr
yZcKOFLPOH8PNBiOMvF9crIalRWYJurp1NEPW2wsGCCxlwgm3QU25oJtu4JQ
DMxklEjAj6C6AyYNygI0uSkBHwhwyZpKVxrLKez1T+G/vP36Js5qUa25BeLG
g0gv0tD2G3llP2P793b3H/ozcJVuNFkYTD16YuwIVA29iPhe2siObVauFtc9
MabNZ4sEYqerdY9s4liS4FY/NXA7urMiJ8kGjk8YR699zM7g5Sqncqj7mw9V
rtjx4W0nm74AszNIV2HVmI/ED2OK9p3uyZ03LmY2Dl0Fgjv2u4UEcut+OZVS
tumB26YpGmvy21KQo9hFz0a6BiKaTSuVSvQsWWuREg6+/nh314bc2ttF5+ga
JBqBV6T10Ra0dXVcA5IB1jCsF8sqH8ZV6nNJHzjLbK4TyyeBFktSk9oK+ZiS
AcGIL8q2Q84M29RzXnfKOtnFyKM9Grdr9DwkrvakceoQ0GDCL/5W1Dg3BnhD
zQRRIWK97obF+QQ05+kW11NSisbMV6EAyjTAr+L2e3YEerXT2d0ONvXjFzjh
uk2svBCFqRe43WCzKi+Kmd9zZQnqYnBouOoxZm0D9c5XxdVJQeWVpyVnRmjj
A9fsJNxBCbbGvQhhIp5QA/BNfYFBfk3RoI5fSBoF6Y675I62FI/W61ZwYW5Q
Lbs9MPIp/P+2RAfmLaGwoJP2qVjsd3S9CTZ/FIMy+rEp4Qg2LUXDUaGWtloR
2Bmmsbq2VmS8LaJu83oVckehUnyIi8NpnFmDS0rO+MCHoG7wSyyDijscwho3
VzKuH9RDN2H/BP8A1UxaHTXi/rFW7itTzT0+fGaKEirrTymBqTZOJiZecaeY
4bQrj/5DHjrU/eYlhaGp/qMtuB2RC94Fzg1Cs6Cs5nk/3ZDuE46Q3qnU3LA+
MewdpZn6N1yFVOG3puczQdjTTWq0ub6bBSiBRYRW90zBkFHoaobEIZfkjmzY
smhoVbNhnaOH6cWRer9azlMEYj0jZ7xvTiKV1OKn452g+P8gkUiYHrVIdT4o
1wVWtsHPib/ZNJrvNWyeFE4ajOmx6DivagIwCR07iXNdbuQHBtcoU8ZxzqyT
cT70chaN/2nZMJg29SiRiFqc3AxMGAtVg1rlssKcY1DH3bl9M+riHEuzkHSA
bKt6KiEDIityTpDtWebLfJOXUsXgQMbF9zGIEfPNnZnNLpkNrEpN0rpIwUfF
LxITaoxFUleApqCK/Ao0+fKy6AQjkxyybhwtbOomY7qgdKIiW18iHTf5SiQv
77YQbWzA2Alg+qQml+7RyWO6KZ9kQ6wRaRKzZBRFZ1FNCXvrpkij6oSs0mkb
IaEjEiuSjOpyEaNacVXpGarAG1ZtfytAVV0np7rUk2RY7AYxk9qJiJPCgkXb
mmSxhH7KVDC3NPQERqtKu7ezBWtNJmEcxnX4Ft2zXuJ2gUAG5p7CuAKtTi5E
CXY5+uTM08lwyoDgzmoFSFfl5mzvwEkU774/enuCBU2vjv7w+vT4gIqbXh6f
vDw4ffatQ4rb0T3uOIcHN7j1R6nYjhK+ZCZKiQ3dPOApGCPEATn35YZc735O
/Yh2pmwsu6h3bP0N9iJJw8uY8C2dApVyOWKKgcrZeq4JZam2d1FdhaHpIqXF
y0/NrsWL6I1o20t2G3Rn5SjAR037ef0upT/bKneKnRECyhlaDI+5rY3Zos6l
nWz1ONS2z5fTAT7SqPOXctRGujfuE7Q3ovjZhYnJ8uYUihQU52IGTP+4kk8F
r0pQA1qTpJycxehMlPd1EyVpbus09LORLVioluC0e2KscJpWFL8cVO1MLkfX
Wd49f8XHYA7Dm9JE+FxT0ob2pqvP3nb973j5DQVPoMRvKVix7ac7LDC4lhHZ
3/5BqKNyKGiklrx6SAKqxIX0MyFsnjsyj34jFncnhXkNC5LO8YX+JHlX8BjH
OK3bWcJYty0kVCsyKZ2Kq1xIU6mTow69o/5ZfF5U7TCwA+abwm3ukvKGvcC5
huG5/tcmN8hmrbkflsx1OYDsZd6HPwoJOqczgTYvhxMlUgSuklBwus1EO44B
rZXKLbx6x/ZxmioXtIZKAIYVD1cKqTbWaGkT1F5+ECLiDWUwkTuCHNwzdvoO
52JOqiYFaiZCtlxqVyalwYwUWKtXEuYJ17VCVO/m39P/1pyAXKWViwSMNZM1
N0BJsqwF7n85TZohdJip5mQRMXfcUpzbxCnyPnmd6Eu7otxsB/RRsIm9WfrV
jZsyUNhiQO3dmlXYoDXlNXYbePZT1nydXdiI9WK89niJLsTR7WfIrU96+BzI
jEh5pmffouuoMQdk7I6GEbVZdlKtsS3pgRD76yugRlDXVnA/B0g98aGKqcwV
dYzxvWJRUiMUDWbbrVjRMGejUVB1xVERRz1639IEc5WRlFbYcDZyObvuj4jQ
gt0cxkYd3W3MS+x/UGzBJiKhrmBz8H5pYzqf/w5W2SLHGCNClEpRCQlIVOuL
ycWy/M91PBSwXhd5Xc6vY1UGmR/EqGJ9cCaOGfTOB8QtjUYi23/sCSOIVrMJ
R1HvKuNao2qFtaW0FAzF8jEPJfTzDkcUFtAEMMtrkWpqIfIpSovropr2ro4L
b0iSqjNkQ6esQ4FNOeOOfHAVJQWTmKHpsBPORNVZhBDGN0PFcXOgKziME1Ty
MdRWAMecOoc5zJGtP8ydb8tz1gAIs1Z2+TmmP6LjzmmboXv7yUNBDT1oxxUT
am//yW4nSt2XL8G6wpKPsBvQNSZfNnRtkPWy4MqG6CLIPlHAjJrFkI2FSD9y
1p4novKHUVfKnKCU56Zzi5IiQ9xQE61aA7QxET+p/bU8lRTmEa3MZQxCjYJU
MQ9U+sTmU7EeB0ddcx4eNaBifTrGJkMSmySxrM2ICOHBohc9HGOX70wXiaMZ
6XhkuFcV071PQxBEWwQzWiBnySVKRI5aSfdn9VdyeWlCuECpCSePvk8Q5yvA
/AA0Xr73PQ0h1MLbx/3LJ9eIHSumcxbolObfdHAQdgh7nmkzYn5xpoJ64DpB
4JvaT8dmZ8WS0IvpJPtmQ0ccJPnkju3DlU4ZmEvaZneKeHWjnSDxKFp1ooZx
a4ck3vnixBeL4A6iWOPGXazW0o/FJ8w4E6AJA69O5xG/rqGNjhM7ZiX7Droq
fJ0T9w0qv7CEQnLPONpUvS+WY1bB+xtBbvRrirUP3iNL8oq3XQahQr1kA3xI
JufvkieTy5xzEd34Yxc5AB6Igu58zdUC6hilSZvnlaCj036ayCaxgJ20Siy4
EfLAF21qRWyP55Rn3/yGDw5nahnYdL8jhOctaezDVsQIyYOxJPS60afpWDhz
GzPuSnZHnCHvdtE+wSdIuhoEL325TFiIkL6i/MDqiUjH5M02Z6xLznP1d4q/
1jUdRgLRki9pqlNmH2dK165oIJDAwlnFyRMf1bUP0B25qegDPLigCW16foDa
hkvPuuR3epGiDpDg5n1Bvo35gWt393ygMCovRiUj0ImYcbCBTlxKcJlFI78C
JXqsuYMCHAvCVOhe6tWkvt8dKRMBnwrrnJ1yStFwA2m4qMXhnQUetVgxmCRF
pIiCkPsI+m193YNFdg3kaPYhZbGy0LQQ+pZQSWndm0ot+SqWGOCB6+N4XWye
EjzXdk8IvVZZQp0HoCmdA2VidVkCKWJF1MFH7nkQ0jww/u8RK7x16XNme4tz
9FR8AFY8aR0RsHzKm/dSvpdr5RBxUbvHcSubEBE3tEaQxa67Y6LUDF0wwrei
gm2+YwpgwsWs8THpEW0+UVULB3Z6jGPSVSEbjMLw6Hv2TxAwUqdunR6MmoKC
aGReo7QM3qDaZJadmJ5nCkG1vI23al7m/DrY1eeuel1VINFAVTnrNzYj+Tkg
OOF/JfEGUQPWCwrsdjIslMMqJICC+WwkY9ElqmXiK/S5l2th77lHvU+UjIMh
zSUM6o4us0gVYzu8VYX8T3t/MZKR6+gTuvmhlascTXXETgZK9PWRVwFPRkhe
u0/QPcRA5oK7VH23nJfvi+Qycaxc839l2/KOboilSaqSN9WC0wMNtcywBuzG
6XDIGnu/TbNjKMHIXDM82VU8yNCFbFhikVwprRRwGninWSPBKsA1rZC6J6VE
iicVYnsODe2QgL+qBtutNV/b0atmguyhbHxBgn2PKxDtppmDQVUu/LXpALfU
wvWyX8PGokGtE+fzoT2IgA1L6Vw+1c2fBd9Lik5xlVMwUJNwU7nH9c+cj4My
DqslY0aAQ+rbHmLkN0sp3gzZ2uD116gXEr9GPSshoK5fXhLE1GmHJEV5M46Y
cm1DP4rYNM7Syjem/93AuE5pPseWofDxi67mTHmsG3mUBt+R9jBbijQ40sVp
3Yr9J22BQrEkJCffO8Q2gKWuulmcuU5yhNQuxoG2dE7DtOPorlK4DBsli3OY
HSTmTDO5gHfVXZJ6hqrZjADyzXff7Sgbks1INY7nWkMtICrw+6uqfj9yK9Wd
o2RAVqkHE0XUPZjmcNTZDO5J/AGoRrrILPsTi+3B8UZ9P6IolXblYHA6wSTH
D+esuCDmClM9IdF9qYRo7n/i2hNpy/HAjq6B9SJoAfkl6YvmmE7s9B4ZYn4H
8BjYhzUC60x9SDj1OQYcS+czMh9He1H4q0aoAG2vfzKDIsd5BzdvYY/TAnRN
YVc38ke1ykfsaeKeglMEU196pAP2hw7uFLf4uuFrwUlAss50kFlezjHNTOxL
AlnCEiBl2ZsmHeTFmyeV+COQsYuSynXuqp56ncYasOiAnCgwowpqH388ODx8
e3Ry8u77gxfHhxx+fH5w/OK7t0chSYHptDt+qUwe+Ftk+H9/x+OIl4tdL1LJ
S41qmbH4L6DneF1fYrxABVPCPGA4ttPuCyatp1HMxibNbBovPCUlm4dPQHhI
AcN2t0vQb4DxwFzd3G0LoqPYh9i45QCyvQsq6GPuJ+kIPmotWtE18KZLDIDT
p2KplOYg8Pteb70gJ3sVNBVaVwhMC/vWcOkkm/JWycjKQWwjKjiREtGr0A90
Ha7ya1kDR6QWKvre1OVlPrnOjhfm7iRr/jYiGc/L5XsBugCC+U7wfRpGTExP
u4pNGHQzQDNpL6I/PqCigkdfnUVBQ6hgcxIwmNKI5B+xdCsqcocxXDIBOxcW
5J3SJ3XzHRaienq1dzyQsX4g2DelhOM6Q5pv1QFAQQ/DGiKlqAerHTTO6OvA
fDt772RekpKJO9ndteASxScKwGiKlDrjEYafDbnsDPS395k7luAhrQVVgHJv
+AQoYnEhMPyWj8E0FT/QGxW0TmTqCrll+0tgfBo06GONAxGj/4YRqKS/VafD
nBbrqiYvNTQfQEXmVEcMqQAfngi8K2kzHIPgMqUO3FHSfW58nq8QWeBNAmEJ
P2TeNlkvqOcd9qKP9MQ007zHwKk/m2akiRrEuj2MFjpGMHIg2ZNONVr1v1wu
zbuvzK73VOhoV10PBuxtkoHNiEt2nkL20gaLAgoOa7F7LT3QrfbehEsQQUP7
6JGnVRdGrANYbOSdT+oKdBSCvGD/RGO8ftQvipF+5r0NofMSG1grix07x7CJ
BQkSgEDWem3JfRpVj/NOoHLs/gMYOMvr93oSrr7cYMwSSWhtrIKGO3F7COQK
/8F3rdVuGdpctJeT0semVmsonU1/A0WOkFHb2UnpJqPBI6P/gQ2XkL020O21
2zvouLIEfXq4211uZRw0NLYiTYqJpF9oSY3aJoU7PyZlY50DEwWq+rJrjYBw
6e1LD8C34+HK9nZTvJFLNAtCMoZDDZad6YKY9o8Db2CbM5z+3pOd2AfZLvbw
HRjoG7z3Jaed0k4T+wucv4DFepL3+MUX3fbs2R+AoaDhwDRo0Vy6o+fsDxrY
VzXJIi8OmFGK4GXnaxAVjEeGrIEN2J2Bluk4DrvzXS0wrI+W3rlHjC8gjB1R
chQ2go8seTb4Tq2uUPqsPB+jTzxfGky7ZKcuZWwYUPolwa5k/5J9+8fD5+Oj
Dyt4bPwiPyvmW7yCd/yhd2z7jBKcEP/nnodUslnCuu+N7J+j7OE2fZLc/sBo
EYwRjrP3bQVFqoH6DJAyrsnAOe8NzfEem0A1kbSxbDTwEuS70G+i4GA9FEvn
0c7jG/wkeKSsIMIQkfk1sMDXh6+fZhh1LJsGJPUXe4/3egbIqevH/vEL38Ih
BDeaXjRu40jV/oLPTNzzDNjcQoqbmcZg18Yu8xssr7JisBP2Kva6JGBf9m6f
DFHgXCcK/PayYOmF5TkIEAg0tLeTHYkilp1crNtpdbV8mrSBVt/whs72VGps
VeZpPwy3KZ3e0liZLukr0uzHj0ZXGSuXLWFg4PME2uoxHjvaBRrCBO9TVZ29
oE1MPosOnXxuZht9W1pCXrOGXQhSEIE4kI3tMcHPLDqMm3+21tJWal8uAQ35
IMfYqjbdtWXSIE2/Q35qeV6T+gUcI7PWCPIwlnRkr5M91y/zAvTB0dBmSucS
aWKO2VpLhpO6GxFwouV66ejN1lAXbge3wKp7fvwqk3bWrtmUNOiKXckbMYRN
wOH1wGZ51Kel9geybbXNCnyA0My+tScdh55eUUtnCUos4l3mIvcsP1six0WV
3dFLCPs7YmYm1wQZ4bSY5eRr6cETGASaL2vHjzgidZnUHTQCGCJCD5jUdzFm
0hppzmpiav3ZdF0n5++nNupeEwJarDja8Q3CNNiKNp+2lPlYy/umJIwIGkcq
ILXIjIgIhezUoq8l62NLspqtEfnSDEIeJ/pIqCkPjWSqPlvLeMhX6Hdbr9jZ
l0/LCg7rwU52cFavV5s4mmM+SdtxbTLClww3jLYjZoB41oZpD/gNTyncR4Eu
Wxqxk+/gcMmnROukcKvG/hi/GUvkSAde11QY90wyYylV0waT3Omo4Gq8h+1h
jEgb8uKS9jgKiZQIeDS5aR0ICAtg0EFqx1incIl3PCq+5YwIM+qoZ1WFKYDl
1PXqoouHR90M5D533fM4HoemV6QFmXx1ulHf2OBFd16hpjfIPC5itcwwJZQK
3AsL3GKlQCvI28KAwDBFmaYn+80D8dHIN/SybKtu4RUEyxd03FPgUiUtNDs9
fnn07k8Hx6dS5NK6WAmln+Sc33jWVPWZhDfq/Px8nmbVspqu5uYhaOBrUIls
8CBlFl8kTYap6TC3dQLrrqd2aZ/fEWzdOZbW2wfVbHI8W7j8TvgTTKS6srEk
xlNTCEPSmmM3Su9mdMAeuX7R+oAj/0Q/jpnorm+qjs4DS38N6k3f7QUVXOC9
kUPS4hOWVbw90n1Zu7+FkEqymKgQu6IItA/OhzPs5QexPUKrXS0Da4N+zIgC
hLExog5qlslXoGzEWhCd+8e9veeHr1+fnPyoNda2WhBIwmkYtyZW8Uqj+auK
HyYWS8RLfuS9vaTRq0hWzl1Np0olqz8+/1Fj2iLzXZTTktVlC7yuqLP58fDH
jG0jRYPRRJo8O8SkhBcEI6MdvxtPHfhVnhHBSeFxYxjtgjQLWs3uiCev/cJ7
iDMnPDP6Ej2EkEgIpzI1TRF5R5L+2/nG3g3fgNH6i0iAnhglJ9tCm/AaEYj0
W72ZofZHZpnmKETAHxlEOFEiaiwHIiajY23yPcy8HmNq8/ReTLz36dOYU84J
0zXKQKpQK/NMOozG83v9+kcmJAeMKPORlbyezXCrtN8N7QHQJZzN3uMR2MZo
s1YYrOFxMGs0Dg+0fcvwJ4al1f3CE/7C/kP5woN9Goo8WMmlK7W7OZi21dU/
XDvzHzwNbu093v4r//ynz9XFOx7J1pP7e4/v7z+8/2B/qJX3Z+0kLnS3tYtT
eLB///HDwW7in7mbub/HG/uZ/7ItoQWgTRCRBYo1kWss7BV8dVgAURqoYZ5Z
B29HS4RodrCMgCiMvhbR2MRfJu0PVcUevL44LNxSZaLMUhNxI/HJniAwDmei
pBHWDOPtYTWAUqMhsEX4Pa1H5R9IFroHuIP3mY54sRk3HZkXzDtvWyr1rq6Y
DrWSlz+F2RnsBeGEyuEVWwc5GUO2rmxYssWx4QcqH1i+S5tu/8kLxsqTV2Dl
u2KPUpIPlcfQb6S9BSnknKXI7495MDBcZddqavbM2MqY0civo6JCa5LJji3M
gJhwXK6xzPb//fHDeDZ4+nY6JAejY5BzcZzDQQwgm2afn9MHyc0g2bXLajlG
lLdkYmJKq6+iMcke9Meoelm5nFhXixWY4f5r6UF4rYR/bwi3qCSfk5roQKLm
WAtGs+I+5wbLaV1I4i5pcOgDedIxLeeiLMSYI2/svODmAqmWSjup7wZDKUUM
Yq+3O/9wIyY/JbZ7vzFlGlOujipeQ9+I/qqAHhVOSWdfSNUWT7PXSyuoOiuW
xUwwQxVVn3SQXHCRUaaPqxkG9ItAXagp6sfBut4H5caYcTjHp6h8vRmxXhT9
e+1FiFcvj64B2Arpdp1d5SVpwaynY3pCvmwWZaNdUwmpiQ3qkVQiSyq+fAUt
GnMiLvL3jFsIFjBn2r2q1LFJTMxKrUJ3YdTgSnKkFDy6dzojWe7Mr4f3jBFX
OC9Bh+Qj683pgHFx3aH5mqmQTy9LKSAWQkATo7iKzkBMAUY3KRchYBThvIr9
XWMMd079JkKyp4VkD04oH2SNvtVZOZ/H5G4x0rDXd2qhYYfvEN7yadQNm/z4
mBAouZKpVJ9dto2YKTEKWFwzy/DN94Jz+bocgfRVrScRvGlaC+U8IzOzKQQT
rJr4sEescv/RY3qIzwkPwP7BXRY42wgL0SbvwaCGzTi3KGfDlXicne9eJNOl
aoS4aFnoX74uWna8ejdQdGNzMZ78zuKlWAbxXpbsNjR6cf28OvjfCEoe4A7Y
eySEem/5yB51jXS/bHQeXDgWkq9RliXxf5t1BI6aW92Jn7c527X+Ow64oLRK
lMy0BGOFJ4qKS1AYecPKjkELY4xpEEAaA1gMkxjRb+jzPiXBrYe/j4ceW71R
ao7upmZRjULeAalVD9fxqz/IxylgtIINwcR9dMFqt7JlZ8WehGwXBUBBEEOl
AjbuIufLy7P4fasPCTEI7OjRNV11R0UlZhXLOoKa6aV3hHSqOCoejZ+IBadt
G3lAzo71lcJI4oHYijKokhoPCwdqub5AoCRF82LHhzE07dHHC9AKAXeEAmre
q0khaM62WrlnHU+M5FGqsU5eOimaOH32JjuBNTeSkdnhEC47QvykUiFQ1nVx
WU2o/ChIH1WRchuuoQf8UVisfLUq8pq9cVwWhhMIovuwvs1xGHVN+zG1H4K7
gTHXwkrZ1AnHp7mmpI79R4/iA8DoTu3vEm5ARirA2ai+UkQChq4xOZdqmOpC
LroEaWaUaUrNPAOJSklAuWbvWjWfug/S63PNp+YGcE0l68Vhz9c5EE6LpXQM
ExZXo9GTYTabXgKhIb7AIY5RfMip5yjdY+tR0E0Fkb3kzEslZG7xLH5Y/y3j
FG6ZODSqx53Xo8D176MmayhQbpBymbSC9e0jJUKKny6pHLOUbnSUuJZkYYiU
brkBHeY21ljfRwpPmnrsfFUVZVOtl5jvMelyUwE+kL5HNhdMBuRIVjdSNhM0
cdfPKiZ9JHQtxpZ2HSKbIYo55GiGno3omB/QXKWkHbm5wMpEU9Dt+pq2ZIVs
r7MtXY3hEQ5eKJKm1cjxvXnC/jLso2StMnUrES2gWMAg6qWNwYt8CtcEmf5g
EUPThrtttGCHqotbVOe4MT/Hvx1+3Nvde/XixcuXP1rjqrs7uCkFYtDFvbu3
2cXtdJXohHy1yUdNPhLTaxbcmSTHgyK1rae1WY9DBRD0A+GHv0HisOQW17vm
FZjd3zDlkAdk22aHnvwfX7y4zU36Qoz8A68/mat0b5SRH/Yh1W8/Fhs8ccXS
d+AobvlOXIV3eje3fuRgmV6ff0iH7A/xGLeebP8VnYbwk9OTDP6VfSaH7ODB
s1/2wf79h08Sl+Qv7AzFEz0s5vk1uZ3tK5/N8Txwh4Z9rp/T6WuKyn/LHNTp
C3yl4/GNRnLq7k0Rf+Olo4C0Z6eO52xVq3a75+99krp7Oee94wKN9oDLfkIF
MlNJuHVWNAbvYMoaYSvF89w2F2nkz1KxJo5gbPrBLOg3r37DrjvxBqMTGNcS
NUhdiU2dVzLsxG2rFqYc1/G7RDoTMq4O/Hvg72Vte9ujBJjI0HW8xbfM+1oX
slDzo8tIqZ7SEioypUglKotk37YOqW8LxDRC+ErVn45nwVEaBARbwI55ZA5h
cD2vMcfBbnZsa4IlveRUMo+8jpjY7OqsolqLCPwqE98spkaEZZKq1GUjiXyV
flQI5EpmzeUjXaZAc36mwtU7QaNy1lHBWF1yqWsOwCrEvJpRJr1r4TbSWGOx
bAiRvUcP6UTIQ60zcdo1nDxoXtZ5piQXfU7AF11DE4MAJwylo+8nM+BE2R6T
/PhFf8LMLG5QSlQrxf1TT9am/Qs37Z+twiCSu9oOw/40VFaMjh320KccwgVH
khwB8t9LmlbatsR9JnSj99j9ddHJ2ZTFMYPMhqbAKk+QeP0/itaSzml4zZ9f
o/gB8+D3UFP6K2gQMvoPcR57QzP562eYw/7mOex/7jkMKhyfZ6tfbV7mq8+9
TK/UMFfqqzYJV9qs26TMC3Qc4LnDJNxTClLBCjxX2734JB+v4VCo53yN1TiZ
ZxzWpKHg4JUTbVRxQz9tN5ppwEnwQE6r7FXxoZU5o0Y2QtFAeCfbvckP6zJD
c+36ITgElfWSn6TQKLofDWStdX0vljBF6lfOE8vuvaJWhMxm77FYS2SyktIt
6/n7DuNOJzCTpi+Dqz7PVyhck3X1VsWNPnv6/8cv+tKY6bX/bE+8klagfp9F
kWPoYKGwZhLk01gGfSajGmHJvOYgK2h/Sw9qFzOXf6VCCrjQD4d0xi8OiA99
NpPxB2YG8SC2HuxrglTnzy8yh7isPXYB/ICfzk5K9PO+UWrb0zyt/8I3/Tf2
b/jG/t/zjV9SBPkJv7phwq/+ngmrSIk3MRUpvZs4LFL6F5ZFiixg0NdyF9t5
iL11eDf/UNiC8OdBC0v7XLAjVIs4OR5s0y+FGZLxIk28CDiFMxiuqnraWGZr
3TMzpZrIFbjDQFuD6x9nmzcHTcneBRzcL6mhvNnZQDYo71OJgBmYJsJdPtFM
t5SiGxii8kwEaIJPpJm/zmA9Q6vvhnUNUAS8tbez82pQ0rnUtovcYYQ16K1v
ywlHEIVi4YF7mz99ry+mXOhsnO1FcTV0yeI54GQ3SOWNGX/9U4knYttvJcuR
9CJhGqiadnjVJDbcjrgBqt6RD+JnrPiiGIg6YlGEeUVIlq5ab4BTPbL4HGye
QUqYaRPZwwaHfnzy7LuTk3cHrw7fvT168+Lg2dHT7E1RXyCgAgHA8o3idTSU
aVO7eelvfEW+89CdIWILZeJ3Nx5Rr6RSe28vWJ2VhoKIipomJzJ6FCNE+hz8
Bcx4NK+7Z1cug79HEvfCb8tUS3Thw6/nCCiDyEZT0aSOj46Osi8fPZTSoeID
YpKD5b3nB2R4NjHYOZ6z+2FvZP6WRsrGaHY4ZVSHRll8oeR0vUfZRXl+IZXj
uDyOKNm6sSg9fY32dm8vQ1s+vrYTLOeytzk41ySBj+fiO4njJMY82t4+nAU2
I8ZP+yC5fFqn1t2enM9SQFS5Z8ruhye7u7IboT8vXpxLUPKldn4Ldq1ydWmj
aSQxefDh7lePQdrKEvoh/r1tRqksNZzLuUPSp9tvGPxlHNM+B/fV6ru6ns4m
0Dw69HcQe4VKVwHXclPepBA2x+AoRWIOm8uYt7sfnsMf7wp7HiuIBI7gjYVA
2VDRHLJOvk7Wi3hHeDgP8OdgMYJSdGy7jbhtQlTz4rKYO+eZwxML4U0Xez5+
na89QXS+L67jLBKtoIzNAmkm5O5H0MaN41D8voPpgdH/+AJVORHqOgXk3dZ0
QSHok+jAbQxrsbdIHZ9w4jgVsZ9VwCNpD8CB5K0bTiUCUpTcAQK96XXRXve2
V1FiuCjaYaz2Jz242YK0bX29bCpxctjsPm6169INNt5Ao78mSG0mt/fD3zX9
5LUyAQ7ZhAdn4OVcFwcSFNO3a0LmStJSTfBSfpeAjymAUMWqImfRKo6U+3qy
VGK2nrK+6+eLdDHTrNsjvz7Y2Cn0IdlHERA5Jf+hFBVEprWfalYl7cvleo5J
eLLlKW4jOekjsGM6imV1ST1jqpsTKD7Tf49OmVt0ftxpST+Qc9apxqROILed
vJWKfmg3XTLL2hshDBh1gjH8fayu8FNQyDNbx5wY2u1Uf6CogncEhwYBVuHe
FZbkO3Cq4fadcAD+5M7nqQ3NN/j53nISOPGB+QglCxpBuGF5wyQwMmhnza1F
fhAT0AwvzoA6ZZP73Epu3wYQoyTvNidMFtdfNWYnRhoRRkxrwse5BxU9/rW2
reGSdtcRMBUU+FqvBVVIv+UO1GDXO7Mz0H/BfJAiF0H2Hzj4rc58MWWIcG5h
+57Dt7CCfjuiTyeJPJSWG6GyB1hZPDHCXyhqynmMXFUkQ2xngf0QVpoLZFcf
s90t0zhNeV/kH8bIe8VPYU+xrYDB3eJfdj/sPty2WlyYwAzVXUmTdEnxFu6V
TDaFqOgihLsy7ViqkrZsQ8K5uqjm2j3AMnqS3IJfpdfx5zuuNrjB7vrnp/DP
m371Uk6ACwc31C5m2S8yh797HwwzKnWWdUiyl2Di1yg5EALZanZtxMxyCXt3
oU8J/yuFsqaXQkSgRiCG8N7u/kPfjYuUXQ4SC4558KAuY9bUuZqMUt8J0ooL
3FmUSAmPuabUncEmDrmP8KMo3ecyksas0/KtCa7QOi2Q+4A+6VLfiw+IG8TC
k9UxBEPmojEt8nN1e+o0tOQBLl4jaDisE9JSnnEoDQqcAWQiwBCakfBZ+a1+
S4v9sJUiTqpwZl2IKHpc1aBpxR3cqE4f0wRtyjfXff7iNSEgnr59/eLd26Nn
R8ffHx2+O339+t3L7559y3TH6MKc0G7QIa5vnNiNQcmJfuobkHOmPCceiBIU
0RAEghlTmwQpUvNYVFWlg7K27+guqNtu0/fI430FSZ/VS1Vqh+P3q06M8T+6
C+Pn4hJBvPw5bD+P5Yn/Y7m8q3Mfrm//5TjsZ5I0yoGTKvVhYfOrlzQDBVhd
gXP3UnD1d+TkHiOH/sBefWah5TDNeVqp0BJ5FdhlSXICP5W2xIziwteMgaHA
YkUBxUQmhI5MSCdppdAOsk3bSzEzyLIXVINaw0DkBuW2lF2nxgYJlJSbC78R
31gwHx+nY2pNGk0unQw61nU2bw0oOBGqIeJtE96zIlhvmJfwuCik/TyHBJ6O
oyfuMIAGhWHrqsp+BeLwpul35aJRkN4UI1WWl+EO8jL7u+Ql3N2N0rKc9mUl
PN+RlI+3RRw23hBK7qzxiaBEzLDI3J9LYNkQhex/qjzscMebZOJ/jxywY95o
djhp8NRJAD1yJIOx4ndOnaRQik/SaITvZRv5Xj44OeFysT4Y416Bym/xyqBn
yvCztMhWGKHrgaYRVZ9LGwY+p3nM06rP+3qUbrgdINQqxdmgu2Esz2HCymsC
9o1xsDhxRoHnWTM/B0nT/16ZNnT7mYwwSLMRYnkHr/787vWbo1eyASeR9eXi
P5OZNxumHjpT/y9aAsrZwt052zcvXj/741GXpwkkxSdXUqmArfpCh6k92TY4
ztgwgTymyMelR4CPKkwZ6LZn5SaWgyxAkTio/ZZMQLFAfJc7SvJHFGlMq1hr
ykUyYj4/r2rY+kWjzb1mk/EEWym0vCl4y9M1Wm1yLCVe5dfY9ykB8Xs3vJUi
Gm7Y0c7rnY396uaNDbyxWW9j5bv9TTVoI5MZy3xenWM2RlsFncWWADHaxG1z
Bqf7P0j04J//RlPMRM/gvruaTYFoIQnVMz4OehlNWmicGg3KnBRUMbk7Qgqd
EJEDhBicovStdYYOq65N4guJDBA1c4froTxgSNmSbnzoDZM7GgiaNa5EGE9X
3RIRuTQkGar24UYalrQQEkGIQo+TOTigUiSIyOadcPzg+PDdq6Ojw00coZyO
+YM38IQ4RIcr5ENcgdaeh2TlA5xhWPzSKtMr3v36rYzQoW+nS66bNqKadpGT
uYloF7k7rnVvexM4crBtP6AcIAVg8aOllugEFZAmS2CA4AhTH2jFST49eziF
UoDX3JwJXUR6fWAhj7deQj6H16fXN1iOQ/j4bvS0P2pIfmfqgd1e6hHKXxQk
bj7W3hb/D+PaR6SVPcNK8pvY9md1oP1/34mXYVEWZmMq4uXGaNGv1InHKdRH
1gowFZCxRaBKQYfDcN25ZlzgYZes7/CTQeOpp34/fj9pDMB7W3kUyDs6/BCs
e75uUxxI+R7XmISM+dJVjU6EZQf6T11Djk0IhAxz9zcHh4eI+JSydoHoFceH
PtNh4bvbZM8sK0sxZscUcL7kjUSdDxQ3cDajeuE02wvflr5N3grwr1FHS7aJ
tD+ypBOIHITfohy0QnD8BgFGuM50fYwSxJFDuBPSna+bckMqGNmw6ZbINqAE
5WYHFv3LO09Kw8jGSIb0u0BuWJEsKqAEPlVhwDoj6fHFoe3s+OCORPLw7qM4
fuNOxA7xS5LDIPrKWWw7XdaSHYN+j6bFFin5nLoXct9C6tFZI5qQ9sxzLVEY
ofxNsmZWZ5dVcBVtfHH5aS9/EwgySm++JiWulx+I2lw/t6M1M6g3Ecm2cST1
vihWacMmXqeA9EeeQG65tJNHtNmSGXPi8t6jINmmuCQgw6KZYHskxFJ60yOc
/q7w6fYbtKXXFFRd1ymBPZXWq0w1jv4g7hY4JxD7LubUAIsasaQdAZMInu5f
v3ki7VxsR+paMATR+Yc7bJolOtiU7h9YoTnRPloJvMmvXVlI2wBuVhd+zcqC
7rwIZCmH6Hc8JFtUqlKw0LPBQttdRpsSkdRQUmLs1ph077EGlo1eu37fbIoj
6pel8Sdctas6X30tdVr808ePHj14xChXMedwV9EG8flVr4+cYF+0FxwcrA2H
LQGRlA9YRogUD8kYhvaXYJtmPeTOyFAsmW5oI7AbLqk9sW8ONmCIOYxJtQAn
JsbJAEulfdjxPdSiV0RUq7QjonRmG+5VpAzVMVPS/zqG7S39rUyo7pNQBaMa
har5PCjrvJPq1lU3XQcnlL1k/GsujQGxLn/DGKzBNcfl90cxquQbi3DijWGq
DPZ1ClvH04LLMDrd1q58cxqmj2LJWY6lds7yOT/wddDyagTmvFrubAvK3f9v
m3522/QtsCI40zcXNWrJrllDZhAMP6TPbP2W65R/OcgFz2ZJmdtwV3oRtbhX
dzbdOORN6yFcToaDzgS71QXWhjYm5fo/q9+AfHNFw0mxAzHp/IZ2aMDOGX4Y
xp5jWZ3U5sfChYrTgLE12ATHQ4+TxHwqfY7NJQIHpcIbA82FUXNEZ73Myzl3
KxXAcZwqohfwZDt7IZtwsQb7bYzOJXoV2Uq+jO0v1UT20bLcNYSzshPKPiGw
AQXS0VoS8oNOLirq48W8MTtHTXuKTefnyAWvK6ngipTA/QjKxmnuefbd6fPx
E8uFBKaDh/Tx4z+9ff7sweP9rxSjSHlYqjGfV/lVft1h62tqLpYyPePlD7bZ
9rQoJWivk2K2Bn4nbeOIzp22LIKvMAOs1wiSnKPWMzLNiCQf9U0tIeNc8IRj
u8eBzpC8qYErK6zwWOaXLPd/DGPWcmfO+r/Fc/eZdHCdw4k0lf7scxhkzMn5
s0a8aXPM80WB7UZbzlMLWXq0n+NQue7fqQLFgAFtlwKlzQbpGBxd9ili1BFE
u3UowPYBtW7lYPvtU0Knh7plqunUXrD2oKS4ZF5x4u58ZxEE3qakgsEvwSHz
dU/2hg1kffxXtYEbpuQ3EMNmn2UHOy13O/3WiM9h8aAU0WHZYU1stCIUvrQ3
h2SQGDI0548kvNBSkvNZIUjuGBrSypultHtBLEDtKj2YVEK4wGakdfBy5TrB
0pkuoktZ0c6xLU9OzWi5Bl3QCbrU0qONsg3dY7/l1A2cwu0iujirCeZ0o4VC
0hDTYAZCwizBMamIq6bVQaY+S80MjOHLnIDuSBlxuP5m0tDyufGhaRII3ED6
F8FKKnQ6O2OTfCprRHNFBpPVMFIYF8hr6XqKTNSIwaQahkD8GuQwBxZ5NRoa
lmnSzLWO1E1Yq8N2qM+8Sl2nJPCYw2pCUj0ilM6lpoFLNxZg8uLiCJRU2lrH
COim7to+sxZ9xSFmE2FJyUTmNMsx75U0atjsb9N77+3M3j3RWrrkck44H0uy
z+jmkO4lNfDl33Jr4PoWiFBdhB+/WPnfa5AhB31R0+pOfSj3O9jWbOvN6cvv
trVRpEW6JXjgynOO3wRu4jfKvjt8k+nfcRL4b41tEzd2P8i4TkWsCm6Jww10
dQQfCKBXeFBiSWvchlbvk/lwsSzH90Ryeizjs2JVcMk2tWwwdiFYEGd68/L0
u4hRD8uCTT+PLXUqLY3NpnW1Qj96RZgqC9ySM5jZVTlFS93a4YyiRqpdJygq
kJzVC2Ko9Gls/EqtDTBtCLXrh0/29z592qZVI83S2/Bk6D25t/fVHvZ6lX99
9YTewwscqREXi2+juGmTnwTgTbCkmq/BSBtfWH/lSNuGrEYT1uKpXHuxHi81
hKZeo5Yq3hcFcvKyWWg3jKiqy8ZgYiK59o/fWEGwB4rY23+ya7VeB+iosgR9
iT0dK+lJ8ImMUp455rNJpmFi1WEN2f6DfRmXtuv4zeVjWv/e/qPuLx5qX4w4
e+YD2nqJSPN9yUB0vEN2ULLORV5K0scyKOXFThHA6c5ck/h5NQHugbOpiwXW
98Magf1hUwKMKAHfobcQvhhVFOa44rqblrMZMJllTAjH+ViBbnuxrauZFivy
slVJI2J6JmvWK4WxzWkAZKkqO5MzQUEShFnQJuq5pO1NyIaWUaXmrqJmBXBw
S9pk6ya+E3pCH6kEGCc2muCgGU6J4Ob5uAXd2bdE0ZT5QA3p5npkwmbRx4lt
5RHHgwx7rjEoPnDHZdYjmr7vlgKFHmGL0ni8qBFOFdIGZBKGpH7stHEjhnQZ
pE3d5YRCsYsQ7a+2Phug1Vx20uK7/XtJ/XJpRkH0k+PIuiUYjbxQO5rwPRYE
FzKMhSkQKcdbG1QyeuJgeWNQEEkEOTLolTXWHvxoTNAJLolaHS6ksKADu6Ym
dHZIdAtLBZ3xfaGsF/mMqx1o1/mMXa/hodtAYDByGeKreBAXxXyFjYGUQjOE
BypbkHJ0cfAfBkchzTe429GUNXbpys4pSlo+Gqi7CQWMUVOWxQsfwHQJek2I
lNO+XcA+W82R5SBkhCyYIL1iITx3Z4oFOniJI/bPIH+s6k3s8XimtGwX1yps
m86pqD8OmSaysCGOFxKOhwc+w9sqPSY8kVFXI94Cp9FRoprZcIlmIOzOKmDw
hM21Rpw0UrgTcyLUfKyWG9C4QC5TS/Q/zrAVvW+sw134UhRzbU/uGqgnXMEn
cErmuY2nwgVZLtLiCrRMeS0qJoT7Q9B/uXitJhUmRpxdB5oP3YqGAbS1QXuT
rSpgXHi5RGVKWBW3nIzNgrD3IjMpbAVStziRsmJcVopcWANCa5YoXzpj8dB0
b6ewk4A7SYKMTBT65dQ1FDJjF3sU4lU3GxRtH3zJd8lchk63RM2fvCjWNbXK
QYSHiqqlVwKa5Kw3/dhZAbKWLYZgVB5boTP2H4GSE34M4t3D/iiNaZ9K2SLK
IO/OC+ElGidOul0eYyegSV6T7UOYFGCkI30iP8m539AI814m7ANlHHoqMXyP
dyRJ9InLHF+WdPABUWFAmyVPdo8sOWPlnqSDwIbfo1oBOtSv4zFSPzZmbtax
CmwchpwAwwj2yOeXYlhyLpZB7I+pMa2OwkJ9i+RWao+Jk2phpEUpNZzVknx9
xL3jSF9ibULSibC87pIkUUCD1rrnoV6HR8tDDqxHqzr9sln/5qoKhGoaef98
XYwlwpncOWtdR+2R0Kbx5HcD7IDCWnXW6URn5jdZ7dckpbWqO0m1vKR+UBbx
GzupsCNxiKxbRKnhG5nk6Hp1vzdPjJUTlTbrM448q4MlTbBDd4XeS4ls+NbC
EhSPDR5qaoeEmHAEF5dmyple2Z2OdPV0RBR79tFUqyxSh8+HEuwJSZfPpdaJ
m8upvwDM3kldnjEUYmZ5+UA1FE3hQ2dQ15uOFiG5VsQn1MjD28KtHl3ftKzF
CL8z8gba74lPb4eLZiVGRBK5USJW18LQy4RJ5tb08SMyifHbo2evvz96+2da
leHS+T1P0hmwGFo5tc8XtFyIpIMHqgjqc0MOnx5F4RozSvtE7WNhDWIFxjFp
iyyWI9YAMgMiErQZAFmuER8YI0dIeb4tZSRBYB0dn5/VWJAFpKOLh1UImxt4
irOMrIW2Ls/Pqa33mTWwhgl37510dqWmyVj0Rz1c07XL9HnnfIfcmAqYAEkp
oqr3JDttJV6NkKQC2hej67G9cKWShpF0qqLbnIeks06LGSquwLyLYnqWY4eQ
qlql1QdGPtpxFSWn60OWZPlHZuzmSX1m8Q1YTsoPOP0YxjwvBV6Sfet5G603
lCycGEPtXGQWKUa9tYUN6AJYNwLowXXbdLvwn0O3BCtf2BeLKV/UoFg+jqw5
dRTBNta5BSGPn718Mz7LG1Fms9QBUYpR6B1GlCFVUYNH1KtCCp9XzWZjGkhN
FWbkvgnM+VqLJo7f3EfbKHs4bteo12GykjOE1LUW9dExXFHrtihpzNg01SUw
gkLblud0J9C7AKrZe6THdaO0tpW36mfYxh6K1JsOzwivEE1HXELF5KKKDAE3
SlH1KBkXsSv5M9y4tZOShhybnolVxHjPlm0SgwYlBlUCwnQlDalaEXXCjPB2
fXf4ZmSHQI5HnZOJCfHgSMoyU6lQHNpB4lDlJTUKt7tu1qQTX1DZZrPu9Y+E
Bdo+do8UuXKshR1t9mwh3R3a9LXLNIqVpi1WVPOYHFaGh7WTdSDrlokiQ6sl
FedEgjk0+GGF6VbPxfeabR0+3yY8W8ZvYF0eFoZuKTbHfEIHBVTIpVQu+cjw
sDMHnllbunHM+lpW2eHzaBlG9YW0viBud3FhnSU1TahErcBqqNYNCe6Tluzv
mBrg1QBD04bjrGp/mvwrN4ktNKMMX1jewcoHfo0ywhske/Ror2s2OaJXHNkg
GHt4URDz5ByYG7DcKvumPLfNYEVjec0uNTZll+K3XAvvZKzvVKaivwc31ZTc
QFmW0mKbZThegN80Pe1By4YHvQJxPIYkBqImcFMMcHAAr3mqAxPoDfwQ5s35
jAdnTVvn2rpDIiuftJiE7Go2WyQPGzHAzi/aqwL//0jRwlnLPyunZc1Txg5S
wFWk7C7k7isKnE1ZOdT0N/v29PTN/X2L63z8+K/Aar989HCXOLtORSKgEoTT
MHKSymldvMm3M6JX4AyE7UiTdEYNQ+dOPS/yS8UCZrXRUlxIY5Mv4jWczxnp
3gPE+Io6n4QfFZpyKXjbFjkxnZ6yaAJfJgIDxjavQIRkKsoI1/J2jqDQqsgT
apv28TYAhnwB6qUFGskZNbNCk9T+FceiVZFy8LUhqhDe4FIkE6OB9CUSHXjC
KpPCsI+E3RxcGJxU/qHfgI9xJJi3dCRwdZlxeOQD3Sxfx4vvz/Om9eG06bo2
R1OeZtWduMWgBxsIma+Jry+eExVjKFWUKtObWs1eW4DiXKOLYAH/ksAF7Qpy
5+uM1C5qfbyuC00qdpW67mxImcWvB/91zlil0ERBjTEmQApdQKUEQqJkpzI7
nYPmWKFpijlrS/IecXTcu9kuSzDAYEJ0sf2sGK4bd7acZPeE393L3O0dBcE5
Vcq6gqMoVhdAXHWeZNYaGNvJySmYNf8K//mXw9fHO3u7O3t7Dx/d39t/sv9w
/8sd/i9F4VgwS7eNnJU+6shOC2Q7iaD/AuoT5IVwclFrUTRnwUL9jTE2LjxJ
yCFKJMTpcz2YJKtTqt2wL8SsqNlG0awHHigcH+Jhq14eUyYmcKzihppIQMQy
4nSjWCfzWT4x5wKbZBsX1gyXFHYanW9phkt821cEZrvZ1u6H3W1mWvSyU8qG
4Xl3rFx0l7uIi+VJ50rhko5zxfpaxyjPhgwnMmpTd7d4feuC67Ft5jYLhzcv
AqBcisJJBXbECLFNqs9E91VAJbvM9Tkd1SDm6SF0XlYzHsw5sgmapp+A4Nt1
mOjTPHnEHCNFJwhUUjwa+R4zIU0QpahMl+raC85fv0g5aDCADKlr/7Qt6EyE
xYA+ZNTecWScS2xSCloTuWBLq+xz4C84K0yKlYv0opxJwaMQeuDiD+3SMsBB
2IrqSfTY9GAOY06uJ3MeOLj3naaomoFkefIRVRQtSMZNFIVRIPZJXEGDuBNJ
7Zkgy67MVGHfPOd4ILTcuh1XM+lkoYI3OLgCJEnsK6K+d3f8lH7ErD5dmt8a
VM24xbcQDC8MD2JWnq/rQiWw+IGSRuA3/PnnsfwZaFEFxHiJ/o4sNjXkv1C2
APyi88po7P/AkyWGG7KfxumfnfS1+50U0N5f9M9fwuBzvYX01vHTjS9u/uGm
F2n5cpXu8y7Jvz7XF/2fy7u+SBN7fvzqfndzaP78i80v3nTuG6c68qdP9TzJ
6e9sevF+d6Du4v/Sf/GysxcbCIAeC/2nhghl8Kn4Ls7oIp/PupNL//inknel
MumWd+0p/+4Wh2S3b3l3i2K42/7dv2e9upo7/fmp/56js/RwHGV238OTdmSW
UoMjzPtddvWjo7Pf/6Tb+NPvEtbzmxt5YfzYXVlmkFU+zbJujCaWZgeZefKQ
wUm65/BBZiRPDUAnDgH7hSPgf7lbO0WEu0/B7tBTXTe19fNTVC2TNNLP70Uq
evgx7Onnu5ugXVqSRwMVhKtms/fceurFZkE46YaTVDjyL9k4/jX0u0lkgKTs
ul5VLDl7n+Aaz7gbTYwtsB7UFAgX17J2a2asSyI9K3LsPd9+bfsYpAhQy0Jt
dEx5JkcAZUq3V1V/PmIR19iWoJQuU7lWFZJVwinVnU2j8JQmjklrGTGuuCVO
y85Dh7t3Uc4Lt5aycXm+sHkRDIFhC8E+BL2EbeF22J78Gn/BpZSqGa+XJfUk
If0SLAZ2lQQl4OQ7CrrQ9cFj9Q9GwsilxwcKRulvQJNZn/2HdNFSQzLZFInN
JAZoP5GKjDsuXgOj43xdTikBqZg3BSdJaz/zaTVZ44xGnSC/pUDit9sYLVkl
h+dbORUfyDjHOI4BmYpC5mxLPS5aSpNCL3KJnyD30T/GFHIXcEDps4WaE6fU
qqLITYPlW/fw9/f4Cwqgavpgcg3rQt3n7P+kUC68RSXhA1UKKUdhemdrrAcm
xQntoBYX4R7K+nta2t3Lk+fyPIdVRunbcwvOd8KXDh5NhyREi3RiS/aA8I2M
8GxV8ElIPL/sHgpkrnKe3tNCPc86GLT47aZtIN/cML5pLBOxaJf2dsqDmNgV
B/EHykjYJZWm5fHTA1U72yGuuKGwa8emNLK4ybQcPDVLvKI4psP9pNafjYtD
+tFdqquYu8xkMZ9DmAw53ag+nRNkVytOD/UpLOhpdlCwTAbKz9DM78F+8RYl
y/Wk2qdPf/5JJmJv6LsOo8rWva/d7Ung1O46juh29zolKJwOq52qBwHbuVZ2
iCxdzzrZpVJL7f/f7r6tKY4kWfM9fkVu62GksULDTejStmunBIXENAIMkGSa
PWexhEogR0UlW1klRKv7v6/fwyMyC9HncWU2GjVUxT3cPdw//7yW0EDKvRtj
Oek9UHCMuLYJmKi0dNmYBhl7Im59cCuSOLinThaZV2YuuqdXZqK/oiMvyQGB
IKQv8CfP4dFYdcLt2BfDTxkeI3ODJlUZGa8QBUUu8q5HVTlZ+8keRbzjxSMM
oVsN2Cm6j7Im4sJUgKqr4qVMPHoELgnsjKugcGNdWB9URIFJX8tPEmU44FI1
5ySuyKzi1K6UdB39PfGoJ8yWIIdWxAvNs9xNtc1AIy3eV6f78oDNJf7c0HuZ
op5DX1fDGAkW7am8Z3ZoRh/myYUoR6zHbjdi5TV9iiSoBMhy5LwyfXzTS4QC
zAqxgxR4hXbHVrCAENgUUdUcZ+s3dK/AhcAZegdA1qfk+0kMsdQaO9BN0G4e
EsV6dP8/EsUq+Ui+kERAw5HNKnfhfZ2XRKzpZe8Zqbv7al2qDOiblxeTuQdd
AdawD2hgJdAkKuiQM4VGXk86QkKzyRAvrtUQUnwTvqzU2M3TQYdfJK1kiWQJ
KQVosji+IebbmjStJxhPBTiN2zEnXDqaQdZ2wjl+ga/KKaZaoWyi3mRB//xT
87IQYvfc74KzmTNLGQ/LLypKhCstOaZcYDXSGHu7MklO5VuMqOX8BpOVxG2H
Po7TSFKfrBoePTUQoqZeflSzHTiieDy5kJ0AL5hLXMJKS+yO2iFl0eY2wod4
AX2bGKu3I5mpKIeCw+PEWRRhSb8cbzI8qsX7yFYSgIkocweCD8xTp6oG3/0a
Ek0fAdN576VV7xvGAPE0XV+s8I/+9Eq8LZaIcAudxE9OGwKmk4FNwFXWsUGN
jEi3J0y82cWLXgNRrPGgqeRmA5BbM7wxHjP7avxOV/ZSNMHK/3I2lXyahhPC
oSqmFKSZjwdPu7bjsLF+DUJzPiH4EgVGGcObxKuTrvvLSXSEiTnY+oiZcXax
Yjo+7AWNjceB0rfjd551U1sY4zjWCghdKLbZVCq9Au5jrByTFgEKYYcDRdEe
zzifFZvWuWP+Vmh7gVLw+Minp05OplMb6GvjNuJhkLtCdc5ykRxTxmxTe1SC
ZM7PPWWP3ETC42k+v1z21nsJ2RUjP5DAKl1rnRAGh2uiCQ18d2p5IGSngM45
+qO62kKsRMbwuKPiXyh4aQP9sry4Futhyf0WQSa2MHa0wh0t1zfp+8eHmCU4
75EjJgicvumT713ZmrSUGPnRtNfgrcDL9c0VazW2y838YbT4pt4ef0iFwgS1
erE6q8Q6wap6KlCMH0Ez1c1eV4njSsan9sri1tVhpCwVhgJNumq76FPbnAKn
tnTq04wwQpKrpGp0xG452LhsM7sh2Q1NPhk7SZV21VyGrmxR/SSHUDWS2Dfs
CvwlefgomsJWgX/qn7wmzXX88dDHswTiOmU4JpHpjY1Eph1H3wJrZ3bU6cVu
kio+fLeF04xuUlDLLepa4rpy6JxtBeVd3Ed0zkX8YUZ8JWcZxxgB8gmwTxiq
DL2prhTQy+X434u2U5jO37xhTPvkxzN7FdWuN1h0iDVs9F7Z72J9mxUB4+MV
VxoCbNCycyb3QTPHSGb0Fi96uPAEH5YeTFgbneqYEYxgslgIbzq2ivYEknZk
yCFVvIwxIrqD55EkWmFMQjq3BJdGoBJ2nl5YQu1cNGsrWbc/bcLV0A7aBAYu
khmho0UVeuLezOBS7ADDeQ7AFroC3UeZXXCINO2QwXRJhbPYiuNnee4Jq3vL
4ZHWFDKhuVFUZ5qW9IAzcxLpxqYJ0ZBKRcDoxZIKvC4NjTOV8HOckF06vcIB
C/WzPVAyqs8/Nwh/vfaTldcVV9qy4k+ukoVjKJhWV+qUMB2H8unXwhz17FKx
b8fagulr6VtdFr1FyGK+M5l3/k5aU47dQI8miwk1gPnYdZy78fI2izkqRJKi
v+ZJZYZzsqTzXATQbK2oTF/lMkl4MT/Y2FV/RIhyrhTqVoOD3q+o+bupd0VM
FlNuoiG7N098gHCla/Zlproc5Hh521Lqnzq+nJEW2FmVGrmxFkGhYGkLfjjM
Xsmp+hJxCA5pnmBVNZB9z08mUIKG8Sb8e+X4bDBjM4kjn2PyeUkz41SHeQKE
RuIFQ1JS6lTKV6G2hlEkzpRB2KDdPQRXPpDJCZiURYryhw1e1b55Zc48c1Fp
vpI9SHxDf2vVoiYWIB2NhrYSY5vBnFLYgcUBDCmYrZd/oqeKqrPOr8u2p6tV
TqHUcpzy04ik75QhPa8c38L6/9nafO7q44QO9YjZK9KGrqdPPuzuB2WXa2TL
nTOY9k5ajZWAowLX1/GdLyjCxq82isgH3f0BJzYzd0BtMWo4Sd/qZpJUd9I5
/S0tiCVl9h4MnNili8mSeOQpRR/Xho0iLnJat3Idgr2vxOzKamIZtL0XNmwH
UsHDg0CJx9XNrbPAHygvj6Rq8/J8gsxsZh6hH8kEQFilc4XlHgpBI3Rqzvn2
yq5/E8McvrhYnQayk1zD9Ok0WJLLG/ImeJo3t+WUnmQCY+jNXXSG8RH6GGul
uTLQsGJPv+OOMYEL4tSJFgUarRiT06SJYmDNUA4VaoL6EqnWmsXsgsPPzYX6
bDxm/6KZobRVTjccBzkJRt/RBUDYjZgrE2xQmDkp1HyYTra4IGJAweomIF2B
HnEhNho0FnC4TSaNI9JMUiVUd3O9bfCh+o2SWkqetJuosTNptTBNXHLuFiFI
pEhY2rNLOqMHeTuvyjF7EsRq9lE0/u59f6qa3wiarqMrPNLFst8wXJj0mpZL
w0cEGwf58lxgukUhWaVwwAObmSnXhqC0yWwx3kR+zUnTSsoes/wwd475nvz8
4o4y5ou/Tmect/jXCBKQpmeLSaVhbOJVzPJpIu2HLaJBx4lN4jvYfB58QIla
pE8T8rQemR1zCzLSD3F/6Xm4K+8pcMP+rDzFkpOqKSMwsAyeCEWNjjcCsJTr
AVlHBG6PTVowH6crTcUrOG+E0s0x3LEdHc9SXoQhmeUuyCdSbo0WOJcqQJ3x
SahBcxlAYhL9HnIcJfdGRE081i2TjMHcq2948+6WzlLIR5mtIaRsEIeXc4zo
MIBBCR0iXfidq9bivliU8b0R+LGv3q2kKmSaWNwjlydk8HHU6p1e3ErSA/T8
5HE2GtsdEtxM4WKI80iM2sh0xR5/vVuXi6mkX1t+NuEh7fVs19h5fyMyI+TG
s2PUIswHCJ6GLYfuJAcC0nTWgWRRRyk7uY97vGomipPznG+dpEFGak/VZuj6
c2xOS1OHUgcgX6F8ldnJgMWHYOgomWijlaRM7QmVToP4CMQvnu6fYCU4thKU
35K/HDKaS5e4my6y5f6YPFLbnmBN0WGesIcI6VJQr6Za50YYk1LW8voSRZWQ
59ES39XIcn8cGxYaknn2isKrcYm3Bq7uFdjyGjYz1lcLOhF30QK963nBR7qd
dEJmVVUsbtMrdAcDo3yT8KQgo2hbfvHjSWL6hLA3z4OHLkhQ3pAQSsz/0r+Y
mWsjJokHQYpiRICS0MuWKz4x5hdZYNu5NkB6FQ8oCKHJDYMOWhysWseDoGXT
9Osg4eAaIuumb4MXiVyEzqhwttGcWGnlASYHuVXHuhh4reZTJ8HXSNdpjJdw
YZp7QkRRYFZoJpJviTp3eZWsVXNzP8mKTmqBOh9I6iEVojnxbc0QU80kK/qy
p0cVI3VdJEFDUpJZmxUMoNTikqucze+aQPZ22yl1LclRb4qn9TNfhMl/SM+y
7Fkrj2V5PbNTjbfavYH4UQX3Aqw/VFPdkCJLw6d1/Uzl3UOdFla8WJYgOyZx
JWzZZAjshk9DmXFXOEigjxdUVEvi4vry5kOK+lz301ehk8i+45URRHW36qI9
PmzRG+OMjuE7nzqso848c4gQcU4xIZaVXuT2sk3nhuVmvAQJkJ7eR/v/Qo//
z5999AjR0Jb7+Px0gvr4+Evev6c8htHD95Mt/Mv+vtSGiTiY6PVDjibaRhbP
eNiQ1bLHd0oRo3zH2YdMUuhsd/+QStWdHh/un8HDc7T3abTDjuCP2+95IgJt
74NpMvo0kJZh54QIGgcxTM5aYhRGL0XmoIIrmpTqbtnnLjpSPNzKBI81Qyup
KR2kEjgeugnm3KfmYew/WWS+P7DLWafINZQ59gQOJmxFeGxqtLRubuhlQDxh
UgBF0i4EoIcIvBbpBANHjs8XV1fqnoXv1kINLYkxbbqV7iDLVU+Are6Clf2n
MBgKM6Z90z31JNXeRybHXF8eakKb6495MsSoGKfPNvIK9p1hLhNgByO56sGK
tS9DJk1jkq2CzI1BA/l4yL+kLr3gpGYMpUwVhCLUmLPFdKoUl7mO4oU23uPg
UKjWfatkKkt0GAdGxAyS1wSRwhqrkr8NcrQyO5QoXibuPfmIc+FO/Pl9SM9G
XNO0LWXRJoPEWPlgRdELywOOUKF0UGZ2zmJRTS6visNJFsQcmEg5HmLn5HuQ
hA/XYzxh0iO1U8MN83HchCvUBw2jkOkePnKsjbAE63bZCkblkN43KUUYRVOF
04gSyKlsK111BaktWmJLdFddXsPsK+HcczOhPM0t+yP9CsGmvCOby1WnGzBK
3MVmsMfyCg12JLzwC8zPWarAhycWL9Q5+qfw/NcOnk2YJYscNgriRhHaVf2D
rgbhp7pVyBMgRAP3EP1B/KggfE/L1wMDuwixogwUpex1A0OCABbdA0mEM5/Q
WwmutDRokTzl1AMNaIAdy0Y+xAktYJZi+wNXG5JGEZQ0lq/OTxW6bDoXsqpY
VBJ843CaJpn1occyFNO8QjofXL6I3UB1elPOL67jCWeUABsIyksVV7jLCJpk
/gRHuXztC3pdScUCEX7t/fRCKW3xgx1wnT7TFDaehjWMkl4THHSgfI/rqTzj
JUCgAo82IHLsKzGGRRmkqjU5XR68N6B14V7OBwG1r7MBDRDNDCIiv+bEgs5D
4+7x1wwqa9Q1QaG/AF+9qyaTBIuPEguvILx1ZtPsXcWNUrd31SxG4+aRTkO1
1VyTuBiFciNI82yuKRHRzPM8chJktYJ7dz0DK+J3yc0qu6XSBe0Yp8bQueAf
B26sWQpLB65UFIfe392FNycAYEW9oKeJlrklDmfixZZdSNcKNLhBri5ZVHUH
EalDUqNXrRaPDQyZLxSVCffcP+mlBy4kW4GQreOEGTMOMoQTpt51QZSEBs0F
ZnOJYbXC6UzqWgU9XFUO/00wWiT9y07mSoaZDREQbO1MBeXLqLkpScT4jfh2
kuh+kgQQlCF0kACx02gxMXPRkYvjjizEZesOpjy9eI0poLpPmnwPIQ+ch/zj
yeXFCls+BJFzKcEcFWgFfI9zTM+bf0qzhnjobYpCIc0wZjO/wbc+LutldWf6
X+0bFBit8Ge30XKpuP5SfJPAKJCxkL8gz0H3vlDzTahh2ZogykbNO69bSsdu
a6IZRbNuHmULGxDxxSImMPqM/+8CHRfycq/jsqrrrkVtTVqZ4LiKLyDZI9lJ
C1gIaUDaDdJuIoSp4JSYYfJx9aoVkTKtlSZFkaDxjPGCcQXLbKUNer7HNOKy
jGp7sT1IIVFkiycC+zIIRKpNLcHMr8GVLZH6sZkvqAnz3pEZv9BHjlHWko+Z
fZyasRKravtws0WyYHUQRAJH4pZhz1a5xmQaJ8yHWEDPiduE8pNM5Fb8zM5X
KM/S0+2jPD8+jStn94r4S+mYpa6x+ePul4ttoZYLsZorMwezqyAHYD3mhoXO
DesFWOGn5vUcb5qyEerhENuSLtF1MzGfVLeNcmreYhO35PyLTLk2MYJ+gkKY
wAFBQoOMi4BMPSkMcFdykLMPt+UgamUblqT/kkMnc5Jpshac6VLNt06bIQZR
5TFPsFiO4d6384r8mmPl4DBmftAi32qwLWhCoALhW82sVbjyW5UO0G4WH1DB
8aeUMBFNZ8F3S3B6lM2Nj3A25ODRHh56sLuXvz5T1Clk6Ruiv8TdE4yv/Cxx
AKkI94T1mTuIfTpF4tMJGVJLSDiYtKMw8Yh8c6xs1X/u9jRy+gctABLHWywZ
b17x4wGNppb+uKFnRsNLhRTqWXCGdIveXk5PpmpIQQIAJMWQU/0WYTPoX7tp
8LHKIUYXzOuNvg7k6cd838hIEh/R4RyxXlKMYCKYNRnVVcOpwbCUVXtRMYiF
FZOoQLORTX+VEkEYKDPnTKsc3SeWIV13ZoGTWDmGWBNzlmuEBDlFPz++Vt4L
CWZM7luFFiyAKS/c1Nl/heAqPrveSSopBhqa+NmpYM5rwufwNQqaBlA63ZTU
nUmAYuZ2W9pRcAAaMzxi075aBny5viK73JIg8wBrmAg/7JTvx8/m59MWYnZU
7D5wtJkx9anm26WRHLKJCtakz/HRYsMuv0gyLi40mNkbUbPAsQ8Lo8YPZp7v
eu9tJAym8ET+cCF4rqTEKCqHvM5h2btMI8j9bXVt8oqK60Vk35IEHFAps6+V
JcdpWs3js7MSn3WeO1lN51zedmnCvHq2jBPeM194xouZXljHCsAOxvheTwZm
QAYaBKt3S3Hiknd1G3RZmjxR+HEoS3vjULLmknznmLCzfOVgZLi+04H481A8
8ktAHn7+UIDkX5Z6n+ZZN4rZ932lLivWSSFLkqQokhN5Z8Pd09HxGfzvw97B
EKu8/owaqU/xcbag86exNyhbu5DMwYr+PWY44tjXpEjBnVsuJbphYw0KdhfR
91pF44KtC2NqEHNDduqUWYlwfeUJZABav4hWXyNpMy9g4j11wXwBVuiys33R
fSjXJvPMczSH1HsZPLZB8hTtKcVIjxFt2HvZo54kXKafZ0po+qxsGwMEefhY
7zGWLEVMJ30SiZwiWHjE8yfWJ8ap0mJl2AJNeHLIYF44ykThA5uE6Z8qRwCh
fu2zmhqFSBpfuodHhlS7McqJ/0UpWhHpI84zRfAGl28YK2FWVpr4MwknFiWS
dyVIUmXQaoUBxxvecKnpNLgPWaM8RFUYC1ZnR1ThF71QlUHFEfpp9abR0pS1
d3g6HrHJ89CpytzDpwOTSnrzxBVGjuWkrjlfWdDjUicAoYQopsn996KqXWyN
T0sIcmoEu+/d2z7yxQn400WLKxGBqggFOKeKuyGB0xtYz7EYzwj1vDDyN8l6
jVSHbTyvLq4zMAidrbJW6e4vfh05m90Rp6tMArKTh90X1ZfU4wCDn/qCrfH0
kIyycadXhuzLJZW5rey4cqHkpQQLs9ii1HJFSCO4yIHlir4iQkuLg9eXwSd0
U/TKVZ0sfXZQgkki34a+2M1W65SQVacLuWJcLjuzeJKojfXnaBli2mmoLi+R
kwJt+OmYLYTe4eT5GHwdKaeer226QFYKPq5PvjpUv6dVrwrNRqbKSTd05q2u
JMo+OgPRnZU6Z/Krq8wErYsFRq6GJYsujkK+26l0skpVzgTXO73nT+qSQyqq
Vg1c9UF1LwKh9HAbaWp9SfMSCM0r9aWXEZbQkahr6uUSzYGeQatNgfEcOhtW
C9WumcFsKe+uRiTqxEhMBScszG3LgHZ7BhxYjSaLlIhQB35iBKaGfB9PSmou
k/iKpcC6PJdJ2igdxZ2z7eO9073t4b50i1PNyjDETBAOgKV44nQxyrl9mhm+
+tqJ3qRppYm5iFrnu2wVq9SloQZ00K5+1Zh4zekcbs75Jrd5ETTSL1hElbkz
zW6zaeT8HPk7QQEvPUQmnuFRi1K3PdIxOO4Asdq20W4RFUkHk/1WG+tM7I9p
ZS4GzmIC3RL0W4FY6eEQT7s8DuNZfxPC6vdV+bOy+n1jl/+8CW+KoSt3aunm
8avotd2RJBFkn8XEUV8hFYlyZ3HnsaPN2NFL19Gxr1VxDQpohSsdp32xA4/X
oWOumEMai0+iaME9cTUhhkd7KJAXs6muJGzXpLlqaVyv4rjeunERuDeePTec
QRH5K7oFGfmU4Vnn5WChDAPDUA+92qSoAnW+HTvfdZ1vJ6D7pcs+fyBHT9ce
eq6J/ve5hNYU6DypW/FUabbP8inztfCchySdH2ds+jMMY5uxJGKoHUrcFhYR
RkdSxvfJJXeUxUAkokqZZfhlCYR+q+BK28SiKVh7oIykIQmS+2zvAJ6XByD4
RsfHh8dYTUWOxtoz2pPYB/mvyfnGpYelnprmoDzi8RobX6fGGZxE0XNWzOKq
Nj8YuRKYFJQdDDLkT8P9vZ2zo+H2b6PTs/ej4c7Ij3xDR06udXPV3ZQTFK8k
y5J2do+HH0bs8oyNbFIjxENkKbWdFj583D/dO9of+VmeHe7unoxOT1xbL6it
D1bi2r9+pZo9LYKHqJkIldd9sr7bw4Pt0f7+aMd1sqVLal6qso0VvuT7/drO
tfKSWukQAea63nQYdaIagtdk7+Rk7+Ad7M6X/cOhG+HGqo0wNZ6RiAKLhN1P
mrKzOd4hbU2tj6ipRO0s3aSPB6OD7eMvR6ejJa1t7DxjmSyr39ss5clPSe64
uQ6/vB2dbR8eH3+k5j+MPhwef4ktv3idtpxSr7uS2xRxUQoKLsflXm/5mkRp
k59aPgQdlbx0bbTFXKbl7fKxWPK++Wnr7w6Hn4df8jZfUZv8u8e29HnvYOfw
89nHI2grH+QGL3bykce2K075vMUhtZh67H/a1tHw9H3vKm7yqY2/f2yLIOfy
xeO5xiK3P23j0+j4BDfuYPTu8HSPJRULUNcqz/dTNaNMtml11WAEl4xWe0Au
n/fHt/vwn3j4Og2f88zlPQWWzAPt7YzotuIAd4d7+x+PR66hC684SufEG1d0
N5HXR9qRW9/fznhZO3LHXTuiZjCtYH94/M63UuUSjVN74KZ//VB+P6KfndS/
m3o8GoFGfHeI4pFOvbW05mRjxZHLK4pulnfl/fPig5aOi9UgmW9oibTcc2J3
bS0V6fC7OyoNS+q7s4nHe4egHNzQNvT7lj/b8/Ul5Ds2BtH3CLH1MAtN6JNC
YmlTw0+wa8O3oF077W1epMul9SHm2kF0DUR6I94BOaSjE38+1zZSOX3LB5Ws
jkjvmXj3+i6Xa5DNhz2xkUxdfuOrlX+fTZh026I+f881ixHgkUShKK2wKS7L
mWOAm1XfpPZs0oNee5Bx8IOP7hCvsWw/4Mt+ThkKwmnkEi2ZUiMa2tfl2CxA
LtYcb+/hhyNY35Pei7f26oEL3NxQIQtl1dEmD0annw+Pf4PlQUtr78Po8KPf
u9e2UM4gRl8Yo3yl3hlYGNMK3oqzr4Yd0fbfDw92Tt4Pf+tpfHPj4cY9/hqX
Py4QQ5gwrdiWhixssI/eHYP4RRGws4Pr5KZSPiCVCF2Mnsib+krLi4/HuF5V
u6yHo8NjN5kXW3+teXoPUfEbbf7D0ekXlTFsNR8cnqEXJkoLvumfEyJX/w1+
vuMzRXN3kcOPINZMr66dPSa5K3Z7ngqECJb2qP6BpnAIE7DlLfR1eTI6OF3a
3WXanTzI/7tdpdaNO32rS2blnl/9Gc9s7Edzbe8IzsJh8mDYqPqOtlHm7h3B
/jcTevSSe5WDYlwBMpeDUfx/PD05heuEh48WkJWnF92by7o14e1SqXllYxGI
5b3ZCen2+OIv9WiLnPXqjd/u82szimtyKPQtqS+3TE2+HdojFszBk7NjtFhj
kyyYd2qKAYmjQqK0+EzAOhBqdzCRgnuIez13AnsPRpmJOdfF64e7sAXyzbWI
MHJEBrYtLDxP4BiDgdtvCGyWj+wQRSzuik9AavvthOPTQ9fDC95t9uqYnBaX
grYOX2l7zMT90acR3kZ80MFWu/fmhdpAvNx3peMmNn/k3Qxpr9SANOD90/p5
9Rx9tYK8KjhdhImp9UVJHrw7TvV4/kyG1mezw/P6w/B0+727yC/l6CUmCgqI
ZsLy91uPQS9Zb1iFmMt32KBggPPy5pZzwWBuZkocqcY624az9M4f/xcsqUBo
iE6y0g24tanQEBiotKpNkgQc9lvrL8QXxcav9kDyT8iJwNqrusYoq6h3wyN/
Ptjy1/x5BUfOTFsghzSGjq4WYEYhhL3x6UlSmfcCk4MoWR5WK2Yf2gFDQovO
cE7YKDo5gzmejI4/eafV1mrubpPAiF4OIR69Rlqj8rtDbrWVhgGROENAYsVJ
dbEgYx017BHMrry47yQHYiALhPwldIMvyeF8Dsebq2rTP7P805PT36KhKeOR
2OOUyHRKhee4c9BMg6Xm+xQmbE3CetbZTXk/sFKyCyQyHBQtDlCACBjf0naf
cqsI1kKjcXHDWEi1iApXBsrCFs+kkrMWqy7D6srx6Wk3vbyINbJwLN9q+OUN
UjRUCO/Kh03zp3G2wV7kjv5gFkOyUqov/hiJPZo5l3qG8Y9nmFAX+wz1VE3h
U8vkxIgHgzwniBKfI009nQDqEfMDaGRapoyg6cg8OBXaZWICcUS2SVU9fkoh
e0Z5i3vBEk/KeYnXWii9kTxyusKdBUSylvBClHRLvqoEqBPaTeesMIkp6RTM
TcxcgsSS6AiuCc6kZfaoqyLtyraBI/3umxalD3KmYEocgHQb0FZ8uHNKbXpp
eaQACWcE7yF0dt7JKhVkSnmOJarHz7WmNJEAxT2yDXAjYBYrBlbz5mQVC4m9
zNlBBaVYSiQgUzbGPmQf14TKZBBBsN/1ZT6Pa3kX3CJ5y6ycKD/DSosSpSq+
VvfmFdaAI1YSGMfqLxWxgE45qygJ/KbV6Lg65pxDzILk6fYm6bH0qs9LOSpa
1QSLvMOYSZMr051X+RSsUyRetJxRO0ecHdvMWSOSLOLvh2xQPV85jzx3Fo1d
1nvQ7aSpR8GhEAOQ5pNmBovEcpmTuaXPVmJJkpFIhJ7xCz9+nMDzYv/weO/k
zz+LOeOVvlbVLSfiOVCHZfbjvYuCksskc2bMZMwryj+K3J4qgYjetHUD44tQ
fYfpEt+ZZMFK5XDr4vxel8gYzDHhZXETIuGSvtRT5JVg47kafaweUU/tYW9H
Hrm3xBCyzALOP+NOWoVnDgp49Y65cD3ONH+3ydMKHV+xqqD+bh6B7zNCazSo
y6YLzDdhx4lXCwy5I5ICVEFkxuf2ezGukGCJj3lG8Oclvvod4t7LNhhkTFmW
c5p4Rzcv5OdeWeF5JntiwFgh+XZISOrtEBnSxen92gwSTaYaYJIUkekjDHc+
q+XbomRl9zkUe0m6piLrNUXnuEbxfpJGj+3JJCfV9ArzOC6lKodDLqRNwKvv
Xjvo4Otn5VVkWWQq6hJsixs0NOxODoXSBw4n0oRnoG34F5choIN1KS1GjL9x
u4s1idsVaUHYWgCDFOEcoFewHUwM0/iQAV8JvdY3jCAFNOnu+ox8UspECZGx
sjk82+y8hs2YxXG3QdWLFNhoaHrPvWQqoqpB38Fl/y0iPlaGYtOF1mQ0npoH
ytMYFWEt+WgIjlqRpExZDEpitJxYn+tszO1iBJRXV8iUr1BIYbjHmwrrFv3G
NhKYWnAd0v4Jkes9CTskDWNMzXxOZPyRnJYSBSJrQUnR7skkoB1JzA/46psJ
N1j83LfFZCrwr5S9+jI9kmzm/TWJoeJ4WavBjMcP7ltW7KetW5bMKIMJ6RWX
Zs7ZpjeEK6ey0XzX7dLkTOqDmDZJ3uUKhGVLiAXL9+Mdo8TSMF7ErCzXKqgo
bApjIg0BPm/OhUX1eVaaw/bPv3T6Li9uK92ZSTN3VDfQS/X9upSiG1IEe+rB
Z/o06G1UyLdutayzlAZnDCgn+bJ8TXlBCXpDtH+IjfU5sidfEP/WNMyQI/q3
pqTZ51gjfYaa7j6Wt+DLc1vFghJCIFbz58qWsnRKZcFNqx4Hu5N0rFv8dxlr
QZezqogpn+Vcip2hBJyBgY/slr6sDjueEVzDUk4ORkI+JnrYJeX6+iycRxn0
QZ6mYoAUSgp40ax5LGmjmHonJVU7dZC57ojVudOccdqv1Lwd6GCV+WGdHfr0
47ZYgys4mdQm7VtaazH6DdSUAO1FqEaFK4VgbNwta2aHibKyMTp+YQ/qVnl5
YKsvXK2aP9lq59qFxb8X6BqpySvCCdWSka7iXsD+QtmdaYqY767yJYp4JnMh
nJ4SHmEZtjt90nGLHcHqoHet5LbqVgd/nTylMTlH9oYHwz5nCMnRU4OCHVkc
7Li6AsE0w5I+dTktV3qK47SYKozt/uf/Pnk/3N9HQ+gf9Jgaj6vxf1EGpjSC
Rtsvy/pqf+Hy9HAq+TPKqf1LgUngHJfGk/FQC9bVFYpnstDWtlbO0QcpD3gG
xeF/4GuwhYWcs6MfnQv0c/e84lb4pEWvym2D+XyEzvskICZ51wdXNUG07ozy
sxB4iVu0+v2yKp7Cr66r7yUSL4OgesYs4S1mHUBXmGWPTZ0k2SfHemWoc9iP
H//jeHf7xfr6Fh3WbBy+egN0eUmceDMPvSTPGPz2Y1ulbWG9aVpDOV5dAhor
bU9lJto3IVDv8P8cBoCzV4FNKs4NuQ48PboHT2dJB5buLVQRjFElvVfQel1e
YgpQPJMH8P/U2VAk7c20QjK+i5gIrJ9FNLNfRvlawhZdStB7kgTPk8XXdjXe
ywKqURQ93sDZ/Gn7DP3NXAKJkctJIxRFarV2FIb/ayxRc4GasJb05+vKNUaJ
6xifBCvFUtfP65K52vBl3TLg+RtbG35RY+ruvXDQL1qiBLuEfW8mzYLthlJ4
pOFFMbtBt8hTIqqExcHVgLfFdUXoN3TQgTE+4ecUf3V2cV3je37B7rPx4hwl
pGZrafUgsZRbKzNiN5So2a7xCQ8vyx8/WLzcrlAGFJ3DP/hUF8UfRbr5hf35
o0hvSf+fP8Ifb1b4j/2j82f5b5JPwajkgP6hczyDl+UZi9kzetv88ZgqYoU1
tZY1RW3YBP9SU+v9o6rHf72pDWxqPKnOJCCVLOhfa2oTvjCfLaZIA3oWTQca
1mOb+vGmeJIcEXjgzifV//xlTw7aUqVQjJDCp2p/AT0VYAvBxEYL+AnjZJHb
hzJZKM1Gs9yRbhyTB8wBn5wygqwe34Op/L4E82aOVtA/YWzF3j08v0tQ7HvI
/n4H2p397sPJfduWxed68vV51hMSAF3xI5vvbjlBUXhdT4UoLCZNzMo7z3BN
z+rmJhCyA/TTP+ub4rhpv+I3f/wYDY/3v6zsjE723h2ghthDJsbb6/KcLzQ/
tc2Xa+uA2HVB06zsjU53eVlhDFSSBaTau6ZBfwdc3jfF2xk8fYrte2jnn7Ak
N/fFTjO7BDtlQKsTlq3ObjUGAfIbCrZp821QbIP0weoSv81AvFzAp5vit8Wk
/joohmMkuinRxXI/CG6G0ENzfl6D9XwNanRQnJTzeyyIel19vcYutq+xugn8
d02bUchmHJcwuuK0giM4rwfhU420KCBm2ho5DaE/MASmdVPALzCrfADHCJbm
a/EZOTBgHm4jB8UObtXnZoZjK3Zhvl9KlI070MO/rvWfoCKLf9XVlRCPFcPU
kyv6ibJvy+lXfkwIcCdTtpgvUU1uyYS/Lm/zPSK9Ag3G1/AbWAV0jL2Ff/9e
TQbwroUvFqPL+gZXHRYQFE1THFUNzQykclmDxVePx83F9SCcwD9gLcGg+FT/
u7wvv0Jb19NSuLiH6JSkdalmE7DbnudMXhz8n8I1JnfIDfyQqCQpjvYNoxgL
KkZAVgja14uY1BcEhtZMK/OSgflz8R91Nb983syYgJduxgr9HHn0burFDf3u
BpQ4Ue+jvn1eHC6oFCIuLmr7yYRN4W1OnN9vrkL4X8Xf/w4WUDEaI6Pv39ri
oJlXb/7+9+KIQnsFshl806Rg8cgZ/QCP1d7nJbTGOHcNPqsQ0aVBsqG2XTBn
1O0CrB9ipAJ7ja12PgQ4+sjbMGELGNkqGhRNt1IujulgZuXlfAXXhlbDGemr
6yDyJBj2u9liqps1m4Xx51KE6LL+Tlgo9kk+fbK+9XJQPNl8uf4MWuJkFH6E
KFj2oAOWlScxUV+OsYlXm9DE+mv6e3MN/l7b3MDkHWh285kMcGuTzPTdg08r
ayVs0xVCLq9vNGVaHN3z6oqCuy4DBya1mMbYQmGDePpkjcf+apX+xo5frL3E
Do8rkprZQmBuXOtIFa6FD8P5YflhLO/Cp9DoOs9jcx27eL2BjR805HxtEUvA
SwFjP4fbRA9xP1g31BfcwvprbGF7SZIPofHvnO90FcfwYounRGe0S9gjlbrU
jl2WQATbtPmKdpqa091d0/wlTmY63T/5VXwAerypfgRBf7FcOJEB21OJIB95
ihLOdo06ST2wUhkKzsziAjMjIkULJ4ywb5sXawNHurFKjdATjjxgRjpNmaxo
TMyTwmTsAObnvpJDMj9fgQu5CdtXFCsZkN49EY0zqKf+GO3EKjeguHn+KkUB
MG7Z1y5+a5O/JZfLkMxnB6PRjqHv8YMvcL7D4mD0OYG46UfaxS3e+gQMI6BG
CfCjHQey8Wt5DiJyfk/TXt/gs7tGf9O+RDPKlcfFw8OoAQ48SgILyfPS4LcJ
/wPs8zrPbaiBcbgA3IjVm4/eIEpXbgVM3rbm8YGpr7+go0m3Y/T9tqSM7Vah
HinDHG0lXfnNTfqbvrv56ll4nMxcCybpxvLC5AzCmAB4TcBk6mmVxBnenI2t
tWfum4Y+Io3NJUH4/DHHAz2eaY3y7xb2Utc7JrlS5D+5kqDWLwmqCYTdGu7j
+stXKlEz6Sb3CZ9gMAxQl7+TcN7A1Vl/xZKrnM1E5qVfwmcoYwRJMMqO8Wv+
CQnZ9VdbJONf42TWWbpvoGRyK3KxFMYEq4CDX1vDdVxbX6WJvHArMu87kaSv
sGpQ9R3emC03tPmamiB1dbL98YjWfPvw6DT5JtX/1APIeFJcwS0axMtH3gHJ
UcSFEPcpXQbmB+NHcoskj7AW8JwpMclJNhL6Wt/SfVI0hFAKJNqmVVZbNimY
jZmGSgtNk5Wz45qqoC1xSm4nuossjmRn5RiKY1so52HAy7U79r6xQZtNR2dz
M9nk0mwHRTyg5aEeFD2TTivwp2IdSS74hJJpi7ZygzZlg/69ReYCGOXXxYfT
j4im5Apa+GG862urW/np/1lPkbT3shaaDInpCoQGR7Kx8YomuUuKvFsavo/1
gTAKGP4mINpwB8G6KG5fr7G6drgXx1QooRFlo/cGlYcG4ZjIoNnYXIvaX/Fl
h0dnn4d7CIQ35bFFC7PTTP8WyQy79bsI8xBtl0tm5Zr7KD50vEoiZnsCRnxM
ondzYMJER6Rm1TWSYnhSppfqgRfo24KD9YJkyWtebc4kVtKpwrkEaEteRO3v
84hJU1/C41JNdfw025myfTgQgd0mRBd3BDTr5PrVEfJBxuxrd957MsK5UiIO
kKVfstNGjy2pzOg4iwVxZ0onFzPO06MG64RPDHgyZOUm+HZ50mdjKWSkSMsn
xlmKMhTWNa7UJUf3bkrksqc9eUl2+ysytg7xUMs31yKPwzKa5JUeyndYwlXa
jRNt5oIBKerT9GCNZaEdbGSNhrWeGr8PdAxWxWTRqh1MBqNZGGhx3M6LtWds
Em2ySR2zSZXa5GdTW9siPbZF6jSpRytklcRupGjRpOKF0vtNmV5BuVPAqLkm
sC2VfWAabIsEwp6+5Lvyga4/m8grnkdZBLyF08vZ3IWj6SkPlxtH/oq0Lim/
4XgswkQsRXrolmNz0pswWHvBX/NvEEevwkXHkbGzuL2elcTKCmdMcl/R+sD1
2mDLVn5qNQaVT092XjUWkskhWalxstPZ3qSBe/KBy5SegO2A7G6zuLqj0lca
5Y8lc+QwvE4UnGUDlloFkdhFalkojXf08Z7Acq1usmm0uvFYc3SVhcjtpMRX
0c4eYeN397YZMn5weLA94hQichX8NvpydvR+eMI/c8OOxqi9fzG9jcrfGVOW
spZQYUFUHJPyHith+YW14BlsABczJYmLfn0FZtEBxiSwZopCa4WiTOc1pgiM
63JqVP5JpKjtrse1OBDzNdEFFVt9OG5upcDoOR0xTKrLF3TS4jiI7Xys/t1/
VOTwacnZYse+J0iqqsQumvcd8yXKEZoNpRggMwvM7P8BVMhEpY85AgA=

-->

</rfc>

