<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.35 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-birkholz-rats-epoch-markers-07" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="Epoch Markers">Epoch Markers</title>
    <seriesInfo name="Internet-Draft" value="draft-birkholz-rats-epoch-markers-07"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Arm Limited</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>Thomas.Fossati@arm.com</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization>Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Bibliothekstr. 1</street>
          <city>Bremen</city>
          <code>D-28359</code>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.org</email>
      </address>
    </author>
    <date year="2024" month="April" day="24"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 94?>

<t>This document defines Epoch Markers as a way to establish a notion of freshness among actors in a distributed system. Epoch Markers are similar to "time ticks" and are produced and distributed by a dedicated system, the Epoch Bell. Systems that receive Epoch Markers do not have to track freshness using their own understanding of time (e.g., via a local real-time clock). Instead, the reception of a certain Epoch Marker establishes a new epoch that is shared between all recipients.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-birkholz-rats-epoch-markers/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        rats Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats/draft-birkholz-rats-epoch-marker"/>.</t>
    </note>
  </front>
  <middle>
    <?line 98?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Systems that need to interact securely often require a shared understanding of the freshness of conveyed information.
This is certainly the case in the domain of remote attestation procedures.
In general, securely establishing a shared notion of freshness of the exchanged information among entities in a distributed system is not a simple task.</t>
      <t>The entire <xref section="A" sectionFormat="of" target="RFC9334"/> deals solely with the topic of freshness, which is in itself an indication of how relevant, and complex, it is to establish a trusted and shared understanding of freshness in a RATS system.</t>
      <t>This document defines Epoch Markers as a way to establish a notion of freshness among actors in a distributed system.
Epoch Markers are similar to "time ticks" and are produced and distributed by a dedicated system, the Epoch Bell.
Systems that receive Epoch Markers do not have to track freshness using their own understanding of time (e.g., via a local real-time clock).
Instead, the reception of a certain Epoch Marker establishes a new epoch that is shared between all recipients.
In essence, the emissions and corresponding receptions of Epoch Markers are like the ticks of a clock where the ticks are conveyed by the Internet.</t>
      <t>In general (barring highly symmetrical topologies), epoch ticking incurs differential latency due to the non-uniform distribution of receivers with respect to the Epoch Bell.  This introduces skew that needs to be taken into consideration when Epoch Markers are used.</t>
      <t>While all Epoch Markers share the same core property of behaving like clock ticks in a shared domain, various "epoch id" types are defined to accommodate different use cases and diverse kinds of Epoch Bells.</t>
      <t>While Epoch Markers are encoded in CBOR <xref target="STD94"/>, and many of the epoch id types are themselves encoded in CBOR, a prominent format in this space is the Time-Stamp Token defined by <xref target="RFC3161"/>, a DER-encoded TSTInfo value wrapped in a CMS envelope <xref target="RFC5652"/>.
Time-Stamp Tokens (TST) are produced by Time-Stamp Authorities (TSA) and exchanged via the Time-Stamp Protocol (TSP).
At the time of writing, TSAs are the most common providers of secure time-stamping services.
Therefore, reusing the core TSTInfo structure as an epoch id type for Epoch Markers is instrumental for enabling smooth migration paths and promote interoperability.
There are, however, several other ways to represent a signed timestamp, and therefore other kinds of payloads that can be used to implement Epoch Markers.</t>
      <t>To inform the design, this document discusses a number of interaction models in which Epoch Markers are expected to be exchanged.
The top-level structure of Epoch Markers and an initial set of epoch id types are specified using CDDL <xref target="RFC8610"/>.
To increase trustworthiness in the Epoch Bell, Epoch Markers also provide the option to include a "veracity proof" in the form of attestation evidence, attestation results, or SCITT receipts <xref target="I-D.ietf-scitt-architecture"/> associated with the trust status of the Epoch Bell.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>In this document, CDDL <xref target="RFC8610"/> is used to describe the data formats.  The examples in <xref target="examples"/> use CBOR diagnostic notation as defined in <xref section="8" sectionFormat="of" target="STD94"/> and <xref section="G" sectionFormat="of" target="RFC8610"/>.</t>
      </section>
    </section>
    <section anchor="epoch-ids">
      <name>Epoch IDs</name>
      <t>The RATS architecture introduces the concept of Epoch IDs that mark certain events during remote attestation procedures ranging from simple handshakes to rather complex interactions including elaborate freshness proofs.
The Epoch Markers defined in this document are a solution that includes the lessons learned from TSAs, the concept of Epoch IDs defined in the RATS architecture, and provides several means to identify a new freshness epoch. Some of these methods are introduced and discussed in Section 10.3 of the RATS architecture <xref target="RFC9334"/>.</t>
    </section>
    <section anchor="interaction-models">
      <name>Interaction Models</name>
      <t>The interaction models illustrated in this section are derived from the RATS Reference Interaction Models.
In general, there are three interaction models:</t>
      <ul spacing="normal">
        <li>ad-hoc requests (e.g., via challenge-response requests addressed at Epoch Bells), corresponding to Section 7.1 in <xref target="I-D.ietf-rats-reference-interaction-models"/></li>
        <li>unsolicited distribution (e.g., via uni-directional methods, such as broad- or multicasting from Epoch Bells), corresponding to Section 7.2 in <xref target="I-D.ietf-rats-reference-interaction-models"/></li>
        <li>solicited distribution (e.g., via a subscription to Epoch Bells), corresponding to Section 7.3 in <xref target="I-D.ietf-rats-reference-interaction-models"/></li>
      </ul>
      <t>In all three interaction models, Epoch Markers can be used as content for the generic information element 'handle'.
Handles are most useful to establish freshness in unsolicited and solicited distribution by the Epoch Bell.
An Epoch Marker can be used as a nonce in challenge-response remote attestation (e.g., for limiting the number of ad-hoc requests by a Verifier).
Using an Epoch Marker requires the challenger to acquire an Epoch Marker beforehand, which may introduce a sensible overhead compared to using a simple nonce.</t>
    </section>
    <section anchor="sec-epoch-markers">
      <name>Epoch Marker Structure</name>
      <t>At the top level, an Epoch Marker is a CBOR array carrying the actual epoch id (<xref target="epoch-payloads"/>) and an optional veracity proof about the Epoch Bell.</t>
      <figure anchor="fig-epoch-marker-cddl">
        <name>Epoch Marker definition</name>
        <artwork type="cddl" align="left"><![CDATA[
epoch-marker = [
  $tagged-epoch-id
  ? bell-veracity-proof
]

; veracity of the bell
bell-veracity-proof = non-empty<{
  ? remote-attestation-evidence ; could be EAT or Concise Evidence
  ? remote-attestation-result ; hopefully EAT with AR4SI Claims
  ? scitt-receipt ; SCITT receipt
}>

remote-attestation-evidence = (1: "PLEASE DEFINE")
remote-attestation-result = (2: "PLEASE DEFINE")
scitt-receipt = (3: "PLEASE DEFINE")

; epoch-id types independent of interaction model
$tagged-epoch-id /= cbor-epoch-id
$tagged-epoch-id /= #6.26980(classical-rfc3161-TST-info)
$tagged-epoch-id /= #6.26981(TST-info-based-on-CBOR-time-tag)
$tagged-epoch-id /= #6.26982(epoch-tick)
$tagged-epoch-id /= #6.26983(epoch-tick-list)
$tagged-epoch-id /= #6.26984(strictly-monotonic-counter)
]]></artwork>
      </figure>
      <t>The veracity proof can be encoded in an Evidence or Attestation Result conceptual message <xref target="RFC9334"/>, e.g., using <xref target="I-D.ietf-rats-eat"/>, <xref target="TCG-CoEvidence"/>, <xref target="I-D.ietf-rats-ar4si"/>, or SCITT receipts <xref target="I-D.ietf-scitt-architecture"/>.</t>
      <section anchor="epoch-payloads">
        <name>Epoch Marker Payloads</name>
        <t>This memo comes with a set of predefined payloads.</t>
        <section anchor="cbor-time-tags">
          <name>CBOR Time Tags</name>
          <t>A CBOR time representation choosing from CBOR tag 0 (<tt>tdate</tt>, RFC3339 time as a string), tag 1 (<tt>time</tt>, Posix time as int or float) or tag 1001 (extended time data item), optionally bundled with a nonce.</t>
          <t>See <xref section="3" sectionFormat="of" target="I-D.ietf-cbor-time-tag"/> for the (many) details about the CBOR extended
time format (tag 1001). See <xref target="STD94"/> for <tt>tdate</tt> (tag 0) and <tt>time</tt> (tag 1).</t>
          <sourcecode type="cddl">
cbor-epoch-id = [
   cbor-time
   ? nonce
]

etime = #6.1001({* (int/tstr) =&gt; any})

cbor-time = tdate / time / etime

nonce = tstr / bstr / int
</sourcecode>
          <t>The following describes each member of the cbor-epoch-id map.</t>
          <dl>
            <dt>etime:</dt>
            <dd>
              <t>A freshly sourced timestamp represented as either time or tdate (<xref target="STD94"/>, <xref target="RFC8610"/>) or etime <xref target="I-D.ietf-cbor-time-tag"/>.</t>
            </dd>
            <dt>nonce:</dt>
            <dd>
              <t>An optional random byte string used as extra data in challenge-response interaction models (see <xref target="I-D.ietf-rats-reference-interaction-models"/>).</t>
            </dd>
          </dl>
          <section anchor="creation">
            <name>Creation</name>
            <t>To generate the cbor-time value, the emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-time-reqs"/>.</t>
            <t>If a nonce is generated, the emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-nonce-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-rfc3161-classic">
          <name>Classical RFC 3161 TST Info</name>
          <t>DER-encoded <xref target="X.690"/> TSTInfo <xref target="RFC3161"/>.  See <xref target="classic-tstinfo"/> for the layout.</t>
          <sourcecode type="cddl">
classical-rfc3161-TST-info = bytes
</sourcecode>
          <t>The following describes the classical-rfc3161-TST-info type.</t>
          <dl>
            <dt>classical-rfc3161-TST-info:</dt>
            <dd>
              <t>The DER-encoded TSTInfo generated by a <xref target="RFC3161"/> Time Stamping Authority.</t>
            </dd>
          </dl>
          <section anchor="creation-1">
            <name>Creation</name>
            <t>The Epoch Bell <bcp14>MUST</bcp14> use the following value as MessageImprint in its request to the TSA:</t>
            <sourcecode type="asn.1">
SEQUENCE {
  SEQUENCE {
    OBJECT      2.16.840.1.101.3.4.2.1 (sha256)
    NULL
  }
  OCTET STRING
    BF4EE9143EF2329B1B778974AAD445064940B9CAE373C9E35A7B23361282698F
}
</sourcecode>
            <t>This is the sha-256 hash of the string "EPOCH_BELL".</t>
            <t>The TimeStampToken obtained by the TSA <bcp14>MUST</bcp14> be stripped of the TSA signature.
Only the TSTInfo is to be kept the rest <bcp14>MUST</bcp14> be discarded.
The Epoch Bell COSE signature will replace the TSA signature.</t>
          </section>
        </section>
        <section anchor="sec-rfc3161-fancy">
          <name>CBOR-encoded RFC3161 TST Info</name>
          <t><cref anchor="issue">Issue tracked at:</cref> https://github.com/ietf-rats/draft-birkholz-rats-epoch-marker/issues/18</t>
          <t>The TST-info-based-on-CBOR-time-tag is semantically equivalent to classical
<xref target="RFC3161"/> TSTInfo, rewritten using the CBOR type system.</t>
          <sourcecode type="cddl">
TST-info-based-on-CBOR-time-tag = {
  &amp;(version : 0) =&gt; v1
  &amp;(policy : 1) =&gt; oid
  &amp;(messageImprint : 2) =&gt; MessageImprint
  &amp;(serialNumber : 3) =&gt; integer
  &amp;(eTime : 4) =&gt; profiled-etime
  ? &amp;(ordering : 5) =&gt; bool .default false
  ? &amp;(nonce : 6) =&gt; integer
  ? &amp;(tsa : 7) =&gt; GeneralName
  * $$TSTInfoExtensions
}

v1 = 1

oid = #6.111(bstr) / #6.112(bstr)

MessageImprint = [
  hashAlg : int
  hashValue : bstr
]

profiled-etime = #6.1001(timeMap)
timeMap = {
  1 =&gt; ~time
  ? -8 =&gt; profiled-duration
  * int =&gt; any
}
profiled-duration = {* int =&gt; any}

GeneralName = [ GeneralNameType : int, GeneralNameValue : any ]
; See Section 4.2.1.6 of RFC 5280 for type/value
</sourcecode>
          <t>The following describes each member of the TST-info-based-on-CBOR-time-tag map.</t>
          <dl newline="true">
            <dt>version:</dt>
            <dd>
              <t>The integer value 1.  Cf. version, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>policy:</dt>
            <dd>
              <t>A <xref target="RFC9090"/> object identifier tag (111 or 112) representing the TSA's
policy under which the tst-info was produced.  Cf. policy, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>messageImprint:</dt>
            <dd>
              <t>A <xref target="RFC9054"/> COSE_Hash_Find array carrying the hash algorithm
identifier and the hash value of the time-stamped datum.  Cf. messageImprint,
<xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>serialNumber:</dt>
            <dd>
              <t>A unique integer value assigned by the TSA to each issued tst-info.  Cf.
serialNumber, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>eTime:</dt>
            <dd>
              <t>The time at which the tst-info has been created by the TSA.  Cf. genTime,
<xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.
Encoded as extended time <xref target="I-D.ietf-cbor-time-tag"/>, indicated by CBOR tag 1001, profiled
as follows:</t>
            </dd>
          </dl>
          <ul spacing="normal">
            <li>The "base time" is encoded using key 1, indicating Posix time as int or float.</li>
            <li>The stated "accuracy" is encoded using key -8, which indicates the maximum
allowed deviation from the value indicated by "base time".  The duration map
is profiled to disallow string keys.  This is an optional field.</li>
            <li>The map <bcp14>MAY</bcp14> also contain one or more integer keys, which may encode
supplementary information <cref anchor="tf1">Allowing unsigned integer (i.e., critical) keys goes counter interoperability</cref>.</li>
          </ul>
          <dl newline="true">
            <dt>ordering:</dt>
            <dd>
              <t>boolean indicating whether tst-info issued by the TSA can be ordered solely
based on the "base time". This is an optional field, whose default value is
"false".  Cf. ordering, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>nonce:</dt>
            <dd>
              <t>int value echoing the nonce supplied by the requestor.  Cf. nonce, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>tsa:</dt>
            <dd>
              <t>a single-entry GeneralNames array <xref section="11.8" sectionFormat="of" target="I-D.ietf-cose-cbor-encoded-cert"/> providing a hint
in identifying the name of the TSA.  Cf. tsa, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>$$TSTInfoExtensions:</dt>
            <dd>
              <t>A CDDL socket (<xref section="3.9" sectionFormat="of" target="RFC8610"/>) to allow extensibility of the data
format.  Note that any extensions appearing here <bcp14>MUST</bcp14> match an extension in the
corresponding request.  Cf. extensions, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
          </dl>
          <section anchor="creation-2">
            <name>Creation</name>
            <t>The Epoch Bell <bcp14>MUST</bcp14> use the following value as messageImprint in its request to the TSA:</t>
            <sourcecode type="cbor-diag">
[
    / hashAlg   / -16, / sha-256 /
    / hashValue / h'BF4EE9143EF2329B1B778974AAD44506
                    4940B9CAE373C9E35A7B23361282698F'
]
</sourcecode>
            <t>This is the sha-256 hash of the string "EPOCH_BELL".</t>
          </section>
        </section>
        <section anchor="sec-epoch-tick">
          <name>Epoch Tick</name>
          <t>An Epoch Tick is a single opaque blob sent to multiple consumers.</t>
          <sourcecode type="cddl">
; Epoch-Tick

epoch-tick = tstr / bstr / int
</sourcecode>
          <t>The following describes the epoch-tick type.</t>
          <dl>
            <dt>epoch-tick:</dt>
            <dd>
              <t>Either a string, a byte string, or an integer used by RATS roles within a trust domain as extra data included in conceptual messages <xref target="RFC9334"/> to associate them with a certain epoch.</t>
            </dd>
          </dl>
          <section anchor="creation-3">
            <name>Creation</name>
            <t>The emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-nonce-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-epoch-tick-list">
          <name>Multi-Nonce-List</name>
          <t>A list of nonces send to multiple consumer. The consumers use each Nonce in the list of Nonces sequentially. Technically, each sequential Nonce in the distributed list is not used just once, but by every Epoch Marker consumer involved. This renders each Nonce in the list a Multi-Nonce</t>
          <sourcecode type="cddl">
; Epoch-Tick-List

epoch-tick-list = [ + epoch-tick ]
</sourcecode>
          <t>The following describes the multi-nonce type.</t>
          <dl>
            <dt>multi-nonce-list:</dt>
            <dd>
              <t>A sequence of byte strings used by RATS roles in trust domain as extra data in the production of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch. Each nonce in the list is used in a consecutive production of a conceptual messages. Asserting freshness of a conceptual message including a nonce from the multi-nonce-list requires some state on the receiver side to assess if that nonce is the appropriate next unused nonce from the multi-nonce-list.</t>
            </dd>
          </dl>
          <section anchor="creation-4">
            <name>Creation</name>
            <t>The emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-nonce-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-strictly-monotonic">
          <name>Strictly Monotonically Increasing Counter</name>
          <t>A strictly monotonically increasing counter.</t>
          <t>The counter context is defined by the Epoch bell.</t>
          <sourcecode type="cddl">
strictly-monotonic-counter = uint
</sourcecode>
          <t>The following describes the strictly-monotonic-counter type.</t>
          <dl>
            <dt>strictly-monotonic-counter:</dt>
            <dd>
              <t>An unsigned integer used by RATS roles in a trust domain as extra data in the production of of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch. Each new strictly-monotonic-counter value must be higher than the last one.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="sec-time-reqs">
        <name>Time Requirements</name>
        <t>Time <bcp14>MUST</bcp14> be sourced from a trusted clock.</t>
      </section>
      <section anchor="sec-nonce-reqs">
        <name>Nonce Requirements</name>
        <t>A nonce <bcp14>MUST</bcp14> be freshly generated.
The generated value <bcp14>MUST</bcp14> have at least 64 bits of entropy (before encoding).
The generated value <bcp14>MUST</bcp14> be generated via a cryptographically secure random number generator.</t>
        <t>A maximum nonce size of 512 bits is set to limit the memory requirements.
All receivers <bcp14>MUST</bcp14> be able to accommodate the maximum size.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO</t>
    </section>
    <section anchor="sec-iana-cons">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced-replace">RFC Editor: please replace RFCthis with the RFC
number of this RFC and remove this note.</cref></t>
      <section anchor="sec-iana-cbor-tags">
        <name>New CBOR Tags</name>
        <t>IANA is requested to allocate the following tags in the "CBOR Tags" registry
<xref target="IANA.cbor-tags"/>, preferably with the specific CBOR tag value requested:</t>
        <table align="left" anchor="tbl-cbor-tags">
          <name>New CBOR Tags</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Data Item</th>
              <th align="left">Semantics</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">26980</td>
              <td align="left">bytes</td>
              <td align="left">DER-encoded RFC3161 TSTInfo</td>
              <td align="left">
                <xref target="sec-rfc3161-classic"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26981</td>
              <td align="left">map</td>
              <td align="left">CBOR-encoding of RFC3161 TSTInfo semantics</td>
              <td align="left">
                <xref target="sec-rfc3161-fancy"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26982</td>
              <td align="left">tstr / bstr / int</td>
              <td align="left">a nonce that is shared among many participants but that can only be used once by each participant</td>
              <td align="left">
                <xref target="sec-epoch-tick"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26983</td>
              <td align="left">array</td>
              <td align="left">a list of multi-nonce</td>
              <td align="left">
                <xref target="sec-epoch-tick-list"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26984</td>
              <td align="left">uint</td>
              <td align="left">strictly monotonically increasing counter</td>
              <td align="left">
                <xref target="sec-strictly-monotonic"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="sec-iana-em-claim">
        <name>&nbsp;New EM CWT Claim</name>
        <t>This specification adds the following value to the "CBOR Web Token Claims" registry <xref target="IANA.cwt"/>.</t>
        <ul spacing="normal">
          <li>Claim Name: em</li>
          <li>Claim Description: Epoch Marker</li>
          <li>Claim Key: 2000</li>
          <li>Claim Value Type(s): CBOR array</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): <xref target="sec-epoch-markers"/> of RFCthis</li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC3161">
          <front>
            <title>Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)</title>
            <seriesInfo name="DOI" value="10.17487/RFC3161"/>
            <seriesInfo name="RFC" value="3161"/>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <author fullname="P. Cain" initials="P." surname="Cain"/>
            <author fullname="D. Pinkas" initials="D." surname="Pinkas"/>
            <author fullname="R. Zuccherato" initials="R." surname="Zuccherato"/>
            <date month="August" year="2001"/>
            <abstract>
              <t>This document describes the format of a request sent to a Time Stamping Authority (TSA) and of the response that is returned. It also establishes several security-relevant requirements for TSA operation, with regards to processing requests to generate responses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <seriesInfo name="DOI" value="10.17487/RFC5652"/>
            <seriesInfo name="RFC" value="5652"/>
            <seriesInfo name="STD" value="70"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <seriesInfo name="DOI" value="10.17487/RFC8610"/>
            <seriesInfo name="RFC" value="8610"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9090">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <seriesInfo name="DOI" value="10.17487/RFC9090"/>
            <seriesInfo name="RFC" value="9090"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9054">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Hash Algorithms</title>
            <seriesInfo name="DOI" value="10.17487/RFC9054"/>
            <seriesInfo name="RFC" value="9054"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) syntax (see RFC 9052) does not define any direct methods for using hash algorithms. There are, however, circumstances where hash algorithms are used, such as indirect signatures, where the hash of one or more contents are signed, and identification of an X.509 certificate or other object by the use of a fingerprint. This document defines hash algorithms that are identified by COSE algorithm identifiers.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="STD94">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="STD" value="94"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="STD96">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="STD" value="96"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-cbor-time-tag">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Time, Duration, and Period</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-time-tag-12"/>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Ben Gamari" initials="B." surname="Gamari">
              <organization>Well-Typed</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer Institute for Secure Information Technology</organization>
            </author>
            <date day="30" month="October" year="2023"/>
            <abstract>
              <t>   The Concise Binary Object Representation (CBOR, RFC 8949) is a data
   format whose design goals include the possibility of extremely small
   code size, fairly small message size, and extensibility without the
   need for version negotiation.

   In CBOR, one point of extensibility is the definition of CBOR tags.
   RFC 8949 defines two tags for time: CBOR tag 0 (RFC3339 time as a
   string) and tag 1 (POSIX time as int or float).  Since then,
   additional requirements have become known.  The present document
   defines a CBOR tag for time that allows a more elaborate
   representation of time, as well as related CBOR tags for duration and
   time period.  This document is intended as the reference document for
   the IANA registration of the CBOR tags defined.


   // (This cref will be removed by the RFC editor:) The present
   // revision (-12) addresses the IESG reviews.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-09"/>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50% while also significantly reducing memory and code size
   compared to ASN.1.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 Certificate Signing Requests, C509 COSE headers, a
   C509 TLS certificate type, and a C509 file format.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC-X.690">
          <front>
            <title>Information technology -- ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <seriesInfo name="ITU-T" value="Recommendation X.690"/>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2015" month="August"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC9334"/>
            <seriesInfo name="RFC" value="9334"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-reference-interaction-models">
          <front>
            <title>Reference Interaction Models for Remote Attestation Procedures</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-reference-interaction-models-09"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Michael Eckel" initials="M." surname="Eckel">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document describes interaction models for remote attestation
   procedures (RATS).  Three conveying mechanisms -- Challenge/Response,
   Uni-Directional, and Streaming Remote Attestation -- are illustrated
   and defined.  Analogously, a general overview about the information
   elements typically used by corresponding conveyance protocols are
   highlighted.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-scitt-architecture">
          <front>
            <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-06"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>ARM</organization>
            </author>
            <author fullname="Steve Lasker" initials="S." surname="Lasker">
              <organization>DataTrails</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   Traceability of physical and digital Artifacts in supply chains is a
   long-standing, but increasingly serious security concern.  The rise
   in popularity of verifiable data structures as a mechanism to make
   actors more accountable for breaching their compliance promises has
   found some successful applications to specific use cases (such as the
   supply chain for digital certificates), but lacks a generic and
   scalable architecture that can address a wider range of use cases.

   This document defines a generic, interoperable and scalable
   architecture to enable transparency across any supply chain with
   minimum adoption barriers.  It provides flexibility, enabling
   interoperability across different implementations of Transparency
   Services with various auditing and compliance requirements.  Issuers
   can register their Signed Statements on any Transparency Service,
   with the guarantee that all Auditors and Verifiers will be able to
   verify them.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-25"/>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
         </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="15" month="January" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="TCG-CoEvidence" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG-DICE-Concise-Evidence-Binding-for-SPDM-Version-1.0-Revision-53_1August2023.pdf">
          <front>
            <title>TCG DICE Concise Evidence Binding for SPDM</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2023" month="June"/>
          </front>
          <refcontent>Version 1.00</refcontent>
        </reference>
        <reference anchor="I-D.ietf-rats-ar4si">
          <front>
            <title>Attestation Results for Secure Interactions</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-06"/>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
              <organization>MIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
              <organization>Intel</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.cwt" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
    </references>
    <?line 499?>

<section anchor="examples">
      <name>Examples</name>
      <t>The example in <xref target="fig-ex-1"/> shows an epoch marker with a cbor-epoch-id and no
bell veracity proof.</t>
      <figure anchor="fig-ex-1">
        <name>CBOR epoch id without bell veracity proof</name>
        <artwork type="cbor-diag" align="center"><![CDATA[
[
  / cbor-epoch-id / [
    / 1996-12-19T16:39:57-08:00[America//Los_Angeles][u-ca=hebrew] /
    / etime / 1001({
        1: 851042397,
      -10: "America/Los_Angeles",
      -11: { "u-ca": "hebrew" }
    })
  ]
  / no bell veracity proof /
]
]]></artwork>
      </figure>
      <section anchor="classic-tstinfo">
        <name>RFC 3161 TSTInfo</name>
        <t>As a reference for the definition of TST-info-based-on-CBOR-time-tag the code block below depicts the original layout of the TSTInfo structure from <xref target="RFC3161"/>.</t>
        <sourcecode type="asn.1">
TSTInfo ::= SEQUENCE  {
   version                      INTEGER  { v1(1) },
   policy                       TSAPolicyId,
   messageImprint               MessageImprint,
     -- MUST have the same value as the similar field in
     -- TimeStampReq
   serialNumber                 INTEGER,
    -- Time-Stamping users MUST be ready to accommodate integers
    -- up to 160 bits.
   genTime                      GeneralizedTime,
   accuracy                     Accuracy                 OPTIONAL,
   ordering                     BOOLEAN             DEFAULT FALSE,
   nonce                        INTEGER                  OPTIONAL,
     -- MUST be present if the similar field was present
     -- in TimeStampReq.  In that case it MUST have the same value.
   tsa                          [0] GeneralName          OPTIONAL,
   extensions                   [1] IMPLICIT Extensions   OPTIONAL  }
</sourcecode>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIACQoKWYAA81c63bbyJH+j6fopXNiaSJQom6WmHhmKIm2tdHFkejMZuc4
kybQIhGBAAOAkjka5exD7APkxz5J9k32Sfarqm5cSEqeZM4mq5OMiWZ3dXV1
3atA3/e9u67a8bwiKmLTVf1pGozVuc5uTZZ7ejjMzN3iaJgGiZ5gcpjpm8If
RtntOI2/9zNd5L6hqf5Epvpbr7y80En4nY7TBCuKbGY8nRndVdcmmGVRMffu
R1111Rtcq2/S7DZKRuptls6m3u19V50mhckSU/gntJPn3ZlkZrqeUmaio7ir
aMevI1PctNNshOFRVIxnw64aF8U0725uynM7SCebNIsx3Pwc1p4X6KKr8iL0
gjTJTZLPcot5PhtOojyP0qSYT3Gc0/7gjefpWTFOs67nKyHLO5PcqiMLH1gB
t656k+lZMk5vTKauTwcYdbRd+sKebQwobYfl13lUtG/Kme3QYGJeZMYA06ux
iRI86Dw36tUevgnSEHi83N/dPtx7Sc+gc1ed6GyC2wgLnjFLigyDb0020cm8
RH4wTic6V2/SPNdFJNjrJPoeD2nSVb1sos6iSVSYsEJV1rTtmq+xDZG8vsuH
X5cbfGMi9V4nji7vZvoeIwMTjJM0TkeRySvA91EcR3rSnuoEk74e81yG7aAd
6ywvTKKOUjpGCfVDEt2B/6Liv/+rUEeZmWDK4N9Pa0Q7ioZxlBZjc4uRtuqU
VJLZJRFP/O2Dnb3DVSRTajpmrv7F7qG/u93xtzsH/v7O4XanOkGgh+nXxfcR
M6iXEJYFUCMevnpzvNPZ74B81z153Nvf28aRzq/l8WC/s4XHk5MzeT7cOqTn
o8sr//L0xI3t7WLs8rrvv+tdv/N7Z29p9fXg5HCXNlHKlyX8+XWX4R7uHto5
+9UcgKjNAdxtPJ76J22WnGCYZn4RTYxf6JFFoj84Pe83JqW5kZkmIeqFfmAy
0Pp4b4s2/Lf2Pg7Am1ht8yU/AEJyI5RJE1U4Tpir//mP/1S964t2RzE80g3Z
LDZ51y67npoguokCWZjeqCOdR4Hqu8lXNFmtHfWv1jfAKUmaYG5cfm+h2FnH
mKWgqtRJlBf4dhblYxMuATvBNF7opF6AMNeJumJssM3AxAasOpklFsOc2DJN
eEWoC5x/e6uz528d8EhuMvB+BEo4mKeDD/4At8FQTBLKMZmKQkSdjYiVnba7
v79vR8WsHSXFZmaCzYF/1T/2Zb4XORKXzHe4s7MrKtTXWTCuXyQPZgaaBoQ3
fkTn0gFt709wr3Fu18lDfWUOISoYHlREUMwynFLGgJGJpkW+tI8hbes+4dvB
8Vv/OO3fRSFt3n2K2INsBskP1XE6mc6Kym7U2KsFUOrk9LiPSUkQQTs6qBD/
hG8VRFHX70/OWyspWsgegdtiRDuQKG/eT8HtIAtIPZvGqQ7zTcKbNvPtZr7b
zLeb+djMp83835JuAjE77S3/ytxF/LC3812nNxthx+2t7Z32NLxpcMr2jr+1
zyNZ0FUWggKErSWK6mw3j8qrxWea0bvotYP7olt+ZonWI0hTZVefN6t/iw0F
ZUidkp7pn73BXYDjinGUtzzP931YPzJYAWz6AIMKLsUMLF6o0NxECeSs4XEo
GCSt7vVcFakyMGFQ3fkYQ0nqJP8mM/kYCzFxkuJeATrFwijBrBACnUXDGXFL
PseFTtqL8DOjcli1WGe0RYsUHZgouM1brBLo+2mWhrMAIGigDnI4pz1MSFJe
7rChYFrsLkcmjtvqmsdzjOtCsTDcmQU0wpROpMYa3wANItBt7WSznDgWcKNM
pfeJmiUhVpF7ReMgAqO9Ztqj9oa6izTQilNSePC3YlbeKsDA7XobmgrI6FCw
JGSmjpBakc7WIFwdt4rqhq4iMfeKr1tOgwvMx6ARaGGKewNbq2PaNYimES41
b8udT6IwjI3nvSBFydSkTT2vQZnEAAwO73QO9CL8RBPPgRwZ+sz8aRbhOrTb
cpkKOFJFNAxAUO/MHFOjysy0he/wP3tcbEALAw0tgcPT5xBeTcREgUuQFtiz
KIgOTCqwA5gBmOF0p4kamQToxhsVuiXFCK0S21Uca3E2n4KxTkZNPC07szTB
PDzF0HQQYh1NbDyNwT46v22TcBleC4I9PPSmU1iR6JPq0ZZ+qfkfH8G+OsYl
pjFhfg9xZ4yKdApzWsd1Q92PI1x7xJhERW5isAw+JWHNDI/Te5AsNnc6KTZY
XkiDxubTBpbQ2gUxtmqWZz51qxW5mAQcMFhh9v5JSsT7hysR7/+TEvH+0UoE
YoYTkEWVLY2NxXLLYhkOOU3lICU6LF7LFxVHt0Z4nC7I4kznAoPD66l9RbNL
DTIULeHiUrBeJftqbaizjDYfR6Mx5Cifw23DDRP1IEo2uoErak8N8DQ7SqAx
cG/RDftbRYTpMbggCeYqnMklYk94rz5cSdIMFedYeltOABSWXaIDnC+3sm6F
lKg9q39xD/ktrqHUvCyaQ1Ift4akGk8UA8OPyUS6QZ1kBTlnuQlBjG/GEXQP
3VtzCl8s45JrYqBURGEKJiG9jh3BrkQLvha5B6E+y57lC9HH4EqdReksVy2h
YxS2FIXjgonIPpsQHZDjnJIDVVGXUGUtn1sZJLIZhZsIa6xCxMrLAy2f18Y3
hB6FQlCuPv37+CjqjsLDUq1bJGs4YngCzXmHxwVAWE6EmeAIQFWsgJgjEo+p
hudK6hNgBxSLXRd6MlWDlC7LHRwsCmwQUzIyCvGKi8YQaA4o0gIBY/DVfaZh
EEIhMYJO4HJnYlwKn+b8+vERRnJhFwRAALLe1GXYsTavx666WCtM7klQVRk3
0ikLB3ifpUUapDHNfw/F0ius/IFXQMV7gpaMNihQLgmoJmleKL5gNsbka2d8
g2KBebWfE3xiLERXd1FAxnpA8g3KQolkptSGwpOOQJCuGQcvbDSS5h1yzNBk
CRYpWkTmB+JLM0xCuo62nqQphHISjawMTXUxFu6jqybHgp0dEgc9jGK4zRZL
OusGWVMDJiXX4o71DGUtMrJkLK2ZmULeiV3I+I+Y93F0PrlwY+FObFeWvD7V
cw5dRP4DHHQooswOGFlsNqeNs5JTkVoPRbwkQ7tuCItWJjjKg1mei6KfTYbY
FhvWAkklsSNxn7gUK4TsE2kxwWZY84+YOqRRfbgYJq7d1rKqJ7tLiixitZqb
guasEMlcUgnkeTBLUNaF5QD/siDQmQPYQOgKdlfu0wwndg5JU81uLGIR56nj
UZ6aiqVkNzeIZyG5sy26XEpB0cz0puXAMqHJPtWcT2Mjy43GKNhgFhfw0Sim
PT4dDJSLuekkzSgcPp/O8zSI2N2oPD46miKAs9Ivrfsf3osX6ko8cLrmXF2k
srm4mrcG3mOagaNa5x+uB60N+VddXPLnq/5vPpxe9U/o8/W73tlZ+cGzM67f
XX44O6k+VSuPL8/P+xcnshijqjHktc57v2sJu7cu3w9OLy96Z61Sc5ZsycqD
uYlZEZLDfmfugYsDWFRRh0fH7//6l84uqPYviFq3O51DkEseDjqvdvFAZlB2
SylykEcQa+6RToUDGIn7EuhpBIWAO9FkBcnhImEEIb/4lijzsat+NQymnd0v
7QAduDHoaNYYZJotjywtFiKuGFqxTUnNxvgCpZv49n7XeHZ0rw3+6iuoQKP8
zsFXX3rsLDXuY2NBzkiROv3jbkSUjC60NYc5OzGkDjRpKBa/hwf3BBhk4Nko
h5EeJbASiGESy6Z0Dc5Q8rprI9rogEMiseF8r7Vw6a18ZzUBwleRiNOTXLie
Y5F6yqvuX4ltScgbrdQTlorOpWxJ6StDmZFIIagUD/aZmFNl0IScv4IFcTEf
tGMIV+nWiF3QrOxt5FVXvbnVOrTexHqYZuQhVSEC6x+xlIuxRUW6ZbnSFD+K
SyoOvag2IQGuJqedYwgHQWC8yZ5vPE2hxm4ryLzhbChpw7w0jxOjE6YA6cgi
upnbWKM6IOv/trpOxb8AcLAMXPVxGoo1KO+vDNTYmDEqjmM6W+0dpyKXOQAs
XYuv2zbpURq/czF+Dy+WU6uPwlSrTGUczyhrVtRuILfYiOubwZu1tC3RunJp
3BUINFMXhfM58Ckzq1DoQm8pHfrjNOBEDDgzr8eKMNBxbGCjfQnFclNN02GY
GSaiLupeNuKhZuiGm3M0ftXuiJj6tXTz4yOQmCVgtiigOlQzGqphg2jJD2Gp
ApuQtzcMR2qGzaEJhhm8H5/M5QSGE3EaJ/6Ffj8aw+0nMPw8fhCY2ZCUXOkN
/OhNd1ZuSrdJVuep61v0S+oeH8hhE9rsvRL7MGNAedbTUcb6hC9J2cTmZdt7
xx9EbtgnB7ibWdzMsjSyN/W745TPakrZWLvufvQWEgoLB6BcDjE69ljJiUsK
1V4GHTimoqYLBiqPdZHZOU/zW5AFvmKGUOUDe4t6AS+bpLTa36GSSVBq85cL
S4bsoRNVXY5toueVIiJmQfgVDaHnU+i5sdGSVePIGHDFbS3zf0yImrGyu1yX
rvLDC6iOZrUeDOQir3Sq2LfeWMIzIjKzedVZBgwD/DN3dAO3zSBopX+9BsPM
O7hI4/Fx3fnk4gNjdtPvVbBHs2LZ8fwz/lQQhrFXx1m9Vt96Sv2s0CMEBvY4
EZWmvwJF49h3wH0G7n30vF9WG1rtTRO9FbMBnJIuZjIt5r96YJjCQ36Nh3zn
i6tfUoU4pvSV6vcGpFUWq05PgRDHHQDGiAEhO/AoCQJ75b2r3etTdRzraJLz
+oYfjzUNT997hJv1HJKv1Vqnq1rvz/q967466b85vei31lctsUhhwfaKBU0s
MGlnxSTQ2t2IDbUQeRryqkiFrIoHvcWbVJuvlVSU3dWumvFiv729f3iwtRbE
iGoo4eZnNwFV132E9D4psPXnFnbW3DR/iAgv9HF+LnG7ivezq7fXZJAyVs9O
3KlN9KEXi2dn766RMgyKeA4NDweWqtc+NyFA87A8eA9d9eImGjXE2CchgXBS
hHrr6xjB+etWbG4KLnFyZfR1qyHS7GdFdAkt63wsiKRVs7VcFWkFx1Jg9F5N
p14J31iPbsZ2N8/1aNEn2lCifEVxue+MLuirh4dmFVjGatVNGvhRYa7ErI3z
vndpj4cXC9rJFhImkAZSrsbmU7VLHCBedE6pW8PwX4hGpJSWGugR4oKejHAK
q8zQCIGCcZrmpZ8h0/RIbam1PxSUq/zDBreG7OwcynI2bMQKyQhOAU3t0FR8
hZnvAepTOS8iscrUDTAr1ukTz97awgLzqSC5k+SQxFMwuRNAdIoYWmc4I1se
ulM7I3JtTC1U2ilDJekAQcDkPIY1Snyug6EQz8BhrVQ5n9Kh4DEKNrm55lBc
h0NuTJVJZaCWIjJrS2yHHN0uXG+YhoamsLZBla0r9PCVHIoMgWE0WNxo/7WH
L9QatU4UoPW6ev0lNps/QomV6zGX0VGbQsRNxSCorUdUK63E6FD+ASyRUhap
mzSO03u6dhfYIg7RZOaN8zXYWWicYKKnbYsoXO+u6okjRbWFdJYF9VRfxWXi
C5mIwz/JoWYW8bVanroMuplRhBj2a3evbXs02btmshF9huDd4RwwhTNLHwyX
nGnLXyvdsBWBzVpuzJI3SzdLogXZyozLMaU2WilMRS3GnFPaZVkI6ihTnE4R
stsKVS1vxe4zeUCs4fGVqIrTm8qJzMu9wr8HMEOpIIuWcOaJJFyRfaKUM7c/
WYfMmS1ryKCR6gn8hwfu5oFwuEy1S/W3lZUeu9AvKJa5SWvCGes5xLEpL0+a
S3Az3W7+GQ7mS3gaCBl9bPj0DOYsAr6qTFGSX7xud1RRs9cus+/qDfP2Mrs0
nEi5N8oOFY3TSDUErHsudup0Ms1IkUqB27n+rpgGFLpMQqxI2h3vuv+bD/2L
47564FaX2oNSl0f/2j8eSM/Sdruz3z7Y3Wp3oG067Z32bhtDYP2x3t7bl5ay
iw9n1Or3iP9fHg/6A3U9uDq9eMvfHb3Z7fcPO7s7/TfbO9uHR52jV68ODl/t
9nonu7t7W/u7h7tbR4fHvf7Oq53jw/7OXu/V0fbOzn5n+4CciTfeo2dvUtoe
uBg31j42V2ONEM0qICvOrf77y+N33x31z85ato+AyM5Ul3pTOqSkVVUTBWGE
wkMBwrUlC5S+oyqBptCj7V26bgt305GrO95SEkhkCiR34Cj/orPQZf5rV0pd
ixVk7hclRRhToWzFxqWpLnnNNmE+JYY3OgnmEMJvfx/l+cx8/GmdxZsMJN/s
HFQQu+qU/pU6PSdHupbcz3ukXC83sLeUtyDbTUoIrEyeNVVtnch5ldgIsans
RRU1aqapyl/ihlB1q2yqqNTE51B5zfz+87U725TWJVMNA3rX4eEpxfdzjHZ4
NOX47Odrk6a4ddU2f92UQp5JrZE6vpCgvKt2eB7ZEcTUPMGwSuiqXf4GTutN
FJNTba3+V5iSZpQew2m7ao9nDdM0Vm24c5rc1Rsd526q6P+u2l/Yh74rco1v
XvE3byVxdqF5ky/Uz35mSdwnR4c7EyB13l0HBOp4XsouCXkbnc7akJ2MTXnc
lkfPW9BA4sCQdPZiQlzoQc+/ZZ3VZVeDfJnmkWtODT2e6+m6Zz/Yu+oQ/n8u
yeMfNOgWzqRSyadiRNgZwmGWphC8+hyct0YWOkGdTANiMD7HRn3YnYaq5h8R
NJIlc94mq8n2PmkSspl72wdbYtEAapNV99/uZH2On8XteujeccX90bN83bW2
ynKENRwdmN7jm7aykzZqnvI2KXn2lsVG455YFLrsyjln6/L0BNKZDv9ILRs2
Zx0Z8d3XwCvknoFH1isPzwktoL7MLUxp5LGpI87h5IUY4Xudl7V6i6ssWYWq
V6LaFM8K5UarORCnge/egSe/exNxl9NSVojNi45HZKXHE692RFudlhlCTntF
VfWe0oJQ3xOLehOtDe85atf1hhxglkSw5gs3SJpytGDJKHupudENyjksiSlI
NAA/f+GsmRzjSJhWrLqkMaWjqemJasxFAxd7cHhDBOvZE/etVRM/vBbvLTj2
G65hTzYqY1BSGRulHvAARiSKEv8+H6E15Ao4YLbIAjkzKoaEyr+dEjaNPB2e
ti1AShsAQEsHAVRKMH8CrH9Qth5azMWFmehP0WRG75poQpSYxdxFoprKOohc
c+PItXPYemKp0SD9ABflJR24GhnlvIHzj4BTXnZT5Y18Jjg7Dt3xAEyd934n
LQCUYOeO0oRjskmaVaxIAOuZXyEBvbAym9pGDJ3NG7n4b39f3HQ+tsmXoA/g
b6f9ZonlaAd9LWqb9gaYK2J3YZ23U6PU5MpmlJZ6UOoK0BlPYmSym6bW8ont
7sdGgk3HzVZqavJkU0gMyIS209Rj/atSqe81ruRJwhKN0pz7vNhw27vNvRab
8JaVFofx89Jpo1u2SBaSCcZpWQZgR4AvIKqOYwOCNLNb8azaPt7yPvAaaBfK
ziej2MD7LHCXNQuYW71ZIdvptG1Nem+L2g+kzCk5/jE5AhSe2AJnia8uC5o1
xYHNn6fCCr9FtCUX5/MUfmlBqYMyAdQ+rFXE17mqwbJhZL3wj0OEUgGeMC0Q
ukg5dIcSJGNvyg2V9E1w9yRVIdn1xxIq1CXVPFsL9habPflG7HkroM8f+6cF
i5O/LVjkTAU1JHick4Ln59w6+ux39jfwj4vHNmtTxDfC55efiwDtyzHNv8+F
hS/hPf6EuPBFmVsdRMFto6hESW6qKCX1CVw9EiGAXGuyxcM4Harchi1ch6X6
FXWdzibSb1YFIr8UWD7B8rxqn78j91a2ZgoAm6moRjgz0Zckmku/Uj9lLefF
GWjWhKJkOQUGJcFl9yyNbfqY+yulscq+UbCYJuM+Cc6rL2fN84W0OUub69zi
TlKXrS3bSLi7YSV//6QMFoE7p/vxL/iLswgnWrxxLmvQtSv6QMzDUChWTcKV
N9xmO1neN8scu14XrpbLySsL7cJBA+twq3Q8b8vLoxIGb8ja6vsmmHrLPYO0
703w1f2RrkiUOWbQTVJHyXyh5GwRBcS7NL4jl5pFJzPcSP8U6rpOuqdYmkla
Z0KmJgdRv6gz68cfwdtMZ7lCx9y1IQZsU8pCq4AtR42781X8TEd6jpN562n5
bo99+2aJpakZrmy4tGb1cz00P5bxVZ9uIFm6AddaxuLIL3YHM3obcgFdvQrh
turl8Pltd0jtvZ1Vs2vdVS6XXHqii1dQdQrk1IzEzrDzh1xTv8q5bZRPzx0U
N7Zf36WpufI+pX76jGmT4ErgAvJpP7P//5GauLaFS3XuCpecojqVDlrur7Ve
p+iP5UInqxA3rCYNMFEFxjqvNkPpXFluZPnEV17riq9aCoaLLQVPF1ohfLMf
Z0yegWHl7+kZrsCy5LevFsHPmJMVQvjPk0Nz/xxlxJ2a0GEQHdB7M0SusbZy
q1khS+JW0v6N5mNhnqqC4/H7ClUW2tbImPurt8z49RIBKXp6BcwaTxMjihQ5
uK4GV9YnJC1dlSvkVDydX8OCsCJkwln2d9WQ3ETqQafOnulcrUnjT/mG+/oz
wIaNce4gC7L5tEhHmZ6OrXTY1x9sic52MtllKUlKzwXNLr6Jvmfdv9fZFuw4
s8zuGDdFieIwiFbnDQ3Q9nrygpZ99cihqKlHaeH1m1qozvtxZ5L7BRDqk6le
MaKm2suTS+6Y7F30Fr609xPpRNML2Dnn5rMbXLNv8/4fl0f4Fw1UP4xAgK6a
xtzF78oEDw8/pzeUqanbdcFjNjvTVRsY91oSEMpYUbMMvVw3FufBsucFOF26
APSoiaZ70Zoa9OhEURkn2PeUYnrDrlgMNWiJk+ZWCbmFtSPyYubew0PzRW7K
60z5rX1cQe01TiviQZXnEZ4qkYD6+YGAqx/UCamQU3qj9Afcj5QXcnyuukh/
wFzfV4v/wSi34OCRC4cEq7+yzsJllh+s8Visdz4StasrcWA7WECplB9q1Rv7
vuIi5LyGdXMPKeY8scM2pi/FEBhzJnzhHUV5QZTf85pqOAZBNNWkPobc8GDf
puF3A1x/IkMhn5LUYm1NiWYtbHoCxx3Ch/MEhJdzieue3jIsccifALiLBTM5
54+2teUeK4z20jbUoFQM40oGVL0hyXUjNUSHepBevPjrX2iwf66OvxlI91td
pMyEGCaauIadvPFDIDoM85Vhu43KRZi+MUP75pw011WCpZxg3Rfs0XxhEbjg
X5wxk3LgxJTdu83fSCpn/NrM6bcbtrbKEYnnqRCylq93a52UNIPfbyKNB9sQ
x/AL1Gn/+i2+af7SyYltu2cI9Qt3jZzNe5C374eaYmaE6+69iYcX5UsT1u2T
R/HsuK3sk98BLHpvpfYanO28dEa/0bBC6jFJuZlyoYms9LcaiZDNhfWbyqVH
OoeH+35n2+8cDjr73Z3D7t4rf+ugu7X1bW9CXcl6c/Mszb/rgWA4wcdvZ36g
X4/NMDP3H8sEirF9OtLfUyZIOl11sNfZ2t3eOXy1YUd9+q2dloNdA92qZmDd
g2rRTi3Mlc1aXK5X6pFK+B/5SEmqVhAASH1c6NoDeRcb9QJq4MnqrXrSOuU6
aonq1FS1YgMRnEZnia1oL/aEwAegPEz5Ay9li0jVCUgM9Lkymby4EXIKB1Ep
UEKcEJoptILIX5pFoyjh15mp9aRWflt4y5I9tLKVxXKK9Fe4yd3u66q9Qvor
XLl55d/pxaD/tn+Fqequs9ZZV498j7ZYtvoP27/n709DnryQ42v+nS8UooRH
/Jrbx7ZXu+YkcrZ5xP5EAGezIWvlwrK/Av4oDTaq3k8cT7a1i/2yJwYGp+aQ
QYGH80WPzEYYuQMwm9KMzv4W+4BtGrYVp9W0sslr+HKhlKUw5mo4Kxf0nvrS
vTbGIMoy/aq/o8vLs37vojF20n/T+3A2UG96Z9d9BiGW8Im/ki2exaK6yCFF
UvJ6bXSz4v6kuMoTyoXQn/W7bNPvWzmngBrgiid5hMlOLQZP/n279bFeN3gC
/1pefQWIzkd1ev7+7PT4dKD69ZkOBrUgScD7Atd2m6T3sQlH4vVDe80ScYxN
SIbj6MT7X2BJCNhGUAAA

-->

</rfc>
