<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.1) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-bormann-cose-registration-principles-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="COSE Registration Principles">COSE: On Registration Principles</title>
    <seriesInfo name="Internet-Draft" value="draft-bormann-cose-registration-principles-00"/>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization>Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Postfach 330440</street>
          <city>Bremen</city>
          <code>D-28359</code>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.org</email>
      </address>
    </author>
    <date year="2023" month="July" day="24"/>
    <area>Security</area>
    <workgroup>CBOR Object Signing and Encryption</workgroup>
    <abstract>
      <?line 47?>

<t>COSE (STD 96, RFC 9052 and RFC 9338) defines a number of
registries that allow registrants to exercise the numerous
extension points defined in COSE.
Section 11.6 of RFC 9052 gives the Designated Experts for these
registries considerable leeway in deciding about registration
requests.</t>
      <t>The present document is intended to collect information that has
been the basis for initial population of and further registration
in these registries.
It is intended to be shaped by the Designated Experts and serve
them as a collective memorandum and a checklist.
As a secondary function, it is also intended to help registrants
create registrations that are acceptable to the Designated
Experts.</t>
      <t><cref anchor="abs3">Revision -00 of this draft is an early skeleton that should allow us
to decide whether such a collection of information is useful and
whether we want to flesh out this document.</cref></t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-bormann-cose-registration-principles/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        CBOR Object Signing and Encryption (COSE) Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cabo/cose-regprin"/>.</t>
    </note>
  </front>
  <middle>
    <?line 78?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>COSE (STD 96, RFC 9052 and RFC 9338) defines a number of
registries that allow registrants to exercise the numerous
extension points defined in COSE.
Section 11.6 of RFC 9052 gives the Designated Experts for these
registries considerable leeway in deciding about registration
requests.</t>
      <t>Specifically, <xref section="11.6" sectionFormat="of" target="RFC9052"/> says:</t>
      <blockquote>
        <t>11.6.  Expert Review Instructions</t>
        <t>All the IANA registries established by <xref target="RFC8152"/> are, at least in
part, defined as Expert Review <xref target="RFC8126"/>.  This section gives some
general guidelines for what the experts should be looking for, but
they are being designated as experts for a reason, so they should be
given substantial latitude.</t>
      </blockquote>
      <t>(<xref target="RFC8152"/> is the previous edition of what is now <xref target="RFC9052"/> and
<xref target="RFC9053"/>; this document established the registries being discussed,
which together make up the <xref target="IANA.cose"/> registry group.)</t>
      <t>The further text of <xref section="11.6" sectionFormat="of" target="RFC9052"/> gives instructions about
the general operations of the registries, but does not discuss the
architectural and structural principles that might go into a
registration decision.</t>
      <t>The present document is intended to collect information that has
been the basis for initial population of and further registration
in these registries.
It is intended to be shaped by the Designated Experts and serve
them as a collective memorandum and a checklist.
As a secondary function, it is also intended to help registrants
create registrations that are acceptable to the Designated
Experts.</t>
      <t><cref anchor="abs3_1">Revision -00 of this draft is an early skeleton that should allow us
to decide whether such a collection of information is useful and
whether we want to flesh out this document.</cref></t>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The definitions of <xref target="STD94"/> and <xref target="STD96"/> apply.</t>
      </section>
    </section>
    <section anchor="cose-registration-principles">
      <name>COSE Registration Principles</name>
      <t><cref anchor="warning">This section is a skeleton and needs to be fleshed out.</cref></t>
      <t>At the time of writing, some 172 registrations have been made in the
COSE registry group <xref target="IANA.cose"/>.
These can serve as a body of examples how to make registrations.
Unfortunately, not all registrations in this set demonstrate
outstanding consistency in decision-making, so this section will also
collect information about where existing registration decisions turned
out to be suboptimal or at least different in structure than
registrations of a similar nature.</t>
      <section anchor="general-considerations">
        <name>General Considerations</name>
        <dl>
          <dt>Code Point Frugality:</dt>
          <dd>
            <t>COSE is designed to work in environments where at least some of the
devices have limited resources; curation of codepoints so that the
ones that are most frequently used with such constrained devices
receive the codepoints with the shortest representation (and can
continue to do so over a number of decades) is always an objective.</t>
          </dd>
        </dl>
      </section>
      <section anchor="cose-header-parameters">
        <name>COSE Header Parameters</name>
        <t>...</t>
      </section>
      <section anchor="cose-header-algorithm-parameters">
        <name>COSE Header Algorithm Parameters</name>
        <t>...</t>
      </section>
      <section anchor="alg">
        <name>COSE Algorithms</name>
        <t>Algorithm identifiers in these registrations have a <em>Recommended</em> Tag,
which indicates (<xref section="16.4" sectionFormat="of" target="RFC8152"/>):</t>
        <blockquote>
          <dl>
            <dt>Recommended:</dt>
            <dd>
              <t>Does the IETF have a consensus recommendation to use
  the algorithm?  The legal values are 'Yes', 'No', and
  'Deprecated'.</t>
            </dd>
          </dl>
        </blockquote>
        <t>Note that an algorithm can be <em>deprecated</em> already at registration time.
This value was used in the registration of the
<xref target="I-D.ietf-cose-aes-ctr-and-cbc"/> values which only can be used under
very specific conditions.</t>
        <t>Algorithm identifiers are usually assigned so that a single identifier
stands for a collection of underlying algorithms, with main parameters
such as key or hash length chosen, so that a single algorithm
identifier suffices to fully characterize the cryptographic operations.
A key is the obvious exception, but also parameters that go with a key
such as its curve type.</t>
        <t>Where a certain underlying algorithm has a small number of possible
parameter sets, all registrations for the use of that underlying
algorithm in a COSE Algorithm are made at the same time.  For
instance: A128GCM (AES-GCM mode w/ 128-bit key, 128-bit tag) we
registered together with A192GCM (AES-GCM mode w/ 192-bit key, 128-bit
tag) and A256GCM (AES-GCM mode w/ 256-bit key, 128-bit tag).
The expert (in this case the author of <xref target="RFC9053"/>) did not make
separate assessments how useful or desirable the individual parameter
sets were going to be, but registered them all at once.
When the collection of
AES-CCM-16-64-128, AES-CCM-16-64-256,
AES-CCM-64-64-128, and AES-CCM-64-64-256, as well as
AES-CCM-16-128-128, AES-CCM-16-128-256,
AES-CCM-64-128-128, and AES-CCM-64-128-256 were registered, these were
also registered all at once, but grouped into two groups with
different representation sizes of the algorithm identifier.</t>
      </section>
      <section anchor="cose-key-common-parameters">
        <name>COSE Key Common Parameters</name>
        <t>...</t>
      </section>
      <section anchor="cose-key-type-parameters">
        <name>COSE Key Type Parameters</name>
        <t>...</t>
      </section>
      <section anchor="cose-key-types">
        <name>COSE Key Types</name>
        <t>...</t>
      </section>
      <section anchor="cose-elliptic-curves">
        <name>COSE Elliptic Curves</name>
        <t>This registry is governed by similar principles as the COSE Algorithms
registry (<xref target="alg"/>).  Curve types identify all parameters of a curve and
are registered all at once where natural groups of such types exist.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document is about registrations in registries that have direct
security impact; security considerations that require discussion
beyond that are mentioned in the discussions above.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <referencegroup anchor="STD96">
        <reference anchor="RFC9052" target="https://www.rfc-editor.org/info/rfc9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9338" target="https://www.rfc-editor.org/info/rfc9338">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Countersignatures</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="December" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. CBOR Object Signing and Encryption (COSE) defines a set of security services for CBOR. This document defines a countersignature algorithm along with the needed header parameters and CBOR tags for COSE. This document updates RFC 9052.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9338"/>
          <seriesInfo name="DOI" value="10.17487/RFC9338"/>
        </reference>
      </referencegroup>
      <reference anchor="STD94">
        <front>
          <title>Concise Binary Object Representation (CBOR)</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <date month="December" year="2020"/>
          <abstract>
            <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
            <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="94"/>
        <seriesInfo name="RFC" value="8949"/>
        <seriesInfo name="DOI" value="10.17487/RFC8949"/>
      </reference>
      <reference anchor="IANA.cose" target="https://www.iana.org/assignments/cose">
        <front>
          <title>CBOR Object Signing and Encryption (COSE)</title>
          <author>
            <organization>IANA</organization>
          </author>
        </front>
      </reference>
      <reference anchor="RFC8126">
        <front>
          <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
          <author fullname="M. Cotton" initials="M." surname="Cotton"/>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <author fullname="T. Narten" initials="T." surname="Narten"/>
          <date month="June" year="2017"/>
          <abstract>
            <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
            <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
            <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="26"/>
        <seriesInfo name="RFC" value="8126"/>
        <seriesInfo name="DOI" value="10.17487/RFC8126"/>
      </reference>
      <reference anchor="RFC8152">
        <front>
          <title>CBOR Object Signing and Encryption (COSE)</title>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <date month="July" year="2017"/>
          <abstract>
            <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8152"/>
        <seriesInfo name="DOI" value="10.17487/RFC8152"/>
      </reference>
      <reference anchor="RFC9053">
        <front>
          <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <date month="August" year="2022"/>
          <abstract>
            <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
            <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9053"/>
        <seriesInfo name="DOI" value="10.17487/RFC9053"/>
      </reference>
      <reference anchor="I-D.ietf-cose-aes-ctr-and-cbc">
        <front>
          <title>CBOR Object Signing and Encryption (COSE): AES-CTR and AES-CBC</title>
          <author fullname="Russ Housley" initials="R." surname="Housley">
            <organization>Vigil Security, LLC</organization>
          </author>
          <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
            <organization>Arm Limited</organization>
          </author>
          <date day="25" month="May" year="2023"/>
          <abstract>
            <t>   The Concise Binary Object Representation (CBOR) data format is
   designed for small code size and small message size.  CBOR Object
   Signing and Encryption (COSE) is specified in RFC 9052 to provide
   basic security services using the CBOR data format.  This document
   specifies the conventions for using AES-CTR and AES-CBC as Content
   Encryption algorithms with COSE.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-cose-aes-ctr-and-cbc-06"/>
      </reference>
    </references>
    <?line 214?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document was motivated by a discussion at IETF 117 Hackathon.
The author is grateful to the many contributors to the discussions on
the mailing lists that build the basis for this document.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA41Y23LbOBJ9x1egnIfYWVETyY4nVmouinIZ19YkqcRTW7tT
2SqIhCSsSUBDgFY0Lv/N/sn+2J5ugBQlO9l9iEOBQHejL6dPM8sycTORp0IE
E0o9kUez959eT+R7Kz/qpfGhVsE4Kz/UxuZmXWp/JNR8XuubtPXr2wqXW1VB
ZFGrRcjmrq6UtVnuvM7q3qFs3R3KShW0D0Lk+H/p6u1EGrtwwjfzyniPzWG7
hsTL11dvpHwkVekd7DC20GuNPzYcDeTR5fQl/nM1nj5evYEhEDYRubNeW9/4
iQx1o4WqtcLZTzpvahO2R2Lj6utl7Zo13ezl+4/y/fxfOg/yk1laY5dS2UK+
tnm9XZPVR+Jab3GkmAhxo20DDVL+/8flMTnv5AiHKmVKnCG//Gx0WAxdvaT1
pQmrZk5v1Nx917qNnHUkhGrCytWkM8M/CTfhXrOhfBm9zGvR+zNV+6Dt3hto
mMjfrLnRtTfhP/8O8mWtK2y6+sclb0BstA4T+cH5sFD5Sp6ePj07e8rvcnhr
kg7EBVdAz6ts/Pz02UVaaWyg6L3VpHTLi+uVs9j3l7OL7Gw8ysaj59n56cV4
xC919AJd9efwpyEfCCEo+BAQYChd9dPVq4vzCe/PsBceSYtnu0WkGT//MJEf
38yeX5yRRZfTd9Mh7Z+IR5LXz0dPsbkoShF/j8YsmB+fjdPjxdNnpwivyLJM
qjnla47c/P2feB5ln3dPUTtXwzHMkRfnAzoucX7Mcecfp6fPT2ShF8ZqL5W0
TTXXtXQLPpwKwuBVWKmAzC7dpl1VNmDZSf1F17nxGls0nddINx/d9wUhpvqQ
a2dod9RTIC/YriHvQq5z7o1Gw3Mo3tm4hIM9S32lPfIVBYNk/bLWNUQhBPSK
nb1nKFWUKXSt5qWWpdYbtSV9hc5NwRk/d02Q/VJPEv5oUOR+mBw47lw5bl15
BUvWNVTaIAEjuCkejIf0QGVekDNyV5ZUX12O4GLsupWKPplrbflOc+VNvIax
JhhVwknrpoxH4AaK0KKpsbW+b62x8fK9i0dnXt6zaK6lX6k1fsy3X3Mm6fK6
vonOxKZKKsqGdBvEQVa6cgh50VS8G+9WOr8uoTwqntJ+r+H9QtVbWG45qgNp
2CLCxD2zVrpc9zMpVijQL+i967aZV2up8lyvA8cVAvavwsfTddoQnn7uHmIA
P+obw+mYPX1KLg4rWMZ9gE20Uqu63Ep/rUsd2sD5lWvKIqV+Smyo53zScrPS
HCHfAI52Dosh7CcBFDReL5qS3MdC2qMbSIEHSOgC3WYlKT+jaSnJhrHYKwNk
0AJgcQkcc0XDivql/2kNqxYmh7Hbgby9faC0qLLu7qRXWw8QuZ380big78SP
vGfY+pBdpTdQhDhEPV78iF3TsmTPE3b1qw6lg8AYv4p59nuCrM8UuIGEG0ut
PJUFZKxVHQYdFiDR9nX+npDv85BKDm7w6RYRD7yrNIQstUWNl3LZIAwloxfV
0oZCRgbqlNopfKiC0rlrAgBsG8h5EyAEG7ecWnNNb4pdZcAq3UMahbsqT+ns
XTzVySVbYJhFCgCMEUgqZSrj0BQakTu+vU3OgNtNxDOgyI0BSkpdmDZZ2HK8
t0gzPpIiRenS/j69u3uxnxp7jifRvZikSxmfN97rYiA2K4MsDW4ZE69S11o2
az52e9t1I+hMQraROgxPhCDsa9EoANfJ4m/lV4yV6aVPBF5BytrYOTg4FTlX
Y996DhGuqckjob0FbQJHylcmQHVDQhi7WAv/3NG2WL6VWa6CXDL4OKlEH1u4
iAkQ7oM+YcejR3LmLEKb7IeiV5S0JpYD+6TYLSSXUOOPYUu/zunXel1uh1S6
32KnpHujaiJmn/vPk/06MAy1LUiRIqt14RPYM4YgGeBsKJzGagim0pxkIJWQ
OOAqkqPvxwdYu1I3OraoSgHdYpsRbPN+TuwnzJB8gW6UA0O5j8T2MXfFlrTq
L6riiKyQ27CSE29P8VD8RlgZGqo+wi6KOVDswDy2hz2BjEBDsvxKC9yVSo/7
O/d/4pZ51/cpxBmUppu3MqI3NwZqqD2Jh3p3ZAuA6pogBXJJxYM5BP83NQBN
MHzHvtvMHXh1Rale70CwMIsF5BF5sF3qEn1SVuzfl2iA9KYypapBnGnbkPPy
baqgWUt2UkrOQHpBj5Hr8k3dLFVJrFiISUw7wg2GuNiCabQgE7S9MbWzBCc+
XbWzlfMkFqcoAFq5TklSwioCSvAh19RYfiExsnTshdh3In3s8IjKwlnda+gV
eLxcMPOyAY0XDbJAPMIqttM8xpe7RNIN/+Sa6AgldU8HH6I1wHJNwxrsSlQt
mnRMZYL0pIELMWyYQhSOjHOYN/rMlyKK5PcnkbeAPzI3cDw4QXeMADv0F42N
tfygagw1AWOLEMPh/ffTElMjLKy+vrPb4uXtI1Uu71C63SlDMyT6Oo7dY379
wlXyyUcwsKpilvVEXqllC/oYRg2Nr14e92D7fHiWYDv2p5N9SkCMqRM34QVM
VC6Rch53k95ujIVZ6UTivo6iynyHiSUcmm71UyTUpUaWyhtVNjR/ICke/137
xwP5+J3D35YrSfn4FQWUrlA8ht/ewcSUSHYnkwEIhfek6DY/wVv0bgCR2mf9
jIkEXIgyqwcL8zEFo4/3d6cauL396TJ7NaSJOH4zUNpneagzWJrl8xxYn+4S
/e4s8jpZxbIb+LLGbA4g9YmtkfciDyDq+nDYyTONb4jYAVtTDbeVRRhhl6DF
uxOC8bAlL/u0lE0otzwMdWk3iDWEgdcSQWuzNPJaL69BeSAKU8wKIbNLbM1X
uH/LiPpWdELFzh5U9GLB6EE0t6Fr5CtFo6uuzZ+pnukrhFvWag3X9cjBUExZ
fyJPbp640xcaB3jGIKrAE8bO8mgT+j5fS5GA7jIGiAGwIhjZrqme/xZBT+Yg
fOSAhzxEd6c7VtSWdmCxdogGRhLRqabuBHfe715pZKU8iOkEA3eaxE4TLFAH
sBDxknpy4rceymIKS/nG1YKolrK5nsjpaPz87exXeTx9/Smjh4qawuY7ifVs
jnEMrhh0P4JanmAESY0Hbih2BJFdNx1djB8WdzG+J06wOMLa6fjZ+YPHsP6w
FUwiEuuWx22rz1X6shC/LUWS1bHhEzTTgskCcQrhNUUhEP3w2vvY0VY8t/Ho
hfPUAOO3ARJKsHhjioaIYxs/QfGDS+DwpaMU4GYek6zvJZ6SiTuADMPxQ8oi
mxpTr9wEOWA2+zUbnWfnZxluPJD7S/DIoNuF3+0uduPeMu2kBN5o0uv7osmT
h7Jp7VB4t+9Aetob77275iB1G1oWXGI9F/RuH93D1JABlAb0jYsLsT2LHe05
6M0eANBNAOoB+Ov1yb8CB2ZoMMSbv9ZLac8VCvt/7zhcf12WBpCSyxmhA1N8
43fMF89LYgs2DrktMeuNHCpC1EFLF50ENF9q7ncnqNpZh0C+veuWXdoDMSaA
EaqoFaq92PT9n3gbc0SaiqPfcZwxLyph/spDSPt5+R5/vNqbLY1/4GsZU5DD
D4NMAwqDnhtQPkm4qdbA9xeyW8j3tMWTxP5wrh3w6IPGXG/REHs0MU5gu8a8
28sGRkoWP0l8+0IE4dbFnSpvOy5/XJmr/JqkTPNrTOClLpaMHqBDEet18cPR
AgWgj+4OpRJvqByoIX85QGKonoUUIGZKo9H38hcoUYAxG7EuQRqlFaEWIVT6
sEWfp8ldcDHqytW+fdG/OlwV95qSYIq+xSWnzhtTFgdfGQ++KP0XDkQlr2MZ
AAA=

-->

</rfc>
