<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.7) -->
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ccc-wimse-twi-extensions-01" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Trustworthy WIMSE">WIMSE Extensions for Trustworthy Workload Identity</title>
    <seriesInfo name="Internet-Draft" value="draft-ccc-wimse-twi-extensions-01"/>
    <author initials="M." surname="Novak" fullname="Mark Novak">
      <organization>J.P. Morgan Chase</organization>
      <address>
        <email>mark.f.novak@jpmchase.com</email>
      </address>
    </author>
    <author initials="Y." surname="Deshpande" fullname="Yogesh Deshpande">
      <organization>arm</organization>
      <address>
        <email>Yogesh.Deshpande@arm.com</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization>Fraunhofer SIT</organization>
      <address>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <date year="2026" month="January" day="05"/>
    <area>Security</area>
    <workgroup>WIMSE</workgroup>
    <abstract>
      <?line 59?>

<t>This document contains a gap analysis that is the output of the Confidential Computing Consortium identifying areas in the IETF WIMSE WG work where the current WIMSE architecture should be extended to accommodate workloads running in Confidential Computing environments. This document contains a high-level outline for these extensions.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ccc-wimse-twi-extensions/"/>.
      </t>
      <t>
         information can be found at <eref target="https://confidentialcomputing.io/about/committees/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/confidential-computing/twi-wimse"/>.</t>
    </note>
  </front>
  <middle>
    <?line 63?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Until recently, there were few scenarios requiring data-in-use protection. This is starting to change. Regulatory bodies worldwide are increasingly requiring data-in-use protection and privacy enhancing technologies. Outside of regulatory requirements, companies are exploring:</t>
      <ul spacing="normal">
        <li>
          <t>Multiparty computation</t>
        </li>
        <li>
          <t>Machine learning training &amp; inferencing</t>
        </li>
        <li>
          <t>Addressing the risks of computing in cases where the operator of the workload does not fully trust the hosting environments, such as public clouds, high-risk locations and IoT deployments</t>
        </li>
        <li>
          <t>Entrusting confidential data to SaaS providers</t>
        </li>
        <li>
          <t>Insider threats, and other reasons for protecting data-in-use</t>
        </li>
      </ul>
      <t>Correspondingly, there is an increased push to harmonize management and governance of human and non-human identities.
Modern workloads may operate on their own behalf with their own credentials, or as agents on behalf of other entities with delegated credentials.
Entities interested in strong assurances around the security of their deployed workloads, for regulatory, contractual or peace of mind reasons, are facing large and challenging tasks of upgrading their existing computing system infrastructure to meet these requirements.
Current ways of issuing and managing workload identities, as well as those required for effective protection of data-in-use, are subject to multiple architectural challenges; chief among them:</t>
      <ol spacing="normal" type="1"><li>
          <t>Lack of workload isolation against the hardware and the operating system owners/administrators, as well as peer workload instances</t>
        </li>
        <li>
          <t>Lack of strong binding between a workload credential and the workload instance to which that credential had been issued</t>
        </li>
        <li>
          <t>Lack of verifiable composition of the workload, and inability to associate a credential with a set of decisions leading up to its issuance</t>
        </li>
      </ol>
      <t>It is important to highlight that these shortcomings are related: lack of process isolation eases credential exfiltration and leads to credential leakage and reuse.</t>
      <t>Confidential Computing can close these architectural gaps due to its unique features (i.e., verifiable composition, strong workload isolation) and broad availability (i.e., support by all major hardware vendors).
Multiple emerging regulations will mean that customers will be looking to these features and capabilities to satisfy them.</t>
      <t>Confidential Computing-assisted mechanisms have to align with the emerging Workload Identity solution ecosystem.
Correspondingly, the evolution of the Workload Identity ecosystem should remain in alignment with the expectations of the owners and operators of Confidential Computing workloads.
To address this set of requirements, this document defines and elaborates on the concept of <tt>Trustworthy Workload Identity</tt> (TWI) in the following Sections.</t>
    </section>
    <section anchor="definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms and concepts defined by the WIMSE and RATS architectures, as well as the terms defined by the Trustworthy Workload Identity Special Interest Group at the Confidential Computing Consortium.
For a complete glossary, see <xref section="4" sectionFormat="of" target="RFC9334"/> , <xref target="I-D.draft-ietf-wimse-arch"/> &amp; <xref target="TWISIGCharter"/>.</t>
      <t>The definitions of terms like Workload Identity, Workload Credential and Workload Provenance match those specified by the TWI SIG Charter <xref target="TWISIGCharter"/>.</t>
      <dl>
        <dt>Workload:</dt>
        <dd>
          <t><xref target="I-D.draft-ietf-wimse-arch"/> defines 'Workload' as "an instance of software executing for a specific purpose". Here we restrict that definition to the portions of the deployed software and its configuration that are subject to Remote Attestation.</t>
        </dd>
        <dt>Workload Identifier:</dt>
        <dd>
          <t>a stable construct around which Relying Parties can form long-lived Workload authorization policies.</t>
        </dd>
        <dt>Workload Identity:</dt>
        <dd>
          <t>the definition of Workload Identity is identical to the definition of the same term by <xref target="I-D.draft-ietf-wimse-arch"/>: "a combination of three basic building blocks: trust domain, Workload Identifier and identity credentials.</t>
        </dd>
        <dt>Workload Credential:</dt>
        <dd>
          <t>an ephemeral identity document containing the Workload Identifier and a number of additional claims, that can be short-lived or long-lived, and that is used to represent and prove Workload Identity to a Relying Party.</t>
        </dd>
        <dt>Workload Provenance:</dt>
        <dd>
          <t>a unique linkage between a Workload Credential and the trusted entities (such as a vendor, developer, or issuer) responsible for the production and/or the remote attestation of the corresponding Workload.</t>
        </dd>
      </dl>
    </section>
    <section anchor="gap-analysis">
      <name>Gap Analysis</name>
      <t>The following shortcomings were identified by performing a gap analysis of the current WIMSE architecture <xref target="I-D.draft-ietf-wimse-arch"/> against the requirements underlying Trustworthy Workload Identity (TWI).
The gap analysis provides the basis for identifying extensions necessary to meet the level of trustworthiness required by Confidential Computing environments.</t>
      <ul spacing="normal">
        <li>
          <t>Protection of Credentials at runtime and insufficient Runtime Attestation:
          </t>
          <ul spacing="normal">
            <li>
              <t>Without data-in-use protection, there is always a risk that Credentials in memory could be exposed if a Workload’s execution environment is compromised.</t>
            </li>
            <li>
              <t>Confidential Computing does not trust its hosting environment and relies on each Workload attesting itself; in particular, the "Agent" must be fully trusted and included in Remote Attestation.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Token replay and misuse:
          </t>
          <ul spacing="normal">
            <li>
              <t>Token binding, even if used, is not sufficient unless the secrets underpinning the Workload Credentials are protected from leakage.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Lack of verifiable workload composition accessible through Credential Provenance:
          </t>
          <ul spacing="normal">
            <li>
              <t>When a Relying Party receives a Credential, or when an auditor examines a log of decisions by a Relying Party, it is unable to peform additional checks on the security properties of the Workload or the process involved in creating it, beyond the claims communicated inside the Credential.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="alignment-or-synergy-with-wimse-architecture">
      <name>Alignment or Synergy with WIMSE Architecture</name>
      <t>WIMSE defines an architecture for utilizing Workload Identity in multi-system environments.</t>
      <ol spacing="normal" type="1"><li>
          <t>The WIMSE Architecture explains the core concept of Workload Identity in-line with the concept of identity in the TWI world.</t>
        </li>
        <li>
          <t>WIMSE model has a CA/Credential issuer that is responsible for provisioning identity Credentials to the Workload. TWI requirement is roughly similar in terms of issuing credentials.</t>
        </li>
        <li>
          <t>WIMSE Architecture defines Trust Domain, which is the authority that identifies domain within which the identifier is scoped. TWI Architecture is aligned with this basic building block.</t>
        </li>
      </ol>
    </section>
    <section anchor="extensions-to-the-wimse-architecture">
      <name>Extensions to the WIMSE Architecture</name>
      <t>Trustworthy Workload Identity as detailed in this document proposes the following extensions to the core WIMSE Architecture.</t>
      <section anchor="workload-isolation-and-the-role-of-the-hosting-environment">
        <name>Workload Isolation and the Role of the Hosting Environment</name>
        <t>Under Confidential Computing, the confidentiality and integrity of a Workload is isolated from the hosting environment and other Workloads.
The underlying assumption in the WIMSE architecture cannot be that the hosting environment can be fully trusted to establish the identity of a hosted Workload, as that is incompatible with the assumptions of Confidential Computing.
Confidential Workloads perform their own Remote Attestation and Workload isolation ensures that the hosting environment cannot interfere with this process.
WIMSE Arctecture and all its associated protocols and schemes <bcp14>MUST</bcp14> accommodate both confidential and non-confidential Workloads.</t>
      </section>
      <section anchor="remote-attestation">
        <name>Remote Attestation</name>
        <t>Under Confidential Computing, Remote Attestation plays a fundamental role in assessing the trustworthiness of the Workload and ensuring that the Workload is running on a platform that provides required security guarantees.
Specifically, when performing Remote Attestation, the Workload cannot rely on an untrusted Agent, therefore including the Agent, if any, in the Remote Attestation process is of paramount importance.</t>
      </section>
      <section anchor="provenance">
        <name>Provenance</name>
        <t>Provenance is a consideration that is foundational for Confidential Computing workloads.</t>
      </section>
    </section>
    <section anchor="integration-of-confidential-computing-into-wimse">
      <name>Integration of Confidential Computing into WIMSE</name>
      <section anchor="secure-key-storage-cryptographic-operations">
        <name>Secure Key Storage &amp; Cryptographic Operations</name>
        <t>With TEEs, a Workload’s private keys and sensitive cryptographic operations (such as signing or validating tokens) can be isolated from the hosting environment, reducing the risk of key leakage even if the hosting environment is compromised. (For instance, the WIMSE token — be it a WIT or an X.509 certificate — can be generated and signed within a TEE, ensuring that the proof-of-possession mechanism remains intact.)</t>
      </section>
      <section anchor="enhanced-bootstrapping-with-attestation">
        <name>Enhanced Bootstrapping with Attestation</name>
        <t>Strengthening the initial bootstrapping process: a TEE can enable hardware-based Remote Attestation, proving that a Workload is running in a secure, isolated environment. This attestation could be used as an additional factor during Workload Credential provisioning, ensuring that only Workloads running in a TEE and matching the Workload Credential issuer's attestation policies receive valid Credentials.</t>
      </section>
      <section anchor="protected-credential-exchange">
        <name>Protected Credential Exchange</name>
        <t>For the Credential exchange patterns defined in the WIMSE Credential Exchange draft, Confidential Computing can provide a Trusted Execution Environment in which the exchange logic runs. This ensures that the process of exchanging or re-provisioning credentials is protected against tampering and eavesdropping.</t>
      </section>
      <section anchor="mitigating-runtime-compromise">
        <name>Mitigating Runtime Compromise</name>
        <t>Executing the Workload inside a Trusted Execution Environment can lower the risk that runtime attacks (such as memory scraping or side-channel attacks) can expose critical identity or authentication tokens. For example, a Trusted Execution Environment can be used to securely generate and verify proofs of possession that are important within the WIMSE authentication protocol.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Maintaining security guarantees of Confidential Computing within the WIMSE reference architecture calls for adding the extensions specified in this draft.
* Specifically, Confidential Computing demands strong binding between any Credential of a confidential Workload and the underlying hardware platform, utilizing proof-of-possession of the Workload Credential backed by a key that is safeguarded against disclosure and tampering via data-in-use protections offered by Trusted Execution Environments.
* Additionally, Confidential Computing inverts the trust relationship between the Workload and the hosting environment: a confidential Workload cannot trust the hosting environment's claims about its capabilities to obtain a Credential and <bcp14>MUST</bcp14> instead perform its own Remote Attestation.
If an Agent is used to perform Remote Attestation and obtain the Credentials on behalf of the Workload, the Agent itself <bcp14>MUST</bcp14> be included in the Remote Attestion of the Workload, as it becomes part of that Workload's TCB.
* Finally, without any change to the WIMSE specifications, but to make this explicit: linkage between a confidential Workload's Credential and that Workload's Provenance can be achieved by treating the pre-existing unique credential ID (e.g., the "jti" claim) as a "hook" by which a Relying Party might discover information about the Workload's Provenance.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Not applicable for this draft at this time.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The following persons, in no specific order, contributed to the work directly, participated in design team meetings, or provided valuable comments during the review of this document.</t>
      <t>Pieter Kasselman (SPIRL), Arieal Feldman (Google), Mateusz Bronk (Intel), Manu Fontaine (Hushmesh Inc.), Benedict Lau (EQTY Lab), Zvonko Kaiser (NVIDIA), David Quigley (Intel), Sal Kimmich (GadflyAI), Alex Dalton (Shielded Technologies), Eric Wolfe (Mainsail Industries), Nicolae Paladi(Canary Bit), Mark Gentry (JPMorgan Chase), Jag Raman (Oracle), Brian Hugenbruch (IBM), Jens Alberts (Fr0ntierX), Mira Spina (MITRE) and John Suykerbuyk.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.draft-ietf-wimse-arch">
          <front>
            <title>Workload Identity in a Multi System Environment (WIMSE) Architecture</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>CyberArk</organization>
            </author>
            <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
              <organization>Zscaler</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   The increasing prevalence of cloud computing and micro service
   architectures has led to the rise of complex software functions being
   built and deployed as workloads, where a workload is defined as a
   running instance of software executing for a specific purpose.  This
   document discusses an architecture for designing and standardizing
   protocols and payloads for conveying workload identity and security
   context information.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-wimse-arch-06"/>
        </reference>
        <reference anchor="TWISIGCharter" target="https://github.com/confidential-computing/governance/blob/main/SIGs/TWI/TWI_Charter.md">
          <front>
            <title>Trustworthy Workload Identity (TWI) Special Interest Group — Charter</title>
            <author>
              <organization>Confidential Computing Consortium Trustworthy Workload Identity SIG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TWISIGReq" target="https://github.com/confidential-computing/twi/blob/main/TWI_Requirements.md">
          <front>
            <title>Trustworthy Workload Identity (TWI) Special Interest Group — Requirements</title>
            <author>
              <organization>Confidential Computing Consortium Trustworthy Workload Identity SIG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA7Vb7ZIbt5X930+BHVfZIxfJkWylNp6kEo9GI4m2RpJnxqt4
t7YSsBskYXY3GKCbFOVSVR5i/+RfnmUfJU+y514A3WgOKbm2dlXSDNkfwMX9
OPfcC2g8HmeNbkp1Lt5Or2+vxNW7RtVOm9qJubHizrau2RrbLHfirbGr0shC
TAtV46VdJmczqzbnw6domKwweS0rjFpYOW/GeZ6Pt7pyatxs9Vh1c4wfPspy
2aiFsbtzoeu5yfTanouGBvzq4cNvHn6VSavkubhVeWtpTkyzWljTroPEWeYa
WRd/lqWpMd9OuWytz7NMCDvPVeGaXRkuC9GYPPmoa1pHvOAgvlVz133fVYOv
jdV593Buqgrvdnex3Equ17pe+CvZRtWtOsedhW6W7ewcb9RzzXqT5Rivr9sG
T5+ROlgxeHRpSGHLplm787Oz9IXu+Yk2Z3Jm2uaMJNBNo5Q7yzLZNktjsegx
hvF6v5Z2JV6ZjVzhkrGQ67vJm4m4xkdZi8ul5ClVJXV5Lio8PJlPanr825/X
VU63J5giHfEns1BuKZ7ixxoKV3Fcaat+JP/QpHvoW9zdH+iFqlfiibarpSnf
x1GeWdnWSzNXVtxO7/oBl3h4MgsPf6tVM8dwdSPzJsvIX2wlG71hVd88u/zm
668fnwsrGzeWNl/i4nT8dOJ9kN4NTkj3ovsIcfd2ejt9DpXYRlkaSIjx+fAq
X2ykXaimt5A3La3u7Ih1F2ajbC3rXJ3NSjM7w5LqM4zqzjA6/ftzGH9SFX4K
H4ofjTpxihcfiNu1yjGbmNZ4X7lGPKegEP/823+JVOjoGoL/sKovE2HxJQhL
lykGdFt9Yn4soNPajfrrnsZw5X+pLcRCoibSDsZqtVUcav+3KkpH/v/UUzYe
j4WcAT3YY++W2hFYtDSxYEfWQFopFnItZC3LncMDzVI2gn8rgVjHvMLM+dun
RfJ35zu6TMjpgKr86vTq7lnA+LfPBaGo2C6hFr4JbLUkkb9P4aEblTctbrul
actCzJRg2C5UAewUMicAMgWwm8eilTth27qmiTHlEUlVvdHW1N6i4qg6lnqx
HJdqo0pSQKlrxdkIorogB6ePiddvpYuiVFn2GVnamqLNG9zNsh8xeymsyjF6
uRvR61jQln7M1VY4XJdWG8jN3kDyYUFyrOtxi3nW1pASMFSQFH+RaywvBDoA
StYLNYEvLdpSNkhhYmYKrRxppCy2WD6ZANrIyRB4q9x9cip4QYGveiPzHbSF
KXKeTuXL2pRmgeEn4nXbOBodXmH7yW3i0yNKUUBgkoZkUO/WpaFpkSS+FNdt
2eg1VrITPvwkKww3JCwPZZdKWrYk/Fbzh88pO0NzLA6evCgKhJTjZ+BAVruV
I3m6cCYnyJFGXOJmZq0syRrdOXoOfADP1aYR87aEkjj98xNL4+75zUi4Nl8K
uPa6nZU6F3lp2gKX2WtIElGanJfkWJ1TcycKBQXsfLx/Ka5qnoJGTsGIbUKm
vZXyloyywR1LL0xrUjh5IExJItC4hhxKkG0jXYp2HJo3yy4N4sutTV2wF0RX
1CRf9A8E1rpFgsX0wO/K1Pq9Qmau5YJNyjP2CYVUuGxxm6/Xph77b34pDblJ
dm0gcp3EZyV3wQZ4n2FBwxbbGtG9lOVcbIHRyVWIFRSDBWN10DiEgQbp5fAK
xPBqiNP6QQpVqgWmKdJBJtlVfEgHSMYD8BPAoyG8cq61tDjyWdNiXeQCLjC/
4DSQzdsSr3YrG7H2+1gYMZgQ5rawKhlGSa+zCqwvmmzEoTGXHGEl5StWJuK6
LFW9YN+Wwa/b9cLKIrg7ZFDvdPSf6PBuh/VUFCdWYkWtx0+Ys1KqCdiVxugk
uwywu5U7nkRDAQzckIItT1+6IOlNOyJTbFVZ0m/krX7gghWh5nPyws0AWDB+
4pN+7a6d/YzbLCRjQqlS9IfuojKU+x0+azUXsjJeCxWw5NFEvJT5igbv5XSm
lB7LFoTnIZKlLbY0pwx29Y6YKA4uh2A7kwVspCljwpLDpa4VHK2fpybmD2/J
vuqlCK400xxq8NJmqxQk6V/rHbIT5d6QpJDtUudLn4uTV5aSciFGJFupIvu6
nxqhqedazqBDcgrjdNR7OoeHDl3LmS7JqymZOodqhIJSplNxIEn4P6f/AlzG
12UAZ14bqAxe1o1jWUjsLJsycdCY3WIhbFhCxRL/Gr8W74fI6raBlBjHJwir
SgrXc8SBXw08B6p1iTUVo3kioHo31yXZKeYtksxxauwfwrWVDJFlFTxvQnB4
kBzkwC9guVNByKEngiKBLLQqLrqt9V9byuSS4syJUz1Rk9ERK4yiY9z30gcs
2szSRblB0REtEwZ07Zq0KWY7gVBAXP6MCOu8GYVeATd9ALSNAYTothy5AY/Y
aFtN7ypZB49C9kG5Z8MNsKvSmFUgFn713cIYk+Tai0XgiUcchnXzHYfhUYWO
4ViaMbZSRFa0qxwk37AKJXyi7hC/F/o+j4WiWu8AufGhOjmY0ITaxCeDz98f
qxsi8kpLdR7lQC8QZ7peqHdg8E3QYBjTo4TPv4FO8L0jPtWliEl2h0V71oKB
iMv5wBrSpmZASQs1Bx3ysyFAZoZSpwu5k3JMrtY8yF8+Wgr8JRQkgYrPTVma
LUl367GZiOxntIINPR9py1OanL3XZb+ci8+K/rv4QLWEEiu1oxUi6E6uf7y9
Oxn53+LVa/58c/XDj9Obq6f0+fbFxcuX3YcsPHH74vWPL5/2n/o3L19fX1+9
eupfxlUxuJSdXF/8dOKx7OT1m7vp61cXL0/8AlMFSp8BZ8pn/LVV5I7SZYVy
udUzn/+fXL757388eix++eVfUMR/9ejRNx8+hC+/ffSvj/EFHLIOpKsGQfRf
octdJtfI7dY7UElxohvmK0gXcDGwGGJa0O+X/0Ga+c9z8ftZvn70+A/hAi14
cDHqbHCRdXb/yr2XvRIPXDowTafNwfU9TQ/lvfhp8D3qPbn4+z9ysTR+9Ns/
/iHbrzdbwm9YoQqY4t3XBS8vCOE4an0RiCduLu5uB9XgPvNQYbi9ET5RFx8u
y31u+nSJO8meERdldC/hTmKBlOEkkT6nFNwmBJV4TIE57ppB8KIR7o55efjy
OX0ZdHk+fJj4sEojjWCH11jq1QFEG/WXLofEorv+BnWE8qS9kg1zCspxjtQw
14nW3k6pZxDbN4fFi6OCe52nq4lI9UV84Auy0AmXF4HTEDsy82br60Gwalbs
nJUZhMlRgljkTHUyES98sSzIRNT79ImrV03IVIKSYwrQHTvvJmPCAz/jUmvR
BsLAw+2R0BtVga+KiwYo63E/WXLQOVRmefWSqnGf52vPt2PZ4KnbjSq5DfKG
SnZiLlAGNQyRapEbS9DjxEi+/6Pfe9nWBnUl11D7szc7nrsZeAkt/b6fExHj
zzk8Iihr+A6XN7LyUURu0Bv0HLYjFweRlf3jFg4+kw52mrW69AwXte7KhZY5
Yp3S6WhfGtKZN0MUblCWZQd82KsYSX+9JG6AJXTv7ndsYhPg2KRS1G01U1z2
IwPz8qm0KKWuOOUSIZJUUnpeGmwDx+wtNQpk3XfGWufbUFYho7hYHVPBfoh0
ENsZeMMuXXIfnsGrArEEkDJx7UuIY5HOOEjqh1BdGXwamxQycMQRjL9RJZEW
rqa5gLAPhOdRTpMnhyYXrSR0sWiCs3DV+uiQfXREJ8pTOtbJyaziuVyLi9BZ
9OjW049BFcB9MR0tx6gEUSlguCQdtijjvMf7hgk2pWVgyrag6UJZb5Zf0c+d
sPQDMUKLxqciCgzfhkmboH23UNSKKhpkirQoF6HNOPcmZBEISV1fUkMTv6ad
SZ21N4N6u/cTR+nNtvhcBTysXTufE8hAfTfhRoJ71In+UrwFEzZtc6RXmLaR
Su4hSG7E+TBJJwc7quA8lvp9XTeXcB6CzBPP/uff/u5ibiDC3y+PJqGMa+Et
eG3C4h3RStfN85hE0H+gjxcqwlJ7Qq0kwqWHY9YEtxEbp8r572gJ1LHUOUoq
6+uNkwvqRp2IimbBkpLmIZFM1nJetoUnmYdyy5fizqwQ28CRUu5830U7aNmr
398MvYQR6huq++eMPiNSCK0xMWNbl7644KYVqG7w8LWu72PkwDdsZ1bq4EDH
sWwmEQ/0F/pmRtJokDm5N+MIMoVpF8sUqFKYY9daMqYNYJF75UBbcqT+VUar
LT+Ovy3wm1pM72TlSyOA9GLYoKBKeTgwtOVxu2bxEX5rxak4TQdLla+62qrr
+kEvgCGG1P2qsgdL36moUX9uvLGpoxrcZwTX2JkA0z7n8P4tYD6XvgHJzXQm
n92iGTsvupIUU93uUHgudr469YB3kQAeMgpf60vGIR4SLiE8Sv3+cJVNIUod
hHGoj/eg5RHtQagD83Jrn7dNQiIY1KWH5hlzidAV2cnTOhEmMlLey5hQi83P
XZlCURuMfeTiLPEwn9C6HL2f1xiryUHYLHGmNAwCR+rSF8+fJAwelfwaUe50
pUtf93l6nrRPB9zm68khpUUrcdoRTwNr8rwx7LwFRkj8gVcUM6MLJIs1SL9C
nzBJnpa3inI4bljEYG6GazgWNbC9EXDlEKtjH0wOZET9HPC9j6dPSRUamFrp
g2NYolOAGRdyaM8N1L152bfuT05SfpZM2nd/Q8zdmFLF2H0R8sBV7920T0db
K4eTySj6aHePF8TY3qhF3BhIyJmOPcsIpUf2kZItnLdJkwgPJ7SEtiSqNS8n
xMQBqgPuSplgproO68H5AsUdZinoVnEZo13qRHFVNE5Spox82e0DDMmN9vga
jrAunHuJP9IWmww7ht36I+NLNoHup81hdZv0h0FprHKfVALpirtBc64wuxAI
OD7JOh+LCuYioiyZSXTNcub7jclN6dsZLqdCxQnu6qT70zMYebjNF7fM8oNK
8A59f92fctQDmiJWQUA5h0tJWj/esBQO1K5yLtlA3Sef+7mOO5CkYP9C0HDq
9HHznQxEEzfBkLLpaXJHabv0umillTWdI5pkt6EJAFXvRj7jJxXA/eWNhjIE
04LS7ViIGoEU3ZyZWuCrc+M3xcHM4urDbeKiNZEFH2qHFNrtSvAeBWSvUPE3
3Y5HHuCoZztZlvRfCHq5XUCbuUkbgusGslHgIpSvPt1Q9gcOAEJdLXbkHXi7
iafVIByfZVPie7UTt+BSVGR+jkS4WzcGY62RT8TrdZAPNRsVAeLu6oqab0Om
zucEGm4DhxggyOaNv3wwnOmG6+tShxTE/mLFBqhayHCuAZTXPYhg9auQdASb
o1xNzwKQMqg5HXd/InU+Bgt71YU4pR5f7FyNEuBl+fgID0nXkEamd7w5XYs/
TX7z8BuRE1ucM7fj58JK4GG88e1DyfX5l0KR1Ds6EF8QyMzH+IsMydFq6n4v
Jexd8Ga2zJvJAzbuFZ/ZwNhPjGloF5OPBXqYG4DJbYPSeYFZutqAO0NwnNng
zeDy515KXo7yNDpuQo1nfHrgUIBy5McVyYN4wetnPFCj3t6JccLpl7Tt0FWR
3IiRnu32VH4OdcAkhdfmobZJSgb3Fc8d/j4lDeQkDfjd8YZOqhytqQIZ/WIo
dmzrxTrHO37KQTv0CLVYMuLVO3/gJ+P+87BaAFvyNwFJmM/WfUt8QBsODOdP
yI6OQQeZO8A3LT/A6VVXol+lQZSS0U4iOjSUkxbjgat7eTqCKmI2vBVwAa41
YO152lJwScnadXhkBaSJRxiURClZgF6umXKQZq/hIguPNLHpcdnFfZZddW3p
YXbzFdqn1k+6AntVtochXmPXd2kQp6sEAkNPxOWItbBkmmhMOqhR5YQXPBr6
hgl0oH1HtydqlmsF3+kNnXEC0Yl4FgrldUnnLX6F9DGiaIeXIxKREIGLVco9
gJ3HJZ8Ce2DqGur99n/At4S3DgWNDIpzWTxizXstXYJEArqWuuvzHiAOH9t9
3Z8f2Z8Pkal9Bl2WvnVHKBLMn1Qg/V5JV75Q1FB3ZEhajnWkgNR14Y6eDqnT
QtQz74PcsKtpkhKhOwoQOdcoqfMPJZB9apfMPIO7+Yaj5PQZyYmTc0UKL5JY
K7SjwxKRH/eht9HySMOQTEX65xk+6o1u4s/4BUT/iGp1DZ9sXE9i/VESmm2p
152K75HZI0zg/KjqA7386NlA4H3o8PApeb/rtHd0wszIlwcdLhaI6wbSrMJk
sQ6iAQ5XQZNsSmzVU9d0TyK+eqRwCtMP88feibpUWaOeIIdeqJd0pgbdzXt8
+YCncfWoqVAF14IyqJ/qn4GXdfuGTtxdPiHzP9PB8tvQhaYwCUll0IqIm4fe
6iMxa/2JMrlSPlipRYXEC+Pe31Q5aGwIcW+PZShjQuoDcNLRVbUJ26mx/efT
mxp3x/XC5k5yQGn6VJyqyWISeso/N/rEO9EDv3tzsjRmdUKj+uS63zOt+GwV
RSMdzhTdf0oge7MTpiYYSO4riItXF/cQ9xUcHfQPSpP9tlBEPb9TTl0qJDXf
p8xXtdmWqliEE+17+zxwSX/eEY5Sm36z1wBQbDgrqWE178DxtBrWBJ7EJ6d9
512vQ78UeEoEWiBUKt5IoQ0kbhMHqlIQs2rjISy/2VNEikebQButtt71klYU
1vJGK9r6/p6K45LOs57evpnevHwwEhdWK1jrmSoLvv7cmEWpcOMaQrXuvXgC
DFiJU6rISr5ct0jAnLiUOH3RumVF/39lWucT3H6CrFrQrvZL2YrTqx/ufsKn
GW78+wbDGEgAQmLF6at/mz6dXuD6U4mFiR9ajVl3/TS3kOl7XVXkGafPZTEv
dxdTErdU7/BO2RhaAzyzJK3cJce48dCVhRHemnIOASnJOqnpWETR0o47P/FK
IztLBVcrZaFPL2VN21dPdMMrhI2eQ2+4cvrdm/S/9uDudxIUS7KqXluZs6qe
WI3vL1qAycwSBzqdPrmmZ5FnIfGMgfz0mX2IyFD2TzSHthIpFkgACad3N1f+
tNx3ZlmL23a3UnaGnzDc/wDuG8k3STYAAA==

-->

</rfc>
