<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hendrickson-privacypass-expiration-extension-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="Privacy Pass Token Expiration Extension">Privacy Pass Token Expiration Extension</title>
    <seriesInfo name="Internet-Draft" value="draft-hendrickson-privacypass-expiration-extension-03"/>
    <author fullname="Scott Hendrickson">
      <organization>Google</organization>
      <address>
        <email>scott@shendrickson.com</email>
      </address>
    </author>
    <author fullname="Christopher A. Wood">
      <organization>Cloudflare, Inc.</organization>
      <address>
        <email>caw@heapingbits.net</email>
      </address>
    </author>
    <date year="2025" month="January" day="24"/>
    <area>Security</area>
    <workgroup>Privacy Pass</workgroup>
    <keyword>token</keyword>
    <keyword>extensions</keyword>
    <abstract>
      <?line 42?>

<t>This document describes an extension for Privacy Pass that allows tokens
to encode expiration information.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-hendrickson-privacypass-expiration-extension/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Privacy Pass Working Group mailing list (<eref target="mailto:privacy-pass@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/privacy-pass/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/privacy-pass/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/chris-wood/draft-hendrickson-privacypass-expiration-extension"/>.</t>
    </note>
  </front>
  <middle>
    <?line 47?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Some Privacy Pass token types support binding additional information to
the tokens, often referred to as public metadata. <xref target="AUTH-EXTENSIONS"/> describes
an extension parameter to the basic PrivateToken HTTP authentication scheme <xref target="AUTH-SCHEME"/>
for supplying this metadata alongside a token. <xref target="EXTENDED-ISSUANCE"/> describes
variants of the basic Privacy Pass issuance protocols <xref target="BASIC-ISSUANCE"/> that
support issuing tokens with public metadata.</t>
      <t>This document describes an extension for Privacy Pass that allows tokens
to encode expiration information. The use case and deployment considerations,
especially with respect to the resulting privacy impact, are also discussed.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="expiration-extension">
      <name>Expiration Extension</name>
      <t>The expiration extension is used to convey the expiration for an issued token.
It is useful for Privacy Pass deployments that make use of cached tokens, i.e.,
those that are not bound to a specific TokenChallenge redemption context, when
they want to limit token lifetime without having to frequently rotate issuing
key pairs.</t>
      <t>For example, consider a Privacy Pass deployment wherein Clients use cached tokens that
are valid for one hour. Clients could pre-fetch these tokens each hour and the Issuer
and Origin could rotate the verification key every hour to force expiration. Alternatively,
Clients could pre-fetch tokens for the entire day all at once, including an expiration
timestamp in each token to indicate the time window for which the token is valid.</t>
      <t>The ExtensionType (defined in <xref target="AUTH-SCHEME"/>) of this extension is <tt>0x01</tt>. The
value of this extension is an ExpirationTimestamp, defined as follows.</t>
      <artwork><![CDATA[
struct {
   uint64 timestamp_precision;
   uint64 timestamp;
} ExpirationTimestamp;
]]></artwork>
      <t>The ExpirationTimestamp fields are defined as follows:</t>
      <ul spacing="normal">
        <li>
          <t>"timestamp_precision" is an 8-octet integer, in network byte order, representing the granularity of the timestamp,
i.e., the target to which the timestamp is rounded for loss of precision.</t>
        </li>
        <li>
          <t>"timestamp" is an 8-octet integer, in network byte order, representing the expiration timestamp. The
expiration timestamp is the UNIX time in seconds at which a token expires, expressed in the UTC/GMT timezone (<xref section="4.1" sectionFormat="comma" target="RFC3339"/>).</t>
        </li>
      </ul>
      <t>As an example, an ExpirationTimestamp structure with the following value would be interpreted as an
expiration timestamp of 1688583600, i.e., July 05, 2023 at 19:00:00 GMT+0000, which is the timestamp
rounded to the nearest hour (timestamp_precision = 3600).</t>
      <artwork><![CDATA[
struct {
   uint64 timestamp_precision = 3600;
   uint64 timestamp = 1688583600;
} ExpirationTimestamp;
]]></artwork>
    </section>
    <section anchor="privacy">
      <name>Privacy Considerations</name>
      <t>This extension intentionally adds more information to a token that might not otherwise be
visibile to Attester, Issuer, or Origin. As such, how this information is chosen can have
an impact on Origin-Client, Issuer-Client, Attester-Origin, or redemption context unlinkability
as defined in <xref section="3.2" sectionFormat="of" target="ARCHITECTURE"/>. Mitigating risk of privacy violation requires
that the extension be constructed in a way that does not induce anonymity set partitioning,
as described in <xref section="6.1" sectionFormat="of" target="ARCHITECTURE"/>.</t>
      <t>The best way to achieve this in practice is for Clients to use the same limited sets of information
in the extension. Consistency can be achieved in a variety of ways. For example,
Client implementations might insist that all Clients use the same deterministic function for
computing the expiration timestamp, e.g., some function F(current time). This
function would round the current timestamp, resulting in a loss of precision but overall
less unique value. One way to implement this function would by rounding the timestamp
to the nearest hour, day, or week. Of course, this does not account for clock skew,
which occurs with some non-neglgiible probability in practice <xref target="CLOCK-SKEW"/>.</t>
      <t>An alternative implementation strategy for consistency is to run some sort of consistency
check to ensure that the Client uses a value that is consistent with other Clients. Several
consistency mechanisms exist; see <xref target="CONSISTENCY"/> for more information. Such an explicit
consistency check would depend less upon the Client's current clock and thus be more robust
at the cost of additional work.</t>
      <t>Orthogonal to the mechanism used to ensure consistency, it is also important that Clients
choose expiration timestamps that are shared by other Clients. Consider, for example, a
scenario where two Clients consistently choose expiration timestamps per the recommendation
above, but only one Client ever requests a token within a given expiration window. Despite
the consistency check in place, the actual value of the timestamp is still unique to one of
the Clients.</t>
      <t>The means by which implementations ensure that some minimum number of Clients share the same
expiration timestamp is a deployment-specific challenge. For example, in the Split Origin,
Attester, and Issuer deployments as described in <xref section="4.4" sectionFormat="of" target="ARCHITECTURE"/>, the Attester
is positioned to ensure that Clients do not choose consistent yet unique values. General purpose
approaches to ensure that some minimum number of Clients share the same expiration timestamp
are outside the scope of this document; indeed, this problem is not unique to Privacy Pass and
is common to other privacy-related protocols such as Oblivious HTTP <xref target="OHTTP"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Use of the expiration extension risks revealing additional information to parties that see the
extension, including the Attester, Issuer, and Origin. <xref target="privacy"/> discusses specific privacy
implications for use of this extension that aim to mitigate exposure of information that can
unintentionally partition the Client anonymity set and lead to Origin-Client, Issuer-Client,
Attester-Origin, or redemption context unlinkability as defined in <xref section="3.2" sectionFormat="of" target="ARCHITECTURE"/>.
General information regarding the use of extensions and their possible impact on Client privacy
can be found in <xref section="3.4.3" sectionFormat="of" target="ARCHITECTURE"/> and <xref section="6.1" sectionFormat="of" target="ARCHITECTURE"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document registers the following entry into the "Privacy Pass PrivateToken Extensions" registry.</t>
      <ul spacing="normal">
        <li>
          <t>Expiration extension
          </t>
          <ul spacing="normal">
            <li>
              <t>Type: 0x0001</t>
            </li>
            <li>
              <t>Name: Expiration</t>
            </li>
            <li>
              <t>Value: ExpirationTimestamp value as defined in <xref target="expiration-extension"/></t>
            </li>
            <li>
              <t>Reference: This document</t>
            </li>
            <li>
              <t>Notes: None</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="AUTH-EXTENSIONS">
          <front>
            <title>The PrivateToken HTTP Authentication Scheme Extensions Parameter</title>
            <author fullname="Scott Hendrickson" initials="S." surname="Hendrickson">
              <organization>Google</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <date day="29" month="March" year="2024"/>
            <abstract>
              <t>   This document specifies a new parameter for the "PrivateToken" HTTP
   authentication scheme.  This purpose of this parameter is to carry
   extensions for Privacy Pass protocols that support public metadata.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wood-privacypass-auth-scheme-extensions-02"/>
        </reference>
        <reference anchor="AUTH-SCHEME">
          <front>
            <title>The Privacy Pass HTTP Authentication Scheme</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Steven Valdez" initials="S." surname="Valdez">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This document defines an HTTP authentication scheme for Privacy Pass,
   a privacy-preserving authentication mechanism used for authorization.
   The authentication scheme in this document can be used by clients to
   redeem Privacy Pass tokens with an origin.  It can also be used by
   origins to challenge clients to present Privacy Pass tokens.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-auth-scheme-15"/>
        </reference>
        <reference anchor="EXTENDED-ISSUANCE">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="BASIC-ISSUANCE">
          <front>
            <title>Privacy Pass Issuance Protocol</title>
            <author fullname="Sofia Celi" initials="S." surname="Celi">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Steven Valdez" initials="S." surname="Valdez">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="3" month="October" year="2023"/>
            <abstract>
              <t>   This document specifies two variants of the two-message issuance
   protocol for Privacy Pass tokens: one that produces tokens that are
   privately verifiable using the issuance private key, and another that
   produces tokens that are publicly verifiable using the issuance
   public key.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-protocol-16"/>
        </reference>
        <reference anchor="ARCHITECTURE">
          <front>
            <title>The Privacy Pass Architecture</title>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>LIP</organization>
            </author>
            <author fullname="Jana Iyengar" initials="J." surname="Iyengar">
              <organization>Fastly</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="25" month="September" year="2023"/>
            <abstract>
              <t>   This document specifies the Privacy Pass architecture and
   requirements for its constituent protocols used for authorization
   based on privacy-preserving authentication mechanisms.  It describes
   the conceptual model of Privacy Pass and its protocols, its security
   and privacy goals, practical deployment models, and recommendations
   for each deployment model that helps ensure the desired security and
   privacy goals are fulfilled.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-architecture-16"/>
        </reference>
        <reference anchor="CONSISTENCY">
          <front>
            <title>Key Consistency and Discovery</title>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Matthew Finkel" initials="M." surname="Finkel">
              <organization>The Tor Project</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This document describes the consistency requirements of protocols
   such as Privacy Pass, Oblivious DoH, and Oblivious HTTP for user
   privacy.  It presents definitions for consistency and then surveys
   mechanisms for providing consistency in varying threat models.  In
   concludes with discussion of open problems in this area.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-key-consistency-01"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3339">
          <front>
            <title>Date and Time on the Internet: Timestamps</title>
            <author fullname="G. Klyne" initials="G." surname="Klyne"/>
            <author fullname="C. Newman" initials="C." surname="Newman"/>
            <date month="July" year="2002"/>
            <abstract>
              <t>This document defines a date and time format for use in Internet protocols that is a profile of the ISO 8601 standard for representation of dates and times using the Gregorian calendar.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3339"/>
          <seriesInfo name="DOI" value="10.17487/RFC3339"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="CLOCK-SKEW">
          <front>
            <title>Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors</title>
            <author fullname="Mustafa Emre Acer" initials="M." surname="Acer">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <author fullname="Emily Stark" initials="E." surname="Stark">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <author fullname="Adrienne Porter Felt" initials="A." surname="Felt">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <author fullname="Sascha Fahl" initials="S." surname="Fahl">
              <organization>Leibniz University Hannover, Hannover, Germany</organization>
            </author>
            <author fullname="Radhika Bhargava" initials="R." surname="Bhargava">
              <organization>Purdue University, West Lafayette, IN, USA</organization>
            </author>
            <author fullname="Bhanu Dev" initials="B." surname="Dev">
              <organization>International Institute of Information Technology, Hyderabad, Hyderabad, India</organization>
            </author>
            <author fullname="Matt Braithwaite" initials="M." surname="Braithwaite">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <author fullname="Ryan Sleevi" initials="R." surname="Sleevi">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <author fullname="Parisa Tabriz" initials="P." surname="Tabriz">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <date month="October" year="2017"/>
          </front>
          <seriesInfo name="Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security" value="pp. 1407-1420"/>
          <seriesInfo name="DOI" value="10.1145/3133956.3134007"/>
          <refcontent>ACM</refcontent>
        </reference>
        <reference anchor="OHTTP">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
      </references>
    </references>
    <?line 187?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document received input and feedback from Jim Laskey.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA71Z/5LbthH+H0+Byn/UaUVF8p0d5xwnUXRn+xLb51q6JplO
p4FISMIcRTAAeLLiuTxLn6VP1m8BkCIl2R23M53x+CiSWOyPb7/dBZMkYU65
XJ7x3hujbkW65W+EtXymb2TBL96VyginNF06WVhc9ZiYz428/ZQVqXByqc32
jFuXMZbptBBr7JkZsXDJShaZUemN1UVSBpElJCaykYXLKCsZnjBbzdfK0i+3
LSHl8mL2jBXVei7NGcuw1RlLdWGxoLJn3JlKMmh7woSRAlpPZVoZ5bY9ttHm
Zml0Ve7Z0mM3couH2RnjCXdkGF00Slh2K4sK23B+fDnnQbPej9hBFUv+nF6j
+2uhctyPZiZk57dKusVAmyU9Xyq3quZ4I10ZZZON1tnnn+6lHmOicittyABI
5XxR5Xnw+TTVzvEXO2n+ObYXhfrNyznjz7Ve5tI/kFFjS8u+tS0tBqle9w7l
T0hxp8uVNHw84D/CgiM7THJdZYscIenzyyIdtPdKxebblRQlHDdXzg4K6Rgr
tFlj7a33Oh9fz14kFz/NLl5PL69eT4GB5HxAzuq4hnyQ2HQl1zJpBa9eP528
uHh1EdZSDD60lhb4vc4vzpPL6fR6/HoSl30oKGU1z1WarKUTAKRIANdKFKkX
9d14ejnZk3OwfWm006nOvbJvJy8uZxeT2fXbD2pr0pVyMnWV8XtM4JTLKVSe
/PyBFUB4QlmCWMki3TLGkiThYm6dESn8PVspy5Go1VoWjmfSpkbNpeWi2OUB
X2jDOyTgVsJxked6Y0PeWOY0xwY6k3yHVK6KRYgnYBR2XqssA+TYPcDBGZ1V
KT1kbKrXcm8PTzSUYJbbqiy1cXyuiozyTGSZonUib2+BJcytZNSoz/UCBnAj
F9IYmeE2F5aHkPE6ZAP+/v0eyu7udn5gHT+UwgD7DoiHLNppLixkebWdDMz4
YjZ7wwlV8KdKg14BX/VOAY93d4zcSpblW7LJUSRqteBcXSytgjtFsIcUPUBn
R9VbYZQonIXd+8rVPq3xyWvcWUjtAhUiKbqsdjkt8ep5p/INiOvAh/9PGPEZ
TKusBH3gP1Fk2K3M9dZv7JGeybDM9pm0pUwVdtgGxY2/4erw4WeVO7IupgxX
6xJp0ecgLChmNc+UTStrZTYgzE50cUtxhXC/9blcqMIj0ZIPJEe6caoolvde
XU9nvX74y19f+eu3F3+5vnx7cU7X0xfjly+bCxbfmL64un55vrvarZxcvXrl
o08/cZd3brHeq/HPeEJa9a7ezADk8csePBdw1YSGDIP1c4lHAHJpAOcMecHq
mGW05rvJm3/9c3QKcPzh7bPJg9HoS8Ai/Hg8+uIUPzbAd9hNF+Rd/xM+3TJR
llIYkgK/I0qlcvBkn3LPrvSm4KgYEt7809/IM38/41/N03J0+nW8QQZ3btY+
69z0Pju8c7A4OPHIrSPbNN7s3N/zdFff8c+d37XfWze/+iZXheTJ6PE3XzOC
0LHOKWCnBfhdziB2ALsnr5TAt/XAbb1KSSUKn6b+NaIKduniQtTrw7TbJUxM
wbW4CTkF5kgFyCprOFQN5KAPVtV4GtIVACo0qFhXReBU7pNsAULwDDhZIe6y
WFJ6ZXJdei2hu4NRfQ8UImlABlxF63O1Vi6yfa4W0ilQJWWrrhxfidtAPnxh
5K8VVAbYwF2g25qZqIkDMytjAapnsFW+E+syR8NRswFU/ID9pI6RgOokV94d
gVhaHghkSEbfilxl3pkaAYV2ZtAsS3WVZyARmUD/dEUxsnUd4hLy/Ps+XSh8
lxQsw+jnlVFLVUQB0TB65VYacmmIMVkocWcbxJA3tEnbMBjwcY50LnzrlG/7
7IOaBZ3IDA8kkBlsy8TWZyviq1EeEPYizatQaovWNoyCYx38S/ntDYtlWnMq
zWmtfgxikemN32uzUsEt8X2g0/tzEKDfZMIM5Z7fz4hWAxPt1czPQnHD8k6K
/DJ8Nxz94msDymBeyeOvifbgMqtN6fN6P0GO8eUIev3+++8MXRIaFP6eei1g
zT065Y0H/gGnpopEPzn2+Am7O7bZEy83Gn3wlC+UzFE8CG+HSp2hheK9Iwr0
onGPE5066Ty1L6WhMHJ01TT/8PkWoUFlottGYqml2Pu+Q2K8EUWFLh3jUt09
NNv0YZ1ngXBbmKX0edsK6Q4UFhgGL8iQKLm2vhtpFB10Lfif9W7xYCM0oIAf
fUb70brr15c/BYxiJytBFOR0F22KHVeQIEGCuMBfGxDp188mnz9/NfMifiM6
uB+K48nJyZd9jsnTb3s6GAGxsHkcG6HIS8dhyAPY0NmHXoX2CYEnawOqNz6b
D4o3JLKj5sL3o0ePHz98fPJoOIxkzr+vwKHDh33+YPjghKwefXk2HOIfh0l/
Hg7pzeCI6K1GHquDG/unAoUeTwIr3T8CTP6U086ffVI6xUVHswrPdgZ9PMXu
NaQ/6XSF/P292O3dxb61xRFwaxEGC/gIUwY6cm3k3pDRACQUT7VcOV8SNXxi
NgrMPwcNwZa5yn23NXYOqhGCA/NjNDGR+UHcNN6kqz68uAmc1d4NP1MqvigR
gA3KoaSRJLSp4OooJQl0X8tvftYbJ+E1v+9hVeZVgSblRkBdEAATlncIuIbz
yeABAao9pt7dDfgr9L9L4VPSKHsT8j04/lbpPJhBxZtyiXmXhdStnQ44U6X2
2Ah7CjQH2+DdTGOKIOeillQpNfy62K6JpywIAwOZ8+03du8HxVtd7E71R4PR
EdUDDc8JwX4/BBbjNQptHQYYAjerlHoNT2h1VcWrlQ2VzmIiDD0MNoVOnvBa
EWSRMhp7BwGPYR73UYUD4sbReprkZKBiKGYHvN3WxNJOGMglNTER1gGHyotu
JqtOY9Oom9EMu8bkYmEcX1RFWreSLNXrsvoov4IOB0vQiKWJvVn77H5aYcqm
lg4vfkYkrCxrHm9if1PFDqj9cpS6G8a8Dw5qB5+jH9TogmAWy0HHgK1CSxio
ccCvQMMxjI1rQiD3tJhvgyK1kTt6O0JrfeqNfN5spLzBLgtqqYyV/XqwivgU
Ke5jR4JJmuv0htsbuemzwKQ6hcVxevaOA4yTQi7zpVLz3M/j85h/Hdy9f//N
5OXV5Idk+sPFj0/Pry4Ho+FgNDp9+PnJCLXm4aMB/p4Oh194OI9p5mrawD2E
UH2h89ltULGFQeUBbaoiqGZp7KdJoHVshI4YFvnh3FKFatI4ghHwsh64VKX8
QyKuWoALhnt+rBE5QJn0wWRtVdYyXQngck2sjJtPkFLkhdZBF4ZPMmCflyGv
otrty3auUuU6goMBAQDo/yVwGDBU6qJlyB9tA80QxNCyV5aS1G+JQFUWE0Ew
P9XW+6p1IEVdC2JxZTDBLP2dCKvGtmaii85s6Yka7V3nzx4QP4TCj0nk0eg4
xELTNHYsN+sjFQi1K0GHXgD7ntvratj3btw1JcymsgDx6DAUcbRfrfmmjmRO
rvzI/qU08WgFTALsZYEExRyZ2w8pTOcF1DNF6BAKfH2ACNuUVgKM54ElkNwe
QeJUMeDn0pYgXRbCsB9pSqJcpDJ0rcimCoFojQZ7XSuIEGQZCQWRIf30gu2A
YWO1WEsBrp1v6w5pj4Tb6eGTiVh2Xa15+G5Be9c+9QFqOPl4/0ZIaI2rSTNp
p/WQ3a0NdX86RQa42Bv02a79IDSHFqFzCPDhwnk6OD0snMGntVQGJUttPfw7
sG6DFjzpWTJip8UMW+k6RA6EPpcFEQMvKwPBkk6UjKah3O5L/yQXH0WsH+11
5fxRq38z1eVufKzPzZ5Q/yFlFlmf6Bpxp/iQVTvcdM4Z4G3maXC9Dn1jyMT6
o5CRaI5k1jqLtZ7BLL+a5wq9E1jHnyajCFzRxdPmhF+vhEp0/Vaycq70BeAe
r7967TW9jF3bBvlHD5qod8P0hmzEXP6xI/bQdMlINUTPkMkaQe2zgzZMdr3v
7tiDzrTrXvyuOWq1uwOl+JBRmsXDkNCIVfbYiB/IT61Jy3VoS7212iOm25eF
l9F+MUSv0/Y3TWW7wHX7TuHLh/Bo/2gHzv6bDpx/WgfO6nxpW2fkUpgmCNFd
u49j9VGUMpS71vcgu6Ei2lx7P/aoC9+97Sl0Ojg5VMlL/8/d9z1+OX49PkBq
91sCDCGmMHZvIMYzQ71SLK7dj9SdLzLN4ZLtRWlm6w8iLo7kAQ2dCZ/5z7rD
d5iFR+HOa//Rc7ci3P0rMdbZ0Wk+1Jr9SB77int3F4S9pQ9VKGEQ2HFBVEAD
SGf4U8jwJW0u0hvy4Ti9KfQml9nSkzl7fxaIUGZPewv0EbJ3d+jTVKowbaDZ
99FagNxIIl8YvebfI4deCjSwcNS/AUjz08g8IAAA

-->

</rfc>
