<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.6 (Ruby 2.7.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ace-key-groupcomm-oscore-14" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.4 -->
  <front>
    <title abbrev="Key Management for OSCORE Groups in ACE">Key Management for OSCORE Groups in ACE</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ace-key-groupcomm-oscore-14"/>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>164 29 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <author initials="J." surname="Park" fullname="Jiye Park">
      <organization>Universitaet Duisburg-Essen</organization>
      <address>
        <postal>
          <street>Schuetzenbahn 70</street>
          <city>Essen</city>
          <code>45127</code>
          <country>Germany</country>
        </postal>
        <email>ji-ye.park@uni-due.de</email>
      </address>
    </author>
    <author initials="F." surname="Palombini" fullname="Francesca Palombini">
      <organization>Ericsson AB</organization>
      <address>
        <postal>
          <street>Torshamnsgatan 23</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>francesca.palombini@ericsson.com</email>
      </address>
    </author>
    <date year="2022" month="April" day="28"/>
    <area>Security</area>
    <workgroup>ACE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document defines an application profile of the ACE framework for Authentication and Authorization, to request and provision keying material in group communication scenarios that are based on CoAP and are secured with Group Object Security for Constrained RESTful Environments (Group OSCORE). This application profile delegates the authentication and authorization of Clients, that join an OSCORE group through a Resource Server acting as Group Manager for that group. This application profile leverages protocol-specific transport profiles of ACE to achieve communication security, server authentication and proof-of-possession for a key owned by the Client and bound to an OAuth 2.0 Access Token.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="sec-introduction">
      <name>Introduction</name>
      <t>Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/> is a method for application-layer protection of the Constrained Application Protocol (CoAP) <xref target="RFC7252"/>, using CBOR Object Signing and Encryption (COSE) <xref target="I-D.ietf-cose-rfc8152bis-struct"/><xref target="I-D.ietf-cose-rfc8152bis-algs"/> and enabling end-to-end security of CoAP payload and options.</t>
      <t>As described in <xref target="I-D.ietf-core-oscore-groupcomm"/>, Group OSCORE is used to protect CoAP group communication <xref target="I-D.ietf-core-groupcomm-bis"/>, which can employ, for example, IP multicast as underlying data transport. This relies on a Group Manager, which is responsible for managing an OSCORE group and enables the group members to exchange CoAP messages secured with Group OSCORE. The Group Manager can be responsible for multiple groups, coordinates the joining process of new group members, and is entrusted with the distribution and renewal of group keying material.</t>
      <t>This document is an application profile of <xref target="I-D.ietf-ace-key-groupcomm"/>, which itself builds on the ACE framework for Authentication and Authorization <xref target="I-D.ietf-ace-oauth-authz"/>. Message exchanges among the participants as well as message formats and processing follow what specified in <xref target="I-D.ietf-ace-key-groupcomm"/> for provisioning and renewing keying material in group communication scenarios, where Group OSCORE is used to protect CoAP group communication.</t>
      <section anchor="ssec-terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/><xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
        <t>Readers are expected to be familiar with:</t>
        <ul spacing="normal">
          <li>The terms and concepts described in the ACE framework for authentication and authorization <xref target="I-D.ietf-ace-oauth-authz"/> and in the Authorization Information Format (AIF) <xref target="I-D.ietf-ace-aif"/> to express authorization information. The terminology for entities in the considered architecture is defined in OAuth 2.0 <xref target="RFC6749"/>. In particular, this includes Client (C), Resource Server (RS), and Authorization Server (AS).</li>
          <li>The terms and concept related to the message formats and processing specified in <xref target="I-D.ietf-ace-key-groupcomm"/>, for provisioning and renewing keying material in group communication scenarios.</li>
          <li>The terms and concepts described in CBOR <xref target="RFC8949"/> and COSE <xref target="I-D.ietf-cose-rfc8152bis-struct"/><xref target="I-D.ietf-cose-rfc8152bis-algs"/>.</li>
          <li>The terms and concepts described in CoAP <xref target="RFC7252"/> and group communication for CoAP <xref target="I-D.ietf-core-groupcomm-bis"/>. Unless otherwise indicated, the term "endpoint" is used here following its OAuth definition, aimed at denoting resources such as /token and /introspect at the AS, and /authz-info at the RS. This document does not use the CoAP definition of "endpoint", which is "An entity participating in the CoAP protocol".</li>
          <li>
            <t>The terms and concepts for protection and processing of CoAP messages through OSCORE <xref target="RFC8613"/> and through Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/> in group communication scenarios. These especially include:  </t>
            <ul spacing="normal">
              <li>Group Manager, as the entity responsible for a set of groups where communications are secured with Group OSCORE. In this document, the Group Manager acts as Resource Server.</li>
              <li>Authentication credential, as the set of information associated with an entity, including that entity's public key and parameters associated with the public key. Examples of authentication credentials are CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392"/>, X.509 certificates <xref target="RFC7925"/> and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>.</li>
            </ul>
          </li>
        </ul>
        <t>Additionally, this document makes use of the following terminology.</t>
        <ul spacing="normal">
          <li>Requester: member of an OSCORE group that sends request messages to other members of the group.</li>
          <li>Responder: member of an OSCORE group that receives request messages from other members of the group. A responder may reply back, by sending a response message to the requester which has sent the request message.</li>
          <li>Monitor: member of an OSCORE group that is configured as responder and never replies back to requesters after receiving request messages. This corresponds to the term "silent server" used in <xref target="I-D.ietf-core-oscore-groupcomm"/>.</li>
          <li>Signature verifier: entity external to the OSCORE group and intended to verify the signature of messages exchanged in the group (see Sections <xref target="I-D.ietf-core-oscore-groupcomm" section="3.1" sectionFormat="bare"/> and <xref target="I-D.ietf-core-oscore-groupcomm" section="8.5" sectionFormat="bare"/> of <xref target="I-D.ietf-core-oscore-groupcomm"/>). An authorized signature verifier does not join the OSCORE group as an actual member, yet it can retrieve the authentication credentials of the current group members from the Group Manager.</li>
          <li>Signature-only group: an OSCORE group that uses only the group mode (see <xref section="8" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</li>
          <li>Pairwise-only group: an OSCORE group that uses only the pairwise mode (see <xref section="9" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</li>
        </ul>
      </section>
    </section>
    <section anchor="sec-protocol-overview">
      <name>Protocol Overview</name>
      <t>Group communication for CoAP has been enabled in <xref target="I-D.ietf-core-groupcomm-bis"/> and can be secured with Group Object Security for Constrained RESTful Environments (Group OSCORE) as specified in <xref target="I-D.ietf-core-oscore-groupcomm"/>. A network node joins an OSCORE group by interacting with the responsible Group Manager. Once registered in the group, the new node can securely exchange messages with other group members.</t>
      <t>This document describes how to use <xref target="I-D.ietf-ace-key-groupcomm"/> and <xref target="I-D.ietf-ace-oauth-authz"/> to perform a number of authentication, authorization and key distribution actions as overviewed in <xref section="2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, when the considered group is specifically an OSCORE group.</t>
      <t>With reference to <xref target="I-D.ietf-ace-key-groupcomm"/>:</t>
      <ul spacing="normal">
        <li>The node wishing to join the OSCORE group, i.e., the joining node, is the Client.</li>
        <li>The Group Manager is the Key Distribution Center (KDC), acting as a Resource Server.</li>
        <li>The Authorization Server associated with the Group Manager is the AS.</li>
      </ul>
      <t>A node performs the steps described in Sections <xref target="I-D.ietf-ace-key-groupcomm" section="3" sectionFormat="bare"/> and <xref target="I-D.ietf-ace-key-groupcomm" section="4.3.1.1" sectionFormat="bare"/> of <xref target="I-D.ietf-ace-key-groupcomm"/> in order to obtain an authorization for joining an OSCORE group and then to join that group. The format and processing of messages exchanged during such steps are further specified in <xref target="sec-joining-node-to-AS"/> and <xref target="sec-joining-node-to-GM"/> of this document.</t>
      <t>All communications between the involved entities MUST be secured.</t>
      <t>In particular, communications between the Client and the Group Manager leverage protocol-specific transport profiles of ACE to achieve communication security, proof-of-possession and server authentication. It is expected that, in the commonly referred base-case of this document, the transport profile to use is pre-configured and well-known to nodes participating in constrained applications.</t>
      <t>With respect to what is defined in <xref target="I-D.ietf-ace-key-groupcomm"/>:</t>
      <ul spacing="normal">
        <li>The interface provided by the Group Manager extends the original interface defined in <xref section="4.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> for the KDC, as specified in <xref target="sec-interface-GM"/> of this document.</li>
        <li>In addition to those defined in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, additional parameters are defined in this document and summarized in <xref target="ace-groupcomm-params"/>.</li>
        <li>In addition to those defined in <xref section="9" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, additional error identifiers are defined in this document and summarized in <xref target="error-types"/>.</li>
      </ul>
      <t>Finally, <xref target="profile-req"/> lists the specifications on this application profile of ACE, based on the requirements defined in Appendix A of <xref target="I-D.ietf-ace-key-groupcomm"/>.</t>
    </section>
    <section anchor="sec-format-scope">
      <name>Format of Scope</name>
      <t>Building on <xref section="3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, this section defines the exact format and encoding of scope used in this profile.</t>
      <t>To this end, this profile uses the Authorization Information Format (AIF) <xref target="I-D.ietf-ace-aif"/>. In particular, with reference to the generic AIF model</t>
      <artwork><![CDATA[
   AIF-Generic<Toid, Tperm> = [* [Toid, Tperm]]
]]></artwork>
      <t>the value of the CBOR byte string used as scope encodes the CBOR array [* [Toid, Tperm]], where each [Toid, Tperm] element corresponds to one scope entry.</t>
      <t>Furthermore, this document defines the new AIF specific data model AIF-OSCORE-GROUPCOMM, that this profile MUST use to format and encode scope entries.</t>
      <t>In particular, the following holds for each scope entry.</t>
      <ul spacing="normal">
        <li>The object identifier ("Toid") is specialized as a CBOR item specifying the name of the groups pertaining to the scope entry.</li>
        <li>The permission set ("Tperm") is specialized as a CBOR unsigned integer with value R, specifying the permissions that the Client wishes to have in the groups indicated by "Toid".</li>
      </ul>
      <t>More specifically, the following applies when, as defined in this document, a scope entry includes as set of permissions the set of roles to take in an OSCORE group.</t>
      <ul spacing="normal">
        <li>The object identifier ("Toid") is a CBOR text string, specifying the group name for the scope entry.</li>
        <li>
          <t>The permission set ("Tperm") is a CBOR unsigned integer with value R, specifying the role(s) that the Client wishes to take in the group (REQ1). The value R is computed as follows.  </t>
          <ul spacing="normal">
            <li>Each role in the permission set is converted into the corresponding numeric identifier X from the "Value" column of the "Group OSCORE Roles" registry, for which this document defines the entries in <xref target="fig-role-values"/>.</li>
            <li>The set of N numbers is converted into the single value R, by taking two to the power of each numeric identifier X_1, X_2, ..., X_N, and then computing the inclusive OR of the binary representations of all the power values.</li>
          </ul>
        </li>
      </ul>
      <figure anchor="fig-role-values">
        <name>Numeric identifier of roles in an OSCORE group</name>
        <artwork align="center"><![CDATA[
+-----------+-------+-------------------------------------------------+
| Name      | Value | Description                                     |
+===========+=======+=================================================+
| Reserved  | 0     | This value is reserved                          |
|-----------+-------+-------------------------------------------------+
| Requester | 1     | Send requests; receive responses                |
|-----------+-------+-------------------------------------------------+
| Responder | 2     | Send responses; receive requests                |
+-----------+-------+-------------------------------------------------+
| Monitor   | 3     | Receive requests; never send requests/responses |
|-----------+-------+-------------------------------------------------|
| Verifier  | 4     | Verify signature of intercepted messages        |
+-----------+-------+-------------------------------------------------+
]]></artwork>
      </figure>
      <t>The following CDDL <xref target="RFC8610"/> notation defines a scope entry that uses the AIF-OSCORE-GROUPCOMM data model and expresses a set of Group OSCORE roles from those in <xref target="fig-role-values"/>.</t>
      <artwork><![CDATA[
   AIF-OSCORE-GROUPCOMM = AIF-Generic<oscore-gname, oscore-gperm>
   
   oscore-gname = tstr  ; Group name
   oscore-gperm = uint . bits group-oscore-roles
   
   group-oscore-roles = &(
      Requester: 1,
      Responder: 2,
      Monitor: 3,
      Verifier: 4
   )
   
   scope_entry = [oscore-gname, oscore-gperm]
]]></artwork>
      <t>Future specifications that define new Group OSCORE roles MUST register a corresponding numeric identifier in the "Group OSCORE Roles" registry defined in <xref target="ssec-iana-group-oscore-roles-registry"/> of this document.</t>
      <t>Note that the value 0 is not available to use as numeric identifier to specify a Group OSCORE role. It follows that, when expressing Group OSCORE roles to take in a group as per this document, a scope entry has the least significant bit of "Tperm" always set to 0.</t>
      <t>This is an explicit feature of the AIF-OSCORE-GROUPCOMM data model. That is, for each scope entry, the least significant bit of "Tperm" set to 0 explicitly identifies the scope entry as exactly expressing a set of Group OSCORE roles ("Tperm"), pertaining to a single group whose name is specified by the string literal in "Toid".</t>
      <t>Instead, by relying on the same AIF-OSCORE-GROUPCOMM data model, <xref target="I-D.ietf-ace-oscore-gm-admin"/> defines the format of scope entries for Administrator Clients that wish to access an admin interface at the Group Manager. In such scope entries, the least significant bit of "Tperm" is always set to 1.</t>
    </section>
    <section anchor="sec-public-keys-of-joining-nodes">
      <name>Authentication Credentials</name>
      <t>Source authentication of a message sent within the group and protected with Group OSCORE is ensured by means of a digital signature embedded in the message (in group mode), or by integrity-protecting the message with pairwise keying material derived from the asymmetric keys of sender and recipient (in pairwise mode).</t>
      <t>Therefore, group members must be able to retrieve each other's authentication credential from a trusted repository, in order to verify source authenticity of incoming group messages.</t>
      <t>As also discussed in <xref target="I-D.ietf-core-oscore-groupcomm"/>, the Group Manager acts as trusted repository of the authentication credentials of the group members, and provides those authentication credentials to group members if requested to. Upon joining an OSCORE group, a joining node is thus expected to provide its own authentication credential to the Group Manager.</t>
      <t>In particular, one of the following four cases can occur when a new node joins an OSCORE group.</t>
      <ul spacing="normal">
        <li>The joining node is going to join the group exclusively as monitor, i.e., it is not going to send messages to the group. In this case, the joining node is not required to provide its own authentication credential to the Group Manager, which thus does not have to perform any check related to the format of the authentication credential, to a signature or ECDH algorithm, and to possible parameters associated with the algorithm and the public key. In case the joining node still provides an authentication credential in the 'client_cred' parameter of the Joining Request (see <xref target="ssec-join-req-sending"/>), the Group Manager silently ignores that parameter, as well as the related parameters 'cnonce' and 'client_cred_verify'.</li>
        <li>The Group Manager already acquired the authentication credential of the joining node during a past joining process. In this case, the joining node MAY choose not to provide again its own authentication credential to the Group Manager, in order to limit the size of the Joining Request. The joining node MUST provide its own authentication credential again if it has provided the Group Manager with multiple authentication credentials during past joining processes, intended for different OSCORE groups. If the joining node provides its own authentication credential, the Group Manager performs consistency checks as per <xref target="ssec-join-req-processing"/> and, in case of success, considers it as the authentication credential associated with the joining node in the OSCORE group.</li>
        <li>
          <t>The joining node and the Group Manager use an asymmetric proof-of-possession key to establish a secure communication association. Then, two cases can occur.  </t>
          <ol spacing="normal" type="1"><li>
              <t>When establishing the secure communication association, the Group Manager obtained from the joining node the joining node's authentication credential, in the format used in the OSCORE group and including the asymmetric proof-of-possession key as public key. Also, such authentication credential and the proof-of-possession key are compatible with the signature or ECDH algorithm, and possible associated parameters used in the OSCORE group.      </t>
              <t>
In this case, the Group Manager considers the authentication credential as the one associated with the joining node in the OSCORE group. If the joining node is aware that the authentication credential and the public key included thereof are also valid for the OSCORE group, then the joining node MAY choose to not provide again its own authentication credential to the Group Manager.      </t>
              <t>
The joining node MUST provide again its own authentication credential if it has provided the Group Manager with multiple authentication credentials during past joining processes, intended for different OSCORE groups. If the joining node provides its own authentication credential in the 'client_cred' parameter of the Joining Request (see <xref target="ssec-join-req-sending"/>), the Group Manager performs consistency checks as per <xref target="ssec-join-req-processing"/> and, in case of success, considers it as the authentication credential associated with the joining node in the OSCORE group.</t>
            </li>
            <li>
              <t>The authentication credential is not in the format used in the OSCORE group, or else the authentication credential and the proof-of-possession key included as public key are not compatible with the signature or ECDH algorithm, and possible associated parameters used in the OSCORE group.      </t>
              <t>
In this case, the joining node MUST provide a different compatible authentication credential and public key included thereof to the Group Manager in the 'client_cred' parameter of the Joining Request (see <xref target="ssec-join-req-sending"/>). Then, the Group Manager performs consistency checks on this latest provided authentication credential as per <xref target="ssec-join-req-processing"/> and, in case of success, considers it as the authentication credential associated with the joining node in the OSCORE group.</t>
            </li>
          </ol>
        </li>
        <li>The joining node and the Group Manager use a symmetric proof-of-possession key to establish a secure communication association. In this case, upon performing a joining process with that Group Manager for the first time, the joining node specifies its own authentication credential in the 'client_cred' parameter of the Joining Request (see <xref target="ssec-join-req-sending"/>).</li>
      </ul>
    </section>
    <section anchor="sec-joining-node-to-AS">
      <name>Authorization to Join a Group</name>
      <t>This section builds on <xref section="3" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> and is organized as follows.</t>
      <t>First, <xref target="ssec-auth-req"/> and <xref target="ssec-auth-resp"/> describe how the joining node interacts with the AS, in order to be authorized to join an OSCORE group under a given Group Manager and to obtain an Access Token. Then, <xref target="ssec-token-post"/> describes how the joining node transfers the obtained Access Token to the Group Manager. The following considers a joining node that intends to contact the Group Manager for the first time.</t>
      <t>Note that what is defined in <xref section="3" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> applies, and only additions or modifications to that specification are defined in this document.</t>
      <section anchor="ssec-auth-req">
        <name>Authorization Request</name>
        <t>The Authorization Request message is as defined in <xref section="3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with the following additions.</t>
        <ul spacing="normal">
          <li>
            <t>If the 'scope' parameter is present:  </t>
            <ul spacing="normal">
              <li>
                <t>The value of the CBOR byte string encodes a CBOR array, whose format MUST follow the data model AIF-OSCORE-GROUPCOMM defined in <xref target="sec-format-scope"/>. In particular, for each OSCORE group to join:      </t>
                <ul spacing="normal">
                  <li>The group name is encoded as a CBOR text string.</li>
                  <li>The set of requested roles is expressed as a single CBOR unsigned integer. This is computed as defined in <xref target="sec-format-scope"/>, from the numerical abbreviations of each requested role defined in the "Group OSCORE Roles" registry, for which this document defines the entries in <xref target="fig-role-values"/> (REQ1).</li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="ssec-auth-resp">
        <name>Authorization Response</name>
        <t>The Authorization Response message is as defined in <xref section="3.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with the following additions:</t>
        <ul spacing="normal">
          <li>The AS MUST include the 'expires_in' parameter. Other means for the AS to specify the lifetime of Access Tokens are out of the scope of this document.</li>
          <li>The AS MUST include the 'scope' parameter, when the value included in the Access Token differs from the one specified by the joining node in the Authorization Request. In such a case, the second element of each scope entry MUST be present, and specifies the set of roles that the joining node is actually authorized to take in the OSCORE group for that scope entry, encoded as specified in <xref target="ssec-auth-req"/>.</li>
        </ul>
        <t>Furthermore, if the AS uses the extended format of scope defined in <xref section="7" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> for the 'scope' claim of the Access Token, the first element of the CBOR sequence <xref target="RFC8742"/> MUST be the CBOR integer with value SEM_ID_TBD, defined in <xref target="iana-scope-semantics"/> of this document (REQ28). This indicates that the second element of the CBOR sequence, as conveying the actual access control information, follows the scope semantics defined for this application profile in <xref target="sec-format-scope"/> of this document.</t>
      </section>
      <section anchor="ssec-token-post">
        <name>Token Transferring</name>
        <t>The exchange of Token Transfer Request and Token Transfer Response is defined in <xref section="3.3" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In addition to that, the following applies.</t>
        <ul spacing="normal">
          <li>
            <t>The Token Transfer Request MAY additionally contain the following parameters, which, if included, MUST have the corresponding values defined below (OPT2):  </t>
            <ul spacing="normal">
              <li>'ecdh_info' defined in <xref target="ecdh-info"/> of this document, with value the CBOR simple value "null" (0xf6) to request information about the ECDH algorithm, the ECDH algorithm parameters, the ECDH key parameters and the exact format of authentication credentials used in the groups that the Client has been authorized to join. This is relevant in case the joining node supports the pairwise mode of Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>.</li>
              <li>'kdc_dh_creds' defined in <xref target="gm-dh-info"/> of this document, with value the CBOR simple value "null" (0xf6) to request the Diffie-Hellman authentication credentials of the Group Manager for the groups that the Client has been authorized to join. That is, each of such authentication credentials includes a Diffie-Hellman public key of the Group Manager. This is relevant in case the joining node supports the pairwise mode of Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>.</li>
            </ul>
            <t>
Alternatively, the joining node may retrieve this information by other means.</t>
          </li>
          <li>
            <t>The 'kdcchallenge' parameter contains a dedicated nonce N_S generated by the Group Manager. For the N_S value, it is RECOMMENDED to use a 8-byte long random nonce. The joining node can use this nonce in order to prove the possession of its own private key, upon joining the group (see <xref target="ssec-join-req-sending"/>).  </t>
            <t>
The 'kdcchallenge' parameter MAY be omitted from the Token Transfer Response, if the 'scope' of the Access Token specifies only the role "monitor" or only the role "verifier" or only the two roles combined, for each and every of the specified groups.</t>
          </li>
          <li>
            <t>If the 'sign_info' parameter is present in the response, the following applies for each element 'sign_info_entry'.  </t>
            <ul spacing="normal">
              <li>'id' MUST NOT refer to OSCORE groups that are pairwise-only groups.</li>
              <li>'sign_alg' takes value from the "Value" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</li>
              <li>'sign_parameters' is a CBOR array. Its format and value are the same of the COSE capabilities array for the algorithm indicated in 'sign_alg', as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/> (REQ4).</li>
              <li>'sign_key_parameters' is a CBOR array. Its format and value are the same of the COSE capabilities array for the COSE key type of the keys used with the algorithm indicated in 'sign_alg', as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="COSE.Key.Types"/> (REQ5).</li>
              <li>
                <t>'pub_key_enc' takes value from the "Label" column of the "COSE Header Parameters" registry <xref target="COSE.Header.Parameters"/> (REQ6). Consistently with <xref section="2.3" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>, acceptable values denote a format of authentication credential that MUST explicitly provide the public key as well as the comprehensive set of information related to the public key algorithm, including, e.g., the used elliptic curve (when applicable).      </t>
                <t>
At the time of writing this specification, acceptable formats of authentication credentials are CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392"/>, X.509 certificates <xref target="RFC7925"/> and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>. Further formats may be available in the future, and would be acceptable to use as long as they comply with the criteria defined above.      </t>
                <t>
[ As to CWTs and CCSs, the COSE Header Parameters 'kcwt' and 'kccs' are under pending registration requested by draft-ietf-lake-edhoc. ]      </t>
                <t>
[ As to C509 certificates, the COSE Header Parameters 'c5b' and 'c5c' are under pending registration requested by draft-ietf-cose-cbor-encoded-cert. ]</t>
              </li>
            </ul>
            <t>
This format is consistent with every signature algorithm currently considered in <xref target="I-D.ietf-cose-rfc8152bis-algs"/>, i.e., with algorithms that have only the COSE key type as their COSE capability. Appendix B of <xref target="I-D.ietf-ace-key-groupcomm"/> describes how the format of each 'sign_info_entry' can be generalized for possible future registered algorithms having a different set of COSE capabilities.</t>
          </li>
          <li>
            <t>If 'ecdh_info' is included in the Token Transfer Request, the Group Manager SHOULD include the 'ecdh_info' parameter in the Token Transfer Response, as per the format defined in <xref target="ecdh-info"/>. Note that the field 'id' of each 'ecdh_info_entry' specifies the name, or array of group names, for which that 'ecdh_info_entry' applies to.  </t>
            <t>
As an exception, the KDC MAY omit the 'ecdh_info' parameter in the Token Transfer Response even if 'ecdh_info' is included in the Token Transfer Request, in case all the groups that the Client is authorized to join are signature-only groups.</t>
          </li>
          <li>If 'kdc_dh_creds' is included in the Token Transfer Request and any of the groups that the Client has been authorized to join is a pairwise-only group, then the Group Manager MUST include the 'kdc_dh_creds' parameter in the Token Transfer Response, as per the format defined in <xref target="gm-dh-info"/>. Otherwise, if 'kdc_dh_creds' is included in the Token Transfer Request, the Group Manager MAY include the 'kdc_dh_creds' parameter in the Token Transfer Response. Note that the field 'id' specifies the group name, or array of group names, for which the corresponding 'kdc_dh_creds' applies to.</li>
        </ul>
        <t>Note that, other than through the above parameters as defined in <xref section="3.3" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, the joining node may have obtained such information by alternative means. For example, information conveyed in the 'sign_info' and 'ecdh_info' parameters may have been pre-configured, or the joining node MAY early retrieve it by using the approach described in <xref target="I-D.tiloca-core-oscore-discovery"/>, to discover the OSCORE group and the link to the associated group-membership resource at the Group Manager (OPT3).</t>
        <section anchor="ecdh-info">
          <name>'ecdh_info' Parameter</name>
          <t>The 'ecdh_info' parameter is an OPTIONAL parameter of the request and response messages exchanged between the Client and the authz-info endpoint at the RS (see <xref section="5.10.1." sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>).</t>
          <t>This parameter allows the Client and the RS to exchange information about an ECDH algorithm as well as about the authentication credentials and public keys to accordingly use for deriving Diffie-Hellman secrets. Its exact semantics and content are application specific.</t>
          <t>In this application profile, this parameter is used to exchange information about the ECDH algorithm as well as about the authentication credentials and public keys to be used with it, in the groups indicated by the transferred Acces Token as per its 'scope' claim (see <xref section="3.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>).</t>
          <t>When used in the Token Transfer Request sent to the Group Manager, the 'ecdh_info' parameter has value the CBOR simple value "null" (0xf6). This is done to ask for information about the ECDH algorithm as well as about the authentication credentials and public keys to be used to compute static-static Diffie-Hellman shared secrets <xref target="NIST-800-56A"/>, in the OSCORE groups that the Client has been authorized to join and that use the pairwise mode of Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>.</t>
          <t>When used in the following Token Transfer Response from the Group Manager, the 'ecdh_info' parameter is a CBOR array of one or more elements. The number of elements is at most the number of OSCORE groups that the Client has been authorized to join.</t>
          <t>Each element contains information about ECDH parameters as well as about authentication credentials and public keys, for one or more OSCORE groups that use the pairwise mode of Group OSCORE and that the Client has been authorized to join. Each element is formatted as follows.</t>
          <ul spacing="normal">
            <li>The first element 'id' is the group name of the OSCORE group or an array of group names for the OSCORE groups for which the specified information applies. In particular 'id' MUST NOT refer to OSCORE groups that are signature-only groups.</li>
            <li>The second element 'ecdh_alg' is a CBOR integer or a CBOR text string indicating the ECDH algorithm used in the OSCORE group identified by 'gname'. Values are taken from the "Value" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</li>
            <li>The third element 'ecdh_parameters' is a CBOR array indicating the parameters of the ECDH algorithm used in the OSCORE group identified by 'gname'. Its format and value are the same of the COSE capabilities array for the algorithm indicated in 'ecdh_alg', as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</li>
            <li>The fourth element 'ecdh_key_parameters' is a CBOR array indicating the parameters of the keys used with the ECDH algorithm in the OSCORE group identified by 'gname'. Its content depends on the value of 'ecdh_alg'. In particular, its format and value are the same of the COSE capabilities array for the COSE key type of the keys used with the algorithm indicated in 'ecdh_alg', as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="COSE.Key.Types"/>.</li>
            <li>The fifth element 'cred_fmt' is a CBOR integer indicating the format of authentication credentials used in the OSCORE group identified by 'gname'. It takes value from the "Label" column of the "COSE Header Parameters" registry <xref target="COSE.Header.Parameters"/> (REQ6). Acceptable values denote a format that MUST  provide the public key as well as the comprehensive set of information related to the public key algorithm, including, e.g., the used elliptic curve (when applicable). The same considerations and guidelines for the 'pub_key_enc' element of 'sign_info' apply (see <xref target="ssec-token-post"/>).</li>
          </ul>
          <t>The CDDL notation <xref target="RFC8610"/> of the 'ecdh_info' parameter is given below.</t>
          <sourcecode type="CDDL"><![CDATA[
ecdh_info = ecdh_info_req / ecdh_info_resp

ecdh_info_req = null                  ; in the Token Transfer
                                      ; Request to the
                                      ; Group Manager

ecdh_info_res = [ + ecdh_info_entry ] ; in the Token Transfer
                                      ; Response from the
                                      ; Group Manager

ecdh_info_entry =
[
  id : gname / [ + gname ],
  ecdh_alg : int / tstr,
  ecdh_parameters : [ any ],
  ecdh_key_parameters : [ any ],
  cred_fmt = int
]

gname = tstr
]]></sourcecode>
          <t>This format is consistent with every ECDH algorithm currently defined in <xref target="I-D.ietf-cose-rfc8152bis-algs"/>, i.e., with algorithms that have only the COSE key type as their COSE capability. <xref target="sec-future-cose-algs"/> of this document describes how the format of each 'ecdh_info_entry' can be generalized for possible future registered algorithms having a different set of COSE capabilities.</t>
        </section>
        <section anchor="gm-dh-info">
          <name>'kdc_dh_creds' Parameter</name>
          <t>The 'kdc_dh_creds' parameter is an OPTIONAL parameter of the request and response messages exchanged between the Client and the authz-info endpoint at the RS (see <xref section="5.10.1." sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>).</t>
          <t>This parameter allows the Client to request and retrieve the Diffie-Hellman authentication credentials of the RS, i.e., authentication credentials including a Diffie-Hellman public key of the RS.</t>
          <t>In this application profile, this parameter is used to request and retrieve from the Group Manager its Diffie-Hellman authentication credentials to use, in the OSCORE groups that the Client has been authorized to join. The Group Manager has specifically a Diffie-Hellman authentication credential in an OSCORE group, and thus a Diffie-Hellman public key in that group, if and only if the group is a pairwise-only group. In this case, the early retrieval of the Group Manager's authentication credential is necessary in order for the joining node to prove the possession of its own private key, upon joining the group (see <xref target="ssec-join-req-sending"/>).</t>
          <t>When used in the Token Transfer Request sent to the Group Manager, the 'kdc_dh_creds' parameter has value the CBOR simple value "null" (0xf6). This is done to ask for the Diffie-Hellman authentication credentials that the Group Manager uses in the OSCORE groups that the Client has been authorized to join.</t>
          <t>When used in the following Token Transfer Response from the Group Manager, the 'kdc_dh_creds' parameter is a CBOR array of one or more elements. The number of elements is at most the number of OSCORE groups that the Client has been authorized to join.</t>
          <t>Each element 'kdc_dh_creds_entry' contains information about the Group Manager's Diffie-Hellman authentication credentials, for one or more OSCORE groups that are pairwise-only groups and that the Client has been authorized to join. Each element is formatted as follows.</t>
          <ul spacing="normal">
            <li>The first element 'id' is the group name of the OSCORE group or an array of group names for the OSCORE groups for which the specified information applies. In particular 'id' MUST refer exclusively to OSCORE groups that are pairwise-only groups.</li>
            <li>The second element 'cred_fmt' is a CBOR integer indicating the format of authentication credentials used in the OSCORE group identified by 'gname'. It takes value from the "Label" column of the "COSE Header Parameters" registry <xref target="COSE.Header.Parameters"/> (REQ6). Acceptable values denote a format that MUST explicitly provide the public key as well as comprehensive set of information related to the public key algorithm, including, e.g., the used elliptic curve (when applicable). The same considerations and guidelines for the 'pub_key_enc' element of 'sign_info' apply (see <xref target="ssec-token-post"/>).</li>
            <li>The third element 'cred' is a CBOR byte string, which encodes the Group Manager's Diffie-Hellman authentication credential in its original binary representation made available to other endpoints in the group. In particular, the original binary representation complies with the format specified by the 'cred_fmt' element. Note that the authentication credential provides the comprehensive set of information related to its public key algorithm, i.e., the ECDH algorithm used in the OSCORE group as pairwise key agreement algorithm.</li>
          </ul>
          <t>The CDDL notation <xref target="RFC8610"/> of the 'kdc_dh_creds' parameter is given below.</t>
          <sourcecode type="CDDL"><![CDATA[
kdc_dh_creds = kdc_dh_creds_req / kdc_dh_creds_resp

kdc_dh_creds_req = null                     ; in the Token Transfer
                                            ; Request to the
                                            ; Group Manager

kdc_dh_creds_res = [ + kdc_dh_creds_entry ] ; in the Token Transfer
                                            ; Response from the
                                            ; Group Manager

kdc_dh_creds_entry =
[
  id : gname / [ + gname ],
  cred_fmt = int,
  cred = bstr
]

gname = tstr
]]></sourcecode>
        </section>
      </section>
    </section>
    <section anchor="sec-joining-node-to-GM">
      <name>Group Joining</name>
      <t>This section describes the interactions between the joining node and the Group Manager to join an OSCORE group. The message exchange between the joining node and the Group Manager consists of the messages defined in <xref section="4.3.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. Note that what is defined in <xref target="I-D.ietf-ace-key-groupcomm"/> applies, and only additions or modifications to that specification are defined in this document.</t>
      <section anchor="ssec-join-req-sending">
        <name>Send the Joining Request</name>
        <t>The joining node requests to join the OSCORE group by sending a Joining Request message to the related group-membership resource at the Group Manager, as per <xref section="4.3.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. Additionally to what is defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, the following applies.</t>
        <ul spacing="normal">
          <li>The 'scope' parameter MUST be included. Its value encodes one scope entry with the format defined in <xref target="sec-format-scope"/>, indicating the group name and the role(s) that the joining node wants to take in the group.</li>
          <li>
            <t>The 'get_pub_keys' parameter is present only if the joining node wants to retrieve the authentication credentials of the group members from the Group Manager during the joining process (see <xref target="sec-public-keys-of-joining-nodes"/>). Otherwise, this parameter MUST NOT be present.  </t>
            <t>
If this parameter is present and its value is not the CBOR simple value "null" (0xf6), each element of the inner CBOR array 'role_filter' is encoded as a CBOR unsigned integer, with the same value of a permission set ("Tperm") indicating that role or combination of roles in a scope entry, as defined in <xref target="sec-format-scope"/>.</t>
          </li>
          <li>'cnonce' contains a dedicated nonce N_C generated by the joining node. For the N_C value, it is RECOMMENDED to use a 8-byte long random nonce.</li>
          <li>
            <t>The proof-of-possession (PoP) evidence included in 'client_cred_verify' is computed as defined below (REQ14). In either case, the N_S used to build the PoP input is as defined in <xref target="sssec-challenge-value"/>.  </t>
            <ul spacing="normal">
              <li>If the group is not a pairwise-only group, the PoP evidence MUST be a signature. The joining node computes the signature by using the same private key and signature algorithm it intends to use for signing messages in the OSCORE group.</li>
              <li>
                <t>If the group is a pairwise-only group, the PoP evidence MUST be a MAC computed as follows, by using the HKDF Algorithm HKDF SHA-256, which consists of composing the HKDF-Extract and HKDF-Expand steps <xref target="RFC5869"/>.      </t>
                <t>
MAC = HKDF(salt, IKM, info, L)      </t>
                <t>
The input parameters of HKDF are as follows.      </t>
                <ul spacing="normal">
                  <li>salt takes as value the empty byte string.</li>
                  <li>IKM is computed as a cofactor Diffie-Hellman shared secret, see Section 5.7.1.2 of <xref target="NIST-800-56A"/>, using the ECDH algorithm used in the OSCORE group. The joining node uses its own Diffie-Hellman private key and the Diffie-Hellman public key of the Group Manager. For X25519 and X448, the procedure is described in <xref section="5" sectionFormat="of" target="RFC7748"/>.</li>
                  <li>info takes as value the PoP input.</li>
                  <li>L is equal to 8, i.e., the size of the MAC, in bytes.</li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <section anchor="sssec-challenge-value">
          <name>Value of the N_S Challenge</name>
          <t>The value of the N_S challenge is determined as follows.</t>
          <ol spacing="normal" type="1"><li>If the joining node has provided the Access Token to the Group Manager by means of a Token Transfer Request to the /authz-info endpoint as in <xref target="ssec-token-post"/>, then N_S takes the same value of the most recent 'kdcchallenge' parameter received by the joining node from the Group Manager. This can be either the one specified in the Token Transfer Response, or the one possibly specified in a 4.00 (Bad Request) error response to a following Joining Request (see <xref target="ssec-join-req-processing"/>).</li>
            <li>If the provisioning of the Access Token to the Group Manager has relied on the DTLS profile of ACE <xref target="I-D.ietf-ace-dtls-authorize"/> with the Access Token as content of the "psk_identity" field of the ClientKeyExchange message <xref target="RFC6347"/>, then N_S is an exporter value computed as defined in <xref section="7.5" sectionFormat="of" target="RFC8446"/>. Specifically, N_S is exported from the DTLS session between the joining node and the Group Manager, using an empty 'context_value', 32 bytes as 'key_length', and the exporter label "EXPORTER-ACE-Sign-Challenge-coap-group-oscore-app" defined in <xref target="ssec-iana-tls-esporter-label-registry"/> of this document.</li>
          </ol>
          <t>It is up to applications to define how N_S is computed in further alternative settings.</t>
          <t><xref target="ssec-security-considerations-reusage-nonces"/> provides security considerations on the reusage of the N_S challenge.</t>
        </section>
      </section>
      <section anchor="ssec-join-req-processing">
        <name>Receive the Joining Request</name>
        <t>The Group Manager processes the Joining Request as defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with the following additions.</t>
        <t>The Group Manager verifies the PoP evidence contained in 'client_cred_verify' as follows:</t>
        <ul spacing="normal">
          <li>As PoP input, the Group Manager uses the value of the 'scope' parameter from the Joining Request as a CBOR byte string, concatenated with N_S encoded as a CBOR byte string, concatenated with N_C encoded as a CBOR byte string. In particular, N_S is determined as described in <xref target="sssec-challenge-value"/>, while N_C is the nonce provided in the 'cnonce' parameter of the Joining Request.</li>
          <li>As public key of the joining node, the Group Manager uses either the one included in the authentication credential retrieved from the 'client_cred' parameter of the Joining Request, or the one from the already stored authentication credential as acquired from previous interactions with the joining node (see <xref target="sec-public-keys-of-joining-nodes"/>).</li>
          <li>If the group is not a pairwise-only group, the PoP evidence is a signature. The Group Manager verifies it by using the public key of the joining node, as well as the signature algorithm used in the OSCORE group and possible corresponding parameters.</li>
          <li>If the group is a pairwise-only group, the PoP evidence is a MAC. The Group Manager recomputes the MAC through the same process taken by the joining node when preparing the value of the 'client_cred_verify' parameter for the Joining Request (see <xref target="ssec-join-req-sending"/>), with the difference that the Group Manager uses its own Diffie-Hellman private key and the Diffie-Hellman public key of the joining node. The verification succeeds if and only if the recomputed MAC is equal to the MAC conveyed as PoP evidence in the Joining Request.</li>
        </ul>
        <t>The Group Manager MUST reply with a 5.03 (Service Unavailable) error response in the following cases:</t>
        <ul spacing="normal">
          <li>There are currently no OSCORE Sender IDs available to assign in the OSCORE group and, at the same time, the joining node is not going to join the group exclusively as monitor. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 4 ("No available node identifiers").</li>
          <li>The OSCORE group that the joining node has been trying to join is currently inactive (see <xref target="ssec-resource-active"/>). The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 9 ("Group currently not active").</li>
        </ul>
        <t>The Group Manager MUST reply with a 4.00 (Bad Request) error response in the following cases:</t>
        <ul spacing="normal">
          <li>The 'client_cred' parameter is present in the Joining Request and its value is not an eligible authentication credential (e.g., it is not of the format accepted in the group).</li>
          <li>
            <t>The 'client_cred' parameter is not present in the Joining Request while the joining node is not going to join the group exclusively as monitor, and any of the following conditions holds:  </t>
            <ul spacing="normal">
              <li>The Group Manager does not store an eligible authentication credential (e.g., of the format accepted in the group) for the joining node.</li>
              <li>The Group Manager stores multiple eligible authentication credentials (e.g., of the format accepted in the group) for the joining node.</li>
            </ul>
          </li>
          <li>The 'scope' parameter is not present in the Joining Request, or it is present and specifies any set of roles not included in the following list: "requester", "responder", "monitor", ("requester", "responder"). Future specifications that define a new role for members of OSCORE groups MUST define possible sets of roles (including the new role and existing roles) that are acceptable to specify in the 'scope' parameter of a Joining Request.</li>
          <li>The Joining Request includes the 'client_cred' parameter but does not include both the 'cnonce' and 'client_cred_verify' parameters.</li>
        </ul>
        <t>In order to prevent the acceptance of Ed25519 and Ed448 public keys that cannot be successfully converted to Montgomery coordinates, and thus cannot be used for the derivation of pairwise keys (see <xref section="2.4.1" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>), the Group Manager MAY reply with a 4.00 (Bad Request) error response in case all the following conditions hold:</t>
        <ul spacing="normal">
          <li>The OSCORE group uses the pairwise mode of Group OSCORE.</li>
          <li>The OSCORE group uses EdDSA public keys <xref target="RFC8032"/>.</li>
          <li>
            <t>The authentication credential of the joining node from the 'client_cred' parameter includes a public key which:  </t>
            <ul spacing="normal">
              <li>Is for the elliptic curve Ed25519 and has its Y coordinate equal to -1 or 1 (mod p), with p = (2^255 - 19), see <xref section="4.1" sectionFormat="of" target="RFC7748"/>; or</li>
              <li>Is for the elliptic curve Ed448 and has its Y coordinate equal to -1 or 1 (mod p), with p =  (2^448 - 2^224 - 1), see <xref section="4.2" sectionFormat="of" target="RFC7748"/>.</li>
            </ul>
          </li>
        </ul>
        <t>A 4.00 (Bad Request) error response from the Group Manager to the joining node MUST have content format application/ace-groupcomm+cbor. The response payload is a CBOR map formatted as follows:</t>
        <ul spacing="normal">
          <li>If the group uses (also) the group mode of Group OSCORE, the CBOR map MUST contain the 'sign_info' parameter, whose CBOR label is defined in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. This parameter has the same format of 'sign_info_res' defined in <xref section="3.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular, it includes a single element 'sign_info_entry' pertaining to the OSCORE group that the joining node has tried to join with the Joining Request.</li>
          <li>If the group uses (also) the pairwise mode of Group OSCORE, the CBOR map MUST contain the 'ecdh_info' parameter, whose CBOR label is defined in <xref target="ssec-iana-ace-groupcomm-parameters-registry"/>. This parameter has the same format of 'ecdh_info_res' defined in <xref target="ecdh-info"/>. In particular, it includes a single element 'ecdh_info_entry' pertaining to the OSCORE group that the joining node has tried to join with the Joining Request.</li>
          <li>If the group is a pairwise-only group, the CBOR map MUST contain the 'kdc_dh_creds' parameter, whose CBOR label is defined in <xref target="ssec-iana-ace-groupcomm-parameters-registry"/>. This parameter has the same format of 'kdc_dh_creds_res' defined in <xref target="gm-dh-info"/>. In particular, it includes a single element 'kdc_dh_creds_entry' pertaining to the OSCORE group that the joining node has tried to join with the Joining Request.</li>
          <li>The CBOR map MAY include the 'kdcchallenge' parameter, whose CBOR label is defined in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. If present, this parameter is a CBOR byte string, which encodes a newly generated 'kdcchallenge' value that the Client can use when preparing a Joining Request (see <xref target="ssec-join-req-sending"/>). In such a case the Group Manager MUST store the newly generated value as the 'kdcchallenge' value associated with the joining node, possibly replacing the currently stored value.</li>
        </ul>
        <section anchor="follow-up-to-a-400-bad-request-error-response">
          <name>Follow-up to a 4.00 (Bad Request) Error Response</name>
          <t>When receiving a 4.00 (Bad Request) error response, the joining node MAY send a new Joining Request to the Group Manager. In such a case:</t>
          <ul spacing="normal">
            <li>The 'cnonce' parameter MUST include a new dedicated nonce N_C generated by the joining node.</li>
            <li>The 'client_cred' parameter MUST include an authentication credential in the format indicated by the Group Manager. Also, the authentication credential as well as the included public key MUST be compatible with the signature or ECDH algorithm, and possible associated parameters.</li>
            <li>The 'client_cred_verify' parameter MUST include a PoP evidence computed as described in <xref target="ssec-join-req-sending"/>, by using the private key associated with the authentication credential specified in the current 'client_cred' parameter, with the signature or ECDH algorithm, and possible associated parameters indicated by the Group Manager. If the error response from the Group Manager includes the 'kdcchallenge' parameter, the joining node MUST use its content as new N_S challenge to compute the PoP evidence.</li>
          </ul>
        </section>
      </section>
      <section anchor="ssec-join-resp">
        <name>Send the Joining Response</name>
        <t>If the processing of the Joining Request described in <xref target="ssec-join-req-processing"/> is successful, the Group Manager updates the group membership by registering the joining node NODENAME as a new member of the OSCORE group GROUPNAME, as described in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>.</t>
        <t>If the joining node has not taken exclusively the role of monitor, the Group Manager performs also the following actions.</t>
        <ul spacing="normal">
          <li>
            <t>The Group Manager selects an available OSCORE Sender ID in the OSCORE group, and exclusively assigns it to the joining node. The Group Manager MUST NOT assign an OSCORE Sender ID to the joining node if this joins the group exclusively with the role of monitor, according to what is specified in the Access Token (see <xref target="ssec-auth-resp"/>).  </t>
            <t>
Consistently with <xref section="3.2.1" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>, the Group Manager MUST assign an OSCORE Sender ID that has not been used in the OSCORE group since the latest time when the current Gid value was assigned to the group.  </t>
            <t>
If the joining node is recognized as a current group member, e.g., through the ongoing secure communication association, the following also applies.  </t>
            <ul spacing="normal">
              <li>The Group Manager MUST assign a new OSCORE Sender ID different than the one currently used by the joining node in the OSCORE group.</li>
              <li>The Group Manager MUST add the old, relinquished OSCORE Sender ID of the joining node to the most recent set of stale Sender IDs, in the collection associated with the group (see <xref target="sssec-stale-sender-ids"/>).</li>
            </ul>
          </li>
          <li>The Group Manager stores the association between i) the authentication credential of the joining node; and ii) the Group Identifier (Gid), i.e., the OSCORE ID Context, associated with the OSCORE group together with the OSCORE Sender ID assigned to the joining node in the group. The Group Manager MUST keep this association updated over time.</li>
        </ul>
        <t>Then, the Group Manager replies to the joining node, providing the updated security parameters and keying meterial necessary to participate in the group communication. This success Joining Response is formatted as defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with the following additions:</t>
        <ul spacing="normal">
          <li>The 'gkty' parameter identifies a key of type "Group_OSCORE_Input_Material object", defined in <xref target="ssec-iana-groupcomm-keys-registry"/> of this document.</li>
          <li>
            <t>The 'key' parameter includes what the joining node needs in order to set up the Group OSCORE Security Context as per <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>.  </t>
            <t>
This parameter has as value a Group_OSCORE_Input_Material object, which is defined in this document and extends the OSCORE_Input_Material object encoded in CBOR as defined in <xref section="3.2.1" sectionFormat="of" target="I-D.ietf-ace-oscore-profile"/>. In particular, it contains the additional parameters 'group_senderId', 'cred_fmt', 'sign_enc_alg', 'sign_alg', 'sign_params', 'ecdh_alg' and 'ecdh_params' defined in <xref target="ssec-iana-security-context-parameter-registry"/> of this document.  </t>
            <t>
More specifically, the 'key' parameter is composed as follows.  </t>
            <ul spacing="normal">
              <li>The 'hkdf' parameter, if present, specifies the HKDF Algorithm used in the OSCORE group. The HKDF Algorithm is specified by the HMAC Algorithm value. This parameter MAY be omitted, if the HKDF Algorithm used in the group is HKDF SHA-256. Otherwise, this parameter MUST be present.</li>
              <li>The 'salt' parameter, if present, has as value the OSCORE Master Salt used in the OSCORE group. This parameter MAY be omitted, if the Master Salt used in the group is the empty byte string. Otherwise, this parameter MUST be present.</li>
              <li>The 'ms' parameter includes the OSCORE Master Secret value used in the OSCORE group. This parameter MUST be present.</li>
              <li>The 'contextId' parameter has as value the Group Identifier (Gid), i.e., the OSCORE ID Context of the OSCORE group. This parameter MUST be present.</li>
              <li>The 'group_senderId' parameter has as value the OSCORE Sender ID assigned to the joining node by the Group Manager, as described above. This parameter MUST be present if and only if the node does not join the OSCORE group exclusively with the role of monitor, according to what is specified in the Access Token (see <xref target="ssec-auth-resp"/>).</li>
              <li>
                <t>The 'cred_fmt' parameter specifies the format of authentication credentials used in the OSCORE group. This parameter MUST be present and it takes value from the "Label" column of the "COSE Header Parameters" registry <xref target="COSE.Header.Parameters"/> (REQ6). Consistently with <xref section="2.3" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>, acceptable values denote a format that MUST explicitly provide the public key as well as the comprehensive set of information related to the public key algorithm, including, e.g., the used elliptic curve (when applicable).      </t>
                <t>
At the time of writing this specification, acceptable formats of authentication credentials are CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392"/>, X.509 certificates <xref target="RFC7925"/> and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>. Further formats may be available in the future, and would be acceptable to use as long as they comply with the criteria defined above.      </t>
                <t>
[ As to CWTs and CCSs, the COSE Header Parameters 'kcwt' and 'kccs' are under pending registration requested by draft-ietf-lake-edhoc. ]      </t>
                <t>
[ As to C509 certificates, the COSE Header Parameters 'c5b' and 'c5c' are under pending registration requested by draft-ietf-cose-cbor-encoded-cert. ]</t>
              </li>
            </ul>
            <t>
The 'key' parameter MUST also include the following parameters, if and only if the OSCORE group is not a pairwise-only group.  </t>
            <ul spacing="normal">
              <li>The 'sign_enc_alg' parameter, specifying the Signature Encryption Algorithm used in the OSCORE group to encrypt messages protected with the group mode. This parameter takes values from the "Value" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</li>
              <li>The 'sign_alg' parameter, specifying the Signature Algorithm used to sign messages in the OSCORE group. This parameter takes values from the "Value" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</li>
              <li>
                <t>The 'sign_params' parameter, specifying the parameters of the Signature Algorithm. This parameter is a CBOR array, which includes the following two elements:      </t>
                <ul spacing="normal">
                  <li>'sign_alg_capab': a CBOR array, with the same format and value of the COSE capabilities array for the Signature Algorithm indicated in 'sign_alg', as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</li>
                  <li>'sign_key_type_capab': a CBOR array, with the same format and value of the COSE capabilities array for the COSE key type of the keys used with the Signature Algorithm indicated in 'sign_alg', as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="COSE.Key.Types"/>.</li>
                </ul>
              </li>
            </ul>
            <t>
The 'key' parameter MUST also include the following parameters, if and only if the OSCORE group is not a signature-only group.  </t>
            <ul spacing="normal">
              <li>The 'alg' parameter, specifying the AEAD Algorithm used in the OSCORE group to encrypt messages protected with the pairwise mode.</li>
              <li>The 'ecdh_alg' parameter, specifying the Pairwise Key Agreement Algorithm used in the OSCORE group. This parameter takes values from the "Value" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</li>
              <li>
                <t>The 'ecdh_params' parameter, specifying the parameters of the Pairwise Key Agreement Algorithm. This parameter is a CBOR array, which includes the following two elements:      </t>
                <ul spacing="normal">
                  <li>'ecdh_alg_capab': a CBOR array, with the same format and value of the COSE capabilities array for the algorithm indicated in 'ecdh_alg', as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</li>
                  <li>'ecdh_key_type_capab': a CBOR array, with the same format and value of the COSE capabilities array for the COSE key type of the keys used with the algorithm indicated in 'ecdh_alg', as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="COSE.Key.Types"/>.</li>
                </ul>
              </li>
            </ul>
            <t>
The format of 'key' defined above is consistent with every signature algorithm and ECDH algorithm currently considered in <xref target="I-D.ietf-cose-rfc8152bis-algs"/>, i.e., with algorithms that have only the COSE key type as their COSE capability. <xref target="sec-future-cose-algs"/> of this document describes how the format of the 'key' parameter can be generalized for possible future registered algorithms having a different set of COSE capabilities.</t>
          </li>
        </ul>
        <t>Furthermore, the following applies.</t>
        <ul spacing="normal">
          <li>The 'exp' parameter MUST be present.</li>
          <li>The 'ace-groupcomm-profile' parameter MUST be present and has value coap_group_oscore_app (PROFILE_TBD), which is defined in <xref target="ssec-iana-groupcomm-profile-registry"/> of this document.</li>
          <li>
            <t>The 'pub_keys' parameter, if present, includes the authentication credentials requested by the joining node by means of the 'get_pub_keys' parameter in the Joining Request.  </t>
            <t>
If the joining node has asked for the authentication credentials of all the group members, i.e., 'get_pub_keys' had value the CBOR simple value "null" (0xf6) in the Joining Request, then the Group Manager provides only the authentication credentials of the group members that are relevant to the joining node. That is, in such a case, 'pub_keys' includes only: i) the authentication credentials of the responders currently in the OSCORE group, in case the joining node is configured (also) as requester; and ii) the authentication credentials of the requesters currently in the OSCORE group, in case the joining node is configured (also) as responder or monitor.</t>
          </li>
          <li>The 'peer_identifiers' parameter includes the OSCORE Sender ID of each group member whose authentication credential is specified in the 'pub_keys' parameter. That is, a group member's Sender ID is used as identifier for that group member (REQ25).</li>
          <li>
            <t>The 'group_policies' parameter SHOULD be present, and SHOULD include the following elements:  </t>
            <ul spacing="normal">
              <li>"Key Update Check Interval" defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with default value 3600;</li>
              <li>"Expiration Delta" defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with default value 0.</li>
            </ul>
          </li>
          <li>The 'kdc_cred' parameter MUST be present, specifying the Group Manager's authentication credential in its original binary representation (REQ8). The Group Manager's authentication credential MUST be in the format used in the OSCORE group. Also, the authentication credential as well as the included public key MUST be compatible with the signature or ECDH algorithm, and possible associated parameters used in the OSCORE group.</li>
          <li>The 'kdc_nonce' parameter MUST be present, specifying the dedicated nonce N_KDC generated by the Group Manager. For N_KDC, it is RECOMMENDED to use a 8-byte long random nonce.</li>
          <li>
            <t>The 'kdc_cred_verify' parameter MUST be present, specifying the proof-of-possession (PoP) evidence computed by the Group Manager. The PoP evidence is computed over the nonce N_KDC, which is specified in the 'kdc_nonce' parameter and taken as PoP input. The PoP evidence is computed as defined below (REQ21).  </t>
            <ul spacing="normal">
              <li>If the group is not a pairwise-only group, the PoP evidence MUST be a signature. The Group Manager computes the signature by using the signature algorithm used in the OSCORE group, as well as its own private key associated with the authentication credential specified in the 'kdc_cred' parameter.</li>
              <li>
                <t>If the group is a pairwise-only group, the PoP evidence MUST be a MAC computed as follows, by using the HKDF Algorithm HKDF SHA-256, which consists of composing the HKDF-Extract and HKDF-Expand steps <xref target="RFC5869"/>.      </t>
                <t>
MAC = HKDF(salt, IKM, info, L)      </t>
                <t>
The input parameters of HKDF are as follows.      </t>
                <ul spacing="normal">
                  <li>salt takes as value the empty byte string.</li>
                  <li>IKM is computed as a cofactor Diffie-Hellman shared secret, see Section 5.7.1.2 of <xref target="NIST-800-56A"/>, using the ECDH algorithm used in the OSCORE group. The Group Manager uses its own Diffie-Hellman private key and the Diffie-Hellman public key of the joining node. For X25519 and X448, the procedure is described in <xref section="5" sectionFormat="of" target="RFC7748"/>.</li>
                  <li>info takes as value the PoP input.</li>
                  <li>L is equal to 8, i.e., the size of the MAC, in bytes.</li>
                </ul>
              </li>
            </ul>
          </li>
          <li>The 'group_rekeying' parameter MAY be omitted, if the Group Manager uses the "Point-to-Point" group rekeying scheme registered in <xref section="11.14" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> as rekeying scheme in the OSCORE group (OPT9). Its detailed use for this profile is defined in <xref target="sec-group-rekeying-process"/> of this document. In any other case, the 'group_rekeying' parameter MUST be included.</li>
        </ul>
        <t>As a last action, if the Group Manager reassigns Gid values during the group's lifetime (see <xref section="3.2.1.1" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>), then the Group Manager MUST store the Gid specified in the 'contextId' parameter of the 'key' parameter, as the Birth Gid of the joining node in the joined group (see <xref section="3" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>). This applies also in case the joining node is in fact re-joining the group; in such a case, the newly determined Birth Gid overwrites the one currently stored.</t>
      </section>
      <section anchor="ssec-join-resp-processing">
        <name>Receive the Joining Response</name>
        <t>Upon receiving the Joining Response, the joining node retrieves the Group Manager's authentication credential from the 'kdc_cred' parameter. The joining node MUST verify the proof-of-possession (PoP) evidence specified in the 'kdc_cred_verify' parameter of the Joining Response as defined below (REQ21).</t>
        <ul spacing="normal">
          <li>If the group is not a pairwise-only group, the PoP evidence is a signature. The joining node verifies it by using the public key of the Group Manager from the received authentication credential, as well as the signature algorithm used in the OSCORE group and possible corresponding parameters.</li>
          <li>If the group is a pairwise-only group, the PoP evidence is a MAC. The joining node recomputes the MAC through the same process taken by the Group Manager when computing the value of the 'kdc_cred_verify' parameter (see <xref target="ssec-join-resp"/>), with the difference that the joining node uses its own Diffie-Hellman private key and the Diffie-Hellman public key of the Group Manager from the received authentication credential. The verification succeeds if and only if the recomputed MAC is equal to the MAC conveyed as PoP evidence in the Joining Response.</li>
        </ul>
        <t>In case of failed verification of the PoP evidence, the joining node MUST stop processing the Joining Response and MAY send a new Joining Request to the Group Manager (see <xref target="ssec-join-req-sending"/>).</t>
        <t>In case of successful verification of the PoP evidence, the joining node uses the information received in the Joining Response to set up the Group OSCORE Security Context, as described in <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>. If the following parameters were not included in the 'key' parameter of the Joining Response, the joining node considers the default values specified below, consistently with <xref section="3.2" sectionFormat="of" target="RFC8613"/>.</t>
        <ul spacing="normal">
          <li>Absent the 'hkdf' parameter, the joining node considers HKDF SHA-256 as HKDF Algorithm to use in the OSCORE group.</li>
          <li>Absent the 'salt' parameter, the joining node considers the empty byte string as Master Salt to use in the OSCORE group.</li>
          <li>Absent the 'group_rekeying' parameter, the joining node considers the "Point-to-Point" group rekeying scheme registered in <xref section="11.14" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> as the rekeying scheme used in the group (OPT9). Its detailed use for this profile is defined in <xref target="sec-group-rekeying-process"/> of this document.</li>
        </ul>
        <t>In addition, the joining node maintains an association between each authentication credential retrieved from the 'pub_keys' parameter and the role(s) that the corresponding group member has in the OSCORE group.</t>
        <t>From then on, the joining node can exchange group messages secured with Group OSCORE as described in <xref target="I-D.ietf-core-oscore-groupcomm"/>. When doing so:</t>
        <ul spacing="normal">
          <li>The joining node MUST NOT process an incoming request message, if protected by a group member whose authentication credential is not associated with the role "Requester".</li>
          <li>The joining node MUST NOT process an incoming response message, if protected by a group member whose authentication credential is not associated with the role "Responder".</li>
          <li>The joining node MUST NOT use the pairwise mode of Group OSCORE to process messages in the group, if the Joining Response did not include the 'ecdh_alg' parameter.</li>
        </ul>
        <t>If the application requires backward security, the Group Manager MUST generate updated security parameters and group keying material, and provide it to the current group members, upon the new node's joining (see <xref target="sec-group-rekeying-process"/>). In such a case, the joining node is not able to access secure communication in the OSCORE group occurred prior its joining.</t>
      </section>
    </section>
    <section anchor="ssec-overview-group-rekeying-process">
      <name>Overview of the Group Rekeying Process</name>
      <t>In a number of cases, the Group Manager has to generate new keying material and distribute it to the group (rekeying), as also discussed in <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>.</t>
      <t>To this end the Group Manager MUST support the Group Rekeying Process described in <xref target="sec-group-rekeying-process"/> of this document, as an instance of the "Point-to-Point" rekeying scheme defined in <xref section="6.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> and registered in <xref section="11.14" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. Future documents may define the use of alternative group rekeying schemes for this application profile, together with the corresponding rekeying message formats. The resulting group rekeying process MUST comply with the functional steps defined in <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>.</t>
      <t>Upon generating the new group keying material and before starting its distribution, the Group Manager MUST increment the version number of the group keying material. When rekeying a group, the Group Manager MUST preserve the current value of the OSCORE Sender ID of each member in that group.</t>
      <t>The data distributed to a group through a rekeying MUST include:</t>
      <ul spacing="normal">
        <li>The new version number of the group keying material for the group.</li>
        <li>
          <t>A new Group Identifier (Gid) for the group as introduced in <xref target="I-D.ietf-ace-key-groupcomm"/>, used as ID Context parameter of the Group OSCORE Common Security Context of that group (see <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).  </t>
          <t>
Note that the Gid differs from the group name also introduced in <xref target="I-D.ietf-ace-key-groupcomm"/>, which is a plain, stable and invariant identifier, with no cryptographic relevance and meaning.</t>
        </li>
        <li>A new value for the Master Secret parameter of the Group OSCORE Common Security Context of the group (see <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</li>
        <li>A set of stale Sender IDs, which allows each rekeyed node to purge authentication credentials and Recipient Contexts used in the group and associated with those Sender IDs. This in turn allows every group member to rely on stored authentication credentials, in order to confidently assert the group membership of other sender nodes, when receiving protected messages in the group (see <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>). More details on the maintenance of stale Sender IDs are provided in <xref target="sssec-stale-sender-ids"/>.</li>
      </ul>
      <t>Also, the data distributed through a group rekeying MAY include a new value for the Master Salt parameter of the Group OSCORE Common Security Context of that group.</t>
      <t>The Group Manager MUST rekey the group in the following cases.</t>
      <ul spacing="normal">
        <li>The application requires backward security - In this case, the group is rekeyed when a node joins the group as a new member. Therefore, a joining node cannot access communications in the group prior its joining.</li>
        <li>
          <t>One or more nodes leave the group - That is, the group is rekeyed when one or more current members spontaneously request to leave the group (see <xref target="sec-leave-req"/>), or when the Group Manager forcibly evicts them from the group, e.g., due to expired or revoked authorization (see <xref target="sec-leaving"/>). Therefore, a leaving node cannot access communications in the group after its leaving, thus ensuring forward security in the group.  </t>
          <t>
Due to the set of stale Sender IDs distributed through the rekeying, this ensures that a node owning the latest group keying material does not store the authentication credentials of former group members (see Sections <xref target="I-D.ietf-core-oscore-groupcomm" section="3.2" sectionFormat="bare"/> and <xref target="I-D.ietf-core-oscore-groupcomm" section="12.1" sectionFormat="bare"/> of <xref target="I-D.ietf-core-oscore-groupcomm"/>).</t>
        </li>
        <li>Extension of group lifetime - That is, the group is rekeyed when the expiration time for the group keying material approaches or has passed, if it is appropriate to extend the group operation beyond that.</li>
      </ul>
      <t>The Group Manager MAY rekey the group for other reasons, e.g., according to an application-specific rekeying period or scheduling.</t>
      <section anchor="sssec-stale-sender-ids">
        <name>Stale OSCORE Sender IDs</name>
        <t>Throughout the lifetime of every group, the Group Manager MUST maintain a collection of stale Sender IDs for that group.</t>
        <t>The collection associated with a group MUST include up to N &gt; 1 ordered sets of stale OSCORE Sender IDs. It is up to the application to specify the value of N, possibly on a per-group basis.</t>
        <t>The N-th set includes the Sender IDs that have become "stale" under the current version V of the group keying material. The (N - 1)-th set refers to the immediately previous version (V - 1) of the group keying material, and so on.</t>
        <t>In the following cases, the Group Manager MUST add a new element to the most recent set X, i.e., the set associated with the current version V of the group keying material.</t>
        <ul spacing="normal">
          <li>When a current group member obtains a new Sender ID, its old Sender ID is added to X. This happens when the Group Manager assigns a new Sender ID upon request from the group member (see <xref target="sec-new-key"/>), or in case the group member re-joins the group (see <xref target="ssec-join-req-sending"/> and <xref target="ssec-join-resp"/>), thus also obtaining a new Sender ID.</li>
          <li>When a current group member leaves the group, its current Sender ID is added to X. This happens when a group member requests to leave the group (see <xref target="sec-leave-req"/>) or is forcibly evicted from the group (see <xref target="sec-leaving"/>).</li>
        </ul>
        <t>The value of N can change throughout the lifetime of the group. If the new value N' is smaller than N, the Group Manager MUST preserve the (up to) N' most recent sets in the collection and MUST delete any possible older set from the collection.</t>
        <t>Finally, the Group Manager MUST perform the following actions, when the group is rekeyed and the group shifts to the next version V' = (V + 1) of the group keying material.</t>
        <ol spacing="normal" type="1"><li>The Group Manager rekeys the group. This includes also distributing the set of stale Sender IDs X associated with the old group keying material with version V (see <xref target="ssec-overview-group-rekeying-process"/>).</li>
          <li>After completing the group rekeying, the Group Manager creates a new empty set X' associated with the new version V' of the newly established group keying material, i.e., V' = (V + 1).</li>
          <li>If the current collection of stale Sender IDs has size N, the Group Manager deletes the oldest set in the collection.</li>
          <li>The Group Manager adds the new set X' to the collection of stale Sender IDs, as the most recent set.</li>
        </ol>
      </section>
    </section>
    <section anchor="sec-interface-GM">
      <name>Interface at the Group Manager</name>
      <t>The Group Manager provides the interface defined in <xref section="4.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with the additional sub-resources defined from <xref target="ssec-resource-active"/> to <xref target="ssec-resource-stale-sids"/> of this document.</t>
      <t>Furthermore, <xref target="ssec-admitted-methods"/> provides a summary of the CoAP methods admitted to access different resources at the Group Manager, for nodes with different roles in the group or as non members (REQ11).</t>
      <t>The GROUPNAME segment of the URI path MUST match with the group name specified in the scope entry of the Access Token scope (i.e., 'gname' in <xref section="3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>) (REQ7).</t>
      <t>The Resource Type (rt=) Link Target Attribute value "core.osc.gm" is registered in <xref target="iana-rt"/> (REQ10), and can be used to describe group-membership resources and its sub-resources at a Group Manager, e.g., by using a link-format document <xref target="RFC6690"/>.</t>
      <t>Applications can use this common resource type to discover links to group-membership resources for joining OSCORE groups, e.g., by using the approach described in <xref target="I-D.tiloca-core-oscore-discovery"/>.</t>
      <section anchor="ssec-resource-active">
        <name>ace-group/GROUPNAME/active</name>
        <t>This resource implements a GET handler.</t>
        <section anchor="active-get">
          <name>GET Handler</name>
          <t>The handler expects a GET request.</t>
          <t>In addition to what is defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, the handler verifies that the requesting Client is a current member of the group. If the verification fails, the KDC MUST reply with a 4.03 (Forbidden) error response. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 0 ("Operation permitted only to group members").</t>
          <t>If all verifications succeed, the handler replies with a 2.05 (Content) response, specifying the current status of the group, i.e., active or inactive. The payload of the response is formatted as defined in <xref target="sec-status"/>.</t>
          <t>The method to set the current group status is out of the scope of this document, and is defined for the administrator interface of the Group Manager specified in <xref target="I-D.ietf-ace-oscore-gm-admin"/>.</t>
        </section>
      </section>
      <section anchor="ssec-resource-verif-data">
        <name>ace-group/GROUPNAME/verif-data</name>
        <t>This resource implements a GET handler.</t>
        <section anchor="verif-data-get">
          <name>GET Handler</name>
          <t>The handler expects a GET request.</t>
          <t>In addition to what is defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, the Group Manager performs the following checks.</t>
          <t>If the requesting Client is a current group member, the Group Manager MUST reply with a 4.03 (Forbidden) error response. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 8 ("Operation permitted only to signature verifiers").</t>
          <t>If GROUPNAME denotes a pairwise-only group, the Group Manager MUST reply with a 4.00 (Bad Request) error response. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 7 ("Signatures not used in the group").</t>
          <t>If all verifications succeed, the handler replies with a 2.05 (Content) response, specifying data that allow also an external signature verifier to verify signatures of messages protected with the group mode and sent to the group (see Sections <xref target="I-D.ietf-core-oscore-groupcomm" section="3.1" sectionFormat="bare"/> and <xref target="I-D.ietf-core-oscore-groupcomm" section="8.5" sectionFormat="bare"/> of <xref target="I-D.ietf-core-oscore-groupcomm"/>). The response MUST have Content-Format set to application/ace-groupcomm+cbor. The payload of the response is a CBOR map, which is formatted as defined in <xref target="sec-verif-data"/>.</t>
        </section>
      </section>
      <section anchor="ssec-resource-stale-sids">
        <name>ace-group/GROUPNAME/stale-sids</name>
        <t>This resource implements a FETCH handler.</t>
        <section anchor="stale-sids-fetch">
          <name>FETCH Handler</name>
          <t>The handler expects a FETCH request, whose payload specifies a version number of the group keying material, encoded as an unsigned CBOR integer.</t>
          <t>In addition to what is defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, the handler verifies that the requesting Client is a current member of the group. If the verification fails, the Group Manager MUST reply with a 4.03 (Forbidden) error response. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 0 ("Operation permitted only to group members").</t>
          <t>If all verifications succeed, the handler replies with a 2.05 (Content) response, specifying data that allow the requesting Client to delete the Recipient Contexts and authentication credentials associated with former members of the group (see <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>. The payload of the response is formatted as defined in <xref target="sec-retrieve-stale-sids"/>.</t>
        </section>
      </section>
      <section anchor="ssec-admitted-methods">
        <name>Admitted Methods</name>
        <t>The table in <xref target="method-table"/> summarizes the CoAP methods admitted to access different resources at the Group Manager, for (non-)members of a group with group name GROUPNAME, and considering different roles. The last two rows of the table apply to a node with node name NODENAME.</t>
        <figure anchor="method-table">
          <name>Admitted CoAP Methods on the Group Manager Resources</name>
          <artwork align="center"><![CDATA[
+---------------------------------+--------+-------+-------+-------+
| Resource                        | Type1  | Type2 | Type3 | Type4 |
+---------------------------------+--------+-------+-------+-------+
| ace-group/                      | F      | F     | F     | F     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/            | G Po   | G Po  | Po *  | Po    |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/active      | G      | G     | -     | -     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/verif-data  | -      | -     | G     | -     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/pub-key     | G F    | G F   | G F   | -     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/kdc-pub-key | G      | G     | G     | -     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/stale-sids  | F      | F     | -     | -     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/policies    | G      | G     | -     | -     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/num         | G      | G     | -     | -     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/nodes/      | G Pu D | G D   | -     | -     |
|           NODENAME              |        |       |       |       |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/nodes/      | Po     | -     | -     | -     |
|           NODENAME/pub-key      |        |       |       |       |
+---------------------------------+--------+-------+-------+-------+

CoAP methods: G = GET; F = FETCH; Po = POST; Pu = PUT; D = DELETE

Type1 = Member as Requester and/or Responder
Type2 = Member as Monitor
Type3 = Non-member (authorized to be signature verifier)
        (*) = cannot join the group as signature verifier
Type4 = Non-member (not authorized to be signature verifier)
]]></artwork>
        </figure>
        <section anchor="signature-verifiers">
          <name>Signature Verifiers</name>
          <t>Just like any candidate group member, a signature verifier provides the Group Manager with an Access Token, as described in <xref target="ssec-token-post"/>. However, unlike candidate group members, it does not join any OSCORE group, i.e., it does not perform the joining process defined in <xref target="sec-joining-node-to-GM"/>.</t>
          <t>After successfully transferring an Access Token to the Group Manager, a signature verifier is allowed to perform only some operations as non-member of a group, and only for the OSCORE groups specified in the validated Access Token. These are the operations specified in <xref target="sec-pub-keys"/>, <xref target="sec-gm-pub-key"/>, <xref target="sec-verif-data"/> and <xref target="sec-retrieve-gnames"/>.</t>
          <t>Consistently, in case a node is not a member of the group with group name GROUPNAME and is authorized to be only signature verifier for that group, the Group Manager MUST reply with a 4.03 (Forbidden) error response if that node attempts to access any other endpoint than: /ace-group; ace-group/GROUPNAME/verif-data; /ace-group/GROUPNAME/pub-key; and ace-group/GROUPNAME/kdc-pub-key.</t>
        </section>
      </section>
      <section anchor="client-operations">
        <name>Operations Supported by Clients</name>
        <t>Building on what is defined in <xref section="4.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, and with reference to the resources at the Group Manager newly defined earlier in <xref target="sec-interface-GM"/> of this document, it is expected that a Client minimally supports also the following set of operations and corresponding interactions with the Group Manager (REQ12).</t>
        <ul spacing="normal">
          <li>GET request to ace-group/GROUPNAME/active, in order to check the current status of the group.</li>
          <li>GET request to ace-group/GROUPNAME/verif-data, in order for a signature verifier to retrieve data required to verify signatures of messages protected with the group mode of Group OSCORE and sent to a group (see Sections <xref target="I-D.ietf-core-oscore-groupcomm" section="3.1" sectionFormat="bare"/> and <xref target="I-D.ietf-core-oscore-groupcomm" section="8.5" sectionFormat="bare"/> of <xref target="I-D.ietf-core-oscore-groupcomm"/>). Note that this operation is relevant to support only to signature verifiers.</li>
          <li>FETCH request to ace-group/GROUPNAME/stale-sids, in order to retrieve from the Group Manager the data required to delete some of the stored group members' authentication credentials and associated Recipient Contexts (see <xref target="stale-sids-fetch"/>). These data are provided as an aggregated set of stale Sender IDs, which are used as specified in <xref target="missed-rekeying"/>.</li>
        </ul>
      </section>
    </section>
    <section anchor="sec-additional-interactions">
      <name>Additional Interactions with the Group Manager</name>
      <t>This section defines the possible interactions with the Group Manager, in addition to the group joining specified in <xref target="sec-joining-node-to-GM"/>.</t>
      <section anchor="sec-updated-key">
        <name>Retrieve Updated Keying Material</name>
        <t>At some point, a group member considers the Group OSCORE Security Context invalid and to be renewed. This happens, for instance, after a number of unsuccessful security processing of incoming messages from other group members, or when the Security Context expires as specified by the 'exp' parameter of the Joining Response.</t>
        <t>When this happens, the group member retrieves updated security parameters and group keying material. This can occur in the two different ways described below.</t>
        <section anchor="ssec-updated-key-only">
          <name>Get Group Keying Material</name>
          <t>If the group member wants to retrieve only the latest group keying material, it sends a Key Distribution Request to the Group Manager.</t>
          <t>In particular, it sends a CoAP GET request to the endpoint /ace-group/GROUPNAME at the Group Manager.</t>
          <t>The Group Manager processes the Key Distribution Request according to <xref section="4.3.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The Key Distribution Response is formatted as defined in <xref section="4.3.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with the following additions.</t>
          <ul spacing="normal">
            <li>The 'key' parameter is formatted as defined in <xref target="ssec-join-resp"/> of this document, with the difference that it does not include the 'group_SenderId' parameter.</li>
            <li>The 'exp' parameter MUST be present.</li>
            <li>The 'ace-groupcomm-profile' parameter MUST be present and has value coap_group_oscore_app.</li>
          </ul>
          <t>Upon receiving the Key Distribution Response, the group member retrieves the updated security parameters and group keying material, and, if they differ from the current ones, uses them to set up the new Group OSCORE Security Context as described in <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>.</t>
        </section>
        <section anchor="ssec-updated-and-individual-key">
          <name>Get Group Keying Material and OSCORE Sender ID</name>
          <t>If the group member wants to retrieve the latest group keying material as well as the OSCORE Sender ID that it has in the OSCORE group, it sends a Key Distribution Request to the Group Manager.</t>
          <t>In particular, it sends a CoAP GET request to the endpoint /ace-group/GROUPNAME/nodes/NODENAME at the Group Manager.</t>
          <t>The Group Manager processes the Key Distribution Request according to <xref section="4.8.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The Key Distribution Response is formatted as defined in <xref section="4.8.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with the following additions.</t>
          <ul spacing="normal">
            <li>
              <t>The 'key' parameter is formatted as defined in <xref target="ssec-join-resp"/> of this document. In particular, if the requesting group member has exclusively the role of monitor, then the 'key' parameter does not include the 'group_SenderId'.  </t>
              <t>
Note that, in any other case, the current Sender ID of the group member is not specified as a separate parameter, but rather specified by 'group_SenderId' within the 'key' parameter.</t>
            </li>
            <li>The 'exp' parameter MUST be present.</li>
          </ul>
          <t>Upon receiving the Key Distribution Response, the group member retrieves the updated security parameters, group keying material and Sender ID, and, if they differ from the current ones, uses them to set up the new Group OSCORE Security Context as described in <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>.</t>
        </section>
      </section>
      <section anchor="sec-new-key">
        <name>Request to Change Individual Keying Material</name>
        <t>As discussed in <xref section="2.5.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>, a group member may at some point exhaust its Sender Sequence Numbers in the OSCORE group.</t>
        <t>When this happens, the group member MUST send a Key Renewal Request message to the Group Manager, as per <xref section="4.8.2.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular, it sends a CoAP PUT request to the endpoint /ace-group/GROUPNAME/nodes/NODENAME at the Group Manager.</t>
        <t>Upon receiving the Key Renewal Request, the Group Manager processes it as defined in <xref section="4.8.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with the following additions.</t>
        <t>The Group Manager MUST return a 5.03 (Service Unavailable) response in case the OSCORE group identified by GROUPNAME is currently inactive (see <xref target="ssec-resource-active"/>). The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 9 ("Group currently not active").</t>
        <t>Otherwise, the Group Manager performs one of the following actions.</t>
        <ol spacing="normal" type="1"><li>If the requesting group member has exclusively the role of monitor, the Group Manager replies with a 4.03 (Forbidden) error response. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 1 ("Request inconsistent with the current roles").</li>
          <li>
            <t>Otherwise, the Group Manager takes one of the following actions.  </t>
            <ul spacing="normal">
              <li>
                <t>The Group Manager rekeys the OSCORE group. That is, the Group Manager generates new group keying material for that group (see <xref target="sec-group-rekeying-process"/>), and replies to the group member with a group rekeying message as defined in <xref target="sec-group-rekeying-process"/>, providing the new group keying material. Then, the Group Manager rekeys the rest of the OSCORE group, as discussed in <xref target="sec-group-rekeying-process"/>.      </t>
                <t>
The Group Manager SHOULD perform a group rekeying only if already scheduled to  occur shortly, e.g., according to an application-specific rekeying period or scheduling, or as a reaction to a recent change in the group membership. In any other case, the Group Manager SHOULD NOT rekey the OSCORE group when receiving a Key Renewal Request (OPT12).</t>
              </li>
              <li>
                <t>The Group Manager determines and assigns a new OSCORE Sender ID for that group member, and replies with a Key Renewal Response formatted as defined in <xref section="4.8.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular, the CBOR Map in the response payload includes a single parameter 'group_SenderId' defined in <xref target="ssec-iana-ace-groupcomm-parameters-registry"/> of this document, specifying the new Sender ID of the group member encoded as a CBOR byte string.      </t>
                <t>
Consistently with <xref section="2.5.3.1" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>, the Group Manager MUST assign a new Sender ID that has not been used in the OSCORE group since the latest time when the current Gid value was assigned to the group.      </t>
                <t>
Furthermore, the Group Manager MUST add the old, relinquished Sender ID of the group member to the most recent set of stale Sender IDs, in the collection associated with the group (see <xref target="sssec-stale-sender-ids"/>).      </t>
                <t>
The Group Manager MUST return a 5.03 (Service Unavailable) response in case there are currently no Sender IDs available to assign in the OSCORE group. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 4 ("No available node identifiers").</t>
              </li>
            </ul>
          </li>
        </ol>
      </section>
      <section anchor="sec-pub-keys">
        <name>Retrieve Authentication Credentials of Group Members</name>
        <t>A group member or a signature verifier may need to retrieve the authentication credentials of (other) group members. To this end, the group member or signature verifier sends a Public Key Request message to the Group Manager, as per Sections <xref target="I-D.ietf-ace-key-groupcomm" section="4.4.1.1" sectionFormat="bare"/> and <xref target="I-D.ietf-ace-key-groupcomm" section="4.4.2.1" sectionFormat="bare"/> of <xref target="I-D.ietf-ace-key-groupcomm"/>. In particular, it sends the request to the endpoint /ace-group/GROUPNAME/pub-key at the Group Manager.</t>
        <t>If the Public Key Request uses the method FETCH, the Public Key Request is formatted as defined in <xref section="4.4.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular:</t>
        <ul spacing="normal">
          <li>Each element (if any) of the inner CBOR array 'role_filter' is formatted as in the inner CBOR array 'role_filter' of the 'get_pub_keys' parameter of the Joining Request when the parameter value is not the CBOR simple value "null" (0xf6) (see <xref target="ssec-join-req-sending"/>).</li>
          <li>Each element (if any) of the inner CBOR array 'id_filter' is a CBOR byte string, which encodes the OSCORE Sender ID of the group member for which the associated authentication credential is requested (REQ25).</li>
        </ul>
        <t>Upon receiving the Public Key Request, the Group Manager processes it as per Section 4.4.1 or Section 4.4.2 of <xref target="I-D.ietf-ace-key-groupcomm"/>, depending on the request method being FETCH or GET, respectively. Additionally, if the Public Key Request uses the method FETCH, the Group Manager silently ignores node identifiers included in the 'get_pub_keys' parameter of the request that are not associated with any current group member (REQ26).</t>
        <t>The success Public Key Response is formatted as defined in Section 4.4.1 or Section 4.4.2 of <xref target="I-D.ietf-ace-key-groupcomm"/>, depending on the request method being FETCH or GET, respectively.</t>
      </section>
      <section anchor="sec-update-pub-key">
        <name>Upload a New Authentication Credential</name>
        <t>A group member may need to provide the Group Manager with its new authentication credential to use in the group from then on, hence replacing the current one. This can be the case, for instance, if the signature or ECDH algorithm and possible associated parameters used in the OSCORE group have been changed, and the current authentication credential is not compatible with them.</t>
        <t>To this end, the group member sends a Public Key Update Request message to the Group Manager, as per <xref section="4.9.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with the following addition.</t>
        <ul spacing="normal">
          <li>The group member computes the proof-of-possession (PoP) evidence included in 'client_cred_verify' in the same way taken when preparing a Joining Request for the OSCORE group in question, as defined in <xref target="ssec-join-req-sending"/> (REQ14).</li>
        </ul>
        <t>In particular, the group member sends a CoAP POST request to the endpoint /ace-group/GROUPNAME/nodes/NODENAME/pub-key at the Group Manager.</t>
        <t>Upon receiving the Public Key Update Request, the Group Manager processes it as per <xref section="4.9.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with the following additions.</t>
        <ul spacing="normal">
          <li>The N_S challenge used to build the proof-of-possession input is computed as defined in <xref target="sssec-challenge-value"/> (REQ15).</li>
          <li>The Group Manager verifies the PoP challenge included in 'client_cred_verify' in the same way taken when processing a Joining Request for the OSCORE group in question, as defined in <xref target="ssec-join-req-processing"/> (REQ14).</li>
          <li>The Group Manager MUST return a 5.03 (Service Unavailable) response in case the OSCORE group identified by GROUPNAME is currently inactive (see <xref target="ssec-resource-active"/>). The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 9 ("Group currently not active").</li>
          <li>If the requesting group member has exclusively the role of monitor, the Group Manager replies with a 4.00 (Bad request) error response. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 1 ("Request inconsistent with the current roles").</li>
          <li>If the request is successfully processed, the Group Manager stores the association between i) the new authentication credential of the group member; and ii) the Group Identifier (Gid), i.e., the OSCORE ID Context, associated with the OSCORE group together with the OSCORE Sender ID assigned to the group member in the group. The Group Manager MUST keep this association updated over time.</li>
        </ul>
      </section>
      <section anchor="sec-gm-pub-key">
        <name>Retrieve the Group Manager's Authentication Credential</name>
        <t>A group member or a signature verifier may need to retrieve the authentication credential of the Group Manager. To this end, the requesting Client sends a KDC Public Key Request message to the Group Manager.</t>
        <t>In particular, it sends a CoAP GET request to the endpoint /ace-group/GROUPNAME/kdc-pub-key at the Group Manager defined in <xref section="4.5.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, where GROUPNAME is the name of the OSCORE group.</t>
        <t>In addition to what is defined in <xref section="4.5.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, the Group Manager MUST respond with a 4.00 (Bad Request) error response, if the requesting Client is not a current group member and GROUPNAME denotes a pairwise-only group. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 7 ("Signatures not used in the group").</t>
        <t>The payload of the 2.05 (Content) KDC Public Key Response is a CBOR map, which is formatted as defined in <xref section="4.5.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular, the Group Manager specifies the parameters 'kdc_cred', 'kdc_nonce' and 'kdc_challenge' as defined for the Joining Response in <xref target="ssec-join-resp"/> of this document. This especially applies to the computing of the proof-of-possession (PoP) evidence included in 'kdc_cred_verify' (REQ21).</t>
        <t>Upon receiving a 2.05 (Content) KDC Public Key Response, the requesting Client retrieves the Group Manager's authentication credential from the 'kdc_cred' parameter, and proceeds as defined in <xref section="4.5.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular, the requesting Client verifies the PoP evidence included in 'kdc_cred_verify' by means of the same method used when processing the Joining Response, as defined in <xref target="ssec-join-resp"/> of this document (REQ21).</t>
        <t>Note that a signature verifier would not receive a successful response from the Group Manager, in case GROUPNAME denotes a pairwise-only group.</t>
      </section>
      <section anchor="sec-verif-data">
        <name>Retrieve Signature Verification Data</name>
        <t>A signature verifier may need to retrieve data required to verify signatures of messages protected with the group mode and sent to a group (see Sections <xref target="I-D.ietf-core-oscore-groupcomm" section="3.1" sectionFormat="bare"/> and <xref target="I-D.ietf-core-oscore-groupcomm" section="8.5" sectionFormat="bare"/> of <xref target="I-D.ietf-core-oscore-groupcomm"/>). To this end, the signature verifier sends a Signature Verification Data Request message to the Group Manager.</t>
        <t>In particular, it sends a CoAP GET request to the endpoint /ace-group/GROUPNAME/verif-data at the Group Manager defined in <xref target="ssec-resource-verif-data"/> of this document, where GROUPNAME is the name of the OSCORE group.</t>
        <t>The payload of the 2.05 (Content) Signature Verification Data Response is a CBOR map, which has the format used for the Joining Response message in <xref target="ssec-join-resp"/>, with the following differences.</t>
        <ul spacing="normal">
          <li>
            <t>From the Joining Response message, only the parameters 'gkty', 'key', 'num', 'exp' and 'ace-groupcomm-profile' are present. In particular, the 'key' parameter includes only the following data.  </t>
            <ul spacing="normal">
              <li>The parameters 'hkdf', 'contextId', 'cred_fmt', 'sign_enc_alg', 'sign_alg', 'sign_params'. These parameters MUST be present.</li>
              <li>The parameters 'alg' and 'ecdh_alg'. These parameter MUST NOT be present if the group is a signature-only group. Otherwise, they MUST be present.</li>
            </ul>
          </li>
          <li>The parameter 'group_enc_key' is also included, with CBOR label defined in <xref target="ssec-iana-ace-groupcomm-parameters-registry"/>. This parameter specifies the Group Encryption Key of the OSCORE Group, encoded as a CBOR byte string. The Group Manager derives the Group Encryption Key from the group keying material, as per <xref section="2.1.6" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>. This parameter MUST be present.</li>
        </ul>
        <t>In order to verify signatures in the group (see <xref section="8.5" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>), the signature verifier relies on: the data retrieved from the 2.05 (Content) Signature Verification Data Response; the public keys of the group members signing the messages to verify, retrieved from those members' authentication credentials that can be obtained as defined in <xref target="sec-pub-keys"/>; and the public key of the Group Manager, retrieved from the Group Manager's authentication credential that can be obtained as defined in <xref target="sec-gm-pub-key"/>.</t>
        <t><xref target="fig-verif-data-req-resp"/> gives an overview of the exchange described above,  while <xref target="fig-verif-data-req-resp-ex"/> shows an example.</t>
        <figure anchor="fig-verif-data-req-resp">
          <name>Message Flow of Signature Verification Data Request-Response</name>
          <artwork align="center"><![CDATA[
Signature                                                     Group
Verifier                                                     Manager
  |                                                             |
  |              Signature Verification Data Request            |
  |------------------------------------------------------------>|
  |              GET ace-group/GROUPNAME/verif-data             |
  |                                                             |
  |<--- Signature Verification Data Response: 2.05 (Content) ---|
  |                                                             |
]]></artwork>
        </figure>
        <figure anchor="fig-verif-data-req-resp-ex">
          <name>Example of Signature Verification Data Request-Response</name>
          <artwork><![CDATA[
   Request:

   Header: GET (Code=0.01)
   Uri-Host: "kdc.example.com"
   Uri-Path: "ace-group"
   Uri-Path: "g1"
   Uri-Path: "verif-data"
   Payload: -

   Response:

   Header: Content (Code=2.05)
   Content-Format: "application/ace-groupcomm+cbor"
   Payload (in CBOR diagnostic notation, with GROUPCOMM_KEY_TBD
            and PROFILE_TBD being CBOR integers, while GROUP_ENC_KEY
            being a CBOR byte string):
    {
      "gkty": GROUPCOMM_KEY_TBD,
      "key": {
        'hkdf': 5,                     ; HMAC 256/256
        'contextId': h'37fc',
        'cred_fmt': 33,                ; x5chain
        'sign_enc_alg': 10,            ; AES-CCM-16-64-128
        'sign_alg': -8,                ; EdDSA
        'sign_params': [[1], [1, 6]]   ; [[OKP], [OKP, Ed25519]]
      },
      "num": 12,
      "exp": 1609459200,
      "ace_groupcomm_profile": PROFILE_TBD,
      "group_enc_key": GROUP_ENC_KEY
    }
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-policies">
        <name>Retrieve the Group Policies</name>
        <t>A group member may request the current policies used in the OSCORE group. To this end, the group member sends a Policies Request, as per <xref section="4.6.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular, it sends a CoAP GET request to the endpoint /ace-group/GROUPNAME/policies at the Group Manager, where GROUPNAME is the name of the OSCORE group.</t>
        <t>Upon receiving the Policies Request, the Group Manager processes it as per <xref section="4.6.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The success Policies Response is formatted as defined in <xref section="4.6.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>.</t>
      </section>
      <section anchor="sec-version">
        <name>Retrieve the Keying Material Version</name>
        <t>A group member may request the current version of the keying material used in the OSCORE group. To this end, the group member sends a Version Request, as per <xref section="4.7.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular, it sends a CoAP GET request to the endpoint /ace-group/GROUPNAME/num at the Group Manager, where GROUPNAME is the name of the OSCORE group.</t>
        <t>Upon receiving the Version Request, the Group Manager processes it as per <xref section="4.7.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The success Version Response is formatted as defined in <xref section="4.7.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>.</t>
      </section>
      <section anchor="sec-status">
        <name>Retrieve the Group Status</name>
        <t>A group member may request the current status of the the OSCORE group, i.e., active or inactive. To this end, the group member sends a Group Status Request to the Group Manager.</t>
        <t>In particular, the group member sends a CoAP GET request to the endpoint /ace-group/GROUPNAME/active at the Group Manager defined in <xref target="ssec-resource-active"/> of this document, where GROUPNAME is the name of the OSCORE group.</t>
        <t>The payload of the 2.05 (Content) Group Status Response includes the CBOR simple value "true" (0xf5) if the group is currently active, or the CBOR simple value "false" (0xf4) otherwise. The group is considered active if it is set to allow new members to join, and if communication within the group is fine to happen.</t>
        <t>Upon learning from a 2.05 (Content) response that the group is currently inactive, the group member SHOULD stop taking part in communications within the group, until it becomes active again.</t>
        <t>Upon learning from a 2.05 (Content) response that the group has become active again, the group member can resume taking part in communications within the group.</t>
        <t><xref target="fig-key-status-req-resp"/> gives an overview of the exchange described above, while <xref target="fig-key-status-req-resp-ex"/> shows an example.</t>
        <figure anchor="fig-key-status-req-resp">
          <name>Message Flow of Group Status Request-Response</name>
          <artwork align="center"><![CDATA[
Group                                                         Group
Member                                                       Manager
  |                                                             |
  |--- Group Status Request: GET ace-group/GROUPNAME/active --->|
  |                                                             |
  |<---------- Group Status Response: 2.05 (Content) -----------|
  |                                                             |
]]></artwork>
        </figure>
        <figure anchor="fig-key-status-req-resp-ex">
          <name>Example of Group Status Request-Response</name>
          <artwork><![CDATA[
   Request:

   Header: GET (Code=0.01)
   Uri-Host: "kdc.example.com"
   Uri-Path: "ace-group"
   Uri-Path: "g1"
   Uri-Path: "active"
   Payload: -

   Response:

   Header: Content (Code=2.05)
   Payload (in CBOR diagnostic notation):
     true
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-retrieve-gnames">
        <name>Retrieve Group Names</name>
        <t>A node may want to retrieve from the Group Manager the group name and the URI of the group-membership resource of a group. This is relevant in the following cases.</t>
        <ul spacing="normal">
          <li>Before joining a group, a joining node may know only the current Group Identifier (Gid) of that group, but not the group name and the URI to the group-membership resource.</li>
          <li>
            <t>As current group member in several groups, the node has missed a previous group rekeying in one of them (see <xref target="sec-group-rekeying-process"/>). Hence, it retains stale keying material and fails to decrypt received messages exchanged in that group.  </t>
            <t>
Such messages do not provide a direct hint to the correct group name, that the node would need in order to retrieve the latest keying material and authentication credentials from the Group Manager (see <xref target="ssec-updated-key-only"/>, <xref target="ssec-updated-and-individual-key"/> and <xref target="sec-pub-keys"/>). However, such messages may specify the current Gid of the group, as value of the 'kid_context' field of the OSCORE CoAP option (see <xref section="6.1" sectionFormat="of" target="RFC8613"/> and <xref section="4.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</t>
          </li>
          <li>
            <t>As signature verifier, the node also refers to a group name for retrieving the required authentication credentials from the Group Manager (see <xref target="sec-pub-keys"/>). As discussed above, intercepted messages do not provide a direct hint to the correct group name, while they may specify the current Gid of the group, as value of the 'kid_context' field of the OSCORE CoAP option. In such a case, upon intercepting a message in the group, the node requires to correctly map the Gid currently used in the group with the invariant group name.  </t>
            <t>
Furthermore, since it is not a group member, the node does not take part to a possible group rekeying. Thus, following a group rekeying and the consequent change of Gid in a group, the node would retain the old Gid value and cannot correctly associate intercepted messages to the right group, especially if acting as signature verifier in several groups. This in turn prevents the efficient verification of signatures, and especially the retrieval of required, new authentication credentials from the Group Manager.</t>
          </li>
        </ul>
        <t>In either case, the node only knows the current Gid of the group, as learned from received or intercepted messages exchanged in the group. As detailed below, the node can contact the Group Manager, and request the group name and URI to the group-membership resource corresponding to that Gid. Then, it can use that information to either join the group as a candidate group member, get the latest keying material as a current group member, or retrieve authentication credentials used in the group as a signature verifier. To this end, the node sends a Group Name and URI Retrieval Request, as per <xref section="4.2.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>.</t>
        <t>In particular, the node sends a CoAP FETCH request to the endpoint /ace-group at the Group Manager formatted as defined in <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. Each element of the CBOR array 'gid' is a CBOR byte string (REQ13), which encodes the Gid of the group for which the group name and the URI to the group-membership resource are requested.</t>
        <t>Upon receiving the Group Name and URI Retrieval Request, the Group Manager processes it as per <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The success Group Name and URI Retrieval Response is formatted as defined in <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular, each element of the CBOR array 'gid' is a CBOR byte string (REQ13), which encodes the Gid of the group for which the group name and the URI to the group-membership resource are provided.</t>
        <t>For each of its groups, the Group Manager maintains an association between the group name and the URI to the group-membership resource on one hand, and only the current Gid for that group on the other hand. That is, the Group Manager does not maintain an association between the former pair and any other Gid for that group than the current, most recent one.</t>
        <t><xref target="fig-group-names-req-resp"/> gives an overview of the exchanges described above, while <xref target="fig-group-names-req-resp-ex"/> shows an example.</t>
        <figure anchor="fig-group-names-req-resp">
          <name>Message Flow of Group Name and URI Retrieval Request-Response</name>
          <artwork align="center"><![CDATA[
                                                                Group
Node                                                           Manager
 |                                                                |
 |---- Group Name and URI Retrieval Request: FETCH ace-group/ --->|
 |                                                                |
 |<--- Group Name and URI Retrieval Response: 2.05 (Content) -----|
 |                                                                |
]]></artwork>
        </figure>
        <figure anchor="fig-group-names-req-resp-ex">
          <name>Example of Group Name and URI Retrieval Request-Response</name>
          <artwork><![CDATA[
   Request:

   Header: FETCH (Code=0.05)
   Uri-Host: "kdc.example.com"
   Uri-Path: "ace-group"
   Content-Format: "application/ace-groupcomm+cbor"
   Payload (in CBOR diagnostic notation):
     {
       "gid": [h'37fc', h'84bd']
     }

   Response:

   Header: Content (Code=2.05)
   Content-Format: "application/ace-groupcomm+cbor"
   Payload (in CBOR diagnostic notation):
     {
       "gid": [h'37fc', h'84bd'],
       "gname": ["g1", "g2"],
       "guri": ["ace-group/g1", "ace-group/g2"]
     }
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-leave-req">
        <name>Leave the Group</name>
        <t>A group member may request to leave the OSCORE group. To this end, the group member sends a Group Leaving Request, as per <xref section="4.8.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular, it sends a CoAP DELETE request to the endpoint /ace-group/GROUPNAME/nodes/NODENAME at the Group Manager.</t>
        <t>Upon receiving the Group Leaving Request, the Group Manager processes it as per <xref section="4.8.3" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. Then, the Group Manager performs the follow-up actions defined in <xref target="sec-leaving"/> of this document.</t>
      </section>
    </section>
    <section anchor="sec-leaving">
      <name>Removal of a Group Member</name>
      <t>Other than after a spontaneous request to the Group Manager as described in <xref target="sec-leave-req"/>, a node may be forcibly removed from the OSCORE group, e.g., due to expired or revoked authorization.</t>
      <t>In either case, if the Group Manager reassigns Gid values during the group's lifetime (see <xref section="3.2.1.1" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>), the Group Manager "forgets" the Birth Gid currently associated with the leaving node in the OSCORE group. This was stored following the Joining Response sent to that node, after its latest (re-)joining of the OSCORE group (see <xref target="ssec-join-resp"/>).</t>
      <t>If any of the two conditions below holds, the Group Manager MUST inform the leaving node of its eviction as follows. If both conditions hold, the Group Manager MUST inform the leaving node by using only the method corresponding to one of either conditions.</t>
      <ul spacing="normal">
        <li>If, upon joining the group (see <xref target="ssec-join-req-sending"/>), the leaving node specified a URI in the 'control_uri' parameter defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, the Group Manager sends a DELETE request targeting the URI specified in the 'control_uri' parameter (OPT7).</li>
        <li>If the leaving node has been observing the associated resource at ace-group/GROUPNAME/nodes/NODENAME, the Group Manager sends an unsolicited 4.04 (Not Found) error response to the leaving node, as specified in <xref section="4.3.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>.</li>
      </ul>
      <t>Furthermore, the Group Manager might intend to evict all the current group members from the group at once. In such a case, if the Joining Responses sent by the Group Manager to nodes joining the group (see <xref target="ssec-join-resp"/>) specify a URI in the 'control_group_uri' parameter defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, then the Group Manager MUST additionally send a DELETE request targeting the URI specified in the 'control_group_uri' parameter (OPT10).</t>
      <t>If the leaving node has not exclusively the role of monitor, the Group Manager performs the following actions.</t>
      <ul spacing="normal">
        <li>The Group Manager frees the OSCORE Sender ID value of the leaving node. This value MUST NOT become available for possible upcoming joining nodes in the same group, until the group has been rekeyed and assigned a new Group Identifier (Gid).</li>
        <li>The Group Manager MUST add the relinquished Sender ID of the leaving node to the most recent set of stale Sender IDs, in the collection associated with the group (see <xref target="sssec-stale-sender-ids"/>).</li>
        <li>The Group Manager cancels the association between, on one hand, the authentication credential of the leaving node and, on the other hand, the Gid associated with the OSCORE group together with the freed Sender ID value. The Group Manager deletes the authentication credential of the leaving node, if that authentication credential has no remaining association with any pair (Gid, Sender ID).</li>
      </ul>
      <t>Then, the Group Manager MUST generate updated security parameters and group keying material, and provide it to the remaining group members (see <xref target="sec-group-rekeying-process"/>). As a consequence, the leaving node is not able to acquire the new security parameters and group keying material distributed after its leaving.</t>
      <t>The same considerations from <xref section="5" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> apply here as well, considering the Group Manager acting as KDC.</t>
    </section>
    <section anchor="sec-group-rekeying-process">
      <name>Group Rekeying Process</name>
      <t>In order to rekey the OSCORE group, the Group Manager distributes a new Group Identifier (Gid), i.e., a new OSCORE ID Context; a new OSCORE Master Secret; and, optionally, a new OSCORE Master Salt for that group. When doing so, the Group Manager MUST increment the version number of the group keying material, before starting its distribution.</t>
      <t>As per <xref section="3.2.1.1" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>, the Group Manager MAY reassign a Gid to the same group over that group's lifetime, e.g., once the whole space of Gid values has been used for the group in question. If the Group Manager supports reassignment of Gid values and performs it in a group, then the Group Manager additionally takes the following actions.</t>
      <ul spacing="normal">
        <li>Before rekeying the group, the Group Manager MUST check if the new Gid to be distributed coincides with the Birth Gid of any of the current group members (see <xref target="ssec-join-resp"/>).</li>
        <li>
          <t>If any of such "elder members" is found in the group, the Group Manager MUST evict them from the group. That is, the Group Manager MUST terminate their membership and MUST rekey the group in such a way that the new keying material is not provided to those evicted elder members. This also includes adding their relinquished Sender IDs to the most recent set of stale Sender IDs, in the collection associated with the group (see <xref target="sssec-stale-sender-ids"/>), before rekeying the group.  </t>
          <t>
Until a further following group rekeying, the Group Manager MUST store the list of those latest-evicted elder members. If any of those nodes re-joins the group before a further following group rekeying occurs, the Group Manager MUST NOT rekey the group upon their re-joining. When one of those nodes re-joins the group, the Group Manager can rely, e.g., on the ongoing secure communication association to recognize the node as included in the stored list.</t>
        </li>
      </ul>
      <t>Across the rekeying execution, the Group Manager MUST preserve the same unchanged OSCORE Sender IDs for all group members intended to remain in the group. This avoids affecting the retrieval of authentication credentials from the Group Manager and the verification of group messages.</t>
      <t>The Group Manager MUST support the "Point-to-Point" group rekeying scheme registered in <xref section="11.14" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, as per the detailed use defined in <xref target="sending-rekeying-msg"/> of this document. Future specifications may define how this application profile can use alternative group rekeying schemes, which MUST comply with the functional steps defined in <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>. The Group Manager MUST indicate the use of such an alternative group rekeying scheme to joining nodes, by means of the 'group_rekeying' parameter included in Joining Response messages (see <xref target="ssec-join-resp"/>).</t>
      <t>It is RECOMMENDED that the Group Manager gets confirmation of successful distribution from the group members, and admits a maximum number of individual retransmissions to non-confirming group members. Once completed the group rekeying process, the Group Manager creates a new empty set X' of stale Sender IDs associated with the version of the newly distributed group keying material. Then, the Group Manager MUST add the set X' to the collection of stale Sender IDs associated with the group (see <xref target="sssec-stale-sender-ids"/>).</t>
      <t>In case the rekeying terminates and some group members have not received the new keying material, they will not be able to correctly process following secured messages exchanged in the group. These group members will eventually contact the Group Manager, in order to retrieve the current keying material and its version.</t>
      <t>Some of these group members may be in multiple groups, each associated with a different Group Manager. When failing to correctly process messages secured with the new keying material, these group members may not have sufficient information to determine which exact Group Manager they should contact, in order to retrieve the current keying material they are missing.</t>
      <t>If the Gid is formatted as described in Appendix C of <xref target="I-D.ietf-core-oscore-groupcomm"/>, the Group Prefix can be used as a hint to determine the right Group Manager, as long as no collisions among Group Prefixes are experienced. Otherwise, a group member needs to contact the Group Manager of each group, e.g., by first requesting only the version of the current group keying material (see <xref target="sec-version"/>) and then possibly requesting the current keying material (see <xref target="ssec-updated-key-only"/>).</t>
      <t>Furthermore, some of these group members can be in multiple groups, all of which associated with the same Group Manager. In this case, these group members may also not have sufficient information to determine which exact group they should refer to, when contacting the right Group Manager. Hence, they need to contact a Group Manager multiple times, i.e., separately for each group they belong to and associated with that Group Manager.</t>
      <t><xref target="receiving-rekeying-msg"/> defines the actions performed by a group member upon receiving the new group keying material. <xref target="missed-rekeying"/> discusses how a group member can realize that it has missed one or more rekeying instances, and the actions it is accordingly required to take.</t>
      <section anchor="sending-rekeying-msg">
        <name>Sending Rekeying Messages</name>
        <t>When using the "Point-to-Point" group rekeying scheme, the group rekeying messages MUST have Content-Format set to application/ace-groupcomm+cbor and have the same format used for the Joining Response message in <xref target="ssec-join-resp"/>, with the following differences. Note that this extends the minimal content of a rekeying message as defined in <xref section="6" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> (OPT14).</t>
        <ul spacing="normal">
          <li>
            <t>From the Joining Response, only the parameters 'gkty', 'key', 'num', 'exp', and 'ace-groupcomm-profile' are present. In particular, the 'key' parameter includes only the following data.  </t>
            <ul spacing="normal">
              <li>The 'ms' parameter, specifying the new OSCORE Master Secret value. This parameter MUST be present.</li>
              <li>The 'contextId' parameter, specifying the new Gid to use as OSCORE ID Context value. This parameter MUST be present.</li>
              <li>The 'salt' value, specifying the new OSCORE Master Salt value. This parameter MAY be present.</li>
            </ul>
          </li>
          <li>
            <t>The parameter 'stale_node_ids' MUST also be included, with CBOR label defined in <xref target="ssec-iana-ace-groupcomm-parameters-registry"/>. This parameter is encoded as a CBOR array, where each element is encoded as a CBOR byte string. The CBOR array has to be intended as a set, i.e., the order of its elements is irrelevant. The parameter is populated as follows.  </t>
            <ul spacing="normal">
              <li>The Group Manager creates an empty CBOR array ARRAY.</li>
              <li>The Group Manager considers the collection of stale Sender IDs associated with the group (see <xref target="sssec-stale-sender-ids"/>), and takes the most recent set X, i.e., the set associated with the current version of the group keying material about to be relinquished.</li>
              <li>For each Sender ID in X, the Group Manager encodes it as a CBOR byte string and adds the result to ARRAY.</li>
              <li>The parameter 'stale_node_ids' takes ARRAY as value.</li>
            </ul>
          </li>
          <li>The parameters 'pub_keys', 'peer_roles' and 'peer_identifiers' SHOULD be present, if the group rekeying is performed due to one or multiple Clients that have requested to join the group. Following the same semantics used in the Joining Response message (see <xref target="ssec-join-resp"/>), the three parameters specify the authentication credential, roles in the group and node identifier of each of the Clients that have requested to join the group. The Group Manager MUST NOT include a non-empty subset of these three parameters.</li>
        </ul>
        <t>The Group Manager separately sends a group rekeying message formatted as defined above to each group member to be rekeyed.</t>
        <t>Each rekeying message MUST be secured with the pairwise secure communication association between the Group Manager and the group member used during the joining process. In particular, each rekeying message can target the 'control_uri' URI path defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> (OPT7), if provided by the intended recipient upon joining the group (see <xref target="ssec-join-req-sending"/>).</t>
        <t>This distribution approach requires group members to act (also) as servers, in order to correctly handle unsolicited group rekeying messages from the Group Manager. In particular, if a group member and the Group Manager use OSCORE <xref target="RFC8613"/> to secure their pairwise communications, the group member MUST create a Replay Window in its own Recipient Context upon establishing the OSCORE Security Context with the Group Manager, e.g., by means of the OSCORE profile of ACE <xref target="I-D.ietf-ace-oscore-profile"/>.</t>
        <t>Group members and the Group Manager SHOULD additionally support alternative distribution approaches that do not require group members to act (also) as servers. A number of such approaches are defined in <xref section="6" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular, a group member may use CoAP Observe <xref target="RFC7641"/> and subscribe for updates to the group-membership resource of the group, at the endpoint /ace-group/GROUPNAME/ of the Group Manager (see <xref section="6.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>). Alternatively, a full-fledged Pub-Sub model can be considered <xref target="I-D.ietf-core-coap-pubsub"/>, where the Group Manager publishes to a rekeying topic hosted at a Broker, while the group members subscribe to such topic (see <xref section="6.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>).</t>
      </section>
      <section anchor="receiving-rekeying-msg">
        <name>Receiving Rekeying Messages</name>
        <t>Once received the new group keying material, a group member proceeds as follows. Unless otherwise specified, the following is independent of the specifically used group rekeying scheme.</t>
        <t>The group member considers the stale Sender IDs received from the Group Manager. If the "Point-to-Point" group rekeying scheme as detailed in <xref target="sending-rekeying-msg"/> is used, the stale Sender IDs are specified by the 'stale_node_ids' parameter.</t>
        <t>After that, as per <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>, the group member MUST remove every authentication credential associated with a stale Sender ID from its list of group members' authentication credentials used in the group, and MUST delete each of its Recipient Contexts used in the group whose corresponding Recipient ID is a stale Sender ID.</t>
        <t>Then, the following cases can occur, based on the version number V' of the new group keying material distributed through the rekeying process. If the "Point-to-Point" group rekeying scheme as detailed in <xref target="sending-rekeying-msg"/> is used, this information is specified by the 'num' parameter.</t>
        <ul spacing="normal">
          <li>The group member has not missed any group rekeying. That is, the old keying material stored by the group member has version number V, while the received new keying material has version number V' = (V + 1). In such a case, the group member simply installs the new keying material and derives the corresponding new Security Context.</li>
          <li>The group member has missed one or more group rekeying instances. That is, the old keying material stored by the group member has version number V, while the received new keying material has version number V' &gt; (V + 1). In such a case, the group member MUST proceed as defined in <xref target="missed-rekeying"/>.</li>
          <li>The group member has received keying material not newer than the stored one. That is, the old keying material stored by the group member has version number V, while the received keying material has version number V' &lt; (V + 1). In such a case, the group member MUST ignore the received rekeying messages and MUST NOT install the received keying material.</li>
        </ul>
      </section>
      <section anchor="missed-rekeying">
        <name>Missed Rekeying Instances</name>
        <t>A group member can realize to have missed one or more rekeying instances in one of the ways discussed below. In the following, V denotes the version number of the old keying material stored by the group member, while V' denotes the version number of the latest, possibly just distributed, keying material.</t>
        <t>a. The group member has participated to a rekeying process that has distributed new keying material with version number V' &gt; (V + 1), as discussed in <xref target="receiving-rekeying-msg"/>.</t>
        <t>b. The group member has obtained the latest keying material from the Group Manager, as a response to a Key Distribution Request (see <xref target="ssec-updated-key-only"/>) or to a Joining Request when re-joining the group (see <xref target="ssec-join-req-sending"/>). In particular, V is different than V' specified by the 'num' parameter in the response.</t>
        <t>c. The group member has obtained the authentication credentials of other group members, through a Public Key Request-Response exchange with the Group Manager (see <xref target="sec-pub-keys"/>). In particular, V is different than V' specified by the 'num' parameter in the response.</t>
        <t>d. The group member has performed a Version Request-Response exchange with the Group Manager (see <xref target="sec-version"/>). In particular, V is different than V' specified by the 'num' parameter in the response.</t>
        <t>In either case, the group member MUST delete the stored keying material with version number V.</t>
        <t>If case (a) or case (b) applies, the group member MUST perform the following actions.</t>
        <ol spacing="normal" type="1"><li>The group member MUST NOT install the latest keying material yet, in case that was already obtained.</li>
          <li>
            <t>The group member sends a Stale Sender IDs Request to the Group Manager (see <xref target="sec-retrieve-stale-sids"/>), specifying the version number V as payload of the request.  </t>
            <t>
If the Stale Sender IDs Response from the Group Manager has no payload, the group member MUST remove all the authentication credentials from its list of group members' authentication credentials used in the group, and MUST delete all its Recipient Contexts used in the group.  </t>
            <t>
Otherwise, the group member considers the stale Sender IDs specified in the Stale Sender IDs Response from the Group Manager. Then, the group member MUST remove every authentication credential associated with a stale Sender ID from its list of group members' authentication credentials used in the group, and MUST delete each of its Recipient Contexts used in the group whose corresponding Recipient ID is a stale Sender ID.</t>
          </li>
          <li>The group member installs the latest keying material with version number V' and derives the corresponding new Security Context.</li>
        </ol>
        <t>If case (c) or case (d) applies, the group member SHOULD perform the following actions.</t>
        <ol spacing="normal" type="1"><li>
            <t>The group member sends a Stale Sender IDs Request to the Group Manager (see <xref target="sec-retrieve-stale-sids"/>), specifying the version number V as payload of the request.  </t>
            <t>
If the Stale Sender IDs Response from the Group Manager has no payload, the group member MUST remove all the authentication credentials from its list of group members' authentication credentials used in the group, and MUST delete all its Recipient Contexts used in the group.  </t>
            <t>
Otherwise, the group member considers the stale Sender IDs specified in the Stale Sender IDs Response from the Group Manager. Then, the group member MUST remove every authentication credential associated with a stale Sender ID from its list of group members' authentication credentials used in the group, and MUST delete each of its Recipient Contexts used in the group whose corresponding Recipient ID is a stale Sender ID.</t>
          </li>
          <li>The group member obtains the latest keying material with version number V' from the Group Manager. This can happen by sending a Key Distribution Request to the Group Manager (see <xref target="ssec-updated-key-only"/>) and <xref target="ssec-updated-and-individual-key"/>).</li>
          <li>The group member installs the latest keying material with version number V' and derives the corresponding new Security Context.</li>
        </ol>
        <t>If case (c) or case (d) applies, the group member can alternatively perform the following actions.</t>
        <ol spacing="normal" type="1"><li>The group member re-joins the group (see <xref target="ssec-join-req-sending"/>). When doing so, the group member MUST re-join with the same roles it currently has in the group, and MUST request the Group Manager for the authentication credentials of all the current group members. That is, the 'get_pub_keys' parameter of the Joining Request MUST be present and MUST be set to the CBOR simple value "null" (0xf6).</li>
          <li>
            <t>When receiving the Joining Response (see <xref target="ssec-join-resp-processing"/> and <xref target="ssec-join-resp-processing"/>), the group member retrieves the set Z of authentication credentials specified in the 'pub_keys' parameter.  </t>
            <t>
Then, the group member MUST remove every authentication credential which is not in Z from its list of group members' authentication credentials used in the group, and MUST delete each of its Recipient Contexts used in the group that does not include any of the authentication credentials in Z.</t>
          </li>
          <li>The group member installs the latest keying material with version number V' and derives the corresponding new Security Context.</li>
        </ol>
        <section anchor="sec-retrieve-stale-sids">
          <name>Retrieve Stale Sender IDs</name>
          <t>When realizing to have missed one or more group rekeying instances (see <xref target="missed-rekeying"/>), a node needs to retrieve from the Group Manager the data required to delete some of its stored group members' authentication credentials and Recipient Contexts (see <xref target="stale-sids-fetch"/>). These data are provided as an aggregated set of stale Sender IDs, which are used as specified in <xref target="missed-rekeying"/>.</t>
          <t>In particular, the node sends a CoAP FETCH request to the endpoint /ace-group/GROUPNAME/stale-sids at the Group Manager defined in <xref target="ssec-resource-stale-sids"/> of this document, where GROUPNAME is the name of the OSCORE group.</t>
          <t>The payload of the Stale Sender IDs Request MUST include a CBOR unsigned integer. This encodes the version number V of the most recent group keying material stored and installed by the requesting Client, which is older than the latest, possibly just distributed, keying material with version number V'.</t>
          <t>The handler MUST reply with a 4.00 (Bad Request) error response, if the request is not formatted correctly. Also, the handler MUST respond with a 4.00 (Bad Request) error response, if the specified version number V is greater or equal than the version number V' associated with the latest keying material in the group, i.e., in case V &gt;= V'.</t>
          <t>Otherwise, the handler responds with a 2.05 (Content) Stale Sender IDs Response. The payload of the response is formatted as defined below, where SKEW = (V' - V + 1).</t>
          <ul spacing="normal">
            <li>The Group Manager considers ITEMS as the current number of sets stored in the collection of stale Sender IDs associated with the group (see <xref target="sssec-stale-sender-ids"/>).</li>
            <li>If SKEW &gt; ITEMS, the Stale Sender IDs Response MUST NOT have a payload.</li>
            <li>
              <t>Otherwise, the payload of the Stale Sender IDs Response MUST include a CBOR array, where each element is encoded as a CBOR byte string. The CBOR array has to be intended as a set, i.e., the order of its elements is irrelevant. The Group Manager populates the CBOR array as follows.  </t>
              <ul spacing="normal">
                <li>The Group Manager creates an empty CBOR array ARRAY and an empty set X.</li>
                <li>The Group Manager considers the SKEW most recent sets stored in the collection of stale Sender IDs associated with the group. Note that the most recent set is the one associate to the latest version of the group keying material.</li>
                <li>The Group Manager copies all the Sender IDs from the selected sets into X. When doing so, the Group Manager MUST discard duplicates. That is, the same Sender ID MUST NOT be present more than once in the final content of X.</li>
                <li>For each Sender ID in X, the Group Manager encodes it as a CBOR byte string and adds the result to ARRAY.</li>
                <li>Finally, ARRAY is specified as payload of the Stale Sender IDs Response. Note that ARRAY might result in the empty CBOR array.</li>
              </ul>
            </li>
          </ul>
          <t><xref target="fig-stale-ids-req-resp"/> gives an overview of the exchange described above,  while <xref target="fig-stale-ids-req-resp-ex"/> shows an example.</t>
          <figure anchor="fig-stale-ids-req-resp">
            <name>Message Flow of Stale Sender IDs Request-Response</name>
            <artwork align="center"><![CDATA[
                                                              Group
Node                                                         Manager
  |                                                             |
  |                   Stale Sender IDs Request                  |
  |------------------------------------------------------------>|
  |             FETCH ace-group/GROUPNAME/stale-sids            |
  |                                                             |
  |<---------- Stale Sender IDs Response: 2.05 (Content) -------|
  |                                                             |
]]></artwork>
          </figure>
          <figure anchor="fig-stale-ids-req-resp-ex">
            <name>Example of Stale Sender IDs Request-Response</name>
            <artwork><![CDATA[
   Request:

   Header: FETCH (Code=0.05)
   Uri-Host: "kdc.example.com"
   Uri-Path: "ace-group"
   Uri-Path: "g1"
   Uri-Path: "stale-sids"
   Payload (in CBOR diagnostic notation):
     42

   Response:

   Header: Content (Code=2.05)
   Payload (in CBOR diagnostic notation):
     [h'01', h'fc', h'12ab', h'de44', h'ff']
]]></artwork>
          </figure>
        </section>
      </section>
    </section>
    <section anchor="ace-groupcomm-params">
      <name>ACE Groupcomm Parameters</name>
      <t>In addition to those defined in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, this application profile defines additional parameters used during the second part of the message exchange with the Group Manager, i.e., after the exchange of Token Transfer Request and Response (see <xref target="ssec-token-post"/>). The table below summarizes them and specifies the CBOR key to use instead of the full descriptive name.</t>
      <t>Note that the media type application/ace-groupcomm+cbor MUST be used when these parameters are transported in the respective message fields.</t>
      <figure anchor="fig-ACE-Groupcomm-Parameters">
        <name>ACE Groupcomm Parameters</name>
        <artwork align="center"><![CDATA[
+----------------+------+-------+-----------------+
| Name           | CBOR | CBOR  | Reference       |
|                | Key  | Type  |                 |
+----------------+------+-------+-----------------+
| group_senderId | TBD  | bstr  | [this document] |
+----------------+------+-------+-----------------+
| ecdh_info      | TBD  | array | [this document] |
+----------------+------+-------+-----------------+
| kdc_dh_creds   | TBD  | array | [this document] |
+----------------+------+-------+-----------------+
| group_enc_key  | TBD  | bstr  | [this document] |
+----------------+------+-------+-----------------+
| stale_node_ids | TBD  | array | [this document] |
+----------------+------+-------+-----------------+
]]></artwork>
      </figure>
      <t>The Group Manager is expected to support and understand all the parameters above. Instead, a Client is required to support the new parameters defined in this application profile as specified below (REQ29).</t>
      <ul spacing="normal">
        <li>'group_senderId' MUST be supported by a Client that intends to join an OSCORE group with the role of Requester and/or Responder.</li>
        <li>'ecdh_info' MUST be supported by a Client that intends to join a group which uses the pairwise mode of Group OSCORE.</li>
        <li>'kdc_dh_creds' MUST be supported by a Client that intends to join a group which uses the pairwise mode of Group OSCORE and that does not plan to or cannot rely on an early retrieval of the Group Manager's Diffie-Hellman authentication credential.</li>
        <li>'group_enc_key' MUST be supported by a Client that intends to join a group which uses the group mode of Group OSCORE or to be signature verifier for that group.</li>
        <li>'stale_node_ids' MUST be supported.</li>
      </ul>
      <t>When the conditional parameters defined in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> are used with this application profile, a Client must, should or may support them as specified below (REQ30).</t>
      <ul spacing="normal">
        <li>'client_cred', 'cnonce', 'client_cred_verify'. A Client that has an own authentication credential to use in a group MUST support these parameters.</li>
        <li>'kdcchallenge'. A Client that has an own authentication credential to use in a group and that provides the Access Token to the Group Manager through a Token Transfer Request (see <xref target="ssec-token-post"/>) MUST support this parameter.</li>
        <li>'pub_keys_repo'. This parameter is not relevant for this application profile, since the Group Manager always acts as repository of the group members' authentication credentials.</li>
        <li>'group_policies'. A Client that is interested in the specific policies used in a group, but that does not know them or cannot become aware of them before joining that group, SHOULD support this parameter.</li>
        <li>'peer_roles'. A Client MUST support this parameter, since in this application profile it is relevant for Clients to know the roles of the group member associated with each authentication credential.</li>
        <li>'kdc_nonce', 'kdc_cred' and 'kdc_cred_verify'. A Client MUST support these parameters, since the Group Manager's authentication credential is required to process messages protected with Group OSCORE (see Section 4.3 of <xref target="I-D.ietf-core-oscore-groupcomm"/>).</li>
        <li>'mgt_key_material'. A Client that supports an advanced rekeying scheme possibly used in the group, such as based on one-to-many rekeying messages sent by the Group Manager (e.g., over IP multicast), MUST support this parameter.</li>
        <li>'control_group_uri'. A Client that supports the hosting of local resources each associated with a group (hence acting as CoAP server) and the reception of one-to-many requests sent to those resources by the Group Manager (e.g., over IP
multicast) MUST support this parameter.</li>
      </ul>
    </section>
    <section anchor="error-types">
      <name>ACE Groupcomm Error Identifiers</name>
      <t>In addition to those defined in <xref section="9" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, this application profile defines new values that the Group Manager can include as error identifiers, in the 'error' field of an error response with Content-Format application/ace-groupcomm+cbor.</t>
      <figure anchor="fig-ACE-Groupcomm-Error">
        <name>ACE Groupcomm Error Identifiers</name>
        <artwork align="center"><![CDATA[
+-------+-------------------------------------------------+
| Value |                   Description                   |
+-------+-------------------------------------------------+
|   7   | Signatures not used in the group                |
+-------+-------------------------------------------------+
|   8   | Operation permitted only to signature verifiers |
+-------+-------------------------------------------------+
|   9   | Group currently not active                      |
+-------+-------------------------------------------------+
]]></artwork>
      </figure>
      <t>A Client supporting the 'error' parameter (see Sections <xref target="I-D.ietf-ace-key-groupcomm" section="4.1.2" sectionFormat="bare"/> and <xref target="I-D.ietf-ace-key-groupcomm" section="8" sectionFormat="bare"/> of <xref target="I-D.ietf-ace-key-groupcomm"/>) and able to understand the specified error may use that information to determine what actions to take next. If it is included in the error response and supported by the Client, the 'error_description' parameter may provide additional context. In particular, the following guidelines apply.</t>
      <ul spacing="normal">
        <li>In case of error 7, the Client should stop sending the request in question to the Group Manager. In this application profile, this error is relevant only for a signature verifier, in case it tries to access resources related to a pairwise-only group.</li>
        <li>In case of error 8, the Client should stop sending the request in question to the Group Manager.</li>
        <li>In case of error 9, the Client should wait for a certain (pre-configured) amount of time, before trying re-sending its request to the Group Manager.</li>
      </ul>
    </section>
    <section anchor="default-values-for-group-configuration-parameters">
      <name>Default Values for Group Configuration Parameters</name>
      <t>This section defines the default values that the Group Manager assumes for the configuration parameters of an OSCORE group, unless differently specified when creating and configuring the group. This can be achieved as specified in <xref target="I-D.ietf-ace-oscore-gm-admin"/>.</t>
      <section anchor="common">
        <name>Common</name>
        <t>This section always applies, as related to common configuration parameters.</t>
        <ul spacing="normal">
          <li>For the HKDF Algorithm 'hkdf', the Group Manager SHOULD use HKDF SHA-256, defined as default in <xref section="3.2" sectionFormat="of" target="RFC8613"/>. In the 'hkdf' parameter, this HKDF Algorithm is specified by the HMAC Algorithm HMAC 256/256 (COSE algorithm encoding: 5).</li>
          <li>
            <t>For the format 'cred_fmt' used for the authentication credentials in the group, the Group Manager SHOULD use CBOR Web Token (CWT) or CWT Claims Set (CCS) <xref target="RFC8392"/>, i.e., the COSE Header Parameter 'kcwt' and 'kccs', respectively.  </t>
            <t>
[
    These COSE Header Parameters are under pending registration requested by draft-ietf-lake-edhoc.
 ]</t>
          </li>
          <li>For 'max_stale_sets', the Group Manager SHOULD consider N = 3 as the maximum number of stored sets of stale Sender IDs in the collection associated with the group (see <xref target="sssec-stale-sender-ids"/>).</li>
        </ul>
      </section>
      <section anchor="group-mode">
        <name>Group Mode</name>
        <t>This section applies if the group uses (also) the group mode of Group OSCORE.</t>
        <ul spacing="normal">
          <li>For the Signature Encryption Algorithm 'sign_enc_alg' used to encrypt messages protected with the group mode, the Group Manager SHOULD use AES-CCM-16-64-128 (COSE algorithm encoding: 10) as default value.</li>
        </ul>
        <t>The Group Manager SHOULD use the following default values for the Signature Algorithm 'sign_alg' and related parameters 'sign_params', consistently with the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>, the "COSE Key Types" registry <xref target="COSE.Key.Types"/> and the "COSE Elliptic Curves" registry <xref target="COSE.Elliptic.Curves"/>.</t>
        <ul spacing="normal">
          <li>For the Signature Algorithm 'sign_alg' used to sign messages protected with the group mode, the signature algorithm EdDSA <xref target="RFC8032"/>.</li>
          <li>
            <t>For the parameters 'sign_params' of the Signature Algorithm:  </t>
            <ul spacing="normal">
              <li>The array [[OKP], [OKP, Ed25519]], in case EdDSA is assumed or specified for 'sign_alg'. In particular, this indicates to use the COSE key type OKP and the elliptic curve Ed25519 <xref target="RFC8032"/>.</li>
              <li>The array [[EC2], [EC2, P-256]], in case ES256 <xref target="RFC6979"/> is specified for 'sign_alg'. In particular, this indicates to use the COSE key type EC2 and the elliptic curve P-256.</li>
              <li>The array [[EC2], [EC2, P-384]], in case ES384 <xref target="RFC6979"/> is specified for 'sign_alg'. In particular, this indicates to use the COSE key type EC2 and the elliptic curve P-384.</li>
              <li>The array [[EC2], [EC2, P-521]], in case ES512 <xref target="RFC6979"/> is specified for 'sign_alg'. In particular, this indicates to use the COSE key type EC2 and the elliptic curve P-521.</li>
              <li>The array [[RSA], [RSA]], in case PS256, PS384 or PS512 <xref target="RFC8017"/> is specified for 'sign_alg'. In particular, this indicates to use the COSE key type RSA.</li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="pairwise-mode">
        <name>Pairwise Mode</name>
        <t>This section applies if the group uses (also) the pairwise mode of Group OSCORE.</t>
        <t>For the AEAD Algorithm 'alg' used to encrypt messages protected with the pairwise mode, the Group Manager SHOULD use the same default value defined in <xref section="3.2" sectionFormat="of" target="RFC8613"/>, i.e., AES-CCM-16-64-128 (COSE algorithm encoding: 10).</t>
        <t>For the Pairwise Key Agreement Algorithm 'ecdh_alg' and related parameters 'ecdh_params', the Group Manager SHOULD use the following default values, consistently with the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>, the "COSE Key Types" registry <xref target="COSE.Key.Types"/> and the "COSE Elliptic Curves" registry <xref target="COSE.Elliptic.Curves"/>.</t>
        <ul spacing="normal">
          <li>For the Pairwise Key Agreement Algorithm 'ecdh_alg' used to compute static-static Diffie-Hellman shared secrets, the ECDH algorithm ECDH-SS + HKDF-256 specified in <xref section="6.3.1" sectionFormat="of" target="I-D.ietf-cose-rfc8152bis-algs"/>.</li>
          <li>
            <t>For the parameters 'ecdh_params' of the Pairwise Key Agreement Algorithm:  </t>
            <ul spacing="normal">
              <li>The array [[OKP], [OKP, X25519]], in case EdDSA is assumed or specified for 'sign_alg', or in case the group is a pairwise-only group. In particular, this indicates to use the COSE key type OKP and the elliptic curve X25519 <xref target="RFC8032"/>.</li>
              <li>The array [[EC2], [EC2, P-256]], in case ES256 <xref target="RFC6979"/> is specified for 'sign_alg'. In particular, this indicates to use the COSE key type EC2 and the elliptic curve P-256.</li>
              <li>The array [[EC2], [EC2, P-384]], in case ES384 <xref target="RFC6979"/> is specified for 'sign_alg'. In particular, this indicates to use the COSE key type EC2 and the elliptic curve P-384.</li>
              <li>The array [[EC2], [EC2, P-521]], in case ES512 <xref target="RFC6979"/> is specified for 'sign_alg'. In particular, this indicates to use the COSE key type EC2 and the elliptic curve P-521.</li>
            </ul>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>Security considerations for this profile are inherited from <xref target="I-D.ietf-ace-key-groupcomm"/>, the ACE framework for Authentication and Authorization <xref target="I-D.ietf-ace-oauth-authz"/>, and the specific transport profile of ACE signalled by the AS, such as <xref target="I-D.ietf-ace-dtls-authorize"/> and <xref target="I-D.ietf-ace-oscore-profile"/>.</t>
      <t>The following security considerations also apply for this profile.</t>
      <section anchor="ssec-security-considerations-management">
        <name>Management of OSCORE Groups</name>
        <t>This profile leverages the following management aspects related to OSCORE groups and discussed in the sections of <xref target="I-D.ietf-core-oscore-groupcomm"/> referred below.</t>
        <ul spacing="normal">
          <li>
            <t>Management of group keying material (see <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>). The Group Manager is responsible for the renewal and re-distribution of the keying material in the groups of its competence (rekeying).  </t>
            <t>
The Group Manager performs a rekeying when one ore more members leave the group, thus preserving forward security and ensuring that the security properties of Group OSCORE are fulfilled. According to the specific application requirements, the Group Manager can also rekey the group upon a new node's joining, in case backward security has also to be preserved.</t>
          </li>
          <li>Provisioning and retrieval of authentication credentials (see <xref section="3" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>). The Group Manager acts as repository of authentication credentials of group members, and provides them upon request.</li>
          <li>Synchronization of sequence numbers (see <xref section="6.3" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>). This concerns how a responder node that has just joined an OSCORE group can synchronize with the sequence number of requesters in the same group.</li>
        </ul>
        <t>Before sending the Joining Response, the Group Manager MUST verify that the joining node actually owns the associated private key. To this end, the Group Manager can rely on the proof-of-possession challenge-response defined in <xref target="sec-joining-node-to-GM"/>.</t>
        <t>Alternatively, when establishing a secure communication association with the Group Manager, the joining node can provide the Group Manager with its own authentication credential, and use the public key included thereof as asymmetric proof-of-possession key. For example, this is the case when the joining node relies on <xref section="3.2.2" sectionFormat="of" target="I-D.ietf-ace-dtls-authorize"/> and authenticates itself during the DTLS handshake with the Group Manager. However, this requires the authentication credential to be in the format used in the OSCORE group, and that both the authentication credential of the joining node and the included public key are compatible with the signature or ECDH algorithm, and possible associated parameters used in the OSCORE group.</t>
        <t>A node may have joined multiple OSCORE groups under different non-synchronized Group Managers. Therefore, it can happen that those OSCORE groups have the same Group Identifier (Gid). It follows that, upon receiving a Group OSCORE message addressed to one of those groups, the node would have multiple Security Contexts matching with the Gid in the incoming message. It is up to the application to decide how to handle such collisions of Group Identifiers, e.g., by trying to process the incoming message using one Security Context at the time until the right one is found.</t>
      </section>
      <section anchor="ssec-security-considerations-challenges">
        <name>Size of Nonces as Proof-of-Possesion Challenge</name>
        <t>With reference to the Joining Request message in <xref target="ssec-join-req-sending"/>, the proof-of-possession (PoP) evidence included in 'client_cred_verify' is computed over an input including also N_C | N_S, where | denotes concatenation.</t>
        <t>For the N_C challenge, it is RECOMMENDED to use a 8-byte long random nonce. Furthermore, N_C is always conveyed in the 'cnonce' parameter of the Joining Request, which is always sent over the secure communication association between the joining node and the Group Manager.</t>
        <t>As defined in <xref target="sssec-challenge-value"/>, the way the N_S value is computed depends on the particular way the joining node provides the Group Manager with the Access Token, as well as on following interactions between the two.</t>
        <ul spacing="normal">
          <li>If the Access Token has not been provided to the Group Manager by means of a Token Transfer Request to the /authz-info endpoint as in <xref target="ssec-token-post"/>, then N_S is computed as a 32-byte long challenge. For an example, see point (2) of <xref target="sssec-challenge-value"/>.</li>
          <li>If the Access Token has been provided to the Group Manager by means of a Token Transfer Request to the /authz-info endpoint as in <xref target="ssec-token-post"/>, then N_S takes the most recent value provided to the Client by the Group Manager in the 'kdcchallenge' parameter, as specified in point (1) of <xref target="sssec-challenge-value"/>. This value is provided either in the Token Transfer Response (see <xref target="ssec-token-post"/>), or in a 4.00 (Bad Request) error response to a following Joining Request (see <xref target="ssec-join-req-processing"/>). In either case, it is RECOMMENDED to use a 8-byte long random challenge as value for N_S.</li>
        </ul>
        <t>If we consider both N_C and N_S to take 8-byte long values, the following considerations hold.</t>
        <ul spacing="normal">
          <li>Let us consider both N_C and N_S as taking random values, and the Group Manager to never change the value of the N_S provided to a Client during the lifetime of an Access Token. Then, as per the birthday paradox, the average collision for N_S will happen after 2^32 new transferred Access Tokens, while the average collision for N_C will happen after 2^32 new Joining Requests. This amounts to considerably more token provisionings than the expected new joinings of OSCORE groups under a same Group Manager, as well as to considerably more requests to join OSCORE groups from a same Client using a same Access Token under a same Group Manager.</li>
          <li>
            <xref section="7" sectionFormat="of" target="I-D.ietf-ace-oscore-profile"/> as well <xref section="B.2" sectionFormat="of" target="RFC8613"/> recommend the use of 8-byte random values as well. Unlike in those cases, the values of N_C and N_S considered in this document are not used for as sensitive operations as the derivation of a Security Context, and thus do not have possible implications in the security of AEAD ciphers.</li>
        </ul>
      </section>
      <section anchor="ssec-security-considerations-reusage-nonces">
        <name>Reusage of Nonces for Proof-of-Possession Input</name>
        <t>As long as the Group Manager preserves the same N_S value currently associated with an Access Token, i.e., the latest value provided to a Client in a 'kdcchallenge' parameter, the Client is able to successfully reuse the same proof-of-possession (PoP) input for multiple Joining Requests to that Group Manager.</t>
        <t>In particular, the Client can reuse the same N_C value for every Joining Request to the Group Manager, and combine it with the same unchanged N_S value. This results in reusing the same PoP input for producing the PoP evidence to include in the 'client_cred_verify' parameter of the Joining Requests.</t>
        <t>Unless the Group Manager maintains a list of N_C values already used by that Client since the latest update to the N_S value associated with the Access Token, the Group Manager can be forced to falsely believe that the Client possesses its own private key at that point in time, upon verifying the PoP evidence in the 'client_cred_verify' parameter.</t>
      </section>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>Note to RFC Editor: Please replace all occurrences of "[[This document]]" with the RFC number of this specification and delete this paragraph.</t>
      <t>This document has the following actions for IANA.</t>
      <section anchor="iana-kinfo">
        <name>OAuth Parameters</name>
        <t>IANA is asked to register the following entries to the "OAuth Parameters" registry, as per the procedure specified in <xref section="11.2" sectionFormat="of" target="RFC6749"/>.</t>
        <ul spacing="normal">
          <li>Parameter name: ecdh_info</li>
          <li>Parameter usage location: client-rs request, rs-client response</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [[This document]]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Parameter name: kdc_dh_creds</li>
          <li>Parameter usage location: client-rs request, rs-client response</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [[This document]]</li>
        </ul>
      </section>
      <section anchor="iana-kinfo-map">
        <name>OAuth Parameters CBOR Mappings</name>
        <t>IANA is asked to register the following entries to the "OAuth Parameters CBOR Mappings" registry, as per the procedure specified in <xref section="8.10" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>.</t>
        <ul spacing="normal">
          <li>Name: ecdh_info</li>
          <li>CBOR Key: TBD (range -256 to 255)</li>
          <li>Value Type: Simple value "null" / Array</li>
          <li>Reference: [[This document]]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: kdc_dh_creds</li>
          <li>CBOR Key: TBD (range -256 to 255)</li>
          <li>Value Type: Simple value "null" / Array</li>
          <li>Reference: [[This document]]</li>
        </ul>
      </section>
      <section anchor="ssec-iana-ace-groupcomm-parameters-registry">
        <name>ACE Groupcomm Parameters</name>
        <t>IANA is asked to register the following entry to the "ACE Groupcomm Parameters" registry defined in <xref section="11.7" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>.</t>
        <ul spacing="normal">
          <li>Name: group_senderId</li>
          <li>CBOR Key: TBD</li>
          <li>CBOR Type: Byte string</li>
          <li>Reference: [[This document]] (<xref target="sec-new-key"/>)</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: ecdh_info</li>
          <li>CBOR Key: TBD</li>
          <li>CBOR Type: Array</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-req-processing"/>)</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: kdc_dh_creds</li>
          <li>CBOR Key: TBD</li>
          <li>CBOR Type: Array</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-req-processing"/>)</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: group_enc_key</li>
          <li>CBOR Key: TBD</li>
          <li>CBOR Type: Byte string</li>
          <li>Reference: [[This document]] (<xref target="verif-data-get"/>)</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: stale_node_ids</li>
          <li>CBOR Key: TBD</li>
          <li>CBOR Type: Array</li>
          <li>Reference: [[This document]] (<xref target="sec-group-rekeying-process"/>)</li>
        </ul>
      </section>
      <section anchor="ssec-iana-groupcomm-keys-registry">
        <name>ACE Groupcomm Key Types</name>
        <t>IANA is asked to register the following entry to the "ACE Groupcomm Key Types" registry defined in <xref section="11.8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>.</t>
        <ul spacing="normal">
          <li>Name: Group_OSCORE_Input_Material object</li>
          <li>Key Type Value: GROUPCOMM_KEY_TBD</li>
          <li>Profile: "coap_group_oscore_app", defined in <xref target="ssec-iana-groupcomm-profile-registry"/> of this document.</li>
          <li>Description: A Group_OSCORE_Input_Material object encoded as described in <xref target="ssec-join-resp"/> of this document.</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-resp"/>)</li>
        </ul>
      </section>
      <section anchor="ssec-iana-groupcomm-profile-registry">
        <name>ACE Groupcomm Profiles</name>
        <t>IANA is asked to register the following entry to the "ACE Groupcomm Profiles" registry defined in <xref section="11.9" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>.</t>
        <ul spacing="normal">
          <li>Name: coap_group_oscore_app</li>
          <li>Description: Application profile to provision keying material for participating in group communication protected with Group OSCORE as per <xref target="I-D.ietf-core-oscore-groupcomm"/>.</li>
          <li>CBOR Value: PROFILE_TBD</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-resp"/>)</li>
        </ul>
      </section>
      <section anchor="ssec-iana-security-context-parameter-registry">
        <name>OSCORE Security Context Parameters</name>
        <t>IANA is asked to register the following entries in the "OSCORE Security Context Parameters" registry defined in <xref section="9.4" sectionFormat="of" target="I-D.ietf-ace-oscore-profile"/>.</t>
        <ul spacing="normal">
          <li>Name: group_SenderId</li>
          <li>CBOR Label: TBD</li>
          <li>CBOR Type: Byte string</li>
          <li>Registry: -</li>
          <li>Description: OSCORE Sender ID assigned to a member of an OSCORE group</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-resp"/>)</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: cred_fmt</li>
          <li>CBOR Label: TBD</li>
          <li>CBOR Type: Integer</li>
          <li>Registry: COSE Header Parameters</li>
          <li>Description: Format of authentication credentials to be used in the OSCORE group</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-resp"/>)</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: sign_enc_alg</li>
          <li>CBOR Label: TBD</li>
          <li>CBOR Type: Text string / Integer</li>
          <li>Registry: COSE Algorithms</li>
          <li>Description: OSCORE Signature Encryption Algorithm Value</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-resp"/>)</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: sign_alg</li>
          <li>CBOR Label: TBD</li>
          <li>CBOR Type: Text string / Integer</li>
          <li>Registry: COSE Algorithms</li>
          <li>Description: OSCORE Signature Algorithm Value</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-resp"/>)</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: sign_params</li>
          <li>CBOR Label: TBD</li>
          <li>CBOR Type: Array</li>
          <li>Registry: COSE Algorithms, COSE Key Types, COSE Elliptic Curves</li>
          <li>Description: OSCORE Signature Algorithm Parameters</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-resp"/>)</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: ecdh_alg</li>
          <li>CBOR Label: TBD</li>
          <li>CBOR Type: Text string / Integer</li>
          <li>Registry: COSE Algorithms</li>
          <li>Description: OSCORE Pairwise Key Agreement Algorithm Value</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-resp"/>)</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: ecdh_params</li>
          <li>CBOR Label: TBD</li>
          <li>CBOR Type: Array</li>
          <li>Registry: COSE Algorithms, COSE Key Types, COSE Elliptic Curves</li>
          <li>Description: OSCORE Pairwise Key Agreement Algorithm Parameters</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-resp"/>)</li>
        </ul>
      </section>
      <section anchor="ssec-iana-tls-esporter-label-registry">
        <name>TLS Exporter Labels</name>
        <t>IANA is asked to register the following entry to the "TLS Exporter Labels" registry defined in <xref section="6" sectionFormat="of" target="RFC5705"/> and updated in <xref section="12" sectionFormat="of" target="RFC8447"/>.</t>
        <ul spacing="normal">
          <li>Value: EXPORTER-ACE-Sign-Challenge-coap-group-oscore-app</li>
          <li>DTLS-OK: Y</li>
          <li>Recommended: N</li>
          <li>Reference: [[This document]] (<xref target="sssec-challenge-value"/>)</li>
        </ul>
      </section>
      <section anchor="ssec-iana-AIF-registry">
        <name>AIF</name>
        <t>For the media-types application/aif+cbor and application/aif+json defined in <xref section="5.1" sectionFormat="of" target="I-D.ietf-ace-aif"/>, IANA is requested to register the following entries for the two media-type parameters Toid and Tperm, in the respective sub-registry defined in <xref section="5.2" sectionFormat="of" target="I-D.ietf-ace-aif"/> within the "MIME Media Type Sub-Parameter" registry group.</t>
        <ul spacing="normal">
          <li>Name: oscore-gname</li>
          <li>Description/Specification: OSCORE group name</li>
          <li>Reference: [[This document]]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: oscore-gperm</li>
          <li>Description/Specification: permissions pertaining OSCORE groups</li>
          <li>Reference: [[This document]]</li>
        </ul>
      </section>
      <section anchor="ssec-iana-coap-content-format-registry">
        <name>CoAP Content-Format</name>
        <t>IANA is asked to register the following entries to the "CoAP Content-Formats" registry within the "Constrained RESTful Environments (CoRE) Parameters" registry group.</t>
        <ul spacing="normal">
          <li>Media Type: application/aif+cbor;Toid="oscore-gname",Tperm="oscore-gperm"</li>
          <li>Encoding: -</li>
          <li>ID: TBD</li>
          <li>Reference: [[This document]]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Media Type: application/aif+json;Toid="oscore-gname",Tperm="oscore-gperm"</li>
          <li>Encoding: -</li>
          <li>ID: TBD</li>
          <li>Reference: [[This document]]</li>
        </ul>
      </section>
      <section anchor="ssec-iana-group-oscore-roles-registry">
        <name>Group OSCORE Roles</name>
        <t>This document establishes the IANA "Group OSCORE Roles" registry. The registry has been created to use the "Expert Review" registration procedure <xref target="RFC8126"/>. Expert review guidelines are provided in <xref target="ssec-iana-expert-review"/>.</t>
        <t>This registry includes the possible roles that nodes can take in an OSCORE group, each in combination with a numeric identifier. These numeric identifiers are used to express authorization information about joining OSCORE groups, as specified in <xref target="sec-format-scope"/> of [[This document]].</t>
        <t>The columns of this registry are:</t>
        <ul spacing="normal">
          <li>Name: A value that can be used in documents for easier comprehension, to identify a possible role that nodes can take in an OSCORE group.</li>
          <li>Value: The numeric identifier for this role. Integer values greater than 65535 are marked as "Private Use", all other values use the registration policy "Expert Review" <xref target="RFC8126"/>.</li>
          <li>Description: This field contains a brief description of the role.</li>
          <li>Reference: This contains a pointer to the public specification for the role.</li>
        </ul>
        <t>This registry will be initially populated by the values in <xref target="fig-role-values"/>.</t>
        <t>The Reference column for all of these entries will be [[This document]].</t>
      </section>
      <section anchor="iana-rt">
        <name>CoRE Resource Type</name>
        <t>IANA is asked to register the following entry in the "Resource Type (rt=) Link Target Attribute Values" registry within the "Constrained Restful Environments (CoRE) Parameters" registry group.</t>
        <ul spacing="normal">
          <li>Value: "core.osc.gm"</li>
          <li>Description: Group-membership resource of an OSCORE Group Manager.</li>
          <li>Reference: [[This document]]</li>
        </ul>
        <t>Client applications can use this resource type to discover a group membership resource at an OSCORE Group Manager, where to send a request for joining the corresponding OSCORE group.</t>
      </section>
      <section anchor="iana-scope-semantics">
        <name>ACE Scope Semantics</name>
        <t>IANA is asked to register the following entry in the "ACE Scope Semantics" registry defined in <xref section="11.12" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>.</t>
        <ul spacing="normal">
          <li>Value: SEM_ID_TBD</li>
          <li>Description: Membership and key management operations at the ACE Group Manager for Group OSCORE.</li>
          <li>Reference: [[This document]]</li>
        </ul>
      </section>
      <section anchor="iana-ace-groupcomm-errors">
        <name>ACE Groupcomm Errors</name>
        <t>IANA is asked to register the following entry in the "ACE Groupcomm Errors" registry defined in <xref section="11.13" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>.</t>
        <ul spacing="normal">
          <li>Value: 7</li>
          <li>Description: Signatures not used in the group.</li>
          <li>Reference: [[This document]]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Value: 8</li>
          <li>Description: Operation permitted only to signature verifiers.</li>
          <li>Reference: [[This document]]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Value: 9</li>
          <li>Description: Group currently not active.</li>
          <li>Reference: [[This document]]</li>
        </ul>
      </section>
      <section anchor="ssec-iana-expert-review">
        <name>Expert Review Instructions</name>
        <t>The IANA registry established in this document is defined as "Expert Review".  This section gives some general guidelines for what the experts should be looking for, but they are being designated as experts for a reason so they should be given substantial latitude.</t>
        <t>Expert reviewers should take into consideration the following points:</t>
        <ul spacing="normal">
          <li>
            <t>Clarity and correctness of registrations. Experts are expected to check the clarity of purpose and use of the requested entries. Experts should inspect the entry for the considered role, to verify the correctness of its description against the role as intended in the specification that defined it. Experts should consider requesting an opinion on the correctness of registered parameters from the Authentication and Authorization for Constrained Environments (ACE) Working Group and the Constrained RESTful Environments (CoRE) Working Group.  </t>
            <t>
Entries that do not meet these objective of clarity and completeness should not be registered.</t>
          </li>
          <li>Duplicated registration and point squatting should be discouraged. Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered and that the point is likely to be used in deployments.</li>
          <li>Experts should take into account the expected usage of roles when approving point assignment. Given a 'Value' V as code point, the length of the encoding of (2^(V+1) - 1) should be weighed against the usage of the entry, considering the resources and capabilities of devices it will be used on. Additionally, given a 'Value' V as code point, the length of the encoding of (2^(V+1) - 1) should be weighed against how many code points resulting in that encoding length are left, and the resources and capabilities of devices it will be used on.</li>
          <li>Specifications are recommended. When specifications are not provided, the description provided needs to have sufficient information to verify the points above.</li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5705" target="https://www.rfc-editor.org/info/rfc5705" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5705.xml">
          <front>
            <title>Keying Material Exporters for Transport Layer Security (TLS)</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <date year="2010" month="March"/>
            <abstract>
              <t>A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes.  This document describes a general mechanism for allowing that.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5705"/>
          <seriesInfo name="DOI" value="10.17487/RFC5705"/>
        </reference>
        <reference anchor="RFC6838" target="https://www.rfc-editor.org/info/rfc6838" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6838.xml">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author initials="N." surname="Freed" fullname="N. Freed">
              <organization/>
            </author>
            <author initials="J." surname="Klensin" fullname="J. Klensin">
              <organization/>
            </author>
            <author initials="T." surname="Hansen" fullname="T. Hansen">
              <organization/>
            </author>
            <date year="2013" month="January"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC6979" target="https://www.rfc-editor.org/info/rfc6979" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6979.xml">
          <front>
            <title>Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
            <author initials="T." surname="Pornin" fullname="T. Pornin">
              <organization/>
            </author>
            <date year="2013" month="August"/>
            <abstract>
              <t>This document defines a deterministic digital signature generation procedure.  Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed with unmodified verifiers, which need not be aware of the procedure described therein.  Deterministic signatures retain the cryptographic security features associated with digital signatures but can be more easily implemented in various environments, since they do not need access to a source of high-quality randomness.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6979"/>
          <seriesInfo name="DOI" value="10.17487/RFC6979"/>
        </reference>
        <reference anchor="RFC7252" target="https://www.rfc-editor.org/info/rfc7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author initials="Z." surname="Shelby" fullname="Z. Shelby">
              <organization/>
            </author>
            <author initials="K." surname="Hartke" fullname="K. Hartke">
              <organization/>
            </author>
            <author initials="C." surname="Bormann" fullname="C. Bormann">
              <organization/>
            </author>
            <date year="2014" month="June"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7748" target="https://www.rfc-editor.org/info/rfc7748" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7748.xml">
          <front>
            <title>Elliptic Curves for Security</title>
            <author initials="A." surname="Langley" fullname="A. Langley">
              <organization/>
            </author>
            <author initials="M." surname="Hamburg" fullname="M. Hamburg">
              <organization/>
            </author>
            <author initials="S." surname="Turner" fullname="S. Turner">
              <organization/>
            </author>
            <date year="2016" month="January"/>
            <abstract>
              <t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS).  These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7748"/>
          <seriesInfo name="DOI" value="10.17487/RFC7748"/>
        </reference>
        <reference anchor="RFC8017" target="https://www.rfc-editor.org/info/rfc8017" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8017.xml">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author initials="K." surname="Moriarty" fullname="K. Moriarty" role="editor">
              <organization/>
            </author>
            <author initials="B." surname="Kaliski" fullname="B. Kaliski">
              <organization/>
            </author>
            <author initials="J." surname="Jonsson" fullname="J. Jonsson">
              <organization/>
            </author>
            <author initials="A." surname="Rusch" fullname="A. Rusch">
              <organization/>
            </author>
            <date year="2016" month="November"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series.  By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="RFC8032" target="https://www.rfc-editor.org/info/rfc8032" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8032.xml">
          <front>
            <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
            <author initials="S." surname="Josefsson" fullname="S. Josefsson">
              <organization/>
            </author>
            <author initials="I." surname="Liusvaara" fullname="I. Liusvaara">
              <organization/>
            </author>
            <date year="2017" month="January"/>
            <abstract>
              <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8032"/>
          <seriesInfo name="DOI" value="10.17487/RFC8032"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author initials="M." surname="Cotton" fullname="M. Cotton">
              <organization/>
            </author>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization/>
            </author>
            <author initials="T." surname="Narten" fullname="T. Narten">
              <organization/>
            </author>
            <date year="2017" month="June"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8447" target="https://www.rfc-editor.org/info/rfc8447" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8447.xml">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author initials="J." surname="Salowey" fullname="J. Salowey">
              <organization/>
            </author>
            <author initials="S." surname="Turner" fullname="S. Turner">
              <organization/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy.  These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8610.xml">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author initials="H." surname="Birkholz" fullname="H. Birkholz">
              <organization/>
            </author>
            <author initials="C." surname="Vigano" fullname="C. Vigano">
              <organization/>
            </author>
            <author initials="C." surname="Bormann" fullname="C. Bormann">
              <organization/>
            </author>
            <date year="2019" month="June"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8613" target="https://www.rfc-editor.org/info/rfc8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author initials="G." surname="Selander" fullname="G. Selander">
              <organization/>
            </author>
            <author initials="J." surname="Mattsson" fullname="J. Mattsson">
              <organization/>
            </author>
            <author initials="F." surname="Palombini" fullname="F. Palombini">
              <organization/>
            </author>
            <author initials="L." surname="Seitz" fullname="L. Seitz">
              <organization/>
            </author>
            <date year="2019" month="July"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE).  OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration.  Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8742" target="https://www.rfc-editor.org/info/rfc8742" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8742.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author initials="C." surname="Bormann" fullname="C. Bormann">
              <organization/>
            </author>
            <date year="2020" month="February"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq".  A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation.  This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8949.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author initials="C." surname="Bormann" fullname="C. Bormann">
              <organization/>
            </author>
            <author initials="P." surname="Hoffman" fullname="P. Hoffman">
              <organization/>
            </author>
            <date year="2020" month="December"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="I-D.ietf-ace-aif" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ace-aif.xml" target="https://www.ietf.org/archive/id/draft-ietf-ace-aif-07.txt">
          <front>
            <title>An Authorization Information Format (AIF) for ACE</title>
            <author fullname="Carsten Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date month="March" day="15" year="2022"/>
            <abstract>
              <t>   Information about which entities are authorized to perform what
   operations on which constituents of other entities is a crucial
   component of producing an overall system that is secure.  Conveying
   precise authorization information is especially critical in highly
   automated systems with large numbers of entities, such as the
   "Internet of Things".

   This specification provides a generic information model and format
   for representing such authorization information, as well as two
   variants of a specific instantiation of that format for use with REST
   resources identified by URI path.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-aif-07"/>
        </reference>
        <reference anchor="I-D.ietf-cose-rfc8152bis-struct" target="https://www.ietf.org/archive/id/draft-ietf-cose-rfc8152bis-struct-15.txt">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="Jim Schaad">
              <organization>August Cellars</organization>
            </author>
            <date month="February" day="1" year="2021"/>
            <abstract>
              <t>   Concise Binary Object Representation (CBOR) is a data format designed
   for small code size and small message size.  There is a need for the
   ability to have basic security services defined for this data format.
   This document defines the CBOR Object Signing and Encryption (COSE)
   protocol.  This specification describes how to create and process
   signatures, message authentication codes, and encryption using CBOR
   for serialization.  This specification additionally describes how to
   represent cryptographic keys using CBOR.

   This document along with [I-D.ietf-cose-rfc8152bis-algs] obsoletes
   RFC8152.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-rfc8152bis-struct-15"/>
        </reference>
        <reference anchor="I-D.ietf-cose-rfc8152bis-algs" target="https://www.ietf.org/archive/id/draft-ietf-cose-rfc8152bis-algs-12.txt">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="Jim Schaad">
              <organization>August Cellars</organization>
            </author>
            <date month="September" day="24" year="2020"/>
            <abstract>
              <t>   Concise Binary Object Representation (CBOR) is a data format designed
   for small code size and small message size.  There is a need for the
   ability to have basic security services defined for this data format.
   THis document defines a set of algorithms that can be used with the
   CBOR Object Signing and Encryption (COSE) protocol RFC XXXX.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-rfc8152bis-algs-12"/>
        </reference>
        <reference anchor="I-D.ietf-core-oscore-groupcomm" target="https://www.ietf.org/archive/id/draft-ietf-core-oscore-groupcomm-14.txt">
          <front>
            <title>Group OSCORE - Secure Group Communication for CoAP</title>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Francesca Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuss Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Jiye Park">
              <organization>Universitaet Duisburg-Essen</organization>
            </author>
            <date month="March" day="7" year="2022"/>
            <abstract>
              <t>   This document defines Group Object Security for Constrained RESTful
   Environments (Group OSCORE), providing end-to-end security of CoAP
   messages exchanged between members of a group, e.g., sent over IP
   multicast.  In particular, the described approach defines how OSCORE
   is used in a group communication setting to provide source
   authentication for CoAP group requests, sent by a client to multiple
   servers, and for protection of the corresponding CoAP responses.
   Group OSCORE also defines a pairwise mode where each member of the
   group can efficiently derive a symmetric pairwise key with any other
   member of the group for pairwise OSCORE communication.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-groupcomm-14"/>
        </reference>
        <reference anchor="I-D.ietf-ace-key-groupcomm" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ace-key-groupcomm.xml" target="https://www.ietf.org/archive/id/draft-ietf-ace-key-groupcomm-15.txt">
          <front>
            <title>Key Provisioning for Group Communication using ACE</title>
            <author fullname="Francesca Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date month="December" day="23" year="2021"/>
            <abstract>
              <t>   This document defines how to use the Authentication and Authorization
   for Constrained Environments (ACE) framework to distribute keying
   material and configuration parameters for secure group communication.
   Candidate group members acting as Clients and authorized to join a
   group can do so by interacting with a Key Distribution Center (KDC)
   acting as Resource Server, from which they obtain the keying material
   to communicate with other group members.  While defining general
   message formats as well as the interface and operations available at
   the KDC, this document supports different approaches and protocols
   for secure group communication.  Therefore, details are delegated to
   separate application profiles of this document, as specialized
   instances that target a particular group communication approach and
   define how communications in the group are protected.  Compliance
   requirements for such application profiles are also specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-key-groupcomm-15"/>
        </reference>
        <reference anchor="I-D.ietf-ace-oauth-authz" target="https://www.ietf.org/archive/id/draft-ietf-ace-oauth-authz-46.txt">
          <front>
            <title>Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 Framework (ACE-OAuth)</title>
            <author fullname="Ludwig Seitz">
              <organization>Combitech</organization>
            </author>
            <author fullname="Goeran Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Erik Wahlstroem">
	 </author>
            <author fullname="Samuel Erdtman">
              <organization>Spotify AB</organization>
            </author>
            <author fullname="Hannes Tschofenig">
              <organization>Arm Ltd.</organization>
            </author>
            <date month="November" day="8" year="2021"/>
            <abstract>
              <t>   This specification defines a framework for authentication and
   authorization in Internet of Things (IoT) environments called ACE-
   OAuth.  The framework is based on a set of building blocks including
   OAuth 2.0 and the Constrained Application Protocol (CoAP), thus
   transforming a well-known and widely used authorization solution into
   a form suitable for IoT devices.  Existing specifications are used
   where possible, but extensions are added and profiles are defined to
   better serve the IoT use cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-oauth-authz-46"/>
        </reference>
        <reference anchor="I-D.ietf-ace-oscore-profile" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ace-oscore-profile.xml" target="https://www.ietf.org/archive/id/draft-ietf-ace-oscore-profile-19.txt">
          <front>
            <title>OSCORE Profile of the Authentication and Authorization for Constrained Environments Framework</title>
            <author fullname="Francesca Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Ludwig Seitz">
              <organization>Combitech</organization>
            </author>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Martin Gunnarsson">
              <organization>RISE</organization>
            </author>
            <date month="May" day="6" year="2021"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Object Security for Constrained RESTful Environments
   (OSCORE) to provide communication security and proof-of-possession
   for a key owned by the client and bound to an OAuth 2.0 access token.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-oscore-profile-19"/>
        </reference>
        <reference anchor="I-D.ietf-ace-dtls-authorize" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ace-dtls-authorize.xml" target="https://www.ietf.org/archive/id/draft-ietf-ace-dtls-authorize-18.txt">
          <front>
            <title>Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Stefanie Gerdes">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Olaf Bergmann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Carsten Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Ludwig Seitz">
              <organization>Combitech</organization>
            </author>
            <date month="June" day="4" year="2021"/>
            <abstract>
              <t>   This specification defines a profile of the ACE framework that allows
   constrained servers to delegate client authentication and
   authorization.  The protocol relies on DTLS version 1.2 for
   communication security between entities in a constrained network
   using either raw public keys or pre-shared keys.  A resource-
   constrained server can use this protocol to delegate management of
   authorization information to a trusted host with less severe
   limitations regarding processing power and memory.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-dtls-authorize-18"/>
        </reference>
        <reference anchor="NIST-800-56A" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf">
          <front>
            <title>Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography - NIST Special Publication 800-56A, Revision 3</title>
            <author initials="E." surname="Barker" fullname="Elaine Barker">
              <organization/>
            </author>
            <author initials="L." surname="Chen" fullname="Lily Chen">
              <organization/>
            </author>
            <author initials="A." surname="Roginsky" fullname="Allen Roginsky">
              <organization/>
            </author>
            <author initials="A." surname="Vassilev" fullname="Apostol Vassilev">
              <organization/>
            </author>
            <author initials="R." surname="Davis" fullname="Richard Davis">
              <organization/>
            </author>
            <date year="2018" month="April"/>
          </front>
        </reference>
        <reference anchor="COSE.Algorithms" target="https://www.iana.org/assignments/cose/cose.xhtml#algorithms">
          <front>
            <title>COSE Algorithms</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="COSE.Key.Types" target="https://www.iana.org/assignments/cose/cose.xhtml#key-type">
          <front>
            <title>COSE Key Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="COSE.Elliptic.Curves" target="https://www.iana.org/assignments/cose/cose.xhtml#elliptic-curves">
          <front>
            <title>COSE Elliptic Curves</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="COSE.Header.Parameters" target="https://www.iana.org/assignments/cose/cose.xhtml#header-parameters">
          <front>
            <title>COSE Header Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-core-groupcomm-bis" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-core-groupcomm-bis.xml" target="https://www.ietf.org/archive/id/draft-ietf-core-groupcomm-bis-06.txt">
          <front>
            <title>Group Communication for the Constrained Application Protocol (CoAP)</title>
            <author fullname="Esko Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <author fullname="Chonggang Wang">
              <organization>InterDigital</organization>
            </author>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date month="March" day="7" year="2022"/>
            <abstract>
              <t>   This document specifies the use of the Constrained Application
   Protocol (CoAP) for group communication, including the use of UDP/IP
   multicast as the default underlying data transport.  Both unsecured
   and secured CoAP group communication are specified.  Security is
   achieved by use of the Group Object Security for Constrained RESTful
   Environments (Group OSCORE) protocol.  The target application area of
   this specification is any group communication use cases that involve
   resource-constrained devices or networks that support CoAP.  This
   document replaces RFC 7390, while it updates RFC 7252 and RFC 7641.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-groupcomm-bis-06"/>
        </reference>
        <reference anchor="I-D.ietf-core-coap-pubsub" target="https://www.ietf.org/archive/id/draft-ietf-core-coap-pubsub-09.txt">
          <front>
            <title>Publish-Subscribe Broker for the Constrained Application Protocol (CoAP)</title>
            <author fullname="Michael Koster">
              <organization>SmartThings</organization>
            </author>
            <author fullname="Ari Keranen">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Jaime Jimenez">
              <organization>Ericsson</organization>
            </author>
            <date month="September" day="30" year="2019"/>
            <abstract>
              <t>   The Constrained Application Protocol (CoAP), and related extensions
   are intended to support machine-to-machine communication in systems
   where one or more nodes are resource constrained, in particular for
   low power wireless sensor networks.  This document defines a publish-
   subscribe Broker for CoAP that extends the capabilities of CoAP for
   supporting nodes with long breaks in connectivity and/or up-time.

   There is work in progress to resolve some of the transfer layer
   issues by using a more RESTful approach.

   Please see https://github.com/core-wg/pubsub/blob/master/proposal.txt

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-coap-pubsub-09"/>
        </reference>
        <reference anchor="I-D.tiloca-core-oscore-discovery" target="https://www.ietf.org/archive/id/draft-tiloca-core-oscore-discovery-11.txt">
          <front>
            <title>Discovery of OSCORE Groups with the CoRE Resource Directory</title>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Christian Amsuess">
	 </author>
            <author fullname="Peter van der Stok">
              <organization>Consultant</organization>
            </author>
            <date month="March" day="7" year="2022"/>
            <abstract>
              <t>   Group communication over the Constrained Application Protocol (CoAP)
   can be secured by means of Group Object Security for Constrained
   RESTful Environments (Group OSCORE).  At deployment time, devices may
   not know the exact security groups to join, the respective Group
   Manager, or other information required to perform the joining
   process.  This document describes how a CoAP endpoint can use
   descriptions and links of resources registered at the CoRE Resource
   Directory to discover security groups and to acquire information for
   joining them through the respective Group Manager.  A given security
   group may protect multiple application groups, which are separately
   announced in the Resource Directory as sets of endpoints sharing a
   pool of resources.  This approach is consistent with, but not limited
   to, the joining of security groups based on the ACE framework for
   Authentication and Authorization in constrained environments.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tiloca-core-oscore-discovery-11"/>
        </reference>
        <reference anchor="I-D.ietf-ace-oscore-gm-admin" target="https://www.ietf.org/archive/id/draft-ietf-ace-oscore-gm-admin-05.txt">
          <front>
            <title>Admin Interface for the OSCORE Group Manager</title>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Rikard Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Peter van der Stok">
              <organization>Consultant</organization>
            </author>
            <author fullname="Francesca Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date month="March" day="7" year="2022"/>
            <abstract>
              <t>   Group communication for CoAP can be secured using Group Object
   Security for Constrained RESTful Environments (Group OSCORE).  A
   Group Manager is responsible to handle the joining of new group
   members, as well as to manage and distribute the group keying
   material.  This document defines a RESTful admin interface at the
   Group Manager, that allows an Administrator entity to create and
   delete OSCORE groups, as well as to retrieve and update their
   configuration.  The ACE framework for Authentication and
   Authorization is used to enforce authentication and authorization of
   the Administrator at the Group Manager.  Protocol-specific transport
   profiles of ACE are used to achieve communication security, proof-of-
   possession and server authentication.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-oscore-gm-admin-05"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-cose-cbor-encoded-cert.xml" target="https://www.ietf.org/archive/id/draft-ietf-cose-cbor-encoded-cert-03.txt">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date month="January" day="10" year="2022"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50%.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 COSE headers, a C509 TLS certificate type, and a C509
   file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-03"/>
        </reference>
        <reference anchor="RFC5869" target="https://www.rfc-editor.org/info/rfc5869" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5869.xml">
          <front>
            <title>HMAC-based Extract-and-Expand Key Derivation Function (HKDF)</title>
            <author initials="H." surname="Krawczyk" fullname="H. Krawczyk">
              <organization/>
            </author>
            <author initials="P." surname="Eronen" fullname="P. Eronen">
              <organization/>
            </author>
            <date year="2010" month="May"/>
            <abstract>
              <t>This document specifies a simple Hashed Message Authentication Code (HMAC)-based key derivation function (HKDF), which can be used as a building block in various protocols and applications.  The key derivation function (KDF) is intended to support a wide range of applications and requirements, and is conservative in its use of cryptographic hash functions.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5869"/>
          <seriesInfo name="DOI" value="10.17487/RFC5869"/>
        </reference>
        <reference anchor="RFC6347" target="https://www.rfc-editor.org/info/rfc6347" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6347.xml">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <author initials="N." surname="Modadugu" fullname="N. Modadugu">
              <organization/>
            </author>
            <date year="2012" month="January"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.  This document updates DTLS 1.0 to work with TLS version 1.2.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC6690" target="https://www.rfc-editor.org/info/rfc6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author initials="Z." surname="Shelby" fullname="Z. Shelby">
              <organization/>
            </author>
            <date year="2012" month="August"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links.  Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type.  "RESTful" refers to the Representational State Transfer (REST) architecture.  A well-known URI is defined as a default entry point for requesting the links hosted by a server.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC6749" target="https://www.rfc-editor.org/info/rfc6749" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6749.xml">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author initials="D." surname="Hardt" fullname="D. Hardt" role="editor">
              <organization/>
            </author>
            <date year="2012" month="October"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.  This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7641" target="https://www.rfc-editor.org/info/rfc7641">
          <front>
            <title>Observing Resources in the Constrained Application Protocol (CoAP)</title>
            <author initials="K." surname="Hartke" fullname="K. Hartke">
              <organization/>
            </author>
            <date year="2015" month="September"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful application protocol for constrained nodes and networks.  The state of a resource on a CoAP server can change over time.  This document specifies a simple protocol extension for CoAP that enables CoAP clients to "observe" resources, i.e., to retrieve a representation of a resource and keep this representation updated by the server over a period of time.  The protocol follows a best-effort approach for sending new representations to clients and provides eventual consistency between the state observed by each client and the actual resource state at the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7641"/>
          <seriesInfo name="DOI" value="10.17487/RFC7641"/>
        </reference>
        <reference anchor="RFC7925" target="https://www.rfc-editor.org/info/rfc7925" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7925.xml">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author initials="H." surname="Tschofenig" fullname="H. Tschofenig" role="editor">
              <organization/>
            </author>
            <author initials="T." surname="Fossati" fullname="T. Fossati">
              <organization/>
            </author>
            <date year="2016" month="July"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery.  The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC8392" target="https://www.rfc-editor.org/info/rfc8392" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8392.xml">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author initials="M." surname="Jones" fullname="M. Jones">
              <organization/>
            </author>
            <author initials="E." surname="Wahlstroem" fullname="E. Wahlstroem">
              <organization/>
            </author>
            <author initials="S." surname="Erdtman" fullname="S. Erdtman">
              <organization/>
            </author>
            <author initials="H." surname="Tschofenig" fullname="H. Tschofenig">
              <organization/>
            </author>
            <date year="2018" month="May"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties.  The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection.  A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value.  CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
      </references>
    </references>
    <section anchor="profile-req">
      <name>Profile Requirements</name>
      <t>This section lists how this application profile of ACE addresses the requirements defined in Appendix A of <xref target="I-D.ietf-ace-key-groupcomm"/>.</t>
      <section anchor="mandatory-to-address-requirements">
        <name>Mandatory-to-Address Requirements</name>
        <ul spacing="normal">
          <li>REQ1 - Specify the format and encoding of 'scope'. This includes defining the set of possible roles and their identifiers, as well as the corresponding encoding to use in the scope entries according to the used scope format: see <xref target="sec-format-scope"/> and <xref target="ssec-auth-req"/>.</li>
          <li>REQ2 - If the AIF format of 'scope' is used, register its specific instance of "Toid" and "Tperm" as Media Type parameters and a corresponding Content-Format, as per the guidelines in <xref target="I-D.ietf-ace-aif"/>: see <xref target="ssec-iana-AIF-registry"/> and <xref target="ssec-iana-coap-content-format-registry"/>.</li>
          <li>REQ3 - if used, specify the acceptable values for 'sign_alg': values from the "Value" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</li>
          <li>REQ4 - If used, specify the acceptable values for 'sign_parameters': format and values from the COSE algorithm capabilities as specified in the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</li>
          <li>REQ5 - If used, specify the acceptable values for 'sign_key_parameters': format and values from the COSE key type capabilities as specified in the "COSE Key Types" registry <xref target="COSE.Key.Types"/>.</li>
          <li>REQ6 - Specify the acceptable formats for authentication credentials and, if used, the acceptable values for 'pub_key_enc': acceptable formats explicitly provide the public key as well as the comprehensive set of information related to the public key algorithm (see <xref target="ssec-token-post"/> and <xref target="ssec-join-resp"/>). Consistent acceptable values for 'pub_key_enc' are taken from the "Label" column of the "COSE Header Parameters" registry <xref target="COSE.Header.Parameters"/>.</li>
          <li>REQ7 - If the value of the GROUPNAME URI path and the group name in the Access Token scope (gname in <xref section="3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>) are not required to coincide, specify the mechanism to map the GROUPNAME value in the URI to the group name: not applicable, since a perfect matching is required.</li>
          <li>REQ8 - Define whether the KDC has an authentication credential and if this has to be provided through the 'kdc_cred' parameter, see <xref section="4.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>: yes, as required by the Group OSCORE protocol <xref target="I-D.ietf-core-oscore-groupcomm"/>, see <xref target="ssec-join-resp"/> of this document.</li>
          <li>REQ9 - Specify if any part of the KDC interface as defined in <xref section="4.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> is not supported by the KDC: not applicable.</li>
          <li>REQ10 - Register a Resource Type for the root url-path, which is used to discover the correct url to access at the KDC (see <xref section="4.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>): the Resource Type (rt=) Link Target Attribute value "core.osc.gm" is registered in <xref target="iana-rt"/>.</li>
          <li>REQ11 - Define what specific actions (e.g., CoAP methods) are allowed on each resource provided by the KDC interface, depending on whether the Client is a current group member; the roles that a Client is authorized to take as per the obtained access token; and the roles that the Client has as current group member: see <xref target="ssec-admitted-methods"/>.</li>
          <li>REQ12 - Categorize possible newly defined operations for Clients into primary operations expected to be minimally supported and secondary operations, and provide accompanying considerations: see <xref target="client-operations"/>.</li>
          <li>REQ13 - Specify the encoding of group identifier (see <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>): CBOR byte string (see <xref target="sec-retrieve-gnames"/>).</li>
          <li>REQ14 - Specify the approaches used to compute and verify the PoP evidence to include in 'client_cred_verify', and which of those approaches is used in which case: see <xref target="ssec-join-req-sending"/> and <xref target="ssec-join-req-processing"/>.</li>
          <li>REQ15 - Specify how the nonce N_S is generated, if the token is not provided to the KDC through the Token Transfer Request to the authz-info endpoint (e.g., if it is used directly to validate TLS instead): see <xref target="sssec-challenge-value"/>.</li>
          <li>REQ16 - Define the initial value of the 'num' parameter: the initial value MUST be set to 0 when creating the OSCORE group, e.g., as in <xref target="I-D.ietf-ace-oscore-gm-admin"/>.</li>
          <li>REQ17 - Specify the format of the 'key' parameter: see <xref target="ssec-join-resp"/>.</li>
          <li>REQ18 - Specify acceptable values of the 'gkty' parameter: Group_OSCORE_Input_Material object (see <xref target="ssec-join-resp"/>).</li>
          <li>REQ19 - Specify and register the application profile identifier: coap_group_oscore_app (see <xref target="ssec-iana-groupcomm-profile-registry"/>).</li>
          <li>REQ20 - If used, specify the format and content of 'group_policies' and its entries: see <xref target="ssec-join-resp"/>.</li>
          <li>REQ21 - Specify the approaches used to compute and verify the PoP evidence to include in 'kdc_cred_verify', and which of those approaches is used in which case: see <xref target="ssec-join-resp"/>, <xref target="ssec-join-resp-processing"/> and <xref target="sec-gm-pub-key"/>.</li>
          <li>REQ22 - Specify the communication protocol that the members of the group must use: CoAP <xref target="RFC7252"/>, also for group communication <xref target="I-D.ietf-core-groupcomm-bis"/>.</li>
          <li>REQ23 - Specify the security protocols that the group members must use to protect their communication: Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>.</li>
          <li>REQ24 - Specify how the communication is secured between the Client and KDC: by means of any transport profile of ACE <xref target="I-D.ietf-ace-oauth-authz"/> between Client and Group Manager that complies with the requirements in Appendix C of <xref target="I-D.ietf-ace-oauth-authz"/>.</li>
          <li>REQ25 - Specify the format of the identifiers of group members: the Sender ID used in the OSCORE group (see <xref target="ssec-join-resp"/> and <xref target="sec-pub-keys"/>).</li>
          <li>REQ26 - Specify policies at the KDC to handle member ids that are not included in 'get_pub_keys': see <xref target="sec-pub-keys"/>.</li>
          <li>REQ27 - Specify the format of newly-generated individual keying material for group members, or of the information to derive it, and corresponding CBOR label: see <xref target="sec-new-key"/>.</li>
          <li>REQ28 - Specify and register the identifier of newly defined semantics for binary scopes: see <xref target="iana-scope-semantics"/>.</li>
          <li>REQ29 - Categorize newly defined parameters according to the same criteria of <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>: see <xref target="ace-groupcomm-params"/>.</li>
          <li>REQ30 - Define whether Clients must, should or may support the conditional parameters defined in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, and under which circumstances: see <xref target="ace-groupcomm-params"/>.</li>
        </ul>
      </section>
      <section anchor="optional-to-address-requirements">
        <name>Optional-to-Address Requirements</name>
        <ul spacing="normal">
          <li>OPT1 (Optional) - If the textual format of 'scope' is used, specify CBOR values to use for abbreviating the role identifiers in the group: not applicable.</li>
          <li>
            <t>OPT2 (Optional) - Specify additional parameters used in the exchange of Token Transfer Request and Response:  </t>
            <ul spacing="normal">
              <li>'ecdh_info', to negotiate the ECDH algorithm, ECDH algorithm parameters, ECDH key parameters and exact format of authentication credentials used in the group, in case the joining node supports the pairwise mode of Group OSCORE (see <xref target="ssec-token-post"/>).</li>
              <li>'kdc_dh_creds', to ask for and retrieve the Group Manager's Diffie-Hellman authentication credentials, in case the joining node supports the pairwise mode of Group OSCORE and the Access Token authorizes to join parwise-only groups (see <xref target="ssec-token-post"/>).</li>
            </ul>
          </li>
          <li>OPT3 (Optional) - Specify the negotiation of parameter values for signature algorithm and signature keys, if 'sign_info' is not used: possible early discovery by using the approach based on the CoRE Resource Directory described in <xref target="I-D.tiloca-core-oscore-discovery"/>.</li>
          <li>OPT4 (Optional) - Specify possible or required payload formats for specific error cases: send a 4.00 (Bad Request) error response to a Joining Request (see <xref target="ssec-join-req-processing"/>).</li>
          <li>OPT5 (Optional) - Specify additional identifiers of error types, as values of the 'error' field in an error response from the KDC: see <xref target="iana-ace-groupcomm-errors"/>.</li>
          <li>OPT6 (Optional) - Specify the encoding of 'pub_keys_repos' if the default is not used: no.</li>
          <li>OPT7 (Optional) - Specify the functionalities implemented at the 'control_uri' resource hosted at the Client, including message exchange encoding and other details (see <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>): see <xref target="sec-leaving"/> for the eviction of a group member; see <xref target="sec-group-rekeying-process"/> for the group rekeying process.</li>
          <li>OPT8 (Optional) - Specify the behavior of the handler in case of failure to retrieve an authentication credential for the specific node: send a 4.00 (Bad Request) error response to a Joining Request (see <xref target="ssec-join-req-processing"/>).</li>
          <li>OPT9 (Optional) - Define a default group rekeying scheme, to refer to in case the 'rekeying_scheme' parameter is not included in the Joining Response (see <xref section="4.3.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>): the "Point-to-Point" rekeying scheme registered in <xref section="11.14" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, whose detailed use for this profile is defined in <xref target="sec-group-rekeying-process"/> of this document.</li>
          <li>OPT10 (Optional) - Specify the functionalities implemented at the 'control_group_uri' resource hosted at the Client, including message exchange encoding and other details (see <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>): see <xref target="sec-leaving"/> for the eviction of multiple group members.</li>
          <li>OPT11 (Optional) - Specify policies that instruct Clients to retain unsuccessfully decrypted messages and for how long, so that they can be decrypted after getting updated keying material: no.</li>
          <li>OPT12 (Optional) - Specify for the KDC to perform group rekeying (together or instead of renewing individual keying material) when receiving a Key Renewal Request: the Group Manager SHOULD NOT perform a group rekeying, unless already scheduled to occur shortly (see <xref target="sec-new-key"/>).</li>
          <li>OPT13 (Optional) - Specify how the identifier of a group members's authentication credential is included in requests sent to other group members: no.</li>
          <li>OPT14 (Optional) - Specify additional information to include in rekeying messages for the "Point-to-Point" group rekeying scheme (see <xref section="6.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>): see <xref target="sending-rekeying-msg"/>.</li>
          <li>OPT15 (Optional) - Specify if Clients must or should support any of the parameters defined as optional in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>: no.</li>
        </ul>
      </section>
    </section>
    <section anchor="sec-future-cose-algs">
      <name>Extensibility for Future COSE Algorithms</name>
      <t>As defined in <xref section="8.1" sectionFormat="of" target="I-D.ietf-cose-rfc8152bis-algs"/>, future algorithms can be registered in the "COSE Algorithms" registry <xref target="COSE.Algorithms"/> as specifying none or multiple COSE capabilities.</t>
      <t>To enable the seamless use of such future registered algorithms, this section defines a general, agile format for:</t>
      <ul spacing="normal">
        <li>Each 'ecdh_info_entry' of the 'ecdh_info' parameter in the Token Transfer Response (see <xref target="ssec-token-post"/> and <xref target="ecdh-info"/>);</li>
        <li>The 'sign_params' and 'ecdh_params' parameters within the 'key' parameter (see <xref target="ssec-join-resp"/>), as part of the response payloads used in <xref target="ssec-join-resp"/>, <xref target="ssec-updated-key-only"/>, <xref target="ssec-updated-and-individual-key"/> and <xref target="sec-group-rekeying-process"/>.</li>
      </ul>
      <t>Appendix B of <xref target="I-D.ietf-ace-key-groupcomm"/> describes the analogous general format for 'sign_info_entry' of the 'sign_info' parameter in the Token Transfer Response (see <xref target="ssec-token-post"/> of this document).</t>
      <t>If any of the currently registered COSE algorithms is considered, using this general format yields the same structure defined in this document for the items above, thus ensuring retro-compatibility.</t>
      <section anchor="sec-future-cose-algs-ecdh-info-entry">
        <name>Format of 'ecdh_info_entry'</name>
        <t>The format of each 'ecdh_info_entry' (see <xref target="ssec-token-post"/> and <xref target="ecdh-info"/>) is generalized as follows. Given N the number of elements of the 'ecdh_parameters' array, i.e., the number of COSE capabilities of the ECDH algorithm, then:</t>
        <ul spacing="normal">
          <li>'ecdh_key_parameters' is replaced by N elements 'ecdh_capab_i', each of which is a CBOR array.</li>
          <li>The i-th array following 'ecdh_parameters', i.e., 'ecdh_capab_i' (i = 0, ..., N-1), is the array of COSE capabilities for the algorithm capability specified in 'ecdh_parameters'[i].</li>
        </ul>
        <figure anchor="fig-ecdh-info-entry-general">
          <name>'ecdh_info_entry' with general format</name>
          <sourcecode type="CDDL"><![CDATA[
ecdh_info_entry =
[
  id : gname / [ + gname ],
  ecdh_alg : int / tstr,
  ecdh_parameters : [ alg_capab_1 : any,
                      alg_capab_2 : any,
                      ...,
                      alg_capab_N : any],
  ecdh_capab_1 : [ any ],
  ecdh_capab_2 : [ any ],
  ...,
  ecdh_capab_N : [ any ],
  cred_fmt = int / null
]

gname = tstr
]]></sourcecode>
        </figure>
      </section>
      <section anchor="sec-future-cose-algs-key">
        <name>Format of 'key'</name>
        <t>The format of 'key' (see <xref target="ssec-join-resp"/>) is generalized as follows.</t>
        <ul spacing="normal">
          <li>
            <t>The 'sign_params' array includes N+1 elements, whose exact structure and value depend on the value of the signature algorithm specified in 'sign_alg'.  </t>
            <ul spacing="normal">
              <li>The first element, i.e., 'sign_params'[0], is the array of the N COSE capabilities for the signature algorithm, as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/> (see <xref section="8.1" sectionFormat="of" target="I-D.ietf-cose-rfc8152bis-algs"/>).</li>
              <li>Each following element 'sign_params'[i], i.e., with index i &gt; 0, is the array of COSE capabilities for the algorithm capability specified in 'sign_params'[0][i-1].</li>
            </ul>
            <t>
For example, if 'sign_params'[0][0] specifies the key type as capability of the algorithm, then 'sign_params'[1] is the array of COSE capabilities for the COSE key type associated with the signature algorithm, as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="COSE.Key.Types"/> (see <xref section="8.2" sectionFormat="of" target="I-D.ietf-cose-rfc8152bis-algs"/>).</t>
          </li>
          <li>
            <t>The 'ecdh_params' array includes M+1 elements, whose exact structure and value depend on the value of the ECDH algorithm specified in 'ecdh_alg'.  </t>
            <ul spacing="normal">
              <li>The first element, i.e., 'ecdh_params'[0], is the array of the M COSE capabilities for the ECDH algorithm, as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/> (see <xref section="8.1" sectionFormat="of" target="I-D.ietf-cose-rfc8152bis-algs"/>).</li>
              <li>Each following element 'ecdh_params'[i], i.e., with index i &gt; 0, is the array of COSE capabilities for the algorithm capability specified in 'ecdh_params'[0][i-1].</li>
            </ul>
            <t>
For example, if 'ecdh_params'[0][0] specifies the key type as capability of the algorithm, then 'ecdh_params'[1] is the array of COSE capabilities for the COSE key type associated with the ECDH algorithm, as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="COSE.Key.Types"/> (see <xref section="8.2" sectionFormat="of" target="I-D.ietf-cose-rfc8152bis-algs"/>).</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-document-updates">
      <name>Document Updates</name>
      <t>RFC EDITOR: PLEASE REMOVE THIS SECTION.</t>
      <section anchor="sec-13-14">
        <name>Version -13 to -14</name>
        <ul spacing="normal">
          <li>Major reordering of the document sections.</li>
          <li>The HKDF Algorithm is specified by the HMAC Algorithm.</li>
          <li>Group communication does not necessarily use IP multicast.</li>
          <li>Generalized AIF data model, also for draft-ace-oscore-gm-admin.</li>
          <li>Clarifications and editorial improvements.</li>
        </ul>
      </section>
      <section anchor="sec-12-13">
        <name>Version -12 to -13</name>
        <ul spacing="normal">
          <li>Renamed parameters about authentication credentials.</li>
          <li>It is optional for the Group Manager to reassign Gids by tracking "Birth Gids".</li>
          <li>Distinction between authentication credentials and public keys.</li>
          <li>Updated IANA considerations related to AIF.</li>
          <li>Updated textual description of registered ACE Scope Semantics value.</li>
        </ul>
      </section>
      <section anchor="sec-11-12">
        <name>Version -11 to -12</name>
        <ul spacing="normal">
          <li>Clarified semantics of 'ecdh_info' and 'kdc_dh_creds'.</li>
          <li>Definition of /ace-group/GROUPNAME/kdc-pub-key moved to draft-ietf-ace-key-groupcomm.</li>
          <li>ace-group/ accessible also to non-members that are not Verifiers.</li>
          <li>Clarified what resources are accessible to Verifiers.</li>
          <li>Revised error handling for the newly defined resources.</li>
          <li>Revised use of CoAP error codes.</li>
          <li>Use of "Token Tranfer Request" and "Token Transfer Response".</li>
          <li>New parameter 'rekeying_scheme'.</li>
          <li>Categorization of new parameters and inherited conditional parameters.</li>
          <li>Clarifications on what to do in case of enhanced error responses.</li>
          <li>Changed UCCS to CCS.</li>
          <li>Authentication credentials of just joined Clients can be in rekeying messages.</li>
          <li>Revised names of new IANA registries.</li>
          <li>Clarified meaning of registered CoRE resource type.</li>
          <li>Alignment to new requirements from draft-ietf-ace-key-groupcomm.</li>
          <li>Fixes and editorial improvements.</li>
        </ul>
      </section>
      <section anchor="sec-10-11">
        <name>Version -10 to -11</name>
        <ul spacing="normal">
          <li>Removed redundancy of key type capabilities, from 'sign_info', 'ecdh_info' and 'key'.</li>
          <li>New resource to retrieve the Group Manager's authentication credential.</li>
          <li>New resource to retrieve material for Signature Verifiers.</li>
          <li>New parameter 'sign_enc_alg' related to the group mode.</li>
          <li>'cred_fmt' takes value from the COSE Header Parameters registry.</li>
          <li>Improved alignment of the Joining Response payload with the Group OSCORE Security Context parameters.</li>
          <li>Recycling Group IDs by tracking "Birth GIDs".</li>
          <li>Error handling in case of non available Sender IDs upon joining.</li>
          <li>Error handling in case EdDSA public keys with invalid Y coordinate when the pairwise mode of Group OSCORE is supported.</li>
          <li>Generalized proof-of-possession (PoP) for the joining node's private key; defined Diffie-Hellman based PoP for OSCORE groups using only the pairwise mode.</li>
          <li>Proof-of-possession of the Group Manager's private key in the Joining Response.</li>
          <li>Always use 'peer_identifiers' to convey Sender IDs as node identifiers.</li>
          <li>Stale Sender IDs provided when rekeying the group.</li>
          <li>New resource for late retrieval of stale Sender IDs.</li>
          <li>Added examples of message exchanges.</li>
          <li>Revised default values of group configuration parameters.</li>
          <li>Fixes to IANA registrations.</li>
          <li>General format of parameters related to COSE capabilities, supporting future registered COSE algorithms (new Appendix).</li>
        </ul>
      </section>
      <section anchor="sec-09-10">
        <name>Version -09 to -10</name>
        <ul spacing="normal">
          <li>Updated non-recycling policy of Sender IDs.</li>
          <li>Removed policies about Sender Sequence Number synchronization.</li>
          <li>'control_path' renamed to 'control_uri'.</li>
          <li>Format of 'get_pub_keys' aligned with draft-ietf-ace-key-groupcomm.</li>
          <li>Additional way to inform of group eviction.</li>
          <li>Registered semantics identifier for extended scope format.</li>
          <li>Extended error handling, with error type specified in some error responses.</li>
          <li>Renumbered requirements.</li>
        </ul>
      </section>
      <section anchor="sec-08-09">
        <name>Version -08 to -09</name>
        <ul spacing="normal">
          <li>The url-path "ace-group" is used.</li>
          <li>Added overview of admitted methods on the Group Manager resources.</li>
          <li>Added exchange of parameters relevant for the pairwise mode of Group OSCORE.</li>
          <li>The signed value for 'client_cred_verify' includes also the scope.</li>
          <li>Renamed the key material object as Group_OSCORE_Input_Material object.</li>
          <li>Replaced 'clientId' with 'group_SenderId'.</li>
          <li>Added message exchange for Group Names request-response.</li>
          <li>No reassignment of Sender ID and Gid in the same OSCORE group.</li>
          <li>Updates on group rekeying contextual with request of new Sender ID.</li>
          <li>Signature verifiers can also retrieve Group Names and URIs.</li>
          <li>Removed group policy about supporting Group OSCORE in pairwise mode.</li>
          <li>Registration of the resource type rt="core.osc.gm".</li>
          <li>Update list of requirements.</li>
          <li>Clarifications and editorial revision.</li>
        </ul>
      </section>
      <section anchor="sec-07-08">
        <name>Version -07 to -08</name>
        <ul spacing="normal">
          <li>AIF specific data model to express scope entries.</li>
          <li>A set of roles is checked as valid when processing the Joining Request.</li>
          <li>Updated format of 'get_pub_keys' in the Joining Request.</li>
          <li>Payload format and default values of group policies in the Joining Response.</li>
          <li>Updated payload format of the FETCH request to retrieve authentication credentials.</li>
          <li>Default values for group configuration parameters.</li>
          <li>IANA registrations to support the AIF specific data model.</li>
        </ul>
      </section>
      <section anchor="sec-06-07">
        <name>Version -06 to -07</name>
        <ul spacing="normal">
          <li>Alignments with draft-ietf-core-oscore-groupcomm.</li>
          <li>New format of 'sign_info', using the COSE capabilities.</li>
          <li>New format of Joining Response parameters, using the COSE capabilities.</li>
          <li>Considerations on group rekeying.</li>
          <li>Editorial revision.</li>
        </ul>
      </section>
      <section anchor="sec-05-06">
        <name>Version -05 to -06</name>
        <ul spacing="normal">
          <li>Added role of external signature verifier.</li>
          <li>Parameter 'rsnonce' renamed to 'kdcchallenge'.</li>
          <li>Parameter 'kdcchallenge' may be omitted in some cases.</li>
          <li>Clarified difference between group name and OSCORE Gid.</li>
          <li>Removed the role combination ["requester", "monitor"].</li>
          <li>Admit implicit scope and audience in the Authorization Request.</li>
          <li>New format for the 'sign_info' parameter.</li>
          <li>Scope not mandatory to include in the Joining Request.</li>
          <li>Group policy about supporting Group OSCORE in pairwise mode.</li>
          <li>Possible individual rekeying of a single requesting node combined with a group rekeying.</li>
          <li>Security considerations on reusage of signature challenges.</li>
          <li>Addressing optional requirement OPT12 from draft-ietf-ace-key-groupcomm</li>
          <li>Editorial improvements.</li>
        </ul>
      </section>
      <section anchor="sec-04-05">
        <name>Version -04 to -05</name>
        <ul spacing="normal">
          <li>Nonce N_S also in error responses to the Joining Requests.</li>
          <li>Supporting single Access Token for multiple groups/topics.</li>
          <li>Supporting legal requesters/responders using the 'peer_roles' parameter.</li>
          <li>Registered and used dedicated label for TLS Exporter.</li>
          <li>Added method for uploading a new authentication credential to the Group Manager.</li>
          <li>Added resource and method for retrieving the current group status.</li>
          <li>Fixed inconsistency in retrieving group keying material only.</li>
          <li>Clarified retrieval of keying material for monitor-only members.</li>
          <li>Clarification on incrementing version number when rekeying the group.</li>
          <li>Clarification on what is re-distributed with the group rekeying.</li>
          <li>Security considerations on the size of the nonces used for the signature challenge.</li>
          <li>Added CBOR values to abbreviate role identifiers in the group.</li>
        </ul>
      </section>
      <section anchor="sec-03-04">
        <name>Version -03 to -04</name>
        <ul spacing="normal">
          <li>New abstract.</li>
          <li>Moved general content to draft-ietf-ace-key-groupcomm</li>
          <li>Terminology: node name; node resource.</li>
          <li>Creation and pointing at node resource.</li>
          <li>Updated Group Manager API (REST methods and offered services).</li>
          <li>Size of challenges 'cnonce' and 'rsnonce'.</li>
          <li>Value of 'rsnonce' for reused or non-traditionally-posted tokens.</li>
          <li>Removed reference to RFC 7390.</li>
          <li>New requirements from draft-ietf-ace-key-groupcomm</li>
          <li>Editorial improvements.</li>
        </ul>
      </section>
      <section anchor="sec-02-03">
        <name>Version -02 to -03</name>
        <ul spacing="normal">
          <li>New sections, aligned with the interface of ace-key-groupcomm .</li>
          <li>Exchange of information on the signature algorithm and related parameters, during the Token POST (Section 4.1).</li>
          <li>Nonce 'rsnonce' from the Group Manager to the Client (Section 4.1).</li>
          <li>Client PoP signature in the Key Distribution Request upon joining (Section 4.2).</li>
          <li>Local actions on the Group Manager, upon a new node's joining (Section 4.2).</li>
          <li>Local actions on the Group Manager, upon a node's leaving (Section 12).</li>
          <li>IANA registration in ACE Groupcomm Parameters registry.</li>
          <li>More fulfilled profile requirements (Appendix A).</li>
        </ul>
      </section>
      <section anchor="sec-01-02">
        <name>Version -01 to -02</name>
        <ul spacing="normal">
          <li>Editorial fixes.</li>
          <li>Changed: "listener" to "responder"; "pure listener" to "monitor".</li>
          <li>Changed profile name to "coap_group_oscore_app", to reflect it is an application profile.</li>
          <li>Added the 'type' parameter for all requests to a Join Resource.</li>
          <li>Added parameters to indicate the encoding of authentication credentials.</li>
          <li>Challenge-response for proof-of-possession of signature keys (Section 4).</li>
          <li>Renamed 'key_info' parameter to 'sign_info'; updated its format; extended to include also parameters of the signature key (Section 4.1).</li>
          <li>Code 4.00 (Bad request), in responses to joining nodes providing an invalid authentication credential (Section 4.3).</li>
          <li>Clarifications on provisioning and checking of authentication credentials (Sections 4 and 6).</li>
          <li>Extended discussion on group rekeying and possible different approaches (Section 7).</li>
          <li>Extended security considerations: proof-of-possession of signature keys; collision of OSCORE Group Identifiers (Section 8).</li>
          <li>Registered three entries in the IANA registry "Sequence Number Synchronization Method" (Section 9).</li>
          <li>Registered one public key encoding in the "ACE Public Key Encoding" IANA registry (Section 9).</li>
        </ul>
      </section>
      <section anchor="sec-00-01">
        <name>Version -00 to -01</name>
        <ul spacing="normal">
          <li>Changed name of 'req_aud' to 'audience' in the Authorization Request (Section 3.1).</li>
          <li>Added negotiation of signature algorithm/parameters between Client and Group Manager (Section 4).</li>
          <li>Updated format of the Key Distribution Response as a whole (Section 4.3).</li>
          <li>Added parameter 'cs_params' in the 'key' parameter of the Key Distribution Response (Section 4.3).</li>
          <li>New IANA registrations in the "ACE Authorization Server Request Creation Hints" registry, "ACE Groupcomm Key" registry, "OSCORE Security Context Parameters" registry and "ACE Groupcomm Profile" registry (Section 9).</li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="sec-acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors sincerely thank Christian Amsuess, Santiago Aragon, Stefan Beck, Carsten Bormann, Martin Gunnarsson, Rikard Hoeglund, Watson Ladd, Daniel Migault, Jim Schaad, Ludwig Seitz, Goeran Selander and Peter van der Stok for their comments and feedback.</t>
      <t>The work on this document has been partly supported by VINNOVA and the Celtic-Next project CRITISEC; by the H2020 project SIFIS-Home (Grant agreement 952652); and by the EIT-Digital High Impact Initiative ACTIVE.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+y9+XLbVrY3+r+eAiVXXUkJqVjy7Jx0HUWSE5/Ew7Gcob8k
1wWRoIQ2SfAAoGV1kq/ua9zXu09y17gnbICgJDvp/qLqjmQSwx7WXvP6reFw
uFHn9TR7nHyTXSbP0nl6ls2yeZ1MijJ5cXL44tVx8lVZLBdVks+Tg8PjjfT0
tMze9b9+XIzm6QxeMC7TST3Ms3oyTEfZ8G12OTzDK0fFbDYsqlFRZsNpWmdV
vXErGcMfj5P923sPh7f3hrcfbIzgg7OivHycVPV4YyNflI+TulxW9f7t249u
72+kZZY+Tk6y0bLM68uNi6J8S09/jINIfoB/5vMzHtoGvBq+Hz9Ons7rrJxn
9fAIx7YB763qdD5+k06LObz+Mqs2NkbFGO58nCxh3A/hkkX+OIGfW8konSfL
KkvSskwvk+18kqTTKd6zk8BanKfVeXKeldkG3vBTXYwGSVWUdZlNKvjrcoZ/
/AJvTIYJfMl/6AXyL75o4xZ8z4O5pRc8phGMs0m6nNYVPEC+5jtk5OmyPi/K
xxvDDRxwPofPn+0mr/NpMUrpI96XZ2k5KtyPixKm++rpyXFy8CV9UME7sxqW
q0on/4CFq85SWKZkf5++HcF6AznksHT872IMTz05Hu7dv5vsP0pOYPhvz4vp
TL5dzmvcxpOLbJzN6bNslubTx8kMB7Jb00D+s8x3q8wd+n/tJi/T8q0z8P/K
LzP7GY36u3n+LiurvE6zOjla5tXpsjwbHleVvElncjI6X2b1P7P5aXo+Tx7c
diZiL+aJ3L23t//AH/pXWTlL55fu2P+RDy+z3QUM5j+X83w4Xma7Y2/4T3D4
02J2ms9zZw5PynQ+yqpRGnxLszku81FVFfNwH14XZXWezua6D3dW7sPd2/23
YaJDgunIkP4zk5HswmHd2JgXMP8aVvox3PfqyeH+3t4j+fPeg9v35M/7D+88
1D8fPdALHuzf29c/H9zVCx7e3ntg/ryjFzzc279v/nxwV/+8e/e+/dPcdn/v
tv3zjv754K552KO7NIanw6Ndw4TSfOJ9NiqqbFhORg/37u2f5tUQVnw5qjsv
SadnVXABMDLhZ4bBNd7ssb/GtwWe3SH+55/N7/jRi7KY5NOs8fW4nlZDPvr5
P+nr509PXg8f3r49vHf/4DHttHKGhH6G8lso9Xg3+RLoOCvNx0yqx9M0n2f+
d8Gt3+4mh+dCTfbGb/Pppft5cNPBbvKqOIM/314GNx5Mp9k8/LJ59/dpVcFK
vAvvXhRVXUzDr4P7X+0mR+m7vApufpWPztNy7HwnYvJVhhuWzUFA5XAyUey9
TPNy+EMOogBkIjCbOj2d5tU5iUVgNCAfq+S7CsXPUV6NyqzOkm+LsxTk1Pks
OSwvF3VxVqaL80vg+bhXyckiG+XpNHm5hAeN+EWyfwMYAIwIP+FT7wrKuzzQ
tDxDLnFe14vq8Wefzd9NF8vTancOnGH3rHj3Gf6Bn3wm73FeU32GA9g9ebkr
7yvv7C7GE3ju4YuT492DKYhgHHYVoyPiWU8Pnh84A5ukU2DjzvrhcxL7nOiI
Ly4udnNQLXbhiZ/h7p3NcTGrz/Ds0X9235/Xs+mt1H0OjRB2YPf15SK75gBR
uaHHXG98eMhreIyO7ng6zRd1Pto9XJbvrjtGfVjCD7veSDN52HCkD6MBf52l
46zcBSELpwJ0pWsOmR+X2Mddb9Dn9Ljhwj5uI59PXOHkM2WrbgLjbn49KtLF
EA/G8lS/ZGXEY+ljOMMFKBmXbYz5bDZMx7N83pQao9OiHGZzFMzj4SgraxWa
D++reLx/x0i0+/cfqUS7/+CukZ/37+7pn4/2VdY+vPMI5NzGcDhM0lMQWukI
tNnX53mVgPq9JE4EyiKw7yoBhSFdLAxfETGSFJOkPs9IWZ7gcqICTdztAPYa
7tfrQT2mj1C60CcD1D7L7H+WoLjTt/BE4VBA/sj1YDtAfwB+BhYBbUGCewBq
kjyyGmVz4IYF6LHnKTyjzJLTtMrGCXx3WBy8pKfipxVq9/D5BRx5VuWTF6f/
yEa10ftpxIfAx2AJYLbj5NXxyevJcpocz9/lZcF0lGzLvWSu7IBKjAsVW5Rx
Ns3O0CShtUmbK5G6K4FreDjN8RUDnso/ihyvU8OIJ1+fw6+z8yQFVl4Vy3KU
wfDh0JUJ7BquV1rJ5Ni8KmlS9Dx6QMd4QcplJdxS4Seg7xXTYYU8fgJcAlZk
Xi3AftCrKxwv7jfsXzo6z+HecGNkVcFekQE2VwAeVkyG8D+QtlVWVSoUU9z9
pLjATTi9pPXjtaG7TkH9HNOLYXGQnJL93dvJwQj0zgrU27fZfJepeZaPx9MM
LTOw1cpiDNoYvuHXWzC2Ye589PvGxtVoQagg+fVXUR1//z3B5U2ApZwXY56M
XWswUS9hJXB9s5HuOs3OedOBszcvZSeSbaRleQ9qwb//PgD7ETf88MsXrwwl
A7cjIoD1OZ6PUDvAp2wj/8SbV6iqv//ecQmqqjA7fDScOBD68B7QZIZ1AVxp
bLab6BjP3SK9nBbpmG4oaBwVbMsBMBUwD8r8FGYK9O29MKL64jzdA4eru8Tj
Ddsvy8ivi/GG8OEeC8cnX5yDpka2eDZbTAugVdyw7H0K/8oGydOXyQxMZHgc
cid48RwkxpTYEgiq1J4KOVVlBkRaIedJ/UOob6Jr4I55lZ/CicOXzfAK3jP/
pJuFFgbCn86y2SnIKpx+9h60zPlZxvMHPbGiwxvjc/RcHGQWMAec+mnWHBTO
GpaAXwoMaVSA5Z7PDTdD3oSDhi2gUwebPs8u/DEOaAowZTgq6GvRMeH9IAdr
oIGl4QRlBvcDl4cH8UMC9r8bSqS8Sxg5G98wl+y+53WVTSfJ6TKfjmnXribD
wrc55tfvv+8mz3hjzHbBuGcFzAxfBsoHPDdfpMhMgMAuQJPC37KZCasjlfJK
XGpclEkxnRYXMAvg6sKiG6cpMm+ajRGwyido5fEf6wpcXMaszK58PGFLb91K
XmclqDvFtDi7RMaMnLm2H/2O256RNECnW5VsPvvu5PXmgH8nz1/Q36+O//u7
p6+Oj/Dvk68Pvv3W/KFXnHz94rtvj+xf9s7DF8+eHT8/4pvh0yT46NnB3zeZ
kjdfvHz99MXzg283cWlqjxpRwYApw1HK0Su4QDttjDvpMbsvD18me3eZiaPb
A/mtuCdgd2A15/ymYg42L/8TqOQSqTxLS3wCOglH6SKvQUMe4POrc5CS5CqE
5XxFKm1Fo8neA2HUvBMwrEk6y6c5PASPICh7nxAzwJVm6hoV81G2qIMBxw/E
SlWm60AwU5BHe3c9Ve0b/n5CfyXbB0+f7ISPS/MJPIYYIKwzMB//5bl9zK6Z
pFIYsXcYeo18WkYxQs4H64YbVoIqg0QLHBRJmdVeGq9VNGjPUKnG0/10Lod4
OU3LAVNFPh9Nl7COqrNsH+4MGura9quTnUGEmejXByc7u63bhJImlc3FKazg
F2vwiMENM4n2OQSkRmoMH4dHuLR0Kdl9N6G29B8GMitHy6JLYzNk/ZAu7lQy
dpPv5lMSkbBR5QU6evL5GJ+Sjel405CSTdChFiBU603DQom5MqvHJQdpJURI
VJmz+ZTmM6RbtNDmBRkApRAa8IYlCDngEZ/VqBPTTD4jrRfpocab6BCeMBl+
Rgd0iMdHv3p1IoqNtQMLeC68iGIXrLjCEtgBofC1U3HUns2DOR+8Syv0aLhy
CFllFG13s2u7hD5VgQ5IXbVPow6pwSTyyVXU8Vb92hNiq5XS1XSPw4c1yip2
kwFDF7YAzJc8iaGGmLJmJYsUamQp6HW10Y4qEb3ey6tWM1fUv6eB1GLy8xVC
sCJJEwnY1a4OOlCGRiUGAGqYoJmAjNNhw/BNVcAiGA0wVVoYyKLkpA8B1fHH
W2CCkluRBD/tsPHSNB5GepS5ejc5Zu2ddNK0bbS8VsRzfshO2WgEc+7wh9fV
DnOeH14D+4bTVcEKoKV3eHhSqZ135xHZXz/u3rv9KEFXDNrIpBsz53i0f08Z
WOSKFW4dYlYH4zGdJyScQaBrzNK3GbEINR4tj3BEHR2hV+xZycrHopTTojRc
CqhGwqGtjCfGnp6C+ZaxO+SV7EvgVyChjnu8osxGWf4ui7xlUhazrvckB3Ie
0P83S/F0LOBAnaajtwP0D+DgSVLpsbESUQRkqQshHOkcVSdcTOdLvYem9Qxk
X12snhRsDHCmSX5Ghy6tnIHi/s/Rp0LDRYUDB+w4vIiaJzVdgEvD3NtfG2HA
wH/kwZVOicUGBifmtbhYNllw9DKraZboL0hJ2YG7UUOACQsDyt5jdBskvLyu
YZuiogvzJB2E7mY/TWUeCUtmdliNH6P68XO2qyyDsZ4wL6+SO7t79OyHu/fw
9lVz2AHKmBv1Dx5eNeZjJRa505ozYTMSND6YKu/1ILkEFpbXZByDIl+Scyvi
w3PZidAr8N4S98M31om+G7zW34EhKf2SdRAlNdjbik0Dxx0AbCNYxeRhv6XD
t2PwCVWSdV++kPui73/U9/23rHvrBezXuzy7EN+ccUAW8jnYgV91KWF4nk+z
bC4ek+gZCBQz1irY//FhfMNkn7Wo3m2nEljdPKvJ1Jrj2iLVVo0tOb1kO1N8
vkYOulqDT2vJC1Cf4PuzHPlOcA5ZEUAHDr0TF4VXZHppvUzmLNPbmFt7ZN5w
0ahiXSVgpCKbQJm1wkWBm9JpPqJjIStRtwB2P18a5uwdzUFgE+JTUZXw3U7C
dGCXlMx0m5SU9z1SbnElZQ0zkpclN7s/Iv0v2ERYrh9wJctsAjfh7sDUulfH
2O20TXAAz0noF3HeBsrVbrY78Px1eOMAR2Zd6kbX9hVBuQZjmUfuqh1mSHjJ
9jdHaNXaoEMjIGGeG7VvY1pcdAAHJ6gO8Yxl40XPrLNFw5lsJQnt+d1dkCgg
U1bsIt5blCizUd85rVMOvPg0hAxAlzHmq62JEMxeuAEXNcwjxkpEQo6B4aDR
jtYbTxJ11cmypCMXMBTkljKqIa4RuuMPTsxBin391TP4muSVc1hxkdG35BsU
p8CKMqHvfP6umL7LxtZ/Qi44yz3hEYE3pONpTjinufUaibrpQFQs3JRS7CIS
oAJ7idQ760iDPR1Yp9FsRuKQji8eeow6DkepquUNO6sxcuWIOQbcMIBs1UgY
E7qCh2/n6N2D63DvqqblPHIEkuMKryxvYVMfnnAh2qrj0urJbEjSTOAKdguN
bUzO3zXUGEk/hW/g2Jzlc/IP6c3ei5XB3u1xODmACazo6HAQEakSy+O3tBL3
J2j9pmJVsU4L1ld8UA9Xc/3U2GeeaVp6TwxcxEhoy9ksZVWV3ojPtmoJPUmd
Vf2H+2it4QKxwnrmpLiignyFUdMjKDWFB/skFzv111+FtIdgxsA+TEFwCLNW
QcicoJDXtIRv4DgPbBRfTbS8zFjLcgZ7sFig7fce1KaVYR/SOMWxDBefjIpF
Jvoms+dhhR+BqvklRoSIQbvrfGc1rYqpXskdmjVBfp33ICtdOUA2v0gBerEx
3ugZshyoVBX8CUx04H3HSvk1HekNF/ZFQykhPTGbYxpnAs8hpX+6sfG/7Q86
h+Cb4Vd81X+8LnIY62uQ17O/JV8kP32S/OR89Msv3r0b+Px36XRpHBrklzm9
rFHIkyyklcGjT+vE3pLKXspJ1D/Da3523/PzLz//okGqDGRD+G2STTn9PLCu
i3lm3lSX6El5wsJ3Btp66I1x9xg1aFwgI60oSkzLRcvDOsPwq1cvvnuJQSZJ
9PD2lIQqeVeLBrW4wwIB3BS4vjfovMC4JoU8cPb+lJi3F2zlWHaQbG/iGm3u
GPU1ndLJJxWPVjuvs5lM8TKXQCbmPXo+mwqVNVSkREMlJhAZAO5EzpIYHYfw
dvyk6/XLOVr5GTsgUO4QwTL9vBqEA7PPr3SxjfKBCjT7uM7Td5lnEVXWSY/C
jtcEBv2sKDNPqw/XnDhaVmkwr2rlrAN06doFsUEj8kwRh/LHbjyrZTHlUdfp
Wxp107Dos7mynDWIbTlmjcVj5Zb2VoXwunt4pU3DGW5XOx0bplN3XEmvjv97
b4e1bXkuO+dmi6XEYnmXKvZlD5NjPBT4Kn1QMA927YFiWPO4C1H8lFeQPQV7
iWzRWeMfrbtn83scyCbcM13OTK7PphdreIW7uSmWeSkZKOykbGc0wgBYHIPW
OMRpDGnaLJJpgq8tzTwXU7lqmRWaI9PMbggqeCkVvdQXhZ7fRXHBxjaxk9jU
3+wN4D/7g2R3dxf/ej6wphHvhG4xkXuVw7ED6pCFOQU9oiTnLqwwPFSVBa6N
sSPgee76EujTof35NPjd/+fTjd+S50jv9PNbQhsIv4/IzORsqj4/v218+oX9
+TT43f8HxwN2NdonYxzPbRkXOVp4tzinSK5oH89vN7Y+JqgA49iT8ZxkFCSm
L6rP1dVv3PHVhx2Petx/S/b98cjb3QHxECP7dWPjkdABjeOOjOdV8P7PJTJQ
uev2mV2um1ofeE7yvbrCYRx3la7ZYe8568mIwhgrEJJxS9z4+rhn9tfHya2A
e3HG9xebz5vcxYi+psjbBBWQnKZDUBfO5l9sjshLtSnpQ1Y8Hx4dfWtiwLfB
RJkXzGZshrMnla3vm9TsiA7n6nikqHFSCj+Jma/H73kKIiIKygZo4eER/brx
8i88tVv9ySixB4n+i7RwfAL+370E7q5B5iTJ5zJE/NC9CO+Ei5ZAGckusGc4
N7Tc6rimueiTm9/Arf/XtqT5O5HIvYH5zIQO9/UzE3e7o598byJTVKGyo++j
bXrD2wQmRvvcA2vjyZIIPrBIaaOZBkiNj+wZaebqQYfdXakJiFrRKe99k57S
37B6YdhczaHeEndwPC/qzCpMLBpuo3DA2Ff6Ls2nGBhRnxNoQ5EBw5eiiZkE
VmcFyCEmOpQ4w8j5LRRvKmT9VXP1VBtzW+DbutThc8kmmGaYe4t8ijYLCBHI
kLJMWMkE1eAivWSVGV51W4MQnB4KQ5vmI7hhkhk21+MgoxZJ3rJB1Hoa9BuZ
DsmMAnNAdLGrUJvGVSEfAcVczIp2MRGjaA8CYytVfY7X+4L4DJ343HWfiRdP
bOxpjgElyugy5s7TOdB6OiZ9EKNB4hOhu/BxK9Zx0Ajl+EUuQMmuVjsxvhnP
zOUkXLweyT9F0SqFEkzvaBWw95dSkdFxjxc7rkc5FEFEDGxn9rG7L+u5t0he
HuHtkXcpyI45dALEtzS0Sakq6Diq0BPtOucrEFcnHEIJIs2oApuUhopNITg+
rv0joYWafdWN7B/Ow67IvQybOctS0ayTcX6G6aSOLoDhvPHYxgj1xdsm6Ql3
F6gOdkIikWfoYB9qWpbo+HofDcaEjMMMQuD/OequxmpKq8vZDMPulNBDo0Q1
STIqQJPLF5xWmc/9QPQOHf6szCbkp/Fj8LMl7OgpPF24oAns0+mmcOZW1R7h
5+GliWayg5FSVCipKIfJRo8kE6IKtlEKI8DqKWY4ex2bJHlQXQRQSYERytGy
6p3F0ZXC1Ryqsr/VeQyRRH5x/leitnQ8A5bBX/t8YlJeMF1kN/kOpGZbMA0l
gRuu5EDgsvIymmUwlBSJIZL2fRPbNcy8CBxn6PJrZFNNYBMTjOhUFBIvRqNl
ySIvtcHyaIDeuEbCiZwVYcSWVyp7L+bwlATBjLUgjeDmtQpycz8ZDm6alpMt
pXl+OPRm+FcfJS71G1jOgfFXLCubb0M+NTdaP79MRufZ6G2YvGzZfidtDlSy
GZOlTI4Pj75OTB2vOBvglUXFORAr0gbNnSYO6SYSwjJSOK+xgFWdT6f2PKRd
6yW7vDUiifUGv9myw9JJ/5c8XrRkzaipNHyL8ZShZLn9/vtO7NRzIhiqGGdz
YBIiG82bBm55CUdUeBOcJdoazTHJdotWwx3xG+ZqWy2pAum0BCUBCHekFNW1
jzpnb0kl5p3CcKo6rC5aSdHPDv4OpFWQllPULkGnZxjLvypZu4x9ms/yWnxl
/8xaNm63eejJauh/vmTAEzzzqAObkGtzx4mMTaVWBz+WxY0tLSo8JpEP9axx
PqHIT+3xM9yCyK6ZI7ByXjGKNdkclDkDsmE+Eg5RqYkQHgGbO8EZDrRFGnMH
ZQ6/HJhMHByXknvHikcYg88vm6k1cf4eT2Ygc2vuajWxNATMTsKSFsV/IMUf
0yqCZAYdrVa3YInQRRFKKfYA7+0mP5CBpg9VxWzVk2O7xWkxrp7mzT38oEuX
MkkUwvlt3DOaZmoTxLM+q5hWHhc/AK1qIKUQ7TSg7L/tmbxamHiBYsXQyUph
ZCSRQ2UOx22buaTbJxHGF9RvGlJfReScljHPrkbv0eOPRtAFVb6p26HHCtu8
fol40edlhrZImbES/C6d5mMTcvKVw1rz7dokAGXL1DciAcw2dHP1vq/4t+Pq
H0+7+deWFUBB+6wadCwla839OCOZ3tm0WpGWvpKvmSOY+hU3JStSfwjLW6ns
eUfPIW1ntN0r0sWDYmzgw5C5Ed9rEbtmTjHWoWUknaz/T3481lOlkg+gSPkk
t0TvhGwCWyUh3IHMDk6oP0AVWZO8hM2p81mMgNUB+4cxWOOqtCljsGL/RXAz
MiH2VUYSi8W9rhluFjvByZNbmdEpuBBFeZbONbvHJmc8wcUb6Pgp+Z/TCSWl
2fm0WpALmVPAucqgSXJcJ1FZksSKV9e0O83cGiJ1zoQ53kt2QSZn+TvQQAIL
mP0ONnXcA6ORgy5Dp2JcpNjaGXsVHzzlDE9UvTMquPv0uOIiSefqybLHOA3V
doxzzCVxt8ALa8xTbJ69Jml7QadoevEaFMFpUw78gaasIpmgd9eN1RX8Ti+E
15nGylATPsnrYRHQCUNnHDKOX6se7bwKUrvWzBI1pOgkjul8OfuXD/YWxSbc
E8/J4hgCeOxk+XRnT2q+ZOpkSw4kKiSKBglVgRXBZ6xIXAyilmEGbTOp1ITR
/MoyPmqPVfTzZJysMwpaUGmskwDoZKzt+ndqgpzxNUu+QGWi8vIcCY9FU9Ok
4jLIHVsx4YE1iyWuiuKQwI5zm8ZEK+CPzifZj5Acpoly0RMhxbP+kQAmGz8T
Qalt56HoU0nVcShMMcLBCdOqKG58SmB3cxjnm3zuHJXd5EXNFcUY6lL2Bfc7
UW78ZJpPMmRnlHjuMFZOjC+WxjPNccJobUHryMLz69SLSfaWKqAKieKydtZt
nfpRykwO47cxDSvKvmzIM3WUa9jpAvNWJBdaydQNTWuhj3Ae5tJWjanPw9xU
9Qc03AVUZ4vc3ZO3bjanxyAMdp0XfXdYQlgL4msMYeZ2PlEaMCk9XLTCZrIX
fI7S8YPexSq68yPEEDBpB87mDhxp6qy9YeAV7hkm4HO20oO7CEaiG2GuiqTT
nhw/e/P06M3rL48G/iQor4SGBbrgLEV9s4rkkhCD2H+oyIaaB+3sapNiGqOm
cAPlmZqkXqmxlig9KhpALC5MxMBJLtHTZgZqpsIL3FI70sKdY4cWoafokL0W
HYtEpSJQWR2NWZ+pgoUn+bcZ3QDPROMrYZGtitHuStVot1kJlNYtWeeGF7UM
Eb1kqYMsweqecTno06y1LpE9OjnKqQZMhRzeOw8ToiWLT2d7mqFGsf3i5ev9
HVVYtrLR+PwNbvyWvyr4OeHPRHZs4JK4JbccoT7k0835cjrdTLZvv5/c33Fx
RT0oklPk6PiA0HfR/MxbCPM1GphuXFEsVa++pxt6xHWBSLVBmOlu6tmbhonV
T0o4ge8wOSVvjVQuF1hxyCfKL9oPU4p6IUbw/r0dj97ADuKUqmALz2bDD7OH
ePkRiMM8G36dTaezrqCryWKIWzBXW3LJB+NskcmKgIKDAZaGw3a8T7Fh/sHb
ezAl2I+aUhEizgtGXzGYGCQg7OkCjURhXNK5ZUdIMcA/EZD9zLNmhP/gKgFn
kXobCkInz9+ccNGZ1uBEVuqJ7Ojzn+FiIiDNlXBA/EzKY/JwSFbRFNEXgTWO
Qamid0Wittqeg2bIA3I9Buh24/1wPE+Y3yMOnUWZv4Nx4yaLO0mfbgiwh5NG
Iw+ty4f8HLSBYpbXtRuZaxFDRgFS5SSiljhqnUH7IDtlU3JSNtEeD75SsBX/
O4xLsj44okYQKDqMHUip0giEbbRro8lJbMIzg8FCE4kRM4WVmZZmolHxaN+u
qot9MCcSb9Gqf5Js5eOtRBEmuRgSt90LniQGb3rRRFGp9EH0ApAoW6Tkas3G
qgqhAOfeSRf+9dcAS18Orr7KSqYtp/yKTH7M363cmkIeCwfwJKFTdTl8/yhd
pKf5lGv9ucRSWagVkbZMDvbAzjYo1DZ6vHujTNV5y/XWgRTXuzvecsAB/EhL
Qt+T8/lyYW6i/EUS95GcozWXzjy7/8qZRgTNhTOtDmTd7pl1A/lEywZqfBvR
fpuCXhd/ZQOkv/nqRlsAGcJ9MDkONeKBmUy0Zg4YS6Ast6ZEoomxqCnR06ij
c/RUpn30M15tOvxO4rYGnIjnO5EyP6kKPUZlBs+lyrYIEl6Q+uY+yWqiJuUB
1I3dM0FwISrSRgsJNVpItjkZkQ0hmK4KjeSANRt1a1zAg1n4uJg0ApRjF0vR
Q/91gfMSMffNVFBdQfe+qX9QY4eKQNiRcVEsp2O6yi6FLZMgbYG395L2VwmT
9rvMKYvZKMFgXrzLdBd+/ik5IG81rg7PCtZiYNlF47CAqB9d1JKA93Y0Ao6F
y82hh4Wg3Ml5UoJSbyKoSE6TtCkc3GE2Pi9Gu8nPvzQGFK5u96BG9041KfDe
6MpDiu+aDo+0XjmeuRP65FR30RVs8NmyUYFcY2tWEZjC5OkYJqxm1zIkpREk
fP7JvDWqjM/cmRryMpAJmGykcBRfroajiMR+LHciLaWhnShcGevFXBhPcKga
cmeydmG+nHnBlDiaaUPmwqEask2VL9dUt8DGxniNuxliIW1B3fa9tvbZjlLX
8mRV7EztkFmtNhfCbuKXRIE0hWNOmp1ZYDMEXWDfqSm1ZKWIeoNNj59XvjMe
XtJ8muqddSHGlRQlIZsxaXbfHB2SIl9ofulVFgbPB6WNXnHH1MTUQusWGzmv
opHS0kkLCZRgJiPfY9B7XAwtPjc2wvqWOyt8EQXdSSTzKbXpw/cHf2Ok6rpK
JFaBYyQj7aoLFjt6SFs3MJ+O4+QfGntEeh6d0IUYDNA7RGYMA3E0wN847JJA
nEm/RgnsJ/5f2ffa4v9g2aDBePIEBU6Q1HpRxBVCvgrTWMS9nL3kdmddY5dk
bowdVHYgRPk+gBgtfGPoSAhZWk4dBw5wHBgt95GhxVuAnoucMdKjpaubFS0V
Fy/hv5NGIEe9pNN8/laVXydbiKtdpVzoPF8YEPNo6R75k+9wCPOWtz5GaUl+
vWVFAbvwW9gq1+5IZ4dmao3bmyoEF3ZB+zqw7RxcdUVGtwDrIXjqvd2927t7
uw3K9EAwd7TK1Q43tZGT4PWvTrxmMU1nOMw/8Hs7Vo31l3eZBF5SXSXFmNQx
5mx6SZo0ZaFipR+SWuARrTLsa1ixMc5+dBv3Eex30gQpQdgJ+6gpw/VcbVEh
Bc1y91x7lHQsSyQecAPrcpo5/oDc4gnGUIfIhNPolKb9CH8W4YIORz/UGNBT
j8g7UhPVCbhxiRaBzJjZ0WKZdtUF5XNvp7/1f48x2o2kVHHbkY+9RZQORRkg
2NgZ2xvyrwb5nqe4O0LFsPZuy1QyM5qR7fWUGD7Kqe26cAO+/saOW3dpm44Z
h7Hu2vnA3YYjpUpLzOjCQmN2w3KzBAfMVz+n+2u4VgJA9oorryXM/Nj1AJsI
RJO6iLJ8RcInrf5kxQqPO/XIBPptrqGFvqErb7rGxm5AYnGkxs9HIO0uD9U6
FY2egEdNbx5V9qJ1HFWgAbp5HM4+SFjbzyZb0zvfbpnghINcBiZj8tdb2tUk
C2rDEaagKctWFSrgR621TQYJglj9FuGWbO0y4BQ72dD3Or/xUIH0VTnPy3DW
HX7ycJLOqZBxXHPaHzwyYfb1j4hM2ONVoH8yWPcVMYrVax+JMgTbseZOqL41
zhaUGFy4GWvFxFnNRqJn/meJp6zc8A8WT3GY6cTdbKqknszqGGsJ9njtNJJ+
O/vRwzkHKyMxNtjyrxJiYbGBlKz+Zu2+hJ3ClvDBlFJxTSagF1BzkuY8Q3+B
cQU3JcAtExBgE0YvM4hlLoyZbFqrFsZFC5SN5SOL0TM3zG3JF4n1YoLtm3zm
/btabGz433+RoPLeBBz8PG5IbDSvjP18bgwO3sXet3maqT9WhCP7Kfk0Cby0
yS83MNZAQb7+cHloX2z8BI/Kx8njhAHbPqMZ8N+/IECacjm4At0KnxGgm/nC
ERWP4U70pNq7fLHjX6CsCpYMHrvxy8aGCxjn46n1CtwE8sjGbOJw9B8tYCPZ
ohQ24bdKm+NGVuzqaE3D/f8RozXkCPP9pq4vzPE1izOs1Qn8b+sPCxrNe42d
1s4sfHWixLgyB5B3cWUS4KuTq3uxovOKW+ukoPWfLsfBr+/CiPWePk/DBjm9
B5Y06/MUaXjZnXKZu71ZKNZiKs5yF/qqLW4Uw6LxnOoW4MabbSe2GOYYZpiD
lxIQuOQZTmJO/I+WfHhTHsE2RnNDTsH1Tq+h2EZdcXV9Er95n1oXk/5zu9W8
oRt52O5ri52X3tvay7vWlqj5l0PNdaixM81Fo1s77TXuV/vL+O00ftfKNPw/
1QSOui4ZEsESlVP4rLiEbr+YqzKZRBF+tLFVtFlBMkvHmY+2zGkKqugaMWOV
ibB/y4o3UApinlVuuSwRU6Mu1DlzslphDkf7bB2wz/VcLrhGLfRmmhH29RVj
jNNBjU3SszLjXTc393aMdIjSFb4R904wgD3Bxh6S4CN0kjSuavOTJNd1lVgn
xBUcJi1+iHBC4jlpyvRrO0/s6K/mQukzgb6+FN/poZ/Av07R59HpA7klA1Ag
ljh8ylfPQvgU61TAFTQtXcNmiT2gcVpQS5hVa4W+yXZY8+Hi0zHWr7H3W3r6
9Wq66TKjtZsTfhzAEOoighMOAXakTLhhOTE38lbUdBxpa9PqNzAP39ToYz69
QsKUyUW8wia5nehb+0h6T+2XVddevNwEPdGyd02C5CgVa3Iq3IOmbQ3xuBLA
I9BCHfVcD0WjLZW30RfpvI73prIzO8vqN6ILhVJIS9lcV0T8+Wu2JOeJdLci
VzBB96WKdaUa2SrsekQ0c7JYA2+VCddbGAnOiX46iTi2dDEIKKp2Oh0RvO9q
f8HAL/OTlcjnc3i8Yzdv4Y6+meSYrbkVB5sJ0WEcmBJSgE1MNO1og+ZSFpAO
FU0WpZRFGoR/29zGh7tYjT5DBGbQmzuLag+bRbUulXk1tYfXqak1zeEiGG3b
L4uXO0mGGiZX1trc5hjsdBsWj4ALIJ7N3R3SpbOctG3rmsMqYvWSElYZfQqv
h3fB82KYNRWxdlNvy8A5tvr9aeAlpPYqrRnm9CozUeVjDop5rPaYpyowGKbi
xUvUJdpzHH2MyBKpjsk9eC/NxKTOFtiEQQV5KyBjc8LrT/bZwWGsD9/An9LX
3xw9sRkV/M+Trw+G+/fuqyHn6iH4wMK7eXj8vkb1idZCPljQulATbbIK7j28
/0j3En5wZF/QtdtVOq0HydNvnnF29iD5dsdFf2Vy8XMvaIiUkxr0FqSfTxJ8
pHgdPGdnNlvUl66h6t0FQwgJHnsNTWBmsHNduYeDBFm1jZw8AAm/z4VIYUqi
XfaexliETtlrKk7n0OMekGbETbsSBwE50Y/79+7tPaJH/Hj37kMmM5JMY6Tz
vK0BfHIPH4olhQ/uPnQ2HBeYIk+RbTFcwbv6W5IL/7NkiOCHrh3rAsEDJVGU
BHdVA3Lfu6hshFFwqFyFNMgYn2EN8l3jTnMdz7lGWTMPXY57cUDfBuLwSvzA
oEVMi+tf7vwsGtCrlJsGjhwpvKFJ8SY0ZSnZGOidxrZ94k2OAiBIW784FFZc
1ZFQgsRmRWCQ32Xue03jQQ8t7insTRLPvfTvTkEZvn072f4yHeuC7UjzbRM3
pYYWVhHuBePp4raiU2zf7DltMcpXfEYM2iG600gcYFXgqCXN6+j1tydBN+7Q
GhvX02pofONgjllsTfeFqU0lU8fqonr7hl209eWmFBFpRhhJ/m+yy2M1U9X4
IdZ9/87dBz75mB5fRYnEwOTTCtpnMLx2lTc8vHv3Ppo4J14/X320PNeB1aCF
UR1mPRNaOS6Ol7j/Fi3M+/oNjXprkNzZZ96B495CXykSe32+ZTqo2olO0WWd
bB7/+PLFq9fHr4awQcMTkOhDw16GoyJd+D3kwMrabGs2h7uJNIlPH9LTVzSb
e0qaEyM4OrFq0jGkiR5mSTznlTRbAq+dSIG2WyEF2jIqx8jBZFSE2IsdpXz/
MoxqiQQxJBUTfe3GT6l3hB7pQpFB6EbDUl2Oyra+dujsY+47Z5D5dYDfrCjs
0Ye10WVP23kFdGhzNALOUjU1NDEUOhRvK10IgPGgskIyVmpoUPU8Tt60582J
iqxNzI0PA0UrZm6RpXEDm8baypsOu29q+OOFgH15G2gcLfYC6axTNrkk4sc2
mJHEBttZ7LZVsM67sgVNxcnlP637Eoi6sKC0PRag/gaHE66HR+1JS9vmTboG
VaDWZisAzE1nIbp7gaiqxbLyHaZxxPE1vBcO4NCVrLu8ahp2LUcxrLtctaVB
DmzM0OtsomJSzvxKW2vORCe/1sRBAY5NGTQ015xFg8ut1hU7lj1NXPAQU+Uo
AgnbDgPWJfNZTIx5OfxG6G/tRhSGpjQJb+REz2I5JDdoDfluGbIKiHy09hEh
+jEkFUlhMos+pgV3DRjdBFN1nFbBZs5beE9zbyVjwCCipGBz3r6TbJ9k5bsc
HvXd3ERCG6pvI0GGOhgpzG/JNQM2TXRushBOuBXk06PKj7OmFZ6KthMwUL84
EVwLMH/YY69Xjz7eGjMvi415yJrv8ImEZ7lPqKMtfYby3cj2TxEZRZHxvZSS
Fm1hb3Vl524THHyL9mFLNG/10cjg7ibbm88LZ115WUyD4GrThuF9IO+oR9xk
0YAe6S4pqoRmZ/M5MvB3mXcYNZox5O+0W8a/yTI/gmXmk+QSeJ3wZDd3eh62
1fZl9yFrleJNYL2Gnhbzy6NtM83PVjRg2eZkE9vSstC2m1w0NJIO9O7Rs1TX
MWRu+tQ5bNbIbubcD0JwEq/bgoYiz4vpuGLg21jnRNMsk5Sg9Vawz7pFc0h3
W4dDo6hs96nVg6luYjRtYb9em0rKJVOTGzWymCS4RR46ObdZ8rVfu3lTMHsf
J5sKYlVuDvAf0qge/6E4mAM4xS1X7SAQ2aou89xDlmJBuC4aoGtkYdLBl3uM
Hldl7AWXRuB+kzzzXALZfA8TIowuvFSCl+S09tDOFBHfgJCEm0GOwJhF8jpy
0Az6bZexcLqs7QFQhJrTQjSulc1Ife31qYfOimhIkuLEs0TNBmZwPLb+5OPx
3bsP/dp/XJpROsfxILfmJkiTpSBlw3slyekZyJyzYoaFLaOCYC4YQ81koNuH
kFqudE8AGCbe5+Y2VWHdw/7u3cAb0FLKH22XhlAv68sKDwGqlZ09jmoAxvTv
rF6Paw907/H46OTA2w5O47p9Z98pqVyvq+xKe9VBaXYUcAo2KVr5U5vGGORF
usSEqg4KxL87BGGV7uEeMqm9ZBvWJFmoXbFIvki29/9veAi8Zu/RDodvPN3D
C2J8Dg/pMSik6usMCceEzxgmMLb9uzi2yND2w/jKQQ8aa0k+ELOk2eWNFDz1
IKto6dTsAjVxkV5Oi3TspIfO0kU0YftxwwAmqtzGfpQ7zqcxqhbwRH08Dd1F
1o/CF2sDHrqNPbptWTUP+yigXgrFeeqEVWw+tQMoCEu01YqL1ScvqFH37R4m
6a/TCrOMuRK4PKJwNSy2dnsCXVEWGMXY5zHB1LmbnWxq5YbGymx7bKj1uHuU
O7SSzPG7995Ur8i1vaXCmlvWqGb86FvW7YHq2J2WXN8/bIPCdNqOnglrblKs
yuZj7NNrbwMiAIOxaO3NcjwgFdOOqJlAtroYgNRvJCmTDhWMWxMD/MogbQwQ
eCSbiZsru38+9XoxxZQ4JGw2DEWr94Yr0BpVbM31u+52nAMbukZlMR2pAWHd
EuKcp+dJVsMTEphDCf7FpP4xSX2NlUtZHIfqea1Wagqxtq9AZbh8YjeFyx3v
guivseP4aIRcPNhPfkUjee7nldlzq9wU/lt6NP7UuvoQFi6YJzc5rzsV5CCG
YCxgR/FVP9UH6PsbXZqIqz7YhyBe6Yb2gyBc9JgFKWaeHz5yONoXr5EYIkek
bacHN7ZwK/deZGY/Vds3zFsZdVwdR76XO/BAaUXnJMhPcmDz6iBS1JpV7/cd
lH2kvoM2t0Ui7i0xxm6C8JodY/2FMe2j4dLFONWAlZc9jYn2p5cGsCHMmKaV
ev7i6Pj5wbNjjjDj+vDN0SJPaqiJVw8iNL1WYsCuWaqGXKecaQqteXWd59K9
BR5sXJrNtTC9qFF1DhwDEnk1RztwJoKWgm13kc2ZgEIYxInFawbit3K9rniI
KGwasRVjYUeTbi5hIVsWY18dMztzyXXBD10CcEdjTnZj+QzoqVso0WAdXoqU
qyY4TY2lk0NXO4w7u/v9PERRBxGuT9faMKQKEw/FcFrjy3CqRnzUpSc5dZ0w
bS6VUX6Vq8pygSejkrR62QQn4zhGxtQNa1ScmW7RqXmue0BtJauNMBdz9uuv
agLeqEpBerelKZQNOmyjNF1JOu+NxbQILoJWzZkQVsuite3o5tlMy+4ay5i5
azEdDyizb/4/y7w6hzc0BhbzmcmGuOmX4j2v6nSaOfFXgwoygkUTooxJ1QBx
gvK78FEkprNymI8rt743GpIg6Ww3y2Tf5TsrBHdkip9z+Epu5dc9NTHOZBso
dcdN85Vlg/U65Jy9QXSaQWfjs6zGdJvwa7v44RGIbbyTeh3Z6bdZtmB25S4N
S69xwkDc3Kf79bk2HA2zMxRbPWYcUKKSCjl9rEm0C3ogvuVOn/QJLrwFNEGP
PFm0+QKVLy+25h1HMahFODfVg54R22un0Vk74ext7WmnJhSOHEhzNRBhiuO5
b3iT3zzFBLk3z1JZiuL0HzC4zUGbr8H6GSg3qTv1UjvqZZdRR/ZF1Lyfc6aI
EyPBM03egMzzfGH1AG+v0HqzcnC/j8xhLhXxj5iM+zRZvWRqs/tuAh+Xi3UF
qXAx5yz+PJP9B0/hMrD2ftURIpJpSmp03Fljiq+ILZnaSfe0bNE6vWHu93S8
NXAq9QfiK4WBCnil2xjMafFW4T8tWK1tFCDfttGam1mL+2tdWyvoDqtlCjei
OdX+kA1arKQ4JyxPMFHnrfO344lncOSON8dvJxGUBXXXpwQXe9qXyNevMfvJ
XsKejZBS/caKpm9ix1iMy9KtW1pZEBkWQ2okPJ3WrcvjnSJnGZ6laJMkJ1h0
1LVKfSba9iwzS7I4G2VMV5zurIqyssjcqMxJpt5/jh2vllPw1PPSNFb4CjpC
zNxba2QBk+ga3nqqRcyLEJif3MVsxWhjiYf0AhPTj5e7/0GmlG64wUSxE/MZ
zrXgh1YuGmdO/bv2Vfw3aJ34V+/EP0XvxORP2D4x+XN3UIwaBuwSQF+GG6Kz
Ro/VS6NgmD60Wkc9hK+/uCqsq8dIlpnalCfGNX48H5WX1BSvh65HjXv4BlvB
DlymBobWdDzMxEXosWWH/1YfoBuztxC9FyGYOVpp6FXqLNL/Iyempkb73Jq9
CiKzbcwhgLc0VqCrGFoKxjbjimz5WE/q0K79G4JK3nocPtOD8Wi0LOjZpSC2
eX+ilti74XpgYSk6LD7oovRt3XADi/chmzh8TI4aa1LjHbgVTOTg+ODoBjmn
lx3ljcO6HNoH81LvxqU+MKB9/Yz4P4KbeY6TdbjZqpl+INamm/BBT/GftZOO
vwp/Kob2p+xFI2zMzUdDhuZp3et13Kbs+baGDn98E+6b6ekQ82x+xIYOYowh
mvVKvDywtWNoedarpDLEz2lkN3bHnSaNXJE10sUbdkuxd+ANjCTZfvnqxZOn
3x6/ef3l0U7cYR+Pdcj7+4U7IqB5vlfU46AdFrhnWsV8Ywb2hgigFbCvrUq2
JYDNPru3Ti1IN3Cf14db00/0rASjOk/HjjNwBTJeaxVVHW+HbQA2zDFcF3HQ
FByVIMrepfPWHA7y8VFQ2cnZG7h7bzYZB/N4ZfDXDMhUZvmFpw39w/ZBb2wg
M0jpr6yJ5Kmlp9KPKvcZk9z4IcYk02UkVC5Ttkcpy8o3Tk3vKt+7ly5AsIru
/kpOb2dvi4bbNnacHQpIvTdsVW66kIhcrG2x7ngjR72Roe9z/55TO8q8a1Gg
YzLz5n3y9Yvvvj1yWB97t+TjuJ7vK2afJJsokb+jKHlyeJ6N3iZPEZ4CzuDm
9SPV8IB0OdXQx537t29/rq89fr/IxW90lE3r9MbfdtuJOo9H8ZxWd+UCrdnj
J91tUHpBrOO2PtyJJEV0PttCyLpyvt0Q+fNn1LYP3tuueKZzx341MUO/OYrk
PQdZqAjWR1deDy3UUFhbanDHwHsgjZoM4vgkcAQhsom5xTS2d5bF0XeaTC66
+lQimgo4mkUc7H51FPN0f2/ng2KS+npAL1DSNWBpPEybSOei6+Znx1jVX4im
fyGahhkjHxXE518a0dRTosqM8/08/hzPJYmsMHkxXiJOKLZFoD825Tjqg5Nq
dA76lWtLe6uxt7e7d3eVOsPKsP/AmFd0+8XL1492GFV+nNUpmKVjg5XMiSwC
h9kwbMGupWcM9T1aaxAzZzFfjBBDah+lumtRQ+j7jY0DPD7TtKolAb9lpctM
0+ZN6nXl4rzTO0FnmuaTjILdAQIB5cCtg0EQMx+DGjYcSZNVR5Nw4i6YgSpb
X+bYSBufF0tizi0uZzb2E5DN9HpNTBy44nJRt3+7PYYIl8iw4TGNpnufN0xb
0iaorM9BGHRmBhoHph/IifFzxrkyrwu7sqWoxkev/G5RuLV5sSdEyoEUEjDe
U6ldTFtAhph4bkJME/mwJthXxWvXBCIqZaOWSNasQ+G6eYxAb8ZrQAT6J80s
rcFEbt2Gfy08wYDwrggn6C8WJf/wk3R9ffiuDpqJFPZSmtkKtMCPCJ2+Di38
kciCfNgYvIc4KkxmwsLXG5AG25yHtZUoAldcuMWC8dM9H1+lnLhH01RnIrbE
8CqTMWqSnwEnu9mykuvk9XcVHPbL8NfjHYt8A3cpsyjQVhhSaeHAkSXRwFIl
XgrHReWleSO/HjjRrGjlnCKA39+7I+hCB6eVYkY109M7BuNadbimgdEnro82
N4371kbW94olaBhd+Ho3c3uNd7cqoCtH8bH0eOY+/kObqekfS5Ono67lHZE1
mqW5NuHxqgxN4Ro50tfDXI7FoVpbU/mC2fOLn6dt/V6eyLuAS8UmNSK0fcHm
10dKEgmXV4qvxuM8TT6zmrUQYsSY6zYLU47VZPdY4aviPkXwV3gAZ1N63dMk
VKhpLqeXQYihTxCDtLyIT4oy1zdfGSDA3auMVvj3RxyuQhWuGO5S7JxOuCRp
Sk7zCpMVNYbVomiP87EH/0eEHskxsuXtDv4XbXOO5aGn6ejtRVra6sTWmmf1
Y6+sZ+QF16pGqSMTv7wktNty9FgxciXN18XIo4Xdqsw6O8DkbWynARLTjlls
UJC5ICJa7BxT5osRDR3nlBOOphkgWpbJi3cI5QyD99TMV8qGX8qmi4lZyNVt
E2Km6bQbJzja2FYRHFFhNwvXL9gK2okxZg7kp4g1YTdDJIG+fodUHbLc4fLR
sqoi1X49axpfFywHFMEi5uxYLrCRRtdyhVAV60gengxuZmVQLaNiOJSV0aDg
/dUhQVrna0lvA4aqc+DSAoE0xcEvWWV2e4JEtYjKinGXDYhIH0Sqrn0xaB6n
jWWk1MGgBiLwrRGX5mrlbYI05pcxTJbzkdR4sle+raC0J4mRQ0YIXy0YJP8o
P6LNOc0mVJhZYyUqfImH2BwMo55ESBWYbskJizXbgORPscfTHqbgtSKgzQKl
rikfeRFF7EpxUCmv9Azu1lwDkXjEuzTAL/jYwL9ThwOMGY9K8lzFKZDaQbrI
QkalwJVdY+Ime8fRoukZ8QpB/3LuiVWXxXg5aqhC0WC8pjo4ZYUNy8kTxIdw
I8ykUcRN15r8iBBqtp8nlEIIfv9wdFKyr8PJzuV3cONUdpeuM2UTT02TxRQU
6AHS9algGefzdylsA9YempUWt8u8SCituTgr0wU8Q7ONRnwnZnWxUNMdk9o7
2SC/wPQai5xdc41xeK14G7w4KcXl+HgQdVOonqE7FsvyrDP7CBfjFdjKC0Kz
k6FXEUuK0M0bCiTqnXZE4h3H+5bl3AyMEkc9hZW61gLXRO/SinYvnAFmcAoo
wWnMZjwMJxPJ6ilaCMsE68VRFa6YpQWhFfOg56xSHdVTIyGQnlECKo1ng9P0
nCIbMJurlA63k+KsbjOgdnAUDPqYfJQm2zO8LpBbLjBj2kH06Cu4Ab7S1baA
0natLzjal8CCPPdS8TGQL2AQVjc2vmY9GFzmyecjBHUKELp2ufPIhFJu04bp
yx0aSBHw9OqAhGKK9CfJi3nGyXglF0lXyTRLRSDyfUOb/9Y+kcJ5jMpRzbNE
LQdUwqxYVgToaByZ4Zscy4O+Qjcm+a+L0sI2BQ7lohwRTmT2LkdML7hiFnB8
LbgdL4kRZZiVhlkzGIh8V7yVI4/9AiWNyx+FuFD9LZAv1t2CdEK5jHWlD8Al
XaLWXnH4E57vk5IHt0OC7mhpoJBa2HH0DLpeqoHaCvDWTPNgeS7FhQkNCmhW
XN0I+kOQ/duZWYoKLQzPz8D1uVpFbA3Z+15PADGWS8cIslKJC5tfYELHvYiX
fJY2WZFu9BWkhna7AP4IYg4zftkoXKAM4NwCTjOjS+DMoZVIZFerbSYG7kJa
AYKafFnQV2lLNyPCzPcZFQ6PxQpG02HtlMo9eIJ07rKsoRaJOwYETKegs4B2
zHg5Ffv6VnJCRNVsbaTtYRuyAEdOpFYsWRKaPUCN2UreVl1cPZOUgmNwu2L0
7WfVypp1YH2p/PEgPLnm7Hnyt2SPhTq5XDjhqYpPHr23tr1k6PNxelXUbtju
uYNmi4PDRWciBtFR5dob8fkQRoon2kt1dmZtC09OMdYFljUNc1PqtT0LRgyH
71cYS/je7ecEpK9vBx5HDnSeXz6bZWNcSUJLkOZ2+vTt7+nOznewXwqU7WLO
rumIeG2HARxrFExxpVsw4H70UoWyuINxzcVBzvIDy+iYEy0pTrWXPQ7Q7NOA
o6fTsZ8bDlNhO/BHUU3PgXQQZKFFrmmGTPB0dtypCA0sG80ut/IL7kVDRmWo
mx/i3SJJIa4K0h1SpF2NhppJnpF5xQvEVrg3iZVLS8LfGQyvqV66xrqm4TRp
3ao1dA9atipQM9zgR/RuE3Z97TECilNIlKJuZ5ZW4Gsk02rIz7copXeGmLbE
BOfIX/p4N7aJa+3gE4LjY5QUl4XOx9rfZ5ohkMr80uZWAHWTPeNQoL0VozWY
JD9td3ULdGvACwS0dWCPRENap54EBfNqUhtWNUe135ztLWxh8n3y6Sr+xL3J
mzKX3li5WyEGpSLei9dWfFmaZ9yikP0YZUjIJOLqBV1i+ZR7Fle5srX19gGp
muQTzMz4fDMstj+gtREui7BdCuQSh92KTsH1UsGaF4Zc8aiQf4QBPltkAzNt
d7Ng8HcM2euJX6EOoPpF+aHRk8AEXOmKI99kKduk27sxSgAOU5m5ylJocKVz
XCYjMDhuFL+gCpxJik6gWM9O0LKwLlEvGn71rK2fM9fAkaw2j2xrGLgG+KQD
EFgtT03bQ+tEppPf1hQRFyj8ThRGchvEwtZeXamCZY05ZXc4y8BCG3t9tVMY
2GyGZThaK10cvEzkwkTvdEJPtrrVzia2+APSL9kW5qIjeyM1NfNMOuzZiJbQ
3Bo1r47/e2/P9EpUIG3Y+jPSYWS43716CkYDPF6U33p0HgLEkKuykTZIDdDA
eKvt1D20Mf5+Wysy8SFboc9/JSns0DQe6CxeyYpRYXeyXdZf7CTf5vO3yeu0
PIMzcVBrtEsqO9FS2wWDbfdstskc3I/TUMktojvxct3eYUVR6pgVZUbjUbwe
Q8er5myhdHz0yZQs2mBb2UAyuYtgxcMMhlJwZUqvqXbh/v1Ht9m75faQ1xYb
7Nphz5O+kmu/aw7lUUUOPp2Dhe2DR0pTd47XXK8xWrE2yOqMpS3U+bQYpZ6h
rCO5pJmATWfKrD8zVPmZ9DiVQGl4knH3afdkklS9y5EyWN5jbIQ1H08pCo4d
OPCTr/kTeCI/Ywj0IcxLLkZbmwHY6YbSlCg7mSsuuN7V+5+yPNDXOv3m5dzL
q3F9pYtK7iJ4+/j4vkrmpc5hbqCYMViSFu2IeifZflKUpzkorPOwq8i/Uw/Z
28n25gvj21hg8jgNgsu0C98DRC1ln3JVubuileZ6+juoqNCyqvu7t+8l27JG
O06PlqD+TvcTRFC99IvBVQeRY0BGEv/N89Y+bV699irEZ/GPwLs4No86AMkl
zYN0ByW6LA8NHosWgbyNOXkk0M4bbESxFu6DzJszVhvNQ9WBaCauJ1aC2Jc6
2mYkgOdd7IM2bUie/5CF2K+ux0bsc/54VhKoX9qCInBqYI11ZRODVnAZ90C0
mkz/p3KThyu4iS0QEO5ueYrVvBgMtDPNv8eSdzeG+nda9Aew6AYCjd38jTDs
h+fcxFQEtwkrXbjvxZw86SUZJo29x8FLUU5lx4/ovb3AGNlX6fgZY7HXitRn
vPLh7r3epVo3RhorxZJtJ+rkLHTLKodTd7B6a8A1WL1j23Wy+ifHrw+/Dpg9
f2bZvX3WcJKBUdTK8PnGUmFiOPVUF8bpsr1OGs3AAPFzMttyLnjVtKYoUs84
5fPfQFP9S8r8WXXWkPPFCYDsY3LO1mShN1JnKFGmI+Em8OdJhNZp997GAnsn
DV5PhdZSA891xPzpQN07z8TfIxyp4TBi5lErSvSvv/IXQ/rk99/Fh5T/U3xo
N+tD2p4X8+GOs6Aaj6D1dnw8brc19IJIHQvRgu984iWlGmvEYCwxrUkWVrLR
FgumWQnoSw4atlrBN2kTOFjG/21/Nj4drvr5NPyj8XvjN+smavn5jfxHe/rH
vvy+I7/vJr/d1EisAGsbyRP/j8bvmx+JFaX+SL5KXhbOH7/hfz+R3x96JGL3
mpF4f/yWDP3fH3IkjiVpXuiM4KuPN5LF8hQFinnxE/cP+/sjjOTteDTU0UR2
5yOuiaP8xc7OR6QTRUn74ykW9EnvFP+BI8FgxWcOP1kmR/THUXQkvznsx3QF
9X5+C/9o/P5402Eu2JxG53S8Q/zRprPh6g+PYf2/QLfU53BMvmBz5XOczRfJ
yxcn8CnsEvz5Hfx1BH8cHX97/PoY9BWSkF+AZkMqPShGpoQPlYPPTANrUBA2
WIq6Fz9jVMUNlqtfJM9BBdHEEM1zZJXmNItY0DsGjmf7kx24XXIbTcMck5/a
vHWDRbj/SkqM7PNaVxv59XFyy9XTkjqvp9kXm0bro2VW1a+I5c+oJlJtJmkJ
mlL5dphO4bVfbGIYNis3f2fr0yK9f6/+o42N/1qCejXN33LaAyzBOCfwRN9T
l8YcEF5E1h8SGwBzL1gXK3YnRbbGbxFMhBqgfF1cYAbdAOxRGlZ8SBUh3PlN
jnACAWgn+bvdC910DA1GLUxFWKCUywVDPKNY1PXVM46TUbqBhRZAHbRM5xXo
rlwA7s87CmPQsqRo6KIZxOSjgyXTrMI0OJNIWUkkdmitYVP/Y+Ai1FnuRdua
QVawHXMuw3SHTdo3FrhKyqvz6sCfjkslLIiwpKWYbqYf2s9c54umVbnGDwVw
2fBxeyVZ9NXUr7eM+QLaDQ41vBtnlNe3uRt+7uWNeBK4BhceSfNAe3C24Lwe
sbosMlU2Hy+wipAynx4n1pPw+Qqd8nPn2qaqxxC5KzQwtjxf2C0/4YJKLoRm
oxwNUe67PrS0Aazmy2U+paRcYFYrnUU98jSowxEuLqVrMp5LoeZ1h11qQJ34
1VlaTnMuYmOq8zJOYjWenNvMTrhsLE4K9Uhg+Akz0y611jTanFuSpNxjSzav
Ww9J45CEMOup9adCiQP7nALuBH+YbtosnaCGh9BwV4QI+77AEpvzEjwuUa5G
hUd8xNnfI/Uk4+v6sMMSeNennd6YR9stt8OgpXGeke/Xwmlr0XFHvIbW13Pm
tq2wNUL8bTQLadIRfUrBTxprLL4zFiESb+UKME+mbq2qWXPcaBEfnKbuhU5t
iQpUMjCv4opdz+nZWZmdCRJAd9ldmZmCzEAMzXKsSjBZguw+Sw5sctfTHgft
lqSj2ZywoXs+1eVfCQtj5sIakEkZ7XGgaU9dr7olbNVKIkK2RR8h7Dmhiu8E
UOEbKT7TLEudlwAukFgGTaZmmiA5E0J+BxAz3kFr1KBhUShoEZy1SkIVWEwG
eoyfqsy+Qi2bH0iRkItGsJw7mE0WFsKCSRUTi9lh2AQdBhabgZbollM1Rs31
UZVPTIJVFjZ0aMFIgvX/gZ/vztLhU5qOrVh9V4K8kFXEpCwCi1DVDf2i1mt6
kV66GjaBMGmaARwr3sEGZdxSh7JDGxQz/t1E9b2pXKRz1lgMKzJdCbrKqEie
VtQhOqW+KUdOdXwn5BfHoIIWz/okMo8CiYVPMNpTTBeK6gvReiQhPDnircP2
KpF8uPeeAZzIo9dtuN4j8NbVcL29rXln8CIoi4joUa2IfK5h5mHP0JjfnDTb
7v452q3sRhE7W3ewkx3gV1dHwVFMn0tZW6dIQZS8Yo5FR4pkNwvQ6SxqQkfn
+WsB1K1iPzi/Bu5EkyfBZUNs5wRawxJkMouvftxpFWMKcTgbo1FabYHs+jMx
NnEnGkfnR+NzD1dbcjfE53q86Q/hcwQT5e1lIyPOI1SkJrcLN10bNuCuVXUJ
x9qLbwZoIax0RpCvm9VmReRkidPFKkpUuV9lOKg6c8EKYWcT+OzcS70EtarB
13Gb4pCUazD6j8WKBx3oP05J5L8MV3ZZ0yEX6j01HLbVgNAyS0JAb4Hy2t+9
1y9pomFyICRV6holcETOU3RRY9mDrPIJjpu6fyw52yCOo9hHLWewMEagRaJ5
hUYLzPaVD13Y5sKt0EUbcKewnD/KCVew/ZfffRC233JSgklHs3+NeMjrTt58
fR20KZvEycroNsk9crCeYGUgkMB3c9MZfcdxsjrFv36rV0UsIn5k7YHc7/8l
mQJuLWKj7utmUx3/4KSwR8n2Ji+6XQbG+cDJUhbYC+TnmE/cmR1O2CghJLH4
Qrj+tJkofiWx2Khh9TLP/g/K59uDrVN2hY4Rv3+oK3QoqWpTamY7t5O7mKzY
SwycftJdThx2enHQSfx7FGOy6kDZC/rL9YHuHAhuItOG52ZTc8HFzGggE8Yy
9dpeNhCn5kq4QNrgKB6gs3IlbqcPy6fRvYbY7RqV7TnT3ChprKdRxsYqKOR8
Oi2zdHypsCnsUhY/VHVelBShuylEloFUmaIDm2mNnflSUyyIAl6E3lYbtvZ2
iU4coXUt1ownJwLEsrhygDDXHJRpOwqmoYhxnztAFw07M9pA0SdhIVd/NMLF
+hlPPfhPoJzg4lBK+LPUgIYZ1qkJrxYsIEEv7dSxB5pqf0tX2sBVYxTvrua0
jfo3H0IkZse4We88sWjLLDcAHWLXo4IbFha3qrgtUWMmhgboiSDfsK11iiDl
rT1AYKFHnnuDQDWMt1vZvmk8lFxQ/1vJ8ne5oZ11o+NxbORjRqYopmDplBmc
2v9ZMvRB98K3ANpEoz0RlI4IJIMvCVpw+3a6eOC1dMuSsyNclcmDFtS7iYPx
dre2QPv3UEbugjLyvHBmzukats8tqR9uwOrAjzge+khqslmSVa42qEk2ASM0
ACpqiUCjXTnPmOo9x2A3kNs2yZEdX87AmlgA6ohNieKsOQK1715y1xjm4Fcx
MivYOc6cwK3Gv69lcTq6eD9TU5MNW2xMUe8j0zTdVKQ+mMLgg7are9JwD6SP
YO6EOnyMyAIKtLVNLXYuDXhOPgdllCVDWpZAOVuoOb+Z5IiMvdUYmRzpFXfp
6WnrZd4IL/IyGG5ur+TTKN44I5w7mo2v7piz9oLkY3c5mmJUw/Usa9s7WTcO
z4TitXgrnU7L8zv7LNh+8rbddMTZ0SSzPr6OBbmcPILzP5BemN1ej3G24BXX
HE7bHYNOw2mG33FqCDz/q+PXA5IJGVng08tdJ5OBMuKucs78iVb5VBweZ/OC
i199Zt3oG/T//T//r0u/8M8mBRtmoh3nY00wKNc0BodG+3dfoVgkFcCf5epw
wZ9gt0jIfbcg3ThNnoOK1yrogtwMkzXZEG6uENPuF81dpfVFbynqle2nxm9L
xO+ZeJ1nzsnHipZHOgrRJYp55qQknAqmPJlbfoKHkGlHl+3rNNlWiMhMoebG
A4ObpkNd2aAl0hV85neZiAj5iDiXrvNXdh0/6pcO2eE+NUGTII3H6dXXo3ej
e+i3OMHT78Kn2EyYXHsBNMkt/khSLUoMB7HJHIqyWDYyPov9gIXmh7fE3FxA
RsqGvLvTDJ+2bhN71V+cXMutvkr16ZY4Pnn0FTwBgdxQ5PP5z29O8MSAcYXe
FIWgOsXM3VYy4VbVLR3RHeR089whKSO6X/d2zOv9aTsF4NyRzw7seqRoUsZu
nhad7q0uOcam91f04s8Qvfjko8UdBDql/PeHTrlK5CHcB0J4dStplAmOoxpr
XZTCKGLt/PId4wJsl/oRq4NLInK5nV8ZdpFxUZflUNqGMIOod8o7u82uSA17
KOqa83rvZK7HKMJm3mbZgrUWd3k0p4GQ+tBHGLhgGuu8VfXQVp36ng/ohokC
ekU8ME3ICJORdXS4rtPlA+RludXN0WKVlmN7r6dSSM5ITyLQSUhtwn+QHbEe
qsu9PoNocRdLqUtvdKlY5pTFgeG6r6jtiIe4JxDWvxMb7o1g9fq8AVASILQ0
zsqVoZbWIp1oyCng/AbjyHOGVU4P+wH/PS/AiNmiPeHvVJvccgepCmCjF2bf
ZD8yfsniz6kKjEjEBpltW3NZ6XUNr0bvc/KM7EU8Ww2cnZZdbGOUfgJcKAja
ObPtiWu2wE0ClB6d3MS8kzyuSCDNmTQsiZ5LC8o0tiYzpXBkToinh45SaFDE
KKfbZIhSkbOntsYsKjgviuWUe7RK+3GChDZ1MoaRxYvCbP1sX/boKwhh4bjQ
whFWc6k64CFgHvQW/jdaDvhhyv8aukZHdKdrpf4gzcPBmlmteLSimkbrOtZW
OlZLoO4F7BJH56lik5LkpnPbyuV1D6LnNOpEsbUrUsSpJ63t2QNbFuWKq7O3
9SWJqox+zZcz/EVJziSyWupVuGiSU55jzLCRy675GGYQzlRgMTkmPhTQMju8
87fjCQ5oxIbNUxKrxCwnsxr/RuJ/A8tAraH13+7f9LRqS0s+nYc3U7ejQ6Ce
07QWpgV142G2N7ZTuZO7ll1euZzUU/381LfL1tqhRgYLTpvWOa+0qyaLFaEY
IslpeppNr5HiIqqFfbmv+vDhPZ5Tn008Giji/dP2FSeKdee5RLOVyvxd12uC
RjDNgqTQZ7kPwv1+X/Q8b9LNPXnqFEE3hURXA8m+rL6Vu2OOCx2lx3SFyCyW
YE57nCuwss+ZP7CyRsl/EfcEA9Co3mFkoVmHQXMwBfGh1UXdpHFICId7GLXg
E1p8j89NhMUOO2qlR4a1jnrZe2gu0AjQya+/TvIzR3SRv1YUsDOibyyiDVqq
Z+8lsdBWVaSnBUIooHSZIjW1PHWYvUdoxXMEJyTA3hTj8AHkoCWFq/zQmm0o
Zs+VHiELvuHAQ13p57fmE/qoPOETVuJPdfz8LTIGVIpW4ex1z+Iq6/AfMJpe
p/xxyBrgxpsYQ4gj1UKiCin1TJSeJ4izCoTfY+eGOoUOaCl3FDAsufMxSfev
sxRY9mPaIJj+OPvi9u7tPQLe+q7Mh18XcGGyCQbZrh4c4MWb+vXLtD6Hr83O
hl+c7YWf2NnTNy9Z13ycDDd4aLIf3thkV2R8uFM0Pt8ThMPodAK570u2gTmR
xB3n6dkcJglsEsytlENLpCsQkR6+ePbszTfHf3/z+sujDXdvkcW+fPXiydNv
j/E7yTdwgZkZEWMq+veb4+eH+CDvIXxTU/bvPKbLfpWLN1El3XzcHNFALwDW
Ct//ah7OWuLj5N4gSpifJ18/OzhM9u/d/wz+b++yOuXj5HzrzoPJaGvgfKtK
5uPkzp3Ggz9P3t8DFp3P7Q2eJvo42bs98G84OD4ZHh4+G+7dH96/O9zbfxjc
yrcNH0bedTw+OjkILhe99nHy0097vwySn/YGyf1ffqHLf/rpxTcv8TP4NYCb
9+/d23v0yy/ygN/NOoKyD+u4t28+ALUfP7h/+9Hde4/2b982XwB9vTH09Uas
ALjUoQlzraeb6j56BPF7X04BwkyZxTGfx7X5xO9tsYWXimVpsjjlg3iii00j
smEkA4fZlg+yKjXTZG3og0w0PhJuv38lz9S17XUzyTjW8vpGdywtoTH/9bMR
7vet+DZJXPal61V893lTk+rCAtbvBRnfcVjhv/tTn0LryyqH5UnXpUkdXxdJ
PvhjSBLBXz8gNTZmvj4xPliXGO0716PFPi9q44AnjLemBChdk3rTnw/XFi5t
Z3OnXgToDXI92IrWZ16N3mQO67orTUfGj+OqDNbLxI+cjtaRzOy6XGacmX1v
p+GxsukriuAnDszIgyZgv8uT7u5wwRv6tHadBEDK1WIMLyRqXlXTtF1jm9R2
AXMm1NsAH6I3VHpvTaj733KuYt/BbDBvwS3B27jQXk/5NEtLcluQ9d/aDiIx
jT8i66BEHKExqeKr6mKBeV9UUAg0SbEOd8RVY8iILVvnU1wHbi9e6eKkZ6Bi
XnP86IiWruXuUyMzQO8GPAVodM0JGDcHsh7mC9d0c7hejshDe3k5+EBc9Ye9
HALufLWfG/VyoHEfY4mPW70NststPoqrjOE/rNsjzm5ingX9+VAehgh5tHkY
Yuv3r+ZSkCTC67oT+rgGxDBPUEb0Xfq4yda98IGNxhc/R+hlUU1CQGbUUag4
BHWTC4E77YNEyuyOxKx6jbEXsOvkjjWLdeCstRm5A7UqnNBpQphWEpX7MgMl
ziJ7W0hs85GZxts50qhGx0yxbDT5jwdsgaAR4Eirr1qm6ObwxaZIwz2o4plM
MMMKQdDBrKDPBTOBxo7ihaFOMXZfZu/yAvaYbzeV9YgYa9AbZr2wEnaBgrlk
g1JCQGJVUpcbAzyi3loMLUshIs1LGNv4hAobsYp09Tjsd7IcndtLxwWDs0tR
SwqHA55XJ+e57U9HoMmj2lnvgZW83P6HkyQyfmMTMRcvlErp2JQ6wiQtFO5m
WDfAM38fhF9FMOxcFHQbYtlxUPArb6GQcKXg3SfbfOwdKrIe/RSyt/n4jXjg
NJHM13xJVy842hdE0MQCf/Xk8OH9vTtm1NYs6oX2tKM03wyxOfRNgVWC+q7c
PA46YJPC4HWp8WhyR66+feHae8BWoh8Rpu8oW9QuhV+VbFnZotjzR9pQ8gkQ
KaVSprVcUEmHzIqZpZMV4bzY7IwsNW2LTGuKM2DQMhyx1dsbGYg2pwKhguHQ
zd01YabggQ8wukHuJH26LNIZloHCw+IP1qCJbkxNmc8bUaAsCYjY1MeE3NOU
kKG0RKwxgzuCojWniaWN5WH2w6yTPi3gnxZ8QVq+c8WZLp5JG48TmOLc52fn
RvY4OYdYpjvivYsdqqYYUWEK48NyFJQeBORPtsFkgu45k0Yn5wjRGUyYnU1C
ZwR8AulAcq62HsdBdxZ+25lk10KW1z58C60vyWqU2tXqk0Kmm8adjWjSTtHh
MgeSymTZIyPA7ZwqmLIzGrTd8PTBBsQcYwzaYp04gZbQR0MI2gTQ5SnNVxGE
cg6QL9UGzefswpKcblnGZj+btLXPy5k07G4Tk+29nC1n7gRVaPKF1EvUMcQb
8VrRuvvequfugr4yhNjlQ93v5UONuri8ARB3bUD5tzi34r6sPg7HXuAOXvW+
HAa3XP8sH7cU6nPx2p2dWMF+eLKC4vwrKr6UymYK9uMe4X6bu76buNdium7i
FQNZz3d8FZyO7F9tZ7WzA2zsE3gojR8h++vKM2X8fZuByGSLI51HK7uuM6qC
baFzAmY1vZFCERKAb0nZP+OI4a2d8HVGBdGJdM1Des9i2jXbHQavLDIO7P3j
jnXgwSdhGb66AnkByF5fyxdYdTsDY4/t5Q28lucpUX/gc2S5V/8xHsHrOcIS
8sf95vjhunnTYxEMTmdW8QreyDj+o8c4uvyDNzOOmIMqRi3dzsHuhbwpZyFv
h3EX3ruWu/BDZQap+88k2mwCd998nPykyTLJ+dbDu6fjLcks+f3Pk9TUf+gD
ewWSCV6DTtcB/Ht/0/12Web0pT1DfJnzb7hBV6IvMXa5S/uSIrtPv81SL7qr
Yd0pfo7vWxHZLZKpecJV8gX4rTgKB9igBZM6xCq8StYA9+z8SLDULZNbX+OD
uffS+KJ4rAbV2Lqbh6jLSylRIxN5yuON1QtiK6pX2awQM1m3T8JdLu3gAwRt
maW/9khC6qvTeYbu3rIjPB9rs+nRJcGuGz/4KWkko/x0isQJI3TTtf0MA8Z4
HS8p1su9k8Zs+L0r3ooLDhsrpgJGE5ryeSRLHGFeBRbV+Epg/MtSSYHevQUm
fT7JCOAy8E3eiVh03Rn+/vs3YfZg9lab9N2XeYnJmZ4vK1bbLzslkFlxUEfY
f0TclE5r1t+E1zaqhrRuzTSH1OZYqDmLOb4N09nRQEYkbSGG9IZK4A7j8pGi
KdkjF+jCmwsuDDs3kvNiOo6qt1SMwc6F5uRFuc/e5YrTKVOtCOv7FFRb91Xn
hBq65jtO0aFoIInxa6nObLhIJOqhZGfeK9AT4vfUNbTMdQVG3qA5JqcPBgkM
7WOBTqGymL4BCvYadrR1bbpSYb1y5pApp0jKOjMcVaPZa9v4EMz4gYfQ4c2W
kxoQGey0QjtCXuEcDWsF1h2NrlUWdExqjj3gKFcQH3t39/bdZPs52FZPiuV8
3OinKhzQHewg0hxwvY5cYLt24+DOyCOLzkTud0fUj6k0nl3pyu0qrJ5K0Xwb
ZU3PfB5vNFcxi5DudEGotaCJV/0Im1iCiTrEqZduvmEajvWuVkBhg2yo3Tiu
QdnRsRNY9+0di1DaIG+036+AABRREnyc/Bgo1KTM2lAxvSCPO0gRKfy9U//I
mUYGcRcdCCb0QeuPD3DD36ZajurcRbZzRpSlG3PgKSqSjR0Ac2J5tkdNGCzv
wsFS6Ohu1Ghva/5A1OjYNEaIazhtxSAa+O4mumoVto03Xbqt4X0aGLfdFYCG
kNjGIYXFC0CxTWy1/qgHpq11+218xFDFTCU5w1k9AwpKXjEko4EdsGCXRFV0
oirtHnGNRnomiJsbpdqO1Ofj/ZIpDihUogHEURbRIDSwqQjhIwqdcaQBTtda
k8CINbe7wtNpFUd+n8Kp4nnXjFBJLSSpZLn5vVWcnIBOLhMGP+fGeQPzTN98
M/aIiVF+c3RIlhB//0rjrS953RRYKr6ofgVwvG9D1DdrFqbqZFsmgdptzmAh
vj73v3iWVjXjApdZ/bmc2oWF541enE7rwL+7m1CXqnGBy1AVHYoxvIdiAHiB
ViLYrrmWrTWI+5RTooDDlbQNSBZjpzfaLnXy8u3mNWyq6JAP/m7MOjR1cwNp
ZiWOoJGZlXAsPDU0C21vcHGOYrhapCMTgRc70UgpD+6BX+DAOZquQ4HCqZ3b
dbAaZXHeQLxBRXxeh6H/mE7jqTPcSqddN5CMNZN7YMbfSgvcyF20RKLnXHsu
u0xgBDQ1yseZ04LaGreFZw3G9dUOY5JsBHkA6a6b2RQPpty6yRGx5XwcSSWJ
zIi15xoz1XwluTPoQrdyf5WUwHOy3IwAA0C4cwJAprzCEIYo3AQZanLIYClD
rios2rQrJzLG4noaMnzgzVs0NBcaoiJq4H3Nyxa9p/rDlBzDHpr0xyk535Fa
mCYTtoccIuYX6H2tG0TeD5Z9ubY0wgVkl8awZR1dbwVezWorcB4kxMqZoAx/
9QC5X1E7IfnNgPhe8hXoxmn3dWHZJr2ya3ixt3HSv22ZpLre/IyFAEr9LKi5
cFUlEn6j4mye/1N0BVIbm2Dt4nfCZUcePyrBKBDFRpYkew8v45rkllUh+I1S
vNTEvJdzzZUJLRcKgpMN7PMRtpIV9wl1qgaYJR6ad0WO1v9kko2MneelFq2f
4Kdh4jChScfH6T/tPQdFPtAzNl+im3tYF0P6YzMkL+xgNcMRI44L1dt4VvIe
iNO7q61k8WDjC03mEab3BK5mcktZFWlWRX3OyZMlpdRo4y3R+NDpy89LzosL
vscJAyVSbWxSi1Ls8wAsFmsbopOuNMWAxVMxW2jHJBJ7QDEsDYEis0VLdkTo
lenAiWlRkMY4fiZUHLVKJnSgr5qAVjwZA3nQgIQTBCC9MQK1RBNqA4PqlKZP
Kcfx1THW3h8/Pzo+sjLJnym6qVHXnuSa5cWzVBg4V60L3U1yGtnYScczVANT
oIX3+Ww5czRJm6BMpw+WAJPNiXDIyzQfygAahtFu8mI+YuRDNCPHzsttxzdW
5qN8EZQwq6Nns0V9STLwx62YGIzKvKBCF54zvfR0oqiK3B7/8VwWMhaT1muk
b9/R9XY7PHXwv61cVkWHVVLqkOvzWcIvdSACx21ajcBeXeTAqrnLmLFBbWaq
7JQjT1ky9UibfE1YXf7g6GWUbboktbgjdbI1d1/V1FjyPpKzbD+s4Elh6job
I5GYF7xltpzW+UIThCtJtmq0KjHQb7U/UlEEsBJCgg/N1TNrpYtnqKFtX6Lj
xV2i7a2WJks3SPY0rQY13es9Lm/gJsZtr84pT1k24ArLTU/BVC9iDORcUOsq
j+HgOpHIgwW1VXmfHAZNWHoYly9LkBvvFRGK7D1KHdVke7sAdG7IQR9QFiYG
F+yJmBd0hHPmbOkMP3bfg8esxCQp7FGJ/puxhxsXtK2eE8gpUUALWVNQCsnL
C6WClAFWSjq/wTI1Ia6Am/lGWrgpjlNKgQ1+31EFaK4O4Uv3RV173F3ZshMG
SKqO8yYbFjtvqCvCXUywMZZJGmdw6J5KU2+THR49MWSDXfnYiCfVOS5UkAI3
DBgLVvbZ6KlNajPlVPQUxT1V+kgD6jBLg/6PSl1RFTZTgRWBfZtoLqUzNIza
zqXTaswxnIZDwlRBk2cRqo+slonzVzIcxPHB/SYCml82szY6Wt7++ivXrJm3
4hulyKYiPTR4PJtJ6ZStHHQC1G7pG5lfsG6e7apthyrbBUhnwnUkpj2tnAQF
nUUnDcM2nEjbJ+ObfKYcHJ2TEb1b+swvDS5wP0PBTewJ2w5XN4FHfp66VttH
AEVNLIQxZy+9r02DQThg+QzYykiy0igDZmW3ZVN9ttInTcE96cDSCsy6NiDr
4A9DZN2aVR6WdqTHbcwPbSM7K7A07YssJteK94mTkQzCqukev8KrK7DLtvi+
PjNE53nLSw7+vgK+lfTsN2javQEte0sUexQRpxYb/IOCuFI6X4jHSjn8Ck7i
ZfpHL2/AtzqFAIR+LNMRdwsX1mS127mENT1N2eGXUXF1Xmp59W6weDiNYrGc
pqLQaXKPs5UthtxcrDhnmAevXh38veNWiSNVH9bGEvFgPPOh2/VHd8nwg9ir
WmCh4upZelosa9kg1wesS2FKJWyUFojux5hRqnUcnO8YqftgA9+0dq1AtcA3
N5a+43zw0tAdpu60ea6AeZpOpsAyF1lWvqFOPwLfTB847SS3FLLFHtaBD4Fj
Jbmre0jCoYp8VZUY9F8wbEnc2Tag4tBxrdInXv4dScUqm6XoUPTL0lrlYpsL
h3epPi8zb3Hcst5W3+WAeyMFJXHzcdiL09gPWgO03uRbvGbo9Bb2Rymh86H4
XZanEn5g/TqcW9Rl6mirmp4W12/ixVJUe0K5VFbNtY3DTzNNRIF3U7lb46m2
LUpgamuDg9W+dbdMJ+5K9lXgiqjThL3VhyjWf7yYqzFu1HQ5vYn1Bi9BDzOd
FilM5Oq5V5LaR0fNBLIkjcwIC+B++YIMpKslSBJF5H5kGdXUsuA5S+W4b6hR
0kOdbKMk3qGkPYw1lJXvlLBeFcyEwaQmJz2wTYNuKS9uJLlPQrtDN9rfflR7
RB/59VcLgwCjE5riKJGhNB+/KZLFz65ykpQJomgupiAdf8jnY7CEMEACR7u4
QHg63RbVs2h74Jynp1OQILpHJhYjKSN6tTkDgSfEuB88J7c8RQMA8OnB4XHY
K1e8NHIRJUt+5e1qfAWF9fupfhJfcR30UQLKhNEJ4IKQU09q2k0OHP82BwXs
c1GNv5rV0SCmgJLQDYF0Q9UTL045jkbU8+D+3T0B0UBOS/4xMsvY1WLCwZwJ
04KP4wQZJVjQXYsRxWhvAfromjbmNtn94lwXbN03nEyzMTqDXy5PhyfLU2rJ
MlX3j4NDF7r9RkW6QAAOWArbyqw5UkKbr84zQQWxjvFikY+S84JEH/XP+bIs
3jI4pcBsBIRi1xzPL9IDP6OxFisThXcU61G9IDG3QYvHZWPjBfdXDpz1LWk8
AXG5nZVMuv138yk6nQ0WoM2RHQQGJ4FAcJNrp7DYBAqniuAR9V2I9PfdNZ7m
3tDVzSxb+fJknShr6gAzdIVEc9bsBvFBpaWbxS8SsaELG60Hg+iUWIesKFJo
1TOE2SYMuPYGYyTlZUcaZTM8EcyLl5iS/yThwqP+znYQDXSGgc2i4eRQr6C7
IZ1i+A4XlCHhF2rYG9HQqZqT8DI+A6AvYimUzQESLGVnoOcwF2b//ZYTCOyR
NQlKbrE8O/fDblaV+9AESkfS+qbzKkKb6JzyCDLS7ltT2RUjbH4ZAcBxkqoQ
pSZcFkkdOb1s0io+Plxol9Wakx5Lp4rdvJV8kWx/n3ya7O00ayEarycM1Ev2
9E4lDTv2JiRbt5+NT394R6grta9mxOUcmqvqeP7Tre3f1lhbyfghwdJwxjbc
9+3rZYYZDhHJEoaeSWEjM2VaDQQy+DhL12/Z/mPdZcvP5prnZl7VtEoMM2XD
m2i4c3isXzxjAjTKxVMlN9Auwn1pFB17gZSCfQW9gig+iCDmSrq4aFQyKNE4
h0UPku9Na8EIT5Znrbe5uo+wL6sfzXmFAxvx/McSpKDD5weRNU5345TM2n2+
SMWtkjYEgzpgKk+UxM4nSeuOA8r9I8360qFrC9bBkE9bhmxaJdnFaAylrUsk
+RPdyrqU2n4duSaZAoOviBATcDU+wHrT+D4Kn9psyjU8DKG59T31Kza5GcRS
YEFXSU3VTkxH9o2NUZ+17FCbgPS4VCdItVKNIo00oDZwAhaUOW6st8IUfrDl
GLedBuORbXQruNJsbKLCB5xMDE6uyb5FuXUkUq/jy6kvlKy1nRLN89+nO9oP
uFXM8loG+q0tDNiL7EFUcrQc8custl1fiUdhKXo6BUkwvjSEDS/aj7zIdDMN
LaaurgDuzhr8YAm+aNgliPKFy0k2lY+5L15tjluIDh4ZVmf7Wy09k0evMMB0
YVelG38wCwsH0Ne64nXxG1quZZg3qmjXXVw3e/Ivo3aVUXsncto8W6blOLco
D1eycgzHGjkca9zFscR3exWe9Rcr+YuV/MVKPgQriQlulutX4STtO5Kzw41b
u6DeJSp5l3HQeajbLAZBQl+FmL7zL8tGR34tCqaJX4GjRorgVlpOkSLj2AGj
m4PsW0lPqB08pPO0ajsELuSxv/uaddhtRnUiqAQeoq2zrH5jElAcI6AIAVR4
TEEumh30aaZ5lXhbpNXSfDmdcqel+zt88n5gK9ZNfm2kjUTTRbScnTNgHZKP
X7ET2SyViMKGYeT/a0V5XBMqJbJszP9vgANzIrVUzsIL/9efjeNKKDnTEUr+
i62H7hgPzudPwoBuuT1cGrI2aOTiaE+Sscw+QalcafMKtvm5lbgbXuEdgy1n
aiL69ImRluo2I1v2VgsLcG/FMO9PO7iqEYLQc2lWZDjJ6tE5McrXlO5Eo3HB
jMkzBsz77KzMzgRhpKU6W4oZSluiEiBRxRzpN4o17sT87RzXbqbnqtsfqqFe
q1GgmBeSmEYseTkX7CFpgCy6iQtr3TAC5D1ufmc8Dii0RZVkfIytj8kpmeGs
u4FlcQWVrZtoxvrO5xaOIOvFCU+G/Zq62hRh0W4n21+mY12zEBjNZFYqwQhD
trl3Jq8KEzpULQjeSDxo/Xdakm9sSY5JYJj2VCKTgedQRVnaFsGNYi/Geasv
JTiBVz1g3yd/+4KXNTBwdL4y1UrnGsAmt5oymi0dWJorgOGlmQQfopNvjn+g
GOhWMkwk6tSCPWUMsKevj5+d4BNdZclJcsosv2zCRdx4wSrBgdA0/sYjG6yw
/4wnk+ROqutHjwo2aDXLcJ8Z8Iw/cYJ9kNwkGfZO21B+7Y0k3AvMvFtU3TcH
n3Y1yI+/KdLyS4aaafgiU1AfsX1yFO+ReUCf5PuuqS6o0bYYHS6ShaoqVYZT
Y4FPUBYFrF1P0CYM5qUlZghztVYjPYAMLOuYcDD9jJEy46gyZrxQOyQJt+Zz
v5rK7OfHLiR4kgvgFROal7XSdMF1sFFLCvwkRtiUt8q0Q+o2vQ+YLaEqd70u
qF7ng+ZDP0LfA9qi63U9uNEuqJHPW7W2+BOG1/iJ9FENGytEld0es1hzHdxO
rK1U3NaN9UN1Ym1SaFuvhbY9+1P2V+hsx2p3ee3mBHf3P2zb1p/Ot27vUasD
6Xiwt5+e0h/j7O5d/mKy9UvPrYx3Kli9kdidgPL2v9KcU5iEKUr69VakelHA
FTU336KcRRPjH/YB+23BFNIic1sG4FZMhfU0oHGi+UEt/dSUE8JekWZgwBwl
Yde5AR70ungL8vs1gttgVb/yL/YXRLx3NV4/BKOuVidBUhNiCuOmV8vZLC3z
f7L2NuO8fpGCjkJH2GJcQYs2ZmbFIqbPizBaUBGEtEQM1KMMaC+pLxfZqvpv
9WrSel4ISGHlFaehg4LQfbAAw6pyJfX2ozGYYi3sLFkFQu7TkFN/6v0aNr4f
frrxGzfYcJgar4v8gt+vMqkmN1yvwTV/o6AD/HqN6xDhqr9dcWy0hG/Ysnk6
xhd8eYTPPwVlCH//5DlAfrnye7LR+PwNJvrqfOQ9rK7f3HuA476BN6E/rPqQ
7+F1g01Df3Ly4dbNT8v/UPOJsWbgpUPDS4cOLxXu3MZrO0Rq0xQhwIQFmxpU
lSKVUcBKlkiS6HcdG0vFPcioue5SSmiGAelUnFTcMds6VF0sO3QoO49wuHwr
4/b8mMz2sL/c/iO2/7f847NlAyv8WkUQkbFJt0oBiJByVdCoPSBrw9kVhF34
dEZFep8VpTDrsWTCb5mjdbXXm3gs+vaWlbBuU9I3k2YXvG88Un6ve9Q+2qul
zM6NZCymKcluikbOuVBueonVEWispCWBnjiAig2puVUlR/kEtnj4dTadztDj
3eZdd3ddDv9NTl2c/LF5F1oPHGl4G4Ar0xij2A/uIHclIMKujHlMMbmaHmSj
AELK8bPlnNnZEr3HAjlUcAmhc3Bnbcfwzm05hiN6DpEiluSP5ug1oL/sF29o
uS63sC7S3ZpzDnJg2Wl7cM8oMGbnQqTMKigU5wMCytd0moH+dVOvNeQvMRqm
mwNu28kKXjQLwebktmiBrYpfOFMX34PnqVHVN2W2KLZiGCByKMkPKNTaRhTc
/7o5gXRKmfjpqKbiP3xVhb0pLn0nWI8AmXuGF1RRnVWN7ckZwLVkaAGFlpVC
wURvM1FWg419uqwD9oStm5mKLYPS7hUXeFR4/DPF9LUZ4qlpfi2ZaJ2bYGEo
nLl07J1pNd4h/nKRp87OGQSGwsxMkiUi+9BwgjLUYDd3RbliDjD+g441Y2vo
PyOHufNAttIV8P724xfoEg10Q/igZt2FJufxazpPDmBBP+Q/4WezsxpP1Bv1
5TbI00C4o7Aav8PgtFN4I9V4JhwXySbg2p7KVhIW8wzL+2aYD9Cs4GnvwbMt
cM4Ia//0JcOUjNKq3hmsZhzNzjWt86SgVSFQgZNkWowIqZWjtlUbhKWEcs7J
uLL9GCiuzGXyBiyQPPAL9eb7q0EcsnJ6laGTwL68x7ps2HVZsSyhE+OYQo22
awP6Mij8OESTeD0XxqMbcGGgEi09AlrgejHfywSkKomVOng4Bsp9i77aYlOb
sfnDNlcMTeWDwXV7AVos9qbVs+oHra/vKREq5sM8UrcFLFHMb3m99ybJAzJe
T1TXY1HSzOm58fc+pPe+WEijFEzVm+UUx2X8tiKif1Y38N5H9F4mJJtyR31i
2C8T/bnee1dbvc3DFzV+G5d12MCGvwkHUKefHgandZeHy1CBENnb3Sd2tVIF
Z66m6MaOJe1nKfBhU8AOMVRacULT2sBKCnYkMIP3NdWI56Ix+VD8wWFm4A/H
RiIfoeSW2DV4M7Zny10PHKe2K3IcqQLlFwUjdLoiLOG2KTthsZMPh+8lTQJB
pmioDwbOmNQgqepiYbJ/vdQS22klqnRb0NaopstwkcwdHSWLzhm1FIgcNZva
gQ2bylxgQVj9txIJHmZrN9Wepoxjx0RszP7hzc4++o5HsXdcpHktUx5lJTWS
314QRMocziSiWu0gVvFSIDuoV45oy3VJikqZaeIvZSB09YklGXuUTVKMsH7P
kgzfzRcdyit5r6xXS3CeKpGkLmrsWJ7VLRVBOVnO5FVicjsvcoxuloN+e6cl
I5yYykAEETKnmJF5MRlCo9f6bK/Q1ElqR+Tz0TkmJ8Yy9WKwR2ezIYLnzylt
79YtWKbZrJgHi6ImmmaCpx4hjuiW1nkziKksztffHD1JDqZnRQnyf5Zsnb8d
T7ZiwXwxjJB90T0nXx8M9+/dH1h4tcrsT6zxgsG0MiXd/C7XTKJzGowoBlPx
9bODQ+cS+ieM5TP4f7J9+OLkGBZIv6QkBNiex8m9HW/mgli7RUbOZFZv+eC1
3Sm6jn7fuVQUePghOxVfwPbhD68pmR9+w8lM81kFlgvGBA9PdgT4686jfVQP
bcYPTYijiPaYgIE2uqjVVhuNECDRxlaI64LU/vknyRZ4TVZa9EkcqiHJlSzk
ZAvOKE/d4v7B8o/LdFIPiWinIJeG2fi8GO3Su37R1d2ape/fsFcMk1q6yElz
gZLnyRfJHc03azaNkHwgypGJpQDdcF/GW9pB7lkxzsKzx4fOx5Ukv6IAg3W7
Fz0aNFpncjwflZes5DqnEcUSeT+BnoU+Eb+Qr221jv0BrKDQg+OT4eHhs+He
/eH9u8O9/YcdJ2jv9o57zBW1sxlscJ7vKwcBB5801iGcPE0ciVz5mwsOSldw
gHlLegRWNTNtsxCbNBvzWFAYFUQXaAC/27XfKXYS34NxQAwCRm6Br3bpKymx
sDcdT6eoT42SwyUYvZFb9YJdvkBgTpoEEV0IpQDqe7fO9lv9xu7r8fjo5ECY
zu07+8FI2tbZZFo1R8r5DpIIx2Gzn3/6+acX37z8+ZdBQn8M4K379+7tPfr5
F/xMVSweSl6J7CbXtOX6SCV2ESLqJ4ONcQacenIN56SoOMZy4fVmszLdphHu
gg4qWIzYZI4P93ky8McgeYkiMJjKCUohetD9Rw8eMQTTjc8F3t42FxpTz9Hf
eXg3HD189MeOHgbQc/T39vfC0d/b2/9jRw9jahn9q5MDHj394Q775QkpUi9p
7WGML+00Ht7ee/CBpgHDYEn3UqOAVxV2qyKYylIOjg+OXL62tlDzXrRCrpn0
V0/kdPYGMyqqal9rykZnqmZNUYgcnJUZJ4U7k6dYcqd0oyuMdFs52TYh++8h
GNdZUCUpbBS2pGxjUGRJ1cP3BwHo6jxlzRL7G0ja9PHh0deuoIR/Dk9Okk/J
NkH2GhpyFtEzhEseFVU2LCejh3v39k/zaghPDafWtucqaVdNvZfY/fGaUneA
X1q4F9PptGpxe3wAIf3jXzL6Lxl9czL6llfy6nYs58pW7Y4+9PuZ/76xYe4L
O51ruN3kNJUY9D3PSkISl0boq6JCGYWlJsgT0K9NTz3wnRE4M/wIzv8/+ZPQ
l4TeiyH+55/U9NP3R49sYmYIxU12glubeHBiI5jBS8b1tKJ34DAyU2y+Csv7
tSerqpa1pN4p3Ak+XFaBLCQpqP20xYlHApI2sGMHMdYot/4u6o6uwhRLz0n7
8CWqvQPWAX0snr/N9SByUbCHskcrr6GFXrFpbgZWGhBElBb+fONFpgG+dE+8
4J1YvRj5ySmakGNsQw31MptnF4J+Ck/xsNRFXHVVTVZauIaiGUQeBou3NQa+
YwACwto17Y7uoCNemBbJ2CeQ/iPg29NMG1MZB92y0j7DeCs86wKrpgzp4WSy
eaVeXHEqm6+BOGAEdc6JF36KXEm51UA7U+zfd6Ddv0w3ej1wblhCEh2ocK+t
fzORf7RbNHcvxWyzrUozWCx3PU1Hb/3JUfYTPo1z2rTfMpdCvsQgD9a3qT+7
bz/kkNKuTGfxLKNuDA8v/4i5m5ujNdPOcYrG9ElycjkfnZcwzX/arrb4NdIf
OxkbU7q/239SOTXNHWXlXDvNlZo4ymX2Jg+NyrVx16gW3E9HxX2vzECdwoNg
qDgs9cmWxvVJto6GnL7kkI0bTGo2K2tSHuVLcL6PPQdu32LcLm6vWlwIQIzj
Z12U+TusoASqhVUpJOw2H3c1KVdobdjAYjKE/2EqTUb9gBOT0jc0gc2gTfVI
UT6HODrMI/nqGQmZoIEAcQuvp0W6uldLW+FHY1FwLhoubc6UHqPtNjra9FAm
tigzC0bzxONvIr011hjj2cDzcjmb4UkdRdeN1p/qNLmsR9UmKeZGPqE1G/5E
sHEU9Y/zhUikTUFU9juTo6rPKptO3Gqbo9ffnlA9PNhcb9sKa3aTr4sLFMMy
atPZpTMoYyqn3dCOm8ThR/lMbudpIWNof7KINf8YiEJlNsfZsJSJagEPQslp
T/H/3921NbWRZOl3/4oKdcQCMRLmYnyRwxtBA7bZNpgF2rMT7RmiQAVUW0ga
lWSbmWX/1EbM077NH9s81zyZlSUJm+2d3X7obqFSVubJkyfP9TvqMHU7E1qY
LMMoiSw8UlHtUmI1wO00qxusIv9ciIDRRlahgkKhHo99Cl2ZjNzphfuBJcXu
wUvswwowTR6ri2XEsIpfEfaGpPF80ka2/KbsASTrRErPM+p4EHX8zMPLVrs4
9nqOH9jGV/zooXRprQy8yRcMehP2jBAjBrqBdq6TCxQKniNLJbXb4uGNydDD
aQOq/kgueXu3YyLHBQgCuAcQ9wY7CqEKbfoBqyKxb7O1tGkOx9pNJmRqKtwT
FEhQ68vDwhsi+G7DJyWjgGPNM/wAgSMcJ3BTUrhv3JwOh4i940TMkciVI5Qr
sLYdEcfz9GuV2wgFBDQda90V0yyGzmrsDGpgxtqNF8Xy0fBoJStAAFOerU+O
4bz0j5jL+lGSWbOyEu9QjxIHMZPOfeYfI/uB1nT48Wwn+/jv8N8TwXlwHwUm
HK59d1AHuHLj/8OfKR3anLVzvLfz/uBg73B3b1dbXWbPO1gSj512nVnWc0Yi
5uQ6EW47IOOI4G6h0L978WdoVqYZfpyJPxelzGDL8FCYbIlEULV30RZmSaEY
54BsVzEMEOyvv9zRTSnb62YkBDxhl63dK+ooU6nWoK4B/WEwpSB1P3Eto4Vr
Mvoxk+JL0QeUR3iH6WcDWWWSlGVJMPkyFICSeDTtlHEODyvUU7JqwHbKaqwc
4F8+RsO+gzV+Cs9EkHmJsgKk64AIakmJkAybG4b7dEtIe/AABNAoGpKc4T3L
GytkxDZs40xi/MMQIt2ak/gtnh9nUCVzj+X0BQUoNqUlTvphIq7PISIZFcr/
OiVGGufX1qgzr7RYvLgLQC1RRps/ALHETkJCBsiC6LwLoNHvJwWVKtohFN0Q
sH+EjvnFd/0iRQ5lJIgh2mNOnbRDS0gkdO9EvqfrYZ/M43cFKJEzXwIZK/mn
0s9a3pBuUufmNADlNuNacXiClsbSGge1HKilW0aR7peXBd7slMFmj5lA3HLz
KHj6vHTXSA9SOh1b9oZfafU5ebq8UqLEdaKx3xcVj+rbN/60uYF+hwnzGvim
7Gsr2wqlceidWUNHDFbxGaBsxIp729M2QaUF4dbgARgZLwaqkpwTK+WuMDpf
C5VxFgbqcG5VVduvQm6D5Pu1YEGqDcOh0ePLI/MuksrGfwvkY/M8kBe9Rfas
Zo3FXladt//Rj1GIE0Seu+IL5tIpZY7yUQlYWQbD7m/lJzayEFIYmmW1PQ8j
ccPjYbrySfWTVFCjoaS59piTirpIVWIW+nDkfcGS/Yn+Bfbf5DWdV87ctJI2
jqj4q1kFiKvSMNP4ZWkM8H9DePqiHF1TjiSCX05RK/WaMUwzUo2RwfdRd5yj
F49puA5qaqAbO80IpVKeUlDEU1d5Q8ooRT5zv1aLM4hUGp9JKJhWtWvO13TD
3dB8m5nrEI4mZ7074wbeByATUMMTRN+b1XVSty9tw+VYBNAN7EyZ+DgkEtB5
WuRXCqaAHOnvD0KXja+zlC7S5hTfm3NIyy8nEXDxdEBCvGf2hYUWoUohl8Fk
FG4EfuYWb9bu6NObXsgD8J2aMW5KUtyjSn69yHauwg+8zH0b60x2kzt1BBG9
c8XO9fTy/TzwjJ6zV1BSyrXOj/mKQLWFlIZZU7mYIY+mHYTUtPSCePTS2WPg
MDwHJ9VnA1vC02EGI88TOtuMP5LsYSjmRf0L6Im57ehxIEom92AhwmMwcX/7
cDsdSCzdiu4Ea2UIIjjb64Gru5sd9YscC9xG/fyC0PSx7yDayihOWxBUPbVy
E8KpLU9HGM42qPLRVBMs1O4zXAJ3Nc5H19pRWQTydR7HvcTgAU6FBZJYfA+x
xxDzB9bY+QSKOJTJASkwreATbR2lehTjaHT3TqmrgC9a8bg+RyTQZ1DJ7E2D
3ppBFsb6ul52T589ecE2icmdBvSbrgdKCb8kkQ9ljzBYN6Ot74y11qGdjasO
/VW1ZRhih1S6HSq17APm0/7eyRv46iTYkV0m+HK10s2S+/vo0T8NzqvRy+S8
LRrEP+LUUxyCefAHTu9DHczyS+cmHz0gz4Rv+lYOer66vlbXsmxQHVnqsMZH
+Pafitsuoscsj5GsmDHkJryxtbXinqFSR8iS6mYnCRj4x9k2pFO4JxWuaAE2
OUzxxm89nR9mAoNVIg07CYgwfKgj23VPjrhVfmjGytF8s2QKoJMZdb067sft
6Ryi0cSUls9E1B894uUCRMyWKbDljBZuR1Hf5UaOC1+86L7hK5vt+Ptx2W80
hQAY5qHpjzd8B0DaO1fFJPn+EPTlAYngaIBr8w0ZmRI4jdoB01zM4Hz5swVo
IQ99qlL5n02Ham4BLd3NRFR8xRnZ0GdoUp0dSBrJ8PxXNyo8K68nydUljHhw
KZ39tPeHM6I+GGlgC3ezFnR/Z9wDspPP3OXQaieg6SPSsTntqVeHqV+FV5kC
dbfXCyzCAkN7hNha6AMxZpNvvO9pgpFSzMNEauKdGgEeSCjzWxfgnrkwCpZ7
khtd36AE4gLF2ciHVO9lClaatmmlWIBkbARBklkYJdrLfV4+Ce4vyg7m7qPj
96/33+0JX3/71vNMapHChivaOjHgOX9Lfys/lIW6XVrzJzOPO16sPpnrB7Pc
QYxx4m9sovK73NmTIrObbw1Hd5pMN+vUWEoXI4DYzt6lThLoWpHWWbVq4+/Y
T2MeMPNzFev8he1Td4twUenK0NpKGRdkdoYWpWI0pSs85KJteeT8hZ8CgzHy
+OMZZPBlD407PbtsE0/ug6/zf22N/9MLo3KH+WsTNap5Le0srE/hz1HpyX1W
HJ6Fh1q2lKr8lvs5t4DmwTfX1LL872/u3OU/yE67axZy3Pa+IvLKmJYb3quQ
OFcQKPK404fvv1+/Srxz3vX5lB1kW8/Wtjh9j3siRkqYho2ePHnGNyprJnv/
dvT++HTvGJF84PB0NEOoA7oY2zF8KZMuBimAnfc/dbM/oD3EIaii180OF7YS
kxFzVm/3XwfEdp8tdSU7B4GuCdUrxLgqLwnfGrMZoy9+rRSNJKLRVlTzBaqI
+wVkHMh+egyF+TqS5NpPvgzNTG0q4OmwpFZSpwAapShfBlu7mp53ZjPAViKr
EyeN2qvoaQf7B3vZAeKCo8l14sbVk2J4zGPd0NkXxRY8lrDt/kQ+DhyK3TAF
mh+/v99L3gf0mP0+hNmqKAtvRBA4QPwgcLuorwvR7SLMNMt+eAq4iUqHklK/
R3mW4554rT3vdv8gIDEZYyv27Hjv5PRy2nc6y+dyPBxQ46DlneHx3kpa7/ab
6jmgmzwwL4EjX7XsrrfayJz+j/CpBYPtac1sB3OFduk+uOe+z5oSHNXfbEqK
FcIsdDxMWtQiBxHB03JBGIPRJHWO+yKPtOov8NtEVRW6aZpmRU2berZGruUu
CcfyblHQrUaHUPOVneJUYbm+8RQSkfgnY/xJAO5l2xdGTpQCf9ShH3HVF0pB
niTHNRmFWgL0BG6KYboBNg6CGCCm8NTBu9sERAl1LxifNSn7OcTDCkiO91CI
0nix/k3lQZShCv0rhN0JqdRX11motvx8OJ1olmEgNurZXuTP45Pv9n9UkEsn
yUpcG3cx7E9vBpV6fpRobp5dL/G22UuP5OJgqdhcMirdJUVeldiL6sat7RoS
LIYQcR0KEQBBO9iDBbfA6gIw8TptfekeDLsq+qsEl6VNH2bsPN3a2tzCvbjJ
x5/IOdY64gjuz5U7vBQexXQyHkD4OuRjQAy+rfG6ZepH4RXRpaA9gWOCuOaA
+LmTupeZwcjT9ntDrEIMpINUAcmPMdBMGV8TX9ERhma1qo7GC88IpkphTUMJ
djU0c+YeblqcyWRARgNIRRiHFKJKSy19ywtiLMq06UtdQ1Xo9SIvbGJOvPBA
/jD4HWkEP0g0bzy5t/4qt1Q44vJ48mole1cOPmWn+fiqcFr6hNtbMorcIped
E6TfeNkxS7dAXK86qb16RZdEwDEokTtcg3ZdjhQSMPTz1PO45l8onM9gLjU6
hsTtpUcfpFJnKDkonWzBLPawNi6YF4BKpuclee2QygMJYbmi+gGveJTsuG1w
JAzYvXwCYi47KW5ycA9VnkFQ/nUq+eKbuSXxkgVcyet1dTflS+bNP9k7ONvf
PWMlINj5A09bUMEhucSUB9u0NUpPUed30Km8Bgn2DcFVBEPVaHoYU8Vk3u+j
cfyiRYi8eR8iP6vRdh4K74KU8loiv+l57U33xN391he/SAuOJPDu4mwQXG3Y
mWU8vdCUowYtjK4DZAfdR69tJvIzy8piO0b36WqWBUBB1AsRu2lfFQNH277V
FYHjv0i+Fk2rEkjSc8hYGX7iymzB9edCuvOCAG1oS2gm8nuCMXU6BBjm1ZB+
5AeFGQ3AEAY8Xqzkc3dnOXFqpyN0oNWCEsi/Y1XHJvtSXVdwVvBur1AZ2+nn
WkPO/Y4HoEBija7XSipRpEndtJ14Lq6Li08kXXks99vRdDwaMpAv5+aSoiNu
BL60/bC8AKd8wNBEaDzSBgZVUnFBT0ANUGt9i3jykENnNZ/8CvSaiaorVGbB
fWqjpg1CMujNIIJiUpupZtWb9tfQpmPkrhtEyU9NS4RXWBqpzVTn4mRgXwWj
JoTqgZN6K9nvh2NkRjqoksa/qCEd/JoxUtyDbMBTuwo88zdFIc0TKCqMSc+X
ygScejqCxD1cPZON6okMIUiblQ6wvVAZprpSSHms/jzNJ0hkf0RQb5hCrn5v
lQ+2GEQQoqZvgE9ACauml5fQimMQQldfYs1IHS60IlCvajo2qZqUoMZtSq6G
XOOo7WuxMlGagkjqqdlyLdsls7EkIQVJ6SS4rQlUjPrDW9waJFDEfP6c5xcX
CHccVAxo2jeZpFgt7fQxsHbl+HOQD2Py2RuUNXm2hGJ/KfsAx+MCK9DgWc6+
LgZXzjyVHrHscoDPyxt/Wv7wu/WVrJO5f/n9+VKUVyCa7eHTqekJb+tR8sDR
Ak+NXJSP8vOyXwqCRc9t9AW15RWVf0qtKVazbUX7hrL5q99mWVAqi/0f/NCS
Qs3hdtx0HZrfCGzaLy4nvtbmm9eNGBFWetEhGHsHNbdkruoPYWMs9oO0uVDB
y031kAyKgrpSYVFCw2EKRTJTghqwPXrU6XQQ3wOyjTmHAnO8BUsENW2fs/Hn
uwjLD/K7CZ+isfUEowBJhXWll46+w2h+2yOEC/6abUeoNmm1jzB7ejlgfABS
wza9JFgCakB7/7ruOIa245ZvXmpHgTgtnr+W0KKQNkjqU8Ip+g6fGK6OfEzM
MGXULcOW+9SsHX2zbxWFL0BLRGzoPEaAQQ6jZ2gV3YwL5+qOIcJPQv0NU01h
D0lhhkZ4jiZSVrn/WkjiqYA16RWwoCr4cIcrAg2cNGheg0nl4Btt4fta6BJt
wZKNm9+2/0ODMCRF6HsOUmuN0leHOMf4ghIgHaUJyDDfi6702XT0KS+ZBJVh
HoDsH1E3VYM6jBhjHxFkrKt/FzWihfKuJR4TFm33A0yUeT2hfbvnvPwGuOkZ
9o9nGsFRBiIvdkZ++xq2vmkNTgTccyEK37bgOhYDopRVPI2kipk8TYxNiubM
lhywbJTJZhBgND3n9Tup4RaeeJXTNaCzGZiAFjvGAonE0kj9t59VrtnLwyCS
xSMpgzRVBttDZ0Paq1TSguChiy2WGv/mUNHozxPGpNPnqZZ0VN9LemTVP+L3
9JmXikEZrTZtz34+3nfiDOviet6RgJFGYaagDJNk9fKVPGCRcOph3no3GNYI
bDezC0dQwAQJz85NAeVjZXUDj9zko2jeXPtNM4RF8Lb66XfJd0DX+Lnv6Jcj
YBoYgQpsYtqrCeWeO8rt4mUO6i161WH4n3Z3pGFiMyQOkLLk8MR1LhlfvqCQ
OyBi5ZRvK2f74QVQW0/mE7ab3WqfCyZsUI/PrkhIwRw6Llsg0bKd1QvYGzJu
iWAvjPgowcd7G/QNB8Khx/8SK7kaWnousFQxj2r9e9wb4i2Xua2vuckdy72f
Ry56H2YAn9q434HzYHBAJPilbmRjeMPzpvEN216w2OV7b+JKF3+8uLef61Cs
Iz7TEIkUFf/1rxJ+UKmwvm6ZG5rbKQ4fu8m4ZxxG0h1PXg97FZ3dHHw8aBRQ
gFHd58rdfjf8frcZmITgeIIDZcplxesXOOlfqkuF/QO2v7IibPUUzcDoWsPz
CTkkeHNQoL/01pAf00wED3eVnEqgmUETGvCKdpg8hrqgiu64q+YKp+Z160Hx
pe99w8YTbrtZotE9Gpc3OUD9+WesS8wJkxunwt9g1MufA+xqVUAH3fC3AQQg
quA3I3c868gOskCui/MjmMVtRlqCNTgY89gAWcVnYGOhU4B5b+c+wVivZUd3
RmDklIVKGlXC1J7ECgx4JByTFv4IC+Q1qljekpxRV5wqbSWCknxQcC3zttKj
kdFDgATQTQhUg96U0DDCIh9d5pZZ5jX3PcWSecWwIQ/zpCBtDHOl8O5myRkD
uMBRtXfSbFCZFKYMi4tS2q/h6nslCEjyPDlJVWLxM6TildQqfcVTpBkpBxb8
1EsrmAAHfEOFZmkwvTFXaDfxpPadLnAta1G7qsl1jIJHi8pTllqqGRVN9lna
NpdpYptuM830JaujPTej1dVLGfTq0yQcdYEamwQ+DWm08mp7nxP0qYmLJVv0
6rlvqDUJ3jm3mEhnsrHWZF4Ze4ntXzT4cdSPvqMy6WNgU5AXYh7VN2L/ysMI
krhj8INJEZh7u/a3QHiIdIHqOUfs6TnVTuqKN6IV1yt3UG3Uy1LAhMNOywDe
OoU5ot6AGSXPNrawXReCxcE9l6oMirVRzxbnpbl7NuK7x0IQ4wTNdR4E+nVq
XMo04RBQOQ5n0g3V5UXKkXhqTxJCOVwkeRqnhFrt8dEkm8HtDyqwAb7X4LYZ
inwWpLm+wYweAS1hWhTETyi1hdESAl+m9WHuJHyY9YJvoMTWTAFoE8tiqGIS
2r5MqKlEpkl2GSZnDrfqwYb1b2jbdKOwezRKrkgqe6JystEaACc6VfxM+s0v
Wa+lf7e+uvlSQJ2woxc2Yvc7+TF1gjpVaBdBOw8V1KTWLXUMXpByIhgtgXsS
1Ks+VRr4aWtBtc76+awbwGh5sgxVbTWHBecM2YdOH0XHgcreZMaLf/WLUIUO
h7fe1xqiOLglLqChgKMZ8ayCFsw3omluiep7M7fNtbpnQJR3EDNtieRwQ1vT
CB5uKe0Wa1aRNIXnTpchkfG08AVRjp1NTn7sau5qoOZxRJOZFW94f3S6ni3L
kyveoQQFiVPiyyZXu1zWyHHSlZTCA+hKPD+HDAOvf2Hk3IoIm9ySNO7d7DbC
2SnH9lKktjKl+Mooc27qDTovUFhgA6mPTIeb0MCBW2oTYN3VcFIiss913Bun
HffK8VPhr8D/GIUTiq/ODDdkneFxrWUAeah7+FMA9hl0sJ/Zk6oZIHFVaGAh
DogMeUW9OAxMfgLue6mKGww1r+5h1iLmfuDFVMeBh6ZzmxA16alm0gF5bzPN
e2iSMVtwXqyHoTK+4VTbQbTi9e9wkaBhRU1fkOvEjoPN73r3QpGPQUiyk+oW
NAkPrSV6ZXaeU0yXlI8gX3UXDbYh5q8FVfcghSYl4OYEepC+ioWjo8eTND10
jsOxd1CO8tv+MO8FwQV1RBHYJiLodSXrckFMzm9A4uTZb82VJJH6Qq+fULmd
oHB6u4wbqVPiNCWIRxPWEADqfuZqTGYrKpmfNrNdEAAW/eQM20csiTdA+xBb
PhoMZfRnzaNfTgcX9A3FnhAPB64KcD/RHbd0QShJZ041X/L+QWfdmIek17pH
kxaEaxXKuhA4EJTW3ismeVnvrvGk1lUs7Vbyug70QCG7SHy/kPvgoRNDB6T/
XRPyiA5DP9QuLPyAEPZ5M2HPi2s3Ja/PkSbqW4q5P1+6tU8pDVnl68wwhExK
DxWIzt/uNL0IV8sqU67cF9GqckbvDaXdIRw6mc9e/i/Jk2f0pEX2Y0a2+jn8
JO7pkWSchf3yrSPwdYGqhP/Tiqde87vbxN86GENNm/uCDgDi8aKnSlLQMauM
lMWZTJmM1IA6t/YwB5z8O/9nj7nCagZGlRJpvekqY8uR8vA4t1gtADqceQl4
tQHuZ69AJARHG+3gCSuGiYG/AHBO25Slm3N+Lxct+R8SILCzO1FflnLkyEy0
gny9QTUWarDVy/2j4gO5PBlekXmDoNjos6UcU2eOUeJZk626Qr5V26oCchGO
uTsWy5JuXT2Upp2H7091Wnk0sbYjLcJ1SgYkHL/etE+OOcSHBBNsDK7n5YR9
qwJqvUF7E/9NaOJGtSNL1QzJ69OteoRxyimf2EoAJolkjZwfZt8a1CiriIT2
vvEz6v4pn8l21wRYUgLXGz3d59Chh8ELo5vqymst6w36ldNKrAGNbTbJhBbb
GRxhfDEmzGboRTBSutzP4keiQ8XABBJHMKeGzsfrKerfUT4Q5hBiahp+Te1L
sWdpvY+DAUuMOmWlWp62MxrSWwKVSIDwXrl/mpLPELolAwrbwnn5h4PZlCIo
jYPoDgEYo6M1v8Ejx7n22K6F52vzjw0YxcSmVhJdIMTLxQ9OW74qNdsH/oPV
AntgoXj7+gzzd5e8Pq2Gt737vw3rn52FMCQGsxwXY2HKKbwoaOgOD4aNZw0P
mvq6KLbTGGGhfECTGqEKF1tE3qyf4edn8Y8cDSZr4is38Y6X0ST8bCCgQW+A
liTi9v1xfuqqGovcgsqdwuHVcFppnYvfY2PExltrrNvv39pY8VmhfghGivj6
IsO+YbJgRd1ApCikrcZ0WVvaLRh4BoecdAI4HEYghMVDIpPLSXHDKczciVE7
LYKSP+xIqyyUTOS18yhT9aPyQ5OA6iind/DRO+k0KmMV6bN3j/PjQ899TMnI
K+lfJRUAh+QZUTjmos+hhuCEm5xI6pxrMdr9j2tiS0aJXXBwS6N4oeEd/wav
wIwZBJjG5JVDPyt6Hl9xVi5xSb17ie8QRJ5NnOSqSI+yg8n30PHXl0TVViZr
Ct+RLZfZq2ytna2uuu8OO+tOWnBfOhoxuW5hpkSi622YG1qbxsdfSixe/g//
T7azu/vuUcQI2atHvzzKnEqUdTPK/Xuc/ZL9jv//j233naA2uScgJ+BxNnHn
QL8wMrPrfume40Wvu8/uZLapFKj2j39wY/aDQLG5YxzSGH6+fg6/oHyIv9kI
v+GXmAcOwwcEZ87tIhEBQIIf/fHRIyLUKySKpfajv3azH6A4PTqfHZExk3LS
L1616icTg3ahJGrdxQIC76RmoQB3QiwI6DdNt9eMQ95wfSLfavXB4e/W9YCJ
zUsOby81NQGa08bEXRlkfKR8pyGv+zbZ7LXGdZZjp2LyDPQQ2hl//GUNG3JH
xw4+HM44fIn5RIAX9CTEE3XCqs+ZEb8vrz5W3xfTPtWxjxqYqXomOsUEKpFA
SDpq3znoFV+zMvtnEF0PKq9qG+Ne3llHkeXmGzTxVCd5+Lj7l45JM9M0esjz
8y9mckcXRzyme/c9Vhim7af6PNyDbXScxblmsQqAOs/EjbGbeIYPfKAdRwf+
4KEOfBRJS9xri511O9kZZ/1gxrbW2pP+fznmIW1+u2Ne25PZxzzx+Hcf83DM
hz7mi3HMP+AJ/0F7WmQ/o13pfSBizLDBCT4QbN6yu3/6/ribHb3b23YTPN47
eP9hLzt9u3+SneztnO6/PyQz5oPTBWEunfVNcGF11p94RWV90328Qxyz/FeM
SQzHXMDLq1dLin0MXv14+9PuawNcWVpKc3L624PtHf8I/vJNIi+tN2SgjUEB
pnE+LvvY6ifbPyLvyUXODdTfGI0Iyg8BGx/D0X2T+tYb55eTVProqiIlmNJZ
SATANjjoULyBpN1C6rUD6m0Q9TYN9TbcxzuCywC1M0yZQYCu5qg7NajE4KB6
1YTPa836AF0CbjDoCFxRZ978Agv8Wz9CWz38e4tK8EvAMCD2k/S02bVkpkSL
ZvUzu7wRpCNqSmiqu9wGBI9LokqEVGUs/xQuD/Wrimi9TrTeMLRedx/vzAYG
+U+Bjc6upCB1grG2LjFVmeb1WGO/j7Xc6bH7kSSWOb76zAUpyFBpxwwO7Efi
Ggjqnw0MCYkrw4EgNIV5bh8CWBe/LqwVMUXk48IO60b8EOHBfC7BkUVhRYxo
MooJJ0jYpC4dNvgp+xsxn5RTAgB2jba3kmJdcQ+ZzB2p3k27jogjD4svxtlU
iy/S4iUJTRM5BvZXxKfl4LqAlLNeQ4JX6nxjGUyO0YCeD3SCT2RwDflbvSga
y4NwR7Wfd3awgaf7D/59u/kguSF/Ba86Nz0XTzv7llMBg2AHsMpC1m3Rccoi
Zg/IW2UJbb1qkGMSQHLRjPuMDkEpVF/C1FPMi5jL3q/Lr8V9JOUand51c3rX
3EeWlHSs3JSng57bAbzykxW3bZqe8Vm2E6fcGdHKZX75Jnafyo1qFIizhwpy
RD1Od3gcI3a34PBLcXEsh6aGPdqsJXFrLHFnYG4XGFQn1ypVPQQnXim0MRAl
kJ0fxg35Qj+46TdvE7pqTRGig3ZcXNxe9D1Ezf5u+mZyfyc5sBfKJ3MWBwAR
8zkv+xgJ0czkivricUbarDH2ersn2/YeE0UaC2KyPziBgfmrkD2IIdP5+Wyg
z0jJV033aG4nKVLXptEtVbYH4EuVxVGGHqWMQWkDDBJ1h62opq9/W586zu4o
MSMpQo6Y3/YjbMjgYNGBfdnhblgaFcX4zGRlLXEj2s9uDLNf2Gi8F+SWEqgJ
tCmyD2ptFAewWTTqmaifQ6AJnB05jTlCR1bRwDTxHvaoJksGhWqcDhHKXsmU
8WllUj0xuCyvpgLQFrI/CUVHBSusc68ivwljFzY1MdCiatZOW/gOL/Fa8C+O
niyDUJdA0kokitdekChe86J47YX7eGf1NtBPxnqYGbfUzTeiqkhun9OPGi4/
dQL6ABbHUeCguh1cXI+HA77RWbxxRgsU/oIsJKXZzTBIZiPyej9pUAFAYk1M
vrlXlwcSyhwzUwgfsx10kyVVhdeodPbKZQQkW3xluDELp8LgTvxNqImxVe+T
GEOjHMHqUkqIMyqQlnhb+ks73uLnuMVup/0WP3cf78ROk0rrrKVqaktSx81x
gQxTxPGDHAwuupWaZPEThXZJqErKofO53iG/uxNr4nEzZa+amNy+xjfNTTZA
VRcYKdzXDIYjNCQeY0fFTVSe5wTW/CI+HoljVzyH/R6HBpbClj5Lhhq1LCwP
uXmI+h5nrHTGVu4eentPrm/T0wdKjEqPdQfRjhoasngQhoM494S7KIGZhpMX
hFVWPPU9JLXrAJSozyKdVSmy64HZ/Xy8HwoMmgLLFRIaRsKFl+4gcbUdW1g3
H8s32LPjyaugOt8QQdsJR0dojiMA6iUqkgrBYXtGh+25OWzP3Ec8bOCQ0BxQ
75mweN4BShMxikCoUJk8xMIBiJEiPqS94BXpUz+jCxv3L7DDL5tEZ+2y9789
CpLEuVlv+lZU+T9Ld5C5hMnnsnuv90533irvBYm2s/0lu+GcbKHjjKu6fkNT
u3BfMNSwdfHuP6Xdf2Z2/6n7eBcYWlXtakoWNaqGY+t6jKXjawpSeUPxTxO6
vS+AmTdU1C66JjXocpt7NraIOk8NdbbcxzsvD7HuCGxvd1GO4U6uQ9wyN3pv
QYU196G2EDSGj38Rdo2H0jBnfw/5QpP7FiseIru659RxxigXx5kB6YEjIajV
ZS8QcBMpqbI9AD7+0hKY1HGrnbVunC7kCNhCZzsQ5AZq+G8IfYkFA4KcTXul
7fkdAofaM2s4QK7VZH4PyXJ8ASJ+CvpdorN7SjS8+U7xfSRFKSaPVe8jTPgE
9uwrqqwWH3HH+560U0gwpdqoFzUWhob3DFHpuUwZQ3WWMQtV9cGae4Jze+c6
ScLjMcMzsvaEjsiWOSJP3Mc7uvYVWwIv2DKuYtHOK9EusYnl94TpGVRiXdpM
RDIqH0+GI6ffxr/uF1dMBuTd6jGXtFJZn0gSsgjx0opZ7ThESiWQCne1Ei4s
FsTidGy7qEBpAp0Tn5iO4PKgxGZQT5ozgZkydZx7FjyKPj8IXsD3juLKB2g0
zracTL2xB8LjQlDILm7Jpac/p5/EtcRgsEdSJjBfU7XHLCioQM5mywcKS4b9
QC6IUWGMz8xknLg1y66uDfSFsW6p2Ixhj4xf6H4nj8Ltf9GAMgpwTrasZ3Ho
kTTbFdWxav3qnMrV+LRRvGvNxLvWNt3HOxGe+TkoBKzfH5Cuyla74FzM8f6j
oQLA7YNhf3h12yXBBffFS/pfYTyiO2KgWDhkZO1J4lHRn0KLa/toP1sG2Gc1
zLCaA68tsFjHiCy7wso77YAXec5y4bsUPadys+LTHyQDwF+4dD4ImnaMTgJH
LA/Li/mJeB878RIq/GPt9eHIB6HKZ5sv1oxH5z4O6MVlK8Xn1kx8bm3DfdTd
lgBmO3QhYHaoAqbBfRRPIWPj3lu2tipAGT5dYiqeHquP9aYKkUzC+ei929Jl
A2G2supvBLMj4geuxQd9EVBiGP4CHIt+lnxuIKy9K0feKBiB59WOuUFjvhte
AADfRXDoo24eOAQJbvaCPsx4NBYXHfmx1nmomraPABth6+cG3/mB09Czy2n/
suz3ycuL1WABxy57vOGat43ClmsmbLm27j7ehUx8CZ5DG2bqZq0+3irQy86N
0NIbt/Uya41gu8LvRZcMYlUyW9RW4ammjuNU+dcH9wfBSOWDFNCQkcd44YOl
bbPGpYGPBVqnOkYtdTZDGGcQqp2kDlCxmCmlnWP/+c6OvrQX+mKnnd9hebfh
upXANwQxpFpOPJgZXpl+6btSUgW1O/wvvSfQKNKoupnF1rIowQuVOKNwA/hS
UabpSpu0DKP/2biCuNG5ZYFEO5q1JPPezZW6KoAHTzuQS7Eg+iPmbo+OXWVP
8GdPV0KfKFSxT3lram4puhDZThA7bGJRmnTqz6Jxq7Qi0l2MKV5Csk+/lC+D
tkT7Rs3Q1z8X3lEdd3I9Loq4s3jY36QVe8dPQu94doDXecu/5kXtNVBNZLB0
9dDYVjlH9D0IdWkl2IqmEr4hkF4Utl0zYdu1NffxzgoZFC6oJhR/PnOmKsaB
lsRmXZpptPp3bwrbk2yIIBwSV+ljc6LmYi7F57zuF2u4+ViiADIlJFA6Vqwf
mEiaOZ2q0ozMhgKluS+sv+UwSgLg42n3OiTxidP9DJ6KappvAbrfp6y145ZK
blLBt02x3yQuMqZ+RDcr3R2tRoZzVumnwfCLu16v6D4lTsvDv95Bur5EP161
BsMWp88ToEhFEMNj7LfhOPOT488x5D05Kbh9U/39vyqnZZ1gu52rYbY9zq/+
/p8D95dJceme+NHJs3a2k4/hSs1+BK4YuG8PcrB/szfTwcB9VUFzwuPyUz7u
ZW///rer/hRAt3+fT6DLz7u85z7s5oPSmbIH5RX4JNvZv5Q32YlTEnP33btp
70t55ehYTv7Szt78/W/jHDapn6N/HQh3xCAlULXnBIJTo8U4YrQ0pA7WLhdF
DxourBIJvgzHn0hDsoVO2m8TKt4CuNLz2+zD/uHh+w/bvotMAUl1nUOM6o+H
GAnZOd4/3T/Z23mpyXsbaxtr+vXJ/uv9k85b8J0tvxlDKCfX7tUvtjaebm2s
EOQr/3pv/7SzW16VE3ftvC2vriEvAZKR9xErErvMbO+c7n+AYA90lLjsTy8v
H/03Ex28JOTpAgA=

-->

</rfc>
