<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-macaddress-on-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Media Access Control (MAC) Addresses in X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-macaddress-on-00"/>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <author initials="C." surname="Bonnell" fullname="Corey Bonnell">
      <organization abbrev="DigiCert">DigiCert, Inc.</organization>
      <address>
        <email>corey.bonnell@digicert.com</email>
      </address>
    </author>
    <author initials="J." surname="Mandel" fullname="Joe Mandel">
      <organization abbrev="AKAYLA">AKAYLA, Inc.</organization>
      <address>
        <email>joe@akayla.com</email>
      </address>
    </author>
    <author initials="T." surname="Okubo" fullname="Tomofumi Okubo">
      <organization abbrev="Penguin Securities">Penguin Securities Pte. Ltd.</organization>
      <address>
        <email>tomofumi.okubo+ietf@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="November" day="03"/>
    <area>Security</area>
    <workgroup>Limited Additional Mechanisms for PKIX and SMIME</workgroup>
    <keyword>MACsec</keyword>
    <keyword>802.1AE</keyword>
    <keyword>X.509</keyword>
    <keyword>SubjectAltName</keyword>
    <abstract>
      <?line 57?>

<t>This document defines a new otherName for inclusion in the X.509 Subject Alternative Name (SAN) and Issuer Alternative Name (IAN) extensions to carry an IEEE Media Access Control (MAC) address. The new name form makes it possible to bind a layer‑2 interface identifier to a public key certificate. Additionally, this document defines how constraints on this name form can be encoded and processed in the X.509 Name Constraints extension.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://CBonnell.github.io/draft-housley-lamps-macaddress-on/draft-ietf-lamps-macaddress-on.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-macaddress-on/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Limited Additional Mechanisms for PKIX and SMIME Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/CBonnell/draft-housley-lamps-macaddress-on"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Deployments that use X.509 certificates to identify a device by a Media Access Control (MAC) address need a standard way to encode it in the Subject Alternative Name (SAN) extension defined in <xref target="RFC5280"/>. This document defines a new otherName form "MACAddress". The name form carries either a 48‑bit IEEE 802 MAC address (EUI‑48) or a 64‑bit extended identifier (EUI‑64) in an OCTET STRING. Additionally, the name form also can convey constraints on EUI-48 or EUI-64 values when included in the Name Constraints extension defined in <xref target="RFC5280"/>. The new name form enables certificate‑based authentication at layer 2 and facilitates secure provisioning in Internet‑of‑Things and automotive networks.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="macaddress-othername">
      <name>MACAddress otherName</name>
      <t>The new name form is identified by the object identifier (OID) id‑on‑MACAddress (TBD1). The name form has variants to convey a EUI-48 as an OCTET STRING comprising of 6 octets, or a EUI-64 as an OCTET STRING comprising of 8 octets. Constraints on EUI-48 and EUI-64 values are conveyed as OCTET STRINGs whose lengths are twice the octet length of the identifiers. The first set of N octets (where N is the length of the address octets) define the bit pattern of the constraint that the address must match, and the second set of N octets defines the bit mask that defines the set of significant bits in the bit pattern.</t>
      <t>The following sub-sections describe how to encode EUI-48 and EUI-64 values and their corresponding constraints.</t>
      <section anchor="encoding-a-macaddress-as-an-alternative-name">
        <name>Encoding a MACAddress as an alternative name</name>
        <t>When the name form is included in a Subject Alternative Name or Issuer Alternate Name extension, the syntax consists of exactly six or eight octets. Values are encoded with the most significant octet encoded first ("big-endian" or "left-to-right" encoding). No text representation is permitted in the certificate, as human‑readable forms such as "00‑24‑98‑7B‑19‑02" or "0024.987B.1902" are used only in management interfaces. When a device natively possesses a 48‑bit MAC identifier, the CA <bcp14>MUST</bcp14> encode it using a 6‑octet OCTET STRING as the MACAddress value. When the device’s factory identifier is a 64‑bit EUI‑64 or when no canonical 48‑bit form exists, the CA <bcp14>MUST</bcp14> encode it using an 8‑octet OCTET STRING as the MACAddress value.</t>
      </section>
      <section anchor="encoding-a-macaddress-constraint">
        <name>Encoding a MACAddress constraint</name>
        <t>When the name form is included in the Name Constraints extension, the syntax consists of an OCTET STRING that is twice as long as the OCTET STRING representation of the address type being constrained. Within the OCTET STRING, two elements are encoded:</t>
        <ol spacing="normal" type="1"><li>
            <t>The first set of N octets (where N is 6 for an EUI-48 constraint or 8 for an EUI-64 constraint) contains the "value bit pattern". This bit pattern encodes the bits that the masked address must contain to be considered a match.</t>
          </li>
          <li>
            <t>The second set of N octets encodes the "mask bit pattern" of the constraint. Each bit that is asserted in the mask bit pattern indicates that the bit in the same position in the address is constrained by the first set of N octets.</t>
          </li>
        </ol>
        <t>The bit patterns encoded in both the value bit pattern and mask bit pattern are encoded with the most significant bit encoded first ("big-endian" or "left-to-right" encoding).</t>
        <t>If a bit is not asserted in the mask bit pattern, then the CA <bcp14>MUST NOT</bcp14> assert the corresponding bit in the value bit pattern. This rule ensures that a canonical encoding is used for a given mask bit pattern and value bit pattern.</t>
      </section>
      <section anchor="generation-and-validation-rules">
        <name>Generation and Validation Rules</name>
        <t>A certificate <bcp14>MAY</bcp14> include one or more MACAddress otherName values if and only if the subject device owns (or is expected to own) the corresponding MAC address for the certificate lifetime. MAC addresses <bcp14>SHOULD NOT</bcp14> appear in more than one valid certificate issued by the same Certification Authority (CA) at the same time, unless different layer‑2 interfaces share a public key.</t>
        <t>A Relying party that matches a presented MAC address to a certificate <bcp14>SHALL</bcp14> perform a byte‑for‑byte comparison of the OCTET STRING contents. Canonicalization, case folding, or removal of delimiter characters <bcp14>MUST NOT</bcp14> be performed.</t>
        <t>Wildcards are not supported.</t>
        <t>Self‑signed certificates that carry a MACAddress otherName <bcp14>SHOULD</bcp14> include the address of one of the device’s physical ports.</t>
      </section>
      <section anchor="name-constraints-processing">
        <name>Name Constraints Processing</name>
        <t>The MACAddress otherName follows the general rules for otherName constraints in RFC 5280, Section 4.2.1.10. A name constraints extension <bcp14>MAY</bcp14> impose permittedSubtrees and excludedSubtrees on id‑on‑MACAddress.</t>
        <t>To determine if a constraint matches a given name, the certificate-consuming application performs the following algorithm:</t>
        <ol spacing="normal" type="1"><li>
            <t>If the name is 6 octets (representing an EUI-48 value) and the constraint is 16 octets (representing an EUI-64 constraint), then the name does not match the constraint.</t>
          </li>
          <li>
            <t>If the name is 8 octets (representing an EUI-64 value) and the constraint is 12 octets (representing an EUI-48 constraint), then the name does not match the constraint.</t>
          </li>
          <li>
            <t>Extract the value bit pattern from the upper (big-endian) N octets of the constraint, where N is "6" for EUI-48 identifiers and "8" for EUI-64 identifiers.</t>
          </li>
          <li>
            <t>Extract the mask bit pattern from the lower (big-endian) N octets of the constraint, where N is "6" for EUI-48 identifiers and "8" for EUI-64 identifiers.</t>
          </li>
          <li>
            <t>Perform an exclusive OR (XOR) operation with the value bit string extracted in step 3 and the octets of the name value.</t>
          </li>
          <li>
            <t>Perform a bitwise AND operation with the bit string calculated in step 5 and the mask bit pattern.</t>
          </li>
          <li>
            <t>If the result of step 6 is a bit string consisting of entirely zeros, then the name matches the constraint. Conversely, if the result of the operation is a bit string with at least one bit asserted, then the name does not match the constraint.</t>
          </li>
        </ol>
        <t>The algorithm can be alternatively expressed as:</t>
        <t><tt>
2 * length (name) == length (constraint) &amp;&amp;
((constraint.value_bit_pattern ^ name) &amp; constraint.mask_bit_pattern) == 0
</tt></t>
        <t>Implementations are not required to implement this algorithm, but <bcp14>MUST</bcp14> calculate an identical result to this algorithm for a given set of inputs.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The binding of a MAC address to a certificate is only as strong as the CA’s validation process. CAs <bcp14>MUST</bcp14> verify that the subscriber legitimately controls or owns the asserted MAC address.</t>
      <t>Some systems dynamically assign or share MAC addresses. Such practices can undermine the uniqueness and accountability that this name form aims to provide.</t>
      <t>Unlike IP addresses, MAC addresses are not typically routed across layer 3 boundaries. Relying parties in different broadcast domains <bcp14>SHOULD NOT</bcp14> assume uniqueness beyond their local network.</t>
      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t>A MAC address can uniquely identify a physical device and by extension, its user. Certificates that embed unchanging MAC addresses facilitate long‑term device tracking. Deployments that use the MACAddress name <bcp14>SHOULD</bcp14> consider rotating addresses, using temporary certificates, or employing MAC Address Randomization where feasible.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to make the following assignments in the “SMI Security for PKIX Module Identifier” (1.3.6.1.5.5.7.0) registry:</t>
      <artwork><![CDATA[
    +=========+====================================+===============+
    | Decimal | Description                        | References    |
    +=========+====================================+===============+
    | TBD0    | id-mod-mac-address-other-name-2025 | This document |
    +---------+------------------------------------+---------------+
]]></artwork>
      <t>IANA is requested to make the following assignment in the “SMI Security for PKIX Other Name Forms” (1.3.6.1.5.5.7.8) registry:</t>
      <artwork><![CDATA[
    +=========+=================================+===============+
    | Decimal | Description                     | References    |
    +=========+=================================+===============+
    | TBD1    | id-on-MACAddress                | This document |
    +---------+---------------------------------+---------------+
]]></artwork>
    </section>
    <section anchor="asn1-module">
      <name>ASN.1 Module</name>
      <t>This Appendix contains the ASN.1 Module for the MAC Address; it follows the conventions established by <xref target="RFC5912"/>.</t>
      <artwork><![CDATA[
MACAddressOtherName-2025
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-mac-address-other-name-2025(TBD0) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
  OTHER-NAME FROM PKIX1Implicit-2009
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkix1-implicit-02(59) }

 id-pkix FROM PKIX1Explicit-2009
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-mod(0)
     id-mod-pkix1-explicit-02(51) } ;

-- id-pkix 8 is the otherName arc
id-on  OBJECT IDENTIFIER ::= { id-pkix 8 }

-- OID for this name form
id-on-MACAddress OBJECT IDENTIFIER ::= { id-on TBD1 }

-- Contents of the otherName field
MACAddressOtherNames OTHER-NAME ::= { on-MACAddress, ... }

on-MACAddress OTHER-NAME ::= {
MACAddress IDENTIFIED BY id-on-MACAddress }

MACAddress ::= OCTET STRING (SIZE (6 | 8 | 12 | 16))

END
]]></artwork>
    </section>
    <section anchor="mac-address-othername-examples">
      <name>MAC Address otherName Examples</name>
      <section anchor="eui-48-identifier">
        <name>EUI-48 identifier</name>
        <t>The following is a human‑readable summary of the Subject Alternative
Name extension from a certificate containing a single MACAddress
otherName with value 00‑24‑98‑7B‑19‑02:</t>
        <artwork><![CDATA[
  SEQUENCE {
    otherName [0] {
      OBJECT IDENTIFIER id-on-MACAddress (TBD)
      [0] OCTET STRING '0024987B1902'H
    }
  }
]]></artwork>
      </section>
      <section anchor="eui-64-identifier">
        <name>EUI-64 identifier</name>
        <t>An EUI‑64 example (AC‑DE‑48‑00‑11‑22‑33‑44):</t>
        <artwork><![CDATA[
  [0] OCTET STRING 'ACDE480011223344'H
]]></artwork>
      </section>
      <section anchor="eui-48-constraint-for-universal-unicast-addresses">
        <name>EUI-48 constraint for universal, unicast addresses</name>
        <t>The first octet of a MAC address contains two flag bits. IEEE bit numbering has bit '0' as the least significant bit of the octet.</t>
        <ul spacing="normal">
          <li>
            <t>I/G bit (bit 0) – 0 = unicast, 1 = multicast.  Multicast prefixes are never OUIs.</t>
          </li>
          <li>
            <t>U/L bit (bit 1) – 0 = universal (IEEE‑assigned), 1 = local.</t>
          </li>
        </ul>
        <t>These flags let the implementations exclude multicast and local addresses but still cannot prove that a 24‑bit value is an IEEE‑registered OUI. 36‑bit CIDs share the same first 24 bits and enterprises <bcp14>MAY</bcp14> deploy pseudo‑OUIs. CAs <bcp14>MUST</bcp14> include only addresses the subscriber legitimately controls (registered OUI or CID).  Before issuing a certificate that contains a MACAddress or a name constraint based on such a permitted set of addresses, the CA <bcp14>MUST</bcp14> verify that control: for example, by consulting the IEEE registry or reviewing manufacturer documentation.</t>
        <t>The following constraint definition constrains EUI-48 values to only
those are universal and unicast; locally assigned or multicast values will not match the
constraint.</t>
        <artwork><![CDATA[
  [0] OCTET STRING '020000000000030000000000'H

]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC5280">
        <front>
          <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
          <author fullname="D. Cooper" initials="D." surname="Cooper"/>
          <author fullname="S. Santesson" initials="S." surname="Santesson"/>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <author fullname="W. Polk" initials="W." surname="Polk"/>
          <date month="May" year="2008"/>
          <abstract>
            <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5280"/>
        <seriesInfo name="DOI" value="10.17487/RFC5280"/>
      </reference>
      <reference anchor="RFC5912">
        <front>
          <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <date month="June" year="2010"/>
          <abstract>
            <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5912"/>
        <seriesInfo name="DOI" value="10.17487/RFC5912"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 259?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We thank the participants on the LAMPS Working Group mailing list for their insightful feedback and comments. In particular, the authors extend sincere appreciation to David von Oheimb, John Mattsson, and Michael StJohns for their reviews and suggestions, which greatly improved the quality of this document.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA71b63LbRpb+j6foZaoSciLCJCXLsjKeMUXRNjO6jSRPkk1l
J02gSfYIQDNoQBLH41ReYWp+TdVulZ5Fj5In2XNON4AGSEu57cplGZdG97l+
59LtbrfrZTKLxD5rHYtQcjYMAqE1G6kkS1XE2sfDUYcNwzCFp0IzmbAv/ae9
52wk0kzOZMAzoVse/jNX6WofBsyU54UqSHgMs4Ypn2VdKbJZN+LxUndjHnAz
W1cl3V7P0/k0llpLWHC1hC8m48tXjH3EeKQVUCWTUCwF/Eqy1hZrAY2ZSiWP
8GYyPIB/VApX55evWl6Sx1OR7nshULPvBSrRItG53mdZmgvvep9tezwVHGa9
EEGeymzV8m5UejVPVb6Ep0cylpkIkV2ZAUE8YsciWPBE6lizGSx09qfJl4wn
Ibs4nhyPW96VWMEE4b7HugwkpUWAV3u9gd8fjvGShIUXF/n0byLIhlF2AoLx
rkWSA42M/fK1GTMCa30BLMhkzl7jVPg85jKC53rJdfwSZe+rdI4veBos4MUi
y5Z6/8kTHIeP5LXwi2FP8MGTaaputHhCMzzBL+cyW+RT+HZ0oJJERNETo9mF
ynUkVpuUi59FaB6Zs2TxuW8m9KV6fKInDxuRv8jiqOV5PM8WCrQPy3aZsb7z
HEz5jZkZHjOwTrCGc7/2DJjeZ3+Rcxmxwiy22NHRiF7y6TQV18339EoYMVvC
X17jCDAAP1CxS8NIpWLFLNsVESO/9oyIOIQp0K+22CQJ/Nr6xSt35QBn9qdm
lpchjAhgRHP9z5Vgx2A2wln8c999BGuDmf2do9nts+Gfhl8dDTeQYF64BPxN
iZf8iq8i3lz0UsVqlseSnV7lU1UtfOk7T4jnM5HMc0AVK1oJGHOWCZ8dZWF9
+fWBLimZXdBXOP2naCsv5/jKUJaoNAb+rsnlzl+Nng72esXl8/5g3/N93/O6
3S4sp7OUB5nnXS6kZgBkeQzYw0IxkwkQx1kibpjKFiJFRybPlEkQ5YhgCI/w
xkKkdXkGPi/ShJZn9E37YnjSIVeeaJ2LdMOICY4QtxkAGMyrgT8W8DRdwVeA
kOMxewCtrWv47BJIQWoTS2gMyHCFIJ6xpQLInUYCJ54CxgJfEV+J9Mcf/jkA
LoCcGQ8Ek4i7APNAIwzkbJlPIxkwgD0WVAHAd1ArAufJNkpuoW4YYjKIFxbQ
TCVmYEVdAMxNBRNJoEKAQhTQMlXIIdzVREtCGjmTlaKyaoxlGEbC8z4COwbR
hHmA5HneoVhGaoV0gUwXPGO5LuZ0GCJ5W95B5MDCNfgWm+L144IHmSP1TGfA
AU9DdsNXOKHhC6VveXnEQEqerAhJBl9b6/0G1fsTDTSG4D4c2SDesnbhSD1N
0e2ExG/g+509sIIpkImGdn8H0QxjW8lde/x2AgN29joYejnb3bHDiV5UnGM1
dvDuTgeJB/2eji7Hl+zi8nxy8nrdbly6MAEgkwCjuUaDq9sOTNzd2UMS8Gp3
h13zKAc2bhYiMR4ZVlbzYXv5oGybriMSDv6iXTNBvjnaJoYeZDkgDGVgVuRM
93cDMmJwJRnJjAxLI3wJtOtrietj4IalJ+hyichgSjWDX6DbZK7pa5gcwI2M
AwZgvqJ9NOwRiiXJCB5w3CEyQtLUCF6CvBSzEw3qf3txiRkT/stOTun6fPzn
t5Pz8SFeX7wZHh2VF54dcfHm9O3RYXVVfTk6PT4enxyaj+Epqz3ywNy+gjdI
Vev07HJyejI8ahlduCYLyRjhjzCIs0wFZkBce6HQQSqnRisHo7P7u/4Oe/fu
P0A/g37/+fv39mav/2wHblDlZjWVRCt7CxpZeXy5FDwl04siMKYlaCHSMBYU
AXiUMLB4AdL83dcomW/22e+nwbK/8wf7ABmuPSxkVntIMlt/svaxEeKGRxuW
KaVZe96QdJ3e4Ve1+0LuzsPf/zECU2fd/t4f/+ChCVWoUAGGsZ267YPSSp8O
EQbRp5QBL9fZTyeH4OchGnECv5zp25cHh/1OE3oWoIdrDuk8wbEqPJ0Xzs11
EzJgSLxMwXPAbdSM7TIVZCLTWwaKLBI8+tme/cyvYUIFKmhKdVRBUzXUkYXW
JkfMURBGIshQsoUZm91gwCAx4Ur2Ha6NzyqZ2Sg9k6nOABsyHHFiqWPtGzRP
uJeaPqtPUuCxGdyxQEavEI2XPENIKUZX6GninjtDnMPikB8FC+NF+A5wSsFl
k6QiyhSrxFxfmQndN/YrLecJQSUsCoN1gcYOeb4xt5mKInWD2oFysAtrG1gr
cIByhyqCflhLhniZYm4MrC2BBZzUCR0InR+xMU6Eb7jrA8ZuuBONE3KILzCk
1IMTeoQTY/iHYzkYZiPLsy/KEGQCn14lGb8lUqVGa5zBCEhEAdC0vMVphJwv
stJy/1IZZpEw3UAEp7lihdbkSN8YYTHOWFu7NZXzLkRscL8WVdGRgDIrU90U
F2qZ4SAkcNsTxTKgl6UCQBqq6swEOpDCUqRQuGZVqHXiI+HsIo85ggEU3iFG
UJIfwG8eLPB1q9fDnBNziOeYdzw7gF/95/CrNzBU9XqDHf/53rMDv/8cnyHH
OUZdAntYFebnc0ERpcxcQUCktTJ3MyqBDzDzNb0MJ9PB/KZySqOQ0ZBRDKjS
tlwbk9lFgCOJ1jCGG+N3DIrM0lKCrwwtP/7wb405QaYgn3fgU2o3myoSJ5QB
5TQJZUOQMQQ8qig3ucktmswjZCds7+fR/YCnVA71U7zj4Qzsg+bfxHCCGYRC
wlagOlJIl6G+NrJhpg3AxLYJJB01YBAhqAncx1Lrzgb03QD0RMJUDY7D7Xte
/6fi9y5VirwMMQ4ew/M99y3ovHrbwesMrgybLVKNi6AtWwi4mG/oK1FaV5CP
eI0RzEV+u4BNxUgDIdCNJQwFBd8bGC4/EBPc1VoUEFzy1gOQz8YcnB8HFSrl
4JCpAyLNWeB5WFRmBSvTqpDSaFzg2DJzivCCR6ldNRfZy0aN2WjkLKxL0IRZ
p8ri65oSKPKsEf3TsJlKp1+KzJ43AUcxsoDCU2WPipLcLalBBaaV5jOrKTd2
OmJeY9uaXppHyKiGwsbqhztQVRCLBBJuk6mzOcBxskFmIMj1dQiKXotEpLbC
glEQAGVobs+BACh6hm7wAbj6qkAhCBUUiGOVio1Jb5FAyFlVRkhjt9oGdhtH
oGgAx1aE1uJ2CW+AI/AceN7ZID23cEa+GxGSRXImMhlDkHBGAiFVYcCqGobI
B/kmxM818l+bTGKeUVo4OUXVpkc5DalFKrMVa4+GHWYdiQYiEVssTyKkNJSz
GSBAkm1qCmHphJbtdoN8FP45hFfkecnTbGXsgPCDQq0FZCDPFQk1lVwWTOUE
SYVpAQAvVGbDHcY7uKFMHkoGXeF6I9GHRRJK7QsLtK3NLbBJTakmaoYqhlTE
CsSIE4Uiog48pI7AHQRnyM0r7wBctDRBoICQJ6Mw4FhZoyDQ63S+XCp0O3h7
ISIs4dHHRdhoK6FQbCNvsyFaxReGW0v0Z8aOZ81cYrlYaXI1JMFmuGvx9sx0
0oB1A3IbVzd5uIHyOblbRN5tjLca5/ZiwDChFL+/w87JFrZnUdj3dzv+wO/7
/Z7PhiYzCDa2X8hL4yXWT2UqCbl0lgqbz4tbk0iUDxHhN5SYiN0KpJLhLCAm
dGU3ylamaJAHadpq+mMXP8hjyneWy6jwG6t7I5eqVuHRHL1pEZtEYDKr0iCK
+EUaUKYjNg+zKQBhTqesuBxa4ev+w5/XcwQH02n1UAkTDIjpZvjFcN6gde+x
xR6mdfAYq7+c1m3IFm6pI/+ByDtLVUyvwAOxB1GFzk6VoqzlIFvMyc1auy2y
b0usU52bFtZe9RpE4Rbv3k6dvLVwVlIHJvP/T91Tn50VUJoYT9JYmJ6es/aX
p+cdppZFRC3zk0rCQAxqURj+TEahM7Fk26Ud1BlIykjqe7vO0jjbjQQPH54c
blrSWQxQLMhx17Ba7Wm5WlO6vvestGSwujwyXQf8aNdUU+7MprKwHSAUUorl
4N9FqnTTJgusaOat1HJNtcBmtWyuS/IomWsuT8xiY1hwyPAQx/Flkaz9TKcg
AC/Rp9g3cRoXwBgkJ6nZOeEa8Onbb7/1Bux3RQ+pjct02IsX5QO35Pj4Y6/t
PPBJp38Fgv9a2PV/MTPBxy5dqB93FM3fo6W9Sbw0FRS3HWsbOFPxXS5Tk0PJ
YozpE5cMbrFpnplgXNoHGrSxdQx8VgswR/3LWq5pk32ZLHMTJcv9XAqUWPRw
p32O22LWWvjDSYvUJmPErnKWOkXpaEjx+brKVO1+FpjS0KYXYFC4yVSWNZBv
mqZXCqqZQ0UDJoD6DMxWk8a8hZJQSg2KZN+hDzMQFWNFDZ4AMStcgapQSkQh
ZiU4hcnhakmnzy6wKbNEb5eY56Fd5UloAyphbCK/yyEv0HZrIghUDiqd4vZG
yUNtT4/LmCRGGx4hNhXeJpG8EmxyVq281ch+C+OASt0Snqqc9gYC8FZd7K5s
Q0WW4xabROLd9FOaoypVHjtNFYeUDVwvVDFV026GDXlzXGNuKlaq7CVGCk3M
7r2Y7Oosldc8WLebYc1QjPxw0mjlbieW+ZqtKVCU05XbEcGaHWql1K+dszEC
FjFujOQJHg6ZN2oMoZ3NJuqPQI6EGVGxFEI5Hhbx2cad0EYfKHEy0qIvAKpA
H0Yjr9RnWkxgbpCB8rS2OWx68/AGViuoLeY/B85VbPNzG/NmAJC4M00OOhme
DNeETA+x7AToENrWX7iz3UzPyNgNh7aC/fGH/744nlR+X56rOVYhFrGTMnr+
+MP/sHbf3/Z3IYt9Cn+e+b0OLDmHGJKu6JSJ+fn0RfFTXT3w0xz0aTnRP0Al
AXh7RFeIAUsSywd+/gEGT8aNnor3/xcUXR4c9syVDLuxCvHkTbc8eoPlQBdt
pDvoDZ7i8Nr2nkNRt/iprh74aQ769Jfo/FGVn9J2N5UzrzC536DxvV+t8d9G
3b+Nrh9RdL9UtEq6Dgis0fJbaHmDij9iw4sTv29d0Z6/GS7x8J+8rXdB3YFl
W8UBls8YdcarWjZw9srBfPg0knphWiXv3tlDQO/fA+R8//33XsX7aVHwkoED
o+/ABlW733G2Q7vu8an2dgckE7Z3O6ZfAkEDRpOEtDXA9tMOi8uTfXi3vJK3
7Wcd62Ltnhn/uMPhnipg0nvPOxy/mpxMcL/3gk2Oz44mo8kluxy+vmD7+y+8
g/HryQm40PHZ6fnlBUx+evlmfN49GR6P2avz02Nyhz4maDKQGUyNJxbZr2L2
57NbMoyv+11ZUNMbtJ8+JyZxAL50aB7fNmj+NST/bIprBItbh2Ag4D37DE8i
lUTvFZu4VROFp4FH3gYaOfh8PLpkk8PxyeXk1WR8jopDbsqv39Nsp5NDa+9u
kuWt+ewD88Fy5OxmwpFtl5UFTNUKkiIKN/mCdu3HTFtbfIv5vo/TN0hqfORM
XdF5yA6+WkcgmMu5w69rLb/2xeQ/x6y9C9C0B3/7A/y12+l43vjkkDzaHHVg
6/2u8S3HmkObra5mgd3cm6aabm0/E3LHGHMeK8ENG8Fefb/XNAXqJYSFN7PR
hslU5CZiXkUx1ZGmRn9g53TfIBljF+M/vx2fjMYgbzTZap6ve9/YZ5usb00F
iDWFo+KnNQV8glu0uEOLG7SfvKFh7z38a4T/0XpzAlLlpNriFEYNrD0cwYPD
MR0vQ0aQw34f2RzAr+1tfLHTKblbp2Q4Ohzv7PV6/f5gsL29swPUuDTUN97Q
kyA/x5KeR9j8llQhlHmt1T/tyZh907VasApLN4rNIk77JVCM0BlNrPDNmXTU
Kx52wSef9D4p6kPTDGhuBhWuiCvicUY2efKaXrTh1/1dr3N/9+MP/2K9+7sX
93eW6K37uz7dx1AH0xP//u7+7ri4w/77TN4WtZUAntnp2wkUi1329smRM32/
Ob0RD2sjSyB/k2GJsFMuSfWRaUpgfx2EABWaMNWsbJT9tpvLSjKp+DEVVlXD
YLmvM0lHthIsBLF6FMXW0qDYIjduIHVxKJa8EtM12r0E9ny2vWvHjiaHxcZF
uedhNDvYub+jTVLqNpuDaBKpwNZ0SFUSW2qRhwqmIplVxXu1v4TFdUn/T6rj
23VasUoCIjuktwMxw70e3NAxkOBihdlEKAyvvo+A3Y5Gt52ZM4qAO+bMhXNk
w3ZEnELO3RZ0OxOW6n3yGeuuW5g+UcM8onoQvyW7L3Jms8VyLQWhJ8Bmjqce
8hREUqSPZBZrh4Ac4sPyVGP1VNc66NReQAV4GR3DovMhpdmiUq2PfGbsrGyD
oFBSxxKLA6Rod7Xem1frvRGebERByELKn+3qEjDIfEQnk6dQgFOyG1wl6iYS
4ZwqVO/dvoEKEb5ozXikRQvC3hdmv++KZEuNjUAueXl6WrCj4fHZBav9DxD6
7x94BzluVmTHEjcQNe4ez/IIamwRIh0knUDFsdkxmyR2jTzi9hCM+U8VdsMm
xMgUYJHOl4AngTR1O4j/kF/LkF3DzSmsFU+32OdqkbBjnmVaK3s481hCUiUi
dpHhS+2QZozEeKDO53NI0REtsA0O37A5xFo8BwVggjhgmsHf5ZyaToSWTkHi
e/8LDRohFtU0AAA=

-->

</rfc>
