<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="pre5378Trust200902" docName="draft-ietf-lamps-rfc5273bis-05" category="std" consensus="true" submissionType="IETF" obsoletes="5273, 6402" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CMC: Transport Protocols">Certificate Management over CMS (CMC): Transport Protocols</title>

    <author initials="J." surname="Mandel, Ed" fullname="Joseph Mandel">
      <organization>AKAYLA, Inc.</organization>
      <address>
        <email>joe@akayla.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner, Ed" fullname="Sean Turner (editor)">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>

    <date year="2025" month="May" day="01"/>

    <area>SEC</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Public Key Infrastructure</keyword> <keyword>Cryptographic Message Syntax</keyword> <keyword>Certificate Management</keyword> <keyword>Transport Protocols</keyword>

    <abstract>


<?line 68?>

<t>This document defines a number of transport mechanisms that are used
to move CMC (Certificate Management over CMS (Cryptographic Message
Syntax)) messages.  The transport mechanisms described in this
document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes RFCs 5273 and 6402.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5273bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG LAMPS mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/seanturner/cmcbis"/>.</t>
    </note>


  </front>

  <middle>


<?line 78?>

<section anchor="introduction"><name>Introduction</name>

<t>This document defines a number of transport methods that are used to
move CMC messages (defined in <xref target="CMC-STRUCT"/>).  The transport
mechanisms described in this document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes <xref target="CMC-TRANSv1"/> and <xref target="CMC-Updates"/>. This
document also incorporates <xref target="erratum3593"/>.</t>

</section>
<section anchor="requirements-terminology"><name>Requirements Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="changes-since-5273-and-6402"><name>Changes Since 5273 and 6402</name>

<aside>  <t>Note: For now, this section will be list of the changes introduced
  by each version. After WGLC, this section will be finalized.</t>
</aside>

<t>-04 WG version:</t>

<t><list style="symbols">
  <t>Added text to explain file extensions.</t>
</list></t>

<t>-03 WG version:</t>

<t><list style="symbols">
  <t>No changes.</t>
</list></t>

<t>-02 WG version:</t>

<t><list style="symbols">
  <t>Updated this section.</t>
</list></t>

<t>-01 WG version changes:</t>

<t><list style="symbols">
  <t>Added requirement that TLS 1.2 implementations follow <xref target="BCP195"/></t>
</list></t>

<t>-00 WG version changes:</t>

<t><list style="symbols">
  <t>Added pre-5378 boilerplate</t>
</list></t>

<t>-02 individual version changes:</t>

<t><list style="symbols">
  <t>Replaced TLS 1.0 with TLS 1.2 or later</t>
</list></t>

<t>-01 individual version changes:</t>

<t><list style="symbols">
  <t>Changed RFC 5272 references to draft-mandel-lamps-rfc5272bis</t>
  <t>Merged <xref target="erratum3593"/></t>
</list></t>

<t>-00 individual version changes:</t>

<t><list style="symbols">
  <t>Moved 2119-text to its own section</t>
  <t>Added "Changes Since 5273 and 6402" section</t>
  <t>Updated references</t>
  <t>Merged <xref target="CMC-Updates"/> text</t>
  <t>Updated and moved Acknowledgments</t>
</list></t>

</section>
<section anchor="file-based-protocol"><name>File-Based Protocol</name>

<t>Enrollment messages and responses may be transferred between clients
and servers using file-system-based mechanisms, such as when
enrollment is performed for an off-line client.  When files are used
to transport binary, Full PKI Request or Full PKI Response messages,
there <bcp14>MUST</bcp14> be only one instance of a request or response message in a
single file. crq and crp stand for Full PKI Request/Response,
respectively; for clarity we define file extensions for them. The
following file type extensions <bcp14>SHOULD</bcp14> be used:</t>

<texttable title="File PKI Request/Response Identification" anchor="file-id">
      <ttcol align='left'>Message Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <c>Simple PKI Request</c>
      <c>.p10</c>
      <c>Full PKI Request</c>
      <c>.crq</c>
      <c>Simple PKI Response</c>
      <c>.p7c</c>
      <c>Full PKI Response</c>
      <c>.crp</c>
</texttable>

</section>
<section anchor="mail-based-protocol"><name>Mail-Based Protocol</name>

<t>MIME wrapping is defined for those environments that are MIME native.
The basic mime wrapping in this section is taken from <xref target="SMIMEV4"/>.
When using a mail-based protocol, MIME wrapping between the layers of
CMS wrapping is optional.  Note that this is different from the
standard S/MIME (Secure MIME) message.</t>

<t>Simple enrollment requests are encoded using the "application/pkcs10"
content type.  A file name <bcp14>MUST</bcp14> be included either in a content-type
or a content-disposition statement.  The extension for the file <bcp14>MUST</bcp14>
be ".p10".</t>

<t>Simple enrollment response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  An smime-type parameter <bcp14>MUST</bcp14> be on the
content-type statement with a value of "certs-only".  A file name
with the ".p7c" extension <bcp14>MUST</bcp14> be specified as part of the content-
type or content-disposition statement.</t>

<t>Full enrollment request messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-request".  A file name with the ".p7m" extension
<bcp14>MUST</bcp14> be specified as part of the content-type or content-disposition
statement.</t>

<t>Full enrollment response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-response".  A file name with the ".p7m"
extension <bcp14>MUST</bcp14> be specified as part of the content-type or content-
disposition statement.</t>

<texttable title="MIME PKI Request/Response Identification" anchor="mime-id">
      <ttcol align='left'>Item</ttcol>
      <ttcol align='left'>MIME Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <ttcol align='left'>SMIME Type</ttcol>
      <c>Simple PKI Request</c>
      <c>application/pkcs10</c>
      <c>.p10</c>
      <c>N/A</c>
      <c>Full PKI Request</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-request</c>
      <c>Simple PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7c</c>
      <c>certs-only</c>
      <c>Full PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-response</c>
</texttable>

</section>
<section anchor="httphttps-based-protocol"><name>HTTP/HTTPS-Based Protocol</name>

<t>This section describes the conventions for use of HTTP <xref target="HTTP"/> as a
transport layer.  In most circumstances, the use of HTTP over TLS
<xref target="HTTP"/> provides any necessary content protection from eavesdroppers.</t>

<t>In order for CMC clients and servers using HTTP to interoperate, the
following rules apply.</t>

<ul empty="true"><li>
  <t>Clients <bcp14>MUST</bcp14> use the POST method to submit their requests.</t>
</li></ul>

<ul empty="true"><li>
  <t>Servers <bcp14>MUST</bcp14> use the 200 response code for successful responses.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients <bcp14>MAY</bcp14> attempt to send HTTP requests using TLS 1.2 <xref target="TLS"/> or
later, although servers are not required to support TLS. If
TLS 1.2 <xref target="TLS"/> (or later) is used then implementations <bcp14>MUST</bcp14> follow
the recommendations in <xref target="BCP195"/>.</t>
</li></ul>

<ul empty="true"><li>
  <t>Servers <bcp14>MUST NOT</bcp14> assume client support for any type of HTTP
authentication such as cookies, Basic authentication, or Digest
authentication.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients and servers are expected to follow the other rules and
restrictions in <xref target="HTTP"/>.  Note that some of those rules are for
HTTP methods other than POST; clearly, only the rules that apply
to POST are relevant for this specification.</t>
</li></ul>

<section anchor="pki-request"><name>PKI Request</name>

<t>A PKI Request using the POST method is constructed as follows:</t>

<t>The Content-Type header <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

<t>The body of the message is the binary value of the encoding of the
PKI Request.</t>

</section>
<section anchor="pki-response"><name>PKI Response</name>

<t>An HTTP-based PKI Response is composed of the appropriate HTTP
headers, followed by the binary value of the BER (Basic Encoding
Rules) encoding of either a Simple or Full PKI Response.</t>

<t>The Content-Type header <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

</section>
</section>
<section anchor="tcp-based-protocol"><name>TCP-Based Protocol</name>

<t>When CMC messages are sent over a TCP-based connection, no wrapping
is required of the message.  Messages are sent in their binary
encoded form.</t>

<t>The client closes a connection after receiving a response, or it
issues another request to the server using the same connection.
Reusing one connection for multiple successive requests, instead of
opening multiple connections that are only used for a single request,
is <bcp14>RECOMMENDED</bcp14> for performance and resource conservation reasons.  A
server <bcp14>MAY</bcp14> close a connection after it has been idle for some period
of time; this timeout would typically be several minutes long.</t>

<t>CMC requires a registered port number to send and receive CMC
messages over TCP.  The title of this IP Protocol number is
"pkix-cmc".  The value of this TCP port is 5318.</t>

<t>Prior to <xref target="CMC-Updates"/>, CMC did not have a registered port number and
used an externally configured port from the Private Port range.
Client implementations <bcp14>MAY</bcp14> want to continue to allow for this to
occur.  Servers <bcp14>SHOULD</bcp14> change to use the new port.  It is expected
that HTTP will continue to be the primary transport method used by
CMC installations.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA has assigned a TCP port number in the Registered Port Number
range for the use of CMC.</t>

<figure><artwork><![CDATA[
  Service name: pkix-cmc
  Port Number: 5318
  Transport protocol: TCP
  Description: PKIX Certificate Management using CMS (CMC)
  Reference: RFC 6402
  Assignee: iesg@ietf.org
  Contact: chair@ietf.org
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Mechanisms for thwarting replay attacks may be required in particular
implementations of this protocol depending on the operational
environment.  In cases where the Certification Authority (CA)
maintains significant state information, replay attacks may be
detectable without the inclusion of the optional nonce mechanisms.
Implementers of this protocol need to carefully consider
environmental conditions before choosing whether or not to implement
the senderNonce and recipientNonce attributes described in
<xref section="6.6" sectionFormat="of" target="CMC-STRUCT"/>.  Developers of state-constrained PKI clients are
strongly encouraged to incorporate the use of these attributes.</t>

<t>Initiation of a secure communications channel between an end-entity
and a CA or Registration Authority (RA) -- and, similarly, between an
RA and another RA or CA -- necessarily requires an out-of-band trust
initiation mechanism.  For example, a secure channel may be
constructed between the end-entity and the CA via IPsec <xref target="IPsec"/> or
TLS <xref target="TLS"/>.  Many such schemes exist, and the choice of any particular
scheme for trust initiation is outside the scope of this document.
Implementers of this protocol are strongly encouraged to consider
generally accepted principles of secure key management when
integrating this capability within an overall security architecture.</t>

<t>In some instances, no prior out-of-band trust will have been
initiated prior to use of this protocol.  This can occur when the
protocol itself is being used to download onto the system the set of
trust anchors to be used for these protocols.  In these instances,
the Enveloped Data content type (<xref section="3.2.1.3.3" sectionFormat="of" target="CMC-STRUCT"/>)
must be used to provide the same shrouding that TLS would have
provided.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">

<reference anchor="erratum3593" target="https://www.rfc-editor.org/errata/eid3593">
  <front>
    <title>RFC 5273 erratum 3593</title>
    <author >
      <organization></organization>
    </author>
    <date year="2013" month="April"/>
  </front>
</reference>


<reference anchor="BCP195">
  <front>
    <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
    <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
    <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
    <author fullname="T. Fossati" initials="T." surname="Fossati"/>
    <date month="November" year="2022"/>
    <abstract>
      <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
      <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="195"/>
  <seriesInfo name="RFC" value="9325"/>
  <seriesInfo name="DOI" value="10.17487/RFC9325"/>
</reference>


<reference anchor="CMC-STRUCT">
   <front>
      <title>Certificate Management over CMS (CMC)</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="1" month="May" year="2025"/>
      <abstract>
	 <t>   This document defines the base syntax for CMC, a Certificate
   Management protocol using the Cryptographic Message Syntax (CMS).
   This protocol addresses two immediate needs within the Internet
   Public Key Infrastructure (PKI) community:

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5272bis-05"/>
   
</reference>

<reference anchor="HTTP">
  <front>
    <title>HTTP Semantics</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
      <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="97"/>
  <seriesInfo name="RFC" value="9110"/>
  <seriesInfo name="DOI" value="10.17487/RFC9110"/>
</reference>

<reference anchor="IPsec">
  <front>
    <title>Security Architecture for the Internet Protocol</title>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <author fullname="K. Seo" initials="K." surname="Seo"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4301"/>
  <seriesInfo name="DOI" value="10.17487/RFC4301"/>
</reference>

<reference anchor="SMIMEV4">
  <front>
    <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="B. Ramsdell" initials="B." surname="Ramsdell"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="April" year="2019"/>
    <abstract>
      <t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 4.0. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 5751.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8551"/>
  <seriesInfo name="DOI" value="10.17487/RFC8551"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="TLS">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
    <author fullname="T. Dierks" initials="T." surname="Dierks"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2008"/>
    <abstract>
      <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5246"/>
  <seriesInfo name="DOI" value="10.17487/RFC5246"/>
</reference>

<reference anchor="CMC-TRANSv1">
  <front>
    <title>Certificate Management over CMS (CMC): Transport Protocols</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="M. Myers" initials="M." surname="Myers"/>
    <date month="June" year="2008"/>
    <abstract>
      <t>This document defines a number of transport mechanisms that are used to move CMC (Certificate Management over CMS (Cryptographic Message Syntax)) messages. The transport mechanisms described in this document are HTTP, file, mail, and TCP. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5273"/>
  <seriesInfo name="DOI" value="10.17487/RFC5273"/>
</reference>

<reference anchor="CMC-Updates">
  <front>
    <title>Certificate Management over CMS (CMC) Updates</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="November" year="2011"/>
    <abstract>
      <t>This document contains a set of updates to the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This document updates RFC 5272, RFC 5273, and RFC 5274.</t>
      <t>The new items in this document are: new controls for future work in doing server side key generation, definition of a Subject Information Access value to identify CMC servers, and the registration of a port number for TCP/IP for the CMC service to run on. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6402"/>
  <seriesInfo name="DOI" value="10.17487/RFC6402"/>
</reference>




    </references>


<?line 338?>

<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>Obviously, the authors of this version of the document would like to
thank Jim Schaad and Michael Myers for their work on the previous
version of this document.</t>

<t>The acknowledgment from the previous version of this document follows:</t>

<t>The authors and the PKIX Working Group are grateful for the
participation of Xiaoyi Liu and Jeff Weinstein in helping to author
the original versions of this document.</t>

<t>The authors would like to thank Brian LaMacchia for his work in
developing and writing up many of the concepts presented in this
document.  The authors would also like to thank Alex Deacon and Barb
Fox for their contributions.</t>

</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="J." surname="Schaad" fullname="Jim Schaad">
      <organization>August Cellars</organization>
      <address>
      </address>
    </contact>
    <contact initials="M." surname="Myers" fullname="Michael Myers">
      <organization>TraceRoute Security, Inc.</organization>
      <address>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

