<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="pre5378Trust200902" docName="draft-ietf-lamps-rfc5273bis-06" category="std" consensus="true" submissionType="IETF" obsoletes="5273, 6402" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CMC: Transport Protocols">Certificate Management over CMS (CMC): Transport Protocols</title>

    <author initials="J." surname="Mandel, Ed" fullname="Joseph Mandel">
      <organization>AKAYLA, Inc.</organization>
      <address>
        <email>joe@akayla.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner, Ed" fullname="Sean Turner (editor)">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>

    <date year="2025" month="May" day="28"/>

    <area>SEC</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Public Key Infrastructure</keyword> <keyword>Cryptographic Message Syntax</keyword> <keyword>Certificate Management</keyword> <keyword>Transport Protocols</keyword>

    <abstract>


<?line 68?>

<t>This document defines a number of transport mechanisms that are used
to move CMC (Certificate Management over CMS (Cryptographic Message
Syntax)) messages.  The transport mechanisms described in this
document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes RFC 5273 and RFC 6402.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5273bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG LAMPS mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/seanturner/cmcbis"/>.</t>
    </note>


  </front>

  <middle>


<?line 78?>

<section anchor="introduction"><name>Introduction</name>

<t>This document defines a number of transport methods that are used to
move CMC messages (defined in <xref target="CMC-STRUCT"/>).  The transport
mechanisms described in this document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes <xref target="CMC-TRANSv1"/> and <xref target="CMC-Updates"/>. This
document also incorporates <xref target="erratum3593"/>.</t>

</section>
<section anchor="requirements-terminology"><name>Requirements Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="changes-since-5273-and-6402"><name>Changes Since 5273 and 6402</name>

<t>Merged <xref target="CMC-Updates"/> text.</t>

<t>IANA assigned TCP port 5318 for the use of CMC.</t>

<t>Clarified the file extensions for Full PKI Requests and Responses.</t>

<t>Replaced TLS 1.0 for TLS 1.2 or later, and added that implemetations are
required to follow the recommendations in <xref target="BCP195"/>.</t>

<t>Addressed <xref target="erratum3593"/>.</t>

</section>
<section anchor="file-based-protocol"><name>File-Based Protocol</name>

<t>Enrollment messages and responses may be transferred between clients
and servers using file-system-based mechanisms, such as when
enrollment is performed for an off-line client.  When files are used
to transport binary, Full PKI Request or Full PKI Response messages,
there <bcp14>MUST</bcp14> be only one instance of a request or response message in a
single file. crq and crp stand for Full PKI Request/Response,
respectively; for clarity we define file extensions for them. The
following file type extensions <bcp14>SHOULD</bcp14> be used:</t>

<texttable title="File PKI Request/Response Identification" anchor="file-id">
      <ttcol align='left'>Message Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <c>Simple PKI Request</c>
      <c>.p10</c>
      <c>Full PKI Request</c>
      <c>.crq</c>
      <c>Simple PKI Response</c>
      <c>.p7c</c>
      <c>Full PKI Response</c>
      <c>.crp</c>
</texttable>

</section>
<section anchor="mail-based-protocol"><name>Mail-Based Protocol</name>

<t>MIME wrapping is defined for those environments that are MIME native.
The basic mime wrapping in this section is taken from <xref target="SMIMEV4"/>.
When using a mail-based protocol, MIME wrapping between the layers of
CMS wrapping is optional.  Note that this is different from the
standard S/MIME (Secure MIME) message.</t>

<t>Simple enrollment requests are encoded using the "application/pkcs10"
content type.  A file name <bcp14>MUST</bcp14> be included either in a content-type
or a content-disposition statement.  The extension for the file <bcp14>MUST</bcp14>
be ".p10".</t>

<t>Simple enrollment response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  An smime-type parameter <bcp14>MUST</bcp14> be on the
content-type statement with a value of "certs-only".  A file name
with the ".p7c" extension <bcp14>MUST</bcp14> be specified as part of the content-
type or content-disposition statement.</t>

<t>Full enrollment request messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-request".  A file name with the ".p7m" extension
<bcp14>MUST</bcp14> be specified as part of the content-type or content-disposition
statement.</t>

<t>Full enrollment response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-response".  A file name with the ".p7m"
extension <bcp14>MUST</bcp14> be specified as part of the content-type or content-
disposition statement.</t>

<texttable title="MIME PKI Request/Response Identification" anchor="mime-id">
      <ttcol align='left'>Item</ttcol>
      <ttcol align='left'>MIME Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <ttcol align='left'>SMIME Type</ttcol>
      <c>Simple PKI Request</c>
      <c>application/pkcs10</c>
      <c>.p10</c>
      <c>N/A</c>
      <c>Full PKI Request</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-request</c>
      <c>Simple PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7c</c>
      <c>certs-only</c>
      <c>Full PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-response</c>
</texttable>

</section>
<section anchor="httphttps-based-protocol"><name>HTTP/HTTPS-Based Protocol</name>

<t>This section describes the conventions for use of HTTP <xref target="HTTP"/> as a
transport layer.  In most circumstances, the use of HTTP over TLS
<xref target="HTTP"/> provides any necessary content protection from eavesdroppers.</t>

<t>In order for CMC clients and servers using HTTP to interoperate, the
following rules apply.</t>

<ul empty="true"><li>
  <t>Clients <bcp14>MUST</bcp14> use the POST method to submit their requests.</t>
</li></ul>

<ul empty="true"><li>
  <t>Servers <bcp14>MUST</bcp14> use the 200 response code for successful responses.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients <bcp14>MAY</bcp14> attempt to send HTTP requests using TLS 1.2 <xref target="TLS"/> or
later, although servers are not required to support TLS. If
TLS is supported by an implementation, then the implementation <bcp14>MUST</bcp14>
folow the recommendations in <xref target="BCP195"/>.</t>
</li></ul>

<ul empty="true"><li>
  <t>Servers <bcp14>MUST NOT</bcp14> assume client support for any type of HTTP
authentication such as cookies, Basic authentication, or Digest
authentication.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients and servers are expected to follow the other rules and
restrictions in <xref target="HTTP"/>.  Note that some of those rules are for
HTTP methods other than POST; clearly, only the rules that apply
to POST are relevant for this specification.</t>
</li></ul>

<section anchor="pki-request"><name>PKI Request</name>

<t>A PKI Request using the POST method is constructed as follows:</t>

<t>The Content-Type header <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

<t>The body of the message is the binary value of the encoding of the
PKI Request.</t>

</section>
<section anchor="pki-response"><name>PKI Response</name>

<t>An HTTP-based PKI Response is composed of the appropriate HTTP
headers, followed by the binary value of the BER (Basic Encoding
Rules) encoding of either a Simple or Full PKI Response.</t>

<t>The Content-Type header <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

</section>
</section>
<section anchor="tcp-based-protocol"><name>TCP-Based Protocol</name>

<t>When CMC messages are sent over a TCP-based connection, no wrapping
is required of the message.  Messages are sent in their binary
encoded form.</t>

<t>The client closes a connection after receiving a response, or it
issues another request to the server using the same connection.
Reusing one connection for multiple successive requests, instead of
opening multiple connections that are only used for a single request,
is <bcp14>RECOMMENDED</bcp14> for performance and resource conservation reasons.  A
server <bcp14>MAY</bcp14> close a connection after it has been idle for some period
of time; this timeout would typically be several minutes long.</t>

<t>CMC requires a registered port number to send and receive CMC
messages over TCP.  The title of this IP Protocol number is
"pkix-cmc".  The value of this TCP port is 5318.</t>

<t>Prior to <xref target="CMC-Updates"/>, CMC did not have a registered port number and
used an externally configured port from the Private Port range.
Client implementations <bcp14>MAY</bcp14> want to continue to allow for this to
occur.  Servers <bcp14>SHOULD</bcp14> change to use the new port.  It is expected
that HTTP will continue to be the primary transport method used by
CMC installations.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA has assigned a TCP port number in the Registered Port Number
range for the use of CMC.</t>

<figure><artwork><![CDATA[
  Service name: pkix-cmc
  Port Number: 5318
  Transport protocol: TCP
  Description: PKIX Certificate Management using CMS (CMC)
  Reference: RFC 6402
  Assignee: iesg@ietf.org
  Contact: chair@ietf.org
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Mechanisms for thwarting replay attacks may be required in particular
implementations of this protocol depending on the operational
environment.  In cases where the Certification Authority (CA)
maintains significant state information, replay attacks may be
detectable without the inclusion of the optional nonce mechanisms.
Implementers of this protocol need to carefully consider
environmental conditions before choosing whether or not to implement
the senderNonce and recipientNonce attributes described in
<xref section="6.6" sectionFormat="of" target="CMC-STRUCT"/>.  Developers of state-constrained PKI clients are
strongly encouraged to incorporate the use of these attributes.</t>

<t>Initiation of a secure communications channel between an end-entity
and a CA or Registration Authority (RA) -- and, similarly, between an
RA and another RA or CA -- necessarily requires an out-of-band trust
initiation mechanism.  For example, a secure channel may be
constructed between the end-entity and the CA via IPsec <xref target="IPsec"/> or
TLS <xref target="TLS"/>.  Many such schemes exist, and the choice of any particular
scheme for trust initiation is outside the scope of this document.
Implementers of this protocol are strongly encouraged to consider
generally accepted principles of secure key management when
integrating this capability within an overall security architecture.</t>

<t>In some instances, no prior out-of-band trust will have been
initiated prior to use of this protocol.  This can occur when the
protocol itself is being used to download onto the system the set of
trust anchors to be used for these protocols.  In these instances,
the Enveloped Data content type (<xref section="3.2.1.3.3" sectionFormat="of" target="CMC-STRUCT"/>)
must be used to provide the same shrouding that TLS would have
provided.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

<reference anchor="erratum3593" target="https://www.rfc-editor.org/errata/eid3593">
  <front>
    <title>RFC 5273 erratum 3593</title>
    <author >
      <organization></organization>
    </author>
    <date year="2013" month="April"/>
  </front>
</reference>


<reference anchor="BCP195">
  <front>
    <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
    <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
    <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
    <author fullname="T. Fossati" initials="T." surname="Fossati"/>
    <date month="November" year="2022"/>
    <abstract>
      <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
      <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="195"/>
  <seriesInfo name="RFC" value="9325"/>
  <seriesInfo name="DOI" value="10.17487/RFC9325"/>
</reference>

<reference anchor="CMC-STRUCT">
   <front>
      <title>Certificate Management over CMS (CMC)</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="28" month="May" year="2025"/>
      <abstract>
	 <t>   This document defines the base syntax for CMC, a Certificate
   Management protocol using the Cryptographic Message Syntax (CMS).
   This protocol addresses two immediate needs within the Internet
   Public Key Infrastructure (PKI) community:

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5272bis-06"/>
   
</reference>
<reference anchor="HTTP">
  <front>
    <title>HTTP Semantics</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
      <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="97"/>
  <seriesInfo name="RFC" value="9110"/>
  <seriesInfo name="DOI" value="10.17487/RFC9110"/>
</reference>
<reference anchor="IPsec">
  <front>
    <title>Security Architecture for the Internet Protocol</title>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <author fullname="K. Seo" initials="K." surname="Seo"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4301"/>
  <seriesInfo name="DOI" value="10.17487/RFC4301"/>
</reference>
<reference anchor="SMIMEV4">
  <front>
    <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="B. Ramsdell" initials="B." surname="Ramsdell"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="April" year="2019"/>
    <abstract>
      <t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 4.0. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 5751.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8551"/>
  <seriesInfo name="DOI" value="10.17487/RFC8551"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="TLS">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
    <author fullname="T. Dierks" initials="T." surname="Dierks"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2008"/>
    <abstract>
      <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5246"/>
  <seriesInfo name="DOI" value="10.17487/RFC5246"/>
</reference>
<reference anchor="CMC-TRANSv1">
  <front>
    <title>Certificate Management over CMS (CMC): Transport Protocols</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="M. Myers" initials="M." surname="Myers"/>
    <date month="June" year="2008"/>
    <abstract>
      <t>This document defines a number of transport mechanisms that are used to move CMC (Certificate Management over CMS (Cryptographic Message Syntax)) messages. The transport mechanisms described in this document are HTTP, file, mail, and TCP. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5273"/>
  <seriesInfo name="DOI" value="10.17487/RFC5273"/>
</reference>
<reference anchor="CMC-Updates">
  <front>
    <title>Certificate Management over CMS (CMC) Updates</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="November" year="2011"/>
    <abstract>
      <t>This document contains a set of updates to the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This document updates RFC 5272, RFC 5273, and RFC 5274.</t>
      <t>The new items in this document are: new controls for future work in doing server side key generation, definition of a Subject Information Access value to identify CMC servers, and the registration of a port number for TCP/IP for the CMC service to run on. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6402"/>
  <seriesInfo name="DOI" value="10.17487/RFC6402"/>
</reference>



    </references>

</references>


<?line 306?>

<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>Obviously, the authors of this version of the document would like to
thank Jim Schaad and Michael Myers for their work on the previous
version of this document.</t>

<t>The acknowledgment from the previous version of this document follows:</t>

<t>The authors and the PKIX Working Group are grateful for the
participation of Xiaoyi Liu and Jeff Weinstein in helping to author
the original versions of this document.</t>

<t>The authors would like to thank Brian LaMacchia for his work in
developing and writing up many of the concepts presented in this
document.  The authors would also like to thank Alex Deacon and Barb
Fox for their contributions.</t>

</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="J." surname="Schaad" fullname="Jim Schaad">
      <organization>August Cellars</organization>
      <address>
      </address>
    </contact>
    <contact initials="M." surname="Myers" fullname="Michael Myers">
      <organization>TraceRoute Security, Inc.</organization>
      <address>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA61a25Ybt7F9x1cg1It0Dsm5aSyJThxT1CgeeziaMxzF8crK
A9gNkjjT7O4A3UPxSPK35FvyZWdXAX0jObKTWGvZ00TjUlWo2rUL6MFgIApT
JHokexNtC7MwkSq0nKpULfVap4XMHrSVk+lMPp1MJ89G8s6q1OWZLeSNzYos
yhLXE2o+t/qBJplOHulC8y4zux1JV8Qim7ss0YV2I3l++uKsL796fnwqRJxF
qVpDmtiqRTEwulgMErXO3cAuIuo4Nw4NGFcIV87XxjmTpcU2x5DLi7u3wuR2
JHOrz89evLyzpStOj49fYea0XM+1HYkYY0ciylKnU1di9cKWWkDyM6GsViM5
u5iITWbvlzYr85G8Gk9vZvJHNJh0Kf9EjeJeb9EjHgk5kDflPDGR/EFv5WW6
sMphvqgoraaXE7vNi2xpVb5Cn6l2DkaVs21aqA/8/qDF6c0BC4oHnZaQXcog
2o9/wrNXnaXEr7UyCeybK7f+lmw3zOwSzcpGq5FcFUXuRkdH1IlazIMeVp2O
qOFobrON00c8/ogWMsWqnGNXnVYplEq1PYrWEfagJ4Qqi1VmyQjoKaVJYczv
h6RHrJO+vIiH3O638/vM6XwVXnI7Fh3J8Q/jn67GfZgu8r211+B/M/2tulfb
RA2jbN1ZYjaUdyzJ7hIzyBheyac6NkVmn1UrqdT8nyrgKTBOembj9lqk27fc
ymuRbxTWzMuiUS7oYNZyFq2U4uFe/nIJF8M+JrCo6/SeGnTViZxuNb0JA7Cv
kb7NSmz4TEelNcU2aC9Emtk1hHzgPdbWqqJcn52/OhuxtFWU3r6dcMRUPSR1
6fkuyi510Wz0ZrMZImwG3hi8zTxIHWkT0zAexREhT49PzgbHz9HyenJz8up8
JLHQq7PTc7Qgpgezu9v3kzsE2eDNcC8qT+ER6Pfd3d2NH3dycozflzdOR9zw
/Oz4BA2z6eX04s/Puenl+fkJlDbpoq323dWM356fPv8qrHx3O76ePZyE5hdn
ofl9ToI7bvbYIcRgMJBqjhBUUSHE3co4CUApGcZivTCpdlJJDwUyWyD2qyhb
a+xWatzayWKlCkSMlqXTsSgyuQYC0pIAwF9EyEMBL3zAP3uGVbjBDaHoSh9e
PtYugvvpGO4OWWDYWgUSimzclwuT6D5He18ipOTd5Ga4q3CNsLJ2GepKP8he
w2CvtYnjRAvxBG5Y2CwGeiFO/lXrAQriHdPJIhO16SrN5VM/E2v38WPjWZ8/
P9u1iviSVeR/bBW/evCuz595hG8LrvX5M6CmuwGJyyBAlFnIp/wkrUDFAEGG
vNV/L41l33DyTtu1SbMkW25JFi2RPSSlDyd70/ezu17f/5XX7/j59uJ/3l/e
Xryh59l346ur+kGEHrPv3r2/etM8NSMn76bTi+s3fjBaZadJ9Kbjn3reNL13
N3eX767HV73DBoXbzzVeFdoimRawu4Id2psAmPjnP06ewwK/g0udnpy8gg39
j5cnL57jx2alU79alibb8LNY6a1Qea6VpVlUkshI5aaAadHXSbfKNqlcaath
y//6K1nmbyP5+3mUnzz/JjSQwp3GymadRrbZfsveYG/EA00Hlqmt2WnfsXRX
3vFPnd+V3VuNv/9jgoiQg5OXf/xGsANN4PYULDP4mm5C18PcVAPl91xVFvpD
AZNdjq/HsKMzSwoyRIDkCD0/O3kpgbRkf4pOil+Mx4AJMhcwjeIVryiEJGYC
OQIKOB7ytsQm3fxwyX4N4uU8jmgEKViUwxy3Ok+Q12KCb3kyPOZh/vkUeU8S
YbPeFVQc81IACrPOEwRJwYnZkdsJ6yOHsANzJEm2YamsRmaGb8ahK2PH73yi
4qAbx7EFwrBZdgPyiXwLpQavFb2u2JQQF6nFAuzwNTiRgLbSC0CypSBgPFpg
Vgyf62KjdSqjxFBwCxrgtAX+O1iVGCIZcOC2rtDrwZyXbFCsL10ZrcjLKRaE
biRA+OXaUibEADIeqEy2QJIlx/CLAR1/xChewHXyU4PDc5MqC0Kxu2Oyu4te
wVrtvigo3iSHFhTmaM1SCn9XKPJAOIuStpnL7kzBkSxI/8S70FBG9u9szsjm
kmaJD7rSUSVMX9CcOiIekGy/5s4ReWYB4NAh/Rz0Tsi+JpzWwjtMtQnMjNud
Q1DPveFGCLRPNSW/o77h3yf2F3lRjZSfxKfR4MC/vdb/xowz9uqO8THjMD85
ls0/zLi/R7z0kOzW7diZMdidZnwRPT5j6BZmzDsdP47kE/ZSE3tS+YceK3xo
W+RlDNfzlAem6H2mcJoiwe6FEzE7uQHxyWkDKJ2EPO/3CPRf6vTB2Cz1abGm
CjwwZQI45PyIqAF3Wpu1bs0XcpTTzE5o/kLdUzTYbI2YD8SS4p2DxMeiYi4Q
wjAPovZlV9QqpAlnEkVkHe4uiM21tclyWlcliMLrDOyPxWeRSFWzAD5QHLM4
mEmwyysby9kRL/eU2b7XtuaBAKewuS0osDXIWmqPMsJLrw+J2INMSdiOo/w+
cifHPS5ZaCy5PCQc+wCgOqQOamSSpKSptKFo54iVYdyAxglCnbolNnAAZ9jY
0KVgMhMIWh1TdULh5WglgZV65Oy9R3TbgZ5avEpRYGNbGbGn7osBeUaPtIRk
9MzSy1xZqIs004Ix3om2jo0qcgMzQN8HlZSMb70I3N4NCPt6XRMK7sq2p6Dr
tfSvliLk8jkU8kOSgukxRlSLC16dMO2L9hWCY3jfG34Tg9HefdFilY+IPeMQ
1Qii7FhHdqyzbllH/GrrfME44svG+Q3d6T+2jpflF8wj/g3n2TWPeMx5PslL
PDdQ75GundseyXChddbuv5f1DifB3Re7gx5Nifs4FqRo5cpP8vpo/GvS5uFt
9WlyXU/W8uLHU+svzBbVszWA8YX8+68KV+V3ztLsjU2W5t35lVkaaZpq4iP6
32wvWd+1c2lV1bnK6R5osopehVqB5kGepT9UKiM7iYZ2ctqE31+mcp3BtpGx
KCU9d3T9dsnB0/BxCaoDUc+H3PxgYibgW5nqiMLZbuvQpdQdhOUEq9WDdrHN
UEVaKj+wLuppTEoC02lDoOdyn56zAEXmK9sM4xE9LGGLPdqSGTZ2bYvJv5GT
MBsHLClCCt28ww9/7kHz8Vk0MQJtbJ3CefQsrN8ZfXp83KAXQRWLjuqAVF+U
SVOFdCUY/yRVgRjPC14UFZHXqCYNXsuq9Pr4EU+wb2ZFVYIlkLhcrmqzEMtI
M59oqsrLlTnvKwYP5eVC0HTkML6ZyqAtFSihfkt9AcdW9DSq+8ITA5j3S8Vc
q5bbMRkV16hny3VVCNXi+Tpp64l+cC4+lSb/9aFQF1xRlt0bcsbXzC67vfqE
rm/Mki4Vum861m97E5OzD1Sw7BWrGfOr4ERpTIVNYU3UUtZ7fYdKumytPe4T
Uw6DLbuF4B2ujtj87BiTsgt+DaNoZRMUfYxEbGAe7Qk2OTHViOyuNKHViX5Q
aRG4G22rzz+1wk+etEEGtXUHbhsm2o4Aw3nW3334ROYN4kb+zGsSUhfnlpVW
cZVXVwhlng2SIh6toaNVn1kDtQ8gyK7B5UEWb6sMWZefHrt8+dskZmpjJkAi
+9+ipYvXtYPY0DZlPwpFQwfNWck1Mi9ehNnbUrP7ed3gZ15/HyuPyfb64lY+
9Q55EcQUt7R5zzpiB8auqnR1qJgf/qZ2Rva4m9zspQ0urTqnueRRrj4CVzzK
Ww7ukHrM7gNf6lpKwIg11HR3EfEw3ZuXCz/CVG8/URE7OioJOgdUiJLM8QF1
s7JUCyJwABxtHnxBWOEqh7wpII4rOU5D1AYvp1MV4oMc7S2fd0TpmgWG4lb7
l3Rc0lqYgmtdJoWh/QqwjgK3xuk+n61gf6jWRBpKaY56QDNRq07m8OZzdcY9
GU5bwox9MmzrDJI7hSMlPsIJR1tZaSNegFTzEGm1cvhNvFUEhSnPsD0PmRNp
boUAn1PRbOIkpC7CL6xnsljQtsKZvvbwQo9ZiYIrK5OYsBpIkyR8suY0FlMJ
av20pMP0JEuXdCIJDws+4njLlga2Iodh2A8XEFX+84rRDvNNg6h909OMyU11
rUAkyrscpLq8qf26mtA40cvvzYdBtI6qgqAVrhhUn6bimQ5UIesNNGZZdo5j
+xwnMcgbJVeOvkc1oSTBGwtMp/LApmwgGH5hlmXduzpbgODmgcL3hlotnRQP
hc9RO5nXE4YNoT0kJDYFQ/PZvuJsVaeAIhNZFJXE4arcG07LIj6JpiEVdUn1
huUhvseWqNKgYFflZLUxdKzfWm/uxwJ31oSCuzdH3q/nW956PnVMEq+BByM+
1Aa2OZBE61+Ek27yxPq0WzU7VO2pJyS3jeHZaNf8VrDtDp+K//zzz8Ibw0Q6
3OhWzoEXrVlG7Ap0dVkrVR01jUgevHnDDDv3989A7b88cvEfgKb+1gJDbzWf
LEV6VF/coXXsNUYjOM2yfdNPCUBFxYg2ztjmDelDlqwunfesOW3u2rxBNqhE
mQ3T2f6WaKeK7utD8RrDYWGqWU1UJsqKXf+rIqeyCIoNgJ1PbH5rPAfnszXR
OiD01USkCNI3fDpNnRuzERyN+QMEUubpZPxMrBVIPf4Do4FxuBuRRaqPZX3L
TOnooEYi1lRjqHnia3aCLOayVPVzkRyyVXUSiMAmXG1O94fistLeHyLuqI79
YqoYAc1B8X2E8x60FVccOLHx9ptryA28XmUZuwZMwXkKO0S4QoVMtabwCSvF
fNdZg/iRyQkZQlPhv2zQ3QtVFGKzAPFfDb8KQVDfyw7JgR90QjvFarFJB57v
KT7jJSZS11yWTj+hzRIaUrourVp6zVs3p+2Iw6Nry8YVHQzgd5nvHpw/PaXC
oUzD/jsGp1Qn9REu4WcaD4i+F1u+m1FyMiZjeQCwe35zO34m6ZuBNO7Da9b0
XQxR6WZCcTv211aBINzydJgUo6pC1UDRJl9B4rIYZAvwIIwr6BMkYRp1an+B
Wd9iKv1B0Q72W0oGrYJftnl1+6y60ZQF5PAYywej/GcXSEj811d/VMGFYpBo
FlVNXBm5aAXnIQyHefr1RPA3E6590LMV376/RwjSTLY0o1PysiCH9lQpyvIm
dVaXy78UJEz8DntPHS1LnRJtQAcFYpUXfLgP3yLu5B3UG5Iu2tcNuPKdG9X9
S/IDJnTE6FWu5ibheyaEvWEvypiXJH4itjB9LkX4UPK9NKCJCU91QeaY4+bM
BfZ232dDpgDEmSpn8FJ78lAHQssUzEBYQMhDyZkV4BqmtpYpnE4WZPm5Jo3C
Zxew9iZNMmKXacVk+UYykFo6YRReNkiPWHAhR9f00odktY7zaOwbG50ZcS5S
Dw2xfKMK1TltlU8bXDkbng5PhmfDs110AW6THPP6m5HqMKjh225lszL2O6b4
VCKQSbKpCN3j6nuWOUCdU904uk+zTaJjv/9OfBx5VqDjP/QWKnGaDsrezR9M
VjqKei6PGBsaxyQu1AL/+hsJL0Bi7oneEPNJ71vfh3EgdT4Aq6yKSoY+Lqyy
X241Ly8663TihWscVeuybl8z1ePlY+N36vBKvSrQmYx0Pm7kCKQIoRxVSS08
BJi8huS/GJVtjbwyJc/1vV4s5I+aixqEkKEvOBK+OyOyyYuytwB2l4aSZ5DX
PapwELRjZ+nt/BrVayqv1BThvwLekZA0BRsW2Sz22YoLPsi2QQRzcOSEBvXZ
QUQZMS8o4DSVmgc+uApFQFcW/gaoK9A40R+QI1VENRJWfK3sXLzNPrQ2vf6o
0JPa/wcc+yHmdysAAA==

-->

</rfc>

