<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-x509-alg-none-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title>Unsigned X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-alg-none-03"/>
    <author initials="D." surname="Benjamin" fullname="David Benjamin">
      <organization>Google LLC</organization>
      <address>
        <email>davidben@google.com</email>
      </address>
    </author>
    <date year="2025" month="May" day="24"/>
    <area>Security</area>
    <workgroup>Limited Additional Mechanisms for PKIX and SMIME</workgroup>
    <keyword>self-signed certificate</keyword>
    <abstract>
      <?line 40?>

<t>This document defines a placeholder X.509 signature algorithm that may be used
in contexts where the consumer of the certificate is not expected to verify the
signature.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://davidben.github.io/x509-alg-none/draft-ietf-lamps-x509-alg-none.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-x509-alg-none/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Limited Additional Mechanisms for PKIX and SMIME Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/davidben/x509-alg-none"/>.</t>
    </note>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>An X.509 certificate <xref target="RFC5280"/> relates two entities in the PKI: information
about a subject and a proof from an issuer. Viewing the PKI as a graph of
with entities as nodes, as in <xref target="RFC4158"/>, a certificate is an edge between the
subject and issuer.</t>
      <t>In some contexts, an application needs standalone subject information instead of
a certificate. In the graph model, the application needs a node, not an edge.
For example, certification path validation (<xref section="6" sectionFormat="of" target="RFC5280"/>) begins at
a trust anchor, or root certification authority (root CA). The application
trusts this trust anchor information out-of-band and does not require an
issuer's signature.</t>
      <t>X.509 does not define a structure for this scenario. Instead, X.509 trust
anchors are often represented with "self-signed" certificates, where the
subject's key signs over itself. Other formats, such as <xref target="RFC5914"/> exist to convey trust anchors, but
self-signed certificates remain widely used. Additionally, some TLS <xref target="RFC8446"/>
server deployments use self-signed certificates when they do not intend to
present a CA-issued identity, instead expecting the relying party to
authenticate the certificate out-of-band, e.g. via a known fingerprint.</t>
      <t>These self-signatures typically have no security value, aren't checked by
the receiver, and only serve as placeholders to meet syntactic requirements of
an X.509 certificate.</t>
      <t>Computing signatures as placeholders has some drawbacks:</t>
      <ul spacing="normal">
        <li>
          <t>Post-quantum signature algorithms are large, so including a self-signature
significantly increases the size of the payload.</t>
        </li>
        <li>
          <t>If the subject is an end entity, rather than a CA, computing an X.509
signature risks cross-protocol attacks with the intended use of the key.</t>
        </li>
        <li>
          <t>It is ambiguous whether such a self-signature requires the CA bit in basic
constraints or keyCertSign in key usage. If the key is intended for a
non-X.509 use, asserting those capabilities is an unnecessary risk.</t>
        </li>
        <li>
          <t>If end entity's key is not a signing key (e.g. a KEM key), there is no valid
signature algorithm to use with the key.</t>
        </li>
      </ul>
      <t>This document defines a profile for unsigned X.509 certificates, which may be
used when the certificate is used as a container for subject information,
without any specific issuer.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="constructing-unsigned-certificates">
      <name>Constructing Unsigned Certificates</name>
      <t>This document defines the id-alg-unsigned object identifier (OID) under the OID arc
defined in <xref target="RFC8411"/>:</t>
      <artwork><![CDATA[
  id-alg-unsigned OBJECT IDENTIFIER ::= {1 3 6 1 5 5 7 6 36}
]]></artwork>
      <t>To construct an unsigned X.509 certificate, the sender MUST set the
Certificate's signatureAlgorithm and TBSCertificate's signature fields each to
an AlgorithmIdentifier with algorithm id-alg-unsigned. The parameters for
id-alg-unsigned MUST be omitted. The Certificate's signatureValue field MUST be
a BIT STRING of length zero.</t>
      <t>An unsigned certificate has no issuer, so there are no meaningful values to use for
the issuer and issuerUniqueID fields and the authority key identifier and issuer
alternative name extensions. This document does not mandate particular values
but gives general guidance: Senders SHOULD omit issuerUniqueID, authority key
identifier, and issuer alternative name, unless needed for compatibility with
existing applications.</t>
      <t><xref section="4.1.2.4" sectionFormat="of" target="RFC5280"/> does not permit empty issuers, so such a value
may not be interoperable with existing applications. Senders MAY use the subject
field (if the subject is not empty), as in a self-signed certificate.</t>
      <t>Senders MAY alternatively use a short placeholder issuer consisting of a single
relative distinguished name, with a single attribute of type id-alg-unsigned and
value a zero-length UTF8String. This placeholder name, in the string
representation of <xref target="RFC2253"/>, is:</t>
      <artwork><![CDATA[
1.3.6.1.5.5.7.6.36=
]]></artwork>
    </section>
    <section anchor="consuming-unsigned-certificates">
      <name>Consuming Unsigned Certificates</name>
      <t>X.509 signatures of type id-alg-unsigned are always invalid. This contrasts
with <xref target="JWT"/>. When processing X.509 certificates without verifying signatures,
receivers MAY accept id-alg-unsigned. When verifying X.509 signatures,
receivers MUST reject id-alg-unsigned. In particular, X.509 validators MUST
NOT accept id-alg-unsigned in the place of a signature in the certification
path.</t>
      <t>X.509 applications must already account for unknown signature algorithms, so
applications are RECOMMENDED to satisfy these requirements by ignoring this
document. An unmodified X.509 validator will not recognize id-alg-unsigned
and is thus already expected to reject it in the certification path. Conversely,
in contexts where an X.509 application was ignoring the self-signature,
id-alg-unsigned will also be ignored, but more efficiently.</t>
      <t>In other contexts, applications may require modifications. For example, an
application that uses self-signedness in interpreting its local configuration
may need to modify its configuration model or user interface before using an
unsigned certificate as a trust anchor.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>If an application uses a self-signature when constructing a subject-only
certificate for a non-X.509 key, the X.509 signature payload and those of the
key's intended use may collide. The self-signature might then be used as part of
a cross-protocol attack. Using id-alg-unsigned avoids a single key being used
for both X.509 and the end-entity protocol, eliminating this risk.</t>
      <t>If an application accepts id-alg-unsigned as part of a certification path, or
in any other context where it is necessary to verify the X.509 signature, the
signature check would be bypassed. Thus, <xref target="consuming-unsigned-certificates"/>
prohibits this and recommends that applications not treat id-alg-unsigned
differently from any other previously unrecognized signature algorithm.
Non-compliant applications that instead accept id-alg-unsigned as a valid
signature risk of vulnerabilities analogous to <xref target="JWT"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to create the following entry in the SMI Security for PKIX Module Identifier registry, defined by <xref target="RFC7299"/>:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Decimal</th>
            <th align="left">Description</th>
            <th align="left">References</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD</td>
            <td align="left">id-mod-algUnsigned-2025</td>
            <td align="left">[this-RFC]</td>
          </tr>
        </tbody>
      </table>
      <t>IANA is requested to add the following entry to the
"SMI Security for PKIX Algorithms" registry <xref target="RFC7299"/>:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Decimal</th>
            <th align="left">Description</th>
            <th align="left">References</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">36</td>
            <td align="left">id-alg-unsigned</td>
            <td align="left">[this-RFC]</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8411">
          <front>
            <title>IANA Registration for the Cryptographic Algorithm Object Identifier Range</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="R. Andrews" initials="R." surname="Andrews"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>When the Curdle Security Working Group was chartered, a range of object identifiers was donated by DigiCert, Inc. for the purpose of registering the Edwards Elliptic Curve key agreement and signature algorithms. This donated set of OIDs allowed for shorter values than would be possible using the existing S/MIME or PKIX arcs. This document describes the donated range and the identifiers that were assigned from that range, transfers control of that range to IANA, and establishes IANA allocation policies for any future assignments within that range.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8411"/>
          <seriesInfo name="DOI" value="10.17487/RFC8411"/>
        </reference>
        <reference anchor="RFC7299">
          <front>
            <title>Object Identifier Registry for the PKIX Working Group</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>When the Public-Key Infrastructure using X.509 (PKIX) Working Group was chartered, an object identifier arc was allocated by IANA for use by that working group. This document describes the object identifiers that were assigned in that arc, returns control of that arc to IANA, and establishes IANA allocation policies for any future assignments within that arc.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7299"/>
          <seriesInfo name="DOI" value="10.17487/RFC7299"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="JWT" target="https://www.howmanydayssinceajwtalgnonevuln.com/">
          <front>
            <title>How Many Days Has It Been Since a JWT alg:none Vulnerability?</title>
            <author initials="J." surname="Sanderson" fullname="James 'zofrex' Sanderson">
              <organization/>
            </author>
            <date year="2024" month="October" day="09"/>
          </front>
        </reference>
        <reference anchor="RFC4158">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Certification Path Building</title>
            <author fullname="M. Cooper" initials="M." surname="Cooper"/>
            <author fullname="Y. Dzambasow" initials="Y." surname="Dzambasow"/>
            <author fullname="P. Hesse" initials="P." surname="Hesse"/>
            <author fullname="S. Joseph" initials="S." surname="Joseph"/>
            <author fullname="R. Nicholas" initials="R." surname="Nicholas"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document provides guidance and recommendations to developers building X.509 public-key certification paths within their applications. By following the guidance and recommendations defined in this document, an application developer is more likely to develop a robust X.509 certificate-enabled application that can build valid certification paths across a wide range of PKI environments. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4158"/>
          <seriesInfo name="DOI" value="10.17487/RFC4158"/>
        </reference>
        <reference anchor="RFC5914">
          <front>
            <title>Trust Anchor Format</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="S. Ashmore" initials="S." surname="Ashmore"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>This document describes a structure for representing trust anchor information. A trust anchor is an authoritative entity represented by a public key and associated data. The public key is used to verify digital signatures, and the associated data is used to constrain the types of information or actions for which the trust anchor is authoritative. The structures defined in this document are intended to satisfy the format-related requirements defined in Trust Anchor Management Requirements. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5914"/>
          <seriesInfo name="DOI" value="10.17487/RFC5914"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC2253">
          <front>
            <title>Lightweight Directory Access Protocol (v3): UTF-8 String Representation of Distinguished Names</title>
            <author fullname="M. Wahl" initials="M." surname="Wahl"/>
            <author fullname="S. Kille" initials="S." surname="Kille"/>
            <author fullname="T. Howes" initials="T." surname="Howes"/>
            <date month="December" year="1997"/>
            <abstract>
              <t>This specification defines the string format for representing names, which is designed to give a clean representation of commonly used distinguished names, while being able to represent any distinguished name. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2253"/>
          <seriesInfo name="DOI" value="10.17487/RFC2253"/>
        </reference>
      </references>
    </references>
    <?line 187?>

<section anchor="asn1-module">
      <name>ASN.1 Module</name>
      <artwork><![CDATA[
SignatureAlgorithmNone
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-algUnsigned-2025(TBD) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
  SIGNATURE-ALGORITHM
  FROM AlgorithmInformation-2009  -- in [RFC5912]
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-algorithmInformation-02(58) } ;

-- Unsigned Signature Algorithm

id-alg-unsigned OBJECT IDENTIFIER ::= { iso(1)
   identified-organization(3) dod(6) internet(1) security(5)
   mechanisms(5) pkix(7) alg(6) 36 }

sa-unsigned SIGNATURE-ALGORITHM ::= {
   IDENTIFIER id-alg-unsigned
   PARAMS ARE absent
}

END
]]></artwork>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Bob Beck, Nick Harper, and Sophie Schmieg for reviewing an early
iteration of this document. Thanks to Alex Gaynor for providing a link to cite
for <xref target="JWT"/>. Thanks to Russ Housley for additional input.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA6Va23LbRhJ9n6+YZR4sbZHQ3RdtpXapi206unhFOsnW1j4M
gSE5ETDDYADRtKJ8+57uAUCQlFKVXblsgQBmpvt09+kL3ev1RGGKVJ/Kzhfr
zdTqRP4cney/k+c6L8zExKrQviPo19Tly1Ppi0SIxMVWZViV5GpS9IwuJr1U
ZXPf+4q1PZVOe9ZZ3ds/Er4cZ8Z742yxnGPF4HL0XsrvpEq9w6nGJnqu8Y8t
Ol3Z0YkpXG5USh8G/TP8cjmu7kbvO8KW2VjnpyKBMKcidtZr60t/Kou81OLh
VB4JlWuFXYc6LnNTLDti4fL7ae7KOe5emcwUULCf4BQIpFJ5reOZssZnXk5w
0OcfBj9LZRM5vB5cX3bEvV5ig+RU9KTX6aRXIRSvsBEP2paQRsr//RQpAzSd
nyCssVP5gbai+5kyKe77ufLZPwjlyOVTeqDyeIYHs6KY+9O9PXqPbpkHHdWv
7dGNvXHuFl7v8Q57tHJqilk5xtpEPZhkrO3emsnolZRsXrS2r1+NwuLIuPVF
e3/sBtGsyNKOEKosZg72kz0cIqWxMF3nIpJn2v6iMmM7fDs4VueCztx4BK0A
4zdFsOKVD85NUy2vrs7DYx3gqqX9x5SfR7HLhDAWyGdY+cDG+vTT6JTXVN7/
0S3ktbJLeaGWXn5UXg4KHK6tHBoba6loBXx2ekoKyR/L1OpcjU0KJ/t72Ejl
Uw3QaswWi0U0c4sMmybY09M26pdFgT1oiwfsQJLt8WL2aHm4f3jcO9jv7b/j
mw1c+AmI1Zh9iuQQ/qNz7ypkGtg+4ZeXr765Sa6/vmq/Jnq9nlRjX+QqLoQY
zYyXiOMyQ+jJRE+MxUIl56mK9cylWFYxATm9Kspck/4IzmKWyWKmCnjnUo61
LL1OgK9EQBb6a+HlYqbxcjHTdMvjgFy6Sfi8ChyJ460rpP461zHFS+Hkg87N
ZElviubQKAiemSRJtRDfyYEtcpeUMTmBEH1bSdne+vHxL3fvz08O3+4/Pclc
sz/LYuEkVEVM4gPEJXkQiaeycQ3sp8auLIACWOsXiMVRCkxyBwUmuctwA4L7
UueR/NHoBUVrtZFUBN80V/MZ1BUL4LQ6T5GyifZdusLhj49/h4THBydvn55w
bxMYnKKTqQa6xYKckBFpiVSJIMTASu8y3WDfpaVqPk9pKygkrdaJB2ljlUrJ
dettWlqTVxVaJST2migRwGb1glYZNEi7fGP7CMUKdtmmlfiReA+201/BCCme
rDamVXMFfB5UapLweefxEazNl6/JXVYW3AUMU4goVQHxwPWeTogRG5wcYJti
Y+8QOQhNucNPz/u7kRytiy14I7gFxUF70zVk4A09N+mN2Q/wN3E6uG2ufy0N
hYQVwRivvGz7bHDK5vUQX+RYOCrmYKJMwIf7WFuVG0dosx26lUuzVCJIBe2x
xk0KeEOu57lG7qOoYTfrtJJTp21A+EMTjLUDQVCkNRbWS4eQk6ag9ZG8xVu5
DMpjpS/jGblr8NWTdwfHiCb91QApxCo87gHbtJHDmnFZiBcypYfcIGgLkeFG
S6aNqJUl02U3+PLoalid+fb4+PXTEzbMSUwUCqlbEl15WvxSRmb+YbddAn9G
3wAqSwwjKuBgiPN+jw2HYEo4THF8HQeBk+rYBoEs6XqucngUNiH3oiUcrZu0
1vKYrtTRNJIPRuG8e+sWVsILpjqf55AoIg7WbT3YdzwVA9gKeMiZetBQAG+E
cobipUQkwRXsKzj9TMf3UGC8FEHOWCO95V32VGexASNHNmyxuifrZVoX0i9t
gVxg4tqbA7bEAs+wKuQ9d9m8ZFxa4m7uPsMNtiOKgsVYxff+VIi/ys/OF71f
S2WLMnsupQQHTymLkh/AFnFaJnSW2kAICY+uWSxbQEu8irLPE3SAwZtvus43
c7VMnUoiEmAQbjX8F1gWSNXWzxX7P1KbZf8AYzX61oBUZwfZc+PvvYxz530P
KaJwsUtBUgXpHAKTDgzOBzORz1ZyIQCDTEGObGympSvZc1mGEHobetdWCmqe
9+XYkGvLsfImhmCUbJHcDdswpzOohh9iOb1FMV96NSVSb4Sg0xv5iJAU9kF5
0gvWh8SUsDw5AQeDgwqxmofCh/Moo1haC9/zXuVLBqXGe4VuRTpVzlfBgNiS
bu5wlCj5w+U1fd7lDJNXBUJIEWuwt6oQx6A2UAdYX6xscjcxaSDecr3Z2aRM
A/hDdSOIphpG2czT/JDzPiVgQB/487kk2+WKgKsLlJkeBEP7rDL5d/KcGNXS
u54j+IIkZ3L0TBUMFrUjXnauvwxH1CLRb3lzy9d3l//8Mri7vKDr4cf+1VVz
Ub8x/Hj75QrPRXW1Wnl+e319eXMRFuOu3Lh13f9XJ/BK5/bzaHB707/qhCLK
eNFgTREMm4yD04PmdBHwQeUT52ZMZGvl2flneXBcFWmHBwfvkFbCh7cHb5Bj
BKHdIrHwkfkc+VsrytBwgpQ80aCeDkWVnxG/kuPUYIZUS17WtLbtpvYlR+GY
Tbh5abzEVebkTDExsPLO7eBiF26UMGNoiY/UlImwSxJqPNbp+ODg6QkU+Pvv
v8ONN3e+Pft0eT6Sg4vLm9Hg/eDyTp6efi8fD+QRyqADeYI/b3B19PqJNxAj
V8V5yaXgHzhyKNS8ZhHZTzw4nwqBFgrtqqXfxBVBPzobvvAekphO4YRaIUoo
HVrZLB2sEOKoXMXqhuKhHkNKRb9SUNpAoIhNcFhqeJNDR13Ua16Q6kdKjUG0
eh2qxbPBSA5Hd4ObD0S9qbZTCPVN5y7i1qE5qR3XMy7Wq8jkXBT4iLzbUupU
RF2TMg3p2Nc0RBqw8/DCVp3+xZpfSw0HqYCjJ1xEN2Uqc+MKutVSoVKgY7lv
5RYPtQnomsYpnuBYc+C62Myo2C8YXST3Ejm1klSgPJNTbOXlVFMDm8ppiQIc
rempHLKneFlRA2G+IX93XWKxkrjbElluitwFzCmyAzcKVZ6hzIo3QgPNriK4
suRcuyrSPcy06guOo4PoMDpe7w5Was91TjLrbF4sK1k8m6/KpoyBIFqnt2uS
cnNq5NMqizwvRIMNaJBN3SokRHC5HbNVXnB3S8Ls1l2feqlmhZrtI1oIhkKZ
VgL4Yq07r+AmOqiEBjCUWu0UnTK3vWSCJDwsjZ/h0GCQEJvVq1SygJzLIpQn
y/k2/8G6guHDIoqeXhVJX0bv3w6x2E4rZ2zLF46qOm3Pb4mmdanaq0lV6R8e
nhxRJ2x8xZQH0VH0GvY+wZ83uDp6/X0gwEDtZfYHvL4xtvAvq8XVxIJGPsZy
oVGpQdk8V2gPQxv/+Pjpp9HTUyR/ojoAdQQVOyTAdvUg6ywfZhnrtXJX1DV6
Zec41vNimxr5mNUGm/qsbUNUl+sqPW3sM7AtDqi7yqrndtViQdn+eUFq27FR
a+eqk4DZLIiop6amvml+2yEkM24TU9TpyZKOcyUYK1RioTN6riWg6BVr25DF
WqUJUa/HIx+mRl6vdzJj8MDUujwUr61KBX0nkX/mEqKvZBMZGBHlRWjzY4dK
9duW74hAeNgWZXutV3uWVdukeBYpHn9EoeTLQQrL7jMTtKYLa09bFkQlK6U2
28fuVhJlXWjazpRHK3XCjbrMcCn1BDIZTY1UmCc57kBaA6U1M4I969FHQK/h
yLVZj7Jtu4VxYUkdWosALeUEY1e1ImlkoH3q0P6SBBO0RXnwLKZtHaDlg5f8
6tpLYUBFvQ+OysO+E3LdsZ6QqqUPrZx4Nu1zGd8eZ3AdWX+TwKyDhBdOAsmg
vdkYtbF+W00btw5xuxptpos9Km9FWwZuwVoNGLJsKOM2J7FVY1uVEq7pLOkb
i1d+veck6NCZwrd1qKA2JMzMdMaFoa2nudzTgziqgeBzDW4kvzCaW5T64AxP
A6vcQpXNWNObPCYmBcfwsNqxq0oIwvZCoyjrc7pSpwYsr4o6euvWchv5QF9+
W5hGjbURax1/ND6ksKOGbM3rq/gzIY03re3ahHrTJN31sXUYzqBdK1EcANbx
ck6NNCeYElH1+BjXaayRt9dOJOiDAMUMJVI9pCSwiI8yMFjiQ0ytBScRVgEm
2iJygXiZQCOellRj7FplBN6DcaWnQsM2dJc8x8eRuIFnUumWGmU3Dmdx6gHa
C/mEQyw09OtTFLLQQ+s7FR6ZW5W6KU1FgHudgfkLgP5Nfzsc6Sb5CMhJ+4qD
aSxUjegmCADH43qgkC9rUh5eD1Yh3nw3d+2SEr7bamZyPUUZlSMa6wYPuSU0
eG8O373jBu83dOyxyUBddEUN75xdrf3zm7zTbAn4lPxN/Narf1ZXmz9rT7AE
ndlFtRfwBeURxnUl1DvcPzzBk3+Tx/Qg3X9wyvPgqCR5FpmC+x3ReR6aptPz
nQaUPwPEnwBgS/Gj13Kl+JpjbSpM3xjR6JHcpT+8iQ4qk4bacrjV8cKvaaz4
CJDczsHuqhdLeu3vHHeOdtFuJDuvd0NysbrA2/wFXD2i3TnZRYdYf91Ln+b3
5uvOm93KWDv74f0XTLcD4+7KJyEuLt8PbgY0aRnKwfXnq8E5OtlR/8OQ5gPi
7PLD4AZ2vf58ezcaYsPh4MNNf/Tl7rLXv/pwezcYfbzG3fd3t9et3nw1jMJZ
4C4JlBAH/w7T/cP/sGD/BwZ/HoU2DttC7h/unLwFGvJvZNFVtd/Yb6Wb2Cp7
XhisVNoJPvpPKNhWjRY/rx0koHVwVJjQq5U0z9gnyEN7tWTcJG48/dy/618P
Zf/ukr69hcgCe6P6rduhfkwFdEpfuHHVKx5Pw3+U0Mn3nQkKP915olmXsvdM
pWduLM+Qm7ryxiBDfVT5vG7gh24+MyDFeJYZPeWgp+wQvuakabnKUbCYoqLd
UHO0RhCU3Opj+qn+Kj+oJepN3gjJ7MFU8/zU2HvmZ2zFJUHTYK3W35WoDj9S
YtKBftTq/1MYOy+LSPwXkvsKhL4iAAA=

-->

</rfc>
