<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-eat-measured-component-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="EAT Measured Component">EAT Measured Component</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-measured-component-02"/>
    <author initials="S." surname="Frost" fullname="Simon Frost">
      <organization>Arm</organization>
      <address>
        <email>Simon.Frost@arm.com</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>Thomas.Fossati@linaro.org</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <date year="2025" month="February" day="20"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>EAT</keyword>
    <keyword>measurements</keyword>
    <keyword>claim</keyword>
    <keyword>measured</keyword>
    <keyword>component</keyword>
    <abstract>
      <?line 64?>

<t>A measured component refers to an object within the attester's target environment, whose state can be inspected and digested.
A digest is typically computed through a cryptographic hash function.
Examples of measured components include firmware stored in flash memory, software loaded into memory at start time, data stored in a file system, or values in a CPU register.</t>
      <t>This document defines a "measured component" format that can be used with the EAT <tt>Measurements</tt> claim.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Remote ATtestation ProcedureS Working Group mailing list (rats@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/thomas-fossati/draft-fft-rats-eat-measured-component"/>.</t>
    </note>
  </front>
  <middle>
    <?line 72?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref section="4.2.16" sectionFormat="of" target="I-D.ietf-rats-eat"/> defines a <tt>Measurements</tt> claim that:</t>
      <ul empty="true">
        <li>
          <t>"[c]ontains descriptions, lists, evidence or measurements of the software that exists on the entity or any other measurable subsystem of the entity."</t>
        </li>
      </ul>
      <t>This claim allows for different measurement formats, each identified by a different CoAP Content-Format (<xref section="12.3" sectionFormat="of" target="RFC7252"/>).
Currently, the only specified format is CoSWID of type "evidence", as per <xref section="2.9.4" sectionFormat="of" target="RFC9393"/>.</t>
      <t>This document introduces a "measured component" format that can be used with the EAT <tt>Measurements</tt> claim in addition to or as an alternative to CoSWID.</t>
      <t>The term "measured component" refers to any measurable object on a target environment, that is, an object whose state can be sampled and digested.
This includes, for example: the invariant part of a firmware component that is loaded in memory at startup time, a run-time integrity check (RTIC), a file system object, or a CPU register.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>In this document, CDDL <xref target="RFC8610"/> <xref target="RFC9165"/> <xref target="I-D.ietf-cbor-cddl-modules"/> <xref target="I-D.ietf-cbor-cddl-more-control"/> is used to describe the data formats.</t>
    </section>
    <section anchor="measured-component">
      <name>Information Model</name>
      <t>A "measured component" information element includes the digest of the component's sampled state along with metadata that helps in identifying the component.
Optionally, any entities responsible for signing the installed component can also be specified.</t>
      <t>The information model of a "measured component" is described in <xref target="tab-mc-info-elems"/>.</t>
      <table anchor="tab-mc-info-elems">
        <name>Measured Component Information Elements</name>
        <thead>
          <tr>
            <th align="left">IE</th>
            <th align="left">Description</th>
            <th align="left">Requirement Level</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Component Name</td>
            <td align="left">The name given to the measured component. It is important that this name remains consistent across different releases to allow for better tracking of the same measured item across updates. When combined with a consistent versioning scheme, it enables better signaling from the appraisal procedure to the relying parties.</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14></td>
          </tr>
          <tr>
            <td align="left">Component Version</td>
            <td align="left">A value representing the specific release or development version of the measured component.  Using <eref target="https://semver.org/spec/v2.0.0.html">Semantic Versioning</eref> is <bcp14>RECOMMENDED</bcp14>.</td>
            <td align="left">
              <bcp14>OPTIONAL</bcp14></td>
          </tr>
          <tr>
            <td align="left">Digest Value</td>
            <td align="left">Hash of the measured component computed using the indicated Digest Algorithm.</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14></td>
          </tr>
          <tr>
            <td align="left">Digest Algorithm</td>
            <td align="left">Hash algorithm used to compute the Digest Value.</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14></td>
          </tr>
          <tr>
            <td align="left">Signers</td>
            <td align="left">One or more unique identifiers of entities signing the measured component.</td>
            <td align="left">
              <bcp14>OPTIONAL</bcp14></td>
          </tr>
        </tbody>
      </table>
      <t>The format <bcp14>SHOULD</bcp14> also allow a limited amount of extensibility to accommodate profile-specific semantics.</t>
    </section>
    <section anchor="data-model">
      <name>Data Model</name>
      <t>The data model is inspired by the "PSA software component" claim (<xref section="4.4.1" sectionFormat="of" target="I-D.tschofenig-rats-psa-token"/>), which has been refactored to take into account the recommendations about new EAT claims design in <xref section="E" sectionFormat="of" target="I-D.ietf-rats-eat"/>.</t>
      <section anchor="common-types">
        <name> Common Types</name>
        <sourcecode type="cddl"><![CDATA[
bytes-b64u = text .b64u bytes
bytes8 = bytes .size 8
bytes8-b64u = text .b64u bytes8
]]></sourcecode>
      </section>
      <section anchor="the-measured-component-data-item">
        <name>The <tt>measured-component</tt> Data Item</name>
        <sourcecode type="cddl"><![CDATA[
;# import corim.digest from rfcYYYY as corim
;# import eat.JC from rfc9711 as eat

measured-component = {
  id-label => component-id
  measurement-label => corim.digest
  ? signers-label => [ + signer-type ]
  ? flags-label => flags-type
}

signer-type = eat.JC<bytes-b64u, bytes>
flags-type = eat.JC<bytes8-b64u, bytes8>

id-label = eat.JC<"id", 1>
measurement-label = eat.JC<"measurement", 2>
signers-label = eat.JC<"signers", 3>
flags-label = eat.JC<"flags", 4>
]]></sourcecode>
        <dl newline="true">
          <dt>"id" (index 1):</dt>
          <dd>
            <t>The measured component identifier encoded according to the format described in <xref target="component-id"/>.</t>
          </dd>
          <dt>"measurement" (index 2):</dt>
          <dd>
            <t>Digest value and algorithm, encoded using CoRIM digest format (<xref section="1.3.8" sectionFormat="of" target="I-D.ietf-rats-corim"/>).</t>
          </dd>
          <dt>"signers" (index 3):</dt>
          <dd>
            <t>One or more signing entities, see <xref target="signer"/>.</t>
          </dd>
          <dt>"profile-flags" (index 4):</dt>
          <dd>
            <t>a 64-bit field with profile-defined semantics, see <xref target="profile-flags"/>.</t>
          </dd>
        </dl>
        <section anchor="component-id">
          <name>Component Identifier</name>
          <sourcecode type="cddl"><![CDATA[
component-id = [
  name:      text
  ? version: version
]

;# import coswid.$version-scheme from rfc9393 as coswid

version = [
  val:      text
  ? scheme: coswid.$version-scheme
]
]]></sourcecode>
          <dl>
            <dt><tt>name</tt></dt>
            <dd>
              <t>A string that provides a human readable identifier for the component in question.  Format and adopted conventions depend on the component type.</t>
            </dd>
            <dt><tt>version</tt></dt>
            <dd>
              <t>A compound <tt>version</tt> data item that reuses encoding and semantics of <xref target="I-D.ietf-rats-eat"/> <tt>sw-version-type</tt>.</t>
            </dd>
          </dl>
        </section>
        <section anchor="signer">
          <name>Signer</name>
          <t>A signer is an entity that digitally signed the measured component.
Typically, the signature is verified during installation or when the measured component is executed by the boot ROM, operating system, or application launcher.
For example, as in UEFI Secure Boot <xref target="UEFI2"/> and Arm Trusted Board Boot <xref target="TBBR-CLIENT"/>.
Another example may be the controlling entity in an app store.
It is important to note that a signer is different from the identity of the manufacturer of the component, such as would be found in a manifest like a payload CoSWID.</t>
          <t>A signer is associated with a public key.
It could be an X.509 certificate, a raw public key, a public key thumbprint, or some other identifier that can be uniquely associated with the signing entity.
In some cases, multiple parties may need to sign a component to indicate their endorsement or approval.
This could include roles such as a firmware update system, fleet owner, or third-party auditor.
The specific purpose of each signature may depend on the deployment, and the order of signers within the array could indicate meaning.</t>
          <t>If an EAT profile (<xref section="6" sectionFormat="of" target="I-D.ietf-rats-eat"/>) uses measured components, it <bcp14>MUST</bcp14> specify whether the <tt>signers</tt> field is used.
If it is used, the profile <bcp14>MUST</bcp14> also specify what each of the entries in the <tt>signers</tt> array represents, and how to interpret the corresponding <tt>signer-type</tt>.</t>
          <sourcecode type="cddl"><![CDATA[
signer-type = eat.JC<bytes-b64u, bytes>
]]></sourcecode>
        </section>
        <section anchor="profile-flags">
          <name>Profile Flags</name>
          <t>This field contains at most 64-bit of profile-defined semantics.</t>
          <sourcecode type="cddl"><![CDATA[
flags-type = eat.JC<bytes8-b64u, bytes8>
]]></sourcecode>
          <t>If an EAT profile (<xref section="6" sectionFormat="of" target="I-D.ietf-rats-eat"/>) uses measured components, it <bcp14>MUST</bcp14> specify whether the <tt>profile-flags</tt> field is used.
If it is used, the profile <bcp14>MUST</bcp14> also specify how to interpret the 64 bits.</t>
        </section>
      </section>
      <section anchor="eat-measurements-format-extensions">
        <name>EAT <tt>measurements-format</tt> Extensions</name>
        <t>The CDDL in <xref target="fig-eat-plug"/> extends the <tt>$measurements-body-cbor</tt> and <tt>$measurements-body-json</tt> EAT sockets to add support for <tt>measured-component</tt>s to the <tt>Measurements</tt> claim.</t>
        <figure anchor="fig-eat-plug">
          <name>EAT measurements-format Extensions</name>
          <sourcecode type="cddl"><![CDATA[
mc-cbor = bytes .cbor measured-component
mc-json = text .json measured-component

; EAT CBOR (`.feature "cbor"`)
$measurements-body-cbor /= mc-cbor ; native
$measurements-body-cbor /= mc-json ; tunnel

; EAT JSON (`.feature "json"`)
$measurements-body-json /= mc-json            ; native
$measurements-body-json /= text .b64u mc-cbor ; tunnel
]]></sourcecode>
        </figure>
        <t>Each socket is extended with two new types: a "native" representation that is used when <tt>measured-component</tt> and the EAT have the same serialization (e.g., they are both CBOR), and a "tunnel" representation that is used when the serializations differ.</t>
      </section>
      <section anchor="measurements-format-for-cbor-eat">
        <name><tt>measurements-format</tt> for CBOR EAT</name>
        <t>The entries in <xref target="tab-mf-cbor"/> are the allowed <tt>content-type</tt> / <tt>content-format</tt> pairs when the <tt>measured-component</tt> is carried in a CBOR EAT.</t>
        <t>Note the use of the "native" and "tunnel" formats from <xref target="fig-eat-plug"/>, and how the associated CoAP Content-Format is used to describe the original serialization.</t>
        <table anchor="tab-mf-cbor">
          <name>measurement-format for EAT CWT</name>
          <thead>
            <tr>
              <th align="left">content-type (CoAP C-F equivalent)</th>
              <th align="left">content-format</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>application/measured-component+cbor</tt></td>
              <td align="left">
                <tt>mc-cbor</tt></td>
            </tr>
            <tr>
              <td align="left">
                <tt>application/measured-component+json</tt></td>
              <td align="left">
                <tt>mc-json</tt></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="measurements-format-for-json-eat">
        <name><tt>measurements-format</tt> for JSON EAT</name>
        <t><xref target="tab-mf-json"/> is the equivalent of <xref target="tab-mf-cbor"/> for JSON-serialized EAT.</t>
        <table anchor="tab-mf-json">
          <name>measurement-format for EAT JWT</name>
          <thead>
            <tr>
              <th align="left">content-type (CoAP C-F equivalent)</th>
              <th align="left">content-format</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>application/measured-component+json</tt></td>
              <td align="left">
                <tt>mc-json</tt></td>
            </tr>
            <tr>
              <td align="left">
                <tt>application/measured-component+cbor</tt></td>
              <td align="left">
                <tt>tstr .b64u mc-cbor</tt></td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="eat-profiles-and-measured-components">
      <name>EAT Profiles and Measured Components</name>
      <t>The semantics of the signers and profile flags fields are defined by the applicable EAT profile, i.e., the profile of the wrapping EAT.</t>
      <t>If the profile of the EAT is not known to the consumer and one or more Measured Components within that EAT include signers and/or profile flags, the consumer <bcp14>MUST</bcp14> reject the EAT.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>The example in <xref target="ex-1"/> is a measured component with all the fields populated.</t>
      <figure anchor="ex-1">
        <name>Complete Measured Component</name>
        <sourcecode type="cbor-edn"><![CDATA[
{
  / id / 1: [
    / name / "boot loader X",
    / version / [
      "1.2.3rc2",
      16384 / semver /
    ]
  ],
  / measurement / 2: [
    / alg / "sha-256",
    / val / h'3996003d486fb91ffb056f7d03f2b2992b215b31dbe7af4b37
              3431fc7d319da3'
  ],
  / signers / 3: [
    h'492e9b676c21f6012b1ceeb9032feb4141a880797355f6675015ec59c5
      1ca1ec',
    h'4277bb97ba7b51577a0d38151d3e08b40bdf946753f5b5bdeb814d6ff5
      7a8a5e'
  ],
  / profile-flags / 4: h'0000000000000101'
}
]]></sourcecode>
      </figure>
      <t>The example in <xref target="ex-eat-1"/> is the same measured component as above but used as the format of a <tt>measurements</tt> claim in a EAT claims-set.</t>
      <t>The example uses TBD1 as the <tt>content-type</tt> value of the <tt>measurements-format</tt> entry.
(This will change to the value assigned by IANA to the <tt>mc+cbor</tt> Content-Format.)</t>
      <t>Note that the array contains only one measured component, but additional entries could be added if the measured TCB is made of multiple, individually measured components.</t>
      <figure anchor="ex-eat-1">
        <name>EAT Measurements Claim using a Measured Component (CBOR)</name>
        <sourcecode type="cbor-edn"><![CDATA[
{
  273: [
    [
      TBD1, / mc+cbor /
      <<
        {
          / id / 1: [
            / name / "boot loader X",
            / version / [
              "1.2.3rc2",
              16384 / semver /
            ]
          ],
          / measurement / 2: [
            / alg / "sha-256",
            / val / h'3996003d486fb91ffb056f7d03f2b2992b215b31db
                      e7af4b373431fc7d319da3'
          ],
          / signers / 3: [
            h'492e9b676c21f6012b1ceeb9032feb4141a880797355f66750
              15ec59c51ca1ec',
            h'4277bb97ba7b51577a0d38151d3e08b40bdf946753f5b5bdeb
              814d6ff57a8a5e'
          ]
        }
      >>
    ]
  ]
}
]]></sourcecode>
      </figure>
      <t>The example in <xref target="ex-eat-2"/> illustrates the inclusion of a JSON measured component inside a JSON EAT.</t>
      <t>The example uses TBD2 as the <tt>content-type</tt> value of the <tt>measurements-format</tt> entry.
(This will change to the value assigned by IANA to the <tt>mc+json</tt> Content-Format.)</t>
      <figure anchor="ex-eat-2">
        <name>EAT Measurements Claim using a Measured Component (JSON)</name>
        <sourcecode type="cbor-edn"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "measurements": [
    [
      TBD2, / mc+json /
      "{ \"id\": [ \"boot loader X\", [ \"1.2.3rc2\", 16384 ] ], \"\
measurement\": [ \"sha-256\", \"\
OZYAPUhvuR_7BW99A_KymSshWzHb569LNzQx_H0xnaM\" ], \"signers\": [ \"\
SS6bZ2wh9gErHO65Ay_rQUGogHlzVfZnUBXsWcUcoew\", \"\
                   Qne7l7p7UVd6DTgVHT4ItAvflGdT9bW964FNb_V6il4\" ] }"
    ]
  ]
}
]]></sourcecode>
      </figure>
      <t>The example in <xref target="ex-2"/> is a measured component representing a boot loader identified by its path name:</t>
      <figure anchor="ex-2">
        <name>Measured Component using File Path as Identifier</name>
        <sourcecode type="cbor-edn"><![CDATA[
{
  / id / 1: [
    / name / "/boot/loader.bin"
  ],
  / measurement / 2: [
    / alg / "sha-384",
    / val / h'66ec2fb4e02d8c8b3eee320e750d9389d66c52c51db11cc6
              9cc5e410816283ed60ba573795f5fcc85e513af57b3f6def'
  ],
  / profile-flags / 4: h'0000000000000101'
}
]]></sourcecode>
      </figure>
    </section>
    <section anchor="seccons">
      <name>Security and Privacy Considerations</name>
      <t>The Name and Version of a component can give an attacker detailed information about the software running on a device and its configuration settings.
This information could offer an attacker valuable insights.
Additionally, the stability requirement of the component's Name could potentially allow for tracking.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced">RFC Editor:</cref> replace "RFCthis" with the RFC number assigned to this document.</t>
      <section anchor="media-types-registrations">
        <name>Media Types Registrations</name>
        <t>IANA is requested to add the following media types to the "Media Types" registry <xref target="IANA.media-types"/>.</t>
        <table anchor="tab-mc-regs">
          <name>Measured Component Media Types</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>mc+cbor</tt></td>
              <td align="left">
                <tt>application/measured-component+cbor</tt></td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">
                <tt>mc+json</tt></td>
              <td align="left">
                <tt>application/measured-component+json</tt></td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
        <section anchor="applicationmeasured-componentcbor">
          <name><tt>application/measured-component+cbor</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>measured-component+cbor</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (CBOR)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers and Relying Parties</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers are as specified for "application/cbor". (No fragment identification syntax is currently defined for "application/cbor".)</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
        <section anchor="applicationmeasured-componentjson">
          <name><tt>application/measured-component+json</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>measured-component+json</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (JSON is UTF-8-encoded text)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers and Relying Parties</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers are as specified for "application/json". (No fragment identification syntax is currently defined for "application/json".)</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="measured-component-content-format-registrations">
        <name>Measured Component Content-Format Registrations</name>
        <t>IANA is requested to register two Content-Format numbers in the "CoAP Content-Formats" sub-registry, within the "Constrained RESTful Environments (CoRE) Parameters" Registry <xref target="IANA.core-parameters"/>, as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Content-Type</th>
              <th align="left">Content Coding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/measured-component+cbor</td>
              <td align="left">-</td>
              <td align="left">TBD1</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/measured-component+json</td>
              <td align="left">-</td>
              <td align="left">TBD2</td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9165">
          <front>
            <title>Additional Control Operators for the Concise Data Definition Language (CDDL)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Concise Data Definition Language (CDDL), standardized in RFC 8610, provides "control operators" as its main language extension point.</t>
              <t>The present document defines a number of control operators that were not yet ready at the time RFC 8610 was completed:.plus,.cat, and.det for the construction of constants;.abnf/.abnfb for including ABNF (RFC 5234 and RFC 7405) in CDDL specifications; and.feature for indicating the use of a non-basic feature in an instance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9165"/>
          <seriesInfo name="DOI" value="10.17487/RFC9165"/>
        </reference>
        <reference anchor="I-D.ietf-cbor-cddl-modules">
          <front>
            <title>CDDL Module Structure</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Brendan Moran" initials="B." surname="Moran">
              <organization>Arm Limited</organization>
            </author>
            <date day="1" month="September" year="2024"/>
            <abstract>
              <t>   At the time of writing, the Concise Data Definition Language (CDDL)
   is defined by RFC 8610 and RFC 9165.  The latter has used the
   extension point provided in RFC 8610, the _control operator_.

   As CDDL is being used in larger projects, the need for features has
   become known that cannot be easily mapped into this single extension
   point.

   The present document defines a backward- and forward-compatible way
   to add a module structure to CDDL.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-cddl-modules-03"/>
        </reference>
        <reference anchor="I-D.ietf-cbor-cddl-more-control">
          <front>
            <title>Concise Data Definition Language (CDDL): Additional Control Operators for the Conversion and Processing of Text</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="9" month="January" year="2025"/>
            <abstract>
              <t>   The Concise Data Definition Language (CDDL), standardized in RFC
   8610, provides "control operators" as its main language extension
   point.  RFCs have added to this extension point both in an
   application-specific and a more general way.

   The present document defines a number of additional generally
   applicable control operators for text conversion (Bytes, Integers,
   JSON, Printf-style formatting) and for an operation on text.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-cddl-more-control-08"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
        </reference>
        <reference anchor="I-D.ietf-rats-corim">
          <front>
            <title>Concise Reference Integrity Manifest</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>arm</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="18" month="October" year="2024"/>
            <abstract>
              <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether or not to engage in secure interactions with it.  Evidence
   about trustworthiness can be rather complex and it is deemed
   unrealistic that every Relying Party is capable of the appraisal of
   Evidence.  Therefore that burden is typically offloaded to a
   Verifier.  In order to conduct Evidence appraisal, a Verifier
   requires not only fresh Evidence from an Attester, but also trusted
   Endorsements and Reference Values from Endorsers and Reference Value
   Providers, such as manufacturers, distributors, or device owners.
   This document specifies the information elements for representing
   Endorsements and Reference Values in CBOR format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-corim-06"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.tschofenig-rats-psa-token">
          <front>
            <title>Arm's Platform Security Architecture (PSA) Attestation Token</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Simon Frost" initials="S." surname="Frost">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Mathias Brossard" initials="M." surname="Brossard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Adrian L. Shaw" initials="A. L." surname="Shaw">
              <organization>HP Labs</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="23" month="September" year="2024"/>
            <abstract>
              <t>   The Arm Platform Security Architecture (PSA) is a family of hardware
   and firmware security specifications, as well as open-source
   reference implementations, to help device makers and chip
   manufacturers build best-practice security into products.  Devices
   that are PSA compliant can produce attestation tokens as described in
   this memo, which are the basis for many different protocols,
   including secure provisioning and network access control.  This
   document specifies the PSA attestation token structure and semantics.

   The PSA attestation token is a profile of the Entity Attestation
   Token (EAT).  This specification describes what claims are used in an
   attestation token generated by PSA compliant systems, how these
   claims get serialized to the wire, and how they are cryptographically
   protected.

   This informational document is published as an independent submission
   to improve interoperability with Arm's architecture.  It is not a
   standard nor a product of the IETF.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tschofenig-rats-psa-token-24"/>
        </reference>
        <reference anchor="RFC9393">
          <front>
            <title>Concise Software Identification Tags</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. Fitzgerald-McKay" initials="J." surname="Fitzgerald-McKay"/>
            <author fullname="C. Schmidt" initials="C." surname="Schmidt"/>
            <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles. SWID tag representations can be too large for devices with network and storage constraints. This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags. CoSWID supports a set of semantics and features that are similar to those for SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory-efficient format.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9393"/>
          <seriesInfo name="DOI" value="10.17487/RFC9393"/>
        </reference>
        <reference anchor="UEFI2" target="https://uefi.org/sites/default/files/resources/UEFI_Spec_2_10_Aug29.pdf">
          <front>
            <title>Unified Extensible Firmware Interface (UEFI) Specification</title>
            <author>
              <organization>UEFI Forum, Inc.</organization>
            </author>
            <date year="2022" month="August"/>
          </front>
        </reference>
        <reference anchor="TBBR-CLIENT" target="https://developer.arm.com/documentation/den0006">
          <front>
            <title>Trusted Board Boot Requirements Client (TBBR-CLIENT) Armv8-A</title>
            <author>
              <organization>Arm Ltd</organization>
            </author>
            <date year="2018" month="September"/>
          </front>
          <seriesInfo name="ARM" value="DEN0006D"/>
        </reference>
      </references>
    </references>
    <?line 513?>

<section anchor="open-issues">
      <name>Open Issues</name>
      <t>The list of currently open issues for this documents can be found at <eref target="https://github.com/thomas-fossati/draft-fft-rats-eat-measured-component/issues"/>.</t>
      <t><cref>Note to RFC Editor: please remove before publication.</cref></t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank
Carl Wallace,
Carsten Bormann,
Dionna Glaze,
Giridhar Mandyam
and
Laurence Lundblade
for providing comments, reviews and suggestions that greatly improved this document.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1c+XrbOJL/n0+BVebb2Du6ZZ2dZFrx0fGsr7adZHqSbAyS
oMQJRWp42FE7nmeZZ5kn2zoAHpKcTu8c+8eu8sUWSaBQKFT9UFUoutFoWLcT
0bOs1E8DNRGH02txqmSSxcoV+9FiGYUqTC1p27GChrXtz2uWGzmhXAABN5Ze
2vBV6jVimSYNJdPGQndoOKZDo921HJmqWRSvJiJJXcuJwkSFSZZMRBpnykoy
e+EniR+F16sl0D0+vD6yLH8Z0/Mk7bbbYyAiYyWBrSvlZLGfrmrWXRR/msVR
toS7l2oRpUpMr1OVpDIFWuIijhzlAjNXNeuTWkFrdyLe4bTrQrO5AP6SunAC
6S/ymy7cMMyLD5YF9EL3owzgxkSsVGIlCxmnH/+cwYAwhTCylj4QTiOnLpIo
TmPlAc1ktcAv0F9m6TyKJ5ZoCJbblb8A9o7iKEktIUQUz2To/0xMT8Q0XuBN
tZB+oJs2qen3Ml40gbGCzvU8WshEHEVJAp03SZ34oYyjEjXu0NQdvg/oeRM6
FTRfyTBUibhOnHnkqdCfabIT8Tr0b1WcgORF5Inpchn4oBdXjq9CB3q8jMKw
cTlXfti48hV1M5r0qvHy8qrEBo/RLMb4frb43AxVallhFC+AtVsF4hKXR/vD
br87geWQS74eDTptuHbdgK/HnUGfr5dBlsC948ZBkzTSsaO4gQ8ai8jNAlwp
vIKLx1rFCpQ2TOMo4KZOGlQoGh2fCPNt46kTxf4C+YVfoMGhV54ONk3zOXOH
ZSIbafRJwWrlX/XMeuMeUkrufOT49eHRcRepCKHNtwYL4uESHH5OwZp8O1Di
yI8Xd2An4jhMVexJR4kd7LkrrpbKgeYOqUaN6OR6SR9a4xo2BoWKMzCH49Bp
cksXzBc0M5uJ7rguuu1ul26TOqCiXaoATEeJbrPTpic8b0P64uBoIuZpukwm
rVamPB9VrgWapJKWqzyZBWnL82GJWrFKoiwGdWohIx+R6Y/dj532Rxi7O24u
XQ9IXr98ednYPzk+PLuuCuQawQIE8jKSMf6MUuDsz5mv7Vzsg8aCSe+UCOyi
vd2OGtPHRQINxEnqliVxpZYgBZREZ8QcyHim0mKSrrpVQbRUcVMbbQtAM0Mu
SP7wPGy32wPqm6jYVwnqihl3enk6EQeHZ9jkwLKgFxgdPrw6PDlCrDvaT+d+
UrOsRqMBVpaksXTAeKY5gpUADEAIlkmkkZChiOw/KScVdz70D0U6V0KmCJgq
fproSQgV3vpxFCKzdXE3j2BdEVGVcICArYQfJrAsKGeAReH6M+zvNmF0/i58
ILVagqoFwYoYybBxOgekns2FFE68WqbRLJbLue+IuUzmwstCBwXTtA4/y8US
VAExZnM2CYzuBJmrhGc0PUkjbALT8QIktYCNIF4hEnspNQgi6VIDEAE/hEnj
lOIUNGeh6rioskRHClRGAHCYF5hBFItbGWQq4Wf7F69BpjMfhda0rGtYCGEW
V4A2+wifUtQ2ma9pswBRwA8tzSyBJrgetBq45d6clvamG96bmrzUCx9gSVnW
E7TvGGCNhGZZ9/ewKdKet9cEGxyg8HK4engosbWNOPEzsawXovbO+QAIKGGJ
oU/ixP4SqcJuFsB84Ze69V2EexRKeQvFAZH/XOg0RfUZe4mINY3VGHvKEH7B
LUNDInSBE8ASN7S4PSAQy5hZBZ2K7hIUJGibB5qNUi9xokWMrEpnLpDblFHS
hmUv9dmPphfwA2ASPJQjXpedQo6dbrNHUsSt5+Fht2ntZzF2DEC1kLsoBOVO
GFSBul5Z4HM/unp7fECTAGdG1IzIanUBezVAgihG6TbHzT09DOL8w8OGRvl6
of8JSkX67Lo+sQLGgSuTIErIAHQ7pH0L7/OMiDO4VgCHW/koA82qvLIadCK0
nm0YQ5z7sGQlgNqEnYRwYR10SFgaE4AC6oViBJnQ3P3wVsa+BEEu0d5B1LKA
jgIkNQsFVqwjRbbUWCFFnIUN/I5Lo2boiQpnrpxPYufy+nh/t17FDz0jgpEN
8HiCGniLKgpGRjM7QEulFUlY3uC4CvRcE1E7fX11DVpEv8XZOX2/PPzx9fHl
4QF+v3o1PTnJv1i6xdWr89cnB8W3ouf++enp4dkBd4a7onLLqp1Of0KlBa5q
5xfXx+dn05OaoG2jrKBk7RFvDDCrZaxoa0gsBhCbxfly/+Jvf+3sge7/G+xe
3U5nDLDEF6POcA8u7uYq5NHItPgSlnBlyeVSyZi0NQhAHZZ+KoOEzCmZR3eh
ACRRIM3/eIeS+TARz2xn2dl7oW/ghCs3jcwqN0lmm3c2OrMQt9zaMkwuzcr9
NUlX+Z3+VLk2ci/dfPY7cNuVaHRGv3thWdbx2nrUxf7BwQmIlrxaEnLDuMfF
FXjBxQX6uXAFRAg3YDHN0pEJ0e6oYbXJe492a8GiTyNXBeL+yWbY94D+yFag
8Ev9wXHUMMcmzCOyH6H3gbwnuCgGBBgZMCSbMc4tVCqJUbLkuQqWtF1r/F/5
0K5Cq2md09aGPkqdAIu2G3DEwD4TaMP+NOJJ4s9C0x82RtC9oOJgOYSYCZlA
viFotCxPdUGiIgTaLpZEVEzm/j6VdmPhNJBIAwWV0P7wBeJj8QWQIt+f4ark
54oTdD7FF+sLuAwN+pF/qlf6HlDMo3txBlEg0EPmMSAUM9gEaHfA6W+y3RTH
BJw+XMepNFBKKkn9Y4z5ANww5kfYQ8RwIJxNSntxzOED7x24wZPcbQWuaSzQ
t/2E8jcuBlLNGfERYjXBbIneedIUbwE7kEUbDEXvg7LMgI5bkCiEYwph3cc9
CXerxIyLyy4DbOPF0YJ95eUyln4iA7E0qQUjGZgCKRnuMj7yAEuiYUZUBfyG
B4cGU/YroS+AZoL6p7VMa5FjBIN7h44oFiX+jUS2rYp4nSC1d1cgfiDsmGHh
5ocdE6UkagGkOBiDIVu33WYb/s3TRbCLi1pCKZyQASOa0AHb6BuawRcI6cH1
fpSfIgrIksKUXIxG4Z4mNQ1mEDan88WG8NYbmPFkfsMAlx6HBihzuEHyClYX
vRWYVcjeLHj/Igv9P8N0cq8xJsc2R4YyEmwTekVE9xPxZMOAOVR9XttMq1VQ
9ZBRMak9MIxoF09vNAQ2bCcSHPOFTxvuIspCwkyl0wF+gK4JmpQDPAL6IGSC
4qJz0shVLNEKwtB+gBBKmM4DE6QycJGflSz9mH1plEHt4mpauPwlKGP3cqcc
luw1O+To5lkOcKoxvPTBS4cQEKwObBZcSAhkKQ5Du5KfFIdtOIOMsAWtBWej
Qldqr8mOslSE6o78XBqZgBTWilF0Cu4D6NpncbgWFuGMnzz521/3UTqhwNwj
OF1/+ctfOL9krwBMGvZgLxPPwe39nIomXdB9fjqCJ/RFNBP/ZyVG+vZjvUZI
HUclfL3Z3DRveAWOAdVKnHz3ROMrJ5aaen8kXIo95yf4oDPEWaeiMUyy+fv9
vNl42OlgM8xbWZtDA7v3lgDdbwTShvV+/qJY0QaloEphVrlNwRG0+R0ZCRhO
0eKd+K2+2aCI6AM1g2B9VmrEl/jcAp0vN3+u5/GsWI86S/OFVfRaazYqtxuB
n1RMy7Sr+S54t50X1pZp5W1Kz6Bx94W1Nru8ob4PjXqGrfUmdBcagA9HWnA/
uU2W0lEPFrIidgAQ1WfR2Z1YE1KPLTBaABOAkhNhqIKmEbuESrwTaaxYcyXK
S0maX5maGbxLg2vg5M0JHfIcZ+v5sIzj+9Hl8alx17zNILrZa450eAtaQmG0
lYvKDNqjQcswbHDWAG8dUErBJLgns2+AjKVqaO0RLSkGew0btnSQVKAdANOe
UyFugXuGeIWgAYcyPheyv39SEWfJUsv3YenfgapzWp0+CAek/HniVH+xPlgV
I8dcQPM3+mGDfZTCjnvjHps7pYYt4w3wcLBq66Nx/8kjdGFsVMdCG60bZPkG
5Ajgnsa84cHCgoAwlYF5iHkGwgMkBpcbveSSWqLjVnG0Uf1gT00ouyeEzrSQ
VrnRMiX1LkJgVyFWm4xRKT4HE4cVudGsM3P0OIPm+W3er8gnJJZjlaFbSUqL
88Bh84VHxYQIqJQmu0nuGkY4OOKNVgJ2FmDZtQJiZMNfcVcESejUFo0J1oDx
KWaHsIn7mLdgXZscKSeUyN9M0aUEmsAF55XAx0TGddzB3gGIGKPjx3wt6K4+
K4fcLb1R25QKPz+tC8xJS3I0S+lNiWc5fDIgApmFoBdx0zoqcikUa8NC0ukA
nb8pTq/f39O5BMgORYuZ8i05+Pv7UsIdLWsacvZPUxcLuRI62NQHMEFu/iuK
+0PkkVO0TWsj4ohEGKU65yhLK1NEGLkLz6rKR1gkPxlm6HPAjOKNgBOgIQP3
BOZ+F2UAJDaiKyocJYKhq+8h8AU++CkSXP8Vpo+KdFlFSZIkcnxyd3U8ssxs
EDrmd2hGjhkB5vqHZr89Fo6KUz6x4bSTvCv1qVcoANvZwl6CqnCiKYkAL1jG
JdusZAjJ0wUlXWfMqGKxAE3MMRBFB4O0ulhkQerjuulgh9YvVOy0kd8ly6Yb
5a4+Evdx63KjOOFYlbUPkEUGOpnHgjBpftAFdLz1MpRydxzs5VrsBUoBtTsQ
N0kAAtDYbSCDMMXM9UFzmuTR5o7vMouXmGREjxlTxYX94XSqQARXQbTi9Aoq
OiWAY5dVRu9nlUOVOJarfCZ68mCqKFVQjGMPVxndVb3plDfN9eT9riAM23IW
QlErZbh4UpQ0o0VHHm40Xzd6F9TpnSaO7qfmkrHHsEHEKLwoKGIeH+VTZOXx
uEromRaj8JzzWDZhSc0hSCEN0KlBbWAxJ1kIlG9K3h4ibr6ZfqsXqH3qJ3jg
T9M4wi0c4Lq6pevMOkvDMcccML1FBEasPQaY5aOeQpm3b/Y8ibl/zYJXpvv3
LfvWZRvsCRARBYpP+FChfATUYP/vxhxH5xlsykeSE+r5M6oRWQbZDLYMClRd
Tvnd/KZCy47cFZ3N35AWbXv6pwQ3fGQDAOyTSjl75MJ6ZUtyo9AV2RZiJcZT
fuSgLV9jiNyRhSLGo6tNitgQuckDPrrY0s76jvjdf3l+KXZump5ivKkh3drN
rvWIDETruTC8fCf4XOYX2hIH34k0C0MM5Xnc31+dn1XGxVaPjEsESrRKn6+x
YLqVAt+Cc80Ne5viSVkbTF4E2dyiVCWdwpTIIeE1rTp7O6hH+QZ2F1E2AG0z
wVigxuzWCmxiT8ec+fBhGTpUWwNyg/fI2lzeqiIJiQf3MtDVNmJHNWdNPrGg
MxEb9l9a6l1GQmCEBfANjNAQZerGl2Hb2253qO+kWsApW14Jq3UymQte0F2L
eSKURoJhbxx9FEooLFrFDUN+KX3c5Ax7W2WF2zfsA745RzfsANtnkU7LZbzn
Uv7IrAydMRnp6KMG9tnWQaO0qyD3hfOy7Tz3sRMNCEZnfiiDqowptb4mhx0m
2zgSmF8HJwUe7Yovm9KhbPsXTqbflPzp1qaYfsu4Bu20aVDvX+zFeMe99Pci
x8jraqyonNHQBoTKQdjz9hot6KtKRDhBSpRrDQ7IR0TkA+Sy4BiqqlqGRMNI
F0uUSAf+NeLdJqhfsSgpxLxV6FqTNGHcL0v691rSdKE9Ez7j3Uz+6p2yEpoa
RxxdS+xlNmva3XlzT8iMjZ+iYz09T4zLSw4HuA5N1axu+3qQuxi6oCPGi3Ts
bWuEpPBIB8K5TyGeueo9FE9VsoWK9cFtkcPZMsnCQ0ZER4LayS9NswX9KzOt
V4chVyVWVCSg+aLEtSkb0sCnA0sCPvW50WHdldvCZQ7HgoCTZyzWZbTMAkkF
BuwOYJWgckMLM6QtiKngR2dC+Ra8poOulqhRmE0lBLH4Q62un5r8TEu3F6LW
aXabvdjp6jZCdAa90R604BMZ0aLbmCj9UKcRyxUuLdEthpbBDEdO5rLR7Q+K
MQHcWmL+tDceD9rtnrs3Gnj2uON5drs/8IZuu+d17e54DD86fbvXcW01lN6e
3RtaovLp7fU6njN0e52xK3tPC47MmrVEz3Azf7o37qqxPRgOnG7HG7Q7Xbvj
KGWP272up+y9zl5Hjkbt4XjY6/e9wWDYb3f6yumPnb6RgyM7ynlaN/S6w6Ft
j4e2HNr9Tn84lG23N+r0O25PtUf2Xtt2vfEe0Ol5fbtvu8oedfbcgecZekM5
kn1VYrviI8P13gSGaZc/nXbnqfWQeymoPcbaUZUDlW5TbnNSs655uHN1CuSs
Hl4WSijpHAOcCztLec+SSTmbS6fGFcQu1/CUTj4AdNNmlRWKJq5fHnQMzTUQ
5jyvtvPtuwI6EqumtUMB1J2PVRhzGc7y00+dKk50xguQ6Hh6Ns397IWj4bW6
Pzd3c7dAppW4WcdmVAiCoLIpsTpJylQvgbYbX6fIo7hUybN2JHm9/xLXYgE2
ShWGOpVRpzD91nczytxtib22IUF3mOu+MW2Ucx0NlqesLVmIZ89yw7ovmdg6
lhT3v4YpRatNbDGfTYwxn61YYz4fSlcf6hVOH8GgosFWLCrx+qsxaY1x8zFQ
tYlNj3C+BavM53+CWevy1BBWwa4S/V+NYWv0DaQVWLa5WA/624sXxc5RBTEC
onKYVQ5+xT5hCR/qyC3wBp4aRjJfQzlMAgMyZFiMnOpCHtrgTamCZMdyW8Ya
QjtXmQa8pW9DsO7/JoKxK7mJYBVUeF79YE3Y4UQ8ff9UUNFW7mphGejl0b4Y
DcddsdbpuUXgUvYtk9oWnOlqnOGY27gW9+J9zXffYwf4VkGP97U63TTIgNcM
Bh/AYuDB+/JZqCGhzRkbY4vzP/40vXg9v80uPw5fvh2Ppx//c7W4SuZvf35l
9wfjk7Off/z88VX7cyhP39eYrDY/Q/C9dXU1sP/YvZuPZ4fxq/NBf7r6GP/4
+odo9ir4+Y33x/D1yz8kb53XTqTuzLBbYODHUA2D4XL4+o07OLievXl1vXec
Tm+94Af3emy/HQ/2js7sj28GfrCHnIiH2tdso/t32Aaq7aO20f2K71mp/JGi
vFrVymUf+FhKcFTpNPFXOaUtpNpiqk3bp3c/foVXCeqx4VUOBsrpevaeanfd
kTOye0qpXretABvdcW80dgcDp98FRHTtTsdxBmurN3acvtrrtEedQXfUU+6g
bcv+sDcc972+5zijvup3ehIAz+55A4hu/k73rfuVohte1SOMNi5QvIAvxTkv
h2/mdTOKcC5iiFKdFcIAQlaskzP3TxLlYIyidYCK6LD9m6JSq3wmgocwWFhH
B1tpKp1PCiu8wOsJKHVSVAJxdUultD7OQjqdoXpqV936Do+FOgI8eP4sY75g
h09Rs5K8TLqgy25ShDmlChOIg3ymCxOczdHvmeZOVn5UCZEwVxfFpbLDLeWa
JAceahkhbvrkXhU1fqa4j+tKEXGrkrWsd/8Ve45yP6CtBPg+U+3+/t/xPZiH
h1pxYoVYGmYLG2djMJywu1QZy7mzU+X6kmt9xCVVYudD0fh+QpOi8nKTUWZH
HJlGuS+IAqUXzf5QK1Gt6QLveIX1zUizST1orzIVnKbKUgFU4NkQFnDSUSVM
UBdu/mLd5uYTynPkzva35zxyiQpDIc+hfGOupUyhVPgGkvhayVtZag98hPNN
LGPtDN6STvqAx+hKw+KkfJJtWVeZnZYfPkLOsnTxrIsHmtA2BaPF9mFLWnmZ
8LZnh6auwKkoLT638dXKlXabgBUDIpst7+8NdjxwNk1LEku7YTQ6sNfWttmZ
2LjAc+BkjkdV5Zf8mHhObVqIJuGICzOxZCGFRmOfqX4jLKkjfOkySASYS13j
esHHvpZ1FMvZYq0uaZNHymytIKT7vFl/4W1S4KQW1vaXX64RtbJi0IFJU+yc
RZsUdB2DHhEz0ubFnTxT9gg9WKcLGB86/zu/qYrGD/tzwpWlQM/h9J6XxXy2
XgAqTvRyen0l3v4gsCvKCd+ZEjt4sPc9viGKdba7vKohl1DJGQkci2zPz1AN
sdzG4RUCLvIGISgrLCC9m9jaZ7/VFEqoGFvwG9MXWKGTsLrGJWxjGt9mYGTR
/zgDQ3L/VAOjkAFW+fX1UWPUMOVpeP70/2b3jzY7Oi/8B5od0/s/YHbbooa1
s6pv8UXMm2N0xrnWn72fvC6jtuU8DFyTJLMbxj2plytWauh3wfC0UJeHV9de
FojD4i29BM9qLg93UQu1ldYMz4Wj4+A79IUd03Fdol0nUEp6D4I5IlDJL+E3
mfkXcXyw7guJb/AIoE8D3SlMcq67M9+Ad0X37lp3euvWBh8V/dPzpQrFcZJk
5piBNA3MqVD1CJv41ESXQpYc0MQUX3ERGSzau+JdjBmsRWbTq+Ip/ZWGhsd/
paHFf2XDg/9f+SMbLR4UC2yfObHyXnBiNSLP+JDqnyZiyW+TgL9OqWbl4UEN
V5HxCeizFvXFyU4dPOeBcITMPIENgTVMuc9rngwSZeJdfmXelMhRLRx5xTL8
ZO3LOBBvsXDRUXW8wvdvxEvUxjCsWwcwZijFD4H8GR7/4Me+O5exOAW8WsmF
Bb+sE5mxJpyAyOwAgljL4yOiW1/vDAv9RzxiCIXUHWNmks1mXHOqQXcWg9xg
gfwFdqWqzGpoYOKMSVli1n8DKsYEvzRFAAA=

-->

</rfc>
