<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-posture-assessment-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="RPASCA">Remote Posture Assessment for Systems, Containers, and Applications at Scale</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-posture-assessment-02"/>
    <author initials="K. M." surname="Moriarty" fullname="Kathleen M. Moriarty">
      <organization>Transforming Information Security LLC</organization>
      <address>
        <postal>
          <region>MA</region>
          <country>USA</country>
        </postal>
        <email>kathleen.Moriarty.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="M." surname="Wiseman" fullname="Monty Wiseman">
      <organization>Beyond Identity</organization>
      <address>
        <postal>
          <street>3 Park Avenue</street>
          <city>NY</city>
          <region>NY</region>
          <code>10016</code>
          <country>USA</country>
        </postal>
        <email>monty.wiseman@beyondidentity.com</email>
      </address>
    </author>
    <author initials="A.J." surname="Stein" fullname="A.J. Stein">
      <organization/>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>ajstein.standards@gmail.com</email>
        <uri>https://orcid.org/0000-0003-1092-2642</uri>
      </address>
    </author>
    <author initials="C." surname="Nelogal" fullname="Chandra Nelogal">
      <organization abbrev="Dell">Dell Technologies</organization>
      <address>
        <postal>
          <street>176 South Street</street>
          <region>MA</region>
          <code>01748</code>
          <country>USA</country>
        </postal>
        <email>chandra.nelogal@dell.com</email>
      </address>
    </author>
    <date year="2025" month="May" day="16"/>
    <area>Security</area>
    <abstract>
      <?line 74?>

<t>This document establishes an architectural pattern whereby a remote attestation could be issued for a complete set of benchmarks or controls that are defined and grouped by an external entity, eliminating the need to send over individual attestations for each item within a benchmark or control framework.
This document establishes a pattern to list sets of benchmarks and controls within CWT and JWT formats for use as an Entity Attestation Token (EAT). While the discussion below pertains mostly to TPM, other Roots of Trust such as TCG DICE, and non-TCG defined components will also be included.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-rats-wg.github.io/draft-moriarty-attestationsets/draft-moriarty-rats-posture-assessment.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-rats-posture-assessment/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Remote ATtestation ProcedureS (rats) Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats-wg/draft-moriarty-attestationsets"/>.</t>
    </note>
  </front>
  <middle>
    <?line 79?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Posture assessment has long been desired, but has been difficult to achieve due to complexities of customization requirements at each organization.
By using policy and measurement sets that may be offered at various assurance levels, local assessment of evidence can be performed to continuously assess compliance.</t>
      <t>For example, the Trusted Computing Group's Trusted Platform Module (TPM) format and assessment method can provide this kind of compliance.  This and other methods employ a secured log for transparency on the results of the assessed evidence against expected values.</t>
      <t>In order to support continuous monitoring of posture assessment and integrity in an enterprise or large data center, the local assessments and remediation are useful to reduce load on the network and remote resources.
This is currently done today in measured boot mechanisms.</t>
      <t>It is useful to be able to share these results in order to gain a big picture view of the governance, risk, and compliance posture for a network.</t>
      <t>As such, communicating a summary result as evidence tied including a link to supporting logs with a remote attestation defined in an Entity Attestation Token (EAT) profile <xref target="I-D.ietf-rats-eat"/> provides a way to accomplish that goal.</t>
      <t>This level of integration, which includes the ability to remediate, makes posture assessment through remote attestation achievable for organizations of all sizes.  This is enabled through integration with existing toolsets and systems, built as an intrinsic capability.</t>
      <t>The measurement and policy grouping results summarized in an EAT profile may be provided by the vendor or by a neutral third party to enable ease of use and consistent implementations.</t>
      <t>The local system or server host performs the assessment of posture and remediation.
This provides simpler options to enable posture assessment at selected levels by organizations without the need to have in-house expertise.</t>
      <t>The measurement and policy sets may also be customized, but not necessary to achieve posture assessment to predefined options.</t>
      <t>This document describes a method to use existing remote attestation formats and protocols.
The method described allows for defined profiles of policies, benchmarks, and measurements for specific assurance levels.
This provides transparency on posture assessment results summarized with remote attestations.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="posture-assessment-scenarios">
      <name>Posture Assessment Scenarios</name>
      <t>By way of example, the Center for Internet Security (CIS) hosts recommended configuration settings to secure operating systems, applications, and devices in CIS Benchmarks <xref target="BENCHMARKS"/> developed with industry experts.
Attestations aligned to the CIS Benchmarks or other configuration guide such as one of the Defense Information Systems Agency's Security Technical Implement Guides <xref target="STIG"/> could be used to assert the configuration meets expectations.
This has already been done for multiple platforms to demonstrate assurance for firmware according to NIST SP 800-193, Firmware Resiliency Guidelines <xref target="FIRMWARE"/>.  In order to scale remote attestation, a single attestation for a set of benchmarks or policies being met with a link to the verification logs from the local assessments, is the evidence that may be sent to the verifier and then the relying party.
On traditional servers, assurance to NIST SP 800-193 is provable through attestation from a root of trust (RoT), using the Trusted Computing Group (TCG) Trusted Platform Module (TPM) chip and attestation formats. However, this remains local and one knows the policies and measurements have been met if other functions that rely on the assurance are running.</t>
      <t>At boot, policy and measurement expectations are verified against a set of "golden policies" from collected evidence and are verified to meet expected values.  Device identity and measurements can also be attested at runtime.
The attestations on evidence (e.g. hash of boot element) and verification of attestations are typically contained within a system and are limited to the control plane for management.
The policy and measurement sets for comparison are protected to assure the result in the attestation verification process for boot element.
Event logs and PCR values may be exposed to provide transparency into the verified attestations.  The remote attestation defined in this document provides a summary of a local assessment of posture for managed systems and across various layers (operating system, application, containers) in each of these systems in a managed environment as evidence. The Relying Party uses the verified evidence to under stand posture of interconnected operating systems, applications, and systems that are communicated in summary results.</t>
      <t>There is a balance of exposure and evidence needed to assess posture when providing assurance of controls and system state.
Currently, if using the TPM, logs and TPM PCR values may be passed to provide assurance of verification of attestation evidence meeting set requirements.
Providing the set of evidence as assurance to a policy set can be accomplished with a remote attestation
format such as the Entity Attestation Token (EAT) <xref target="I-D.ietf-rats-eat"/>
and a RESTful interface such as ROLIE <xref target="RFC8322"/> or RedFish <xref target="REDFISH"/>.
Policy definition blocks may be scoped to control measurement sets, where the EAT profile asserts compliance to the policy or measurement block specified and may include claims with the log and PCR value evidence.
Measurement and Policy sets, referenced in an EAT profile may be published and
maintained by separate entities (e.g.  CIS Benchmarks, DISA STIGs).
The policy and measurement sets should be maintained separately even if associated with the same benchmark or control set.
This avoids the need to transition the verifying entity to a remote system for individual policy and measurements which are performed locally for more immediate remediation as well as other functions.</t>
      <t>Examples of measurement and policy sets that could be defined in EAT profiles include, but are not limited to:</t>
      <ul spacing="normal">
        <li>
          <t>Hardware attribute certificates, TCG</t>
        </li>
        <li>
          <t>Hardware Attribute Certificate Comparison Results, TCG</t>
        </li>
        <li>
          <t>Reference Integrity Measurements for firmware, TCG</t>
        </li>
        <li>
          <t>Operating system benchmarks at Specified Assurance Levels, CIS</t>
        </li>
        <li>
          <t>Application hardening Benchmarks at Specified Assurance Levels, CIS, DISA STIG</t>
        </li>
        <li>
          <t>Container security benchmarks at Specified Assurance Levels, CIS</t>
        </li>
      </ul>
      <t>Scale, ease of use, full automation, and consistency for customer consumption of a remote attestation function or service are essential toward the goal of consistently securing systems against known threats and vulnerabilities.
Mitigations may be baked into policy.
Claim sets of measurements and policy verified to meet or not meet Endorsed values <xref target="I-D.ietf-rats-eat"/> are conveyed in an Entity Attestation Token made available to a RESTful
interface in aggregate for the systems managed as evidence for the remote attestation. The Measurement or Policy Set may be registered in the IANA registry <xref target="iana">created in this document</xref>, detailing the specific configuration policies and measurements required to adhere or prove compliance to the associated document to enable interoperability. Levels (e.g. high, medium, low, 1, 2, 3) or vendor specific instances of the policy defined in code required to verify the policy and measurements would be registered using a name for the policy set, that would also be used in the reporting EAT that includes the MPS along with other artifacts to prove compliance.</t>
    </section>
    <section anchor="policy-and-measurement-set-definitions">
      <name>Policy and Measurement Set Definitions</name>
      <t>This document defines EAT claims in the JWT <xref target="RFC7519"/> and CWT <xref target="RFC8392"/> registries to provide attestation to a set of verified claims within a defined grouping.
The trustworthiness will be conveyed on original verified evidence as well as the attestation on the grouping. The claims provide the additional information needed for an EAT to convey compliance to a defined policy or measurement set to a system or application collecting evidence on policy and measurement assurance, for instance a Governance, Risk, and Compliance (GRC) system.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Claim</th>
            <th align="left">Long Name</th>
            <th align="left">Claim Description</th>
            <th align="left">Format</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">mps</td>
            <td align="left">Measurement or Policy Set</td>
            <td align="left">Name for the MPS</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">lem</td>
            <td align="left">Log Evidence of MPS</td>
            <td align="left">Log File or URI</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">pcr</td>
            <td align="left">TPM PCR Values</td>
            <td align="left">URI</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">fma</td>
            <td align="left">Format of MPS Attestations</td>
            <td align="left">Format of included attestations</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">hsh</td>
            <td align="left">Hash Value/Message Digest</td>
            <td align="left">Hash value of claim-set</td>
            <td align="left"> </td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="supportability-and-re-attestation">
      <name>Supportability and Re-Attestation</name>
      <t>The remote attestation framework shall include provisions for a Verifier Owner and Relying Party Owner to declare an Appraisal Policy for Attestation Results and Evidence that allows for modification of the Target Environment (e.g. a product, system, or service).</t>
      <t>Over its lifecycle, the Target Environment may experience modification due to: maintenance, failures, upgrades, expansion, moves, etc..</t>
      <t>The Relying Party Owner managing the Target Environment (e.g. customer using the product) can chose to:</t>
      <ul spacing="normal">
        <li>
          <t>Update the Appraisal Policy for Attestation Results and re-assess posture with this updated policy, summarizing with a remote attestation to the new policy or level, or</t>
        </li>
        <li>
          <t>Run remote attestation after modification of the Target Environment as an external validation, or</t>
        </li>
        <li>
          <t>Continue operation of the Target Environment as-is, without verification, potentially increasing risk</t>
        </li>
      </ul>
      <t>In the case of Re-Attestation:</t>
      <ul spacing="normal">
        <li>
          <t>framework needs to invalidate previous Reference Values (e.g. TPM PCR values and tokens),</t>
        </li>
        <li>
          <t>framework needs to specify an Appraisal Policy for Evidence that requires fresh Evidence,</t>
        </li>
        <li>
          <t>framework needs to maintain history or allow for history to be logged to enable change traceability attestation, and</t>
        </li>
        <li>
          <t>framework needs to notify that the previous Attestation Results has been invalidated</t>
        </li>
      </ul>
    </section>
    <section anchor="configuration-sets">
      <name>Configuration Sets</name>
      <t>In some cases, it may be difficult to attest to configuration settings for the initial or subsequent attestation and verification processes.
The use of an expected hash value for configuration settings can be used to compare the attested configuration set.
In this case, the creator of the attestation verification measurements would define a set of values for which a message digest would be created and then signed by the attestor.
The expected measurements would include the expected hash value for comparison.</t>
      <t>The configuration set could be the full attestation set to a Benchmark or a defined subset. These configuration sets can be registered for general use to reduce the need to replicate the policy and measurement assessments by others aiming to assure at the same level for a benchmark or hardening guide.</t>
      <t>This document creates an IANA registry for this purpose, creating consistency between automated policy and measurement set levels and the systems used to collect and report aggregate views for an organization across systems and applications, such as a GRC platform.</t>
    </section>
    <section anchor="remediation">
      <name>Remediation</name>
      <t>If policy and configuration settings or measurements attested do not meet expected values, remediation is desireable.
Automated remediation performed with alignment to zero trust architecture principles would require that the remediation be performed prior to any relying component executing.
The relying component would verify before continuing in a zero trust architecture.</t>
      <t>Ideally, remediation would occur on system as part of the process to attest to a set of attestations, similar to how attestation is performed for firmware in the boot process.
If automated remediation is not possible, an alert should be generated to allow for notification of the variance from expected values.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document establishes a pattern to list sets of benchmarks and controls within CWT and JWT formats.
The contents of the benchmarks and controls are out of scope for this document.
This establishes an architectural pattern whereby a remote attestation could be issued for a complete set of benchmarks or controls as defined and grouped by external entities, preventing the need to send over individual attestations for each item within a benchmark or control framework.
This document does not add security consideration over what has been described in the EAT, JWT, or CWT specifications.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <section anchor="reuse-of-cbor-and-json-web-token-cwt-and-jwt-claims-registries">
        <name>Reuse of CBOR and JSON Web Token (CWT and JWT) Claims Registries</name>
        <t>Claims defined in this document are a profile of EAT. Like the base claims of EAT, the claims below are compatible with those of CWT and JWT so the CWT and JWT Claims Registries, <xref target="IANA.CWT.Claims"/> and <xref target="IANA.JWT.Claims"/>, are re-used. No new IANA registry is created. All EAT claims defined in this document are placed in both registries.</t>
      </section>
      <section anchor="cwt-and-jwt-claims-registered-by-this-document">
        <name>CWT and JWT Claims Registered by This Document</name>
        <t>This document requests the creation of a Measurement and Policy Set (MPS) registry. The MPS registry will contain the names of the Benchmarks, Policy sets, DISA STIGS, controls, or other groupings as a  policy and measurement set that <bcp14>MAY</bcp14> correlate to standards documents containing assurance guidelines, compliance requirements, or other defined claim sets for verification of posture assessment to that MPS. The MPS registry will include the policy definition for specific levels of MPS assurance to enable interoperability between assertions of compliance (or lack thereof) and reporting systems.</t>
        <table>
          <thead>
            <tr>
              <th align="left">MPS Name</th>
              <th align="left">MPS Description</th>
              <th align="left">File with MPS definition</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Ubuntu-CIS-L1</td>
              <td align="left">Ubuntu CIS Benchmark, level 1 assurance</td>
              <td align="left">http://   /Ubuntu-CIS-L1.txt</td>
            </tr>
          </tbody>
        </table>
        <t>The MPS name includes versions or level information, allowing for distinct policy or measurement sets and definitions of those sets (including the supporting formats used to write the definitions).</t>
      </section>
      <section anchor="additions-to-the-jwt-and-cwt-registries-requested">
        <name>Additions to the JWT and CWT registries requested</name>
        <t>This document requests the following JWT claims per the specification requirement required for the JSON Web Token (JWT) registry defined in RFC7519.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Claim</th>
              <th align="left">Long Name</th>
              <th align="left">Claim Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">MPS</td>
              <td align="left">Measurement or Policy Set</td>
              <td align="left">Name for the MPS</td>
            </tr>
            <tr>
              <td align="left">LEM</td>
              <td align="left">Log Evidence of MPS</td>
              <td align="left">Log File or URI</td>
            </tr>
            <tr>
              <td align="left">PCR</td>
              <td align="left">TPM PCR Values</td>
              <td align="left">URI</td>
            </tr>
            <tr>
              <td align="left">FMA</td>
              <td align="left">Format of MPS Attestations</td>
              <td align="left">Format of included attestations</td>
            </tr>
            <tr>
              <td align="left">HSH</td>
              <td align="left">Hash Value/Message Digest</td>
              <td align="left">Hash value of claim-set</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="mps-measurement-or-policy-set-claim">
        <name>MPS (Measurement or Policy Set) Claim</name>
        <t>The MPS (Measurement or Policy Set) claim identifies the policy and measurement set being reported. The MPS <bcp14>MAY</bcp14> be registered to the MPS IANA registry. The MPS may be specified to specific levels of assurance to hardening, loosening guides or benchmarks to provide interoperability in reporting. The processing of this claim is generally application specific.
   The MPS value is a case-sensitive string containing a StringOrURI
   value.  Use of this claim is <bcp14>OPTIONAL</bcp14>.</t>
        <t>This document requests the following CWT claims per the specification requirement required for the CBOR Web Token (CWT) registry defined in RFC8392.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Claim</th>
              <th align="left">Long Name</th>
              <th align="left">Claim Description</th>
              <th align="left">JWT Claim Name</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">MPS</td>
              <td align="left">Measurement or Policy Set</td>
              <td align="left">Name for the MPS</td>
              <td align="left">MPS</td>
            </tr>
            <tr>
              <td align="left">LEM</td>
              <td align="left">Log Evidence of MPS</td>
              <td align="left">Log File or URI</td>
              <td align="left">LEM</td>
            </tr>
            <tr>
              <td align="left">PCR</td>
              <td align="left">TPM PCR Values</td>
              <td align="left">URI</td>
              <td align="left">PCR</td>
            </tr>
            <tr>
              <td align="left">FMA</td>
              <td align="left">Format of MPS Attestations</td>
              <td align="left">Format of included attestations</td>
              <td align="left">FMA</td>
            </tr>
            <tr>
              <td align="left">HSH</td>
              <td align="left">Hash Value/Message Digest</td>
              <td align="left">Hash value of claim-set</td>
              <td align="left">HSH</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
        </reference>
        <reference anchor="IANA.CWT.Claims" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.JWT.Claims" target="https://www.iana.org/assignments/jwt">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8322">
          <front>
            <title>Resource-Oriented Lightweight Information Exchange (ROLIE)</title>
            <author fullname="J. Field" initials="J." surname="Field"/>
            <author fullname="S. Banghart" initials="S." surname="Banghart"/>
            <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>This document defines a resource-oriented approach for security automation information publication, discovery, and sharing. Using this approach, producers may publish, share, and exchange representations of software descriptors, security incidents, attack indicators, software vulnerabilities, configuration checklists, and other security automation information as web-addressable resources. Furthermore, consumers and other stakeholders may access and search this security information as needed, establishing a rapid and on-demand information exchange network for restricted internal use or public access repositories. This specification extends the Atom Publishing Protocol and Atom Syndication Format to transport and share security automation resource representations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8322"/>
          <seriesInfo name="DOI" value="10.17487/RFC8322"/>
        </reference>
        <reference anchor="FIRMWARE">
          <front>
            <title>Platform firmware resiliency guidelines</title>
            <author fullname="Andrew Regenscheid" initials="A." surname="Regenscheid">
              <organization/>
            </author>
            <date month="May" year="2018"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-193"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="REDFISH" target="https://www.dmtf.org/sites/default/files/standards/documents/DSP0266_1.20.0.pdf">
          <front>
            <title>Redfish Specification Version 1.20.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="STIG" target="https://public.cyber.mil/stigs/">
          <front>
            <title>Defense Information Systems Agency Security Technical Implementation Guides</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="BENCHMARKS" target="https://www.cisecurity.org/cis-benchmarks">
          <front>
            <title>Center for Internet Security Benchmarks List</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 272?>

<section numbered="false" anchor="contributors">
      <name>Contributors</name>
      <t>Thank you to reviewers and contributors who helped to improve this document.
Thank you to Nick Grobelney, Dell Technologies, for your review and contribution to separate out the policy and measurement sets.
Thank you, Samant Kakarla and Huijun Xie from Dell Technologies, for your detailed review and corrections on boot process details.
Section 3 has been contributed by Rudy Bauer from Dell as well and an author will be added on the next revision.
IANA section added in version 7 by Kathleen Moriarty, expanding the claims registered and adding a proposed registry to define policy and measurement sets.
Thank you to Henk Birkholz for his review and edits.
Thanks to Thomas Fossati, Michael Richardson, and Eric Voit for their detailed reviews on the mailing list.
Thank you to A.J. Stein for converting the XMLMind workflow to Markdown and GitHub, editorial contributions, and restructuring of the document.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8Vc/3LbRpL+n08x5/wR64qELDuXOKq93dCUbGtXsnSivNmU
y3UFAkNyIhDgYgApzI93uWe5J7uvu2cGA5KSs3Xe2tRumQSBmZ6e7q+/7h5o
NBoN7o7Vi8GgMU2hj9W1XlWNVleVbdpaq7G12tqVLhs1r2o13dhGr+xQTaqy
SU2pa3xOy1yN1+vCZGljqtKqtFHTLC30IJ3Nao3hr6/G08l4kFdZma4wSV6n
82ZkdDMf1WljR2uZbZSG2UbPng8w3LGyTT7IMKgubWuP1UbbgW1nK2Mtpmo2
a4x2dnrzelC2q5mujwd52ujj+ImmbiFIrdNjNdVZW5tmM7jVm/uqzo8Hg8Gd
Lls8oNSirtr1sXriFDC+abRteEHqqq4ynUPAqXpK8h48wf0y95Pvq/rWlAv1
hh6n66vUFLhO931HK0yqekHX0zpbHqtl06zt8eEh3UVXzJ1O/F2HdOFwVlf3
Vh/S84cklmmW7exYdcq6XxyK/lZVbdK62YzSJshqdWPxVJHSlW66+OlEhkxM
9Ylxtn9+YKuSZbMqBoO0bZYVNmCkZI//kjbLQutSXSTqwg0BybDOY3VTp6WF
Pa1Ic2clfRJN+x1S5+cT3KxFmbduqMSPwyr7bkG/Jlm1wp21XuD5Y3Uxxpes
asum3hyr99NxkOeCzEV9bywGLb0gr/SmgvWe5ViHYfnclCu6O7mXu7+b8W3G
3eWmtE2tNXT8Ql2l9a0asyXx7Dmm+/Lo2bOjr7+k73jkWL37IZKSv+yVcpz8
OVHTRpuykyX90dKFBFtT5mmd297Koa9un6s6Mznb0jP8N8L/X4yOnn37fPT8
66+ePzTnZIlx61S900W1SAuvmxNdFOpGZ8uywnWjya68Q9NvnYCZDJCUMsB3
OX7dUtLRN1+raQUTweLoSqenZ0fffPXyy0e3cFCKgdyxo16/njw/OvrWfXz5
4tvn7uM3/xGufvvixVf08Wx0knS2rwEodHH8bpxMvr9JJkVqVoAIvpDdN/63
P2//9iN+Gxhvp0GMly+ePwe4XZ6fneLC67Pri+/H16fQzuVZcvQs+frZ85eH
786mN8n0KnmJ7Tj69gU9eHry+mz6lsYAiqT1QkeOen9/n+QrhwfWwB8Pcz1P
26I5nJsC34IRHAJNW/I/e3gyvXr2/Ouv//soef4seZas87mM7RE9nxsLxa91
ZuYOpNVfAd30rzyD+6c3Z2/2y7RuZ8D2JNsAYJOVKSCDWTA4hTlO9Bxwq/u+
LLFCjRe6zDada7NJQYxCna3WhaYlyANvWngYWdmr03eTtxfj679MH1ZSBteU
AVlV+DqaYZ7lCr5oY9EmGF/XHL3O6FOpm06WV+ERdW4sNnk0GsHIYbVphm83
S2OV17MibIQm7FIjxJUM6NigDHCItawJPOtS3S91rWcblcKeOZBEoEpWXeRq
phXCV6tzFirFVdIDbgXoqmquunXAEfErHKEqrGqWiKsIZAoGgcibc9zlqIXP
NGOp9E8kA6QRoBoqXRhgLCYHzjZLrUqNe5sKM+HZ6g56McC1O5O3eCiGfxZN
p9lSYYkrdY+QYbDkTrZINDWvgSMIqLfJYxoLKsL8uNbQcu3WemlJYcFuUngq
X4dXKrEuka6FvaW8E6e8WjWONH1T3SL0PD0d3xwk6vslXIfXnxubtUwdMGtR
3au1ronHWAC+bYoNyXZzdTFUFe6u1XVViYg3dUsCt9AHpryZvFEnZ5NToT5l
VY7oit8W2s6qJMfECgChaWEr3vMyK9pc54lY2crkOSjS4Asyy7rK24wEHww8
8+oCrFpizqLCFs4onsJHTK3zoZq18pNcNXP4NnCCloB9M/oOy201fRUD+8k0
AHFaDVTQVCvzs6iq1n9vMSBDCVE33nX4VFq6O5LBqw20TTa0roAEG172Sqe2
lcdkJ9k+V+mG1lrN53CDnIa7S2tTtZbWA0cpM60KiFaANxYVgUC0Toim7yjK
4qYspS2i/aE9F6slyzBli9GwU/KcrM3QuNDrazLan1Ja7ZD3m/cND09wV9sE
nvalDb9cgSrRDOAHeQsreYrtP3B2xuuM5FtpUJycRVvXFUmKSWDvIIA567WT
RSn2BBpATEmetQiZ66IieGD4ggAImWzODXGiNfybwBLbQuLX2mJHec/oq4iC
Z4KW0gUZL/bsJ4A7LecuLVptoYqzEnuYY2Ly9na9ruom0h/xG9OATUEjGHy9
a3MkuQFeLhgnyfdLxUi6roG85P0FobIC3waC8S+i8u1dFSWQoeRGDI4wDM47
bwsSDjpoySiqNPfLBkQTmvgHCUWhiaqtM1oaKxb/g/qgLHLaHO6GofKUBXWG
CUyE9+IbsRNjV6yUhh7s5oaBAZ/YR+ySxMLstlO7iXRIiib8M3ACk7G27oy+
91uzIDAtaeuHCgq6HToo8wYRVCyQ71YIkcaWYWVI967aksMzNgX20a6AiRsn
DMFO2HX4ce7gRO4tTHkbbTRdhFkJgu6PRB6sZGMfB1AydiIf6sMOnfroHYHw
/T7dCPjIskE5GBIWVVokLpay65POxLR4qiFipqFAI/hoxdRnpiCR2EDEdKDZ
VXqL3/dYa7OEWy+W+1YqWMjbTLqPgY0dKwVEW/MzLMv5LP6nS7o/D8NG0opO
AaZWgmqFSKWdkVufHc9aI1sG3eJZuJk1GXBj7ZbF6tA9CKXnHbpyTKfBvR2K
KUDGsF/jm7ApDnHdPjATIAUiG8l5uUwNYHBtQzQFeFVjIkqiSLeyUEA+ufRc
QqqEYIsFklymx9Gsk1ycXNZLc1hdE5lYYmc8ZNsIsjy6h53rI4Lz6WBKlieF
8GvZpU7QfUBF4acQ9JPIQivubzPtGZKPHgVapncUk0f4AasmAIXjWP341vBW
k8Z9UPeh1MfjEpBTauCUJd+NQvE+o62wZO090S022WadUEhWmxl7mAtAeFBk
dka4x+o9UWLZ66qpMthp4pbGg/hxc/KA6l44lRfGGZeVTcPSwRyGEVEbblMA
edy6FGMn2G/v8Haw26OdPcbPrre7WNLZF1SRuiPaywUoCHdCSzH8Xbb0Vm8U
VX2senLxfnrzZCj/qneX/Pn69L/enyE3o8/Tt+Pz8/Bh4O6Yvr18f37Sfeqe
nFxeXJy+O5GHcVX1Lg2eXIx/eCIqe3J5dXN2+W58/oRcuentNAcgRxU50Gqy
6dQOuq3CM68mV//7P0dfqV9++TeXCf/2m/vyEqk0viAFKWW2qkR0lK8w/c0g
Xa91WjOIAPWAR6ZJiYkBqeyyui8VJS/Q5r9/IM18PFZ/mGXro6/+6C7QgnsX
vc56F1lnu1d2HhYl7rm0Z5qgzd71LU335R3/0Pvu9R5d/MOfEDe1Gh29/NMf
B2RCe4qeU1AbIrCwIZBginBEUmOK+Wh++XRyNj1gWLQwXArxgGXOEcq5WbQu
pABVyI+tZGZEC4EGuhYmEIJKGpVYZXtzMAJADe0n5omT2Q9dCv2RbkOus/YO
BLIK0AI6CebBe8Zx4pcWZlEKRPLy+gNTSGE+21/BglL3kB8RHXO86NOFAXDx
x0oDriqgPlB94mOXQbdWZCTEqAXZ+yKtNGG1EGMPEwxClDKlRa3TfONSJ5KX
9m8FwDFrCjMuKeAdyQE4JVUEGh3hGt0/N/XqnryWKE+dCx9QVPFR0yvlKj5D
9drfdo3MrTCMebwqMj+szBeOPoKB9Gg71dD34N2Q2CEmK3Ygn9OKPTUED+G4
TEIiAnhq6JmjUIa6qw8xf5zX1Wo/qR8STaJfOlIapX/WhbduVKyILBYXfGZT
bDih5HLu4LKkkJAzXBOxYDrBwOT1vatY5QKKMHjH1HoKIenBfikNIHPkHP7p
dXVzMHTp7CMpIhLByZuDT6SJiO1rSRJ3Q2+i3lb38DxOiwy5/4oLDU6VjM4I
SiWFXpIj7NFOZGWmwpZKG2fmzgPnbZk5fkSqJ436BKpTG5ld3ZYl1kXJRsNJ
0fChPD72Fn7UbV4eEs1gYE8WVYGND2I/EXWDZjgu1uWopJ94LGwlOedO0qqA
FgRoyhfad1VBqbenXqJzKTJgiY1ZaSE4vToWNBIkeaqTRUL+v2QXIbvQgjIH
PFXPASg16OEiRefNmtAJis5c/yvvSmOODfvlUuWt6XDU18oALR5t0jJd8Owi
9mO1lTlX21bwFmNdBk2sTtQnKNhK+urzReMsITLM3vLW1NOyMnKsiWRwSjRK
/J9kuZpcuw3y3o19qxz6hjJIzOfAXnqun/fJGqVZ+2Atzkn7xCjKMX1WTLuz
t4AU59mi4ZCXydZkdYVl+6pUkW4ANOrpdrzthdth2O7aHpB4UiKbu3KBH56t
wM+pyztTV6UQuy53T3jx1w79rjgPQyizfX11oAqmX1I44LJ/WJxLoGuIVYoN
/C6+4AUNleSu5iBq79ccXLJXU7maSh9pwZDCBAiS+EQuCEuZVReUbZeoEwN1
m8j1ioBOXDNz1d5OQFpsA1+e+ALPkEAvQmwq0Ab7xLc9NrpO7ZaJ9mZ9xNO7
9RBIsUZ10yuSJoOrsBaSxyFiB3i2H7fSKHv0dc2uSOJp2b4yzcDVIT2xotk+
UavZU6MZsN2DKU9vqO7FljNPs46vcQcLOcSIPyCDgO9c6/w1lXA+uHbVR6xa
VpGHxErN4IG3Qec2Y5LpCrUEdts4NpT2iKwjqmEIiYuLuR42nebImaOxeF6f
bbpOyIqrf1xCUhk370SvQl8WfSzr/HFwsZXpX3WZ/hBbQnVs3PdY5aWduX3E
4wMK8i4yzGgUgCIRRw5oFN0lBm3R6qE6OZuOuQVnDz4dDZCrORYczeanQnAC
6yjJZaDWKjPs3EEVNl3p/V0cDO0YcnpXmdz2qiUM8LLpAakYwlykZjN3Buy8
mBA46i7tX5B1xT+OaKHWz8COhTCIVwRAK1cD7BeS8TQ1qSnl6FMiINepJGlc
wnismsNgGNKKKAZFW229ZUmRh4SlQk8X4o8Hg5F6m9a5pANNg3S9hbQZFZUY
aKh+AkYZ3zYOt02625iHujB/LTDsH7z2xsiJphTmL7ZLMD4n8Q9dbgWGXret
8U1hLGIcIOvc9WdgoxggOtkD6oTchLhknBJ+epTIvDFgODqkfAf3H5RpwIeL
hnHVcoitJ0Nom2rlc6S4jpmJLUm1TrJXxLp1gP+9JTRnTL6+aRydphYMjJ6K
qRU0nbv6f1q4cOYqp8XGra+LyYFFE+snR0IS6mp0d20BjUh52FCX4wL/Lhz1
dEAzS2/ZMimosQEjRBLQhUZqz68iO99h3lhRyb0RfD6lOrENLHxvkV+4Qnmn
N59uGaxSCrZ3dL7JtVZC6Bl0oYcGWSxqvSCT5/bXsiNSnkPFPQ9/z+5GCaWK
YRy3OhSf6pCT0vESDF97gqn5aIe7DM7zIaPd2EM/Pz79AiEpRdKYaxhuEcK+
L3b26w4P53GOQwhDyjkQUm4OLqH3RL4IvAMR7grhrEkmfa6j4DzE5zhmsRwq
Qsp2RVzpfqiOhur5UL04oDldcyCsgIyS5g6dxnUU6kUldFqntwIJAfHdu9Du
UTXSvdC4lI8ehU3t8HgoeCxP+kyPaz3GFw58h4vwmW/uNY4urqZ4jprlHPIk
LqQEr2nWWE8Idb9v/IW3F1pCbElkP1uF5H5tfs4lHBLFcQ4nJh1W+ODOJH3k
YSfuCh1Y+ujNjuwk5qiRN7HjOGoZHDgiNpxt+A3yLSPhDlzpuIealiSdO4Yw
i1yYQc0sDNVadpOOKKxup5Au/Ifp2PWcUF1LHM/koZZjosqfyxC4UiUBVsgi
pNrygG5p+xkgKUY0FHpQUb7jyxBMUPyyvG/ukqrA1oeOtIg3YPQ3UVv3OrR1
J52oT99cTw6cEDCkX5Ug8q/qnEzwHRn5zn/+phMu60sQ2rnltTD/Xwe/juQ/
/+/e/x79cesWDKlWa8uzPIya+PFd7KLkV7tS+g8YssAuKF44XDPofB4/KD++
Ju6MUd9fn+3TTTTkOqv5kk/x/ioRqn//3mEeHHK+SmP1Ovl6BfD4R39mp18K
6g+5RJZEl95SXYlFPLyg/t9CqxOzwFPhR0k9iCXQ/o/IhvdJCTiaSiPfd8HJ
6K71KBJTWlr7WIs/i0UnGooipETsnTYc7UrpAKDUZS/vS1ed7Zcl5DoXwCEv
J/tEBuvUWLi1MxUaK+YAjrLycKe90nDUZVxVeS/75qSez/iBVnRlEwllKYlO
p6OGoTTTETIkS4NLPsaGOQsz19kmC2d/dkckKsBdDyMJfiyHnJU6lpRKO5+f
I97DP0A82/WiBrPBJwxAuRBxzBXgga40WeL6xvtUyHQmFC8eWmfgpl2hwy38
gIsG2bKy2qca79d0zp1v+oe2JBzc7mozkhjSsRge0wPuMDRejY+le1myYyul
vo+Qmpu+tE+UtbTl3mMZc+qa/U5LkJMU4XQj/MjkjubzHBM52BTaZp8YbGSo
EuHOBMSlICqMN0LuC64mgBLybtCRHj5TxaVcl3f0PZL3pfM+CnUc203pxKX9
RDCiqmOXyTlIExPYKmVxw4Q4tT0Y7h9bCNzmQc/se6Bjb9TW0UAj/+MDY/vS
ArgkDLPmfWUf5pH9RelXF9ViIazQ0VM6c7XgsnCmA4j1Olhlvn9a5CVCK9PG
+YDT2T6TDqcfOyXn7ixAxMin9E4EbZ6Ff/HuUfsqJAb9k5M8i6Ml+1q0Ph4y
JaScD1jUzixUK4dRIgvf7ii4krt25zBasSI2bNcIWXZRQir+e0VwJUTfAZW+
gI642r4GcyLWS+fmUusQkjMe6ujOH+8V7CH1ws4ihiomS1K7gg6ekiCYSxAM
yYDPs0I/0ErD2R1cEimqWpQUVLNHBh/amvi+HRX6aooD6B3FdLUfGkfKCJEi
AtF8FdfMOnrKm98wEbZ7Rg+7FaVAJNdCU7pfsBF0hyDjihsSnUIqQg+nWL1j
lnTqibIdAIdZuV606ws5X+LanxzBEw7QqwN2xR3u5u8cRJJ9YyTuZ87iEtSN
bWvqDA3lVhopLsDMdHNPvuqKNB2131Pj9Ce5nI2EykBn88zvXUzjw61dOYHO
ZVqfZMQHwXzzp9cP6nVJfEUczP96Eo4BcIZ43RUeASbzWPgH/LSfstjOOfOq
K79sNUGHvQInqZ9PexOoJoNx0Fx8U1c2lShN5zd8teBnXVeu8R29rkCoCucx
XB4VX3KxocPdeIbeOWw8WjEtTMtNaOOHM+9Yj864jZ44hrp9g8znqgczPa+k
tkTxm27ktPYBsekEb64pNvfVJENWWdbWlOX5Rqzl0wWhpOEanj2QD/gV8/sh
HUCk1/P4mCACXowHZOZBF71DIC7z52aqmywhQ0n37hrGIRuAv1gzI8rKnW06
ytJV9wUkfIs3xF4OkVukifqZci6FuvC7x8G/6A7ZTMgnc8eTdkoa/6xXNhKP
vg37ghP7oXFIn0TOcBt3lTqM8YK6VsW/+J2c1D70Nk7/VRw+PklUhr79a97F
ySstJpfmeVd5z2JjECnuCQK690ris4eubzekjeU0jDbaxu+Via1xfOjbmfqF
q6i/4WfCUkd+Jq8ur8VSppfv1Pd65nuZkQUdSLmEWLOvmQ0G7tKDRwY4Xw2d
OswEsRN1bm4lnM6Iwru6lfzoGJFckneDXIccVkQe6jOlykkembh1R+WiSzsi
D9WHrfcOpSz4YeuNw49DObOjRxTrEvWu4tyqH3GJxQmLStQYhCWqPz6qEQQ0
18qcVXyU1kuX8LY8uACmLTBqtqgTN+I2clAI0baxHbUM3ZUHeqxUZ3p6cTU9
CCtztfyrabdWLl668xfiNzDwACBxD7XXuQ0dp+kwuOuwO77oK5hWov1jVIRD
4sX4BwxTI5wxI6tUeA8zKMB6KftnHBbhpN8wrnHGBwoiucJLZF1jZ84F+/55
hf2nyUXSq+lDWowJ83qnmd87wO34l6uP9Y4zPNCB6PgdN/P96xXRkp/yS0PZ
Lc1f62p+ENG3qEvGZVSataueyvdH6qVRGY3Li+yr9Ey0Plev+8crp7/vTioF
vp+1ZdOOJmfT0fmR8t/7zf6hY+BHkVZ/5Vdbjw8PIeJhb5Ck+YmKwAO/odw2
CQ2PO3mJ14aaS1xtHwplIM3y0X5+WSBrHi6oW3eoOLQ7xMkI8PjXp90rR8zJ
u5eN/NsGnp7fI7a4Fy670Q4EZMauNWB96ejPDnUIfaK2iIMTSugfwZl55ddI
w/hOhK57Hbqd9xy7RpZP57fjD8ed4D0RqLqezues9X++Er9znM9Q2cdI56cX
6jMU9DES1bQ+Qx0fI72+GKvPUL7HSG+nb9VnqNoP2KZJiKcPatwRmM6JH7tV
gF9OwM6NtjFY74tOcqJbQJTogJ+DAla/7ODcjX7ssYnuGX+OK5y/CCXGXkTo
RYNQNaA2M6CiKyAwKkW8Oepz7sQOU3ZxQORxGZR7QVUKV6Ia64sn9BJw1PPz
kib09r9fkmwen1+kuteI/iqMoT/hQH+ZwlUoQsymv02BD5c1bJEG4YcTpd5b
vSuEf6Fkp07yAD5N/l/4xES5z48fxCfqMH/WXmTggzLIP6En+U9AsO2rnxHS
3Di9oT8TxrlxekN/JtBz4/SG/kwo6MaJhpa/cTAD23P1eDnqVtV28Mux/K0m
nf/nk3laWP3kN3KhtLxVm6qV0ieV8LiS6YsC7mEkp4AcXbhzpmYlhzl2KgPR
YO8MGOebukJOV+rNcPfP2kjTH3fXbuL+rK7JFU5y+vdIHzmgGUkwVNN0leL6
X9LbtC5Svv9ta35sS/U348o1j4kkZ464eBTJhkQkC+83xBUndz9EmMod6kWX
y4c1STZ33eYb9Spt6eBkECMc/qDaKBdrl1TTdydI0jzX0Wv6PzUsluV3eDmo
WDer3GhKT1HVNzRj9zeh3B9yct3UwCkdQEZRi+XI3XvuWKS8ehCQj9vT3Ir4
fftBD7zV+PzK1LfLqvjZd7Ni/WowVP8Qx62bZbWCYl5XcI3GDNWFyZYp2PY1
/Ysc0J83PK0RKP9amcZDk9nZQOu1t3JHyaiutiVg90egfBvoTtehbvS3i/ML
+oMTVOSZU50CT1wgwuZ0ppCkeGOat+1syMsgPRc9Y3bvAtRw7rqlQlkIsTpy
ocH/AbawLTQZTgAA

-->

</rfc>
