<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-tls13-pkcs1-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.1 -->
  <front>
    <title abbrev="Legacy PKCS#1 codepoints for TLS 1.3">Legacy RSASSA-PKCS1-v1_5 codepoints for TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-tls13-pkcs1-04"/>
    <author initials="D." surname="Benjamin" fullname="David Benjamin">
      <organization>Google LLC</organization>
      <address>
        <email>davidben@google.com</email>
      </address>
    </author>
    <author initials="A." surname="Popov" fullname="Andrei Popov">
      <organization>Microsoft Corp.</organization>
      <address>
        <email>andreipo@microsoft.com</email>
      </address>
    </author>
    <date year="2025" month="September" day="15"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract>
      <?line 76?>

<t>This document allocates code points for the use of RSASSA-PKCS1-v1_5 with
client certificates in TLS 1.3. This removes an obstacle for some deployments
to migrate to TLS 1.3.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://tlswg.github.io/tls13-pkcs1/draft-ietf-tls-tls13-pkcs1.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-tls13-pkcs1/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tlswg/tls13-pkcs1"/>.</t>
    </note>
  </front>
  <middle>
    <?line 82?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>TLS 1.3 <xref target="RFC8446"/> removed support for RSASSA-PKCS1-v1_5 <xref target="RFC8017"/> in
CertificateVerify messages in favor of RSASSA-PSS. While RSASSA-PSS is a
long-established signature algorithm, some legacy hardware cryptographic devices
lack support for it. While uncommon in TLS servers, these devices are sometimes
used by TLS clients for client certificates.</t>
      <t>For example, Trusted Platform Modules (TPMs) are ubiquitous hardware
cryptographic devices that are often used to protect TLS client certificate
private keys. However, a large number of TPMs are unable to produce RSASSA-PSS
signatures compatible with TLS 1.3. TPM specifications prior to 2.0 did not
define RSASSA-PSS support (see Section 5.8.1 of <xref target="TPM12"/>). TPM 2.0
includes RSASSA-PSS, but only those TPM 2.0 devices compatible with FIPS 186-4
can be relied upon to use the salt length matching the digest length, as
required for compatibility with TLS 1.3 (see Appendix B.7 of <xref target="TPM2"/>).</t>
      <t>TLS connections that rely on such devices cannot migrate to TLS 1.3. Staying on
TLS 1.2 leaks the client certificate to network attackers and additionally
prevents such deployments from protecting traffic against retroactive
decryption by an attacker with a quantum computer.</t>
      <t>Moreover, TLS negotiates the protocol version before client certificates, so
clients and servers cannot smoothly transition unaffected connections to
TLS 1.3. As a result, this issue is not limited to individual connections
that use affected devices. It prevents entire deployments from migrating to
TLS 1.3. See <xref target="security-considerations"/> for further discussion.</t>
      <t>This document allocates code points to use these legacy keys with client
certificates in TLS 1.3.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="pkcs1-v15-signaturescheme-types">
      <name>PKCS#1 v1.5 SignatureScheme Types</name>
      <t>The following SignatureScheme values are defined for use with TLS 1.3.</t>
      <artwork><![CDATA[
    enum {
        rsa_pkcs1_sha256_legacy(0x0420),
        rsa_pkcs1_sha384_legacy(0x0520),
        rsa_pkcs1_sha512_legacy(0x0620),
    } SignatureScheme;
]]></artwork>
      <t>The above code points indicate a signature algorithm using RSASSA-PKCS1-v1_5
<xref target="RFC8017"/> with the corresponding hash algorithm as defined in
<xref target="SHS"/>. They are only defined for signatures in
the client CertificateVerify message and are not defined for use in other
contexts. In particular, servers intending to advertise support for
RSASSA-PKCS1-v1_5 signatures in the certificates themselves should use the
<tt>rsa_pkcs1_*</tt> constants defined in <xref target="RFC8446"/>.</t>
      <t>Clients MUST NOT advertise these values in the <tt>signature_algorithms</tt> extension
of the ClientHello. They MUST NOT accept these values in the server
CertificateVerify message.</t>
      <t>Servers that wish to support clients authenticating with legacy
RSASSA-PKCS1-v1_5-only keys MAY send these values in the
<tt>signature_algorithms</tt> extension of the CertificateRequest message and accept
them in the client CertificateVerify message. Servers MUST NOT accept these code
points if not offered in the CertificateRequest message.</t>
      <t>Clients with such legacy keys MAY negotiate the use of these signature
algorithms if offered by the server.  Clients SHOULD NOT negotiate them with
keys that support RSASSA-PSS, though this may not be practical to determine in
all applications. For example, attempting to test a key for support might
display a message to the user or have other side effects.</t>
      <t>TLS implementations SHOULD disable these code points by default. See
<xref target="security-considerations"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Prior to this document, legacy RSA keys would prevent client certificate
deployments from adopting TLS 1.3. The new code points allow such deployments
to upgrade without replacing the keys. TLS 1.3 fixes a privacy flaw
<xref target="PRIVACY"/> with client certificates, so
upgrading is a particular benefit to these deployments. TLS 1.3 is also a
prequisite for post-quantum key exchanges <xref target="I-D.ietf-tls-hybrid-design"/>,
necessary for deployments to protect traffic against retroactive decryption by
an attacker with a quantum computer.</t>
      <t>Additionally, TLS negotiates protocol versions before client certificates.
Clients send ClientHellos without knowing whether the server will request to
authenticate with legacy keys. Conversely, servers respond with a TLS
version and CertificateRequest without knowing if the client will then
respond with a legacy key. If the client and server, respectively, offer and
negotiate TLS 1.3, the connection will fail due to the legacy key, when it
previously succeeded at TLS 1.2.</t>
      <t>To recover from this failure, one side must globally disable TLS 1.3 or the
client must implement an external fallback. Disabling TLS 1.3 impacts
connections that would otherwise be unaffected by this issue, while external
fallbacks break TLS's security analysis and may introduce vulnerabilities
<xref target="POODLE"/>. The new code points reduce the pressure on implementations to select
one of these problematic mitigations and unblocks TLS 1.3 deployment.</t>
      <t>At the same time, the new code points also reduce the pressure on
implementations to migrate to RSASSA-PSS. The above considerations do not apply
to server keys, so these new code points are forbidden for use with server
certificates. RSASSA-PSS continues to be required for TLS 1.3 servers using RSA
keys. This minimizes the impact to only those cases necessary to unblock TLS
1.3 deployment.</t>
      <t>Finally, when implemented incorrectly, RSASSA-PKCS1-v1_5 admits signature
forgeries <xref target="MFSA201473"/>. Implementations  producing or verifying signatures
with these algorithms MUST implement RSASSA-PKCS1-v1_5 as specified in section
8.2 of <xref target="RFC8017"/>. In particular, clients MUST include the mandatory NULL
parameter in the DigestInfo structure and produce a valid DER <xref target="X690"/>
encoding. Servers MUST reject signatures which do not meet these requirements.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to create the following entries in the
TLS SignatureScheme registry, defined in <xref target="RFC8446"/>. The "Recommended" column
should be set to "N", and the "Reference" column should be set to this document.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x0420</td>
            <td align="left">
              <tt>rsa_pkcs1_sha256_legacy</tt></td>
          </tr>
          <tr>
            <td align="left">0x0520</td>
            <td align="left">
              <tt>rsa_pkcs1_sha384_legacy</tt></td>
          </tr>
          <tr>
            <td align="left">0x0620</td>
            <td align="left">
              <tt>rsa_pkcs1_sha512_legacy</tt></td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="X690">
          <front>
            <title>Information technology - ASN.1 encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2002"/>
          </front>
          <seriesInfo name="ISO/IEC" value="8825-1:2002"/>
        </reference>
        <reference anchor="TPM12" target="https://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-2-TPM-Structures_v1.2_rev116_01032011.pdf">
          <front>
            <title>TPM Main Specification Level 2 Version 1.2, Revision 116, Part 2 - Structures of the TPM</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2011" month="March" day="01"/>
          </front>
        </reference>
        <reference anchor="TPM2" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_TPM2_r1p59_Part1_Architecture_pub.pdf">
          <front>
            <title>Trusted Platform Module Library Specification, Family 2.0, Level 00, Revision 01.59, Part 1: Architecture</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2019" month="November" day="08"/>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="SHS">
          <front>
            <title>Secure hash standard</title>
            <author>
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.180-4"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="MFSA201473" target="https://www.mozilla.org/en-US/security/advisories/mfsa2014-73/">
          <front>
            <title>RSA Signature Forgery in NSS</title>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <date year="2014" month="September" day="23"/>
          </front>
        </reference>
        <reference anchor="POODLE" target="https://security.googleblog.com/2014/10/this-poodle-bites-exploiting-ssl-30.html">
          <front>
            <title>This POODLE bites: exploiting the SSL 3.0 fallback</title>
            <author initials="B." surname="Moeller" fullname="Bodo Moeller">
              <organization/>
            </author>
            <date year="2014" month="October" day="14"/>
          </front>
        </reference>
        <reference anchor="PRIVACY">
          <front>
            <title>Push away your privacy: Precise user tracking based on TLS client certificate authentication</title>
            <author fullname="Matthias Wachs" initials="M." surname="Wachs">
              <organization/>
            </author>
            <author fullname="Quirin Scheitle" initials="Q." surname="Scheitle">
              <organization/>
            </author>
            <author fullname="Georg Carle" initials="G." surname="Carle">
              <organization/>
            </author>
            <date month="June" year="2017"/>
          </front>
          <seriesInfo name="2017 Network Traffic Measurement and Analysis Conference (TMA)" value="pp. 1-9"/>
          <seriesInfo name="DOI" value="10.23919/tma.2017.8002897"/>
          <refcontent>IEEE</refcontent>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa and Meta</organization>
            </author>
            <date day="7" month="September" year="2025"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if a way is found to defeat the encryption for all but
   one of the component algorithms.  It is motivated by transition to
   post-quantum cryptography.  This document provides a construction for
   hybrid key exchange in the Transport Layer Security (TLS) protocol
   version 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-16"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA71aa3PbRpb93r+ih/mwyRQBPiTZkramNrQkx6zRa0U5s1M1
VXITaJI9BtCYboA0o2h/+57bjRcpyplPq6pYFNCP+zz33MsEQcAKVSTynPeu
5VJEW/4wm8xmk+D+rxezUbAePZ3wSMcy1yorLF9owx+vZ3wUHvWYmM+NXLc7
acsPozeXR6KQS22259wWMWOxjjKR4uLYiEURKFksgiKx9N/oKMi/RnYUDI+Z
LeepslbprNjmWD29evzI+Q9cJFbjapXhMol/sqLX5z0Zq0IbJRL6Yzr5gF8Q
oTd9ePzYY1mZzqU5ZzEEOWeRzqzMbGnPeWFKyaDIERNGCpw6k1FpVLHtsY02
X5dGlzmePhqR2Vybgl+LrTS8XbWWWYkjOf/jpZx7PXp/w8kqW/JfaAs9T4VK
8Bz6/0zGCLVZ0mNhohUer4oit+eDAa2iR2otw3rZgB4M5kZvrBxg/4D2LVWx
Kuf+wM1y0DErvU1gA1t0znWrQr8pVLq7fvC2h8JVkSY9xkRZrDRMywOczbnK
YNXeZcg/yOyfIlVZzz32/u5dirWK915BC5Gp30QBR2PJL1ovE8mvry/8a+mN
E9POucx+Xrr3YaTT3SsnIb/XuV7v3DfJYiNV98XebTcqMtrqRcEvtMnDnSuF
25zrn9N6kbuVZdqk2L92bn/4eDEejc6qj6fD0fv64/HxO/r4P+/Ohufu2Drb
ptnCn6AzXsholelEL7c84JPZbTjiMkMaUXg8lImEZrNcRmqhIr9BL/gHYVXE
r3aW8R8/XD381OcXItMZ1iav3l/gPanEL5Ut8LxUdiXjV8suscxbweUKHw+H
Y/dn42demREJ+fg5eHQPrDRKWgXF6gXT2d1genVxzk9PxyfB6Lw65/H+ZjTe
NQce8Ruhsj1Fr+VaJnzMf5WGIABAMu7zB7lW/q/Ruz6/F8iyMQw3QxpHRWmg
AOxTrCTds6vFCJByFAxHb+nyaEpbwB4XOs3LoslOL6kwS4mMaRLGr43qpS71
XTZu8gDgUgCSBmWeaBHbASQJSL2ApA3GAf3dyvu0hl5PwFIo9DQcDY9I0jCP
F95W+6aqhLxHDlMM8Rsdl5Qsam6E2e5asM8/IsmSLR+Hw35lzuGwY8PhKDw5
q6w4OucTghbEI8m1Z7uzgMx3+v9vu4tfnsgKT2aUn5w9kaSjp66cTzkgi6zF
VJ1UPi1vPs4mEPz4/dGuBVHi+EwtM0G7+UfcK2E3BN/tbNY7oF+DLZcycduC
a7EWZdyr3jc4U6DsycOrGjMeB8OzYHx00C6bzSZM9W8qSYSzhsyCz7OBrYrH
QMRwmqYkG6QLK9xh748GOOr+7u7y+movTlbKVi/4HLaCDvIbbKqccyg/ZrNr
fhQO+UIkyVxEX9/W/UOIKJNJIs2ezh90rHdfdRQdDYPR8UFFa5VCD+RzYB/B
6oC2DUbDQQHZg1zrOJGBkz1oRQ+sTYKjoSs9DD9BEHAxt4URUcGY0xrcokwR
Q2AJiSbeYR0r4R1aQvqXVhJU7DGef4DybFAHWZQoOiOSpvD5hGMQJBWhCbm7
yshUr/FCAJUhhIiQiXS+1ank4CaJ3pIklhWap2ppcArHx/oQL36qYmjK2A98
mhUG6RxR7kIZv4o/P1e15OWlujDmtswdwaDLDmjgt6ASYYvK2EWrBLBULbY8
ldaKpVdpIdY4pWOK2Szkf1sp6NI+4dBWsETDA6AOYp742mGbRBIJ6B0Ml/a9
9omnhSth4g2IFY/MNi80TJCvULpiIFAkLUsQeDvKqKK+u0RZSlOAVGV1FJg1
CkGfnGdlfQKns+nCQkEnBqfGfL51G7wHvcMPeBPWR/IjK0SaJ7LP30BWFETg
j/3JXVTO1b9KkMzSNoqxg4pBSFG4LeAMMuNOLng+N5pwqyNfVyaWG7WmGPkq
tzbkn/QGkG36XICxIYW457DkKhLJS5TBF7I6GqHT9RlrvEMZkOaARlpL4d2J
Y9Re2y0aFicpyhFNZYPHYGuZLlgsFwRvnYio3fajlZI4rqvZJ+EpCAwkfH52
hf7l5Sd/B84CQkdJGUOa9pQ+n5cF1xmKFIDHynptY8h9wT9O7yH56bvgGD1F
xucSOQFDxrzMiUxpl9eU31YkBaIwW2ITqgIqRgV8sULg169gXMuMhFcNznCh
Ul2oEkDUjrG8ppOcWg71jX8I3zeKOj19yqKCZd4YVRRAvi00hL2iVauWyGDV
Q6AAKiO2JCswwD8bQ1bx1TrhXwcN7c1kQb0KFwUw6CuyxNE8EaMhghzAwS1C
C7FE6VCJ0WATXxid1oHpbATCj6O5WIKzWJIfqAR4RV1FFLhwJ08jy2D/+kZv
KMH/VYqsKFPuq7s0MMqNNlK7OCZ1MrSBhXJwSvrQvTrSCV9XJG8u4YRDeloC
FlYnNelXIUJtS5tqXawokKj/cppTeiwW0Au+3fGLZo25JzgMOtoyKQhbgHPo
OEtJgEenJipVhU9etJsKLUgJat05jDknU9Q1V1VODvm04I3d8Q9i7LXlfQg4
w3ekmiHSnp/rSkm0yKpYGp+hQHWK1EVpYEKDgLZR6brk8N8rgW2W2AaoCXK8
E72J2VuVjwrVhc5IKWdL11AQOChvDkjgAIwjImOL/urz7JEacvrNb+/c54er
//48fbi6pM+zT5Pr6+ZDvWL26e7zNd6z6lO78+Lu5ubq9tJvxlO+9+hm8nf8
Iql6d/eP07vbyXWP5CfXstYwxiUO4AMWkQZeIscJmE7ayKg5/sCeDxf3fHTs
yyn1eDD88/OfqLaO3h+/vLDNSmb+Lodg/k+YFakBlBCGzoALEKG5KkRiCW24
XelNxuE46WxZDU7QBZy0vHQWrSSK6OM2l5VFFxqu3FCY7C9ai6SsCqEHaY9j
5OEdqGfsf/Hj21tUEv5ckTnOjRVPrqN/sisxPnn35GPix+G34fF4+FP/8MKj
0+POwpO3F56Mxp2F75qFL/uq/KeX0Okr5sCMnail9HOAJw7RDujrethXZIh1
yZAziMNRbZDzKBmu810Ju+oc5cLAWxLsCR6ffZr95fJuGo6G4bvh+HRwO509
hlSJwtHpMEAkEB8kr1PBp0joOqJThXFaB8TfpGUevXEWAdC+TxFSmtKeuVbp
W0Ewk/EcjZGKSvCEfoOLFNleP0Q62ge6Dgd06BY7wB13xPW26iIBHqRWJsR6
EchlEtdQwr60Tv/zF0JI8ETyW2vKLpVFOF5UWF4jQ0dGD01VZFdifGkke2pc
Zb+AwEFLAj9WNf7+2E/oSnTllvaCKJJ5cfB0b7S3qTLknVV2dYC/AQEmu9bW
bAoTGiiCxshjugs4H/wHjB24YHHQC9iCDPD7AeHYH6lezzw60j+A0xDN2Qkp
pz6FYNr49g9CkSqR1/qwESlBWZ2gCxewGmXQeH9/X6ZOCDgzOWbSLUdkk4Yv
dJs2f3djFNYahYSoBZhvO54NOa8vayvK7ump7/zc1c7HtW+7dBUstVyuPFFI
xdZpPCceQwyJpm6IiRjFxKREl5HwhP+oBklNr0O+03aAQMk0r+o/p7ks8I3K
p4OOSgBwhBUouLJ5gitF41Ta4a1iaNS9EoBMBw6c2AKXjpDYipgqupCKX0Xz
KzPgVN9CNP6sAXfucEyAGDk+wr7DR3AFSlk96CZ+0HnN2H3dURRddtKvnU0j
Gc8/HKBUlOlQg/SKPYlYe+N1GnPgptzsaEI0aPOK+VJXXuZgX7GvlLoksgsT
R3Wr4Puwmv4v1Deqs9x1aRB7kYgNjPJf9w/TXycXf68rxPjobHQ2eLyZhGMU
nfB0iIpx1hSft4itF4QuVu6OBs8RXRkQtKicbXcoZCsc7UoscJ6YPtoZEGA/
i8i1LYKallNgyW/RSmTU/EP2aXAZNrP91XZuVByAAiGzXl76DByXIs34aOwa
v9PLfqdf4Dv9Avv3+oVJp2151TPs9wv2Ow1D2MCLA9ZOXbCNv79mnlSBurm8
aQEDS5C5poIscPMOsssurldR4jixQWncthW4ohi1stCF1X0O4fEBaNyXSy26
MO1EIinY3smtJGADO1vaRqnvxJHOMSSkg0l6z1oUrKKpX3GkusnxFy+ESnhc
NrDTXtp31JerwrWZSpcWZQ3pFkkZE60uqoPHBEUackTUEPoMdpBARwPIIVQm
PXalJayxTPScwqABqTra/QyvHtK5tQ28UVtKldEggprpZkhfetDYqoUK2oEw
texVx+5hyAHphtjIXHYbSVdW6jaRNKdpVX0hqy9EYBp07XTZf1AAVsgosGZr
lW+bqH6oauaHkl8mGSDTDR4UaP/zs5/fVuzyFaihxNE230UjTUtHPl/BPHEU
mUB0RrZtiicSCQalcXmE8lKopWjbuTKbo22ECrWl2syn/Cyq+Qp6D5q6+WB5
DblWvyEiOyBiZxDSHUN2O4FuSUENcZWXCuuWORVdzlIqEpxWSr4SyjhMnKs4
RrjudEkV/9vBj+60i9i2yoiT+bZxZ2ZU26nO+6YXYVUFcWwBLXKqfqsGHz74
6LDO8CsSFq9b1KUC5X3hsOOVKz6qCiV9+tVmdeTLdThRQW8PsHwRw+m2Q6EW
7osQ5apC+9UJxd50z1vVpNGNqAzhMOgi/dE2Dqxus2ynQasYZJumh6Sy9SzS
80fr05KdhmM/ams6uVdNT9RtJqpBozN0iogWhYY1bz9fXzPsQeAiWWt+eunG
gfSNLLf1l3IuC+qBqiAyrmJ+efUACejLXHT+9Ve0e/zYyH9SSez0UIAHYh0+
XFMpa+JcxY+v4o49TSe3k1fMyT103zS4+uAHURGQpSLE7VgABzn3VS0DheT+
pMDIpYKOiIidnuxPbVPmEq73IGn0Tv9jRdxD4CdlmrGq2ZtTeXRh27utxiyF
30KcO4tkvYG/2rDD/aDy7/xXanI4/53zSzd18UTh8M/v7Peg+mk+fO8H67mf
X+D8L29MOL7watnJgWXtfKNZ9u7Asna6Qcv8VzpUANj/AYXiJkVfIwAA

-->

</rfc>
