<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.17 -->
<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="o-*+"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc consensus="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-uta-tls13-iot-profile-04" category="std" consensus="true" updates="7925" obsoletes="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.11.1 -->
  <front>
    <title abbrev="TLS/DTLS 1.3 IoT Profiles">TLS/DTLS 1.3 Profiles for the Internet of Things</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-uta-tls13-iot-profile-04"/>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>Arm Limited</organization>
      <address>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Arm Limited</organization>
      <address>
        <email>Thomas.Fossati@arm.com</email>
      </address>
    </author>
    <date year="2022" month="March" day="07"/>
    <area>Security</area>
    <workgroup>UTA</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document is a companion to RFC 7925 and defines TLS/DTLS 1.3 profiles for
Internet of Things devices.  It also updates RFC 7925 with regards to the X.509
certificate profile.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://github.com/thomas-fossati/draft-tls13-iot"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>This document defines a profile of DTLS 1.3 <xref target="DTLS13" format="default"/> and TLS
1.3 <xref target="RFC8446" format="default"/> that offers communication security services for IoT
applications and is reasonably implementable on many constrained devices.
Profile thereby means that available configuration options and protocol
extensions are utilized to best support the IoT environment.</t>
      <t>For IoT profiles using TLS/DTLS 1.2 please consult <xref target="RFC7925" format="default"/>. This document
re-uses the communication pattern defined in <xref target="RFC7925" format="default"/> and makes IoT-domain
specific recommendations for version 1.3 (where necessary).</t>
      <t>TLS 1.3 has been re-designed and several previously defined extensions are not
applicable to the new version of TLS/DTLS anymore. This clean-up also
simplifies this document.  Furthermore, many outdated ciphersuites have been
omitted from the TLS/DTLS 1.3 specification.</t>
      <section anchor="conventions-and-terminology" numbered="true" toc="default">
        <name>Conventions and Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="credential-types" numbered="true" toc="default">
      <name>Credential Types</name>
      <t>In accordance with the recommendations in <xref target="RFC7925" format="default"/>, a compliant
implementation MUST implement TLS_AES_128_CCM_8_SHA256. It SHOULD implement
TLS_CHACHA20_POLY1305_SHA256.</t>
      <t>Pre-shared key based authentication is integrated into the main TLS/DTLS 1.3
specification and has been harmonized with session resumption.</t>
      <t>A compliant implementation supporting authentication based on certificates and
raw public keys MUST support digital signatures with ecdsa_secp256r1_sha256. A
compliant implementation MUST support the key exchange with secp256r1 (NIST
P-256) and SHOULD support key exchange with X25519.</t>
      <t>A plain PSK-based TLS/DTLS client or server MUST implement the following
extensions:</t>
      <ul spacing="compact">
        <li>Supported Versions,</li>
        <li>Cookie,</li>
        <li>Server Name Indication (SNI),</li>
        <li>Pre-Shared Key,</li>
        <li>PSK Key Exchange Modes, and</li>
        <li>Application-Layer Protocol Negotiation (ALPN).</li>
      </ul>
      <t>The SNI extension is discussed in this document and the justification
for implementing and using the ALPN extension can be found in <xref target="RFC7525bis" format="default"/>.</t>
      <t>For TLS/DTLS clients and servers implementing raw public keys and/or
certificates the guidance for mandatory-to-implement extensions described in
Section 9.2 of <xref target="RFC8446" format="default"/> MUST be followed.</t>
    </section>
    <section anchor="error-handling" numbered="true" toc="default">
      <name>Error Handling</name>
      <t>TLS 1.3 simplified the Alert protocol but the underlying challenge in an
embedded context remains unchanged, namely what should an IoT device do when it
encounters an error situation. The classical approach used in a desktop
environment where the user is prompted is often not applicable with unattended
devices. Hence, it is more important for a developer to find out from which
error cases a device can recover from.</t>
    </section>
    <section anchor="session-resumption" numbered="true" toc="default">
      <name>Session Resumption</name>
      <t>TLS 1.3 has built-in support for session resumption by utilizing PSK-based
credentials established in an earlier exchange.</t>
    </section>
    <section anchor="compression" numbered="true" toc="default">
      <name> Compression</name>
      <t>TLS 1.3 does not have support for compression of application data traffic, as offered
by previous versions of TLS. Applications are therefore responsible for transmitting
payloads that are either compressed or use a more efficient encoding otherwise.</t>
      <t>With regards to the handshake itself, various strategies have
been applied to reduce the size of the exchanged payloads. TLS and DTLS 1.3 use less
overhead, depending on the type of key confirmations, when compared to previous versions of the
protocol. Additionally, the work on Compact TLS (cTLS) <xref target="I-D.ietf-tls-ctls" format="default"/> has taken compression of the handshake
a step further by utilizing out-of-band knowledge between the communication parties to reduce
the amount of data to be transmitted at each individual handshake, among applying other techniques.</t>
    </section>
    <section anchor="perfect-forward-secrecy" numbered="true" toc="default">
      <name> Perfect Forward Secrecy</name>
      <t>TLS 1.3 allows the use of PFS with all ciphersuites since the support for it is
negotiated independently.</t>
    </section>
    <section anchor="keep-alive" numbered="true" toc="default">
      <name>Keep-Alive</name>
      <t>The discussion in Section 10 of <xref target="RFC7925" format="default"/> is applicable.</t>
    </section>
    <section anchor="timeouts" numbered="true" toc="default">
      <name>Timeouts</name>
      <t>The recommendation in Section 11 of <xref target="RFC7925" format="default"/> is applicable. In particular
this document RECOMMENDED to use an initial timer value of 9 seconds with
exponential back off up to no less then 60 seconds.</t>
    </section>
    <section anchor="random-number-generation" numbered="true" toc="default">
      <name> Random Number Generation</name>
      <t>The discussion in Section 12 of <xref target="RFC7925" format="default"/> is applicable with one exception:
the ClientHello and the ServerHello messages in TLS 1.3 do not contain
gmt_unix_time component anymore.</t>
    </section>
    <section anchor="server-name-indication" numbered="true" toc="default">
      <name>Server Name Indication</name>
      <t>This specification mandates the implementation of the Server Name Indication (SNI)
extension. Where privacy requirements require it, the Encrypted Client Hello
extension <xref target="I-D.ietf-tls-esni" format="default"/> prevents an on-path attacker to determine the domain
name the client is trying to connect to.</t>
      <t>Note: To avoid leaking DNS lookups from network inspection altogether further
protocols are needed, including DoH <xref target="RFC8484" format="default"/> and DPRIVE <xref target="RFC7858" format="default"/> <xref target="RFC8094" format="default"/>.
Since the Encrypted Client Hello extension requires use of Hybrid Public Key
Encryption (HPKE) <xref target="I-D.irtf-cfrg-hpke" format="default"/> and additional protocols require
further protocol exchanges and cryptographic operations, there is a certain
amount of overhead associated with this privacy property.</t>
    </section>
    <section anchor="maximum-fragment-length-negotiation" numbered="true" toc="default">
      <name> Maximum Fragment Length Negotiation</name>
      <t>The Maximum Fragment Length Negotiation (MFL) extension has been superseded by
the Record Size Limit (RSL) extension <xref target="RFC8449" format="default"/>. Implementations in
compliance with this specification MUST implement the RSL extension and SHOULD
use it to indicate their RAM limitations.</t>
    </section>
    <section anchor="crypto-agility" numbered="true" toc="default">
      <name>Crypto Agility</name>
      <t>The recommendations in Section 19 of <xref target="RFC7925" format="default"/> are applicable.</t>
    </section>
    <section anchor="key-length-recommendations" numbered="true" toc="default">
      <name>Key Length Recommendations</name>
      <t>The recommendations in Section 20 of <xref target="RFC7925" format="default"/> are applicable.</t>
    </section>
    <section anchor="rtt-data" numbered="true" toc="default">
      <name>0-RTT Data</name>
      <t>When clients and servers share a PSK, TLS/DTLS 1.3 allows clients to send data
on the first flight ("early data"). This features reduces communication setup
latency but requires application layer protocols to define its use with the
0-RTT data functionality.</t>
      <t>For HTTP this functionality is described in <xref target="RFC8470" format="default"/>. This document
specifies the application profile for CoAP, which follows the design of
<xref target="RFC8470" format="default"/>.</t>
      <t>For a given request, the level of tolerance to replay risk is specific to the
resource it operates upon (and therefore only known to the origin server).  In
general, if processing a request does not have state-changing side effects, the
consequences of replay are not significant. The server can choose whether it
will process early data before the TLS handshake completes.</t>
      <t>It is RECOMMENDED that origin servers allow resources to explicitly configure
whether early data is appropriate in requests.</t>
      <t>This document specifies the Early-Data option, which indicates that the
request has been conveyed in early data and that a client understands the 4.25
(Too Early) status code. The semantic follows <xref target="RFC8470" format="default"/>.</t>
      <figure anchor="early-data-figure">
        <name>Early-Data Option</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
+-----+---+---+---+---+-------------+--------+--------+---------+---+
| No. | C | U | N | R | Name        | Format | Length | Default | E |
+-----+---+---+---+---+-------------+--------+--------+---------+---+
| TBD | x |   |   |   | Early-Data  | empty  | 0      | (none)  | x |
+-----+---+---+---+---+-------------+--------+--------+---------+---+

        C=Critical, U=Unsafe, N=NoCacheKey, R=Repeatable,
        E=Encrypt and Integrity Protect (when using OSCORE)
]]></artwork>
      </figure>
      <t><cref>Note that 4.25 is just the suggested CoAP response code, which has not been
registered yet.</cref></t>
    </section>
    <section anchor="certificate-profile" numbered="true" toc="default">
      <name>Certificate Profile</name>
      <t>This section contains updates and clarifications to the certificate profile
defined in <xref target="RFC7925" format="default"/>.  The content of Table 1 of <xref target="RFC7925" format="default"/> has been
split by certificate "type" in order to clarify exactly what requirements and
recommendations apply to which entity in the PKI hierarchy.</t>
      <section anchor="all-certificates" numbered="true" toc="default">
        <name>All Certificates</name>
        <section anchor="version" numbered="true" toc="default">
          <name>Version</name>
          <t>Certificates MUST be of type X.509 v3.</t>
        </section>
        <section anchor="serial-number" numbered="true" toc="default">
          <name>Serial Number</name>
          <t>CAs SHALL generate non-sequential Certificate serial numbers greater than zero
(0) containing at least 64 bits of output from a CSPRNG (cryptographically
secure pseudo-random number generator).</t>
        </section>
        <section anchor="signature" numbered="true" toc="default">
          <name>Signature</name>
          <t>The signature MUST be ecdsa-with-SHA256 or stronger <xref target="RFC5758" format="default"/>.</t>
        </section>
        <section anchor="issuer" numbered="true" toc="default">
          <name>Issuer</name>
          <t>Contains the DN of the issuing CA.</t>
        </section>
        <section anchor="validity" numbered="true" toc="default">
          <name> Validity</name>
          <t>No maximum validity period is mandated.  Validity values are expressed in
notBefore and notAfter fields, as described in Section 4.1.2.5 of <xref target="RFC5280" format="default"/>.
In particular, values MUST be expressed in Greenwich Mean Time (Zulu) and MUST
include seconds even where the number of seconds is zero.</t>
          <t>Note that the validity period is defined as the period of time from notBefore
through notAfter, inclusive.  This means that a hypothetical certificate with a
notBefore date of 9 June 2021 at 03:42:01 and a notAfter date of 7 September
2021 at 03:42:01 becomes valid at the beginning of the :01 second, and only
becomes invalid at the :02 second, a period that is 90 days plus 1 second.  So
for a 90-day, notAfter must actually be 03:42:00.</t>
          <t>In many cases it is necessary to indicate that a certificate does not expire.
This is likely to be the case for manufacturer-provisioned certificates.
RFC 5280 provides a simple solution to convey the fact that a certificate
has no well-defined expiration date by setting the notAfter to the
GeneralizedTime value of 99991231235959Z.</t>
          <t>Some devices might not have a reliable source of time and for those devices it
is also advisable to use certificates with no expiration date and to let a
device management solution manage the lifetime of all the certificates used by
the device. While this approach does not utilize certificates to its widest extent,
it is a solution that extends the capabilities offered by a raw public key approach.</t>
        </section>
        <section anchor="subjectpublickeyinfo" numbered="true" toc="default">
          <name> subjectPublicKeyInfo</name>
          <t>The SubjectPublicKeyInfo structure indicates the algorithm and any associated
parameters for the ECC public key.  This  profile uses the id-ecPublicKey
algorithm  identifier for ECDSA signature keys, as   defined and specified in
<xref target="RFC5480" format="default"/>.</t>
        </section>
      </section>
      <section anchor="root-ca-certificate" numbered="true" toc="default">
        <name>Root CA Certificate</name>
        <ul spacing="compact">
          <li>basicConstraints MUST be present and MUST be marked critical.  The cA field
MUST be set true.  The pathLenConstraint field SHOULD NOT be present.</li>
          <li>keyUsage MUST be present and MUST be marked critical.  Bit position for
keyCertSign MUST be set.</li>
          <li>extendedKeyUsage MUST NOT be present.</li>
        </ul>
      </section>
      <section anchor="intermediate-ca-certificate" numbered="true" toc="default">
        <name>Intermediate CA Certificate</name>
        <ul spacing="compact">
          <li>basicConstraints MUST be present and MUST be marked critical.  The cA field
MUST be set true.  The pathLenConstraint field MAY be present.</li>
          <li>keyUsage MUST be present and MUST be marked critical.  Bit position for
keyCertSign MUST be set.</li>
          <li>extendedKeyUsage MUST NOT be present.</li>
        </ul>
      </section>
      <section anchor="end-entity-certificate" numbered="true" toc="default">
        <name>End Entity Certificate</name>
        <ul spacing="compact">
          <li>extendedKeyUsage MUST be present and contain at least one of
id-kp-serverAuth or id-kp-clientAuth.</li>
          <li>keyUsage MAY be present and contain one of digitalSignature or
keyAgreement.</li>
          <li>Domain names MUST NOT be encoded in the subject commonName, instead they
MUST be encoded in a subjectAltName of type DNS-ID.  Domain names MUST NOT
contain wildcard (<tt>*</tt>) characters.  subjectAltName MUST NOT contain multiple
names.</li>
        </ul>
        <section anchor="client-certificate-subject" numbered="true" toc="default">
          <name>Client Certificate Subject</name>
          <t>The requirement in Section 4.4.2 of <xref target="RFC7925" format="default"/> to only use EUI-64 for client
certificates is lifted.</t>
          <t>If the EUI-64 format is used to identify the subject of a client certificate,
it MUST be encoded in a subjectAltName of type DNS-ID as a string of the form
<tt>HH-HH-HH-HH-HH-HH-HH-HH</tt> where 'H' is one of the symbols '0'-'9' or 'A'-'F'.</t>
        </section>
      </section>
    </section>
    <section anchor="certificate-revocation-checks" numbered="true" toc="default">
      <name>Certificate Revocation Checks</name>
      <t>The considerations in Section 4.4.3 of <xref target="RFC7925" format="default"/> hold.</t>
      <t>Since the publication of
RFC 7925 the need for firmware update mechanisms has been reinforced and the work
on standardizing a secure and interoperable firmware update mechanism has made
substantial progress, see <xref target="I-D.ietf-suit-architecture" format="default"/>. RFC 7925 recommends to use
a software / firmware update mechanism to provision devices with new trust anchors.</t>
      <t>The use of device management protocols for IoT devices, which often include an onboarding
or bootstrapping mechanism, has also seen considerable uptake in deployed devices and
these protocols, some of which are standardized, allow provision of certificates on a
regular basis. This enables a deployment model where IoT device utilize end-entity
certificates with shorter lifetime making certificate revocation protocols, like OCSP
and CRLs, less relevant.</t>
      <t>Hence, instead of performing certificate revocation checks on the IoT device itself this
specification recommends to delegate this task to the IoT device operator and to take the
necessary action to allow IoT devices to remain operational.</t>
    </section>
    <section anchor="certificate-overhead" numbered="true" toc="default">
      <name>Certificate Overhead</name>
      <t>In a public key-based key exchange, certificates and public keys are a major
contributor to the size of the overall handshake. For example, in a regular TLS
1.3 handshake with minimal ECC certificates and no intermediate CA utilizing
the secp256r1 curve with mutual authentication, around 40% of the entire
handshake payload is consumed by the two exchanged certificates.</t>
      <t>Hence, it is not surprising that there is a strong desire to reduce the size of
certificates and certificate chains. This has lead to various standardization
efforts. Here is a brief summary of what options an implementer has to reduce
the bandwidth requirements of a public key-based key exchange:</t>
      <ul spacing="compact">
        <li>Use elliptic curve cryptography (ECC) instead of RSA-based certificate due to
the smaller certificate size.</li>
        <li>Avoid deep and complex CA hierarchies to reduce the number of intermediate CA
certificates that need to be transmitted.</li>
        <li>Pay attention to the amount of information conveyed inside certificates.</li>
        <li>Use session resumption to reduce the number of times a full handshake is
needed.  Use Connection IDs <xref target="DTLS-CID" format="default"/>, when possible, to enable
long-lasting connections.</li>
        <li>Use the TLS cached info <xref target="RFC7924" format="default"/> extension to avoid sending certificates
with every full handshake.</li>
        <li>Use client certificate URLs <xref target="RFC6066" format="default"/> instead of full certificates for
clients.</li>
        <li>Use certificate compression as defined in
<xref target="I-D.ietf-tls-certificate-compression" format="default"/>.</li>
        <li>Use alternative certificate formats, where possible, such as raw public keys
<xref target="RFC7250" format="default"/> or CBOR-encoded certificates
<xref target="I-D.ietf-cose-cbor-encoded-cert" format="default"/>.</li>
      </ul>
      <t>The use of certificate handles, as introduced in cTLS <xref target="I-D.ietf-tls-ctls" format="default"/>,
is a form of caching or compressing certificates as well.</t>
      <t>Whether to utilize any of the above extensions or a combination of them depends
on the anticipated deployment environment, the availability of code, and the
constraints imposed by already deployed infrastructure (e.g., CA
infrastructure, tool support).</t>
    </section>
    <section anchor="ciphersuites" numbered="true" toc="default">
      <name>Ciphersuites</name>
      <t>Section 4.5.3 of <xref target="DTLS13" format="default"/> flags AES-CCM with 8-octet authentication tags
(CCM_8) as unsuitable for general use with DTLS.  In fact, due to its low
integrity limits (i.e., a high sensitivity to forgeries), endpoints that
negotiate ciphersuites based on such AEAD are susceptible to a trivial DoS.
(See also Section 5.3 and 5.4 of <xref target="I-D.irtf-cfrg-aead-limits" format="default"/> for further
discussion on this topic, as well as references to the analysis supporting
these conclusions.)</t>
      <t>Specifically, <xref target="DTLS13" format="default"/> warns that:</t>
      <ul empty="true">
        <li>
          <t>"TLS_AES_128_CCM_8_SHA256 MUST NOT be used in DTLS without additional
safeguards against forgery. Implementations MUST set usage limits for
AEAD_AES_128_CCM_8 based on an understanding of any additional forgery
protections that are used."</t>
        </li>
      </ul>
      <t>Since all the ciphersuites mandated by <xref target="RFC7925" format="default"/> and <xref target="CoAP" format="default"/> are based on
CCM_8, there is no stand-by ciphersuite to use for applications that want to
avoid the security and availability risks associated with CCM_8 while retaining
interoperability with the rest of the ecosystem.</t>
      <t>In order to ameliorate the situation, this document RECOMMENDS that
implementations support the following two ciphersuites:</t>
      <ul spacing="compact">
        <li>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</li>
        <li>TLS_ECDHE_ECDSA_WITH_AES_128_CCM</li>
      </ul>
      <t>and offer them as their first choice.  These ciphersuites provide
confidentiality and integrity limits that are considered acceptable in the most
general settings.  For the details on the exact bounds of both ciphersuites see
Section 4.5.3 of <xref target="DTLS13" format="default"/>.  Note that the GCM-based ciphersuite offers
superior interoperability with cloud services at the cost of a slight increase
in the wire and peak RAM footprints.</t>
      <t>When the GCM-based ciphersuite is used with TLS 1.2, the recommendations in
Section 6.2.1 of <xref target="RFC7525bis" format="default"/> related to deterministic nonce generation
apply.  In addition, the integrity limits on key usage detailed in Section 4.4
of <xref target="RFC7525bis" format="default"/> also apply.</t>
    </section>
    <section anchor="open-issues" numbered="true" toc="default">
      <name>Open Issues</name>
      <t>A list of open issues can be found at https://github.com/thomas-fossati/draft-tls13-iot/issues</t>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>This entire document is about security.</t>
    </section>
    <section anchor="acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>We would like to thank Ben Kaduk and John Mattsson.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>IANA is asked to add the Option defined in <xref target="early-data-option" format="default"/> to the CoAP
Option Numbers registry.</t>
      <figure anchor="early-data-option">
        <name>Early-Data Option</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
+--------+------------+-----------+
| Number | Name       | Reference |
+--------+------------+-----------+
| TBD    | Early-Data | RFCThis   |
+--------+------------+-----------+
]]></artwork>
      </figure>
      <t>IANA is asked to add the Response Code defined in <xref target="too-early-code" format="default"/> to the
CoAP Response Code registry.</t>
      <figure anchor="too-early-code">
        <name>Too Early Response Code</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
+--------+-------------+-----------+
| Code   | Description | Reference |
+--------+-------------+-----------+
| 4.25   | Too Early   | RFCThis   |
+--------+-------------+-----------+
]]></artwork>
      </figure>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="DTLS13">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla">
              <organization>RTFM, Inc.</organization>
            </author>
            <author fullname="Hannes Tschofenig">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Nagendra Modadugu">
              <organization>Google, Inc.</organization>
            </author>
            <date day="30" month="April" year="2021"/>
            <abstract>
              <t>   This document specifies Version 1.3 of the Datagram Transport Layer
   Security (DTLS) protocol.  DTLS 1.3 allows client/server applications
   to communicate over the Internet in a way that is designed to prevent
   eavesdropping, tampering, and message forgery.

   The DTLS 1.3 protocol is intentionally based on the Transport Layer
   Security (TLS) 1.3 protocol and provides equivalent security
   guarantees with the exception of order protection/non-replayability.
   Datagram semantics of the underlying transport are preserved by the
   DTLS protocol.

   This document obsoletes RFC 6347.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-dtls13-43"/>
        </reference>
        <reference anchor="RFC7525bis">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Yaron Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Peter Saint-Andre">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Thomas Fossati">
              <organization>arm</organization>
            </author>
            <date day="3" month="February" year="2022"/>
            <abstract>
              <t>   Transport Layer Security (TLS) and Datagram Transport Layer Security
   (DTLS) are widely used to protect data exchanged over application
   protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the
   years, the industry has witnessed several serious attacks on TLS and
   DTLS, including attacks on the most commonly used cipher suites and
   their modes of operation.  This document provides recommendations for
   improving the security of deployed services that use TLS and DTLS.
   The recommendations are applicable to the majority of use cases.

   This document was published as RFC 7525 when the industry was in the
   midst of its transition to TLS 1.2.  Years later this transition is
   largely complete and TLS 1.3 is widely available.  Given the new
   environment, updated guidance is needed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-rfc7525bis-05"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC7925">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig">
              <organization/>
            </author>
            <author fullname="T. Fossati" initials="T." surname="Fossati">
              <organization/>
            </author>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery.  The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8449">
          <front>
            <title>Record Size Limit Extension for TLS</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>An extension to Transport Layer Security (TLS) is defined that allows endpoints to negotiate the maximum size of protected records that each will send the other.</t>
              <t>This replaces the maximum fragment length extension defined in RFC 6066.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8449"/>
          <seriesInfo name="DOI" value="10.17487/RFC8449"/>
        </reference>
        <reference anchor="RFC8470">
          <front>
            <title>Using Early Data in HTTP</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson">
              <organization/>
            </author>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <author fullname="W. Tarreau" initials="W." surname="Tarreau">
              <organization/>
            </author>
            <date month="September" year="2018"/>
            <abstract>
              <t>Using TLS early data creates an exposure to the possibility of a replay attack.  This document defines mechanisms that allow clients to communicate with servers about HTTP requests that are sent in early data.  Techniques are described that use these mechanisms to mitigate the risk of replay.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8470"/>
          <seriesInfo name="DOI" value="10.17487/RFC8470"/>
        </reference>
        <reference anchor="RFC5758">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Additional Algorithms and Identifiers for DSA and ECDSA</title>
            <author fullname="Q. Dang" initials="Q." surname="Dang">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="K. Moriarty" initials="K." surname="Moriarty">
              <organization/>
            </author>
            <author fullname="D. Brown" initials="D." surname="Brown">
              <organization/>
            </author>
            <author fullname="T. Polk" initials="T." surname="Polk">
              <organization/>
            </author>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document updates RFC 3279 to specify algorithm identifiers and ASN.1 encoding rules for the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures when using SHA-224, SHA-256, SHA-384, or SHA-512 as the hashing algorithm.  This specification applies to the Internet X.509 Public Key infrastructure (PKI) when digital signatures are used to sign certificates and certificate revocation lists (CRLs).  This document also identifies all four SHA2 hash algorithms for use in the Internet X.509 PKI.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5758"/>
          <seriesInfo name="DOI" value="10.17487/RFC5758"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5480">
          <front>
            <title>Elliptic Curve Cryptography Subject Public Key Information</title>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <author fullname="D. Brown" initials="D." surname="Brown">
              <organization/>
            </author>
            <author fullname="K. Yiu" initials="K." surname="Yiu">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="T. Polk" initials="T." surname="Polk">
              <organization/>
            </author>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the syntax and semantics for the Subject Public Key Information field in certificates that support Elliptic Curve Cryptography.  This document updates Sections 2.3.5 and 5, and the ASN.1 module of "Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile", RFC 3279.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5480"/>
          <seriesInfo name="DOI" value="10.17487/RFC5480"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="DTLS-CID">
          <front>
            <title>Connection Identifiers for DTLS 1.2</title>
            <author fullname="Eric Rescorla">
              <organization>RTFM, Inc.</organization>
            </author>
            <author fullname="Hannes Tschofenig">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Thomas Fossati">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Achim Kraus">
              <organization>Bosch.IO GmbH</organization>
            </author>
            <date day="22" month="June" year="2021"/>
            <abstract>
              <t>   This document specifies the Connection ID (CID) construct for the
   Datagram Transport Layer Security (DTLS) protocol version 1.2.

   A CID is an identifier carried in the record layer header that gives
   the recipient additional information for selecting the appropriate
   security association.  In "classical" DTLS, selecting a security
   association of an incoming DTLS record is accomplished with the help
   of the 5-tuple.  If the source IP address and/or source port changes
   during the lifetime of an ongoing DTLS session then the receiver will
   be unable to locate the correct security context.

   The new ciphertext record format with CID also provides content type
   encryption and record-layer padding.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-dtls-connection-id-13"/>
        </reference>
        <reference anchor="CoAP">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="I-D.ietf-tls-ctls">
          <front>
            <title>Compact TLS 1.3</title>
            <author fullname="Eric Rescorla">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Richard Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Hannes Tschofenig">
              <organization>Arm Limited</organization>
            </author>
            <date day="25" month="October" year="2021"/>
            <abstract>
              <t>   This document specifies a "compact" version of TLS 1.3.  It is
   isomorphic to TLS 1.3 but saves space by trimming obsolete material,
   tighter encoding, a template-based specialization technique, and
   alternative cryptographic techniques. cTLS is not directly
   interoperable with TLS 1.3, but it should eventually be possible for
   a cTLS/TLS 1.3 server to exist and successfully interoperate.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ctls-04"/>
        </reference>
        <reference anchor="I-D.ietf-tls-esni">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="Eric Rescorla">
              <organization>RTFM, Inc.</organization>
            </author>
            <author fullname="Kazuho Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Nick Sullivan">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="13" month="February" year="2022"/>
            <abstract>
              <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-14"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu">
              <organization/>
            </author>
            <author fullname="L. Zhu" initials="L." surname="Zhu">
              <organization/>
            </author>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann">
              <organization/>
            </author>
            <author fullname="A. Mankin" initials="A." surname="Mankin">
              <organization/>
            </author>
            <author fullname="D. Wessels" initials="D." surname="Wessels">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS.  Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626.  In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group.  It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC8094">
          <front>
            <title>DNS over Datagram Transport Layer Security (DTLS)</title>
            <author fullname="T. Reddy" initials="T." surname="Reddy">
              <organization/>
            </author>
            <author fullname="D. Wing" initials="D." surname="Wing">
              <organization/>
            </author>
            <author fullname="P. Patil" initials="P." surname="Patil">
              <organization/>
            </author>
            <date month="February" year="2017"/>
            <abstract>
              <t>DNS queries and responses are visible to network elements on the path between the DNS client and its server.  These queries and responses can contain privacy-sensitive information, which is valuable to protect.</t>
              <t>This document proposes the use of Datagram Transport Layer Security (DTLS) for DNS, to protect against passive listeners and certain active attacks.  As latency is critical for DNS, this proposal also discusses mechanisms to reduce DTLS round trips and reduce the DTLS handshake size.  The proposed mechanism runs over port 853.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8094"/>
          <seriesInfo name="DOI" value="10.17487/RFC8094"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-hpke">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="Richard L. Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Karthik Bhargavan">
              <organization>Inria</organization>
            </author>
            <author fullname="Benjamin Lipp">
              <organization>Inria</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="2" month="September" year="2021"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.

 This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-hpke-12"/>
        </reference>
        <reference anchor="I-D.ietf-suit-architecture">
          <front>
            <title>A Firmware Update Architecture for Internet of Things</title>
            <author fullname="Brendan Moran">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Hannes Tschofenig">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="David Brown">
              <organization>Linaro</organization>
            </author>
            <author fullname="Milosch Meriac">
              <organization>Consultant</organization>
            </author>
            <date day="27" month="January" year="2021"/>
            <abstract>
              <t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality.

 In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-suit-architecture-16"/>
        </reference>
        <reference anchor="RFC7924">
          <front>
            <title>Transport Layer Security (TLS) Cached Information Extension</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="July" year="2016"/>
            <abstract>
              <t>Transport Layer Security (TLS) handshakes often include fairly static information, such as the server certificate and a list of trusted certification authorities (CAs).  This information can be of considerable size, particularly if the server certificate is bundled with a complete certificate chain (i.e., the certificates of intermediate CAs up to the root CA).</t>
              <t>This document defines an extension that allows a TLS client to inform a server of cached information, thereby enabling the server to omit already available information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7924"/>
          <seriesInfo name="DOI" value="10.17487/RFC7924"/>
        </reference>
        <reference anchor="RFC6066">
          <front>
            <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd">
              <organization/>
            </author>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document provides specifications for existing TLS extensions.  It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2".  The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6066"/>
          <seriesInfo name="DOI" value="10.17487/RFC6066"/>
        </reference>
        <reference anchor="I-D.ietf-tls-certificate-compression">
          <front>
            <title>TLS Certificate Compression</title>
            <author fullname="Alessandro Ghedini">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <author fullname="Victor Vasiliev">
              <organization>Google</organization>
            </author>
            <date day="6" month="January" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.

 This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-certificate-compression-10"/>
        </reference>
        <reference anchor="RFC7250">
          <front>
            <title>Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="P. Wouters" initials="P." role="editor" surname="Wouters">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig">
              <organization/>
            </author>
            <author fullname="J. Gilmore" initials="J." surname="Gilmore">
              <organization/>
            </author>
            <author fullname="S. Weiler" initials="S." surname="Weiler">
              <organization/>
            </author>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen">
              <organization/>
            </author>
            <date month="June" year="2014"/>
            <abstract>
              <t>This document specifies a new certificate type and two TLS extensions for exchanging raw public keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS).  The new certificate type allows raw public keys to be used for authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7250"/>
          <seriesInfo name="DOI" value="10.17487/RFC7250"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="10" month="January" year="2022"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50%.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 COSE headers, a C509 TLS certificate type, and a C509
   file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-03"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-aead-limits">
          <front>
            <title>Usage Limits on AEAD Algorithms</title>
            <author fullname="Felix Günther">
              <organization>ETH Zurich</organization>
            </author>
            <author fullname="Martin Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="12" month="July" year="2021"/>
            <abstract>
              <t>   An Authenticated Encryption with Associated Data (AEAD) algorithm
   provides confidentiality and integrity.  Excessive use of the same
   key can give an attacker advantages in breaking these properties.
   This document provides simple guidance for users of common AEAD
   functions about how to limit the use of keys in order to bound the
   advantage given to an attacker.  It considers limits in both single-
   and multi-key settings.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-aead-limits-03"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAA1HJmIAA81c63bbxrX+j6eYY6+zLDUCLclSYmk1PWUoOVJtyzqi3Nsf
BwSG5FQgBsUAktk4fZY+S5+s3957BhdSdtK1+qNedkKBwMyeff32BYrjOKpN
netTdftm+vwM/1EHoxfqurJzk2un5rZS9VKry6LWVaFrZefqdmmKhYuS2azS
9xsPXtrb9uEos2mRrLB2ViXzOja6nsdNncR17g5exMbWcSm3xvtHUZrUemGr
9alydRY1ZYaf3an65uTwOEpt4XThGvxcV42OIlNW/NHVh/v7J/uHUVLp5FRN
ddpUpl5HD7a6W1S2KU/V+9txdKfXuJKdtseIz4iiKHJ1UmQfktwWoHINkktz
GilVzVOduXqd+6tK1TbtfTRFpos6XHC2qis9d+3P69Xgx7oyaXtzalcrPNt+
a4rcFN02+mMd58bVMRaZ2Ry32fhXX8lzZdIt45rZxpUej+ZJ7sCkpKmXtsJ5
YnxNO+Gri5G6denSznVhFnxZJHSRFAXEvfGdrRZJYf6W1MYWp+rJuFqpN2Zl
ap094e/1KjF5eHjUPfzbxerjCGyOBnvfjtQr6xxW6218u7SrxA2++IW7ypMj
/+Rvk2o1AkuiqLDVChfuNUmSFPPgBQQfn41Y/6B7ccYKiG9vXk2+OT48nhnX
u4M0FArgv4CuFfPNFePJ5dkja8aQQaFTojs2Ge6d2PH1Ke9yeHwYRXEcq2QG
fYDYoghm5BRMpCF9UPiciJALPA4lo8dY+xVUVGV6blhAfWMre1YabVsoHro3
KQSj1GWtoBNWebPq1n4w9VJVepFUmaNNydb/ODreP4lSXdVmbsgsw0YjOcLK
ZFkO/XpK5lTZrOETbx4oUJyEp4mwlvQffxTJ/PQTHw+fI7n8PyDt5dHR1/ii
XiZ0mrmuHJtNUxA1xB3n7RwfKj4i+yn4nigpy9zf5XhlkATX4GyRzPK1Mqsy
10QefgJBhVolxZpNB0IBuVnLs8h7MeJIpWdrtdIJlmSaknsoIK+AJ+dm0VRC
li27fXFoOAqbR7BomKVcr7RqapObv2EjMHumXQ1LLks4EPGy8J66uDeVLYhI
8PuVnKsTdeMg2r4aHCocKXFMi2vy2vOQpPvTTyM1EEpU6bhx2vFmQ5aWSU36
48UGvhWDhfhMq+QOz4KcOIPpmSJypU5JR8Bi8WuZ5zyJ4x5yo5VJrjsPxEUF
49Cw1mq9i6MFVVjC/GdaF1gkzrQzC9qetnMaSyQ5zg6Z2MZBfoG6DaYWtg6S
J6l4PS70Q0sEGUXgGUS+spX2vEnBvSJuSjaQyJGG4EjMox7nYEOvmop0gR7d
E72xTU3mlKnUlPjGNYZsa5ncaz5QZOG06Ot5ZVdM0cB6A/OYZeDH06fwF8U9
NmuV6BbbmcLmdrEm89IKgUxRJHPqydv309sne/J/dfWOP9+c///7y5vzM/o8
vRi/edN+iPwd04t379+cdZ+6Jyfv3r49vzqTh3FVDS5FT96O/4RviKon765v
L99djd88IS0ZsImlwZqNr6BPEB0xIAEW0C6tzEw067vJ9T//cXDkNezw4OAE
GuZt/+CbI/wAfSlkN1tA7vIjWLgmOeukolWSPFdpUpoaksO9TrmlfSgUaRrY
Cfc0qTTFaQMdul2XiJJwkipJUzAwKVItzo/ksqm+G8q/511zbhLYUOdD2HCY
/+01EvGH8fn0w8Hhyw+TydsPLz+A/4fHX4/IB3uet3eTDXyYXIzx93D/w/W7
N386eLF/HJ6I4IN07JbgacaSn8HMwUyEdTqVN1zjmNWLijURH0X5yT4H+hYN
9I1Z21oetljZgt0S8wQugq2m0q5ZlV4/xx0P1AYPvA8jz7RBnZCMD71wwrod
VcmDKpsZbJbO5oSPwRlmZkFiVeQNkroBHUKYTjOXfID7L8Gg6uADmMO8HUef
pW2wbu1tSH9Ml0mx0OG4fj21c3U5vY2uY/y0yyzyEgvPbz/7x8Pj44MTZk+Z
E8+vp69jOXXL/TQ3pBrwiRSvdLWpM0TV3Oa5fQAHewHjNIp+paayNdb7vfgy
t4erE2vvjKZPU1nyCmgK8TgLjN+ZXl3u0vekQ1PRodd6zVemr+mjOg8HeWth
nWxt+HbcRdD4TbLG0tc+lKkrAHRYk6w/fnN9xW4cxGOvziWTRmbGpY1zYu0b
HgJcpQP/BeC9VceIAkbLENYj3Caxjm6mzXo7pElBLmZum8JHqg7JIehJ2Nxg
v/MxhbjlhnttqiJufA5ENVBZomLRGHEcRC0iANwFEpa4tnEny15k6ru8aCq4
UJ0gYCMYDYAOq8Ms6IDOKBio86rCLoDWWU5a0YbLNkIJG8c5qGzRhpo1ok5g
jK7yNZ0OQs5zTXImn1lEegWSMopatqB8A1ZOzgLQohB9yPYYm7PbBdqBV21y
isgMRAQfQZzsk5WpI12kkENNXMU9msl2pm4krinSjzRP4FBSGDS8d2WTdAnZ
inIkxKa72pZRD/gogQt8EEiMNAqPwRNpBnR2Dh5T0Fe9oM/W2BQEY3D2LGrB
7wUIRMQ2jLEpepPwYVHkK0iQRMG9zm2JjeA8ATAyiuwStR+WJl1Gcqg0cYxn
PQtICSlwkPXRvSy1qfecN63n3AA6jcmRCbcukynYdrcKgFOQIkmwdSlR2kY0
pwAecXDjlp6R4H1SQdWr1kMRRf/8xwSMq2SHjpbM4ijEQUYrfWLS7nZS1B6g
VtD3BFl3ModRcMBlcA6yQG0AaQFxOQ+5Rn2HImiNEfWcBIF9Slw1JD+uNFTA
2ASaSOPLZJ3bJAuYG7drQ4+2FFJgqUhBIBOWqybC2NWSTmbEOktPPBhHvPjD
I7kO+JQhiNxBKWqn8/meuk8qPgdlBAirxiO6iAMlc0PAO87dpKKjDpGTjkuf
A++RAXj6R0pAZ9ZlP0QzwLyLSHmWOoHFZbqE3jLJBS9UA7HQohRyOM3gHJTc
v1ge54qV0PIo87FIFPwCpJBlhh6HL1gzkiIceUebTaSOwFTupPjvLrzT/w2S
2xT/gZ8iBa7Bq2JTSQacjBLwTpdqLnh5qMowrNjOoc1gx11hH3KdLQgt1w/E
3sfSEvhg7TqGR3RPsiKPQzuLSjLgbJWHMBJUgLwMbNncm6yB52np26PHKcJA
lutWR1St02Vh/tpQ7kdmc62rOXy2Qih5gMZQbQnWvu5MKCFn7YKTImKuX03F
DTEy7ecECGRBV3qmxi4pKnxUZTMWNYAK52v2J6+1LuNxbqCAHGl9YOUwW6gQ
VA72u5ji8zWqJ7TOkZe6NSsN9jtZaAh5B4sd/MxigBkil7TJkyoahvde1kBy
Yeuk5Q3D8Bo0IDNM8oYZdkLQy0IuzDYgH3gDD9hnSXpH/kUhM8M6hWWDIRYW
6uv98JyI6gaiha++ahDZKvW9LrQk5F9k2eGXTymCBDlk0Zqd8inr3oTRxIWG
9FssIxhMrq0ow11oTiI6b8u+lgIupc2LVf0BKv7xA7GDbYmP3SamEkgeg3W+
yDKE8oJEPEbZQL/eOL8EEjvAOVJ/4LhbVuY+SdfQkb82puLVXPgBSivu47xI
qzVHZOGI4uN3i205Ee0KAy6Tr/JwDOyNy4Tspa4hbom/GTJGynrFXHyhgfCI
eAfZCzyoKzZePOGrbvgIzl3ZmqqKkM29NRmUJrmj286upioHZm5KJ4G9gMsh
BwjgU3qVSPLaLjQ7A++7Wv/pywwa0Re+GsacN+yrz+wFnZOh3MsjXyY5u765
/P25v/7Ny+OXnNzyTfsnR4RPp607eJyLPajr2e6Cj7lYzyqc61rgKmB85Jdg
eV5cvz7v3HcFzqfzahEvyzvtiUvaOKC6w/lNouCyWzgZopmAZ97HItMsgYoU
AaYQkTik+xom8CiJrPPRIcgBMTibiqfzqTcDO1E27IkF67WY9Nvko1k1K/Wq
ShbsV94AweKRXgoi1v0LblQ7b1+92e3xtM174YzhokmoiFJs3TeaqgNqShGd
i85q52Y6eLhF7idUXrscmBsZfZuJdgWGLYt9JP/DLr1NutQzIrkbUm4OZlyO
xf2mUjfjtyonEmXrkVQ8SEJqvEC8rdePeXo3cIInW06Q9HwjcFCu6Ll6M1zr
Zzc43A5Mj2ywH9/c3qozhHKANMY2j2RsXAeBfgEM7w0LaT4Qh4dwfqepZE7r
eTAF9OQQc3OzWEKiTwgor/mGJ7u+DDjXvs4gMGO74lw3ZZSD+wV0lbKs1jD7
CDnnhLkzLPZnVLIkeMkmHGpOkRya8cscmZfYpGH9p+z14vb2WlRn8C0n1/1S
WlDHb/a3q71e6Xxk6NMZSvKEQqhJsSeJjs9A5X6pxUJ+0WAPIS9RC2AScU9I
RCQk5JRHccixyErZAhi3lWCLqoy7Uz1L8Ag8AgttU6Ws5OJSyNmVZLY+vPpk
gQuBhBmLAN5tZRaUSrGG7FKbA7GVo38OJz2nU1K9mcsJgdLNzAfWo2N2cnSb
MxmnEVBf8WrSesSTBekEjuZP46vOXKBiu6YSMRmDr/BQcpgurSWJLyWmIFV+
MHkeqFKdEsIZ8Ql9ibiXlLAvQUAk677ksDfAV9wg6TPBiTGowFTWQMAqCN4A
Urb9Ch0FqnpUCP6BG67IR5NyeZ650WZzZ6hZ57RGTPbrWyBBnYLH8jmciFvE
0PrglGrea1HmHjEie0r8QsznkgY3bGXXo9HhcbRza63sv8uybMhwMx1kAWgE
mNqq9YYi//3vf4++iunPV4/86/589fkPcnf0SV3ZkfqkJvj3Hv+u8O+G/k+4
xf/5RKkEcjh88N70kzrT84R6Np/Uufr0H6Pl9rszrPgR/1TvX09K+EmvSngT
fNgP1O0UQKG7Sp78D9EShcNPvp1UhqrCsMz3374vXDJHInb17ZWdIE/TVJlU
N9/eIPtJuDe31z55/q0HOKwSl1zqJkdIVUlCfTucDUup8N108u7mfJcF++Op
esr6FJM+xaL2iocdvn3S48U71tgnP0XRr5HgzX9DAFI0jxSMjIIqlT53WwAK
MViDzwzVC80aF1Se9JocAzeAKr0wuJ+y9LWuR79+zjtwoO51V32nMWB7Hzp9
suDani0jMCRcLYxoixiPtGqjz/Tx4CS5IEelP0Fnt5ztbOd8wUARRRB4KIvv
b/OEyhPc/wFcEuAutFF9PEnrUDwcpBBc9t8AC5yF0+PCPsr+KMpJ2L5+famW
Bv68SpdraZGN4UF7zHN08WkojUdR/6u2rkoRiaop3NhW9y9G8hCSIso0JW3E
o2OnuFemJIbU5OGLWLw/56R9oTl5uOCHnVpUUFziA3y3+puubLSzvxtkyAGo
plwEivT1kZoRGCBg3NRlKDQmajK9vrn6Xu0MUDaVayJud0O0TjeZjSvJdmXn
QKutdsOpQstEwFnbQWm5wT2UmHBILI0mbkzUlQXOr7wOHH9DWYtf8dK5hhkU
NJJEc3YVckuDr+mEk7Hc/89//B5QJWP8eYV82AP0e39RIcYby3Vcn7hmUMrw
iNQGJN1C3PJlPsoAbf2dREmyA/w0nhO/EYPyTLp/A1gUAOjR6GB0ODrutPv4
8CU7/0ENYy9s2/Kot7X6voIZPJB2vtWQLtVR1M6fm7yRFhE9E0lKqNt6BuW4
vSq2FxaoCDfg+KQmPmNt4+NjbAqmnAjn/RfEfaJEstnAHSQxlW0Wy5ZDPlt1
QGts+8T23iSDWq5Lqn+xax5YuBSyenwnUUnR5ncNAO3h/uEBafX+i9Ojw9P9
A8kuO8mE27+BLJDgso1tPTMjbwC+86mVZ8EMXrNgo/EaRncK37qWcBQeNcXg
4dP9w+7ewCs+K05+sg+y1sg5wRAV1gRbpjaSTsDJPqIFQlF7ihX5fvizhgyR
NMOTvj/iZrKMj3BfQPoL7YTDRsImQKbH3haGQtUM1XxYNPibmzstHnHmSx40
3OE7Ts2caKl0RZNz94Z8HjVyek5vFNFsD2m54lsybllw0wjaafOm9uNFgrsk
O6Ly7zaNkcQy9aDzPO4mL0Bu2w7QFBeQG9WhUdcyzqN7KcbxxAvbTVf6w5+D
wxf4e3xyfPJnsHMKcYbxG7XiTK2F6QTfkVPP+AycLQT1J32QIUXC2uFxYG1C
szTylGTgUxgLoQxs0NZjLS/s1rEYflLNETzxrSTif7KQjL1lpFyT7MfMNZNE
XRNEqY3I7KTl5esMsiQV3GTGKGBvKlq3quFnhYarkF7VRHhGMJpLBvVeZPwE
WSdhEid/6+FympTJjMoCRreNG5JestH+bOkI3tw1s7/Am0rFCUDtsphb3/Z9
5BuKJA3r6AD9g6P5AqlKvVyJo4DddOWgCK4YSJl7iGHi9Hwy6VEVfFebubZj
TCaLddqSEHXb4BuK23PqiNGi55Oz6bgXD6nVy4FDdR6W6g0+teGo42PGkcQM
wh83FoKZjPtYgLr0s8SZdBLmyOouklAcCW3vcG2VVHdkth4RB0w2lmgG5Btu
hGXxwKu/g2qlSB26beQB1Y3y9HYcEVk443uqRv+b5HwHdSqt40IhDxcqWomO
TOiiTx7vImqms9eD3bbIefpU5m9XOuME87+Mi2/Hf/pvZ985tj0XhLzBucfX
2KDYw9EOi1J7w85pCjmL78pYagjjhhoflb8myTdd2+DIgFuD5WXVMMPT4lEV
GDEGWNarwOMzrvDzxIEbnJx7uGGChJIvdjZcl7MFJdYEbZBdJZkMhnUC7z2Z
hOfGec3JeMgFzq6m8eUZhPXo/jJPzad5MHmWUgNw54df/bBL0xQ0vgtPNVKb
a7fUh2dXyO0NAm8k087OA2pf6u+nE96VhoJqmzQNsezRaLtrhXjAlTEKbefv
L2PkF9zG5z2GMyyMLuY1D5hcCrTqnlgJROIgRTFGnOd6wHuKbKEc01uZw8+/
z3zyvQmPx3dQjwiJfri4iB/7+4NH1M8unvEYSNF23f20vHq2/yx+dvKM1PfZ
GB9fPRttZts3+t76KuhkqdM7X8SmOh/OXG3XsIntL7bTY5sTG7tOjsSq0HWL
2glrmUTVglKoi//AY8Cc1AOKU+nRuJXrj8HyxHnq41Fo1VMpm6tf0EXppSfK
J4Y850yeleunPEzxuX14m1WS6QiioeU4sUVQXVC+s4cV9aBxR/3rmNJvQ8UW
bEYlhPZsbTLvPLii3r+d17z18y9QwTMLHsC2oE2wmH6QFztwqnRpK+dHzHz7
axuKdcV2PwMe1gsVGZkWCgkadx1nlphYLCI8MUNAp0BQlsTTlsQ95hQjSOfL
lKIfxN6mrHlkhGgvc7vu5sa5xgGROd0RBq5aUX4hiDjSSZIailK07TiCWweG
Sx0hKiZRrspB0vlSv6axdj+URIQwR1awv9ybSm9kK6BJiCuWMku0DYXdkmYN
qw7MrqR/2k9dqs6CemekvEW9m0yvI1LHyc0bukZ1biB3fZ+wtw+jWN5t45hQ
WDL5L2yRspGGqZjeeWRgh7HzxmzrUC3BDL2QLIzaxom7C3Wz3mLSeaAcUIA/
y5cSmC6hS9KQOom4eqombQ6OI21XFEhg0/W8841QmUPuoVs/MNqfLt3bmpgd
jihyL2yV/IXmFBFtKjNriHx/sv5EkuUp+t4ADL2GQ0NiCeWEe+Kog3KFFzG6
FgSrBQRkVnAUBMq36CqseJ8ermsHfjjZ6eZr4a7uw5INJdUb88IwhYqHOo/2
/7edqMK3FSWjgSI/WEUhgN95WEkiw0NTD7Y3gTXMi6PBICA3b5qqrIwfMpX6
QehiSz2Me2CVfnzcK9piRF+DQQPU3JspuZKcgYrtzZcFDyDdbD2HIdQ8rxiI
mFVGz0HlakX6x/6DGj7tWyZdCxkWy8NZgykpGrJCmshDb70qLAfxL+oezx2/
hwtD4m9KaqCI3HqVybXagS7s9k35Zjr2aw3qHA2xj15tI86taBS1GtxA3BzR
3DHPa2Ralx5M0tk+kjKFCvBgDmyjrLahgITfhtO7YBxH4a1ZMdr7mjp6NDga
LHw4ZNa+AWYH7SpuFg51TNj2yDzn5+gmH0uinjd9C6WxMOXHTQAzac1J+2qZ
ujxz/v0peg+NXk/gFggyDp6k3OOeHwcGLJJDjeMcYJ9dbLtIS2voOabUhsn4
qGFy5eSQJlq6oYQ6DNU4P6nYPzu2kgl9eJv1xnHCXtvIUb1HnPD7fb3/NQ1D
9zSKVxnIUZIp3+lvl+2bXW8wMXG9t5nw2NZUY/dc3HuOMn1ZOMnplSh+82+w
iWiDDGJSXb5lvGsovLvNgXLZW14D3McRqen+3bubOEDlDT726UytA3EzW4Wb
mWouRvRQUZ844nqupbJh/Pt5AsdptvMzo517XC7jg/F6UAYG5b1x4A150/JU
GBzxyIZMUNoWY/DbUeK+kxkCUH8sngutWHZmiv6M2sqPwLows8GtW1PyuFAP
3fTGxGXqwL+NxxMvTDx34zx0jtJeNYHmvp2veuUVlGzd4TcofpV0tasdPVqM
9siTDL8g47J5mOLclRDfm/SMoi5tOA5pQ/uq4zxPFk6Nz2G4k7diLy9ji2yy
3nxvpsaN0Q6/QLRLrG4KWj8Jg9J+yqGbKDnjUWuazKRi7p53u1wpBFaJTNs2
5Ykhp3bMSI+oQr40C3oBpqBqxT3dQCPwtlpoxB63u0dosbTMPfKh3bDqcL61
fc2HLWB8Pj4TlNs4np301VcaHscmoPvMTkfRzlRrQdiBZ8QxEtzx6Eg4tzHH
lkBmsZyAuGm7Qb3ekKf1b5zUtvRj6qSnbJaaqp6FB2yiY0m+dtR1bd9g8ugd
esNtE3KVu5BqAJg8Pt0TKfIb30xB1PyNevK5978GpY3w8gOPMJH86H2DbjIP
61B/fNHwpHqyICRRe6mst2fO5A0n6FDDlRkvYXKVv2FRDOnpZAUA0c1U+Byc
67LdiKDfEwuV0m6XtnMYyKdzjJ6ELLgtevc1I/T4yOjkNZ3ufdIff6Q+up8J
C2RFTGVvpLCwgpViakF3S4dyPjdu+q8YMHUP9HYHcIcELA9C5Z1hLj/3fQZN
Jrmt4URh1gPX5yvt27hRL82Wh3vvELq6haxw22uEsZV0idoWOb1VY2zlZ/i6
t2T21GeGqKdidWZD4v3X2doXxxj89nnPMI708XxydnH+gevfH/5weXvRKsT3
OKOo58/dCW5EnNhx50D8tfQjTeWn65Ctc0uDiqxuQwt8Kyri+SP/BkuQxZZv
atUr5NxUCUnJkbD/8/XAlXV1mPYKLSiqyb3y/YOMZJa3iSNPJSDZbygrhJhm
FnIbzuhr/SXnjaWHnVowL+DdnlbK++oRT5YaqqI+qjBpbpuse3vdrwit8TU2
J5OKMCt6eV1H/swPxld7Sp3c8QDo3NoaOQyjIZmd/DxpobrHFPiXx/e87m5O
cLac+Hp0OPLDIf137CirZ1vpTWwbR6lCYckXLLohfJ7wkNgUPIvsuiV4bEdp
iLgxkd9mN/8o2iZF2ny8C4Xjd0ARMrPg6K1M+m0aPGxBlw1fHr4/COYv67p0
p8+fL8CZZka/RuJ5zb9dIp7Lb5d4Lr/BpP3FJc+NX/9p+ztHCKH3Koh+mkeS
1+GveZiRtw/uiEkep+27MJyjQZRU9KPX7riswtEqKe7UdzjD6yRr7lgLfmeX
hXqLxAWui98gV5fjq/EWIXyRNnZ3IjCIgQUgo0/DV/57I1OSaEqJmd98gLOO
/DNXfu5FJpyq9WCabnNQrP8Dz8pJ+jMYj/ukbkJ0bqfPfm4dmnPbHG37RNVJ
aRX+wnUeGRazPmn7wrDYZ5l6E6bCJsChQ94COsayC2HUlrERT5MNn/tFfN1i
CD+qeK6QZmHkFL+Es1sr8ewbrdTOV4qMfpa3n2Hu8OiBs93ig9MTf/E0vwMU
/Qu0f8e5o0gAAA==

-->

</rfc>
