<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<?rfc compact="yes"?>
<?rfc iprnotified="no"?>
<?rfc strict="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-t2trg-security-setup-iot-devices-03" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.1 -->
  <front>
    <title abbrev="IoT initial security setup">Terminology and processes for initial security setup of IoT devices</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-t2trg-security-setup-iot-devices-03"/>
    <author initials="M." surname="Sethi" fullname="Mohit Sethi">
      <organization>Aalto University</organization>
      <address>
        <postal>
          <city>Espoo</city>
          <region/>
          <code>02150</code>
          <country>Finland</country>
        </postal>
        <email>mohit@iki.fi</email>
      </address>
    </author>
    <author initials="B." surname="Sarikaya" fullname="Behcet Sarikaya">
      <organization/>
      <address>
        <postal>
          <city/>
          <region/>
          <code/>
          <country/>
        </postal>
        <email>sarikaya@ieee.org</email>
      </address>
    </author>
    <author initials="D." surname="Garcia-Carrillo" fullname="Dan Garcia-Carrillo">
      <organization>University of Oviedo</organization>
      <address>
        <postal>
          <city>Oviedo</city>
          <code>33207</code>
          <country>Spain</country>
        </postal>
        <email>garciadan@uniovi.es</email>
      </address>
    </author>
    <date year="2024" month="September" day="25"/>
    <abstract>
      <?line 149?>

<t>This document provides an overview of terms that are commonly used when discussing the initial security setup of Internet of Things (IoT) devices. This document also presents a brief but illustrative survey of protocols and standards available for initial security setup of IoT devices. For each protocol, we identify the terminology used, the entities involved, the initial assumptions, the processes necessary for completion, and the knowledge imparted to the IoT devices after the setup is complete.</t>
    </abstract>
  </front>
  <middle>
    <?line 154?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Initial security setup for a device refers to any process that takes place before a device can become fully operational. The phrase <strong>initial security setup</strong> intentionally includes the term <em>security</em> as setup of devices without adequate security or with insecure processes is no longer acceptable. The initial security setup process, among other things, involves network discovery and selection, access authentication, and configuration of necessary credentials and parameters.</t>
      <t>Initial security setup for IoT devices is challenging because the size of an IoT network varies from a couple of devices to tens of thousands, depending on the application. Moreover, devices in IoT networks are produced by a variety of vendors and are typically heterogeneous in terms of the constraints on their power supply, communication capability, computation capacity, and user interfaces available. This challenge of initial security setup in IoT was identified by <xref target="Sethi14">Sethi et al.</xref> while developing a solution for smart displays.</t>
      <t>Initial security setup of devices typically also involves providing them with some sort of network connectivity. The functionality of a disconnected device is rather limited. Initial security setup of devices often assumes that some network has been setup a-priori. Setting up and maintaining a network itself is challenging. For example, users may need to configure the network name (called as Service Set Identifier (SSID) in Wi-Fi networks) and passphrase before new devices can be setup. Specifications such as the Wi-Fi Alliance Simple Configuration <xref target="simpleconn"/> help users setup networks. However, this document is only focused on terminology and processes associated with the initial security setup of devices and excludes any discussion on setting up networks.</t>
      <t>There are several terms that are used in the context of initial security setup of devices:</t>
      <ul spacing="normal">
        <li>
          <t>Bootstrapping</t>
        </li>
        <li>
          <t>Provisioning</t>
        </li>
        <li>
          <t>Onboarding</t>
        </li>
        <li>
          <t>Enrollment</t>
        </li>
        <li>
          <t>Commissioning</t>
        </li>
        <li>
          <t>Initialization</t>
        </li>
        <li>
          <t>Configuration</t>
        </li>
        <li>
          <t>Registration</t>
        </li>
        <li>
          <t>Discovery</t>
        </li>
      </ul>
      <t>In addition to using a variety of different terms, initial security setup mechanisms can rely on several entities. For example, a companion smartphone device may be necessary for some initial security setup mechanisms. Moreover, security setup procedures have diverse initial assumptions about the device being setup. As an example, an initial security setup mechanism may assume that the device is provisioned with a pre-shared key and a list of trusted network identifiers. Finally, initial security setup mechanisms impart different information to the device after completion. For example, some mechanisms may only provide a key for use with an authorization server, while others may configure elaborate access control lists directly.</t>
      <t>The next section provides an overview of some standards and protocols for initial security setup of IoT devices. For each mechanism, the following are explicitly identified:</t>
      <ul spacing="normal">
        <li>
          <t>Terminology used</t>
        </li>
        <li>
          <t>Entities or "players" involved</t>
        </li>
        <li>
          <t>Initial assumptions about the device</t>
        </li>
        <li>
          <t>Processes necessary for completion</t>
        </li>
        <li>
          <t>Knowledge imparted to the device after completion</t>
        </li>
      </ul>
    </section>
    <section anchor="usage">
      <name>Standards and Protocols</name>
      <section anchor="bluetooth">
        <name>Bluetooth</name>
        <t>Bluetooth mesh specifies a provisioning protocol.  The goal of the provisioning phase is to securely incorporate a new Bluetooth mesh node, by completing two critical tasks. First, to authenticate the unprovisioned device and second, to create a secure link with said device to share information.</t>
        <t>The provisioning process is divided into five distinct stages summarize next:</t>
        <ul spacing="normal">
          <li>
            <t>Beaconing for discovery: The new unprovisioned device is discovered by the provisioner</t>
          </li>
          <li>
            <t>Negotiation: The unprovisioned device indicates to the provisioner a set of capabilities such as the security algorithms supported, the availability of its public key using an Out-of-Band (OOB) channel and the input/output interfaces supported</t>
          </li>
          <li>
            <t>Public-key exchange: The authentication method is selected by the provisioner and both devices exchange Elliptic-curve Diffie–Hellman (ECDH) public keys. These keys may be static or ephemeral. Their exchange can be done in two ways, either via Out-of-Band or directly through a Bluetooth link. Each device then generates a symmetric key, named ECDHSecret, by combining its own private key and the public key of the peer device. The EDCHSecret is used to protect communication between the two devices.</t>
          </li>
          <li>
            <t>Authentication: During this phase, the ECDH key exchange is authenticated. The authentication method can be Output OOB, Input OOB, static OOB, or No OOB. With Output OOB, the unprovisioned device chooses a random number and outputs that number in manner consistent with its capabilities. The provisioner then inputs this number. Then, a check confirmation value operation is performed. This involves a cryptographic exchange regarding (in this case) the random number to complete the authentication. With Input OOB, the roles are reversed, being the provisioner the entity that generates the random number. When neither of the previous authentication procedures are feasible, both the provisioner and unprovisioned device generate a random number and require the user supervising the setup to verify that values on the device and provisioner are the same.</t>
          </li>
          <li>
            <t>Distribution of provisioning data: At this point, the provisioning process can be protected. This involves the distribution of data such as a Network key, to secure the communications at network layer and a unicast address among other information.</t>
          </li>
        </ul>
        <t>Bluetooth mesh has the following characteristics:</t>
        <ul spacing="normal">
          <li>
            <t>Terms: Configuration, discovery, provisioning.</t>
          </li>
          <li>
            <t>Players: Client, Device, Manager, Manufacturer, Peer, Server, User</t>
          </li>
          <li>
            <t>Initial beliefs assumed in the device: Previously to the provisioning phase, there are no pre-shared credentials for a trust relation.</t>
          </li>
          <li>
            <t>Processes: Provisioning</t>
          </li>
          <li>
            <t>Beliefs imparted to the device after protocol execution: After the provisioning, the device trusts the provisioner entity and any other device in the network sharing its network key.</t>
          </li>
        </ul>
      </section>
      <section anchor="device-provisioning-protocol-dpp">
        <name>Device Provisioning Protocol (DPP)</name>
        <t>The Wi-Fi Alliance Device provisioning protocol (DPP) <xref target="dpp"/> describes itself as a standardized protocol for providing user-friendly Wi-Fi setup while maintaining or increasing the security. DPP relies on a configurator, e.g. a smartphone application, for setting up all other devices, called enrollees, in the network. DPP has the following three phases/sub-protocols:</t>
        <ul spacing="normal">
          <li>
            <t>Bootstrapping: The configurator obtains bootstrapping information from the enrollee using an out-of-band channel such as scanning a QR code or tapping NFC. The bootstrapping information includes the public-key of the device and metadata such as the radio channel on which the device is listening.</t>
          </li>
          <li>
            <t>Authentication: In DPP, either the configurator or the enrollee can initiate the authentication protocol. The side initiating the authentication protocol is called the initiator while the other side is called the responder. The authentication sub-protocol provides authentication of the responder to an initiator. It can optionally authenticate the initiator to the responder (only if the bootstrapping information was exchanged out-of-band in both directions).</t>
          </li>
          <li>
            <t>Configuration: Using the key established from the authentication protocol, the enrollee asks the configurator for network information such as the SSID and passphrase of the access point.</t>
          </li>
        </ul>
        <t>DPP has the following characteristics:</t>
        <ul spacing="normal">
          <li>
            <t>Terms: Bootstrapping, configuration, discovery, enrollment, provisioning.</t>
          </li>
          <li>
            <t>Players: Authenticator, Client, Configurator, Device, Initiator, Manufacturer, Owner, Peer, Persona, Responder, User, Enrollee</t>
          </li>
          <li>
            <t>Initial beliefs assumed in the device: There are two entities involved in the DPP protocol, the Initiator and Responder. These entities as a starting point do not have a trust relation, nor do they share credentials or key material. DPP uses a decentralized architecture with no central authority to coordinate or control authentication and rely on a direct trust model.
 In DPP, authentication does not rely on a pre-existing trust relation with a third-party or centralized entity, hence all entities involved in DPP need to perform the required validation.</t>
          </li>
          <li>
            <t>Processes: Bootstrapping, authentication,  provisioning, and network access.
Bootstrapping: To establish a secure provisioning connection, the devices exchange public bootstrapping keys.
Authentication: To establish trust and build a secure channel, the devices employ the DPP Authentication protocol's bootstrapping keys.
Configuration: The Configurator uses the DPP Configuration protocol to provision the Enrollee through the secure channel created during DPP Authentication.
Network access: The Enrollee establishes network access using the newly provisioned credentials.</t>
          </li>
          <li>
            <t>Beliefs imparted to the device after protocol execution: DPP bootstrapping relies on the transfer of the public-key that is expected to be trusted. The beliefs when mutual authentication is run, relies on the trust of a successful DPP bootstrapping. When mutual authentication is not supported, a device that can control when and how its own public key is bootstrapped, can perform a weak authentication to any entity that knows its public key.</t>
          </li>
        </ul>
      </section>
      <section anchor="enrollment-over-secure-transport-est">
        <name>Enrollment over Secure Transport (EST)</name>
        <t>Enrollment over Secure Transport (EST) <xref target="RFC7030"/> defines a profile of Certificate Management over CMS (CMC) <xref target="RFC5272"/>. EST relies on Hypertext Transfer Protocol (HTTP) and Transport Layer Security (TLS) for exchanging CMC messages and allows client devices to obtain client certificates and associated Certification Authority (CA) certificates. A companion specification for using EST over secure CoAP has also been standardized <xref target="RFC9148"/>. EST assumes that some initial information is already distributed so that EST client and servers can perform mutual authentication before continuing with protocol. <xref target="RFC7030"/> further defines "Bootstrap Distribution of CA Certificates" which allows minimally configured EST clients to obtain initial trust anchors. It relies on human users to verify information such as the CA certificate "fingerprint" received over the unauthenticated TLS connection setup. After successful completion of this bootstrapping step, clients can proceed to the enrollment step during which they obtain client certificates and associated CA certificates.</t>
        <t>EST has the following characteristics:</t>
        <ul spacing="normal">
          <li>
            <t>Terms: Bootstrapping, enrollment, initialization, configuration.</t>
          </li>
          <li>
            <t>Players: Administrator, Client, Device, Manufacturer, Owner, Peer, Server, User</t>
          </li>
          <li>
            <t>Initial beliefs assumed in the device: There is a process of distribution of initial information which provides both the EST client and server with the information for the EST client and server to perform mutual authentication as well as for authorization.</t>
          </li>
          <li>
            <t>Processes: Distribution of Certificates, Bootstrap, Enrollment</t>
          </li>
          <li>
            <t>Beliefs imparted to the device after protocol execution: The EST enrollment process is designed to make establishing automated certificate issuing from a trustworthy CA as simple as possible. After the process has finished, the device is able to automatically renew its certificates through re-enrollment as it has a trust relation with the ESP server.</t>
          </li>
        </ul>
      </section>
      <section anchor="open-mobile-alliance-oma-lightweight-machine-to-machine-specification-lwm2m">
        <name>Open Mobile Alliance (OMA) Lightweight Machine to Machine specification (LwM2M)</name>
        <t>LwM2M specification developed by OMA <xref target="oma"/> defines a RESTful architecture where a new IoT device (LwM2M client) first contacts an LwM2M Bootstrap-Server for obtaining essential information such credentials for subsequently registering with one or more LwM2M Servers. These one or more LwM2M servers are used for performing device management actions during the device lifecycle (reading sensor data, controlling an actuator, modifying access controls etc.). LwM2M specification does not deal with the initial network configuration of IoT devices and assumes that the IoT client device has network reachability to the LwM2M Bootstrap-Server and LwM2M Server.</t>
        <t>The current standard defines the following four bootstrapping modes:</t>
        <ul spacing="normal">
          <li>
            <t>Factory Bootstrap: An IoT device is configured with all the information necessary for securely communicating with an LwM2M Bootstrap-Server and/or LwM2M Server while it is manufactured and prior to its deployment.</t>
          </li>
          <li>
            <t>Bootstrap from Smartcard: An IoT device retrieves all the information necessary for securely communicating with an LwM2M Bootstrap-Server and/or LwM2M Server from a Smartcard.</t>
          </li>
          <li>
            <t>Client Initiated Bootstrap: If the IoT device in one of the above bootstrapping modes is only configured with information about an LwM2M Bootstrap-Server, then the client device must first communicate securely with the configured LwM2M Bootstrap-Server and obtain the necessary information and credentials to subsequently register with one or more LwM2M Servers.</t>
          </li>
          <li>
            <t>Server Initiated Bootstrap: In this bootstrapping mode, the LwM2M server triggers the client device to begin the client initiated bootstrap sequence described above.</t>
          </li>
        </ul>
        <t>The LwM2M specification is also quite flexible in terms of the credentials and the transport security mechanism used between the client device and the LwM2M Server or the LwM2M Bootstrap-Server. Credentials such as a pre-shared symmetric key, a raw public key (RPK), or X.509 certificates can be used with various transport protocols such as Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) as specified in LwM2M transport bindings specification <xref target="oma-transport"/>.</t>
        <t>As explained earlier, an LwM2M Bootstrap-Server is responsible for provisioning credentials into an LwM2M Client. When X.509 certificates are being provisioned, the asymmetric key pair is generated on the Bootstrap-Server and then sent to the LwM2M client device. This approach is not acceptable in all scenarios and therefore, LwM2M specification also supports a mode where the client device uses the Enrollment over Secure Transport (EST) certificate management protocol for provisioning certificates from the LwM2M Bootstrap-Server to the LwM2M Client.</t>
        <t>OMA has the following characteristics:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Terms</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t><em>Bootstrapping</em> and <em>Unbootstrapping</em>: Bootstrapping is used for describing the process of providing an IoT device with credentials and information of one or more LwM2M servers. Interestingly, the transport bindings specification <xref target="oma-transport"/> also uses the term unbootstrapping for the process where objects corresponding to an LwM2M Server are deleted on the client.</t>
              </li>
              <li>
                <t><em>Provisioning</em> and <em>configuration</em>: terms used to refer to the process of providing some information to a LwM2M client.</t>
              </li>
              <li>
                <t><em>Discovery</em>: term for the process by which a LwM2M Bootstrap-Server or LwM2M Server discovers objects, object instances, resources, and attributes supported by RESTful interfaces of a LwM2M Client.</t>
              </li>
              <li>
                <t><em>Register</em> and <em>De-register</em>: Register is the process by which a client device sets up a secure association with an LwM2M Server and provides the server with information about objects and existing object instances of the client. De-register is the process by which the client deletes information about itself provided to the LwM2M server during the registration process.</t>
              </li>
              <li>
                <t><em>Intialization</em>: term for the process by which an LwM2M Bootstrap-Server or LwM2M Server deletes objects on the client before performing any write operations.</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Players</strong>: Device manufacturers or Smartcard manufacturers are responsible for providing client IoT devices with initial information and credentials of LwM2M Bootstrap-Server and/or LwM2M server.</t>
          </li>
          <li>
            <t><strong>Initial beliefs assumed in the device</strong>: The client at the very least has the necessary information to trust the LwM2M bootstrap server.</t>
          </li>
          <li>
            <t><strong>Processes</strong>: LwM2M does not require any actions from the device owner/user. Once the device is registered with the LwM2M server, various actions related to device management can be performed by device owner/user via the LwM2M server.</t>
          </li>
          <li>
            <t><strong>Beliefs imparted to the device after protocol execution</strong>: After the bootstrapping is performed, the LwM2M client can register (Security object and Server object) with the LwM2M servers.</t>
          </li>
        </ul>
      </section>
      <section anchor="nimble-out-of-band-authentication-for-eap-eap-noob">
        <name>Nimble out-of-band authentication for EAP (EAP-NOOB)</name>
        <t>Extensible Authentication Protocol (EAP) framework provides support for multiple authentication methods. EAP-NOOB <xref target="RFC9140"/> defines an EAP method where the authentication is based on a user-assisted out-of-band (OOB) channel between the IoT device (peer in EAP terminology) and the server. It is intended as a generic bootstrapping solution for IoT devices which have no pre-configured authentication credentials and which are not yet registered on the authentication server.</t>
        <t>The application server where the IoT device is registered once EAP-NOOB is completed may belong to the manufacturer or the local network where the device is being deployed. EAP-NOOB uses the flexibility of the Authentication, Authorization, and Accounting (AAA) <xref target="RFC2904"/> architecture to allow routing of EAP-NOOB sessions to a specific application server.</t>
        <t>EAP-NOOB claims to be more generic than most ad-hoc bootstrapping solutions in that it supports many types of OOB channels and supports IoT devices with only output (e.g. display) or only input (e.g. camera).</t>
        <t>EAP-NOOB has the following characteristics:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Terms</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t><em>Bootstrapping</em>: used to describe the entire process involved during the initial security setup of an IoT device. The specification does not use separate terms or distinguish the process of obtaining identifier and credentials for communicating with an application server where the user has an account or for network connectivity.</t>
              </li>
              <li>
                <t><em>Registration</em>: describes the process of associating the device with a user account on an application server.</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Players</strong>: The device owner/user is responsible for transferring an OOB message necessary for protocol completion. The application server where the device is registered may be provided by different service providers including the device manufacturer or device owner. The local network needs standard AAA configuration for routing EAP-NOOB sessions to the application server chosen by the device owner/user.</t>
          </li>
          <li>
            <t><strong>Initial beliefs assumed in the device</strong>: EAP-NOOB does not require devices to have any pre-installed credentials but expects all devices to use a standard identifier (noob@eap-noob.arpa) during initial network discovery.</t>
          </li>
          <li>
            <t><strong>Processes</strong>: The IoT device performs network discovery and one or more OOB outputs may be generated. The user is expected EAP exchange is encompassed by Initial Exchange, OOB step, Completion Exchange and Waiting Exchange.</t>
          </li>
          <li>
            <t><strong>Beliefs imparted to the device after protocol execution</strong>: After EAP-NOOB bootstrapping process is complete, the device and server establish a long-term secret, which can be renewed without further user involvement. As a side-effect, the device also obtains identifier and credentials for network and Internet connectivity (via the EAP authenticator).</t>
          </li>
        </ul>
      </section>
      <section anchor="open-connectivity-foundation-ocf">
        <name>Open Connectivity Foundation (OCF)</name>
        <t>The Open Connectivity Foundation (OCF) <xref target="ocf"/> defines the process before a device is operational as onboarding.  The first step of this onboarding process is configuring the ownership, i.e., establishing a legitimate user that owns the device. For this, the user is supposed to use an Onboarding tool (OBT) and an Owner Transfer Method (OTM).</t>
        <t>The OBT is described as a logical entity that may be implemented on a single or multiple entities such as a home gateway, a device management tool, etc. OCF lists several optional OTMs. At the end of the execution of an OTM, the onboarding tool must have provisioned an Owner Credential onto the device. The following owner transfer methods are specified:</t>
        <ul spacing="normal">
          <li>
            <t>Just works: Performs an un-authenticated Diffie-Hellman key exchange over Datagram Transport Layer Security (DTLS). The key exchange results in a symmetric session key which is later used for provisioning. Naturally, this mode is vulnerable to on-path attackers.</t>
          </li>
          <li>
            <t>Random PIN: The device generates a PIN code that is entered into the onboarding tool by the user. This pin code is used together with TLS-PSK ciphersuites for establishing a symmetric session key. OCF recommends PIN codes to have an entropy of 40 bits.</t>
          </li>
          <li>
            <t>Manufacturer certificate: An onboarding tool authenticates the device by verifying a manufacturer-installed certificate. Similarly, the device may authenticate the onboarding tool by verifying its signature.</t>
          </li>
          <li>
            <t>Vendor specific: Vendors implement their own transfer method that accommodates any specific device constraints.</t>
          </li>
        </ul>
        <t>Once the onboarding tool and the new device have authenticated and established secure communication, the onboarding tool provisions/configures the device with Owner credentials. Owner credentials may consist of certificates, shared keys, or Kerberos tickets for example.</t>
        <t>The OBT additionally configures/provisions information about the Access Management Service (AMS), the Credential Management  Service (CMS), and the credentials for interacting with them. The AMS is responsible for provisioning access control entries, while the CMS provisions security credentials necessary for device operation.</t>
        <t>OCF has the following characteristics:</t>
        <ul spacing="normal">
          <li>
            <t>Terms: Configuration, discovery, enrollment, onboarding, provisioning, registration,</t>
          </li>
          <li>
            <t>Players: Client, Device, Manager, Manufacturer, Owner, Peer, Server, User</t>
          </li>
          <li>
            <t>Initial beliefs assumed in the device: The device needs to be associated with an owner in the onboarding process and then go through the provisioning process before being considered as trustworthy.</t>
          </li>
          <li>
            <t>Processes: Onboarding, provisioning.</t>
          </li>
          <li>
            <t>Beliefs imparted to the device after protocol execution: In the provisioning phase the device receives the necessary credentials to interact with provisioning services and any other services or devices that are part of the normal operation of the device.</t>
          </li>
        </ul>
      </section>
      <section anchor="fast-identity-online-fido-alliance">
        <name>Fast IDentity Online (FIDO) alliance</name>
        <t>The Fast IDentity Online Alliance (FIDO) is currently specifying an automatic onboarding protocol for IoT devices <xref target="fidospec"/>. The goal of this protocol is to provide a new IoT device with information for interacting securely with an online IoT platform. This protocol allows owners to choose the IoT platform for their devices at a late stage in the device lifecycle. The draft specification refers to this feature as "late binding".</t>
        <t>The FIDO IoT protocol itself is composed of one Device Initialization (DI) protocol and 3 Transfer of Ownership (TO) protocols TO0, TO1, TO2. Protocol messages are encoded in Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> and can be transported over application layer protocols such as Constrained Application Protocol (CoAP) <xref target="RFC7252"/> or directly over TCP, Bluetooth etc. FIDO IoT however assumes that the device already has IP connectivity to a rendezvous server. Establishing this initial IP connectivity is explicitly stated as "out-of-scope" but the draft specification hints at the usage of Hypertext Transfer Protocol (HTTP) <xref target="RFC7230"/> proxies for IP networks and other forms of tunnelling for non-IP networks.</t>
        <t>The specification only provides a non-normative example of the DI protocol which must be executed in the factory during device manufacture. This protocol embeds initial ownership and manufacturing credentials into a Restricted Operation Environment (ROE) on the device. The initial information embedded also includes a unique device identifier (called GUID in the specification). After DI is executed, the manufacturer has an ownership voucher which is passed along the supply chain to the device owner.</t>
        <t>When a device is unboxed and powered on by the new owner, the device discovers a network-local or an Internet-based rendezvous server. Protocols (TO0, TO1, and TO2) between the device, the rendezvous server, and the new owner (as the owner onboarding service) ensure that the device and the new owner are able to authenticate each other. Thereafter, the new owner establishes cryptographic control of the device and provides it with credentials of the IoT platform which the device should use.</t>
        <t>FIDO has the following characteristics:</t>
        <ul spacing="normal">
          <li>
            <t>Terms: Provisioning, onboarding, commissioning, initialisation.</t>
          </li>
          <li>
            <t>Players: Device, Manager, Manufacturer, Owner, Rendezvous Server,  User</t>
          </li>
          <li>
            <t>Initial beliefs assumed in the device: In the initial state the device is not yet associated with a specific owner. The DI process has to take place to embed ownership and manufacturing credentials in the device, the first in a chain to create an ownership voucher that will be used to perform the transfer of ownership of the device.</t>
          </li>
          <li>
            <t>Processes: Device Initialize Protocol (DI), Transfer Ownership Protocol 0 (TO0), Transfer Ownership Protocol 1 (TO1), Transfer Ownership Protocol 2 (TO2)</t>
          </li>
          <li>
            <t>Beliefs imparted to the device after protocol execution: When the device is powered on, and all TO protocols run, the device figures out by contacting the rendezvous server, who the owner is, authenticate with the owner. At this point the rendezvous server, and the owner are able to authenticate the device.</t>
          </li>
        </ul>
      </section>
      <section anchor="bootstrapping-remote-secure-key-infrastructures-brski">
        <name>Bootstrapping Remote Secure Key Infrastructures (BRSKI)</name>
        <t>The ANIMA working group is working on a bootstrapping solution for devices that rely on 802.1AR <xref target="ieee8021ar"/> vendor certificates called Bootstrapping Remote Secure Key Infrastructures (BRSKI) <xref target="RFC8995"/>. In addition to vendor installed IEEE 802.1AR certificates, a vendor based service on the Internet is required. Before being authenticated, a new device only needs link-local connectivity, and does not require a routable address. When a vendor provides an Internet based service, devices can be forced to join only specific domains. The document highlights that the described solution is aimed in general at non-constrained (i.e. class 2+ defined in <xref target="RFC7228"/>) devices operating in a non-challenged network. It claims to scale to thousands of devices located in hostile environments, such as ISP provided CPE devices which are drop-shipped to the end user.</t>
        <t>BRSKI has the following characteristics:</t>
        <ul spacing="normal">
          <li>
            <t>Terms: Bootstrapping, provisioning, enrollment, onboarding.</t>
          </li>
          <li>
            <t>Players: Administrator, Client, Cloud Registrar, Configurator, Device, Domain Registrar, Initiator, Join Proxy, JRC, Manufacturer, Owner, Peer, Pledge, Server, User</t>
          </li>
          <li>
            <t>Initial beliefs assumed in the device: Every device has an IDevID, installed and signed by the manufacturer, which is used as a basis for establishing further trust relations. In the initial stage, when the device is deployed in a specific location it cannot securely communicate with the registrar or JRC, to be integrated into the network, so  the device and the registrar need to establish mutual trust.</t>
          </li>
          <li>
            <t>Processes: Discover, self-Identify, joint registrar, imprint registrar, enroll.</t>
          </li>
          <li>
            <t>Beliefs imparted to the device after protocol execution: After the process has finished and the device is imprinted, and trusts the registrar/JRC, through a voucher issued by the manufacturer and verified by the device.</t>
          </li>
        </ul>
      </section>
      <section anchor="secure-zero-touch-provisioning-sztp">
        <name>Secure Zero Touch Provisioning (SZTP)</name>
        <t><xref target="RFC8572"/> defines a bootstrapping strategy that enables devices to securely obtain all configuration information with minimal installer input, beyond physical placement and cable connections. The goal of this bootstrapping protocol is to enable a secure NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/> connection to the deployment-specific network management system (NMS). Devices receive signed and optionally encrypted information about the owner's NMS, which they authenticate using an owner certificate and an ownership voucher <xref target="RFC8366"/> signed by the device manufacturer. The owner certificate and ownership voucher can be delivered to the device via Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), removable storage (e.g., USB drives), or knowledge of well-known bootstrapping servers. Devices may be redirected to multiple servers before acquiring the necessary credentials to verify and connect to the designated NMS.</t>
        <t>SZTP has the following characteristics:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Terms</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t><em>Bootstrapping</em>: used to describe the entire process involved during the initial security setup of devices. It involves the device authenticating itself with manufacturer-issued certificates, fetching the owner certificate and ownership voucher, and retrieving the signed or encrypted onboarding information, such as the boot image, initial configuration, and scripts.</t>
              </li>
              <li>
                <t><em>Provisioning</em>: refers to the process of providing all the necessary bootstrap information to a device so that it can become functional. In some sense, the terms bootstrapping and provisioning are used interchangeably because, for provisioning the bootstrap information onto the device, it is necessary to bootstrap the device. In fact, the specification also refers to Secure Zero Touch Provisioning (SZTP) as a <em>bootstrapping strategy</em>. Interestingly, even though the title of the protocol specification includes the word provisioning, it is used much less than bootstrapping in the specification text.</t>
              </li>
              <li>
                <t><em>Onboarding</em>: used to refer to the information that the device needs to join the owner's network. In particular, the onboarding information includes the boot image the device must run, an initial configuration the device must use, and scripts that the device must successfully execute. Note that in SZTP, onboarding information is not the entire set of information that the device needs for bootstrapping. Prior to obtaining the onboarding information, the device also needs the owner certificate and ownership voucher to verify the onboarding information received later.</t>
              </li>
              <li>
                <t><em>Enrollment</em>: describes the process by which the device owner registers with the device manufacturer, ensuring that the manufacturer recognizes the owner and issues the necessary ownership vouchers. This crucial association is later used by the manufacturer to provide the owner with the serial numbers of the devices based on the order. The owner then uses these serial numbers during the bootstrapping process to verify the devices as their own.</t>
              </li>
              <li>
                <t><em>Discovery</em>: used for describing the process by which devices discover sources of information, particularly bootstrap servers that are not already known to the device. This discovery typically happens via redirects from trusted bootstrapping servers.</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Players</strong>: SZTP requires significant involvement of the device manufacturer. The manufacturer is responsible for installing the client identity certificate and trust anchors for verifying botstrapping server certificates and ownership vouchers during the manufacturing process. Additionally, the device manufacturer must support the enrollment of the owner by verifying the owner certificate and issuing an ownership voucher. After receiving an order for devices from an enrolled owner, the manufacturer needs to inform the owner of the serial numbers corresponding to the ordered devices. This naturally necessitates robust asset tracking systems. Lastly, the manufacturer may also need to operate well-known bootstrapping servers that the device contacts to retrieve the owner certificate and ownership voucher. At the same time, the device owner also carries substantial responsibility, including enrolling in the manufacturer’s SZTP program, managing the keys associated with the owner certificate, and maintaining the network infrastructure to authenticate the device's serial number and confirm its association with the order placed with the manufacturer. Once authenticated, the owner is responsible for sending signed and/or encrypted onboarding information to the device.</t>
          </li>
          <li>
            <t><strong>Initial beliefs assumed in the device</strong>: SZTP requires devices to have a pre-configured state, including a client X.509 certificate for TLS client authentication to bootstrap servers. While the specification allows the use of HTTP authentication with passwords, it typically relies on X.509 certificates in the form of IDevID certificates, as defined in <xref target="ieee8021ar"/>. Additionally, devices must have a list of trusted bootstrap servers and trust anchor certificates for verifying bootstrap server certificates and ownership vouchers signed by the manufacturer. All this information, including the client TLS certificate and trust anchors, must be installed during manufacturing.</t>
          </li>
          <li>
            <t><strong>Processes</strong>: A precursor for the device to bootstrap and join the owner’s network is the enrollment of the owner with the manufacturer and the setup of all necessary network infrastructure to authenticate the device. Thereafter, the device can use various sources such as Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP) options, removable storage (e.g., USB drives), or knowledge of well-known bootstrapping servers to locate the owner certificate and ownership voucher. These methods can be used in parallel to expedite the process. Once the owner certificate and ownership voucher are obtained and verified, the device receives, verifies/decrypts the signed and/or encrypted onboarding information, including boot images, configuration details, and scripts. With the image, configuration, and scripts, the device can securely join the owner's network management system (NMS). Unlike other protocols, once all the infrastructure has been set up, no actions are needed on the device itself other than its physical placement, cabling, and booting up.</t>
          </li>
          <li>
            <t><strong>Beliefs imparted to the device after protocol execution</strong>: After the SZTP bootstrapping process, the device possesses all necessary information, called as bootstrapping data, for secure communication with the deployment-specific NMS. This bootstrapping data includes the ownership voucher, the owner certificate, and onboarding information. The owner certificate and ownership voucher are used to verify the onboarding information, which encompasses the boot image and its hash or signature, initial configuration, and pre- and post-configuration scripts to be executed by the device.</t>
          </li>
        </ul>
      </section>
      <section anchor="lpwan">
        <name>LPWAN</name>
        <t>Low Power Wide Area Network (LPWAN) encompasses a wide variety of technologies whose link-layer characteristics are severely constrained in comparison to other typical IoT link-layer technologies such as Bluetooth or IEEE 802.15.4. While some LPWAN technologies rely on proprietary bootstrapping solutions which are not publicly accessible, others simply ignore the challenge of bootstrapping and key distribution. In this section, we discuss the bootstrapping methods used by LPWAN technologies covered in <xref target="RFC8376"/>.</t>
        <ul spacing="normal">
          <li>
            <t>LoRaWAN <xref target="LoRaWAN"/> describes its own protocol to authenticate nodes before allowing them join a LoRaWAN network. This process is called as joining and it is based on pre-shared keys (called AppKeys in the standard). The joining procedure comprises only one exchange (join-request and join-accept) between the joining node and the network server. There are several adaptations to this joining procedure that allow network servers to delegate authentication and authorization to a backend AAA infrastructure <xref target="RFC2904"/>.</t>
          </li>
          <li>
            <t>Wi-SUN Alliance Field Area Network (FAN) uses IEEE 802.1X <xref target="ieee8021x"/> and EAP-TLS for network access authentication. It performs a 4-way handshake to establish a session keys after EAP-TLS authentication.</t>
          </li>
          <li>
            <t>NB-IoT relies on the traditional 3GPP mutual authentication scheme based on a shared-secret in the Subscriber Identity Module (SIM) of the device and the mobile operator.</t>
          </li>
          <li>
            <t>Sigfox security is based on unique device identifiers and cryptographic keys. As stated in <xref target="RFC8376"/>, although the algorithms and keying details are not publicly available, there is sufficient information to indicate that bootstrapping in Sigfox is based on pre-established credentials between the device and the Sigfox network.</t>
          </li>
        </ul>
        <t>From the above, it is clear that all LPWAN technologies rely on pre-provisioned credentials for authentication between a new device and the network.</t>
        <t>LPWAN has the following characteristics:</t>
        <ul spacing="normal">
          <li>
            <t>Terms: Provisioning, configuration, discovery.</t>
          </li>
          <li>
            <t>Players: Administrator, Authenticator, Border Router, Client, Device, Manager, Network Server, User</t>
          </li>
          <li>
            <t>Initial beliefs assumed in the device: The device normally has credentials that are used to directly secure the communications or to device key material to do so. There is a basic trust in the network server.</t>
          </li>
          <li>
            <t>Processes: Provisioning</t>
          </li>
          <li>
            <t>Beliefs imparted to the device after protocol execution: Either because of an authentication process that results in newly derived key material or the pre-provisioned key material is used, the device is able to exchange information securely through the network server.</t>
          </li>
        </ul>
      </section>
      <section anchor="thread">
        <name>Thread</name>
        <t>Thread Group commissioning <xref target="threadcommissioning"/> introduces a two phased process i.e. Petitioning and Joining. Entities involved are leader, joiner, commissioner, joiner router, and border router. Leader is the first device in Thread network that must be commissioned using out-of-band process and is used to inject correct user generated Commissioning Credentials (can be changed later) into Thread Network. Joiner is the node that intends to get authenticated and authorized on Thread Network. Commissioner is either within the Thread Network (Native) or connected with Thread Network via a WLAN (External).</t>
        <t>Under some topologies, Joiner Router and Border Router facilitate the Joiner node to reach Native and External Commissioner, respectively. Petitioning begins before Joining process and is used to grant sole commissioning authority to a Commissioner. After an authorized Commissioner is designated, eligible thread devices can join network. Pair-wise key is shared between Commissioner and Joiner, network parameters (such as network name, security policy, etc.,) are sent out securely (using pair-wise key) by Joiner Router to Joiner for letting Joiner to join the Thread Network. Entities involved in Joining process depends on system topology i.e. location of Commissioner and Joiner. Thread networks only operate using IPv6. Thread devices can devise GUAs (Global Unicast Addresses) <xref target="RFC4291"/>. Provision also exist via Border Router, for Thread device to acquire individual global address by means of DHCPv6 or using SLAAC (Stateless Address Autoconfiguration) address derived with advertised network prefix.</t>
        <t>Thread has the following characteristics:</t>
        <ul spacing="normal">
          <li>
            <t>Terms: Commissioning, discovery, provisioning.</t>
          </li>
          <li>
            <t>Players: Administrator, Border Agent, Border Router, Commissioner, Commissioner Candidate, Configurator, Device, End Device, End Device, Endpoint Identifier, Initiator, Joiner, Joiner Router, Owner, Peer, Responder, Server, User</t>
          </li>
          <li>
            <t>Initial beliefs assumed in the device: The joiner needs to share credentials with an entity that belongs to the Thread network, prior to the authentication process.</t>
          </li>
          <li>
            <t>Processes: Petitioning, Joining</t>
          </li>
          <li>
            <t>Beliefs imparted to the device after protocol execution: Once the authentication takes place, a trust relation is established between the Joiner and the Commissioner it receives the network parameters needed to be attached to the Thread network.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="comp">
      <name>Comparison</name>
      <t>There are several stages before a device becomes fully operational. There is typically a stage where some sort of credential is installed. The nature or purpose of this credential can be varied, form being part of the IoT device authentication, to a credential from a 3rd trusted party, be it the manufacturer or the owner. Solution differ on this initial process, and in some cases this can even be done in an out-of-band fashion.</t>
      <t>After some initial credential is installed, there is a process that typically involves authentication establishing initial trust, after which  credentials and/or parameters are configured or installed into the device.</t>
      <t>Finally, when the entities involved in the process are authenticated and the configuration and key material established, the normal operation of the IoT device can take place.</t>
      <section anchor="comp-term">
        <name>Comparison of terminology</name>
        <t>The specifics of every term varies depending on the technology, but we enumerate here the basic terminology and what it means for the different solutions.</t>
        <ul spacing="normal">
          <li>
            <t>Bootstrapping:
            </t>
            <ul spacing="normal">
              <li>
                <t>DPP: Client obtains the Controller’s public bootstrapping key and IP address</t>
              </li>
              <li>
                <t>OMA: An IoT device retrieves and processes all the bootstrap data</t>
              </li>
              <li>
                <t>EST: installation of the Explicit TA database</t>
              </li>
              <li>
                <t>BRSKI: A protocol to obtain a local trust anchor.</t>
              </li>
              <li>
                <t>SZTP: The process by which obtains "bootstrapping data" such as conveyed information, owner certificate and owner voucher.</t>
              </li>
              <li>
                <t>EAP-NOOB: For an IoT device to be registered, authenticated, authorized and for it to derive key material to act as a trustworty entity in the security domain where it is deployed.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>configuration:
            </t>
            <ul spacing="normal">
              <li>
                <t>DPP: The process performed by a Configurator by which the Enrollee is provisioned.</t>
              </li>
              <li>
                <t>OMA: Adding or removing an LwM2M Server Account to or from the LwM2M Client configuration.</t>
              </li>
              <li>
                <t>OCF: The necessary information the Device must hold to be considered as ready for normal operation.</t>
              </li>
              <li>
                <t>EST: The basic information (e.g., TA database) needed to initiate protocol operation.</t>
              </li>
              <li>
                <t>SZTP: The system configuration  to be installed into the device by the bootstrapping process.</t>
              </li>
              <li>
                <t>EAP-NOOB: Establishing  necessary information for the device to operate.</t>
              </li>
              <li>
                <t>LPWAN: In LoRaWAN, the information related to the working of the device and protocol.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>discovery:
            </t>
            <ul spacing="normal">
              <li>
                <t>DPP: Exchange that allows obtaining specific information such as SSID, operating channel and band.</t>
              </li>
              <li>
                <t>OCF: Making the different resources available through URIs.</t>
              </li>
              <li>
                <t>BRSKI: Locating an entity that needs to take part of the bootstrapping process (e.g., Join proxy)</t>
              </li>
            </ul>
          </li>
          <li>
            <t>enrollment:
            </t>
            <ul spacing="normal">
              <li>
                <t>EST: The process of obtaining the credentials needed to perform the device normal operation.</t>
              </li>
              <li>
                <t>BRSKI: Same process describe as EST.</t>
              </li>
              <li>
                <t>SZTP: The process of an owner joining a manufacturer's SZTP program.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>provisioning:
            </t>
            <ul spacing="normal">
              <li>
                <t>DPP: Securely enabling a device to establish secure associations with other devices in a network.</t>
              </li>
              <li>
                <t>OMA: Establishing security credentials and access control lists by a dedicated LwM2M bootstrap server.</t>
              </li>
              <li>
                <t>OCF: A set of processes that take place both during and after the ownership transfer. These entail configuration of credentials, and security-related resources for any services or devices that the provisioned device needs to interact with in the future.</t>
              </li>
              <li>
                <t>Bluetooth: The procedure by which a device is authenticated, and a secure link is established, becoming a trustworthy node in the network.</t>
              </li>
              <li>
                <t>FIDO: Same as FIDO onboarding.</t>
              </li>
              <li>
                <t>SZTP: The set of steps that take place to enable a device to establish secure connections with other systems.</t>
              </li>
              <li>
                <t>LPWAN: In LoRaWAN, the establishment of configuration data and credentials.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>intialization:
            </t>
            <ul spacing="normal">
              <li>
                <t>OMA: When Bootstrap-Delete operation is used, to restore a device.</t>
              </li>
              <li>
                <t>FIDO: Protocol (DI), establishing basic information at manufacture.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>registration:
            </t>
            <ul spacing="normal">
              <li>
                <t>OMA: Establishing a registration session, which is an association between the client and the server.</t>
              </li>
              <li>
                <t>EAP-NOOB: Add information about an IoT device in a server database.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>onboarding:
            </t>
            <ul spacing="normal">
              <li>
                <t>OCF:  The device is considered to complete the onboarding after the ownership of the Device has been transferred and the Device provisioned.</t>
              </li>
              <li>
                <t>FIDO: The procedure of installing configuration information and secret to a device so that it may safely connect to and communicate with an IoT platform.</t>
              </li>
              <li>
                <t>SZTP: information related to the boot image a device must be running, an initial configuration the device must commit, and scripts that the device must successfully execute.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>commissioning:
            </t>
            <ul spacing="normal">
              <li>
                <t>Thread: The process of a Thread device joining a Thread network.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>imprint:
            </t>
            <ul spacing="normal">
              <li>
                <t>BRSKI: The process by which a device obtains the needed information to act as trustworthy entity within the network or domain</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="comp-players">
        <name>Comparison of players</name>
        <t>In this section we classify the different players.</t>
        <t>Human User: user</t>
        <t>Device that intends to securely join a network: pledge, device, client, peer, persona, enrollee, candidate</t>
        <t>Entity that makes the device: Manufacturer</t>
        <t>Entity that owns the device: owner, manager</t>
        <t>Entity with which the device establishes a connection: IoT platform, Rendezvous Server, Server,</t>
        <t>Entity that aids in  the process: Join Proxy, Bootstrap Server, Onboarding Server, Border Router</t>
        <t>Person that manages a deployment or system: Administrator</t>
        <t>Entity that steers the process for the IoT device to securely join the network: Configurator, Bootstrap Server, Rendezvous Server, JRC, Onboarding/Redirect Server, Commissioner.</t>
        <t>External or third-party entity that intervenes in the process:  Registrar, MASA</t>
      </section>
      <section anchor="comp-beliefs">
        <name>Comparison of initial beliefs</name>
        <t>The IoT devices may have different initial beliefs depending on the credentials pre-installed, during the manufacturing process or prior to being turned on. There are cases where the initial credentials that need to be shared to establish basic trust, or they are exchanged during one of the procedures after the device is turned on, not installed during manufacturing.</t>
        <section anchor="no-initial-trust-established">
          <name>No initial trust established</name>
          <t>EAP-NOOB does not require initial configuration of credentials to establish trust, since its done using the out-of-band process.</t>
          <t>The OCF device starts as unowned. It has to perform an ownership transfer, to establish basic trust to perform onboarding and  provisioning. Depending on the Owener Transfer Mode (OTM) it can be considered to have not initial trust based on the credentials installed.</t>
          <t>Bluetooth devices start as unprovisioned. Initial trust is established as a consequence of exchanging public keys and performing the authentication. If the public keys are ephemeral, there is no initial credential establishment.</t>
        </section>
        <section anchor="initial-trust-based-on-the-credentials-installed">
          <name>Initial trust based on the credentials installed</name>
          <t>These credentials may very from the time of installing, and the entity to which it related. In this sense, they could be from the  manufacturer, owner or other entity.</t>
          <t>FIDO devices have installed during the manufacturing process a set of ownership credentials (i.e., ownership voucher) and additional information to determine the current owner of the device. Hence, there is an initial trust from the IoT device and the owner. With this basic setup, and and the cooperation among device, owner and rendezvous server, the onboarding process can take place.</t>
          <t>EST devices are configured with the needed information to perform mutual authentication and for authorization between the EST client and server.</t>
          <t>BRSKI have manufacturer-installed certificates as starting point to establish trust.</t>
          <t>SZTP have pre-configured initial state which provides the basis for trust.</t>
          <t>LPWAN specifics depends on the technology, but they all have in common some pre-installed credentials that allows the establishment of trust and to secure the communications.</t>
          <t>Thread devices, share credentials as well to establish trust.</t>
          <t>OMA devices can have all the necessary information to start working on the network where they are deployed, if they have the factory bootstrap, hence all needed credentials to establish trust. There need to be installed some basic credentials to establish trust with the bootstrap server and perform the bootstrapping.</t>
          <t>DPP initial trust is established during the bootstrapping where the public key is transmitted.</t>
        </section>
      </section>
      <section anchor="comp-process">
        <name>Comparison of processes</name>
        <t>Analyzing the different terms used over the different solutions reviewed in this document, we can identify several processes. These are named differently in some cases, and not every technologies considers them all as part of their the following common concepts:</t>
        <ul spacing="normal">
          <li>
            <t>To refer to the process previous to the device being turned on, in which some information, or credentials are installed into the device. This process is commonly referred to as manufacture. Is in this phase where the IoT devices have installed the needed information (specifics depend on the technology) to provide the basis for trust and to authenticate other entities.</t>
          </li>
          <li>
            <t>To refer to the process after the device is turned on and intends to locate the entity with which it has to communicate to start the authentication process to be integrated into the security domain. Here is where the device start the process to get to perform its normal operation.</t>
          </li>
          <li>
            <t>To the process by which the device obtains additional credentials, in addition to what it already had installed before being turned on.</t>
          </li>
          <li>
            <t>To the process by which the device is authenticated and established a trust relation.</t>
          </li>
        </ul>
      </section>
      <section anchor="comp-impart">
        <name>Comparison of knowledge imparted to the device</name>
        <t>Even though the devices might start from a different place, in terms of initial credentials as basis for trust, when they finish their processes, they become trusted parties within the domain they are deployed or at least have a trust relation with a specific entity. The difference may strive in the number of trust relations are stablished during the process, as they may have not only established a trust relation with local entities where they perform their operation, but other external entities as well.</t>
        <t>In FIDO, once the onboarding process has taken place, the IoT device is mutually authenticated with the current owner, and the needed secrets and configuration data is installed into the device, which as a result is able to connect and interact securely with the target IoT platform.</t>
        <t>In EAP-NOOB, once the bootstrapping is completed, the IoT device not only has a trust relation with the EAP server, but the EAP authenticator can be established as well, based on the shared credentials that are derived during the authentication process.</t>
        <t>In Bluetooth the trust is expanded to the local network as there is key material shared among the different entities of the network.</t>
        <t>In Thread once the joiner has successfully completed the process, it can communicate directly with all Thread devices in the network.</t>
        <t>LPWAN has a more limited scope and they usually have specific keys for applications and network communications.</t>
        <t>EST provides the devices with the enrollment information such as certificates and symmetric keys that can be used to establish trust with different peers.</t>
        <t>BRSKI after running it is able to verify that the communicating entities are who they claim to be, and obtain domain specific certificates to act as trustworhty entities within the domain.</t>
        <t>SZTP after running, the device has obtained onboarding information and is equipped to establish secure connections with other systems.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This draft does not take any posture on the security properties of the different bootstrapping protocols discussed. Specific security considerations of bootstrapping protocols are present in the respective specifications.</t>
      <t>Nonetheless, we briefly discuss some important security aspects which are not fully explored in various specifications.</t>
      <t>Firstly, an IoT system may deal with authorization for resources and services separately from initial security setup in terms of timing as well as protocols. As an example, two resource-constrained devices A and B may perform mutual authentication using credentials provided by an offline third-party X before device A obtains authorization for running a particular application on device B from an online third-party Y. In some cases, authentication and authorization maybe tightly coupled, e.g., successful authentication also means successful authorization.</t>
      <t>Secondly, initial security setup of IoT devices may be necessary several times during the device lifecycle since keys have limited lifetimes and devices may be lost or resold. Protocols and systems must have adequate provisions for revocation and fresh security setup. A rerun of the security setup mechanism must be as secure as the initial security setup regardless of whether it is done manually or automatically over the network.</t>
      <t>Lastly, some IoT networks use a common group key for multicast and broadcast traffic. As the number of devices in a network increase over time, a common group key may not be scalable and the same network may need to be split into separate groups with different keys. Bootstrapping and provisioning protocols may need appropriate mechanisms for identifying and distributing keys to the current member devices of each group.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>There are no IANA considerations for this document.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>We would like to thank Tuomas Aura, Hannes Tschofenig, and Michael Richardson for providing extensive feedback as well as Rafa Marin-Lopez for his support.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC2904">
        <front>
          <title>AAA Authorization Framework</title>
          <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
          <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="L. Gommans" initials="L." surname="Gommans"/>
          <author fullname="G. Gross" initials="G." surname="Gross"/>
          <author fullname="B. de Bruijn" initials="B." surname="de Bruijn"/>
          <author fullname="C. de Laat" initials="C." surname="de Laat"/>
          <author fullname="M. Holdrege" initials="M." surname="Holdrege"/>
          <author fullname="D. Spence" initials="D." surname="Spence"/>
          <date month="August" year="2000"/>
          <abstract>
            <t>This memo serves as the base requirements for Authorization of Internet Resources and Services (AIRS). It presents an architectural framework for understanding the authorization of Internet resources and services and derives requirements for authorization protocols. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2904"/>
        <seriesInfo name="DOI" value="10.17487/RFC2904"/>
      </reference>
      <reference anchor="RFC4291">
        <front>
          <title>IP Version 6 Addressing Architecture</title>
          <author fullname="R. Hinden" initials="R." surname="Hinden"/>
          <author fullname="S. Deering" initials="S." surname="Deering"/>
          <date month="February" year="2006"/>
          <abstract>
            <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
            <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture". [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4291"/>
        <seriesInfo name="DOI" value="10.17487/RFC4291"/>
      </reference>
      <reference anchor="RFC5272">
        <front>
          <title>Certificate Management over CMS (CMC)</title>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <author fullname="M. Myers" initials="M." surname="Myers"/>
          <date month="June" year="2008"/>
          <abstract>
            <t>This document defines the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This protocol addresses two immediate needs within the Internet Public Key Infrastructure (PKI) community:</t>
            <t>1. The need for an interface to public key certification products and services based on CMS and PKCS #10 (Public Key Cryptography Standard), and</t>
            <t>2. The need for a PKI enrollment protocol for encryption only keys due to algorithm or hardware design.</t>
            <t>CMC also requires the use of the transport document and the requirements usage document along with this document for a full definition. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5272"/>
        <seriesInfo name="DOI" value="10.17487/RFC5272"/>
      </reference>
      <reference anchor="RFC6241">
        <front>
          <title>Network Configuration Protocol (NETCONF)</title>
          <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
          <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
          <date month="June" year="2011"/>
          <abstract>
            <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6241"/>
        <seriesInfo name="DOI" value="10.17487/RFC6241"/>
      </reference>
      <reference anchor="RFC7030">
        <front>
          <title>Enrollment over Secure Transport</title>
          <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
          <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
          <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
          <date month="October" year="2013"/>
          <abstract>
            <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7030"/>
        <seriesInfo name="DOI" value="10.17487/RFC7030"/>
      </reference>
      <reference anchor="RFC7228">
        <front>
          <title>Terminology for Constrained-Node Networks</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <author fullname="M. Ersue" initials="M." surname="Ersue"/>
          <author fullname="A. Keranen" initials="A." surname="Keranen"/>
          <date month="May" year="2014"/>
          <abstract>
            <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7228"/>
        <seriesInfo name="DOI" value="10.17487/RFC7228"/>
      </reference>
      <reference anchor="RFC7252">
        <front>
          <title>The Constrained Application Protocol (CoAP)</title>
          <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
          <author fullname="K. Hartke" initials="K." surname="Hartke"/>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <date month="June" year="2014"/>
          <abstract>
            <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
            <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7252"/>
        <seriesInfo name="DOI" value="10.17487/RFC7252"/>
      </reference>
      <reference anchor="RFC7230">
        <front>
          <title>Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing</title>
          <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
          <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
          <date month="June" year="2014"/>
          <abstract>
            <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document provides an overview of HTTP architecture and its associated terminology, defines the "http" and "https" Uniform Resource Identifier (URI) schemes, defines the HTTP/1.1 message syntax and parsing requirements, and describes related security concerns for implementations.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7230"/>
        <seriesInfo name="DOI" value="10.17487/RFC7230"/>
      </reference>
      <reference anchor="RFC8040">
        <front>
          <title>RESTCONF Protocol</title>
          <author fullname="A. Bierman" initials="A." surname="Bierman"/>
          <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
          <author fullname="K. Watsen" initials="K." surname="Watsen"/>
          <date month="January" year="2017"/>
          <abstract>
            <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8040"/>
        <seriesInfo name="DOI" value="10.17487/RFC8040"/>
      </reference>
      <reference anchor="RFC8366">
        <front>
          <title>A Voucher Artifact for Bootstrapping Protocols</title>
          <author fullname="K. Watsen" initials="K." surname="Watsen"/>
          <author fullname="M. Richardson" initials="M." surname="Richardson"/>
          <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
          <author fullname="T. Eckert" initials="T." surname="Eckert"/>
          <date month="May" year="2018"/>
          <abstract>
            <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer. This artifact is known as a "voucher".</t>
            <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure. Other YANG-derived formats are possible. The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
            <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8366"/>
        <seriesInfo name="DOI" value="10.17487/RFC8366"/>
      </reference>
      <reference anchor="RFC8376">
        <front>
          <title>Low-Power Wide Area Network (LPWAN) Overview</title>
          <author fullname="S. Farrell" initials="S." role="editor" surname="Farrell"/>
          <date month="May" year="2018"/>
          <abstract>
            <t>Low-Power Wide Area Networks (LPWANs) are wireless technologies with characteristics such as large coverage areas, low bandwidth, possibly very small packet and application-layer data sizes, and long battery life operation. This memo is an informational overview of the set of LPWAN technologies being considered in the IETF and of the gaps that exist between the needs of those technologies and the goal of running IP in LPWANs.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8376"/>
        <seriesInfo name="DOI" value="10.17487/RFC8376"/>
      </reference>
      <reference anchor="RFC8572">
        <front>
          <title>Secure Zero Touch Provisioning (SZTP)</title>
          <author fullname="K. Watsen" initials="K." surname="Watsen"/>
          <author fullname="I. Farrer" initials="I." surname="Farrer"/>
          <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson"/>
          <date month="April" year="2019"/>
          <abstract>
            <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state. Variations in the solution enable it to be used on both public and private networks. The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs. The updated device is subsequently able to establish secure connections with other systems. For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8572"/>
        <seriesInfo name="DOI" value="10.17487/RFC8572"/>
      </reference>
      <reference anchor="RFC8949">
        <front>
          <title>Concise Binary Object Representation (CBOR)</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <date month="December" year="2020"/>
          <abstract>
            <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
            <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="94"/>
        <seriesInfo name="RFC" value="8949"/>
        <seriesInfo name="DOI" value="10.17487/RFC8949"/>
      </reference>
      <reference anchor="RFC8995">
        <front>
          <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
          <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
          <author fullname="M. Richardson" initials="M." surname="Richardson"/>
          <author fullname="T. Eckert" initials="T." surname="Eckert"/>
          <author fullname="M. Behringer" initials="M." surname="Behringer"/>
          <author fullname="K. Watsen" initials="K." surname="Watsen"/>
          <date month="May" year="2021"/>
          <abstract>
            <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8995"/>
        <seriesInfo name="DOI" value="10.17487/RFC8995"/>
      </reference>
      <reference anchor="RFC9140">
        <front>
          <title>Nimble Out-of-Band Authentication for EAP (EAP-NOOB)</title>
          <author fullname="T. Aura" initials="T." surname="Aura"/>
          <author fullname="M. Sethi" initials="M." surname="Sethi"/>
          <author fullname="A. Peltonen" initials="A." surname="Peltonen"/>
          <date month="December" year="2021"/>
          <abstract>
            <t>The Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB) authentication and key derivation. The EAP method is intended for bootstrapping all kinds of Internet-of-Things (IoT) devices that have no preconfigured authentication credentials. The method makes use of a user-assisted, one-directional, out-of-band (OOB) message between the peer device and authentication server to authenticate the in-band key exchange. The device must have a nonnetwork input or output interface, such as a display, microphone, speaker, or blinking light, that can send or receive dynamically generated messages of tens of bytes in length.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9140"/>
        <seriesInfo name="DOI" value="10.17487/RFC9140"/>
      </reference>
      <reference anchor="RFC9148">
        <front>
          <title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
          <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
          <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
          <author fullname="M. Richardson" initials="M." surname="Richardson"/>
          <author fullname="S. Raza" initials="S." surname="Raza"/>
          <date month="April" year="2022"/>
          <abstract>
            <t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9148"/>
        <seriesInfo name="DOI" value="10.17487/RFC9148"/>
      </reference>
      <reference anchor="simpleconn" target="https://www.wi-fi.org/download.php?file=/sites/default/files/private/Wi-Fi_Simple_Configuration_Technical_Specification_v2.0.7.pdf">
        <front>
          <title>Wi-Fi Simple Configuration</title>
          <author>
            <organization>Wi-Fi Alliance</organization>
          </author>
          <date year="2019"/>
        </front>
        <seriesInfo name="Version" value="2.0.7"/>
      </reference>
      <reference anchor="Sethi14" target="http://dx.doi.org/10.1145/2632048.2632049">
        <front>
          <title>Secure Bootstrapping of Cloud-Managed Ubiquitous Displays</title>
          <author initials="M." surname="Sethi" fullname="Mohit Sethi">
            <organization>Ericsson</organization>
          </author>
          <author initials="E." surname="Oat" fullname="Elena Oat">
            <organization>Aalto University</organization>
          </author>
          <author initials="M." surname="Di Francesco" fullname="Mario Di Francesco">
            <organization>Aalto University</organization>
          </author>
          <author initials="T." surname="Aura" fullname="Tuomas Aura">
            <organization>Aalto University</organization>
          </author>
          <date year="2014" month="September"/>
        </front>
        <seriesInfo name="Proceedings" value="of ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2014), pp. 739-750, Seattle, USA"/>
      </reference>
      <reference anchor="dpp" target="https://www.wi-fi.org/wi-fi-download/35330">
        <front>
          <title>Wi-Fi Easy Connect Specification</title>
          <author>
            <organization>Wi-Fi Alliance</organization>
          </author>
          <date year="2018"/>
        </front>
        <seriesInfo name="Wi-Fi Alliance" value="Version 3.0"/>
      </reference>
      <reference anchor="LoRaWAN" target="https://lora-alliance.org/resource_hub/lorawan-specification-v1-1/">
        <front>
          <title>LoRa Specification</title>
          <author>
            <organization>LoRa Alliance</organization>
          </author>
          <date year="2017" month="October"/>
        </front>
        <seriesInfo name="LoRa Alliance" value="Version: 1.1"/>
      </reference>
      <reference anchor="oma" target="https://openmobilealliance.org/release/LightweightM2M/V1_2_1-20221209-A/OMA-TS-LightweightM2M_Core-V1_2_1-20221209-A.pdf">
        <front>
          <title>Lightweight Machine to Machine Technical Specification: Core</title>
          <author>
            <organization>Open Mobile Alliance</organization>
          </author>
          <date year="2022" month="December"/>
        </front>
        <seriesInfo name="Approved Version" value="1.2.1"/>
      </reference>
      <reference anchor="oma-transport" target="https://www.openmobilealliance.org/release/LightweightM2M/V1_2_1-20221209-A/OMA-TS-LightweightM2M_Transport-V1_2_1-20221209-A.pdf">
        <front>
          <title>Lightweight Machine to Machine Technical Specification: Transport Bindings</title>
          <author>
            <organization>Open Mobile Alliance</organization>
          </author>
          <date year="2022" month="December"/>
        </front>
        <seriesInfo name="Approved Version" value="1.2.1"/>
      </reference>
      <reference anchor="ocf" target="https://openconnectivity.org/specs/OCF_Security_Specification.pdf">
        <front>
          <title>OCF Security Specification</title>
          <author>
            <organization>Open Connectivity Foundation</organization>
          </author>
          <date year="2022" month="October"/>
        </front>
        <seriesInfo name="Version" value="2.2.6"/>
      </reference>
      <reference anchor="ieee8021ar" target="https://1.ieee802.org/security/802-1ar/">
        <front>
          <title>IEEE Standard for Local and metropolitan area networks–Secure Device Identity</title>
          <author>
            <organization>IEEE</organization>
          </author>
          <date year="2018"/>
        </front>
      </reference>
      <reference anchor="ieee8021x" target="https://1.ieee802.org/security/802-1x/">
        <front>
          <title>IEEE Standard for Local and metropolitan area networks–Port-Based Network Access Control</title>
          <author>
            <organization>IEEE</organization>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="threadcommissioning">
        <front>
          <title>Thread Commissioning</title>
          <author>
            <organization>Thread Group</organization>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="fidospec" target="https://fidoalliance.org/specifications/download-iot-specifications/">
        <front>
          <title>FIDO Device Onboard Specification</title>
          <author>
            <organization>Fast Identity Online Alliance</organization>
          </author>
          <date year="2022" month="April"/>
        </front>
        <seriesInfo name="Fido Alliance" value="Version: 1.1"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA81923IbR5bgO7+iwn4wqQUgiZJsixEb2xBJ2eyWRK5Ij2dn
Y8NRBBJAjQpV6KoCKbTDEfMP87S/N1+y55p5MqtASbZndzuiLRCoysvJc7/l
eDw+aLu8mv+Sl3XlTrKu2bqDYtPQp7Y7fvLk5ZPjg3k9q/I1/Dxv8kU3Lppu
Me6Ou2Y5bt1s2xTdDj502824qLvx3N0VM9eOy7xzbXcwy7uTrKgW9UG7vV0X
bVvUVbfbwGAX729eH2yKk4Ms6+rZSfbNzrXfwB+zer3JZ134ot2tG7dozRd1
08XfwJKruisWhZvDl1VNT3VNEYbpiq6ESb+5cc26qOqyXu4y2Hi2aWpYbeva
bFE3sNCiK/Iy031ltK+sXmQX9U0mW/vmIL+9bdzdCX05/MpBvu1WdXNyMIYH
YKFvJ9m161YFrItB+bZeFZ3/rm6WJ9k0L7s6+6kq7lzTwkgIC/jnJDtvN3UN
fzVuCdCDTTCY5rifJ8dPXzzhv7dV18DTr4uqhJ3BV26dF+VJtsap/lJ8KCaL
QtfzCtaTN8WHfJf7Jb1yq5nr7Pe4LL8KmnVoCdHs9JdM3MpIfymccxMYTGc/
m2Q/5M2syMenedMUZVn7RZzl1cBvBJ8AGTyQyzs47NqvLvzJi3r27PjJd9HK
rjd5UYXFLWmSeV79ZVsV9V0xce0B4mmzzjuYB/f9/vXp8csnz+Xj8+OXT+Xj
i+PvjuXjt8fP9dvvnjx7oh+Pj7/3H18c+4/+ge+fPPcfn337rf/4nf/4wk/x
/cvnL/3Hly/k48unfgT4SLO1xXpTulldVfgXkFXeLB1QwKrrNu3J48f39/eT
+2K8KPAsHs/r+6qs8/lks9r8t0VRuv/6GGDr2sdzt8i3ZfcYv2sfb5riDkj5
8c/F+HXxyzVN8ctpXS2K5bYBUNXVLzdutqqKWV7+cr1xM6DCGX9/dzx5Mvlu
spkveDlMgjRQxgNl0UD0lBIOfh7zwfMb07Is8mrm6Jc5LOkkO37y9CX92bqm
cC0eH7+YZf+EmIKYSmuAL4nUnj7vQwYAM/84mdcMladPJk+fPn/x+PhbQKDn
30/435d2A9dI6S57Vdcd8Jh8symqJWLkaVlv5+O3eZUv3Tz76bb4+7bo6m2b
nRXtpsx37cD+UuaA/xtiEPg/gsU5MLW2FVjJ++eT7DLvorfPS1fl5tt9DMau
4azIXjcI4XZWx0sBOq6Hfv7kqDeTbAqHG412s63XeWu/3z+MP+bn4yf7TvoK
ObibwyHAhHAM09O32UXVuaYipALW/Ne6qDpCNdc42EBWV9mVa+7yFiYjKWAO
6xTEz7bDIz2Eb/Evmv9olG02k+y7Zy/H3714MoKDyTvAhlH20/UUFjLfbD6H
5ujTWCnv8bMXz5496dPGed7ucLmVmwEGWJL6PRTy/R64xe8AyxSSyZ5NSKC8
qd/nP0/fDW+rrJt8nMu7tLXGtfW2mblfVttb+vk+r8atXfz47un46WO7XZzi
8zZITw7v77vx0yd7thi9FXZ4kj2dPMUtAiIOb6/euGpd3wIDTPYIX7Tu8Zti
ueruHf737fHbx//09JfjX56Oj58cHz89fvJyPH18+XY6vrkex88B12zcuPdw
yh+/MW8B6c1WReVAQ/IfPbeNIXeS4fDf7APgJewIeApuaRiOx8fjp8d74PjN
dAN60h1wNYHgNwjC48lThuEYuGAFOkrT7aeB/xyI3ujE/4lg9XNkr4qK2Mz/
AyDPFvsRdcacorgDrklARaprH1+evv7lWpTSWDCnoIEnM33y88iRNnpq5s1e
g5o1D+/YDe+jTiOijyffohYPauL3oNDmzfBmn07kCd6lrPgxfDGGdyLOcnF+
fp5do2mTN3NS7d/UeLbI7Neua+pNXRbwc5Y3Ls8q193XzYf2P/7t30W4n5Gq
n13MXdWpMBqAA07T57a6j49fvo2Pf84urpAkXgFhzbN3/G02naGdg4cG75Wf
vaFjPL1uBePPwTATAw6I4MSu84Z+R9EZHtg3gzz7Q1ODlRSB7gX8uSjmNaLv
MOTw14h9RPKl9SotGaLJb3a9ry/OLvWIL6vbGqH7WXj/Om87jxTwaomcYx+l
P3m+B/Ffwzb2i6XxeJzlt6hZzrqDg4ObVdFmYIFv1zArmqt3xRysVTh04BUN
WD33qPSAurNu4ZzyDnEBbeh1XZW7bIsocL8Cap0X7WwLhwOKTbdyD1m6pDuB
IQifYXLgd9khGLpHav5OsnhJednWsC7Xwh+wruwWtrvIbrddBsbbFveB9lTW
bps7R5Yb7AEM/rpsCY9bQW/46w4Ms/wWeOdnm+IT4DtN5oCF+1FH2T3sjo5o
saOtdsbkR3iM6Fs6QzgYmOiuLu/0a502b9vtekOowz8ERwEwPfiQNztaJ7or
SocPjmg/+OyHqr4v3XwJw603edPBGYCkwV/M2rN8ASujb3lrAFQZzE0OCA3W
xXxeuoODr/FQmnq+nRFyHlwMwwaXk8vwYKmDttvivHm109UzhnT5B5geTBJ4
7NbBWy68NgPEugUbcg2nsC0Bg0DCNKJI48kDIFYNMJbs0aPhE3r0CGDYIXTx
FRigqGblFlFWzyJ7pG88AjCHc1W43BdAd4A++dz9fQvkFCaA/eGPaFswmw6H
AsCr6qysqyXANAdet+kQlXjJe3BJ3oZzA2IBEw4WiOeBKD9StGiVrRIBIcmx
36gFxWUmp86cFdkFbps5CCPDzJq3uMeAO7PGEZLmQgeAJ2AeAXzayYMHbDEI
MWYFQHbVEukazi0HBGeUKv7hcEI4TnxDN3GXIzPKFk29hjOfAQ8unYU9oqmr
WmIpcAgtrAxgMXcg7+dk5lY0Ohi9pSoToPA0DgEzCuuKJm2JJW0If4ESbgGA
vA525NzB0HXDQMAHu90G1TDAnBWCo166yqFhBoMyl6O1IY+rkLkUyHV4WUWT
bep7OMN2C+vbjYgNbitZKKD2JgfVDMBJv4CVF76f0be4BABgQxjcLHKiUuVK
wvcU4AS2PYgl+78H7BZOVPDG/yfZ85lDrjn5X4dfi1PiCFg06owAP1fW5E/I
s7Yut7Q+PPV2DWwEUZAcCfsxxB6lhyNxaI/PLEJEDqyZoFqkd3SrMo4yrkR6
JdHRYlvNmK7FCZczVdBzsEPhIQAlwHgkprJYF/DDJPv0cmvghhWzXSd8ilal
q1kBMG8dPMJv5uNNU9RNQa4TMtfxS9SLECPg/wxEfbvogGAXCcGI9PiYI9Md
0cm38P4O3mKOreTLJKVjoRsjO0TQwlOwqmsUw7BtWIjoBnDcTXZ4fX1xdoS4
wJa2UsORkHvbCicVFlyBJFdgMBfmrU5i1QQY5hbEXc78NDbiB71q2a+/Bsfg
b78BVZUb2SuDUhc2yX4E6iFC7iIJXyCBlSjuZqRP1FUkU2M3OuyrnhU5ogOh
1sPKhpeFMIb7KIICBZaqK8g26cz1jP1qUTVyKLoaBBQsGyZI1CBabVEpu+jc
x+4Bqg3LOTk4eBT79/CLKyQc1W7hb9Ec5a/zCtTqEuGFf8WqMHwhBFD8g/VL
esS6PuGL925ZsLrEf5+pwEFqB2k4L+g4AS+3LWO34aLzYkHerY5hMNq3yTWY
uXlVtGtGMrC/dwxgBqBqRQlp5ByVqXB+YkWbVV05pXckmVuX6EVEvJ9chJUe
Q9J5DsTXAu2DAjknz+Cghgb6MioMeMyypFuHEBL6mZK6HDZTfXJdtCXmRaIy
haELYaF4uIrkOSrA43YFSDfPPjimiRzYX0sIR8E0+MVzI88lENAF6Umfc2Ks
TZqz9gELxguzSlYug3KaHCidjhkZ90s0LgYGLB63gQeJGgVvshKTSJAYLRs6
OBZepD7xSIFvOhCddYNKnGhJM7Y/CTTAYooGJEe5Y2IG+ACBtqxX7TV1WFYF
q4G5j1gUv8dy8GBgRX8BZFzfE4HhBj6ipgNm486IcuIPN4lZwUxAjAoY+ysU
1QCRr7yFYfjAg9grzOYT5gY+9be9hsYeNDjA/33tfQoMvisPvl+/BpVv6X7D
h77OXpVb1wEXXB0c+I8ArRb0BZZIeDiBGBBkehKTjBSGJZjrqq/Fz61Q8hWk
cLIuz5ZC3WwEXUgeJtNW9Rxw93bnN4RKzD3IaThmct11efuBSKppuxHZPkEp
ZyG+rSzxKpRIoQfUnNNLoJrzEsTKACv/g+hJeeFfwpUjwVsiFDxOQUKYjxK1
QIxGkQQvLwpiai3sYtYhQi8dyvY1sFfU3ZEWAM+yLANRBHjKgyEKeEPkJGOi
uR/eFU3Ij7L2GZ2Ca2Twd25ZA0qKs3MfiND1iUBsFcHMQAQpYnRexS5crKd4
WszLJTCQbrVuSUuvEWeZ7kTRLlS3BJUt22xvgfqIFYnMq7LLbTeuF+NXeGiH
l5evjlClAw209OZ3UYFu/xhoaoNOiKDK+wll51c0+hhHB90DBlk6hkBsyqGr
bVXPEZ5s9Q1Ck2a/RVRVnUbHzM5BPQNSn41n6AMBub4A0vmPf/v3Hx0oDLCj
w/PTsx+PzGbJx+KAQPCzitcWzZUZcha3AcUdxTU9VjRhJtEb5yicUe8B2rgH
e2GUuYL08bsij+BH2MQsGJ189XaJsixQHWL+JDtHLqlYj74kNMkaQoYcszPQ
FckLH5FyPM9wQ9cO6KhTcr1ljRwPtb5H5k5RZS8rCZjhsJVlOFgzT8wGyPnZ
qYyLp0HqXVcT08FQWWzu3YKwRXuB3A4ACGX8B3j6j7JpdMYn2RngJ9lEKN+R
OzFW4k4yiyE4seUq88kDKCPnccmoCMg6AgHgP8qJ0mc4iXc1fpyATg+Qt6/s
5VuzVV2Tzg32FhjR66zarm8FFRn9RRmW7wEl1kgqDRnPwHpQh2CPStdGxCuu
HoPedPBEWS0DicekByvSEFdu9oFFv6okdzlgUvAgkeoExAjcksFWtMEshQGa
3aarl6BxrwAqHt6NW7KWnR2SKo82HBzPEYEl3jeZbOxBY5YSHYpA1hwAjVCX
jj0UjSMFE9gRa48pgXuv4Y6BGqigtxKYCsFVCdl5CQjHhq6MBFmMpovrWLi8
LW5RSyN2MsRnBrFB1zOIDo37+7YQQ5ZcHMAMUafyDmFWkgCCAAT2nMIW6QDV
vWKlZbQgGbYF0lfqOkNLprjdqt8rkojzvMtPsmknxIbR+VG8TSs3hYaEyPuI
QytLpsMZvPzJfQyEOJTXOMQsNDwDnu28kk7amyjy9ESLLsl5Q74+4zCMxX+q
Ka1EAAatEtAaXfsAZRD9s/aEAYbaZHsSG4WjIOpHEWwm9MoV65fwUlk4BCFH
NEYZp6A09GELoq+DzcJfVw7/ey1K+0+ABDSMaqS3DoZZtGL2eLuZD/0ElERG
XpQU9cBpeZYpJnlVW5vIejvZTU02EdqfAjnakSq9J7GxzToQL+9BRVfVT+Ae
cMTM2KfezW4XPLIv01raHqUJsRMKVDs5bq8PRT4h3KbKtypg24T0aIk02S15
nTs7PLu6OmK1MXHmyGuD+jW/lv3663yz+e03WFQLOvAtul7Z0UVor0YSqJPB
RiLwBx8g8oLxogEEmsPJ8gqYFbBVZ91pZFuhcmyYBqt1kwyWg4dZMLfIjee7
BmRzk+UEFxRcB8aDPGJ/gXHjlWUEbNBfxNvmyMniHPk37AHwAvrEhpFLx8jZ
Pm63t2NvKvZ9PKz72YVn9S3uvQVGbHO9rNVNnnSWDLy0oKjWrGjdUiBAVFTl
SS1wNXFR/vf3lLOI0O1kgnevT1kA7583iqpsgiIrosawalBF8ogfsrSaF7Vf
FYwHpz1bJW6OkjQE4jcHfYXpokKYe9Wy68GuieEy836XQelsTMcbil/M1dXT
KbbteYG8uowfwdmIK2AMxu8Ym3jM6GHg5hsw+0SPSWewCGP8EfFDAnE/Eofc
wjIm2UVHm683PibWM0vDooWtheEOyS9T8Cz7EQKDDaozzSPcA0phu4Q0fRRz
R5OeA/IEBILCmdTdFuNnRbuCwTyO7zmAUXzQaIP30QFp3Pu/zLotVqLHPPWO
C3jFfUTKAqx+mNofFK0RrY/i0FwkaZ335D4odQ09IItTIXwaMT4VyRd6vqlQ
vryvgmy+goEBQ0bZez19ltMj8S479yUSO7jH0fzpxbv1cQRlfJJ+sXQW7yMS
aU3kXIVMQxRKRwOmJ0j+jj22qZAH6xANTkLwnThPrGIAPyLqAWLACaJ1i0vb
soEzdzN4rEEPOkZdmtmqQHUQ1TgyYEDdkAfUSdnt2B6o0XhAOiPvGXsfE0Rm
BZk94bnQiax9Day5hJNXbpe8Oa/RQ1d35nXUetxH8ussEwCosxj03mY+Rj2G
Ytp2Z6xzjLIVJaqiJBw8OISMRqnEpBK2QWr+HDX3Yq5KaaJbJZSQBq4TPQmB
o4TLVDihPJZUdtaBZwTXWaS8aEARJwmIahwl4gGImRz5Q2jGVAJFUzKkyQmz
Lcp5WIIIuWRKsBLrncf/6TBj+yaV/GEtCfNE4WEpn9FWh4/jcV6isOuC4cPO
BmWh6ovxOpbfhjgnwehjf0V/9by+d9GJ8QL98IG5t8nRivbCmtW9xgPEzjS0
Kkj1u5VyXHYM2qA8ksMGky4XxnQOGg4ZpgVizYZ9cTDnrdMYi+hNsi7KfFpv
u23eo3kMUm8BEdN5txyyIXUJIbLYlv3Vin2/d2TkCMa9mQfvWc66gDIiWiAi
7aq+D86x4AgrLAbiUPiyEnye3bv8Qzq9ZPxYTwXmI7WJQ5VNkxC1pBiL1jaE
nNfD8+sbME8+7zmwR6QOhmySRVFphGBRcJ7JqWs6DmU7MVPDmKdvr7PD07en
MgwW2fz22ySDgc0h/biD3VMg90ZRJJhSP97cXHF4PSzsDZnxPr318ObN9REp
I8J1EPdgUrTWW3LBk7mHGgUoiiTTbXIMGwT6wyzsRt4Lwe+wUzyUqZdJh6fT
o+jFSTa10VUb65f4Gy4RoUBQEnZwWk9ZA6LkDk6MsOYegRALgxSE/cwKjZNF
ZgUOiAmau+BTgdHamt/DgWTvHDNBX0IbIeUwTUiOA6J9UW1xQyQKg85vMWex
bcT6Ywz6youanl/pdGpRqv1K7Bg5vzVscU0Kt49Izs0e7IkqMFSMzOC4WlLd
A+6ttuit59SJ4Cjbp8zC0swxZ1/BXpau2QDX7r6CQWeuQFlOZ8oO3sirnAGe
GoHpQ9nEUQ1rCqE9ZpVFKrKAKW5GfsN0Ulwwo7w6qLv0rAoWbxDuvgTppzFq
A+MAaP8xRd2q40WURZEo8al+Psfjp4QKq58bJ9k+Nfz3ushY4S6E5ZE4pcyM
GGWHyI6B7S1M7/cdpDebV2McEWJvD79i1MRhAoUjunclxqXZP2cD/T3nXI8K
zZmPwvmNbFLMH1IXbmRjBldtWNW1xbLi4db5B6PfkIdl29Vrwk5LjgUcIQVU
OROSyB70oG61QyRGDw2nUuVoc7bkj5/ErkSaHVF7gWi20jBmcJ9QKjPHoHEB
kozXOAzYUrzFEpJqfGg8hE1iAmHHbH7QlOADv5JTnnB0/+vBOpTs8PItSJ5P
VMHE4ufwzf3b47cg/g/oQ/KrZCtyNBQGBx4O+4wk/3s4NORSsb3GdikFrkNG
hkwmuAsiGmP4JDCASCkJhH/32DVmMiV0ZQ6F54kYWvXoi/hy6oNut7ctmEvw
FR0LJl+5xosmdFLCQ2sUWzwzz+djs/0HVBz61DNytTLZUdxD06W83pOzP0Z5
rsGfsli42W4GB3iI4pizmaoW7ee8y0eqQJbia0RGxnwODFaQSvR1lHEDCnM3
mxxNssGjVDN27gByvbw9kxEapzNH6ewsCoKS0Um+e6RFETLreA3m32jIX3jB
nlPG0e0xSKYF6EINSy4pklHci+XNot42iVxEw56dwK8BeHWzC3OC7KgsZlJi
vtcf2IYHVply4CT/TbNaTIRJcWs/MsMuHmOZj9mpuDELMnrWQWrNJRBXsNMQ
OcrcoVWLmDWJvNvM5a7R+z4DIKX7azB+7ygI+39xW8J5/arYJ8m4Ih4o2KM5
lIuFR6kQhCEqFBfhLShTQ6fsE1jTU7Tb5CSsvVsYcQCc3JoRPq+RKyuzUpC4
ACdPTGbyB3BcdC02wBXw0TqrOJqG4cwhRvYpLobQlnmHoV0NaZNrysAKdKrq
RVMsl6QW9+BD1vmyiEBX+An96BnvYOZ8LGvOByqEPsS1CrF+sHQbqL10H1FM
9wsFkkoL718g+9BnJoXkT+LdNn0k3pGOEWGzaF/DJzvJTs0aQlzaBEiTNBoM
4d9bR8Dh+6u/HVGayD9PXjx5GSsPEiLnYi88dkwMxkSDsM2QIqnTf8JEhpnO
QNIsm3z9wKNn9CyqS5IRSEoxQyFMfiuFs8n5kb4QiofBUj04mJJjpwQaQGdo
3gDkm9EDnAXdOOSgJhUtBDe9z9EAntLu/FDMasSTMwBUlOKcCGJ8YJKqFp1W
tskLWogmYMzVmzRI4cRHWsrUthIvwjHJccixIhiTr8SlFOqaEMrIrNuZq/Cs
PWY3ZGiPBumFiEXcUoh+SMyijfWx3DswP9P1Y5Vro+H0w87+ZCywfYhpzzFH
oJKTA7UUtc7PtS4fPSL78tEjLsOELyJD8xFB8NFPVcTwHiXmqE87o0RM5lQm
V0htvhBfzyNJS8SZ8iPL3eHdvXrlhEszHUUWMGE8ZmSfS2SMBv54qSJvG+/a
G5O6JUaS+vZfHeris7qR8CRt3dCUonmDbBzTsDwpzOTMBPQ2F0IgHymXAHfm
4ZrjR+WMJvOkD2nxaUUJ8XlEXH52X1kh0/T2CwaNOJL2IWSqzWj8sFUojeQD
Fit21DYFfc3cI6PlqEreiYPNpKbi1Go1mdRV8kjH2C97eS/yXqB45saqAcDm
9EfKtB7eX0z1rYPzxRQM9TOqcydEr9Kz1mwwTUawToq+gqU4xAU/EiVLIeUl
t7Bos6m9O4k4GKJeOzC7ZMfIeucxW5GFG1usMRU5OqMH/EVlXFGfRqS9EqyH
SbJ6hVREQOpINVYlOvvvG9SAfKJlOxGOJ84w4HmaTWQMiIYirl7/Tn7ijMgB
yUrEJqux9p8ceN+5lWqscLifYyaoT4N38lkuONznTYCV2KBUs4ttRjovK4ZV
a8QGcrIEnLD6qV2Od4bhlPyoCQVzqiUejBr4Xr4JndXob3yMruRJdllxXrUt
nxRst0V0Fiojr+HpBOQXYozuuxk0hVJzbxEtewuh5PB0It3v7/TcIXSC0+w2
laR+QdakUDczVacJ0R96jVNYBeKU0g99czQMKEr3/vrr7F2xRiS2aTGJAxTx
+3x6BdrM9Gr8DusKDg7OP2IxNKF/EiEOMSd4/AiON187cml4VigcncZdb8uu
IG/iUJY4CHad04dtogBaRQuTlPKgr/XDjre5lGfmnNcHRFJQ4Zndd1wzYc0c
64yj1PuCZzbFnkfe+hH8wAgJZeMCpOZcD5uzItwL5EcFzRHnIA5JKSOSNWps
5WSXqfIk3JUSTrts5zpLO1qtnmR1WQeSyUP0kstDOPYBRQPDV/7QTOOGuVRr
YCMCpRHLV9VOLKmPi/rBwoxhNjY92KODYW0/m9fc2OD19TL41TRJ5ZhaNz4r
HdMZdUSkfPrpdCrBVuxziKqh9dOi/oQqddbU3BANJvGrgEW0xHhIy1KVcwCc
GAPSl2Zg161bCdiTgquY0gE6wjeUYj1e1ftQh7sAUAJAFyyZNXJabCpKsoUm
YuyWDiP6XE9akVNI6oQOKUdVKuzJ/OW8uyr8OMux6gaT58KW/izr48Rruur/
kOBcV4Q+FyEFyCgp+8sdI9tD0iqH3b5Y49k6bEHROXWeNFKcttxSek2sdgeH
e6hl7Ql6qVcccBM+SHUkjCjmgX5twtYsSSCMWhPEmrC3H0JOdLJ2r9LGHnfJ
zaLZ/bTV8GoH9KubIeE+5J7Q1JZG69kAiyT5IPG1enlqy3g/ybQGGZbUkHnF
FxUAX0XcSgMD+bVpJbs4AVDKx+xueV0xV8P8tDZ45oHZJAEE3KPylkHG0g3v
dbaqWxBZUoPX16i+VGX0c/dUOJP5wRmN1ErHjclSoSRii+/Y84izktiTbt5G
AgsJ+ZZoDqu6vv2LAyUYP0zyZpMfKXmn8RefpDqoht7EEkuUq30NbKybAfeu
9WKCKd6XxSeryOyTrlAvsCVx2IZujWm7jFwK+3N5ZERzcC7CaUhZ0J9pRT/n
BaOCfPmn6Z7+fGOhYiLIKr6jEK4Jn9vMRhTtYzL2WqlwZB1ElGyK74rejian
JrNIXxni3xShobYElJM+dkCJsy6eHJ00Wn7wCR7rU/jgN9+9y7LI7FB1ezy2
3CYuH01CxHhPQz/QGE9fS4nKp59Dh9NsYdTXyBxOuk1hYCb0l0LlsfZNNaSE
nEMrlJmiCS7hmfgMmbco1yKG0K4KwLhi4iajJCsALMIl4BtmBvDZkFoBL7Xm
GLhLAE46CqKpEOVe5DWRdmW6gcCXaBhcvro5ktohTi8JGWtvWZU/vLx5eyR6
KDwtqQwa/GgJ15ZU126T+YRAKT0BEUk1fkwTK5mm1dzwqcMh5LBCL9kSNn2f
70xiojEWcfUjChZTY0hu1KD9QbSGIYOlY+ZaJ1rKXDVQT36igMBzDLo6gQ/F
zYip2hRTD6sQMIE3I4KXVkRe36JzDgmjYlNxWxgNSlCc9684I/WOOcFMe2aO
mNBVjePUKy7QHmt5dlT9Sy7wzw2M8FKj90EbgNMhPdbWTovUo2eZnWD9DSbC
m0wCW4uQvctBEHPjECIKcubDv3fbEjm35J7U1XiTo17Tdfnsg8b93nN56NXF
u0hvsWXd8BuXJfl024o1iUJPIz1QEcfs06DwxQaTxmRZot0uHTFD0rUAQuOr
679ls2KDnUMwiMf8LCHUQSgxcjbYqQ6wFs5bF2yFNS66qTdkHj1/kt0WHe/f
5n7ZOAQFxtN9WdywvAE3zCmAvEyrHlkFIQw/wf5MRZk36rw3/XN6FUED4A2z
YbAfc54QBxxt6Z+oi5rX70/kizbwCRy1aCjBOCEWPmPUedeARZLXtwtGnVab
h4ZrMKX3WvXgJQ6C0M9KjiOiMfL/mhojzXK35bjDjMOTQfvYuwmicyHkYi5i
M9b7X2mvmlba9MyiNLbQzaeluOvfXHPrmhqmKoCSOkFVbqhjmLj2aYrTTrGP
vi57wC9Ntjun65isaG0sdjh9e33EwDBs0TwYnjylJ/UIUkWBAgroMVRTDB5a
M5OCKT4ZS01a+CBxFQipUGeHKdxmo94ktQuJbRzV3lULQMwCwv7TyqZt9mjA
pLiwaxQ5+ke/q7j6z0ogVYCw8cSekrSlGtYSEi7L6wP6kA80L+vMFpMMVtiL
VsYeJ6KHObF6PIOQF9nLAr3cA87JH8v1vKgGVkrtgszrkj+devOTxBjFd59s
HkYUm7dNqrv91x41TTs5ar4lek6FFFya3hZR4a3PxOSGwWcuahh8iP2HjzLt
ZMy8Y/DJkLzJr6CayxlvpfLnnWYAapZpgg4h+m7dX7/+qp2WsT4A5w+tmrjB
mS+t1Sql+UDOZi/Il3KZOA0KEZc3hmNsQL/BN1Vb0DkleZ/1d6rhozYn3iOr
72mwrQhHhQdFahP3U4rpK+RU8o7pNqPEIxa65hIcFo4kLFLCVzSsBNm/EoZP
jaRpTR5godEk2JRkI0hMX1uKRynsoCheHJmtAzI+C3YCejPViskOby7Dk212
c/lkBP95iv85noSARKhjwe5lFapExGeARc4KgOKrokJKueQ4ynsnnZtlNaev
Lt+LSxivnUGXcOXb2PgkAq1bsL4ZbpfRTzM6Va0BXpqa50MEBUtZtHTo+MUx
zGnbEtFEN6dXI9OWiIwTD/sVd63sJ596U5oLWlCmXFzFhjF5rxsMXfzjDsNp
GtU4typox/1GmIWnI7BTRHvEYUsf5pxfScwFJNHGfUW+oW4P0q2oh60smhqw
4cl/RqWTwIyKZgDyHwtRoC+uTO9dtM2It7HBgyS+Red4qYkeFRgJ5g1B7XiJ
tjcgmgf4TqV3JakWpDzw7CJgNBszZOzdqnUYBN9CUm/F39V3NKa8wa1vUS7q
YXgbX1q/6nvDmV9YykyXgsECLj3jPq/uiqauSJE6fH95fhS3u4k7SFteR2uh
mBf319Xupdgt5u/b4Ig1vj7pPPDDTxdnCoIIzkdaYwAgJMRicI36cSTxjwcA
APrOVpwtzNajOONyDkXhTNQVGRWpIu0WyT7cgwPKhbPeGUwM+qipxthbmb0N
YuuhNKhZ8TGDhVQY3393zJ5hqij3LqoxhysHqC80JDwMbI7K+i6Pj6KQ5Vy0
so6yNZKBRpEtwirToSiW/JcRlSL5j4BnttwcKOEivaGQwZoaj2C+UVdJorkJ
1wSRsjNKXrdFuHHrK1Ww+708PAUWXT+XrF70RWSvrUe7qrcldblGHYV46Bfq
2leR5mx16uiCiFCs1Q5VZ32eOv0+HKnq1F+sVIs+6cNknVrYAcs1dNxTtIMN
bKIczN58+Q9SEhYdcT99+Iv4whewph4is8uTPESeWLUn5RDJE6reF2Xpk4CT
rgC2mjq8nmqsaZFXoq8427PoAqxML5aCjuKfeEKU+4mHnuJDTz/x0DE+dHz0
x2yKn1cRvyD26LnZSEt+gb0YBYaqw8076mlAe516GlJlUkgV6zGf+1VtWA26
kCMu4fNVBLWifmifYmif4ECJJYK9XKPQx3u3rjunqbx/cxiwWTRggTRbokBg
vK/eX//tQrz+03cXb6fkOsWXl3h1C4JQvyD38wO5HpEhpY0y8P6bp9P3oMOE
a39AjeHbANL0dpKav3MLqs2+fIGmTtJJW6YL7jq6ckfXFjuEcn2a5ZZGTUVb
8IEX8qJwF44JYKwxrSMP2EisKZXAqGCx0Y9NN0VgWk2TD7+fZUYhVMIC6U4n
Ke1+uUFtC7I33kO4uUE0fVj0jMnrX+tCtL/gDqyxKZi0iPRN4lfFclViWWGk
gGs0w+MDZrUXwqXZ31xS0z3QJ2fGUjjEkA3miwCTPf4vEkuil0TnPf7+t9/8
lTRqhlPIVLRTf0+D717CjZh8CkoLAHbMQeSiC9uQHuEviuqqBilI0RSvKKJ7
UOybi+urEFY/vTpPspooFbqpN2Pkahtbdc1XTQB9Epr+wSLp2J017PT6vPpo
usXS96Jv9jU0OiMksM+ZFkd44SJy8I+AtH99f/pwzyPqX/37fWbnFNE2xYWI
5bDKi7ORIWuK5XKRsOiu62hJXmsm8UmRMqCQYiAeofHcuByXkvNTPQO3dd+X
PJrTJTEgJSvCOCIRSn6kFiL9YjsjN9RpSckYBGZ2F6L/ZdkI9gq6CQlg4/ds
SKsNY2lXoRDyloJx2vBQKfhM2/eXi7HcfwHn/q8kxpqAHyC0m+QrxtM/6C98
uCjb7zDAXxZCLBh/DM0f/dIeMzh9R2TVtLBqfBiFaCgK0BThAS+CQQCLoPoX
19TZDQ4X94M8vP6XG+wDKdLqBfY+MYXUaU8HPN6lBIRdhdy/tekmHnGknBCV
mzj3Juo+gBglvTI8zTSc+obNcHc1mh6rXUuxaNJz19pfYEaSJzSqaAe8ib20
C+tb5NWHgoN35zenl+9eMxzwdmX2B2FNRPger0+G701/DI8tWgHr73/z6REm
xt3u2s6ts8N3bzFIeyaAE6eyMgrynISefa4iK83FBTshfkMq2TdtBmOObPeM
SDELzSE5GGWKpiRVoK/e846fffst7DjmYQOJWQz+4dH7Q2u/cKA97hIfEx1m
jQijf4eX3lwL2M7eYZTpbFfla4Dvj5i2Gbe4MpbCj6dXRxhgWdd3dNAtSAj0
cFFKJV6f+wrkI7ryuboxXJ0G2IMdKcb4TZUSgFZE6dFJUgRsgfyG0gtC8yC0
MF/TT2aoOoU+V3uiB9LfRe7xost4PXg4+ArTwGkDfSPx/n+dCiq8gdO1o87J
wl5N4jDHl9GLzYwhimszA4wV44XrZqso7ebTqDeSpntUea7vCnajyPXEZlw0
hu5GUasdRA5g6yRwFQZJf0dSAACYmw6AMFiFdhI5//eV80mBfECaUCHSqz1T
l4s0Tyq6+HY9vUuLVAe+1cRV2neek3BjrI8ab9MX4Y4jeJ4zTIDIdnoT3Kgf
w1Vw9ZecpNmMpONA2ClqF/5N6yCF5SOCjPr+THaNBrh+lhBk9evRsMh71KuC
dHekYfkQJ93xaS4dYUaUVI7b7rkgHOaJAl2E+wXWuMpS7k5M+dCQDzdDn71P
Sg5BUkPXUTFjhDaJ09FHgckMs1Im2DQVxSWL2bbMm17GxN6WwYFkIklCOu22
ii5JihWH9GlCM0NdvT3QU6FjFUpSdmtPsnd1pwlGVYZnP9q7djZ6DR+UG0c+
DT0kgaR535U2zQhp7Pvh1k/LlFP5Ajlr2+rvPR/fE4zyvjwGhfrrvUntURGk
den7FPA2mA0DSsOInd4MB4FhpNxintWyKv7h7LapdhnlQRqF7+1f74ydNduZ
XH7ki0rjPLchzdoEoMPkfjst9YqVqw7a2KlpKqLozWYeK0go83w9Tdsby0jW
4czh+Fh9EJqG41SrwZLjTxWQ++PUETWikkn5cIL4I8MByl2vZtFkMFATAQmH
sl7VS600twbt7F2c2H+yakklVC1LyxrldrNhFe2gXypB2pL4rziPjain8qoJ
NxtY7ENXPsIIRwZSl8SQUeBq6xG9vDkl2qjxHw0Q0u1u+xvrt8HrY71FoDgA
oLXE2dRki4327VdZKBcUMg8MPRkWhiqiJMH9DEqbnw2ZGxqBZG6kTyHlRL5c
7t5TadfvuY0DRmv3IowR1gbfFkME3Gsu4CnXzYMaS3haaQqs8J6io8No6ls6
yhZFBF6jTU5qNvng1Td52ymwYyjnu8DfSTps+D6VT5khPcHju5aRrOfmSl8i
L3xiNV6pAgrNOi5MEPaLS53lTcMJ3rdYXELy2hOC3HUbinn4sIziYvf/H//2
v1smTcBOzG4escWsqER3UQ3d7tnb1ChLL2I1LijEA+OmfyB08U0b44ZaYni/
EGXA9noTeFRhJ4VZY8w+KHc18cbbSE2Pl7Ry/XHwDDz+DCMlYa5fWpYUs8le
KVJaKEuBTXvavrdDr7kN7YkajEqhfK+DcE+GYFBBszxTFZ/StfCHLffrx+SU
dEzOwIO9orbdkoYdhEtosTrQh0dTRZB5YMs58u2moZk2DhHYkFLKZBWQoQCh
f1FnX4SmIiJpX5OIi/jtz5IV+73TE0wDzCQJyQj9uEhPjpJO9SHRNvLJOME7
LnIqklGDJWZTRDow4VqpxzRMKUIanDU2WYi7eBbQPijFBqnWFJ5reWtZGqXz
i9lLPzdDuTc3+fUtFlTpUo/Dn+ERE8di+5/lGcN9cwjry+TODenBWkNj+4oV
ZGcivlDjeiwEnBcyvFdnQlHAZxpGObUV6jjoZ13o0Ylotu9If24fzx3x3tb6
jT6TLVvKCWZwm3QThrlhWWWbuI5+9r0x2d20383UwynvlN9nzO/3UP9UlcUH
vcbGpyiMuA+BadpoMd9emJ5tN3j5hu8WQrYAaDnBNtLwCDv+eCJyeFDX+J7v
f0SO/0Lvh0AwIji3mz+1YQhJwEHTKwIuNuiVy8cjlhCdebivPR6Q26mG1pbJ
LZLGbO5HFtD5y6pof8zY3TLg/3xAdRrG2y9z7Xvf4Of4HjRgEap4e14ishs6
Cq6tkB358qMHXa6oo0jyYNuNYwLzDqM6Sg0diJ29ufp5+i779etyc59Xvx0c
vKnvsyvM3wFynLtsClzcX3hxSA8fRVvJ4Rjnzl6X3rnZijqaFBSpx/RyTrug
LObEbx+umOdYbEhToAI3xPCiZb1JCIc1G0rFM8NGk6o0CVnNmLjrs09eTJ6r
ykWuYQZBNIJm0gBJbHBjkTc6aZsRt0nhvpJ4DxV55fiySbm/m/peA+0sq1r7
AmomBQKu75HGkkXb43ziW4e2etnLPSeFbtuAVaalqAgb9f8M7FTvMNb0j++f
ffctdYt8lL2p3+eEHL/Kp/Q2PLluNly5EqkDFVUMalwo3BoHrJe4dO4n8A5X
TUj2dceeseAbChX2IHv3U3w9fOszgaebzd/wb3UkS4MAqRzVATd6QShhGyCb
k4a2WFfgS0sP8fExGgxObsKhL7hpZJw2qwPj9k1mq9xlKFm4N/7+KK3+zef5
hisFQolEf43sbaLOMfGQLce0SrckttW/gym+Xp5iKLdYtlpx94hEwJnGNYQK
Pxfj65/ehZqZ14Ur5wlzeI2sgTx+gdT+2RgMH6XiAVsGoCodlddz+Vt6qexF
F1ot5Nnz8X2O3rJqDsf9wcWZFLmtYG1FCOpUybi4o3evxshCelfjqDmTPfvh
6mpPQ/92hpdE25ZQjH/jVu5P5tGut7dMLMB81DX2tp5vsfH49cXbo4EkZNLM
ubk8e0jqhrsJF8tF/TEEHy3+70uJb6WhgU1/5guwp60WU8RUD3KlNNEec5+4
MCMuJCDdbYDh8SXjpb+qlIr5FyBJpTFxZLzrpeeM0r3Qj2w4pXNb1hq1B+nl
rXtwykjKYw4OXvsr97AHsgakZqXLG09fD8sEN95zdZO/38Egiy4tSklM+AKs
iif8Q/ni+67dezg5Lblr7xU7ed7XW7Ld9pZoKtn/GfWYVO9XchVRlCigvnUf
tNfKpf23DHPwSUa2V97R1zXIbeW+hWaizcSKT++dNe2ITFaWhfkfy64659s9
JaAsTR2G7q9ufX6vb3DAN4jBSVFUK9qnb5MZo2n0jERg912rEbrP2Ise1May
Ra8psCQlGkCMkRDQKzv68BsmO9M3P1CGc1TOACyIn4q+BWlRYK3GfEuBH7po
kWpV50FDwETWK9cRy1bt4K8sNCfZee9yP0QlIHO6+xFlK/4b5gzfUtqv5lHc
MkHwV5PsDb2vbhYuJ1AAVrpthQo3FRGfkJlpLslKtnegLS8OTR1gUComJNf9
rOMuKaEZ9mkER9sJ/VAcDHprKQUCjzhrUVb5TtWuv/KuZU9VaE1BnQdJtVi6
bqDLgCoVzKDTYU8NaKnkivEdzT4htfgNsMip5u1IrpOsONuIG1rET2KoLM9+
fgMs8xA7STYgsbHdy090rStp9V29Ec490g0yU6OVR2wOUyzQoa8uHXmcAVHz
VRoZr401GJkx2iG1IN5QRjkQSYyX1KXf68J/tWpd/8RBVqOToi5dQibR5Zt5
NLlGloSByJmkBxByq0YZMK0l+eCZ9KIsdVLPvVJ+lRfN+B7rW+XWPFG2VbBF
sygFIjyUCtC3BZYIaiSHapr5RmY5BmC8XgNHVsx23CJndCQKMvowtyZj95CJ
Z2PXdYTmTXzMACT5AqVyKXdgy1c27yPF2z7jgAfTQ5u7DdEGMkb2JwnC7Zgt
+ZRjvMNpGEKThF2o4SGhMd7lxdXdt/5Be0j4Gfb+w0+gzR3+UNa3gI8/oRwE
bjPlagXXSoXG8+OXT9Fb72UXR7ioSTTRUiL1KYZhpySMm3FVBGpud8Uc9eIl
TyvFEXgEa5dXFENHV+zdt5m/ZO/6zXR6CnovEhml/MgaUf+oI83lyI+n4o0L
xuZ36JhpQ9EBirhF8XHiZcsXd7aIaupMZ4t+y4V92pMAbrokLSlVniL2EGHB
KaABXiLr9hUBnAOa7PnMVUwXXtHv1Qe4JmF5SV2AuQL5j6hvIix9FLp/67B2
JrA9triBq08FjElgFC7dIQ19UBnqq2SB1Y6UUP+Yauad7Wn4DuzOll21o/69
YSjjjIFijRI5DtX7Y87cpT03enxTHMrSswQbTq3CbmIQoluP+gCK5+zXr9Gx
QQpY6nOgOop+5zjOogRjhjLKTBM5ozmHAGMu/SC4SybnWtbczCOgAvcxlpgY
O2DYw4kMYrNtsJuDz2k3r4kSQ97F+YgDlXJxiGkYYrpmpBcuk6Q0A8rNSM+a
uQ9I0l3RI4raDaRniTYthYTXWmvFHT7Zb2A6GHgXOl8+weAAlkwnWzDjpqRK
zAxHD1NBXVCtHrjI2xU7KeRCSnuf6B6IGos7j02GcE4+NTlB6agCJ7qqcyQE
wg7OtD00hoMMhuZNdA1TVPhXJF3mwAYvJGLsa3jckNA1ATAuyOxpoGwBWte3
+k29rWNIUurE9/SXMWiE5xQqj6XRuSEqcnP7zt1CY9S58re4xQPJQscJX9jX
kjBZtQcp8CTPk3oaEBNB2blHiGzXrAn4/rNirZqZuU83Z0Cz7PWx49CDVl3V
uI9xcrk48cmzqyvtxuQbYzKb4pvwJMa87w5x7o55pXKbhrx8O33gLrRg75ib
0UKMG4M8NMr59c2JIlJ0VufSFyS7mdLT6CVilo8VfxxND35pLdWRLro2aM/C
BKNhLNR6iYIKj6/6caivfKQBUPDO7eL6ldFD8SQfFuZtShfVE+qJGd9rwzw/
9Bse9Wpdg8JP/KMmiUJOEFSfek4QbNoUbr3EBlT+Rmt1las6zuWowtrZT+a7
piMqRZRnUMkCMroZIY9vco+Sa/0V6hwDUMfFxKDTnEmm4ci+JNBFN3xIC3Y6
9Ca9+kgwfOBm28vT17zqPbdXrHyPIU5tqUsVxnFPL07/5M4vMZOZBHy+8ZRs
55DUBIPPR0bs67VuAa2TkQMGizkSc0Vfv7iHJ2tocDAinCJp1MFnD8j6KSxi
1/Bg5O6kBhISBBppnN3kbPtrN/AnXxE/1LmDb7pGlPRavEFH3wo5hE9ak5/u
Y85D101fX2O1ayiC1ssdyDUE/zH48zb/oBlDgfn6e4mCf9w70H56fyGwFa71
ppYioURn9io2yySj+gwnTwsuUa0wNi/aHSFoQk7QSYyMg83nSbJGvQUVF237
i8iFm+Kk7Ooas3mC3Sx1VwBbWMA+9svOUGaVPvYXaWbfxBmVLNus4WYQ4Fpd
B1QRyWMFxAxBpP7FTHqbQceXprP5zYXwqm579hSRxWB/RvKZxZ0euQcwsUYA
r2g2D12QQ6g21RqNIEVZ3QvdUuiia8k+o3l96kdIaNDmJZqchM3KirQqJVLk
NWdHdjdWIg1oTiEQbHG6r92fKHXeMZ3W48SdBTVFccvtWAmtNKxvUIaio+bq
LePTTqQlgkIPGhMIEqttxOYP44i9upq8gXGIgJeDjX4EyQGnqe1P2hjAMGc+
Nuy53T8yW7L7AHqaimCLnZqF/RB/9WNpZmCSl4XJNUkbdCaswt7IdRJwntph
hMumzuiCLaNah0AD+lExDS9szoIv6X8TGSV9WUmtukMjM1ygbTN6socm8/jW
MQkYmw4F6D41ic8D95QmV/QkghEUlIEK5lif484Ech+ZSHraQUCak0DoNk7G
jdhV28DGRdJaP80+GiJ17R8XmjlQApu/McPYU/JMTwfjk4pJjqplfDHI/jp4
YRoYHd9Tv4klAm2+kDQgLQnmvPSkQ4MA1De5NDT2gAJhE66iAjpUr7dVJRl3
n1mbR6757veW57HybNyPfOTsyelLwsQZGwRiz/WDpMo9GE6sCB60bDwUrMkn
Yj4tuGWbwfJD0U9MNEf9VsjwyXDQaGBsOG/YlapGs/wJdvNBktyERjC1qfFV
YF6rkpdgwz9usY88ui+p+Ks5OBD0TSNYcYqol98nMBZ3SdHa3JmEvDfkKwVO
BuvOtaGGwwfUd3twcB5dHvAhKvw+iVqzxM8mdyGcaIkPZ6mGhwnde/WHtr1d
bsTBSUQWgy3e5N94NXlBfR8z6285iTrNhOvOdSBzJ4N+FXm/Dw6uCHIKm4ob
p5pcT8p0JJmVeNXjxcEDevu1YrDaFrGV3M8B9kccu9j7mxkAFHUpCZt8/F4K
8/wDUfiN77OjmCBfatHMx+RXjNR40mzuXBUqLzywbbeft9Pr6SDlFIlvXihI
/hTPk21FvKZ8qTtLOekYPU+U1Vej+3hGn6y5I2eu+u/ZTQsPUNuByua8sUM0
XKvU9262we4Ry1WCjpE+ZJI3RuKo3XFv3o8a9pYlm6vsvexqjZwMEtYveETZ
TZ8q5IBD+jp7V2eR49Tqk/ZCs16DsWFREyvc8ZZls21RcUY5e5E5xEYCv59R
oA30T197qdvldEs19iBFxjOnTDtpuKjWXVTAqGrCaO8B2FetKgLrSG7XOEsx
7vLexVe4oKZNF7iEvg6J5iMXGnYJ3KOS5LgTpMYeDg5CVrCSCcGDwWGVHh8L
k/SgOLqTC+9tMSkUTwMdvYx3RBL+fnlxd4ZbZftxJZhKkNO+hYi8wUzDJi+N
h7+qBwgm1uwFLy++EDiEKK3r3eNA7mvvS8OayVjvC70TldvVqlN3qoXZ1GXt
xIGaHnZMxa54OnpSPC/lrI3YODz+RLqr6vkRNvQodT+bytUMCwhut3zIdxr1
8v7lyiFf8ZYqSXPHnnnJS+Nm8nFBrpZH/YgYY6M2VYLJHh42tmUbVPpyGU6R
pBtcOixF4V5HGhkJlli+rqulV3JCm4GBTpiJOaFg6wVFzq+DqEniP762Y1if
VE4xnF+rbuw4Z9laYzizsch89pn2+7uLo3jDd8YQByTap11yb9Aesw0tiO5c
WhcaN75llPctITVgI/qKjMV5niE8ZPJIhuJALNLKUnGcrIZaAov7r8uzjs5B
u19DIPOgOQnG2GzKkFohxzwaCPIDELFkbhh0YIRHWStcFNrr9JOgBzNk0wPV
mhdeb2BZrwGJUVYs+Fuag5xG0gLdO9JG2cppWZcg5sOSVrUWo4gEgNMZMO09
PEqghl75qhENfX8uwO/s6irhDIkY2ttII6hXQaiQgoNiFkzXjoThgHnmPYpq
oPEXoF5Ogent/tH3cXNDJcpfo1Yae8KPwGruCrrArxBRoB1OqYwF0UOy13c+
RcGvRl2UlHaeYzjJz0DBbRNqZx6I2oEGXqN6F9YjiC7WhAl5a13qBa/f5BAx
xc2wIBCsfLrv7CZpNOSDXbhFZKVJcCXWhbGsS7iFRPdt0DC+RylvHojaDFTM
0GKp7lu8Omi9t3Hf/4vWnwDf/jJ0LXNPrO7h5ocpL+uzsqO0z0zCFpUPReVD
RuDDuSGq7gf7g4q85GJ4R4Cp3XU9K7vwerD1OnmW1FfdbMOaPQ1Ck3AqSn+W
+r2LZcMkZtSli5RrVPr74RaBjn11sHOReHqMEhP59ou4hbNmFoRrPuYGIaK7
jYKh95lLSV3zWXptWZpeNcitQuX2nhwvYWL8KzqZzpOeZt5WxgbLcgKSJRT5
m6htW6U3OC8GdHAShQlqhwyXnfRNFR7jGZtowtK6ziYlFXKXtqbecTC+J/jo
6ocOE9tD04UkMS3tuC9qNDuXZZNyWR4WG96FQAd3B/EKg+/Jy3lkg2Io5EC1
vFjvhUCWTMzpoWPmxXKihk8KMjLfSEvsA6UkwOqSMA31xfj3RUeZkI8RbQep
796j6RILAE230oNPNHG8E5I013KXILGX9JH6b2/LIAbKrvA2tF2JQzA2tyvl
+RquIPuTK0Js6Yb6zpXpUSQtviqKmHPeIF+J3egIHHVWGAAlxVnhSt95DzD+
hFchwyQ5WVLfp1fe2NDbe3rX56rlnxjdeI6j2JgV39Bg6ZDmEBsE3ZdVitsP
zgGCkte4Pm4AoIG5xLdxM6IzT4+ybWRhbHrFWpFHTb30zLvwL3wlhT8BybRF
oEbhBH8QMeGJ18RKMF85xawAL2SIU8rTyKYpSMv5JuuyAK0RcRdvXVKE3oHa
t5XirbuQ9sYeDLLhwr1UjO7hnvnE0kCbLjKedGkebUxTk6FUjV4rmHC7KS2H
cML23dinqRu+7zjKwHYlqxkSK5J8KKU73wdAQkBme9QdShlR4/Tyih03zGfF
QZoTcJ6acHoPzGhj/WjMSt3MgwJD7ddo8VHhF56xbxSyp92S1Kig31Jb7X9x
XBrld7jG91QUcT5/NDTRIKArvLyflLwNdDF83XK2cJKghvX5rrF0FM5uuDV2
q+Xy6JK6VgiHbI1oVf2q/DAM3VrIF7wp8YQCoLiPE+79XV3h/bwlEShYO7dN
4RblzhfvsyGwxjZ0VP6jC8pbvvQ+7jKg0UTQAKR433fUSSd+jSVqJV1xQZxa
0sNQKM8d8ChmCJGnZUEZdj5vqZqHZI7WYc5vh7KElKQ9bZGtotQVnE0hboI8
XDnGpciY68SXnI2oyE9nji6tUF4w5eotWv7DTiT2icfRDLlKArNtUHtclOys
C9Gaf1alVkhjGjTmPoSED+SmRWR0bV9d6TCvfE8/uaPRzvk/QpNiNV8/Vb4P
u8fO1aixkhTYbig+w1lfQUL0BsKiH84STh7yQyO3AE20mpe70b7DxU5hSZDp
1jpz1HZHR3HUqFGg4e+KlDAGMWcSHypi8Al+m+5liScqsQOUYGg5tzeaMc8n
bmNbkM2Ba0nqpN6eyxh+V1uHI4y3SrYK+AmPwUGHhooRJNYO/f1Fu/aJBHkb
ksii2FbyZuOWwGVLCfCDekusUlJsMaSDBjvJVfaD8v2j/IW6WIyslr6LhER4
Nr6iDAuLc3Vh8O1CqKEs9Cp7KhejXMamzuf0F5AcFu0TbcY2wFD+G/biAUWi
levbuaHiwIx4eMi5MJQH++AsJ02mwdyp0KhpF8X9gJ461oGV9/CobSqrubfB
q14TlahHd+Dffh54lLq84Mj+QOVSZ3FH6VChFwsnvns/j2r7a0ewUkBhSAhr
R2nBIgAvpu+mA8JPY6NVzU8kgohD3sZlRtZwNp15A5juzjk4+BkzZTGoQl2t
aHl59SG72QIGYbFdk4+yHzGFtc1u2tmqXriqkADOW5AwuSuz9/hvM2+Fz4UO
7WhXwaqAphYAOGwfYrn6+3yRZ29BDFXjNyCV/0EvU8CHu6tSdsp4TG1HDv4P
c2GAEh/fAAA=

-->

</rfc>
