<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-latour-dns-and-digital-trust-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title abbrev="TODO - Abbreviation">Leveraging DNS in Digital Trust: Credential Exchanges and Trust Registries</title>
    <seriesInfo name="Internet-Draft" value="draft-latour-dns-and-digital-trust-02"/>
    <author initials="J." surname="Carter" fullname="Jesse Carter">
      <organization>CIRA</organization>
      <address>
        <email>jesse.carter@cira.ca</email>
      </address>
    </author>
    <author initials="J." surname="Latour" fullname="Jacques Latour">
      <organization>CIRA</organization>
      <address>
        <email>jacques.latour@cira.ca</email>
      </address>
    </author>
    <author initials="M." surname="Glaude" fullname="Mathieu Glaude">
      <organization>NorthernBlock</organization>
      <address>
        <email>mathieu@northernblock.io</email>
      </address>
    </author>
    <date year="2024" month="April" day="11"/>
    <keyword>trust registry</keyword>
    <keyword>distributed ledger</keyword>
    <keyword>did</keyword>
    <keyword>verifiable credential</keyword>
    <keyword>dns</keyword>
    <abstract>
      <?line 88?>

<t>This memo describes an architecture for trust registry membership association and verification using Decentralized Identifiers (DIDs), trust registries, and the DNS. This architecture provides a verifier with a simple process by which to determine and verify an issuer's membership in a trust registry.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://CIRALabs.github.io/DNS-Based-VCs-and-Trust-Registries-ID/draft-DNS-Based-Digital-Verifiable-Credential-Verification-and-Trust-Registry-Architecture.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-latour-dns-and-digital-trust/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/CIRALabs/DNS-Based-VCs-and-Trust-Registries-ID"/>.</t>
    </note>
  </front>
  <middle>
    <?line 92?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This memo aims to demonstrate how trust registries can enable global interoperability by providing a layer of digital trust in the use of digital credentials, demonstrating that trust registries can facilitate a more efficient and trustworthy credential verification process. By leveraging the publicly resolvable and widely supported DNS/DNSSEC infrastructure, entities looking to make a trust decision can easily validate not only the integrity of the credential they are presented with, but also quickly associate the entity in question with a domain name and organization, as well as their authority and trustworthiness by confirming their membership in a trust registry. We will explore how this implementation can present a more decentralized approach to making trust decisions, without having to integrate directly to all trust registries, but instead letting entities involved in private transactions leverage existing internet infrastructure to facilitate their own trust decisions.</t>
      <t>We will focus this memo around a use case involving an individual or an organization receiving a verifiable credential <xref target="AnonCreds"/> <xref target="W3C-VC-Data-Model"/> from an issuer and storing it in their digital wallet. When the individual needs to provide proof of identity or other claims, they present the verifiable credential to a verifier in the form of a verifiable claim which normally includes a digital signature. The verifier then performs several steps to verify the authenticity of the credential, including extracting the issuer's DID from the credential, resolving it according to the corresponding did method to obtain the issuer's DID document, verifying the signature of the credential using the public key in the issuer's DID document, and finally verifying the issuer through a trust registry grounded in the DNS using URI and TLSA records, while ensuring all these DNS records are properly signed and validated with DNSSEC.</t>
      <t>This process allows for the secure and decentralized verification of digital credentials in a manner that is transparent and auditable, while also existing alongside and independent of the many different decentralized identity ecosystems and implementations by grounding itself in the DNS.</t>
      <section anchor="note">
        <name>Note</name>
        <t>The standardization of the various implementations of DIDs, Verifiable Credentials, and more specifically, Trust Registries, is required to to ensure global interoperability of the diverse and emerging digital identity ecosystem.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <ul spacing="normal">
        <li>
          <t><strong>Issuer</strong>: The source of credentials—every verifiable credential has an issuer. Issuers can include organizations such as government agencies (passports, verified person), financial institutions (credit cards), universities (degrees), corporations (employment IDs), churches (awards), etc. Individuals can issue themselves self-attested credentials - and depending on the governance framework of a digital credentialing ecosystem, individuals could issue credentials to others.</t>
        </li>
        <li>
          <t><strong>Holder</strong>: The recipient of digital credentials. The Holder stores their credentials inside a digital wallet and uses agent technology to interact with other entities. A Holder can be a person, an organization or a machine.</t>
        </li>
        <li>
          <t><strong>Verifier</strong>: A verifier can be anyone seeking trust assurance of some kind about the holder of a credential. Verifiers request the credentials they need and then follow their own policy to verify their authenticity and validity. For example, a TSA agent at an airport will look for specific features of a passport or driver’s license to see if it is valid, then check to ensure it is not expired.</t>
        </li>
        <li>
          <t><strong>Digital Wallet/Agent</strong>: A digital wallet, in the context of digital identity, is a secure platform or application that stores and manages an individual's personal identification and authentication credentials, such as government-issued IDs, passports, driver's licenses, and biometric data in the form of verifiable credentials. The Agent allows the subject to establish unique, confidential, private and authentic channels with other agents.</t>
        </li>
        <li>
          <t><strong>Verifiable Data Registry (VDR)</strong>: A storage location where information relating to Decentralized Identifiers (DIDs) and credential metadata are stored. Permissionless blockchains or permissioned distributed ledger networks can be used to facilitate the  discovery and resolution of DIDs and credential information.</t>
        </li>
        <li>
          <t><strong>Trust Registry</strong>: Trust registries are services that help determine the authenticity and authorization of entities in an ecosystem governance framework. They allow governing authorities to specify what actions are authorized for governed parties and enable checking if an issuer is authorized to issue a particular credential type. Essentially, trust registries serve as a trusted source for verifying the legitimacy of credential issuers, wallet apps, and verifiers.</t>
        </li>
      </ul>
    </section>
    <section anchor="the-role-of-trust-registries-in-bidirectional-credential-verification">
      <name>The Role of Trust Registries in Bidirectional Credential Verification</name>
      <t>A trust registry is a decentralized system that enables the verification of the authenticity and trustworthiness of issuers of digital credentials. Trust registries can be implemented using distributed ledger technology and leverage the DNS to provide a transparent and auditable record of issuer information.</t>
      <t>When an entity is presented with a verifiable claim, there are three things they will want to ensure:</t>
      <ol spacing="normal" type="1"><li>
          <t>That a claim hasn’t been altered/falsified at any point in time, via cryptographic verifiability and Verifiable Data Registries (VDRs).</t>
        </li>
        <li>
          <t>That a claim has accurate representation via authentication, via DID Discovery &amp; mapping within DNS as described above.</t>
        </li>
        <li>
          <t>That a claim has authority, or in other words, does the issuer have authority in its issuance of credentials, via the use of trust registries (or trust lists).</t>
        </li>
      </ol>
      <t>In this memo, trust registries enable the verification of the authority of an issuer and by extent their credentials. The role of a trust registry within the context of this document is to confirm the authenticity and trustworthiness of the issuer to the verifier after they have validated the digital credential using the mechanisms described previously. This involves the trust registry taking on the role of a trust anchor for a given ecosystem, providing input for the verifier’s ultimate trust decision regarding the credential they are being presented with. The assumption is made that the trust registry would be operated under the authority of an institution or organization such that their claims and input to the trust decision would be considered significant or definitive. An example of such an organization would be a government entity in relation to the issuance of a driver’s licence.</t>
      <t>It is important to note that the DNS based trust registry mechanism described in this section is not meant to operate in place of an alternative implementation but provide an easy to implement and use mechanism to extend such a solution.</t>
      <t>This section also does not describe the process of the trust registry’s verification of an issuer, or the process of how an issuer would become accredited by or join a trust registry.</t>
      <section anchor="issuers-membership-claim-in-a-trust-registry">
        <name>Issuer's Membership Claim in a Trust Registry</name>
        <t>Once a verifier has successfully completed the credential verification process, they have definitive proof that the credential they are being presented with was issued by the claimed issuer. However, this process does not provide definitive proof the issuer is to be trusted or has the authority to issue such a credential. The issuer, through use of URI records and the <em>_trustregistry</em> label, can assert the claim that they are a member of a trust registry.</t>
        <t><strong><em>Ex: _trustregistry.example-issuer.ca IN URI 0 1 “example-trustregistry.ca”</em></strong></t>
        <t>This record indicates the verifier can query the <em>example-trustregistry.ca</em> DNS based trust registry for TLSA records containing <em>example-issuer.ca's</em> public key/s, proving their membership.</t>
        <section anchor="uri-record-name-scoping">
          <name>URI Record Name Scoping</name>
          <t>When trust registry membership claims are published in the DNS</t>
          <ul spacing="normal">
            <li>
              <t>The records <bcp14>MUST</bcp14> be scoped by setting the global (highest-level) underscore name of the URI RRset to <em>_trustregistry</em> (0x5F 0x74 0x72 0x75 0x73 0x74 0x72 0x65 0x67 0x69 0x73 0x74 0x72 0x79)</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="trust-registry-membership-proof">
        <name>Trust Registry Membership Proof</name>
        <t>The trust registry can assert an issuer's membership using TLSA records.</t>
        <t><strong><em>Ex: _example-issuer.ca._trustregistration.example-trustregistry.ca in TLSA 3 1 0 “4e18ac22c00fb9...b96270a7b6”</em></strong></t>
        <t>Note that the first component of the URI is the issuer’s domain, followed by the <em>_trustregistration</em> label. This combination indicates that the domain expressed is registered by this trust registry as per its governance model, and this is their public key. This association created by the TLSA record effectively has created a chain of trust, beginning at the Issuer's public key, continuing to the issuer’s domain, and finally resolving at the Trust Registry.</t>
      </section>
    </section>
    <section anchor="role-of-dnssec-for-assurance-and-revocation">
      <name>Role of DNSSEC for Assurance and Revocation</name>
      <t>It is a <bcp14>MUST</bcp14> that all the participants in this digital identity ecosystem enable DNSSEC signing for all the DNS instances they operate. See <xref target="RFC9364"/>.</t>
      <t>DNSSEC provides cryptographic assurance that the DNS records returned in response to a query are authentic and have not been tampered with. This assurance within the context of the <em>_did</em> URI and <em>_did</em> TLSA records provides another mechanism to ensure the integrity of the DID and its public keys outside of the distributed ledger it resides on directly from the domain of its owner.</t>
      <t>Within this use-case, DNSSEC also provides revocation checks for both DIDs and public keys. In particular, a DNS query for a specific <em>_did</em> URI record or <em>_did</em> TLSA record can return an NXDOMAIN <xref target="RFC8020"/> response if the DID or public key has been revoked. This approach can simplify the process of verifying the validity of DIDs and public keys by reducing the need for complex revocation mechanisms or implementation specific technologies.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="DID-Specification-Registries" target="https://www.w3.org/TR/did-spec-registries/#did-methods">
          <front>
            <title>DID Specification Registries</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="AnonCreds" target="https://hyperledger.github.io/anoncreds-spec/">
          <front>
            <title>AnonCreds Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="W3C-VC-Data-Model" target="https://www.w3.org/TR/vc-data-model/">
          <front>
            <title>Verifiable Credentials Data Model v1.1</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="alsoKnownAs" target="https://www.w3.org/TR/did-core/#also-known-as">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="services" target="https://www.w3.org/TR/did-core/#services">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="DID-in-the-DNS" target="https://datatracker.ietf.org/doc/html/draft-mayrhofer-did-dns-05#section-2">
          <front>
            <title>The Decentralized Identifier (DID) in the DNS</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="verificationMethod" target="https://www.w3.org/TR/did-core/#verification-methods">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="RFC8020">
          <front>
            <title>NXDOMAIN: There Really Is Nothing Underneath</title>
            <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer"/>
            <author fullname="S. Huque" initials="S." surname="Huque"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document states clearly that when a DNS resolver receives a response with a response code of NXDOMAIN, it means that the domain name which is thus denied AND ALL THE NAMES UNDER IT do not exist.</t>
              <t>This document clarifies RFC 1034 and modifies a portion of RFC 2308: it updates both of them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8020"/>
          <seriesInfo name="DOI" value="10.17487/RFC8020"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ToIP_Trust_Registry_Specification" target="https://github.com/trustoverip/tswg-trust-registry-tf/blob/main/v1/docs/ToIP%20Trust%20Registry%20V1%20Specification.md">
          <front>
            <title>ToIP Trust Registry Protocol V1 Specification</title>
            <author>
              <organization>Trust Over IP (ToIP) Working Group</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="Pan-Canadian_Trust_Framework" target="https://diacc.ca/wp-content/uploads/2023/03/PCTF-Trust-Registries-Component-Overview_Draft-Recomendation-V1.0.pdf">
          <front>
            <title>PCTF Trust Registries Draft Recommendation V1.0 DIACC / PCTF13</title>
            <author>
              <organization>DIACC</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="Self-Sovereign_Identity">
          <front>
            <title>Self-Sovereign Identity</title>
            <author initials="D." surname="Reed" fullname="Drummond Reed">
              <organization/>
            </author>
            <author initials="A." surname="Preukschat" fullname="Alex Preukschat">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
          <seriesInfo name="ISBN" value="9781617296598"/>
        </reference>
      </references>
    </references>
    <?line 190?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA71b3W4bSXa+76eoyEhGFtikJHv8I2x2l5bsHW1syZE0niyC
YFHsLpI1anZxu7pJcQYG5iFys8AGyLPkUeZJ8p1TVd3VJLX2TTIYSGKz69T5
P985VU7TNKl1XagzcfBerVQlZ7qciYurW6FLcaFnupaFuKsaW5+J80rlqqw1
nrx9yOaynCkrZJm778WNmmlbV1rZg0ROJpVagejd9cW1SMWYP2tZa1MeJJms
1cxUmzNsMjVJkpuslAvwkFdyWqeFrE1TpXlpU1BPc8dFWtMu6fFpYpvJQlsL
UvVmiVWXb+/eCfFEyMIabKnLXC1VSaweDMTB5fgNfpkKf93cvTtIymYxUdVZ
koOJsyQzpVWlbeyZAH2VgOfjJLlXm7Wp8rMkFbyrqJxsGzzIWchJU6tcFCqf
qYof5vgJ/emplpNCiazVFX1b2iRZqbLBhkJAmnkzAaPnlzfj93JiR1B3+kZa
laefzp3MrNG002h6eXGApdCMIksczOt6ac9Go0Bi6IgOtfk6YiOn6e5db+r0
UytC2pnbP83YfLskN+m4yua6VlndVGo4rxfFQZKQaasFlqxYanFnLj/2PWUj
bpcqawnzW/gv+OO+BR8rU5vMFOLTSX/xgV8sm3puqkAK/6Uw/ezM07mGhQSo
HhLtp+IHU92Tu/+hMs0y7C6rmYKKg4a9YjOzGLErGDLyclTb9cx7ZPCNtJ6O
JoWZjBZSl6PVyQhubUe00z+eHvP++B0kwZ+fTvCjJ8RwkRMXH2WZnstS5lqW
nvF3FeIDLnm/raSP5/D97fgTF2RdPADXC0QCE4fKhsfi4nJ8fi5GgtadPPuS
1vjtRxQD7rJsmMnRepkiimq4yqhZFkbmdnR6fPpsdPxsRLvsut+5WSxNifdT
ssdKq/WfmeGUGQ78psTvcJlPaf9bVUzTW9K90rNSXLJj1pttbTzy2mNipp3A
yERIARdDKE3l0WOXly6qZrEwyHS9b3eWj4dwUNXcWyTHeofIuFAPu99bRTqh
YInUf3n75upMvH756uTFycvT1y++ff3Kf8lZS0C/J0lS9uLr4vIi7XlTpPJt
PeHdfvj0kvd+e6/X6+H62RB+Mbq7gfXz1IJC8H4sHD2hhwsFHeeWiIxLU1IS
2dm+/WJ/DG/vPEeWr1yqjfKcBBHKspb5GNHaH56dI+mlF7KW6QeTq2J74y67
RcUM4YIFgheI1cnw5Os0sMrSnDZa0DrenurPv5RmXY53Fa4ybFbJQv+EsuH8
cqpVZcUhbGGf0r7HX6/5zFRq9IT2S+9pw1Sywi1FU7bH3P8Xu4fNgu/pMq3n
ikrKTiKfK/EYC8zBUwIbNb11dfsYG6RrrM/u4QRa1VNmCBl2ROXGl7OF3FRz
M1XADmCT8MPxt+Az42g4JcKrqJB9YE/9f9FVvG0bIUlIR5xHOIH8cSjOZVUD
UrRZ44/KWhU95bxMZZ8+KJSa4kz8SO8gFdM7v890JfF3n+p7hlQRVZn9pUGh
6J7vpeveGjpAtofyh6H4QyGbXHWUP8h6rlUTPWfKV6aCgavyTWGy+2iLhXv9
96X/fkLfI7yTJE1TAWRDNq+T5G6urViohRG5shnwF0NPISPgIYA3tuAarQDY
s3O9FNJakzkEyqA1toloLMPeL9h+0CePnDdgUt51h4K57PG0rMxK58Ss3xAu
v0YOw2erF8uC30AUWTHZiPVcZ3NRk4yw5EKXquN0Q+IC9Taq+sbGciF05JbY
Q6e9hc7zQiXJE3EJqUzecCDEupR6Yd1+qG6k6lqJuVnviCkybK5KTpwzQBx0
ABoVvzJIzHKiC9RY4t8JS5qUgKobiGqmwsN3T9MHegOfjr7r0DI02jFDlGqU
yv38TGVGOxPPUiwQZ0JNYVANQs4qtGhNfrWJNujb3St/KN5sAObb/odYXDaT
QmfFBttaU6xYdiK7hjnx1DbLJWjDT2B5At23b8+pnakkWGzY+APB8IP4LYxh
pAldL+S9ai2Wo/xRI+MULK0G5RX8j8q8KE0tTIknxA7pe1aRoqE3ehCJhI9w
D/Y2hW6GmCIfGwh0KVyVxF8and2DUggCxSQcOiKbUJizQrxv5oZALIc0C40Y
lqX+iZUGn7dirYqCfoOMrjywIlp9xcODnWcDIE41efTMr/iCA4sfFFjBFuoB
kLLyXkl+y0EDkFg7A5LevNTBC/JeFMslbCxdWEH1zEFP9fA4EtpAVXO58kZy
2iY95bpCKJMREC5FsScDkJKRDWslqSGs2Wtbw+tyBecBH5r41CtWfSVLKzkY
bfA6GOMBFGktR1ap6i1vIgYil3dqRO3fFgfBH5Q3NVljndpcuKPPgX0kh1+G
vs+zxxGL7FLmGvHbwKOQSfEgtjpEzpR2r+5vdMXPP7fA7vNnfNqBY3g6rcyi
y2TsLuipKpY7ZAfIFRLDGipXNdxhrkofBi2PpSIECa34HEu/ERv4X3vcT2IY
KisiKyjVDVykBH8hevslIVt3+drnLGpniXpffCLsEzfj8aKggMqKxiX9IIhF
PyK5PRZ37bagXZNgyKJE3ALAkTPg7VotWTSf+ml7ijFiL9ubAwZ+U3a+By6a
IZG1RYNQP+t/e6nLcN4G6OpMlfs44DdNhRfQsfFDgBrhEAx9bya19OrpbQNg
1lCQDrwEgZdWDXuymKvBXeoV92oj/j5xcp+pLlnp/Y28f9VzuPxsvpNgxIxD
wcWlL9+ege9vLt1Q6/3tmJweyqAUMdcFJUzbsK9yJpjDjXihf8unYCqKVCAg
KuUfKuA+o7u0LFyxGPpCHOo/SJq1dSCGNKUyUhMt7ye0Xv3aX0NdSl3IsmQV
oIBiH846S7DoyyPgGdbBh4NwXCjaLCQLU84shRW9HM3UguVAfoPNp4Db9LTP
ZBuB0IzdwJ0XblLYz95cGpwlnPNZ9O+RRaCiJ08AHWuVUNDYGiQkfPOnVngO
YVlp02xXBktfE2obiP1dn/Merhg2dKHwo8HONGVA2qsUSigWc1AY5wiPYyHP
GVIVapzTIDirZi6AnL12VUTiinNTrugLkoDWXSg4uObPCWuBomLN7nbw4fvb
Oxpx0m9xdc1/37z91+8vb95e0N+3343fv2//SPwbt99df//+ovurW3l+/eHD
26sLtxhPRe9RcvBh/KcDp7aD6493l9dX4/cHzlzQUIhKjgKoaOIwS4VsS56P
DjUgdw66N+cf/+e/T56jTPzDzbvz05OT11wz6MOrk5fP8WGNdOd2YxDkPlIC
T1DTleS8THGYySUp1DIusXMqiUj5Cto8+nfSzH+cid9MsuXJ89/6ByRw72HQ
We8h62z3yc5ip8Q9j/Zs02qz93xL031+x3/qfQ56jx7+5ncFdQrpyavf/TYh
F7rj3sEUZrZBIyCOji45GR4dnXHtsejlMk7AUcr49Zf/pNqzeaQgzqXtqvZQ
OIIOhvti1wMLsEODgohFMxrGlc4vZqrMCBMdLgFDCTzbQSiEOdVAa0q0WJTP
8R6HFVJR3TiCh8QNyhO63Jw6sabk4HIo6zAHWlOKniMTg7Tn4lAhJ5gNb+8a
uGwO4ee0RK49JVVnkKjFFV4qkpC8bYGctFJUmotpKmuav4PbONmmPklTfqQA
Ny5/OckhCpBDmN46+LCbsblqhzQwiEAOmDFNkXt24l2p+BK0Ad4jE39nirwz
MQqSXmqfrPcUCAdC3BrGXyog+X4Vcfl/C42xuECQli0KGKWyufO2gJwJfbhS
59BXQMNDMQ6bko4nRNvZfbADNwmBosZk1EM4ET95zERCjjsEFSiVG1NS2VQR
xoefNRWbAHqwBs0MvkQumhDaJyPNHTdslk70oQh7ucQPm2+BFeuQJEHQMAFA
Q2qohEfIfGkAYzZ9HOe7pRbJtfgAH4biHcRWD5IqGVQi7gBBnJJlzeMOTc5d
O3RPPSXDhVC+xFQxtrJOnhBlpMq8omj59Ze/ouHQKNSWUzSUJfSUgbd1TAyc
JIiQ7D6qc+4N6kfRj1EZdBYJ54M/sF+MxsSps07fYwahpvM5wUPPK0MZ5Cor
A+xZFrJ2eLuiDq4IeIfBjHdYLt+ylO4UMgoawETnVS35Fi854OPV7zvIGBLs
pq2UQy8XjCSixOU0+k2rT48nJhpeBtiQ0aRebrcOe5Orj8axs7NDgYwAm8mP
aD3ZDJaQmrZzSnvwx4FrqFsAHzrLnniCjmhLBV+NQpG9ycYBxdzwBLw9ZTv8
dHHz1BmSdE3daWG8utZUW0V7uMeNYeFHNeaLEzTmMKor0JVkRRFoYLvmQ/GR
6hef7xY8PqCRIGTRhOkqMq3/FjvsHsYiJmn2cG9DYkCmynd7Z0FLM8Mlj3ji
FqgJsJJ43WY1Etmpr380yal3e0zFUvk5ufPduSqW0Xhvp7ELFkRL3KHcaJpA
nt5Wir01hr1p4xzJv8B43o9oiAyFPucMQlWUWfwsgtgNm0NplFscAarPsuK1
jGXdJJCzBAP3adTSUxh3NKgicO2SjkLWFLLqtdqbJXrit9a6zwTAd6Z9pEJF
YenbOND1IIZY7Dd+BZbVGoVj00c4nj1q5XwVWy59zIZSYhmAUyzemIJLxs7B
KgFX7UZCmvNLdCciPiRPkvF2x8nprd8leSuyYzid2mgokfW6nB0v2Z6y0dzD
w7JHi/6+MSrh9NA5qdw3wXviKirztH07twrdczSIkY83m75X7rjtx1XCgx4e
NrvRpN2aae6ZvnDNIs+lvmMOGEj9CHpXV6K5VK5lWXfl7CxJTihKyPP9AAf4
tkR1rKEN2r9AfKp8NIXWHDrl8rtBQQe84aSuF0jCK02oYbOszaySyzlSbuDN
tYEk+SNJllEr0qx9OkxOd5mhKUzD88dKeQU4b6At+wXMsUFzkYs2o/0TCuNy
SYYkndFNHhgIVLsODBBoBVz1bN/WYZjLt2aw2FWOtRuE5MY7qTffXK5UNP/F
62jj+cuAu3oFlniNDgB2Qv2wPcNBuatJO8ll2Y0w9yQHn4z+XtyYMDfvDx4n
GxqV+UlgH/u6klz5NLAzPfJa3YI0/TZYc571g++vDuF4dmUioYjlae0Ghhun
9G6q5GYN2wEfDdQWirCAtovYBZZ0I8s0ttj4gys/q3bm3ZK4dqNz39tsKwam
hpI5G0sxAzAq43amOxbS5RLAO4y4gmQMS5uCsnattg9GwIH048hHDj0mir7t
pwlnP4L/iyV7A/mPzJU/TtqVb81tFnIhj3E4EZa5U/euC3V9KU+Y47aFAWTY
RIfBs5+hkfDeqltSttvTfTSkUJo00QCR3bl0EN4PghC2YlyGLoEbGwatW/1T
S1HGPXh34uNQG9nTtE4XIlbu9AsZjVMu2alRLOCxPqGiJYh0SllmIhlvbR/D
ev8TvRkQB4w/nw8NxkJ50t4QfHBSSM+Yz80lX3vZPguig5i2BPFxmutIw1uh
cY3YoZpAKSD3ShQBBYbpbOCOh6Oc+4jJIIWbVvsBro/evuiswu281KYhzrBb
NOikq8tTwYx0MYqKAg9BFOcuLP3R7D/9ffLEj2jQn3zoTtrOOcfzkj54TZJr
Mn105kGFACohpqYNjdfBANQYss0XzlMHUZrq/NYf0LTu8rXBjPLtKoqTm5eS
JCpvB1LfmTXhkYFzqaDN1l7BK/bwoiLc6qaWAWIap4V+BmjxrPeXeGhw1xIb
tAcPvs7RoUJ7SuBvDBz9mXcKZjsShZwoNHMEypC5VFV3orZKc1qS/vx0X3Gi
uefR0duHM9GnP/QZI/U6y6S4vGLGjsWJ+PWXv4Xv+6sy+esv/wWCPh48fKNm
m27x2l4iZ9bRnlbOSEePUTx6PFNQbYhPXri+ovUjrzjakeAbexQdFo2srzV7
Tpk5KJ6wuDdOhCs6277NDMEkjzsfvzwS0njlD6fsvHd0RGNWP3djpnnKDFcC
Hls6p7X+YJgng+7U4HCuZ3N09ilB6eKpKziWLgy5c3fvnszyDdaT7+34zOHx
w7fvxPHDy+f045R+fEs/nvWevaBnL17Sj9e73758/ZRTxtZd2yhxfKRgcccP
WzqKnPWR+ykOhcQ2jTx0x6LDnoCuK3jMjcgATPcZHPiYXPi5Onkls9PT7Ph4
Onk9HA4nr1+cvjyWLycvghdf9SoWsBmkycKF1FjnOoa5nMbdpYiBn/N1yeho
l2cfzB5Ygf5Ely5DxpHjmfCXLdQDpT3LWc0rmHEA78IHeD3NS55yMdqOxgB8
GzHcSqJqHQa7XZiEa0rRfShkMVl3AkXGojs1VAJXdOeF0mF4VQoeybQgfgB/
n+nSzRqcXG0J6vbmwRUCoYnOl/doOD7X7Q6nPdm+m3LPHvp1fw2Hksi4Hf1K
vre7MqEzdzBGuiBlI/jTXD+h0EsgENudaz16XhdaD78r4zWwySjYU3T/kIIO
Lt0ECPnb45qhuEWn6g68Xj978fzzZ0jiKbWXxvrNZTfN7iGukHQqVTc8qmF0
Rwf2bsorfUoO0x03HCStcH2m+shdb40oY4cLANo5id/ysZaH3D/X+VF7bu4/
9pJ4dwuudM1kH4G5IXO975YT9bUMnuvYjQCUmpoPJ9qT1p15haZYsbwrPLy9
xtNegPBRR4MI0DbrEvkHdSCICeFRu1O6JTMIFmYQ2MpStT7lJmHu7H5i6IQ/
zA8jlumMKZqB0XifrOds4zqndpAfqTTMS6o9iuXs68xO2ffq3y6uP4xR1P0x
6vHp8efPnSvoTqMmzgcc1uwBJNE9TWCd7cPNKdqFLyuGqygRWu0P38JBRm+G
GpttQvGcN1lYwAcoJLyDlw+xUqOmleYQfazfqqodS9H5EuWCWzpBIB7OfSsl
w+E5/VOk8C3fihxfjXff6jXxpJrSuDf9lNRfrpzI7J6IjDO6gU0+Rwts8vOZ
+wdGKv/nA5ofqYPPfmvZvolm6n8BxfhUCnk1AAA=

-->

</rfc>
