<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.4.1) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-mahy-mls-sd-cwt-credential-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="MLS SD-CWT credentials">Messaging Layer Security credentials using Selective Disclosure CBOR Web Tokens</title>
    <seriesInfo name="Internet-Draft" value="draft-mahy-mls-sd-cwt-credential-00"/>
    <author fullname="Rohan Mahy">
      <organization>Rohan Mahy Consulting Services</organization>
      <address>
        <email>rohan.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="02"/>
    <area>Security</area>
    <workgroup>Messaging Layer Security</workgroup>
    <keyword>MLS credential</keyword>
    <keyword>SD-CWT</keyword>
    <keyword>SD-KBT</keyword>
    <keyword>SD-JWT</keyword>
    <keyword>key binding</keyword>
    <keyword>selective disclosure</keyword>
    <abstract>
      <?line 40?>

<t>The Messaging Layer Security (MLS) protocol contains Credentials used to authenticate an MLS client with a signature key pair.
Selective Disclosure CBOR Web Tokens (SD-CWT) and Selective Disclosure JSON Web Tokens (SD-JWT) define token formats where the holder can selectively reveal claims about itself with strong integrity protection and cryptographic binding to the holder's key.
This document defines MLS credentials for both these token types.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://rohanmahy.github.io/mls-sd-cwt-credential/draft-mahy-mls-sd-cwt-credential.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mahy-mls-sd-cwt-credential/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Messaging Layer Security Working Group mailing list (<eref target="mailto:mls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/mls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/mls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/rohanmahy/mls-sd-cwt-credential"/>.</t>
    </note>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines new MLS <xref target="RFC9420"/> credential types for SD-CWT <xref target="I-D.ietf-spice-sd-cwt"/> and SD-JWT <xref target="I-D.ietf-oauth-selective-disclosure-jwt"/> tokens respectively.
The SD-CWT Credential contains a Selective Disclosure Key Binding Token (SD-KBT).
The SD-JWT Credential contains SD-JWT with Key Binding (SD-JWT+KB), which could be represented in the traditional data format, or in a more compact binary encoding.</t>
      <t>The "holder" of one of these tokens could be the MLS client including the token in its Credential in its LeafNode (in a group or in a KeyPackage) or in an ExternalSender structure.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The term Credential is used as defined in <xref section="5.3" sectionFormat="of" target="RFC9420"/>.
The terms MLS Distribution Service (DS) and MLS Authentication Service (AS) are used as defined in <xref target="I-D.ietf-mls-architecture"/>.
The terms MLS client, MLS group, LeafNode, KeyPackage, PublicMessage, PrivateMessage, ratchet tree, and GroupInfo are likewise common MLS terms defined in <xref target="RFC9420"/>.</t>
    </section>
    <section anchor="new-mls-credential-types">
      <name>New MLS Credential types</name>
      <t>This document extends the list of defined CredentialTypes in MLS to include <tt>sd_cwt</tt> and <tt>sd_jwt</tt> types. Additional syntax and semantics are defined in the following subsections.</t>
      <sourcecode type="tls"><![CDATA[
struct {
    CredentialType credential_type;
    select (Credential.credential_type) {
        case basic:
            opaque identity<V>;
        case x509:
            Certificate certificates<V>;
        ...
        case sd_cwt:
            opaque sd_kbt<V>;
        case sd_jwt:
            SdJwt sd_jwt;
    };
} Credential;
]]></sourcecode>
      <t>The MLS architecture <xref target="I-D.ietf-mls-architecture"/> describes the Authentication Services as having the following three services (i.e. requirements):</t>
      <ol spacing="normal" type="1"><li>
          <t>Issue credentials to clients that attest to bindings between identities and signature key pairs</t>
        </li>
        <li>
          <t>Enable a client to verify that a credential presented by another client is valid with respect to a reference identifier</t>
        </li>
        <li>
          <t>Enable a group member to verify that a credential represents the same client as another credential</t>
        </li>
      </ol>
      <t>The consequence of this is that the consumer of the SD-CWT or SD-JWT needs to be able to determine both the MLS client and the application identity referred to in a token in a Credential.</t>
      <section anchor="mls-sd-cwt-credential">
        <name>MLS SD-CWT Credential</name>
        <t>An MLS SD-CWT Credential contains a single SD-KBT, containing an SD-CWT in the KBT protected header.
The SD-CWT contains zero of more disclosures (in the <tt>sd_claims</tt> header field).</t>
        <t>Any party that can view the credential can read the disclosed claims.
For example if LeafNodes are visible to the MLS DS, because MLS handshake messages are conveyed in PublicMessage, the disclosed claims would also be visible to the DS.</t>
        <t>The SD-CWT inside the credential <bcp14>MAY</bcp14> include zero or more encrypted disclosures (in the <tt>sd_encrypted_claims</tt> header field).
Each encrypted disclosure is separately AEAD encrypted with a per-disclosure unique ephemeral key and salt.
The per-disclosure encryption key allows the holder/MLS client to disclose an element to a specific subset of members, or (in the common case when the DS is privy to the ratchet tree) only to members of the group.
A proof of concept to decrypt encrypted disclosures only for members of the group is described in <xref target="I-D.mahy-mls-member-secrets"/>.</t>
        <t>The audience in the SD-KBT is either a representation of the MLS group, or a higher-level application structure associated with an MLS group or tightly-coupled collection of groups (for example, a chat room which maintains one MLS group for the main discussion and another for moderators to discuss the moderation of the room) such that being in one group without the collection would be nonsensical.</t>
        <t>The subject in the SD-CWT represents a specific MLS client (for example a COSE key thumbprint, or a client ID URI).
It should not use an identifier which represents multiple signature key pairs of the same type, or represents the same "user" on multiple devices.</t>
      </section>
      <section anchor="mls-sd-jwt-credential">
        <name>MLS SD-JWT Credential</name>
        <t>The SD-JWT Credential can be represented in the classic SD-JWT+KB data format defined in <xref section="4" sectionFormat="of" target="I-D.ietf-oauth-selective-disclosure-jwt"/> (shown below), or in a more compact binary representation.
MLS SD-JWT Credentials <bcp14>MUST</bcp14> include the Key Binding.</t>
        <ul empty="true">
          <li>
            <t><strong>TODO</strong>: Discuss if the LeafNode signature over the Credential is sufficient</t>
          </li>
        </ul>
        <t>The classic format uses only characters from the unpadded base64url character set (Section 5 of <xref target="RFC4648"/>) plus the period (<tt>.</tt>) character to separate the three parts of the <tt>Issuer-signed JWT</tt>, and the tilde (<tt>~</tt>) character to separate disclosures from the other components.</t>
        <figure>
          <name>SD-JWT+KB in classic format</name>
          <artwork><![CDATA[
<Issuer-signed JWT>~<Disclosure 1>~<Disclosure 2>~...~<Disclosure N>~<KB-JWT>
]]></artwork>
        </figure>
        <t>This document also defines a "compacted" format where each of the components of the <tt>Issuer-signed JWT</tt>, every Disclosure, and the <tt>KB-JWT</tt> are base64url decoded and stored in individual fields in the <tt>SdJwt</tt> struct.</t>
        <sourcecode type="tls"><![CDATA[
struct {
    Bool compacted;
    select (compacted) {
        case true:
            opaque protected<V>;
            opaque payload<V>;
            opaque signature<V>;
            SdJwtDisclosure disclosures<V>;
            opaque sd_jwt_key_binding<V>;
        case false:
            opaque sd_jwt_kb<V>;
    };
} SdJwt;

enum {
  false(0),
  true(1)
} Bool;
]]></sourcecode>
        <ul empty="true">
          <li>
            <t>The compacted variant allows implementations to tradeoff reduced size for the extra processing cost of base64url encoding and decoding the Credential.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The privacy considerations in SD-CWT, SD-JWT, and MLS apply.
TODO more security.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The privacy considerations in SD-CWT and SD-JWT apply. The privacy considerations of MLS are largely discussed in <xref target="I-D.ietf-mls-architecture"/>.
TODO more privacy.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests IANA to add the following entries to the MLS Credential Types registry. Please replace RFCXXXX with the RFC of this document.</t>
      <section anchor="sd-cwt-credential">
        <name>SD-CWT Credential</name>
        <ul spacing="normal">
          <li>
            <t>Value: 0x0005 (suggested)</t>
          </li>
          <li>
            <t>Name: sd_cwt</t>
          </li>
          <li>
            <t>Recommended: Y</t>
          </li>
          <li>
            <t>Reference: RFCXXXX</t>
          </li>
        </ul>
      </section>
      <section anchor="sd-jwt-credential">
        <name>SD-JWT Credential</name>
        <ul spacing="normal">
          <li>
            <t>Value: 0x0006 (suggested)</t>
          </li>
          <li>
            <t>Name: sd_jwt</t>
          </li>
          <li>
            <t>Recommended: Y</t>
          </li>
          <li>
            <t>Reference: RFCXXXX</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9420" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9420.xml">
          <front>
            <title>The Messaging Layer Security (MLS) Protocol</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="B. Beurdouche" initials="B." surname="Beurdouche"/>
            <author fullname="R. Robert" initials="R." surname="Robert"/>
            <author fullname="J. Millican" initials="J." surname="Millican"/>
            <author fullname="E. Omara" initials="E." surname="Omara"/>
            <author fullname="K. Cohn-Gordon" initials="K." surname="Cohn-Gordon"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>Messaging applications are increasingly making use of end-to-end security mechanisms to ensure that messages are only accessible to the communicating endpoints, and not to any servers involved in delivering messages. Establishing keys to provide such protections is challenging for group chat settings, in which more than two clients need to agree on a key but may not be online at the same time. In this document, we specify a key establishment protocol that provides efficient asynchronous group key establishment with forward secrecy (FS) and post-compromise security (PCS) for groups in size ranging from two to thousands.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9420"/>
          <seriesInfo name="DOI" value="10.17487/RFC9420"/>
        </reference>
        <reference anchor="I-D.ietf-spice-sd-cwt">
          <front>
            <title>SPICE SD-CWT</title>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>mesur.io</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Rohan Mahy" initials="R." surname="Mahy">
              <organization>Rohan Mahy Consulting Services</organization>
            </author>
            <date day="4" month="December" year="2024"/>
            <abstract>
              <t>   This document describes a data minimization technique for use with
   CBOR Web Token (CWT).  The approach is based on Selective Disclosure
   JSON Web Token (SD-JWT), with changes to align with CBOR Object
   Signing and Encryption (COSE).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-spice-sd-cwt-02"/>
        </reference>
        <reference anchor="I-D.ietf-oauth-selective-disclosure-jwt">
          <front>
            <title>Selective Disclosure for JWTs (SD-JWT)</title>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete</organization>
            </author>
            <author fullname="Kristina Yasuda" initials="K." surname="Yasuda">
              <organization>Keio University</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="1" month="March" year="2025"/>
            <abstract>
              <t>   This specification defines a mechanism for the selective disclosure
   of individual elements of a JSON-encoded data structure used as the
   payload of a JSON Web Signature (JWS).  The primary use case is the
   selective disclosure of JSON Web Token (JWT) claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-selective-disclosure-jwt-17"/>
        </reference>
        <reference anchor="RFC2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-mls-architecture">
          <front>
            <title>The Messaging Layer Security (MLS) Architecture</title>
            <author fullname="Benjamin Beurdouche" initials="B." surname="Beurdouche">
              <organization>Inria &amp; Mozilla</organization>
            </author>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Windy Hill Systems, LLC</organization>
            </author>
            <author fullname="Emad Omara" initials="E." surname="Omara">
         </author>
            <author fullname="Srinivas Inguva" initials="S." surname="Inguva">
         </author>
            <author fullname="Alan Duric" initials="A." surname="Duric">
              <organization>Wire</organization>
            </author>
            <date day="3" month="August" year="2024"/>
            <abstract>
              <t>   The Messaging Layer Security (MLS) protocol (I-D.ietf-mls-protocol)
   provides a Group Key Agreement protocol for messaging applications.
   MLS is meant to protect against eavesdropping, tampering, message
   forgery, and provide Forward Secrecy (FS) and Post-Compromise
   Security (PCS).

   This document describes the architecture for using MLS in a general
   secure group messaging infrastructure and defines the security goals
   for MLS.  It provides guidance on building a group messaging system
   and discusses security and privacy tradeoffs offered by multiple
   security mechanisms that are part of the MLS protocol (e.g.,
   frequency of public encryption key rotation).  The document also
   provides guidance for parts of the infrastructure that are not
   standardized by MLS and are instead left to the application.

   While the recommendations of this document are not mandatory to
   follow in order to interoperate at the protocol level, they affect
   the overall security guarantees that are achieved by a messaging
   application.  This is especially true in the case of active
   adversaries that are able to compromise clients, the delivery
   service, or the authentication service.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-mls-architecture-15"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.mahy-mls-member-secrets">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
      </references>
    </references>
    <?line 200?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Richard Barnes for his comment.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA51Z7XYbtxH9v0+B0j8quiIlOUqa0I4SSpQT2bLkinLSnJ4e
C9wFSVjLBQPsSmZ05Gfps/TJemeA/aIox6f6Iy4WwAxm7tyZwfZ6vSjXeaoG
ovNGOSdnOpuJU7lSVoxVXFidr0RsVaKyXMvUicLRhLFKVZzrGyVG2sWpcYVV
4ujw/EL8qibi0lyrzHUiOZlYdUM7n47FeNQ7+vWyuVcnimWuZsauBkJnUxNF
iYkzuYAuiZXTvLeQ81VvkbqeS3rxbd6r1/Z2dyNXTBbaOW2yfLXEmpPjy5dC
PBHY2UCmzhK1VBkt6GyLjkp0biyW0sPJ8BD/jMWvi8uXnSgrFhNlB1ECfQZR
bDIH/Qs3ELktVIQTfBVJqyR2LW3SiW6NvZ5ZUyw/Y7lOdK1WmJgMItETZIX6
CDTibRJ+vT4sf73yY1grJjgG9qVHV9k8qWwe3aisgMpC/LkqQng7dX6F5jTh
J1pC4wupU4zD0j9qlU/7xs5oWNp4juF5ni/dYGeHZtEQNOiX03ZoYGdiza1T
O1i/Q+tmOp8XE6y0Zi4zcuLORifS3BQWd3lDSrWm77fpa7N59c6fYaQ/zxeQ
EckinxtLHoA8IaZFmnqQXZAo8QYb8AscR2b6D5kDUc2X4gh4KNLc497e6Fg5
XqC83VhjtsiPMxrpx2YRRZmxC0neGkQRgbt+inq9npATl1sZ51F0OVfi0cjb
Ama6YmlNbmKTCiAzlzpz4qgVkSoRuRF0ThqjoBKkO8Et1RgStzClkMLpWSZz
ClWC1lJq24++JJLFlgdqF9smm2P/1fj8bH3FK1qRqKnOFPTDsPBmcOJ2rrAG
6oq5SRMcOIa+Fb7TlQBtKInzplIvHIxlilzoHDOm/iwwnoG1dAb+YEORiWi1
yVjH2K6WuZlZuZzruAwiMlIt86+OrNCH/bUTIJ5iQZby6rq1WHWkuZgYSMYG
rjwOxZPre4cudJKkKoqeiJMMyiUFKxM9sn2mblnE3d1fLl4efbf/bPf+viHP
78xCA21i4klvxCjruSUgGPCOZewTtnZrliE89Cqj9mrS6H3gdbn3lFVuWdq9
z2gMImuM1biTm73/GnA6DEZmALD/QWjdasdXj+wYXrFXm9sEAP3t9WF3G3jR
8RxrijQREwWVl9AaOwH4OmOfIphA8LA49gaLywA1JnlMkWJhoCcic4mgI0BI
uxIqiw0J6/so7HhgdISZCgPM4l/D266WTwIb0aWzOC08wOYlNCATeG2eOIyc
Kjk9M4kSW6wW03alJAzwVsbXcqa65Vgmjj/myuJcY0pmlqAPbMHqfQIbuOmG
BBhyDoAwIoCxIZw/FEU6ZSCH1PBufEnZj/6Ls3P+fXH8j3cnF8cj+j3+eXh6
Wv2Iwozxz+fvTkf1r3rl0fmbN8dnI78Yo6I1FHXeDH/DG9Kqc/728uT8bHja
8f5qhoQkJjBkVopmC8+SW6WLEuViqyfex4dHb//7n739EDDP9va+A4L9w7d7
f9/HAzgl89JMBgbxj3DIKpLLpZLemimQJ5c6R0hjrhNubm4zQWwEaz79F1nm
3wPxYhIv9/YPwgAduDVY2qw1yDZ7OPJgsTfihqENYiprtsbXLN3Wd/hb67m0
e2PwxQ8pEXJv79sfDiKPEZh90YJqSCowkCcsdsHd3Tgw7Nf9ryg4aurqV9t4
5gQ15HBdwbNDzhRbo7FPIDRjWCer1pwhzQEiNsqvyY0SPtciRPqIhYcq+Njc
5t8cZNtV6G034mxbvC0mqY59BqZHq2+QQKtnK/N4rnIQjFIeXlw2nSCls6Kp
vla32jG3LIzPul6LtuoNWyFszwL/H61R/nq+UIj9DLFLxJLCqGT2ct967SVn
Cx2Em0BISly55D1yxBWrTQ8f6MFnLTFMKsJ0K5DxR57lUNSQWxwfrnEE0mBq
0tTcEtGh9nYeDJT/Pn36JPLURZ6axB1XR231GsntPSnwnOf47CS26rn9tXnd
sBv9xRJmnkin40E1xoXbUv5egD54Xb568cvB8/aaj1/vftdecqRsrqe+VIrr
3661tt/vt/fx5twoHK+uJ/lD0d7o7SXj5NVtHt746ffPo/uGwZ6TRUNlCI82
gf4nUSBK0vSQ2RxljgJrLm/KjFW7NZ8D5fBKmLal+6qPbPt7oa0iPLou6te9
vjhxrlCt+gio8xFHgiVYPae6nondJ3QHhs9vFaVG7yetfMZ6WJS66FlfHGdy
kqKOLZMsdrpRVk9XYf9mtVRXA5MV9kSZRiVlSM5O3MhUJ77CCMUOl8t4mIL4
s7iEzlQrG33VEO2T80JRc/hZBaqCxJvdob0o5UtXa1T3fuxb7jMBHtKAaw3o
qoP98vAeNGBDIVLWZb4opKIpUypxIXmyyviZKGIfYviyXG2WKmRwGkJKTEtU
lHHj7WF9M8HlSFXKyAY4ib+eiEZHf9Q41jDb/KZZQdIFQqpCx7tdviH4odgJ
KwPhYEJZ2UOtuZIogFo1arXtH8oashOXeXWp67jMoq2YC7mduAobCfg7TVCh
QmsCns2Da6kZudFgaHZC4wwYt1jK40EG1PK79qOXcIz6KBdLHE5Pq2zjmfRG
Ox08VLpkNN6G42KJVMfP6CITN5fXCojj5ONXxlThrTwJr+WqTXqg2KMqlS5B
CBZrckfjUOtWdnZw//pBUUVUOcQb1nrDAqrUWEHYYyauZjxm7GOJSn7TPgR9
p+AG8DDqt+HxcNSYFzrYpbKNRkYUmSbyVcs56MlCc6IQJhWZ5h4oayvCjoR7
nkvM5xpd4U4jWCiagnUJmshVizAMEINGKGn4TMh52fOE45ajNEkoCjgVUEUa
nEBnXaLQWJV+aVYZXV/A4k3YsYx/pqN+NKSQoBZlStiI1dJrqvhgj7iId6R2
ctOWpE2r2L67+4FyTHW14hehlwRGcsclDJlWounx9JmV/EQBi92UZsKTNTF6
qglSGzWZoVlzPcP0XoqmP21RU9XrgEadibWsoZDVu9AmObbI01UPPRriD8GA
nBaqVQjlaQDqtA7RbWJwinbYchEazAWoxNMJtX/1/rSM9Kb3bNaCrx0ZaSW5
s3ER7vCksa7EDib6lf5NwwYktgv0xHNPOhOl+UKDRXuxdFC6+PBAqs5zW7ah
mb+nhLHS4BGA8QOlt9ohFOSN7NQAbgPoTbsQ15+Pjzk68nmxmACnWR4cFeaf
jMS7ixME80lOHRSpAytQzU5+qZNpMGtD/oLu0UjKhqxfWoazJ9V+LHRTau1A
ErXpWb1forhkgR0a2enVWnZ65CoCOm++VACFwdGxqK4imlcLm1ujfW6MvvwS
Zst3oBMFHup+/raiHUv9aOMh0fxQy1qyNyfR+lYF5jkQT59eno/Onz4d8A0O
IVR7w1dXE7VzzI3y0G93h66YAkKEhVDJBEMFy8A9gXIQYXTLSYwztYgz2qrI
ljJJqFgDK36zX9i0niaIS7eqPpOM6Xun/W/2v72/74plWngggNe1ScTWVf+q
21iPuCuTiL+N4YqWknuFryuuXkFnOCW0gP2utqvCKNcp3c1cfXp01yatVmcK
BR4chvAFVn1TFL14IOrg04vGvdle+/HZwSf0HK2hM8x4fUhOPuAd7waCP9d8
36lBCcS0HdC5X+8juRwoLx+l6ARoqaRT+sxfySrKzsFO9Wk+azmQNsBZq1zb
8sorfsVlTO1sZCpD7uc8DbL0IUQAvdFJAYBxqeDKILzidukq5ILHus1Dw9fj
4VTt7rIaftBM0uedje1cVXS2OrrmBLlKjXz0dRVBDybwaRoObsDp0c24U3wP
onwfmqmHfeYUHt58lHL1pFrE3Sbr8TyKVFYs2Cy8w9Zud5s+FMEuW3tdTCO7
hnb0QFzOVW1jtFVWS8YW11CasseipCfOgHQpq8x0CupKilhRr/eHqrKp+oj3
ZGnwNn9UjI2/4KihUl7QMlYYN2XP2upHoif1FxP6WKPLZBvuQKnUkvGKG6r6
HQHMZ8jtwKPb1fUUFSF0Gw6i9Fzswv5e2tuw4f8jrHlf78WIzyyDOfwVgBKp
tDOqjENd8YWXYtUJggC+fjoZng03KN9kDOr60cE7P5dq3iRZuy3ANEtdfKOn
aaQJfyll1YzuAnHIt6kioCKLpRI1Izj9n/jz1Rwtx0DVBZda+F5zQ5/ZE7/I
FLErdj/u7u5+jTRazNAwUYzj3Rl/3vO3NXi8UFSG0+15MhC/8UBo/AelGqWc
9YqhLeebx+R8+HI5/LFoIuNr8sMwvs7MLerVGd+ugN39l2iVfN/hePRMLrNr
tvKFppSUiENps/B5iKzlpcJY/wPJiogMzR8AAA==

-->

</rfc>
