<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-mihalcea-seat-use-cases-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="SEAT Use Cases">Use Cases and Properties for Integrating Remote Attestation with Secure Channel Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-mihalcea-seat-use-cases-00"/>
    <author fullname="Ionuț Mihalcea">
      <organization>Arm</organization>
      <address>
        <email>ionut.mihalcea@arm.com</email>
      </address>
    </author>
    <author fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <author fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>thomas.fossati@linaro.org</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>Security</area>
    <workgroup>Secure Evidence and Attestation Transport (SEAT) Working Group</workgroup>
    <keyword>remote attestation</keyword>
    <keyword>TLS</keyword>
    <keyword>confidential computing</keyword>
    <keyword>IoT</keyword>
    <keyword>RATS</keyword>
    <abstract>
      <?line 51?>

<t>This document outlines use cases and desirable properties for integrating remote
attestation (RA) capabilities with secure channel establishment protocols, with
an initial focus on Transport Layer Security (TLS) v1.3 Handshake. Traditional
peer authentication in TLS establishes trust in a peer's network identifiers but
provides no assurance regarding the integrity of its underlying software and
hardware stack. Remote attestation addresses this gap by enabling a peer to
provide verifiable evidence about its current state, including the state of its
trusted computing base (TCB). This document explores specific use cases, such as
confidential data collaboration and secure secrets provisioning, to motivate the
need for this integration. From these use cases, it specifies a set of essential
properties the protocol solution must have, including cryptographic binding to
the TLS connection, evidence freshness, and flexibility to support different
attestation models. This document is intended to serve as an input to the design
of protocol solutions within the SEAT working group.</t>
    </abstract>
  </front>
  <middle>
    <?line 68?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="establishing-trust-in-secure-communications">
        <name>Establishing Trust in Secure Communications</name>
        <t>Traditional secure channel protocols, such as Transport Layer Security (TLS),
primarily establish trust in a peer's identity. This is typically achieved
through mechanisms like a Public Key Infrastructure (PKI), where a trusted
Certification Authority (CA) vouches for the binding between a public key and an
identifier (e.g., a hostname).</t>
        <t>However, this model has a core limitation: identity authentication provides no
assurance about the peer's internal state or the integrity of its software
stack. A compromised server, for instance, can still present a valid X.509
certificate and be considered "trusted" by a client. This gap allows compromised
endpoints to maintain network access and the trust of their peers, posing a
significant security risk in many environments.</t>
      </section>
      <section anchor="the-role-of-remote-attestation">
        <name>The Role of Remote Attestation</name>
        <t>Remote Attestation (RA), as described in the RATS architecture <xref target="RFC9334"/>, is a
mechanism designed to fill this gap. RA allows an entity (the "Attester") to
produce verifiable "Evidence" about its current runtime state. This Evidence
covers the Attester's TCB, and can thus include measurements of its firmware,
operating system, and application code, as well as the configuration of its
hardware and software security features (e.g., secure boot status, memory
isolation). A "Relying Party" can then use this Evidence, often with the help of
a trusted "Verifier", to appraise the Attester's trustworthiness.</t>
        <t>By integrating RA into a secure channel establishment protocol, a second
dimension of trust—trustworthiness—is added to complement regular peer
authentication. This allows a peer to make authorization decisions based not
just on who the other party is, but also on what it is (e.g., an AMD
SEV-SNP-based server running in some known datacenter) and whether its state is
acceptable.</t>
      </section>
      <section anchor="purpose-and-scope">
        <name>Purpose and Scope</name>
        <t>The purpose of this document is to outline the key use cases that motivate the
integration of RA with secure channel protocols and to establish a set of
essential properties for such an integration. The initial focus is on TLS 1.3
and its datagram-oriented variant, DTLS 1.3.</t>
        <t>This document is intended as an input to the design of protocol solutions within
the SEAT working group. It defines the "why" and the "what" (the requirements),
but not the "how" (the protocol specification itself). A key goal is to define
requirements for a solution that is agnostic to any specific attestation
technology (e.g., Trusted Platform Modules (TPMs), Intel TDX, AMD SEV, Arm CCA).</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document uses the terminology defined in the RATS Architecture <xref target="RFC9334"/>,
including "Attester", "Relying Party", "Verifier", "Evidence", and "Attestation
Results".</t>
      <t>This document also uses the following terms:</t>
      <ul spacing="normal">
        <li>
          <t>Trusted Computing Base (TCB) of a device: all security-relevant components:
hardware, firmware, software, and their respective configurations.</t>
        </li>
        <li>
          <t>Confidential Workload: as defined in <xref target="I-D.draft-ccc-wimse-twi-extensions"/>.</t>
        </li>
        <li>
          <t>Measurements: as defined in <xref target="I-D.draft-ietf-rats-eat-measured-component"/>.</t>
        </li>
      </ul>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <t>This section provides the concrete motivation for the WG's work by describing
specific use cases. For each case, the scenario, actors, and specific security
guarantees needed from RA are described.</t>
      <section anchor="confidential-data-collaboration">
        <name>Confidential Data Collaboration</name>
        <t>Goal: Enable multiple parties to collaborate on sensitive, combined datasets
without exposing raw data to each other or to the infrastructure operator.</t>
        <t>Use case: Data Clean Rooms: Multiple data providers contribute sensitive data to
a confidential workload for joint analysis. Data consumers receive aggregated
insights without ever accessing the raw, combined dataset.</t>
        <ul spacing="normal">
          <li>
            <t>Requirement: Before sending data, each data provider must attest the
confidential workload to verify it is running the authorized analysis code in
a secure Trusted Execution Environment (TEE). Similarly, data consumers must
attest the workload to trust the integrity of the results.</t>
          </li>
        </ul>
        <t>Use case: Secure Multi-Party Computation (MPC): Distributed parties
collaboratively compute a function (e.g., train a machine learning model)
without sharing their local data.</t>
        <ul spacing="normal">
          <li>
            <t>Requirement: The central aggregator, as well as each participating client,
must be able to mutually attest to ensure all parties are running the correct,
untampered MPC algorithm in a trusted environment.</t>
          </li>
        </ul>
      </section>
      <section anchor="secure-provisioning-and-high-assurance-operations">
        <name>Secure Provisioning and High-Assurance Operations</name>
        <t>Goal: Ensure the integrity of workloads and devices when bootstrapping their
identity or receiving critical commands.</t>
        <t>Use case: Runtime Secret Provisioning: A confidential workload starts in a
generic state and needs to fetch secrets (e.g., API keys, database credentials,
encryption keys) to become operational.</t>
        <ul spacing="normal">
          <li>
            <t>Requirement: The workload must attest its runtime state (TEE genuineness,
software measurements) to a secrets management service. The service will only
release the secrets after successful verification, ensuring they are delivered
exclusively to a trustworthy environment. This use-case also covers secure
device onboarding for IoT devices that lack a pre-provisioned identity.</t>
          </li>
        </ul>
        <t>Use case: High-Assurance Command Execution: An operator sends a critical command
to a remote system (e.g., an industrial controller, a financial transaction
processor).</t>
        <ul spacing="normal">
          <li>
            <t>Requirement: The system must provide fresh attestation Evidence to the
operator to prove its integrity before the command is dispatched. This
prevents commands from being executed on a compromised system.</t>
          </li>
        </ul>
      </section>
      <section anchor="network-infrastructure-integrity">
        <name>Network Infrastructure Integrity</name>
        <t>Goal: Verify the integrity of network devices that form the foundation of
communication.</t>
        <t>Use case: Attestation of Network Functions: A router, switch, or firewall joins
a network's management plane. A Virtualized Network Function (VNF) is
instantiated on a generic server.</t>
        <ul spacing="normal">
          <li>
            <t>Requirement: The network orchestrator must verify the device's integrity
(e.g., secure boot enabled, running signed OS and firmware) before allowing it
to join the network and receive policy. This prevents a compromised router
from misdirecting traffic or a malicious VNF from inspecting sensitive
packets.</t>
          </li>
        </ul>
        <t>Use case: Securing Control and Management Planes: An administrator connects to a
network device's management interface.</t>
        <ul spacing="normal">
          <li>
            <t>Requirement: The administrator's client must verify the integrity of the
management endpoint on the network device to ensure they are not connecting to
a compromised interface that could steal credentials or manipulate the device.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="integration-properties">
      <name>Integration Properties</name>
      <t>This section provides a list of desirable properties for designs that integrate
RA into secure channel protocols. Proposed integration protocols should make it
clear which of these properties are fulfilled, and how.</t>
      <section anchor="cryptographic-binding-to-communication-channel">
        <name>Cryptographic Binding to Communication Channel</name>
        <t>The attestation Evidence or Attestation Result is cryptographically bound to the
specific secure channel instance (e.g., the TLS connection). This prevents replay
and relay attacks where an attacker presents valid, but old or unrelated
Evidence from a different connection or context. This binding is paramount for all
use cases.</t>
      </section>
      <section anchor="cryptographic-binding-to-machine-identifier">
        <name>Cryptographic Binding to Machine Identifier</name>
        <t>Evidence should be cryptographically bound to the identifier provided to the machine by the infrastructure provider to prevent diversion attacks <xref target="Meeting-122-TLS-Slides"/>.</t>
      </section>
      <section anchor="attestation-credential-freshness">
        <name>Attestation Credential Freshness</name>
        <t>The Relying Party is able to verify that the Evidence or Attestation Result it
receives was freshly generated by the Attester for the current connection. State is
transient, and credentials from a previous connection may no longer be valid. See
<xref section="10" sectionFormat="of" target="RFC9334"/> for more details about freshness in the context of
RA.</t>
      </section>
      <section anchor="negotiation-and-capability-discovery">
        <name>Negotiation and Capability Discovery</name>
        <t>Peers have a secure mechanism to discover each other's support for RA, the
specific attestation formats they can produce or consume, and the attestation
models they support. This enables interoperability and allows for graceful
fallback for endpoints that do not support RA.</t>
      </section>
      <section anchor="attestation-model-flexibility">
        <name>Attestation Model Flexibility</name>
        <t>The solution supports both the Background Check and Passport models as defined
in the RATS architecture <xref target="RFC9334"/>. The Background Check model is essential
for use cases requiring maximum freshness, while the Passport model is better
suited for performance, scalability, and scenarios where the Verifier may be
offline or unreachable by the Relying Party.</t>
      </section>
      <section anchor="interaction-with-peer-authentication">
        <name>Interaction with Peer Authentication</name>
        <t>The solution supports using RA in conjunction with traditional PKI-based
authentication (e.g., X.509 certificates). This provides two independent pillars
of trust: trustworthiness (from RA) and identity (from PKI). The solution may
also support RA as the sole method of authentication in constrained use cases,
such as device onboarding, where a device has no stable, long-term identity yet.
This latter option could have a negative impact on the security of the overall
design, warranting additional security considerations.</t>
      </section>
      <section anchor="credential-lifecycle-management">
        <name>Credential Lifecycle Management</name>
        <t>The solution can provide a mechanism for re-attesting or refreshing attestation
credentials on an existing, long-lived connection without requiring a full new
handshake. For long-lived connections, the initial attestation may become stale,
and a lightweight refresh mechanism is beneficial towards re-evaluating the
peer's state.</t>
      </section>
      <section anchor="privacy-preservation">
        <name>Privacy Preservation</name>
        <t>The solution does not degrade the privacy of a standard TLS connection. Evidence
can contain highly specific, unique information about a device's hardware and
software, which could be used as an advanced tracking mechanism, following a
user across different connections and services. The design must consider how to
minimize this leakage, especially when a third-party Verifier is involved in the
protocol exchange.</t>
      </section>
      <section anchor="performance-and-efficiency">
        <name>Performance and Efficiency</name>
        <t>The introduction of attestation should not add prohibitive latency or overhead
to the connection establishment process. To be widely adopted, the solution must
be practical. While some overhead is unavoidable, multiple additional
round-trips or very large payloads in the initial handshake should be minimized.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document describes use cases and integration properties. The security of
any protocol designed to fulfill these properties will depend on its specific
mechanisms. However, any solution must address the following high-level
considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Replay and Relay Protection: The requirements for cryptographic binding and
freshness are critical. Failure to bind attestation credentials tightly to the
current connection would allow an adversary to replay or relay old or stolen, yet
valid credentials from a compromised system, completely undermining the
security goals.</t>
        </li>
        <li>
          <t>Verifier Trust and Privacy: In the Background Check model, the Relying Party
communicates with a Verifier. This reveals to the Verifier that the Relying
Party is communicating with the Attester. Depending on the scenario, this
could leak sensitive information about business relationships or user
activity. Solutions should consider mechanisms to minimize the data revealed
to the Verifier.</t>
        </li>
        <li>
          <t>Downgrade Attacks: The negotiation of attestation capabilities must be secure.
An active attacker must not be able to trick two parties that both support
attestation into negotiating a connection without it.</t>
        </li>
        <li>
          <t>Evidence Semantics: This document does not define attestation appraisal
policies. However, a Relying Party must be careful when interpreting
Attestation Results. A "valid" attestation only means the Evidence is
authentic and correctly signed; it does not automatically mean the underlying
system is "secure". The Relying Party must have a clear policy for what
measurements, software versions, and security configurations are acceptable.</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC9334">
        <front>
          <title>Remote ATtestation procedureS (RATS) Architecture</title>
          <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
          <author fullname="D. Thaler" initials="D." surname="Thaler"/>
          <author fullname="M. Richardson" initials="M." surname="Richardson"/>
          <author fullname="N. Smith" initials="N." surname="Smith"/>
          <author fullname="W. Pan" initials="W." surname="Pan"/>
          <date month="January" year="2023"/>
          <abstract>
            <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9334"/>
        <seriesInfo name="DOI" value="10.17487/RFC9334"/>
      </reference>
      <reference anchor="I-D.draft-ccc-wimse-twi-extensions">
        <front>
          <title>WIMSE Extensions for Trustworthy Workload Identity</title>
          <author fullname="Mark Novak" initials="M." surname="Novak">
            <organization>J.P. Morgan Chase</organization>
          </author>
          <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
            <organization>arm</organization>
          </author>
          <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
            <organization>Fraunhofer SIT</organization>
          </author>
          <date day="4" month="July" year="2025"/>
          <abstract>
            <t>   This document contains a gap analysis that is the output of the
   Confidential Computing Consortium identifying areas in the IETF WIMSE
   WG work where the current WIMSE architecture should be extended to
   accommodate workloads running in Confidential Computing environments.
   This document contains a high-level outline for these extensions.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ccc-wimse-twi-extensions-00"/>
      </reference>
      <reference anchor="I-D.draft-ietf-rats-eat-measured-component">
        <front>
          <title>EAT Measured Component</title>
          <author fullname="Simon Frost" initials="S." surname="Frost">
            <organization>Arm</organization>
          </author>
          <author fullname="Thomas Fossati" initials="T." surname="Fossati">
            <organization>Linaro</organization>
          </author>
          <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
            <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
          </author>
          <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
            <organization>Fraunhofer SIT</organization>
          </author>
          <date day="16" month="October" year="2025"/>
          <abstract>
            <t>   The term "measured component" refers to an object within the
   attester's target environment whose state can be inspected and,
   typically, digested.  A digest is computed through a cryptographic
   hash function.  Examples of measured components include firmware
   stored in flash memory, software loaded into memory at start time,
   data stored in a file system, or values in a CPU register.

   This document defines a "measured component" format that can be used
   with the EAT Measurements claim.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-measured-component-05"/>
      </reference>
      <reference anchor="Meeting-122-TLS-Slides" target="https://datatracker.ietf.org/meeting/122/materials/slides-122-tls-identity-crisis-00">
        <front>
          <title>Identity Crisis in Attested TLS for Confidential Computing</title>
          <author initials="M. U." surname="Sardar">
            <organization/>
          </author>
          <author initials="M." surname="Moustafa">
            <organization/>
          </author>
          <author initials="T." surname="Aura">
            <organization/>
          </author>
          <date year="2025" month="March"/>
        </front>
      </reference>
    </references>
    <?line 315?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA41b25LjNpJ9x1cgNA/umpDUvsw8jDY2wuXqak+FXXZFVbk9
bxsQCUl0k4QGIFWt7eiI/Yh92x/a79gv2ZOZAEhKansiZtxdLBJI5OXkyUz0
YrFQXdXVdqVnvwSrb0ywQZu21A/e7a3vKvy4cV7ftZ3detNV7VY/2sZ1Vl93
nQ0dHrlWv1TdTj/ZovdYY2fa1ta0QucKV4eZMuu1twfs8XR7/azzRjNVGCzr
/HGlq3bjlCpd0ZoG0pTebLpFU+1MXVizCNZ0iz7YRUHfLb78UoV+3VQhYPPu
uMcHd7fPb1XbN2vrV6rEsitVuDbYNvRhpTvfWwUBvlHGW7MSUavuqF6cf7/1
rt+vkvi3h6q0bWFZC+MzPnvThr3znX5Fx7jSv+Jb0sf39L16b49YrFwprRfa
i4rM8Dk/fv7xif+EZBvapatMjR+afU+K5V/duWf+8/H6+UkdbNvjIElA7Krk
tNOtG1PVK006+ray3Wbp/FYp03c750WcTV/Xotc71/b/+z/6PioWv9Uar5u2
+k8Wc6WvfcNPrayKZ323TIb41vhmCYFPVr3vd6ZpTAnTmsboJ+NL4y+s/fyL
fuNtwMnHWzTx6//o6etl4K+/7fpFKe8uS3uy3/PONSboty4ErHxhox+r1ng3
3qTjT5Yb+eTbml8QTbXON3h2gKYVuWH+iT5/fHvzt2+++ctKw/nDwvhix4/v
Fm+W4qNFUSxeqga+2b1UC/uhg8tBBjhdfnryBdlowcuRVzfWBPhduSA/cC2c
Iu6VfsFf31tLLrL46uuvF/CixVMN/wkiok4RfMcu1R31ja9CFRBT0YFtSa7H
gXwzdr2b5HozWYjjRn/9pb6ng+IvX/91Hrcwfmsh2a7r9mH1+jXeNJ03xXvr
l8nnXjci5GsI+Ro6tB57hNeBRWXJuzosqijkomAhKZZ5h8FfNRm7Ig3eL/Uv
y7E7jX5x73qE1sZMnj8v9XXvjVKLxUKbdSARO6Wed9AGsKVvsLd2fQfzA9gA
KLrIiAchK2/WtdX7KfZVI+yTwFajwNavHq+vsMzerKu64o8YDYPASRHRkF5f
11XYsQj7hI1zflmZFrtUbJMNxAx6gjc/mqP1GbP0K9jySh++Wn6j/w7Bw868
t0t6vaxIIFOrvcX7pFBSdSFiwhnIB7IckBOoGDr6hdH0xRdBt7YjRNRipE1l
fdDrvlOQl2ARLzhtAtzSEEJ6u4VpSC3YKaqJBHQbXXVQb1taXx/p98FtuhdA
Lyla7fAR/wBRivfLlE/GOjUlxT5ZpiPTbc1er4/atiQ6lhN5deeSYPoAZ9tU
bD2bAXwNS7MkUJwntdPydg5Ji7rPcvPDKLNilSBcMijrNRwEKr/57go6nviR
/bCvHcTUYW8L7F4MDjXXoUcAmaAmUE9Rg6XrGqL5eFJ4XnQV/OEtpOUzEYZg
+zkOqaGe6kBCQlzVWohHbsmayb7p2qV+611D70CKkSRVlwQkR8cuHR2WtMtC
qZG3kzqSa8Jmdc8iNuQlO3OYaK7wx33nsPV+h4Ovq1b06RStQY6Gg7e2oAXm
g0k2UNcOoQex6OCb2n6oOGyOdM7Q79nfy2qzsWSwSZw1rrR1ODVC1AFcreQl
rD/A8hTReA4T0kMSiaJ72yqc/OyAErAIA3qPGcpLTK+ceJeCJk1VlrVV6k/E
hbwrez4bfv6Tvk0xRd88p6BKdMg1Td/GKAzAoiFOTzFihArRff4ABOYwXtUY
X9XHIbAvhHXC3Kg8/A80AiLV+M4Uu8oekGa6HU673enGkjxVaIKuq/dQpn7o
sXChf7BHnH3jDWAVpyfJXz38cHcFDNtZim0do0fdkD9tEvJcM7Kz0DeAyoPD
2SK0ksaT76yBPday1LIfGBV7iWnVgEf6lV1ul3AfvXOhIzpwBQP93b3gDH4u
QcGeAo8ldy8QoThHU3WRGiRdnOLjCOLUAHGCIRwXUZVwNs+2E9jwl7EvAZ6K
GHfNiIL4rIItxUshrWQXvIKt5ojXFqtWNTmCpeiE+AeD7Kn/sfzrl39TRdaq
kNO1pSALEBosQc+i8meElDh3XWGFaHDCTxjbvYSxGApRs3cQPTDIGPwN/885
wBQFApV3oiOKV+F4+KHyrA746d4FBmRF0cXCEcwmJ0WGf0+O2JiW0PtQeddS
1IYlx80zln10NYPveVGh1IVCg5LtnAIDlgKBWOPgMXCJMGuiLVVnxTk/fozk
7dOnOfm8Udm1IxwIZmxI5SnPIB1dJ13BHtFXXtEOs0im/Owqph6AwCT1zFLx
MLuQfHyPtZqYb6Jh0vtIEwfKtbRN2gXOhqwjQEmu0e36EAHY6kgOWZnJ5zaV
b8jn5ooAXfhKOGKpRhYx+32dvL1AiLAeXywOb2RnzlXbPmammBFztuZMlfJ4
NvEGHLanJBjjMkLa2jlJtz2cpIEd/VFVAFxe+oriYfZohRs8GN8dZ/GIiH9K
Xd1YOXOIAoQXWkVy7my9xzOVAUfP3rERYBpOmDipNxWvM9Envw7nJrSHb8ML
vztO6B1sjx8dp8l/gb7N5UUHUlPCtEz8OURon//7r/8+2Q9PyA3LmKsoFGs2
ITGpvjYSVWoKTNFTkksm5oOYImwWaJWyB05dMG8ITFpKIFmnfuOohfJ2kgcd
/oN9SOeIiTmxO6wdnLxjyGUpVhLKAr3v36in23eLp58eFrKsoBf5MzEUir/g
4NfvW/fSMsUpLIHkFXsMUgPvyKDIkFkFRdCyJ4VaAYKH3gNIxMWeCngvUXZA
bnzMoHOS9KGByOP5WJQrBjrf0UEmrGnEkxhtri+S9JyABfXcKKkm4qQycTot
EyRlt1NK9szJYczsKyH3YEgg8Ir2IdWQ2vBRs4A1SXslkB/lU9vN9Zv47vK0
jhlTn88yHv17jEd9hvHoO5Awu+EiiZHvZYcITZlgRn4yE0z09p99FXEIdIS8
CV4nr+3cS3xrECAy5ViSdMHWG0YDst/WQUliWtlcjVdnHZuBlbKNKTC2LYgA
6AKFLdJMJuPj5gtSwq51tdsek2c/R+R4ACRRyY96suxrwrHnh3schTtetX5+
8485hQC09G5OvRF9Aw5DXqufrW8qWfTUMn2IiuuGd+KZpvnq+nP5Sg1Me0g7
81PQnE+Ab8g+gvezcTJ9tKGvuzA78yIO/izwxhHOMJWH6GGl1J+zqnK3QH+X
ayJyL4OjHarCrgikcmZYeFvbA9GB3NjgfkXKJ/MhX+W0Mk8+BoKBnLKn+uFw
kpeA2n+edjGoGVY7U66EF2Qtf/w4NGY+faLP7kdZ88Lbk7YLfUFmzt3KqLgg
Rc3AF2PmpNrNJtChFxK//fV7ZB5mVOtjoi3U7TuvGlHB4RsLRs4/z6U8BZoC
Chx0U3TOx8opf5zUrba9AWXtLDFYlIhUJFI5SGzG24EuCeBO9PeGqtKbcVWq
1PeIxZW+bZnWNPCcak+NERPrRDeqYi3hGTVaKzLWnMy9ZqUSpgE0gyKwITaE
glnoojcvUgsTxNJxJSs5n7CrmpYZwmech/C/RGWtoti1Be49OtdQVyjJyWtH
A3nivKjYKmCTHeRM+ysz7ca+RGdi8/1G7Bj6NvUxVDDPG6nf24DQwbreFpaW
MtsttUKo8gGbr7a7TgCWz0ypUqh0ajjg9OdaWlKkPQ54t9Lf2Y1jpiXlEb03
F21NjifluYAdpzr9mQNBtUxVjzHFp/xNIiUeQZkknpYpIgyB9TIbSkhw+wE/
s5PfDqQegHB7CzB/QrEFLlMf56nfkfRFktJyWdaJcFJgnFVTkmUYvCbmj+U1
23zBcBgBKhYK9w83V3CSKkTTl8l71agBcwCcxl4P1a+bvpXgjkmi84bL6IaK
ZDANOJtnnXGFeZUdOwDUoiqBXLUrYq/n3KjEB4geebyR3Mb5CRNnE7OsRbUX
WirFHLVi2dhrqkvh5sQC+66XMj4qFQHVEn4xFqd4JQQYmxtFMXyXF0RRYpo9
V5DQGL7aUqm+a6R/kPj1qHYTAInafxi1qhiX/g7vX1zn8vlnKUS48ZEghaU7
M3PyhNSLpYQSiD22XEtQJ3e/zzpWuYp3PoahNKUqos08U2moNTrxmMdYgD1x
n20i+4oL9EtRg/zpO26lG7W1LQKoiDyW5CSkZTjc2K7Y5Q5edJ/rhzsiNkEC
gRuJ+H3cIsxRf3MXjRyOXqOqErYtiEy7pDhTX3aiLOA4/IlJTspMjkkNuXu4
L/fdYPJcxI2LSN7c5BNAe2YrtQnRfRhDuGz8AfAG93JtfcR6lOhNLLbS9wYV
G1NiAr5NX8cqWYjfXHw0WvMYE1SNaJRxh/0A7hMkOFmqoY6atBFiaZTmgkJl
YiUtiIXFxJUg69rFZjXPM91zdjJmkrUp3lN15e0i91+JGKTO2diRTpz8Rpxt
QEV4U5tzFgM4d6JOnFPx0eKkUOr0UdlVtWVP0MXvU8OxrqljBIyqWuxKzzvq
DRppQ0Jm0rTzV5fdJa7PzpJ65tyMnbTd8+xT0jC0l0+BJ/SdZR8bInctSUpA
RdRA5LIKQK5iB7rBJsJCUOyBaXwKTaEna0sWsaw5qJsa4tNOGcstmPNTbEyd
9CDvkjAJYt5JljuDmNTYmtidub8w374tU4GoinHXdmL8cTcKiyah3sbUEQhK
UER1ZK2ABFHs5gRSILv2hTCZOAUq4CTNF5NY29emtVQPvas8ATtn5NMt9Kt3
P729ojpaeodAk6y7DFFco1/2haQH56kP24l92TMOg+ZESV+MbA0jXujx8EzG
lvOcX2Jf7ecn6fBHjn+VPMWk+qIiKgCvIn3wjrnviM8Ss9q7uipS2zq70NRF
RNlYjB0Kz8qKkhujizcbIslcOTZQZ1E5lOBQn7wM/e3jq5kYkq/SXPMS3aAX
byQaWcz7wXIPZLnAkW9K1HxVUmycg3CWMGrqg1Pjc2t5Ywp72WyTZfGlkIIz
w52SJyINwx6p5avdVOkRJQf6kIGZyvk0y5EJjz4xQJZbIqpwfU150xJ0DemO
jABBqn1fx6ZM3HQZZyq5PzNcPflcyWV0XUkz+rNDW+l+xCBPLRmrUoPvc42f
Je/u0rGSSENjKOz4eNx9gwsXRAlBUyoqYjZx+DYShTSI9EctZgoScpqde4lF
2GSE9l0eoU1HRuk+jbTELqI1jjtGJSn1CYcnQzqmiWtCuQTv0yJy0EYaSWQa
fDbSuzoNSW8BXUclsYu/kaCIopBGQ218QL1HGW4EmW1IB9JBpThF39LHVEfd
DhNDxKkZRoIjIbREV2c/JCaQRkkkGarhBoftpG9U12oos39f+/eR7N/lmZMa
xInmp9HL7+p2NEFPbpt/laqJdQrYSTrLdR1nXFYvTk+chsfFUa0fP16+EcJd
C5xu7A83OQj12zR/FW+adJO4mRbLiownRiqyP3K1TkXEhsFNEGYBjXA24uQU
z5paWbk5koYjg1VRQKY2MRMcrnxkCDICk+gWpCCG9JFXNPC+1qEKa7fYCJZi
P8Oy1qqPH5/iW199SfG6yLd6Pn1imRrHXLQzFTWBeYaTZ9apcxd9jmjC43Wi
JltHaThN9G/SdZAjVaBMSUFPHmhmxpP0oaQeRlLU9ozvjpoiAPo0Fif5Hq/n
09AdA4JcXQqC3TRPSSMqCRSqwnOHbdIeldG6fBd3ixEl6T2OPZkMxmPxQElm
EiQX4qCwADq1wcM1cWl6OhowkieVjrNJOk9S3tih7nl0+3a4FyCOmru+8VuE
uovDoO+wGXWtSes7Wwh/eDBBpubxZEOrT/0r40Kpdc5WlrkyaSVfnqBTDnMH
6Vdzg8B8qJq+GV94QJKoJe9NpaMF17YjDhP6qou3O6BqNifPvwIAJio+tv9i
UzDhK62aOsEcAGur3GbD45GIq/Aoju4YiZPQFztQDvZST8h0hPyVp/fDNOpz
5uhDHp+Rq/2WqKrM7EZXHh5+uJMx0smYK+UaHnXr0ag7DLkmNVxfHJVHdk+j
DyLNSK7GB5UGb6vTOZ9+FVuhMpLKvQN5TFcYYnGbb7xQKqNicnDVNCMNNK9u
bLdzJfe+zy5ZUaBx3wiGHG7hqHSh46wcHW5PxF/RvQXgF0+eYHvCsQU14we5
j9QuZJ3UFMUeVVoc6lJuivjSUmuJOHTVgM9mwpcHt7G1RnBD2VH4EoQxntrI
3M8ppxdV6Kt04SC14iWT5vzyY7WxxRGkaESNT1wm4hJXoGYEfxvu5CwElmh7
/pnjh4UZwdWEVbY8pv9Q8UdRXdRKKMc5ITXqhgA1fJ0UWnpRu+ESHfXfL64Q
5jFXyyhvci+Jw427NngEkzELIoq63XUvlv6bDjI6Lgd9C0ySUt5B7yUByMIi
XfXS9iOgj9dO5NKADEt9dTDFEX9aqvIuhWXp+B4LDfEAzKWNF7vkO57YEMEr
seUJr1uObiQY9mW+ErLDIephtDYHoFT/7Jm6yG1ZsgInSzNUNuOLA2qY8AhX
LhKN6kOeXpryQHBXar5Yyiia1DUfDaYMMTnqqXsXwkViGOKtOm5VBYntOA3l
aik5MVFxKmiormpQasuUGYz+PVx3rnkAVTG14z6kod/7ciHD8wy3PIY9uPqQ
Z3sqzzvtBzrANlluwHSW8JaKU/CbIma5anSxjM008rJIPMmoiEuKoB0yJAc4
Mea24FYoRfPOGu4tRaqSQuDsBgP1i6AbajkiPkpqtpkSSEJ1SjdBQ2rbr8mB
KDkgFS31r5zLeOyftiQ99K05uKoU4MpTowFHFGfTReerPdeDRIsgvt/SaOko
7d+Yn1Ok5eAcUe9kLx5mDVfibibYdDrnTBOw02u/J2VeLNxStzODpaLZcrbr
5PqQlHfntR/3SCVNaZl25wgabiJhp3x5jcfXk1uX8R7syWiWwnFR45taTfF4
JY2DPRdg2PWRSzH6hxjiBNJIOJuqX77LSWGrR+yXQjn1MIGUYMjcJ3D8wcRX
x/jcEf5JHzcOp84Yv35hwzKbjDgAnmw8fySFpSQD/otUiqFDHka6QirEmnJL
7kJ9cN5KnMdrNx35O99QJm+KYKsHi9NlhMCNmBzocrNT/nEMQ+kKlOkyB2Vi
Nz8nWjycS8V9uilu8haR6VDVx7pzU2KXy7G4JlbLlduoYYnN8lWpVHAt9Rt2
RE6s7clguZMWrWAywd9oTHoO8WvieuQQXKuT2+1iOBMuU3eIpvZ82/Qp3zeJ
wZuRd3TJlKZYAwDHwayogKcBJ1pgm7xxL61ktmspiFNncyjDTvBzckE/TdGk
BltiE2rbyWWD3KfglwhvR+M2IBesSwQ0j8LJJlyMRK6YB5yJEeKzLBcTjwu8
pJL5by6zn2xDJKzgc01QbMjsVM5ML83LrTfArJbGKePYgC4n5X5SQoHApgkN
5ziu81BVx3+PdF7rB767xwE3m+xOwyCaKLVh2jFg18o0WQp5GT8So2AU/Tea
SOeT4V1HDidNFVqRFxz+NQGFqYwzoJmZ2HAmgH3hhJEOS6NO+skMenSJiXqj
oxnYcBFFx35Lum0xor+jmygMidO7bPru+qfrP8hEkeDzm1JuhXjHnApnWuS6
oMt0cP8ty6U+ruRfttny32cosIOdfcKiP7/5Wf0/OC8s4sE3AAA=

-->

</rfc>
