<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ounsworth-lamps-pq-external-pubkeys-05" category="std" consensus="true" submissionType="IETF" updates="{&quot;RFC5280&quot;=&gt;nil}" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="External X.509 Keys">External Keys For Use In Internet X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-ounsworth-lamps-pq-external-pubkeys-05"/>
    <author initials="M." surname="Ounsworth" fullname="Mike Ounsworth">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>1000 Innovation Drive</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 1E3</code>
          <country>Canada</country>
        </postal>
        <email>mike.ounsworth@entrust.com</email>
      </address>
    </author>
    <author fullname="J. Gray">
      <organization>Entrust</organization>
      <address>
        <email>john.gray@entrust.com</email>
      </address>
    </author>
    <author fullname="D. Hook">
      <organization>KeyFactor</organization>
      <address>
        <email>david.hook@keyfactor.com</email>
      </address>
    </author>
    <author initials="M.-J. O." surname="Saarinen" fullname="Markku-Juhani O. Saarinen">
      <organization>Tampere University</organization>
      <address>
        <postal>
          <country>Finland</country>
        </postal>
        <email>markku-juhani.saarinen@tuni.fi</email>
      </address>
    </author>
    <date year="2024" month="October" day="08"/>
    <workgroup>LAMPS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 68?>
<t>Many of the post quantum cryptographic algorithms have large public keys. In the interest of reducing bandwidth of transitting X.509 certificates, this document defines new public key and algorithms for referencing external public key data by hash, and location, for example URL. This mechanism is designed to mimic the behaviour of an Authority Information Access extension.</t>
      <!-- End of Abstract -->



    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://EntrustCorporation.github.io/draft-pq-external-pubkeys/draft-ounsworth-pq-external-pubkeys.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ounsworth-lamps-pq-external-pubkeys/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/EntrustCorporation/draft-pq-external-pubkeys"/>.</t>
    </note>
  </front>
  <middle>
    <?line 74?>

<section anchor="sec-intro">
      <name>Introduction</name>
    </section>
    <section anchor="sec-pub">
      <name>External Value</name>
      <t>The id-external-value algorithm identifier is used for identifying a public key or signature which is provided as a reference to external data.</t>
      <artwork><![CDATA[
id-external-value OBJECT IDENTIFIER  ::=  { iso(1)
            identified-organization(3) dod(6) internet(1)
            security(5) mechanisms(5) pkix(7) algorithms(6)
            TBDOID }
]]></artwork>
      <t>EDNOTE: for prototyping purposes, <tt>id-external-value ::= 1.3.6.1.4.1.22554.4.2</tt></t>
      <t>The corresponding subjectPublicKey is the DER encoding of the following structure:</t>
      <artwork><![CDATA[
ExternalValue ::= SEQUENCE {
  location     GeneralNames,
  hashAlg      AlgorithmIdentifier,
  hashVal      OCTET STRING
}
]]></artwork>
      <t>Upon retrieval of the referenced data, the hash of the OCTET STRING of the retrieved data (removing base64 encoding as per <xref target="RFC4648"/> if necessary) MUST be verified using hashAlg to match the <tt>ExternalPublicKey.hash</tt> value.</t>
      <t><tt>GeneralNames</tt> is defined in <xref target="RFC5280"/> as</t>
      <artwork><![CDATA[
GeneralNames ::= SEQUENCE SIZE (1..MAX) OF GeneralName
]]></artwork>
      <t>which we use instead of <tt>GeneralName</tt> so that certificate issuers can
specify multiple backup key servers for high availability or specify key
identifiers in multiple formats if the corresponding public keys will
be distributed in multiple keystore formats. When multiple key locations
are specified, they MUST represent alternative locations for retrieval of the
same key and MUST NOT be used as a mechanism to place multiple subject
keys into a single certificate. Thus, when multiple key locations
are specified, the client MAY try them in any order and stop when it
successfully retrieves a public key whose hash matches <tt>hashVal</tt>.</t>
      <section anchor="external-public-key">
        <name>External Public Key</name>
        <t>When used with a public key, algorithm parameters for id-external-value are absent.</t>
        <t>When ExternalValue is placed into a SubjectPublicKeyInfo.subjectPublicKey, the ExternalValue.location MUST refer to a DER-encoded SubjectPublicKeyInfo, which MAY be base64 encoded as per <xref target="RFC4648"/> for easier transport over text protocols.</t>
        <!-- End of Introduction section -->

</section>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>##  Object Identifier Allocations</t>
      <section anchor="module-registration-smi-security-for-pkix-module-identifier">
        <name>Module Registration - SMI Security for PKIX Module Identifier</name>
        <ul spacing="normal">
          <li>
            <t>Decimal: IANA Assigned - <strong>Replace TBDMOD</strong></t>
          </li>
          <li>
            <t>Description: EXTERNAL-PUBKEY-2023 - id-mod-external-pubkey</t>
          </li>
          <li>
            <t>References: This Document</t>
          </li>
        </ul>
        <section anchor="object-identifier-registrations-smi-security-for-pkix-algorithms">
          <name>Object Identifier Registrations - SMI Security for PKIX Algorithms</name>
          <ul spacing="normal">
            <li>
              <t>Attest Statement
              </t>
              <ul spacing="normal">
                <li>
                  <t>Decimal: IANA Assigned - Replace <strong>TBDOID</strong></t>
                </li>
                <li>
                  <t>Description: id-external-value</t>
                </li>
                <li>
                  <t>References: This Document</t>
                </li>
              </ul>
            </li>
          </ul>
          <!-- End of IANA Considerations section -->

</section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There are no security implications to externalizing a public key from a certificate as described in this draft. It is of course possible for a malicious actor to replace or tamper with the public key data at the referenced location, but since the hash of the public key data is included in the signed certificate, any such tampering will be detected and the certificate verification will fail. For this reason, external public key data MAY be served over an insecure channel such as HTTP.</t>
      <section anchor="csrs-and-ct-logs">
        <name>CSRs and CT logs</name>
        <t>In practice, situations will arise where the ExternalPublicKey.location refers to a location which is not publicly available either because it is in a local keystore, on a private network, or no longer being hosted.</t>
        <t>Not having the public key in a certificate signing request (CSR) could make it substantially harder for CAs to perform vetting of the key, for example for cryptographic strength or checking for prior revocation due to key compromise. A certificate requester MUST make the full public key available to the CA at the time of certificate request either by ensuring that the link in the ExternalPublicKey.location is visible to the CA, or by supplying the full public key to the CA out of band.</t>
        <t>Not having the public key in Certificate Transparency (CT) logs could make it substantially harder for researchers to perform auditing tasks on CT logs. This may require additional CT mechanisms.</t>
        <!-- End of Security Considerations section -->

</section>
    </section>
    <section anchor="appendices">
      <name>Appendices</name>
      <section anchor="asn1-module">
        <name>ASN.1 Module</name>
        <artwork><![CDATA[
EXTERNAL-PUBKEY-2023
           {iso(1) identified-organization(3) dod(6) internet(1) security(5)
       mechanisms(5) pkix(7) id-mod(0) id-mod-external-pubkey(TBDMOD)}

DEFINITIONS IMPLICIT TAGS ::= BEGIN

EXPORTS ALL;

IMPORTS

  GeneralNames
  FROM PKIX1Implicit-2009
      {iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-pkix1-implicit-02(59)}

  AlgorithmIdentifier{}
  FROM AlgorithmInformation-2009
      {iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0)
      id-mod-algorithmInformation-02(58)}

;

id-external-value OBJECT IDENTIFIER  ::=  { iso(1) 
            identified-organization(3) dod(6) internet(1) 
            security(5) mechanisms(5) pkix(7) algorithms(6)
            TBDOID }

ExternalValue ::= SEQUENCE {
  location     GeneralNames,
  hashAlg      AlgorithmIdentifier,
  hashVal      OCTET STRING
}

END
]]></artwork>
      </section>
      <section anchor="samples">
        <name>Samples</name>
        <t>Here is a sample of a Kyber1024 end entity certificate with an external public key. A trust anchor certificate using the algorithm ecdsaWithSHA256 is provided so that the Kyber1024 End Entity certificate can be verified.</t>
        <t>This is a modest example demonstrating a 550 byte Kyber1024 certificate and a 2.2 kb external Kyber1024 public key. This "compression" effect will be even more pronounced with algorithms such as Classic McEliece which have public keys in the hundreds of kilobytes; with the external public key mechanism, the size of the certificate remains constant regardless of how large the externalized subject public key is.</t>
        <t>End entity Kyber1024 Certificate with <tt>ExternalValue</tt> public key:</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----
MIIBbDCCARGgAwIBAgIGAYro4QFGMAoGCCqGSM49BAMCMDoxDjAMBgNVBAMMBVFT
IENBMRswGQYDVQQKDBJRdWFudGl0eSBTdXJ2ZXlvcnMxCzAJBgNVBAYTAlhYMB4X
DTIzMTAwMTAxMzYxNFoXDTI0MDEwOTAxMzYxNFowHTEbMBkGA1UEAwwSRXRoZWwg
dGhlIEFhcmR2YXJrMGkwDAYKKwYBBAGBsBoEAgNZADBWMCWGI2ZpbGU6Ly9sb2Nh
bF9rZXlzZXJ2ZXIvc3VydmV5b3JzLmRiMAsGCWCGSAFlAwQCAQQg0K1P456WkMCO
RxsGOm271ynblXxFCgkTDI78by/RRJCjEDAOMAwGA1UdEwEB/wQCMAAwCgYIKoZI
zj0EAwIDSQAwRgIhANqC6ZVDVrgaFFPxJcnhJO6kRGU9dHv5vRDcf2paXxSfAiEA
2s/xoctsB1oCisbjK9HCUw/rzXoVKhkt1ZEXuapJYCk=
-----END CERTIFICATE-----
]]></artwork>
        <t>For illustrative purposes, the <tt>SubjectPublicKeyInfo</tt> within the end entity certificate decodes as:</t>
        <artwork><![CDATA[
subjectPublicKeyInfo SubjectPublicKeyInfo SEQUENCE (2 elem)
      algorithm AlgorithmIdentifier SEQUENCE (1 elem)
        algorithm OBJECT IDENTIFIER 1.3.6.1.4.1.22554.4.2 ExternalValue
      subjectPublicKey BIT STRING (704 bit)
        SEQUENCE (3 elem)
          SEQUENCE (1 elem)
            [6] (35 byte) file://local_keyserver/surveyors.db
          SEQUENCE (1 elem)
            OBJECT IDENTIFIER 2.16.840.1.101.3.4.2.1 sha-256
          OCTET STRING (32 byte) D0AD4FE39E9690C08E4...
]]></artwork>
        <t>The external public key object referenced by the end entity certificate is:</t>
        <artwork><![CDATA[
-----BEGIN PUBLIC KEY-----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-----END PUBLIC KEY-----
]]></artwork>
        <t>For illustrative purposes, the key data, which is itself a <tt>SubjectPublicKeyInfo</tt>, decodes as:</t>
        <artwork><![CDATA[
SEQUENCE (2 elem)
  SEQUENCE (1 elem)
    OBJECT IDENTIFIER 1.3.6.1.4.1.22554.5.6.3 Kyber1024
  BIT STRING (12544 bit) 001111000100000101000
]]></artwork>
        <t>The following trust anchor certificate can be used to validate the above end entity certificate.</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
      </section>
      <section anchor="intellectual-property-considerations">
        <name>Intellectual Property Considerations</name>
        <t>None.</t>
      </section>
    </section>
    <section anchor="contributors-and-acknowledgements">
      <name>Contributors and Acknowledgements</name>
      <t>This document incorporates contributions and comments from a large group of experts. The Editors would especially like to acknowledge the expertise and tireless dedication of the following people, who attended many long meetings and generated millions of bytes of electronic mail and VOIP traffic over the past year in pursuit of this document:</t>
      <t>Serge Mister (Entrust).</t>
      <t>We are grateful to all, including any contributors who may have
been inadvertently omitted from this list.</t>
      <t>This document borrows text from similar documents, including those referenced below. Thanks go to the authors of those
   documents.  "Copying always makes things easier and less error prone" - <xref target="RFC8411"/>.</t>
      <section anchor="making-contributions">
        <name>Making contributions</name>
        <t>Additional contributions to this draft are welcome. Please see the working copy of this draft at, as well as open issues at:</t>
        <t>https://github.com/EntrustCorporation/draft-ounsworth-pq-external-keys</t>
        <!-- End of Contributors section -->

</section>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC4648">
        <front>
          <title>The Base16, Base32, and Base64 Data Encodings</title>
          <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
          <date month="October" year="2006"/>
          <abstract>
            <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4648"/>
        <seriesInfo name="DOI" value="10.17487/RFC4648"/>
      </reference>
      <reference anchor="RFC5280">
        <front>
          <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
          <author fullname="D. Cooper" initials="D." surname="Cooper"/>
          <author fullname="S. Santesson" initials="S." surname="Santesson"/>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <author fullname="W. Polk" initials="W." surname="Polk"/>
          <date month="May" year="2008"/>
          <abstract>
            <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5280"/>
        <seriesInfo name="DOI" value="10.17487/RFC5280"/>
      </reference>
      <reference anchor="RFC8411">
        <front>
          <title>IANA Registration for the Cryptographic Algorithm Object Identifier Range</title>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <author fullname="R. Andrews" initials="R." surname="Andrews"/>
          <date month="August" year="2018"/>
          <abstract>
            <t>When the Curdle Security Working Group was chartered, a range of object identifiers was donated by DigiCert, Inc. for the purpose of registering the Edwards Elliptic Curve key agreement and signature algorithms. This donated set of OIDs allowed for shorter values than would be possible using the existing S/MIME or PKIX arcs. This document describes the donated range and the identifiers that were assigned from that range, transfers control of that range to IANA, and establishes IANA allocation policies for any future assignments within that range.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8411"/>
        <seriesInfo name="DOI" value="10.17487/RFC8411"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA81bZ5PiSJr+rl+h6/nSPdWFh4K624uVR4AQ3m1sXAspkYQs
MoCYmP3t92ZKmDI9N3txEXsVM10gpXnt85rMen5+phI7cdErLZwTFPmaS/dR
FtNiENHzGNGyD//hFyihV6VmpUNzKErsna1rCYopbbuN0PFhcj4GL0EZge5r
HqxsRNoueQ5SPz4FUWI9u5oXxs/h4RkVs57DdOvAlOdKk6J+of/j356f6TjR
fOO/NDfwYYUkShH9/Pyf8FKLkPZKT5GeRnaSUSfzlR4wymhKOafXG6nPPN6S
AhpfYSGDitOtZ8exHfhJFsJ6sjATaRoWc+Pglf5i+wYKEfzjJ1++019khoVf
IIAv8mQmfqH0wI+RH6dxTggF/NYpoBe4MV4p+jlnGn+4iWGUbl1bx3KgjshP
0StQTptRkIaw3cD27AQZNGMYdgI0wXgF6Zbm27EX0zvYeNSXVzTwT08VWRHo
r0Ri377gRXIGviyDyLF9k5bwmuSFp9kuvIhDLfb+aqNkVwoik7zRIt2CN1aS
hPFruYwH4kf2EZWu48r4QXkbBacYlckS5S8UUGwnVrqFuYIPnMcJF0RhEGmY
6HKu1U+0iCe62DqSh00/LlDKFy/Zwc+XKr83nU/GlKzEc79QoCUDBPJKp8nu
uU2F9itNYxXrmk+nYMhaFGkZ/dXegdJdOkPxN6xhS4st2kIRApqTQH/FL+Bj
DJtFaBe/kiUMtNNSN4lhxPV95uWv8VdKSxMriMAS4OeZ/EvTtg9vlRKtXkkv
nuceodgO+vAK1ACOlMuJLmykeHVzs/xt8TQGGhEIuVqpVMD0/eBIBEvzEai2
GKODk7zSapJoJ+07rfqJFtnB9R3INYngNaf5mqHdnhpAYb/Wp6tCvXiGcuPy
gOzSTRl/RTk1JT3w3vC+S10357NXAgPVsjuDYOMXQuR7Xood9oEFhgFT/sTi
fInuBoHz6eLgeKKmJ0H0dnlDO9pGyYJZfwXT2ZERH3YoVKRFjpM+91Lsl7Ra
oqcaiM5H/qO2ZuCXYDz03AeJRzEGpHeiFW3fBUd+J8d87T1ZuxQXC/81SeHb
zqYoP4g8YOSIsE1NRK7RarSLj81au1J8bDeq1dcbXgr8UJ0Jr0Q+YJ+g6DOB
ksSyY2zBsINBLP2Vvvpk4YDAf1nXtkHZiTTPCE7+c7TTa61ahyAuZfu7OzlU
GhrYtd9QQz3D/toWzBEESiman9HBDjZGdBiAKR9SzU9Sj9ajLEwCUG5oATRq
rhkAgluAeJZ2RIAYkQkTctwkfo1jD17ExqAOaIIXjZCR6hj3tiDUk20kFtkq
0nwQfoJf5AFIfwhS3wsZBHrqgVUVwohpH50e9iNw+0AUlh34OOzskw2vsPM4
BUSh0duMoMh3soAb6MQCv5P56Az24YJ5TAYleoaJ8K44TxOtxLaJ1QK44oG/
64TdLQJ52EEaYc4AvBiCLmBaII9CE+DjjK6jOCZU+TiulSgqNwMgAuYxhTZy
FRIFebZhuAjbC0TJKAA5koV++yVG+rONH/1O4be3GLbQXIi6+XtgGt7OsDaM
OwIfyYib0OAdyBfEjiLMHqCuQcRQPM6wGLVH+cE7LAEtScGHTmAVFp4XRgF4
KczVYhh+1QHCUropAUseWP7HP/5BfSRIZXsCN6NlXhjOZFEWJjT9+voXmv4N
Vg++Vr8VzlgA9ZVm4/kRQr7Wv4HFGF9b33L7g6Ti/cy4yEG+Nr/d9Rrjb6Fj
n7++fHswJ1jnzdwZy6syT/9OOKBuvgsCAe6TAII8FlaYQrSMsQX/+MglZqla
qpdapWqpAf/Xas1mAz7VfuSK0oMIvCYMfBwWaciA9khP8rwE0BELGlsbD9IB
6ZLYefXaXeC6wYnMAgzWsXZec1lfbWNxo2AqjOfCkBPo33DUL6yfsCghH0Wa
OwQ0jb/DS+wkjGvm/DNXycg3k7mOgbXzMSo3E2b0dDaRhxJVSGoO/IBJJJGN
QApXgm82YhDD+E4ektBeDHhc6j6JrFLMob9GyAO7I9ASo1bjLhUwQwB5+m8F
EP+dhhzCR9j9tCj7Rivz6QycloYAQMwI7B7PurKLfVtLwLLxnj+uArzpoYTH
/aCJSsGgfzxK7Qf9AN22TyjAiPt3ICnXx+Pot+qYyhvIG6ulksKsvtGq+KiO
XJS5v50QyY4gXUmQRqDjkYQfkAkB4VryCKhAVZxCtMOpFRWHSAfXpj1IkGyM
dVtNd9KQuHeMIhwViVlbtmnR2hGnnlvbxWiGnb+YDIOpO3bEmNfbejnkxVjo
yQerfggX9Ml2XQr0YNhgtfY2TXKh3RbCgyDc31Ys0UsLvX1/M2AobGBgTh6o
lBhUlms6QiEQgOOI5hJd4sB4n1jEjbcGSsUgy1uQIcuAw2OjIRhJcO4eGcBi
QlcDwLuRVjgvRfgEOApgPDYyePWgFxxiUsCK0z/FFq27NuZGYdYQRzP8yMNy
I1E8MsDwMc0guTBf2E6gmiLBB2ca2c2N4rfQfrIAuHIfJOYP738U3v0D7BwC
zS+fVksUUQoRywnw4c2i3x9CTahBsoKSq3l9EpWAU8hJgLVSsehb8MKBBkvZ
uAp0+g4hcbQtvYfNXGRvVirdUK+wD8AimqwI2PpMUAQ2+Wz170XMw6Lfoje4
k1vFW9ghGYUW4+hKEh4opCAnOuKvwHseOPTAjYl432QDbwI+hC3yO88MIBtg
hgzNgXGAB0aFERdJAZQFv2NF0Sohnr6DNQD43ahgCIxRYAewtwkysQPmEnnG
BeytWL+XtsXY+3qQotA0D3bpaZAfE5KYuMiOnulff52g3CUgbioq/+uv+fBY
j+ywqCZWM2EyZAbPoznbF9bPtUqtDjPBLrzAeF8z4tmTa8yAOo2kZnyRHxbs
fGT5kbP4p6zdIluMeWISXAfT0wT8kywOZcbP+bxy+euveX4AfObjHxj9YOlk
yB9w88YQPtH1e3u4sfR2HEkqotyv/OCW/NA2ZLj2FfweUjT78iHd20WBB08e
Q4lGsmDgbpujdZ6p46If0v8EOylQDcVUFJNiIra3eUjAgAl76JAnA/DgMg7v
HRXyw99IZZZjCKlE3mXtENLeZQ731B1iB4ZXnHK+yyPer2JjONbd1LhSj+hC
mQ9MfidYCqBpFVRhweBohZ3eAAzTcajCKEvg+EE6eUpRoAuZsYMAWiLNOSKp
CPAAU/zT4qSAFhKJjRwsoKSAaI/VB5tByPGRmxMHuujOZqMSwWZuOokJTZBI
u4EJ6odqLMQlha0DR1BtpYXOCV1QwcY4hccW8oiQ9zznhpJE5HGOkLeHt+Tf
D5KCCYgtRb4AKkegR6B9i3SNpCtJLvpiCfcW3L/TAX4YRvYRCxCy9lMQOaSZ
B0brBr5JViEJGtSmyABuh7AlLrng2Tsdkw0eFYKVi8dF6JBiv/4KYvqG7dM1
wB4dQhiEDNy7TGwNh0dLIzEUmyzHEK7BAHAGAsrNC9bCtEh8eywa8ee3JTPu
9/gmLnnhjYV00gDMawabZB3HqziNlJRLmAeo7iEyeKCeEs28YaZgAqgjgYvQ
T9J/3EF4LIxvWkgCMoBjru6T2JDXYA/9uOxNZRmNe6dRLt5inmv7ztVh/sBU
QMdHO/f529ZEl1vsT2HoZlelvaf5TmmQksYB7hfgwPiHyn5obdMzEmI1DA4Z
6Hn2jbjBn9U1ThFxS7Ww9KvOtRR3fPHeWuzE2FYL97q2B7SMyM/GQHvvDsOg
e4H5rtL/CVy/hfVfaCbEDW7wXRKuaWY6LFWLMFyUdp8E0MeS9be8dv7n6uXH
Gvm62Oelch6ov1a+/SRkf80j/7ffKYoXRHkoz2R1OKVlZTSQOXlGzxhpSiog
VpDkIZTUq5E6mU1pZjD4d8AuhXyjqLdlKXwVJ6pCAndVJoHMToBz3Mz/P2X6
T/KMX1Sf7SshldrXZgdz/Gm9/NvvV/LvL+8Non8BF9fOd86L9hlRmKM25gh0
8s/3bej/feOG/r/v3PxLmyGUMOTzMh6ceUoCBjh2F4dfG1dicR5DcAeR7mdb
FFUrNVxaGDTeAdDiEbHzQsv/LIvAMSM/kNB83cJx52Fe3ujAMHqvy5BuxNoS
Pk67TK3ZetPPu/YS8Iw7URjHhI9E4XObh65KCeefOOaTWhkKJBxhikhpIA8Q
j2TmJOVsNisQIZLHTd7knLjRS9dKNdrZ3nm+j33knuz5hcRQRM4Pv9Bot8OF
wTWBg9IXqm3cVwA+/SAluWQu0Xsz+Zpfca4Gq+i0ogtQdevXpidpgD/2MorQ
aKW+ESGDJMGO7QaYqfjf70ntZ2nfzZ6/F+noBV1TjLdR2tMgDaTx2SaOYPDA
hPDl4qYyDLeCU9GRf9wH1jKuzYg3oRMHJeFuXHdZcu/N7Mcbr/nxsErRYnzG
PwTEaU6YYBzgmJlAnlKKLLNbnuOYiWQyJ5llTFli1lHQGIuSwgQSxx2kqdLo
sIzCKXxw5veMwprDBXxX2IU4o2RhyCqT+CSN1/xiPO7zbG9iLMXUkNwKmrIz
Y9WrbVbuUfeVM3dhevnk9YxxrbXCNlYUP5Mvyow5wf9n5bI+D8VgBc8qCi+c
1PuzU3cmbBXWkZjqXGBOp+lkNQk2y5NJGZLlyoJo6d6ktl71IkVyTjyz7vdP
a5ZlJDZmA4ExhxuGZ5cKt5Tk2ibcSvPWIOvE29rQorZiJwISLxtCqnzU64vM
8BbNbb13GXgTW2FiiVty0pQRXeY05pjx2Kz0q6NGs7V0FE6lJudYUr3aSzXz
t+7qLHKmM+Pll/Y2K08mPW4v8IyqMCdMuiGcBLYMiygMc+LMtdwPNjJ12VeA
J5mfjpnTxJQtZnjgWpsFvwAUFsXRuaf7Vk9tORNp3jG6x+Zxwuu7WqitztMd
YwsMVYvL50BPYrYacHa83fc7XW5+KkeXVbDoW05S3QirVAt7a875S24PgHYf
rYHAHy6FwBPT3P2JG1175qTh+lnf5QcxxcLHfoKJBsJdGACbuLDL950gvNCn
XZ17FPhao5GLvGv8uIPkJ4D/MKv6ZtbjvI8B8tMDgLf9qeth8fsDAFa+dcS/
vlQa9NZO7nveqam/o4b+A0rxz99af4dJTQLA3+id7aLXcpkUaf+FoY20hMtQ
DxxRFkRxydj+6ZU/cl8rVVuldqMCzFcrWBTAPKS1saU9Q+x5mPym//+1Xiuo
4ysM3xCFekfotDoVrtIWGqVSKTes2U/wNcjR76FxsM3+yJDs+COwQYoNWSuN
0+wrrklDnhmyZhyxpiAwa+kkmXOJOakcCx4zEkRmvd90OHffm/E9u6f3WXnB
dVuc69R5nqGy7WIyMuLVrMX4ZY+5uItRdz9JTCiz9Kgvu+bk8OJaWZDtF97B
OcRB9TSW1GHtuFkr7eg0p+YbMZPm+ilz1rXtYNnLQvYYhN6cl1KP85lJNDzo
h8m0cekGjiouN6uDfvYX5zZ/3MQBrzeowVAWmEHfah3FxblqbVrJWegn58M5
2nLVkRRvGpvqprNY1xO2vO45i77HDw5nPfJOYsZ0HZvihCTQDtOzY7AdnR3J
LjJtYz/uTVvCQW1rl+ScNrKldi7vt2LaElWuqvemtX7MDtU9szkKlK5YY1nq
VyY1rVVOJKc127DdTdI13PWqlRrLpir4yzqzb3RUv6Urs9pGOZePbhjP0go/
DVaUe3R7+8xe9s+ayw3HqqQbyqA/1DjVaQ+98yBeGLrTWibobE+41tLSdW0x
qUw3AVIbPMseKfWFa3tbNVplmW9Knh26w6gV9LR1s7cdzBSNi3uWPTwfDW/A
JOesLejhZFEVPcVRk4PRX1HikTupp/NuIiVnfuSqHiO0mIO92YWGJzGSdm6u
2O3Y6TdnvBB1ZdsYbKVdXdbHlymrZuKJ6o4G0pO7kuzNRGTF2LMD2wn3aqX/
tO87y95IHOrbylRd605iKmfpvEFKOO52+XCKMv9FUqiUOy2iKisu2+f6tJ49
MaYyMIXNrN6VR1nm7vnhieWq82ozFqaVixkuqke26aOxgth5p82MqEUornv8
grfYnjltHLzezqpqYjr2693RrM2O186F9Y+o3or7fR4AkFkzXCbESn/Z22SW
faYMZ95tuHHj+BS0lEgIBuJm00+Hl+A0TPfuod2uDZFU1poSt54NW2b4NFow
VrO/7WpGR7FtnXqSen0X6r24Nz9fNpJwattMwI65TceYdg1rytvT0XkWByp4
wSE7t42l0bOazM4bM/0XZmlT8caqNBtK6yVKtJkeDhbbQ78NXicOYjkZWmml
F6fzcDjMniZna861ZpDJmc56OeISf6mkM6psi6alzwa6c1GfJpHEIMNxh0Lv
hVXarnMoHwbK6rDz0kZZW1TVxSI8p1lSXk/1qqOOpuGU0tczrmlK53ZzuAyF
g+elc9kuq7Er6BwaDN2KZGZHcXr29UkDLcaVAX/eV2db1ekkTWkhtKm6zCub
sx30m3GYhV5j35+IBzTps8t+cuE2nFdTdLufCMxmvlKnzstBddtT2+zM0GJu
Ngcjan3wNn0u6CLW7u/3rt89j5uaoLzwO6fd1ZZuTTYtdWXYl5Fdba5EL7J2
g0PP3mf8+NA+JzFlbyeVjB2u9BdWcvbSZTYwGdSYbza+flyLcX+PLKWaertw
mFaPl8QPhaTedJd6ay6v0eXYozielZbGgekJYo/duadLaB7FmjuTU282W2gX
NIo5hjHrbc+sHsJI5Ia67eieXxmlp3nXm1LyRavqnfmq3O03xsIw6XDZwO+7
laM3EpLRUk2PJuqwyNU7/bm97XZZTq41FLPFbNfHmjFQqZeNwO5bTjQI544j
JNLMQc3L4jQxRKXfenJGDVHqcOFidxiG3EusVjyGcxCjbKY2Y6BoWqcUU7O7
1UnoSI5SrTpSWVZa8/qRGSmMqTbOXaWxY+tLc9eMEMu1N5NJ07XX0pTfdPpq
N3JOlDzdrIaasB70RHaxMppmuR/FoAkGMOowihVRWbaeZKse+OP2pOnIzvas
tMrzl5rv9VWGe6I623HKDdiD3AvqkqhU2i/s08CTl81NryUuFp3jVD5qvBWx
Pbt7Gk+lOI5nTzXOTyThSePPFqVoCyYduPbenKKI1buO2rfGIrOS+8hShaGu
7M7ysnJqcCy3GEfn7TyUbeYY7gcVfzgP0J6SfJN5QqnINzbCVLmMqnOZgxCS
bSbT1iKcjv1OcNnxZ+XssqOkrLQuJ1VKKsvO3tL0fSTHlJyd2TrvdepZzPva
ZOIl6tJkGLZd2fSHEzastdNlMt/21hcUeQNvPhzHy35Lbo5qWbsXmCxVt5Ig
yuZTIxVWaxUxixm39j1zV8968enii6OhJW3CYdCrDf1e2u9OX4KKyi0m4Tad
rBTVoma6MhQzvf3UzsrlQZjW2w7PVXejfitcduYLa9ufSCIzXob9wF9eeElD
thXwY31UnfDtxfxIrWunhhKo4dAxYt4UvEByjk9VwT4NptuZFaK4epK0snN+
sa3TllkfU3UvSht53uDDp2jfq1Jz36miSJRdLbMklYmau6WGhuqiPp73O9p0
lC0WzfWEX20m/d5W6614V2v3BrzK9SE0aYsW1evKs7ovHvrD8UNG/T4N+TMJ
9fVk4fu9ZW8nMXJxo+HzZPv7x1z6swz589zvz2S8Tfhev9ecMO8xta3Wmo08
uaUrlSr8VOBXpUL+xb/v2d792stPOx5FU4IcTycBvrVh4+tweQ9kGxx/lgWW
/lxtu5tBbTudvqttWfH/V22r7oVrgYhrW3G+UMxxRThT0oXZ5KsGiuCK1fWy
WdFWk6YsDqu6v3HRspPpF2GgMHlhzFpQ4YrmaTljZqypHyjL2aujscyypnnI
PyssexoCzk83Qz8eb7UaoBWzsyCdb71UoGI+SrvgRZ+3OotJTX6ihuOkXquK
yHpi0kp5+jQJtsskO7d6vugz2/K6UllbY4OpuvalYjdcMTivTyLPTDHV3YnC
UsyuLXA8IzHjbpkxBea95JmKzijCmJO7i8rM2Pe8zpHz606nfrZmK2Vcofh2
Mk4vq14iroZS0nfa6njM2KzfzvqDS4SC6GUcGdK8y3VfzIqj8XomN84rv9PU
RnvTLi+oIfOX/7Ho/YXc4UOuC86W4vsTURCCsX08sh0GPspvW+BX+bUYqLpI
C4zRHT84ucgwycl0XDTYbtckbV8vLmsj0ibKZ5OzBTxdDzwy7Xqqm3eLyBV3
3EBCZ0wROddAtGDYZNsTOTxB5AIKOTFx8T1ofBJ4p6VoOOHZ+EiRHIvaESKN
KQMZ19PQD1fVQhSELsKwBMslCb7Nj89p/Iyc+tEeQrg7mNNukm4sPnX1AOoI
S/iICHfXCO1YrlHgQ8WH7+uSKQtVHuFrFztw6OLSBT4+0gAnMqRFuGMHQBmn
dpKT9iBJAD0InsCZYpPTtq/Fzedv+GJKfqBuYmp2qUtk4brfi1Nl0s70s7v0
iRCtgJwT4aYhtUX4So6vGUAR8JyATAPPTjBrRC+EEBf2Lb1X7zaI8G3//O4I
GRvbHv7DgNuQ+JGMhNzneax6EQgeq1fznZg2g+uRW34ZPs6lAHMwjN9WLNH0
Fy4I85ug7knLYnKUhq8iEuUU11vITVpyvRVoJFciffSFfiZ3YfCt57/nZ9SK
Rk5A39gmRT38VcVbqyUEXq8XELGfIPsLPFSiRy7sjI/Jc/M7FX9coQOpd3Xm
05LvuJELM138G/zOz+/DgWVhTX9yt/qnfzvx+Z814C7Ju/s7b3z38WDvvwEg
IClmvzMAAA==

-->

</rfc>
