<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-tls-composite-mldsa-09" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Use of Composite ML-DSA in TLS 1.3">Use of Composite ML-DSA in TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-09"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Timothy Hollebeek">
      <organization>DigiCert</organization>
      <address>
        <postal>
          <city>Pittsburgh</city>
          <country>USA</country>
        </postal>
        <email>tim.hollebeek@digicert.com</email>
      </address>
    </author>
    <author initials="J." surname="Gray" fullname="John Gray">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>john.gray@entrust.com</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <author fullname="Daniel Van Geest">
      <organization>CryptoNext Security</organization>
      <address>
        <email>daniel.vangeest@cryptonext-security.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="03"/>
    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>ML-DSA</keyword>
    <keyword>FIPS204</keyword>
    <keyword>Composite</keyword>
    <abstract>
      <?line 71?>

<t>Compositing the post-quantum ML-DSA signature with traditional signature algorithms provides protection against potential breaks or critical bugs in ML-DSA or the ML-DSA implementation. This document specifies how such a composite signature can be formed using ML-DSA with RSA-PKCS#1 v1.5, RSA-PSS, ECDSA, Ed25519, and Ed448 to provide authentication in TLS 1.3, including use in certificates.</t>
    </abstract>
  </front>
  <middle>
    <?line 75?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The advent of quantum computing poses a significant threat to current cryptographic systems. Traditional cryptographic algorithms such as RSA, Diffie-Hellman, DSA, and their elliptic curve variants are vulnerable to quantum attacks. During the transition to post-quantum cryptography (PQC), there is considerable uncertainty regarding the robustness of both existing and new cryptographic algorithms. While we can no longer fully trust traditional cryptography, we also cannot immediately place complete trust in post-quantum replacements until they have undergone extensive scrutiny and real-world testing to uncover and rectify potential implementation flaws.</t>
      <t>Unlike previous migrations between cryptographic algorithms, the decision of when to migrate and which algorithms to adopt is far from straightforward. Even after the migration period, it may be advantageous for an entity's cryptographic identity to incorporate multiple public-key algorithms to enhance security.</t>
      <t>Cautious implementers may opt to combine cryptographic algorithms in such a way that an attacker would need to break all of them simultaneously to compromise the protected data. These mechanisms are referred to as Post-Quantum/Traditional (PQ/T) Hybrids <xref target="RFC9794"/>.</t>
      <t>One practical way to implement a hybrid signature scheme is through a composite signature algorithm. In this approach, the composite signature consists of two signature components, each produced by a different signature algorithm. A composite key is treated as a single key that performs a single cryptographic operation such as key generation, signing and verification by using its internal sequence of component keys as if they form a single key.</t>
      <t>Certain jurisdictions are already recommending or mandating that PQC lattice schemes be used exclusively within a PQ/T hybrid framework. The use of composite schemes provides a straightforward implementation of hybrid solutions compatible with (and advocated by) some governments and cybersecurity agencies <xref target="BSI2021"/>.</t>
      <t>ML-DSA <xref target="FIPS204"/> is a post-quantum signature scheme standardised by NIST. It is a module-lattice based scheme.</t>
      <t>This memo specifies how a composite ML-DSA can be negotiated for authentication in TLS 1.3 via the "signature_algorithms" and "signature_algorithms_cert" extensions. Hybrid signatures provide additional safety by ensuring protection even if vulnerabilities are discovered in one of the constituent algorithms. For deployments that cannot easily tweak configuration or effectively enable/disable algorithms, a composite signature combining PQC signature algorithm with a traditional signature algorithm offers the most viable solution.</t>
      <t>The rationale for this approach is based on the limitations of fallback strategies. For example, if a traditional signature system is compromised, reverting to a PQC signature algorithm would prevent attackers from forging new signatures that are no longer accepted. However, such a fallback process leaves systems exposed until the transition to the PQC signature algorithm is complete, which can be slow in many environments. In contrast, using hybrid signatures from the start mitigates this issue, offering robust protection and encouraging faster adoption of PQC.</t>
      <t>Further, zero-day vulnerabilities, where an exploit is discovered and used before the vulnerability is publicly disclosed, highlights this risk. The time required to disclose such attacks and for organizations to reactively switch to alternative algorithms can leave systems critically exposed. By the time a secure fallback is implemented, attackers may have already caused irreparable damage. Adopting hybrid signatures preemptively helps mitigate this window of vulnerability, ensuring resilience even in the face of unforeseen threats.</t>
      <section anchor="sec-terminology">
        <name>Conventions and Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
These words may also appear in this document in
lower case as plain English words, absent their normative meanings.
<?line -8?>
        </t>
        <t>This document is consistent with the terminology defined in <xref target="RFC9794"/>. It defines composites as:</t>
        <ul empty="true">
          <li>
            <t><em>Composite Cryptographic Element</em>:  A cryptographic element that
     incorporates multiple component cryptographic elements of the same
     type in a multi-algorithm scheme.</t>
          </li>
        </ul>
        <t>In this document, “composite ML-DSA” refers to a composite ML-DSA signature scheme as defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      </section>
    </section>
    <section anchor="ml-dsa-signatureschemes">
      <name>ML-DSA SignatureSchemes</name>
      <t>As defined in <xref target="RFC8446"/>, the SignatureScheme namespace is used for
the negotiation of signature schemes for authentication via the
"signature_algorithms" and "signature_algorithms_cert" extensions.
This document adds new SignatureScheme values for composite ML-DSA as follows.</t>
      <artwork><![CDATA[
enum {
  /* ECDSA-based Composite */ 
  mldsa44_ecdsa_secp256r1_sha256 (TBD1),
  mldsa65_ecdsa_secp256r1_sha512 (TBD2), 
  mldsa65_ecdsa_secp384r1_sha512 (TBD3), 
  mldsa87_ecdsa_secp384r1_sha512 (TBD4), 

  /* EdDSA-based Composite */
  mldsa44_ed25519_sha512 (TBD5),
  mldsa65_ed25519_sha512 (TBD6),
  mldsa87_ed448_shake256 (TBD7),

  /* RSA-PKCS1-based Composite (for signature_algorithms_cert ONLY) */
  mldsa44_rsa2048_pkcs15_sha256 (TBD8),
  mldsa65_rsa3072_pkcs15_sha512 (TBD9),
  mldsa65_rsa4096_pkcs15_sha512 (TBD10),

  /* RSA-PSS-based Composite (for CertificateVerify and Certificates) */
  mldsa44_rsa2048_pss_sha256 (TBD11),
  mldsa65_rsa3072_pss_sha512 (TBD12),
  mldsa87_rsa3072_pss_sha512 (TBD13), 
  mldsa65_rsa4096_pss_sha512 (TBD14), 
  mldsa87_rsa4096_pss_sha512 (TBD15)  
  
} SignatureScheme;

]]></artwork>
      <t>SignatureScheme names are used only as identifiers for negotiation and registry purposes and do not imply TLS-level processing semantics.</t>
      <t>Unlike traditional TLS signature schemes such as RSA or ECDSA, TLS does not apply or select a hash function when using Composite ML-DSA. Composite ML-DSA is treated as an opaque signature algorithm, similar to Ed25519 and Ed448, which are specified in TLS 1.3 as "PureEdDSA" algorithms (<xref section="4.2.3" sectionFormat="of" target="RFC8446"/>). Any hash functions used as part of the composite signature construction are fully determined by the composite algorithm associated with the negotiated TLS SignatureScheme and are internal to the Composite ML-DSA algorithm.</t>
      <t>In composite ML-DSA schemes, the trailing portion of the SignatureScheme name identifies the traditional signature algorithm used as part of the composite construction. This identification is for algorithm selection
and interoperability purposes only and does not imply any TLS-level processing of the traditional component.</t>
      <t>The explicit RSA key size (for example, RSA2048, RSA3072, or RSA4096) is included in the SignatureScheme name solely to uniquely identify the composite algorithm and to align with the composite algorithm definitions
in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>Each entry specifies a unique combination of an ML-DSA parameter set (ML-DSA-44, ML-DSA-65, or ML-DSA-87, as defined in <xref target="FIPS204"/>) and a traditional signature algorithm. The mldsa* identifiers refer to the pure ML-DSA variants and MUST NOT be confused with prehashed variants (for example, HashML-DSA-44).</t>
      <t>Sections <xref target="I-D.ietf-lamps-pq-composite-sigs" section="3.2" sectionFormat="bare"/> and <xref target="I-D.ietf-lamps-pq-composite-sigs" section="3.3" sectionFormat="bare"/> of <xref target="I-D.ietf-lamps-pq-composite-sigs"/> define a context string parameter for signing and verification using Composite ML-DSA. When Composite ML-DSA signature algorithms are used in TLS, both
signing and verification MUST use an empty context string. TLS already provides protocol-level domain separation by signing a protocol-specific context string together with the handshake transcript (<xref section="4.4.3" sectionFormat="of" target="RFC8446"/>).</t>
      <t>When a composite ML-DSA signature scheme defined in this document is negotiated, the TLS 1.3 CertificateVerify signing input constructed as specified in <xref section="4.4.3" sectionFormat="of" target="RFC8446"/> is signed using the negotiated composite ML-DSA SignatureScheme, as specified in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>Upon receipt of the CertificateVerify message, the peer MUST verify the signature over the locally constructed signing input using the negotiated composite ML-DSA SignatureScheme, in accordance with <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>When a composite ML-DSA SignatureScheme is negotiated, the end-entity certificate presented in the TLS handshake MUST contain a public key compatible with that SignatureScheme, as specified in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>The schemes defined in this document MUST NOT be used in TLS 1.2 <xref target="RFC5246"/>. A peer that receives ServerKeyExchange or CertificateVerify message in a TLS 1.2 connection with schemes defined in this document MUST abort the connection with an illegal_parameter alert.</t>
    </section>
    <section anchor="signature-algorithm-restrictions">
      <name>Signature Algorithm Restrictions</name>
      <t>TLS 1.3 removed support for RSASSA-PKCS1-v1_5 <xref target="RFC8017"/> in CertificateVerify messages, opting for RSASSA-PSS instead. Similarly, this document restricts the use of the composite signature algorithms mldsa44_rsa2048_pkcs15_sha256, mldsa65_rsa3072_pkcs15_sha512, and mldsa65_rsa4096_pkcs15_sha512 algorithms to the "signature_algorithms_cert" extension. These composite signature algorithms MUST NOT be used with the "signature_algorithms" extension. These values refer solely to signatures which appear in certificates (see <xref section="4.4.2.2" sectionFormat="of" target="RFC8446"/>) and are not defined for use in signed TLS handshake messages.</t>
      <t>A peer that receives a CertificateVerify message indicating the use of the RSASSA-PKCS1-v1_5 algorithm as one of the component signature algorithms MUST terminate the connection with a fatal illegal_parameter alert.</t>
    </section>
    <section anchor="selection-criteria-for-composite-signature-algorithms">
      <name>Selection Criteria for Composite Signature Algorithms</name>
      <t>The composite signatures specified in the document are a restricted set of cryptographic pairs, chosen from the intersection of two sources:</t>
      <ul spacing="normal">
        <li>
          <t>The composite algorithm combinations as recommended in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, which specify both PQC and traditional signature algorithms.</t>
        </li>
        <li>
          <t>The recommended traditional signature algorithms listed in TLS 1.3.</t>
        </li>
      </ul>
      <t>By limiting algorithm combinations to those defined in both <xref target="I-D.ietf-lamps-pq-composite-sigs"/> and TLS 1.3, this specification ensures that each pair:</t>
      <ul spacing="normal">
        <li>
          <t>Meets established security standards for composite signatures in a post-quantum context, as described in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
        </li>
        <li>
          <t>Is compatible with traditional digital signatures recommended in TLS 1.3, ensuring interoperability and ease of adoption within the TLS ecosystem.</t>
        </li>
      </ul>
      <t>This conservative approach reduces the risk of selecting unsafe or incompatible configurations, promoting security by requiring only trusted and well-vetted pairs. Future updates to this specification may introduce additional algorithm pairs as standards evolve, subject to similar vetting and inclusion criteria.</t>
      <section anchor="mapping-tls-signatureschemes-to-composite-ml-dsa">
        <name>Mapping TLS SignatureSchemes to Composite ML-DSA</name>
        <t>The following table provides a mapping between the TLS <tt>SignatureScheme</tt>
identifiers defined in this document and the corresponding composite
algorithm identifiers defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
        <table>
          <thead>
            <tr>
              <th align="left">TLS SignatureScheme</th>
              <th align="left">Composite ML-DSA Algorithm Name</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">mldsa44_ecdsa_secp256r1_sha256</td>
              <td align="left">id-MLDSA44-ECDSA-P256-SHA256</td>
            </tr>
            <tr>
              <td align="left">mldsa65_ecdsa_secp256r1_sha512</td>
              <td align="left">id-MLDSA65-ECDSA-P256-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa65_ecdsa_secp384r1_sha512</td>
              <td align="left">id-MLDSA65-ECDSA-P384-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa87_ecdsa_secp384r1_sha512</td>
              <td align="left">id-MLDSA87-ECDSA-P384-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa44_ed25519_sha512</td>
              <td align="left">id-MLDSA44-Ed25519-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa65_ed25519_sha512</td>
              <td align="left">id-MLDSA65-Ed25519-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa87_ed448_shake256</td>
              <td align="left">id-MLDSA87-Ed448-SHAKE256</td>
            </tr>
            <tr>
              <td align="left">mldsa44_rsa2048_pss_sha256</td>
              <td align="left">id-MLDSA44-RSA2048-PSS-SHA256</td>
            </tr>
            <tr>
              <td align="left">mldsa65_rsa3072_pss_sha512</td>
              <td align="left">id-MLDSA65-RSA3072-PSS-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa87_rsa3072_pss_sha512</td>
              <td align="left">id-MLDSA87-RSA3072-PSS-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa65_rsa4096_pss_sha512</td>
              <td align="left">id-MLDSA65-RSA4096-PSS-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa87_rsa4096_pss_sha512</td>
              <td align="left">id-MLDSA87-RSA4096-PSS-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa44_rsa2048_pkcs15_sha256</td>
              <td align="left">id-MLDSA44-RSA2048-PKCS15-SHA256</td>
            </tr>
            <tr>
              <td align="left">mldsa65_rsa3072_pkcs15_sha512</td>
              <td align="left">id-MLDSA65-RSA3072-PKCS15-SHA512</td>
            </tr>
            <tr>
              <td align="left">mldsa65_rsa4096_pkcs15_sha512</td>
              <td align="left">id-MLDSA65-RSA4096-PKCS15-SHA512</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations discussed in Section 11 of <xref target="I-D.ietf-lamps-pq-composite-sigs"/> need
to be taken into account.</t>
      <t>Traditional signature algorithms such as ECDSA, Ed25519, and Ed448 provide existential unforgeability under chosen-message attack (EUF-CMA), which is sufficient for TLS authentication. When used as the traditional component in a composite construction with ML-DSA, these algorithms contribute to defense-in-depth during the transition to post-quantum cryptography, maintaining TLS authentication security as long as at least one component algorithm remains secure.</t>
      <t>However, composite signature schemes do not in general preserve strong unforgeability (SUF-CMA) once the traditional component algorithm is broken, for example due to the availability of CRQCs. In such cases, a forged traditional signature component can be combined with a valid post-quantum component to produce a composite signature that verifies successfully, violating SUF. This loss of SUF is inherent to the composite construction and does not impact TLS, which relies only on the composite signature verification result.</t>
      <t>TLS clients that support both post-quantum and traditional-only signature algorithms are vulnerable to downgrade attacks. In such scenarios, an attacker with access to a CRQC could forge a traditional server certificate and impersonate the server. If the client continues to accept traditional-only certificates for backward compatibility, it remains exposed to this risk.</t>
      <t>While broader deployment of composite or post-quantum certificates will reduce this exposure, clients remain vulnerable unless stricter authentication continuity policies are enforced. A coordinated “flag day” in which all traditional-only certificates are simultaneously phased out is unlikely due to real-world deployment constraints. The continuity mechanism defined in <xref target="I-D.sheffer-tls-pqc-continuity"/> addresses this deployment challenge by allowing clients to cache and enforce a server’s support for post-quantum or composite authentication, thereby preventing fallback to traditional-only authentication in subsequent connections.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests new entries to the TLS SignatureScheme registry,
according to the procedures in <xref section="6" sectionFormat="of" target="TLSIANA"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Recommended</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">mldsa44_ecdsa_secp256r1_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD2</td>
            <td align="left">mldsa65_ecdsa_secp256r1_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD3</td>
            <td align="left">mldsa65_ecdsa_secp384r1_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD4</td>
            <td align="left">mldsa87_ecdsa_secp384r1_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD5</td>
            <td align="left">mldsa44_ed25519_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD6</td>
            <td align="left">mldsa65_ed25519_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD7</td>
            <td align="left">mldsa87_ed448_shake256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD8</td>
            <td align="left">mldsa44_rsa2048_pkcs15_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD9</td>
            <td align="left">mldsa65_rsa3072_pkcs15_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD10</td>
            <td align="left">mldsa65_rsa4096_pkcs15_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD11</td>
            <td align="left">mldsa44_rsa2048_pss_sha256</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD12</td>
            <td align="left">mldsa65_rsa3072_pss_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD13</td>
            <td align="left">mldsa87_rsa3072_pss_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD14</td>
            <td align="left">mldsa65_rsa4096_pss_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD15</td>
            <td align="left">mldsa87_rsa4096_pss_sha512</td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
        </tbody>
      </table>
      <section anchor="restricting-composite-signature-algorithms-to-the-signaturealgorithmscert-extension">
        <name>Restricting Composite Signature Algorithms to the signature_algorithms_cert Extension</name>
        <t>IANA is requested to add a footnote indicating that the mldsa44_rsa2048_pkcs15_sha256, mldsa65_rsa3072_pkcs15_sha512, and mldsa65_rsa4096_pkcs15_sha512 algorithms are defined exclusively for use with the signature_algorithms_cert extension and are not intended for use with the signature_algorithms extension.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TLSIANA">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="21" month="July" year="2025"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   Recommended column of the selected TLS registries and adds a
   "Comment" column to all active registries that do not already have a
   "Comment" column.  Finally, it updates the registration request
   instructions.

   This document updates RFC 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-15"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA for use in X.509 Public Key Infrastructure</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="7" month="January" year="2026"/>
            <abstract>
              <t>   This document defines combinations of US NIST ML-DSA in hybrid with
   traditional algorithms RSASSA-PKCS1-v1.5, RSASSA-PSS, ECDSA, Ed25519,
   and Ed448.  These combinations are tailored to meet regulatory
   guidelines.  Composite ML-DSA is applicable in applications that uses
   X.509 or PKIX data structures that accept ML-DSA, but where the
   operator wants extra protection against breaks or catastrophic bugs
   in ML-DSA, and where EUF-CMA-level security is acceptable.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-14"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="RFC9794">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="F. Driscoll" initials="F." surname="Driscoll"/>
            <author fullname="M. Parsons" initials="M." surname="Parsons"/>
            <author fullname="B. Hale" initials="B." surname="Hale"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>One aspect of the transition to post-quantum algorithms in cryptographic protocols is the development of hybrid schemes that incorporate both post-quantum and traditional asymmetric algorithms. This document defines terminology for such schemes. It is intended to be used as a reference and, hopefully, to ensure consistency and clarity across different protocols, standards, and organisations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9794"/>
          <seriesInfo name="DOI" value="10.17487/RFC9794"/>
        </reference>
        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf">
          <front>
            <title>FIPS-204: Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="BSI2021" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Brochure/quantum-safe-cryptography.pdf">
          <front>
            <title>Quantum-safe cryptography - fundamentals, current developments and recommendations</title>
            <author>
              <organization>Federal Office for Information Security (BSI)</organization>
            </author>
            <date year="2021" month="October"/>
          </front>
        </reference>
        <reference anchor="I-D.sheffer-tls-pqc-continuity">
          <front>
            <title>PQC Continuity: Downgrade Protection for TLS Servers Migrating to PQC</title>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="18" month="October" year="2025"/>
            <abstract>
              <t>   As the Internet transitions toward post-quantum cryptography (PQC),
   many TLS servers will continue supporting traditional certificates to
   maintain compatibility with legacy clients.  However, this
   coexistence introduces a significant vulnerability: an undetected
   rollback attack, where a malicious actor strips the PQC or Composite
   certificate and forces the use of a traditional certificate once
   quantum-capable adversaries exist.

   To defend against this, this document defines a TLS extension that
   allows a client to cache a server's declared commitment to present
   PQC or composite certificates for a specified duration.  On
   subsequent connections, clients enforce that cached commitment and
   reject traditional-only certificates that conflict with it.  This
   mechanism, inspired by HTTP Strict Transport Security (HSTS) but
   operating at the TLS layer provides PQC downgrade protection without
   requiring changes to certificate authority (CA) infrastructure.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-sheffer-tls-pqc-continuity-00"/>
        </reference>
      </references>
    </references>
    <?line 264?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Bas Westerbaan, Alicja Kario, Ilari Liusvaara, Dan Wing, Yaron Sheffer, Daniel Van Geest, Samuel Lee, and Sean Turner for the discussion and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA71cW3PbxpJ+x6+YVR7WcpGUJUu+aHdPIkvysY6vMeWk8uQz
BIYkIhCgMQBpxnYq/2Gftups1f6W/Sn5Jft19wwuJCjJJ6n1i0lwMOju6cvX
F6jf7wdFXCTmWO28s0ZlY3WazeaZjQujXr7onw1PVJyqyxdDtT+4vxPo0Sg3
i1suDnVhJlm+Ola2iIIgysJUz/CkKNfjop+bKFr1i8T2Q79Jf5ZEVvcT3GeL
wJajWWxtnKXFao7bLs4vnwZpORuZ/DiIsOY4CLPUmtSW9lgVeWkCUHY/0LnR
oHBowjKPi9VOsMzyq0melXNcBXE7QXBlVrgYHQeq7winT08v3gwP7h3Sx4qv
INBlMc1yWhoo/BuXSSJsXMZ5OdOJsUudq7fEDS/I8olO4190AcKP1avsKtZ8
PQQtx+qJTic6yXLD13Iz4VXPdZ7qQl+5lVmZFiS2izRyN5uZjhOQf5WlURHn
303o+wCC2+mia5YV05V6liWJGRlz1UHWWTyJT01eNCh7ExeFHZX5ZNom4h0J
p0FCEc8GU7/1dxE2CrFRixah42/ZNFV/zXUllmN1ji1LW6gX8QyyjfgHr1Lu
N75mi9yY4lgdHN27p4ZZosG1epvpSP3+23+qYUkKt3/vXoP610Whl7qnXqeF
zuOszcKpTnXkZRuBtOcHz9X9vx41+foZ1A4moPY7I4QQR5vCHYZZUainSTnN
Td4h2NPYhpkarmxhZrYlNzuWm74LacmWszvDViZRP2hIzhgnjbUn5Kt5kb0y
HwvlVbz1nIi3GCygaLTDdyGvT7G+b9169/AgzfIZdl3AktTbp6ePDg8f4BNM
5OLk1QnUr382iE0xZiPNxyF+fziKwVX1Q6Jnc9uff2iYsI0n9jiI03F776MD
3puecm//oXx6/PDxIT45szsmLrwvomt9uqheZlGZmP4LXRRQtP4TbU3E6lvo
RA3jCeymzI0aFtARnUc7vIvOJ6Q+06KY2+O9vXSRzMuRHaQxjnWSLfboA13Z
o+fsvboYXg7o0wBPHMyjMe3BDkaNdWJhqk+GFwf3DvZbJH5f6rQoZ32rx0aJ
kKE+cxheHwcKYmZQJNzeUxB6js8qMguTZHO6bhXIhflDbvga8dHaTtqXy+Vg
ZOPBCFsOIrM3nMK/RWdZaPfOsmWawCjs3vmrPZC496YcJXEom+09ybNwCtHs
fWgQ2m8S6lmtPBz964ul7jw1kckh4tfjMeSucJxwR+5Qs7RSPXUHD97dqSX2
OiwyeGhF8oKK9ft9WDjsWYdFEHi3GqcTVUyNwpei7+jzEcRWZ7qMiyn8uo5i
eiRoqX/SCQILfp5ZNc+zRRwZ/lCYkKnTEx2n8DNzXEmLGLfCx+grC95wVNgu
pEvlxFK8cs/FT0SSj2OzeWL4BGnDgbqcxlYhgpV0Tdm5CeNxjIdOs6WyZThV
WlU20KAzhCGPWHozqG1piXH3BObu7fCk/+b56fCbfbXYHxz15MJw2FPnp1iE
/6KDo6P9xz3Wl/Po8PCRKjLPM58cMShn3gi+PXwOkzKi55UI1fiFvDRopqBs
BwEfzCyOogQh7hscbZHD0Fh6QXAJOehoQZwixvvzIf5KPjqwCdY188lbYmEB
36YLIs6re0PV4lBZcYmQZONA20sahyoitSSOHqwdOmj6z0ySzHSK73SR5AHm
41zhcjyHDOjBC6MW8P+aLQzyX5RJCjUeJYYo85zAl+jwCrScQYedKkLPUst0
sYCbitky7jtvvj/d7dEt2B46QRAkjtwzypSkDN2DYSC2wx/57fNshJiSGmtJ
pCMEaGU+wgvR78RKapZbpTFQP05j7L4UfUozlWRw7jnHjZWSkFp0i3XVo9vg
hjK6N80KaDZUMYYW4NZ5omHbdLCJKYzbCbrSYj83vEzcFiJqnBBHKzXVC+IY
vE8QXsAObM3C4Ssb5qQnK+fjdNIH2EpwXEb4hXwhqGwBDpwXhGKuGsbaNj41
TvSSVPZdmsRXcBqAC3FWWqgvWGRnBxsrlsakW0XIBwYHjNhLO+IIljAcokQ2
MUzJEjdNm2qI33WUzQs66DFQ3jjPZgROdDyZFjBqIL9ooM5hKQqQ1ogHqchS
cwMoEsEWCzXTK3IEsCoIVU8M0U8+FedJTBerf7VrxEOp+AciAsac5fOMCZ2V
SRFDPmrO3r4PLLtGskmnGoqoqnAPxwtPwTKrRGtyy0QRd2S02WwUp2a7RUIr
nJ9b4q5iClsH7WJJYHyZlQlpMbwcdmNvi7sTkjRkAqHFRLdOifFk5Z4INwaE
byQUiPfG/YgjmhyuwS8zE4KX2M7EnHMzNnAu/Ax4hzekpi4O7zX9Cox073JX
PVuN8jiy6tMnhza+fBmoIHid0uMQkDgMMDtZLRhwOOX7Gm7chuCBzR1uLisn
29x9Ja8BPCrW4gY9B2c6nIoGdsYI8iC2YMdQLLPWL1idkt31lMEeJCQ4afA/
wpmrCH7RsKvtpOCk8TRSEqKefDRu1+K900kiP/FxQlspTjV+aitDhgWi1947
060Tk7rLPYkHzqHBuiXa0A0gV2JfXJAmQfk4nJsPpSFFBeMVq7Sppc3jsbgZ
oqlFLamzeFn1M/TbRnEoTkAz/2AxWtXQip4KO5tpRlnsjcErnLhKBFK6wyUf
QqEygiND5CRHBj2lII3naEUK5fVinAPbUVLJWsrx1XMgR+s2rJCJXvcZ6x4O
t3udy5JSuKH98CuFFYYKd0iq8B9ZyEc4Wu1iMZRyQo40rUFluAL88qYPJAQJ
E1D59MmBWNhAEDgM8umTA99fvpB66Lbj39B/60B2bEUFGTiri0LunQlS92Id
MVKXOweEKbBoZmbZGnhqGpKjyoGm1EyyImZm2VNuwzpqEWs2rp2K4Pe149ph
oXT+9J6C9Y4PXJD5wHmMmnNbQ62ohqEA0hAtBEC1B0YQDexpKBpAeT30iBPc
Z0Q7I0r9cFxgCfRT1BT/yD4Azr5k/9MI/E/BeIT4m63kgFl5XSA32sbkSpfk
a7HBOJ6UzkBxl4FvCAvRYpMSOtnD0xmlNMPiFtjK0YAYI0Pp8C6ikvomdA72
xhRoOCxCteioiAKv5QPBmkK1TiTNaLlNUi3RJAJmWJtQ6cBFfQgPCVoyQghi
CyvMBJIWqZmPmmysR0exjU7BpILifDBCuAa+IKwsSEVvFwGHPEIjfGouEloB
CWBkQjsQrmtok8RNbFODOB2GZg4lh/JlS3pyzwfaijeQFhJyTAwgl/VQGiwS
EI9qTLYGYunKNuIdzwT7eg73OLOzCawS2gmPSZqziPNMvAvHNOgZHmKLnnPo
66HSsU+PhrfIAXxAzoRyDjnX2NoST2S9oPsFF7dyN5grfFYGXWYJjvE0EhPh
MOcrwRQ052mZEwrvqV9MnvUjhPE1kyPGCKUTxvoIG4rZUTVskB7FLn9kcF6C
Q5p7cMwUmAUrohuTjDVkCl+ekD93XCEKuWBQxDOCKR/K2MEUf5c7VMk8+Mmk
683SDmM3RC9vtRY2hltIBxOOmHS9CcnowFglKo3wuS3ZvCjHQD1ZiWoQYVow
oalVK25CQnBWqzGBQ4b4PqSGmmUVA4DNteQ7kZ4hwABq8OF0qgPsw8zmjqWp
Sea2UgmR3TJOI2hc1vaYyFsq54ptcImRgjhX8QRjLdChpLIEwCLheU5CKVf4
5ht1mqVkmQINIO9Lk8/iNEuyyUp9+gaC6Bf1lS/iiQjRUGXYqp2X74aXOz35
X716zZ/fnn//7uLt+Rl9Hj47efGi+hC4FcNnr9+9OKs/1Xeevn758vzVmdyM
q6p1Kdh5efLTjqS1O6/fXF68fnXyYkdYbVYeyHcQwDYCoyBdwXMBcAZOfySR
5cnpm//9n/1DxPd/AfI92N9/jAAvXx7tP6RoT+mPPC1LCefwV8JbATyvQapD
qAf4PdTzWKpYgGQWATtVZFODQPC5yIpUhVPM+t421XEawKvAikO4ctoJGSUW
nQPSxXYqu/SoTmS4kkBZfVWbBGjQFIpwqv/+bUI5Sv/Rt38JHKKoH2E9kKZv
UjoitW8cemTGuJ0F1MoILgr3k62DIUHQ4yD4i1Lqbt3kOG0B4nMxm7vHirB2
6yfjcgny97wJ/jWSOFtncTXw7dzBeoRggTn9TtQP4QOSbfq1W6/g1sXaEfTU
77/9Yx1p/f7bf0tKJZnuJhLbQIA4upYUb6oEM9j8xm9XlWuHgpCD4MRunApV
ob98kXRp7QZuLNg52T1YY28E0w9opQeLLkKsE267IKTDjcEfx41rugisaDny
r9O/0EnpaNmQtabrCcyE3Nevv/4aBCYFCP8UKLV3V8qBfUFCtT7e3VP4mbtm
h4fvTYj/38OxzQ+OHuT77+1U44O6c/nkbH+35xc+OOpaeLR/wAsPdnuqc+X9
R4ftlfcbKx89vG7lIa10bETdbDS5kIpnc4OjNvWbCx7UC4gUKpPSz1fG8/8Q
C4QCX3Hd36DiDh3L1vNWr1+9+Gm3TWpuNXKnR+/nV6HdP2rK+1GLYqy7f+/h
QWOdJ/zx+rrDe48fdKzbv9dmYDjsJv+0LvL+QAm41OAaV+02Fqxt6ct+NwOy
qqLqoCX3bavut3Wq4nJt2WFbobYtO9pVtCz4sm5d/+bMptNpcOAsJY9AvKP6
AtfXkIfmYpBNDyJlyQmCSb4CAMxdwRtXo0xJEXWOXZCA9hNq6niETmjFGiBn
+JhGxbKZfVDSuumdGvVuSt5c8Z/WRhl+pkcituKRpKIIDSGXqTRi57hMBTdz
QVNA+XpXftDRp28Xg+A05/pD2VnLorrOLE4Q1xEkXD+ibkf47IHk6zP7qJmd
Y/udN9iQTX+niV/vfPo0dKD/cHCApXDcVQDYBapMV20enc8n/ECpRZU7d9fU
irx0GQUBXi6VR0bwgJQv2jfXQVRbm4VSeKhwRKMYQYyt6xjXZnJT17Zc+rUh
90Z9joP0ZsgVjej5fA7IlzsuuQ9t2+JirdDW33ttan69KJsCdN0vv78vwLiY
WmMP1ktqIJE0WBJcMnSpVGVGYoBsS061xZoo3+y0KEdcq8PhUZOrIFB+F4dI
8MiACMTb+BfnEqtCAH4iV8cfyE/1yJjwmbzMLidC3DIT7d0qZZslRgrYZRrD
YvDZCeYahUqlYo2UMa1VqmslgyFm0ga3B1jnVCihsYVVo7imHYGumFNBI111
PCmLm5FF4OgKdUeu9g8Pe25B/8ERy8h9e/Swt4H/qvLhrpjATVonSTK7+Lst
D8ww1FvNnO5xRNbtPOzvczHKf6jixTrMAkUiRK4CX6sb2qf/DL9WHO6S9VXe
x6r7gwPe/744oZuF7qTAmBmK/rGg+hMbaiVTjyY6C+Lb/PSP5MQ3nEZn37sK
aOJre9xUDLY+kUVHpWqqhiAhX61RPmC/5nP9VlM9C7PEWWWUzShxs1wB8KX9
6pn1aqeG4bp4kN8YKtrUVjAFpQzVpHiFHHZetCPD4UZkCAKW020Sloa2Fuv5
Yu3Txdv6iLUJojyHcTovi9o3igNtRb3rCKdn0k7VJMBaYNngZs0B9Tqedgv/
AFV/B2dJLRFDwnXudJNLhB2rJ0aEMTc4JVaahfzKSWglXu7ecj02k3pTUyht
cf2TvFJ+GyJjjriXyfpyS3e4TTnW/XmHCpg06ru2a2NegryL5QKZDw2kKrXm
sphI0zUn5VIx5DC03sTh+u+fc6wS+DyA3KrnTZfZcBdQ9APJt2kyi7TkRI6c
KWRVoVLz0OQ46Odmdf6RGrETozqTDKc5UpPwu0MgqbMF5v12pOoRoI7vibTu
h+OKk8RMdPK+9rI6oeFDqjHUs2AnVTh9a8jviJOHvJx952YG9YWalnPCVeyp
gQOGVWa42H9/5IoR9/YfkuGm25kGVHPFz+Y+w6GiCSQ40wEoY/icrHprDOeO
PAFsro+4DdI2XP+1+Wfv+rRTin7XZ5ztcYKtrbX1Oohv2t9A/YZGVrFgSyFm
4wGujCKYoQZkjaqzy0mqcmRz+EndscasOeoD6GsrxlSInvCp11g6YDdN5fx4
2w94jYA+dlqTvtZ0Ig7VzlU2lGFTNZupSruL6GuJ2wUvCZBU3ztsTI01DVZe
a2ge56tTbAwuNAumRi0dlmjFW3Voxprr4zGdZrFbV1ZCFms4fLUrpXMd5zRl
OUV2kdbtJ05ArKPUj1ZkZY6s4jgI7qrLLRC8AZd5DqGaJLi9b/Y5sXC2knEv
6sRxInDDQOPA0dZ87o1DkAnVvZtpN07qyUqapQzNutlj66bmVMMnM7G34VKa
Kn7ekD2bh30CDbmB45ueMr+CozpWJP2XxsDt4WT1iFoAfLZuZMFPGazXSRsq
I2G2NaMnONNlKI1WyO1i6V11sTlx0ZR65CaOG0SsKUYliapvtZECc2tTi2VX
/Uw3YuJRBTaVbp6fmeB3HPKF6/75tnhuaBBIAgd1H7noLYZJI58pTyVnOTcd
Kq5aQwIwGWp5Z4UUrZzwRyvXveTEO/Xjha5ZujRJ0l+Ygr6z2Q3U05J1sZxH
0uTNujSBGkSxGzFtjVLUesnbMRKqjt8ssmRhqB0++pkqXuzipRJFNPg0h9N2
HusLnT+C6KgB+BLSokUdBRsmdD3PEh8lRXj2w9zjbEzxzNyGftrQn9nf13b/
e9BMbbfiHTfCimPJoU/w3DysVCln0OjWd293W/j/ubNm1fz3eTPprFHUK91c
/Tn43L/h340LmmtB3Q0NjM/gv//yBYg6POxLI+QNrveHz07o5zYjfrvtbY56
uwdHa9vRz7fYrtXh6NoOC67fbnvDpN7u0cNbb7fZNqkPtik7WdO51zqzN21H
zN5yu82WzOZ2xCytoc2en28c6xqzHV2LDWZduY97JR2a0mS2o3GxwawrGvrt
1hluMnvjdmD2ttt190u6qKM1t6Tu+u2Eulttt7UHtu0sCMMerR9H51G0EpJt
Z1Ft19LRLtndsJ1wu2U7Ab0uQJ76eX+fVE7rQev6ZQCBVzT7U1qXdPt0Y3+f
YvWtABaNUwcy7VHAcmjyhcrIIb/YRo798iZc6PtK298m8fON/DaCm7/niZqJ
8bCFZ/wdvu77fEUGhdSd83dP+6cvT3Y95qXYX9I7QzGFOEJwXFdsdd5dndN3
ILYW9wXndTclBKJJrOLajW3PRtGcWjwqCx6XQcwEKjP9OO1HZo77oq9+8QNp
Nb3XoWUscpOnWgnAEY32cV+toAEtW3CSVrNVB/ac3tqDpshYFnBLNQPYlURX
FRTXhEzd9HUiBSp6+wXyyRgAtk7wztCdEggJzTUCbw0IjvLsisaCGnV0CM74
moBeaGAx9wR6F/jt96cyJMhaR6M+PGDKlGzLYRrjLzJ+6F5EiHw+ilw/jtax
vr9HXoUSUNkpMU49pA4uXVbqKXEvsKcWcZZIwg3puB5XkskLOrgiHaGpDNg7
lreo4nozSwOsckleTCI3Sez7Xm6KtYvWVrke51km3N2CpoU0/eanf33VivO0
llzWsss+P3Br76D9alSULVMoemTql6P8QdrQpPROLR1m840PPh8WqEwP0fnT
O7dJJEe+3g3iUmKrrMrofYYEyWZVRUKW4emupMGssznHaSm4XSZmN1ltFXlI
aWnCkcftfQ7kJgvjojI8P0Pr8xae5KQSMr1wBQPQ5PrqCez2oD8e0VbMJgHL
OElcmiZb86NwEL3qPIWI5kmUaULydAWPjYklJwZup2bU8HSDDYbMPaRpT3rp
I6PXzrjK/vtv/xgneqIivaJZrzitXnFKbhAft/Pb7+zMpzKHXXLzpOTRBuqp
i0dovOfVEJeYCTlOO3AVl4qD6t2edkrzLQVGO6X59ZzfPJ5/CPv1bVR3iCKY
h/Ujxc3HTcGZoTI1vSDj87jKfOgduHBq3Igxi4xHYknjfv/tv2yrItw62VYh
on0o7l3A0cqPgsvQspuvJb1aF/TmmwzIcOVlmKJRkeMxVkWvYneAjnYZGbfS
C0Q0ckZt4NhUhduuxM9PtvQCabC4SXf3FhbUyNdY6hrpA1J892I49x6AsX6g
KixBqTMjbTtaeO2/z+pto2ZC3/j9pdBUwO2fyCA/X/PN5Zc0NsSPvyHRbFL6
qvWtJfCBcpse1JtuTze/dtP7WzZtZYlfu+lhven21PNrNz1qy7Q7Y/zaTR+0
2f9zNn3YZr87Gf3aTR+12N+WB33lpo9b7G/Lhr5y0/17a5t25kRfu+l+J/vt
jPyrNz3oZL+dqn71pvebp/9nbXrYKdM/uOnRGqV/cFOqglY90NbASVePxgeB
7TOw574TFwQclwgwSfBx7+RGEQP+rAASXutpaenq/j/2LvmNOwctmi91+jZe
1XfcznDVemz1A6mwzyHsVjs1+pfyZxcIGFBoPwmv0myZmGjCk/7Bp2P560Ym
+o8d/sMjO/xWik6v+GieIKH8kUSdjzT9GYQTAMCfNf3toDjrqYsE/6sXcWkX
Wue6R39KRv0I0ffUTzqnv9ghkKq38TdmemqoZyWuvDBGJDw0+O2yzFM3xsRN
OalleFFIGKdXbf4PoFh8iUNKAAA=

-->

</rfc>
