<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-tls-slhdsa-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="Use of SLH-DSA in TLS 1.3">Use of SLH-DSA in TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-tls-slhdsa-00"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Timothy Hollebeek">
      <organization>DigiCert</organization>
      <address>
        <postal>
          <city>Pittsburgh</city>
          <country>USA</country>
        </postal>
        <email>tim.hollebeek@digicert.com</email>
      </address>
    </author>
    <author initials="J." surname="Gray" fullname="John Gray">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>john.gray@entrust.com</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2024" month="November" day="15"/>
    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>SLH-DSA</keyword>
    <keyword>FIPS205</keyword>
    <abstract>
      <?line 71?>

<t>This memo specifies how the post-quantum signature scheme SLH-DSA <xref target="FIPS205"/> is used for authentication in TLS 1.3.</t>
    </abstract>
  </front>
  <middle>
    <?line 75?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Stateless Hash-Based Digital Signatures (SLH-DSA) <xref target="FIPS205"/> is a quantum-resistant digital signature scheme standardized by the US National Institute of Standards and Technology (NIST) PQC project.</t>
      <t>This memo specifies how SLH-DSA can be negotiated for authentication in TLS 1.3 via the "signature_algorithms" and "signature_algorithms_cert" extensions.</t>
      <section anchor="sec-terminology">
        <name>Conventions and Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
These words may also appear in this document in
lower case as plain English words, absent their normative meanings.
<?line -8?>
        </t>
        <t>This document uses terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
        <t>"Asymmetric Traditional Cryptographic Algorithm": An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
        <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of quantum-resistant digital signature schemes include ML-DSA and SLH-DSA.</t>
      </section>
    </section>
    <section anchor="slh-dsa-signatureschemes-types">
      <name>SLH-DSA SignatureSchemes Types</name>
      <t>SLH-DSA utilizes the concept of stateless hash-based signatures. In contrast to stateful signature algorithms, SLH-DSA eliminates the need for maintaining state information during the signing process. SLH-DSA is designed to sign up to 2^64 messages and it offers three security levels. The parameters for each of the security levels were chosen to provide 128 bits of security, 192 bits of security, and 256 bits of security. This document specifies the use of the SLH-DSA algorithm in TLS at three security levels. It includes the small (S) or fast (F) versions of the algorithm. For security level 1, SHA-256 (<xref target="FIPS180"/>) is used. For security levels 3 and 5, SHA-512 (<xref target="FIPS180"/>) is used. SHAKE256 (<xref target="FIPS202"/>) is applicable for all security levels.</t>
      <t>The small version prioritizes smaller signature sizes, making them suitable for resource-constrained environments IoT devices. Conversely, the fast version prioritizes speed over signature size, minimizing the time required to generate signatures. However, signature verification with the small version is faster than with the fast version.</t>
      <t>The following combinations are defined in SLH-DSA <xref target="FIPS205"/>:</t>
      <ul spacing="normal">
        <li>
          <t>SLH-DSA-128S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHAKE</t>
        </li>
      </ul>
      <t>SLH-DSA does not introduce any new hardness assumptions beyond those inherent to its underlying hash functions. It builds upon established foundations in cryptography, making it a reliable and robust digital signature scheme for a post-quantum world. While attacks on lattice-based schemes like ML-DSA can compromise their security, SLH-DSA will remain unaffected by these attacks due to its distinct mathematical foundations. This ensures the ongoing security of systems and protocols that use SLH-DSA for digital signatures.</t>
      <t>However, ML-DSA outperforms SLH-DSA in both signature generation and validation time, as well as in signature size, making it a recommended choice for end-entity certificates. SLH-DSA, in contrast, offers smaller key sizes but larger signature sizes. Given its well-established hardness assumption, SLH-DSA may be preferred for TLS applications where high confidence in security is a priority, such as for long-lived TLS sessions and deployments where computational costs of signature generation and validation are minor compared to data transmission and processing demands of user data. The findings in <xref target="PQ-TLS-TTLB"/> shows that while PQ algorithms increase the TLS 1.3 handshake data size, their effect on connection performance is minimal for large data transfers, especially in low-loss networks. Additionally, SLH-DSA is suitable for use in CA certificates due to its strong cryptographic assurances and smaller key sizes. Its robustness against emerging quantum attacks makes it a dependable choice for trust anchors and long-term security, even though it has larger signature sizes.</t>
      <t>As defined in <xref target="RFC8446"/>, the SignatureScheme namespace is used for the negotiation of signature scheme for authentication via the
"signature_algorithms" and "signature_algorithms_cert" extensions. This document adds new SignatureSchemes types for the SLH-DSA as follows.</t>
      <artwork><![CDATA[
enum {
  slhdsa_sha2_128s (0x0911),
  slhdsa_sha2_128f (0x0912),
  slhdsa_sha2_192s (0x0913),
  slhdsa_sha2_192f (0x0914),
  slhdsa_sha2_256s (0x0915),
  slhdsa_sha2_256f (0x0916),
  slhdsa_shake_128s (0x0917),
  slhdsa_shake_128f (0x0918),
  slhdsa_shake_192s (0x0919),
  slhdsa_shake_192f (0x091A),
  slhdsa_shake_256s (0x091B),
  slhdsa_shake_256f (0x091C)
} SignatureScheme;
]]></artwork>
      <t>It is important to note that the slhdsa* entries represent the pure versions of these algorithms and should not be confused with prehashed variant HashSLH-DSA, also defined in <xref target="FIPS205"/>.</t>
      <t>In TLS, the data used for generating a digital signature is unique for each TLS session, as it includes the entire handshake. Thus, SLH-DSA can utilize the deterministic version. The context parameter defined in <xref target="FIPS205"/> Algorithm 23 MUST be an empty string.</t>
      <t>The signature MUST be computed and verified as specified in <xref section="4.4.3" sectionFormat="of" target="RFC8446"/>.</t>
      <t>The corresponding end-entity certificate when negotiated MUST use id-slh-dsa-sha2-128s, id-slh-dsa-sha2-128f, id-slh-dsa-sha2-192s, id-slh-dsa-sha2-192f, id-slh-dsa-sha2-256s, id-slh-dsa-sha2-256f, id-slh-dsa-shake-128s, id-slh-dsa-shake-128f, id-slh-dsa-shake-192s, id-slh-dsa-shake-192f, id-slh-dsa-shake-256s and id-slh-dsa-shake-256f respectively as defined in <xref target="I-D.ietf-lamps-x509-slhdsa"/>}.</t>
      <t>The schemes defined in this document MUST NOT be used in TLS 1.2 <xref target="RFC5246"/>. A peer that receives ServerKeyExchange or CertificateVerify message in a TLS 1.2 connection with schemes defined in this document MUST abort the connection with an illegal_parameter alert.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations discussed in Section 11 of <xref target="I-D.ietf-lamps-x509-slhdsa"/> needs to be taken into account.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests new entries to the TLS SignatureScheme registry,
according to the procedures in <xref section="6" sectionFormat="of" target="TLSIANA"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Recommended</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x0911</td>
            <td align="left">slhdsa_sha2_128s</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0912</td>
            <td align="left">slhdsa_sha2_128f</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0913</td>
            <td align="left">slhdsa_sha2_192s</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0914</td>
            <td align="left">slhdsa_sha2_192f</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0915</td>
            <td align="left">slhdsa_sha2_256s</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0916</td>
            <td align="left">slhdsa_sha2_256f</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0917</td>
            <td align="left">slhdsa_shake_128s</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0918</td>
            <td align="left">slhdsa_shake_128f</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0919</td>
            <td align="left">slhdsa_shake_192s</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x091A</td>
            <td align="left">slhdsa_shake_192f</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x091B</td>
            <td align="left">slhdsa_shake_256s</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x091C</td>
            <td align="left">slhdsa_shake_256f</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TLSIANA">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="3" month="November" year="2024"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   recommended column of the selected TLS registries and adds a
   "Comments" column to all active registries.

   This document updates the following RFCs: 3749, 5077, 4680, 5246,
   5705, 5878, 6520, 7301, and 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-10"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="14" month="October" year="2024"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document describes the conventions for using
   the Stateless Hash-Based Digital Signature Standard (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-02"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="FIPS205" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf">
          <front>
            <title>FIPS 205: Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS180" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">
          <front>
            <title>NIST, Secure Hash Standard (SHS), FIPS PUB 180-4, August 2015</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS202" target="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf">
          <front>
            <title>NIST, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, August 2015.</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="PQ-TLS-TTLB" target="https://www.amazon.science/publications/the-impact-of-data-heavy-post-quantum-tls-1-3-on-the-time-to-last-byte-of-real-world-connections">
          <front>
            <title>The impact of data-heavy, post-quantum TLS 1.3 on the time-to-last-byte of real-world connections.</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="September" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-04"/>
        </reference>
      </references>
    </references>
    <?line 180?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Bas Westerbaan, John Mattsson, D.J. Bernstein, Alicja Kario, and Peter Campbell for the discussion and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA6VaWXbbOBb95yrQqp+4jqhYsp3E7qEiD6m44thO5FSd+ukc
iIQklElCBYBWlMR1eg+9gV5LL6VX0vcBIEVZdNqd+CMhMTw8vOG+gYrjOLLS
ZuKAdd4ZwdSEjc5exsejIZMFuzobsX5vpxPx8ViLmy+vSbgVU6WXB8zYNIpS
lRQ8B91U84mNbWZiLdJ0GZtslhoeZ1hubGTKcS6NkaqwyzlWn55cvYiKMh8L
fRClWHMQJaowojClOWBWlyICHzsR14KDn5FISi3tshMtlL6ealXOMQqeOtG1
WGIsPYhYXPFLjy9OL0eD7b2IRREv7UxpWhAx/E3KLPMsX0ld5jwTZsE1e0tc
uwVKT3khP3ILbg/YubqW3I0nYOCAHfJiyjOlhRvTYupWveK64JZfh5WqLCyJ
6LRIw2aRc5mB52tVpFbq51N67yUq77TxlSs7W7KXKsvEWIjrFraO5VQeCW0b
nF1Ka8241NPZOhPvSCINFqzMe7OK9PMUhBIQWuPF8/GTmhXsR81rsRywE5As
jWVnMpdWpG6ispow58aM1ULYAzbY295mI5Vx3Jq9VTxl//nHP9moxGbW395u
cH9hLV/wLrsoLNdSrV/hiBc8rWSbgrVXg1ds58e95r1+A7e9Kbh9LjwjdKNN
4Y4SZS17kZUzLXSLYI+kSRQbLY0VuVmTm5n4Tc8TWuLlFRVK59h5AwNmb18c
PdvdfYKniPzldHg+hAnExz0p7MS7xiTBiqdjCcr1RMbzuYk/7G3vB6c5iGQx
adAlwnsDR7iy6wPHGat8mkYZDbORhTPBpA17yc0sPuRGpM5YLM/YSE5hpaUW
tKxIuU47gQ7XU1LXzNq5OXj8uLjJ5uXY9AoJMU7VzWN6oJHHdNLj89PRVY+e
ejizN08nzJNxjswmPDMisNp/tn2HVdrbZc6hheOx5oU9Gr0cbXXdPnb57pBh
c7zbZcNySiY32O7vfSu7juIXGR5sD9oZfjmMd2pW4WxC56V1NhOE7O6CaXby
wQqsGmcivijBBqytLBJaaRqXw0FrV+v933ebyLlxbz16gioG997s8k0Mg4yv
rs4O79zuaiaYzOc8sQT42MXjmeA3yy6bK2Pj30te2DKv4J+pglnsAISI2CqY
LtaMl9ZFC0B1FgOLsxROWhTCX/m+ey0Wix7P+UdV9EwiRZGIx7hVJhMnU/MY
x8SesVhN4hVjcZMv51T9eCeGFmjDBl+0d8VX3OCrTU5RHMeAM4AXjo2iq5k0
LBe5YmYuEjmRwrCZWjgJrEnH1H5lkpnIRR04P30K/np7y0CrJDuBZzMKSUCp
cNlGfO1Fjodcpmkmoug7RBCrVVo6nqPoYd5t4Emega27HHBWSQ7LYDp4ZmnY
v3ELE6xdfsQp46W797sRO3dMY8NpYWBGpdd+5RrG+cCVSGaFytR0yR6RA23B
BI/YXKvfIP4eu1+2leQSXrCxYAVyDStx6f8hN3YjueOvU9/iPc+Qp0g7y03H
8dQ69Z5iX4cJ8lnj7BVS/44dqeKGDiJD8ffRuQwX+vSdEUlsVyO3dB3BkIkw
SkUM67x+N7rqdP3/7PzCPb89efPu9O3JMT0DTc7O6ocorBi9vHh3drx6Wu08
unj9+uT82G/GKFsbijqvh79ixl3y4vLq9OJ8eNYh6ViSMlK0MsdlGJIpZhWJ
VRZgf64FyZWbKBUm0XKMF+w5PLr897/6u7CcPyHuDPr9fZiOf3nWf7qLlwV0
4E9TRbYMrxD+MuLzuUAuBSo8y6DDORkWUI8bZqDdgs2EFj2SFhJML6ucL7HY
KLbau861LKJMLYQGOWwCpXnGseikmGYSiOuodMlraTG4kJrVQRkWhtBeTKHV
v/yQyUKw+NkPf4uC+dVHwC8NI4ViTEywzAni06cf6hg9/72Uc/xr49lyrGW6
pv7bHnsB43SwUGogA6jBI9au0WXSkgPORDZHMhL0QEGCHlN5I1PBEr2cW4Uc
Zj6TCVsZKelLMbtQLAGygfxBFHWGZpnnwmqsvNI8lcEpj9ZoDCsanQM2hFZW
e+45i40dpjjnQqIPsU+AhZgzzuW6DOKh5A0OC5xPkQmRFTHIgQdeIQmRZXJu
6ZBSQwktq7oPWgNSWmTO+6FPYBIn188IRyC4nHy1c0lA/CYA8f9/XTvjTi9j
kUlxg4O8YozPT/gUpoYAzZGcJtcE4DCmCkIR5XJEd6ENWeUCF6L/nYYcl/V0
j102o0VDr4RyzvhxJLZkOH8TnyGFatDwiWjs7yHXQPKYeXt7OLKTQSVZCYt7
febQlnw5IC/hX43CdUgZhX1XqN4M4lCYL63MEB2Ms30E10TMXR5h6jg1ozjl
barmAnyfFrQccRbChcTdenKLFaerW3ZrdqAjOB1VlO7AQoSwgAQdVYMkT/ek
WJ1Aw5BTlI6YoB1Enp5hQAm4660qXPJ8mvUWQE+snNPj4O9PdgEjxvCp8LFA
0hUnpHaLciDYCmoYlsGAMhClYDDnGuWGMw7iUPBk5jFhYz0sB9dNZoCNgg4E
bw4M+oNnbCytU221pcv6+4OWUWJrsPdkY4Z4aQLdKtYSI6Wv8umxksPKMUJs
5fa+W57ayoo8NZMT5j8abZHBTkixj15ssRtIwEXRcFB9gMfMdaqs7xNtusoj
n7kgY7+93aqSp7ZNhu24++/5vXv9wX17Mf3qpEEbGXOYR+yhzJPQ2KUZuMjG
fX2Q97cMt4KuJN3GuYCbAV42nI3Gu7DO62B/yBRR+dbHwBNUqRNBaSnlnC7w
iOJGalWQugw7VVewyxsU6GDA5STaiGzpoq2XcSsnc3IMdbPBDHiBk+TyY+UP
lC+DDQQ37Q1/KgqhyYGazvoS4RfEug1qeIUdhTRsAX02TKBiCXIlFgVFRt5Y
1eS756U6URliPHEF0ByTi/vMCyc1AnJLVo1A+H01HsNjRjGUPFgfe7Extj/Y
XLc/2FgHU9lYh7FNeuHcVyctB68PhpPvDm6urM6+O1itrCE4VdB4ocgZfaUA
HyuWwMYFsFenBYEwIlKZz71Mx2Kp4C2W8AZ7KCErHAYTdJRFKnS2JEUQcLNJ
Vbg6dx+XMkPGVs6hXGHIjpGAOQjGvqAyqKkRape19QM0OQVz6ayf/BUxnGrf
e6sP54jrdZYr4nrsl5kkGiEmgxmkCEgMRBVnQqzK5HUd4CjQUjzWKpe4t08T
V/hZCXMhYb+aGj6A/4ID5RNb1z5mdWZaikpkSFwscNCuZygNkQQMptamDlCp
iqlysarCGIJs33FyogGbViUqMz49IZyuOCSpbIiMEqHaScONVWnnQlMUNM0+
7ljBC1eyDv5O7koH3/BMerYdNHSbiQ02b6DJmm4hX6BWCnkhmEEdPvAVaUyF
FC5JlZYHDbGKvF1nMSEV6FaBtcJSKqkcisL2LNSsp5sA22M/ItMvnDKI17hp
mi0usNI2lR5IvFAH4VAdcgkX9Hw48Ba9IBdhMzmdEZ8ThGakOU4alfZcXR0A
GMZkSsR67uN+BlXHmaTEkggjdTd1TZmKeaaWHuj9IT5jrMrrBKbvo/kD1EVQ
SQWJdkR4gHNqmzCItjCh+16ZF2U/pLoUFluk7hRYmXYbfAID1E2pcvKVUKOB
hAKQarlgmwvni5dv1qsVpPLcu1ldoM/onBmHSzqmvAF5PxTOz8iRV/0ZFoyX
O2EbH7icY2lvB427kcmgoHDJDexmSSwjnMSZguILYembAcxkmFZFUtZwedBe
C8qlg0V2NFyz16bHI1QrilTrFQXsSxOzXrcbBkwAagLmeYMMpQWgSk+bVUWF
MXAuStTJt2ApoaPYdC3ficeZM6X9qc7aqDJtQJsg3wDal7BfEAOs3+tHUTS8
UwCHjvbtrc847pQD7jOBmXOvobq55VNz37chTa5ZcBPc15s5oYMTfXsH507S
y9PUuHi4Uc3QtyhT81znwCbkIwSrf/zxRyQKqOVTxJhvz7+HGQ/eI74b9mj7
w/Z+v7/V3ZychMnB5uT+oNq50zZZ7dzdmET8r3butU1WO5/cmbwWTXafts5W
e5+1zK4Y3m+drfYON2cbLB+2zlZ7j7ai27sa+rMTf3TqKnSZz5V2ZS38EAmP
8ADk8k5H83tGH36ouNECmF71g6gnI+7WIaZZYHqPhYtkqcukxq6WnTiDdlkr
qFE6JAhxtSQWqP1aRzBXwa/5TZ2fwoJOXSHlHchhVu0oFZrD+XlLHkQ+Vcjf
S7GqIBsxxMVmeacGI3eiYFVhLblC2SigKQ0KNbvnR/g+FuUwSZ2TO/ynmAyf
WhWy99xw1XNhgx3mGp7U2EKGiHC7JLDE/UKav7pbtS70SFIfzlxR4VqSdaUa
jhuFqLDb26WvEBNWI1MgnShEcIPMlILWPVmH61Q2W8qOCwf4KX16i+mDNfkS
Je+QWsvopGUU3tE62rKWvKF1dGPttWhlwg+3rm5hww+3rXZu6ZoZLTP0KYfk
Tx1URFN+Jyjc/+HytlZHlYM3Nq53davOOBmBc4i6lz/wcYc+eFJndYhMwJeQ
lnJMAZ6Q0AoNY3kllicfEhg7sgF4yNFK0z+TJS2rto3rR9fUGzmGc+6HscrH
AJ+qzbW2H6aOqkFMefZ+5Ss8o0/qrpVWZYko3w2SR5++mSCmajJZm3Td0NIE
sVS23++T4X9Z/q4nZkIT00Kfhe8d88R9S6cYTx+VhufDFn6al6amgKD8kwJn
havUhA4p3d1UgH4IAV9fdiM6SjsvDMtdupm64mfNl5/QdcJ3cmc4n9nPPAPc
MfaZHbtPEi5hZ/f8fWZvGzUHvU2omE1EmI4+x9Xf6ukLf5+/8EYD4M+Hezp6
IxVo4+/Xtbc1AfdYTW/QQm/yDfR2NuhR/P56erst9L6Fv7279BwYfT29Jy30
voW/p+v0quTpq+k9a6PXwuBD6e1v0mtV8EPpDdvofQN/hxv02hX8UHpHbfS+
hj/6sj5GbUUQOEyuC7XIRDp1BXj06cD/Gk2kf+24XwN03FddXlw72DtEEPxF
UDNzzDlyL/fTqNco1YyhVOy491OPHQqNgk5IvA8zmfzG6VdhUvnu/KULC0dA
7DH1U6qaIwB9VZl7OLMoPP4L1AMwaLInAAA=

-->

</rfc>
