<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-richardson-rats-composite-attesters-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="composites">Taxonomy of Composite Attesters</title>
    <seriesInfo name="Internet-Draft" value="draft-richardson-rats-composite-attesters-00"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2025" month="July" day="25"/>
    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 38?>

<t>This document further refines different kinds of RFC 9334 Composite Attesters.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-richardson-rats-composite-attesters/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        rats Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/richardson/rats-composite-attesters"/>.</t>
    </note>
  </front>
  <middle>
    <?line 42?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document clarifies and extends the meaning of Composite Attester from <xref section="3.3" sectionFormat="comma" target="RFC9334"/>.</t>
      <section anchor="caveats-of-current-definition">
        <name>Caveats of Current Definition</name>
        <t><xref section="3.3" sectionFormat="comma" target="RFC9334"/> says:</t>
        <t>```
   A composite device is an entity composed of multiple sub-entities
   such that its trustworthiness has to be determined by the appraisal
   of all these sub-entities.</t>
        <t>Each sub-entity has at least one Attesting Environment collecting the
   Claims from at least one Target Environment.  Then, this sub-entity
   generates Evidence about its trustworthiness; therefore, each sub-
   entity can be called an "Attester".  Among all the Attesters, there
   may be only some that have the ability to communicate with the
   Verifier while others do not.
```</t>
        <t>In this description, it was left vague as to whether or not each Attesting Environment signs the Evidence that it generates, and whether or not the Evidence is evaluated by a Verifier operated by the Lead Attester, or if it's passed by the Lead Attester along with the Evidence from the Lead Target Environment.</t>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <dl>
          <dt>Lead Attester:</dt>
          <dd>
            <t>This term is from RFC9334, and includes the (Lead) Attesting Environment, and the (Lead) Target Environment.</t>
          </dd>
          <dt>Target Environment:</dt>
          <dd>
            <t>This term is from RFC9334, this refers to the environment for which evidence is gathered.</t>
          </dd>
          <dt>Attesting Environment:</dt>
          <dd>
            <t>This term is from RFC9334, this refers to the thing which gathers the evidence.</t>
          </dd>
          <dt>Component:</dt>
          <dd>
            <t>This is the pieces which are attached to the Lead Attester.  There are one to many of these, typically each with their own application specific processor.</t>
          </dd>
          <dt>Component Attesting Environment:</dt>
          <dd>
            <t>This term is new, and refers to an Attesting Environment residing inside a component of the whole.</t>
          </dd>
          <dt>Component Target Environment:</dt>
          <dd>
            <t>This term is new, and refers to an environment for which evidence is collected.</t>
          </dd>
        </dl>
      </section>
      <section anchor="level-0-composite-attester">
        <name>Level 0 Composite Attester</name>
        <t>In this first, somewhat degernerate scenario, the Lead Attester has access to the entire memory/environment of all of the components.
Examples of situations like this include classic PCI-buses, ISA-buses, VME, S100/IEEE 696-1983.
In these situations, secondary components might not boot on their own.
(It might even be that the lead environment (the chassis) will place code into RAM for these systems, with no ROM at all)
In this case, it is possible for the Lead Attesting Environment to collect Evidence  about each of the components without the components having to have their own Attesting Environment.</t>
        <t>At some level, all of these components can be considered part of the same system.
In the classic PCI or ISA environment, the components are hard drive interfaces,
video interfaces, and network interfaces.
For many such systems considering the system to be a composite is unncessary additional complexity.</t>
        <t>The benefit of applying the composite mechanism in this case is that it is no longer necessary to consider the exhaustive combinatorics of all possible components being attached to the lead attester: it is already the case the reference values for a target environment may change depending upon how much memory is installed.</t>
        <t>In this Level 0 Composite Attester, the evidence gathered about the components would be included in the Lead Attester's signed Evidence (such as an EAT), as sub-components
in UCCS form <xref target="RFC9781"/>.
The signature from the Lead Attester applies to all the Evidence, but the Verifier can evaluate each component separately.</t>
        <t>More modern buses like PCIe, InfiniBand, Thunderbolt, DisplayPort, USB, Firewire and others do not provided direct electrical access to target component system memory.
They are serialized versions of the old I/O buses, using a protocol akin to a network.
They require non-trivial deserialization at eacn end, requiring configuration via firmware that itself might not be trustworthy.
A system with such an interface would be a level 1.</t>
      </section>
      <section anchor="level-1-composite-attester">
        <name>Level 1 Composite Attester</name>
        <t>RFC 9334 gives the following example:</t>
        <t><tt>
   For example, a carrier-grade router consists of a chassis and
   multiple slots.  The trustworthiness of the router depends on all its
   slots' trustworthiness.  Each slot has an Attesting Environment, such
   as a TEE, collecting the Claims of its boot process, after which it
   generates Evidence from the Claims.
</tt></t>
        <t>As described in this case, each component or slot produces it's own signed Evidence.
The Lead Attester simply relays the Evidence along with its own:</t>
        <t><tt>
   Among these slots, only a "main" slot can communicate with the
   Verifier while other slots cannot.  However, other slots can
   communicate with the main slot by the links between them inside the
   router.  The main slot collects the Evidence of other slots, produces
   the final Evidence of the whole router, and conveys the final
   Evidence to the Verifier.  Therefore, the router is a composite
   device, each slot is an Attester, and the main slot is the lead
   Attester.
</tt></t>
        <t>Note that the Lead Attester does <em>not</em> evaluate the evidence, and does not run its own
Verifier.</t>
      </section>
      <section anchor="level-2-compositehybrid-attester">
        <name>Level 2 Composite/Hybrid Attester</name>
        <t>In this scenario, the Components relay their Evidence to the Lead Attester.
The Lead Attester operates a Verifier itself.
It evaluates the Components' Evidence against Reference Values, Endorsements, etc. producing <em>Attestation Results</em>
These Attestation Results (or their selectively disclosed version: SD-CWT/SD-JWT)
are then included as part of the Lead Attester's Evidence to it's Verifier.</t>
        <t>The Verifier's signing credentials may be part of the same Attesting Environment as the Evidence signing credential used by the Lead Attesting environment.
Or they could be in a different environment, such as in a different TEE.</t>
      </section>
      <section anchor="level-3b-composite-background-check-attester">
        <name>Level 3B Composite Background-Check Attester</name>
        <t>In this scenario, the Components relay their Evidence to the Lead Attester.
The Lead Attester does <em>not</em> operates a Verifier itself.</t>
        <t>Instead, the Lead Attester, conveys the Evidence to the Lead Verifier along with it's own Evidence.
The Component Evidence is not placed within the Lead Attester's Evidence (DEBATE).
The Lead Attester needs to communicate how each component is attached, and that would be within its Evidence.</t>
        <t>The Lead Verifier, acting a Relying Party, connects to Verifiers capable of evaluating the Component Evidence, retrieving Attestation Results from those Verifiers as part of evaluating the Lead Attester.</t>
        <t>This case is similar to Level 1, however the integration of the component attestation results in level 1 is not included in the Evidence, while in this case, it is.</t>
      </section>
      <section anchor="level-3p-composite-passport-model-attester">
        <name>Level 3P Composite Passport-Model Attester</name>
        <t>In this scenario, the Components relay their Evidence to the Lead Attester.
The Lead Attester does <em>not</em> operates a Verifier itself.
Instead, the Lead Attester, acting as a Presenter (term To-Be-Defined), connects to an appropriate Verifier, in passport mode.
It retrieves an Attestation Result from the Verifier, which it then includes within the  Evidence that the Lead Attester produces.</t>
        <t>The Lead Attester's Verifier considers that the Component during it's assessment.
It needs to consider if the component has been assessed by a Verifier it trusts, if the component is appropriately connected to the Lead Attester, and if there are an appropriate number of such components.</t>
        <t>For instance, when accessing a vehicle such as a car, where each tire is it's own component, then a car with three wheels is not trusthworthy.  Most cars should have four wheels.  A car with five wheels might be acceptable, if at least one wheel is installed into the "spare" holder. (And, it may be of concern if the spare is flat, but the car can still be operated)</t>
        <t>A more typical digital use case would involve a main CPU with a number of attached specialized intelligent components that contain their own firmware, such as Graphical Processors (GPU), Network Processors (NPU).</t>
      </section>
    </section>
    <section anchor="attestation-results-as-evidence">
      <name>Attestation Results as Evidence</name>
      <t>In cases 2, 3B and 3P Attestation Results are included as Evidence.
This results in a Verifier that must evaluate these results.
It must be able to validate the signatures on the Evidence.</t>
      <t>This creates <em>stacked</em> Remote Attestation.
This is very much different and <em>distinct</em> from <xref section="3.2" sectionFormat="comma" target="RFC9334"/> Layered Attestation.</t>
      <t>Layered Attestion produces a <em>single</em> set of Evidence, with claims about different layers.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>YYY</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>ZZZ</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Hello.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9334" target="https://www.rfc-editor.org/info/rfc9334" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9334.xml">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9781" target="https://www.rfc-editor.org/info/rfc9781" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9781.xml">
          <front>
            <title>A Concise Binary Object Representation (CBOR) Tag for Unprotected CBOR Web Token Claims Sets (UCCS)</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="May" year="2025"/>
            <abstract>
              <t>This document defines the Unprotected CWT Claims Set (UCCS), a data format for representing a CBOR Web Token (CWT) Claims Set without protecting it by a signature, Message Authentication Code (MAC), or encryption. UCCS enables the use of CWT claims in environments where protection is provided by other means, such as secure communication channels or trusted execution environments. This specification defines a CBOR tag for UCCS and describes the UCCS format, its encoding, and its processing considerations. It also discusses security implications of using unprotected claims sets.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9781"/>
          <seriesInfo name="DOI" value="10.17487/RFC9781"/>
        </reference>
      </references>
    </references>
    <?line 207?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA81aUXPbNhJ+56/AJQ+1fZJiJ5020T1cbcdpfVOnnthpp325
QiQoYUwSOgCUouvkv9+3C5AEZbm9vtxcpzOVSWCx2P1299tlp9Np5rWv1Fzc
y0+mMfVOmFJcmnptnPZKnHuvnFfWZXKxsGozF3n3zmWFyRtZY29hZemnVucr
aQtnmqmV3k37lVPZSZmenmbZc+G8bIp/yso02Oxtq7JMry3/dP7l6emb05eZ
tErOxXWDbY3y2XY5F7LRtRQ/Gfugm6X41pp2nT1sh0XTt6RHlks/xxFFluWm
wMq5aH05fZ2t9Vzgn+cil41onRLSWrkTR7oUsqrETrljYaxYSbcSK2VVJoQ3
+Zxe4Kcz1ltVujmLKFQp28o7rOje7+rwmv7MZOtXxs6zbCp0g4c3M/GhNw9W
B7vd0CNVjV8ZC43vYCBV1VD0zpR+C2PwvekgVUtdzUWd279q5ctvXLd0lsss
a4ytpdcbNcfSi8vbsy/n4sO7y9dnX3+JB/j15tWrL6GXbsphZbZRTcs7lmTU
uSD/4a9wEv3xDR01g2q0RvtVu8DzXusXT/kb959OhVw4b2Xus+x+pZ0AbNpa
NV6UrfUwtIDddKPwQpcl7I43cHDhCIlQWJDGhyA5C9JrXRSVIlgBB9YUbe41
DLl3Vl5Jq0uNU2AuoT55RSfgeFEr4Ap4Ooh7UVpTi99++0u03ETcKZYvXs1e
ff4MFZ4/F5dyo2AAltBavsBbupIOijy5Wzi5c7D+r7/+CrOK8yG2gK+NzpXQ
pK6AQO138a0q6Jwa4NPrSgnXLqb8XjMK8Xe+wrWkF5rQSQG1BXJXZGBH2CbE
LugA3K7G00IsdmwHuV5bqZ2sSIwJMYHnbnwGbozXVxKn9I93LBdHVko6LxDV
0X5k1qtmo61pghNMVZEB8BiSSdBlJXXtgpVHAu6lXSqf7p4Jcb9SzQRbYZbh
cBKzVI0CBuHdq40uVAPTyYVpDxrhb3Q2IGesmgjVXYSkdHaGyWGhHAaAdfDH
sw4Nz6DDeW2gfjTOAMZJkEpiaiQV7DdNtUPWqFVwxwogCXZe6IqOgR/g0bpt
NBKWEltEVWeVHxVj1YrtSsPHhkQTlkVj/Izhkl03wQ6FcrnVawLVBLcVW3ii
UqUXG7lscRj7e7tSHGjIbpAQLn3YQ04vmxAWvSEjmAYbTziE9mSOtkAvtZFV
i9UMLzncyKxZSI+675UseitOSBrSsfZfOLGWzj2xTlDpWPYmGw5mHPXLD2CI
4/WekW8qs9xl2UjwPEMhJLNScNA1WGAfvXRv3eRVC6vzMUe0+/iwLcPyZNVB
dR4//AMd2OuALyECriX5KnEgYE2ogYNV4o2lZHQWOPCgrn/+TAqmZTwpSA8W
6U7FSZxNm1S6DmvWWuUwYNhMpQ31ApCEs6PwkU9C3NMqqzg1YBGqHRMVzk/Q
b7fWFK67AO0OFxpw2zaU2CqKMcq7bq1yADEXa2ugA4p6quhhRz4yTqO2wbmD
SZAlDgeUVU4TCSEaAMsgFPL+tHAB2MFUI3sdQMp/qcMfIyGmYIYCQuF7tQH/
OD1Q+YYUU2rrgGZKZVvKBYVaEt2iMBYuVw0Kq5kcCFIuCjlZeQCq15Yqbm3s
7kWqbKw30SK9iVBurj7JGoWOqysUbNmPyHH6QQX1YkBShXcOnr29vJ4uQO+Q
p67vzrufP95cofqenZ6+uL66uhJfvflqevbm9atZuCVXuV447qpy0xTS7hJV
QDSWK8/JbmEMVakBY7Ps6NrHBbAo1w/Om3SbiqySXvaI77gidUE5txoXX1cy
p3vjHrqBtT6c37ADo2o7GLSGXozsBq9/uKFyCZMd927KJYUCEjV+w5dOL1A6
oozUM/sI5TrEoBjyaKyeHE2PfMJa0Ou9x6hwXNlNX+tiAB48l1NRqI8VgXCS
AMCN5Hb12HAEIYuhNNg+ehyYdDRQ58wUClRRAIPU/pN9xSmxEJNFHwM6TA5Q
toQ/3CQjg5j0Cccceg3wiYfk+Sx7h4M4LTEDix7rlY6UJz6PHEwmhA9Oa5uG
goVQJ4uCyaOseEmlPoExULWAiAXqcKlDyCCz7TrRg6xaAVyNdkgUCTZC9g21
nBKIEVREEaeN6o5lKASFQ7x+WklwJzIKpC90I70B63dduPYwS4y5UKTQfkbn
GOjagnlUQVbo8YpQ31lD+sH5jEFIDAJxTxCWwoeUmIYR8Sy66JLY7Bp8ng5u
oYdYmS0YMtwQMo3gLIGmkwjdbEhsTye/yaiW9eUzhsV+OJi2KsifMRMVwex7
6RCMhsgV3vZRdsRQkczxr87vjyf0m8joIBx9mvh4eXlHVqA+5O9Uk79+fUat
B4GBRErf2n3qMzAlKn4q1IfIWbvzJ2IRL9OzMwq1jrmF6B+qlVMIOzyvCIg3
hvI40pVFbFKGDQkZAQex1w01PxeIlAmKVov21C5Mhbh7qx0S3e4WXHwiPt5d
TMQ71IMt1QQKqxHPpQpNiiIq8R7JSVGKslTn06oSYJFoGQIsOJ5ttOP4drii
rPS/IW+DQ7iGxAxi4L3rFz+IWClaxwCm89H+G5z2QP6E/bq4j2Kt+ldLqjem
mUKxDeQTHY8HBb4hOYlSYYYtwgaSjigr9bK1YRF2UpGtuc3vejdVlWnFUUkb
g3uddxflihBw1Az5aMCkDNlVnKX1/uxgve977SUCPjC1EoXBbEljFcowutWu
XaWEF59OKJVJawGh6dJKFDGLOCE8UTZxoTWWXckjX3Of1PewlUGlZ5r3qGON
PoryQpw7qr2EZu1Dz0v7v9jfOuvaVLwNXOSJSjRh+5EgWiTur8AUxp1q16aa
khtKLv+RQOLqpVcd09L+iW60j84gKTZx513/tuiSRl/H94IPtuZ7rHnAAcnc
IlFx3UsqIS2Mc4DTcBLhFbG319wljRTdDAKTeQR3upGBkIknoaeV4lktdfMs
aEQp48/0sUEUbaNmVojvzBaYpNZv/Jb2H5JLQ6kmHB1bw0o3D1R3/FYpTrx1
R7ajGgE8EWDD9ujjPYvAx4kmk97iJIhDQlNVTpf3HD4eFDgCoL9R0dy8h+cm
fVNtRom363HCUCIBPEXLUNlJRJgMdZMLuodOoN2dPjZU7LuoCLNju84qoPC9
8QlbHUOnMMDaCTx1MtSFtDSG03gVpSnbNh2Osv5uSeJ5OSSeF9/tFlYXB/qN
cU9xORRaBnDklfuWHLeMB4IgDh5cOowIaRa00fe3c3uHfpHEylISixAfeoby
IzOUCZJJYaxTlEzwl/L5LMKG8sdJUCGk+g/K0dj4hBR0XfIdvRJHgbLjjo5L
HpIxgq7QLq94+hfL11zcvZ1e/nT/Av/5x0/3x1koHqoZaIh0I6a8T0dSE3I6
STx2n4AzMheuWyBB1MTJynVjrkdc/HCXIffC7LFEGskfGvdw9Un7hh/YPtSa
9bwLTh2Gx2o/tdPhe2uQ5FNcvrpIKuKFzB9oDt4U08uVyh/+ZxBNgu330Aot
sFwWB3ruySjtHFSgFzdK/bGYjKvIMJBIJ3vMzahdLXjzE1x3ILlvry7O76+O
D124Uapw+4NQIu971Y8yXGwouvSGbNVznKgGJZ7hAsNx3Y2xNVR0iVgLfdMt
wLtjozWhEph+NRWhtaTmBuCO2aGnA48MQ+QOHFBxB3woqiMBQAQnJyQBunfC
HlbCx4yui0M915W0pG3kcxOyGpVR3kw0cBm55X73Hpuw8NJG5WC8yBI7B++3
MsM9QynXj4cOo3i6TeLpFqxvDVo2vUG/UP2/RdPvBVOHF9p4C2Mp4tfiiGdw
92Z6oab8nUcVx2MMSR46WrNGK+BVAkCYbR2twd0Tl56IHJWU8RQ7A3cc5HRs
c5TwXRqPe/P7x5W94zVppCTxO7SEcSDgBkED/IuW2xnOHzSudy6kaNwqie04
UdD7UCRSviDOFrY++lZA9yNOj5r6aC+lhMHE1a6z/xND5Di7L8NXmjB0Hjup
aesF0YQylIx0BMmzHR4gxAgglbkFDdlko+AO/hYX23lqhnidjV00jz11wtp7
8ZPgQt7ScVyriFAqVbkuHNkMq9j8CXFjHBFv+MStOAnywK00rY37Zvw1sZNY
0gAnCgwtJTWGuMDaU4Jj644+vvHa0dQkTCXJrM8cUpZ6hoRTFURcj86ptdW+
/+xVkityGgxEp/EG/qhQST8MHUg9ah5Q4dHK0c74aegYjRGig+hMmOujbi+1
DwwhJMGQ+nWzMdWGelymupe3H8N9ZeLMfhDFk/84AaAEWVV6Gb5J9umGAQ7l
vdTJbLdvzQcy8a2V6xVrdtt9RgBv+/b2I/LA+zgbTN+8xxtKjwcrgxyqFqdE
uqATLydESgi0yKUHt1k1Ynpp6eavNX1qTyKKb1gDSyM271S3nCOX3xNCqPjB
61ipi4749wMnFwfg45JLJcEqzrUn0Dh/UMUJVK6NH5HdqCT+Rc3ahVndQM7o
1icgvEi+ObL373yCf/n5s/he7ng2NxKfjZ/S6r51llANgVupEzBsLr5JdSP8
5KHbD8O+Qa2KRHKZg3P1RuY7ZMKQ28J3gyz7+eef6TUURGL0j9//8ssv/D8q
nL8/f/QO6MgfGrNFtC1DK5Fl3wGmhk+85EFnZZZZ+L8eFrBtlv0H6UwJVcAj
AAA=

-->

</rfc>
