<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.4 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-steele-spice-profiles-bcp-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.0 -->
  <front>
    <title abbrev="DCP-BCP">Digital Credential Profiles Best Current Practices</title>
    <seriesInfo name="Internet-Draft" value="draft-steele-spice-profiles-bcp-00"/>
    <author fullname="Orie Steele">
      <organization>Transmute</organization>
      <address>
        <email>orie@transmute.industries</email>
      </address>
    </author>
    <author fullname="Michael Prorock">
      <organization>mesur.io</organization>
      <address>
        <email>mprorock@mesur.io</email>
      </address>
    </author>
    <author fullname="Mahmoud Alkhraishi">
      <organization>mavennet</organization>
      <address>
        <email>mahmoud@mavennet.com</email>
      </address>
    </author>
    <date year="2023" month="December" day="22"/>
    <area>Security</area>
    <workgroup>Secure Patterns for Internet CrEdentials</workgroup>
    <keyword>digitial credentials</keyword>
    <keyword>data model profiles</keyword>
    <keyword>policy guidance</keyword>
    <abstract>
      <?line 53?>

<t>Digital Credentials are frequently modeled on documents, forms, and messages
that enable a holder to prove they have attributes that are acceptable to a verifier.</t>
      <t>This document provides guidance to verifiers enabling them to describe their requirements
such that they can be translated into digital credential profiles.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://OR13.github.io/draft-steele-spice-profiles-bcp/draft-steele-spice-profiles-bcp.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-steele-spice-profiles-bcp/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Patterns for Internet CrEdentials Working Group mailing list (<eref target="mailto:spice@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spice/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spice/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/OR13/draft-steele-spice-profiles-bcp"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Verifiers have digital credential requirements that reduce their liability,
improve their transaction throughput, comply with local, regional, or international
laws, and support their environmental, social and governance objectives and values.</t>
      <t>Requirements are often expressed as "Policy Documents", and furnished to holders,
to enable them to easily comply. For example, sometimes to receive a new
credential, a holder may need to present one or more existing credentials, and
different regional agencies might have unique requirements regarding the quality,
age, and issuing authority of these credentials.</t>
      <t>Not all the attributes of a credential may be necessary to disclose, and the details
of the serialization are often less relevant to the verifier than
the authenticity and integrity of the credential attributes.</t>
      <t>Verifiers need to update their policies as new credential formats become
available, but still need to ensure that mandatory attributes are disclosed,
even while changing the securing mechanisms and serialization details.</t>
      <t>Depending on how a verifier wrote their policy, the process of updating it
to take advantage of new capabilities, safer cryptography,
smaller message sizes, or advances in data minimization, can be difficult.</t>
      <t>This document provides guidance to policy writers, enabling them to construct
policies that can be translated into human and machine verifiable profiles,
enabling digital credential formats to evolve with the speed and precision
at which policies can be written.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<dl>
        <dt>Ontology:</dt>
        <dd>
          <t>a set of concepts and categories in a subject area or domain that shows their properties and the relations between them. (oxford dictionary citation fixme)</t>
        </dd>
      </dl>
    </section>
    <section anchor="ontologies">
      <name>Ontologies</name>
      <t>Verifiers can share their view of a subject area or domain by acknowledging or leveraging ontologies.
Ontologies can be leveraged to model information requirements, with or without requiring the data
format to explicitly encode the ontology or leverage the ontology directly in the construction of
digital credentials.</t>
      <t>For example, the ontology defined in <xref target="I-D.draft-petithuguenin-rfc-ontology"/> can be used to describe the information
required in a digital credential for RFCs, without requiring the digital credential to contain
the literal strings used to serialize the ontology, for example the string: "ftp://shalmaneser.org/rfc#area",
need not be present, so long as the verifier describes that the string "area" is equivalent in their
profile text.</t>
      <t>Policy writers <bcp14>SHOULD</bcp14> distinguish between the information they require,
and the ontologies that can express the concepts needed to understand the information.</t>
    </section>
    <section anchor="information-vs-data">
      <name>Information vs Data</name>
      <t>Information is abstract, we can express the same information in many different ways, including in many different serializations.</t>
      <t>The following statement for example, expresses information:</t>
      <artwork><![CDATA[
Alice believes Bob is 42 years old.
]]></artwork>
      <t>That can also be expressed in different data structures, while preserving the information:</t>
      <t>in JSON:</t>
      <sourcecode type="json"><![CDATA[
{
  "alice": {
    "knows": {
      "bob": {
        "age": {
          "42": "years"
        }
      }
    }
  }
}
]]></sourcecode>
      <t>Verifiers can write policies that mandate a single method to encode information in a serialization
and allow only one serialization. This can reduce both the cost to implement and the attack surface
associated with the digital credentials that are acceptable to the verifier.</t>
      <t>However, if a new serialization is invented, that is simpler to support, and more directly aligns
with the values of the verifier and their mission objectives, having such a policy could prevent the
verifier from adopting the new and improved serialization, even if it secures the same information
and provides additional benefits, beyond integrity and authenticity, such as compactness, reduced
computation and storage costs, or safer formal modeling capabilities.</t>
      <t>Policy writers <bcp14>SHOULD</bcp14> distinguish between the information they require,
and the acceptable serializations that can express this information required.</t>
    </section>
    <section anchor="schema-vs-definition">
      <name>Schema vs Definition</name>
      <t>Once a verifier has documented their information requirements, and selected data formats
capable of expressing the required information while satisfying their policies and values,
the details of the acceptable data format <bcp14>SHOULD</bcp14> be considered.</t>
      <t>There are a number of subtle details regarding octet encodings that can lead to security
or performance issues in digital credential formats.</t>
      <t>For example, understanding the allowed data types for expressing information, be it an integer,
a floating point number, a string, or a boolean value.</t>
      <t>Policy writers <bcp14>SHOULD</bcp14> describe the allowed data types for the expression of information,
and <bcp14>SHOULD NOT</bcp14> support polymorphic types.</t>
      <t>Schema or data definition languages such as <xref target="RFC8610"/> <bcp14>SHOULD</bcp14> be used when describing
acceptable expressions of information models, so that validation of data instances
can be automated.</t>
    </section>
    <section anchor="designing-data-structures">
      <name>Designing Data Structures</name>
      <t>Although schema or data definition languages can help address some common security issues
such as validation as described in <xref target="RFC4949"/>, there are still problematic
expressions of information which should generally be avoided even when fully specifying data.</t>
      <t>Most commonly deeply nested data structures, or lists of deeply nested data structures containing lists.</t>
      <t>Most digital credentials are about asserting attributes of a subject, in a way that is secured by the issuer,
and provable by the holder.</t>
      <t>This can naturally be expressed using a simple map data type.</t>
      <sourcecode type="cddl"><![CDATA[
subject-attributes = {
  ; identifier
  ? &(id: 1) => int,
  ; age
  ? &(age: 2) => int,
}
]]></sourcecode>
      <t>Strings and arbitrary length data structures <bcp14>SHOULD</bcp14> be avoided, whenever possible.</t>
      <t>As the issuer secures the data, the interpretation of the data is always in the context of:</t>
      <ol spacing="normal" type="1"><li>
          <t>the definitions published by the issuer.</t>
        </li>
        <li>
          <t>the data the issuer chose to secure that expresses the information.</t>
        </li>
      </ol>
      <t>Policy writers <bcp14>SHOULD</bcp14> leverage tabular data structures (tables, csv) whenever possible.</t>
      <t>Policy writers <bcp14>SHOULD</bcp14> externalize definitions of data structures wherever possible, and use those
external definitions to generate relevant sections of the policy document.</t>
      <t>Policy writers <bcp14>SHOULD</bcp14> ensure that output documents are computer readable, and that when tabular data is
embedded in a policy document, that it is clearly separated from other sections of tabular data.</t>
      <t>Documents <bcp14>SHOULD</bcp14> be sectioned by logical concepts, and document sections dealing with the description of
data structures <bcp14>SHOULD</bcp14> be clearly identifed and not mixed with other data structure descriptions without
clear separation.</t>
      <t>Policy writers <bcp14>SHOULD</bcp14> clearly version policy documents, and <bcp14>SHOULD</bcp14> clearly identify the date
of publication, start date of applicabiilty of the policy, and if known, the end date of
applicability.</t>
      <t>Policy writers <bcp14>SHOULD</bcp14> clearly define the scope of the policy, and the audience to which the
policy applies to. These scope and audience definitions <bcp14>SHOULD</bcp14> take place in their own sections.</t>
      <t>Policy writers <bcp14>SHOULD</bcp14> restrict what data is expressed in a digital credential and how the data is expressed
not just the information that is required to be present.</t>
      <t>Policy writers <bcp14>SHOULD</bcp14> avoid making recommendations where the same information may be conveyed in many different,
but equivalent data structures. When leveraging CBOR, <xref target="I-D.draft-ietf-cbor-cde"/> <bcp14>SHOULD</bcp14> be used.</t>
      <t>Policy writers should avoid creating "frameworks" where interoperability is not immediately available <xref target="RFC9518"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
      <section anchor="cryptographic-agility">
        <name>Cryptographic Agility</name>
        <t>TODO Cryptographic Agility</t>
        <t>Registries /  Pick at least 2, use at least N bit security... avoid <bcp14>MUST</bcp14> support.... recommend AT LEAST support.</t>
      </section>
      <section anchor="internationalized-names">
        <name>Internationalized Names</name>
        <t>TODO Internationalized Names
Strings / domain names... Unicode.</t>
      </section>
      <section anchor="exploiting-data-validation">
        <name>Exploiting Data Validation</name>
        <t>Max depth exceeded in JSON, cannonicalization timeout in XML / JSON-LD, similar issues with large CBOR structures.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="36"/>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9518">
          <front>
            <title>Centralization, Decentralization, and Internet Standards</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="December" year="2023"/>
            <abstract>
              <t>This document discusses aspects of centralization that relate to Internet standards efforts. It argues that, while standards bodies have a limited ability to prevent many forms of centralization, they can still make contributions that assist in the decentralization of the Internet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9518"/>
          <seriesInfo name="DOI" value="10.17487/RFC9518"/>
        </reference>
        <reference anchor="I-D.draft-ietf-cbor-cde">
          <front>
            <title>CBOR Common Deterministic Encoding (CDE)</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="27" month="November" year="2023"/>
            <abstract>
              <t>   CBOR (STD 94, RFC 8949) defines "Deterministically Encoded CBOR" in
   its Section 4.2, providing some flexibility for application specific
   decisions.  To facilitate Deterministic Encoding to be offered as a
   selectable feature of generic encoders, the present document defines
   a CBOR Common Deterministic Encoding (CDE) Profile that can be shared
   by a large set of applications with potentially diverging detailed
   requirements.

   This document also introduces the concept of Application Profiles,
   which are layered on top of the CBOR CDE Profile and can address more
   application specific requirements.  To demonstrate how Application
   Profiles can be built on the CDE, a companion document defines the
   application profile "dCBOR".

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-cde-00"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.draft-petithuguenin-rfc-ontology">
          <front>
            <title>An Ontology for RFCs</title>
            <author fullname="Marc Petit-Huguenin" initials="M." surname="Petit-Huguenin">
              <organization>Impedance Mismatch LLC</organization>
            </author>
            <date day="25" month="July" year="2023"/>
            <abstract>
              <t>   This document defines an ontology that describes the specifications
   published by the RFC Editor, together with ancillary documents.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-petithuguenin-rfc-ontology-03"/>
        </reference>
      </references>
    </references>
    <?line 275?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA7Va23IbxxF9n6+YQFUpOwWApqwkEuIbRVK2UhTJkJSdVCoP
g90BMOZiZz2zCxBW0d+Sb8mX5XTPzF5I0HIeogcRmJ1Ld0/36dO9mEwmojZ1
oWdydGKWplaFPHY612Vt8PHS2YUptJevta/lceMcHmBUZbXJtB8JNZ87vaHF
x5eT18eXI5GpWi+t282kKRdWiNxmpVpj/9ypRT3xtdaFnvgK6ydV3H4yz6rJ
Z58J38zXxntjy3pXYcnb05s3Uj6TqvAWZ5gy15UuSbjRWI50bmrrICZ9eXv0
Gn+sw6ermzcjUTbruXYzkUOcmchs6XXpGz+TtWu0gMSfC+W0wq7XOmucqXcj
sbXudulsU6VRLS9VXWtXernA1m9L+qxhCHcaLQQT3OodFuYzIScyJxOS4bLW
hp7HVa3k2ua6kElnGq5sYbKdXDYmV2UGsXTZQFop/3cppAwmG/0AJUy5lN/S
FjS+VqbAOFv8G6PrxdS6JT1QLlvhwaquKz87OKB5NGQ2epqmHdDAwdzZrdcH
vMMBrYSSq2aOtRdXh58ffORiaUGBW/B17zBaOA3bTI392BYfez5d1etiJIRq
6pV1dBM4U8pFUxTB90YXzmh5zetH/AzKqdL8rGo420zeOFX6dVNrfqajyeBc
+ps6PZrC/RpfY4zM/eiEdyZbKc0h42x2u++UtfaNg7qDQ9ZVWPBNerp3c7Va
2yaXR8XtyinjV2bv/goOBM8Y7h+WfpMeTjO7hqlK69ZYtmF3u3pz/OLVi1cz
eX16PPn27OL6Ogy+/NPhZzN5fHJyFr6/+uPhy1n6gKG3k5NpuBpymEk2t26S
5ZqWnAohCAB6p3SzK13T1S8bXZpy4hbZBBFvC7vc8e6Ti/MbQf8mk4lUc9gc
eCPEY3zy8GEtF07/hJ3qYhdCTOfSlhK406wx6scUNWv8UWVOV+DVEtFXr1Qt
danmhZZKrmyRaydrS+G50bJe6Z1cwWISkefMHNfvJS+hA1WW6armpVih5EY7
szDaTYW4WRnfHs2bmRxLU4TT/DTbh+MpVnHcmh5haobT+HzjJOllnGYtgI3Z
KojAwmWqlDSRvJOiKwfc0g7RRh3+tIAzDfZcmzwvtBDPCEiczZuMnEeI71ux
WO89G/XFCZLgWZMlaQuj5qYAkI6FWbdmxAOWUfExGAEsLVdVU48lHLHCnW3h
CrKwmSrG2HCJWfQJQGcY6Ni3VSEKtY136Juqsq6Ou+tyY5wtSSpa521GstK8
JUTAejK7nf+oM/JDz082qmjYIFd9lehq7aLWpdR3lYOjwKjKy9FlQOmT5FCj
IMaicSUiEZNg9+BAfizwOXpVulStvIGaQdupfAPN9J3CF03SrhEKa3IuC+Uz
bcjlZKm3ojP8uHPQtdrhYTiSRCQns6Uma60txNd3xtfkUb38w9KK3CwWmrN3
srFEHJQZ0AwusVzV4dqb0iCWhleNBcrl0U/lT40Kl4zlwRDI2A09DeiLZ7Ai
TfW6LwasfW4RP0XB2/TiCrNV389ISbh2CXMgWN2OI8P4rLA+nkgb5LoGwHkR
zpJeExOIUNi7Sjg+aVDojYLu2IkmpxAkLy4FiwPZ6fiMxGel4HzLnjJ9ATvZ
p/24SRfTVEQ6ontyiicjK5qw7W8TwNFDV/iGFmpDCXhOboG9Je4Rpkp7Enlx
OkTdGvIpMJ9d34ikcTJSPhYaYC+3K8S9RFoql+n2PJMdfFlrGjd+HSJiaL5o
W2h3woSLFmB4Zbc9tJNbZ4dq7sZ8BmKfbo4Mx6ag1aamyKjVLUyd01XAe2gC
m0RVATlgJoSEgp/CTLuqtkunqhVcza/hNuT+Ab2lNz/TVHg9b4bTcF+RZJnS
rKMe44SS5Pwma4r6tyF0pGVbXD/F9GOcJjoJHomk1F4v38wToLxqcGUh/Sjw
qzI5IMNEgmfcWTpmD/YmXyFX2NgCkcqwyVdakY/Q7kCEzBB7FpAFl4+E0coX
RSOdEBZTwv8b7WAtTrtkFi3BZCVRWWDeu/fXN0Sr6a88v+DPV6d/e//26vSE
Pl9/d3R21n4Qccb1dxfvz066T93K44t3707PT8JijMrBkBi9O/pHhNXRxeXN
24vzo7MR3Wk9uC1yclgAenBugL41Y7RIiZMMLlGG/Offhy/khw+/A5l4fnj4
6v4+fnl5+OcX+LJFrIfTbEkZiL9SWhWqqrSi1MNABc+kiyAI9dLD/REDAFFY
7w//JMv8aya/AP08fPFVHCCFB4PJZoNBttnjkUeLgxH3DO05prXmYPyBpYfy
Hv1j8D3ZvTf4xdcFeevk8OXXX4GOXSSSJmbAAY8SBBGMWCA2FGAkFn8mBCTm
NJx46eIUhWtuwUrLECxkT5/gw9lKu9rE/ExuDczmICZ8rLdalxx9U/mJvUMw
5AgSZhSUHwDaAbcW5m6tPyXfjqJiwz5CUxD4FXsRH7sxgB9OP08IOgfGZrel
3YJUMobiEVKJdip8a0+Ziu7EFGtxYgDwUPy1jBjC9nPsOIQzdqe/tqnj0wTb
BG0iLGUIuKsorInxIoVjZ56UOHRPyAcPcpyX0Sq+A93hGMljF+Ix8FAOGDCW
4X56Af/goPvwYRKZO+IrGqDxQfc+re2bQEQT5MFZ9sMeFQTRPnvs8nhJgGfk
r5DYC8JwDFPhVi59K1NKeEMLca2QlA3oyutQRy3qCnUrvKcAmIPbOK6PUbs8
I58BhnGqLkFx5jpxMyJ4oLbEjfyQeCST+JbSx5PkiLcDqZKkKZgqAV+4L+NE
zBay1neUzC4HmUpGdMgDCWzATvvBM/A+LiKi/cHlYtB1Dt0ltEiGk8OEYCdl
I9spifjWaYfeGdNQZHRnbrw8IUcW/UEomko83LJ+dKRHBTyQHLbADexkx2i3
agcPMWVWNExVHs8Y0Bs/DeluYYvCbmkBxK85EPvXP27LAN8/fybEL7/8Io5g
eA3rFkZTVfHazkmTF8/lDvkD3KfIpzwPJ0U7UhOLfKMrLoiztCIyewnRCKZH
Hs/sjT3JbZLDDwXBBn+9vjgPIv3oEVEfUGePFMk2mskP3AgYEX759isG5nbe
+0oLlnowgKEXzzEyYmVG7fi96P+l/+/FfVDzAcqyR8ohOwq8leobD3WgG2qf
lY30llHswTWr4b2xlyq6s5C2qfAZTJhKJnd0fqxM5zaSpMx6Rk5DNxu4RHRY
cGhAPBKAW6gMLNxzBUm8omVYe2DxqWZAP8jhZt/ZLQExnHMRyroHRNuQa4Gq
47hx2BIjnoXkbkQsdWPvwjLHjxCOTZalF62QoaZN1UoLNFFNJLvYWe3VwmOq
+dj/qbegEu/NbFMwmSTBaLFod1s4uwbntlWdHJJ04noplPwPKgnEEBUi0N7U
ofbQ+6NaBP4aybjKcxPKfgRMiSRDGXKud3ZQmLE79Oq2cdTDc60NPAFM+3F0
hVzQYBOJApc8KKEoQ5JrhGIilB4sUxESNpfSvfLk/wC5Pf8ZotQ+BDZ+H4XI
GWmvM/AjxSBLadmEts4F1TS9om2lOj6tk2s8TUtCbVjAYTCZISpWIoLNUnAR
F+VLLtHL6t22Ac08vvjFLs4clMdtW2YseuV98ueelXpSJOvPA5WB7wRj3BBL
D9Epw4sA2gccry66nbu2hoV2dcAg5git4QutIlkIrwgEnAQ8lQ8nu1LnI9ae
T5ZsDwlUly+TvRjSknmpi+9jGmqt2jPkmKsfgq8QCQAXAXMUNtTZlcVo1Jn6
RoFUhFIZaGihURns/LQr99naE7LRoyQfU8eBiOzbXaXSNuxw2TuAWIXKNOwF
GaLXEuWmI/LWdWWhEE/Uq23DGhyTetEgmN29M5+jAi7JDXVFz1s6Kf0DMUOE
e+ZofOMwi8lV5MJBHFPSTWWa3J0pLfAGlUEdQ+5Ee4Aw2Z14jbxus7cAPyC+
ulxJ/xsUpM1XuqgI+DjSqS9IKLbGtOR80dtEskZPXIrpfgUMQ7Wd/Pt7Ju0x
HkJXCUAL25AZMvErBgotBNRplA+WAGIQ6YJ7c2pjDfG/2GbCf/SyYke9iMyE
+CZtYaR3lHiDJgUVDJpavgDmFk/6lIcKFwApC/KrUxPFp4N4RTppX6pmHJhT
8YDkTlUm8fEH7cdY/40D7QCh7LIxZ62cSkEGdLoEN27zFTtZfBaatKnHRJda
KoibjNYRv4ajWsVMD2JUdQE2ZTInszwvRJRq0pP2S6Zpf5GG1SNIx9ev5e8/
MflMHn4qv/yKcGHMc+Bb8SE+zeTz7mkkbdexKOJM6uYGLBzlNCqOJUjFQ5N3
MRdvf8w3T/wGkQ0PgiUg/JHv2WmQ82nDccyKsXvTRlt6zuVAQYS+V6NSsYNJ
oLmH09j7TUHkZdXMi9CGH9zQVDyfdrv2JMpW1usW1GNLtWP6j2uY/SjZFdhq
3hTKPTLXJ4w/cOrMbz7da6n9G0NXemvBpWlfzwRJvSO2FNb9TUO+bkg/0lKk
vQYbQfUQy7XuGuNeZ+0x3MMNsiWm8LS0vb40IgwEq3vxxoEXWJeml1kqV62M
vICBY2A/44VG6srz1BN4IEciyRyZGZKZI9DRlXLM2JmeWkK7oUK9I6in3QrY
uXScHryIKuCMQCRWu0HktgvZbp1rxQyxKxQYhKu2nfJkBCXRYxTH/i01D9bm
LpUeQZHhJv0jfGqKCN4u2eHXvDadC6fhxP3AvFHTB5OjkLsUTpreuXDYZZGS
IEk6rmCZDqqKulPgzKboXp+kFwRcKywk1aSh5woXytNS0S6lV0wf1SK0n0I9
kdlK7zsrvNzJjY69/ZDTqKiJuvOR/AKOykd6aRX2CtVFXNiPnygEv8uoCkU0
MHZnJDWIk3c8KT08AbCbkfurugW9QVdgby+MBKI3MH2obFcJ8p0fG1/vqTpC
HmtZeWigxw7Vk1IyxiMz8W9JHL2hgoPksTJh4NnfnYkv7xA6G70L2gx7MWNB
b7d6va0HUTKVP6z4vV3bZT1+fXE1DuTv9BH3e6xA5CtBAdgvEOPRwkFU+oWP
H0X5OQtR3zn6G1mJzGigak4tAKqy00u52OCkHz7c34d6K/Gy41h6BOMg+1+c
XLRPMfOZPO7eZoH6Hi35uDjxiWdXemnCj03kgZSXJrsFZ6GCBFf8fMwY334/
l/NUXlPYTKdReX4jEcn3lIbbe5RHN/Ls9Kj3mOV823/jjgSUy3MYLan01NPE
Ig5S15x+tOLpvPelob5O2Pz0riqsqVu2/H3LX8Hd1B1irALo6bsstBZjb4vf
4ZW2JEBOXRN6Y050DlP+/u4M59LEydnJmAgV/YgpFWbhpwXKIU2TE/W9THBz
8uj86PH1DV45Ub1c2jBTtZHNv6SYq+yWdjlq3xCEX2p8mIX6S+dfjhYgoHp0
Hy3YvUuATf4LbIakensnAAA=

-->

</rfc>
