<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tls-reddy-slhdsa-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="Use of SLH-DSA in TLS 1.3">Use of SLH-DSA in TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-tls-reddy-slhdsa-00"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Timothy Hollebeek">
      <organization>DigiCert</organization>
      <address>
        <postal>
          <city>Pittsburgh</city>
          <country>USA</country>
        </postal>
        <email>tim.hollebeek@digicert.com</email>
      </address>
    </author>
    <author initials="J." surname="Gray" fullname="John Gray">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>2500 Solandt Road – Suite 100</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 3G5</code>
          <country>Canada</country>
        </postal>
        <email>john.gray@entrust.com</email>
      </address>
    </author>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2024" month="November" day="02"/>
    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>SLH-DSA</keyword>
    <keyword>FIPS205</keyword>
    <abstract>
      <?line 67?>

<t>This memo specifies how the post-quantum signature scheme SLH-DSA <xref target="FIPS205"/> is used for authentication in TLS 1.3.</t>
    </abstract>
  </front>
  <middle>
    <?line 71?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Stateless Hash-Based Digital Signatures (SLH-DSA) <xref target="FIPS205"/> is a quantum-resistant digital signature scheme standardized by the US National Institute of Standards and Technology (NIST) PQC project.</t>
      <t>This memo specifies how SLH-DSA can be negotiated for authentication in TLS 1.3 via the "signature_algorithms" and "signature_algorithms_cert" extensions.</t>
      <section anchor="sec-terminology">
        <name>Conventions and Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
These words may also appear in this document in
lower case as plain English words, absent their normative meanings.
<?line -8?>
        </t>
        <t>This document uses terms defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>. For the purposes of this document, it is helpful to be able to divide cryptographic algorithms into two classes:</t>
        <t>"Asymmetric Traditional Cryptographic Algorithm": An asymmetric cryptographic algorithm based on integer factorisation, finite field discrete logarithms or elliptic curve discrete logarithms, elliptic curve discrete logarithms, or related mathematical problems.</t>
        <t>"Post-Quantum Algorithm": An asymmetric cryptographic algorithm that is believed to be secure against attacks using quantum computers as well as classical computers. Post-quantum algorithms can also be called quantum-resistant or quantum-safe algorithms. Examples of quantum-resistant digital signature schemes include ML-DSA and SLH-DSA.</t>
      </section>
    </section>
    <section anchor="slh-dsa-signatureschemes-types">
      <name>SLH-DSA SignatureSchemes Types</name>
      <t>SLH-DSA utilizes the concept of stateless hash-based signatures. In contrast to stateful signature algorithms, SLH-DSA eliminates the need for maintaining state information during the signing process. SLH-DSA is designed to sign up to 2^64 messages and it offers three security levels. The parameters for each of the security levels were chosen to provide 128 bits of security, 192 bits of security, and 256 bits of security. This document specifies the use of the SLH-DSA algorithm in TLS at three security levels. It includes the small (S) or fast (F) versions of the algorithm and allows for the use of either SHA-256 <xref target="FIPS180"/> or SHAKE256 <xref target="FIPS202"/> as the hash function. The small version prioritizes smaller signature sizes, making them suitable for resource-constrained environments IoT devices. Conversely, the fast version prioritizes speed over signature size, minimizing the time required to generate and verify signatures.</t>
      <t>The following combinations are defined in SLH-DSA <xref target="FIPS205"/>:</t>
      <ul spacing="normal">
        <li>
          <t>SLH-DSA-128S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHA2</t>
        </li>
        <li>
          <t>SLH-DSA-128S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-128F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-192F-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256S-SHAKE</t>
        </li>
        <li>
          <t>SLH-DSA-256F-SHAKE</t>
        </li>
      </ul>
      <t>SLH-DSA does not introduce a new hardness assumption beyond those inherent to the underlying hash functions. It builds upon established foundations in cryptography, making it a reliable and robust digital signature scheme for a post-quantum world. While attacks on lattice-based schemes like ML-DSA can compromise their security, SLH-DSA will remain unaffected by these attacks due to its distinct mathematical foundations. This ensures the continued security of systems and protocols that utilize SLH-DSA for digital signatures. However, ML-DSA outperforms SLH-DSA in both signature generation and validation time, as well as signature size. SLH-DSA, in contrast, offers smaller key sizes but larger signature sizes. Due to its well-established hardness assumption, SLH-DSA can be preferred for CA certificates, making it ideal for long-term security as a trust anchor. ML-DSA, on the other hand, is well-suited for end-entity certificates as it provides the computational efficiency required for frequent, real-time authentication, such as during TLS handshake.</t>
      <t>As defined in <xref target="RFC8446"/>, the SignatureScheme namespace is used for the negotiation of signature scheme for authentication via the
"signature_algorithms" and "signature_algorithms_cert" extensions. This document adds new SignatureSchemes types for the SLH-DSA as follows.</t>
      <artwork><![CDATA[
enum {
  slhdsa128s_sha256 (0x0911),
  slhdsa128f_sha256 (0x0912),
  slhdsa192s_sha256 (0x0913),
  slhdsa192f_sha256 (0x0914),
  slhdsa256s_sha256 (0x0915),
  slhdsa256f_sha256 (0x0916),
  slhdsa128s_shake (0x0917),
  slhdsa128f_shake (0x0918),
  slhdsa192s_shake (0x0919),
  slhdsa192f_shake (0x091A),
  slhdsa256s_shake (0x091B),
  slhdsa256f_shake (0x091C)
} SignatureScheme;
]]></artwork>
      <t>It is important to note that the slhdsa* entries represent the pure versions of these algorithms and should not be confused with prehashed variant HashSLH-DSA, also defined in <xref target="FIPS205"/>.</t>
      <t>In TLS, the data used for generating a digital signature is unique for each TLS session, as it includes the entire handshake. Thus, SLH-DSA can utilize the deterministic version. The context parameter defined in <xref target="FIPS205"/> Algorithm 23 MUST be an empty string.</t>
      <t>The signature MUST be computed and verified as specified in <xref section="4.4.3" sectionFormat="of" target="RFC8446"/>.</t>
      <t>The corresponding end-entity certificate when negotiated MUST use id-slh-dsa-sha2-128s, id-slh-dsa-sha2-128f, id-slh-dsa-sha2-192s, id-slh-dsa-sha2-192f, id-slh-dsa-sha2-256s, id-slh-dsa-sha2-256f, id-slh-dsa-shake-128s, id-slh-dsa-shake-128f, id-slh-dsa-shake-192s, id-slh-dsa-shake-192f, id-slh-dsa-shake-256s and id-slh-dsa-shake-256f respectively as defined in <xref target="I-D.ietf-lamps-x509-slhdsa"/>}.</t>
      <t>The schemes defined in this document MUST NOT be used in TLS 1.2 <xref target="RFC5246"/>. A peer that receives ServerKeyExchange or CertificateVerify message in a TLS 1.2 connection with schemes defined in this document MUST abort the connection with an illegal_parameter alert.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations discussed in Section 11 of <xref target="I-D.ietf-lamps-x509-slhdsa"/> needs to be taken into account.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests new entries to the TLS SignatureScheme registry,
according to the procedures in <xref section="6" sectionFormat="of" target="TLSIANA"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Recommended</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x0911</td>
            <td align="left">slhdsa128s_sha256</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0912</td>
            <td align="left">slhdsa128f_sha256</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0913</td>
            <td align="left">slhdsa192s_sha256</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0914</td>
            <td align="left">slhdsa192f_sha256</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0915</td>
            <td align="left">slhdsa256s_sha256</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0916</td>
            <td align="left">slhdsa256f_sha256</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0917</td>
            <td align="left">slhdsa128s_shake</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0918</td>
            <td align="left">slhdsa128f_shake</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x0919</td>
            <td align="left">slhdsa192s_shake</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x091A</td>
            <td align="left">slhdsa192f_shake</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x091B</td>
            <td align="left">slhdsa256s_shake</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">0x091C</td>
            <td align="left">slhdsa256f_shake</td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TLSIANA">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="30" month="April" year="2024"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   recommended column of the selected TLS registries.

   This document updates the following RFCs: 3749, 5077, 4680, 5246,
   5705, 5878, 6520, 7301, and 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-09"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="14" month="October" year="2024"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document describes the conventions for using
   the Stateless Hash-Based Digital Signature Standard (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-02"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="FIPS205" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf">
          <front>
            <title>FIPS 205: Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS180" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">
          <front>
            <title>NIST, Secure Hash Standard (SHS), FIPS PUB 180-4, August 2015</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FIPS202" target="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf">
          <front>
            <title>NIST, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, August 2015.</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="September" year="2024"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-04"/>
        </reference>
      </references>
    </references>
    <?line 173?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Bas Westerbaan for the discussion and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA6Va2XYbNxJ976/A0C92DpuWKMm2OEtMa4k1liXFlJOTl/EB
u0ESUW8B0JIZWznzD/MD8y3zKfMlcwtAb2LL40R6iEkshYtablWBCcMwMNIk
YsIG77Vg+YLNTl+Hh7Mpkxm7PJ2x7dHOIODzuRLXX14TcSOWuVpPmDZxEMR5
lPEUcmPFFyY0iQ6ViON1qJNVrHmYYLk2gS7nqdRa5plZF1h9cnR5HGRlOhdq
EsRYMwmiPNMi06WeMKNKEQDHTsCV4MAzE1GppFkPgptcXS1VXhYYBaZBcCXW
GIsnAQsrvPTx+ORiNt7aC1gQ8NKsckULAoa/RZkkDvKlVGXKE6FvuGLvCLVd
kKslz+Sv3ADthJ3lV5Lb8QgAJuwVz5Y8yZWwY0os7ao3XGXc8Cu/Mi8zQyo6
yWK/WaRcJsB8lWexkerlkr6Pojwd9OFKc7Nas9d5koi5EFc9sA7lUh4IZVrI
LqQxel6q5aoL4j1ppAXByHS0qkS/jCEogqAOFofj7/kqY98pXqtlwo4gstSG
ncpUGhHbicpr/Jwd00YJYSZsvLe1xWZ5wnFr9i7nMfvvP//FZiU2s+2trRb6
c2P4DR+y88xwJfPuFQ54xuNKtzGgvRm/YTvf7bXv9TPQjpZA+1I4IHSjTeXO
otwYdpyUKyVUj2IPpI5yNltrI1Ld0ZteuE0vI1ri9BVkuUqx8xoOzN4dH7zY
3X2GTwHFy8n0bAoXCA9HUpiFC41FhBXP5xKS64mEp4UOP+5t7fugmQQyW7Tk
kuC9sRVc+fXEImNVTNMoo2E2MwgmuLRmr7leha+4FrF1FsMTNpNLeGmpBC3L
Yq7igZfD1ZLMtTKm0JOnT7PrpCjnepRJqHGZXz+lDzTylE56enYyuxzRpxHO
HBXxgjkxNpDZgidaeKjbL7buQKW9Q2YDWliMNRb2ePZ69mRo97GL968YNoe7
QzYtl+Ry463tvYfCtRK/CHi8Ne4H/Hoa7tRQEWxCpaWxPuOVbO+CaXb00Qis
miciPC8BA95WZhGt1K3L4aDO1Ua/+24LWWj7bUSfYIrxfTcLwjBEmCIoeWSC
4HIlNUtFmjNdiEgupNBsld8wsxKsyLUJfyl5ZsqU6dpfdLQSqagTwqdP3g9v
bxlklXR/eCwjqkX0ycgqppU3RoHFkMo4TkQQPAIzGpXHpVVLEHyd12p4iAPw
5C4CzjxmZB8NleAzi/3+jVtob0X5K06Zr+2938/YmQWNDSeZhvFL43KgX6yt
bS9FtMryJF+u2WNyjCfs4vsDVqj8ZxGZEbtft5XmIp6xuWAZcqiRuPT/0Ru7
ltziG9S3+MAT5F9pVqkeWEy9Ux+I0wdMkC9S2tWwwKNH7CDPrukgDPj7qFT6
C316pEUUmmbklq4jGDIsoxSr2eDt+9nlYOj+ZWfn9vO7o+/fn7w7OqTPiJLT
0/pD4FfMXp+/Pz1sPjU7D87fvj06O3SbMco6Q8Hg7fQnzNhLnl9cnpyfTU8H
pB1DWkbpUaa4DEORwExOapUZ4BdKkF65DmKhIyXn+II9rw4u/vPv7V14zp/A
p+Pt7X24jvvyYvv5Lr7cwAbutDxL1v4rlL8OeFEI1AiQwpMENizIsRDNXDMN
62ZsJZQYkbZQODldpXyNxTpnzd4uapkFSX4jFMRhEyQVCceio2yZSDCJlTKk
qKXFQCEVq5MNPAwpK1vCqn/5NpGZYOGLb/8WePerj0BcakYGxZhYYJlVxKdP
39a5p/illAX+a8LVeq5k3DH/7YgdwzktLZQKzABpiIjONYZMGgrAlUgKJFlv
ByI/+hjLaxkLFql1YXLk5mIlI9Y4KdkrZ+YmZ1HCNcRPgmAw1es0FUZh5aXi
sfRBedCRMa1kDCZsCqs0e+45i80tp9jgQgELtS/AhZjTNuSGDOqhogQBm8TA
DceBFzHogXus0IRIElkYOqRUMELPquFXrYEoJRIb/bAnOIlT6CfEI1BcSrE6
uCAi/t4T8e+/rllxa5e5SKS4xkHOMNrlXb6EqyHxcBRd0RUROJypolCUWCmy
llCavPIGF6J/rYUsynp6xC7a2aJlV2I56/w4ElsSnL/Jz9BCNaj5QrT2j5BD
URQlzt++ntnJoaKkhMe9PbVsS7HsmZf4r2bhOqXM/L5LdCUaecjPl0YmyA7a
+j4ak0gUhqDoOk+tKE85n6pRAPdJRsuRZ6FcaNyup7BokDa3HNZwYCMEHXVK
9sBM+LSAwhPVsKRId6JYXRjCkWO0RJigHSSePsOBIqAbNZ0bRT7NOg+gT6ws
6OP4H892QSNa86VwuUDSFRdkdoMy1/sKanOWwIESCKVkUHCFMto6ByEUPFo5
TthYD8/BdaMVaCOjA4HNksH2+AWbS2NNW20Zsu39cc8owRrvPduYISxtomty
LQEpXfdKHys9NIHhcys3993yxFRe5KTplDj/8ewJOeyCDPv4+Am7hgZsFvUH
NQcQZuzIb5yGWoAE5kE8VErSpVwJg5IUqSe3w2+OmnGUcxjnDgN5G3oYV0U6
QzhYHgaUK+l467N2Bue0ooPGh3CnK+8wKO3QglmWXlgy0nmpIhFSDw7ntZlC
ZNdS5RnpV7OT/BKOdI1OERqyRYTSIlnb9OiU0oukIE/OrzfAAAu8OpW/Vg6M
nlQABrKRcp66FJlQ5PGkTgiQi3Un0FxpsshJ0SQEpDSnEHKVDY5pJbyeqhWJ
5ptqPIRHzkKof9wdO94Y2x9vrtsfb6yDETfWYWxTnj/3zVHPwd1Bf/Ldwc2V
1dl3B6uVNcXFOQyU5eTsrhKHqsE8N/A1FWdEceD7Mi0s1czFOocdDAUzNlC1
k1mCs96dxUIla7JCx09dLM1LmaAcKguIEZp8DtWN5Tfs8/aCjVp5bF17KhiJ
U6aU1lPJE5AgqWG6t7S3xXS3iUEhlcQj9uNKkgyf8AAG+RdZV1Qk7hNBIq/q
7EFZjJKdylOJe7sarCGnSpM3EoGo6JUA3JpxUGhk6sZCN2fGpa2JiMpQFRiQ
jOmm/5ZKPMHRe5hq0hD2lIS1oixiRPdQYZUDoCaP8kS77O+TWI2TdLOhOJz0
GlUoImxYXTtH0yoU5RndfgGc52bVUrgPUPIOG6I8kQ67jeVhu3Toxn6dnIbW
7j5bDqvcU7EXdR2Wt+BBBsZSy01KG7HDRqd0Wtj2sB5HHt7tw9Ar4FTl8+0B
xtE2IZPQK6du+yEyl7WQQiGXLW2Z3NiBUwPqHsZ4hoynRl6XQ3I0Ml5umX8F
TQ0pJ1usRMH+YJHFIbVlkNUGQIJxts+clRtQ9VW1qmKBpVJk0bphTxK4oG+2
PFfAHVp67TaZQ6QA5G6uqzqCsiIB1Ct+JYhgp3e6Bv+8dXvrWP9ODWXfDHXB
wSPtFwFXz7hml5yDXLY3aLsdsG97g4e3vXcqBR6DjIjmNkpAephuUnZdOGif
ZKgo/+233wKRgVM+BYy5tzrQtf4AlVHifrz1cWt/e/vJsD276M6O27P74zt7
d7qzd/butmYxemfvXnf2zt5nXVR2L5jOTT7vgVxPvuhBXE/u9wCuJ6c9eOvJ
Vz1w68mDJ8HtXQv92ao/OLFtjUyLXNleANGPLCYc5dl6zYr8htErMFWESiDI
qyaaGllxt3jT7arc+haa+hJtIKXHuWXehXXoG6wgyqA0J4jzlCQI9GZVc5pt
ezpxUxcd8KATW326AAJd8iZQKj5FJPKe/EYxlUnEdFN2U8CiZ9Y2mB1TdApX
Cicl2jF9uSp1lwKrHGHxCNf8U26KKh25YpNYGjHVVP/33LBpVNl4h9lXInoN
QOYH/67pVwHcb+Rqt+Zu1TrfWMZNzSftO05d3vvjZsLWF2x3tDvaIRvWzORF
RzkoXaPiiEmd/eRqn3fa73AWBVXqMqZ3+JB+vaIQoooMWusZXfSMIkB6R3vW
Ukj0jm6svRK9INxw7+oeGG64bzUBcR1gz8yCuoOCNI72yKa6junv/xXjtjZH
VVu1NnafwqrnRHICGxD1A+jY5R369YOeo6YMHYVysa5EJIAJNYpQcJY3Yn30
MYKzLwV1UweNpX9w3YPvde0jXi0djp15b7LB/XVQ+RzkUxVlnf1wdVSDYsmT
D02s8IR+X7PvD1XFgBZKI6W7Akp7NVWTUWfSPiGV2qul8v3tbXL8L+vfPiRo
//JjYM/MPbjxyP6wRjmeXuKnZ9MePO1L22JCG5c4K1711T9p8m4pQL+KItbX
w4COUjYK/XL7QhHborYTy8/oOv5HM+s4n9kPPAHdMfaZHdp3XNeK3PP3mb0T
4A/AjaEo+ragJiUSfjr4HFZ/zacv/H3+wjcaAD6X7enozVKgB99PnW8dBY9Y
LW/ckbd4sLydlrxWufGH5e125D0c314jr13S/GF5zzryHo7v+aZ9r8SmuK+W
92LTvg+St79p3wfJm27a90HyXm3a90HyDjbt+8fk2d8j52jMiQOn0VWW3yQi
XtrnruDTxP2/KSL+68D+hjqwv4Xx7Mry3itkwR9BiELNORi/6hk8UVctsaMj
g8bhf6Y5uRV/IwAA

-->

</rfc>
