<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-tschofenig-jose-cose-guidance-01" category="bcp" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="COSE/JOSE Guidance">Guidance for COSE and JOSE Protocol Designers and Implementers</title>

    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization></organization>
      <address>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="L." surname="Hazlewood" fullname="Les Hazlewood">
      <organization></organization>
      <address>
        <email>lhazlewood@gmail.com</email>
      </address>
    </author>
    <author initials="Y." surname="Sheffer" fullname="Yaron Sheffer">
      <organization>Intuit</organization>
      <address>
        <email>yaronf.ietf@gmail.com</email>
      </address>
    </author>

    <date year="2024" month="July" day="08"/>

    <area>Security</area>
    <workgroup>JOSE</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 51?>

<t>JSON Object Signing and Encryption (JOSE) and  CBOR Object Signing
and Encryption (COSE) are two widely used security wrappers, which
have been developed in the IETF and have intentionally been kept
in sync.</t>

<t>This document provides guidance for protocol designers developing
extensions for JOSE/COSE and for implementers of JOSE/COSE libraries.
Developers of application using JSON and/or JOSE should also read
this document but are realistically more focused on the documentation
offered by the library they are using.</t>



    </abstract>



  </front>

  <middle>


<?line 64?>

<section anchor="introduction"><name>Introduction</name>

<t>JSON Object Signing and Encryption (JOSE) was originally designed to provide a security wrapper for access tokens used in the OAuth protocol, focusing particularly on digital signatures. However, its utility as a standard for describing security-related metadata was quickly recognized. Today, JOSE is widely adopted and its functionality spans across various specifications (such as <xref target="RFC7515"/> for JSON Web Signature and <xref target="RFC7516"/> for JSON Web Encryption).</t>

<t>With the development of CBOR <xref target="RFC8949"/>, a binary encoding format was introduced to address use cases where JSON was too verbose. A security wrapper utilizing CBOR-based encoding was required, leading to the standardization of CBOR Object Signing and Encryption (COSE), further refined by <xref target="RFC9052"/> and <xref target="RFC9053"/>.</t>

<t>The JOSE and COSE specifications have intentionally been kept in sync because modern protocols and payloads are frequently described in the Concise Data Definition Language (CDDL) and serialized to either JOSE or COSE formats. This convergence makes them attractive to developers working across web and embedded systems. Due to their similar designs, the guidance provided in this document is applicable to both JOSE and COSE.</t>

<t>However, certain practices pose security challenges, which are addressed in this document. Our aim is to assist in designing better extensions for JOSE/COSE and to simplify developers' workflows.</t>

<t>The document is structured as follows: <xref target="kid"/> outlines challenges related to key identification. Future versions of this document will address additional challenges. <xref target="guidance"/> provides recommendations on creating improved designs for JOSE/COSE.</t>

</section>
<section anchor="terminology-and-requirements-language"><name>Terminology and Requirements Language</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 <xref target="RFC2119"/>.</t>

</section>
<section anchor="kid"><name>Key Identification</name>

<t>The security wrappers in JOSE and COSE employ a straightforward design, especially for basic functionalities like digital signatures and MACs aimed at a single recipient.</t>

<t>The security wrapper comprises the following components:</t>

<t><list style="symbols">
  <t>A header, divided into protected and unprotected parameters.</t>
  <t>The payload, which may be detached and transmitted independently. This payload requires protection and often consists of a JSON-based format (for JOSE) or a CBOR-encoded format (for COSE). Standardized payloads include JSON Web Tokens (JWT) <xref target="RFC7519"/> and CBOR Web Tokens (CWT) <xref target="RFC8392"/>.</t>
  <t>A digital signature, a tag (for MAC), or ciphertext (for encryption).</t>
</list></t>

<t>The header's purpose is to provide instructions for protecting the payload, including:</t>

<t><list style="symbols">
  <t>Algorithm information used to protect the payload,</t>
  <t>Key identification for verifying the digital signature, MAC, or encryption,</t>
  <t>X.509 certificates and certificate chains,</t>
  <t>Countersignature.</t>
</list></t>

<t>While the layering is straightforward with the header providing instructions for payload protection, certain specifications and applications have begun embedding key identification information within the payload itself, disrupting this clear separation.</t>

<t>Using the 'kid' parameter is the recommended approach for key identification, although <xref target="RFC7515"/> does not mandate that key identification values be globally unique (and hence "collision resistant"). If a JOSE- or COSE-protected message is intended for external or third-party recipients:</t>

<t><list style="symbols">
  <t>The 'kid' parameter MUST contain a globally unique value, or</t>
  <t>Other header parameters, when combined with 'kid', must result in a globally unique value.</t>
</list></t>

<t>For JOSE/COSE-protected messages used within domain-specific contexts like enterprises or specific workloads, uniqueness requirements are relaxed.</t>

<t>The practice of placing key identification information into the payload instead of the JOSE/COSE header forces a parser to postpone security processing until later. The parser must inspect the payload to find the appropriate keying material and subsequently verify it. Since the parser does not know in advance which fields contain key identification, it must expose all information to the application before signature verification or MAC processing. This introduces significant risk, as application developers may make security decisions before completing security processing.</t>

<t>This design is unnecessary because existing header parameters can store this information. If these headers are insufficient, new header parameters can always be defined to convey necessary information. This approach also simplifies libraries, as they do not need to understand payload content to retrieve correct information.</t>

<t>When key identification claims are placed in the payload, they SHOULD also be duplicated in the header, as specified in <xref target="I-D.ietf-cose-cwt-claims-in-headers"/> (for COSE) and <xref section="5.3" sectionFormat="of" target="RFC7519"/> (for JOSE). This approach should only be used as a last resort if the previous methods cannot be implemented.</t>

<t>Finally, transitioning seamlessly from a system using digital signatures over payloads to encrypted payloads is challenging when necessary key lookup information is embedded within the encrypted payload. A redesign is therefore necessary.</t>

</section>
<section anchor="guidance"><name>Guidance</name>

<t>We RECOMMEND that protocol designers and implementers utilize the
available header parameter for key identification. If the standardized
parameters are insufficient, new header parameters can be defined.
Re-using existing header parameters will improve interoperability
because there are a limited number of cases on how to select a key.</t>

<t>Information required to determine the keying material for cryptographically verifying the protected payload MUST be placed in the header of the JOSE/COSE security wrapper.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document does not make requests to IANA.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This specification makes security recommendations for the
JOSE/COSE specification suite. Therefore, it is entirely
about security.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC7515">
  <front>
    <title>JSON Web Signature (JWS)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="J. Bradley" initials="J." surname="Bradley"/>
    <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7515"/>
  <seriesInfo name="DOI" value="10.17487/RFC7515"/>
</reference>

<reference anchor="RFC7516">
  <front>
    <title>JSON Web Encryption (JWE)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="J. Hildebrand" initials="J." surname="Hildebrand"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>JSON Web Encryption (JWE) represents encrypted content using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries defined by that specification. Related digital signature and Message Authentication Code (MAC) capabilities are described in the separate JSON Web Signature (JWS) specification.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7516"/>
  <seriesInfo name="DOI" value="10.17487/RFC7516"/>
</reference>

<reference anchor="RFC9052">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
      <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="96"/>
  <seriesInfo name="RFC" value="9052"/>
  <seriesInfo name="DOI" value="10.17487/RFC9052"/>
</reference>

<reference anchor="RFC8949">
  <front>
    <title>Concise Binary Object Representation (CBOR)</title>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="December" year="2020"/>
    <abstract>
      <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
      <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="94"/>
  <seriesInfo name="RFC" value="8949"/>
  <seriesInfo name="DOI" value="10.17487/RFC8949"/>
</reference>

<reference anchor="RFC9053">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
      <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9053"/>
  <seriesInfo name="DOI" value="10.17487/RFC9053"/>
</reference>

<reference anchor="RFC7519">
  <front>
    <title>JSON Web Token (JWT)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="J. Bradley" initials="J." surname="Bradley"/>
    <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7519"/>
  <seriesInfo name="DOI" value="10.17487/RFC7519"/>
</reference>

<reference anchor="RFC8392">
  <front>
    <title>CBOR Web Token (CWT)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
    <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <date month="May" year="2018"/>
    <abstract>
      <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8392"/>
  <seriesInfo name="DOI" value="10.17487/RFC8392"/>
</reference>


<reference anchor="I-D.ietf-cose-cwt-claims-in-headers">
   <front>
      <title>CBOR Web Token (CWT) Claims in COSE Headers</title>
      <author fullname="Tobias Looker" initials="T." surname="Looker">
         <organization>Mattr</organization>
      </author>
      <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
         <organization>Self-Issued Consulting</organization>
      </author>
      <date day="29" month="November" year="2023"/>
      <abstract>
	 <t>   This document describes how to include CBOR Web Token (CWT) claims in
   the header parameters of any COSE structure.  This functionality
   helps to facilitate applications that wish to make use of CBOR Web
   Token (CWT) claims in encrypted COSE structures and/or COSE
   structures featuring detached signatures, while having some of those
   claims be available before decryption and/or without inspecting the
   detached payload.  Another use case is using CWT claims with payloads
   that are not CWT Claims Sets, including payloads that are not CBOR at
   all.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cwt-claims-in-headers-10"/>
   
</reference>




    </references>



<?line 140?>

<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>TBD: Add your name here.</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA5VZ33fbthV+1zn6H7D0IckmqUm6dLWf5trJ4taJu9g5WZ92
QBKSUIEEC4BWlJz87/vuBUBSkpOueYhpEsD9/d3vwvP5fDoJOhh1Kv7V6Uo2
pRJL68T59c0LIZtK/EQPvzgbbGmNuFBerxrlPH+7rFujatUEvJhOphNZFE7d
nfLmb3ljPnM6qWzZyBpiKieXYR58ubZL1ejV/Dfr1byk/1Zp9dzIoHyYTkr8
XFm3OxVF2ZIE3bpTEVznw7MnT06ePINMp+SpuFFl53TYTSdb6zYrZ7v2lFWf
TjZqh3fVqbgkPRsV5hekAZ3mA6z4rzS2gV47BRtafTqdCOGWpap82Jn8XgjY
P37WTQW7+zfeuuDU0g8vdvX+78Hpclhf2pr8NnzXjdHNSJr6EOZG+zDHQYU1
WDi3f/0bfYIja9m2ulml1bILa+tI7zl9p3+6wYZXC3Hbezl/iTF4JZtG+Xs+
q1pqcyrW/H0xBOmfq/rDAr7L66xbnZIHD0ReLXD0R6O21lb7Eq8g7uhTkibM
On+BHLxawD1/IOnXhbhZq+VSuX05v0pnm8NPWc6OPi4XWoXl/YIoRzrNudFY
V8ug7xQnxNuX58+ePj3Jz/94/vT56Pn7/Hzy5PkzPOtmOdo9nczncyELpIAs
+eyfbq7fiOviN1UGcYN6Qiy5nl40pdu1QcOCR5S8j/mtOP/x+u3BckT9YP15
XO+UCFsrtrpSZic6ryrhU22IrUPeoFRnYrvW5Xo6Wcs7JQqlGlGpO2Vsi9W6
EWGtxOWL25csnddolE5DcqTBqbxjo9pAliLTm3JBVt2utafs7CizRevsHZTw
YjWGlTYDSdUDSRLNRiHrVeMhx/Nq8sG3PRLRGz1CHGGXoxVGF046jaydTi6S
NXENjDYaSEJu6jz5mv2PI79NMoRf285UQhpvBfAECRr2jCm6wK7FNypKnEZ+
qK0jq0r2so1+y1tY3HRiKQ3xtdjx16gkP+/4QNZnkXOk1lVlFP32jaBUdLbq
ynjQn0marYTdTq90DFdydQXYylER8igr2L2yLJX3WLhBGGL2pHy4PgPK9OGb
RbNJhVY6+KMz0kEUdKggN0gjSKYMnUNAxCu7RUTcTOiAU4M2JBdKQgtCYOli
cKFo6XRBp2bt5k5RL6hErYKsZJBs3O+dLjcQ51Rp4YiPqgLU2UruZjGcCF0q
AFnZlraTo0j4smvKmMekgm8lzJSlszD6DtljO4+XqtTLlDBePPJduSZlP31K
hf/5c0xOisd7VXAw2FKWkpd9f7hsiNNjDvh7DYdyysRs5URDunK1f/r0Fxzz
w8nfTz5/nsFPcArljWpKW5F/Ir6wM3TKkxhgWVWOQojYiVJ61N92jQyMatDy
YK1ALAr024U4O04DDs9HkkGKzAtJSdDLpROcgv+R1DNhUCr0FnLJkBxM/TEW
WzbmD5KWkQsZ1Tkc4nD8UjexZKIXCFThzOjc9OK7z58T5qgYcvrKOHAQvq/B
l0johTelJIfVtgJD6LM8kpxW7oyVled6XZLxOCuWFWXrUCLntik1TrmgNL0g
KzQbeCWbVSdXCpZeXFxFTPfKaeTgxxg0pdlyNiRzrxhhFA/DamkbBG2lCEdr
uUFYsaMWMnBPQZ+hY6oB9ogFsa9jbm+RfyRW1dC3op6w80HVOP2iUyl82qFm
a41CToiBPkFm9fidsCPZO4ZHPCeQLQwfV1jk9l5cOFo9DpTKBanJ06Q9MEe0
yMchGcs1IqWalcq9ip2fcvseDRbiugN66ZpUoSrwHjBNy6Ip5IpCBXQN8dUW
g62eWoxe7kbefMjuXBq79X3SjW1HYwdMd4Tzkk41tPIUybrRFRLXdoG4nR9Z
JTKsQSD4qdBEJvusXYiXHeMJfBU1RSXte3yrjelrHT91zO6RiAXk59BBib4d
E2YS96xSgSBBS7S1QC6C6VgGtVIC7HtoERvTrXK1bqyxqx377G2EA6azfa5n
N5FxxL69ePD63c3tg1n8Kd5c8/PbF/9+d/n2xQU937w6u7rqH+KK6QS/Xb+7
Sgvoadh6fv369Ys3F3H367Nf8YP0eXD9y+3l9Zuzqwc5TXj4iH5jfoT8jJjg
WqdCjNpeNQNjBNG9COb0lOAGbflnWHS5Fy7x6RsKdDb5iG7RifsYpZBidsft
z0m9Wgf4eUtdMPp9JhSjGKMVhQAgrMu93gWeAzKxUfe0Wxbz+uzcUz2QcYEE
IbyG+EupW00F8yVtaTJpnfYRYVIyU27Qe8xJNLMwXUHvWAP+qZornXEhMowA
tE89t2uG38EUQNGJuUXCI0h+Qtdc5rUkfIYfgizX6Qz4qPG1DoFFVKpVPHuZ
XcLGdETuSz6rQKGh/XaJiicEJUyIjJDbYeptqZU+yrn+mCBYxu7Hfe9gDbcr
TB99s1OjHqGb0nSVGrr+baRSj356f/s4tS+Qg5PUz7g9jpedD8t++O7kWUo7
cvZRoIkWBLmKSiHeaKF4QHzRSmh8jB/UAesgn8e4PYSjOse4G0Ezc0PMVwxo
PUZmf1KnH4csGkuDaFLSYFZHKwMK5wGIKXdPPemUvSNo189H+MdCgX1A4Szz
HuthMls8WMjH/Wfx/MkJN5h4XiqI0QsCSdjIq89tx7NEPjYys7WmNkZ8Xe6g
BiGjP6rVbeZv0Z3Jfbz4yIEpQ4fEHFrgAV8hXUcDSyIwhVp1TereJOG4Z+y5
nFRLpCSLBvlVZkm16l3XplgSsQCHQ+NXVJzce8gB73z2+0Mg28OhcjlT1mpo
Ioq1dRbVypYeK4Y0NQHj1Wq9x6Ari8A0NqDiqRWRu1Fg99h1J02HpQCFlbEF
Q2LXaJAw8YjHU6ZED8DWMJjRegCAJiIaHqBIL7nWUbDzzKvmAx7V6J1Ey7SP
BDEVOjMER80Uz/CRq+Y04+wG8MwIeHuPg7i7AWs4tvJIZ7aG0pb2XzPry+nT
oyNhIQNWXTAR5kRjOTNRd6A1MLEzzG6+IICD+HLcu4/NTuNdSpXK1lB4npOR
LYAfUpNRsVdyV8Cp/SqiRYx7syS+ITrixoQgTs1GfsCMlvEnsz6C4tbI8v/I
aG4te/mMGoPjIjNSIxqX3ImtRCsl+RVkmwHI+kAtbOh5cArNuyQfMKCNIFLm
Fqkx8T52OIS1B9BFB4LhV/yOSwD+oTyGIXReTSehg0e23xW+nxsisKEg0UM0
JW8YpPVVsWnslgNc3TH3jt1xqZWpfJ9e9xWbDlFl9YGRHamx58fkxfGVSKGW
dI/RQ2BUMH+NvWXkqdR0+6nT807eAH6FHNnMeLQfSRjNJdTfaX4ZYlAhlyLJ
TYoQ0TAqjG8BxuKHmybmSlS9XdMo+kwTch7l1Ae6p8EZR+WFsRioG0hUiJb0
7mHAgH98BvWYvwh/t4SBVPsz0ajtFw6VZit3PvKXOMPC3Ty57cSg4Z48tqRH
UL5/SgNIZHjpTotdypdGleX8aFQ8vWtIyzCaU2PpIhSBrrICdt+RT52jBB7L
jp1O3ZdG6ArgjtF4KtBhxu17PyuTGDmrTVZ3MebD8swQZX+tEr+B4VzOL/gi
Nt78l9swj0LngKHkfLSJgXGl+f8mEbvni++o9kd8aiBwh25Nt3u24eE/4h7f
PhkZ0dQ6uCYCCSaCO74GQlzXtuLAksNpYujvHiOUvYz3a7NIUHkCi0kra4NY
E3d3tibyzcN2unu8h7Bj5HIDhaT7gEhp9ojlMD7yPQwFbsgpCqGxdtO1+6jp
h4l/xAmOjqeLIEyvfUFRX4rF2ItI40//N6JP3/TDJSeSEv1AFlv5PTe9fAk3
vsCNd02MgNOJvJPa8AXCYXV9gVnkah3dO6lqOhkV5Z8p3qFqYepbNY/R+gqM
8AieJuY4TRLEyYJvN6eTDETsy3h9gXrGGAO3Nx2i4ih/4xUdQrUG3tPtgzJU
p5LMZZdfjsKZL97iXU/gOTy2j8OmQw7jGNsVxrp1uq/ep9TjwSwiB3OX4rDk
k+VHjfZwcswD8uXZmzO6C/OIVuSU/vivAyP6t1FsmKLZDIbR9nxU/qvel47b
487pXqxX6/CiY8l0Dok2MmFvv+8QHG7+Mfm5mVIJIedAYXb0903bhV5Cf21f
yHITNT4rqXEbVa2Y/bCiP16cirOqEjvbOf4jlSAB2Pw/X8PdanwdAAA=

-->

</rfc>

