<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.37 (Ruby 3.0.2) -->
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tschofenig-lamps-nonce-for-cmp-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="Nonce-based Freshness in CMP">Nonce-based Freshness for Attestation in Certification Requests for use with the Certification Management Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-tschofenig-lamps-nonce-for-cmp-00"/>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>Siemens</organization>
      <address>
        <email>hannes.tschofenig@siemens.com</email>
      </address>
    </author>
    <author initials="H." surname="Brockhaus" fullname="Hendrik Brockhaus">
      <organization>Siemens</organization>
      <address>
        <email>hendrik.brockhaus@siemens.com</email>
      </address>
    </author>
    <date year="2023" month="July" day="10"/>
    <area>Security</area>
    <workgroup>LAMPS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 54?>

<t>Certificate Management Protocol (CMP) defines protocol messages for
X.509v3 certificate creation and management. CMP provides interactions
between client systems and PKI components, such as a Registration
Authority (RA) and a Certification Authority (CA).</t>
      <t>CMP allows an RA/CA to inform an end entity about the information
it has to provide in a certification request. When an end entity
places attestation information in form of evidence in a certification
signing request (CSR) it may need to demonstrate freshness of the
provided evidence. Attestation technology today often accomplishes
this task via the help of nonces. This document specifies how
nonces are provided by an RA/CA to the end entity for inclusion
in evidence.</t>
    </abstract>
  </front>
  <middle>
    <?line 70?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Certificate Management Protocol (CMP) <xref target="I-D.ietf-lamps-rfc4210bis"/>
defines protocol messages for X.509v3 certificate creation and
management. CMP provides interactions between client systems and
PKI components, such as a Registration Authority (RA) and a
Certification Authority (CA).</t>
      <t>CMP allows an RA/CA to inform an end entity about the information
it has to provide in a certification request. When an end entity
places attestation information in form of evidence in a
certification signing request (CSR) it may need to demonstrate
freshness of the provided evidence. Such an attestation extension
to a CSR is described in <xref target="I-D.ounsworth-csr-attestation"/>.
Attestation technology today, such as <xref target="TPM20"/> and
<xref target="I-D.tschofenig-rats-psa-token"/>, often accomplishes this task
via the help of nonces. A discussion of freshness approaches
for evidence is found in Section 10 of <xref target="RFC9334"/>.</t>
      <t>For an end entity to include a nonce in the evidence (by the
attester) it is necessary to obtain this nonce from the relying
party, i.e. RA/CA in our use case, first. Since the CSR itself is
a 'one-shot' message the CMP protocol is used to obtain the nonce
from the RA/CA. CMP already offers a mechanism to request
information from the RA/CA prior to a certification request.
This document uses the CertReqTemplate described in
Section 5.3.19.16 of <xref target="I-D.ietf-lamps-rfc4210bis"/>. Once the nonce
is obtained the end entity can issue an API call to the attester
to request evidence and passes the nonce as an input parameter
into the API call. The returned evidence is then embedded into
a CSR and returned to the RA/CA in a certification request message.</t>
      <t>This exchange is shown graphically below.</t>
      <artwork><![CDATA[
 End entity                                          RA/CA
 ==========                                      =============

               -->>-- CertReqTemplate request -->>--
                                                Verify request
                                                Generate nonce
                                                Create response
               --<<-- CertReqTemplate response --<<--
                      (nonce)
 Generate key pair
 Fetch Evidence (with nonce) from attester
 Evidence Response from attestation
 Creation of certification request
 Protect request
               -->>-- certification request -->>--
                      (evidence including nonce)
                                                Verify request
                                                Verify evidence
                                                Create response
               --<<-- certification response --<<--
 Handle response
]]></artwork>
    </section>
    <section anchor="terminology-and-requirements-language">
      <name>Terminology and Requirements Language</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 <xref target="RFC2119"/>.</t>
      <t>The terms attester, relying party, verifier and evidence are defined
in <xref target="RFC9334"/>.</t>
      <t>We use the terms certification signing request (CSR) and certification
request interchangeably.</t>
    </section>
    <section anchor="certificate-request-template-extension">
      <name>Certificate Request Template Extension</name>
      <t>The following structure defines the attestation nonce provided by the
CA/RA via a CertReqTemplate response message. This leads to an extra
roundtrip to convey the nonce to the end entity (and ultimately to
the attester functionality inside the device).</t>
      <artwork><![CDATA[
   id-ce-attestionNonce OBJECT IDENTIFIER ::=  { id-ce TBD }

   AttestationNonce ::= OCTET STRING
]]></artwork>
      <t>The end entity MUST construct a CertReqTemplate request message to trigger
the RA/CA to transmit a nonce.</t>
      <t>When the RA/CA receive the CertReqTemplate
request message the profile information is used to determine that the
end entity supports attestation functionality. If the end-entity supports
attestation and the policy requires attestation information in a CSR to be
provided, the RA/CA issues a CertReqTemplate response containing a nonce in
in the template. The AttestationNonce MUST contain a random value that
depends on the used attestation technology. For example, the PSA attestation
token <xref target="I-D.tschofenig-rats-psa-token"/> supports nonces of length 32, 48
and 64 bytes. Other attestation technologies use nonces of similar length.
The assumption in this specification is that the RA/CA have out-of-band
knowledge about the required nonce length required for the technology used
by the end entity.</t>
      <t>When the end entity receives the CertReqTemplate response it MUST use this
nonce as input to the API call made to the attester functionality on the
device. While the semantic of the API call and the software/hardware
architecture is out-of-scope of this specification, it will return
evidence from the attester in a format specific to the attestation technology
utilized. The encoding of the returned evidence varies but will be placed
inside the CSR, as specified in <xref target="I-D.ounsworth-csr-attestation"/>. The
software creating the CSR will not have to interpret the evidence format
- it is treated as an opaque blob. It is important to note that the
nonce is carried either implictily or explicitly in the evidence and
it MUST NOT be conveyed in elements of the CSR.</t>
      <t>The processing of the CSR containing attestation information is described
in <xref target="I-D.ounsworth-csr-attestation"/>. Note that the CA MUST NOT issue
a certificate that contains the extension provided in the CertReqTemplate
containing the nonce. The nonce MUST only be used for determining freshness
of the evidence provided by the attester. The nonce is not included in an
X.509 certificate.</t>
      <t>[Editor's Note: It may be useful to augment the CertReqTemplate request
with information about the type of attestation technology/technologies
available on the end entity. This is a topic for further discussion.]</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This specification adds a nonce to the Certificate Request Template
for use with attestation information in a CSR. This specification
assumes that the nonce does not require confidentiality protection
without impacting the security property of the attestation protocol.
<xref target="RFC9334"/> defining the IETF remote attestation architecture
discusses this and other aspects in more detail.</t>
      <t>For the use of attestation in the CSR the security considerations of
<xref target="I-D.ounsworth-csr-attestation"/> are relevant to this document.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Add your name here.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="I-D.ounsworth-csr-attestation">
          <front>
            <title>Use of Attestation with Certification Signing Requests</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Siemens</organization>
            </author>
            <date day="8" month="July" year="2023"/>
            <abstract>
              <t>   Utilizing information from a device or hardware security module about
   its posture can help to improve security of the overall system.
   Information about the manufacturer of the hardware, the version of
   the firmware running on this hardware and potentially about the
   layers of software above the firmware, the presence of hardware
   security functionality to protect keys and many more properties can
   be made available to remote parties in a cryptographically secured
   way.  This functionality is accomplished with attestation technology.

   This document describes extensions to encode evidence produced by an
   attester for inclusion in PKCS10 certificate signing requests.  More
   specifically, two new ASN.1 Attribute definitions, and an ASN.1 CLASS
   definition to convey attestation information to a Registration
   Authority or to a Certification Authority are described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ounsworth-csr-attestation-00"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-rfc4210bis">
          <front>
            <title>Internet X.509 Public Key Infrastructure -- Certificate Management Protocol (CMP)</title>
            <author fullname="Hendrik Brockhaus" initials="H." surname="Brockhaus">
              <organization>Siemens</organization>
            </author>
            <author fullname="David von Oheimb" initials="D." surname="von Oheimb">
              <organization>Siemens</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust</organization>
            </author>
            <date day="19" month="June" year="2023"/>
            <abstract>
              <t>   This document describes the Internet X.509 Public Key Infrastructure
   (PKI) Certificate Management Protocol (CMP).  Protocol messages are
   defined for X.509v3 certificate creation and management.  CMP
   provides interactions between client systems and PKI components such
   as a Registration Authority (RA) and a Certification Authority (CA).

   This document obsoletes RFC 4210 by including the updates specified
   by CMP Updates [RFCAAAA] Section 2 and Appendix A.2 maintaining
   backward compatibility with CMP version 2 wherever possible and
   obsoletes both documents.  Updates to CMP version 2 are: improving
   crypto agility, extending the polling mechanism, adding new general
   message types, and adding extended key usages to identify special CMP
   server authorizations.  Introducing version 3 to be used only for
   changes to the ASN.1 syntax, which are: support of EnvelopedData
   instead of EncryptedValue and hashAlg for indicating a hash
   AlgorithmIdentifier in certConf messages.

   In addition to the changes specified in CMP Updates [RFCAAAA] this
   document adds support for management of KEM certificates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc4210bis-07"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.tschofenig-rats-psa-token">
          <front>
            <title>Arm's Platform Security Architecture (PSA) Attestation Token</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Simon Frost" initials="S." surname="Frost">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Mathias Brossard" initials="M." surname="Brossard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Adrian L. Shaw" initials="A. L." surname="Shaw">
              <organization>HP Labs</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Arm Limited</organization>
            </author>
            <date day="5" month="July" year="2023"/>
            <abstract>
              <t>   The Platform Security Architecture (PSA) is a family of hardware and
   firmware security specifications, as well as open-source reference
   implementations, to help device makers and chip manufacturers build
   best-practice security into products.  Devices that are PSA compliant
   are able to produce attestation tokens as described in this memo,
   which are the basis for a number of different protocols, including
   secure provisioning and network access control.  This document
   specifies the PSA attestation token structure and semantics.

   The PSA attestation token is a profiled Entity Attestation Token
   (EAT).

   This specification describes what claims are used in an attestation
   token generated by PSA compliant systems, how these claims get
   serialized to the wire, and how they are cryptographically protected.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tschofenig-rats-psa-token-12"/>
        </reference>
        <reference anchor="TPM20" target="https://trustedcomputinggroup.org/resource/tpm-library-specification/">
          <front>
            <title>Trusted Platform Module Library Specification, Family 2.0, Level 00, Revision 01.59</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2019" month="November"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA91ZbW/juBH+zl9BbD/sbhs5Tnbv0Bh3h3rzcpc2b3V8vRZF
UdASbRORRJWknHOD7G/vMyQlS46TzaLolxpYrCORw3l55pkZOkkS5pTL5Yhf
6TKVyUxYmfEzI+2ylNbyuTZ87Jy0TjilS65KfiyNU3OVhgcT+a8ab8PK2kp+
r9ySu6XcWncpSrGQhSwdvzHa6VTnjInZzMjVc2fTWZc3LNNpKQpomBkxd4mz
6VLPZakWSS6Kyial34zjk7SokuGQ4US50GY94tZljKnKjLgztXWHw+HR8JAJ
I8WI38q0Nsqt2b02dwuj62rEL8aXN7fsTq7xLBvx89JJU0qXnNDJjMEJZfZP
kesS2qylZZUaMc7NPJWZdes8PuUc5nW+qjKD2c0Dq40zcm7bv9dF709nVNou
TnVBLmvfqjJX5eYY+atLcmVdAiEznWNZon/7O7yBzwpRVapchLWidkttoGyC
l/RRJRb/NODT1pvxRXD1T6JECJ6+lYVQ+Ygv/evBJhR/sIpiawdQOC7VBmff
hsfs6cGfjE7vlqK2/XNlmRl19+Rtc254PZg1r794Liu1KYDAlaRITc6ODw8O
jujreXIy0HVpEWm3TFJrErGBebNASTePKEOQPx4eDGfK0kumyvmW4KMPHz42
+zoYNcLZpLIicfpOesHTm8vD4Sho28aFd5SfElaRCce6qGqHGPIfCZ5hUczW
Zs1NLhxpwi91VueSX6iZEWbNbyuZtsm3x89EofI1PxwM9/iFXMmcD/FtIlfK
UnIODwbfHEX5wiwk8Ld0rrKj/X0XDkobXXymDKDnPvJU1yaV+64qgEJ/bmK7
5+4HkRnykXJ8JYuZNPxweHDEWJIkXMyAdpEiszZcIXcxBX8HInjPMzlXBMuq
eVyAJrDWkw/76+Cb4dHqA087slKkuqcfJC4vWsEDIhYSs1KZJKJBnkMPLLRs
Jt29lCVPc0Uq2DXML6wXcPOnc8rICvmPnNzjtk6XXOAdPLlQZAuJYGMfVFAL
fzcZv/c7xRYbdpYcj98P4ADoI/Jc39NJfDLePx6DOniAGT0C8vHP0RYx07Xz
FNuiEKcqh7S0tCnaRfwpOt6gc01g6wH/BanUF8uqXKRwhuixfSufpHld9JxL
Eg/S3XECs2pREmTjSbDvdvKeQ7lCrHkpAVlomMkCriZ/ST5v+R6SYRSL6mft
MYNeBXIyXZY614s1JGUQqueObEkpMiDDJejOLRU8IewdXynhPbWUeUUH+GJh
wXu0AixZe5xF1ML6pb5nYQ1HmeCtLrN1Ly4kshMRqn2qTPPa+kiUG9UD0AuV
Zblk7DecaopBqnqwvRb3Dw/PktHjI3sxK/iXsoK9Kiv481nBXpcVfFdWsP/b
rGD9E742K9h2VvAdWXHrHV32dENHgLpHlkMgWOd2wgno0qZGzbAbugU0PVv7
Hh8H7KV82wT44cGXssdHD4Mg9tnK9/i4tyNTeZup7LlMHfNM2bS2vlDh+cYz
aHCMFiklPCF9439Cfl16Y9HleSsOhrT34SEWajKSnWFTH0MeW0hjwEQEBUiG
T/ZG+DswAbFU8Jg0Poo4sZQppZ3xQvTMCb+RXngxc6MLL8jIfA0ksEoYB1+q
AQIZgI0NqKe+h07RCe/xuTIEyltFAnxHTdF0VuZznMgEf4uUS+xSu7dNzodl
IYsDGUCD2gZ8tVrJoBRrlfIKhPQXOcghI1adS0NJXCD+olS2IBERv6ybAn0p
OFnBrx59u7OM9bkX2tl2XsA0MZUAB7FUF7SsieM3gw+Dg6PBwbchnC/w4oBf
N34L1uLQ4AHyRp+/U8BAWVtLwsP4BnwG1ml4vok029i/gQPRWCVsY0MItvB0
pUp0THhp0NnSdvBpENgcQFWIAOFqU3YSm0LmiIioXcoyb7/TLCQzndfuiPJa
+Dzj8QYcgLx3vfyVIrrwBwE99yVfGFEtFem0BtODb7H08+fPjJ9ufPTqj1eH
8e/bz+u2fd/9MLb1Nkl++AGFdBsjjYXh9famL37+Io2ar1tUf+32H2UpfQ8T
APa124+pDJMNFrXTPtmfJN99t9PksDy+f+bUd16l92yjI6ZagFEZxs+kA4Gf
tozmJ/awPiRzi/jNoklzamdBqLDBjEjOO/HHfD+DBH7O0TG4u8H7YmjfdYou
8TbV2Mbyr/z8l1iI2xt9/kdg2HbRFhQwtqPP3AihHEbTOZWmULGGE4HQnY0y
vuez/AJUUIMdiBwCSujyw/I3lz/fTt/shf/51bX/Pjn988/nk9MT+n770/ji
ov0SVjD8cf3zRXxP3zY7j68vL0+vTsLmy/Hf8B8p8+b6Znp+fTW+eMNjyWRt
baAWHCQ3k6EZrcB8oD2x1dCgpnMa60N5p2++vJM52FTYFs97TfXlsfquKGhK
Gq/IhtONjKNmxny/1G0afpG+QrtW+GsaPRLfH5Oa996uQMdilq8HFK7uUBCv
13ib/qdtg+cNnGtqj+lENI6YKupWd9spXkG3UJy6Iw01Msfj/cnYz0niea5p
KkiYm3J0CL6nFr7hNIIZ6recURU9TXW5kutOPXw6ML0jj9S5U+ghEBKsYN1S
y+d16eu9yGm1gsFZ8HmGKCG7m/rEucqSVMb+FRv8TSK//vTH0+MpPz85vZqe
n52fTvhohDL0EFbz6acT/uhLTKfRDTtp3fXx9HTKb6eT86sfQwpN+9r7jEh9
rw6X7/Rbr/B6Bxi1WFAT0RZs/1CUtlCu6TYJX1T5N4sM2kq1krsaJPbklDAm
zFUu+zPKpgXMqBMBF9Bi4acl1rHL1lWFkaA/7fRCMeDn8yaWydYu1t1F8fX6
6FylgVXBOC/OUaHB8ene3gHsdRscatDsSyhFSKi/o2zYtO8strwuLg9d15PA
NzH1LbLgCEyGQrcSeR18hTG7gtHoIYM471Gxc04acJos5K9oSXMZLLi5HfeK
ph+J+BdHpk1E4p0ESmwuywXq9YfDPf7x94z8/O1H5LKjWekaZ5ndWtHlBhHX
RpBVhcqFiQIHHuToZOuiaiLi55fejV7oTQNyYliWAvDE6J3oeTKjQfCu1Pe5
zADIzUge45/FqEQb2qc0voUYtbMm+ZcFiuqkXjdBOsCNWbJ7jmjhgTzzUQ78
jTrTduuhVd9qzzGbZ3J7CNhipgAGFliJ7g8o92i9lYWAbmkzvrdCm8SwGIbv
UWn2l8Jk9IUJ1AFFbRJxOA0rwac21ZUMYrajsUcm3StIDSMBa0tYO5O1entU
h3xrhfSN24Yxq53K1b9lFjIGcrXvr6JFT+eWlTCEslkdlULZ9rcnVEVbAkeO
75HLmyu3V15JkAqs8Vm8wIIuzVTszyu1C2j0Y3zsF/rTe3AAS+LQ7nzTlcWB
TVcChMpnuZ6B5/wCVVD6IZIkE/I7vBn5BQ2AMIbskMpnn6K7DUAEVc2zAP2l
XL5+cpNAudJAEk0SuStUzuATmccGLfobZsamBuRIdw2dWJALuuT3HMl2Gif2
OrdfdW3mSPdWXU/HTPQuFv3CqEhIxvY+atN3RD9sV7OO/m3nEJBXbghal35C
DexLrNEUNNrW3gyx6JbW1Vs9T5sVXfn+qsY19z9eTVGGHxW6NiIGfz/NlNPm
rfXeGRFU6BovqDWv/cWBqBe+g91NSGHE8HNXNz4bvnTrkPO7M3O/y+pMrAR4
fAbi0dvEGPs1RVXT6QoZTz6b18YjdXOvNvhHuJseX435sfbJGm5tLRD36cR3
pe0Ppk9XPC0TIstsW4Mjy7zU1rLer8dfahKiWb0jmS9dslOewuGZliGwsdgQ
POcEC6cChVdhNiURdDhFAClM994RibaxGysr2LBusq6rZnPfNmCdcSF04o2c
89PpGbQoKKN6rVKH91mMSXMzStVCh6JO1jr/o3ihfZOPbMnjLWZsSLYR02Qa
tVVdQ9JeALGLfZEJ/FCE6UmuIhm67iVeAMg4bUq/Jy7GxlnG13SnST/uclhB
2fMfAd/cInMgAAA=

-->

</rfc>
