<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.0.2) -->
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tschofenig-lamps-nonce-for-cmp-01" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.5 -->
  <front>
    <title abbrev="Nonce-based Freshness in CMP">Nonce-based Freshness for Attestation in Certification Requests for use with the Certification Management Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-tschofenig-lamps-nonce-for-cmp-01"/>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>Siemens</organization>
      <address>
        <email>hannes.tschofenig@siemens.com</email>
      </address>
    </author>
    <author initials="H." surname="Brockhaus" fullname="Hendrik Brockhaus">
      <organization>Siemens</organization>
      <address>
        <email>hendrik.brockhaus@siemens.com</email>
      </address>
    </author>
    <date year="2023" month="August" day="01"/>
    <area>Security</area>
    <workgroup>LAMPS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 54?>

<t>Certificate Management Protocol (CMP) defines protocol messages for
X.509v3 certificate creation and management. CMP provides interactions
between client systems and PKI components, such as a Registration
Authority (RA) and a Certification Authority (CA).</t>
      <t>CMP allows an RA/CA to inform an end entity about the information
it has to provide in a certification request. When an end entity
places attestation information in form of evidence in a certification
signing request (CSR) it may need to demonstrate freshness of the
provided evidence. Attestation technology today often accomplishes
this task via the help of nonces. This document specifies how
nonces are provided by an RA/CA to the end entity for inclusion
in evidence.</t>
    </abstract>
  </front>
  <middle>
    <?line 70?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Certificate Management Protocol (CMP) <xref target="I-D.ietf-lamps-rfc4210bis"/>
defines protocol messages for X.509v3 certificate creation and
management. CMP provides interactions between client systems and
PKI components, such as a Registration Authority (RA) and a
Certification Authority (CA).</t>
      <t>CMP allows an RA/CA to inform an end entity about the information
it has to provide in a certification request. When an end entity
places attestation information in form of evidence in a
certification signing request (CSR) it may need to demonstrate
freshness of the provided evidence. Such an attestation extension
to a CSR is described in <xref target="I-D.ounsworth-csr-attestation"/>.
Attestation technology today, such as <xref target="TPM20"/> and
<xref target="I-D.tschofenig-rats-psa-token"/>, often accomplishes this task
via the help of nonces. A discussion of freshness approaches
for evidence is found in Section 10 of <xref target="RFC9334"/>.</t>
      <t>For an end entity to include a nonce in the evidence (by the
attester) it is necessary to obtain this nonce from the relying
party, i.e. RA/CA in our use case, first. Since the CSR itself is
a 'one-shot' message the CMP protocol is used to obtain the nonce
from the RA/CA. CMP already offers a mechanism to request
information from the RA/CA prior to a certification request.
This document uses the CertReqTemplate described in
Section 5.3.19.16 of <xref target="I-D.ietf-lamps-rfc4210bis"/>. Once the nonce
is obtained the end entity can issue an API call to the attester
to request evidence and passes the nonce as an input parameter
into the API call. The returned evidence is then embedded into
a CSR and returned to the RA/CA in a certification request message.</t>
      <t>This exchange is shown graphically below.</t>
      <artwork><![CDATA[
End entity                                          RA/CA
==========                                      =============

              -->>-- CertReqTemplate request -->>--
                                               Verify request
                                               Generate nonce*
                                               Create response
              --<<-- CertReqTemplate response --<<--
                     (nonce)
Generate key pair
Fetch Evidence (with nonce) from attester
Evidence Response from attestation
Creation of certification request
Protect request
              -->>-- certification request -->>--
                     (evidence including nonce)
                                               Verify request
                                               Verify evidence*
                                               Check replay*
                                               Issue certificate
                                               Create response
              --<<-- certification response --<<--
Handle response
Store certificate

*: These steps require interactions with a verifier.
]]></artwork>
    </section>
    <section anchor="terminology-and-requirements-language">
      <name>Terminology and Requirements Language</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 <xref target="RFC2119"/>.</t>
      <t>The terms attester, relying party, verifier and evidence are defined
in <xref target="RFC9334"/>.</t>
      <t>We use the terms certification signing request (CSR) and certification
request interchangeably.</t>
    </section>
    <section anchor="certificate-request-template-extension">
      <name>Certificate Request Template Extension</name>
      <t>The following structure defines the attestation nonce provided by the
CA/RA via a CertReqTemplate response message. This leads to an extra
roundtrip to convey the nonce to the end entity (and ultimately to
the attester functionality inside the device).</t>
      <artwork><![CDATA[
   id-pe-attestionNonce OBJECT IDENTIFIER ::=  { id-pe TBD1 }

   AttestationNonce ::= OCTET STRING
]]></artwork>
      <t>The end entity MUST construct a CertReqTemplate request message to trigger
the RA/CA to transmit a nonce.</t>
      <t>When the RA/CA receive the CertReqTemplate
request message the profile information is used to determine that the
end entity supports attestation functionality. If the end-entity supports
attestation and the policy requires attestation information in a CSR to be
provided, the RA/CA issues a CertReqTemplate response containing a nonce in
in the template. The AttestationNonce MUST contain a random value that
depends on the used attestation technology. For example, the PSA attestation
token <xref target="I-D.tschofenig-rats-psa-token"/> supports nonces of length 32, 48
and 64 bytes. Other attestation technologies use nonces of similar length.
The assumption in this specification is that the RA/CA have out-of-band
knowledge about the required nonce length required for the technology used
by the end entity.</t>
      <t>When the end entity receives the CertReqTemplate response it SHOULD use this
nonce as input to an attestation API call made to the attester functionality
on the device. The rational behind this design is that the client may support
an attestation technology but configuration or policies make it
unavailable. Hence, it is better for an RA/CA to be aggressive in sending
a nonce, at least where there is a reasonable chance the client supports
attestation functionality and the client should be allowed to ignore the nonce
if it either does not support it or cannot use it for policy reasons.</t>
      <t>While the semantic of the attestation API and the software/hardware
architecture is out-of-scope of this specification, the API will return
evidence from the attester in a format specific to the attestation technology
utilized. The encoding of the returned evidence varies but will be placed
inside the CSR, as specified in <xref target="I-D.ounsworth-csr-attestation"/>. The
software creating the CSR will not have to interpret the evidence format
- it is treated as an opaque blob. It is important to note that the
nonce is carried either implictily or explicitly in the evidence and
it MUST NOT be conveyed in elements of the CSR.</t>
      <t>The processing of the CSR containing attestation information is described
in <xref target="I-D.ounsworth-csr-attestation"/>. Note that the CA MUST NOT issue
a certificate that contains the extension provided in the CertReqTemplate
containing the nonce. Instead the nonce is typically embedded in the
evidence and used as a way to provide freshness of the evidence signed
by the attester.</t>
      <t>[Editor's Note: It may be useful to augment the CertReqTemplate request
with information about the type of attestation technology/technologies
available on the end entity. This is a topic for further discussion.]</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>[Editor's Note: The ASN.1 module OID (TBD2) and the new private
extension (TBD1) must be registered.]</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This specification adds a nonce to the Certificate Request Template
for use with attestation information in a CSR. This specification
assumes that the nonce does not require confidentiality protection
without impacting the security property of the attestation protocol.
<xref target="RFC9334"/> defining the IETF remote attestation architecture
discusses this and other aspects in more detail.</t>
      <t>For the use of attestation in the CSR the security considerations of
<xref target="I-D.ounsworth-csr-attestation"/> are relevant to this document.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank Russ Housley and Carl Wallace for their review comments.</t>
    </section>
    <section anchor="asn.1">
      <name>Compilable ASN.1 Definitions</name>
      <t>PKIX-CMP-KeyAttestationNonceExtn-2023
  { iso(1) identified-organization(3) dod(6)
    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-cmpKeyAttestationNonce(TBD2) }</t>
      <t>DEFINITIONS IMPLICIT TAGS ::=
BEGIN</t>
      <t>IMPORTS</t>
      <t>id-pe
  FROM PKIX1Explicit-2009 -- from [RFC5912]
    { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-pkix1-explicit-02(51) }
  ;</t>
      <t>id-pe-attestionNonce OBJECT IDENTIFIER ::=  { id-pe TBD1 }</t>
      <t>AttestationNonce ::= OCTET STRING</t>
      <t>END</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="I-D.ounsworth-csr-attestation">
          <front>
            <title>Use of Attestation with Certification Signing Requests</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Siemens</organization>
            </author>
            <date day="8" month="July" year="2023"/>
            <abstract>
              <t>   Utilizing information from a device or hardware security module about
   its posture can help to improve security of the overall system.
   Information about the manufacturer of the hardware, the version of
   the firmware running on this hardware and potentially about the
   layers of software above the firmware, the presence of hardware
   security functionality to protect keys and many more properties can
   be made available to remote parties in a cryptographically secured
   way.  This functionality is accomplished with attestation technology.

   This document describes extensions to encode evidence produced by an
   attester for inclusion in PKCS10 certificate signing requests.  More
   specifically, two new ASN.1 Attribute definitions, and an ASN.1 CLASS
   definition to convey attestation information to a Registration
   Authority or to a Certification Authority are described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ounsworth-csr-attestation-00"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-rfc4210bis">
          <front>
            <title>Internet X.509 Public Key Infrastructure -- Certificate Management Protocol (CMP)</title>
            <author fullname="Hendrik Brockhaus" initials="H." surname="Brockhaus">
              <organization>Siemens</organization>
            </author>
            <author fullname="David von Oheimb" initials="D." surname="von Oheimb">
              <organization>Siemens</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust</organization>
            </author>
            <date day="19" month="June" year="2023"/>
            <abstract>
              <t>   This document describes the Internet X.509 Public Key Infrastructure
   (PKI) Certificate Management Protocol (CMP).  Protocol messages are
   defined for X.509v3 certificate creation and management.  CMP
   provides interactions between client systems and PKI components such
   as a Registration Authority (RA) and a Certification Authority (CA).

   This document obsoletes RFC 4210 by including the updates specified
   by CMP Updates [RFCAAAA] Section 2 and Appendix A.2 maintaining
   backward compatibility with CMP version 2 wherever possible and
   obsoletes both documents.  Updates to CMP version 2 are: improving
   crypto agility, extending the polling mechanism, adding new general
   message types, and adding extended key usages to identify special CMP
   server authorizations.  Introducing version 3 to be used only for
   changes to the ASN.1 syntax, which are: support of EnvelopedData
   instead of EncryptedValue and hashAlg for indicating a hash
   AlgorithmIdentifier in certConf messages.

   In addition to the changes specified in CMP Updates [RFCAAAA] this
   document adds support for management of KEM certificates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc4210bis-07"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.tschofenig-rats-psa-token">
          <front>
            <title>Arm's Platform Security Architecture (PSA) Attestation Token</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Simon Frost" initials="S." surname="Frost">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Mathias Brossard" initials="M." surname="Brossard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Adrian L. Shaw" initials="A. L." surname="Shaw">
              <organization>HP Labs</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Arm Limited</organization>
            </author>
            <date day="5" month="July" year="2023"/>
            <abstract>
              <t>   The Platform Security Architecture (PSA) is a family of hardware and
   firmware security specifications, as well as open-source reference
   implementations, to help device makers and chip manufacturers build
   best-practice security into products.  Devices that are PSA compliant
   are able to produce attestation tokens as described in this memo,
   which are the basis for a number of different protocols, including
   secure provisioning and network access control.  This document
   specifies the PSA attestation token structure and semantics.

   The PSA attestation token is a profiled Entity Attestation Token
   (EAT).

   This specification describes what claims are used in an attestation
   token generated by PSA compliant systems, how these claims get
   serialized to the wire, and how they are cryptographically protected.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tschofenig-rats-psa-token-12"/>
        </reference>
        <reference anchor="TPM20" target="https://trustedcomputinggroup.org/resource/tpm-library-specification/">
          <front>
            <title>Trusted Platform Module Library Specification, Family 2.0, Level 00, Revision 01.59</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2019" month="November"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA91aa28bxxX9Pr9i4HyIlGopUbbTSk2CMhJls9GrJNOkCIJi
uDskB9pXZ2YpM4Ly23vuzOxyl6JsGUG/VIBhance93HuuQ8xiiJmlU3lKb8u
8lhGM2Fkwi+0NMtcGsPnheYDa6Wxwqoi5yrnZ1JbNVexfzCW/6nw1q+sjOT3
yi65XcqtdVciFwuZydzyW13YIi5SxsRspuXqubvprqtblhRxLjJImGgxt5E1
8bKYy1wtolRkpYlytxnXR3FWRkd9hhvlotDrU25swpgq9Sm3ujL2+Ojo5OiY
CS3FKZ/IuNLKrtl9oe8WuqjKU345uLqdsDu5xrPklI9yK3UubXRONzMGI+TJ
v0Va5JBmLQ0r1SnjXM9jmRi7TsNTzqFe66PKE6hdPzCFtlrOTfP7Ouv8arWK
m8VxkZHJmrcqT1W+uUZ+sFGqjI1wyKxIsSwqvvoT3sBmmShLlS/8WlHZZaEh
bISX9KNyLH7f49PGmuGFN/V7kcMFT9/KTKj0lC/d697GFX8zinxrehA4LC00
7p74x+zpxd/rIr5bisp075V5otXdk7f1vf51b1a//uS9LC90BgSuJHlqfHF2
3O+f0MdRdN4rqtzA03YZxUZHYgPzeoGSdh5QBie/Oe4fzZShl0zl862DT16/
flPva2FUC2ui0ojIFnfSHTy9vTo+OvXSNn7hLeGnhFVEwlmRlZWFD/k7gqdf
FKK1XnObCkuS8KsiqVLJL9VMC73mk1LGTfAd8AuRqXTNj3tHB/xSrmTKj/Bp
LFfKUHAe9XtvT8L5Qi8k8Le0tjSnh4fWXxTXsrhI6UHOQ8RpUelYHtoyAwrd
vZFp33voj0wQjxTjK5nNpObHR/0TxqIo4mIGtIsYkbXhCrmLKfgeiGCfJ3Ku
CJZl/TgDTWCtIx/2c+/t0cnqNY9bZ8UIdUc/CFyeNQf3iFjomJVKJBEN4hxy
YKFhM2nvpcx5nCoSwayhfmbcAbc/jCgiS8Q/YvKAmypecoF3sORCkS50BBs4
p4Ja+N54sO92ii02bC05G+z3YADII9K0uKeb+HhweDYAdXAPM3oE5OOfpS1i
VlTWUWyDQtyqLMLS0KagF/GnaFmD7tWerXv8J4RS91hWpiKGMUSH7Zvz6TQn
SzHnko4H6e64gRm1yAmy4SboNxnvcwiXiTXPJSALCROZwdRkL8nnDd/jZCjF
gvhJc02vk4GsjJd5kRaLNU5KcGgxt6RLTJ4BGS5Bd3apYAlh7vhKCWeppUxL
usAlCwPeoxVgycrhLKAW2i+Le+bXcKQJ3sgyW3f8Qke2PEK5T+VxWhnniXwj
ugd6ppIklYx9wSmnaISqA9tLcf/w8CwZPT6yj0YF/1RUsBdFBX8+KtjLooLv
igr2fxsVrHvD50YF244KviMqJs7QeUc2VATIe6Q5DgTrTMacgC5NrNUMuyGb
R9Ozue/xscc+Fm8bBz88uFT2+Ohg4I99NvM9Ph7siFTeRCp7LlIHPFEmroxL
VHi+sQwKHF2ImAKekL6xPyG/yp2yqPKcFv0j2vvwEBI1KckusKmLIYcthDFg
IrwAdIYL9vrwPTABsZS3mNTOi7gxlzGFnXaHFDMr3EZ64Y6Z6yJzB2mZroEE
VgptYUvVgyM9sLEB+dTV0DEq4QM+V5pAOVF0gKuoyZvWyHSOG5ngXyLkIrMs
7Jd1zPtlPoo9GUCCynh8NVJJLxRrhHIC+PAXKcghIVadS01BnMH/IlcmoyMC
flk7BLqn4GYFuzr07Y4y1uVeSGeafgHdxFQCHMRSbdCy2o9ve697/ZNe/2vv
zo/wYo/f1Hbz2uJSbwGyRpe/Y8BAGVNJwsPgFnwG1ql5vvY02+i/gQPRWClM
rYN3tnB0pXJUTHipUdnSdvCpP7C+gLIQAcJWOm8FNrnMEhFRuZQkTn9bMB/M
dF+zI5zXwOcZi9fgAOSd6eUH8ujCXQT03Od8oUW5VCTTGkwPvsXS33//nQ03
Jnrxj5OGfdv8vGzXt+0fxrovo+i775BFtwFSq+dfs90HP/vzT6nVfN0g+jN3
v5O5dOWL8/hXn7v9jDIwaWCQNo18ou833+zU168O73ffuecE2meNgOhmAUKl
2YW04O1hQ2SuUferfQw3QG/WjOsbW+99Xj2rSwiE4U7QMaphELTPGDi4dDde
P+bQvVaaJaamrBpU/kwf/DEAhN21NJ+PgKWM73A5XLv+7M0jx1Wtku5/gr9t
53TR9x5UlLaOmNhCd2ViX50Sw2ELUFUaZ2mlZbewdCgUfEXmVFL3HO+gUJ5K
nalQdxDpjf1mNw3hl6CvCoxGhOYRTgMbw19d/TiZvjrw//PrG/d5PPzHj6Px
8Jw+T94PLi+bD34Fwy83P16G9/Rps/Ps5upqeH3uN18N/oX/SJhXN7fT0c31
4PIVD2meNfmM2gYQ8yzoWYKtQdViqwhDHcJpFOFLEvrkShJSB5sy0wTjQV0x
8FAx1JZygmzykJahPU6Yq/Hahc5P0lUVtjn8JcUpHd9t7er3Ti+fQsQsXffI
Xe1GJowEeUNcw6YodQrOCyrp6UYUu+iEqkZ200q4XjafUNttGBVfZ4PD8cD1
duJ5lqyznu/1UlQ1rg8QrkjWgmmqEa1WJT2Ni3wl160c/rTJ2yOLVKlVqHvg
Eqxg7fKAz6vcYVqktFpB4cTbPIGXwE8hpyK+VBKVMtTc2OCmn/zm+78Pz6Z8
dD68no4uRsMxPz1F8nzwq/n0+/M+f3SZsVWd+6208OZsOpzyyXQ8un7nY2ja
Fd+FROwaDNh8p+E61YKzgFaLBVU+TZXhHorcZMrWJTIBjMqVzSKNWlit5K6q
jj25xfc2c5XKbmO1qVsTKp9ABrRYuBaPtfQyVVmij+m2aB1f9PhoXjsz2trF
2rvIwU6eIlXxuuarjzZ/vipz8d4MLg7aVRkxtfkYTOESKkopHDY9Bwt1ug3L
fan4xPG1T11dLzgckyBPr0RaeVuxRJZQGoWvP85ZVOxs7nqc2iH5AXV0Kr0G
t5NBJ+e7Po5/ss/beCQMUlAipDJfgOdfHx/wN39hZOev3yCYLTV4N7hL75aK
JjLEXJuDjMpUKnQ4sOdAjvK7ysraI67p6owhfUHtkRPcshSAZ1HZqJhHM+pe
7/LiPpUJALmZIwT/J8ErQYfmKfWc3kdNg0z2ZZ6jWqHXDpAWcEOU7G5+Gngg
zkJS8hSOVNM0Gb7D8JzWtl/TwWQikdttTDc2WECG56jQkQj/GpheKhcSfoSA
NNExZZgF0QgjuJxtCdIyzQySAqlztajCQAjmc4FGTs7EHanKqlysBBw8SyHL
e8psB6G/nknrhPc9e0NGSLNisYC1DBEO3G9gYeqvQywhX1vifjDOPWDm+Ea7
zgfhgsfQE3dxymahWawnXLsIokvxNV3UO5ZFlSZOIspvnrtgs0J3utA5KSSV
A31SSIqS5jZ6BQXRjtLDyrt/XhtqHSQ2DlBEmHSskZkAoOJ6ULQNhFpKU8zt
PcqEw6XQCX1gAklcUY1eeYuEeDBxgXzjTtuOpIOmf71XgJdvRFlThDSTgAZr
jpY8YTYndQG5DRRWWZWq32TisYhzC1fjB+2edssroQlBhC8nFOzvZnZUBzUp
GCR9QBFTD3pfOAgjEVhtuDA2hSz1LMbdR55ydOKGR6Hi686MvAFYFKBsXfGd
hDFBUQpkRD5LixkSlVugMgIDvEpn4vxW4gsJAiWc0Jr0CEhSNFEDNlGXOBqn
35RN10/mV0R2EKMukMlcvvbxNpFpKLGDvaFmKEuR3WjC1fIFmaCdvZ7Lkq3S
l73M7NdtnTkivRHX5VMmOuNstzAI4tm0mYJuKsdgh+1ypCV/E6NwA6ok1Iut
cpDcti7DiKQ1mPHVSHsa5HMs8cu9WLcHz09Gus02YtZN4qiDB3b/ZZgotFVf
GmeRU4IHse3MZfJ55UZUolq4vmN3FvG9rWuy2j7ZJDlo5YJ9dzQetlMxa7i5
ridaOc5X2Y5XbQFDOdqaV9rzXDPB7f3q/woyuB7ws8IFqE8H5qm2ruSZXPf6
PPN/3LwZnfM9FMLH+w2r5fKeJo4r8uXG67Sov8+zCrQ/IzPQ3yHA+0m4vv7b
/xMRpk+LB5EkpqnMAnV9rNthnS9CfKp0DHbrXMlcQSNbmdZf3mSLupF2+ZS+
W6B8Qir9yIWOoMvJxeAF6rQDvE2tN1aW0GG9K2nUo+Mea3WRvkGrzxkNpxeQ
IqMw7RTQrYzCgtPrIT95rPClHmlr3fc7ssL1fgjBNAzkQ5m6Dck6fKnYbisS
dxyIXeyT9OJ6ZTTVchUY1rbn0a6b5YO4LggdG7oW+t6l91TdBRiI/I6PoSB/
X1Qmlb4eOBM65T+BJYTnfZJWaVy3UkBq/XUO3zIXWRnCyaP83JnYK/LwhTB5
r4+G7/aH0c/R2dVt9INcbzcAaKzz6Pjo+DVzjaIp9oB6jwhKclGhFyJXv7kN
e6/3oWSy97UflKnw3RbaUVtz7+3+Ztxv6LfyTn3Y+zOdGSEG947CXvcbfd1m
h0whQCH5+fBidD2iQcmEj65uL0dnoymfDt5NqGFl3w/fja4Zw4ub8XRCja1r
dPH/xfjmiv7W/nN/GPJYRN/c4VHkK4xfgMq3J/3jX50wL9f7OZ3D9OsTmtda
04t+VGfY6Oh4722f1OX8r4z9kc7+0209G16fs/8CohKpy7MlAAA=

-->

</rfc>
