<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.10 (Ruby 3.0.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-frost-rats-eat-collection-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.7 -->
  <front>
    <title abbrev="EAT Collection">Entity Attestation Token (EAT) Collection Type</title>
    <seriesInfo name="Internet-Draft" value="draft-frost-rats-eat-collection-00"/>
    <author fullname="Simon Frost">
      <organization>Arm</organization>
      <address>
        <email>Simon.Frost@arm.com</email>
      </address>
    </author>
    <date year="2022" month="May" day="30"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>EAT</keyword>
    <keyword>collection container</keyword>
    <abstract>
      <t>The default top-level definitions for an EAT <xref target="I-D.ietf-rats-eat"/> assume a hierarchy involving a leading signer within the Attestee. Some token use cases do not match that model. This specification defines an extension to EAT allowing the top-level of the token to consist of a collection of otherwise defined tokens.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-frost-rats-eat-collection/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Remote ATtestation ProcedureS Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
      </t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>An Attestation Token conforming to EAT <xref target="I-D.ietf-rats-eat"/> has a default top level definition for a token to be constructed principally as a claim set within a CBOR Web Token (CWT) <xref target="RFC8392"/> with the associated COSE envelope <xref target="RFC8152"/> providing at least integrity and authentication. An equivalent JSON encoding for a JWT <xref target="RFC7519"/> in a JWS envelope <xref target="RFC7515"/> is supported as an alternative at the top-level definition.</t>
      <t>For the use case of transmitting a claim set through a secure channel, the top-level definition can be extended to use an Unprotected CWT Claim Set (UCCS) <xref target="I-D.ietf-rats-uccs"/>.</t>
      <t>This document outlines an additional top-level extension for which neither of the above top level definitions match exactly: the attestation token consists of a collection of objects, each with their own integrity and some internally defined relationship through which the integrity of the whole collection can be determined. i.e. there is no top-level signer for the set. The objects may all share the same logical hierarchy in a device or have a hierarchy which is internally defined within the object set.</t>
    </section>
    <section anchor="design-considerations-use-cases">
      <name>Design Considerations / Use Cases</name>
      <t>Take a device with an attestation system consisting of a platform claim set and a Workload claim set, each controlled by different components and with an underlying hardware Root of Trust. The two claim sets are delivered together to make up the overall attestation token. Depending upon the implementation and deployment use case, the signing system can either be entirely centric to the platform RoT or can have separate signers for the two claim sets. In either case, a cryptographic binding is established between the two parts of the token.</t>
      <t>A specific manifestation of such a device is one incorporating the Arm Confidential Compute Architecture (CCA) attestation token <xref target="Arm-CCA"/>. In trying to prepare the attestation token using EAT, there were no issues constructing the claim sets or incorporating them into individual CWTs where appropriate. However, in trying to design an 'envelope structure' to convey the two parts as a single report it was found that maintaining EAT compatibility would require very different shaped compound tokens for different models, for example one based on a submod arrangement and another based on a DEB, though with different 'leading' objects. This would create extra code and explanation in areas where keeping things simple is desirable. There was an alternative approach considered, which stays close to existing thinking on EAT, which would be to create the wrapper from the UCCS EAT extension containing only submods for the respective components. This however stretches the current use case for UCCS beyond its existing description. Given recent WG thinking on separating UCCS from the core EAT specification to be an extension also encourages proposing this further extension.</t>
      <t>To support the CCA use case, also consider current attestation technologies which are based on certificate chains (e.g. SPDM, DICE, several key attestation systems). Here also are multiple objects with their own integrity and an internally defined relationship. If attempting to move such a technology to the EAT world, the same challenges apply.</t>
    </section>
    <section anchor="token-collection">
      <name>Token Collection</name>
      <t>The proposed extension for the top-level definition is to add a 'Token Collection' type. The contents of the type are a map of CWTs (JWTs). The DEB top-level entry for EAT is included for completeness, and the UCCS extension can also be embraced, though the use cases for these have not been explored. The identification of collection members and the intra collection integrity mechanism is considered usage specific. A verifier will be expected to extract each of the members of the collection and check their validity both individually and as a set.</t>
      <t>A map was chosen rather than an unbounded array to give the opportunity to add identifying map tags to each entry. The interpretation of the tags will be usage specific, but may correspond to registered identities of specific token types. To assist a verifier correlate the expected contents a profile entry can be added as the 'profile-label' identity in the map.</t>
      <t>See <xref target="cddl"/> for a CDDL <xref target="RFC8610"/> description of the proposed extension.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>A verifier for an attestation token must apply a verification process for the full set of entries contained within the Token Collection. This process will be custom to the relevant profile for the Token Collection and take into account any individual verification per entry and/or verification for the objects considered collectively, including the intra token integrity scheme.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>In the registry <xref target="IANA.cbor-tags"/>, IANA is requested to allocate the tag in <xref target="tbl-eat-collection"/> from the FCFS space, with the present document as the specification reference.</t>
      <table align="left" anchor="tbl-eat-collection">
        <name>EAT Collection</name>
        <thead>
          <tr>
            <th align="left">Tag</th>
            <th align="left">Data Item</th>
            <th align="left">Semantics</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD399</td>
            <td align="left">map</td>
            <td align="left">EAT Collection RFCthis</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Jeremy O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <date day="20" month="May" year="2022"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a phone, IoT device, network equipment or such.  This claims set is
   used by a relying party, server or service to determine how much it
   wishes to trust the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.  To a large degree, all this document
   does is extend CWT and JWT.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-13"/>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz">
              <organization/>
            </author>
            <author fullname="C. Vigano" initials="C." surname="Vigano">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-rats-uccs">
          <front>
            <title>A CBOR Tag for Unprotected CWT Claims Sets</title>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Jeremy O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Nancy Cam-Winget">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Carsten Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="12" month="January" year="2022"/>
            <abstract>
              <t>   CBOR Web Token (CWT, RFC 8392) Claims Sets sometimes do not need the
   protection afforded by wrapping them into COSE, as is required for a
   true CWT.  This specification defines a CBOR tag for such unprotected
   CWT Claims Sets (UCCS) and discusses conditions for its proper use.


   // The present version (-01) has a few editorial improvements over
   // -00 and attempts to address points from Thomas Fossati's
   // 2021-03-16 review, for further discussion at IETF 111.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-uccs-02"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem">
              <organization/>
            </author>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties.  The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection.  A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value.  CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8152">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="July" year="2017"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size.  There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol.  This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization.  This specification additionally describes how to represent cryptographic keys using CBOR.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8152"/>
          <seriesInfo name="DOI" value="10.17487/RFC8152"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="J. Bradley" initials="J." surname="Bradley">
              <organization/>
            </author>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="J. Bradley" initials="J." surname="Bradley">
              <organization/>
            </author>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures.  Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification.  Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="Arm-CCA">
          <front>
            <title>Confidential Compute Architecture</title>
            <author>
              <organization>Arm Ltd</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="cddl">
      <name>CDDL</name>
      <sourcecode type="cddl"><![CDATA[
$$EAT-CBOR-Tagged-Token /= Tagged-Collection
$$EAT-CBOR-Untagged-Token /= TL-Collection

Tagged-Collection =  #6.TBD399(TL-Collection)
TL-Collection = CWT-Collection / JWT-Collection / DEB-Collection

CWT-Collection = {
    ? eat-collection-identifier,
    2* cwt-collection-entries
}

JWT-Collection = {
    ? eat-collection-identifier,
    2* jwt-collection-entries
}

DEB-Collection= {
    ? eat-collection-identifier,
    2* DEB-collection-entries
}

eat-collection-identifier = (
    profile-label => general-uri / general-oid
)

cwt-collection-entries = (
    collection-entry-label => CWT
)

jwt-collection-entries = (
    collection-entry-label => JWT
)

DEB-collection-entries = (
    collection-entry-label => DEB
)

collection-entry-label = JC<text, int>
CWT = bstr .cbor CWT-placeholder

]]></sourcecode>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thomas Fossati and Yogesh Deshpande provided insightful comments and review for this proposal.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA51Z7XIbtxX9v0+BUTK13dFSdjJJa02VhqEk1x43yVj0aPoT
3AW5iHYXWwBLhpWUyWO0r5cn6bkX2C9KStL+sIcE8XE/zjn3AkrTNPHal+pU
HF3U+LQXc++V89JrU4uluVG1eH4xX74QC1OWKgvD+0YdJXK1smpLC+fL0a9H
SSa92hi7PxXO50mSm6yWFU7IrVz7dG2N86mV3qVK+jTrF6YvXyauXVXaOXzz
OONUvL1YXiZ1W62UPU1y7HuaZKZ2qnatOxXetiqBBZ8n0ioJS65U1lo4cZTs
jL3ZWNM2GP2gKuOVmC8Hx763JlN5a9XVUXKj9pidnyapgCf4fzAJH2svda1s
slV1i9OF+J27ChE8OLqGJbreiDe0jsYrqUuMUwS+1sqvZ8ZujpJEtr4wlk5I
8U+IdVuWIW5XusLmlxQ3/gXzZa3/xWeeirmteFSFfXnyjCd/LW01y0yVJLWx
FaZv2YG36fmMzu1zwIPzb+ezbGVs6uXG0ciHy8Wfv3z18jRJdL1+en2bZf30
z19/1n189UX38U9fvHo9fPyCPsLkdLGYn7Ldg9/RN8QGE8R7nx/xYIfPhanX
OldAqSyBt6ppKfw2K7RHthD1ML21iELhfeNOT052u90sRuFEjqaeuIiUdI0A
YMDh5wpgHI7AFz4iHa9LEsUsIXOvLt5fEg4uF77QDhlM01TIlfNWZj5JloUS
uVrLtvTCmyYt1VaVNKJrTZlzAlEVsibQidvbB1m5vxfSubZSQopCK0tm7IWu
t6bcEp6kKJXM6ZPTGyBU7DTsqIXHuYHDSs3ElcEGnmncOiUy6ZQTuRG18QCi
zwrMl/hoclXOxBKOCNeoTK91FjDNBmMNDFU/ehCPBr1hq2VZmh1ZQGcOPpp1
HKBTMZUYq52ncTkmF74bTLQ77VQ8Jw+r3CxEs9J5XiLon4i3tbcmb3lhkszr
R2SKkgecsj3mV6JaSHgzTo04TE3IzODASrEPkJvMw8TG6jrTDbzfC94rK6Wu
hFO+y4EUi2+++yCu1aqT0MU1JPT2NrIEVtBMDhOSbDItaePFd1cXQtUwxjQq
zgaRMLuxZqs52UgW8o5o6hoqSxBGanJmEUEzZG0mECH1z1ZvZYlR8e7qu2+x
cWZ4i+Ddu+tlOIIIiiPY7HfXVwcGEGfpV+CibRpjyU7JcJClV7ZmWSCrphgY
golUXuJA+rlDICPEytpV2vuA5SGEvoBQbgqMMUexopB1rcrjJ0/AnjXliPGZ
M4b4KIx+rBE54i5FFw4v+JgrHPP842Jx9eIBREjO7u9nRF9NRMlAQATQtL7s
aCDznI+FCg3WDNyg6O4KDWbVShO8Oz7IldmqR/HmIhXVj1COEnWTp48A7juA
E4/co0Ra/YAv7lgoiY06cGkcvqsPoOJIEmgIySMId8yzquTTXKGbPgvBE7Jn
2CT6sytMqSbFMqQhV9i6oi1nQs+gQRQERQiqzShiUbXWERtIPemP6jxBSPYk
MMIVKO5hCqqhKM0GIC8nksh03uoMiy3ovZ1KZnABxz/i80gzw7lsBwnOuSID
UWcQ8xxbhTydiI8A1oJUFBCRN2o4mmNO8Bjlze2hwlWXOEI6p65BoEmqRqhn
DgvqFUoj8+GHmFDqQyxFOhcrWK/Xa4QUuKQaZWp8crxDZ0MLGthyTwcievmO
IvjBGJbgpW1dDLXfmeEk7GApeSX4bJlEG8XwBZsq8rRtQpzwM+XlAT5niFkD
AtKpbWNCVHXVlIooFCaSkblqSrNnWnWCELhNAed6FqNGJScwiMgNcQNC9yLD
J6szMosW9bH8YJaUflrFEHCqkUibikBzPdKmXs9QWrpjgimglt03cN/KBtAR
Kx18AoLI4VWpXUF5UH6nVN1vidMCNfvaBxzN+2qKGNZ63UcM81ybFQN8sDsS
CYxmxkJmpe/qKvVCv9n6oMAs5i8e0Yzb29hsQdTIU2/3sUA2lgKkntCa1tE0
FNHjSN8d/QcCoztvoYN9PezMHOEIcX7gRkXsw2qEEoWsJTeulw7cpG1lA5VG
VUW2ZuJvZgd9sMfE68HaPNARyX3W16dgALx/FruMrdofpIPLM7kCpYK/KF9C
o0pLQgNIEpsfdPjU5UePmVQwfKVLUrudaUsSR1RTmArLxvyDODXAAtOQ9+Pu
haE2TOLmCtJMo5B4YgTnegW45YJYIejeY6AAFlVxw3wJilCbgP9h5vnFN5SS
IM5E9+GcX37+d2wJf/n5P52OxqYueJHhmuS5UFoqILniU9SPIFEdsk9iikld
Zm6UakIG8T9aAKYzYZXyYcEFxUpC+HikKaC0RvViEVX5cVRjgG0PEJXGEVdg
QZRHOodvS6YO4AvTg/Urnht94AoEhjZUQ6ypeIBqOqdwKMfxBhf2hHyESA9q
gNa/ofq1VSMxjUErAhQJaAr1GbBnpLfWjsWLt+KTV2pvEE8N4PUeIVCZ1U3o
yt7gmBpHkoaJ6zcTd6Ne0TferHcKTFLs1LQxD33ppC2XpTPc5rVWbmAtscq4
GFe43FpGU7+A2hzT9XV8FoRiJMq8X5e83u+JWKisqA3VZOVirkhTerxmyvpg
MvdxGtx4rmYb3Eu+P//7sTh/u7g4hudcUgC2/SPV072AJrBKkDW0e4W+XTOJ
Yqvwq+2OrH+r2YEwrvngqvFRbipq1aJA9z7uu5pDydgZW+bHQ18C71Ceawo7
QFnuuYkIzf/wNhJuhSEtKj9oGp9sb5E6HIy2E8Y8O9zyGb8zhHpOWOdeoKtC
+IUjJqFxDY2y6D5H609RpSWQk3EXi9K6Z2PIRW6ZsrKllprGiB8lmjv0wVAz
yfIZOTfim4w4pJpdrXAXVnkvWONLQE9BfOeCTVfSFVVU0iNgPg8WhrrXwx5O
jFrOStHTkOuNQabtpDUesFApukhoV5FfgyLBHnCl5xZuTqTx+Mg3avQ5fLFo
whWCpYrv96Eti3HurIhfR8eTXRCO7CbCE/cxXONgzQrCPqqGZcQqlyvuQOec
MlLVrABYoBoydGOFrEOLt6KKo0LRYGhuSMS4RWNCtzUdFJETo8jllDamVx52
h9zgtMdoE1XQGgxtCgOJZnfRmAbsWKxaz806dIrE1HAZBME2UECOcDjbk0RQ
29M1RPF6DYyS3hq6CNMrgRzizzuWndr3WehhLolKa12qCNx4AYG/4ZJKq1AU
46S0lCtVUmmMBvHVgfMnG0T8StGVN8vzEvfdcEdenJ+/j/fwL1+9xPBIzbvY
PGQzU797ijy4QVBie//iA9DD7qtqKRAkI304IvwbemJ0Q/miV0K+QMAaboxD
b8aPlpPrzaFuxBLX7dclN8PJVHdMLI7QBQnN7+LcHXu4WyAg3RK4zZMZahD3
MPtxyzf1hCoRpw1rT7Dv5NfuoE7iR4Tt6AXB2h9Hheq60MD/EMSB+g4UrBSn
hd45H6TkbR29JcjCoNvb6XPo/f1xWIiAUSNIb2sMcnoAyzp8YiYB6vbWr8qD
p20CVFfOLxeXVyABdPF4eAQC4xzV1v7BIaJ3WvKt4k4vI1fuxBLn3Ylz6aV4
S/elO2AOlwyvMyfukrs0Tft/NPub889fv8YkYv+dmL7Zw+g/0HMm7LxLbk/F
Jw9dgK9owM+OSrX2R+FN9uzw5f8+vNqtZHZDsSb2JMlPP/0kiFTJp59iekoP
YylM36g8DSg6ORPx+6hQjiZ/BJoPpr9PJzX1cLU4E+KTL2fB5eeT2S+SyVfM
REkcD5zQw9h0ADVyct7BijNxyw/PfxUHf8/oKhcuMzzhsz+KbDeZERmbIHDv
/v9Nf3hy06nl/8uetPLxPZ9cC5uf8/KJ3oqzr8QGLQMavBSCiHB234zOkxdJ
8nhI+s0OftoPuyINtP5x73/H+ndh/eOe/o71WMj2PzFBvFv8xaMmkET5rwg0
GKO/DggWFsYd7l2ZKkwJLWKiTPkzz25qsytVviFJcCBm+EuYys+O1uixFBFu
WZgKYnFpnINIsA7/w6ALLegFq2jwXcXXY6rE0L1N4VE0qJmr+ncjq7Za7aLo
6u7iIMtZ8l+WBZ9VIRwAAA==

-->

</rfc>
