<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-automation-keyusages-02" category="std" consensus="true" submissionType="IETF" xml:lang="en" tocDepth="3" tocInclude="true" sortRefs="false" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="EKU for Automation">X.509 Certificate Extended Key Usage (EKU) for Automation</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-automation-keyusages-02"/>
    <author initials="H." surname="Brockhaus" fullname="Hendrik Brockhaus">
      <organization abbrev="Siemens">Siemens</organization>
      <address>
        <postal>
          <street>Werner-von-Siemens-Strasse 1</street>
          <city>Munich</city>
          <code>80333</code>
          <country>Germany</country>
        </postal>
        <email>hendrik.brockhaus@siemens.com</email>
        <uri>https://www.siemens.com</uri>
      </address>
    </author>
    <author initials="D." surname="Goltzsche" fullname="David Goltzsche">
      <organization>Siemens Mobility</organization>
      <address>
        <postal>
          <street>Ackerstrasse 22</street>
          <city>Braunschweig</city>
          <code>38126</code>
          <country>Germany</country>
        </postal>
        <email>david.goltzsche@siemens.com</email>
        <uri>https://www.mobility.siemens.com</uri>
      </address>
    </author>
    <date year="2025"/>
    <area>sec</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Industrial Automation</keyword>
    <keyword>ERJU</keyword>
    <keyword>extended key usage</keyword>
    <keyword>extension</keyword>
    <keyword>PKI</keyword>
    <abstract>
      <?line 146?>

<t>RFC 5280 specifies several extended key purpose identifiers (KeyPurposeIds) for X.509 certificates. This document defines KeyPurposeIds for general-purpose and trust anchor configuration files, for software and firmware update packages, and for safety-critical communication to be included in the Extended Key Usage (EKU) extension of X.509 v3 public key certificates used by industrial automation and the ERJU System Pillar.</t>
    </abstract>
  </front>
  <middle>
    <?line 151?>

<section anchor="Intro">
      <name>Introduction</name>
      <t>Automation hardware and software products will strategically be more safe and secure by fulfilling mandatory, generic system requirements related to cyber security driven by federal offices like the <xref target="EU-CRA">European Union Cyber Resilience Act</xref> governed by the European Commission and the High Representative of the Union for Foreign Affairs and Security Policy.
Automation products connected to the internet would bear the CE marking to indicate they comply.
Such regulation was announced in the <xref target="EU-STRATEGY">2020 EU Cybersecurity Strategy</xref>, and complements other legislation in this area, specifically the NIS2 Framework, <xref target="NIS2">Directive on measures for a high common level of cybersecurity across the Union</xref>.
2020 EU Cybersecurity Strategy suggests to implement and extend international standards such as the <xref target="IEC.62443-4-2">Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components</xref> and the <xref target="IEC.62443-3-3">Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels</xref>. Automation hardware and software products of diverse vendors that are connected on automation networks and the internet build a typical automation solution. Harmonized attributes would allow transparency of security properties and interoperability for vendors in context of secure software and firmware updates, general-purpose configuration, trust anchor configuration, and secure safety communication.</t>
      <t>A concrete example for Automation is a Rail Automation system. The <xref target="ERJU">Europe's Rail Joint Undertaking System Pillar</xref> will deliver a unified operational concept and a functional, safe, and secure system architecture alongside with system requirements for Rail Automation. The deliverables include due consideration of cyber security aspects based on the IEC 62443 series of standards, focused on the European railway network to which <xref target="Directive-2016_797">Directive 2016/797 - Interoperability of the rail system within the EU</xref> applies.</t>
      <t>The ERJU System Pillar Cyber Security Working Group makes use of PKIs to generate X.509 PKI certificates. The certificates are used for the following purposes, among others:</t>
      <ul spacing="normal">
        <li>
          <t>Validating signatures of general-purpose software configuration files.</t>
        </li>
        <li>
          <t>Validating signatures of trust anchor configuration files.</t>
        </li>
        <li>
          <t>Validating signatures of software and firmware update packages.</t>
        </li>
        <li>
          <t>Authenticating communication endpoints authorized for safety-critical communication.</t>
        </li>
      </ul>
      <t><xref target="RFC5280"/> specifies several key usage extensions, defined via KeyPurposeIds, for X.509 certificates. Key usage extensions added to a certificate are meant to express intent as to the purpose of the named usage, for humans and for complying libraries. In addition, the IANA registry "SMI Security for PKIX Extended Key Purpose" <xref target="RFC7299"/> contains additional KeyPurposeIds. The use of the anyExtendedKeyUsage KeyPurposeId, as defined in <xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>, is generally considered a poor practice. This is especially true for certificates, whether they are multi-purpose or single-purpose, within the context of ERJU System Pillar.</t>
      <t>If the purpose of the issued certificates is not restricted, i.e., the type of operations for which a public key contained in the certificate can be used are not specified, those certificates could be used for another purpose than intended, increasing the risk of cross-protocol attacks. Failure to ensure proper segregation of duties means that an application or system that generates the public/private keys and applies for a certificate to the operator certification authority could obtain a certificate that can be misused for tasks that this application or system is not entitled to perform. For example, management of trust anchor is a particularly critical task. A device could potentially accept a trust anchor configuration file signed by a service that uses a certificate with no EKU or with the KeyPurposeId id-kp-codeSigning (<xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>) or id-kp-documentSigning <xref target="RFC9336"/>. A device should only accept trust anchor configuration files if the file is signed with a certificate that has been explicitly issued for this purpose.</t>
      <t>The KeyPurposeId id-kp-serverAuth (<xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>) can be used to identify that the certificate is for a TLS WWW server, and the KeyPurposeId id-kp-clientAuth (<xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>) can be used to identify that the certificate is for a TLS WWW client. However, there are currently no KeyPurposeIds for usage with X.509 certificates for safety-critical communication.</t>
      <t>This document addresses the above problems by defining keyPurposeIds for the EKU extension of X.509 public key certificates. These certificates are either used for signing files (general-purpose configuration and trust anchor configuration files, software and firmware update packages) or are used for safety-critical communication.</t>
      <t>Vendor-defined KeyPurposeIds used within a PKI governed by the vendor or a group of vendors typically do not pose interoperability concerns, as non-critical extensions can be safely ignored if unrecognized. However, using or misusing KeyPurposeIds outside of their intended vendor-controlled environment can lead to interoperability issues. Therefore, it is advisable not to rely on vendor-defined KeyPurposeIds. Instead, the specification defines standard KeyPurposeIds to ensure interoperability across various vendors and industries.</t>
      <t>Although the specification focuses on use in industrial automation, the definitions are intentionally broad to allow the use of the KeyPurposeIds defined in this document in other deployments as well. Whether and how any of the KeyPurpose OIDs defined in this document must be described in more detail in the technical standards and certificate policies relevant to the industrial sector.</t>
    </section>
    <section anchor="conventions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="EKU">
      <name>Extended Key Purpose for Automation</name>
      <t>This specification defines the KeyPurposeIds id-kp-configSigning, id-kp-trustanchorSigning, id-kp-updateSigning, and id-kp-safetyCommunication and uses these, respectively, for: signing general-purpose or trust anchor configuration files, signing software or firmware update packages, or authenticating communication peers for safety-critical communication. As described in <xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>, "[i]f the [extended key usage] extension is present, then the certificate <bcp14>MUST</bcp14> only be used for one of the purposes indicated" and "[i]f multiple [key] purposes are indicated the application need not recognize all purposes indicated, as long as the intended purpose is present".</t>
      <t>None of the keyPurposeId's specified in this document are intrinsically mutually exclusive.  Instead, the acceptable combinations of those KeyPurposeId's with others specified in this document and with other KeyPurposeId's specified elsewhere are left to the technical standards of the respective area of application and the certificate policy of the respective PKI.  For example, a technical standard may specify: 'Different keys and certificate <bcp14>MUST</bcp14> be used for safety communication and for trust anchor updates, and a relying party <bcp14>MUST</bcp14> ignore the KeyPurposeId id-kp-trustanchorSigning if id-kp-safetyCommunication is one of the specified key purposes in a certificate.', and the certificate policy may specify: 'The id-kp-safetyCommunication KeyPuposeId <bcp14>SHOULD</bcp14> not be included in an issued certificate together with the KeyPurposeId id-kp-trustanchorSigning.' Technical standards and certificate policies of other area of application may specify other rules.  Further consideration on prohibiting combinations of KeyPurposeIds is described in the Security Considerations section of this document.</t>
      <t>Systems or applications that verify the signature of a general-purpose or trust anchor configuration file, the signature of a software or firmware update package, or the authentication of a communication peer for safety-critical communication <bcp14>SHOULD</bcp14> require that corresponding KeyPurposeIds be specified by the EKU extension. If the certificate requester knows the certificate users are mandated to use these KeyPurposeIds, it <bcp14>MUST</bcp14> enforce their inclusion. Additionally, such a certificate requester <bcp14>MUST</bcp14> ensure that the KeyUsage extension be set to digitalSignature or nonRepudiation (also designated as contentCommitment) for signature verification and if needed to keyEncipherment for secret key encryption and/or keyAgreement for key agreement.</t>
    </section>
    <section anchor="include-EKU">
      <name>Including the Extended Key Purpose in Certificates</name>
      <t><xref target="RFC5280"/> specifies the EKU X.509 certificate extension for use on end entity certificates. The extension indicates one or more purposes for which the certified public key is valid. The EKU extension can be used in conjunction with the Key Usage (KU) extension, which indicates the set of basic cryptographic operations for which the certified key may be used. The EKU extension syntax is repeated here for convenience:</t>
      <artwork><![CDATA[
   ExtKeyUsageSyntax  ::=  SEQUENCE SIZE (1..MAX) OF KeyPurposeId

   KeyPurposeId  ::=  OBJECT IDENTIFIER
]]></artwork>
      <t>As described in <xref target="RFC5280"/>, the EKU extension may, at the option of the certificate issuer, be either critical or non-critical. The inclusion of KeyPurposeIds id-kp-configSigning, id-kp-trustanchorSigning, id-kp-updateSigning, and id-kp-safetyCommunication in a certificate indicates that the public key encoded in the certificate has been certified for the following usages:</t>
      <ul spacing="normal">
        <li>
          <t>id-kp-configSigning</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>A public key contained in a certificate containing the KeyPurposeId id-kp-configSigning may be used for verifying signatures of general-purpose configuration files of various formats (for example XML, YAML, or JSON). Configuration files are used to configure hardware or software.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>id-kp-trustanchorSigning</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>A public key contained in a certificate containing the KeyPurposeId id-kp-trustanchorSigning may be used for verifying signatures of trust anchor configuration files of various formats (for example XML, YAML, or JSON).
Trust anchor configuration files are used to add or remove trust anchors to the trust store of a device.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>id-kp-updateSigning</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>A public key contained in a certificate containing the KeyPurposeId id-kp-updateSigning may be used for verifying signatures of secure software or firmware update packages. Update packages are used to install software (including bootloader, firmware, safety-related applications, and others) on systems.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>id-kp-safetyCommunication</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>A public key contained in a certificate containing the KeyPurposeId id-kp-safetyCommunication may be used to authenticate a communication peer for safety-critical communication based on TLS or other protocols.</t>
        </li>
      </ul>
      <artwork><![CDATA[
   id-kp  OBJECT IDENTIFIER  ::=
       { iso(1) identified-organization(3) dod(6) internet(1)
         security(5) mechanisms(5) pkix(7) 3 }

   id-kp-configSigning        OBJECT IDENTIFIER ::= { id-kp TBD2 }
   id-kp-trustanchorSigning   OBJECT IDENTIFIER ::= { id-kp TBD3 }
   id-kp-updateSigning        OBJECT IDENTIFIER ::= { id-kp TBD4 }
   id-kp-safetyCommunication  OBJECT IDENTIFIER ::= { id-kp TBD5 }
]]></artwork>
    </section>
    <section anchor="ca-implication">
      <name>Implications for a Certification Authority</name>
      <t>The procedures and practices employed by a certification authority <bcp14>MUST</bcp14> ensure that the correct values for the EKU extension as well as the KU extension are inserted in each certificate that is issued. The inclusion of the id-kp-configSigning, id-kp-trustanchorSigning, id-kp-updateSigning, and id-kp-safetyCommunication KeyPurposeIds does not preclude the inclusion of other KeyPurposeIds.</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>The Security Considerations of <xref target="RFC5280"/> are applicable to this document. These extended key usage key purposes do not introduce new security risks but instead reduces existing security risks by providing the means to identify if the certificate is generated to verify the signature of a general-purpose or trust anchor configuration file, the signature of a software or firmware update package, or the authentication of a communication peer for safety-critical communication.</t>
      <t>To reduce the risk of specific cross-protocol attacks, the relying party or the relying party software may additionally prohibit use of specific combinations of KeyPurposeIds.  The procedure for allowing or disallowing combinations of KeyPurposeIds using excluded KeyPurposeId and permitted KeyPurposeId, as carried out by a relying party, is defined in <xref section="4" sectionFormat="of" target="RFC9336"/>.  The technical standards and certificate policies of the area of application should specify concrete requirements for excluded or permitted EKUs or their combinations. An example of excluded KeyPurposeIds can be the presence of the anyExtendedKeyUsage KeyPurposeId. Examples of allowed KeyPurposeIds combinations can be the presence of id-kp-safetyCommunication together with id-kp-clinetAuth or id-kp-serverAuth.</t>
    </section>
    <section anchor="privacy">
      <name>Privacy Considerations</name>
      <t>In some security protocols, such as <xref target="RFC5246">TLS 1.2</xref>, certificates are exchanged in the clear. In other security protocols, such as <xref target="RFC8446">TLS 1.3</xref>, the certificates are encrypted. The inclusion of the EKU extension can help an observer determine the purpose of the certificate. In addition, if the certificate is issued by a public certification authority, the inclusion of an EKU extension can help an attacker to monitor the Certificate Transparency logs <xref target="RFC9162"/> to identify the purpose of the certificate.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>IANA is requested to register the following ASN.1 <xref target="X.680"/> module OID in the "SMI Security for PKIX Module Identifier" registry (1.3.6.1.5.5.7.0). This OID is defined in <xref target="asn1"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Decimal</th>
            <th align="left">Description</th>
            <th align="left">References</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">id-mod-automation-eku</td>
            <td align="left">This-RFC</td>
          </tr>
        </tbody>
      </table>
      <t>IANA is also requested to register the following OIDs in the "SMI Security for PKIX Extended Key Purpose" registry (1.3.6.1.5.5.7.3).  These OIDs are defined in <xref target="include-EKU"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Decimal</th>
            <th align="left">Description</th>
            <th align="left">References</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD2</td>
            <td align="left">id-kp-configSigning</td>
            <td align="left">This-RFC</td>
          </tr>
          <tr>
            <td align="left">TBD3</td>
            <td align="left">id-kp-trustanchorSigning</td>
            <td align="left">This-RFC</td>
          </tr>
          <tr>
            <td align="left">TBD4</td>
            <td align="left">id-kp-updateSigning</td>
            <td align="left">This-RFC</td>
          </tr>
          <tr>
            <td align="left">TBD5</td>
            <td align="left">id-kp-safetyCommunication</td>
            <td align="left">This-RFC</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="acknow">
      <name>Acknowledgments</name>
      <t>We would like to thank the authors of <xref target="RFC9336"/> and <xref target="RFC9509"/> for  their excellent template.</t>
      <t>We also thank all reviewers of this document for their valuable feedback.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="X.680" target="https://www.itu.int/rec/T-REC.X.680">
          <front>
            <title>Information Technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation X.680" value=""/>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC.X.690">
          <front>
            <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation X.690" value=""/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC7299">
          <front>
            <title>Object Identifier Registry for the PKIX Working Group</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>When the Public-Key Infrastructure using X.509 (PKIX) Working Group was chartered, an object identifier arc was allocated by IANA for use by that working group. This document describes the object identifiers that were assigned in that arc, returns control of that arc to IANA, and establishes IANA allocation policies for any future assignments within that arc.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7299"/>
          <seriesInfo name="DOI" value="10.17487/RFC7299"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9336">
          <front>
            <title>X.509 Certificate General-Purpose Extended Key Usage (EKU) for Document Signing</title>
            <author fullname="T. Ito" initials="T." surname="Ito"/>
            <author fullname="T. Okubo" initials="T." surname="Okubo"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="December" year="2022"/>
            <abstract>
              <t>RFC 5280 specifies several extended key purpose identifiers (KeyPurposeIds) for X.509 certificates. This document defines a general-purpose Document-Signing KeyPurposeId for inclusion in the Extended Key Usage (EKU) extension of X.509 public key certificates. Document-Signing applications may require that the EKU extension be present and that a Document-Signing KeyPurposeId be indicated in order for the certificate to be acceptable to that Document-Signing application.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9336"/>
          <seriesInfo name="DOI" value="10.17487/RFC9336"/>
        </reference>
        <reference anchor="RFC9509">
          <front>
            <title>X.509 Certificate Extended Key Usage (EKU) for 5G Network Functions</title>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="J. Ekman" initials="J." surname="Ekman"/>
            <author fullname="D. Migault" initials="D." surname="Migault"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>RFC 5280 specifies several extended key purpose identifiers (KeyPurposeIds) for X.509 certificates. This document defines encrypting JSON objects in HTTP messages, using JSON Web Tokens (JWTs), and signing the OAuth 2.0 access tokens KeyPurposeIds for inclusion in the Extended Key Usage (EKU) extension of X.509 v3 public key certificates used by Network Functions (NFs) for the 5G System.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9509"/>
          <seriesInfo name="DOI" value="10.17487/RFC9509"/>
        </reference>
        <reference anchor="Directive-2016_797" target="https://eur-lex.europa.eu/eli/dir/2016/797/2020-05-28">
          <front>
            <title>Directive 2016/797 - Interoperability of the rail system within the EU</title>
            <author>
              <organization>European Parliament, Council of the European Union</organization>
            </author>
            <date year="2020" month="May"/>
          </front>
        </reference>
        <reference anchor="ERJU" target="https://rail-research.europa.eu/wp-content/uploads/2023/10/ERJU_SP_CyberSecurity_Review3_Files.zip">
          <front>
            <title>SP-Cybersecurity-SharedCybersecurityServices - Review 3 Final Draft Specs (V0.90)</title>
            <author>
              <organization>Europe's Rail Joint Undertaking</organization>
            </author>
            <date year="2024" month="September"/>
          </front>
        </reference>
        <reference anchor="EU-CRA" target="https://digital-strategy.ec.europa.eu/en/library/cyber-resilience-act">
          <front>
            <title>Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUCIL on horizontal cybersecurity requirements for products with digital elements and amending Regulation (EU) 2019/1020</title>
            <author>
              <organization>European Commission</organization>
            </author>
            <date year="2022" month="September"/>
          </front>
        </reference>
        <reference anchor="EU-STRATEGY" target="https://digital-strategy.ec.europa.eu/en/library/eus-cybersecurity-strategy-digital-decade-0">
          <front>
            <title>The EU's Cybersecurity Strategy for the Digital Decade</title>
            <author>
              <organization>European Commission</organization>
            </author>
            <date year="2020" month="December"/>
          </front>
        </reference>
        <reference anchor="NIS2" target="https://digital-strategy.ec.europa.eu/en/policies/nis2-directive">
          <front>
            <title>Directive (EU) 2022/2555 of the European Parliament and of the Council</title>
            <author>
              <organization>European Commission</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="IEC.62443-4-2" target="https://webstore.iec.ch/publication/34421">
          <front>
            <title>Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components</title>
            <author>
              <organization>IEC</organization>
            </author>
            <date year="2019" month="February"/>
          </front>
          <seriesInfo name="IEC 62443-4-2:2019" value=""/>
        </reference>
        <reference anchor="IEC.62443-3-3" target="https://webstore.iec.ch/publication/7033">
          <front>
            <title>Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels</title>
            <author>
              <organization>IEC</organization>
            </author>
            <date year="2013" month="August"/>
          </front>
          <seriesInfo name="IEC 62443-3-3:2013" value=""/>
        </reference>
      </references>
    </references>
    <?line 301?>

<section anchor="asn1">
      <name>ASN.1 Module</name>
      <t>The following module adheres to ASN.1 specifications <xref target="X.680"/> and
<xref target="X.690"/>.</t>
      <sourcecode type="asn1"><![CDATA[
<CODE BEGINS>

Automation-EKU
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-eu-automation-eku (TBD1) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

-- OID Arc

id-kp OBJECT IDENTIFIER ::=
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) kp(3) }

-- Extended Key Usage Values

id-kp-configSigning        OBJECT IDENTIFIER ::= { id-kp TBD2 }
id-kp-trustanchorSigning   OBJECT IDENTIFIER ::= { id-kp TBD3 }
id-kp-updateSigning        OBJECT IDENTIFIER ::= { id-kp TBD4 }
id-kp-safetyCommunication  OBJECT IDENTIFIER ::= { id-kp TBD5 }

END


<CODE ENDS>
]]></sourcecode>
    </section>
    <section anchor="history">
      <name>History of Changes</name>
      <t>[RFC Editor: Please remove this appendix in the release version of the document.]</t>
      <t>Changes from 01 -&gt; 02:</t>
      <ul spacing="normal">
        <li>
          <t>Updates Sections 1,  3, and 6 addressing last call comments (see "WG Last Call for draft-ietf-lamps-automation-keyusages-01")</t>
        </li>
      </ul>
      <t>Changes from 01 -&gt; 02:</t>
      <ul spacing="normal">
        <li>
          <t>Implemented the changes requested during WGLC</t>
        </li>
      </ul>
      <t>Changes from 00 -&gt; 01:</t>
      <ul spacing="normal">
        <li>
          <t>Fixed some minor nids and wording issues</t>
        </li>
      </ul>
      <t>draft-ietf-lamps-automation-keyusages version 00:</t>
      <ul spacing="normal">
        <li>
          <t>Updated document and filename after WG adoption</t>
        </li>
      </ul>
      <t>Changes from 00 -&gt; 01:</t>
      <ul spacing="normal">
        <li>
          <t>Updated last paragraph of Section 1 addressing WG adoption comments by Rich and Russ</t>
        </li>
        <li>
          <t>Updated name and OID of ASN.1 module</t>
        </li>
      </ul>
      <t>draft-brockhaus-lamps-automation-keyusages version 00:</t>
      <ul spacing="normal">
        <li>
          <t>Broadened the scope to general automation use case and use ERJU as an example.</t>
        </li>
        <li>
          <t>Fixed some nits reported.</t>
        </li>
      </ul>
      <t>draft-brockhaus-lamps-eu-rail-keyusages version 00:</t>
      <ul spacing="normal">
        <li>
          <t>Initial version of the document following best practices from RFC 9336 and RFC 9509</t>
        </li>
      </ul>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="S." surname="Fazekas-Zisch" fullname="Szofia Fazekas-Zisch">
        <organization abbrev="Siemens">Siemens AG Digital Industries Factory Automation</organization>
        <address>
          <postal>
            <street>Breslauer Str. 5</street>
            <city>Fuerth</city>
            <code>90766</code>
            <country>Germany</country>
          </postal>
          <email>szofia.fazekas-zisch@siemens.com</email>
          <uri>https://www.siemens.com</uri>
        </address>
      </contact>
      <contact initials="B." surname="Fouques" fullname="Baptiste Fouques">
        <organization>Alstom</organization>
        <address>
          <email>baptiste.fouques@alstomgroup.com</email>
        </address>
      </contact>
      <contact initials="D. G." surname="Orta" fullname="Daniel Gutierrez Orta">
        <organization>CAF Signalling</organization>
        <address>
          <email>daniel.gutierrez@cafsignalling.com</email>
        </address>
      </contact>
      <contact initials="M." surname="Weller" fullname="Martin Weller">
        <organization>Hitachi Rail</organization>
        <address>
          <email>martin.weller@urbanandmainlines.com</email>
        </address>
      </contact>
      <contact initials="N." surname="Poyet" fullname="Nicolas Poyet">
        <organization>SNCF</organization>
        <address>
          <email>nicolas.poyet@sncf.fr</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA91c63LbRpb+ryq9Q6/8w9IUAYmU5ItqNhOaomzG1mVFOU7G
SaVAoEn2CAQ4aEAyrXieZZ9ln2zPpbsBkKCkxMlO1dqpmGz07Zw+l++cPqDn
eZsbN0dif3MjSsMkmMkjEWXBOPeUzMdeHMzm2guKPJ0FuUoT71ouCh1MpPb2
OpsbYZAfCZ1H8ClNtEx0oY/E0zwr5NPNDV2MZkprGJUv5jDtoH91srkRB8nk
SMhkc2OujjY3hMjTsBxDXyM5z6fQtk8NejHL5FhX++g0y03bOIg1NuYqj2GN
H/zDvZeiJ7NcjRXsTor+p1wmkYzEW7kQ73HrYrv/9v2OGKeZ6DrCNjeC0SiT
wAl4uPoskwEQKsPNjVvY/bvu6cVQfEiza5VMxOssLeabG8CZ2zSLgCZPDJKo
0Hmmgrg2jSf6l9+9x3+l3RWMEsRQ16pN14u3AzgTIOFIdPY6h7CJIp+mGc3P
5/QGpsjUtXiVpeH1NCg08ibNYINDJWcwE363ZFWaYGdSwsF9kFkiM+8GjtU8
9YZ5FmgtRRv7hWkEqzx9sbe/z0cRqnxxJE6LRIVT7lAkeQZNr2U2C5IFtslZ
oOIjMeW9+SO7t281L+GH6Qz7FZmCXnk+10e7u7e3t37tuSXxOLhRkXidxvln
HU7lMoHiNB2pGHZVJasbXstMG0I6nQol+y/anWcVSl5lQZHAvLdSTR6gJ8KN
+BO7kQepmZmN1ckCLQGpGIFIVM9x+Dkdq0CcBJ/ldaC9vyvN7K1R2n0tjtVE
5SBSVrqkhjEhzLWoSdm9Z/4qkzoOCpkJOGpfHFa483Lv+bMqd06gV/7QOWva
uz82e/+Me/99R/0qmOdKg8aepMU/C1kKczfWOU9k1hyZnv6Ye34bUI8J6uGy
+CRKxuJ1kSuZZfKzOM/ywE3c654AiyZJEMegx7XDxmH+xA77NgzG2nWsL3Ea
gK1JQJfiWGZu6jdwUOFUiUuYrzLxjDr7t9T52yIbBUmQRPAsgYnlEkPOVJjG
gRYX6ULmpTyc9U4qMybcyZ9jp291Eo79MWxjcyNJMxSIG0lG9vKk12m3X9rP
h50Xe/bzi/bzA/r8g//MtIIVDrIJikv11FRe+CrJdzMZ7l55l/2eTyPMALa/
3/A3ATI65g2kibiS4TRJ43SyEJ7ojlA1w1wMF0kefBJnac69zhOwzN3hmd/e
ObKzDOcyZEOOPdIxHL1WoUjMGO7m7CKPIS4Nrt57V9zCJvQp2NA2+Kyn3Kgl
qo+CTbpxNERcSjgDEM6Il3QUwoeXv5k5L38zc5B8cI6gkehZsiKWej0zXhEz
+rb3JfYW26/6lzstO6YXJCmICBiN5W496GZ7gQyCcdEgmpNC6Sm4peXex673
n8xtZNnmhrIMKsX3sHPwzH5+3nnpRPnFQdn+sv2s4z7v75ftAAro87GC88FZ
vc5e+9nu85fP1xypLDIvlp98+DedB/DProzVbqSyXTsQPnT2vL1Dr/OidshP
3RrCdhUICHIJM8ksYLeAx5dPpchAiQHhgDGbiVuVT8GSYHP//dP13O7jnmSQ
iIsgixWYiiRviR6Y6BDmMvO6Pu8Tpyfl0Zh90xqISNYwATfngb+QQRZOK6y4
nXvoyGDd3WIep0GkkRn7u+29XZztl+HFL73FSGZDGYLpzxe/XMobJW/3fzlR
IEz+ZzWvc2x44VF/bfp7wykArqjWNpTZjQpBFD3Bs4l9caLAIotjRKukHCCn
3+/5L/d2HmTeU02WWXyXgs4CjyLwdMG1cQJVTh14ey+9DqOf/nuvd9kVa5gV
sXP20LrlcrLwZViVnmQ3VqMsyBa7IZKFbAVBAE2XHhjDOj8uYFSqgTSEoYG4
7L9+/657NTg/E+cn4upNH3ZyeX7R756Ji+7lu0H3tH92Jbpnx/Zx7/x9b/BO
gEIB+eozHBXMFVa5KTL5zwLkFGVH0zLzLI2KEL6gFApDjJCx6YIWAiWNbYKc
FDFr7HYfkDTI+Us4/M7eY4S2BwrPUcEyrzvI6/ah5fXw6rJ71X/949fyWxba
qxHvhnh2jkiGQSS9urXeumJF1KImiIibaDSxDXXNwrJjmmXrq3iw57U7XptR
2Nlg2Pm9xM/TWIVgc3cTpTtApzFJ6yyVOcZOZ7dzeHi4YkRKQ0OCYB4bk/N1
h35ABB/QJAPwms86Bwf73oG3jvJbCfghzaSvgORwujsvRrFxibv7Bwed9pJp
saeGh6XKqKyMaIkiwuWptcRoZIDkXOA22EGTC12vPYNubwiTzOZpgm33sARo
XGJB+yU4Sq/z/B5f2e+Jki84os4t+Ps7uPUcwro6sypRK7plDPOYRYnMIbS9
Rr6c8UfimvFbji2Ga7gdQHf1ZzWW0WD7JJY3Mv6NLNv39l54e49iGe4GRyCs
8DwPYiPGn/h9cwPAgUAwLDSDK3AwGvaToe2rhujzIgOTLIWKgADsl4GzeSsX
F9w+iDQnFDj/EJb5B+2Lq6nSIkrDghQokmOE+qI2mMZOZIILe3Yt5FKewYnA
pxC4glI6VpMi40MZozNt0UidjvNbcJk0ZKyyGX0p5sgwMQ/Ca0zYtPgpdg/G
EsxgCOwnua4fdp6KERCahHGB1FtEsi6N4nIWaBaY/Jt9wYJGrKsyQxQaphgt
7lFFWgxQhJWgCxXHQebb45upKIolfnuCoIq9Fo69e0Jfv+CjMhoWgCQixxrH
p4q3i2NhrCjyIl4g8TNQGeJSKakSdz0uYuA6xoAQySFohdC7xecGxBp1qEl6
JsFRAsnAVPJBpdhHGRjehGaVEQlcOh4TwonVtSQ2fKyjOPZD4H0tchDdMP95
+wnjkh0xSW8woUP8rZnv0vo6Dr9RkynMNEd0l+QEtK1Z57VQTk6ADRD1iu54
HKiM1dYZ1Av0MAu/xmzHVpDUBFwLE46TKsS/YEbEbVrEsEOAlOxD+hgTUxoN
eoJUcNIOHi3Insa4wrAIp8BJBzpuA9xLgu6nFNCP6D3BX6/x1swniyl2Wsbs
wwrmpFKYJANjNFHaLEMTg+pi8q9lDQTLCC6I7lmcZOAW0SC2xMfSncLgmQw0
SI02GG6K/EY9g0dk8JDbdUgWhFmqdXkEsGNcYgcYcD9pQhcT0G+gAVloKSIC
2YYZ7hNV6MZylN0MrI5Gxga85sd/j6sEKmtuf8eJ6Md/pzuqbQv+7vji8UYF
jjYCMYCTEqDiUZohh4McBamiGcjPckpHkyXfacyoUKAxgcgXc2JtZZBO4wI/
+OJNkIFoqc8wb5BzihFkj5UNJDa9BU8SJHoOW0hCij4dwXOKS3N0fYGVlWqk
iodmyQCVoMjvU+6mkPd6H91acWs1L9a6x8O1qtaXfVZdEMgpdHFQmEmwGvJT
gNK/lL0XqMIc7lUaWVjQOTs7uzYorLsitCTgn3bYd0QyxqOGFWBbgAvgXJF3
RtVwa3LOuhiA+0hCftAieuoE8hoYaqscJATbgjhNJhowB0dlTQ4GaV2ijYky
GwtGmL8x3lxEBfEfp8xcGmnJMQVo6WDmUaBZSlEaHZ4yYIuO39oRBCFhUent
PA9mEG6DhZVuNFC3UwVG5+MfkyWBs1hN6YAJmc/BQ2qSj6tGPGF8qbN5tbsc
cEnXjFVwAxdvB2RZWY5BzBjkQPMKzpN1sENqgGyxkeI4RVXEdYwyICgDvZ2w
98FU3+bGX8T3QawwIwbtlHXOyZHAVpZVyWleAzL0H5jrIWT50PhHYU4zCcjm
FHFzyBPVrTmYljlqnDbgn4zYgzCVZr67M7nsL18aALy7WisxKvCb8XckblRQ
x+CttQD+bcNEIogihjdBtTedOfh+MCDwSH5CgKXJpqJH1hYO2QM08o35/oiX
4F1MC8CX2gF2RkLIOk5qoGyDsuAelLGiqKPdsy7CJAVOcyG2hqcDUfPpILE/
1HG8IX5LECMxqwqMRAMfKKZQGTtWYxRLelFuP0gWdlroyMFBdUQLKbd8B929
uxtKBu0Hfsdv++0OzuSOsoUW24h6vHD2Cl2bmKeUq4L4DaCyCa3gP0mnz9As
K9gDVM+wBWZHEsAjZEmHVMS5cpqE4gb8jaVtaVUNTcXnrQlNBuOmcwXQXcC2
a0YBdpukOZwTQhsEAkCuL30+Qrwox8HOh7CBZ5sZ1KIqPqUS/1aFMATTOzK2
B2nFBa1+RLgS+eHqrkIDy0t7FSSMiC1JgGASFuSI9ow+N9AE3NFCK31NvgQx
rAeQIk9DAImARcASgMScgAVHj4ZKkSAwNrADlHUCIut8UVQQEEENsqApYXNu
rz0y6wjoqTXK2rAf+bM7h9AK2QB8MplL9gcGi1c5ZfSR+V0TGsX4DA0S4Q7k
TzpCni9PgfswHIcwqzT4gb42NHAY0UiFEQe0jnnMBgX2grcfPsZfFtO0MOAE
vSJkv2y9CeDM8WoxhBApQ52xNhM3AdAVtA+z54aMeYrmiNUlCBmgPOQPyPpz
bBkgBqDpiDggWC+xhNBKklIpBYovfkU2V42CUJF3jRcJkcQ7WBSk7QcMww5O
xsNsOsUOJQOGVz5fvlTI1VM+tqQk9CG3JxSrLtEMjDVkEwkN5z4FyzaSEMeD
qceMaw4rGa1npw9TGA1yaKSBC8hQmaGbfAQTqtqNER+npBZW1OqmQFmpv3o3
FB8+fBC8VMvFGU1ngumF/P9kN7wUxC/praRtoc1hLwqeC4IVZChI0mq2jB0y
ncuqz34kfqhn5sDfobc2tiQYpTdkpQBAQ5gLck8eDIXtemUzhEZB2BuSYWsy
YeREl60wki0VmV1nRrSRcJbO7XujqUemDB8F3UjZagj2YX5+T2GiZ119/dBo
HuNUA4LPywkrjjJpXUHFHMhFF0Fz+AviEKVkMjkfuxwxUMSVIdAL0LIm5XYr
2M3ILBKE+jpJUkQXoPlFAsFEOqFAuiKUBfk52BfZd/xcJy0tcorS2O2rzPlJ
s3vPJE3QwMvkRmVpQhKH+4hlwIqzTAmZEZaTTAL/wQeonGx9dKM0xnXEBhia
IRVwvDf3sB/xIjicIGKgoWu1BDYnbSO6JfJKp72ySZO0ugFMmhbaHRYnEmyV
EsfpMfjSYjJtWJ6jR40kFHSmzekn3jlrIWOjwGwpYZiKydssZXaapEcdqNbJ
qiDSvGYIoIGxTyTncbowSSItsGzHFx8MkkQap7AGoN/V+cX54PieFWaooiMk
RoN8jrgLZZ0jmWOwa0BdXibUXNKOknAVm2qv+lAM5I2JPDiD5JgIwT2gG5/v
PDB13kuTG2YbT3hc4erdk7B8+sV6LTRgWN+oxdbp++HVVov/FWfn9Pmy/1/v
B5f9Y/w8fNN998592DA9hm/O3787Lj+VI3vnp6f9s2MeDK2i1rSxddr9cYsd
1tb5Bd6Dd99trfI0YHg5MlI6x5QQQD+9UWPyq97F//x3+wAAw3+YmigIefgL
FkLBF4gUTOqJcAN/xbBhAxAc5q3RfsVg/oI53sGypQGkcZsI1FR/Y+MvH5Ez
Px+Jv47CefvgG9OABNcaLc9qjcSz1ZaVwczEhqaGZRw3a+1LnK7vt/tj7bvl
e6Xxr3/DmjXhtV/87RsnV03h5XI+7u4JuMovzv82m6JVdbV4ER2agX0t00gu
jz3e0hN2aq6R7BIjLnJmvVomAp8Wxv9jBJhRWIm5pXhBcfmR88bLbhgxwMN+
1wx2/hc6rr+tQzd4X95kLvES8mHHLLq6bmceDL+3fvqofvqZTdpPH1dLlX/6
uQJ0EODyLRJpyWowSqJPqlQNL9PEWWWbC3PXP9EWK7vZBkXqmNf96SNsARZ3
A9j+m0GM2ipBViKhkWNt49NJb1eXIw3GVKu9C3Hu2137OiK3yIieVbZfRYNP
dRlnN1sohQXAwDmGMrMiL+iD/BTGgCxupC/qjprDFvL2cKwjlZi0AC2OW3tb
X54AMWcT791KElW6Lk9SDpSxlrcOksdy7LxLk2uy6VqnN3R3hs3Vc7GRx4oT
WzRMADgRWFKLhIOGtSE8XphtL6iyZTyWGD2UOYAVkRytQNslBbPZt5piu2sN
Tukj9KJ8LkTfC56X4eS62GrVVCHuXG+TlK6qSnkwlaIEupapxab+09Z9XK7z
Cp37+vWJBEOB8S+oUksVApgaWsl1gaRMGCrdlwBYZYj/tHqR+DDuwXwZI7IG
YavQanpRUS3KVJHR96X7ELrFnqqRsia3pnNLLmnJsiKJLuXaq86rCYKZwLCm
imRPhuYyFW1+uXmTPYIQhANqWabgiczf4YVaTdM8wh+ROyJ7VHFJTE3Q4Jce
UWZihMlcZpksWpqh6qdcZljn9agq/bbCoRpyQ4QzXpF4nF4CbzNxnaS3euU5
WICM/QgXdHASo6B8p1yyrpoCMNJxifXJlADjaI+MN/lalzNHyMD362s2ZCai
uMolS1z+vHSwSLgks2uq/obl6WUY4l7KeREpU48JgDRFoaQ+hH+FqdWlKpAc
RW7HJRZ4GhKwqtUDi4TOk5kBlqafhGoOukKug8ZKvHElIySTMFvM7dBdeAit
3UkmpeuN3QLb4luoOCD7YRPIjcARVKpXzY/cPTFGx7MIsvkGyMrGSmKowlbO
IVGtBpZIUAK2IUVTRToGLxiLnHHA5oxwmaivCBlhCJcAUhgpxyrimesJo2oe
ja/Z/2Gui2vm09Ze1UqvWmbhcoek5TIvX5mgQ0onWTCHns33C/Vt437ReJo9
NW1Z8xscCkNPiIxQ3Agq8JUVhpBUpkS3mv/617+oNg/O2cq4eQFEHB39pxBD
iIX6Z72+GA7+3hfbbd8/7f6wgxXNVRXEmWCSmhvh8eevvuv3rsTguH92NTgZ
9C/Nkpsbq/C3AnVXE3dAMzjP3FwLlCZ7OZEJ3i5rIXdMws6ZOVZKZ/aYcc5E
NDiRPz2uWbmyqMqJIbUipfT6SfPFkkt3l3KyerfN74eau+wG6vDBN6K79jar
vlfzyNqJxiuEyuRVmTWlK+g9H75Lb7oLwPSjyWzx+yhabI9LKCp+OH3XEj92
8f/Q+t3w/GzHR7+/MpHLo2IdoHkuyzKiSgmnX2Xb6vn/0bxrgKOPZeCDNym/
h3tI3dVDE1e5GUQRjs7kDNP11T25y3ZupDpoxit8O1TjdE2f/mgm1yZ/NH+X
q6vuSRb44n29ocYiCDdzDHzdTNvKud5Rmub4Bg/aMjt7yyI3W7xahaQmM0YB
5o5whVS6xs0GI/RH87TJzlU5i6JRQlX5e1GqK4LCCytMW/CduLnfZqqta6ON
NXgi8lC2MF3cge9It9s7ZSl55KXZJEjUZ1pye38HYoNo+9mOKwGE3m64cIVa
24c7YgZxEozUM43f5tfq0/bzHbEvvhhH2WQgzZ/VbaIfvTNUXL067uAsbo4G
Q/GIOfZrc9T14LH7OKjN0XTuD89xiHMYPEDYc1YJsvhGsgSaOGXX3fzfPQkD
T5X9XUIchCCUEWkrqoQtStFCzvDWwN6Vr6soaIT/FACFOaLEQq67WjQ3ETZZ
VX9GKSYIanJWKxkAsFu5taaiGQzXG8BJ7tIBfyYkWbqJSSWXQcyBeipUzJe3
tZqn0i6SWBdy3z2xuuIObV1XWKEaStDlKFs9zLyRI6nG7ObydjU1Ws/LmJtK
Zd5TkBBV3VZqkBUWiIyKnCw0XgNmEnuBBH3il3FX+lK17o1yUZOpk6lcu6sm
rOrKZMgu/r/MJ/B9fmpYWKtJshcMa4qTWiblWE3kmc3VGx1Z6GeCSqDvMkb2
rrFc8b70kS9EzY6wIbIoGj5HSruv9yei+FKaksjR0s0vGyeI3VWeLz2ivHcY
ZBmVLYMcksGqEd3iHFdT6Z65NLBFN0TLb7qvtNWDDVk7U7hjE3euwnul9NmR
jGWBjkiwl9qcocpqrPNFN3EAFBZtZJkrEKDAiPL+4aOLHX0IcWl6IpDOb3X6
6mGuWWu97aynVV3JDgAFKtlxNVJlUZHPdvIC6+LCBjM55wdkJQf4WsFM1t4P
YLDTcu+LfEQ01PY7P28/MW/m77QaKlk+ITiZVCLJWAYZFa6yNX/EEvu8BL7k
v9NatmxmGU5ArXVmq2mWqYznmLJOR8wivHRH2UlkUxFnNa9eL7pttrUmEU66
ZNDuGgzQWnVzsKv1+2WDhUWsqcC3PXJjpqo/d3RVfc0jTifalMa1n3XAr9UL
tO4l1UElrCpekRgVJAGLCz6mDBDnNSMuSMEiZLmcGOBft7i7ox/VgN3MwCnG
VCphJWRN0fIpdxy4ly+3yjrnbRAS/5nf9g/h73N/b8dUBdOsS7Yr0EkbbBXu
+1d8XVvNwFLhJ0wPca6n8udXcSnpFgld8q8w5Mgzf8pPS39qD3AIgs82TwZK
CQRXf0tLXhf4ALfr4YuoAlepMpWSuY/hLFWb3M/D5sLvdWzEF54MyKG5g0zW
WVlNxD6ao7+Tq2s523GcXRflLHP3V45KKsMaA5vGYQfVYY2xTOOww+qwxvCl
SQSe4M9YJeltLKMJu7u7JwG1kNp9kOblLn5ZNKXy7GuHqDD7YSEtO2hyw/z9
cA9rXlAwjIMEQ40/SISVQxi7WO3/IFkAeWrMIGT0yxsy0yu3WDZUgdkwdiHU
PJYyGsGejSnBt3fxq6GObIFRbCANNdOC9FKujYUIIswrE9DlcbWaEV0xKUAl
XgrQD8kYuYSwT+D0mxt/7Z0f98Wr/uvB2fCb+nvCKMcYZX5NdP5wYM4mYHvP
DDAWQRbLRmEbrcYOR/HH/ZPB2QCrb4ZicHrxbtAbXImr7ushZxWIGmYvmbxu
FtIP6FDk2xgX//lkXs9x/Bezq4Y3x7+n8Nbt82sSFF+dnfjq1MRX5yU2N/pn
x6wjLKHwFeWzkq94ozT9zBuoXY8wFZqDKTfSDB/RePQjhARH4gJwlpYuJ2pe
PsAfb/lknQTWCgb0fmpWxUouwP0ZJ7VLjbN0JvbawvtG7HVMXp8TjlqYcECL
dkuIfQ77n9lSanpjKdBY6BpzvEaWbFtLcFMfXot3+KyHz9B8PPJnJ9tbOw9t
bmBfgjZVQaHpW7pSiLdwcx9ev+sxj+vT7dF0bTPdifokI0bFABLxfkeZuAYL
IqmEg2p1eaZHkeEYv7dXY2hUL9HBEBtfDhMwJTh9YFkQ8aXUw7u2E9IBACIM
6PIPT9qGcO3qOVXmLk8KQOwlvXoEe7kstK7PzDuDR2h4YF62zWyzq7xwvwH5
mxjyCkt5ZWKOUIfpXJavYdZeg8aoOwzML2bgF3pJi34kwMZ6/spJAnyme8sU
U2X+fdsF+0y/hHXPXgdYOwubWqNOFY82kngaLldIB4e6i16a2YxfwEVvbvwv
46aDIJtVAAA=

-->

</rfc>
