<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.4 (Ruby 2.6.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-rfc7030-csrattrs-01" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.0 -->
  <front>
    <title abbrev="CSRAttrs">Clarification of RFC7030 CSR Attributes definition</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc7030-csrattrs-01"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson" role="editor">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="O." surname="Friel" fullname="Owen Friel">
      <organization>Cisco</organization>
      <address>
        <email>ofriel@cisco.com</email>
      </address>
    </author>
    <author initials="D." surname="von Oheimb" fullname="Dr. David von Oheimb">
      <organization>Siemens</organization>
      <address>
        <email>dev@ddvo.net</email>
      </address>
    </author>
    <author initials="D." surname="Harkins" fullname="Dan Harkins">
      <organization>The Industrial Lounge</organization>
      <address>
        <email>dharkins@lounge.org</email>
      </address>
    </author>
    <date year="2022" month="September" day="30"/>
    <area>Internet</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>The Enrollment over Secure Transport (EST, RFC7030) is ambiguous in its specification of the CSR Attributes Response. This has resulted in implementation challenges and implementor confusion.</t>
      <t>This document updates RFC7030 (EST) and clarifies
how the CSR Attributes Response can be used by an EST server to specify
both CSR attribute OIDs and also CSR attribute values,
in particular X.509 extension values,
that the server expects the client to include in subsequent CSR request.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Enrollment over Secure Transport <xref target="RFC7030"/> (EST) has been used in a wide variety of applications.
In particular, <xref target="RFC8994"/> and <xref target="RFC8995"/> describe a way to use it in order to build out an autonomic control plane (ACP) <xref target="RFC8368"/>.</t>
      <t>The ACP requires that each node be given a very specific subjectAltName.
In the ACP specification, the solution was for the EST server to use
section 2.6 of <xref target="RFC7030"/> to convey to the EST client
the actual subjectAltName that will end up in its certificate.</t>
      <t>As a result of some implementation challenges, it came to light that this particular way of using the CSR attributes was not universally agreed upon, and it was suggested that it went contrary to section 2.6.</t>
      <t>Section 2.6 says that the CSR attributes "can provide additional
descriptive information that the EST server cannot access itself".
This is extened to mention also values that the EST server demands to use.</t>
      <t>After significant discussion, it has been determined that
<xref section="4.5" sectionFormat="of" target="RFC7030"/> specification is sufficiently difficult
to read and ambiguous to interpret that clarification is needed.</t>
      <t>This document motivates the different use cases, and provides additional worked out examples.</t>
      <t>Also section 4.5.2 is extended to clarify the use of the existing ASN.1 syntax.
This covers all uses and is fully backward compatible with the existing use.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="csr-attributes-handling">
      <name>CSR Attributes Handling</name>
      <section anchor="extensions-to-rfc-7030-section-26">
        <name>Extensions to RFC 7030 section 2.6.</name>
        <t>Replace the second paragraph with the following text:</t>
        <artwork><![CDATA[
   These attributes can provide additional descriptive information that
   the EST server cannot access itself, such as the Media Access Control
   (MAC) address of an interface of the EST client. The EST server can also
   provide concrete values that it tells the client to include in the CSR,
   such as a specific X.509 Subject Alternative Name extension. Moreover,
   these attributes can indicate the kind of enrollment request, such as
   a specific elliptic curve or a specific hash function that the client
   is expected to use when generating the CSR.
]]></artwork>
      </section>
      <section anchor="extensions-to-rfc-7030-section-452">
        <name>Extensions to RFC 7030 section 4.5.2.</name>
        <t>The ASN.1 for CSR Attributes as defined in EST section 4.5.2 is:</t>
        <artwork><![CDATA[
   CsrAttrs ::= SEQUENCE SIZE (0..MAX) OF AttrOrOID

   AttrOrOID ::= CHOICE (oid OBJECT IDENTIFIER, attribute Attribute }

   Attribute { ATTRIBUTE:IOSet } ::= SEQUENCE {
        type   ATTRIBUTE.&id({IOSet}),
        values SET SIZE(1..MAX) OF ATTRIBUTE.&Type({IOSet}{@type}) }
]]></artwork>
        <t>This remains unchanged, such that bits-on-the-wire compatibility is maintained.</t>
        <t>Key parts that were unclear were which OID to use in the 'type' field and
that the 'values' field can contain an entire sequence of X.509 extensions.</t>
        <t>The OID to use for such extensions in the 'type' field MUST be extensionRequest,
which has the numerical value 1.2.840.113549.1.9.14.
There MUST be only one such attribute.</t>
        <t>The 'values' field of this attribute MUST contain a set with exactly one element,
and this element MUST by of type Extensions, as per <xref section="4.1" sectionFormat="of" target="RFC5280"/>:</t>
        <artwork><![CDATA[
   Extensions  ::=  SEQUENCE SIZE (1..MAX) OF Extension

   Extension  ::=  SEQUENCE  {
        extnID      OBJECT IDENTIFIER,
        critical    BOOLEAN DEFAULT FALSE,
        extnValue   OCTET STRING
                    -- contains the DER encoding of an ASN.1 value
                    -- corresponding to the extension type identified
                    -- by extnID
        }
]]></artwork>
        <t>In each such Extensions sequence, an extnID OID MUST appear at most once.</t>
        <t>An Extension comprises of the OID of the specific X.509 extension (extnID),
optionally the 'critical' bit, and the extension value (extnValue).</t>
        <t>With this understanding, the needs of <xref target="RFC8994"/> and <xref target="RFC8995"/> are satisfied
with no change to the bits on the wire.</t>
      </section>
    </section>
    <section anchor="co-existence-with-existing-implementations">
      <name>Co-existence with existing implementations</name>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="acpNodeName">
        <name>RFC8994/ACP subjectAltName with specific otherName</name>
        <t>This is a CSR Attributes object that might be created by an <xref target="RFC8995"/> Registrar that is asking for <xref target="RFC8994"/> AcpNodeName format otherNames.</t>
        <artwork><![CDATA[
    <30 64>
  0 100: SEQUENCE {
    <30 62>
  2  98:   SEQUENCE {
    <06 09>
  4   9:     OBJECT IDENTIFIER extensionRequest (1 2 840 113549 1 9 14)
       :       (PKCS #9 via CRMF)
    <31 55>
 15  85:     SET {
    <30 53>
 17  83:       SEQUENCE {
    <06 03>
 19   3:         OBJECT IDENTIFIER subjectAltName (2 5 29 17)
       :           (X.509 extension)
    <01 01>
 24   1:         BOOLEAN TRUE
    <04 49>
 27  73:         OCTET STRING
       :           A0 47 30 45 06 08 2B 06    .G0E..+.
       :           01 05 05 07 08 0A 0C 39    .......9
       :           72 66 63 38 39 39 34 2B    rfc8994+
       :           66 64 37 33 39 66 63 32    fd739fc2
       :           33 63 33 34 34 30 31 31    3c344011
       :           32 32 33 33 34 34 35 35    22334455
       :           30 30 30 30 30 30 30 30    00000000
       :           2B 40 61 63 70 2E 65 78    +@acp.ex
       :           61 6D 70 6C 65 2E 63 6F    ample.co
       :           6D                         m
       :         }
       :       }
       :     }
       :   }
]]></artwork>
      </section>
      <section anchor="specific-subjectaltname-example-with-other-extensions">
        <name>Specific SubjectAltName example with other extensions</name>
        <t>This is a CSR Attributes object
with two non-critical basicConstraints and extKeyUsage extensions
and a critical X.509 subjectAltName extension that contains both
an RFC8994/ACP Subject Alternative Name with a specific otherName
and an example Subject Alternative Name value of type dNSName.</t>
        <artwork><![CDATA[
SEQUENCE {
  SEQUENCE {
    OBJECT IDENTIFIER extensionRequest (1 2 840 113549 1 9 14)
    SET {
      SEQUENCE {
        SEQUENCE {
          OBJECT IDENTIFIER basicConstraints (2 5 29 19)
          OCTET STRING, encapsulates {
            SEQUENCE {}
            }
          }
        SEQUENCE {
          OBJECT IDENTIFIER extKeyUsage (2 5 29 37)
          OCTET STRING, encapsulates {
            SEQUENCE {
              OBJECT IDENTIFIER serverAuth (1 3 6 1 5 5 7 3 1)
              }
            }
          }
        SEQUENCE {
          OBJECT IDENTIFIER subjectAltName (2 5 29 17)
          BOOLEAN TRUE
          OCTET STRING, encapsulates {
            SEQUENCE {
              [0] {
                OBJECT IDENTIFIER '1 3 6 1 5 5 7 8 10'
                [0] {
                  IA5String
            'fd89b714f3db00000200000064000000+area51.research'
            '@acp.example.com'
                  }
                }
              [2] 'domain.example'
              }
            }
          }
        }
      }
    }
  }
]]></artwork>
      </section>
      <section anchor="est-server-requires-public-keys-of-a-specific-size">
        <name>EST server requires public keys of a specific size</name>
        <t>TBD</t>
      </section>
      <section anchor="est-server-requires-a-public-key-of-a-specific-algorithmcurve">
        <name>EST server requires a public key of a specific algorithm/curve</name>
        <t>TBD</t>
      </section>
      <section anchor="est-server-requires-a-specific-extension-to-be-present">
        <name>EST server requires a specific extension to be present</name>
        <t>TBD</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations from EST <xref target="RFC7030"/> section 6 are unchanged.</t>
      <section anchor="identity-and-privacy-considerations">
        <name>Identity and Privacy Considerations</name>
        <t>An EST server may use this mechanism to instruct the EST client about the identities it should include in the CSR it sends as part of enrollment.
The client may only be aware of its IDevID Subject, which includes a manufacturer serial number.
The EST server can use this mechanism to tell the client to include a specific fully qualified domain name in the CSR in order to complete domain ownership proofs required by the CA.
Additionally, the EST server may deem the manufacturer serial number in an IDevID as personally identifiable information, and may want to specify a new random opaque identifier that the pledge should use in its CSR.
This may be desirable if the CA and EST server have different operators.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>No requests are made to IANA.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TODO</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC7030" target="https://www.rfc-editor.org/info/rfc7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin">
              <organization/>
            </author>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee">
              <organization/>
            </author>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins">
              <organization/>
            </author>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport.  This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates.  It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC8994" target="https://www.rfc-editor.org/info/rfc8994">
          <front>
            <title>An Autonomic Control Plane (ACP)</title>
            <author fullname="T. Eckert" initials="T." role="editor" surname="Eckert">
              <organization/>
            </author>
            <author fullname="M. Behringer" initials="M." role="editor" surname="Behringer">
              <organization/>
            </author>
            <author fullname="S. Bjarnason" initials="S." surname="Bjarnason">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>Autonomic functions need a control plane to communicate, which depends on some addressing and routing.  This Autonomic Control Plane should ideally be self-managing and be as independent as possible of configuration.  This document defines such a plane and calls it the "Autonomic Control Plane", with the primary use as a control plane for autonomic functions.  It also serves as a "virtual out-of-band channel" for Operations, Administration, and Management (OAM) communications over a network that provides automatically configured, hop-by-hop authenticated and encrypted communications via automatically configured IPv6 even when the network is not configured or is misconfigured.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8994"/>
          <seriesInfo name="DOI" value="10.17487/RFC8994"/>
        </reference>
        <reference anchor="RFC8995" target="https://www.rfc-editor.org/info/rfc8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <author fullname="M. Behringer" initials="M." surname="Behringer">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8368" target="https://www.rfc-editor.org/info/rfc8368">
          <front>
            <title>Using an Autonomic Control Plane for Stable Connectivity of Network Operations, Administration, and Maintenance (OAM)</title>
            <author fullname="T. Eckert" initials="T." role="editor" surname="Eckert">
              <organization/>
            </author>
            <author fullname="M. Behringer" initials="M." surname="Behringer">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM), as per BCP 161, for data networks is often subject to the problem of circular dependencies when relying on connectivity provided by the network to be managed for the OAM purposes.</t>
              <t>Provisioning while bringing up devices and networks tends to be more difficult to automate than service provisioning later on.  Changes in core network functions impacting reachability cannot be automated because of ongoing connectivity requirements for the OAM equipment itself, and widely used OAM protocols are not secure enough to be carried across the network without security concerns.</t>
              <t>This document describes how to integrate OAM processes with an autonomic control plane in order to provide stable and secure connectivity for those OAM processes.  This connectivity is not subject to the aforementioned circular dependencies.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8368"/>
          <seriesInfo name="DOI" value="10.17487/RFC8368"/>
        </reference>
      </references>
    </references>
    <section anchor="raw-der-for-examples">
      <name>Raw DER for examples</name>
      <t>This section contains Base64 versions of all examples that were decoded.</t>
      <section anchor="raw-rfc8994acp-subjectaltname-with-specific-othername">
        <name>Raw RFC8994/ACP subjectAltName with specific otherName</name>
        <t>example in <xref target="acpNodeName"/></t>
        <artwork><![CDATA[
MGQwYgYJKoZIhvcNAQkOMVUwUwYDVR0RAQH/BEmgRzBFBggrBgEFBQcICgw5cmZjODk5NCtmZDcz
OWZjMjNjMzQ0MDExMjIzMzQ0NTUwMDAwMDAwMCtAYWNwLmV4YW1wbGUuY29t
]]></artwork>
      </section>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAEIYN2MAA61a63Iay7X+P0/RsauOpDLM5qoLlZwyAmSTLcAGtB07lUo1
Mw2MPUyTuQjLKp1nOc+SJ8u3Vs8NhPbeqQQja2a6e/W6fmutHlWrVeu+I5qW
FXuxrzqi58vQW3qOjD0dCL0U05veRa1ZE73ZVHTjOPQWSawi4aqlF3g0yZKL
RahABDNoQmS52gnkBsTcUC7jqqfiZdWXm21UDZcOEas6UShparVWt6woloH7
d+nrAEviMFGW5W1DvoziRq12VWtYMlSyI4ZBrMJAxdZu1RG33dGHmfikw29e
sBLvQp1srW+7YlK1T7tbkKQjoti1rK3XEfi8Fo4MRBIpIcNQPohTbymk74sH
FZ0JHYq1jNZirUJlCRFrp0MDuIx0GIdqGXWYBMSXiR9HmJGNP2zMMN1aMonX
OuxYVeEFeDayxdRz1jJ0IyhMCKOeET1S/v6QDiHbDBpR/gZ8zvQy3kF6FpT2
URvp+R2xccI3pNi3UTbVdiSGQ01WVK4X6zDbfWKLm9BTfr7xZKeC/BFv2PMi
RxfU9ZIG3zr01Hb0JqPUt8U93GKyVt5mkZPrh7boy3vP3R80knhqo4IS4666
f+u699omOxZk30uyY1TQhOzFMyY1XysY14VThJ70xa1OgpUqEV6b6W99HrCx
xrICHW7gyveqg4lw5XbjspZekiOml5dXV62O6PY+5Lftjriezn4ewhWD5QGN
y+b5ZceyqtWqkAswI53Ysoi5QQDt+xA3FvpehWKmnASWm4cyiLZwH3E6mM0r
2d5nwouE3Cy8VaKTCIoQHvwp2ipnL/5iED6IvakCuSBSNlQCGnBYEaoI7qhc
JrPZ+qT02NCAb/m+gkawW+AWo3B1RwfLJMIkmwQAKURuwvwnW1fyVmn0E+dn
vN4xAAEnX+vdr3HHYbZQFGmuWDxgsQAREamQdIO4MaI+WAsdr5mIzIiIybBv
uJV+pA/G7qWfqKgCw4itDGPPScCR+Ivdrl0J9T2Gs5HU2ax4LWPmMt1Xfceu
FLd45PgeyQpWvMDxE1eR9qJkEal/JDRA+4Z0HcW2sffGc10f+PSaUCbUbuIw
Alq/afnHx1STT0+pLslqC6UCox9sLMXOc0k8hF78QKaX262fekJkW8OyvBVD
kRwXFElT2X0b966KHGhLEU0gHAQkuPNi2kaHrlH/IvF8V+gkJssAr3SgN55D
PgHJfLH1ZaDEKYLiLKUNt396so2r4zGrxoPjCdaxks5aBBoSYN8VooUkgi4e
cpcm1X6F8rt+PEaMs0RxSmvP7SvGYNpP2IF30BRikB/uexCksiLFNhAN+5x0
VlY0ZkCae8UayFYbo1t0i8BNACT7bBlpdh4ygoJak20WmY6C8plFsG514Z9p
1NG2kcbKFwOvQrp3mLgWvrdaxyL1S8RcyYnJWCCGkERGy0JLFqFFmgg0ojOA
fsMI5BFWq1Ap4pP0xgEe87woWWFnggTeip6Se7J5ZcgqKakOEs1KiozkQyTy
0Dng4hUF9jbU9+Su0nW5CpC+ZbxuS0gpctTUQUGnZDyQIEGk46goIvUqf/nK
NiCEL8cxsa4F6ZOoMBKYqD5K0UUaCNwodQuy0BJ1gIi8VcBWg+wu0lkSRexh
0Ecega7CzI0XpLqyHh8zXbTsdqkGgkvtw7NHal7illwKtnA9uoFLWOACFYtr
MCzHeEYa7LUNVeoBzl65BXoBjKncZ3i80VArIzKJTfugQCGcZpyNyMVoq9Qq
UcksYofCQZlAV98luWhE2iF1RoWYdiPXu2sUb1h74A1pmzQXqe9eFJN/dmdj
u46yB+7+PbWcQ+AXcTWFFWm+QfAm5KgL6XxDJYMMojdbyLvwFcIM0L9H1dju
tZizRbSvVw8Gcb4hjCEKLPxqdDebv6qY32I84evp4OPdcDro0/Xsfff2Nr+w
0hmz95O7235xVazsTUajwbhvFuOp2HtkvRp1P78y+n01+TAfTsbd21eECvGe
iahII1hVhY2hSBlZGRozyl/3Pvzz/+st4NQf4FWNev0KXmVuLusXBOa7tUoj
WQdQm7mFjh4s5AMFlKBcAQ07cuvFiArMhRsiGQdctUJ7UN9BTn4Pcj7Ui6HX
YpAlSXZIbCw4xe+jwVQhATgqTZ1ADZeACmAjt+vCbEtkPb1jtILroCj6P3xQ
JVGtRgV2wcFxzBC/hhlE53fARgUxiNQjTWiMUPpK0TUTeiaXEaHTUbd3RjuH
NEDJNTB2WpKUqW8X+cHmanN/Z4YgopXJAa04ZOU9WAKwxMr3f6XCSCG1QqQy
1mWRJU0lMzNJSSAroZvh8lNwespLHFuMdKgo4iqppp5r3AtcTli8J4pjlyRV
RbGSVje5ColQiRXIQbZBUZBACdQclQa5T1omgbMP8ml+BSHGE6q2DJ4QhpAz
ixWgHe1fKcfZxm9+h3MyUmU1CAMQVQYH3i7T9tREnDHiPtAZTyUme1HITavo
dP4kZgCRwbg3ELPhl4E4rdn2qPuXMzG5YeqTEGWpRYvyO17Vez8ZYs2pRgM0
uf7zoDcXw/5gPB/eDAfTSqlyzVkUTzkZc/8ouvP5dHh9Nx90hpMZssPTPkOP
NJ8/8cNW0dpsvv0/nnv6yIuezir5tNQlZ4M5C3NaL8lSLJ2DWLb48S2RfjoD
c2wMRvSQmivYAmZeS5QybuoqbO4FArCqgyqsWN2hEsyR3fM9VLBYTotjSZaA
zX4GglOxkwbKDmBFdH3CNL7ZrdEIU+2fV6wmWE6IsROBpsPnjFoU9SdGzGyM
XJ4KHEkQGQiqHEKCLyrnTZQftAlR6kqlPcmfWMRi0lE+OPksSvE4TWPJMmKs
U0AKkB1CBKFvTCLq8N/LVs2u15vt1pVdt/HTovxJGsiIMvJr1N8mLjM/Sbk9
kJrBi3rJ3J2YTK4IKCA2kI3878QpZWVK1YpFmYbXp09SJrgSZWcrQpJTzRZo
WK6Q6mmFRK3101MRWaVIZl8+jK6SR+ZTrb2Fh+tKUQCtB7AZf57HXD4NuSVm
3eNzPZncDrpj0R/cdO9u5+KmezsbVPYo/sIWAsXenOIGYTJ+l08of9AKpuo1
Ru4PpvA2R7sEaia5GHRiS71MIgy5WeZlaY9StLCsfOSZgNoO5b5EBZYy2sgn
pAGM9oqbMvahkjWyeKhwjBhFUgCw3dMaQ1LJGaG1wTyqFoOSVSjKQ4/quzRt
0uL08iCLFcKcmo2AUHprcr9vSsuTzEYnhCem8NnXg4mb09xAZ2Dok6lAPEIm
9LN8hAglms6RaugobwZf6JGpXIsAVhHrlsMj0MKgXGYLAjihTfATwHFl2tNV
rlYZUtKwSovX/QYwotmDtOTm5JZy8xN3vPtdJxPKtaexY8jPH19LZztGW013
T1beIcnDpKdNvcDQuOEWEziC8kTG+fFLWfypWnl0dhWmVQtlTT5IJfwr661b
bC9MfVZwR/CZVXzij0jT563/xXVN1Gu1zmHy4vEGjTeEuLqkc9TDGbVzUbui
GS3cXXWOR/czxAWUgCQwVRhMFXWBn9ZZFg+d9Pfph597M/H6StyjQuxNRzdn
KV910W5j13pbiMu2mU15s2C73aThCww3M2LHWOdZV7jLZx1j/8Dwpw3RFg0w
fPGMYWb6IJBSnmt1UatjuwZpql4syEBuPr0bpDNbokU6bYD9izJjRzCuvHG3
JloXAsK32oKEuxSNa7rAx35XG9j2G/vYMmKszd8LWlPrilpPNK94mflcHVt2
0RDn5+K8KZqXNJu+LdoQn3DpkCu+ObaM1rREE3w2aU1KokFDS/eiebV0GseW
YTbNa9Im9K0J+AC+NOQ0W61avX50WYO/5ZVt+uLTaDSxrt0+uqx2/EvaSj/H
lkF6uPR5nVi9qInGQJy3xcUlDb15C1Cw1fejKsGCPi0479ECWgZpb2iIkcjm
c/7ny/ripc/m+fynw0cHD/Zun4rqfpYB3Gw/CNKDCYOCDC+l8us3Qc+gd7zT
QPCgmuf8hYw8By0gwRzKUHMcAbKoQ+8iuVLlLficpigXTNBFh0zmmZmPbrIC
gM6vQWAP3V9s35hVeQTpDQtBrooXKZh0mBVn7nhmDlM55++h0gFE/YdAWiDi
M8ovPDq25TOb5PB3dVZeWAKnClVWchslPp9/lemXt33ae16+e/p3mSz7SMZf
8+I/5O+gfDuSF/igoZvAP2AHxCzU38Y/gJuonx0s/y9K+9v5SBzJK/8tPfy1
9rdnz45xebKvkkuUGCfPlh0nJsSw254BM4LV3tjJ0r28WlzUW8umu2AYbhg0
Pm+Z32/orXO7bqNIR03srPc3PElBOEPVzXN+Du107MlfG38TJ66mTjkjdkjo
9xg7uzK/6f+0C6AzleIYK39ns00WPuDnm3owp2GltzTeDwXIve6/uFaWVh8s
lv5KA0TXm5/4yOi36BQnTQW28hHqlnQexOl61NH8Ro1OFQg80BSFWYk9NweU
ZtDZGxTLUG945/Jboews6JxbgPxgw2Y2h9xuxQ+cKz6E3r10nm/Z3XuTuZEP
fHDA3chGETkv2pgzP8Bc4sQHZ4tCLugwnh6a7i72FB1m0iFu4rtHjgp5UNHb
DWneF+0f4/HpQUac2OHjA3r9x385gLnUxwz76h6NWppXKulpS7oZGWMjg2RJ
78RCem+i+CV7kGwWKjQbHJyGHpeZzj5fOPosmdu8EfhHIn1ubYXxf371vyd2
6XUldZ0+Hbamc/UuQN+39rZ0HKuXUeZW3Owwga5tdfOTZv+hcniYTJpyldrw
85eFF+YwKVWfOQCJ0gY2684lvcwonV+bNpY22EmjhPRlN5QQqJ0IMQzX1FuJ
xFv0+GFxjApZXaSf1CXSwzAyIx+XckFE5GFkGM8LDQPpXwt0efeSpGt5X35p
pLfkyzqMuJ8ddsfdZy4+1tnZcMRhspEud8U0mVd1nW+B3jGT5IIUiJP+hPtj
jidfryzzzpze+9DzqdzxOQk1mCrvilmSLCTzkupaRgqFPb1N4kDW5k90smWl
A0RXOdrNope2+Pd7bMvKai6PeuRyv/2U9rejdx93n1ef//yz/jJc3zvj7sdv
k9Evd7u73ef+L9PatPvx/U/Xg81q+uP65nq1Cq9Xg5vrj86wt9q1nc2Xr5P+
t/a4F2++9J0f1uTTl6+jr+Ovox8fa6P+4Pvo6/AHXY/nd7tRv2t+enH386fx
7nbzS+vzp/pu8e4u+dy4ig07/wKAU7DetiUAAA==

-->

</rfc>
