<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.43 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ounsworth-lamps-pq-external-pubkeys-01" category="std" consensus="true" submissionType="IETF" updates="{&quot;RFC5280&quot;=&gt;nil}" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->
  <front>
    <title abbrev="External X.509 Keys">External Keys For Use In Internet X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-ounsworth-lamps-pq-external-pubkeys-01"/>
    <author initials="M." surname="Ounsworth" fullname="Mike Ounsworth">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>1000 Innovation Drive</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 1E3</code>
          <country>Canada</country>
        </postal>
        <email>mike.ounsworth@entrust.com</email>
      </address>
    </author>
    <author initials="M.-J. O." surname="Saarinen" fullname="Markku-Juhani O. Saarinen">
      <organization>PQShield</organization>
      <address>
        <email>mjos@pqshield.com</email>
      </address>
    </author>
    <author fullname="J. Gray">
      <organization>Entrust</organization>
      <address>
        <email>john.gray@entrust.com</email>
      </address>
    </author>
    <author fullname="D. Hook">
      <organization>KeyFactor</organization>
      <address>
        <email>david.hook@keyfactor.com</email>
      </address>
    </author>
    <date year="2023" month="September" day="30"/>
    <workgroup>LAMPS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 70?>
<t>Many of the post quantum cryptographic algorithms have large public keys. In the interest of reducing bandwidth of transitting X.509 certificates, this document defines new public key and algorithms for referencing external public key data by hash, and location, for example URL. This mechanism is designed to mimic the behaviour of an Authority Information Access extension.</t>
      <!-- End of Abstract -->



    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://EntrustCorporation.github.io/draft-pq-external-pubkeys/draft-ounsworth-pq-external-pubkeys.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ounsworth-lamps-pq-external-pubkeys/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/EntrustCorporation/draft-pq-external-pubkeys"/>.</t>
    </note>
  </front>
  <middle>
    <?line 76?>

<section anchor="sec-intro">
      <name>Introduction</name>
    </section>
    <section anchor="sec-pub">
      <name>External Value</name>
      <t>The id-external-value algorithm identifier is used for identifying a public key or signature which is provided as a reference to external data.</t>
      <artwork><![CDATA[
id-external-value OBJECT IDENTIFIER  ::=  { iso(1)
            identified-organization(3) dod(6) internet(1)
            security(5) mechanisms(5) pkix(7) algorithms(6)
            TBDOID }
]]></artwork>
      <t>EDNOTE: for prototyping purposes, <tt>id-external-value ::= 1.3.6.1.4.1.22554.4.2</tt></t>
      <t>The corresponding subjectPublicKey is the DER encoding of the following structure:</t>
      <artwork><![CDATA[
ExternalValue ::= SEQUENCE {
  location     GeneralName,
  hashAlg      AlgorithmIdentifier,
  hashVal      OCTET STRING
}
]]></artwork>
      <t>Upon retrieval of the referenced data, the hash of the OCTET STRING of the retrieved data (removing base64 encoding as per <xref target="RFC4648"/> if necessary) MUST be verified using hashAlg to match the <tt>ExternalPublicKey.hash</tt> value.</t>
      <section anchor="external-public-key">
        <name>External Public Key</name>
        <t>When used with a public key, algorithm parameters for id-external-value are absent.</t>
        <t>When ExternalValue is placed into a SubjectPublicKeyInfo.subjectPublicKey, the ExternalValue.location MUST refer to a DER-encoded SubjectPublicKeyInfo, which MAY be base64 encoded as per <xref target="RFC4648"/> for easier transport over text protocols.</t>
        <!-- End of Introduction section -->

</section>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>##  Object Identifier Allocations</t>
      <section anchor="module-registration-smi-security-for-pkix-module-identifier">
        <name>Module Registration - SMI Security for PKIX Module Identifier</name>
        <ul spacing="normal">
          <li>Decimal: IANA Assigned - <strong>Replace TBDMOD</strong></li>
          <li>Description: EXTERNAL-PUBKEY-2023 - id-mod-external-pubkey</li>
          <li>References: This Document</li>
        </ul>
        <section anchor="object-identifier-registrations-smi-security-for-pkix-algorithms">
          <name>Object Identifier Registrations - SMI Security for PKIX Algorithms</name>
          <ul spacing="normal">
            <li>
              <t>Attest Statement
              </t>
              <ul spacing="normal">
                <li>Decimal: IANA Assigned - Replace <strong>TBDOID</strong></li>
                <li>Description: id-external-value</li>
                <li>References: This Document</li>
              </ul>
            </li>
          </ul>
          <!-- End of IANA Considerations section -->

</section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There are no security implications to externalizing a public key from a certificate as described in this draft. It is of course possible for a malicious actor to replace or tamper with the public key data at the referenced location, but since the hash of the public key data is included in the signed certificate, any such tampering will be detected and the certificate verification will fail. For this reason, external public key data MAY be served over an insecure channel such as HTTP.</t>
      <section anchor="csrs-and-ct-logs">
        <name>CSRs and CT logs</name>
        <t>In practice, situations will arise where the ExternalPublicKey.location refers to a location which is not publicly available either because it is in a local keystore, on a private network, or no longer being hosted.</t>
        <t>Not having the public key in a certificate signing request (CSR) could make it substantially harder for CAs to perform vetting of the key, for example for cryptographic strength or checking for prior revocation due to key compromise. A certificate requester MUST make the full public key available to the CA at the time of certificate request either by ensuring that the link in the ExternalPublicKey.location is visible to the CA, or by supplying the full public key to the CA out of band.</t>
        <t>Not having the public key in Certificate Transparency (CT) logs could make it substantially harder for researchers to perform auditing tasks on CT logs. This may require additional CT mechanisms.</t>
        <!-- End of Security Considerations section -->

</section>
    </section>
    <section anchor="appendices">
      <name>Appendices</name>
      <section anchor="asn1-module">
        <name>ASN.1 Module</name>
        <artwork><![CDATA[
EXTERNAL-PUBKEY-2023
           {iso(1) identified-organization(3) dod(6) internet(1) security(5)
       mechanisms(5) pkix(7) id-mod(0) id-mod-external-pubkey(TBDMOD)}

DEFINITIONS IMPLICIT TAGS ::= BEGIN

EXPORTS ALL;

IMPORTS

  GeneralName
  FROM PKIX1Implicit-2009
      {iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-pkix1-implicit-02(59)}

  AlgorithmIdentifier{}
  FROM AlgorithmInformation-2009
      {iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0)
      id-mod-algorithmInformation-02(58)}

;

id-external-value OBJECT IDENTIFIER  ::=  { iso(1) 
            identified-organization(3) dod(6) internet(1) 
            security(5) mechanisms(5) pkix(7) algorithms(6)
            TBDOID }

ExternalValue ::= SEQUENCE {
  location     GeneralName,
  hashAlg      AlgorithmIdentifier,
  hashVal      OCTET STRING
}

END
]]></artwork>
      </section>
      <section anchor="samples">
        <name>Samples</name>
        <t>Here is a sample of a Kyber1024 end entity certificate with an external public key. A trust anchor certificate using the algorithm ecdsaWithSHA256 is provided so that the Kyber1024 End Entity certificate can be verified.</t>
        <t>This is a modest example demonstrating a 550 byte Kyber1024 certificate and a 2.2 kb external Kyber1024 public key. This "compression" effect will be even more pronounced with algorithms such as Classic McEliece which have public keys in the hundreds of kilobytes; with the external public key mechanism, the size of the certificate remains constant regardless of how large the externalized subject public key is.</t>
        <t>End entity Kyber1024 Certificate with <tt>ExternalValue</tt> public key:</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----
MIIBajCCAQ+gAwIBAgIGAYrnq6R7MAoGCCqGSM49BAMCMDoxDjAMBgNVBAMMBVFT
IENBMRswGQYDVQQKDBJRdWFudGl0eSBTdXJ2ZXlvcnMxCzAJBgNVBAYTAlhYMB4X
DTIzMDkzMDE5NTgyMFoXDTI0MDEwODE5NTgyMFowHTEbMBkGA1UEAwwSRXRoZWwg
dGhlIEFhcmR2YXJrMGcwDAYKKwYBBAGBsBoEAgNXADBUhiNmaWxlOi8vbG9jYWxf
a2V5c2VydmVyL3N1cnZleW9ycy5kYjALBglghkgBZQMEAgEEIOc9S8iXUv01kSjc
XaG0mpL5O0a5GOOOckd6m84UK/VToxAwDjAMBgNVHRMBAf8EAjAAMAoGCCqGSM49
BAMCA0kAMEYCIQCsdcyyIrcGy3Ro4WyOYhAHoxSXFO0Ptgfm9FaXAqno9wIhAJLy
vNED2FxrxJCu5y+4EZyFIA2cZ2IU40FILxaB3Y72
-----END CERTIFICATE-----
]]></artwork>
        <t>For illustrative purposes, the <tt>SubjectPublicKeyInfo</tt> within the end entity certificate decodes as:</t>
        <artwork><![CDATA[
subjectPublicKeyInfo SubjectPublicKeyInfo SEQUENCE (2 elem)
      algorithm AlgorithmIdentifier SEQUENCE (1 elem)
        algorithm OBJECT IDENTIFIER 1.3.6.1.4.1.22554.4.2 ExternalValue
      subjectPublicKey BIT STRING (688 bit)
        SEQUENCE (3 elem)
          [6] (35 byte) file://local_keyserver/surveyors.db
          SEQUENCE (1 elem)
            OBJECT IDENTIFIER 2.16.840.1.101.3.4.2.1 sha-256
          OCTET STRING (32 byte) E73D4BC89752FD359...
]]></artwork>
        <t>The external public key object referenced by the end entity certificate is:</t>
        <artwork><![CDATA[
-----BEGIN PUBLIC KEY-----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-----END PUBLIC KEY-----
]]></artwork>
        <t>For illustrative purposes, the key data, which is itself a <tt>SubjectPublicKeyInfo</tt>, decodes as:</t>
        <artwork><![CDATA[
SEQUENCE (2 elem)
  SEQUENCE (1 elem)
    OBJECT IDENTIFIER 1.3.6.1.4.1.22554.5.6.3 Kyber1024
  BIT STRING (12544 bit) 01101111...
]]></artwork>
        <t>The following trust anchor certificate can be used to validate the above end entity certificate.</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
      </section>
      <section anchor="intellectual-property-considerations">
        <name>Intellectual Property Considerations</name>
        <t>None.</t>
      </section>
    </section>
    <section anchor="contributors-and-acknowledgements">
      <name>Contributors and Acknowledgements</name>
      <t>This document incorporates contributions and comments from a large group of experts. The Editors would especially like to acknowledge the expertise and tireless dedication of the following people, who attended many long meetings and generated millions of bytes of electronic mail and VOIP traffic over the past year in pursuit of this document:</t>
      <t>Serge Mister (Entrust).</t>
      <t>We are grateful to all, including any contributors who may have
been inadvertently omitted from this list.</t>
      <t>This document borrows text from similar documents, including those referenced below. Thanks go to the authors of those
   documents.  "Copying always makes things easier and less error prone" - <xref target="RFC8411"/>.</t>
      <section anchor="making-contributions">
        <name>Making contributions</name>
        <t>Additional contributions to this draft are welcome. Please see the working copy of this draft at, as well as open issues at:</t>
        <t>https://github.com/EntrustCorporation/draft-ounsworth-pq-external-keys</t>
        <!-- End of Contributors section -->

</section>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC4648">
        <front>
          <title>The Base16, Base32, and Base64 Data Encodings</title>
          <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
          <date month="October" year="2006"/>
          <abstract>
            <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4648"/>
        <seriesInfo name="DOI" value="10.17487/RFC4648"/>
      </reference>
      <reference anchor="RFC5280">
        <front>
          <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
          <author fullname="D. Cooper" initials="D." surname="Cooper"/>
          <author fullname="S. Santesson" initials="S." surname="Santesson"/>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <author fullname="W. Polk" initials="W." surname="Polk"/>
          <date month="May" year="2008"/>
          <abstract>
            <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5280"/>
        <seriesInfo name="DOI" value="10.17487/RFC5280"/>
      </reference>
      <reference anchor="RFC8411">
        <front>
          <title>IANA Registration for the Cryptographic Algorithm Object Identifier Range</title>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <author fullname="R. Andrews" initials="R." surname="Andrews"/>
          <date month="August" year="2018"/>
          <abstract>
            <t>When the Curdle Security Working Group was chartered, a range of object identifiers was donated by DigiCert, Inc. for the purpose of registering the Edwards Elliptic Curve key agreement and signature algorithms. This donated set of OIDs allowed for shorter values than would be possible using the existing S/MIME or PKIX arcs. This document describes the donated range and the identifiers that were assigned from that range, transfers control of that range to IANA, and establishes IANA allocation policies for any future assignments within that range.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8411"/>
        <seriesInfo name="DOI" value="10.17487/RFC8411"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA81a65KiWpb+z1Mwdf5Unaz0fs2enmgERFRERbx1dPRB2ALK
Rdkg6onTMU8zDzZPMmtvMDUv1XN6oiN6MqoyFfZl3de31t7Pz89M7MYeemHF
c4yiwPDYAbpgthtGrI4RKwfwj7xAMbss1EttlkdR7G5d04gRZozNJkKnh8nZ
GLIEY4VmYPiwshUZ2/g5TAKchlHsPHuGf8DPh+Mzymc9H5LNHqY8l8oMw/zE
/vu/PT+zODYC66+GFwawRBwliH1+/g94aUTIeGE1ZCaRG1+Y1H5hh5wy1ph9
+vJK67NA9mSAyBdYyGJwsvFdjN0wiC8HWE8WZ12WhcU8HL6wX9zAQgcEv4L4
y3f2i8x14A9I4Is8nXW/MGYYYBTgBGeEMMBwlQGCgR3rhWGfM67Jh1c5jJON
55pEEMwJBQl6AcpZOwqTA2w3dH03RhbLWZYbA00wXkGmYwQu9jG7hY3HA3nJ
Av+spsiKyH6lIvv2hSySMfBlEUZ7N7BZiaxJX/iG68ELfDCw/ycXxdtCGNn0
jRGZDrxx4viAX4pFMpA8ck+ocBtXJA+KmyhMMSrSJYpfGKDYjZ1kA3PFADjH
MR9GhzAyCNHFTK2fqJFM9Ih5xA+bflygkC1ecMMfL1V8bzufjCk4se99YUBL
FgjkhU3ws4FN12UO7gvLEi2bRgBPEcghMi7sV3cLevfYC8LfiJIdAzusgyIE
ZMeh+UJewEcM+0Voi1/oEhbaGokXYxhxe3/xs9fkK2MksRNGYAzw80x/s6wb
wFulwKo36vPnmVco7h59eAWaAGfKRMXmZpK/enW17G3+FAONCORcLpVKYP1B
eKKyZYUItJuPMcFPXlg1jo3U+M6qQWxEbnh7B6KNI3jNG4FhGa9PLaBwUBmw
ZbGaP0OZfflAduFVH39CGTUFM/SZN8znTBrRfp889xNi3KxaYDUDNg9Q8Mjv
eKI5LvKsdxvtQvynwxHTVx/X3yael+3RL4ATGJf7irDVlUrhvbDylXehA8YH
U95Q//niQoHtheH+08XBubuGGYfR2+Ut4+RaBQdm/QnMc0tHZPQHYeTD3BMi
djLt8rVGrZV/rFdapfxjq1Yuv7yGQVEYqTPxhZIENgfKO9MIETsuJlYJwrSo
9b6wN1fL/Qq2LJrGJizuI8O3wjR4jrZmpVFp00DKuMH2Tg6THCzisW+oYZ5h
f2MDJgY8MIoRXNhwCxsj9hCCeR4TI4gTnzWjyyEOQZ4HByKe4dkhBGYHAplj
nBAEgsiGCVk4pO5KcgpZxCWxGoIEWTRCVmKScLaBoJe6VuzQrSIjwG4ckxdZ
YjEfks/3XAahmfigyFwYmA1Q+rAfjaIPRBHZgd/CzgHd8BZNHqeAKAx2c6GR
4TtdwAtNqvTvdD46Qzj2EKtPhwV2Rojwb+GbpVrBrk3UArHCBx82KbsbBPJw
wyQinEFA4mjEANcEeeSaAL/lTBNhTKkKSLoqMExmBkAEzONybWQqpAryXcvy
ELEXSH5RCHKkC/36E0bms0se/UaT6mtqmhseJNPsPTANb2dEG9Y9sJ7oiFeh
wTuQL4gdRYQ9iKQWFUP++ELEaDzKD94RCRhxEiE2BatwyLxDFIJjwFwDw/Cb
DhCR0qsSiOSB5b/97W/MR4LUTl/kZ6wsiKOZ3JXFKcu+vPyRZX+F1cOv5W+5
G+bB90az9fzotV+r38BirK+Nb5n9AVZ4PxPn0OJr/dtdr5h8O+zd89fmtwdz
gnXezJ11BFUW2N8oB8yr74JAgPs4hNxNhHVIIAliYsG/fOSSsFQuVAuNQrlQ
g/+VSr1eg0+VXzJFmWEEXnMIA5LtWAA2O2TGGdyAgEQETaxNAOmAdGlKvHnt
NvS8MKWzIOyZRDsvmaxvtjF/pUATJ7o44kX2V5LMc+unLEooQJHhjSA8fod3
xEc4z87Y526CkV8t5jYGls7GqPxMnLHabCqPJCYXFKMDP2ASceQikMKN4Fcb
sahhfKcPabrOBzyudZ9EV8nnsF8j5IPd0dCCUaN2lwqY4QEs+s95IP4LC7gg
QMT9jOjyjVV0bQZOy55QRM0I7J7MuvFLfNuIwbLJnr/cBPiqhwIZ9wtLVQoG
/dNPn0JDZuGgIHOoFMT2xou+PzjgwYAQjmA+zh3vg6+Co0GkBqEX8kXfqpS4
n2cQQYLVh7CP9s5uSAwqvDemTOBvViq82gKVD9UQS1cEi3umsoVNPlv9ex4J
FG5FxPqojSwmvFUGjbMGJjGHpgFAjZApTuQr8J65kxl6GPhl3sbIN2EQnJn+
zeIlxEhuxLE84HmIDxkMxbdQCQDoN6IoVqXEs3cbBru+sY2JLmGMAjtABpgi
2yUROduDoPXXyuSO4/Ox9/UgcLOsgEzXNwAvUJI4nOeMZ/bnn6eIKotEE0UV
fv45G47NyD3ksGY5E6cjbvg81jsDcfVcKVWqMBPswg+t9wCZzJ7ePAkQKU1Y
Qp41c3Y+svzIGf4ha68OjwlPXExAP6vFkJ7p4oCofsznjcuff86iJvCZjX9g
9IOl0yF/h5s3hvCJrt/bwytLb8fRUBtlfhWErymBdSHvu7klPCYu9/ohCW6j
0IcnD4iFGLlFudtQR8zxC6lwABTFxEmBakDkEaYQC7sbD1FZGxBrYF1AD5A6
CZ4ke0e5/Mg3wCOgMxpDKD57h2WM+H08vQOaTRJDtqaJ+F10fb8K0AfjvMS6
UY/YXJkPTBK8dIG0RCIjpYoIJnUBvILTWxDDTFL5EkxF5j9KJwu0eXShM7aA
pwu0FUElBYU/JhT/ELLloQWjiIR/GiwAaEEZRtQHm0EqD5CXEQe66M1m4yw2
89oUU5oAXnihDeoHjHogQMs1gSPAoEmuc0oXlDCYABtiIY8R8h79X6MkFTnO
IuTrw1dIFIRxzoQHQPVE6nKicgR6BNo3yDRI2erGmejzJTwKo8EIgLKQPDxA
rUcECFgGirI97VyA0XphYNNVaNoCxI4s4HYEWxIgCs/e6Zhu8KgQolwyLkLH
hPj1VxDTN2KfngX2uKeEQcogjZrYhYqaAOYIXIiaLM9RrsEACLgF5WYwPjct
mt8eoTT5/LaQIJVtYJNCAN44yKTdjgxJuRTDn27itBIKIgkPUPNAZvBBPQWW
e8NMzgRQRxMXpZ+CIlJXPZYLr1qAJckAnru5T+z6iHrox2VfVXZhSaMoysSb
z/PcYH9zmL9jKqDjk5v5/OvWVJcb4k+Hg3e5Ke09zXdKw4SWU6SKIonx7yr7
oZHHzmiKNUhwuICeZ9+oG/xeXQMeRaR/lFv6TedGQtpbZG8D7zGx1dy9bkWT
caHyc0mgvbfCYNAddr+rf34Qrt+G9Z9Y7kC6eeC7NF2znDYqlPM0nAPeTxLo
I5D/Naso/rEq4rFyuC32eQGRJeqvpW8/SNlfs8z/DWozQezKI3kmqyONlZXx
UOblGTvjJI3C9I4oySMoNJZjdTrTWG44/APELoV+I/2SB7AO37pTVaF5uyzT
PObGwDhpXP5Tef6dLJMX5Wf3Rkip8rXeJgx/WkX8+tuN/PvLe9X8L+Di1uLL
eDE+I4pw1CIcgUr+8WKW/b9Xs+w/v5z9V1aIjDgSsjIRXFmj6QLcukeSr0s6
CTjLIKSrwg4uGxSVSxVSWFgs2QFixWO8zsqs4DMMQTJG1ng1AtMhWedhXlb8
kSB6r8qQaWFjAR+1HlepN970OHB4j/93okgUEz8SRfrTD5VmgaBPkvEJd2Be
NL/kedKCajbIcDkFnPV6CfJD/LjJG8RJml9spVBh95s7z/exj9zTPb/QDIro
UckXFm23pCy4wTeoqgMgCAQPfAZhQpFkJtF7g+2GrnjPgFVMVjFFz4WyOkc9
tCn40A68JUYnCawIWRQC710vJEzhP9wh7Weg79Wcv+dg9IpuAONtjvYNAIEs
OcYh+Qse2JC8PNJog+FOmOZdysd9YC3r1l15kzhJShLvxnWXJf/ezH554zS/
PKySt12eyQ8N4SwvTkkY4LmZSJ8yiix3jB3Pc5Mnm0vlDmfLEreKgmNj2lS4
UOL5o6QptXaHU3hFCM/CjlM69mgO35XOvDtjZHHUUaY4lSYrYT6ZDIROf2ot
uokleSWkdWbWsl9ZL72TGShn/sr1s8mrGec5K6VTWzLCTL4qwh7+i/XRzL4o
3XAJz0rwPVXvz9LeTNwonb3ElXWRS1NtupyG60VqM5bkeLLYdUx/Wlkt+5Ei
manArQaDdNXpcFIHd0KRs0dLTujojjvyjcXZU93WaSO1d6vFecsYlXndrMwv
lj+/DKujshmsPbRoX8xLfb/accOO7dnO3u6sJwosJIqyara1lrvUT6XyXtuZ
zNKQSv5hWFdLRl1SVdXcWw2/VdMHxfksPHPpTWi9qdLhti2R23Hco3AZIl2u
tOcUccXLEx5b5uUiR6Z0qU7D2uKirhyuF561ZVctjWN767e7xpI7BmE7lR2u
P7wwp5EoVLrn6Nznk/rlqSauL12Zq5jriqzXSl15eDY61VWzktkCRLqPlkBD
HymCwAuTzPWpC916iLQB9VnH5Rdqhrl//SAeWoj0XyDQ4Nwm3/eAyEKf9nPu
CeBrhUUe8m+p4x4gPwn2D7PKb2Y9zvuYGz9tiL7tTN0OxN43RDvya4fwa6PV
YjdufN/zTk31HTUs++fGX+BxnYbXb+zW9dBLsUgLsL+SwEWKzKgIWP+ELmGE
C9bmYe6PuaQJ7gN/lUK5UWjVSsBeuUSYBfYAsmLHeIbM8jD5Tcfza7WSUyc2
q0Ktw7fazXqlK1Tr7UKhkBnO7AexM8wi20NLAMqMv2MoLv4YtAA8Ax5lCYC+
xSxpJHCjjo2jDvgjt5JSydYlLlX5jitym1q6RGm820TqrmVwMzwYifjiORNH
MszVWmW8rg5OjJZzNCgX18fdWpO1/iiZz07h+nTe9ZfhvFI7qUV+2HWfekc+
HA0au7WEtXTSblT3NcaeTrnNeZ9cZbO8OU0P4RbNLiN7LrTFyTw1yn7/uOr6
btXtB3JLHEnVCCtuU90cPafSOE4FBul7pz6eSJe1cWit1EvzaV+qcDuR63LX
81U7XrZeeeQequPhVNwucEM7dGvFpmGiui7vJbfIcEtjjWxd0/rq1G9j1QV9
qF3HudretvgkN1aDy2xsXvmjIe+fUms3FvpDveQ+jYXhQEzXBtPxbG8+Ps6E
9CCOBktF1sfyU1VdHsWz1xMXcqeSXIqttTe4jrRud5EO0FxT+/1hr6QfUY1T
mfl2vhYieTnfdiYrPKot2lteHvCDfXkx2FfHHObF5VGVFN2WupyeHK2GXjJ7
R04coOWqq3iMxON+62hV/KE900OvijrGydOnRrXnIWuN92vX3Zf7Hs+f3EYq
jbtxOt+V+32xHcTdJvYPjLq+nHXHWZy67rR2XEjjjTZybE636sdocD04et0Q
dgusz+R5dBl0t6s1XxEgplZCOTEauMqMjua09BRfa3O7qcsbLom688nYaUJd
NwUN4OVhv1j3p5U4PK+wL11x03Irva6O5ctojsMuc427m1np1BeXOBF7DmSN
waqv6YO1K03C/cDWo54spk5SsoZCIEhVpI2FjX3ol92esA+OE6arjQZefXVo
DI9KE3c79WQ9E2T5urFw/8lP8XJ1qIcyOpnI3vhBWOeXo3G9odgNfRCsVV9m
JCk9S2NdC/udmtNxvOYk5cvjUFATfjYpDaaLch+5Yx2fNi53kZWiNZKaw+O0
vu5du1MRNZmRJW4uTiT2ukl9XT/YfqPfNiNp0S9Nrv5pOK4qA79e5I8bQdng
DtD/dOobkXzl0OJ8Fb0xo+8G1Y3QOfXKXsXsThbl0WFc63mN66pbDytOPRoo
jWMvPVxDe6Y8yTIq60Zt65hPF8yvny4us1hYLX1pmSOxX10Y8kg00WofD8f9
fiDNRaXyZOBeG12GFxXb3nniuBvODkTLqS4HM25w7DBF8eKsNsOhOuhvr23J
FcCBun0ZmWvpPLVOg5ph+JWL1GoULTNsyGG0EMZGWbrwzXMn2aQeMxQ6a2nk
jI9ib1xrejLeHqarqVGOBRz2SvG4LnGcruvyUyMe6k9DPqzj4zI8x+2xIK23
/pEZt+UArydbtNhjwZmcRrEwOLhKLxqE5ace4ocQwPXxaWSV5upwM1gnW62t
89Ne8SAdJemsM2Fjb0bgRPtosh1F8sEBdAAYoJ08Qcm9TEsj/YymqCNPxuKT
PnV3oY17lc5q8tSQZ+Jx7zLTiSbF62QU6ulQP8ebSvGA6istTkUtOU71rbLq
VA9X0xIHm+F+E0hFf6qM+gs9ttQJtzdlBpy8LVj94tPKHm6vRzdBvoP70iHy
j+PldTBpLJF5mlv7abTahbGt7nodryZ1ztywLFgDy2T6W226BTs98xNurA7F
dl3vl0thIl6UQOP6WkW058bxMBw8cZdNixv4kdrfJ2br1FWHaVv3GPNoPTWF
QOqO5pdZa8l7Vuw295Opp+mnYwXJY5M/ArVl/upvt/LZrlXSZFTBe3upjUol
FDLzYfzU6/nFY/NQazmT2bAybW2Gq2O/txlMUby8li7c8rjvKIK5b5Yngt3G
4VNpzanVRS24HHmmch2srLMc831xvT/jRgSm3k+PrcXk7C8VO9R1NNr5VjLv
9utdyYABk+li6hiL1THZNVWf6ZUsbGsrNB37UqvtzV1+Jc53W7UBsLoWSc1e
Y60ew/1ogpDY08LGuu+DgXCbazhw/S46MUrFOG934X589Vv8zp7MFfXM9y0b
yrL98mrg3Vo9r8Mk6uj9VYfn6t419kR3IAg1qaRfJcz4iaE2e9r8fFmM+k8T
cTj1neJwEuye9FRs9E2rL4cTkau4/EmOFlovnZlauRnKYs2YhKaCGUESj6Fr
7/y5UyyvOHcZafHVu0qutj9zrl7f1NESr9LjMVwP5ofRatpUK/uiP7TOqcM1
zRXTXs0UfbJqLo68qGGPu5h8v+QlA3E82gxVpYdrMea8s76ru/ZGVPeDaopW
A2QGllg0pNGCCQa8U24Zg1lLb7kQOE+HTiL5Creorh1nPB1qUX85OSj7dGBw
qunVa013vJq6E+4oC7Z7mTFHbn8cb/rtTnoSceO8ablrvh8YdavuLSfuKBJK
pydVb40rrdO6ed3sto1Q3PpysbGrqhcr1hitLu667UGjuJ788Y6Y38OQ3wOY
b2cG3+/NeDfGyCNNhM/B9PePWPkzBPw58vs9iLYO36v3ehLmPULXcqVeq1Hw
ypbKgBHh57//87/uGO9+uP/DHkbeZqDHzXFIzqZdcukn62pswtOPsF/h91Wr
2ytUq5r2rlodVf9/VavqTlQVLr1Vq119rtiTknhmpCu3zlYNFdHrlleLeslY
Tuty96HwvIpDhctK3Y6j8IuunS5m3Kxjm0fG2e/U8UTudGz7mH1WOp10xHPc
dBEkQ/0UDONLe5Kejmmyx/wKtWEtTWyO/X6tqTVSJtxUWnN1PRBWxjRpDM6t
1a5uckW72DXOUbpsdIVRRSuN+vhk1FN/qwD4SbsCp90qWIaUsLzASdykV4R6
mHsv+XslK6xxuHMPm0RcDVvpdVVVjiYaMckJl+vLdTywXCfqxMXO08bb2qSU
Rb4fV3qravUqtJfTU7wZirWpXTwNcdKpquHTTF94C42xn+zG/1bK/kRvKiHP
AxdLyH2IKDyAsX08gh2FAaLH+z+RV3HkbpIYKi3a1OLMfRCmgEdtetKM85bZ
62UwNzDzm6aINn6y2fSsgEw3Q59Ou53SZv0fej+XtITQmVBEzykQK1ou3Tal
hyEIH5CZnYB45AYnOdm705K3kMhsckRIjzndCNFWk4Ws2+nmhws5BxQePESC
ESwXx+QqMjl3CS70FI/1ESL9vox2m7ZXySmqDwGOskSOfEi/jNJO5BqFAdR5
5D4inTJX5TG5RrEFh84vUZDjIAPixAUZEenBQXjEiRtnpD1IEkKdhohwFJee
nn3Nr1R+IxdNsgNym1CzTTwqC8/7np8S0wZlcLlLnwrRCem5D2kDMhuEyPGs
YQFFwHMMMg19NyasUb1QQjzYt/BevZswIleVs7sgdCx2fXKr+XUIfiQjdiDy
v6l1EQieqNcI9pi1w9sRWnaNF2dSgDkkeL+uWGDZL3x4yO67ealxwfRojFy4
osrJr6vQ+4L0Eh/QSC9+BegL+0zvtpC7nX/JzpwVg55ovrFNhnm4Ev7WaimB
t+sCVOwp8sCMUYEde7AzOfbOzC/Nb4abQOpdndm0+DtpzcJMj/wFvyPHjjgh
SY1o+pMbpD+8+P35nWzSGXl3H+eN7z4e1P0PMxupW30wAAA=

-->

</rfc>
