<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-yusef-lamps-rfc7030-renewal-recommendation-01" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="est-renew">Certificate Renewal Recommendations for Enrollment over Secure Transport</title>
    <seriesInfo name="Internet-Draft" value="draft-yusef-lamps-rfc7030-renewal-recommendation-01"/>
    <author initials="R." surname="Shekh-Yusef" fullname="Rifaat Shekh-Yusef">
      <organization>Ciena</organization>
      <address>
        <email>rifaat.s.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2025" month="October" day="02"/>
    <area>Internet</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 42?>

<t>This document describes an extension to RFC7030, Enrollment over Secure Transport to
give an indication to a end-entity device when it should start attempting to renew its certificates.</t>
      <t>Prior art is that client decides, with a typical recommmendation to start when the remaining lifetime of the certificate is at the 50% point.
As typical certificate lifetimes are reduced from years to fractions of a year, the 50% may be far too early, and this document provides a way to give alternate advice.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-yusef-lamps-rfc7030-renewal-recommendation/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        lamps Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mcr/rfc7030-renewal-recommendation"/>.</t>
    </note>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref section="1" sectionFormat="comma" target="RFC9773"/> explains why certificate lifetimes and renewal times need more deterministic control in the ACME <xref target="RFC8555"/> ecosystem.
Similar arguments apply to the <xref target="RFC7030"/> ecosystem.</t>
      <t>This document extends <xref target="RFC7030"/> to add support for renewal information, by adding a new entry to the HTTP URIs for Control list defined in <xref section="3.2.2" sectionFormat="comma" target="RFC7030"/></t>
      <t>This mechanism enables EST servers to provide suggested detailed renewal operations to EST clients, and enables clients to inform the EST server that they have successfully renewed and replaced a certificate.</t>
      <t>The /renewal-info URI is added, as an <bcp14>OPTIONAL</bcp14> operation, to the table in figure 5 in section 3.2.2 of <xref target="RFC7030"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="protocol-details">
      <name>Protocol Details</name>
      <t>A new magic header will be returned during RFC7030 certificate enrollment, whether using simpleenroll, or fullcmc.</t>
    </section>
    <section anchor="renewal-information-request">
      <name>Renewal Information Request</name>
      <t>To retrieve the renewal information, the EST client uses the following HTTP request-line:</t>
      <t><tt>
GET /.well-known/est/renewal-info/&lt;certificate-id&gt;;
</tt></t>
      <t>The request includes a unique identifier for the certificate in question.
The unique identifier is constructed by concatenating the base64url encoding <xref target="RFC4648"/> of the keyIdentifier field of the certificate's Authority Key Identifier (AKI) <xref target="RFC5280"/> extension, the period character ".", and the base64url encoding of the DER-encoded Serial Number field (without the tag and length bytes).
All trailing "=" characters <bcp14>MUST</bcp14> be stripped from both parts of the unique identifier.</t>
      <t>Thus, the full request URL is constructed as follows (split onto multiple lines for readability), where the "||" operator indicates string concatenation:</t>
      <t><tt>
url = /.well-known/est/renewal-info
      || '/'
      || base64url(AKI keyIdentifier)
      || '.'
      || base64url(Serial)
</tt></t>
    </section>
    <section anchor="renewal-information-response">
      <name>Renewal Information Response</name>
      <t>The structure the EST RenewalInfo object is as follows:</t>
      <t>suggestedWindow (object, required):
      A JSON object with two keys, "start" and "end", whose values are
      timestamps, encoded in the format specified in <xref target="RFC3339"/>, which
      bound the window of time in which the CA recommends renewing the
      certificate.</t>
      <t>For example:</t>
      <t>```
   HTTP/1.1 200 OK
   Content-Type: application/json
   Retry-After: 21600</t>
      <t>{
     "suggestedWindow": {
       "start": "2025-01-02T04:00:00Z",
       "end": "2025-01-03T04:00:00Z"
     }
   }
```</t>
      <section anchor="base64-not-used">
        <name>Base64 Not Used</name>
        <t><xref target="RFC7030"/> mistakenly declared that all content would be base64 encoded.
<xref target="RFC8951"/> clarifies that the content is to be base64 encoded, whether or not there is a Content-Transfer-Encoding header present.
It further clarifies that future extensions (such as this document) will not use base64 encoding.
The response detailed above is not base64 encoded.</t>
      </section>
    </section>
    <section anchor="renewal-operations">
      <name>Renewal Operations</name>
      <t>Clients <bcp14>MUST</bcp14> attempt renewal at a time of their choosing based on the suggested renewal window, obtained in the previous step.</t>
      <t>The following algorithm is <bcp14>RECOMMENDED</bcp14> for choosing a renewal time:</t>
      <ol spacing="normal" type="1"><li>
          <t>Select a uniform random time within the suggested window.</t>
        </li>
        <li>
          <t>If the selected time is in the past, attempt renewal immediately.</t>
        </li>
        <li>
          <t>Otherwise, if the client can schedule itself to attempt renewal
at exactly the selected time, do so.</t>
        </li>
        <li>
          <t>Otherwise, if the selected time is before the next time that the
client would wake up normally, attempt renewal immediately.</t>
        </li>
        <li>
          <t>Otherwise, sleep until the time indicated by the Retry-After
header and return to Step 1.</t>
        </li>
      </ol>
      <t>In all cases, renewal attempts are subject to the client's existing error backoff and retry intervals.</t>
      <t>A RenewalInfo object in which the end timestamp equals or precedes the start timestamp is invalid.  Servers <bcp14>MUST NOT</bcp14> serve such a response, and clients <bcp14>MUST</bcp14> treat one as though they failed to receive any response from the server (e.g., retry at an appropriate interval, renew on a fallback schedule, etc.).</t>
    </section>
    <section anchor="fetching-schedule">
      <name>Fetching Schedule</name>
      <t>The advice in <xref section="4.3" sectionFormat="comma" target="RFC9773"/> applies:</t>
      <t>Clients <bcp14>SHOULD</bcp14> fetch a certificate's RenewalInfo immediately after
   issuance.</t>
      <t>During the lifetime of a certificate, the renewal information needs
   to be fetched frequently enough that clients learn about changes in
   the suggested window quickly, but without overwhelming the server.
   This protocol uses the Retry-After header [RFC9110] to indicate to
   clients how often to retry.  Note that in other HTTP applications,
   Retry-After often indicates the minimum time to wait before retrying
   a request.  In this protocol, it indicates the desired (i.e., both
   requested minimum and maximum) amount of time to wait.</t>
      <t>Clients <bcp14>MUST NOT</bcp14> check a certificate's RenewalInfo after the
   certificate has expired.  Clients <bcp14>MUST NOT</bcp14> check a certificate's
   RenewalInfo after they consider the certificate to be replaced (for
   instance, after a new certificate for the same identifiers has been
   received and configured).</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>A very short certificate lifetime renewal time will cause clients to communicate with the EST Registrar more frequently.</t>
      <t>EST connections for renewals typically make use of mutually authenticated TLS.
When the client certificate being an IDevID, or the last issued certificate, often an LDevID, there is potential to disclose identities during this connection when using TLS 1.2.</t>
      <t>TLS 1.3 does not suffer from this problem, and it's use is <bcp14>RECOMMENDED</bcp14> as per <xref target="I-D.ietf-uta-require-tls13"/></t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Not sure what yet.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Might need a header allocation</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many bits of text are taken from <xref target="RFC9773"/>.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7030" target="https://www.rfc-editor.org/info/rfc7030" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7030.xml">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4648" target="https://www.rfc-editor.org/info/rfc4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC3339" target="https://www.rfc-editor.org/info/rfc3339" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3339.xml">
          <front>
            <title>Date and Time on the Internet: Timestamps</title>
            <author fullname="G. Klyne" initials="G." surname="Klyne"/>
            <author fullname="C. Newman" initials="C." surname="Newman"/>
            <date month="July" year="2002"/>
            <abstract>
              <t>This document defines a date and time format for use in Internet protocols that is a profile of the ISO 8601 standard for representation of dates and times using the Gregorian calendar.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3339"/>
          <seriesInfo name="DOI" value="10.17487/RFC3339"/>
        </reference>
        <reference anchor="RFC8951" target="https://www.rfc-editor.org/info/rfc8951" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8951.xml">
          <front>
            <title>Clarification of Enrollment over Secure Transport (EST): Transfer Encodings and ASN.1</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Werner" initials="T." surname="Werner"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document updates RFC 7030: Enrollment over Secure Transport to resolve some errata that were reported and that have proven to cause interoperability issues when RFC 7030 was extended.</t>
              <t>This document deprecates the specification of "Content-Transfer-Encoding" headers for Enrollment over Secure Transport (EST) endpoints. This document fixes some syntactical errors in ASN.1 that were present.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8951"/>
          <seriesInfo name="DOI" value="10.17487/RFC8951"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9773" target="https://www.rfc-editor.org/info/rfc9773" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9773.xml">
          <front>
            <title>ACME Renewal Information (ARI) Extension</title>
            <author fullname="A. Gable" initials="A." surname="Gable"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>This document specifies how an Automated Certificate Management Environment (ACME) server may provide suggestions to ACME clients as to when they should attempt to renew their certificates. This allows servers to mitigate load spikes and ensures that clients do not make false assumptions about appropriate certificate renewal periods.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9773"/>
          <seriesInfo name="DOI" value="10.17487/RFC9773"/>
        </reference>
        <reference anchor="RFC8555" target="https://www.rfc-editor.org/info/rfc8555" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8555.xml">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="I-D.ietf-uta-require-tls13" target="https://datatracker.ietf.org/doc/html/draft-ietf-uta-require-tls13-12" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-uta-require-tls13.xml">
          <front>
            <title>New Protocols Using TLS Must Require TLS 1.3</title>
            <author fullname="Rich Salz" initials="R." surname="Salz">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Nimrod Aviram" initials="N." surname="Aviram"/>
            <date day="14" month="April" year="2025"/>
            <abstract>
              <t>TLS 1.3 use is widespread, it has had comprehensive security proofs, and it improves both security and privacy over TLS 1.2. Therefore, new protocols that use TLS must require TLS 1.3. As DTLS 1.3 is not widely available or deployed, this prescription does not pertain to DTLS (in any DTLS version); it pertains to TLS only. This document updates RFC9325 and discusses post-quantum cryptography and the security and privacy improvements over TLS 1.2 as a rationale for that update.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-require-tls13-12"/>
        </reference>
      </references>
    </references>
    <?line 215?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA41Z63LjthX+z6dAtdOJ3Uq05Et2V02TKLaTuPFla3knkyaZ
BiJBCTFJsABprWZ336XP0ifrdw5AirKdtDuZmASBc8O5fOdoNBpFta5zNRWn
ytY604mslbhVpVrLHH8TUxSqTGWtTelEZqw4L63JcyzWwjwoK+YqaawSd1aW
rjK2juRiYdXDVChXjywRilKTlLIAj9TKrB5tGqeyUS6Lyo1slrwcH439Rpnj
b5/jaDyJohfC1bJM/ylzU4JGbRsVRbqy/Ojqw/H49fgwklbJqbgoa2VLVUfr
5VRczq7ezMX3xt7rcim+saapovv1dtPojMSJoPEULNIoSkyKnVPR1NnoVVTp
qcC/FyKRpYDIQlorN2JPZ0Lmudgoty9gj5V0K7FSVkVC1CaZ0gc8OpjCqsxN
mUSqMtnktcOO9vum8J/pNZJNvTJ2Go2ELrF2G4v5St2vRj+QqbDbm+9WZ1LW
jz4ZC4lPtSolXlQhdT4VljfGLtaqzr5c0mIMu0Yt/asYtJKVtKkzZUf+ipZU
vvuJyc9hf5UXsMPcZPUatmazui3HIrF/Zmau3RonMopKYwvc5IOaYuvt16d0
11PcXpk9+vD65csjfHhQZcNLS7qtqWAnwatn4irpii+JTQyxaJeuV82CuR/8
vidB9dFIyIWrrUzqKLpbaSfglw07cqpcYvVCOQEV1btalQ5n6LKCzMP/6fbY
HC2hD1HQZUpxFEhIASFGOKjrDTg96ESJ9UphWy3cyjR5Sg4OCrKuVVHV5Kw4
xnpgjxPJNjJdHEVvrIbb0QGoUK/gEEmuvRaJhiZDsYZZwLbeVDiUC2+JzhRE
3DNkKeqVwg4YuCTGuc5UrQslTMZferyJHZjR6sn4j6IyuqzjaOY6Pv29LR0c
sUQ/bRKVisyaAg4vLQdCRlfBeQXMJK8PO/IFQm2hRCYtthqBb/lmCOOm2NG/
usqaB9IaBNY4ArL+FnKKcZJEpmTx2DtAodM0V5RTkASsgVTeOd6/Dz44pItl
K00+foQrVDkM42CpzW+pB4mCywm/UipoWhionSoIUcCwrtaJSAyxzOEdrOTs
9OpcvH//BRi/Ojk5IW6JcRsHH4ijuS50LumWl6wm+FRVzurRWRaX/HL31COv
ZkdO3c5u8scUDtdU7LSU0Fvpu6A05VAsNrSPPEIK8kPQsx37b+/u3oi3txe+
IJwGvXKoSYlOl9AfSnZstzY9ig/jw48fg6CFQp6BcQpQl4scpjuf3wmnLOKL
HSTcLaRdLlFNQBYWRSZQW5ObStlQnHCAzvtgcN5XWsJhkfZ4NVmPLTsfR1jb
IJ8/EMckUc5lTQ6jMy/w9FcNjyBXln1/YNMrcdDmHuJBBuKQSVOVQhrOLTdv
7i5urmeXW7mHrVFrkpTsluklZZYTenZ9w1GY9O4yJje+YwczuVluvAz3UGFt
kL3F4Ort/G4w9H/F9Q0/357//e3F7fkZPc+/nV1edg9R2DH/9ubt5dn2aXvy
9Obq6vz6zB/GqthZigZXsx8G3uyDVs+B9/a+V1I+gMoL0hXhUVlFFytd1CZh
dp6vTt/859+TY+j7Byh8OJm8hvP6l1eTl8d4oeTluZkSl+Rf6QYjhArSBVGh
Op3IStcyd3wFyLfrkqs1rPenH8kyP0/FZ4ukmhx/HhZI4Z3F1mY7i2yzpytP
DnsjPrP0DJvOmjvrjyy9K+/sh5331u69xc++yBGRYjR59cXnEbnMG2uAUxCw
ZxxMQB8zDvFCLpGlVkqmiIe1hukWlLnrxlJAp42lbBC8bycZqq40DukacAcW
eIl2O11UufLfhwSWKKCSImHXbUHmxTbvYO1fDSIdrkwFsLZaIRh9hXomSbUx
HOofAJHjtQzszJoE4ExlPdER2QEY45dffom+Ob8TB/Fa5fnovoRLHOD7TvQe
fNbTcKTTz//C5zjEAj3IkuSNLz1NqbEmkKxKOgQDUGZ8UkBLwSchfMyUnh5D
pKBOAKWgMsHqSMN4pcOoZQwMcGohnfr0uLE5LO8ha4iM40+PXyEyQulGJrjo
yaMVgMbTqv6JEzMGn4ROvkPy6J3Zm313sR9onxy+4mrTgiNvfWQxbVJBeBG1
HEcG8aCt0s8KGgQ4O78d8Rp0nIMGbva6KRadnHsEYUxTh8y4ZJK5KpcANosN
cNA+kAc8FGhO50R38NfBVgonOI7hvjCkRjYIyGNhcLwC8nGtHE8ugDN547x2
5K3dbb+9vXx8O9IFV3Niz1U58BxKoREFkL6G3wtyOBdqrEzlAqLWm30OEuvd
evDTh58+DEI1MLZFjjhFkkOv3u2bMjgvGfSvv+++keB/Hz6ITw4+2b50F0I3
u+sg+70j8bNH/D3t+zj4zfgFGC6d8oHiDdUEXSlSwxk6IsziV1Q3LpGdHaFh
V+y/hzHMWuz5fUO+CA0kuT8N0s3E3+Y31y0dBr312pBauL8BQ9yBL0eAQQMy
u0EX9yDzxsPSQIZRW02NxlC0PhkwmlcMfQeQNYwUYA2Fw9HRESoS0USzFAgt
TBMcf+1FJycjLI1TvI+/nc5E15o4n9dCYAcyu7jia3iFeicpj4brxxZKaweT
eCLQ/Iqb72iJUBjucnS3qdDKEVoMLcjBr76Rg+0B4UazDAEyFYeTT8fjiJbf
e7aDR3YfTNsvorXlVAwOx4cnaMpH48O78fF0PMZ//0Dpb/eRnfu7jnq7/KaP
Ef+PfejFC/EVe5e4Nogvp9IAxANWLQAo5b2i6o7WBnBYpR6ncVn3+gLrUAO1
aJNNe4NxFMDC6xMC8nSabtB1QK8joF2AI7sEtqUMF1AaPmN9D7S1NTV/mbKj
8za9heoJUOMUdUcXgNiNZTKPRMgaDowun1IKaeAi0u3ipX1fikkCmkH0hQTD
OBQkH3VbeCwXaFJJWDr32DK92L3p4HMUnQaMzLkz9KJd3SWri15jqKHQyhiu
8kSfUBibdYvV26M+GFD+FxCu3AYXjPSgTUOpTlUBQW8rt8yXVJNWBWnRgz+c
TjvWcqf3QoBMYoGCklNC4KrMWB/XlCL9s/iUJvRjUb2IkOEQxy98aXBMhVyO
Q9h1YkuHZPTYPhrxnGqEbL4BmSOQuaFbX2unhkKHquthCo2TXLJCS0x4vwaf
jNuyXYocLpKaOJQ06vweizSEiwhnwO34WW5P5F+ozIRUXMLt/HobDswuCOhD
ao3QE00leISTc/P9uzqf7ErhgPsq3ECtc1/EfSL05Y2BDa32chJLEOLHd1qE
PMkyc/iHmIDFRYvoHU05tq7JYvlJg2t8NQhNldcIGEe9oyYcHqOshQMtZHJv
sqxlhNaWmxHUBpqwzJ6tU/0krsp0WzcEChMOUqKAT6M5DDDUD1m229iHwEKn
7KS+zW07Dt+ICp8Duoj2WCrpR2YNLEFAQ/lUYZrlyjeumQ99Hh0lyo+iNtvc
wAjIOwZ3vHsqXsbDoD2Fd0lVw5rKao9VvT2CnSm8JVjkOZmu819UzDqJ9zmn
fI3HFZl4Hj76kPbzl24gsDtkOY6PkJ25Wikq/lTIgrKhS8qI6m63jevs30/P
DYVsPUk718iS5z54O/PNC2nfH3DtUB3+Vp/BAx0aQoY6wRIxpCRkWFJwqjJc
QzeMc0CrEu6LRAwUS3MOpBpQZTLP5B40Bjq5pyhbNB7L0DmaNKIM5UUrvb+7
mKjwCKVqe7mu9+lFVBtNP5LZJ5Pxz3784UOQ5pVdyDuxYrhSq9L7D2jAR1GW
Q4bA7RmuYtxQ9dCFGz6CFoHKFsiSUDQDK5qQgcFgLYGVQz5iZtCP6MgWbVMa
DoODVsUhzUt3ySLQCBCKPR0ruDLBe6ISaNAULvClICrkO3reF7IATqs7cBbE
iXecr4tK3DTc/ffcj12uTaH9bm8lKe1UJGH8/1L2xnyGOPeBTqfqaVfpvbIb
TO3BqhwBJf1sklAKYSJ+jtc/2LaoThb9Fsix5Au07d6YnEv89Asy+OlUSiHv
hwn6QSYbgkQsXQsmZgJ+uqF5C1Lgc5PTncLtMU4iCeH0RnWEklHD+ZyH910b
sdQ0ybd+zrqNREjFAwFTlirZ/mYVeHWjaoRsweXNcR4ogMV4kX6GITP4GnV3
OY+j79sZeVu9e7osFGOQUlycqYeLM55wcI6RNB1ABgKRnQzjYwMHLsOBDlRW
hhAl9cHQO9UuyalX8ZdSE2hM2xTme9Cgnh/h+2ELxEWVPCQkxU9HAAjKI0DX
ZBn11r4E+KBa5Krw5UVTgSRTPEJa8ALAQ5pRX4zO+KekUVPLUejDRnXuJkc0
zH3hfwyhAcJjN7hm5pZ+8EAW2aiaK8XF7Hr2ZOuVXq5qPzyXHQ4AGkzC7zcv
xCyhZhc1bql4Jo4zVOEWOvTzBGp4ukhNg1e2KzlhXHrKiTg3y8j/HkDFLIr+
C3gUlTUGHQAA

-->

</rfc>
