<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.5 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-daa-00" category="info" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="DAA for RATS">Direct Anonymous Attestation for the Remote Attestation Procedures Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-daa-00"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="C." surname="Newton" fullname="Christopher Newton">
      <organization>University of Surrey</organization>
      <address>
        <email>cn0016@surrey.ac.uk</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Liqun Chen">
      <organization>University of Surrey</organization>
      <address>
        <email>liqun.chen@surrey.ac.uk</email>
      </address>
    </author>
    <author initials="D." surname="Thaler" fullname="Dave Thaler">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <street/>
          <city/>
          <region/>
          <code/>
          <country>USA</country>
        </postal>
        <email>dthaler@microsoft.com</email>
      </address>
    </author>
    <date year="2021" month="December" day="02"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document maps the concept of Direct Anonymous Attestation (DAA) to the Remote Attestation Procedures (RATS) Architecture.
The role DAA Issuer is introduced and its interactions with existing RATS roles is specified.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Remote ATtestation procedureS (RATS, <xref target="I-D.ietf-rats-architecture" format="default"/>) describe interactions between well-defined architectural constituents in support of Relying Parties that require an understanding about the trustworthiness of a remote peer.
The identity of an Attester and its corresponding Attesting Environments play a vital role in RATS.
A common way to refer to such an identity is the Authentication Secret ID as defined in the Reference Interaction Models for RATS <xref target="I-D.ietf-rats-reference-interaction-models" format="default"/>.
The fact that every Attesting Environment can be uniquely identified in the context of the RATS architecture is not suitable for every application of remote attestation.
Additional issues may arise when Personally identifiable information (PII) -- whether obfuscated or in clear text -- are included in attestation Evidence or even corresponding Attestation Results.
This document illustrates how Direct Anonymous Attestation (DAA) can mitigate the issue of uniquely (re-)identifiable Attesting Environments.
To accomplish that goal, a new RATS role -- the DAA Issuer -- is introduced and its duties as well as its interactions with other RATS roles are specified.</t>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <t>This document uses the following set of terms, roles, and concepts as defined in <xref target="I-D.ietf-rats-architecture" format="default"/>:
Attester, Verifier, Relying Party, Conceptual Message, Evidence, Attestation Result, Attesting Environment. The role of Endorser, also defined in <xref target="I-D.ietf-rats-architecture" format="default"/>, needs to be adapted and details are given below.</t>
      <t>Additionally, this document uses and adapts, as necessary, the following concepts and information elements as defined in <xref target="I-D.ietf-rats-reference-interaction-models" format="default"/>:
Attester Identity, Authentication Secret, Authentication Secret ID</t>
      <t>A PKIX Certificate is an X.509v3 format certificate as specified by <xref target="RFC5280" format="default"/>.</t>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="direct-anonymous-attestation" numbered="true" toc="default">
      <name>Direct Anonymous Attestation</name>
      <t><xref target="dataflows" format="default"/> shows the data flows between the different RATS roles involved in DAA.</t>
      <figure anchor="dataflows">
        <name>DAA data flows</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
  ************       *************   ************   *****************
  * Endorser *       * Reference *   * Verifier *   * Relying Party *
  ************       * Value     *   *  Owner   *   *  Owner        *
       |             * Provider  *   ************   *****************
       |             *************          |            |
       |                       |            |            |
       |Endorsements           |Reference   |Appraisal   |Appraisal
       |                       |Values      |Policy      |Policy for
       |                       |            |for         |Attestation
       |                       |            |Evidence    |Results
       V                       |            |            |
.-----------------.            |            |            |
|   DAA Issuer    |---------.  |            |            |
'-----------------'         |  |            |            |
  ^          |         Group|  |            |            |
  |          |        Public|  |            |            |
  |Credential|           Key|  |            |            |
  |Request   |              v  v            v            |
  |          |             .----------------------.      |
  |          |          .->|      Verifier        |--.   |
  |          |          |  '----------------------'  |   |
  |          |          |                            |   |
  |          |          |Evidence         Attestation|   |
  |          |          |                     Results|   |
  |          |          |                            |   |
  |          |Credential|                            |   |
  |          |          |                            |   |
  |          v          |                            v   v
  |        .-------------.                     .---------------.
  '--------|  Attester   |                     | Relying Party |
           '-------------'                     '---------------'
]]></artwork>
      </figure>
      <t>DAA <xref target="DAA" format="default"/> is a signature scheme that allows the privacy of users that are associated with an Attester (e.g. its owner) to be maintained.
Essentially, DAA can be seen as a group signature scheme with the feature that given a DAA signature no-one can find out who the signer is, i.e., the anonymity is not revocable.
To be able to sign anonymously, an Attester has to obtain a credential from a DAA Issuer.
The DAA Issuer uses a private/public key pair to generate credentials for a group of Attesters <!-- this could be phrased a bit confusing as below it is stated that the key-pair is used for a group of Attesters --> and makes the public key (in the form of a public key certificate) available to the verifier in order to enable them to validate the Evidence received.</t>
      <t>In order to support these DAA signatures, the DAA Issuer MUST associate a single key pair with a group of Attesters <!-- is it clear enough what exactly "a group of Attesters" means? --> and use the same key pair when creating the credentials for all of the Attesters in this group.
The DAA Issuer's group public key certificate replaces the individual  Attester Identity documents during authenticity validation as a part of the appraisal of Evidence conducted by a verifier.
This is in contrast to intuition that there has to be a unique Attester Identity per device.</t>
      <t>For DAA, the role of the Endorser is essentially the same, but they now  provide Attester endorsement documents to the DAA Issuer rather than directly to the verifier. These Attester endorsement documents enable the Attester to obtain a credential from the DAA Issuer.</t>
    </section>
    <section anchor="daa-changes-to-the-rats-architecture" numbered="true" toc="default">
      <name>DAA changes to the RATS Architecture</name>
      <t>In order to enable the use of DAA, a new conceptual message, the Credential Request, is defined and a new role, the DAA Issuer role, is added to the roles defined in the RATS Architecture.</t>
      <dl>
        <dt>
Credential Request:  </dt>
        <dd>
          <t>An Attester sends a Credential Request to the DAA Issuer to obtain a credential. This request contains information about the DAA key that the Attester will use to  create evidence and together with Attester endorsement information that is provided by the Endorser to confirm that the request came from a valid Attester.</t>
        </dd>
        <dt>
DAA Issuer:  </dt>
        <dd>
          <t>A RATS role that offers zero-knowledge proofs based on public-key certificates used for a group of Attesters (Group Public Keys) <xref target="DAA" format="default"/>. How this group of Attesters is defined is not specified here, but the group must be large enough for the necessary anonymity to be assured.</t>
        </dd>
      </dl>
      <t>Effectively, these certificates share the semantics of Endorsements, with the following exceptions:</t>
      <ul spacing="normal">
        <li>Upon receiving a Credential Request from an Attester, the associated group private key is used by the DAA Issuer to provide the Attester with a credential that it can use to convince the Verifier that its Evidence is valid.
To keep their anonymity the Attester randomizes this credential each time that it is used. Although the DAA Issuer knows the Attester Identity and can associate this with the credential issued, randomisation ensures that the Attester's  identity cannot be revealed to anyone, including the Issuer.</li>
        <li>The Verifier can use the DAA Issuer's group public key certificate, together with the randomized credential from the Attester, to confirm that the Evidence comes from a valid Attester without revealing the Attester's identity.</li>
        <li>A credential is conveyed from a DAA Issuer to an Attester in combination with the conveyance of the group public key certificate from DAA Issuer to Verifier.</li>
      </ul>
    </section>
    <section anchor="additions-to-remote-attestation-principles" numbered="true" toc="default">
      <name>Additions to Remote Attestation principles</name>
      <t>In order to ensure an appropriate conveyance of Evidence via interaction models in general, the following prerequisite considering Attester Identity MUST be in place to support the implementation of interaction models.</t>
      <dl>
        <dt>
Attestation Evidence Authenticity:  </dt>
        <dd>
          <t>Attestation Evidence MUST be correct and authentic.</t>
        </dd>
        <dt/>
        <dd>
          <t>In order to provide proofs of authenticity, Attestation Evidence SHOULD be cryptographically associated with an identity document that is a randomised DAA credential.</t>
        </dd>
      </dl>
      <t>The following information elements define extensions for corresponding information elements defined in <xref target="I-D.ietf-rats-reference-interaction-models" format="default"/> and that are vital to all types of reference interaction models.
Varying from solution to solution, generic information elements can be either included in the scope of protocol messages (instantiating Conceptual Messages defined by the RATS architecture) or can be included in additional protocol parameters of protocols that facilitate the conveyance of RATS Conceptual Messages.
Ultimately, the following information elements are required by any kind of scalable remote attestation procedure using DAA with one of RATS's reference interaction models.</t>
      <dl>
        <dt>
Attester Identity ('attesterIdentity'):  </dt>
        <dd>
          <t><em>mandatory</em></t>
        </dd>
        <dt/>
        <dd>
          <t>In DAA, the Attester's identity is not revealed to the verifier. The Attester is issued with a credential by the DAA Issuer that is randomised and then used to anonymously confirm the validity of their evidence.
The evidence is verified using the DAA Issuer's group public key.</t>
        </dd>
        <dt>
Authentication Secret IDs ('authSecID'):  </dt>
        <dd>
          <t><em>mandatory</em></t>
        </dd>
        <dt/>
        <dd>
          <t>In DAA, Authentication Secret IDs are represented by the DAA Issuer's group public key that MUST be used to create DAA credentials for the corresponding Authentication Secrets used to protect Evidence.</t>
        </dd>
        <dt/>
        <dd>
          <t>In DAA, an Authentication Secret ID does not identify a unique Attesting Environment but is associated with a group of Attesting Environments.
This is because an Attesting Environment should not be distinguishable and the DAA credential which represents the Attesting Environment is randomised each time it used.</t>
        </dd>
      </dl>
    </section>
    <section anchor="privacy-considerations" numbered="true" toc="default">
      <name>Privacy Considerations</name>
      <t>As outlined about for DAA to provide privacy for the Attester the DAA group must be large enough to stop the Verifier identifying the Attester.</t>
      <t>Randomization of the DAA credential by the Attester means that collusion between the DAA Issuer and Verifier, will not give them any advantage when trying to identify the Attester.</t>
      <t>For DAA, the Attestation Evidence conveyed to the Verifier MUST not uniqely identify the Attester. If the Attestation Evidence is unique to an Attester other cryptographic techniques can be used, for example, property based attestation.
(Henk -- reference follows)</t>
      <t>Chen L., Loehr H., Manulis M., Sadeghi AR. (2008) Property-Based Attestation without a Trusted Third Party. Information Security. ISC 2008. Lecture Notes in Computer Science, vol 5222. Springer. https://doi.org/10.1007/978-3-540-85886-7_3</t>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>The anonymity property of DAA makes revocation difficult. Well known solutions include:
1. Rogue attester revocation -- if the an Attester's private key is compromised and known by the Verifier then any DAA signature from that Attester can be revoked.
2. EPID - Intel's Enhanced Privacy ID -- this requires the Attester to prove (as part of their Attestation) that their credential was not used to generate any signature in a signature revocation list.</t>
      <t>There are no other special security conderations for DAA over and above those specifed in the RATS architecture document <xref target="I-D.ietf-rats-architecture" format="default"/>.</t>
    </section>
    <section anchor="implementation-considerations" numbered="true" toc="default">
      <name>Implementation Considerations</name>
      <t>The new DAA Issuer role can be implemented in a number of ways, for example:
1. As a stand-alone service like a Certificate Authority, a Privacy CA.
2. As a part of the Attester's manufacture. The Endorser and the DAA Issuer could be the same entity and the manufacturer would then provide a certificate for the group public key to the Verifier.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>We don't yet.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <seriesInfo name="DOI" value="10.17487/RFC5280"/>
            <seriesInfo name="RFC" value="5280"/>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="DAA">
          <front>
            <title>Direct Anonymous Attestation</title>
            <seriesInfo name="page" value="132-145"/>
            <seriesInfo name="ACM" value="Proceedings of the 11rd ACM conference on Computer and Communications Security "/>
            <author initials="E." surname="Brickell" fullname="Ernie Brickell">
              <organization/>
            </author>
            <author initials="J." surname="Camenisch" fullname="Jan Camenisch">
              <organization/>
            </author>
            <author initials="L." surname="Chen" fullname="Liqun Chen">
              <organization/>
            </author>
            <date year="2004"/>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-rats-architecture" target="https://www.ietf.org/archive/id/draft-ietf-rats-architecture-13.txt">
          <front>
            <title>Remote Attestation Procedures Architecture</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-architecture-13"/>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Dave Thaler">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Michael Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Ned Smith">
              <organization>Intel Corporation</organization>
            </author>
            <author fullname="Wei Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="8" month="November" year="2021"/>
            <abstract>
              <t>   In network protocol exchanges it is often useful for one end of a
   communication to know whether the other end is in an intended
   operating state.  This document provides an architectural overview of
   the entities involved that make such tests possible through the
   process of generating, conveying, and evaluating evidentiary claims.
   An attempt is made to provide for a model that is neutral toward
   processor architectures, the content of claims, and protocols.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-reference-interaction-models" target="https://www.ietf.org/archive/id/draft-ietf-rats-reference-interaction-models-04.txt">
          <front>
            <title>Reference Interaction Models for Remote Attestation Procedures</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-reference-interaction-models-04"/>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Michael Eckel">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Wei Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Eric Voit">
              <organization>Cisco Systems</organization>
            </author>
            <date day="26" month="July" year="2021"/>
            <abstract>
              <t>   This document describes interaction models for remote attestation
   procedures (RATS).  Three conveying mechanisms -- Challenge/Response,
   Uni-Directional, and Streaming Remote Attestation -- are illustrated
   and defined.  Analogously, a general overview about the information
   elements typically used by corresponding conveyance protocols are
   highlighted.

              </t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIABLmqGEAA61b63LcRnb+j6fopX+QVA0gkpYsiZU4HpP0irukxJCUvPmT
rR6gZwZFDBrubgw1lrSV18i/PEUeIHmTPEnOOX1BAwOSylambBNo9OX0uXzn
0u00TRNTmkocs9NSidywaS3rzUq2mk2NEdpwU8qazaViZinYtVhJI3qfrpTM
RdEqASNUviwNzAJvCZ/NlFjDvNMpDb+e3t4khcxrvoLVCsXnJi2FmaeKG50W
nKcHB8n94pg6sl+luivrBfujkm2TwFp18VdeyRqGGtWKpGwUPWlzdHDw5uAo
4UrwY3Yj8laVZpPc3R+z89oIVQuTnuJiSc7NMSvruUya8jhhzMj8mG2Ehkct
lVFirsP7ZtW9Jrw1S6mOkxRGQ9vbjP1cqrulrH6HrnY7b0V9F7dKBRv5RfG2
Xsq5UOzm/BZaPUu2PogVL6tjtoRZspmb5SddmmweemaFQMKATAHbuF4KoMUo
rrVgr17Cl1wWQMfuDy+O3rzcxXfgAjCfqxUwrzDUo62NgsY/CrXi9cbv5yRj
78S9kXXYzclSldrIZgkEhk+0pQ91uRYKKNswOWc3rVJi09Gf1wcHhz/8pKk5
43nW3vlFLjKYVXRLXJS/tbVv+oapK+yf5dB/dPrTjN0ueSVUWOCUr0XXRitc
lrmSWs5NN21hqMdPK/8py+Uq4vPOTmCtfSSu0qMSC1D/0MXx9sPNNElqCQw2
sB1Us+tfTo4OD9+4x5dHrw/c4+vDVy/wEQwE/4BCPm2I1M/rIz67/Z+BTqoy
vxNVRc2eC2eqLkX/kxvxJxAIdKlLnS97Q/7E68GXLRF2nXtiBLYJVQqNNnbs
uk1PLo/Zj+6FWbAQBVi2RikjpBweqgK7AQ9r0HNR54IBrJzIVdOC/TKwfHxZ
tXWZEw90Z+V20oYvgJTD74/Swxcvqa3gBloAGV4kCVITieM8Pc062OERYlnk
2eoCQGCpSkvEE54jDekKdKICpti/SZKmKZg3WmRukuR2WWoGWNcCGw1b8UbT
VmGHuWgM7vxRtN0DldgHfPoGyN1Dmvd7yJvB8oIpWQnC3nOtW2AjEAT0K1m0
MJSYWhpq8lvS7L40SyY+gekj8hIM4ywax+pG5OW8FEVm97oqi6ISSfIdoizN
SuqZeGpvO2obT+2NpXbCPn9O8eHr131WCJ2rcib6lMyEuReiZvegtGkh5mWN
NHd75BXyEug0LTAYt8F02zSA4sjba1FtcAdXXBlQR+AiN2Cuv7XAc9g5a+sC
gAZdCvbiM9ka4jS5k3uYZAnraVJQDuNoQ40ACCbGlgUs6VAKJrNycXqKLM0l
wJNupJ3dfsans3pdKlmviOCm4huYfF0a2AqJCraAPMmSKcywWgHf7qEL6ADp
Hz7oNl/iioGA0mrVFOAAW6x1oHEoYdj5KeOgg453MLvVJW9h5x272SXpcHDS
KB6r1l+/2i3PoaPlogCI3oxviuVAGwgS7PS3FiTg6ESd8cuDzIz4ZLzl02Kx
BeKOamlgp8CXGTAFSbJL8qap/A5huJMK74wCGFcUJT4BR0vUeQ2GBwPBlQl2
DxxiVyB1/BzRRqsEhEDTuzo/32eg4DDCoP+Ts3mrYWHYBRADG8krwUEeuA+0
eaS6zqu2sNuMKGJna1wG4Yx2UY+qhu16LXRbGZ0NkKOsqhYxBTqypbz/FtRA
KayADwsYRFwmXiDPgmD2lEj3exwY11KgRjKegzoC7/XSasBC8moCqluL+w4i
kBO4VoQ30DIOOUVLRgnKidaNf8eBSBL7IxRCVscw9B27hUCmrGUlF5sh5rZa
WOuYy6qS97g1LazmwSA9sXNOiCoHy3pgMAGljhNv5BP2ETwcrA9PMcpsJuCi
aJIWtO8SwANc0iQowGRE1pNxpmMc48AbaD2rC6k0rsYrLUeJm4AkRKERIMD4
eMEb45hdCAMxjuXbokT9mwlgBXCus5QKKDfbjMPhNBVyCGxS5LglRZ1jlnac
Q+FGZiQqYYFui6UeWTqmsnMHaJNxKHugGRAOdsKu/nz+F3YiFOoymilqHZjA
X7KXB2/W3zNLEsujDjzyZmy2AaJcXIZwR3h3JzYM/ABwdefyw83tzsT+Ze/e
0/P12T9/OL8+O8Xnm7fTi4vwkLgeN2/ff7g47Z66kSfvLy/P3p3awdDKek3J
zuX0X3asVu68v7o9f/9uerFj4TMWEorUCpzspgF2oNB14t0pcfvnk6v/+o/D
F7DBP7gg9OtX94KxJ7wgLNrVZA3AYF+B15sE8BZhDhENjDTnDXoqqw0akKiG
XAUjDbTCR+PV5PNnCMb4HBQGhE5jrV1iK6Pm4O2puZyTizK9+KNey2ptNwUQ
A8v+DX4QqT2Lfi7CfDZoe+SVfjhLsDMWZolcJQ0Lhu9ee9bPnj1AC/vIKwBf
+0z/vr+vYY6tV9vFh8lfWPx7hvEeIolyw57e0dgsI/QNO30ZH/pQ7/GhjpfW
/KMOHUPhZdo0ipcawDJ+eXJ5Yqeb9cuVhIhg038Bc/+/7QEjjPAyTLS+eZbg
6e1GyZf7GT5+0wy9lyRLh7/sW4fia+SGsS2e5LGhu1ur7sZdHxf+v459o+rN
k0O/jHy7amcg0KeHnihB3oNX8bc/i83TQ68hIwBxD78xtqZ/eu9PE0y/bbnF
wnt4aJb+6N4CzPhOdvTDQ+FxW25eeF+eGvrw74mhscbTL7Kdv2dVZzT/zwSP
a8c3Df37V133vz74w37reGg2pjSD31DDsiSS/xfWpaMPLf5l4LoCcOOvr0m7
oxMMtW3XOuPPx+y74OltKesfdxCIOke/8zVJsOXzZ/gvBAMYqTFdLmpOyZ/O
l+A1bJbBq8oHCo0q1zyndBtiU+XSeYyAuNYyLyk1o4whzsb3RLbIKLOQ6GL3
Xbi04hAwcQxHs+RMa6sbGAQjXS6B1RiLcKRtgfC1TSEtRoGwsO02MaIQm9NM
3ZBaprIWNDVEwRBntQbCLFvZwV5UmZmwMhOZDa45hVEuvcdkWIm1zDFLo3QM
Y3zM2LAeAMNdd4i6cBMxA5accgI5w+0CWXkwBTZXcuUItV7CZvmR17BJgGW9
Ec8bAmMKixteUjFiIYB0jKa7eW0FwXMNxOVp0ewf/kAJYonVkbYqcBfNUnGN
QSublYZqf62mcoy2aQrIjupOhuRLHDY2NE+JBvjW4vgH10zTHymyXfE7lwpG
29hzFQlMD2ydJ/oYJQv7jK8hifIsxyFrj9AwBeQItjYjatsF9ANf17wqC5+A
B6iEMFmAkmDueh6N9ZUr6KtFX330ZJhWUx4SFJ/sp15UopONtYQHhYA5uXE1
DFHLdrEEdcTCzidIviEF2BkbusNWgtf6nwJPgfNWg/kqXhqLLKAPnJJaKvgM
lQNyCVf86ejy2Q2tO1TF//m3f3dfHpAQcLWpeO5EDCZWArsxC2db+WXIn7AI
oUjZfGKJX53QMMMk62+4CqUqHuJVzMq9QEFrsfBp00geNMNVcaj8QTUv0HSD
kgbsaSnxDvoMCOEMFQ3blWhGKG/gpRDrMsec6xfgJHDI6oYvFZCm+TQGlhYd
ugVRTdjMljo3gCz3DCuzuJVuPdHF7hGznOJHWgiWj8UZ2EUNGRumf9VmaB9U
ydBPTt5ZTtfzMdzqU0JlIMJuIGUhAq2UPPaOI3smFy2Kqoz1eOSnrWrlXSVn
5Ss52LMLJpgLHSfI6FCexpoJTYAi2TJc24gur8BSoaPT5rfDKu2QeNjl9uLH
SXIMSXfHNZB3gXq73XVEguMsRpkBicoNQ92FLrpX2unq5TgdWmMA50DKfQmG
TiAhmUUEwYS3GmSUkQtbXiW4GlWReE1aAQhzCkv21lN4WAddSKlWHTVhFwhS
zueRjYf1MhuPWJZYfkY1TZpIYjlCs9+FkukdGE0ligXGJFLOwVGRB8MjDoKm
dABNT3moPUqPXKqDOYve97FRxt6CgXaw2B8YaZ2vmIeCFmJKsHM3eNUCGwBg
Kq6AeAf7/kg/FPei0MPhEfBFkbs6Ay7keIJm64Vo1r196iVVpBBmxIojoOqo
fEmGPonCplA/FJ/Q0rDmC9x/xj40wEvrJQmdx1TZCrJTexc1daGgcxY2dCH9
9KGCU5q+FXgMHOgvOdEIe6wG2kMOp9igcEBmboeGvM111J2XgOVJ7Sh+uxOi
wQGlitkdr63APuSq/J08GkZMHRGC58DB0gfJNkLCrWVsWpkliXWwQ9RZ3V8g
OBWqffM6CidowSCnaGU6RCgmnjjtqry1pkPILQDY1aw7poIlUEVnaJFrwSuL
frzeQGA8cYcnPmDwqP6MyuCBqYHrvc3tPh4ZTAYoQ5jgmVuMOpZIqUYAJfL7
4BjGIYWWQoC0e/X7ihjj+YKbnPZ5TColNogZwxDdsqxbhiKL1aysrSQ6mdEM
nE6d5hEEPBA80Tr9VT6GKAZcqz8pIMc6chINZlbnZVPhNZm+g0XNQIoxcpLQ
jXKFHnGBneuSx+c/7kwdt2izjGp47NAoQce5urSTaiyOdkdqsY5TvEx1ckZh
4iDgZuWqsUcV4WhxmxI8MRk71ptG0aP1HmO9PAV0+JcbGyf4kRkOixnn4ch5
GExNolUm40u4QwZcRG0a0HrFmyUIGGO/kSS5HMbDwb/yYODQncKqLjSwRyOd
EEaPe6xbAlw3oAGkN+hm+ueejwwcHhLZWMHn+/a0HA0BoguzaYS2R8G+rjwm
uY/g2HBRUnQtq9bGEzI8T6ySgW2M0uVqAqIkHIlPesnb5bIhXQZxGZnLEDFq
zDDxigGwjrKh7ePBbs/OL20dh+/jwbEjoHfG3B10h3UhWYEwh6KDiBwHzXOe
l1VpfELaN0NadoS8LPlQga+BQdXWud/4UZ8S/paFTYjqDbujmsccGMVtEr19
cN/dD2G2AoB6Z0+A60Dgrn5CztuniWxvl7s237S7T2b6DEIUSPSk2jxz5hey
qRGcjuowwXlt5TkRMGvnLEeCiJEAxBleZHZW5UVtYxaC/VDiiXySsI7HXUSx
EYUPsW0SLeIAxBJbOBb3qRjNsZGlDxy7amQtfIOG89PHefrwFFZbAMkxTR0L
zsYzf2KYh1TPIZdh9AFLhwh3cO1ijCQd5kLTQZg+C7yMtoMe+KHbNoUUVlHc
zYrNMJ8f3pfBGB0xdwjQw4h/5FqGKy/MRM4xLAqBwXAJvaRymwu/CnuzC/zm
kmzRadqAb+weXMeyk00cPQ7n72tuF56WxoalGEJcufrtifPT9g4faJfGYmhl
c2fKKee2rtF3g3awF2VXInB0P5LgIMgb2fTDcy+cYWAGpF672DBEAiO8mQ2C
daqLWaUEuK1a9Hm98+zI1pHd3fURSpFRMFg3toVDBExerMFpAP7aapqx3gtr
R16rBlT3ikGj0UEIKh1wBV6QGSEJqKbRja3BGux8/vDkmIBYJR8EqPb6Ti8e
YWBYS+oc/CpqycRe8/rEMRSboOgbgScTNrvuXfHao3vWaRo5A+uU9H6S4C1U
dpFN2MV//+dSsbfwdMnrtgISL+H5hhdisSzZ9Dpje0cHB6/38Vydlkp/pqXi
DfownrNbvBUIX8HoVGEPTYAlkQP0t1Gh9eYEL52+ztiFu9D2Thq6v9BdZ73J
S3slaA1e++XR0VHGbjCKXiCnl8Y0+vj580KWmVSL54cH2eHBwavnb169Tr9P
X744SF+/fP36h/TVX79H0/Irb9nWbe8gIXDU1rlcRdyeK9AO8NJFmbeVydiv
eCcLk8Y6REjaBx/HyWHGruWi9f4bs9VuFqwuu2ppHTvSQSqO18lU5OvsYs6w
ojQaD1PAIPrHKS5TA3MLiuY0CQm5Q8gBhp5dAR6ndMexAgLO6iUGO0WAIvzq
ziNcwDJIkR0CCbbHdVwHBh8bKcl+SA1L1QNQbh2BdynhrAT30+2Fam/da8RJ
UFlj423MoegUydkT1XlgCe0ljyVoL/cAoEC5hRvAVQIXqf3VuUGVsXf7MqQD
4XIZAfh5P0Ua0zWseg5qnSFw9aNd7MrqdjVDfJjjBVfdM35SsCmdCuLt3JT+
hw+8VI6Fb+DKHdbI47teU7oJT4kR7xzNlJRgOqzhRyoJwUqLl1qxtkrhWygk
xj7R7SYcWYUTj6h+gm3RbJD/U29SX+/EeD/ldq5sO7Tpw7O9XHU+fTfdYvmv
KKt617CNMO4+9oznd8n/AsEahHfOMwAA

-->

</rfc>
