<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hu-ipsecme-pqt-hybrid-auth-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="IKEv2 PQTH Auth">Post-Quantum Traditional (PQ/T) Hybrid PKI Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
    <seriesInfo name="Internet-Draft" value="draft-hu-ipsecme-pqt-hybrid-auth-01"/>
    <author fullname="Hu, Jun">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>jun.hu@nokia.com</email>
      </address>
    </author>
    <author fullname="Yasufumi Morioka">
      <organization>NTT DOCOMO, INC.</organization>
      <address>
        <postal>
          <country>Japan</country>
        </postal>
        <email>yasufumi.morioka.dt@nttdocomo.com</email>
      </address>
    </author>
    <date year="2024" month="November" day="03"/>
    <area>sec</area>
    <workgroup>ipsecme</workgroup>
    <keyword>Post-Quantum</keyword>
    <keyword>Hybrid Authentication</keyword>
    <keyword>IKEv2</keyword>
    <abstract>
      <?line 90?>

<t>One IPsec area that would be impacted by Cryptographically Relevant Quantum Computer (CRQC) is IKEv2 authentication based on traditional asymmetric cryptograph algorithms: e.g RSA, ECDSA; which are widely deployed authentication options of IKEv2. There are new Post-Quantum Cryptograph (PQC) algorithms for digital signature like NIST <xref target="ML-DSA"/>, however it takes time for new cryptograph algorithms to mature, so there is security risk to use only the new algorithm before it is field proven. This document describes a IKEv2 hybrid authentication scheme that could contain both traditional and PQC algorithms, so that authentication is secure as long as one algorithm in the hybrid scheme is secure.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://example.com/LATEST"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-hu-ipsecme-pqt-hybrid-auth/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:ipsec@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ipsec/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ipsec/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/USER/REPO"/>.</t>
    </note>
  </front>
  <middle>
    <?line 95?>

<section anchor="changes-in-01">
      <name>Changes in -01</name>
      <ul spacing="normal">
        <li>
          <t>Only use SUPPORTED_AUTH_METHODS for algorithm combination announcement, no longer use SIGNATURE_HASH_ALGORITHMS</t>
        </li>
        <li>
          <t>add flag field in the announcement</t>
        </li>
        <li>
          <t>clarify two types of PKI setup</t>
        </li>
        <li>
          <t>add some clarifications on how AUTH payload is computed</t>
        </li>
      </ul>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>A Cryptographically Relevant Quantum Computer (CRQC) could break traditional asymmetric cryptograph algorithms: e.g RSA, ECDSA; which are widely deployed authentication options of IKEv2. New Post-Quantum Cryptograph (PQC) algorithms for digital signature were recently published like NIST <xref target="ML-DSA"/>, however consider potential flaws in the new algorithm's specifications and implementations, it will take time for these new PQC algorithms to be field proven. So it is risky to only use PQC algorithms before they are mature. There is more detailed discussion on motivation of a hybrid approach for authentication in <xref section="1.3" sectionFormat="of" target="I-D.ietf-pquip-hybrid-signature-spectrums"/>.</t>
      <t>This document describes an IKEv2 hybrid authentication scheme that contains both traditional and PQC algorithms, so that authentication is secure as long as one algorithm in the hybrid scheme is secure.</t>
      <t>Each IPsec peer announce the support of hybrid authentication via SUPPORTED_AUTH_METHODS notification as defined in <xref target="RFC9593"/>, generates and verifies AUTH payload using composite signature like the procedures defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
      <t>Following two types of setup are covered:</t>
      <ol spacing="normal" type="1"><li>
          <t>Type-1: A single certificate that has composite key as defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/></t>
        </li>
        <li>
          <t>Type-2: Two certificates, one with traditional algorithm key and one with PQC algorithm key</t>
        </li>
      </ol>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Cryptographically Relevant Quantum Computer (CRQC): A quantum computer that is capable of breaking real world cryptographic systems.</t>
      <t>Post-Quantum Cryptograph (PQC) algorithms: Asymmetric cryptograph algorithms are thought to be secure against CRQC.</t>
      <t>Traditional Cryptograph algorithms: Existing asymmetric cryptograph algorithms could be broken by CRQC, like RSA, ECDSA ..etc.</t>
    </section>
    <section anchor="ikev2-key-exchange">
      <name>IKEv2 Key Exchange</name>
      <t>There is no changes introduced in this document to the IKEv2 key exchange process, although it <bcp14>MUST</bcp14> be also resilient to CRQC when using along with the PQ/T hybrid authentication, for example key exchange using the PPK as defined in <xref target="RFC8784"/>, or hybrid key exchanges that include PQC algorithm via multiple key exchange process as defined in <xref target="RFC9370"/>.</t>
    </section>
    <section anchor="exchanges">
      <name>Exchanges</name>
      <t>The hybrid authentication exchanges is illustrated in an example depicted in <xref target="hybrid-auth-figure"/>, the key exchange uses PPK, however it could be other key exchanges that involves PQC algorithm since how key exchange is done is transparent to authentication.</t>
      <figure anchor="hybrid-auth-figure">
        <name>Hybrid Authentication Exchanges with RFC8784 Key Exchange</name>
        <artwork><![CDATA[
Initiator                         Responder
-------------------------------------------------------------------
HDR, SAi1, KEi, Ni,
          N(USE_PPK) -->
                  <--  HDR, SAr1, KEr, Nr, [CERTREQ,] N(USE_PPK),
                                      N(SUPPORTED_AUTH_METHODS)

HDR, SK {IDi, CERT+, [CERTREQ,]
        [IDr,] AUTH, SAi2,
        TSi, TSr, N(PPK_IDENTITY, PPK_ID),
        N(SUPPORTED_AUTH_METHODS)} -->
                            <--  HDR, SK {IDr, CERT+, [CERTREQ,]
                                      AUTH, [N(PPK_IDENTITY)]}
]]></artwork>
      </figure>
      <section anchor="announcement">
        <name>Announcement</name>
        <t>Announcement of support hybrid authentication is through SUPPORTED_AUTH_METHODS notification as defined in <xref target="RFC9593"/>, which includes a list of acceptable authentication methods announcements, this document defines a hybrid authentication announcements with following format:</t>
        <figure anchor="ds-announce">
          <name>Hybrid Authentication Announcement</name>
          <artwork><![CDATA[
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Length (>=2) |  Auth Method  |   Cert Link 1 | Alg 1 flag    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Alg 1 Len     |                                               |
+-+-+-+-+-+-+-+-+                                               |
~                      AlgorithmIdentifier 1                    ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Cert Link 2   | Alg 2 flag    |  Alg 2 Len    |               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+               +
|                                                               |
~                      AlgorithmIdentifier 2                    ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
~                      ...                                      ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Cert Link 3   | Alg 3 flag    |  Alg 3 Len    |               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+               +
|                                                               |
~                      AlgorithmIdentifier N                    ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The announcement include a list of N algorithms could be used for hybrid signature</t>
        <ul spacing="normal">
          <li>
            <t>Auth Method: A new value to be allocated by IANA</t>
          </li>
          <li>
            <t>Cert Link N: Links corresponding signature algorithm N with a particular CA. as defined in <xref section="3.2.2" sectionFormat="of" target="RFC9593"/></t>
          </li>
          <li>
            <t>Alg N Flag:
            </t>
            <ul spacing="normal">
              <li>
                <t>C: set to 1 if the algorithm could be used in type-1 setup</t>
              </li>
              <li>
                <t>S: set to 1 if the algorithm could be used in type-2 setup</t>
              </li>
              <li>
                <t>C and S <bcp14>MUST NOT</bcp14> be zero at the same time</t>
              </li>
              <li>
                <t>RESERVED: set to 0</t>
              </li>
            </ul>
          </li>
        </ul>
        <figure anchor="announce-flag">
          <name>Algorithm Flag</name>
          <artwork><![CDATA[
     0 1 2 3 4 5 6 7
    +-+-+-+-+-+-+-+-+
    |C|S| RESERVED  |
    +-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <ul spacing="normal">
          <li>
            <t>AlgorithmIdentifier N: The variable-length ASN.1 object that is encoded using Distinguished Encoding Rules (DER) <xref target="X.690"/> and identifies the  algorithm of a composite signature as defined in <xref section="7" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/>.</t>
          </li>
        </ul>
        <section anchor="sending-announcement">
          <name>Sending Announcement</name>
          <t>As defined in <xref target="RFC9593"/>, responder include SUPPORTED_AUTH_METHODS in IKE_SA_INIT response (and potentially also in IKE_INTERMEDIATE response), while initiator include the notification in IKE_AUTH request.</t>
          <t>Sender include a hybrid authentication announcement in SUPPORTED_AUTH_METHODS, which contains 0 or N composite signature AlgorithmIdentifiers sender accepts, each AlgorithmIdentifier identifies a combination of algorithms:</t>
          <ul spacing="normal">
            <li>
              <t>a traditional PKI algorithm with corresponding hash algorithm (e.g. id-RSASA-PSS with id-sha256)</t>
            </li>
            <li>
              <t>a PQC algorithm (e.g. id-ML-DSA-44)
              </t>
              <ul spacing="normal">
                <li>
                  <t>in case of Hash ML-DSA, there is also a pre-hash algorithm (e.g. id-sha256)</t>
                </li>
              </ul>
            </li>
          </ul>
          <t>In case of type-2 setup, even though the certificate is not composite key certificate, system still uses a composite signature algorithm that corresponds to the combination of two certificates PKI algorithms and hash algorithm(s).</t>
          <t>C and S bits in flag field are set according to whether sender accept the algorithm combination in type-1/type-2 setup.</t>
          <t>Announcement without any AlgorithmIdentifiers signals that there is no particular restrictions on algorithm.</t>
        </section>
        <section anchor="receiving-announcement">
          <name>Receiving Announcement</name>
          <t>If hybrid authentication announcement is received, and receiver choose to authenticate itself using hybrid authentication, then based on its local policy and certificates, one AlgorithmIdentifier (which identify a combination of algorithms) in the hybrid authentication announcement and a PKI setup (type-1 or type-2) are chosen to create its AUTH and CERT payload(s).</t>
        </section>
      </section>
      <section anchor="auth-cert-payload">
        <name>AUTH &amp; CERT payload</name>
        <t>The IKEv2 AUTH payload has following format as defined in <xref section="3.8" sectionFormat="of" target="RFC7296"/>:</t>
        <figure anchor="rfc7296-auth">
          <name>AUTH payload</name>
          <artwork><![CDATA[
                        1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  | Next Payload  |C|  RESERVED   |         Payload Length        |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  | Auth Method   |                RESERVED                       |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                                                               |
  ~                      Authentication Data                      ~
  |                                                               |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>For hybrid authentication, the AUTH Method has value defined in <xref target="announcement"/></t>
        <t>The Authentication Data field follows format defined in <xref section="3" sectionFormat="of" target="RFC7427"/>:</t>
        <figure anchor="ha-auth-data">
          <name>Authentication Data in hybrid AUTH payload</name>
          <artwork><![CDATA[
                       1                   2                   3
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  | ASN.1 Length  | AlgorithmIdentifier ASN.1 object              |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                                                               |
  ~        AlgorithmIdentifier ASN.1 object continuing            ~
  |                                                               |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                                                               |
  ~                         Signature Value                       ~
  |                                                               |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>Based on selected AlgorithmIdentifier and setup type, the Signature Value is created via procedure defined in <xref target="type-1"/>, <xref target="type-2"/>.</t>
        <section anchor="type-1">
          <name>Type-1</name>
          <t>Assume selected AlgorithmIdentifier is A.</t>
          <ol spacing="normal" type="1"><li>
              <t>There is no change on data to be signed, e.g. InitiatorSignedOctets/ResponderSignedOctets as defined in <xref section="2.15" sectionFormat="of" target="RFC7296"/></t>
            </li>
            <li>
              <t>Follow Sign operation identified by A, e.g. <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/> or <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/>; the ctx input is the string of "IKEv2-PQT-Hybrid-Auth".</t>
            </li>
          </ol>
          <t>Following is an initiator example:</t>
          <ol spacing="normal" type="1"><li>
              <t>A is id-HashMLDSA44-RSA2048-PSS-SHA256, which uses Hash ML-DSA-44</t>
            </li>
            <li>
              <t>Follow <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/> with following input:  </t>
              <ul spacing="normal">
                <li>
                  <t>sk is the private key of the signing composite key certificate</t>
                </li>
                <li>
                  <t>M is InitiatorSignedOctets</t>
                </li>
                <li>
                  <t>ctx is "IKEv2-PQT-Hybrid-Auth"</t>
                </li>
                <li>
                  <t>PH is SHA256</t>
                </li>
              </ul>
            </li>
          </ol>
          <t>The signing composite certificate <bcp14>MUST</bcp14> be the first CERT payload.</t>
        </section>
        <section anchor="type-2">
          <name>Type-2</name>
          <t>The procedure is same as Type-1, use private key of traditional and PQC certificate accordingly; e.g. in Sign procedure define in <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-lamps-pq-composite-sigs"/>, the <tt>mldsaSK</tt> is the private key of ML-DSA certificate, while <tt>tradSK</tt> is the private key of traditional certificate.</t>
          <t>With the example in <xref target="type-1"/>:</t>
          <ul spacing="normal">
            <li>
              <t>mldsaSK is the private key of ML-DSA certificate, tradSK is the private key of the RSA certificate</t>
            </li>
            <li>
              <t>M is InitiatorSignedOctets</t>
            </li>
            <li>
              <t>ctx is "IKEv2-PQT-Hybrid-Auth"</t>
            </li>
            <li>
              <t>PH is SHA256</t>
            </li>
          </ul>
          <t>The signing PQC certificate <bcp14>MUST</bcp14> be the first CERT payload in the IKEv2 message, while traditional certificate <bcp14>MUST</bcp14> be the second CERT payload.</t>
          <section anchor="relatedcertificate">
            <name>RelatedCertificate</name>
            <t>In type-2 setup, the signing certificate <bcp14>MAY</bcp14> contain RelatedCertificate extension, then the receiver <bcp14>SHOULD</bcp14> verify the extension according to <xref section="4.2" sectionFormat="of" target="I-D.ietf-lamps-cert-binding-for-multi-auth"/>, failed verification <bcp14>SHOULD</bcp14> fail authentication.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security of general PQ/T hybrid authentication is discussed in <xref target="I-D.ietf-pquip-hybrid-signature-spectrums"/>.</t>
      <t>This document uses mechanisms defined in <xref target="I-D.ietf-lamps-pq-composite-sigs"/>, <xref target="RFC7427"/> and <xref target="RFC9593"/>, the security discussion in the corresponding RFCs also apply.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests a value in "IKEv2 Authentication Method" subregistry under IANA "Internet Key Exchange Version 2 (IKEv2) Parameters" registry</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA For use in X.509 Public Key Infrastructure and CMS</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSA-PKCS#1v1.5, RSA-PSS, ECDSA, Ed25519,
   and Ed448.  These combinations are tailored to meet security best
   practices and regulatory requirements.  Composite ML-DSA is
   applicable in any application that uses X.509, PKIX, and CMS data
   structures and protocols that accept ML-DSA, but where the operator
   wants extra protection against breaks or catastrophic bugs in ML-DSA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-03"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-hybrid-signature-spectrums">
          <front>
            <title>Hybrid signature spectrums</title>
            <author fullname="Nina Bindel" initials="N." surname="Bindel">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <author fullname="Florence D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <date day="24" month="May" year="2024"/>
            <abstract>
              <t>   This document describes classification of design goals and security
   considerations for hybrid digital signature schemes, including proof
   composability, non-separability of the component signatures given a
   hybrid signature, backwards/forwards compatiblity, hybrid generality,
   and simultaneous verification.

   Discussion of this work is encouraged to happen on the IETF PQUIP
   mailing list pqc@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dconnolly/draft-ietf-pquip-hybrid-
   signature-spectrums

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-hybrid-signature-spectrums-00"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-cert-binding-for-multi-auth">
          <front>
            <title>Related Certificates for Use in Multiple Authentications within a Protocol</title>
            <author fullname="Alison Becker" initials="A." surname="Becker">
              <organization>National Security Agency</organization>
            </author>
            <author fullname="Rebecca Guthrie" initials="R." surname="Guthrie">
              <organization>National Security Agency</organization>
            </author>
            <author fullname="Michael J. Jenkins" initials="M. J." surname="Jenkins">
              <organization>National Security Agency</organization>
            </author>
            <date day="29" month="April" year="2024"/>
            <abstract>
              <t>   This document defines a new CSR attribute, relatedCertRequest, and a
   new X.509 certificate extension, RelatedCertificate.  The use of the
   relatedCertRequest attribute in a CSR and the inclusion of the
   RelatedCertificate extension in the resulting certificate together
   provide additional assurance that two certificates each belong to the
   same end entity.  This mechanism is particularly useful in the
   context of non-composite hybrid authentication, which enables users
   to employ the same certificates in hybrid authentication as in
   authentication done with only traditional or post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-cert-binding-for-multi-auth-05"/>
        </reference>
        <reference anchor="RFC7296">
          <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="79"/>
          <seriesInfo name="RFC" value="7296"/>
          <seriesInfo name="DOI" value="10.17487/RFC7296"/>
        </reference>
        <reference anchor="RFC7427">
          <front>
            <title>Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)</title>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <author fullname="J. Snyder" initials="J." surname="Snyder"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>The Internet Key Exchange Version 2 (IKEv2) protocol has limited support for the Elliptic Curve Digital Signature Algorithm (ECDSA). The current version only includes support for three Elliptic Curve groups, and there is a fixed hash algorithm tied to each group. This document generalizes IKEv2 signature support to allow any signature method supported by PKIX and also adds signature hash algorithm negotiation. This is a generic mechanism and is not limited to ECDSA; it can also be used with other signature algorithms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7427"/>
          <seriesInfo name="DOI" value="10.17487/RFC7427"/>
        </reference>
        <reference anchor="RFC9593">
          <front>
            <title>Announcing Supported Authentication Methods in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>This specification defines a mechanism that allows implementations of the Internet Key Exchange Protocol Version 2 (IKEv2) to indicate the list of supported authentication methods to their peers while establishing IKEv2 Security Associations (SAs). This mechanism improves interoperability when IKEv2 partners are configured with multiple credentials of different types for authenticating each other.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9593"/>
          <seriesInfo name="DOI" value="10.17487/RFC9593"/>
        </reference>
        <reference anchor="X.690">
          <front>
            <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ISO/IEC" value="8825-1:2021 (E)"/>
          <seriesInfo name="ITU-T" value="Recommendation X.690"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ML-DSA" target="https://csrc.nist.gov/pubs/fips/204/ipd">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="August"/>
          </front>
          <seriesInfo name="NIST" value="FIPS-204"/>
          <seriesInfo name="State" value="Initial Public Draft"/>
        </reference>
        <reference anchor="RFC8784">
          <front>
            <title>Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security</title>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>The possibility of quantum computers poses a serious challenge to cryptographic algorithms deployed widely today. The Internet Key Exchange Protocol Version 2 (IKEv2) is one example of a cryptosystem that could be broken; someone storing VPN communications today could decrypt them at a later time when a quantum computer is available. It is anticipated that IKEv2 will be extended to support quantum-secure key exchange algorithms; however, that is not likely to happen in the near term. To address this problem before then, this document describes an extension of IKEv2 to allow it to be resistant to a quantum computer by using preshared keys.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8784"/>
          <seriesInfo name="DOI" value="10.17487/RFC8784"/>
        </reference>
        <reference anchor="RFC9370">
          <front>
            <title>Multiple Key Exchanges in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="CJ. Tjhai" initials="CJ." surname="Tjhai"/>
            <author fullname="M. Tomlinson" initials="M." surname="Tomlinson"/>
            <author fullname="G. Bartlett" initials="G." surname="Bartlett"/>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <author fullname="D. Van Geest" initials="D." surname="Van Geest"/>
            <author fullname="O. Garcia-Morchon" initials="O." surname="Garcia-Morchon"/>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="May" year="2023"/>
            <abstract>
              <t>This document describes how to extend the Internet Key Exchange Protocol Version 2 (IKEv2) to allow multiple key exchanges to take place while computing a shared secret during a Security Association (SA) setup.</t>
              <t>This document utilizes the IKE_INTERMEDIATE exchange, where multiple key exchanges are performed when an IKE SA is being established. It also introduces a new IKEv2 exchange, IKE_FOLLOWUP_KE, which is used for the same purpose when the IKE SA is being rekeyed or is creating additional Child SAs.</t>
              <t>This document updates RFC 7296 by renaming a Transform Type 4 from "Diffie-Hellman Group (D-H)" to "Key Exchange Method (KE)" and renaming a field in the Key Exchange Payload from "Diffie-Hellman Group Num" to "Key Exchange Method". It also renames an IANA registry for this Transform Type from "Transform Type 4 - Diffie- Hellman Group Transform IDs" to "Transform Type 4 - Key Exchange Method Transform IDs". These changes generalize key exchange algorithms that can be used in IKEv2.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9370"/>
          <seriesInfo name="DOI" value="10.17487/RFC9370"/>
        </reference>
      </references>
    </references>
    <?line 341?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA907f3PbNrL/81PgKTN3divStuw0iZLmqkhKrYstO5LcXqbT
SSESknimCJYg7egS57O8z/I+2e0uwF8S5cSJby7z1GksgcD+3sXuArRt23rw
4IH1gA3CRMShSOxezGcJO+XxpSevQzYRyyjgibBw0kiEfClYsvAVm/mBYLNY
LpmHK+xEetJeyTTGKXYUy0S6MnCWHkskm4uEqYTHifAcgKNxEKyZjJc8YQCw
oeE8y2A8t59dy/hyHss0gu80BOAaDpHyUsbMD/3E5wFTIkmjJoOFTIbBioVC
EFbh+QkQC0j8WCVsGkj3kskZ/BSBp5CQM5zeSPwkEA1apnDdVDB3wcO58J4y
TwQiEazBp9NYXDWYP0M8MaM1SLZayDhBWJ1wxSRgi5krQZhhwlweIiwkQ3hN
Nk0TAs1jMUsDFsoEkflhEksvdWFeHMuYyBpLlAxRya79IMBlwCTjaSJBWr7L
A6DbS2M/nGvukS7AvWIAnKWhIV+LqifDv4KEQzdIPeDE3t9vMJBew0a9qgR4
Co2UAtIvUnDCpyJQ+RNQEvsM9RiImggFSpiuABZCSKQMSLbAO0gIvuCom8Yx
CupKxMqX4VPgBQj0pIvQGoiWiXccDFBoTiZoeImxSMSg2GXMl2iodjxz22yR
JJFq7+3N/WSRTh1XLvdcPpV75VkA5w1YCionFgDJFUQL0OHHWghGySzSxHLm
+TP4gpRqc0UJdUnEueCAUNA5coHMwRx3kYsO7HvHebcMiKF/nJ40mUhcx3F2
kSnwPrKlNmucS5XYr1MeJumSTWIOdgPwwMB3zl/vTXbZ8Woa+x47fzVgnRSA
h2gJOCXTU+bE7BVYQv+dtgL2i5Yua7Gdwav+VWu3YWlrBpQ0wM5fT44JZMMC
gGIu41Ub/NWzLKOLttH+IrX9SAkXPfxP+EkE2WCWC3v/wFLpdOkrxJWsIlgz
6E9eMvaA8UBJwOWHnogE/BMmjSZroFvIGPwXfww6L+APWuVgNHnZsMJ0ORVx
2/KAnLYFDqVAuKlqsyROhQWUH1pgZByoFK6V22GbGeqsS7GCUa9tMZuVxYq/
jRirIsQHJAzrSoQp4GTMgPz1Z/iuGfoVEKHL/YxPYHTJ/cDg/MkXycyR8RyG
eewuClvESTjiXwknm7SHA3vTWF4rsUfr9xAhWW2bXYz7o71R//wMxrRHFdAy
f0DTPulM+uOJZaH8ZYy8wgLGILgEWmnHaZP9PQ1pFLDy0P8XMdtmQ3npcxoX
mol/pqGzSH8KcRyB0zNXphCdwBYuQgxhbJwgNRhCO0sRg+Q2Ub7hKp2lS5+d
gm7lJa/DPZmw3ln37PSsyQbDrlMmY2WWO0u93PGSn8IkATOUS7lJ1995xEPL
skLyMpAw6m1g90jQEI2WkQJDtWFdJBWwYCt/ripzoj9TP8oMGZ6GPEljmBcJ
F0xtqWoAuiJO7ClYM5iCDS5tL9Mg8ckLcPboZfdR68kP2dej1iPz9cnDJ4f4
9R/OD0/228RI5vmDUMcJdNOJcBehDOR8BSbZGQ+dA4hNrkRsLE4DAU4wBur8
Web8oI4XXPku62fTRjiN7bzoj3abrMtDGeKWsfG8C88ZDz3W81UC46mvFqDl
9Wk9mNYgchUoXSgfiNXkg2jGZ3uDfrfNHj9uPbQP2q391gHb6e9mjycX9qQN
eQNoYAmurwkmAdAMcm/2UkwdXGhZfiYH1CTMOD2xe+NORVansFkGwj7hCbiu
sIFzgQyA7wCH40yBaKqALvZKaDrpHNEcbmFlOBgDqS8H52O7tX9kBsniIZKZ
TOM8nQYgaMpfNFE8htymcE9Xxa4Tgjidubzai9Kp2puBf+8BRPBzCKiWpY3h
8aPHR5ldHD4Cc7As27YZn6ok5m4Cs85CCOjnEBpwO+UQ32EbuZZp4GE24C8j
mEU7LOvGqyiR85hHC5MZjCBpuYJ4x7LNpAsOkMLeADofve7uYt6iIz+v7iNT
kibuYaXdh6sVKC8Bf2dugQqiOuwTELHAR5hwwFrGnSbrd0FfT9k1ULKgNODa
hwwKchXYaeUKYK8hlBH+oZBCBDmwx8NOS0tDcV2J3WVGcUsEPgoaaG/1jBnk
fswC/1KQZtn799qYbm6abCGvBeQcDNNDfgk2nvg6FSWc9UyabR2ANpmi9CXW
+Z+ALMZPViz21SVOgrREp6G4IyO8HAYoDnAIREsJNOR3kGNI2HAcndpAmEuX
mGZ4QrmxPwXKuFGUjlDr4lPuQlBCDrbhkm1g7skhHZhCKlrVIvg5yKzEkeGD
J+tQM65ADYoFEiIB/JVgjgUnJuEwVBky8nWOseal73mBsPJsiRJKzBSs73Tq
jbIaX5yfn40m/d7bzsXk+O1pf3J81huTNgp8ED8g4mryeBhC/HcFSqoJaTSR
CNokYIOfh53Jxaj/9rgzPn7bOfn5bDSYHJ+OASP3PDYL+NxI3rBQhgaTXNir
/Rko71rSpk+miRkXpdkGisL8XM80MkP5oFkx5IFFfBVI7qFAXO155PlUZVGy
TxmH1fkS19VqhvSNX/4XvXR4D755jR4UCxcQAe4IQyvtP7f7LOaCQG3MIolF
FkZlUOp1XqtUPO6vYJHlvVKRG/iYQaG+9VgTHZLKLAwGRSwAaMpEoYrfmBKx
6r9jadwaw8AKp8jMwNdWmyCQV2s6qGSBDyAs8bEnwI0DkIbnKzelpBpNbClh
b8y3fZ6HhQjo4KBM8pqN2uD9+7Egm2MHziFp8XPTn5sb8OWtsSm8Q3CisKT+
63Gpj1LS22oksLgz7k/LVBpFUM2jhOpZuvL5tngF5XyRkgFdnpj5ofC0+E32
h3Y8F6GIKY1GzsGiYRX8qMSNVGH6lWet6/sZkgr6doUHQ2uYPpX8kkJfyiCQ
14ijEuZ0JwFt0gWjjgWUT9YBGCY8h9SOdRiSBaUuJsCaV6PdBVclai/RsO9M
ltUymFptNgGqSkjAIlDL1/666eRqJ5ShV0yrWBQ+pvDbleEVajMLBD0kkaAp
tHJNOtaNijVOL8YTrEzxLxue0fdR//XFYNTv4ffxcefkJP9imRnj47OLk17x
rVgJ9c5pf9jTi2GUVYasxmnnDTxBqhpn55PB2bBzYjozZedD5ejw42OtH8UC
k0CurMwrSd4vuuf/978HRyD3/wHLax0cPLm5MT8eHzw6gh/XYNVNIzIIU/on
hiQLQong2FsD+QXM5RFGbdAAp1bXNexyghzpu99QMr+32bOpGx0cPTcDyHBl
MJNZZZBktjmysVgLsWaoBk0uzcr4mqSr9HbeVH5nci8NPvtbAEbM7IPHf3sO
JnT3/Rrd5k/zyM0ekdNgcgDl6xQcCnyPNnQq8QRYNtgg5nJlbEytVCKWCkT/
2RsvIP9UVqAtaiHT+SIxlpXF2DkG7IQhG7gJlByvuyXB6L/TheSnk5EsjRHA
uLwUIdUxgKipI1yRpTDHwWYZJU+015RbW1a+Z0IW6OYppmmoepvuY/qOGhI6
u8iaZBRPFdp5oKWB2zkZ9FRQAwsUo/zAN1CQVvIaE6s5bUc6Qi1wy9+b1G8h
zXJXs0qChkTLz1/VbSFYM+IWAgAM7PJ6ZczK9HmrERA3LmpTbGA1jNduWVCY
0n6hk9dM6iZW1u+QBTUgd8ipUqxnEw2UhznjkGn6bpLhKvcRZ/4crA/ZTBYb
AgKwIJtKAZcbku6910rkSgZXuLQiEpA2bPuYs1eQkLmE9BcoD1XEY6PzKqcg
lo/Fx9IdggRUs+0zEiqSIWSuWBp97cc67o2abNzxD5rsVd9vsqHftApcw52L
cf8tiGqX2fZza5OYZ1CdMQMjJhgxwID/f+v2RxOI2c3fS0CaNRDqPsOd+uRo
1zL0vmLvBz2gFpF8X0aWI/ht0IsBN64m/loF7skYVk7GSOgOUPV20OsPJ4PJ
mybTv0pkbiXkZos8aiVD1Ma3UXv7RzPxW5Xa3d9vKobzvs0ebNq/7nb92Kjt
VReeqCOOCQ2V0Ni4AZfFQ6lSdWuVf1HCZ/LdeldGD1jEFAu/MufVhaaJTNjT
gEqPCOCuK6KE9sA15LB7LKSnKuW5aq6Fc41PleqgKpDKYi2rWZ766k5jmxpy
Wz4HNWOtmjHdUmT7sKDFDtkRe8h+YI/YY/bkLmME5Hv7K/8jKB8YOxHhHPjd
ef5jaxd/owmxU5IqPWddSLDZiR9eAjUfWCeYw19qj+D6e6VFwwaCmKHtTp8t
tHwRlI/1DzvZpjDAwyksyOJa3bOPmXS/6nO/0i302GKZtFuFJpkZMOJfp/0L
aVmD8v09yuUOOqrzxW9SR/dByxa5OI7zeVA+/oes7pBlVne4bnWH/y+tblg3
8duyOkwqPGUXza3bsolyVoBpw2StK56XFMW+Pawt5ejKx6yoTvK2Ffb7S/sP
1sTYVr3iQZq1M6CYli43J1qDzrADSwobG7bpL+KKY51H09WXvC9WpPVDvc9z
Bok7sJgGPGbdjrORnmQd0UOn5bSQpzxfQWLBeIfsJVgzntEBJW26fwOkHpib
NpWziTL/WHNSw8ycGODy8d2Xt0rLu9SoGbOsv4KT/yViqEj09SZFl7L8paDZ
o/64P/ql38tx7lcrFTK0tRSk3uy0SXc/jD/kQLea6EZOm1mQTTHBGGDuTiRb
NLbv6l2sje1wMJDYx+TQDnQyo0/D5fSfoLu8iUKH4yJrmn76KBt0TwfQNzf6
MCDDqkiWJcVQg72uCbvNlB5VWuu3NWDx2g8bC23Fazn69jQ6zirI3CO35OU+
NebfjjtvB8PBxKxTgu0gw/m5SbDSjQ0zezCc9Een/d6gM+nnS3YpeccrUXl9
m+Gmw5ZyAWDgUCc7Fn+mQiXAKnJZovhzUnWEVM9ZVkrkxwn72AwZ1mqpxq7w
HICo0XUH1BMCjwPqLLBkFrxy+ohWUbS80IB5pSmNZ4WFDVEsqgatBVelThjb
Ec7cAXT2aNwZd+zz8VgvwvOYBW89/GGXUFR7F/kifT5mHx3tku+D4FyuqKF4
jGj042ZxWk0K53izzd5GR4bVGhTAyiEJhHYlQtMz1Nf4SucB1ItL1k4DShOa
po/JwE2DQLd0tnhZTpo5QcqEqPLrg1W1JGunBlVV6I5/lekdtQsWmoXXqZ/Q
KWLpjBibo3Tx0gX0pD1Afb0Q1Gqq2NJGUC9Iy3eEvbIYnbVyHJUuU0AVrraY
LkomMD2tpNT4LG10ICFsuuYn0jlBjg45I+EK/2oz6Ay2HXhV3VLRca1/hbdZ
UWbmV8zchZRKrDXJ8KKDEsHMROYt7VD8Vdw7QRVgIhBAmAp8V5/qbB4F1Xns
juky6JHVbW67u3ZOeBvTSAAvbgCwHbO74wExqXNXn5gtQAB099ONheFdH+oh
AOwcZad72uioOYOP/1J5qLMv3Z+uHAniEdt67+KWnOaxyWjwJtrNza1NDnbn
Psdm/vBFrY77KkYw7R6Kdwk7N7LCnIWVUpZSWp5NMd2RStp9n/RUui2bZUGJ
trrP/dPzdZ+Mnm1FUtV9ejzh9RM/3jM9Xy8fzFTjmYtuQu3XPFEt+R6mqS+L
qqYmgGlXNepGT9WVTcU3y0HlxlRZdYLTG492dZU5er2XZz5+1Hqkffw2J7+z
j39rLq6T/8xxP9TuAZUC4T9kMhk9X/fZcKlPsoM5rx+mGP5Ln2/Ppe6Xni0h
Bz7FXd9fyNvqP9+efOjAh+vDHg89Pgs5NcEA/N1EnfWA9CLLmCDDEnSSWmdA
mHvotAVzFR2r1uWG9xAoZfHolDi/WFQNOjrrwSrUfG9RIYtJpb4fBIWrSpfi
dnoAV8fRl4o2Tu6RGS0PfQsByMQ8k8qS/HR1TKNngCBRe/mJanl0a1LUcg4e
VrIivHGkb0KRTJiM8GIWZewZxdSN6hgiClBHTgv98nOKfcwTywsPP3fhU13i
JO+AiyhN9GkciCWhl74AhH53xz5/PbF1X8+mN3gq17t8uqRX1O7m+F3f6+rQ
Eb1nY6V4egJ14tERFqGt/aPHWIba4+MOFIJZyU2VWqmohJqzJMAvYnH9RI4Y
betdzGbqMuM5ivHOoy4lpW6foXVU78it1ZkGyCldda+zHjOBBKy2CdNMOj/G
OVoelt66NwkoV8HZxZHi5cNykl/2m5YGV3gdXlbEfh6YsXasJl0iXZdBzQ3K
MgF5wRqsnmrrxZ4KWvm6f1ed5A6WraPJH8vAU3z86o8tytLGUu0A6I7SH8jD
9oVlDkurQXa/ZrdssssklQBF9mMzQ9YdqNLk3GJzo+oK65P29RnWtW5bZdNa
1+ntRpW/A0i141Ioxee5rLcIswJSCcgwvHVDJVPFxgG+iOZ1S+wPwrW2UMUv
y0g6b/LXEjbhFC9Oml4AgskbC+a2H12TXRmlZ+9ZVpoyFROuMeBbXtpCU57p
y9b6Oq7ZgQ1ufLR59wff0s3e/OiaK+m8dJM0fy0ESNFXfoNbboXRrSN90Xvj
xuwXXNGmWL0UuK/6annnq7hN3XbWdQWFl0obOimzV7qebgyw2u2EdVnXMYqC
lZYcnu/USK3MgmkgY3NQF1MA3bytupYo6bKrwVQ6jcXchw1yxVLqzBGaxme+
FMvOeQxxF+aqBssAmfdYpty9RLo77mUor8FQ5nSjBFI5/Z6q8H5szIBJunUz
OeudgW1mMyFi/Rt6B9CfZj8AAA==

-->

</rfc>
