<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-lamps-attestation-freshness-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Nonce Extension for CMP/EST">Nonce-based Freshness for Remote Attestation in Certificate Signing Requests (CSRs) for the Certification Management Protocol (CMP) and for Enrollment over Secure Transport (EST)</title>

    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>Siemens</organization>
      <address>
        <email>hannes.tschofenig@siemens.com</email>
      </address>
    </author>
    <author initials="H." surname="Brockhaus" fullname="Hendrik Brockhaus">
      <organization>Siemens</organization>
      <address>
        <email>hendrik.brockhaus@siemens.com</email>
      </address>
    </author>

    <date year="2024" month="May" day="06"/>

    <area>Security</area>
    <workgroup>LAMPS</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 59?>

<t>Certificate Management Protocol (CMP) and Enrollment over Secure
Transport (EST) define protocol messages for X.509v3 certificate
creation and management. Both protocol provide interactions
between client systems and PKI management entities, such as a Registration
Authority (RA) and a Certification Authority (CA).</t>

<t>CMP and EST allow an RA/CA to request additional information it has to
provide in a certification request. When an end entity
places attestation Evidence in a Certificate Signing Request (CSR)
it may need to demonstrate freshness of the provided Evidence.
Attestation technology today often accomplishes this task via the
help of nonces.</t>

<t>This document specifies how nonces are provided by an RA/CA to
the end entity for inclusion in Evidence.</t>



    </abstract>



  </front>

  <middle>


<?line 77?>

<section anchor="introduction"><name>Introduction</name>

<t>Several protocols have been standardized to automate the management
of certificates, such as certificate issuance, CA certificate provisioning,
certificate renewal and certificate revocation.</t>

<t>The Certificate Management Protocol (CMP) <xref target="I-D.ietf-lamps-rfc4210bis"/>
defines protocol messages for X.509v3 certificate creation and
management. CMP provides interactions between end entities and
PKI components, such as a Registration Authority (RA) and a
Certification Authority (CA).</t>

<t>Enrollment over Secure Transport (EST) <xref target="RFC7030"/><xref target="RFC8295"/> is another
certificate management protocol, which provides a sub-set
of the features offered by CMP.</t>

<t>An end entity requesting a certificate from a Certification Authority (CA)
may wish to offer believable claims about the protections afforded
to the corresponding private key, such as whether the private key
resides on a hardware security module or the protection capabilities
provided by the hardware, and claims about the platform itself.</t>

<t>To convey these claims in Evidence, as part of remote attestation,
the remote attestation extension <xref target="I-D.ietf-lamps-csr-attestation"/> has
been defined. It describes how to encode Evidence produced by an Attester
for inclusion in Certificate Signing Requests (CSRs), and any
certificates necessary for validating it.</t>

<t>A Verifier or Relying Party might need to learn the point in time
an Evidence has been produced.  This is essential in deciding whether
the included Claims can be considered fresh, meaning they still reflect
the latest state of the Attester.</t>

<t>Attestation technology available today, such as <xref target="TPM20"/> and
<xref target="I-D.tschofenig-rats-psa-token"/>, often accomplish freshness with
the help of nonces. More details about ensuring freshness of Evidence
can be found in Section 10 of <xref target="RFC9334"/>.</t>

<t>Since an end entity needs to obtain a nonce from the Verifier via the
Relying Party, this leads to an additional roundtrip. The CSR is, however,
a one-shot message. For this reason CMP and EST are used by the end entity
to obtain the nonce from the RA/CA.</t>

<t>CMP and EST conveniently offer a mechanism to request
information from the RA/CA prior to a certification request.</t>

<t>Once the nonce
is obtained the end entity can issue an API call to the Attester
to request Evidence and passes the nonce as an input parameter
into the API call. The returned Evidence is then embedded into
a CSR and returned to the RA/CA in a certification request message.</t>

<t><xref target="fig-arch"/> shows this interaction graphically. The nonce is obtained
in step (1) using the extension to CMP/EST defined in this document.
The CSR extension of <xref target="I-D.ietf-lamps-csr-attestation"/> is used to
convey Evidence to the RA/CA in step (2). The Verifier processes the
received information and returns an Attestation Result to the Relying
Party in step (3).</t>

<figure title="Architecture with Background Check Model." anchor="fig-arch"><artset><artwork  type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="352" width="448" viewBox="0 0 448 352" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
<path d="M 8,176 L 8,320" fill="none" stroke="black"/>
<path d="M 48,240 L 48,272" fill="none" stroke="black"/>
<path d="M 112,176 L 112,320" fill="none" stroke="black"/>
<path d="M 240,32 L 240,96" fill="none" stroke="black"/>
<path d="M 240,176 L 240,200" fill="none" stroke="black"/>
<path d="M 240,216 L 240,320" fill="none" stroke="black"/>
<path d="M 280,104 L 280,208" fill="none" stroke="black"/>
<path d="M 320,104 L 320,240" fill="none" stroke="black"/>
<path d="M 344,104 L 344,168" fill="none" stroke="black"/>
<path d="M 368,32 L 368,96" fill="none" stroke="black"/>
<path d="M 368,176 L 368,320" fill="none" stroke="black"/>
<path d="M 240,32 L 368,32" fill="none" stroke="black"/>
<path d="M 240,96 L 368,96" fill="none" stroke="black"/>
<path d="M 8,176 L 112,176" fill="none" stroke="black"/>
<path d="M 240,176 L 272,176" fill="none" stroke="black"/>
<path d="M 288,176 L 312,176" fill="none" stroke="black"/>
<path d="M 328,176 L 368,176" fill="none" stroke="black"/>
<path d="M 120,208 L 280,208" fill="none" stroke="black"/>
<path d="M 120,240 L 232,240" fill="none" stroke="black"/>
<path d="M 248,240 L 320,240" fill="none" stroke="black"/>
<path d="M 8,320 L 112,320" fill="none" stroke="black"/>
<path d="M 240,320 L 368,320" fill="none" stroke="black"/>
<polygon class="arrowhead" points="352,168 340,162.4 340,173.6 " fill="black" transform="rotate(90,344,168)"/>
<polygon class="arrowhead" points="328,104 316,98.4 316,109.6 " fill="black" transform="rotate(270,320,104)"/>
<polygon class="arrowhead" points="240,240 228,234.4 228,245.6 " fill="black" transform="rotate(0,232,240)"/>
<polygon class="arrowhead" points="128,208 116,202.4 116,213.6 " fill="black" transform="rotate(180,120,208)"/>
<polygon class="arrowhead" points="56,272 44,266.4 44,277.6 " fill="black" transform="rotate(90,48,272)"/>
<polygon class="arrowhead" points="56,240 44,234.4 44,245.6 " fill="black" transform="rotate(270,48,240)"/>
<g class="text">
<text x="300" y="68">Verifier</text>
<text x="392" y="116">(3)</text>
<text x="400" y="132">Attestation</text>
<text x="396" y="148">Result</text>
<text x="168" y="164">(1)</text>
<text x="160" y="180">Nonce</text>
<text x="196" y="180">in</text>
<text x="152" y="196">CMP</text>
<text x="180" y="196">or</text>
<text x="208" y="196">EST</text>
<text x="40" y="212">End</text>
<text x="52" y="228">Entity</text>
<text x="172" y="260">Evidence</text>
<text x="280" y="260">Relying</text>
<text x="148" y="276">in</text>
<text x="176" y="276">CSR</text>
<text x="272" y="276">Party</text>
<text x="328" y="276">(RA/CA)</text>
<text x="60" y="292">Attester</text>
<text x="168" y="292">(2)</text>
</g>
</svg>
</artwork><artwork  type="ascii-art"><![CDATA[
                              .---------------.
                              |               |
                              |   Verifier    |
                              |               |
                              '---------------'
                                   |    ^  |    (3)
                                   |    |  | Attestation
                                   |    |  |   Result
                    (1)            |    |  v
 .------------.   Nonce in    .----|----|-----.
 |            |   CMP or EST  |    |    |     |
 |  End       |<-------------------+    |     |
 |  Entity    |               |         |     |
 |    ^       |-------------->|---------'     |
 |    |       |   Evidence    | Relying       |
 |    v       |   in CSR      | Party (RA/CA) |
 |  Attester  |     (2)       |               |
 |            |               |               |
 '------------'               '---------------'
]]></artwork></artset></figure>

<t>The functionality of this document is described in two
sections, namely:</t>

<t><list style="symbols">
  <t><xref target="CMP"/> describes how to convey the nonce CMP, and</t>
  <t><xref target="EST"/> offers the equivalent functionality for EST.</t>
</list></t>

</section>
<section anchor="terminology-and-requirements-language"><name>Terminology and Requirements Language</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 <xref target="RFC2119"/>.</t>

<t>The terms Attester, Relying Party, Verifier and Evidence are defined
in <xref target="RFC9334"/>. The terms end entity, certification authority (CA),
and registration authority (RA) are defined in <xref target="RFC5280"/>.</t>

<t>We use the terms Certificate Signing Request (CSR) and certification
request interchangeably.</t>

</section>
<section anchor="CMP"><name>Conveying a Nonce in CMP</name>

<t>Section 5.3.19.16 of <xref target="I-D.ietf-lamps-rfc4210bis"/> defines the
general request message (genm) and general response (genp). 
The NonceRequest payload of the genm message, which is
send by the end entity to request a nonce, contains optional
details on the length of nonce the Attester requires.  The
NonceResponse payload of the genp message, which is
sent by the CA/RA in response to a request message by the end
entity, contains the nonce.</t>

<figure><artwork><![CDATA[
 GenMsg:    {id-it TBD1}, NonceRequestValue
 GenRep:    {id-it TBD2}, NonceResponseValue | < absent >

 id-it-NonceRequest OBJECT IDENTIFIER ::= { id-it TBD1 }
 NonceRequestValue ::= SEQUENCE {
    len INTEGER OPTIONAL,
    -- indicates the required length of the requested nonce
    hint EvidenceHint OPTIONAL
    -- indicates which Verifier to request a nonce from
 }

 id-it-NonceResponse OBJECT IDENTIFIER ::= { id-it TBD2 }
 NonceResponseValue ::= SEQUENCE {
    nonce OCTET STRING
    -- contains the nonce of length len
    -- provided by the Verifier indicated with hint
    expiry Time OPTIONAL
    -- indicates how long the Verifier considers the
    -- nonce valid
 }
]]></artwork></figure>

<t>Note: The EvidenceHint structure is defined in <xref target="I-D.ietf-lamps-csr-attestation"/>.
The hint is intended for an Attester to indicate to the EST server
which Verifier should be invoked to request a nonce.</t>

<t>The use of the general request/response message exchange leads to an
extra roundtrip to convey the nonce from the CA/RA to the end entity
(and ultimately to the Attester inside the end entity).</t>

<t>The end entity MUST construct a NonceRequest request message to
trigger the RA/CA to transmit a nonce in the response.</t>

<t>[Open Issue: Should request message indicate the remote attestation
capability of the end entity rather than relying on "policy
information"?  This may also allow to inform the CA/RA about the type
of attestation technology/technologies available to the end entity.]</t>

<t>If the end entity supports remote attestation and the policy requires
Evidence in a CSR to be provided, the RA/CA issues an NonceResponse
response message containing a nonce.</t>

<t><xref target="fig-cmp-msg"/> showns the interaction graphically.</t>

<figure title="CMP Exchange with Nonce and Evidence." anchor="fig-cmp-msg"><artwork><![CDATA[
End Entity                                          RA/CA
==========                                      =============

              -->>-- NonceRequest -->>--
                                                Verify request
                                                Generate nonce*
                                                Create response
              --<<-- NonceResponse --<<--
                      (nonce, expiry)

Generate key pair
Generate Evidence*
Generate certification request message
              -->>-- certification request -->>--
                    (+Evidence including nonce)
                                               Verify request
                                               Verify Evidence*
                                               Check for replay*
                                               Issue certificate
                                               Create response
              --<<-- certification response --<<--
Handle response
Store certificate

*: These steps require interactions with the Attester
(on the EE side) and with the Verifier (on the RA/CA side).
]]></artwork></figure>

</section>
<section anchor="EST"><name>Conveying a Nonce in EST</name>

<t>The EST client can request a nonce for its Attester.
This function is generally performed after requesting CA certificates
and before other EST functions.</t>

<t>The EST server MUST support the use of the path-prefix of "/.well-
known/" as defined in <xref target="RFC5785"/> and the registered name of "est".
Thus, a valid EST server URI path begins with
"https://www.example.com/.well-known/est".  Each EST operation is
indicated by a path-suffix that indicates the intended operation.</t>

<t>The following operation is defined by this specificaion:</t>

<figure><artwork><![CDATA[
 +------------------------+-----------------+-------------------+
 | Operation              |Operation path   | Details           |
 +========================+=================+===================+
 | Retrieval of a nonce   | /nonce          | This section      |
 +------------------------+-----------------+-------------------+
]]></artwork></figure>

<t>The operation path is appended to the path-prefix to form
the URI used with HTTP GET or POST to perform the desired EST
operation.  An example valid URI absolute path for the "/nonce"
operation is "/.well-known/est/nonce".</t>

<t>An EST client uses a GET or a POST depending on whether parameters
are included:</t>

<t><list style="symbols">
  <t>A GET request MUST be used when the EST client does not want to
convey extra parameters.</t>
  <t>A POST request MUST be used when parameters, like nonce length
or a hint about the verification service, are included in the request.</t>
</list></t>

<figure><artwork><![CDATA[
 +-------------------+---------------------------------+---------------+
 | Message type      | Media type(s)                   | Reference     |
 | (per operation)   |                                 |               |
 +===================+=================================+===============+
 | Nonce Request     | N/A (for GET) or                | This section  |
 |                   | application/json (for POST)     |               |
 +===================+=================================+===============+
 | Nonce Response    | application/json                | This section  |
 |                   |                                 |               |
 +===================+=================================+===============+
]]></artwork></figure>

<t>To retrieve a nonce using a GET, the EST client would use the following
HTTP request-line:</t>

<figure><artwork><![CDATA[
GET /.well-known/est/nonce HTTP/1.1
]]></artwork></figure>

<t>To retrieve a nonce by specifying the size of the requested nonce
(and/or by including a hint about the Verification service) a POST
message is used, as shown below:</t>

<figure><artwork><![CDATA[
POST /.well-known/est/nonce HTTP/1.1
Content-Type: application/json
{
  "len": 8,
  "hint": "https://example.com"
}
]]></artwork></figure>

<t>The payload in a POST request MUST be of content-type of "application/json"
and MUST contain a JSON object <xref target="RFC7159"/> with the member "len" and/or
"hint". The value of the "len" member indicates the length of the requested
nonce value in bytes. The "hint" member contains either be a rfc822Name, a
dNSName, a uri, or a test value (based on the definition in the EvidenceHint
structure from <xref target="I-D.ietf-lamps-csr-attestation"/>).</t>

<t>The EST server MAY request HTTP-based client authentication, as
explained in Section 3.2.3 of <xref target="RFC7030"/>.</t>

<t>If the request is successful, the EST server response MUST contain
a HTTP 200 response code with a content-type of "application/json"
and a JSON object  <xref target="RFC7159"/> with the member nonce. The expiry
member is optional and indicates the time the nonce is considered
valid. After the expiry time is expired, the session is likely
garbage collected.</t>

<t>Below is a non-normative example of the response given by the EST server:</t>

<figure><artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/json

{
    "nonce": "MTIzNDU2Nzg5MDEyMzQ1Njc4OTAxMjM0NTY3ODkwMTI=",
    "expiry": "2031-10-12T07:20:50.52Z"
}
]]></artwork></figure>

<t>[Open Issue: Should we also register a content type for use with
EST over CoAP where the nonce and the expiry field is encoded in
a CBOR structure?]</t>

</section>
<section anchor="nonce-processing-guidelines"><name>Nonce Processing Guidelines</name>

<t>When the RA/CA is requested or configured to transmit a nonce to an
end entity then it interacts with the Verifier.
The Verifier is, according to the IETF RATS architecture <xref target="RFC9334"/>, "a role
performed by an entity that appraises the validity of Evidence about
an Attester and produces Attestation Results to be used by a Relying
Party." Since the Verifier validates Evidence it is also the source
of the nonce to check for replay.</t>

<t>The nonce value MUST contain a random byte sequence whereby the length
depends on the used remote attestation technology.
Since the nonce is relayed with the RA/CA, it MUST be copied to
the respective structure, as described in <xref target="EST"/> and <xref target="CMP"/>, for
transmission to the Attester.</t>

<t>For example, the PSA attestation token <xref target="I-D.tschofenig-rats-psa-token"/>
supports nonces of length 32, 48 and 64 bytes. Other attestation
technologies use nonces of similar length. The assumption in this
specification is that the RA/CA have out-of-band knowledge about the
required nonce length required for the attestation technology used by
the end entity. The nonces of incorrect length will cause the remote
attestation protocol to fail.</t>

<t>When the end entity receives the nonce it MUST use it, if remote
attestation is available and supports nonces. It is better for an
RA/CA to be aggressive in sending a nonce, at least where there is a
reasonable chance the client supports remote attestation and the
client should be allowed to ignore the nonce if it either does not
support it or cannot use it for policy reasons.</t>

<t>While the semantics of the attestation API and the software/hardware
architecture is out-of-scope of this specification, the API will return
Evidence from the Attester in a format specific to the attestation technology
utilized. The encoding of the returned evidence varies but will be placed
inside the CSR, as specified in <xref target="I-D.ietf-lamps-csr-attestation"/>. The
software creating the CSR will not have to interpret the Evidence format
- it is treated as an opaque blob. It is important to note that the
nonce is carried in the Evidence, either implicitly or explicitly, and
it MUST NOT be conveyed in CSR structures outside the Evidence payload.</t>

<t>The processing of the CSR containing Evidence is described in
<xref target="I-D.ietf-lamps-csr-attestation"/>. Note that the issued certificates
does not contain the nonce, as explained in
<xref target="I-D.ietf-lamps-csr-attestation"/>.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>TBD:</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This specification defines how to obtain a nonce via CMP and EST and
assumes that the nonce does not require confidentiality protection
without impacting the security property of the remote attestation protocol.
<xref target="RFC9334"/> defines the IETF remote attestation architecture discusses
nonce-based freshness in great detail.</t>

<t>Section 8.4 of <xref target="I-D.ietf-rats-eat"/> places randomness and privacy requirement
on the generation of the nonce for use with an Entity Attestation Token (EAT).
These requirements have been adopted by attestation technologies, such
as the PSA attestation token <xref target="I-D.tschofenig-rats-psa-token"/> and are of general
utility:</t>

<t><list style="symbols">
  <t>The nonce MUST have at least 64 bits of entropy.</t>
  <t>To avoid the conveyance of privacy-related information in the nonce,
it should be derived using a salt that originates from a true and
 reliable random number generator or any other source of randomness.</t>
</list></t>

<t>Since each specification of an attestation technology offers guidance
for replay protection with nonces (and other techniques) this document
needs to defer specific guidance to the respective specifications.</t>

<t>For the use of Evidence in a CSR the security considerations of
<xref target="I-D.ietf-lamps-csr-attestation"/> are relevant to this document.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>


<reference anchor="I-D.ietf-lamps-csr-attestation">
   <front>
      <title>Use of Remote Attestation with Certificate Signing Requests</title>
      <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
         <organization>Entrust Limited</organization>
      </author>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         <organization>Siemens</organization>
      </author>
      <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
         <organization>Fraunhofer SIT</organization>
      </author>
      <date day="1" month="March" year="2024"/>
      <abstract>
	 <t>   A PKI end entity requesting a certificate from a Certification
   Authority (CA) may wish to offer believable claims about the
   protections afforded to the corresponding private key, such as
   whether the private key resides on a hardware security module or the
   protection capabilities provided by the hardware.

   This document defines a new PKCS#10 attribute attr-evidence and CRMF
   extension ext-evidence that allows placing any Evidence data, in any
   pre-existing format, along with any certificates needed to validate
   it, into a PKCS#10 or CRMF CSR.

   Including Evidence along with a CSR can help to improve the
   assessment of the security posture for the private key, and the
   trustworthiness properties of the submitted key to the requested
   certificate profile.  These Evidence Claims can include information
   about the hardware component&#x27;s manufacturer, the version of installed
   or running firmware, the version of software installed or running in
   layers above the firmware, or the presence of hardware components
   providing specific protection capabilities or shielded locations
   (e.g., to protect keys).

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-08"/>
   
</reference>


<reference anchor="I-D.ietf-lamps-rfc4210bis">
   <front>
      <title>Internet X.509 Public Key Infrastructure -- Certificate Management Protocol (CMP)</title>
      <author fullname="Hendrik Brockhaus" initials="H." surname="Brockhaus">
         <organization>Siemens</organization>
      </author>
      <author fullname="David von Oheimb" initials="D." surname="von Oheimb">
         <organization>Siemens</organization>
      </author>
      <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
         <organization>Entrust</organization>
      </author>
      <author fullname="John Gray" initials="J." surname="Gray">
         <organization>Entrust</organization>
      </author>
      <date day="6" month="May" year="2024"/>
      <abstract>
	 <t>   This document describes the Internet X.509 Public Key Infrastructure
   (PKI) Certificate Management Protocol (CMP).  Protocol messages are
   defined for X.509v3 certificate creation and management.  CMP
   provides interactions between client systems and PKI components such
   as a Registration Authority (RA) and a Certification Authority (CA).

   This document obsoletes RFC 4210 by including the updates specified
   by CMP Updates RFC 9480 Section 2 and Appendix A.2 maintaining
   backward compatibility with CMP version 2 wherever possible and
   obsoletes both documents.  Updates to CMP version 2 are: improving
   crypto agility, extending the polling mechanism, adding new general
   message types, and adding extended key usages to identify special CMP
   server authorizations.  Introducing CMP version 3 to be used only for
   changes to the ASN.1 syntax, which are: support of EnvelopedData
   instead of EncryptedValue, hashAlg for indicating a hash
   AlgorithmIdentifier in certConf messages, and RootCaKeyUpdateContent
   in ckuann messages.

   In addition to the changes specified in CMP Updates RFC 9480 this
   document adds support for management of KEM certificates.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc4210bis-10"/>
   
</reference>

<reference anchor="RFC8295">
  <front>
    <title>EST (Enrollment over Secure Transport) Extensions</title>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="January" year="2018"/>
    <abstract>
      <t>The EST (Enrollment over Secure Transport) protocol defines the Well-Known URI (Uniform Resource Identifier) -- /.well-known/est -- along with a number of other path components that clients use for PKI (Public Key Infrastructure) services, namely certificate enrollment (e.g., /simpleenroll). This document defines a number of other PKI services as additional path components -- specifically, firmware and trust anchors as well as symmetric, asymmetric, and encrypted keys. This document also specifies the PAL (Package Availability List), which is an XML (Extensible Markup Language) file or JSON (JavaScript Object Notation) object that clients use to retrieve packages available and authorized for them. This document extends the EST server path components to provide these additional services.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8295"/>
  <seriesInfo name="DOI" value="10.17487/RFC8295"/>
</reference>

<reference anchor="RFC7030">
  <front>
    <title>Enrollment over Secure Transport</title>
    <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
    <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
    <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
    <date month="October" year="2013"/>
    <abstract>
      <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7030"/>
  <seriesInfo name="DOI" value="10.17487/RFC7030"/>
</reference>

<reference anchor="RFC5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>

<reference anchor="RFC5785">
  <front>
    <title>Defining Well-Known Uniform Resource Identifiers (URIs)</title>
    <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
    <author fullname="E. Hammer-Lahav" initials="E." surname="Hammer-Lahav"/>
    <date month="April" year="2010"/>
    <abstract>
      <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5785"/>
  <seriesInfo name="DOI" value="10.17487/RFC5785"/>
</reference>

<reference anchor="RFC7159">
  <front>
    <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
    <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
    <date month="March" year="2014"/>
    <abstract>
      <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
      <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7159"/>
  <seriesInfo name="DOI" value="10.17487/RFC7159"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC9334">
  <front>
    <title>Remote ATtestation procedureS (RATS) Architecture</title>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <author fullname="D. Thaler" initials="D." surname="Thaler"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="N. Smith" initials="N." surname="Smith"/>
    <author fullname="W. Pan" initials="W." surname="Pan"/>
    <date month="January" year="2023"/>
    <abstract>
      <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9334"/>
  <seriesInfo name="DOI" value="10.17487/RFC9334"/>
</reference>


<reference anchor="I-D.tschofenig-rats-psa-token">
   <front>
      <title>Arm&#x27;s Platform Security Architecture (PSA) Attestation Token</title>
      <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
      <author fullname="Simon Frost" initials="S." surname="Frost">
         <organization>Arm Limited</organization>
      </author>
      <author fullname="Mathias Brossard" initials="M." surname="Brossard">
         <organization>Arm Limited</organization>
      </author>
      <author fullname="Adrian L. Shaw" initials="A. L." surname="Shaw">
         <organization>HP Labs</organization>
      </author>
      <author fullname="Thomas Fossati" initials="T." surname="Fossati">
         <organization>Linaro</organization>
      </author>
      <date day="21" month="February" year="2024"/>
      <abstract>
	 <t>   The Arm Platform Security Architecture (PSA) is a family of hardware
   and firmware security specifications, as well as open-source
   reference implementations, to help device makers and chip
   manufacturers build best-practice security into products.  Devices
   that are PSA compliant can produce attestation tokens as described in
   this memo, which are the basis for many different protocols,
   including secure provisioning and network access control.  This
   document specifies the PSA attestation token structure and semantics.

   The PSA attestation token is a profile of the Entity Attestation
   Token (EAT).  This specification describes what claims are used in an
   attestation token generated by PSA compliant systems, how these
   claims get serialized to the wire, and how they are cryptographically
   protected.

   This informational document is published as an independent submission
   to improve interoperability with ARM&#x27;s architecture.  It is not a
   standard nor a product of the IETF.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-tschofenig-rats-psa-token-22"/>
   
</reference>


<reference anchor="I-D.ietf-rats-eat">
   <front>
      <title>The Entity Attestation Token (EAT)</title>
      <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
         <organization>Security Theory LLC</organization>
      </author>
      <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
         <organization>Mediatek USA</organization>
      </author>
      <author fullname="Jeremy O&#x27;Donoghue" initials="J." surname="O&#x27;Donoghue">
         <organization>Qualcomm Technologies Inc.</organization>
      </author>
      <author fullname="Carl Wallace" initials="C." surname="Wallace">
         <organization>Red Hound Software, Inc.</organization>
      </author>
      <date day="5" month="May" year="2024"/>
      <abstract>
	 <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-26"/>
   
</reference>


<reference anchor="TPM20" target="https://trustedcomputinggroup.org/resource/tpm-library-specification/">
  <front>
    <title>Trusted Platform Module Library Specification, Family 2.0, Level 00, Revision 01.59</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2019" month="November"/>
  </front>
</reference>


    </references>


<?line 445?>

<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>We would like to thank Russ Housley, Thomas Fossati, Watson Ladd, Ionut Mihalcea
and Carl Wallace for their review comments.</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA8Vc63MbN5L/zir+DyjmQySHpB62NrYqzh4t07Z2rceKTHK5
q90rcAYkEQ1n5gZD0oys/O3XDwCDGVKWfKm6YyU2OYNHo9H96wca7vV67Vap
y0SdisssjVRvIo2KxbtCmXmqjBHTrBA3apGVSgzKUplSljpLhU7FmSpKPdWR
hFcjPUt1OoOW/72ENkbsnY1uzD71LucqaIudL2QqZ2qh0lJcF1mZRVkCHS6u
94VMY+ozTIssSahFtlKFGKloWSgxLmRq8qwoxd5wNN5vt9otOZkUamWpF8NP
pUoNzoGjwJAH0K7dirMolQtYY1zIadnTqpz2ErnITU9Wa+pN3aJ7h4ftFq5r
lhWbU2HKGGfSeXEqymJpyuPDw1eHxzB3oeQp06bLTbu1zorbWZEt81PxcXBx
PWq3btUGHsan4jwtVZGqsvcWKcDhYNY0/i+ZZCnQtVGm3cr1abslRDGNVGzK
TeKeCwEsCr/rNAbO+CcGGFKoqakebBb132Who6p9lC2Qs9V7nSY6DWZTn8pe
ok3Zg4EmWQINe9mz7/AVMHIh8xy22raWy3KeFUh3D9/jR6fQ4UNfjE00z6Yq
1TP3hvfgg0yByTteq4XUyamY0/t+6d//m9EoLKYPhLu2WQEUjPg5cnN7+jdF
Ft3O5dI0ZldpXOjb7ddudn7fn7j3T5m93UqzYgFStFK0hTfvzo6Pjl7R9/Pe
234gcJEpQqHb1QQE4MXx0eFEGzfYy+NXJ+7794fPD933k+OX1ffvX1Ztjk5w
cp1Om2S9ev78hZ+zYnGvkKXp5Ub2yuxWNaiid0qW9HR8fXHMc8Kn2n0RMGaM
OgIgcpYt8mWJsPAelcK2smjjGl0nskQqxUUWLxMlPupJIYuNGOUq8ojRFe/k
Qicbcdw/7IqPaqUScQjfbtRKk7YfHvVPXrkJZDFTIO3zsszN6cFByTNFjhrS
0D5QegD6ni2LSB2U+QIEnibumXDiAztmDGCAGLNSiwnA0fHh0Svc9V6vJ+QE
1EtGpNMhJH4Z5HYDXLvVQDgRqymopsjdCAuAJxiWcfnf+yeHr1bPRVRNC7gF
oEQoi9MsPBGgEFk5rwaCLysdK1AXACYgH3qAKE9UuVYqFVGikTSzAc4tDA11
/ffzYDgB/+tSK9MVZhnNhYRGsB0zjczAwdqtAQkHAKPYuxnwqmXDEARNzgb7
fWLhxTUzaDQWMkmyNfwSN4ODswEgnyjYvggZxxpHkInwQo5WqQT0MNAQwNSv
D2aNarPaQfriF1B2HB5UntcDGJ4nMgL2BioqhjgQWhca6wtmj6weWCUgYyE3
IlUg30B0DOYzJb4o4W2MyKZkGS2dsZ8FuBAa2lJF8zRLstkGhoph1GxaItUR
yjOA9ByILeca/pDmVqy0xFHbrblKcpwiRbNoiLNjbAUAvqT9s2IOvefAY24m
wKBVBE02IevBTQBqK06RAOo0SpbG+gPBAlgzFjqOE4W/vhFoAAvQ8Ihlo90a
gRIXMvECCXTIlRITlD4yjbKI9e/MQICZbIHcQxIqGWy3YIGB7AeyGDwV2pil
BLq6AhYSvqCVIvWwhV1QnOBVoVK1BupQEuvPVxlLkWWpEk/T+bu7B0H+/h4c
FFJz83Q9F6Gat1uhnqMG2U00NfUWTrv9LuL2U39UbhQocEbAMXhIp8UulQ5R
7wGdfpo3Bzyy5u3+nr6i1bu/h/2DiQC7VFHfowCMHNu6Yj3X0bxavoSVTHpG
sayg+EyBbTA56t9UFSzmwDGicxBCgYMJ1G9ZY/20yBaPQBnuyEasQT1Rfmkq
4D6A6kpOwMhFidQIq5NsWToUAEXnXZJT2HNQQNC4jF5GWQEEw97ESEte6BVS
Aa5ltU/ruUIG2bF8g3YLOhIjUFBAw4p4jTpurMsqFmx0s6JBhYhkLic6IRHx
YErMwoZuoC4ryNZqnE3XpVHJtC9IVzJYSLpSNILxPAiAo4srySXIA+xVwTFH
gMNdhqDtF0J5r39LzRruFogTGAi0c6AGrHRxX5yX8N1EhZ5YOATGA0EZmA+P
/Tmhl4dFhmgUyS0cfEJcxHyT6aYm0QYsRoR6XzC6rmSiwfHA/rpkARU/qwJR
uxAUliUbfHkNLIOt1LN56W1OomSR8mZkgAFIV6kXAMYysGdoK4kTbnF98O/Q
SsB/QAfqARlY4E6kSfisnPFO0KpRKs54KyMYe4LimqLMoW6RtesCmEniAnTa
ALjrJIFdnCYKnSYcKMHFlwj7wDKrp47BvO7dBlGuwGUnhSLTWKnD3R25qbDb
hG4sFQ96u/f33S2rGhjqtS7nTGfDqILLCroUqxKocOIPcgiaBWutGXrHcYwq
iUfTbAkCAJwdWX07OsR2BHvoot/f07pHGrep5qHQDhtClQlMjGpN5DAqIZVe
RLwzUBOULrsLICA8DIweeFMFEgbhYg7xGxq30Q0IQxeVAu01qKAEKFE9M89K
Z6P64h3hBwwKNsnAYmo+HLBoaSroCH2tahH4prEMcjy2XEKCkBSd02RjcVUC
IREEjdosAhcxiH4wG1AbFSESSc4edg1x3iukx1MGAxpLLqpY3RnCbUU/gzZr
cA3GFHxXYfG7worAg/VKiCvLJWibCbiAphfBBCIWRESIXKk/aLId0k7Bu1Qo
MGlp4EOiApfo3GK4EqOKYk/cPNxQnNF3sQMyXx52lv1mI2Pu7qagRLKI5qBh
IApr64IGzoaYFTIHWww0bphIXljAQ1wO6LzKxd7RPsiIRYgAzYE2m8JxWE04
FvqxfeuEwbKqfqRJjxoCGIUEExljLZPnX5MrTObxPi/FaxjgJgI2bx0a20hB
rB3XYpKK26YyHPzqRpllUvrJWEvBGSM897M+Zyfqjz/+EFKa1ayKtnd/+r36
p/9Yh8/N30/p4Hnw1A5fNcO3jTV8+1iHapp/2b+Bb0/v9Bn/C7bmK3sKu5W7
u6F47+i2gta1vQLra9OYsPfCbuRn/wdt5OfmSAiOmDAFHfEjO4Z/5g5DkEDb
4Yfe9ue7HR0I1MSOjWt8++xI+pd7XB/7x+r3t/UOn4NxvNrRb2etRL3DKuiA
XhZovP3N+rJHyrrvOjjQdTOB8m6toTHD9iIf7lAT0G8bDXZIL2gv4Oap+MYh
J+fBXncG8F2j140REboa4o2MKIsMu3Y2V9EtZsZU0u/cu4hzukwjNte4S+Qv
hZE9frfeLOPlGgDO2OiiS2nQZHNKQTrAJMgPYOGW+1u56ha4oV2XvSnsBeIG
vcj+stkCKwFRR4Lz18mbsnD2OQ0wVsVCO+8NFoh+sS4oiDPio0xnS7Axbp0Q
wAjMnhvRufhpNO50+W9xeUXfb4b/+On8ZvgWv48+DD5+9F+4RbsFv65++mgb
4Leq69nVxcXw8i33vhj82mGXvHN1PT6/uhx87DhLQ4cHzFh0ZYA1E5s0ywHV
gcOywW7w4AQmf9mZw2/WmcMlQTdwlJ1sdkXDM/OgSu6O9xDIy5x6mxl6iaIa
tXJHug0bLmuxKTpxZJOCwF42AvtqRuEmxFyzXckv5NLRvvPUj+bEGokUQljn
WRAz0YGbKfDlN1ZSzkgAOfj2oIhgd/cNiiynkNjVOOk/7x+96h/9ZafhDxMt
wuVZyFzPVEopqIaLI/bgxYJJrppg/G34Xb6P/iEynghzC83lJslk7AIYHMQN
6fISKE4G92nLGa4lN1nluqiE6CqBy5SzQmGiiKONjH1mULgZQIaLSWruJo0H
ymUoqoP1WmrtSrbJzR8gt3Tkng0Obsgd8uwgF7rJv2px7ZYXSLcUjyjOqQEw
fa/SCzM7Rei803FPl2L85u0RRGUhf3+WyVJx4xuVNxofV42ZMmoNyP0D5udx
CT/SKRF16NW27erN34ZnY3H+dng5Pn93PrwRp6evxZ2oCBEgbdukULMRYNDw
8mwo7tj0w36I88vx8D0M46Cky696PeBcbAN9TmTQ9sTBJrrHio5GbNiBnecY
wztA+IA/3Og7BufN81iyLVkUDkHH+22e2H19lCnHIVNClu/iCk96dTYejsVo
fHN++d5TvS0XyAfLEfjLN2ymoPzy3Lpjtp7IKe6kPuW62IixXqgvcQsNXpLZ
2MOP6pIYFipsLyaQ8jLMPpJf1Cw8HkJEqO0RwOuSDTvZ5ABPHwtObFhD224D
qxQXj9Y0yD7h3rqVuDACPUGjihXGiw1JgFBtmcRswFbZLUd/DdnwpgoRvsKG
ECgPvPo7jVefGL/DrALo/icwL1VGYadb4QNzxha7hjBJsIc4DL61xhOAZNMM
qvG8F8956t32/TICiCXnIaKjGNgWZ1ccDjRRjI48Cj2b2bSqP4MqMW290JU2
2fyF4wpN/Z9XOUIBpgROxYj53pyh2rmdaU1MFtkk7MbtRJieljbjKxGP2Y0A
q9DJs0RHm1r6o/NXm9fDpLRMTGZP1kh6KFFb7UCVxS03uaK0udyZfTvwX+kU
IUjFNSjt/xMZcr61ALPMMflvdmV0cc85eYmL8Zas3WqcxUEQwB6Zg4duGLcj
9ynoruEUJcXr8mtRiL2NSg04zxEt8t7CzGyqw0LVQ6kOb9SGdMjr4qinfYjs
duu1/zyt2+vwQ5Be+0AU9iNgV03Y+dmTotzah6BkU+XYvrb/e0KS0mr/s68f
4AyPvSpd217rDz9Ua7W7zA8fmmvPOltsLqimyFOJEUgudRE8cgL4LHj2xYzZ
A9uxu8+X9mXvu0D4MfOO4krEPy3REX7+5D7a7gEvvnIADmzRmhUqT+Tm60cg
aK1XPnwtDU8SpeY+NWTqAyBVEg4yKvFQoEZXu/WMnAPohhk94+CsfjhL3ks9
XbxnvfzhUKCN45DEt/Nm3TVj1KOW/UbGwWKYSzpgHDV0NpsG5BArDDttwuGB
SAy9jLtvMA3gDC1l57lsJJLptsuJx2SlCc91yCS5bAG6OdbPACOfqwLtEobX
UxfK2LPY+iG+4WB2oqbIdjolJkrcsKYf0sd+ETsC1vwQ5wJfJwez2oPQfqo/
4aPOQX+tkgR2+jYF8D/ocLzfCI2/f3nCZ03WlGNkTQdgmGyhYYD4Di15abrA
E3IhQ5J+ujmnqWElM526Q6eOq2Far9d99Ql8xURhHZolikmioYUYSnD1cMQs
Vzaqx/itco/x4JKXZ5ZTXB64DmUjJvGOph/E82+aoc9AXkYwgecFueXw25dP
cXGbC/G+25F45OzjE57AM8rRXfmJa5/P1XNiIWbs3to4OWiFVLx+4LP9YldT
puJGgVuoYAdxY51445wH7qubkZ0um3oLqPjTvLBhB25LVl87FkvkOe+h9cRC
iYZHqFd8nIkyRycghAAfxuNr8R4iNFDU6yuQI2hr1ZCGiZWhaJUKaivxEAKr
Jlg0rVjjuBB1Z8my5Nl9GXCHWdQJBkCKO015ts1cUUYALUtDVR2WTsmUxgpX
bB1gVwrhj80MFer602qb+RzQGA6lCBEm9qRyjSdnZR3S4gyP57NSrGVahkdG
HORUk/V5cKLr4dGr9l2R6FsXDXHcC9zBpVHwV7njK4J7a4cQNTRVTAQrqwIR
PsT8svY9KIUPtmDxv3DxEYQHTs4vVIxnzfBkz9TOOrwm3CistnHqwSn3vRzr
GJwg7IvtTPuukRq/H9DqBzX9wRa8OjZwzk3mGS8PBmIPRRgkZh/Fboumup5v
HSj4dqCaiass/Q1PymlYlJX9/9PVWSdmN03/69X9v+4dCzqVGRUM0MqDM58t
E2p0m4q9ptDcpbO9kQPPDvHQqlKP6uO9PiFy7IYsQtGDo/5RhdE76AFbyWZy
4868jf5dPZgAxAzIAcjJZBM4/lv48PMOfNi3CNlu+ZwDH3pTqRWFs1iWlq2r
tRFwPbo48AnBUSh7Y1D50y0RAr8TvekOwFnnVLykBGgHyYVf3qUJ3BmwB/c1
o+Zy0xTk74RSrPy0NBAQoY/VJKPDvqFL+9hqmb+Nri5FNvkN5NlWHB6dvALv
zfvVC67xJuoFsx49MSSfj1tWlOi0u8XNbJ+6M/VAXhcvC9g04pJ86cmmxCQ9
Ds3TuOF8clRpMmkTFKFiGr08Pr4E89HF4sv4cmS/i2Whu2wVqZyKx9/jCz02
RCBvTbsbPGUjYYmXUlzGkhJzjycq93f614Nf/YahzNhLRVbj8KwJU0CutB/r
8SD4TqTzqd25zvP+cf+5L4viwtB+kEvyB0gGC7+wEGO6TCoFt8T4kC2UAyyF
IQU/PjysWlDFH8mBfLJ01QXqixLFiSXaZ042oFqy3FRHPBRF1OUIC/eClCk0
rkrs2i3yufpiQHFS6cfmXljIhz9dYgy8J2OdLnQ7EiBhJosJ58ASrMhTMbH4
DaICeZM4a89fb/Gunpdqy7sZvExdcr5ifwUsDjyI5Vd/fxxDLIoAdLA3CNhx
MT7//fLtT8eXv89OLt4ONxe//+Po8rfoxdV48Onit4vDy/Gvz6/e3q6h3euO
PXfpMD+w+/Hh86Pe0WHv6Hh8+P3p8eHpyWH/5Pg/avCzK3G7Vpw1dYFdJR7s
BaERRwvCQRvFYCh5Z9ngGt29Itw9FyTaXYIAHibAbaJ6U9x6KtN6c3VTHR/8
9Z8cibP5vuaiI7pXswQpQNtEt5B+cX6rS38GpiQjNJnq2bKwkUEzi+2S9sGR
JI6nS5+mMNu5B3tOUR3GYHQbRVlBNsoGIOfD8TugaTwSMix2CI6xu6Beosjw
skAV+XOhracFYlWQkUJqVylHgm9z49VZOdpDqnL1BwRUYMcFrmZH+ZWxGWRX
pCgbhVj9juAyzHptJdfmwohVUo6QiASFVI2uFvm6c8/kqJH68gAaWoWGzYK9
igGO0VCAXsGeYkuSLKtwLnDgSMgfD9OadqTXqyx+3xWZ1vClUECYCnJNJFFd
XKIzwFGWa1s853AAYXulKrHtbtVGuMIR3BJbetJFVuBJC4mjcXV/YSKMOIQ1
phZ7GMquR4P6mrCUVzxa6gs2zp072Esv1Xnj8+OuePGSqPvLC2eWr8j01s5l
aicfqPjVSEYvdCILOyKDvQQwWeSV0aVj9fCWGZdryjJQXroMA6Lcy6ZgPYEg
9MUSFc9U5fJxCQUF5WH4WB0su7B799Y7iW/e7AnKNWlJIB54AQGsmx1/jQXc
kXQ+M8sX6Fwwi7/HggkHqZN+DZ9qlyyoZDI8/3VChuPrEoRuunMKHR46IYca
+0pl/ZouvSAK8Mlpu+WP8dCZms0KRNIVuWHG5hB8+YXEFUtwMDyG80muRMZj
oTPf5ZhLpz/u1tzjB1vtlmvrj2TpSI6xWc/SrGY0gAXAFesFulSEl2R8h/gu
U0xQMNtovf70DIk1dg90oqwrsJDohfmbaCGZWF/sLJXJpiVe9jhwtz4wnxLg
ODovLKgGQEH5gjRTv8FZ2rLlNZf/Y0FscJznz4GDc13YCT7C9EM5ZNgt0O3W
stQJXhqzThaaVMoKOV/F1jwrN+tKFqjCE9AnImtCd1cirrPyx8pnoxuOl+yV
uaee4XPVjWOfvbFlAz48uaQpcctI2ekw1paV1TxzywTMK7GJKengIrZF4lku
wSCISZJNnMjrBYoFJ6pwAuXRxcUe6EPKotBV0qi6hGPFTONFiEhTnT1Cr/tl
qwCdll5eWXOA2TAeDtfmjQAJh2dldZ2GIzxv/PLKqbG7haME57JhaXtoU9zt
ji/vxGXIBD4YjhvHCD7D58yuVz/a/DBCedKc7t7j4HKARyjkr0t7zRbW/Obt
qW3h/v2AXa229MhXsNk6zcYlELzyUbt9gVtF9kcFJobb+gW74yhyEGO+9YP0
VNfB2i30BNDsgFTggZVLWzjSoSk4blWdwg7kcyahj9zznl9YkceO4i7QDOEm
1iZaYs29lWUbXFb3bTSeyIOG2Js5/bBU8GX/RaNI0F1uB1Ls1V92tmgodh31
SlY1CPbiaRoUxpT2zkFQ1RIEBKijthAgdD7H5K7sDQfjfXaijQqnCK/DyhiC
Q+uc7gI+fwsbt/rP+EZ8K60gCLdncRZTSy4Yfhbc5CDtJyK9nUSnCc/4oLvC
6745O7fQC2KLVabZnjBUSFvqZdnbQ5ezbFydqCkh/UMVocEETaHLFi67ZyTe
pUAZzwo90yl55/auJqCRYmWAiBCm0mS6rVudLikIt5uZ0d06mW7saSL78XQl
0QtGcDlL4bFbXUXxWCh9yOmyNdMziNwkZfeqSCC8f0mSY30wqoBiYmggjUHd
vqhVfYMyuHthMabaK5PpZnK2M/TUQ7KNd7ODE9Ed5Tah2kc1xIIOT0FGkjDY
A7WyFqp5ocfdH5/I6JYxchA595d0w9Ygc+qWjk9oFJneihuABvEhW5oEr8eO
59kCVOJdZgxM3hW/gMADcz/KOO6K8ywFQLvQc5lESnI250wWCbRKEAmc+6xx
f1Zarf0/nAI0/g8B5bfvOUcAAA==

-->

</rfc>

