<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-epoch-markers-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="Epoch Markers">Epoch Markers</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-epoch-markers-00"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Arm Limited</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>Thomas.Fossati@arm.com</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization>Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Bibliothekstr. 1</street>
          <city>Bremen</city>
          <code>D-28359</code>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.org</email>
      </address>
    </author>
    <date year="2024" month="October" day="10"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 94?>

<t>This document defines Epoch Markers as a way to establish a notion of freshness among actors in a distributed system. Epoch Markers are similar to "time ticks" and are produced and distributed by a dedicated system, the Epoch Bell. Systems that receive Epoch Markers do not have to track freshness using their own understanding of time (e.g., via a local real-time clock). Instead, the reception of a certain Epoch Marker establishes a new epoch that is shared between all recipients.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-rats-epoch-markers/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        rats Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats/draft-birkholz-rats-epoch-marker"/>.</t>
    </note>
  </front>
  <middle>
    <?line 98?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Systems that need to interact securely often require a shared understanding of the freshness of conveyed information.
This is certainly the case in the domain of remote attestation procedures.
In general, securely establishing a shared notion of freshness of the exchanged information among entities in a distributed system is not a simple task.</t>
      <t>The entire <xref section="A" sectionFormat="of" target="RFC9334"/> deals solely with the topic of freshness, which is in itself an indication of how relevant, and complex, it is to establish a trusted and shared understanding of freshness in a RATS system.</t>
      <t>This document defines Epoch Markers as a way to establish a notion of freshness among actors in a distributed system.
Epoch Markers are similar to "time ticks" and are produced and distributed by a dedicated system, the Epoch Bell.
Systems that receive Epoch Markers do not have to track freshness using their own understanding of time (e.g., via a local real-time clock).
Instead, the reception of a certain Epoch Marker establishes a new epoch that is shared between all recipients.
In essence, the emissions and corresponding receptions of Epoch Markers are like the ticks of a clock where the ticks are conveyed by the Internet.</t>
      <t>In general (barring highly symmetrical topologies), epoch ticking incurs differential latency due to the non-uniform distribution of receivers with respect to the Epoch Bell.  This introduces skew that needs to be taken into consideration when Epoch Markers are used.</t>
      <t>While all Epoch Markers share the same core property of behaving like clock ticks in a shared domain, various "epoch id" types are defined to accommodate different use cases and diverse kinds of Epoch Bells.</t>
      <t>While Epoch Markers are encoded in CBOR <xref target="STD94"/>, and many of the epoch id types are themselves encoded in CBOR, a prominent format in this space is the Time-Stamp Token defined by <xref target="RFC3161"/>, a DER-encoded TSTInfo value wrapped in a CMS envelope <xref target="RFC5652"/>.
Time-Stamp Tokens (TST) are produced by Time-Stamp Authorities (TSA) and exchanged via the Time-Stamp Protocol (TSP).
At the time of writing, TSAs are the most common providers of secure time-stamping services.
Therefore, reusing the core TSTInfo structure as an epoch id type for Epoch Markers is instrumental for enabling smooth migration paths and promote interoperability.
There are, however, several other ways to represent a signed timestamp, and therefore other kinds of payloads that can be used to implement Epoch Markers.</t>
      <t>To inform the design, this document discusses a number of interaction models in which Epoch Markers are expected to be exchanged.
The top-level structure of Epoch Markers and an initial set of epoch id types are specified using CDDL <xref target="RFC8610"/>.
To increase trustworthiness in the Epoch Bell, Epoch Markers also provide the option to include a "veracity proof" in the form of attestation evidence, attestation results, or SCITT receipts <xref target="I-D.ietf-scitt-architecture"/> associated with the trust status of the Epoch Bell.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>In this document, CDDL <xref target="RFC8610"/> is used to describe the data formats.  The examples in <xref target="examples"/> use CBOR diagnostic notation as defined in <xref section="8" sectionFormat="of" target="STD94"/> and <xref section="G" sectionFormat="of" target="RFC8610"/>.</t>
      </section>
    </section>
    <section anchor="epoch-ids">
      <name>Epoch IDs</name>
      <t>The RATS architecture introduces the concept of Epoch IDs that mark certain events during remote attestation procedures ranging from simple handshakes to rather complex interactions including elaborate freshness proofs.
The Epoch Markers defined in this document are a solution that includes the lessons learned from TSAs, the concept of Epoch IDs defined in the RATS architecture, and provides several means to identify a new freshness epoch. Some of these methods are introduced and discussed in Section 10.3 of the RATS architecture <xref target="RFC9334"/>.</t>
    </section>
    <section anchor="interaction-models">
      <name>Interaction Models</name>
      <t>The interaction models illustrated in this section are derived from the RATS Reference Interaction Models.
In general, there are three interaction models:</t>
      <ul spacing="normal">
        <li>ad-hoc requests (e.g., via challenge-response requests addressed at Epoch Bells), corresponding to Section 7.1 in <xref target="I-D.ietf-rats-reference-interaction-models"/></li>
        <li>unsolicited distribution (e.g., via uni-directional methods, such as broad- or multicasting from Epoch Bells), corresponding to Section 7.2 in <xref target="I-D.ietf-rats-reference-interaction-models"/></li>
        <li>solicited distribution (e.g., via a subscription to Epoch Bells), corresponding to Section 7.3 in <xref target="I-D.ietf-rats-reference-interaction-models"/></li>
      </ul>
      <t>In all three interaction models, Epoch Markers can be used as content for the generic information element 'handle'.
Handles are most useful to establish freshness in unsolicited and solicited distribution by the Epoch Bell.
An Epoch Marker can be used as a nonce in challenge-response remote attestation (e.g., for limiting the number of ad-hoc requests by a Verifier).
Using an Epoch Marker requires the challenger to acquire an Epoch Marker beforehand, which may introduce a sensible overhead compared to using a simple nonce.</t>
    </section>
    <section anchor="sec-epoch-markers">
      <name>Epoch Marker Structure</name>
      <t>At the top level, an Epoch Marker is a CBOR array carrying the actual epoch id (<xref target="epoch-payloads"/>) and an optional veracity proof about the Epoch Bell.</t>
      <figure anchor="fig-epoch-marker-cddl">
        <name>Epoch Marker definition</name>
        <artwork type="cddl" align="left"><![CDATA[
epoch-marker = [
  $tagged-epoch-id
  ? bell-veracity-proof
]

; veracity of the bell
bell-veracity-proof = non-empty<{
  ? remote-attestation-evidence ; could be EAT or Concise Evidence
  ? remote-attestation-result ; hopefully EAT with AR4SI Claims
  ? scitt-receipt ; SCITT receipt
}>

remote-attestation-evidence = (1: "PLEASE DEFINE")
remote-attestation-result = (2: "PLEASE DEFINE")
scitt-receipt = (3: "PLEASE DEFINE")

; epoch-id types independent of interaction model
$tagged-epoch-id /= cbor-epoch-id
$tagged-epoch-id /= #6.26980(classical-rfc3161-TST-info)
$tagged-epoch-id /= #6.26981(TST-info-based-on-CBOR-time-tag)
$tagged-epoch-id /= #6.26982(epoch-tick)
$tagged-epoch-id /= #6.26983(epoch-tick-list)
$tagged-epoch-id /= #6.26984(strictly-monotonic-counter)
]]></artwork>
      </figure>
      <t>The veracity proof can be encoded in an Evidence or Attestation Result conceptual message <xref target="RFC9334"/>, e.g., using <xref target="I-D.ietf-rats-eat"/>, <xref target="TCG-CoEvidence"/>, <xref target="I-D.ietf-rats-ar4si"/>, or SCITT receipts <xref target="I-D.ietf-scitt-architecture"/>.</t>
      <section anchor="epoch-payloads">
        <name>Epoch Marker Payloads</name>
        <t>This memo comes with a set of predefined payloads.</t>
        <section anchor="cbor-time-tags">
          <name>CBOR Time Tags</name>
          <t>A CBOR time representation choosing from CBOR tag 0 (<tt>tdate</tt>, RFC3339 time as a string), tag 1 (<tt>time</tt>, Posix time as int or float) or tag 1001 (extended time data item), optionally bundled with a nonce.</t>
          <t>See <xref section="3" sectionFormat="of" target="I-D.ietf-cbor-time-tag"/> for the (many) details about the CBOR extended
time format (tag 1001). See <xref target="STD94"/> for <tt>tdate</tt> (tag 0) and <tt>time</tt> (tag 1).</t>
          <sourcecode type="cddl">
cbor-epoch-id = [
   cbor-time
   ? nonce
]

etime = #6.1001({* (int/tstr) =&gt; any})

cbor-time = tdate / time / etime

nonce = tstr / bstr / int
</sourcecode>
          <t>The following describes each member of the cbor-epoch-id map.</t>
          <dl>
            <dt>etime:</dt>
            <dd>
              <t>A freshly sourced timestamp represented as either time or tdate (<xref target="STD94"/>, <xref target="RFC8610"/>) or etime <xref target="I-D.ietf-cbor-time-tag"/>.</t>
            </dd>
            <dt>nonce:</dt>
            <dd>
              <t>An optional random byte string used as extra data in challenge-response interaction models (see <xref target="I-D.ietf-rats-reference-interaction-models"/>).</t>
            </dd>
          </dl>
          <section anchor="creation">
            <name>Creation</name>
            <t>To generate the cbor-time value, the emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-time-reqs"/>.</t>
            <t>If a nonce is generated, the emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-nonce-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-rfc3161-classic">
          <name>Classical RFC 3161 TST Info</name>
          <t>DER-encoded <xref target="X.690"/> TSTInfo <xref target="RFC3161"/>.  See <xref target="classic-tstinfo"/> for the layout.</t>
          <sourcecode type="cddl">
classical-rfc3161-TST-info = bytes
</sourcecode>
          <t>The following describes the classical-rfc3161-TST-info type.</t>
          <dl>
            <dt>classical-rfc3161-TST-info:</dt>
            <dd>
              <t>The DER-encoded TSTInfo generated by a <xref target="RFC3161"/> Time Stamping Authority.</t>
            </dd>
          </dl>
          <section anchor="creation-1">
            <name>Creation</name>
            <t>The Epoch Bell <bcp14>MUST</bcp14> use the following value as MessageImprint in its request to the TSA:</t>
            <sourcecode type="asn.1">
SEQUENCE {
  SEQUENCE {
    OBJECT      2.16.840.1.101.3.4.2.1 (sha256)
    NULL
  }
  OCTET STRING
    BF4EE9143EF2329B1B778974AAD445064940B9CAE373C9E35A7B23361282698F
}
</sourcecode>
            <t>This is the sha-256 hash of the string "EPOCH_BELL".</t>
            <t>The TimeStampToken obtained by the TSA <bcp14>MUST</bcp14> be stripped of the TSA signature.
Only the TSTInfo is to be kept the rest <bcp14>MUST</bcp14> be discarded.
The Epoch Bell COSE signature will replace the TSA signature.</t>
          </section>
        </section>
        <section anchor="sec-rfc3161-fancy">
          <name>CBOR-encoded RFC3161 TST Info</name>
          <t><cref anchor="issue">Issue tracked at:</cref> https://github.com/ietf-rats/draft-birkholz-rats-epoch-marker/issues/18</t>
          <t>The TST-info-based-on-CBOR-time-tag is semantically equivalent to classical
<xref target="RFC3161"/> TSTInfo, rewritten using the CBOR type system.</t>
          <sourcecode type="cddl">
TST-info-based-on-CBOR-time-tag = {
  &amp;(version : 0) =&gt; v1
  &amp;(policy : 1) =&gt; oid
  &amp;(messageImprint : 2) =&gt; MessageImprint
  &amp;(serialNumber : 3) =&gt; integer
  &amp;(eTime : 4) =&gt; profiled-etime
  ? &amp;(ordering : 5) =&gt; bool .default false
  ? &amp;(nonce : 6) =&gt; integer
  ? &amp;(tsa : 7) =&gt; GeneralName
  * $$TSTInfoExtensions
}

v1 = 1

oid = #6.111(bstr) / #6.112(bstr)

MessageImprint = [
  hashAlg : int
  hashValue : bstr
]

profiled-etime = #6.1001(timeMap)
timeMap = {
  1 =&gt; ~time
  ? -8 =&gt; profiled-duration
  * int =&gt; any
}
profiled-duration = {* int =&gt; any}

GeneralName = [ GeneralNameType : int, GeneralNameValue : any ]
; See Section 4.2.1.6 of RFC 5280 for type/value
</sourcecode>
          <t>The following describes each member of the TST-info-based-on-CBOR-time-tag map.</t>
          <dl newline="true">
            <dt>version:</dt>
            <dd>
              <t>The integer value 1.  Cf. version, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>policy:</dt>
            <dd>
              <t>A <xref target="RFC9090"/> object identifier tag (111 or 112) representing the TSA's
policy under which the tst-info was produced.  Cf. policy, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>messageImprint:</dt>
            <dd>
              <t>A <xref target="RFC9054"/> COSE_Hash_Find array carrying the hash algorithm
identifier and the hash value of the time-stamped datum.  Cf. messageImprint,
<xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>serialNumber:</dt>
            <dd>
              <t>A unique integer value assigned by the TSA to each issued tst-info.  Cf.
serialNumber, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>eTime:</dt>
            <dd>
              <t>The time at which the tst-info has been created by the TSA.  Cf. genTime,
<xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.
Encoded as extended time <xref target="I-D.ietf-cbor-time-tag"/>, indicated by CBOR tag 1001, profiled
as follows:</t>
            </dd>
          </dl>
          <ul spacing="normal">
            <li>The "base time" is encoded using key 1, indicating Posix time as int or float.</li>
            <li>The stated "accuracy" is encoded using key -8, which indicates the maximum
allowed deviation from the value indicated by "base time".  The duration map
is profiled to disallow string keys.  This is an optional field.</li>
            <li>The map <bcp14>MAY</bcp14> also contain one or more integer keys, which may encode
supplementary information <cref anchor="tf1">Allowing unsigned integer (i.e., critical) keys goes counter interoperability</cref>.</li>
          </ul>
          <dl newline="true">
            <dt>ordering:</dt>
            <dd>
              <t>boolean indicating whether tst-info issued by the TSA can be ordered solely
based on the "base time". This is an optional field, whose default value is
"false".  Cf. ordering, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>nonce:</dt>
            <dd>
              <t>int value echoing the nonce supplied by the requestor.  Cf. nonce, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>tsa:</dt>
            <dd>
              <t>a single-entry GeneralNames array <xref section="11.8" sectionFormat="of" target="I-D.ietf-cose-cbor-encoded-cert"/> providing a hint
in identifying the name of the TSA.  Cf. tsa, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>$$TSTInfoExtensions:</dt>
            <dd>
              <t>A CDDL socket (<xref section="3.9" sectionFormat="of" target="RFC8610"/>) to allow extensibility of the data
format.  Note that any extensions appearing here <bcp14>MUST</bcp14> match an extension in the
corresponding request.  Cf. extensions, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
          </dl>
          <section anchor="creation-2">
            <name>Creation</name>
            <t>The Epoch Bell <bcp14>MUST</bcp14> use the following value as messageImprint in its request to the TSA:</t>
            <sourcecode type="cbor-diag">
[
    / hashAlg   / -16, / sha-256 /
    / hashValue / h'BF4EE9143EF2329B1B778974AAD44506
                    4940B9CAE373C9E35A7B23361282698F'
]
</sourcecode>
            <t>This is the sha-256 hash of the string "EPOCH_BELL".</t>
          </section>
        </section>
        <section anchor="sec-epoch-tick">
          <name>Epoch Tick</name>
          <t>An Epoch Tick is a single opaque blob sent to multiple consumers.</t>
          <sourcecode type="cddl">
; Epoch-Tick

epoch-tick = tstr / bstr / int
</sourcecode>
          <t>The following describes the epoch-tick type.</t>
          <dl>
            <dt>epoch-tick:</dt>
            <dd>
              <t>Either a string, a byte string, or an integer used by RATS roles within a trust domain as extra data included in conceptual messages <xref target="RFC9334"/> to associate them with a certain epoch.</t>
            </dd>
          </dl>
          <section anchor="creation-3">
            <name>Creation</name>
            <t>The emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-nonce-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-epoch-tick-list">
          <name>Multi-Nonce-List</name>
          <t>A list of nonces send to multiple consumer. The consumers use each Nonce in the list of Nonces sequentially. Technically, each sequential Nonce in the distributed list is not used just once, but by every Epoch Marker consumer involved. This renders each Nonce in the list a Multi-Nonce</t>
          <sourcecode type="cddl">
; Epoch-Tick-List

epoch-tick-list = [ + epoch-tick ]
</sourcecode>
          <t>The following describes the multi-nonce type.</t>
          <dl>
            <dt>multi-nonce-list:</dt>
            <dd>
              <t>A sequence of byte strings used by RATS roles in trust domain as extra data in the production of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch. Each nonce in the list is used in a consecutive production of a conceptual messages. Asserting freshness of a conceptual message including a nonce from the multi-nonce-list requires some state on the receiver side to assess if that nonce is the appropriate next unused nonce from the multi-nonce-list.</t>
            </dd>
          </dl>
          <section anchor="creation-4">
            <name>Creation</name>
            <t>The emitter <bcp14>MUST</bcp14> follow the requirements in <xref target="sec-nonce-reqs"/>.</t>
          </section>
        </section>
        <section anchor="sec-strictly-monotonic">
          <name>Strictly Monotonically Increasing Counter</name>
          <t>A strictly monotonically increasing counter.</t>
          <t>The counter context is defined by the Epoch bell.</t>
          <sourcecode type="cddl">
strictly-monotonic-counter = uint
</sourcecode>
          <t>The following describes the strictly-monotonic-counter type.</t>
          <dl>
            <dt>strictly-monotonic-counter:</dt>
            <dd>
              <t>An unsigned integer used by RATS roles in a trust domain as extra data in the production of of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch. Each new strictly-monotonic-counter value must be higher than the last one.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="sec-time-reqs">
        <name>Time Requirements</name>
        <t>Time <bcp14>MUST</bcp14> be sourced from a trusted clock.</t>
      </section>
      <section anchor="sec-nonce-reqs">
        <name>Nonce Requirements</name>
        <t>A nonce <bcp14>MUST</bcp14> be freshly generated.
The generated value <bcp14>MUST</bcp14> have at least 64 bits of entropy (before encoding).
The generated value <bcp14>MUST</bcp14> be generated via a cryptographically secure random number generator.</t>
        <t>A maximum nonce size of 512 bits is set to limit the memory requirements.
All receivers <bcp14>MUST</bcp14> be able to accommodate the maximum size.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO</t>
    </section>
    <section anchor="sec-iana-cons">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced-replace">RFC Editor: please replace RFCthis with the RFC
number of this RFC and remove this note.</cref></t>
      <section anchor="sec-iana-cbor-tags">
        <name>New CBOR Tags</name>
        <t>IANA is requested to allocate the following tags in the "CBOR Tags" registry
<xref target="IANA.cbor-tags"/>, preferably with the specific CBOR tag value requested:</t>
        <table align="left" anchor="tbl-cbor-tags">
          <name>New CBOR Tags</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Data Item</th>
              <th align="left">Semantics</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">26980</td>
              <td align="left">bytes</td>
              <td align="left">DER-encoded RFC3161 TSTInfo</td>
              <td align="left">
                <xref target="sec-rfc3161-classic"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26981</td>
              <td align="left">map</td>
              <td align="left">CBOR-encoding of RFC3161 TSTInfo semantics</td>
              <td align="left">
                <xref target="sec-rfc3161-fancy"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26982</td>
              <td align="left">tstr / bstr / int</td>
              <td align="left">a nonce that is shared among many participants but that can only be used once by each participant</td>
              <td align="left">
                <xref target="sec-epoch-tick"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26983</td>
              <td align="left">array</td>
              <td align="left">a list of multi-nonce</td>
              <td align="left">
                <xref target="sec-epoch-tick-list"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26984</td>
              <td align="left">uint</td>
              <td align="left">strictly monotonically increasing counter</td>
              <td align="left">
                <xref target="sec-strictly-monotonic"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="sec-iana-em-claim">
        <name>&nbsp;New EM CWT Claim</name>
        <t>This specification adds the following value to the "CBOR Web Token Claims" registry <xref target="IANA.cwt"/>.</t>
        <ul spacing="normal">
          <li>Claim Name: em</li>
          <li>Claim Description: Epoch Marker</li>
          <li>Claim Key: 2000 (IANA: suggested assignment)</li>
          <li>Claim Value Type(s): CBOR array</li>
          <li>Change Controller: IETF</li>
          <li>Specification Document(s): <xref target="sec-epoch-markers"/> of RFCthis</li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3161">
          <front>
            <title>Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)</title>
            <seriesInfo name="DOI" value="10.17487/RFC3161"/>
            <seriesInfo name="RFC" value="3161"/>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <author fullname="P. Cain" initials="P." surname="Cain"/>
            <author fullname="D. Pinkas" initials="D." surname="Pinkas"/>
            <author fullname="R. Zuccherato" initials="R." surname="Zuccherato"/>
            <date month="August" year="2001"/>
            <abstract>
              <t>This document describes the format of a request sent to a Time Stamping Authority (TSA) and of the response that is returned. It also establishes several security-relevant requirements for TSA operation, with regards to processing requests to generate responses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <seriesInfo name="DOI" value="10.17487/RFC5652"/>
            <seriesInfo name="RFC" value="5652"/>
            <seriesInfo name="STD" value="70"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <seriesInfo name="DOI" value="10.17487/RFC8610"/>
            <seriesInfo name="RFC" value="8610"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9090">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <seriesInfo name="DOI" value="10.17487/RFC9090"/>
            <seriesInfo name="RFC" value="9090"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9054">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Hash Algorithms</title>
            <seriesInfo name="DOI" value="10.17487/RFC9054"/>
            <seriesInfo name="RFC" value="9054"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) syntax (see RFC 9052) does not define any direct methods for using hash algorithms. There are, however, circumstances where hash algorithms are used, such as indirect signatures, where the hash of one or more contents are signed, and identification of an X.509 certificate or other object by the use of a fingerprint. This document defines hash algorithms that are identified by COSE algorithm identifiers.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="STD94">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="STD" value="94"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="STD96">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="STD" value="96"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-cbor-time-tag">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Time, Duration, and Period</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-time-tag-12"/>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Ben Gamari" initials="B." surname="Gamari">
              <organization>Well-Typed</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer Institute for Secure Information Technology</organization>
            </author>
            <date day="30" month="October" year="2023"/>
            <abstract>
              <t>   The Concise Binary Object Representation (CBOR, RFC 8949) is a data
   format whose design goals include the possibility of extremely small
   code size, fairly small message size, and extensibility without the
   need for version negotiation.

   In CBOR, one point of extensibility is the definition of CBOR tags.
   RFC 8949 defines two tags for time: CBOR tag 0 (RFC3339 time as a
   string) and tag 1 (POSIX time as int or float).  Since then,
   additional requirements have become known.  The present document
   defines a CBOR tag for time that allows a more elaborate
   representation of time, as well as related CBOR tags for duration and
   time period.  This document is intended as the reference document for
   the IANA registration of the CBOR tags defined.


   // (This cref will be removed by the RFC editor:) The present
   // revision (-12) addresses the IESG reviews.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-11"/>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50% while also significantly reducing memory and code size
   compared to ASN.1.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 Certificate Signing Requests, C509 COSE headers, a
   C509 TLS certificate type, and a C509 file format.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC-X.690">
          <front>
            <title>Information technology -- ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <seriesInfo name="ITU-T" value="Recommendation X.690"/>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2015" month="August"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC9334"/>
            <seriesInfo name="RFC" value="9334"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-reference-interaction-models">
          <front>
            <title>Reference Interaction Models for Remote Attestation Procedures</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-reference-interaction-models-11"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Michael Eckel" initials="M." surname="Eckel">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <date day="22" month="July" year="2024"/>
            <abstract>
              <t>   This document describes interaction models for remote attestation
   procedures (RATS).  Three conveying mechanisms -- Challenge/Response,
   Uni-Directional, and Streaming Remote Attestation -- are illustrated
   and defined.  Analogously, a general overview about the information
   elements typically used by corresponding conveyance protocols are
   highlighted.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-scitt-architecture">
          <front>
            <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-08"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>ARM</organization>
            </author>
            <author fullname="Steve Lasker" initials="S." surname="Lasker">
              <organization>DataTrails</organization>
            </author>
            <date day="22" month="July" year="2024"/>
            <abstract>
              <t>   Traceability of physical and digital Artifacts in supply chains is a
   long-standing, but increasingly serious security concern.  The rise
   in popularity of verifiable data structures as a mechanism to make
   actors more accountable for breaching their compliance promises has
   found some successful applications to specific use cases (such as the
   supply chain for digital certificates), but lacks a generic and
   scalable architecture that can address a wider range of use cases.

   This document defines a generic, interoperable and scalable
   architecture to enable transparency across any supply chain with
   minimum adoption barriers.  It provides flexibility, enabling
   interoperability across different implementations of Transparency
   Services with various auditing and compliance requirements.  Issuers
   can register their Signed Statements on any Transparency Service,
   with the guarantee that any Relying Parties will be able to verify
   them.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="TCG-CoEvidence" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG-DICE-Concise-Evidence-Binding-for-SPDM-Version-1.0-Revision-53_1August2023.pdf">
          <front>
            <title>TCG DICE Concise Evidence Binding for SPDM</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2023" month="June"/>
          </front>
          <refcontent>Version 1.00</refcontent>
        </reference>
        <reference anchor="I-D.ietf-rats-ar4si">
          <front>
            <title>Attestation Results for Secure Interactions</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-07"/>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
              <organization>MIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
              <organization>Intel</organization>
            </author>
            <date day="2" month="September" year="2024"/>
            <abstract>
              <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.cwt" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
    </references>
    <?line 499?>

<section anchor="examples">
      <name>Examples</name>
      <t>The example in <xref target="fig-ex-1"/> shows an epoch marker with a cbor-epoch-id and no
bell veracity proof.</t>
      <figure anchor="fig-ex-1">
        <name>CBOR epoch id without bell veracity proof</name>
        <artwork type="cbor-diag" align="center"><![CDATA[
[
  / cbor-epoch-id / [
    / 1996-12-19T16:39:57-08:00[America//Los_Angeles][u-ca=hebrew] /
    / etime / 1001({
        1: 851042397,
      -10: "America/Los_Angeles",
      -11: { "u-ca": "hebrew" }
    })
  ]
  / no bell veracity proof /
]
]]></artwork>
      </figure>
      <section anchor="classic-tstinfo">
        <name>RFC 3161 TSTInfo</name>
        <t>As a reference for the definition of TST-info-based-on-CBOR-time-tag the code block below depicts the original layout of the TSTInfo structure from <xref target="RFC3161"/>.</t>
        <sourcecode type="asn.1">
TSTInfo ::= SEQUENCE  {
   version                      INTEGER  { v1(1) },
   policy                       TSAPolicyId,
   messageImprint               MessageImprint,
     -- MUST have the same value as the similar field in
     -- TimeStampReq
   serialNumber                 INTEGER,
    -- Time-Stamping users MUST be ready to accommodate integers
    -- up to 160 bits.
   genTime                      GeneralizedTime,
   accuracy                     Accuracy                 OPTIONAL,
   ordering                     BOOLEAN             DEFAULT FALSE,
   nonce                        INTEGER                  OPTIONAL,
     -- MUST be present if the similar field was present
     -- in TimeStampReq.  In that case it MUST have the same value.
   tsa                          [0] GeneralName          OPTIONAL,
   extensions                   [1] IMPLICIT Extensions   OPTIONAL  }
</sourcecode>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAOnlB2cAA81c63bbyJH+j6fopXNiaSJQom6WmHhmKIm2tdHFkejMZuc4
kybQIhGBAAOAkjka5exD7APkxz5J9k32Sfarqm5cSEqeZM4mq5OMiWZ3dXV1
3atA3/e9u67a8bwiKmLTVf1pGozVuc5uTZZ7ejjMzN3iaJgGiZ5gcpjpm8KP
THHjZ7rIfUPT/IlM87e2vLzQSfidjtMEs4tsZjydGd1V1yaYZVEx9+5HXXXV
G1yrb9LsNkpG6m2Wzqbe7X1XnSaFyRJT+Ce0i+fdmWRmup5SZqKjuKtox69p
73aajTA8iorxbNhV46KY5t3NTXluB+lks8RwUzAeRtntOI2/X8ba8wJddFVe
hF6QJrlJ8lluMc9nw0mU51GaFPMpjnPaH7zxPD0rxmnW9XwlJHlnklt1ZOED
K+DWVW8yPUvG6Y3J1PXpAKOOrktf2LONAaXtsPw6j4r2TTmzHRpMzIvMGGB6
NTZRgged50a92sM3QRoCj5f7u9uHey/pGXTuqhOdTXAbYcEzZkmRYfCtySY6
mZfID8bpROfqTZrnuogEe51E3+MhTbqql03UWTSJChNWqMqatl3zNbYhktd3
+fDrcoNvTKTe68TR5d1M32NkYIJxksbpKDJ5Bfg+iuNIT9pTnWDS12Oey7Ad
tGOd5YVJ1FFKxyihfkiiO/BfVPz3fxXqKDMTTBn8+2mNaEfRMI7SYmxuMdJW
nZJKMrsk4om/fbCzd7iKZEpNx8zVv9g99He3O/5258Df3znc7lQnCPQw/br4
PmIG9RLCsgBqxMNXb453OvsdkO+6J497+3vbONL5tTwe7He28HhycibPh1uH
9Hx0eeVfnp64sb1djF1e9/13vet3fu/sLa2+Hpwc7tImSvmyhD+/7jLcw91D
O2e/mgMQtTmAu43HU/+kzZITDNPML6KJ8Qs9skj0B6fn/cakNDcy0yREvdAP
TAZaH+9t0Yb/1t7HAXgTq2m+5AdASG6EMmmiCscJc/U///Gfqnd90e4ohke6
IZvFJu/aZddTE0Q3USAL0xt1pPMoUH03+Yomq7Wj/tX6BjglSRPMjcvvLRQ7
6xizFFSVOonyAt/OonxswiVgJ5jGC53UCxDmOlFXjA22GZjYgFUns8RimBNb
pgmvCHWB829vdfb8rQMeyU0G3o9ACQfzdPDBH+A2GIpJQjkmU1GIqLMRsbLT
dvf39+2omLWjpNjMTLA58K/6x77M9yJH4pL5Dnd2dkWF+joLxvWL5MHMQNOA
8MaP6Fw6oO39Ce41zu06eaivzCFEBcODigiKWYZTyhgwMtG0yJf2MaRt3Sd8
Ozh+6x+n/bsopM27TxF7kM0g+aE6TifTWVHZjRp7tQBKnZwe9zEpCSJoRwcV
4p/wrYIo6vr9yXlrJUUL2SNwW4xoBxLlzfspuB1kAaln0zjVYb5JeNNmvt3M
d5v5djMfm/m0mf9b0k0gZqe95V+Zu4gf9na+6/RmI+y4vbW9056GNw1O2d7x
t/Z5JAu6ykJQgLC1RFGd7eZRebX4TDN6F712cF90y88s0XoEaars6vNm9W+x
oaAMqVPSM/2zN7gLcFwxjvKW5/m+D+tHBiuATR9gUMGdmIHFCxWamyiBnDW8
DQWDpNW9nqsiVQYmDKo7H2MoSZ3k32QmH2MhJk5S3CtAp1gYJZgVQqCzaDgj
bsnnuNBJexF+ZlQOqxbrjLZokaIDEwW3eYtVAn0/zdJwFgAEDdRBDue0hwlJ
yssdNhRMi93lyMRxW13zeI5xXSgWhjuzgEaY0onUWOMboEEEuq2dbJYTxwJu
lKn0PlGzJMQqcq9oHERgtNdMe9TeUHeRBlpxSgoP/lbMylsFGLhdb0NTARkd
CpaEzNQRUivS2RqEq+NWUd3QVSTmXvF1y2lwgfkYNAItTHFvYGt1TLsG0TTC
peZtufNJFIax8bwXpCiZmrSp5zUokxiAweGdzoFehJ9o4jmQI0OfmT/NIlyH
dlsuUwFHqoiGAQjqnZljalSZmbbwHf5nj4sNaGGgoSVwePocwquJmChwCdIC
exYF0YFJBXYAMwAznO40USOTAN14o0K3pBihVWK7imMtzuZTMNbJqImnZWeW
JpiHpxiaDkKso4mNpzHYR+e3bRIuw2tBsIeH3nQKKxJ9Uj3a0i81/+Mj2FfH
uMQ0JszvIe6MUZFOYU7ruG6o+3GEa48Yk6jITQyWwackrJnhcXoPksXmTifF
BssLadDYfNrAElq7IMZWzfLMp261IheTgAMGK8zeP0mJeP9wJeL9f1Ii3j9a
iUDMcAKyqLKlsbFYblkswyGnqRykRIfFa/mi4ujWCI/TBVmc6VxgcHg9ta9o
dqlBhqIlXFwK1qtkX60NdZbR5uNoNIYc5XO4bbhhoh5EyUY3cEXtqQGeZkcJ
NAbuLbphf6uIMD0GFyTBXIUzuUTsCe/VhytJmqHiHEtvywmAwrJLdIDz5VbW
rZAStWf1L+4hv8U1lJqXRXNI6uPWkFTjiWJg+DGZSDeok6wg5yw3IYjxzTiC
7qF7a07hi2Vcck0MlIooTMEkpNexI9iVaMHXIvcg1GfZs3wh+hhcqbMoneWq
JXSMwpaicFwwEdlnE6IDcpxTcqAq6hKqrOVzK4NENqNwE2GNVYhYeXmg5fPa
+IbQo1AIytWnfx8fRd1ReFiqdYtkDUcMT6A57/C4AAjLiTATHAGoihUQc0Ti
MdXwXEl9AuyAYrHrQk+mapDSZbmDg0WBDWJKRkYhXnHRGALNAUVaIGAMvrrP
NAxCKCRG0Alc7kyMS+HTnF8/PsJILuyCAAhA1pu6DDvW5vXYVRdrhck9Caoq
40Y6ZeEA77O0SIM0pvnvoVh6hZU/8AqoeE/QktEGBcolAdUkzQvFF8zGmHzt
jG9QLDCv9nOCT4yF6OouCshYD0i+QVkokcyU2lB40hEI0jXj4IWNRtK8Q44Z
mizBIkWLyPxAfGmGSUjX0daTNIVQTqKRlaGpLsbCfXTV5Fiws0PioIdRDLfZ
Ykln3SBrasCk5FrcsZ6hrEVGloylNTNTyDuxCxn/EfM+js4nF24s3IntypLX
p3rOoYvIf4CDDkWU2QEji83mtHFWcipS66GIl2Ro1w1h0coER3kwy3NR9LPJ
ENtiw1ogqSR2JO4Tl2KFkH0iLSbYDGv+EVOHNKoPF8PEtdtaVvVkd0mRRaxW
c1PQnBUimUsqgTwPZgnKurAc4F8WBDpzABsIXcHuyn2a4cTOIWmq2Y1FLOI8
dTzKU1OxlOzmBvEsJHe2RZdLKSiamd60HFgmNNmnmvNpbGS50RgFG8ziAj4a
xbTHp4OBcjE3naQZhcPn03meBhG7G5XHR0dTBHBW+qV1/8N78UJdiQdO15yr
i1Q2F1fz1sB7TDNwVOv8w/WgtSH/qotL/nzV/82H06v+CX2+ftc7Oys/eHbG
9bvLD2cn1adq5fHl+Xn/4kQWY1Q1hrzWee93LWH31uX7wenlRe+sVWrOki1Z
eTA3MStCctjvzD1wcQCLKurw6Pj9X//S2QXV/gVR63ancwhyycNB59UuHsgM
ym4pRQ7yCGLNPdKpcAAjcV8CPY2gEHAnmqwgOVwkjCDkF98SZT521a+GwbSz
+6UdoAM3Bh3NGoNMs+WRpcVCxBVDK7YpqdkYX6B0E9/e7xrPju61wV99BRVo
lN85+OpLj52lxn1sLMgZKVKnf9yNiJLRhbbmMGcnhtSBJg3F4vfw4J4Agww8
G+Uw0qMEVgIxTGLZlK7BGUped21EGx1wSCQ2nO+1Fi69le+sJkD4KhJxepIL
13MsUk951f0rsS0JeaOVesJS0bmULSl9ZSgzEikEleLBPhNzqgyakPNXsCAu
5oN2DOEq3RqxC5qVvY286qo3t1qH1ptYD9OMPKQqRGD9I5ZyMbaoSLcsV5ri
R3FJxaEX1SYkwNXktHMM4SAIjDfZ842nKdTYbQWZN5wNJW2Yl+ZxYnTCFCAd
WUQ3cxtrVAdk/d9W16n4FwAOloGrPk5DsQbl/ZWBGhszRsVxTGerveNU5DIH
gKVr8XXbJj1K43cuxu/hxXJq9VGYapWpjOMZZc2K2g3kFhtxfTN4s5a2JVpX
Lo27AoFm6qJwPgc+ZWYVCl3oLaVDf5wGnIgBZ+b1WBEGOo4NbLQvoVhuqmk6
DDPDRNRF3ctGPNQM3XBzjsav2h0RU7+Wbn58BBKzBMwWBVSHakZDNWwQLfkh
LFVgE/L2huFIzbA5NMEwg/fjk7mcwHAiTuPEv9DvR2O4/QSGn8cPAjMbkpIr
vYEfvenOyk3pNsnqPHV9i35J3eMDOWxCm71XYh9mDCjPejrKWJ/wJSmb2Lxs
e+/4g8gN++QAdzOLm1mWRvamfnec8llNKRtr192P3kJCYeEAlMshRsceKzlx
SaHay6ADx1TUdMFA5bEuMjvnaX4LssBXzBCqfGBvUS/gZZOUVvs7VDIJSm3+
cmHJkD10oqrLsU30vFJExCwIv6Ih9HwKPTc2WrJqHBkDrritZf6PCVEzVnaX
69JVfngB1dGs1oOBXOSVThX71htLeEZEZjavOsuAYYB/5o5u4LYZBK30r9dg
mHkHF2k8Pq47n1x8YMxu+r0K9mhWLDuef8afCsIw9uo4q9fqW0+pnxV6hMDA
Hiei0vRXoGgc+w64z8C9j573y2pDq71pordiNoBT0sVMpsX8Vw8MU3jIr/GQ
73xx9UuqEMeUvlL93oC0ymLV6SkQ4rgDwBgxIGQHHiVBYK+8d7V7faqOYx1N
cl7f8OOxpuHpe49ws55D8rVa63RV6/1Zv3fdVyf9N6cX/db6qiUWKSzYXrGg
iQUm7ayYBFq7G7GhFiJPQ14VqZBV8aC3eJNq87WSirK72lUzXuy3t/cPD7bW
ghhRDSXc/OwmoOq6j5DeJwW2/tzCzpqb5g8R4YU+zs8lblfxfnb19poMUsbq
2Yk7tYk+9GLx7OzdNVKGQRHPoeHhwFL12ucmBGgelgfvoate3ESjhhj7JCQQ
TopQb30dIzh/3YrNTcElTq6Mvm41RJr9rIguoWWdjwWRtGq2lqsireBYCoze
q+nUK+Eb69HN2O7muR4t+kQbSpSvKC73ndEFffXw0KwCy1itukkDPyrMlZi1
cd73Lu3x8GJBO9lCwgTSQMrV2HyqdokDxIvOKXVrGP4L0YiU0lIDPUJc0JMR
TmGVGRohUDBO07z0M2SaHqkttfaHgnKVf9jg1pCdnUNZzoaNWCEZwSmgqR2a
iq8w8z1AfSrnRSRWmboBZsU6feLZW1tYYD4VJHeSHJJ4CiZ3AohOEUPrDGdk
y0N3amdEro2phUo7ZagkHSAImJzHsEaJz3UwFOIZOKyVKudTOhQ8RsEmN9cc
iutwyI2pMqkM1FJEZm2J7ZCj24XrDdPQ0BTWNqiydYUevpJDkSEwjAaLG+2/
9vCFWqPWiQK0Xlevv8Rm80cosXI95jI6alOIuKkYBLX1iGqllRgdyj+AJVLK
InWTxnF6T9fuAlvEIZrMvHG+BjsLjRNM9LRtEYXr3VU9caSotpDOsqCe6qu4
THwhE3H4JznUzCK+VstTl0E3M4oQw37t7rVtjyZ710w2os8QvDucA6ZwZumD
4ZIzbflrpRu2IrBZy41Z8mbpZkm0IFuZcTmm1EYrhamoxZhzSrssC0EdZYrT
KUJ2W6Gq5a3YfSYPiDU8vhJVcXpTOZF5uVf49wBmKBVk0RLOPJGEK7JPlHLm
9ifrkDmzZQ0ZNFI9gf/wwN08EA6XqXap/ray0mMX+gXFMjdpTThjPYc4NuXl
SXMJbqbbzT/DwXwJTwMho48Nn57BnEXAV5UpSvKL1+2OKmr22mX2Xb1h3l5m
l4YTKfdG2aGicRqphoB1z8VOnU6mGSlSKXA7198V04BCl0mIFUm74133f/Oh
f3HcVw/c6lJ7UOry6F/7xwPpWdpud/bbB7tb7Q60Tae9095tYwisP9bbe/vS
Unbx4Yxa/R7x/8vjQX+grgdXpxdv+bujN7v9/mFnd6f/Zntn+/Coc/Tq1cHh
q91e72R3d29rf/dwd+vo8LjX33m1c3zY39nrvTra3tnZ72wfkDPxxnv07E1K
2wMX48bax+ZqrBGiWQVkxbnVf395/O67o/7ZWcv2ERDZmepSb0qHlLSqaqIg
jFB4KEC4tmSB0ndUJdAUerS9S9dt4W46cnXHW0oCiUyB5A4c5V90FrrMf+1K
qWuxgsz9oqQIYyqUrdi4NNUlr9kmzKfE8EYnwRxC+O3vozyfmY8/rbN4k4Hk
m52DCmJXndK/Uqfn5EjXkvt5j5Tr5Qb2lvIWZLtJCYGVybOmqq0TOa8SGyE2
lb2ookbNNFX5S9wQqm6VTRWVmvgcKq+Z33++dmeb0rpkqmFA7zo8PKX4fo7R
Do+mHJ/9fG3SFLeu2uavm1LIM6k1UscXEpR31Q7PIzuCmJonGFYJXbXL38Bp
vYlicqqt1f8KU9KM0mM4bVft8axhmsaqDXdOk7t6o+PcTRX931X7C/vQd0Wu
8c0r/uatJM4uNG/yhfrZzyyJ++TocGcCpM6764BAHc9L2SUhb6PTWRuyk7Ep
j9vy6HkLGkgcGJLOXkyICz3o+bess7rsapAv0zxyzamhx3M9XffsB3tXHcL/
zyV5/IMG3cKZVCr5VIwIO0M4zNIUglefg/PWyEInqJNpQAzG59ioD7vTUNX8
I4JGsmTO22Q12d4nTUI2c2/7YEssGkBtsur+252sz/GzuF0P3TuuuD96lq+7
1lZZjrCGowPTe3zTVnbSRs1T3iYlz96y2GjcE4tCl10552xdnp5AOtPhH6ll
w+asIyO++xp4hdwz8Mh65eE5oQXUl7mFKY08NnXEOZy8ECN8r/OyVm9xlSWr
UPVKVJviWaHcaDUH4jTw3Tvw5HdvIu5yWsoKsXnR8Yis9Hji1Y5oq9MyQ8hp
r6iq3lNaEOp7YlFvorXhPUftut6QA8ySCNZ84QZJU44WLBllLzU3ukE5hyUx
BYkG4OcvnDWTYxwJ04pVlzSmdDQ1PVGNuWjgYg8Ob4hgPXvivrVq4ofX4r0F
x37DNezJRmUMSipjo9QDHsCIRFHi3+cjtIZcAQfMFlkgZ0bFkFD5t1PCppGn
w9O2BUhpAwBo6SCASgnmT4D1D8rWQ4u5uDAT/SmazOhdE02IErOYu0hUU1kH
kWtuHLl2DltPLDUapB/gorykA1cjo5w3cP4RcMrLbqq8kc8EZ8ehOx6AqfPe
76QFgBLs3FGacEw2SbOKFQlgPfMrJKAXVmZT24ihs3kjF//t74ubzsc2+RL0
AfzttN8ssRztoK9FbdPeAHNF7C6s83ZqlJpc2YzSUg9KXQE640mMTHbT1Fo+
sd392Eiw6bjZSk1NnmwKiQGZ0Haaeqx/VSr1vcaVPElYolGac58XG257t7nX
YhPestLiMH5eOm10yxbJQjLBOC3LAOwI8AVE1XFsQJBmdiueVdvHW94HXgPt
Qtn5ZBQbeJ8F7rJmAXOrNytkO522rUnvbVH7gZQ5Jcc/JkeAwhNb4Czx1WVB
s6Y4sPnzVFjht4i25OJ8nsIvLSh1UCaA2oe1ivg6VzVYNoysF/5xiFAqwBOm
BUIXKYfuUIJk7E25oZK+Ce6epCoku/5YQoW6pJpna8HeYrMn34g9bwX0+WP/
tGBx8rcFi5ypoIYEj3NS8PycW0ef/c7+Bv5x8dhmbYr4Rvj88nMRoH05pvn3
ubDwJbzHnxAXvihzq4MouG0UlSjJTRWlpD6Bq0ciBJBrTbZ4GKdDlduwheuw
VL+irtPZRPrNqkDklwLLJ1ieV+3zd+TeytZMAWAzFdUIZyb6kkRz6Vfqp6zl
vDgDzZpQlCynwKAkuOyepbFNH3N/pTRW2TcKFtNk3CfBefXlrHm+kDZnaXOd
W9xJ6rK1ZRsJdzes5O+flMEicOd0P/4Ff3EW4USLN85lDbp2RR+IeRgKxapJ
uPKG22wny/tmmWPX68LVcjl5ZaFdOGhgHW6VjudteXlUwuANWVt93wRTb7ln
kPa9Cb66P9IViTLHDLpJ6iiZL5ScLaKAeJfGd+RSs+hkhhvpn0Jd10n3FEsz
SetMyNTkIOoXdWb9+CN4m+ksV+iYuzbEgG1KWWgVsOWocXe+ip/pSM9xMm89
Ld/tsW/fLLE0NcOVDZfWrH6uh+bHMr7q0w0kSzfgWstYHPnF7mBGb0MuoKtX
IdxWvRw+v+0Oqb23s2p2rbvK5ZJLT3TxCqpOgZyakdgZdv6Qa+pXObeN8um5
g+LG9uu7NDVX3qfUT58xbRJcCVxAPu1n9v8/UhPXtnCpzl3hklNUp9JBy/21
1usU/bFc6GQV4obVpAEmqsBY59VmKJ0ry40sn/jKa13xVUvBcLGl4OlCK4Rv
9uOMyTMwrPw9PcMVWJb89tUi+BlzskII/3lyaO6fo4y4UxM6DKIDem+GyDXW
Vm41K2RJ3Erav9F8LMxTVXA8fl+hykLbGhlzf/WWGb9eIiBFT6+AWeNpYkSR
IgfX1eDK+oSkpatyhZyKp/NrWBBWhEw4y/6uGpKbSD3o1Nkznas1afwp33Bf
fwbYsDHOHWRBNp8W6SjT07GVDvv6gy3R2U4muywlSem5oNnFN9H3rPv3OtuC
HWeW2R3jpihRHAbR6ryhAdpeT17Qsq8eORQ19SgtvH5TC9V5P+5Mcr8AQn0y
1StG1FR7eXLJHZO9i97Cl/Z+Ip1oegE759x8doNr9m3e/+PyCP+igeqHEQjQ
VdOYu/hdmeDh4ef0hjI1dbsueMxmZ7pqA+NeSwJCGStqlqGX68biPFj2vACn
SxeAHjXRdC9aU4MenSgq4wT7nlJMb9gVi6EGLXHS3Coht7B2RF7M3Ht4aL7I
TXmdKb+1jyuovcZpRTyo8jzCUyUSUD8/EHD1gzohFXJKb5T+gPuR8kKOz1UX
6Q+Y6/tq8T8Y5RYcPHLhkGD1V9ZZuMzygzUei/XOR6J2dSUObAcLKJXyQ616
Y99XXISc17Bu7iHFnCd22Mb0pRgCY86EL7yjKC+I8nteUw3HIIimmtTHkBse
7Ns0/G6A609kKORTklqsrSnRrIVNT+C4Q/hwnoDwci5x3dNbhiUO+RMAd7Fg
Juf80ba23GOF0V7ahhqUimFcyYCqNyS5bqSG6FAP0osXf/0LDfbP1fE3A+l+
q4uUmRDDRBPXsJM3fghEh2G+Mmy3UbkI0zdmaN+ck+a6SrCUE6z7gj2aLywC
F/yLM2ZSDpyYsnu3+ftI5Yxfmzn9dsPWllojkF2Vz0YjEXzJOpMmXS+nS7BP
VZK1fL1ba7OkGfzyE6lDGI44htMgPz/0xcLPoJzYnnyGUOcG1+XZvCR5NX+o
KaBGLO9eqnh4Ub5RYX1CeRS3j3vOPvkdwKKXWmrvyNm2TOcRNLpZSHcmKXda
LnSYlc5YI0uyubB+U7ncSefwcN/vbPudw0Fnv7tz2N175W8ddLe2vu1NqGVZ
b26epfl3PRAMJ/j47cwP9OuxGWbm/mOZXTG2iUeaf8rsSaerDvY6W7vbO4ev
NuyoTz/E03Kwa6Bb1Qyse1At2qmFubJZi2v5Sj1Sff8jHylJ1QoCAKmPCy19
IO9iF19A3T1ZvY9P+qpcuy1RnTquVmwgUtVoO7Hl7sWGETgIlKQpf/2l7B+p
2gSJgT5XQ5O3OkLO7yBkBUoIIkIzhcoQ4UyzaBQl/K4z9aXUanMLr2Cy+1b2
uVhOkeYLN7nbfV31XkjzhatFr/w7vRj03/avMFXdddY66+qR79FW0lb/Yfv3
/P1pyJMXEoDNv/OFKpXwiF/zCdkwa9e5RJ44j9jfD+BUN2StXFg2X8BZpcFG
SfyJ48m2drFfNszAGtW8NWj3cL7ortnwI3cAZlOa0dnfYgexTcO2HLWaVjaz
DUcvlJoVxlyBZ+WC3lNfunfKGERZw1/1d3R5edbvXTTGTvpveh/OBupN7+y6
zyDETD7xV7LFs1hUFzmkMEvevY1uVtyfVF55QrkQ+rN+l2368SvnMVB3XPEk
jzDZqf/gyb9vtz7WiwpP4F9Luq8A0fmoTs/fn50enw5Uvz7TwaD+JImGX+Da
bpP0PjbhSEICaK9ZIl6zCclwHJ14/wuRbcteX1AAAA==

-->

</rfc>
