<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-mahy-mls-sd-cwt-credential-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="MLS SD-JWT and SD-CWT Credentials">Messaging Layer Security Credentials using Selective Disclosure JSON and CBOR Web Tokens</title>
    <seriesInfo name="Internet-Draft" value="draft-mahy-mls-sd-cwt-credential-01"/>
    <author fullname="Rohan Mahy">
      <organization>Rohan Mahy Consulting Services</organization>
      <address>
        <email>rohan.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>Security</area>
    <workgroup>Messaging Layer Security</workgroup>
    <keyword>MLS credential</keyword>
    <keyword>SD-CWT</keyword>
    <keyword>SD-KBT</keyword>
    <keyword>SD-JWT</keyword>
    <keyword>key binding</keyword>
    <keyword>selective disclosure</keyword>
    <abstract>
      <?line 40?>

<t>The Messaging Layer Security (MLS) protocol contains Credentials used to authenticate an MLS client with a signature key pair.
Selective Disclosure CBOR Web Tokens (SD-CWT) and Selective Disclosure JSON Web Tokens (SD-JWT) define token formats where the holder can selectively reveal claims about itself with strong integrity protection and cryptographic binding to the holder's key.
This document defines MLS credentials for both these token types.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://rohanmahy.github.io/mls-sd-cwt-credential/draft-mahy-mls-sd-cwt-credential.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mahy-mls-sd-cwt-credential/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Messaging Layer Security Working Group mailing list (<eref target="mailto:mls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/mls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/mls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/rohanmahy/mls-sd-cwt-credential"/>.</t>
    </note>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines new MLS <xref target="RFC9420"/> credential types for SD-CWT <xref target="I-D.ietf-spice-sd-cwt"/> and SD-JWT <xref target="I-D.ietf-oauth-selective-disclosure-jwt"/> tokens respectively.
The SD-CWT Credential contains a Selective Disclosure Key Binding Token (SD-KBT).
The SD-JWT Credential contains SD-JWT with Key Binding (SD-JWT+KB), which could be represented in the traditional data format, or in a more compact binary encoding.</t>
      <t>The "holder" of one of these tokens could be the MLS client including the token in its Credential in its LeafNode (in a group or in a KeyPackage) or in an ExternalSender structure.</t>
      <ul empty="true">
        <li>
          <t>Note: It is not necessary for an AS to selectively disclose any claims.
In other words, an Identity Provider that normally generates JWT or CWT web tokens could generate the same claim set, as long as the confirmation key is included and verified by the issuer.</t>
        </li>
      </ul>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The term Credential is used as defined in <xref section="5.3" sectionFormat="of" target="RFC9420"/>.
The terms MLS Distribution Service (DS) and MLS Authentication Service (AS) are used as defined in <xref target="RFC9750"/>.
The terms MLS client, MLS group, LeafNode, KeyPackage, PublicMessage, PrivateMessage, ratchet tree, and GroupInfo are likewise common MLS terms defined in <xref target="RFC9420"/>.</t>
    </section>
    <section anchor="new-mls-credential-types">
      <name>New MLS Credential types</name>
      <t>This document extends the list of defined CredentialTypes in MLS to include <tt>sd_cwt</tt> and <tt>sd_jwt</tt> types. Additional syntax and semantics are defined in the following subsections.</t>
      <sourcecode type="tls"><![CDATA[
struct {
    CredentialType credential_type;
    select (Credential.credential_type) {
        case basic:
            opaque identity<V>;
        case x509:
            Certificate certificates<V>;
        ...
        case sd_cwt:
            opaque sd_kbt<V>;
        case sd_jwt:
            SdJwt sd_jwt;
    };
} Credential;
]]></sourcecode>
      <t>The MLS architecture <xref target="RFC9750"/> describes the Authentication Services as having the following three services (i.e. requirements):</t>
      <ol spacing="normal" type="1"><li>
          <t>Issue credentials to clients that attest to bindings between identities and signature key pairs</t>
        </li>
        <li>
          <t>Enable a client to verify that a credential presented by another client is valid with respect to a reference identifier</t>
        </li>
        <li>
          <t>Enable a group member to verify that a credential represents the same client as another credential</t>
        </li>
      </ol>
      <t>The consequence of this is that the consumer of the SD-CWT or SD-JWT needs to be able to determine both the MLS client and the application identity referred to in a token in a Credential.</t>
      <section anchor="mls-sd-cwt-credential">
        <name>MLS SD-CWT Credential</name>
        <t>An MLS SD-CWT Credential contains a single SD-KBT, containing an SD-CWT in the KBT protected header.
The SD-CWT contains zero of more disclosures (in the <tt>sd_claims</tt> header field).</t>
        <t>Any party that can view the credential can read the disclosed claims.
For example if LeafNodes are visible to the MLS DS, because MLS handshake messages are conveyed in PublicMessage, the disclosed claims would also be visible to the DS.</t>
        <t>The SD-CWT inside the credential <bcp14>MAY</bcp14> include zero or more encrypted disclosures (in the <tt>sd_encrypted_claims</tt> header field).
Each encrypted disclosure is separately AEAD encrypted with a per-disclosure unique ephemeral key and salt.
The per-disclosure encryption key allows the holder/MLS client to disclose an element to a specific subset of members, or (in the common case when the DS is privy to the ratchet tree) only to members of the group.
A proof of concept to decrypt encrypted disclosures only for members of the group is described in <xref target="I-D.mahy-mls-member-secrets"/>.</t>
        <t>The audience in the SD-KBT is either a representation of the MLS group, or a higher-level application structure associated with an MLS group or tightly-coupled collection of groups (for example, a chat room which maintains one MLS group for the main discussion and another for moderators to discuss the moderation of the room) such that being in one group without the collection would be nonsensical.</t>
        <t>The subject in the SD-CWT represents a specific MLS client (for example a COSE key thumbprint, or a client ID URI).
It should not use an identifier which represents multiple signature key pairs of the same type, or represents the same "user" on multiple devices.</t>
      </section>
      <section anchor="mls-sd-jwt-credential">
        <name>MLS SD-JWT Credential</name>
        <t>The SD-JWT Credential can be represented in the classic SD-JWT+KB data format defined in <xref section="4" sectionFormat="of" target="I-D.ietf-oauth-selective-disclosure-jwt"/> (shown below), or in a more compact binary representation.
MLS SD-JWT Credentials <bcp14>MUST</bcp14> include the Key Binding.</t>
        <ul empty="true">
          <li>
            <t><strong>TODO</strong>: Discuss if the LeafNode signature over the Credential is sufficient</t>
          </li>
        </ul>
        <t>The classic format uses only characters from the unpadded base64url character set (Section 5 of <xref target="RFC4648"/>) plus the period (<tt>.</tt>) character to separate the three parts of the <tt>Issuer-signed JWT</tt>, and the tilde (<tt>~</tt>) character to separate disclosures from the other components.</t>
        <figure>
          <name>SD-JWT+KB in classic format</name>
          <artwork><![CDATA[
<Issuer-signed JWT>~<Disclosure 1>~<Disclosure 2>~...~<Disclosure N>~<KB-JWT>
]]></artwork>
        </figure>
        <t>This document also defines a "compacted" format where each of the components of the <tt>Issuer-signed JWT</tt>, every Disclosure, and the <tt>KB-JWT</tt> are base64url decoded and stored in individual fields in the <tt>SdJwt</tt> struct.</t>
        <sourcecode type="tls"><![CDATA[
struct {
    Bool compacted;
    select (compacted) {
        case true:
            opaque protected<V>;
            opaque payload<V>;
            opaque signature<V>;
            SdJwtDisclosure disclosures<V>;
            opaque sd_jwt_key_binding<V>;
        case false:
            opaque sd_jwt_kb<V>;
    };
} SdJwt;

enum {
  false(0),
  true(1)
} Bool;
]]></sourcecode>
        <ul empty="true">
          <li>
            <t>The compacted variant allows implementations to tradeoff reduced size for the extra processing cost of base64url encoding and decoding the Credential.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The privacy considerations in SD-CWT, SD-JWT, and MLS apply.
TODO more security.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The privacy considerations in SD-CWT and SD-JWT apply. The privacy considerations of MLS are largely discussed in <xref target="RFC9750"/>.
TODO more privacy.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests IANA to add the following entries to the MLS Credential Types registry. Please replace RFCXXXX with the RFC of this document.</t>
      <section anchor="sd-cwt-credential">
        <name>SD-CWT Credential</name>
        <ul spacing="normal">
          <li>
            <t>Value: 0x0005 (suggested)</t>
          </li>
          <li>
            <t>Name: sd_cwt</t>
          </li>
          <li>
            <t>Recommended: Y</t>
          </li>
          <li>
            <t>Reference: RFCXXXX</t>
          </li>
        </ul>
      </section>
      <section anchor="sd-jwt-credential">
        <name>SD-JWT Credential</name>
        <ul spacing="normal">
          <li>
            <t>Value: 0x0006 (suggested)</t>
          </li>
          <li>
            <t>Name: sd_jwt</t>
          </li>
          <li>
            <t>Recommended: Y</t>
          </li>
          <li>
            <t>Reference: RFCXXXX</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9420" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9420.xml">
          <front>
            <title>The Messaging Layer Security (MLS) Protocol</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="B. Beurdouche" initials="B." surname="Beurdouche"/>
            <author fullname="R. Robert" initials="R." surname="Robert"/>
            <author fullname="J. Millican" initials="J." surname="Millican"/>
            <author fullname="E. Omara" initials="E." surname="Omara"/>
            <author fullname="K. Cohn-Gordon" initials="K." surname="Cohn-Gordon"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>Messaging applications are increasingly making use of end-to-end security mechanisms to ensure that messages are only accessible to the communicating endpoints, and not to any servers involved in delivering messages. Establishing keys to provide such protections is challenging for group chat settings, in which more than two clients need to agree on a key but may not be online at the same time. In this document, we specify a key establishment protocol that provides efficient asynchronous group key establishment with forward secrecy (FS) and post-compromise security (PCS) for groups in size ranging from two to thousands.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9420"/>
          <seriesInfo name="DOI" value="10.17487/RFC9420"/>
        </reference>
        <reference anchor="I-D.ietf-spice-sd-cwt">
          <front>
            <title>SPICE SD-CWT</title>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>mesur.io</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Rohan Mahy" initials="R." surname="Mahy">
              <organization>Rohan Mahy Consulting Services</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This specification describes a data minimization technique for use
   with CBOR Web Tokens (CWTs).  The approach is based on the Selective
   Disclosure JSON Web Token (SD-JWT), with changes to align with CBOR
   Object Signing and Encryption (COSE) and CWTs.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-spice-sd-cwt-04"/>
        </reference>
        <reference anchor="I-D.ietf-oauth-selective-disclosure-jwt">
          <front>
            <title>Selective Disclosure for JWTs (SD-JWT)</title>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete</organization>
            </author>
            <author fullname="Kristina Yasuda" initials="K." surname="Yasuda">
              <organization>Keio University</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="29" month="May" year="2025"/>
            <abstract>
              <t>   This specification defines a mechanism for the selective disclosure
   of individual elements of a JSON data structure used as the payload
   of a JSON Web Signature (JWS).  The primary use case is the selective
   disclosure of JSON Web Token (JWT) claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-selective-disclosure-jwt-22"/>
        </reference>
        <reference anchor="RFC2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9750">
          <front>
            <title>The Messaging Layer Security (MLS) Architecture</title>
            <author fullname="B. Beurdouche" initials="B." surname="Beurdouche"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="E. Omara" initials="E." surname="Omara"/>
            <author fullname="S. Inguva" initials="S." surname="Inguva"/>
            <author fullname="A. Duric" initials="A." surname="Duric"/>
            <date month="April" year="2025"/>
            <abstract>
              <t>The Messaging Layer Security (MLS) protocol (RFC 9420) provides a group key agreement protocol for messaging applications. MLS is designed to protect against eavesdropping, tampering, and message forgery, and to provide forward secrecy (FS) and post-compromise security (PCS).</t>
              <t>This document describes the architecture for using MLS in a general secure group messaging infrastructure and defines the security goals for MLS. It provides guidance on building a group messaging system and discusses security and privacy trade-offs offered by multiple security mechanisms that are part of the MLS protocol (e.g., frequency of public encryption key rotation). The document also provides guidance for parts of the infrastructure that are not standardized by MLS and are instead left to the application.</t>
              <t>While the recommendations of this document are not mandatory to follow in order to interoperate at the protocol level, they affect the overall security guarantees that are achieved by a messaging application. This is especially true in the case of active adversaries that are able to compromise clients, the Delivery Service (DS), or the Authentication Service (AS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9750"/>
          <seriesInfo name="DOI" value="10.17487/RFC9750"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.mahy-mls-member-secrets">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
      </references>
    </references>
    <?line 203?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Richard Barnes for his comment.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA51Z7XbbNhL9z6fAKj/WykqynTr9UFK3suVs7Ti213La7dmz
J4ZISEJMESpBSlF9nGfZZ9kn2zsD8EuW0571H5MggBnM3LkzA3W73SDTWaz6
ovVOWSunOpmKc7lWqRipME91thbHqYpUkmkZW5FbmjBSsQozvVRiqG0YG5un
SpyNLi+ETCJxfHR5LX5RY3Fj7lRiW4Ecj1O1JBHnIzEads9+ueGJeDzGY23/
VhDKTE1Nuu4LnUxMEEQmTOQc+kWpnGTduZytu/PYdm3UDVdZNyzXdvf2A5uP
59pabZJsvcCa05ObN0I8E9jZQLxOIrVQCS1odURLRTozKZbSy+ngCP9Miqfr
mzetIMnnY5X2gwj69IPQJBZHyW1fZGmuAhzmq0CmSmLXwk6tYGXSu2lq8sUX
rNkK7tQaE6N+ILqCDFIdgUacTfzT26Pi6cyNYa0Y4xjYl15t6Yeo9EOwVEkO
lYX4Y1WEcHZq/QLNacLfaQmNz6WOMQ5L/6hVNumZdErDMg1nGJ5l2cL2d3dp
Fg1Bg14xbZcGdsepWVm1i/W7tG6qs1k+xsrUzGRCTtzd6kSaG8PiNqtJKdf0
3DY9bbav3v0jjPRm2RwyAplnM5OSByBPiEkexw5k1yRKvMMG/AHHkYn+XWZA
VP2jOAYe8jhzsZAudagsL1DObqwxW+THKY30QjMPgsSkc0ne6gcBgbt6C7rd
rpBjm6UyzILgZqbEk9G4A8y0xSI1mQlNLIDMTOrEbkSpikRmBJ2TxiioBOlO
cIs1hsQKphRSWD1NZEbhS9BaSJ32gq3RvRHUYscBte0C+Uk+2FhxRisiNdGJ
gn4YFs4MVqxmCmugrpiZOMKBQ+hb4jteCzCIkjhvLPXcwlgmz4TOMGPizgLj
GVhLJ+APNhSZiFabhHUM0/UiM9NULmY6LIKIjFTJ/KslK/Rgf20FiCefk6Wc
unYjVi1pLsYGkrGBLY5D8WR7zqFzHUWxCoJn4jSBclHOygRPbJ+oFYu4v//L
9Zvj7w5e7D081OS5nVmop01MPO0OGWVduwAEPd6xzJPr2cYsQ3jolkbtVqTR
/cjrMuepVNlFYfceo/ERU1e4k9u9/xZwOvJGZgCw/0Fo7XLHsyd29J/Yq/Vt
PID+9vao3QFedDjDmjyOxFhB5QW0xk4Avk7YpwgmEDwsjr3B4tJDjUkeU6SY
G+iJyFwg6AgQMl0LlYSGhPVcFLYcMFrCTIQBZvGv5m1bySeBtejSSRjnDmCz
AhqQCbzWT+xHzpWcXJhIiR1Wi2m7VBIGuJLhnZyqdjGWiJNPmUpxrhEls5Sg
D2zB6tD6UFwA9kh9UAKgMhmAFRKX4HAEHqwejAj29djyQCCOWPsI6wWniQC6
sT1lK9uhlaesOWLrKjVLTaKzmYQEMmyMfaYqUSnRtyAHQhqBZgUKaJirmMW2
seBdJxIawTnSipjiGP/pM0Ax0UyUCGOiKBzKGReOJpgvVaonGi/jNS9A+s8V
SAxRB5Jekr6GUIqpQ4o0RoR13qX9+HDIke9HN1QG0H9xccnP1yf/eH96fTKk
59FPg/Pz8iHwM0Y/Xb4/H1ZP1crjy3fvTi6GbjFGRWMoaL0b/NrqsFaty6ub
08uLwXnLAbfODZIo0RC+iNZSQJzwLW0QKRumeuzAfnR89d//7B945nixv/8d
Qtm9fLv/zQFeQK6Jk2YSuMm9wlrrQC4WSjpYxQhBudAZuI3dYGdmlQiiZVjz
+b/IMv/ui9fjcLF/cOgH6MCNwcJmjUG22eORR4udEbcMbRFTWrMxvmHppr6D
Xxvvhd1rg69/iCkzdfe//eEwcBiB2eeNmPXZFQZyzM0uuL8f+VTzsvcVsUTF
4b1yG5dCwJEZXJfzbF88iJ3hyGVSmjGosnZjzoDmABFb5bPAb15uEegoqcPP
zC2dknE6NXrpiKt8HOvQFR70muolorR8R8iGM5WBV5VyYOJq8RSVDKsV6zu1
0pYpdW5cseG0eKyotwyC9MKnveONTLeZJhUoL4kcKcQwIRm52Ldae8NJUnvh
pqAKcWujD0iNt6w2vXykF5esxSAq84RdIwd94lkWtRw5wfLhakcgDSYmjs2K
+B0th3Wup7T/+fNnkcU2cIws7rkobKpXy+kfSIFXPMexsdip5vY25rX9bvQX
Sph5LK0O++UY16sL+VsOsvA0/frnw1fNNZ9e7n3XXHKs0gwEyhViWD3bxtpe
r9fcx5lzq3B8uhtnj0U7ozeXjKKzVea/uOkPr4KHmsFekUV9QQyPcq9BRR1V
GHXMi4IQHUC2R5CloJnJZZGWKydmM2AaPvDTdnRP9VBS/JbrVBH6bBtF+n5P
nFJyaRSBwJiLL+tSocyoeWHSdlWLBXtnK0X533lFK5eNHlfeNnjREyeJHMdI
xEUlgZ04xa39/vWSsCp5kPxk4rJ1UYFYsZSxjlwZ5Ss67gnwMgGpJ2EBFKTP
NPiqJtpVIHNFHfAXFSirLlvP5Sxf2kqjqsFlT3IzDaiQBlxQUU739vM53yLo
U19tFcWnq3ypsEiUiqxPjKwyHiNFXEPsXdTk9XqMDE5DSHdxgYoiSpw9Utcx
cc1V1muyBkViq2fC32A0i+EgGCTbv9TLZLo5iZVv6zvFF4IfKiu/0tMLJhTt
C9SaKRlRSVMrxMttf1epITtxLVvV85ZrSdqKmY8rulu/kYC/4whlOLQm4KWZ
dy11XEsNPmYn1M6A8RRLebwoFaOyTnwDx6hPcr7A4fSkzC2ON5faau+hwiXD
UQeOCyXSGL+jVY7sTN4pII5TjVsZUvW2dpS7kZm26YFCjmpLuukhWGzIHY58
QV/a2cL9mwdFhVBmDGfY1BkWUKXuEcKeMnE54yljn0i0K9v2IehbBTeAdVGb
DU4Gw9o836YvVFrr1kSeaKJatZiBnlJoThTCpCLjzAFlY4XfsaiiJTGfrbW+
u7VgoWiqGgKBzDT3wwAxaIRShMt7nIUdT1juqwqT+BKAiZ+qTe8EOusCZcW6
8Eu9pmi74hRf/I5F/DMd9YIBhQT1YRPCRqgWTlPFB3vCRbwjtT3btiRtGoX0
/f0P1CuX90duERpmYCSzXLCQaSU6O0efScFPFLDYTWkmPFkRo6MaL7VWgVEn
JmZ6iundWKEJa1BT2dCBRq0JtaygkFS70CYZtsjidRedFeIPwYCc5itRCOVp
AOqkCtEOMThFO2w59130HFTi6IR63Gp/WkZ603c2a853q4y0gtzZuAh3eNKk
tsAOJrqV7kvNBiS2DfSEM0c6Y6X51oZFO7F0ULrdcUAqz7Mqeu3EXcbCWLH3
CMD4kdJb5RAK8lp2qgG3BvS6XYjrL0cnHB3ZLJ+PgdMk847y80+H4v31KYIZ
zTW6I1KHGuzcxUmVTL1Za/LndFlIUrZk/cIynD2p0mOh21JrC5LoLiKp9osU
lyywQy07nW1kpyfuW6Dz9psTUBgcHYryvqV+f7K97TngpufP3zTtuO5yrMBD
7S9fyTRjqRdsPSRaHWpHC/bmJFpdHfG9yPPnN5fDy+fP+3xNRQjVzvDl/Uvl
HLNUDvrNzs/mE0CIsOArGW8obxm4x1MOIoyucolxJinijLbKk4WM6NoChbv6
+iBP42oa3X2InbKHJGO68vbg64NvHx7aYhHnDgjgdW0isXPbu23X1vOFjksi
7sqJK1pK7iW+brl6BZ3hlNAC9rvtlIVRpmO6gLr9/OSudVotz+QLPDgM4Qus
uhYoeP1I1OHn17XLwf3m64vDz+gwGkMXmPH2iJx8yDve9wX/TvV9qwIlENN0
QOths2vkcqC4YZWi5aGlolbhM3fvrCg7eztVp/mi5UDaAGelcmXLW6f4LZcx
lbORqUxxa2VBli6ECKBLHeUAGJcKtgjCW26Obn0ueKq3PDL8G4A/VbOXLIcf
tY70G9bW5q0sOhv9W32CXMdGPvm5jKBHE/g0NQfX4PTkZtwXfgBRfvDN1OOu
cgIPbz9KsXpcLuLekvV4FQQqyedsFt5hZ6/doV/DYJed/TamkV1983kobmaq
sjHaqlRLxhbXUJqyx7ygJ86AdPOszGQC6oryUFGv97sqs6n6hO9kabqWpeQX
GnedUUGluIVmrDBuip610Y8Ez2o/0houaV2y9febVGrJcM0NVfWNAOYyZMfz
aKe8eqIihK78QZSOi63f30m78hv+P8LqP0o4MeILy2AO1/ArEct0WlxSg7W3
XniV+vrt+GrpdHAx2KJqnR+ox0e/bt1cqnCjaONuANNS6tlrHUwtKbgLp1RN
6VYPR7qKFcESOSuWqBCh4z/x52o3Wo6BsucttHCd5Zausit+ljEiVex92tvb
e4mkmU/RHlFE49sF/2LpbmLweq2o6KYfBKK++JUHfJvfL9Qo5GzWB005Xz8l
5+Ofl8O/f41leEd+GIR3iVmhOp3yXQq43P24rqLvWxx9jrdlcsdWvtaUgCJx
JNPE/+JF1nJSYaz/ARm/pNm0IAAA

-->

</rfc>
