<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.22 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-birkholz-rats-epoch-markers-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="Epoch Markers">Epoch Markers</title>
    <seriesInfo name="Internet-Draft" value="draft-birkholz-rats-epoch-markers-03"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Arm Limited</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>Thomas.Fossati@arm.com</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="C." surname="Bormann" fullname="Carsten Bormann">
      <organization>Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Bibliothekstr. 1</street>
          <city>Bremen</city>
          <code>D-28359</code>
          <country>Germany</country>
        </postal>
        <phone>+49-421-218-63921</phone>
        <email>cabo@tzi.org</email>
      </address>
    </author>
    <date year="2023" month="March" day="13"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document defines Epoch Markers as a way to establish a notion of freshness among actors in a distributed system. Epoch Markers are similar to "time ticks" and are produced and distributed by a dedicated system, the Epoch Bell. Systems that receive Epoch Markers do not have to track freshness using their own understanding of time (e.g., via a local real-time clock). Instead, the reception of a certain Epoch Marker establishes a new epoch that is shared between all recipients.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-birkholz-rats-epoch-markers/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        rats Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats/draft-birkholz-rats-epoch-marker"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Systems that need to interact securely often require a shared understanding of the freshness of conveyed information.
This is certainly the case in the domain of remote attestation procedures.
In general, securely establishing a shared notion of freshness of the exchanged information among entities in a distributed system is not a simple task.</t>
      <t>The entire <xref section="A" sectionFormat="of" target="I-D.ietf-rats-architecture"/> deals solely with the topic of freshness, which is in itself an indication of how relevant, and complex, it is to establish a trusted and shared understanding of freshness in a RATS system.</t>
      <t>This document defines Epoch Markers as a way to establish a notion of freshness among actors in a distributed system.
Epoch Markers are similar to "time ticks" and are produced and distributed by a dedicated system, the Epoch Bell.
Systems that receive Epoch Markers do not have to track freshness using their own understanding of time (e.g., via a local real-time clock).
Instead, the reception of a certain Epoch Marker establishes a new epoch that is shared between all recipients.
In essence, the emissions and corresponding receptions of Epoch Markers are like the ticks of a clock where the ticks are conveyed by the Internet.</t>
      <t>In general (barring highly symmetrical topologies), epoch ticking incurs differential latency due to the non-uniform distribution of receivers with respect to the Epoch Bell.  This introduces skew that needs to be taken into consideration when Epoch Markers are used.</t>
      <t>While all Epoch Markers share the same core property of behaving like clock ticks in a shared domain, various "epoch id" types are defined to accommodate different use cases and diverse kinds of Epoch Bells.</t>
      <t>While Epoch Markers are encoded in CBOR <xref target="STD94"/>, and many of the epoch id types are themselves encoded in CBOR, a prominent format in this space is the Time-Stamp Token defined by <xref target="RFC3161"/>, a DER-encoded TSTInfo value wrapped in a CMS envelope <xref target="RFC5652"/>.
Time-Stamp Tokens (TST) are produced by Time-Stamp Authorities (TSA) and exchanged via the Time-Stamp Protocol (TSP).
At the time of writing, TSAs are the most common providers of secure time-stamping services.
Therefore, reusing the core TSTInfo structure as an epoch id type for Epoch Markers is instrumental for enabling smooth migration paths and promote interoperability.
There are, however, several other ways to represent a signed timestamp, and therefore other kinds of payloads that can be used to implement Epoch Markers.</t>
      <t>To inform the design, this document discusses a number of interaction models in which Epoch Markers are expected to be exchanged.
The top-level structure of Epoch Markers and an initial set of epoch id types are specified using CDDL <xref target="RFC8610"/>.
To increase trustworthiness in the Epoch Bell, Epoch Markers also provide the option to include a "veracity proof" in the form of attestation evidence, attestation results, or SCITT receipts <xref target="I-D.birkholz-scitt-receipts"/> associated with the trust status of the Epoch Bell.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <t>In this document, CDDL <xref target="RFC8610"/> is used to describe the data formats.  The examples in <xref target="examples"/> use CBOR diagnostic notation as defined in <xref section="8" sectionFormat="of" target="STD94"/> and <xref section="G" sectionFormat="of" target="RFC8610"/>.</t>
      </section>
    </section>
    <section anchor="epoch-ids">
      <name>Epoch IDs</name>
      <t>The RATS architecture introduces the concept of Epoch IDs that mark certain events during remote attestation procedures ranging from simple handshakes to rather complex interactions including elaborate freshness proofs.
The Epoch Markers defined in this document are a solution that includes the lessons learned from TSAs, the concept of Epoch IDs defined in the RATS architecture, and provides several means to identify a new freshness epoch. Some of these methods are introduced and discussed in Section 10.3 of the RATS architecture <xref target="I-D.ietf-rats-architecture"/>.</t>
    </section>
    <section anchor="interaction-models">
      <name>Interaction Models</name>
      <t>The interaction models illustrated in this section are derived from the RATS Reference Interaction Models.
In general, there are three interaction models:</t>
      <ul spacing="normal">
        <li>ad-hoc requests (e.g., via challenge-response requests addressed at Epoch Bells), corresponding to Section 7.1 in <xref target="I-D.ietf-rats-reference-interaction-models"/></li>
        <li>unsolicited distribution (e.g., via uni-directional methods, such as broad- or multicasting from Epoch Bells), corresponding to Section 7.2 in <xref target="I-D.ietf-rats-reference-interaction-models"/></li>
        <li>solicited distribution (e.g., via a subscription to Epoch Bells), corresponding to Section 7.3 in <xref target="I-D.ietf-rats-reference-interaction-models"/></li>
      </ul>
    </section>
    <section anchor="epoch-marker-structure">
      <name>Epoch Marker Structure</name>
      <t>At the top level, an Epoch Marker is a CBOR array with a header carrying an optional veracity proof about the Epoch Bell and a payload.</t>
      <figure anchor="fig-epoch-marker-cddl">
        <name>Epoch Marker definition</name>
        <artwork type="CDDL" align="left"><![CDATA[
epoch-marker = [
  $tagged-epoch-id
  ? bell-veracity-proof
]

; veracity of the bell
bell-veracity-proof = non-empty<{
  ? remote-attestation-evidence ; could be EAT or Concise Evidence
  ? remote-attestation-result ; hopefully EAT with AR4SI Claims
  ? scitt-receipt ; SCITT receipt
}>

remote-attestation-evidence = (1: "PLEASE DEFINE")
remote-attestation-result = (2: "PLEASE DEFINE")
scitt-receipt = (3: "PLEASE DEFINE")

; epoch-id types independent of interaction model
$tagged-epoch-id /= cbor-epoch-id
$tagged-epoch-id /= #6.26980(classical-rfc3161-TST-info)
$tagged-epoch-id /= #6.26981(TST-info-based-on-CBOR-time-tag)
$tagged-epoch-id /= #6.26982(multi-nonce)
$tagged-epoch-id /= #6.26983(multi-nonce-list)
$tagged-epoch-id /= #6.26984(strictly-monotonic-counter)
$tagged-epoch-id /= #6.26985(stateless-nonce)
]]></artwork>
      </figure>
      <section anchor="epoch-marker-payloads">
        <name>Epoch Marker Payloads</name>
        <t>This memo comes with a set of predefined payloads.</t>
        <section anchor="cbor-time-tag-etime">
          <name>CBOR Time Tag (etime)</name>
          <t>CBOR extended time tag (1001) optionally bundled with a nonce.</t>
          <t>See <xref section="3" sectionFormat="of" target="I-D.ietf-cbor-time-tag"/> for the (many) details about the CBOR extended
time format.</t>
          <sourcecode type="CDDL">
cbor-epoch-id = [
   etime
   ? nonce
]

etime = #6.1001({* (int/tstr) =&gt; any})

nonce = tstr / bstr / int
</sourcecode>
          <t>The following describes each member of the cbor-epoch-id map.</t>
          <dl>
            <dt>etime:</dt>
            <dd>
              <t>An extended time value as defined by <xref target="I-D.ietf-cbor-time-tag"/>.</t>
            </dd>
            <dt>nonce:</dt>
            <dd>
              <t>A never-repeating byte string used as extra data in challenge-response interaction models (see <xref target="I-D.ietf-rats-reference-interaction-models"/>).</t>
            </dd>
          </dl>
        </section>
        <section anchor="sec-rfc3161-classic">
          <name>Classical RFC 3161 TST Info</name>
          <t>DER-encoded <xref target="X.690"/> TSTInfo <xref target="RFC3161"/>.  See <xref target="classic-tstinfo"/> for the layout.</t>
          <sourcecode type="CDDL">
classical-rfc3161-TST-info = bytes
</sourcecode>
          <t>The following describes the classical-rfc3161-TST-info type.</t>
          <dl>
            <dt>classical-rfc3161-TST-info:</dt>
            <dd>
              <t>The response message of a Time Stamp Authority including a <xref target="RFC3161"/> Time Stamp Token Info structure.</t>
            </dd>
          </dl>
        </section>
        <section anchor="sec-rfc3161-fancy">
          <name>CBOR-encoded RFC3161 TST Info</name>
          <t><cref anchor="issue">Issue tracked at:</cref> https://github.com/ietf-rats/draft-birkholz-rats-epoch-marker/issues/18</t>
          <t>The TST-info-based-on-CBOR-time-tag is semantically equivalent to classical
<xref target="RFC3161"/> TSTInfo, rewritten using the CBOR type system.</t>
          <sourcecode type="CDDL">
TST-info-based-on-CBOR-time-tag = {
  &amp;(version : 0) =&gt; v1
  &amp;(policy : 1) =&gt; oid
  &amp;(messageImprint : 2) =&gt; MessageImprint
  &amp;(serialNumber : 3) =&gt; integer
  &amp;(eTime : 4) =&gt; profiled-etime
  ? &amp;(ordering : 5) =&gt; bool .default false
  ? &amp;(nonce : 6) =&gt; integer
  ? &amp;(tsa : 7) =&gt; GeneralName
  * $$TSTInfoExtensions
}

v1 = 1

oid = #6.111(bstr) / #6.112(bstr)

MessageImprint = [
  hashAlg : int
  hashValue : bstr
]

profiled-etime = #6.1001(timeMap)
timeMap = {
  1 =&gt; ~time
  ? -8 =&gt; profiled-duration
  * int =&gt; any
}
profiled-duration = {* int =&gt; any}

GeneralNameAttr = ( GeneralNameType : int, GeneralNameValue : any )
GeneralName = [ + GeneralNameAttr ]
</sourcecode>
          <t>The following describes each member of the TST-info-based-on-CBOR-time-tag map.</t>
          <dl newline="true">
            <dt>version:</dt>
            <dd>
              <t>The integer value 1.  Cf. version, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>policy:</dt>
            <dd>
              <t>A <xref target="RFC9090"/> object identifier tag (111 or 112) representing the TSA's
policy under which the tst-info was produced.  Cf. policy, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>messageImprint:</dt>
            <dd>
              <t>A <xref target="RFC9054"/> COSE_Hash_Find array carrying the hash algorithm
identifier and the hash value of the time-stamped datum.  Cf. messageImprint,
<xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>serialNumber:</dt>
            <dd>
              <t>A unique integer value assigned by the TSA to each issued tst-info.  Cf.
serialNumber, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>eTime:</dt>
            <dd>
              <t>The time at which the tst-info has been created by the TSA.  Cf. genTime,
<xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.
Encoded as extended time <xref target="I-D.ietf-cbor-time-tag"/>, indicated by CBOR tag 1001, profiled
as follows:</t>
            </dd>
          </dl>
          <ul spacing="normal">
            <li>The "base time" is encoded using key 1, indicating Posix time as int or float.</li>
            <li>The stated "accuracy" is encoded using key -8, which indicates the maximum
allowed deviation from the value indicated by "base time".  The duration map
is profiled to disallow string keys.  This is an optional field.</li>
            <li>The map <bcp14>MAY</bcp14> also contain one or more integer keys, which may encode
supplementary information <cref anchor="tf1">Allowing unsigned integer (i.e., critical) keys goes counter interoperability</cref>.</li>
          </ul>
          <dl newline="true">
            <dt>ordering:</dt>
            <dd>
              <t>boolean indicating whether tst-info issued by the TSA can be ordered solely
based on the "base time". This is an optional field, whose default value is
"false".  Cf. ordering, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>nonce:</dt>
            <dd>
              <t>int value echoing the nonce supplied by the requestor.  Cf. nonce, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>tsa:</dt>
            <dd>
              <t>a single-entry GeneralNames array <xref section="11.8" sectionFormat="of" target="I-D.ietf-cose-cbor-encoded-cert"/> providing a hint
in identifying the name of the TSA.  Cf. tsa, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
            <dt>$$TSTInfoExtensions:</dt>
            <dd>
              <t>A CDDL socket (<xref section="3.9" sectionFormat="of" target="RFC8610"/>) to allow extensibility of the data
format.  Note that any extensions appearing here <bcp14>MUST</bcp14> match an extension in the
corresponding request.  Cf. extensions, <xref section="2.4.2" sectionFormat="of" target="RFC3161"/>.</t>
            </dd>
          </dl>
        </section>
        <section anchor="sec-multi-nonce">
          <name>Multi-Nonce</name>
          <t>Typically, a nonce is a number only used once. In the context of Epoch Markers, one Nonce can be distributed to multiple consumers, each of them using that Nonce only once. Technically, that is not a Nonce anymore. This type of Nonce is called Multi-Nonce in Epoch Markers.</t>
          <sourcecode type="CDDL">
; Multi-Nonce

; a single nonce used by multiple entities
multi-nonce = tstr / bstr / int
</sourcecode>
          <t>The following describes the multi-nonce type.</t>
          <dl>
            <dt>multi-nonce:</dt>
            <dd>
              <t>A never-repeating byte string used by RATS roles in a trust domain as extra data included in the production of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch.</t>
            </dd>
          </dl>
        </section>
        <section anchor="sec-multi-nonce-list">
          <name>Multi-Nonce-List</name>
          <t>A list of nonces send to multiple consumer. The consumers use each Nonce in the list of Nonces sequentially. Technically, each sequential Nonce in the distributed list is not used just once, but by every Epoch Marker consumer involved. This renders each Nonce in the list a Multi-Nonce</t>
          <sourcecode type="CDDL">
; Multi-Nonce-List

; a list of nonces potentially used by multiple entities
multi-nonce-list = [ + multi-nonce ]
</sourcecode>
          <t>The following describes the multi-nonce type.</t>
          <dl>
            <dt>multi-nonce-list:</dt>
            <dd>
              <t>A sequence of never-repeating byte strings used by RATS roles in trust domain as extra data in the production of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch. Each nonce in the list is used in a consecutive production of a conceptual messages. Asserting freshness of a conceptual message including a nonce from the multi-nonce-list requires some state on the receiver side to assess, if that nonce is the appropriate next unused nonce from the multi-nonce-list.</t>
            </dd>
          </dl>
        </section>
        <section anchor="sec-strictly-monotonic">
          <name>Strictly Monotonically Increasing Counter</name>
          <t>A strictly monotonically increasing counter.</t>
          <t>The counter context is defined by the Epoch bell.</t>
          <sourcecode type="CDDL">
strictly-monotonic-counter = uint
</sourcecode>
          <t>The following describes the strictly-monotonic-counter type.</t>
          <dl>
            <dt>strictly-monotonic-counter:</dt>
            <dd>
              <t>An unsigned integer used by RATS roles in a trust domain as extra data in the production of of conceptual messages as specified by the RATS architecture <xref target="RFC9334"/> to associate them with a certain epoch. Each new strictly-monotonic-counter value must be higher than the last one.</t>
            </dd>
          </dl>
        </section>
        <section anchor="sec-stateless-nonce">
          <name>Stateless Nonce</name>
          <t>In a highly available service (e.g., a cloud attestation verifier) having to
keep per-session nonce state poses scalablity problems.  An alternative is to
use time-synchronised servers that share a symmetric key, which produce and
consume nonces based on coarse-grained clock ticks that are signed using the
shared secret.  This way, a nonce minted by a server in the pool can be
processed by any other server in pool, which avoids the need for session
"stickiness."</t>
          <t>A stateless-nonce supports the above use case by encoding a Posix time (i.e.,
the epoch identifier), alongside a minimal set of metadata, authenticated with
a symmetric key in a self-contained and compact token.</t>
          <sourcecode type="CDDL">
stateless-nonce = [
  TimeToken
  AuthTag: bstr .size 32
]

TimeToken = (
  Version: bytes .size 1
  KeyID: bytes .size 1
  Timestamp: posix-time
  Pad: bytes
)

posix-time = #6.1(int)
</sourcecode>
          <t>The following describes each member of the stateless-nonce array:</t>
          <dl newline="true">
            <dt>Version:</dt>
            <dd>
              <t>version of the TimeToken encoded as a single byte.  The value <bcp14>MUST</bcp14> be 0x01.</t>
            </dd>
            <dt>KeyID:</dt>
            <dd>
              <t>opaque identifier shared across the server pool for the signing key used to
compute AuthTag.  It is semantically equivalent to the TID field defined in
<xref section="3.1.3" sectionFormat="of" target="RFC6896"/>.</t>
            </dd>
            <dt>Timestamp:</dt>
            <dd>
              <t>the timestamp associated with the current epoch encoded as CBOR tag for Posix
time.  It <bcp14>MUST</bcp14> use the int format.</t>
            </dd>
            <dt>Pad:</dt>
            <dd>
              <t>zero or more pad bytes, used to make the stateless nonce the desired size.</t>
            </dd>
            <dt>AuthTag:</dt>
            <dd>
              <t>HMAC <xref target="RFC2104"/> w/ SHA-256 computed over the CBOR serialisation of TimeToken
encoded as a 32-bytes string.</t>
            </dd>
          </dl>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO</t>
    </section>
    <section anchor="sec-iana-cons">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced-replace">RFC Editor: please replace RFCthis with the RFC
number of this RFC and remove this note.</cref></t>
      <section anchor="sec-iana-cbor-tags">
        <name>New CBOR Tags</name>
        <t>IANA is requested to allocate the following tags in the "CBOR Tags" registry
<xref target="IANA.cbor-tags"/>, preferably with the specific CBOR tag value requested:</t>
        <table align="left" anchor="tbl-cbor-tags">
          <name>New CBOR Tags</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Data Item</th>
              <th align="left">Semantics</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">26980</td>
              <td align="left">bytes</td>
              <td align="left">DER-encoded RFC3161 TSTInfo</td>
              <td align="left">
                <xref target="sec-rfc3161-classic"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26981</td>
              <td align="left">map</td>
              <td align="left">CBOR-encoding of RFC3161 TSTInfo semantics</td>
              <td align="left">
                <xref target="sec-rfc3161-fancy"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26982</td>
              <td align="left">tstr / bstr / int</td>
              <td align="left">a nonce that is shared among many participants but that can only be used once by each participant</td>
              <td align="left">
                <xref target="sec-multi-nonce"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26983</td>
              <td align="left">array</td>
              <td align="left">a list of multi-nonce</td>
              <td align="left">
                <xref target="sec-multi-nonce-list"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26984</td>
              <td align="left">uint</td>
              <td align="left">strictly monotonically increasing counter</td>
              <td align="left">
                <xref target="sec-strictly-monotonic"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">26985</td>
              <td align="left">array</td>
              <td align="left">stateless nonce</td>
              <td align="left">
                <xref target="sec-stateless-nonce"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC3161">
          <front>
            <title>Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)</title>
            <seriesInfo name="DOI" value="10.17487/RFC3161"/>
            <seriesInfo name="RFC" value="3161"/>
            <author fullname="C. Adams" initials="C." surname="Adams">
              <organization/>
            </author>
            <author fullname="P. Cain" initials="P." surname="Cain">
              <organization/>
            </author>
            <author fullname="D. Pinkas" initials="D." surname="Pinkas">
              <organization/>
            </author>
            <author fullname="R. Zuccherato" initials="R." surname="Zuccherato">
              <organization/>
            </author>
            <date month="August" year="2001"/>
            <abstract>
              <t>This document describes the format of a request sent to a Time Stamping Authority (TSA) and of the response that is returned.  It also establishes several security-relevant requirements for TSA operation, with regards to processing requests to generate responses.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <seriesInfo name="DOI" value="10.17487/RFC5652"/>
            <seriesInfo name="RFC" value="5652"/>
            <seriesInfo name="STD" value="70"/>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS).  This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <seriesInfo name="DOI" value="10.17487/RFC8610"/>
            <seriesInfo name="RFC" value="8610"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz">
              <organization/>
            </author>
            <author fullname="C. Vigano" initials="C." surname="Vigano">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC2104">
          <front>
            <title>HMAC: Keyed-Hashing for Message Authentication</title>
            <seriesInfo name="DOI" value="10.17487/RFC2104"/>
            <seriesInfo name="RFC" value="2104"/>
            <author fullname="H. Krawczyk" initials="H." surname="Krawczyk">
              <organization/>
            </author>
            <author fullname="M. Bellare" initials="M." surname="Bellare">
              <organization/>
            </author>
            <author fullname="R. Canetti" initials="R." surname="Canetti">
              <organization/>
            </author>
            <date month="February" year="1997"/>
            <abstract>
              <t>This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key.  The cryptographic strength of HMAC depends on the properties of the underlying hash function.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9090">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <seriesInfo name="DOI" value="10.17487/RFC9090"/>
            <seriesInfo name="RFC" value="9090"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9054">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Hash Algorithms</title>
            <seriesInfo name="DOI" value="10.17487/RFC9054"/>
            <seriesInfo name="RFC" value="9054"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="August" year="2022"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) syntax (see RFC 9052) does not define any direct methods for using hash algorithms. There are, however, circumstances where hash algorithms are used, such as indirect signatures, where the hash of one or more contents are signed, and identification of an X.509 certificate or other object by the use of a fingerprint. This document defines hash algorithms that are identified by COSE algorithm identifiers.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC9334"/>
            <seriesInfo name="RFC" value="9334"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz">
              <organization/>
            </author>
            <author fullname="D. Thaler" initials="D." surname="Thaler">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="N. Smith" initials="N." surname="Smith">
              <organization/>
            </author>
            <author fullname="W. Pan" initials="W." surname="Pan">
              <organization/>
            </author>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims.  It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="STD94">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="STD" value="94"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="STD96">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="STD" value="96"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size.  There is a need to be able to define basic security services for this data format.  This document defines the CBOR Object Signing and Encryption (COSE) protocol.  This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization.  This specification additionally describes how to represent cryptographic keys using CBOR.  </t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-cbor-time-tag">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Time, Duration, and Period</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-time-tag-05"/>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Ben Gamari" initials="B." surname="Gamari">
              <organization>Well-Typed</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer Institute for Secure Information Technology</organization>
            </author>
            <date day="13" month="March" year="2023"/>
            <abstract>
              <t>   The Concise Binary Object Representation (CBOR, RFC 8949) is a data
   format whose design goals include the possibility of extremely small
   code size, fairly small message size, and extensibility without the
   need for version negotiation.

   In CBOR, one point of extensibility is the definition of CBOR tags.
   RFC 8949 defines two tags for time: CBOR tag 0 (RFC3339 time as a
   string) and tag 1 (Posix time as int or float).  Since then,
   additional requirements have become known.  The present document
   defines a CBOR tag for time that allows a more elaborate
   representation of time, as well as related CBOR tags for duration and
   time period.  It is intended as the reference document for the IANA
   registration of the CBOR tags defined.


   // The present version (-05) adds CDDL definitions; this should now
   // address all WGLC comments.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-05"/>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="10" month="January" year="2023"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50%.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 COSE headers, a C509 TLS certificate type, and a C509
   file format.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC-X.690">
          <front>
            <title>Information technology -- ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <seriesInfo name="ITU-T" value="Recommendation X.690"/>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2015" month="August"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-rats-architecture">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-architecture-22"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Dave Thaler" initials="D." surname="Thaler">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel Corporation</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="28" month="September" year="2022"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state.  This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims.  It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.
              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-reference-interaction-models">
          <front>
            <title>Reference Interaction Models for Remote Attestation Procedures</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-reference-interaction-models-07"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Michael Eckel" initials="M." surname="Eckel">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <date day="10" month="March" year="2023"/>
            <abstract>
              <t>   This document describes interaction models for remote attestation
   procedures (RATS).  Three conveying mechanisms -- Challenge/Response,
   Uni-Directional, and Streaming Remote Attestation -- are illustrated
   and defined.  Analogously, a general overview about the information
   elements typically used by corresponding conveyance protocols are
   highlighted.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.birkholz-scitt-receipts">
          <front>
            <title>Countersigning COSE Envelopes in Transparency Services</title>
            <seriesInfo name="Internet-Draft" value="draft-birkholz-scitt-receipts-02"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Maik Riechert" initials="M." surname="Riechert">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft</organization>
            </author>
            <date day="24" month="October" year="2022"/>
            <abstract>
              <t>   A transparent and authentic Transparent Registry service in support
   of a supply chain's integrity, transparency, and trust requires all
   peers that contribute to the Registry operations to be trustworthy
   and authentic.  In this document, a countersigning variant is
   specified that enables trust assertions on Merkle-tree based
   operations for global supply chain registries.  A generic procedure
   for producing payloads to be signed and validated is defined and
   leverages solutions and principles from the Concise Signing and
   Encryption (COSE) space.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC6896">
          <front>
            <title>SCS: KoanLogic's Secure Cookie Sessions for HTTP</title>
            <seriesInfo name="DOI" value="10.17487/RFC6896"/>
            <seriesInfo name="RFC" value="6896"/>
            <author fullname="S. Barbato" initials="S." surname="Barbato">
              <organization/>
            </author>
            <author fullname="S. Dorigotti" initials="S." surname="Dorigotti">
              <organization/>
            </author>
            <author fullname="T. Fossati" initials="T." role="editor" surname="Fossati">
              <organization/>
            </author>
            <date month="March" year="2013"/>
            <abstract>
              <t>This memo defines a generic URI and HTTP-header-friendly envelope for carrying symmetrically encrypted, authenticated, and origin-timestamped tokens.  It also describes one possible usage of such tokens via a simple protocol based on HTTP cookies.</t>
              <t>Secure Cookie Session (SCS) use cases cover a wide spectrum of applications, ranging from distribution of authorized content via HTTP (e.g., with out-of-band signed URIs) to securing browser sessions with diskless embedded devices (e.g., Small Office, Home Office (SOHO) routers) or web servers with high availability or load- balancing requirements that may want to delegate the handling of the application state to clients instead of using shared storage or forced peering.</t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="examples">
      <name>Examples</name>
      <t>The example in <xref target="fig-ex-1"/> shows an epoch marker with a cbor-epoch-id and no
bell veracity proof.</t>
      <figure anchor="fig-ex-1">
        <name>CBOR epoch id without bell veracity proof</name>
        <artwork type="CBOR-DIAG" align="center"><![CDATA[
[
  / cbor-epoch-id / [
    / 1996-12-19T16:39:57-08:00[America//Los_Angeles][u-ca=hebrew] /
    / etime / 1001({
        1: 851042397,
      -10: "America/Los_Angeles",
      -11: { "u-ca": "hebrew" }
    })
  ]
  / no bell veracity proof /
]
]]></artwork>
      </figure>
      <section anchor="classic-tstinfo">
        <name>RFC 3161 TSTInfo</name>
        <t>As a reference for the definition of TST-info-based-on-CBOR-time-tag the code block below depects the original layout of the TSTInfo structure from <xref target="RFC3161"/>.</t>
        <sourcecode type="ASN.1">
TSTInfo ::= SEQUENCE  {
   version                      INTEGER  { v1(1) },
   policy                       TSAPolicyId,
   messageImprint               MessageImprint,
     -- MUST have the same value as the similar field in
     -- TimeStampReq
   serialNumber                 INTEGER,
    -- Time-Stamping users MUST be ready to accommodate integers
    -- up to 160 bits.
   genTime                      GeneralizedTime,
   accuracy                     Accuracy                 OPTIONAL,
   ordering                     BOOLEAN             DEFAULT FALSE,
   nonce                        INTEGER                  OPTIONAL,
     -- MUST be present if the similar field was present
     -- in TimeStampReq.  In that case it MUST have the same value.
   tsa                          [0] GeneralName          OPTIONAL,
   extensions                   [1] IMPLICIT Extensions   OPTIONAL  }
</sourcecode>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAManD2QAA81c63LbyJX+j6fo0KlESgRK1G0sJs4MLdE2K5LsSHSyWZd3
qgk0SUQgwOAimWMrtQ+xD7A/9kl232SfZL9zTjcuFCVPslVJXFNjotGX0+d+
g33f92776sDziqiITV8Nl2kwVxc6uzFZ7unJJDO366NhGiR6gclhpqeFP4my
m3ka/+Bnush9Q1P9hUz19w68vNBJ+L2O0wQriqw0ns6M7qtrE5RZVKy8u1lf
XQ3G1+oPaXYTJTP1OkvLpXdz11ejpDBZYgr/jE7yvFuTlKbvKWUWOor7ik78
LjLFtJtmMwzPomJeTvpqXhTLvL+7K8/dIF3s0iyGcPdrUHteoIu+yovQC9Ik
N0le5hbyvJwsojyP0qRYLXGd0XD8yvN0WczTrO/5StDyxiQ36qXdH1ABtr56
lekymadTk6nr0RijDrcPXti7zbFL10H5XR4V3Wk1sxsaTMyLzBhAejU3UYIH
nedGfXOEN0EaAo6fHx/unxz9nJ6B574609kC1AgLnlEmRYbB1yZb6GRVAT+e
pwudq1dpnusiEuh1Ev2AhzTpq0G2UOfRIipMWIMqa7p2zXc4hlDePOX9b6sD
/mAi9U4nDi9vSn2HkbEJ5kkap7PI5PXGd1EcR3rRXeoEk76b81ze2+12qrO8
MIl6mdI1ql3fJ9Et+C8q/ue/CvUyMwtMGf/rqIG0l9EkjtJibm4w0lW9Cksy
u0Limb///ODoZBPKlFrOmat/eXjiH+73/P3ec//44GS/V98g0JP0u+KHiBnU
SwjKAqARD1+9Oj3oHfeAvuuBPB4dH+3jShfX8vj8uLeHx7Ozc3ne7+0dAmEX
g1N5Ptk7ofcv3175b0dnbuwIc07fXg/9N4PrN/7g/LXd7eTg4FAEzR9cnb7B
4PX47OSQIFHKl33494s+H35yeGLnHNdzsG9jDg7bx+PIP+uyeAWTNPOLaGH8
Qs8sZMPx6GLYmpTmRmaahFAc+oHJQJDToz068F+6x7gVH2JV0m/4ATskU0Ff
mqjCsctK/e+//4caXF92e4r3IwWSlbHJ+3bZ9dIE0TQKZGE6VS91HgVq6CZf
0WS19XJ4tb0DdkrSBHPj6r3dxc46xSwFfabOorzA2zLK5yZ8sNkZpvFCpxpk
E2ZN0WkMDY4Zm9iAnxdlYiHMiXfThFeEusD99/d6R/7ecx7JTQYBiYAJt+do
/N4fgxq8i0lCuSZjUZCosxnxu1OJd3d33agou1FS7GYm2B37V8NTX+Z7kUOx
cGhFM9aROgvmkPugKDMjqpeHHszLDDQUaGH8iK6qA4LIX4DUcW7XyYNdWWni
HAJYYHlgomWBqe3nhvZ/Wvn/NZreJAUJPTH68PxVX3XA1cU8yjue5/s+dDSp
1QCWZ4xBBcNXAseFCs00SkDoll1UUJta3emVKlJloGihYPI5hpLUsd40M/kc
CzFxkYJdsHWKhVGCWSE4KosmJTSryldQaovu+v6ZUTl0b6wzOqJDkgYhCW7y
DvMkvV9maVgG2IIGmltOVnSGCYnNqhN2FBSgPeWlieOuuubxHOO6UIz6W7MG
RpjSjdRc4w3AIATdNG5W5iQI2DfKVHqXqDIJsYqcABoHEhjsLdOddXfUbaQB
VpySxMEriFl7qAADN9tdiAqA0aFAScAsHSK1IqWhgbgmbDXWDZEiMXeKyS23
AQHzOXAEXJjizsAi6JhODaJlBKLmXaH5IgrD2HjeM5JUxiYd6nktzCQG2+Dy
jsMhmPBmTLwCcGSOMvPnMgI5tDvyIRZwpRppGICvcWtWmBrVeq4rfIf/7HVx
AC0MNCw9Lk+/Q9jeiJECw5UWOLMoCA+MKrADmAGQ4XajRM1MAnDjnRrcCmME
VgXtJo61MJtPwVwnszaclp1ZmqCfHmNougixjiY2XsZgH53fdEm4DK8Fwj5/
HiyXUGPRJzWgI2vVc38P9tUxiJjGBPkdxJ0hKtIl9HkT1h11N49A9oghiYrc
xGAZ/ErChh2Yp3dAWWxudVLssLxAhQKqTztYQmvXxBgeYF5YyXqMqjW6GAXs
1lph9v5BSsT7uysR759JiXh/byUCMcMNyP7JkcZGDLllsQyXXKZykQocFq+H
hIqjGyM8TgSyMNO9wOCwsY1XNLvSIBPREi56AuvVsq+2JjrL6PB5NJtDjvIV
/AZQmLAHUbI+OHwhe2tsT7OjBBoDdIumbN2LCNNjcEESrFRYChFxJtwnH74M
aYaacyy+LSdgF5ZdwgO8CbeyaYWUqD2rf0GH/AZkqDQvi+aE1MeNIanGE0Vq
EXhEpBvYSTags8xNCGT8YR5B9xDd2lOYsAxLromBUhGFJZiE9DpOBLsSLpgs
QgfBPsue5QvRx+BKnUVpmauO4DEKO4qCRoFEZJ9NiA7Ic0vJ16uxS6Cyls+t
DBLajAIlwgarELLy6kIP72sdbAKPfHEoV5/+vr8XdUdBTKXWLZANGDG8gOa8
xePaRlhOiFngCgBVrICYIxKPpQ4Mq09sO6Zg4LrQi6Uap0Qsd3GwKKBB5MPA
KDjMLhxAODQmVx8IjMFXd5mGQQgFxQiNAMutiUEUvs3F9f09jOTaKfDAscl2
W5fhxMa8ATvmYq0weSBefW3cSKesXeBdlhZpkMY0/x0Uy6Cw8gdeARbvaLdk
tkPhXIVAtUjzQjGB2RjfEo8yBcUC82o/p/2JseDe30YBGesxyTcwCyWSmUob
Ck86BEG6SvbG2WgkbRoSWdZYgkWKFpH5gfjSDJOQrqOjFymiYXg/MytDS13M
hfuI1ORYsLND4qAnUQy32UJJd90ha2rApORa3LKeodg6I0vG0pqZJeSd2IWM
/4x5H1fnmws3Fu7GdmXF60u9ilMdWnMS4KITEWV2wMhiszlt3ZWcitR6KOIl
GTp1R1i0NsFRHpR5Loq+XExwLA5shC1KIhXiPnEpNgjZJ9JiAs2k4R8xdkij
+nAxTNyg1kNVT3aXFFnEajU3Bc3ZIJK5xLLkeTBLUG6A5QB/syDQnQPYQOgK
dlfu0gw3dg5JW83urEMR56njUZ6aiqVkNzeIy5Dc2Q4RlxIlNDOddty2jGiy
Tw3n09BObAebo2CDMi7go4H7rk9H47FyER7dpB3zwefTeZ4GEbsbtcdHV1O0
YVn5pU3/w3v2DAExe+BE5lxdpnK4uJo3Bt5jmoGjOhfvr8edHflbXb7l31fD
370fXQ3P6Pf1m8H5efXDszOu37x9f35W/6pXnr69uBhenslijKrWkNe5GPyx
I+zeeftuPHp7OTjvVJqzYktWHsxNzIqQHPY7cw9cHMCiijp8efruv/+zdwis
/YSTQ70ToEsenve+OcQDmUE5LaXIQR6BrJVHOhUOYCTuS6CXERQCaKLJCpLD
RcIIRP7iA2HmY1/9ehIse4e/sQN04dagw1lrkHH2cOTBYkHihqENx1TYbI2v
YboN7+CPrWeH98Yg+0ctEuysiRbpTqdyHBFEr+hCWwuYs99CGkCTUmKJ+/zZ
PWEPsulsh8NIzxIYBoQtieVMwryzjbzu2ogCes5RkJhtJmUjQnot76zwI2IV
IRid5cLoHH400zZNl0rMSUIOaK2RsFTULCVIKvcY+oukCHGkOK1PhJkqg/Kj
WVMYDRfmQSGG8I5ujJgCzfrdBltNbZtbRUPrTawnaUZOUR0VsMoR47geTtSo
eyhKmkJG8ULFhxdtJigAaXI6OYY80A4MN5nwnccx1DptA5p3nNkkBZhXFnFh
dMIYILVYRNOVDS/qC7LK76rrVFwKbA6WgXc+T0MxABX9qtiM7ReD4jimt9c9
cFrxIQeApRshddfmOSp7dyH27vOzh7m7e2GqTdYxjktKlBUNCuQWGvF2Mziw
FrcVWFcuT7gBgHa2onBuBn5lZhMIfagqpUN/ngacewFn5s3wEDY5jg3Msi/R
V27qaToMM8NI1EXTsUYI1I7WQDmH42+6PRFTv5HPvL8HEGUCZosCKpC0A6AG
NAiQ/BDGKbBJYEth+E4lDocmmGRweHyykAvYSoRmnGwW/P1oCPcfgfDr8EFg
ygkpucoB+NGHHmw8tFJNNsS+dr6QV3nR6VKxn0Sy054ckXfGehOBq7aJHw0L
pUNSIxhccfIqsQ4LENp2UhQ0SVmseQnidDnnEnLwF/yRYkszRaxeqA+eUj8t
9Aw+nc0eR1T7+hb2OY59d5TPR3kfPe9X9fFWCmmit2E2Nqd42SyWxerXn3lP
Ua5+Q7n6zo1Sv6ISVEyZBzUcjIk7TqGdIvDy0E55bAvxubDBHO77tIzhDNAO
jMnB1eH1SJ3GOlrkvL7lgmFNy0nz7mEunwLyhdrq9VXn3flwcD1EXPdqdDns
bG9aYoHCgv0NC9pQYNLBhknAtaOI9ZIRNBiyjqT7N7ny3jol1e4LJdUoR9pN
M54dd/ePT57vbQUxHFLKlfjZNKDyHWLYsU+BxvZTC3tbbpo/gXMe+rg/l8dc
tezJ1ftbrAb8hIzRkzMPmjP9GPL95PTDLVIAQRGvIKtwRaj25XOd02RPLjza
IioaMp4OKpIf73NfPZtGs1aVxQ/CEOKWUTBy4+sYcdiLTmymRcdzRb4XnZbE
s32NiGide3bmW2/f2XjQ5lMX4CxyJkzuNIONn+A2O0PtQkgODZ6JMqHIXo31
DIqPiABm4mHzqSD2kfBUFfS+t7fX266UC2RnUiZh7AISSs0CAdj62piG43ZQ
OW5SA4X7RgE36YMtyrxs45rwrmA+a/XUgsBjCMS3bOmnFrtaBaX4EvTjW4GH
NBGPKSYa3WHr8y/UFtX9ClB9W734DXTg6n6bytIiuTSudtVE/sJMISqb/Wka
x+kdKVrn/8Jd0aAK8G/jZvaXWrAt9LJrwYCF7qtBsoZfyfE0fF/JCzWx1rXw
yQZwmKBDoRcQv7BNnKzgIhIX4zd76NgMZ2RaXHNYow22f4MPs5Ub88BwbTuG
cVJPVW9FYk9JGK5Iw1WCq1NpA6sfwLbNlNbnz1xgBQu43I1LfiFmELaxC/2C
TP00bXBLrFfgjzYHPKqFQEXCSP4VyjGpHt+EdCkOfHwGE2PMCXWLUshfrmdG
ctQsW+1E26rh2+vq+s2ZkiBsZ7YaAlsh0/ZNPEaBqU6CFfD/4d+iPC/Nx/9f
M9Aub5Lv9p7XO/bViP6WogW7jX3B9Fd0PBcPDGSfPDrSI5SigASQraIUtsO2
V2NHuIVygJRepMpinQtkZcGpvqrCVHPI10B5ocjf+NkWd8lACvpqjzXCbY+H
l+QjrjDa49GUPZ6fbVkijxZLyFuB1/v8+qI1zDOpUUHHl5JT66sDnkdiNzMZ
TzBM+b465Ddwh6ZRTLbGqrFvMSXNKHDAbfvqiGdN0jRWXagKTY7DVMe5myoa
rK+O186hd0Wu8eYbfvNaQopLzYf8Qv30pxbFQ1JLXKbxwDu3PSCo53kp61dS
n73e1oS15q487suj57XvbrXxXOfzQUyACz7o+fes6vqsXUk5t6/c0NL0eKGX
2579YWnVI/j/UqHHf97CG4JvyXDRrRgQ1u64zIMptF9zDu7bQMugKMjp3Wqi
akxMxnfZaQ67G1EZYbu5B2FB/VKt7/rxrzcnX2NjMTCf+7dcdbj3LDv3rXay
jGDNTA/K9nTaVXbSTsNY73cPES+RwRatDPKwBPTZ5jiL9HZ0BqFMJ3+ispUN
4iNsL15Cr0cuOVhju852O1nFrj/P7Z5SzLT5ZI598kLU7p3Oq3qFhVWWbALV
q0BtS2UNcqsJDIDTwPdvwIrfv4q40kvRVBU/ESTEp0rHM1LY84XXuKLN0MsM
QaclUV3BoIhSF+XCgt4Ga8d7CttNdSEXQIyM+HyNgqQgZ0ld4cRyrpNrLvZD
J4cVMgWI1sZPE5wVkmMcFkldbCLSnOJzKvxSnr1owWIvPjMJ7fXkjYfWmIm3
0vCI1ryfHde0IAeJzge7kabYqcTfwzYiUZQJ8fkKnQlXAbBnhwyPs55iPygF
3qv2ppF3aR59svfm0isx8xReMzwP2ZA9/lB1dBBAkwSrR7b1n1ftFxZycTcW
+lO0KKkrVBOgxCwIGkUjVYkhIXPryo172ARrpcgg/dguyis8cHo2yvkA5xQC
pryqKOetNAE4Ow7d9bCZuhj8UcogQZpw5jNNDGdh0qxmRdrQXXEBCRIUUGtp
ubTFKJ2tWu0xH/6tmPY+dsmFoB/gb6f9ysRytNt9K+qa7g6YK2IvYZuPU7MU
WLSB2YM6XFMBOptJjEzm0jTaXnDc3dxw8rXiZis1DXmyBTbeiHo8uNvGY/2r
Ukl4tkjyKGIJR2nOtW6215a2uddhy92x0uIgflo6bQjARsjuZIJ56hSX2H8m
QFRfx6b40swexbMa53gPz4GzQKdQkTKZxQZOZwFaNixZbvVmDWyv17VJ+qM9
KsFI3lf83DnZf+pBshnfCl5dZXgbigOHP42FDe6KaEuuVuQp3NFCbTVi0O5J
o0Swze0GLBtG1gv/OEAoYPJsvKmoZmYkX0723VQHKqkdcQcJpWW5HoQllLlM
6nk2Oe6tN7wwRex9602fvjaFABec17hkOovD38h0UGp6tRSvesdF5JI4dGVd
KoCVwsMI1tUocen9AlA8KMnusOTLaVYgmn1QwCOfTsUN6jwpF7yG7ZAgc1E5
6kCg7MMgyOnc7e7AdX1F0hknc4Fy0jlWutjJx76X7lq0EmA0cbLWxZS3ooFf
NadS1szxt8UUIwZCU13KdfJ5DST/DQkC1vuNHWxc2Rj6sVE9gOOiQZbGrr9Q
qsC2/XE96ucKT1WhWVZ9nLbTkmo6JWfe2Ufhtru6uG7Vx8biSdVAD0kncXLl
aSG6zQhVhTOu5zxgYP8cvPSQizlfB1YeKPpBkPIwBY3JZp7rsuWqOJArjMyE
FU9wAsHudul2gwxyA1e8WmNFXlu/b2/TFADe0vIs0+dPRAtRr5hBGCSKrtqZ
OwcodrxN41tycpm/M8PtfY+Brtvc+whbM1KFt9fQt4Qms/f9cZzOhLBBTJN9
vxbAfJ3deWfL84LngCX7Cf7PHxGAJ9n/n4Dr1ZComTygpqukswzzB1ZBSR8c
rIGrNwHcVYMcHr0thjU6kzfNbiWcBI7Kz3xAbNuwTd3FC+vqOm/HtS2qnBtj
+PbcZBxNbUuiU8s0G9YRvlnGyEnItJQJX/crAFglcW3T8erCpeOZa0fS1MMt
P9YJFO3xMH3P+sMNq0Vrm6jexvqStvnaeZbOHEathGxdOJtIe00tgY+XDyA+
5Y8zEE/sYQXo8Rkuq/zAjf6bjMYGqfnHCY65ewoz4gIv6DLwTaiVl9A111bQ
NGtjU3GVrdWopv+0VsG55y4Y7dqC9a2OYj2BhrRNia5AzB3IZdjq/4B0cJpg
W9kO2SL1boxZKgQpPgkLTbI+OovWMqWmuxxsSe2HUqjFWQuK1AbUlGS/kboV
uUq9MneZhlUSzDPggghMoJHhYDGU9l1dNzRT6OQCNZtWoTyGZ82QMw9VaBOk
OsuNP8s0c36zwVf8YG6dZzarsrCe7foFQjNTuDjzTjfc0AXxpO2dF4ArVqN8
priXHrfQ5JZruTGXA7V6AU12t9G3aRSK9PCXKFQqsGj2Orm0bOOx2xFl0KIz
R0lpVlh1NUlvTdVtzHbbfcummzkBCUu9Zquwyw1t46pxCkMVcYcgrhst6i5G
kEKTeO3wt3CGc9+umc9bI5btozYxfSXIAbjtc6FeIc2t4jcmWVNA7ctJ/pXS
L1xOwG8qQIzpc0T2Wrt59INRB/uUga1mUb4TM39vk4dSQbFTKR/+W7ManT0c
HrsG1j7xc/TJt8nZdzq0k71tSiS6VzbHSyW47b8+Fbp+Uw5D+83Y3/t9nf10
eX0XY1ZXNXXiqQoCCFabWxG9wjEd9Mrep70e0C33x67pUnNSrs4LWvbXQZbm
Vp0LxzJvuxIWSY3LD9k2Oo9oCl/S0Qfnj4qvVEj4JqMzSS80urC8ZsTbk+6n
b69enR4/PznmALKmFC7hkpY8sLG/NCgzbsIXTm9grEq/0cVYOjhJL7Az0lhP
Sea5Lt0SQ+DgH0yWVtmkpQ6FR3aqxsKFtl97VKS2GsQ1MLOiAfdhS8fVnnwQ
TKaG/qamz111/Wbg7x8dK4tiKLdbk9U1I8mJRnn1JVQtLi3uONj3heXFEeVe
MffVPrWe1B9cUC3+7dlbbiYbXA7WXlp7E+lEk1znXJzLpoEJyeONwbsfH47w
B8ZqGEZFmkG+Yu5pti9x25/R95p0W0czzObvXes2bm5Do01Ig1D/CX1qNJeg
RSyjuoSRlWYAPWuDyV8yY5CsIt2IoxTOXdivNmL63kjseEOCaYnT7p1q5w7W
zih6WoFTf0L7desD7imNS61wsISNr9qsexHUPCeiWUEB0f/C/Qtf1Bm5LyP6
wO4LCCTik+N33WH3BXN9X63/D6Pc1oJHofSX1pcYjUorF1q/APGbit33hO6a
Jm7bHhZQVvVLo35rP99a3zlvQN0+Q8q5j5ywj+kPchIY05XgtD7Zku/l+LOX
pUYUEURLTY2tE26/sB8XcJrGfWHAu5BRJH3cWFOB2UxCPQLkAQHEOcMvjdi0
GSdu2ExyAY/seIgVpdz0R3v61SEbQoZHjjlqAL6ukurd2k7kg62oI6iYxLVE
qWYHkGv/aQkiNf3Ql7gTHdxw66BrqP78rOqmth+NyqP0HHLf0Se/h2Oph73x
SYxt5XPedqtFhZRDknJ33lrbYOVnEPOejQavPXItdtfW70r7Df7unZwc+719
v3cy7h33D076R9/4e8/7e3sfBgtD39ft7p6n+feDZEYI+/ih9AP9Ym4mmbn7
qHbtJlIM3lXSr2O/8Veq11fPj3p7h/sHJ9/s2FGf/nWIjtu7sXWnnoF1n1WH
TupgrhzWUff8/p7+iYKPfKUkVRsQAKA+rrV1Ab3rnVyBIfZq9nJJF5P7eoWw
Tv1NGw6w3V3Nnhrb0LHeDQODRxap+qcFKs+ibhVjQ/aVcrGkfOGmTti3B0jp
naKGwcC6w2kWzaKEP22kpptGGXrtiysO5KsmHssp/M9QeG5yv/9CXQ9/9354
eTpUXMKvvLKNf0aX4+Hr4RWmqtveVm9b3TMdbdF48x8c/47fj0KevNag0f5z
sVaQFR7xxXGRL3Hdt49VX5Z4b/K5sLhdUVItJL+Be3euzJ89+69TVE0fj1xP
jrWL5cs6m+RFHOf8TuiucLX+caQN7XO3QbmkGb3jPTWJ6MNbjNrK62Zc2SIO
/KdQyrMYc7XMjQsGj710n5DwFlWXyqY/L9++PR8OLltjZ8NXg/fnY/VqcH49
5C1EpT7yp2KLJ6GoCTmhFIZ8ahdNN9BPmgx4QrUQ+rNJS/JnE2cRqV2ueJRH
GO3UYfPonw97H5v1s0fgb9SXNmzR+6hGF+/OR6ejsRo2Z7o9oM1sRPUMZLtJ
0rvYhDP5+gvaq0zELTQhGY6XZ97/AdSjIub4SgAA

-->

</rfc>
