<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.13 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc tocdepth="4"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>

<rfc ipr="trust200902" docName="draft-fedorkow-rats-network-device-attestation-02" category="info">

  <front>
    <title abbrev="Network Device Remote Integrity Verification">Network Device Remote Integrity Verification</title>

    <author initials="G.C." surname="Fedorkow" fullname="Guy Fedorkow" role="editor">
      <organization>Juniper Networks, Inc.</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <region></region>
          <code></code>
          <country>US</country>
        </postal>
        <phone></phone>
        <email>gfedorkow@juniper.net</email>
      </address>
    </author>
    <author initials="J." surname="Fitzgerald-McKay" fullname="Jessica Fitzgerald-McKay">
      <organization>National Security Agency</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <region></region>
          <code></code>
          <country>US</country>
        </postal>
        <phone></phone>
        <email>jmfitz2@nsa.gov</email>
      </address>
    </author>

    <date year="2020" month="February"/>

    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes a workflow for remote attestation of integrity of network devices.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>There are many aspects to consider in fielding a trusted computing device,
from operating systems to applications.  Mechanisms to prove that
a device installed at a customer’s site is authentic (i.e., not counterfeit) and has
been configured with authorized software, all as part of a trusted supply chain, is one
of those aspects that’s easily overlooked.</t>

<t>Attestation is defined here as the process of creating, conveying and appraising
assertions about Platform trustworthiness characteristics, including supply chain trust,
identity, platform provenance, software configuration, hardware configuration, platform
composition, compliance to test suites, functional and assurance evaluations,
etc.</t>

<t>The supply chain itself has many elements, from validating suppliers of electronic
components, to ensuring that shipping procedures protect against tampering
through many stages of distribution and warehousing.  One element that helps
maintain the integrity of the supply chain after manufacturing is Attestation,
by assuring an administrator that the software that was launched when the device
was started is the same as the software that the device vendor initially shipped.</t>

<t>Within the Trusted Computing Group context, attestation is the process by
which an independent Verifier can obtain cryptographic proof as to the identity
of the device in question, evidence of the integrity of software loaded on
that device when it started up, and then verify that what’s there is what’s
supposed to be there.  For networking equipment, a verifier capability can
be embedded in a Network Management Station (NMS), a posture collection server,
or other network analytics tool (such as a software asset management solution,
or a threat detection and mitigation tool, etc.). While informally referred
to as attestation, this document focuses on a subset defined here as Remote
Integrity Verification (RIV).  RIV takes a network equipment centric perspective
that includes a set of protocols and procedures for determining whether a
particular device was launched with untampered software, starting from Roots
of Trust.  While there are many ways to accomplish attestation, RIV sets
out a specific set of protocols and tools that work in environments commonly
found in Networking Equipment.  RIV does not cover other platform characteristics
that could be attested, although it does provide evidence of a secure infrastructure
to increase the level of trust in other platform characteristics attested
by other means.</t>

<t>This profile outlines the RIV problem, and then identifies elements that
are necessary to get the complete attestation procedure working in a scalable
solution using commercial products.</t>

<t>This document focuses primarily on software integrity verification using
the Trusted Platform Module (TPM) to ensure a trustworthy result.</t>

<t>The integrity of attestation information must be protected by means of cryptographic
techniques, to assure its validity.
It’s important to note that TCG technologies are available to use either symmetric
key encryption with shared keys, or public key cryptography using private/public key pairs.
The two techniques can each produce secure results, but do require different provisioning mechanisms.
The RIV document currently focuses on asymmetric keying approaches only; future work might
include techniques for attestation using symmetric keys.</t>

<section anchor="requirements-language" title="Requirements Language">
<t>This document is non-normative; the document does not define protocols,
but rather identifies existing protocols that can be used together to achieve the
goals above, and in some cases, highlights gaps in existing protocols.</t>

</section>
<section anchor="goals" title="Goals">

<t>Attestation requires two interlocking services on the device:</t>

<t><list style="symbols">
  <t>Platform Identity, the mechanism providing trusted identity, can reassure network
managers that the specific devices they ordered from authorized manufacturers for
attachment to their network are those that were installed, and that they continue to
be present in their network. As part of the mechanism for Platform Identity,
cryptographic proof of the identity of the manufacturer is also provided.</t>
  <t>Software Measurement is the mechanism that reports the state of mutable software components
on the device, and can assure network managers that they have known, untampered
software configured to run in their network.</t>
</list></t>

<t>As a part of a trusted supply chain, the RIV attestation workflow outlined in this document is intended to meet the following high-level goals:</t>

<t><list style="symbols">
  <t>Provable Device Identity - The ability to identify a device using a cryptographic
identifier is a critical prerequisite to software inventory attestation.</t>
  <t>Software Inventory - A key goal is to identify the software release installed
on the device, and to provide evidence of its integrity.</t>
  <t>Verifiability - Verification of software and configuration of the device shows
that the software that’s supposed to be installed on  there actually has
been launched.  Verification  against reference
manifests signed by the supplier of the software provides assurance that the
software is free of unauthorized modification.</t>
</list></t>

</section>
<section anchor="description-of-remote-integrity-verification-riv" title="Description of Remote Integrity Verification (RIV)">

<t>RIV is a procedure that assures a network operator that the equipment on
their network can be reliably identified, and that untampered software of
a known version is installed on each endpoint. In this context, endpoint
might include the conventional connected devices like servers and laptops, but also
connected devices that make up the network equipment itself, such as routers,
switches and firewalls.</t>

<t>RIV can be viewed as a link in a trusted supply chain that ensures that devices launch
software without unauthorized modification, and includes three major processes:</t>

<t><list style="numbers">
  <t>Creation of Evidence is the process whereby an endpoint generates cryptographic
  proof (evidence) of claims about platform properties. In particular, the
  platform identity and its software configuration are of critical importance</t>
</list></t>

<t><list style="symbols">
  <t>Platform Identity refers to the mechanism assuring the
attestation relying party (typically a network administrator)
of the identity of devices that make up their network,
and that their manufacturers are known.</t>
  <t>Software used to boot a platform can be described as a chain
of measurements, started by a Root of Trust for Measurement,
that normally ends when the system software is loaded.
A measurement signifies the identity, integrity and version of each
software component registered with the TPM, so that the
subsequent appraisal stage can determine if the software
installed is authentic, up-to-date, and free of tampering.</t>
</list></t>

<t>Clearly the
  second part of the problem, attesting the state of mutable components
  of a given device, is of little value without
  reliable identification of the device in question.  By the
  same token, unambiguous identity of a device is necessary,
  but is insufficient to assure the operator of the provenance
  of the device through the supply chain, or that the device is
  configured to behave properly.</t>

<t><list style="numbers">
  <t>Conveyance of Evidence is the process of reliably transporting evidence from
  the point in a connected device where a measurement is stored to an
  appraiser/verifier, e.g. a management station. The transport
  is typically carried out via a management network. The channel must provide
  integrity and authenticity, and, in some use cases, may also require confidentiality.</t>
  <t>Appraisal of Evidence is the process of verifying the evidence received by
  a verifier/appraiser from a device, and using verified evidence to inform
  decision making. In this context, verification means comparing the device
  measurements reported as evidence with the configuration expected by the
  system administrator. This step can work only when there is a way to express
  what should be there, often referred to as golden measurements, or Reference
  Integrity Measurements, representing the intended configured state of the
  connected device.</t>
</list></t>

<t>An implementation of RIV requires three technologies</t>

<t><list style="numbers">
  <t>Identity: Platform identity can be based on IEEE 802.1AR Device Identity <xref target="IEEE-802-1AR"/>,
coupled with careful supply-chain management by the manufacturer.  The
DevID certificate contains a statement by the manufacturer that establishes
the provenance of the device as it left the factory.  Some applications with
a more-complex post-manufacture supply chain (e.g. Value Added Resellers),
or with different privacy concerns, may want to use an alternate mechanism for platform
authentication based on TCG Platform Certificates <xref target="Platform-Certificates"/>.
RIV currently relies on asymmetric keying for identity; alternate approaches
might use symmetric keys.</t>
  <t>Platform Attestation provides evidence of configuration of software elements
throughout the product lifecycle.  This form of attestation can be implemented
with TPM PCR, Quote and log mechanisms, which provide an authenticated mechanism
to report what software actually starts up on the device each time it reboots.</t>
  <t>Reference Integrity Measurements must be conveyed from the software authority
(often the manufacturer for embedded systems) to the system in which verification
will take place</t>
</list></t>

<t>Service Providers benefit from a trustworthy attestation mechanism that provides
assurance that their network comprises authentic equipment, and has loaded software
free of known vulnerabilities and unauthorized tampering.</t>

</section>
<section anchor="solution-requirements" title="Solution Requirements">

<t>The RIV attestation solution must meet a number of requirements to make it simple
to deploy at scale.</t>

<t><list style="numbers">
  <t>Easy to Use - This solution should work “out of the box” as far as possible,
that is, with the fewest possible steps needed at the end-user’s site.  Eliminate
complicated databases or provisioning steps that would have to be executed
by the owner of a new device. Network equipment is often required to “self-configure”,
to reliably reach out without manual intervention to prove its identity and
operating posture, then download its own configuration. See <xref target="RFC8572"/> for an
example of Secure Zero Touch Provisioning.</t>
  <t>Multi-Vendor - This solution should identify standards-based interfaces that
allow attestation to work with attestation-capable devices and verifiers
supplied by different vendors in one network.</t>
  <t>Scalable - The solution must not depend on choke points that limit the number
of endpoints that could be evaluated in one network domain.</t>
  <t>Extensible - A network equipment attestation solution needs to expand over
time as new features are added. The solution must allow new features to be
added easily, providing for a smooth transition and allowing newer and older
architectural components to continue to work together. Further, a network
equipment attestation solution and the specifications referenced here must
define safe extensibility mechanisms that enable innovation without breaking
interoperability.</t>
  <t>Efficient - A network equipment attestation solution should, to the greatest
extent feasible, continuously monitor the health and posture status of network
devices. Posture measurements should be updated in real-time as changes to
device posture occur and should be published to remote integrity validators.
Validation reports should also be shared with their relying parties (for
example, network administrators, or network analytics that rely on these
reports for posture assessment) as soon as they are available.</t>
</list></t>

</section>
<section anchor="scope" title="Scope">

<t>Remote Attestation is a very general problem that could apply to most network-connected computing devices.  However, this document includes several assumptions that limit the scope to Network Equipment (e.g. routers, switches and firewalls):</t>

<t><list style="symbols">
  <t>This solution is for use in non-privacy-preserving applications (for example,
networking, Industrial IoT), avoiding the need for a Privacy Certificate
Authority for attestation keys <xref target="AIK-Enrollment"/> or TCG Platform
Certificates <xref target="Platform-Certificates"/></t>
  <t>This document applies primarily to “embedded” applications, where the device
manufacturer ships the software image for the device.</t>
  <t>This document assumes network protocols that are common in networking equipment,
but not generally used in other applications.  Other applications (such as Industrial
IoT) would replace YANG/Netconf with a protocol suite more commonly used in
that environment.  Similarly, the same information flow would be used in Network
Endpoint Assessment <xref target="RFC5209"/>, mapped to NEA protocols.</t>
  <t>The approach outlined in this document assumes the use of TPM 1.2 or TPM 2.0.  Other
roots of trust could be used with the same information flow, although different
data structures would likely be called for.</t>
</list></t>

<section anchor="out-of-scope" title="Out of Scope">

<t><list style="symbols">
  <t>Run-Time Attestation: Run-time attestation of Linux or other multi-threaded
operating system processes considerably expands the scope of the problem.
Many researchers are working on that problem, but this document defers the
run-time attestation problem.</t>
  <t>Multi-Vendor Embedded Systems: Additional coordination would be needed for
devices that themselves comprise hardware and software from multiple vendors,
integrated by the end user.  Although currently out of scope for RIV, Trusted
Computing Group specifications do
encompass attestation of multi-vendor endpoint computing devices.</t>
  <t>Processor Sleep Modes: Network equipment typically does not “sleep”, so
sleep and hibernate modes are not considered.  Although out of scope
for RIV, Trusted Computing Group specifications do encompass sleep and hibernate
states.</t>
  <t>Virtualization and Containerization:  These technologies are increasingly
used in Network equipment, but are not considered in this revision of the
document.</t>
</list></t>

</section>
<section anchor="why-remote-integrity-verification" title="Why Remote Integrity Verification?">

<t>Remote Integrity Verification can go a long way to solving the “Lying Endpoint”
problem, in which malicious software on an endpoint may both subvert the
intended function, and also prevent the endpoint from reporting its compromised
status.  Man-in-the Middle attacks are also made more difficult through a
strong focus on device identity</t>

<t>Attestation data can be used for asset management, vulnerability and compliance
assessment, plus configuration management.</t>

</section>
<section anchor="network-device-attestation-challenges" title="Network Device Attestation Challenges">

<t>There have been demonstrations of attestation using TPMs for years, accompanied
by compelling security reasons for adopting attestation. Despite this, the
technology has not been widely adopted, in part, due to the difficulties
in deploying TPM-based attestation. Some of those difficulties are:</t>

<t><list style="symbols">
  <t>Standardizing device identity. Creating and using unique device identifiers
is difficult, especially in a privacy-sensitive environment.  But attestation
is of limited value if the operator is unable to determine which devices
pass attestation validation tests, and which fail. This problem is substantially
simplified for infrastructure devices like network equipment, where identity
can be explicitly coded using IEEE 802.1AR, but doing so relies on adoption
of 802.1AR <xref target="IEEE-802-1AR"/> by manufacturers and hardware system integrators.</t>
  <t>Standardizing attestation representations and conveyance. Interoperable remote
attestation has a fundamental dependence on vendors agreeing to a limited
set of network protocols commonly used in existing network equipment for
communicating attestation data. Network device
vendors will be slow to adopt the changes necessary to implement remote
attestation without a fully-realized plan for deployment.</t>
  <t>Interoperability. Networking equipment operates in a fundamentally multi-vendor
environment, putting additional emphasis on the need for standardized procedures
and protocols.</t>
  <t>Attestation evidence is complex. Operating systems used in larger embedded
devices are often multi-threaded, so the order of completion for individual
processes is non-deterministic.  While the hash of a specific component is
stable, once extended into a PCR, the resulting values are dependent on the
(non-deterministic) ordering of events, so there will never be a single known-good
value for some PCRs.  Careful analysis of event logs can provide proof that
the expected modules loaded, but it’s much more complicated than simply comparing
reported and expected digests, as collected in TPM Platform Configuration
Registers (PCRs).</t>
  <t>Software configurations can have seemingly infinite variability.  This problem
is nearly intractable on PC and Server equipment, where end users have unending
needs for customization and new applications.  However, embedded systems,
like networking equipment, are often simpler, in that there are fewer variations
and releases, with vendors typically offering fewer options for mixing and
matching.</t>
  <t>Standards-based mechanisms to encode and distribute Reference Integrity
Measurements, (i.e., expected values) are still in development.</t>
  <t>Software updates can be complex.  Even the most organized network operator
may have many different releases in their network at any given time, with
the result that there’s never a single digest or fingerprint that indicates
the software is “correct”; digests formed by hashing software modules on
a device can only show the correct combination of versions for a specific
device at a specific time.</t>
</list></t>

<t>None of these issues are insurmountable, but together, they’ve made deployment
of attestation a major challenge.  The intent of this document is to outline
an attestation profile that’s simple enough to deploy, while yielding enough
security to be useful.</t>

</section>
<section anchor="why-is-os-attestation-different" title="Why is OS Attestation Different?">

<t>Even in embedded systems, adding Attestation at the OS level (e.g. Linux
IMA, Integrity Measurement Architecture <xref target="IMA"/>) increases the number of objects to
be attested by one or two orders of
magnitude, involves software that’s updated and changed frequently, and introduces
processes that begin in unpredictable order.</t>

<t>TCG and others (including the Linux community) are working on methods and
procedures for attesting the operating system and application software, but
standardization is still in process.</t>

</section>
</section>
</section>
<section anchor="solution-outline" title="Solution Outline">

<section anchor="riv-software-configuration-attestation-using-tpm" title="RIV Software Configuration Attestation using TPM">

<t>RIV Attestation is a process for determining the identity of software running
on a specifically-identified device.  Remote Attestation is broken into two
phases, shown in Figure 1:</t>

<t><list style="symbols">
  <t>During system startup, measurements (i.e., digests computed as fingerprints
of files) are extended, or cryptographically folded, into the TPM.  Entries
are also added to an informational log.  The measurement process generally
follows the Chain of Trust model used in Measured Boot, where each stage
of the system measures the next one, and extends its measurement into the TPM,
before launching it.</t>
  <t>Once the device is running and has operational network connectivity, a separate,
trusted server (called a Verifier in this document) can interrogate the network
device to retrieve the logs and a copy of the digests collected by hashing
each software object, signed by an attestation private key known only to
the TPM.</t>
</list></t>

<t>The result is that the Verifier can verify the device’s identity by checking
the certificate containing the TPM’s attestation public key, and can
validate the software that was launched by comparing digests in the log with
known-good values, and verifying their correctness by comparing with the
signed digests from the TPM.</t>

<t>It should be noted that attestation and identity are inextricably linked;
signed evidence that a particular version of software was loaded is of little
value without cryptographic proof of the identity of the device producing
the evidence.</t>

<figure title="RIV Attestation Model" anchor="RIV-Attestation-Model"><artwork align="left"><![CDATA[
    +-------------------------------------------------------+
    | +--------+    +--------+   +--------+    +---------+  |
    | | BIOS   |--->| Loader |-->| Kernel |--->|Userland |  |
    | +--------+    +--------+   +--------+    +---------+  |
    |     |            |           |                        |
    |     |            |           |                        |
    |     +------------+-----------+-+                      |
    |                        Step 1  |                      |
    |                                V                      |
    |                            +--------+                 |
    |                            |  TPM   |                 |
    |                            +--------+                 |
    |   Router                       |                      |
    +--------------------------------|----------------------+
                                     |
                                     |  Step 2
                                     |    +-----------+
                                     +--->| Verifier  |
                                          +-----------+

    Reset---------------flow-of-time-during-boot--...------->
]]></artwork></figure>

<t>In Step 1, measurements are “extended” into the TPM as processes start. In
Step 2, signed PCR digests are retrieved from the TPM for off-box analysis
after the system is operational.</t>

<section anchor="what-does-riv-attest" title="What Does RIV Attest?">

<t>TPM attestation is strongly focused around Platform Configuration Registers (PCRs), but those registers are only vehicles for certifying attestation evidence.  The evidence itself is conveyed in log files (xref) which give the name and hash of each object to be attested.  These hashes are also extended into PCRs, where they can be retrieved in the form of a quote signed by a key known only to the TPM (xref).  The use of multiple PCRs serves only to provide some independence between different classes of object, so that one class of objects can be updated without changing the extended hash for other classes.  Although PCRs can be used for any purpose, this section outlines the objects that are conventionally attested with a TPM.</t>

<t>In general, PCRs are organized to independently attest three classes of object:</t>

<t><list style="symbols">
  <t>Code, i.e., instructions to be executed by a CPU.  To maintain a chain of trust, it’s important to measure every bit of code that’s run outside the root of trust.</t>
  <t>Configuration - Many devices offer numerous options controlled by non-volatile configuration variables which can impact the device’s security posture.  These settings may have vendor defaults, but often can be changed by administrators, who may want to verify via attestation that the settings they intend are still in place.</t>
  <t>Keys - Administrators may wish to verify via attestation that keys outside the Root of Trust have not be subject to unauthorized tampering.  (By definition, keys inside the root of trust can’t be verified independently)</t>
</list></t>

<t>The TCG PC Client Platform Firmware Profile Specification <xref target="PC-Client-BIOS-TPM-2.0"/> gives considerable detail on what is to be measured during the boot phase of a platform boot using a UEFI BOIS (www.uefi.org), but the goal is simply to measure every bit of code executed in the process of starting the device, along with any configuration information related to security posture.  Table XX summarizes the functions that are measured, and how they are allocated to PCRs.  It’s important to note that each PCR may contain results from dozens (or even thousands) of individual measurements.</t>

<figure title="Attested Objects" anchor="Attested-Objects"><artwork align="left"><![CDATA[
+------------------------------------------------------------------+
|                                            |   Allocated PCR #   |
| Function                                   | Code | Configuration|
--------------------------------------------------------------------
| BIOS Static Root of Trust, plus embedded   |  0   |    1         |
| Option ROMs and drivers                    |      |              |
--------------------------------------------------------------------
| Pluggable Option ROMs to initialize and    |  2   |    3         |
| configure add-in devices                   |      |              |
--------------------------------------------------------------------
| Boot Manager code and configuration (UEFI  |  4   |    5         |
| uses a separate module to implement        |      |              |
| policies for selecting among a variety of  |      |              |
| potential boot devices).  This PCR records |      |              |
| boot attempts, and identifies what         |      |              |
| resources were used to boot the OS.        |      |              |
--------------------------------------------------------------------
| Vendor Specific Measurements               |  6   |    6         |
--------------------------------------------------------------------
| Secure Boot Policy.  This PCR records keys |      |    7         |
| and configuration used to validate the OS  |      |              |
| loader                                     |      |              |
--------------------------------------------------------------------
| OS Loader (e.g GRUB2 for Linux)            |  8   |    9         |
--------------------------------------------------------------------
| Reserved for OS (e.g. Linux IMA)           |  10  |    10        |
+------------------------------------------------------------------+
]]></artwork></figure>

</section>
</section>
<section anchor="riv-keying" title="RIV Keying">

<t>TPM 1.2 and TPM 2.0 have a variety of rules separating the functions of identity
and attestation, allowing for use-cases where software configuration must
be attested, but privacy must be maintained.</t>

<t>To accommodate these rules, enforced inside the TPM, in an environment where
device privacy is not
normally a requirement, the TCG Guidance for Securing Network Equipment
<xref target="NetEq"/> suggests using separate keys for Identity (i.e., DevID) and
Attestation (i.e., signing a quote of the contents of the PCRs), but
provisioning an Initial Attestation
Key (IAK) and x.509 certificate that parallels the IDevID, with the same
device ID information as the IDevID certificate (i.e., the same Subject Name
and Subject Alt Name, even though the key pairs are different).  This allows
a quote from the device, signed by the IAK, to be linked directly to the
device that provided it, by examining the corresponding IAK certificate.</t>

<t>Inclusion of an IAK by a vendor does not preclude a mechanism whereby an
Administrator can define Local Attestation Keys (LAKs) if desired.</t>

</section>
<section anchor="riv-information-flow" title="RIV Information Flow">

<t>RIV workflow for networking equipment is organized around a simple use-case,
where a network operator wishes to verify the integrity of software installed
in specific, fielded devices.  This use-case implies several components:</t>

<t><list style="numbers">
  <t>A Device (e.g. a router or other embedded device, also known as an Attester)
  somewhere and the network operator wants to examine its boot state.</t>
  <t>A Verifier (which might be a network management station) somewhere separate
  from the Device that will retrieve the information and analyze it to pass
  judgment on the security posture of the device.</t>
  <t>A Relying Party, which has access to the Verifier to request attestation
  and to act on results.  Interaction between the Relying Party and the
  Verifier is considered out of scope for RIV.</t>
  <t>Signed Reference Integrity Manifests (RIMs)
  (containing “golden measurements”, or Reference Integrity Measurements) can
  either be created by the device manufacturer
  and shipped along with the device as part of its software image, or alternatively,
  could be obtained a number of other ways (direct to the verifier from the
  manufacturer, from a third party, from the owner’s observation of what’s
  thought to be a “known good system”, etc.).  Retrieving RIMs from the device
  itself allows attestation to be done in systems which may not have access
  to the public internet, or by other devices that are not management stations
  per-se (e.g., a peer device).  If reference measurements are obtained from
  multiple sources, the Verifier may need to evaluate the relative level of
  trust to be placed in each source in case of a discrepancy.</t>
</list></t>

<t>These components are illustrated in Figure 2.</t>

<t>A more-detailed taxonomy of terms is given in <xref target="I-D.birkholz-rats-architecture"/></t>

<figure title="RIV Reference Configuration for Network Equipment" anchor="RIV-Reference-Configuration"><artwork align="left"><![CDATA[
+---------------+        +-------------+        +---------+--------+
|               |        | Attester    | Step 1 | Verifier|        |
| Asserter      |        | (Device     |<-------| (Network| Relying|
| (Device       |        | under       |------->| Mngmt   | Party  |
| Manufacturer  |        | attestation)| Step 2 | Station)|        |
| or other      |        |             |        |         |        |
| authority)    |        |             |        |         |        |
+---------------+        +-------------+        +---------+--------+
       |                                             /\
       |                  Step 0                      |
       -----------------------------------------------

]]></artwork></figure>

<t>In Step 0, The Asserter (the device manufacturer) provides a Software Image
accompanied by one or more Reference Integrity Manifests (RIMs) to the Attester (the
device under attestation) signed by the asserter. In Step 1, the Verifier
(Network Management Station), on behalf of a Relying Party, requests Identity,
Measurement Values (and possibly RIMs) from the Attester. In Step 2, the
Attester responds to the request by providing a DevID, quotes (measured values),
and optionally RIMs, signed by the Attester.</t>

<t>See <xref target="I-D.birkholz-rats-reference-interaction-model"/> for more narrowly defined
terms related to Attestation</t>

</section>
<section anchor="riv-simplifying-assumptions" title="RIV Simplifying Assumptions">

<t>This document makes the following simplifying assumptions to reduce complexity:</t>

<t><list style="symbols">
  <t>The product to be attested is shipped with an IEEE 802.1AR DevID and an Initial
Attestation Key (IAK) with certificate.  The IAK cert contains the same identity
information as the DevID (specifically, the same Subject Name and Subject
Alt Name, signed by the manufacturer), but it’s a type of key that can be
used to sign a TPM Quote.  This convention is described in TCG Guidance for
Securing Network Equipment <xref target="NetEq"/>. For network equipment, which is generally non-privacy-sensitive, shipping
a device with both an IDevID and an IAK already provisioned substantially
simplifies initial startup. Privacy-sensitive applications may use the TCG
Platform Certificate and additional procedures to install identity credentials
on the platform after manufacture.  (See Section 2.3.1 below for the Platform
Certificate alternative)</t>
  <t>The product is equipped with a Root of Trust for Measurement, Root of Trust
for Storage and Root of Trust for Reporting (as defined in <xref target="GloPlaRoT"/>) that are
capable of conforming to the TCG Trusted Attestation Protocol (TAP) Information Model <xref target="TAP"/>.</t>
  <t>The vendor will ship Reference Integrity Measurements (i.e., known-good measurements)
in the form of signed CoSWID tags <xref target="I-D.ietf-sacm-coswid"/>, <xref target="SWID"/>,
as described in TCG Reference Integrity Measurement Manifest Information Model <xref target="RIM"/>.</t>
</list></t>

<section anchor="devid-alternatives" title="DevID Alternatives">

<t>Some situations may have privacy-sensitive requirements that preclude shipping
every device with an Initial Device ID installed.  In these cases, the IDevID
can be installed remotely using the TCG Platform Certificate <xref target="Platform-Certificates"/>.</t>

<t>Some administrators may want to install their own identity
credentials to certify device identity and attestation results.  IEEE 802.1AR
<xref target="IEEE-802-1AR"/> allows for both Initial Device Identity credentials, installed by the manufacturer, (analogous to a physical serial number plate),
or Local Device Identity credentials installed by the administrator of the
device (analogous to the physical Asset Tag used by many enterprises to identify their property).  TCG TPM 2.0 Keys documents <xref target="Platform-DevID-TPM-2.0"/> and
<xref target="PC-Client-BIOS-TPM-2.0"/> specifies parallel Initial and Local Attestation Keys (IAK and LAK), and
contains figures showing the relationship between IDevID, LDevID, IAK and
LAK keys.</t>

<t>Device administrators are free to use any number of criteria to judge authenticity
of a device before installing local identity keys, as part of an on-boarding
process.  The TCG TPM 2.0 Keys document <xref target="Platform-DevID-TPM-2.0"/> also outlines
procedures for creating Local Attestation Keys and Local Device
IDs (LDevIDs) rooted in the manufacturer’s IDevID as a check to reduce the
chances that counterfeit devices are installed in the network.</t>

<t>Note that many networking devices are expected to self-configure (aka Zero
Touch Provisioning).  Current standardized zero-touch mechanisms such as
<xref target="RFC8572"/> assume that identity keys are already in place before network on-boarding
can start, and as such, are compatible with IDevID and IAK keys installed by the
manufacturer, but not with LDevID and LAK keys, which would have to be installed
by the administrator.</t>

</section>
<section anchor="additional-attestation-of-platform-characteristics" title="Additional Attestation of Platform Characteristics">

<t>The Platform Attribute Credential <xref target="Platform-Certificates"/> can also be used to convey
additional information about a platform from the
manufacturer or other entities in the supply chain.  While outside the scope
of RIV, the Platform Attribute Credential can deliver information such as
lists of serial numbers for components embedded in a device or security assertions
related to the platform, signed by the manufacturer, system integrator or
value-added-reseller.</t>

</section>
<section anchor="root-of-trust-for-measurement" title="Root of Trust for Measurement">

<t>The measurements needed for attestation require that the device being attested
is equipped with a Root of Trust for Measurement, i.e., some trustworthy
mechanism that can compute the first measurement in the chain of trust required
to attest that each stage of system startup is verified, and a Root of Trust
for Reporting to report the results <xref target="TCGRoT"/>, <xref target="GloPlaRoT"/>.</t>

<t>While there are many complex aspects of a Root of Trust, two aspects that
are important in the case of attestation are:</t>

<t><list style="symbols">
  <t>The first measurement computed by the Root of Trust for Measurement, and stored
in the TPM’s Root of Trust for Storage, is presumed to be correct.</t>
  <t>There must not be a way to reset the RTS without re-entering the RTM code.</t>
</list></t>

<t>The first measurement must be computed by code that is implicitly trusted; if that
first measurement can be subverted, none of the remaining measurements can
be trusted. (See <xref target="NIST-SP-800-155"/>)</t>

</section>
<section anchor="reference-integrity-manifests-rims" title="Reference Integrity Manifests (RIMs)">

<t>Much of attestation focuses on collecting and transmitting evidence in
the form of PCR measurements and attestation logs.  But the critical part
of the process is enabling the verifier to decide whether the measurements
are “the right ones” or not.</t>

<t>While it must be up to network administrators to decide what they want on
their networks, the software supplier should supply the Reference Integrity
Measurements, (aka Golden Measurements or “known good” digests) that
may be used by a verifier to determine if evidence shows known good, known
bad or unknown software configurations.</t>

<t>In general, there are two kinds of reference measurements:</t>

<t><list style="numbers">
  <t>Measurements of early system startup (e.g., BIOS, boot loader, OS kernel)
are essentially single threaded, and executed exactly once, in a known sequence,
before any results could be reported.  In this case, while the method for
computing the hash and extending relevant PCRs may be complicated, the net
result is that the software (more likely, firmware) vendor will have one
known good PCR value that “should” be present in the relevant PCRs after the box has
booted.  In this case, the signed reference measurement could simply list the
expected hashes for the given version.  However, a RIM that contains the
intermediate hashes can be useful in debugging cases where the expected final hash
is not the one reported.</t>
  <t>Measurements taken later in operation of the system, once an OS has started
(for example, Linux IMA<xref target="IMA"/>), may be more complex, with unpredictable “final”
PCR values.  In this case, the Verifier must have enough information to reconstruct
the expected PCR values from logs and signed reference measurements from
a trusted authority.</t>
</list></t>

<t>In both cases, the expected values can be expressed as signed SWID or CoSWID tags,
but the SWID structure in the second case is somewhat more complex, as reconstruction of the extended hash in a PCR may involve thousands of files and other objects.</t>

<t>The TCG has published an information model defining elements of reference integrity
manifests under the title TCG Reference Integrity Manifest Information Model <xref target="RIM"/>.  This information model outlines how SWID tags should be structured to allow attestation, and defines “bundles” of SWID tags that may be needed to describe a complete software release.  The RIM contains some metadata relating to the software release it belongs to, plus hashes for each individual file or other object that could be attested.</t>

<t>TCG has also published the PC Client Reference Integrity Measurement specification <xref target="PC-Client-RIM"/>, which focuses on a SWID-compatible format suitable for expressing expected measurement values in the specific case of a UEFI-compatible BIOS, where the SWID focus on files and file systems is not a direct fit.  While the PC Client RIM is not directly applicable to network equipment, many vendors do use a conventional UEFI BIOS to launch their network OS.</t>

</section>
<section anchor="attestation-logs" title="Attestation Logs">

<t>Quotes from a TPM can provide evidence of the state of a device up to the time
the evidence was recorded, but to make sense of the quote in most cases an
event log of what software modules contributed which values to the quote
during startup must also be provided.  The log must contain enough information
to demonstrate its integrity by allowing exact reconstruction of the digest
conveyed in the signed quote (e.g., PCR values).</t>

<t>TCG has defined several event log formats:</t>

<t><list style="symbols">
  <t>UEFI BIOS event log (TCG EFI Platform Specification for TPM Family 1.1 or
1.2, Section 7 <xref target="EFI-TPM"/>)</t>
  <t>Canonical Event Log <xref target="Canonical-Event-Log"/></t>
  <t>There is also a Legacy BIOS event log, although this document is less relevant as UEFI
has largely replaced the Legacy BIOS (TCG PC Client Specific Implementation Specification
for Conventional BIOS, Section 11.3<xref target="PC-Client-BIOS-TPM-1.2"/>)</t>
</list></t>

<t>It should be noted that a given device might use more than one event log
format (e.g., a UEFI log during initial boot, switching to Canonical Log
when the host OS launches).</t>

<t>The TCG SNMP Attestation MIB <xref target="SNMP-Attestation-MIB"/> will support any
record-oriented log format, including the three TCG-defined
formats, but it currently leaves figuring out which log(s) are in what format
up to the Verifier.</t>

</section>
</section>
</section>
<section anchor="standards-components" title="Standards Components">

<section anchor="reference-models" title="Reference Models">

<section anchor="ietf-reference-model-for-challenge-response-remote-attestation" title="IETF Reference Model for Challenge-Response Remote Attestation">

<t>Initial work at IETF defines remote attestation as follows:</t>

<t>The Reference Interaction Model for Challenge-Response-based Remote Attestation
is based on the standard roles defined in <xref target="I-D.birkholz-rats-architecture"/>:</t>

<t><list style="symbols">
  <t>Attester: The role that designates the subject of the remote attestation.
A system entity that is the provider of evidence takes on the role of an
Attester.</t>
  <t>Verifier: The role that designates the system entity and that is the appraiser
of evidence provided by the Attester. A system entity that is the consumer
of evidence takes on the role of a Verifier.</t>
</list></t>

<t>The following diagram illustrates a common information flow between a Verifier
and an Attester, specified in <xref target="I-D.birkholz-rats-reference-interaction-model"/>:</t>

<figure title="IETF Attestation Information Flow" anchor="IETF-Attestation-Information-Flow"><artwork align="left"><![CDATA[
Attester                                                     Verifier
   |                                                               |
   | <------- requestAttestation(nonce, authSecID, claimSelection) |
   |                                                               |
collectAssertions(assertionsSelection)                             |
   | => assertions                                                 |
   |                                                               |
signAttestationEvidence(authSecID, assertions, nonce)              |
   | => signedAttestationEvidence                                  |
   |                                                               |
   | signedAttestationEvidence ----------------------------------> |
   |                                                               |
   | verifyAttestationEvidence(signedAttestatEvidence, refassertions)
   |                                          attestationResult <= |
   |                                                               |
]]></artwork></figure>

<t>The RIV approach outlined in this document aligns with the RATS reference
model.</t>

</section>
</section>
<section anchor="riv-workflow" title="RIV Workflow">

<t>The overall flow for an attestation session is shown in Figure 4.  In this
diagram:</t>

<t><list style="symbols">
  <t>Step 0, obtaining the signed reference measurements, may happen in two
ways:</t>
  <t>Step 0A below shows a verifier obtaining reference measurements directly
from a software configuration authority, whether it’s the vendor or another
authority chosen by the system administrator.  The reference measurements
are signed by the Asserter (i.e., the software configuration authority).</t>
  <t>- Or - Step 0B, the reference measurements, signed by the Asserter, may be
distributed as part of software installation, long before the attestation
session begins.  Software installation is usually vendor-dependent, so there
are no standards involved in this step.  However, the verifier can use the
same protocol to obtain the reference measurements from the device as it
would have used with an external reference authority</t>
  <t>In Step 1, the Verifier initiates an attestation session by opening a TLS
session, validated using the DevID to prove that the connection is attesting
the right box.</t>
  <t>In Step 2, measured values are retrieved from the Attester’s TPM using a
YANG <xref target="RFC8348"/> or SNMP <xref target="RFC3413"/> interface that implements the TCG TAP model (e.g. YANG Module
for Basic Challenge-Response-based Remote Attestation Procedures <xref target="I-D.birkholz-yang-basic-remote-attestation"/>).</t>
  <t>In Step 3, the Attester also delivers a copy of the signed reference measurements,
using Software Inventory YANG module based on Software Identifiers <xref target="I-D.birkholz-yang-swid"/>.</t>
</list></t>

<t>These steps yield enough information for the Verifier to verify measurements against
reference values.  Of course, in all cases, the signatures protecting quotes and RIMs must be checked
before the contents are used.</t>

<figure title="RIV Protocol and Encoding Summary" anchor="RIV-Protocol-and-Encoding-Summary"><artwork align="left"><![CDATA[
+---------------+        +-------------+        +---------+
|               |        |             | Step 1 |         |
|               |        | Attester    |<------>| Verifier|
| Asserter      |        | (Device     |<------>| (Network|
|(Configuration |------->| under       | Step 2 | Mngmt   |
| Authority)    | Step 0A| attestation)|        | Station)|
|               |        |             |------->|         |
+---------------+        +-------------+ Step 3 +---------+
        |                                           /|\
        |                                            |
        ----------------------------------------------
                        Step 0B

]]></artwork></figure>

<t>Either CoSWID-encoded reference measurements are signed by a trusted authority
and retrieved directly prior to attestation (as shown in Step 0A), or CoSWID-encoded
reference measurements are signed by the device manufacturer, installed on
the device by a proprietary installer, and delivered during attestation (as
shown in Step 0B). In Step 1, the Verifier initiates a connection for attestation.
The Attester’s identity is validated using DevID with TLS. In Step 2, a
nonce, quotes (measured values) and measurement log are conveyed via TAP
with a protocol-specific binding (e.g. SNMP). Logs are sent in the Canonical
Log Format In Step 3, CoSWID-encoded reference measurements are retrieved
from the Attester using the YANG (<xref target="I-D.birkholz-yang-swid"/>.
.</t>

<t>The following components are used:</t>

<t><list style="numbers">
  <t>TPM Keys are configured according to <xref target="Platform-DevID-TPM-2.0"/>, <xref target="PC-Client-BIOS-TPM-1.2"/>, or <xref target="Platform-ID-TPM-1.2"/></t>
  <t>Measurements of firmware and bootable modules are taken according to TCG PC Client <xref target="PC-Client-BIOS-TPM-2.0"/> and Linux IMA <xref target="IMA"/></t>
  <t>Device Identity is managed by IEEE 802.1AR certificates <xref target="IEEE-802-1AR"/>, with keys protected by TPMs.</t>
  <t>Attestation logs are formatted according to the Canonical Event Log format <xref target="Canonical-Event-Log"/></t>
  <t>Quotes are retrieved according to TCG TAP Information Model <xref target="TAP"/>.  While the TAP IM gives a protocol-independent description of the data elements involved, it’s important to note that quotes from the TPM are signed inside the TPM, so must be retrieved in a way that does not invalidate the signature, as specified in <xref target="I-D.birkholz-yang-basic-remote-attestation"/>, to preserve the trust model.  (See Security Considerations).</t>
  <t>Reference Integrity Measurements are encoded as CoSWID tags, as defined in
  the TCG RIM document <xref target="RIM"/>, compatible with NIST IR 8060 <xref target="NIST-IR-8060"/> and the IETF CoSWID draft <xref target="I-D.ietf-sacm-coswid"/>.  Reference measurements are signed by the device manufacturer.</t>
</list></t>

</section>
<section anchor="layering-model-for-network-equipment-attester-and-verifier" title="Layering Model for Network Equipment Attester and Verifier">

<t>Retrieval of identity and attestation state uses one protocol stack, while
retrieval of Reference Measurements uses a different set of protocols.  Figure
5 shows the components involved.</t>

<figure title="RIV Protocol Stacks" anchor="RIV-Protocol-Stacks"><artwork align="left"><![CDATA[
+-----------------------+              +-------------------------+
|                       |              |                         |
|       Attester        |<-------------|        Verifier         |
|       (Device)        |------------->|   (Management Station)  |
|                       |      |       |                         |
+-----------------------+      |       +-------------------------+
                               |
           -------------------- --------------------
           |                                        |
---------------------------------- ---------------------------------
|Reference Integrity Measurements| |         Attestation           |
---------------------------------- ---------------------------------

********************************************************************
*         IETF Attestation Reference Interaction Diagram           *
********************************************************************

    .......................         .......................
    . Reference Integrity .         .  TAP (PTS2.0) Info  .
    .      Manifest       .         . Model and Canonical .
    .                     .         .     Log Format      .
    .......................         .......................

    *************************  .............. **********************
    * YANG SWID Module      *  . TCG        . * YANG Attestation   *
    * I-D.birkholz-yang-swid*  . Attestation. * Module             *
    *                       *  . MIB        . * I-D.birkholz-yang- *
    *                       *  .            . * basic-remote-      *
    *                       *  .            . * attestation        *
    *************************  .............. **********************

    *************************  ************ ************************
    * XML, JSON, CBOR (etc) *  *    UDP   * * XML, JSON, CBOR (etc)*
    *************************  ************ ************************

    *************************               ************************
    *   RESTCONF/NETCONF    *               *   RESTCONF/NETCONF   *
    ************************               *************************

    *************************               ************************
    *       TLS, SSH        *               *       TLS, SSH       *
    *************************               ************************

]]></artwork></figure>

<t>IETF documents are captured in boxes surrounded by asterisks. TCG documents
are shown in boxes surrounded by dots. The IETF Attestation Reference Interaction
Diagram, Reference Integrity Manifest, TAP Information Model
and Canonical Log Format, and both YANG modules are works in progress. Information
Model layers describe abstract data objects that can be requested, and the
corresponding response SNMP is still widely used, but the industry is transitioning
to YANG, so in some cases, both will be required. TLS Authentication with
TPM has been shown to work; SSH authentication using TPM-protected keys is
not as easily done [as of 2019]</t>

</section>
</section>
<section anchor="privacy-considerations" title="Privacy Considerations">

<t>Networking Equipment such as routers, switches and firewalls has a key role to play in guarding the privacy of individuals using the network:
* Packets passing through the device must not be sent to unauthorized destinations.  For example
  * Routers often act as Policy Enforcement Points, where individual subscribers may be checked for
  authorization to access a network.  Subscriber login information must not be released to unauthorized parties.
  * Networking Equipment is often called upon to block access to protected resources, or from unauthorized users.
* Routing information, such as the identity of a router’s peers, must not be leaked to unauthorized neighbors.
* If configured, encryption and decryption of traffic must be carried out reliably, while protecting keys and credentials.
Functions that protect privacy are implemented as part of each layer of hardware and software that
makes up the networking device.
In light of these requirements for protecting the privacy of users of the network, the Network Equipment
must identify itself, and its boot configuration and measured device state (for example, PCR values),
to the Equipment’s Administrator, so there’s no uncertainty as to what function each device and
configuration is configured to carry out . This allows the administrator to ensure that the network
provides individual and peer privacy guarantees.</t>

<t>RIV specifically addresses the collection information from enterprise network devices by an enterprise
network.  As such, privacy is a fundamental concern for those deploying this solution, given EU
GDPR, California CCPA, and many other privacy regulations.  The enterprise should implement
and enforce their duty of care.</t>

<t>See <xref target="NetEq"/> for more context on privacy in networking devices</t>

</section>
<section anchor="Security" title="Security Considerations">

<t>Attestation results from the RIV procedure are subject to a number of attacks:</t>

<t><list style="symbols">
  <t>Keys may be compromised</t>
  <t>A counterfeit device may attempt to impersonate (spoof) a known authentic device</t>
  <t>Man-in-the-middle attacks may be used by a counterfeit device to attempt to deliver
responses that originate in an actual authentic device</t>
  <t>Replay attacks may be attempted by a compromised device</t>
</list></t>

<t>Trustworthiness of RIV attestation depends strongly on the validity of keys used for identity
and attestation reports.  RIV takes full advantage of TPM capabilities to ensure that results can be trusted.</t>

<t>Two sets of keys are relevant to RIV attestation</t>

<t><list style="symbols">
  <t>A DevID key is used to certify the identity of the device in which the TPM is installed.</t>
  <t>An Attestation Key (AK) key signs attestation reports, (called ‘quotes’ in TCG documents),
used to provide evidence for integrity of the software on the device.</t>
</list></t>

<t>TPM practices require that these keys be different, as a way of ensuring that a general-purpose
signing key cannot be used to spoof an attestation quote.</t>

<t>In each case, the private half of the key is known only to the TPM, and cannot be
retrieved externally, even by a trusted party.  To ensure that’s the case,
specification-compliant private/public key-pairs are generated inside the TPM, where they’re never
exposed, and cannot be extracted (See <xref target="Platform-DevID-TPM-2.0"/>).</t>

<t>Keeping keys safe is just part of attestation security; knowing which keys are bound
to the device in question is just as important.</t>

<t>While there are many ways to manage keys in a TPM (See <xref target="Platform-DevID-TPM-2.0"/>), RIV includes
support for “zero touch” provisioning (also known as zero-touch onboarding) of fielded
devices (e.g. Secure ZTP, <xref target="RFC8572"/>}), where keys which have predictable trust properties are
provisioned by the device vendor.</t>

<t>Device identity in RIV is based on IEEE 802.1AR DevID. This specification provides several elements</t>

<t><list style="symbols">
  <t>A DevID requires a unique key pair for each device, accompanied by an x.509 certificate</t>
  <t>The private portion of the DevID key is to be stored in the device, in a manner that provides confidentiality (Section 6.2.5 <xref target="IEEE-802-1AR"/>)</t>
</list></t>

<t>The x.509 certificate contains several components</t>

<t><list style="symbols">
  <t>The public part of the unique DevID key assigned to that device</t>
  <t>An identifying string that’s unique to the manufacturer of the device.  This is normally the
serial number of the unit, which might also be printed on label on the device.</t>
  <t>The certificate must be signed by a key traceable to the manufacturer’s root key.</t>
</list></t>

<t>With these elements, the device’s manufacturer and serial number can be identified by analyzing the
DevID certificate plus the chain of intermediate certs leading back to the manufacturer’s root
certificate.  As is conventional in TLS connections, a nonce must be signed by the device
in response to a challenge,
proving possession of its DevID private key.</t>

<t>RIV uses the DevID to validate a TLS connection to the device as the attestation session begins.  Security of
this process derives from TLS security, with the DevID providing proof that the TLS session terminates on
the intended device. <xref target="RFC8446"/>.</t>

<t>Evidence of software integrity is delivered in the form of a quote signed by the TPM
itself.  Because the contents of the quote are signed inside the TPM, any external
modification (including reformatting to a different data format) will be detected
as tampering.</t>

<t>A critical feature of the YANG model described in <xref target="I-D.birkholz-yang-basic-remote-attestation"/> is the ability to carry TPM data structures in their native format, without requiring any changes to the structures as they were signed and delivered by the TPM.  While alternate methods of conveying TPM quotes could add an additional layer of signing using external keys, the important part is to preserve the TPM signing, so that tampering anywhere in the path between the TPM itself and the Verifier can be detected.</t>

<t>Prevention of spoofing attacks against attestation systems is also important.  There are two cases to consider:
* The entire device could be spoofed, that is, when the Verifier goes to verify a specific device, it might be redirected to a different device.  Use of the 802.1AR identity in the TPM ensures that the Verifier’s TLS session is in fact terminating on the right device.
* A compromised device could respond with a spoofed attestation result, that is, a compromised OS could return a fabricated quote.</t>

<t>Protection against spoofed quotes from a device with valid identity is a bit more complex.
An identity key must be available to sign any kind of nonce or hash offered by the verifier,
and consequently, could be used to sign a fabricated quote.  To block spoofed attestation
result, the quote generated inside the TPM must by signed by
a key that’s different from the DevID, called an Attestation Key (AK).</t>

<t>Given separate Attestation and DevID keys, the
binding between the AK and the same device must also be proven to
prevent a man-in-the-middle attack (e.g. the ‘Asokan Attack’ <xref target="RFC6813"/>).</t>

<t>This is accomplished in RIV through use of an AK certificate with the same elements as the DevID
(i.e., same manufacturer’s serial number, signed by the same manufacturer’s key), but containing
the device’s unique AK public key instead of the DevID public key.
[this will require an OID that says the key is known by the CA to be an Attestation key]</t>

<t>These two keys and certificates are used together:</t>

<t><list style="symbols">
  <t>The DevID is used to validate a TLS connection terminating on the device with a known serial number.</t>
  <t>The AK is used to sign attestation quotes, providing proof that the attestation
evidence comes from the same device.</t>
</list></t>

<t>Replay attacks, where results of a previous attestation are submitted in response to subsequent requests,
are usually prevented by inclusion of a nonce in the request to the TPM
for a quote.  Each request from the Verifier includes a new random number (a nonce). The resulting
quote signed by the TPM contains the same nonce, allowing the verifier to determine
freshness, i.e., that the resulting quote was generated in response to the verifier’s specific request.
Time-Based Uni-directional Attestation <xref target="I-D.birkholz-rats-tuda"/> provides an alternate mechanism
to verify freshness without requiring a request/response cycle.</t>

<t>Requiring results of attestation of the operating software to be signed by a key known only to the TPM also
removes the need to trust the device’s operating software (beyond the first measurement; see below); any
changes to the quote, generated and signed by the TPM itself, made by malicious device software, or in
the path back to the verifier, will invalidate the signature on the quote.</t>

<t>Although RIV recommends that device manufacturers pre-provision devices with easily-verified DevID and AK certs,
use of those credentials is not mandatory.  IEEE 802.1AR incorporates the idea of an Initial Device ID
(IDevID), provisioned by the manufacturer, and a Local Device ID (LDevID) provisioned by the owner of
the device.  RIV extends that concept by defining an Initial Attestation Key (IAK) and Local Attestation
Key (LAK) with the same properties.</t>

<t>Device owners can use any method to provision the Local credentials.</t>

<t><list style="symbols">
  <t>TCG doc <xref target="Platform-DevID-TPM-2.0"/> shows how the initial Attestation
keys can be used to certify LDevID and LAK keys.  Use of the LDevID and LAK allows the device owner
to use a uniform identity structure across device types from multiple manufacturers (in the same way
that an “Asset Tag” is used by many enterprises use to identify devices they own).  TCG doc
<xref target="Provisioning-TPM-2.0"/> also contains guidance on provisioning identity keys in TPM 2.0.</t>
  <t>But device owners can use any other mechanism they want to assure themselves that Local identity
certificates are inserted into the intended device, including physical inspection and programming
in a secure location, if they prefer to avoid placing trust in the manufacturer-provided keys.</t>
</list></t>

<t>Clearly, Local keys can’t be used for secure Zero Touch provisioning; installation of the Local keys
can only be done by some process that runs before the device is configured for network operation.</t>

<t>On the other end of the device life cycle, provision should be made to wipe Local keys when a device
is decommissioned, to indicate that the device is no longer owned by the enterprise.  The manufacturer’s
Initial identity keys must be preserved, as they contain no information that’s not already printed on
the device’s serial number plate.</t>

<t>In addition to trustworthy provisioning of keys, RIV depends on other trust anchors.  (See <xref target="GloPlaRoT"/> for definitions of Roots of Trust.)</t>

<t><list style="symbols">
  <t>Secure identity depends on mechanisms to prevent per-device secret keys from being compromised.  The TPM
provides this capability as a Root of Trust for Storage</t>
  <t>Attestation depends on an unbroken chain of measurements, starting from the very first measurement.
That first measurement is made by code called the Root of Trust for Measurement, typically done by trusted
firmware stored in boot flash.  Mechanisms for maintaining the trustworthiness of the RTM are out of
scope for RIV, but could include immutable firmware, signed updates, or a vendor-specific hardware
verification technique.</t>
  <t>RIV assumes some level of physical defense for the device.  If a TPM that has already been programmed
with an authentic DevID is stolen and inserted into a counterfeit device, attestation of that counterfeit
device may become indistinguishable from an authentic device.</t>
</list></t>

<t>RIV also depends on reliable reference measurements, as expressed by the RIM <xref target="RIM"/>.  The definition of
trust procedures for RIMs is out of scope for RIV, and the device owner is free to use any policy to validate
a set of reference measurements.  RIMs may be conveyed out-of-band or in-band, as part of the attestation
process (see Section 3.2).  But for embedded devices, where software is usually shipped as a self-contained
package, RIMs signed by the manufacturer and delivered in-band may be more convenient for the device owner.</t>

</section>
<section anchor="conclusion" title="Conclusion">

<t>TCG technologies can play an important part in the implementation of Remote
Integrity Verification.  Standards for many of the components needed for
implementation of RIV already exist:</t>

<t><list style="symbols">
  <t>Platform identity can be based on IEEE 802.1AR Device identity, coupled with
careful supply-chain management by the manufacturer.</t>
  <t>Complex supply chains can be certified using TCG Platform Certificates <xref target="Platform-Certificates"/></t>
  <t>The TCG TAP mechanism can be used to retrieve attestation evidence.  Work
is needed on a YANG model for this protocol.</t>
  <t>Reference Measurements must be conveyed from the software authority (e.g.,
the manufacturer) to the system in which verification will take place.  IETF
CoSWID work forms the basis for this, but new work is needed to create an
information model and YANG implementation.</t>
</list></t>

</section>
<section anchor="appendix" title="Appendix">

<section anchor="implementation-notes" title="Implementation Notes">

<t>Table 1 summarizes many of the actions needed to complete an Attestation
system, with links to relevant documents.  While documents are controlled
by several standards organizations, the implied actions required for
implementation are all the responsibility of the manufacturer of the device,
unless otherwise noted.</t>

<figure title="Component Status" anchor="Component-Status"><artwork align="left"><![CDATA[
+------------------------------------------------------------------+
|             Component                           |  Controlling   |
|                                                 | Specification  |
--------------------------------------------------------------------
| Make a Secure execution environment             |   TCG RoT      |
|   o Attestation depends on a secure root of     |   UEFI.org     |
|     trust for measurement outside the TPM, as   |                |
|     well as roots for storage amd reporting     |                |
|     inside the TPM.                             |                |
|   o  Refer to TCG Root of Trust for Measurement.|                |
|   o  NIST SP 800-193 also provides guidelines   |                |
|      on Roots of Trust                          |                |
--------------------------------------------------------------------
| Provision the TPM as described in               | TCG TPM DevID  |
|   TCG documents.                                | TCG Platform   |
|                                                 |   Certificate  |
--------------------------------------------------------------------
| Put a DevID or Platform Cert in the TPM         | TCG TPM DevID  |
|    o Install an Initial Attestation Key at the  | TCG Platform   |
|      same time so that Attestation can work out |   Certificate  |
|      of the box                                 |-----------------
|    o Equipment suppliers and owners may want to | IEEE 802.1AR   |
|      implement Local Device ID as well as       |                |
|      Initial Device ID                          |                |
--------------------------------------------------------------------
| Connect the TPM to the TLS stack                | Vendor TLS     |
|    o  Use the DevID in the TPM to authenticate  | stack (This    |
|       TAP connections, identifying the device   | action is      |
|                                                 | simply         |
|                                                 | configuring TLS|
|                                                 | to use the     |
|                                                 | DevID as its   |
|                                                 | trust anchor.) |
--------------------------------------------------------------------
| Make CoSWID tags for BIOS/LoaderLKernel objects | IETF CoSWID    |
|    o  Add reference measurements into SWID tags | ISO/IEC 19770-2|
|    o  Manufacturer should sign the SWID tags    | NIST IR 8060   |
|    o  The TCG RIM-IM identifies further         |                |
|       procedures to create signed RIM           |                |
|       documents that provide the necessary      |                |
|       reference information                     |                |
--------------------------------------------------------------------
|  Package the SWID tags with a vendor software   | Retrieve tags  |
|  release                                        | with           |
|    o  A tag-generator plugin such      | {{I-D.birkholz-yang-swid}}|
|     as https://github.com/Labs64/swid-maven-plugin               |
|     can be used                                 |----------------|
|                                                 | TCG PC Client  |
|                                                 | RIM            |
--------------------------------------------------------------------
|  Use PC Client measurement definitions          | TCG PC Client  |
|  to define the use of PCRs                      | BIOS           |
|  (although Windows  OS is rare on Networking    |                |
|  Equipment, UEFI BIOS is not)                   |                |
--------------------------------------------------------------------
|  Use TAP to retrieve measurements               |                |
|    o  Map TAP to SNMP                           | TCG SNMP MIB   |
|    o  Map to YANG                               | YANG Module for|
|  Use Canonical Log Format                       |   Basic        |
|                                                 |   Attestation  |
|                                                 | TCG Canonical  |
|                                                 |   Log Format   |
--------------------------------------------------------------------
| Posture Collection Server (as described in IETF |                |
|  SACMs ECP) should request the                  |                |
|  attestation and analyze the result             |                |
| The Management application might be broken down |                |
|  to several more components:                    |                |
|    o  A Posture Manager Server                  |                |
|       which collects reports and stores them in |                |
|       a database                                |                |
|    o  One or more Analyzers that can look at the|                |
|       results and figure out what it means.     |                |
--------------------------------------------------------------------
]]></artwork></figure>

</section>
<section anchor="comparison-with-tcg-pts-ietf-nea" title="Comparison with TCG PTS / IETF NEA">

<t>Some components of an Attestation system have been implemented for end-user
machines such as PCs and laptops. Figure 7 shows the corresponding protocol
stacks.</t>

<figure title="Attestation for End User Computers" anchor="Attestation-for-End-User-Computers"><artwork align="left"><![CDATA[
+-----------------------+              +-------------------------+
|                       |              |                         |
|       Attester        |<-------------|        Verifier         |
|       (Device)        |------------->|   (Management Station)  |
|                       |      |       |                         |
+-----------------------+      |       +-------------------------+
                               |
           -------------------- --------------------
           |                                        |
---------------------------------- ---------------------------------
|Reference Integrity Measurements| |         Attestation           |
---------------------------------- ---------------------------------

--------------------------------------------------------------------
|         IETF Attestation Reference Interaction Diagram           |
-------------------------------------------------------------------

    .......................         --------------------------------
    . No Existing         .         |  TAPS (PTS2.0) Info Model and|
    . Reference Integrity .         |  Canonical Log Format        |
    . Manifest            .         |                              |
    . Protocols Exist     .         --------------------------------
    .                     .
    .                     .        ---------------------- ----------
    .                     .        | YANG Attestation   | |IETF NEA|
    .                     .        | Module             | | Msg and|
    .                     .        | I-D.birkholz-yang- | | Attrib.|
    .                     .        | basic-remote-      | | for PA-|
    .                     .        | attestation        | | TNC    |
    .                     .        ---------------------- ----------
    .                     .        ---------------------- ----------
    .                     .        | XML, JSON, CBOR    | | PT-TLS |
    .                     .        ---------------------- | (for   |
    .                     .        ---------------------- |endpoint|
    .                     .        | NETCONF, RESTCONF, | |mcahines|
    .                     .        | COAP               | |        |
    .......................        ---------------------- ----------
    ----------------------------------------------------------------
    |                       TLS, SSH                               |
    ----------------------------------------------------------------
]]></artwork></figure>

</section>
</section>
<section anchor="IANA" title="IANA Considerations">

<t>This memo includes no request to IANA.</t>

</section>


  </middle>

  <back>


    <references title='Informative References'>





<reference  anchor="RFC8348" target='https://www.rfc-editor.org/info/rfc8348'>
<front>
<title>A YANG Data Model for Hardware Management</title>
<author initials='A.' surname='Bierman' fullname='A. Bierman'><organization /></author>
<author initials='M.' surname='Bjorklund' fullname='M. Bjorklund'><organization /></author>
<author initials='J.' surname='Dong' fullname='J. Dong'><organization /></author>
<author initials='D.' surname='Romascanu' fullname='D. Romascanu'><organization /></author>
<date year='2018' month='March' />
<abstract><t>This document defines a YANG data model for the management of hardware on a single server.</t></abstract>
</front>
<seriesInfo name='RFC' value='8348'/>
<seriesInfo name='DOI' value='10.17487/RFC8348'/>
</reference>



<reference  anchor="RFC3413" target='https://www.rfc-editor.org/info/rfc3413'>
<front>
<title>Simple Network Management Protocol (SNMP) Applications</title>
<author initials='D.' surname='Levi' fullname='D. Levi'><organization /></author>
<author initials='P.' surname='Meyer' fullname='P. Meyer'><organization /></author>
<author initials='B.' surname='Stewart' fullname='B. Stewart'><organization /></author>
<date year='2002' month='December' />
<abstract><t>This document describes five types of Simple Network Management Protocol (SNMP) applications which make use of an SNMP engine as described in STD 62, RFC 3411.  The types of application described are Command Generators, Command Responders, Notification Originators, Notification Receivers, and Proxy Forwarders. This document also defines Management Information Base (MIB) modules for specifying targets of management operations, for notification filtering, and for proxy forwarding.  This document obsoletes RFC 2573.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='62'/>
<seriesInfo name='RFC' value='3413'/>
<seriesInfo name='DOI' value='10.17487/RFC3413'/>
</reference>



<reference  anchor="RFC5209" target='https://www.rfc-editor.org/info/rfc5209'>
<front>
<title>Network Endpoint Assessment (NEA): Overview and Requirements</title>
<author initials='P.' surname='Sangster' fullname='P. Sangster'><organization /></author>
<author initials='H.' surname='Khosravi' fullname='H. Khosravi'><organization /></author>
<author initials='M.' surname='Mani' fullname='M. Mani'><organization /></author>
<author initials='K.' surname='Narayan' fullname='K. Narayan'><organization /></author>
<author initials='J.' surname='Tardo' fullname='J. Tardo'><organization /></author>
<date year='2008' month='June' />
<abstract><t>This document defines the problem statement, scope, and protocol requirements between the components of the NEA (Network Endpoint Assessment) reference model.  NEA provides owners of networks (e.g., an enterprise offering remote access) a mechanism to evaluate the posture of a system.  This may take place during the request for network access and/or subsequently at any time while connected to the network.  The learned posture information can then be applied to a variety of compliance-oriented decisions.  The posture information is frequently useful for detecting systems that are lacking or have out-of-date security protection mechanisms such as: anti-virus and host-based firewall software.  In order to provide context for the requirements, a reference model and terminology are introduced.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='5209'/>
<seriesInfo name='DOI' value='10.17487/RFC5209'/>
</reference>



<reference  anchor="RFC8572" target='https://www.rfc-editor.org/info/rfc8572'>
<front>
<title>Secure Zero Touch Provisioning (SZTP)</title>
<author initials='K.' surname='Watsen' fullname='K. Watsen'><organization /></author>
<author initials='I.' surname='Farrer' fullname='I. Farrer'><organization /></author>
<author initials='M.' surname='Abrahamsson' fullname='M. Abrahamsson'><organization /></author>
<date year='2019' month='April' />
<abstract><t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state.  Variations in the solution enable it to be used on both public and private networks.  The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs.  The updated device is subsequently able to establish secure connections with other systems.  For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t></abstract>
</front>
<seriesInfo name='RFC' value='8572'/>
<seriesInfo name='DOI' value='10.17487/RFC8572'/>
</reference>



<reference  anchor="RFC6813" target='https://www.rfc-editor.org/info/rfc6813'>
<front>
<title>The Network Endpoint Assessment (NEA) Asokan Attack Analysis</title>
<author initials='J.' surname='Salowey' fullname='J. Salowey'><organization /></author>
<author initials='S.' surname='Hanna' fullname='S. Hanna'><organization /></author>
<date year='2012' month='December' />
<abstract><t>The Network Endpoint Assessment (NEA) protocols are subject to a subtle forwarding attack that has become known as the NEA Asokan Attack. This document describes the attack and countermeasures that may be mounted.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='6813'/>
<seriesInfo name='DOI' value='10.17487/RFC6813'/>
</reference>



<reference  anchor="RFC8446" target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2018' month='August' />
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>



<reference anchor="I-D.birkholz-yang-basic-remote-attestation">
<front>
<title>YANG Module for Basic Challenge-Response-based Remote Attestation Procedures</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='M' surname='Eckel' fullname='Michael Eckel'>
    <organization />
</author>

<author initials='S' surname='Bhandari' fullname='Shwetha Bhandari'>
    <organization />
</author>

<author initials='B' surname='Sulzen' fullname='Bill Sulzen'>
    <organization />
</author>

<author initials='E' surname='Voit' fullname='Eric Voit'>
    <organization />
</author>

<author initials='G' surname='Fedorkow' fullname='Guy Fedorkow'>
    <organization />
</author>

<date month='October' day='23' year='2018' />

<abstract><t>This document defines a YANG RPC and a minimal datastore tree required to retrieve attestation evidence about integrity measurements from a composite device with one or more roots of trust for reporting.  Complementary measurement logs are also provided by the YANG RPC originating from one or more roots of trust of measurement.  The module defined requires a TPM 2.0 and corresponding Trusted Software Stack included in the device components of the composite device the YANG server is running on.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-birkholz-yang-basic-remote-attestation-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-birkholz-yang-basic-remote-attestation-01.txt' />
</reference>



<reference anchor="I-D.birkholz-rats-architecture">
<front>
<title>Remote Attestation Procedures Architecture</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='M' surname='Wiseman' fullname='Monty Wiseman'>
    <organization />
</author>

<author initials='H' surname='Tschofenig' fullname='Hannes Tschofenig'>
    <organization />
</author>

<author initials='N' surname='Smith' fullname='Ned Smith'>
    <organization />
</author>

<author initials='M' surname='Richardson' fullname='Michael Richardson'>
    <organization />
</author>

<date month='November' day='4' year='2019' />

<abstract><t>An entity (a relying party) requires a source of truth and evidence about a remote peer to assess the peer's trustworthiness.  The evidence is typically a believable set of claims about its host, software or hardware platform.  This document describes an architecture for such remote attestation procedures (RATS).</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-birkholz-rats-architecture-03' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-birkholz-rats-architecture-03.txt' />
</reference>



<reference anchor="I-D.birkholz-rats-reference-interaction-model">
<front>
<title>Reference Interaction Models for Remote Attestation Procedures</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='M' surname='Eckel' fullname='Michael Eckel'>
    <organization />
</author>

<date month='January' day='7' year='2020' />

<abstract><t>This document defines interaction models for basic remote attestation procedures.  Different methods of conveying attestation evidence securely are defined and illustrated.  Analogously, the required information elements used by conveyance protocols are defined and illustrated.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-birkholz-rats-reference-interaction-model-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-birkholz-rats-reference-interaction-model-02.txt' />
</reference>



<reference anchor="I-D.birkholz-yang-swid">
<front>
<title>Software Inventory YANG module based on Software Identifiers</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<date month='October' day='23' year='2018' />

<abstract><t>This document provides a YANG module definition that enables a computing context to provide detailed information about installed software components.  The structure of the module is based on the Concise Software Identifier draft and therefore also strongly related to the ISO 19770-2:2015 Software Identifiers standard.  Both standards provide no interface to transport the SWID tag information between system entities and this document leverages the wide adoption of YANG based management interfaces.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-birkholz-yang-swid-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-birkholz-yang-swid-02.txt' />
</reference>



<reference anchor="I-D.ietf-sacm-coswid">
<front>
<title>Concise Software Identification Tags</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='J' surname='Fitzgerald-McKay' fullname='Jessica Fitzgerald-McKay'>
    <organization />
</author>

<author initials='C' surname='Schmidt' fullname='Charles Schmidt'>
    <organization />
</author>

<author initials='D' surname='Waltermire' fullname='David Waltermire'>
    <organization />
</author>

<date month='November' day='17' year='2019' />

<abstract><t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles.  SWID tag representations can be too large for devices with network and storage constraints.  This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags.  CoSWID supports the same features as SWID tags, as well as additional semantics that allow CoSWIDs to describe additional types of information, all in a more memory efficient format.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-sacm-coswid-13' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-sacm-coswid-13.txt' />
</reference>



<reference anchor="I-D.birkholz-rats-tuda">
<front>
<title>Time-Based Uni-Directional Attestation</title>

<author initials='A' surname='Fuchs' fullname='Andreas Fuchs'>
    <organization />
</author>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='I' surname='McDonald' fullname='Ira McDonald'>
    <organization />
</author>

<author initials='C' surname='Bormann' fullname='Carsten Bormann'>
    <organization />
</author>

<date month='September' day='11' year='2019' />

<abstract><t>This documents defines the method and bindings used to conduct Time- based Uni-Directional Attestation (TUDA) between two RATS (Remote ATtestation procedureS) Principals over the Internet.  TUDA does not require a challenge-response handshake and thereby does not rely on the conveyance of a nonce to prove freshness of remote attestation Evidence.  Conversely, TUDA enables the creation of Secure Audit Logs that can constitute Evidence about current and past operational states of an Attester.  As a prerequisite for TUDA, every RATS Principal requires access to a trusted and synchronized time-source. Per default, in TUDA this is a Time Stamp Authority (TSA) issuing signed Time Stamp Tokens (TST).</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-birkholz-rats-tuda-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-birkholz-rats-tuda-01.txt' />
</reference>


<reference anchor="TAP" >
  <front>
    <title>DRAFT: TCG Trusted Attestation Protocol (TAP) Information Model for TPM Families 1.2 and 2.0 and DICE Family 1.0, Version 1.0, Revision 0.29</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="NIST-SP-800-155" target="https://csrc.nist.gov/csrc/media/publications/sp/800-155/draft/documents/draft-sp800-155_dec2011.pdf">
  <front>
    <title>BIOS Integrity Measurement Guidelines (Draft)</title>
    <author >
      <organization>National Institute for Standards and Technology</organization>
    </author>
    <date year="2011" month="December"/>
  </front>
</reference>
<reference anchor="SNMP-Attestation-MIB" >
  <front>
    <title>DRAFT: SNMP MIB for TPM-Based Attestation, Specification Version 0.8, Revision 0.02</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="May"/>
  </front>
</reference>
<reference anchor="Canonical-Event-Log" >
  <front>
    <title>DRAFT Canonical Event Log Format Version: 1.0, Revision: .12</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="PC-Client-BIOS-TPM-2.0" target="https://trustedcomputinggroup.org/pc-client-specific-platform-firmware-profile-specification">
  <front>
    <title>PC Client Specific Platform Firmware Profile Specification Family "2.0", Level 00 Revision 1.04</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2019" month="June"/>
  </front>
</reference>
<reference anchor="PC-Client-BIOS-TPM-1.2" target="https://www.trustedcomputinggroup.org/wp-content/uploads/TCG_PCClientImplementation_1-21_1_00.pdf">
  <front>
    <title>TCG PC Client Specific Implementation Specification for Conventional BIOS, Specification Version 1.21 Errata, Revision 1.00</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2012" month="February"/>
  </front>
</reference>
<reference anchor="EFI-TPM" target="https://trustedcomputinggroup.org/wp-content/uploads/EFI-Protocol-Specification-rev13-160330final.pdf">
  <front>
    <title>TCG EFI Platform Specification for TPM Family 1.1 or 1.2, Specification Version 1.22, Revision 15</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2014" month="January"/>
  </front>
</reference>
<reference anchor="RIM" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_RIM_Model_v1-r13_2feb20.pdf">
  <front>
    <title>DRAFT: TCG Reference Integrity Manifest Information Model</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2019" month="June"/>
  </front>
</reference>
<reference anchor="PC-Client-RIM" target="https://trustedcomputinggroup.org/xx">
  <front>
    <title>DRAFT: TCG PC Client Reference Integrity Manifest Specification, v.09</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2019" month="December"/>
  </front>
</reference>
<reference anchor="Platform-DevID-TPM-2.0" >
  <front>
    <title>DRAFT: TPM Keys for Platform DevID for TPM2, Specification Version 0.7, Revision 0</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="Platform-Certificates" >
  <front>
    <title>DRAFT: TCG Platform Attribute Credential Profile, Specification Version 1.0, Revision 15, 07 December 2017</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2017" month="December"/>
  </front>
</reference>
<reference anchor="Platform-ID-TPM-1.2" target="https://trustedcomputinggroup.org/wp-content/uploads/TPM_Keys_for_Platform_Identity_v1_0_r3_Final.pdf">
  <front>
    <title>TPM Keys for Platform Identity for TPM 1.2, Specification Version 1.0, Revision 3</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2015" month="August"/>
  </front>
</reference>
<reference anchor="Provisioning-TPM-2.0" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG-TPM-v2.0-Provisioning-Guidance-Published-v1r1.pdf">
  <front>
    <title>TCG TPM v2.0 Provisioning Guidance</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2015" month="March"/>
  </front>
</reference>
<reference anchor="IEEE-802-1AR" >
  <front>
    <title>802.1AR-2018 - IEEE Standard for Local and Metropolitan Area Networks - Secure Device Identity, IEEE Computer Society</title>
    <author initials="M." surname="Seaman">
      <organization>IEEE Computer Society</organization>
    </author>
    <date year="2018" month="August"/>
  </front>
</reference>
<reference anchor="IMA" target="https://sourceforge.net/p/linux-ima/wiki/Home/">
  <front>
    <title>Integrity Measurement Architecture</title>
    <author surname="dsafford">
      <organization></organization>
    </author>
    <author surname="kds_etu">
      <organization></organization>
    </author>
    <author surname="mzohar">
      <organization></organization>
    </author>
    <author surname="reinersailer">
      <organization></organization>
    </author>
    <author surname="serge_hallyn">
      <organization></organization>
    </author>
    <date year="2019" month="June"/>
  </front>
</reference>
<reference anchor="TCGRoT" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_Roots_of_Trust_Specification_v0p20_PUBLIC_REVIEW.pdf">
  <front>
    <title>TCG Roots of Trust Specification</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="October"/>
  </front>
</reference>
<reference anchor="GloPlaRoT" target="https://globalplatform.org/specs-library/globalplatform-root-of-trust-definitions-and-requirements/">
  <front>
    <title>Root of Trust Definitions and Requirements Version 1.1</title>
    <author >
      <organization>GlobalPlatform Technology</organization>
    </author>
    <date year="2018" month="June"/>
  </front>
</reference>
<reference anchor="NetEq" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_Guidance_for_Securing_NetEq_1_0r29.pdf">
  <front>
    <title>TCG Guidance for Securing Network Equipment</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2018" month="January"/>
  </front>
</reference>
<reference anchor="NIST-IR-8060" target="https://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8060.pdf">
  <front>
    <title>Guidelines for the Creation of Interoperable Software Identification (SWID) Tags</title>
    <author >
      <organization>National Institute for Standards and Technology</organization>
    </author>
    <date year="2016" month="April"/>
  </front>
</reference>
<reference anchor="SWID" target="https://www.iso.org/standard/65666.html">
  <front>
    <title>Information Technology Software Asset Management Part 2: Software Identification Tag, ISO/IEC 19770-2</title>
    <author >
      <organization>The International Organization for Standardization/International Electrotechnical Commission</organization>
    </author>
    <date year="2015" month="October"/>
  </front>
</reference>
<reference anchor="AIK-Enrollment" target="https://trustedcomputinggroup.org/wp-content/uploads/IWG_CMC_Profile_Cert_Enrollment_v1_r7.pdf">
  <front>
    <title>TCG Infrastructure Working GroupA CMC Profile for AIK Certificate Enrollment Version 1.0, Revision 7</title>
    <author >
      <organization>Trusted Computing Group</organization>
    </author>
    <date year="2011" month="March"/>
  </front>
</reference>


    </references>




  </back>

<!-- ##markdown-source:
H4sIAE3DTl4AA+29W3fcRrIm+o5fgSU/iHQXiqRky7Y8u8/QFO3NbVHiiLR7
n5mepQVWoUi0UEA1UEWqbHl++4kvLnlBoUjKUu+Hs4YPtlhEJTIjIyPj+kWW
ZUm3zOvp27xq6uJ5umxXRVIuWv5Xt3yyv//d/pNk2kzqfE5/nrb5bJnNimnT
vmtuszZfdlldLG/p12xa3JSTIsuXy4KGXJZNndFXJ/nyeVrWsyZZlM+TNF02
k+fp43XRPZZfpsVieU2ffIXfu/W8LWadf6Br2mX8yaSZL/LJMnhkdek/q5vH
ybJcVjTVVzKt9AVPK31TzJtlkZ7Uy+KqLZfr9NeiLWflhCea5JeXbXHzsV9q
i/x5el5MVvhbcnv1PH1zeHGe/o1GKOur9Ke2WS2Sd7fPeYCW6JS9AP2Sab6k
CT7ZP/gu23+W5KvlddM+T7K0bTDxYloum5ZWVta07p/G6dE4/VEpTp/KRvy0
WocfNi29/D9WdbkoWltEN6L3TsYgEdGwAHmYgDRX/WdbXNE67PNmWrh/rupl
S0/9ck6/La6ZM/gvxTwvq+fplXHAf/+HvHNMi6MF8Iz/g6ZbLn+7Ktq8mman
k5/ztZv2fxRdR+QbeoCX8Iopm1eOqunhVVFP1v+KRfxjPqNZPPnvdZePr5qb
hPjsefr7HwmYtZ3TRG4KMOybH4++ffrVt/rPp18dPNV/fv1k/zt74Otvnug/
n33rHvj2q6+e4Z8n2YvxZdm+u26q37J1Xl9llzlRIWuZu8IDs/E0H7C8nVyX
y2KyXLXF8BM09aIlOhVZCU6js4DTNydiVMMT6G7Lqf2lLJazrMsn82zShJ/H
r1iupjn+cnF4hv/R2ZVj9vjFm8MfL56nF0c/pRcQGcU0PfQrSs/ahk55U6U7
9M1d4kglLv3pFPNL6ff04uyUx0zTH/N5WZVFlx6Mn6Qkl9In433+/4uTo2P5
65r+tj/CUewwCv/yhs4r/7Y/fvLdYx7LjhX+nQl32fyOSF6slv6I4hF3Jr/N
Dvbpk1cn5xfZ+Vn27f5+dvD117rmvL0CD14vl4vu+d7epGsn47rslmAg/m1v
Tsc331usLisVE91et9jTUfZYfu6ROF3Ni3rZye9Zt9C/v50WE5rCwXgxnYVE
/uHk9XkghU6LvCNewBAkCEqiYlkTyXZYuuxuW707Wyd1R+OuSLCB9ucQ/3k7
7ZjMF8Xkum6q5modU+UgO3hCn5y/Oj3Lgu3NTk9+GGQHPJjSH217sx/yLuaM
UXq+KCZOmrr93B9/O1JmCHZ1/8mn7ur+1/TJUV43Nb2xyo5viHrZy+ZqYPr+
sZQfS+mx9EfmW5vm85jvnqfjg0+eIfPd2VF2RAeA5oZNz0A6OgLD7LeUcSc2
7BVGHdMr9xaTbCKjdErkbFHlS5y9bFa281u6u7JF28zKqnCPyK0WUOPsKJW5
uK1Kz3QUkuAyCg44Runtpp7URzT3R7adL4sbOu/7+35fiYZffRLR+AIdJBrJ
j2Gi3d7ejrcT7nZBUpAOWr3cWy2qJp92eyTZ3p4dyfgn80XF545X+fYge3Lw
9uDt/n7/wEIaDlAv/nqPZDgpR00NhpNzirUY7YbPCi3yID1uSUDno4iq+59E
1SdQ3NL0+McTkPJjeW+AhBjJLoIsWgpdXTcHT7ODZ/tPn+7PSlr2ECnp+57z
NqlGk/RXwwEtFITpyRelY0C5JyHJvv4kgn2V7R/gzj853Xo3vrErOpTjeV3O
SB5u3oqPP53mYFua0Fse7+3NQdYePH37ZFZcPvHc+tmOnV/5g6f8/v02UvmD
cyfRou0dpTfj/U+8+b+TO84YLSMj4ORFTwL3ZkuM93Ox7pgLHYPy94wx+3wY
3HPfbN5zn+cKsQUcFe1SXlx0WxnTTZvu5ra8hFpw1BZTSCGSQSrdtyxC5x+r
YAdfj9L9b4gKk2J+SeYITeybT1vXN9iYcGG6LVtl/McdlLPTt9jEtzT0W3vF
2xOmwHJNJ+ft/tv26dsfB4XTIAPYd51w2hRHkfraZ4Onn0Str7P9b0GstpHh
6LE/q0YMixUe7YaGy6J3QBPNYYOcQfntrotpdnPQbuiybCgQTTBANMnUBvjU
1YN8J8fHx6S7P8kODt9ErE+fjemzDMeFBsZzTgXm/XrZQO+DLnxaLNtm0VQl
/Tk9JGPfWdZpZtcyzNTC3AW27yMZVuZJJ+C8mZCRtR5YFxvMp2MaJ5/ndpx4
sdtHCHVabPTJ6eHwvnbNqp0UtKarAvb53mKP7ITV+6yc53u35bty79+bebEX
EmfYxDgM7M+BNdBz6hzq8hm9bRou4/Hj/lPvpt3bYrm6+6H5b8113t79TFuQ
1dN2ZMsX9zzZFUSCt9d5Va3rgSf71xpx6Jvm4vOclbdvmmbZvW1mb5l730ZC
4O3N/uLJ/tuzX354eXL09s3xryfHfxs6LjxG2szkBAzoNZ94YfxUNSS7tq75
qmou88rsB14sTIYuq8rLNm/XvQeylqabNbOMaZVNC1LrSraEMzpVpPD9c1UK
Z3UR82GVfpEv/Nf4ML4JvhYIz4Nt6/+J5+RE8ja79lvZcjrYx//8TDtuYozv
E/Fj1Vdv+Q2wFdon3w3tsX1LbHL9lvNHHtPiF1j7pxrBB+baOHlD4vHZlhuh
vqkWq8vOuzbwD3yyV7Z7NNCzPYwxPnkzxhj95QQuCSxmec0ahVx7tL/sDG0W
RZtfwmxsZku2I0V4uvtx5/xvJy929bRe5Ffdv8St8SxjAxTv2m4tll0jTK9D
7j37+tmzZ+Pr5byKlKpQi/cv9Cs87LpiCf01vxLBepa3y/TJ82008IunC+X8
9d7J8VF68N033+xnd7gargv1NhtZXrdXpDH/5q0lo4x+thc/flyRoCdTDfOH
B0QnkYKz5mXntL7gwmUZcnjyc3Zct01VYWmf4Sid/O2nt0enR29VA30LZfat
fwP0svaboZNE29DmHb2LL6zYG3+Y0pDOZQFq0LzTQE9O/Rs2LMZQyf3mkw7i
AZSUJMuyNL+kmeaTZZJcXJddap7BdFp0E9LG6QjlKSTArGpueb7iNE4DpzHO
VOkubvpFAzKpBGS6sbxpXk6nVZEkX4A/2ma6Yicx3ksmVgruIw1kneYQ7SRi
l01KO9LRSW5p9HRWFtUUq8lT3cXUbaO+aJTM2mae8snmj7s1PTfnofLFwvlD
xylpF5NrYspO/rggJbAgMZEvk1zHgmK0pPuaXpMv6Z0TeiUpK+3jLu1IFUmJ
VKA9Tssk3SnHxXiU1nR9sNO/aGdFudzlg3+dd8llUdRYzKy8IoaYprfl8lq3
rvyNfu/0+I1SeiMRIF3gXBIh/Vq7FS1gndKsSzI16e1NXST0BI3RFZ5mtASa
IalOcEXQotqqad4VU9qB0CWOfcbtRuMK7TuWkUQG2i2+5ycsLms69xM4hNZM
eFoNkbHNiQHrqyQnYdLq9XjZrJbe+uA5EwMsryGCO0waHFa0JMPLSUfTryfV
ijczXJZ8b5SUTom1C102qMbtNHLEcgRV85teMh363AZJwC5NV8qn+KUq+b4j
BgBpaC60sTS72aqeqCziJXekxvGDxU1erYSFRkmxnIyZd+M1lMuuqGbYdeHm
QtxtGBa8SSPQLbt0Sy/pbIPehQg9EngyzVq+Q1Mr6k5uYuxt2l2XiwV+472a
Ejd1+Cd04zS/ysG0JPTmdAKwRctrOvlX1zIT2vyrgl82pX1gQxu8gCWCbNfN
CttKZ+N1Xdi05aXXRbXokjmNvuRtui7i477sEyGfwWSgt65mOWQgJkw8F/re
k8u1UFY4K82n8xJ3PO0a39j5Uoa1zeZPbomqVU7bc41DRIePn5EDm+CPNHqL
01IKQ3ekfBtzxyP576XEWNMGIqaEv4HWwDTmM/O3EizMD2+RqilfGu+Xo0ge
lvF5ulwnt9fl5BrrLOtpsaA3grgSyyVKTegPzSUTd9KuF8vmqs0X9A2MACnA
QorJrkcjUao7WZX+c0VvZ86mj6bssdJnoq1yVMAVR8sh+cv00IGYpuXS0XG1
GDGDQNARoWi6a90JETRLFh+0XPk9ARc0CLPQfC8L+TNx1I9EX70TQLnCdEka
XEYVIizyy7LCRIkeJDNTeG+mmCVYymmigfpyrvTeeXV6vovB6OV85U7oBi34
EMP0oleMEppCg/m4y4mGqdaQRzRZRAe7FXYI150jUs760ty/sGuqlbAvDUfC
+Rpikoi31JeBVnPioyuZFwamDSFJsTtO/3aNG19ju+AzjpnSdZDgeupCBqKD
H93FM/pHh7MLOnSkBRfLDQEumQLJcKZAuvPm5FeaQ0r/I/nwjm91I4TbjnRC
/2nBdiSVcKGUN4Wwhwhs/hbeTYy0UGe6aLeBNIKKAIK0OM+02cRSTPY8waVW
TlZV3jp2i84zLkW6PFl6RZcicyPGYhHKtmhiZhqtSQi7jLWI23wt9/5EJH13
HRMYhKCl0EArXO8WgRpeHvaxU8YHxYgfi/qmJHkt1iC9Yt7U1TqZ0e3P7PrK
c7uznJT804aoJKoCMaYypbvpenelkJ+UimqKAyVLKKZQFOjmh2yn08oj4oqk
gx8df+wWu4fKSCMFw9GOEu92TLe04rgY5AVbvjT/u2fl5gEpLo/Oi7zuxqpE
alwvJdqKFYaXYO30BzK55oFQKdXgoIfsqlRFjKZdF5CfZOBjJ0mR53F4P4ue
BuoYMDWys8zoyH6AkZfYwU35kuMNK9oJ/MsL0UTd3DcO3aIt53nL+lTtRYOX
qjfhOePhk/DCcFrRKb2HaLJzcXa66y72wlQ8VpcgE7pVtVTFIpLc0f0S2Hlz
7NhlYVoAvZH2hHdD9LjgOknEpsJVwaoF378FVBbRS+hN4+QEcr0kFaQlK22J
x2qo+8yHMG6WZldiy1hI3uQlExnPEsVSUn3BEd2aaAxxkrwrSA+qeSqYMR/0
jjiK5kp/ormQyJB8Bfweznmt+0V7cEOmy17w1CIvW9o00ImIl/ql8W1a5CTM
ZWsLOwRCW3odaT60zan6gUgdmnGQZylnyJzBc2ciyFvk7Cpz0ID4RrWOZLNb
MmbIig2pyw1Nhf9erb8n3XJpTEoXxdX1MlHRGi4AIjTcbqFBNDjY9YsvYp/U
y7y+WtFN1ePjEtKmzmpLKfpeNAdn55k4kgvFSz5S0YhOpI9hM8Nj+h5CQFRQ
lZEipIjsxIcruf6vROqzBL4uCzaviuSqySs2F24KkQEljhQpaRMSRbQz10SS
CmTp0qt80bGg3XidLP0nDBWbNbqhHTME5yFVzYSFAZQAWKLYJa83PU+SLzdj
JiN+wu2+ClbWwPVIewMFa4YY5XOk9ykZ2qIxtF2gx9r9oiYxPqRj3U75quN7
LbAHveaMQWaci0cMQZQUpZyVwTJQZVitbTpTk1kpM/vVhK3MZM0aa1mvcFxp
WJYcRceMUsfDjtNDb4nGNBkMNiGKNKS+mh5qMSkbLVgkm9NV19gtRsr3l94p
FYYCVLX2U+GFtQXklSr6S3hR6CXz1ZLFUmAwmmVFM404QWiE3Yz3cnMn12Ta
ETO/q5tb0iK8upKkm4ap6MHtqt4kLTEulKn77Hy7N0Np4JwxertOZfTekQf7
11OZwbzQq3NGanFzC1bGQcvk2uczKUeBiM8U60WT0oy9eqadQ3sQcUAmnKly
IqPy3oWTesEhe0x/J/V4wvduweeVvSk0ZHCzIgGloUs/WPU4CRnixD2SpYd8
G2ARzBvB3CKrryXtAuqOOxbDLLBsBhUpXJHuNua5iHZtJMlibTs0tJixQo9E
Gttu3XVzC34cNnnhboptKu+XoqFM66VTxCYFnE0406RYmV49TuO5OTeBS9kU
gcUpDXBuXdWiQzirHntnVr7NTYnUBd4RW0B4EmhHZm3BJFzVoYBrpm5GRE7I
8xfsb1wYhe5MfBZzJklwNJirvPrHs5BDHNo44hMMPQve6mEbOBSnepMRy9AG
E1UdD4eydMBSoXknuYgGaIWdugKiHWPFhE7moilhEZzo0XVuBPtTwtpB6rQD
VnyD1Cz6pRZ1z26UqnxXqLUrVkuV00lcqL4D6ZpsfomXMieDkEx9fsmmUSge
LbLC1D5uGwSEST3oSJFj1QYvm9HFe0urxO2MbVEa3pTFLVyo2AsSVu9ELR8S
djIVUYp1Xm5lzMqJIzMUSJhtW1nKdAs1WmGm4775B/RM8ckgHSU5GEdhoWM7
8D33zS3OGNxVtdsdMkZqMBS0zZ7Akztvx6THLmvhVV7OzU0aOjUX8KAWHfOB
N49Heozck+7q5GXhlA76QFPhQS9jTY2nM07DDeg6IgSce8nfqs41JzNJoxuI
DgZrt5jxOt1Zrhd4W7UOzlvkzpMg2oAasI0L/VmUzJRQgSnbnnqERfOZG8si
3S2xMqGJsG4eGLPCmhbgUO5kJrSJzr3G0Y2cNww80AsSQxEK1BOZLk+1NjcP
8UznnZUSkogkpLjixvzVw/DVLIxF6Q4pNwoMQ1DGRA3cyCRdeJxNnYfLFOjd
Lv7ARurZKRzqoexOxcFEhgh9R939xErsPWbSmXOHJhRfCvxlL+zCCAlpSots
2WSIP8nhtGvBOat5947okm6rtV0jBbH3NFJBvQOB+VE5dFPni1U9KFhXZPrU
7q4v2Tqmu3tJD8Ot76RKkprgL5zgnwxd3IHTle7YH9yk4XNeNu8KVg/z+SUd
z2bVRXzvg0yd93GAdyCp5cZYzei1pWr7qpTi5e4i8wTRyEiS9iZo3v++e57t
7b4XvAShYsX1smBVV8RUBbXnyVjyg9e56kXbRCb9yd2eJAPqDnKIXb/2BZg8
rPXQl1ii8sXQv6BE9tIf5rEJ0BEFZJKcs6RsWrR75k2mi3R8NcYXA+etqpKs
zLpZQUelyTsZNsnbtsRdTVtxU+bxEM4ywhCQlTUp0OyBUYUIo0WH0x0BPrj0
ycjZvPCVqN07z9di/5hPgndCUyBF5XxK5pg7jXeTXhz1djYcyVviNDoEkGOg
mfO87znyqSEaacSi2OuzUz8a+xA5rpbS8xMJSpMM5xjShloTOcnEO8U1c3bH
WBAnjUSv2nUiot2bnfSKL7/i/cL5v/QoiqyN7iJsHTNQsWBpJtphTRtvIlqE
cg4PMrvp3sM+xum4lQCc+WL5UTpLMzK0nC9fTiuZIxXNtXeN0Kl7E+jcg6lu
9BitWQxyI40z5YLj6QSerLR/bmBf1rj+w2R/aNWkmXkvCatFoT+PVSLTDZ57
dcHJLr06L7mUhobkHEFNaNywGn//PcyB/OMPvhwnzWpR2RVEZ62YrSqVTpno
gcFxUyskvO9J1F7IPSVJzpMgcwLcBtsGjl/QZ9sYqmp2uCqQJsqZPbEw7YlS
2tJymVbFTO1oGoisT5rLOQ5ymFvAC8N4JDdIRmXirX7PkaksmESs++6wtPqV
76FDDnm9IRaga7TtdplsxDtMsdBXWd7kE3bnEA1qFSK36rOFbIE3o5LMmr7v
xsXENYWEJZRwidvbKDU7TOSmjR1M8P7jD9ZhWPt37lFcA9u8o5iJsdb3wVy9
1xTjiSGEBW14QOk+CpPHw2iAWKehDb9hhDsdyQIPwgZ8aUL6K0cgOkCawqyY
rCdVwfxXslNu3nfL6+lwx46dDLJvyDc+O3ozSv/HipNnYJ41oY95lEqI2LwP
2Dy/MbBv7FGeZaOiUYWSczaYI4BV1g7qdOTkEPNzWc7h9achoBp3crkMVjqE
stgCDZIQYl7LyCug5pikCe+IZNw4fNh1F9nVDJ1ds0BUZNOREHKE94YQs6o4
gAkWhllzLp5dyeOewh64JNNsRqvTuyyMroSb1fMgGsskmw6N0DNAp7kt4e73
yT9hNFvyfSy47hRjU3bVNbCqYDyy66hU8zkyZUOd+IsvSMZo7Cr09icuJhEu
yoW5eLPY70c22YqrIFgnC8IFcAyCkAj3M8siLDgtFlUDQnHoDPcI3QjHdHTx
+C90BjO9P+1Feh8ydR7h1KjgvGzeP4LYnOUtJzQ1XVeSSj1KzD4qwfJ2k8+K
W2Tg2FN8PUM1LqaSf8V6TD3NSApYBhYdxOOqpJudTodcLHORwrgEcxLtOUdl
2jioIwNrJBcTZxVXPGvF+2Ky0kOrtwZtl1AOlu2tXa4uFSFwknROEWASsyLw
CI6TzN3aUobIR1dV45aPI6hmLg2cFBjuCF6os8cnqLEXMnAF8MXgkt0092Ek
cdUpTR1syF8C10XiD/n+BclxrRz/4w+JOfERK97n4AasWosL/mfRNulFA/9P
WC4hAvh0VS3L7FdJotnCHc4lawmsXSbXDK+TJIP6APg6gos6YmpaP1NbsuaC
0l/OGKkK50ZQY5iVWhbm6r5kldDfnJLww8ElMhEDlzxJwXMNGKvLOz5PEiVD
9g6k6uS6eafGi3IU2FF4VY5cIs4EcxpZnMwUSE0nEwd+MBPaO+Ra0YS+orP3
nrhKDgV83ZvuucHjj5PTqfYKqiDTgJmvlIQoMPOsyJfiJYXkhjQeD6xZtiN6
nk8LbxWLcEk2HAVxMualtJvT5XIthlbpsmNyi0DQkMgKweRIV+bZBTAD7OE0
E15TQS1qJdxgIcZx+uOqxT9G3v3EbHw3hTQBIY1KjzvvFNfEGtAAo2lwtMtn
kBOyJeL6nweZpOLBFNdBXTc3uYt342xf0nGHeZSkYiRqCnqpBt7XtNnO6P+I
vZYzNrIb9AoezUJmzTNdYudE+BoVm1VH0mdOp3ip6fHXBRJKJJdHc6jwolUX
pPMKHSSjNz3TpyJzzRtHq8XUOJvmU2XGeKDVFfOQH829sZmQuOE5+IEWVsol
gpODAkHuhaRTNsgEQKa0Zleyj1IigjoSG9eXhaUd2MVTtpEzE7fxjoRbTQyO
hl2aYs4NpJJJNFKSRegFHR8Umwyr3rpY5JZ1Hei2C8J0DavIEmKM0ipUCZgQ
tySJhkV6ybxsy6/VKV2ZkywUNzkbG7jym865MTJvNvZTqZEj/e/NbYHUuX5w
0dzqHf6KJFnSmOYLOT89Odhh1njtRhmJmjwWTEiHgwm7HJeM7xRRvtkgIO5C
aoOaQhnbzaQOSuKFN8l2WOXU/aT98KmIAKiZrpANi/KN5gJJhDeNRvs5GlJM
VZydqb0VWDwoOjCNdyNpAyYK3bBxVQJdtCjIDCwrOD0fZFs5QriN4DVGCUrQ
OUy1fhTRYKSetNjVEqrlyHrtZcrSsFeFq6BxnoWNeWD/kUSie9zLC1Ev9Jzz
lobTQNXziftVebhai/vepaL18vdfb3zoEzj9lsLLQpuqqh6dQtgM6f97+Oqn
PWJIaESqVLg5SxI4m+4uq89mYkHaIPUPHgBi9gpOa4nWs/s3zM/iUP2tk4u6
qFdOpB5bSOnQCQRRzIDu88cfMOuRjcyH6PgwyoL5UsLyai3fkQ9gO4QJ4twg
fCFFwanWBz8Z7xtV4QC3cj/JB5xEs3dK++BSg8xEp3ElXHgCp4wmIHZKEIQs
ib4wKiVmQGOxuPsifS2mhIq9L9M3qzq7wCUSiL7n/KlcLXE1ykuUmaYu5XfO
Oipn604l8t8rEfFhQVdzwgq6qE9dIMviOARunVOkm0LyQH2xgJTxeFM781Li
FpfsWIgLbSQEx16tdmhB7mVEh0jdPjYz+lzM6OdwHpUuQty007K2pBHdQrWp
5JKL4m80gTkZLDdF58xcX1PBl7LJBbasmaawE1SdHjnXd+6dsNB9wTVw2x0a
X3jnkNqLQlnIGbJnR5Y5maQbyfY9ZW0KJYKUNTiSu67PA7Lpmt3vArebF51m
vmD7UZtWFcWCITC65wN2no8TuLy5Rx2+8ghxNPic+fvsCCgvzffWTFXNlrRf
YTBOzXBECUlBw/SJcT8pAkIMzAEzg0tUlvtr2cJPZDV5ePJIfKdkPf2mZwvC
pSs28z01c5imUsHP05NooTuE8w42Vu3EU2ulbM6NbWdCZcDfrtd354H8P04h
2pInAo/cVYPcgwap6OLRJ03ixi74Ry9Z+TMh/ChxB9W5oOZEqEmJEJ7P86ij
ZAA4Xi9h63SrS1KJJJLqvPZWTjRS+4ez3Iobqa4p/Ch8qkRT5PzlpZ7DZk4n
cZqIOj5meZOVJCXou6dcUSepge/UkMP4cxJzcodBBiOpYOmigTmN1DZspU1W
7Ji1CKDVlkQ5lSy4w9RO1nN6dRGjyKe11pwnK7BKvKqLaqxV13PF+nF033sY
iOF0jlBDX8CEsLpBduBwxtOUWKFm/ZyPRM85K3EsuutEfVyTuCatSMoDyH6T
XHb8UlSVpIwq/h+YHePxwqfNgncnTE1D6tKCs9iu4dTC5i998S38gTgAPMVb
1CWvZZhCQoGwO0bpVCxb1rNsyxCQKWt1yenk1W8SvZ5jEK4UMPw6OII1aF9x
6yWf23DLgtESPyHUinOR40fNr4Lby94ySgsWRSwTOYZr2nhXsN1/U/QUph9W
kSEr43EwnqwGWptE4zW3wIW76ZlVbVnmPgVBjqiKcqTM9C+CG28S4sNOTqF8
bUYWlsYDzWSCobG6hJtKisEgN+EcleAnByzi4t4o+2rDYje1252t1M4SaRYQ
K7gFARlpZA8DapaoztzYhJEU5kImHdHNwm/9cBvXAcSZMuye1hvdedrlymYT
eoNT4qwfjUvmHhNh4rIBxr2qejHVkzhx6JozbUggTnMOS1apFcNNWKiaZy6/
aouCRTTLbmEMTghZhuXF3tDoq+o+a3zTiSKqD76xqvme6K0TEs+7eJ2xZHPj
CAQ8CdDrMT9shoSj1bcRVa24YNAwRcw3BKoQu2VwlnAMgEyVWmupcPxVOn4Z
UlkcR2GpUZDTuND0ND6SAcXh9wkUI1ag3Okk8bxaCkG8HlnMF7RvpcuddzZx
51ilCCvAktRKwgJDJZThRZC5oOHRcfp6o2jbtrJCDb8PGQVqq6S7weseK/ia
0lRIfr3E/rhmqFQAgrKeljSJFVuIXvXXSglXvYZap7C+DPx7rXVVls/v86s4
g4ZjysgK4Hrh96oC0CEDI3MAEONIJQrnVUDYyUp8XagQmkbb2ZjOrqyJTYtZ
ylpEZ8vlzEhizhp+Ga4WS1lL0/S47KppQD2Rr7yBuDhoUtAqjjQUz66sTiSy
KCl0i0lNjYUmJcNR/fWswljmxZxLnCz+JfKrRA7zHKa5GdUuTEND1CJe1z4b
JEmDrA/iIzf4tLxSAd5ZfacwCMdWXaA6VC0SQFpJ1luX7mClu3EieaSIyCpZ
n+iKYs4KLsQ9KoORJNaW7sxFl4bcYLVkrtFWo1KOZSDt49kRL+Kc03I37wUz
jzp57YoYaSo0EA8+dkmQB0JdHd74nj/E+er6kVWYZeHd1K+/dUdIYoDtKLVU
3KUrqJyxq54JwO/TE64p9RbHMwHpTaQG9j8HBHiARn2EWNS8fK/6BvuhlpNr
CSj5C8hCRPMIqQFGzlTMUVfFXgzFrmGYR2k1itHg2ElO3i4vkE5WhaAbJEtR
NQsnbX0uKfuzO7u9ndhieFaJccOx2gjUSTHdSDznZWrxCBeo+niU0XGjSoSR
J+hRSV2EW2Bk6SVeigSb9bjTs+8OvpwZOEKIi0mKkm5mRf2Qgexa1NHCjNRH
k4ZM9Mny0fd26jjfQcx6CEFRSfQLdur5vLnURq5pr7mcHhclp2vxoCDepfkl
JFutc3zhJauT84K/4QQuyEB78woBMzEc4QjuupUzT2nT50DhEEnMDheNFbH0
XT/mLZgWwdWa9IyFXLPFJ2ZuSNqRpGJpjLtXcEPMqQ64BLkbsftmJjeI1HPw
QSNOluRMi7lzAgh9vjacE3kgcXaIBKlJWpCYDgxkevXr8+h+fWGcReYxsyf0
ob5Y4Bue3hJ+UQPtNJxUBomLnn1pycnp4egB6GzQQk8P//hj1xUYd0FAFIRr
Lv+h8C5JUNAMxuIdbbl4jy853EHJPL8i8buaIme3vmnYPdWvkLFgE2ukrIRx
fjGnMFdrKwYQyBnid3/h80G4pBuCabSqScGlQ6HCG1NAIe7RTxKlXLJzb8dj
l2Bd4mhUZXK53u07/+bEd41AQCW9Ivk4g3nDI6loKybkg3J44uikiyGUJCdW
hZiuDzzic0deK29y1ejJr16yRRdmxA7OYpaKjo2Yk2Wc9iv++1n+vgZrVeOB
RGAMzIEFtddX2Lgci3Q41HXZIrVaNCrilAS6Ka4gSBnexR851yI9YLv3hRQx
WNI9kqIAaREFLfViMEEnDkJJOQ2EpuaR4yDrpWHaHUcCoyoQvvxmCGuzia92
PRES9wUQFkRJNm+NhNE5lzl0p5PqTaqXCp4w/9no7kIl7C9EXF3O2hGnFLoS
BQbhd9q0Htxp+kPTeDUE4QPO8PdJ5EozfbGeYlozjulINbMl1zbAUxXlZwcr
5tAOECALreIR1xZfrq8lySpIQTcOcYlUeiqYGD4Hi4OWpMBzRjXpaqQ4oq4A
F5kVFom+taNhhdxDrfRjI7t8UXE4vm2u8mWhC7XwjOXSw/7Gzt0oYgKUYj6i
NJ+Fq2n1TGT6qb8wYWoxnZ0XkSXhKCi527g4uOqdCxwldYwvVI6dG0dJHpiq
AmVQcRyByzjoFiP24yCTCH6v64ILpRm5YCCl1o41vfFx7F/xFfmuhjZRn0sR
6xWbCD6XgdrvSKd4O8iOZF3H2y6qso18no/luJPKpMpFLXg7wbgWrkqUzE6h
sexFoeJJmNoNxAOtOIq0gnoa5F+xrkFnoCVKIVaE8rZi+r29xyfK8zBBeVdY
sONr2nzaYFibkkS1KR9TXm25FXzr2dbapGjB/4d+uGLnL9mf+/kLf/uD//5f
otH+0v8leBH9+kG//UFaS9A/6fO/fkhfggYtfqNffkbPmkr/9Asd6gpb8MF/
+9Pe7f+rPx+2/Dv6+Xzfjij/l+jff7n/2wM/56hqONj6wD3ftp9f//S3Y5p/
7LfpjzDlh576XO9+w+km298/+PHDTsmH4Y/llNz78+GBj+keP3nw4/HMHzib
v8hZdFfIQ6fnvuzfx19EMcOyRxgkCzBGL9lz2ZT1tAzp6Fk2Ho/1mb+KlPr9
efoFaaBx2xfWahh0898e99VT6WBAIlrSnOg6uqr/7RHKNx79QaK+1oPSUwQh
hh+ZVvcoUmM4hdmZDaxHwuGdyGa4K/zs6I27XwR0QFSGaXTbsMLczGa03PfO
35YIZl6YAx+pP87io8vkBULPfs1k5vEUY0VZonwOoIY0lZbBqYY9ZRt+MstU
QEipdX+T4GcF0CO6gCq1ZERhWPcd6e6yERXWu30FIlHKw6SUAG5euvBZu053
3rfFbFdjNPB9iErGWH6iF15bravqUGobmzE5ttg1Hi2CuGjskMU6g7yota/7
t11TXcTVeqT/5OqNQGHb1M3cLssydPGadeOSJvBu0VI790Xzr7Jb1uMEThDe
XN5yhNP5jCYVB1W9Qe3LeGFG859Da9siuGopO30C1rIrFDTqMIVnLntG3xVm
K/D0N6LC9ZrUwRZgFZoz2CksXoQD5hwAPjnM4xpUa+8S0NQs1c9qs3dG8nZm
Redu42pE50F3o6RS47ZBLTYOjxr2KrD1h7LlVgBpu145gOzz0dkv2ErE1hUG
U0vGXZrUSFzdEXSWyhd40ltStMulBCOmznUBcBiiDlIjxKen1eU84lhmGR7T
TNKNLALCHlY4V4oWCQrmYYXWjpRDmTyCCDcNHfuy6tdMilMbh05OG9tC3Mow
thWcE0qzV90JI7kOp0XnnZuacDMtZrlH2xIXszlP1UUDuvZyam+vm6iMTe0W
rsMNKwIcVoq9ns+vpFzEHl1O+WNCcpeMLD2MXilvAzrgPW/jdM5wp2IcAF66
hPkRQDahtKWsJ013flinHpd+JMOX9TAfgHCPeWhXhhsx+64YgXHnmof2yfr9
9+GGX3/8wbI3SogDRxDvV/Bs3UoRjx6WubkVpg42QnAX2D8jwtMBMPAfDDDo
F7RW+uH1yXm6A6jzFREFgNzuAiocto9Giu48Vu7QqugOqqIdiqTnbCQrNmYj
4lzFpyPMbWyLSmJWzeBhYOL853/S3s+Ri/ubyjrL/QmknVFKq8XEN64p31XV
TOwtGpe7C46Pb0DoHGBitdQN5U40jmnzW4HUWGTASaCCxAQyGncFs9vCoJEi
JMZh8mftwkj9u9fY6Kurh44GWNgX+JQG+VHp+KBBINf5f8Fefkg+fTVZlqi1
yrizk1gEaGqTc7TzcvZ1VTDKbH40yGuBOXrz+lScSNO2ZNSeLTRJN2yTz7ac
s2p1dcXMG86Jb1OGQyZO5hnKFJ7YTJ5Gy3EVbnBlZmXtrqf/8uXAqakAwW3q
IoXxqd5hiYMpfGUz+TpaDsM5er+ixrfiZI57lvMhRdeeSakKcsfw3izv5g1L
PVy8hThr7hxkKRAQIjKVrLsWf8YJaYtJgx4T2wcR+Bu6z+YLS38K0BxZjN+/
HJIq3MunE3DBCFpHYkbj/6It1tRn19EwqlHuvTNNn9lMnn3+mWh1JPPcGbZ7
PbQxfLOHNPkmIuwmfxptIy8qXGTbd6cSp9lDfv7Fu0PzVA8egofpT29++eGJ
NLVCoGy3N5NvbSbfff6ZvOFaIDVNaFpBMBMNq3bjmRzsm6De9zP5LDegOTAO
1azJXpv9I74L+zzVz7e6LVzo7mdGTxCj35oUaw2H6KGReGk5Nq/CzNQfr5dA
DbDkRI5nhCDZrlhTC64yhqtRk3kLBhlXTEZQ1dDjDK3CQATMimKY/QuF6SZB
q/wOpwPmDTw8eveEFTqnHDNqVak52C55TaaVOL+3vJBzupaJQ+PKwyJ4ycb6
mOZHv//ObZRIOe7o4mRHj6Lz2m3xzprxORwUDTAyXgn3BIkSrPWvDPXFV4P4
GNSLrz1pOvvd+2aSqK6dSHEiN3boCEuIVdKdk8OfpRXJ+/HX+99F4R2pTckR
RSwqUVlPeJ6juMzHqHryIlKK8/Ar0cC6KlcmdK420SsMxhlR+sFhJR+OvIKq
kFUO5Fmy48z14W4/Zs4uMYI5D5up9jGSJRFhpLaKBGpoRASMnM/GlhiiQaB6
foQRUDzoo2Aca+oWDedqYeRw6eyrmJAqqBEe7Aw9wU4Es42tdGRBM2B4xzyA
o/Bwg0lkqyr4GtchS4vAkI3Yut15efgzqfYlkPU6oBCMndAIW0P9SISTmH7U
2GcoQ4y9kM7Loi7E3HJYTCSMEsPp2sDbvGWAncC6Xl5va0nhoVmBkKX3+0ga
/3jIStt+ezcrZWVQjurrxgXi8dDqCHYUEkxqTn11mFPZvVHYNerUQ8KyZUUU
DGQI75yuVkvIN9eca9G6sI0AN7CqxDU4gptw6N3rO1powkA3lyEZN9HLdoMJ
mMxB/N+4/0XAxZwNGoWto8OLnYT3+TfGAIEDMmecq3+spldzn4e6Ye/GEUaF
JqP7Vuqo0VJsbWg2nPA9YQtcPaNu0UsBO4OTLq4GUBhe+KAaZ86OBS8LqZWY
uzlE2RETvtg2JUmDkL/3YSiuW7/mTKAWzkVg3NXytwPy7GkHPtgJQuOPBvC+
HsWAX1tQdTj9AJkBgpkP7xjX7zu5pVIpTORXGmmbmtCFEXwhaCIVAYZyTS9P
zfCWyPSsBLvbwt/SiobzJoK8LZ4gt9XYEdFpW+o6uBgT9kqLRw6K57psBc5x
PfIcyxgrj0nMXEJhc2mB2lEm1SvB+fjTR3IyOSNAQiWPXI8VojdzOzYFG9W/
FZCqK9EHuT36OCOABYX/HAJI09CtCGzNElv0K+boJDUCaA4EJ5HQyWXqusYY
UY2lVcNtnmsuXinarFM5xd1sCvd9rO1k5uEpNiNXbtMUWdGFGtRwG8XHjxdU
iKVhQCSaVVoxT7imIJZWo/Rhh6rUWEg2C0bHrxPn6JuWHXHxgvSpteSndCEg
p2ROVNWK7zUZSpO2ngC3TnDTxNHIXtP3Td3MJa+haOecpi8ZsSW8lyfZi/Fl
2b67bqrfMhqwywIYkQJ18/9nyJvlosR/ue9jH1je8GZ98P+wK0J+00C8D6H6
J2mQQ+6cZgZbMMiOSm/+7b/pa+lj1UM/mKzDIOGz0SB0Qztb0ILSf/2QntZX
8yU/IIKSZ3IaIgCEgwTnYleX84TXZR8Fy3EXaX8mW0i1+RHsYANS2P3Tg3yW
LR58730/e3+/43tMvP3Nz2XS+o+PsyqzJA6Mu1smi6NFQXjcX0TxI7gBN8yc
e0Pn+yOOajpG3tlyVe0GQPEBfD/uoCQovQyyf7lI5CFXsAlfd/B2AiVezkDI
xD1zINeZM1SpZQOEAjKxQzfQb2wX9T0Mj1vNROL1lB9VbLqgNUaYMP2rFP3s
KNoOsHnWqSzK3Ve2LD/BJ1Ja6tarJojTrEybohV6KKY8VXOOjSR6pwvUaP3D
iK0xCRyygYx59I0nNxng7RWDQtfdTFnp9bSMc08VXYx3ts7btrmt1ta+LBGR
HkRXQvPVJStLCSaT+NCjzfQ7Ns25sZlE7M1z0QVfjYBqoH5ydyCt5QDiqUFq
GOpjnFbAMShVujRitAGASmaw6NVmjgMjJjbT1CAXANTAbpREAbMmPZips6GD
ItIBI1xevhOmVW+xv9PA/k7SwAKPNz06x0EtV44KH4EzLLQboAR2DQwAITIa
SUL3AnhpRpsP9UsPUkNgL+sNL0yS3uGHSZ0fZhw2F4wLrKC3lUGadIQV5KqT
R66nZli9wrvDNf3YynhjaYfyCpWGa48tiJzjbXXDnQVTLAF9bGBCQY10BGUD
5WylvdmILjTYEBCrTMgXagb1BRzAYWs6wO4lfpdoQtD+xsVk+y07sWU7OOzn
msPxZPx0fEC7bN4C9kYNghiFlsVu/0jRhvAm+UN0D6J+/GeFxjgnMxvYRNyX
fePrbxyIwk7uO92ytugazaNExVRyrsoWKEHFiW1Qy3DlsnmINQ2HIzzMZwYa
tHNxeLYbuVgkPe333+kPgMVVIqj/h+1ycN39oKvqRwuSoEPFf5dFQZSjpGf4
qEFHcVKerzoV12WxnGVdPplnk6a7LaeAFvr9dzwlyMz5wHm8Z3ruTh5cOl0k
vPQvuLkLDtCh5wuS3QxbQNy/CpheAef7hyPGLRUHnXrO3OGVXIDw+AY+0ReB
+1KdTOxRUF+zorB7X2ZiUL6um4FUb1fWkM7YYvBc3oGPLKvOB3JQNLpvx1ay
2rmmxcR+cIAZEVGy7vpoDmnPix96UILLKtmAC1CLGAeIBV+fdgNyZBQQaODW
GEHFyavmCrlJXAG9uF533JmEtC+Mre4FSKFil5uqimfzjnduvjJuHaxgMkqV
eAIs8WwKhwxicpFfya0laAlo17Hkkp+u2OgmVbbWs2XNXmiIBY27sPvVFJEI
xY35KUiqgf//jpwbvb+Lzrnl3UZgY7c5fvlSwt9JteAYb+L0BwnNMxLirbGu
GPl06iCEzJlmnv+X+n8dM6ExDXBb96XHv4IJVbgGkCCjdxyhGw12G3+Fa7GI
eiIkYTsMrRTSHcZkK16v421pFxk2SEfeZXbZoBSOhICVvokutXWD7twfOH8t
YbFfs2dt0bftg98ioVRy8gJeeX4HaffI6vK5SeFRIb3KtAxpRlNM3gU6Kjga
8QHnSArazEdwCEH7FUNrMHTbVy5viPk88PaHA7j6aE50CuGL6Sy9yxkLONnE
AsZ5OBJcrxgX4jd6Plvy80Elt0L1JSECsYDUyQyjDdfcKNG4LKXPeMU53wMu
gPBmVUshl+R9I0MiXNCG4a7nSyLQ7U6UzzckTBILNYMq5O+/9N+3c2K65wbA
tA9wDEku6YP2RQjhFvIXMbu/bHpNgjn9L0TC17r4Iyc2t99J0vVQ4VFNf5fE
7CRQLiOL41IgS5zy6By/EaKkD7BgL0tX4B61PnD4GmFupaCgSb+KUaRpDi9O
ImMVkqiiiRqbVWUnIdTo2tEj7R2Tcb9xlUmcvqMBEPEasOkZWKyhHn2XETXa
xNyh0aXCK+Mi0KzVrg+qNt2pGcuuR35gD+7X0wCkqUy/589l4VP2EXX7aNVc
Q9dQaQKY/aQHrY/d0apaUVXLlsHpw4pRiatG+dQOSp37o1s6t6U9Sj8qbGlU
2wv7wpJk9fT3DIjYQPCNFJaujBLXN10dbCSMYpuB9mWw27h1+ci5bXqnTqE4
PRB17fZ31+HaZ3YaDcyLHtYdKorXxSDxXMGystw9e8ahI26f5I0HKevc/KKa
WdwuC+BPq3lhbSi13tJMG4XKthRo1z0HDC20fXNx7soO2iJjNcvUkTcXp5yt
p9Wsm2v0vSf8Wl0aPXfMmjs4La0B/l4gxIjOAyQT7V7h+sAptYeTgKqvcb3o
cCFQd1nY8GOxjn///dXJ+UV2fkaK9H528PXXZFfq2X1IGDE5hYTqbXfQUVrr
iK0kmrHU5+UybqVVcv9KZwFyQnAUHeoZBKhdVhw25jjXkZVOUOLxTTlqC5kA
2DXbqZsgfIuuT1Nu0cVSftmTRszfj5igHNgmCnePGDW7WbpzVPq9Reu/Zgva
dvQ6a8TLJlO/eaeacS7e6TqYanWv3j0SON5EjelhxkDj+Uliu5FZTqsIwpCP
rOhLXAoJ40EWzqzIe1QL2ue5PeQusKkfUk3+5DKf4mWrWv40nHPV9epjvHCC
zCEVb6od2YaCh5IkEa8OxVUAM+rJVg1MwmIZST6DJB6OkF/3jmt1dwXHn/TI
rivUF2ZgNB6eS9ADNFO/eJ9zGg4gsyStS+kgTQgn0jNE1T3F2mUp7eLVhhdl
Jj0cjchKUUQVYUzgcKhfMQCBxd+43MkDGuBjQPLcgL241Ej3M4CuGpluLeju
G8X3bp922OstOMdIZZFSjN3IE8QaIp0OjBXEtnGOpfqbh30kDPxos2N3b7a+
kBD1hdIRmHdrgEA8V1FYBrlDaayVF1CjNL7v7QStsTOXoERmtcI9BKbKEVkw
48W7tjEWRwzoainhPNHxfHEZUMk4p/xydcW1amES4vI6MFlmJTRVDMCjSo4V
pxjUAZNI15KQ39FPCDhzS8GHcFWXMRSGgrrRvIjbkdiibUHxrghh3ieZGhjO
yFjIQ6AV7zXFLkadecRreIQx3f53g9vmI/mu/kghhUINmK/gSaPVbRg2oph/
h+jwDtbiLqboLMUg6OTrwrciitiBFHjVeqhbAQgmeusJ2Iq+kv2WRM3AgzlK
rBSIP/Lgm6VLUGoYeoKRoDRBCnZuRG20LvakCLY3rntkAWRFNQo5lLq6GYcB
4zGBrKBx7KuwwB2+cUUM66J4LFL8hWu88lLXk9tlyCW+NbcENTFjjutu99De
75XVcMzmtFylJgqTvAvZQ2M44kuSVr9Zj8h2cbl36aNLmnPF1/4sGE2dEOsA
j5wvRvE+M6QKwzVutm9Xxw4kiRMibH6QfM8Zqlg8W953v9kAfslBDC4abLRo
J5BhbFwEhVFcMecsWSs3jvr4uLJjAYvinDdGefatSzhz1yrz7vOqd1vr83jz
zL0QqIk5EzcLfBuyr9zNINff7bQx0znExuC9ejbtUDmES5fXg8KZ8CWiCHhB
zDvsYKX9MWEaWj6ViuVc82/pj8sIYzOgE+2yPu1ydTVMpjjAA2E/NscMinCq
/si4dbpUHKKOi4YQMJo00iFRzWLOmEBvfknCMUn+hwTSNaUN7sUQGzNsOMhU
tD6dzp8gaq6c4nkRobIwCIzUjVjevDVpQyzEDSoJz2iV2XBxKNcr1YmD67T0
uU2IPi4MZveJYSDrpuuUeOREazhN7dM+UOIhssxoPYncxFB6REj54eYdJG3l
DJpbu5g5xod+bLF61gS3CGnRsJMQMSBQXoQiqp/6S203OJIWBrQ0YU8tmWnH
JrbnDf/3HQyBz50TKq6gnWkPjR/zOZqwHIwPUlYzD8ZPRi58+g0dZBwfepBN
xC/To5yMTja8jvlVxF70jPs0408z+tR6v1hnWsYMS18WV6hviOcadN/YACis
YM85VZEogrXSNLlhITB2uSGdpveBtuEbduLiYld9dRK3mI0Io7Hao/Dsicgw
ohwcjJ8OxkKIdEylrahMUTvvoEUoX/mMKwudz9ElUXnoUit5n7G5yusWob9k
VDRpRqS3iN8n2ovENXK/xtkDVKKgWQmv6f1//ur0LAYkOfkBwVb6OAYxOfnh
jz80HEx2KdxQJL4SEQEZ6VPwkkwDJh2lMfygwBvQKzPLp1FmtnyNoNkGXX8o
52azkdEJ0XaQZQCNv6OgdqUWdsswiRdWpm4KqqBhtHJbCu2znkROD9Y3OhGi
J8cXP/b/JKxh8JrZG05m6ooB1D8olLI5honK45mOoT3BIn9ZZ3h4z7VNZnTj
WhL5XfNQ8NmB2QCD0FrkqoRnWqRtAwkbZRvcl5v6HPA4X7r0qucsUjGOcDmK
OK5qxp0Vt7loH95N1Vs490BLD81s1xCKucjUrcNdUgXd2QDKOG1Kl8Nv58Ca
DOYzvzBT44L7ZhpNQFLy/SRcu3F+QzgTV3bTzzu7c1G4LoCAsTHc8MJCVr6I
csXIAL1q83mQnNyJMjrvgQFwyYyFTf2AiWYI2bRHLpq7lR/uTJt7rmmeYW7x
R/+4yQ1np37UzwcZxDKTLeUwOB5ALOcSGrIHScojjDyp8nJ+LhXQSMT88Hlm
oq7RQxeS2fHRmeBtD1jOv/01COz8iZmkn2M5OD8BHY+Vh3cCQvpJsr96Uuz2
B7HliFY0MNx/2XJ4kO3TuD/D+a+fdSZSezZE33iO9jFSeGee3rsfOZVAJr8R
5+B/+7fPtR6X+I1bMNImAnM/+5G7U0j6N1+XoTbSrwXcmu4ttvavD2oxh292
vgzpzeHFufdnJCzRfDXi37TuUF7RsEZepa4SsYeDiu5BhmrWg/n9yvvGEhXf
2vBGstSlKsbUpTu9WiPNQFsspLQE6MIpFzwFIx5qBqT46wPPvn/RFp+ZmbBW
rJdvK6B2rrSRC61w3u3SJxAyidgjgcQ914JyArS22i5Pw5GOcgzEahueomIS
91K/XYp/UNF7z8SlycLfs/Q1OkIL4X6wzhfDpB9+qflNgcPr0P6nYf5Pv3hU
nVBcEqchA1Y5ogpD4ydG/oZ39XxoFG451K04giF0zxzmkm+5oUSrG9/b2ryG
/pSg63jcUDWIpMF9oMm+mBsStF03SoDKM2PdQbx+jRvIU8LVG+Sf+MaNqJl/
z2mYVTCe2zppMTNYEaE2EitFw+cTVRxEIKk7uHh57kk9cmgW0yCBUlJnXHtz
Fz0xhGcFGjecdGt7IGWyzftxONkno7RX2rANgdG0KTpSsNoVh4oGR19Q7Yn+
9KtvpVUrW3L82dOvDp7SZ65juaqgZv/K+eSMs8MzdaZKwTEPe8oOGLWIf8g7
Mp0/wuiQ/oSShtbTItc5cDMxYCYGQRbsDNnQEZGejiIKiCtBE2e6HpT13bKS
c/1BOF/Uw1Z+065lwQqa40wl/5xvJTa4FslNdnWDODqdNEUYim9Y2CksK9ZC
8zgGfgVf8TLxy3GhlddI+V61nQYfqyoMXIhZw4THodRYvBbTcPY5qkxdegLS
9pDe5SWPA3DIFTZn/OkFiXfVIcYfuzpErz88tIZRlfwABvajSxf/GpQuJh92
4sKzoDQxqlj0xYauYhHv7ZUH6m3cL1QMBtGPHkwrPx1PqwfvkZyuaI+GX3P3
z96Hv/+p7wX4vPdr1uHPVlhfvbR7dYZW8JAR52fHaMUD1N5zxrxbh9WGrjIC
R8QeTPXBrermsRTBS+Qvk1Y/W2OQsaoyEIlMpEeRyX8XQli0ZcNyIrzCUCji
dEtlrt2Rj0PabJIHzSa4jOMEQJ9ZKnkrLhNvLf00FoDtAS3twdYCaiyjPb5i
b+5Jb+4/7G4tbAyv8fCm7SUNjlkzD+5Kl5KLDLveZS4XOesXdO1HJYt5oh6B
bQWIvL4wDAVvp4OFhasfeJx0qSa9Vt2Zi1BdlpK1Ifctrmxa/ksOZTNKhs+U
cL7cBN72H8UpHNyOD2c9x1jJhmIRaDh8Fe7cdc1tOKF6hfK4MiRFB8rKz5YO
7bKypwyd1E7VWb09sX00jPTJnnZm9OCr+j3+22a6BIfAFVMUmwefOUfkLMrE
mUecUxHNLQ4h3FEDwcnUlkNhHYUYZqRfF1J2CqXAxy4qxgxKK7uN3piae8HZ
3nqvyxDoDytoIKH6VRkvieKx7FM9Yq0gnKNRh61Rna/HqYYTY111g2zQKbeX
l4XhU37yVKFbg8MSAMZqpH0RhdcQO3epCGbADEEae/jRfwaRUM0iDeVgH7AL
fYlVT4oQtjVXlN3IBoxEE4h6iJgWxlkcdzlV71GHR2JtCDScRFB8j5yg4lHS
vY8M+VacQMQXz8b3l+xx9psKkLyL8ljSqBzRurggjYO2LChO0Th/v1YBqabp
yRti8Wf7lnl68ibDr3pqMB67e/St0zafLbcWADJeyp+/zsSd8zJfSyKvD6ds
lut6i4Mm6TzSiaK15FUIQ7eRryoxdM11CIzjDl2vNckvacOhglhTuCoF9vQo
6tpP1rcqTdWvlHytHh5R4Z1EtoOxTYnfUBTlZzuQ4HaE3D5C4x26n/2tHydw
ECLy44bwfR02hlA13nmW464WrBzvDAAiDBkWvZl/iH8dXMg95LSv3kXOraPb
O4JfhkYY/DD80oP18ocgWd6vricf7hM4H4IphZfWZ59J8uVn+Em+dNPa8EsP
h2lfaFTO/3z5eWbCuzoe/nHv2vJ3+e7gZRB8N+XreOfs4pwUGykQp0/1u/zj
cvXcN9y/RJ5CGHrVIvpu72fc+1eg4cqnn7Re/vJWWva/t+VJGUS0Yr6fxC2m
u4qJ4zJ0q9AnY6a2QYZVah4k+AIGCV/iOEjfOPjDgyBlI5jJ5useMki0PV+m
kWLy4Jn0Bsk3z/iXn2d37hsl+m3bY7qe/zx9OUr/4/z1KzKqfnj9hmyz5WQX
6+Gl/vLijJ/a8ty963nYTO4bJSb13eshVen4/OLo9asf914d8/+H9m3Lc3ev
54ET+dzrwQ9Z66P0/Pzfw/n31zPw3L3787CZbHEunUOv6wbdSfKn7fBUnBjk
qvDZUM4Xkq1cIiv9PergVy3DmKrjqOMy2nedyB73Za5ecl6VoW9OG4AqXJjG
fe9FluhFNrozaXs0bOsl8T3gZftITXAyDwK/e+f60HbaEfaq5br4YOBELpgK
+nsXZF9fdtzBXEzCqFmP64/EWR9WyIO4VYyI21oyF0dPXGtaEs8CoOGSW6+5
zxFybdiU5/I2LjjmfoUNr4gNR+AxIs1bPfO8XE6bu3TgINMxuJQdxYwtIMTj
FpIwTJHleIl0HdlTGhzU+Z6ZOo+/4/reZt41IHXhXcKpy11K6hdSPRkr8u//
K2efyJP9g+/+N7LjFNynZz4myStfce8tIy1RVlDaznIPXeZ0W9zmVdVJVjkj
LknWVYOSYy6Hv1rlrUsINNjrqLtHF3ikNMX5OelhZ3SWimXHsK/y59aBL5u5
F9R0sh+t39NmyqE5rUJLGYtJy2A4X0z67XXa/wdcRcsQrPz0WJC9mQpnTclh
YMklD9LvAarEfNn6MiwJsmgtl83Flbso3KzD0EV41w0CT07ZK8cIlqg1AtON
ZXLzzqIb86IG97G0RWrL2dVCEUWrZvIuwMD1LOVaKrD3jb0o0TvpnLT0RiGi
5Ki6WY8c3/AZClp/Grzx447hQ5HVECyQlvduYHl1UV5dXzbyupNZ4F0EADs3
HS0VMXhauF+5UDufwQPrAmB525YKskvERG8p19g8iJ+9M6yMANdlnPwYN8vR
5x1La7m0+KjiLAAu2mBBht+u6Tw452TUfjYRhDhktfqj4BEwxihdqqRY1TrL
R9BDcG4Ey+gdON4wc6jp4OJ738SRZ4I5bBnBpNXeHIYV3Uuu8F5yA6pWx0hc
exYkv48SdU16XMcubn/l0xgew+9GTAGvKaD518xbjSYDW/cdprNlGQjGTNgu
qQvd0kCRIG5YMy+MQ8h2yciIQHsAQltzSyeXBGAtmB2AZCAVGDgR4LhGfcjA
nLgCR5SBzUMYPGCktdbwvXA11f2cThxAD/7jakEMHEXaM/sHEi9fDg1gJGg6
kINq05xT44FJDspauBo9FafFomq0fzHXrEmf9pEmth//kvz04uwNKcWk4tC3
6jJPj47ODoVHuMhFKpLslW1xtaqcHIZWEqxFc+jd6WFtQjsraOnLdCXyg/as
cDCP1uvAwTdyNJt7gPu11gNQMpwkPuxGTX//wv5CGluoNUWdq5aaeuYAeMQn
6VurhdjUZBJBL3zu2rwFFbs0GJFgSn85HEDN4Se1OY52+KFD3NR8sEiLaWa7
rh7ZqQkGJv0ltLasrDP6PJuX02lV2FTSjRrwgXdrDFJfrTG+xLQnFYMkoq9K
no90vIDzFUdgczJvClYJejPQN/hpOJLYN5MLh91R1tosjbP+gr2R4EHQVVSz
qtlNr1cPS3XXDXJbVxEtxAWX4iWSoz1bkS6XT1GZorAeUli1yC/LSrBjeiLC
FYGLTmqoDLSYWwAXSZjKoQe5shcapbe0hDlDIphQr8rOo+Aowlr/jg0UJK6X
KKWAjOdcBvBBuE0P6038T8B/4lUdp0wO0GbkOtc/liDLY0Pkc/YJSXeb5kbt
GZM/bLEQJe3pzjn0fsx6wTbKhMspYqyYTjuaXAYtOEYCUoWwDS5f7IoIMqnM
ERiCTFuBJtbZ5J10WFVNxCGF4oz1E8p40VJJzFeOr3pmqcNV4pXrfK67NtiF
1TWll9cmPvJkWXBQULj1SJRFwCD10vAz4DrNwpSWF1GZZibgAGAxneKeosLT
7DLfxkSIsxwIj/k+tI8Z1gqioHgPCk57i8DUGf5pahgk22K+CFklPxfFwild
XT7jIrJ/QP9wIGpRLp/I5u+Znvie8Lc7SpewgE2z8KeATULVAnjwPIgbboPN
4W4CXOKIiIKBb2lZ5X1rG/FJlnoounGsgArM/wioYymjjj3yGK0CCBr19gjQ
yZra8MN2JcLNXUcSu/41t0Bafv3Pi7NRGmCXYTKyf7wE633BWJa+tl9CjYog
WIqN7rv4bITaJOfUg+75BIxaVh4UIm3CEKvGFdcSO13KFUFqxDcUgioBcMJX
dUn76jrx+AJp1yklxvCmY7zRY8jhv8rBZeAlH3eO5K4gCwk4kWVs2JuYLYhP
ai6B9y16VOdUK4LbLVl14bPxk/HXG6F/bZa62QvJF5RvNJJxILZypO3cYH5K
Ir8OGNMcOF02Vhul9/Nh7TR+Ka91UvNxZ+PouYpx1KJ2K1a6D4Vde1rBAxMD
avrJOSRkqZH0ZbwlG1FIbsgvi6p/K8h6Q/KYiddvfg1RVFhBdn/u6HAMW4Ye
hAzQ4gC6U4zxRsFbH3fxutl8i5ZlqKyWQqpMhx42ao8lm62ouMKfxbbBi0V4
I3gUxbE5+1Auc8Fd3LKQJAbsPuxcF3MrcMU9/fI8SKxC1F/KdQZI6BefSOtW
8Zuxejux/OCRCAmaHcDiNdda+7rIcu1wCZkhHFZm7bgca5dQkfcmmMayXH0K
g/ndLl/eVPtmlrD5YnBRpOVz4gmr8HiNXSdBPzGbskHU07+ambf75FvyQkFK
4gwezZeTFs9Odx2rFP7qq2ecM3wclN8HpQGmCjHmuGXS3dvcXa/mRKxzIGYV
k9xgufuN2eTLd6S/MLas6hwoh/FSecfX9LaFZhhp7k+YrMD+WPnzrnN+Ak0K
mkCCbXP9pdFFxcF6zYo87NpkXmLGIAnwnj8ukcbVcrJ+vvbWPm5unqkDCjFE
CeArSGcZq2X2cHC4cQTkbK3twR0kQTBOrn2+uQWpkjnOjvS75pKiDIzcMKA6
xfi+4S6KPF9NZBJAj3zKNZwB9KVzLJkmu1IMDS2jEMxP5k6XKMVXRNltpBvh
dTqMOl/A9rZxWL+5QEXdzQFDHzS7YhNDOxhpvs+vYSFJwBLEBWdtYXD7mD5U
bU0eZQtRk+Ljs+5hOviu8DpcqhAEhismuBMCFsr2/XO9NfDG1skTB5PCrxfo
LK7dZZWpjpdw1US94nKPQuL0gKXvkwbdqnVotdFZsbvyF4+aYepRqEcZSUXH
DwC8bEYoEgkEElt3KS4FJ5u4lL4OKlP8FXo4YG0rPTRaYjibSpsB3O6AXLHx
/vrcDUWnA9rRLL9sBZ7MGVBn6qyEA1E32171zwjHJMRN55siyvfNucd6CKc0
Tg7rCKXXXW75TV5Wpg9IHwg61AChw0bIRUhqJGMtNbxf7thaSZT0JAFbMQLc
EiaaY6Nei4mNRbPNJl73Aaomnqoms7eZZLqitb8Rkty1vHjcBdwWNt/jimex
3fNh05+25Sf28bmWoeFTWLlTJkWsJJbfHAoCxftmCYmSsTBgE2K14PGGFAiB
wmAVetBjpQYOxnt82DXvZPL0h8dyxT77FuVPAnIh6qfo/opwpDaJhZBWChlU
p3FzzLirqE84DXuYJNYRFU/0dLBIHexXDQ59gYiovUt8u74g8d4r3jRPb7Cz
C6fIp7GV4v8+Tv7+v1jv0Q6L4jIBMhx0LUbeYcu275zQiR4dWmeZmEPo2f9t
dU+M3OjCJGEus2WF0xhXXB7qsGFlmoED6w6db1N6Ra0THARjQG+zCohUwTvk
HPadN91ou4YXHkfnsyJeCnOJA56GRht5Ns3WNhcgK2/g8BIw/z3gXLiMgZgq
PBpq2Agtinxx/ZpGiRBXij710AiDlVFPV5Vjri5TOi95txOjDOdOIh3DZran
3BqDigzxYXDQ8jZtacvpEbV5dvRlu2Mt3cWiwcVb1NWBxkGGyWAlBqGsjSBJ
kxkNfw0fsGE7u01z71WpCaiqUHJGpA1f8Ng7IYwE4+SinBfZD+y9+KUuM7nG
yw3M8yHEjOVqmpP+6fuK1ZGKp8jTiVci3JqG9E2b0p6b/mQ9qYTn7KGQz2JA
dqxT0SJh0LtQYzNkKA/6J1lWJ9Cwb9Rgs6aM2nMxFFUDr9q5LNaN3gMbOMff
0/ktpGB993tGFurp1ryVo2AfA+jHgKMsPDnPp4X0yQDWMg6bBSJ1OhzJVjhi
UV0Dc9rd7iI1t6X4mzgyFebQAK1wvwAZaT7nSETgW4mEPiNVZ86t5uJ3LNck
byMzhPCgY5feUx271WVvEaaLGo901rtziqDlutdRBce4aUlbdjA4xJ+5tYDu
N6JJdqTzwO4oHXABxlVjAmMed0Z5YW0ldoe+zz1VxToPHEegoIBdui4SJBgW
rOQ4PMrhTuJB47LBNiTSafyla2zmZI93d3pPJs+uc4Xv0A8Vn9eiGWL9X1uj
6yhNALeQRELuauMh6ftAsRS3wWZvdL5dPcxsFPEZ6OoQGxO9B4LA9jRYY2IN
UaBlsKPBqcwexDSftE3njhJ6q+k96Dq4xuy9Y9B3IO9tvk4k7lKnj1xHm0fu
gh7qarMSIe2yD3yHWtpDmrf1tiEKo1NN4D7vt0lxV82VNW4zJ7P52+NGHnCO
ST8W6BIAIJ9u5QgJb4etBArfJQm9QiRaMifRdGOW28uoW0yyoTbRVBnvHS6h
Jh3wJ4X4aq5REH1rYUYUEg+QTJfP0SAsYa90J0EBtKqRED4DzxesQMzkhs1v
GjKpgK3H9y+L9oEuMJkDwNJ+O0cVA3GPdGXGso99CG1m/SkKbs2SSmuWcA++
j1EtjIHdgNwuha8l634Mm6eZexB4Cbiu6i6E1LDQT5T0EbSR9zDKtI7XslZr
BzKNfdppVc704g2kYYD8xxcPslHKRThzcSCY8Zqwdw/3Q9mJNBxJQ62pmB79
7hcszhkppOBGW156+sOiqRSxUeHw6GLmNgPY/D3TkXNYGThm3cTgzGJIck6h
ayhofvnYShnolyXxUfNTOZVBenDEp1BD4RIxs1A+eIH3Q9iRju81MsBSC7wF
bS94X+WGkBwOZAg0jehEnD0wZkhLDY85ugSvCpr/iE+M7VF0vDYdoiApvxRS
sviT7iSBy8O6OpF67bQ/BcVemB+SA9NbG1kkX0Z3WjA9CJ76sm1QtOriBD2I
GsChYkpOgeeOcxtaFyqnkTS12eWkcxoU965QNwFGuqdnB10Kmspk51Pj1Ikr
xPVRM04em1V5d00EO/Vk5yQe5HYFgEjLzcwPns6FVHJCWSYlgtvxSGdF9OMR
a5oTisRwScv5fKU4wzofZ5uvFlDxJMcxNxwdZxBYql4iGpk6xJc0abbKOfsR
6RrcGkqhnq0vuRfQxJkMj2tgIE7hOZlpLJnPvgAzyznjVGCT5ERHw8bxaTXO
mCbKVoWI/vj+GMrpGW2aCHG3rsSprJgErF6WUAxwsyq7a6EiO+U2M440uKOw
LY55NdNyO7oSMpYd1Lq1iTk5jeDAi+CAs+Zo0eqw/xmjnSDVdSXoSzFjmEMq
vNTxdL833EISgAMHRZJbLebwElh5PQ3yuhQagOaRNbPsksHYYXrwP6MOcX2P
g11qO13Q3PTp+MmutkThGLc1glLVyDwOPqTkoaGsIzBLHuuYhjNGXLUg84f7
5/Dkt3eG6kUxdBm9pgEIMnLlfMzmQmaGZT1qzEkhsMd8jhqkPCvkvnhR6o04
RW3RixDLl+toEflJfJXCr8ExRRzQQV6JcKldtlFQM+ubUiUDb2B2ljNZvKdj
wM4sB7Tsm9eKnr414SFMkGBn8aJSxCtu7tpyFwnp/ZKJfJ/7KtaBHWEz40i7
OoX9ypzJoMqlw8DY1g00agYZt14zv51DjXLKbs8ssaylSLiY6wyRLiTKSscL
ITZjwgeRPmEZCdRyJQ2vb0uZtG+2pKfMe+WM/z3mnCAqayl73PrdAnjW9MwQ
x0NRz64A5ABKV7+xVIWin7AUsLMmCdKJcYWAZOdWo634ilt5zC8flhw6NRYC
Y7vZ5gCni8kTcySjvqeHQACclu+5vL0HcI0miui3x+L2gDgDiDblb0UXcX+u
eezBdKyjQezyTay1CN8/VVm/087kmq7o0v1cOLNX3QQ898ZaClriikeia9or
YigpjvAxyqpkjAmZo5XPDB1QabxYmQMQDrJSFS1d6fZElVGyqhlynJXMW06p
bpb3l85/xE+/eN6BUafbfz7gMSEaTu1dhet3DRIjwD+owvr+H5rJKY5Cboq0
9Ejiw17flG1Tz/uLw9wZQKK50A94Oc1WPdeMxVY1ThsEgOhjYpdgkFQtA5bt
gR4bdmqU1IYuHaiLt0FuC+T2Sv6MnN3OunfPp5rxKltxxyBxaG64ADqkycAg
jaJdGKbKnTr3ePsgjMJxfpZyw7fvnmqvDzNI4AkppIXKHcvBVsQG1Ect5zMx
21nkamNvdK8JeH8m1lFXlGNdTpSXfPfWuEHcTflnD2Dccf4z0oQ7m8r6iCWi
Gz3MGLiHJsQoJ9rJ+w6Hqjok7qAJO/nQKMQli4RjQE0QXwvNeoAmxmwil9EO
7F7CDtGElxOWLEpLPe2BJK67sIf5h1g9C2bi7pcNbzZxngkKv8Xx1GyQzabu
d/JJb5DPxCdHEkt1/GAhHSSLcDx9Yya/CnYvngiW04hb2UeZAx6DjelLU5lP
ZOwdjsGHNGH9MUo6DFNNA2sBg+QOWzUm7Ef8fLCecBu781GDmOuQFeiX539u
ELUs+ST96Zm45tvIqvyzg4SetPHuZ9YKAiApQZE9eX2+95IbML78mZsvumrt
DxEIVBoy2+F0K6wdOzX8O2iQ89d7J8dH6cF333yznz3xg5yGWp811kQeAPbA
j8A0iUCrwpmY5UO2cYZOT5bUi2qglh2TnrB9SrvdCfwTXulXQxsejvQhg3id
Osws12gsnAVAZLxvkLB3mzc3hvlkY5DPxCdc0g3NKt4HTelQ8HBnxGEmb8yy
lA3j5VintAf+fJDxN2gCZsOwmYaXUTtbrVB+zbXL+t3t2IhGWjqT18vlonu+
t3dFL1pdjsmY2nuZX3bPvtrDo9k8p6VlOvjw/oQG9b0L6lP2zwmDGO7wT0qU
mIc/I6fg0vGzC9X70M9/z3I4dwRwdsxwGjjnJqRblsO9pMLl0CA7rmXV30pi
0Fv6Mj1El1Or1WpBvX267Qge+w5wvoWXBOyHeoD8C48gCIvLOHTbRGL23pl4
KbuwkRhIY/vPB991SmCL4kEUSeOOAWSQAKkcN8wHW84Q7sjWQVKFN4+X81E/
+EYE+vTnD6Cf+p+eSbTmz2dnNB1H/498Nfo5ooYtQxFHRhjf5cN8cn54dNql
x0dnu3YNu1y06wEBPjxI3ks/lYKaIkj7un8QXOYBLqC2aRSPm6Vra3htijSo
4ZkgK099WC7ZWLzIz7ftzuYgevMYgWVWrVH3wYPQj/grFS+gs+JcSZJCuI19
kuzZvGOQnMshLh9wod6xnNc1J00zUQ5le9oAlKdqmndqTN6poUgemwDLcPsU
6QGXc6c4ElK1mu//KvHo8J6cpw5gT8uVA3vyHjz5fCvS0xdfsLcvb8tOUX7k
gro4T/fkwLw6PkyScwYN8rEIzUneqHeQYk0OCoYQIxwLqqcZkD2SeT7hKKmD
Xjk7ElpW+WLZLIh02pPmmwg7NARGMu97wmZc939RRP8viuh9P///QxG9f5T7
fwI2+dMoop9Fpj0MRPTeUXiQ9FWTHr+XVAD3VT/IB3bynPfgRB1K6IcHQZIi
/HGHNmeD9GBJN2dyN8vK44ba18mqeoM8kCZDPw9CQR0eNX3YC/xKBxBI6ajY
DfPhYYMMIJDivJ12V+HO3TPIAALpB2naQpri+IGDDCCQYhBcdGeH2QMHGUAg
xSAXr474n/9lu/OZtrgPQarLObvI4Kv9lOV8EHCuT6PJB9JAFsDHe+DuKOzo
yAGRjrCc+SRn7eWBgxy9PuwbnMEN8eEhUu9huzP81MN/Epna8E8f3nTLz4fP
MxOn3YZNGWn/s2NSIcmObjOorAKIqPpuKFjAKfQkLO42dU9u14DTk8NXh5vg
Wvj0D63Sm9M599VFdRNWKuE55DvQzLlMIwl//j/zndeClisBAA==

-->

</rfc>

