<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.16 (Ruby 2.6.0) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-stir-identity-header-errors-handling-06" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Identity Errors">Identity Header Errors Handling for STIR</title>

    <author initials="C." surname="Wendt" fullname="Chris Wendt">
      <organization>Somos Inc.</organization>
      <address>
        <email>chris-ietf@chriswendt.net</email>
      </address>
    </author>

    <date year="2022" month="November" day="06"/>

    <area>ART</area>
    <workgroup>STIR Working Group</workgroup>
    <keyword>Identity</keyword>

    <abstract>


<t>This document extends STIR and the Authenticated Identity Management in the Session Initiation Protocol (SIP) error handling procedures to include the mapping of verification failure reasons to STIR defined 4xx codes so the failure reason of an Identity header field can be conveyed to the upstream authentication service when local policy dictates that the call should continue in the presence of a verification failure. This document also defines procedures that enable a failure reason to be mapped to a specific Identity header for scenarios that use multiple Identity header fields where some may have errors and others may not and the handling of those situations is defined.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>The STIR framework as described in <xref target="RFC7340"/> is an authentication framework for asserting a telephone number or URI based identity using a digital signature and certificate based framework as described in <xref target="RFC8225"/> and <xref target="RFC8226"/> respectively.  <xref target="RFC8224"/> describes the use of the STIR framework in the SIP protocol <xref target="RFC3261"/> and defines both the authentication service that creates a PASSporT, defined in <xref target="RFC8225"/>, and delivers it in an Identity header field and the verification service that correspondingly verifies the PASSporT and embedded originating identity.</t>

<t>This document is concerned with errors in validating PASSporTs and Identity header fields and how they are communicated in special cases. Specifically, <xref target="RFC8224"/> in Section 6.2.2 discusses future specifications for enhancement of how errors are communicated and the handling of multiple Identity header fields. This specification defines a solution to help address the potential issue of multiple Identity headers verification errors. Additionally, it addresses the issue of the current 4xx error response and that when there is a verification error, the call is terminated. In some deployments, it may be the case that the policy for handling errors dictates that calls should continue even if there is a verification error. In many cases of, for example, inadvertent or operational errors that do not represent any identity falsification type of attempt, the policy of continuing the call even though the identity is not verified, may be the preferred policy. In these cases, the authentication service should still be notified of the error so that corrective action can be taken to fix any issues. This specification will discuss the use of the Reason header field in subsequent provisional (1xx) responses in order to deliver the error back to the authentication service or other SIP path network equipment responsible for error handling.</t>

<t>For the handling of multiple Identity header fields and the potential situation that some of the Identity header fields in a call may pass verification but others may have errors, this document defines the method of adding an identifier so that the authentication service can uniquely identify which Identity header field is being referred to in the case of an error.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="reason-header-field-protocol-stir"><name>Reason header field protocol "STIR"</name>

<t>This document defines a new Reason header field <xref target="RFC3326"/> protocol "STIR" for STIR applications using SIP as defined in <xref target="RFC8224"/>. The use of "STIR" as a reason header field protocol with the <xref target="RFC8224"/> defined error cause codes allows the use of multiple Reason header fields defined in <xref target="RFC3326"/> and updated in <xref target="I-D.ietf-sipcore-multiple-reasons"/>. Any provisional SIP Response message or final response message, with the exception of a 100 (Trying), MAY contain one or more Reason header fields with a STIR related cause code defined in <xref target="RFC8224"/> or future specifications. The use of multiple Reason header field is discussed in more detail later in the document.</t>

</section>
<section anchor="use-of-provisional-response-to-signal-errors-without-terminating-the-call"><name>Use of provisional response to signal errors without terminating the call</name>

<t>In cases where local policy dictates that a call should continue regardless of any verification errors that may have occured, including 4XX errors described in <xref target="RFC8224"/> Section 6.2.2, then the verification service SHOULD NOT send the 4XX as a response, but rather include the error response code and reason phrase in a Reason header field, defined in <xref target="RFC3326"/>, in the next provisional or final responses sent to the authentication service.</t>

<t>Example Reason header field:</t>

<figure><artwork><![CDATA[
Reason: STIR ;cause=436 ;text="Bad Identity Info"
]]></artwork></figure>

</section>
<section anchor="handling-of-a-verification-error-when-there-are-multiple-identity-header-fields"><name>Handling of a verification error when there are multiple Identity header fields</name>

<t>In cases where a SIP message includes multiple Identity header fields and one of those Identity header fields has an error, the verification service SHOULD include the error response code and reason phrase associated with the error in a Reason header field, defined in <xref target="RFC3326"/>, in the next provisional or final responses sent to the authentication service. The reason cause in the Reason header field SHOULD represent the error that occurred when verifying the contents of the Identity header field.  The association of a Reason header field and error to a specific Identity header field is accomplished by adding a PASSporT identifier, "ppi", parameter containing the PASSporT string as an identifier for the identity header and corresponding PASSporT that generated the error to the Reason header field. The "ppi" parameter for the Reason header field is optional, but RECOMMENDED, in particular for cases that a SIP INVITE contains multiple Identity header fields. As implied and defined in <xref target="RFC8224"/>, error codes associated with STIR targeted at authentication services that produced a specific identity header represent a single error occurring with the verification and processing of that identity header. Therefore the association of a "ppi" parameter with a Reason header using "STIR" protocol MUST only identify a single cause code in the context of a call dialog defined in <xref target="RFC8224"/> or in future documents defining STIR related errors. The PASSporT can be included in full form or in compact form, where only the signature of the PASSporT is included with two periods as a prefix as defined in <xref target="RFC8225"/> Section 7 to identify the reported Identity header field with an error. Compact form is the recommended form as full form may include information that could have privacy or security implications in some call scenarios as discussed in <xref target="Security"/>.</t>

<t>Example Reason header field with full form PASSporT:</t>

<figure><artwork><![CDATA[
Reason: STIR ;cause=436 ;text="Bad Identity Info" ;ppi= \
"eyJhbGciOiJFUzI1NiIsInR5cCI6InBhc3Nwb3J0IiwieDV1I \
joiaHR0cHM6Ly9jZXJ0LmV4YW1wbGUub3JnL3Bhc3Nwb3J0LmNlciJ9.eyJ \
kZXN0Ijp7InVyaSI6WyJzaXA6YWxpY2VAZXhhbXBsZS5jb20iXX0sImlhdC \
I6IjE0NDMyMDgzNDUiLCJvcmlnIjp7InRuIjoiMTIxNTU1NTEyMTIifX0.r \
q3pjT1hoRwakEGjHCnWSwUnshd0-zJ6F1VOgFWSjHBr8Qjpjlk-cpFYpFYs \
ojNCpTzO3QfPOlckGaS6hEck7w"
]]></artwork></figure>

<t>Example Reason header field with compact form PASSporT:</t>

<figure><artwork><![CDATA[
Reason: STIR ;cause=436 ;text="Bad Identity Info" ;ppi= \
"..rq3pjT1akEGjHCnWSwUnshd0-zJ6F1VOgFWSjHBr8Qjpjlk-cpFYpFYs \
ojNCpTzO3QfPOlckGaS6hEck7w"
]]></artwork></figure>

</section>
<section anchor="handling-multiple-verification-errors"><name>Handling multiple verification errors</name>

<t>If there are multiple Identity header field verification errors being reported the verification service SHOULD include a corresponding number of Reason header fields per error.  These Reason header fields should include a "ppi" parameters including the full or compact form of the PASSporT with cause and text parameters identifying each error. As mentioned previously, the potential use of multiple Reason header fields defined in <xref target="RFC3326"/> is updated in <xref target="I-D.ietf-sipcore-multiple-reasons"/> allowing multiple Reason header fields with the same protocol value, for this specification "STIR" should be used for any STIR error defined in <xref target="RFC8224"/> or future specifications.</t>

<t>Example Reason header fields for two identity info errors:</t>

<figure><artwork><![CDATA[
Reason: STIR ;cause=436 ;text="Bad Identity Info" ;ppi=     \
"..rq3pjT1hoRwakEGjHCnWSwUnshd0-zJ6F1VOgFWSjHBr8Qjpjlk-cpFY \
pFYsojNCpTzO3QfPOlckGaS6hEck7w"

Reason: STIR ;cause=438 ; text="Invalid Identity Header" ;ppi=  \
"..rJ6F1VOgFWSjHBr8Qjpjlk-cpFYpFYsq3pjT1hoRwakEGjHCnWSwUnsh \
d0-zckGaS6hEck7wojNCpTzO3QfPOl"

]]></artwork></figure>

</section>
<section anchor="removal-of-the-reason-header-field-by-authentication-service"><name>Removal of the Reason header field by Authentication Service</name>

<t>When an Authentication Service <xref target="RFC8224"/> receives the Reason header field with a PASSporT it generated as part of an Identity header field and the authentication of a call, it should first follow local policy to recognize and acknowledge the error (e.g. perform operational actions like logging or alarming), but then MUST remove the identified Reason header field to avoid the PASSporT information from going upstream to a UAC or UAS that may not be authorized to see claim information contained in the PASSporT for privacy or other reasons.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document requests the definition of a new protocol value (and associated protocol cause) to be registered by the IANA into the "Reason Protocols" sub-registry under http://www.iana.org/assignments/sip-parameters as follows:</t>

<figure><artwork><![CDATA[
Protocol Value   Protocol Cause            Reference
--------------   ---------------           -----------
STIR             STIR Error code           RFC 8224

]]></artwork></figure>

<t>This document also requests the definition of a new header field parameter name to be registered by IANA into the Header Field Parameters and Parameter Values sub-registry under https://www.iana.org/assignments/sip-parameters as follows:</t>

<figure><artwork><![CDATA[
Header Field   Parameter Name   Predefined Values  Reference
------------   --------------   -----------------  ---------
Reason         ppi               No                RFC THIS

]]></artwork></figure>

</section>
<section anchor="Security"><name>Security Considerations</name>

<t>This specification discusses the use of a PASSporT as an identifier for cases where there are multiple identity header errors occuring as part of the Reason header field response. For some call scenarios (e.g. diversion based call flows) the signer of the PASSporT(s) may not be the first hop initiator of the call. In those cases, there may be some security or privacy concerns associated with PASSporT information that is passed upstream beyond the authentication service that originally signed the PASSporT(s) in the resulting error Reason header field. This specification states the authentication service MUST remove the Reason header field with the PASSporT to protect the security (e.g. use of potentially still fresh PASSporT for replay attacks) and privacy of any potential information that could be passed beyond the authentication service response back in the direction of the call initiator. While this specification allows for both full and compact form of the PASSporT to be used as the error identifier, use of the compact form is RECOMMENDED to avoid  the potential exposure of call information contained in the full form of the PASSporT.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>




<reference anchor='I-D.ietf-sipcore-multiple-reasons'>
   <front>
      <title>Multiple SIP Reason Header Field Values</title>
      <author fullname='Robert Sparks' initials='R.' surname='Sparks'>
         </author>
      <date day='23' month='August' year='2022'/>
      <abstract>
	 <t>   The SIP Reason Header Field as defined in RFC 3326 allows only one
   Reason value per protocol value.  Experience with more recently
   defined protocols shows it is useful to allow multiple values with
   the same protocol value.  This update to RFC 3326 allows multiple
   values for an indicated registered protocol when that protocol
   defines what the presence of multiple values means.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-sipcore-multiple-reasons-01'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-sipcore-multiple-reasons-01.txt' type='TXT'/>
</reference>



<reference anchor='RFC3261' target='https://www.rfc-editor.org/info/rfc3261'>
<front>
<title>SIP: Session Initiation Protocol</title>
<author fullname='J. Rosenberg' initials='J.' surname='Rosenberg'><organization/></author>
<author fullname='H. Schulzrinne' initials='H.' surname='Schulzrinne'><organization/></author>
<author fullname='G. Camarillo' initials='G.' surname='Camarillo'><organization/></author>
<author fullname='A. Johnston' initials='A.' surname='Johnston'><organization/></author>
<author fullname='J. Peterson' initials='J.' surname='Peterson'><organization/></author>
<author fullname='R. Sparks' initials='R.' surname='Sparks'><organization/></author>
<author fullname='M. Handley' initials='M.' surname='Handley'><organization/></author>
<author fullname='E. Schooler' initials='E.' surname='Schooler'><organization/></author>
<date month='June' year='2002'/>
<abstract><t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants.  These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3261'/>
<seriesInfo name='DOI' value='10.17487/RFC3261'/>
</reference>



<reference anchor='RFC3326' target='https://www.rfc-editor.org/info/rfc3326'>
<front>
<title>The Reason Header Field for the Session Initiation Protocol (SIP)</title>
<author fullname='H. Schulzrinne' initials='H.' surname='Schulzrinne'><organization/></author>
<author fullname='D. Oran' initials='D.' surname='Oran'><organization/></author>
<author fullname='G. Camarillo' initials='G.' surname='Camarillo'><organization/></author>
<date month='December' year='2002'/>
<abstract><t>The REGISTER function is used in a Session Initiation Protocol (SIP) system primarily to associate a temporary contact address with an address-of-record.  This contact is generally in the form of a Uniform Resource Identifier (URI), such as Contact: &lt;sip:alice@pc33.atlanta.com&gt; and is generally dynamic and associated with the IP address or hostname of the SIP User Agent (UA).  The problem is that network topology may have one or more SIP proxies between the UA and the registrar, such that any request traveling from the user's home network to the registered UA must traverse these proxies.  The REGISTER method does not give us a mechanism to discover and record this sequence of proxies in the registrar for future use.  This document defines an extension header field, &quot;Path&quot; which provides such a mechanism.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3326'/>
<seriesInfo name='DOI' value='10.17487/RFC3326'/>
</reference>



<reference anchor='RFC8224' target='https://www.rfc-editor.org/info/rfc8224'>
<front>
<title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
<author fullname='J. Peterson' initials='J.' surname='Peterson'><organization/></author>
<author fullname='C. Jennings' initials='C.' surname='Jennings'><organization/></author>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<author fullname='C. Wendt' initials='C.' surname='Wendt'><organization/></author>
<date month='February' year='2018'/>
<abstract><t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context.  This document defines a mechanism for securely identifying originators of SIP requests.  It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t><t>This document obsoletes RFC 4474.</t></abstract>
</front>
<seriesInfo name='RFC' value='8224'/>
<seriesInfo name='DOI' value='10.17487/RFC8224'/>
</reference>



<reference anchor='RFC8225' target='https://www.rfc-editor.org/info/rfc8225'>
<front>
<title>PASSporT: Personal Assertion Token</title>
<author fullname='C. Wendt' initials='C.' surname='Wendt'><organization/></author>
<author fullname='J. Peterson' initials='J.' surname='Peterson'><organization/></author>
<date month='February' year='2018'/>
<abstract><t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications.  The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination.  The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel.  PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t></abstract>
</front>
<seriesInfo name='RFC' value='8225'/>
<seriesInfo name='DOI' value='10.17487/RFC8225'/>
</reference>



<reference anchor='RFC8226' target='https://www.rfc-editor.org/info/rfc8226'>
<front>
<title>Secure Telephone Identity Credentials: Certificates</title>
<author fullname='J. Peterson' initials='J.' surname='Peterson'><organization/></author>
<author fullname='S. Turner' initials='S.' surname='Turner'><organization/></author>
<date month='February' year='2018'/>
<abstract><t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers.  This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t></abstract>
</front>
<seriesInfo name='RFC' value='8226'/>
<seriesInfo name='DOI' value='10.17487/RFC8226'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC7340' target='https://www.rfc-editor.org/info/rfc7340'>
<front>
<title>Secure Telephone Identity Problem Statement and Requirements</title>
<author fullname='J. Peterson' initials='J.' surname='Peterson'><organization/></author>
<author fullname='H. Schulzrinne' initials='H.' surname='Schulzrinne'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'><organization/></author>
<date month='September' year='2014'/>
<abstract><t>Over the past decade, Voice over IP (VoIP) systems based on SIP have replaced many traditional telephony deployments.  Interworking VoIP systems with the traditional telephone network has reduced the overall level of calling party number and Caller ID assurances by granting attackers new and inexpensive tools to impersonate or obscure calling party numbers when orchestrating bulk commercial calling schemes, hacking voicemail boxes, or even circumventing multi-factor authentication systems trusted by banks.  Despite previous attempts to provide a secure assurance of the origin of SIP communications, we still lack effective standards for identifying the calling party in a VoIP session.  This document examines the reasons why providing identity for telephone numbers on the Internet has proven so difficult and shows how changes in the last decade may provide us with new strategies for attaching a secure identity to SIP sessions.  It also gives high-level requirements for a solution in this space.</t></abstract>
</front>
<seriesInfo name='RFC' value='7340'/>
<seriesInfo name='DOI' value='10.17487/RFC7340'/>
</reference>




    </references>


<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The author would like to thank David Hancock for help to identify these error scenarios and additionally Jon Peterson, Roman Shpount, Robert Sparks, Christer Holmberg and others in the STIR working group for their helpful feedback and discussion.</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAOK5Z2MAA8VabW/bOBL+rl/BS7+0gO3mrWmbYoFL89I4yNvGSZPu3WFB
S7TNRBa1omTHDfZ++80MSYlSZGeL3cUFu6gsieRwXp55ZsRutxvkMo/FLutH
IoHLBTsWPBIZO8wylWl2zJMolsmYjVTGBtf9q4APh5mYeQPMm0GkwoRPYaYo
46O8K0U+6upcZl1pX+xOaOauoPe7Eztzd30nCHkuxipb7DKdR0Eg02yX5Vmh
88319Y/rmwHPBN9le1fXwVxlD+NMFekuScNu4TeK9wXvBQ9iAS9E5pn3q39Z
/XByB4HOQYRfeawSkHohdKCnPMt//a1QudC7LFGMBancZf/KVdhhWmV5JkYa
rhZTvPhPEPAin6hsN2CsC/8zJhMYt99jtyKJcrpjVLI/yaT27qpsDFKpqdKs
n4Q9uiemXMa7LMRXSXv/pMs5DuolIg+CRGVTnsuZwAX73YOe0bFMQ5WJ7rSI
c5nGogu60goFefEVmObqaH9rc2dj113YW3C56y7MrQ+bm9u77qK89c7delfe
2nG3YGAgk5EvNDx4v7W9vusugqDb7TI+1HnGQ9jh9QTUBI5UTMFGTDzmsHlt
DA2mYvlEsD1QORoQXSaqnPCMJ3wsaJhM6MWB0FqqBBQscwkSwOVlpsCUKmav
wSPeMHJE5vyQpZkKRVRkQrNcwSxhXESCppryNMU31IjNRCZHuDjONwKLwfvM
qhOHkayRGMkEpNt+fGShimBCrWii+gCcjyfVHkx8sJEUccRCeDIUMDyZiQXM
lZsZihR0JfiU8UoPKIoW2UyGgs3hJotVyGOWqliGCxbJMAddgXQTntMc8DBm
eqIKXEbBHEkhnNZS2L5IYCKUrXW3PVa3Eo9hc2bHuqZDXE4kfBgLmKmxc9jN
0OjVbI0znYoQ13quDrCRDmGiTCo7a6FhrPXldvVpVAQsp9UUl4GHfCaMwTW5
koLNwiU+SlReelfpDLB9CG1YR8u8oP1rhrs2lu0Zx53KKIpFELwCJ8szFRUh
vohuLIwjjDIIf4QsxnGsDjM5hA2Drp+ebAj8/jvOC8ZuGLQaigrgGgyco2Cc
5SIW6QRAiyXFdAg7huc3V3025BrnduootHk9kmOZgztoOU54jjbAzYY4HZlW
2IEvyIoxDrLiWPd7B36DpcFwGN/xosfKR9vwyM2hjeNqYZT6TDUuXvuX6D4m
QGkexCO7pPOvIdiN3l7i/uQeITgZOjxnl3uDQaqy604ZkvXtdOzkMcgP3iAJ
PJaGpHOSWlTUV1YZKkQlEeg+Xtg3rQacMDSPAMtFEQikMrAPGAaN5WzXayIh
XEOggs1wC3MJOrCuDOLOeCwjM96tYFx8SWDgo4mao0gLBokVZp5Oi8QCKkxI
kQgOE4Jb6B4b2MAE0Fh0agaGdweCXJ7t9DZ7m+BqOizAUzUbFeRpLqhtAKEn
iwRiLDRIDf6AkriwbMrSFpQvhL0Fp9q6pfMAyKi4oFsAORMRp4xHERjM2CeF
tA9Tws6l1oVYtZqu+4DZQI/tRZHEG0ZV4E12eusA5bQEwgW4CugAc4RJRMZz
tLD7BnciMM8JyBAjWhbtVIAOb+Qim6IvAUABIhnwi0QaqwWqW5NIiHhDYYdp
UWUFmy5Gfkq0lqmnEFxNP8sfYgayytFqcUmsKU8WxrlAFx3jFI98CmoGARMe
wbCcvAOQLRUZNxp1spAIkSLUzoRJV4jfiwr5RpCSqoXzRWqyWZ6LaZp3/M3C
bbsB3G2pStoLwH8xNmBTzgzbwnVtWEcdX5sgyghkBL81k9Ne4YE2itadVbhl
tQl8GZaHCWEVWsF5i/EQYhEOZgh0GTfxZ9lCzh8EOfdIPhqdoMu1R8Ucl7IR
20ToK5Ola+iHyFAMtfitQIUDUs+kNpZ5vfH4+KZ0XwIlYNowMFcOW71NDHn4
4NjMEm2g5dGPTE7gAHfAfylXwOoyJeywy0mkF+RCNTIHCHqksh9FjxJxKigo
07/RPIWUVdKSOTCDGDdC50ghc9cDYVjkPvvwiAl6iI/6DreIggrwR3IHwBRK
7Il1S1i28owVSkUXAWgF88UuVkYLgBgZTpbkO5BlKHCt0rOJF1fYYfiriWxk
QdeEPypW4wV7epVXv343nMjWYJqtnd0Mrtc65l92fkHXV4c/3/SvDg/wenC8
d3paXrg3BscXN6cH1VU1cv/i7Ozw/MAMhruscets79uaSfZrF5fX/YvzvdM1
s5UalQXkMsxUJiA9RDSloQYd+rx/yTa2IRP+A1Lh5sbGR0iF5seHjfeYFxG2
zWIqiRf2p0m3wHd5Ri4SY4JNkZmB3Tnh6RwjDgg2qrItAkt2tIYMaq1JEqo0
l4h56wSGVW0RcWtMVtb3KGNcZmxDIjEMuW7jULBdBJcSPOxkHKXIVm2BSAw6
Up0xmgVMLIccJzX1E6hLzWswVYZyy0afi2o3jTYp0sgxnaenF0tk3N8eAKmP
d6iOK5esp5DfofJEzIIl4WnWeNKp9ioeQ5FSUFJ1tbG+zl5fZwtQ8ZsOAxel
ZMQRPhOacAoSte+PpuTGYJmIaUOVvpZYimRsI2Y1E65SLJVAluTR7CRhJEDo
mKEUmcMH55XkzDdmZl+HpZYg3qgyKRM8bk0BRjoy42fmIOgnljqY+m5Fpcvb
69xMjHkGVZvWBr4WbVTOzFDCswqBrWG6N00BlGj77q5kR221Eqq7Ro4JAZLl
9UOFaHDLpiFcxIaS0VaHsgdQoglpuupQNBgkOQE6u43BdJIhXlNqajHr8/LI
xEvHWTMRj/WU/8zbNSMetjKvgy8cGqLXJsRuEPy3+gvMG7bL94l8+6ftrR32
KQdZflr7zL0Cp5+M1FptNDjdsZf327ioz64R+F/gBs9cjxMOuPC3xtB/iGJQ
eLsGw5L3JlyXybXzotv8uC8AL1FQ5uWuoKxG/r+9hMDICmswzc7fBkh2/1Ul
UO2DYphCF6kLWZtUuCgRBTAB66KVhK7HSB6nrhK824Shwt6svbql5bCUh1Dw
QrrVE5BwuCi5XdUrqDgesJg0lcBiUo6tE8Ramy7cfspBOs9oGt1giSNLiWVD
HmoI+a2LaipS4lgkWIeJyNeuWmYTY0AS1pPVrb0kq6jUlHkG4Tz2Rt4F04Cb
FDE385gwtCiPUdg//9q/PnT6eDEIIaUDT0fF2y5De77sOCJiKEgjYAiYcp6N
DUnMl7izlTOl9iC+WLlF0wxeOcuQd8VO18aJ0S5lqNbAALdAnVety94lrNmY
n+wCVB5Tdt7m0k2TWZJRt5hhhJbnlXSOeDyx3bKyKPfg8RJXPGDgPeZmVcrS
EdRaaryCt8AdS10cs7Akj/ipT4NcM+bajwhbH1uYjMx0sC5+nbDTYyRCNU23
OhbjaUcocdU8tVhRBaiuZjXWmSuWgnUUgj0mb2wMYDneSqDfeTzhPdVXTn85
oSCsUfvOUYsbY6Cyt7Lv7YDaQTQDttSAUGCHF+9z7e0cGY5LHeWnGlfrhkSc
iAClmZxx7JdApSnAF6kXMvXqBGm7TYZyld163qCLT08DOxx49Uo2YPZWSer0
/WdZAvsETv4T+3ewJhYnk+GXUF7Ik6Ob7/2Nc9nX/eTqXbjf3+knnyfh1vl8
uHWy3pdzKQ6+bvRh0L2S/PhqPTw+2zldfLz/5e5k/XT6dfvb7cZ8+OWmgNeT
061q6On0PA7lyccerAWjH365O1/v36fv+8nXBR/0d24XJ9/53d7Ot9vH9Nvm
171f7iaT4d1n/cvg3f1wc13e3a3r/jSeRPswGqS6P1w/PzhbnB2Mv58f3MjT
/ZNZOI0TM+VV0Qfxzq77j+fXNxvn14cLuJaju/VeBqN/20rvrzcm6mrOHw6/
3B/vJ7eD+U2iJ9F69/vJztHG14vx0e3g/vhz9uHn+/Q+fuiG6dE3+E/DaHV/
vp9ef7/Y+nl0eRGHD1/4YGdyGD68nzdo14sW9aPsbzBqr5eZnf6tu/TIZZlp
WqoIoIyjP0wwW8sQ136xKPBHWSBvZHP3nWjUXkwCWjkIQdTUS2pOW0lVizTy
hfbKI/rYicFL6dMzeRM+jVNQhqDmG1FIb0aLhtSM5uHEyQn5G3MA6AD7rZmY
SVVobLrXu3d/plcAAPqjrQLTpqi5xfLqndIK7LNKojMeF6JjmdKzfq1NudYK
Q6rXI/NxEIpYihXDFn60+F8ZteajDea0qgkOIWcd9C8KXPzzg/eHYQpGYwyv
CuAlwn1gn5iRrp/Ql7TmQZhSRiPgahBZKj6Mxh34ItWFXQuaEHMlpmqGRdTy
ljxUDHt10jkwgBAEt1juADVof15zDKAIQs5sn3kpcPs1iV8RQIpHdr7yLINr
qzcYckn/6MOUdeyRzDRiBUZSvb0D5AjZzDiR3w1Y8PAhUfNYRGO/8H0teuMe
YprBG+8LkvlWolksH7BzNB4TWYb4gbpiappwWHxQn4YIbYYmEF7JRJ9k2lSE
9d5MyajBDT1KNcrUlI0VLlme4aAq8WZvn77g7w2qrhN+ZBoafakMtksLaAH8
KuZyWpvX1jwm3murY+B6xM18UbFYRW25/t75HpDGRMPmjJJ0s6ec4ecenRvf
MHy7Mh22mevgxV6TXapKqXxM8fbGdtczMZYa8N0UvVR6oygysUXlmlWxO6+j
1/DTU9cMyxasSFDzkzxPd9++nc/nPckT3lPZ+C0sDUydyoO3gNNdL5Ug8SWv
aqAWRlt5MOgr7YJVJ4X2KTV5f1f4LQRPyOAJEO8PHnWf3XF/3t2A8Mf/oxuH
ZaXpr3W0z+i4VVPelhM4L1qq3ocvizw8oNZqlrpJ7KnAIxp96Wk18X4a9ell
xtJ/kbVqsjBv+XPcCxpPuBxoBVpitWc2e25EvFfZzvql+4PEwOp/56pxg2x4
fdwfPNvFK+ZqoUYMsqdXZZVkTd04z1Aes/C+h3j43Nr38VuXLZy02YuwBJQ6
D7aX5GB+WZpwTb4eO6Jv1c/LQQPNER22oU+hdPCIXhqhqd+UtbZhqz6cvYan
HjQSwaRUMVEpk+aMnypH4Zz2A7yqfYDPhPtmTwKW1ayHlfakzfOOTyuum06L
pg+9IqqwfSgWqj3t1U4M2eM/cbww+46ebdrCOmgXbeUOZSxrvD1zFu0+iSyV
o5nqllKAWnYBXEBwF6FpuZaKNDa2TlkycdwenW0YwT4m9RwF5U0MJuF5Dgkd
Nmy6WTZvmU803tGc9i4F2NMa4GW9l51xOongvlfJzHZhPA+q/KrHbicyFm28
3H6axJ3Q6TQqe0xHdUXdYxCXKDzXfvPd6/d6BzLCRmvHa5BW3KNR/IjHVGnb
srK7WUEbvHZYXVR71hGVhaC1V5EuAm7zZd8wFTYnYxC/orzBkwd2wGcgGxTM
oQrNYUY6edVodenyjEvVPEIq4Z2oYidICSg9qKTDrtQUUG4wSVWR5PgTStyc
DQClHiDU6cQ15oRjFWPxO/ZPfboTh5h45/YAOR0qd11qaYQEnbCREBE5CvWJ
DfKCQL3gf61C2Bk8LwAA

-->

</rfc>

