<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-wendt-stir-vesper-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="vesper">VESPER PASSporT and Identity Tokens - VErifiable STI Personas</title>

    <author fullname="Chris Wendt">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>chris@appliedbits.com</email>
      </address>
    </author>
    <author fullname="Rob Sliwa">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>robjsliwa@gmail.com</email>
      </address>
    </author>

    <date year="2025" month="July" day="07"/>

    <area>Applications and Real-Time</area>
    <workgroup>Secure Telephone Identity Revisited</workgroup>
    <keyword>telephone number</keyword> <keyword>vetting</keyword> <keyword>KYC</keyword>

    <abstract>


<?line 43?>

<t>This document formalizes a profile and a framework for the use of delegate certificates and authority tokens to strengthen the association between telephone number assignments and the entities that have the authoritative right to use them. It defines a model in which the TNAuthList Authority Token serves as a trusted representation of telephone number assignment and right-to-use (RTU), anchored by a Notary Agent that logs these associations through verifiable transparency mechanisms. The framework also extends the use of authority tokens to support other PASSporT claims like Rich Call Data (RCD) by defining a role for JWTClaimConstraint Authority Tokens. These tokens are issued by authoritative or recognized and vetted claim agents within the ecosystem to assert information associated with the entity assigned a telephone number. The Notary Agent plays a critical role in recording these claims and their provenance, enhancing transparency and accountability.
Delegate certificates encapsulate and incorporate both the telephone number and associated information validated via authority tokens to the certification authority issuing them, binding them to the authenticated telephone number of the calling party. These certificates are published to a certificate transparency log, enabling relying parties to independently verify the integrity and legitimacy of number use and related claims. The VESPER (Verifiable STI PERsona) approach utilizes STIR protocols and the ACME authority token to formalizing a verifiable, auditable, and privacy-conscious foundation for associating telephone numbers with vetted entities and validated assertion of associated metadata.</t>



    </abstract>



  </front>

  <middle>


<?line 48?>

<section anchor="introduction"><name>Introduction</name>

<t>The Secure Telephone Identity (STI) architecture, based on STI certificates <xref target="RFC8226"/>, PASSporTs <xref target="RFC8225"/>, and the SIP Identity header field <xref target="RFC8224"/>, define the foundational use of digital signatures and tokens to protect the integrity of calling information, particularly the telephone number, during a communications session. While these mechanisms help validate call signaling, they do not directly establish who is authorized to use a given telephone number. This document provides a profile of the STI architecture by formalizing the use of delegate certificates and authority tokens to more clearly and verifiably associate a telephone number with the entity-person or business-responsible for its use. This stronger linkage is especially important as misuse of telephone numbers by unauthorized parties continues to undermine trust in communications networks.</t>

<t>To address this, the VESPER framework introduces roles and interactions that mirror proven practices from other trust-based industries, such as Know Your Customer (KYC) and Know Your Business (KYB) procedures in finance. Through a defined process, an Entity is issued a TNAuthList Authority Token defined in <xref target="RFC9448"/>, establishing their right to use a telephone number. Additional information an entity would like to assert to a called party, such as Rich Call Data (RCD) <xref target="I-D.ietf-stir-passport-rcd"/>, can be asserted and authorized using JWTClaimConstraints Authority Tokens <xref target="I-D.wendt-acme-authority-token-jwtclaimcon"/>. JWTClaimContraints have the interesting property that they can be used to assert either direct values or the integrity hashes of values (e.g., using "rcdi" claims defined in <xref target="I-D.ietf-stir-passport-rcd"/>) to enhance the ability to protect the privacy of information when desired or required. These tokens are used in challenges toward the issuance of delegate certificates which can be transparently recorded by a Notary Agent ecosystem role, which acts as a neutral registrar of these claims associated with telephone numbers without exposing underlying private data unless explicitly authorized or desired. Transparent declarations of claim assertions have the potential beneficial property of enhancing the trust of the asserted claims based on monitoring of these claims to avoid fraudulent impersonation that the STI framework is intended to solve.</t>

<t>This VESPER trust model and profile is enhanced using eco-system wide accountability. Transparency logs formalize the issuance of certificates and the relationship between telephone numbers, associated claims and their rightful users, helping detect and prevent fraudulent or conflicting claims by interested parties and auditing mechanisms. By shifting from implicit trust in digital signatures alone to an explicit framework of vetted identities and transparent claims, this approach builds a foundation for enhanced verifiable communications. It enables the responsible use of telephone numbers, discourages impersonation, and strengthens enforcement against abuse, ultimately fostering greater confidence in telephone number-based communications.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="overview"><name>Overview</name>

<t>This document defines a framework for the authoritative association of telephone numbers to the entities responsible for their use, using delegate certificates and authority tokens. Within this framework, referred to as VESPER (VErifiable STI PERsonas), entities are represented through verifiable claims that establish their right to use a telephone number and, optionally, their asserted claim attributes such as Rich Call Data (RCD) or other claims defined via PASSporT type specifications. These claims are issued by trusted responsible parties and are anchored through transparency mechanisms to support trust, auditability, and privacy as appropriate.</t>

<t>The core premise is that a telephone number, when used as a communications identifier, must be explicitly bound to the real-world party authorized to use it. While telephone numbers have long served as identifiers in global communications, the absence of a strong binding between a number and a responsible party has allowed for abuse-most notably through number spoofing and impersonation fraud. In many cases, bad actors exploit the lack of accountability to mislead call recipients, avoid traceability, or impersonate legitimate businesses and individuals. To address this, the VESPER framework introduces a standardized method for expressing and publishing the right-to-use (RTU) of a telephone number through the issuance of a TNAuthList Authority Token. This token is issued following the assignment or delegation of a number and is registered via a Notary Agent, which records the issuance event in a transparency log. This notarization provides independent verification of the association between a number and its rightful user, without requiring public disclosure of sensitive identity data.
Additional claim information can be represented and protected within the delegated certificate using JWTClaimConstraints <xref target="RFC8226"/> and EnhancedJWTClaimConstraints <xref target="RFC9118"/>. During the delegate certificate issuance process a JWTClaimConstraint Authority Token is used to validate the inclusion of these in the delegated certificate. The resulting delegate certificates are recorded by the Notary Agent, enabling verifiable, ecosystem-wide awareness of valid claims associated to a telephone number. This provides confidence to a relying party and through a verification service that both the entity and the associated claim metadata has been validated through an authorized process and that the calling party has both the right to use the number and, if applicable, has been vetted by a recognized authority.</t>

<t>Unlike prior models that rely on implicit trust in the caller or the STI signer, this approach provides an explicit, auditable, and standards-based path to associate communications with a known and authorized party. The VESPER framework does not define how vetting (e.g., KYC/KYB) is performed, nor does it prescribe specific policy requirements. Instead, it focuses on standardizing how vetted results and right-to-use associations are asserted, recorded, and presented within the STIR ecosystem.
By reinforcing the accountability of number usage and enabling the trusted presentation of related identity claims, this architecture enhances integrity, supports privacy, and enables enforcement mechanisms to deter misuse-ultimately restoring trust in telephone-based communications.</t>

</section>
<section anchor="vesper-architectural-overview"><name>Vesper Architectural Overview</name>

<section anchor="the-vesper-trust-framework-architecture"><name>The VESPER Trust Framework Architecture</name>

<t>The VESPER Trust Model establishes a structured framework for asserting and verifying the association between a telephone number and the entity authorized to use it. This model supports a broad range of communications use cases, from fully attributed business communications with rich identity information to privacy-conscious scenarios that require only verification that the number is in legitimate use by a real validated entity.</t>

<t>At it's core, the model is built on a trust structure with the following key roles:</t>

<t><list style="numbers" type="1">
  <t>Entities (e.g., individuals or organizations) seeking to assert their right to use a telephone number and assert claims about themselves or a communications,</t>
  <t>Responsible providers and organizations that are authorized to allocate and assign numbers within a jurisdictional numbering plan,</t>
  <t>Claim Agents that are authorized and recognized for validating and issuing claims about those entities, and</t>
  <t>A Notary Agent that records claim issuance events and ensures transparency and traceability within the ecosystem.</t>
</list></t>

<t>Participation in this trust model requires a shared set of policies and standards governing how entities are vetted and how claims are created and validated. These policies define the requirements for asserting an entity's identity, the right to use a telephone number, and, where applicable, additional claims and associated attributes (i.e. PASSporT type defined claims, like Rich Call Data). Claims are structured representations of verified information, issued by Claim Agents. Each claim type is standardized via PASSporT type specifications in the STIR working group, with clearly defined required and optional key-value pairs, ensuring interoperability and consistency across the ecosystem.
Through this model, VESPER provides a scalable and transparent foundation for building trust in telephone-based communications, with the flexibility to support both fully attributed and privacy-respecting use cases.</t>

</section>
<section anchor="roles-and-responsibilities-in-the-vesper-framework"><name>Roles and Responsibilities in the VESPER Framework</name>

<t>The VESPER trust framework defines a set of roles that work together to assert and validate claims about telephone numbers and the entities authorized to use them. At the core of this ecosystem are two primary roles: Entities and Claim Agents. Entities are individuals or organizations that wish to establish their authority to use a telephone number and, optionally, present additional vetted identity attributes. Claim Agents are responsible for validating this information and issuing standardized, structured claims.</t>

<section anchor="entity"><name>Entity</name>

<t>An Entity is the individual or organization seeking to assert its authority to use a specific telephone number and, optionally, to present additional vetted claims such as business name or purpose. The Entity is the central actor around which the claims and trust relationships are formed.</t>

</section>
<section anchor="responsible-provider-or-responsible-organization"><name>Responsible Provider or Responsible Organization</name>

<t>A Responsible Provider, sometimes called a Telephone Number Service Provider (TNSP), or Responsible Organization (RespOrg) plays both their traditional well-defined role in the allocation and assignment of telephone numbers in accordance with national or international numbering plans generally followed internationally via e.164 and e.164.1 but also a foundational role in the VESPER ecosystem by validation of the association of telephone number assignments to Entities. These entities operate under regulatory authority and are responsible for administering number resources associated with a specific country code or region.</t>

<t>Their responsibilities include:</t>

<t><list style="symbols">
  <t>Number Assignment: Allocating telephone numbers to Entities under the rules of an authorized numbering plan.</t>
  <t>Entity Association: Establishing and maintaining a record that links each assigned telephone number to a specific, uniquely identified entity. This includes assigning a persistent identifier or account reference to the Entity to which a number is assigned providing an opaque identifier. This identifier can be used by the Entity to reference themselves in an opaque way for accessing assignment relevant information including TNAuthList Authority Tokens or also referenced during any disputes or disclosures when necessary.</t>
</list></t>

<t>While the Responsible Provider or RespOrg does not directly issue proof of assignment or participate in the claim transparency process, their role, even as it currently exists, is essential in grounding the trust framework in authoritative number assignment data. Other ecosystem participants, such as Claim Agents and Notary Agents, can and should reference assignment records governing the Right to Use (RTU) maintained by Responsible Providers or RespOrgs to validate issuance of delegate certificates to the valid Entities.</t>

</section>
<section anchor="claim-agent-responsibilities"><name>Claim Agent Responsibilities</name>

<t>Claim Agents are trusted parties in the ecosystem responsible for validating information about Entities and issuing authoritative or verified claims. These claims cover claims associated with PASSporT defined claims including identity details or Rich Call Data (RCD).</t>

<t>Each Claim Agent is uniquely identified within the VESPER ecosystem and should be registered with a Notary Agent (NA) (CW: should it?). Once a Claim Agent performs its vetting process, it issues signed JWTClaimConstraint Authority Tokens containing the validated claim information or integrity hashes for those claims for the Entity depending on privacy preferences.</t>

</section>
<section anchor="notary-agent-responsibilities"><name>Notary Agent Responsibilities</name>

<t>The Notary Agent (NA) serves as the ecosystem's registrar and transparency authority. It performs three critical functions:</t>

<t><list style="numbers" type="1">
  <t>Registration of Responsible Providers and Responsible Organizations that correspond to the traditional roles in accordance with a national or international numbering plans.</t>
  <t>Registration of Claim Agents, ensuring each is uniquely identifiable and authorized to issue specific types of claims.</t>
  <t>Operation of a Transparency Log, which issues cryptographic receipts to confirm and timestamp the existence of each claim.</t>
</list></t>

<t>Notarization can be privacy-preserving, where only cryptographic hashes of claims are logged, or fully transparent, allowing public visibility of claim contents to detect conflicts or impersonation attempts. This optional public disclosure enables monitoring of duplicate or unauthorized claims across the ecosystem.</t>

<t>While this document does not define the dispute resolution process, any conflicts or misclaims discovered through transparency can be escalated through ecosystem-specific mechanisms, likely coordinated by the Notary Agent in communication with relevant Claim Agents.</t>

</section>
</section>
<section anchor="claim-agents-and-claim-information-privacy"><name>Claim Agents and Claim Information Privacy</name>

<t>Privacy is a foundational principle of the VESPER trust model. Claim Agents are not required to expose or publish sensitive data about Subject Entities when recording claims. Instead, claims can be privacy-protected by logging only the cryptographic hashes of the claim content in the transparency log, preserving proof without revealing the underlying details.</t>

<section anchor="public-vs-private-disclosure"><name>Public vs. Private Disclosure</name>

<t>For claim information that is public by nature-such as business names, logos, or other branding elements-Claim Agents may choose to log the data in full within certificates for public visibility. This public transparency helps the ecosystem identify conflicting or fraudulent claims and reinforces trust through open scrutiny.</t>

<t>Conversely, for private or sensitive claims (e.g., internal identifiers or personally identifiable information), Claim Agents may choose to log only a hash of the data. This approach ensures that the claim's authenticity can still be verified without compromising the Entity's privacy. Disclosure of such claims remains at the discretion of the Entity or may occur in limited cases where legal or regulatory obligations apply.</t>

</section>
</section>
<section anchor="delegate-certificate-issuance-process"><name>Delegate Certificate Issuance Process</name>

<t>In the VESPER trust framework, the issuance of a delegate certificate to an Entity involves the multiple roles defined and referenced in this document, including the Responsible Provider or Responsible Organization, Claim Agents, the Notary Agent, and a trusted Certification Authority (CA) operating under the STIR eco-system certificate policy governing STIR certificates defined in <xref target="RFC8226"/>.</t>

<t>The process begins when a Responsible Provider or Responsible Organization assigns a telephone number to an Entity. As part of that assignment, the Entity is formally associated with the number in the Notary Agent's system via an opaque and unique identifier, establishing an auditable relationship between the number and the right-to-use holder. The opaque unique identifier helps to uphold the privacy of the eco-system as part of normal telephone number allocation and assignment has traditionally followed. When potential policy violations occur the Notary Agent systems using the Entity identifier provides an indisputable path to the corresponding Responsible Providers and Organizations and then to the Entities assigned the telephone number and delegated a certificate in question that can respond to policy and legal requests as part of their responsibilities to the STIR eco-system should govern.</t>

<t>Additionally, following this association, a TNAuthList Authority Token can be issued to the Entity. This token authoritatively represents the Entity's Right-To-Use the telephone number and can serve as cryptographic proof of assignment.</t>

<t>In parallel, a Claim Agent may be used to validate additional attributes that the Entity wishes to assert when originating calls, such as Rich Call Data (RCD). These validated attributes are encoded in a JWTClaimConstraints Authority Token, which governs what claims the Entity is authorized to present in communications. The Claim Agent may also use the TNAuthList Authority Token as proof of assignment and the Right-to-Use the telephone numbers being asserted by the Entity. This should also be utilized to govern the constraint of the "orig" claim to only the valid associated numbers to the Entity.</t>

<t>Once both tokens have been obtained, the Entity initiates a Certificate Signing Request (CSR) to a CA authorized to issue certificates within the STIR ecosystem. As per the mechanisms outlined in <xref target="RFC9447"/>, <xref target="RFC9448"/>, and <xref target="I-D.wendt-acme-authority-token-jwtclaimcon"/>, the TNAuthList and JWTClaimConstraints tokens are presented as ACME challenge responses to prove the Entity's authority over the number and its validated claims.</t>

<t>Upon successful validation, the CA issues a delegate certificate to the Entity. This certificate includes:</t>

<t><list style="symbols">
  <t>A TNAuthList extension <xref target="RFC8226"/>, representing the telephone number(s) the certificate holder is authorized to use.</t>
  <t>A JWTClaimConstraints extension <xref target="RFC8226"/> and/or EnhancedJWTClaimConstraints extension <xref target="RFC9118"/>, representing the constraints on claims the certificate holder is permitted to assert.</t>
</list></t>

<t>The issued certificate is then submitted to a certificate transparency log. A corresponding transparency receipt is returned to the Entity and/or CA to provide verifiable proof of publication. This transparency mechanism enables ecosystem-wide monitoring and validation of certificate issuance and claim legitimacy.</t>

</section>
<section anchor="use-of-delegate-certificates-for-signing-communications"><name>Use of Delegate Certificates for Signing Communications</name>

<t>Once an Entity has received a delegate certificate containing validated right-to-use and claim constraints, it can use this certificate to sign communications associated with the authorized telephone number.</t>

<t>For example, when the Entity initiates a SIP call, it generates a PASSporT object containing session-specific details such as "orig", "dest", and "iat". The Entity then signs the PASSporT using its delegate certificate, which binds both the telephone number and any authorized claims (e.g., RCD elements) to the communication.</t>

<t>Critically, the JWTClaimConstraints extension in the certificate enforces the set of claims the Entity is permitted to assert, ensuring that claims cannot exceed those vetted and authorized by the corresponding Claim Agent.</t>

<t>The signed PASSporT is then attached to the SIP Identity header and transmitted with the call. The Verification Service (VS) on the receiving side performs STIR verification, checking:</t>

<t><list style="symbols">
  <t>That the PASSporT signature is valid.</t>
  <t>That the delegate certificate is trusted, unexpired, and issued by a recognized CA.</t>
  <t>That the certificate includes a valid TNAuthList extension for the telephone number in use in the "orig" claim.</t>
  <t>That any asserted claims conform to the JWTClaimConstraints and/or EnhancedJWTClaimConstraints in the certificate.</t>
  <t>That a corresponding transparency receipt exists, proving the certificate was publicly recorded.</t>
</list></t>

<t>If all verifications succeed, the relying party can trust that the call is both authorized and attributable, and that all claims have been validated by responsible participants in the ecosystem.</t>

<t>Should questions arise, such as disputes over the legitimacy of the claims, the identity of the calling Entity, or the integrity of the Claim Agent, the Notary Agent serves as the central authority for managing escalation and disclosure. This includes providing access to Responsible Party information via a privacy-preserving and legally compliant resolution process, aligned with ecosystem governance and policy enforcement.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>TODO Security</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>None</t>

</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>TODO acknowledge.</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC8224">
  <front>
    <title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="C. Jennings" initials="C." surname="Jennings"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context. This document defines a mechanism for securely identifying originators of SIP requests. It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t>
      <t>This document obsoletes RFC 4474.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8224"/>
  <seriesInfo name="DOI" value="10.17487/RFC8224"/>
</reference>
<reference anchor="RFC8225">
  <front>
    <title>PASSporT: Personal Assertion Token</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8225"/>
  <seriesInfo name="DOI" value="10.17487/RFC8225"/>
</reference>
<reference anchor="RFC8226">
  <front>
    <title>Secure Telephone Identity Credentials: Certificates</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers. This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8226"/>
  <seriesInfo name="DOI" value="10.17487/RFC8226"/>
</reference>
<reference anchor="RFC9118">
  <front>
    <title>Enhanced JSON Web Token (JWT) Claim Constraints for Secure Telephone Identity Revisited (STIR) Certificates</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="August" year="2021"/>
    <abstract>
      <t>RFC 8226 specifies the use of certificates for Secure Telephone Identity Credentials; these certificates are often called "Secure Telephone Identity Revisited (STIR) Certificates". RFC 8226 provides a certificate extension to constrain the JSON Web Token (JWT) claims that can be included in the Personal Assertion Token (PASSporT), as defined in RFC 8225. If the PASSporT signer includes a JWT claim outside the constraint boundaries, then the PASSporT recipient will reject the entire PASSporT. This document updates RFC 8226; it provides all of the capabilities available in the original certificate extension as well as an additional way to constrain the allowable JWT claims. The enhanced extension can also provide a list of claims that are not allowed to be included in the PASSporT.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9118"/>
  <seriesInfo name="DOI" value="10.17487/RFC9118"/>
</reference>
<reference anchor="RFC9447">
  <front>
    <title>Automated Certificate Management Environment (ACME) Challenges Using an Authority Token</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="M. Barnes" initials="M." surname="Barnes"/>
    <author fullname="D. Hancock" initials="D." surname="Hancock"/>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>Some proposed extensions to the Automated Certificate Management Environment (ACME) rely on proving eligibility for certificates through consulting an external authority that issues a token according to a particular policy. This document specifies a generic Authority Token Challenge for ACME that supports subtype claims for different identifiers or namespaces that can be defined separately for specific applications.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9447"/>
  <seriesInfo name="DOI" value="10.17487/RFC9447"/>
</reference>
<reference anchor="RFC9448">
  <front>
    <title>TNAuthList Profile of Automated Certificate Management Environment (ACME) Authority Token</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="D. Hancock" initials="D." surname="Hancock"/>
    <author fullname="M. Barnes" initials="M." surname="Barnes"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>This document defines a profile of the Automated Certificate Management Environment (ACME) Authority Token for the automated and authorized creation of certificates for Voice over IP (VoIP) telephone providers to support Secure Telephone Identity (STI) using the TNAuthList defined by STI certificates.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9448"/>
  <seriesInfo name="DOI" value="10.17487/RFC9448"/>
</reference>

<reference anchor="I-D.ietf-stir-passport-rcd">
   <front>
      <title>PASSporT Extension for Rich Call Data</title>
      <author fullname="Chris Wendt" initials="C." surname="Wendt">
         <organization>Somos Inc.</organization>
      </author>
      <author fullname="Jon Peterson" initials="J." surname="Peterson">
         <organization>Neustar Inc.</organization>
      </author>
      <date day="5" month="June" year="2023"/>
      <abstract>
	 <t>   This document extends PASSporT, a token for conveying
   cryptographically-signed call information about personal
   communications, to include rich meta-data about a call and caller
   that can be signed and integrity protected, transmitted, and
   subsequently rendered to the called party.  This framework is
   intended to include and extend caller and call specific information
   beyond human-readable display name comparable to the &quot;Caller ID&quot;
   function common on the telephone network and is also enhanced with a
   integrity mechanism that is designed to protect the authoring and
   transport of this information for different authoritative use-cases.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-stir-passport-rcd-26"/>
   
</reference>

<reference anchor="I-D.wendt-acme-authority-token-jwtclaimcon">
   <front>
      <title>JWTClaimConstraints profile of ACME Authority Token</title>
      <author fullname="Chris Wendt" initials="C." surname="Wendt">
         <organization>Somos Inc.</organization>
      </author>
      <author fullname="David Hancock" initials="D." surname="Hancock">
         <organization>Somos Inc.</organization>
      </author>
      <date day="13" month="June" year="2025"/>
      <abstract>
	 <t>   This document defines an authority token profile for handling the
   validation of JWTClaimConstraints and EnhancedJWTClaimConstraints.
   This profile follows the model established in Authority Token for the
   validation of TNAuthList but is specifically tailored for the
   JWTClaimConstraints certificate extensions.  The profile enables
   validation and challenge processes necessary to support certificates
   containing both TNAuthList and JWTClaimConstraints, particularly in
   the context of Secure Telephone Identity (STI).

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-wendt-acme-authority-token-jwtclaimcon-01"/>
   
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>





  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA51c23LjRpJ951dg5QdLEyRn2+4ZexQTM0Or5Rit+6KV2HY4
NvYBBIpkuUEUBgVITTv6X/Zb9ss2b3UDQLW8/dIUCaCqsvJy8mQWFovFrNNd
pS6zsx+v72+v77Lb1f19Y9p1ltdldlOqGn4/ZmvzQdU2W2Q/Xrd6q/NNpbL7
9U12q1pr6tyezfLNplUP8JwHZRvVns2KvFM70x4vM9uVs1lpijo/wEBlm2+7
xaOqy25hO90u+IbFv389s/3moK3Vpu6ODVx6c73+Psu+yPLKGniyrkvVwH0w
p7N5dqZK3ZlW5xX+cbP6Dv4zLXy6W39/Nqv7w0a1l7MSZnE5K0xtYf69vcy6
tlczmOfXs7xVOTx11TSVhsnCqJYWfafyarHWB3U2ezTth11r+gauu1dF36ps
rSrV7E2tgnDu1IO2ulPl2eyDOsI95eUMRNX5K3ky+N2D6jpd7/DjDz9fzWZ5
3+1Ni5fPMvi37auKpXS1b7XNfkIp0S+m3eW1/pWmeZndm4Ox8+ymLpb0qzrk
uoI5FnjXP3JckSo3urPLwhzO6JLC9HWHu/H+fjzandlk95V+zJ8/Vms2v1i8
5R87/AIHGo0zq017gMc8wBZk2d33V99+9dXL8PFP4eOf5eNfXrz41n18+fKb
8JG+vVm8WmrVbVlvmtxa0NRu0Ral+5XVKi8OasGihf1ZdKi8i18eu6LK9QF0
4XI20/U2zG22WCyyfGO7Ni+62Wy9B9GDvvYH2OCMrqv0rwq0I2tas9Wg+6gn
ebZtQXqoI3hR1u1V1luVmW1WwtbvQPOyQrUd2AvaAiuXn1XWsUl1BuyjVfUO
bq/pGbAsU2iSfrZR3aPC7we6hBfpXY0T5OfijaSOGgbq9nmX7fMHxc+TIWmx
Wat3+w5HxanCz4dldtPBhLe6phUeDEw+03X2uNfFnh6wfruCR7zWtstWfvrk
ETKr2ge8De8Ey7JgBFmrmlaBuXW8BBDHE7OnydOcYJsWOKfzu/X7izl8X8BI
8LjNEZ791nR5e8xWO7yFlleZHS4UBooFhl+Bve72YGneUcG21rYBc6+LY3ZQ
xR602x7sMlvD4sIeopfJ1McOVMjGmzm5ZX2DqpcZuK4NPpMUzGaV/qCyOxTf
VV5V2au8y2FZV68ucDEkavABsKrWwOxQdf7jp/UV3noFK4DZ6nokaZ4tbhnP
AVaTgavsRUDJFsMDW1WYHdgw/IwCRrcDH2l6Wb4jrXnU3V6zxsHF9gh7d8Cl
gTRBaTNvILCFTsDwCLwrKNtRdhKHGe0yyzfZuabKj6gqBcwVjKJiCcAscL5t
iVLhLRVBimbrFg3vQdWgFGoOQ8MOFnRxvLNkXgX5n3yjK5jdcvZq0hDh8ryx
fYU/4F26htFhA/HvjZEFjpUWnx8kEQvoARxESd8+6HxSYfCJYQ4kVH8V7qMs
/TDPNhDm3F/uTrwWBV7QGKOZoYnh80HZ8E4QCKxd9CX1QKA1Tb+ptN3jcwxu
Rfg9FScYGIoaLAif2arq6J5NLsZkUTiujmxvR5oHqK/a0cpQZLABsNmHHB4J
85QZo2mR5asq95opFilA5PxHlUKN6zuEGhcZhLfW5GBcfafZL8PPd6ghnSlM
Ffzh6urN9XAzcOLOo7MRBkcBTqcHTCEf4SFNqx9g3guED4U2vYVb+7rk/UO7
9Z4H92uwK2xhzvS8byZz9OrCxiZuMlKug+pyuCJfcmw66LKs1Gz2BYThrjVl
X+A9GKlANidxyTnIBcTVFnsAJ0UHV4F25RYeD+OhSBPd+O03CcWfPs29Rwtf
/wm/dpK9v7kNw+xVXsKWbrWqSn/5S7ycowrdEQQHVu+ipAbNgD/Rg+Q4Pdk6
bzS4pTDxgVLBnU7TIxucs2oWYNVtdZy0YJhQ3/KmA1o59LWHfVYR6lxmP+0x
urMPCpECllg1ftdodJ40TmKOl4NbN1ltIJBqcGVoD8qiIoGhQSAFW7FOEX9l
wyMDyHbgrsfBHc0gRiDo+3SZ4A+xeNzEeH8xFsTa/f+GJAcIvWCUimTJEUSs
5BjUdMLnD+PDoqEEAUPSprcIMewC9rkBoeuNBD+AqThJWTXEP1Pv4Ekg2w8Q
qlB0mCDAiBUMrg8Yd3MEDhbMwsrqxsYHkujrSObOcYEtg7n27MJAJ1V7IB1F
8IKRaKAZNQAwAAcWDHEN7rIsYfaIDrSlfXfOKqAILQYKA2BwsxJgOoXYUhAK
wJeDblvjwhr8hz/iPdvWHARV0JQWbLDga+GPFhYwB+wBvg9W/0NtHrOfTd9m
V/CbOcAt55BUXNCI4cfvRO7443cXOGKhSjI2WC3YJ8ZUlD3DplyMtuQLrUWj
z67Z0mErBHPkT4FC9wR4PrkDhO/oDrxJiGpCWE/Q6BSEWJXgkdlrJIikdgDk
0fTgdghxBfDCkQ0URjb+GKQ2Cct+++10aoEzL3KE4vJ0wVSRbqGEdxMgzo5Q
nIz0vDTl06dl/FD3TA/sSatAqBSXWwOmhjaM2kUeSSbdWwn1LBqlSbnYT6FP
Q1OQ7CX42H0OCMGiZckV52q5W85lpWcgFn3mQFqy3U/J8QKnweBNMhOGaUNX
L2EXR4/3/HFPumU1ZgWEcf/V4+cJZNyzzWTgwEEHwJ2gtT/mLUcv1GGaw0m3
yLmPCDCgIvTrjFQn85IAo9Hy5/IUsGxJkGrVw7MA9AIiQg1xwC3Cu0OgPYkp
TA9jfWwM7QW5MMFmKDdYCgIH+L5Co4frKl1onHmksCA9ESQILywPvoSJtOL6
MM5ywuBASqR7DWwXGCCsZqNqUAB0z0EJ4dYIpO+de5Wo5c1IVu0xycHUROnA
TUPJoAI/GF2ip+3LvsLZQixg+onUwyk+BcXIH1tS67pkK7CmelBLyfHFefPk
OPFl2MdBFiMPa6szcdjhhWzxI0TkYboRyZIBtA3swUjzRnEYLyA8jJLe6+Zk
8o8+OSjKKFUin7rtCWbhtQhecPKlIgvjFaoH4jaCMEElwOVsQVnIn7itOXov
E8VQdn/omOHKOKH+7pjBzLf0PUUy2CJSvxBfp0BfhWvDHa69vkY7iE6IQbQu
ExgdGabMd06ROWQIm15XJZreALf7bY1YgjTwEytC2Y+ysjMBtZwCHQAwtQWN
aHP0OIl6MnYOTA+qFsykUEyC7MC1g3xyAEngOPoKEyZ4PKI5kDxZxK5V8BXv
EgqioMR5OAfBC4PFYOYAEQT33NOcr4iHoL85kfigMJq2IK+zN+/v18iq4v/Z
23f0+e76P9/f3F2/ws/3/1y9fu0/zOSK+3++e//6VfgU7rx69+bN9dtXfDN8
myVfzc7erH4+Ywmdvbtd37x7u3p9RqtLcDB6dtCSjUQ+UGJOoWbgy4pWb9jn
f3d1+7//8+IlxKJ/A+zx1YsXf/n0Sf749sU3kJdQIOHRTA0i5j8xZM5AcQDy
4lMQIBR5g6pK5gZ6bR5rsKUWvccf/gsl89+X2V83RfPi5d/kC1xw8qWTWfIl
yWz8zehmFuLEVxPDeGkm3w8knc539XPyt5N79OVf/14hNF68+Pbvf5uhCr0D
c3nQ6nFIkQb2cMyIptRUzG1OwnYhPLydD5MFdnFsJZa92nPzGsjuHOWlbZjp
HMbYqrZ1KCnwD9dT/IO9mEfJfKsC3YkPGJOPLn5hdAo54bPQL65inpmG8W91
nMttafzM8g4Sg02Py34S5IL0OLEY4DakrDyDiYWXjNKtbXCF6wSjJMxjIH3D
PiVholWBynXiOUHIxsQqPdcTMhReE06GEBW6efgbdnzJLqzAtBW2AxJDCt8k
9bFg54wlCSUSMhskfRxnthqvPGDcApcTAakNBhOnqS1Wi0CPKsk0JvJ83Xli
YaTvBKgg/u2YSqf5hOEpR9tVZgMBM53jXAC0VQIncsmcPX/o0EOe8JejjSKs
j+7OPMLoRGphEFocIPAgo0Epv9s4eRI8ARASEimY2yYojBAFBE8Ac3mNOYjF
lHWTIzUL0I4BqdGM1Kq8oPCewijiH7StFNxEVAtAbt1oJK3nAgKxUKO8WiCH
4CehPOGIZK7kvj4NL/WDLnvw6aDUvzedRwnDUyCLoM09KNhnlhisCZ/jJCIM
q8O+4+oG79fI3L15DJDiU8m2sCbMbYb8fGtwQ90MonILIX/ymI50jNVDW0lO
VOu47CTFcTkNJ0E2nSlDSoydIyJZZonq1EphMbBaEY8sjrMIAeJEPSydNSRY
Ceid+zSJc0RKjnBTCgJolbHIlcHjsSisKTBpx2Yy6xrRDuxk40RU8sLY8Uva
gABbcjcprbjwVCZE+2nCIGJh6aHXglRPXosVUyQKXjG1GY+ZDOm3SXgdEOHn
q06oEI4/8PQnMwVF1duwSZbB6KkFM7EP0kJkezpoUzQN6XU3KB9F5YiYtPdp
94JzskfUO1whsxe6nMiuiSA6wbt6xYyQNl0f10COknA51ixRXHTlmjgOCD++
oOQqZpLqDVM4z/mTQ96gloc6gR+ojuOL30p6pKS/SRWIn+VmMKz9JjhDb7Oc
WyFIqmESnHsR3RGXFZ2mQOh9XxP/BqEY3Avl0RJ6UWKY2I/TQDdTrF61Pm2n
WmI7zOIC/x3yw1GtxvlmKxlQk+OiTcRWD4I8ESx59qFGXD8g9EIFbRwRSqMs
U/1c3YC8wLV1OJbsh5+v/khkK2qTatFzKJBwjc4X79bI6UvO4sFW1hhY2dHR
WlTax0AKmp3j9mAnQtFjKEMN85EIh3VTYBwGNmbHZfWkSE6oTFDk3NucA1jO
qUVujCps3tCWs+9wnuQTPcUzCOJxrQ9pfHy0N19PCSk/nnf5riToPXKa2sfV
DknjbSAu5w5AWgcU52FklSbdKfBEdqSVisIiSsCR+mBKKuiu8xunk+0fqacp
W4XZQiQJ6dMXX8S6taYHf+81LLpLMa5NLnxDRJXPJQSZtD1dXw5SMOHuBJlw
kTaCBROBdbLuHfuvSXxLnpMpNL8DebYBAwY9zOsdU16pBeK9AhCJLMJ+pGNI
Z0oP3yZNt0Ug4pUkjs9EJw8rt7YAHQAH5T0TWRkzAInz9o5Ulk8EYgwqcdri
DWFTg4/mmcD2r0BLui8tZSMMK6WpxhIh1aEBS7tM2LhQOQvYDRkZKiJdzmYv
lhn9u3a5p/iaCNNShhf1btkLiETqA213KI08N/N0N7jguUE8hU0JVlUPXDMY
Jk7z2Vcwy7s4w2DX3bJDSiYnyVmrBhqFqUjhOjMYuSbsNwHMXwDt2FIXgtH4
d4p6VV7PZ1+LsAjeMHiYHo97EHxQQ4uRDfXpjTRnDMRgbCApyMXMXsqYq4lm
JYeXBUsmiNmKg7LEhY46WuJUZ7JnBxTulirfumEFdgxHTGuLupOr2OfoJqwi
Pp6CjkvWfQzNdgZsonaxJeE7JNDg9fhbxAoUxFCWaYuDYw/8QFFTQBzqRt5K
7OlL6418PgYxU7k9oZlHZOoSQJMPIL0dNvREPMq5XgJmTUkRR5e4cDTR5HWx
ZI1jcUQ+OW2JY2RKPiftI5pHxEqsusvsGnEQaw9NhgrlUTL6OQ4ni+M4Bgdm
lE3fcK7ka/1ula64xnYrFBQ6pAUVBAEhaeS7SW25EwPCJ1Z/nKrifeh9MZkk
XS5aY+1Qddc+5XXhY+6CXdT1YAEpEpk2ZP0HtD7R/b8jVM8jp1upjzrwD46G
Iug8iktxb1BLzQmksz6eLSnC3/nyv/eI+Hyt/G7ISn3kT4I9ryHCnZ5kFdPl
9gLyL3RBZ3aKGwe8s48tceDBRkzUqIt0HOi5XXQleYZppQ8F62S+9Ekk/SNF
4AN6QY5fIWzhMAPdjr3LU+FM1kr8qRmRqTHd+2xCVcwydg5prSnad7tM4wmn
qyk9HQUPkkvasxCiSWy889hTSCMcKtAX0nYBgCLuwOD020lpKKSJiI/0yIRw
fN7xDNrZPCEoUStHPXvMhp3lOLumbxtjhQJIlwGQjAriRA2CPIlXDX3HcWWT
jCGujrL8ObUSccXA41aAB84g/v5dJCsQ7OQ9sCEGknF9QA6Am0jyqL/uLUvp
XpJ8P9L5+u397cX8qRGzc/wFvrmQVliXmmts98m9aB9VVS28K5YeWYLsDI6c
OsXE3lQ1BbFSgdCD4AY5u9o14SFrik7bf5GCKMAACnJxarpiRKrK9AYEzhB2
1PLFn18yhsFPyxegAh03U+dp21+8EHFywW9AyHPGM039Pd1HTjmc8yQOc3hX
RoEJoTs2SyDFib2/pj1GduGKFUOLzsuDrrUrwsq4cJHpWyKFBx0bkV3JSQj4
v5Se7B32GJKT120YKASFoupLPI7wB6djK7++y2wlWz/ZahotXhZJUKmvuIkn
pY3SjV7CcGKWqyBu8NhxtxZK54AMYe571wnSskvGVj2IATl5AOkHH7PbJhLO
HGap/9Vjgu2rHT6D4mRSxGHlkTwqsvyEKLqoSkKpCLMPXMtzlF0XPA78Je04
UV7nJ8tYQ3CnaXKYWfR8N6EwYNxaJURlGCeaQsiWdB09+jE/sm4VhSsbBEMG
J6ce8jrtwGdh4JWnSwGckqHd+RmUvuO1PiL13RC6RRrK0+CWa2G1wqlAwAb9
9E2wT3pU8GIRF+baXgnAojxB67ilOao8ND5P8X5AMG2c9fjGQ0lVqZcKUyWq
jUFC2rfSiwWQzWJRiFpErfQjYcWMIknaexSXdAZF6fGhFCoCZO8ITQUX5adP
lSgX8FJMAHYSp3+WewcpudpTp2LQjmTPOT8MaRdJ32U6733hyNkg693U9tho
f2zC23++7U1Mhklz70w5uEbLHOHZ2WwEjDy7J7Xg0UmTJ5BTApoIrSbo0WGo
0aEXn1JFpwlC3bpA2Z5qtPO5U5rlRXYXCkQKNoDR6VSZHcRFyVosL6yiTLi7
KJsfhcNIY6jU5ItyEmUSjuH87eoiO7/66dLdoru/Qy76jrQsmYmw0ZZAoWOt
vcHpju3XZuIXn3EuiRqqJSp45YmqGvFmCuRIWky5qcOEfXKNI9dO3FgbpJbA
2hf/G29FTj0TeYz1cz08iUQiC6fXEt380lVBsUUzTTmLCDJQi5gXaLdvlQoH
m7Z9ze3eTN3dyfMckpm23CRXHEBHyX7AT7Dl+AaEGDdySjiB+vLn474lknjD
+cb2HWX9FPKntNtn62kSydEhZB7HRoU+Uxj5a1Bagmq+OJ10VL7GI0kcxkVP
i/bYQN7b5g18i25U6YaxIBXvWjYkgvJdfmh4nz8yJ0GOUHliBRTpbVyflhjv
8nxKgADx1ztHLhF1nE4gtE1HtFhldjvM8kDwzCREDMacOy+iAjUeJQ4lFLYh
NDGHcaWL0/Vq2rT7gVwmpGWHprMCWzx5M66Au6pI2ndb9nwgmnxqcobCLWqS
yvGwIekMGxTLqELMOIRAdNW7XgB31uCYLu2As+V2JWytfFAn+4hkvxSRRXHN
NNSHveKF0g/zeLiRhg4g5t107Xl0NESKEA6sJZQG0T8jXMBf3ET+8JZ1azaT
D4RJ05wJ1K8GyBGO/Ix7lidoCZS4Z/CQK8FuccnGmTMJnQ9UcuYwe99vfkHl
8uGWoGE4m+niqi9KutA6NBXXCLGh7o8de285lXXKYgIaFHV3mGF8KjHYoiDN
0O7xoHJfYYxa4yVoS7C4FVODpdxKz/wrbxWz2femnQhe5H6xoMs3w9K4f3kx
yXygYpkdHpz3bXcbWAeJEXSGUtZFsm8HSAqKvTF0kgFvZmPB3cGDOuA5HGBI
MNvWbWrsOlwnA3+fCBC7wQe267z2MekAR3cV2sMjLsYVfpUrMThDgyy7zmzR
gk3XmEdQx3ELCdBxztMUWcPHoH7yYF/NoshUJT1weCv7t2oYYqINuphnn5En
qSC1V+ydwjHQXyftBr4U4zsq8LFf2nAKl6rSOVbhdYUHIALydIoIrgKeBs7L
6eK1K2aIkSwjjaNOpN7FIQQfCPNhvM75y6JVMS0i0AjdIyzSFJARUY1SHzQB
L+SgJUghzK+EfXCkhwGt2LlOgKapjuyw/Fnpq6ht6MYlDbfsomezm3rsh6Jm
2nHz2mQ7Enf7OzqwfjCUJVOtFIvv6PAYzDhAzprn89phc/g8guqfy1yn4NV8
AHHGvUfcPunymqvkLHcAxedXgCuZbvKnc5IOCnd+JBaGdH6E7I8uTsx8eKaO
W8Sk7dX1AW0AtdXitfPfLQJJSO1ka2K0XctsZSmvY3XEoqrPZOexfmp3/CU+
NBq9QsARMfVI2mAnIibqQfTECe4BY82kR1elVFVoDTpxnmY/6m1IWmX2pird
6wtk4NGgzo+arG/wenpKdHBNHKzb7TxIjN6JUk1wmSepXWzFilB+RMhiXzEe
H/WHsUSTHrSpXKmRvMMIzvC8rHQixpsWlhj3XWHFAWFbzn3D3FslZSBJSPBB
p/OaNJcRudcJS6dVRMl1Ewe46bbQYJi+vADUCLbIhliNHjrKlUQ08kqCnGvi
cL2NN6ebpmZllkMblmyb7RYbP8qwR/OkB1fbmMueP31+VuCU1IITHjNp900I
EGpVkiqNTUMO8UiLtVm8l7a/SblSQMOEGOWRgrQJOm9JgQDEhvWRaj6gGTAs
RUdPPQUVVY+iarsPtKKCj9zVFCpY5NBgpTvE5wREYVT79Jlex/5E71oII+aU
/CAxX3LD8jPO7rrMk3cbvWzuYVHq9NKc11XORmfL2cEMxUYEruvPfEJJcjvJ
sjqHducc2qk9x2ghzDMfJkl4bHcYnxWc5oT7yS/coGWxGMQFeHZIPN8ZbtaZ
I3dNAP9MLUbBYHDu59r1UBF3xdUxppnooAQ1pJoNM6BprMGjbNxFnOCXeykd
3LGxQ3y+v7vgWsTVapKdSA8Cn2yBpCAosT3qJATwVw0Pv3+DR8iTk/C4S7/v
JPh8qA/4iCmtjU5BR+3pll+G4s9DOxen3Hs25Fiv9xmhMEa06SBkEnuYEn2Y
W71vsADdU1UDe/FDQY+nDxIX3uY0KhzpYOrjuSZENbJVLA56bxM1pCfvMfEu
0RcDBmZwbi+kFB1G4fg/+c6OJY07JffJCaCw/giQ66ku/sGN3M8/MfMiugfp
qeB5pufe4JstOtfsTlYucFECS3o6gMMxvYHP3/Tky4HAAgbBP7lCuDg+UgJ5
cj0MZU42oBSigti9H52c8+6N01jSIxf/Jg+QhS7f9ERARG9FDTGST02ekaB4
SM4rvL2Ik6T3fPR3KlfiXNw5nKvE14tDCykPYjoSEZ35mraGiFkPxpY2dft5
RtpBPD5Gc44iAxPC5iZsqRy01E7h81j7h0clmCVRH/NDw686EFw94Y7xZUEY
sGle3FTAP/iii2HaKVqvvJAnMHau6uJCPkeYeXYG3qBzZ4dhxLOkz4R1mpIa
nJwfkFEverEpwbtIjyfp7OdeCFYnHdEpmwE4xJM9FwEwR4JHlkRKBnK+8zPO
xZVNox1Vno2BH6Q3bBKXTHiEiMvvIjwD2oMUovpYKILiSKJEfZ/RggU1pI4g
wjTicgTU+w1w/gYwWV7sg2uYerGUr8DI5L1+otDkkEbcwO0ac85/vL/IDMuL
TY00Cz2Cr9pQUI/bv+cQI1WBHVQUY9YOmvqZ+/cW4BrILJfxdSfOXjneAPse
1McGedm5L2ZOnK65WiVPnYqBeOiI0NRkFHRVtJHSavYLokcxUPMjkk4P3tGB
zCBIzO3TlJI+I9aNtTcM+pxg4gr+FC1cXIxk85g70jN6UwumKls60B9vtGWg
4mBkerYLvafjNqNjVdTBj+5g0EHuMotwGolpkcq3Ggf0Gjz55jg+NS3dBaNy
OazhnrG4y3ER4mk8Bu88YmjvcIAtffNe6KgTks6Z2eDtgdfSaz16J5BcFxn3
mCYblFR9g59Hk1siLeucagJSq3GUR6hMDVuAov4cApeohgnVQLuWvJGRzq6O
i3ch/6eaD55Ly6kBY6IWVbHTIn8TyHJOfDxMEFohOlhEB4DorXy4YFR/ZEEc
Dli/e/XO/0pv9Fu9XY2uegsWiz+uCjyfVqlyR0FEbs/9t0peELiBr2b/B+9Y
lZXOWQAA

-->

</rfc>

