<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.22 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-henry-ft-owe-01" category="info">
  <front>
    <title abbrev="FT-OWE">Fast Transition for Opportunistic Wireless Ecnryption (FT-OWE)</title>

    <author initials="J." surname="Henry" fullname="Jerome Henry">
      <organization>Cisco</organization>
      <address>
        <email>jerhenry@cisco.com</email>
      </address>
    </author>
    <author initials="S." surname="Orr" fullname="Stephen Orr">
      <organization>Cisco</organization>
      <address>
        <email>sorr@cisco.com</email>
      </address>
    </author>

    <date year="2021" month="December" day="13"/>

    
    
    

    <abstract>


<t>Opportunistic Wireless Encryption, defined in RFC 8110, specifies an extension to the IEEE Std 802.11 to provide for opportunistic (unauthenticated) encryption to a specific wireless access point (AP). This memo extends the method to allow the establishment of OWE keying material to other APs before connection establishment to these APs, thus enabling a fast transition mode for OWE.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>This document describes an extension to Opportunistic Wireless Encryption (OWE), defined in [RFC8110], that is compatible with 802.11 multi-AP environments, where encrypted connections are expected between one client and more than one AP, with the light requirement that APs belong to the same Extended Service Set (ESS), i.e. communicate with one another over the same infrastructure.</t>

</section>
<section anchor="requirements-language" title="Requirements language">

<t>In this document, the key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="background" title="Background">

<t>Opportunistic Wireless Encryption provides a mechanism for an 802.11 station (STA) to establish an encrypted connection with an 802.11 access point (AP). OWE does not provide authentication, which means that the STA cannot know if the AP is legitimate or not (i.e. is part of the local network infrastructure or belongs to an attacker).
In many environments, the STA may need to establish an encrypted connection to multiple APs in succession and with short intervals. For example, the 802.11 Fine Timing Measurement (FTM) procedure supposes that a STA would measure its distance to multiple APs (which individual location is shared), and deduce from these measures its own location. To increase the privacy of the exchanges, it is desirable that those exchanges would be protected from eavesdroppers.
In such scenario, the STA would need to establish an encrypted link to each AP, in a rapid and consecutive manner. There is a need for a mechanism to facilitate the secure key exchange between the STA and these APs, without wasting time on each AP channels before ranging can start.
In other scenarios, a STA would obtain information from one AP about other APs, for example through a Neighbor Report. The STA may then need to exchange information with these other APs, such as capabilities, data broadcast information, or more details about the supporting network through ANQP messages. To improve the reliability of the information obtained, the STA may want an indication that the second AP is part of the same system as the first AP.
In such scenario, the STA would need to establish an encrypted link to the second AP, and obtain an indication that the second AP is likely part of the same system as the first AP. An extension of OWE allowing this multi-AP scenario provides such mechanism.</t>

<section anchor="crowd-wisdom" title="Crowd Wisdom">

<t>This requirement is especially present in public settings. A large venue accessible to the general public is likely to include multiple legitimate APs, that are all part of the same system (e.g., “mall Wi-Fi”). There may also be some APs that are legitimate, but that are not part of a larger system (e.g., small store individual AP). Last, there may be one or more illegitimate APs (e.g., attacker APs). Although OWE is not intended to provide authentication, extending OWE to a multiple-APs scenario also has the virtue of providing to the STA this indication that several APs can communicate with one another, and thus have established a trusted relationship over the network (e.g., through a wired communication, directly or via a central WLAN controller). Such communication is not a guarantee that the APs are legitimate, but offers a good indication that, if a first AP provides some information, the second AP is likely to provide information that is consistent of that of the first AP.
As such, if FT-OWE does not provide authentication, it provides an element of crowd wisdom, where a STA can build confidence that a set of APs is coherent. This confidence is useful when a STA needs to exchange information with more than one AP in a short amount of time, and use that information to make a decision. For example, if APs 1 to 3 provide coherent location and ranging information and can communicate with one another, but APs 4 and 5 provide incoherent ranging or location information and cannot communicate with APs 1 to 3, then a location algorithm running on the end device would have no difficulty classifying APs 4 and 5 as suspicious outliers (e.g., possible evil twins), even if they announce the same SSIDs as APs 1 to 3, and even if APs 1 to 3 list APs 4 and 5 MAC addresses (BSSID) as known.
Without the knowledge of such backend trusted communication, the client would be left with location values provided by five APs of equal legitimacy value. The same logic applies to other unauthenticated exchanges, where the STA can easily form coherent groups of APs, which information is likely to display consistent value.</t>

</section>
<section anchor="fast-transition" title="802.11 Fast Transition">

<t>To extend OWE to a multi-AP scenario, a mechanism comparable to 802.11 FT is needed. 802.11 Fast Basic Service Set (BSS) Transition (FT) is a mechanism initially intended for associated and authenticated STAs and APs. With FT, a key hierarchy is created. A first level key (called Pairwise Masker Key R0, PMK-R0) is used to generate second level sets of keys (PMK-R1s) that are each specific to the connection between a STA and a given AP.
PMK-R0 is established when the STA connects to the network, and is used to derive the keying material specific to the connection of the STA to the first AP. Then, when the STA detects and needs to transition to a second AP, depending on what is signaled in the Mobility Domain Element from the AP [IEEE802.11] clause 9.4.2.46, the STA will authenticate Over-the-Air or Over-the-DS as defined in [IEEE802.11] section 13.5.
With either method (Over-the-Air or Over-the-DS) the keying material (PMK-R1) required for the secured communication between the STA and the second AP is obtained before the STA joins the second AP. This process allows the STA to expedite the process of joining the second AP and resuming encrypted data exchange.</t>

</section>
</section>
<section anchor="ft-owe-operations" title="FT-OWE Operations">

<section anchor="cryptography-and-key-hierarchy" title="Cryptography and Key Hierarchy">

<t>As specified in [IEEE802.11] clause 12.7.6.1, the PMK is obtained upon successful authentication and association between the STA and the network. In a coordinated network system where APs communicate with one another, it is expected that a single entity (e.g., a Primary AP, or a Wireless LAN Controller) will be in charge of generating the public key defined in [RFC8110] section 4.3.
Once the PMK generation between the STA and the network completes as per [RFC8110] section 4.4, a Master PMK is generated, following the process defined by [IEEE802.11] clause 12.7.1.6.3, where:
MPMK = PMK generated as the result of OWE authentication in [RFC8110] section 4.4 PMKID = Truncate-128(Hash(C | A)) as defined in [RFC8110] section 4.4,
thus where C is the client’s Diffie-Hellman public key from the 802.11 association request, A is the Authenticator (primary AP or WLAN controller) Diffie-Hellman public key from the 802.11 association response, and Hash is the hash algorithm defined in [RFC8110] section 4.1.
Once the MPMK has been derived, each side (AP/WLC and STA) derives the PMK-R0 value, following [IEEE802.11] clause 12.7.1.6.3, and where:
R0-Key-Data = KDF-Hash-Length(MPMK, \FT-R0”, SSIDlength || SSID || MDID || R0KHlength || R0KH-ID || S0KH-ID) <br />
PMK-R0 = L(R0-Key-Data, 0, Q) <br />
PMK-R0Name-Salt = L(R0-Key-Data, Q, 128) <br />
Length = Q + 128 <br />
Where Q is the length of the curve p defined in [RFC8110] section 4.1, KDF-Hash-Length is the key derivation function as defined in [IEEE802.11] clause
   12.7.1.6.2 using the hash algorithm identified by [RFC8110] table 2, <br />
      SSIDlength is a single octet whose value is the number of octets in the SSID, <br />
      SSID is the service set identifier, a variable length sequence of octets, as it
appears in the Beacon and Probe Response frames, <br />
MDID is the Mobility Domain Identifier field from the Mobile Domain element (MDE)
   that was used during FT initial mobility domain association, <br />
      R0KHlength is a single octet whose value is the number of octets in the R0KH-ID, <br />
      R0KH-ID is the identifier of the holder of PMK-R0 in the Authenticator, <br />
      S0KH-ID is the STA, or Supplicant’s MAC address (SPA). <br />
      The PMK-R0 is referenced and named as follows: <br />
    PMKR0Name = Truncate-128(Hash(\FT-R0N” || PMK-R0Name-Salt)) <br />
      where Hash is the hash algorithm identified by [RFC8110] table 2, <br />
      \FT-R0N” is treated as an ASCII string. <br />
      The PMKR0Name is used to identify the PMK-R0. <br />
      Once the PMK-R0 was determined, each side derives a PMK-R1 key, specific to the
connection between the STA and a given AP, and used to derive the PTK. The PMK-R1 derivation follows the process defined in [IEEE802.11] clause 12.7.1.6.4, where: <br />
      PMK-R1 = KDF-Hash-Length(PMK-R0, \FT-R1”, R1KH-ID || S1KH-ID) <br />
      where KDF-Hash-Length is the key derivation function as defined in [IEEE802.11]
   12.7.1.6.2, <br />
Hash is the hash algorithm identified by [RFC8110] table 2, <br />
Length is the length of the hash algorithm’s digest, <br />
PMK-R0 is the first level key in the FT key hierarchy, <br />
R1KH-ID is a MAC address of the holder of the PMK-R1 in the Authenticator of the
AP, <br />
S1KH-ID is the SPA, <br />
The PMK-R1 is then referenced and named as follows:, <br />
PMKR1Name = Truncate-128(Hash(\FT-R1N” || PMKR0Name || R1KH-ID || S1KH-ID)) where Hash is the hash algorithm identified by [RFC8110] table 2, <br />
\FT-R1N” is treated as an ASCII string, <br />
PMKR1Name is used to identify the PMK-R1. <br />
The PTK is then defined following the KDF method described in [IEEE802.11] clause
12.7.1.6.5.</t>

</section>
<section anchor="ft-owe-discovery" title="FT-OWE Discovery">

<t>An access point advertises support for FT-OWE using an Authentication and Key Management (AKM) suite selector for FT-OWE, illustrated in table 1, in its beacons and probe responses. 
   +———-+——–+——————-+————-+—————-+ <br />
   |    OUI   | Suite  |  Authentication   |     Key     |     Key        | <br />
   |          | Type   |     Type          |  Management |   derivation   | <br />
   |          |        |                   |     Type    |     type       | <br />
   +———-+——–+——————-+————-+—————-+ <br />
   | 00-0F-AC | [TBD]  | FT-Opportunistic  |   This      |  [IEEE802.11]  | <br />
   |          |        |     Wireless      | Document    |   12.7.1.6.2   | <br />
   |          |        |     Encryption    |             |                | <br />
   +———-+——–+——————-+————-+—————-+ 
The access point also advertises the Mobility Domain element (MDE) defined in [IEEE8021.11] clause 9.4.2.46. The Mobility Domain element includes the 2-octets Mobility Domain Identifier that names the mobility domain supported by all APs in the same roaming domain, and the FT Capability and Policy Field that indicates if FT is set to occur over the air or over the DS.
A STA in the process of discovering FT-OWE-compliant APs can use the above information, and can also insert the MDE in its probe requests.</t>

</section>
<section anchor="ft-owe-association" title="FT-OWE Association">

<t>Once a STA discovers an FT-OWE-compliant AP, it performs an authentication as defined in [IEEE802.11], with the Authentication Algorithm number set to [TBD] (FT-OWE). The STA then proceeds to the FT-OWE association phase.
In the Association Request frame, the STA includes the MDE defined in [IEEE802.11] and the Diffie-Hellman Parameter element (DHPE) defined in [RFC8110] section 4.3. The DHPE includes the STA public key.
In the Association Response frame, the AP includes the MDE, and the Fast BSS Transition Element (FTE) defined in [IEEE802.11] clause 9.4.2.47. The FTE also includes the R0KH-ID and the R1KH-ID for the AP. The AP also includes the Diffie-Hellman Parameter element (DHPE) defined in [RFC8110] section 4.3. The DHPE includes the AP public key.</t>

</section>
<section anchor="ft-owe-post-association-and-roaming" title="FT-OWE Post-Association and Roaming">

<t>Once association is completed, the STA and the AP derive the PMK-R0, then the PMK-R1 for the current STA/AP pair, then the matching PTK.
Later, the STA will need to establish a secure association with another AP (called the target AP) part of the same mobility domain as a the current AP. In this scenario, it is expected that the STA will have discovered the target AP through a scanning process during which the target AP MAC address was discovered.</t>

<section anchor="over-the-air-ft-owe-authentication" title="Over-the-air FT-OWE authentication">

<t>To perform OTA FT-OWE, the STA follows the process indicated in [IEEE802.11] clause 13.5.2. The STA first sends to the target AP an FT-OWE Authentication Request. The request indicates FT-OWE as the Authentication Algorithm, includes the RSNE with the PMKR0Name value, includes the MDE, and includes the FTE with a SNonce and the R0KH-ID.
It is expected that the target AP should be able to communicate with a primary AP or a WLAN controller, recognize the PMKR0Name and R0KH-ID, and be able to derive the information needed to derive a PMKR1 value.
The target AP responds with an FT-OWE Authentication Response. The response indicates FT-OWE as the Authentication Algorithm, includes the RSNE with the PMKR0Name value, includes the MDE, and includes the FTE with the ANonce, the SNonce, the target AP R1KH-ID and the R0KH-ID.
At this stage, the FT-OWE authentication to the target AP has completed, and stays valid until the expiration of the reassociation deadline time. It is understood that the STA may establish such authentication to multiple target APs.
Later, when the STA needs to associate to the target AP and proceed to secure exchanges, and while the authentication is still valid, the STA sends a FT-OWE reassociation request to the target AP. The request includes the RSNE with the PMKR1Name value, the MDE, the FTE with MIC (as defined in [RFC8110] section 4.4), ANonce, SNonce, the R1KH1-ID obtained during the authentication phase, R0KH-ID, and the Diffie-Hellman Parameter element (DHPE) defined in [RFC8110] section 4.3. The DHPE includes the STA public key.
The Target AP responds with a FT-OWE Reassociation response. The response includes the RSNE with the PMKR1Name for the target AP, the MDE, the FTE with MIC (as defined in [RFC8110] section 4.4), ANonce, SNonce, the target AP R1KH1-ID, R0KH-ID, the and the Diffie-Hellman Parameter element (DHPE) defined in [RFC8110] section 4.3. The DHPE includes the STA public key.
At the conclusion of the reassociation, both sides compute the PMKR1 as described in section 4.4, then the matching PTK.</t>

</section>
<section anchor="over-the-ds-ft-owe-authentication" title="Over-the-DS FT-OWE authentication">

<t>To perform Over-the-DS FT-OWE, the STA follows the process indicated in [IEEE802.11] clause 13.5.3. The STA first sends to the current AP an FT-OWE Request. The request is an action frame, and includes the STA MAC address, the target AP BSSID, the RSNE with the PMKR0Name, the MDE, and the FTE with a SNonce and the R0KH-ID.
The current AP passes the request, over the DS, to the target AP. The target AP responds with a FT Response containing the STA MAC address, the target AP BSSID, the RSNE with the PMKR0Name, the MDE, and the FTE with a MIC (as defined in [RFC8110] section 4.4), ANonce, SNonce, R1KH-ID for the target AP, and R0KH-ID. The current AP relays this response to the STA through an FT Response action frame.
The STA responds with an FT confirm action frame sent to the current AP. The frame includes the STA MAC address, the target AP BSSID, the RSNE with the PMKR1Name (derived from the PMKR0Name, the R1KH-ID obtained above from the target AP, and the STA MAC address (S1KH-ID), as defined in [IEEE802.11] clause 12.7.1.4.1), the MDE, and the FTE with a MIC (as defined in [RFC8110] section 4.4), ANonce, SNonce, R1KH-ID for the target AP, and the R0KH-ID.
The current AP forwards this message over the Distribution System to the target AP. The target AP then replies with an FT ACK message, that includes the STA MAC address, the target AP BSSID, the RSNE with the PMKR1Name, the MDE, the FTE with a MIC ((as defined in [RFC8110] section 4.4), the ANonce, Snonce, R1KH-ID and R0KH-ID, and the Timeout Interval Element (TIE) that specifies the reassociation deadline value.
At this stage, the FT-OWE authentication to the target AP has completed, and stays valid until the expiration of the reassociation deadline time. It is understood that the STA may establish such authentication to multiple target APs.
Later, when the STA needs to associate to the target AP and proceed to secure exchanges, and while the authentication is still valid, the STA proceeds through the FT-OWE reassociation exchange with the target AP as described in section 4.4.1.</t>

</section>
</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document does not require any IANA actions.</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>FT-OWE does not provide authentication. FT-OWE provides a cryptographic assurance that a target AP with which a STA has established an FT-OWE connection is derived from an FT-OWE connection to its current AP, assuring each AP (current and target) have a trusted network connection with each other, and thus the information provided by both APs are likely coherent.
FT-OWE does not guarantee that the APs are legitimate. When a large set of APs provide coherent information and allow for FT-OWE communication, it is likely that all these APs are part of the same system. The system may be legitimate or not.
OWE is not a replacement for any authentication protocol specified in [IEEE802.11] and is not intended to be used when an alternative that provides real authentication is available.</t>

</section>


  </middle>

  <back>





  </back>

<!-- ##markdown-source:
H4sIAHtbt2EAA+1cy3LbSJbd8ysy7A0ZRdKiStWuUkxNDC3JYbUlSxZV4eio
8SIJJMlsgwAbCUjmRC3mN+b35kvm3JsPJEDqMdWuqFmMFxYJJDLv89xHJjga
jXqVrjJ1LN5KU4nbUuZGV7rIxaIoxdVmU5RVnWtT6UR80qXKlDHiLMnL7YZH
9d/ejq4+nQ16cj4v1R2m4e+9tEhyuca0aSkX1Wil8MQIH4p7NTqY9PSmPBZV
WZvq8ODgp4PDnqlknsqsyPHIVpneeV6pPFWpwI2qNseCLpS5quyEvURWalmU
22Oh80XR2+hj8WtVJENhQHCpFgaftmv68LnXk3W1Ksrjnhj1BP7pHPP9dSze
EVF8xZL6V1UWaxVdLsrlsTjRJin4q1pLnR2Lv6uS2fm3hO6Mk2Ldmng2Fldl
GU07q9QGD4Sr+2cF3WU0I/3Li3ItK32njnu9m7cnP04mB+DBMSNOZS7eyfIL
FhWQnfgkyxKrvJgm6oV4X69lqXvC6fYhPeaJ0yNGynKpqmOxqqqNOX71KpUQ
fCmTL6oca1UtxiD7FbT6alWts1flIiFyegLDMD8WS1bi8GDymik9nEx+iiiF
RN6UMs1VGQh6r7bivihTw2ZWGwXZCTxpRFVA1akm/Yob9Y8atK5VXokLdacy
8zvoJGLadE5++um1k+jro4jON2OsoucyUDldz/Wy1tVWFAvxy2ajykSC1Dsj
LmDH9oulW9AqzNUn4up3ifP1kSfzUm6dMHtk3cEKzs/Ozn48OBxPJg3VPWtP
dCvQHRR8Mf0gLlWq67WYJgldOSnyqiwy0b+cngzYbq5XWwNxZ+JCblUp+tfv
/jYQs41K9IK0AOMAO2zZdg1r1PazJffw4PCADXY0Ggk5N8Rn1es9aXRDkaqF
zuHkTohkUvBbu7YisxbqK3DAENLAMKqV4oXhUqmwgqDLm7K406liUypai/br
nMQE+2GDSgdChdXpSekXS8S9p09aQW0KDavrT68HY3G70kas1bqw5MBqiZK1
ggJSnibLinu+pgBX80ybFdssrAZYKL6orc6XMD4gmIag8USBwaWYXhsxVyBb
iaTIc5UwXe05LNswNAwe4mNtwAPdx4xSLAi0qwa014WTA9YdW4WsdZpmqtd7
SRBaFmnNq0BbzBVMsOZ1UmWSUs/3SP1JPYo+RYCWNn91ePWZSJaVwEpAtQ3M
aZ4pyLpaef2t66zSo+k1uLrTZZETMWD0HvJRXluYs5EPCKQ7X6E4ujFX1b0C
7iFyiCTTxApZ9ZqEiqXtjen10C5KOsr0clWJMsIWJtEqAxFo6U3NwNLF2VcX
iGaqvNOJwl+YxdlsBob1WI2JrzWEw4DFa9CCMrcaLu7wX5gLzlxCYSVUUJcK
+oFSIowzIpP5spZLaOscoo/1M+RZvgTYfHH5y+z2xdD+FR+u+PPN2cdfzm/O
Tunz7N304iJ88CNm765+uThtPjVPnlxdXp59OLUP46roXLqc/g1/SLQvrq5v
z68+TC9esCYgrDmxBuPelIpUIk2wJjaGNyfXYnLENkEw+dlZx+ujz6Tm3M5a
5NnWfQWnWyEBt7Kkx+FdIpEbXckMhoHJzaq4zwUZCIvwDVB1WRZ1nj4DczxY
wIrgwAkMRJs1ewxMxZkkpRxs1rPb6YD4Cx7JvrHHJq3imxn2YAgBQVpgXVhG
QKwInBgP71ca8Wmt4M/WKEnpoAL85/Tclxw4oxd8GS4D+8jUEp5P0II4wHP3
2SpxayNLhiC2+YIQHukTrOdLxw7pQWv4HH3BhawqjlSDMdnhWubbjnd6stYI
VLlS6fOEhEHs7ZuM0Yx0a2qWFN0lI2AxQr0gnA3qDiofi7cgUH2Vazxnl3ZS
fgu0Ebd6TVB4qaSpnTsjJ70ckIwTlRJ/poZVGOVEKpny+6LOUpI0PSU0fC/V
lIMmaofMvtWKRlYCpdWQI0mTOdJkjHCCdGCNGDhRY4YF8kiH2m4Fw0uQ2fpn
EVUKzJmUirII4mpT6juZbL3K1FeyzqWCuDUDKIxWl5Lw05kGeGpGOY7mNE9R
WWxkOpS8UyYtC0pfDCsUQoeUE4SRUheNMu0ET6gTcecL35aYg2CVHFSUcM+U
JQB1G5XUlK+Q4SDno/BJWK7J5Xh29rbI+zDdQiY6g4dXVhQ0RWnhzjMYgN6T
S6tFkZFMp6grcQ/DJoOAU8Cyc0+ooFlyZJA+4CJmLmkcPIscvqxYNBa1vWwI
biLRFPNKgt2QklGRRBK2EQaZD60fIvuQ+XR2C0qBUEsIU3xQiD9z3LpRhFUs
nuBMBAeNCjzr8Yo+jIHvaClWKaAROCnnJElNdkNJp5iXhUwTyhOiaYbk9Bwj
UwWmIBZLPQu/ZhAl4XjA8NRPP3y8huKMQYwy1oLXhGVWawBbbVcPRhxTbsWn
0jZ83EuO2OxezqsC8sEMCmjZIl0MZxxNzdZUak1c06WFLg0F8W9m4S0CXIyy
BvAcajP9RSGgPZdoMY2TLpc3clrJtsz5p0+UPF9NKGN2gz9xUHx5Uhb3KAq1
Sama5FwvTnnwVXHui0VAJhCKryI+1pBJAmYqsgAoeYqsBLWMuFN5rVxk4yzO
yWip4OQARfdgw3vF+JbViHMBT6Nw5fJZQmSYIQX5h4TVV+PlGCnImgZ90qO3
+sXAowqZEIIE5yCGqndC7DBrs9xQzOuqucFB2C0nLYNlZznDy5mKnCTCfg7m
F3AnNitHwVwxCHif0lmbTz+lj6t0DbNMM4IsuBUpW9vMQPu+R1TXdLMEW4SQ
YdCDXMZ4AY9otWAgLJiVszXE7woKBMN2Xt0kuuQbbGNdszYouktm2jBQPpbr
Dh0io0BZIeQ07kUZoe314BMwwtaUK71psmOPM05ODVhSVZZGy9qqEReTChYG
ed9piWFguCI6P1HBm9gSN6P8RczINVrPe0lLgVQbUaBSqvFhYnSf4RSLBaIn
PVMUaVdMQ0rJZHDmyC+LtWqj7kM4EWk7hsymdgIwQH658w8Z/KSBvanFASbG
NuGezjd1FeXDQKBM+bo1Yfi4Z/jw1Zj0qShEojOO9Qs8yjmTzayAGvQwJ3dE
NT2WV66AjobjW23Uos4443cTEy6bx+Net6qz2YdNGOUaJYCVC0K/tcbaONJa
QkV+J78QOynwz3Au1koxteWAewvfB9l5bprsj1bwaUS8AOdBT3oLmRUtc8Tj
f4j0H1byk4O4JuXcXYg0vLNWw8HQZhUyIjxbFiUGrUVZ5zmvYPMqxTksl7k2
VrIn5wVcbrHQCUBmiyJbIgAsuKUR00+FWW02OtEFIADJBIrxMkAfEnAbNTB7
JiqENYOcGfCSu3oGMA5GamtMDv9ns/NTQxPHzNBq/rlITUCatjwvpydCpiki
G6X+/Tc02YAmoyIqH/c+uYSR62pcylS6ZHjkaDonoCY8c7jVgSB6yHUbQt6d
qUVlZR8EjfqlxuJOtRi1hcPeWZjBSojHVE04rEHqz+NtRsgCyIolQipK4Yza
YaFv1OlqxaWC9dSobEQCbDQQhqymsWGqlzfG+aqvO2PTakETSqNNhjAXwZCl
lDMNX4219w+Qc/h2WSdMxTnMsFUIcIvIlThFqPJuGbEBDiodi3ixN+Asafdl
oOVBvImBUnBgK49mFZ3jHqc9IdhyRWJMgXSIGxiguS1hCNN22SGusSDTAV1E
PJUoKxg6NZa3DHoo6CqidOqwOaPGNY/rowaHlYlrqUsgqxKX0lA2QG3jm4Oh
uL58P7o5GDh05BTAJldVCBp2MsAs6w6TwrL5sYkZNNkN1zyhs+mCfFSI+1JK
hkIKgU2TT1EgsWTYDLEJ4QzUwa7sXMbP7eK3dc6I/FSV2hUH3SboI+S50MZZ
SdHJk2+5Q9QiBhUM00JrhxgS9URtn7fJ5FO1cekThRUXYY1e5jKz/Sqa+LJw
hcxpsaac/8yFRl/aU/D5tenHfyZYpGjz0/hofDg++ktUdCAbbFmTuELaM8L3
0VSXhO3h++nM9s6aNmq8gnHimXw//sHCl1Ca8cB1ovuPTDzYqwRnOwNfGlhP
aCrwDu49VIO3Uxpf5/lK2w/+e6Fz0x7uMgNu1VDrnQoeEyuf2ryprnyDxA6D
fdBctjKKF+eArEzNHaGmouMy2GMkMOulS4+uNuRbvMHBBRNGF8tSblZbnonc
8p137R7nV25nYlc3TvuTw/Hr8V/GE6t9CLclj3pThI4X5T7tbMz6oQOhx4Tt
nG0szsmDk6IoYcyMUj6NdoWMjQWcuz+aidj2Uuio+1wOQqR4DQLhBr6CEdcl
QlW5ZU/iPk5rs+mkyb2t4XNrmJovpQ2uDtC87lzRSOi4b/cg2PzR+Ptx78on
ByRYP9HTguKwkgEkOJWAzvfOf0TMAZDhGV5xHnxTauU0tXhjiJ5khPUHrWEC
e/jexeXj3iVN/XPMgO2X2/aJQXgMxX/bOB6QyhFNdX6KKW+RypF+R5PDH/vv
pFn1T8RvYjoYdCFlL+89rtuswZwQ702C89//+V9GnFL+p0bvVJatZR6rLQCi
b31HFkyooqhSnvoppw1XMJ7+JhgT2VK3evvdq5oNdSFtNCJR+NVX9LlJfp+Q
yiSyONYbVdJzMjQb1mAWNtBS1t6fXr/6dHHCS/K2gR1jvL1SROWcKbalp4yG
W+LWcG4ORsCj0SlB2c/i/enbETE2ulD5slr1ibyh+Hfg2s3BiyHnzRnfEb/9
xt/o7+Wp/Xtz8P5dc5e+jeyNmf04EP8yL8Wrf/WJwM/ioh8tPxRIVT52Bn1A
tjqaSZjvzuiPQ/D0YxhvKcawj+I7uuGvf2Lb++hV5Qh0qQBiEdKIzZMaG3Yl
46ezAEMNdtu2ha9YzH043Fp90BGNoJJDJDYeAzq2RIVtZWMDoUEgruJs9nDo
2RT8L1IQJ6cOawvgL0oIbuyzsXjy83o9p93EhR1ifJZC8+yZ2j9mXGpMZXkg
kBo1mB3xf54FORvyVDL2sATvtOmqZ/fhwopvYPIuVl2XxZzOaFhvg0vCBkyg
hq3N0dFNps4DLcjsVJY27swjlR/n+xH9y9OzAfHHoeleugQzrUvSBhUINqUX
a79QaieIYKEjpsgJ/ikNOPfZM/uo4b+RvTfoVZGl9pvPtvNdfOxqtj0pUIYj
8Kym8hCVnkXqqOwV/dn1dDBuz3Lb4BG3hBdUECau6KGzHRyPLEaZ4/hZPGUd
fW+0seDz4QUBSQcTBoM2CTbMPALM/ztnCivTZLb6IhYQMKazk/NzYSoyk/1i
cAxFJYtbexsBd+fROA0hMd4ziCBvWNvdjSYo+Bgg7dAJwdCwW/n09hRmcSbT
lGahp9Wtra5v348bxU5aSFc0OXU3bXksiSW4O/JpS5t/t8huFLLycHFogjh0
M2liy6QdW2JL+GaY3QbrYCbfwNLalLWDU3tKdsJULznvaQdSHW/6NG0B5/qA
sVYzITztpcg4Fbv3DpZUjQnswxM3pEeW5OaeTdqYcj0NtyJ7snfzJ9EiZvhm
8jhUTAJUOB+kXGTXXgbfDi3Cso/ixB4eHkWHybglsNv3QVreSNu1A4zd1+ut
QzL7co9gyz9Q1erL1lM6JIrKnmrSvH3URKa4XmnDe4K8i8sFvXvQJi/E727h
ScXupczl0kXc6fvLAebQ3HrKAE+YpplqSFtcNR30q1zLhGU94eMAdNJhzmmC
7clsOE/wWbkZC3LT70bh33c7H0Z7bu4f8V2EJ78xOP9yzh9nTDpd6zDrxjHD
YucbX+hM6S/fbjcqXHNfws1YeDQiAq5Hpux+EN2bfhn7rWoWjaf8Q2R5cDA6
eDuaUhH56+2b0890jZTfOmDFdHELx9PcMuNnMh46CO7aqT+T6EZE+fdzp4wO
fO3Id0faf4gsGQ7azkm7sZGH7suMWxnvvjA32ddstMH/obncJrxd8HDk8tdH
cnLOsgnc3TnXTlLtkMXCLe2Ru7NcYdumLCR34Oz4YejHIMKd+PMptsV2XSBz
3Yq3XAS4jTp79tvYbUxuzSo+BVskqAKbLWNpW5zh++ls3Jty0uRIibqFqUNM
Wy0QgI24J6Tp7Inf267dMSw5p/MsrV1bv6HHGtQAsdJuG0FJHvA8yHHDw9iN
EQe706YI6dmOgu27e6o4BO0hy27PqpII4THdfuGDeVB02LWDftMQNV1B44Rr
Xdy/zNGcSeJAxpL0fXXWI/MV91w2iMlqbE+tqphjPt8KkdjysOmKt4yS5PhQ
UuqNp9MLupY0HzXrgsucvrvu+MzeNiLzRmPbNBBRTYPpAVbiUnfotwG6rEQG
z7tUs1m8I+U3EiDr/R6+x8FfW6LxhDfBaEVfa/pFfRLlO/lu14T74zsP/9FS
pdMQkVAbp7guTDWKhUvk31jg8F4S3XXnx6mLG50f8yxjlbgacmVI5TeJXBbr
BQIY4T1QzPCK6AOSRIPh88mKgIKKqt4F7ZR09nL2nB/zBxZjkt2RYH9IL+z+
0Vz27RA6S7R76Gm3h0HHZyK6SaH+eHizj7qvid8im7fyPeZ06RDNkRtDJwpI
AKFctG0Wu0fcfiquRrgMDtOzrl+GDShCaw8bLUTibWIHcuIKtPoE09O+r4D1
QeLhEpa2yA4bGLMll7GvbhQdJgL6dsHSQZedxkF7FKACDD4KtMOOt84+nDXo
3FQ/rje8H0taVwkFrG2J2YeCHcV7vkUCYNcDttDwbFb+1ILfbd/ZIpKi3Z2X
3f78EDJJimWu/0N1mGFf9o0x+hKtEzlqfN7A7u9HA7hnAq91Bw1uW+TbYgLK
9OfuH1KgBWyvQQff/3dUyKuyEp3BR58bbj2i7+h5WjkUqFB6DFuxuc3Kjs3T
VkYEqDQzJtkaYkKnosajGT8CI9Jum82BFB1Yb1AuVTLN6Bw+HboCLrHl1TmU
aCo6KtfCIToq2aCmPbO8Q2g4KxqoNQGHW/v+Ya8/nNzY59upT1/opoPp6LyM
3WLRmcv9OptuJFrCTpZKg0kWSKQXdlsiHii6tHRh5FGLmsQWFQypZTuX5yei
/4y9vcEwmFhsXmRUE7KqsD3tcH6PHDi7G7Zd+s/IyWjU7UMg4LVxo/ZtBu5A
wDPE7xOGoMI/SBVtT5+wiIOsWR1/kryn1nUB+RhkHsKAoZgXle14W1CpqyYg
THbeBmttuT+QdrVyh9PZc1KHndHfIoX4/tEUoknIohC0P2mw9Vvi3hmR/nzq
jvSjhKprG2/sZt8jESgyz6bkfjJZuG1zspHGNyfC9n1UZA8fwLUHYzMV8aFw
ouRBNid3/mCO/wm37BZREQREyY1lPRIenW7fGhuUA9a0Dtm7LDtviSU2DKsQ
GrwnybFnqGHu8RPCNO8Jt4oEmsiO+GZ2ZoGx7w5ANPu2HY148YXYYpsqYXhH
nHuoEn2/AzB8epPedwiPxpPBn2USj/kUHrmXZeoMw70/FXmVpq2Hec2Lz+zZ
rae8rLL7MfZgcGQg05P3fgH/6vU31f1DIdCJ9pmyjfPeWd6W707xQINvkV3S
Ye1z91Zo00a5PT9zJ1+b3w14JE115cT/Z85/TubctBIdEkaSb4snvAQSbDCi
7eGUgk5t9V6eTz9M6Swi5SThiGfn9w78uzHu6Kugt5z5OYut1MN9OSOuqRfT
net5L9iMPWvRS+dJc8yUjvYbU5cyeoOmYZL5tk0X2y8my2u9VBVyjugEAb8n
HIHz3kG0kVmZCKGGlhA+Nuvel+37u+yCTNXA9pCal7maA5btF+F5ju5LYVWn
4o9fiuAEMrx7Zd87CG8P7Qj7We9tjcUn99YLHz2N3kzaeaGn+0qN/TmPaOO0
8/KHbbX51yNYbxn7vGkIeeBdRvduh8V49+bgziv84170QqBklJeJO37OP1Sw
3SnQyqIqkiJ75ISyO5nffccQ6/Petn0Pi7Y46GeW+PdmLGvBdOGeO0eWKa+9
kzqj5g7tefwPp7rOgE9KAAA=

-->

</rfc>

