<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-labiod-rats-attester-groups-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="Attester Groups">Attester Groups for Remote Attestation</title>
    <seriesInfo name="Internet-Draft" value="draft-labiod-rats-attester-groups-02"/>
    <author initials="H." surname="Labiod" fullname="Houda Labiod">
      <organization>Huawei Technologies France S.A.S.U.</organization>
      <address>
        <postal>
          <street>18, Quai du Point du Jour</street>
          <city>Boulogne-Billancourt</city>
          <code>92100</code>
          <country>France</country>
        </postal>
        <email>houda.labiod@huawei.com</email>
      </address>
    </author>
    <author initials="A." surname="Lamouchi" fullname="Amine Lamouchi">
      <organization>Huawei Technologies France S.A.S.U.</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>aminelamouchi@huawei-partners.com</email>
      </address>
    </author>
    <author initials="J." surname="Zhang" fullname="Jun Zhang">
      <organization>Huawei Technologies France S.A.S.U.</organization>
      <address>
        <postal>
          <street>18, Quai du Point du Jour</street>
          <city>Boulogne-Billancourt</city>
          <code>92100</code>
          <country>France</country>
        </postal>
        <email>junzhang1@huawei.com</email>
      </address>
    </author>
    <author initials="A." surname="Duda" fullname="Andrzej Duda">
      <organization>Grenoble INP - Ensimag, LIG Lab</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>Andrzej.Duda@imag.fr</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <date year="2025" month="April" day="18"/>
    <area>Security</area>
    <workgroup>RATS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 55?>

<t>This document proposes an extension to the Remote Attestation 
Procedures architecture by introducing the 
concept of Attester Groups. This extension aims to reduce computational 
and communication overhead by enabling collective Evidence appraisal
of high number of homogeneous devices with similar characteristics, thereby improving the scalability 
of attestation processes.</t>
    </abstract>
  </front>
  <middle>
    <?line 64?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC9334"/> defines Attesters as entities comprising at least one Attesting Environment and one Target Environment
co-located in one entity. It also presents different ways to compose the Attesting and Target Environemtns, 
such as Composite Devices and Layered Attesters. Layed Attester reflects a cascade of staged Environments. It
is more related to one device with different layers and there is a relationship between them. 
However, mechanisms for efficiently managing multiple, independent Attesters are missing.
Assessing the trustworthiness of large numbers of independent devices individually can result in high conveyance and processing overhead.
This comes into effect particularly when these devices share identical hardware or firmware components, which can lead to redundancy between all individual remote attestation procedures.
One example would be a smart factory scenario where numerous sensors of the same model monitor different parts of the manufacturing process.
These sensors share identical hardware and firmware configurations.
This document proposes a model by which these separate sensors devices can be grouped into a single Attester Group and a shared remote attestation procedure can appraise their authenticity collectively rather than individually.
Direct Anonymous Attestation (DAA) <xref target="I-D.ietf-rats-daa"/> has a similar concept of using one unique ID for one group of Attesters, but its goal is to mitigate the issue of uniquely (re-)identifiable Attesting Environments, while scalability is the major concern in this document.</t>
    </section>
    <section anchor="terminology">
      <name> Terminology</name>
      <t>The following terms are imported from <xref target="RFC9334"/>: Attester, Composite Device, Evidence, Layered Attester, Verifier.</t>
      <t>Newly defined terms for this document:</t>
      <dl>
        <dt>Attester Group:</dt>
        <dd>
          <t>A role performed by a group of Attesters whose Evidence must be appraised in order to infer the extent to which the individual Attesters comprising the group are considered trustworthy.</t>
        </dd>
        <dt>group-id:</dt>
        <dd>
          <t>A new Attester Identity type (see <xref section="2.2.1." sectionFormat="of" target="I-D.ietf-rats-ar4si"/>).
It is a unique identifier assigned to each Attester Group, allowing the group to dynamically adjust its membership without redefining its fundamental identity.</t>
        </dd>
      </dl>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="attester-group-and-comparison-to-composite-devices">
      <name>Attester Group and Comparison to Composite Devices</name>
      <t>We should be able to leverage the similarities between attesters to avoid redundant attestations.
An Attester Group is by definition a dynamic entity.
Attesters can join or leave the group, in contrast to Composite Devices that have a static composition with a pre-defined set of Attesting Environments and fixed parameters.
The dynamic nature of an Attester Group allows for the flexibility to tailor group parameters.
This kind of flexibility facilitates the implementation of various group attestation schemes that can optimize the resources required to conduct remote attestation procedures for large device groups.
 A composite device is an entity composed of
multiple sub entities. Each sub entity is an Attester. In a composite device we can have multiple Attesters with a Lead
Attester. The Attesters are appraised via the main Lead Attester's help. 
The lead Attester generates Evidence about the layout of the whole composite device, while sub-Attesters generate Evidence about their respective (sub-)modules. 
Composite device model is not enough flexible to  represent our definition of Attester Group where we do need a leader attester nor a composition of evidences of the attesters.</t>
      <t>The table below summarizes the key differences between the Group Attester concept and the Composite Device concept.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Composite Device</th>
            <th align="left">Attester Group</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Lead Attester</td>
            <td align="left">No Lead Attester</td>
          </tr>
          <tr>
            <td align="left">The Composite Device is identifiable by the Lead Attester</td>
            <td align="left">The Attester Group is identifiable by a group-id a unique identifier</td>
          </tr>
          <tr>
            <td align="left">Composition of Evidence of sub-modules (attesters)</td>
            <td align="left">No composition</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="attester-group-extension">
      <name>Attester Group Extension</name>
      <t>In Section 3 (Architectural Overview) of <xref target="RFC9334"/>: we could add a subsection 3.4 titled "Attester Groups". In addidion, Section 2.2 (Non-repudiable Identitythe) of the draft <xref target="I-D.ietf-rats-ar4si"/>, 
we could add an Identity Type "group-id" (i.e add another row in the Table 1 in <xref target="I-D.ietf-rats-ar4si"/>).</t>
    </section>
    <section anchor="use-case-scenarios-with-a-large-scale-network">
      <name>Use Case Scenarios with a large scale network</name>
      <t>In this section, we provide two examples of applications where all devices are homogeneous with similar characteristics.</t>
      <t>Use Case 1: Remote maintenance in the aerospace domain</t>
      <t>Context: EU ASSURED H2020 Project.<br/>
Once an aircraft lands, there is the need for the physical presence of an engineer to go and connect to the "head unit" (in the cockpit) for extracting log data so as to check whether something needs to be checked/maintained.
We need attestation of all core PLCs and embedded systems responsible for the core functionalities of the aircraft. All attestation reports are remotely sent (in a secure manner) to the control station once landed. We can group the attested elements into different Attester Groups.</t>
      <t>Approach: We can consider an Attester Group of 1000 aircrafts (same manufacturing brand)</t>
      <t>Use Case 2: Automotive domain, a Vehicle with embedded Electronic Control Units (ECUs)</t>
      <t>Context: CONNECT EU H2020 project.<br/>
The automotive industry is moving to a more hierarchical in-vehicle architecture where ECUs are monitored by Zonal Controllers and these in turn communicate with the Vehicle Computer. This is, for instance, how kinematic data are extracted from the sensors all the way up to the vehicle computer to be encoded into a V2X message. This data need to be associated with Evidence on the integrity of the sensor as a data source and this is where group attestation is an interesting capability. The Attester Group can be formed for hierarchical-based attestation,
like Attester Group of all in-vehicle ECUs or attested group of vehicles within an intersection.</t>
      <t>Approach: we can consider an Attester Group of a fleet of 70000 vehicles (same brand). We can also consider an Attester Group of similar ECUs.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>[TBD]</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-rats-ar4si">
          <front>
            <title>Attestation Results for Secure Interactions</title>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
              <organization>MIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
              <organization>Intel</organization>
            </author>
            <date day="6" month="February" year="2025"/>
            <abstract>
              <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

   This document also defines two serialisations of the proposed
   information model, utilising CBOR and JSON.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-08"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.ietf-rats-daa">
          <front>
            <title>Direct Anonymous Attestation for the Remote Attestation Procedures Architecture</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Christopher Newton" initials="C." surname="Newton">
              <organization>University of Surrey</organization>
            </author>
            <author fullname="Liqun Chen" initials="L." surname="Chen">
              <organization>University of Surrey</organization>
            </author>
            <author fullname="Dave Thaler" initials="D." surname="Thaler">
              <organization>Microsoft</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   This document maps the concept of Direct Anonymous Attestation (DAA)
   to the Remote Attestation Procedures (RATS) Architecture.  The
   protocol entity DAA Issuer is introduced and its mapping with
   existing RATS roles in DAA protocol steps is specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-daa-07"/>
        </reference>
      </references>
    </references>
    <?line 172?>

<section anchor="implementation-considerations">
      <name>Implementation Considerations</name>
      <t>Details on creating and maintaining Attester Groups, choosing the number of Lead Attesters, and methods for evidence collection and signing are left to the implementer's discretion, allowing for tailored security measures.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8VZ23IbNxJ9x1dg5QdLW+SsJCvrmJVKQkuyrZQsORaVbJLK
AzgDkrBmBgwwI5qO/S/5lnzZnm5gLiQV1+6+7ItEzuDSffp2ujkcDsX9SD4R
ojJVrkfy8biqtK+0ky+drZdezqyTb3VhKy3DK1UZWz4Wajp1Glu31ovMpqUq
cFLm1Kwa5mpqbDZ0qvJDFZcO57x0eHgslNNqJG90WjtTrcVqPpJvx5Mbcbca
yYsSa0tdDc/oJJGqaiR9lQlfYVOB9+eTF0KoulpYNxJDGa59ZetMyUu+Vkhp
HY58VauVNnKi00Vpczs32ssXTpWpljfJOLlJbhMs1YUy+Ugu6IAkyP3tgncm
qS2wgC7WEOLoy4H8vlZGZrV8Y01Z0YfvbO2wJrUZofjs+Ojw8DF9h1oj+dzW
uLbUw+cmz3Ev1la8uC4rh/dBmFaHcWFKDR0KW6cL899psX1mq5eiQ/N4ZlRs
uFSuKrXzrGFz/Xd1KX9eqHL+P+H3ri4/0Oaj/xd4ZeY+6HfyDGZsFHjpdGmn
uZYXV2/kUJ6X3hRqPpCXFy/JVT4HWzwuoeO+pV3JzHXOpss7+dy4u4XNPzSX
4YS6XNgZYuLmYoKnTajsvGg8Dqck03jKt95UuKJZmWS6B97bhTYlvijvtXz6
RQfZP0+On33RQXamXIFIzTZweqldocq1EKXFh8rc6xFeXwzPEqOrWQxRd+JN
iMHh+O3JzYUQppz11799cfrsyZOTds3pq51DMqXi67PxWAhdViQUlt2cX74Y
yT0cUS2M3xNiOBwCHVIorYSY4KFE/qgLbJFLZ5fWw9NUKfX7SsNmtpSVldVC
P5CRpHjjbKqz2tEWBx+vdFrhm5yuJdzM2axOTTnn7SK1MPKykna2ncASyWJ0
NypTeLrW4Ww4PLx5WYcrVS6FKjN6VNSlSYMc9l67hVYZ3atLNc3p0tTmOcQB
hvL83mSaQkctl04Zr3IBKRZmvpBlXUwhCH21hZ3rUtsaiOh7k0KplakWEo5r
cuVkulAEmnbGVyb1A1LLaVK1AHD3jaI+VZTJchhA0jWqB9iS8IIj+SQYojBZ
lmshHlHmZbhomRC//z5sbf3pE8SZIZH4FjegDbjIxpQWCB7IRPerSuZaeYBc
Npaix+flvXG2ZBsTevR2otxcV/1XsNAwt4BUZ7AeLwp+lMgL7Mu9hfza4xkA
MjNECp23Umu2FUkB32EIupvpts2bdFGVwE545ERS45T3wXPkWQSd9lyqNY7P
Oo0TftQ9gG/MyLxYLlMFzDNNRgTQc6zqaeVJegH3Kiwc0yEdk34QmPQLdg5m
7lTK6fIgB5tYGrqFt8I6fmGWcqqrldYlvS8SKV7ZlYYPDmSBfK1K44tQxfVs
ZlKDM/O1RCJQc8KkqPPKLHM9AMqZXmr8waU92+LGwngyaCLG5C2+8a3K1b5a
WYdYhj940jgndKMb84P+oY0f45lBDNQqhyApoht2hBRkZo4CxOa9XnN1Ia2j
m9KtTWglIVXAynwc8INuwF9SOTNpDTFw9GoRMPG6vdovSB+KPyxD+OJrtqJH
gGdmXMGf2XlKstYAZxh4BgmZU0jHNFBmkG7d4g5FekphBeemnVDj1JSIa3Ll
96oA6HKF0oZEgcXSF5BdzhDT1q0Rt0gdzlhSwjGi2lEugMN7G6Dl8EYVgi9l
Osff0mBrz3MIjHYlDF7T4eBZADJiSjgSPM2pfwkP2aGHTzkz89oFB0z+Mm1H
wabriGIV74JccPv20sY2BDKQYG7IQQ+wAQvEzfVWkmZ5VBA3+yzefGpMtJwO
jJPEGFlDSopdYobHQC7AjWXY1PfSRJwZR/41Lm25LsgQ/cqzjzJ3IJs0iS/I
kgvlWfqYrbtyUwdPhhOgZPxWg5KccXTSE9a9X5PggdMakQE7zi0MYji7FUi1
c4KQDIvYrDnbhOOgxb7Tw4NgxJlR0/wvkm/w7nyzRtAF7C3vbJTaERSy6tsY
9eLRn39MQCcM08E1lW4NLfLcrjg74FVIHahGSBAw0szZQm5Wkq53GOwk3kFb
Jgc76Xcgf0DZmxmQIyGu9Aoqh5qUxYsJzg2BR0JsOhAe4HbpLNRfakcER3PB
Vg/YADBRLWnrdoG0xzEb3SoUKJeR51h8nrEL6UAhKnrW+n8/TXTn92omrQkS
xEjzuJSU75ItvFHwkqHJoh6lXnURcpGFQimr9VLLfa81cL/RXMzlcXKcHCWk
3rDjeJ8+HSQCVZUrS/TKxn9wIMimmZehTmkFRTaxHFD+i3ZvpcfSbA2OTGkE
9lHZOwKN/LjQXByoblGls3Bv6Ef2oxNoxYzyK5mNHD4qQy73CKzvtxqByN4r
r2wIv+B8dxppBkbwcu/17c1kbxD+y6tr/vz2/Pvbi7fnZ/T55tX48rL9IOKK
m1fXt5dn3adu5+n169fnV2dhM57KjUdi7/X4J7yhlLR3/WZycX01vtzbiRm2
J1CZkg8AO5AXCguFhln71JlpcKPnp2/+/OPoBBb7G1jy8dHRM+SS8OXLo6cn
+EJVbRCJUyxyTP7WAv6okWtMKEipWhogiChXlNjtCtUVngQg//4LIfPrSH41
TZdHJ1/HB6TwxsMGs42HjNnuk53NAcQHHj1wTYvmxvMtpDflHf+08b3Bvffw
q29yaqKHR19+87UgUvtACaGsgyrrQ1+xQ/6E+FETdE2NplSKdTmxKzC7UIFD
hg/ktyUEbWhTDbu3JmtpQ9WvUyie43JbMDjNNGY0wzGrmlBqGLDopQ5UqneW
8w8xlHvdxSAxOsog1C1WD+pHha5Cpbpn/kEipZE5h4uZiSri2cMmwXrd65m2
C0qkCe+xjmp8oZkrc3g2GpSKWzLqRHYU5zTSZG+Uk1y/N7EsUdeHVhlvQnrZ
PB6I3RkKiNnGJtAd+oBCGYqaIcrFeSX0aTN5TxQLxTxm3F5J9ym4dIMQgWyX
FSz9IeALHmdrRwi6kJGy0HSU1DN9nv+xeoEmR74fhmGJQB5PWwvFdyZ0vyGf
x6aG9BQNbZe+nrbNVyLPKT23j9Zxf4Mzmg/ypp1bVoEmsSO0B/fKX3CDSxBg
0R01WeitNqGrh/dGRRoBF6R97crHHlkoX6JLof15/5WkftextboWeUr1gY5C
G0QfI5tFRc71jiItoamnw0605tgHTjXUufllbMz3ad8BSGudE5bidBunwGeB
aWkrIGxrNCvB4UJiwGGxJ5Vwj34I74wZIq8H8plF+aZKwGhQuW0WlvAUtRGQ
OEZHJVpi3+YaSMygVpynphrBBCQKtBVw2xABVCSb/iDt5St6F8RqpWwYa+w7
d5JHswD1RIiPu68/biv8Eas2XAFLruz2IyyaPHQbQN9gtMiQJNX2gX2n7NLp
9s5I8sCfHuI7H6XsKRRhb32H2nq4SfQSud/CfxD06Zvr4wNl57yZKwmBYGxo
2RO5P+5GVuA91ygx90avDujCbdpM8cpFSWXcBtVT35yTnEge5IOLbM219kL0
Z5nJsHIge4xQ7l/ZcgjnrbOAUUMhAfFB42c8zu+JwrxxIMWmMGVHPydEP/ca
pPfkvkl0XGS5zXJwUBOcb8LXHtHXrRsOiPnJW/DvU4U/N7EvbrNSSKXUwqBL
1sSQ7xhZJl8RlgEhxlOxDOGxsk37zTGErJXH0Z2PUUn0qelKKbH1h3GfG8JR
BLaSHo2aISVlQRidBxpRX4Vu3i9VSuHPSVIKSQkH695XI3l+K8c3N7fgXvLV
8eHxoXzj7DvokmDRdZiLSGVcyibJEaLN/K/p3zijNIV0uVh7budDckqb8qvL
OWp66FrmVoZJZllSnxunrHs8x0SEVGS+IHpq0zswy4MwUnrPo1siAugDZaYq
uKMlxkn1cKHTO4KUre0tCvaCVpJwPnJhXqOzfzBGiihGQqQrZMReASWJidTS
2OzN5WmgGtRJZBmxkjUcvfCczKllImdqtOctaCnSMLENRK3JnRHDRI5xeP8+
BIOl6YniMR2ZEVybMzvhoMiziMcUCni5gwYvZls2l63UBDbZB2rJH0OVjf1R
l7mhRx5bGp55dAOcnck0/GuMImtR5UfNeU2P+AChgpZHh4eHrZpIV2FgtDEL
mjoIeNDz3GO0lHUFn+eqGBwUXQS6brSxeRxQttif0/gEDBDk7jSqf1tSG7d/
fnqLrLjp2afXV1fnpxPy8ODZy86zKXmr7mIwOvSMjklMESfalqdKFJJI1Dzk
J7825fA+yrYx+A/RTGKEMWaYkIVG/2ce30eJ896E1YcgrV3Zm+tHpclqDQqn
/DtAYEJUYxCC5HL084zisQVaLqKlumBezaFBUsSQaUYi3EPESRh5OLMbtZah
h6ZvjWppvDBGDgLZZt2c7Ifjf6G19h59SZSIb+RAChvQxtvU8MCZlelKWhlH
E5We06+w7XCRxZI8yIqRTaQ3AsU6R4h3+XMgntzpxkYB/WgcMiUPlek4/YuT
GEKyb+LhVPnNjDAQubnbOSWmiZ5DsPWt64Ktne/EFSGlU1BHeWPRgEfKzYBb
/ScBp4gRhibp6SEFX3tNiL0QbW024B8yPn9iU2xIE6owj9qfy8l9eWOoXkL8
Mnl+9iv/gDO+Gu+83ZzT0oCytGGlSuMS+hloqtI7PmOzXdo+7UxTR+bJe1Kn
VfsDS5PJ6ftWAhsg3Vvbzrm6X7s2aJwP0w2qFjaLv1w0rtpMa6krxhqaS/G9
jnqJWVu32k6PG47MeEgYiEA7quLywC0ld7UR0EIrH6b0/wa6jiVdGSEAAA==

-->

</rfc>
