<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-tomas-openroaming-03" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="WBA OpenRoaming">WBA OpenRoaming Wireless Federation</title>

    <author initials="B." surname="Tomas" fullname="Bruno Tomas">
      <organization>Wireless Broadband Alliance, Inc.</organization>
      <address>
        <postal>
          <street>5000 Executive Parkway, Suite 302</street>
          <city>San Ramon</city>
          <code>94583</code>
          <country>US</country>
        </postal>
        <email>bruno@wballiance.com</email>
      </address>
    </author>
    <author initials="M." surname="Grayson" fullname="Mark Grayson">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>10 New Square Park</street>
          <city>Feltham</city>
          <code>TW14 8HA</code>
          <country>UK</country>
        </postal>
        <email>mgrayson@cisco.com</email>
      </address>
    </author>
    <author initials="N." surname="Canpolat" fullname="Necati Canpolat">
      <organization>Intel Corporation</organization>
      <address>
        <postal>
          <street>2111 NE. 25th Ave</street>
          <city>Hillsboro</city>
          <code>97124</code>
          <country>US</country>
        </postal>
        <email>necati.canpolat@intel.com</email>
      </address>
    </author>
    <author initials="B. A." surname="Cockrell" fullname="Betty A. Cockrell">
      <organization>SingleDigits</organization>
      <address>
        <postal>
          <city>San Antonio</city>
          <country>US</country>
        </postal>
        <email>bcockrell@singledigits.com</email>
      </address>
    </author>
    <author initials="S." surname="Gundavelli" fullname="Sri Gundavelli">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>170 West Tasman Drive</street>
          <city>San Jose</city>
          <code>95134</code>
          <country>US</country>
        </postal>
        <email>sgundave@cisco.com</email>
      </address>
    </author>

    <date year="2024" month="July" day="25"/>

    <area>general</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>Internet-Draft</keyword> <keyword>OpenRoaming</keyword> <keyword>Federation</keyword>

    <abstract>


<?line 152?>

<t>This document describes the Wireless Broadband Alliance's
OpenRoaming system. The OpenRoaming architectures enables a seamless
onboarding experience for devices connecting to access networks
that are part of the federation of access networks and identity providers.
The primary objective of this document is to describe the protocols that
form the foundation for this architecture, enabling providers to correctly configure
their equipment to support interoperable OpenRoaming signalling exchanges.
In addition, the topic of OpenRoaming has been raised in different IETF working
groups, and therefore a secondary objective is to assist those discussions by
describing the federation organization and framework.</t>



    </abstract>



  </front>

  <middle>


<?line 165?>

<section anchor="intro"><name>Introduction</name>

<t>WBA OpenRoaming is a roaming federation service of Access Network Providers (ANPs)
and Identity Providers (IDPs), enabling an automatic and secure
Wi-Fi experience globally. WBA OpenRoaming creates the framework to seamlessly
connect billions of users and things to millions of Wi-Fi networks.</t>

<figure title="OpenRoaming Federation" anchor="figfedarch"><artwork><![CDATA[
ANP-1 --\                    _----_                     /-- IDP-1
         \     Access      _( Open )_      Identity    /
ANP-2  ---<==  Network ---(  Roaming )---  Providers <==-- IDP-2
         /     Providers   (_      _)                  \
ANP-3 --/                    '----'                     \-- IDP-3

]]></artwork></figure>

<t>WBA OpenRoaming recognizes the benefits that the likes of eduroam <xref target="RFC7593"/> provide to the
education and research community. WBA OpenRoaming defines a global federation that is targeted at serving
all communities, while supporting both settlement-free use cases where "free" Wi-Fi is being offered to
end-users in order to support some
alternative value proposition, as well as traditional settled "paid" for Wi-Fi offered by some
cellular providers.</t>

<t>OpenRoaming is designed to deliver end-to-end security between a Network Access Server deployed by an
OpenRoaming Access Network Provider and an EAP Server <xref target="RFC3748"/> deployed by an OpenRoaming
Identity Provider. The security of the solution is based on mTLS using certificates
issued under Wireless Broadband Alliance's Public Key Infrastructure <xref target="RFC5280"/>.</t>

<section anchor="Requirements"><name>Requirements Language</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
"SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT
RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="Terminology"><name>Terminology</name>

<t>Access Network Query Protocol (ANQP):</t>

<ul empty="true"><li>
  <t>An IEEE 802.11 defined protocol that allows for access network information retrieval
in a pre-association state. ANQP has been further extended by the
Wi-Fi Alliance (WFA) as part of its Passpoint program <xref target="PASSPOINT"/>.</t>
</li></ul>

<t>Access Network Provider (ANP):</t>

<ul empty="true"><li>
  <t>An entity that has joined the federation and serves OpenRoaming end-users by configuring the OpenRoaming RCOI(s) in its Wi-Fi equipment.</t>
</li></ul>

<t>Broker:</t>

<ul empty="true"><li>
  <t>An entity that has joined the federation and performs certain specific roles to help scale the operation of the federation. The separate roles of a broker can include:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t><list style="numbers" type="1">
      <t>Assigning WBA identities to ANPs and IDPs.</t>
      <t>Operating an issuing intermediate certificate authority under the WBA's PKI and issuing certificates to ANPs and IDPs.</t>
      <t>Operating a registration authority to a third party operated issuing intermediate certificate authority under WBA's PKI to enable certificates to be issued to ANPs and IDPs.</t>
    </list></t>
  </li></ul>
</li></ul>

<t>Closed Access Group (CAG):</t>

<ul empty="true"><li>
  <t>The definition of the 12 most significant bits of an OUI-36 RCOI to indicate OpenRoaming policy controls that
can be enforced by ANPs and IDPs.</t>
</li></ul>

<t>Identity Provider (IDP):</t>

<ul empty="true"><li>
  <t>An entity that has joined the federation and
includes the OpenRoaming RCOI(s) in the Passpoint profile of its end-user devices and
authenticates end-user devices on OpenRoaming ANP networks.</t>
</li></ul>

<t>Level of Assurance (LoA):</t>

<ul empty="true"><li>
  <t>An ISO/IEC 29115 term that is used to define equivalent levels for handling of end-user enrollment, credential management
and authentication amongst different IDPs.</t>
</li></ul>

<t>OpenRoaming-Settled:</t>

<ul empty="true"><li>
  <t>The "base RCOI" of BA-A2-D0 that is used to indicate that the ANP expects to receive payment for
providing OpenRoaming service to end-users.</t>
</li></ul>

<t>OpenRoaming-Settlement-Free:</t>

<ul empty="true"><li>
  <t>The "base RCOI" of 5A-03-BA that is used to indicate that the ANP provides the OpenRoaming service to end-users at
no cost to the IDP.</t>
</li></ul>

<t>Passpoint Profile:</t>

<ul empty="true"><li>
  <t>Passpoint is a Wi-Fi Alliance (WFA) certification program that defines the use a Passpoint profile, that includes the user's credentials
and the access network identifiers, to enables Wi-Fi devices to discover and authenticate to Wi-Fi hotspots
that provide Internet access <xref target="PASSPOINT"/>.</t>
</li></ul>

<t>PLMN Id:</t>

<ul empty="true"><li>
  <t>Is a unique identifier for a mobile network operator. The identifier consists of a MCC (Mobile Country Code) and a MNC (Mobile Network Code). <xref target="PASSPOINT"/> defines how the PLMN Id can be sent in ANQP messages.</t>
</li></ul>

<t>Roaming Consortium Identifier (RCOI):</t>

<ul empty="true"><li>
  <t>RCOI identifies the groups of identity providers that are supported by the network.
It is a 3-octet, or a 5-octet value carried in the 802.11 beacon information element (IE).
It is also sent in the ANQP messages. Based on the access technologies, the specific link-layer
protocols will be used for carrying the RCOI. RCOI is also part of the Passpoint profile.</t>
</li></ul>

<t>Subscriber Identity Module (SIM):</t>

<ul empty="true"><li>
  <t>The SIM is traditionally a smart card distributed by a mobile operator.</t>
</li></ul>

<t>WBA Identity (WBAID):</t>

<ul empty="true"><li>
  <t>A hierarchical namespace that is used to uniquely identify every OpenRoaming entity.</t>
</li></ul>

<t>Wireless Roaming Intermediary eXchange:</t>

<ul empty="true"><li>
  <t>A framework, aimed at facilitating
  interconnectivity between operators and the Wi-Fi roaming hub services.</t>
</li></ul>

</section>
</section>
<section anchor="wireless-broadband-alliance"><name>Wireless Broadband Alliance</name>

<t>The Wireless Broadband Alliance (WBA) defines the Wireless
Roaming Intermediary eXchange (WRIX) framework, aimed at facilitating
interconnectivity between Wi-Fi operators and the Wi-Fi roaming hub services,
as well as the Carrier Wi-Fi Services program that provides guidelines to
improve customer experience on Carrier Wi-Fi networks. Both of these
programs leverage the Wi-Fi Alliance specified Passpoint functionality
<xref target="PASSPOINT"/> to enable automatic and secure connectivity to Wi-Fi networks, allowing devices
to be provisioned with network access credentials with minimal user interaction.</t>

<t>WBA programs have traditionally focussed on "offloading"
cell phone data from cellular networks onto Wi-Fi networks.
Deployments of such systems have seen uneven
adoption across geographies, with cellular operators frequently limiting
their engagement to premier locations that have deployed Wi-Fi and experience
a significant footfall of operator's customers.</t>

<t>Whereas conventional Carrier Wi-Fi has focused on premier locations, the
last decade has seen a continued increase in the requirements of private Wi-Fi
networks to be able to serve visitors, contractors and guest users. Moreover, in
most of these scenarios, the Wi-Fi network is primarily being used to support some
alternative value proposition; an improved retail experience in a shopping
mall, a more efficient meeting in a carpeted office, a superior stay in a
hospitality venue, or a better fan experience in a sporting arena. Traditionally,
this segment has made wide-scale use of captive portals and unencrypted Wi-Fi links
to onboard end-users onto their networks <xref target="RFC8952"/>. However, the decreasing costs for cellular data means
end-users are less motivated to search out and attach to such "free" Wi-Fi
networks, and as a consequence, captive portal conversion rates continue to decrease.</t>

<t>As a consequence, in 2020 WBA launched its OpenRoaming federation,
designed to provide a better on-boarding experience to end-users, that is seamless, scalable and secure.</t>

</section>
<section anchor="orarch"><name>OpenRoaming Architecture</name>

<t><xref target="figwifiarch"/> contrasts a conventional carrier Wi-Fi roaming system with OpenRoaming.
As illustrated, conventional Wi-Fi roaming is typically based on:</t>

<t><list style="numbers" type="1">
  <t>IPSec <xref target="RFC6071"/> tunnels established between access networks, hub providers and identity providers used to protect exchanged signalling.</t>
  <t>Static routing of RADIUS signalling <xref target="RFC2865"/> based on realm routing tables populated according to agreements between access networks and hub providers.</t>
  <t>Passpoint primarily used with SIM based identifiers, where individual PLMN Ids are configured in the access networks WLAN equipment enabling them to be sent in ANQP messages, and cellular providers enable Passpoint based SIM authentication in end-user devices.</t>
  <t>EAP-AKA <xref target="RFC4187"/> based passpoint authentication exchanged between the Supplicant in the end-user device and the EAP Server in the cellular provider's network.</t>
  <t>A primary focus on carrier based identities where the end-user has a billing relationship with the carrier.</t>
</list></t>

<t>In contrast, OpenRoaming is based on:</t>

<t><list style="numbers" type="1">
  <t>RadSec signalling <xref target="RFC6614"/> secured using mTLS with certificates issued under WBA's private certificate authority.</t>
  <t>Dynamic routing of RADIUS based on DNS-based discovery of signalling peers <xref target="RFC7585"/></t>
  <t>Passpoint based network selection based on 36-bit Roaming Consortium Organization Identifiers (RCOIs), where WBA defines the use of 12-bits of the RCOI to embed closed access group policies.</t>
  <t>Passpoint authentication that can use any of the Passpoint defined EAP methods.</t>
  <t>Encompassing new identity providers who do not have a billing relationship with their end-users.</t>
</list></t>

<figure title="Contrasting Carrier Wi-Fi and OpenRoaming Architectures" anchor="figwifiarch"><artwork><![CDATA[
+---------+        +--------+        +--------+        +--------+              
| Visited |        | Wi-Fi  |        | Wi-Fi  |        |Cellular|              
|  Wi-Fi  |        |  Hub   |        |  Hub   |        |Provider|              
| Network |<------>|Provider|<------>|Provider|<------>|Network |              
|         | RADIUS |        | RADIUS |        | RADIUS |        |              
|   NAS   |        | RADIUS |        | RADIUS |        | RADIUS |              
|         |<------>| proxy  |<------>| proxy  |<------>| Server |              
|Passpoint| IPSec  +--------+ IPSec  +--------+ IPSec  +--------+              
|PLMNId(s)|                                                                    
+---------+                                                                    
    /|\                                                                        
     |                                                                         
    \|/                                                                        
+---------+         A) Conventional Carrier Wi-Fi                              
|Passpoint|                                                                    
| device  |                                                                    
|  with   |                                                                    
| PLMN-Id |                                                                    
| profile |                                                                    
+---------+                                                                    


+---------+                   +---+                    +--------+              
| Visited |<----------------->|DNS|<------------------>|Identity|              
|  Wi-Fi  |   DNS based peer  +---+  Configure NAPTR,  |Provider|              
| Network |      discovery            SRV and A/AAAA   |Network |              
|         |                              records       |        |              
|   NAS   |                                            | RADIUS |              
|         |<------------------------------------------>| Server |              
|Passpoint|        RadSec/TLS secured using mTLS       +--------+              
| RCOI(s) |               and WBA PKI                                          
+---------+                                                                    
    /|\                                                                        
     |                                                                         
    \|/                                                                        
+---------+              B) OpenRoaming                                        
|Passpoint|                                                                    
| device  |                                                                    
|  with   |                                                                    
| RCOI(s) |                                                                    
| profile |                                                                    
+---------+                                                                    

]]></artwork></figure>

</section>
<section anchor="wbaid"><name>Identifying OpenRoaming Entities</name>

<t>All OpenRoaming providers and OpenRoaming brokers are allocated a WBA Identity (WBAID). The
WBAID is defined to be transported in the RADIUS Operator-Name attribute (#126) <xref target="RFC5580"/>.
WBA has been allocated the Operator Namespace identifier 0x34 "4" to identify
an Operator-Name attribute carrying a WBAID.</t>

<t>The WBAID is a hierarchical namespace that comprises at its top level the
identity allocated by WBA to a WBA Member and is of the form shown in <xref target="figwbaid"/>
where the optional 2 upper case characters represent an ISO-3166 Alpha-2 country code <xref target="ISO3166"/> e.g.,
"WBAMEMBER:US".</t>

<figure title="ABNF definition of Primary WBAID Structure" anchor="figwbaid"><artwork><![CDATA[
upper-case-char = %x41-5a
member-id       = 1*upper-case-char
wbaid           = member-id [ %x3a 2*2upper-case-char]

]]></artwork></figure>

<t>When operating as an OpenRoaming broker, the WBA Member
is able to allocate subordinate identities to OpenRoaming providers
who are not WBA members by pre-pending a subordinate identity ,
plus "." (%x2e) to the Member's WBAID, e.g., "OPENROAMINGPROVIDER.WBAMEMBER:US".
In this way, any receiving entity of a WBAID can identify the WBA Member who
is acting as an OpenRoaming broker to the provider by assigning it an identity.</t>

</section>
<section anchor="sss"><name>Scaling Secured Signalling</name>

<t>As described in <xref target="legal"/>, the OpenRoaming legal framework does not assume
any direct relationship between ANP and IDP. In order to scale the
secured signalling between providers, the federation makes use of a
Public Key Infrastructure using a private Certificate Authority specifically
designed to secure the operations of the roaming federation. WBA
and its members have published the WBA Certificate Policy that defines the
policies which govern the operations of the PKI components by all
individuals and entities within the infrastructure. The OID for Wireless
Broadband Alliance is:</t>

<t>{ iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) The Wireless Broadband Alliance(14122) }</t>

<t>The Wireless Broadband Alliance organizes its OID arcs for the Certificates
Policy Documents using the object identifier 1.3.6.1.4.1.14122.1.1. At the time of writing,
the current certificate policy is 1.3.6.1.4.1.14122.1.1.6.</t>

<t>This Certificate Policy is based on a 4-level hierarchy, as illustrated below.</t>

<figure title="OpenRoaming PKI Hierarchy" anchor="figpki"><artwork><![CDATA[
+---------+---------------------------+----------------------------+
|         |                           |                            |
| Level   | Description               |  Comment                   |
|         |                           |                            |
+---------+---------------------------+----------------------------+
| Level 1 | OpenRoaming Root          | Operation managed by WBA   |
|         | Certificate Authority     |                            |
+---------+---------------------------+----------------------------+
| Level 2 | OpenRoaming Policy        | Operation managed by WBA.  |
|         | Intermediate Certificate  | Instantiates WBA policy OID|
|         | Authority                 |                            |
+---------+---------------------------+----------------------------+
| Level 3 | OpenRoaming Issuing       | Operated by an OpenRoaming |
|         | Intermediate Certificate  | broker                     |
|         | Authority                 |                            |
+---------+---------------------------+----------------------------+
| Level 3 | OpenRoaming Registration  | Optional and when used,    |
|         | Authority                 | operated by an OpenRoaming |
|         |                           | broker                     |
+---------+---------------------------+----------------------------+
| Level 4 | OpenRoaming Entity        | A WBA member or non-member.|
|         |                           | WBA's Certificate Policy   |
|         |                           | requires the Entity's      |
|         |                           | WBAID is included in the   |
|         |                           | Subject UID field in the   |
|         |                           | certificate.               |
+---------+---------------------------+----------------------------+

]]></artwork></figure>

<t>Certificates issued under the WBA PKI are used by Entities to perform mutual
authentication with other Entities and to secure RadSec
signalling <xref target="RFC6614"/> that carries EAP-based Passpoint authentication. This is typically between a
RadSec client in the OpenRoaming ANPs network and an RadSec Server in the OpenRoaming
IDPs network, although a provider can decide to outsource the operation of the RadSec
endpoint to a third party provider.</t>

</section>
<section anchor="dpd"><name>IDP Discovery</name>

<section anchor="dynamic-discovery"><name>Dynamic Discovery</name>

<t>OpenRoaming defines the use of dynamic discover <xref target="RFC7585"/> by which an ANP discovers the
IP address of the IDP's RadSec server.</t>

</section>
<section anchor="discovery-of-eap-akaaka-servers"><name>Discovery of EAP-AKA/AKA' Servers</name>

<t>Passpoint defines the use of EAP-AKA' based authentication <xref target="RFC5448"/> which uses the
3GPP 23.003 <xref target="TS23003"/> defined realm of wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.3gppnetwork.org, where
&lt;mcc&gt; represent an E.212 Mobile Country Code and &lt;mnc&gt; represents the E.212
Mobile Network Code allocated to the IDP. GSMA is responsible for
operating the 3gppnetwork.org domain and GSMA IR.67 <xref target="GSMAIR67"/> limits access to
the DNS systems supporting such records to those systems connected to the inter-PLMN IP
backbone (known as "GRX/IPX"). As OpenRoaming ANPs do not connect to this inter-PLMN backbone,
then conventional realm based lookup cannot be used over the Internet to discover the RadSec server
supporting EAP-AKA' authentication.</t>

<t>GSMA IR.67 does allow systems to be discoverable
from the public Internet, specifically calling out the use of the
pub.3gppnetwork.org domain name for such procedures. In order for ANPs
to dynamically discover the RadSec server supporting EAP-AKA' authentication,
GSMA has defined the use of the wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org by
OpenRoaming systems. This means that whenever a RadSec client receives a user-name
containing an NAI formatted as user@wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.3gppnetwork.org, the dynamic
peer detection functionality MUST insert ".pub" into the realm and perform
DNS based dynamic discovery using the wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org
domain name. The RADIUS user-name attribute MUST NOT be similarly modified.</t>

<t>IR.67 defines the procedure by which a cellular operator can request the delegation
of their mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org.  GSMA PRD IR.67 also allows an MNO
to delegate the entire mnc&lt;MNC&gt;.mcc&lt;MCC&gt;.pub.3gppnetwork.org sub-domain
which could have already occurred, e.g., to enable use of the
epdg.mnc&lt;MNC&gt;.mcc&lt;MCC&gt;.pub.3gppnetwork.org used with 3GPP's Wi-Fi calling service. Using this approach,
a cellular operator operating as an OpenRoaming IDP can authenticate their end-users on
third party ANP Wi-Fi networks.</t>

</section>
<section anchor="proving-a-discovered-radsec-server-is-authoritative-for-a-realm"><name>Proving a discovered RadSec server is authoritative for a realm</name>

<t>The OpenRoaming preferred approach to dynamically discover the RadSec server
IP address serving a particular realm or set of realms is to
use DNS records that are protected with DNSSEC <xref target="RFC9364"/>. However, GSMA
have not enabled DNSSEC on their 3gppnetwork.org domain, meaning that DNSSEC
cannot be applied on the publicly resolvable domains under pub.3gppnetwork.org.
Because of this situation, OpenRoaming does not currently mandate operation of DNSSEC.</t>

<t>If the DNS records for a realm are not protected with DNSSEC, because the realm
has been provided directly by the OpenRoaming End-User, the
IDP SHOULD ensure that the discovered RadSec server(s) supporting its realm(s)
is/are configured with a WBA-PKI server certificate that includes the realm(s)
used in the dynamic peer detection in the certificate SubjectAltName.</t>

<t>Where the DNS records are protected with DNSSEC, the IDP SHOULD ensure that
the discovered RadSec server(s) supporting its realm(s)
is/are configured with a WBA-PKI server certificate that includes the
derived name(s) from the secured DNS NAPTR/SRV query in the
certificate SubjectAltName.</t>

<t>Where the OpenRoaming IDP has offloaded the operation of RadSec termination to a
third party hub-provider that is responsible for supporting a number of independent realms,
the hub-provider SHOULD ensure that the discovered RadSec server(s) supporting
the independent realms from its partner IDPs
is/are configured with a WBA-PKI server certificate that includes the
derived name(s) from the DNS NAPTR/SRV query in the
certificate SubjectAltName.</t>

</section>
<section anchor="co-existence-with-other-federations"><name>Co-existence with other Federations</name>

<t>Other federations which want to interface to the OpenRoaming federation may use
dynamic discovery with distinct NAPTR application service tags to facilitate integration.
For example, an eduroam service provider can use the use the "x-eduroam"
application service tag, specified in <xref target="RFC7593"/>, to discover the home institution's
RadSec peer for authentication, and OpenRoaming ANPs can use the "aaa+auth" tag to discover
a separate RadSec peer that can be defined for handling all inter-domain authentications.</t>

<t>Where a separate inter-federation RadSec peer is not used, the other federation AAA operating
as an OpenRoaming IDP needs to determine which certificate chain to return in its ServerHello message.
An OpenRoaming ANP operating with TLS 1.3 SHOULD use the "certificate_authorities" extension <xref target="RFC8446"/>
in its ClientHello message to indicate that the ANP supports the WBA PKI Certificate Authority trust anchor.
Similarly, an OpenRoaming ANP operating using TLS 1.2 SHOULD use the "trusted_ca_keys" extension <xref target="RFC6066"/> in its ClientHello message to indicate the DistinguishedName of the WBA PKI Certificate Authority whose root keys the ANP possesses. The federation AAA operating as an OpenRoaming IDP MAY use information in the ClientHello extension to guide its certificate selection.</t>

</section>
</section>
<section anchor="PASSPOINT-SEC"><name>OpenRoaming Passpoint Profile</name>

<section anchor="openroaming-policy-controls"><name>OpenRoaming Policy Controls</name>

<t>In order to avoid possible fragmentation of roaming federations, OpenRoaming recognizes
that there is a need to permit OpenRoaming to be integrated into a variety of
different use-cases and value propositions. These use-cases include scenarios where
providers are able to enforce policy controls of which end-users are authorized to access the service.
The realization of authorization policy controls in the OpenRoaming federation is a balance
between the requirements for fine grain policy enforcement versus the potential
impact of policy enforcement on the user experience.</t>

<t>Such a level of control is realized using Closed Access Group (CAG) based policies.
A Closed Access Group identifies a group of OpenRoaming users who are permitted
to access one or more OpenRoaming access networks configured with a particular CAG policy.
These Closed Access Group policies are encoded using one or more
Roaming Consortium Organization Identifiers (RCOIs), first defined
in Passpoint Release 1.0, and well supported
across the smartphone device ecosystem.</t>

<t>Note, encoding CAG policies in OpenRoaming using one or more RCOIs is aimed at
delivering an equivalent functionality to the CAG policies encoded in 3GPP using one or more CAG-IDs.</t>

</section>
<section anchor="CAG"><name>OpenRoaming Closed Access Group Policies</name>

<t>OpenRoaming defines the use of multiple RCOIs to facilitate the implementation of
closed access group policies across the federation. The currently defined RCOIs are:</t>

<t><list style="symbols">
  <t>OpenRoaming-Settled:  BA-A2-D0-xx-x</t>
  <t>OpenRoaming-Settlement-Free:  5A-03-BA-xx-x</t>
</list></t>

<t><xref target="figrcoi"/> shows how the 24-bit length OpenRoaming RCOIs are further extended into 36-bit length OUI-36s
with additional context dependent identifiers used to encode specific closed access group
policies. Following Passpoint Release 1.0 specification, only when there is a bitwise match of
all 36 bits of the configured RCOI in the WLAN equipment and the Passpoint profile configured in the
end-user device will an EAP authentication be triggered.</t>

<t>The encoding of closed access group policies is defined so that the "no-restrictions" policy is
encoded using the 12-bit value "00-0", i.e., 54-03-BA-00-0 represents a policy
that accepts all OpenRoaming settlement-free users onto a particular ANP installation.</t>

<figure title="Extension of Octets 4 and 5 for OpenRoaming Context Dependent RCOI Field " anchor="figrcoi"><artwork><![CDATA[
+---------------------------------------+-------------------+
|               OUI-36 Octet 4          |  OUI-36 Octet 5   |
+---------------------------------------+-------------------+
| B7 | B6 | B5 | B4 | B3 | B2 | B1 | B0 | B7 | B6 | B5 | B4 |
+----+---------+----+-------------------+-------------------+
| LoA|   QoS   |PID |     ID-Type       |Reserved - set to 0|
+----+---------+----+-------------------+-------------------+

]]></artwork></figure>

<section anchor="level-of-assurance-policies"><name>Level of Assurance Policies</name>

<t>The format of the Level of Assurance (LoA) field is as shown in <xref target="figloa"/>.</t>

<figure title="OpenRoaming CAG LoA Field " anchor="figloa"><artwork><![CDATA[
+------------------------------------------------------------+
|  LoA Field  |           Description                        |
+------------------------------------------------------------+
|     B7      |                                              |
+------------------------------------------------------------+
|     0       |   Baseline Identity Proofing                 |
+------------------------------------------------------------+
|     1       |   Enhanced Identity Proofing                 |
+------------------------------------------------------------+

]]></artwork></figure>

<t>The baseline identity proofing requirement on IDPs ensures that all
OpenRoaming identities are managed with at least a medium level of
assurance (LoA level 2) for end-user enrollment, credential management
and authentication, as specified in ISO/IEC 29115 <xref target="ISO29115"/>.</t>

<t>Any IDP that manages its identities according to ISO/IEC 29115 LoA level 2
MUST NOT configure any RCOI in their end-users' Passpoint profile
with the LoA field set to "1". Conversely, an IDP that manages its identities
according to ISO/IEC 29115 LoA level 3 MAY configure multiple RCOIs
in their end-users' Passpoint profile, including RCOIs with the LoA field
set to "0" and RCOIs with the LoA field set to "1".</t>

<t>The LoA field is used to support ANPs which operate in regulatory
regimes that require enhanced identity proofing to be used in the
provision of credentials on OpenRoaming devices, equivalent to LoA level
3 in ISO/IEC29115 <xref target="ISO29115"/>. In such a scenario, the ANP can set the LoA bit
field to 1 in all configured RCOIs to ensure that only identities
provisioned using enhanced LoA 3 procedures can access via the ANP's network.</t>

</section>
<section anchor="quality-of-service-policies"><name>Quality of Service Policies</name>

<t>One of the challenges faced by users of Wi-Fi hotspots is when the Wi-Fi network
is configured sub-optimally and results in a poor user experience. Often the only
remedy open to a user it to disable the Wi-Fi interface on their smartphone and
continue to use cellular data. This is especially the case where the Wi-Fi hotspot
has been automatically selected with no user intervention. As a consequence, OpenRoaming defines specific
service tiers across the federation and uses the QoS field to differentiate between different tiers.
The format of the QoS field is shown in <xref target="figqos"/>.</t>

<figure title="OpenRoaming CAG QoS Field " anchor="figqos"><artwork><![CDATA[
+------------------------------------------------------------+
|            QoS Field              |      Description       |
+------------------------------------------------------------+
|        B6       |        B5       |                        |
+------------------------------------------------------------+
|        0        |        0        |        Bronze          |
+------------------------------------------------------------+
|        0        |        1        |        Silver          |
+------------------------------------------------------------+
|        1        |        0        |       Reserved         |
+------------------------------------------------------------+
|        1        |        1        |       Reserved         |
+------------------------------------------------------------+
]]></artwork></figure>

<t>The "Bronze" and "Silver" values of QoS field are used to identify
specific quality of service policy aspects.</t>

<t>The bronze service tier corresponds to the following:</t>

<t><list style="numbers" type="1">
  <t>The availability of OpenRoaming service
when used to access the Internet measured during scheduled operations
across the ANP's network exceeds 90% over any one month period.</t>
  <t>The aggregate bandwidth used to receive
Internet service on the ANP's network is sufficient to enable
each and every authenticated and authorized OpenRoaming end-user to simultaneously receive a
sustained 256 kilobits per second connection.</t>
</list></t>

<t>The silver service tier corresponds to the following:</t>

<t><list style="numbers" type="1">
  <t>The availability of OpenRoaming service
when used to access the Internet measured during scheduled operations
across the ANP's network exceeds 95% over any one month period.</t>
  <t>The aggregate bandwidth used to receive
Internet service on the ANP's network is be sufficient to enable
each and every authenticated and authorized end-user to receive a
sustained 512 kilobits per second connection.</t>
  <t>At least 10% of authenticated and authorized users are able
to stream video content at a downlink rate of at least 5 megabits per
second (when measured over a one-minute interval) over all of the ANP's
OpenRoaming enabled Wi-Fi networks.</t>
  <t>The authenticated and authorized end-users are
able to stream video from one or more third party content distribution
networks with an end-to-end latency of less than 150ms from all of the
ANP's OpenRoaming enabled Wi-Fi networks.</t>
</list></t>

<t>The QoS field can be used by those IDPs that are only interested in providing
their end-users with a higher quality service level when automatically authenticated
onto an OpenRoaming network. For example, an IDP configures the QoS field
as bronze in a Passpoint profile that uses the "5A-03-BA" settlement free RCOI and
configures the QoS field as silver in a Passpoint profile that uses the
"BA-A2-D0" OpenRoaming-settled paid service.</t>

<t>ANPs that only support the bronze service tier MUST set the QoS Field to "00" in
all RCOIs configured on their WLAN equipment. ANPs that support the silver service
tier MAY configure multiple RCOIs on their WLAN equipment that include values where
the QoS field is set to "01" and values where the QoS field is set to "00".</t>

<t>Exceptionally, ANPs that operate OpenRoaming installations on moving platforms
are permitted to deviate from normal OpenRoaming service level requirements. This is
because such installations may necessitate use of cellular-based backhaul and/or
backhaul via Non-Terrestrial Networks (NTN) which may not be able to meet the
OpenRoaming minimum "bronze" service level requirements.
If an ANP wants to benefit from such deviations, it MUST signal using the WLAN-Venue-Info
attribute <xref target="RFC7268"/> that it is operating in a venue category identified using
a Venue Group value of "10", which is defined in Section 8.4.1.34 of <xref target="IEEE80211"/>
as being used for vehicular installations. In such cases, the OpenRoaming ANP MAY
signal one or more WBA-Custom-SLA vendor specific attributes <xref target="WBAVSA"/> to indicate
one or more (availability, per-user sustained bandwidth) tuples to the IDP.</t>

</section>
<section anchor="privacy-policies"><name>Privacy Policies</name>

<t>The baseline privacy policy of OpenRoaming ensures
the identities of end-users remain anonymous when using the
service. The WBA WRIX specification specifies that where supplicants use EAP methods
that support user-name privacy, i.e., which are compatible with the "@realm" (or "anonymous@realm") (outer) EAP-Identifier,
then the supplicant SHOULD use the anonymized outer EAP identifier. Supplicants supporting
other EAP methods SHOULD support EAP method specific techniques for masking the
end-user's permanent identifier, for example pseudonym support in EAP-AKA/AKA' <xref target="RFC4187"/>
and/or enhanced IMSI privacy protection <xref target="WBAEIPP"/>. OpenRoaming IDPs SHOULD support and
enable the corresponding server-side functionality to ensure end-user privacy is protected.</t>

<t>The WBA WRIX specification also recognizes that the privacy of end-users can be
unintentionally weakened by the use of correlation identifiers signalled using the
Chargeable-User-Identity attribute (#89) <xref target="RFC4372"/> and/or the Class attribute (#25) <xref target="RFC2865"/>
in the RADIUS Access-Accept packet. The WBA WRIX Specification recommends that the
default IDP policy SHOULD ensure that, when used, such correlation identifiers are unique for
each combination of end-user/ANP and that the keys and/or initialization vectors
used in creating such correlation identifiers SHOULD be refreshed at least every 48 hours,
but not more frequently than every 2 hours.</t>

<t>This 2 hour limit is designed to assist the ANP in performing autonomous troubleshooting
of connectivity issues from authentic users/devices that are repeatedly re-initiating
connectivity to the ANP's network and/or to assist the ANP in identifying a new session
originated by an authentic user/device that has previously been identified by the ANP as having violated the OpenRoaming
end-user terms and conditions. When using typical public Wi-Fi session durations, it is
estimated that, with this 2 hour restriction, the ANP will be able to correlate an
Access-Request/Access-Accept exchange that immediately follows an Accounting-Request
stop message in over 50% of the sessions.</t>

<t>In contrast to this default policy, there can be scenarios where the ANP
desires to derive value from its OpenRoaming settlement-free service by analysing
aggregate end-user behaviour. Whereas the use of aggregated end-user information does not
violate the OpenRoaming privacy policy, the derivation of such can benefit from the
ANP being able to uniquely identify end-users. In order to support such scenarios, the
OpenRoaming closed access group policies include the PID field.</t>

<t>The PID field can be used to support scenarios where the user has consented
with their IDP that an immutable end-user identifier can be signalled to the
ANP in the RADIUS Access-Accept. The format of the PID field is
illustrated in <xref target="figpid"/>. The PID
field can be configured to "1" in the RCOIs used by those ANPs that
want to be be able to account for unique OpenRoaming end-users.</t>

<t>The OpenRoaming IDP terms ensure subscribers MUST
explicitly give their permission before an immutable end-user identity
is shared with a third party ANP. When such permission has
not been granted, an IDP MUST NOT set the PID field to "1" in any
of the RCOIs in its end-user Passpoint profiles. When such permission has
been granted, an IDP MAY configure multiple RCOIs
in their end-users' Passpoint profile, including RCOIs with the PID field
set to "0" and RCOIs with the PID field set to "1".</t>

<figure title="OpenRoaming CAG PID Field " anchor="figpid"><artwork><![CDATA[
+------------------------------------------------------------+
|  PID Field  |           Description                        |
+------------------------------------------------------------+
|     B4      |                                              |
+------------------------------------------------------------+
|     0       |   Baseline ID Policy applies, i.e., users    |
|             |   remain anonymous whilst using the service. |
+------------------------------------------------------------+
|     1       |   An immutable end-user ID will be returned  |
|             |   by the IDP in the Access-Accept packet.    |
+------------------------------------------------------------+

]]></artwork></figure>

</section>
<section anchor="id-type-policies"><name>ID-Type Policies</name>

<t>The ID-Type field can be used to realize policies which are based
on the business sector associated with the identity used by the IDP.
The format of the ID-Type
field is illustrated in <xref target="figidtype"/>.</t>

<t>All IDPs configure at least one RCOI in their end-user's
Passpoint profile with ID-Type set to "0000" (Any identity type is permitted).
An IDP MAY configure additional RCOIs in their end-users' Passpoint profile
with an ID-Type representing the sector type of IDP.</t>

<t>An ANP what wants to serve all end-users, irrespective of sector,
configures RCOIs in the WLAN equipment with ID-Type set to "0000".
Alternatively, an ANP which operates a sector specific business that
only desires to serve a subset of OpenRoaming end-users MAY set the ID-Type
to their desired sector in all configured RCOIs.</t>

<figure title="OpenRoaming CAG ID-Type Field " anchor="figidtype"><artwork><![CDATA[
+------------------------------------------------------------+
|       ID-Type Field       |              Description       |
+------------------------------------------------------------+
|  B3  |  B2  |  B1  |  B0  |                                |
+------------------------------------------------------------+
|  0   |  0   |  0   |  0   | Any identity type is permitted |
+------------------------------------------------------------+
|  0   |  0   |  0   |  1   | A service provider identity    |
+------------------------------------------------------------+
|  0   |  0   |  1   |  0   | A cloud provider identity      |
+------------------------------------------------------------+
|  0   |  0   |  1   |  1   | A generic enterprise identity  |
+------------------------------------------------------------+
|  0   |  1   |  0   |  0   | A government identity, e.g.,   |
|      |      |      |      | including city                 |
+------------------------------------------------------------+
|  0   |  1   |  0   |  1   | An automotive identity         |
+------------------------------------------------------------+
|  0   |  1   |  1   |  0   | A hospitality identity         |
+------------------------------------------------------------+
|  0   |  1   |  1   |  1   | An aviation industry identity  |
+------------------------------------------------------------+
|  1   |  0   |  0   |  0   | An education or research       |
|      |      |      |      | identity                       |
+------------------------------------------------------------+
|  1   |  0   |  0   |  1   | A cable industry identity      |
+------------------------------------------------------------+
|  1   |  0   |  1   |  0   | A manufacturer identity        |
+------------------------------------------------------------+
|  1   |  0   |  1   |  1   | A retail identity              |
+------------------------------------------------------------+
|        other values       | Reserved                       |
+------------------------------------------------------------+
]]></artwork></figure>

</section>
</section>
<section anchor="prioritizing-policies"><name>Prioritizing Policies</name>

<t>The  definition of OpenRoaming closed access group policies assumes
the configuration of multiple RCOIs in ANP WLAN equipment and IDP end-user devices.</t>

<t>When a device has multiple Passpoint profiles matching the ANP's RCOI policy,
an OpenRoaming ANP may want to prefer OpenRoaming subscribers use a particular IDP's
profile when attaching to its access network. Such a preference can be because
the OpenRoaming ANP has a preferential relationship with certain OpenRoaming IDPs.</t>

<t>The OpenRoaming ANP is able to use the Home SP preference functionality defined in
Passpoint <xref target="PASSPOINT"/> to prioritize the use of a particular profile by a Passpoint enabled device.
In such a scenario, the ANP configures the Domain Name list to include the
FQDN(s) associated with the profile(s) to be prioritized.</t>

</section>
</section>
<section anchor="RADIUS"><name>OpenRoaming RADIUS Profile</name>

<t>The OpenRoaming RADIUS profile is based on the WBA WRIX Specification which in turn
are derived from <xref target="RFC3580"/> and <xref target="RFC3579"/>.</t>

<t>Additionally, OpenRoaming defines the use of the following RADIUS attributes.</t>

<section anchor="operator-name"><name>Operator-Name</name>

<t>As described in <xref target="wbaid"/>, OpenRoaming uses the Operator-Name (#126) <xref target="RFC5580"/> attribute to signal
the WBAID of the OpenRoaming ANP. All ANPs MUST support the Operator-Name attribute and use it to signal the
WBAID of the OpenRoaming ANP.</t>

</section>
<section anchor="chargeable-user-identity"><name>Chargeable-User-Identity</name>

<t>All OpenRoaming ANPs MUST support the Chargeable-User-Identity attribute (#89) <xref target="RFC4372"/> and
indicate such by including a CUI attribute in all RADIUS Access-Request packets.</t>

<t>When an end-user has explicitly given their permission to share an immutable end-user identifier
with third party ANPs, the CUI returned by the IDP is invariant over subsequent
end-user authentication exchanges between the IDP and the ANP.</t>

</section>
<section anchor="location-datalocation-information"><name>Location-Data/Location-Information</name>

<t>All OpenRoaming ANPs MUST support signalling of location information using <xref target="RFC5580"/>.
As a minimum, all OpenRoaming IDPs need to be able to determine the country in which the
OpenRoaming ANP operates. The OpenRoaming legal framework described in <xref target="legal"/> serves as an "out-of-band agreement" as
specified in clause 3.1 of <xref target="RFC5580"/>. Hence, all OpenRoaming ANPs MUST include the Location-Data
attribute (#128) in RADIUS Access-Request packet where the location profile is the civic location profile
that includes the country code where the ANP is located in all Access-Request packets
<xref target="RFC5580"/>.</t>

<t>When the OpenRoaming ANP supports the OpenRoaming-Settled RCOI ("BA-A2-D0"),
the Location-Data attribute (#128) MUST be included where the location profile
is the civic location profile containing Civic Address Type information that
is sufficient to identify the financial regulatory regime that defines the
taxable rates associated with consumption of the ANP's service.</t>

<t>OpenRoaming also defines the optional use the geospatial location profile as specified in
<xref target="RFC5580"/>. ANPs MAY signal coordinate-based geographic location of
the NAS or end-user device and this information MAY be used by IDPs, e.g.,
in their authorization decisions.</t>

</section>
<section anchor="wba-identity-provider"><name>WBA-Identity-Provider</name>

<t>The Operator-Name attribute allows the WBAID of the ANP to be signalled to the IDP.
In the reverse direction, the IDP MUST use the WBA-Identity-Provider vendor
specific attribute <xref target="WBAVSA"/> to signal the WBAID of the IDP back to the ANP.</t>

</section>
<section anchor="wba-offered-service"><name>WBA-Offered-Service</name>

<t>The ANP MAY use the WBA-Offered-Service vendor specific attribute to signal the
highest OpenRoaming service tier supported on its network <xref target="WBAVSA"/>.</t>

</section>
<section anchor="wlan-venue-info"><name>WLAN-Venue-Info</name>

<t>The ANP MAY use the WLAN-Venue-Info attribute <xref target="RFC7268"/> to signal the
category of venue hosting the WLAN.</t>

</section>
<section anchor="wba-custom-sla"><name>WBA-Custom-SLA</name>

<t>When the ANP uses the WLAN-Venue-Info attribute to signal that the venue
hosting the WLAN is a vehicular installation, the  ANP MAY use the
WBA-Custom-SLA vendor specific attribute <xref target="WBAVSA"/> to indicate
one or more (availability, per-user sustained bandwidth) tuples to the IDP.</t>

</section>
<section anchor="additional-attributes-related-to-openroaming-settled"><name>Additional attributes related to OpenRoaming settled</name>

<t>OpenRoaming settled defines the use of additional RADIUS attributes.</t>

<section anchor="wba-financial-clearing-provider"><name>WBA-Financial-Clearing-Provider</name>

<t>All OpenRoaming ANPs and IDPs that support the OpenRoaming settled service
MUST use the WBA-Financial-Clearing-Provider vendor specific attribute to signal
the  identity of the provider of financial clearing services <xref target="WBAVSA"/>.</t>

</section>
<section anchor="wba-data-clearing-provider"><name>WBA-Data-Clearing-Provider</name>

<t>All OpenRoaming ANPs and IDPs that support the OpenRoaming settled service MAY
use the WBA-Data-Clearing-Provider vendor specific attribute to signal
the  identity of the provider of data clearing services <xref target="WBAVSA"/>.</t>

</section>
<section anchor="wba-linear-volume-rate"><name>WBA-Linear-Volume-Rate</name>

<t>In cellular roaming, inter-operator tariff information is exchanged in
the roaming agreements between operators. In OpenRoaming, as there is no
direct agreement between ANPs and IDPs, the tariff information is
exchanged in RADIUS messages. All OpenRoaming ANPs that support
the OpenRoaming settled service MUST use the WBA-Linear-Volume-Rate
vendor specific attribute to signal the charging model being offered
by the ANP <xref target="WBAVSA"/>. An IDP that authorizes an offered charging model MUST include
the agreed WBA-Linear-Volume-Rate in the Access-Accept packet.</t>

</section>
</section>
</section>
<section anchor="Security"><name>Security Considerations</name>

<section anchor="network-selection-and-triggering-authentication"><name>Network Selection and Triggering Authentication</name>

<t>OpenRoaming defines the use of Passpoint with Roaming Consortium Organization Identifiers.
A bit-wise match between an RCOI configured in the Passpoint profile of an end-user's device and the RCOI signalled
by WLAN equipment will trigger a Passpoint defined EAP-based authentication exchange.
The security associated with the Passpoint RCOI
information element is identical to other PLMN Id and Realm information elements, allowing an
unauthorized system to configure the OpenRoaming RCOI with the aim of triggering a Passpoint authentication.
Because such an unauthorized system will not have been issued with a certificate using WBA's PKI, the
unauthorized system is unable to communicate with any other OpenRoaming provider.
In such a scenario, after successive multiple failed authentications, the device's supplicant
SHOULD add the Access Point's BSSID to a deny list
to avoid future triggering of an authentication exchange with the unauthorized system.</t>

</section>
<section anchor="dynamic-discovery-of-radsec-peers"><name>Dynamic Discovery of RadSec Peers</name>

<t>OpenRoaming recommends the use of DNSSEC to ensure a dynamically discovered RadSec server
is authoritative for a particular realm or set of realms. Where this is not possible, e.g.,
when using dynamic resolution with the pub.3gppnetwork.org sub-domain, the OpenRoaming
certificate policy permits the configuration of supported realm(s) in the SubjectAltName
of the certificate(s) issued to the IDP.</t>

<t>An ANP can decide to continue with the RadSec establishment, even if a server cannot prove it is
authoritative for a realm. As the ANP's RadSec client uses a dedicated trust store corresponding to the WBA's private Certificate
Authority, if DNS is hijacked by a third-party non-federation member
who has not been issued a certificate under WBA's PKI, the subsequent TLS establishment will fail.</t>

</section>
<section anchor="end-user-traffic"><name>End-User Traffic</name>

<t>The OpenRoaming federation ensures RADIUS traffic is secured between ANP and IDP and ensures Wi-Fi traffic is protected
between the end-user device and the WLAN equipment of the ANP. The ANP is therefore able to observe IP
traffic to/from end-users who have performed a successful authentication with their IDP. The OpenRoaming legal framework (see <xref target="legal"/>) ensures that the ANP has agreed to the OpenRoaming Privacy Policy <xref target="ORPRIVACY"/> to correctly handle the personally identifiable information collected
as part of providing the ANP service.</t>

<t>The Open-Roaming end-user terms and conditions <xref target="ORTERMS"/> ensure that end-users are aware that the federation does not provide a
secure end-to-end service. The end-user MUST NOT rely on the encryption delivered by OpenRoaming for providing security of services accessed using the ANP's Wi-Fi network.</t>

</section>
</section>
<section anchor="future-enhancements"><name>Future Enhancements</name>

<t>WBA announced the launch of its OpenRoaming Federation in June 2020. Since then, WBA members have continued to enhance the technical framework to address new market requirements that are reflected in the Closed Access Group policies described in <xref target="CAG"/> and the RADIUS profile described in <xref target="RADIUS"/>. WBA encourages those parties interested in adapting OpenRoaming to address new requirements to join the Alliance and help drive the definition of OpenRoaming forward.</t>

</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC2865">
  <front>
    <title>Remote Authentication Dial In User Service (RADIUS)</title>
    <author fullname="C. Rigney" initials="C." surname="Rigney"/>
    <author fullname="S. Willens" initials="S." surname="Willens"/>
    <author fullname="A. Rubens" initials="A." surname="Rubens"/>
    <author fullname="W. Simpson" initials="W." surname="Simpson"/>
    <date month="June" year="2000"/>
    <abstract>
      <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2865"/>
  <seriesInfo name="DOI" value="10.17487/RFC2865"/>
</reference>

<reference anchor="RFC3579">
  <front>
    <title>RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)</title>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
    <date month="September" year="2003"/>
    <abstract>
      <t>This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms. In the proposed scheme, the Network Access Server (NAS) forwards EAP packets to and from the RADIUS server, encapsulated within EAP-Message attributes. This has the advantage of allowing the NAS to support any EAP authentication method, without the need for method- specific code, which resides on the RADIUS server. While EAP was originally developed for use with PPP, it is now also in use with IEEE 802. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3579"/>
  <seriesInfo name="DOI" value="10.17487/RFC3579"/>
</reference>

<reference anchor="RFC3580">
  <front>
    <title>IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines</title>
    <author fullname="P. Congdon" initials="P." surname="Congdon"/>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <author fullname="A. Smith" initials="A." surname="Smith"/>
    <author fullname="G. Zorn" initials="G." surname="Zorn"/>
    <author fullname="J. Roese" initials="J." surname="Roese"/>
    <date month="September" year="2003"/>
    <abstract>
      <t>This document provides suggestions on Remote Authentication Dial In User Service (RADIUS) usage by IEEE 802.1X Authenticators. The material in this document is also included within a non-normative Appendix within the IEEE 802.1X specification, and is being presented as an IETF RFC for informational purposes. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3580"/>
  <seriesInfo name="DOI" value="10.17487/RFC3580"/>
</reference>

<reference anchor="RFC3748">
  <front>
    <title>Extensible Authentication Protocol (EAP)</title>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <author fullname="L. Blunk" initials="L." surname="Blunk"/>
    <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
    <author fullname="J. Carlson" initials="J." surname="Carlson"/>
    <author fullname="H. Levkowetz" initials="H." role="editor" surname="Levkowetz"/>
    <date month="June" year="2004"/>
    <abstract>
      <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees. Fragmentation is not supported within EAP itself; however, individual EAP methods may support this. This document obsoletes RFC 2284. A summary of the changes between this document and RFC 2284 is available in Appendix A. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3748"/>
  <seriesInfo name="DOI" value="10.17487/RFC3748"/>
</reference>

<reference anchor="RFC4187">
  <front>
    <title>Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)</title>
    <author fullname="J. Arkko" initials="J." surname="Arkko"/>
    <author fullname="H. Haverinen" initials="H." surname="Haverinen"/>
    <date month="January" year="2006"/>
    <abstract>
      <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card.</t>
      <t>EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4187"/>
  <seriesInfo name="DOI" value="10.17487/RFC4187"/>
</reference>

<reference anchor="RFC4372">
  <front>
    <title>Chargeable User Identity</title>
    <author fullname="F. Adrangi" initials="F." surname="Adrangi"/>
    <author fullname="A. Lior" initials="A." surname="Lior"/>
    <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
    <author fullname="J. Loughney" initials="J." surname="Loughney"/>
    <date month="January" year="2006"/>
    <abstract>
      <t>This document describes a new Remote Authentication Dial-In User Service (RADIUS) attribute, Chargeable-User-Identity. This attribute can be used by a home network to identify a user for the purpose of roaming transactions that occur outside of the home network. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4372"/>
  <seriesInfo name="DOI" value="10.17487/RFC4372"/>
</reference>

<reference anchor="RFC5448">
  <front>
    <title>Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA')</title>
    <author fullname="J. Arkko" initials="J." surname="Arkko"/>
    <author fullname="V. Lehtovirta" initials="V." surname="Lehtovirta"/>
    <author fullname="P. Eronen" initials="P." surname="Eronen"/>
    <date month="May" year="2009"/>
    <abstract>
      <t>This specification defines a new EAP method, EAP-AKA', which is a small revision of the EAP-AKA (Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement) method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network. The new key derivation mechanism has been defined in the 3rd Generation Partnership Project (3GPP). This specification allows its use in EAP in an interoperable manner. In addition, EAP-AKA' employs SHA-256 instead of SHA-1.</t>
      <t>This specification also updates RFC 4187, EAP-AKA, to prevent bidding down attacks from EAP-AKA'. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5448"/>
  <seriesInfo name="DOI" value="10.17487/RFC5448"/>
</reference>

<reference anchor="RFC5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>

<reference anchor="RFC5580">
  <front>
    <title>Carrying Location Objects in RADIUS and Diameter</title>
    <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
    <author fullname="F. Adrangi" initials="F." surname="Adrangi"/>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="A. Lior" initials="A." surname="Lior"/>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <date month="August" year="2009"/>
    <abstract>
      <t>This document describes procedures for conveying access-network ownership and location information based on civic and geospatial location formats in Remote Authentication Dial-In User Service (RADIUS) and Diameter.</t>
      <t>The distribution of location information is a privacy-sensitive task. Dealing with mechanisms to preserve the user's privacy is important and is addressed in this document. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5580"/>
  <seriesInfo name="DOI" value="10.17487/RFC5580"/>
</reference>

<reference anchor="RFC6066">
  <front>
    <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <date month="January" year="2011"/>
    <abstract>
      <t>This document provides specifications for existing TLS extensions. It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2". The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6066"/>
  <seriesInfo name="DOI" value="10.17487/RFC6066"/>
</reference>

<reference anchor="RFC6071">
  <front>
    <title>IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap</title>
    <author fullname="S. Frankel" initials="S." surname="Frankel"/>
    <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
    <date month="February" year="2011"/>
    <abstract>
      <t>Over the past few years, the number of RFCs that define and use IPsec and Internet Key Exchange (IKE) has greatly proliferated. This is complicated by the fact that these RFCs originate from numerous IETF working groups: the original IPsec WG, its various spin-offs, and other WGs that use IPsec and/or IKE to protect their protocols' traffic.</t>
      <t>This document is a snapshot of IPsec- and IKE-related RFCs. It includes a brief description of each RFC, along with background information explaining the motivation and context of IPsec's outgrowths and extensions. It obsoletes RFC 2411, the previous "IP Security Document Roadmap."</t>
      <t>The obsoleted IPsec roadmap (RFC 2411) briefly described the interrelationship of the various classes of base IPsec documents. The major focus of RFC 2411 was to specify the recommended contents of documents specifying additional encryption and authentication algorithms. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6071"/>
  <seriesInfo name="DOI" value="10.17487/RFC6071"/>
</reference>

<reference anchor="RFC6614">
  <front>
    <title>Transport Layer Security (TLS) Encryption for RADIUS</title>
    <author fullname="S. Winter" initials="S." surname="Winter"/>
    <author fullname="M. McCauley" initials="M." surname="McCauley"/>
    <author fullname="S. Venaas" initials="S." surname="Venaas"/>
    <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
    <date month="May" year="2012"/>
    <abstract>
      <t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6614"/>
  <seriesInfo name="DOI" value="10.17487/RFC6614"/>
</reference>

<reference anchor="RFC7268">
  <front>
    <title>RADIUS Attributes for IEEE 802 Networks</title>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <author fullname="J. Malinen" initials="J." surname="Malinen"/>
    <author fullname="P. Congdon" initials="P." surname="Congdon"/>
    <author fullname="J. Salowey" initials="J." surname="Salowey"/>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <date month="July" year="2014"/>
    <abstract>
      <t>RFC 3580 provides guidelines for the use of the Remote Authentication Dial-In User Service (RADIUS) within IEEE 802 local area networks (LANs). This document defines additional attributes for use within IEEE 802 networks and clarifies the usage of the EAP-Key-Name Attribute and the Called-Station-Id Attribute. This document updates RFCs 3580 and 4072.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7268"/>
  <seriesInfo name="DOI" value="10.17487/RFC7268"/>
</reference>

<reference anchor="RFC7585">
  <front>
    <title>Dynamic Peer Discovery for RADIUS/TLS and RADIUS/DTLS Based on the Network Access Identifier (NAI)</title>
    <author fullname="S. Winter" initials="S." surname="Winter"/>
    <author fullname="M. McCauley" initials="M." surname="McCauley"/>
    <date month="October" year="2015"/>
    <abstract>
      <t>This document specifies a means to find authoritative RADIUS servers for a given realm. It is used in conjunction with either RADIUS over Transport Layer Security (RADIUS/TLS) or RADIUS over Datagram Transport Layer Security (RADIUS/DTLS).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7585"/>
  <seriesInfo name="DOI" value="10.17487/RFC7585"/>
</reference>

<reference anchor="RFC7593">
  <front>
    <title>The eduroam Architecture for Network Roaming</title>
    <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
    <author fullname="S. Winter" initials="S." surname="Winter"/>
    <author fullname="T. Wolniewicz" initials="T." surname="Wolniewicz"/>
    <date month="September" year="2015"/>
    <abstract>
      <t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia. The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access. The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document. In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7593"/>
  <seriesInfo name="DOI" value="10.17487/RFC7593"/>
</reference>

<reference anchor="RFC8446">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8446"/>
  <seriesInfo name="DOI" value="10.17487/RFC8446"/>
</reference>

<reference anchor="RFC8952">
  <front>
    <title>Captive Portal Architecture</title>
    <author fullname="K. Larose" initials="K." surname="Larose"/>
    <author fullname="D. Dolson" initials="D." surname="Dolson"/>
    <author fullname="H. Liu" initials="H." surname="Liu"/>
    <date month="November" year="2020"/>
    <abstract>
      <t>This document describes a captive portal architecture. Network provisioning protocols such as DHCP or Router Advertisements (RAs), an optional signaling protocol, and an HTTP API are used to provide the solution.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8952"/>
  <seriesInfo name="DOI" value="10.17487/RFC8952"/>
</reference>

<reference anchor="RFC9364">
  <front>
    <title>DNS Security Extensions (DNSSEC)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2023"/>
    <abstract>
      <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="237"/>
  <seriesInfo name="RFC" value="9364"/>
  <seriesInfo name="DOI" value="10.17487/RFC9364"/>
</reference>


<reference anchor="TS23003" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.003/23003-i10.zip">
  <front>
    <title>3GPP 23.003: Numbering, addressing and identification v18.1.0</title>
    <author initials="" surname="3GPP">
      <organization></organization>
    </author>
    <date year="2023" month="March" day="28"/>
  </front>
</reference>
<reference anchor="GSMAIR67" target="https://www.gsma.com/newsroom/wp-content/uploads//IR.67-v21.0.pdf">
  <front>
    <title>GSMA IR.67: DNS Guidelines for Service Providers and GRX and IPX Providers</title>
    <author initials="" surname="GSMA">
      <organization></organization>
    </author>
    <date year="2022" month="November" day="25"/>
  </front>
</reference>
<reference anchor="PASSPOINT" target="https://www.wi-fi.org/discover-wi-fi/passpoint">
  <front>
    <title>Wi-Fi Alliance Passpoint</title>
    <author initials="" surname="Wi-Fi Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ISO3166" target="https://www.iso.org/standard/72483.html">
  <front>
    <title>Codes for the representation of names of countries and their subdivisions</title>
    <author initials="" surname="ISO 3166-2:2020">
      <organization></organization>
    </author>
    <date year="2020" month="August"/>
  </front>
</reference>
<reference anchor="ISO29115" >
  <front>
    <title>Information technology - Security techniques: Entity authentication assurance framework</title>
    <author initials="" surname="ISO/IEC 29115">
      <organization></organization>
    </author>
    <date year="2013" month="April"/>
  </front>
</reference>
<reference anchor="ORPRIVACY" target="https://wballiance.com/openroaming/privacy-policy/">
  <front>
    <title>OpenRoaming End-User Privacy Policy</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ORTERMS" target="https://wballiance.com/openroaming/toc/">
  <front>
    <title>OpenRoaming End User Terms and Conditions</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="WBAVSA" target="https://github.com/wireless-broadband-alliance/RADIUS-VSA">
  <front>
    <title>Vendor Specific Attributes</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="IEEE80211" target="https://standards.ieee.org/ieee/802.11/5536/">
  <front>
    <title>Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications</title>
    <author initials="" surname="IEEE">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="WBAEIPP" target="https://wballiancec.wpenginepowered.com/wp-content/uploads/2021/02/IMSI_Privacy_Protection_for_Wi-Fi_Technical_Specification_v1.1.0_Revision_FINAL.pdf">
  <front>
    <title>WBA Enhanced IMSI Privacy Protection</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="2022" month="August"/>
  </front>
</reference>


    </references>


<?line 1061?>

<section anchor="sig"><name>Example OpenRoaming Signalling Flow</name>

<t>An example signalling flow for OpenRoaming is illustrated in <xref target="figsigflow"/>.</t>

<t><list style="numbers" type="1">
  <t>In step 1, the WLAN is configured with Passpoint information and includes
configured RCOIs in its beacon.</t>
  <t>The beacon can only contain 3 RCOIs and so if none of the RCOIs match a
profile provisioned in the device, the device queries for the list of RCOIs supported.</t>
  <t>If the list includes an RCOI that matches a configured profile in the device, then device
sends an EAPOL Start message to the authenticator.</t>
  <t>The authenticator in the AP/WLC requests the EAP-Identity of the device.</t>
  <t>The device responds with its EAP-Identity, which is a user@realm Network Access Identifier (NAI)</t>
  <t>The NAS in the WLC/AP embeds the NAI in the user-name attribute in a RADIUS Access-Request packet and forwards to the configured RadSec client.</t>
  <t>The RadSec client recovers the realm from the NAI/user-name attribute and performs a DNS-based dynamic peer discovery.</t>
  <t>The RadSec client established an mTLS authenticated TLS session with the discovered peer using certificates issued by the WBA PKI.</t>
  <t>Once TLS is established, the RadSec client forwards the Access-Request to the RadSec server.</t>
  <t>If the EAP Server is not co-located with the RadSec server, the RadSec server proxies the Access-Request to the EAP-Server.</t>
  <t>The EAP-Server continues the EAP dialogue with the EAP Supplicant in the device using a Passpoint defined EAP method.</t>
  <t>Following successful authentication, the EAP-Server responds with an Access-Accept packet containing the EAP-SUCCESS message and the keying material generated through the EAP method to secure the Wi-Fi session.</t>
  <t>The Access-Accept packet is forwarded back to the RadSec client.</t>
  <t>The RadSec client forwards the Access-Accept packet to the NAS in the AP/WLC.</t>
  <t>The AP/WLC recovers the keying material from the Access-Accept packet and forwards the EAP-SUCCESS message to the device.</t>
  <t>The keying material is used to secure the Wi-Fi interface between the device and AP/WLC.</t>
  <t>The AP/WLC generates a RADIUS Accounting-Request packet with Acct-Status-Type Start which is forwarded to the RadSec client.</t>
  <t>The RadSec client forwards the Accounting-Request packet over the TLS tunnel to the RadSec server.</t>
  <t>The RadSec server can forward the Accounting-Request packet to the EAP-Server.</t>
</list></t>

<ul empty="true"><li>
  <t>20-22. After the Wi-Fi session terminates, an Accounting-Request message with Acct-Status-Type Stop is proxied towards the RadSec Server.</t>
</li></ul>

<figure title="Example OpenRoaming Signalling Flow" anchor="figsigflow"><artwork><![CDATA[
+------+    +------+    +------+    +------+    +------+    +------+
|      |    |Wi-Fi |    |RadSec|    |      |    |RadSec|    |  EAP |
|Device|    |AP/WLC|    |Client|    | DNS  |    |Server|    |Server|
+------+    +------+    +------+    +------+    +------+    +------+
   | 1) Beacon |           |           |           |           |
   |<----------|           |           |           |           |
   | 2) ANQP   |           |           |           |           |   
   | Query     |           |           |           |           |   
   |<--------->|           |           |           |           |   
   | 3) EAPOL  |           |           |           |           |
   | Start     |           |           |           |           |
   |---------->|           |           |           |           |
   | 4) EAP-ID |           |           |           |           |
   | Request   |           |           |           |           |
   |<----------|           |           |           |           |
   | 5) EAP-ID | 6) RADIUS |           |           |           |
   | Response  | Access-   | 7) DNS    |           |           |
   |---------->| Request   | Query     |           |           |
   |           |---------->| NAPTR,SRV,|           |           |
   |           |           | A/AAAA    |           |           |
   |           |           | Records   |           |           |
   |           |           |<--------->|           |           |
   |           |           | 8) mTLS   |           |           |
   |           |           |<--------------------->|           |
   |           |           | 9) RadSec |           |           |
   |           |           | Access-Request        |           |
   |           |           |---------------------->|           |
   |           |           |           |           | 10) RADIUS|
   |           |           |           |           | Access-   |
   |           |           |           |           | Request   |
   |           |           |           |           |---------->|
   |           |         11) EAP Dialogue          |           |
   |<--------------------------------------------------------->|
   |           |           |           |           | 12) RADIUS|
   |           |           |           |           | Access-   |
   |           | 14) RADIUS|           |           | Accept    |
   |           | Access-   |           |           | (EAP-     |
   |           | Accept    | 13) RadSec Access-    | SUCCESS)  |   
   |           | (EAP-     | Accept (EAP-SUCCESS)  |<----------|
   | 15) EAP-  | SUCCESS)  |<----------------------|           |
   | SUCCESS   |<----------|           |           |           |
   |<----------|           |           |           |           |
 +---------------+         |           |           |           |
 | 16) Secured   |         |           |           |           |
 |  OpenRoaming  17) RADIUS|           |           |           |
 |    Service    Accounting|           |           |           |
 |               Request   |           |           | 19) RADIUS|
 |               (Start)   | 18) RadSec Accounting | Accounting|
 |               |-------->| -Request (Start)      | Request   |
 |               |         |---------------------->| (Start)   |
 |               |         |           |           |---------->|
 +---------------+         |           |           |           |
   |           | 20) RADIUS|           |           |           |
   |           | Accounting|           |           |           |
   |           | Request   |           |           | 22) RADIUS|
   |           | (Stop)    | 21) RadSec Accounting | Accounting|
   |           |---------->| -Request (Stop)       | Request   |
   |           |           |---------------------->| (Stop)    |
   |           |           |           |           |---------->|   
+------+    +------+    +------+    +------+    +------+    +------+
|Device|    |Wi-Fi |    |RadSec|    | DNS  |    |RadSec|    |  EAP |
|      |    |AP/WLC|    |Client|    |      |    |Server|    |Server|
+------+    +------+    +------+    +------+    +------+    +------+
]]></artwork></figure>

</section>
<section anchor="rcoi"><name>Example OpenRoaming RCOI Usage</name>

<t>This Annex illustrates the use of OpenRoaming RCOIs to enforce different policies
in the OpenRoaming federation, ensuring that when there is a policy mismatch
between the device and access network, that the device will avoid triggering
an authentication exchange that would subsequently have to be rejected because
of policy enforcement decisions.</t>

<section anchor="openroaming-rcoi-based-policy-for-supporting-qos-tiers"><name>OpenRoaming RCOI based policy for supporting QoS tiers</name>

<t><xref target="figqosrcoi"/> illustrates the use of OpenRoaming RCOIs for
supporting the standard (bronze) and silver QoS tiers across the federation.
The figure shows two different devices:</t>

<t><list style="symbols">
  <t>Device 1 has been provisioned by its IDP to require the basic bronze QoS policy.</t>
  <t>Device 2 has been provisioned by its IDP to require the silver tier of QoS handling.</t>
</list></t>

<t>The figure also shows illustrates the RCOI configuration of two ANP Access Networks:</t>

<t><list style="symbols">
  <t>ANP#1 is configured to support the silver tier of QoS handling corresponding to the silver RCOI. Because the network requirements associated with the silver tier are a superset of the bronze QoS tier, the ANP also configures the bronze RCOI on its Wi-Fi access network.</t>
  <t>ANP#2 is only configured to support the standard (bronze) QoS tier and as such only configures the RCOI corresponding to the bronze QoS tier on its Wi-Fi access network.</t>
</list></t>

<t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required QoS tier according to the device's policy.</t>

<figure title="Use of OpenRoaming RCOIs to realize QoS policies" anchor="figqosrcoi"><artwork><![CDATA[

+----------------------+      +----------------------+  
|OpenRoaming Device #1 |      |OpenRoaming Device #2 |  
| Bronze Service Level |      | Silver Service Level |   
| +------------------+ |      | +------------------+ |      
| |Passpoint Profile | |      | |Passpoint Profile | |     
| |   Bronze RCOI    | |      | |   Silver RCOI    | |              
| +------------------+ |      | +------------------+ |           
|     /|\        /|\   |      |           /|\        |      
+------|----------|----+      +------------|---------+         
       |          |                        |                   
       |          |                        |                    
       |          |                        | RCOI                
       |          |                        | Match                 
       |     +-----------------------------+                 
  RCOI |     |    |                                          
 Match |     |    |                                              
       |     |    |                                        
       |     |    +------------------------+                  
       |     |                             | RCOI           
       |     |                             | Match         
       |     |                             |              
      \|/   \|/                           \|/           
+----------------------+       +----------------------+   
|  OpenRoaming ANP#1   |       |  OpenRoaming ANP#2   |  
|      Silver QoS      |       |      Bronze QoS      |     
|   +--------------+   |       |   +--------------+   |   
|   |     WLAN     |   |       |   |     WLAN     |   |   
|   | Bronze RCOI  |   |       |   | Bronze RCOI  |   |    
|   | Silver RCOI  |   |       |   |              |   |   
|   +--------------+   |       |   +--------------+   |  
+----------------------+       +----------------------+

]]></artwork></figure>

</section>
<section anchor="openroaming-rcoi-based-policy-for-supporting-identity-type-policies"><name>OpenRoaming RCOI based policy for supporting identity type policies</name>

<t><xref target="figidtypercoi"/> illustrates the use of OpenRoaming RCOIs for supporting different identity type policies across the federation. The figure shows two different devices:</t>

<t><list style="symbols">
  <t>Device#1 has been provisioned by an IDP corresponding to a service provider. It provisions the device's Passpoint profile with the RCOI policy identifying the service provider ID-type policy as well as the "any ID-type"  RCOI policy.</t>
  <t>Device 2 has been provisioned by a IDP corresponding to a hospitality provider. It provisions the device's Passpoint profile with the RCOI policy identifying the hospitality ID-type policy as well as the "any ID-type" RCOI policy.</t>
</list></t>

<t>The figure also shows the RCOI configuration of three different ANP Access Networks:</t>

<t><list style="symbols">
  <t>ANP#1 only supports access using service provider type-IDs and so has configured the service provider ID-type policy RCOI.</t>
  <t>ANP#2 supports access from all identity types and so has configured the any ID-type policy RCOI.</t>
  <t>ANP#3 only supports access using hospitality type IDs and so has configured the hospitality ID-type policy RCOI.</t>
</list></t>

<t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required identity types according to the ANP's policy.</t>

<figure title="Use of OpenRoaming RCOIs to realize ID-Type policies" anchor="figidtypercoi"><artwork><![CDATA[


+----------------------------+   +-----------------------------+                                                 
|   OpenRoaming Device #1    |   |    OpenRoaming Device #2    |                                                 
|  IDP is Service Provider   |   | IDP is Hospitality Provider |                                                 
|+------------++------------+|   |+------------++------------+ |                                                 
|| Passpoint  || Passpoint  ||   || Passpoint  || Passpoint  | |                                                 
||  Profile   ||  Profile   ||   ||  Profile   ||  Profile   | |                                                 
||     SP     ||Any ID-Type ||   ||Any ID-Type || Hospitality| |                                                 
||ID-Type RCOI||    RCOI    ||   ||   RCOI     ||ID-Type RCOI| |                                                 
|+------------++------------+|   |+------------++------------+ |                                                 
|      /|\          /|\      |   |       /|\        /|\        |                                                 
+-------|------------|-------+   +-------------------|---------+                                                 
        |            |                    |          |                                                           
        |            |                    |          |                                                           
        |            |                    |          |                                                           
        |            |                    |          |                                                           
        | RCOI       | RCOI               | RCOI     | RCOI                                                      
        | Match      | Match              | Match    | Match                                                     
        |            |                    |          |                                                           
        |            +-----+        +-----+          |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
       \|/                \|/      \|/              \|/                                                          
+------------------+  +------------------+  +------------------+                                                 
|OpenRoaming ANP#1 |  |OpenRoaming ANP#2 |  |OpenRoaming ANP#3 |                                                 
|  Only accepts    |  |    Accepts all   |  |   Only accepts   |                                                 
| Service Provider |  |     ID-Types     |  |    Hospitality   |                                                 
|     ID-Types     |  |                  |  |     ID-Types     |                                                 
| +--------------+ |  | +--------------+ |  | +--------------+ |                                                 
| |     WLAN     | |  | |     WLAN     | |  | |     WLAN     | |                                                 
| |  SP ID-Type  | |  | | Any ID-Type  | |  | |  Hospitality | |                                                 
| |     RCOI     | |  | |     RCOI     | |  | | ID-Type RCOI | |                                                 
| +--------------+ |  | +--------------+ |  | +--------------+ |                                                 
+------------------+  +------------------+  +------------------+    


]]></artwork></figure>

</section>
<section anchor="openroaming-rcoi-based-policy-for-supporting-different-identity-proofing-policies"><name>OpenRoaming RCOI based policy for supporting different identity proofing policies</name>

<t><xref target="figidproofrcoi"/> illustrates the use of OpenRoaming RCOIs for supporting different
identity proofing policies across the federation. The figure shows two different devices:</t>

<t><list style="symbols">
  <t>Device 1 has been provisioned by an IDP that uses enhanced identity proofing controls that meet the enhanced OpenRoaming requirements, equivalent to LoA 3 in <xref target="ISO29115"/>. Because the enhanced identity proofing requirements are a superset of the requirements of the baseline identity proofing policy, the IDP also configures the use of the RCOI with baseline identity proofing.</t>
  <t>Device 2 has been provisioned by an IDP that uses identity proofing with controls that meet the baseline OpenRoaming requirements.</t>
</list></t>

<t>The figure also shows the RCOI configuration of two ANP Access Networks:</t>

<t><list style="symbols">
  <t>ANP#1 is operated in a geography where regulations require support of enhanced identity proofing.</t>
  <t>ANP#2 is operated in a geography where regulations permit support of authentications with identities managed using the OpenRoaming baseline identity proofing requirements.</t>
</list></t>

<t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required identity proofing according to the ANP's policy.</t>

<figure title="Use of OpenRoaming RCOIs to realize identity proofing policies" anchor="figidproofrcoi"><artwork><![CDATA[

+----------------------------+   +-----------------------------+                                                 
|    OpenRoaming Device #1   |   |    OpenRoaming Device #2    |                                                 
|     IDP uses enhanced      |   |     IDP uses baseline       |                                                 
|     identity proofing      |   |     identity proofing       |                                                 
|+------------++------------+|   |       +------------+        |                                                 
|| Passpoint  ||  Passpoint ||   |       |  Passpoint |        |                                                 
||  Profile   ||   Profile  ||   |       |   Profile  |        |                                                 
||Enhanced LoA||Baseline LoA||   |       |Baseline LoA|        |                                                 
||    RCOI    ||    RCOI    ||   |       |    RCOI    |        |                                                 
|+------------++------------+|   |       +------------+        |                                                 
|      /|\          /|\      |   |             /|\             |                                                 
+-------|------------|-------+   +--------------|--------------+                                                 
        |            |                          |                                                                
        |            |                          |                                                                
        |            |                          |                                                                
        | RCOI       | RCOI                     | RCOI                                                           
        | Match      | Match                    | Match                                                          
        |            |                          |                                                                
        |            |                          |                                                                
        |            +--------------------+     +-----+                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
       \|/                               \|/         \|/                                                         
   +------------------------+       +------------------------+                                                   
   |   OpenRoaming ANP#1    |       |   OpenRoaming ANP#2    |                                                   
   | Operates in a country  |       | Operates in a country  |                                                   
   |  where the regulator   |       |  where the regulator   |                                                   
   |   requires enhanced    |       |   permits baseline     |                                                   
   |   identity proofing    |       |   identity proofing    |                                                   
   |    +--------------+    |       |    +--------------+    |                                                   
   |    |     WLAN     |    |       |    |     WLAN     |    |                                                   
   |    | Enhanced LoA |    |       |    | Baseline LoA |    |                                                   
   |    |     RCOI     |    |       |    |     RCOI     |    |                                                   
   |    +--------------+    |       |    +--------------+    |                                                   
   +------------------------+       +------------------------+                                                     


]]></artwork></figure>

</section>
</section>
<section anchor="legal"><name>OpenRoaming legal framework</name>

<section anchor="seamless-experience"><name>Seamless experience</name>

<t>In order for OpenRoaming to avoid the need for end-users to
be presented with and accept legal terms and conditions covering their
use of the Wi-Fi hotspot service, there needs to be a legal framework in place.</t>

</section>
<section anchor="openroaming-organization"><name>OpenRoaming Organization</name>

<t>The federation is based on a legal framework that comprises a set of policies,
templated agreements and immutable terms as agreed to by the WBA and its membership.
The framework defines a hierarchy of roles, responsibilities and relationships that
are designed to enable the federation to scale to millions of Wi-Fi access networks.</t>

<t><xref target="figorg"/> shows the
relationships between WBA, OpenRoaming Brokers, who are members of the WBA that
have agreed terms with WBA to perform the OpenRoaming broker role and the OpenRoaming providers.
OpenRoaming brokers agree terms with OpenRoaming Providers that can act as Access Network
Providers (ANPs) and/or Identity Providers (IDPs). OpenRoaming providers do not have
to be members of the WBA to provide OpenRoaming services. Finally, OpenRoaming IDPs
agree terms with OpenRoaming end-users who then benefit from seamless authentication onto
the Wi-Fi networks deployed by the different OpenRoaming ANPs.</t>

<figure title="Organization of the OpenRoaming Federation" anchor="figorg"><artwork><![CDATA[
                            +----------+                   
                            | Wireless |                      
                            | Broadband|                        
                            | Alliance |                         
                            +----------+                       
                              /|\  /|\                        
                               |    |                         
                          Agrees terms with                    
                               |    |                              
          +-----------+        |    |        +-----------+        
          |OpenRoaming|<-------+    +------->|OpenRoaming|       
          |Broker     |                      |Broker     |      
          +-----------+                      +-----------+       
             /|\  /|\                           /|\  /|\         
              |    |                             |    |        
         Agrees terms with                  Agrees terms with     
              |    |                             |    |           
        +-----+    +-----+                 +-----+    +-----+     
        |                |                 |                |    
       \|/              \|/               \|/              \|/     
+-----------+     +-----------+     +-----------+     +-----------+
|OpenRoaming|     |OpenRoaming|     |OpenRoaming|     |OpenRoaming|
|Access     |     |Identity   |     |Identity   |     |Access     |
|Network    |     |Provider   |     |Provider   |     |Network    |
|Provider   |     |           |     |           |     |Provider   |
+-----------+     +-----------+     +-----------+     +-----------+
                   /|\  /|\            /|\  /|\      
                    |    |              |    |       
               Agrees terms with   Agrees terms with
                    |    |              |    |       
      +-------------+    |              |    +-------------+       
      |                  |              |                  |       
     \|/                \|/            \|/                \|/      
+-----------+     +-----------+     +-----------+      +-----------+
|OpenRoaming|     |OpenRoaming|     |OpenRoaming|      |OpenRoaming|
|End-User   |     |End-User   |     |End-User   |      |End-User   |
+-----------+     +-----------+     +-----------+      +-----------+

]]></artwork></figure>

</section>
<section anchor="openroaming-legal-terms"><name>OpenRoaming legal terms</name>

<t>In OpenRoaming there is no direct agreement between individual ANPs and individual
IDPs or between end-users and ANPs. As a consequence, OpenRoaming brokers
agree to use certain federation-specific terms in their agreements with
OpenRoaming providers.</t>

<t>This arrangement ensures that all ANPs agree to abide by the OpenRoaming
privacy policy <xref target="ORPRIVACY"/> and all end-users agree to abide by the
OpenRoaming end-user Terms and Conditions <xref target="ORTERMS"/>.</t>

</section>
</section>
<section numbered="false" anchor="Changelog"><name>Changelog</name>
<t><list style="symbols">
  <t>01 - added details of WBA-Custom-SLA for OpenRoaming ANP networks that signal using
<xref target="RFC7268"/> that they operate on a vehicular platform. Added clarifications regarding use
of direct and indirect names in certificate validation.</t>
  <t>02 - added details of OpenRoaming protection of end-user privacy, including WRIX recommendations
on use of correlation identifiers in RADIUS Access-Accept packet that may unintentionally weaken
end-user privacy.</t>
  <t>03 - updated DNSsec reference. Added section on interworking with other federations.</t>
</list></t>

</section>
<section numbered="false" anchor="Acknowledgements"><name>Acknowledgements</name>

<t>The authors would like to thank all the members of the WBA's OpenRoaming Workgroup
who help define the OpenRoaming specifications.</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAPB+omYAA+19a1MbSbLo9/oVFThODKwlgQT4dXcmVgY8w1kbM8gzsxtn
bzgaqYFeS91adcuYNb6//earXt3V4mE852ycVcwYqR9VWVlZWZlZ+eh2u6rK
qmn6Qv/2cqjfztP8pEhmWX6uf8sW6TQtS/0qnaSLpMqKXCWnp4v0Y+NZNSnG
eTKDRiaL5KzqVsUsKbsFPLDgB7pb22qSVPDAYGuw09162h3sqjFcOC8WVy90
lp8VqlyezrKyhG6qq3mKFycptDBJ80oplc0XL3S1WJbVYGvr+dZAJYs0eaHP
0xxgm6rLYvHhfFEs5y/0oXtPj2ybSn1Ir+CpyQuldRceqtJFnlbdfQSYLvnj
wd/esFVZJfnkfTItcgDsKi3VPHuh/6sqxh1dFotqkZ6V8O1qhl/+r1LJsroo
Fi+U6kJLMJDyhX7Z0+8QK3iBUfVyscwLd7FYnCd59k/q8IVD/kvA4OQUetfD
6TRL8nHaAeDHPXylhI7T6oXe3dra0gef0vGyyj6m+jhZfLhMrjow+qxK9TYg
Cx4eZxVgepTk+iSZwZjwUjEBOJ7v7D7b5p/LvMLp+GWEP9NZkk1f6FME80+X
p4l03xsXM39gb3r6x0VyVXKTPLQ3AIF/NRzbXlaOCz26Kqt0Vvrj6G/po/RS
j/6xhMmlYTjAX6XT6iKZObDf/dbf0c9+GoaQ/9mDfHbOEPxpjB06uAnso57e
S/J5MU1w9hnsoxRIMvOvh4Aj0Uz1XrGYF0IYDvZBv9/XRwc9PditLvTwY6oM
5D9l02l5WiwKZTH+tD/YUXWEC9Q5AdEbCxB/yrDTGvBATEOAvxh/ACqZWvhf
plV1VbsTjmAExD1N97PzrCqVTxPDvCryrGgD6nQsLf6ppBYm1EINqhFQwjKf
JB/hucwCNVpk4eXVxGBp4emW/i0tK/0uKWcA4P4i83CKIP9nUaYOpbv97VaU
lufcv08IKi8WswTXCzKEk1d7MIHP5euz/tOdF8hzgC3VHnr2ZFe+bu8+fW6/
PtsyX5/uPJOvO/1nT83X7acD+bq7Yx/YHdjXdl0LT7aePLFfn/bN1yf9Hfn6
dPDEtPB099mu/fp824C/s2NaePZ813T8fPsJtfBuNNje2qJntRbWv7b94/Gx
Hmz38IY+Ws5O0wXMc0cnk8kCuBBuB8iCMmSq2Vk2psnTH/vPev3e1ho3lSzO
ceIuqmpevtjcvLy87G2fz+c9mO/Ns2q+OZqn43IzWYwvAJ+bg+33JXSSlpvc
7SZB1c36W71/ZnNq0XBRTR8iMYSTftvNZBu2lu7gGVz8cfRmeHjy5Gk4Mryq
D096cF3vH42AFGEQ0yxPSw2Tq0fp4mM2BmazKD7CjUVJ4/zx5C/09/D4L+5O
+zDPgUKRqjbz9LJcFPDlct4dwz4G2NpczqfAwcvNTQKi+3EAGOvNJ2dtQ0SA
wyEOuv0+7pdaHw9Ho+O3h0fvwjH+lnVfZXZ/AMZZlvMC+EY7xJdZ9yyjmZng
kviYLrp0aXNu3m0DL+wL7hyO3m73mWQdRHuwKBnB1UWqF+kcqAiQwWRTnBFr
KPELr1cgA8I3PJwtNAgCk+xjhrv2CqRnZUEDoK05WUw2nw52nm33LqrZtA12
AFUjrN3BC0DrVojlre7WMx7O4Hm/vxuO59BwAgC/SscXeTEtzq9ASBjBprsA
lsRXs38sU+jnABYJXEIIcL3IagHMLhc0QWcLGD5KLGsrIN08PNjTBEoAZx8I
Hhnd25Pjk8Nfh3t/DQD15beDfNL9BdYYUHD2MRlf6eNimo2v4ggNtvdNT3Lb
nPPb3Tm9vdlOF60CC0H77uDkzWgVrJpgfZcuZkwLe0U+yRBx5V0hBrHsnmCC
WPvraBhA+StIksgngHkh49PDCsj1dFmlcbBgW7xYnhJIl9JV99R01TUgb54M
9w9/GXWhs/sBenhwcPBsC7asAFb7zuvhkX4Dm/RypofjMV4BbFaLYqrX3wz3
Ngi/xxdXJZDmVL9OrgDx68c//XXDDjNpR7xZb2UvS9OUliB+2QRwev3+5u7u
9pNW7CPYjOaDw+PjEHbQKA7yCxwf8N03o0NHtosCFpeIW6sIYdy7BCo4B94+
Ly7TRTrhaWiyYljt/c2twSZ28166ee+6eQ9r/T3xuffvaFUDlt4HmHn/sY8b
3/uTlNnU+1eHR8PXq7j66ukMmD2wIdXtdnVyCrJQMgbl591FVmpQsZYz1GmA
s46BBIFlIm9d0fB3pfLXWEkyFqgh8JZ/nXZkHPoSmLRO8+R0iuxYl2kyw5ZV
kZ8WMOH4bPppjps2MTFYFZMUN88SuHieI+7giarQCZMcaFfI40oFcnulUaKf
J4sKmT7CfWa1K7xSe8UTNoCPzs0O3FMIOzCkWbK40sXp37FPUHioSR9F8B3g
MIii/qAR4AvFFLEGoj2yc4ajQNmQ4ODtCt71MdJhjODQLBzY+LhYLOCJ6RUO
/iw7h0cVb1/pP5bZnMCAx8rlHJQFgAj1TWBSC8RugP4yO8+Rggm7Y1gA5ykM
9DBH2Yv4X4fgrIo5cB8Yqf/uRVLq0zTN9SLJSlg3Wa4n2dkZ0D70fnjw7pVG
dKJCS7ox6Kiyy4KeWsCE4CQD+JMQnYw92K4yEL+BkstUo5SwJD0aOrxSglma
79pcesI9dWb3uh5T9SybTKapggECP5osacFp+Xx+lOHVL+p776NU3TCBM6SF
2ft9lyLLAZKE6x0xPXnS3frw6LjcUCTcGfry7h7uw11vykHNgMVc4M4/puGU
uN+niqUgbzWcTwvkQ1e9hhllvEhhbfNitcgg0pD1Nb1Ssn70KaiKhGMYwrI0
0ijQZH5OczLz7jMIZsUAdv+f/SgFo+z2dbf7Nx35vId56L6P3dGbMEOAg25f
2UvchCCU31+nAeoNacMiEhugrgca+u7+8fvvtZ0C+L0OeoggZQNJwUM8PCo9
D1zPm/Sve0jrdenx/UYT9L9Rz9vQ0WZsZN/hoL+LDvpv0vV2gMPPL/QjWNdA
X8gOeJv6fs2fWWcgWvuimmQK7KE4h7Ugc3+a5ukZKM3Ef+jKNPvAQnA6WSI5
68+fRZH78sUwG5x1eFbBI2O3qFCaJqhgg5stc8B9k+4m0FtOjJxp018pBAIu
c9pLgXHAT1o9wCmAim2zIJd39OVFBixLGBm2fFpUF/B4BQhBNtc9A40dyVWP
kxI6vET2otfw6ppQaYZsCl8tiDkBSRcK5Kou03iGbANg8/llWcxSAAWNdKR/
64/JdElcfF6UwhaB+V2mAC38hY2SmSWMkyGb6LV5kk3WiKszFKbz0ytufgwv
L6fJwt9gVI3RAKcD/kwQa9QbQVPSCHlVdFPDDpD0T4HMkREnluBlxaCCmeJO
CbLHFXee5EEvLbyKJhr4z8Hw2DRC9IEWBqCPsMHAeNlgbLznW1hlBy6L6ZKo
AWcnwe0Dvs/evR7BXBLjShei64Osm4HyAk/AXpkuVssc+ngJvHOs/5xeaVCb
FglIMUvaShl+tHp8+QKYVie4Uy6IhkBkhY1vmZynbll+fuQ/8AV3D/MhOeAD
dIAG3VKvvfll9G6tw3/10Vv6fnLw8y+HJwf7+H300/D167WO4i/midFPb395
ve++uTf33r55c3C0zy/DVVW79Gb41zXeS9feHr87fAvC3xqScSiFoMgDZHOa
Ktr9QQempVZawYQ27Jd7x7q/w7hBGxTMLX1HI9SXLwpWU85dFTkIG/wTpg9m
fT4HJoBN0JJN5lmVTEtaFuVFcZlrXIeIZ9SpMtFYPex6l0PkqhpF/rxMFyyG
owCFW+jPxxsvlPpBD3MS6TXL/sJyJlbWYj4D0BWXbAwIxTydeVo1IAe2Uljl
CgcETaRdkECKcSZ7ewVk2NPYtZN6zpYLlGVgH67Q3k9rAZllzR6y/tur4Qai
xcifyIWtkQShPV8Q97XmFaLPtnWJIgQNH0YvC43GiWD9vSAE1IQiFhxgCZcB
h3Yc8NRJkUam8h882Xt7uF5u4FQj6CJ8GDETQIV1+CFd3BkmkF5wAkpa6gm0
XhotF1TFlCSOi3Q61yUoQCxFkwRrhPawRcNkAMkwVdICivb6lKADCgXw8/F0
OUkR0h90H+azRPZKp02wfYnEn3HXKKmxFQ6Esh6+MOghWrA7Fs2QKRGfxuU1
A30XO/bYlihiiA1mXKQwvRwik/rzISsZ0oTP7OKdbwedA72eZ6ifMTJtPyg4
IxtYTIjargRj6eTuwDpAoVFWyxpgnqZaOHMTZrU3LZCrCx3/iBqAXt8b/kjE
i5NF6zXzp7M/0LMCpH6aFewnR6G04omEXeaXw+72E6JH7DDLJwy6T6xsJ0J6
RoODqFs49wBrigt+zAu1Dm1j1yJp/M4LTQmJlatWEd4KGMAZijjCGcyytNot
turZ8tLII0WwA+PYfMn8dfoxnZJaYk2A66+LoRlbYOzTSB1WQFuWRvRAzkpr
Hlgkbi5TbJO5KuiMkylLVw4yNIdNp8gfOqiCEHJBOJolOWyyeJl0oLqJclaA
plH5SiRPjje47ojlK0NEayg7EHLXEICXw+5w0N3fagzBEouVfxFLqEKNK6Jl
kJdTlPTmyRVtnzA0xZIZji1QmUXRo3UhPDQKJImnr0AQbQF2d4inB8B5bges
yIlN0ooBBDK1ytFOUFYixCMyAUxHeMdMeAicu0jabXQHc4sf58psWwShEfax
F5TEkyZ5d2SQ/vJAQIHHOPoolRgIGlu1nPzAwDqOH5m9yCwDpFQ5T9A18iLk
8NMXRQWgVWIYMoqOOZE3Pde34+PXb45A1URkHSKKlmRt9wBjCQP41ykuZgM4
899CZGDvaWBQaOCQPerN3p5ef8Ov7vEZosZDDLaVwv0jd99IBHS/FwJqZwIk
MGYzDLYWDliSeSpnQWYG40zI3KMMJe0BVKhmLWeiVhOs60ixxC6I9dpR8Cyy
bYfYV8Nkpq3xTTQrKyUZDPXUoRDddrcYVynwC8LjLv8SxWucLEA8mxjmKQLf
aZqMUYHw5LiUVx0w74MN2/S0LOzIeTH5o9cvjfbhEZ49ZSEdlPQVI5wAr/vQ
naLVWjmr3mUGQvBpyisYKQEhvjLSFKKtx/uWgcc3RjYWC8zIaHnKUvrCGTje
FJMlEMD66PCN3UThO6nSTgMFMT3R5QzbByAmuCTkzIC1NUOiljTZdmB7WYdf
h/u8O+gLmH+yR6Kpno7N5sk4bTAsXg3Qs9DGlYb9AWg4lDexedQIrAJnbh1a
oQTeSf/CZkgGwNqsQLPIZmwrOEvG2TSrSBai039429iAP/rqsBmiPd4TFmCs
dxfLU8M8cRX4oEUM5d+HH0Vq4IoXCJMbAXM0T6uVI4cXTw7/snHz2NtHLiaH
O4y/o3yDBjy6R2vOWC/kpLoMGb/dks7duXZVqGyGN2DZLsuqmJGKZE2VsM7C
lq2kol+iZYfXRJkq6agkWWOBurkbgEWxrErAjVtEZ8t8zEsBMKJC/uhk2Zhh
VQe4tDuGgbDDyiSbtwgbioVgQgOapwGOywwGYdi/cBNvh+P7gP1sBiuKZCWa
xYRAlrVoh36RABbDtX1WoCmcGdZacXaGZ0oA0RrZk/T8AoDA45wEqKeYaWtk
smcbIBjXx9VT+2TOYVMITEC5HF/IgY3AUCJRLXOYiVwlk2LO8tp4UcDozlOE
dn7B5jocnu3VEeDZAqRHaB9GMM1mGZGvHFjk5yITIsZB854hbUwLOQU0QvfH
1BmdGHycN0dYKgnUhrOiqM7QMgHDMVCgrCEUicv9N7RQJHR89BFnh8x3IW2i
rE8IZ3w3gKOtQU0TFFrTcQJyBL5RsikOdZAsX9K2hWZ4EIxkA1r4picAkA65
KyFuZaeKiYuolQz2CzREAp0hQjus4gDZmOV9vkR/JZZGYatYpCgHdaBLRTqV
WVegTsMKWGSF7GsBKSBP5wOubHolRlPD429vG/0/pB0zD0BrMSj3U58FkIml
vCjmc6QCWAfTDm1LsADTM5i/DGlhlqYVK6yIymQxJ/NVgfdTfBzAgfZgpy2r
5IqeUhdFSVYoXLwwo8tUZAlgihUKaABVAwpjVQYZJU9ASvPXWkeRRa1Mz4k6
cWpnOMeXwOu6bJVAaRf9SJI5oQJbw0WO8wGrBab9al5ZgkXJgViGHGl60jqt
Sl4PdvrZDvd8dwACqP6puExpPivSnImeyHJQoBBJEodZdLT6Z2mSl56VG2Uw
2qdmRUXENpFDILTjF8uKBc2qSvCwoWAO4BvRlccEczIjEoGXtKpxRkIU8KJa
lGRbI6XVrAbWJ3k9oJmr0RDMC/rDkElmmgAvv8AVVIXGK6d1d5RvJDfivJ30
Iu/Gjo99ValjxRlzJtYhmxNvE3ZzQAEh0LK9Y1r9+VFBctKXupRAgsLnz2fZ
+SWwJnrkiyxdnLgk5D7jgPssgqNzZq0eBD1EHsidSzIEpZNO2FbYBsqIV3MU
43Bhi8QLIla/pw+PR+mYqQ1d/nCXXMI2CGQMDAVPIkucAXvEEJ6Vd0iImAf+
axE9wDCRObs52LPmiXcA3VODnh5VtCeDTlGJTYGdVfyDajZWP3uyC6DaowMg
qOnMvlexfjgv5rAkyO49HhdMBWgjOwfCZu7bMiwaRzCyntruBZK64ZI0NJob
lMUZnkBf5RMp1OmhpSXMjChlvCjt+b3Vbuqg/Ib+NO5Y354Ow7Mz2SOieh2v
1OYxk5GA3GAYaAS/ZpHJ8oaxqad2engq1B3+ecgzgZ6mdiasB1+9KTfjBuU4
1hFsKlPesWX0tf6s5OodRMmTjZF9Vzqtcrenh9ZXg7ZwJBKzvvxZIoMvz1HQ
/wXxODoTp+PUKW/5F9mcZ5tA4PbQfpjbVd2puwuEy+0kmeB6q9MzutgCFpnX
TOQQjM7DRKTyTK/hcRgZao0IETXp0sravwL9Lbq07BraPxp1+Yexo9BxnQfq
PEUCkpPiZ7AAw1XBLxthogRdhz0sbA/bT7qnWaUj9oa3vuuGMz6UbH1Atwie
I9wW6vYmgLE/6BpLsdG4icnP8JxrzKZoWVhksGBDcSb0fNxGtbQzoPGEzFr5
VVNlN6dOSJ+zFBA+KYn6DvJxMcPVgOPM08sYV7y8gL2w0HkhAu4N5JYtAoOj
73Hx2J6fPTZHbI/vdYU/6lr/ioImjOvaXLuWHWXllT1Zk9eN9iJv65+Awa6+
YqzxzfaMGez6jzyCH9yzK67Yt5rwWSBkVVzf7UqzvaPhKBzdfRpuwmfHgoT0
6eqGK8IyG+1ZAr6W/d+nhdtcqbcHe9rhZL3cqPV0v0+Mnr+qPfxn8zrqj3Tv
9upI/dr2/nYddR26V3sx/A03kN+2qbqr2/Pp5SHguzbb+8MgEdcHccmHaw8J
uns4ebD2zDHf/8z1Ed1BvM/jtp5us4P8sVv//HANokbkOtwwdujVOwjG0ojA
CRKJhW/PCNPAfI/fnXRut4PwFSfyeJ/Rya8kgQ43h/CBC7faQVZ+0DEP3YZq
D99iB7nN5w47yG0+t9tB5MOS7SbKrBExlj8r6MWckNfHi/hHqQ99EW79+fcO
8pXtteLv5Uag39y2vf99O0gbPd+3vf/hO0jTedlYvIz38p4oyKT5BcIHLvE2
21pJ7s3GQ+fsqu6OcWB0+M+PLk+TbBI3wQ2n09BPKLBY+XfYX4yNM3jeM2b7
kY4dktKxvqLv7K7LuiAbZWCseSmH3mKyEN78Vg4kukfJLEWrK5/P6vVH/cGT
DXFU3WVHVezWuhw6eMQHhJrRR/Zg1vMw2Pq0vaPXdtbIoURwp9hXN9q5PbGm
oR7u9+SA0wwuWXkYjMruIkMHbDSlkkvNnL2E6IjEKr9uBKdXhFJyWcMvb1BX
X4hbnHXww0AZ9icFFLIdlSaZXFMXxi1QJNqBXs7n5OuH7uAXCR6P4FTaCFA8
mDgcve1iGKYeTucXSXdggrYplBu6kIjSL1902jvvddQaAPfm4M3Lg5MXv4zW
ano39dfF/rrYn/5e/8ennX53N1EzGk43m8gC+V73/1B7WtFQvEX0vXZv/Re0
tJ3owR8Gtbf+b3SpUUuyzoYvj17VvOuOxRLGszkyPtG4tH67sCflNPtlzaFb
FkTHuC/KRCkkCTmaMpOKsbNkZcXvoTtldO0pNIDgOkMLCDbNwyePVHTBxTwa
TJGRhq90R82ny1Kv9db0+n98GqQbxtOJIfyu5OF2eCLRWfrg6OTt8M3h0Y/H
J29/Pdw/OOnVJvdQvKgpgQXae9gtzPkvsL8Oo5FcSo3DQ4gdNO0QhsYrkWoA
NhghBw3rlJoRvZrholMILDy8MRLpauQMc8D9yrJs4X01n+/Pn6fpeTL98qXT
cCWjG16g0KSA6cPZwfBhPPcDlEwyDD0LTVTGpot+auJV2dOHfmSFceJVRjT0
rIrmbUsYnbpr5SzBYBWx9SWq3cmfBc7E2kP3PHvo0Lq4GmcePA0Jzo/EDyBw
NrbMqBn0RXEv5LSGLM9QL9ny5ktzcmIowweFg6Eb3nPKWCUx7AU2znNUSPIW
cFAeRrZb5HySQcxVuXMG3tqciTvDSC56MwtwJjGZQNAcrCIuKhGHlqx8odRn
+FOs9zfcXjPp+nF369sbQDaT9Scb7NmQpxU+LROyvrOBIGE8AuwWeOMGL5r1
/k5/MNjQX272txEo0ECOx4UwINitXB6APT+iRCZgX6IlSiEcwjSFIvpbab+3
3XvS6/d24H8CB//29JB9M6tsRmR5uSC3Bjw1RteXBXmw+vZ48U0GthBv8ElP
gm0jlOJHySR6p8tbq9mRryjuwjsLhCU1LS7bjcQrVL5V97qPb6nnrpRRr6ER
dkrGB/eJNc39SEzXyF4xo0OveCMPAMkD4YSH04feAp/vovBAvzYe/MTP0BHa
CkH14cS51u89nEFtOEKKNw6nVx/OoR904I+N7mFIf5XRwRY5P3EvsHzDRkI8
/HdN8XYNJ4cSVxHiJBYYdweciHAQH87/fJyc+MEpdE/kc+TWGEJGZ+aduw2n
uC1iVwx7NWIfFCc7NZwc2BhlGaon76KXUl7kXf7Vu/1w+Og3slvchT2KMxqf
pjKY35UGJ3eAhLVEcfC3Gu9dGhkteef9BUWRLJ3eqxFvw+3Vbz7MFEfUr/mH
LBaijRLaT2aLJjPGXusxvpESKTRsIZ7kQOsHnhIlEXN6tqxAvlO1s2oyXxUU
kmhfIu8JK9aygVa1uB7IWfeC8iGhhwcLHG1n4yg24oQHjkXGm0aJl8N4mnmO
97UgJRffIcHG8lLo5hHEFu+7l9AbF9jF8vyCxH1RoFAnm4Bwz7HrxbIqi+Vi
3BI+KPgALZMH2AifM82ig8f+sd63RwSfH03mLZYm42dhH1YNGgodySLeDBNp
w4azeB4XSBSsHSSsb5mHWIM4PDZp08woAXJY0MbthHAL49n3PTzEn2cT/v9O
0F/GwK67PQRASyPfiaBao042au1Q9DiDvyxF6fHSv8FjkiHOBrNMxLULJexp
kvdm+fhvf8R/fujNxvh1jF8x15tx/gE9QLxFlNwOLUAHvUF/oCPhNkSH0rh7
RTgjvqQiMTi+Uc4FWlEiNVwc0MYcY33QVIIxZc7Sgo/WwAbFaYaRsJQFzqaO
A6SY7HKAFXKfLm2gSkHqBp6HGYdtL1cCuXGaAyeCDtOpmAfF290BTvpal93T
jtVpMv5wiu7k6x9yNMCBhrH248lfNg+P/7K2gcGzzfUsziwmoQg1S5uCbdc0
SlpSHnos8jwz9UyL4sNyjssZGzSRNbQWCMUmXMuP+XJLWshceaiw1FnjYkp5
iCZzBzn5WySxLdf0gRYvRZ71ZLZhM4QBphPYFfRYeCx613rLhNT85WmdYs3U
o12VVFaaO2BAY8zPgXFK1pyCdxHd6EosnII6bEeEvhkRHcbDReKZsQOgV62+
2HhOryL5n0rZNcg9mXccFAhTCtnT4aYhEZkUbQfD6CJmMFcNxopLCPbR8FBz
8JfkNsAH/3QXNkHu1IxDRUfJk1TycIVxJJqSO2Q5tF/pNRwwplyQdcOE68W0
K3c+XWflV56l4W4YVR6FsM1GjhMsdjxrvslFQd6hwDGmyQIoZFZMyGCD+xkT
vMfGLa15O0wzlIN2WArmKCtxRkejISVIY0LJFvrWY+px4kx9fLIvS5Ci4yRp
A/T05uit4uQn2Ilx0axAYOVO3hztmU7e7O21kGK5PO0y8hSPa1wsQbpkn7sp
zN4EdsExmWwmxlrsIoW8dZvOJ+e92/frXINxi/vOxKsaxiChVz39i1AEGozn
MA3J+KKjYrhfZaZHAWXMGaO8qNfQa1DDJPnyDYoPjUxO5DFBRlRDszCKkJ0g
oKKrcQwIB7/SOojJDe9qwh/srGcpYtuOV9+al/kSjmQNQgEQxpONCVsiLiww
FQ9OHP1mQbVQOJm4OO2maLPDsWe6mTB4ZnSwx1IL5q4NYjAoSSpRD25OTCYT
8woHkgLW4wy+Q7yP5xu65peU2+cSdIh28ai8xUzxIKIsph+JILmhUhSH2KpS
L9NxYukWIxsy0Bg4b1EgehrzvpgrkUVgfsWqJiwzlMg1eCvwMehNvT3LiSKz
A8NjqCzPVPZkUyTtiZwuoC5x1dAZTE5RDrtCgpfUOWlestlewuXbCBeP472t
EOUoggOuqwyzAwf++AQ7HfZ0USsT2vctus2YdtvcsnRKsNkDahuM9WN3DYoK
PJxWeDprgtQaOG8l2I4RQCOYUf+tmFFAqxnGg+FGhb1ZKcocCOEAyW1rE72u
/kFpfxhF6pYoqrNDpC4JkRRxJqBqQUBFmYjE3xv2noBDXsDWYZVLEydUk+l9
xCU6X7JN58wvISBMiM8Ggja/ioIVS+31bhi3OIc4iBxjyEFx/tbzeN/52yu6
6acMpEM8w/GMGC7BXVQXfUsPubM4c2Z2mbAmT0rHWTI2Sexa4seA4VEMj2oK
agQLhs/D+CseGrPncZjxsUo4P6KNzWZN6lzOCNWrAiOgk9kc02BgEKIk3DPv
B8YLwx/N37VPXXl+TbV03vHCoLPcz+PXaehHF8UMoYMxVZR+7bvSmGqIOREz
D/WCpnMOano+qGtJkjzGt9YQGr9LDMo1KZn8bmxYxWlqtY0glwxG7rLWaDTi
ACgbvqu9Dvh5b2b9HjPe59jwTJygRj4a/TutfKXi8lWephNJ7spcIxWi8wl8
fIEAU0qZarnITd4sNqv8BDJdYUK0emrYzNzjZDyiP3Sd7Pe2DZ+wOPd6fG9k
sSwt1zgdWWlNLpiO/8sXJUDskWoVANGecEb4TBnYJuNHU1QaBTA2vsCEEiOj
cHTqSAwHyJoQj3DQGCG1mU7ej5P3H9Kr5siwVMGXL/rWI0vRJIf9Lulcntyf
RLVdPbhLspos8DAPAbH4mRdlmeJ/rI210VKLrP5m+Fcaq5++RCQCfyxu0DAa
SrNAw/UJzsZZ1UNUG7l+9OdHNhtCF8SFuAUzbINPFCSDt+XEFPFmvTuSj0U2
IXzwnrhIKGTa7rRNz4kyFERdtlJlSHCRstcZrjkxfs+yKnhLUpAJryXuRybc
j8kiS8lXR7lcUkv0n6IUocjQGkHrPIll6j0n256LmBejouc7uHDx+ZJdrJGB
DO2WxCPCYGxZs//kwRlrHolDrBWS0oT7uQmKQ88XeUlyMNV6iljZPZokZJ4m
U8pl4sdgBtkIkAtTsi/AaGa7kLHRUTzahpdiMSgqTmuBGT+SMWlbkTdEleHE
YDYGm5LckI1hahKUyUhYxMKBWw/y1mRyJgrARvMNo896OYsSCQCsJbPmmTEO
aUxsQFLKTQ6aQgE7lKcgyGBei9dtyleecgowC4pogss0Cq51A0JYAFnFxGLC
gyKWtunmMMqzbFHasEXcFxyXOAFGgq6T/d4Wb/uUD8amblKS8IOoFBMMSbYR
9sOGFSw53pU6AsLoMOAEnxl0RquqhvfaqMhvmtR1k/RGSepbMfp5aehCE53I
eUFvBnnQKx0zNLuDx7uH+/Xku7FZOTaNfn4EL31xrPCG05zZclplIPzJyEJJ
kSR4FA19hqlWRaxqbxrqCTCdHm/EKu4T6OiFUn/wMW8z6WmbNa/76VP3U/Qp
l8pO27R1/DQnN1iMiwyjly/QbGeSjw12KNgXZuo8zFzggGomUSUWLmHC5k3K
+1gqXk0Tm2qZCit8Qlo26o8Xd29TDjAFuPxdEdRat7ueflWYFD/RZeEs/Cwb
26y4/o4FoF9m8Dxs6phc44ySWm8/0X6AssckOC8Y88harL8Jfm9mi2ykDVD1
wHlKSSYZnGtnceScnp2fU5UKts7ZtYpseBXxeW7uZeHkxbW86IJaDM3SggRp
zXq7qZCB4dMcrS2b8NrWVndrraOzXtrr6N0doS686h/CJdKiFHQA4OYVHdbU
ciE2EoOb9CoBH0b5DdUgeN+cA8Vd5VZ/Ys/5PnL8kcSlbymj3Y7vrRDe2q05
Kdyv75dPoeGXT/CfXfwHXVFeoo/OS3ToeolOai+3dPQ57rvmJRHtp6Xv18UQ
B/9zQYFrx4f74q1xuN99dzU36bWvT1IyNUx0l4y0MDlbX9t3xCsDmZJxyziw
YjTu+4jtEmYC19cuyTwB7xe+sm/5Ci3RV+SSQm4cjx490pG0qmaD4CXFYr1Z
8G1ZWI2nS+kyZ5tIh2mRUO7J+xBm9EOUCZ3KUAJPmnY3zKj/zH17hw/Q3Y1+
PN+u9y239ijzIyatC4pxAH+NhLU9UO99r3dXb+jb9x5ZHUBdMZ8llJ4ciRC1
IzGfGlT5aSwYWE9/QFGffHTYnGmOV6bTsLCBiwxBEcA4j/L2jrs+5lPDFFZU
QspoByoJFo5cH2zQ8v2qxMOctN43oYU5kSkmiL5yZvb8ihR4Ghs3zB7n/rj8
dENhax7syp7S2u2cgk48icA/vfuuKQcom4oGm2VWIhx1rb/W44D/BUwdm2Ju
AFvdCuxtMl04iEPxVt0K7o4o104YbA5EmYFsrRGjbnvOHzATq7vl5Sg1+evI
fMkaufiUIqoX6TlmiioWVwpzq88M7Qpxw2BksTbpn60Q3nmPsvkgSZrykj/W
EnVLSqWOr9JAaxbVatsjxggtoktIyTq0sVF0rHUKzauEGUEICFyKkQJd9G3h
hlAOLVlidmcRJOB6FOKnumR5zmIGO9n2PFb4NJqFyI9ZYgDzszTxTvrzkvU3
QJYtiGl30re5tdKNLwDiFCtUoQLF7pEi353VkjvjxBuxPDzhxqgsb9DoGoDx
gzNOnMvVbYCgS84POC+AudQNF/rtWSVNI3oU8r4J5drnAyRJ62mck9hAZOFw
5xL2pNhTpjHbu58qjwrb+Jn9nNtlSiyL4CbsoIrigiIDfLhzVpv2lN5jy6HN
Wlp4CUnFLYv8vGoZ+mLqrtGLlD2XICUsqqpyekTx/iNZ0dKlNdeRW7yxUjkj
HrXai4hXrpWsLkb9oyi/gRjlPti1CFTBns1/mnLVA4kSKL88CfvSKMnXrnwj
QcaTpPSKKy8XRf5Pr6rOt+y937gyyqYffXf/h+u92VcDHqvj/B69N648fO9N
CRIWVpsE6dbEmgTurTEp8Fa+xjOzxhYA4t9uAVvvdz9w3Zpv/uE2C3t+ypaG
pKRiDiIDnDLl+eyIqybi0b3xhkUuIvYeTs6HbyYfk2yanGamm0ipBWWjWGrG
e+uXOgMhljaYCRfVKTGN6RLdhFwgp29PDTZGTJZIJ43Pt/5DSzmDKzJazmBr
uNCU+RYtNwOB+Px8we5xGBB5mU2qCwuceFEqC5mtU5hHOkbmubQ5eK0PnEoT
8jefSF5338dsYmstyHFGrMgQCWAZSopJnhbLcmoiqwF4VS5L9OmEVwe7T/SH
bFqQpQwj+blApM3LTXYaHHHJK/tffHZ3V87ut5hc9Ab92vn15zQ2ibv9wY2T
uE3Rs6zp9ZHIz1b36Z2bIbhITdUiTWYaD+IKLSV2UXtM9AQ2f0y1TImHqWXT
0y5M3Hli4FIC1zpNt51SnhGcjy4QxdI4FgCn2pB7nFXc4leFBM/OgHWvyh2Z
zNsglgaqbN5vf6DkbOOfXvi+SgYLtuID+uTaYylWr3O/fiCmxs3HtAymTONw
v7+7ZTyI3EgVU9JtRkrr03Fz8fIw4UwcgUA2Aut6yToGIjktJVmKrbxjk8Qb
1MiR2kV2jscGZjcwdM8aKk1oKOkGiFdsDw6VMaOU6Lq7DjnWGo2hJrOin4js
NKQvNA31NEor7K6Zw5M1z1KtyVJNSr+I/9G+yErBfO82fak1c6yzFhzomAKV
WJ/SHTYrUoudyme05aplKyXLhVEv3W5P6voWusbToQerlJ66ZVWe8KCjp133
fs8hm1fc8wrjQ1v7gRubETr4ML+pPBirQ3/NeQr4GYLjT2+h8eHgE55KmPTx
3qCMpSEwg3nHDwT5jP2u53CJCuOp4CSa3Y4+kmJEqzNHBah++uEvA/9g36qN
yjjhkuEghAFd4YBFAyvgs0mT3V70TwkIxBCei2RJ4bybxULZ36jkHxV59x26
diMLAuiODPtZP3p3tCF2F+pH3J2Fy2G6f6JafzhUJmM502unIjuuGB+6JktA
HHoASuAOFb1ldNF4GYHsfwI3mIopHNI7nULa6f6KBQS6h/lZoVxUBbvWDZ48
M+GSGfmDOlcfWphUe0AjpzkvFldengzuQyWaGpdTZT4EAzSv9fEUjDHknbJB
kyNxGH5GCSO2d/Dpz5+x9uWzrUG//+ULsSFXrQEtoh/TCznqCubY2YzIx6WZ
AQYRCEtMgkSDvQbdRPeogEZ39HqIw5yg86uRzC2aMEE0PPvraMgVV4wPlvIb
W/cFsQ6SOQsVTo6w4s6GrpZzqQgp7s09thwdY1IR2MDCgxdrq57LbVEQatKe
2KjZh9aZbr0yduiGIvF4RX41A7nVhK8LqRhrB2/u6EWGlXvCQ2JrWXbxTlIP
ixOfc1obL320CtigC+6R0ZiDUonQIYfe2Ry6wpVkraNrfyJX4DW9Dghfs/DL
1Q24DBO12KBoMOcmIlF5xHpdZvaaYx43RhILNUKwu5P3npfU3Q9GVBKa7AZq
GjZDdbccUVEhLiwuxa5Js6T8YHBvZuk7kuZmSR56AHT4YIA3cj0v0+UE4ba9
ZXkY9urlslfM2Zxp8/DN6NBREzvesx8izPnB4fExGmNrDn6N4eHeLiFF7AFg
1BXDuWGiS/Tva3i1iEHWCt4GEqrWIlEALl1bjAYpqiooCS7n9qapgOpZZlPL
PCOB0pQeukyTD2me2hJuZnvAgUzFycxzwJAwc//gX+1dYM1vxAEFcnTt0Zef
BO/Zc8mBt7P9dAAsRGaDPSNB6AkeHuxu+AUhVJhpj/13ukPyFgCRZ/whrWqL
dRQgCnGEKWcmDkcKODFsb1SN0rCSptd+x89swQy2BS9k3+DygRgQTKoXdHpq
YhC8qdg0+bTsfJEDqiCE8rs5/8CPKRUDspEnWGPFRQG3QSMjOUU/QJBDKWOV
VZhYG9x5pi+K5aLsKMA5bdzEwb2STqQ48MMDftakMuKfHLRcr2iOmc5K526M
Yj+HT5KjF4jveUE8t4J9Est5XBQFM5KzsFAX5VEwKouR81ll3LS1IY2ysUjn
KeoAZIHoMgqp1Xrtr6b+bOgwBrkxVEkMSHqp0TWYgiIX2TklrjOpS0IQBUJt
a8vOF3CBTSRksffEB1l3RBSUZgx7g4enfkpImyzB6ekpVllOWAWfGG/X37yd
jBM4mHhm1ugEfjRxeBITuvOUeFzCPRLd857jJtvzA3LHUaZCohH4DD3ifiLF
rrsnHFa6Ga5aUzlEJK6ZJM2hWmg2ThSexUB+VHCkFVViCkrjCg5TRMr7Lhsb
2NGWBliG1Tts0LpZ9bziO+LgZQpphi7BZpSUS24hpUgpTkbEOxuQs8pXyUi3
RCbJ9IqFRWv+sfN5muLUA6ZpEqmGmceO7Quepcb3MTcxf0oIpyEBhlKTqThF
6duEPYn8mIcCtpgJRBA18xwpDWlrWIQZAk19MSo+FxQpC5SC1d5pouKR05xJ
IyNbo/0d2CT8niOTakvB0AlYjsYDrxyHPU+ngmezJZUd8tDu1XsVurF7InMY
JeyjbcuSyILgqMuNAxajn/PNHHjNMT8qvwnPqmDMni7OR+a2d9KfQzON1V+V
Cao6Tf01nPCiI0FLdrRohfleMwKYMEd8SfbQ0hY8LUktU+knFCIz3F7OcSEx
xkkdZsZ0mp4V5DDRjvrqStFxYOI5Y9fin4URcrYF1zhMuWIVFW6eL5KcCmyJ
Nci6bRgDiJsSh9Qkv1JeNZrSBKpYEBv2m3IFLHE4vqUfhh3TDX4YbuyBH8bD
nrZiJ/+9Tms7tRO3232+qdPavgnO4Zjx0miGLMTrMGuWeT2i0WZTKhxpzB9W
p/0GPm/D6GKFkRjxgGPm8NwyBrwIQEj7ppZzVMB/CMzH0ny5HMv1A09HoHjg
ibYJ4/Ia2ibM1ehGJEEvbjtzOj6Z3pQc65ziZHH+AxT5URwtxlliHTk8i8aV
x9LFctLcUQQoZa2asV0lm4CYmLIHHMwVabie25pRGdDGE/df+65UTZM1wWuQ
4oypaENeR0c7OwzsnBReYw/doOjJJhv0AgQs372tIx3xVYbFep67ZUG4JjgA
b2yEGorFkQw7xuzIlVrR/u3VmMxI2ycFI+XDa2yu41v7fXDrBux2PAEaXDFW
8fNjmDwXt5ICZWkA1rRiqYh2eLL6e+KrDIL2Zc6jEd3aCflmGzR0ZGuZcnsT
03WLzxn6gX0D5xyDLd83p8a+v41zzstt6ujlgP/0+c/WLTaPh+h9i4cZ+7N6
QX273vvcezPg3QLzTcbeD8aOisNyEu/7G/Zuxn4OqhIoxV7yaw+CB+y9H5t3
SSQ+cxZStLlzoiNvp23540TEcTQ367cCXlAnR7kFcc5w1r5J7zWy8atK/369
u7HLgRWeouCefPXAZBOjF8suMFWFGEYLsutwvWgz9hvIpo6shyebKPBmxY1J
yIyg7dv0XiObWZIvzxJKsF/nNd+wdzN2Kboen4KHc0TkIx05ITfz3nA9fODe
m3I5i6ZtonkoB6B4foyF40FI/KdNcIDyuXTAcnqtfsqtDVBcJ4MPFY2cY+1m
NWeFjAW1SMwnSrXNwstcqiUxAZ5Uj9602DQmcPipkV7Zkk2Cudj1VCQ1Bx7M
G1MP52gLDZaejYYK4voRlZRmVlm5nkClevISI+ElLbWuNpIAgLui/D+iEYmT
goqdTnNhZvMOhfc0y+Vifowka2TdiJmiyATnitmYY86fMFPO6NgHLjyYcwf0
nl7z+bNNsMGH33NDay6tD5WQ8TBncIZ2X28ijYMVTzfVpmkP9gh9hvY5aQ6l
OJlmpeRDsqZR9ern/SPM3RRTHAUavM0GPzeCSS1IXiyWLrkIX4hnFamjXV42
g/cLXFTt53PiHgHPLBc5OciYfFRkg6aTwG0qnUULSX4/fc56q1UNUU+6IWo/
8B810DofB0aFq6QVpqiKFd2RwlVhx9YzLCzL1awE5h16ki8t2pGVIOpw3wBc
o+seFkdhMy67uni+VW11wCQ4Q+JXxA2ksmXOWjpSrUe7DcTUIrbj0N33oFjZ
hD+0Vk6vPOk10Xu/HHoNiDoa2t3l9EhMSY7r5mFl+Jp12pgYPKstIu8iucFA
jWcD5kAhMEuLZw4CbE1ivvULdw9Mc4PMuuAMv6ccoVO5g79a2L85SCu1n/4F
mzN5BngmXxf8Qnc/qZJN++vQHSLdfU69nPPobSptBgdTbIEMit9R7JF4gXUa
sf6SDT41BfcMB3fJuXgX5gTfmWEe9QMll5PKZHJaWRErWkmLzSWlpHpaK5ZV
tzjrUnmi5HyR0iHfGtxVQZjpeEqeeNu9Pnt0uZHrnzjUqj5kh1j/pCuYMBXW
E3yGZZhW0rh32mXnxePKhMMMtqDGXdVMfxnU0guORrEpkyddFl58xamAAnj1
xcSAIDtZJK8JCzvrzgt2g7MvBsjSDWQRcimrlBSyaMeOWokd7aWq3qMnhpK1
lqRRn/LJANcIvQhKy8H2lORjlnVMpKrmSFXdqCJWJZ9oLYjlr7bJ40nmcjb3
CyGwdOicgYP0Rug65O+PttyikZTOU1CRExLEGkioRVYHkyvUjAZE3mXGhSny
J66m0PL5Iplf+OgtzmgasTayH/gtQjFzMmKPDr/YheeDjnxDrB/ulCxMrYUl
JIxzALo9mu2na8pJ1zngu1U7KnspNDZrpGLmXPVjYbYuH5r8XBTCLZlxrVOF
PYg00xCFU7w0VdNLs+ak6Tb6EEjsBj18PZcYwclbCsqcdCVmV9XRIZ6kAXy1
d9p9SGuyB7n7l1XU2Zm8wm2SKpQfUdUwTjtulAh2zbM3MokNqMNXdIszcACt
df0FHLIz8EVR2oMEbFFQ6LxpA+xZnofAWAmxHRK/d/ETo25VvVvOTxR3DWaq
qo9f3dbp93fx+XUCvO9tzH5Ek3qZUQl0CDAbuR+T/f0zpIjgj8d7iJdXhil3
96ZpgpFgjj/EZSJR7iOhDjHITNxDY5mv6Pg2S4oYqDMOyUq3lnH47babsXRg
gCnDFWVQgZvpt8UCeaX7SIh3+TDjx0j72w79NVBPsuj+WkyXs7R7gkRPDmUm
al+SX3YkQa1N5l9B42dnYf7P0grptFsS+zf7sJEjnfhummJPKg93lNGkMhnJ
8kJJzVbbhl+w1c0Hs4AoXMqHyywKca4rWc1sTLM/uw1LTmN26zQeQestdwsq
/XxOASQghk7FIa3grUd5TpTedOqhlx3FxuSRNC8v1lv1pXAaHSF30gL7Sn8F
pRSV9EVixFyOmctp/fmRuRO3qphKRCOTA5Ym8x1nd6OZCHTAVmYYYYLOEkVi
4x2STWIWztOs6npZ8GxlsJzl8kb+ukg4W3Hmq93flaGMJ24GVnTCiW0cmgNZ
Sqa7wLRmTHeuylmLqszeEqWZnJi9zMsTCPAof9mkEt+XmSQ76GSLZcnIbM51
ljgK9ITKJ0TeLTssPhIHyNUy9+JFOd0mO9Ma74f6MiMcWViTjOpoVY48kvb6
braIBFsdQUGPdE4oRkc5KofBDstc1k7c7fxExazhc9XC4z8fsm9nrFVM25M7
T+HZbJlzC+KlcSUoDN1WTa22mKE0OatI0KDlhweJ1nJ+BiJJgwBK4/aKBPdd
6UXDKHGYBxHBW9D6GDEID74cjUB2piwwMONXZH1VNkPy2ZKKVHv4ZxpvoT43
cREk9SKl5ryqBsdpWMMtXO5BmINd8VLBxEWcJNGaLGmtJoFqKQdzY00W8V8W
hY0ztJsk0kZB8wKuTIZ+KoWydDUPafNeWfanEeamInWZ2RHC2DFqRzdOvzBl
MQzfCusZGJdPr316ltdEKMzmNk+Tq1hoc//YkQmqQftJqKI45zZL0eaYnZFb
Dxdt4AoyuApScdRvLdFDSX28U6Gg7BbpG0i9E4lS59zuoAEs6kFLMhxe0JGK
68rmUO8grFggAmb5Ivs7bnscDsF2zy7bPbEIql+ZgeqhKszJjCZX644ryKzx
FiqGE/IWzyhKWeYDHDLrwtWPgbtSWQZ2zgRtMA1ltiWptslzJwJRxW9zYDBX
NfEELXu0x3XZ+U0OtvBetBFdQZLuuJ2j4SbmLAtsyRTDG4mC7C0tTLU4ZQev
w2Nl+q6KTTpD8WLtCfMfUxOXQ0gXHnqGAcCRAqSVcYy/2ZS6XqapM6FuhEkD
jYxGp30sWUXqeAQBoFfQ2NuT45PDX4d7f2U1lOiVyglRaQneH2E0pYS0GSu8
uAq47XdcTDk1FobWInVSbnOTlcBC50xmZrDdZuqTSPgNQfru4OTNCOD0863V
ksRfJn5RGI/wbOUm2fYwAwcXefXyOwTRqRYe672+wLCMwtDXeHE1F9sXZdvm
BRrQfbHwUGCFIpeJxxzwBrl+mccEWSIAXa94J5QcmCTpROVbPAZEzrakOEyy
wibw/YLq69TiaV55ye5z/Z/LPNWDrcFWT4+ynEvAwkbgyi6XTNuG40qyaIKH
9SAKPR0HJIs7uVhxMcZrlizQgB5k0Pcizc4ku5ot67Ai03vtXAETjH9xkm54
Vlp7Vk5dQYnBwWG2Zdi4zmkhYRQHbcNpWcuwkUySOdmGagUV/OGF4yr03wuj
xUynGeEJAbxIp3M9WUiMxgrHCaAfoGc8RFaHw6NhU9XBq22HxxiRVYyXxOV4
N9DUSDI2BWHgA+yajJWYiYHjfv3+R+4M6hWW+Pz8CJSHeH/o+iQteCdXZ/hW
PVtwi7s0vIaPk6Wgz1H3VTrX/U5gjKvXCnDCuM+MEMvmmEXVvWdNXMlpmoxR
ape0QfyTpAty7ZXTCL1tkq/nlMAbtuW8cCkW+R6rbIl15vCTPpqSZrQN+VIy
VXzKJE6bFio6HqBASm1aAYqS/0gdOXrEHiAZ3VAylAIMqeQeNAO2x1INIHL5
AVwQhVrOe/72tR5VyLu9gjCkBrl9C8vVNHPzFLb69PB487fXe6bgpZQCtjHz
znhknDR2uS1Bic1HRZOLs+S/6yV74JyRHJ1vqwsLo3CKtV4/Gh5uqCfcB56A
WGfxvc3hsUa2JhI9VkbNXN2NenlQylOx8lAQ6UMWrDXC+qTny4w99VQKktYL
uNq61KIB2GJhAN9mDDCviCpiBUTGblhHlWvoGYWnp57FeraCHiVZ0jMU/sLU
S3jFRLhaUdtTcKgb3sTGkZrtYkSSukE99byn3yI/xGYpNaftv+ML8QKew6uz
CBn0C6pr5br7W3bNYJaEkS3DyeWWu+Zkta418Pud5iVcSp+ydBUISKoj079k
T3PX7L5p1wSgL5kW577uQrC6RBLBshXstphlJBEE9DzwizK0Cp+dGsi1pccR
wg3Lm39Ga9//ZW/vYGSNm3YP/pBScDdGPlNmG3LoljDoBZWhNyOWHBYURDE2
RpkgqBqGtS0CegyqrDQkIul2alRhVl1/J0b8MeoK25fWPAbCbA5aFP5l2Z63
gusIsGs52kfIP1pwK4AY5tkXzlbvyc/iXMeoS6frq0uelmSH9jQYmpm+MmCE
tRhy6yGBNAS3qy7sJ9WyZIdS3lssD3dT1jJbUVZVn60WCGwBP+Qw1TLP02kb
q3gedOPMA6arG3qKrH71w2CrO4CFOCQrWoOcbQlNjEGMBuPbGW/DZDEX3fdT
Rgh0OJFxWFiisUKP0bP4vt8DP/ZrHhl/576v697tteu45q/V9T7RHF9kIuPv
XM1NHkYbiDTCIwq+P8xwqKP+hn7JIqAfdXSr79TAH50F5H4NYGr+4dHPx7d9
qfad2/iZqoje5b1GG24gP9wfju0NkSfviU3hFfcaCDXQ/YpRMAQ7kuxp/75D
MEv5vkP4eora9YbwZMOw7TsNgQr3phQkwbsWXX+6wQvzTrPg4+MWdKrqF4LG
qLpsZ3Tya+f2DQTfh5tDrDp5JwiC7ydSW/q+Ddxmna2G4NkGS+pfD4H/+eEO
EDzfMNvNfWchlKTv3EB0BHcaQtv3/pZZMPdswFsv92vAWy/3asDHR3sD/T4x
Cb1vlJF4Y3WOdMfPKghWzsLgW85Cf8e2vrKBeaXjDfg8sa2BdWTBekUD0rru
b9vV5NrFrZCVgA3t7a8tHZj21j3lYaO2lYi4I3tDrYOWGY5t0KKa3GOjeoDd
rR4S9/iuDQAGYEccyaGTf/vWDQRWTd1/ejMt1RvQtn4LfJwScJcGvM9t5I3+
c2891RtYJ6Frgx985hOjAMYEZqBsNmBZDjBgy9Ndq7rB1RoNNJuq8xEfypUN
tOEgZEpfTUj1m4OtO9JBhCXcjQ5W7ButDQxW8dV1VC835MH+LehgBYYDOpBW
61Deb4f3oPzq7RF+P5Bm7Cu1rZqxp9RGNWMP2nbN2Hvmm2nGzdBhOaZxZSJv
PDaiknix5+js4heycnx+RAVx24+yhnmefvLOjQI3nGalXK+8uKuFZI4OTcrT
uItCh4+X2cLJ6YeDYrXi/DLLSjpxUS1WtDByt+POpINqs+Tk5Lyb1ArXJgam
WE4nnpcGndN/TCUqYpH+nc9PTTRwvLy4H6vRmA+vPPgVnUy5hMSUyJ0KSjlv
Dyln/I+ilIrGt54iTOXqtU3eJxVgDg1u65y/fIMP3Tinve28pZwzp2lipz4u
qwyY92ZfosKpqjMvUt3XtsyXf2KHMZBVyd6thS1oh90BcjAPEKf3R4BMZfI/
CFORhgd3bVjGSJEZUtuH/C8AM+IqYZI1YXARD6+O6cBN1PphIRLQ8ULOxkx6
eUIDXH/Ur52qeukdbwAs7tskLyAwPW0cIvGGiS8Jzshj/qF+l+TTgQBhQI/1
1vEmoMrMaQ35CyF2aqHd8jBhR0JdmC/XYuvtHCJWBpSlXo6B21DToFYDEDOA
kp0qw1aCqYqgrza01RA3SR4riUuZg9DN1iU3WCynaVlPpOZ71JgMwAS4dQaO
eC4RxgOQTAI2H00y3xMPO37RTMcS0SVOllPNZt2WAENktfa76trnO7I4H/Xt
5hm7izWfNVaF5pkwAjqXI7a7rlRKa96FNyPwPHZvrroLL1+7eTNpAq7dyyvu
Kv7y0iN3fsW+q22Bt8Zd8/kq6E0L+Nm8/pu5wl99eSW44V82E+3JZtdtE33t
AWA7D5urdxh8Yje+9v07NmCm4f4tvCHHk9VtrM4e8zj2NgF27dpohaD5UQLT
/d5uQn+3FiLvtg6/OfLY662fxvTd7eVw5u72bvCRV/92vWn/bfuEd2/gqivY
Ki3yWvTSo74HWuT2gC8b3WbkhLpgUPL3pdsGvcv08uMmOP7LLbfpVX6OXMnM
4/6rLbfl1YCxNl+N35Z3A7Yb79Z+gm7vNdj7Tmwsg6sI9kbd+2WFwmWSsVq5
GFQt1P3upGKE2RbntVRTVt/gBFb3UDn8vpxuEO+1RdHQd1A0+MOixaN2dcMW
TatJhEkjA2RPH1bu7TIUn1qyxVqJU1Dul14gQbaeZfJwv+sQgUFc+jJFbVVK
siVUz50eWdN+y3fQg5K2AfvZA7/loP1+7jLeYLgtmtkKbewC6xY4WmnTzPjD
bNUvL2czgrEvWGPmEMbu4b71VpVE/FaDucVsk+ZWU4bqvdtih8HCWdWrh8P2
jrZXjdWfMGpm9TBXzC93/K+lPNURXVehOGjA6U+B+rQ6geDj9i2htnHc/kOb
V1z38ne9uP7V3BNv2aMkejJKmY1wNz3K/Z880rDP3KfHAGuPw1/U46oH7tXj
tUeZuvErcsn/dc8erabJfYS/Ipe8X/ftET6jY/pzfT1kzkFub9Jj7ZI3n/fs
0TSGi537txqyGaOT9muP/4tQDv/1VG7vhy+FNhR3+8QdezQwBwc413YMcZ4T
U+pv3WMU2Cjkt1Gu/93jf3+PnoYdtZZ4F+PWlDv36KnlUeuKd7HN+nLHHoPG
I59vOo+Pw7X2uL70Hr7H2qXGvX/3+O8eTY8Ra5a91Li32vR1U49Ru3bc2t1y
9a49XjcNaICzxtVB9Or2PWWAt6iWJOQjxgWPZKKGcgl1Onu19vC9emzI4qZH
I8BxGnRz1RfN76sFtLUdflrhuHuPDSsctX37q3fvsWGpvHbC9m2u3qtHkMiN
4Ova9kVxr0d/Hu/fo/albn80zau+SH7fHn/veXwInqNiRltnHb2L3dag8N62
24g9db4oQBnEZEPtllx65qFMuaq9668259atmzfac8kiROlhbGHsJnhUR7WY
Sh6EWSqloewbYRYi5zvRoSwmH5OpZL99XQz1NkfTH47eDp73+7uY4cB3wVgB
ReiVEfW6CB4xnhimtl4L2q9c6tWYb4aXOd7l3Wpv8y725foMNAE0uX1j2Lcw
tGH/PrbfFZ44/LH+OJJdm/NO2KS+V5JaWRIakyncOBEZoyHVwm6b5ZiPy617
4mxPfke1DGASs8+dZlRPI0/Og9QmPjZXkE47ov+FDLV2NDfZam/j6eI4/jex
1Laaar+VpVazsTbkjdq0V3vAUop74l49Nqem1mPLA9/GwidPPo5O30PYhr2f
136P4Z2v67FuDbY/6z16d76qxwNDLLDdXV/b0q70y+8xuPOVY6xZg2u2Yb9t
51f1FT3+/pTDf2+2DUeeu1+Pd7UN14IAvqlt+MZb/+4x0uNNltobb925x5ss
tTfeunOPQbOtn3/tefQ+UUnjsXfr7svwhh6jn+uW7//u8X91jzebe/0nvsY4
jD3e6ER6Fy/TW/VIBtiIi2UgcMScLO+FXO7xral9TcqgKU3k9XjDA/cYoysW
ZMv0hGNc/cA9ejSqWqh4+Fg1eY0DveNreozqFX6PKx+4T48xz9BQVF31wL16
bNiZ6z2ueuCePfraQLRHXw14kB7x41mfmz22P3CvHn/Xefx9uVyr8doahO9i
vW63+1L8qQpt2fXMyp8fcVLlaADqKE1mU7T/pJ/mmLEzH9eKV3apfkmxwPOt
erZTm8qeY+BSSvLmZS2uCkUlQ9MSC52bKgASQDqvBNJoSmRKNSemtWyhPGMq
h4tdFBVo+ZXx+OxIFCsCUZoKgA1MAGefT5NGUTO/ckVj8O8Ci3pQmbTZAVnf
xsWMSrqX5OLMuaJlujqqSmdzLlDklXChlK62KqTgw8907WWYpGfhHUlbfJHN
JTrUK0rI1TsSfZEB2IvxBSUmXRRTzMjGPsllRnWXMvFr9UvmsrlYqqlivltj
X2TgQnRg2OA44Szis2w6pbmDzmIxfWjupGORYnGORRKNSVmFvZuYYxhsWB31
5aL4ACPuUCZyBM9kbjaEAdgh0Clq2CCPkEmER/cLk1C0abOl5glNNs1jrKQE
DKP5mkyW312YmVzeFQrBUGiswFPWDObKPbiOVXMoSHgT1pTNMOs9gEV6Nnpx
GPWksIU4FC+HGLYKmzE8Ukut7GksLdUoj4v9qpXDDZPGo9kZAMiBLCv2ri4N
06nZpIscOIZb49YkPUnn0+LKZVp1B1j1MkM1k/MqBv14NYdf+e41QAhUi0No
2Y9ueB1oOZlgfbPW7eyGBmzS7fb98GtGf+P7Yiqr28tu//pN8sOK14dIe6VP
fA/ffb0NXzoI7ZHXKx/xmvAdXWyGID8lRfeH4JFIC8wCXd+RYTUfuWkU4Sf2
SIjLmyY+9khtNm6B/PAR9/4tJj/+yNeC4DfxuD53TWS2PNJuVGjCEn+k1UjQ
tAO0PqKas3znK6pJrHe+oq5l/3PDvbZb3Yor/lvq2qRId/dr0RHRK/5bKnK/
MRGRK/5bD4JT3fzEllt4LcrqYvQdXKu/FVs1jWtf1VWoYcW0uYjWV+NBkRUb
ayN+idtY5XkZ/Rlcuuc0P8jaqS8eW6jIEuQtroSXHmY4EVUXa26JihtUBhTx
M16qhdTZpi5L9BdTSwNl1FW41K0VLrESLazYJTRqi126a4rqkIK4bR73CvBg
8nAUMPVQylBwliJUPSPqgJGPC3IDwqIBWG7DKU5dW7aS15arPO20QlpvLRoI
J45KFgtMn0QjDOolUUF1Gp8BIzlFKV/kZ7/22VyKJs1jRZNIV4e2PDzEGlQx
4V+/s3r9XrTUEYbyPdJ7lAFqWpzrz4/s9y9IRfkSFZZ08v3aWTItU6CNP2i9
1dddLEtDpXoBqVNWN8O6xHU7Bbq5WGWCC5FyfVDy3lFB7WZJZXVlvIdY0XdV
klF7R/2xhxXcsRDoFCukWj+hBRAsO8RIjipDikJo9APLXNCc+zXLPibTbCLp
nnCgg9hAa+RQSZlP8owStMuEdqSUCj7528nhX1yVP4ZUFblxUaNI5anYN1zh
Tq+2a7xwAFdmudLLHPPu51wjeXqlL9PkQ5qrOkQ8rG0Y1nI+IRPI/tGoTLGE
H2lzWJuKcVqaYeWc0R8nznq1cbFHt5SoBjNA+CEvLqfp5FxWz+dH9UstREXW
E66OV0oOsmn2QcoRJPkHWgC4apoK9HdhyanfAMxzLOTEVeqoEhLZYhocz6x+
M4D/D4Rtelj7MgEA

-->

</rfc>

