<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-usama-tls-fatt-extension-07" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title>Extensions to TLS FATT Process</title>
    <seriesInfo name="Internet-Draft" value="draft-usama-tls-fatt-extension-07"/>
    <author fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <date year="2026" month="May" day="02"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract>
      <?line 55?>

<t>This document applies only to non-trivial extensions of TLS, which require formal analysis. It proposes the authors specify a threat model and informal security goals in the Security Considerations section, as well as motivation and a protocol diagram in the draft.
We also briefly present a few pain points of the team doing the formal analysis which -- we believe -- require refining the process:</t>
      <ul spacing="normal">
        <li>
          <t>Provide protection against FATT-bypass by other TLS-related WGs</t>
        </li>
        <li>
          <t>Contacting FATT</t>
        </li>
        <li>
          <t>ML-KEM</t>
        </li>
        <li>
          <t>Understanding the opposing goals</t>
        </li>
        <li>
          <t>Response within reasonable time frame</t>
        </li>
      </ul>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://muhammad-usama-sardar.github.io/tls-fatt-extension/draft-usama-tls-fatt-extension.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-usama-tls-fatt-extension/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/muhammad-usama-sardar/tls-fatt-extension"/>.</t>
    </note>
  </front>
  <middle>
    <?line 66?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>While the TLS FATT process <xref target="TLS-FATT"/> marks a historic change in achieving high cryptographic assurances by tightly integrating formal methods in the working group (WG) process, the current FATT process has some practical limitations. Given a relatively smaller formal methods community, and a steep learning curve as well as very low consideration of usability in the existing formal analysis tools, this document proposes some solutions to make the FATT process sustainable.</t>
      <t>Specifically, the TLS FATT process does not outline the division of formal analysis work between the authors and the WG members doing the formal analysis; the latter is hereafter referred to as the "Verifier" for convenience. This document aims to propose some solutions without putting an extensive burden on either party.</t>
      <t>An argument is often presented by the authors that an Internet-Draft is written for the implementers. We make several counter-arguments here:</t>
      <ul spacing="normal">
        <li>
          <t>Researchers and protocol designers are also stakeholders of such specifications <xref target="I-D.irtf-cfrg-cryptography-specification"/>.</t>
        </li>
        <li>
          <t>Even implementers may like to understand the security implications before blindly starting to implement it.</t>
        </li>
        <li>
          <t>With the FATT process, this argument is clearly invalid. The Verifier may not be an implementer.</t>
        </li>
      </ul>
      <t>This document outlines the corresponding changes in the way Internet-Drafts are typically written.
For the Internet-Draft to be useful for the formal analysis, this document proposes that it would be helpful for the formal analysis if the draft contains four main items, namely:</t>
      <ul spacing="normal">
        <li>
          <t>motivation,</t>
        </li>
        <li>
          <t>a threat model,</t>
        </li>
        <li>
          <t>informal security goals, and</t>
        </li>
        <li>
          <t>a protocol diagram (<xref target="sec-prot-diagram"/>).</t>
        </li>
      </ul>
      <t>Each one of these is summarized in <xref target="sec-res-authors"/>. Future versions of this draft will include concrete examples.</t>
      <t>Expected contributions of the Verifier are summarized in <xref target="sec-res-verifier"/>.</t>
      <section anchor="motivation">
        <name>Motivation</name>
        <t>A clear separation of expected contributions would help IRTF UFMRG to train the authors and Verifiers separately to make their own contributions to the formal analysis.</t>
        <t>Moreover, we believe that the experiences can help improve the FATT process. The goal is to document the identified gaps with concrete examples, discuss those and mutually find the best way forward.</t>
      </section>
      <section anchor="scope">
        <name>Scope</name>
        <t>The scope of this document is only non-trivial extensions of TLS, which require formal analysis.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<section anchor="sec-prot-diagram">
        <name>Protocol Diagram</name>
        <t>In the context of this document, a Protocol Diagram specifies the proposed cryptographically-relevant changes compared to the standard TLS protocol <xref target="I-D.ietf-tls-rfc8446bis"/>. This is conceptually similar to the Protocol Model in <xref target="RFC4101"/>. However, while <xref target="RFC4101"/> only recommends diagrams, we consider diagrams to be essential.</t>
      </section>
      <section anchor="verifier">
        <name>Verifier</name>
        <t>In this document, the Verifier refers to the <strong>WG members</strong> doing the formal analysis.
Note that it is <strong>NOT</strong> a new formal role in the WG process.</t>
      </section>
      <section anchor="definition-of-attack">
        <name>Definition of Attack</name>
        <t>Any ambiguity originating from the threat model, informal security goals, and a Protocol Diagram is to be considered as an attack.
The authors are, therefore, encouraged to be as precise as possible.
The Verifier may propose text for consideration by authors/WG to disambiguate or propose a fix to the attack.</t>
      </section>
    </section>
    <section anchor="sec-pain-points">
      <name>Pain Points of Verifier</name>
      <t>From the two extremes -- <xref target="I-D.ietf-tls-8773bis"/> where Russ kindly provided all requested inputs and we were able to get it through (with a <eref target="https://mailarchive.ietf.org/arch/msg/tls/6Wk82oBGd61rTK23DgfYb7BmRKM/">small change</eref>) without any formal analysis to <xref target="I-D.fossati-tls-attestation-08"/> where formal analysis revealed vulnerabilities <xref target="ID-Crisis"/> and resulted in a separate WG to tackle this problem -- we summarize the pain points of the Verifier with the hope that we can refine the process.</t>
      <t>Note that we are not at all asserting that the authors have no pain points. They very likely have their own -- that is another indication that the process needs a refinement.</t>
      <section anchor="provide-protection-against-fatt-bypass-by-other-tls-related-wgs">
        <name>Provide Protection Against FATT-bypass by Other TLS-related WGs</name>
        <t>TLS-related WGs in particular those where the representation of TLS WG is a minority -- including the one (SEAT WG) that the author has defended himself as one of the six proponents -- <bcp14>MUST NOT</bcp14> be allowed to make changes to the TLS protocol beyond what is explicitly allowed in their charter.</t>
        <t>If rechartering of such WGs is <em>absolutely unavoidable</em> and includes non-trivial changes to the TLS protocol, it <bcp14>MUST</bcp14> only be done after agreement with the TLS WG. This will prevent the short-circuit path for FATT. If the WG does not have proper FATT-like process, TLS WG may request FATT review before WGLC.</t>
        <t>In short, our concern is:</t>
        <artwork><![CDATA[
What's the point of such a TLS FATT process when other WGs
can simply bypass this process to make key schedule level changes?
]]></artwork>
        <t>For example, <xref target="I-D.fossati-seat-early-attestation-00"/> makes key schedule level changes, breaks the SEAT WG charter and SEAT WG has no formal FATT-like process.</t>
      </section>
      <section anchor="contacting-fatt">
        <name>Contacting FATT</name>
        <t>According to FATT process <xref target="TLS-FATT"/>, FATT is a 'design team' as per <xref target="RFC2418"/> (also see <eref target="https://datatracker.ietf.org/doc/statement-iesg-on-design-teams-20011221/">this</eref>).</t>
        <t>The FATT process restricts the WG members -- except for <strong>authors</strong> (see for example <eref target="https://mailarchive.ietf.org/arch/msg/tls/pYmjTTlYd11FnjdYoOL6RdGk0sk/">this</eref>)-- from contacting the FATT directly.
This creates an unjustified situation where the authors have an <strong>exclusive</strong> access to FATT.
We argue that WG members -- including the Verifier -- should also be allowed to contact the FATT because of the following reasons:</t>
        <ul spacing="normal">
          <li>
            <t>Formal methods community is small and within this small community, those with deep knowledge of TLS are quite limited.</t>
          </li>
        </ul>
        <artwork><![CDATA[
Such a restriction would not have been there if the Verifier
were not a member of the TLS WG and analyzing the same draft
and free to contact the same FATT for advice. Being a member
of the TLS WG actually puts the Verifier at unnecessary disadvantage.
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>The feedback we receive on the list is really limited.</t>
          </li>
          <li>
            <t>Communication via chairs is a source of misunderstandings, as it has already happened with the chairs summarizing the intent of "Tamarin-like" to just "Tamarin".</t>
          </li>
          <li>
            <t>The process has to be <strong>inclusive</strong> of WG members who are willing to help but don't work in formal methods research groups.</t>
          </li>
        </ul>
        <t>Our proposed solution for this point is in <xref target="sec-contact-fatt"/>.</t>
        <section anchor="fail-proc">
          <name>Failure of Current Process</name>
          <t>The FATT process assigns a "FATT point person" <xref target="TLS-FATT"/> after adoption.
However, until FATT point person is assigned for a draft, Verifier is essentially not allowed to talk to any one in FATT.
Note that it could mean (almost) the whole lifetime of the draft.
A practical example is the PAKE draft <xref target="I-D.ietf-tls-pake"/>.
While the PAKE authors seemed ready for WGLC in meeting 125, no FATT person has been announced at the time of publishing this draft.</t>
        </section>
      </section>
      <section anchor="sec-ml-kem">
        <name>ML-KEM</name>
        <t>While ML-KEM <xref target="I-D.ietf-tls-mlkem"/> looks like just a "trivial" addition, it had an opposition of several (ca. 25 in our understanding) WG members in the last WGLC. We see 2 possible options:</t>
        <ul spacing="normal">
          <li>
            <t>Continue tabletop discussions on subjective calculation of risks, costs, tradeoffs, etc., and keep burning WG energy.</t>
          </li>
          <li>
            <t>Do some technical analysis using formal methods (such as symbolic and computational) to get a confirmation and offer a statement for security considerations, and move on to more critical works like hybrid authentication.</t>
          </li>
        </ul>
        <t>We believe the former cannot resolve the dispute. We believe the latter <em>may</em> help.</t>
        <artwork><![CDATA[
We believe the security considerations of {{I-D.ietf-tls-mlkem}} are
insufficient. We also believe FATT review could have significantly
improved it, including but not limited to the preference of hybrids,
and potential issues regarding KEM binding in TLS.
We have provided significant feedback during the two WGLCs. However,
almost none of that is actually reflected in the updated editor's
version.
]]></artwork>
        <t>Our proposed solution for this point is in <xref target="sec-sol-ml-kem"/>.</t>
        <section anchor="formal-analysis-work-in-progress">
          <name>Formal Analysis (Work-in-progress)</name>
          <t>We have presented observation from our ongoing symbolic security analysis
(cf. limitations in <xref target="sec-sec-cons"/>) using ProVerif on the mailing list.</t>
          <t>We argue that in general:</t>
          <ol spacing="normal" type="1"><li>
              <t>Migration from ECDHE to hybrid is security improvement.</t>
            </li>
            <li>
              <t>Migration from hybrid to standalone ML-KEM is security regression.</t>
            </li>
          </ol>
          <section anchor="hybrid-pqt">
            <name>Hybrid PQ/T</name>
            <t>More formally, the property hybrid PQ/T should provide is:</t>
            <artwork><![CDATA[
Hybrid PQ/T is secure unless both ECDHE and ML-KEM are broken.
]]></artwork>
            <t>Hybrid preserves ECDHE, and adds ML-KEM as an additional factor. So as
long as one of them is not broken, the system is secure. In particular, even if ML-KEM is
completely broken, the system retains the security level of ECDHE.</t>
          </section>
          <section anchor="non-hybrid-pq">
            <name>Non-hybrid PQ</name>
            <t>On the other hand, the formal property non-hybrid PQ provides is:</t>
            <artwork><![CDATA[
Non-hybrid PQ is secure unless ML-KEM is broken.
]]></artwork>
            <t>If ML-KEM is broken, the whole system is broken.</t>
          </section>
          <section anchor="comparison">
            <name>Comparison</name>
            <t>Leak out the ECDHE key from hybrid PQ/T and you get a standalone ML-KEM. Clearly, hybrid is
in general more secure, unless ECDHE is fully broken, in which case it still falls
equivalent to standalone ML-KEM, or in the hypothetical scenario that there is an implementation
bug in the ECDHE part which is triggered only in composition.</t>
          </section>
        </section>
        <section anchor="cost">
          <name>"Cost"</name>
          <t>"Cost" has been presented on the list as the motivation for ML-KEM but no reference has yet been presented.
We believe costs will depend on several factors and it is quite subjective.
There seems to be a need for a thorough study to understand the "cost."</t>
        </section>
      </section>
      <section anchor="understanding-the-opposing-goals">
        <name>Understanding the Opposing Goals</name>
        <t>The authors need to understand that the task of the Verifier is to find the subtle corner cases where the protocol may fail.
This is naturally opposed to the goal of the authors -- that is, to convince the WG that the protocol is good enough to be adopted/published.</t>
        <artwork><![CDATA[
Unless the Verifier remains really focused on checking subtleties,
there is little value of formal analysis.
]]></artwork>
        <t>In particular, some topics like remote attestation need more precise specifications because small changes or ambiguites may make a big difference.</t>
      </section>
      <section anchor="response-within-reasonable-time-frame">
        <name>Response Within Reasonable Time Frame</name>
        <t>If authors do not respond to the Verifier's questions within a reasonable time frame (say a few weeks but not months), the Verifier may not pursue formal analysis of their draft.</t>
      </section>
    </section>
    <section anchor="proposed-solutions">
      <name>Proposed Solutions</name>
      <t>In addition to those mentioned inline in the previous section, we propose the following:</t>
      <section anchor="sec-contact-fatt">
        <name>Contacting FATT</name>
        <section anchor="separate-list-for-fatt-and-wg-members">
          <name>Separate List for FATT and WG Members</name>
          <t>We propose creating a public mailing list (something like tls-fatt) for discussions between interested WG members and FATT.</t>
          <t>In our understanding, the idea -- in a nutshell -- is something like <strong>hybrid</strong> design team, i.e.,:</t>
          <ul spacing="normal">
            <li>
              <t>FATT continues to use whatever they currently use for their internal communication ("closed")</t>
            </li>
            <li>
              <t>The proposed list additionally allows public FATT-WG engagement ("open") for questions and discussion of WG members or FATT</t>
            </li>
          </ul>
          <section anchor="potential-need-of-fatt-wg-engagement">
            <name>Potential Need of FATT-WG Engagement</name>
            <t>In addition to the questions from the WG for the FATT, FATT also needs to engage with the WG:</t>
            <ul spacing="normal">
              <li>
                <t>At <strong>initial</strong> FATT review (just after adoption), FATT may have questions from authors as well as Verifiers. For the former, to understand better the threat model and desired security goals, etc. to be able to suggest which approach is best-suited. For the latter, to better understand what formal analysis approach and tool is being planned/currently used (if any).</t>
              </li>
              <li>
                <t>During <strong>final</strong> FATT review (just before WGLC), FATT may have questions on what the Verifier has done, especially in cases where a peer-reviewed publication is not yet available. We believe evaluating someone else's code is not easy, or at least if FATT has the opportunity to talk to the Verifier, it will decrease the brain cycles that they will have to spend on it.</t>
              </li>
            </ul>
          </section>
          <section anchor="design-goals">
            <name>Design Goals</name>
            <ul spacing="normal">
              <li>
                <t><strong>minimal process change</strong>: some private discussions typically happen between authors and FATT; move them to public list for transparency. Keep intra-FATT communication private as it is.</t>
              </li>
              <li>
                <t><strong>balanced workload</strong>: not to increase anyone's workload on average over a finite period of time (say lifetime of one document): joining list is voluntary; responding to list questions is voluntary</t>
              </li>
              <li>
                <t><strong>all stakeholders benefit</strong>: ensure all stakeholders (FATT, authors, WG members, chairs) benefit compared to current process</t>
              </li>
            </ul>
          </section>
          <section anchor="benefits">
            <name>Benefits</name>
            <t>In addition to transparency where this removes the current situation where only the authors have an exclusive access to FATT, we think the proposal has merits where all stakeholders benefit:</t>
            <ul spacing="normal">
              <li>
                <t><strong>Chairs</strong> get relief from carrying messages back and forth between WG and FATT.</t>
              </li>
              <li>
                <t><strong>FATT</strong> gets involved early in the process and has to do lesser work later on (e.g., checking artifacts before WGLC).</t>
              </li>
              <li>
                <t><strong>Interested WG members</strong> get a direct contact with experts.</t>
              </li>
              <li>
                <t><strong>Uninterested WG members</strong> get lesser noise on the TLS list. They can check the public archives by searching for a specific draft if they would like to.</t>
              </li>
            </ul>
          </section>
          <section anchor="risks">
            <name>Risks</name>
            <ul spacing="normal">
              <li>
                <t>We acknowledge the risk of '<strong>no response from FATT</strong>' identified on list. In such cases, WG can continue with its best judgement based on its understanding of the available literature.</t>
              </li>
            </ul>
          </section>
          <section anchor="open-questions">
            <name>Open Questions</name>
            <t>Opinion of FATT is critical in this proposal whether the middle ground of hybrid is acceptable to (some of) them.</t>
          </section>
        </section>
        <section anchor="lead-fatt">
          <name>Lead FATT Person for Contact</name>
          <t>This proposal assigns a single FATT person -- referred to as Lead FATT Person -- who the WG group members and authors can contact for general queries. It can keep rotating after certain time, such as one month.</t>
        </section>
        <section anchor="stud-fatt">
          <name>Students/Researchers of FATT</name>
          <t>Most of FATT persons are from academia. WG can request FATT to use their own students/researchers to do the formal analysis.</t>
        </section>
      </section>
      <section anchor="sec-sol-ml-kem">
        <name>ML-KEM: FATT Review</name>
        <t>We have formally requested the chairs to initiate the FATT process for <xref target="I-D.ietf-tls-mlkem"/>.
See <eref target="https://mailarchive.ietf.org/arch/msg/tls/rClgrWm2hnhESXHx56U8InbwQQs/">this</eref> and <eref target="https://mailarchive.ietf.org/arch/msg/tls/7lj6fYAweMBwNMxFerNl7xhY0pk/">this</eref>.</t>
        <section anchor="expected-learning">
          <name>Expected Learning</name>
          <t>We believe formal methods can provide additional value for security considerations of this draft in order to maintain the high cryptographic assurance of TLS. Since we have no guarantee on whether ECDHE will break before ML-KEM, it seems appropriate to do thorough cryptographic analysis. The Harvest Now, Decrypt Later (HNDL) attack applies equally well to non-hybrid ML-KEM. Adversary can record all traffic and decrypt it when ML-KEM is broken (or probably it is already broken; who knows?)</t>
          <ul spacing="normal">
            <li>
              <t>As an example, it can help justify design choices, such as the preference for hybrids.
It can help identify ways in which ML-KEM can break.
It can also help identify all the assumptions under which the properties hold.</t>
            </li>
            <li>
              <t>As a relevant data point in the context of standardization, LAKE WG has done formal analysis for EDHOC-PSK with KEM (<eref target="https://mailarchive.ietf.org/arch/msg/lake/2XGOI9OCwylJUfSCasvvwM2FXmw/">ref</eref>).</t>
            </li>
            <li>
              <t><em>Computational</em> analysis (cf. <eref target="https://eprint.iacr.org/2019/1393.pdf">SoK</eref>)-- using tools such as CryptoVerif -- seems like a reasonable approach to ensure security of ML-KEM in TLS, such as binding.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="scope-of-fatt">
        <name>Scope of FATT</name>
        <ul spacing="normal">
          <li>
            <t>Be more explicit on:
            </t>
            <ul spacing="normal">
              <li>
                <t>what is the scope of FATT?</t>
              </li>
              <li>
                <t>what kind of drafts need FATT review and why?
Discussion on this is happening in <eref target="https://github.com/tlswg/tls-fatt/issues/19">issue 19</eref>.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="sec-discuss-meetings">
        <name>Discussion at Meeting</name>
        <artwork><![CDATA[
Formal analysis -- just like any other code development -- is an
iterative process and needs to be **progressively** discussed with
the WG (and not just authors!) to be able to propose secure
solutions.
]]></artwork>
        <t>So at least some time should be allocated in the meetings for discussion of ongoing formal analysis, rather than just the results.</t>
        <t>If the authors are doing the formal analysis themselves, it would be helpful to also present the current state of formal analysis in meetings for discussion. This may be a single slide describing:</t>
        <ul spacing="normal">
          <li>
            <t>Approach used: symbolic or computational</t>
          </li>
          <li>
            <t>Tool used: ProVerif, CryptoVerif etc.</t>
          </li>
          <li>
            <t>Properties established</t>
          </li>
        </ul>
        <t>This will help the WG give any feedback and avoid other Verifiers doing redundant effort using potentially same tools.</t>
      </section>
    </section>
    <section anchor="sec-res-authors">
      <name>Contribution of Authors</name>
      <t>The following contributions are expected from the authors:</t>
      <section anchor="real-motivation">
        <name>Real Motivation</name>
        <t>Authors are expected to provide the real motivation of the work (i.e., the proposed extension of TLS).
The Verifier can then ask questions to improve it.</t>
      </section>
      <section anchor="sec-th-model">
        <name>Threat Model</name>
        <t>A threat model identifies which threats are in scope for the protocol design. So it should answer questions like:</t>
        <ul spacing="normal">
          <li>
            <t>What are the capabilities of the adversary? What can the adversary do?</t>
          </li>
          <li>
            <t>Whether post-quantum threats are in scope?</t>
          </li>
          <li>
            <t>What can go wrong in the system? etc.</t>
          </li>
          <li>
            <t>What are the computational and memory resources available to the adversary?</t>
          </li>
        </ul>
        <section anchor="typical-dolev-yao-adversary">
          <name>Typical Dolev-Yao adversary</name>
          <t>A typical threat model assumes the classical Dolev-Yao adversary, who has full control over the communication channel.</t>
          <t>Any additional adversary capabilities and assumptions should be explicitly stated.</t>
        </section>
        <section anchor="potential-weaknesses-of-cryptographic-primitives">
          <name>Potential Weaknesses of Cryptographic Primitives</name>
          <t>In general, it also outlines the potential weaknesses of the cryptographic primitives used in the proposed protocol extension. Examples include:</t>
          <ul spacing="normal">
            <li>
              <t>weak hash functions</t>
            </li>
            <li>
              <t>weak Diffie-Hellman (DH) groups</t>
            </li>
            <li>
              <t>weak elements within strong DH groups</t>
            </li>
          </ul>
        </section>
        <section anchor="keys">
          <name>Keys</name>
          <t>This section should specify any keys in the system (e.g., long-term keys of the server) in addition to the standard TLS key schedule. Theoretically and arguably practically, any key may be compromised (i.e., become available to the adversary).</t>
          <t>For readability, we propose defining each key clearly as in Section 4.1 of <xref target="ID-Crisis"/>. Alternatively, present as a table with the following entries for each key:</t>
          <ul spacing="normal">
            <li>
              <t>Name (or symbol) of the key</t>
            </li>
            <li>
              <t>Purpose of the key</t>
            </li>
            <li>
              <t>(optionally but preferably -- particularly when the endpoint is not fully trusted) Which software in the system has access to the key?</t>
            </li>
          </ul>
          <t>If more than one servers are involved (such as migration cases), the keys for servers should be distinguished in an unambiguous way.</t>
        </section>
      </section>
      <section anchor="informal-security-goals">
        <name>Informal Security Goals</name>
        <t>Knowing what you want is the first step toward achieving it. Hence, informal security goals such as integrity, authentication, freshness, etc. should be outlined in the Internet-Draft.
If the informal security goals are not spelled out in the Internet-Draft, it is safe to assume that the goals are still unclear to the authors.</t>
        <t>Examples:</t>
        <ul spacing="normal">
          <li>
            <t>Integrity of message X holds unless some key Y is leaked.</t>
          </li>
          <li>
            <t>(stated differently) Integrity of message X holds as long as some key Y is protected.</t>
          </li>
          <li>
            <t>Freshness of message X holds unless some key Y or some key Z is leaked.</t>
          </li>
          <li>
            <t>Server Authentication holds unless some key Y or some key Z is leaked.</t>
          </li>
        </ul>
        <t>See Section 5.1 of <xref target="ID-Crisis"/> for concrete examples.</t>
      </section>
      <section anchor="protocol-diagram">
        <name>Protocol Diagram</name>
        <t>A Protocol Diagram should clearly mention the initial knowledge of the protocol participants, e.g., which authentic public keys are known to the protocol participants at the start of the protocol. An example of a Protocol Diagram for <xref target="I-D.fossati-tls-attestation-08"/> is provided in Figure 5 in <xref target="ID-Crisis"/>.</t>
      </section>
    </section>
    <section anchor="document-structure">
      <name>Document Structure</name>
      <t>While the needs may differ for some drafts, we propose the following baseline template, with an example of <xref target="I-D.wang-tls-service-affinity"/>:</t>
      <t>The template is:</t>
      <ul spacing="normal">
        <li>
          <t>Easy for readers</t>
        </li>
        <li>
          <t>Easy for reviewers</t>
        </li>
        <li>
          <t>Easy for formal analysis</t>
        </li>
      </ul>
      <t>TODO: Currently it is almost a copy of the <eref target="https://mailarchive.ietf.org/arch/msg/tls/LfIHs1OVwDKWmDuCEx0p8wP-KPs/">guidance email</eref> to the authors. We will add details in next versions.</t>
      <section anchor="introduction-1">
        <name>Introduction</name>
        <ul spacing="normal">
          <li>
            <t>Problem statement: Say in general what the problem is.</t>
          </li>
          <li>
            <t>For <xref target="I-D.wang-tls-service-affinity"/>, we believe this
 should <em>not</em> include CATS. Anyone unfamiliar with CATS should be
 able to understand your problem.</t>
          </li>
        </ul>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <ul spacing="normal">
          <li>
            <t>Define any terms not defined in RFC8446bis or point to other drafts from where the definition is used.</t>
          </li>
        </ul>
      </section>
      <section anchor="motivation-and-design-rationale">
        <name>Motivation and design rationale</name>
        <ul spacing="normal">
          <li>
            <t>We really like how Russ motivates the problem statement in <xref target="I-D.ietf-tls-8773bis"/>. Use it as a sample.</t>
          </li>
          <li>
            <t>Here authors should address all the concerns from WG, including
 justification with compelling arguments and authentic references
 why authors think it should be done within TLS WG (and within handshake).</t>
          </li>
          <li>
            <t>For <xref target="I-D.wang-tls-service-affinity"/>, authors could put CATS here as a motivational use case.</t>
          </li>
        </ul>
      </section>
      <section anchor="proposed-solution-one-or-more-sections">
        <name>Proposed solution (one or more sections)</name>
        <ul spacing="normal">
          <li>
            <t>Protocol design with Protocol Diagram: we work on the formal analysis of TLS 1.3 exclusively. Please contact someone else if your draft relates to older versions.</t>
          </li>
        </ul>
      </section>
      <section anchor="security-considerations">
        <name>Security considerations</name>
        <section anchor="threat-model">
          <name>Threat model</name>
        </section>
        <section anchor="desired-security-goals">
          <name>Desired security goals</name>
          <t>As draft proceeds these desired security goals will become what the draft actually achieves.</t>
        </section>
        <section anchor="other-security-implicationsconsiderations">
          <name>Other security implications/considerations</name>
        </section>
      </section>
    </section>
    <section anchor="sec-res-verifier">
      <name>Contribution of Verifier</name>
      <t>When the authors declare the version as ready for formal analysis, the Verifier takes the above inputs, performs the formal analysis, and brings the results back to the authors and the WG. Based on the analysis, the verifier may propose updates to the Security Considerations section or other sections of the Internet-Draft.</t>
    </section>
    <section anchor="sec-sec-cons">
      <name>Security Considerations</name>
      <t>The whole document is about improving security considerations.</t>
      <t>Like all security proofs, formal analysis is only as strong as its assumptions and model. The scope is typically limited, and the model does not necessarily capture real-world deployment complexity, implementation details, operational constraints, or misuse scenarios. Formal methods should be used as complementary and not as subtitute of other analysis methods.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="TLS-FATT" target="https://github.com/tlswg/tls-fatt">
          <front>
            <title>TLS FATT Process</title>
            <author>
              <organization>IETF TLS WG</organization>
            </author>
            <date year="2025" month="June"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="13" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-14"/>
        </reference>
        <reference anchor="I-D.fossati-tls-attestation-08">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Arto Niemi" initials="A." surname="Niemi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using attestation which is
   a process by which an entity produces evidence about itself that
   another party can use to appraise whether that entity is found in a
   secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enables the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-tls-attestation-08"/>
        </reference>
        <reference anchor="RFC4101">
          <front>
            <title>Writing Protocol Models</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author>
              <organization abbrev="IAB">Internet Architecture Board</organization>
            </author>
            <date month="June" year="2005"/>
            <abstract>
              <t>The IETF process depends on peer review. However, IETF documents are generally written to be useful for implementors, not reviewers. In particular, while great care is generally taken to provide a complete description of the state machines and bits on the wire, this level of detail tends to get in the way of initial understanding. This document describes an approach for providing protocol "models" that allow reviewers to quickly grasp the essence of a system. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4101"/>
          <seriesInfo name="DOI" value="10.17487/RFC4101"/>
        </reference>
        <reference anchor="ID-Crisis" target="https://www.researchgate.net/publication/398839141_Identity_Crisis_in_Confidential_Computing_Formal_Analysis_of_Attested_TLS">
          <front>
            <title>Identity Crisis in Confidential Computing: Formal Analysis of Attested TLS</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="M." surname="Moustafa">
              <organization/>
            </author>
            <author initials="T." surname="Aura">
              <organization/>
            </author>
            <date year="2025" month="November"/>
          </front>
        </reference>
        <reference anchor="I-D.irtf-cfrg-cryptography-specification">
          <front>
            <title>Guidelines for Writing Cryptography Specifications</title>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document provides guidelines and best practices for writing
   technical specifications for cryptography protocols and primitives,
   targeting the needs of implementers, researchers, and protocol
   designers.  It highlights the importance of technical specifications
   and discusses strategies for creating high-quality specifications
   that cater to the needs of each community, including guidance on
   representing mathematical operations, security definitions, and
   threat models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-cryptography-specification-02"/>
        </reference>
        <reference anchor="I-D.ietf-tls-8773bis">
          <front>
            <title>TLS 1.3 Extension for Using Certificates with an External Pre-Shared Key</title>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <date day="5" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies a TLS 1.3 extension that allows TLS clients
   and servers to authenticate with certificates and provide
   confidentiality based on encryption with a symmetric key from the
   usual key agreement algorithm and an external pre-shared key (PSK).
   This Standards Track RFC (once approved) obsoletes RFC 8773, which
   was an Experimental RFC.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-8773bis-13"/>
        </reference>
        <reference anchor="I-D.fossati-seat-early-attestation-00">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="9" month="January" year="2026"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using remote attestation
   which is a process by which an entity produces Evidence about itself
   that another party can use to appraise whether that entity is found
   in a secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enable the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation Evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and to use them mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-seat-early-attestation-00"/>
        </reference>
        <reference anchor="I-D.ietf-tls-mlkem">
          <front>
            <title>ML-KEM Post-Quantum Key Agreement for TLS 1.3</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <date day="12" month="February" year="2026"/>
            <abstract>
              <t>   This memo defines ML-KEM-512, ML-KEM-768, and ML-KEM-1024 as
   NamedGroups and and registers IANA values in the TLS Supported Groups
   registry for use in TLS 1.3 to achieve post-quantum (PQ) key
   establishment.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-mlkem-07"/>
        </reference>
        <reference anchor="I-D.wang-tls-service-affinity">
          <front>
            <title>Service Affinity Solution based on Transport Layer Security (TLS)</title>
            <author fullname="Wei Wang" initials="W." surname="Wang">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Aijun Wang" initials="A." surname="Wang">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Mohit Sahni" initials="M." surname="Sahni">
              <organization>Palo Alto Networks</organization>
            </author>
            <author fullname="Ketul Sheth" initials="K." surname="Sheth">
              <organization>Palo Alto Networks</organization>
            </author>
            <date day="8" month="April" year="2026"/>
            <abstract>
              <t>   This draft proposes a service affinity solution between client and
   server based on Transport Layer Security (TLS).  An extension to
   Transport Layer Security (TLS) 1.3 to enable session migration.  This
   mechanism is designed for network architectures, particularly for
   multi-homed servers that possess multiple network interfaces and IP
   addresses.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wang-tls-service-affinity-01"/>
        </reference>
        <reference anchor="RFC2418">
          <front>
            <title>IETF Working Group Guidelines and Procedures</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="September" year="1998"/>
            <abstract>
              <t>This document describes the guidelines and procedures for formation and operation of IETF working groups. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="25"/>
          <seriesInfo name="RFC" value="2418"/>
          <seriesInfo name="DOI" value="10.17487/RFC2418"/>
        </reference>
        <reference anchor="I-D.ietf-tls-pake">
          <front>
            <title>A Password Authenticated Key Exchange Extension for TLS 1.3</title>
            <author fullname="Laura Bauman" initials="L." surname="Bauman">
              <organization>Apple, Inc.</organization>
            </author>
            <author fullname="David Benjamin" initials="D." surname="Benjamin">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Samir Menon" initials="S." surname="Menon">
              <organization>Apple, Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Apple, Inc.</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   The pre-shared key mechanism available in TLS 1.3 is not suitable for
   usage with low-entropy keys, such as passwords entered by users.
   This document describes an extension that enables the use of
   password-authenticated key exchange protocols with TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-pake-01"/>
        </reference>
      </references>
    </references>
    <?line 493?>

<section numbered="false" anchor="appendix">
      <name>Appendix</name>
      <section numbered="false" anchor="document-history">
        <name>Document History</name>
        <t>-07</t>
        <ul spacing="normal">
          <li>
            <t>Failure of current process in <xref target="fail-proc"/></t>
          </li>
          <li>
            <t>Students of FATT in <xref target="stud-fatt"/></t>
          </li>
          <li>
            <t>Lead FATT Person for Contact in <xref target="lead-fatt"/></t>
          </li>
          <li>
            <t>Feedback from the WG</t>
          </li>
        </ul>
        <t>-06</t>
        <ul spacing="normal">
          <li>
            <t>Solution for ML-KEM: FATT analysis</t>
          </li>
          <li>
            <t>Solution for FATT contact: new mailing list</t>
          </li>
          <li>
            <t>Replaced responsibilities by expected contributions</t>
          </li>
          <li>
            <t>Clarified Verifier even further that it is just a WG member; no formal role</t>
          </li>
          <li>
            <t>s/pure/non-hybrid</t>
          </li>
        </ul>
        <t>-05</t>
        <ul spacing="normal">
          <li>
            <t>Removed process-related stuff</t>
          </li>
          <li>
            <t>Moved discussion at meeting to solutions</t>
          </li>
          <li>
            <t>Added ML-KEM</t>
          </li>
        </ul>
        <t>-04</t>
        <ul spacing="normal">
          <li>
            <t>Extended threat model <xref target="sec-th-model"/></t>
          </li>
          <li>
            <t>Helpful discussions on formal analysis in meetings in <xref target="sec-discuss-meetings"/></t>
          </li>
          <li>
            <t>Pointer to formal analysis and costs in <xref target="sec-ml-kem"/></t>
          </li>
        </ul>
        <t>-03</t>
        <ul spacing="normal">
          <li>
            <t>Limitations of formal analysis in security considerations</t>
          </li>
          <li>
            <t>Proposed solutions section</t>
          </li>
          <li>
            <t>More guidance for authors: Threat Model and Informal Security Goals</t>
          </li>
        </ul>
        <t>-02</t>
        <ul spacing="normal">
          <li>
            <t>Added document structure</t>
          </li>
          <li>
            <t>FATT-bypass by Other TLS-related WGs</t>
          </li>
          <li>
            <t>FATT process not being followed</t>
          </li>
        </ul>
        <t>-01</t>
        <ul spacing="normal">
          <li>
            <t>Pain points of Verifier <xref target="sec-prot-diagram"/></t>
          </li>
          <li>
            <t>Small adjustment of phrasing</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We thankfully acknowledge the following for their valuable input:</t>
      <ul spacing="normal">
        <li>
          <t>Eric Rescorla for review of -02, -05, and -06.</t>
        </li>
        <li>
          <t>John Mattsson for proposing text for security considerations.</t>
        </li>
        <li>
          <t>S. Moonesamy for identifying the 'no response' risk in the proposal for new list.</t>
        </li>
        <li>
          <t>David Benjamin for review of -06.</t>
        </li>
      </ul>
      <t>The research work is funded by German Research Foundation ("Deutsche Forschungsgemeinschaft.")</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA6Vd63LbRpb+z6foYX5YYpGUJTuJo+yOR5EsW2PJdix5NN7U
lgsEmiQiEOCgAdGclOdZ9ln2yfZ855xuACTlTGrnx1gkgb6c63cu3RmNRr0q
rTJ7bPovPlc2d2mRO1MV5uby2pyf3NyYd2URW+f6vTiq7Kwo18cmzadFr5cU
cR4t6M2kjKbVqHbRIhpVmRtNo6oaWT/a6PH3PVdPFqnDp2q9pDcuXtycG/ON
iTJX0Mxpntilpf/Lq/7Q9G2SVkWZRhk+XJz8RP8UJf31/ua838vrxcSWx72E
VnPci2m1NE3tjk1V1rZ3f2ye9KLSRjTqtY3rMq3W/d6qKO9mZVEv6dubMsrd
sigrcxmtbWmap+5tXtOQxvz+o8bIPvq3NHKaz8xLvILvF1Ga0fdEhr+ktpqO
i3KGr6MyntPX86pauuODAzyFr9J7O/aPHeCLg0lZrJw9oPcP8N4sreb1hN5c
1PNosYgSJbOLyiQqD7apjZcyIo2r2tPtenksY4/TYscwB1/n6XheLbJ+rxfV
1bwgZpgRTWvMtM4yEYn+lU5pPmAIc81T9vkp2muUp/+MKhro2Nx8MGeldcR7
/tEqAf2SP/ESxrLkv1T1KJGHx4ml+fOiXNA498w2ktgRJPaYBzJhbfo/mlYF
D6J9+1J+UOHflHb9MSpnlgjp6agUi4sFSLaaBcLJ4yyS5q91bs3R46Nvez3o
SWuBF6Mz5jYTtJzGz54+/W6SOv/TtHCOnuVfaUxiIZNo9PgZnnh/fvr08PEh
P3w2Oi1TJ2+GLfQvoD8knkZ+JC01p0U+TfnrKKMPi2VdkbQem3MsKzMneZSt
8WgxNSc8o01ACuGTbOdNcW+hcbylYW8XWVar1Zi4YiHAM3ppnNvqYFlPsjTm
HRw8+eHZsyc/HD49/OTX+EnW+CnNP7XX+Cms8ZMs8ZNf4qdi+skv8RMtsbfN
4hHtmOzA1dh8GKvAbf1yVdRE1mnU/eFmbE7qMvIsKolF8bScjeJyvayKWRkt
5+uRW9o4neqWttj57Pvvn+zgJRGF1CYqs3WXpY+3Blhkd3bhv11F+Yy/dba8
T2M7iqbTNCe6qSQcPT18tjXCMrojMeuNRiMTTVxVRnHV693Mib1kqesFUdhE
y2WWWuJ3nq1h5HNaS1Wm9xAP25h/Egci8dCs5mk8N6X9R52W1kxFaCLlyNhc
VGZZFsvC0YjV3Co7nBFKrU1E35IprsyiSCxeTIxqRGac2lIzK8gJQFYxgrew
EFxHQlEyuRyexh9DEzmzslmGfxcF6RX/ziNHWEtVxEVmkjQini38oGzKxr1b
y+7GTMrUTmn7S4gsaGKmdmWWET29LNK84u3jvcrSGEkB846PG9tX4hCxV9ZM
LJH13uKTp1ZpwTF9dylWhbgzgIW5p63xcmVbJprR7K5iCzSarJeRc2ayNgW9
WrJZKy1sekJWy9EIRJyKmIvB8QZ9c3U5ev3iiv74QE60JCnLEz91sSQG4QMT
mh55b8mnkdc0K7JmtGnikCvyaJLRjtMF7ZNIZ0WMFmmSZPT3N+Yir8oiqXm5
vdt5iodp8GA2dYPmt9+8Ff7yhXxheeeIviSC8Oexieck1xZ8icj32Xssa57O
5qalaPQYbZ+0MacBQYWKHqiIX8QaO4NA0EvKi4UlgUuC9KzUGbP/Nnu3L/f9
uob8O8lWCY53VjwnUXLFAvwATWMaNksXqSgqCflLMt60XsMsoL9pJY7mzogz
G6sgt7CooaRDFUiyVXZpMlJ/FgSankSkJcH3tlybrFiZuC3tED9yepM0gyLo
1uxnomFr50EKq6LIeHttNQ9ayRtzRVZXHtYtyEjwiB0iOFjFlIVg3Otde0uX
Zevhbj4nBY2eF5Up6ipLcxkyIUPidAdb2kK8ITWpVtbmHWMBUuHz7UsiJByN
e1jnfuQvM1jS0tCgpB6WdJs+kLZZYm6CLUZijfp/syXtwpZ9DAMaEyNTS2I1
NhtWMV0wbZRsm1SDntA2DTkmZkGUe1tJ7JzUJfkuMqjGpqyuy6is1kTEExKa
ciYTsIelN7zNoXVCsFtUqOZkJmlg0jNbkvscncFo4cUV2UO8ij3gjXSxzCxG
JUqNDRk15qgj61MSpeKixi8jP7XQiO3Oe/XQVonemEvr0lnOX5dqI0ka7uy8
yGBMwE1Xk6nrOECo+r/rLL98GdP8L6BH7dXTykn8U8hjYepguHiXwT3ghTDl
xBIViOYkcQn0kIAIc4TeDwObtMJst8SNLTlXPWnzJc7YO5Oe3UdZmkA0rPGS
wyuElE8smNNa/HjTs6oeiOjFBckirCxbYbF6jZWiMbtsFsJTRCEq51k+7p0r
zzekgrZLC6qdJbwd5GJDVR40CSxpaUUKWWcJxpnbbPmVgUw6bbwotAiGwtFT
NchDe0oru6DpgPuzNUta45mH9KmLAvDNAyCAzSa/sOXJ9377jZ4d4fuRfvfl
yz4x4QU5ElI+qz6blDeFNaPIoUz/aYE3jLxK/BipspE4mvO6qonmpDQB8Qi9
eJerlAx0msdZnYCZeVzaCjY4ggA4TPuZ5BtqDHqU6UQthQKHID5g60OLudeH
oBy9b74hZOqJ1jsRqSTykDEJPsHunlP4CCYaBMjmw/nV+5cQEQKA6bap9Wtz
fnQrSND7hbQ0xSrfmAOjbUsGrfuK1JHig3LYBkEsYeK0ljSbZUcek/7wIkmJ
CABt+yDRPAiCYbfWiC5bPQ4QaOGJmUVLscnbnBmSwLi4dpByGHJseEGcZq0i
OCa2ZUIwnLWQ9rOiMEHofx0XS9vDGhz+aiTCLyNV2Pz/wszAUqfsiYSyWOEZ
I0X+3OMF3Nk1/CVBiv7Vh+sbZEHwr3nzlv9+/+LnDxfvX5zh7+tXJ5eX4Y+e
PnH96u2Hy7Pmr+bN07dXVy/enMnL9K3pfNXrX5187At86b99d3Px9s3JZV8M
V8dhllaNEEBZuQQTCPC4HrmSmMRGZP2n03f/+z+HT0nm/4SQ5fDwB8KE8uHZ
4fdP6cNqbnOZjSkrH4lF6x4FKtAAIEVSxThaEiBjC0FyO4eAwq0RNQe/gDL/
fWz+YxIvD5/+Wb/Ahjtfepp1vmSabX+z9bIQccdXO6YJ1Ox8v0Hp7npPPnY+
e7q3vvyP54yxRofPnv+5x9L6zlvIM7GGvd+OzTebJtJ86fUucvVIxKjP1ZZU
E0W3xvKOXp2Zeo6kC9KhUghL7H1EAuFdHEFgMioCw9iNw6GTijGADFZdkcN2
JgSWmd0qHDMpt12q7jpC5BnJgw4bVnzFgSXbVc2PYIhXxcqKUeJApfWbyFlp
AdVtTgqmlHJswDwMD9+qkJN1kvSEWApvQoW2HWJ2rD9j0mA8B4MG4Q4GD2Pc
ce8NxYXBTdPwgwGJzwB+MadAVR8vi8x6REEDeyPKC2wMiiZ2oviO8CgF5ItJ
OqvhcCkcmxHel5CiLBYS8Lb99Fe99C6pST25PBnZJAA3RbyCMdu24ItKy+Qq
GdINDXkJQhTRTGRnwnES2ZU4dfJn4VzK0ckWPvOoneVbkX4rmiKgrXMe3LJf
JBchdCDfh7yyfz8iD/HZc8svmcz1O7jRdyEzELgfNI5+H2nmgBTuPFBzVcA/
lIQYHRIDG1KvCSOxgmRP38Nt3QmwXUqKIGHjB1cimbk0pxBEfAZJ6wpvSdhe
mJllaSEOFjXF03vsHyPzC4eqqp7/vff76eeF46TmwXe3d8+Oip9eJt8dljev
j56czaYfJ9//tHj/+upgfz+ERFG+3hGR6lYfzmeGTW++W5LeRhlt9b7OKCKR
IBiGiEb0SU96GRQgDFVnQhWE2gpmjPAYzOMURQopKohIC83UBDgmtm076xNk
a+UjiDngAOsjbESUS2rHthM7JCiN1tJTcJCIGxDUcazvrEYqHht5PZhH93i0
vRJGQmvNDlB4RALBTzXojLYi9gHCIFkiEhwNk5o5fLCeW5s4TmFg3bBUY+9E
OBP1rslEnezORL3dmYna+AxOIPpN45ptNUMw4TNWU1qNfgOilTw878Is0rxg
IzMaKfIOCSwi9d71i5Mbg4TOBgE5fZOQoc2hLnMK5G02hcFoYgJyHp9FyXMO
iGkCDxHYzmQZuYskYGDvytQQdBzXxK4LKJ/SnvAtxaYpklN+FLHIxCYappQ4
8WIKhyMfsScfTjPFyLpHE041gM11Ht0XaQKlHmi6lGMQ1wGdX1nhEEaAd8eO
jraXgBCSIyEzbSVEDqItHFCny1HPEiqooJuQVlmN4rSMyWcQa+kl2FfIxthc
TL3vCbkgllJQ2spDIw7uQ+yt7IbNVpsmAQDNmJJj0+D+9uXl6ZhxC08/NAg0
GQyUFGsihfqvf/2rd0sseKT4BEoTqBpt56oAKzWXCqmFBjuE8kQfEXBvJvhp
LwcA4S6e26QmQ0IwxwbCP+cVcHCugcdww+I9mPXnpOgdkevh0YdmQl74Tvam
Yu+liWXCfwfJJ8OhJnSL3qLim6nikzimwEJzJg9mbofyEyvmI0kPcTb8Ebti
WgdDKhQhaEN7kjGy1vwCQjZeJolo3yVZYlKD4GUIKx2AHiyIIzLtsxFRRuYY
YQ43Onr8+PDw6OiQHM1YAqLOQsmIkCbEldtMG5Ji28/AjCylg4GaWEJOe1jd
tOHX5kp/3x8uPy5+vbnJPiaHh+f5r8nH4u3ld++Tl3eP3R0tk2ZmEBU31A7h
bUJhYEwmYiwJoxgQyzIsqvNfa6dBrUsJ6bJdbAxmx0XQ84MBbS+rkXYEGoy9
uLI+cnmjnNXqg7pk6RrU4OHoF9IxpA+kMNIxhrqXZiMTG0e1C1Z1WuBZjCkF
BClunD+QEue0DGMRRi9SeWC9U4TS5M7Vb8BEJcif3+XFiiDBzHqXAedK0TW5
W07UWwTw0Mhr0X8vH0xM3l2wTRNNPtMAadfb9xhNsctWwvl9qtVi0AuY8k9P
RkKRmhXr4ccpGddNuvEjTDwIX5SglDc2P1nOIus8vY15Yg15GOp1s0kViUxu
wfaIoAFwbILoi0DzWEzSgHMoU3L3E1I7ABGSPYs0dSGRQpY69lzEMszR0A9F
JeaAYghyNDA6aenECjiywjFzYJG6ul1kkqA8rdgeRRmNnACvUPye26TxNDqY
h1+eiMgfiPXu30T4JWcj1gcloR3h6/7Yb69duJFQYTBgAVfFoLFa0r+aFyww
cG5q9jgNNSH0Sr7xUSWViTTfrOb4grZUk2BO39ZlEwz78oCmTeFA2A9J3V3S
fCoK3CGgab5vzDnZGqQeaZmnWo/yPQeIKKb0M4L4GLHElu0jb0V2Egzpy/c8
J1lkUsB+t/imPj8plljmuBeC4ppC2cxsvc585uFpdyyuItzDRgABeXwonEli
vGUwqii74/ILxQQAHUQGsUydeDZmjVxYsmfkOBaFq/YlKz5HQJulU8tFyKKV
dB73TlrFOW/CU9GOdyevX2jWdiPAQjkcVG+qlfxsKFIDCyGMgLxivwAeWPTC
Wrbgh0ffDuFghVJCI8gcG5Eoz4uaMEliFI76VXPbg5uLfPuEsmZ4pUjr48ZF
NrqznKORFcrPm7vgtgBiZ1YUhAnYwbNekAQoHuwTk5NUyuOshjBUWvb1SNuX
h/biaGyOvsU2Aas6irzfVhvNLGSRqwSRodIEL3oUQnEjkiV2HzgjzeF9AF6r
YukzsZIbJcRVT35FjHGPECpDhODXRkHdHRmRmEQBVYsySmwxndKftorHkm24
gx+Y1FJGpVWSaSlna5R5zgqp1lH8Ms9ZPkIsWbsdleI9AYnE/vViUmQoNucJ
p61qAWlRtu/j6Qi2fJpyA482GdDCoFQmIBiWnJAg6WQeNFOyKNT8Eq4Evo3p
SV4o7I5ydL6elGnCogntEhtMQnPbTqpLtEzTxxC+CgaqyO595dXRBixzqf2G
lkoHhLkHbPfUVW489sAGwJ0HxJFMao8CxXo6pQAIAaUJ7RU6bhvai9KzC4aB
4cJgTpiop8UACnSqYQulwDhji+qffKSz5Iwa6glYmRDNDdn7LotKu5xS5yi0
oJlnkQBdKNUklVIciTWZSAZLPliRREtrWY3/TOrS+ykkc6AHrsku9sR8ITRT
e6URuffgtNpMKjaqTfUy4VhZ+hsfuZ6Wn9R7/2H/Qs+oFWm8y0Zj1x4aFEdI
UJUFhX/O7bf27mvRxQRtRiLljGNhG4p8xinKoChBSLyG9fbi6bjdLNFamXg/
9+XLvuoh+Tj2Ix6JAHLjeyASkfQWeqVxZtDxKCPjcjg2V+msbC3vxenZqxfs
yUVvUtepF0OiJMlxtPWqvlEVmprOwDy1vO1hSHxALVFDUPYb80pefffzwY0U
vtS2+B4JCXzp3XnzoMfXKmdN/NoaLMxLApJn8PITClZ1k5BtXR5QzKQs7qyX
Fx2D+Vjek8zzK5qfTcjY+RclCatOgqRjSiJalGNzjV6JHpFg1s2YcC6Xy948
nWzPrV0lv8hix+aine4hc831/WlDzR7MKjkDZDZ2jFRaqSR3DJCEwrQM3stY
Sf+GQsRAVVIUESEJ6SlqTobtRHrgQ95+y7PANTzojLrNhUYqOlS/mG79Mmwh
mIZM/i3ZwilXRlICEb1LCu/RL8BvCZuRDmjLJ8sF+LguavVFW/I6NqfSuzBs
9KDXaI54G9nS0O9JZqPFoVO34Uqaa9kyjlBBr2gy5IKmJNyuh0rmfZRxUmiH
2nBvthq4+XoJpoh/c7HNacdFSNmVVhKWTR+FlLsn9cwPIOuDVOmCgPLKdDbj
agLntNKc3bWCG9VO0z8lU9zvyT8NTGvZuFYApA1CrQZCGFnlqvge07gaDLa2
1caA47YPZewi+TNpZGfEo5hLtE3S9lLQkeC1QURc1GBm2VBzijhrq0AciJXz
+q6qk/WOdpk+VjDuS21wuwfwre8BfMk9gO06DM+yOaDHtJG720qLS4Y/FNNp
F1XGHS85QxO0mDQpjJA5RdIPoY1mQWBfoqou2U8yVG28PLcA6Kx+lU3Ce6gx
9n0K3mgGqJ3xlvlogllRkKvNmW5KUwRDNjlQjB4SBx9EOTaKdwu2ThopTwsC
syJG8dzG3GYoW0d5YtgL4p2lFehBClPbHX1w3oh0TadA2GKZxgoIaXYETa3k
oTCKddqXxTb6sXx+pl3ycVBOX/Wz0nHF2c2IINGMYONUpZwo8YsURSvUnf9M
wEHxXNctV602yk5vZatjzHANkfSsnaEAbRQkZprRIufItWLP8CV3mPqe0NE/
CEXBJXS3Od5nGQ9NrLeSSnrfNLHeIBI75yZWstVegpLCKGhGW5aXNc/uR1BK
InXo90ul5XNHZyyFENFam4ZX1hKE92h1QTHQ3O1vVIF9C9myLgmYblW8RNDT
MgSKm3y4aamE3wz9ud0oSFsaj5k8AFuiUte+iRES5xGAbB5JtoW0oTBC5Q4D
5TCKAGlRt/quV6EPoJv8O96ZZfYhbjsBgkAXlvraV+ouYYp9PYGtI2nylcSf
DAj9hJwylZSZHCrogEfiR4HoTj6jiUnPZOzz4O0w1LefctOKlFRbIS9WIAkL
EGsrPBa2EoKIJKMKC11XZEVInvGFNNu21jEYiFtGsb9JoZOzHdvxUJKl2His
kTMzsOaKGVGHXAc3wnhlQ3HIWd+jl5ayhzwKmVPN2+314wyc7+832TIRBfF8
AQT6mpXzNOUCAsfWM1JXjm33+oSk8r4QstEPEKoh60a+TfnpQfO7EJe9gf2i
Z/08L8I8vW3htK3pQnsCveR7FDGIFinYSEmFk16V1Tdpx9uXTOmTipOEKVYy
GHRi0z1Jp3SyZfs6NnSXbdXGakITQ9PLHfrqxua81UiJhFvXu5IQVsJcs3U6
AnICi7jZcYFMiPdhWvB3NYEi52FStCQ+R4KX0N42cjUndsNaJBEwlEF4Aa0l
cT1z0zCFIRkSFOJTJ5y6XmZRTkbjoCObidkj8B/l633Oy0joPBgQUHiA5K16
31fozRUR9e7BpnLRl+wWUYa9A4szgGELfpCxsLYcyZS0utZ5JB/eANVF96j9
oLOknTux8N9idKDVQLs2c/YRKhocxvH75B7WDH9pfQTFkVoX+Zbc9FwOX5SV
VEBaKdL2Zjhpp9ARlk4t7IS7N+N1nPmeXTYH/KB0AxTwjAI108qHGWdiaQTn
ER8GgwWJvYZFnEIWYDAYHPtTD8DAtmMnm05kyeMHw9luJMU+f5TsFoeM6J8X
S5J5w17x+ckIAGM9Nq+RxCOzVUYjNXxtw+XXIbUEACUsfhJlEWdZkSzLiijB
ukF6dHznSi6SOWLQIxceAkkigG/UjO45YccNURZp3LRgM8QOnV15O+cMRvtu
rv1j82shR3h82eSe3Cl5tHL9o2n1d9Na+IFGaNuP8j4Aejo99RMK0qZphe3g
+GopuKjzyJ4YOaX5sGVkh1pN2ffDdPruNuCZCsZP8uQ2EGjxKAB3rhCBta4D
+DaLlHKKbEelMtQpN6qUjCPgIu9CxqRwUcbqQqYyrYLyPkCvY5HpU94+WRWE
xiV0dqoF2Kgs1+DJAkUy4F9O5HF9jhRxHiRZK3ri7zEk/pIBkca6R2aVogc9
GtDppsF7WnsiUInIAc1CKCKhEwaJM7Nnx7PxsIkUAPURBrqO0ZOJL3aBEd1a
pNXjUFRkv8Zt1ZVqyId8J5rRAXR1eYF4QUNgFBo56yZtRmiH4IXKJkWFtRjO
vT9SBtNcOlC74nGtukghda2lVj3O4c3Re+T2wTMA/7ip5HI/UCrR5aPBgONt
BfTMR+HGo3bbN61eVo3OkFpzFaIWvAVfgGASpZX4QfNrnSiYmUQav+G3DrIL
waZ3BQjikAOvucWYN/IWZvBnr+C93tslWQYBP75VIiT2fWU7iDfJNKeqOOnA
R+q4qMj1hFYOE7qyrLyDZ1hLD3B5bKHp3UsbJXpOWQpSYImib0bd5IaSALdv
OqtoaodIBWS2U9jig4udI1RbU6F/bl54JCZn7NrY2RsBzw3IK5bn81FkHkuK
lfnYKJ7hog7F64rtGYDFJNh8aoHs8dD4Wg2sMgdXSoXrqoZcuIP2kSblhMQe
9ECgwhVCUc8n2a4cuBEoF0eJXaTR2AtSpzVJIXnTeef81GVrarEErRRku93f
1/2OZcT3jEdChNSk8LkQqKl5n1hu9X62aujs+wBlqx0n+UDx3TWbce96u0fn
9ztfytNsVt4ujub5/MX13199/va7D88u8snq55/dwT4z/g8P+X3263fTjycr
e/XT6s3V53Nbvsm+/zz/+Hh5d7CvPA4nbC71+GQ737Z58DLKQ4a9leaWHMxX
CnQbp35QFC2Rv+AWsDSv/PmZrx1R1aaUsbnmhNTKho7OWU1xLtlmKxhWTIAk
OBnFcZuXdwg+l4rcK2cBGX4TKGImq3xpEnBjJeE4NsK9VxEqAZV5U6yGBAb5
UXPJfmnv1Zuzy33tbA4nwe0/pFjFcYyeCFeT5NPMJwnqVGg5Ef1ABxl7aMIO
qP9p6CJzAcyi324zR272pNV6QvZtrXlQ3y0iT/zI5gU+wj3f56DNCZbQFru0
ag4RSePU2gfW8bxIYzgDbzE2qoWQAS0XjnsXrXHUv6xxHMg1aXBdPB5jLoWX
ONjsvsmEgPcgiVhIRVzci47VKg2B3gA0Y92cCecn0CrnC3xbBzb8IQq9MmNo
LtHHoB2A3N+5Gbthvy/OXr09Hb27fi0eEfvZ+4VI8u8qakbo6+Do7y/fXvzw
9nS1zv76YXp9Grn7+9XV0fnfFyvuziMEctqunQ+aNXBx8Jfr4nUzoSV5zqtx
GsUlz3X0+PCHg8MnPzwZL5Mpd9FJrZDPNAdenrK4S/EQHWusHowzOhm6EK9y
FoAhdVD7oqnZ5HJKyw+uheHWEbDgSIwxA4LNknP1rb5Grn4w/KPvA67ah8bw
7vPuI+jqx0+JHPbkTG47HpYYfP28d9bKqiiIwClnDsK0fP0L17fN4Q8NWR+8
leRAauEHhz/s68GQZnxa1pU0ugRfpCHgSBtg+DQDp6vPN8SLuMARvDAh9xcV
cGicoIBXLBlySVosynsCp9L7LogOSRtu4fIFaj5ij5yZrEZ7yHoKO/b4xaLS
JhiBHH/a30iOhIPcXP3qhaPcmn1H3dNH7JJ6R/inpVrtgoyjVuE+UKSbUZSI
UcrkW8dvacOC+chs8GIZ8/KhBSdd4e3ICXjk4asmgACdpZDEDXce3QVig2Xy
V1p0graKz7lsn8hvWp0296X94MjGcCVK8aLLUmYwH/GT3C/ZMa92SAEdN90C
fA6nZRmQjkQSSR7z3QDDjnYjzSUXZHhrieqH1moUzkoCBBbYA1EOM3EOxbdt
MBhFH73KZXPkVShMGJcMNMyunSIqVKsTWkhw3iziggyZIS4wMsT2x2H5TJWw
LahO63Sx79tr+mO7Z2kjsSYCbkJuU18+1uJGlHXOA7eEJLwqYs6YRySLS76h
oqkxDcele5xyboXcCG39yVUFMPsbJ6vg7dCNZFADbDIbctKeD/Bq0olkhbOY
fBQvEKSajyStSdQ46SY6Q0zngofEr7I9EkqxpD7Tu3FLATctACRp33LuVrad
m4ZJYrm85QsVtAwZR8vmKJGP9jyqeS7P6oab70lanvNAgtyIbBVqUnlVL3Yu
+bmfFSPNCrMqizwUtqUt4LkX8e7q2noiPWOWnM6aO7zQdutaoak/nxZWL3D5
RlJ25qwgRDH6GBXNE6C//tpNOAOw+AxPhujwgQGGDMwANtA1IOJMDCm0RrGR
yEN+MbcZ34CxbsPxqAUjW+xgbW1hp8YMt47XsBFLNDRoagq3hM1ypDiYq6cd
XPyuRGMSkhhIeWkQyuaTTWXnvoame2zVGZF31xl1GUaVnHeTGxK1CuLaXJVG
oYycTveneVg+MRFoOiei5rFkFfTbs5RQtR29IkS+QJvs2at9bUL2T1hpnwil
SlexrJ298s8xnV7btROjqWU8T9twPxMx6M6uXVdIffYKfUEjctwLecYfpkKr
UbnPBbCNkk3nsG/7gAuHJoSiKs0qM8tLio8mfNZRO3szvjeHV+RdDzSDLGQq
1QU2YhOc3bVfUQhAHVQ9EFroJTqd8mXi72Wy8FqYzF8BEjEhrpVWT8eH2v/Y
HDykWCjjsptcBDRs7pACmpfUTSg9NQ7Awv5b8bJ+VhaCN1xPRoDKbnPfE5l+
hx+sS15x58s9qVAxHVF4liiHKUlwq2kq0OP0/KbNk9A8COwkzT9VWSOzsE/G
CFbYFdNqpfasJQzc1R+SuLqO54xfGBgzvkEMIoLhTaImUEO77SK04XHaTovk
LFgSoMvLjfInct9Rzb6fpQ0HZqSVAZVpCtjE/Vz4Y8rh7jApfrzOhfiMwNFG
tYrygNanaQnsV1mCEQXugGhdSEV+zbxC2PjgEegQPciVVHLjU6d3d4jjIG6e
c3sEV++ananlCbajW8kfe2T40Nz+aCkpcYaTsmgk2znSUKNsF02t5PRg75te
mWY46fYiM8S3jniFEtCBxhA1H9qQ4POvEbNyuGNmv1m9Oad7HrxpuA9nE2Ae
nF9Q7OnEXWDB6jyQwBEPdIIAKUk/o/vBW1tWsAvPID65IjUB83cOwp3vieMI
AHbgI/fvkH21HKHvidMJTTLkh/a/PiDtzjdTdgfVq95k3HMvGf/emqAd/tN/
dVd4zVrDYLQRvT8+EOcFvdn7dofZ86fqt67B2XURxcmO+yREHLyd1a4TlXKu
yXcPeXVwn5i0dEnaC11i16RFb79vX7VgcwKBxmjBLe0cyR/b4CukNuckMx/y
Ttx2s72lJs361VPuwntpMcd5GDJetLxvpVG67VgQZJz561WuyTTHqD60zq5I
sAy/KPIoZrPwR9Dcwy06XPmQO9os7YhkeihOKupsUnbz4MWTX74cS1zjB5E+
2oF5ETlRZyg2Wnc6X3HxvfvlRhxKo749e3vsD0O1koPcQ4ZDGMu159Av5BAS
TrvyPbF/JOl8Ob145Q7f/m119vp2cVafvvj8ePls9W70+h3y2BtGD/UqjjQJ
4xBiqGh0Bgc5UnL+0ijvf1o3I3LO551eOBAOiRyb62jdampvOhr83QQoFfC7
50GuvsKJjduWUr2t1uvZgOzuIFxfdXpycw2BRo2crMI0WhAmivR6A/zYuCYd
xsOqVofIupCzCVisRn0EDNO8yIrZWlZ+JpciAMEBNArSYLAlso9bf+SWF750
g/EITSIhumbGOBxuukeT5h6TVPD25lVZoWtmlptSIygr67m1zSlHHLEpVnLF
hsbIzeU2XV6pau68qWNsPkh7NMM9x6qjfHvFVWt/tEyD0wR3FbuQIdZD7LrN
25etEy9KeT0PrIZc77hawNFLFdnf6efLbWL9Qp7by8Fqvm5dLIhqexMx+ysB
NHLQU6d7rVO5aKh3c3IN+39MJkP9T048ECxh6ZJ6Pl/xENgWcR6I8UPwIhvH
Xvb4OEIZutjZ3+8HBWvnBIRQmyb6mO9IQfpDXc2Ozkvs/nD8pOlXyNZj8y7j
rhJfwmz3/6DYzaogBSO5+4KBsTS+di3D9W7QogF7KxSXb852Nn9RGO3rU5w7
5ZQpw6XdzWJaW5IoKdgZGSCcTBKwqy78G73dY+eViwdba9/KhW1diNO+3U6O
N25c+ZnYOPPJDyVZFxnuuMuwlZqq+AYFHnDCiSi+FmeI2i5edLu4LadiJiVn
O1uZWOkP6Vr/1pWkY/OTbxvgBzoLut91C5Gc8QrB0u9caAwJLzz1O3cIbkYF
223ByNAWmoXHaVwWDUYEccF3PLSsSNu3cYfwA+tq6tJ6gMtnM+VwS/suPKI9
Ig9OBnKf3G5pp5Vfcpkga0Uy9E6BE55bKWm9Yg8AWlIa3A7mOgkiOVRJaiMV
T0kXpu2uNT02OAyMlIRXuKfEn6FPM85F8U2Q8BUjMhcZ/MkyK9a8TznB9Jkj
vO6pFY8KhgbJam/VsHe+dxHyCOuVOm7J16Mw0hzaLl03VpnTSZHTKXmeUlIl
fM7a8XGDtKolmS9CEwinw0my+uLkzckmXzduK9W7Q/jJKPaM4jufoRAYxcdU
JBJ1Lv/RBZt8kTKSH+YVX+y83nwE/8UHBDrNSfeNnjRxsuGo+5cvCGa0s6Jp
qeHDhL6Tg5/5WvuLPB/6X/j5c18SaPUQY5uPv8P6rttHLDtNGgGbbjwUGrZp
vmO+ja3dic537BI2jvlYObczpSHNOVk/cIEnDk+TNZQmp2Dj+DDdtC59Dcnf
Badnv0Oj14+tK2BwJRyN5g6WRPWDppCPDX8rNwAv+LCtciHc3UREnk5xizj/
mnSKhP40PNpNw2GCgTlJENLoiXYa/ymHAsh5Jtys0sozy4lQXxBgvrzSutXG
GfGvVajC0dLNKiUPyNezSefGVh8zn+92VWsIf2YWC3+ChV+2zrDurpQ9YN20
WtWBLsG4M0VJ/kPMwkkPLfR0yia8yIcSWbTIo14geVBhF4LEwb93W9eg2ygk
yRkpXcolDpjpkG+o796KFoRy1yW8UBG51yWBbC70No/lvIxQVWNLEhr/GL2S
tfC24j/7U9qh7X9Bcw8yiXeSmtxsFWxi2eYABHdoTzJ1/xKK4o7595Y8QplF
rQAUCyIiDun/vhWnQBYACZS/FvPcXJG1cN6YiBtngffXCT7o2Gjn+A9KEDik
UECAi+8K8YXcR63OxkfS8dipGERy7TIsiRyEpjgquk8TtOv+SpFavrWL7/RK
pHA9iVxfgtoMqx6x/yWFX1Ee7vsml4Nypx4PObOElWJ0jZEUxvOaNAgNkmlO
HwA0+vu9/wMgMoA5FGgAAA==

-->

</rfc>
