<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.6 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-lear-iotops-deep-thoughts-on-onboarding-00" category="info">

  <front>
    <title abbrev="Network Onboarding Challenges">Deep Thoughts on Network Onboarding Challenges</title>

    <author initials="E." surname="Lear" fullname="Eliot Lear">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>Richtistrasse 7</street>
          <city>Wallisellen</city>
          <code>CH-8304</code>
          <country>Switzerland</country>
        </postal>
        <phone>+41 44 878 9200</phone>
        <email>lear@cisco.com</email>
      </address>
    </author>

    <date year="2021" month="March" day="09"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>With various onboarding methods being built out, one aspect that has
been overlooked is the trust relationship between the deployment and
the manufacturer.  This document asks questions about how that trust
should be established, and how it can be leveraged.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">
<t>A number of network onboarding technologies are currently beginning to mature
in the market place.  The questions they all seek to answer are these:</t>

<t><list style="symbols">
  <t>How does the device know that it should join a particular network?</t>
  <t>How does the network know that it should trust a particular device?</t>
</list></t>

<t>Let’s examine two protocols to understand how these questions are
answered and what questions may also be interesting to ask.  We will
begin with looking at the Wifi Alliance’s Device Provisioning
Protocol, and then take a gander at Bootstrapping Remote Secure Key
Infrastructure
(BRSKI)<xref target="I-D.ietf-anima-bootstrapping-keyinfra"/>, with a quick
review of the operation model of each.  We focus our attention to zero
touch provisioning.</t>

<t>Zero touch provisioning in this context means that the device receives
network credentials that it will use to bidirectionally authenticate
with an appropriate network without any human direction or validation
at the time that the device is first powered at the deployment.</t>

<section anchor="device-provisioning-protocol" title="Device Provisioning Protocol">
<t>As is described in its specification, Device Provisioning Protocol or
DPP makes use of a public/private key pair.  The private key is stored in
the device, and the public key is provided to the user out of band.</t>

<t>In the current specification, either side may initiate communciation,
but for battery saving reasons, it is generally preferred that the
endpoint initiate, and thus be in a position to disable its
transceiver at other times.</t>

<t>Several validations then take place.  The network is able to prove to
the endpoint that it has the correct public key, and the device is
able to prove to the network that it has the correct private key.
Thus, mutual authentication has taken place.  The next exchange allows
for appropriate credentials to be provisioned in the device, such as a
trust anchor or an SAE password.</t>

<t>As previously mentioned, the public key is provided to the user out of
band.  In this sense, the public key is effectively a password, in
that anyone who holds it may onboard the device.  If the user would
ned to scan the public key from a QR code or via OCR, we would not
call such a step “hands free”.  If the user needs to agree to
onboarding a device at the time it is enabled, then here again we
would not call this “hands free”.</t>

<t>This leaves one additional possibility: communication of the public
key via electronic means for the device having been deployed.
The DPP standard doesn’t discuss this method.  This may provide a
means for zero-touch deployment.  In this context, we might consider
the device that receives and stores public keys a form of a registrar.</t>

<t>While Internet connectivity is not required for DPP to function on its
own, transmission of an public key would require some connectivity at
some point.</t>

<t>The assumed endstate in all of this is that the device will be able to
authenticate to the network without the Internet being available.
While this may not be important in some cases, such as with devices
whose applications require Internet availability to function, it would
will be critical for other cases, such as disconnected environments
with critical control functions.</t>

</section>
<section anchor="bootstrapping-remote-key-infratructure-brski" title="Bootstrapping Remote Key Infratructure (BRSKI)">

<t>BRSKI’s flow is somewhat different.  In this case, the endpoint sends
a voucher request to a registrar in the local deployment, who adorns
the request with is public key information.  This request is then
forwarded to the device’s manufacturer, who can take whatever choices
it will to determine whether the device belongs in a particular local
deployment.  Those choices include:</t>

<t><list style="symbols">
  <t>Nothing.  It can just sign the voucher request, logging the request.</t>
  <t>Validation that a particular device belongs in a particular
deployment.</t>
</list></t>

<t>The first step is problematic for wireless deployments because a
device would simply join the first network it heard, if it could
authenticate, and there is no reason to believe that the first network
would be the correct network.</t>

<t>The second step is not standardized.  It is possible that an
out-of-band introduction is taking place on the first transaction, but
that would not be a zero-touch flow.</t>

<t>At some point, the deployment must also assign establish that the
device belongs on its network.  This too is not specified by the
standard.</t>

</section>
</section>
<section anchor="discussion" title="Discussion">
<t>In the case of both BRSKI and DPP, once the device is onboarded by the
network, no Internet connectivity is required.  This is important, as
a matter of resiliency.</t>

<t>BRSKI and DPP barely differ the gaps they have to get to zero-touch
provisioning.  In BRSKI’s case, it’s about establishing trust between
the registrar and the manufacturer, a one time affair, and then then
later the registrar having some reason to believe that particular
device belongs within a deployment.  In the case of DPP, once one
decides that keys are going to be delivered in advance, whatever
service receives them has to have been introduced to the service
sending them.</t>

<t>One could perhaps envision a system in which credentials are
transmitted at time of sale to a registrar.  In the case of BRSKI,
this would involve careful configuration of voucher requests, in which
the voucher is “nonceless”, but yet bound to a particular deployment.</t>

<t>This leads us to another concern.</t>

</section>
<section anchor="resale-and-transfer" title="Resale and Transfer">
<t>We should assume that device ownership and use will change over time.
This presents some additional problems.  We assume, for purposes of
this discussion that both DPP and BRSKI have some form of a registrar
function.  We also assume that zero-touch may or may not require a
device reset (a’la pin in the hole, type).</t>

<t>There are several ways to think about this problem:</t>

<t><list style="symbols">
  <t>seller transmits something to the buyer registrar as part of a transaction.</t>
  <t>seller provides buyer an artifact as part of a sale.</t>
  <t>original manufacturer records the sale.</t>
  <t>original manufacturer simply notes the transfer.</t>
</list></t>

<t>Let’s dispense with the last option.  It suffers all the same wireless
problems as the original case.  Therefore, it is not further
considered in this discussion.</t>

<t>If the seller transmits something to the buyer registrar as part of a
transaction, this means that the seller must have identified the buyer
registrar.  That in itself may be a trick.  If the seller provides the
buyer with an artifact, the buyer must do something with it.  Both of
these methods suffer a particular problem: if the original owner went
out of business, there is no chance for any transfer to take place.</t>

<t>If the original manufacturer records the sale, this means that the new
owner would have to either know to query the manufacturer, or that the
manufacturer would have enough information to send an appropriate
credential to the new owner.  This <spanx style="emph">also</spanx> means that the manufacturer
is still in business.</t>

<section anchor="choices-choices" title="Choices, Choices">
<t>The above models are not necessarily mutually exclusive.  That is, it
might be possible to rely on automated means when they exist, and
otherwise rely on less automated means when they do not exist.  This
is somewhat problematic for BRSKI, in that somehow or another a
voucher needs to be generated.</t>

<t>Alternatively we might ponder an additional actor whose role it is to
safeguard transfer credentials in the form of an escrow agent.  The
existence of such an actor introduces a number of questions:</t>

<t><list style="symbols">
  <t>How would the buyer know to use a particular escrow agent?</t>
  <t>Is there an incentive model that would bring such an agent into
creation?  After all, someone has to pay for such a service.</t>
  <t>How is transaction privacy maintained (or is <spanx style="emph">that</spanx> how the service
gets paid for)?</t>
</list></t>

<t>Another model, and the author writes this with great trepidation, is
the use of Merkle trees to record a transaction.  This has the benefit
of being able to establish previous ownership, but has the risks that
the previous owner is no longer in existence to provide an assertion
that the device has transfered.  On the third hand, perhaps a claim by
a known party is enough.  Such transactions have privacy implications
as well, and there has to be an incentive model to maintain a
distributed ledger.</t>

</section>
</section>
<section anchor="beware-too-much-mechanism" title="Beware too much mechanism">
<t>As this area of work advances, there will be the temptation to add a
vast amount of mechanism.  The previous supposition of the use of
Merkel trees is a great example of just that.  From an IoT device
standpoint, it’s all but interolerable. We are, after all, talking
about a codespace that is generally considered to be constrainted.</t>

</section>
<section anchor="this-is-really-only-about-network-onboarding" title="This is really only about network onboarding">
<t>But that may not be the only problem.  Rekeying will occasionally
happen for various reasons.  How this takes places will depend on the
authentication mechanism used in a deployment.  If EAP-TLS or TEAP are
used, the presumption is that there will be an EST server or similar
available for credential renewal.</t>

<t>For private shared keys, there currently is no great answer to this
question.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor="I-D.ietf-anima-brski-async-enroll">
<front>
<title>Support of asynchronous Enrollment in BRSKI (BRSKI-AE)</title>

<author initials='S' surname='Fries' fullname='Steffen Fries'>
    <organization />
</author>

<author initials='H' surname='Brockhaus' fullname='Hendrik Brockhaus'>
    <organization />
</author>

<author initials='E' surname='Lear' fullname='Eliot Lear'>
    <organization />
</author>

<author initials='T' surname='Werner' fullname='Thomas Werner'>
    <organization />
</author>

<date month='January' day='7' year='2021' />

<abstract><t>This document describes enhancements of bootstrapping a remote secure key infrastructure (BRSKI) to also operate in domains featuring no or only timely limited connectivity between involved components. Moreover, newly introduced are methods to perform the BRSKI approach in environments, in which the role of the pledge changes to a server instead of the client.  This changes the interaction model as the pledge is pushed to interact with the registrar instead of pulling information from the registrar.  To support both, BRSKI-AE relies on the exchange of it authenticated self-contained objects (signature- wrapped objects) also for requesting and distributing of domain specific device certificates.  The defined approach is agnostic regarding the utilized enrollment protocol allowing the application of existing and potentially new certificate management protocols.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-anima-brski-async-enroll-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-anima-brski-async-enroll-01.txt' />
</reference>



<reference anchor="I-D.ietf-anima-bootstrapping-keyinfra">
<front>
<title>Bootstrapping Remote Secure Key Infrastructures (BRSKI)</title>

<author initials='M' surname='Pritikin' fullname='Max Pritikin'>
    <organization />
</author>

<author initials='M' surname='Richardson' fullname='Michael Richardson'>
    <organization />
</author>

<author initials='T' surname='Eckert' fullname='Toerless Eckert'>
    <organization />
</author>

<author initials='M' surname='Behringer' fullname='Michael Behringer'>
    <organization />
</author>

<author initials='K' surname='Watsen' fullname='Kent Watsen'>
    <organization />
</author>

<date month='November' day='11' year='2020' />

<abstract><t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur using a routable address and a cloud service, or using only link-local connectivity, or on limited/ disconnected networks.  Support for deployment models with less stringent security requirements is included.  Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-anima-bootstrapping-keyinfra-45' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-anima-bootstrapping-keyinfra-45.txt' />
</reference>




    </references>



<section anchor="changes-from-earlier-versions" title="Changes from Earlier Versions">

<t>Draft -00:</t>

<t><list style="symbols">
  <t>Initial revision</t>
</list></t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAFuVR2AAA6Va748jt5H9zr+C2S+2N9Jk4zMQZ4CDs78CL+KL93YGWeAO
h4DqpiRmuskO2T2yEuR/z3tFsrulnU1yiGEDY6mbLFa9evWqqO12q0Y3dvZW
v7F20PfHMB2OY9LB69/b8RTig/7R74KJrfMH/fpous76g03K7HbRPt7+k6fa
0HjTY/U2mv247ayJWxfGMKRti/22Y9lvGzz+rStsX7xQjRntIcTzrXZ+H5Ry
Q7zVY5zS+PWLF79+8bV6sGds3N7qd3600dtx+4Z7KJVG49s/mi547HuGEYO7
1f87hmajU4hjtPuEv849//g/pcwEI+Kt0lul8Y/z6Va/vdE/wFT5INv/toPZ
y4chHm71a5eaoO/OabR9ko8TVrfjrf7gmuPo8H8mJat/Jd81ocU6r7/ffvsf
L77Jn7gRx/sIZ7lk6bHy3ORHnvvu5Ma/2NjhNPLFcJQTPfv5N7/U33yjv/3V
t/rX8MUz+dL2xnW3mg7+TUO7bprQK+VD7M3oHu0tn3q3fXPj7LjfGu96s93F
9OC2Jp19s7U+hq578qkQRp5kGBgZeB3xiOYWEUFc1qur7XarzY7PNgjDRzce
9aOJLkyE04yO3sLfbdI7y//bTa4bdZjGDZ6x2qTBNqMej2bUR5PUzlqvwyO8
EMKDbbVL+M5mHOhoO+wefDq6AcuNJz7Mr1s7dOHcWz9qOo8f9cZPe9g1RRtv
NHCOlQDOKT+UHpL+82STrIYzwB59DKdsh2ymEpDatdhG4zGzQ8iOtt1wfXnS
jboxnl93Fuaag21vlHikd23bWaUA0xjaqeEe6j9X/6iX2k/9zkYd9tqXdFo5
bLTN0YcuHJyFbdHqZooRZndnbHdw3stDAUfk6RAWnQ8cH+yoh840Vg5sVyfE
A2cN3Olk7QPfNT6dYABXx3cJAUU+6O9xsDbYVJz66BqrH3z1C45cnPKngE2N
HkwcXTN1JtZjfPfJKvV8Ty2To3qxTt70O6V+sOMXSdufTO8AE6yhhwgeaUKX
aP/kWxsl8UvccIZ1ROGXfERgiA+duPPyfW/ojhQYP0c64RfZq8AG3PfR6pPr
OiUOx5+ANhHJZ4gQHOyj2zv9EqlsfGNh6pvsrvcxPLqETfCoel9MzrDBWwiV
eQDq9cHwAFzr1Trd9Afbh9HqO4uYW/07ewaMkH14YBIsqy9ffbj73buv/vrX
n/1Lafu3v22y9Qand82DAoc7eyLyeIgwALp0ie7BVh0/tqY5ZgfskS7I5Ilm
jsAfH4ODQFFBjWFqjgzJfFig/3/wjf70Gy0IRf41Aa7+aQQjGMFk8WQBWrSN
BbUkVSHTIHjc1nRpRg6DoifEGobsXOvwEu0CtBHQiR4GklBJVD40UDrAlCE6
fDZjkd8x440/6+MEptDzQiB6cFjnWvGKKhaOrref2IsD7R0wqIdQcDZekRFc
8gQqdEUF2eKz/6iXiTu0NjXR7ciEHudPmnwJ5DVi3+Yp1M3r4yzqzfv3APsD
kpFOQ3iRbRPIrPkFfPJIpwApSEAXC2esP8b+aQxRNlfLyWc0l6XqsxLzFk8j
NvwWO0YyPbfd4ZUbcqJ8Uwjt+jAWccErCYtIhjrvRgkcSls/+cbl59QOa6IU
YVHgMp51Mo88d7QmIbk3xAnMOVgPcBMYAyq/jTxHjaGyvh1AYuO8Rz3UlDIn
0FEhuQr61iXUAMsQKCSZT4JVSeAgRhMiCSe8k2rQrUCUVom/ZueKRscC1Ami
6UH+Ic6eTazYR33M3guRaF15f4nIjE11veYFG392ySX6N+oeztjofhonnGeV
XHSJvIgT+asjIbvtT83RQAyy3oRTUozUOgsv0loYeCaLDPM10hLJBHsZVYqF
byDemKXI2ruXbwHdlCgL4fqXhCDeg/5A0PvMWKzZ/y+oKoEqVFEhrWR9sk+t
Yfd7csajJfXMdmxyrhhhFyqc0zGgRHUQQPA3UV0q/eqY3G2/2HFicVQ+W5eo
Mq4238fQY8v//iAaUyjLGf3j6w/geptf1z6MkNSs+OJBJDLU/jMEBobsIVqf
XW3qrW0lHuaAb4nBlSIxFVdrPsxZZj2Blp0MWIAIsYJhzQQHV0u0WCLuvDBB
KdFlELHg/awH29ZlQmf6JbdznYjmzAAVfaV6ZZewMRAH2A7xiODAplQYIm+V
FMdMEyIxM0lTsxG3ZEkRE4wLpYv/YmTKo/6lbHYWsVVIMowFQkDmshlL4zYX
wFUVWLBUCqCEqXfog/gJ6S6u6DUnZ62GktnCwmkFAXzMDfvM6BEihaU/wqEf
jw55X1skru8FpfAiw8VgRAspQDakyTw6or4HvWbXSplR4QQ+FqLrXUrF50Di
CoU5umUxdFq9vdzNQEPzQyExCTXlfoICb8lt8PeYibbrckBdynL/ssxKxQdJ
FD5T6yp/TWu1sPOz2QW57zCP6Je4xk1x0VgDSZeQ8vsBzaKRklBOY5JNCwWJ
oshGJYWsRj0FrXUFk2n2xLxx2VIQvPaxFKic5PVwqPE8USchyQXlaneiMXtX
3PfoAHSiK2WlMy9AiKGzmzdjTXpSYkJbatGWVVrqIi3/oSz5vF5R8jaE8L5j
e5TEhyK7WwemjFeZYCqpzmUuERTK6EfmDxxAf0KWCyctEK8Fogs87ZJlGyFa
04bokyRTfV3c49IFeddGNvia0fXp3G96Fq0TyGCpEDnwX6SLxjJvKgzN6s7T
svxr1ChBSRWsFBAWqJBe5nS0WTEsGN/ZLvhD0tddlRxSXVDJvQCvbIAXmm5q
S/f2ewCHQhxezs3pn1gxkztkj135dYPVDwdpehZv3XCdP8zSJSfjEw3a5yzm
WOBC/zLps0qWApRLL7KQ3m8E7SfkTGdTWr1HCdYYClajKgsI2SQkKaqttJ/j
vPIspKBnrJESvJf+XFJszRezToo2k2HRjFmHdM4+rmT+xeKllu3shVwqX5Zz
Jovka+eDkldqUXF/sW2OCz0gha0rWxmvQFnbsN9SeLAbnacGgkYjTaeoLB3W
xxZ2NoVRIImz6lhqLjlzXZGYl1RJo15oeXM9PulFZLEzBlUTOfPwY9HOVxDI
FWP2RUmoMYTZCVnlI5d2Z1mgeoX9US6ylyOSuU0wuWfZAdha6EXih5LF4VFj
r7qxIliWfYpJGwb6sxWxVsNqOP+tpQB4ISP10mfQElRh0Ln1zfmmEF61CM1I
pBLMZCeWHcxQJi9QHlKrDnasHXQOirrooIUeK41mhnScguT51BwJyVlRw2UG
VviuMmTtBS6Zyoi+EuVm9ns0fOuhBCmvM2MxfFmqSCYBzGdSZZX8V8Ag8wo/
fKqFltguwYR5WKGBGioiIOscpOohlNnMjuHu2HjlTsG0j5y+bGbmVZCyF8ME
7tXnbiXkMIj8q1m28Ht5UbEKFVLsEeMfvc08ogcbjwwoa68IImhqmQTTkNPR
NceLzoYTqKKfxrEMB+h7HDmZ3JmthdsnfhEYbJQUy5zTzj+G7pFPoJ2dpNLv
3WGKsyS+Ing2wsUyteZ/inBPj5N1nwl16DN1Uph8m+264PsLNs9qveU4IY8R
i1jhetHjkQ9Wjkdo3fP4SIaL4WdN8Y+2TgGzJswhLwiC+rRRprxch4VAymjp
KzkeFmfeZIPQ9CWpGgLTdQeRS03K46y8z0aKzjBFsDB7jn12cTvzUDZEKIdp
TQNyogt6ZIsnlLeqeqvsVRh0PtiKh6UHjLP0rLJxLnU8zai/NF90CASnPhkY
6CGpmM6D/SrXG75D4V0GDidzThnMzj8UyhiPS8HNGkHuHWJV9sVn47HkF/fZ
TWfB0MwmSeCQz7uqOTer5UovlMrLHLsBQOSey9cJDXkvRAfpAavXHMWkRQed
JxL/5NGiBOBAW28IMthu6ugYER3YumcBKJLRgDLDUKKEWpwmcnXSuTnlnr2d
9Yiq6NFlRjIbwhTNAw8kIhqzOnBiNPdTZEKo2tfVicYFxDgI2xfW+XfCoS4k
QOlTL0arZX2p6oJfJwQlxXheXa1p6F4mQ1LSbbcXlIqQGKNrHpaZwXXgWW6z
qfPgtSBgszqG2NGG1SmzOmddeMWMk3TkKL9eGuUQXVJSBTRl3kVghDbQW/tR
1bHjlCC5U9pciD7ySCNpLCPgCh1x+TKlm4P0r4H16QB4e1LFLCG7qgTKqDPf
igTeTMTzE0VbBhhFdl3svlrNel6prpsamRuhjl3Nv9VSn5bG+ZS9VtXPczLX
8+tTrLdWMhUmHQMl1b9w1uvckmx0+eOTNjIPAHacRsplQ67tTBroMaxhouPY
TsaN+MP+hNYmoYbPoJTJrspzE04NZxlNGd9xsMYpZYAPgO58glNRN1zOsefh
9aCUrJNLdn5N+o/PvwvE0kxZojhKrRvc65Ym1+6c+CbLbV5SCdxyvTSqVuN5
7oYT5Yn1KDeJLzvqVVPmi/O8aAj53siv6xwiw0ZKOkP0/nU0NwaVzN4eJpk2
VpCvRUpto2o9o9xvIkw1h9ptWiXHtqLQ9mUc4cuWs4ziPGq505zv2ZZbxYzX
hQkq8KXJWyf32gC5TXyXSu4alsKGplcE6VXHs4siVKt5fJ3mBXakOLLkxXda
v9xT5AJgGwkLJXERhwOYjsGr89KsB2/qAejPhW3zoLwBXA02wX9AzZdBtNVz
GvW83krOuhJmQP2TvJ0M3r76DjEuaJDDLDP8/AMFfYouFzdXZk8HHgNW2KG0
5xvO+csEl37/LxsfmA/R2pSzghR1VbZLotfJ/w6Y2yOtSJZ5UFZSamn86lB9
kWVZNNYlouN1Oo8txlw+XiiXHYGV4c0Cp3I5IUNUT7Vko1y6XU8AZZ8CX+nT
fsywhWciOdCj46/q3OimM65HB4i+jSDzAq48sBeixPt3DPHKJykTaY0ppUWd
6ikO/mzXrScHBTC7pyEZZkxQ0rGuOjgL+OhsexB98sqe5N4dHXIvgtCyILnU
PyWU608GChDwomGoZeBR2p+5utVpojjH9sM4VwOQBTmHAsj0/L0J15j3na/+
SuDSNMx3X2G+I2BxJsJ4SEEYzSmg5D390AkIZejEEGLV38pFhdfvwn0JZu79
y+whN7e0eRrzNTzIK8qQVkQ0pZVZEnY0HWchKmtbI5cfaTB1Yn5x5bfSXzlU
/AAh5y5t7WSk+5fHg+cljqz76Q8yPh+WpyL1aio3dqvZsqgILzeRUingmg9W
rugPOWihgags99gKQIZyFTKqP6cpV5t473vhlTwY4pUApUrKi6BVY9HPQyJ1
dWE3B5uhzM3zVV++129fvt/e/3DHQnWPv6WH5dPl9guNydQP82CqZOkKd4j0
27t7oTwrd3RQ6Y6DgXn4LodayZCIgJ1Mh4D8ll1ZuX1MR8PAsf+v0F5+ApP5
JMOu/Ioldz1J1bqD5fJPcXameVCUJuwbU743e2ti5/DSH0BlkuH/OJxKfmSm
ty9esJjp5+jTXTE9zwHU3wH3mTjiUycAAA==

-->

</rfc>

