<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-gallagher-openpgp-user-attributes-01" category="std" consensus="true" submissionType="IETF" updates="9580" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title>User Attributes in OpenPGP</title>

    <author fullname="Andrew Gallagher" role="editor">
      <organization>PGPKeys.EU</organization>
      <address>
        <email>andrewg@andrewg.com</email>
      </address>
    </author>

    <date year="2025" month="November" day="03"/>

    <area>int</area>
    <workgroup>openpgp</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 34?>

<t>This document updates the specification of User Attribute Packets and Subpackets in OpenPGP.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://andrewgdotcom.gitlab.io/openpgp-user-attributes"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-gallagher-openpgp-user-attributes/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        OpenPGP Working Group mailing list (<eref target="mailto:openpgp@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/openpgp/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/openpgp/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://gitlab.com/andrewgdotcom/openpgp-user-attributes"/>.</t>
    </note>


  </front>

  <middle>


<?line 38?>

<section anchor="introduction"><name>Introduction</name>

<t>User Attributes are a much-maligned and often-abused feature of OpenPGP.
Currently their only specified use is to contain images, however it is known that some implementations use the Private and Experimental User Attribute Subpacket range for various internal purposes.</t>

<t>In this document, we simplify the specification of User Attribute packets and subpackets, and use them to implement currently-missing functionality in OpenPGP.</t>

</section>
<section anchor="conventions-definitions"><name>Conventions and Definitions</name>

<t>The term "OpenPGP Certificate" is used in this document interchangeably with "OpenPGP Transferable Public Key", as defined in <xref section="10.1" sectionFormat="of" target="RFC9580"/>.</t>

<t>The term "Component key" is used in this document to mean either a primary key or subkey.</t>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="user-attribute-subpackets"><name>User Attribute Subpackets</name>

<t>User Attribute Packets are simple containers for one or more User Attribute Subpackets.
These subpackets are wire-format compatible with Signature Subpackets, but the only currently defined type is the Image Attribute Subpacket type.</t>

<section anchor="image-attribute-subpacket"><name>Image Attribute Subpacket</name>

<t>The Image Attribute Subpacket (Type 1) has some unusual features, and is over-specified:</t>

<t><list style="symbols">
  <t>The image header has a little-endian length field, uniquely for OpenPGP.</t>
  <t>It has a version octet that represents an entire registry but with only one version specified.</t>
  <t>It has an encoding format octet that represents an entire registry with only one value specified.</t>
  <t>The v1 image header has a further 12 octets of unused fields.</t>
</list></t>

<t>The Image Attribute Subpacket has been abused to store large amounts of data on the OpenPGP keyservers, and as a result most modern keyservers refuse to handle any User Attribute packets.
Further, we wish to minimise the quantity of human-readable information in the OpenPGP wire format.
Images and other data without meaning at the OpenPGP layer <bcp14>SHOULD</bcp14> instead be stored at the application layer, for example in a vCard <xref target="RFC6350"></xref>.</t>

<t>The use of Image Attribute subpackets is therefore deprecated:</t>

<t><list style="symbols">
  <t>Code point 1 in the User Attribute Subpacket Registry should be updated to "Image Attribute Subpacket (deprecated)".</t>
  <t>No further Image Attribute versions or encoding formats will be supported; the values of both these fields are hereby fixed at 1.</t>
  <t>The OpenPGP Image Attribute Versions and OpenPGP Image Attribute Encoding Formats registries should be deleted.</t>
</list></t>

<t>A User Attribute packet <bcp14>SHOULD NOT</bcp14> contain more than one Image Attribute subpacket.</t>

</section>
<section anchor="embedded-signature-attribute-subpacket"><name>Embedded Signature Attribute Subpacket</name>

<t>The Embedded Signature attribute subpacket (Type 2) is analogous to the Embedded Signature signature subpacket (<xref section="5.2.3.34" sectionFormat="of" target="RFC9580"/>).
It contains a single, complete Signature packet body.</t>

<t>A User Attribute Packet <bcp14>MAY</bcp14> contain one or more Embedded Signature attribute subpackets.
These can be used to distribute signatures that cannot otherwise be included in the certificate packet grammar.</t>

<t>Placing embedded signatures in User Attribute subpackets rather than signature subpackets avoids several issues arising from signature cumulation rules.
For example, if an embedded signature is included in the hashed or unhashed subpackets area of another signature, it must be duplicated into all future signatures over the same subject.
Otherwise, a receiving implementation that ignores or discards older signature packets might ignore or discard the embedded signature.</t>

<t>Unless otherwise specified, all signatures embedded in User Attribute packets <bcp14>MUST</bcp14> be made by a component key of the current certificate.</t>

<t>We update the following signature types to be "embeddable" (see <xref section="5" sectionFormat="of" target="I-D.gallagher-openpgp-signatures"/>), and specify their use in User Attributes:</t>

<section anchor="certification-revocation-signature"><name>Certification Revocation Signature</name>

<t>An Embedded Signature attribute subpacket <bcp14>MAY</bcp14> contain a Certification Revocation signature (Type 0x30):</t>

<section anchor="certification-revocation-signature-over-a-third-party-certificate"><name>Certification Revocation Signature Over a Third-Party Certificate</name>

<t>The key holder might not trust that a third party will distribute certification revocations over their (possibly fraudulent) certificate.
The key holder <bcp14>MAY</bcp14> instead distribute the revocation signature in their own certificate using an Embedded Signature attribute subpacket of a User Attribute packet.
A receiving implementation <bcp14>SHOULD</bcp14> apply any certification revocation to the target certification, if the revocation signature correctly validates.</t>

<t>To aid a receiving implementation locate the correct certificate to apply the revocation to, a generating implementation <bcp14>SHOULD</bcp14> include an Intended Recipient Fingerprint subpacket <xref section="5.2.3" sectionFormat="of" target="RFC9580"/> containing the fingerprint of the primary key over which the revocation has been calculated.
The receiving implementation then only has to perform one signature verification per User ID packet on the target certificate, but cannot recover the contents of a User ID packet that it does not already have a copy of.</t>

</section>
<section anchor="certification-revocation-self-signature"><name>Certification Revocation Self-Signature</name>

<t>If the key holder wishes to delete a User ID or User Attribute from their own certificate using a redacting revocation signature (<xref section="5.1" sectionFormat="of" target="I-D.dkg-openpgp-abuse-resistant-keystore"/>), they cannot append the revocation signature to the redacted User ID or User Attribute packet, because the redacted packet is no longer part of the certificate packet sequence.
In order to distribute the revocation signature, it <bcp14>MAY</bcp14> be included in an Embedded Signature attribute subpacket of a separate User Attribute packet.
The revocation signature can be validated by a receiving implementation that already has a copy of the redacted User ID or User Attribute.</t>

</section>
</section>
</section>
<section anchor="user-attribute-subpacket-grammar"><name>User Attribute Subpacket Grammar</name>

<t>A User Attribute <bcp14>MUST NOT</bcp14> contain subpackets of more than one type.
A receiving implementation <bcp14>MUST</bcp14> disregard the entire User Attribute packet if it contains subpackets of more than one type.</t>

<t>A certification signature over a User Attribute packet <bcp14>SHOULD NOT</bcp14> contain subpackets of the Direct or First Party Certification categories (<xref section="7.2" sectionFormat="of" target="I-D.gallagher-openpgp-signatures"/>), and any such subpackets <bcp14>MUST</bcp14> be ignored.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The deprecation of Image Attribute subpackets should increase both security and reliability, by removing a significant abuse vector.</t>

<t>Distribution of third-party revocations in the certificate of the signer should be more reliable than existing methods, thereby increasing overall trust in the certification process.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA is requested to perform the following tasks:</t>

<t><list style="symbols">
  <t>Delete the OpenPGP Image Attribute Versions and OpenPGP Image Attribute Encoding Format registries.</t>
  <t>Update the contents of the OpenPGP User Attribute Subpacket Types Registry to read:</t>
</list></t>

<texttable title="OpenPGP User Attribute Subpacket Types" anchor="attribute-subpacket-types">
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>1</c>
      <c>Image Attribute (Deprecated)</c>
      <c><xref target="image-attribute-subpacket"/></c>
      <c>2</c>
      <c>Embedded Signature</c>
      <c><xref target="embedded-signature-attribute-subpacket"/></c>
</texttable>

<t><list style="symbols">
  <t>Update the following entry in the OpenPGP Signature Types Registry to read:</t>
</list></t>

<texttable title="OpenPGP Signature Types (update)" anchor="signature-types-update">
      <ttcol align='left'>ID</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Embeddable</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>0x30</c>
      <c>Certification Revocation Signature</c>
      <c>Yes</c>
      <c><xref target="RFC9580"></xref>, <xref target="certification-revocation-signature"/></c>
</texttable>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC9580">
  <front>
    <title>OpenPGP</title>
    <author fullname="P. Wouters" initials="P." role="editor" surname="Wouters"/>
    <author fullname="D. Huigens" initials="D." surname="Huigens"/>
    <author fullname="J. Winter" initials="J." surname="Winter"/>
    <author fullname="Y. Niibe" initials="Y." surname="Niibe"/>
    <date month="July" year="2024"/>
    <abstract>
      <t>This document specifies the message formats used in OpenPGP. OpenPGP provides encryption with public key or symmetric cryptographic algorithms, digital signatures, compression, and key management.</t>
      <t>This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the OpenPGP format. It is not a step-by-step cookbook for writing an application. It describes only the format and methods needed to read, check, generate, and write conforming packets crossing any network. It does not deal with storage and implementation questions. It does, however, discuss implementation issues necessary to avoid security flaws.</t>
      <t>This document obsoletes RFCs 4880 ("OpenPGP Message Format"), 5581 ("The Camellia Cipher in OpenPGP"), and 6637 ("Elliptic Curve Cryptography (ECC) in OpenPGP").</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9580"/>
  <seriesInfo name="DOI" value="10.17487/RFC9580"/>
</reference>

<reference anchor="I-D.gallagher-openpgp-signatures">
   <front>
      <title>OpenPGP Signatures and Signed Messages</title>
      <author fullname="Andrew Gallagher" initials="A." surname="Gallagher">
         <organization>PGPKeys.EU</organization>
      </author>
      <author fullname="Daniel Kahn Gillmor" initials="D. K." surname="Gillmor">
         <organization>ACLU</organization>
      </author>
      <date day="3" month="November" year="2025"/>
      <abstract>
	 <t>   This document specifies several updates and clarifications to the
   OpenPGP signature and message format specifications.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-gallagher-openpgp-signatures-02"/>
   
</reference>

<reference anchor="I-D.dkg-openpgp-revocation">
   <front>
      <title>Revocation in OpenPGP</title>
      <author fullname="Daniel Kahn Gillmor" initials="D. K." surname="Gillmor">
         <organization>ACLU</organization>
      </author>
      <author fullname="Andrew Gallagher" initials="A." surname="Gallagher">
         </author>
      <date day="28" month="March" year="2025"/>
      <abstract>
	 <t>   Cryptographic revocation is a hard problem.  OpenPGP&#x27;s revocation
   mechanisms are imperfect, not fully understood, and not as widely
   implemented as they could be.  Additionally, some historical OpenPGP
   revocation mechanisms simply do not work in certain contexts.  This
   document provides clarifying guidance on how OpenPGP revocation
   works, documents outstanding problems, and introduces a new mechanism
   for delegated revocations that improves on previous mechanism.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-dkg-openpgp-revocation-02"/>
   
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC6350">
  <front>
    <title>vCard Format Specification</title>
    <author fullname="S. Perreault" initials="S." surname="Perreault"/>
    <date month="August" year="2011"/>
    <abstract>
      <t>This document defines the vCard data format for representing and exchanging a variety of information about individuals and other entities (e.g., formatted and structured name and delivery addresses, email address, multiple telephone numbers, photograph, logo, audio clips, etc.). This document obsoletes RFCs 2425, 2426, and 4770, and updates RFC 2739. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6350"/>
  <seriesInfo name="DOI" value="10.17487/RFC6350"/>
</reference>

<reference anchor="I-D.dkg-openpgp-abuse-resistant-keystore">
   <front>
      <title>Abuse-Resistant OpenPGP Keystores</title>
      <author fullname="Daniel Kahn Gillmor" initials="D. K." surname="Gillmor">
         <organization>American Civil Liberties Union</organization>
      </author>
      <date day="18" month="August" year="2023"/>
      <abstract>
	 <t>   OpenPGP transferable public keys are composite certificates, made up
   of primary keys, revocation signatures, direct key signatures, user
   IDs, identity certifications (&quot;signature packets&quot;), subkeys, and so
   on.  They are often assembled by merging multiple certificates that
   all share the same primary key, and are distributed in public
   keystores.

   Unfortunately, since many keystores permit any third-party to add a
   certification with any content to any OpenPGP certificate, the
   assembled/merged form of a certificate can become unwieldy or
   undistributable.  Furthermore, keystores that are searched by user ID
   or fingerprint can be made unusable for specific searches by public
   submission of bogus certificates.  And finally, keystores open to
   public submission can also face simple resource exhaustion from
   flooding with bogus submissions, or legal or other risks from uploads
   of toxic data.

   This draft documents techniques that an archive of OpenPGP
   certificates can use to mitigate the impact of these various attacks,
   and the implications of these concerns and mitigations for the rest
   of the OpenPGP ecosystem.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-dkg-openpgp-abuse-resistant-keystore-06"/>
   
</reference>



    </references>

</references>


<?line 168?>

<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The author would like to thank Daniel Kahn Gillmor, Heiko Schäfer and Wiktor Kwapisiewicz for discussions.</t>

</section>
<section anchor="document-history"><name>Document History</name>

<t>Note to RFC Editor: this section should be removed before publication.</t>

<section anchor="changes-between-draft-gallagher-openpgp-attributes-00-and-draft-gallagher-openpgp-attributes-01"><name>Changes Between draft-gallagher-openpgp-attributes-00 and draft-gallagher-openpgp-attributes-01</name>

<t><list style="symbols">
  <t>Removed Attribute Creation Time, Attribute URI, and Notation Data subpacket types.</t>
  <t>Restricted Signature Subpacket categories in certifications over User Attributes.</t>
  <t>Simplified the User Attribute Subpacket grammar and registry requirements.</t>
  <t>Specified use of the Intended Recipient Fingerprint subpacket.</t>
  <t>Added references.</t>
</list></t>

</section>
</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA61a23LbRhJ9x1fM0i92SqBFXzaJNptEkWRbFdvS6rKplMu1
NQSG5KwADDIDiGYU/cs+7Jfs/tie7hncKFKWq1YPNglgerpPd5/uHjCO46jS
Vab2xOjSKSv2q8rqaV0pJ3QhTkpVnL4+HUWJrNTc2NWecFUa1WWK725PfPvy
m90oNUkhc0hIrZxV8VxmmZwvlI0NVpfzMq4hOJat4Hh3EunS7onK1q56trv7
7e6zSFol97BlFS2NvZpbU5d7IgiIrtQKV9M9cVxUyhaqig9pq8jV01w7p01x
sSqhwPHRxavoWhW12ouECEJGrRFCVPzY6BdsoYu5eE1P0PVc6gzXw34/alXN
xsbO6Za0yQK3FlVVur2nT+lJuqSv1bh57CldeDq1ZunU0yDjKa21qjS9tXMA
LafjxORPZZFatZynpqJvW4AiERkBXfWEDFaOg0httstwFZb8Q2amgOkr5aJS
74kPlUl2hDO2smrm8GmV04ePkayrhbGAL8bmQszqLPPO3ed9xevGu3wbxstC
/y4ruGBPAOSf1cqNjy75pvKoBoV/DP+T+XzbGoo6lerK2KgwNoeUa3bc2asD
Ciz6eBwfju8GlNPzQla1RQiGZ9KreXvXqmuTeJUiXczWJP/5+cvdTavkFMhh
rdMEWBUj5hw0w7IojmMhp66yMqmi6GKhnUDM17kqKhFSQVQLJVypEj3Tfm9h
ZmKYUeJUJleqcoSIOK+nZfja5dnY75XrNM1UFD2ieLcmrRMWePNI977eRtF6
wiKHhBR5nSziXGbASKW8l5lVqvAGpmKmGDlSr931oLYWxmQrMkNbYQp8DNZg
CdYJ2FwZkZiiktBX53KuEDYLs1TXUEJX9MBVYZYFRMgKkZVjTV5milBiQBzL
IZxOrb4GaKzb0adSWc0PZet4tRgJK4u5EnCluJZWm5pAIybAmrK2pXHKAbtj
2rznnB2xhFNICz1bPchDZc9DrvXQDn8P2ueEQ2uZSBroYmYikMqsLthB8EC1
Gjr3kTgwBfjJw0FCD9VMF9p/v3mUdHfjtLtzS0GHzZXNWzYTB8pW3hQ1IvDZ
uXoNAQ9TsiD45BROXepq0cm4AK5upixuwSv1NNOJQAaPYDBkkAJe5s3NufIx
ONkdTwi3P4Ucvb0d95U7MHkJnsHGSJ971AKEuZKFUFAHDpCiRAxIu6JlIBXC
Hp+CaLpG9O/E6N3l+QW04//F+xP+fHb0t8vjs6ND+nz+Zv/t2/ZDFJ44f3Ny
+faw+9StPDh59+7o/aFfjKticCkavdv/deS9Pzo5vTg+eb//dnTXGso7WDRV
Hu7Sqooyz0WpcgkiyyPw08Hpf/41eQEwCbxnk8m3t7fhyzeTr1/gy3KhCr8b
J6D/CoBWkSxLJS1JAReKRJYa6eLYTW5BSQcUFeD66gMh83FPfDdNysmL78MF
MnhwscFscJExu3vlzmIP4oZLG7Zp0RxcX0N6qO/+r4PvDe69i9/9kCEyRTz5
5ofvI8qqbbzh1jmyo2AbmEE1nKasY4JB+FIE5qD+7XLHFJjgg44jWOJSWxX7
ggOxeQmaoczipDtvalZPzI6AXCYmdnjLJW3uUb/C1ItHjolzN7IjPUXs8mj7
Mz6Ttot4TA2UmDwRCwopIu+6qF0Nfg31IpAgdDEg/LgtDiiPXwmSzSUBcShT
YEZSpAABorOMVZFq5HqmijlwwKIs3YF4/VutYCph3jLkV+K4Couxi2OSTioy
kYoK2ikoAoSIOwURJdC0ao6KDeogKBlpxpLc2Ihole1vQAISkzJje489eKe1
XWRWq+EehMf1ZBMks9oy402e+e0ckSlBTZWZkHHjz7mKBE2VAhX4gg7m4UYF
raLFEpmbuvBy0ZlIqMjR01A+tTXKEjLeoawVbK2zCjHv6B9oW/Sew90Z1z6D
rQs0Jli32lI4x9ErbyCX3qV2C6Z6FDJUR1/8f6vRXVFlhIKLOpcFei6ZcgVq
mzXorIdqU2YFP40jxsbXT8NosqHkFYMYoMJCXpXVQEImV3gyEJUuXIVdibIZ
u7R5GkSbNe0Br9jhAFWfJHMFEbC4PpA2FR9CL/kxOIwggknrfusxhM9joEnO
SinCqHj7DDoA6qI0qB9i0ti+tRs6awIR3F9nbIVvQzkYRvdkebfrkxEF6nvT
RuT6qpA8jshwLVMcsEYZIvDqssQModK/sMacChx6UziGLgEUH9bMj2T9FCmv
P3nEJ02yNE5aV+LvjRLk620PHTXavQrahUTVyvUQSlVGZRne2t8cvKIrYm2f
y1UAjFBwpm/1rSffoxyVPoVlHdVvZeINz8q7cgMtP3tCsSPRUZo59b5wcrVZ
hus+dTK67u3l+Nn4+fj5C/JQ28A9QUJVjcXEBtTFZmqHKxhh1pMfRE5NutoE
pK+uAiW8RbBfTh9mdFtcE8A+VaIhuZR96p9t5z9P13iyMJUngyURDbdiSVan
TfMJaV2/3JgxtzJH1wlLTjOZUASpRsPeDli/ZmYvp63k5OEQ2QA+4Lw2GtHv
aExCNcWMUPOkpv2sYE3eW4d+ss48+dg6o5nmVUc+O0LPuBrd0ZGiY91cVIkF
vmF5XYTPw2ZFUhDIwhNoK2qHRrm8Rh2glKk9GbJUeIB6z1k9DDTfD/jhSuZs
+j8RbePopHHGDheYROlrsng4E3r3QZZhSZacnEhq9U2W9vVqJ7NczxfNit4C
VuAuMnDtZQEgXS822kq9wwb1LGnX33V5sz1304AmR00XoDLJWdKOPIQpB5vv
5PpBB1V+aXian5mZLDNLwqSzkjo5F2aJkVeHKuNIPHZK9cawl1xqPnM2gtT2
Nd5b3Az3PM2vG+j2iMIe9aZK2uasPUnpUhZpXzyUvvpEILfL7uz3fLf76fnu
E6/QQzQSJ9c8Q14stE3jU2nRXPSm426IXPig8iFEhMEHkD4GJc10iKOSl3N9
6xFOMlCiO2Dqoh/APi6Nc5qm7JmVdYoELqonwxBY04TwaVqR3m4UHXYTPD63
6YAGI1+f0GpmE/lgx1Dqbw7xMVh9a7aGCklN0oq7wG24NCWqopa0Gj7GPLbV
xMQgcxKagdBMaD5bowYL5KPT+4gkM0mTWEHEACBiL9Z6bePKED3NFcY/XNhq
cWBXQpiOoAtC+AxJVWrK8ldYSGM/dW8dxmtld1Bzm6ygHZkLehIChQxORCjI
lgudLNb1b4eBRGYJ1Q7qcC74ma2Mqwo/vNBa4FIqS20dV+rOD9ixcywe8dFy
fNjUzjBW3HGw8jNtqMjQoi0PZLIKk4lcF+frQCVSA/6jlTKjsYCUvFbMsiWR
6/izpKCyWdzjqmMPZi/naCjxHOs7wp4uxq7nBNfne1MOJqYy4dDZGM+D7mvS
0PZDDp6Zvun0pwGTDoGKdHvqhJzzCiFAt5vlQYenMAs0h7LtsuARTX5AWlFg
Miu2te1uI+UUZvkiAcEdI7YswTxs2LbpzO0GseBaw/aFTOYUFCR9tlDaxVa2
8S1mQzWpL+n3dytdZLouMB+IvB8Utg52r31DuqGzbk7x2nLaa+aw+3BO8edB
9/A4S4N7MCi1vZM/49g8GYGwdW9E+Pze2HxYGjrIjS/WDx7BhpuRqoea6R3g
vtIW9Xu94tN+4X0ljYC9DPx6/OyLGicqca4G6/aUaDpA34KmfKoP+bWlM40D
tAQ65VriT/RduBMngzvhRL8Zx8PLiHvODsIcixxB8NGAQ/N1I5x1tSrTcqrp
pcMOhbFVubn2FEWWMTR0Vk1sA3ZPQDHQ/bDJ0aACN0Gxb4L6bc6GISp4g4RT
p94O2hwPXpssBIb6hG1Il1xVC5O6HX8QMl01BtE9wxNSFpqyOxtyHbImQTPP
mB/vv9+/i7fGlHwXa35W08EAeMqFc5Km7g178Uq6K8dHMoe+PPTPkP4fxxO9
0wk6sBeX3UTQr5D9bbfyxQWPC+1xEIwiaoL2N3uC3+r/dfQwGSPxqCXXuA27
mMeR24ibcvGHEOI9jXhb/v6AIjN4FXWA3mLi74/4/r/P3ae/aBKEr8P6+LA7
y6L7Nzd83BpvsOP2NnoWpGyoKgMTbm6aIbDjgy0ih77rIggetKv188tuuy/w
2fqix356fAJvdcqxj2J/5zZC0WE77nPUXccdtZPmlztxu0vvWRnRiEc7P2C6
6+n5K0BoPn8IzfTHHThtQBO9HwB0TiSHYWMxhfuIPvYTeludqXROZdF5PvY/
fhBLprJMX4WeShZX4lAWWmXiZ7koxGtMh2C5HfFG6SsjzpPFf/89o6oGFvhF
X4FZxc9LWWqn1VInv/MJMp1T1PxTFU9fh83Lwzeaur1VFL03fk6BXeKIfxWx
598zulC9OoplbqduxZ8ll/zmlg32DcYBv/B14idVLWk42PbDnP5vcnZZ/Yc8
OaHQPwsqdAl5gDhmPS90jsauu3F5duzLKSz0TxzSeb0bvL9yYxZKxMgt1IbX
Zf2irothaQiD+NqhBsk89+//6XcM9x6qh8PAUEtDdlLBQLfBIcLCBr+JCDT9
0ImQBOwz+dgmxyD0f0e1iwuCJQAA

-->

</rfc>

