<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.31 (Ruby 3.2.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-suit-mud-10" category="std" consensus="true" updates="draft-ietf-suit-manifest" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="SUIT MUD Linkage">Strong Assertions of IoT Network Access Requirements</title>

    <author initials="B." surname="Moran" fullname="Brendan Moran">
      <organization>Arm Limited</organization>
      <address>
        <email>brendan.moran.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization></organization>
      <address>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>

    <date year="2025" month="March" day="03"/>

    <area>Security</area>
    <workgroup>SUIT</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>The Manufacturer Usage Description (MUD) specification describes the access and network functionality required for a device to properly function. This description has to reflect the software running on the device and its configuration. Because of this, the most appropriate entity for describing device network access requirements is the same as the entity developing the software and its configuration.</t>

<t>A network presented with a MUD file by a device allows detection of misbehavior by the device software and configuration of access control.</t>

<t>This document defines a way to link the Software Updates for Internet of Things (SUIT) manifest to a MUD file offering a stronger binding between the two.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>A Manufacturer Usage Description (MUD) file describes what sort of network communication behavior a device is designed to have. For example,
a manufacturer may use a MUD file to describe that a device uses HTTP, DNS and NTP communication but no other protocols. The communication patterns are
described in a JSON-based format in the MUD file.</t>

<t>The MUD files do, however, need to be presented by the device to a MUD manager in the operational network where the device is deployed.
Under <xref target="RFC8520"/>, devices report a MUD URL to a MUD manager in the operational network. The MUD URL is a URL that can be used by the MUD manager to receive the MUD file from a MUD file server to ultimately obtain the MUD file.</t>

<t><xref target="arch-mud-fig"/> shows the MUD architecture, as defined in RFC 8520.</t>

<figure title="MUD Architecture per RFC 8520." anchor="arch-mud-fig"><artwork><![CDATA[
    .......................................
    .                      ____________   .           _____________
    .                     |            |  .          |             |
    .                     |    MUD     |-->get URL-->|    MUD      |
    .                     |  Manager   |  .(https)   | File Server |
    .  End system network |____________|<-MUD file<-<|_____________|
    .                             .       .
    .                             .       .
    . ________                _________   .
    .|        |              | router  |  .
    .| Device |--->MUD URL-->|   or    |  .
    .|________|              | switch  |  .
    .                        |_________|  .
    .......................................
]]></artwork></figure>

<t>RFC 8520 envisions different approaches for conveying the MUD URL from the device to the operational network. Section 4 of <xref target="I-D.ietf-opsawg-mud-acceptable-urls"/> provides additional description of the MUD URLs sources, which include:</t>

<t><list style="symbols">
  <t>DHCP,</t>
  <t>IEEE 802.1AB Link Layer Discovery Protocol (LLDP), and</t>
  <t>Device Certificates, such as IEEE 802.1X, whereby the URL to the MUD File would be contained in the certificate.</t>
</list></t>

<t>The MUD manager must trust the MUD file server from which the MUD file is fetched to return the most up-to-date MUD file.
It must also trust the device to report the correct MUD URL. In case of DHCP and LLDP the URL is unprotected and not bound
to the device itself.</t>

<t>When the MUD URL is included in a certificate then it is authenticated and integrity protected. However, the certificate only proves possession of a private key and endorsements by the certificate issuer. This does not prove what software is in use, nor does it prove that the MUD file is the correct file for the deployed software: instead, the responsibility falls on the certificate issuer to identify the MUD URL correctly and to supply a MUD Signer correctly.
There is a need to bind the entity that creates the software and configuration to the MUD file. The developer is in the best position to describe
the communication requirements of the software it developed and configured for a device.</t>

<t>This specification defines an extension to the Software Updates for Internet of Things (SUIT) manifest <xref target="I-D.ietf-suit-manifest"/>
to include a MUD URL. A SUIT manifest is
   a bundle of metadata about code/data for an IoT device, where to find the code/data, the
   devices to which it applies, and cryptographic information protecting
   the manifest.</t>

<t>When combining a MUD URL with a manifest used for software/firmware updates then a network operator has
more confidence in the description of the communication requirements for a device to properly function.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
capitals, as shown here.</t>

<t>This document re-uses the terms defined in <xref target="RFC9334"/> related to
remote attestation.  Readers of this document are assumed to be
familiar with the following terms: Evidence, Claim, Attester, Verifier,
and Relying Party (RP).</t>

<t>This document also uses terms defined in <xref target="RFC8520"/>, such as MUD,
MUD file, MUD manager, MUD URL, etc.</t>

</section>
<section anchor="workflow"><name>Workflow</name>

<t><xref target="arch-mud-new-fig"/> shows the architectural extensions introduced by combining
SUIT and MUD. The key elements are that the developer, who produces the
firmware is also generating a manifest and the MUD file. Information
about the MUD file is embedded into the SUIT manifest and provided to the
device via firmware update mechanism. Once this information is available
on the device it can be presented during device onboarding, during
network access authentication, or as part of other interactions that
involve the conveyance of Evidence to the operational network. After
retrieving the manifest, the MUD file can be obtained as well.</t>

<figure title="SUIT-MUD Architecture." anchor="arch-mud-new-fig"><artwork><![CDATA[
                        ____________
                       |            |
                       |  Manifest  |
                       | Repository |
                       |____________|
                  get URL ^      | SUIT manifest
 .........................|......|..........
 .                      __|______v__       .       _____________
 .                     |            |      .      |             |
 .                     |    MUD     |-->get URL-->|    MUD      |
 .                     |  Manager   |  .(https)   | File Server |
 .  End system network |____________|<-MUD file<-<|             |
 .                             ^       +Signature |_____________|
 .                             .           .
 .                             .           .
 .                             .           .
 . ________                _____________   .
 .|        | Attestation  | NAS, AAA or |  .
 .| Device |-->Evidence-->| Onboarding  |  .
 .|________| (+ Manifest  | Server      |  .
 .     ^      Claim)      |_____________|  .
 ......*....................................
       *                                         //-\\
       *                                          \-/
       *                        SUIT Manifest      |
       +************************(+ MUD URL)    ----*-----
                                Firmware          / \
                                                  /  \
                                               Developer
]]></artwork></figure>

<t>The intended workflow is as follows, and assumes an attestation mechanism between the device and the MUD Manager:</t>

<t><list style="symbols">
  <t>At the time of onboarding, devices report their manifest in use to the MUD Manager via some form of attestation Evidence and a conveyance protocol. The device thereby acts as an Attester. The normative specification of these mechanisms is out of scope for this document.</t>
  <t>An example of an Evidence format is the Entity Attestation Token (EAT) <xref target="I-D.ietf-rats-eat"/>, which offers a rich set of claims. This specification assumes that Evidence includes a link to the SUIT manifest via the "manifests" claim (see Section 4.2.15 of <xref target="I-D.ietf-rats-eat"/>) or that the manifest itself is embedded in the Evidence. This Evidence is conveyed to the operational network via some protocol, such as network access authentication protocol (for example using the EAP-TLS 1.3 method <xref target="RFC9190"/> utilizing the attestation extensions <xref target="I-D.fossati-tls-attestation"/>) or an onboarding protocol like FIDO Device Onboard (FDO) <xref target="FDO"/> or Bootstrapping Remote Secure Key Infrastructure (BRSKI) <xref target="RFC8995"/>.</t>
  <t>The MUD Manager, acting as a Relying Party, relays the Evidence to the Verifier and receives an Attestation Result in response. This allows the MUD Manager to check that the device is operating with the expected version of software and configuration.</t>
  <t>Since a URL to the manifest is contained in the Evidence, the MUD Manager can look up the corresponding manifest.</t>
  <t>The MUD Manager acquires the MUD file from the MUD URL found in the SUIT manifest. The SUIT manifest contains the MUD URL and not the MUD file primarily to due the size of the MUD file. This also allows the MUD file to be updated rapidly in response to evolving threats.</t>
  <t>The MUD Manager verifies the MUD file signature using the Subject Key Identifier (SKI) provided in the SUIT manifest.</t>
  <t>Then, the MUD Manager can apply any appropriate policy as described by the MUD file.</t>
</list></t>

<t>Each time a device is updated, rebooted, or otherwise substantially changed, it will execute the remote attestation procedures again.</t>

</section>
<section anchor="operational-considerations"><name>Operational Considerations</name>

<t>This specification assumes that the software/firmware author provides a MUD file that describes the behavior of the software running on a device.</t>

<section anchor="pros"><name>Pros</name>

<t>The approach described in this document has several advantages over the RFC 8520 MUD URL reporting mechanisms:</t>

<t><list style="symbols">
  <t>The MUD URL is tightly coupled to device software/firmware version.</t>
  <t>The device does not report the MUD URL, so the device cannot tamper with the MUD URL.</t>
  <t>The author explicitly authorizes a key to sign MUD files, providing a tight coupling between the party that knows device behavior best (the author of the software/firmware) and the party that declares device behavior (MUD file signer).</t>
  <t>Network operators do not need to know, a priori, which MUD URL to use for each device; this can be harvested from the device's manifest and only replaced if necessary.</t>
  <t>A network operator can still replace a MUD URL in a SUIT manifest:  <list style="symbols">
      <t>By providing a SUIT manifest that overrides the MUD URL.</t>
      <t>By replacing the MUD URL in their network infrastructure.</t>
    </list></t>
  <t>Devices can be quarantined if the Attestation Result indicates that an out-dated or compromised software/firmware version has been used.</t>
  <t>Devices cannot lie about which MUD URL to use.</t>
</list></t>

</section>
<section anchor="cons"><name>Cons</name>

<t>This mechanism relies on the use of SUIT manifests to encode the MUD URL. Conceptually, the MUD file is similar to a Software Bill of Material (SBOM) but focuses on the external visible communication behavior, which is essential for network operators, rather than describing the software libraries contained within the device itself.</t>

<t><list style="symbols">
  <t>MUD Manager must be aware of the Status Tracker or vice versa so that the MUD Manager can obtain MUD URLs and MUD Signer SKIs from the Status Tracker. This implies a new API in the MUD manager or Status Tracker.</t>
  <t>The MUD manager requires a failover mechanism to trigger the status tracker to obtain a copy of the SUIT Manifest in order to extract the MUD URL if it is not already aware of a device. This could be done, for example, as a part of an onboarding flow.</t>
  <t>Attestation Evidence may convey the SUIT Manifest, in which case the Status Tracker becomes a Relying Party since it depends on Attestation Evidence. This workflow is expected, however.</t>
  <t>This approach explicitly moves the decisions about device behaviour away from the Network Operator and towards the Manifest Author. While this is appropriate when the Manifest Author is trusted, not all IoT devices are fully trusted, and MUD files enable a Network Operator to restrict their capabilities. For a Network Operator to override a device's manufacturer-provided MUD URL will require the MUD manager to have a mechanism to enable this override, which adds complexity</t>
</list></t>

</section>
</section>
<section anchor="suit-extension"><name>Extensions to SUIT</name>

<t>To enable strong assertions about the network access requirements that a device should have for a particular software/configuration pair a MUD URL is added to the SUIT manifest along with a subject key identifier (ski). Note that the subject key identifier refers to a more generic version of SubjectPublicKeyInfo defined in <xref target="RFC5280"/>, which refers to an X.509-based ski.
The subject key identifier MUST be generated according to the process defined in <xref target="I-D.ietf-cose-key-thumbprint"/> and the SUIT_Digest structure MUST be populated with the selected hash algorithm and obtained fingerprint.
The subject key identifier corresponds to the key used in the MUD signature file described in Section 13.2 of <xref target="RFC8520"/>.</t>

<t>Note: A key need not be in COSE Key format to create a COSE Key Thumbprint of it.</t>

<t>The following Concise Data Definition Language (CDDL) <xref target="RFC8610"/> describes the extension to the SUIT_Manifest structure:</t>

<t>The extension to the SUIT_Manifest is described here:</t>

<figure><sourcecode type="CDDL"><![CDATA[
$$unseverable-manifest-member-extensions //= (
  suit-manifest-mud => bstr .cbor SUIT_MUD_container
)
]]></sourcecode></figure>

<t>The SUIT_MUD_container structure is defined as follows:</t>

<figure><sourcecode type="CDDL"><![CDATA[
SUIT_MUD_container = {
    suit-mud-url => #6.32(tstr),
    suit-mud-ski => SUIT_Digest,
}
]]></sourcecode></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This specification links MUD files to SUIT manifests for improving security protection and ease of use. By including MUD URLs in SUIT manifests an extra layer of protection has been created and synchronization risks can be minimized.</t>

<t>Used in this way, the MUD manager presents an additional layer of security on networks where they are enabled. The MUD manager configures the L2/L3 infrastructure of a Local Area Network to apply restrictive policies to certain devices. The MUD manager only has the ability to elevate or restrict the network privileges of a device. Therefore, attacks on the MUD Manager cannot compromise devices, they can only enable a compromised device to access more of the network. Further security considerations related to the MUD Manager are covered in <xref target="RFC8520"/>.</t>

<t>If the MUD file and the software/firmware loaded onto the device gets out-of-sync a device may be firewalled and, with firewalling by networks in place, the device may stop functioning. This is, however,
not a concern specific to this specification but rather to the use of MUD in general. Below are two mitigations:</t>

<t><list style="symbols">
  <t>A manufacturer must update the MUD file in advance of network service or product changes so 
that the new services can be supported. Because the MUD file is accessed by a URL means that it can be subsequently updated. This requires a MUD file being retrieved again. This handles the case when the device 
is already deployed and in use.</t>
  <t>There is a possibility that an IoT device has remained on-shelf inventory for an extended period, resulting in its MUD file being inaccessible at its previous location. This necessitates a decision on how to implement a fail-safe tailored to the particular environment.</t>
</list></t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA is requested to add a new value to the SUIT manifest elements registry created with <xref target="I-D.ietf-suit-manifest"/>:</t>

<t><list style="symbols">
  <t>Label: TBD1 [[Value allocated from the standards action address range]]</t>
  <t>Name: Manufacturer Usage Description (MUD)</t>
  <t>Reference: [[TBD: This document]]</t>
</list></t>

</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor='RFC8520'>
  <front>
    <title>Manufacturer Usage Description Specification</title>
    <author fullname='E. Lear' initials='E.' surname='Lear'/>
    <author fullname='R. Droms' initials='R.' surname='Droms'/>
    <author fullname='D. Romascanu' initials='D.' surname='Romascanu'/>
    <date month='March' year='2019'/>
    <abstract>
      <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
      <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8520'/>
  <seriesInfo name='DOI' value='10.17487/RFC8520'/>
</reference>

<reference anchor='RFC2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>


<reference anchor='I-D.ietf-rats-eat'>
   <front>
      <title>The Entity Attestation Token (EAT)</title>
      <author fullname='Laurence Lundblade' initials='L.' surname='Lundblade'>
         <organization>Security Theory LLC</organization>
      </author>
      <author fullname='Giridhar Mandyam' initials='G.' surname='Mandyam'>
         <organization>Mediatek USA</organization>
      </author>
      <author fullname='Jeremy O&#x27;Donoghue' initials='J.' surname='O&#x27;Donoghue'>
         <organization>Qualcomm Technologies Inc.</organization>
      </author>
      <author fullname='Carl Wallace' initials='C.' surname='Wallace'>
         <organization>Red Hound Software, Inc.</organization>
      </author>
      <date day='6' month='September' year='2024'/>
      <abstract>
	 <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-rats-eat-31'/>
   
</reference>


<reference anchor='I-D.ietf-suit-manifest'>
   <front>
      <title>A Concise Binary Object Representation (CBOR)-based Serialization Format for the Software Updates for Internet of Things (SUIT) Manifest</title>
      <author fullname='Brendan Moran' initials='B.' surname='Moran'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         </author>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Koen Zandberg' initials='K.' surname='Zandberg'>
         <organization>Inria</organization>
      </author>
      <author fullname='Øyvind Rønningstad' initials='O.' surname='Rønningstad'>
         <organization>Nordic Semiconductor</organization>
      </author>
      <date day='24' month='February' year='2025'/>
      <abstract>
	 <t>   This specification describes the format of a manifest.  A manifest is
   a bundle of metadata about code/data obtained by a recipient (chiefly
   the firmware for an Internet of Things (IoT) device), where to find
   the code/data, the devices to which it applies, and cryptographic
   information protecting the manifest.  Software updates and Trusted
   Invocation both tend to use sequences of common operations, so the
   manifest encodes those sequences of operations, rather than declaring
   the metadata.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-suit-manifest-33'/>
   
</reference>


<reference anchor='I-D.ietf-cose-key-thumbprint'>
   <front>
      <title>CBOR Object Signing and Encryption (COSE) Key Thumbprint</title>
      <author fullname='Kohei Isobe' initials='K.' surname='Isobe'>
         <organization>SECOM CO., LTD.</organization>
      </author>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
      </author>
      <author fullname='Orie Steele' initials='O.' surname='Steele'>
         <organization>Transmute</organization>
      </author>
      <date day='6' month='September' year='2024'/>
      <abstract>
	 <t>   This specification defines a method for computing a hash value over a
   CBOR Object Signing and Encryption (COSE) Key. It specifies which
   fields within the COSE Key structure are included in the
   cryptographic hash computation, the process for creating a canonical
   representation of these fields, and how to hash the resulting byte
   sequence.  The resulting hash value, referred to as a &quot;thumbprint,&quot;
   can be used to identify or select the corresponding key.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-cose-key-thumbprint-06'/>
   
</reference>

<reference anchor='RFC8610'>
  <front>
    <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
    <author fullname='H. Birkholz' initials='H.' surname='Birkholz'/>
    <author fullname='C. Vigano' initials='C.' surname='Vigano'/>
    <author fullname='C. Bormann' initials='C.' surname='Bormann'/>
    <date month='June' year='2019'/>
    <abstract>
      <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8610'/>
  <seriesInfo name='DOI' value='10.17487/RFC8610'/>
</reference>

<reference anchor='RFC9334'>
  <front>
    <title>Remote ATtestation procedureS (RATS) Architecture</title>
    <author fullname='H. Birkholz' initials='H.' surname='Birkholz'/>
    <author fullname='D. Thaler' initials='D.' surname='Thaler'/>
    <author fullname='M. Richardson' initials='M.' surname='Richardson'/>
    <author fullname='N. Smith' initials='N.' surname='Smith'/>
    <author fullname='W. Pan' initials='W.' surname='Pan'/>
    <date month='January' year='2023'/>
    <abstract>
      <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9334'/>
  <seriesInfo name='DOI' value='10.17487/RFC9334'/>
</reference>




    </references>

    <references title='Informative References'>



<reference anchor='RFC9190'>
  <front>
    <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
    <author fullname='J. Preuß Mattsson' initials='J.' surname='Preuß Mattsson'/>
    <author fullname='M. Sethi' initials='M.' surname='Sethi'/>
    <date month='February' year='2022'/>
    <abstract>
      <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9190'/>
  <seriesInfo name='DOI' value='10.17487/RFC9190'/>
</reference>


<reference anchor='I-D.fossati-tls-attestation'>
   <front>
      <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         </author>
      <author fullname='Yaron Sheffer' initials='Y.' surname='Sheffer'>
         <organization>Intuit</organization>
      </author>
      <author fullname='Paul Howard' initials='P.' surname='Howard'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Ionuț Mihalcea' initials='I.' surname='Mihalcea'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Yogesh Deshpande' initials='Y.' surname='Deshpande'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Arto Niemi' initials='A.' surname='Niemi'>
         <organization>Huawei</organization>
      </author>
      <author fullname='Thomas Fossati' initials='T.' surname='Fossati'>
         <organization>Linaro</organization>
      </author>
      <date day='21' month='October' year='2024'/>
      <abstract>
	 <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using attestation which is
   a process by which an entity produces evidence about itself that
   another party can use to appraise whether that entity is found in a
   secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enables the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and mutually.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-fossati-tls-attestation-08'/>
   
</reference>


<reference anchor="FDO" target="https://fidoalliance.org/specifications/download-iot-specifications/">
  <front>
    <title>FIDO Device Onboard Specification 1.1</title>
    <author >
      <organization>FIDO Alliance</organization>
    </author>
    <date year="2022" month="April"/>
  </front>
</reference>



<reference anchor='I-D.ietf-opsawg-mud-acceptable-urls'>
   <front>
      <title>Authorized update to MUD URLs</title>
      <author fullname='Michael Richardson' initials='M.' surname='Richardson'>
         <organization>Sandelman Software Works</organization>
      </author>
      <author fullname='Wei Pan' initials='W.' surname='Pan'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Eliot Lear' initials='E.' surname='Lear'>
         <organization>Cisco Systems</organization>
      </author>
      <date day='6' month='September' year='2024'/>
      <abstract>
	 <t>   This document provides a way for an RFC8520 Manufacturer Usage
   Description (MUD) definitions to declare what are acceptable
   replacement MUD URLs for a device.

   RFCEDITOR-please-remove: this document is being worked on at:
   https://github.com/mcr/iot-mud-acceptable-urls

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-opsawg-mud-acceptable-urls-12'/>
   
</reference>

<reference anchor='RFC8995'>
  <front>
    <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
    <author fullname='M. Pritikin' initials='M.' surname='Pritikin'/>
    <author fullname='M. Richardson' initials='M.' surname='Richardson'/>
    <author fullname='T. Eckert' initials='T.' surname='Eckert'/>
    <author fullname='M. Behringer' initials='M.' surname='Behringer'/>
    <author fullname='K. Watsen' initials='K.' surname='Watsen'/>
    <date month='May' year='2021'/>
    <abstract>
      <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8995'/>
  <seriesInfo name='DOI' value='10.17487/RFC8995'/>
</reference>

<reference anchor='RFC5280'>
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname='D. Cooper' initials='D.' surname='Cooper'/>
    <author fullname='S. Santesson' initials='S.' surname='Santesson'/>
    <author fullname='S. Farrell' initials='S.' surname='Farrell'/>
    <author fullname='S. Boeyen' initials='S.' surname='Boeyen'/>
    <author fullname='R. Housley' initials='R.' surname='Housley'/>
    <author fullname='W. Polk' initials='W.' surname='Polk'/>
    <date month='May' year='2008'/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='5280'/>
  <seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>




    </references>


<section numbered="no" anchor="acknowledgements"><name>Acknowledgements</name>

<t>We would like to thank Roman Danyliw for his excellent review as the responsible security area director, Bahcet Sarikaya for his Genart review, Michael Richardson for his IoT directorate review and Susan Hares for her Opsdir review. During the IESG review Robert Wilton, Eliot Lear, Zaheduzzaman Sarker, Francesca Palombini, John Scudder, Paul Wouters, Éric Vyncke, and Murray Kucherawy.</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA7VbbXfbNpb+zl+Bk8w5a6eiHDttp/G2nVViZ+KpE3ttp53d
drYHIiEJY4rUAKRdNUm/7+/aP7bPvXghKNlJunNWHxJLBC4u7vsb8zzPWt1W
6lBctqap52JirTKtbmormpk4aa7Ea9XeNuZaTIpCWSsu1D86bdRS1a3N5HRq
1A02vzm5Eq/eHIlTXV/Lucq6VSlbZQ9FaeSszbVqZ7ntdJsvZa1nyrZZ2RS1
XKo7VnRlvv84K7B/3pj1obBtmWV6ZQ5FazrbHjx+/PTxQSaNkjhYFZ3R7Toj
FOem6VYOmexarfFTeShO6laZWrX5EZ2TZbaVdfmzrJoaZ6+VzVb6MBPCzApV
2nZd+V+FaJsi+VPXJW4cfrCNaY2a2fh9vRx8bY0u4uKiWTK1wnddV7ruj1G/
tHmlbZsDyLSpsCxvHn2GJ6DQUq5Wup67tZns2kVjgG2Op/TRNVY/G4tXjZG1
/80R9ZlRdSnrwZPGzEH8XyVx91BMzBLcWupWlf65WkpdHYqp2zpe0tYx8eXf
5vRkjHtkG2e/HIsrWyyamar1fIDAS1nXym4/HSIxPHnBe8Zt3IODfxmDd1lW
N2aJPTeKeHXx4vlXXxw89n8e7O8/Db/u//Fz+vMkP2LEcyNbmyvZDn4cyOHg
SdFYlUNy8nbRLacro+s2QP5yP5z39MkTHKLr2QZKT/efPg7QZo21eJa3lc1l
C0Vo3YXx+MXR2SFfO3Iz0OVQvDg5OhOTqtKyLhQ/8MrJD47UjS6UOKunjTSl
uFypQs90wZDF/nifN5DagbnAvRIHjw8OHBRp5gryuGjblT3c25vpspH+mDFO
3rMpLLtXNrd11cgy1w3Ecvgsy/I8F3IKGZcFOHO1UOKVrLsZvnVGGfHGwgAA
WVsYvWLcdmAZdsUAjij5+RQi0gKAdLYFmilqb25mXV3QSllBvYVxVqcUoLqQ
2M2kaBuxMs1KmWod10MiF9p6+O78hbS0FBpaqaLlA20za29hQoTp6hoaJrCM
fveACRHdWqhuPdPzzkgH+ZkqZGcVWcYWh4x4y7KxrYCeAhGjQX0BXSeUCVN/
SzrAQw7X8zc2iTUV2hHDQoGEdH97WNisqoZMwRD7u/HMskk8Z2WUBRBQ7la3
C5COrPRMV0pM1z0hIQzNLRGtVUxEuuFS26layBuNe2BtQp3B8YOjaZ+/GX6H
R6nGJCHEj6bo6JaAMdNkGaS4lWtiC4zhNUO/DGDfOOfBFAzmmyADUD23YocM
/K4IGkwwkms1s5kyRChJZhguDSIJBpT00xREUcpxGuQZO1le6rKsVJY9pMNM
U3ZMAiLiJ8k1n9qL8+1CtuwfCOPABXIBXR1kP5I10t8JrJ7X4BOug8dqLF5g
hfpFLleVGmWS7tsjswTtSBKTi2NfwAIXBBIROhZa8fLq6nwkjl5fMtdeX51v
ItW1om5EA9oY0ir4PDgj0ia1sXJFFs0gQACvsnAk5LDGiX+5PHudT6V1mgr7
SD8TuQOaY28x/FcSjJFYNLcQcDMCvRwBcIVecIfCF7kNekhirj+AzIB0BiOS
/RZ3UelmpvOqataqHGdv4NKNePvWu5P370d+GanlijjoDnpzcfp7TnUkCxs1
STpDIJYUkrhPDInXSoGykSoUfMqAZmJmmmXKaoRoN255V7UaVFYwgM20ldvE
fvtWmmLBQRXU9P17YRek6WEVPdSk9JCqERkdp57MTdBFEGEA5bfffmNHMv60
j1sr7vz8nHw2VqWPfv4AjHcbX8b3PBLvPgaESMBf8vxbeEhiFP4aPPoYkFee
dw6THXaxu/ztBbHq0rEqAjmG8tm1bdUySum79Nrvvs4D977Ovx48+vlDmIRP
ePpBHtyzNmHL4DPgl1sb6TwkOL4iBm+JHO+StT5yAZXzb71ieDI3xgMJa+Nd
N+Fa+K9ika6971o90fq1nyi3JOdvD8XDVGdcDPbNA0J8kqiLgOr3OvLgfZaF
L/DaN9pyDlVqckfk9zhCkMXC+zW4xxu1Dg49WAtW9KGxu9fKXHpX/Tk5mrdv
/xSj2GZl5e2c0SdfvGrltFJ5ZyoL9QcSN7ok/1uW2oNMYyUObSJCFp6sM7CI
I9hSDfLruqi6EiFvloujl8/PR/j/5Pj4WHz1+GC8P3nGCaA4lWvQ5kjbooHw
r8W5dydi5/T06Hx3RC6IALhLPqeEkwNDOsd2OAaGqIf615Ez5N5genMcsGQt
u226qiTLSlGHDAaMlhQ98MT1BIO77Ch+MPxvanC9gWV2uIsPHsOozxSk0Tkr
oyAOdR8Ldqu8bXIKYRJDfNK6w2Rlm+TEns/e5TDOjTEUqHomjBGXwHO4uJOI
zh6cKBnpAYS6mpw2tgEpjqObVkybDoT2xAousLWqmoEWPyxUPRA+APHs9c48
oR0trLGX/VlHX1r+3Z2FPEnNKQ0XEYexeBmc+gYbEGpXvPAGUrhCooRoMYSO
+Fnf0BokYQwZqWhjrI+PvQCksLS1nTIh5m8Ake7NwEMk5oNKvh15XkQZFJnT
Wh2WsnPeZHHKCueGsc9R0oUQEfghZcOtkqW7LCKXFZQfcT/nLjNE1zYkGNvI
E/M1FRf0bD3ghz+7cpTAKtutVvSNV1xStGj6RWMSbndP2cdRmnb2eYQLQozi
8HorkxiG8omOsQhzWOMTEQqAbFCxKQXhYKQO20JMmLVbseMg3/G2pmdRG+GX
A4Q28r6QU2xmlD6xqBE1t6q2ySX+r6nF27d3Vw3evyet8trSh4ljMXGlsAhA
U4kHC6ZQRE5OxFK1EjhIpNDwlLhiqfb4O9+w5pKbu+YoxK8NGOD5GJezpBHs
ELJilTfR7GsqTcaUiWjWq7aZG7nCYxHrFhTIO2XFzQkQ2y+PNygs2D6Ae5Ah
l04FufSJZLxj56P9yMi9mTZLJrcvAzrrIWPE4/wZdiAzz5aNUY7TUAIyUCET
33JKHxClj5cFKL+7Umap66Zq5mvnC8jMUJnQCrj3y6sHI/e/eH3Gf18c//ub
k4vjI/r78uXk9DT+4VZk+HL25tQ/p7/6nc/PXr06fn3kNuNXsfHTq8l/PHCO
8MHZ+dXJ2evJ6QN39zRblo7/U8U21iApYptrRZp3Zc/gE/Y/d6kMlcPg511a
s//Hz/E3xKh2ssCm130FQdckKEpyMgMblRVypVs4KE4EKE+oBQngVgpvEE1Y
b0CA1HKQNfDBVCPDwUZV7CPaJgOjIGwiKYYhfruAyVTGhnrK8NoS1nEZ0sFs
JpewpsCVpY9OnjVUtOAIinA4FMc3ToJG4nkl9XIkJnwYuaDvlYGhwF8ZUeEC
6RLtO5cGNnHn4nx364rspt0l77xgSBhDtALdGGXBVI7SGGMU9GYkEDKwGP4A
HZgB90F2VqvbrQwtyc4QpkWrRpbXFSpcGhmVNGPjQ1fEmc5gk4SrymsJS1Nw
ddGUk51hjSGAfHAWFZi8CZFirmoOQdkQRM2X3ir1PuKkNy+ZM3CbXlUtIbQu
xAjGeWAxCaYPUktvvjOv1zcaVnJoWmBOiwW22uVYnJH1YDlKjRzd4EbqioLg
bFjl0zEh74sNZWeSal3jaq34ZeSfZBsFvCQYwmkjSmggDivp6j+umsKqKwvX
VSH6Z7q+aSqf5btMgEqxtCMI8QdD/8kMAKFSrdHA0+cQgYKjIcn9DV11wNmO
W1VVSVJ/12crE78rzxp8+cCqV4G3H1p1oTiEaJAu3L9qOxsefnwOL/4rQB3I
VnZ/Hvhu8J+rYdxbwPBo3MRMeRwfDcj2adWLBMBW9eKfL13883WL31+0+LRb
hI/nlfiMIlrJmfVW2ePT6hj89//v4o+WSPoySVojmfRuj76+nlzCO00mZC3e
hcV9keTbYASYoWfRBom4uC9w7HyWqldgmz+2v6AnMjvGXf94SGS3mD+PPrnG
h8+jDxIw/ezt5T/99Pu3iZ/yvY/ucg3oSAi+X9j02aN7PkQ755uZJDk+j+if
/F6zGD4vghfqLyd++uiu7c+e+P3bjoLf3q5W+RgiVKyIKPlm2YorVRQZkFeq
ycne+nCEXaX1cZVPHlwQxklVErr1XnfQUkmaZ8EFeStzmGVg3cRFA61esqsb
ONdh4R3LtEmyKE7c04w0WC8KCWyz5Nx8ySWEBMvoS/kmqaMN/Y2Y1HLa4ItM
8NRMCNw5RJBuXWxCb2SeLj2xSTDCvTyKfvDIFmCWrx0kISalWCIHUerQ5GH0
E6xDA8XFgscug08tyVVzDcrvHE+QsiaZamh6U3zqUkLuiVFdwNA361LegmyB
9aWT4YUC1zlWjPj4dJfguJ7dXeEbMYR+fRB+sQ/cSWLHKtUXLccH4/0vXOXy
DsR3BZPLR6q9HHDtaiOKdNTxSPrr9Dhbz/YYTN7ZKIpiFASjj+w/GO/F9WJn
1nfrIKwhKDuenOdXp5dif/yEMv9FU/oEaf8p8gfRtUhqfg2LU9lNgn1HoXtG
CjytIDe9OvVYVfpa3Tk8sPPi6IyEBv8BDQB41jQttfR53gTBGGdrPF2jxHfI
IRDYG4kFnat97zy7uPzuhCD8ibKhp0+/eP8+SPTVUEdHpFCcOJDkDHKvEWeI
aztgYeBTyNlYe31bLFFKR6YLZbuKDYQvugUJ8B3tTXsB2MVCFdeDNMh3Br1g
ALmYY6pfVq6iCqcaipT3l8wCAS41G520Up0UhLZr1H3iuokuBe9V01wj2+nL
kXRPZnNSrXm0SXUQncsjdpgNxAZD7DhQiTggMlBlZ/OG2u1RtwMQodo8OGhl
9FIaXXGLv+xcqmP1ryrtMIS6YsgyN5gW2trTkO1BDuRKlwCaMJxWKEqnnBpR
cdOO7yDIjZOnDfA2Bp290l52079T0Zfl3lVmSQ53WOJjbnonzdy59d2clK58
W68H4yKrptLFeljTSXrDvo97LKkJQZ4zHRrwZCE9mkKB6S/oMmedtxqksd2U
5t1aDcquBTmnOa1B4nurK6ooQMFdcV9sF2joqoVC2ktqNwfbuXhxlpjP51Tl
Lv13e2dVduBK0mpvXyR0g1BJZyphPu0ajgrF4YnN6nEyyZMUih8+pO6TdSFP
6MENqmcbpScaFrLUuMD9ZHkD4oF/MA7ccAeM2OQL4u9CFtbH6P4PU430vZVW
zxdUzC+aDj6idIXywTxNTxJvboIY+3Wxv5H0imJxyQ66PBA3Vkn4I5XUzEKd
2sP1lIeVgwhq7jTwL1BTYgPVjqjtABXpBzZGnlGuFMSXclfaHLBZcXWNOXhd
u+kiRq0fKiKLstP2eGxwNJJjN4aUCcxSIawg0dwEuzPQbWV26bavNyrPxHAm
ZeiUEIoj14DC/UPglIx/UADKPt7JD535r050fIVlIZF6WTJSG13cf7HD6hYX
YcHCSlL9TtOUEIUW0qwJ08l2lZwOsC0prN+VFOO5UTewQYfkhR6JZ+sBo4Z2
nClIIm1Y4wai4Te7ozYb1M7oITYPSOpBXMCe6MjH8p4u/+ikIRNUu8sStDs9
eOk6wA43ime6NndGn9vlS9xmqW3SddtSF9bdKckftSTGQ1SI2ZVWvu1yF3ud
tXjeW7I+y0GYQp7Dlw/9COCApNyAgRNvSjUgJ8GjHnxHFnijNEfGUi81xNjN
F8Uu1TPiNU54hevDSSC6vHx29mqXZ7RmMFS2x4XiREO2mCYOptVmkyRoRezf
I3S2VOokqCTOm8IG/cb/CzZ2Mo5pbg0eVnpq4N5VGs2QldEbBVbfa3408IXc
CIdkSAbltf4S8tBZcWVkcY01DeV2hWOtdMYtadGmXtXPPcWJBV/+Dg1SOG3b
a+TwFB976CW3y7hBdSsm5yfp0FoYFQBCG5sTEx8W+Z4UgZpJXbHT6KWIYkGj
53PvSawD1/ob46m/CqWqq3UkzKC0gceNKd1y8J7KykMFnfkuPcm7rBANleue
0NExuosXYWyibGpEn0kKM3LReqhjD9MLKhaMBdmqu5JtGk10Odc2+iPC30ki
DzTcwfipggSrrVQBmlIXvkW8UnXJCnDX+f5qaVEjRPFx0NCxjqLOEBAkLnDJ
gwlOigs/xuOMxtDTdIbouu5lK/iYs2C3XdsetC+9iQ1MnLC/G4sfFi7I0Vwv
SIPC2zicMdzDgQRNj9BtHIurpGXsWjyzjqK9uCwohJu3VDV1QkDeLXR5CMW9
uuCNfCFXkocYoB1uHvXubcGTRPlyLi+Oq+YxaO57yOzNWFu2VM1PwFKnKdUd
jzmTK5wY7JosS8tOolK/0OsgCFSP+wwam1kM3z7kLn7MrakSFuG6aWEKWMML
MH0D60NT28NZW7tgnWL8XVOadEgXHVn56LmGkxYrqU3q0nk4qy9YbPTHqiZk
qJLie85UKFLTSaZir/XuWLxu2qTfd89ao7g2xA6IW/Hc6tNFmvL6hOi8m0JJ
kBVRl2/YEqUqwBcHXz3ua04J3Fr8dfzF46d+Lhi48azKfQhxA36qQsuRWlYF
8l62PJ4inJjYja7sh97ieP8+hpBEzZ+P9Jxo2dczwqGrZtW5nnWMmeHCXA0A
0QVoXs0RH7aLpQvlQlcNeMypPa+psPeBy/UJvA2XoRU8QpE4nT4rHUyX85pQ
Qtt/Mj5wBbTYj4anJZ4fIogkqBzb8hwYT1U8P7s85pzWFxapFsKjQOB8fHYV
aUawdeuH5vpmO8UzlFoe0czKETHAzf2cIrfsaEJ+5/nR0emuR+vLfSpzDTO4
7ekcYkk0dJEph+7ojyzXad5MFdxD7mwSEtkf/tDVLpejCcigQvmSqocmT0ps
e3vfiB16cSsd8qGSuvjmW0GvuohxMaUIgI9+c/RziHpMtstl+OwqIpY+TSRM
9+LaF9kTXO/Y/I14y82B+FpcZypC6OGX4ycHO1Su2x0NF0C3aEEi46PsvUPw
YXxX7lPSdirw2sRrBAvah7tk3PSSDTukwgbYYaaIsnCa3/NjixReU1bhasi0
I8ZrJNJD0G6Cy0hR8RwptidQY4zvZNcNitl1XSxgvv2LZcJoex0TkCVEdImU
FhlB9sYmOT+892jL+fhRANfy6GdkIyrxpjjGuwXbv2iwZgfsPEo53ooP40Cb
04TTg73TJxsplAvTTpsCh05wxehwyZJyASk4aWpEcPFIOwbRaCGFjz4U2D6d
E8+Ff7NI+ulEcqyV4qHLxgwCgOQdIn0DKeAyyDCGxK0hBxQtti3Ct5iVbMTo
ZIP6DC4g6GeQOIYnzGJkkiZ7yVsfzveyj/KhcRyIeNEZzlkic4qBiCeDSFvo
SZ4+g43Ymu6BuJwMa5XRiWynoPS6HKWqYajF4z1XLTeC8maWk5D2gQKFyVOy
70bdIohzgjxybif8yCWVdS9mwI/z/1F6BAGybbOKo27YFRIb279bk3G0SISB
nNRR3R1JtvSfMs2QBzZp0kukABrOOVf0ShwF2TxYdNtA1Vo9dzTnEfHJxltL
HY9Hl36gOMmEa1drczMwQe5oCpuncIyfTmp9CZPG0kUWIxvK2vzaqPQ0K9sY
HkQOb+1t5t5OoFy11RXrl0r6CZ1kNohqqIj3YBMgo77g6umbpHv9a3WKuOZn
c4irXDl164F8WXnd5/wnhvmelxlXwl3SFqeM3YS1r1DkTuvcmC9NT4cp41A2
6ZMBVnVD79bWLJm5XXD3DKlZzXM2fuKU/SAJLyJ63XAxmUoydA1d8+uFG5fT
tSMd1xuYVpbMJuVEFopQyOQ9TFfb0i2XdmRMqchQQDJ59pmCdjd0x0lzbuUM
zKL02fQqm0TR9HYFbL1voj4UJ5PXky2fxj96FrmqHJmQsvRJ/o2sOnV3gB2n
5Yyaa1jDdfQ0rJv3jwSzxJ/KqaoOxdWzo33x44/f8zHU1nDD8jFX5LfQOTGU
3lmWpeHUguT7b38DpNf8HvWnvIKIxReKXzMpsOPHH3H4oRjMMwIgv+o4hZEm
kk0KqnfC6Mz9i/xvD0XdUVSkym8e1A3NCPwQXqvgJiKTStbX4qLBjRH91etK
37IILTjFLhSMGA+H3mgQ2HuZOArPL1V440yv7otS09w6VaaeyUWhWnEpjb6W
axlh/hkOwQSAI/EKWYVUlbig/0E53D6sZJn38Mi2BBygOJedBbovuVLMy0HG
s5XFar9qLI7cyB+he3J8+eew+6IBOVrxg65aGuw7rjQM6KmSwPg/5UKV3a+/
SiIF8L6mLucLQ/bLFlKcI0fjicyR+EuzwIqiQz6HJeeyq8QP/IIULPP//Del
Wd/DK1wrn6V3xsCaf9cVQFPersfZ/wKGP+eVoUEAAA==

-->

</rfc>

