<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-csr-attestation-25" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="Remote Attestation with CSRs">Use of Remote Attestation with Certification Signing Requests</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-25"/>
    <author initials="M." surname="Ounsworth" fullname="Mike Ounsworth">
      <organization abbrev="Cryptic Forest">Cryptic Forest Software</organization>
      <address>
        <postal>
          <city>Sioux Lookout, Ontario</city>
          <country>Canada</country>
        </postal>
        <email>mike@ounsworth.ca</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>Siemens</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="M." surname="Wiseman" fullname="Monty Wiseman">
      <organization/>
      <address>
        <postal>
          <country>United States</country>
        </postal>
        <email>mwiseman@computer.org</email>
      </address>
    </author>
    <author initials="N." surname="Smith" fullname="Ned Smith">
      <organization/>
      <address>
        <postal>
          <country>United States</country>
        </postal>
        <email>ned.smith.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="05"/>
    <keyword>PKI</keyword>
    <keyword>PKCS#10</keyword>
    <keyword>CRMF</keyword>
    <keyword>Attestation</keyword>
    <keyword>Certificate Signing Requests</keyword>
    <abstract>
      <?line 84?>

<t>Certification Authorities (CAs) issuing certificates to Public Key Infrastructure (PKI) end entities may require a certificate signing request (CSR) to include additional verifiable information to confirm policy compliance. For example, a CA may require an end entity to demonstrate that the private key corresponding to a CSR's public key is secured by a hardware security module (HSM), is not exportable, etc. The process of generating, transmitting, and verifying  additional information required by the CA is called remote attestation. While work is currently underway to standardize various aspects of  remote attestation, a variety of proprietary mechanisms have been in use for years, particularly regarding protection of private keys.</t>
      <t>This specification defines ASN.1 structures which may carry attestation data for PKCS#10 and Certificate
Request Message Format (CRMF) messages. Both standardized and proprietary attestation formats are supported by this specification.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://lamps-wg.github.io/csr-attestation/draft-ietf-lamps-csr-attestation.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-csr-attestation/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/lamps-wg/csr-attestation"/>.</t>
    </note>
  </front>
  <middle>
    <?line 90?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Certification Authorities (CAs) issuing certificates to PKI end entities may require a certificate signing request (CSR) include verifiable attestations that contain claims regarding the platform used by the end entity to generate the key pair for which a certificate is sought and also contains claims of attributes of the key pair with respect to its protection, use and extractability. At the time of writing, the most pressing example of the need for remote attestation in certificate enrollment is the Code-Signing Baseline Requirements (CSBR) document maintained by the CA/Browser Forum <xref target="CSBR"/>. The <xref target="CSBR"/> requires compliant CAs to "ensure that a Subscriber's Private Key is generated, stored, and used in a secure environment that has controls to prevent theft or misuse". This requirement is a natural fit to enforce via remote attestation.</t>
      <t>This specification defines an attribute and an extension that allow for conveyance of verifiable attestations in several Certificate Signing Request (CSR) formats, including PKCS#10 <xref target="RFC2986"/> or Certificate Request Message Format (CRMF) <xref target="RFC4211"/> messages. Given several standard and proprietary remote attestation technologies are in use, this specification is intended to be as technology-agnostic as is feasible with respect to implemented and future remote attestation technologies. This aligns with the fact that a CA may wish to provide support for a variety of types of devices but cannot dictate what format a device uses to represent attestations.  However, if a certificate requester does not include the number and types of attestations required by the CA, it is unlikely the requester will receive the requested certificate.</t>
      <t>While CSRs are defined using Abstract Syntax Notation One (ASN.1), attestations may be defined using any data description language, i.e., ASN.1 or Concise Data Description Language (CDDL), or represented using any type of encoding, including Distinguished Encoding Rules (DER), Concise Binary Object Representation (CBOR), JavaScript Object Notation (JSON). This specification RECOMMENDS that attestations that are not encoded using the Basic Encoding Rules (BER) or Distinguished Encoding Rules (DER) be wrapped in an ASN.1 OCTET STRING.</t>
    </section>
    <section anchor="relationship-to-the-ietf-rats-working-group">
      <name>Relationship to the IETF RATS Working Group</name>
      <t>As noted, attestation-related technologies have existed for many years, albeit with no standard format and no standard means of conveying attestation statements to a CA. This draft addresses the latter, and is equally applicable to standard and proprietary attestation formats. The IETF Remote Attestation Procedures (RATS) working group is addressing the former. In <xref target="RFC9334"/>, RATS defined vocabulary, architecture, and usage patterns related to the practice of generating and verifying attestations.</t>
      <t>In its simplest topological model, attestations are generated by the certificate requester and verified by the CA/RA. Section 5 of <xref target="RFC9334"/> defines topological patterns that are more complex,
including the background check model and the passport model.  This
document may be applied to instantiating any of these topological
models for CSR processing, provided the required security
requirements specific to the context of certificate issuance are
satisfied.</t>
      <t><xref section="4.2" sectionFormat="of" target="RFC9334"/> defines several roles that originate, forward or process attestation statements (also see <xref section="1.2" sectionFormat="of" target="RFC9683"/>): the Attester; Endorser; Relying Party; and Verifier. Attestation statements, such as Evidence, may be directed to an entity taking at least one of these roles, including to an CA/RA acting as a Verifier.
An CA/RA may also forward attestation statements to a Verifier for appraisal. Each attestation statements may contain one or more claims, including claims that may be required by an RA or CA. Attestation statements transmitted by these parties are defined in <xref section="8" sectionFormat="of" target="RFC9334"/> as the "conceptual messages" Evidence, Endorsement, and Attestation Results. The structure defined in this specification may be used by any of the roles that originate attestation statements, and is equally applicable to these three conceptual messages.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document re-uses the terms defined in <xref target="RFC9334"/> related to remote
attestation. Readers of this document are assumed to be familiar with
the following terms defined in <xref target="RFC9334"/>: Evidence, Endorsement, Claim, Attestation Result (AR), Attester, Relying Party, and Verifier.
Per <xref target="RFC9334"/>, the CA/RA is the Relying Party with respect to remote attestation. This use of the term "relying party" differs from the traditional PKIX use of the term.
This specification uses CA/RA to refer to an <xref target="RFC9334"/> Relying Party, which may or may not include an integrated Verifier.</t>
      <t>The term "Certification Request" message is defined in <xref target="RFC2986"/>.
Specifications, such as <xref target="RFC7030"/>, later introduced the term
"Certificate Signing Request (CSR)" to refer to the Certification
Request message. While the term "Certification Request"
would have been correct, the mistake was unnoticed. In the meanwhile
CSR is an abbreviation used beyond PKCS#10. Hence, it is equally
applicable to other protocols that use a different syntax and
even a different encoding, in particular this document also
considers messages in the Certificate Request Message Format (CRMF) <xref target="RFC4211"/>
to be "CSRs". In this document, the terms "CSR" and Certificate Request
message are used interchangeably.</t>
      <t>The term "hardware security module (HSM)" is used generically to refer to the
combination of hardware and software designed to protect keys from unauthorized
access. Other commonly used terms include Secure Element, Trusted Platform Module, and Trusted Execution
Environment.</t>
      <t>Since this document combines terminology from two domains, Remote Attestation (RATS) and X.509 PKI, it follows a naming convention to avoid ambiguity.
RATS terminology is written in uppercase (e.g., Verifier), while X.509/PKI terminology is written in lowercase (e.g., certification authority (CA)).
This distinction clarifies terms that exist in both domains; for instance, a Verifier refers to the RATS entity that processes Evidence, whereas a verifier refers to the PKI entity that validates certificates.
This convention is distinct from camel-case identifiers like "AttestationStatement", which denote ASN.1 types.</t>
    </section>
    <section anchor="sec-attestationAttr">
      <name>Conveying Attestations in CSRs</name>
      <t>The focus of this specification is the conveyance of attestations to a CA/RA as part of a CSR.
The following sub-sections define formats to support this conveyance, an optional mechanism to limit support to specific attestation types at the ASN.1 level, and bindings to the attribute and extension mechanisms used in certificate managment protocols.</t>
      <section anchor="attestationstatement-and-attestationbundle">
        <name>AttestationStatement and AttestationBundle</name>
        <t>The <tt>AttestationStatement</tt> structure (as shown in <xref target="code-AttestationStatement"/>) facilitates the representation of Evidence, Endorsements,
and Attestation Results generated by an Attester, Endorser, or Verifier for processing by a Verifier or Relying Party, such as verification by a CA/RA.</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>type</tt> field is an OBJECT IDENTIFIER that identifies the format of the <tt>stmt</tt> field.</t>
          </li>
          <li>
            <t>The <tt>stmt</tt> field contains the attestation for processing, constrained by the <tt>type</tt> field. Formats that are not defined using ASN.1 <bcp14>MUST</bcp14> define an ASN.1 wrapper for use with the <tt>AttestationStatement</tt> structure.
For example, a CBOR-encoded format may be defined as an OCTET STRING for <tt>AttestationStatement</tt> purposes, where the contents of the OCTET STRING are the CBOR-encoded data.</t>
          </li>
        </ul>
        <figure anchor="code-AttestationStatement">
          <name>Definition of AttestationStatement</name>
          <sourcecode type="asn1"><![CDATA[
ATTESTATION-STATEMENT ::= TYPE-IDENTIFIER

AttestationStatement ::= SEQUENCE {
   type   ATTESTATION-STATEMENT.&id({AttestationStatementSet}),
   stmt   ATTESTATION-STATEMENT.&Type({AttestationStatementSet}{@type})
}
]]></sourcecode>
        </figure>
        <t>In some cases, a CA may require CSRs to include a variety of claims, which may require the cooperation of more than one Attester.
Similarly, a CA/RA may outsource verification of claims from different Attesters to a single Verifier.
The <tt>AttestationBundle</tt> structure, <xref target="code-AttestationBundle"/>, facilitates the representation of one or more <tt>AttestationStatement</tt> structures along with an <bcp14>OPTIONAL</bcp14> collection of certificates that may be useful for certification path building and validation to verify each <tt>AttestationStatement</tt>. <tt>AttestationBundle</tt> is the structure included in a CSR attribute or extension.</t>
        <figure anchor="code-AttestationBundle">
          <name>Definition of AttestationBundle</name>
          <sourcecode type="asn1"><![CDATA[
AttestationBundle ::= SEQUENCE {
   attestations SEQUENCE SIZE (1..MAX) OF AttestationStatement,
   certs SEQUENCE SIZE (1..MAX) OF LimitedCertChoices OPTIONAL,
}
]]></sourcecode>
        </figure>
        <t>At least one element in the <tt>attestations</tt> field <bcp14>SHOULD</bcp14> contain an attestation that is cryptographically bound to the public key that is the subject of the CSR containing the <tt>AttestationBundle</tt>.</t>
        <t>The <tt>CertificateChoices</tt> structure defined in <xref target="RFC6268"/>, and reproduced below along with <tt>OtherCertificateFormat</tt>, allows for carrying certificates in the default X.509 <xref target="RFC5280"/> format, or in other non-X.509 certificate formats. <tt>CertificateChoices</tt> <bcp14>MUST</bcp14> only contain certificate or other. In this context, <tt>CertificateChoices</tt> <bcp14>MUST NOT</bcp14> contain <tt>extendedCertificate</tt>, <tt>v1AttrCert</tt>, or <tt>v2AttrCert</tt>. Note that for non-ASN.1 certificate formats, the <tt>CertificateChoices</tt> <bcp14>MUST</bcp14> contain <tt>other</tt> with an <tt>OTHER-CERT-FMT.Type</tt> of <tt>OCTET STRING</tt> and data consistent with <tt>OTHER-CERT-FMT.id</tt>. <tt>LimitedCertChoices</tt> is defined to limit the available options to <tt>certificate</tt> and <tt>other</tt>.</t>
        <sourcecode type="asn1"><![CDATA[
   CertificateChoices ::= CHOICE {
     certificate Certificate,
     extendedCertificate [0] IMPLICIT ExtendedCertificate,
          -- Obsolete
     ...,
     [[3: v1AttrCert [1] IMPLICIT AttributeCertificateV1]],
          -- Obsolete
     [[4: v2AttrCert [2] IMPLICIT AttributeCertificateV2]],
     [[5: other      [3] IMPLICIT OtherCertificateFormat]] }

   OTHER-CERT-FMT ::= TYPE-IDENTIFIER

   OtherCertificateFormat ::= SEQUENCE {
     otherCertFormat OTHER-CERT-FMT.
             &id({SupportedCertFormats}),
     otherCert       OTHER-CERT-FMT.
             &Type({SupportedCertFormats}{@otherCertFormat})}

   LimitedCertChoices ::=
      CertificateChoices
          (WITH COMPONENTS {certificate, other})
]]></sourcecode>
        <t>The <tt>certs</tt> field contains a set of certificates that
may be used to validate an <tt>AttestationStatement</tt>
contained in <tt>attestations</tt>. For each <tt>AttestationStatement</tt>, the set of certificates <bcp14>SHOULD</bcp14> contain
the certificate that contains the public key needed to directly validate the
<tt>AttestationStatement</tt>, unless the signing key is expected to be known to the Verifier or is embedded within the <tt>AttestationStatement</tt>. Additional certificates <bcp14>MAY</bcp14> be provided, for example, to chain the
attestation key back to a trust anchor. No specific order of the certificates in <tt>certs</tt> should be expected because certificates contained in <tt>certs</tt> may be needed to validate different <tt>AttestationStatement</tt> instances.</t>
        <t>This specification places no restriction on mixing certificate types within the <tt>certs</tt> field. For example a non-X.509 attestation signer certificate <bcp14>MAY</bcp14> chain to a trust anchor via a chain of X.509 certificates. It is up to the Attester and its Verifier to agree on supported certificate formats.</t>
      </section>
      <section anchor="attestationstatementset">
        <name>AttestationStatementSet</name>
        <figure anchor="code-AttestationStatementSet">
          <name>Definition of AttestationStatementSet</name>
          <sourcecode type="asn1"><![CDATA[
AttestationStatementSet ATTESTATION-STATEMENT ::= {
   ... -- None defined in this document --
}
]]></sourcecode>
        </figure>
        <t>The expression illustrated in <xref target="code-AttestationStatementSet"/> maps ASN.1 Types
for attestation statements to the OIDs
that identify them. These mappings are used to construct
or parse <tt>AttestationStatement</tt> objects that appear in an <tt>AttestationBundle</tt>. Attestation statements are typically
defined in other IETF standards, in standards produced by other standards bodies,
or as vendor proprietary formats along with corresponding OIDs that identify them.
<tt>AttestationStatementSet</tt> is left unconstrained in this document. However, implementers <bcp14>MAY</bcp14>
populate it with the formats that they wish to support.</t>
      </section>
      <section anchor="csr-attribute-and-extension">
        <name>CSR Attribute and Extension</name>
        <t>By definition, attributes within a PKCS#10 CSR are typed as ATTRIBUTE and within a CRMF CSR are typed as EXTENSION.</t>
        <figure anchor="code-extensions">
          <name>Definitions of CSR attribute and extension</name>
          <sourcecode type="asn1"><![CDATA[
id-aa-attestation OBJECT IDENTIFIER ::= { id-aa 59 }

-- For PKCS#10
attr-attestations ATTRIBUTE ::= {
  TYPE AttestationBundle
  COUNTS MAX 1
  IDENTIFIED BY id-aa-attestation
}

-- For CRMF
ext-attestations EXTENSION ::= {
  SYNTAX AttestationBundle
  IDENTIFIED BY id-aa-attestation
}
]]></sourcecode>
        </figure>
        <t>The Extension variant illustrated in <xref target="code-extensions"/> is intended only for use within CRMF CSRs and is <bcp14>NOT RECOMMENDED</bcp14> to be used within X.509 certificates due to the privacy implications of publishing information about the end entity's hardware environment.</t>
        <t>Multiple different types of <tt>AttestationStatement</tt>(s) may be included within a single top-level <tt>AttestationBundle</tt>.  Note that this document does not require the <tt>AttestationBundle.attestations</tt> field to contain only one <tt>AttestationStatement</tt> of a given type.  For example, if a given type is a "wrapper" type containing the conceptual message wrapper (CMW) structure <xref target="I-D.ietf-rats-msg-wrap"/>, multiple copies of a CMW-typed AttestationStatement may be included.</t>
        <t>Per <xref target="RFC5280"/> no more than one instance of a given type of Extension may be carried within an Extensions structure, so an Extensions structure <bcp14>MUST</bcp14> contain no more than one Extension of type <tt>id-aa-attestation</tt>.</t>
        <t>PKCS#10 uses the legacy structures <tt>Attributes</tt> and <tt>Attribute</tt> rather than the later defined <tt>SingleAttribute</tt> and <tt>AttributeSet</tt> structures - all of which are defined against the ATTRIBUTE ASN.1 CLASS.  The ATTRIBUTE CLASS has a <tt>COUNTS MAX n</tt> clause which can be used to limit the copies of ATTRIBUTE related structures.  For the purposes of this document the <tt>COUNTS MAX 1</tt> clause in the <tt>attr-attestation</tt> shall be taken to mean the following:</t>
        <ul spacing="normal">
          <li>
            <t>An Attributes structure carried within a PKCS#10 CSR <bcp14>MUST</bcp14> contain no more than one Attribute of type <tt>id-aa-attestation</tt>.</t>
          </li>
          <li>
            <t>An Attribute of type <tt>id-aa-attestation</tt> <bcp14>MUST</bcp14> contain exactly one copy of an <tt>AttestationBundle</tt>.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to allocate a value from the "SMI Security for PKIX Module Identifier"
registry for the included ASN.1 module, and to allocate a value from "SMI Security for
S/MIME Attributes" to identify an attribute defined within.</t>
      <section anchor="module-registration-smi-security-for-pkix-module-identifier">
        <name>Module Registration - SMI Security for PKIX Module Identifier</name>
        <t>IANA is asked to register the following within the registry id-mod
SMI Security for PKIX Module Identifier (1.3.6.1.5.5.7.0).</t>
        <ul spacing="normal">
          <li>
            <t>Decimal: IANA Assigned - <strong>Replace TBDMOD</strong></t>
          </li>
          <li>
            <t>Description: CSR-ATTESTATION-2025 - id-mod-pkix-attest-01</t>
          </li>
          <li>
            <t>References: This Document</t>
          </li>
        </ul>
      </section>
      <section anchor="object-identifier-registrations-smi-security-for-smime-attributes">
        <name>Object Identifier Registrations - SMI Security for S/MIME Attributes</name>
        <t>IANA is asked to register the following within the registry id-aa
SMI Security for S/MIME Attributes (1.2.840.113549.1.9.16.2).</t>
        <ul spacing="normal">
          <li>
            <t>Attestation Statement</t>
          </li>
          <li>
            <t>Decimal: IANA Assigned - Note: .59 has already been early-allocated as "id-aa-evidence" referencing this document, so the request is to change the name of this entry to "id-aa-attestation" and leave the allocation of .59 as-is.</t>
          </li>
          <li>
            <t>Description: id-aa-attestation</t>
          </li>
          <li>
            <t>References: This Document</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document defines a structure to convey
attestations as additional information in CSRs, as well as an attribute to convey that structure in the
Certification Request Message defined in {<xref target="RFC2986"/>} and an extension to convey that structure in the
Certificate Request Message Format defined in {<xref target="RFC4211"/>}.
The CA/RA that receives the CSR may choose to verify the attestation(s) to determine if an issuance policy is met, or which of a suite of policies is satisfied. The CA/RA is also free to discard the additional information without processing.</t>
      <t>A CA which accepts or requires attestation(s) <bcp14>SHOULD</bcp14> document its requirements with its Certification Practice Statement(s).</t>
      <t>The remainder of this section identifies security considerations that apply when the CA/RA chooses to verify the attestation as part of the evaluation of a CSR.</t>
      <section anchor="binding-attestations-to-the-csrs-public-key">
        <name>Binding Attestations to the CSR's Public Key</name>
        <t>Regardless of the topological model, the CA/RA is ultimately responsible for validating the binding between the public key and the attestation(s) in the CSR. For CAs issuing in conformance with the CA/Browser Forum's Code Signing Baseline Requirements, this means verifying the attestation of HSM generation and protection is cryptographically bound to the public key in the CSR.</t>
        <t>Multiple attestations from multiple sources, as envisioned in <xref target="RFC9334"/>, can introduce additional complications as shown in the following example.</t>
        <t>For example, a CA may have an issuance policy that requires key generation in an HSM on a company-owned platform in a known good state.
The CSR might contain three AttestationStatements originated by three different attesters:</t>
        <ol spacing="normal" type="1"><li>
            <t>that a key pair was generated in an HSM;</t>
          </li>
          <li>
            <t>that a particular platform is company-owned; and</t>
          </li>
          <li>
            <t>that a particular platform was in a known good state (e.g, up to date on patches, etc.).</t>
          </li>
        </ol>
        <t>While each of these attestations may be independently correct, the CA/RA is responsible for confirming the attestations apply in concert to the public key in the CSR. That is, the CA/RA must analyze the attestations to ensure that:</t>
        <ol spacing="normal" type="1"><li>
            <t>the attestation of HSM generation by AttestationStatement 1 applies to the public key in the CSR;</t>
          </li>
          <li>
            <t>the attestation of company ownership by AttestationStatement 2 applies to the platform that contains the HSM; and</t>
          </li>
          <li>
            <t>the attestation that a platform was in a known good state by AttestationStatement 3 applies to the platform that contains the HSM.</t>
          </li>
        </ol>
      </section>
      <section anchor="freshness">
        <name>Freshness</name>
        <t>To avoid replay attacks, the CA/RA may choose to ignore attestations that are stale, or whose freshness cannot be determined. Mechanisms to address freshness and their application to the RATS topological models are discussed in <xref target="RFC9334"/>. Other mechanisms for determining freshness may be used as the CA/RA deems appropriate.</t>
      </section>
      <section anchor="relationship-of-attestations-and-certificate-extensions">
        <name>Relationship of Attestations and Certificate Extensions</name>
        <t>Attestations are intended as additional information in the issuance process, and may include sensitive information about the platform, such as hardware details or patch levels, or device ownership. It is <bcp14>NOT RECOMMENDED</bcp14> for a CA to copy attestations into the published certificate. CAs that choose to republish attestations in certificates <bcp14>SHOULD</bcp14> review the contents and delete any sensitive information.</t>
      </section>
      <section anchor="additional-security-considerations">
        <name>Additional Security Considerations</name>
        <t>In addition to the security considerations listed here, implementers should be familiar with the security considerations of the specifications on which this specification depends: PKCS#10 <xref target="RFC2986"/>, CRMF <xref target="RFC4211"/>, as well as general security concepts relating to remote attestation; many of these concepts are discussed in <xref section="6" sectionFormat="of" target="RFC9334"/>, <xref section="7" sectionFormat="of" target="RFC9334"/>, <xref section="9" sectionFormat="of" target="RFC9334"/>, <xref section="11" sectionFormat="of" target="RFC9334"/>, and <xref section="12" sectionFormat="of" target="RFC9334"/>. Implementers should also be aware of any security considerations relating to the specific attestation formats being carried within the CSR.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version. There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC4211">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes the Certificate Request Message Format (CRMF) syntax and semantics. This syntax is used to convey a request for a certificate to a Certification Authority (CA), possibly via a Registration Authority (RA), for the purposes of X.509 certificate production. The request will typically include a public key and the associated registration information. This document does not define a certificate request protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4211"/>
          <seriesInfo name="DOI" value="10.17487/RFC4211"/>
        </reference>
        <reference anchor="RFC2986">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-rats-msg-wrap">
          <front>
            <title>RATS Conceptual Messages Wrapper (CMW)</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Independent</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Dionna Glaze" initials="D." surname="Glaze">
              <organization>Google LLC</organization>
            </author>
            <date day="11" month="December" year="2025"/>
            <abstract>
              <t>   The Conceptual Messages introduced by the RATS architecture (RFC
   9334) are protocol-agnostic data units that are conveyed between RATS
   roles during remote attestation procedures.  Conceptual Messages
   describe the meaning and function of such data units within RATS data
   flows without specifying a wire format, encoding, transport
   mechanism, or processing details.  The initial set of Conceptual
   Messages is defined in Section 8 of RFC 9334 and includes Evidence,
   Attestation Results, Endorsements, Reference Values, and Appraisal
   Policies.

   This document introduces the Conceptual Message Wrapper (CMW) that
   provides a common structure to encapsulate these messages.  It
   defines a dedicated CBOR tag, corresponding JSON Web Token (JWT) and
   CBOR Web Token (CWT) claims, and an X.509 extension.

   This allows CMWs to be used in CBOR-based protocols, web APIs using
   JWTs and CWTs, and PKIX artifacts like X.509 certificates.
   Additionally, the draft defines a media type and a CoAP content
   format to transport CMWs over protocols like HTTP, MIME, and CoAP.

   The goal is to improve the interoperability and flexibility of remote
   attestation protocols.  Introducing a shared message format such as
   CMW enables consistent support for different attestation message
   types, evolving message serialization formats without breaking
   compatibility, and avoiding the need to redefine how messages are
   handled within each protocol.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-msg-wrap-23"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC9683">
          <front>
            <title>Remote Integrity Verification of Network Devices Containing Trusted Platform Modules</title>
            <author fullname="G. C. Fedorkow" initials="G. C." role="editor" surname="Fedorkow"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="J. Fitzgerald-McKay" initials="J." surname="Fitzgerald-McKay"/>
            <date month="December" year="2024"/>
            <abstract>
              <t>This document describes a workflow for remote attestation of the integrity of firmware and software installed on network devices that contain Trusted Platform Modules (TPMs), as defined by the Trusted Computing Group (TCG), or equivalent hardware implementations that include the protected capabilities, as provided by TPMs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9683"/>
          <seriesInfo name="DOI" value="10.17487/RFC9683"/>
        </reference>
        <reference anchor="CSBR" target="https://cabforum.org/uploads/Baseline-Requirements-for-the-Issuance-and-Management-of-Code-Signing.v3.7.pdf">
          <front>
            <title>Baseline Requirements for Code-Signing Certificates, v.3.7</title>
            <author>
              <organization>CA/Browser Forum</organization>
            </author>
            <date year="2024" month="February"/>
          </front>
        </reference>
        <reference anchor="SampleData" target="https://github.com/lamps-wg/csr-attestation-examples">
          <front>
            <title>CSR Attestation Sample Data</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 357?>

<section anchor="examples">
      <name>Examples</name>
      <t>Examples and sample data will be collected in the "CSR Attestation Sample Data" GitHub repository <xref target="SampleData"/>.</t>
    </section>
    <section anchor="asn1-module">
      <name>ASN.1 Module</name>
      <sourcecode type="asn1"><![CDATA[
CSR-ATTESTATION-2025
  { iso(1) identified-organization(3) dod(6) internet(1) security(5)
  mechanisms(5) pkix(7) id-mod(0) id-mod-pkix-attest-01(TBDMOD) }

DEFINITIONS IMPLICIT TAGS ::= BEGIN

EXPORTS ALL;

IMPORTS

CertificateChoices
  FROM CryptographicMessageSyntax-2010 -- from [RFC6268]
    { iso(1) member-body(2) us(840) rsadsi(113549)
    pkcs(1) pkcs-9(9) smime(16) modules(0) id-mod-cms-2009(58) }

EXTENSION, ATTRIBUTE
  FROM PKIX-CommonTypes-2009 -- from [RFC5912]
    { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-pkixCommon-02(57) }

id-aa
  FROM SecureMimeMessageV3dot1-2009
    { iso(1) member-body(2) us(840) rsadsi(113549)
    pkcs(1) pkcs-9(9) smime(16) modules(0) msg-v3dot1-02(39) }
  ;

ATTESTATION-STATEMENT ::= TYPE-IDENTIFIER

AttestationStatementSet ATTESTATION-STATEMENT ::= {
   ... -- None defined in this document --
}

AttestationStatement ::= SEQUENCE {
   type   ATTESTATION-STATEMENT.&id({AttestationStatementSet}),
   stmt   ATTESTATION-STATEMENT.&Type(
              {AttestationStatementSet}{@type})
}

-- Arc for Attestation types
id-aa-attestation OBJECT IDENTIFIER ::= { id-aa 59 }

-- For PKCS#10 (Attestation)
attr-attestation ATTRIBUTE ::= {
  TYPE AttestationBundle
  COUNTS MAX 1
  IDENTIFIED BY id-aa-attestation
}

-- For CRMF (Attestation)
ext-attestation EXTENSION ::= {
  SYNTAX AttestationBundle
  IDENTIFIED BY id-aa-attestation
}

-- Allow either X.509 or OTHER-CERT certificates
LimitedCertChoices ::=
    CertificateChoices
       (WITH COMPONENTS {certificate, other})

AttestationBundle ::= SEQUENCE {
   attestations SEQUENCE SIZE (1..MAX) OF AttestationStatement,
   certs SEQUENCE SIZE (1..MAX) OF LimitedCertChoices OPTIONAL
}

END
]]></sourcecode>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This specification is the work of a design team created by the chairs of the
LAMPS working group.
We would like to specifically thank Mike StJohns for writing initial
version of this draft and for his substantial work on the final version.
The following persons, in no specific order,
contributed to the work directly, participated in design team meetings, or provided review of the document.</t>
      <t>Richard Kettlewell, Chris Trufan, Bruno Couillard,
Jean-Pierre Fiset, Sander Temme, Jethro Beekman, Zsolt Rózsahegyi, Ferenc
Pető, Mike Agrenius Kushner, Tomas Gustavsson, Dieter Bong, Christopher Meyer, Carl Wallace, Michael Richardson, Tomofumi Okubo, Olivier
Couillard, John Gray, Eric Amador, Giri Mandyam, Darren Johnson, Herman Slatman, Tiru Reddy, James Hagborg, A.J. Stein, John Kemp, Daniel Migault and Russ Housley.</t>
      <t>Additionally, we would like to thank Andreas Kretschmer, Hendrik Brockhaus,
David von Oheimb, Corey Bonnell, and Thomas Fossati for their feedback based on implementation
experience.</t>
      <t>Close to the end of the specification development process, the working group chairs, Russ Housley and Tim Hollebeek, reached out to Steve Hanna, Tim Polk, and Carl Wallace to help improve the document and resolve contentious issues. Their contributions substantially impacted the final outcome of the document.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA819a3IbOZrg/zwFlhWxLVWQaUt+lK2amS5Kom2VrceQrK6q
cThCYCZE5iqZyU1kSmY51HfYG+wd5gazsfea7wEgATIpu6N7N6Y6qkQmkcCH
7/0CejAYRHVW5+pI9H7RSpQ3YqyWZa3EsK6VrmWdlYW4z+qFOFFVnd1kCT+a
ZPMiK+Yw+n82ME73IjmbVeoO5tk5wWQMw+B9NS+r9ZHQdRpFaZkUcgnLp5W8
qQeZqm8GuVyu9CDR1UC2cwwOX0S6mS0zreFbvV7BO2ej6ZuoaJYzVR1FKUx8
FCVloVWhG30k6qpREQD0LPpOyErJIzEcj4bw5b6sbudV2ayOxK9vxa/wDXfy
Fp9Et2oNP6dHkRiIq/dn/Odk8t3BU/x4Mj5/g3+9vdFjhxq1hZjoThUNAPad
EGbND8Pzqwl+502E68PjpcxywM5K6uVPiI+4rOb4XFbJ4kgs6nqlj548ge3K
upLJrapiO+rJ/fwJIe+JnJVN/SSCNQHzzQyowkiFARt47cGgXOJXGGQnt4Nj
fj3Oys3XnnyNXvGiXua9KJJNvSiBPEIM4F8hsgJIcx6Ly6bQgOl6QU+ZB86z
W7XxA+zqSJxU61WdJeJNWcH0YlLe1PdAURpg2S4cQz8lWQ1sNsnK5rP4UJa3
gJK+uCxqWWUlDyibokZWPJGFTCU9U4z+JYDyU2lBiRPpNsCgvpNFobSY6mRR
3qgim1toZZH9QQjAldUSeDFc6q2qlrJY+2vxXHE710/z5ee4UPXmmqq4FcdZ
dbso8z9a7LypZFPgm5WYnE0DpHT8ZNZcwFzxzMz1k87q+MaNjVNGra4rpYAt
xgsFVANm06Ahfnhh9pMCRH96+fzw9Ys/edg+ldUSOCCtd+065IJfMw0AFT4P
oHAHz90kvxRZrVIxqZFdA2Ld8/CfknK5amrYAYpMsNZFLCbLLOC2C5zLPfv6
KoVKY43jSd6ARvA0hhWjqChhd3V2p5DNx29OXj979tx8fHn48pX5+OL1waH5
+Pzw4MB8PHz96qUdcPjq6VEUZcWNP9/Z4JQWHFSy1oOlng/uK7kyr/zw9NlT
u+jLV8/w48nkeHzEXOBEr5Wk4ZPjqrzXwBAgKM2SfjMG4FhqlWeFItWVVci7
tRYAizgBYg+sYvOUne6Lu/hZ/APNQvpXvFGzqpHVWhy+6ovDp4fPeQVZzZGT
rH5J5OwGlyel1azyUqb6iV1/4K8/gHGDeqEGZ1o3skjUQBbp4BzkdU4DBuXN
wAcvvgN44lV6A+tOQC/l6hQU5ZG/zx4YosA68TiBA3ud4BotCLR+skuNDtRn
mkVH0WAwAAFEeUnqKArN5pBIktUZ6I69k6HeF2DPGkRr4qFV1KW4amY5qLP3
ai3OCpBNmK9J6qZSYg/s0r5QRQr/1jzVUq5FxVgT0p9KaEO1is0RLDoZ7+P8
WZHkTQrD0zRD0GQu7lQFr8kZ4MLxIMAMg8Gq3mTVUqxKgGktUMzyDKkRIxsJ
s/c+rH0yDIEpWkDXOFMKzgHpEoCtXsga/qPEqsru8AEYX5i7AgW+KosUwYY3
JDoOf9JixQjBMZkWWiWAi1TM1jBgIasUDQI/xZWWZdrANvbeTc73+zi+KGsA
cwXKHPfXF6pOYjGltctEaY2ez1wVCgCDdfvgPMgChZ2/Ac8xdtYIlI8zH1Fm
0wQUbgtwASsnMs/hWcVekW8hxa+LDIBEd4QGNrDzos7XoilSVd1LQhgMLlLY
X/aHEndouRotpF6ppCaYO+ZFMuBIBXiAEbDBFX5BoVyqZAEGSi814OxOiZlS
BWxBNKDYUdDXSlYg1CsJDJQ0uaxyJOUcl4d9w0w1rItbpXkd0XQcRdMFUgXg
apk9VTcZGsnh5CI+EI6BtbhfZMmC+CSRFYDlAY9qRBIsxu0i3Hs6JzKOlTgH
qoESQAYE/ANjg2+2DzukpzoWxyX4nB72UprJx4a/LFNRC+KiZoWMYgm5ua+Y
JHyZpWmuInDMzsBuALsRYv4OeX9/9vfJtBVoT4q9DWqWNhDkWgLBk1xmwAQt
bUkMwQ9EPCA7OCYOxdeIiKKfUBRXMquIXEzTEFDEXNnMFzWhXua6tABoCwEw
EkBZZbMG8QDfgokpbkB1AGxHSgso1HJhn/gWp1afSdvKWZYDoDFod5qnzpYU
0twjBUiq4eGyBJStYFKN+zaqy65cKNg5bmdbrFBO/M2poirzHG0Q7pPk3TeT
3dZ0D63zvoCop6E3wYcgfPhKI7TQ4iO+8omVFX+2bKGdIq7hNeKiHsY+lVGt
UkyamU4AuaoCBXplBPY9a1BLyrQPUgJOc8pqjmgPW5VGxcI+77KqLAhcmnYh
NZERtk9rAi7v+Ed1U4ObAaIB8ZfqIciZtsBaREnwvkALgOq8yYimCjVoAnyb
yS4l+ahmAfPiuId5rEBeACSQ4SIk5Hl5TyQFmO/UGq0WUnuXmMDWNewHAXwk
rDMyZ7RG3wgfDrBq66Px7T4hRvyZHtdfH413+MnTZG/BE2yhsiptS511sCwI
yqIo83KOCgVVG+v6fodWQ9oAL4K4A/2BLDOYSbcTrAdyXoDkgAWGxzD2Rkmd
Ifa2ZBTlCaltNO5NQ17LV6AzzCJzwLPmOVEabmRSW2Y2rgX4+gtmu/IuS522
JhIHhg/Da1IpqbrLwMYL4BIwOAW6AmmWoH8PWkvWhorwMg9EDBFjVwrVBPKt
zyGxEO/KeyQGkP1mQ+MZlQzCm5aKvQ6rl0m9UK6C0OKgC7hv24WARUhumiKH
kDTnx+0y91mew9dEAY8EP6U+XCBF7GtgDoYYgSUIxR2ZdmjcVTFZgzr6LC5K
Q6JLUGB7ZL/BjQogRVLMNueBEI8NeKpQ76xojlwW8wY4GXYSq7hv3AEKK4oE
AjdyvMWp98YH8wYIxenpB1iZFLIhRrAYYhGRqAoISEnFt5J4mmnU+g3wC7wz
MiPEGBxDUMSnozFMbEE4zgoUocvZ/0AuHtu1GAl7J8eXOPhneScnBKQd6PC0
9/Pk8mLfMHEoV+PRyeX5+ejidGIYecsoIz3IP0UQ3faQmGBEQOA2QT8G0BEl
X98gUgijxZXR6YVB/uXJdDQVk+n47OJtjD7MWOUM0SJbIevj4phdE+PhdLKR
ooqGxNhkMLwAqMIpUHf4Ooe8TPU5I4ZECcUsgHUzZT5TwNwk7EXr6Tp5BCnx
Hy8VuORIbFbkxAKeNsG/xspy1DA05KBMFfrsaPMVm+oc36zY4sEQkBmwE+AR
rsCcJmQUPNf7WxxHts+Msu385xUGGSn5vnuI0X1y+nEHlBMku8jwWcrjtKqK
wbkUX76YlMLDQ5/pYYXurgRY0U1f9yk7mKFjBKtYS44itKKdkmox9ClNzAXy
nrEtbAOfjUgn0HtRBMCgB6ZJxWvU9isiNIQ4GHGpfENHIGM7N8OqtG516dbN
AldoDEScmJjjBYLqIcN5AT4YbrtOspbg27CjpD73o1Y94AozmVAmGBZPFiq5
5V2wfkYcSa3JttBjUPzIT5HnvJEKJKZhxGKaDLyxzOJybfxKrXwgI5rOpFYm
YxuCkvoyVi11upysgY1ro8p3Jq2esSRFpwy8HxKRwAvnzAliI9IAmkYkAzm/
fLGofR4fUup/C7XW6QBfTxmcQjgzB21ZA5fBBu5RPmAfNozeIZF75PxrpUS7
6EG76MtXzx4e9o9oFyw3qvoRNFpaVho/gXoifryCwHT9I9HnL8wsVRwIWrsk
eLUNBiRajBChsP++s1mAwcSIAiUoOLqRt8zyIgfXBvZZqJZ6tH/fuPCrxKEC
BQnfROfWgRUN7c+4Km3fousxrWXfZ3dmBVKaaQmsN5K4me4XKZA2gR1BXRmm
pxDLh9oEXURHgwzf44AdAbzIlcNdaG0TI05OteKEgQo9i6zwaP0qZC/JWrgH
UCdqVTeoP4y72/PoZRgAF2aV5sM0VrrJreJts2Pe8h1Ortm0DXBbCe3k8B0I
/4rZMPK+qBSJ5OYGyd6eoAkrjJaEyU4RasopaQx4OATGQpQWvfNfJtNen/+K
i0v6PB796y9n49Epfp68G3744D5EZsTk3eUvH07bT+2bxh3hl+GpCB5FvfPh
7z3eYu/yanp2eTH80HPodMoPSc1hAkYNFThM5PCDelQcchIJjk+u/uN/HzwH
TvhvGA8dHLwG6vOXVwc/ICvcL1TBq5UFoJK/AgrXEbotsiK/BXzcRK6yGsSo
j8yjF+V9IRaqQs/2+4+ImU9H4p9myerg+b+YB7jh4KHFWfCQcLb9ZOtlRmLH
o45lHDaD5xuYDuEd/h58t3j3Hv7TnymbMDh49ed/iUxQ7IhRqUFjXRsgBoh4
IIWt4HlOAAdkUZCQHCuZqsrkYTapDcYQvtjg8EYuszyTnKOJ2GXBUJuU4yMg
HO2S7xPUTf0OEYcABL1vaxf6oTXoh9YgugLdGXhMzpOwaZrg9a3wtStPS8hu
tMsS4f5ErzLzoPJb98Cq3Nwg7m6qcsmjKunSxFfvz37bnCHuymwQGRlcAgZL
d2xrfDJuYKDNp5KHvQ7iTlmQhM7ZCWsRRWqGdxLmLE2Comc1FuJtk5aY2Xh4
iKOJD7xnc2kQFqeQAshyKMecJjW+Da4c9b6aYukFaCBa+sC6bLCB1ebU66/s
Lbovmzz1kuBUdkhqkyKEeEXeQugkMe4GZIKfnJIvTr9CHHKPq0TovGWchaKC
a+ZoCNZFrUtgTJMOirF4iyzPwbwxHFFoOEqYnTypukwot4bGiFKchrlQEjVH
6MD0Eabdgt/8KNhL4m/KMvgi1CeRkaxbu8QqXv0NuSoiMiarHh4iVgo96vEw
mPLW7HuaCcf0NrP6dqXI8hwqHJOKhNewajFXgKd1wLeP1316gqU25RgEPe98
vclOgIjlDI29qWq4KRFAbRoNMJ0BzMm6z+Sfqe7Bwt4UXGnFIkMkE/SDY3FJ
xITZl2TXCA5GgBXMCedXR7lRgNOqoTD5yqbhz2kzrODsj6PP8BZx/qjNywJS
Jhl6+CGheWtoFmDdjNN4Rj3dlzAMk8+63xWvmiAVF/4tfvH0Neov4l3W8ZzF
XZJH6RwZUlN3ZQZOACw7bzARH1G46i8P8GE2vjZ1JzDxVSKBxfdUPI/7Tj3t
k1IDStLyT7A4snsWgCicJQlk3hAHuGPvZLi/b9RuSskT9k7BLaZltaEQCR5l
LXD6GRaSDLZ+JL+cw7yECp7OYSeu0lZL0cZtZIHTmQBJ+fHIPXowFDbcdc/C
RaF2kjuZZylVjPzykdmRRwpvf0zwRC5VPiAc4eI1LaYFphRFz6P8xDq5PWtV
YDRxB+WNKGnZOrBkg4Z1mD2nFOOX70Ak/fo4jKoeWHZvgD9bF2MrCW0iWS9V
H2bMOLdDcZcmJUdDcNnYTG/dEN3MBpoDEGvBXJ0P0zsmcVw75K0NUUETrIzh
dhVTfCPPIPBp3yvbCDxIa1Nm15S2GW85qOqcBRkkElW0I3FYv2iLF16p1pZk
/KB+iR0QJOXOXiBdvhNdxNyMnY6bgmqXiK7rrheuvYBqz/nbZPwxRTnoegcC
eEzXYwWOa5qUwAgSqUCoTudP96Md0V2YPsL8pfMCbXaAssNB2NzmU7g9wP0I
v214TtZfYfkzTEgvcfIJoguKL6+RqNcCZslTY/Ivj38enUzF2enoYnr25mw0
ZhF14qVdHk/W1u271vWyNtPEdmrvWVseNazhpxmDPFHCXRR+5dCHMTameiPD
vJH1J96kWMlIh0sQc9KY0YkeiCvIfI1d4mizIeT4cjywmW2DjY3agWR8ejlp
WnfHUqumWpUaszGkPtvMV1G7AnIwlzSDAkiwSgHUjf76179KXRxEw+l0NJkO
Mewa4N8RRGlTcXT0z2L6+9Vo0FI5ijolDEdOIMAcXZyMxBfsIqLShBCdE8f/
PUv3vnRNNFH1w34/ou67Zb37/SnMvnuGLz/h6g/70QNuMPpyJL7bKbfcFvXP
vTYFgVjstAkPlALW5RIwLokEWw0/pP399iK/ImcTUm28Yl9jIpYrSkMzBJTC
Au7lnJaVewg5QAlTZ0rfGQKKfJpalw0Vkn1ZdquyHWx9ZTuhsSgoEOButOHR
pm5knelxer9DGfIgjHm+rgn9TN3XpAoLoyVILIkhyorJDwDO8rxtyQl7Srwk
H4jwTZNzFTzwjVYSJpw1WZ665D+7GMah41KAUJh97AYy7sSSseOtFTH8YFoL
MHBqDR8pDGP3Yk8kN6ftELLANXA/Tc7+bST2DuL4fPjbvrh808nNJGSIjcde
/IAWX6UYqZwsSqoiW9z3HxEuA+/XJIuHoVgN/ayzyk23BAdk1/4mraEwySeb
9uVGiNYFIUsEXg02RZcQ+q8WJvyZUbHD1oDaljr7BlGt4eqmUaZILLOOrZt0
kNwEZtdeUGcwdt2dnaXoEdtjUVyQ81BETIJgprBpw+P5awqnvLnZvF33ub+D
aynUTLbVW2WwCCtLTCZxPEOLY7/tw4MxSuRGYAKd4raiLAY80ne6XK2vc5dk
SCnYc11W3rswO03dBsemXNN/ZDbMGdrJrklGUmZGMxr2f313gL41PrymPVzf
HboHMVaoTTcQYgi3xQa+Y1scpO8GxgFC+7h2yuj6cvpuNB6cjMbTwZvzaTwl
NwSY59o3w9dEY2oOoNyDRoNtiRtOkKWoVbZF79rPRDl3nDylOwk2AdMo7LiT
Ur/29sirG8g9HQMqYHu/pGdO3l2eWS0jAnR5L/T51w7KiI9PP4mz86sPZydn
U4jatwaYV+mfwUBcznSZq5ob70Ucx+b3jx+fHYmWxOLjgTft0KpQb96/HHz6
9OjcHz8+hxkP2xkPvzbjoZvx48cXR0ZC+Psz791uEf30SYB+g7EhkbtdKxzW
OUuH6hcMCA41YzbYyEMC/EMe18R2drZvaeNuedOZNx6fjh2wzgm//LQB2cM+
o6DDmsC+zMTbfOituPfr2fSdOLk8v7q8AHRNxBePI/sMOrh7aI9YDZNh24oq
sKlvsz7MnkLkV8bQ8JtMAwl4p+GPzKyszUMjZdrCd3sNrGu6gAkNW7TZMeB3
sepNI4bdmww+l3hBFbt9YK5vFyxNkWPtmkAySWjTZq4+r1ypGLBzW2AcbKyn
H1bi0OVMpbg86jRrune4TMO2gTzY/Pnwd1zGNgFQhb0NprARfyF5ar9uQ8Bi
KwO7sjWmCoFuyaKs0AC0WYqyShHcm80+DDKSlmUg1sfU+Ey1m5+pRGIUGLwS
kt+8bLioJYTDf+t573B2bVJtRzP5KpcJddRhsQaUlHF6C7HMPm/YfJOB8eng
i0NwZgEzmc7WB+VeTPhWwbRIHUOATTxT96o0vwKCt3wHcBrOuI/P9VfZCISr
yeCGOobC6edYPkY4XDN6lyeyM+UDUWCXI+3/3h1akqYlBQtGCK3HBbqkm1V1
l2MeDL4lxsTVvjnMhME9kyoEDqSmKMwM5nnD50bSrySiMAB+AE5c2ZMHqKp1
RA0VOzsvKGtwdqojP4lDeZUldRhoTLmtVpS5c7UJPhnD3m2ECRpZ6Z3BXElO
tU3ItLXtotOb3tV+QcmM9Yq9+cgjC1tlakCzfWvU+tF+E617vTbD299mZZpB
QI+7oHQYJteCnjd3QKJ1ysOjOog90YG9bq0LRCJ3Lsee8abw01mbPBZ7/bau
t7giZRmtylWTU5NT7TUN+6kvbCVwPcNGmFhszDEwL/s6slFoFB2vmeczPmjg
nVEwakW6Tm8KZpksnMwCuRqfHf8yHdGkbjwWzbYHj36bji4mIIKeV5qlAyn9
7HlHspHEVNBI8eI1+lggq2/aczNoIIITaj5cVsbRAetIDIMzcvkLehkQBgt0
kt26p+L4d7EFXtSuTiekwR8OV3abdCtPfr+YwuRda399sUDfuNSB3lYxlBAM
kw1Blt3qGUd4ylbheYpuddOuBRrGb5insM9PlmIhxNBb23ahjQ4Q41OQJjGv
bJsNkTbKhet4gCNZkxTYkjudxEIPSC9QCP3jaHQGfOMMz590W+FUQQHxHILj
DA1ia6hdi3q3RtvT+9beu+yOY3aTT6vL1YCKH91KzgtPQ7Piuuf9BOH2FHFX
aqQuvW44IAvar106GStHczpegZsFgILsdRb+zMdXeiY33uNnG5mR7YYvl0vf
Ozn/dd/LhXz58ufus72YEFlaciTlKjMHBQRMMGDF0ZnI3SAGENU1w5hUB3hP
YVrVOl2bmKBSTVuL4okxv5J5RC7aIdrPi+py129hImELmnZFc3xDXG+JP0bv
VvO6nqdczVEwvHzptdPs2sT+7sG1AGyj9aN1TTc4ntgwxvR6QrzrjQ/fJ9Pl
LTWg/jQ8ZsZH4Lw0l5xjmGIqgU77sldy8mE4mVBPsf8bPaUjVlJce1q4uMY8
NmkXWiUB0L1wrU2FtPzSTmq7vlqgDadz/MT1lO2mL04HeZbAweBlJgMbg9ED
IgMgwwYacpSxXUYE/WFHWFUbFq3x9Tlkk8kCM/s4+7TG/FH2Cdd+bGy4HqgF
CilxKcAyVTR2eG90LHR4McQyObXZSNPaSQ/NoTg+pYO+PuCFvHosluSg710L
WW9yfsZ9ItgCwKdiz34zjSHizFXye1Gl5hkgkQfhq04lM7ctvV6SnUtuLRdN
npyfnY88SlE/lnPwgvN3lumZcuxjWVDHDB4bpoH4xm21+JL61nYt4kSqCjnK
j/UcJoCesOvoG9fCtP+z+GV8EL+A//0QP92HHQyEOIUgdCnzI6bnUJtGoIH4
/vuxoqBUTI9Pzy9Pv/+eh7tjTEfIsgM/yDp8evgC3mTABqvb7LNht8HTA3x5
rMjyQpx7xD2Hp0YUGZfm0JEHs49W3YXXLfr93SiVchujW6sgMg/jV8+fxgcH
z148fw1YhX9fxoeMVD+2ceYLnu/ENboJRyIGP5c0Y14pma65cU9hKXBg+Zlc
6h5LsjKtBj1uqoGPbKSDvjRdupMW2OiWaZNlKebmxJ5cKqcZFd4QQsdst3QF
d7TlSppjeAYgY8sQcqkHGQTsg5BFtt3bwaNs0CJ+U7WEHcHuhKynWtkxusPW
6uCUjt51oYHp5qGW63sFel1uHLl1M7IP55f7KEnV2Xzpugn9YpA7LvvQcY73
m1fZ2bG4uRQdsX3gKq/ptsWpzUFK7epedLRiUZZ0gMdWQzd6M9APppstuENN
kdtYtMduzKUZGbZacpmJTTi5XLrJ2AbRKLTcmPlyh3RECyCdjsVTJJgYohSn
TvA0CUHTTT8UYYwB2sYREL8hluyNq5Kgr6r5eKU5Ur6xMZOOdXyFeargEBJF
3fg0pPWVPV7m5BtmMzXCCi/UKVwqkm/zYIZrm2dcS2cS8LlLn5izAl57N9NJ
7yaU3zBGYRGaPiejpoUMNe0x92iFrW22/ZguI2lvZ4miMV2ikJtLRKjRdftc
XNCFjr49kEjR7RqYQOGT1KhKbfndHlAzkMxUfa/Mbr2Etz2otkE028kL++Gg
fKjdvRNYliyZR5A5XdJk894B2CTeZyAevc/AHCTnk5ntscFNvANa3k3O3TFD
pASfqLTXifxNpWpvd17YGqg08mZcCMV9IazGMOhFpbJ1LqFPLrVrUvdFim9Z
SFp16drhQotp4kaAqvtSHOo279AMRvUYAcQtepjiQAvRh2gjWGSxHgAAsAV3
Ywd5ylydmJdlyhlDo95QjWV4CYd1ZPloUlcIqduzT6atDEe2GQFpm2bAhT+I
jSx613VIv2HPQf5jdOjGel3pLfA63BYd8IuePfoOLtW5aeoB7ps0O1UeuM0l
WSAH4LU/++40PBWo3Bm/gINcLJ2qFaZ46F6e4JCAk+ZNETaXJXUIgjaKi2UQ
0zyPszdof+rK8BdcctFB5us/1Pb8dJ+GuwHEUulr0giU7kwoHJizrfpRMA15
txYxNBVI04oOlu9a53BrHUvm7XIf8lPLH2q77UV+C5PsguTZ3wYJm4s3wAEL
cLbQCbM98BXGBnRSXCa3IQEDlwK0K8awIRFtyyY8QQVCHgOOv7EL2WssqInS
uB3gLJy3PcMY4/GJcu8tYy6yyp5YtG1ete1Y37Jc5kwn+BqN1ltK0x5z8JqV
UQIsTCgC7ep+hdkcAGWMpEotSTSo3MDXVXy3cSdBWCvSW+dH2mxT0KBpbz0x
adpHXV2Kmp1qZpeJA2aE3DY04u2iGd7NtyPXahmm7S12CVdAi8xycrdIIXFb
uCYCm6tHnKzYcuFmzphvOTkZslO8WoecAxv1BJWuhfBvAeFbgoiRHQMCo/LY
rWtwusryeMhJ3dtMJ/fcUl+PwgYTOk/biSBTqGxxvzOMOSsciSxn7nIFc75W
AruAN0pDbQ07OKb46GzGdwuqzhqNB/vKHYcV2DRAkGZTVN7RuD6n/70jUkEU
xco3D4BhX5xydeaE+fZZxB/5Ag1ns9xrHVJqz16/DM5e971fftj5y+udvxwc
bPyE5Pd+Di8SADbuoAvFMXhzAokFpdHWO+niI8QnUOf1bTNFvQBhDrH1Funm
NuyUiDCUHrkrG+0nPvXFjQHUqkbX62Dqm/tsbXVSPX6JpHib1e+aGcpWCbJQ
VmvEkLuNEg9O4vqm/54yUW3xrytpFAms9ely72C/jZHSgX/d7N4zvFYs3Xu5
z0fmClXjaIvVvRf7MEmrp+G7wATU3g/7Jh+193S/OzO1x/mtfawxno7enF2c
IVyTtvFrOnw7ocLe8ejt2QVg87eryzEYk+GHDz+CQJ/TN/9mPK/B6c348pzv
7rW+v4nc+SYi2D3IFRCNPPqPpmP0E3VGOYwssfWmGszKdL13uA8GZu/Vc9hM
pWWqsz3OQO3TK6vbROMb+Hfweu814GeZLdXeAWCNM6TaQ0Oy1LD+09d7L17R
5l0Vs9/m1u0WMKk4OKHTftRuQC8GgOP1rxuA/02k5Ct5W3J+jZh8921LUAZu
8PRw78UPtB1O5hn4+TDiOSDD4P8vz9KyPqBt/D/GNpa97ng1AO7ZawROCOCc
v/NMxj+0xeW/0KmPsBFRfMshEKzOD6uEvAdfaVGF9x/SbiD2vHn3t5oP/r/1
HmzAsdGJ8I9uRCC80gWDKiNHmAv4AEvbPBr4UdEjLaC7G0C/sfvzv/qJCUQY
eLHcpQrmL8GwLFcpnWPUnV1/5kQCXZFLOTo+iS1qJZciqVRwsdRCZvbuChXR
LfvhNVtx9CtOhR4IHXz1DnDy0XBQp7d8Cf2k/rlcFBzNmNtDBfWUyDy6A0/G
1qi9+8UKvuCM9tDMNN8DlRvQTaooM9cs80mXaZA9WsFjukOBS5th02afum05
6+5yYjS17XS1t/ZmK5t88VG1VAr3wLGGu2PKePPG83X9VlE0Bo8Xc8vvVV3n
Cp1W8GcXFWxtWjU3suiL46oBIE/KBhwkGNmPflayGFxlqgKP7k2mMdM9kZTk
narlErj0Z1UvqlIcK3W7xBn+TZd5Lcb/59//0HKh5uusL95Q2SO6UvX//V99
JsRwDo+yRov3DYaRVV9MyyU40G8bwPCd1ticdZphvCmOSzwYSWBCGIvSeK7W
+MaJrHLxK5BY4rnTc9ybyoXZI80Ac5Y3zTITl7fNrOyLyzy7w/pjuz+B/CDe
VhIQPaqALMOlTEuY/G1WZeIcdrqWEPOdSrzDmQbTxO/o3nsxAReWNj3NqgYC
2zRd43WCSxCOd3I+A+MPLkX8cwx8Bw6sWey9Wq5wxiIDaM+zOR1fQTYbg5Mv
3pWNzhXeh9BGVcgF95sszlw9LFI6av6+UrVOFkvEyzuIXqrsFmhZJrcL2eh+
dCqBM8QdmoCFypYzvCGxUmvEbUFcQHcRLIgEb0qNhQpbccZ7gJVKqQ95JjU1
RbVRGWtM7CgGzxwvDgd/MDchqG1R6orAMDBWebmyR505KLfc396gx8LfD3DD
wGZL+A7e+wwYrw8sLxMMiylcLxHfEKji/wGD7NPQqzK/5V36XINDFypf4X5A
eFQgL+bwErDznYuK6ZpuTCbwzaaIHCfA3BLTqoicOrokt5k7LQEAJuVSbQvn
fwK+X+UDs2UAAA==

-->

</rfc>
