<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-wimse-mutual-tls-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="Workload MTLS">Workload Authentication Using Mutual TLS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-wimse-mutual-tls-01"/>
    <author initials="" surname="j Salowey" fullname="Joe Salowey">
      <organization>CyberArk</organization>
      <address>
        <email>joe@salowey.net</email>
      </address>
    </author>
    <author initials="Y." surname="Rosomakho" fullname="Yaroslav Rosomakho">
      <organization>Zscaler</organization>
      <address>
        <email>yaroslavros@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="05"/>
    <area>Applications and Real-Time</area>
    <workgroup>Workload Identity in Multi System Environments</workgroup>
    <keyword>workload</keyword>
    <keyword>identity</keyword>
    <abstract>
      <?line 40?>

<t>The WIMSE architecture defines authentication and authorization for software workloads in a variety of runtime environments, from the most basic ones to complex multi-service, multi-cloud, multi-tenant deployments. This document profiles a workload authentication based on X.509 workload identity certificates using mutual TLS (mTLS).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-wimse.github.io/draft-ietf-wimse-s2s-protocol/draft-ietf-wimsemutual-tls.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-wimse-mutual-tls/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Workload Identity in Multi System Environments Working Group mailing list (<eref target="mailto:wimse@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/wimse/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/wimse/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-wimse/draft-ietf-wimse-s2s-protocol"/>.</t>
    </note>
  </front>
  <middle>
    <?line 44?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines authentication and authorization in the context of interaction between two workloads.
This is the core component of the WIMSE architecture <xref target="I-D.ietf-wimse-arch"/>.
This document focuses on using X.509 workload identity certificates <xref target="I-D.ietf-wimse-workload-creds"/> to authenticate the communication between workloads using TLS.</t>
      <t>The use of TLS for authentication is widely deployed, however it may not be applicable to all environments.  For example, some deployments may lack the PKI infrastructure necessary to manage certificates or inter-service communication consists of multiple separate TLS hops. For these cases, other options based on Workload Identity Tokens (WIT) <xref target="I-D.ietf-wimse-workload-creds"/> may be more appropriate since they are not based on X.509 certificates and are communicated at the application layer rather than the transport layer.</t>
      <section anchor="deployment-architecture-and-message-flow">
        <name>Deployment Architecture and Message Flow</name>
        <t>Refer to Sec. 1.2 of <xref target="I-D.ietf-wimse-workload-creds"/> for the deployment architecture which is common to all three
protection options, including the one described here.</t>
      </section>
      <section anchor="workload-identity-certificates">
        <name>Workload Identity Certificates</name>
        <t>Workload identity certificates are X.509 certificates that carry workload identifiers as described in section 4.1 of <xref target="I-D.ietf-wimse-workload-creds"/></t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>All terminology in this document follows <xref target="I-D.ietf-wimse-arch"/>.</t>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="mutual-tls">
      <name>Using Mutual TLS for Workload-to-Workload Authentication</name>
      <t>As noted in the introduction, for many deployments, transport-level protection of application traffic using TLS is ideal.</t>
      <section anchor="to-wic">
        <name>The Workload Identity Certificate</name>
        <t>Workload identity certificates are X.509 certificates that carry workload identifiers as described in section 4.1 of <xref target="I-D.ietf-wimse-workload-creds"/></t>
      </section>
      <section anchor="wic-validation">
        <name>Workload Identity Certificate Validation</name>
        <t>Workload Identity Certificates may be used to authenticate both the server and client side of the connections.  When validating a Workload Identity Certificate, the relying party <bcp14>MUST</bcp14> use the trust anchors configured for the trust domain in the workload identity to validate the peer's certificate.  Other PKIX <xref target="RFC5280"/> path validation rules apply. Workloads acting as TLS clients and servers <bcp14>MUST</bcp14> validate that the trust domain portion of the Workload Identity Certificate matches the expected trust domain for the other side of the connection.</t>
        <t>Servers wishing to use the Workload Identity Certificate for authorizing the client <bcp14>MUST</bcp14> require client certificate authentication in the TLS handshake. Other methods of post handshake authentication are not specified by this document.</t>
        <t>Workload Identity Certificates used by TLS servers <bcp14>SHOULD</bcp14> have the <tt>id-kp-serverAuth</tt> extended key usage <xref target="RFC5280"/> field set and Workload Identity Certificates used by TLS clients <bcp14>SHOULD</bcp14> have the <tt>id-kp-clientAuth</tt> extended key usage field set. A certificate that is used for both client and server connections may have both fields set. This specification does not make any other requirements beyond <xref target="RFC5280"/> on the contents of Workload Identity Certificates or on the certification authorities that issue workload certificates.</t>
        <section anchor="server-name">
          <name>Server Name Validation</name>
          <t>If the WIMSE client uses a hostname to connect to the server and the server certificate contain a DNS SAN the client <bcp14>MUST</bcp14> perform standard host name validation (<xref section="6.3" sectionFormat="of" target="RFC9525"/>) unless it is configured with the additional information necessary to perform alternate validation of the peer's workload identity.
If the client did not perform standard host name validation then the WIMSE client <bcp14>SHOULD</bcp14> further use the workload identifier to validate the server.
The host portion of the workload identifier is NOT treated as a host name as specified in section 6.4 of <xref target="RFC9525"/> but rather as a trust domain. The server identity is encoded in the path portion of the workload identifier in a deployment specific way.
Validating the workload identity could be a simple match on the trust domain and path portions of the identifier or validation may be based on the specific details on how the identifier is constructed. The path portion of the WIMSE identifier <bcp14>MUST</bcp14> always be considered in the scope of the trust domain.
In most cases it is preferable to validate the entire workload identifier, see section 1.3 of <xref target="I-D.ietf-wimse-workload-creds"/> for additional implementation advice.</t>
        </section>
      </section>
      <section anchor="client-name">
        <name>Client Authorization Using the Workload Identity</name>
        <t>The server application retrieves the workload identifier from the client certificate subjectAltName, which in turn is obtained from the TLS layer. The identifier is used in authorization, accounting and auditing.
For example, the full workload identifier may be matched against ACLs to authorize actions requested by the peer and the identifier may be included in log messages to associate actions to the client workload for audit purposes.
A deployment may specify other authorization policies based on the specific details of how the workload identifier is constructed. The path portion of the workload identifier <bcp14>MUST</bcp14> always be considered in the scope of the trust domain.
See section 1.3 of <xref target="I-D.ietf-wimse-workload-creds"/> on additional security implications of workload identifiers.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not include any IANA considerations.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document relies on the security properties of TLS <xref target="TLS"/>, PKIX path validation <xref target="RFC5280"/>, and workload identity certificate validation as described in <xref section="4.1" sectionFormat="of" target="I-D.ietf-wimse-workload-creds"/>. Implementations <bcp14>MUST</bcp14> validate the peer certificate chain, the applicable extended key usage, and the workload identifier according to the rules in this document before using the authenticated identity for authorization decisions.</t>
      <t>Workload identifiers are meaningful only within the scope of their trust domain. Authorization policies <bcp14>MUST NOT</bcp14> evaluate only the path or other sub-components of a workload identifier without also considering the trust domain and the trust anchor used to validate the certificate. Failure to bind the workload identifier to the expected trust domain and configured trust anchor can allow one trust domain to impersonate workloads from another domain.</t>
      <t>Server authentication can be based on either conventional DNS name validation or workload identity validation, depending on deployment configuration. If DNS name validation is not performed, the client <bcp14>MUST</bcp14> be configured with sufficient information to determine the expected workload identity of the server. Accepting any certificate issued by a trusted workload CA without validating that it represents the intended server workload would allow mis-issued or otherwise valid certificates for other workloads to be used for impersonation.</t>
      <t>Client authentication is based on the workload identity certificate presented by the TLS client. A server performing mTLS authentication <bcp14>MUST</bcp14> validate the client certificate chain, the associated trust domain, and the workload identifier before using that identity for authorization, accounting, or auditing. Accepting any valid client certificate from a trusted CA without checking whether the authenticated workload is authorized for the requested action can allow unintended workloads to gain access.</t>
      <t>Workload identity certificates are often issued to dynamic or short-lived workloads. Deployments <bcp14>SHOULD</bcp14> use certificate lifetimes that are appropriate for the workload environment and <bcp14>SHOULD</bcp14> provide timely revocation or replacement mechanisms when workload identity, authorization, or runtime state changes. Long-lived certificates increase the impact of private key compromise and stale authorization decisions.</t>
      <t>Private keys associated with workload identity certificates <bcp14>MUST</bcp14> be protected against disclosure and unauthorized use. In particular, deployments <bcp14>MUST NOT</bcp14> share private keys across unrelated workload instances. Where possible, private keys <bcp14>SHOULD</bcp14> be generated and held in the workload runtime environment or a dedicated key protection mechanism, rather than distributed over the network.</t>
      <t>This document specifies authentication at the TLS layer. If application traffic traverses intermediaries, gateways, service meshes, or other middleboxes that terminate and re-establish TLS, the application endpoint might not be directly authenticated to the peer workload. In such deployments, authorization decisions need to account for where TLS is terminated and whether the authenticated certificate represents the peer workload, an intermediary, or another delegated entity. Where end-to-end workload authentication context is required across such boundaries, deployments <bcp14>SHOULD</bcp14> use an application-layer WIMSE protection mechanism in addition to TLS-layer server authentication.</t>
      <t>Client certificate authentication exposes the client workload identity to the TLS server during the handshake. Deployments should consider whether disclosure of workload identifiers to servers, intermediaries, or logs is acceptable for their threat model. Workload identifiers included in certificates and audit records should avoid embedding unnecessary sensitive information.</t>
      <t>Authorization decisions based on workload identity need to be made using the authenticated identity obtained from the validated certificate, not from unauthenticated application-layer metadata such as HTTP headers. Application-layer identity assertions can be useful for logging or context, but they <bcp14>MUST NOT</bcp14> override the identity established by mutual TLS unless protected and authorized by another mechanism.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-wimse-workload-creds">
          <front>
            <title>WIMSE Workload Credentials</title>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>CyberArk</organization>
            </author>
            <author fullname="Arndt Schwenkschuster" initials="A." surname="Schwenkschuster">
              <organization>Defakto Security</organization>
            </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
              <organization>Zscaler</organization>
            </author>
            <date day="3" month="November" year="2025"/>
            <abstract>
              <t>   The WIMSE architecture defines authentication and authorization for
   software workloads in a variety of runtime environments, from the
   most basic ones up to complex multi-service, multi-cloud, multi-
   tenant deployments.

   This document defines the credentials that workloads use to represent
   their identity.  They can be used in various protocols to
   authenticate workloads to each other.  To use these credentials,
   workloads must provide proof of possession of the associated private
   key material, which is covered in other documents.  This document
   focuses on the credentials alone, independent of the proof-of-
   possession mechanism.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-wimse-workload-creds-00"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC9525">
          <front>
            <title>Service Identity in TLS</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="R. Salz" initials="R." surname="Salz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Transport Layer Security (TLS) with Internet Public Key Infrastructure using X.509 (PKIX) certificates. This document specifies procedures for representing and verifying the identity of application services in such interactions.</t>
              <t>This document obsoletes RFC 6125.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9525"/>
          <seriesInfo name="DOI" value="10.17487/RFC9525"/>
        </reference>
        <reference anchor="TLS">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="13" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-14"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-wimse-arch">
          <front>
            <title>Workload Identity in a Multi System Environment (WIMSE) Architecture</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>CyberArk</organization>
            </author>
            <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
              <organization>Zscaler</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   The increasing prevalence of cloud computing and micro service
   architectures has led to the rise of complex software functions being
   built and deployed as workloads, where a workload is defined as
   software executing for a specific purpose, potentially comprising one
   or more running instances.  This document discusses an architecture
   for designing and standardizing protocols and payloads for conveying
   workload identity and security context information.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-wimse-arch-07"/>
        </reference>
      </references>
    </references>
    <?line 142?>

<section anchor="document-history">
      <name>Document History</name>
      <t><cref>RFC Editor: please remove before publication.</cref></t>
      <section anchor="draft-ietf-wimse-mutual-tls-01">
        <name>draft-ietf-wimse-mutual-tls-01</name>
        <ul spacing="normal">
          <li>
            <t>Added security considerations</t>
          </li>
        </ul>
      </section>
      <section anchor="draft-ietf-wimse-mutual-tls-00">
        <name>draft-ietf-wimse-mutual-tls-00</name>
        <ul spacing="normal">
          <li>
            <t>Initial version, extracted from the draft-ietf-wimse-s2s-protocol-07 S2s draft with minimal edits.</t>
          </li>
          <li>
            <t>added security consideration for Server Name Validation</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We thank Yaron Sheffer, Arndt Schwenkschuster, Brian Campbell,  and Daniel Feldman for their contributions to earlier versions of this document.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA81a65IbN3b+30+BjH7EdpEtjVb22lNe2/RIWk+iW8Txap1U
qhbsBkl4uhsM0E2KmdK75FnyZPnOAdBEszkzyuZPqlQastk4ONfvXIDpdJq1
uq3UhTj7YOxNZWQpZl27Vk2rC9lq04hfnW5W4nXXdrIS16/mZ5lcLKzapkte
83MsUCtj9xfCtWVWmqKRNSiXVi7bqVbtcrrTtVPTmmlN28pNn5xnrlvU2jls
1e43eP3qxfVLIR4JWTmDPXRTqo3Cf017NhFnqtStsVpW9OVq9jP+GItP769f
nmVNVy+UvchKMHKRFaZxqnGduxCt7VQGjv+QSaskqM42myoI6IRsSvFegaNr
XauzbAepVtZ0m1TCK2JAt3uhG+iiarWY712ravGi2Wprmho/u7PsRu2xvLzI
xFTswlr6rMPybKuaDrwJ8ffuIIRXEy8ky/yZCNHzWuoKz1nHP5G6c2NX9IO0
xRo/rNt24y4eP6b36JHeqjy+9pgePF5Ys3PqMVN4TCtXul13C7ICW2/lDfh4
ZFH31E031rSmMBWtq2AA1yZ7Dtbnnmyuzf2URr8eHCdftzV2yiR81VhSN3YV
UB2MffZ7LuayMju1P+Ony66qvCue/ZNRw98gu2z0f7InXIjLPfxnZm/4J+UV
+rtRPzm/JG9UO9zqt1y8N87U8mZtPMGw0W/SGlfJ7fHPw/3+1RWyUjbdbh8W
4v+fVvQoL0ydZY2xNRZt4TuZbpbJt+l0KuTCtVYWbZZdr5X4cPV6/oKtrltV
tJ1VolRL3Si4+jC2yfO9CgNLApSFM8t2h0DpPdiRT0qxlRa22AuzFLYDkVoJ
lfjmRCytqQU2ELVxrVhIpwthaNvWCEixqdRHUZNrT52yW12oSfhaVKYr45dW
NbJpwfKmMnumnIvrtXYCiNLRdwEHWeqKxOlZPJYMm6sSm4u/5l8/+e7wWgxE
USjb6iW9DjodY1zdY5z4osb/X+Zeu7Uuy0pl2SNx1bTWlF1BW5CuU6Y+W8XQ
JekI8NSqjy1pU+MTmY8ZV+1OKbyyMwf9534v/PMrrWJ9QrcNE2hPW/329ser
6fM8CS/6+dOn/Ij1JT44sI7tvSY+S2m3t/9wRD0umBZWle7TJ7J7og4VuK/r
runtFMQ9uJrnAOrPvTeDMxKRrELOeaReiLEDe9U++IuCG60Rq1tlhW6BiXvR
GPiiEtJD/qJSzFZVDZw3F+IlqKuPktx0ghioVeqCTKmSxQ3L8O6fr2C0pZUI
u87rulGFck7aPVGvZSNXaqguUGc7R98/UgRlK+2wEWTlOAAbwqmNtKQ4kn5t
NmCTuAQLUEoBF0fQGXyzwmx8Luv9fpxXrs0N0qH44sPV9ZefYzySeEGxbFl5
1myQd8EL7FOwKfeCQILVO4y2gdwcADYVF6/KlvUoD2kYyt1DDkhL4rRr6aME
sNa4jbGt/x0+8eiReN7bRcxSf6etXpMVoPuXQOwse6+WRM2IuSpycZ4/JfXe
3j4k+tIrOXGAYWDt1rpYk++RUOA9OFS7tkpllL6UD+ZglQksX1RdSY5NZBG3
IO0KqxfQBeRVXq6xzS4TTWbZh/sDkrR8wgDQZQtnsXDNo4heamWxzCXMAJxc
YP5Zfu619ZCnEDJemmZLJGM99ZzQUPP3LJuRbpStdWMqs9p7BBwCUAVzuXsA
i6EA1RWJAJA4e/3r/JpKQPor3rzlz+9f/MuvV+9fPKfP819mr171H7LwxvyX
t7++en74dFh5+fb16xdvnvvFeCoGj7Kz17Pf8AtJdvb23fXV2zezV2djOcgC
8AVEDYf6xip2dpcNFPzz5bv//q/zZ6TZ9y8vn56ffweX81++Pf/jM3zZAeL8
bqYBtPmvFHEZIkZJy/kYSi3kRrcolCdkRAfca6I3ffVvpJl/vxDfL4rN+bMf
wgMSePAw6mzwkHU2fjJa7JV44tGJbXptDp4faXrI7+y3wfeo9+Th9z9WyLli
ev7tjz9k5IbHzQpHcgybaWumd3U5t48OxSUceuYI17y5KGJ1kvgnTBQQv08T
xOQAVdMK6acSKQ4sB1CHN5eIzkOqIyhBSMrK4wAXcfdhAdiFLDtdfPr/DAoP
AJr4i6x0GdUPYabb/kEq10kwjNmpo8RzXGYskBPZbJRqgf8USEWlKUIdhIwV
E1Ju48Wi9P8B60XkAGaR93PP8SgsKg96GWkaP3OEUb3iM1eHIlg2BUo/ShTN
Uq+QO8o+ufgXSnQHui8KxyUXZAtMebIbpew/utSY4P0tJ01UJX8NOPL102+f
AEc2yKbioFWU7Vw1wxX3eS8eHhReYse+6DXlYdwr0HnJEj5C/h6IQK4fnL19
0IHRvhRr5etZ9XEDM5AdU3JRTb6+OW03hMs8cLjTbs351fQWuJ+DWExSYR4T
c3ASltaq/+i07Z8lCh/VoN52XKNBaW4tb2AUb5NaYYeSq7oNNUX9C6M+IZRS
DrqgGCzFYj/MLvmDMcHBgGXESbRcAOS13Hql/E2X05vN1P9MIPg36L+lAUvJ
+bXj6mngReCmIldo2SX+FzxET7qDB//znTz02+ZiNlA/u58OW5EZOd6DnQ5e
m8Y3wwXvz+8yaedpcysUtB5sURrF+I9VZCgAvXfC4BK+IViovcFeA02ZpLVr
fC3/gLrAfVzUP2Z38J7Z6ojV2rkuwYcUzDlpPBI+EsQbWR9Bq1fHlCYTwNWr
tF0MSuPuT6LDcC295ft1Vh59PELS5GtqFRJa8pzg+Zu5mM/ejCJqoywNLoRr
QUbakvfjgUmKUV/c3s5Dsvkm/wOpEPr97uunX3/69KXoGgCYo85ODzB1pwPi
y7LkqhPpvx+TgNKgO4t8yAo1WkO8J9sHjAkwO8LjPOovCFbqkj3l82SjiB9r
P4THsrPsZRG+TuTlUTbwdsi5OuYdj0D4FA1ojsqu1irfikXLe26lSyAoSfzf
5M9C4u/NIRZdGxs2ppLid85VTPCTPpthb9UUpjxUVpyiPodr8qykH4sRK3YS
RvnLIW+fTqOF6QAmNAZAKqEW32egGHyDzENOnrLlIl8JO4jbxK6hGOnbYDZN
ZLBUiIuKpyuo0I8JeT/2cwRVeq2d0on3mGQhh5SsID5hkZ8flMoeNOsKs+lz
5sA02VXjR3Q8QgjRhGYFvXKcjwy8jPa0J80ygYVV7yPnPl4/Y7bAyTcJVbII
mTWAX0kDEl8LX/oYmQ1GaL7MP53jbx/5sIp4l7hhWoOjNbMadbq70+P6aeaJ
CsB1i98h9KxqCW4ncSAAxXeWh1JmQWBI+SlSoYToZxhs46ELcCrTzXBSiK6u
gN82vjjjOSJprFnl2WBWRdRpxn1SijjF4XoLJFZgC5afXb5ysW6mDZWQIVNS
klOujQWIh8Ie+MeU/WjDs4/uHhUPD2A8dedMwUOjSD2kk6DSnmFfjEE6seks
CiVKarM03GkzH1ExGQ+HqhsDy1KyfCAGl30M3gGNnxWMp9b+X+Jx/ncFEUdK
H0NY31nG2Do52wKlU/1dztPs2ZsZDW6YTxlmNUdD7VgJBStzMcTrisE6pjeP
HNxPEz2T9sNmn8HCIhowUoQpF8e9UAH+/KlXAx0Y2mXx7bNn3yw0FDDxHc9x
k5NWZH6Icu8gO1163PUeSpHQ9z5kk1xcDaBs3DmFeBpUTms4wSQdiBIIjyvi
SR+Fp/yPsMKWoQXi3pSbvdGMaqGWNNHteghNW+dERWl/FMpiBJML1v5wcmgA
urWSDSgDj8LsCpXZiQDQ9qhamJ0O5zi0Ego67EhbTLWvHKh+9g1it5j2ZyLs
QvKkmogfg7qFjpd7J46qGJUBx418P28YWHTQjL8E0HRhDqjvsVew0unmlycW
h/J2wEIhefgHGKM58mAZaCL6YQrDZe3hUIWzkGy8qiLqhN75uBMl+mkxozSv
KvoJL8CGSvzj4hasjQPt8PtE+IN80jU7U4/tUVB+DRG0PEleu7TQpnOe4/7C
o+6gJXAdDdr4lbQdgJ6QEXgirYZWGEsQADtU2mJWFGoTMvIQR7hD46wZKuGU
3OWs97xtWqtSZ0eQiOrLseOGaaMP/VC39FR2XMV649faTcOWMQh22gWVDYd9
yz5KDh7hx9R9C31wGz9WCWXX+LRtkF/vB9Yg06GSOMwEqKUPwgWD8gEsvXC0
5Rg/T5RjKYLGkmMYUfdj5xEmklHuhMG0KuPLJ31VduQbwRBjbn0w9j6SuAZK
tIIvdezWKpyDHePzgX13KN4OQ8VD9RbOkw9o0TW9Xw3cYMWAU1CDPAb2U+Nk
swSZ6O4USnvEKh31WzqDoPm33qab5MmBXT8Moi43VUqll4quFIRxhzw6dIzy
9eInh7ds2kAWK7Y0KiRSyBNWbU3RwxPCrJKF8gWlgtM02tWOj1fGrjw5NjsR
CNce0OV7r2tQ6ObilWlWQeiBslA0ockO7TwiDCbhQaDVW1pPiZ1SFtyBApcn
V62s1D1p991hqUtdncHugfP6iJHhXCJpBkrtisq4eITaNYljwU6A5IYn3Lro
Kmkng3PxPkG7NdlsM2CwsMahuWlQ8h05b0ODkoKU94FOrGg46vSCupkBhWBV
cL1SDRWUxHVDZ6ZVOZqZn7iUwvEJfssQPaTy5Fymd4LJ4OAZ+kBzuOhohdmG
MGxUSzvlx+VsnJaMb360x33f1eljIPylUS07DCUlcEs3bdwEodkqaigmIl4a
QICs+dQ/Irq/nLIwH2Pk+LTGPRcUZdUUcICCUrs1sTIoM5kLIMLGaIoIvVq3
8bZEiYa/aBFBQ/QJRQuXsFHv7B6uQ/87OA67w4mhx3Bi41GUI3vHPhAOwnoB
vKnvhsIUPo4y6IBBwv5UtXsP27EaUpVaMb0w4QseCb3QgaFK+4fjSilc4dEu
jobL6POsjwUELIMpy9MQSOh8MMbUX4Lws55TfsozgtDzkRKhsrDGnarlDon8
nuML1D7UcJ/sy9NjqOjMYaey68vm5NQjRXokAypXYpHdWzKBmzvaU9ouHGBM
RkEB21VmxbehJCdcbpdCgqC+Yk2TTVEbWPZwyjUgn84sxpdVeA4B9+ebBkEI
uTVI5qpGY8gVbNccRsp0y1TTbby0xoTqZ3dEQF9CjdUcg4MnNuVndGnjOVOs
lQbxMeG45nc8uh9Ijd2vVq0EBemdGD3xL9fX7wC5YMgCsGejBT03yEgqjExD
FwEfp1Zw6Y224uLfxsCZ8AS5pZtEfRohvLWcwftpEwj3GOaLyeSmXjgRSJJa
cuEulOMh0vsoCvf6FrK4obnF8wjlvwD3jd1n3yNtL394//JSvODrxhcCPT3l
catqQ2dIvlzcdIuoiPz7x7yGR5YPXHjOvhKz0lf3YfRRHM1LHqLxhGhc0fUa
KIGChOsTKJQuEaa+cO/12umTP4r5U+df8hUEcFfXoEm3rFFufEVYcyejbNTT
h06k1Vlx05hdpcoVo0F2e+GvZ6vyT2dLdN/qjA75+TSvuRF0X7YR87VaLmmq
PLNN2Yp5sd6p5sYVa6qU8fhnFIONuJT1ZqGqaiL8VSPYVFXiJUqCWjYJEJCX
cRqPk0clbUXlflBZmOsPjlj/ByAiYNgSLwAA

-->

</rfc>
