<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-emu-eap-edhoc-09" category="std" consensus="true" submissionType="IETF" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <?v3xml2rfc silence="Found SVG with width or height specified"?>
  <front>
    <title abbrev="EAP-EDHOC">Using the Extensible Authentication Protocol (EAP) with Ephemeral Diffie-Hellman over COSE (EDHOC)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-emu-eap-edhoc-09"/>
    <author initials="D." surname="Garcia-Carrillo" fullname="Dan Garcia-Carrillo">
      <organization>University of Oviedo</organization>
      <address>
        <postal>
          <street>Gijon, Asturias  33203</street>
          <country>Spain</country>
        </postal>
        <email>garciadan@uniovi.es</email>
      </address>
    </author>
    <author initials="R." surname="Marin-Lopez" fullname="Rafael Marin-Lopez">
      <organization>University of Murcia</organization>
      <address>
        <postal>
          <street>Murcia  30100</street>
          <country>Spain</country>
        </postal>
        <email>rafa@um.es</email>
      </address>
    </author>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson</organization>
      <address>
        <postal>
          <street>SE-164 80 Stockholm</street>
          <country>Sweden</country>
        </postal>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson</organization>
      <address>
        <postal>
          <street>SE-164 80 Stockholm</street>
          <country>Sweden</country>
        </postal>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="F." surname="Lopez-Gomez" fullname="Francisco Lopez-Gomez">
      <organization>University of Murcia</organization>
      <address>
        <postal>
          <street>Murcia  30100</street>
          <country>Spain</country>
        </postal>
        <email>francisco.lopezg@um.es</email>
      </address>
    </author>
    <date year="2026" month="April" day="17"/>
    <area/>
    <workgroup>EAP Method Update</workgroup>
    <abstract>
      <?line 98?>

<t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the EAP authentication method EAP-EDHOC, based on Ephemeral Diffie-Hellman Over COSE (EDHOC). EDHOC is a lightweight security handshake protocol, enabling authentication and establishment of shared secret keys suitable in constrained settings. This document also provides guidance on authentication and authorization for EAP-EDHOC.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-emu-eap-edhoc/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        EAP Method Update  mailing list (<eref target="mailto:emu@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/emu"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/emu/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dangarciacarrillo/i-d-eap-edhoc"/>.</t>
    </note>
  </front>
  <middle>
    <?line 102?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Extensible Authentication Protocol (EAP), defined in <xref target="RFC3748"/>, provides a standard mechanism for support of multiple authentication methods. This document specifies the EAP authentication method EAP-EDHOC, which is based on the lightweight security handshake protocol Ephemeral Diffie-Hellman Over COSE (EDHOC) <xref target="RFC9528"/>.</t>
      <t>EAP-EDHOC is similar to EAP-TLS 1.3 <xref target="RFC9190"/>, since EDHOC is based on a similar security protocol design as the TLS 1.3 handshake <xref target="RFC8446"/>. However, EDHOC has been optimized for highly constrained settings, for example involving wirelessly connected battery powered 'things' with embedded microcontrollers, sensors, and actuators. An overview of EDHOC is given in <xref target="edhoc-overview"/>.</t>
      <t>The EAP-EDHOC method enables the integration of EDHOC into different applications and use cases using the EAP framework.</t>
      <section anchor="edhoc-overview">
        <name>EDHOC Overview</name>
        <t>Ephemeral Diffie-Hellman Over COSE (EDHOC) is a lightweight authenticated ephemeral key exchange, including mutual authentication and establishment of shared secret keying material, see <xref target="RFC9528"/>.</t>
        <t>EDHOC provides state-of-the-art security design at very low message overhead, targeting low complexity implementations and allowing extensibility. The security of EDHOC has been thoroughly analyzed, some references are provided in <xref section="9.1" sectionFormat="of" target="RFC9528"/>.</t>
        <t>The main features of EDHOC are:</t>
        <ul spacing="normal">
          <li>
            <t>Support for different authentication methods and credentials. The authentication methods include (mixed) signatures and static Diffie-Hellman keys <xref target="RFC9528"/>, and pre-shared keys <xref target="I-D.ietf-lake-edhoc-psk"/>. A wide and extensible range of authentication credentials is supported, including public key certificates such as X.509 and C509 <xref target="I-D.ietf-cose-cbor-encoded-cert"/>, as well as CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392"/>.</t>
          </li>
          <li>
            <t>A standardized and extensible format for identification of credentials, using COSE header parameters <xref target="RFC9052"/>, supporting credential transport by value or by reference, enabling very compact representations.</t>
          </li>
          <li>
            <t>Crypto agility and secure cipher suite negotiation, with predefined compactly represented cipher suites and support for extensibility using the COSE algorithms registry <xref target="RFC9053"/>.</t>
          </li>
          <li>
            <t>Selection of connection identifiers identifying a session for which keys are agreed.</t>
          </li>
          <li>
            <t>Support for integration of external security applications into EDHOC by transporting External Authorization Data (EAD) included in and protected as EDHOC messages.</t>
          </li>
        </ul>
        <t>A necessary condition for a successful completion of an EDHOC session is that both peers support a common application profile including method, cipher suite,  etc. More details are provided in  <xref target="I-D.ietf-lake-app-profiles"/>.</t>
        <t>EDHOC messages make use of lightweight primitives, specifically CBOR <xref target="RFC8949"/> and COSE <xref target="RFC9052"/> <xref target="RFC9053"/> for efficient encoding and security services in constrained devices. EDHOC is optimized for use with CoAP <xref target="RFC7252"/> and OSCORE <xref target="RFC8613"/> to secure resource access in constrained IoT use cases, but it is not bound to a particular transport or communication security protocol.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Readers are expected to be familiar with the terms and concepts defined in EAP <xref target="RFC3748"/> and EDHOC <xref target="RFC9528"/>, in particular the following.</t>
      <t>Acronyms and Terms:</t>
      <ul spacing="normal">
        <li>
          <t>MSK - Master Session Key; defined in <xref target="RFC3748"/>.</t>
        </li>
        <li>
          <t>EMSK - Extended Master Session Key; defined in <xref target="RFC3748"/>.</t>
        </li>
        <li>
          <t>Initiator - In EAP-EDHOC, the EAP peer assumes the role of the EDHOC Initiator; therefore, this term is used interchangeably with EAP peer; defined in <xref target="RFC9528"/>.</t>
        </li>
        <li>
          <t>Responder - In EAP-EDHOC, the EAP server assumes the role of the EDHOC Responder; therefore, this term is used interchangeably with EAP server; defined in <xref target="RFC9528"/>.</t>
        </li>
      </ul>
    </section>
    <section anchor="overview">
      <name>Protocol Overview</name>
      <section anchor="overview-of-the-eap-edhoc-conversation">
        <name>Overview of the EAP-EDHOC Conversation</name>
        <t>The EAP exchange involves three key entities: the EAP peer, the EAP authenticator, and the EAP server. The EAP authenticator is a network device that enforces access control and initiates the EAP authentication process. The EAP peer is the device seeking network access and communicates directly with the EAP authenticator. The EAP server is responsible for selecting and implementing the authentication methods and for authenticating the EAP peer. When the EAP server is not located on a separate backend authentication server, it is integrated into the EAP authenticator. For simplicity, the operational flow diagrams in this document depict only the EAP peer and the EAP server.</t>
        <t>The EDHOC protocol running between an Initiator and a Responder consists of three mandatory messages (message_1, message_2, message_3), an optional message_4, and an error message. In an EDHOC session, EAP-EDHOC uses all messages including message_4, which is mandatory and acts as a protected success indication.</t>
        <t>After receiving an EAP-Request packet with EAP-Type=EAP-EDHOC as described in this document, the conversation will continue with the EDHOC messages transported in the data fields of EAP-Response and EAP-Request packets. When EAP-EDHOC is used, the formatting and processing of EDHOC messages <bcp14>SHALL</bcp14> be done as specified in <xref target="RFC9528"/>. This document only lists additional and different requirements, restrictions, and processing compared to <xref target="RFC9528"/>.</t>
        <t>The message processing in <xref section="5" sectionFormat="of" target="RFC9528"/> states that certain data (EAD items, connection identifiers, application algorithms, etc.) is made available to the application. Since EAP-EDHOC is now acting as the application of EDHOC, it may need to handle this data to complete the protocol execution. See also <xref target="I-D.ietf-lake-edhoc-impl-cons"/>.</t>
        <t>Resumption of EAP-EDHOC may be defined using the EDHOC-PSK authentication method <xref target="I-D.ietf-lake-edhoc-psk"/>.</t>
        <section anchor="successful-eap-edhoc-message-flow-without-fragmentation">
          <name>Successful EAP-EDHOC Message Flow without Fragmentation</name>
          <t>EDHOC allows EAP-EDHOC to support authentication credentials of any type defined by COSE, which can be either transported or referenced during the protocol.</t>
          <t>The optimization combining the execution of EDHOC with the first subsequent OSCORE transaction specified in <xref target="RFC9668"/> is not applicable to this EAP method.</t>
          <t><xref target="message-flow"/> shows an example message flow for a successful execution of EAP-EDHOC.</t>
          <figure anchor="message-flow">
            <name>EAP-EDHOC Message Flow</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="608" width="528" viewBox="0 0 528 608" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 40,64 L 40,592" fill="none" stroke="black"/>
                  <path d="M 488,64 L 488,592" fill="none" stroke="black"/>
                  <path d="M 56,96 L 472,96" fill="none" stroke="black"/>
                  <path d="M 56,160 L 472,160" fill="none" stroke="black"/>
                  <path d="M 56,224 L 472,224" fill="none" stroke="black"/>
                  <path d="M 56,288 L 472,288" fill="none" stroke="black"/>
                  <path d="M 56,352 L 472,352" fill="none" stroke="black"/>
                  <path d="M 56,416 L 472,416" fill="none" stroke="black"/>
                  <path d="M 56,480 L 472,480" fill="none" stroke="black"/>
                  <path d="M 56,528 L 472,528" fill="none" stroke="black"/>
                  <path d="M 56,576 L 472,576" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="480,528 468,522.4 468,533.6" fill="black" transform="rotate(0,472,528)"/>
                  <polygon class="arrowhead" points="480,416 468,410.4 468,421.6" fill="black" transform="rotate(0,472,416)"/>
                  <polygon class="arrowhead" points="480,288 468,282.4 468,293.6" fill="black" transform="rotate(0,472,288)"/>
                  <polygon class="arrowhead" points="480,160 468,154.4 468,165.6" fill="black" transform="rotate(0,472,160)"/>
                  <polygon class="arrowhead" points="64,576 52,570.4 52,581.6" fill="black" transform="rotate(180,56,576)"/>
                  <polygon class="arrowhead" points="64,480 52,474.4 52,485.6" fill="black" transform="rotate(180,56,480)"/>
                  <polygon class="arrowhead" points="64,352 52,346.4 52,357.6" fill="black" transform="rotate(180,56,352)"/>
                  <polygon class="arrowhead" points="64,224 52,218.4 52,229.6" fill="black" transform="rotate(180,56,224)"/>
                  <polygon class="arrowhead" points="64,96 52,90.4 52,101.6" fill="black" transform="rotate(180,56,96)"/>
                  <g class="text">
                    <text x="40" y="36">EAP-EDHOC</text>
                    <text x="100" y="36">Peer</text>
                    <text x="432" y="36">EAP-EDHOC</text>
                    <text x="500" y="36">Server</text>
                    <text x="380" y="84">EAP-Request/Identity</text>
                    <text x="152" y="132">EAP-Response/Identity</text>
                    <text x="140" y="148">(Privacy-Friendly)</text>
                    <text x="340" y="196">EAP-Request/EAP-Type=EAP-EDHOC</text>
                    <text x="380" y="212">(EDHOC</text>
                    <text x="436" y="212">Start)</text>
                    <text x="192" y="260">EAP-Response/EAP-Type=EAP-EDHOC</text>
                    <text x="92" y="276">(EDHOC</text>
                    <text x="164" y="276">message_1)</text>
                    <text x="340" y="324">EAP-Request/EAP-Type=EAP-EDHOC</text>
                    <text x="348" y="340">(EDHOC</text>
                    <text x="420" y="340">message_2)</text>
                    <text x="192" y="388">EAP-Response/EAP-Type=EAP-EDHOC</text>
                    <text x="92" y="404">(EDHOC</text>
                    <text x="164" y="404">message_3)</text>
                    <text x="340" y="452">EAP-Request/EAP-Type=EAP-EDHOC</text>
                    <text x="348" y="468">(EDHOC</text>
                    <text x="420" y="468">message_4)</text>
                    <text x="192" y="516">EAP-Response/EAP-Type=EAP-EDHOC</text>
                    <text x="416" y="564">EAP-Success</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
EAP-EDHOC Peer                                   EAP-EDHOC Server

    |                                                       |
    |                                EAP-Request/Identity   |
    | <---------------------------------------------------- |
    |                                                       |
    |   EAP-Response/Identity                               |
    |   (Privacy-Friendly)                                  |
    | ----------------------------------------------------> |
    |                                                       |
    |                      EAP-Request/EAP-Type=EAP-EDHOC   |
    |                                       (EDHOC Start)   |
    | <---------------------------------------------------- |
    |                                                       |
    |   EAP-Response/EAP-Type=EAP-EDHOC                     |
    |   (EDHOC message_1)                                   |
    | ----------------------------------------------------> |
    |                                                       |
    |                      EAP-Request/EAP-Type=EAP-EDHOC   |
    |                                   (EDHOC message_2)   |
    | <---------------------------------------------------- |
    |                                                       |
    |   EAP-Response/EAP-Type=EAP-EDHOC                     |
    |   (EDHOC message_3)                                   |
    | ----------------------------------------------------> |
    |                                                       |
    |                      EAP-Request/EAP-Type=EAP-EDHOC   |
    |                                   (EDHOC message_4)   |
    | <---------------------------------------------------- |
    |                                                       |
    |   EAP-Response/EAP-Type=EAP-EDHOC                     |
    | ----------------------------------------------------> |
    |                                                       |
    |                                         EAP-Success   |
    | <---------------------------------------------------- |
    |                                                       |
]]></artwork>
            </artset>
          </figure>
          <t>If the EAP-EDHOC peer authenticates successfully, the EAP-EDHOC server <bcp14>MUST</bcp14> send an EAP-Request packet with EAP-Type=EAP-EDHOC containing message_4 as a protected success indication.</t>
          <t>If the EAP-EDHOC server authenticates successfully, and the EAP-EDHOC peer achieves key confirmation by successfully verifying EDHOC message_4, then the EAP-EDHOC peer <bcp14>MUST</bcp14> send an EAP-Response message with EAP-Type=EAP-EDHOC containing no data. Finally, the EAP-EDHOC server sends an EAP-Success.</t>
          <t>Note that the Identity request is optional <xref target="RFC3748"/> and might not be used in systems like 3GPP 5G <xref target="Sec5G"/> where the identity is transferred encrypted by other means before the EAP exchange. While the EAP-Response/EAP-Type=EAP-EDHOC and EAP-Success are mandatory <xref target="RFC3748"/> they do not contain any information and might be encoded into other system specific messages <xref target="Sec5G"/>.</t>
        </section>
        <section anchor="transport-and-message-correlation">
          <name>Transport and Message Correlation</name>
          <t>EDHOC is not bound to a particular transport layer and can even be used in environments without IP. Nonetheless, <xref target="RFC9528"/> provides a set of requirements for a transport protocol to use with EDHOC. These include: handling the loss, reordering, duplication, correlation, and fragmentation of messages; demultiplexing EDHOC messages from other types of messages; and denial-of-service protection. These requirements can be met by the EAP framework, the EAP-EDHOC method specification, and properties of the EAP lower layer, as specified in <xref target="RFC3748"/>.</t>
          <t>For message loss, this can be either fulfilled by the EAP layer, the EAP lower layer, or both.</t>
          <t>For message reordering, correct operation assumes that the EAP lower layer preserves packet ordering within an EAP conversation.</t>
          <t>For duplication and message correlation, EAP has the Identifier field, which allows both the EAP peer and EAP authenticator to detect duplicates and match a request with a response.</t>
          <t>Fragmentation is defined by this EAP method, see <xref target="fragmentation"/>. The EAP framework <xref target="RFC3748"/>, specifies that EAP methods need to provide fragmentation and reassembly if EAP packets can exceed the minimum MTU of 1020 octets.</t>
          <t>To demultiplex EDHOC messages from other types of messages, EAP provides the Type field.</t>
          <t>This method does not provide any additional mitigation against denial-of-service attacks beyond those specified in EAP <xref target="RFC3748"/>.</t>
        </section>
        <section anchor="termination">
          <name>Termination</name>
          <t><xref target="message1-reject"/>, <xref target="message2-reject"/>, <xref target="message3-reject"/>, and <xref target="message4-reject"/> illustrate message flows in several cases where the EAP-EDHOC peer or EAP-EDHOC server sends an EDHOC error message.</t>
          <t><xref target="message1-reject"/> shows an example message flow where the EAP-EDHOC server rejects message_1 with an EDHOC error message.</t>
          <figure anchor="message1-reject">
            <name>EAP-EDHOC Server Rejection of message_1</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="480" width="528" viewBox="0 0 528 480" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 40,64 L 40,464" fill="none" stroke="black"/>
                  <path d="M 488,64 L 488,464" fill="none" stroke="black"/>
                  <path d="M 56,96 L 472,96" fill="none" stroke="black"/>
                  <path d="M 56,160 L 472,160" fill="none" stroke="black"/>
                  <path d="M 56,224 L 472,224" fill="none" stroke="black"/>
                  <path d="M 56,288 L 472,288" fill="none" stroke="black"/>
                  <path d="M 56,352 L 472,352" fill="none" stroke="black"/>
                  <path d="M 56,400 L 472,400" fill="none" stroke="black"/>
                  <path d="M 56,448 L 472,448" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="480,400 468,394.4 468,405.6" fill="black" transform="rotate(0,472,400)"/>
                  <polygon class="arrowhead" points="480,288 468,282.4 468,293.6" fill="black" transform="rotate(0,472,288)"/>
                  <polygon class="arrowhead" points="480,160 468,154.4 468,165.6" fill="black" transform="rotate(0,472,160)"/>
                  <polygon class="arrowhead" points="64,448 52,442.4 52,453.6" fill="black" transform="rotate(180,56,448)"/>
                  <polygon class="arrowhead" points="64,352 52,346.4 52,357.6" fill="black" transform="rotate(180,56,352)"/>
                  <polygon class="arrowhead" points="64,224 52,218.4 52,229.6" fill="black" transform="rotate(180,56,224)"/>
                  <polygon class="arrowhead" points="64,96 52,90.4 52,101.6" fill="black" transform="rotate(180,56,96)"/>
                  <g class="text">
                    <text x="40" y="36">EAP-EDHOC</text>
                    <text x="100" y="36">Peer</text>
                    <text x="432" y="36">EAP-EDHOC</text>
                    <text x="500" y="36">Server</text>
                    <text x="380" y="84">EAP-Request/Identity</text>
                    <text x="152" y="132">EAP-Response/Identity</text>
                    <text x="140" y="148">(Privacy-Friendly)</text>
                    <text x="340" y="196">EAP-Request/EAP-Type=EAP-EDHOC</text>
                    <text x="380" y="212">(EDHOC</text>
                    <text x="436" y="212">Start)</text>
                    <text x="192" y="260">EAP-Response/EAP-Type=EAP-EDHOC</text>
                    <text x="92" y="276">(EDHOC</text>
                    <text x="164" y="276">message_1)</text>
                    <text x="340" y="324">EAP-Request/EAP-Type=EAP-EDHOC</text>
                    <text x="380" y="340">(EDHOC</text>
                    <text x="436" y="340">error)</text>
                    <text x="192" y="388">EAP-Response/EAP-Type=EAP-EDHOC</text>
                    <text x="416" y="436">EAP-Failure</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
EAP-EDHOC Peer                                   EAP-EDHOC Server

    |                                                       |
    |                                EAP-Request/Identity   |
    | <---------------------------------------------------- |
    |                                                       |
    |   EAP-Response/Identity                               |
    |   (Privacy-Friendly)                                  |
    | ----------------------------------------------------> |
    |                                                       |
    |                      EAP-Request/EAP-Type=EAP-EDHOC   |
    |                                       (EDHOC Start)   |
    | <---------------------------------------------------- |
    |                                                       |
    |   EAP-Response/EAP-Type=EAP-EDHOC                     |
    |   (EDHOC message_1)                                   |
    | ----------------------------------------------------> |
    |                                                       |
    |                      EAP-Request/EAP-Type=EAP-EDHOC   |
    |                                       (EDHOC error)   |
    | <---------------------------------------------------- |
    |                                                       |
    |   EAP-Response/EAP-Type=EAP-EDHOC                     |
    | ----------------------------------------------------> |
    |                                                       |
    |                                         EAP-Failure   |
    | <---------------------------------------------------- |
    |                                                       |
]]></artwork>
            </artset>
          </figure>
          <t><xref target="message2-reject"/> shows an example message flow where the EAP-EDHOC server authentication is unsuccessful and the EAP-EDHOC peer sends an EDHOC error message.</t>
          <figure anchor="message2-reject">
            <name>EAP-EDHOC Peer Rejection of message_2</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="496" width="528" viewBox="0 0 528 496" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 40,64 L 40,480" fill="none" stroke="black"/>
                  <path d="M 488,64 L 488,480" fill="none" stroke="black"/>
                  <path d="M 56,96 L 472,96" fill="none" stroke="black"/>
                  <path d="M 56,160 L 472,160" fill="none" stroke="black"/>
                  <path d="M 56,224 L 472,224" fill="none" stroke="black"/>
                  <path d="M 56,288 L 472,288" fill="none" stroke="black"/>
                  <path d="M 56,352 L 472,352" fill="none" stroke="black"/>
                  <path d="M 56,416 L 472,416" fill="none" stroke="black"/>
                  <path d="M 56,464 L 472,464" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="480,416 468,410.4 468,421.6" fill="black" transform="rotate(0,472,416)"/>
                  <polygon class="arrowhead" points="480,288 468,282.4 468,293.6" fill="black" transform="rotate(0,472,288)"/>
                  <polygon class="arrowhead" points="480,160 468,154.4 468,165.6" fill="black" transform="rotate(0,472,160)"/>
                  <polygon class="arrowhead" points="64,464 52,458.4 52,469.6" fill="black" transform="rotate(180,56,464)"/>
                  <polygon class="arrowhead" points="64,352 52,346.4 52,357.6" fill="black" transform="rotate(180,56,352)"/>
                  <polygon class="arrowhead" points="64,224 52,218.4 52,229.6" fill="black" transform="rotate(180,56,224)"/>
                  <polygon class="arrowhead" points="64,96 52,90.4 52,101.6" fill="black" transform="rotate(180,56,96)"/>
                  <g class="text">
                    <text x="40" y="36">EAP-EDHOC</text>
                    <text x="100" y="36">Peer</text>
                    <text x="432" y="36">EAP-EDHOC</text>
                    <text x="500" y="36">Server</text>
                    <text x="380" y="84">EAP-Request/Identity</text>
                    <text x="152" y="132">EAP-Response/Identity</text>
                    <text x="140" y="148">(Privacy-Friendly)</text>
                    <text x="340" y="196">EAP-Request/EAP-Type=EAP-EDHOC</text>
                    <text x="380" y="212">(EDHOC</text>
                    <text x="436" y="212">Start)</text>
                    <text x="192" y="260">EAP-Response/EAP-Type=EAP-EDHOC</text>
                    <text x="92" y="276">(EDHOC</text>
                    <text x="164" y="276">message_1)</text>
                    <text x="340" y="324">EAP-Request/EAP-Type=EAP-EDHOC</text>
                    <text x="348" y="340">(EDHOC</text>
                    <text x="420" y="340">message_2)</text>
                    <text x="192" y="388">EAP-Response/EAP-Type=EAP-EDHOC</text>
                    <text x="92" y="404">(EDHOC</text>
                    <text x="148" y="404">error)</text>
                    <text x="416" y="452">EAP-Failure</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
EAP-EDHOC Peer                                   EAP-EDHOC Server

    |                                                       |
    |                                EAP-Request/Identity   |
    | <---------------------------------------------------- |
    |                                                       |
    |   EAP-Response/Identity                               |
    |   (Privacy-Friendly)                                  |
    | ----------------------------------------------------> |
    |                                                       |
    |                      EAP-Request/EAP-Type=EAP-EDHOC   |
    |                                       (EDHOC Start)   |
    | <---------------------------------------------------- |
    |                                                       |
    |   EAP-Response/EAP-Type=EAP-EDHOC                     |
    |   (EDHOC message_1)                                   |
    | ----------------------------------------------------> |
    |                                                       |
    |                      EAP-Request/EAP-Type=EAP-EDHOC   |
    |                                   (EDHOC message_2)   |
    | <---------------------------------------------------- |
    |                                                       |
    |   EAP-Response/EAP-Type=EAP-EDHOC                     |
    |   (EDHOC error)                                       |
    | ----------------------------------------------------> |
    |                                                       |
    |                                         EAP-Failure   |
    | <---------------------------------------------------- |
    |                                                       |
]]></artwork>
            </artset>
          </figure>
          <t><xref target="message3-reject"/> shows an example message flow where the EAP-EDHOC server authenticates to the EAP-EDHOC peer successfully, but the EAP-EDHOC peer fails to authenticate to the EAP-EDHOC server, and the server sends an EDHOC error message.</t>
          <t>Note that the EDHOC error message cannot be omitted. For example, with EDHOC ERR_CODE 3 "Unknown credential referenced", it is indicated that the EDHOC peer should, for the next EDHOC session, try another credential identifier supported according to the application profile.</t>
          <figure anchor="message3-reject">
            <name>EAP-EDHOC Server Rejection of message_3</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="608" width="528" viewBox="0 0 528 608" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 40,64 L 40,592" fill="none" stroke="black"/>
                  <path d="M 488,64 L 488,592" fill="none" stroke="black"/>
                  <path d="M 56,96 L 472,96" fill="none" stroke="black"/>
                  <path d="M 56,160 L 472,160" fill="none" stroke="black"/>
                  <path d="M 56,224 L 472,224" fill="none" stroke="black"/>
                  <path d="M 56,288 L 472,288" fill="none" stroke="black"/>
                  <path d="M 56,352 L 472,352" fill="none" stroke="black"/>
                  <path d="M 56,416 L 472,416" fill="none" stroke="black"/>
                  <path d="M 56,480 L 472,480" fill="none" stroke="black"/>
                  <path d="M 56,528 L 472,528" fill="none" stroke="black"/>
                  <path d="M 56,576 L 472,576" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="480,528 468,522.4 468,533.6" fill="black" transform="rotate(0,472,528)"/>
                  <polygon class="arrowhead" points="480,416 468,410.4 468,421.6" fill="black" transform="rotate(0,472,416)"/>
                  <polygon class="arrowhead" points="480,288 468,282.4 468,293.6" fill="black" transform="rotate(0,472,288)"/>
                  <polygon class="arrowhead" points="480,160 468,154.4 468,165.6" fill="black" transform="rotate(0,472,160)"/>
                  <polygon class="arrowhead" points="64,576 52,570.4 52,581.6" fill="black" transform="rotate(180,56,576)"/>
                  <polygon class="arrowhead" points="64,480 52,474.4 52,485.6" fill="black" transform="rotate(180,56,480)"/>
                  <polygon class="arrowhead" points="64,352 52,346.4 52,357.6" fill="black" transform="rotate(180,56,352)"/>
                  <polygon class="arrowhead" points="64,224 52,218.4 52,229.6" fill="black" transform="rotate(180,56,224)"/>
                  <polygon class="arrowhead" points="64,96 52,90.4 52,101.6" fill="black" transform="rotate(180,56,96)"/>
                  <g class="text">
                    <text x="40" y="36">EAP-EDHOC</text>
                    <text x="100" y="36">Peer</text>
                    <text x="432" y="36">EAP-EDHOC</text>
                    <text x="500" y="36">Server</text>
                    <text x="380" y="84">EAP-Request/Identity</text>
                    <text x="152" y="132">EAP-Response/Identity</text>
                    <text x="140" y="148">(Privacy-Friendly)</text>
                    <text x="340" y="196">EAP-Request/EAP-Type=EAP-EDHOC</text>
                    <text x="380" y="212">(EDHOC</text>
                    <text x="436" y="212">Start)</text>
                    <text x="192" y="260">EAP-Response/EAP-Type=EAP-EDHOC</text>
                    <text x="92" y="276">(EDHOC</text>
                    <text x="164" y="276">message_1)</text>
                    <text x="340" y="324">EAP-Request/EAP-Type=EAP-EDHOC</text>
                    <text x="348" y="340">(EDHOC</text>
                    <text x="420" y="340">message_2)</text>
                    <text x="192" y="388">EAP-Response/EAP-Type=EAP-EDHOC</text>
                    <text x="92" y="404">(EDHOC</text>
                    <text x="164" y="404">message_3)</text>
                    <text x="340" y="452">EAP-Request/EAP-Type=EAP-EDHOC</text>
                    <text x="380" y="468">(EDHOC</text>
                    <text x="436" y="468">error)</text>
                    <text x="192" y="516">EAP-Response/EAP-Type=EAP-EDHOC</text>
                    <text x="416" y="564">EAP-Failure</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
EAP-EDHOC Peer                                   EAP-EDHOC Server

    |                                                       |
    |                                EAP-Request/Identity   |
    | <---------------------------------------------------- |
    |                                                       |
    |   EAP-Response/Identity                               |
    |   (Privacy-Friendly)                                  |
    | ----------------------------------------------------> |
    |                                                       |
    |                      EAP-Request/EAP-Type=EAP-EDHOC   |
    |                                       (EDHOC Start)   |
    | <---------------------------------------------------- |
    |                                                       |
    |   EAP-Response/EAP-Type=EAP-EDHOC                     |
    |   (EDHOC message_1)                                   |
    | ----------------------------------------------------> |
    |                                                       |
    |                      EAP-Request/EAP-Type=EAP-EDHOC   |
    |                                   (EDHOC message_2)   |
    | <---------------------------------------------------- |
    |                                                       |
    |   EAP-Response/EAP-Type=EAP-EDHOC                     |
    |   (EDHOC message_3)                                   |
    | ----------------------------------------------------> |
    |                                                       |
    |                      EAP-Request/EAP-Type=EAP-EDHOC   |
    |                                       (EDHOC error)   |
    | <---------------------------------------------------- |
    |                                                       |
    |   EAP-Response/EAP-Type=EAP-EDHOC                     |
    | ----------------------------------------------------> |
    |                                                       |
    |                                         EAP-Failure   |
    | <---------------------------------------------------- |
    |                                                       |
]]></artwork>
            </artset>
          </figure>
          <t><xref target="message4-reject"/> shows an example message flow where the EAP-EDHOC server sends the EDHOC message_4 to the EAP peer, but the protected success indication fails, and the peer sends an EDHOC error message.</t>
          <figure anchor="message4-reject">
            <name>EAP-EDHOC Peer Rejection of message_4</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="624" width="528" viewBox="0 0 528 624" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 40,64 L 40,608" fill="none" stroke="black"/>
                  <path d="M 488,64 L 488,608" fill="none" stroke="black"/>
                  <path d="M 56,96 L 472,96" fill="none" stroke="black"/>
                  <path d="M 56,160 L 472,160" fill="none" stroke="black"/>
                  <path d="M 56,224 L 472,224" fill="none" stroke="black"/>
                  <path d="M 56,288 L 472,288" fill="none" stroke="black"/>
                  <path d="M 56,352 L 472,352" fill="none" stroke="black"/>
                  <path d="M 56,416 L 472,416" fill="none" stroke="black"/>
                  <path d="M 56,480 L 464,480" fill="none" stroke="black"/>
                  <path d="M 56,544 L 472,544" fill="none" stroke="black"/>
                  <path d="M 56,592 L 472,592" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="480,544 468,538.4 468,549.6" fill="black" transform="rotate(0,472,544)"/>
                  <polygon class="arrowhead" points="480,416 468,410.4 468,421.6" fill="black" transform="rotate(0,472,416)"/>
                  <polygon class="arrowhead" points="480,288 468,282.4 468,293.6" fill="black" transform="rotate(0,472,288)"/>
                  <polygon class="arrowhead" points="480,160 468,154.4 468,165.6" fill="black" transform="rotate(0,472,160)"/>
                  <polygon class="arrowhead" points="64,592 52,586.4 52,597.6" fill="black" transform="rotate(180,56,592)"/>
                  <polygon class="arrowhead" points="64,480 52,474.4 52,485.6" fill="black" transform="rotate(180,56,480)"/>
                  <polygon class="arrowhead" points="64,352 52,346.4 52,357.6" fill="black" transform="rotate(180,56,352)"/>
                  <polygon class="arrowhead" points="64,224 52,218.4 52,229.6" fill="black" transform="rotate(180,56,224)"/>
                  <polygon class="arrowhead" points="64,96 52,90.4 52,101.6" fill="black" transform="rotate(180,56,96)"/>
                  <g class="text">
                    <text x="40" y="36">EAP-EDHOC</text>
                    <text x="100" y="36">Peer</text>
                    <text x="432" y="36">EAP-EDHOC</text>
                    <text x="500" y="36">Server</text>
                    <text x="380" y="84">EAP-Request/Identity</text>
                    <text x="152" y="132">EAP-Response/Identity</text>
                    <text x="140" y="148">(Privacy-Friendly)</text>
                    <text x="340" y="196">EAP-Request/EAP-Type=EAP-EDHOC</text>
                    <text x="380" y="212">(EDHOC</text>
                    <text x="436" y="212">Start)</text>
                    <text x="192" y="260">EAP-Response/EAP-Type=EAP-EDHOC</text>
                    <text x="92" y="276">(EDHOC</text>
                    <text x="164" y="276">message_1)</text>
                    <text x="340" y="324">EAP-Request/EAP-Type=EAP-EDHOC</text>
                    <text x="348" y="340">(EDHOC</text>
                    <text x="420" y="340">message_2)</text>
                    <text x="192" y="388">EAP-Response/EAP-Type=EAP-EDHOC</text>
                    <text x="92" y="404">(EDHOC</text>
                    <text x="164" y="404">message_3)</text>
                    <text x="340" y="452">EAP-Request/EAP-Type=EAP-EDHOC</text>
                    <text x="348" y="468">(EDHOC</text>
                    <text x="420" y="468">message_4)</text>
                    <text x="192" y="516">EAP-Response/EAP-Type=EAP-EDHOC</text>
                    <text x="92" y="532">(EDHOC</text>
                    <text x="148" y="532">error)</text>
                    <text x="416" y="580">EAP-Failure</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
EAP-EDHOC Peer                                   EAP-EDHOC Server

    |                                                       |
    |                                EAP-Request/Identity   |
    | <---------------------------------------------------- |
    |                                                       |
    |   EAP-Response/Identity                               |
    |   (Privacy-Friendly)                                  |
    | ----------------------------------------------------> |
    |                                                       |
    |                      EAP-Request/EAP-Type=EAP-EDHOC   |
    |                                       (EDHOC Start)   |
    | <---------------------------------------------------- |
    |                                                       |
    |   EAP-Response/EAP-Type=EAP-EDHOC                     |
    |   (EDHOC message_1)                                   |
    | ----------------------------------------------------> |
    |                                                       |
    |                      EAP-Request/EAP-Type=EAP-EDHOC   |
    |                                   (EDHOC message_2)   |
    | <---------------------------------------------------- |
    |                                                       |
    |   EAP-Response/EAP-Type=EAP-EDHOC                     |
    |   (EDHOC message_3)                                   |
    | ----------------------------------------------------> |
    |                                                       |
    |                      EAP-Request/EAP-Type=EAP-EDHOC   |
    |                                   (EDHOC message_4)   |
    | <---------------------------------------------------  |
    |                                                       |
    |   EAP-Response/EAP-Type=EAP-EDHOC                     |
    |   (EDHOC error)                                       |
    | ----------------------------------------------------> |
    |                                                       |
    |                                         EAP-Failure   |
    | <---------------------------------------------------- |
    |                                                       |
]]></artwork>
            </artset>
          </figure>
        </section>
        <section anchor="identity">
          <name>Identity</name>
          <t>It is <bcp14>RECOMMENDED</bcp14> to use anonymous Network Access Identifiers (NAIs) <xref target="RFC7542"/> in the Identity Response, as such identities are routable and privacy-friendly.</t>
          <t>While opaque blobs are allowed by <xref target="RFC3748"/>, such identities are <bcp14>NOT RECOMMENDED</bcp14> as they are not routable and should only be considered in local deployments where the EAP-EDHOC peer, EAP authenticator, and EAP-EDHOC server all belong to the same network.</t>
          <t>Many client certificates contain an identity such as an email address, which is already in NAI format. When the certificate contains an NAI as subject name or alternative subject name, an anonymous NAI <bcp14>SHOULD</bcp14> be derived from the NAI in the certificate. See <xref target="privacy"/>.</t>
        </section>
        <section anchor="privacy">
          <name>Privacy</name>
          <t>EAP-EDHOC peer and server implementations supporting EAP-EDHOC <bcp14>MUST</bcp14> support anonymous NAIs (Section 2.4 of <xref target="RFC7542"/>).
A node supporting EAP-EDHOC <bcp14>MUST NOT</bcp14> send its username (or any other permanent identifiers) in cleartext in the Identity Response (or any message used instead of the Identity Response). Following <xref target="RFC7542"/>, it is <bcp14>RECOMMENDED</bcp14> to omit the username (i.e., the NAI is @realm), but other constructions such as a fixed username (e.g., anonymous@realm) or an encrypted username (e.g., xCZINCPTK5+7y81CrSYbPg+RKPE3OTrYLn4AQc4AC2U=@realm) are allowed. Note that the NAI <bcp14>MUST</bcp14> be a UTF-8 string as defined by the grammar in Section 2.2 of <xref target="RFC7542"/>.</t>
        </section>
        <section anchor="fragmentation">
          <name>Fragmentation</name>
          <t>EDHOC is designed to perform well in constrained networks where message sizes are restricted for performance reasons. When credentials are transferred by reference, EAP-EDHOC messages are typically so small that fragmentation is not needed. However, as EAP-EDHOC also supports large X.509 certificate chains, EAP-EDHOC implementations <bcp14>MUST</bcp14> provide support for fragmentation and reassembly. Some EAP implementations and access networks impose limits on the number of EAP packet exchanges that can be processed. To minimize fragmentation, it is <bcp14>RECOMMENDED</bcp14> to use compact EAP-EDHOC peer, EAP-EDHOC server, and trust anchor authentication credentials, as well as to limit the length of certificate chains. Additionally, mechanisms that reduce the size of Certificate messages are <bcp14>RECOMMENDED</bcp14>.</t>
          <t>Since EAP is a lock-step protocol, fragmentation support can be easily added. To do so, the EAP-Response and EAP-Request packets of EAP-EDHOC have a set of information fields that allow for the specification of the fragmentation process (see <xref target="detailed-description"/> for the detailed description). As a summary, EAP-EDHOC fragmentation support is provided through the addition of flag bits (M and L) within the EAP-Response and EAP-Request packets, as well as a (conditional) EAP-EDHOC Message Length field that can be zero to four octets.</t>
          <t>The EDHOC Message Length field conveys the total length of the EDHOC message being fragmented, which facilitates buffer allocation. The L flag consists of three bits that determine the length of the EDHOC Message Length field. This L flag and the EAP-EDHOC Message Length field <bcp14>MUST</bcp14> be present only in the first fragment of a fragmented EDHOC message, thereby signaling that the EDHOC message is fragmented. Implementations <bcp14>MUST NOT</bcp14> set any of the L flag bits to 1 in unfragmented messages.</t>
          <t>The S flag bit <bcp14>SHALL</bcp14> be set in the EAP-EDHOC Start message sent by the EAP server to the peer. The S flag bit <bcp14>SHALL NOT</bcp14> be set in any other EAP-EDHOC messages. The M flag bit <bcp14>SHALL</bcp14> be set in all fragments except the last one.</t>
          <t>When an EAP-EDHOC peer receives an EAP-Request packet with the M bit set, it <bcp14>MUST</bcp14> respond with an EAP-Response packet with EAP-Type=EAP-EDHOC, including the flags octect with S=0, M=0, L=0 and an empty EDHOC payload. This message serves as a fragment ACK. The EAP server <bcp14>MUST</bcp14> wait until it receives the EAP-Response before sending another fragment. To prevent errors in the processing of fragments, the EAP server <bcp14>MUST</bcp14> increment the Identifier field for each fragment contained within an EAP-Request, and the peer <bcp14>MUST</bcp14> include this Identifier value in the fragment ACK contained within the EAP-Response. Retransmitted fragments will contain the same Identifier value.</t>
          <t>Similarly, when the EAP-EDHOC server receives an EAP-Response with the M bit set, it <bcp14>MUST</bcp14> respond with an EAP-Request packet with EAP-Type=EAP-EDHOC, including the flags octect with S=0, M=0, L=0 and an empty EDHOC payload. This message serves as a fragment ACK. The EAP peer <bcp14>MUST</bcp14> wait until it receives the EAP-Request before sending another fragment. To prevent errors in the processing of fragments, the EAP server <bcp14>MUST</bcp14> increment the Identifier value for each fragment ACK contained within an EAP-Request, and the peer <bcp14>MUST</bcp14> include this Identifier value in the subsequent fragment contained within an EAP-Response.</t>
          <t>Explanations and considerations regarding retransmission timers are provided in <xref target="RFC4137"/>.</t>
          <t><xref target="fragmentation-flow"/> illustrates the exchange between the endpoints in the case where the EAP-EDHOC mutual authentication is successful and fragmentation is required. EAP Identifiers are also shown to illustrate their progression. A retransmission is also included.</t>
          <figure anchor="fragmentation-flow">
            <name>EAP-EDHOC Fragmentation Example</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="1120" width="528" viewBox="0 0 528 1120" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 40,64 L 40,1104" fill="none" stroke="black"/>
                  <path d="M 496,64 L 496,1104" fill="none" stroke="black"/>
                  <path d="M 56,96 L 480,96" fill="none" stroke="black"/>
                  <path d="M 56,160 L 480,160" fill="none" stroke="black"/>
                  <path d="M 56,224 L 480,224" fill="none" stroke="black"/>
                  <path d="M 56,288 L 480,288" fill="none" stroke="black"/>
                  <path d="M 56,352 L 480,352" fill="none" stroke="black"/>
                  <path d="M 56,400 L 480,400" fill="none" stroke="black"/>
                  <path d="M 56,464 L 480,464" fill="none" stroke="black"/>
                  <path d="M 56,512 L 480,512" fill="none" stroke="black"/>
                  <path d="M 56,576 L 480,576" fill="none" stroke="black"/>
                  <path d="M 56,640 L 480,640" fill="none" stroke="black"/>
                  <path d="M 280,688 L 480,688" fill="none" stroke="black"/>
                  <path d="M 56,752 L 480,752" fill="none" stroke="black"/>
                  <path d="M 56,816 L 480,816" fill="none" stroke="black"/>
                  <path d="M 56,864 L 480,864" fill="none" stroke="black"/>
                  <path d="M 56,928 L 480,928" fill="none" stroke="black"/>
                  <path d="M 56,992 L 480,992" fill="none" stroke="black"/>
                  <path d="M 56,1040 L 480,1040" fill="none" stroke="black"/>
                  <path d="M 56,1088 L 480,1088" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="488,1040 476,1034.4 476,1045.6" fill="black" transform="rotate(0,480,1040)"/>
                  <polygon class="arrowhead" points="488,928 476,922.4 476,933.6" fill="black" transform="rotate(0,480,928)"/>
                  <polygon class="arrowhead" points="488,816 476,810.4 476,821.6" fill="black" transform="rotate(0,480,816)"/>
                  <polygon class="arrowhead" points="488,640 476,634.4 476,645.6" fill="black" transform="rotate(0,480,640)"/>
                  <polygon class="arrowhead" points="488,512 476,506.4 476,517.6" fill="black" transform="rotate(0,480,512)"/>
                  <polygon class="arrowhead" points="488,400 476,394.4 476,405.6" fill="black" transform="rotate(0,480,400)"/>
                  <polygon class="arrowhead" points="488,288 476,282.4 476,293.6" fill="black" transform="rotate(0,480,288)"/>
                  <polygon class="arrowhead" points="488,160 476,154.4 476,165.6" fill="black" transform="rotate(0,480,160)"/>
                  <polygon class="arrowhead" points="64,1088 52,1082.4 52,1093.6" fill="black" transform="rotate(180,56,1088)"/>
                  <polygon class="arrowhead" points="64,992 52,986.4 52,997.6" fill="black" transform="rotate(180,56,992)"/>
                  <polygon class="arrowhead" points="64,864 52,858.4 52,869.6" fill="black" transform="rotate(180,56,864)"/>
                  <polygon class="arrowhead" points="64,752 52,746.4 52,757.6" fill="black" transform="rotate(180,56,752)"/>
                  <polygon class="arrowhead" points="64,576 52,570.4 52,581.6" fill="black" transform="rotate(180,56,576)"/>
                  <polygon class="arrowhead" points="64,464 52,458.4 52,469.6" fill="black" transform="rotate(180,56,464)"/>
                  <polygon class="arrowhead" points="64,352 52,346.4 52,357.6" fill="black" transform="rotate(180,56,352)"/>
                  <polygon class="arrowhead" points="64,224 52,218.4 52,229.6" fill="black" transform="rotate(180,56,224)"/>
                  <polygon class="arrowhead" points="64,96 52,90.4 52,101.6" fill="black" transform="rotate(180,56,96)"/>
                  <g class="text">
                    <text x="40" y="36">EAP-EDHOC</text>
                    <text x="100" y="36">Peer</text>
                    <text x="432" y="36">EAP-EDHOC</text>
                    <text x="500" y="36">Server</text>
                    <text x="276" y="84">EAP-Request/Identity</text>
                    <text x="396" y="84">(EAP-ID:</text>
                    <text x="452" y="84">0x0)</text>
                    <text x="152" y="132">EAP-Response/Identity</text>
                    <text x="276" y="132">(EAP-ID:</text>
                    <text x="332" y="132">0x0)</text>
                    <text x="140" y="148">(Privacy-Friendly)</text>
                    <text x="236" y="196">EAP-Request/EAP-Type=EAP-EDHOC</text>
                    <text x="396" y="196">(EAP-ID:</text>
                    <text x="452" y="196">0x1)</text>
                    <text x="300" y="212">(EDHOC</text>
                    <text x="356" y="212">Start,</text>
                    <text x="392" y="212">S</text>
                    <text x="416" y="212">bit</text>
                    <text x="452" y="212">set)</text>
                    <text x="192" y="260">EAP-Response/EAP-Type=EAP-EDHOC</text>
                    <text x="356" y="260">(EAP-ID:</text>
                    <text x="412" y="260">0x1)</text>
                    <text x="92" y="276">(EDHOC</text>
                    <text x="164" y="276">message_1)</text>
                    <text x="236" y="324">EAP-Request/EAP-Type=EAP-EDHOC</text>
                    <text x="396" y="324">(EAP-ID:</text>
                    <text x="452" y="324">0x2)</text>
                    <text x="116" y="340">(EDHOC</text>
                    <text x="188" y="340">message_2,</text>
                    <text x="268" y="340">Fragment</text>
                    <text x="316" y="340">1,</text>
                    <text x="336" y="340">L</text>
                    <text x="360" y="340">and</text>
                    <text x="384" y="340">M</text>
                    <text x="412" y="340">bits</text>
                    <text x="452" y="340">set)</text>
                    <text x="192" y="388">EAP-Response/EAP-Type=EAP-EDHOC</text>
                    <text x="356" y="388">(EAP-ID:</text>
                    <text x="412" y="388">0x2)</text>
                    <text x="236" y="436">EAP-Request/EAP-Type=EAP-EDHOC</text>
                    <text x="396" y="436">(EAP-ID:</text>
                    <text x="452" y="436">0x3)</text>
                    <text x="172" y="452">(EDHOC</text>
                    <text x="244" y="452">message_2,</text>
                    <text x="324" y="452">Fragment</text>
                    <text x="372" y="452">2,</text>
                    <text x="392" y="452">M</text>
                    <text x="416" y="452">bit</text>
                    <text x="452" y="452">set)</text>
                    <text x="192" y="500">EAP-Response/EAP-Type=EAP-EDHOC</text>
                    <text x="356" y="500">(EAP-ID:</text>
                    <text x="412" y="500">0x3)</text>
                    <text x="236" y="548">EAP-Request/EAP-Type=EAP-EDHOC</text>
                    <text x="396" y="548">(EAP-ID:</text>
                    <text x="452" y="548">0x4)</text>
                    <text x="260" y="564">(EDHOC</text>
                    <text x="332" y="564">message_2,</text>
                    <text x="412" y="564">Fragment</text>
                    <text x="460" y="564">3)</text>
                    <text x="192" y="612">EAP-Response/EAP-Type=EAP-EDHOC</text>
                    <text x="356" y="612">(EAP-ID:</text>
                    <text x="412" y="612">0x4)</text>
                    <text x="92" y="628">(EDHOC</text>
                    <text x="164" y="628">message_3,</text>
                    <text x="244" y="628">Fragment</text>
                    <text x="292" y="628">1,</text>
                    <text x="312" y="628">L</text>
                    <text x="336" y="628">and</text>
                    <text x="360" y="628">M</text>
                    <text x="388" y="628">bits</text>
                    <text x="428" y="628">set)</text>
                    <text x="236" y="676">EAP-Request/EAP-Type=EAP-EDHOC</text>
                    <text x="396" y="676">(EAP-ID:</text>
                    <text x="452" y="676">0x5)</text>
                    <text x="272" y="692">X</text>
                    <text x="236" y="724">EAP-Request/EAP-Type=EAP-EDHOC</text>
                    <text x="396" y="724">(EAP-ID:</text>
                    <text x="452" y="724">0x5)</text>
                    <text x="404" y="740">(Retransmission)</text>
                    <text x="192" y="788">EAP-Response/EAP-Type=EAP-EDHOC</text>
                    <text x="356" y="788">(EAP-ID:</text>
                    <text x="412" y="788">0x5)</text>
                    <text x="92" y="804">(EDHOC</text>
                    <text x="164" y="804">message_3,</text>
                    <text x="244" y="804">Fragment</text>
                    <text x="292" y="804">2,</text>
                    <text x="312" y="804">M</text>
                    <text x="336" y="804">bit</text>
                    <text x="372" y="804">set)</text>
                    <text x="236" y="852">EAP-Request/EAP-Type=EAP-EDHOC</text>
                    <text x="396" y="852">(EAP-ID:</text>
                    <text x="452" y="852">0x6)</text>
                    <text x="192" y="900">EAP-Response/EAP-Type=EAP-EDHOC</text>
                    <text x="356" y="900">(EAP-ID:</text>
                    <text x="412" y="900">0x6)</text>
                    <text x="92" y="916">(EDHOC</text>
                    <text x="164" y="916">message_3,</text>
                    <text x="244" y="916">Fragment</text>
                    <text x="292" y="916">3)</text>
                    <text x="236" y="964">EAP-Request/EAP-Type=EAP-EDHOC</text>
                    <text x="396" y="964">(EAP-ID:</text>
                    <text x="452" y="964">0x7)</text>
                    <text x="356" y="980">(EDHOC</text>
                    <text x="428" y="980">message_4)</text>
                    <text x="192" y="1028">EAP-Response/EAP-Type=EAP-EDHOC</text>
                    <text x="356" y="1028">(EAP-ID:</text>
                    <text x="412" y="1028">0x7)</text>
                    <text x="312" y="1076">EAP-Success</text>
                    <text x="396" y="1076">(EAP-ID:</text>
                    <text x="452" y="1076">0x7)</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
EAP-EDHOC Peer                                   EAP-EDHOC Server

    |                                                        |
    |                   EAP-Request/Identity (EAP-ID: 0x0)   |
    | <----------------------------------------------------- |
    |                                                        |
    |   EAP-Response/Identity (EAP-ID: 0x0)                  |
    |   (Privacy-Friendly)                                   |
    | -----------------------------------------------------> |
    |                                                        |
    |         EAP-Request/EAP-Type=EAP-EDHOC (EAP-ID: 0x1)   |
    |                             (EDHOC Start, S bit set)   |
    | <----------------------------------------------------- |
    |                                                        |
    |   EAP-Response/EAP-Type=EAP-EDHOC (EAP-ID: 0x1)        |
    |   (EDHOC message_1)                                    |
    | -----------------------------------------------------> |
    |                                                        |
    |         EAP-Request/EAP-Type=EAP-EDHOC (EAP-ID: 0x2)   |
    |      (EDHOC message_2, Fragment 1, L and M bits set)   |
    | <----------------------------------------------------- |
    |                                                        |
    |   EAP-Response/EAP-Type=EAP-EDHOC (EAP-ID: 0x2)        |
    | -----------------------------------------------------> |
    |                                                        |
    |         EAP-Request/EAP-Type=EAP-EDHOC (EAP-ID: 0x3)   |
    |             (EDHOC message_2, Fragment 2, M bit set)   |
    | <----------------------------------------------------- |
    |                                                        |
    |   EAP-Response/EAP-Type=EAP-EDHOC (EAP-ID: 0x3)        |
    | -----------------------------------------------------> |
    |                                                        |
    |         EAP-Request/EAP-Type=EAP-EDHOC (EAP-ID: 0x4)   |
    |                        (EDHOC message_2, Fragment 3)   |
    | <----------------------------------------------------- |
    |                                                        |
    |   EAP-Response/EAP-Type=EAP-EDHOC (EAP-ID: 0x4)        |
    |   (EDHOC message_3, Fragment 1, L and M bits set)      |
    | -----------------------------------------------------> |
    |                                                        |
    |         EAP-Request/EAP-Type=EAP-EDHOC (EAP-ID: 0x5)   |
    |                            X-------------------------- |
    |                                                        |
    |         EAP-Request/EAP-Type=EAP-EDHOC (EAP-ID: 0x5)   |
    |                                     (Retransmission)   |
    | <----------------------------------------------------- |
    |                                                        |
    |   EAP-Response/EAP-Type=EAP-EDHOC (EAP-ID: 0x5)        |
    |   (EDHOC message_3, Fragment 2, M bit set)             |
    | -----------------------------------------------------> |
    |                                                        |
    |         EAP-Request/EAP-Type=EAP-EDHOC (EAP-ID: 0x6)   |
    | <----------------------------------------------------- |
    |                                                        |
    |   EAP-Response/EAP-Type=EAP-EDHOC (EAP-ID: 0x6)        |
    |   (EDHOC message_3, Fragment 3)                        |
    | -----------------------------------------------------> |
    |                                                        |
    |         EAP-Request/EAP-Type=EAP-EDHOC (EAP-ID: 0x7)   |
    |                                    (EDHOC message_4)   |
    | <----------------------------------------------------- |
    |                                                        |
    |   EAP-Response/EAP-Type=EAP-EDHOC (EAP-ID: 0x7)        |
    | -----------------------------------------------------> |
    |                                                        |
    |                            EAP-Success (EAP-ID: 0x7)   |
    | <----------------------------------------------------- |
    |                                                        |
]]></artwork>
            </artset>
          </figure>
        </section>
      </section>
      <section anchor="identity-verification">
        <name>Identity Verification</name>
        <t>The EAP peer identity provided in the EAP-Response/Identity is not authenticated by EAP-EDHOC. Unauthenticated information <bcp14>MUST NOT</bcp14> be used for accounting purposes or to give authorization. The EAP authenticator and the EAP server <bcp14>MAY</bcp14> examine the identity presented in EAP-Response/Identity for purposes such as routing and EAP method selection. EAP-EDHOC servers <bcp14>MAY</bcp14> reject conversations if the identity does not match their policy.</t>
        <t>The EAP server identity in the EDHOC server certificate is typically a fully qualified domain name (FQDN) in the SubjectAltName (SAN) extension. Since EAP-EDHOC deployments may use more than one EAP server, each with a different certificate, EAP peer implementations <bcp14>SHOULD</bcp14> allow for the configuration of one or more trusted root certificates (CA certificate) to authenticate the server certificate and one or more server names to match against the SubjectAltName (SAN) extension in the server certificate. If any of the configured names match any of the names in the SAN extension, then the name check passes. To simplify name matching, an EAP-EDHOC deployment can assign a designated name to represent an authorized EAP server. This name can then be included in the SANs list of each certificate used by this EAP-EDHOC server. If server name matching is not used, the EAP peer has reduced assurance that the EAP server it is interacting with is authoritative for the given network. If name matching is not used with a trusted root CA, then effectively any server can obtain a certificate that will be trusted for EAP authentication by the peer.</t>
        <t>The process of configuring a root CA certificate and a server name is non-trivial; therefore, automated methods of provisioning are <bcp14>RECOMMENDED</bcp14>. For example, the eduroam federation <xref target="RFC7593"/> provides a Configuration Assistant Tool (CAT) to automate the configuration process. In the absence of a trusted root CA certificate (user-configured or system-wide), EAP peers <bcp14>MAY</bcp14> implement a Trust On First Use (TOFU) mechanism where the peer trusts and stores the server certificate during the first connection attempt. The EAP peer ensures that the server presents the same stored certificate on subsequent interactions. The use of a TOFU mechanism does not allow for the server certificate to change without out-of-band validation of the certificate and is therefore not suitable for many deployments including ones where multiple EAP servers are deployed for high availability. TOFU mechanisms increase the susceptibility to traffic interception attacks and should only be used if there are adequate controls in place to mitigate this risk.</t>
        <t>As an alternative to standard certificate validation, EDHOC extensions such as the Lightweight Authorization mechanism defined in <xref target="I-D.ietf-lake-authz"/> can provide additional means of verifying server credentials. Such mechanisms may be suitable in deployments where no prior trust relationship exists or where managing trusted root CAs is impractical.</t>
      </section>
      <section anchor="Key_Hierarchy">
        <name>Key Hierarchy</name>
        <t>The key derivation for EDHOC is described in Section 4 of <xref target="RFC9528"/>. The key material and Method-Id <bcp14>SHALL</bcp14> be derived from the PRK_exporter using the EDHOC_Exporter interface, see Section 4.2.1 of <xref target="RFC9528"/>.</t>
        <t>Type is the value of the EAP Type field defined in Section 2 of <xref target="RFC3748"/>. For EAP-EDHOC, Type has the value TBD1. The &lt;&lt; &gt;&gt; notation defined in Section G.3 of <xref target="RFC8610"/> means that the CBOR-encoded integer Type value is embedded in a CBOR byte string. The use of Type as context enables the reuse of exporter labels across other future EAP methods based on EDHOC.</t>
        <artwork><![CDATA[
Type        =  TBD1
MSK         =  EDHOC_Exporter(TBD2, << Type >>, 64)
EMSK        =  EDHOC_Exporter(TBD3, << Type >>, 64)
Method-Id   =  EDHOC_Exporter(TBD4, << Type >>, 64)
Session-Id  =  Type || Method-Id
Peer-Id     =  ID_CRED_I
Server-Id   =  ID_CRED_R
]]></artwork>
        <t>EAP-EDHOC exports the MSK and the EMSK and does not specify how it is used by lower layers.</t>
      </section>
      <section anchor="parameter-negotiation-and-compliance-requirements">
        <name>Parameter Negotiation and Compliance Requirements</name>
        <t>The EAP-EDHOC peers and EAP-EDHOC servers <bcp14>MUST</bcp14> comply with the requirements defined in Section 8 of <xref target="RFC9528"/>, including mandatory-to-implement cipher suites, signature algorithms, key exchange algorithms, and extensions.</t>
      </section>
      <section anchor="eap-state-machines">
        <name>EAP State Machines</name>
        <t>It is worth remembering that the EAP state machine is defined in <xref target="RFC4137"/>. However, the following considerations apply to EAP-EDHOC.</t>
        <t>The EAP-EDHOC server sends message_4 in an EAP-Request as a protected success result indication.</t>
        <t>Because EDHOC error messages are unauthenticated, they <bcp14>MUST NOT</bcp14> be relied upon to determine the cause of failure; they only indicate that the exchange did not complete and are vulnerable to injection by an attacker (DoS). However, EDHOC error messages <bcp14>SHOULD</bcp14> be considered failure result indication, as defined in <xref target="RFC3748"/>. After sending or receiving an EDHOC error message, the EAP-EDHOC server may only send an EAP-Failure.</t>
        <t>The keying material can be derived by the Initiator upon receiving EDHOC message_2, and by the Responder upon receiving EDHOC message_3. Implementations following <xref target="RFC4137"/> can then set the eapKeyData and aaaEapKeyData variables.</t>
        <t>The keying material can be made available to lower layers and the EAP authenticator after the protected success indication (message_4) has been sent or received. Implementations following <xref target="RFC4137"/> can set the eapKeyAvailable and aaaEapKeyAvailable variables.</t>
      </section>
      <section anchor="Channel_Binding">
        <name>EAP Channel Binding</name>
        <t>EAP-EDHOC allows the secure exchange of information between the endpoints of the authentication process (i.e., the EAP peer and the EAP server) using protected data fields. These fields can be used to exchange EAP channel binding information, as defined in <xref target="RFC6677"/>.</t>
        <t>Section 6 in <xref target="RFC6677"/> outlines requirements for components implementing channel binding information, all of which are satisfied by EAP-EDHOC, including confidentiality and integrity protection. Additionally, EAP-EDHOC supports fragmentation, allowing the inclusion of additional information at the method level without issues.</t>
        <t>While the EAD_1 and EAD_2 fields (carried in EDHOC message_1 and EDHOC message_2, respectively) are integrity protected through the transcript hash, the channel binding protocol defined in <xref target="RFC6677"/> must be transported after keying material has been derived between the endpoints in the EAP communication and before the peer is exposed to potential adverse effects from joining an adversarial network. Therefore, compliance with <xref target="RFC6677"/> requires use of the EAD_3 and EAD_4 fields, transmitted in EDHOC message_3 and EDHOC message_4, respectively.</t>
        <t>It is important to note that EAD fields in EDHOC are optional; consequently, the inclusion of EAP Channel Binding information in an authentication exchange is also optional.</t>
        <t>Accordingly, this document specifies a new EAD item, with ead_label = TBD5, to incorporate EAP channel binding information into the EAD fields of the EAP-EDHOC messages. See the definition in <xref target="iana-ead"/>. This new EAD item is intended only for EAD_3 and EAD_4. Then, it <bcp14>MUST</bcp14> be ignored if included in other EAD fields. Multiple occurrences of this new EAD item in one EAD field are NOT allowed.</t>
        <ul empty="true">
          <li>
            <t><strong>Implementation Note:</strong>
This document defines only the container for carrying EAP Channel Binding information within EAP-EDHOC messages, using the <tt>EAD_3</tt> and <tt>EAD_4</tt> fields. The format and semantics of the channel binding content are application-specific and are determined by the authentication domain in which the protocol is deployed.</t>
          </li>
        </ul>
        <t>If the server detects a consistency error in the channel binding information contained in EAD_3, it <bcp14>MUST</bcp14> send an EDHOC error message, as specified in <xref target="RFC9528"/>, since the new EAD item defined to carry EAP Channel Binding information is critical. In this case, the exchange proceeds according to <xref target="message3-reject"/>.</t>
        <t>Similarly, if the Initiator detects an error in the channel binding information contained in EAD_4, it <bcp14>MUST</bcp14> send an EDHOC error message, and the exchange proceeds according to <xref target="message4-reject"/>.</t>
      </section>
    </section>
    <section anchor="detailed-description">
      <name>Detailed Description of the EAP-EDHOC Request and Response Protocol</name>
      <t>The EAP-EDHOC packet format for Requests and Responses is summarized in <xref target="packet"/>. Fields are transmitted from left to right, following a structure inspired by the EAP-TLS packet format <xref target="RFC5216"/>. As specified in Section 4.1 of <xref target="RFC3748"/>, EAP Request and Response packets consist of Code, Identifier, Length, Type, and Type-Data fields. The functions of the Code, Identifier, Length, and Type fields are reiterated here for convenience. The EAP Type-Data field consists of the R, S, M, L, EDHOC Message Length, and EDHOC Data fields.</t>
      <figure anchor="packet">
        <name>EAP-EDHOC Request and Response Packet Format</name>
        <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Code      |   Identifier  |            Length             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |  R  |S|M|  L  |      EDHOC Message Length     ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                          EDHOC Data                           ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
      <section anchor="eap-edhoc-request-packet">
        <name>EAP-EDHOC Request Packet</name>
        <dl>
          <dt>Code:</dt>
          <dd>
            <t>1 (Request)</t>
          </dd>
          <dt>Identifier:</dt>
          <dd>
            <t>The Identifier field is one octet and aids in matching responses with requests. The Identifier field <bcp14>MUST</bcp14> be changed on each new (non-retransmission) Request packet, and <bcp14>MUST</bcp14> be the same if a Request packet is retransmitted due to a timeout while waiting for a Response. In the case of fragmented messages, the Identifier will follow the indications of <xref target="fragmentation"/>.</t>
          </dd>
          <dt>Length:</dt>
          <dd>
            <t>The Length field is two octets and indicates the length of the EAP packet including the Code, Identifier, Length, Type, and Data fields. Octets outside the range of the Length field should be treated as Data Link Layer padding and <bcp14>MUST</bcp14> be ignored on reception.</t>
          </dd>
          <dt>Type:</dt>
          <dd>
            <t>TBD1 (EAP-EDHOC)</t>
          </dd>
          <dt>R:</dt>
          <dd>
            <t>Implementations of this specification <bcp14>MUST</bcp14> set the R bits (reserved) to zero and <bcp14>MUST</bcp14> ignore them on reception.</t>
          </dd>
          <dt>S:</dt>
          <dd>
            <t>The S bit (EAP-EDHOC start) is set in an EAP-EDHOC Start message. This differentiates the EAP-EDHOC Start message from a fragment acknowledgement.</t>
          </dd>
          <dt>M:</dt>
          <dd>
            <t>The M bit (more fragments) is set on all but the last fragment. I.e., when there is no fragmentation, it is set to zero.</t>
          </dd>
          <dt>L:</dt>
          <dd>
            <t>The L flag bits represent the binary encoding of the size of the EDHOC Message Length, which can range from 0 to 4 bytes. When all three bits are set to 0, the EDHOC Message Length field is not present. If the first two bits of the L field are set to 0 and the last bit is set to 1, then the size of the EDHOC Message Length field is 1 byte, and so on. Values from 5 to 7 are not used in this specification.</t>
          </dd>
          <dt>EDHOC Message Length:</dt>
          <dd>
            <t>The EDHOC Message Length field, when present, has a size of one to four octets, as determined by the L flag bits. It is included only if the L flag bits indicate a value greater than zero and specifies the total length of the EDHOC message being fragmented. When fragmentation is not used, this field is omitted.</t>
          </dd>
          <dt>EDHOC Data:</dt>
          <dd>
            <t>The EDHOC data consists of the whole or a fragment of the transported EDHOC message.</t>
          </dd>
        </dl>
      </section>
      <section anchor="eap-edhoc-response-packet">
        <name>EAP-EDHOC Response Packet</name>
        <dl>
          <dt>Code:</dt>
          <dd>
            <t>2 (Response)</t>
          </dd>
          <dt>Identifier:</dt>
          <dd>
            <t>The Identifier field is one octet and <bcp14>MUST</bcp14> match the Identifier field from the corresponding request.</t>
          </dd>
          <dt>Length:</dt>
          <dd>
            <t>The Length field is two octets and indicates the length of the EAP packet including the Code, Identifier, Length, Type, and Data fields. Octets outside the range of the Length field should be treated as Data Link Layer padding and <bcp14>MUST</bcp14> be ignored on reception.</t>
          </dd>
          <dt>Type:</dt>
          <dd>
            <t>TBD1 (EAP-EDHOC)</t>
          </dd>
          <dt>R:</dt>
          <dd>
            <t>Implementations of this specification <bcp14>MUST</bcp14> set the R bits (reserved) to zero and <bcp14>MUST</bcp14> ignore them on reception.</t>
          </dd>
          <dt>S:</dt>
          <dd>
            <t>The S bit (EAP-EDHOC start) is set to zero.</t>
          </dd>
          <dt>M:</dt>
          <dd>
            <t>The M bit (more fragments) is set on all but the last fragment. I.e., when there is no fragmentation, it is set to zero.</t>
          </dd>
          <dt>L:</dt>
          <dd>
            <t>The L flag bits represent the binary encoding of the size of the EDHOC Message Length, which can range from 0 to 4 bytes. When all three bits are set to 0, the EDHOC Message Length field is not present. If the first two bits of the L field are set to 0 and the last bit is set to 1, then the size of the EDHOC Message Length field is 1 byte, and so on. Values from 5 to 7 are not used in this specification.</t>
          </dd>
          <dt>EDHOC Message Length:</dt>
          <dd>
            <t>The EDHOC Message Length field, when present, has a size of one to four octets, as determined by the L flag bits. It is included only if the L flag bits indicate a value greater than zero and specifies the total length of the EDHOC message being fragmented. When fragmentation is not used, this field is omitted.</t>
          </dd>
          <dt>EDHOC Data:</dt>
          <dd>
            <t>The EDHOC data consists of the whole or a fragment of the transported EDHOC message.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <section anchor="eap-type">
        <name>EAP Type</name>
        <t>IANA has registered the following new type in the "Method Types" registry under the group name "Extensible Authentication Protocol (EAP) Registry":</t>
        <artwork><![CDATA[
Value: TBD1
Description: EAP-EDHOC
Reference: [this document]
]]></artwork>
        <t>NOTE: Suggested value: TBD1 = 57.
RFC Editor: Remove this note.</t>
      </section>
      <section anchor="edhoc-exporter-label-registry">
        <name>EDHOC Exporter Label Registry</name>
        <t>IANA has registered the following new labels in the "EDHOC Exporter Label" registry under the group name "Ephemeral Diffie-Hellman Over COSE (EDHOC)":</t>
        <artwork><![CDATA[
Label: TBD2
Description: MSK of EAP method EAP-EDHOC
Change Controller: IETF
Reference: [this document]
]]></artwork>
        <artwork><![CDATA[
Label: TBD3
Description: EMSK of EAP method EAP-EDHOC
Change Controller: IETF
Reference: [this document]
]]></artwork>
        <artwork><![CDATA[
Label: TBD4
Description: Method-Id of EAP method EAP-EDHOC
Change Controller: IETF
Reference: [this document]
]]></artwork>
        <t>NOTE: Suggested values: TBD2 = 26, TBD3 = 27, TBD4 = 28.
RFC Editor: Remove this note.</t>
        <t>The allocations have been updated to reference this document.</t>
      </section>
      <section anchor="iana-ead">
        <name>EDHOC External Authorization Data Registry</name>
        <t>IANA has registered the following new label in the "EDHOC External Authorization Data" registry under the group name "Ephemeral Diffie-Hellman Over COSE (EDHOC)":</t>
        <artwork><![CDATA[
Name: EAPChannelBinding
Label: TBD5
Description: EAP channel binding information
Reference: [this document]
]]></artwork>
        <t>NOTE: Suggested value: TBD5 = 1.
RFC Editor: Remove this note.</t>
      </section>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>The security considerations of EAP <xref target="RFC3748"/> <xref target="RFC5247"/> and EDHOC <xref target="RFC9528"/> apply to this document. Since the design of EAP-EDHOC closely follows EAP-TLS 1.3 <xref target="RFC9190"/>, many of its security considerations are also relevant.</t>
      <section anchor="security-claims">
        <name>Security Claims</name>
        <section anchor="eap-security-claims">
          <name>EAP Security Claims</name>
          <t>EAP security claims are defined in Section 7.2.1 of <xref target="RFC3748"/>.
EAP-EDHOC security claims are described next and summarized in <xref target="sec-claims"/>.</t>
          <table anchor="sec-claims">
            <name>EAP-EDHOC security claims</name>
            <thead>
              <tr>
                <th align="left">Claim</th>
                <th align="left"> </th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Auth. principle:</td>
                <td align="left">Certificates, CWTs, and all credential types for which COSE header parameters are defined (1)</td>
              </tr>
              <tr>
                <td align="left">Cipher suite negotiation:</td>
                <td align="left">Yes (2)</td>
              </tr>
              <tr>
                <td align="left">Mutual authentication:</td>
                <td align="left">Yes (3)</td>
              </tr>
              <tr>
                <td align="left">Integrity protection:</td>
                <td align="left">Yes (4)</td>
              </tr>
              <tr>
                <td align="left">Replay protection:</td>
                <td align="left">Yes (5)</td>
              </tr>
              <tr>
                <td align="left">Confidentiality:</td>
                <td align="left">Yes (6)</td>
              </tr>
              <tr>
                <td align="left">Key derivation:</td>
                <td align="left">Yes (7)</td>
              </tr>
              <tr>
                <td align="left">Key strength:</td>
                <td align="left">The specified cipher suites provide key strength of at least 128 bits.</td>
              </tr>
              <tr>
                <td align="left">Dictionary attack protection:</td>
                <td align="left">Yes (8)</td>
              </tr>
              <tr>
                <td align="left">Fast reconnect:</td>
                <td align="left">No</td>
              </tr>
              <tr>
                <td align="left">Crypt. binding:</td>
                <td align="left">N/A</td>
              </tr>
              <tr>
                <td align="left">Session independence:</td>
                <td align="left">Yes (9)</td>
              </tr>
              <tr>
                <td align="left">Fragmentation:</td>
                <td align="left">Yes (<xref target="fragmentation"/>)</td>
              </tr>
              <tr>
                <td align="left">Channel binding:</td>
                <td align="left">Yes (<xref target="Channel_Binding"/>: EAD_3 and EAD_4 can be used to convey integrity-protected channel properties, such as network SSID or peer MAC address.)</td>
              </tr>
            </tbody>
          </table>
          <ul spacing="normal">
            <li>
              <t>(1) Authentication principle:
EAP-EDHOC establishes a shared secret based on an authenticated ECDH key exchange. The key exchange is authenticated using different kinds of credentials. EAP-EDHOC supports EDHOC credential types. EDHOC supports all credential types for which COSE header parameters are defined. These include X.509 certificates <xref target="RFC9360"/>, C509 certificates, CWTs (<xref target="RFC9528"/> Section 3.5.3.1), and CCSs (<xref target="RFC8392"/> Section 7.1).</t>
            </li>
            <li>
              <t>(2) Cipher suite negotiation:
The Initiator's list of supported cipher suites and order of preference is fixed, and the selected cipher suite is the cipher suite that is most preferred by the Initiator and that is supported by both the Initiator and the Responder. EDHOC supports all signature algorithms defined by COSE.</t>
            </li>
            <li>
              <t>(3) Mutual authentication:
The initiator and responder authenticate each other through the EDHOC exchange.</t>
            </li>
            <li>
              <t>(4) Integrity protection:
EDHOC integrity protects all message content using transcript hashes for key derivation and as additional authenticated data, including, e.g., method type, cipher suites, and external authorization data.</t>
            </li>
            <li>
              <t>(5) Replay protection. EDHOC broadens the message authentication coverage to include  algorithms, external authorization data, and prior plaintext messages, as well as adding an explicit method type. By doing this, an attacker cannot replay or inject messages from a different EDHOC session.</t>
            </li>
            <li>
              <t>(6) Confidentiality. EDHOC protects the method payload transported within the EAP-Request and EAP-Response messages; however, the EAP-Success and EAP-Failure packets themselves are not encrypted or protected by EDHOC. EDHOC message_1 is not confidential, but it does not convey any private information. EDHOC message_2 provides confidentiality against passive attackers, while message_3 and message_4 provide confidentiality against active attackers.</t>
            </li>
            <li>
              <t>(7) Key derivation. Except for MSK and EMSK, derived keys are not exported. Key derivation is discussed in <xref target="Key_Hierarchy"/>.</t>
            </li>
            <li>
              <t>(8) Dictionary attack protection. EAP-EDHOC provides Dictionary attack protection.</t>
            </li>
            <li>
              <t>(9) Session independence. EDHOC generates computationally independent keys derived from the ECDH shared secret.</t>
            </li>
          </ul>
        </section>
        <section anchor="additional-security-claims">
          <name>Additional Security Claims</name>
          <ul spacing="normal">
            <li>
              <t>(10) Cryptographic strength and Forward secrecy:
Only ephemeral key exchange methods are supported by EDHOC, which ensures that the compromise of a session key does not also compromise earlier sessions' keys.</t>
            </li>
            <li>
              <t>(11) Identity protection:
EDHOC secures the Responder's credential identifier against passive attacks and the Initiator's credential identifier against active attacks. An active attacker can get the credential identifier of the Responder by eavesdropping on the destination address used for transporting message_1 and then sending their own message_1.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="peer-and-server-identities">
        <name>Peer and Server Identities</name>
        <t>The Peer-Id represents the identity to be used for access control and accounting purposes. The Server-Id represents the identity of the EAP server. The Peer-Id and Server-Id are determined from the information provided in the credentials used.</t>
        <t>ID_CRED_I and ID_CRED_R are used to identify the credentials of the Initiator (EAP peer) and Responder (EAP server). Therefore, for Server-Id the ID_CRED_R is used, and for Peer-Id the ID_CRED_I is used.</t>
      </section>
      <section anchor="certificate-validation">
        <name>Certificate Validation</name>
        <t>Same considerations as in EAP-TLS 1.3 Section 5.3 <xref target="RFC9190"/> apply here in relation to the use of certificates.</t>
        <t>When other types of credentials are used such as CWT/CCS, the application needs to have a clear trust-establishment mechanism and identify the pertinent trust anchors <xref target="RFC9528"/>.</t>
      </section>
      <section anchor="certificate-revocation">
        <name>Certificate Revocation</name>
        <t>Same considerations as in EAP-TLS 1.3 Section 5.4 <xref target="RFC9190"/> apply here in relation to certificates.</t>
        <t>When other types of credentials are used such as CWT/CCS, the endpoints are in charge of handling revocation and confirming the validity and integrity of CWT/CCS <xref target="RFC9528"/>.</t>
      </section>
      <section anchor="packet-modification-attacks">
        <name>Packet Modification Attacks</name>
        <t>EAP-EDHOC relies on EDHOC, which is designed to encrypt and integrity protect as much information as possible. Any change in any message is detected by means of the transcript hashes integrity verification.</t>
      </section>
      <section anchor="authorization">
        <name>Authorization</name>
        <t>Following the considerations of EDHOC in appendix D.5 Unauthenticated Operation <xref target="RFC9528"/>, EDHOC can be used without authentication by allowing the Initiator or Responder to communicate with any identity except its own.</t>
        <t>When peer authentication is not used, EAP-EDHOC server implementations <bcp14>MUST</bcp14> take care to limit network access appropriately for authenticated peers. Authorization and accounting <bcp14>MUST</bcp14> be based on authenticated information such as information in the certificate. The requirements for Network Access Identifiers (NAIs) specified in Section 4 of <xref target="RFC7542"/> apply and <bcp14>MUST</bcp14> be followed.</t>
      </section>
      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t>Considerations in Section 9.6 of <xref target="RFC9528"/> against tracking of users and eavesdropping on Identity Responses or certificates apply here. Also, the considerations of Section 5.8 of <xref target="RFC9190"/> regarding anonymous NAIs also applies.</t>
      </section>
      <section anchor="pervasive-monitoring">
        <name>Pervasive Monitoring</name>
        <t>Considerations in  Section 9.1 of <xref target="RFC9528"/> about pervasive monitoring apply here.</t>
      </section>
      <section anchor="cross-protocol-attacks">
        <name>Cross-Protocol Attacks</name>
        <t>The cross-protocol attack of <xref target="RFC9190"/> does not apply here, as no resumption mechanism has been defined for EAP-EDHOC.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3748">
          <front>
            <title>Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="L. Blunk" initials="L." surname="Blunk"/>
            <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
            <author fullname="J. Carlson" initials="J." surname="Carlson"/>
            <author fullname="H. Levkowetz" initials="H." role="editor" surname="Levkowetz"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees. Fragmentation is not supported within EAP itself; however, individual EAP methods may support this. This document obsoletes RFC 2284. A summary of the changes between this document and RFC 2284 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3748"/>
          <seriesInfo name="DOI" value="10.17487/RFC3748"/>
        </reference>
        <reference anchor="RFC5247">
          <front>
            <title>Extensible Authentication Protocol (EAP) Key Management Framework</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="D. Simon" initials="D." surname="Simon"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, enables extensible network access authentication. This document specifies the EAP key hierarchy and provides a framework for the transport and usage of keying material and parameters generated by EAP authentication algorithms, known as "methods". It also provides a detailed system-level security analysis, describing the conditions under which the key management guidelines described in RFC 4962 can be satisfied. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5247"/>
          <seriesInfo name="DOI" value="10.17487/RFC5247"/>
        </reference>
        <reference anchor="RFC6677">
          <front>
            <title>Channel-Binding Support for Extensible Authentication Protocol (EAP) Methods</title>
            <author fullname="S. Hartman" initials="S." role="editor" surname="Hartman"/>
            <author fullname="T. Clancy" initials="T." surname="Clancy"/>
            <author fullname="K. Hoeper" initials="K." surname="Hoeper"/>
            <date month="July" year="2012"/>
            <abstract>
              <t>This document defines how to implement channel bindings for Extensible Authentication Protocol (EAP) methods to address the "lying Network Access Service (NAS)" problem as well as the "lying provider" problem. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6677"/>
          <seriesInfo name="DOI" value="10.17487/RFC6677"/>
        </reference>
        <reference anchor="RFC7542">
          <front>
            <title>The Network Access Identifier</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>In order to provide inter-domain authentication services, it is necessary to have a standardized method that domains can use to identify each other's users. This document defines the syntax for the Network Access Identifier (NAI), the user identifier submitted by the client prior to accessing resources. This document is a revised version of RFC 4282. It addresses issues with international character sets and makes a number of other corrections to RFC 4282.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7542"/>
          <seriesInfo name="DOI" value="10.17487/RFC7542"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4137">
          <front>
            <title>State Machines for Extensible Authentication Protocol (EAP) Peer and Authenticator</title>
            <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="N. Petroni" initials="N." surname="Petroni"/>
            <author fullname="Y. Ohba" initials="Y." surname="Ohba"/>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document describes a set of state machines for Extensible Authentication Protocol (EAP) peer, EAP stand-alone authenticator (non-pass-through), EAP backend authenticator (for use on Authentication, Authorization, and Accounting (AAA) servers), and EAP full authenticator (for both local and pass-through). This set of state machines shows how EAP can be implemented to support deployment in either a peer/authenticator or peer/authenticator/AAA Server environment. The peer and stand-alone authenticator machines are illustrative of how the EAP protocol defined in RFC 3748 may be implemented. The backend and full/pass-through authenticators illustrate how EAP/AAA protocol support defined in RFC 3579 may be implemented. Where there are differences, RFC 3748 and RFC 3579 are authoritative.</t>
              <t>The state machines are based on the EAP "Switch" model. This model includes events and actions for the interaction between the EAP Switch and EAP methods. A brief description of the EAP "Switch" model is given in the Introduction section.</t>
              <t>The state machine and associated model are informative only. Implementations may achieve the same results using different methods. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4137"/>
          <seriesInfo name="DOI" value="10.17487/RFC4137"/>
        </reference>
        <reference anchor="RFC5216">
          <front>
            <title>The EAP-TLS Authentication Protocol</title>
            <author fullname="D. Simon" initials="D." surname="Simon"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="R. Hurst" initials="R." surname="Hurst"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides support for multiple authentication methods. Transport Layer Security (TLS) provides for mutual authentication, integrity-protected ciphersuite negotiation, and key exchange between two endpoints. This document defines EAP-TLS, which includes support for certificate-based mutual authentication and key derivation.</t>
              <t>This document obsoletes RFC 2716. A summary of the changes between this document and RFC 2716 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5216"/>
          <seriesInfo name="DOI" value="10.17487/RFC5216"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7593">
          <front>
            <title>The eduroam Architecture for Network Roaming</title>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="T. Wolniewicz" initials="T." surname="Wolniewicz"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia. The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access. The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document. In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7593"/>
          <seriesInfo name="DOI" value="10.17487/RFC7593"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="RFC9668">
          <front>
            <title>Using Ephemeral Diffie-Hellman Over COSE (EDHOC) with the Constrained Application Protocol (CoAP) and Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <author fullname="R. Höglund" initials="R." surname="Höglund"/>
            <author fullname="S. Hristozov" initials="S." surname="Hristozov"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <date month="November" year="2024"/>
            <abstract>
              <t>The lightweight authenticated key exchange protocol Ephemeral Diffie-Hellman Over COSE (EDHOC) can be run over the Constrained Application Protocol (CoAP) and used by two peers to establish a Security Context for the security protocol Object Security for Constrained RESTful Environments (OSCORE). This document details this use of the EDHOC protocol by specifying a number of additional and optional mechanisms, including an optimization approach for combining the execution of EDHOC with the first OSCORE transaction. This combination reduces the number of round trips required to set up an OSCORE Security Context and to complete an OSCORE transaction using that Security Context.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9668"/>
          <seriesInfo name="DOI" value="10.17487/RFC9668"/>
        </reference>
        <reference anchor="RFC9360">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9360"/>
          <seriesInfo name="DOI" value="10.17487/RFC9360"/>
        </reference>
        <reference anchor="I-D.ietf-lake-edhoc-psk">
          <front>
            <title>EDHOC Authenticated with Pre-Shared Keys (PSK)</title>
            <author fullname="Elsa Lopez-Perez" initials="" surname="Lopez-Perez">
              <organization>Inria</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Rafael Marin-Lopez" initials="R." surname="Marin-Lopez">
              <organization>University of Murcia</organization>
            </author>
            <author fullname="Francisco Lopez-Gomez" initials="F." surname="Lopez-Gomez">
              <organization>University of Murcia</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This document specifies a Pre-Shared Key (PSK) authentication method
   for the Ephemeral Diffie-Hellman Over COSE (EDHOC) key exchange
   protocol.  The PSK method enhances computational efficiency while
   providing mutual authentication, ephemeral key exchange, identity
   protection, and quantum resistance.  It is particularly suited for
   systems where nodes share a PSK provided out-of-band (external PSK)
   and enables efficient session resumption with less computational
   overhead when the PSK is provided from a previous EDHOC session
   (resumption PSK).  This document details the PSK method flow, key
   derivation changes, message formatting, processing, and security
   considerations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-edhoc-psk-07"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>University of Glasgow</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>IN Groupe</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 certificates.  The CBOR
   encoding supports a large subset of RFC 5280, common certificate
   profiles and is extensible.

   Two types of C509 certificates are defined.  One type is an
   invertible CBOR re-encoding of DER-encoded X.509 certificates with
   the signature field copied from the DER encoding.  The other type is
   identical except that the signature is over the CBOR encoding instead
   of the DER encoding, avoiding the use of ASN.1.  Both types of
   certificates have the same semantics as X.509 and the same reduced
   size compared to X.509.

   The document also specifies CBOR encoded data structures for
   certificate (signing) requests and certificate request templates, new
   COSE headers, as well as a TLS certificate type and a file format for
   C509.  This document updates RFC 6698; the TLSA selectors registry is
   extended to include C509 certificates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-17"/>
        </reference>
        <reference anchor="I-D.ietf-lake-app-profiles">
          <front>
            <title>Coordinating the Use of Application Profiles for Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   The lightweight authenticated key exchange protocol Ephemeral Diffie-
   Hellman Over COSE (EDHOC) requires certain parameters to be agreed
   out-of-band, in order to ensure its successful completion.  To this
   end, application profiles specify the intended use of EDHOC to allow
   for the relevant processing and verifications to be made.  In order
   to ensure the applicability of such parameters and information beyond
   transport- or setup-specific scenarios, this document defines a
   canonical, CBOR-based representation that can be used to describe,
   distribute, and store EDHOC application profiles.  Furthermore, in
   order to facilitate interoperability between EDHOC implementations
   and support EDHOC extensibility for additional integrations, this
   document defines a number of means to coordinate the use of EDHOC
   application profiles.  Finally, this document defines a set of well-
   known EDHOC application profiles.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-app-profiles-04"/>
        </reference>
        <reference anchor="I-D.ietf-lake-edhoc-impl-cons">
          <front>
            <title>Implementation Considerations for Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This document provides considerations for guiding the implementation
   of the authenticated key exchange protocol Ephemeral Diffie-Hellman
   Over COSE (EDHOC).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-edhoc-impl-cons-06"/>
        </reference>
        <reference anchor="I-D.ietf-lake-authz">
          <front>
            <title>Lightweight Authorization using Ephemeral Diffie-Hellman Over COSE (ELA)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Mališa Vučinić" initials="M." surname="Vučinić">
              <organization>INRIA</organization>
            </author>
            <author fullname="Geovane Fedrecheski" initials="G." surname="Fedrecheski">
              <organization>INRIA</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   Ephemeral Diffie-Hellman Over COSE (EDHOC) is a lightweight
   authenticated key exchange protocol intended for use in constrained
   scenarios.  This document specifies Lightweight Authorization using
   EDHOC (ELA).  The procedure allows authorizing enrollment of new
   devices using the extension point defined in EDHOC.  ELA is
   applicable to zero-touch onboarding of new devices to a constrained
   network leveraging trust anchors installed at manufacture time.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-authz-07"/>
        </reference>
        <reference anchor="Sec5G" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3169">
          <front>
            <title>Security architecture and procedures for 5G System</title>
            <author initials="" surname="3GPP TS 33 501">
              <organization/>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 815?>

<section anchor="fragmented-message-example">
      <name>Fragmented Message Example</name>
      <t>This section provides an example of a fragmented message, including all header field values, to improve clarity and avoid ambiguity.</t>
      <t>In this example, the total size of the EDHOC message is 128 octets. The MTU allows 32 EAP bytes to be transmitted per packet. No retransmissions are considered in this example. Furthermore, this does not correspond to the EAP-EDHOC Start message. The packets sent by the server are shown below:</t>
      <artwork><![CDATA[
+-----
Code = 1 | ID = 1 | Length = 32 |
Type = TBD1 | R = 0 | S = 0 | M = 1 | L = 0b001 | EDHOC Msg Length = 128 |
EDHOC Data Bytes 1-25
+-----

+-----
Code = 1 | ID = 2 | Length = 32 |
Type = TBD1 | R = 0 | S = 0 | M = 1 | L = 0b000 |
EDHOC Data Bytes 26-51
+-----

+-----
Code = 1 | ID = 3 | Length = 32 |
Type = TBD1 | R = 0 | S = 0 | M = 1 | L = 0b000 |
EDHOC Data Bytes 52-77
+-----

+-----
Code = 1 | ID = 4 | Length = 32 |
Type = TBD1 | R = 0 | S = 0 | M = 1 | L = 0b000 |
EDHOC Data Bytes 78-103
+-----

+-----
Code = 1 | ID = 5 | Length = 32 |
Type = TBD1 | R = 0 | S = 0 | M = 0 | L = 0b000 |
EDHOC Data Bytes 104-128
+-----
]]></artwork>
      <t>As shown, the L flags have a value of 0b001 in the first fragment, indicating that the EDHOC Msg Length field is 1 byte in size. The EDHOC Msg Length field indicates the total size of the EDHOC message being fragmented, which is 128 bytes. The L flags and the EDHOC Msg Length field are only present in the first fragment.</t>
      <t>Another relevant detail is that the first fragment includes 7 bytes of header (1 byte Code, 1 byte Identifier, 2 bytes Length, 1 byte Type, 1 byte Flags, and 1 byte EDHOC Msg Length), as illustrated in <xref target="packet"/>. Subsequent fragments include 6 bytes of header, since they do not carry the EDHOC Msg Length field. Consequently, with an MTU of 32 bytes, the first fragment carries 25 bytes of payload, while each subsequent fragment carries up to 26 bytes of payload.</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors sincerely thank Eduardo Ingles-Sanchez for his contribution in the initial phase of this work. We also want to thank Marco Tiloca, Christian Amsüss, Gabriel Lopez-Millan, Renzo Navas, Paul Wouters, Rich Salz, Ines Robles and Christopher Inacio for their reviews.</t>
      <t>This work was supported partially by Project PID2023-148104OB-C43 (ONOFRE4-UMU) from MCIN/AEI; the Formacion del Profesorado Universitario predoctoral grant FPU24/03871, also from MCIN/AEI; and the European Union's NextGenerationEU, as part of the Recovery, Transformation, and Resilience Plan, supported by Spanish INCIBE (6G-SOC project).</t>
      <t>This work was supported partially by Vinnova - the Swedish Agency for Innovation Systems - through the EUREKA CELTIC-NEXT project CYPRESS.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1923Yb15XgO77iNPVg0gEggiApiYncoUFS5lgUFYKK48nK
UgrAIVFRoQpdVSAFS+pfmf6KeZqnzo/Nvp1bVYGkZDmx0uRMxxBQdS5777Nv
Z186nU7rak/1W2VcJnpPvSri9FKVU60O35Y6LeJRotX+Ar5Iy3gclXGWqpd5
VmbjLFHrh/svN9R1XE7V4XyqZzqPEnUQX1zEuvOdTpJZlKrsSudqcDo8hKcP
vjsdbLQm2TiNZjDXJI8uyk6sy4uOni06Opp39GSajTubT1rRaJRrWBjM0KH3
Wq2r/ttZspVfjPdaShVxotOxxo8ddZQt0oka/vEZr+U6nsD/Zrma6vhyWqpi
rscxrGnSasXzfE+V+aIotzY3n2xutYrFaBYXBWzrfDmHNR0fnh+1olxHe2pt
rXWd5W8u82wxh3/BStSJLqfZRL2aT6JSr7UAHnuqKCetcZYWAKxFQYPrFnwx
ATjuqQXs7XFrHu+pB2oM0FgUWkV5Hi3VenyhoiRRS11s0FqjYgoLzjXsCKC7
hz/gPrO8zPVFYf+9nPn/hCcnel5OEYOtK50uCCI3LBleoX2u4cdZFCfwEYD/
e8RCN8sv8esoH8OAa9OynBd7Dx/iU/hVfKW75rGH+MXDUZ5dF/ohvI+vXQLs
FyN4cRKll/B7HI1hq3GSZA/jzsShd63VioCgsnyv1VFMCQcAmmf0Smcg78CA
MA8QZArz5kVcLlV2oU6vAI34WwFQ0QD9Z/HfsrSt9otykcdRoVS/v7XZhwfG
QBNlvtxTw3kUp/CF5t3yymCJv1+kcXYVdwGOZhln0UWkE3US5XHaeZ7N9U/N
qzhZ4BjeKvgLmHyzt7l5w+RA8NHvFzN/zmd//7857H6okyid6NxMeJjH46LI
Um+S4WGnt7utHm+qIaD9zTRLZsFU13qi/Y1mMG63kHF/r2XA7jib2cn/VzZN
1Xs40Hrx9/8D+y5LmfMzreFvMH53JsM2L+EIVjmOi3GmCOCdZ9nss4P9wszR
TXCOS0FBK81yWBxMsdeCh9XZ0WCr13uyJ5/7j7Yfm887W9uPzOfd3Uf286Od
7S3z+XHv0bb9vNvbNJ+f9J64zztbMGYrTi+CqeGX7V6fRqXJervy8dHWzpb5
uPOkLx8f95+Ybx9vb5tnYU77wJPtJ/LxyaYdAT6aB57s7j42H/u7tLzjzgEd
704SvdHCiOfFm+CncVbozniU5R1gvtlETzpjnZf1t6P5vDPPswtg0sWqsePZ
POkg42x4HdjDT/j1UI93nhHsVBnll4hzw5XmwBijpNu/nM+JIU108abM5rNs
soBJHw6Z57PEqvzzQJdAFkU3KuZv/73wfzmePO33dp/whCwQ12ANwFqAAokH
lnoMnAaYOAgc2OFYT+BfhQJ0qp1nargsSj1bo/cNj1P015H/KhXDjlX/2cuX
6nwI3Kq7s9mj35A/7yHvGU/V1ubWTqvV6XRUNAJij8Zlq3X+ETK5rSb6Ik71
BGZDHCuk5TYu+CoGQKkIjhDsIMonaqbH0yiNixntoVjMEbB42maLpIznMFMU
zjQjgVJ01fk0LhQI88UMfrVCtmDlASRP43tOoLfVKCpghfDTSuXhtKo8dBX9
V8W4hwSl+7XIeIMl2MykmAIV4W4JJG2l02iUoF5TWRIiUQMk4MdiSruAfcPL
OSwLBsx1qd7oZQFQifEhjdBEigWMEHALXZYwbA0WUVJkDtiXixjEzVjjThsW
wHQS/8TfIBIsiLpMA7N4MklAqXigjoG9AYGP8dGfQRHv3gl7+/DhV0cU19MY
DgAMYqkDX70jqj+CkhgIyI8/fAA42xXg1EU8Q5UHtCta2fnzoep1+/IGcHME
G+jJgFL7il1tZN+267SrAyjHl/AIg8MM67ZBEyBHhyWp77JrDYtuyxygH6qR
1qBQz0uY4CeYDXEzBZAky0aqbNMD+m00mxPpXmXJFR6C6zjXwCILfi0FhgYv
jUBI6xzWCrMi+X9VTnGMr1ij1rORngC7B1IcA9PLkAyTBCQzwAHIL8MPRMvA
HKMS/tlV+6z6g752jYRjAXUJMi9lImQ5YJ4iNKhzphPBhZAHnV8hojgt9WXO
1OPGTQFVE8A4rB3P33yeGNZP60K1ewwYKuCTtW+AGkExmGlU8mHqBw9ksFOz
7HcPKisEMrk7fdVYlEf6AEltRwIWA1jCA3ep27CVcbJA4wHOGgAz+TSeRe/D
PKATJ4gjXSV32qk9+jBeqTvZRQem6kS5d8YMyZbqCskjya4BKUURXWpC71RH
k7bIZpwTfwftDgjuLb6NMl7jIj1cgNGTXeOzWlhXnMCjXcK8ndZi1pI9Msls
QcQepVGyhAMAGwNlUYE9hGgfIwvLtdmUMDqQ3gS2J90eDurDACcE/RB4ro5K
kuJ2VhgH9LKv1VA4Hx4kj7waeR9tDuA/wZ9AAvCOVjzLWNZqfRa/1ZMNhUCW
ReAwiI94XKUxkkUeHtuiheiO4F8eWKHJIVPZR+OYtRftJEeOpIe7r6zW2w2x
RYYGAt5R6XwBlDgmIkZdkFUpJKkFsHFA3p9AwXlCEw7wg7e6ZmWStlWoa9gz
/nfw7emZ+kGP1Hn2Bpar1gc/nIPBTOP9cK4GSRTPCtATS/xpMCyEr6OGTEj+
GrZsxBoxzcrWWQ8nBMe0V6MKIji8/beFc9ARR6qH4z6PkH3AITNYAVWbRAPD
CR93Iyhgz2lB1DRaqqsoWWg0++GzpV9PUaHDhgcJOCo8ADgu7CmiXQ3y5Rx4
XnRJp4eJBg8P8LkYOEtOOotWqb7MYHZ8r82sfI4rYk1Axk+Wbgb81ntfqNE7
BcGh9bgpwSVKwOiESQAjub6MQSItLWT6gg4wdOVIIoBZ/uC/DPQRmvKZuBjI
U03+GZqetQOiczzr0SUYgpNu9ahWZASuOQee4dhLICBIePC5B2xYNOHkh+bN
/UBJO4jKCNWqgw1zkInbiE1QskQF4jVCjPgl4m0fEDLGfxJ200lsdb4IDwz+
dLFIhIOa5cPJ54EMIGKUhEC0owzxqRFiBkURvjtDMeF2qMQS80ULsaF2gOs2
mMvluKtOMgDshE2kGkOtcRff0vMki9kzMFjQa1D8wkZ8YTjPQYlB+xdVCGOC
JUCKdOD5DIMR++EDH3WkLu+M+VTFZAmMchwjcyZeQoRjjgQivEAJjhKiosFP
NH3tmRWheoUrp2MzyEBdoFnRJJdlnQ4Hp2eyMLS+4WsgJTmHcKCyRQ46YkR4
rc58nJ07tQRsoUWp4hIXkGaIWXRo4vlGJgP8eEHqqOUgsDLE8yI1KK7pmoAJ
sBcGWXqFR8nI3gM8+UR0Bcs/ZNug/4BEWjt5NTxfa/N/1YtT+nx2+IdXx2eH
B/h5+N3+8+f2Q0ueGH53+ur5gfvk3hycnpwcvjjgl+FbFXzVWjvZ/3GNJdja
6cvz49MX+8/XEEhlaEoBJAEOI1b8cmBTfLZaoJiM83jEZPnt4OV//1dvGzDx
b+LEIRr5N/HKwD+uQa7xbFkKVMb/BMa1bAEF6yin8wsiZxzNwdZDfg/nt5hm
1yk5ZZHF/Bkh85c99bvReN7b/ka+wA0HXxqYBV8SzOrf1F5mIDZ81TCNhWbw
fQXS4Xr3fwz+beDuffm7fwf5o1Wn9/jfvwESOiNJx3xAv50zZ2N8XERg5sQA
OTofKAMAPzNRgzIQZ3OQyZ7ReWgOEBue9ByfukClgSd9kp+iiBaNERkomB/p
UmY5x/lITzsZfq866iQqYAkgYZhNfq+Xv11h9XbhnUN+iQxo5G4f9/YxHiM0
dWCI49Q3YI1tgYwZiKgAOmbLBUwmYoP0AG3cDvJb/BL0AGC9bT4ACEvkBouC
pod/soEA+sFSblxkjvoqjYb7tTrTwC/Q/btylcgYb12nHeZT18mzrF4psCrr
rvDML8/wAuvs1DMny8BMJDaXF5HnFoFJjU0lpi/tDtQFtreAKZaxxvsaD13t
JjdFljPfCCHWNZZq+Chbfaku0agU6cLCWqPLl2wUFgdiRNPQMdPBajcJeRqL
wk1KxBXz8zILGHlvUO6ZyWUePo5GVsAUEzD/Semz57a2CzePkEeMCh3SgFWa
4RfS40TQWkPP6IM32Eik7ng/e/Y4bqurfpjqtEqgIhiTjK1ndrRo1MBByx1F
YzAOJtVJ+dW2yFWjFDKdZqt2foR7w+2APlEumSKyuWZtEjTBCzRxJzFontGs
qMuriZ7HoLKTkAk5QZ2EhFSNKc7kny/SFEEyAjSi3Qvan+M1ZD97pxoVClCz
Cz4SSNwzNHXg0aVTwdbl0+te23z5est97G8gfZPeQxs032+LSydVOs9hbvm+
i4ykqpK2vcO4QDcLilK7AF/vtGNbP59bsXiQChS9kadJi2YM40wEtSgJLpBb
Aynr+IqpkNZwpv9joQvQL5EkSsuBOni7+9QtMkLR5CkQARIZ6WOPqcA4qBtk
SN8L7Z2cUNm1CpoZVKNXP1Jg1SQTdi/QEukksRVeX3MhByDwSCJ7bYs0RIPV
HjzhDPhP672w62EdA2T1JAOZjgqNuQmvcuCK35bINyHKiiZspUTMqpwXJIdV
AyvB50FbAvZQ5jGZckW7ujIyNHPWHEK+Tz4Y8Sd5LwSum53AccO+KrGA0GGA
HpyJMcjgrOsZLKDZsGwHZpGzVttk+WwwNaJ75AqvvJHTCZ/wXuuqIXt+ffSk
wBMi4YZF9Q2LGOJEs2gJLJphgZ5fnIRgj1uA78T20zSK5Qr6LSj4Mj2ccrpg
aHb02Gs1gi/Q2mI2t6twjlVYBdKFyGPPK4o/d16CatTsqb/Ju4RS+gEY4taO
dfOdCI6PkHvi8cnA3jnKo0vrHDSWI7kHC+9VtKiMdbvaPUV28pKCG+yuwJpH
w9HwGoy/gD3rGHWY4KxmuXPCAImDJSXQ8Kypc5IDZBvK7NlsFKfmSYsgdwwt
l7iIczjdxWJU4EGHoyN2Iy0hYiptOJm7u0juIviEnixNxgQiwQos7907OUYd
FFB4TKYIRuTecgFgjhkJsJrLIVy/dwH1n81/UVRcXXq3Ji9Rxt3+514Ykgyk
e3f1/g5vNv29v9vbHo99eEwUA4aye/t3nU/4u+vct67clwj+6u729vrLPL6K
xsvOUR6DBpQsN+4+96ds+5vPtu+GPx9PDTL7zviWv3UhtBLMyQ31q8R34y5v
ens9kPCve3dA9/8IfFfgsvUviu/+Pb75rwKX7X8NfP/qMNbwhzsRFU/9s2G+
QjdpvdtTD3x1iGO5nq4166NrCgQEukw6URJfpk/XxngRlq99aLWOq54mNuW9
i/zCU6KSZbvyuDgvyE9caLamP8JKRYMzYh3TUvqdjOPauo2b74aVew6KYLPj
aazReUY3vFkKyuyMFWBQr/0R8M5S7uwqh5OgkjYN3gAYsY2NtnoH0KQZGU9d
dRSn0Wok4DSFmUcoGED1IivFQ4dvWQUsFwzJjRDZv1Xv9Yxusui+RhsHqCoo
BLAA6/mN5jC/nWdszO4843uInG272EwVi+MADBC0kcEIwbtdtl8yslVmGn6G
SdDvap1Ixr2J7oI4sd/fyHyMx8EcYHTrO/+Lvz+8GlGTjHYnsCYDy0auSigK
wwDNKr7DZ98aL5tBYa/3nF/CgkNMxnN7sYVDmrM5yAAeSWAc3vF6LImW4nFD
m09jwJGHIZ1exXmWkuPC2qLHL7vqRZaCOUWxUW3fTxGEyGkKuPGdH2JMuemt
1Q4rtBeIbE+hY7UwN7F6jz0AxoZMsoI8KVk+0WiCtsEUtV4E9GlYePBpvfDt
Z4rOEwCjo91E6r2tHUhYcJ7NBEdoMBfhu+Tm0SmY1RgRJDenhuOQC4I3EcBA
jGuwR+kSvRpfVT2T4k0Igm+t22iOcSS68Pz8GFcEiyW8tpsdWeZqpnXkfJUC
UbKWQ+sfONZFnCR8yOwkPHzjnBiqARCrjO/jitCDrl/jLPYuVYS7VEZVFHSR
I3MVQWBGI5KJU+FWgStSVuBRBp9DWVFAJPjuVBxSx9YNxu5I4xURfwvFEtQc
1vX7DYyz00gIdgUSJAI8AUezjJOIPjLXBniBGrh78Ch7fpqKQ8OErAUUzm7K
CmGFsax+vCnA3A1YWJ+bnOXK4cEd5BoQpmd4cRVfMBzYIctc5O2YRkCHJcid
2WKmTs5fIY32Nrc2VQbCuER5cp75h+9jTh7jy/IaChFFdxahizxQ6J/kgzPJ
NLNCsx3kzZ6rFmMrLmVrl8C7i7LhSEdlCRtEwbLMSPhncKqDk1W5szXsWucA
AmHM1vHU6+T6b0AYiAf75VbTl33vSwS8/WHb/qDgcC4wVqIMHVd041JgXGyU
SESnk6gV5cKPpK4rAfRteLPRuJlbHGlNs8tcPELhjHU5E6smv/e0/TJWgnn7
3tNm/+49bfeetp+Pb2Jg/xr4/tVhrOEPd3IUxQkGF/6zYX4Hz4sRoXXnCwsk
dUY/h6bL694N3pgGreLTpXPlLhHv2FPvPmyFN+QW/eFehP8y5Gbevhfh9u9e
hN+L8PvLMtWAb6uWfMzcvzp8N/x9YQrA1koFgORfo/jfuov4739e8Y++lqxR
2Af3I5ih0fDQBeXJoC/aG7E+oIlFNXrF3fwR4eVEwzPompILiGwWl6WecASr
gKPt+Z7V4dnZ68HpwaHqq7VX6ZsUcxu8/DQXAbXmQmYnkq1aWQODZ5ot0I+I
7m/8KdVvy2pYaElhnezw8uZyMXkuqRADlrOcwkTrUXcmh+lex/rFTrR5+17H
sn/3Ota9jnWvY6kb8H0fkOT93bvFfnGMNfx9YVpx/5PcYv276MXbn0EvZoW0
ltvyettTaSVXzijEN8UisXrs1N57J9qvjCHcK3j3Ct6Nb98reM1/9wpe/e3/
Qfj+2RHnH6/orNr3vdP0pr8vTD3c/gSn6fYNyiEFbBkh32odk1/Pqw9iYlSj
FOtqZItCvZD6Afusyx17dZnWX+wfmwpbWPkW47TSMG7aECJHaWINMIlzjqU8
W54tuJYmB3uyLnEhugRofxzMnM0jOLVqlGQjqfSEYYocKxhG/DVMUSmBIim5
S/oNnaXBEtiLyRnPI80Z9RMqgQhbw3IDWLZxnmRLiRdeEW3WXlU2ou55ThKY
KMmcn7OIZtqUbQAInGAs3zihakZBSTUXh+2Cx02ZNVT1sdgxBgHmFMBsE+yj
JNfRBEO3FeBPEsi9KgveHGYKGg8fJiSOiCCxXDPG1EUJ1cTC2k3Bb1RFwCMj
eFtK11CiMWAaayph/CNOij/Htfk5u/ndO6ELG3EoOqdfptPGqJoCEZVSg14R
NvcS5xuYbGJ/rUDcJt98q7uNp8uj8o0uVu7KJvqGUZHoKJMhLildPyd4rVPR
BhPHP9cA+hTx6iWlb1BlqETDEUYH+qoDZYcylpyEsxclINeEStfe2sDrAFNw
0duR8fBXOAHeIdBAbgNxV3fbDmWF+j1QUzLbYPtPPPtU14rL0rrKf1j34C0l
l5uxdPey23Zwl5GIqFIv76H6wtvB/z5+MXh5/v3Obx4tH/cG+fDH0cvL35x9
//Kwf3qe//g83d7/w3h7f7D16qkZ0+MZGNjvX6PgPghlQJeRenV+1HmMFcUl
eT8IStYKy3zMuDyUo4+tCn0IlYYBzu8ehNHLXg4DF9WUeGSd44nkgoeVGmHC
EwzXMZgv4p8MM5WqC1KtTMaiYsMYzYzFAvmc+6nyVFLLSzgJSxD6MfoStEwv
LOdSoK3IVDFDJkYAvagGdSODxVhrhLstYRv5Cf1UvEAOUqESrB0qVSIDTjRF
PuSvp3rCCYcm/tmvUXhTaDdwGKwZisy6sTgpCz0LeHgGg6ITLFZXmGLE6WI2
wvhiP0jcpuOYyhScbiA1LRAY5xkHjgPywhWuOItUHE4qQDbImqZ7RexrAZ/G
06wW3xSUsvTqa8JEtDlOQNHpJXbOuGjARFft2/ByvA61JaJlwzD+YsySEekT
Bxl4gwTE5O0Ujo6tpyElc7Pxmw5wtblXwDvEqMG1SemIijih6HcB8wTIK3MZ
J7fVWwkrY0yjK+3yfPx0J6niQrsl1mJvPoM0FsOLwzULIah1Tmzg+op60uEq
NHPOb7ADmp+V9zOw8n3KQFogQ1r6RNAMHoCmLd1YTql4Ll+rCh5xoRdJdKlG
SNvrJwSf5xsm9+Su4AvIKVLrtq5llGw0VAB5zjRGwAyOyk86z5AcL7JF7qVT
WE9k4wCUGbNkh2WZlaCsORquOTFhFmTyBlra5sBcRGOsZ0pK1miBBW4Iwabg
C67hOYOqXnCJgEf7wLwYTIzQlbNU3rgFKb0j49fDDhu3bcSXVG1l7VVwxtVG
zCapMIq35RAiba7nhpmcWIBYMtGCq34Du7jwRumq4yZmzDpQyRoPb/y5R2KA
3B6ucpF66/GqoyKch/Z5V70Ih4yr+aPkZHMiEbfqpXKJUigKNpcVaxwel+ym
cKpaXQzyACer14cy0WysoHyhubDVqEAUabJutMnq8vVYLmOlbXpqU35wSbPj
xDAfyQyCOSdYTVxuiX9kb84v9ss4E+XAzgo6emN5Z/h0s61O8H+eP9205cBm
c9AwZfXRMskiQ8QOG5TUxjqgIcT9wfe1unK0g+sI9rIA2ZTgpiwoavxH8l9R
yebqV4wpMwGxfjgQV1QFFt0ZhaGasEiWxVGtCiItB2DCSY2NaXNcbTZCpmE2
JjaTnoRZewaJlcsPMweV/6a0N28KLgttDrIHufokVfB0QecnrY7DgDxKtLXL
InmN7M3qrCSIqXEBSvfresK2zWqqkqqg5+OJ9C458P9EGnXoupVCeSf/bAJl
6qkTaCP9fCYi9apa3eFA2FzQw7fzJEo9xdv4XeSrXF9GHAuWG6rmsqxlPDP1
aMNC/9JCiYyxSuKoKYnlcgoLqdklBUJNrUX6Mp3MsxjPjXFPREjcDW6f5v4M
sV9XoSFNm0ppUuI0UCSi1newsdWK5hFVHgbx5eVBwjQx5gxnlzmH12E5/wp4
yN0D7wvuJr/y69QbPKqNV6jYyqZzfLCnNt9u/uwLl5/rz731SrW62pWvf8qd
6s9ywv9sL3zt9VtuWjxQ9DYaXm/6829T26C5iVT51eL9DtuuvP4pd6tfLN63
anivXqG2rQdN9UCaczEQNh2+XLxv1fD+pSGuv+rA3oA/+HzyhR/Y/hePuO07
cNobcNj/QhG3fTun7d/OatSXi/edO0rYP/0jEPdLLd7+rZ8FKvAXSrQ7H0e0
Vf5an/1LI9rdLxRxux+HuNXxVF8q4h595IH97KU7/zl4f/QrVQ8a/nDRpuLf
KsT9syB/U0hU3YlTj4oK79wPOdr9hngoLxpK/RELVhq/zbsHJqamc+V9/8H1
k+GeK+Zl3/tUK71opzDV24PWn6Olc6N01as0/NW/crS3KqZ8IZUaHFOfc26+
mOP9dKG4Mhv2Vg37Ca9qU1PvRqJO9n+kbAFzgeXt1LQGjNMV26TgA7MWE/+B
YVamTcWhrcRmGsfg2qrO5YIWIQFwftG7AiuyBYuyBdC47pz4xrIkHi+7DmUm
NsiiI/VutuRH/6obS3HaQIdIcV3T/1gAFVFFtElG/UI5NuXoDwcvNsyIQw6E
2k/KF/TjcB9+k16JTT0j/JAy7MWAl/0zru6JvVhSf/ltdudKQT3XgMNbeNsj
0MrFnMRghRfWVMf1cuFaJOKMmIRBS8AwAthtnmWVALT1wb7/xUY97dllNvtg
5bZrbgZ5BOFIt4JSO1AK1d0OT+t8rk3VVccX/vWj2SgG09BsMpV7gr82aNx/
4WbxytYSxsdTPX6j5hhJUpAvn9sEXSz5ZxqZKkEG93sO03TRDW9TP12JAaIT
T68DGGwXToqkk2OsJx4pyB0GLydKeYEjW0904u2joP4t1P4SqcdHB3ESr+hi
cAYJgh6C7L4ML3OtaCzNYY1Jjv+YUNHLnCKQgrKX5iTaVky59Eshska3Ne+3
5MBCQ6jcLdrERuLSVq7JHJCAfAf7gkUNp2aMQ1P/4KUlHTxtI46qDGBEi6eb
s5E7EdKcveryl3tnumVm3mOiPbjFKVEg9zKVRdVORxSAnHaVdso8voqjJGi6
BlNns4gvzrmwJcxBsghJliapBNiE9QDoimOyyLNopi60uXAxwWxP+mG120HA
J/YLjH2IgD7PM+wrP9g/NyyA1tTAWmzjsmMmzGhUYJgZRyVUMBUAZR2DADve
8c1MPeEOdjDecByPhYZlezDuOcVBnabqiEIhXmHw5Pnp0asNr6+9u9AhCqal
mN7LWS4XRA2szGsOw4EWXqchbKE+m5eVG0RgJovcrwIro8pZL9yVLM08Caaj
cB57w2bPDQX2nU9tZ1XYM+zP254Vj5VApfqGsOUQ34KZUsjwf1gldITAuALR
NwnCmqqUy03omDxpRmwmG5kucTM8a76wc7e5IBBsYKOUS/U4Bd+F8Zteq3vT
msn0DA92XfDVKN7X8dVkgSEYplcxxoLkEfaJlT6Fem6wRlVQG4LBOcT2gjfI
l3MTQIUJlM6zhCTHPInGBEipuipXpnlcYDj3Pl2V+1HT2NFIWlIH4HTAbpvU
SCOLnFZFQTVeI92wM7FHAX6rxUrPXnjlJzjoyPxs/VivdixVGwd0u4Luhm78
7uZDXJAHe2kpZdGPbblqgfMp3oDHmRw4ZUoVF9N4DpvlyKrcUEWURpd02EI+
Qb3I4bzTSQBVjaJvsV+n+i6G45GPp0vQ5uHfr+2/P7hutxSJHtm+y35MrmsH
Z0J9XSC465PGwyC/y2NpinZCrLhzPPE6rlUD3l+eff9av6VSJ3m139brQ/MD
UeZFhIG4GCho19Hd4v71le5pWB5YukBKR3FXMtvVDvZpwQYx29GktC+JCS/s
gl43xaN58PNvD3oMgd/9Tn3zDZ52BmTD+M+6fTvD493eJpAb05Vlg9joueNV
jdeXsH+aVQIMCqVngA/TXJs7Q4+WpZZo7YAD0osR50hgGD11UjcNTbU8ZOEP
HERjJPQ4z1BKc5jGosQcoUOvZvQoKrjXJJtqK+/SGRHy91QRoFrYXtb7LkT0
Ojyy1UY40qvffNNWu9sbrUPvpcZ3+vV3HPGteGe7/o40uaWXcL342/v3jo5b
GA3AQ9IDxwevB2eHB6+PW3zrb2czP5ytBI0XYsDgZ5zgRq0Rav5hpRYH1C7V
FGQXq4xGZ/XKpxd88F9GWAscsfrCNbvnruHYSi8mXfTMq1VvzUMvAq9ozNWR
sEZqyef1Sw0K3zfQ/uPKSfVjmGy3hU6ZdZzS4jdix47oZBosKBrENSmkxrUm
ZsX/AdfuRAWDBel4iCGt6gRbeICwNdlfoErDRnD9GMYehnyi/KWXZvySX6Yd
dvhnibL5ixfbT6qQzTGpxPFgCScSvc7hUQV/UHjAlRuohSitanwCahSoD2H/
k2/1OMIz31BggBWLReh04VbggbsFRBOa/It5lpqi9y64l0fHUC3OLPwtvy9h
uBPPhAjijCbxRBpqSI9HUv1hOVeLJAWYSXe/ODVJfqMl6Q6koQCM1g+y4YYH
+sbtuaQrL5dN1lkHVtvPean0UlDcY9XEs2XVdqv12Ve0XkHVgGDjt3qRpMyu
Fc18PESsSlC4EaNiYrlOuIQXt5zaLSZCVl5y7XJvfKlfD2q+CFOnOL7MGd4Y
90v4jeagbRxgA09CaBQdum+uItgPiqKbN1rvO+pzusBfV/HkEY4kiHB1HY51
z9+OUn2kaQMYIG5jOhvCuldDINz8vl15AAH3tQ8G4U4DOBSpTtS3MdPXuwfy
zWv55oMvPKRPBVsx40XuHatKnkZzNJ9oRs2Ntf00N2u41X2kG6K4OUh77X1N
WxRJExG8ktwCbNrF4mhj2flIdu6tvvE87u4+4sBGI2F2Kz+hzZYgj683pkFe
k6Vse/lNum9eQ5IgwKRDCHrs4IeCfKC+89oXbGSqi3WA5hb3NceW2+Itt91j
wjwij1mYlLBKdlRkSJAcwDhhIfaoZ7QEfYmYMsXfnACvTKxxGxfFgojQb5p0
8Lon8v/g9ZZB4Po4ynPTByOM0+KHqywHg5yNj4kTEGv7r2Ti0L015ffgmZxK
3+kKYmw3oWaqAOOZQo+DhrbMFKqsxp57y1VvinslQrWN441O5TWhMj3oUa0T
Kp/DLrnCYzRB/UmL300an/wt445dKNPo94jWZd17587PNXa6G+ld/o6Fxguj
+xsk9i0StwWJbeWHxNcQ2W9A5HaIyK7RmjATMCfnV0ldsUS+Y89pIRg7PKLe
NA37LUlh9t+Y1mQBDTdxQp+YWQ+qsC3LTUy8r5kO/Q2mjCZP57f1du1xIgD6
tTINs6VMqI4mr8kyAs0e7IadNisjMBxsHTWaW3gX9/4SbHhNzyth0zafBnO9
y6n0a47Nbt+9A7RHHViM7Uvur9X4j9OJFkcNe2UD9BMppS7/AF3klyl51+KL
wFtusn0OLBc/Mc6obAxihrJiZRe1lZibGnnZFh8wicet1jfq669DmUrJyHtf
fw0/hT3X+XgXvCfxpFIYfc58HLjRUvLObyQYibmvA7ztuR3+SgD7K0GMPm//
1RdjUiRA8uvBZgHKs6isUgCZ3Oh4zYOSrR3b981ouVaHtqpZhazlfg3+P0se
o9UQ+yNLhN2BrsOhKJjckgrJWhL0AGtLUU1NGP8NdOsSFghwBxixYUjHqqxN
2m5jJzJj9BVxKgmxAdUYNo6OV8Tp7RwAlAkQIuTqYj86tTMrjDff8ALSZTRW
VvML6TZUTQ5TfeRm1anWFpjpz4Dg9l0hKErWXXex7e/igTowibIHLlG2znKs
BQmT2Xyll4aw3j1ozMatuQk4T0lOBh5JGbYIxi04AwRzdOnyjqiC3yUvG3NF
m4Nvs7VAPCb6gqRLjo7dtqd7R4rLKyxIpyjmcR40ruucPx9WlkeEuLPV2yUz
rkKlzqvYq3gB+ValEVy2FxofMMrvziaAQZe/0pYkVXYeMm7xU+egoiWri0Uq
xSIEV6uHMoMYecJlD2K8CEHAkaeY9dz0Sqcxsmt3AVOZvZK+C6ZhWw3b6gRm
azem6LY9BcHfxGpPoNpsCHPpNXy31fBdH1/vwU99ta12QMt/pB6rJx/zXes3
nZ/5/1oczIMIkRgd+D8v+ysM9pGs5DCm53OtwXlV4d9n8L/D9yfw6bldQ2OG
NP7952dbQ+OfRxCr/z7HGm6KjpIDX4uIamZ2/PARcYebw6PqI/HLrRbSxF5r
DyhvXX7aAEFsSQN/Om9KmcUeuhj9gTn9rAzErC7ba/zcMk9SRKWHpDCL2nhG
pWOJQQ56inFAMbuOF+d5JSI4TDXlQ20GsbevMV6jVpJSKVnP59OThea+s5iH
iPbkNZmRmCBKpQWoE6xLyT32Ugi9xE4v7b1dTeKkmANm/WIsGB9Owcy62hOz
1WLCN+APCgXg5dB1JuUUxCafmKYH01qVAlfOJMy6vQunD5j8KU8IEEIPJHvN
ja+mrC5Sbl3JhtXE1UGvouGex+kb9Zx7paKxL9FkVZ1evHpz8f7imgga3x70
OOCR6BmI9Qy/rvq4jG4fVvEQ1YVdCWdSI0P6tU4o7IEKVtjl8Frw6Vl1PUOD
Gs5hW/dcHlwpNC5cAYJVJQ7EFLLhX7HF4YoXWKfwkpsBsWl2DWrOJe0eK42Z
hXEs+ToFZ9nsY7uujGsbmHq/VM7AJTUfk+fMJIznEr3SXOKG4MmQQ7q1JOsV
iXBBUDgX6JoRqMh0TSjZ0XRgpcKMvUGtyW02INAJx3RHwNjEybfpDtEURuJC
RraQB/m6eJGb7ZXDu8PFLVhpvRSd5OJC8NjRkK4QhrURzQxW+yWQjgIY9bzw
s9u269bTo83xgUS3QNpVf8TbVHHA7ODIj2whPNMRu07+XVOtKpzIIGz1IoQS
BCZt8jlFdgMoBsISL+LvrBqGHkUAXCVoTKx2vmWplxexFy+R3CBfEjdB5ziQ
gT2tfo/gTykaI4TTWPjKxMZhsRQr+qQvi4EoMrYQjuRErqqm19Ms4Xp7QS0X
6zYUT1+w1m5NgAfi30nwLZTgUiHu00Q48Twbe9tQJsPEPVBDarqAYUFP8vVe
aP3LCC3Hzu+lyb00uZcm/1rSRB3vv9jHMGA/qOPdA/TQW2uR2ClIEXySI8Ev
0QOb60klNgTts5JC1pgQ1zjeiN4v1uQ9OJ8LuqzHJy7zbDHnmOi1Qw5wwcvk
/dBtbD15yKTQ2uNx1vZWu2mIjJnZtjzX4Z4Tnq0zUxNzT/05uEb5y+pYpxen
54d7ari4BMsO4XnlplFP1c6jbuvsaKAOJ3GZ5Xuw0Fl2JcGieKMk4ptwYCMC
n9OFjNnTXcEsAW4G0E1j3g7wOYgFQHqiDsDoiHXnO50kMyD+U3S5D06Hh5LL
t3ETpGkuAsFWCGkM+pL7L7mpdbAfsC94wEG2CSgm6vjw/OiTcHL7wvoVEvj1
rGy7AjIb6vePWF4jMReMSqDmrd02AQ8/PqKP2/jx8a00jqzKlVcsuOIm3Usv
5hPuNpi5irThFWZ4RCikOqmEQJMOZs6L8Cq6Tfyos1M7Oivn+gedI8yDIvYk
V0VyU+QRy06Nk910ZfOZ+dsO4L53O3vDu4cFRUTUZEohv8jFi/lnNaJQKN+7
tDCXHdsYG+D89d5dnAtDDIlJ0vL4DprysoJSsOMkKzRdMHPskblq6XX7Mnrv
ySZemswkn4zLRzSv25b2ynWiryIiZaRlB5AkimcFV5Km4M3qDxyHZEanL+Va
tRaB+iiIF5dwPi+YqnkYEwBPjTxJualcY8FrHX6D/I7veWmrHODv//u/3rfe
44HpYtB/OsZb9b3KM36RYFDfBj+cSzwrqtJex1DUGzigiXVxOjZTONZkZUkE
cAiP9d6GggUMvNBa2JoNEd6TBfyIiY1bG/DkSVNBtz23VHqyj08eNwQ27anK
k9v45JmeJ1HzY+7JHXxyEAZQ1QBFT+7ik98HaQyVB82Tj8yTwJlY264jiLRG
dzUYBCHbzJA33hgUdFWCgosWRm/rMavUMNFBTJtD64qjVYMdy5Ie45KOIsr7
kLSp+uJfZIQ0LAXfNXyr4amH+3jT9F4C2VFb13OMCSF+VgHFE5rX17BrsJAn
a951QkzIRJsR8+5dNXjxw14tKKkSE8jFi12UWMdFiRnGDd/M8YBQULhkAEm4
lBoOjw8UVX2n7O2Baf3QhUXjBZE7rfVLogoDoE4hHTox+9UASXNwW37xP2D/
0SiJiynFEhXTCEUpDJqDuWmzJsK4JTQvBgffBVHsLp8miGgKXuKgFZf2/CZO
OawoyEZqCCMUJl7hIV1VeexnMxoT+CkmZb2WfSHSor9L0mJQ/ZnZHtKQk1iG
k/e7O91+t7fBTHEwGJrnHvefbHnPPYJnuoTDrQ21kuUBDs/9WI+vXJaw68Mc
sgHK3c4nXO9+7tQyMkrfooHqWlonQrz+9JKeFHxHkXNYizUrShnTi2hwkSg8
Mj/r1gePjTJJxag+60V7NyK6KbHCb/mA2GYw9jdUszwQGMbBzLmNMQ/y4ela
kkPM/LhPkw4jh4Dm295QjVKlZa6ba8GkvCPbCFyisCTGK4wsFYqu5L+RmC38
KNrw5KEnwQvxbStuxyFGR0lO1EriislEyc1oTlfG0XirO2ijV8SiwdYoz+Co
pYVE8PLeqr0MQK3M8fvSFjpVQT7MDStom75DyDiB93G2mLuN9WvZG98tRrgm
8Tgu/a131bdYhYKdzXHRDhI1pCt7zrukECqqaWGTNORuznE1w5a5sCuBaXdD
VXQCAyRLAKULc5Yqx4E7p1Yq2kUG+HU87LJ+iwlXLqvHrxtj3jGttEw4ELqO
4eBfSV4N7to1cslyL/B5JPWYu6GX6XXPuLv8CHLuLgMQtylhIixR06buQMha
nDVTHXTLZbHXAtOlzAQWcqB6KYI0bpnkWqWK5HYZSUYhWjVgRCHDbjzG4qMN
FeprsFQuDY8n0mS+oc+hbeOy32BLAwtO9tqAmAnHoYDIuBgvisLo52HO6wde
wOMNdZN25otOC7MbX6BRn2yoJt3L4OFSpzqXplWz+YLVKaqq4p4ueZ+1TFnS
EgKVoit9zFzmQN06Qu1lE04Mkl52mUdzkN5Ob0UYH2X5NaZc05jjJXLWU3T+
amufB4qISQIlF7svfCT1gdWDWnY/7hd2EpvEfDnSzHtdVn6R+U/qKE9iSrWi
h4uvCDQM6R4oZceuFk9dMHA6TBFKv68KX6lx7aZWkL/LMPJ1g5tHCOgd+8Ok
1SNACu+lXEc1D2YC8az8BADrCNjJBDTfOdcJMAZ6GaciuFjRdSWRLNOjfIcg
TaPkTK3UXAvGMOd16h6SJFKT8CNNmI9tRzlyRph0WHudxNC2dYVAEFUqNOHy
pEaAaSxULdokHSlsQu2qwb17TlcFxq3JrZr+FcZZ20PlB+tWS1f5zaFwDxhe
bRJ+aXib5cu5k2K+CBaXtTGyakTxusmp2vCi0hDZ615uVZD+gVB0m6LR7Bok
G5glOT5oIOE/dmweEzeL34voj7bOQmtIlXQqnprCFLoyzh6jZO+Ejh9xK/E1
ZWqLGZiuI5Kd4mv6pgOIqIRkaoSWjIOwMffANngIej+LZC++nrpsUfkkaVlE
PeS4WELH2md00+OqQtBluo83si6pJZ3fPaqoFBqoQvBMX4n79qMhuH1HCH5W
sLnkJk7LQvs654t9AMwk4dAEsyfTkOAixlPEwQRUm6Oe14ZR0DxRA8Qk6PIk
m7gb+n3mlp4vjhKNC1tlwGvc6LeJE6WqOa0O9zujRph+FlyhgM3QhRny5qUp
8yJtbry+Phzwz8LNFv+wV4OBFeGm9ovkMQ8NXOMt13aQpWLNiStGDZIAcue3
6qC7UyuGdzoPKhSZ1Aox7T13isnvq5dmCtIHHU+i+H3Dh8gZY1LdtGlTsnQ8
WLr50A38dWrokdNEa/0f3N1tLRO6sYddGb3BGNFcu25sxscjkgRgBOIwx5g/
SXgKwUQlDLqVy4mK2DHxJ849s7LsoDlDlTw0QqRfaw3FUC3h9Pb+sc3JCJWe
isIa/MgZ9sNbli5NEyo3Ca3KxYI3xZPubqUyg6s5l8OplJAQrDzF+lBNEan1
16RyNYGrx3E0wEdi+tDV6d9xRK9cBDNF1/yk0qKU1EYSAcQTWXHJryJS5E6y
FO9d8E6oDgIPBtU6Mioa4cGZ24FmdiB/MywDsF5Kx963G2Z2TgoA/mSztcRs
qOzMKcB2YDK504wqE8w4f8eJKy9jlV00F36RGtSPOx0g6PEbvFo6ctHVJpZE
6oHijRLFwox9/YcznPiJWps0m6DkYsrQ2yKOQA7H4AtRzpJEVR5gN06i3EiJ
6CqL4X9no/hygcY7aFUSHBNUY+OYkXpQjseg0dMuHfE4wOr8lcmH72+RYkhB
SKKG+vHqc/JaohjCLqiVbjEsDcOOx/76uupokaPInZFOJndn1h43cX1G37kh
cNn5C/xGbaYhMhpY1O8G2yJf33AH+hsqOktRjHjdqN6DuicfJGroKQLkPdfj
ecpxF+/VGXzchP8O5b8n5h3892hzEz9LDFJx6UZCqL/3wmzUtwTkXmdrx6xk
1Yq2fuaKNpsm3trt7PRum7n/S8y8s9V59Oi2mbd/iZkfPe70Nvu3Tb3zCVNv
3jZ1b3O7AyRg5lx5J47ZdUi9bS+ErDA6ua3KxXTW2KKxbXM86t0XPYKsROXh
WMg0un4IXe3pIG72Nk6zqj2mcCAJdDz3dmlLZDRPT4nw6GIxQZiN+8ecdWmV
Zu7GpQEqXx4IQCp9LcXxCyQizA91eebO6wIhDgCWf/hxwFvyignvlEc4LFj+
cYQbZBtTvqlucoNEl2vQVcv1HNZ7o9nAQ7VbXbaXMIyeImaylCC8GsJdUn5c
dQHTXw8FBAzcl422mwDI5S2Arey4lYgT2XhC6fqiscObvLuYI/Pf2q2NQLEe
+zbhhOtuvduT1sl68nQtzdYk0oOd9AVvP9eU/R6lb9ThZAFqUAY6+2Wii84Q
TVP9k5SCFO9KPFr42ilfyiRqPo1MaQguePWmq36Q+ItrqeHAk5xE+ThT5zGG
I7XVYJrHBYwAdtqs+Pv/KwByz6IRbDVRz7O5/qlzAuiO4Kif6fSnTL2IQGVq
g523SNQPoESRE/kMj8wwSn5qw8oBKGcZFaKj6zsaPqMbk+M0GseZqcwZI+1f
xfqaywTJomGt/sXXHKRqTE5UEKCghNGVwsvjg63NrX6nt/0YONbpt53Bdl+t
n744PTo73O68Onm1wU6gk8Hxi4f7h8dUqooTAcd0KQJ7g7EudJHlEUD7VRpj
ZY4YRHhM7QonoHlk6B29zBFyRy9fbW0/3Ow/ftRrM0Arw1uesMC7awAljJil
X4EKq9+Wz9gvDF8cvqLjg3tyTkC62QE6Pqf25F49GvYaxQnl96qXhIPAKTuc
o8Y4VccvBsffHqr13WedIXu0EUobd4XqH+M0za4i1aEFDcHYwEH3L6meAOLq
mH4nmhtSOdqCnvXu9l6dHX6/rwaHz8+PB50Xh386N4tQgx9fnh0Oh6K2XiSL
i4vW/wel8KlegN8AAA==

-->

</rfc>
