<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-est-renewal-info-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="est-renew">Certificate Renewal Recommendations for Enrollment over Secure Transport</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-est-renewal-info-00"/>
    <author initials="R." surname="Shekh-Yusef" fullname="Rifaat Shekh-Yusef">
      <organization>Ciena</organization>
      <address>
        <email>rifaat.s.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="M." surname="Ounsworth" fullname="Mike Ounsworth">
      <organization>Entrust Limited</organization>
      <address>
        <email>mike.ounsworth@entrust.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="12"/>
    <area>Internet</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 46?>

<t>This document describes an extension to RFC7030, Enrollment over Secure Transport to
give an indication to a end-entity device when it should start attempting to renew its certificates.</t>
      <t>Prior art is that client decides, with a typical recommmendation to start when the remaining lifetime of the certificate is at the 50% point.
As typical certificate lifetimes are reduced from years to fractions of a year, the 50% may be far too early, and this document provides a way to give alternate advice.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-est-renewal-info/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        lamps Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/lamps-wg/lamps-est-renewal-info"/>.</t>
    </note>
  </front>
  <middle>
    <?line 54?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref section="1" sectionFormat="comma" target="RFC9773"/> explains why certificate lifetimes and renewal times need more deterministic control in the ACME <xref target="RFC8555"/> ecosystem.
Similar arguments apply to the <xref target="RFC7030"/> ecosystem.</t>
      <t>This document extends <xref target="RFC7030"/> to add support for renewal information, by adding a new entry to the HTTP URIs for Control list defined in <xref section="3.2.2" sectionFormat="comma" target="RFC7030"/></t>
      <t>This mechanism enables EST servers to provide suggested detailed renewal operations to EST clients.</t>
      <t>The /renewal-info URI is added, as an <bcp14>OPTIONAL</bcp14> operation, to the table in figure 5 in section 3.2.2 of <xref target="RFC7030"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="protocol-details">
      <name>Protocol Details</name>
      <section anchor="renewal-information-request">
        <name>Renewal Information Request</name>
        <t>To retrieve the renewal information, the EST client uses the following HTTP request-line:</t>
        <artwork><![CDATA[
GET /.well-known/est/renewal-info/<certificate-id>;
]]></artwork>
        <t>The request includes a unique identifier for the certificate in question.
The unique identifier is constructed by concatenating the base64url encoding <xref target="RFC4648"/> of the keyIdentifier field of the certificate's Authority Key Identifier (AKI) <xref target="RFC5280"/> extension, the period character ".", and the base64url encoding of the DER-encoded Serial Number field (without the tag and length bytes).
All trailing "=" characters <bcp14>MUST</bcp14> be stripped from both parts of the unique identifier.</t>
        <t>Thus, the full request URL is constructed as follows (split onto multiple lines for readability), where the "||" operator indicates string concatenation:</t>
        <artwork><![CDATA[
    url = /.well-known/est/renewal-info
      || '/'
      || base64url(AKI keyIdentifier)
      || '.'
      || base64url(Serial)
]]></artwork>
      </section>
      <section anchor="renewal-information-response">
        <name>Renewal Information Response</name>
        <t>The structure the EST RenewalInfo object is as follows:</t>
        <t>suggestedWindow (object, required):
      A JSON object with two keys, "start" and "end", whose values are
      timestamps, encoded in the format specified in <xref target="RFC3339"/>, which
      bound the window of time in which the CA recommends renewing the
      certificate.</t>
        <t>For example:</t>
        <artwork><![CDATA[
    HTTP/1.1 200 OK
    Content-Type: application/json
    Retry-After: 21600

    {
      "suggestedWindow": {
        "start": "2025-01-02T04:00:00Z",
        "end": "2025-01-03T04:00:00Z"
      }
    }
]]></artwork>
        <section anchor="base64-not-used">
          <name>Base64 Not Used</name>
          <t><xref target="RFC7030"/> mistakenly declared that all content would be base64 encoded.
<xref target="RFC8951"/> clarifies that the content is to be base64 encoded, whether or not there is a Content-Transfer-Encoding header present.
It further clarifies that future extensions (such as this document) will not use base64 encoding.
The response detailed above is not base64 encoded.</t>
        </section>
      </section>
    </section>
    <section anchor="renewal-operations">
      <name>Renewal Operations</name>
      <t>Clients <bcp14>MUST</bcp14> attempt renewal at a time of their choosing based on the suggested renewal window, obtained in the previous step.</t>
      <t>The following algorithm is <bcp14>RECOMMENDED</bcp14> for choosing a renewal time:</t>
      <ol spacing="normal" type="1"><li>
          <t>Select a uniform random time within the suggested window.</t>
        </li>
        <li>
          <t>If the selected time is in the past, attempt renewal immediately.</t>
        </li>
        <li>
          <t>Otherwise, if the client can schedule itself to attempt renewal
at exactly the selected time, do so.</t>
        </li>
        <li>
          <t>Otherwise, if the selected time is before the next time that the
client would wake up normally, attempt renewal immediately.</t>
        </li>
        <li>
          <t>Otherwise, sleep until the time indicated by the Retry-After
header and return to Step 1.</t>
        </li>
      </ol>
      <t>In all cases, renewal attempts are subject to the client's existing error backoff and retry intervals.</t>
      <t>A RenewalInfo object in which the end timestamp equals or precedes the start timestamp is invalid.  Servers <bcp14>MUST NOT</bcp14> serve such a response, and clients <bcp14>MUST</bcp14> treat one as though they failed to receive any response from the server (e.g., retry at an appropriate interval, renew on a fallback schedule, etc.).</t>
      <section anchor="fetching-schedule">
        <name>Fetching Schedule</name>
        <t>The advice in <xref section="4.3" sectionFormat="comma" target="RFC9773"/> applies:</t>
        <t>Clients <bcp14>SHOULD</bcp14> fetch a certificate's RenewalInfo immediately after
   issuance.</t>
        <t>During the lifetime of a certificate, the renewal information needs
   to be fetched frequently enough that clients learn about changes in
   the suggested window quickly, but without overwhelming the server.
   This protocol uses the Retry-After header [RFC9110] to indicate to
   clients how often to retry.  Note that in other HTTP applications,
   Retry-After often indicates the minimum time to wait before retrying
   a request.  In this protocol, it indicates the desired (i.e., both
   requested minimum and maximum) amount of time to wait.</t>
        <t>Clients <bcp14>MUST NOT</bcp14> check a certificate's RenewalInfo after the
   certificate has expired.  Clients <bcp14>MUST NOT</bcp14> check a certificate's
   RenewalInfo after they consider the certificate to be replaced (for
   instance, after a new certificate for the same identifiers has been
   received and configured).</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>A very short certificate lifetime renewal time will cause clients to communicate with the EST Registrar more frequently.</t>
      <t>EST connections for renewals typically make use of mutually authenticated TLS.
When the client certificate being an IDevID, or the last issued certificate, often an LDevID, there is potential to disclose identities during this connection when using TLS 1.2.</t>
      <t>TLS 1.3 does not suffer from this problem, and it's use is <bcp14>RECOMMENDED</bcp14> as per <xref target="I-D.ietf-uta-require-tls13"/></t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Not sure what yet.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Might need a header allocation</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many bits of text are taken from <xref target="RFC9773"/>.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7030" target="https://www.rfc-editor.org/info/rfc7030" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7030.xml">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC4648" target="https://www.rfc-editor.org/info/rfc4648" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4648.xml">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC3339" target="https://www.rfc-editor.org/info/rfc3339" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3339.xml">
          <front>
            <title>Date and Time on the Internet: Timestamps</title>
            <author fullname="G. Klyne" initials="G." surname="Klyne"/>
            <author fullname="C. Newman" initials="C." surname="Newman"/>
            <date month="July" year="2002"/>
            <abstract>
              <t>This document defines a date and time format for use in Internet protocols that is a profile of the ISO 8601 standard for representation of dates and times using the Gregorian calendar.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3339"/>
          <seriesInfo name="DOI" value="10.17487/RFC3339"/>
        </reference>
        <reference anchor="RFC8951" target="https://www.rfc-editor.org/info/rfc8951" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8951.xml">
          <front>
            <title>Clarification of Enrollment over Secure Transport (EST): Transfer Encodings and ASN.1</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Werner" initials="T." surname="Werner"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document updates RFC 7030: Enrollment over Secure Transport to resolve some errata that were reported and that have proven to cause interoperability issues when RFC 7030 was extended.</t>
              <t>This document deprecates the specification of "Content-Transfer-Encoding" headers for Enrollment over Secure Transport (EST) endpoints. This document fixes some syntactical errors in ASN.1 that were present.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8951"/>
          <seriesInfo name="DOI" value="10.17487/RFC8951"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9773" target="https://www.rfc-editor.org/info/rfc9773" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9773.xml">
          <front>
            <title>ACME Renewal Information (ARI) Extension</title>
            <author fullname="A. Gable" initials="A." surname="Gable"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>This document specifies how an Automated Certificate Management Environment (ACME) server may provide suggestions to ACME clients as to when they should attempt to renew their certificates. This allows servers to mitigate load spikes and ensures that clients do not make false assumptions about appropriate certificate renewal periods.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9773"/>
          <seriesInfo name="DOI" value="10.17487/RFC9773"/>
        </reference>
        <reference anchor="RFC8555" target="https://www.rfc-editor.org/info/rfc8555" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8555.xml">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="I-D.ietf-uta-require-tls13" target="https://datatracker.ietf.org/doc/html/draft-ietf-uta-require-tls13-12" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-uta-require-tls13.xml">
          <front>
            <title>New Protocols Using TLS Must Require TLS 1.3</title>
            <author fullname="Rich Salz" initials="R." surname="Salz">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Nimrod Aviram" initials="N." surname="Aviram"/>
            <date day="14" month="April" year="2025"/>
            <abstract>
              <t>TLS 1.3 use is widespread, it has had comprehensive security proofs, and it improves both security and privacy over TLS 1.2. Therefore, new protocols that use TLS must require TLS 1.3. As DTLS 1.3 is not widely available or deployed, this prescription does not pertain to DTLS (in any DTLS version); it pertains to TLS only. This document updates RFC9325 and discusses post-quantum cryptography and the security and privacy improvements over TLS 1.2 as a rationale for that update.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-require-tls13-12"/>
        </reference>
      </references>
    </references>
    <?line 216?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA41Z63LbxhX+j6fY0tOJ1BIQqUtss86FkZSEjS6uKI/HTTKd
JbAgNwKwKBYQzbHdZ+mz9Mn6nbMLEJQUtx6PDSz2XPdcvrMMwzCodZ2piThV
Va1THctaiRtVqLXM8H9s8lwViay1KaxITSXOi8pkGRZrYe5VJeYqbiolbitZ
2NJUdSAXi0rdT4SydVgRoyAxcSFzyEgqmdahVnUaZjIvbdjtkVmoi9SEo1EQ
PBO2lkXyD5mZAkR11agg0GXFj7Y+HI1ejg4DWSk5EbOiVlWh6mC9nIiL6eXr
uXhrqjtdLMUPlWnK4G693RSekfwAJk4gIgmC2CTYORENFHoRlHoi8OeZiGUh
GquErCq5EXs6FTLLxEbZfQEHrKRdiZWqVCBEbeIJfcCjhe2VSu2EWSQqlU1W
W+xov29y95leA9nUK1NNglDoAms3kZiv1N0qfAe5KXY7f93oVMr6wSdTQeNT
rQqJF5VLnU1ExRsjG5Fvv13SYoSjC1r+lxF4xStZJdYUHftLWlLZ7idmP4f/
VZbDD3OT1mv4mt1qtxLzuPozC7Pt1iiWJK9lfafEdVPYNdyyatmeF3yC4kLn
ulZJjxu2R6bd/q1y+5wJhalyxN+9mmD/zfenz0dHowkCAuGy++Hl8+dH+HCv
ioaXlhQAE8GRhlcnyZbS5t+S5hFUol26XjULvy1cLw+ejkyYFoZCLmxdybgO
gtuVtgKB3XAmJMrGlV4oK+Ay9b5WhUXC0OF7hYf/M2+wOVjCGOKgi4QS0bOQ
AhkYglDXG0i617ES65XCtlrYlWmyhBIGHGRdq7ysKfhBxtpjjxXxNrVtFASv
K40wJgKYUK8QYHGmnRWxhiVDsYZPILbelCDKwInKQFcHiLkTyFrUK4Ud8G5B
gjOdqlrnSpiUv/RkkzgIo9WT0R9FaXRRR8HUdnL6e1s+IKmIf9LEKhFpZXIk
kKw4sVI6Ci5MECZ5fdixz5G6CyVSWWGrEfiWbYZwboId/aMrK3NPVoPBGiRg
604ho5pBmsiEPB65AMh1kmSKahSKSmWgFSkQBB8++AAc0sGyl8afPiEUygyO
sfDU5vfMg0Y+0IRbKRQszQ3MThSUyOFYW+tYxIZEZogONnJ6enkuPnz4BoJf
nJyckLTY2I1FDETBHBmWSTrlJZsJOWWZsXlEy+pSXO5SPYhqDuTE7uymeEwQ
cE3JQUsdodW+y0hTDMViQ/soIqSgOKSU7sT/eHv7Wry5mbmOcurtymAmFU5d
wH4Y2Ynd+vQoOowOP33yiuYKdQvOycFdLjK47nx+K6yqkF8cIP5soe1yiYQG
W3gUZUBtXW5KVfnuBgKid8lg2RtKHPSLAOnMUZwkKkEwcbpfv76dXV9NL7as
hq2dNWlFpqR6Scl+Qs+2bwtFbs+9EUXWLZ+5ycxy43S4UxuBwoiTGFy+md8O
hu5/cXXNzzfnf3szuzk/o+f5j9OLi+4h8DvmP16/uTjbPm0pT68vL8+vzhwx
VsXOUjC4nL4buKwZtHYOXAD2A4VSFCYvyFZEbFkp8rW0QVsX+Ty/O339n3+P
j2HvH2Dw4Xj8EvHkXl6Mnx/jheqJk2YKBKt7hSM3AaIXGUxcqBXHstS1zCwf
AUrguuCGDO/96WfyzK8T8WoRl+Pjr/0CGbyz2PpsZ5F99njlEbFz4hNLT4jp
vLmz/sDTu/pO3+28t37vLb76JkOSiHD84puvAwqZ15UBFEEOnXF8A2A8e9ah
uNk2L7H2zwaZgLiiBlFXWqHWuQr+RBLTh21KECayvJaik5k1JTdncuWYhqQU
GvC/8Cf44fxWHERrlWXhXYEDOsCGnVw6eNWrh6FOvv6LI+SI9xyhTZw1rjg3
hcaaQDoXRIUOSrXjUYspBFNC/Yg5PSZD4KKSoo+jdiMwUajwSsSo9tw6QbWQ
Vn153FQZKosDiT5Qj788foFA9c0NiTnr6aMVWvHjvveFFVOGe9S/f0Iu92j2
pj/N9j3vk8MXXI9b+OD8j6KiTSIIoaHbgWQQDdo+9qSiXoGz85uQ12DjHDxw
tldNvuj03KMmb5raF6ols8xUsUTrX2yAFPbRm5FrwDs6I76DrwZbLazgtELG
w5Eayel788KAvAQ2sK0ejw6AC2tjnXVpk2Xdab+5uXh4OtL6YLNiz5YZEA+a
hRE5sLUuM+qjhbK+C8lELqBqvdkfUumoXGAPfvn4y8eBL86marEVqEhz2NU7
fVO04UuDAHn1q88HMe8T4uNH8cXBF9uX7lToeHejZL9HEj1J4g5r32fD7+Yx
QGNhlUsX567GW0wZ62mIRJjFb2g53Lc6b8LOrim+hUvMWuy5fUM+Dg3EtT/x
6k3FX+fXVy0fBof12pBdOMUBQ8GB6xGACwNyvsH0dC+zxsE3z4bRTU3oeija
yPRYxhkGcA4ECi/59k9JcXR0hDZBPDGkeEYLTAou/NdOdQo1wpyg4n387XTq
gStjGD41n96eTS9FEZPfIzbUe2iXqX4QUIE7GEdjgbFTXP/EawRYcJ7h7abE
qEPAyqP1g9/cDIVxBLV1E05TpMpEHI6/pLmW1j942YMH3h9Muk+idelEDA5H
hyfhaByODm9Hx5PRCH//jrbcbSR/97cd9bb5XZ8C928bTs/Edxxq4sog4yym
sKCP73KAMHmnqP1iHACEVImbEbjvOsMBRmjoWLTlpz3NKPDd/OUJgV+iptP0
QwZXRc9AW48Xdhlw3mJfRXN2YZimcnPD1uk0MKWqCs/bgrdC5oMEqMMqmihm
gKVNxWweqJA2nCRdhaWi0iBcpN0FNPsILJhLGtA9QF9JCIx8i3IZuIWUcoHB
jpQluoeeCbZ5fN1BziA4dWDTVVM/v3W9mLwuesOUhkErYywZTfwJJrFbt/i2
JXWJMUTOQrlim2hw0r02DRU/VXqIu+3mMltSl1rlZEUPn3CB7UTLnXkFyTKO
BFpMRsWB+zRls8AxJWgIrD6VDP1QVacidDgE+cw1C8tcKOQ4nW2ntrQoTA/9
o5HbiUb6ZhuwOQKbazr1tbZqKLTvww660JWOjVcYIwmQ15CT8iizy5FTRdLg
gyZH09JDlYYIEWENpB0/Ke2R/guVGl+WC4SdW2/TgcV5BV1KrZF6oikF33lk
PLB+1uaTXS1splSJE6h15tq6K4qu4THUodVebWINfP64QRQJwgP+HPEhxhAx
ayG3pZuBbWiyWm46t43rDH7qcRYB9aj3NLgiYlRVIYAWMr4zadoKwjjI0wL6
BA1b0yd7Vr+gqyLZ9hCBJgVCKhSI6VglHpq6i4ntNo4hiNAJB6kbDduRwM2K
wtWALqMduor7mVkDXRD0UK5UmGbJKm1E6lKfr1ti5a5vNtvawJjIBQZJFnsq
WkZDbz2ld0HtozJlpR16df7wfqb0lhCRZeS6Ln7RPes42o8YHHyP5xX5eO6/
upx2lxbdFL17M3EcHaE8c99ShASopXlr/RyTElfI3kWx/QPqxaGQbShpaxtZ
8GUJ3s6aqsXT/VuhHa7D3xs++BaEru18o2CNGGUSWCwoO1Xhz6G7wbIAsBLx
i0oMYEuXA6g14Mpsnig+mBV0fEdptmgcsCE6up5DH8ryVnt3eBFx4XuHsp22
uoGol1JtOv1Mbh+PR7+SAW0O0iVfl/NWrBi71KpwAQQeCFL0ZV8icHqG2xhP
WT2cYRkC9IU6LltsS0rRxVHe+BIMAWsJ+OwLEguDfcRHtgCc6rAf7VsTh3TJ
uMsWmUboUOzpSCGWCfETF8+Drq68XMqiXL6n530hc4C2ukNqXp1oJ/i6tMRJ
I94/F34ccm0N7Q+AK0l1pyQNo/+Xs3PmE8x5NLQ6UY8HTReVlSozSReTe/Aq
Z0BBv13EVEOYibv86hO2U6uVeX8qsqz5QqnCOZOLSeIqkSnc/VFCOe/GfX0v
4w1hItauRRNTgTjd0I0IauBT1407nduBnFgSxGkjEmYRZEYTZzqH9buZYqnp
+rtyl5PbTIRWfEtgikLF21+KvKzufhcpm3N/s1wHcoAxXqTfQsgNrkndXsyj
4G17sdy2754tC8UgpBCzM3U/OxsK79BM0oUBKhCY7FQYlxsguPAEHaosDUFK
Go1hd6JtnNHg4g6lJtSYtCXMjaXePHfv3TAYgrpok4cEpfjpCAhBOQhomzSl
cdv1AJdUi0zlrr9o6pDkigdQC1EAfEgXu7PwjH/PCZtahn4oC+vMjo/oBvSZ
+wWB7hQehsEVC6/oVwJUkY2qGX7OplfTR1sv9XJVuxtn2QEBwEFXZ4hsGtPo
iya3VHyRDBpqcQvtR3xCNXz/R1ODM7ZrOf5C85QLcWaWgbtEp24WBP8Fy3k0
SXwcAAA=

-->

</rfc>
