<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-one-signature-certs-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="OSC">One Signature Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-one-signature-certs-00"/>
    <author initials="S." surname="Santesson" fullname="Stefan Santesson">
      <organization abbrev="IDsec Solutions">IDsec Solutions AB</organization>
      <address>
        <postal>
          <street>Forskningsbyn Ideon</street>
          <city>Lund</city>
          <code>223 70</code>
          <country>SE</country>
        </postal>
        <email>sts@aaa-sec.com</email>
      </address>
    </author>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <city>Herndon, VA</city>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="26"/>
    <workgroup>LAMPS</workgroup>
    <keyword>certificate</keyword>
    <keyword>signature</keyword>
    <keyword>X.509</keyword>
    <abstract>
      <?line 111?>

<t>This document defines a profile for certificates that are issued for validation of the digital signature produced by a single signing operation. Each certificate is created at the time of signing and bound to the signed content. The associated signing key is generated, used to produce a single digital signature, and then immediately destroyed. The certificate never expires and is never revoked, which simplifies long-term validation.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-one-signature-certs/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/lamps-wg/draft-ietf-lamps-one-signature-certs"/>.</t>
    </note>
  </front>
  <middle>
    <?line 115?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The landscape of server-based signing services has changed over the decades. Recently, one type of signature service has gained favor, where the signing private key and the signing certificate are created for each digital signature, rather than re-using a static key and certificate over an extended time period.</t>
      <t>Some reasons why this type of signature services has been successful are:</t>
      <ul spacing="normal">
        <li>
          <t>The certificate will always have a predictable validity time from the time of signing;</t>
        </li>
        <li>
          <t>The time of signing is guaranteed by the certificate issue date;</t>
        </li>
        <li>
          <t>The identity information in the certificate can be adapted to the signing context;</t>
        </li>
        <li>
          <t>Revocation of signing certificates is practically non-existent despite many years of operation and millions of signatures; and</t>
        </li>
        <li>
          <t>The signature service holds no pre-stored user keys or certificates.</t>
        </li>
      </ul>
      <t>While this type of signature service solves many problems, it still suffers from the complexity caused by expiring signing certificates. One solution to this problem is the Signature Validation Token (SVT) <xref target="RFC9321"/>, where future validation can rely on a previous successful validation rather than validation based on aging data.</t>
      <t>This document takes this one step further and allows validation at any time in the future as long as trust in the CA certificate can be established.</t>
      <section anchor="basic-features">
        <name>Basic features</name>
        <t>One signature certificates have the following common characteristics:</t>
        <ul spacing="normal">
          <li>
            <t>They never expire;</t>
          </li>
          <li>
            <t>They are never revoked;</t>
          </li>
          <li>
            <t>They are bound to a specific document content; and</t>
          </li>
          <li>
            <t>They assert that the corresponding private key was destroyed immediately after signing.</t>
          </li>
        </ul>
        <section anchor="revocation">
          <name>Revocation</name>
          <t>Traditional certificates that are re-used over time have many legitimate reasons for revocation, such as if the private key is lost or compromised. This can lead to large volumes of revocation data.</t>
          <t>The fact that the same key is used many times exposes the key for the risks of loss, unauthorized usage, or theft. When many objects are signed with the same private key, the risk of exposure and the number of affected signed documents upon revocation increases, unless properly timestamped and properly verified.</t>
          <t>When a signing key is used only once, that risk of exposure is greatly reduced, and it has been shown that most usages of dedicated private keys and certificates no longer require revocation.</t>
          <t>The CA can readily attest that a certain procedure was followed when the certificate was issued. As a matter of policy, the certificate itself is an attestation that the CP and CPS <xref target="RFC3647"/> were followed successfully when the signature was created. Certificates issued according to this profile therefore only attest to the validity at the time of issuance and signing, rather than a retroactive state at the time of validation. This profile is intended for those applications where this declaration of validity is relevant and useful.</t>
          <t>Applications that require traditional revocation checking that provides the state at the time of validation <bcp14>MUST NOT</bcp14> use this profile.</t>
          <t>An example usage where this is useful is in services where the signed document is stored as an internal evidence record, such as when a Tax agency allows citizens to sign their tax declarations. This record is then pulled out and used only in case of a dispute where the identified signer challenges the signature. A revocation service is less likely to contribute to this process. If the challenge is successful, the signed document will be removed without affecting any other signed documents in the archive.</t>
        </section>
        <section anchor="ca-certificate-validity">
          <name>CA certificate validity</name>
          <t>Even if the end entity certificate has infinite validity, the capability to validate the certificate is limited to the capability to trust the CA. For initial validation, in a typical scenario, this is limited by the validity period of the CA certificate.</t>
          <t>However, a validation service may have several options available for how to handle CA trust, in particular when re-validating archived documents:</t>
          <ul spacing="normal">
            <li>
              <t>The verifier may list the CA key and identity as trusted and treat it as a trust anchor.</t>
            </li>
            <li>
              <t>The verifier may cross certify the CA and make it available for validation to a local trusted Trust Anchor.</t>
            </li>
          </ul>
          <t>In addition, when a certificate repository is available, renewal of the CA certificate can preserve the ability to validate the infinite validity end enitiy certificate.</t>
          <t>This profile assumes that initial validation of a signed document is performed within the validity period of the CA certificate. Realizing the full benefit of a non-expiring end entity certificate for later re-validation <bcp14>MAY</bcp14> require additional trust provisioning by the verifier.</t>
          <t>Mechanisms for establishing trust in a CA beyond their certificate validity period are outside the scope of this profile.</t>
        </section>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="certificate-content">
      <name>Certificate content</name>
      <t>Conforming certificates <bcp14>SHALL</bcp14> meet all requirements of this section.</t>
      <t>Certificates <bcp14>MUST</bcp14> indicate that a certificate has no well-defined expiration date by setting the notAfter field to the GeneralizedTime value 99991231235959Z, as defined in <xref target="RFC5280"/>.</t>
      <t>Certificates <bcp14>MUST</bcp14> include the id-ce-noRevAvail extension in compliance with <xref target="RFC9608"/>, indicating that this certificate is not supported by any revocation mechanism.</t>
      <t>Certificates <bcp14>MUST</bcp14> include the signedDocumentBinding extension, binding the certificate to a specific signed content.</t>
      <section anchor="the-signeddocumentbinding-extension">
        <name>The signedDocumentBinding extension</name>
        <t>The signedDocumentBinding extension binds a certificate to a specific signed content. When present, conforming CAs <bcp14>SHOULD</bcp14> mark this extension as non-critical.</t>
        <artwork><![CDATA[
name           id-pe-signedDocumentBinding
OID            { id-pe TBD }
syntax         SignedDocumentBinding
criticality    SHOULD be FALSE

SignedDocumentBinding ::= SEQUENCE {
dataTbsHash     OCTET STRING,
hashAlg         DigestAlgorithmIdentifier,
bindingType     UTF8String OPTIONAL }
]]></artwork>
        <t>The dataTbsHash field <bcp14>MUST</bcp14> contain a hash of the data to be signed.</t>
        <t>The hashAlg field <bcp14>MUST</bcp14> contain the AlgorithmIdentifier of the hash algorithm used to generate the dataTbsHash value.</t>
        <t>The bindingType field <bcp14>MAY</bcp14> contain an identifier that specifies how the data to be signed is derived from the digital object to be signed.</t>
        <t>Adding this extension to a certificate is a statement by the CA that the signing key is generated exclusively for the purpose of signing the document bound by this extension, and that the signing key is destroyed after signing. The details for this procedure and how the destruction of the signing key is assured <bcp14>SHOULD</bcp14> be outlined in the certificate policy <xref target="RFC3647"/> of the issued certificate.</t>
      </section>
      <section anchor="defined-bindingtype-identifiers">
        <name>Defined bindingType identifiers</name>
        <t>The bindingType field defines how the data to be signed (dataTbsHash) is derived from the signed document.
This field identifies a deterministic procedure for selecting the portion of the signed content that is included in the hash computation.
When the field is omitted, the rules for the default binding type apply.</t>
        <t>The purpose of the dataTbsHash value is to bind the certificate to the document being signed in order to prevent re-use of the signing key for multiple signed documents. This enforces the contract that the signing key is used only once for creation of one signature only. Validators <bcp14>SHOULD</bcp14> verify that the signed document matches the certificate’s binding information.
This verification is not required for the signature to validate successfully but provides an additional safeguard against misuse or substitution of certificates.</t>
        <t>This document defines a set of bindingType identifiers. Additional bindingType identifiers <bcp14>MAY</bcp14> be defined by future specifications.</t>
        <section anchor="default-binding">
          <name>Default Binding</name>
          <t>When the bindingType is absent, the default binding applies.
In this case, the dataTbsHash value is the hash of the exact data that is signed by the signature format in use.</t>
          <t>Examples include:</t>
          <ul spacing="normal">
            <li>
              <t>For XML Signatures <xref target="XMLDSIG11"/>, the hash of the SignedInfo element.</t>
            </li>
            <li>
              <t>For CMS Signatures <xref target="RFC5652"/>, the DER-encoded SignedAttributes structure.</t>
            </li>
            <li>
              <t>For other formats, the data structure input directly to the signature algorithm.</t>
            </li>
          </ul>
          <t>This bindingType <bcp14>MUST NOT</bcp14> be used when the data to be signed includes either the signer certificate itself or a hash of the signer certificate. This includes JWS and COSE signed documents that can include signer certificates in the protected header. JWS signatures <xref target="RFC7515"/> <bcp14>MUST</bcp14> use the "jws" bindingType and COSE signatures <xref target="RFC8152"/> <bcp14>MUST</bcp14> use the "cose" binding type.</t>
        </section>
        <section anchor="cades-binding">
          <name>CAdES Binding</name>
          <t>Identifier: "cades"</t>
          <t>For CMS <xref target="RFC5652"/> or ETSI CAdES <xref target="CADES"/> signatures incorporating SigningCertificate or SigningCertificateV2 attributes <xref target="RFC5035"/> in signedAttrs,
the dataTbsHash value is computed over the DER encoding of SignerInfo excluding any instances of SigningCertificate or SigningCertificateV2 attributes from the SignedAttributes set.</t>
          <t>This bindingType also applies to PDF <xref target="ISOPDF2"/> and ETSI PAdES <xref target="PADES"/> signed documents when applicable due to its use of CMS for signing.</t>
        </section>
        <section anchor="xades-binding">
          <name>XAdES Binding</name>
          <t>Identifier: "xades"</t>
          <t>For ETSI XML Advanced Electronic Signatures <xref target="XADES"/>, the dataTbsHash value is computed over the canonicalized SignedInfo element,
with any Reference elements whose Type attribute equals "http://uri.etsi.org/01903#SignedProperties" removed prior to hashing.
This ensures that the SignedProperties element, which may contain references to the signing certificate, does not create a circular dependency. Extraction of the Reference element <bcp14>MUST</bcp14> be done by removing only the characters from the leading &lt;Reference&gt; tag up to and including the ending &lt;/Reference&gt; tag, preserving all other bytes of SignedInfo unchanged, including any white space or line feeds.</t>
          <t>Note: This operation is purely textual and does not require XML parsing beyond locating the tag boundaries.</t>
        </section>
        <section anchor="jws-binding">
          <name>JWS Binding</name>
          <t>Identifier: "jws"</t>
          <t>For JSON Web Signatures (JWS) <xref target="RFC7515"/>, the dataTbsHash value is computed over the payload only.
The protected header and any unprotected header parameters <bcp14>MUST NOT</bcp14> be included in the hash calculation.</t>
          <t>This exclusion avoids circular dependencies where certificate data may appear in the protected header.</t>
        </section>
        <section anchor="cose-binding">
          <name>COSE Binding</name>
          <t>Identifier: "cose"</t>
          <t>For COSE signatures <xref target="RFC8152"/>, the dataTbsHash value is computed over the payload only.
The protected header and any unprotected header parameters <bcp14>MUST NOT</bcp14> be included in the hash calculation.</t>
          <t>This exclusion avoids circular dependencies where certificate data may appear in the protected header.</t>
        </section>
      </section>
    </section>
    <section anchor="asn1-module">
      <name>ASN.1 Module</name>
      <sourcecode markers="true"><![CDATA[
   SignedDocumentBindingExtn
     { iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) id-mod(0)
       id-mod-signedDocumentBinding(TBD) }

   DEFINITIONS IMPLICIT TAGS ::=
   BEGIN

   IMPORTS
     EXTENSION, id-pkix, id-pe
     FROM PKIX-CommonTypes-2009  -- RFC 5912
       { iso(1) identified-organization(3) dod(6) internet(1)
         security(5) mechanisms(5) pkix(7) id-mod(0)
         id-mod-pkixCommon-02(57) }

     DigestAlgorithmIdentifier
     FROM CryptographicMessageSyntax-2010 -- RFC 6268
       { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
         pkcs-9(9) smime(16) modules(0) id-mod-cms-2009(58) } ;

   -- signedDocumentBinding Certificate Extension

   ext-SignedDocumentBinding EXTENSION ::= {
     SYNTAX SignedDocumentBinding
     IDENTIFIED BY id-pe-signedDocumentBinding }

   SignedDocumentBinding ::= SEQUENCE {
     dataTbsHash     OCTET STRING,
     hashAlg         DigestAlgorithmIdentifier,
     bindingType     UTF8String OPTIONAL }

   -- signedDocumentBinding Certificate Extension OID

   id-pe-signedDocumentBinding OBJECT IDENTIFIER ::= { id-pe TBD }

   END
 ]]></sourcecode>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="certificates-without-revocation">
        <name>Certificates Without Revocation</name>
        <t>Certificates conforming to this profile include the id-ce-noRevAvail extension and therefore do not provide any revocation mechanism. Such certificates attest only to the state of trust and correctness of procedures at the time of issuance.</t>
        <t>The Security considerations in <xref target="RFC9608"/> also applies to this document.</t>
      </section>
      <section anchor="signed-document-binding">
        <name>Signed Document Binding</name>
        <t>The signedDocumentBinding extension binds the certificate to specific signed content by including a hash of the data to be signed. Verification of this binding is not required for successful cryptographic validation of the signature. A signature can therefore validate correctly even if the binding is not checked.</t>
        <t>However, a relying party <bcp14>SHOULD</bcp14> verify that the signed content matches the dataTbsHash value in the signedDocumentBinding extension. Performing this check ensures that the certificate is used only with the content for which it was issued and enforces the intended scope of the certificate.</t>
        <t>The security model of this profile states that the associated private key is generated for, and used in, exactly one signing operation and is then destroyed. This property holds independently of whether the binding is verified by the relying party. Nevertheless, failure to verify the binding weakens the protections provided by this profile and increases the risk of certificate substitution or unintended certificate reuse.</t>
        <t>When verified, the signedDocumentBinding extension provides an additional safeguard against the use of the certificate for any signature other than the one for which it was issued.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="registry-for-signeddocumentbinding-bindingtype-identifiers">
        <name>Registry for signedDocumentBinding bindingType Identifiers</name>
        <t>IANA is requested to create a new registry entitled: “Signed Document Binding Type Identifiers”</t>
        <t>This registry shall contain identifiers used in the bindingType field of the signedDocumentBinding certificate extension defined in this document.</t>
        <section anchor="registry-contents">
          <name>Registry Contents</name>
          <t>Each registry entry shall contain the following fields:</t>
          <ul spacing="normal">
            <li>
              <t>Identifier: A UTF-8 string identifying the binding type.</t>
            </li>
            <li>
              <t>Description: A brief description of how the dataTbsHash value is computed.</t>
            </li>
            <li>
              <t>Reference: A reference to the document that defines the binding type.</t>
            </li>
          </ul>
        </section>
        <section anchor="registration-policy">
          <name>Registration Policy</name>
          <t>The registration policy for this registry is Specification Required as defined in <xref target="RFC8174"/>.</t>
          <t>The designated expert(s) <bcp14>SHALL</bcp14> ensure that:</t>
          <ul spacing="normal">
            <li>
              <t>The binding type definition clearly specifies a deterministic and unambiguous procedure for computing the dataTbsHash value.</t>
            </li>
            <li>
              <t>The specification explains how circular dependencies with certificate inclusion are avoided, where applicable.</t>
            </li>
            <li>
              <t>The identifier is unique within the registry.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents">
          <name>Initial Registry Contents</name>
          <t>IANA is requested to populate the registry with the following initial values:</t>
          <ul spacing="normal">
            <li>
              <t>Identifier: (absent)</t>
            </li>
            <li>
              <t>Description: Default binding as defined in this document</t>
            </li>
            <li>
              <t>Reference: This document</t>
            </li>
            <li>
              <t>Identifier: cades</t>
            </li>
            <li>
              <t>Description: CMS/CAdES binding excluding SigningCertificate attributes</t>
            </li>
            <li>
              <t>Reference: This document</t>
            </li>
            <li>
              <t>Identifier: xades</t>
            </li>
            <li>
              <t>Description: XAdES binding excluding SignedProperties reference</t>
            </li>
            <li>
              <t>Reference: This document</t>
            </li>
            <li>
              <t>Identifier: jws</t>
            </li>
            <li>
              <t>Description: JWS payload-only binding</t>
            </li>
            <li>
              <t>Reference: This document</t>
            </li>
            <li>
              <t>Identifier: cose</t>
            </li>
            <li>
              <t>Description: COSE payload-only binding</t>
            </li>
            <li>
              <t>Reference: This document</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3647">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework</title>
            <author fullname="S. Chokhani" initials="S." surname="Chokhani"/>
            <author fullname="W. Ford" initials="W." surname="Ford"/>
            <author fullname="R. Sabett" initials="R." surname="Sabett"/>
            <author fullname="C. Merrill" initials="C." surname="Merrill"/>
            <author fullname="S. Wu" initials="S." surname="Wu"/>
            <date month="November" year="2003"/>
            <abstract>
              <t>This document presents a framework to assist the writers of certificate policies or certification practice statements for participants within public key infrastructures, such as certification authorities, policy authorities, and communities of interest that wish to rely on certificates. In particular, the framework provides a comprehensive list of topics that potentially (at the writer's discretion) need to be covered in a certificate policy or a certification practice statement. This document supersedes RFC 2527.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3647"/>
          <seriesInfo name="DOI" value="10.17487/RFC3647"/>
        </reference>
        <reference anchor="RFC5035">
          <front>
            <title>Enhanced Security Services (ESS) Update: Adding CertID Algorithm Agility</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>In the original Enhanced Security Services for S/MIME document (RFC 2634), a structure for cryptographically linking the certificate to be used in validation with the signature was introduced; this structure was hardwired to use SHA-1. This document allows for the structure to have algorithm agility and defines a new attribute for this purpose. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5035"/>
          <seriesInfo name="DOI" value="10.17487/RFC5035"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC8152">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8152"/>
          <seriesInfo name="DOI" value="10.17487/RFC8152"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9608">
          <front>
            <title>No Revocation Available for X.509 Public Key Certificates</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="T. Okubo" initials="T." surname="Okubo"/>
            <author fullname="J. Mandel" initials="J." surname="Mandel"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>X.509v3 public key certificates are profiled in RFC 5280. Short-lived certificates are seeing greater use in the Internet. The Certification Authority (CA) that issues these short-lived certificates do not publish revocation information because the certificate lifespan that is shorter than the time needed to detect, report, and distribute revocation information. Some long-lived X.509v3 public key certificates never expire, and they are never revoked. This specification defines the noRevAvail certificate extension so that a relying party can readily determine that the CA does not publish revocation information for the certificate, and it updates the certification path validation algorithm defined in RFC 5280 so that revocation checking is skipped when the noRevAvail certificate extension is present.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9608"/>
          <seriesInfo name="DOI" value="10.17487/RFC9608"/>
        </reference>
        <reference anchor="XMLDSIG11">
          <front>
            <title>XML Signature Syntax and Processing Version 1.1</title>
            <author initials="D." surname="Eastlake" fullname="Donald Eastlake">
              <organization/>
            </author>
            <author initials="J." surname="Reagle" fullname="Joseph Reagle">
              <organization/>
            </author>
            <author initials="D." surname="Solo" fullname="David Solo">
              <organization/>
            </author>
            <author initials="F." surname="Hirsch" fullname="Frederick Hirsch">
              <organization/>
            </author>
            <author initials="M." surname="Nystrom" fullname="Magnus Nystrom">
              <organization/>
            </author>
            <author initials="T." surname="Roessler" fullname="Thomas Roessler">
              <organization/>
            </author>
            <author initials="K." surname="Yiu" fullname="Kelvin Yiu">
              <organization/>
            </author>
            <date year="2013" month="April" day="11"/>
          </front>
          <seriesInfo name="W3C" value="Proposed Recommendation"/>
        </reference>
        <reference anchor="ISOPDF2">
          <front>
            <title>Document management -- Portable document format -- Part 2: PDF 2.0</title>
            <author>
              <organization>ISO</organization>
            </author>
            <date year="2017" month="July"/>
          </front>
          <seriesInfo name="ISO" value="32000-2"/>
        </reference>
        <reference anchor="XADES">
          <front>
            <title>Electronic Signatures and Infrastructures (ESI); XAdES digital signatures; Part 1: Building blocks and XAdES baseline signatures</title>
            <author>
              <organization>ETSI</organization>
            </author>
            <date year="2024" month="July"/>
          </front>
          <seriesInfo name="ETSI" value="EN 319 132-1 v1.3.1"/>
        </reference>
        <reference anchor="PADES">
          <front>
            <title>Electronic Signatures and Infrastructures (ESI); PAdES digital signatures; Part 1: Building blocks and PAdES baseline signatures</title>
            <author>
              <organization>ETSI</organization>
            </author>
            <date year="2024" month="January"/>
          </front>
          <seriesInfo name="ETSI" value="EN 319 142-1 v1.2.1"/>
        </reference>
        <reference anchor="CADES">
          <front>
            <title>Electronic Signatures and Infrastructures (ESI); CAdES digital signatures; Part 1: Building blocks and CAdES baseline signatures</title>
            <author>
              <organization>ETSI</organization>
            </author>
            <date year="2021" month="October"/>
          </front>
          <seriesInfo name="ETSI" value="EN 319 122-1 v1.2.1"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9321">
          <front>
            <title>Signature Validation Token</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="October" year="2022"/>
            <abstract>
              <t>Electronic signatures have a limited lifespan with respect to the time period that they can be validated and determined to be authentic. The Signature Validation Token (SVT) defined in this specification provides evidence that asserts the validity of an electronic signature. The SVT is provided by a trusted authority, which asserts that a particular signature was successfully validated according to defined procedures at a certain time. Any future validation of that electronic signature can be satisfied by validating the SVT without any need to also validate the original electronic signature or the associated digital certificates. The SVT supports electronic signatures in Cryptographic Message Syntax (CMS), XML, PDF, and JSON documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9321"/>
          <seriesInfo name="DOI" value="10.17487/RFC9321"/>
        </reference>
      </references>
    </references>
    <?line 398?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+076XLjRnr/+RQduWpLSpE0Sc0ljde7HJFj0x4dEWnPOKn8
aAJNsi0Q4KIBaeipqfJrpCqpyrPkUfwk+Y7uRgMk5RnHP6Pa9ZBEH999o9Pp
tApdJOpcHF2nSkz1MpVFmStxofJCL3QkC2WOWnI+z9U9LppeHLX0JoePRV6a
YtDrnfUGRy1ct8zy7bkwRdzK1SaRkTLnIs7lougYmcIxJks7Wao6xl3SieAS
02rFWZTKtXKrtSoWnUSuN2bf8k6v1zLlfK2N0VlabDewbzKevRbiCyETkwFk
Oo3VRsF/0uKoLY5UrIss1zLBL5PhK/gny+HT7ez1USsGwM/FoDd41ukNOoNn
rShLjUpNCcADhqoFWJ+24OhcyXMxVVGZ62LbelieizfDy5tp605tH7I8Pm+J
jogqouFXDzl+edd92jtr3au0VLBWLHWxKucALCP6sPzyU5A/arVkWayyHI/o
wP+F0ClAOu2KqaMx/cr0nBZqIdPGoywH2CcjoyIxzZKyACoaMXxFzxyfG4/p
mSlypYpz8TrLzV2q06WZb1MxiZU9NwK6AFHKNOavWYxSNRiciue9I/tTmRYo
I9MxfVdrqROUGPN3KWUHruxG2dpjxjjclsaIb7PSJGpbIXzbrf1GOP2olzrx
LGqLN28uakjVnwcwf6vyNM7StvhxWIfzh2kI54ov/Ps9nuOAbaVZvpaFvieu
3r6+GPT7Z/bj6bMnz+3Hp73Tp+7j4EXPfXz2dGA/Pn/adwte9P2vL/rPn9iP
Z896L/Dju8s3o+nkm37/nGBz2gs/B9o73aaFfC9kGoubPANNNMAv8aPKUWdE
v9tnhlSyhH8d+68l8agrxtIUibxT/gGzZJSlMombTxvbv+uKWyWXSXPzd5lR
m1X92e7NIHpZ81Z5r+PwQWPXaxAJnZto1dj3OlexynV0V3/c2H3ZFVdbEHGS
v3D7pVympWk8bGyeAa4ZEDlReWP3bJWtpWk+bWz/vit+0mVj5/cqudepf+Ds
VP+003vS6fdZJQEvBaxdZI6HR29PL45AHIDrGyB0DHQGKV2DMZSoycj2yfT6
ZvR6UBefURaVsKoQa5nKpaKPnY64yfJCzhMlYvd8QeJOz2ReiMG5gMPEoNvb
J1FsaqbXdQyed3rPD4EPixH8U/Arvc4Az3w3HI2ndWDHiYqAGamOKpE3JOyT
dJGDVOZlxL8dj6eTk5dwRjyeihj0tpBJZZbNS0aify5elTqJUUfmSRbd8WG8
ay6NSjT4xmrbQVTHs+mkhuvgySO44mpEdnwlTvtnon866PTFfb97yup58ycg
fvOHEL/5cxA/KKNNxJ9YxAeM+MWfgPjFH0L84k9AvN/p9z4V8UGIeAuX1n3J
2ekAzHyrA9om54CkjIpWa7bSptLHWC0AVABfbPJsoUFV4ZAwEDGiWIHCQvwi
IGQqwSTggnuZaDYJIlvACrVLKzwwLiPYMN/C8ehBEqYJUi3bqJz2o5eIVuGN
cI+IIFwqYCvcjIcXeq3wIrcbiT0HLxuLIqMF+ACWQ/BVAFZdsJtKSAhZIk3H
uH0QbOHpS5Xi7SpuixKNHBxiga0A3cGnTbfCZanQYBFjPDnZAgHRsG9VzJeG
eKTqXuVCvd9oJ21wN/8IAUV2h/c/rDRgb/R6k8A2WJZk6bJTqHwd0LjLPFzr
OAafB9HkBOILhBcfIkeVSOB4E8kNk0nlcEkHBbHCHX/U4MrFChxKtJLpEh5m
CAyxT0USUEGnGwEFE4h/IH4UGB87wjNX7TF0ylJqpPpC3mc5oqLgueMGXrnJ
9T0SAsluieefhYRC4XIcR+lSKBF7GAA8WxG8EJRCSFtSVAIcK4BKkb8lPJnw
g9XqfYEBfcySBLKnsxioOs3gG1xsMIZ9WG3haGDRQaSZdnMFImDKCMOiRZkg
9KhkO+x/0Ak8TB7kFvfdK9IxkJuIXSKxF+JHBmkBwcE+UX9pD25qAEpxKXOM
zFnDisbtpKxkVtwRGhMavNAbCtBeCBGaOyOg1xygjeWmUDUNI76hir0v8NBb
EOLIG4E9jDUI5gbNDnxNQFlSSOHUe20KNj1mo+E+CBm2YqtkbvAYbxiIl2ug
ISUYITvACsMzi9UeycySGPQMdRoSIEjdAAlQ8xwFxIiGdQMheLtCs/c454XJ
knvAh2AFWwEMXJu20AUIH7LZlIsFRMcVGyFq2iSAKpA7kmRkgEdkCkgX99Cq
KzCDNjZnYrIT+egypCSeW8XoP1YmeAa2JBXH0x9nJ+LDB2v4P350KrkoaUNg
syNSIGAIkhnpdK8hOQmFOlgcal3wM1sXPGCJqMCvstv0LgWE94bxQGsCfN8A
NDmdh+wFocgeTHgquprU6oSVTQu+ZNuI/1LpwD2+GO6TXrDKoGXarBTq+Rdf
iFfSgI1YKJagVus6dNB1oSVlpZszhI+lfr1Guq0kSjOYD2B7ZJzab2um/qX7
Ec1azdzXnnj/BQZsoyK8vSKcdWSBoG/RnwGU7I5ZxHLAZJOlcdPWPgCNvF+q
eSu5AOCd+BFhvgjUGNiXS7BJGhO0A0EA2V3vOZBNRC5SjESBydZrBMMZVTTn
ub+gjSK2QhZqjhpCqDUyGPiKGgraA5qkDbtVDAiArYmSRLBE5ksQZ9CUtSLL
UF1QiSFwDzhVUctAVuSuIQTWTs4M8g2SHVYwXIJA42dg8x1dAHCBtpcpR3D6
F7IokOdQJQhWLiDkeIuRAR2azX+GcNMQuWxg8qCLVQVGgHXbX4T3ECAk7NZb
puV6DnSGRxIMTORiGfjHiQpgs0ElrUigU/SlgA9CnIA+ow0Bq5pYdAu53mBo
BVf4B8BMDD9iMocqpTCoFjIxz1MyGZFqM113wEavhH4cloHVxeCPoyawk5Xn
XGUPKe9fI7uJkETlGJ0jBQEBgUzTp5NpR0tAevWPUpNQOuwt79EokI0DcUax
L2CfFQZJh0HkgtgDhAg3KgwrO/IKCdB0iriC49+uGGK4vMYziTObLNGRZWTN
AxeQByyQJjK1EDCDvExe3HDacDNls40Fn48fxQMZbQdOZZQBEQ9bZboQMhs8
dWtlVxevywgsBdmIwKcs2OfBTSDsijnrqMQO38cnjRgcT5VpxDJqpaQemkmg
O9gedPv3iqIz1TwkiG1Zvx1I8FGnNlZjNQTNFHID4TEz2Pg4Ex2NisAY+BDE
gwyPwL2pewiPCEyQXqAfyMYwPIhl2IpQEVi+QJmilYruiHa4GKC8hzCKLcXv
ICYuf5jOxNX1DG+v0R3hwJBUYojA8h8ixdqGTpiIUQWf9QA7sAG40AY6kqQN
SZgjJgrBRWblCoWgsr8PrOUzrPJBOhRtnS+OgAi/KKRORtfgfRr4AAsDahvL
Nj7WBiegUSCkaCdKT3ZrNDTGHIYoJCGyN5uyUAE+HJqiAWLUcvS0cFS6dLR2
4g7aF7LHhWfoO9DSJfoO3RzAjh4013O8JxB71KSumLDz8XcQ/byatfeSmKL5
ORJyDa6PLTrhSXaZk1IwjqQFOybahioyj1agEtbvNgIXJ7yt1vgec0yGETRB
2LA9XIzWFMJ4nepgpzVBciPnOqHMInPyqPbkB0CstQ4i/PpGjrE4wOpi0V7g
ZVqGoWEbEZMYNWN8LwxkjhIyq7aXY3eDzU+8fnIC5koHdUIAdb4FwwceCXxH
qE+O12u55ZjD4CK4N9uwPst7qRPKrdBygJtBPMAgQdKMdxBGBPJGwm1RCcLM
egAxjbsH+chcCvjn0zvrJnOCAaJLRyCfe/ocy0Wp1tEWaKDRDaJ+WtqCEYVg
orvv6CiHgMMSZevuoHwIAmo6poZqQCSKJ5MM2eHun9FtQ3tbawIsi9nUtZ0Z
CAUjV+DMseNFZtRfBCZepeoByb2Pa+RuIZGg0gML+wEh3BFbK+MA0bYhBzXP
AOEvxXtkiHdlkU3LHsMIsobprlVZq4mfJonYZUj0L2z+MREhE5CqBXCAruN8
1iZ1B1QVGZTIgqKVTugehj955+MY4rjGjgabLVRhtNpjJQQIc6mwgKPNmgNs
n+wQpC45kojOXG0zjiV1vtfcOApgsAr2zIAEs/2LMs6FG54L7FaW3iOepHJw
9kgRQ6nRR8EXpSDgFow4Qh+IbVPnC/Hz7fhffpjcjkf4efrt8M0b/6FlV0y/
vf7hzaj6VO28uL68HF+NeDP61tpPrSMg6hGHnEfXN7PJ9dXwzRFb3zAtRVxB
LOeKHSWILempaYFrj8BpYNKUilcXN//z3/0nEJr9k+3LQWzGX7CvhoEaaA/f
Rk6OvwLxti0IWJTMiQsgM2BZsZQFATmoP8e/6PqAmv/8b0iZfz8XX82jTf/J
1/YHRLj2o6NZ7Uei2e4vO5uZiHt+2nONp2bt9wal6/AOf6p9d3QPfvzqb1QP
7/Rf/O3rVotkKLQcnOu2WiBYqKk7RSTGaq1UQdS0SsOe1QmoUZEN/2shMBFT
p5xXhPF/6Eghn3hQSdLhWnjMabxPJxXqn1FF4cxAmhVDSqNBGRPvPb+hmnKC
ueEMY0HQr1KJM/jrD07hf0/Pnp79KwmAuwaEg6J+bOh+/HgA8igpYxcjdSLV
STNI14dolLmmaWwRj+pNmuJyyjW5DPSs9wLLQJYAPowlijWCAcAKYqDNJsut
w8ZwJoi01s7k/C6gbINdR/CV5vqEh7Yt5vanZkhSr4U0SvpUxJn9/vFsgn5n
EYFgGqLw6PWc3pODSyGIiCpRvRiihJI6rWV+x8StbiL5SjtgVqgICnj44QRR
/QFzNzytsQM1Lb+ejILV4gNvELNXI/GRu0XcsXd/04MnOUDQ9ONChhxM4evh
m+mYgdu7W5yf/1VMwQ6Nry7G4oPrWsnZ3HwrzYquvb6YjWdiOrudXH3TphWg
X6thsvSAjTSE9AX8kgEcq/XEBf45L7eiMcM6LP79MHv9YlqQe3V2BRBmHoeX
syqSKCLHJLk/vNu3p2CxtflMZVsocPDtOQC37QHUnUinS/fcN5Jcb8nf6kAk
g2BvDdG0N0M04CFPq4QoZ421YonFSQxr9yEkKB/OKXL1ZWjXROGSVJMAw9jq
YU1iSQ8a1oGbLNzXn/uItCquHeivwalgFwzAlFRVtU2ZY7kt7BkQqM47c2F0
vm3A5fpv+6+syp31EieZjFgBXRNjIXCZYOwKbZ6kihvBQVezcQvGoJhlV1oD
IVPirHnTnnFhqFbascfaykw92gX7NrKuIZSPShTMIeFxTdzDsnEcSOLJXklp
RM5dDr75fA8CCgIQU6HloxJ4QEkkrlGJTYaJ0eBLGrSsLKqN441zHZ6CpFfo
zsrCVvTeuqKXhQa8PqSV1L6l4mkJqb+XLqCFLJOicjJIJqwfba3uBeK3V0Wp
mJHR/n0eqi6qynVzGH4IelFjqfWEMbKtlu+TJoR3DYDqTbJDfFddUehkIlsC
oYJGvaT9WImW+/iYdloWZLWGB67ruh5SlnsXRknGtn5HmFCtZRGtHEQVZX77
9T+MJ3nQX7RixKmLq09zsGHDuNhzrgIuTBlr5c95GdTgZBrmTUYuFHZEwQBg
WxpSoLU2RHsQy3IOwlqUjhSNBuChiQgI+nD1AWXsimF1+4E1ZNbnyod8YNRs
N8vFGbaaxhWhkZVd568rya+db3Cag8KQfQJPtVLEa2LTHiy8tR+RdadzVkjV
exQyNiFWRa0QWMNf8ckOc4HgA6EBhzGXNL1OU90ES0e16UIDFtFPIWJ42oSA
w48JSJEAe8LWiM+5uJzWz7FDkO6U0fi2o1IcHY3tKcPCVgGxQmqnfNxpXKxj
JExFoWoh4AFWCJxoDlaNy4p1Anj376Qo5JOv/84V66Yv3u/x3UwwUHlt6+jK
V0J3WwoAez262V1qLYg/97u3U+41XE/Hu/VJYnREhWOO43cP9EVM0L+CO1Er
JcHcdels0+AKzqOCvyMacP1biaOfH8xRjUQ1iMLtOMO6sz0Cs31UM+y+kopz
V15rqljtHDbhWMtRq+XEJ5AZpCOOVNn9Hz7Q5Bj8HkADBMnAX+ScPU3Z4obZ
K5yx++uPA2ymOMHjK3unSBCs53vBNO3WQbVkDxiO6IBwCxJump9asIDnrCYY
ZsWuCI3WDzNB41Z9Psg+LNjVIlXsE3YcnXemB0Ubpzo/fLCzooA3cppofWNp
fRPQuiaLXJLkPg2NjpbkEHRBHg5RQjZStFFrY797RAjeB0JAUKBBGsb3SCWA
a+90IBgpBvER27nLJFAiPIgLAXssWbtF6Tmy6VYtVE7NGfsMccfIhAnqSC7A
TwJ1xdGqKDbnX35Z5rqrCqO7Wb78stc/651+wdfcUDO3AAYc+S7FJtdZzmVw
qg5af4wvKOSullqxuTrBg2sH1KgobdOT3MFtdmaDKnFqA0cVO3puTmJOoXMu
urvXKyIIQcbvKaoJ4sQdurAZQDeKMcx8y9iRFmC0Y1s5PJgRiC6OC+CivyTF
S3/mX5bFS1HIpSg3lOikzva6oFWlftOXO7varsRNqpYk1oXMt0WlbJbfZWpn
7NrBBch2ICiGNRsZkSZSZWyhVIxBwFVW0NA3hrh+DgrzlZKmdXDwCmSBoPbk
dTVkFOmNzGkmzlZ9k8xXfRQhTamVzCk8IKVB071fZdBWs8J8N72+Em/VPFSO
Y9h4Elr6z1KSjdwmmeRgtctBecOp8HQQUKtMdx4BknKtiNehi92fR8gERc5P
BlBCSSkplmbuMx2bPWKpfbM1dL7ktVERquLuXn9ofRK6tQMuCf2Y9UiHnd//
UzSkqBhOr7p9cZnFJY7AYm3oq4vrEZB4/M3kavp167HCF9iY1L8egcUzkx33
T4KucwdsqUz1L4TW8ekJaFd8/OzE9tFVAaur/Tiaze8AHT89qeqiBr9t7vT7
4+d4dGcNR/Rq2/jH/VW+49mr0QmWtlydbPx6cjXBitdUTC5v3kwuJjMxG34z
xTKcW0S4+y2w7Pp2Nq1uHL+bja+mcESbyoUAGn+oXqkRr2+vL8XN95N3nQua
cEPXYzr4Vp7AdzRAGMXTs/4gxOL/Tr4/TEBPQlzFAHd6g+Onz0PKPVJjbOB9
kW83RbbM5QZ83CUkmXKp+M0noEC/5wjwbPDsxV4CrBUOZ3XmWbw9HpxAdHL8
4knvRORGxkYf9/unT5+cIUaR2SEA/tg5O4bHZq3X6rgP1FqTbBvA2aEZrZkX
x09fAIbipcex0zlQ4Q7DvHFVErfbwH109td2vahQlfdDBez0p6vZ8N0j9WQW
vdH4ajZ5PRmPxKufHitmB3z65CIz/f1+pZn+PrPcTH+fWHP+Q6THwr3f+hhd
rl99N76YVYS8ZUbU6vzunPHViD+yBYSvYP/ARLpXE7FDi31cO6pDlcVay+at
nV0JJz9rC4L2RnNm7BNbUnaA0Y6XxRmFKrZ0c7i1JKZl/V0Q44bSONKz4SYN
XmG0aOcoYp6FjYoUZ4BwJM9VJc2h6TVbDPQki2ok87057qDtZDe1djKXblmc
hX8Rzrv+T29H7ak2HmhHYRAcRJW/0+nAFzer8pvrmPpq3Z5yXDAIHoVGcs97
P7XJrGCgWqYB/301z/IJeKmCIacGKDRzRw2KYBAIA2Cac5Y5sOvxaqWjUlis
3BNIpcGeg7zpihseIPGdEgJvN4VqdEyqaqyf/XVgIYU5rdJFMFhKglwr+fpJ
yGAYQ+3MyCjvTtGFqKQ5tMH6EkAavBjVmL+uGjcLfKPHz/DptM11QSou73mL
y73dVGDyXnslSrvxYwCP38wIXq/H4xYYGPqiVyAKbibZ1R1rEtAVVygZ8DvO
/bXFAsyPKx07oahOe1DyjmYaq+iS1NwapKrb5IeNOC/kOWq+3c46h2yu15Vz
CK09x+oTVVwepWquw6r9KcL36cVuPCzoNDQHkNDiBsX/ws/q4mLk6AGZpNB7
Mrwa7vMpt2qpgdNbX4zZxST0rZOwkUVn0gDpP0pl7BSirxSk6gGe2NNppipR
8bn47df/PGBmRfOG3379L5ud+HPMimZxbBUjrNJbGd+ptHO/qda+aiIYErpi
WzDisesqAsJdsEUAetBLkCHKOwBTA8y/kEKg8WBimFsOMXrpvMASNmkRP9q6
GkC9dtoRI5p3ovFJ3DvPtcIxfP8j4h42FQ9mol16HcxWS85pRtcVcZo9MzJD
rsmyC1RIIDYtN9RGZUuXhw9sf9V3dT354PM07K/Aeda57Rm/4Vkua0kBd9IS
ngIC3h6bEzt/xAafwPfzoLUmY+zn4ESUQDoLxq1q2zf7pmRaU7me62WJr17V
+6hMVt8Z350isO++1ZAEgBM0BsSxAyk4uqKao0p96o7tDEzf+a1UTNWrImy3
9gohjSWgi0s1KG84Vuk4YNk4sVOae+R9r/5vsg2WFlTtrMp/VtIfjH/C7h0t
OOb+2ElTwkfNVpk5qKl1ea51CJu3UYehedXF5fRL+zq4N+ouXttTkq9K759x
8ft9F7975NJahddr6Gfc+PPDzn1YQbTVpw6FO/bqzyFgZtQO/bAw9vnnQnY2
l9EdFYyiuzR7AL+xpNp668M5v0yl4r8eLSCgV0eQUc2uR9dC+pUg6P8LyeOO
BtNIAAA=

-->

</rfc>
