<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.12 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>
<?rfc toc_levels="4"?>

<rfc ipr="trust200902" docName="draft-moran-iot-nets-00" category="info">

  <front>
    <title abbrev="IoT networking security guidelines">A summary of security-enabling technologies for IoT devices</title>

    <author initials="B." surname="Moran" fullname="Brendan Moran">
      <organization>Arm Limited</organization>
      <address>
        <email>Brendan.Moran@arm.com</email>
      </address>
    </author>

    <date year="2021" month="July" day="12"/>

    <area>Security</area>
    <workgroup>IOTOPS</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>The IETF regularly develops new technologies. Sometimes there are several standards that can be combined to become vastly more than the sum of their parts. Right now, there are six technologies either recently adopted or poised for adoption that create such a cluster. Combining secure onboarding, remote attestation, secure update, software bill-of-materials/expected attestation, automated network policy enforcement, and trusted execution environment provisioning, devices can be defended from many threats. This is an opportunity for an inflection point for more secure and trustworthy devices. Simultaneous adoption of two or more of these six standards could create the foundation of computing devices that are worth trusting.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>IoT devices (unattended devices with network connections) are often considered a weak point in networks and have often been used by malicious parties to extract information, serve as relays, or mount attacks. Appropriate use of security technologies can mitigate this trend and enable users allow for security polices that do not have to be overly protective of IoT systems and enable them to add the full potential of value they were designed to add.</t>

<t>This draft addresses six trustworthiness problems in IoT devices and proposes solutions to them with six technologies. The problems are:</t>

<t><list style="numbers">
  <t>What software is my device running?</t>
  <t>How should my device connect to a network?</t>
  <t>With which systems should my device communicate?</t>
  <t>What is the provenance of my device’s software?</t>
  <t>Who is authorised to initiate a software update and under what circumstances?</t>
  <t>How should my device update its trusted software?</t>
</list></t>

<t>Each of these questions is answered by recently developed or developing standards.</t>

</section>
<section anchor="barriers-to-iot-adoption" title="Barriers to IoT Adoption">

<t>IoT adoption is generally presented as a platform problem or a data acquisition and analysis problem. The result is a proliferation of communication formats, radio standards, network technologies, operating systems, data gathering schemes, etc. Despite this effort, IoT is not growing at the projected rates.</t>

<t>IoT is not simply a combination of a device platform and a data-gathering platform. In the life-cycle of devices, they must be commissioned and onboarded. When a flaw is discovered, they must be updated to restore trustworthiness and there must be evidence that they are effectively trustworthy (e.g. running the intended/expected software). Acknowledging the chance of security breaches, network infrastructure must be configured to allow access to necessary services and restrict access to everything else.</t>

<t>Commissioning, onboarding, attestation, update, and access control are complex core technologies that are difficult to implement well. This can be seen with the plethora of poorly implemented IoT devices that have been reported in the news whenever a defect is found.</t>

<t>IoT adoption is hampered by a lack of core technologies surrounding the development of trustworthy devices and device trustworthiness. These core technologies do not present obvious revenue streams and they require cooperation between many vendors for them to succeed, which may explain the low rate of innovation in this space.</t>

<t>To reduce this barrier to entry, the IETF has been investing in these core technologies.</t>

</section>
<section anchor="foundations-of-trustworthy-iot" title="Foundations of Trustworthy IoT">

<t>IoT devices can bring a lot of value to businesses and individuals, but they are also difficult to manage because of their diversity, difficulty in auditing, maintenance, onboarding practices, and lack of visibility about device security posture and device software.</t>

<t>Initiatives such as PSA Certified focus on device level security principles and encourage the use of a hardware Root of Trust (RoT) that provides a source of confidentiality and integrity for IoT systems.   The security principles led security requirements of PSA Certified Level 1 cover topics such as trusted boot, validating updates, attestation and secure communications. Complementary to this, IETF provides standards that can be used to create secure networks; this memo focuses on six standards that can beneficially be used together at the network level.</t>

<t>Building trustworthy IoT is about more than just building devices conforming to best-practice security. Users, Owners, Operators, and Vendors must be able to respond when a compromise occurs. Responding to compromised IoT consists of three key points:</t>

<t><list style="numbers">
  <t>Detecting a compromise</t>
  <t>Halting malicious activity</t>
  <t>Remedying vulnerabilities and flawed software.</t>
</list></t>

<t>Once a compromise has been detected, the affected device needs to be quarantined from the network, then security patches must be applied.</t>

<section anchor="detecting-a-compromise" title="Detecting a Compromise">

<t>There are two broadly applicable ways to remotely detect a compromised IoT device:</t>

<t><list style="numbers">
  <t>Detect anomalous software on the device.</t>
  <t>Detect anomalous network traffic from the device.</t>
</list></t>

<t>Detecting anomalous software on the device requires remote attestation of software measurements; the report of what software the device is running must be trustworthy even if the software is not. However, attestation is an incomplete solution if the recipient of attestation evidence does not know what to expect. Hence, trustworthy and authortative sources with understanding of what is to be expected are required. Furthermore, automated systems for delivering these expected values must be very secure or else they will become targets for threat actors as well.</t>

<t>Detecting anomalous traffic from the device requires a baseline of expected traffic; otherwise, network infrastructure cannot know what traffic is legitimate and what is not. This expected traffic information needs to be closely associated with each individual device, since network traffic patterns may shift from device to device or version to version. These trustworthy and authoritative sources of patterns must also be protected: a compromised device could report an incorrect expected network traffic pattern, or a threat actor could modify an expected network traffic pattern.</t>

</section>
<section anchor="halting-malicious-activity" title="Halting Malicious Activity">

<t>Halting malicious activity is done by network infrastructure. A Network Access Control (NAC) system, such as a router, gateway, firewall, or L3 managed switch, can apply a network access policy on a per-device basis. The NAC system uses a policy that is provided to it in advance in order to determine the access requirements of each connected autonomous device. Assuming that these policies are constructed according to the principle of least privilege, This allows the NAC system to drop any communication that does not match the defined policies, effectively eliminating the use of IoT devices as relays, proxies, or mechanism to pivot in a network. It may even prevent compromises before they occur because inbound traffic to IoT devices that does not conform to policy can be discarded.</t>

<t>For shared media, such as radio protocols, intra-LAN policies cannot be preemptively effectively enforced, but they can be monitored and enforced after violation, for example by removing network access rights. Per-device Internet-to-LAN policies and LAN-to-Internet policies can still be applied as normal.</t>

</section>
<section anchor="remedying-vulnerabilities" title="Remedying Vulnerabilities">

<t>Remedying vulnerabilities requires a remote update system. Where there are secure components that are independently updatable, additional considerations are required. In both cases, the new software must be signed, but that alone is insufficient: new software must be authenticated against a known, authorized party. It must also come with a statement of provenance: a software bill of materials or SBoM. This statement must describe all the components of the software along with defining the authorship of the software, which may be separate from the authority to install that software on a given device.</t>

</section>
</section>
<section anchor="baseline-requirements-for-secure-networks" title="Baseline Requirements for Secure Networks">

<t>To establish a trustworthy IoT network, devices MUST be able to prove:</t>

<t><list style="numbers">
  <t>What software they are running and, by extension:
  <list style="numbers">
      <t>The provenance of the software.</t>
      <t>(Optionally) that it has been checked for common malware, backdoors, etc.</t>
    </list></t>
  <t>Who they will connect to or exchange data with so that anomalies can be registered.</t>
</list></t>

<t>To install and maintain IoT devices, authorized entities MUST be able to:</t>

<t><list style="numbers">
  <t>Connect a device to a secure network.</t>
  <t>Initiate an update of a device.</t>
  <t>(Optionally) Add or remove authorized entities from the device.</t>
  <t>(Optionally) Deploy and remove protected assets to and from the device.</t>
</list></t>

<t>Each of these requirements stops a particular avenue of attack against device, networks, or data collection systems.</t>

</section>
<section anchor="iot-technologies-for-secure-networks" title="IoT Technologies for Secure Networks">

<t>Assembling the foundations of trustworthy IoT and the baseline requirements for secure networks, the result is a set of requirements, described here with enabling standards:</t>

<t><list style="numbers">
  <t>To deploy new keys into a device and connect it to a network, devices SHOULD support a secure onboarding protocol such as FIDO Device Onboarding <xref target="FDO"/> or LwM2M Bootstrap (<xref target="LwM2M"/>).</t>
  <t>To enable devices to report their current software version and related data securely, devices SHOULD support a support a mechanism of performing attestation measurements in a trustworthy way and a Remote Attestation protocol, such as <xref target="I-D.ietf-rats-eat"/>.</t>
  <t>To enable devices to be updated securely in the field, they SHOULD support a remote update protocol such as <xref target="I-D.ietf-suit-manifest"/>.</t>
  <t>To prove the provenance of a firmware update, update manifests SHOULD include (directly, or by secure reference) a Software Identifier or Software Bill of Materials, such as <xref target="I-D.ietf-sacm-coswid"/>.</t>
  <t>To enable a Relying Party of the Remote Attestation to correctly evaluate the Attestation Report, the SBoM (such as <xref target="I-D.ietf-sacm-coswid"/>) SHOULD contain expected values for the Attestation Report.</t>
  <t>To ensure that network infrastructure is configured discern the difference between authentic traffic and anomalous traffic, network infrastructure SHOULD contain a <xref target="RFC8520"/> Manufacturer Usage Description (MUD) Controller which accepts MUD files in order to automatically program rules into the network infrastructure.</t>
  <t>In order for network infrastructure to be configured in advance of any changes to devices, MUD files SHOULD be transported (directly or by secure reference) within update manifests.</t>
  <t>To enable rapid response to evolving threats, the MUD controller SHOULD also support dynamic update of MUD files.</t>
  <t>Network infrastructure SHOULD apply risk management policy to devices that attest non-compliant configuration. For example, a device with out-of-date firmware may only be permitted to access the update system.</t>
</list></t>

<section anchor="trust-relationships-in-secure-iot-networks" title="Trust Relationships in Secure IoT Networks">

<t><xref target="FDO"/> and <xref target="LwM2M"/> enable the installation of trust anchors in IoT devices. These enable the services to ascertain that the devices are not counterfeit. They also enable the devices to trust that the services are not on-path attackers.</t>

<t>The combination of SUIT, CoSWID and RATS Attestation secures these trust relationships further. A device operator receives a SUIT manifest, that contains a CoSWID. They apply the SUIT manifest to a device. The newly updated device then attests its software version (one or more digests) to the device operator’s infrastructure. The device operator can then automatically compare the attestation evidence to the CoSWID.</t>

<t>The device operator can trust that expected values are correct because they are signed by the software author. The device operator can trust that the attestation report is correct because it is signed by the verifier and, finally, the device operator can trust the device because its attestation evidence content matches its CoSWID.</t>

<t>To extend this relationship to Trusted Applications (TAs) as well, devices that support TAs can also implement <xref target="I-D.ietf-teep-architecture"/>.</t>

<t>Adding MUD to the combination above cements the established trust with enforcement. The network operator also receives the SUIT manifest for the device. The manifest contains a MUD file in addition to the above. The device does not need to report a MUD URI as described in <xref target="RFC8520"/>–which stops the device from falsifying it. Instead, the network operator also receives an attestation report for the device. If the attestation report matches the CoSWID in the manifest, then the network operator automatically applies the MUD file that is also contained in the manifest. This allows a secure link to be established between a particular MUD file and a particular software version.</t>

<t>The trust relationships are somewhat more complex with MUD: the network operator may not trust the software author to produce vulnerability-free software. This means that the network operator may choose to override the MUD file in the manifest. Because the MUD file is not even reported by the device, the network operator is free to do this. The network operator can trust the attestation report because it is signed by the verifier. They trust that the values reported in the CoSWID are accurate because it is signed by the software author who also signs the software. They trust that the device is running the software described in the CoSWID because it matches the attestation report. They trust the MUD file because it is signed by the software author – or because they have supplied that MUD file themselves. MUD files may also be obtained from third-party providers, such as Global Platform Iotopia (https://globalplatform.org/iotopia/mud-file-service/).</t>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC8520" target='https://www.rfc-editor.org/info/rfc8520'>
<front>
<title>Manufacturer Usage Description Specification</title>
<author initials='E.' surname='Lear' fullname='E. Lear'><organization /></author>
<author initials='R.' surname='Droms' fullname='R. Droms'><organization /></author>
<author initials='D.' surname='Romascanu' fullname='D. Romascanu'><organization /></author>
<date year='2019' month='March' />
<abstract><t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs).  The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function.  The initial focus is on access control.  Later work can delve into other aspects.</t><t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t></abstract>
</front>
<seriesInfo name='RFC' value='8520'/>
<seriesInfo name='DOI' value='10.17487/RFC8520'/>
</reference>


<reference anchor="FDO" target="https://fidoalliance.org/specs/FDO/FIDO-Device-Onboard-RD-v1.0-20201202.html">
  <front>
    <title>FIDO Device Onboarding</title>
    <author initials="." surname="FIDO Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="LwM2M" target="http://openmobilealliance.org/release/LightweightM2M/V1_2-20201110-A/OMA-TS-LightweightM2M_Core-V1_2-20201110-A.pdf">
  <front>
    <title>LwM2M Core Specification</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="SWID" target="https://csrc.nist.gov/Projects/Software-Identification-SWID/guidelines">
  <front>
    <title>Software Identification (SWID) Tagging</title>
    <author initials="." surname="NIST">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>



<reference anchor="I-D.ietf-rats-eat">
   <front>
      <title>The Entity Attestation Token (EAT)</title>
      <author fullname="Giridhar Mandyam">
	 <organization>Qualcomm Technologies Inc.</organization>
      </author>
      <author fullname="Laurence Lundblade">
	 <organization>Security Theory LLC</organization>
      </author>
      <author fullname="Miguel Ballesteros">
	 <organization>Qualcomm Technologies Inc.</organization>
      </author>
      <author fullname="Jeremy O&#39;Donoghue">
	 <organization>Qualcomm Technologies Inc.</organization>
      </author>
      <date month="March" day="7" year="2021" />
      <abstract>
	 <t>   An Entity Attestation Token (EAT) provides a signed (attested) set of
   claims that describe state and characteristics of an entity,
   typically a device like a phone or an IoT device.  These claims are
   used by a relying party to determine how much it wishes to trust the
   entity.

   An EAT is either a CWT or JWT with some attestation-oriented claims.
   To a large degree, all this document does is extend CWT and JWT.

Contributing

   TBD

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-09" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-rats-eat-09.txt" />
</reference>


<reference anchor="I-D.ietf-suit-manifest">
   <front>
      <title>A Concise Binary Object Representation (CBOR)-based Serialization Format for the Software Updates for Internet of Things (SUIT) Manifest</title>
      <author fullname="Brendan Moran">
	 <organization>Arm Limited</organization>
      </author>
      <author fullname="Hannes Tschofenig">
	 <organization>Arm Limited</organization>
      </author>
      <author fullname="Henk Birkholz">
	 <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname="Koen Zandberg">
	 <organization>Inria</organization>
      </author>
      <date month="February" day="22" year="2021" />
      <abstract>
	 <t>   This specification describes the format of a manifest.  A manifest is
   a bundle of metadata about code/data obtained by a recipient (chiefly
   the firmware for an IoT device), where to find the that code/data,
   the devices to which it applies, and cryptographic information
   protecting the manifest.  Software updates and Trusted Invocation
   both tend to use sequences of common operations, so the manifest
   encodes those sequences of operations, rather than declaring the
   metadata.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-suit-manifest-12" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-suit-manifest-12.txt" />
</reference>


<reference anchor="I-D.ietf-sacm-coswid">
   <front>
      <title>Concise Software Identification Tags</title>
      <author fullname="Henk Birkholz">
	 <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname="Jessica Fitzgerald-McKay">
	 <organization>National Security Agency</organization>
      </author>
      <author fullname="Charles Schmidt">
	 <organization>The MITRE Corporation</organization>
      </author>
      <author fullname="David Waltermire">
	 <organization>National Institute of Standards and Technology</organization>
      </author>
      <date month="February" day="22" year="2021" />
      <abstract>
	 <t>   ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an
   extensible XML-based structure to identify and describe individual
   software components, patches, and installation bundles.  SWID tag
   representations can be too large for devices with network and storage
   constraints.  This document defines a concise representation of SWID
   tags: Concise SWID (CoSWID) tags.  CoSWID supports a similar set of
   semantics and features as SWID tags, as well as new semantics that
   allow CoSWIDs to describe additional types of information, all in a
   more memory efficient format.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-sacm-coswid-17" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-sacm-coswid-17.txt" />
</reference>


<reference anchor="I-D.ietf-teep-architecture">
   <front>
      <title>Trusted Execution Environment Provisioning (TEEP) Architecture</title>
      <author fullname="Mingliang Pei">
	 <organization>Broadcom</organization>
      </author>
      <author fullname="Hannes Tschofenig">
	 <organization>Arm Limited</organization>
      </author>
      <author fullname="Dave Thaler">
	 <organization>Microsoft</organization>
      </author>
      <author fullname="David Wheeler">
	 <organization>Intel</organization>
      </author>
      <date month="February" day="22" year="2021" />
      <abstract>
	 <t>   A Trusted Execution Environment (TEE) is an environment that enforces
   that any code within that environment cannot be tampered with, and
   that any data used by such code cannot be read or tampered with by
   any code outside that environment.  This architecture document
   motivates the design and standardization of a protocol for managing
   the lifecycle of trusted applications running inside such a TEE.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-teep-architecture-14" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-teep-architecture-14.txt" />
</reference>


<reference anchor="IoTopia" target="https://globalplatform.org/iotopia/mud-file-service/">
  <front>
    <title>Global Platform Iotopia</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>




  </back>

<!-- ##markdown-source:
H4sIABXJ7GAAA51b3XLcNpa+76dATS5G2mm2ZCfZnVEusrI13qjKilxSO7lM
oUl0NyKSYACy2z0uV+077BvOk+x3Dn4ItlrJ7KZStkSCwMH5+c53DuCiKGa9
7mt1Ja6FG5pG2oMwa+FUOVjdHwrVylWt243oVbltTW02WjmxNlbcmqWo1E6X
ys3kamXV7oqftarfG/tE38RZxGbQlcI0GFqZspUN1qusXPdFY6xsC236At+5
4vJyVspebYw9XAndrs1spjt7JXo7uP715eXfLl/PpFXySjyGuWe02MaaocPy
98v7D4+zJ3XAwwq/t72ymLe4obVmM9fLtvpF1qbF+gcI0+mrmRB2XarK9Yc6
PBWiN2X2o24r1fbxgTO2t2rt0u+HZvJrb3WZBpemafBteqtb0kKaW33qi1q7
vsAkK1NjWGH+7S94Ay01suugxEyOX2q1UzTom9lMDv3WWEhf4B39p1u8eLMQ
d6TQ8Mwr+o1VbSXbyRtjN7LV/5C9Ni1MbxvxXje6V1V4rxqp6/Tpgj/9T2mb
BTY0m81aYxt8u1Okvod3b//67etL+vHdzf0VzxB86k/vbm/uxQ17ibhvV0ba
Cnv6E49JW8B/k134r67rWsu2VH5wL+1GQa3bvu/c1cXFWldGhhEL7ObCdap0
FxDggr4u/JpFWLN4uCl2rxaXxevL15ev8Mdi2zc1Jn6/v3t9NxWZH4m3xirx
iDn1WpespudC5zJBJNOptjErXauJYFbhgVMX7/Vm2+8V/YkFLn569ctrL86r
V5fF9cX93XWxfCymo34hMYqjoYuuWmP9x59vb6aSP5p1v0d0iFvy1yS4OKOh
52IpN5t/Qfk/3j4uT+u8dLZctHDXxcbsLj5Y86sqe3cRly2myxa06kUW+ULc
FjcLrfp1YSViXcn+Kn/oBg08gFuulTt6I8umKI3b62ryvFeqK6Qtt/Dcsh8s
3JFem6XptJzq5r9qs5K1+FDLHuDVYFBPg05vdMODuzCWraj9+ItmqIo1TFw4
ZcnDLmazoiiEXCHuZQmMWW6h/78v3wmrNkMtbX0glFS16RygcT/B0YV4NI3q
dQNI7bcKliPrOQy3kJXRCs5L72QvSoTwShGirKDOCoCAX/GbEjvpeizTkMti
aEtzEZgTkONHbUUnbY/VHsitRGv283w5/WkK7krTS8hfwpyYV1amAzIAM0Rn
tMNPBP/8lLzLCwdM7mnRciukKGugtbILRBEJm1KBEiZhwBwLNAbfyL6Hvdll
5nHY0FWYDr9Gj0ZU1YVZwz0wr5a1u1CfEJwk1uR7uLWhMVVMQxC51uVBKOQS
WyoCY4xqK59RME59wpK8EdXutDUtDRGdNTvt8JQlDWkumqBSa8Ai6cGaRsBj
D1ACKQAqXm61E/gfI03XIVUMLSVA1lhLGa2G1LQaVIl16DnbLWw8SQbZ++0h
rgxH0c1QwyGUGdyoezLw3og4ibe38zYd3ac0Q11FE5FvrM2AV3EG+FAHDcBI
cZ9sUlI7S+EFwvuF9/VGV1WtZrOvKL9aUw28odksIwTibGjJLqyl+GwPv0pm
KU3bek24c14KllYtPXYADEt2FXsln4KedBu/dKyjrdzFT1YKfwzklivEgIS1
NemIXJ68GWGCLEuxyXyC85b3NIsppIMb1vLg5l6JA9aC4LJ8gs6vO7hBB3eD
2rBAzoumEUN+geypN17BMH9PiZMlZQLF31uIXtdmz0ZPE7F/Rp1XBtHZ+91x
fAsDLEAMQhCCOM27ZprlDnDfxuVrwLQNfSarypt5qGvM3xMqA0/w4U7WA487
QLmWPNnpTQATfLUg+IL0TM3ogVXOQTaGiOSVBOaOJMKaEACmyS1P8pDaDH9o
ao4tNgOLx05wDDkUNmqcUTKQv1oI8TMpJYEAJGtiSAg7tBSc389eY9wP0Krb
spuPI4KL8d6i93w/+5qmJSH2Ww2wimo88XXTIHaJjX4/+ybKohmoGR6gdKR4
0mr66M8uCfv97Fv+xjAYcLJl6IQwAMSefUqOW/OAx8pDaAJ994yq2pZDQ4EM
zX4/+/eXdhq+1r1LsDbKMfu7xD4TNPw2AC3ZJIxSbs/BhtBJeB/SlUf88AtD
eAQUuAmC/420VpNTY0vkANcBlDwQJIjCKhvVUkJjN4YILaM2Fhcxw0bT04JS
YC9SyPK3AQDMU0gOJVkfnE5+510G0wEVeSf0ogZ1sDmuBQvSAx/6iHMrK23G
zcwTJOUeCTjoeCrat3eRuRcMMY7syM9LODQNVX25AMl1nY7hr9ZYDomGNIFf
KaZRouzpK5g1eNCvPn9hFUUqzcY63XSUeEOyTzuS0eBJcawaFqwYBUvEBQDN
i5FeivJQ1uyuIVLnHgca+EvgFY12lPKUB66QqlW1gBsDYqVY13JPIlbalYRL
qjqaw/shOzks0zMfOYINTnDMPeJHkAa8sVQeAXk+igio0AMeFJFnxDO12Cxi
9PPukB840YyUIDr/OTC8fALfqVW1icPLbYzbhMEoXhEjKvMFpAoLVmUHppWZ
ktq13gw2ICajuSxL2hh+B9rgJ6qgAzn02yVVUE2YjSSGdyCVbAQKOgXrv03q
Z8aR86QJwYnMiA3v54NQSMM1a41yea0+4W/SfZ6jUk6v9BoUncKGsIiGM+PZ
q7oO9CXQHEeJlfGaHbZWBGKSFNcZQ0kpfQx15CmAl+IcxrnZKuJBGKO9N4IF
gwzApUgL7NNkaXIs5iWL5wCylU0XYUqKGtnZx/fxHt1gLU0RTR3Ai/dHAPic
WLEeQ1AduSojjFMnlglZOoCZMKsdMw6L1VqkV1hbySa5OiErsIyNE0DFkH5R
5UE5zB7xXWWsb6vEJA4qXSqKMJ+nGgkO+wmRHZRInkfIQfvSbWt2flp+C425
TpbkVkuKRDC0gEsrj9nsgnCaA8evL1e2QGQ2l253iulesNcpFfgM8C7RSEdi
LDP1woJTQsg+xegEA5o+IyOgOYNjjQdzaBgQmDCA5c/xLsMEPDFT/4X65Ib8
rJSBofmCBzMgNSG25+P4A21IDpXuOawaycBBYJDHG8wKrugBkqSJ3kblAKoQ
ggu5MpAqeE1G5FwfKXx8F3CIXNonfYjlQpXkxIfHa/FWWSqZuagq4USwYfiY
mz3Z9FBeqRFwkfKB1VvaO1kw7F3CirZiQvFgvJLZKOLswSzPfVxyZVPRLBBv
sB4JGdcqzxN5h2yGXm1sLF4yygkWwsn3lGg1oW98HvyeG2C0ynS/73l/rwSn
EkHVdTmqJtKYFbYxJ0/RlU/GHv/cBBVZ3FBATZK+4wo0gBThMrNQja/Z5ZMq
TlfaQ+Brsbb1C8Qy5DsfUQ2KWG86xcabVl7ZdK2CF2pmQePcG8WlduAEMfmw
5eEzbwZdeyybRhbzHfbBseT/lTNU/CBFneGSh+egcsL1RXTvZKaF+Ei1yVzc
71v/N4OUsSEAfgrgFHOgLzU4w3cG7/eeHFDmQTmsyRNLzEztBj8irD4O8NmC
Sz3nPYPKZyWe1MGXe87T/xvFNQ9jxvg1Ef4fZM3Px3KPNrWjdvDXtG6jqgO9
3w01UU+OWx0ih1hMxhGg53viA5MdJDCsWIRAdIRkTpJKWhhMVS4Uar8N0koE
UBv7AplF+es2CxjZE90YVdp1NUIConz11WTXb8ddU2MpdGyo5F9ZIyviiPRp
yTbZo4z1hqG+ChN5mmmyszxR50qGZgyUSZpMNYlpYxLVlEtenxibqDMKRrj3
uPH40SzbzR+sEOHCnWgMMVuLXzVKItF7WPmOJ/AMgwbtJwVjNjlCJnLGqPU8
qih1C732nbOs3kSeX1DNRVRlijm+xwPgY4AhfAi1bpwG9ZTudKAe+ZeJ8FZG
eb5PFNWLzt0KYrFYVXFmyqVk0se1ZM+pJCB4aK1w4cjYQ7uMytDRQceGmU26
Brd/N1jCIEKSvH0W6+I114A1pdPAqlw2Fafw0Y+J1aZOn2VqG5oNuq5jt9I3
WyPZIWyl4CWEQdAxCz3tNS/42Og2EvTGca+ZNp9kDN99Jwztc48geJHmA6mP
zBHW1JTZNsCQJlbpUbfsIMyajxfM200TpChr4yg8pXOm1Kxtth/VIBn5Cfub
I6W0pXoWah25lAXzImbotnrde81EMmviT1AzcyEKNhN/jOT2tHfpI/ciyp+W
I1szEVup2JZS1dURyqQmCjUqQniGcLGWMCRp64V9zX0vIHeQMFtjwOhI2j+c
w+NpzBV3KVdcx1wxezmPcJ2LWphKjtPegtpS/BjeXPtK7G2oxM5+vH57HkJo
njiNFChOesIR6hMCrediDcfdgxPwbt9/Hegsog8OUW7nTB0I4Q9jBytWfaGv
TexHIGEXQeMIAR36aRAiyCCYncj4TR98N/Af35TiHqusdlwc40djK18oUBYh
CuHhNKx+TO3Yd0PDTbEbGQQuKTRkAnHt3OCJSCjz4X0sD+dlZm6t163iytbY
SBx8uyRQTFqMztOIyMJQiEpECMcfV+O+PZftnDZgTSeozJo2hELDNUBwQyk5
wMqak3gUbj5pRQBfGu7IhBIzMO9JB3TsKUPDn3w3ySJtUedBO5ap0zvjNR7t
uhC3va/yKBV1XEz2WUwRIVl7ugdAZYqVyh6N6mVoR+QJHblJPZ52GjghS+H9
IR5raFf6hs9s9o5a1CgmoAdwKS1HL/btMwp8Uxqq0MDXrCzeX/84mjPgKAOE
Uk0XdZfr0Z/HVFmFF8RoDEolY1Vsn/tx4F5wQ1Rhpg6dEMof6pOk7Ovblw28
GVY5ihNLZ16IiA9jjKRrAb2Zyk0L4gE9j2MmmwKz94ksMjZSCJ+F1x5rRub5
05R5zmYvk9IsgQXmE/q53oW5/ebtng4IY6kDes0RmJo7dFWhU3xfAUrmeYgb
zqmZz81U5JV4xhIq9ykduIUNkCixWxdahHxqOZKvkOr9uUG0Hq1OtyoIVXTr
BvJCzXcmTn5MWYaKzZKTn9ygEqekwonXH+JREvoHBaG0VKFQaKS8wyyCM6ak
UqtXsb8zduWv8t46nR1ymz6eHVI0Pr4xdyFxj3PwGigIS6tJSnzGDcNRz+aI
IdKmN14Who2ICn4HyMrd8Sd5P4d7bNgh2TqxmpiBD/6oAMKxGDmtZczf6J1q
R55N/fhAfh5ybKYoefT+EpKV464QsdFVrR0p8bi8TFVLBJC7j4/LvPRjRfvy
4edjwu07NZFrI6LmFJ3qU69aIh7+VP5VOvHJjlFyNS14GEqOs/vOu219CA0M
3Y/lGaqo8ikcSBO6G2qo1V7PK1k+VYbLWGrQU/1CxzEjH83OhxhKCJ43ynf5
/TGVCa7NHDRiwIrCZaPpgJuhcjmaifCD20pyeig2cWlyfI77I616fb4NQsmM
yMmj3gPv5TadIrURL7ITggXVwRPdXVd8nsMwqU7K86x4++ZoihvV1eYQeto8
TeJ/RGaJ1JO0bXWiDpweQk3og+vpboT0J7Yl3ZkQ0ndSfeFEDbiIEZETxy4M
Z1a2GJJRPFqPfSo+ooYVlsdX154FBMiJasI9t8n5uDvuG3Nr2jd2x3LDHkfc
Ua9oHgrC8bAKyqKZ8w/nCXkqwVDvi4J4/y41lbyfLImYsTkIYZ/UgYCXfSX4
DQkZPVxPD0HHwH784f7j+xvk9s4z9OfXNFKmTwTg9JUu8fnzu5v7L1+YyPIN
qjfG9HQpphNnnz/zoy9fztl1CX78iXViKCYWCb59CyEsAXIClljBeN+rOW+w
2b3A9eH39pR+GikYZQtlY28sr87z7oInaLn5wdrDmduDT9XX2adRVSNZ+vz5
2ZWnL184Nk/qIDtCi/uKhyZrrep43PZsh1Pa8MximRSTO1YkyjcsCgPxiZNt
SRVKk51QxwMoEedI+gY/r4dKibNKU4FHFoErrFI/wKo1nBrznmPWZzfVQO0o
LuPjNyFl38WUfVKl2bUw2sq3uVbJQDXTrQ9EIWJ+OWE1bk1aLzPIt6yHeE0m
H/XA7ukDmbiDOPsjgc6jZuh8jhLCcdcknPacWGZBR/28F3JFn4ReaFlolx9K
EoUHbfXQq9dB4+mwKfGuVCn4o/WjFsuL/ZGjDUnsPVz+RODfyXZYSx5oxUdH
RxM3DGj+GO/s7uPNeayQa77hQDyIWHrXUzK8EXSvzk1qz9CPAlH0twfMxsoG
5MKPC7XhC+X57D+Yzfq5SNcvbCo0ZUYlZnUwhQAVjswM3NhUgT+OAgetcEdR
ti4cdqY4eDEMCN91+yygFrO/5o4MANVVaLY75Q+PTb3zqYovnXmnJHnKUbtB
KCbMESiqQysbGH2kC2kTi9nfFqmbcdrqvg9htXsKbQp/US60FMy02vSIitqo
LbhBqmXbJx2zqy/Eu7GAm495i7OeGXq67cdiJgQiymxaf37SUUuiD3cN4rn6
9rhy4prMn4A9KF83EidnHwscgPL5yANiEqOwSEkru14VmV5qSnNuwPCS6P7R
VajYY8s+T/cCSGoK1d6f54YDoNRBIO7ApfpAZehaaW4yErcme2YTZsnDi5Lm
Gq8ghMlgik5S0cSMCvl04S+rHt0xefx4u5wjTun2Luvh4Xr5OMEo78kuUDm/
rJ2od+17ytQhi03IcKbEt4z4EFTySsnt5+GszEOL47MPEiHum52PwTf/SmSM
x5cUYEOx8B3bkHz64l3S8S2pZ7zijIrXeI2y0hsaeR6bT0d7+LN71glcPh/F
tYJfeAJiFA7xbOLkqUBYNGzf2+jk3KO9jzOLb6f5RmvsEaXSLNz4Wx2OSlmu
CH5nK1P3ykUP1I1T0XRRzU+nK9JJAid8rg1RNJNa5qcUPVk3vR3ndqcVSD7E
1Xw4ZaOBozaNr0Urf3yb+y1pfhnOna/9sZovAc6W13RJ1Z9OzKdAF7EVQ3y3
lgJ0vFWTkYNnl9WJs8xQlnFzGkAcDJ/Ho1wRLysDG6W3qW5X4aJwLBPS9eYY
Bx7Lky5ZsBR9zyMpspE8mNLLLCxjyvBp0jeVougs7sSFUteRDkAymu/n+fhw
S2od6x7MmVGKogh3NLlAzFyAy8s1dqTXTPEIHm+BzEpWsWX1u7uX7Sn/PdbA
7folT4+eNcZppOk5nKn2BVkmeOA7iS7lcNZt7NCHfhcrf7xAFRdZTBrfqXhD
ufgUz/wyb0kkMC+004q+qMneHENkQKJTcM+oYhrFZ2KMoPEaGvsm1rg6rQnK
6OQcY4wfwVFoNvEFprxteijWdGEgdYu8IlC6tW6EqJPLIVEbT6Po2okFZEw1
/0zFb0b8zEZ5p+ZWfbreFvAttihOikCX3Ehy4kv+LsoL4TqFvhM++K9AbEie
R9AdksTxtbyY8i0f8gzclfy9RY5Ntd+aQDcxzE27eSfleH4yP5l2ggqZgJlM
eRw+V9HRqpn5/i/b+ud//w8z+DyN8t1GQn4+A+ANZaGrGqfqHfG/sUYg14uH
pmYVwjl0ybStCu5zxwM5m5W7L/y7JXH2//m3SufhX3BQa3T2v6seiVv7OQAA

-->

</rfc>

