<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ace-group-oscore-profile-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.0 -->
  <front>
    <title abbrev="Group OSCORE Profile of ACE">The Group Object Security for Constrained RESTful Environments (Group OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ace-group-oscore-profile-01"/>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <author initials="R." surname="Höglund" fullname="Rikard Höglund">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>rikard.hoglund@ri.se</email>
      </address>
    </author>
    <author initials="F." surname="Palombini" fullname="Francesca Palombini">
      <organization>Ericsson AB</organization>
      <address>
        <postal>
          <street>Torshamnsgatan 23</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>francesca.palombini@ericsson.com</email>
      </address>
    </author>
    <date year="2024" month="March" day="04"/>
    <area>Security</area>
    <workgroup>ACE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework. The profile uses Group Object Security for Constrained RESTful Environments (Group OSCORE) to provide communication security between a Client and one or multiple Resource Servers that are members of an OSCORE group. The profile securely binds an OAuth 2.0 Access Token to the public key of the Client associated with the private key used by that Client in the OSCORE group. The profile uses Group OSCORE to achieve server authentication, as well as proof-of-possession for the Client's public key. Also, it provides proof of the Client's membership to the OSCORE group by binding the Access Token to information from the Group OSCORE Security Context, thus allowing the Resource Server(s) to verify the Client's membership upon receiving a message protected with Group OSCORE from the Client. Effectively, the profile enables fine-grained access control paired with secure group communication, in accordance with the Zero Trust principles.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Authentication and Authorization for Constrained Environments Working Group mailing list (ace@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ace/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ace-wg/ace-group-oscore-profile"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>A number of applications rely on a group communication model where a Client can access a resource hosted by multiple Resource Servers at once, e.g., over IP multicast. Typical examples are switching of luminaries, actuators control, and distribution of software updates. Secure communication in the group can be achieved by sharing a set of keying material, which is typically provided upon joining the group.</t>
      <t>For some of such applications, it may be just fine to enforce access control in a straightforward fashion. That is, any Client authorized to join the group, hence to obtain the group keying material, can be also implicitly authorized to perform any action at any resource of any Server in the group. An example of application where such implicit authorization might serve well is a simple lighting scenario, where the lightbulbs are the Servers, while the user account on an app on the user's phone is the Client. In this case, it might be fine to not require additional authorization evidence from any user account, if it is acceptable that any current group member is also authorized to switch on and off any light, or to check their status.</t>
      <t>However, in different instances of such applications, the approach above is not desirable, as different group members are intended for have different access rights to resources of other group members. For instance, enforcing access control in accordance with a more fine-grained approach is required in the two following use cases.</t>
      <t>As a first case, an application provides control of smart locks acting as Servers in the group, where: a first type of Client, e.g., a user account of a child, is allowed to only query the status of the smart locks; while a second type of Client, e.g., a user account of a parent, is allowed to both query and change the status of the smart locks. Further similar applications concern the enforcement of different sets of permissions in groups with sensor/actuator devices, e.g., thermostats acting as Servers. Also, some group members may even be intended as Servers only. Hence, they must be prevented from acting as Clients altogether and from accessing resources at other Servers, especially when attempting to perform non-safe operations.</t>
      <t>As a second case, building automation scenarios often rely on Servers that, under different circumstances, enforce different level of priority for processing received commands. For instance, BACnet deployments consider multiple classes of Clients, e.g., a normal light switch (C1) and an emergency fire panel (C2). Then, a C1 Client is not allowed to override a command from a C2 Client, until the latter relinquishes control at its higher priority. That is: i) only C2 Clients should be able to adjust the minimum required level of priority on the Servers, so rightly locking out C1 Clients if needed; and ii) when a Server is set to accept only high-priority commands, only C2 Clients should be able to perform such commands otherwise allowed also to C1 Clients. Given the different maximum authority of different Clients, fine-grained access control would effectively limit the execution of high- and emergency-priority commands only to devices that are in fact authorized to perform such actions. Besides, it would prevent a misconfigured or compromised device from initiating a high-priority command and lock out normal control.</t>
      <t>In the cases above, being a legitimate group member and storing the group keying material is not supposed to imply any particular access rights. Instead, access control to the secure group communication channel and access control to the resource space provided by Servers in the group should remain logically separated domains.</t>
      <t>This is aligned with the Zero Trust paradigm <xref target="NIST-800-207"/>, which focuses on resource protection and builds on the premise that trust is never granted implicitly, but must be continually evaluated. In particular, Zero Trust protections involve "minimizing access to resources (such as data and compute resources and applications/services) to only those subjects and assets identified as needing access as well as continually authenticating and authorizing the identity and security posture of each access request."</t>
      <t>Furthermore, <xref target="NIST-800-207"/> highlights how the Zero Trust goal is to "prevent unauthorized access to data and services coupled with making the access control enforcement as granular as possible", to "enforce least privileges needed to perform the action in the request."</t>
      <t>As a step in this direction, one can be tempted to introduce a different security group for each different set of access rights. However, this inconveniently results in additional keying material to distribute and manage. In particular, if the access rights pertaining to a node change, this requires to evict the node from the group, after which the node has to join a different group aligned with its new access rights. Moreover, the keying material of both groups would have to be renewed for their current members. Overall, this would have a non negligible impact on operations and performance.</t>
      <t>Instead, a fine-grained yet flexible access control model can be enforced within the same group, by using the Authentication and Authorization for Constrained Environments (ACE) framework <xref target="RFC9200"/>. That is, a Client has to first obtain authorization credentials in the form of an Access Token, and upload it to the Resource Server(s) in the group before accessing the intended resources.</t>
      <t>The ACE framework delegates to separate profile documents how to secure communications between the Client and the Resource Servers. However each of the current profiles of ACE defined in <xref target="RFC9202"/><xref target="RFC9203"/><xref target="RFC9431"/><xref target="I-D.ietf-ace-edhoc-oscore-profile"/> relies on a security protocol that cannot be used to protect one-to-many group messages, for example sent over IP multicast.</t>
      <t>This document specifies the "coap_group_oscore" profile of the ACE framework, where a Client uses the Constrained Application Protocol (CoAP) <xref target="RFC7252"/><xref target="I-D.ietf-core-groupcomm-bis"/> to communicate with one or multiple Resource Servers that are members of an application group and share a common set of resources. This profile uses Group Object Security for Constrained RESTful Environments (Group OSCORE) <xref target="I-D.ietf-core-oscore-groupcomm"/> as the security protocol to protect messages exchanged between the Client and the Resource Servers. Hence, it requires that both the Client and the Resource Servers have previously joined the same OSCORE group.</t>
      <t>That is, this profile describes how access control is enforced for a Client after it has joined an OSCORE group, to access resources hosted by other members in that group. The process for joining the OSCORE group through the respective Group Manager as defined in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/> takes place before the process described in this document, and is out of the scope of this profile.</t>
      <t>The Client proves its access to be authorized to the Resource Server(s) by using an Access Token bound to a key (the proof-of-possession key). This profile uses Group OSCORE to achieve server authentication and proof-of-possession for the Client's public key used in the OSCORE group in question. Note that proof-of-possession is not achieved through a dedicated protocol element, but instead after the first message exchange protected with Group OSCORE.</t>
      <t>Furthermore, this profile provides proof of the Client's membership to the OSCORE group, by binding the Access Token to information from the pre-established Group OSCORE Security Context, as well as to the Client's authentication credential used in the group and including the Client's public key. This allows the Resource Server(s) to verify the Client's group membership upon reception of a message protected with Group OSCORE from that Client.</t>
      <t>OSCORE <xref target="RFC8613"/> specifies how to use COSE <xref target="RFC9052"/><xref target="RFC9053"/> to secure CoAP messages. Group OSCORE builds on OSCORE to provide secure group communication, and ensures source authentication: by means of digital signatures embedded in the protected message (when using the group mode); or by protecting a message with pairwise keying material derived from the asymmetric keys of the two peers exchanging the message (when using the pairwise mode).</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
        <t>Readers are expected to be familiar with the terms and concepts related to CBOR <xref target="RFC8949"/>, COSE <xref target="RFC9052"/><xref target="RFC9053"/>, CoAP <xref target="RFC7252"/>, OSCORE <xref target="RFC8613"/>, and Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>. These especially include:</t>
        <ul spacing="normal">
          <li>
            <t>Group Manager, as the entity responsible for a set of groups where communications among members are secured with Group OSCORE.</t>
          </li>
          <li>
            <t>Authentication credential, as the set of information associated with an entity, including that entity's public key and parameters associated with the public key. Examples of authentication credentials are CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392"/>, X.509 certificates <xref target="RFC5280"/>, and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>.  </t>
            <t>
Members of an OSCORE group have an associated authentication credential in the format used within the group. As per <xref section="2.4" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>, an authentication credential provides the public key as well as the comprehensive set of information related to the public key algorithm, including, e.g., the used elliptic curve (when applicable).</t>
          </li>
        </ul>
        <t>Readers are expected to be familiar with the terms and concepts described in the ACE framework for authentication and authorization <xref target="RFC9200"/>, as well as in the OSCORE profile of ACE <xref target="RFC9203"/>. The terminology for entities in the considered architecture is defined in OAuth 2.0 <xref target="RFC6749"/>. In particular, this includes Client (C), Resource Server (RS), and Authorization Server (AS).</t>
        <t>Note that, unless otherwise indicated, the term "endpoint" is used here following its OAuth definition, aimed at denoting resources such as /token and /introspect at the AS, and /authz-info at the RS. This document does not use the CoAP definition of "endpoint", which is "An entity participating in the CoAP protocol".</t>
        <t>Additionally, this document makes use of the following terminology.</t>
        <ul spacing="normal">
          <li>
            <t>Pairwise-only group: an OSCORE group that uses only the pairwise mode of Group OSCORE (see <xref section="9" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</t>
          </li>
        </ul>
        <t>Examples throughout this document are expressed in CBOR diagnostic notation, without the tag and value abbreviations.</t>
      </section>
    </section>
    <section anchor="sec-protocol-overview">
      <name>Protocol Overview</name>
      <t>This section provides an overview of this profile, i.e., of how to use the ACE framework for authentication and authorization <xref target="RFC9200"/> to secure communications between a Client and one or more Resource Servers using Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>.</t>
      <t>Note that this profile of ACE describes how access control can be enforced for a node after it has joined an OSCORE group, to access resources hosted by other members in that group.</t>
      <t>In particular, the process of joining the OSCORE group through the respective Group Manager as defined in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/> must take place before the process described in this document, and is out of the scope of this profile.</t>
      <t>An overview of the protocol flow for this profile is shown in <xref target="fig-protocol-overview"/>, where it is assumed that both the Resource Servers RS1 and RS2 are associated with the same Authorization Server AS. It is also assumed that the Client C, as well as RS1 and RS2 have previously joined an OSCORE group with Group Identifier (gid) 0xabcd0000, and that they got assigned Sender ID (sid) 0x00, 0x01, and 0x02 in the group, respectively. The names of messages coincide with those of <xref target="RFC9200"/> when applicable, and messages in square brackets are optional.</t>
      <figure anchor="fig-protocol-overview">
        <name>Protocol Overview.</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="960" width="576" viewBox="0 0 576 960" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,48 L 8,704" fill="none" stroke="black"/>
              <path d="M 8,784 L 8,848" fill="none" stroke="black"/>
              <path d="M 8,928 L 8,944" fill="none" stroke="black"/>
              <path d="M 248,48 L 248,120" fill="none" stroke="black"/>
              <path d="M 248,136 L 248,200" fill="none" stroke="black"/>
              <path d="M 248,216 L 248,328" fill="none" stroke="black"/>
              <path d="M 248,344 L 248,408" fill="none" stroke="black"/>
              <path d="M 248,424 L 248,456" fill="none" stroke="black"/>
              <path d="M 248,472 L 248,520" fill="none" stroke="black"/>
              <path d="M 248,536 L 248,584" fill="none" stroke="black"/>
              <path d="M 248,640 L 248,808" fill="none" stroke="black"/>
              <path d="M 248,824 L 248,944" fill="none" stroke="black"/>
              <path d="M 352,48 L 352,120" fill="none" stroke="black"/>
              <path d="M 352,136 L 352,200" fill="none" stroke="black"/>
              <path d="M 352,240 L 352,328" fill="none" stroke="black"/>
              <path d="M 352,344 L 352,408" fill="none" stroke="black"/>
              <path d="M 352,448 L 352,608" fill="none" stroke="black"/>
              <path d="M 352,640 L 352,944" fill="none" stroke="black"/>
              <path d="M 568,48 L 568,944" fill="none" stroke="black"/>
              <path d="M 32,48 L 48,48" fill="none" stroke="black"/>
              <path d="M 200,48 L 224,48" fill="none" stroke="black"/>
              <path d="M 32,80 L 72,80" fill="none" stroke="black"/>
              <path d="M 176,80 L 224,80" fill="none" stroke="black"/>
              <path d="M 16,128 L 72,128" fill="none" stroke="black"/>
              <path d="M 184,128 L 560,128" fill="none" stroke="black"/>
              <path d="M 16,208 L 384,208" fill="none" stroke="black"/>
              <path d="M 528,208 L 560,208" fill="none" stroke="black"/>
              <path d="M 16,256 L 40,256" fill="none" stroke="black"/>
              <path d="M 192,256 L 240,256" fill="none" stroke="black"/>
              <path d="M 16,304 L 64,304" fill="none" stroke="black"/>
              <path d="M 184,304 L 240,304" fill="none" stroke="black"/>
              <path d="M 16,336 L 72,336" fill="none" stroke="black"/>
              <path d="M 184,336 L 560,336" fill="none" stroke="black"/>
              <path d="M 16,416 L 384,416" fill="none" stroke="black"/>
              <path d="M 528,416 L 560,416" fill="none" stroke="black"/>
              <path d="M 16,464 L 48,464" fill="none" stroke="black"/>
              <path d="M 200,464 L 344,464" fill="none" stroke="black"/>
              <path d="M 16,528 L 64,528" fill="none" stroke="black"/>
              <path d="M 184,528 L 344,528" fill="none" stroke="black"/>
              <path d="M 208,560 L 240,560" fill="none" stroke="black"/>
              <path d="M 240,592 L 344,592" fill="none" stroke="black"/>
              <path d="M 16,672 L 32,672" fill="none" stroke="black"/>
              <path d="M 224,672 L 240,672" fill="none" stroke="black"/>
              <path d="M 16,816 L 32,816" fill="none" stroke="black"/>
              <path d="M 224,816 L 344,816" fill="none" stroke="black"/>
              <path d="M 216,560 L 232,592" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="568,336 556,330.4 556,341.6" fill="black" transform="rotate(0,560,336)"/>
              <polygon class="arrowhead" points="568,128 556,122.4 556,133.6" fill="black" transform="rotate(0,560,128)"/>
              <polygon class="arrowhead" points="352,592 340,586.4 340,597.6" fill="black" transform="rotate(0,344,592)"/>
              <polygon class="arrowhead" points="352,464 340,458.4 340,469.6" fill="black" transform="rotate(0,344,464)"/>
              <polygon class="arrowhead" points="248,560 236,554.4 236,565.6" fill="black" transform="rotate(0,240,560)"/>
              <polygon class="arrowhead" points="248,256 236,250.4 236,261.6" fill="black" transform="rotate(0,240,256)"/>
              <polygon class="arrowhead" points="232,48 220,42.4 220,53.6" fill="black" transform="rotate(0,224,48)"/>
              <polygon class="arrowhead" points="40,80 28,74.4 28,85.6" fill="black" transform="rotate(180,32,80)"/>
              <polygon class="arrowhead" points="24,816 12,810.4 12,821.6" fill="black" transform="rotate(180,16,816)"/>
              <polygon class="arrowhead" points="24,672 12,666.4 12,677.6" fill="black" transform="rotate(180,16,672)"/>
              <polygon class="arrowhead" points="24,528 12,522.4 12,533.6" fill="black" transform="rotate(180,16,528)"/>
              <polygon class="arrowhead" points="24,416 12,410.4 12,421.6" fill="black" transform="rotate(180,16,416)"/>
              <polygon class="arrowhead" points="24,304 12,298.4 12,309.6" fill="black" transform="rotate(180,16,304)"/>
              <polygon class="arrowhead" points="24,208 12,202.4 12,213.6" fill="black" transform="rotate(180,16,208)"/>
              <g class="text">
                <text x="8" y="36">C</text>
                <text x="248" y="36">RS1</text>
                <text x="352" y="36">RS2</text>
                <text x="564" y="36">AS</text>
                <text x="24" y="52">[</text>
                <text x="92" y="52">Resource</text>
                <text x="160" y="52">Request</text>
                <text x="232" y="52">]</text>
                <text x="24" y="84">[</text>
                <text x="92" y="84">AS</text>
                <text x="136" y="84">Request</text>
                <text x="232" y="84">]</text>
                <text x="100" y="100">Creation</text>
                <text x="160" y="100">Hints</text>
                <text x="100" y="132">POST</text>
                <text x="148" y="132">/token</text>
                <text x="48" y="148">(aud:</text>
                <text x="100" y="148">"RS1",</text>
                <text x="148" y="148">sid:</text>
                <text x="192" y="148">0x00,</text>
                <text x="52" y="164">gid:</text>
                <text x="120" y="164">0xabcd0000,</text>
                <text x="188" y="164">...)</text>
                <text x="420" y="212">Access</text>
                <text x="472" y="212">Token</text>
                <text x="508" y="212">T1</text>
                <text x="376" y="228">+</text>
                <text x="412" y="228">Access</text>
                <text x="488" y="228">Information</text>
                <text x="68" y="260">POST</text>
                <text x="136" y="260">/authz-info</text>
                <text x="100" y="276">(access_token:</text>
                <text x="176" y="276">T1)</text>
                <text x="92" y="308">2.01</text>
                <text x="144" y="308">Created</text>
                <text x="100" y="340">POST</text>
                <text x="148" y="340">/token</text>
                <text x="48" y="356">(aud:</text>
                <text x="100" y="356">"RS2",</text>
                <text x="148" y="356">sid:</text>
                <text x="192" y="356">0x00,</text>
                <text x="52" y="372">gid:</text>
                <text x="120" y="372">0xabcd0000,</text>
                <text x="188" y="372">...)</text>
                <text x="420" y="420">Access</text>
                <text x="472" y="420">Token</text>
                <text x="508" y="420">T2</text>
                <text x="376" y="436">+</text>
                <text x="412" y="436">Access</text>
                <text x="488" y="436">Information</text>
                <text x="76" y="468">POST</text>
                <text x="144" y="468">/authz-info</text>
                <text x="108" y="484">(access_token:</text>
                <text x="184" y="484">T2)</text>
                <text x="92" y="532">2.01</text>
                <text x="144" y="532">Created</text>
                <text x="20" y="564">--</text>
                <text x="56" y="564">Group</text>
                <text x="108" y="564">OSCORE</text>
                <text x="168" y="564">Request</text>
                <text x="64" y="580">(kid:</text>
                <text x="112" y="580">0x00,</text>
                <text x="68" y="596">gid:</text>
                <text x="136" y="596">0xabcd0000)</text>
                <text x="248" y="612">|</text>
                <text x="304" y="628">/proof-of-possession/</text>
                <text x="64" y="676">Group</text>
                <text x="116" y="676">OSCORE</text>
                <text x="180" y="676">Response</text>
                <text x="88" y="692">(kid:</text>
                <text x="136" y="692">0x01)</text>
                <text x="88" y="724">/proof-of-possession/</text>
                <text x="8" y="740">|</text>
                <text x="32" y="756">/Mutual</text>
                <text x="124" y="756">authentication</text>
                <text x="40" y="772">between</text>
                <text x="80" y="772">C</text>
                <text x="104" y="772">and</text>
                <text x="140" y="772">RS1/</text>
                <text x="64" y="820">Group</text>
                <text x="116" y="820">OSCORE</text>
                <text x="180" y="820">Response</text>
                <text x="88" y="836">(kid:</text>
                <text x="136" y="836">0x02)</text>
                <text x="88" y="868">/proof-of-possession/</text>
                <text x="8" y="884">|</text>
                <text x="32" y="900">/Mutual</text>
                <text x="124" y="900">authentication</text>
                <text x="40" y="916">between</text>
                <text x="80" y="916">C</text>
                <text x="104" y="916">and</text>
                <text x="140" y="916">RS2/</text>
                <text x="120" y="948">...</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
C                            RS1          RS2                        AS
| [--- Resource Request --->] |            |                          |
|                             |            |                          |
| [<----- AS Request -------] |            |                          |
|       Creation Hints        |            |                          |
|                             |            |                          |
|-------- POST /token ----------------------------------------------->|
|  (aud: "RS1", sid: 0x00,    |            |                          |
|   gid: 0xabcd0000, ...)     |            |                          |
|                             |            |                          |
|                             |            |                          |
|<---------------------------------------------- Access Token T1 -----|
|                             |               + Access Information    |
|                             |            |                          |
|---- POST /authz-info ------>|            |                          |
|    (access_token: T1)       |            |                          |
|                             |            |                          |
|<------ 2.01 Created --------|            |                          |
|                             |            |                          |
|-------- POST /token ----------------------------------------------->|
|  (aud: "RS2", sid: 0x00,    |            |                          |
|   gid: 0xabcd0000, ...)     |            |                          |
|                             |            |                          |
|                             |            |                          |
|<---------------------------------------------- Access Token T2 -----|
|                             |               + Access Information    |
|                             |            |                          |
|----- POST /authz-info ------------------>|                          |
|     (access_token: T2)      |            |                          |
|                             |            |                          |
|                             |            |                          |
|<------ 2.01 Created ---------------------|                          |
|                             |            |                          |
|-- Group OSCORE Request -+-->|            |                          |
|    (kid: 0x00,           \  |            |                          |
|     gid: 0xabcd0000)      \------------->|                          |
|                             |            |                          |
|                          /proof-of-possession/                      |
|                             |            |                          |
|                             |            |                          |
|<-- Group OSCORE Response ---|            |                          |
|       (kid: 0x01)           |            |                          |
|                             |            |                          |
/proof-of-possession/         |            |                          |
|                             |            |                          |
/Mutual authentication        |            |                          |
 between C and RS1/           |            |                          |
|                             |            |                          |
|                             |            |                          |
|<-- Group OSCORE Response ----------------|                          |
|       (kid: 0x02)           |            |                          |
|                             |            |                          |
/proof-of-possession/         |            |                          |
|                             |            |                          |
/Mutual authentication        |            |                          |
 between C and RS2/           |            |                          |
|                             |            |                          |
|            ...              |            |                          |
]]></artwork>
        </artset>
      </figure>
      <section anchor="sec-protocol-overview-pre-conditions">
        <name>Pre-Conditions</name>
        <t>Using Group OSCORE and this profile requires that both the Client and the Resource Servers have previously joined the same OSCORE group. This especially includes the derivation of the Group OSCORE Security Context and the assignment of unique Sender IDs to use in the group. Nodes can join the OSCORE group through the respective Group Manager by using the approach defined in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>, which is also based on ACE.</t>
        <t>After the Client and Resource Servers have joined the group, this profile provides access control for accessing resources on those Resource Servers, by securely communicating with Group OSCORE.</t>
        <t>As a pre-requisite for this profile, the Client has to have successfully joined the OSCORE group where also the Resource Servers (RSs) are members. Depending on the limited information initially available, the Client may have to first discover the exact OSCORE group used by the RSs for the resources of interest, e.g., by using the approach defined in <xref target="I-D.tiloca-core-oscore-discovery"/>.</t>
      </section>
      <section anchor="sec-protocol-overview-token-retrieval">
        <name>Access Token Retrieval</name>
        <t>This profile requires that the Client retrieves an Access Token from the AS for the resource(s) that it wants to access at the RS(s), by using the /token endpoint as specified in <xref section="5.8" sectionFormat="of" target="RFC9200"/>.</t>
        <t>In general, different RSs can be associated with different ASs, even if the RSs are members of the same OSCORE group. However, assuming proper configurations and trust relations, it is possible for multiple RSs associated with the same AS to be part of a single audience (i.e., a group-audience, see <xref section="6.9" sectionFormat="of" target="RFC9200"/>). In such a case, the Client can request a single Access Token intended for the group-audience, hence to all the RSs included therein. A particular group-audience might be defined as including all the RSs in the OSCORE group.</t>
        <t>In the Access Token Request to the AS, the Client MUST include the Group Identifier of the OSCORE group and its own Sender ID in that group. The AS MUST specify these pieces of information in the Access Token.</t>
        <t>Furthermore, in the Access Token Request to the AS, the Client MUST also include: its own authentication credential used in the OSCORE group; and a proof-of-possession (PoP) evidence to prove possession of the corresponding private key. The PoP evidence is computed over a PoP input uniquely related to the secure communication association between the Client and the AS. The AS MUST include also the authentication credential specified by the Client in the Access Token.</t>
        <t>The Access Token Request and Response MUST be confidentiality-protected and ensure authenticity. In this profile, it is RECOMMENDED to use OSCORE <xref target="RFC8613"/> between the Client and the AS, to reduce the number of libraries the client has to support. Other protocols fulfilling the security requirements defined in Sections <xref target="RFC9200" section="5" sectionFormat="bare"/> and <xref target="RFC9200" section="6" sectionFormat="bare"/> of <xref target="RFC9200"/> MAY alternatively be used, such as TLS <xref target="RFC8446"/> or DTLS <xref target="RFC9147"/>.</t>
      </section>
      <section anchor="sec-protocol-overview-token-posting">
        <name>Access Token Uploading</name>
        <t>After having retrieved the Access Token from the AS, the Client uploads the Access Token to the RS, by sending a POST request to the /authz-info endpoint and using the mechanisms specified in <xref section="5.10" sectionFormat="of" target="RFC9200"/>. When using this profile, the communication that C has with the /authz-info endpoint is not protected.</t>
        <t>If the Access Token is valid, the RS replies to the POST request with a 2.01 (Created) response. Also, the RS associates the received Access Token with the Group OSCORE Security Context identified by the Group Identifier specified in the Access Token, following <xref section="3.2" sectionFormat="of" target="RFC8613"/>. In practice, the RS maintains a collection of Security Contexts with associated authorization information, for all the clients that it is currently communicating with. The authorization information is a policy that is used as input when processing requests from those clients.</t>
        <t>Finally, the RS stores the association between i) the authorization information from the Access Token; and ii) the Group Identifier of the OSCORE group together with the Sender ID and the authentication credential of the Client in that group. This binds the Access Token to the Group OSCORE Security Context of the OSCORE group.</t>
        <t>Finally, when the Client communicates with the RS using the Group OSCORE Security Context, the RS verifies that the Client is a legitimate member of the OSCORE group and especially the exact group member with the same Sender ID associated with the Access Token. This occurs when verifying a request protected with Group OSCORE, since the request includes the Client's Sender ID and either it embeds a signature computed also over that Sender ID (if protected with the group mode), or it is protected by means of pairwise symmetric keying material derived from the asymmetric keys of the two peers (if protected with the pairwise mode).</t>
        <t>The above has considered an Access Token intended for a single RS. However, as discussed in <xref target="sec-protocol-overview-token-retrieval"/>, an Access Token can be intended for a group-audience including multiple RSs in the OSCORE group. In such a case, the Client could efficiently upload the Access Token to many or all of those RSs at once (e.g., over IP multicast), after which each RS individually performs the same steps described above.</t>
      </section>
      <section anchor="sec-protocol-overview-communication">
        <name>Secure Communication</name>
        <t>The Client can send a request protected with Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/> to the RS. This can be a unicast request targeting the RS, or a one-to-many group request (e.g., over IP multicast) targeting the OSCORE group where the RS is also a member. To this end, the Client uses the Group OSCORE Security Context already established upon joining the OSCORE group, e.g., by using the approach defined in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>. The RS may send a response back to the Client, protecting it by means of the same Group OSCORE Security Context.</t>
      </section>
    </section>
    <section anchor="sec-c-as-comm">
      <name>Client-AS Communication</name>
      <t>This section details the Access Token POST Request that the Client sends to the /token endpoint of the AS, as well as the related Access Token Response.</t>
      <t>The Access Token MUST be bound to the public key of the Client as proof-of-possession key (pop-key), which is included in the Client's authentication credential specified in the 'cnf' claim of the Access Token.</t>
      <section anchor="sec-c-as-token-endpoint">
        <name>C-to-AS: POST to Token Endpoint</name>
        <t>The Client-to-AS request is specified in <xref section="5.8.1" sectionFormat="of" target="RFC9200"/>. The Client MUST send this POST request to the /token endpoint over a secure channel that guarantees authentication, message integrity, and confidentiality.</t>
        <t>The POST request is formatted as the analogous Client-to-AS request in the OSCORE profile of ACE (see <xref section="3.1" sectionFormat="of" target="RFC9203"/>), with the following additional parameters that MUST be included in the payload.</t>
        <ul spacing="normal">
          <li>
            <t>'context_id', defined in <xref target="context_id"/> of this document. This parameter specifies the Group Identifier (GID), i.e., the ID Context of an OSCORE group that includes as members both the Client and the RS(s) in the audience for which the Access Token is asked to be issued. In particular, the Client wishes to communicate with the RS(s) in that audience using the Group OSCORE Security Context associated with that OSCORE group.</t>
          </li>
          <li>
            <t>'salt_input', defined in <xref target="salt_input"/> of this document. This parameter includes the Sender ID that the Client has in the OSCORE group whose GID is specified in the 'context_id' parameter above.</t>
          </li>
          <li>
            <t>'req_cnf', defined in <xref section="3.1" sectionFormat="of" target="RFC9201"/>. This parameter follows the syntax from <xref section="3.1" sectionFormat="of" target="RFC8747"/>, and its inner confirmation value specifies the authentication credential that the Client uses in the OSCORE group. The public key included in the authentication credential will be used as the pop-key bound to the Access Token.  </t>
            <t>
At the time of writing this specification, acceptable formats of authentication credentials in Group OSCORE are CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392"/>, X.509 certificates <xref target="RFC5280"/>, and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>.  </t>
            <t>
Further formats may be available in the future, and would be acceptable to use as long as they comply with the criteria compiled in <xref section="2.4" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>. In particular, an authentication credential has to explicitly include the public key as well as the comprehensive set of information related to the public key algorithm, including, e.g., the used elliptic curve (when applicable).  </t>
            <t>
[ As to CWTs and CCSs, the CWT Confirmation Methods 'kcwt' and 'kccs' are under pending registration requested by draft-ietf-ace-edhoc-oscore-profile. ]  </t>
            <t>
[ As to X.509 certificates, the CWT Confirmation Methods 'x5bag' and '5chain' are under pending registration requested by draft-ietf-ace-edhoc-oscore-profile. ]  </t>
            <t>
[ As to C509 certificates, the CWT Confirmation Methods 'c5b'and 'c5c' are under pending registration requested by draft-ietf-ace-edhoc-oscore-profile. ]</t>
          </li>
        </ul>
        <t>In addition, the Client computes its proof-of-possession (PoP) evidence, in order to prove to the AS the possession of its own private key used in the OSCORE group. This allows the AS to verify that the Client indeed owns the private key associated with the public key of the authentication credential that the Client allegedly uses in the OSCORE group.</t>
        <t>To this end, the Client MUST use as PoP input the byte representation of an information that uniquely represents the secure communication association between the Client and the AS. It is RECOMMENDED that the Client uses the following as PoP input.</t>
        <ul spacing="normal">
          <li>
            <t>If the Client and the AS communicate over TLS 1.2 <xref target="RFC5246"/> or DTLS 1.2 <xref target="RFC6347"/>, the PoP input is an exporter value computed as defined in <xref section="4" sectionFormat="of" target="RFC5705"/>, using the following inputs:  </t>
            <ul spacing="normal">
              <li>
                <t>The exporter label "EXPORTER-ACE-PoP-Input-Client-AS", defined in <xref target="iana-tls-exporter-label"/> of this document.</t>
              </li>
              <li>
                <t>The empty 'context value', i.e., a 'context value' of zero-length.</t>
              </li>
              <li>
                <t>32 as length value in bytes.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>If the Client and the AS communicate over TLS 1.3 <xref target="RFC8446"/> or DTLS 1.3 <xref target="RFC9147"/>, the PoP input is an exporter value computed as defined in <xref section="7.5" sectionFormat="of" target="RFC8446"/>, using the following inputs:  </t>
            <ul spacing="normal">
              <li>
                <t>The exporter label "EXPORTER-ACE-PoP-Input-Client-AS", defined in <xref target="iana-tls-exporter-label"/> of this document.</t>
              </li>
              <li>
                <t>The empty 'context_value', i.e., a 'context_value' of zero-length.</t>
              </li>
              <li>
                <t>32 as 'key_length' in bytes.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>If the Client and the AS communicate over OSCORE <xref target="RFC8613"/>, the PoP input is the output PRK of an HKDF-Extract step <xref target="RFC5869"/>, i.e., PRK = HMAC-Hash(salt, IKM).  </t>
            <t>
In particular, given the OSCORE Security Context CTX shared between the Client and the AS, then the following applies.  </t>
            <ul spacing="normal">
              <li>
                <t>'salt' takes (x1 | x2), where | denotes byte string concatenation, while x1 and x2 are defined as follows.      </t>
                <ul spacing="normal">
                  <li>
                    <t>x1 is the binary serialization of a CBOR data item. If CTX does not specify an OSCORE ID Context, the CBOR data item is the CBOR simple value <tt>null</tt> (0xf6). Otherwise, the CBOR data item is a CBOR byte string, with value the OSCORE ID Context specified in CTX.</t>
                  </li>
                  <li>
                    <t>x2 is the binary serialization of a CBOR byte string. The value of the CBOR byte string is the OSCORE Sender ID of the Client, which the Client stores in its Sender Context of CTX and the AS stores in its Recipient Context of CTX.</t>
                  </li>
                </ul>
              </li>
              <li>
                <t>'IKM' is the OSCORE Master Secret specified in CTX.</t>
              </li>
              <li>
                <t>The used HKDF is the HKDF Algorithm specified in CTX.</t>
              </li>
            </ul>
            <t>
The following shows an example of input to the HMAC-Hash() function.  </t>
            <t>
On the Client side, the OSCORE Security Context shared with the AS includes:  </t>
            <artwork><![CDATA[
o ID Context: 0x37cbf3210017a2d3 (8 bytes)

o Sender ID: 0x01 (1 byte)

o Master Secret: 0x0102030405060708090a0b0c0d0e0f10 (16 bytes)
]]></artwork>
            <t>
Then, the following holds.  </t>
            <artwork><![CDATA[
x1 (Raw value) (8 bytes)
0x37cbf3210017a2d3
]]></artwork>
            <artwork><![CDATA[
x1 (CBOR Data Item) (9 bytes)
0x4837cbf3210017a2d3
]]></artwork>
            <artwork><![CDATA[
x2 (Raw value) (1 bytes)
0x01
]]></artwork>
            <artwork><![CDATA[
x2 (CBOR Data Item) (2 bytes)
0x4101
]]></artwork>
            <artwork><![CDATA[
salt (11 bytes)
0x4837cbf3210017a2d34101
]]></artwork>
            <artwork><![CDATA[
IKM (16 bytes)
0x0102030405060708090a0b0c0d0e0f10
]]></artwork>
          </li>
        </ul>
        <t>After that, the Client computes the PoP evidence as follows.</t>
        <ul spacing="normal">
          <li>
            <t>If the OSCORE group is not a pairwise-only group, the PoP evidence MUST be a signature. The Client computes the signature by using the same private key and signature algorithm it uses for signing messages in the OSCORE group. The Client's private key is the one associated with the Client's authentication credential used in the OSCORE group and specified in the 'req_cnf' parameter above.</t>
          </li>
          <li>
            <t>If the OSCORE group is a pairwise-only group, the PoP evidence MUST be a MAC computed as follows, by using the HKDF Algorithm HKDF SHA-256, which consists of composing the HKDF-Extract and HKDF-Expand steps <xref target="RFC5869"/>.  </t>
            <t>
MAC = HKDF(salt, IKM, info, L)  </t>
            <t>
The input parameters of HKDF are as follows.  </t>
            <ul spacing="normal">
              <li>
                <t>salt takes as value the empty byte string.</t>
              </li>
              <li>
                <t>IKM is computed as a cofactor Diffie-Hellman shared secret (see Section 5.7.1.2 of <xref target="NIST-800-56A"/>), using the ECDH algorithm that is used as Pairwise Key Agreement Algorithm in the OSCORE group. The Client uses its own Diffie-Hellman private key and the Diffie-Hellman public key of the AS. For X25519 and X448, the procedure is described in <xref section="5" sectionFormat="of" target="RFC7748"/>.      </t>
                <t>
The Client's private key is the one associated with the Client's authentication credential used in the OSCORE group and specified in the 'req_cnf' parameter above. The Client may obtain the Diffie-Hellman public key of the AS during its registration process at the AS.</t>
              </li>
              <li>
                <t>info takes as value the PoP input.</t>
              </li>
              <li>
                <t>L is equal to 8, i.e., the size of the MAC, in bytes.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>Finally, the Client MUST include one of the two following parameters in the payload of the POST request to the AS.</t>
        <ul spacing="normal">
          <li>
            <t>'client_cred_verify', defined in <xref target="client_cred_verify"/> of this document, specifying the Client's PoP evidence as a signature, which is computed as defined above. This parameter MUST be included if and only if the OSCORE group is not a pairwise-only group.</t>
          </li>
          <li>
            <t>'client_cred_verify_mac', defined in <xref target="client_cred_verify_mac"/> of this document, specifying the Client's PoP evidence as a MAC, which is computed as defined above. This parameter MUST be included if and only if the OSCORE group is a pairwise-only group.</t>
          </li>
        </ul>
        <t>An example of such a request is shown in <xref target="fig-example-C-to-AS-symm"/>.</t>
        <figure anchor="fig-example-C-to-AS-symm">
          <name>Example C-to-AS POST /token Request for an Access Token Bound to an Asymmetric Key.</name>
          <artwork><![CDATA[
Header: POST (Code=0.02)
Uri-Host: "as.example.com"
Uri-Path: "token"
Content-Format: "application/ace+cbor"
Payload:
{
  "audience" : "tempSensor4711",
  "scope" : "read",
  "context_id" : h'abcd0000',
  "salt_input" : h'00',
  "req_cnf" : {
    "kccs" : {
      "sub" : "42-50-31-FF-EF-37-32-39",
      "cnf" : {
        "COSE_Key" : {
          "kty" : 2,
          "crv" : 1,
          "x" : h'd7cc072de2205bdc1537a543d53c60a6
                  acb62eccd890c7fa27c9e354089bbe13',
          "y" : h'f95e1d4b851a2cc80fff87d8e23f22af
                  b725d535e515d020731e79a3b4e47120'
        }
      }
    }
  },
  "client_cred_verify" : h'/...
   (signature content omitted for brevity)/'
}
]]></artwork>
        </figure>
        <t>In the example above, the Client specifies that its authentication credential in the OSCORE group is the CCS shown in <xref target="fig-client-auth-cred"/>.</t>
        <figure anchor="fig-client-auth-cred">
          <name>Example of Client Authentication Credential as CWT Claims Set (CCS).</name>
          <artwork><![CDATA[
{
  "sub" : "42-50-31-FF-EF-37-32-39",
  "cnf" : {
    "COSE_Key" : {
      "kty" : 2,
      "crv" : 1,
      "x" : h'd7cc072de2205bdc1537a543d53c60a6
              acb62eccd890c7fa27c9e354089bbe13',
      "y" : h'f95e1d4b851a2cc80fff87d8e23f22af
              b725d535e515d020731e79a3b4e47120'
    }
  }
}
]]></artwork>
        </figure>
        <section anchor="context_id">
          <name>'context_id' Parameter</name>
          <t>The 'context_id' parameter is an OPTIONAL parameter of the Access Token Request message defined in <xref section="5.8.1" sectionFormat="of" target="RFC9200"/>. This parameter provides a value that the Client wishes to use with the RS as a hint for a security context. Its exact content is profile specific.</t>
        </section>
        <section anchor="salt_input">
          <name>'salt_input' Parameter</name>
          <t>The 'salt_input' parameter is an OPTIONAL parameter of the Access Token Request message defined in <xref section="5.8.1" sectionFormat="of" target="RFC9200"/>. This parameter provides a value that the Client wishes to use as part of a salt with the RS, for deriving cryptographic keying material. Its exact content is profile specific.</t>
        </section>
        <section anchor="client_cred_verify">
          <name>'client_cred_verify' Parameter</name>
          <t>The 'client_cred_verify' parameter is an OPTIONAL parameter of the Access Token Request message defined in <xref section="5.8.1." sectionFormat="of" target="RFC9200"/>. This parameter provides a signature computed by the Client to prove the possession of its own private key.</t>
        </section>
        <section anchor="client_cred_verify_mac">
          <name>'client_cred_verify_mac' Parameter</name>
          <t>The 'client_cred_verify_mac' parameter is an OPTIONAL parameter of the Access Token Request message defined in <xref section="5.8.1." sectionFormat="of" target="RFC9200"/>. This parameter provides a Message Authentication Code (MAC) computed by the Client to prove the possession of its own private key.</t>
        </section>
      </section>
      <section anchor="sec-as-c-token">
        <name>AS-to-C: Access Token</name>
        <t>After having verified the POST request to the /token endpoint and that the Client is authorized to obtain an Access Token corresponding to its Access Token Request, the AS MUST verify the proof-of-possession (PoP) evidence. In particular, the AS proceeds as follows.</t>
        <ul spacing="normal">
          <li>
            <t>As PoP input, the AS uses the same value used by the Client in <xref target="sec-c-as-token-endpoint"/>.</t>
          </li>
          <li>
            <t>As public key of the Client, the AS uses the one included in the authentication credential specified in the 'req_cnf' parameter of the Access Token Request.  </t>
            <t>
This requires the AS to support the format of the authentication credential specified in the 'req_cnf' parameter, i.e., the format of authentication credential that is used in the OSCORE group where the Client uses that authentication credential. Practically, this is not an issue, since an RS supporting this profile is expected to be registered only at an AS that supports the formats of authentication credential that the RS supports.</t>
          </li>
          <li>
            <t>If the Access Token Request includes the 'client_cred_verify' parameter, this specifies the PoP evidence as a signature. Then, the AS verifies the signature by using the public key of the Client.  </t>
            <t>
This requires the AS to support the signature algorithm and curve (when applicable) that are used in the OSCORE group where the Client uses the authentication credential specified in the 'req_cnf' parameter of the Access Token Request. Practically, this is not an issue, since an RS supporting this profile is expected to be registered only at an AS that supports the signature algorithms and curves (when applicable) that the RS supports.</t>
          </li>
          <li>
            <t>If the Access Token Request includes the 'client_cred_verify_mac' parameter, this specifies the PoP evidence as a Message Authentication Code (MAC).  </t>
            <t>
Then, the AS recomputes the MAC through the same process taken by the Client when preparing the value of the 'client_cred_verify_mac' parameter for the Access Token (see <xref target="sec-c-as-token-endpoint"/>), with the difference that the AS uses its own Diffie-Hellman private key and the Diffie-Hellman public key of the Client. The verification succeeds if and only if the recomputed MAC is equal to the MAC conveyed as PoP evidence in the Access Token Request.  </t>
            <t>
This requires the AS to support the ECDH algorithm that is used as Pairwise Key Agreement Algorithm in the OSCORE group where the Client uses the authentication credential specified in the 'req_cnf' parameter of the Access Token Request. Practically, this is not an issue, since an RS supporting this profile is expected to be registered only at an AS that supports the ECDH algorithms that the RS supports.</t>
          </li>
        </ul>
        <t>If both the 'client_cred_verify' and 'client_cred_verify_mac' parameters are present, or if the verification of the PoP evidence fails, the AS considers the Client request invalid.</t>
        <t>If the Client request was invalid or not authorized, the AS returns an error response as described in <xref section="5.8.3" sectionFormat="of" target="RFC9200"/>.</t>
        <t>If all verifications are successful, the AS responds as defined in <xref section="5.8.2" sectionFormat="of" target="RFC9200"/>. In particular:</t>
        <ul spacing="normal">
          <li>
            <t>The AS can signal that the use of Group OSCORE is REQUIRED for a specific Access Token by including the 'ace_profile' parameter with the value "coap_group_oscore" in the Access Token Response. The Client MUST use Group OSCORE towards all the Resource Servers for which this Access Token is valid. Usually, it is assumed that constrained devices will be pre-configured with the necessary profile, so that this kind of profile signaling can be omitted.</t>
          </li>
          <li>
            <t>The AS MUST NOT include the 'rs_cnf' parameter defined in <xref target="RFC9201"/>. In general, the AS may not be aware of the authentication credentials (and public keys included thereof) that the RSs use in the OSCORE group. Also, the Client is able to retrieve the authentication credentials of other group members from the responsible Group Manager, both upon joining the group or later on as a group member, as defined in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>.</t>
          </li>
        </ul>
        <t>The AS MUST include the following information as metadata of the issued Access Token. The use of CBOR web tokens (CWT) as specified in <xref target="RFC8392"/> is RECOMMENDED.</t>
        <ul spacing="normal">
          <li>
            <t>The profile "coap_group_oscore". If the Access Token is a CWT, this is specified in the 'ace_profile' claim of the Access Token, as per <xref section="5.10" sectionFormat="of" target="RFC9200"/>.</t>
          </li>
          <li>
            <t>The salt input specified in the 'salt_input' parameter of the Access Token Request. If the Access Token is a CWT, the content of the 'salt_input' parameter MUST be specified in the 'salt_input' claim of the Access Token, defined in <xref target="salt_input_claim"/> of this document.</t>
          </li>
          <li>
            <t>The Context ID input specified in the 'context_id' parameter of the Access Token Request. If the Access Token is a CWT, the content of the 'context_id' parameter MUST be specified in the 'contextId_input' claim of the Access Token, defined in <xref target="contextId_input_claim"/> of this document.</t>
          </li>
          <li>
            <t>The authentication credential that the client uses in the OSCORE group and specified in the 'req_cnf' parameter of the Access Token Request.  </t>
            <t>
If the Access Token is a CWT, the Client's authentication credential MUST be specified in the 'cnf' claim, which follows the syntax from <xref section="3.1" sectionFormat="of" target="RFC8747"/>. In particular, the 'cnf' claim includes the same authentication credential specified in the 'req_cnf' parameter of the Access Token Request (see <xref target="sec-c-as-token-endpoint"/>).</t>
          </li>
        </ul>
        <t><xref target="fig-example-AS-to-C"/> shows an example of such an AS response. The Access Token has been truncated for readability.</t>
        <figure anchor="fig-example-AS-to-C">
          <name>Example AS-to-C Access Token Response with the Group OSCORE Profile.</name>
          <artwork><![CDATA[
Header: Created (Code=2.01)
Content-Type: "application/ace+cbor"
Payload:
{
  "access_token" : h'8343a1010aa2044c53/...
   (remainder of CWT omitted for brevity)/',
  "ace_profile" : "coap_group_oscore",
  "expires_in" : 3600
}
]]></artwork>
        </figure>
        <t><xref target="fig-example-AS-to-C-CWT"/> shows an example CWT Claims Set, containing the Client's public key in the group (as pop-key), as specified by the inner confirmation value in the 'cnf' claim.</t>
        <figure anchor="fig-example-AS-to-C-CWT">
          <name>Example CWT Claims Set with OSCORE Parameters.</name>
          <artwork><![CDATA[
{
  "aud" : "tempSensorInLivingRoom",
  "iat" : "1360189224",
  "exp" : "1360289224",
  "scope" :  "temperature_g firmware_p",
  "cnf" : {
    "kccs" : {
      "sub" : "42-50-31-FF-EF-37-32-39",
      "cnf" : {
        "COSE_Key" : {
          "kty" : 2,
          "crv" : 1,
          "x" : h'd7cc072de2205bdc1537a543d53c60a6
                  acb62eccd890c7fa27c9e354089bbe13',
          "y" : h'f95e1d4b851a2cc80fff87d8e23f22af
                  b725d535e515d020731e79a3b4e47120'
        }
      }
    }
  "salt_input" : h'00',
  "contextId_input" : h'abcd0000'
}
]]></artwork>
        </figure>
        <t>The same CWT Claims Set as in <xref target="fig-example-AS-to-C-CWT"/> and encoded in CBOR is shown in <xref target="fig-example-AS-to-C-CWT-encoding"/>, using the value abbreviations defined in <xref target="RFC9200"/> and <xref target="RFC8747"/>. The bytes in hexadecimal are reported in the first column, while their corresponding CBOR meaning is reported after the "#" sign on the second column, for easiness of readability.</t>
        <t>Editor's note: it should be checked (and in case fixed) that the values used below (which are not yet registered) are the final values registered by IANA.</t>
        <figure anchor="fig-example-AS-to-C-CWT-encoding">
          <name>Example CWT Claims Set with OSCORE Parameters, CBOR Encoded.</name>
          <artwork><![CDATA[
A7                                      # map(7)
   03                                   # unsigned(3)
   76                                   # text(22)
      74656D7053656E736F72496E4C6976696E67526F6F6D
      # "tempSensorInLivingRoom"
   06                                   # unsigned(6)
   1A 5112D728                          # unsigned(1360189224)
   04                                   # unsigned(4)
   1A 51145DC8                          # unsigned(1360289224)
   09                                   # unsigned(9)
   78 18                                # text(24)
      74656D70657261747572655F67206669726D776172655F70
      # "temperature_g firmware_p"
   08                                   # unsigned(8)
   A1                                   # map(1)
      05                                # unsigned(5)
      A2                                # map(2)
         02                             # unsigned(2)
         77                             # text(23)
            34322D35302D33312D46462D45462D33372D33322D3339
            # "42-50-31-FF-EF-37-32-39"
         08                             # unsigned(8)
         A1                             # map(1)
            01                          # unsigned(1)
            A4                          # map(4)
               01                       # unsigned(1)
               02                       # unsigned(2)
               20                       # negative(0)
               01                       # unsigned(1)
               21                       # negative(1)
               58 20                    # bytes(32)
                  D7CC072DE2205BDC1537A543D53C60A6
                  ACB62ECCD890C7FA27C9E354089BBE13
               22                       # negative(2)
               58 20                    # bytes(32)
                  F95E1D4B851A2CC80FFF87D8E23F22AF
                  B725D535E515D020731E79A3B4E47120
   18 3C                                # unsigned(60)
   41                                   # bytes(1)
      00
   18 3D                                # unsigned(61)
   44                                   # bytes(4)
      ABCD0000
]]></artwork>
        </figure>
        <section anchor="salt_input_claim">
          <name>Salt Input Claim</name>
          <t>The 'salt_input' claim provides a value that the Client requesting the Access Token wishes to use as a part of a salt with the RS, e.g., for deriving cryptographic material.</t>
          <t>This parameter specifies the value of the salt input, encoded as a CBOR byte string.</t>
        </section>
        <section anchor="contextId_input_claim">
          <name>Context ID Input Claim</name>
          <t>The 'contextId_input' claim provides a value that the Client requesting the Access Token wishes to use with the RS, as a hint for a security context.</t>
          <t>This parameter specifies the value of the Context ID input, encoded as a CBOR byte string.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-c-rs-comm">
      <name>Client-RS Communication</name>
      <t>This section details the POST request and response to the /authz-info endpoint between the Client and the RS.</t>
      <t>The proof-of-possession required to bind the Access Token to the Client is explicitly performed when the RS receives and verifies a request from the Client protected with Group OSCORE, either with the group mode (see <xref section="8" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>) or with the pairwise mode (see <xref section="9" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</t>
      <t>In particular, the RS uses the Client's public key bound to the Access Token, either when verifying the signature of the request (if protected with the group mode), or when verifying the request as integrity-protected with pairwise keying material derived from the two peers' authentication credentials and asymmetric keys (if protected with the pairwise mode). In either case, the RS also authenticates the Client.</t>
      <t>Similarly, when receiving a protected response from the RS, the Client uses the RS's public key either when verifying the signature of the response (if protected with the group mode), or when verifying the response as integrity-protected with pairwise keying material derived from the two peers' authentication credentials and asymmetric keys (if protected with the pairwise mode). In either case, the Client also authenticates the RS. Mutual authentication is only achieved after the client has successfully verified the protected response from the RS.</t>
      <t>Therefore, an attacker using a stolen Access Token cannot generate a valid Group OSCORE message as protected through the Client's private key, and thus cannot prove possession of the pop-key bound to the Access Token. Also, if a Client legitimately owns an Access Token but has not joined the OSCORE group, it cannot generate a valid Group OSCORE message, as it does not store the necessary keying material shared among the group members.</t>
      <t>Furthermore, a Client C1 is supposed to obtain a valid Access Token from the AS, as specifying its own authentication credential (and the public key included thereof) associated with the its own private key used in the OSCORE group, together with its own Sender ID in that OSCORE group (see <xref target="sec-c-as-token-endpoint"/>). This allows the RS receiving the Access Token to verify with the Group Manager of that OSCORE group whether such a Client indeed has that Sender ID and uses that authentication credential in the OSCORE group.</t>
      <t>As a consequence, a different Client C2, also member of the same OSCORE group, is not able to impersonate C1, by: i) getting a valid Access Token, specifying the Sender ID of C1 and a different (made-up) authentication credential; ii) successfully posting the Access Token to the RS; and then iii) attempting to communicate using Group OSCORE impersonating C1, while blaming C1 for the consequences.</t>
      <section anchor="sec-c-rs-authz">
        <name>C-to-RS POST to authz-info Endpoint</name>
        <t>The Client uploads the Access Token to the /authz-info endpoint of the RS, as defined in <xref section="5.10.1" sectionFormat="of" target="RFC9200"/>.</t>
      </section>
      <section anchor="sec-rs-c-created">
        <name>RS-to-C: 2.01 (Created)</name>
        <t>The RS MUST verify the validity of the Access Token as defined in <xref section="5.10.1" sectionFormat="of" target="RFC9200"/>, with the following additions.</t>
        <ul spacing="normal">
          <li>
            <t>The RS MUST check that the claims 'salt_input', 'contextId_input', and 'cnf' are included in the Access Token.</t>
          </li>
          <li>
            <t>The RS considers: the content of the 'contextId_input' claim as the GID of the OSCORE group; the content of the 'salt_input' claim as the Sender ID that the Client has in the group; and the inner confirmation value of the 'cnf' claim as the authentication credential that the Client uses in the group.  </t>
            <t>
The RS MUST check whether it already stores the authentication credential specified in the inner confirmation value of the 'cnf' claim as associated with the pair (GID, Sender ID) above.  </t>
            <t>
If this is not the case, the RS MUST request the Client's authentication credential to the Group Manager of the OSCORE group as described in <xref section="9.3" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore"/>, specifying the Client's Sender ID in the OSCORE group, i.e., the value of the 'salt_input' claim. Then, the RS performs the following actions.  </t>
            <ul spacing="normal">
              <li>
                <t>The RS MUST check whether the Client's authentication credential retrieved from the Group Manager matches the one retrieved from the inner confirmation value of the 'cnf' claim of the Access Token.</t>
              </li>
              <li>
                <t>The RS MUST check whether the Client's Sender ID provided by the Group Manager together with the Client's authentication credential matches the one retrieved from the 'salt_input' claim of the Access Token.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>If any of the checks above fails, the RS MUST consider the Access Token invalid, and MUST reply to the Client with an error response code equivalent to the CoAP code 4.00 (Bad Request).</t>
        <t>If the Access Token is valid and further checks on its content are successful, the RS associates the authorization information from the Access Token with the Group OSCORE Security Context.</t>
        <t>In particular, the RS associates the authorization information from the Access Token with the triple (GID, SaltInput, AuthCred), where GID is the Group Identifier of the OSCORE group, while SaltInput and AuthCred are the Sender ID and the authentication credential that the Client uses in that OSCORE group, respectively.</t>
        <t>The RS MUST keep this association up-to-date over time, as the triple (GID, SaltInput, AuthCred) associated with the Access Token might change. In particular:</t>
        <ul spacing="normal">
          <li>
            <t>If the OSCORE group is rekeyed (see <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/> and <xref section="11" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore"/>), the Group Identifier also changes in the group, and the new one replaces the current 'GID' value in the triple (GID, SaltInput, AuthCred).</t>
          </li>
          <li>
            <t>If the Client requests and obtains a new OSCORE Sender ID from the Group Manager (see <xref section="2.6.3.1" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/> and <xref section="9.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore"/>), the new Sender ID replaces the current 'SaltInput' value in the triple (GID, SaltInput, AuthCred).</t>
          </li>
        </ul>
        <t>As defined in <xref target="sec-client-public-key-change"/>, a possible change of the Client's authentication credential requires the Client to upload to the RS a new Access Token bound to the new authentication credential.</t>
        <t>Finally, the RS MUST send a 2.01 (Created) response to the Client, as defined in <xref section="5.10.1" sectionFormat="of" target="RFC9200"/>.</t>
      </section>
      <section anchor="sec-client-rs-secure-communication">
        <name>Client-RS Secure Communication</name>
        <t>When previously joining the OSCORE group, both the Client and the RS have already established the related Group OSCORE Security Context to communicate as group members. Therefore, they can simply start to securely communicate using Group OSCORE, without deriving any additional keying material or security association.</t>
        <t>If the Client or the RS delete an Access Token (e.g., when the Access Token has expired or has been revoked), it MUST NOT delete the related Group OSCORE Security Context.</t>
        <section anchor="client-side">
          <name>Client Side</name>
          <t>After having received the 2.01 (Created) response from the RS, following the POST request to the /authz-info endpoint, the Client starts the communication with the RS, by sending a request protected with Group OSCORE using the Group OSCORE Security Context <xref target="I-D.ietf-core-oscore-groupcomm"/>.</t>
          <t>When communicating with the RS to access the resources as specified by the authorization information, the Client MUST use the Group OSCORE Security Context of the pertinent OSCORE group, whose GID was specified in the 'context_id' parameter of the Access Token Request.</t>
        </section>
        <section anchor="resource-server-side">
          <name>Resource Server Side</name>
          <t>After successful validation of the Access Token as defined in <xref target="sec-rs-c-created"/> and after having sent the 2.01 (Created) response, the RS can start to communicate with the Client using Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>.</t>
          <t>When processing an incoming request protected with Group OSCORE, the RS MUST consider as valid Client's authentication credential only the one associated with the stored Access Token. As defined in <xref target="sec-client-public-key-change"/>, a possible change of the Client's authentication credential requires the Client to upload to the RS a new Access Token bound to the new authentication credential.</t>
          <t>For every incoming request, if Group OSCORE verification succeeds, the verification of access rights is performed as described in <xref target="sec-c-rs-access-rights"/>.</t>
          <t>If the RS receives a request protected with a Group OSCORE Security Context CTX, the target resource requires authorization, and the RS does not store a valid Access Token related to CTX, then the RS MUST reply with a 4.01 (Unauthorized) error response protected with CTX.</t>
        </section>
      </section>
      <section anchor="sec-c-rs-access-rights">
        <name>Access Rights Verification</name>
        <t>The RS MUST follow the procedures defined in <xref section="5.10.2" sectionFormat="of" target="RFC9200"/>. If an RS receives a request protected with Group OSCORE from a Client, the RS processes the request according to <xref target="I-D.ietf-core-oscore-groupcomm"/>.</t>
        <t>If the Group OSCORE verification succeeds, and the target resource requires authorization, the RS retrieves the authorization information from the Access Token associated with the Group OSCORE Security Context. Then, the RS MUST verify that the action requested on the resource is authorized.</t>
        <t>If the RS has no valid Access Token for the Client, the RS MUST reject the request and MUST reply to the Client with a 4.01 (Unauthorized) error response. If the RS has an Access Token for the Client but no actions are authorized on the target resource, the RS MUST reject the request and MUST reply to the Client with a 4.03 (Forbidden) error response. If the RS has an Access Token for the Client but the requested action is not authorized, the RS MUST reject the request and MUST reply to the Client with a 4.05 (Method Not Allowed) error response.</t>
      </section>
      <section anchor="sec-client-public-key-change">
        <name>Change of Client's Authentication Credential in the Group</name>
        <t>During its membership in the OSCORE group, the Client might change the authentication credential that it uses in the group. When this happens, the Client uploads the new authentication credential to the Group Manager, as defined in <xref section="9.4" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore"/>.</t>
        <t>After that, and in order to continue communicating with the RS, the Client MUST perform the following actions.</t>
        <ol spacing="normal" type="1"><li>
            <t>The Client requests a new Access Token to the AS, as defined in <xref target="sec-c-as-comm"/>. In particular, when sending the Access Token Request as defined in <xref target="sec-c-as-token-endpoint"/>, the Client specifies:  </t>
            <ul spacing="normal">
              <li>
                <t>The current Group Identifier of the OSCORE group, as value of the 'context_id' parameter.</t>
              </li>
              <li>
                <t>The current Sender ID that it has in the OSCORE group, as value of the 'salt_input' parameter.</t>
              </li>
              <li>
                <t>The new authentication credential that it uses in the OSCORE group, as inner confirmation value of the 'req_cnf' parameter.</t>
              </li>
              <li>
                <t>The proof-of-possession (PoP) evidence corresponding to the public key of the new authentication credential, as value of the 'client_cred_verify' or 'client_cred_verify_mac' parameter.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>After receiving the Access Token Response from the AS (see <xref target="sec-as-c-token"/>), the Client performs the same exchanges with the RS as defined in <xref target="sec-c-rs-comm"/>.</t>
          </li>
        </ol>
        <t>When receiving the new Access Token, the RS performs the same steps defined in <xref target="sec-rs-c-created"/>, with the following addition in case the new Access Token is successfully verified and stored. The RS also deletes the old Access Token, i.e., the one whose associated triple (GID, SaltInput, AuthCred) has the same GID and SaltInput values as in the triple including the new authentication credential of the Client and associated with the new Access Token.</t>
      </section>
    </section>
    <section anchor="sec-comm-as">
      <name>Secure Communication with the AS</name>
      <t>As specified in the ACE framework (see Sections <xref target="RFC9200" section="5.8" sectionFormat="bare"/> and <xref target="RFC9200" section="5.9" sectionFormat="bare"/> of <xref target="RFC9200"/>), the requesting entity (Client and/or RS) and the AS communicate via the /token or /introspection endpoint. The use of CoAP and OSCORE <xref target="RFC8613"/> for this communication is RECOMMENDED in this profile. Other protocols fulfilling the security requirements defined in Sections <xref target="RFC9200" section="5" sectionFormat="bare"/> and <xref target="RFC9200" section="6" sectionFormat="bare"/> of <xref target="RFC9200"/> (such as HTTP and DTLS or TLS) MAY be used instead.</t>
      <t>If OSCORE <xref target="RFC8613"/> is used, the requesting entity and the AS are expected to have a pre-established Security Context in place. How this Security Context is established is out of the scope of this profile. Furthermore, the requesting entity and the AS communicate using OSCORE through the /token endpoint as specified in <xref section="5.8" sectionFormat="of" target="RFC9200"/>, and through the /introspection endpoint as specified in <xref section="5.9" sectionFormat="of" target="RFC9200"/>.</t>
    </section>
    <section anchor="sec-discard-context">
      <name>Discarding the Security Context</name>
      <t>As members of an OSCORE group, the Client and the RS may independently leave the group or be forced to, e.g., if compromised or suspected so. Upon leaving the OSCORE group, the Client or RS also discards the Group OSCORE Security Context, which may anyway be renewed by the Group Manager through a group rekeying process (see <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</t>
      <t>The Client or RS can acquire a new Group OSCORE Security Context, by re-joining the OSCORE group, e.g., by using the approach defined in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>. In such a case, the Client SHOULD request a new Access Token to be uploaded to the RS.</t>
    </section>
    <section anchor="sec-cbor-mappings">
      <name>CBOR Mappings</name>
      <t>The new parameters defined in this document MUST be mapped to CBOR types as specified in <xref target="fig-cbor-mappings-parameters"/>, using the given integer abbreviation for the map key.</t>
      <figure anchor="fig-cbor-mappings-parameters">
        <name>CBOR Mappings for New Parameters.</name>
        <artwork align="center"><![CDATA[
+------------------------+----------+------------+
| Parameter name         | CBOR Key | Value Type |
+------------------------+----------+------------+
| context_id             | TBD      | bstr       |
| salt_input             | TBD      | bstr       |
| client_cred_verify     | TBD      | bstr       |
| client_cred_verify_mac | TBD      | bstr       |
+------------------------+----------+------------+
]]></artwork>
      </figure>
      <t>The new claims defined in this document MUST be mapped to CBOR types as specified in <xref target="fig-cbor-mappings-claims"/>, using the given integer abbreviation for the map key.</t>
      <figure anchor="fig-cbor-mappings-claims">
        <name>CBOR Mappings for New Claims.</name>
        <artwork align="center"><![CDATA[
+-----------------+----------+------------+
| Claim name      | CBOR Key | Value Type |
+-----------------+----------+------------+
| salt_input      | TBD      | bstr       |
| contextId_input | TBD      | bstr       |
+-----------------+----------+------------+
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework <xref target="RFC9200"/>. Thus, the general security considerations from the ACE framework also apply to this profile.</t>
      <t>The proof-of-possession (PoP) key bound to an Access Token is always an asymmetric key, i.e., the public key included in the authentication credential that the Client uses in the OSCORE group. This means that there is never a same shared secret used as PoP key with possible multiple RSs. Therefore, it is possible and safe for the AS to issue an Access Token for an audience that includes multiple RSs (i.e., a group-audience, see <xref section="6.9" sectionFormat="of" target="RFC9200"/>).</t>
      <t>In such a case, as per <xref section="6.1" sectionFormat="of" target="RFC9200"/>, the AS has to ensure the integrity protection of the Access Token by protecting it through an asymmetric signature. In addition, the used group-audience has to correctly identify all the RSs that are intended recipients of the Access Token, and for which the single scope specified in the Access Token applies. As a particular case, the audience can be the name of the OSCORE group, if the Access Token is intended for all the RSs in that group.</t>
      <t>Furthermore, this document inherits the general security considerations about Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>, as to the specific use of Group OSCORE according to this profile.</t>
      <t>Group OSCORE is designed to secure point-to-point as well as point-to-multipoint communications, providing a secure binding between a single request and multiple corresponding responses. In particular, Group OSCORE fulfills the same security requirements of OSCORE.</t>
      <t>Group OSCORE ensures source authentication of messages both in group mode (see <xref section="8" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>) and in pairwise mode (see <xref section="9" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</t>
      <t>When protecting an outgoing message in group mode, the sender uses its private key to compute a digital signature, which is embedded in the protected message. The group mode can be used to protect messages sent to multiple recipients (e.g., over IP multicast) or to a single recipient.</t>
      <t>When protecting an outgoing message in pairwise mode, the sender uses a pairwise symmetric key, as derived from the asymmetric keys of the two peers exchanging the message. The pairwise mode can be used to protect only messages intended for a single recipient.</t>
    </section>
    <section anchor="sec-privacy-considerations">
      <name>Privacy Considerations</name>
      <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework <xref target="RFC9200"/>. Thus the general privacy considerations from the ACE framework also apply to this profile.</t>
      <t>As this profile uses Group OSCORE, the privacy considerations from <xref target="I-D.ietf-core-oscore-groupcomm"/> apply to this document as well.</t>
      <t>An unprotected response to an unauthorized request may disclose information about the RS and/or its existing relationship with the Client. It is advisable to include as little information as possible in an unencrypted response. However, since both the Client and the RS share a Group OSCORE Security Context, unauthorized, yet protected requests are followed by protected responses, which can thus include more detailed information.</t>
      <t>Although it may be encrypted, the Access Token is sent in the clear to the /authz-info endpoint at the RS. Thus, if the Client uses the same single Access Token from multiple locations with multiple Resource Servers, it can risk being tracked through the Access Token's value.</t>
      <t>Note that, even though communications are protected with Group OSCORE, some information might still leak, due to the observable size, source address, and destination address of exchanged messages.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document has the following actions for IANA.</t>
      <t>Note to RFC Editor: Please replace "[RFC-XXXX]" with the RFC number of this document and delete this paragraph.</t>
      <section anchor="iana-ace-oauth-profile">
        <name>ACE Profile Registry</name>
        <t>IANA is asked to add the following entry to the "ACE Profile" registry within the "Authentication and Authorization for Constrained Environments (ACE)" registry group, following the procedure specified in <xref section="8.8" sectionFormat="of" target="RFC9200"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Name: coap_group_oscore</t>
          </li>
          <li>
            <t>Description: Profile to secure communications between constrained nodes using the Authentication and Authorization for Constrained Environments framework, by enabling authentication and fine-grained authorization of members of an OSCORE group that use a pre-established Group OSCORE Security Context to communicate with Group OSCORE.</t>
          </li>
          <li>
            <t>CBOR Value: TBD (value between 1 and 255)</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-oauth-params">
        <name>OAuth Parameters Registry</name>
        <t>IANA is asked to add the following entries to the "OAuth Parameters" registry, following the procedure specified in <xref section="11.2" sectionFormat="of" target="RFC6749"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Name: "context_id"</t>
          </li>
          <li>
            <t>Parameter Usage Location: token request</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="context_id"/> of [RFC-XXXX]</t>
          </li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>
            <t>Name: "salt_input"</t>
          </li>
          <li>
            <t>Parameter Usage Location: token request</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="salt_input"/> of [RFC-XXXX]</t>
          </li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>
            <t>Name: "client_cred_verify"</t>
          </li>
          <li>
            <t>Parameter Usage Location: token request</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="client_cred_verify"/> of [RFC-XXXX]</t>
          </li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>
            <t>Name: "client_cred_verify_mac"</t>
          </li>
          <li>
            <t>Parameter Usage Location: token request</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="client_cred_verify_mac"/> of [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-token-cbor-mappings">
        <name>OAuth Parameters CBOR Mappings Registry</name>
        <t>IANA is asked to add the following entries to the "OAuth Parameters CBOR Mappings" registry within the "Authentication and Authorization for Constrained Environments (ACE)" registry group, following the procedure specified in <xref section="8.10" sectionFormat="of" target="RFC9200"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Name: "context_id"</t>
          </li>
          <li>
            <t>CBOR Key: TBD</t>
          </li>
          <li>
            <t>Value Type: bstr</t>
          </li>
          <li>
            <t>Reference: <xref target="context_id"/> of [RFC-XXXX]</t>
          </li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>
            <t>Name: "salt_input"</t>
          </li>
          <li>
            <t>CBOR Key: TBD</t>
          </li>
          <li>
            <t>Value Type: bstr</t>
          </li>
          <li>
            <t>Reference: <xref target="salt_input"/> of [RFC-XXXX]</t>
          </li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>
            <t>Name: "client_cred_verify"</t>
          </li>
          <li>
            <t>CBOR Key: TBD</t>
          </li>
          <li>
            <t>Value Type: bstr</t>
          </li>
          <li>
            <t>Reference: <xref target="client_cred_verify"/> of [RFC-XXXX]</t>
          </li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>
            <t>Name: "client_cred_verify_mac"</t>
          </li>
          <li>
            <t>CBOR Key: TBD</t>
          </li>
          <li>
            <t>Value Type: bstr</t>
          </li>
          <li>
            <t>Reference: <xref target="client_cred_verify_mac"/> of [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-token-cwt-claims">
        <name>CBOR Web Token (CWT) Claims Registry</name>
        <t>IANA is asked to add the following entries to the "CBOR Web Token (CWT) Claims" registry, following the procedure specified in <xref section="9.1" sectionFormat="of" target="RFC8392"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: "salt_input"</t>
          </li>
          <li>
            <t>Claim Description: Client provided salt input</t>
          </li>
          <li>
            <t>JWT Claim Name: "N/A"</t>
          </li>
          <li>
            <t>Claim Key: TBD</t>
          </li>
          <li>
            <t>Claim Value Type(s): bstr</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="salt_input_claim"/> of [RFC-XXXX]</t>
          </li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: "contextId_input"</t>
          </li>
          <li>
            <t>Claim Description: Client context id input</t>
          </li>
          <li>
            <t>JWT Claim Name: "N/A"</t>
          </li>
          <li>
            <t>Claim Key: TBD</t>
          </li>
          <li>
            <t>Claim Value Type(s): bstr</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="contextId_input_claim"/> of [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-tls-exporter-label">
        <name>TLS Exporter Label Registry</name>
        <t>IANA is asked to add the following entry to the "TLS Exporter Label" registry within the "Transport Layer Security (TLS) Parameters" registry group, following the procedure specified in <xref section="6" sectionFormat="of" target="RFC5705"/> and updated in <xref section="12" sectionFormat="of" target="RFC8447"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Value: EXPORTER-ACE-PoP-Input-Client-AS</t>
          </li>
          <li>
            <t>DTLS-OK: Y</t>
          </li>
          <li>
            <t>Recommended: N</t>
          </li>
          <li>
            <t>Reference: <xref target="sec-c-as-token-endpoint"/> of [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.ietf-core-groupcomm-bis">
          <front>
            <title>Group Communication for the Constrained Application Protocol (CoAP)</title>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <author fullname="Chonggang Wang" initials="C." surname="Wang">
              <organization>InterDigital</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This document specifies the use of the Constrained Application
   Protocol (CoAP) for group communication, including the use of UDP/IP
   multicast as the default underlying data transport.  Both unsecured
   and secured CoAP group communication are specified.  Security is
   achieved by use of the Group Object Security for Constrained RESTful
   Environments (Group OSCORE) protocol.  The target application area of
   this specification is any group communication use cases that involve
   resource-constrained devices or networks that support CoAP.  This
   document replaces and obsoletes RFC 7390, while it updates RFC 7252
   and RFC 7641.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-groupcomm-bis-10"/>
        </reference>
        <reference anchor="I-D.ietf-core-oscore-groupcomm">
          <front>
            <title>Group Object Security for Constrained RESTful Environments (Group OSCORE)</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Jiye Park" initials="J." surname="Park">
              <organization>Universitaet Duisburg-Essen</organization>
            </author>
            <date day="2" month="September" year="2023"/>
            <abstract>
              <t>   This document defines the security protocol Group Object Security for
   Constrained RESTful Environments (Group OSCORE), providing end-to-end
   security of CoAP messages exchanged between members of a group, e.g.,
   sent over IP multicast.  In particular, the described protocol
   defines how OSCORE is used in a group communication setting to
   provide source authentication for CoAP group requests, sent by a
   client to multiple servers, and for protection of the corresponding
   CoAP responses.  Group OSCORE also defines a pairwise mode where each
   member of the group can efficiently derive a symmetric pairwise key
   with any other member of the group for pairwise OSCORE communication.
   Group OSCORE can be used between endpoints communicating with CoAP or
   CoAP-mappable HTTP.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-groupcomm-20"/>
        </reference>
        <reference anchor="I-D.ietf-ace-key-groupcomm-oscore">
          <front>
            <title>Key Management for OSCORE Groups in ACE</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Jiye Park" initials="J." surname="Park">
              <organization>Universitaet Duisburg-Essen</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="6" month="March" year="2023"/>
            <abstract>
              <t>   This document defines an application profile of the ACE framework for
   Authentication and Authorization, to request and provision keying
   material in group communication scenarios that are based on CoAP and
   are secured with Group Object Security for Constrained RESTful
   Environments (Group OSCORE).  This application profile delegates the
   authentication and authorization of Clients, that join an OSCORE
   group through a Resource Server acting as Group Manager for that
   group.  This application profile leverages protocol-specific
   transport profiles of ACE to achieve communication security, server
   authentication and proof-of-possession for a key owned by the Client
   and bound to an OAuth 2.0 Access Token.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-key-groupcomm-oscore-16"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC5705">
          <front>
            <title>Keying Material Exporters for Transport Layer Security (TLS)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="March" year="2010"/>
            <abstract>
              <t>A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes. This document describes a general mechanism for allowing that. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5705"/>
          <seriesInfo name="DOI" value="10.17487/RFC5705"/>
        </reference>
        <reference anchor="RFC5869">
          <front>
            <title>HMAC-based Extract-and-Expand Key Derivation Function (HKDF)</title>
            <author fullname="H. Krawczyk" initials="H." surname="Krawczyk"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="May" year="2010"/>
            <abstract>
              <t>This document specifies a simple Hashed Message Authentication Code (HMAC)-based key derivation function (HKDF), which can be used as a building block in various protocols and applications. The key derivation function (KDF) is intended to support a wide range of applications and requirements, and is conservative in its use of cryptographic hash functions. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5869"/>
          <seriesInfo name="DOI" value="10.17487/RFC5869"/>
        </reference>
        <reference anchor="RFC6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7748">
          <front>
            <title>Elliptic Curves for Security</title>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="M. Hamburg" initials="M." surname="Hamburg"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="January" year="2016"/>
            <abstract>
              <t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS). These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7748"/>
          <seriesInfo name="DOI" value="10.17487/RFC7748"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8447">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy. These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="RFC8747">
          <front>
            <title>Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>This specification describes how to declare in a CBOR Web Token (CWT) (which is defined by RFC 8392) that the presenter of the CWT possesses a particular proof-of-possession key. Being able to prove possession of a key is also sometimes described as being the holder-of-key. This specification provides equivalent functionality to "Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)" (RFC 7800) but using Concise Binary Object Representation (CBOR) and CWTs rather than JavaScript Object Notation (JSON) and JSON Web Tokens (JWTs).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8747"/>
          <seriesInfo name="DOI" value="10.17487/RFC8747"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="RFC9200">
          <front>
            <title>Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)</title>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a framework for authentication and authorization in Internet of Things (IoT) environments called ACE-OAuth. The framework is based on a set of building blocks including OAuth 2.0 and the Constrained Application Protocol (CoAP), thus transforming a well-known and widely used authorization solution into a form suitable for IoT devices. Existing specifications are used where possible, but extensions are added and profiles are defined to better serve the IoT use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9200"/>
          <seriesInfo name="DOI" value="10.17487/RFC9200"/>
        </reference>
        <reference anchor="RFC9201">
          <front>
            <title>Additional OAuth Parameters for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines new parameters and encodings for the OAuth 2.0 token and introspection endpoints when used with the framework for Authentication and Authorization for Constrained Environments (ACE). These are used to express the proof-of-possession (PoP) key the client wishes to use, the PoP key that the authorization server has selected, and the PoP key the resource server uses to authenticate to the client.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9201"/>
          <seriesInfo name="DOI" value="10.17487/RFC9201"/>
        </reference>
        <reference anchor="RFC9203">
          <front>
            <title>The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="M. Gunnarsson" initials="M." surname="Gunnarsson"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework. It utilizes Object Security for Constrained RESTful Environments (OSCORE) to provide communication security and proof-of-possession for a key owned by the client and bound to an OAuth 2.0 access token.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9203"/>
          <seriesInfo name="DOI" value="10.17487/RFC9203"/>
        </reference>
        <reference anchor="NIST-800-56A" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf">
          <front>
            <title>Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography - NIST Special Publication 800-56A, Revision 3</title>
            <author initials="E." surname="Barker" fullname="Elaine Barker">
              <organization/>
            </author>
            <author initials="L." surname="Chen" fullname="Lily Chen">
              <organization/>
            </author>
            <author initials="A." surname="Roginsky" fullname="Allen Roginsky">
              <organization/>
            </author>
            <author initials="A." surname="Vassilev" fullname="Apostol Vassilev">
              <organization/>
            </author>
            <author initials="R." surname="Davis" fullname="Richard Davis">
              <organization/>
            </author>
            <date year="2018" month="April"/>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.tiloca-core-oscore-discovery">
          <front>
            <title>Discovery of OSCORE Groups with the CoRE Resource Directory</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>Consultant</organization>
            </author>
            <date day="8" month="September" year="2023"/>
            <abstract>
              <t>   Group communication over the Constrained Application Protocol (CoAP)
   can be secured by means of Group Object Security for Constrained
   RESTful Environments (Group OSCORE).  At deployment time, devices may
   not know the exact security groups to join, the respective Group
   Manager, or other information required to perform the joining
   process.  This document describes how a CoAP endpoint can use
   descriptions and links of resources registered at the CoRE Resource
   Directory to discover security groups and to acquire information for
   joining them through the respective Group Manager.  A given security
   group may protect multiple application groups, which are separately
   announced in the Resource Directory as sets of endpoints sharing a
   pool of resources.  This approach is consistent with, but not limited
   to, the joining of security groups based on the ACE framework for
   Authentication and Authorization in constrained environments.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tiloca-core-oscore-discovery-14"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50% while also significantly reducing memory and code size
   compared to ASN.1.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 Certificate Signing Requests, C509 COSE headers, a
   C509 TLS certificate type, and a C509 file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-09"/>
        </reference>
        <reference anchor="I-D.ietf-ace-edhoc-oscore-profile">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving
   mutual authentication between an OAuth 2.0 Client and Resource
   Server, and it binds an authentication credential of the Client to an
   OAuth 2.0 access token.  EDHOC also establishes an Object Security
   for Constrained RESTful Environments (OSCORE) Security Context, which
   is used to secure communications when accessing protected resources
   according to the authorization information indicated in the access
   token.  This profile can be used to delegate management of
   authorization information from a resource-constrained server to a
   trusted host with less severe limitations regarding processing power
   and memory.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-edhoc-oscore-profile-03"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9202">
          <front>
            <title>Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="S. Gerdes" initials="S." surname="Gerdes"/>
            <author fullname="O. Bergmann" initials="O." surname="Bergmann"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a profile of the Authentication and Authorization for Constrained Environments (ACE) framework that allows constrained servers to delegate client authentication and authorization. The protocol relies on DTLS version 1.2 or later for communication security between entities in a constrained network using either raw public keys or pre-shared keys. A resource-constrained server can use this protocol to delegate management of authorization information to a trusted host with less-severe limitations regarding processing power and memory.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9202"/>
          <seriesInfo name="DOI" value="10.17487/RFC9202"/>
        </reference>
        <reference anchor="RFC9431">
          <front>
            <title>Message Queuing Telemetry Transport (MQTT) and Transport Layer Security (TLS) Profile of Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="C. Sengul" initials="C." surname="Sengul"/>
            <author fullname="A. Kirby" initials="A." surname="Kirby"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework to enable authorization in a publish-subscribe messaging system based on Message Queuing Telemetry Transport (MQTT). Proof-of-Possession keys, bound to OAuth 2.0 access tokens, are used to authenticate and authorize MQTT Clients. The protocol relies on TLS for confidentiality and MQTT server (Broker) authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9431"/>
          <seriesInfo name="DOI" value="10.17487/RFC9431"/>
        </reference>
        <reference anchor="NIST-800-207" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf">
          <front>
            <title>Zero Trust Architecture - NIST Special Publication 800-207</title>
            <author initials="S." surname="Rose" fullname="Scott Rose">
              <organization/>
            </author>
            <author initials="O." surname="Borchert" fullname="Oliver Borchert">
              <organization/>
            </author>
            <author initials="S." surname="Mitchell" fullname="Stu Mitchell">
              <organization/>
            </author>
            <author initials="S." surname="Connelly" fullname="Sean Connelly">
              <organization/>
            </author>
            <date year="2020" month="August"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="profile-requirements">
      <name>Profile Requirements</name>
      <t>This appendix lists the specifications of this profile based on the requirements of the ACE framework, as requested in <xref section="C" sectionFormat="of" target="RFC9200"/>.</t>
      <ul spacing="normal">
        <li>
          <t>Optionally, define new methods for the Client to discover the necessary permissions and AS for accessing a resource, different from the one proposed in <xref target="RFC9200"/>: Not specified.</t>
        </li>
        <li>
          <t>Optionally, specify new grant types: Not specified.</t>
        </li>
        <li>
          <t>Optionally, define the use of client certificates as client credential type: Not specified.</t>
        </li>
        <li>
          <t>Specify the communication protocol the Client and RS must use: CoAP.</t>
        </li>
        <li>
          <t>Specify the security protocol the Client and RS must use to protect their communication: Group OSCORE, by using a pre-established Group OSCORE Security Context.</t>
        </li>
        <li>
          <t>Specify how the Client and the RS mutually authenticate: Explicitly, by possession of a common Group OSCORE Security Context, and by either: usage of digital signatures embedded in messages, if protected with the group mode of Group OSCORE; or protection of messages with the pairwise mode of Group OSCORE, by using pairwise symmetric keys derived from the asymmetric keys of the two peers exchanging the message. Note that mutual authentication is not completed before the Client has verified a Group OSCORE response using the corresponding Group OSCORE Security Context.</t>
        </li>
        <li>
          <t>Specify the proof-of-possession protocol(s) and how to select one, if several are available. Also specify which key types (e.g., symmetric/asymmetric) are supported by a specific proof-of- possession protocol: Group OSCORE algorithms; asymmetric keys verified and distributed by a Group Manager.</t>
        </li>
        <li>
          <t>Specify a unique ace_profile identifier: coap_group_oscore.</t>
        </li>
        <li>
          <t>If introspection is supported, specify the communication and security protocol for introspection: HTTP/CoAP (+ TLS/DTLS/OSCORE).</t>
        </li>
        <li>
          <t>Specify the communication and security protocol for interactions between client and AS: HTTP/CoAP (+ TLS/DTLS/OSCORE).</t>
        </li>
        <li>
          <t>Specify if/how the authz-info endpoint is protected, including how error responses are protected: Not protected.</t>
        </li>
        <li>
          <t>Optionally, define other methods of token transport than the authz-info endpoint: Not defined.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-document-updates" removeInRFC="true">
      <name>Document Updates</name>
      <section anchor="sec-00-01">
        <name>Version -00 to -01</name>
        <ul spacing="normal">
          <li>
            <t>Deleting an Access Token does not delete the Group OSCORE Security Context.</t>
          </li>
          <li>
            <t>Distinct computation of the PoP input when C and the AS use (D)TLS 1.2 or 1.3.</t>
          </li>
          <li>
            <t>Revised computation of the PoP input when C and the AS use OSCORE.</t>
          </li>
          <li>
            <t>Revised computation of the PoP evidence when the OSCORE group is a pairwise-only group.</t>
          </li>
          <li>
            <t>Clarified requirements on the AS for verifying the PoP evidence.</t>
          </li>
          <li>
            <t>Renamed the TLS Exporter Label for computing the PoP input.</t>
          </li>
          <li>
            <t>Editorial fixes and improvements.</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowldegment">
      <name>Acknowledgments</name>
      <t><contact fullname="Ludwig Seitz"/> contributed as a co-author of initial versions of this document.</t>
      <t>The authors sincerely thank <contact fullname="Christian Amsüss"/>, <contact fullname="Benjamin Kaduk"/>, <contact fullname="John Preuß Mattsson"/>, <contact fullname="Dave Robin"/>, <contact fullname="Jim Schaad"/>, and <contact fullname="Göran Selander"/> for their comments and feedback.</t>
      <t>The work on this document has been partly supported by VINNOVA and the Celtic-Next project CRITISEC; and by the H2020 project SIFIS-Home (Grant agreement 952652).</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+19aXfb2JXgd/0KHPmctpSQNEntqk6foSm5rI63EVWpyiR9
3CAISohJgAFAyUqV56/Mv+hP8y1/bO72VgBcbFeluqeVnLJEAm+57767L+12
e+f+PDjY2SmTchafB8HNXRx8m2fLRfB2/Jc4KoNRHC3zpHwMplkeDLO0KPMw
SeNJcH05upkuZ8Flep/kWTqP07II9uTd0fDt9eV+8C7PpsksDrJpUMLAgyX8
Ny2TKCyTLA3CdEIfZXnyN/7En8MdezCEIV/k4Tx+yPIPO+F4nMewentKe0Z4
fGeSRSk8fx5M8nBatpO4nLbDKG7f4jvtrIiyPG4v+J32LCzjotzZ2XkSFCUs
7n04y1J4t8yX8c5Ossjp16Lsd7tn3f5OmMfhuYbPzsPtOU4ZfA9rS9JbXtbO
h4fz4Cot4zyNy/YFLmIHdn8OE0x2iuV4nhQFbLx8XMA8V5c3L3Z2omwCr58H
S1jq6c4igUMJgidBFKbBsoiDMM/Dx2AvmQbhbBY8xsV+AEC7C4u74C7OYZ1B
UGbROX4DvxZZXubxtDinMSbxNFzOAJRlpr5/nPPX+OdOSIdxvhPQT1v+DYIk
hSded4KbZJZFof6YIfs6zKPM/yrLYQfXV6PLYPBcfwjHGsew96sinP4lyyfF
bQhgDvp9/UQEgDwPfp8A+M1n2QRmGV22e8eHh91gBLv7cJfN5tYDy7TM4b3R
QzyJU/15PA+T2Xkwx/V1Slrf/8iTThHX7++6E7z8+3/czpbpxNvhdfIhzCfV
b39Fm8xpiZ27jFa4apsvOsE7wOv5OEkTb59wtdIoLqKw5gna62WeREUB97Rm
vzdZXtyF81Tt9+Bn3e9ULbWzUEv9H7GsrhNlc7jEaZbPgarcx4jPV+2LDl1+
uvB0++GpeXucFNWvhSzop5wnkHp8iB+tMfhxfOj6xbDf653Jr0f9w2P160n3
SP16eqweOD44PFG/nhyqT0/6R33168nhqfx62js5VL8enKkHTo97B+rXQz3Y
6Yn59UyPe9bV48Kv6rUzIGbm1575lR54czW6aZ92u+2j4wGThZUk4rITPA/z
D3HuIdblDMm5+5336qtOMLyzzplffJXMHu3PvZcGneA6u4VfPzx6Lw5mszj1
v6y+/YcQyO8svvffXmRFmc38r6sE4yK8T4oKtYjukFyY74S3XseILnE6Mbzu
XZjk7e8TIOu/B5S6hBsyniXFHfK7YBTdxfO4CL4rkJtcJEWUx2UcvMpuQ+A3
d/NgmD8uyuw2Dxd3j0GbzioYLeIoCWfBuyUMJGxWzq8FC4AV4Sd8N2EdsCo4
9NN295AXGua3eJfvynJRnD97lt7PFstx0Unh7nZus/tn+At+8kzmsaYpnuEC
OqN3HZkvP+gsJlPgm+nUv4lMjJ3LNoH9Zfcx3Hj3OhZxOxpneTtOkWRM2lGc
l5X7GE/ussjj5voSnnbNDVH38aynbwigur4Whwc9B+v73ZMNsH6EWKjJrUKD
UZSVpf2F99ZbuCtZDmecl96bb2cAqtz/tjrp66SEB2Yzf+Jy6X9VfReErBS+
96/NKAbS7XwnuPu/4hx4PAo/wQCWlZQgGi7zeB3aAQAdVOt3293Tr4xqMAcj
GkqWJeHP6PLVi/Ng909wpu0f4Offdnd22u12EI5RsoxAxLu5S4oAhMMlXbUC
p5gmcNnCQNCHrufXklmnSmbtkHytpgBxrviKwjYIdTDyfTKJAyQ0y1StuVCj
juPyIQa6GAbDWYIbx92AiIsS5BwEw2QBq7qOi2yZRzEsJgc8BGHxLoQn4bDn
8XyMH4BsDWgiAjfxQXdfNF8MlBvY8qSgZxFkQb/TDQYRsO0CpIUPsA5YMYJ4
QUcbAFdVioJaHrBzOPsSAPAAJI8fzpN7+ISeBgBOgvEjr1DeSVJ6rHl1NtT5
IVhGCDgd3+PScc90382ht2AhwQNcCfwXhsmmbfg/8AgYqVAoYJb9tLB21AFW
VGStICnV4cgQ7lbhHYHuXbJQcLH3gNtEcCIvILT04KipLC4nz+b0kLNLjVuA
V2X8sWzBI8sCtYjsQY3qnf1eQVgFvyXTx8bVLhcwZx5HcXKP44TwXVGEtwRx
pBPq9JzV6DXyiJ3gcjqFZ4HyzR5bctB8XnEKTBGgNoWLAFIX34eQtx/BVnJg
1Avgo2oaxj6BmnMRWogc8CZI5Sg9GpyyqBugVxrhPSg6TDPmyWQyi1EnvMK5
JsuIYPwk+PFJgh982tkZBOkSoUEXY7HQZCqgS4BEo241wRwY2ix4QK3N3EhU
82RzIbwvx3EH8gijevM1hSuQwa5aQdy57bQCZKbB1Tt+IQqBqgY3jwv4bRbE
H8M57pAudfGAvAIPDlY/W86TFMSLuACcBwofliDVKyi3iFwAoy7zZLykLcAr
RTYtH3Cg5QKpfNFhRPNpkFxLgQNschyrS0f7At0hZ+wp4hLHhbuDfwNKA/aF
MPnDHQhWAZDtkrcBoJUbNWEU/EsGWoAgMt/7nZ0XcDOLbE72gGIJ79vnQ7dy
HiJdDP6Ch48ohggf42WKYh/LEHsCIsm3dyU88YBi3hQ0bxgMaQycQIKASx81
ARNOAUuEYXGBZnUt0NcRC+GLbFyGDoAqm1cQA1oSJHPcAvDlR2/8RZwjEaAF
hIymSLnhL41IRLofBWecQwFClSrM8BBZcJTgpybXUwsuI0iYejKlTBB/i4RG
m+GXuJ8iihG7spaMiJPTl+PlbMzoiB8JRtORz/gjINo5XV3QCulGpbhA/E19
i1T3DnkZYohFV67wEfgMrkDMB05LBWCq006zEgD012WC93AySXBDcEvcDcaI
aHhcRLgQhvaSYOApjo27BpxZoBwfC+OER+E+5IgOfLhMOulZPE73DPk6BiJp
ZFM+LwJSC9k0PAKSXfQB95jkaKcql0iqXmYPcJVyInGTBGhpzswQDVmAxA34
j4CCT/IsxK/GQDNwWQgQ4FNJjrsg5mdGtLfAJwZUEHQaWP2U7FAwhHlaLlCO
yyerk0JEWlAG0+fuiJ0Ab6xadktuIhGG6l30KDkwHpD/PT6hNpcU6ownCu3L
hwzWrNgf2tYQRxCYA0TeaZIXpaANo5u+D5qTq9UgdOdhXgag13wo6PLhkgtN
nN2LT9h/rudA6x8OwSirCHjoIT1gAhx9Mpu0GHVg3YwyWQqU4K9L0J1oDkYJ
JV5Yy/pG7hOSWFj4ZIt5F2FOT7gTj+EAZWJEVlB709t49RrgfJc5HTvQhmQW
5i7DjJCD5QwrIcIkoMNABqmAQdDQQO7EfErwJdgWSgZIiyx/plgYYPN9EiFT
4y3iAuYZLrLmrJTERmzDRXfkFXDLiBRrtLdOGU+iE7yMCXVhEmTXBdGaRY7v
IQ9n+qEnZdgjWEGVjwkyCEt5ClEeHzTXBrk8PaWJZFywggRIAHiFJL+M5wsa
3+IJaZa2i3AK5w2fMLQVogs2MKaPl4BhtLZlmYk8qcg2Qh02rcUaW0FoBUuA
Rm4dU5TkoF4J/WlpnmoemAFI6OqAzJVprQfultk1ypQAMxQlACoV6vB8MExj
pFWLWfbIOhFspUhwIVpQimYhCuoG0QuD6WQjnDF5VaR3b9jbpzOASw/YB2pq
Gj3iTYVTDEExhgf6+6RSoGIQDHta82DKad9MAE+O+liotiAHGwz7+tbBJUtm
zArx6HIEb5ICqSruLAqDsgVs7w5WGucaYlrqOA+SfSYEeuQCZKpsOZuQ3EDs
CHjNhOQcnAwEvWS+nBuqWD0O4a4a04BZESWHWfAyk8y4LA0ECuSCaRzDrfiG
IJjAohgntcRRkHxHGhfySV4z7qqtp1Wn3dpgQwq9ibepF/mGPKBZTR0GcVp4
3qy1E3yb4FXGHRqcnIcfCSrClMtHl/RoBFqljDzQImOjzwB+zROGevwRhGMl
OtO2CVAaz6pQYCDA0oWGGXUcaN4UCEmDEMjcPuKbHjyP8VawxMvrE4qEXBNN
b+k0uV0iGsAFg6nhFsLH8CfPymgLGFOCNs5ieu2Z0WYQNwgx5HYJXIDcXDG4
ic2yuAEEJ+bxZvEtjI4Srysm4YgF0HBHsvcFZHX3iuUC1HIGBMqejyQ9AfcC
FWhJ3MYWSFA4BL0qnLT8IxQFvFmVJGaHxIA2XfuylrmLRRjFRlcZP9ZKBQq5
c/RwpADEW1FyihjWTzaQSYZfId0m8xUx4+Q2ta0jtiYLb02S23nw44+2QfPT
J6VKTbOIbCGkvctaRWVXli7iBoUiBIAyiBSMgeQJJbij3Al7CIm9GeUEeUmp
GSACJ0mXtKP4PpwtcUcknZvTabmKuFoJwuk+m4FguUtEK/mbJQ86MuUeI32B
9saQZRJA5WUZ2ww0nTgyxzNUWvBi7WtZCq5TgeoO2eTkjYKkDtQBSrQUEttH
UmctxTIS2bu1bUn4MI4mN1bhNA9bshilrXXohED0A0oRk3wuuAsEOwZ1fhe0
W5alUOxtVY6ZbuiMJe+77MFHj9uMrw1selfRgmVq0RIDYA1NBSr0zgFrFbyb
hx/URrybYItwABXEEb6FBW6uSICI77ZoBUo6mMUhG2HuQVK9jQthJzZh43ls
o4IFERZoynjB36GRF5hbxNYf1A5FkSYRSeiEmHWQS9tCppwCX06UTOgQHDGU
hGOXomg9jCZPUgAFgBa5xozUcHK/o/JiFE2fliHElZElJrgDaQ1v48ptSaY2
0EXJAjChMUHEPxRx0B5MorksSjg+HS1Sd+ZM9Jy2yomiEk5RIGFyoR+6Cwtt
zQgrqqFDklBkSeMHH0ivAWEzgVJc2T8AlTQLJdATWSTFEnUOPG4YUvRN1oKV
fq2VyLcwOFw+2bA1AsIjhSXdwioR/ZBeIQ9FhqwFY4K5oBsKmsS5FKNwWf8j
IMF0Fn+ksTzsZ/ueIJwgOMNF8LYI5xrSYzQoaOPu1/Q5AGEQP++nT7aVSomt
cpysioolyrV9RHlMBAqEKHXl6CayH8C2RLOJEGhDFk5Q1BBWWGNWdljfOJ6i
5m70HSKKSsHStJsYX0xBNmZ3AOP4Fg2PZD0RXqmNx8rFIyQwUyzdYeaFdozY
vgdUkKtrN1ec6YGouAoDZd5C4o8w4oYOCLarjqH/6ZP69UD9enjQw1/XOjWB
qqN2wEw7tFgFMMssQtkDjxdQDoWhccwOEvYLITNFCtgus/YcpSIlZZGtHkVa
JHFi/ytI6a5YkJv9ZgiD3SgLF+9p2Pe87F19DioAzD66lm/7JmmEjsBC7YFl
d3mntrk3zAbv9hmkGC/hAK8a4gFgQ7uZPnMxGH2u58s2BQnRQ+Z4F+ZK0yOn
G7EHg7wBwe5n8v352/dDWAACYWFkWhdnDH4obABEYJYx2fJqsOkjKS0mgzAk
er7BCEykURxJsmUBHBOZTDwx1NJx6yE6CjUrbdiCohMB94z50vuGw8LQYoS0
8YUSr0uYIMq8npuzpRRXEsOURGmcM2yZUchCJC4sPR8kvYwT2+4Kx9NX3sE/
t3dKiViwGinI8ppEARKhHNqyNj4J70D4Ab2PM1RHhOSW1qIU2CZGdpKLzmQd
PkCtThn1omwh99qAXii0QBRVHpgwKQtLmETl3VFYGxiEZogeiwFcWqYTlm3Q
B7wnW6g4ZeHL/RWXbjPXL4sC27l8merW+KHxM5JUyV/0Bq4cI0jd+MqYpFxk
CilA4AKlIyJ9UN9gYIF8TKhxJSyqCD4TsybWrryy6mqvcs92PN3CuV5f5Mdu
fZYjGyhCO1bRUbDgNY5tSxOTJejVecdrRBvn1AxVBwl+ttSLrXXwE4qRoanY
0onuWJcdV/pC2Yi28qbrKAg4P/mGWCSGCcL9N+xahCH0eQzfjuQpDBBUAkn3
6ICZpshLyG81d+i4kxsjgblUKhBllTOeDF9psUQuIRBzT+ecHN5xmBZshbtN
SjinAvSLsKS3EHCTiTk2AyIFtD0yPxrJWiAOkvn+N8j7x4/a0OCELhCIMaqA
rIi+hjKBf+6VLZ9UsOJxPo9BZSOU0I4P9DAtYuQFcunUMpqWp2ekFcIpPnkS
3KCbI81m2e1j8ATDDkrzwSemt0h0HjDWONh9/d3oBnRq+jd485Z+v778n99d
XV9e4O+jl4NXr/Qv6onRy7ffvbowv5k3h29fv758c8Evw6eB99HrwR93+Sh3
3767uXr7ZvBqt8I/2LObKbdJvsBIxgnzMIvnPB++C3qHjIwYRwsYyOjbOzmE
3x/ulIJBVhr+k7wsIJDFIbmzMSY+CheIKAXRgQJQPaXIeIDmNdBF5baMPy4Y
VXhd03CezBIYRJvSEMyFGJFSvJEUzxHKK8Pnb69ldWeHZ2hUW3GRWnx/LHG1
FVTvJ+/NuVrrxTqSKwBhLC8Qk6z4fGfnN67Q0FIyoFibULhAd8lYwt107IXS
vEk891SlEITbW8cBzHe8nov8xtdlDcFtGYmUJrUJvx/4ha4YWnPLIchA7/hj
l/8Szw5RzShpjXVRZBb9vlThMEhum1bLW6VT/z4eM7sCKXz4/U3B3iL4DYhv
mMzRHYgC+nA4KkRFwYhtPN8fOkfdswBDWIEMR6S00vcYpKrOf1jzyJp4WMAC
TPsIXjfG54nxwwFsMye0dPywZL5oWS1UtAiZmmBxI7EX9zuHOPM6hGVneuPc
WrhwT8lh6XcxuyhiGKNI7msxyLqq/kiz24wCqC1cshzDvF+YKgEeHKFif6/o
tOh9cF32vwIx8cRt365BF7Iqi7qWGcu040g9rvC5cHKiAsv6wFqJxVDYCoB3
CsUEGUb5VBFp7ODfxNFBTIwnTYAZDTiBZ7NUZlGkUMr7DXdlv+WLTcHe9Wi/
VWP7Ul8PRngKWopGR+oMJUnj/EMpkyTllj4DtDRPFqB5lbu4fDpronImEATV
Fd4LbS4RYSWZ4/bR2QxyueuTV16HZyUJsbjkZ2RVJt0NX6LjHfFunuER/q2N
yKq+uh6JFKkZ5iSLWQFYFrGYRICBmAXhWZqtWMFxuwNFKgXsyYL9DnKWNI5S
HHYxBEAbojnw0l7FnBRGXIIINAZKFs4QmX8nkkubeDPd9/MKFSKKLT6n2WNV
4sFpHP63V8SxRWLONiEwiBWapIvahHprVSKBWwuHKGI/kfZJEt6moM7DxQfg
i5yKl5gHgKMI2YODHiz0QmMGYqLDKZ4YCxVaoO+T+IECRYFDthXM25l880ms
aYVsTlM+gJp6xtevgWR1YgzunNoi/JcTj/WW0dqQcbQgVEw4LM1uK8ZYN9nV
NrUhdYVNx7exszBDzoqf2apDPm2XvhmDCiz9lzfykMMVLT0/t6Fn4KNpbAwS
U6ASYiKxjjJR4jhtZprc1lyKT8oqLNGURbGck/nDtiJWcO561KOVX4/6dLPr
RD6yH9aykgGQ36vSBGTac1pGy6HDYu0pG6yWPvmzBOQr5UgGRnabTPaD7sdw
HE268NMS6yhPDrQ0o0QI9qqNYoqyuroA0siv4Qvw3x6/Br/1vWBDg12zR+b3
mOtD2KnNvVGGUe8THRKfMcm3KYQnAfF0egCYsvjrEkE/zsPoAwrA+Ee2YNYC
6PK/zU8QhsX97c4wWPGD4LX+6Dc9Nxjt/BT8CQP1NVJcszs4gA//5d+Cn+yn
f2oaBr7aWfGl/+qacf70z238gcXZi8Gfz1nPMI8ZXV8maPn/jPWs+tliHNlD
O3j3dnSjpJ32dj//QuvZC5eT82AXDhlkF0Dkc0Hkrfd1y++au9PpdPa33Vfz
l/+Ycf55O5C6JtSbHh/JVuuBn9+qYa4sLerr7svCHUsGVnix+Tj4zx4z7PeE
hOew6/3t19P85XbjyHmh7tPj2wqUWp3Of4172v/ve1od58vuaf9XfU8bL6qL
JCvHoX/9i9rf33o9X2tfX2uclffd+fml7rurbmmZ47efQVc/OLdcfv68PZy9
Gy+n/uet8afx+y3XU/vzrMb1+uwfuJ7txvnn6sGTQT8OfNTbaD366DUv3XI9
zV9uNc7qQ/kHrOf1slxKQqBlUNl6HG1LGYri2LNR7T83PWzGw+3pocbD/n/j
obOenwsP+78iPAS58HPHsSwMOz+eB09qDUxc0OR3uxVDbWc3CPMSradtCmH+
3W6ECXv57ifywr/L4/YwS9lWXrAjvtas28ZYlUg/CW9/VzWIsoXHMo39EuFy
7GKoOorZo0YxDaHyLeAnK4Ns9JrYNKWyNJdpArKHMVMVykbtOg/fZJQ9G6Ym
J35766gTMq0Tfbc1mFq+E7L+jUN0CGCNsyE6sAc6iso6i/pzsICv7Mq1YVOe
8ZqM1TWZnpR0g4Y4fzYKodI1Vix7Pbxe54MfcFmbuE1IViRlXDHNtuwdSkA4
7alY0sqmy5mLXa5dk8N4KcWuDkv3rtETbsXRdoKLeBFzDJjkFlGKHB2b0Wo4
34xyaO7DZMZmR2uhmI6r8gI4xk1VkeIoh48Y2e+s1BSMQadboaP4nLR0ClEB
+Vk5hTfEs1VFrcjBATTD0QCvMWAIc6FWURNSm+Dk5FHlNKqnGxZs5A12JznT
6qClwaiyf4pVo5jaMngIU87ZV+lNylcJD3lAEROD8kdS3I3EmgmAlAfvqHOK
IDYJCeRAuY1TzNdoWckkeDqq6IVnzDcPDUaYy4tZnJIKg2958doNtFDn6ZC1
HzcCIMWABpUKaaWCcKobRRTosiGJSWEiKJog8lF9xAm7H0YSIYAuIw7vQyBi
7shyklB9iT328EnJmLb6vBW4rtDjzpkDyH3ytLMnWlK5LWxASEqWlJnSwQqn
ioMmYdb0ulgJhlgpWAsHIZqQx0naCQZ2tqU7hqm8oe5OWFjhPO64FSpj0ke9
S8S7kjgPdLJb+6YoOFmkxdMs74tgiEMlyAeGNQYeUsvhUhPODcdJMzCyE1kB
er1IYk1JbGJWWbwfZVvzyCb746IwEvSlF75ZoKu9b87ZDmvDkffeZe/2TREU
ifCMA+sRlQmT5RxXNuFLpat1MchgHDMMlmXhBM0JZ5uE9H2SwkciSlDWnBPK
U+en1jcOf1+RsTAYuQenUEPzrmaoGYI2tqN4G871pukcRXxg9YjWwMmx00Qm
AhmrbeJYTYysWRrl/auyNiYwgGiSFZ2pJK+aQOCVEGpxTi1lROInprbVLBnn
VByKD9qRFijzOi87wduSCxQwIwMWu5zBAmeKVej0E+FcnM3iMNORSvs9olUd
O3QueD34IxbLiPM0lOx6yXNq6Ticm1cj2e7h4TG8AhTtQn+GpR9r2fF3lLWG
61zLjjEzFx78pMRDEEJYdmOeO6leY4vpOheYU+WK6gsqMWIk0h5fp5CtsrlL
FGwjreHBmIhXmIBjjD9OivkKztzruqw5+N4OTvaFRff+cew5IYPmeLXLkrwG
jeFI1qfV7cNjIO0kErl1PYItLyjvTbbsgEGq/5A5dk/ssfsqujVW9VxkIM2b
C5F8pMaIM73ew2odyEoHF6JQ4S8OtP1ttqyAKnMSB52+HARfV46hw7qVidSV
wX1gKQDM1Swo5Ww2k5fhRX+ZciRe6KeJgrC4FGcBKk4cSdkNJREiueY8x1q9
g0lr49hcEmyRzZJIKjaqADwSA5DkU4yBUwCGDrhQ1we1IVkU8s5EB60RRLBK
hJxqHTtI9jWFr1+fuaPWEZlCJhuLD7qQj8YiI0RorbmRz7gVMCtCB8CMq2o2
UYzVGFuzXhuSdAC23GhSJq2LDbA2lGVtjUl6nrJfkho9hZDCqv0hVT+axDLL
emFUPKdeiCtwW5Cvkckdps3AzSLYQcGA4JQdpruK1qzIwkEPaSpMUz3umFh0
3o+LD3FC2AIXjPJZuHCe5LgY+YhEFNFtw9IOBEqm/qq0/M55JFQ4TnQW/aCd
WqODMJ00li9MeWlYVyXFhYgGlZ67Cwsn1jhdoaJoLQZjZy1ljkwASxXU+eOP
m2nVHJXuzCbKpzepp9EY7cXR/2pr0K5Sz1TFIBDumLpKCn3dJafkbaHSBHSy
EY10AdBgr6EA6L5bz4HS1+FqYpQ0CORcrESqHhTmBmExDTtkkI6KxaeRyg2z
JYEVwpMjMnxyUkUR2ijkbHbTNkl31gKUXGxlTAhoBUVphCiqRK0r4I7otoQ1
qfLqhUb4ekPV2MiEGupIQyFasMSMRSwAgSsfqpT4NcbYGUg9k8fAzpGs1ER1
Y163sm2tsaEy5yeh5NEcoyg54xCrVdppmC075w7okk2KNN6t3DDFWvNgbdDl
PAwUBIzaYUE450daT2IQnGY1LJSkSq1xe5wK96XlT9/ipeobjFp+porSXj1t
UGTTGk1RKYU6z5moZnOJ7Kbk52BvkS3wwPYtE7c22CSpy5I2UXzlnadROn2K
ZfWSud63q/0CDRji5RmMzhmmsAve3KUC2BPnlJgeK2g6pIHHMQx1lWmx0/M0
GIvCsKEmVo6XWj3KP1Q2SSiDg1T8YnlsGVLBq9iHXEvndiLnuM0pZ03yfmwd
X07eWUZSSM6VJEfSnQTJLLvNlkUDOFYl+njZEwc2eECv2G8Zrmz0EKswkZVD
R5tWmOkj0SJ8RG5FeSBPI76h75PJ05ZLSMw3qJNLPLmKPFeZ+mpKr7ZINWr6
26uLfZUOgU+AJGQJubWZJ1oYC3WWerOrbWRVqdH8HoUAUw3J11jD4oNOAUuK
YllT4Mya6YELPNYVJvEWgEVI1Ao2FLxrxN2w9MV+OK0inMGBoPLln5b5ZpPT
cuRcI5v6NPSukpumuCMKMd+ilbWoIzgGp6w5lSQC24Dr8B6pUqvWkuRifo8J
g7N8Rn+Reh5Br/7Igm7dENhdRyVrJlTMK1VuA6VJcnaQi8HNBNYHEvH85jYG
hhP497B5iocEGJKqBySURbiDy2c8Qh4EwUASnxIuov4AWKYNQrJDndBvSl8z
HVuXUgvrdt3iv/oUW1W9WO1Pqsdr/6TOnV2i9sbTPeiipVZpcLbNwlHMMi4E
XGKuB2p7mNquiADI3KR/0RfJzMfrDVNuK1RoZQauGHTjj7rKvO1A+VWn5MIB
/flPmJmMCfqANnzaw5FUOif8se/p6xi0JxDqnn6IHsqn9DT8GhVPCRO5oLHy
U+fxLRblU1sh9stqtNdasK5uVyf487+5y6vi6bo1fjwah7eyyCMQRpL0F1hm
5aqsW2V0NH5KS4yOop9pfVemeqKnRZOphAsOrXdikb8ty3Fx2p2lvWxCIW3n
lnKsVRrQNJBqtygMe351ERjPCAYgQhfYQyqk2ZpidfUCJYBvzl1gTfFtPJk9
NvMZEE0b1FGSAIVwGU8dPjB+pCqrmFALD+o4otA1sXICsHHsyeNWZbIvcOxd
VT1gdZzVE3etjZAscTWtH9+R0kgzQJdSr9NX/MVxNenPsccf8h0cxEAsobAM
ILFZjuIHywvG1FfvEAsORQLBboI4ppEFrex1HL84p1vcJoFBzwIMCtSX3csf
3r29vrm8boOK0IYlta/wlbbWpnc9ISoBFaRdzoq2GqhNA9VJhfas8wVIo0py
4x0+VfJ66H+BQ/0tzrP2LE5vyzs10EGfOCR9JkCCJSGqFZ91Vge1bkH9ObsG
v85ZnXSOlLxIs/1nOq33Taf1foPTegpU6T1/8fRzT6uuNk7lUPCDbFniX++u
fy/E5uXvL160Lz9SlzeuA8y38/SYavTwhvDx3wUvXw+G7ZdhcbeHqk4ruPr9
a5EhPGnpVteJb1K2hjc/cPnHleUSxfWb+hRoQZ5NmrrNGtlTKdW397EX/Pmn
4GN/X2VFw19UgAK+JIqLZYJhDCwqAtBLVcUC6vPxkROUP3JKtBVzI9oObxbm
hAcFnmPs/oQmPLT5Kx8ZhSlxeQQsBA0S6byDh4m71nUqVAiMUbyNQi4sxBlB
t+nBT6VPEF+tf0+Xs9m/B3vdj9PjfYknQIdB0yiyNgscYtfg4axzs0wEjo4J
GzGw6G8IC2s+Vsx4OmWd8x5Rg2oMUhqyY81rWcYFZXVkpyasEuUPec8ydOAh
WFfJffwaNrng3HXnDYVrgPJPvZW9DouSuotgt9F6MDHJINEHr5sagH4fKEm+
/tUbB/OxGIAQV912SiQKlsPMFd0HjSolykrjvHUuGDqMWisvqFxO4/gbaYsF
EV87dDwIMgtTMBHh4CQaTw/6vW63dxL2JwfB3imTtf0delqfJmfPBHs9+lq+
dSDKT3T73YPuYfeoe9w96Z52z7phd9yNupNu3J32uvD+sRrfXRpDUKReA8e7
bDbh2+zuA+713nX4wJi5b606qNlUdarqYITVF3j5ruDywYhn9oiHp1uP2XcX
2LOH6/Y2eb2ypL6zpN76UZDgwtS91VvZZCS4Tu7ZrT9rf0gVbh6W9aqN4oI6
hM4h523FY92qo1JKVLterRo9reqIyspreaEdQ7qzFuOodjxJ5MFxtBgskKyf
1fo+en9IKEfDKn5PrlSrqES9DcyU4bSmUCJBWl/+Y8sKoJXIg6pVUhkda0yS
jQex/SEACXSkTTltz3XnEV/6c/Ry0O4fHSumQp71gm1yOGDmvKyFJtyrfLDg
3ivo/7WkKGGVuK7f0ZNGfmqRstcKXu3zM3hWTNAtVwJMT8vjOi2eMPIbvo4s
/oSFxcNZRLW5rnoDr50dSRpySBT2xkERP5nCqbVfxrPZHJ3MzAkK5m/kITEO
pJNOj2OvrF4aR8cDcpUYWF8OL15aKOyHMqlKWNjSOxjc5jH3vzCHswatRS8X
a4O3fP9O4UD+IxXjACrH2Djrh/7RUe+M3vvh8PDUKlY00eXcrMpAlmtNVBns
R68RQM73V34XbcCisdZqtbkB3AIAjKoJ51iuVCklXdtNYyOFO9bgr21l4Cdf
US3yvy655cep7cwqkr9pURIuWstWpJywt7o4d6rOZaJxjJxgXULXc6cer3OK
0tbQr0czvccjes9mrIp/r/JEjdbZUppCpaSyz9Ys/mM5sOsUb33Sjk+n6q2c
muKxyZZ8sgkG7+dhtB4O+NQXwoKw4BeCQhME3AaxEsxkO+bd4l7ybFtCAdoY
MEbUw5Z4XlIVTQkT2Btmk/h33U63v7/zXZ60X2YFSMy7YdGRsTqw8V366l1Y
3sFX5LHf3SFhPS3bL8jSiK+YFg3Pwij+LTp0dnfeMbqf7/wIV3BX+VR3AxwI
+MuIukYenvR6uy18gCqf0bcYXcOfGVckfnH3VNU3eMpvaKcpf6s+F/KEH/5I
t38X3QzmT3x1OaapDvvto277oNd+ASz4RfvgpH3Qbx+c0ez0oDMOfYKVh98D
t3E/xklK+qzfsj+M8nv8sOd8+JHXOzmJou5JfxL3+92j8STqHR2chEeHB5Oj
g+i4Gx5br6ifMBof9+MompyedaOTadg/ic7ig6PD7unZeBz3Dp468zzyPNOz
o7g3ORyfHvXCfhSddqfT6enJ5DTuH0z7/XBaM8/4pH8EyziKj3pHExCqTw56
8clZeDA+jOHE+t2n+p1PO/a/+N9PfHSVe8mLedbpdPDRPTvqkvApyOYJBWOg
eEqlHsvH/WdPdz7V5hrX4btKN5aClCosxqnMowKOKMLQi0J8rpsdwBcm4hIO
u4OJyZIRpW6ltNSzVWPLBy0tJNfW/fXJAQ03HPnXm8HZxuHaOEjlatMl2wSt
XZSuRecKKlfQ+DNReGP0/UzU3QxtCUkb0MqHs49Suq+pX2p7aE4WG806znPy
ne93OLn9iRth8U4zjycUpWXF7XDQUkM8BhvKVRV464uaIDGN9CpaqtaIXh/S
5fA3k1WtZS3X52PCbNBvZcewE1+9w0AvVfxcrEayPfQoFRJirgiClXqrgh86
AkIrlKYCQiuYRkBoP/2fC4RhYWevorZmAZUTSChYnOzS+eOizG7zcHFXjSnf
Er41AmgVVasiqELZmrd/drh3NgZ8TcC/m2ZoXNSbOKabYUYC6wZwI5G1EXY8
yq8Ifq9lLJ8EYgngPZCd978iXEElQi4+PHe3pSNaMeqYI1r9BEHJgpk0KluV
RHqrEqydMeM0UFI9+/wEBicRFzvrwH7qDqKllF3SFaw+NetjKGrjG2EkUo8p
lcU28PwGg0q0Hqwf1l55shoyCbILNZhUKE7nqIsY/qSGbwqUrs6GavLmEXQb
mRxWYDtr/Tdu/807FRci2bNi16e2C2sDOzZZkW1TMOOuCRZRtqz6QE2VxuCG
VIRl86id4B0nL1ol5pWunXKgrEqdgr8xkY+h4eedkrnEbbTANhnKFiJNNaQh
KXwnLNU4hbX91RGJ5q6ZVTi+61o65sS+rmY0sns3MnSF4aNj+XsGThZdo+m9
6QJsjoB1dnqKYK+Puwt0l8StseZnvXC/CqyrgWVhgFk0QfNro6DHrzdEw7VM
VeGUhaJ57PiH0EtgF3MSxxAbT9FKmnpUXlKAsY+rwmjHsb6BMKIqmDiQklyI
Rv5hJ0OoAjORJQorzvE17fJyMTl6gK62QJiqLiH7rDHWaQBPCLi2CVkBnHpO
P4o3wqm30VxgZHPy8DO4P/4/JhAuNK38aPf6X01Npkoti+GY23V3g6sjSdQl
pwUzgBz0U94AG3WmmDGnb7nK0rXzmq2cJCrdYCo7eN8/UBIIPYMrIIBrgdYi
JEA2Uw4PyXN4TicU+m3jXKXhoFJfakqpsvYOpW+Zrm1mTUoCc9EY1ocz9D2t
xBGBOZbvN6rKDOW1Ig+wZAvpp+NkPlDgKnfpU9YIUX+95qcqGl8Rx6dhFL8X
TLQRXxMzpp51vZnrqYEqmnHjeZdw1V7r1IcQWw7quk1+2Tc7WSopKtlSjCTB
d8WSL2BNw4/I6oI8wVb1VIWAU1mkzCLV6rJ9iykWXyowckuXK6HaPqqvzIck
JX+XNjPQ6ZCxgjOExebbcQ9S9VN0kiGe5oVPcGoafvcESXSVM0E2dEdKn+7w
gbplrBH5QVyg1naakfgFuLKpIz8UduVF191sSqJYWqUkpqgyNusWg71fcVq3
jampEGC3F/T6EBItqyQo8zgZxr4S7U5ZDLGHb31OTxyVZesVfWKtwITi2u0H
YboypDBDORTO56tUjNC3meKQHuJxUJq0pf2aQng6VcmLVScR7+bOdK6vubGd
WhmQQyC/vzEsrMoZHSLRmLlLwHWb+lWrAql1kuWPgzuq89VbN1cy43Vbs5wy
01WTKIfn6kWtgEFDFuR7eqU+jpohooINqVZcPVzqDedfGS71kzTDRZ6/mmwL
HO/F9RDaQPGOVudAbh7+sdYWsx6wG4SprICqTpJXfvvtk0xrzWt2+r2j95Fu
9fPJy+tVKICr6/kXQym2nq4J9eUAgtTIXUrscGbHdMQxRdTny5T7nk9JGgTy
PE4klb4uokA1ZuCgAiwOtq/jBG4eF/GmUQJW+wr2AJ4eHB6EvW6vG4b97uFh
dHSgPch5jGW5JgxI9LjVO5BbPLCmyeQhrdJ7egxUC1TG4IrhUwfH3e4a97MA
3XcTqo9rxb2GgmfvJO0O3YS1J9uGPdadrutsbBGJCg2jr2mjrpCSb/keMiJd
vcLhomIuaMy6rt6/Ord0uJx4YR9X6SvyWV1n2Zwhn4QUxbHbA6D3Ts/6/UN9
IvrzvvW5DhfhYUHWQ8PP+1usTTxHAe/9os7d/d+RIL9gJEhjhI7Hy7zgns2u
HN6GSsCH63ane6Zul9bK6YLdKBLuvcIlE1ZdPy4SSsnqgepk2hyOZb3LKe5Y
ydLJT6tpblqn13RlahZqhWHhLihSEZ+8gzkncHHnGIKQU34o5qRpDsRFu6Ns
tpzrrCX4PMk95xXtCEsESSaNHifU1dl3n+ySKqfqiQOXyqjqCo9NbY1D2KH0
5XTZx+UkKbP8KRl/qIQuwk6S9qO7OMKyHqR6JSkV74KFf8QSk1pqIYiJDWwc
Y/PLPeb5uGvU8R7j0rIKcTF0hgCaBuR1y2wEVO5q8Gbgka7BSfU21P08Ad1y
sXeCKQhB92CjF5Ypd5jcO6C3To43eguvzF6/vy/37OTw+Oj44qR7dAD/Xp4c
HL846R+eHV8eDo/PTo6P4bfjk6P+8Qv438WOGqOJBtPiN1uGXvwxraQ3CI56
vf7FSf90o7cMgWeIHW436aE16eHRxXDzSfvWpGfbTXrGx3Qa9FZMp97iYzr0
j+n46KR/3IOLi/8eHb04Pul3j+GY4K+LkxP4hj496bpHVcvXaAtrV+Ju4ZTW
M+itfUchdE9toHu0xTRH6q1BYxNRdxqNzjjT6nesaey3TlbfU3UgB/sOdwOx
st+/ODg66MJ/Dw4AgQ+PD4/hv0f4X/jkhP7bp/+e7bgjNkoL1l5Wn0/lZPhn
zfl4JyMzrXjHvgLuW4MV946nOdz3xYHGmZqnCVacasN58k+/2/hWGt9SNeq9
7ldaYb/5LT1X9a2j04ZFPmGevHdQ3RX8XJwMhyDrXVyirPf8Yoiy3gBkvYuj
g+Fxd1An6w2Gz4/7l8PhBch6w5MXg/7J8OySZb3nzy97B5X9NENc76e6ts/c
z4uzo8vexeFzkCkH/eHwtPvixYvTk4vTy/7Bi35/8KLmlecgU8J2jy5Bprxg
mfLy5Gxw8PzwkmRKovCnwcHKnsW8MsOMGBkONyNwvCFD4vSUF9tMye8fbsbB
eEp9qQbPhxco7W4q6mrp8bNk3hZLdZcst+pI1BGaFanGAQ9RCaAUK1NNGCWb
RNZGM4obSgm7Xt1vL9IxXBnryBWKVkQ86lBH1balobyd4+I2ltWWFuvDujx3
ifKz7I5VwNXb6Nw4Xt/y9xVB6IBrbcDtNlDyra0bwEqVULxurhiar68Y6sTt
oVKgHZOryvGvqAtxPRIHRV28nTjj2bOcpPUlgV0/jlW5S8r5on9MFZ6gWvpU
854DUXRMkUnl0R4cGXNlzWupXl1Td9qvP3m6Sa2yffT/1BeL9sc722g87hvj
G1GvrUDAOmtUY1E8s2G3QjhdXB3sk6lYDbGcblaiu2ZIjWeFqSfa9obSQFpb
s1sX5366yq9HXWC86t6bFfNGc7WAx9S4xkh7KnZsZnQADwc0SuYJHI2uQM8I
yoXXzaz6nun9XHvNNNSJXo/c09zqyGSSLzkzE6jwn/XQdLGw2oPDotr1zSix
gj5FvER33AnFWGisfjFOVzknKHr1aTOdzONpxrUVg7Asw+gDTMDGqxDrn8zi
aiV3NMGw+72MmaslE9fUrYLRQ7tGvh25Vpfn3BIavizUJE1dkdYX2xSXfEIF
ZhhUpi0CgImKw/kx3uMlAxSnbujOR4EV24CA+DS8Y0r7YE0ZL7bCx1pJqw/n
mePLV/3+vEZXeodDqjxEcU6FG8wuC2xuoqOdAo8qQXt116s9xW7rCqiWKnqi
Llt9m8J/La/7R3MbMcerud61VikoqPl4rRRmag16nh3VPJPw0l8GEDNauqT2
utUJqS6o23qCewytDQBvKDI44DoNcMeBx1FBxtDq7acwpN9iKuQ2Bql09Gvp
2D2JYknQUlVkKZ7YsIflMs6xBQwcTsmkoopglXxsp0zTsCf90cwa9+bhJG4v
F/vNe/+Gesc4BE+6RzVKctejb5RsCAQVX8eK4PNFKXkcdrm0ZbW3rNk4mc57
yrA+noVz/kRHyFrAL6yy7dcjXbXdEmXrSreDuExPuM0c1jW1qhWQM9XBsRri
Ywej+MlstOprlZDjtYDSK0WxHpMn8WNZ63U134UwAvWROi/4FotaWVe90NEQ
agXkYbAjIEhzdktzV1S1lkR8opcTnQl+JotXyFnPqCM3z1fFjvgaoZT4/dYU
LHMbB9YNVVXNwy3Kg1sdCVe6e/XCTVBEuC5yeFXBbUWcgqDmjBR9TEzHDbvp
1OahF1tup7YGLEhxVAW/ZQC6rwsQBRLfYmKa6YhsoZz2pfPPNgt3cXpMOazE
D9NpjNE94wjdjTozN5XH8LhphRPonCcXqBWMtNNrACJO8xvr5kbq3pKZrL0C
MTYEo2kUqEUaF6SAE9GdladW88I2KFTfpWO73RiYi3nI63mnll7tfrYBQDbY
72bhexLvnWoaTjsqpMGUFcSudyz0sErwJUSdCa1cFizO7tpbuLVeJUYdLVGY
mAES40zSTOmlbPCOvzvsdLvB3vNwosKr9td0QqRlTKX8vOwq4zKPivLWBbVX
Ox5u2QBvw16IjWaWrzU7IATaloXiAS5csdUPk5Ow0oEukSpdJMyKV7frU+KR
HpIArUbVjvptWvg18xdP4G5Zze1nqiWMwswPcbxgCm7XwF4uUNSZ6FK52Jeh
pVjeWhit7YInPZqx182tn917bmWh+TVC8vgDZRxVWs70NzHSSRiJeqvX25BD
7Lfqj5kUBt6Dy9hb+vTS+EEozWIWRqqlLXe3DJ4CAJ+68WRrQVtT4li3r6Qc
rrHq1olTV+rANjACD579znFHgkS3hOmZdxJrgYqrNMurB5OGw2cAa+DJ06RQ
sH2eNXRaHh8iNe4w/db5QzeLbg2/tTLaTOK/arKXaVpFu3YtLLbBBr9tTnOu
diQ1Pacau9P6ndG21n2MT2N1Oz6BLWhCXGe/0o3ve8m8vE+yZQF8rrl1XHPP
JCx0ENd2oyvvTCu01Z2LPA0XAOLaklBgUSbAkpqmUI4VNU6BCXMagffotKmt
U5ZZU8uA6GsHHsoOVg8s39CFdUrVii26XEl2Ew0bQDKJZ3EZV0x30kVQ+2Uq
Qc8c+EspcjoGGk4Hvkdel5QmJUlm2BjEym/IKx2B+FNpZC1NkXHIJsR1rPBG
WsZPNm1S7ZaqwrPTrWQsFHZ8iE4z7E1aRW7aMGt9S8mO3JFq52N11Ggw4WPk
s+CEuKI2gHlFD2YLKDr1bv0GlKUZm7Wk+K4v5agWWw9+VpKt+W+RmsJY5KX9
OehkhFGWYZ300pXWlYrRhvlZaGNpQWS8GUM1GSYCoShDbbM1LahVrGmbo4XV
t5q6nsC3Vg/r1U7UWo0kVJL/BhyOnC5Ke6oT8shO4eev/ZfkwRjpC4j4WDkC
cq44h1ubdC+WAy8hWu51juIx2VSMa71q6zDGUXqrzW+pbGTZqPHCN+FIuObG
D29+4MVy31lNcAysHSLTshm1592p9bdYDbvUVKmDqqwQy1oP6RZ+l5pc7n1f
K/b2x10BsKASz3rNwP2DDXrP2OzA09WXmAUxDVQ1jVcJU5U07qnk+a8/GOdY
iA+GWoBTtiSmBrFiBeLGj4B6qHpMG5EWwZdN0Fad7qbYoPGQbS2fp5/X0ZrV
wodrc3Nt8KI3s8XNag8mQf16S04NLOdWsTe01nuY2RYt3wz6Fzhe96jWW302
QHmdvylL86VAd1Hkz00zZXHkEumm1pdAwTvfr7WTg2APaOc4mQAt/QrbsFaA
NDJS4QF15R6+fPFHwR63oAveZFhsBChBzWGwwqQ5l+ZazYUzRTpijPZ1qSqP
3Nm5MAXDRWG5SxYNnmKzEdvqsolxKalzWgTfM30GIN+Fi0WcFm50jOWVW8lE
a638zZrpmdeEcmUevt3fQhJqdAs+lECTdBk3C9hV0Vi4MH1eZ7HvOYUsjEGm
KmTocufVnbrNxKtZuaTDKa2kSVxuHtV39tcX8LULiygDzGb2TV2GfmWCeKdm
fM9TlzQ28K2ZpDY7355kDQ7WoHllxrU+kGqGs72C9fUNq0UUSbyoVHJauZe6
E6ip4AOEan0BH1h+H+R2ukUrwj+uK0r6YGQHmVglKpW9T8V62j4wirKIPypL
qlc8twabc31HRCly1+hfunrPG83KbUfW6IQrHe06Wa9uZg47qotC454nqCx1
lGuMzMlsZBEX1cwPHDEuR1TAWNe2RKP1hvm70Nr8t+JmMD4JyRA0t09GdIsB
rb5Sjq4mAYNV4c2HFAVO15oW7W5amjMivQ9RNB/UGBmwKf0UMfkhyz94tu0C
ayvRqo46Z45oLghqBZ3jhkCi3DNbeQa353q039RV8D4J2QjF9VXh4WdAavOM
nS+Zqbjq1nRBbx2OWO1HKBIPt2KwYOI1IE2EH+v+tdTNjtSJLMpmRQDIB1/M
dDiqEpZFZsfqGfVsF8BFSzt2QAUwpdCtInh5c8NrpxaXGXXA3A9eD/6o24An
KdyxUKTnmh1KTbcm4FuQRjHVroDGRmCq0GSbgCv6K+yHvAqd4CUpbklR80zh
mJExvnSpbV2Uca/LjWggO7GGa1dftRCrAldW9GelMG+lsI9VIcwLBuK5rLHq
UW/lmGcVy39wkRRRmOu7X4GcupITfq4tXJ+vpirWxF0zG+VSy2CA1aowEhAb
OcNXQDJncShFonThpjHVWY0IDVR6TMLtpoARJQWbs4tlIchSZJ3gOywDhWPV
Oxus1dAdF2rMm7LdvA36pqq+gusP08cHbtgO4k380BjCIIelSk+Rc5Ma6Ejh
ys/zcu53nCg53g3aJsOILrtIpWt2M0bi0G52zjDQnZKwoAzkWQgw2LpwFkq6
EgxaiQ0fvXz73asLo6jVitRIbEjviC0bH+fiYILOa1garLIw/GOc5e25fCoG
HhzXqmBobcKpMqRr8eDrYrXCOcrHhW+CNz0s7OnaZhK3HgI3gKVQfuorZeoi
aMUXxpD64Hby3G/bDT+/rf0V/tj5yarNnqIsoH5+4t1gVc2fgj+QNIlVbIKf
Pm8WowM4SYE/BTfPL9Sv46LM1efwipHoN36lKs9+xisoAq945TO2X9tmowEV
VHKji6947m8AL+0aHsAHSxRs2uEsuU1/txvBPuJ818JiCe38+TCYJ/jZsHcV
QnHSoUHZbfB11bg+1q3EHTd6dSuk+RJskXNdiSmcELsKS5441J58QFJ8RVFH
JR62I+d7la2o8cikTYa6nqCuiuzqByrYydh88cGhVXjzMr1P8ixlUXQPRPh9
S4a3asGg6LwUk5OUunQyPO0NGbXU0Qg43WihDX2WUNecIckau5Nc45snKXMC
OD8ZLt0sKVt1q8sMWdsYYFUwsd/iMSmoio2p8stdF1P0V1GCMSq+ToNKXVU5
e0fr4twx5YSbL2clqYHXIzcugmup6udIpw2nFhKQr5pqWtbachFM0h1NLDGq
0Jw9ZbCnGsTTDtvqlVbgykfHvkLHwYKOYFGpPHlcCaqXhZOmjDEExVJi83SS
nfLTNHmZx+YJstEaSc9BC6v8PixT2RN4AXQg7nbVishWFKFknLBF7tHUxh2p
HJmcl5tOKMVN2nMXDdU404lTRBfTFdPbmdJ7quq145iRtvLBQGWxs7nSEuT0
BqTyLan/iIO1ZsSkPjhV74bwxtqvCnhUEfWeVmbTqySFLxIJ/lhHO8IxaoBb
Ouk5RJIFUF1Zua4Qs+Oh8yiQX7EZ7gOVXTABRwFpchihqVW6h3hG/bf0N3yD
6GvHdgCkkyOrJZORB8Scb/xA5Y+HCgdsB4m+lK65Uvk9iorF2nVgsg3CNr7V
miEyZSbwQcFXEcQTds55tBJe0x2dKXIMEOOLk8TFd/B18sNV+IYiDHAbAMVu
M6sZtbtoadLK1nHdFsDOD+RAEyzTTwljt0mJGF3TzxT18InFaIynWWZmi5QF
MLmsS0mYlBcMjAuJrNBIYZEZCTqjyOGrd/wI0IOSsu6RcRrsknc2B49zFlUI
maaigceAyZTsJT37qcxWP1vKhVZWaSXkOsBysaIBXhQxY7Uat6lYHRSeBO/w
fKNG4WzBX/+KZTOHvMpyv4ZkNiicT/i8qwFOq2ZcT8G92TU8hcRye9plWpNA
zgLh0vLSa+KJRiE0Jc0yKpRuVQAnJqN8HWxfTqhbXcJ2RIqNwfWje9eLI8PG
diRzTu6TQuejStVxWO8sKcuZN58lrXEvr2UKrBmLyVhbIUMpCouqMcWKSFyS
I9eFELUcsLSoTKENQeUuzZWDhU1mVSAXust8iHRsqSvTB8jvpX4KUTm9Zzyx
GQbf3mKaNB0FXFO96VattFGwuEDfRbM4zFfmlOpK+Eo3SRwXiNt4TO58NeNc
E9JZptpH0IEbUdjrfKBS7oM8KT7ApohI5SGVkbQNwfZUT8VFCFB5k5Usdbcw
kA33Sm+4woI08lgRU1hkcxfHOMgA0BcEEgDdh1YwWer482xcwOIJWbH5eEsz
88kEzliiiyZkRBeM5S+QMisPoeZZlExMBSzriGUSpmGFLCr/V8WJTzRPamEy
ZDJUCgKu2XkevIOtFDqPI9j98cd/Gl2+evHp067lr4Tn06XJH3foB+1LAqil
+BCVb5LQtKEugwznTB3gHzkQBLdBttOMWrMK8cOmvLhvStv5wCwHQOXtDSbO
dTDLrjXHrmozz6qeYPruV2AM1sgi0Lsx2zpmrskJceo5Nijh5Q3cnPOgUroa
vrmgkMgFvnquIWgEZQ+blXhrd/xIswnVVNUe7i8CguZlZByPU3QpIZZVB0Xj
HHAeHsONhyNZtslzwuoOFQ6r+L62SnmoXOYOwJOsSmRHOyer1h5HFCjAcXGC
/tHRPjx7HUv/qvNAXwfC5rcIMMtoWYfSgs74TLE5Niex1q92/VkM6m2NdL2e
jtM8Pjk8c7DO7sUOHxq7+Xckkr4San3OLTkUN0NQcpwVQj+H5WCx+KvL0bfw
zUhUQz7tC6ERe8X+uWl3gH2QqceBBdp/SsfF4htraVaZ6V9iaVZ/4bVLq2mD
/otAr9qa9zOWir6Af9ByqSOuv+S6O+Xaf2tuGAd8+a6ur3DR3Kl/1bykrq1M
7bVWXgSievC3cSWck0nfJ3eff0u3nenLL93We/uqd+jLZ2+6EjTy9/FYpbpR
LySpCNp8Hx5K5b/6rMuwYtIvYEBnpiULtW0iRGVfVz0S0VeO8GOqKHLZBFPf
E57/V1UrVQ335tnAjGOdDn9gzojolBzTF3MNu3VPLTI5S/R7JazcdqQCeSa/
ij2v6Fnk4jCGTV1+pD4DefAqHMezWtSdFe1YnmrP8KnPUQCqczXQ7ps8TAvq
xPkqfMRkOyVJ7lF4V53I9ZkUWsWVHZ10jyT5brmYhGVFQFPi2ekhNYDYUYTk
PLj84d3b65vL6zawjPa77F2bQhnbkrA8GKGSAMtuv/39efBHIjYoBJMZ7jx4
U6G2TeHS3tG12+1gDLo2W+yU4maZsfHsRFlr2/ZtpZJS6Pwk+RiA6K66+NoY
VfgBZzBdYeeouCbzii2NDJ4mM8KB5rDKFN8uOBMZ08o5cIBCCeaU7VD4mRcl
h0ZxaYg7pxtinM8T8phyPYLBiG2dkU5atDJKTIkzbQ/EuFbYMBfqc7uAnFPS
hUakyrKljA+tG/QqXCZGNKx7TXZbmoBMKSEZYYrrVOpRAjDVx5ZTlphYdfiR
rITMR07gpgrJ9K1pGPm2LEitO6eA0Mo42lmywRC2AbqURifWKs49E46O4tpS
oXTWeCdJcTUhfVTCE6t1WhU+z5ESSf1gWoFbzDKkFcPva+yKOM1YVV49h22E
nHNT8YW4LhBlQCJT3cryq77n7ht0Ybj+X23db6gn7I1gwbveVfE1/RTayCen
UFNIFTOl0ImEtilsKzNVZTitamkmbN09EG38NuYT1ze4Of6UDXEXCt2BsdJp
E56hfWfG7pWYzrBAc7W0/wnvw2SGJkYudqrpAluOyW1GkU7ipdKgfWagvC9F
jhbSAAhOzGqVq5cZ1Kzz3HP06p7L31RO0UkGmCAbTcZLPZ0TLOqAKgzgKv8V
YypMbzcVDJDgNagYylTVGDckWNVEzckOXjQSLYrrqJAfJOvOeOcUDf6Mwtn3
fouSzTNkvM8YEvtrKOPKSeJcmWm1Bc+QmcFom5mT6TNFqups+YlVmLdl5T3g
O26an2cbZz6g/2xiM9zKVrFVvMccw6olLrisadPqeA6J6+PobGVf/o6kJuMm
VIbnNotTIHb8eA7iAnDsJM2nEQuffwDSgbBvd7t4p9rdnkk+7Hbhz087ZGIF
0iAeWcdtoZO7rcog6y/8Bbm2olI815Ve4BxTR8luQzuAHvna3sU+CrFkrcvh
nwMa8Tq+p5jvzxhQRxqsHUXnaulSKn5xKuN6bpPXV0WkkIIhN90V21K1FERz
t7q3PaUsD2NmePE1SgOOwCu3R6Ct0+vsx0ChBZuKsWyWzKmONC2GsGkQfUiz
h1k8uTUybMifTWL6DNFIfBzx5He7acY9G398tZw8JLdw4En5t08gLKP+o6hZ
yAV422zjRpgmaULy0z3jnxF1rVauN3cqKblgLyTV2cHbgS7nH4d3OeIRouS8
+Pv/LYpPGH0DXzyP079gBdrg9+Fk+UF9+q/ZXQpyerz8+/8BklqWRZGl6rsL
zC+4zsaJ/uRfQR0cAUMNJ59UZgV8+u3f/wNuKexxFmK8wSednqMELIIZmfbj
eILKgWyDXNuZH4Wrq+1gxAwWFbK5zR+u3rx5+4eBRtdhjCEU7Teo4sKhUf7y
8Prq5mp0OfxGSUH44Mt+t9/Vj4yuXlyN2i/RRbf3LYnE4W0e04kHZ0f946M+
EMf/B6aFFCieHQEA

-->

</rfc>
