<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tiloca-lake-app-profiles-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="EDHOC Application Profiles">Coordinating the Use of Application Profiles for Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
    <seriesInfo name="Internet-Draft" value="draft-tiloca-lake-app-profiles-02"/>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <author initials="R." surname="Höglund" fullname="Rikard Höglund">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>rikard.hoglund@ri.se</email>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <area>Security</area>
    <workgroup>LAKE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>The lightweight authenticated key exchange protocol Ephemeral Diffie-Hellman Over COSE (EDHOC) requires certain parameters to be agreed out-of-band, in order to ensure its successful completion. To this end, application profiles specify the intended use of EDHOC to allow for the relevant processing and verifications to be made. This document defines a number of means to coordinate the use and discovery of EDHOC application profiles. Also, it defines a canonical, CBOR-based representation that can be used to describe, distribute, and store EDHOC application profiles. Finally, it defines a well-known EDHOC application profile.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
  Lightweight Authenticated Key Exchange Working Group mailing list (lake@ietf.org),
  which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/lake/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://gitlab.com/crimson84/draft-tiloca-lake-app-profiles"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>Ephemeral Diffie-Hellman Over COSE (EDHOC) <xref target="RFC9528"/> is a lightweight authenticated key exchange protocol, especially intended for use in constrained scenarios.</t>
      <t>In order to successfully run EDHOC, the two peers acting as Initiator and Responder have to agree on certain parameters. Some of those are in-band and communicated through the protocol execution, during which a few of them may even be negotiated. However, other parameters have to be known out-of-band, before running the EDHOC protocol.</t>
      <t>As discussed in <xref section="3.9" sectionFormat="of" target="RFC9528"/>, applications can use EDHOC application profiles, which specify the intended usage of EDHOC to allow for the relevant processing and verifications to be made. In particular, an EDHOC application profile may include both in-band and out-of-band parameters.</t>
      <t>This document defines a number of means to coordinate the use and discovery of EDHOC application profiles, that is:</t>
      <ul spacing="normal">
        <li>
          <t>The new IANA registry "EDHOC Application Profiles" defined in <xref target="iana-edhoc-application-profiles"/>, where to register integer identifiers of EDHOC application profiles.</t>
        </li>
        <li>
          <t>The new target attribute "ed-prof" defined in <xref target="web-linking"/>, which can be used in a web link <xref target="RFC8288"/> to an EDHOC resource. This can be used, for instance, in a link-format document <xref target="RFC6690"/> describing EDHOC resources at a server, when EDHOC is transferred over CoAP <xref target="RFC7252"/> (see <xref section="A.2" sectionFormat="of" target="RFC9528"/> as well as <xref target="I-D.ietf-core-oscore-edhoc"/>).</t>
        </li>
        <li>
          <t>The new parameter "app_prof" for the EDHOC_Information object specified in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>. The parameter is defined in <xref target="sec-edhoc-information-parameters"/>, and can be used, for example, in the EDHOC and OSCORE profile of the ACE framework <xref target="I-D.ietf-ace-edhoc-oscore-profile"/> to indicate the EDHOC application profiles supported by a Resource Server.</t>
        </li>
      </ul>
      <t>Furthermore, this document defines a canonical, CBOR-based representation that can be used to describe, distribute, and store EDHOC application profiles (see <xref target="sec-app-profile-cbor"/>), as well as a well-known EDHOC application profile (see <xref target="sec-well-known-app-profile"/>).</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <t>The reader is expected to be familiar with terms and concepts defined in EDHOC <xref target="RFC9528"/>, and with the use of EDHOC with CoAP <xref target="RFC7252"/> and OSCORE <xref target="RFC8613"/> defined in <xref target="I-D.ietf-core-oscore-edhoc"/>.</t>
        <t>Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> and Concise Data Definition Language (CDDL) <xref target="RFC8610"/> are used in this document. CDDL predefined type names, especially bstr for CBOR byte strings and tstr for CBOR text strings, are used extensively in this document.</t>
      </section>
    </section>
    <section anchor="web-linking">
      <name>Web Linking</name>
      <t><xref section="6" sectionFormat="of" target="I-D.ietf-core-oscore-edhoc"/> defines a number of target attributes that can be used in a web link <xref target="RFC8288"/> with resource type "core.edhoc" (see <xref section="10.10" sectionFormat="of" target="RFC9528"/>). This is the case, e.g., when using a link-format document <xref target="RFC6690"/> describing EDHOC resources at a server, when EDHOC is transferred over CoAP <xref target="RFC7252"/> as defined in <xref section="A.2" sectionFormat="of" target="RFC9528"/>. This allows a client to obtain relevant information about the EDHOC application profile(s) to be used with a certain EDHOC resource.</t>
      <t>In the same spirit, this section defines the following additional parameter, which can be optionally specified as a target attribute with the same name in the link to the respective EDHOC resource, or among the filter criteria in a discovery request from a client.</t>
      <ul spacing="normal">
        <li>
          <t>'ed-prof', specifying an EDHOC application profile supported by the server. This parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying an EDHOC application profile.</t>
        </li>
      </ul>
      <t>When specifying the parameter 'ed-prof' in a link to an EDHOC resource, the target attribute rt="core.edhoc" <bcp14>MUST</bcp14> be included.</t>
      <t>If a link to an EDHOC resource includes occurrences of the target attribute 'ed-prof', then the following applies.</t>
      <ul spacing="normal">
        <li>
          <t>The link <bcp14>MUST NOT</bcp14> include other target attributes that provide information about an EDHOC application profile (see, e.g., <xref section="6" sectionFormat="of" target="I-D.ietf-core-oscore-edhoc"/>), with the exception of the target attribute 'ed-ead' that <bcp14>MAY</bcp14> be included.  </t>
          <t>
The recipient <bcp14>MUST</bcp14> ignore other target attributes that provide information about an EDHOC application profile, with the exception of the target attribute 'ed-ead'.</t>
        </li>
        <li>
          <t>If the link includes occurrences of the target attribute 'ed-ead', the link provides the following information: when using the target EDHOC resource as per the EDHOC application profile indicated by any occurrence of the target attribute 'ed-prof', the server supports the EAD items that are specified in the definition of that EDHOC application profile, as well as the EAD items indicated by the occurrences of the target attribute 'ed-ead'.</t>
        </li>
      </ul>
      <t>The example in <xref target="fig-web-link-example"/> shows how a CoAP client discovers two EDHOC resources at a CoAP server, and obtains information about the application profile corresponding to each of those resources. The Link Format notation from <xref section="5" sectionFormat="of" target="RFC6690"/> is used.</t>
      <t>The example assumes the existence of an EDHOC application profile identified by the integer Profile ID 500, which is supported by the EDHOC resource at /edhoc-alt and whose definition includes the support for the EAD items with EAD label 111 and 222.</t>
      <t>Therefore, the link to the EDHOC resource at /edhoc-alt indicates that, when using that EDHOC resource as per the EDHOC application profile with Profile ID 500, the server supports the EAD items with EAD label 111, 222, and 333.</t>
      <figure anchor="fig-web-link-example">
        <name>The Web Link.</name>
        <artwork align="center"><![CDATA[
REQ: GET /.well-known/core

RES: 2.05 Content
    </sensors/temp>;osc,
    </sensors/light>;if=sensor,
    </.well-known/edhoc>;rt=core.edhoc;ed-csuite=0;ed-csuite=2;
        ed-method=0;ed-cred-t=1;ed-cred-t=3;ed-idcred-t=4;
        ed-i;ed-r;ed-comb-req,
    </edhoc-alt>;rt=core.edhoc;ed-prof=500;ed-ead=333
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-edhoc-information-parameters">
      <name>EDHOC_Information Parameters</name>
      <t><xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/> defines the EDHOC_Information object, as including information that guides two peers towards executing the EDHOC protocol, and defines an initial set of its parameters.</t>
      <t>This document defines the new parameter "app_prof" of the EDHOC_Information object, as summarized in <xref target="_table-cbor-key-edhoc-params"/> and described further below.</t>
      <table align="center" anchor="_table-cbor-key-edhoc-params">
        <name>EDHOC_Information Parameter "app_prof"</name>
        <thead>
          <tr>
            <th align="left">Name</th>
            <th align="left">CBOR label</th>
            <th align="left">CBOR type</th>
            <th align="left">Registry</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">app_prof</td>
            <td align="left">14</td>
            <td align="left">int or array</td>
            <td align="left">EDHOC Application Profiles Registry</td>
            <td align="left">Set of supported EDHOC Application Profiles</td>
          </tr>
        </tbody>
      </table>
      <ul spacing="normal">
        <li>
          <t>app_prof: This parameter specifies a set of supported EDHOC application profiles, identified by their Profile ID. If the set is composed of a single EDHOC application profile, its Profile ID is encoded as an integer. Otherwise, the set is encoded as an array of integers, where each array element encodes one Profile ID. In JSON, the "app_prof" value is an integer or an array of integers. In CBOR, "app_prof" is an integer or an array of integers, and has label 14. The integer values are taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document.</t>
        </li>
      </ul>
      <section anchor="use-in-the-edhoc-and-oscore-profile-of-the-ace-framework">
        <name>Use in the EDHOC and OSCORE Profile of the ACE Framework</name>
        <t><xref section="3.2" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/> defines how the EDHOC_Information object can be used within the workflow of the EDHOC and OSCORE transport profile of the ACE framework for authentication and authorization in constrained environments (ACE) <xref target="RFC9200"/>.</t>
        <t>In particular, the AS-to-C Access Token Response includes the parameter "edhoc_info", with value an EDHOC_Information object. This allows the ACE Authorization Server (AS) to provide the ACE Client (C) with information about how to run the EDHOC protocol with the ACE Resource Server (RS) for which the Access Token is issued. Similarly, the Access Token includes the corresponding "edhoc_info" claim, with value an EDHOC_Information object.</t>
        <t>In turn, the EDHOC_Information object can include the parameter "app_prof" defined in this document. This parameter indicates a set of EDHOC application profiles associated with the EDHOC resource to use at the RS, which is either implied or specified by the parameter "uri_path" within the same EDHOC_Information object.</t>
        <t>If the EDHOC_Information object specified as value of "edhoc_info" includes the "app_prof" parameter, then the following applies.</t>
        <ul spacing="normal">
          <li>
            <t>The object <bcp14>MUST NOT</bcp14> include other parameters that provide information pertaining to an EDHOC application profile, with the exception of the parameter "eads" that <bcp14>MAY</bcp14> be included.  </t>
            <t>
C and RS <bcp14>MUST</bcp14> ignore other parameters present in the EDHOC_Information object, with the exception of the parameter "eads".  </t>
            <t>
At the time of writing this document, such parameters are: "methods", "cipher_suites", "message_4", "comb_req", "osc_ms_len", "osc_salt_len", "osc_version", "cred_types", "id_cred_types", "initiator", and "responder". These are all defined in <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
          </li>
          <li>
            <t>If the EDHOC_Information object includes the parameter "eads", the object provides the following information: when using the target EDHOC resource as per any EDHOC application profile indicated by the parameter "app_prof", the RS supports the EAD items that are specified in the definition of that EDHOC application profile, as well as the EAD items indicated by the parameter "eads".</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-app-profile-cbor">
      <name>Representation of an EDHOC Application Profile</name>
      <t>This section defines the EDHOC_Application_Profile object, which can be used as a canonical representation of EDHOC application profiles for their description, distribution, and storage.</t>
      <t>An EDHOC_Application_Profile object is encoded as a CBOR map <xref target="RFC8949"/>. Each element of the CBOR map is an element of the CBOR-encoded EDHOC_Information object defined in <xref section="3.3" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>, and thus uses the corresponding CBOR abbreviations from the 'CBOR label' column of the "EDHOC Information" registry defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
      <t>The CBOR map encoding the EDHOC application profile <bcp14>MUST</bcp14> include the element "app_prof" defined in this document. Its value is the unique identifier of the EDHOC application profile in question, taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in this document, and encoded as a CBOR integer.</t>
      <t>The CBOR map <bcp14>MUST</bcp14> include the following elements defined for the EDHOC_Information object: "methods" and "cred_types".</t>
      <t>The CBOR map <bcp14>MUST NOT</bcp14> include the following elements defined for the EDHOC_Information object: "session_id", "uri_path", "initiator", and "responder".</t>
      <t>The CBOR map <bcp14>MAY</bcp14> include other elements defined for the EDHOC_Information object. Consistently with Sections <xref target="RFC9528" section="8" sectionFormat="bare"/> and <xref target="RFC9528" section="A.1" sectionFormat="bare"/> of <xref target="RFC9528"/> and with <xref section="5.4" sectionFormat="of" target="RFC8613"/>:</t>
      <ul spacing="normal">
        <li>
          <t>If the element "cipher_suites" is not present in the CBOR map, this indicates that the EDHOC application profile uses the EDHOC cipher suites 2 and 3.</t>
        </li>
        <li>
          <t>If the element "id_cred_types" is not present in the CBOR map, this indicates that the EDHOC application profile uses "kid" as type of authentication credential identifiers for EDHOC.</t>
        </li>
        <li>
          <t>If the element "osc_ms_len" is not present in the CBOR map, this indicates that, when using EDHOC to key OSCORE <xref target="RFC8613"/>, the size of the OSCORE Master Secret in bytes is equal to the size of the key length for the application AEAD Algorithm of the selected cipher suite for the EDHOC session.</t>
        </li>
        <li>
          <t>If the element "osc_salt_len" is not present in the CBOR map, this indicates that, when using EDHOC to key OSCORE, the size of the OSCORE Master Salt in bytes is 8.</t>
        </li>
        <li>
          <t>If the element "osc_version" is not present in the CBOR map, this indicates that, when using EDHOC to key OSCORE, the OSCORE Version Number has value 1.</t>
        </li>
        <li>
          <t>The absence of any other elements in the CBOR map <bcp14>MUST NOT</bcp14> result in assuming any value.</t>
        </li>
      </ul>
      <t>If an element is present in the CBOR map and the information that it specifies is intrinsically a set of one or more co-existing alternatives, then all the specified alternatives apply for the EDHOC application profile in question.</t>
      <t>For example, the element "cipher_suites" with value the CBOR array [0, 2] means that, in order to adhere to the EDHOC application profile in question, an EDHOC peer has to implement both the EDHOC cipher suites 0 and 2, because either of them can be used by another EDHOC peer also adhering to the same EDHOC application profile.</t>
      <t>The CDDL grammar describing the EDHOC_Application_Profile object is:</t>
      <artwork><![CDATA[
EDHOC_Application_Profile = {
      1 => int / array,    ; methods
      9 => int / array,    ; cred_types
     14 => int,            ; app_prof
   * int / tstr => any
}
]]></artwork>
      <t>[ NOTE:</t>
      <t>Based on Sections <xref target="RFC9528" section="3.9" sectionFormat="bare"/> and <xref target="RFC9528" section="F" sectionFormat="bare"/> of <xref target="RFC9528"/>, further parameters can be defined for the EDHOC_Information object specified in <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>, and then used for the EDHOC_Application_Profile object defined in this document. For example:</t>
      <ul spacing="normal">
        <li>
          <t>The way(s) to express the identity of endpoints within authentication credentials, e.g., EUI-64.</t>
        </li>
        <li>
          <t>Limitations in the size of EDHOC messages (see <xref section="3.4" sectionFormat="of" target="RFC9528"/>).</t>
        </li>
        <li>
          <t>The transport(s) to use for EDHOC. How to indicate that? It is actually about multiple pieces of information, often transport-dependent.  </t>
          <ul spacing="normal">
            <li>
              <t>For example, if CoAP is indicated, it should be said over what CoAP is in turn transported, if any of the EDHOC-related CoAP Content-Format has to be indicated, etc. See, for instance, point 1 in Sections <xref target="RFC9528" section="3.9" sectionFormat="bare"/> and <xref target="RFC9528" section="F" sectionFormat="bare"/> of <xref target="RFC9528"/>.      </t>
              <t>
This might require another registry about "transport suites" to be used with EDHOC, each of which registered with a unique identifier, specifying the transport protocol together with additional (transport-dependent) pieces of information.</t>
            </li>
            <li>
              <t>At the same time, <xref section="3.9" sectionFormat="of" target="RFC9528"/> says:      </t>
              <t>
"Note that it is not necessary for the endpoints to specify a single transport for the EDHOC messages. For example, a mix of CoAP and HTTP may be used along the path, and this may still allow correlation between messages."      </t>
              <t>
In order to take this into account, an application profile can specify two sets of supported transports, i.e., with a parameter "tp_i" pertaining to an Initiator that uses this profile and a parameter "tp_r" pertaining to a Responder that uses this profile. The two sets can independently specify the expected support for multiple transports, each together with related transport-dependent information.      </t>
              <t>
In order to handle the case where both "tp_i" and "tp_r" are equal, a single parameter "tp" can be used instead. In that case, an Initiator and a Responder using this profile are expected to use any of the transports from the set specified by the parameter "tp".</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>]</t>
    </section>
    <section anchor="sec-well-known-app-profile">
      <name>Well-known EDHOC Application Profile</name>
      <t>TBD</t>
      <t>[ NOTE:</t>
      <t>This well-known EDHOC application profile is <em>not</em> intended to be a "default" profile to use, in case no other indication is provided to the EDHOC peers.</t>
      <t>With particular reference to using EDHOC with CoAP, it must <em>not</em> be silently assumed that, unless otherwise indicated, the EDHOC resource at /.well-known/edhoc is used according to such a well-known profile.</t>
      <t>If this well-known EDHOC application profile was treated as a "default" profile, it might be suggesting what is generally mandatory to implement, which is instead limited to what is already defined by the compliance requirements in <xref section="8" sectionFormat="of" target="RFC9528"/> (i.e., simply support for "kid" as type of credential identifier, as well as for cipher suites 2 and 3).</t>
      <t>That is, this well-known EDHOC application profile is <em>not</em> intended to practically replace the compliance requirements from <xref section="8" sectionFormat="of" target="RFC9528"/>, which defines what is a de-facto, unnamed default EDHOC application profile.</t>
      <t>Instead, this well-known EDHOC application profile should reflect what is the most common and expected way to use EDHOC.</t>
      <t>]</t>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has the following actions for IANA.</t>
      <t>Note to RFC Editor: Please replace all occurrences of "[RFC-XXXX]" with the RFC number of this specification and delete this paragraph.</t>
      <section anchor="iana-media-type">
        <name>Media Type Registrations</name>
        <t>IANA is asked to register the media type "application/edhoc-app-profile+cbor-seq". This registration follows the procedures specified in <xref target="RFC6838"/>.</t>
        <t>Type name: application</t>
        <t>Subtype name: edhoc-app-profile+cbor-seq</t>
        <t>Required parameters: N/A</t>
        <t>Optional parameters: N/A</t>
        <t>Encoding considerations: Must be encoded as a CBOR sequence <xref target="RFC8742"/> of CBOR maps. Each element of each CBOR map is also defined as an element of the CBOR-encoded EDHOC_Information object from <xref section="3.3" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
        <t>Security considerations: See <xref target="sec-security-considerations"/> of [RFC-XXXX].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [RFC-XXXX]</t>
        <t>Applications that use this media type: Applications that need to describe, distribute, and store a representation of an EDHOC application profile (see <xref section="3.9" sectionFormat="of" target="RFC9528"/>).</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information: N/A</t>
        <t>Person &amp; email address to contact for further information: LAKE WG mailing list (lake@ietf.org) or IETF Applications and Real-Time Area (art@ietf.org)</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: None</t>
        <t>Author/Change controller: IETF</t>
        <t>Provisional registration: No</t>
      </section>
      <section anchor="iana-content-type">
        <name>CoAP Content-Formats Registry</name>
        <t>IANA is asked to add the following entry to the "CoAP Content-Formats" registry within the "Constrained RESTful Environments (CoRE) Parameters" registry group.</t>
        <t>Content Type: application/edhoc-app-profile+cbor-seq</t>
        <t>Content Coding: -</t>
        <t>ID: TBD</t>
        <t>Reference: [RFC-XXXX]</t>
      </section>
      <section anchor="iana-edhoc-application-profiles">
        <name>EDHOC Application Profiles Registry</name>
        <t>IANA is requested to create a new "EDHOC Application Profiles" registry within the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" registry group defined in <xref target="RFC9528"/>.</t>
        <t>As registration policy, the registry uses either "Standards Action with Expert Review", or "Specification Required" per <xref section="4.6" sectionFormat="of" target="RFC8126"/>. Expert Review guidelines are provided in <xref target="iana-expert-review"/>.</t>
        <t>All assignments according to "Standards Action with Expert Review" are made on a "Standards Action" basis per <xref section="4.9" sectionFormat="of" target="RFC8126"/>, with Expert Review additionally required per <xref section="4.5" sectionFormat="of" target="RFC8126"/>. The procedure for early IANA allocation of Standards Track code points defined in <xref target="RFC7120"/> also applies. When such a procedure is used, review and approval by the designated expert are also required, in order for the WG chairs to determine that the conditions for early allocation are met (see step 2 in <xref section="3.1" sectionFormat="of" target="RFC7120"/>).</t>
        <t>The columns of this registry are:</t>
        <ul spacing="normal">
          <li>
            <t>Profile ID: This field contains the value used to identify the EDHOC application profile. These values <bcp14>MUST</bcp14> be unique. The value can be an unsigned integer or a negative integer. Different ranges of values use different registration policies <xref target="RFC8126"/>:  </t>
            <ul spacing="normal">
              <li>
                <t>Integer values from -24 to 23 are designated as "Standards Action With Expert Review".</t>
              </li>
              <li>
                <t>Integer values from -65536 to -25 and from 24 to 65535 are designated as "Specification Required".</t>
              </li>
              <li>
                <t>Integer values smaller than -65536 and greater than 65535 are marked as "Private Use".</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Name: This field contains the name of the EDHOC application profile.</t>
          </li>
          <li>
            <t>Description: This field contains a short description of the EDHOC application profile.</t>
          </li>
          <li>
            <t>Reference: This field contains a pointer to the public specification for the EDHOC application profile.</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-target-attributes">
        <name>Target Attributes Registry</name>
        <t>IANA is asked to register the following entry in the "Target Attributes" registry within the "Constrained RESTful Environments (CoRE) Parameters", as per <xref target="RFC9423"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-prof</t>
          </li>
          <li>
            <t>Brief Description: A supported EDHOC application profile</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-edhoc-information-registry">
        <name>EDHOC Information Registry</name>
        <t>IANA is asked to register the following entry in the "EDHOC Information" registry defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Name: app_prof</t>
          </li>
          <li>
            <t>CBOR label: 14</t>
          </li>
          <li>
            <t>CBOR type: int or array</t>
          </li>
          <li>
            <t>Registry: EDHOC Application Profiles Registry</t>
          </li>
          <li>
            <t>Description: Set of supported EDHOC Application Profiles</t>
          </li>
          <li>
            <t>Specification: [RFC-XXXX], <xref target="RFC9528"/></t>
          </li>
        </ul>
      </section>
      <section anchor="iana-expert-review">
        <name>Expert Review Instructions</name>
        <t>The IANA registry established in this document is defined as "Standards Action with Expert Review" or "Specification Required", depending on the range of values for which an assignment is requested. This section gives some general guidelines for what the experts should be looking for, but they are being designated as experts for a reason so they should be given substantial latitude.</t>
        <t>Expert reviewers should take into consideration the following points:</t>
        <ul spacing="normal">
          <li>
            <t>Clarity and correctness of registrations. Experts are expected to check the clarity of purpose and use of the requested entries. Experts need to make sure that registered identifiers indicate an EDHOC application profile that is clearly defined in the corresponding specification. Identifiers of EDHOC application profiles that do not meet these objective of clarity and completeness must not be registered.</t>
          </li>
          <li>
            <t>Point squatting should be discouraged. Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered and that the point is likely to be used in deployments. The zones tagged as "Private Use" are intended for testing purposes and closed environments. Code points in other ranges should not be assigned for testing.</t>
          </li>
          <li>
            <t>Specifications are required for the "Standards Action With Expert Review" range of point assignment. Specifications should exist for "Specification Required" ranges, but early assignment before a specification is available is considered to be permissible. When specifications are not provided, the description provided needs to have sufficient information to identify what the point is being used for.</t>
          </li>
          <li>
            <t>Experts should take into account the expected usage of fields when approving point assignment. The fact that there is a range for Standards Track documents does not mean that a Standards Track document cannot have points assigned outside of that range. The length of the encoded value should be weighed against how many code points of that length are left, the size of device it will be used on, and the number of code points left that encode to that size.</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="RFC6690">
        <front>
          <title>Constrained RESTful Environments (CoRE) Link Format</title>
          <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
          <date month="August" year="2012"/>
          <abstract>
            <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6690"/>
        <seriesInfo name="DOI" value="10.17487/RFC6690"/>
      </reference>
      <reference anchor="RFC6838">
        <front>
          <title>Media Type Specifications and Registration Procedures</title>
          <author fullname="N. Freed" initials="N." surname="Freed"/>
          <author fullname="J. Klensin" initials="J." surname="Klensin"/>
          <author fullname="T. Hansen" initials="T." surname="Hansen"/>
          <date month="January" year="2013"/>
          <abstract>
            <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="13"/>
        <seriesInfo name="RFC" value="6838"/>
        <seriesInfo name="DOI" value="10.17487/RFC6838"/>
      </reference>
      <reference anchor="RFC7120">
        <front>
          <title>Early IANA Allocation of Standards Track Code Points</title>
          <author fullname="M. Cotton" initials="M." surname="Cotton"/>
          <date month="January" year="2014"/>
          <abstract>
            <t>This memo describes the process for early allocation of code points by IANA from registries for which "Specification Required", "RFC Required", "IETF Review", or "Standards Action" policies apply. This process can be used to alleviate the problem where code point allocation is needed to facilitate desired or required implementation and deployment experience prior to publication of an RFC, which would normally trigger code point allocation. The procedures in this document are intended to apply only to IETF Stream documents.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="100"/>
        <seriesInfo name="RFC" value="7120"/>
        <seriesInfo name="DOI" value="10.17487/RFC7120"/>
      </reference>
      <reference anchor="RFC7252">
        <front>
          <title>The Constrained Application Protocol (CoAP)</title>
          <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
          <author fullname="K. Hartke" initials="K." surname="Hartke"/>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <date month="June" year="2014"/>
          <abstract>
            <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
            <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7252"/>
        <seriesInfo name="DOI" value="10.17487/RFC7252"/>
      </reference>
      <reference anchor="RFC8126">
        <front>
          <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
          <author fullname="M. Cotton" initials="M." surname="Cotton"/>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <author fullname="T. Narten" initials="T." surname="Narten"/>
          <date month="June" year="2017"/>
          <abstract>
            <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
            <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
            <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="26"/>
        <seriesInfo name="RFC" value="8126"/>
        <seriesInfo name="DOI" value="10.17487/RFC8126"/>
      </reference>
      <reference anchor="RFC8288">
        <front>
          <title>Web Linking</title>
          <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
          <date month="October" year="2017"/>
          <abstract>
            <t>This specification defines a model for the relationships between resources on the Web ("links") and the type of those relationships ("link relation types").</t>
            <t>It also defines the serialisation of such links in HTTP headers with the Link header field.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8288"/>
        <seriesInfo name="DOI" value="10.17487/RFC8288"/>
      </reference>
      <reference anchor="RFC8610">
        <front>
          <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
          <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
          <author fullname="C. Vigano" initials="C." surname="Vigano"/>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <date month="June" year="2019"/>
          <abstract>
            <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8610"/>
        <seriesInfo name="DOI" value="10.17487/RFC8610"/>
      </reference>
      <reference anchor="RFC8613">
        <front>
          <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
          <author fullname="G. Selander" initials="G." surname="Selander"/>
          <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
          <author fullname="F. Palombini" initials="F." surname="Palombini"/>
          <author fullname="L. Seitz" initials="L." surname="Seitz"/>
          <date month="July" year="2019"/>
          <abstract>
            <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
            <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8613"/>
        <seriesInfo name="DOI" value="10.17487/RFC8613"/>
      </reference>
      <reference anchor="RFC8742">
        <front>
          <title>Concise Binary Object Representation (CBOR) Sequences</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <date month="February" year="2020"/>
          <abstract>
            <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq". A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
            <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation. This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8742"/>
        <seriesInfo name="DOI" value="10.17487/RFC8742"/>
      </reference>
      <reference anchor="RFC8949">
        <front>
          <title>Concise Binary Object Representation (CBOR)</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <date month="December" year="2020"/>
          <abstract>
            <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
            <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="94"/>
        <seriesInfo name="RFC" value="8949"/>
        <seriesInfo name="DOI" value="10.17487/RFC8949"/>
      </reference>
      <reference anchor="RFC9200">
        <front>
          <title>Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)</title>
          <author fullname="L. Seitz" initials="L." surname="Seitz"/>
          <author fullname="G. Selander" initials="G." surname="Selander"/>
          <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
          <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="August" year="2022"/>
          <abstract>
            <t>This specification defines a framework for authentication and authorization in Internet of Things (IoT) environments called ACE-OAuth. The framework is based on a set of building blocks including OAuth 2.0 and the Constrained Application Protocol (CoAP), thus transforming a well-known and widely used authorization solution into a form suitable for IoT devices. Existing specifications are used where possible, but extensions are added and profiles are defined to better serve the IoT use cases.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9200"/>
        <seriesInfo name="DOI" value="10.17487/RFC9200"/>
      </reference>
      <reference anchor="RFC9423">
        <front>
          <title>Constrained RESTful Environments (CoRE) Target Attributes Registry</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <date month="April" year="2024"/>
          <abstract>
            <t>The Constrained RESTful Environments (CoRE) specifications apply web technologies to constrained environments. One such important technology is Web Linking (RFC 8288), which CoRE specifications use as the basis for a number of discovery protocols, such as the Link Format (RFC 6690) in the Constrained Application Protocol's (CoAP's) resource discovery process (Section 7.2 of RFC 7252) and the Resource Directory (RD) (RFC 9176).</t>
            <t>Web Links can have target attributes, the names of which are not generally coordinated by the Web Linking specification (Section 2.2 of RFC 8288). This document introduces an IANA registry for coordinating names of target attributes when used in CoRE. It updates the "RD Parameters" IANA registry created by RFC 9176 to coordinate with this registry.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9423"/>
        <seriesInfo name="DOI" value="10.17487/RFC9423"/>
      </reference>
      <reference anchor="RFC9528">
        <front>
          <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
          <author fullname="G. Selander" initials="G." surname="Selander"/>
          <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
          <author fullname="F. Palombini" initials="F." surname="Palombini"/>
          <date month="March" year="2024"/>
          <abstract>
            <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9528"/>
        <seriesInfo name="DOI" value="10.17487/RFC9528"/>
      </reference>
      <reference anchor="I-D.ietf-core-oscore-edhoc">
        <front>
          <title>Using Ephemeral Diffie-Hellman Over COSE (EDHOC) with the Constrained Application Protocol (CoAP) and Object Security for Constrained RESTful Environments (OSCORE)</title>
          <author fullname="Francesca Palombini" initials="F." surname="Palombini">
            <organization>Ericsson</organization>
          </author>
          <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
            <organization>RISE AB</organization>
          </author>
          <author fullname="Rikard Höglund" initials="R." surname="Höglund">
            <organization>RISE AB</organization>
          </author>
          <author fullname="Stefan Hristozov" initials="S." surname="Hristozov">
            <organization>Fraunhofer AISEC</organization>
          </author>
          <author fullname="Göran Selander" initials="G." surname="Selander">
            <organization>Ericsson</organization>
          </author>
          <date day="9" month="April" year="2024"/>
          <abstract>
            <t>   The lightweight authenticated key exchange protocol Ephemeral Diffie-
   Hellman Over COSE (EDHOC) can be run over the Constrained Application
   Protocol (CoAP) and used by two peers to establish a Security Context
   for the security protocol Object Security for Constrained RESTful
   Environments (OSCORE).  This document details this use of the EDHOC
   protocol, by specifying a number of additional and optional
   mechanisms.  These especially include an optimization approach for
   combining the execution of EDHOC with the first OSCORE transaction.
   This combination reduces the number of round trips required to set up
   an OSCORE Security Context and to complete an OSCORE transaction
   using that Security Context.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-edhoc-11"/>
      </reference>
      <reference anchor="I-D.ietf-ace-edhoc-oscore-profile">
        <front>
          <title>Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
          <author fullname="Göran Selander" initials="G." surname="Selander">
            <organization>Ericsson</organization>
          </author>
          <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
            <organization>Ericsson</organization>
          </author>
          <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
            <organization>RISE</organization>
          </author>
          <author fullname="Rikard Höglund" initials="R." surname="Höglund">
            <organization>RISE</organization>
          </author>
          <date day="4" month="March" year="2024"/>
          <abstract>
            <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving
   mutual authentication between an ACE-OAuth Client and Resource
   Server, and it binds an authentication credential of the Client to an
   ACE-OAuth access token.  EDHOC also establishes an Object Security
   for Constrained RESTful Environments (OSCORE) Security Context, which
   is used to secure communications when accessing protected resources
   according to the authorization information indicated in the access
   token.  This profile can be used to delegate management of
   authorization information from a resource-constrained server to a
   trusted host with less severe limitations regarding processing power
   and memory.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-ace-edhoc-oscore-profile-04"/>
      </reference>
      <reference anchor="COSE.Header.Parameters" target="https://www.iana.org/assignments/cose/cose.xhtml#header-parameters">
        <front>
          <title>COSE Header Parameters</title>
          <author>
            <organization>IANA</organization>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors sincerely thank <contact fullname="Christian Amsüss"/>, <contact fullname="Göran Selander"/>, and <contact fullname="Brian Sipos"/> for their feedback and comments.</t>
      <t>This work was supported by the Sweden's Innovation Agency VINNOVA within the EUREKA CELTIC-NEXT project CYPRESS.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA81d3XbbRpK+51P00udMbC9JS5Ts2PQ4O7REx9rYkleSk8mJ
c3SaQJPECAQYNCBaUbTPsk8xV3u1ebGtn250AwQpKpvsjC5iEmz0T1V11Vc/
3el2u62rgdhrtfIoj9VAHKRpFkaJzKNkKvKZEh+1EulEDBeLOArgcZqID1k6
iWKlxSTNxGgxU3OVyVgcRpNJpLpvVRzPZSJOrlQmDk7ORuLh6PDtycGjlhyP
MwWj0dfGHlthGiRyDvMIMznJu3kUp4HsxvJSdeVi0V2YdvAkVzpvwesDofOw
pYvxPNIa+sqvF/D60ej8TasVLbKByLNC5/2dnRc7/ZbMlByIMxUUWZRft5bT
gXg3/GYkvkuzS1zw11laLFqXS+ggyVWWqLx7iBNptYIUqALNi3zSfd5qySKf
pdmgJbpC8ITfyyxIxTlNuCXgL82g+ekRrH/4mh7oPFMK5nuk5eRvQGU9lTnQ
qd+nXwOY0EB8E+mcX4cBodezUXf32f7+jjjL0+BylsZz82OR5Bm0P1uqUCX0
TM1lFA/EHOfRY8L9JYt6WnmTPI0uZRaKt7/+fRoXSfiPnGdGU+nNUpqJmWkr
SbM5iMSVAtKK0zcHz5692LEfn+89Nx+/3O3bp1/2n/bNx+e7/Wf2Y/+5bfv8
2e6O+7hnP365X772Yv+F+fgCxMR+3O/bti+e9qmzo+5hL1LA/yDNVDfV9I8K
Z2lQ+VUG5qltYoQWG+F26L1VMlRZ74PMgCcgZXpAdClFSpRcORoeD+l7COI+
EBMZIzfhz25W3F3cnXDdcQuZTZGJszxf6MGTJ8vlshfJRPag4ycSdso0mask
10+CVCv6T+/zLJ/HD2bUXXfhumtFycSxpQVvoQjAKGejd28Gov0D0Kj7V/j7
sd1qdbtdIccgQjKAXXMOCiSOprN8qfC/tEZ8H/atCsWluhbqczCTyVQJoBKI
ThrfQ6GITP1URBkookBluYwS4WYt8lSMlZBTkOVQpEXeTSfdsUzCjoB2INXQ
FzRRiS4yJaJcC10EgdJ6UsQgtvNFrFAz9cR5Cmow0tASXpWezrK6SOiFCqLJ
NWnLCNRGEsKIBatNVnUwkIzjdEkKE5tlKlZXMsmxExwUdQ/MTcAKo4kZwC5h
DvyAaeAcQDsWyDURqkmUwNBSJMV8DEuBoeZK8juBVeGKxsKZYN9hBOIIA1y7
eTUtpyeGsU6BSv4ogUzSBFrGHXHw+uQUCKlhjZlaAPFhPtxDPpM5tsRJF/g7
zCVUOsiiserg8Dl8KnL4jNPROeyNjfN4A2uI4+vaVJYgDd3LJF0m61/usRzO
ozCMQak8QG2epWERUKMH4uZBhA9uW617CNvNjdEFt7ciwpncU7A7QpGk4Jqc
nKBEIIdAKAPgOewbWCdQJ1CJzKJUw1KOPHl1QgqdZIWhQYcYnS9TsVAo+7D3
SKI0LDzKIwmkJpqfwgzSBLuayStFYon7QwBRVndQT5ylcxJi0EsoQ7hPEtpD
1BlsknmRmBXnM7Cc0xnNo9zJ6jMYWiQ5cB8MLsxoOYuCGZBuopbcsZqDfAOx
rhSJTaKmKc5XhT3xNl3C46wjUmiW+VvbTh5eYEGobO+xmqBkAXESi2FYUOy8
gKRDTduh0CimsOqbG8AEJBx7vRc4s5LVlT2vSbyRXevltmMWuUYryOnvqxeO
iGUgeEUsM9xZ66dGlI6SIC5CJcZA1Qo7PRr6QoA6/P9J83RYg0RgD1uPBZqO
BMQEbSDQZYrq41q012PHtpmbYSgaO2OHvcFKBImcXYJckSBx97AYZNQU/w1x
M4M+AGnbrC39qbLNFTI3ik60VUgD1qa2VONuHCWIOHkaKC++4oRWqOjGAlux
4kFEA4oHJcayGHRvWmSBNQ5eBx0SqAjUiUwC1eH+sK8uG3LHTuobQRb0bXQ1
ylx1AOA2rEpoldF+BLLZKcCwoLESPVFZhmaWlGY6/MD9IjaDfh9qUDFuhw17
/coOQzWFSh3/vblZD7Jubx9VqF0KqWgDZy6YznYj0fQujixwgWHT8d9gAmZb
RpYVd6K229sejehGw93gc1OrwLwZueE8/EQ6BPVlnT/qs0SYQexxWgqbnpwd
nJyOyn3LmlIMD0Zigr0uwVvZbu4oL1ESkpL2x2iEMcVikWaozMfXwO1Tw3zw
lpDtQPo3RYaaeA4jdBgTNWiFfwBSsAKGjPCcxG4wTjMQmo4vYNvhB79H197v
nIXxwQNxDgSJkjROp9fiASKL3D24ZQCMaGCJfpRov/94dt7u8L/i+IQ+n47+
4+PR6egQP5+9Hb57V35omRZnb08+vjt0n9ybByfv34+OD/lleCoqj1rt98Pv
20zE9smH86OT4+G7Noubzz2ZWXOK+i8DVqEUSPDGDU9I0l8ffPif/9rdB7L8
C+zd/u7uC5Av/vJ898t9+IKKgUdLE4An/BVE5roFlFMyIz0EfAjkIsrBlyHO
6BmyAjUx7u4fkDI/DsSfx8Fid/8r8wAXXHloaVZ5SDRbfbLyMhOx4VHDMCU1
K89rlK7Od/h95bulu/eQxSJjvw1di8+glHLeBsCEiZxHcQTkWkZgo1GetAFc
oMwXeUX9sAh70JTpz28aE1waMHq6op49hcOWBrxksgaejtuklYFtBzCzCEZ6
DbYfjPQJq9rT6qZ/iPrAwGj0uc3Q9t1DmUtxiING1PwdgOcC0dLDg8PDd4/K
uaGlQoG1hrIiyj2BjWEbKzt9DAdR8ENX8Dd6qKSEcVKg8EA9otJJpkzqvPJz
rj7n9ueOGxyegvsITjHh+dpE0Ov4Diz4O7bz5HT4dr/VchbxGbJoE4kbUVcd
behVtboeR5AoWPvORGrjiD0asV232bs7vd2ditV+ZFAHIgCQswDUPBC4N+0Z
fFAwdv3HoQ5ZM9Pr4IdZB+FwMmBxhFOErZiOySMqMbln3oUcA17ebFEf6kdm
QxMviOKy9LNqEI68POxOg6gCSImyKDdGVpuJWxnAVpMUp0sUDkPaL+DBlpCj
BinTBTcAMXXoh2zhCmAt9QZNA7eNBSckQXlqvBTsB8NBtWWArwaO5jw1bhdQ
AQETsBf+iSSLo3MGMHqjdA6YJp2XhCeI94XBzV90rBvFjtAGi11BL7QChi3M
XYfeyJxY3wykCzqGt69kXChLNhQveQnSRhPDvr4wPoY4OvwC1HBczBMLyjY6
JKXbcj/PhPuuqLX6KobfizQIikzMiziPAEWKPCIdRxxUEpZBv2cKbMa2RATa
f4e7zGueV6BvyRfnUTR6JCYeUZeuLH9VUTLEC0Id5JOGuAsmm/q1LbW3OG05
sTKcJ0UYnKlvHFy/58DRoBZslG4yxx7WqFro/Ao8xQbFsFFUUbdaXXkPI/Co
47an+oxIgNyaDYsHgPEFzxTlpUpoIRiDBNGC9B2tPJomCLX/gEX/prkTb44m
Tv/cm/3YS8e9b+Ze16HeUga+9fK6rckhaM+Fyjbr/9LxYocqufZ35HYya5SY
VW4879HwUIBCnRt+IBypOLXYJnQ4ikaS+SbWeP5RdYDKCvCn+9C9xzDXeLms
+ibRtGtRUNf8AvoOfQAt4D+w+cmQGyNsbYWm2GYjPKDmFiOQ60FWW6+x1k18
gk2WcWCUmJ4a9WnjnuWAHAhAQCfeMKBJUoNtyVK4vfzUIAwDcUB1IwSoEURq
Dcpdmz2B8ScjGBuVRxmZKnliY1bORomnOzueMVsxjXVhzsUTY47inN0HWrgn
ROXGI6Hk/lyspZQX2uP4NZZjFYvd3V3qrt/v89ozCs16G9IAio0TskLI8t6p
blD527YmTbROsLs33Or6Org4Fry9vT1Y5X/W/1rgqw7E16Nz8aTnYglPULO3
4Lezgej3dp6iGwQCkFPu7s9PwGvSaaafwKiLr16CHejUfqDcw1cvo8krfmJ/
94cgEn71EqyuM7ovYXMGuoDlvNrxPvdfmrSjEPAQjP0sDU0DQNjd/NWu93kP
P0eh+bZfeTXC3zJqnM7HXYB4dmYlQxtmhGx5BTx4yarjFZCygZA3A/GgSYFw
NvRVGzeXdbl6bVCMOQbKYEgwawA8FMY22rfomK1GB132lDy1O2N6vvu219uv
2O4N4Tgfw68LUZI+5g1XM04s79OCTViZ7cnTpcTokkm3NOY8WERLNxJ3NCaG
YhD4HCePCdAtov55Y+z1kwm+GouwcWGg8+Yyi362YDiXYxOq616qa0M36l6b
AIELQk04AAlIBgw3zPEXcYweCv79wp4670vzhbxa+u3U4vANf7+IQxqIocld
f7/A4DbqDK/u7nv9gEImPyjL5DV8Xe8guHn9Is6YD05Xb3jtF9oKGyhnd8QG
ORefyqj5pzZslvomeSxKxg7q3oeFG5rc88Z5N+d3VoxX5JutnsV62CcmNNL5
IkXXGW2i9dQ2wBiUYU+nU84eq1PY2U2soeyJE5SiZaRVxx+u2pi5hzuD39I2
XUTggH9VsaLdwW8CIkpUdTmJ+Pezk2Mexd8o5G5SErmcFUlMw7DUC4pzp9LD
Vu/ypp/Bgoy92mcIY1+jaWgO//6TObwUW/+oy/DDSm7ETtDLjbyxuZGqcu7f
VzkjDt2YQ/JDbAgJzBxx6Almc3096M+ZglYEnTZmdhBXefUEBGAxSUv1QdHP
0iCySr2ASq6iLOWSHvEQ+rP1Cv2dHQrR1vLENOpZN0+7wEoqKRDnKYoAlwho
VYV8nr4n4l2gVWobp46l2aLWBoJVQ2x2wcPKejjLBFM/o6iZ9TJt4wN2CB4e
POIxV9E9cS2lmohV8+e8T+ysltoSD09hUKQ6Q2Zq5tOEwpy6wKKEs2geAQGx
KmW1mU+xqlPhUw2cGxnNt6YdRwaLjFMpm4XSRi1qLHPpUW9bbg4wOdBdqvgN
CThwZdKAyjYcoWuwHFhD5QDshp2eef6JisiqR3MMyISozJw/azwWbzFFFl0s
ZD5r+1uPwpWbSLgZmVTjoswTWHGFaxXueiT1oq5bRJnMeGviTH752rpYy4ID
yMZV/a0xF39DyxA099owEWuw07OGCJE3XZPpqajrRgi4/ZRo9CHLCwY3sd0y
iwzA9YS3g1VRM382YNEGos1ujMbUaBAtYMIX5OzQA3C8sRTnYp9+BVflAlwV
/AxW4WKuL2KV2G8afBb/O8YjYNr0IrhAFwgzqc8ovKg9sMVXNgeb2fqrNhli
U1SFKdHGVMX2joUfKVsr5Gs1uiQi5U48f+84GQa/toyTrVNdHaM3/nliYQ3y
+qCe8/SjOQ2IqfQ1V8oWjAPWlPth/nq9XZRYyO6xlYIiWSnNqJdjbFbuJswD
UD10DpJXpUHfbJ0G7Cksr0vunGUdcbPLNpcLP0HcEyNE2xZnG0VRtmQQ3PBr
1/a8di+s2W97W+43XnA+Kyiy12TxaZJ84CEyZXsOXTtfdQ269ma8DlRvpxXO
fXoRVarxgab9yIregxKWwlsBiaNcO/+GShCS6KfCC1xmNXzcqBEEpQZJtP5A
16RmRpCnqzJp3cYaMVeo5PSkoZdLQN9VleYZKzYUnh1pHNeHDv/3sbWikzMX
UYhWqwRYd1iw+rwAO1TRzL2n0sMoqKZIeI71QwgVyt2pxXOawrC3WysftPUu
XvydDWdZzDLwzGMpzFVMgNKapHkdyNjlmVx8NRZ9hxSXmoGb8HiCxxN9jhn3
mmZWBRJ/1Mzal8BvsnMYJ0NLVfU5cQr4FeyFXw5LZ76w58ape/Dpt8y7Et0v
a6SxgG61QskEb6KfSzfatHkvqZYXhCFTNCyW91ClivqpgNWYpIP/Jo4Ac56C
FFkh9ek2RBgwjKfgruazuX1Jw6qpbMvnbFXIhdlaa2lVgss/glp3UojTK44+
z9fO04LeP26aZmrf8kDimOucZqU/tlv6UHKsXarsuq5sajNy+hJmXPB6KfPG
xRDX3LupPHBgIlpxacoO2fJXnTIuXM+9yChRAUvGNCKu+Nr50RglBBnBMlqw
X11K/dFksFgmoVNW2viS6BkQC5176jUiEb2uCdwd5hTLeP3S400a0QtQlATg
GOOnH3Y6ov/pR1v5T0z2j1XJ0JbW38PQl0gZ0xrEeaxexnnS9OjEwjp1usOJ
Rjz9EUgMNJiggj1k4oNhysaz1HjjyVibeRvXuhpXWFMvQyYQSw6n4AzMZeaX
s20D1vm0g5/lWv/GK3FjUm274tVXlGZ4wgzp4MOXwmAI0+hFcyNnWbjd7r5p
1/HzGy/L7Aa2emz6obJIaA37pnVbmXXr0w+4yUawmNdU8Z0mvunGUzXIoDe1
szU2o+P57oZT22KGekH//X1ni+VJRa2MuIF16zGwt8XKsyxLeW0qAtVnVC0M
Ddiy5hS2V0m4SCPUYSaytdYga1s+NPp41H22T5rxXTSPcuNp2KiY0fwswCbk
oeu1nXslWLKVnXbKZbzaTBz3lTP/eECrdr5A5v8G+J/8siAvWO1RcLasUltE
ytSOeOqzA99zDJ3Z8bqhWuCBKUoECNEVFZ0VTbjqwzM0IR0S1LO0iEOUHi0j
Uxe6RM3smlMk1Q1ELxoz4jkl3UzF5OrTiyY13zVFH0YxjZU/usqDHiAOVT95
QwyF/RptsR1orYIjsXM6VWjOt5bqqvRhmKptl1CwOrtecGqOB9qKFo4M2ONO
rip1xUfr1IsAK7kLjqnn6VTRtLgTV4j6sIGRj5pZb/hrwnykbjHW1xHrT+RB
q2tUmkir9nFqBA/5b7BJguNoLES3W9ntLDxCWS/+dEurmlK7YXpV8ZPAnM84
IxIOZOPb8/MPdLiuDLfEaVk7mc+sgkG2QiOwdhhfonN/FDOIeXuPVb5UsAvK
Ydu8Rv/4J/rCFmKhmQ3ogD2ZzsbKJpm4c4jLFBGIrmZry7Vjdraneh0rEV50
K19cRO3VuLM7Wkr0N94OAScenZJWtY6ylY68Q6nN/XDOspw+5zlKuSqLmq9N
VNkcpfCLlFyNrLda2hJVEba7vkF8V2S2ypcZrDVmmISV8CZVTIjFkI+8ZyYA
RinJE+k4GaxQqV0r4oe9KkNKBJsKf00no2qHe31K2risz41MVQ6a8OHMUu85
0rhQCwLWTakYmCnQ4tOPfNahdqxqU7hzzZkqgFOvD30oQapwqwNb0O4x7P3H
7qitOf8v2mCmJQhAu2zLiyfASsxKUuNDGH1O6VVtg+BhFcVSyQ0WSqPAuIwq
yM5EcWknde9cnfLQDZmoeaFzM1M0UzAdEmGuBQwNki6SGPEBTQrLFHxD05Ba
w3K5lbovW3RIOiKzlY2UKKmcgXNQ9sjk4Lei9xKNYKZkbkNlK2Tm5ZIZw5UW
06liP2fJh3zFVCV48B5WPwfxRTG+rgB+L0NotoCIEeMwR2wvMsZzVC6qZ6SU
bnCI0AZbI1p6h86yPK/alYesADXO4LqiQFZCJY2xkUryAF9rjPg8Iq+BJt+5
B8EbBXyBt2wY/zJTi1gGauPqa2Wqz2tonOltcw0lheFJdwIDpSiZeCaECsmQ
2RtdoyNm2n0WaQAc7CWMrJQzwCXNU9g4eOWAqYYoVRngaqvObFiKNZK95YeD
iqAVDTi2Skib37tB5XerhR7wyfPqy/W6uJlcOY9jIB7yHzuA6TBGSZHSYgQg
Kc0G4kOsJNUWM9PQ0a/VVrdvbv6EF6zc3rZd0hS78E6AUYqIFbRXKBKCQ58b
mIDaGlzTxYwrat6rMJLiHKXY1J4Zotw8oCKdOf7eRSkHMtD6UQD0JYtbeUye
GEJd8ckxj5dPyjofq9b/lUrUtPqpbaoMMm9kQzmTk8RLD8IiK+9UKb06c/0P
pzTsib6BL0Ot1lkxzt1P66fRap3ynvDvORiI4yfDVutkUT9LZX8Z2dxJVVoG
4j1q9LFqSBxoPN+Ee5CDll/u97nSyUaS9Gp6i0BJJb+FUQmr2+Rvz3fVdv72
mS4geLmR6ks/Kw9Jr9tLtN5SkEkpAE1TgIByHMVNfRKxPxTjONIzhHG+dA9c
V62Why90iRwNyi5FcyBWmyVquwPnsiFNeue5ng1+Cyr+N7AbOb7osmGNFBg6
b6qSdWfygFjCAH/iq7TQ8+J4Al7AAZMN2GjZ2Erlfb7t7GuBL6I0A5lz8RDv
V/sLCgLeDvUIo5N4f1qVdnx/jIy751iLMQSrKx4C/HGvMXPdNSd4PdX79yfH
uN+QvkYxpon9+ThNFKyUysCeHPBlObiADFSCyuwdbh8Qhmkmha858H3SaQ0+
uldZaxRbYH5fp9qAhvVEGl5cZrFfu2kQL6folSK1D7yyvNPR2TleKDWqlOcd
pKejR17JudfRFC+g4xPVOBSp6oqe26Bf3VsH5rK6Lqz0cCDInp1agFrZRQ8e
bFWfTDcb3FXG6chqTnYyaQOCiXh0WS23TNH65Nz+hqY6Gav5cj/MMqwZoUUK
szElfWUf5IiaMHL7LEeMilX2Q97dHF35jM4skOkqUss2nX5tn1XssTU15PZ6
ymG/98xmKHf7z6jSwe+Li/xjLtbPlPNFvHpaat/NqD2vipBnebNbFflvtQIa
C+8Vwl0qV99pi7HUkV5Zy4vKWjoNXXvhofjagtJwpaOnNaKc+6iAL03B4kuG
ZhhCCUrV7OZ6Dqj4ku4lFCbqUxcEvD8QM8cU8jcVeoKPvrKD5MY0blRHZGYd
6GkvkB8gkcbZAEsCRCdfiLliyrp0Wq7US4/YIBNo4WAmI76qLlR8b4hy6dsA
K0kcmOSFe2smXoGHTmYHNtsCPIxaCNxmynm9j0y+gosmdIkgXVQx43C1q7Aw
pf+w7eKQjUuUMFbjvJC9vMWYM/94WZNTYIreTN25Pf7LwUdmNndrwh9411aC
pCXWuVJ3vCaMUmCupB91A6q3XGRoR2hxZhiEBaH7eWXfY7aOERoJHUcWH9MF
oF6RPAGobn8fV9vfI+J7bAdktrrBvlvdYL0NfT97+nTvGXbf7T8lMaPHPCL+
9rRx0GZt0zyOnku0rChiiR0PB5qShjbP3VBzmV2aYT5k0RUq8Y9atSk9cEwg
e51w0MUBd1X5UD/emZvm7iQ6hVnu155t17Nn75r7Jd1gwqqoZhBzBjV36s7c
qrkEiIsfh+6odIPl5ArJrjtPfaeLVQcj1iSuDPf7IZGOLdlkg7nf3zPFpeVg
hvXm1B7+9DqL1KTKyeE2B4LwXQP7DlZgX4WBTYDFd3LW4hT/9J4l0W8m++9c
mmc3UZlofeydYRuI3X37gB0Z/1QZUYdH3nSbctmovtHucdgMXj1b44N1fFTV
YtZUbD5GgLLC4H6PNRXkwjapessfYEdpPcCV26q8+9ca1W4TrtkAzMD9oyA/
8jtlTpMJ8SyIOxoiEw9hVZCuiW3Ygt0pFWhovEDTxDl9SMcdGjvP5NBe9jJO
U7ozCJp1xJhPrpN1hh/xedUG2Pfp2BDeKoW+oU75JdcpzgjxzRhTkxS5xLxT
XoSowwy5mCWYhTfvUb6JUk0VL7W2TRhlEXQ4iCWFCvi+qiwDciQUy55ULK+2
eFev5CWCmQL0RgDI9AXvLopskZrbJM2VVozVrZ+BO5VQnO3WevlzXAHd8UvA
ykt9+kVtZQ57o4NvrqeEiTEYqxQA1AuAK4akJ462vVGSRwlTSmXOlSLua1t0
gKAH488VMtNlxYroTPkFfHOsvLWStvlAqWj9UwEWiCZYigZds1Bg7TaI8Wkp
A8SZxP6CxESrowvwwoKolhMj6atgK8Mb7d2yXEJbvgbVpGunqXFRwoKpoahE
Kq8F+D3OcTrV9MUZdmgYR5d4E5eXAY+wcH4Rp9dk7Rhg/pxSHb2cThugjbnj
1ruaNzdJCyOA5iK2mI6l+mfusHTV+RuI9Tlhz2DUkNrwhTVIdQDiUEVDMf1L
T8kika1gptNgTB2ns3r1QczUqAqNcx3rHFheCysk44w4VWgu3ZU1/IT8u5JR
jEeV+Ugva5EyP7dArwe6GaN34F0+VCECFxyyB9yxHleJBkvfGLe85mzslVon
p76zslyRIdavtgyImDKqqmenEU3yvZp2Li/4JbipufKR/cVSU1bYgTKJyZVS
oNnnlIaFyJG6Z2stIdpEpY2ekCY5LNc2R68K2xJ1jKCWopgWOTKmPCFDo/Ps
TF2sUbk20syOmtMhdA82bqkpwms+jjnH/LLvh9veTZfI21hN8mqdaggyjFc9
5WDJ47jczPaUCfkXZQrE7x274v55kozs4Sv2bK4EHwNFMLczDDAXFatwypRE
cCKrz25bNwMeSIWv2nT3ftugFT6KqzF5H8DPqHUAx+INezcHswzrOYEdw7n+
9b+1vmWgdPP1r38HogL0iiWm6G9t4Rn8BAAaf4lAw8Bj78DNBCQaZ1zet02q
xubF8azwUjbc78L/s4Uv8PbvJL0yJcwAQ4Jr8e3R8fHJt0PfTRh9PB19MxQH
o3fnRwfd49Ffz3FLUdbg4PsP4Dec9Vr/C0zpQ78nZAAA

-->

</rfc>
