<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-reddy-emu-pqc-eap-tls-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="PQC Enhancements to TLS-Based EAP Methods">Post-Quantum Enhancements to TLS-Based EAP Methods</title>
    <seriesInfo name="Internet-Draft" value="draft-reddy-emu-pqc-eap-tls-03"/>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>k.tirumaleswar_reddy@nokia.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="07"/>
    <area>Security</area>
    <workgroup>EAP Method Update</workgroup>
    <keyword>PQC</keyword>
    <keyword>PQ/T Hybrid</keyword>
    <keyword>TLS</keyword>
    <keyword>EAP</keyword>
    <abstract>
      <?line 74?>

<t>This document proposes enhancements to TLS-based EAP methods, including the Extensible
Authentication Protocol with Transport Layer Security (EAP-TLS), EAP Tunneled TLS
(EAP-TTLS), Protected EAP (PEAP), and EAP Tunnel Method (TEAP), to incorporate
post-quantum cryptographic mechanisms. It also addresses challenges related to large
certificate sizes and long certificate chains, as identified in <xref target="RFC9191"/>, and
provides recommendations for integrating PQC algorithms into TLS-based EAP deployments.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-reddy-emu-pqc-eap-tls/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        EAP Method Update Working Group mailing list (<eref target="mailto:emu@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/emu"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/emu/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 83?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The emergence of a Cryptographically Relevant Quantum Computer (CRQC) would break the
mathematical assumptions that underpin widely deployed public-key algorithms, rendering
them insecure and obsolete. As a result, there is an urgent need to update protocols and
infrastructure with post-quantum cryptographic (PQC) algorithms designed to resist
attacks from both quantum and classical adversaries. The cryptographic primitives
requiring replacement are discussed in <xref target="I-D.ietf-pquip-pqc-engineers"/>, and the NIST
PQC Standardization process has initially selected algorithms such as ML-KEM
<xref target="FIPS203"/>, ML-DSA <xref target="FIPS204"/>, and SLH-DSA <xref target="FIPS205"/> for usage in security
protocols.</t>
      <t>To mitigate the risks posed by a CRQC, such as the potential compromise of encrypted
data and the forging of digital signatures, existing security protocols must be upgraded
to support PQC. These risks include "Harvest Now, Decrypt Later" (HNDL) attacks, where
adversaries capture encrypted traffic today with the intent to decrypt it once CRQCs
become available. TLS-based EAP methods are widely used for network access
authentication in enterprise and wireless environments. This document applies to all EAP
methods that use TLS as their underlying transport, including EAP-TLS <xref target="RFC9190"/>,
EAP-TTLS <xref target="RFC5281"/>, PEAP, and TEAP <xref target="RFC7170"/>. To continue providing long-term
confidentiality and authentication guarantees, these methods must evolve to incorporate
post-quantum algorithms.</t>
      <t>However, transitioning these protocols to support PQC introduces practical challenges.
<xref target="RFC9191"/> highlights issues related to large certificates and certificate chains in
EAP-TLS, which can lead to session failures due to round-trip limitations. PQC
certificates and certificate chains tend to be significantly larger than their
traditional counterparts, further exacerbating these issues by increasing TLS handshake
sizes and the likelihood of session failures. To address these challenges, this draft
proposes mitigation strategies that enable the use of PQC within TLS-based EAP methods,
ensuring secure and efficient authentication even in constrained network environments.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document adopts terminology defined in <xref target="I-D.ietf-pquip-pqt-hybrid-terminology"/>.
For the purposes of this document, it is useful to categorize cryptographic algorithms
into three distinct classes:</t>
      <ul spacing="normal">
        <li>
          <t>Traditional Algorithm: An asymmetric cryptographic algorithm based on integer
factorization, finite field discrete logarithms, or elliptic curve discrete
logarithms. In the context of TLS, an example of a traditional key exchange algorithm
is Elliptic Curve Diffie-Hellman (ECDH), which is almost exclusively used in its
ephemeral mode, referred to as Elliptic Curve Diffie-Hellman Ephemeral (ECDHE).</t>
        </li>
        <li>
          <t>Post-Quantum Algorithm: An asymmetric cryptographic algorithm designed to be secure
against attacks from both quantum and classical computers. An example of a
post-quantum key exchange algorithm is the Module-Lattice Key Encapsulation Mechanism
(ML-KEM).</t>
        </li>
        <li>
          <t>Hybrid Algorithm: We distinguish between key exchanges and signature algorithms:  </t>
          <ul spacing="normal">
            <li>
              <t>Hybrid Key Exchange: A key exchange mechanism that combines two component algorithms
              </t>
              <ul spacing="normal">
                <li>
                  <t>one traditional algorithm and one post-quantum algorithm. The resulting shared
secret remains secure as long as at least one of the component key exchange
algorithms remains unbroken.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>PQ/T Hybrid Digital Signature: A multi-algorithm digital signature scheme composed
of two or more component signature algorithms, where at least one is a post-quantum
algorithm and at least one is a traditional algorithm.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>Digital signature algorithms play a critical role in X.509 certificates, Certificate
Transparency Signed Certificate Timestamps, Online Certificate Status Protocol (OCSP)
statements, and any other mechanism that contributes signatures during a TLS handshake
or in the context of a secure communication establishment.</t>
    </section>
    <section anchor="confident">
      <name>Data Confidentiality in TLS-Based EAP Methods</name>
      <t>One of the primary threats to TLS-based EAP methods is the HNDL attack. In this
scenario, adversaries can passively capture EAP-TLS handshakes such as those transmitted
over the air in Wi-Fi networks and store them for future decryption once CRQCs become
available.</t>
      <t>While EAP-TLS 1.3 <xref target="RFC9190"/> provides forward secrecy through ephemeral key exchange
and improves privacy by encrypting client identity and reducing exposure of session
metadata, these protections rely on the security of the underlying key exchange
algorithm. In the presence of a CRQC, traditional key exchange mechanisms (e.g., ECDHE)
would no longer provide long-term confidentiality. In such cases, an adversary could
mount an HNDL attack by passively recording EAP-TLS handshakes and decrypting the
captured traffic once quantum-capable cryptanalysis becomes feasible. This could
retroactively expose information that TLS 1.3 is otherwise designed to protect,
including:</t>
      <ul spacing="normal">
        <li>
          <t>The identity of the authenticated client.</t>
        </li>
        <li>
          <t>Client credentials used in certificate-based authentication (e.g., usernames,
device or organization identifiers).</t>
        </li>
        <li>
          <t>In the case of EAP-TTLS and TEAP, HNDL attacks present an additional threat. These 
methods typically carry legacy inner authentication protocols within the outer TLS tunnel, such as MS-CHAPv2. If a CRQC is used to break the outer TLS tunnel, the exposed inner authentication exchange could enable offline password attacks, potentially allowing an adversary to recover user credentials.</t>
        </li>
      </ul>
      <t>To preserve the intended privacy guarantees of TLS 1.3 and to protect against HNDL
attacks, TLS-based EAP deployments that require long-term confidentiality will need to
adopt post-quantum key exchange mechanisms, as outlined in Section 4 of
<xref target="I-D.ietf-uta-pqc-app"/>.</t>
      <t>These mechanisms ensure that even if handshake data is recorded today, it cannot be
decrypted in the future, maintaining the confidentiality and privacy of the TLS session.</t>
      <t>Furthermore, to support hybrid or PQC-only key exchange in bandwidth or
latency-constrained EAP deployments, EAP clients and servers should apply the
optimizations described in Section 4.1 of <xref target="I-D.ietf-uta-pqc-app"/> to minimize
performance overhead.</t>
    </section>
    <section anchor="eaptls-authentication">
      <name>Post-Quantum Authentication in TLS-Based EAP Methods</name>
      <t>Although a CRQC would primarily impact the confidentiality of recorded TLS sessions, it
could also pose risks to authentication mechanisms that rely on traditional public-key
algorithms with long-lived credentials. In particular, if quantum-capable cryptanalysis
were to become practical within the validity period of a certificate, an adversary could
recover the private key corresponding to a traditionally signed certificate and
subsequently impersonate the certificate holder in real time. The feasibility and impact
of such attacks depend on several factors, including certificate lifetimes and key
management practices.</t>
      <t>TLS-based EAP deployments rely on X.509 certificates issued by CAs, and the transition
to PQ certificate authentication is constrained by the long lifecycle associated with
distributing, deploying, and validating new trust anchors. If CRQCs arrive sooner than
anticipated, deployed authentication systems may lack the agility to transition
credentials and trust anchors in a timely manner.</t>
      <t>As a result, deployments that rely on long-lived certificates or that require resistance
to future quantum-capable adversaries face an increased risk of authentication
compromise. In such scenarios, an on-path attacker that is able to recover a server's
private key within the certificate validity period could impersonate access points (APs)
in real time, potentially deceiving users into revealing credentials or connecting to
rogue networks.</t>
      <t>To mitigate these risks, TLS-based EAP deployments will need to adopt, over time, either
PQ or PQ/T hybrid certificate-based authentication, as described in <xref section="5" sectionFormat="of" target="I-D.ietf-uta-pqc-app"/>.</t>
      <t>The use of PQ or PQ/T hybrid certificates increases the size of individual certificates,
certificate chains, and signatures, resulting in significantly larger handshake messages.
These larger payloads can lead to packet fragmentation, retransmissions, and handshake
delays, issues that are particularly disruptive in constrained or lossy network
environments.</t>
      <t>To address these impacts, TLS-based EAP deployments can apply certificate chain
optimization techniques outlined in Section 6.1 of <xref target="I-D.ietf-uta-pqc-app"/> to reduce
transmission overhead and improve handshake reliability.</t>
    </section>
    <section anchor="ext-extn">
      <name>EST Integration</name>
      <t>The EAP client is expected to validate the certificate presented by the EAP server using
a trust anchor that is provisioned out-of-band prior to authentication (e.g., using
EST). The intermediate certificates are provided by the EAP server during the TLS
handshake. The EAP client relies solely on the pre-provisioned trust anchor to build and
validate the certificate chain. This model assumes a managed deployment environment with
explicitly configured trust relationships between the EAP client and EAP server.</t>
      <t>To further reduce handshake overhead, particularly in deployments using large certificate
chains due to post-quantum (PQ) or composite certificates, this draft proposes an
optimization that leverages the Enrollment over Secure Transport (EST) protocol
<xref target="RFC7030"/>, extended by <xref target="RFC8295"/>. Specifically, it allows intermediate certificates
to be retrieved in advance by using EST, thereby avoiding the need to transmit them
during each TLS handshake.</t>
      <t>For EAP methods that use TLS as an outer tunnel (e.g., PEAP and TEAP), the EST
optimization described in this section applies to the certificates used in the outer TLS
tunnel. The EST pre-fetching of client intermediate certificates is relevant only when mutual TLS authentication is used. This is always the case for EAP-TLS, and optionally the case for EAP-TTLS and TEAP when client certificate authentication is used in the outer tunnel.</t>
      <t>This section defines extensions to EST to support retrieval of the certificate chain used
by an EAP server and EAP clients. The first extension enables clients to obtain access to
the complete set of published intermediate certificates of the EAP server.</t>
      <t>A new path component is defined under the EST well-known URI:</t>
      <artwork><![CDATA[
GET /.well-known/est/eapservercertchain
]]></artwork>
      <t>The '/eapservercertchain' is intended for informational retrieval only and does not
require client authentication. It allows clients to retrieve the intermediate certificate
chain that the EAP server presents during TLS handshakes. This request is performed
using the HTTPS protocol. The EST server <bcp14>MUST</bcp14> support requests without requiring client
authentication. The certificate chain provided by the EST server <bcp14>MUST</bcp14> be the same
certificate chain the EAP server uses in a TLS-based EAP session.</t>
      <t>The second extension enables EAP servers to obtain access to the complete set of
published intermediate certificates of the EAP clients. Rather than relying on static
configuration, the EAP server can dynamically fetch the client's intermediate certificate
chain from a trusted EST server within the same administrative domain.</t>
      <t>A new path component is defined under the EST well-known URI:</t>
      <artwork><![CDATA[
GET /.well-known/est/eapclientcertchain
]]></artwork>
      <t>The '/eapclientcertchain' is intended for informational retrieval only and does not
require client authentication. It allows the EAP server to retrieve the intermediate
certificate chain that the EAP clients present during TLS handshakes. This request is
performed using the HTTPS protocol. The EST server <bcp14>MUST</bcp14> support requests without
requiring client authentication. The certificate chain provided by the EST server <bcp14>MUST</bcp14>
be the same certificate chain EAP clients use in the TLS-based EAP session.</t>
      <t>EAP clients and servers <bcp14>MUST</bcp14> authenticate the EST server using a trust anchor obtained
via a suitable bootstrapping mechanism before retrieving intermediate certificate chains
via HTTPS. Various bootstrapping mechanisms exist for establishing this trust, such as
BRSKI <xref target="RFC8995"/>, EST <xref target="RFC7030"/>, or out-of-band provisioning. The choice of
bootstrapping mechanism is a deployment decision and is out of scope for this document.
Certificate chains retrieved from an unauthenticated or untrusted EST server <bcp14>MUST NOT</bcp14> be
used for TLS chain validation.</t>
      <t>EAP servers and clients are <bcp14>RECOMMENDED</bcp14> to cache retrieved certificate chains to reduce
latency and network overhead. However, they <bcp14>SHOULD</bcp14> implement mechanisms to detect changes
or expiration. These include periodic re-fetching, honoring HTTP cache control headers
(e.g., Cache-Control, ETag), and verifying the validity period of intermediate
certificates.</t>
      <t>EAP clients <bcp14>MAY</bcp14> omit intermediate certificates from the TLS handshake only if they have
been explicitly configured by the administrator to do so. Such configuration is recommended only in deployments where both the EAP client and EAP server support this specification and have completed EST pre-fetching as part of provisioning. If no such
configuration is present, the EAP client <bcp14>MUST</bcp14> include the full certificate chain in the
TLS handshake. Similarly, an EAP server <bcp14>MAY</bcp14> omit intermediate certificates from the TLS
handshake only if it has been explicitly configured by the administrator to do so.
Administrators are advised to ensure that clients in the deployment have retrieved the
server's intermediate certificates via EST as part of their provisioning process before
enabling this configuration.</t>
      <t>Note: A TLS extension could be used to explicitly signal support for intermediate
certificate omission between peers, avoiding the need for administrator configuration.
Such a mechanism is considered a possible future solution but is out of scope for this
document.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations outlined in <xref target="I-D.ietf-uta-pqc-app"/> and
<xref target="I-D.ietf-pquip-pqc-engineers"/> must be carefully evaluated and taken into account for
all TLS-based EAP deployments.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document defines two new path components under the EST well-known URI
'/.well-known/est/', following the extension mechanism established by <xref target="RFC8295"/>:
'/eapservercertchain' and '/eapclientcertchain'. As these are sub-paths under the
already-registered '/.well-known/est/' prefix defined in <xref target="RFC7030"/>, no new IANA
registry entries are required.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to John Mattsson, Hannes Tschofenig, Alan Dekok and Michael Richardson for the discussion and comments.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC8295">
          <front>
            <title>EST (Enrollment over Secure Transport) Extensions</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The EST (Enrollment over Secure Transport) protocol defines the Well-Known URI (Uniform Resource Identifier) -- /.well-known/est -- along with a number of other path components that clients use for PKI (Public Key Infrastructure) services, namely certificate enrollment (e.g., /simpleenroll). This document defines a number of other PKI services as additional path components -- specifically, firmware and trust anchors as well as symmetric, asymmetric, and encrypted keys. This document also specifies the PAL (Package Availability List), which is an XML (Extensible Markup Language) file or JSON (JavaScript Object Notation) object that clients use to retrieve packages available and authorized for them. This document extends the EST server path components to provide these additional services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8295"/>
          <seriesInfo name="DOI" value="10.17487/RFC8295"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-uta-pqc-app">
          <front>
            <title>Post-Quantum Cryptography Recommendations for TLS-based Applications</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <date day="24" month="February" year="2026"/>
            <abstract>
              <t>   Post-quantum cryptography presents new challenges for device
   manufacturers, application developers, and service providers.  This
   document highlights the unique characteristics of applications and
   offers best practices for implementing quantum ready usage profiles
   in applications that use TLS and key supporting protocols such as
   DNS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-pqc-app-01"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5281">
          <front>
            <title>Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol Version 0 (EAP-TTLSv0)</title>
            <author fullname="P. Funk" initials="P." surname="Funk"/>
            <author fullname="S. Blake-Wilson" initials="S." surname="Blake-Wilson"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>EAP-TTLS is an EAP (Extensible Authentication Protocol) method that encapsulates a TLS (Transport Layer Security) session, consisting of a handshake phase and a data phase. During the handshake phase, the server is authenticated to the client (or client and server are mutually authenticated) using standard TLS procedures, and keying material is generated in order to create a cryptographically secure tunnel for information exchange in the subsequent data phase. During the data phase, the client is authenticated to the server (or client and server are mutually authenticated) using an arbitrary authentication mechanism encapsulated within the secure tunnel. The encapsulated authentication mechanism may itself be EAP, or it may be another authentication protocol such as PAP, CHAP, MS-CHAP, or MS-CHAP-V2. Thus, EAP-TTLS allows legacy password-based authentication protocols to be used against existing authentication databases, while protecting the security of these legacy protocols against eavesdropping, man-in-the-middle, and other attacks. The data phase may also be used for additional, arbitrary data exchange. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5281"/>
          <seriesInfo name="DOI" value="10.17487/RFC5281"/>
        </reference>
        <reference anchor="RFC7170">
          <front>
            <title>Tunnel Extensible Authentication Protocol (TEAP) Version 1</title>
            <author fullname="H. Zhou" initials="H." surname="Zhou"/>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Hanna" initials="S." surname="Hanna"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>This document defines the Tunnel Extensible Authentication Protocol (TEAP) version 1. TEAP is a tunnel-based EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) protocol to establish a mutually authenticated tunnel. Within the tunnel, TLV objects are used to convey authentication-related data between the EAP peer and the EAP server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7170"/>
          <seriesInfo name="DOI" value="10.17487/RFC7170"/>
        </reference>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="FIPS203">
          <front>
            <title>Module-Lattice-Based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2024"/>
          </front>
          <seriesInfo name="FIPS" value="203"/>
        </reference>
        <reference anchor="FIPS204">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2024"/>
          </front>
          <seriesInfo name="FIPS" value="204"/>
        </reference>
        <reference anchor="FIPS205">
          <front>
            <title>Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2024"/>
          </front>
          <seriesInfo name="FIPS" value="205"/>
        </reference>
        <reference anchor="RFC9191">
          <front>
            <title>Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods</title>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication. Large certificates and long certificate chains combined with authenticators that drop an EAP session after only 40 - 50 round trips is a major deployment problem. This document looks at this problem in detail and describes the potential solutions available.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9191"/>
          <seriesInfo name="DOI" value="10.17487/RFC9191"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqc-engineers">
          <front>
            <title>Post-Quantum Cryptography for Engineers</title>
            <author fullname="Aritra Banerjee" initials="A." surname="Banerjee">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dimitrios Schoinianakis" initials="D." surname="Schoinianakis">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <date day="25" month="August" year="2025"/>
            <abstract>
              <t>   The advent of a cryptographically relevant quantum computer (CRQC)
   would render state-of-the-art, traditional public key algorithms
   deployed today obsolete, as the mathematical assumptions underpinning
   their security would no longer hold.  To address this, protocols and
   infrastructure must transition to post-quantum algorithms, which are
   designed to resist both traditional and quantum attacks.  This
   document explains why engineers need to be aware of and understand
   post-quantum cryptography (PQC), detailing the impact of CRQCs on
   existing systems and the challenges involved in transitioning to
   post-quantum algorithms.  Unlike previous cryptographic updates, this
   shift may require significant protocol redesign due to the unique
   properties of post-quantum algorithms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqc-engineers-14"/>
        </reference>
        <reference anchor="I-D.ietf-pquip-pqt-hybrid-terminology">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="Flo D" initials="F." surname="D">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Michael P" initials="M." surname="P">
              <organization>UK National Cyber Security Centre</organization>
            </author>
            <author fullname="Britta Hale" initials="B." surname="Hale">
              <organization>Naval Postgraduate School</organization>
            </author>
            <date day="10" month="January" year="2025"/>
            <abstract>
              <t>   One aspect of the transition to post-quantum algorithms in
   cryptographic protocols is the development of hybrid schemes that
   incorporate both post-quantum and traditional asymmetric algorithms.
   This document defines terminology for such schemes.  It is intended
   to be used as a reference and, hopefully, to ensure consistency and
   clarity across different protocols, standards, and organisations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pquip-pqt-hybrid-terminology-06"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA81c63Ibx5X+30/RS/8wlQIoS5Y2FiubhCbpSGtdKJFebyqV
SjVmGkAXB9Pw9AwoRKU8yz7LPtl+55zumR4ApJ3U7lZ+yATm0n0u37k3PJ1O
Vevayp7qoysf2un7ztRtt9KX9dLUhV3Zug269frm9fX0WxNsqS/PrvQb2y59
GY6Umc0au6GX35//0ncK09qFb7anOrSlUqUvarMCAWVj5u20sWW5ndpVN13/
VEytWU/bKkwrvBNaFbrZyoXgfN1u13jl1eXNd6ruVjPbnKoSz5yqwtfB1qEL
p7ptOqtA3NfKNNaAyGtbdI1rt0fqzje3i8Z3a1wdiNM/rGmRI3Vrt3iiPFV6
qsGZ/Hl8o19uZ40r6St4oz94V6mNrTvsrPUDK2otFB/9iJ1dvdB/oGfp+sq4
CtfB8e+dbecnvlnQZdMUS1xetu06nD5+TE/RJbexJ+mxx3Th8azxd8E+xvtH
SqnQmrr8i6l8jc22Nqi1O9V/an0x0cE3bWPnAZ+2q/ihbVzRTnThV6y1iYY2
Vma9BoV/Vsp04KEhKYAgreddVYmqblzTrUxlw51p9AfSGD8Amkzt/mpaKOhU
v/W3zvD1AjI/1d+aegHCGsvXGrvgp743TW1acxuf9F3dEjRe1WV82UYB3Z60
2a5/YZz8vqY9TkA+8a5q36yw+YaV8eG78xdPXnwVP/76q6/Tx2+evnh+qpSr
5zuPP3/6zZP0+JNf94+/oMe1/u7V1fXTr74+ZaKSzbzxZVfZ6WvTtq6wEe3f
2+30si7MOnQVywJgKGAaLqz0NenHNOURL9MLWEfxYcm3/IqpIIKAbbrWaj/v
3wsaf/UN1qt95Rdbffz21fXNI1mOLUA//erpM/4abONsID7TDkfExBE2ASNH
PU/PfgFPF27hWhB17RZQV9fYfx5Ong2cPB9zgq1aC7wE/dKE5T8/J8+B4ik8
Mv1Hmxms0xStUjdLF8gwO7JRvW782gcbtD3gbme9u12Ju51oVxdVV5LLaZdW
X35s4R3drLLqDIziXVcIRq8aDzfhK33n2qW+aUwd1vAY+rXZ2kYn16mPsfgU
Wz2a8DY3XV1DxCU7RLknN2k5W7SRmuMr/BdXSVDDa8lJHt/IXTABan2DfSE1
taaA9FMMSEWzXbd+0Zj10hXgLhpUONGvWm2q4LUpywa6hmRwr6psvcDHxlLo
KGlp+M+FVYVtWjcnpq0O7q9WlAd/udD5LSzhakjPBO1KktLcYRVX60+ffiee
5cnnz8yPgkI2eIb2Ej9askCDhn/BGwh24IbkTzHSVAh9EPAq0K1dpZV2Xfkt
a/REULByZQldqS8AvbaBZRa0NmHCwjNacAQIEBiNPs8lBAFs4Zkru4H4dIrq
5361BngbfXz+4f35I33nu6rUCOHmltCh4A6Xlnwi3gfroVuthZV2aVrd1aVt
EBqAkNJieaEWpK+7WeWKKaJmxt8E8qAXwLmiVcFvIBBZFrifBV/Z1p7oM2gA
j8JXIhDhQTzgSCm6I+ZaXVtRX8eRlODPMGW9kRNvDOwEYqGVGboPwOb4irjO
dAC1wQ3IBqDBIceA2zPFLbTX+JWeeSyY1iK6iwpiEfGUG9sEQ+Z8okkd463W
jVs5Ci5BNfanzpEcsMW6MmKyCPBWly4UXQg9sl5NLzi6I/fp3FoyoHrhIIIm
RLixFZN/UQSn5IJi0CXpFOTvloTbGvszDgJwwKaYcR66YknofvN6+v3lG/Xp
U4xvtA2uXVyf6XTtWdr6+vXL0Y3nnz8zyLtgFpZYCNFLqF5LgPGN1ySJBWmP
iG9cgHjJhwF6WwIusDjpCaJH1vAdNRFPmQnWQtLHIAfYSci2pGTP9OIADQsS
L54oo3cPybsDh/Yj9Er3E3kZiFZdaPXMAl1QXImFAYTQrdnzQcCs2ZBoFldq
9dFL00CxLVKcu4m+sEwUHCUs60gfv3x78RogExhN9B1BWmVo0cgMGK09N8hU
zRyOBygszVZQTHyR8wBSQFIZ93Ct9mTwJLKgZuRwYE8bSg7h0k8OxwCGWrTZ
ju6RzmrbUhKsTUGA4VQvCwbQJb7B2huSPMn5zjUSSm29cY2vxUnpcWxC5lgR
h6AYwOPsONEgHgSLgcSoZteIS6m2HJ1SxMlDVgw2QFxM5wBFlaKMXKWsjQBK
EUZgStFE7lEa9/kzqPQAErhDnq7FXdPi5PSnYHJFRcNc3LypCB+0yo5EFp0B
ga0lQLWMicQZQ8hufLWxD0awwfhgFC/9nQUiJsK2oy1iiA65jxujkQDBMQAi
XlNuwI5oiHYnKo9OeukWywr/kB6gaOoORMM85Ekg3I+B2FRFNRCYHay0gHeu
rOF1EG+pHtNzYJDMTZcdiwHlTV1OUV+sdUWeUGLiCZdTv2RXIJ/Xn1m2Zb5b
t0AwE94QnmoBkYIISxcTNC4ggFvTUDUz7xqKKPAA8LrNTMKwyDhKBA4ICkMA
DHSLQIV1y7A0t1YN6QEZY+VubeWWHvkK/Mwu24yxmIHEHQa9EGLITKjAVX3+
Fp0irUKZHvIENh2yE1uTOfO2nXg+0j75BRjm4TxPUdHb9F5OjNaSV3FsmWM0
A3ts5FQtY29HITB5hJGBU+Zx7usNvUuJAK16YeccW/BdEhEK/FQvBxQPP1zf
HE3kr377jj9/uHz/w6sPlxf0+frl2evX/QcVn7h++e6H1xfDp+HN83dv3ly+
vZCXcVWPLqmjN2d/PBKrP3p3dfPq3duz10fEWDv2S42NWHLi1SxHw6AQ/4vG
zSQAf3t+9d//9eQZXMe/wIiePnnyAkYkX7558mtEQfLltezma0BRvkKwWwXP
Zw2le+z44OEpCkn+GJb+rtYUBSDNX/2JJPPnU/2bWbF+8uy38QIxPLqYZDa6
yDLbv7L3sgjxwKUD2/TSHF3fkfSY3rM/jr4nuWcXf/O7CpDS0yff/O63areA
MaVfU8UCx+tiwVQSou7Pgtrpkhsv0+wduHX1nW8kXegaMSkYykjxEwqY+A4j
mncVQSA2n2DZO/na4J0VJ+btsrGcoMFnFK3kfTacQoNUG/X+5iy9dqrPoPuw
RQFATZX7VtdiuRxiQYltUAXO4cmJJDZNOC0yLiQ1ziI3pwyR0IpgtTApsQbb
tqoccnPs0yEV6R/DasODKI3YRXLssx9bEg97cXhOeMTVuoqVQ+5AyZbtR6qu
EB56srEuxHiZNj3nTS8c3IudvgQtKyx5fHl+8fJRihGUw1crT6HxI6J5QCac
0g9o2bUBS9r1kmoY7LrypaWCYW6bRuKT+bntLvuXeePLR2RdetTE/LuVk5cD
FHjYk1IzbkExqdW/tDYoYp0FFZyNZY3FRknBYXGT9Ehx41YMNZb0PY0lrHss
qbzIQTqVuQR+TGhedC4swV57ZxEEcgLEvfepc2YTwL3W07Qq0xHfgWjHTPSl
uYQyiGIG2wY/d57l4mt2AoO5URNkCouwIxwOshB3a/XhZEpqL6kfOfot4ezL
2Gshm8C9FWcUKS4GqfbxF+QhjQktL8++w2Yk5lxJZ2iontKaXT1r/K2tT0Q+
WZN4v89EkloRldMMcLvlig4FwVrICJERIg3Sg9mvfJOTeEhVseIYM0fWOBLg
mCFJePdeOKgPsHqxR3UmGlS4VNQhrEp62qDOJ5P/z5PnX70YJZwTfT58U9Jx
gvLqYstCgxlm9/WNW6HkgiXhvXc1x5f8NvX6ujB0sY7fnV9fPaJ+eGtjb5uZ
rLfac064h1Pk1m7WUUo6FI/IZjmnMjupIXd2dn2rSRCjNlBX97kWaJhVsDki
gxOqCypez3dqjpjZ7Q1M9Kcv+vLks1LvBqhSi8E0Ww5V5oEeYPImVJhGFxZD
gwsqFEg2G+cnelyi1npN3oy9dipYUzXWyyFkVTvQKsUM8lqq0P3GSnQ2joX1
o5t+51KSGT1NS3Dm5hCVpPOOd4m1LoluqHW11LpqqHWV+nHpqoGoJydf52Wi
7ttyWPrONKW4g4LF5bvFMos+I0snwhw1HTZcZbmNwTsoE2K1TmgoKs6pRXux
XITT6Qq6aT/CzoiPoUqgIthQx2KSFXi2kIy6IQl7AVPfoIgazsrjMY2D94sh
HiltyFqB3FG5N6wP3VN9bE8WJxMtEVRJP7D27CGhvijDoVLWO5Uy788YKIA6
trEeR1sqxqpSragkoxsZ/kigA76ocdqM6v0MYSTcBAmp3lTE49A3YZxEzzbF
Xa6e+BUD5rfBJfwADVTqSa+EMkUhEWGi8VRPMzmsQfJZcUDEyoGLSCjDa+xC
7qg3kqcMUa0T1TcwOG7qX3GM6uESlZuVZLaMmDqJz58LwgDYKOvQp06ZB42m
vlPbRZXi+YamdSgNec5Q2g3lELCzfEw3dLeb8CjtntJGI7Vn329JzZVJrsoQ
sdeK7nvEiVdKDTShoW8GbdexRV2YBkCp7IKszNU1QLfDztAMifUvkea5i000
tTxJGNqHb66n5y/PrjZPAc1kCrEEkLQuNbsPrEFXRfnlYVp6C2LYpDLdz+cc
jgjQVAYPvb++j1lRZ7zydxxLchPhvnPBvpIUlmtcWqcsXEp/+4ZgSR336JeG
rlRM7hmgps7h2GevpDTV03bv5EHALk3rB0wf6kClG7vziou6B1LbweVwTQzZ
V6niuxZPqJ+BBYVyuy//utZwCxy1NVV76ia23XrnxS0PG1sm3NGYD55Dc4vY
hehdmMzSbLkkRHirPfV9VfQsQgn3kjkITWgsX7f4lwZnh1qESQvRoEn80eOD
2u+k90QZ2yTv40kpS3Z49f58yn2EkaRAxwyL37kS5YVvFHXskBJN81bNjsZk
FCceJEZWgkzDvQcCKvVlt+w6oSW3irbP44+h/dHr4eQJcfTp02FFEC8owmkV
q9a2YSfJkQc7Lq0pOcUZ12F7zeX7Mh0Lz16F6djskPWcVXiCgnY0aAlUkgA5
sIaADfd9UFFgpUdApiGajLZK7JjHh+zzpc9P5eeY5Ax00Tpi0M5C7DAFU1k6
zM18NqIK0aUcGTg5WupUugL1XDMh+D4YxNSdTY0sbvwPPeDMNW7AdslDDou0
rpSEIAsaB2N08kExrdxQRk2ohNzgf1BtyADZj4sCGi1J8MsbuDSXC90swIFY
7thCOdgML8QBUP7w0ldIcQgS8MsIGkjypaKTOO16WxMNK0qq2NPH2AMrsFwf
Qq8bTuakmzIafOcbVm5uaRexE1IW0GsWNs7WWaCWfe+9/jEpf7+ika4yj7XO
z8Iwrxua/DRfuno/lteOdYRRV3a2le4zlaxEe7EtKipigy8cJw6kekWVPVcv
YHcSieWPRAEjQnrftb2jY1HUyqiLpacGBaKkZNiIxECoDt7Xsb+OXBhkuTXt
MxnGvTsEh21AiRXgMak5X0hwNQtRHXXSBubzfIZlk5PCzVNGAMQLpYAKqGE0
Hj4QpUQVuYHl+uAGYRbNZMZL7ooUEQuOXZvLCyGgiRCdhgRYn1wEG9VICmoY
VA45caqtJC/29RSSTNC1kTIqtLnXPyQCJrrvL4PKbTGz8Rw+u/YuLi23ORnx
wcE5ktvx2VV4pHKDG+cpiIjWbQgslJDEYwoNjAv7kC1lKoR0AdWa4gZ7B9X4
RWf7Gm9/9ps87EPZR55WSK94osU3ManWUVRVsCGOoI9vUkD9ubyY845RwPv0
KYW855R6PJR3DGOYB7YNPUqk3qb5Eb3k4D1RRnXUGMzbH+rggZO8A8eHKFJn
i+brhyZhQ8YDr0aTeAheUqX4wNpsK2/KMJrbrQmDrZ43ZkFyjyKiQohL+BQj
iZyh7VHaymzJtcrwjAFMs5UhiBGAXGi6NdVSuxMmiK7yIWwTQtTOqGlvhCZO
/0G4EE+S3uxJc5Ts6JbOZ7mfiO5D2ee//nzWwyW+VbmE+qRHZ22DTCPwT85I
FOO06PL6hg7yyJEgvI6M52M7xT9KcghnQyJHngHFiBzcwO7Ri++H0Fh+DbGC
1hAPAtjS8RszcrS93+Hqnrgg1XTt1M+ns5jW0lN7SVBfWNKa4OSRRGoeqa1s
6Vjwo9Fuk8btB4mLvbWYOqtearJsJgmSIvWafJX1SsD2NOdgzCJypM5VrBZ1
r+QYJbERQBOIeOaJKNeSFZQZ1vLBqERdqAcZnyNb5KxzEZsSRAiP2smGlm4d
+m57O2YsHYcTgYgFpJm1oC3DUoLaZGxuwHBuD6yd/em+imP1OJ0fFWrHV+8f
iS+nnrPb0WI+vB4OH5pd61py+5hSsEV0f5d146uKpcX++1qao8PJwmPCUF/f
Kzmx8dXXdMYDyI+VLmDDN+jULh3luIZFMGmIVVzLcV0d7kehklkOeTZnN2L0
iPBcssy2UV6gJB4+oxNJG+/6A5MpEqXWJrcrVYSuNYjyo34VFX4QZd593T35
QqkAtx6k7ZDMis6v9B2WR9KMAFljMY/iF+slRP+VHb3ZgfnQOhp1PZRsH40N
fokMCrlxsYxHqZIbute8ubaOJwz7ebheIalCpGNm9zJboiQaHA8I7xBOhl7T
XCQ3jUNKeKV1X2jsP5R3pGTrSPHDyfW+MKIg4pw6CVRm0kGQGOQUpGdBZcV8
RBX4TeOjXffC+ylCVZ37vmT5sWiPNY9reF4aN4z9pdBX9tjYz6gpkVI6pFxp
ZkWHKbE4DyK4Eg1L5vM+5UV6R97njOsDTlKHGRPZfhzPczs6AVPf2aqa3tZ0
uOGHD69Olfrb3/6m/nB5ox+fDLce29A+RlUvexAFEprpWQ54Xx64+yVt2ve6
5Bht34ulkdIgdYIdd4g9eKp9q1KmnzzsSP/xsDA7jEyoyTf0PbZDIhMPKta8
E8hiBO6nReMOdsQ7EUZnBinwStcEuBDvw8OZm5ur694ZDlYZt+BDIgPqeClp
LgDDejhhKlypXbZvDkJzLzbv7DcTiQSzsvu56n6qYWMJN07Who7YjUw4PB1M
2sP4sNJBnOsDOFd/J857W/tgOMLyETKqINnh0SksOvmsUiiPKfEOm5Rvltva
rGIDmz2mUMfLf3l/KIoI4sMDMSUjGQ1Czyo8kjnCFDXa+HAYZdOlp6bk/62d
ChP32enO3f8XO92R/0PmehCkmbkmk08Di19mrqo3V/2/Y65q11z3uP+HzFVl
5nrg7VwAHY+3UuZ90Fjv6ygzZ/noapcUkdFOySHmDIe3cYb6G51ruesx874l
fPMvzrKR/MzOfdMnbVL9HjaqWDjzwqyUE/0f1HPpwn2LBzkQznjtZ/OiVxqU
E9n9OEl9++H6+1cxA31BGeiEeR3lqsTfqHyKRQnWjKpceh69zdV9/PJxi6zU
KJHksnvkspIrVp4nF34tGdDomNuJOt8TSJbwisNBJlKPR450cr8+4IbSgUSa
j/TnxclIBEipndjDJEFDzkBFyEB72QFCOXpXLPM8/NCh377IjlMPXjMdTO0H
DHo4Pb20Wx3PNjoKDiy9vFtPZ+d5ChaPONHRDdRtrhlMjY1BTvZLD80VOsuF
J3rpa8/mSgCLfPB5EV9pIgjMq5jFn9PN6bncBFZuzCL+7An0uvk2+Y8DXfr7
PFnYscY3Z3/UniqR+4MeazyNpLIKkrywm4vUlmZj4TIsTTUPlbHRyWQxSOrq
EtmvRx3GQ/88VKZZG/8EysYjsjvVqRxN4pNzD5bCve+UGifVfG0yCSK+TwfK
/fIFZRYVyZwMj8zx1ZyON5B1qz3iY1iY7JLG9pAQIjPCqjrgYcWjqnE9qK9R
vXGlPtkpAf5OPap9PeJd+qHPP6xEdZZfF6NFaeziqDwfrybwxaiRuSpWxWDV
JIHUvn6AM3LXpLVMUS3/IiRXV/9zJgkHinPF3lOP9AcbeetbPmNH8h/yS2mH
z2x/ACATFPdZqx5r6fd6B9MJnzp+qZWzph9lTQ40C2iZscB3KGXTMWPvT21S
xHbSGR/U4zMqaUARfNUxSGdde280UEM0UF8Mv9c8jwub7Lx+f8yoGN0c9UXv
bYRSR+1nf6rW/66qAKbIXLaa8sCO4w5PfoDjWmYLyPH5hBAYUXR4/qGfRH6h
X529PTvAVH7APFXudGZyP1EOD6bH6su9rPjLCUhLhzfkiEgC16DCPpHYa1md
qsMlLknhYFLNP4mU/jcZZOhmPDfK6IaYGoSd7ZR+RI/oTag5QDc5tLn7OD5d
n+UttYiHJKpkpYaOubU8+DKcfnGOLhP9s4KWrmwps9KgPp3K/3nBlv92NDdV
sEfcwza1TND/3S9r/ca0bQhURr2kgV7QNwHJ0NzWDmH1rIJDvLC3/paF8caB
f1vpD/S3KQP9uiYe8I+/k0zeP/3vCk7U/wBy5eeFwEIAAA==

-->

</rfc>
