<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rosomakho-tls-wimse-cert-hint-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Workload Identifier Origin Hint for TLS ClientHello">Workload Identifier Origin Hint for TLS ClientHello</title>
    <seriesInfo name="Internet-Draft" value="draft-rosomakho-tls-wimse-cert-hint-02"/>
    <author initials="Y." surname="Rosomakho" fullname="Yaroslav Rosomakho">
      <organization>Zscaler</organization>
      <address>
        <email>yrosomakho@zscaler.com</email>
      </address>
    </author>
    <author initials="J." surname="Hoyland" fullname="Jonathan Hoyland">
      <organization>Cloudflare</organization>
      <address>
        <email>jonathan.hoyland@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <area/>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>tls</keyword>
    <keyword>wimse</keyword>
    <keyword>identifier</keyword>
    <keyword>workload</keyword>
    <keyword>hint</keyword>
    <abstract>
      <?line 45?>

<t>This document defines a TLS extension that allows clients to indicate one or more workload identifier origins in the ClientHello message. Each origin consists of a URI scheme and trust domain component, representing the administrative domain and identifier namespace in which the client operates. These identifier origins serve as hints to enable the server to determine whether client authentication is required and which policies or trust anchors should apply. This mechanism improves efficiency in mutual TLS deployments while minimising the exposure of sensitive identifier information. To protect confidentiality, this extension can be used in conjunction with Encrypted Client Hello (ECH).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://yaroslavros.github.io/tls-wimse-cert-hint/draft-rosomakho-tls-wimse-cert-hint.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-rosomakho-tls-wimse-cert-hint/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security  mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/yaroslavros/tls-wimse-cert-hint"/>.</t>
    </note>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Mutual TLS (mTLS) is commonly used to authenticate both endpoints of a <xref target="TLS"/> connection, especially in service-to-service communication within distributed systems. In many deployments, client authentication is conditional: only certain clients are required to present a certificate, and the decision is based on the nature of the client.</t>
      <t>This document defines a TLS extension that allows clients to indicate one or more workload identifier origins in the <tt>ClientHello</tt> message (<xref section="4.1.2" sectionFormat="of" target="TLS"/>). As defined in <xref section="4.5" sectionFormat="of" target="WIMSE-IDENTIFIER"/>, workload identifier origin is a subset of workload identifier and consists of a URI scheme and a trust domain (e.g., <tt>spiffe://example.org</tt> or <tt>wimse://botfarm.example.com</tt>). It indicates a namespace under which the client may present an authenticated identifier. Workload identifier origins act as hints that inform the server of the client intended identifier before the TLS handshake is completed. Based on this information, the server can determine whether client certificate authentication is desirable and, if so, what policy or certificate validation rules should apply.</t>
      <t>This approach enables more flexible and efficient authentication strategies in environments where different clients may be subject to different requirements. For example:</t>
      <ul spacing="normal">
        <li>
          <t>A server may enforce mTLS only for clients of specific workload identifier origin and allow others to connect without client certificate authentication on TLS layer.</t>
        </li>
        <li>
          <t>A server may use the provided workload identifier origins to generate an appropriate list of Certificate Authorities extension (<xref section="4.2.4" sectionFormat="of" target="TLS"/>) in <tt>CertificateRequest</tt> message (<xref section="4.3.2" sectionFormat="of" target="TLS"/>).</t>
        </li>
        <li>
          <t>The server may reject the connection early if none of the advertised workload identifier origins are authorized.</t>
        </li>
      </ul>
      <t>By only sending scheme and trust domain (omitting the path), this extension limits exposure of cleartext information. Where further confidentiality is desired, clients are encouraged to include this extension only in <tt>ClientHelloInner</tt> of Encrypted Client Hello (<xref target="ECH"/>) to ensure confidentiality of the workload identifier origins.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="tls-extension-format">
      <name>TLS Extension Format</name>
      <t>This document defines a new TLS extension named <tt>workload_identifier_origin_hint</tt>, which is carried in the <tt>ClientHello</tt> message. The extension provides the server with one or more workload identifier origins that the client associates with itself. This allows the server to evaluate authentication requirements prior to sending a <tt>CertificateRequest</tt> message.</t>
      <t>The <tt>workload_identifier_origin_hint</tt> extension is structured as follows:</t>
      <artwork><![CDATA[
   opaque WorkloadIdentifierOrigin<1..2^16-1>;

   struct {
       WorkloadIdentifierOrigin identifierorigins<3..2^16-1>;
   } WorkloadIdentifierOriginHintExtension;
]]></artwork>
      <dl>
        <dt><tt>identifierOrigins</tt>:</dt>
        <dd>
          <t>A list of UTF-8 encoded absolute URI strings as defined in <xref target="URI"/> containing only the scheme and trust domain components of Workload Identifiers as defined in <xref section="4.5" sectionFormat="of" target="WIMSE-IDENTIFIER"/>. URI strings <bcp14>MUST NOT</bcp14> contain a path component.</t>
        </dd>
      </dl>
      <t>Clients <bcp14>MAY</bcp14> include multiple identity origins if they operate within more than one trust domain or namespace.</t>
      <t>The extension <bcp14>MUST</bcp14> appear only in the ClientHello. Servers <bcp14>MUST</bcp14> abort TLS handshake with an <tt>illegal_parameter</tt> alert if this extension appears in any other handshake message. Similarly, clients <bcp14>MUST</bcp14> abort TLS handshake if this extension appears in any message from the server.</t>
      <section anchor="server-processing-rules">
        <name>Server Processing Rules</name>
        <t>Upon receiving the extension, the server:</t>
        <ul spacing="normal">
          <li>
            <t><bcp14>MAY</bcp14> use the identifier origins to determine whether to send a <tt>CertificateRequest</tt> message.</t>
          </li>
          <li>
            <t><bcp14>MAY</bcp14> use the identifier origins to construct Certificate Authorities extension in the <tt>CertificateRequest</tt> message.</t>
          </li>
          <li>
            <t><bcp14>MAY</bcp14> use the identifier origins to select a trust anchor or policy.</t>
          </li>
          <li>
            <t><bcp14>MAY</bcp14> reject the handshake early with <tt>handshake_failure</tt> alert if none of the identifier origins are acceptable.</t>
          </li>
          <li>
            <t><bcp14>MUST NOT</bcp14> treat inclusion of the extension as proof of identity. The identifier origins are advisory and unauthenticated until verified during client authentication.</t>
          </li>
        </ul>
        <t>If the extension is absent, the server proceeds with the default client authentication behavior.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This extension is intended to improve the flexibility of client authentication policies in TLS. However, because it introduces unauthenticated identity hints early in the handshake, several security considerations apply.</t>
      <section anchor="confidentiality-of-workload-identifier-origins">
        <name>Confidentiality of Workload Identifier Origins</name>
        <t>Workload identifier origins may contain sensitive information, such as deployment structure or tenant-specific data. Since this extension is sent in the clear as part of the ClientHello, exposure of these identifier origins may allow passive observers to infer client roles, access patterns, or security posture.</t>
        <t>To mitigate this risk, clients <bcp14>SHOULD</bcp14> include this extension only in ClinetHelloInner if <xref target="ECH"/> is available. ECH encrypts the ClinetHelloInner and its extensions under the server's public key, preventing visibility of the identifier origins to on-path observers.</t>
        <t>If ECH is not in use, clients <bcp14>SHOULD</bcp14> avoid including sensitive or detailed identifier origins in this extension unless required by policy.</t>
      </section>
      <section anchor="unauthenticated-hints">
        <name>Unauthenticated Hints</name>
        <t>The workload identifier origins conveyed in this extension are not authenticated. They are advisory in nature and <bcp14>MUST NOT</bcp14> be treated by the server as a proof of identity. Servers <bcp14>MUST</bcp14> perform full cryptographic verification of the client certificate before relying on any identity claim.</t>
        <t>Servers <bcp14>MAY</bcp14> enforce policies based on the presence or absence of expected identifier origins in the <tt>ClientHello</tt>. However, this enforcement must be restricted to access control decisions prior to authentication, such astriggering client authentication or rejecting the handshake.</t>
      </section>
      <section anchor="identifier-origins-enumeration">
        <name>Identifier Origins Enumeration</name>
        <t>If ECH is not deployed, an attacker with network visibility may collect workload identifier origins by observing repeated TLS handshakes. This could aid in reconnaissance or allow inference of infrastructure details. To reduce this risk, clients may:</t>
        <ul spacing="normal">
          <li>
            <t>Use generic or opaque identifier origins when full disclosure is not required.</t>
          </li>
          <li>
            <t>Limit use of the extension to trusted networks or peers.</t>
          </li>
          <li>
            <t>Use ECH to encrypt the extension contents.</t>
          </li>
        </ul>
      </section>
      <section anchor="server-response-behaviour">
        <name>Server Response Behaviour</name>
        <t>Servers receiving unknown or malformed identifier origins <bcp14>SHOULD</bcp14> ignore them and proceed with the default authentication policy. Servers <bcp14>SHOULD NOT</bcp14> terminate connections solely due to unrecognised identifier origins unless explicitly configured to do so.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to assign a new value from the TLS ExtensionType Values registry:</t>
      <ul spacing="normal">
        <li>
          <t>The Extension Name should be workload_identifier_origin_hint</t>
        </li>
        <li>
          <t>The TLS 1.3 value should be CH</t>
        </li>
        <li>
          <t>The DTLS-Only value should be N</t>
        </li>
        <li>
          <t>The Recommended value should be Y</t>
        </li>
        <li>
          <t>The Reference should be this document</t>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="TLS">
        <front>
          <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <date month="August" year="2018"/>
          <abstract>
            <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
            <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8446"/>
        <seriesInfo name="DOI" value="10.17487/RFC8446"/>
      </reference>
      <reference anchor="WIMSE-IDENTIFIER">
        <front>
          <title>Workload Identifier</title>
          <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
            <organization>Zscaler</organization>
          </author>
          <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
            <organization>CyberArk</organization>
          </author>
          <date day="2" month="March" year="2026"/>
          <abstract>
            <t>   This document defines a canonical identifier for workloads, referred
   to as the Workload Identifier.  A Workload Identifier is a URI that
   uniquely identifies a workload within the context of a specific trust
   domain.  This identifier can be embedded in digital credentials,
   including X.509 certificates and security tokens, to support
   authentication, authorization, and policy enforcement across diverse
   systems.  The Workload Identifier format ensures interoperability,
   facilitates secure identity federation, and enables consistent
   identity semantics.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-wimse-identifier-02"/>
      </reference>
      <reference anchor="ECH">
        <front>
          <title>TLS Encrypted Client Hello</title>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>Independent</organization>
          </author>
          <author fullname="Kazuho Oku" initials="K." surname="Oku">
            <organization>Fastly</organization>
          </author>
          <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
            <organization>Cryptography Consulting LLC</organization>
          </author>
          <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
            <organization>Cloudflare</organization>
          </author>
          <date day="14" month="June" year="2025"/>
          <abstract>
            <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-25"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="URI">
        <front>
          <title>Uniform Resource Identifier (URI): Generic Syntax</title>
          <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
          <author fullname="R. Fielding" initials="R." surname="Fielding"/>
          <author fullname="L. Masinter" initials="L." surname="Masinter"/>
          <date month="January" year="2005"/>
          <abstract>
            <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="66"/>
        <seriesInfo name="RFC" value="3986"/>
        <seriesInfo name="DOI" value="10.17487/RFC3986"/>
      </reference>
    </references>
    <?line 163?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8Va23IbxxF9368YQw+RUgAYSooj0/KFIqkSXJLo8BKVkkrE
we4AGGt3BpnZBQWz6G/Jt+TLcrpn9gYClCp5iEtlAYu59PX06V6NRqOk1GWu
DsTgnXUfcyszMcmUKfVMKydOnZ5rI15pU4qZdeLi9bk4yjV+f6Xy3A4SOZ06
tfpvd6eyVHPr1gfCl1mSZDY1soAsmZOzcuSst4X8uLCjMveja114NUqVK0cL
HDj6w+PEV9NCe6+tKddLbJucXLwU4oGQubcQSZtMLZUheQZDMVCZLq3TMqcv
k8MX+AsyDSZnFy8HiamKqXIHSQaJDpLUGq+Mr/yBKF2lEij4JJFOSZw6SK6h
6tzZaolvF04av7SuFK/lGiqfq7RyulwPko9qjYXZQSJGAvLTX6wCfdCNjfhx
NB19JtWSlTIVpBDi87cIEVQf0MdC6hwfcduPWpWzsXVzeixdusDjRVku/cHe
Hq2iR3qlxvWyPXqwN3X22qs97N+jfXNdLqopdq4lXJHLFf6/t8UVtDaH3XzZ
uaWzZxwOGmu7bffeFzh7vCiLfJAksioX1pFJcSX9pw1cNHg/Fmf19kH8ZVbl
eQim91GSdk1cAr2l0b/KEgF0IP7qU5mTQ/g/FWy5bsT68dfw+zi1xeb9P43F
K7vOpcnu3v6TNbJcSFOv2Hr3UW6rbAavqP71v8TN40XY/OOcnrMIibGuwPYV
AiXRZtb5loxGIyGnvnQyLZPkYqG9QGpVBYJOZGqmjfJCcjaqTyXiHDIIXFMi
cXJEgEg5R70oLRTMNGWpsEZRuhTWqSZgO3GM3yjXPTbgKNVNc1Eo7+VcjcWJ
TBdxoaAU0x6X2BlkuTybCJ8uVKEE1KSk8xAVlueVxRK3m3IonFo65elOM+dr
ZFZoo0lT0r3eQUd0RCNH+KVMFQl3vdAQgvYGLYVdKkfBOxYXC5y9TSevHA6X
nrOTzaKMnOaKj+EfHT3MVKkc5IGBFgo/ufoKCls6NGV3C7jDqX9W2qmMRQ0i
LW2uUw3PwMpBf2lSRDuuX9gqx9LlMl+TlNhfqBRhoX0hdLF0doVtajaj/SZd
k5pFVVYyZx8DBHO7LtijuApik80AnLUR1ael9RX8ClcQ7Gm2ZccOTXhZg/ut
wI2lSkvy4SwskznQaIjTIFsbUynCfqpE5aFocPkvlUnZBteABHFiUrdelvg1
hIsI8fLw5OjVo3GM40JnWa6S5IGYmNLZrOL9SfKmVfBhgf8/IrMiVApr8nW4
Ei7pWF6JqcWdqAdLy27kwLu5+Qqbvzt7efTs6dOvb29JSKP4jqFA1KgUuuVs
UnK0TtWotKP4ke+rTO1X0gnrMopHPa1IL7/2pSoQWxO4RJp11xnD3eEBIVCs
8EUCBFghgkJOhpiagIo2iEpyCecFNKKVcBtpPAzJBBdn0MPHw6eSjGNDngJf
oufblBj/nzDjqgMaVzVqiIc3N+fBIeLpeH/8mGSFGLe3j8bi0EfZOL66C/9I
y756N3lzfjKaHJ+8vZi8nJycfTcZHXPNiwWmleX2dniPiGQ2KUA3vCrp4G0r
ydT3gprsw9pDNZ6Ph+LKL/VsplAx1SdZLHNF5fiKzHbFMuIHxO1MumJcL0DU
XUH5SdlYmqRrUa4C5XF3ga6Q6zZMTC81uoqMxbt7XIWK0gFC8n8Ahy4U9oIJ
v5fEwXqnTdWMYoJWUUQByjK/kB9VzGEoCZnG4kUbqdp3UWjYvY5QZif0drJh
S55lymvHSA4JhkID/yzigNRiOF6TH7pHrAB0WdjuqlxtYHPMG3xxlkpdqBI+
JMAsV590vKoB6zvJz6VMzakOIEaUWWlnTY3dCsdkFC2OVYsZR34FyiI6fyFQ
pkLUrIkQwQeMxUtoE4MINGEkDmsT0hGKzIvoITANmEOUvb6ESgOBIcS+L084
zgkQhCUvMBxERGV4tFX5BZ7BHxIiJ6473pQT0M7ep7KnKa7uQxZcP1eGCzzH
PHlmiR4AX3MkKql11JHjkPklkFd1y1gPgR6Pn7YIRD666hxwBnODBu8Aryc9
8IJeF20Qk2ZOBQdS7jRVSCjpqP7MhGE4nUXes6Jb/WfUpyoROLP+FQmVJC/W
wbUAgYzK/y7O9dAWumxY1hIk9NGd6p6DQ5S+xx7SHNKWWNKnDO84cmeVC5nZ
Zw1NHqps2CtvoDK2crBiFopKmleZ2hSCtWEvtLVjAtu5K5JnF8FA1QfHaKsB
tRzKG00uZXbHCm0KGm1/j8HHxFOOrFnRD5YcAMMeU4Xiau4JIJRAZ0iHZF4M
3lyeX1A7Sn+Lt6f8+ezkz5eTs5Nj+nz+6vD16+ZDElecvzq9fH3cfmp3Hp2+
eXPy9jhsxlPRe5QM3hy+HwRWMDj9+WJy+vbw9SCU3269J+vDDFPF4O1QNMiE
0ifwUwpqE8rti6Of//2v/adEoUCfHu/vfwP6FL482//TU3wBYplwG7spfIUJ
1wkSEZFCpwAtgOBLXaJpH1JpAaJeG0ERA2v+/m9kmb8fiOfTdLn/9Pv4gBTu
Paxt1nvINrv75M7mYMQtj7Zc01iz93zD0n15D9/3vtd27zx8/kNOpWu0/+yH
7xMKIUK/kybGX3Im7SZlRl1vEDPiAhkIRIzUD22kfgiR+oEK+NUwkgSqutI5
Hfy6k4pxh9S5JSKw7xZj5vVfyvuYP3SogvTeppr5DJ8DeFH5LLY8kWf2Wy6F
glxtqSDdugc5teXVNerJe0F7HLL0s9brWALioXCjNam4p/MonSwtquxvv/1G
Pb1dStzSUKt2SBZmZM/3x+PH/9j/erT//bcJrQ/HiZs4D9i5sWPWaNXnTzpH
Yeftzr00l2ui7FuWNLnSG4v8FZQ4QAmu6+XlxcvRMwZnKr5y6m2OVieQXfQ9
Zu7JAD1a/hV+pBbryTfPYotFvQx5gnGBXfq55p8pyJYh493bNpqAzR7g9nbc
E7bGk1osRAfVu/ZmxMNRLEvI5aYQFVVeajCp6AGqD3U7w3ViXU8W6r6wCJRX
Gs6Pnpa2M6SI4dcGFwsYAbMudxsjlrE455SI2sgpjQr7zJoTCndf6TxXc5l/
WEqHK0uqlDTXKoPYveIaLmUmSr0rU7rOkQ0snIMJ5ERT2gK+U47P3lJTp5mz
3a6CSuuDqKb42dkUyyiCzoiGJ8nlkrM+VXrVjjXiDd1ugXkvubGmkdtJ491+
IsLHZ7HjS06nNjHk9+fJZwPI/+ulgFJil7I3XKLIC51OfUiHhLZOCxyUQ+iq
efphJnUOwOvET5ei7qKjaaqWJfVFfGOdfKVT3EsitwKvm/V9SFmOeoPH+FNn
XChIuy7KVtpbt2ZMqUy/3a3wKReIB9qXiawiLNg+j0HgTTaFoXI09TyS7NSj
JUWlymLxCmOXmQRM7Bj0TNVCrlCamDXWI32ijx4qOdkwxl62cCMcO2qixWH8
x7eFDlPXXHX7pc2YUXOTRZPrawXphxAnlRRCmnt2HrVh2ablGrQLI4DYnZh+
wAxhEpwpc/wd1Up7ajUN8wPmy5s0e/fLJBjkvvEEtVE1jndGmd3Jga/AeLhm
1JO4tnbz7BVduylHTbeLdl8SxJn0TvNBZT+MOCKLIYimQEUTVEdwB6WHvV6p
3DVtJh1CD70EISL57dRHeOdGaNaON5wF+g05qTzdWwK2jOcXW43lcSXpRnXF
CrRsek5ow6o47T+2mB1J72c6rSPiqp1Gi/L+5gbtFCo75cWKXi9Regs8I55A
HZivbdHfyoP6snOLj8OrNqt+B7WqKWKW2qYhDbBWcf6P9O5E+27gs2bEBb2x
Yshokg7yGsv+Q+DfMYRcWZ1Fc3Cz3AQUzIsKAUXV7nlmz3iVyclBzcR2um5g
l1LgciPJiJnFZvE+/pxSp7muWXu/qCLISLXeuYyX6z46alPPgMkZDR5PVYDk
IGsH5CR1HFuQuEdAQHx4KEivwQQHgJ07uUSzETG3HvT0JoXdiVCcEDqVrwNP
ZG7QgE+aS13Ads2tqFz1AKtBuN6gO0w+U/YdY3fKWYiMRLm7x40bvVAHL4PF
w6UMIwXV1SkJTdyST6VXECE3CZWQrc0kvtOW9BG6QSicMZ+r3YWJNAnVumY8
Df6GqLoLnuLEoHkMGLyZBAEPaQhDg7KylOnHup9D0lIYdjMuAG3OlOK+EEXw
hLwjGZ1ahpDqUUIfG7w0TFI55YjKWWOkBsGpncaQyOhXOw9fnGzBO6Sk51dU
SLIq3YpykJxJ4CXQl2eDCEoiQqFB26ICjS1CJGfap3kA8Gi0OqGJy7ymeRiT
sDvkBU5m1gXVoy35Nd9SMRoFWcgVPHvifNk4gKKHZ7hdFnyGhoH+oYJ4EYhE
5dqEaKlwZT4amqhQQy5zSsvt0V6j/9zE0XzBiBBJzV1Os41XdHCgnaCIQKUp
q9uxJionShcqSlbxrKky5PG54ZHmFukigCJdKbnLfB2mc/Mqvv/KQHAtE6nJ
4dvDOySKH8b3rsrXmYnqOjdxgEKDhE7T0ZvAXKyXSvyFFtAJc3q/F2KIALqd
07xFP1W/EJi2yL1jfhC300X74yfx/nb30au44BgrRqdUfDeXvI0rzhS9hwyU
cHPN+2ZNnTftb72hX3zdOkXakxUPU4oa1Lc5z1CSm4PwL2RU9t1gJnOvBreo
T6fHp8C3eiVg5z9zzE6IUCQAAA==

-->

</rfc>
