<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.38 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-tls-composite-fndsa-00" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="TLS Composite FN-DSA">Use of Composite FN-DSA Signatures in TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-tls-composite-fndsa-00"/>
    <author initials="M." surname="Chen" fullname="Meiling Chen">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="X." surname="Song" fullname="Xueyan Song">
      <organization>ZTE Corp.</organization>
      <address>
        <email>song.xueyan2@zte.com.cn</email>
      </address>
    </author>
    <date year="2026" month="May" day="12"/>
    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>Post-Quantum</keyword>
    <keyword>TLS 1.3</keyword>
    <keyword>Composite Signature</keyword>
    <keyword>FN-DSA</keyword>
    <abstract>
      <?line 69?>

<t>Compositing the post-quantum FN-DSA signature with traditional signature algorithms provides protection against potential breaks in either component. This document specifies how such a composite signature can be used for authentication in TLS 1.3. The selection of composite algorithms is intentionally chosen to strictly mirror the composite strategies for ML-DSA. This alignment provides two distinct and predictable security tiers for hybrid signatures, ensuring a consistent approach to post-quantum transition across the ecosystem.</t>
    </abstract>
  </front>
  <middle>
    <?line 73?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The advent of quantum computing poses a significant threat to current cryptographic systems. During the transition to post-quantum cryptography (PQC), cautious implementers may opt to combine cryptographic algorithms such that an attacker would need to break all of them simultaneously to compromise the protected data. These mechanisms are referred to as Post-Quantum/Traditional (PQ/T) Hybrids <xref target="RFC9794"/>.</t>
      <t>One practical way to implement a hybrid signature scheme is through a composite signature algorithm. In this approach, the composite signature consists of two signature components, each produced by a different signature algorithm.</t>
      <t>FN-DSA <xref target="FIPS206"/> is a post-quantum signature scheme standardized by NIST. This memo specifies how a composite FN-DSA signature can be negotiated for authentication in TLS 1.3 via the "signature_algorithms" and "signature_algorithms_cert" extensions.</t>
      <t>The composite algorithms defined herein are based on the framework specified in <xref target="I-D.chen-lamps-fndsa-composite-sigs"/>. A key design goal of this specification is to ensure <strong>consistency across the emerging post-quantum ecosystem</strong>. To that end, the selection of algorithm pairings in this document is intentionally aligned with the choices made for ML-DSA in <tt>draft-ietf-lamps-pq-composite-sigs</tt>. This creates two clear security tiers, allowing organizations to treat FN-DSA and ML-DSA composites at the same security level as interchangeable from a policy perspective.</t>
      <section anchor="conventions-and-terminology">
        <name>Conventions and Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>.</t>
        <t>"Composite FN-DSA" refers to a composite FN-DSA signature scheme as defined in <xref target="I-D.chen-lamps-fndsa-composite-sigs"/>. For brevity, this document uses <tt>fndsa512</tt> and <tt>fndsa1024</tt> in <tt>SignatureScheme</tt> names to refer to the <tt>Falcon-padded-512</tt> and <tt>Falcon-padded-1024</tt> variants, respectively.</t>
      </section>
    </section>
    <section anchor="composite-fn-dsa-signatureschemes">
      <name>Composite FN-DSA SignatureSchemes</name>
      <t>As defined in <xref target="RFC8446"/>, the <tt>SignatureScheme</tt> namespace is used for the negotiation of signature schemes. This document adds new <tt>SignatureScheme</tt> values for composite FN-DSA, organized into two tiers that mirror the ML-DSA composite strategy.</t>
      <artwork><![CDATA[
enum {
    /* Tier 1 Composites (FN-DSA-512 based, mimicking ML-DSA-44) */
    fndsa512_rsa2048_pss_sha256(TBD1),
    fndsa512_ecdsa_p256_sha256(TBD2),
    fndsa512_ed25519(TBD3),

    /* Tier 2 Composites (FN-DSA-1024 based, mimicking ML-DSA-87) */
    fndsa1024_rsa3072_pss_sha512(TBD4),
    fndsa1024_ecdsa_p384_sha512(TBD5),
    fndsa1024_ecdsa_p521_sha512(TBD6),
    fndsa1024_ecdsa_brainpoolP384r1_sha512(TBD7),
    fndsa1024_ed448(TBD8),

} SignatureScheme;
]]></artwork>
      <t>Composite FN-DSA is treated as an opaque signature algorithm, similar to the "PureEdDSA" algorithms in TLS 1.3 (Section 4.2.3 of <xref target="RFC8446"/>). Any hash functions used are internal to the composite algorithm itself, as specified in <xref target="I-D.chen-lamps-fndsa-composite-sigs"/>.</t>
      <t>When a composite FN-DSA signature scheme is used in TLS, the signing and verification operations MUST be performed on the input data as constructed by TLS (Section 4.4.3 of <xref target="RFC8446"/>). This input is then passed to the composite signature primitive, which applies its own internal domain separation.</t>
      <t>When a composite FN-DSA <tt>SignatureScheme</tt> is negotiated, the end-entity certificate presented in the TLS handshake MUST contain a public key compatible with that <tt>SignatureScheme</tt>.</t>
      <t>The schemes defined in this document MUST NOT be used in TLS 1.2 <xref target="RFC5246"/>.</t>
    </section>
    <section anchor="signature-algorithm-restrictions">
      <name>Signature Algorithm Restrictions</name>
      <t>The composite algorithms defined in this document are suitable for use in both the <tt>signature_algorithms</tt> and <tt>signature_algorithms_cert</tt> extensions. Consistent with TLS 1.3's requirements, all defined RSA-based composites use the RSASSA-PSS padding scheme for handshake signatures. Certificates MAY be signed with composites using RSASSA-PKCS1-v1_5, but these are not negotiated for use in the TLS <tt>CertificateVerify</tt> message.</t>
    </section>
    <section anchor="selection-criteria-for-composite-signature-algorithms">
      <name>Selection Criteria for Composite Signature Algorithms</name>
      <t>The composite signatures specified in this document are a curated set of cryptographic pairs, directly adopted from <xref target="I-D.chen-lamps-fndsa-composite-sigs"/>. The selection process was guided by a single, overriding principle:</t>
      <ul spacing="normal">
        <li>
          <t><strong>Strictly Mirroring ML-DSA Composite Strategy:</strong> The pairings for <tt>fndsa512</tt> are identical to those for <tt>ML-DSA-44</tt>, and the pairings for <tt>fndsa1024</tt> are identical to those for <tt>ML-DSA-87</tt>, as defined in <tt>draft-ietf-lamps-pq-composite-sigs</tt>.</t>
        </li>
      </ul>
      <t>This prescriptive approach ensures a consistent, two-tiered security model across the PQC signature landscape, simplifying policy development and promoting interoperability.</t>
      <section anchor="mapping-tls-signatureschemes-to-composite-fn-dsa">
        <name>Mapping TLS SignatureSchemes to Composite FN-DSA</name>
        <t>The following table provides a mapping between the TLS <tt>SignatureScheme</tt> identifiers and the corresponding composite algorithm identifiers from <xref target="I-D.chen-lamps-fndsa-composite-sigs"/>.</t>
        <table anchor="tbl-mapping">
          <name>Mapping TLS SignatureSchemes to Composite FN-DSA Identifiers</name>
          <thead>
            <tr>
              <th align="left">TLS SignatureScheme</th>
              <th align="left">Composite FN-DSA OID Name</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>fndsa512_rsa2048_pss_sha256</tt></td>
              <td align="left">
                <tt>id-fnpadded512-rsa2048-pss-sha256</tt></td>
            </tr>
            <tr>
              <td align="left">
                <tt>fndsa512_ecdsa_p256_sha256</tt></td>
              <td align="left">
                <tt>id-fnpadded512-ecdsa-p256-sha256</tt></td>
            </tr>
            <tr>
              <td align="left">
                <tt>fndsa512_ed25519</tt></td>
              <td align="left">
                <tt>id-fnpadded512-ed25519-sha512</tt></td>
            </tr>
            <tr>
              <td align="left">
                <tt>fndsa1024_rsa3072_pss_sha512</tt></td>
              <td align="left">
                <tt>id-fnpadded1024-rsa3072-pss-sha512</tt></td>
            </tr>
            <tr>
              <td align="left">
                <tt>fndsa1024_ecdsa_p384_sha512</tt></td>
              <td align="left">
                <tt>id-fnpadded1024-ecdsa-p384-sha512</tt></td>
            </tr>
            <tr>
              <td align="left">
                <tt>fndsa1024_ecdsa_p521_sha512</tt></td>
              <td align="left">
                <tt>id-fnpadded1024-ecdsa-p521-sha512</tt></td>
            </tr>
            <tr>
              <td align="left">
                <tt>fndsa1024_ecdsa_brainpoolP384r1_sha512</tt></td>
              <td align="left">
                <tt>id-fnpadded1024-ecdsa-brainpoolP384r1-sha512</tt></td>
            </tr>
            <tr>
              <td align="left">
                <tt>fndsa1024_ed448</tt></td>
              <td align="left">
                <tt>id-fnpadded1024-ed448-shake256</tt></td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>The security considerations discussed in <xref target="I-D.chen-lamps-fndsa-composite-sigs"/> apply. The primary goal is to provide hybrid security, where the composite signature remains secure as long as at least one component algorithm remains secure.</t>
      <t>Composite signature schemes do not in general preserve strong unforgeability (SUF-CMA) once the traditional component is broken. This does not impact TLS, which relies on existential unforgeability (EUF-CMA).</t>
      <t>TLS clients that support both post-quantum and traditional-only signature algorithms are vulnerable to downgrade attacks. The continuity mechanism defined in <xref target="I-D.sheffer-tls-pqc-continuity"/> can be used to mitigate this risk.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document requests new entries to the "TLS SignatureScheme" registry, according to the procedures in <xref target="TLSIANA"/>.</t>
      <table anchor="tbl-iana">
        <name>Additions to TLS SignatureScheme Registry</name>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Recommended</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">
              <tt>fndsa512_rsa2048_pss_sha256</tt></td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD2</td>
            <td align="left">
              <tt>fndsa512_ecdsa_p256_sha256</tt></td>
            <td align="left">Y</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD3</td>
            <td align="left">
              <tt>fndsa512_ed25519</tt></td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD4</td>
            <td align="left">
              <tt>fndsa1024_rsa3072_pss_sha512</tt></td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD5</td>
            <td align="left">
              <tt>fndsa1024_ecdsa_p384_sha512</tt></td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD6</td>
            <td align="left">
              <tt>fndsa1024_ecdsa_p521_sha512</tt></td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD7</td>
            <td align="left">
              <tt>fndsa1024_ecdsa_brainpoolP384r1_sha512</tt></td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
          <tr>
            <td align="left">TBD8</td>
            <td align="left">
              <tt>fndsa1024_ed448</tt></td>
            <td align="left">N</td>
            <td align="left">This document.</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="I-D.chen-lamps-fndsa-composite-sigs">
          <front>
            <title>Composite FN-DSA for use in X.509 Public Key Infrastructure</title>
            <author initials="M." surname="Chen" fullname="M. Chen">
              <organization/>
            </author>
            <date year="2026" month="May" day="08"/>
          </front>
        </reference>
        <reference anchor="TLSIANA">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author initials="J. A." surname="Salowey" fullname="J. A. Salowey">
              <organization/>
            </author>
            <author initials="S." surname="Turner" fullname="S. Turner">
              <organization/>
            </author>
            <date year="2025" month="July" day="21"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-15"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC9794">
          <front>
            <title>Terminology for Post-Quantum Traditional Hybrid Schemes</title>
            <author fullname="F. Driscoll" initials="F." surname="Driscoll"/>
            <author fullname="M. Parsons" initials="M." surname="Parsons"/>
            <author fullname="B. Hale" initials="B." surname="Hale"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>One aspect of the transition to post-quantum algorithms in cryptographic protocols is the development of hybrid schemes that incorporate both post-quantum and traditional asymmetric algorithms. This document defines terminology for such schemes. It is intended to be used as a reference and, hopefully, to ensure consistency and clarity across different protocols, standards, and organisations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9794"/>
          <seriesInfo name="DOI" value="10.17487/RFC9794"/>
        </reference>
        <reference anchor="FIPS206" target="https://www.nist.gov/news- events/news/2024/08/nist-releases-first-3-finalized-post- quantum-encryption-standards">
          <front>
            <title>FIPS 206, Fast-Fourier-Transform-based Digital Signature Algorithm</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.sheffer-tls-pqc-continuity">
          <front>
            <title>PQC Continuity - Downgrade Protection for TLS Servers Migrating to PQC</title>
            <author initials="Y." surname="Sheffer" fullname="Y. Sheffer">
              <organization/>
            </author>
            <author initials="T." surname="Reddy.K" fullname="T. Reddy.K">
              <organization/>
            </author>
            <date year="2025" month="October" day="18"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-sheffer-tls-pqc-continuity-00"/>
        </reference>
      </references>
    </references>
    <?line 174?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document also draws on <tt>draft-reddy-tls-composite-mldsa</tt>. Thanks to the authors of that document.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA51aXVPbSBZ9p4r/0EUedkJZBjsmELa2ahgINcwEwsRkdrIv
uC21bRWSWumW8HgI+9v33Nv6smwzzvKCLXXfvn0/zj23257n7e7s7thMJsG9
jHSiTkVmcrW7E6aGP9qsf3j47rC/u+PL7FSEyURjfD6OQ2tDnWSLFFOu3t9d
7u5Io+SpGCo/N2G22N2ZT0/F3YchLRBoP5ExRgZGTjLPn6nEyyLr+TpOtQ0z
5U2SwErv8JBGZ2EWYexnq4SeiPNyjLi88S6GZ2IYThOZ5UZZqEMriF73DZYf
j4165CVX5uzuRDKBOirZ3XmYn+7uCOGJqyRTJlGZd0FKuWe32mbeb7lMsjx2
Tyr59KWWWynhXpTLQI08m2mDJTzhtnytwihMpuJ8RqsLoQ0UOZ+FiRTXehxG
LMGHxU7FTyr8BUP5gc6TzCyKkfRExTKMTgXZLnYif/TpXcxCujBlveYfuVrI
RAy1E8ZL/ufuPfQ3abchzGJA908e3P/xr4yldP2E9pFoE8ssfFRsrU+X5/1e
7135+aR3PKg+DwZv+fOVd9Flz0YyTm3h0drDNpxaHidE4eAVz060ETm8Drf+
0T06fCdu83EU+uJXtYC3JkZaRKRfWl2IytaC/yqLdytjCxHIDI/6h/233uGR
d3hCT+HTq7Obs2Vt6In4pKYhFlmIzylNtKwShQASRFxwNL+w8C9dcdYVQyTS
XC3aL4ddcZcj3kxLLyh17PV77qlVJlSWsqwSLlqBWiZRqLIJJ5GZ+PDB8Ti0
Xu+IXEfTW8476hdOwud3x++c8y6vbof9w7elGaSZKkifZVlqTw8O5vN5N4Ex
ulP9eJCoufVqjdyfelRJZvndATYyODg8OaAZnlGRklYhBkKDr2/wP5FR+JcK
vJQSrC3oq0s4TyW+WaQZcMVjSJImsEs+Io1hs7cdcYlY8C41oEYZ787IxNKe
vTGWhaPCaZjJqE5ScRZNNVBpFm/wH2fIjaSlMe8qsVgwzxh/hqUmHAN3yp8l
OtLThfjh5mp497qMfDtTkwl0IY+kX30EfpKFSU55vbSF29/OEfjlOyx9oefJ
1MhAiVujM+WTDlXYDZV5VMaK6xBDMoKRTJOIF8PwC2LQadN+c9dFhAfBovvr
ShD2Dr3eycYgXB+Cm/dcILnneUKOkVDSz+h7mfG8kZkSHA2F90sQsJXT5nAY
apAMwsIv9StZ+tOK1OjHMFD8oTSfnMoQPoT8DCEaYipqg3zggqEwTRnBwJTg
LdJyFlqBEpXH+CpsqvxwAgOImZ4Lm/szIUUFYw0dfCDsWBFgBewv8gat5nMY
NWoTrYCJSAqnHYKqltfYSUj6scK022gBrNdWJeRymDD0MzyKQ2OwFhmvoROM
lAG5Cry6/kCGLPaFvJsmvLHKUNlciwB5GiZ+xkGdGhVAvBxHpKar34hXCjyS
N1uMTRjUO7cdFFKLUfAimSaxEEYryBRrSBgMGi+5NqMEDZ1rfKOt5Q0oX9sF
ZsbdMlbiMAioIO7uvKKQMzrI2WT0hGwoA4IcMmApmYyQczxhQexNsprwH7yT
YRW4PSN1sClDUxlgNJIpnaGwuOVtV1y43ZBWDV3b22hMRvojDV93EAVYXudw
XZxGigxNZovlQujUrazjcZio1soNt3OIZTNJvhAyy6T/gPic6zwKRKIQXBDC
4YtJEe0dWsbYZpxHgCaFtREXbiGYH8RMudxy6YD5yHLJMYg3MfBLAqSxLvia
MAr5a9wa0i7Rn4O7RuZhswd3r8XPHAlWPD0VdeT5mX33MaH1kOQweyTmkvWp
DAKntENIWDCFWFHIw0c6n25KsspOXQQExlJEF1HWaWdBnZkuJC0bC8HefFNk
PcUwRWrKMQYDjBfQIAgJzxgF1mhAOy1A6umpKJ7Pz7QHuRwnK9ssqxmVQFqJ
KkeRn7GKdQtzmpZYAcUCdRI11QC27O+wRzyGku20V4m4r2Nvj9N/7at7X5ls
T6g/kdnE9G23TMK12BUo1HgoA2hVWJ1iy9ViSiNMAnmL1Vybh2qvAWn59LQF
a0SQiTPxABII9IKqYqplkQgwYCGv3Lml0GN4UmJ/vwInf7GEPLEy0wI0ardV
eLS/D+dol5MqCVygLeF3tXORypCgg0tLtlRIVuCcoRj7dnWNLDnToa8ILVD9
a+QmUaMGyXOWSb+2zDIqIsgnjCtg3QfxMi0M7xBu6DltFzQHyf8Xm4oNlTE+
FkFGsVBoUK2E2M7c9mXcKA4RuF9EiEE7NAQpU8XlYwIE4nQAb1+IFMunZLVH
xeHz6hVxn0dnk5JQmTh0jKoMMPI0QgU4s3f9eXi313H/xc1H/vzp/W+frz69
v6DPw5/PPnyoPpQjhj9//Pzhov5Uzzz/eH39/ubCTcZT0Xp0ffYF/zgpPt7e
XX28Ofuwt+pZim4CZeW2j/JJeSgpC6xvwrGL7Z/Ob0Vv4LCSmidABX+m5qnA
zb12C7TnEJl98yIMFMAi68z7nmy6RKxRtwxXdlp7y6mKjnjiUa8/Ylu4rz1Q
/BHHZsWrh6zFiNkl68zac2DBj6NLGSEBvVQGAah/LW75uZP7KE0oGZdBMIqY
iRYual44A3AaWBp21rJF0Zs+P7v83aB1Kn0uQxWNo7EluhbZ3ja7bXNGbMRi
0nzNIo8yygte1nZnp8xH1piMhgx2tIuhp8H12mlZUj5noP/ib3dHJcCwJ8fY
D/bFHQSJXm06K35wy5IjHDh3sEQc+g8EDW4FbzB4LfYPnJAyCO6Nlf3Dwcl9
au29ncn+0dsf7n666L3utMYpHx/uU7xvDOuvDgv6R0e9d/TyDb1cVrm/TmWK
kY06nxy3dKbRpPSbw+N+qTQWpgUHS9rwwELrNyeDxrijjeOO+r3GuLebxo0N
WpBU6+gWgk1zyvGaKcFgcELvTpw9ntsB/s/SyXUPVeUClTwuAQxBoAc6lV/z
tSSqQ7QxjGSVonu3eP8+YORpdiI1f/hhWFS9QbePr8iGRma9RmFOFmIm7UxM
8sR3sM6pRBjJ6Ej0sVhtDXMQYYbCOumQ6v8XMyCT/BujtoLLMs/d/oq6Tv0C
dTJAJvTaNZXQqF5FpeTyA7jHEzpmqGkNXJxnTLBpA8Q2+ITKsTwyYcN8g3Xm
YxxxUpgLYyOptNYx8k38NjXwIgFkR8zRTMyIEkfEHkPivPOkNnygY4Qh6nYq
3V5etNcqeoW2wTSdvUCIPCrgYAFEEZ29SCe0F0nmjEvjaPfgBQEC/0E5C9L5
AKkDfuAO9qjSkxZQjchDQYwAfSuaVOyzQOAm1C8XsJIqVL15Fcx9Z3s6CysC
59W6IyLxSbl2m1y/FeldSxBsHrqOunGqOdYF8xuto9xFddzIxkdNNk5Equy7
2W5Fwv7DooB+zUPDrZcjf5Win4CWjpY3CF5eNIx4OcT72+FQUGWmnCjShg8B
KlfW5wBQoo4AZMnZFzK6bbDcpWVIYrnIr+fDnvfYuz/qiHHODBNakNkSnbWb
m8J4ZVCNGov+Tgm7GKGLslZOVenUiqqfw3wYIlnOmtP72utrPF1vdBmaVn0t
6XyB9bWKjyeWm33qEeCJAE7hQxwZ6JQ3R2R5a9K2fIiExhWtg0WzbcU0D4Oy
hSUrRwAGDSxDy81NDhoUP0QzfsrnLGiLhuVx0jVTjLqWNm1UMIzT/X1eump0
yJRNgkhAH7jms0B6bV3MjCpSMXKkOlsvxzHALQSdHI86Lc67VaPkfBtaRikw
9JTAsz6ucu2iXTrM6hAb84iNsVeLvifWAfU9dSdJx7k1MEeUJL5MFRdaYPJk
4bpM7oYCapp06qKGj910rPnsivGa6804jLBO2SxdQ0V6z0fBLcpLFlq953Ix
PNFlx+cgqDr6k+g1ncixyuZKNbJqFfvZFxPmo6XzfG2InuuEA2ttPW/M+q74
Jt2/rdupWPf3bbUn+HiFRk+uG/+NJHvb/YmtR/Jgkjx6gSiPWlqPwgAGcJ0P
ZnjFDA8zvJUZLekr9HpZ+BrpPMOjGavCV6Q7Vt6S+aJ0N8Nz1LatTC19Ax0f
bZZOM7xiRmmapRlt6Ssc/iW7s/TCNJixqv8G6TXz31Y6ZmwrfX2/MHpJfGtK
udKKfGouNrp1rXia4XG1Xw3h3Z2nU/EqG0deCSV8s/Wvve8FK3FVQ8Xec1m5
C6BldhNUBPzpVfnmuSKC5VB/eWgQWj+39ru6CCbQC1diiVxLs3CHjO44sYDP
6hS7WJnYtzJqI003dMsOjXg8n9VEmhoNPlOjG1JQhaRxJt1A0eWp3eW+b+U4
AmSEeRM2PFUJLBE5Om4e+aCAFs3pTpjO6Li+oC35fOmdX5+9hga+Ku89quP+
WiUYYGz0g0qqIw8sx2uBtfuZa6NcE2IU9yDgJupPV0Pp4q298PtiYVeTESo+
ZoGoOt5v8zTVJnNEeelwlitQraKnE9CXtReCxCMe84jsQLUP/guqK1Z3vWKd
p+vryvpaZPU4bfMlJ+KmeQeIhagrm1I3xBTRhPahYKT844KVmKanzxU3qRgl
8XdF1xd0ooQHdBtbNexrsosODd3PFkCOfJTooLgoLq6BfBWUv5Z5eip++1AV
3N/pfAogcFESI/hv8983NEcIDqhJhJO+8X2JrxrQ9l1ldHncyiwnkQ6bGKi2
LLTfxM3StyXzdiuZ/WWZL5fXb+LLNjLftGS+WFS31HNQy/z7UrqlzKOWzBcL
6JYy366Xub5sbinzeK3MDcVyS5knbZkvFci/l1mWw1AmsqyFZ4EDKs7bdZy2
/KGRK3zl/fcY4OQA48x/SPQ8UsGU2/hVkJCR1fQzjDkjbtEFGfpxR+uXdXGE
ffJdkUweKhxxPx1xN6QEvNWOdv4HU2R58RQoAAA=

-->

</rfc>
