<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-usama-tls-fatt-extension-03" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title>Extensions to TLS FATT Process</title>
    <seriesInfo name="Internet-Draft" value="draft-usama-tls-fatt-extension-03"/>
    <author fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <date year="2026" month="April" day="12"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract>
      <?line 54?>

<t>This document applies only to non-trivial extensions of TLS, which require formal analysis. It proposes the authors specify a threat model and informal security goals in the Security Considerations section, as well as motivation and a protocol diagram in the draft.
We also briefly present a few pain points of the team doing the formal analysis which -- we believe -- require refining the process:</t>
      <ul spacing="normal">
        <li>
          <t>Contacting FATT</t>
        </li>
        <li>
          <t>Understanding the opposing goals</t>
        </li>
        <li>
          <t>No response from some authors</t>
        </li>
        <li>
          <t>Slots at meeting</t>
        </li>
        <li>
          <t>Provide protection against FATT-bypass by other TLS-related WGs</t>
        </li>
        <li>
          <t>Process not being followed</t>
        </li>
      </ul>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://muhammad-usama-sardar.github.io/tls-fatt-extension/draft-usama-tls-fatt-extension.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-usama-tls-fatt-extension/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/muhammad-usama-sardar/tls-fatt-extension"/>.</t>
    </note>
  </front>
  <middle>
    <?line 67?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>While the TLS FATT process <xref target="TLS-FATT"/> marks a historic change in achieving high cryptographic assurances by tightly integrating formal methods in the working group (WG) process, the current FATT process has some practical limitations. Given a relatively smaller formal methods community, and a steep learning curve as well as very low consideration of usability in the existing formal analysis tools, this document proposes some solutions to make the FATT process sustainable.</t>
      <t>Specifically, the TLS FATT process does not outline the division of responsibility between the authors and the team doing the formal analysis (the latter is hereafter referred to as the "Verifier"). This document aims to propose some solutions without putting an extensive burden on either party.</t>
      <t>An argument is often presented by the authors that an Internet-Draft is written for the implementers. We make several counter-arguments here:</t>
      <ul spacing="normal">
        <li>
          <t>Researchers and protocol designers are also stakeholders of such specifications <xref target="I-D.irtf-cfrg-cryptography-specification"/>.</t>
        </li>
        <li>
          <t>Even implementers may like to understand the security implications before blindly starting to implement it.</t>
        </li>
        <li>
          <t>With the FATT process, this argument is clearly invalid. The Verifier may not be an implementer.</t>
        </li>
      </ul>
      <t>This document outlines the corresponding changes in the way Internet-Drafts are typically written.
For the Internet-Draft to be useful for the formal analysis, this document proposes that the draft should contain four main items, namely:</t>
      <ul spacing="normal">
        <li>
          <t>motivation,</t>
        </li>
        <li>
          <t>a threat model,</t>
        </li>
        <li>
          <t>informal security goals, and</t>
        </li>
        <li>
          <t>a protocol diagram (<xref target="sec-prot-diagram"/>).</t>
        </li>
      </ul>
      <t>Each one of these is summarized in <xref target="sec-res-authors"/>. Future versions of this draft will include concrete examples.</t>
      <t>Responsibilities of the Verifier are summarized in <xref target="sec-res-verifier"/>.</t>
      <section anchor="motivation">
        <name>Motivation</name>
        <t>A clear separation of responsibilities would help IRTF UFMRG to train the authors and verifiers separately to fulfill their own responsibilities.</t>
        <t>Moreover, we believe that the experiences can help improve the FATT process. The goal is to document the identified gaps with concrete examples, discuss those and mutually find the best way forward.</t>
      </section>
      <section anchor="scope">
        <name>Scope</name>
        <t>The scope of this document is only non-trivial extensions of TLS, which require formal analysis.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<section anchor="sec-prot-diagram">
        <name>Protocol Diagram</name>
        <t>In the context of this document, a Protocol Diagram specifies the proposed cryptographically-relevant changes compared to the standard TLS protocol <xref target="I-D.ietf-tls-rfc8446bis"/>. This is conceptually similar to the Protocol Model in <xref target="RFC4101"/>. However, while <xref target="RFC4101"/> only recommends diagrams, we consider diagrams to be essential.</t>
      </section>
      <section anchor="verifier">
        <name>Verifier</name>
        <t>In this document, the Verifier refers to the team doing the formal analysis.
Note that it is NOT a new formal role in the WG process.</t>
      </section>
      <section anchor="definition-of-attack">
        <name>Definition of Attack</name>
        <t>Any ambiguity originating from the threat model, informal security goals, and a Protocol Diagram is to be considered as an attack.
The authors are, therefore, encouraged to be as precise as possible.
The Verifier may propose text for consideration by authors/WG to disambiguate or propose a fix to the attack.</t>
      </section>
    </section>
    <section anchor="sec-pain-points">
      <name>Pain Points of Verifier</name>
      <t>From the two extremes -- <xref target="I-D.ietf-tls-8773bis"/> where Russ kindly provided all requested inputs and we were able to get it through (with a <eref target="https://mailarchive.ietf.org/arch/msg/tls/6Wk82oBGd61rTK23DgfYb7BmRKM/">small change</eref>) without any formal analysis to <xref target="I-D.fossati-tls-attestation-08"/> where formal analysis revealed vulnerabilities <xref target="ID-Crisis"/> and resulted in a separate WG to tackle this problem -- we summarize the pain points of the Verifier with the hope that we can refine the process.</t>
      <t>Note that we are not at all asserting that the authors have no pain points. They very likely have their own -- that is another indication that the process needs a refinement.</t>
      <section anchor="provide-protection-against-fatt-bypass-by-other-tls-related-wgs">
        <name>Provide Protection Against FATT-bypass by Other TLS-related WGs</name>
        <t>TLS-related WGs in particular those where the representation of TLS WG is a minority -- including the one (SEAT WG) that the author has defended himself as one of the six proponents -- <bcp14>MUST NOT</bcp14> be allowed to make changes to the TLS protocol beyond what is explicitly allowed in their charter.</t>
        <t>If rechartering of such WGs is <em>absolutely unavoidable</em> and includes non-trivial changes to the TLS protocol, it <bcp14>MUST</bcp14> only be done after agreement with the TLS WG. This will prevent the short-circuit path for FATT. If the WG does not have proper FATT-like process, TLS WG may request FATT review before WGLC.</t>
        <t>In short, our concern is:</t>
        <artwork><![CDATA[
What's the point of such a TLS FATT process when other WGs
can simply bypass this process to make key schedule level changes?
]]></artwork>
        <t>For example, <xref target="I-D.fossati-seat-early-attestation-00"/> makes key schedule level changes, breaks the SEAT WG charter and SEAT WG has no formal FATT-like process.</t>
      </section>
      <section anchor="process-not-being-followed">
        <name>Process not being followed</name>
        <t>The process <xref target="TLS-FATT"/> states:</t>
        <blockquote>
          <t>When a document is adopted by the working group the chairs will make a determination whether the change proposed by the document requires review by the FATT to determine if formal protocol analysis is necessary for the change. For example a proposal that modifies the TLS key schedule or the authentication process or any other part of the cryptographic protocol that has been formally modeled and analyzed in the past would likely result in asking the FATT, whereas a change such as modifying the SSLKEYLOG format would not. The working group chairs will inform the working group of this decision.</t>
        </blockquote>
        <t>However, such information has not been provided to the WG for at least the following 2 documents:</t>
        <section anchor="ml-kem">
          <name>ML-KEM</name>
          <t>For the draft <xref target="I-D.ietf-tls-mlkem"/>, the <eref target="https://mailarchive.ietf.org/arch/msg/tls/L2bWqpT3q8HVmACwD1Ta3NFimw0/">chairs acknowledge</eref> that the process was not followed:</t>
          <blockquote>
            <t>Unfortunately, the chairs did not announce this decision on the list (this is something that should be corrected in the process).</t>
          </blockquote>
          <t>However:</t>
          <artwork><![CDATA[
It remains unclear what exactly "corrected in the process" entails.
]]></artwork>
          <t><eref target="https://mailarchive.ietf.org/arch/msg/tls/L2bWqpT3q8HVmACwD1Ta3NFimw0/">The chairs further say</eref> :</t>
          <blockquote>
            <t>The chairs made this decision because the mechanism in this draft fits into a well defined place in the TLS protocol and does not change the protocol itself.</t>
          </blockquote>
          <t>We believe this argument does not stand, given the single data point that has gone through the FATT process -- <xref target="RFC8773bis"/>. Both of the mentioned conditions apply equally to <xref target="RFC8773bis"/> which indeed went through FATT process. The mechanism defined in <xref target="RFC8773bis"/> "fits into a well defined place in the TLS protocol" and "did not change the protocol itself". So we request clarification of the matter in comparison to <xref target="RFC8773bis"/>.</t>
          <artwork><![CDATA[
We believe the security considerations of {{I-D.ietf-tls-mlkem}} are
insufficient. We also believe FATT review could have significantly
improved it, including but not limited to the key reuse ambiguity.
We have provided significant feedback during the two WGLCs. However,
almost none of that is actually reflected in the updated editor's
version.
]]></artwork>
        </section>
        <section anchor="key-update">
          <name>Key Update</name>
          <t>The process <xref target="TLS-FATT"/> states:</t>
          <blockquote>
            <t>The output of the FATT is posted to the working group by the FATT point person.</t>
          </blockquote>
          <t>Based on <eref target="https://mailarchive.ietf.org/arch/msg/tls/KFUD3FPcrUlJmnXSyb3s25UFbdo/">authors' email</eref>, while it is great that FATT could find some threat, in our observation, the FATT process does not seem to be followed in spirit.</t>
        </section>
      </section>
      <section anchor="contacting-fatt">
        <name>Contacting FATT</name>
        <t>The FATT process restricts the Verifier from contacting the FATT directly.
We argue that the Verifier should be allowed to contact the FATT (at least the FATT person for a specific draft) because of the following reasons:</t>
        <ul spacing="normal">
          <li>
            <t>Formal methods community is small and within this small community, those with deep knowledge of TLS are quite limited.</t>
          </li>
        </ul>
        <artwork><![CDATA[
Such a restriction would not have been there if the Verifier
were not a member of the TLS WG and analyzing the same draft
and free to contact the same FATT for advice. Being a member
of the TLS WG actually puts the Verifier at unnecessary disadvantage.
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>The feedback we receive on the list is really limited.</t>
          </li>
          <li>
            <t>Communication via chairs is a source of misunderstandings, as it has already happened with the chairs summarizing the intent of "Tamarin-like" to just "Tamarin".</t>
          </li>
        </ul>
      </section>
      <section anchor="understanding-the-opposing-goals">
        <name>Understanding the Opposing Goals</name>
        <t>The authors need to understand that the task of the Verifier is to find the subtle corner cases where the protocol may fail.
This is naturally opposed to the goal of the authors -- that is, to convince the WG that the protocol is good enough to be adopted/published.</t>
        <artwork><![CDATA[
Unless the Verifier remains really focused on checking subtleties,
there is little value of formal analysis.
]]></artwork>
        <t>In particular, some topics like remote attestation need more precise specifications because small changes or ambiguites may make a big difference.</t>
      </section>
      <section anchor="response-within-reasonable-time-frame">
        <name>Response within reasonable time frame</name>
        <t>If authors do not respond to the Verifier's questions within a reasonable time frame, the Verifier may not pursue formal analysis of their draft.</t>
      </section>
      <section anchor="slots-at-meeting">
        <name>Slots at Meeting</name>
        <artwork><![CDATA[
Formal analysis -- just like any other code development -- is an
iterative process and needs to be progressively discussed with
the WG (and not just authors!) to be able to propose secure
solutions.
]]></artwork>
        <t>So at least some time should be allocated in the meetings for discussion of formal analysis.</t>
        <ul spacing="normal">
          <li>
            <t>If the authors are doing the formal analysis themselves, they should also present the current state of formal analysis for discussion. This will help the Verifier give any feedback and avoid any repititive effort.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="proposed-solutions">
      <name>Proposed solutions</name>
      <t>In addition to those mentioned inline in the previous section, we propose the following:</t>
      <section anchor="transparency">
        <name>Transparency</name>
        <ul spacing="normal">
          <li>
            <t>The process should be as transparent to the WG as possible. For example, see <eref target="https://github.com/tlswg/tls-fatt/pull/16">PR#16</eref>.</t>
          </li>
        </ul>
      </section>
      <section anchor="wg-consultation-and-information-in-decisions">
        <name>WG consultation and information in decisions</name>
        <ul spacing="normal">
          <li>
            <t>It should be the <strong>WG</strong> (and not the chairs) that deems whether some FATT analysis is
   required. At the very least, WG should be given the right to argue against the decision of the
    chairs regarding whether FATT analysis is required. We believe the opinions of relevant stakeholders -- those who are doing the
    formal analysis of the drafts of the WG, OR actively contributing to it, OR have done formal analysis
   in the past, OR have reasonably good knowledge of it, OR have relevant expertise -- should be heard.</t>
          </li>
        </ul>
      </section>
      <section anchor="controversial-drafts-need-fatt-review">
        <name>Controversial drafts need FATT review</name>
        <ul spacing="normal">
          <li>
            <t>Surely not every draft needs to go to FATT but we believe the controversial
    ones do need to go to FATT, regardless of the nature of the draft
    and whatever the chairs believe. As a reminder, 'nothing required'
    is a perfectly valid outcome of initial FATT review. Formal methods
    may help resolve some of the controversies.</t>
          </li>
        </ul>
      </section>
      <section anchor="scope-of-fatt">
        <name>Scope of FATT</name>
        <ul spacing="normal">
          <li>
            <t>Be more explicit on:
            </t>
            <ul spacing="normal">
              <li>
                <t>what is the scope of FATT?</t>
              </li>
              <li>
                <t>what kind of drafts need FATT review and why?</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-res-authors">
      <name>Responsibilities of Authors</name>
      <t>This document proposes that the authors provide the following four items:</t>
      <section anchor="motivation-1">
        <name>Motivation</name>
        <t>The motivation of the work (i.e., the proposed extension of TLS) needs to primarily come from the authors.
The Verifier can ask questions to improve it, but he cannot just cook it up.</t>
      </section>
      <section anchor="threat-model">
        <name>Threat Model</name>
        <t>A threat model outlines the assumptions and potential weaknesses of the proposed protocol. The threat model could be the classical Dolev-Yao adversary.</t>
        <t>Moreover, this section should specify any keys in the system (e.g., long-term keys of server) in addition to the standard TLS key schedule. Theoretically, any key may be compromised (i.e., become available to the adversary). For readability, we propose defining each key clearly as in Section 4.1 of <xref target="ID-Crisis"/>. Alternatively, present as a table with the following entries for each key:</t>
        <ul spacing="normal">
          <li>
            <t>Name (or symbol) of the key</t>
          </li>
          <li>
            <t>Purpose of the key</t>
          </li>
          <li>
            <t>(optionally but perferably) Which software in the system has access to the key?</t>
          </li>
        </ul>
        <t>If more than one servers are involved, the keys for servers should be distinguished in an unambiguous way.</t>
      </section>
      <section anchor="informal-security-goals">
        <name>Informal Security Goals</name>
        <t>Knowing what you want is the first step toward achieving it. Hence, informal security goals such as integrity, authentication, freshness, etc. should be outlined in the Internet-Draft.
If the informal security goals are not spelled out in the Internet-Draft, it is safe to assume that the goals are still unclear to the authors.</t>
        <t>Examples:</t>
        <ul spacing="normal">
          <li>
            <t>Integrity of message X holds unless some key Y is leaked.</t>
          </li>
          <li>
            <t>Freshness of message X holds unless some key Y or some key Z is leaked.</t>
          </li>
          <li>
            <t>Server Authentication holds unless some key Y or some key Z is leaked.</t>
          </li>
        </ul>
        <t>See Section 5.1 of <xref target="ID-Crisis"/> for concrete examples.</t>
      </section>
      <section anchor="protocol-diagram">
        <name>Protocol Diagram</name>
        <t>A Protocol Diagram should clearly mention the initial knowledge of the protocol participants, e.g., which authentic public keys are known to the protocol participants at the start of the protocol. An example of a Protocol Diagram for <xref target="I-D.fossati-tls-attestation-08"/> is provided in Figure 5 in <xref target="ID-Crisis"/>.</t>
      </section>
    </section>
    <section anchor="document-structure">
      <name>Document Structure</name>
      <t>While the needs may differ for some drafts, we propose the following baseline template, with an example of <xref target="I-D.wang-tls-service-affinity"/>:</t>
      <t>The template is:</t>
      <ul spacing="normal">
        <li>
          <t>Easy for readers</t>
        </li>
        <li>
          <t>Easy for reviewers</t>
        </li>
        <li>
          <t>Easy for formal analysis</t>
        </li>
      </ul>
      <t>TODO: Currently it is almost a copy of the <eref target="https://mailarchive.ietf.org/arch/msg/tls/LfIHs1OVwDKWmDuCEx0p8wP-KPs/">guidance email</eref> to the authors. We will add details in next versions.</t>
      <section anchor="introduction-1">
        <name>Introduction</name>
        <ul spacing="normal">
          <li>
            <t>Problem statement: Say in general what the problem is.</t>
          </li>
          <li>
            <t>For <xref target="I-D.wang-tls-service-affinity"/>, we believe this
 should <em>not</em> include CATS. Anyone unfamiliar with CATS should be
 able to understand your problem.</t>
          </li>
        </ul>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <ul spacing="normal">
          <li>
            <t>Define any terms not defined in RFC8446bis or point to other drafts from where the definition is used.</t>
          </li>
        </ul>
      </section>
      <section anchor="motivation-and-design-rationale">
        <name>Motivation and design rationale</name>
        <ul spacing="normal">
          <li>
            <t>We really like how Russ motivates the problem statement in <xref target="I-D.ietf-tls-8773bis"/>. Use it as a sample.</t>
          </li>
          <li>
            <t>Here authors should address all the concerns from WG, including
 justification with compelling arguments and authentic references
 why authors think it should be done within TLS WG (and within handshake).</t>
          </li>
          <li>
            <t>For <xref target="I-D.wang-tls-service-affinity"/>, authors could put CATS here as a motivational use case.</t>
          </li>
        </ul>
      </section>
      <section anchor="proposed-solution-one-or-more-sections">
        <name>Proposed solution (one or more sections)</name>
        <ul spacing="normal">
          <li>
            <t>Protocol design with Protocol Diagram: we work on the formal analysis of TLS 1.3 exclusively. Please contact someone else if your draft relates to older versions.</t>
          </li>
        </ul>
      </section>
      <section anchor="security-considerations">
        <name>Security considerations</name>
        <section anchor="threat-model-1">
          <name>Threat model</name>
        </section>
        <section anchor="desired-security-goals">
          <name>Desired security goals</name>
          <t>As draft proceeds these desired security goals will become what the draft actually achieves.</t>
        </section>
        <section anchor="other-security-implicationsconsiderations">
          <name>Other security implications/considerations</name>
        </section>
      </section>
    </section>
    <section anchor="sec-res-verifier">
      <name>Responsibilities of Verifier</name>
      <t>When the authors declare the version as ready for formal analysis, the Verifier takes the above inputs, performs the formal analysis, and brings the results back to the authors and the WG. Based on the analysis, the verifier may propose updates to the Security Considerations section or other sections of the Internet-Draft.</t>
    </section>
    <section anchor="security-considerations-1">
      <name>Security Considerations</name>
      <t>The whole document is about improving security considerations.</t>
      <t>Like all security proofs, formal analysis is only as strong as its assumptions and model. The scope is typically limited, and the model does not necessarily capture real-world deployment complexity, implementation details, operational constraints, or misuse scenarios. Formal methods should be used as complementary and not as subtitute of other analysis methods.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="TLS-FATT" target="https://github.com/tlswg/tls-fatt">
          <front>
            <title>TLS FATT Process</title>
            <author>
              <organization>IETF TLS WG</organization>
            </author>
            <date year="2025" month="June"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="13" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-14"/>
        </reference>
        <reference anchor="I-D.fossati-tls-attestation-08">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Arto Niemi" initials="A." surname="Niemi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using attestation which is
   a process by which an entity produces evidence about itself that
   another party can use to appraise whether that entity is found in a
   secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enables the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-tls-attestation-08"/>
        </reference>
        <reference anchor="RFC4101">
          <front>
            <title>Writing Protocol Models</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author>
              <organization abbrev="IAB">Internet Architecture Board</organization>
            </author>
            <date month="June" year="2005"/>
            <abstract>
              <t>The IETF process depends on peer review. However, IETF documents are generally written to be useful for implementors, not reviewers. In particular, while great care is generally taken to provide a complete description of the state machines and bits on the wire, this level of detail tends to get in the way of initial understanding. This document describes an approach for providing protocol "models" that allow reviewers to quickly grasp the essence of a system. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4101"/>
          <seriesInfo name="DOI" value="10.17487/RFC4101"/>
        </reference>
        <reference anchor="ID-Crisis" target="https://www.researchgate.net/publication/398839141_Identity_Crisis_in_Confidential_Computing_Formal_Analysis_of_Attested_TLS">
          <front>
            <title>Identity Crisis in Confidential Computing: Formal Analysis of Attested TLS</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="M." surname="Moustafa">
              <organization/>
            </author>
            <author initials="T." surname="Aura">
              <organization/>
            </author>
            <date year="2025" month="November"/>
          </front>
        </reference>
        <reference anchor="I-D.irtf-cfrg-cryptography-specification">
          <front>
            <title>Guidelines for Writing Cryptography Specifications</title>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document provides guidelines and best practices for writing
   technical specifications for cryptography protocols and primitives,
   targeting the needs of implementers, researchers, and protocol
   designers.  It highlights the importance of technical specifications
   and discusses strategies for creating high-quality specifications
   that cater to the needs of each community, including guidance on
   representing mathematical operations, security definitions, and
   threat models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-cryptography-specification-02"/>
        </reference>
        <reference anchor="I-D.ietf-tls-8773bis">
          <front>
            <title>TLS 1.3 Extension for Using Certificates with an External Pre-Shared Key</title>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <date day="5" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies a TLS 1.3 extension that allows TLS clients
   and servers to authenticate with certificates and provide
   confidentiality based on encryption with a symmetric key from the
   usual key agreement algorithm and an external pre-shared key (PSK).
   This Standards Track RFC (once approved) obsoletes RFC 8773, which
   was an Experimental RFC.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-8773bis-13"/>
        </reference>
        <reference anchor="I-D.fossati-seat-early-attestation-00">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="9" month="January" year="2026"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using remote attestation
   which is a process by which an entity produces Evidence about itself
   that another party can use to appraise whether that entity is found
   in a secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enable the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation Evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and to use them mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-seat-early-attestation-00"/>
        </reference>
        <reference anchor="RFC8773bis">
          <front>
            <title>TLS 1.3 Extension for Certificate-Based Authentication with an External Pre-Shared Key</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>This document specifies a TLS 1.3 extension that allows a server to authenticate with a combination of a certificate and an external pre-shared key (PSK).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8773"/>
          <seriesInfo name="DOI" value="10.17487/RFC8773"/>
        </reference>
        <reference anchor="I-D.ietf-tls-mlkem">
          <front>
            <title>ML-KEM Post-Quantum Key Agreement for TLS 1.3</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <date day="12" month="February" year="2026"/>
            <abstract>
              <t>   This memo defines ML-KEM-512, ML-KEM-768, and ML-KEM-1024 as
   NamedGroups and and registers IANA values in the TLS Supported Groups
   registry for use in TLS 1.3 to achieve post-quantum (PQ) key
   establishment.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-mlkem-07"/>
        </reference>
        <reference anchor="I-D.wang-tls-service-affinity">
          <front>
            <title>Service Affinity Solution based on Transport Layer Security (TLS)</title>
            <author fullname="Wei Wang" initials="W." surname="Wang">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Aijun Wang" initials="A." surname="Wang">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Mohit Sahni" initials="M." surname="Sahni">
              <organization>Palo Alto Networks</organization>
            </author>
            <author fullname="Ketul Sheth" initials="K." surname="Sheth">
              <organization>Palo Alto Networks</organization>
            </author>
            <date day="8" month="April" year="2026"/>
            <abstract>
              <t>   This draft proposes a service affinity solution between client and
   server based on Transport Layer Security (TLS).  An extension to
   Transport Layer Security (TLS) 1.3 to enable session migration.  This
   mechanism is designed for network architectures, particularly for
   multi-homed servers that possess multiple network interfaces and IP
   addresses.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wang-tls-service-affinity-01"/>
        </reference>
      </references>
    </references>
    <?line 373?>

<section numbered="false" anchor="appendix">
      <name>Appendix</name>
      <section numbered="false" anchor="document-history">
        <name>Document History</name>
        <t>-03</t>
        <ul spacing="normal">
          <li>
            <t>Limitations of formal analysis in security considerations</t>
          </li>
          <li>
            <t>Proposed solutions section</t>
          </li>
          <li>
            <t>More guidance for authors: Threat Model and Informal Security Goals</t>
          </li>
        </ul>
        <t>-02</t>
        <ul spacing="normal">
          <li>
            <t>Added document structure</t>
          </li>
          <li>
            <t>FATT-bypass by Other TLS-related WGs</t>
          </li>
          <li>
            <t>FATT process not being followed</t>
          </li>
        </ul>
        <t>-01</t>
        <ul spacing="normal">
          <li>
            <t>Pain points of Verifier <xref target="sec-prot-diagram"/></t>
          </li>
          <li>
            <t>Small adjustment of phrasing</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We thankfully acknowledge Eric Rescorla and John Mattsson for their valuable input.</t>
      <t>The research work is funded by Deutsche Forschungsgemeinschaft.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA61c7XbbRpL9j6fooX9E0iEpy3YSj85sMrIl2YolW2tRo8n6
zPEBgSaJEb6CBkhzcjTPss+yT7a3qrobAEkl8dnNj5gEgf6oj1u3qgsajUZB
ndSpPlaDsy+1zk1S5EbVhZpc3qjzk8lEXVdFpI0ZBFFY63lRrY9Vks+KIIiL
KA8zPBlX4aweNSbMwlGdmtEsrOuRdqONnj4PTDPNEkPf6nWJJy7OJudKPVFh
agrMnOSxLjX+l9eDoRroOKmLKglT+nJx8gr/FBU+fZycD4K8yaa6Og5irOY4
iLBaTNOYY1VXjQ6Wx+p5EFY6xKg3OmqqpF4PglVR3c+roilxdVKFuSmLqlaX
4VpXqr1rqfMGQyr1+7cqJfsY3GHkJJ+rN/QIXc/CJMV1iOGvia5n46Ka0+Ww
iha4vKjr0hwfHtJddClZ6rG77ZAuHE6rYmX0IZ4/pOfmSb1opngyaxZhloWx
FbMJqzisDrelTQ+lEI2pu9PtengsY4+TYscwh7+t0/GiztJBEIRNvSigDDXC
tErNmjQVkxhc2SnVLQ2hbnjKAd+FvYZ58q+wxkDHanKrTittoHv+UVsBuiV/
5iWMZcl/rZtRLDePY43586LKMM6S1QaLHZHFHvNAyq/N/odpreGRad+9kR+s
8W9au/0xrOYagnRytBKLioxEtpp7wcntbJLqpybX6tnTZ98GAflJZ4EXo1PW
Ngu0mkUvX7z4bpoY99OsMAb38q8YEypkEY2evqQ7Pp6/fnH09IhvPh29rhIj
T/otDC7If2CeSn6El6rXRT5L+HKY4ktWNjWs9Vid07JSdZKH6ZpuLWbqhGfU
MYlC9CTbeV8sNXkcb2kY7BLLarUaQyuaDHiOh8a5rg/LZpomEe/g8PmfX758
/uejF0ef3Ro/yxo/J/nn7ho/+zV+liV+dkv8XMw+uyV+xhKDbRWPsGPgwNVY
3Y6twW39clU0EOss7P8wGauTpgqdiiqoKJpV81FUrcu6mFdhuViPTKmjZGa3
tKXOl99//3yHLiEUuE1Ypeu+Sp9alW485ofL0nuduaurMJ/zVaOrZRLpUTib
JTmkeBwEo9FIhVNTV2FUB8FkAWUCl5sM8lRhWaaJhnbzdE2QnmPmukqWZAy6
BXsoHwIdqtUiiRaq0r80SaXVTEwktPIfq4talVVRFgYj1gtthW+UyGWtQlwF
8NYqK2JND8bK2n+qjEVONS8A+WSZNILDUzJTAxOoWDiG7qYPQxUatdJpSv9m
BbyIf+eRQ1pLXURFquIkhIYyNygD1zi40xxc1LRK9AzbL8lASSZqpleqDHF3
WSR5zdun52qNMeKCwJy+bmzfCgfCXmk11RDrUtM3J61Kk0bss6VgCLRzQFur
oRr6ifAFV24R5yoYQh67+4sSUqUvLB3c8r7AgIg8iG1qVhWZMkXmBY7fb9IC
CydRa01D4xJwawkRslhEfCqcY5em5nlH03UZGqOma1VgyorBstIUKWJgoZER
aNWwkho7pOXMijQtVjoOxMyyJI5THQRP1EVeV0Xc8DTB3SJJNe/Dg6gVgPr1
V4fJDw+IjNU9Fq1gohTdIxUtYNea9BYiEuolTblI5gvVcTvchmXDN3MMSKuv
cUMNfUJ1ek4Gw+tkXWUa8om9da1saOZorvbu3uy7dQ35d9heRRbRW/ECpsbC
Lsmh4OypSpMsEbeFE7wBlGO9ikWHz1iJwdwpJLqxCgSJrCEnHVqDBXLpUqUA
AzYUTA8T6lj4UldrBXmrqOsNZJ4IgdMkJUexW9NfIMPOzr2V1kWR8va6MOC9
ljdmirSpHcnLwntRXU8IhjAyycNpqsdBcONwL03Xw916jgstdlM0dZrkMmQM
oDF2B9aaE7uNqa5XWuc9GCEh/QE/3KOLKWFppfAVpqzh7/gCD9RQaEzbCgWh
Bn/TFVauq8H+WG1AY5KxAKxsNkWzQqDHXhRiEcs5zB1gQmfTpkK4AqoqnbAv
lWFVryGpE1hGNZcJOKjiCQc8WBhZb2fD9QIOjIHhTLpCxBydEnLRgyuAIj2K
vfMTSVammkYFbowVkI3VZgBBFUQTFQ39MnJTi1AYfD7aoKytfFvM1CaZ53y5
skAJld/rRZESOJHKTAO868U88uc/Gh8fHsaY/4ycpbt6rBw2npDRFarxQMi7
9DGCHvBTTjWkAJnDrGJyNnAP1gie9wOrpKbZ7qCNLWO2ztDVS5RyQIYzLcM0
ick0tHKmwisUCCTldBY/3gyv1tjF1qKiEiNnVBdoa6EIY/bVLIJHEiF+5VQ+
Ds6tzjesAtvFghqjQbG9XWz4xqN+z5bmY6MyMO00JpghL8coDe0an5JaZxiF
GHy6ZgNqo+4Q3/oRnq48EuAZ8viBrSi99+uvuHdE10f22sPDPmR7hiAAn9I2
HsMnE0Ii5ABV8i9NXELJoxDzyPoQrEydN3UDUcIXPJsRMfBeVwnANcmjtIlJ
R3lU6ZrwMyS9Gkz7sYtMTJaEDnh7ID09toylvYmsPXjyBOzSiSs4ETODYIAO
HsmrzdlWrIqFTktF6a26Pb/6+Ia0DUKXbAOkm9C4cbUwO1jFjHaK+5NKFat8
ayYs8AqOBDJfDbscxtuG/lJicM1xNoLl85pg/uAV2yFCfIZ0rTjqtEbHeMVs
HuuM1TwsBU23hT+ETZioMWSfBMG0vwzKZH8AmxJUmIIzs//A0Fbg9CLom6go
dUBrMPSpVbpbRmJZ7/+J8hLVAX9b0m7oKVrhKRM9/h7wAu71mqgGIv7g6vZm
QiUL+le9/8CfP5795+3Fx7NT+nzz9uTy0n8I7B03bz/cXp62n9onX3+4ujp7
fyoP46rqXQoGVyc/D4RdDD5cTy4+vD+5HAjk9EJdpS18EGeqSlIC+IgJEASi
KpmKUb96ff0//330Asb9J6Qlz46O/gzKJl9eHn3/Al9WC53LbCxZ+QoVrQPk
GWTqRORgg1FYgi8xCBjCmlXOAQnSPPhEkvnHsfrLNCqPXvxgL9CGexedzHoX
WWbbV7YeFiHuuLRjGi/N3vUNSffXe/Jz77uTe+fiX35kCjQ6evnjDwFb67UD
wVMBvODXY/VkEwXVQxBc5DaWQFFf6i2rhkS3xnIh2oYhi/lxn0OTSxHb18sQ
BuGCExgqMEQYEwdgCsVwMeZ3HrhtzN8uWxD4ckCkkArn1qX1XQPCnMIe7LB+
xVecFzKA2mIGDfEWGYaAEucRnd/EzipNTFrncDArKcMA5liyv2qNHOgktQRB
CofjItueMHswz/TRuDX/NgkdB++RZAl0Jow1ZDKhypFZ2lurItUu+t+98bDJ
S2ohxNZdwuge3BEZdDZN5g1FUeRHcxBw4fiUAPKiusH3N0PvLjtJnICc4BgE
iOOEvIIxo5kPNpVmAVVMv4YKcQE0IZyLtUw5cQGSRImRj4VBqKF0YYtLOYbN
Fk3MpZ/egBTbOQ/vOPAhKIgcENyo7OueR+KefHH6cUsGQF9TnLz2qbzXt/cx
/D6yqT5c7NxLc1VQRKjA7gxl8ht2bgszgntA0I8UqO6FhJaSa8cMdxQ8pHCW
5EgXJErAPlf0FKVQtOa5ZkuBBosGCe4eR8RQfeLc0TrkP/Z+vzqcGa45Hn53
d//yWfHqTfzdUTV59+z56Xz28/T7V9nHd1eH+/s+fQnz9Y4U0W718XKj3/Tm
sxU8NUyx1WWTInsIPY3BiK4miYdJAuAfTSpSodzXshUlOiblcc0gISsqIKTM
llY80xI02y7TeNtaOba/IALAvkioEOZSi9HdSgwMpfVY3EUhkTg+JWCcfBtt
swrHhpwfLMIl3dpdCXOftU3XkcrAIPiulnthK4INZAxSboHh2JSmncNlz7nW
seGaAq2bsGnswgaXdK7bks7J7pLOh50lnY3vpAnKVJOoYXRm0iV6ptVU2maq
nqxKmZx3obIkLxhkRiNLp33xCqLeuzk7mSiqsGwIkOspMaA1J3dZIOnW6YwA
oyX6CBdfxMlzTl4xgSMFjDNSgvLFChe8LBD0QtVUrwtyPit7MFrkkQlVi9wo
gshQE4apJKe7IFZuv9KeXOrLEjPqIJxyWYDU3OThskhicuoDW9/kxML0aOZv
rHBIIMC749CG7cUkCClgAKa1pLPetEUDNsxyKlOSC1qaDW5V1aMoqSLEDKgW
DxG+km2M1cXMxR5fnGErJUlruWnEibjPk626CbMtpgnlx4wJAptNxO/eXL4e
M1Ph6YeKskcO/xUSSKp5/vvf/w7uoIJvLCMhp/FSDbeLR0QkbVGSrJY82FDa
DfmIgTuY4LudHRDtNtFCxw2ABMRGe8H/yCvgRNqmGsMNxHu0KM9VynuI6/HR
h2qKKHwve7Nm76yJbcJdI8sHcFgI3ZK3d/FHa66TDkT0Cqm0Xk2S/vX4lwbQ
8BD8oNTdguuS3QQojIuyU3fq10OZZy7CpLKGxULF80gOqoypB0AAqmG92Jup
WusJph3VT2iTKOPtZd1mjRTW7cBgRTMnFO+4PsAkhIa047Ba+zKHzDxWHY1K
ZQELCVOBHJCilgSTifU0aAciTCJuaIHYCbeoOFAWvpbnkKlfh/ar5QlJvVMt
RbqMaS/zMiIFxL9oQ//ygINRKYvlXN+GDImPHB3NvcNSEtZQMJmomZO5eI6R
Ta7dzTc3l+/Ofr788EaW4MaHKUl23td3V9dCHXcYhU84iNjRMW8QeHrOi/AH
mhCfGHgtUvCUyKLeHa+KAmyqae/Cosm0abZn3mzIjJ9Q5eRy9O7syle/pHiz
Qcn4TOzhQYj7J7shMIm8WEHuX0egLp9N734pJ89/efn2b9nJ69Xp0SR8/v48
yVZPDztRzGOU3avzzg3nuyWx1AgPFCaGXd+Kk1iYRp4XDUCyL19ViHmkCUS0
V9tkimrR+OzoiC3XTW2NMao7ZiXL22/1ZPH3gvyRanoGQUsKURwV4T4RxcPB
Y0MNFDGAJAU+MYp+mrR7mTUVu4gJ1/9/ot6QZGe6LIw3xTXVUdgY4SsZBe08
MVlb8WCjmSU1UR06BZCjlZhpVazKNIx8TtbjDeSxPkpan7MykRswJHgLpHzX
LZx1y8r+cU6ih2rO50RCb/I5ICgO69DGQo8f84JpquQEW6cwnJO0R8SUK78C
RjlwyqQqpbmQGye2QlVS3AQSMyIx1e+OYOtd1G6jKUnJ25Rku7rXCthJ0KXu
7XiDr5f2QApWzjEeF/dgrG4KYuuOjUQwNH/A4MVgj4JyW85IDPnU5sbHlpZ0
1dc5cYj6588Yejf0UOIQwKmaGZaREFFX/pzZjtulTJEUd4l20XELrz2H+wW2
rAqJ1sMOnZ4iZSOZ8Ilji6UUyipNdu8LBHy+7ficAG9nBjWDeqdARhU3lQsX
lO8SeTNtySUI06wwNKdj4zZpiWwlBxlJ2kOJpow5nZAOrW9MYMvuFi0Iyd9h
tbd829dSGLobWSuSaKdcFmbC5YWOPPoxq8szxL/Abw3HrlchERXYwyebzn0j
7UVfg17vzm9Pn59fR9Vt+lOW//1mPX1unn17ez6Ni8N9V7SSItCcyzMsRF6N
qJ8r2Xy8KPUbUjiT5mJK7RxyuLLt/S2gICmwNRcXfWgEUyYVHXsxjdxsMphs
jga2gfQkqk0/h+bSUtQ+7FcRJxQdUrEzArnOQYF/ug1MnSTNjtYOtdfjALIq
VpAQBH/EKPC97zHemkBLGogTwTv5XOr8kbN2Dp9cU+EqTEJhVJDaVlraQ3mb
/1KqFdPBvKcRLvWlIgEoba2dP1oQuZE8xomUebJjXuKTU3u2XTHZ7cos4KoQ
EwIsntuq7D5t9tWSR6cPE2aWDwX04wxJ4qac+RaWLIs0ph4hBAvOJ9w8wcY8
zsW5ZNU/8KrBGVoWTvW4mOrGITi4uPkBu6oHGYboSNPReJfPcL2I52jlR/0w
rAEL4kiYXbjnMoOBY0SsgSwxTbdRRo4TEgmcYYqRY6q7lKWmaOMzZjuYKyM5
IdLJh2Shg0lIv+ScjA1Ikv9ssFh3eSB52XaPzgfXo/OGe3S6tVKq32ydZ1tn
qcHut0pXUoXzR1ymmdYps7scP0YhHdm2dRkfFSkxnwGvxoGruoNvNhVLmDuI
WoTkgzk7q1tlW5QaWvtZJkJIpSrXobw2ChNBKYD1ufATKftKTindfWbhneI2
Tzk775fUhYFaK5iB8ls8Rl4WMYTL1qmEOAyswxiYS03yWIZpw6awVX1nI7zo
VrOGFmGLMomMNBhgdir5dRJ8UVRGVQxXut7ob3DY0y3LSn5oA6+WDgabLOMa
3GM2w7ohSUjikxxV1HQa9IPac9ygA6A2jrreo15DUqcDg3u7KDR3vY9kYwlH
KkADh1nwCY5TeMltWa6RakQ8kFCxv83xPtv4R9dhZmFS8FUq1klGjWeAFSqP
OQuKC0Yu2+bgbM2p+xujmKb5/plE+qR2DLpx9OI6LsqmMs120VnsOKlcZx+f
/7oGuCvbAMc2cb7xJEyenZvtoU3xIyTqwPylTouSyTvVNKlUG0DBFbd1+cBJ
ziz1WbF/XEeYN0Zav+wBtgWgwLrSHj+EDfHkVnp/2nceZI8EfOcRkVAd+N4j
a96gvj5wim2T+PohNwo71My2AhqOAXZhlidvn2sfuPpg57znN5qucI0qt0st
lrp262Drdp2VXbtmfrdj6o3FdSub3G/QswvKoeQIw0Uajo5UguXLlS6R9rC6
9IwS8G0PnHTA0G0VH7dbrqCQ8Zgdg2pyAqZeJYQ1YSw5lpg9Ka5NwJKcT3x9
Jg32XzSdNtaVL5v1KQ3XPpS8ZRAShqwDpSS4+la8VuGGekLsnXWnztI9flO9
qieoo/p0/fHJ0Xct4320hR2QnqaHR9/ti4dRVRNbb9K6bbrtVn+wWZeWc7P8
AfUHt6ultR0c3L05OGjdoY3PtsIC3pUZX2RkK2cW0ykH0tC2shiP1YkMIkcv
5BpDWmc7a5t1V9Qmyq2AjL2uFZZrS774wi7AneCWNlR6HlYc8t2iNtfTWcxG
MonQk7vs0R+195rqOALLoUvRdzh5eWIn7gnq+W93b4bqw0eib4JARAOrZNr4
nriaf+fowGcLG6PSTJ2aZHuzB+q1RP0eHU56N9q9ccNQTVEUG2t1sNC+S4fS
EspzkSJiCXYjHIQ7WbIYzw0wMJUwoFm9Uszx0Dsv6P/8GGXJq77so+5E8o4J
9eVRwLLcrH1+aLXMfMVKlYmU7klc3i+wp0m0pC69tHPDIOXcLqOKCkjIN3Ta
J7mKWMk3PAxTWwhrxjmV4q5DynQjsngSL3UD2EMCK5XxRorD41CgZJgE4hbp
0natumJ1KwNtOl1S9DsnhSznV1oIkDsbU/Iqg+If3cEZk5Husz/2b6FjcPrp
EY1asa1/JDTd1V93YhvZ3RF9p6OPjugnv9PF6G61pY+NNJHbGbmT8XizJ4+r
Wu17BFZwVE5Qe8lYj4eOAAv++34xmxHut+ZYVgmlC+yAmW5bNOzSNtog6EiL
8oCWH0n3KrfWkW+RSS/48NrThqgo7indaUrR5USaP7iHJjhRvVcteo2o1C6f
lW3DWlnU9v2flQ7vc2qP8Xbvt+pIv1T+eoNHXUiPUgzPXfGnBWBg9HNYUL4J
o0Oq2GsxlKTbHltbdPBviiB43+u1b481awN9qT09nkMHaUFvu+gqk3vo5FBX
GHOfD0t6YXijZ6l75sM7wWpq17huJ2Un4lo6yR9ZJnZvlT/VrMxwSUUhy9JY
om6D+xJfKfe0Dfm92B67d0A0tbLSXK7TOOSt3lhpvBgf2RJj2zMBKEmJk9iX
Cobt+yqEHTUvxye5rbFrQn8ttMrNygWS91QS2MNVs86mRbrvNI7f6VWPpuIV
9y7uFWw1nKuRQTJgVRQR9tUd141NMatXFLj6euOMPHKns3bAH/lknbEGjpvz
gb/oUchmki8JwuKhe0A24W5p40ksrzo0nG2yCeR0EM8JGbGsVbgWD7lwDVH+
tSJJ1d/lIiuGrnXR4Incw9wMcE5hWoN7FtRf2nkXJanH6i1ldo82W/mTOXkb
RV726B0yDqlgYxY5J3m6jsadnVm39Qy+z0rHgaXoj83tmljgVSmdO1LDz86R
hrY+acKZlrcjgBCdgl47HCQNJu5OjJz5O0wLPll/tuSaegCkFkY1i+GOmd1m
bT99v/NMSjhSsRLTY581bkEeeLpHso+W7CU+n1A9KE6+EJM/s33G7A8XTkFc
W6LSFpjN3xVRMzoiYzLA0ZTc9meuQgAtqbxxoM6dBv/Ys0XVfvuv/kg3bN0c
/zrn0F89UHCjtUeTb3egieuz2+p239WMerKjp9S+IWDhy2Y61hqFq/T4Ya9u
JFWZpISXkc0zpsu5k3cNJS+HituT4dFoHtN3jqSssfILIJtzAj1z3xpAqd72
lkgif6DvLTHtiQqc6Rwgg+V9K0dfXbwmbnPqOMpNXTURUcjOy3DCFSjaSIlI
4K1wxVzzeFqopnAneY1KY0egn0PB/rC3SdnNo++GPjwcywGMG0S6cw7UWWjE
7cgBNb9P2LlEBG7j4mYKEUw+nH44Vq8l16cXaeTUSA6TgAZFuXYa+gTgjunl
va8/ebmcXbw1Rx/+tjp9d5edNq/PvjwtX66uR++uzeH+JjhRNsZlBBAE6jWh
I2xSWk5dp+7dEBcnOi8vMqm9ti2IXLUghR6rm5BftpvrnN+xWnWqo3wrVVH4
2XNvV7+hiY03LhL7ernzswPg44F/S+X1yeSGDHpNIbPJZ2EGqhHahkf6sQ0h
dhhHVjoF6DWxYLtYSyC5/aZIi/laVn4qbZLEi4htyWlT56iXzk+l05vbcOXo
urA1NEv9mfi2teq47WzGU1Tt3XwvRs7a+e0zJdgdplrWc6fb84J7autcSdOt
Zextg3tfV9Y1d/bujtWt4dM5ZlGGXcfq7S2357pXmG05K6Y/LmC4vmpTKmpr
s9uk1Nuf1VrJE1Vvj6Ttey4ZBWQ+e/Fv5HHhyqMf95rzmzZ2GCRLndcCk5yZ
f4cCkSXYkqo9v9nrnG+BXsVmgdCw/3U26WaUQEvHrmxdrE0WWJsrwQWoLk5x
3keRfpEM9DHnRiumfJYomH3vYN33DkVQmxB9zF3TlIzZULOjIEK7Pxo/BwxC
D1KEHatrKgVpfyJGGEtr0anh8zd2BSknSDcs01Qps/eR4WY3uZBz7UknKZIr
p9gMcZk+LwuCE9eKwkU8zhiZ1sQ77xfYsrmHxxkZwJ/SCSm1IfyJ7ffd+cLk
4dbad6bgW23y3dfZKAnnfsJuth1r6r/QrgDHeXGPxe14G7GTA9fcV8kDTjnt
5Wb5IWcZBaHPDo3LuwzTisvaXNXjpjmjuBjcjwD+/WHql/UH/3xDb0HLXe8m
SFuDT19+5+8SkJUXTgO+Y2QXg98uRydGznVsF6CQBGYFSPip9NhBkm5848r0
I+uSML9a0Csnvf7PKacEXGfgw7bd5o1lXvIBSdpJMfBMMYPINn3QvVdHr3Yh
jBLI0ams2So7sJ9IOUFKSZRw+ddd7Ynw0GtNag2+6cEdP3OFJSy5OkfBYQR8
SCmAlGmx5n0S3Kb6C6de/mVdEaKlAUNFHc8Oxmjv/G4lGR/BVWL4xC/SOaYr
zGbhrQPDfHoZGjslz1Otlatuk0SaaZ3UjZx8iIV4wdnhuGFDXZy8P9mhxG7Z
y7YP851h5BTFf4eBrJ9GcckOfLjJ5c8i6fhBXjFyw7zlP7aw3ryF/iYTKN5l
+6cNdh3WUJvJI5B4sOOYxLkDfqQ6kPLUj3M8MeTjXiGLhfdY3o5FPqNFnsRE
xr1gjOfaB3/sNYiDfivMrlbr0dMjmum6/7qJx65dryxTNieNJjGRgMy2F5SL
KjR8IAn9+NZUJgHQgdPAfwxm2KEePFB7DZVH7ukvJ627zazqjP5EBqA7gsWH
LKifikWurpCyGNc9I+eidFDOFJAxdSxw4P4ej0RUOnlr+B0MiOlUA3kjasaB
QqJFA3Sdw5yTHF8Ytv4XTMKk4RVMAAA=

-->

</rfc>
