<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-santesson-one-signature-certs-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="OSC">One Signature Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-santesson-one-signature-certs-01"/>
    <author initials="S." surname="Santesson" fullname="Stefan Santesson">
      <organization abbrev="IDsec Solutions">IDsec Solutions AB</organization>
      <address>
        <postal>
          <street>Forskningsbyn Ideon</street>
          <city>Lund</city>
          <code>223 70</code>
          <country>SE</country>
        </postal>
        <email>sts@aaa-sec.com</email>
      </address>
    </author>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <city>Herndon, VA</city>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="26"/>
    <area>Security</area>
    <workgroup>LAMPS</workgroup>
    <keyword>certificate</keyword>
    <keyword>signature</keyword>
    <keyword>X.509</keyword>
    <abstract>
      <?line 110?>

<t>This document defines a profile for certificates that are issued for validation of the digital signature produced by a single signing operation. Each certificate is created at the time of signing and bound to the signed content. The associated signing key is generated, used to produce a single digital signature, and then immediately destroyed. The certificate never expires and is never revoked, which simplifies long-term validation.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-santesson-one-signature-certs/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/Razumain/one-signature-certs"/>.</t>
    </note>
  </front>
  <middle>
    <?line 114?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The landscape of server-based signing services has changed over the decades. Recently, one type of signature service has gained favor, where the signing private key and the signing certificate are created for each digital signature, rather than re-using a static key and certificate over an extended time period.</t>
      <t>Some reasons why this type of signature services has been successful are:</t>
      <ul spacing="normal">
        <li>
          <t>The certificate will always have a predictable validity time from the time of signing;</t>
        </li>
        <li>
          <t>The time of signing is guaranteed by the certificate issue date;</t>
        </li>
        <li>
          <t>The identity information in the certificate can be adapted to the signing context;</t>
        </li>
        <li>
          <t>Revocation of signing certificates is practically non-existent despite many years of operation and millions of signatures; and</t>
        </li>
        <li>
          <t>The signature service holds no pre-stored user keys or certificates.</t>
        </li>
      </ul>
      <t>While this type of signature service solves many problems, it still suffers from the complexity caused by expiring signing certificates. One solution to this problem is the Signature Validation Token (SVT) <xref target="RFC9321"/>, where future validation can rely on a previous successful validation rather than validation based on aging data.</t>
      <t>This document takes this one step further and allows validation at any time in the future as long as trust in the CA certificate can be established.</t>
      <section anchor="basic-features">
        <name>Basic features</name>
        <t>One signature certificates have the following common characteristics:</t>
        <ul spacing="normal">
          <li>
            <t>They never expire;</t>
          </li>
          <li>
            <t>They are never revoked;</t>
          </li>
          <li>
            <t>They are bound to a specific document content; and</t>
          </li>
          <li>
            <t>They assert that the corresponding private key was destroyed immediately after signing.</t>
          </li>
        </ul>
        <section anchor="revocation">
          <name>Revocation</name>
          <t>Traditional certificates that are re-used over time have many legitimate reasons for revocation, such as if the private key is lost or compromised. This can lead to large volumes of revocation data.</t>
          <t>The fact that the same key is used many times exposes the key for the risks of loss, unauthorized usage, or theft. When many objects are signed with the same private key, the risk of exposure and the number of affected signed documents upon revocation increases, unless properly timestamped and properly verified.</t>
          <t>When a signing key is used only once, that risk of exposure is greatly reduced, and it has been shown that most usages of dedicated private keys and certificates no longer require revocation.</t>
          <t>The CA can readily attest that a certain procedure was followed when the certificate was issued. As a matter of policy, the certificate itself is an attestation that the CP and CPS <xref target="RFC3647"/> were followed successfully when the signature was created. Certificates issued according to this profile therefore only attest to the validity at the time of issuance and signing, rather than a retroactive state at the time of validation. This profile is intended for those applications where this declaration of validity is relevant and useful.</t>
          <t>Applications that require traditional revocation checking that provides the state at the time of validation <bcp14>MUST NOT</bcp14> use this profile.</t>
          <t>An example usage where this is useful is in services where the signed document is stored as an internal evidence record, such as when a Tax agency allows citizens to sign their tax declarations. This record is then pulled out and used only in case of a dispute where the identified signer challenges the signature. A revocation service is less likely to contribute to this process. If the challenge is successful, the signed document will be removed without affecting any other signed documents in the archive.</t>
        </section>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="certificate-content">
      <name>Certificate content</name>
      <t>Conforming certificates <bcp14>SHALL</bcp14> meet all requirements of this section.</t>
      <t>Certificates <bcp14>MUST</bcp14> indicate that a certificate has no well-defined expiration date by setting the notAfter field to the GeneralizedTime value 99991231235959Z, as defined in <xref target="RFC5280"/>.</t>
      <t>Certificates <bcp14>MUST</bcp14> include the id-ce-noRevAvail extension in compliance with <xref target="RFC9608"/>, indicating that this certificate is not supported by any revocation mechanism.</t>
      <t>Certificates <bcp14>MUST</bcp14> include the signedDocumentBinding extension, binding the certificate to a specific signed content.</t>
      <section anchor="the-signeddocumentbinding-extension">
        <name>The signedDocumentBinding extension</name>
        <t>The signedDocumentBinding extension binds a certificate to a specific signed content. When present, conforming CAs <bcp14>SHOULD</bcp14> mark this extension as non-critical.</t>
        <artwork><![CDATA[
name           id-pe-signedDocumentBinding
OID            { id-pe TBD }
syntax         SignedDocumentBinding
criticality    SHOULD be FALSE

SignedDocumentBinding ::= SEQUENCE {
dataTbsHash     OCTET STRING,
hashAlg         DigestAlgorithmIdentifier,
bindingType     UTF8String OPTIONAL }
]]></artwork>
        <t>The dataTbsHash field <bcp14>MUST</bcp14> contain a hash of the data to be signed.</t>
        <t>The hashAlg field <bcp14>MUST</bcp14> contain the AlgorithmIdentifier of the hash algorithm used to generate the dataTbsHash value.</t>
        <t>The bindingType field <bcp14>MAY</bcp14> contain an identifier that specifies how the data to be signed is derived from the digital object to be signed.</t>
        <t>Adding this extension to a certificate is a statement by the CA that the signing key is generated exclusively for the purpose of signing the document bound by this extension, and that the signing key is destroyed after signing. The details for this procedure and how the destruction of the signing key is assured <bcp14>SHOULD</bcp14> be outlined in the certificate policy <xref target="RFC3647"/> of the issued certificate.</t>
      </section>
      <section anchor="defined-bindingtype-identifiers">
        <name>Defined bindingType identifiers</name>
        <t>The bindingType field defines how the data to be signed (dataTbsHash) is derived from the signed document.
This field identifies a deterministic procedure for selecting the portion of the signed content that is included in the hash computation.
When the field is omitted, the rules for the default binding type apply.</t>
        <t>The purpose of the dataTbsHash value is to bind the certificate to the document being signed in order to prevent re-use of the signing key for multiple signed documents. This enforces the contract that the signing key is used only once for creation of one signature only. Validators <bcp14>SHOULD</bcp14> verify that the signed document matches the certificate’s binding information.
This verification is not required for the signature to validate successfully but provides an additional safeguard against misuse or substitution of certificates.</t>
        <t>This document defines a set of bindingType identifiers. Additional bindingType identifiers <bcp14>MAY</bcp14> be defined by future specifications.</t>
        <section anchor="default-binding">
          <name>Default Binding</name>
          <t>When the bindingType is absent, the default binding applies.
In this case, the dataTbsHash value is the hash of the exact data that is hashed and signed by the signature format in use.</t>
          <t>Examples include:
- For XML Signatures <xref target="XMLDSIG11"/>, the hash of the SignedInfo element.
- For CMS Signatures <xref target="RFC5652"/>, the DER-encoded SignedAttributes structure.
- For other formats, the data structure input directly to the signature algorithm.</t>
          <t>This bindingType <bcp14>MUST NOT</bcp14> be used when the data to be signed includes either the signer certificate itself or a hash of the signer certificate. This includes JWS and COSE signed documents that can include signer certificates in the protected header. JWS signatures <xref target="RFC7515"/> <bcp14>MUST</bcp14> use the "jws" bindingType and COSE signatures <xref target="RFC8152"/> <bcp14>MUST</bcp14> use the "cose" binding type.</t>
        </section>
        <section anchor="cades-binding">
          <name>CAdES Binding</name>
          <t>Identifier: "cades"</t>
          <t>For CMS <xref target="RFC5652"/> or ETSI CAdES <xref target="CADES"/> signatures incorporating SigningCertificate or SigningCertificateV2 attributes <xref target="RFC5035"/> in signedAttrs,
the dataTbsHash value is computed over the DER encoding of SignerInfo excluding any instances of SigningCertificate or SigningCertificateV2 attributes from the SignedAttributes set.</t>
          <t>This bindingType also applies to PDF <xref target="ISOPDF2"/> and ETSI PAdES <xref target="PADES"/> signed documents when applicable due to its use of CMS for signing.</t>
        </section>
        <section anchor="xades-binding">
          <name>XAdES Binding</name>
          <t>Identifier: "xades"</t>
          <t>For ETSI XML Advanced Electronic Signatures <xref target="XADES"/>, the dataTbsHash value is computed over the canonicalized SignedInfo element,
with any Reference elements whose Type attribute equals "http://uri.etsi.org/01903#SignedProperties" removed prior to hashing.
This ensures that the SignedProperties element, which may contain references to the signing certificate, does not create a circular dependency. Extraction of the Reference element <bcp14>MUST</bcp14> be done by removing only the characters from the leading &lt;Reference&gt; tag up to and including the ending &lt;/Reference&gt; tag, preserving all other bytes of SignedInfo unchanged, including any white space or line feeds.</t>
          <t>Note: This operation is purely textual and does not require XML parsing beyond locating the tag boundaries.</t>
        </section>
        <section anchor="jws-binding">
          <name>JWS Binding</name>
          <t>Identifier: "jws"</t>
          <t>For JSON Web Signatures (JWS) <xref target="RFC7515"/>, the dataTbsHash value is computed over the payload only.
The protected header and any unprotected header parameters <bcp14>MUST NOT</bcp14> be included in the hash calculation.</t>
          <t>This exclusion avoids circular dependencies where certificate data may appear in the protected header.</t>
        </section>
        <section anchor="cose-binding">
          <name>COSE Binding</name>
          <t>Identifier: "cose"</t>
          <t>For COSE signatures <xref target="RFC8152"/>, the dataTbsHash value is computed over the payload only.
The protected header and any unprotected header parameters <bcp14>MUST NOT</bcp14> be included in the hash calculation.</t>
          <t>This exclusion avoids circular dependencies where certificate data may appear in the protected header.</t>
        </section>
      </section>
    </section>
    <section anchor="asn1-module">
      <name>ASN.1 Module</name>
      <sourcecode markers="true"><![CDATA[
   SignedDocumentBindingExtn
     { iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) id-mod(0)
       id-mod-signedDocumentBinding(TBD) }

   DEFINITIONS IMPLICIT TAGS ::=
   BEGIN

   IMPORTS
     EXTENSION, id-pkix, id-pe
     FROM PKIX-CommonTypes-2009  -- RFC 5912
       { iso(1) identified-organization(3) dod(6) internet(1)
         security(5) mechanisms(5) pkix(7) id-mod(0)
         id-mod-pkixCommon-02(57) }

     DigestAlgorithmIdentifier
     FROM CryptographicMessageSyntax-2010 -- RFC 6268
       { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
         pkcs-9(9) smime(16) modules(0) id-mod-cms-2009(58) } ;

   -- signedDocumentBinding Certificate Extension

   ext-SignedDocumentBinding EXTENSION ::= {
     SYNTAX SignedDocumentBinding
     IDENTIFIED BY id-pe-signedDocumentBinding }

   SignedDocumentBinding ::= SEQUENCE {
     dataTbsHash     OCTET STRING,
     hashAlg         DigestAlgorithmIdentifier,
     bindingType     UTF8String OPTIONAL }

   -- signedDocumentBinding Certificate Extension OID

   id-pe-signedDocumentBinding OBJECT IDENTIFIER ::= { id-pe TBD }

   END
 ]]></sourcecode>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="certificates-without-revocation">
        <name>Certificates Without Revocation</name>
        <t>Certificates conforming to this profile include the id-ce-noRevAvail extension and therefore do not provide any revocation mechanism. Such certificates attest only to the state of trust and correctness of procedures at the time of issuance.</t>
        <t>The Security considerations in <xref target="RFC9608"/> also applies to this document.</t>
      </section>
      <section anchor="signed-document-binding">
        <name>Signed Document Binding</name>
        <t>The signedDocumentBinding extension binds the certificate to specific signed content by including a hash of the data to be signed. Verification of this binding is not required for successful cryptographic validation of the signature. A signature can therefore validate correctly even if the binding is not checked.</t>
        <t>However, a relying party <bcp14>SHOULD</bcp14> verify that the signed content matches the dataTbsHash value in the signedDocumentBinding extension. Performing this check ensures that the certificate is used only with the content for which it was issued and enforces the intended scope of the certificate.</t>
        <t>The security model of this profile states that the associated private key is generated for, and used in, exactly one signing operation and is then destroyed. This property holds independently of whether the binding is verified by the relying party. Nevertheless, failure to verify the binding weakens the protections provided by this profile and increases the risk of certificate substitution or unintended certificate reuse.</t>
        <t>When verified, the signedDocumentBinding extension provides an additional safeguard against the use of the certificate for any signature other than the one for which it was issued.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="registry-for-signeddocumentbinding-bindingtype-identifiers">
        <name>Registry for signedDocumentBinding bindingType Identifiers</name>
        <t>IANA is requested to create a new registry entitled: “Signed Document Binding Type Identifiers”</t>
        <t>This registry shall contain identifiers used in the bindingType field of the signedDocumentBinding certificate extension defined in this document.</t>
        <section anchor="registry-contents">
          <name>Registry Contents</name>
          <t>Each registry entry shall contain the following fields:</t>
          <ul spacing="normal">
            <li>
              <t>Identifier: A UTF-8 string identifying the binding type.</t>
            </li>
            <li>
              <t>Description: A brief description of how the dataTbsHash value is computed.</t>
            </li>
            <li>
              <t>Reference: A reference to the document that defines the binding type.</t>
            </li>
          </ul>
        </section>
        <section anchor="registration-policy">
          <name>Registration Policy</name>
          <t>The registration policy for this registry is Specification Required as defined in <xref target="RFC8174"/>.</t>
          <t>The designated expert(s) <bcp14>SHALL</bcp14> ensure that:</t>
          <ul spacing="normal">
            <li>
              <t>The binding type definition clearly specifies a deterministic and unambiguous procedure for computing the dataTbsHash value.</t>
            </li>
            <li>
              <t>The specification explains how circular dependencies with certificate inclusion are avoided, where applicable.</t>
            </li>
            <li>
              <t>The identifier is unique within the registry.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents">
          <name>Initial Registry Contents</name>
          <t>IANA is requested to populate the registry with the following initial values:</t>
          <ul spacing="normal">
            <li>
              <t>Identifier: (absent)</t>
            </li>
            <li>
              <t>Description: Default binding as defined in this document</t>
            </li>
            <li>
              <t>Reference: This document</t>
            </li>
            <li>
              <t>Identifier: cades</t>
            </li>
            <li>
              <t>Description: CMS/CAdES binding excluding SigningCertificate attributes</t>
            </li>
            <li>
              <t>Reference: This document</t>
            </li>
            <li>
              <t>Identifier: xades</t>
            </li>
            <li>
              <t>Description: XAdES binding excluding SignedProperties reference</t>
            </li>
            <li>
              <t>Reference: This document</t>
            </li>
            <li>
              <t>Identifier: jws</t>
            </li>
            <li>
              <t>Description: JWS payload-only binding</t>
            </li>
            <li>
              <t>Reference: This document</t>
            </li>
            <li>
              <t>Identifier: cose</t>
            </li>
            <li>
              <t>Description: COSE payload-only binding</t>
            </li>
            <li>
              <t>Reference: This document</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3647">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework</title>
            <author fullname="S. Chokhani" initials="S." surname="Chokhani"/>
            <author fullname="W. Ford" initials="W." surname="Ford"/>
            <author fullname="R. Sabett" initials="R." surname="Sabett"/>
            <author fullname="C. Merrill" initials="C." surname="Merrill"/>
            <author fullname="S. Wu" initials="S." surname="Wu"/>
            <date month="November" year="2003"/>
            <abstract>
              <t>This document presents a framework to assist the writers of certificate policies or certification practice statements for participants within public key infrastructures, such as certification authorities, policy authorities, and communities of interest that wish to rely on certificates. In particular, the framework provides a comprehensive list of topics that potentially (at the writer's discretion) need to be covered in a certificate policy or a certification practice statement. This document supersedes RFC 2527.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3647"/>
          <seriesInfo name="DOI" value="10.17487/RFC3647"/>
        </reference>
        <reference anchor="RFC5035">
          <front>
            <title>Enhanced Security Services (ESS) Update: Adding CertID Algorithm Agility</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>In the original Enhanced Security Services for S/MIME document (RFC 2634), a structure for cryptographically linking the certificate to be used in validation with the signature was introduced; this structure was hardwired to use SHA-1. This document allows for the structure to have algorithm agility and defines a new attribute for this purpose. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5035"/>
          <seriesInfo name="DOI" value="10.17487/RFC5035"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC8152">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8152"/>
          <seriesInfo name="DOI" value="10.17487/RFC8152"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9608">
          <front>
            <title>No Revocation Available for X.509 Public Key Certificates</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="T. Okubo" initials="T." surname="Okubo"/>
            <author fullname="J. Mandel" initials="J." surname="Mandel"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>X.509v3 public key certificates are profiled in RFC 5280. Short-lived certificates are seeing greater use in the Internet. The Certification Authority (CA) that issues these short-lived certificates do not publish revocation information because the certificate lifespan that is shorter than the time needed to detect, report, and distribute revocation information. Some long-lived X.509v3 public key certificates never expire, and they are never revoked. This specification defines the noRevAvail certificate extension so that a relying party can readily determine that the CA does not publish revocation information for the certificate, and it updates the certification path validation algorithm defined in RFC 5280 so that revocation checking is skipped when the noRevAvail certificate extension is present.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9608"/>
          <seriesInfo name="DOI" value="10.17487/RFC9608"/>
        </reference>
        <reference anchor="XMLDSIG11">
          <front>
            <title>XML Signature Syntax and Processing Version 1.1</title>
            <author initials="D." surname="Eastlake" fullname="Donald Eastlake">
              <organization/>
            </author>
            <author initials="J." surname="Reagle" fullname="Joseph Reagle">
              <organization/>
            </author>
            <author initials="D." surname="Solo" fullname="David Solo">
              <organization/>
            </author>
            <author initials="F." surname="Hirsch" fullname="Frederick Hirsch">
              <organization/>
            </author>
            <author initials="M." surname="Nystrom" fullname="Magnus Nystrom">
              <organization/>
            </author>
            <author initials="T." surname="Roessler" fullname="Thomas Roessler">
              <organization/>
            </author>
            <author initials="K." surname="Yiu" fullname="Kelvin Yiu">
              <organization/>
            </author>
            <date year="2013" month="April" day="11"/>
          </front>
          <seriesInfo name="W3C" value="Proposed Recommendation"/>
        </reference>
        <reference anchor="ISOPDF2">
          <front>
            <title>Document management -- Portable document format -- Part 2: PDF 2.0</title>
            <author>
              <organization>ISO</organization>
            </author>
            <date year="2017" month="July"/>
          </front>
          <seriesInfo name="ISO" value="32000-2"/>
        </reference>
        <reference anchor="XADES">
          <front>
            <title>Electronic Signatures and Infrastructures (ESI); XAdES digital signatures; Part 1: Building blocks and XAdES baseline signatures</title>
            <author>
              <organization>ETSI</organization>
            </author>
            <date year="2024" month="July"/>
          </front>
          <seriesInfo name="ETSI" value="EN 319 132-1 v1.3.1"/>
        </reference>
        <reference anchor="PADES">
          <front>
            <title>Electronic Signatures and Infrastructures (ESI); PAdES digital signatures; Part 1: Building blocks and PAdES baseline signatures</title>
            <author>
              <organization>ETSI</organization>
            </author>
            <date year="2024" month="January"/>
          </front>
          <seriesInfo name="ETSI" value="EN 319 142-1 v1.2.1"/>
        </reference>
        <reference anchor="CADES">
          <front>
            <title>Electronic Signatures and Infrastructures (ESI); CAdES digital signatures; Part 1: Building blocks and CAdES baseline signatures</title>
            <author>
              <organization>ETSI</organization>
            </author>
            <date year="2021" month="October"/>
          </front>
          <seriesInfo name="ETSI" value="EN 319 122-1 v1.2.1"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9321">
          <front>
            <title>Signature Validation Token</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="October" year="2022"/>
            <abstract>
              <t>Electronic signatures have a limited lifespan with respect to the time period that they can be validated and determined to be authentic. The Signature Validation Token (SVT) defined in this specification provides evidence that asserts the validity of an electronic signature. The SVT is provided by a trusted authority, which asserts that a particular signature was successfully validated according to defined procedures at a certain time. Any future validation of that electronic signature can be satisfied by validating the SVT without any need to also validate the original electronic signature or the associated digital certificates. The SVT supports electronic signatures in Cryptographic Message Syntax (CMS), XML, PDF, and JSON documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9321"/>
          <seriesInfo name="DOI" value="10.17487/RFC9321"/>
        </reference>
      </references>
    </references>
    <?line 381?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+076ZLbRnr/+RQdqmprJkVSJEfXjLzepUiORVtzZEjrSCo/
mkCThAcEuGhgRrRKVX6NVCVVeZY8ip8k39HdaIDkSHL8M1O7Foi+vvvqD+12
u5FHeazORPMqUWIaLROZF5kSQ5Xl0SIKZK50syHn80zd4aTpsNmINhk85lmh
8363e9rtNxs4b5lm2zOh87DRCNMgkWvYNczkIm9rmcA2Ok3aaaLa2h7SDuAQ
3e72GrqYryOtozTJtxtYNhnPzoV4JGSsUzgqSkK1UfCfJG+2RFOFUZ5mkYzx
x2TwCv5JM3i6mZ03GyFAcib63f6zdrff7j9rBGmiVaILfSYAZNUANE4aMlPy
TExVUGRRvm3cL8/Em8HF9bRxq7b3aRaeNURbBCUN8KeDG3+87zztnjbuVFIo
mCuWUb4q5gDqjfy1WMsoebwH02ajIYt8lWa4og3/FyJKAKxpR0wthegt026a
q4VMakNpBqBORloFYprGRQ4k02LwisYsl2rDNKbzTKn8TJynmb5NomSp59tE
TEJl9g2ADECDIgn5ZxqiTPT7J+J5t2leFUmOHJ6O6bcCNGPkt/67lLINR3aC
dO0wYxxuCq3F67TQsdqWCN90Ku8Ip7fRMoodR1rizZthBanquAfza5UlYZq0
xNtBFc6fpz6cKz7w73e4jwW2kaTZWubRHTHx5nzY7/VOzePJsyfPzePT7slT
+9h/0bWPz572zePzpz074UXPvX3Re/7EPJ4+677Ax/cXb0bTyQ+93hnBZnUP
Xnu6N90mufwoZBKK6ywNgPnAL/FWZaggotfpMUNKWcK/tvnXkHjUEWOp81je
KjfALBmliYzD+mht+Y8dcaPkMq4v/jHVarOqju2eDKKX1k+Vd1HoD9RWnYNI
RJkOVrV155kKVRYFt9Xh2uqLjrjcgoiT/PnLL+QyKXRtsLZ4BrimQORYZbXV
s1W6lro+Wlv+U0d8iIrayp9UfBclbsAapd5Ju/uk3euxSgJeCli7SC0Pm+9O
hk0QB+D6BggdAp1BStdg+SRqMrJ9Mr26Hp33q+IzSoMCZuViLRO5VPTYbovr
NMvlPFYitOMLEncak1ku+mcCNhP9TnefRLGpmV5VMXje7j4/BD5MRvBPwCt0
233c8/1gNJ5WgR3HKgBmJFFQirwmYZ8kiwykMisCfnc0nk6OX8Ie4XgqQtDb
XMalFdYvGYnemXhVRHGIOjKP0+CWN+NVc6lVHIFnK5cdRHU8m04quPafPIAr
zkZkx5fipHcqeif9dk/c9TonrJ7XfwLi138I8es/B/GDMlpH/IlBvM+ID/8E
xId/CPHhn4B4r93rfi3ifR/xBk6t+pLTkz6Y+UYbtE3OAUkZ5I3GbBXpUh9D
tQBQAXyxydJFBKoKm/hxhxb5ChQWwhUB8VEBJgEn3Mk4YpMg0gXMULu0wg3D
IoAF8y1sjx4kZpog1dKNymg9eolg5Z8I54gAoqMclsLJuHkerRUeZFcjsefg
ZUORpzQBB2A6RFo5YNUBu6mEhJAliGgbuw5iK9x9qRI8XYUtUaCRg00MsCWg
O/i06FQ4LBERWMQQd463QEA07FsV8qE+Hom6U5lQHzeRlTY4m19CQJHe4vn3
qwiw19F6E8MymBanybKdq2zt0bjDPFxHYQg+r/EIpDYneHEQOapEDNvrQG6Y
TCqDQ9ooiCXu+DICVy5W4FCClUyWMJgiMMQ+FUhABZ1uABSMIf6B+FFgMGwJ
z1w129AuSwgzUSDkXZohKgrGLTfwyE0W3SEhkOyGeG7MJxQKl+U4SpdCidjD
AODZiuCFoBRC2oKiEuBYDlQK3Cn+zoQfzFYfc4zeQ5YkkL0oDYGq0xR+wcEa
Y9j71Ra2BhYdRJppN1cgAroIMCxaFDFCj0q2w/77KIbB+F5ucd2dIh0DuQnY
JRJ7IX5kkBYQHOwT9Zdm47oGoBQXMsPInDUsr51OykpmxW4RYfaCBzpDAdoL
IUJ9ZQD0mgO0odzkqqJhxDdUsY85bnoDQhw4I7CHsRrB3KDZgZ8xKEsCCZj6
GOmcTY/eRHAehAxbsVUy07iNMwzEyzXQkBIMnx1ghWHMYLVHMtM4BD1DnYYE
CPI0QALUPEMB0aJm3UAI3q3Q7D3MeaHT+A7wIVjBVgAD17olohyED9msi8UC
ouOSjRA1bWJAFcgdSDIywCMyBaSLe2jVEZj/apMzMdmJfHQYUhL3LWP0t6UJ
noEtScTR9O3sWHz6ZAz/589WJRcFLfBsdkAKBAxBMiOd7iJITnyh9ib7Wue9
ZuuCGywRFXgrO3XvkkN4rxkPtCbA9w1Ak9F+yF4QivRe+7uiq0mMThjZNOBL
to34LyX+dng42Ce9YJVByyK9Uqjnjx6JV1KDjVgolqBG48p30FWhJWWlk1OE
j6V+vUa6rSRKM5gPYHugrdpvK6b+pX2JZq1i7isjzn+BAduoAE8vCWccmSfo
W/RnACW7YxaxDDDZpElYt7X3QCPnlyreSi4AeCt+RJhHnhoD+zIJNinCBO1A
EEB213kOZBORixQjVmCyozWCYY0qmvPMHdBCEVshCyOOGnyoI2Qw8BU1FLQH
NCnS7FYxIAC2xkoSwWKZLUGcQVPWiixDeUAphsA94FRJLQ1ZkT2GEFhbOdPI
N0h2WMFwCgKNz8DmWzoA4AJtLxKO4KJfyaJAnkNlH5i5gJDjHUYGtGk6/wXC
TU3kMoHJfZSvSjA8rFvuIDyHACFhN94yKdZzoDMMSTAwgY1l4B8rKoDNBpW0
JEGUoC8FfBDiGPQZbQhY1digm8v1BkMrOMINADMx/AjJHKqEwqBKyMQ8T8hk
BKrFdN0BG70S+nGYBlYXgz+OmsBOlp5zld4nvH6N7CZCEpVDdI4UBHgE0nWf
TqYdLQHp1T+KiITSYm94j0aBbByIM4p9DuuMMEjaDCIXxB4gRLhRYVjZkVdI
gLpTxBkc/3bEAMPlNe5JnNmkcRQYRlY8cA55wAJpIhMDATPIyeTwmtOG6ymb
bSz4fP4s7sloW3BKowyIONhK04WQmeCpUyma2nhdBmApyEZ4PmXBPg9OAmFX
zFlLJXb4Lj6pxeC4q0wCllEjJdXQTALdwfag279TFJ2p+iZebMv6bUGCxygx
sRqrIWimkBsIj5nB2sWZ6GhUAMbAhSAOZBgC96buIDwiMEF6gX4gGwN/I5Zh
I0K5Z/k8ZQpWKrgl2uFkgPIOwii2FF9ATFz8PJ2Jy6sZnl6hO8KBIanEEIHl
30eKtQ2dMBGjDD6rAbZnA3CiCXQkSRuSMENMFIKLzMoUCkFpf+9Zy2dY5YN0
KNhaXxwAEX5VSJ2UjsHzIuADTPSorQ3beFsTnIBGgZCinSgc2Y3RiDDm0EQh
CZG93hS58vDh0BQNEKOWoaeFrZKlpbUVd9A+nz02PEPfgZYujm7RzQHs6EGz
aI7neGKPmtQRE3Y+7gyin1Oz1l4SUzQ/R0KuwfWxRSc8yS5zUgrGkbRgx0Sb
UEVmwQpUAv2uGKbJHSKNgoi0GmEiHnG5nEwYOXIgrhZNlCS8abAShc8343/5
eXIzHuHz9PXgzRv30DAzpq+vfn4zKp/KlcOri4vx5YgXo4RWXjWaF4MPTTbc
zavr2eTqcvCmyTj4wR26NyDtXLG4QRRJGbtugIIEQHoMPRLxanj9P//dewIG
7p9MdRssHP/A6jSaO5AcPo1EhX8CubYNUHtIC3AXYBQI0AYTQnBrIL/sRVCA
gJr//G9ImX8/E9/Ng03vyffmBSJceWlpVnlJNNt9s7OYibjn1Z5jHDUr72uU
rsI7+FD5benuvfzub1RVavde/O37RoNkyI97OWJsNECwML3bScUYq7VSOVHT
2D2WT6rhoBKowDjRiiMhYkYJe2ffi9rD0bmDV75XcdzmilLIwbALyhTmP1rl
OdtSiGzSfEDBKGh97LLMH6gyE2OENUOLCuYUsthT+Ov1T+B/T0+fnv4rCYA9
BoSDfCdei3z+fADyIC5Ca2nagWonKQS9gzsZxVwZ0CYVpqwtIu9GERsnU8+6
LzCZMgRwzoAoVqtbAVZgSTabNMtN4SvZ+vZqrbDyEun1FwFlG2Lr6q8ijvId
tC0xN6/qYUc1o6gVxigVmn15ezZBX5hEIOiaKDx4PAfJYCk0/GrhayuqwwFK
KKnTWma3TNzyJJKvpA1mhUoJgIe74hPlHzB3w3eeO1DT9KvJyJstPvECMXs1
Ep+55sr3XvZvenAnCwgGGziRIQdTeD54Mx0zcHtXi7Ozv4op2KHx5XAsPtna
r5zN9WupV3Ts1XA2nonp7GZy+UOLZoB+rQbx0gE2isAx5vAGkpF8tZ5Y95nx
dCMaM6xm4N/Ps/MX05wqD9auAMLMY/9wVkUSReQYxsiSznZFXphsbD5T2YTb
Fr49G+CyPYDaHWl3acddOdZWaN2pFkQyCOZUH01z8uBDCXlShhUZa6wRS0zx
0/v9CAmKKiH9wPjTFnNsKZITuzoBBqHRw4rEkh7UrAOXKvl2zJTsIFEpU9QD
VWrYFeyCBpjiMjfdFBkmrX7ljUC13pnLC/NtDS5bxd5/ZFk0qBYKyGSECuga
awOBjadCm646kiq+TvHuBmqnSI3JYuhpDQRSsbXmdXvG6VUlQTLbmvzGm8z2
bWRcgy8fpSjoQ8Jjr0IOy8aRJ4nHeyWlFvl1uB7G+zsQUBCAmAotHxWSPEoi
cSFtNCElMRp8SY2WpUVlTlKeQK7DUZD0Ct1ZkZu8+J1NHQ004PXXUU6XIFSC
KCCAdtIFtJBFnJdOBsmEWdjW6J4nfntVlFKClNbv81BVUVW2JsrwQ9CLGksF
XIyRTc1pnzQhvGsANNrEO8S3OYpCJxOYRILSgmph6KFCB9+GYXZtWJBWyoY4
r2MrsWnmXBiVU7bVM/xkYi1zSCx1nTK///Yf2pHcq9IbMeIija3ycLBhwrjQ
ca4EDghoslFVLSJAUlRmspivhy7z1XKh8F4BDABe7mgANdJEexDLYg7CmheW
FLUy+qF7RQj6cPYBZYR8rjz9wBwy63PlQj4waqYmbOMMk5NyPXNkZNf661Ly
K/trvBOlMGSfwFPFAfGamLQH09fWA7Judc4IKWT3IGRsQoyK4rCpuxl5MD6g
ZJnpjgAdAJoDOmOuETj1Pmu0sX9KVLp1NNhG19WDgWodFg5EJiBPAiwL2yXe
Z3gxre5jmorsLqPxTVsl2IoVml0GucmqseJgbs3tbpz8Mg66pFU5EdAAewTu
NAP7xml6FX8XCFh58jnm6ilzxVrqimF7vDjTC5Q/MnUp5SoLuyU6gL0a5+xO
NbbE7fvjuynX7q6m4918n1geUCGGI/rdDV1RADQx58ruSkkwfB3aW9e4gv1d
4PmIBlxPUqL5y71uVkhUgchfjj1hO8sDMODNiok3GsR9DE5/yqjtDBbhNXGz
0bDi48kM0hFbFMz6T5+oEwPee9AAQVLwHBnnUVO2vX4eC3vsvn3bx+KkFTw+
snuCBMH6mBNM3WocVFD2hf6VNwi3IOGmfoQFC3jGaoIBV2iLOmgHMSfUdta3
g+wChF0tUvk+Yce+U2uEULSxS+rTJ9N7BXgjp4nW14bW1x6tK7LIlT6ue1Ir
VkGuIcrJ1yFKyEaKOyrXQu8fEIKPnhAQFGiQBuEdUgng2tttA0aKQXzAiu4y
CZQIN+KSwB5L1mpQoo5sulELlVGx04wh7hijMEEtyQV4TKCuaK7yfHP2+HGR
RR2V66iTZsvH3d5p9+QRH3NNlyM5MKDpqn6bLEopNEFrQbQyIYYmHJ3Dr+/g
wDUNH2u5dYlKZuHWO3ftpTi1gKOKXT4X+zG7iLKgiGUmbG9yAMHI+CPFN17E
uEMXNgPoUDGamW8ZO9ICjHtMaZQvOj3Rxes3nPSXOH/p9vzLMn8pcrkUxYZS
nsTaXhu+qsQteryzqsW1gIwOx6oUu5D5Ni+VzfC7SEzPSss7ANkOBMUAZyMD
0kSqkS2UCjEcuExzaqLEYNf1FWDmUtDtNzYygCwQ1I689kIARXojM+oxmatt
CnPi1NV/FCFNSZbMKFAgpUHTvV9l0Fazwvw4vboU79TcV44jWHjsW/pvUpKN
3Map5LC1w+F5zanwbTtQq0h2hgBJuVbEa9/F7s8oZIwi527aKLWk5BSLNHdp
FOo9Yhm5ywvf+ZLXRkUoy7x7/aHxSejWDrgk9GPGIx12fv9PUZ+iYjC97PTE
RRoW2FKGVaLvhlcjIPH4h8nl9PvGQyUwsDGJazfGMppOj3rH3i1OG2ypTKJf
Ca2jk2PQrvDo2bG5l1I5zC7XY6sj99QfPT0uK6Qaf21uo49Hz3Hr9hq26FaW
8cv99b6j2avRMRa5bMVsfD65nGDtayomF9dvJsPJTMwGP0yxIGcnEe5uCUy7
uplNyxPH72fjyyls0aLCIYDGD2WLuji/uboQ1z9N3reH1DGCrke38RsVgT3P
IIzi6Wmv72PxfyffHyagIyHOYoDb3f7R0+c+5R6oNtbwHmbbTZ4uM7kBH3cB
6aZcKv6SACjQ61oCPOs/e7GXAGuFzQ7teRpuj/rHEJ0cvXjSPRaZlqGOjnq9
k6dPThGjQO8QAF+2T49gWK+jtTrqAbXWJNsacLZoBmvmxdHTF4CheOlwbLcP
1Lr9MG9cFsfNMnAf7f1VXicqVO/9VAI7/XA5G7x/oLLMojcaX84m55PxSLz6
8FBZ2+PTV5eb6e/LNWf6+8bCM/19ZfX5D5EeS/hu6UN0uXr143g4Kwl5w4yo
VPztPuPLET+yBYSfYP/ARNpPffCuVoN2mqtvqjFWLm/embtgv5OqMsG76Kj3
YHzl5ZRpCDLtGmFKoYop4hy+ZBLTotpbrW2TB0d6qdfIgNEi9dVRvw32lgV5
gnfq2OJi65P6UDeIKQs6kgUVkrlbOr5L28luKhfLXMRlcRbuwxLn+r/+YmpP
3fHAxRQGwV5U+YU7D/wQqizE2btTV7fbU5jzGisD30ju6aOvdDp4DYoy8fjv
6nqGT8BLrJTarroaKNTDQlcVr9N77EdsUYtOvKW+QZkBux6uW1oq+WXLPYFU
4q05yJuOuFaZUwaqrCF4uylU7e6krMu6XjoLFlKY06oo9xq1SJArxV/XWaSD
dOPqydX7AxIvK8XgNFTsOGxVlvTFg9T70KDWz1he4SywQ971xERJiyuEVGbe
81WE/VqAumoqnxhEtp0PwONOZ+/bVNxugYGhK3p5omB7/GzZsSIBHXGJkgHv
sY+mJRZgfmwR2QpFudu9krfUI1RGl6TmxiCV906WZCYv5L5EPt30DvpsrlaY
MwitHcf8aZni6ijVdS1Wra8Rvq8ve+Nm3p2DfzyKG1pc7xogd71vOBk5ekAm
KfSeDC4H+3zKjVpGwOmtK8bsYuL71ol/pUV7UkPWPwoQF75FdZWCRN3DiNmd
vgKIVXgmfv/tPw+YWVE/4fff/stkJ24fvaKuHFPF8Ov1RsZ3au5881S5yKoj
6BO6ZJvX7LHrKjzCDdkiAD3ooyIf5R2A6SrMNXgTaNzQ7eeWA4xe2i+whE1a
xENbWwOo1k7bYkSdTxtkKa6dZ5HCtlb3EnH3rxcPZqId+rzCVEvOqOfNFnHq
t2dkhux1yy5QPoHYtFzThSpbuswfMDet7n7XkQ+ep/5NC+xnnNueRhzu6jKW
FHAnLeF+IODtkT42nUhs8Al89/lM5boxdB1xIoghnQXjVl7g129QybQmcj2P
lgV+ylC9UWWyujvy3X4C8y1JBUkAOEZjQBw7kIKjK6o4qsSl7nidgek7f+WF
qXpZhO1UPsmhBgV0cUkEykubGvm0HDBsnCA5wFztkfe9+r9JN1haUJW9Sv9Z
Sn9kNiZq7GrBEd+UHdclfFS/NNMHNbUqz5W7wvppdMNQP2p4MX1sPq90Rt3G
a3tK8mXp/RsO/rjv4PcPHFqp8DoN/YYTf7nfOQ8riKb61KZwxxz9LQRMtdqh
HxbGvn1fyM7mMrilglFwm6T34DeWVFtvfDrjjxNU+NfmAgJ61YSManY1uhLS
zQRB/1860Ogg4UMAAA==

-->

</rfc>
