<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.27 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-msg-wrap-13" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="RATS CMW">RATS Conceptual Messages Wrapper (CMW)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-msg-wrap-13"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization>Fraunhofer SIT</organization>
      <address>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <author initials="N." surname="Smith" fullname="Ned Smith">
      <organization>Intel</organization>
      <address>
        <email>ned.smith@intel.com</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>thomas.fossati@linaro.org</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="D." surname="Glaze" fullname="Dionna Glaze">
      <organization>Google LLC</organization>
      <address>
        <email>dionnaglaze@google.com</email>
      </address>
    </author>
    <date year="2025" month="April" day="15"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>evidence</keyword>
    <keyword>attestation results</keyword>
    <keyword>endorsements</keyword>
    <keyword>reference values</keyword>
    <abstract>
      <?line 94?>

<t>This document defines a conceptual message wrapper (CMW) format - an encapsulation method applicable to any RATS conceptual message, such as Evidence, Attestation Results, Endorsements, and Reference Values.
It also describes a collection type that aggregates one or more CMWs into a single message.</t>
      <t>In addition, this document specifies a corresponding CBOR tag, JSON Web Tokens (JWT) and CBOR Web Tokens (CWT) claims, and an X.509 extension.
These mechanisms enable the embedding of enveloped conceptual messages into CBOR-based protocols, web APIs, and PKIX protocols.
Moreover, a Media Type and a CoAP Content-Format are defined for transporting CMWs over HTTP, MIME, CoAP, and other Internet protocols.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Remote ATtestation ProcedureS Working Group mailing list (rats@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/thomas-fossati/draft-ftbs-rats-msg-wrap"/>.</t>
    </note>
  </front>
  <middle>
    <?line 103?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The IETF Remote ATtestation procedureS (RATS) architecture defines a handful of conceptual messages
(see <xref section="8" sectionFormat="of" target="RFC9334"/>), such as Evidence and Attestation Results.
Each conceptual message can have multiple claims encoding and serialization
formats (<xref section="9" sectionFormat="of" target="RFC9334"/>). Throughout their lifetime, RATS
conceptual messages are typically transported over different protocols.
For example,</t>
      <ul spacing="normal">
        <li>
          <t>In a "background check" topology, Evidence (e.g., EAT <xref target="I-D.ietf-rats-eat"/>) first flows from
the Attester to the Relying Party and then from the Relying Party to the Verifier,
each leg following a separate protocol path.</t>
        </li>
        <li>
          <t>In a "passport" topology, an attestation result payload (e.g., Attestation Results for Secure Interactions (AR4SI) <xref target="I-D.ietf-rats-ar4si"/>)
is initially sent from the Verifier to the Attester, and later,
via a different channel, from the Attester to the Relying Party.</t>
        </li>
      </ul>
      <t>By using the CMW format outlined in this document, protocol designers can avoid the need
to update protocol specifications to accommodate different conceptual messages and
serialization formats used by various attestation technologies. This approach streamlines
the implementation process for developers, enabling easier support for diverse attestation
technologies. For instance, a Relying Party application implementer does not need to parse
attestation-related messages, such as Evidence from Attesters on IoT devices with Trusted
Platform Modules (TPM) or servers using confidential computing hardware like Intel Trust
Domain Extensions (TDX). Instead, they can leverage the CMW format, remaining agnostic
to the specific attestation technology.</t>
      <t>A further design goal is extensibility.
This means that adding support for new conceptual messages and new attestation technologies should not change the core of the processor, and that a CMW stack can be designed to offer a plug-in interface for both encoding and decoding.
To achieve this, the format must provide consistent message encapsulation and explicit typing.
These features allow for selecting the appropriate message handler based on its type identifier.
An opaque message can then be passed between the core and the handler.</t>
      <t>This document defines two encapsulation formats for RATS conceptual
messages that aim to achieve the goals stated above.</t>
      <t>These encapsulation formats have been specifically designed to possess the following characteristics:</t>
      <ul spacing="normal">
        <li>
          <t>They are self-describing, which means that they can convey precise typing information without relying on the framing provided by the embedding protocol or the storage system.</t>
        </li>
        <li>
          <t>They are based on media types <xref target="RFC6838"/>, which allows the cost of their registration to be spread across numerous usage scenarios.</t>
        </li>
      </ul>
      <t>A protocol designer could use these formats, for example, to convey
Evidence, Endorsements and Reference Values in certificates and CRLs
extensions (<xref target="DICE-arch"/>), to embed Attestation Results or Evidence as
first-class authentication credentials in TLS handshake messages
<xref target="I-D.fossati-tls-attestation"/>, to transport attestation-related payloads in RESTful APIs,
or for stable storage of Attestation Results in the form of file system
objects.</t>
      <t>This document also defines corresponding CBOR tag, JSON Web Tokens (JWT) and CBOR Web Tokens (CWT) claims, as well as an X.509 extension.
These allow embedding the wrapped conceptual messages into CBOR-based protocols, web APIs, and PKIX protocols.
In addition, a Media Type and a CoAP Content-Format are defined for transporting CMWs in HTTP, MIME, CoAP and other Internet protocols.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>In this document, CDDL <xref target="RFC8610"/> <xref target="RFC9165"/> is used to describe the
data formats.</t>
      <t>The reader is assumed to be familiar with the vocabulary and concepts
defined in <xref target="RFC9334"/>.</t>
      <t>This document reuses the terms defined in <xref section="2" sectionFormat="of" target="RFC9193"/>
(e.g., "Content-Type").</t>
    </section>
    <section anchor="conceptual-message-wrappers">
      <name>Conceptual Message Wrappers</name>
      <t>A RATS Conceptual Message Wrapper (CMW) has a tree structure.
Leaf nodes are of type "Record" (<xref target="type-n-val"/>), or "Tag" (<xref target="cbor-tag"/>).
Intermediate nodes are of type "Collection" (<xref target="cmw-coll"/>); they hold together multiple CMW items.</t>
      <t>The following snippet outlines the productions associated with the top-level types.</t>
      <sourcecode type="cddl"><![CDATA[
start = cmw

cmw = json-cmw / cbor-cmw

json-cmw = json-record / json-collection
cbor-cmw = cbor-record / cbor-collection / $cbor-tag
]]></sourcecode>
      <t>The complete CDDL can be found in <xref target="collected-cddl"/>.</t>
      <t><xref target="webtokens"/> and <xref target="x509"/> describe the transport of CMWs using CBOR and JSON Web Tokens and PKIX messages, respectively.</t>
      <t>This document only defines an encapsulation, not a security format.
It is the responsibility of the Attester to ensure that the CMW contents have the necessary security protection.
Security considerations are discussed in <xref target="seccons"/>.</t>
      <section anchor="type-n-val">
        <name>Record CMW</name>
        <t>The format of the Record CMW is shown in <xref target="fig-cddl-record"/>.
The JSON <xref target="STD90"/> and CBOR <xref target="STD94"/> representations are provided separately.
Both the <tt>json-record</tt> and <tt>cbor-record</tt> have the same fields except for slight differences in the types discussed below.</t>
        <figure anchor="fig-cddl-record">
          <name>CDDL definition of the Record CMW</name>
          <artwork type="cddl" align="left"><![CDATA[
json-record = [
  type: media-type
  value: base64url-string
  ? ind: uint .bits cm-type
]

cbor-record = [
  type: coap-content-format-type / media-type
  value: bytes
  ? ind: uint .bits cm-type
]
]]></artwork>
        </figure>
        <t>Each contains two or three members:</t>
        <dl newline="true">
          <dt><tt>type</tt>:</dt>
          <dd>
            <t>Either a text string representing a Content-Type (e.g., an EAT media type
<xref target="I-D.ietf-rats-eat-media-type"/>) or an unsigned integer corresponding to a CoAP Content-Format
ID (<xref section="12.3" sectionFormat="of" target="RFC7252"/>).
The latter <bcp14>MUST NOT</bcp14> be used in the JSON serialization.</t>
          </dd>
          <dt><tt>value</tt>:</dt>
          <dd>
            <t>The RATS conceptual message serialized according to the
value defined in the type member.
When using JSON, the value field <bcp14>MUST</bcp14> be encoded as Base64 using the URL and
filename safe alphabet (<xref section="5" sectionFormat="of" target="RFC4648"/>) without padding.
This always applies, even if the conceptual message format is already textual (e.g., a JWT EAT).
When using CBOR, the value field <bcp14>MUST</bcp14> be encoded as a CBOR byte string.</t>
          </dd>
          <dt><tt>ind</tt>:</dt>
          <dd>
            <t>An optional bitmap that indicates which conceptual message types are
carried in the <tt>value</tt> field.  Any combination (i.e., any value between
1 and 15, included) is allowed.  This is useful only if the <tt>type</tt> is
potentially ambiguous and there is no further context available to the
CMW consumer to decide.  For example, this might be the case if the base
media type is not profiled (e.g., <tt>application/eat+cwt</tt>), if the <tt>value</tt>
field contains multiple conceptual messages with different types (e.g.,
both Reference Values and Endorsements within the same <tt>application/signed-corim+cbor</tt>), or if the same profile identifier is
shared by different conceptual messages.
Future specifications may add new values to the <tt>ind</tt> field; see <xref target="iana-ind-ext"/>.</t>
          </dd>
        </dl>
      </section>
      <section anchor="cbor-tag">
        <name>Tag CMW</name>
        <t>Tag CMWs derive their tag numbers from a corresponding CoAP Content-Format ID using the <tt>TN()</tt> transform defined in <xref section="B" sectionFormat="of" target="RFC9277"/>.
Such CBOR tag numbers are in range [1668546817, 1668612095].</t>
        <t>The RATS conceptual message is first serialized according to the Content-Format ID and then encoded as a CBOR byte string, to which the TN-derived tag number is prepended.</t>
        <t>The Tag CMW is defined in <xref target="fig-cddl-cbor-tag"/> using two different macros.
One for CBOR-encoded types, the other for all other types.
Both macros take the CBOR tag number <tt>tn</tt> as a parameter.
The <tt>tag-cm-cbor</tt> macro takes the CDDL definition of the associated conceptual message <tt>fmt</tt> as a second parameter.</t>
        <figure anchor="fig-cddl-cbor-tag">
          <name>CDDL definition of the Tag CMW macros</name>
          <artwork type="cddl" align="left"><![CDATA[
tag-cm-cbor<tn, fmt> = #6.<tn>(bytes .cbor fmt)

tag-cm-data<tn> = #6.<tn>(bytes)
]]></artwork>
        </figure>
        <section anchor="how-to-plug-in-a-new-tag-cmw">
          <name>How To Plug in a New Tag CMW</name>
          <t>To plug a new Tag CMW into the CDDL defined in <xref target="collected-cddl"/>, the <tt>$cbor-tag</tt> type socket must be extended with a new instance of the Tag CMW macro (i.e., one of <tt>tag-cm-cbor</tt> or <tt>tag-cm-data</tt>).</t>
          <t>For instance, if a conceptual message of type <tt>my-evidence</tt> has a TN-derived CBOR tag <tt>1668576819</tt>, <tt>$cbor-tag</tt> would be extended as follows:</t>
          <sourcecode type="cddl"><![CDATA[
$cbor-tag /= tag-cm-cbor<1668576819, my-evidence>

my-evidence = {
  &(eat_nonce: 10) => bstr .size (8..64)
}
]]></sourcecode>
          <t>Instead, if a (non-CBOR) conceptual message has a TN-derived CBOR tag <tt>1668576935</tt>, <tt>$cbor-tag</tt> would be extended as follows:</t>
          <sourcecode type="cddl"><![CDATA[
$cbor-tag /= tag-cm-data<1668576935>
]]></sourcecode>
        </section>
      </section>
      <section anchor="cmw-coll">
        <name>Collection CMW</name>
        <t>Layered Attesters and composite devices (Sections <xref target="RFC9334" section="3.2" sectionFormat="bare"/> and <xref target="RFC9334" section="3.3" sectionFormat="bare"/> of <xref target="RFC9334"/>) generate Evidence that consists of multiple parts.
For example, in data center servers, it is not uncommon for separate attesting environments (AE) to serve a subsection of the entire machine.
One AE might measure and attest to what was booted on the main CPU, while another AE might measure and attest to what was booted on a SmartNIC plugged into a PCIe slot, and a third AE might measure and attest to what was booted on the machine's GPU.
To allow aggregation of multiple, potentially non-homogeneous evidence formats collected from different AEs, this document defines a Collection CMW as a container that holds several CMW items, each with a label that is unique within the scope of the Collection.</t>
        <t>Although originally designed to support layered Attester and composite device use cases, the Collection CMW can be adapted for other scenarios that require the aggregation of RATS conceptual messages.
For instance, Collections may be used to group Endorsements, Reference Values, Attestation Results, and more.
A single Collection CMW can contain a mix of different message types, and it can also be used to carry messages related to multiple devices simultaneously.</t>
        <t>The Collection CMW (<xref target="fig-cddl-collection"/>) is defined as a CBOR map or JSON object containing CMW values.
The position of a <tt>cmw</tt> entry in the <tt>cmw-collection</tt> is not significant.
Labels can be strings (or integers in the CBOR serialization) that serve as a mnemonic for different conceptual messages in the Collection.</t>
        <t>A Collection <bcp14>MUST</bcp14> have at least one CMW entry.</t>
        <t>The <tt>"__cmwc_t"</tt> key is reserved for associating an optional type to the overall Collection and <bcp14>MUST NOT</bcp14> be used for a label.
The value of the <tt>"__cmwc_t"</tt> key is either a Uniform Resource Identifier (URI) or an object identifier (OID).
The OID is always absolute and never relative.
The URI is always in the absolute form (<xref section="4.3" sectionFormat="of" target="RFC3986"/>).</t>
        <t>The <tt>"__cmwc_t"</tt> key functions similar to an EAT profile claim (see <xref section="4.3.2" sectionFormat="of" target="I-D.ietf-rats-eat"/>), but at a higher level.
It can be used to indicate basics like CBOR serialization and COSE algorithms just as a profile in EAT does.
At the higher level, it can be used to describe the allowed CMW collection assembly (this is somewhat parallel to the way EAT profiles indicate which claims are required and/or allowed).
For an example of a <tt>"__cmwc_t"</tt> that is defined for a bundle of endorsements and reference values, see <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-rats-corim"/>.</t>
        <t>Since the Collection CMW is recursive (a Collection CMW is itself a CMW), implementations may limit the allowed depth of nesting.</t>
        <figure anchor="fig-cddl-collection">
          <name>CDDL definition of the Collection CMW</name>
          <artwork type="cddl" align="left"><![CDATA[
json-collection = {
  ? "__cmwc_t": ~uri / oid
  + &(label: text) => json-cmw
}

cbor-collection = {
  ? "__cmwc_t": ~uri / oid
  + &(label: (int / text)) => cbor-cmw
}
]]></artwork>
        </figure>
      </section>
      <section anchor="decapsulation-algorithm">
        <name>Decapsulation Algorithm</name>
        <t>Once any external framing is removed (for example, if the CMW is carried in a certificate extension), the CMW decoder performs a 1-byte lookahead to determine how to decode the remaining byte buffer.
The following pseudo-code illustrates this process:</t>
        <artwork><![CDATA[
func CMWTypeDemux(b []byte) (CMW, error) {
  if len(b) == 0 {
    return Unknown
  }


  if b[0] == 0x82 || b[0] == 0x83 || b[0] == 0x9f {
    return CBORRecord
  } else if b[0] == 0xda {
    return CBORTag
  } else if b[0] == 0x5b {
    return JSONRecord
  } else if b[0] == 0x7b {
    return JSONCollection
  } else if (b[0] >= 0xa0 && b[0] <= 0xbb) || b[0] == 0xbf {
    return CBORCollection
  }

  return Unknown
}
]]></artwork>
      </section>
    </section>
    <section anchor="crypto">
      <name>Cryptographic Protection of CMWs</name>
      <t>This section highlights a number of mechanisms to add cryptographic protection to CMWs.</t>
      <section anchor="signed-cbor-cmw">
        <name>Signing CBOR CMW using COSE Sign1</name>
        <t>A CBOR CMW can be signed using COSE <xref target="STD96"/>.
A <tt>signed-cbor-cmw</tt> is a <tt>COSE_Sign1</tt> with the following layout:</t>
        <sourcecode type="cddl"><![CDATA[
signed-cbor-cmw = [
  protected: bytes .cbor signed-cbor-cmw-protected-hdr
  unprotected: signed-cbor-cmw-unprotected-hdr
  payload: bytes .cbor cbor-cmw
  signature: bytes
]
]]></sourcecode>
        <t>The payload <bcp14>MUST</bcp14> be the CBOR-encoded Tag, Record or Collection CMW.</t>
        <sourcecode type="cddl"><![CDATA[
signed-cbor-cmw-protected-hdr = {
  1 => int                            ; alg
  2 => "application/cmw+cbor" / 10000 ; cty
  * cose.label => cose.values
}

signed-cbor-cmw-unprotected-hdr = {
  * cose.label => cose.values
}

cose.label = int / text
cose.values = any
]]></sourcecode>
        <t>The protected header <bcp14>MUST</bcp14> include the signature algorithm identifier.
The protected header <bcp14>MUST</bcp14> include either the content type <tt>application/cmw+cbor</tt> or the CoAP Content-Format TBD1.
Other header parameters <bcp14>MAY</bcp14> be added to the header buckets, for example a <tt>kid</tt> that identifies the signing key.</t>
      </section>
      <section anchor="signed-json-cmw">
        <name>Signing JSON CMW using JWS</name>
        <t>A JSON CMW can be signed using JSON Web Signature (JWS) <xref target="RFC7515"/>.
A <tt>signed-json-cmw</tt> is a JWS object with the following layout:</t>
        <sourcecode type="cddl"><![CDATA[
signed-json-cmw = {
  "protected": text .b64u (text .json signed-json-cmw-protected-hdr)
  ? "header": text .b64u (text .json signed-json-cmw-unprotected-hdr)
  "payload": text .b64u (text .json json-cmw)
  "signature": text .b64u bytes
}
]]></sourcecode>
        <t>The payload <bcp14>MUST</bcp14> be the JSON-encoded Record or Collection CMW.</t>
        <sourcecode type="cddl"><![CDATA[
signed-json-cmw-protected-hdr = {
  "alg": text
  "cty": "application/cmw+json"
  * text => text
}

signed-json-cmw-unprotected-hdr = {
  * text => text
}
]]></sourcecode>
        <t>The protected header <bcp14>MUST</bcp14> include the signature algorithm identifier.
The protected header <bcp14>MUST</bcp14> include the content type <tt>application/cmw+json</tt>.
Other header parameters <bcp14>MAY</bcp14> be added to the header buckets, for example a <tt>kid</tt> that identifies the signing key.</t>
        <t>For clarity, the above uses the Flattened JSON Serialization (<xref section="7.2.2" sectionFormat="of" target="RFC7515"/>).
However, the Compact Serialization (<xref section="3.1" sectionFormat="of" target="RFC7515"/>) can also be used.</t>
      </section>
      <section anchor="webtokens">
        <name>Transporting CMW in COSE and JOSE Web Tokens</name>
        <t>To facilitate the embedding of CMWs in CBOR-based protocols and web APIs, this document defines two <tt>"cmw"</tt> claims for use with JSON Web Tokens (JWT) and CBOR Web Tokens (CWT).</t>
        <t>The definitions for these claims can be found in <xref target="iana-jwt"/> and <xref target="iana-cwt"/>, respectively.</t>
        <section anchor="encoding-requirements">
          <name>Encoding Requirements</name>
          <t>A Collection CMW carried in a <tt>"cmw"</tt> JWT claim <bcp14>MUST</bcp14> be a <tt>json-collection</tt>.
A Collection CMW carried in a <tt>"cmw"</tt> CWT claim <bcp14>MUST</bcp14> be a <tt>cbor-collection</tt>.</t>
          <t>A Record CMW carried in a <tt>"cmw"</tt> JWT claim <bcp14>MUST</bcp14> be a <tt>json-record</tt>.
A Record CMW carried in a <tt>"cmw"</tt> CWT claim <bcp14>MUST</bcp14> be a <tt>cbor-record</tt>.</t>
        </section>
      </section>
      <section anchor="x509">
        <name>Transporting CMW in X.509 Messages</name>
        <t>CMW may need to be transported in PKIX messages, such as Certificate Signing Requests (CSRs) or in X.509 Certificates and Certificate Revocation Lists (CRLs).</t>
        <t>The use of CMW in CSRs is documented in <xref target="I-D.ietf-lamps-csr-attestation"/>, while its application in X.509 Certificates and CRLs is detailed in Section 6.1 of <xref target="DICE-arch"/>.</t>
        <t>This section outlines the CMW extension designed to carry CMW objects.
<xref target="privcons"/> discusses some privacy considerations related to the transport of CMW within X.509 objects.</t>
        <t>The CMW extension <bcp14>MAY</bcp14> be included in X.509 Certificates, CRLs <xref target="RFC5280"/>, and CSRs.</t>
        <t>The CMW extension <bcp14>MUST</bcp14> be identified by the following object identifier:</t>
        <sourcecode type="asn.1"><![CDATA[
id-pe-cmw  OBJECT IDENTIFIER ::=
        { iso(1) identified-organization(3) dod(6) internet(1)
          security(5) mechanisms(5) pkix(7) id-pe(1) 35 }
]]></sourcecode>
        <t>This extension <bcp14>SHOULD NOT</bcp14> be marked critical.
It <bcp14>MAY</bcp14> be marked critical in cases where the attestation-related information is essential for granting resource access, and there is a risk that legacy relying parties would bypass such controls.</t>
        <t>The CMW extension <bcp14>MUST</bcp14> have the following syntax:</t>
        <sourcecode type="asn.1"><![CDATA[
CMW ::= CHOICE {
    json UTF8String,
    cbor OCTET STRING
}
]]></sourcecode>
        <t>The CMW <bcp14>MUST</bcp14> include the serialized CMW object in either JSON or CBOR format, utilizing the appropriate CHOICE entry.</t>
        <t>The DER-encoded CMW is the value of the OCTET STRING for the extnValue field of the extension.</t>
        <section anchor="asn1-x509">
          <name>ASN.1 Module</name>
          <t>This section provides an ASN.1 module <xref target="X.680"/> for the CMW extension, following the conventions established in <xref target="RFC5912"/> and <xref target="RFC6268"/>.</t>
          <sourcecode type="asn.1"><![CDATA[
CMWExtn
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-cmw-extn(TBD) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
  EXTENSION
  FROM PKIX-CommonTypes-2009  -- RFC 5912
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkixCommon-02(57) } ;

-- CMW Extension

ext-CMW EXTENSION ::= {
  SYNTAX CMW
  IDENTIFIED BY id-pe-cmw }

-- CMW Extension OID

id-pe-cmw  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-pe(1) 35 }

-- CMW Extension Syntax

CMW ::= CHOICE {
    json UTF8String,
    cbor OCTET STRING
}

END
]]></sourcecode>
        </section>
        <section anchor="compatibility-with-dice-conceptualmessagewrapper">
          <name>Compatibility with DICE <tt>ConceptualMessageWrapper</tt></name>
          <t>Section 6.1.8 of <xref target="DICE-arch"/> specifies the ConceptualMessageWrapper (CMW) format and its corresponding object identifier.
The CMW format outlined in <xref target="DICE-arch"/> permits only a subset of the CMW grammar defined in this document.
In particular, the Collection format cannot be encoded using DICE CMWs.</t>
        </section>
      </section>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>The (equivalent) examples in <xref target="ex-ja"/>, <xref target="ex-ca"/>, and <xref target="ex-ct"/> assume that
the Media-Type-Name <tt>application/vnd.example.rats-conceptual-msg</tt> has been
registered alongside a corresponding CoAP Content-Format ID <tt>30001</tt>.  The
CBOR tag <tt>1668576935</tt> is derived applying the <tt>TN()</tt> transform as described in
<xref target="cbor-tag"/>.</t>
      <t>All the examples focus on the wrapping aspects.
The wrapped messages are not instances of real Conceptual Messages.</t>
      <section anchor="ex-ja">
        <name>JSON-encoded Record</name>
        <sourcecode type="cbor-diag"><![CDATA[
[
  "application/vnd.example.rats-conceptual-msg",
  "I0faVQ"
]
]]></sourcecode>
      </section>
      <section anchor="ex-ca">
        <name>CBOR-encoded Record</name>
        <sourcecode type="cbor-diag"><![CDATA[
[
  30001,
  h'2347da55'
]
]]></sourcecode>
        <t>with the following wire representation:</t>
        <artwork><![CDATA[
82             # array(2)
   19 7531     # unsigned(30001)
   44          # bytes(4)
      2347da55 # "#G\xDAU"
]]></artwork>
        <t>Note that a Media-Type-Name can also be used with the CBOR-encoded Record form,
for example if it is known that the receiver cannot handle CoAP
Content-Formats, or (unlike the case in point) if a CoAP Content-Format
ID has not been registrered.</t>
        <sourcecode type="cbor-diag"><![CDATA[
[
  "application/vnd.example.rats-conceptual-msg",
  h'2347da55'
]
]]></sourcecode>
      </section>
      <section anchor="ex-ct">
        <name>CBOR-encoded Tag CMW</name>
        <sourcecode type="cbor-diag"><![CDATA[
1668576935(h'2347da55')
]]></sourcecode>
        <t>with the following wire representation:</t>
        <artwork><![CDATA[
da 637476a7    # tag(1668576935)
   44          # bytes(4)
      2347da55 # "#G\xDAU"
]]></artwork>
      </section>
      <section anchor="ex-ca-ind">
        <name>CBOR-encoded Record with explicit CM indicator</name>
        <t>This is an example of a signed CoRIM (Concise Reference Integrity Manifest) <xref target="I-D.ietf-rats-corim"/> with an explicit <tt>ind</tt> value of <tt>0b0000_0011</tt> (3), indicating that the wrapped message contains both Reference Values and Endorsements.</t>
        <sourcecode type="cbor-diag"><![CDATA[
[
  "application/signed-corim+cbor",
  h'd901f6d28440a044d901f5a040',
  3
]
]]></sourcecode>
        <t>with the following wire representation:</t>
        <!-- fold -w71 cddl/cmw-example-3.pretty -->
<artwork><![CDATA[
83                                      # array(3)
   78 1d                                # text(29)
      6170706c69636174696f6e2f7369676e65642d636f72696d2b63626f72 # "app
lication/signed-corim+cbor"
   4d                                   # bytes(13)
      d901f6d28440a044d901f5a040        # "\xD9\u0001\xF6҄@\xA0D\xD9\u00
01\xF5\xA0@"
   03                                   # unsigned(3)
]]></artwork>
      </section>
      <section anchor="cbor-encoded-collection">
        <name>CBOR-encoded Collection</name>
        <t>The following example is a CBOR-encoded Collection CMW that assembles conceptual messages from three attesters: Evidence for attesters A and B and Attestation Results for attester C.
It is given an explicit <tt>"__cmwc_t"</tt> using the URI form.</t>
        <artwork><![CDATA[
{
  "__cmwc_t": "tag:example.com,2024:composite-attester",
  / attester A / 0: [
    30001,
    h'2347da55',
    4
  ],
  / attester B / 1: 1668576935(h'2347da55'),
  / attester C / 2: [
    "application/eat+jwt",
    h'2e2e2e',
    8
  ]
}
]]></artwork>
      </section>
      <section anchor="json-encoded-collection">
        <name>JSON-encoded Collection</name>
        <t>The following example is a JSON-encoded Collection CMW that assembles Evidence from two attesters.</t>
        <artwork><![CDATA[
{
  "__cmwc_t": "tag:example.com,2024:another-composite-attester",
  "attester A": [
    "application/eat-ucs+json",
    "e30K",
    4
  ],
  "attester B": [
    "application/eat-ucs+cbor",
    "oA",
    4
  ]
}
]]></artwork>
      </section>
      <section anchor="use-in-jwt">
        <name>Use in JWT</name>
        <t>The following example shows the use of the <tt>"cmw"</tt> JWT claim to transport a Collection CMW in a JWT Claims Set <xref target="RFC7519"/>:</t>
        <artwork><![CDATA[
{
  "cmw": {
    "__cmwc_t": "tag:example.com,2024:another-composite-attester",
    "attester A": [
      "application/eat-ucs+json",
      "e30K",
      4
    ],
    "attester B": [
      "application/eat-ucs+cbor",
      "oA",
      4
    ]
  },
  "iss": "evidence collection daemon",
  "exp": 1300819380
}
]]></artwork>
      </section>
    </section>
    <section anchor="collected-cddl">
      <name>Collected CDDL</name>
      <sourcecode type="cddl"><![CDATA[
start = cmw

cmw = json-cmw / cbor-cmw

json-cmw = json-record / json-collection
cbor-cmw = cbor-record / cbor-collection / $cbor-tag

json-record = [
  type: media-type
  value: base64url-string
  ? ind: uint .bits cm-type
]

cbor-record = [
  type: coap-content-format-type / media-type
  value: bytes
  ? ind: uint .bits cm-type
]

tag-cm-cbor<tn, fmt> = #6.<tn>(bytes .cbor fmt)

tag-cm-data<tn> = #6.<tn>(bytes)

json-collection = {
  ? "__cmwc_t": ~uri / oid
  + &(label: text) => json-cmw
}

cbor-collection = {
  ? "__cmwc_t": ~uri / oid
  + &(label: (int / text)) => cbor-cmw
}

media-type = text .abnf ("Content-Type" .cat Content-Type-ABNF)
base64url-string = text .regexp "[A-Za-z0-9_-]+"

cm-type = &(
  reference-values: 0
  endorsements: 1
  evidence: 2
  attestation-results: 3
)

coap-content-format-type = uint .size 2

oid = text .regexp "([0-2])((\\.0)|(\\.[1-9][0-9]*))*"

Content-Type-ABNF = '

Content-Type   = Media-Type-Name *( *SP ";" *SP parameter )
parameter      = token "=" ( token / quoted-string )

token          = 1*tchar
tchar          = "!" / "#" / "$" / "%" / "&" / "\'" / "*"
               / "+" / "-" / "." / "^" / "_" / "`" / "|" / "~"
               / DIGIT / ALPHA
quoted-string  = %x22 *( qdtext / quoted-pair ) %x22
qdtext         = SP / %x21 / %x23-5B / %x5D-7E
quoted-pair    = "\\" ( SP / VCHAR )

Media-Type-Name = type-name "/" subtype-name

type-name = restricted-name
subtype-name = restricted-name

restricted-name = restricted-name-first *126restricted-name-chars
restricted-name-first  = ALPHA / DIGIT
restricted-name-chars  = ALPHA / DIGIT / "!" / "#" /
                         "$" / "&" / "-" / "^" / "_"
restricted-name-chars =/ "." ; Characters before first dot always
                             ; specify a facet name
restricted-name-chars =/ "+" ; Characters after last plus always
                             ; specify a structured syntax suffix

DIGIT     =  %x30-39           ; 0 - 9
POS-DIGIT =  %x31-39           ; 1 - 9
ALPHA     =  %x41-5A / %x61-7A ; A - Z / a - z
SP        =  %x20
VCHAR     =  %x21-7E           ; printable ASCII (no SP)
'

signed-cbor-cmw = [
  protected: bytes .cbor signed-cbor-cmw-protected-hdr
  unprotected: signed-cbor-cmw-unprotected-hdr
  payload: bytes .cbor cbor-cmw
  signature: bytes
]

signed-cbor-cmw-protected-hdr = {
  1 => int                            ; alg
  2 => "application/cmw+cbor" / 10000 ; cty
  * cose.label => cose.values
}

signed-cbor-cmw-unprotected-hdr = {
  * cose.label => cose.values
}

cose.label = int / text
cose.values = any

signed-json-cmw = {
  "protected": text .b64u (text .json signed-json-cmw-protected-hdr)
  ? "header": text .b64u (text .json signed-json-cmw-unprotected-hdr)
  "payload": text .b64u (text .json json-cmw)
  "signature": text .b64u bytes
}

signed-json-cmw-protected-hdr = {
  "alg": text
  "cty": "application/cmw+json"
  * text => text
}

signed-json-cmw-unprotected-hdr = {
  * text => text
}

]]></sourcecode>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>This section records the status of known implementations of the protocol
defined by this specification at the time of posting of this Internet-Draft,
and is based on a proposal described in <xref target="RFC7942"/>.
The description of implementations in this section is intended to assist the
IETF in its decision processes in progressing drafts to RFCs.
Please note that the listing of any individual implementation here does not
imply endorsement by the IETF.
Furthermore, no effort has been spent to verify the information presented here
that was supplied by IETF contributors.
This is not intended as, and must not be construed to be, a catalog of
available implementations or their features.
Readers are advised to note that other implementations may exist.</t>
      <t>According to <xref target="RFC7942"/>, "this will allow reviewers and working groups to
assign due consideration to documents that have the benefit of running code,
which may serve as evidence of valuable experimentation and feedback that have
made the implemented protocols more mature.
It is up to the individual working groups to use this information as they see
fit".</t>
      <section anchor="project-veraison">
        <name>Project Veraison</name>
        <t>The organization responsible for this implementation is Project Veraison, a
Linux Foundation project hosted at the Confidential Computing Consortium.</t>
        <t>The software, hosted at <eref target="https://github.com/veraison/cmw"/>, provides a Golang
package that allows encoding and decoding of CMW payloads.
The implementation covers all the features presented in this draft.
The maturity level is alpha.
The license is Apache 2.0.
The developers can be contacted on the Zulip channel:
<eref target="https://veraison.zulipchat.com/#narrow/stream/383526-CMW/"/>.</t>
      </section>
    </section>
    <section anchor="privcons">
      <name>Privacy Considerations</name>
      <t>The privacy considerations outlined in <xref section="11" sectionFormat="of" target="RFC9334"/> are fully applicable.
In particular, when a CMW contains Personally Identifying Information (PII), which is the case for Evidence and sometimes for other conceptual messages as well, care must be taken to prevent unintended recipients from accessing it.
Generally, utilizing secure channels between the parties exchanging CMWs can help address or mitigate these concerns.
A specific scenario arises when a public key certificate is issued based on Evidence information provided by the certificate requestor to the issuing Certificate Authority (CA).
For instance, an individual seeking a publicly-trusted code signing certificate may be willing to disclose the details of the hardware where their code signing keys are stored (e.g., HSM model, patch level, etc.).
However, they likely do not want this information to be publicly accessible.
Applications that intend to publicly "broadcast" Evidence claims received from a third party via X.509 certificates should define a Certificate Practices Statement that clearly specifies the circumstances under which the CA can include such data in the issued certificate.
Note that the aforementioned consideration does not apply to cases where X.509 is explicitly designed as a security envelope for Evidence claims, such as in DICE <xref target="DICE-arch"/>.</t>
    </section>
    <section anchor="seccons">
      <name>Security Considerations</name>
      <t>The security considerations discussed in <xref section="12.2" sectionFormat="of" target="RFC9334"/> concerning the protection of conceptual messages are fully applicable.
The following subsections provide further elaboration on these points, particularly in relation to Collection CMWs.</t>
      <section anchor="cmw-protection">
        <name>CMW Protection</name>
        <t>CMW itself does not provide any mechanisms for authenticity, integrity protection, or confidentiality.
It is the responsibility of the designer for each use case to determine the necessary security properties and implement them accordingly.
In some scenarios, a secure channel (e.g., via TLS) or object-level security (e.g., using JWT) may be sufficient, but this is not always the case.</t>
        <t>When a CMW is used to carry Evidence for composite or layered attestation of a single device, all components within the CMW must be cryptographically bound to prevent an attacker from replacing Evidence from a compromised device with that from a non-compromised device.
Authenticity and integrity protection <bcp14>MUST</bcp14> be provided by the attestation technology.
For additional security considerations related to Collections, refer to <xref target="seccons-coll"/>.</t>
        <t>RATS conceptual messages are typically secured using cryptography.
If the messages are already protected, no additional security requirements are imposed by this encapsulation.
If an adversary attempts to modify the payload encapsulation, it will result in incorrect processing of the encapsulated message, leading to an error.
If the messages are not protected, additional security must be added at a different layer.
For example, a <tt>cbor-record</tt> containing an Unprotected CWT Claims Set (UCCS) <xref target="I-D.ietf-rats-uccs"/> can be signed as described in <xref target="signed-cbor-cmw"/>.</t>
        <t><xref target="crypto"/> describes a number of methods that can be used to add cryptographic protection to CMW.</t>
      </section>
      <section anchor="seccons-coll">
        <name>Collection CMWs</name>
        <t>If the Collection CMW is not protected from tampering by external security measures (such as object security primitives) or internal mechanisms (such as intra-item binding), an attacker could easily manipulate the Collection's contents.
It is the responsibility of the Attester who creates the Collection CMW to ensure that the contents of the Collection are integrity-protected.
The designer of the attestation technology is typically in charge of ensuring that the security properties are met, not the user of the conceptual message wrapper.
In particular, when a CMW is used to carry multiple Evidence messages for a composite device or layered attestation, there should be strong binding between the Evidence messages within the Collection.
This binding is needed to prevent attacks where Evidence from a subverted part of the device is replaced by Evidence from a separate non-subverted device.
The binding of Evidence messages should be some form of attestation.
For example, key material used to sign/bind an entire Collection CMW should be an attestation key, handled as described in <xref section="12.1" sectionFormat="of" target="RFC9334"/>.
The binding does not necessarily have to be a signature over the Collection CMW, it might also be achieved through identifiers, cross-linking, signing or hashing between the members of the Collection.
Client-authenticated TLS may be used to bind a Collection CMW of Evidence messages.
However, the client key used with TLS should not be that of the end-user or owner of the device.
Instead, it should be attestation-oriented key material from the device or the attester manufacturer.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><cref anchor="rfced">RFC Editor:</cref> Please replace "RFCthis" with the RFC number assigned to this document.</t>
      <t><cref anchor="rfced_1">RFC Editor:</cref> This document uses the CPA (code point allocation) convention described in <xref target="I-D.bormann-cbor-draft-numbers"/>. For each usage of the term "CPA", please remove the prefix "CPA" from the indicated value and replace the residue with the value assigned by IANA; perform an analogous substitution for all other occurrences of the prefix "CPA" in the document. Finally, please remove this note.</t>
      <section anchor="iana-cwt">
        <name>CWT <tt>cmw</tt> Claim Registration</name>
        <t>IANA is requested to add a new <tt>cmw</tt> claim to the "CBOR Web Token (CWT) Claims" registry <xref target="IANA.cwt"/> as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: cmw</t>
          </li>
          <li>
            <t>Claim Description: A RATS Conceptual Message Wrapper</t>
          </li>
          <li>
            <t>JWT Claim Name: cmw</t>
          </li>
          <li>
            <t>Claim Key: CPA299</t>
          </li>
          <li>
            <t>Claim Value Type(s): CBOR map, CBOR array, or CBOR tag</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="type-n-val"/>, <xref target="cmw-coll"/> and <xref target="cbor-tag"/> of RFCthis</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-jwt">
        <name>JWT <tt>cmw</tt> Claim Registration</name>
        <t>IANA is requested to add a new <tt>cmw</tt> claim to the "JSON Web Token Claims" registry of the "JSON Web Token (JWT)" registry group <xref target="IANA.jwt"/> as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: cmw</t>
          </li>
          <li>
            <t>Claim Description: A RATS Conceptual Message Wrapper</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="type-n-val"/> and <xref target="cmw-coll"/> of RFCthis</t>
          </li>
        </ul>
      </section>
      <section anchor="jws-structured-syntax-suffix">
        <name><tt>+jws</tt> Structured Syntax Suffix</name>
        <t>IANA is requested to register the <tt>+jws</tt> structured syntax suffix in the "Structured Syntax Suffixes" registry <xref target="IANA.media-type-structured-suffix"/> in the manner described in <xref target="RFC6838"/>, which can be used to indicate that the media type is encoded as JSON Web Signature (JWS) <xref target="RFC7515"/>.</t>
        <section anchor="registry-contents">
          <name>Registry Contents</name>
          <dl spacing="compact">
            <dt>Name:</dt>
            <dd>
              <t>JSON Web Signature (JWS)</t>
            </dd>
            <dt>+suffix:</dt>
            <dd>
              <t>+jws</t>
            </dd>
            <dt>References:</dt>
            <dd>
              <t><xref target="RFC7515"/></t>
            </dd>
            <dt>Encoding Considerations:</dt>
            <dd>
              <t>8bit; values are represented as a JSON Object or as a series of base64url-encoded values each separated from the next by a single period ('.') character.</t>
            </dd>
            <dt>Interoperability Considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Fragment Identifier Considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Security Considerations:</dt>
            <dd>
              <t>See <xref section="10" sectionFormat="of" target="RFC7515"/></t>
            </dd>
            <dt>Contact:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org), or IETF Security Area (saag@ietf.org)</t>
            </dd>
            <dt>Author/Change Controller:</dt>
            <dd>
              <t>Remote ATtestation ProcedureS (RATS) Working Group.
The IETF has change control over this registration.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="iana-cbor-tag">
        <name>CBOR Tag Registration</name>
        <t>IANA is requested to add the following tag to the "CBOR Tags" <xref target="IANA.cbor-tags"/> registry.</t>
        <table>
          <thead>
            <tr>
              <th align="left">CBOR Tag</th>
              <th align="left">Data Item</th>
              <th align="left">Semantics</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">CPA765</td>
              <td align="left">CBOR map, CBOR array, CBOR tag</td>
              <td align="left">RATS Conceptual Message Wrapper</td>
              <td align="left">
                <xref target="type-n-val"/>, <xref target="cbor-tag"/> and <xref target="cmw-coll"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="iana-ind-ext">
        <name>RATS Conceptual Message Wrapper (CMW) Indicators Registry</name>
        <t>This specification defines a new "RATS Conceptual Message Wrapper (CMW) Indicators" registry, with the policy "Expert Review" (<xref section="4.5" sectionFormat="of" target="BCP26"/>).</t>
        <t>The objective is to have CMW Indicators values registered for all RATS Conceptual Messages (<xref section="8" sectionFormat="of" target="RFC9334"/>).</t>
        <t>This registry is to be added to the Remote Attestation Procedures (RATS) registry group at <xref target="IANA.rats"/>.</t>
        <section anchor="de-instructions">
          <name>Instructions for the Designated Expert</name>
          <t>The expert is instructed to add the values incrementally.</t>
          <t>Acceptable values are those corresponding to RATS Conceptual Messages defined by the RATS architecture <xref target="RFC9334"/> and any of its updates.</t>
        </section>
        <section anchor="structure-of-entries">
          <name>Structure of Entries</name>
          <t>Each entry in the registry must include:</t>
          <dl newline="true">
            <dt>Indicator value:</dt>
            <dd>
              <t>A number corresponding to the bit position in the <tt>ind</tt> bitmap (<xref target="type-n-val"/>).</t>
            </dd>
            <dt>Conceptual Message name:</dt>
            <dd>
              <t>A text string describing the RATS conceptual message this indicator corresponds to.</t>
            </dd>
            <dt>Reference:</dt>
            <dd>
              <t>A reference to a document, if available, or the registrant.</t>
            </dd>
          </dl>
          <t>The initial registrations for the registry are detailed in <xref target="tab-ind-regs"/>.</t>
          <table anchor="tab-ind-regs">
            <name>CMW Indicators Registry Initial Contents</name>
            <thead>
              <tr>
                <th align="left">Indicator value</th>
                <th align="left">Conceptual Message name</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0</td>
                <td align="left">Reference Values</td>
                <td align="left">RFCthis</td>
              </tr>
              <tr>
                <td align="left">1</td>
                <td align="left">Endorsements</td>
                <td align="left">RFCthis</td>
              </tr>
              <tr>
                <td align="left">2</td>
                <td align="left">Evidence</td>
                <td align="left">RFCthis</td>
              </tr>
              <tr>
                <td align="left">3</td>
                <td align="left">Attestation Results</td>
                <td align="left">RFCthis</td>
              </tr>
              <tr>
                <td align="left">4-31</td>
                <td align="left">Unassigned</td>
                <td align="left">RFCthis</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="provisional-registration">
          <name>Provisional Registration</name>
          <t>Before the creation of the registry by IANA, new codepoints can be added to the <eref target="https://github.com/ietf-rats-wg/draft-ietf-rats-msg-wrap/blob/main/provisional/cmw-indicators-registry.md">provisional CMW Indicators registry</eref> by following the documented procedure.</t>
          <t><xref target="tab-ind-regs"/> will be regularly updated to match the contents of the provisional registry.</t>
          <t>The provisional registry will be discontinued once IANA establishes the permanent registry, which is expected to coincide with the publication of the current document.</t>
        </section>
      </section>
      <section anchor="media-types">
        <name>Media Types</name>
        <t>IANA is requested to add the following media types to the "Media Types" registry <xref target="IANA.media-types"/>.</t>
        <table anchor="tab-mt-regs">
          <name>CMW Media Types</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>cmw+cbor</tt></td>
              <td align="left">
                <tt>application/cmw+cbor</tt></td>
              <td align="left">
                <xref target="type-n-val"/>, <xref target="cbor-tag"/> and <xref target="cmw-coll"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">
                <tt>cmw+json</tt></td>
              <td align="left">
                <tt>application/cmw+json</tt></td>
              <td align="left">
                <xref target="type-n-val"/> and <xref target="cmw-coll"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">
                <tt>cmw+cose</tt></td>
              <td align="left">
                <tt>application/cmw+cose</tt></td>
              <td align="left">
                <xref target="signed-cbor-cmw"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">
                <tt>cmw+jws</tt></td>
              <td align="left">
                <tt>application/cmw+jws</tt></td>
              <td align="left">
                <xref target="signed-json-cmw"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
        <section anchor="applicationcmwcbor">
          <name><tt>application/cmw+cbor</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>cmw+cbor</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t><tt>cmwc_t</tt> (Collection CMW type in string format.  OIDs must use the
dotted-decimal notation.  The parameter value is case-insensitive.  It must not be used for CMW that are not Collections.)</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (CBOR)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying Parties that need to transfer CMW payloads over HTTP(S), CoAP(S), and other transports.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers are as specified for "application/cbor". (No fragment identification syntax is currently defined for "application/cbor".)</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
        <section anchor="applicationcmwjson">
          <name><tt>application/cmw+json</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>cmw+json</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t><tt>cmwc_t</tt> (Collection CMW type in string format.  OIDs must use the
dotted-decimal notation.  The parameter value is case-insensitive.  It must not be used for CMW that are not Collections.)</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (JSON is UTF-8-encoded text)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying Parties that need to transfer CMW payloads over HTTP(S), CoAP(S), and other transports.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers are as specified for "application/json". (No fragment identification syntax is currently defined for "application/json".)</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
        <section anchor="applicationcmwcose">
          <name><tt>application/cmw+cose</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>cmw+cose</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t><tt>cmwc_t</tt> (Collection CMW type in string format.  OIDs must use the
dotted-decimal notation.  The parameter value is case-insensitive.  It must not be used for CMW that are not Collections.)  Note that the <tt>cose-type</tt> parameter is explicitly not supported, as it is understood to be <tt>"cose-sign1"</tt>.</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary (CBOR)</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying Parties that need to transfer CMW payloads over HTTP(S), CoAP(S), and other transports.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
        <section anchor="applicationcmwjws">
          <name><tt>application/cmw+jws</tt></name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>cmw+jws</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t><tt>cmwc_t</tt> (Collection CMW type in string format.  OIDs must use the
dotted-decimal notation.  The parameter value is case-insensitive.  It must not be used for CMW that are not Collections.)</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>8bit; values are represented as a JSON Object or as a series of base64url-encoded values each separated from the next by a single period ('.') character.</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t><xref target="seccons"/> of RFCthis</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>RFCthis</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying Parties that need to transfer CMW payloads over HTTP(S), CoAP(S), and other transports.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>n/a</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="coap-content-formats">
        <name>CoAP Content-Formats</name>
        <t>IANA is requested to register the following Content-Format IDs in the "CoAP Content-Formats" registry, within the "Constrained RESTful Environments (CoRE) Parameters" registry group <xref target="IANA.core-parameters"/>:</t>
        <table align="left">
          <name>New CoAP Content Formats</name>
          <thead>
            <tr>
              <th align="left">Content-Type</th>
              <th align="left">Content Coding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/cmw+cbor</td>
              <td align="left">-</td>
              <td align="left">TBD1</td>
              <td align="left">
                <xref target="type-n-val"/>, <xref target="cbor-tag"/> and <xref target="cmw-coll"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cmw+json</td>
              <td align="left">-</td>
              <td align="left">TBD2</td>
              <td align="left">
                <xref target="type-n-val"/> and <xref target="cmw-coll"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cmw+cose</td>
              <td align="left">-</td>
              <td align="left">TBD3</td>
              <td align="left">
                <xref target="signed-cbor-cmw"/> of RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cmw+jws</td>
              <td align="left">-</td>
              <td align="left">TBD4</td>
              <td align="left">
                <xref target="signed-json-cmw"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
        <t>If possible, TBD1, TBD2, TBD3 and TBD4 should be assigned in the 256..9999 range.</t>
        <section anchor="registering-new-coap-content-formats-for-parameterized-cmw-media-types">
          <name>Registering new CoAP Content-Formats for Parameterized CMW Media Types</name>
          <t>New CoAP Content-Formats can be created based on parameterized instances of the <tt>application/cmw+json</tt>, <tt>application/cmw+cbor</tt>, <tt>application/cmw+cose</tt> and <tt>application/cmw+jws</tt> media types.</t>
          <t>When assigning a new CoAP Content-Format ID for a CMW media type that utilizes the <tt>cmwc_t</tt> parameter, the registrar must check (directly or through the Designated Expert) that:</t>
          <ul spacing="normal">
            <li>
              <t>The corresponding CMW is a Collection (<xref target="cmw-coll"/>), and</t>
            </li>
            <li>
              <t>The <tt>cmwc_t</tt> value is either a (non-relative) OID or an absolute URI.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="new-smi-numbers-registrations">
        <name>New SMI Numbers Registrations</name>
        <t>IANA has assigned an object identifier (OID) for the CMW extension defined in <xref target="x509"/> in the "SMI Security for PKIX Certificate Extension" registry of the "SMI Numbers" <xref target="IANA.smi-numbers"/> registry group as follows:</t>
        <table align="left">
          <name>New CMW Extension OID</name>
          <thead>
            <tr>
              <th align="left">Decimal</th>
              <th align="left">Description</th>
              <th align="left">References</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">35</td>
              <td align="left">id-pe-cmw</td>
              <td align="left">
                <xref target="x509"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
        <t>IANA is requested to assign an object identifier (OID) for the ASN.1 Module defined in <xref target="asn1-x509"/> in the "SMI Security for PKIX Module Identifier" registry of the "SMI Numbers" <xref target="IANA.smi-numbers"/> registry group:</t>
        <table align="left">
          <name>New ASN.1 Module OID</name>
          <thead>
            <tr>
              <th align="left">Decimal</th>
              <th align="left">Description</th>
              <th align="left">References</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD</td>
              <td align="left">id-mod-cmw-extn</td>
              <td align="left">
                <xref target="asn1-x509"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="STD90">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9165">
          <front>
            <title>Additional Control Operators for the Concise Data Definition Language (CDDL)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Concise Data Definition Language (CDDL), standardized in RFC 8610, provides "control operators" as its main language extension point.</t>
              <t>The present document defines a number of control operators that were not yet ready at the time RFC 8610 was completed:.plus,.cat, and.det for the construction of constants;.abnf/.abnfb for including ABNF (RFC 5234 and RFC 7405) in CDDL specifications; and.feature for indicating the use of a non-basic feature in an instance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9165"/>
          <seriesInfo name="DOI" value="10.17487/RFC9165"/>
        </reference>
        <reference anchor="RFC9277">
          <front>
            <title>On Stable Storage for Items in Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a stored ("file") format for Concise Binary Object Representation (CBOR) data items that is friendly to common systems that recognize file types, such as the Unix file(1) command.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9277"/>
          <seriesInfo name="DOI" value="10.17487/RFC9277"/>
        </reference>
        <reference anchor="STD94">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="IANA.cwt" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.jwt" target="https://www.iana.org/assignments/jwt">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="BCP26">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="X.680">
          <front>
            <title>Specification of Abstract Syntax Notation One (ASN.1): Specification of Basic Notation</title>
            <author>
              <organization>International Telephone and Telegraph
Consultative Committee</organization>
            </author>
            <date month="July" year="1994"/>
          </front>
          <seriesInfo name="CCITT" value="Recommendation X.680"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="IANA.media-type-structured-suffix" target="https://www.iana.org/assignments/media-type-structured-suffix">
          <front>
            <title>Structured Syntax Suffixes</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.rats" target="https://www.iana.org/assignments/rats">
          <front>
            <title>Remote Attestation Procedures (RATS)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.smi-numbers" target="https://www.iana.org/assignments/smi-numbers">
          <front>
            <title>Structure of Management Information (SMI) Numbers (MIB Module Registrations)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version. There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
        <reference anchor="RFC9193">
          <front>
            <title>Sensor Measurement Lists (SenML) Fields for Indicating Data Value Content-Format</title>
            <author fullname="A. Keränen" initials="A." surname="Keränen"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Sensor Measurement Lists (SenML) media types support multiple types of values, from numbers to text strings and arbitrary binary Data Values. In order to facilitate processing of binary Data Values, this document specifies a pair of new SenML fields for indicating the content format of those binary Data Values, i.e., their Internet media type, including parameters as well as any content codings applied.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9193"/>
          <seriesInfo name="DOI" value="10.17487/RFC9193"/>
        </reference>
        <reference anchor="STD96">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat-media-type">
          <front>
            <title>EAT Media Types</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer Institute for Secure Information Technology</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="3" month="November" year="2024"/>
            <abstract>
              <t>   Payloads used in Remote Attestation Procedures may require an
   associated media type for their conveyance, for example when used in
   RESTful APIs.

   This memo defines media types to be used for Entity Attestation
   Tokens (EAT).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-media-type-12"/>
        </reference>
        <reference anchor="I-D.ietf-rats-ar4si">
          <front>
            <title>Attestation Results for Secure Interactions</title>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
              <organization>MIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
              <organization>Intel</organization>
            </author>
            <date day="6" month="February" year="2025"/>
            <abstract>
              <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

   This document also defines two serialisations of the proposed
   information model, utilising CBOR and JSON.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-08"/>
        </reference>
        <reference anchor="I-D.ietf-rats-uccs">
          <front>
            <title>A CBOR Tag for Unprotected CWT Claims Sets</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Nancy Cam-Winget" initials="N." surname="Cam-Winget">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="3" month="November" year="2024"/>
            <abstract>
              <t>   This document defines the Unprotected CWT Claims Set (UCCS), a data
   format for representing a CBOR Web Token (CWT) Claims Set without
   protecting it by a signature, message authentication code (MAC), or
   encryption.  UCCS enables the use of CWT claims in environments where
   protection is provided by other means, such as secure communication
   channels or trusted execution environments.  This specification
   defines a CBOR tag for UCCS and describes the UCCS format, its
   encoding, and processing considerations, and discusses security
   implications of using unprotected claims sets.


   // (This editors' note will be removed by the RFC editor:) The
   // present revision (–12) contains remaining document changes based
   // on feedback from the IESG evaluation and has been submitted as
   // input to IETF 121.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-uccs-12"/>
        </reference>
        <reference anchor="I-D.fossati-tls-attestation">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Arto Niemi" initials="A." surname="Niemi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using attestation which is
   a process by which an entity produces evidence about itself that
   another party can use to appraise whether that entity is found in a
   secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enables the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-tls-attestation-08"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-csr-attestation">
          <front>
            <title>Use of Remote Attestation with Certification Signing Requests</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Siemens</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
              <organization>Beyond Identity</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel Corporation</organization>
            </author>
            <date day="19" month="March" year="2025"/>
            <abstract>
              <t>   A PKI end entity requesting a certificate from a Certification
   Authority (CA) may wish to offer trustworthy claims about the
   platform generating the certification request and the environment
   associated with the corresponding private key, such as whether the
   private key resides on a hardware security module.

   This specification defines an attribute and an extension that allow
   for conveyance of Evidence and Attestation Results in Certificate
   Signing Requests (CSRs), such as PKCS#10 or Certificate Request
   Message Format (CRMF) payloads.  This provides an elegant and
   automatable mechanism for transporting Evidence to a Certification
   Authority.

   Including Evidence and Attestation Results along with a CSR can help
   to improve the assessment of the security posture for the private
   key, and can help the Certification Authority to assess whether it
   satisfies the requested certificate profile.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-18"/>
        </reference>
        <reference anchor="I-D.ietf-rats-corim">
          <front>
            <title>Concise Reference Integrity Manifest</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>arm</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether or not to engage in secure interactions with it.  Evidence
   about trustworthiness can be rather complex and it is deemed
   unrealistic that every Relying Party is capable of the appraisal of
   Evidence.  Therefore that burden is typically offloaded to a
   Verifier.  In order to conduct Evidence appraisal, a Verifier
   requires not only fresh Evidence from an Attester, but also trusted
   Endorsements and Reference Values from Endorsers and Reference Value
   Providers, such as manufacturers, distributors, or device owners.
   This document specifies the information elements for representing
   Endorsements and Reference Values in CBOR format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-corim-07"/>
        </reference>
        <reference anchor="DICE-arch" target="https://trustedcomputinggroup.org/wp-content/uploads/DICE-Attestation-Architecture-Version-1.1-Revision-18_pub.pdf">
          <front>
            <title>DICE Attestation Architecture</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2024" month="January"/>
          </front>
        </reference>
        <reference anchor="I-D.bormann-cbor-draft-numbers">
          <front>
            <title>Managing CBOR codepoints in Internet-Drafts</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="1" month="March" year="2025"/>
            <abstract>
              <t>   CBOR-based protocols often make use of numbers allocated in a
   registry.  During development of the protocols, those numbers may not
   yet be available.  This impedes the generation of data models and
   examples that actually can be used by tools.

   This short draft proposes a common way to handle these situations,
   without any changes to existing tools.  Also, in conjunction with the
   application-oriented EDN literal e'', a further reduction in
   editorial processing of CBOR examples around the time of approval can
   be achieved.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bormann-cbor-draft-numbers-05"/>
        </reference>
      </references>
    </references>
    <?line 1273?>

<section anchor="registering-and-using-cmws">
      <name>Registering and Using CMWs</name>
      <t><xref target="fig-howto-cmw"/> describes the registration preconditions for using
CMWs in either Record CMW or Tag CMW forms.
When using Collection CMW, the preconditions apply for each entry in the Collection.</t>
      <figure anchor="fig-howto-cmw">
        <name>How To Create a CMW</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="480" width="344" viewBox="0 0 344 480" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 40,48 L 40,80" fill="none" stroke="black"/>
              <path d="M 56,176 L 56,424" fill="none" stroke="black"/>
              <path d="M 80,96 L 80,152" fill="none" stroke="black"/>
              <path d="M 80,168 L 80,424" fill="none" stroke="black"/>
              <path d="M 96,144 L 96,176" fill="none" stroke="black"/>
              <path d="M 104,256 L 104,288" fill="none" stroke="black"/>
              <path d="M 120,96 L 120,144" fill="none" stroke="black"/>
              <path d="M 168,192 L 168,232" fill="none" stroke="black"/>
              <path d="M 168,304 L 168,376" fill="none" stroke="black"/>
              <path d="M 184,48 L 184,80" fill="none" stroke="black"/>
              <path d="M 200,48 L 200,80" fill="none" stroke="black"/>
              <path d="M 224,96 L 224,144" fill="none" stroke="black"/>
              <path d="M 240,256 L 240,288" fill="none" stroke="black"/>
              <path d="M 248,144 L 248,176" fill="none" stroke="black"/>
              <path d="M 264,96 L 264,152" fill="none" stroke="black"/>
              <path d="M 264,168 L 264,424" fill="none" stroke="black"/>
              <path d="M 288,176 L 288,424" fill="none" stroke="black"/>
              <path d="M 296,48 L 296,80" fill="none" stroke="black"/>
              <path d="M 56,32 L 168,32" fill="none" stroke="black"/>
              <path d="M 216,32 L 280,32" fill="none" stroke="black"/>
              <path d="M 56,96 L 168,96" fill="none" stroke="black"/>
              <path d="M 216,96 L 280,96" fill="none" stroke="black"/>
              <path d="M 112,128 L 232,128" fill="none" stroke="black"/>
              <path d="M 72,160 L 104,160" fill="none" stroke="black"/>
              <path d="M 240,160 L 272,160" fill="none" stroke="black"/>
              <path d="M 112,192 L 232,192" fill="none" stroke="black"/>
              <path d="M 120,240 L 224,240" fill="none" stroke="black"/>
              <path d="M 120,304 L 224,304" fill="none" stroke="black"/>
              <path d="M 112,384 L 248,384" fill="none" stroke="black"/>
              <path d="M 96,416 L 232,416" fill="none" stroke="black"/>
              <path d="M 24,432 L 336,432" fill="none" stroke="black"/>
              <path d="M 8,464 L 320,464" fill="none" stroke="black"/>
              <path d="M 8,464 L 24,432" fill="none" stroke="black"/>
              <path d="M 96,416 L 112,384" fill="none" stroke="black"/>
              <path d="M 232,416 L 248,384" fill="none" stroke="black"/>
              <path d="M 320,464 L 336,432" fill="none" stroke="black"/>
              <path d="M 56,32 C 47.16936,32 40,39.16936 40,48" fill="none" stroke="black"/>
              <path d="M 168,32 C 176.83064,32 184,39.16936 184,48" fill="none" stroke="black"/>
              <path d="M 216,32 C 207.16936,32 200,39.16936 200,48" fill="none" stroke="black"/>
              <path d="M 280,32 C 288.83064,32 296,39.16936 296,48" fill="none" stroke="black"/>
              <path d="M 56,96 C 47.16936,96 40,88.83064 40,80" fill="none" stroke="black"/>
              <path d="M 168,96 C 176.83064,96 184,88.83064 184,80" fill="none" stroke="black"/>
              <path d="M 216,96 C 207.16936,96 200,88.83064 200,80" fill="none" stroke="black"/>
              <path d="M 280,96 C 288.83064,96 296,88.83064 296,80" fill="none" stroke="black"/>
              <path d="M 112,128 C 103.16936,128 96,135.16936 96,144" fill="none" stroke="black"/>
              <path d="M 232,128 C 240.83064,128 248,135.16936 248,144" fill="none" stroke="black"/>
              <path d="M 72,160 C 63.16936,160 56,167.16936 56,176" fill="none" stroke="black"/>
              <path d="M 104,160 C 112.83064,160 120,152.83064 120,144" fill="none" stroke="black"/>
              <path d="M 240,160 C 231.16936,160 224,152.83064 224,144" fill="none" stroke="black"/>
              <path d="M 272,160 C 280.83064,160 288,167.16936 288,176" fill="none" stroke="black"/>
              <path d="M 112,192 C 103.16936,192 96,184.83064 96,176" fill="none" stroke="black"/>
              <path d="M 232,192 C 240.83064,192 248,184.83064 248,176" fill="none" stroke="black"/>
              <path d="M 120,240 C 111.16936,240 104,247.16936 104,256" fill="none" stroke="black"/>
              <path d="M 224,240 C 232.83064,240 240,247.16936 240,256" fill="none" stroke="black"/>
              <path d="M 120,304 C 111.16936,304 104,296.83064 104,288" fill="none" stroke="black"/>
              <path d="M 224,304 C 232.83064,304 240,296.83064 240,288" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="296,424 284,418.4 284,429.6" fill="black" transform="rotate(90,288,424)"/>
              <polygon class="arrowhead" points="272,424 260,418.4 260,429.6" fill="black" transform="rotate(90,264,424)"/>
              <path class="jump" d="M 264,168 C 258,168 258,152 264,152" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="176,376 164,370.4 164,381.6" fill="black" transform="rotate(90,168,376)"/>
              <polygon class="arrowhead" points="176,232 164,226.4 164,237.6" fill="black" transform="rotate(90,168,232)"/>
              <polygon class="arrowhead" points="88,424 76,418.4 76,429.6" fill="black" transform="rotate(90,80,424)"/>
              <path class="jump" d="M 80,168 C 74,168 74,152 80,152" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="64,424 52,418.4 52,429.6" fill="black" transform="rotate(90,56,424)"/>
              <g class="text">
                <text x="72" y="52">Reuse</text>
                <text x="136" y="52">EAT/CoRIM</text>
                <text x="244" y="52">Register</text>
                <text x="72" y="68">media</text>
                <text x="128" y="68">type(s)</text>
                <text x="224" y="68">new</text>
                <text x="264" y="68">media</text>
                <text x="56" y="84">+</text>
                <text x="96" y="84">profile</text>
                <text x="228" y="84">type</text>
                <text x="172" y="148">Register</text>
                <text x="152" y="164">new</text>
                <text x="188" y="164">CoAP</text>
                <text x="172" y="180">Content-Format</text>
                <text x="168" y="260">Automatically</text>
                <text x="140" y="276">derive</text>
                <text x="188" y="276">CBOR</text>
                <text x="128" y="292">tag</text>
                <text x="184" y="292">[RFC9277]</text>
                <text x="152" y="404">Tag</text>
                <text x="184" y="404">CMW</text>
                <text x="148" y="452">Record</text>
                <text x="192" y="452">CMW</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
     .---------------.   .---------.
    | Reuse EAT/CoRIM | | Register  |
    | media type(s)   | | new media |
    | + profile       | | type      |
     `---+----+------'   `-+----+--'
         |    |            |    |
         |  .-+------------+-.  |
         | |  |  Register  |  | |
       .-(-+-'   new CoAP   `-+-(-.
      |  | |  Content-Format  | |  |
      |  |  `-------+--------'  |  |
      |  |          |           |  |
      |  |          v           |  |
      |  |   .--------------.   |  |
      |  |  | Automatically  |  |  |
      |  |  | derive CBOR    |  |  |
      |  |  | tag [RFC9277]  |  |  |
      |  |   `------+-------'   |  |
      |  |          |           |  |
      |  |          |           |  |
      |  |          |           |  |
      |  |          v           |  |
      |  |   .----------------. |  |
      |  |  /    Tag CMW     /  |  |
      v  v `----------------'   v  v
  .--------------------------------------.
 /             Record CMW               /
`--------------------------------------'
]]></artwork>
        </artset>
      </figure>
    </section>
    <section anchor="open-issues">
      <name>Open Issues</name>
      <t>The list of currently open issues for this documents can be found at
<eref target="https://github.com/thomas-fossati/draft-ftbs-rats-msg-wrap/issues"/>.</t>
      <t><cref anchor="rfced_2">RFC Editor:</cref> please remove before publication.</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank
Brian Campbell,
Carl Wallace,
Carsten Bormann,
<contact fullname="Ionuț Mihalcea"/>,
Michael B. Jones,
Mike Ounsworth,
Mohit Sethi,
Russ Housley,
and
Tom Jones
for their reviews and suggestions.</t>
      <t>The definition of a Collection CMW has been modelled on a proposal originally made by Simon Frost for an EAT-based Evidence collection type.  The Collection CMW aims at superseding it by generalizing the allowed Evidence formats.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="L." surname="Lundblade" fullname="Laurence Lundblade">
        <organization>Security Theory LLC</organization>
        <address>
          <email>lgl@securitytheory.com</email>
        </address>
      </contact>
      <t>Laurence made significant contributions to enhancing the security requirements and considerations for Collection CMWs.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+19W3vbRpbgO35FNT0TkwlBibqLaadDU7LNtC1rRLqTHscT
gmSRRAwCbACUrEjup/0X+7K/ZZ/2eX/RnkvdAIK+dDK7vdOt7s8hwUJdTp17
nXPK933vuiP2PS8P80h2RO2qOxyIXhJP5CpfB5F4IbMsmMtMfJ8Gq5VMRb33
4vtGzQvG41RemxdefF/zpskkDpbQyTQNZrkfynzmp0Ge+cts7t/A635735sE
uZwn6W1HZPnUmyRxJuNsnXVEnq6ll63HyzDLwiQe3q6gp/758InnhauUfs/y
vd3d0909L0hlAEMP5GSdhvltzbtJ0rfzNFmvcEJymeRSdIe5zPIgh77EZZpM
5HSdykHNeytvofW0I14LeR1OJay0KYLcNk5lto7yrClkPE3STC5ljN9SOZMp
thbXQbQGgLzxPHglnv4UREkMc72VmZctgzT/6S9rmAAsKU68VQgD5cmkKbIk
zaEP6Cm7XeIHeD9Y54sk7XjCFwy5ZzJ+Kx6H6dtFEv3iCSGSdB7E4S80s454
kgbreJHARMSgP8Tf5TIIo45YwHutsXrvW4R8C0CbB5Pc9n0hp2KwDPPFZr/9
OJeR010sp60Mm34b4i/Q19L2M1wkyyATTxJAjDzc7Ox5GAdp4vSW0wutGb/w
bUS/t+AlZ91BHANIh9kEVxeHc9VtR7yKw2uZZrDLIpmJ7moVhbiOSYhbkYnH
SRz7VwsZxv4glPSaxsxn/uOrgTMNHqNlx/h2vnzXiqUDojNYQByIp1Hwi9xc
2NMkmUdSPH/ec3qd0itzfOPbOTUgaCFm52k4XueF/X0erBmHnq/j6TgKphXD
aKwGQEsglNJ40Tz6NlMtcmrAuyOEGZF3QY+0hEFEFs7jcBZOgjgvtMtEngCe
L4J4EsZz2CloqodP5V/WYcroLwDP8cUMCCYN+M1ZkgKjiCI5IbIBFpC1PC9O
0iU0uJawanH1pLd/enLUEdAjfz04OjjpiHGQyaMDfnK4d7LbEau34Tv+fnSy
Dy2WchoGfg5MIOPHx3uHex2YQrBS3w/bhx3x801mvp7iV9hMMRiene7i8EL4
8CxLYvr8qIMNT/YOT/mVk6M2DDyZTiP+fto+OuTvq2ituj3dOz7uqC4PTJeT
cZK6XZ4eYJf97kW3NbnJO/rzz/z5ce9y78i8GwZxgIB032/vHcHXH1pHCIle
rz8ctn6Az6326ekBcL94VoLp4Wl7j0HmL5OpmurR3hHCLUmlX/rl+PQAmofL
VeQjjzNra5/uAxeW8TLyJzO1SDvRSZJJZ5Knu4d76r39/YOOIMYepBPkJn3/
rGW5vQxy9TN8qvrVt5trG/rLzbZBepCFZij4vNFiPZlkqgF+VL8rTuPnEbxn
OTtwInzgdhIFy1XmT7K02I4ebAw2SdJwqUajz9DirN87JzAw3AxDpz9iYLUh
Ci7gWb1kuQKiAzJ7ipKqRo202MV+RNeRQl3oM8yBtoCMVdMgnUsA7SLPV1ln
Zyfnfie6W5J/yFZ3blY+EjkQ7s56FSXBNNuheTr9+27//p+Qw8LDdqvtX4FU
5C8nP63W49ZqOqPhpyC4O+K7IF4H6W1T7O3uAW7CEMAqiELOnz9B4fukly/C
rOZ5vu8DK87yFIWQN4SHAhSENbITMZWzEPl9gDxFaxpL1jTEjatoCMZ9YKBB
DIxqEqxAODOElhJgPRUBioRJMAbODLwsiG8FaSSbHYPgXU8WAkTXuZH7LsSv
tNw/L8h95HxXRvb/iWR/y+vnIoiyBFaSTYCZqrUYZoi4DdwUJh7Avsg5wC4T
oCUAShCJErcUIFxhxsCcY5QraprAQ/uxCKbTEHtqirwAuWwlJ8DI1Xgp6Cqr
JJ4iUvUev7wCHJk3xXeDlxfiezkWw+QtKFei/t33wwatg9q4v/Twl0kUhEu1
UoDyD63D3VMh3wH+IB60YO9khtObgJgIs2UG+8DgBmkhl2M5pfFBOsv4WkbJ
Sk4roK9WizPwkf1PxSpNQDFKIhj5BqbUveyrOVz+sf+D/bXlvQCAJaAEwK+g
jgLrEKgc8nSBqrqXqK8itvtPGFlAPVQoNiUpBTgYA5xSIj6CPHYnng2Hl03x
ov/ivEnd8OgJLCsljSgF3cCdB6H0MgQBIT3vATZJk+maNhwRXJK2KirUz5VR
P0UdkRM2w6E+hxoAwNPZOkJYVkDQq2dSiru7gUKyE2znG0b8/n1jE8VpSRVY
3vLOA2hZQX6gI8A8rmHDoV24gn1m/EDqS2insctMpmEQKZ3FYyIFfLKTO92Y
XAsUGmBR80WyzhF3wlRE4Uzm4RIIEcHiVWEN7iVQE1B4FN3anYSdpT2chjMi
zcJGARoA/gJrj2QTdk0gPYnaOJiQjYCazEJO3taAX6ySKJkDNzPgqsvWvAXf
u0MAtJFYMHsxC9MsF7MouQHVJwWVC9GfIQvzANTG71cyukUQXYIZcEuAgqcx
ta/4Xb0E3BdJOm16EvckknPA2ggGImADqFcBTESaFYpVkC9admGrICOYuAuC
Tdy0aeDFWxQHepUVeEH0QhqoZBoIJqzt1btXB4N+w0CF5DHAxQuRsoFX0f5k
uBNmtXpheqEaWkxowMZxzddAz4Gzj8hlYhk1bTcfBDLA4fGtWGdafQXy1jID
8CwiHhDGRS7atKAE/g2qMYg/wvvgOglpy8ACklMPxluvpgXQK/47CYz2HExA
AoOyhc2cVVShcjz1CnQjNN2skR+Ob8GyTMNknRW2DrjEIsZdBaaPJATrAJGX
JogqIF1lsMRFZoSOqOOR3HL4TsZ7OpXMm1MybIF/I8BkkOH2ZOsV4g+3I3NL
ulPwilNA6gpjNH3Jci7jPItjGt9MBwk1AQjESU6QRbgBUoOC6QzjpxJRYmoA
VsHNCCc0PqBEFf1kiGsL0Ri8AYtVKHXLu4TOEL7iBTDpCH6tDy9fNFAAwx7g
GhXSwE7NsHfEYGGUKWCB6fQGmU8UvmVSiLhr7wysWcCocy0gseezH4C99QEo
MpiiyJa3hE8RAD1FplrETHQmYB9E3/M4yfJw4ink1ghWjQOI7l0xW6ckpBh5
xTyBmQNaKJE9DqMQ6YJQZSkDRFPSRFhOu5sdy5ttmEq/bcNDkQETj6a0n0iv
aoUT1GyA7eNnhXuJInaeAcEAOpy8JfCMpaY/wogEiQcagfk19wHC6HtIZwFu
O8x1DIK5KIOmkr/AUpEMFyFAmwiddkBzgSXsGc4GUYhN2Ax1BSPvikol9ivf
IQqHOckd6p4UoBkIAmCLAB3kzTSnTJLCp1gPkeUK6Ds3yhxJ9AhWxSoP0gSQ
O2mHjHPIHlteNxbJKvjLWhakMIkOgBHyd+QPMr+RMraQVuJFj9HapmXnN0lp
lZrv4BpK2rJnkIC3LFwyk9PQlYRuGe4i0mowBjFMIyOIqkchbWKMUzfcE2WF
u/UrsNiQU/G+adkHqIXyB1gmUkjW8bwv0SlyS0oBwH7mK/UbGoMSuQiBWzgI
b8gQVncNH1cpjJ5Jta3C2NUwVeQcqJakipclDOZZGizxq0If4tFFrdcIBlQz
kXzzhAg+uwUsW7YKMzY4QPYvYUGG8tTxdbx/r9dBSJapzQYMZrICnQmsiRCt
KibKBBEkg5WBVA8mKYBRxLD7KUqRNWFSNgF2D2IlI9axIfigd6TkdUabm2my
ARqaOVoUDsRQ9Kzx5NpJlWYSCt6JTHMWmIqv9K6eZ550mOfdnTGiSYVFjxTC
t1I9gTlZ1TbzSCnzQUGFdaPtjSSlhM8klYqr0zyGzwdEKNkieCutSg3gJ6cA
Ah45sNYvRZVgUuoT9Xd1Phiiqk5miwfTIn6Qk2GkkQAdlhVrCGPDn7DJLIw0
vnjJ+GdgKNkGKStbk+n5N7f7QHLKKML/bjf/mOlZxMcVsKX+G1t7BeP3NzP4
AOZlc+9j1t4DHOUaUQjRFBuf4RA0s4wNvrdA2XiYkInai1eDYa3J/xUXL+nz
1fm/vepfnZ/h58Gz7vPn5oOnWgyevXz1/Mx+sm/2Xr54cX5xxi/DU1F45NVe
dP9cYwDWXl4O+y8vus9rG4ouW0/EI0iYAp8gpp152m9ByvHj3uX//B/tA+BF
v7t60ttrt0/fv1dfTtrHB/DlBihLmccxsG7+ivzVQwwIUCFEDAFuuwrzIGKk
AiXhBmxJYAnIB18jZN50xO/Hk1X74Bv1ABdceKhhVnhIMNt8svEyA7HiUcUw
BpqF5yVIF+fb/XPhu4a78/D3f0BlXPjtkz9845Ejp2R49M7OniPPRzczAdnX
Dmf4FipLILd+JQSyB7ZFoPkyy1qBDB8QF42BLIO+p2qbZyCwohA2hHRhJNLr
ZBKMQSSnt9qJj7SKGDDTxpG16ZAFbzCfVMKsWBQBDi0zUXhVG/x7ZPBrd/L7
954yMmuaVpGGaw1NWKXzRX28mKGQ2nIGWTyCBG6OLhOwgJDhpmvypbS85zKY
gV46Va4DFJvIO2pXoCym0xqKG3zgx/51EJG8AX5RGwZz+gk9+z4wU3RXeMQV
SDiDQlfRpT384HeXNz66AOHdr1n3WCQR7stcEpMx/hRUgkPg9novrcKTxSEs
0FiumdaklZeJNjuZhCSMzAaD0e+joRGxRgGd/vWvf+VzDZA8IMoeCZia58E/
8BGPQ3z8uEPHGD79ZB6q31MCFjThH8w6Pf0K9okfTUP+wTpAd8S/aFjidHih
aF1FwIGYCpQFMCOPDKGSel9OFXnAUu7uQFrkJLWAQBCB7+7egYCCLy6JOIIb
toc4Plt3JPnwtbJwNKLHWpsoVHH6AMrbDSIgvmc8dSVfdJMsocCenTGxkps4
5F1kia2tM20lua4NPAdPpVFdCU2UG1/p0OyYQLMKqdkMhkKLwd7yzOFh6bCO
JGSYTdZkShC04X1sRGB+8EAwgdCodw8cEtE4yi6VmfLAmLah5vPU5yyc094p
xMC+8W0CPnAZRCe1jbQxyP4AS+BRKkE2ZdpzwfM1Wrf2gOG2PE4U2o8cTB1R
lyMHJUcWYlmwhPmHMpqiiYw8hXW1KJwvcuOymUijmLFibqE1lkCeLlm5NPJI
vPaE4LMsq8jDI4oS0Eed6xTP3lLASPjlDzDQtCPWIJJFa4wG4WTJb73xPJes
3L7x5FOf6vi8G/QOUFrlsLc5nZx+aCyky7uOeFDaNIB9jvEUfgAQih/VIjnL
6QSKzqoe1Yh4p0YV2sSJGuCM9i7nQRizBUoGEjLrJSqRKVpzMPh1tgID/1Ft
F18a4cRGHa8jzkNimcDeQREVDDmLI+wXdeWK9mgCYaLr1hpYnuPF9ZfkyIWJ
QLN1rKxPVIzmZAe5WjUdzFSoml7/zPVyt/da+yT3cHtIaCC6R2g8pELrN8jl
1pn2QypqKDgCAblGtHG0eOxiyxmWeQ21uAkCXE0W1QTqwRXOGpkVyFve9+hR
YMaIk2A/Cb9GBMJTHkv2s5CmKB4TAjse1ldXz8mViXYLRjUAgc3QPlgtgjHI
Lgc6hwQapgCEvLayV+yKUi6qILoJbjN2HCIbBlEG3GSmTN8NCChORC+iFnRL
OIItNA4IsHsQDRqFBSPD+aQFB8ybkIIU5uH2ABnR5pCrBlcHAwI9LYMVc2z4
XRm5bL9XzJz5CnA2bxKkaWj3SO09T6klYAzk38txGLPhWA9bkpD7Vs1duYK8
NvG99mETeppEa1hAgwEDDEtiTwRgVivpXAmFmAItExv86K2SnA1l+DGAUedr
8kGzdwn4cIiOW+N0JB4ERBlcB2Gkj10R/ZS8Qm00ZRV2AtwbJvGk4EggrySx
XiW6J4AfelKIK56lXh6azDLENnNwMXK8zDtA2V9NbvIRqHJ6aQxPj7fYcCF7
oFVhr5I6Zf33vFc8nEeuxw3nBgKo4ALBLtSOkswpzJK5DccNfIVMfsSqp5oy
vaCW6bgGcXuyBaAMuZ4+eLzQ8p6s6TixdESxDG7RoCZ/ropcU65mwmlGuq8F
Hy1idIoPj33YYa0YgG6stAKjHYNOECjDGlSMkAVtmKIbAt1PyN7ZVb9xSF1h
vANHtcxlNLyoN0aszpGDpGBrdEE7ho7eicfIWVR8Ds5zgAcF2hNipoBKBLyX
koP6x9fto6OTw4MjMGmbAj8ftfd2Tw9/fKPU8G0sF3CQz/4+wHsr1mQO/z7I
WsjrxBwDuxle+AzQqbMQnAFIPlw6EDVPVm9KWLLGjCy3loyGLshgi0BLcha2
vJcxe9fJU6NnSsjPvJL9I9gCzXv+pswM0sS4H5jsW3XIUdwD4DLxiFeOKtwS
lP+UZeQIGoElQfMccTfUC2vLW3QMx/yp2KjRbJmrwUC3BYxzx7TamzPw73NQ
3eGtb0DVenDUgq/f1ElzEi38GX9qePoFtMKxRbltY1OR0sD/G1UpvbkMXNSM
HgAdPktuwHgRl9F6Tu4WcQEUrZp6eASC5ybwOLaP2QtXBKjcYmzxfo+M2TZi
DgwAfyvVKQrKSfQLTrX5yYPpw8DK6WvhRcEvs9K2J6l5gNAdoXegeLwI7LEy
SEgb4aPlra/DeEfKJeAQkUHHERH/MRD/6ahZWOUN+b/dpQWZMslRR7V4Y94R
O4+Ei0S266ZwpvON5znfAGvuYOe/qIO4+inGBXVEe7chHn0jMEhKtDJgLKJ+
0modHTS892w0mxNFAkMdXvNxRY0qiHx87af7h5+39g8uncjB9vwNz/jBg1JM
KIoN7RjxvOfBrUyNa594NPmklqskC/EAXZ3kWiUyE/utPWq1r1RtN6ZEzGUs
KTjCnAqQNqbO+TJ8wYh94AZ5KToESYG8axM+pVZHw/A817rHOqbz/Vgd+KlY
DD4eoDP0+DpMk5hVgHr3vIEcnfpBPrQeZwoWijhQsqcYlTsBXUEyA+6eK41o
KQPyAZCnm0Zg8QAruoGdGSdJzidI2BOdQvcuX9GJUYQvMXv+/N4CMcC49Yt+
j3jInK0itIAue31gAVGSq+gwVN/AyPtbJ0xrfpiJp5ev+NCWDhV0iJyCkt6v
pnAVU8T9RbJMcMNRPTV0pU8ZDT9jzcOKuu55Vo6isxFXJWQNVEwiKowo6XAh
6MXLYEfxKD+yzjswVNDGVXwQNGF0wC3YMlnHIR7mugrhJFkZBmkHxTO5CI2i
+QKYYTgHjb98NKrP66MS6VRSDp3joUKtxHdpecrlFkyDVa6OShhnzCEhL0GF
frPMLe7OFi1J0ZVl3HZkVkG1DQwrokDVUpRlWbveEpqJa8b4yZbX1WGTFUtU
GwjbsgRdESbt6D2uLcb9AalT7A8esTmzRBvt1toH+gwQfjEMRXOrLMRHASGm
ch1uzKvu6mbmJ2RhjgpnVUS0KwGe5CrgQ0G9KnWkpXR5VqYIB9QGBWIEDHeE
jAbmry1MzYN52JFmbk5eQAuYM+BwppGE9VNgabSt5CMxHjKaYsGD0WDEUXwP
l7GMJXDNcKKiij4UGKV7LZCFC0Cy0smhB2NEwHNy0icQDLRMBfJR7aefYKGT
n/LaiM7mQtw3mhMju9YfOYLEGvIcrsuaUkJ0HrnDI5ZsOHOoP6Z73gQ2zRWJ
V01FaqfWK4A52jaA1sk6BZzvW4Ov/uqqr31UauMdc7D+sn+mnEzwSTjek3GW
ROtcqtAdDI0kjA0xOmNIXpu+01xB3LxF03E8NwdK1q7TkLxa1eCdgWxkCgcK
CKMg5QhscsFpW5YOmUUpchW6b+1ZYc4Rlk0xXuO5O8bBgnCBFdCpBjnRFU5q
2tTOFvQXhJOMY7Q2kZIdzS8H57DsObDXfLHMxM+oybJFos1tnjFGqAFfYee7
O4OmZhHODAqHD8rfojz2Fm0yYG9jYOf1XLlhsmQpSTiiFgHtIo10sCku1DK7
QuVN4hBcNGgVb8ZQ7ekO22U4eIMZMJ5MsG6jeIG7Z1o8uUflAUAdw4c4frsU
0FHOeWuKzX1s230k5wa5DQYhq2IbbJAocrJOM3Qa1DfkL4Ipx8gejhVDl04h
pJFlSQTYlhcgPwWWssCJxKyVbXjrnW1hRfwPwkKmI/4KiC52RBJO4aevQEsn
uu6Qa5F0dH1CBpq5Vz7r+pwO6+iI3+F+qWNzCPe+wox0cOlvMiSL0GVDUpxJ
N0irqynDA1WU4sVvyRpIkS/q+CfatWWCbLReCAtS3iu1dY5bM3ADf2w0SaNp
2lP0HpDYSqbIfZAg2z55RqIkeRssMKKJCA0PYfFQfQGqIrsV4T11pqajKOm9
8RqFTKt0prrK5Hqa+PRSGEVrip0iNwO5VShKkW0dD/kZzg1PFM7kcv2uPhav
32DfDTpzBpUvTZO0QfsNS49kXB/DLj4Su/RIwIzydRoDg38bJzeYdgYg57bj
17tvqOW7kz1xf+9+3y9+P50VO0O+xocr2J8AES2LHU6DzRfABt/S+nBcbI0q
xge7P654wSJW4aU6vfUNvhXsii++4F5+j9/HAKjCMscVyyx2i5ArAVTZxWBk
prerPJmnwQr4I+b35tbMIr8kmJ3U5L06yNVmGDJ2OvlDhFNOKjQ6bHYLyrAp
qNaFEewZK/6uch2BmAaoQOlzZkRrddiAQgd/a8NEtOtXUfp7Um50e61tsb7v
vI1no0kmkZ12xajUBylwwN2x5U80zsgGBFjcB5shWeeuJV/qRx0xqtXJqTo4
VO6vUmPfNPMXU0yAXMfOi+XGzo+quQqfK45h+J+gHijEVh9fvrGhAzpzQZ/X
aC3U+CyHGAGnziA3ElNb2yFQXJTi5W3kzMipP/D3NSoV0HYP29ZcVz/0Sh7+
GjD69i78QdtJfgttv6SsyhYbi8j88RuLVhQsHwGhmtxHOnF/FFbaeE4z+AHY
vANcPYpYcFgRQVkdKbH5qrfGalKFAOaP96KUX3Wol+szluIhiYbcSIfTVp0X
DB+ftVveS+pOjWT8vJl40f0zm7hTVtRImeNW4zW6MouRrUhEb8Op1o30kjKz
aiQj0HWL1E5mmaX2774fWDLXmgKRuWlYReYmJGVgoFuHrijH5uebrEj5ultF
+TikMg8+h+6dQB9EpZrZsxrrOqI1PjpYg8JKn7G1KL1ZpJcGKz4M4E/vo4TY
DZoKU/j2TvTb1NogZLE98433H+YbCHfDNz6DZVSDQIMSCEPNBb8BvcO3DbaA
XdSIhmnSQL30gqX9bSAytF967/8qDX+ceHH6o/8XxIm2DxhJGPrUVKYtqKvC
BC4+oZgMpD2iukHBTHQM3+PWnrJMiQLBqnoGBgYlnzI/Wq4CoLmt72t7iN/e
cCypE9VSeDIqzGymYqAafnAC1e4e2Ag4OuaZBROMIUO9Ol+UMnB1rHNV4DX1
bmOvqz2ieEo4qsFWgrmojE7cEHQrEp/5zBhz5Tmwlgl3l1NIuep/Mw6QTqF/
vslNxB89mOCDjSg9PBk711lBV07JipILiZmwY5/oVWKwCDspNI8IVGyZ4y9r
fWJnvarOSvbiiLxbTgjdZ05LBbi1PqGT7dMxnWzDR04DMNV/7h5Q1KXn8cHe
rUnjG8tCUi68WYqq1Dl8Pcce1HIU90viMU29N7jKyO1lhu5tJI44HVxJDGum
vXgecgdXzzONboitTAxEC9C1cHDdxDxTlQeVcYNuoDwrZi9unwmMxX6UPKCw
FGiqGcARM4BCUkurZIMUwnvJiant44Lnnz3Q+LtJC7m7W6XhNYdtmghF9isJ
/CWYbER+Oo7rqkBZfUjBS3XzT8pTU8xbRxpVw6fJwAHoYhESBC4BDLaguk+F
loa3mxQrq8xseEFZrwmyuNX2wqm/kqTRiJePvzvvDUX/7Pxi2H/SP78Snc4j
T6vrd7BhSb3dcIby3bo79f0GYMi0ftTgVIlY5tDas/q+DretHzYcaxG/4Urr
x9gzzAWH2D8URjLbvExYrk1GwEUvg/QtRjJAr5gSR45OBeTST5RIhac6mHmh
z2UqEpTclDYcOMtUXisyXTBlOXQy1W7nYILOj2Yx1CsQaZi9ZZEbyTlilM6K
wwNUFL/q2PgWExOZvqmmEKfNbNlkE47rRLvfxnnwzt1NfA82TfSevcR6KOwf
IOXv1fDJyYAjZugh2Y4ve8PzoRgMr/oXT11dCLvZVH9s9I4lKQSsskz4qIUj
YUye7joHUftLVYKnmqJ7/HB2bs1R5RGz4YbKI+dOWYtCBFX8JycoUR8V2xws
EnPdwQUwF05nBoYMIGv7iisX2IuKm6YwdX5nqd65oxpDwDr0yIWNajp7o1Q9
k/4kKbUtzBaGe5oiQ0ZK+8XiQ8T33K09h2V6v4oSP4kGYez6Lrfnb6RPI4zr
YDo20K90dv6kf9HH7J2B6L+4fN7v9Ydi2H06IJbx+Pxp/8Lz4IeXV0OsIHb+
w/D8YgCt4fOTq5cvSMT5PQoLQF9h5mNdOiF8H2PSBJZn8n41z/nctZrV4s88
N393r34IDd+Lr7F4Ce22SVv3MAnTp0d6eUR7SHSDP18Muz9QYJGwDPVMPP6z
sAz3/WafeCjlfZgna6b8a2Dzuax4c54DYj3er2Q43vnFmQ57ecC2Qa4TPEhb
pqpOI5vJpNQplcc08jxHa2idbOgNTrUfFWNY2U+xUhIfaZezRDeEaMtwyopq
GcVZrNABj7E0GD2sYlpMKgj2AJJlCRKrGHruaFyU1EnCY4KJaBuhCWoGYAjg
mbQTjc1+EoKidrnCJpJtqDIw66jxA4eFURrabMx4CfKd/zOpd/RxEmhlhL+S
cUGpcyTqqHwG5ZpSPoF/sRHAex1PW2qAljrt0tuBBS45+Ayz3D3O0KZgDSwN
OUdt7FMjYUf7u7u77RGFbkuvMoSLNU+O8cIJ3m6NnQ0y4eZ5em5+G0WeRErO
KLDNYL8yHa1Dyb10UE72loo00Cm/hfo8uGs68oNCrlKJkTKbRUTZ3Kjyv9w9
4O1SXhecJuzF3HtNrpVP34YaUmutvzsL/vRvNe1ARuJ0fcXumJPqMWkbsK/F
w739g+NpcHj4UHdX4XC7Celk1s1hUmdKJ3sFr/EDAFga3Nb3iJW1T8Xx4X5b
/aJTUuo0ODU4OHBfJe9W/UDzez0x+KX24OmP7866r2o8w4sk1+XHNpB6I9bF
LKcKRohHTc/1yYQzFRxHJzI2XQ0sSom1YzQZc1UKwnOviOcZBb7X1zEd29sU
AOARSYh0TNGOW5JvkMqYS8hY10JAUmv9JphTsdtl5LHh8MxGyuNaSq07vTX+
BtSZBuJo//jg+Cg45v0Hwq3b7n8NgmyhCJqeKX/Se6HDEGC7FLFgcoDWN8Ns
I9xAGa+95Kr/AsQSABgLbtjgLkypnVN+4gsQ2jPQKm1FKRU9oCLqYjsPzlMw
avRod4yHKj8BjbRHAvSEpp4mM0KFjyVOZdNAPi2b4+P4tJHRoTBoerrbnh1N
904ODnaD3YMD+n4In3YfYoP9z2Yjv/8d6C8zzCX2b47b5JLeYZWWIO/vtzCv
H2Dq+xyFe7L/oYOrTWa0TwhzfCLa04+/go7n+t6pxrGj9vHu8e7R5Oj0aB8+
H8B/Z0dyb3a8D5+Oj+TR4dHB3hR+mx3vwZPp3hg+7+E3xEqAp/cBgBKGf3RO
Duq39/W8tu+CfacGJHH64xq57Y/vnhz97//27Y/vurtn+qlHjw/x2bc0ld1P
gavLxxvV1OYcc5eCFQyT1YGAFe8Q92HmzgFGVBJkM6pO1U/DlMtAh1t3nFJa
GPxjwrC7RACPt5ULLLQWPZ3YPA8xV69Aq268kZsz2CdRwlTl0YGJEy1TA87W
0bx5kiybWF20Y4JbfT0yUdiOnUgXvux26AjbEdkFNs4PsNbwm9LLj/F4tiO2
8OtS4x582dMj1crpZz/f5DUzssT/qXFPcFwTtVBSfT4RDba8U4UGxTpp6Ms3
O/xZkFeh5P6WHajZDahtg4m/nmR83MWQqMn93T/WSrthO3r84Y4Me4Xfk67b
jQPcV6xEfPf9cBs8MVOdbSnlIuZQzbLHvVgIaCNGLVYppj0+vxiAMUQntmBS
dBwoY68dZVL+apBXA/3jYC8CnmGmgF8N/o9vgLsFpkOM16EdDbMM12jC850Y
tmmAEcGMQcAwoFkbaPakfbp/sutE9pg4fq6V8qCUqPR3V97iv0o5gP+ExLj/
f2IvPQs16JMjCoJxPBP1Yv0aWD9wXPeR33188aThlTfW9AI2CiC7qL3u+v8e
+L/s+qc/+W++qiHC6uG+qFOkm9JIfQ7S6YhdeOqG5AK94BNFWR2BTsbiKQDJ
arzOo4FxQFsw5JHafko42/M8LHlanmz99a6/96ZRr//4Y2u3cY//ed32T9/A
49M3XzYaX8L8N4AAvTwsPgbO8GjDAP2yLr4cXIra1zX6rwkPEA3PfqY/mBWe
JYvao5qoq887gm7XmGowIxrSD+bvkWh/mWPpQI/+dX+o/Q5jsmoP6N9/oX//
lf79gv798SH958uac+xDf/DwK/rJp39b9O9/0L8/0b8j+vee/v1rxetn/af9
Ify3+/zyWdcrrgDm9a/v9vYQLn+Z0jaYNa6CEMBCP3vqN7sYgN0O/tTm/+z7
h4/p0+GZf3zuuT3w2n/8EaFIb/2p96x7haAr780jwZVf8HNtp4a+PvMAAG1+
e4SHSDB9Ysv0o9uy4mev9GCzic9J1l+2947Kv+A2ZuUeVHvoiICqgbzRjF7e
aIYbZZGhvGH2T2HJF87u633fMtIjRpCvRU9Xr0S34AwLdvKMp1gqiNIwtg+L
f18r9y/6XLEKak53iHxg1K9KowYzpKQIs2WwwNhnD2qqak3VUR2gw2wWvvM8
BiHjFWDc/q6/f1roZFf44tS7fDnwuSk3a5ebtakZb4zp7aDtH3YJk4/a/nEX
mnWh2b+jNg7//cUDDDY0gIi/6zE62yfw2nlhnBUQGpdm7A56/T5m0gIhNLyH
GzGXf+8Bsf8MXzXhq/9oMY1/z2GIWnnvFwuQD/i6meLxNGuzKoiPGqAlxt7k
craPLSZNMWymaCEFiWCfbq0ToTx/eKMAvrlKOEObOoHGusqnf4b3kzU9OinL
bFleygiDl4KocGyCxp1zeY6uacZNVjrpoDxzfQamV01l8lWSPWYYZJifTnVz
6NaIkCtDY82cLLSl2/ksC77Mge2TN4XuVqMkhasnPbDqLzEdko5gnNJxUWhW
jvk86B4FrRG9Q6UK8RT0oUuze/jjraty6mAcnCLWl6EKQHjKjwXvhJzN0EDW
5164GTHlf19j3X9+041IUW5NCi5NpZfrLHHMcI5U6A8Bw7k7K2sZXzOfMpk6
BSoZGLP51KkhBj7hLXIqLg0rQQFiBFGCgPBsvaINJEtV+Rpd4bvlXRHx8+lW
ML0OVdafhTKnTVclp8l3AHw8XXNLxJRRqClqhB03IdbdpSz4FBR7eaNLImCy
F75LudK43R5izByM6LUsRnhRTpQ6aFXp2ybWZixjIBg6q03Xcczl7qey6ala
2cGtzdg1Fjs0Rj5LoAJjAPbS4gtObSblFO/SsGN5dMcYbbep+O8GntKNN8uA
C3Sy53C90gFpDnJuLFqVpSbasXgUEO/AqUsPVlfjU8XLNKEj7j8BXMJM+9Tc
kAJbgzGSKgIGey5SBDwp9wSI5D0P4/U78QRjVM3dCtRokdDlTrpmo3uZgL3w
CR7j9X/heqlChbJkluPtAk3n/ddv6vpqp3mYL9ZjdA7tXKtJIN9uNJ3YHvE0
iYJ4DjbT5C1fMYCuQK4aXlkmXwf86SrWzMZKy58kdDVCoI6GTc17S7vmcB8Z
EfdBW4uHOlyGlNKMV4tAFcMLJzLOyJfZhbnCk73Wrmah+k4KHQSsLi20NSP+
fR2FK30nSMdzYKQB0/oFm0CLnOD1IA7SNLnZ4asxdvZP9g/3jjDMZYdLz16q
KMleMUry7oEJrNTx9JXRlMUoCVMG0EmCVUETyDlmayqpZi6o2oiDwDrK6lYE
czx1CeBIuAyESgunA/6+QwD1y36/oQvFqygzOkKdFcqj4zU9yZIu2MmcWg+V
Fz5wCfAmxpxKU+wH6zERf4Hdx0gwrGuhGTDW0l+FxHO40hfFElKyKGDFUyrL
AmtwQ+gyvlZGbWZWuNBAhxbKd3SfhKnbTbcRyWiFOQMoAukCrTAP5yr8PVPV
3NI4o5oQ+vYMXdAC9iFUcZMk4Ndj2AtKXnfzU0nAZCg5jDJgwFiUYMV7ANw+
Uo5lTsw1NdgjrcNp1KX74ZBU6r1uo1wzI4hdbgjs7S1XuuRZR7e+uvKNmLhJ
gHAnoSptoFhRkgeDhKOEq/urgGWjVpk7TkxUaZgW+wZAsRDEhdn6e88GLzCm
EFPjV0FOdxZRnrzMJ61SysQtJedjTRMSnyDwUUcos3QOJNfr1MhEJNO1uqsS
b4yDhJf6hdo4BZYGNJDX7M6p/AIVmDDVFem4hM2KbqvBy4c4iLlwT4G63oS1
TSRQB8SXdCUSBrqgdstqEtccAk0sxTuQCkFbkzAF2axjY0B8AAXaem+9LmG4
jlOlWFqqR6QKNCisdCbXcoI7KCYVPQtLDtOUpTs67aU7FCfEMeU2ipgXTgHK
fHrnVp7RZdSYseub3YocRl8goEP8YdIUq1UOfn9g7zTdYLu6CrGSi1vKF5dK
FzvlV/c2OK/iB/rocVXIDd52xdgmqy6eINlCTpm5TEZXxJSgViYK4iy2Msmh
LFnTYfcRVWPhqhwqjXjj9lQ8KQZhYPOZOURR1UQw26lngMq9k7lMh7T6FgzK
hApNvIUFA0XfuLce0W1BH6tUbe4LoVggrHykSw0Vs/SxbXWN6pVkFk9ml9Y6
sP3SllPElB6QkZTPYGoSNTUmGtmh+RCS7/D5gBJHOMJRVUI346qGOk9z2NAs
klxZeItwznVHcsfKUEVStFiFffneCmqnSD8naBRO1G1BpiQ1JZvca5RUmAyV
LuL6QU2+OQFfjMt1RCnbRknjQkI66QdjSply5DPf+gYKIe4TcrtUrqKArvYt
Hg0HNB58IstG1Y5SASlBrtvEdHhTbgcs2cEx3s4KNDO5HWWhue1iKypfom7+
CKKtrMDJZ3FqTKn7udnWUjxFVeOH7dtWtKp0uyAjmQ47deCNWMlkUHhTFyA2
LhIyi6vWULxLOSW1O8kcR0ahnDyNhns5RWWcbm4AmC1XbPeD4NXWtc5uLRWj
D3M2LNWtf3SVFkWfTnLtWDB+EffSJhst1cQqS6YQdsx1L6qBoPiRBkDV6jUG
c94nRSXaglBEJKWqfKUsNbf0VYDFIGyaaq94Dl9/1esNbEgZ3gmMEqGQfF2K
ikV8KRVo4IsHVP0Ie9FAuWIEXj+rVJJSdaBPqB/RqqiV6MhDXTCxX1XIxSmL
nDsl73KAnky5HIqt4WJ3gWv1ZaKu5bUKCneYNBbWAV1Jp+KpLhwRU7eyPk8D
HyvhiXFIIc2NZoH/8L1SeMMgUNYSXl8RipWW8zAzdxx8xm0JN4sE73dSdVw2
wFNxmYK5SGGzMg5XCVYMzDpVjZePxZ6uQFvJvGjaho1gstYCL2vmmkowkUJg
YqVMRKtL5nyPhIpPMWNuvyP5QwblhpwyZeuMKLChYlQIaqOYYLUIa6pcMaUk
c6m4BLGO8aBg122O5Uo3p+Abefl0D4jfUipXqRFuhFlaeS3LM1DQgFnyLV1p
brUWWgjVL0JJyBx3411d1RMFnu1IizvEAz0z6HdzSQ4kUHHRF3s5MCvxN7Q/
l3j9KbqJ9C4hou3gOHy9CJUJLSG2Hah0vyt02FQR11UMztGXNzwVxfU513Sy
DofUy/7EhPOHbRkBuoB3k/xI/nB5UB1nrq4PxCxDugHYyUMByU3X1vlgsL6l
gtja9gSALYJsUcYodX1EVS3NXoT6nO9cBIfx2s8H5QKUDOQycKu2tpT+P6EB
aPts6DwO4NyHOdYeYi1dpz4TM/z/xuEkGrtsjd/c3V8nriNJQ3a9FdDGXI9r
idUyKLxuKIjXs4DOb1Oywfrdi27J/vK81/+RzoAq3gh1jqDIRNTu7r7AK93f
v6/ZBAFMblMCkL3ROq24kOtj+yzeoGNqMfQuu6JObgYykshpOVFVJG3OYRmH
/9D3z1pj9BjEMYtq8kD6qtg7IDJfNMCmia4RveA7q0QNBq2BNaZXicXMlHkI
Rv47/t3CVJffm6qwcy6Gx6BR8imcrqVzyxY301DBkwwA99e6uhnRa4xHEVi7
Fo3JPMzXOvnJqa2eTEA4qOtozOGXM0PFOQ20xRMuGbu5NNYRpNIzQE3isqCk
LIkr9xLJuwemvgIoHIglxC/JnWX1Ga71zZ3YMMkF3oNVqPygLhdkpaymUzRu
YQex69aEyzq4Zaa/VJPCCJQOBfPpJ2f2jK0jPnovGLxmwjIrOvujvO0g7u2d
nppnnHWL8S/1rNExpVeb6t4ojI5vmqRgDPb7EgMs8DqBHmc8RzLt0KEV/DIo
HEaeqS2ijouXjmFKmr0tTCWlOQX7KQ9QkR+HDX/C9v38t25fsaTH5sYpNCy3
o8ofTjOu6qt2+ef/1F3+DbZAA93uwgbQR1/9fJONxMBGwXDWqBioKJhKWOvk
Pw4t5i62BdJoaq5tG0MWCeh3BFsbqejbjn3uES8R1MW245iviC4cZFfeNbut
uqpRWYs3sjgXWnxCCSvKjb3Si1DRgRle/jThYjrvPUIJr7O1N8/7ipeHjRCk
YNHraMkMn+nRPM+UgikKOmx0Mg7zr/UVKIGbaKPdnTT+SzaKqFow6YZpyLzY
RnhqAKi+SORoHXJqhUiMMRLjW+vvQessmYr6w9bDhr3cuOXxTYNoDATK4Nmc
fbwTeN6TNJiTLHUKBm9pusXjir8PCjVc27u2YBFHb8KssBnR4fdPsc48HSZg
UIGoo+b4bSjzWStJ53yFDZ3Zm/G6YJeBmRgEc9vM8/jgY2eTcnEgEFl4NjK0
+uwleimmgAADUcd5NMT36mz4KbKZlkf5sTwyxh+oS8hVGQqtmRJtWk7ZMpk4
lMRXKQPtDTdbOWkxZQuzcwuCELoGqtXEqjvM6I47JgKYx72dxr04Q4d/Hy3p
ewDjEqt0TDL4bHPU7r173/w5H7d/xhEuu8dHh+J+i1QzucX3H71v875Kfllx
9UFWCnOn2wU/6UrPvk43zCzHUDujLyXSwUQFRm/r+aOQq33uYJbJNq1Gt0qi
cHIraucYApFjxaFQ3tSKRbL5gjOcH5fk0QWI2LGCJY5DctmRAYU2hrNAxTyc
ZHGtCW6ZvnsrhjjZuApDFxky8oKHLpdb08SWVxBbpomtJNSD3OAzjmi4ej9m
ARQ6db1QmhP3hiEV6O4eTKUfOm3VYY/kn+kokH8sEtm1vkR8wp5T1HM5sAYA
Q+EpDjMH9kJnwaVL/LbCshBJpi5/QkiG6P1ByVO8FJdvuIhJG8JArfVqit4n
BQgjv8mIxOAlrE9AdyAWyvAbuJJHVJ360UWIfA/ie88giMrcwBvntM21sTgK
8QGz0ZT/19X+KWFW3U5XvvC2RUy+TBqxEsHdwo2LSnvQR2nbbshSx7l65nae
iIEtR1jzCLaqON0xYi9HxrxvHaXV1Aat5uBkWlLEClaSC6ICa7foZ0DMd4Lb
Al0AhmBMbASaMA7fixK4kVlWw2Y7O67gvtt/Qb68W+hLpR/fFzjmvWjDk8Ll
cuUGe9hAuyvKP+7Dk6osznK7A38fB3oVG8O12AKrkbtQM+XGi6zM8Oq+2hqt
5emrqy7xCCjjUwFX7HreY46MJ+cKOnRDW7zc7KQyppvE3FHz4rNVe5uJw95e
r5yhStPUHVbGWaGuwgR/M99hz4J9tMzmPrpcd8ZRMt7BouM7zjiUjG3QP/ON
nF9OGzj5YlUlpwzdSjNeOm8ooief4IwJDOr0mHkOX0FCURdVjm13/Y7CMdzy
kxkGT9gTrA+2pvgXzNVHBcjWfVKXUUt0wPCt4EZk6jgkZOiaiU9gj/D+R0eg
UrBGYYvZ15G7ziPAFkpKIaM8+2Q1zFoo5nrDmtPPB80ozQwumM6Hcrmik4rf
juRHtrDx/baKx79SyVKDUAHWqkH0D59jBttuMfq+eu7qh4pDtG0zRIu4aoL8
3HRk6ihvdKS50jLfYEruliveUw3ugv1JqWpaAjrNwYrirCbzo34fZZq6hsOW
tzW210t9r0zxtxFnKI6wMEbxvIoM61hLXXV5uMBqWhmrChwHiwmd0yTHWHwM
FF/CCHGiDhjYILIJdCzP6FKGjLQvrHxF18EIsDUKcdPmOhubUa7OdZ0D9lbD
Ma4nGzYl3lWbYlQbXk/nbbuGnG11c/F4yeeyYQVvvkzgvVzrSnQFK4A7N71t
xo2ZYGLLLEgh0SnyTYz41YcSSviqcGzDCHz2GKqYhpRuruIKTJcqgpGG0tVR
uRaTTAuBt2yePhsOL+uDRpMK3dAHHEjdsKmzz1HBNEa/cw/QJmQoeop9RxT4
aexIgPFsswcVwGAMKYUBxUwRTAJqifpFstmD4uNqREQzZuUUQmZvl6noD7CD
Q1zFFwLv74hMaCdJDXI/0Ls6vMqJE/xUtwTjUswlxECFw/d6L1+8eHmBhMv5
cxzOG9sGcRLLsqNiUnBUkJPRu9wUo2ZycbKF6RD7/RVM52eKaP8n06lkOuS3
g1FfDZ/4J/YWW8zz/icr+i/Biihh7TdkRdzfPyYrIpXt1+g/8P4/IisSohh5
PUJAkAExcsYthlPTHYt8gScFx2Wqdh7FgWd5kuga6qMa9Ya6b7uGZdn/qWv9
/TI4hsw/HudAE+3X6DB8cPePxjc+SMt/x4eS/+Qr/+Qr/wl8paqw6zY/XyGY
wjr7Nsommwtta1Wdl4/3bFs8dgpIQ7w6Hwxn6whQxr3NvZdcnTcQKxQ3qgh3
Uce8VPnetKNCcPeFMlHCfIX/EjO4x3rPJR+jqHJWQSMf/ZKPz9q/3ktYZZja
Afb+Fg9hlYJpu9z/VO9ghbSxvRx8smvQvSFVuwYv5E0B7YTGDI6wXyWcbNgk
GNO/e02eO66ehndCM/VZicKjvcOjVusU/kSKZFGIeOFw/Lg0vEZMomSDXeZq
ioL/uzx1867OmKYweCdxdVXor1CWm7TWSs9Ec4ubtOo5eXwRLtUuXMcTbxKn
Mh3TG2yDBdICR6FTypONN2KuTznE6gjCqANmpc3CQWHKQnqykJO3oj4NMe0F
VHE6H+To48pjar7BnALVhovySbIKqC/EDNddqmDWr941MzTKhLn6ux7r61pA
pWjQJd58a7O5ivvVVZ+PQXDnBy/64oIDXAsHZ5phYuyLwcftN4ZX3/fh1uu/
u6ObRN7bkDQY2WgAhKd4rZObCGtuU6iIFXTmbWNhsmVoo3U3YgzcWMF7vKSY
9LR7NzrQ5ZYZH3RifIu9b+LeruMzGEP5Bova1ugfLsHxCXAuXNVSALO9teVj
sFZv21Cv3wLOnwNc4HsMXfcOFYKxu4hPB3QBKArOvu8LLCaCAeouy0T+8irT
ZQDweBRvxV4kN3miOL/NynKJn1aywryxeOpcOEcZfZ6+HU9Ro3N7GjTRdd3p
MuoWMy51HW8pvUEFZTtDcHq1yYwtxHy4CQpUujQIsus5V2Frlc4NW4VnLWqE
24Ja73l3uMN11e/pmdKMAOTcyvLMetagJ/fEbPm5bvWVufWe/7BVzpUahe5L
jGDwr3z9j+8/pGf6yUNbQe7e/FN8UmjR0t3w31e4ykKLe2rmrIge6hYtvw7v
4BSM6ODZ1BWA9AuiLFJU124jWpqzMlrbRqPCYuzn6kbXH2xU2uFWVaN7LAuR
oBLP+WP6cakR3/nBcXtiWyMM6Ht99aR3und8/Ka6kYbBVxYCvxIEv12jzwIm
gnOj0Q5+1LSMfzuFnq7x/6NyPw/VL17FGNV/gHo7wv1zmEnxb8fbGK767yGX
ju6IBwVWJ8AmxcJIvmKrE/QNcGl8xVufJTdimIgeaYKsQdHht3i5Ah7WxxIS
6rYcMgexCoLxkCfYhKpM6BAqJ2WndDdnkHvVNYrAKFwGmT8DNRqQWEXPzPJx
Voqe4XEabopQMWtF1cl0IkUoc6k7wepwkZzO+WbPuw6LNzl9VJsFUSZrKqIw
IPtUX1DH14tgMEgQv/UepyEsphcsV2OsdOP1gjQS3wPBBRNJ34D5xOIxJxg1
QeDc9ZN4/b/+u3gRLoJoIoP3YG15L8LJIpCReNwS34FJnOETGOXlOs5gk/IF
fE8WIV4QC5BseldrMN2fJesskrdUcM4bJkt+05uZumNc+ou9FNl6PgeFg1xH
5ctTuXhAyQlmyq9RQZZoo5RdkoZzzhESVKZrfCsG4RLaPEmTjJ0JABeQLuq+
2POKyt0oIZSnrDQ6ZV4H5OQGdUNy9iY5mOZcAsi5PQ+1O3cA9lxkhA6YqvSm
Qx72DnwlTIHvLw16dgzOdCgP7Rxkb5J2vP8DUfy8YcK8AAA=

-->

</rfc>
