<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sfluhrer-ssh-mldsa-05" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="SSH ML-DSA">SSH Support of ML-DSA</title>
    <seriesInfo name="Internet-Draft" value="draft-sfluhrer-ssh-mldsa-05"/>
    <author fullname="Scott Fluhrer">
      <organization>Cisco Systems</organization>
      <address>
        <email>sfluhrer@cisco.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="4"/>
    <area>sec</area>
    <workgroup>sshm</workgroup>
    <keyword>ML-DSA</keyword>
    <abstract>
      <?line 53?>

<t>This document describes the use of ML-DSA digital
   signatures in the Secure Shell (SSH) protocol.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://sfluhrer.github.io/ssh-mldsa/draft-sfluhrer-ssh-mldsa.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-sfluhrer-ssh-mldsa/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Shell Maintenance Security Area mailing list (<eref target="mailto:ssh@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ssh/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ssh/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/sfluhrer/ssh-mldsa"/>.</t>
    </note>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A Cryptographically Relevant Quantum Computer (CRQC) could break
   traditional asymmetric cryptograph algorithms: e.g RSA, ECDSA; which
   are widely deployed authentication options of SSH.
   NIST has recently published the postquantum digital signature algorithm ML-DSA <xref target="FIPS204"/>.</t>
      <t>This document describes how to use this algorithm for authentication within SSH <xref target="RFC4251"/>, as a replacement for the traditional signature algorithms (RSA, ECDSA).</t>
      <section anchor="background-on-ml-dsa">
        <name>Background on ML-DSA</name>
        <t>ML-DSA (as specified in FIPS 204) is a signature algorithm that is believed to be secure against attackers who have a Quantum Computer available to them.
   There are three strengths defined for it (with the parameter sets being known as ML-DSA-44, ML-DSA-65 and ML-DSA-87).
   In addition, for each defined parameter set, there are two versions, the 'pure' version (where ML-DSA directly signs the message) and a 'prehashed' version (where ML-DSA signs a hash that was computed outside of ML-DSA).
   For this protocol, we will always use the pure version.</t>
        <t>In addition, ML-DSA also has a 'context' input, which is a short string that is common to the sender and the recceiver.
   It is intended to allow for domain separation between separate uses of the same public key.
   This protocol always uses an empty (zero length) context.</t>
        <t>FIPS 204 also allows ML-DSA to be run in either determanistic or 'hedged' mode (where randomness is applied to the signature operation).
   We place no requirement on which is used; the implementation should select based on the quality of their random number source.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The descriptions of key and signature formats use the notation
   introduced in <xref target="RFC4251"/>, Section 3, and the string data type from
   <xref target="RFC4251"/>, Section 5.  Identifiers and terminology from ML-DSA
   <xref target="FIPS204"/> are used throughout the document.</t>
    </section>
    <section anchor="public-key-algorithms">
      <name>Public Key Algorithms</name>
      <t>This document describes three public key algorithms for use with SSH, as
   per <xref target="RFC4253"/>, Section 6.6, corresponding to the three parameter sets of ML-DSA.
   The names of the algorithm are "ssh-mldsa-44", "ssh-mldsa-65" and "ssh-mldsa-87", to match the level 2, 3 and 5 parameter sets <xref target="FIPS204"/>.
   These algorithm only support signing and not encryption.</t>
      <t>The below table lists the public key sizes and the signature size (in bytes) for the three parameter sets.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Public Key Algorithm Name</th>
            <th align="left">Public Key Size</th>
            <th align="left">Signature Size</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">ssh-mldsa-44</td>
            <td align="left">1312</td>
            <td align="left">2420</td>
          </tr>
          <tr>
            <td align="left">ssh-mldsa-65</td>
            <td align="left">1952</td>
            <td align="left">3309</td>
          </tr>
          <tr>
            <td align="left">ssh-mldsa-87</td>
            <td align="left">2592</td>
            <td align="left">4627</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="public-key-format">
      <name>Public Key Format</name>
      <t>The key format for all three parameter sets have the following encoding:</t>
      <t>string "ssh-mldsa-44" (or "ssh-mldsa-65" or "ssh-mldsa-87")</t>
      <t>string key</t>
      <t>Here, 'key' is the public key described in <xref target="FIPS204"/>.</t>
      <t># Signature Algorithm</t>
      <t>Signatures are generated according to the procedure in Section 5.2
   <xref target="FIPS204"/>, using the "pure" version of ML-DSA, with an empty context string.</t>
    </section>
    <section anchor="signature-format">
      <name>Signature Format</name>
      <t>The "ssh-mldsa" key format has the following encoding:</t>
      <t>string "ssh-mldsa-44" (or "ssh-mldsa-65" or "ssh-mldsa-87")</t>
      <t>string signature</t>
      <t>Here, 'signature' is the signature produced in accordance with the
   previous section.</t>
    </section>
    <section anchor="verification-algorithm">
      <name>Verification Algorithm</name>
      <t>Signatures are verified according to the procedure in
   <xref target="FIPS204"/>, Section 5.3, using the "pure" version of ML-DSA, with an empty context strong.</t>
    </section>
    <section anchor="sshfp-dns-resource-records">
      <name>SSHFP DNS Resource Records</name>
      <t>Usage and generation of the SSHFP DNS resource record is described in
   <xref target="RFC4255"/>.  This section illustrates the generation of SSHFP resource
   records for ML-DSA keys, and this document also specifies
   the corresponding code point to "SSHFP RR Types for public key
   algorithms" in the "DNS SSHFP Resource Record Parameters" IANA
   registry <xref target="IANA-SSHFP"/>.</t>
      <t>The generation of SSHFP resource records keys for ML-DSA is
   described as follows.</t>
      <t>The encoding of ML-DSA public keys is described in <xref target="FIPS204"/>.</t>
      <t>The SSHFP Resource Record for an ML-DSA key fingerprint
   (with a SHA-256 fingerprint) would, for example, be:</t>
      <t>pqserver.example.com. IN SSHFP TBD 2 (
                    a87f1b687ac0e57d2a081a2f28267237
                    34d90ed316d2b818ca9580ea384d9240 )</t>
      <t>Replace TBD with the value eventually allocated by IANA.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document augments the Public Key Algorithm Names in <xref target="RFC4250"/>, Section 4.11.3.</t>
      <t>IANA is requested to add the following entries to "Public Key Algorithm
   Names" in the "Secure Shell (SSH) Protocol Parameters" registry
   <xref target="IANA-SSH"/>:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Public Key Algorithm Name</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">ssh-mldsa-44</td>
            <td align="left">THIS-RFC</td>
          </tr>
          <tr>
            <td align="left">ssh-mldsa-65</td>
            <td align="left">THIS-RFC</td>
          </tr>
          <tr>
            <td align="left">ssh-mldsa-87</td>
            <td align="left">THIS-RFC</td>
          </tr>
        </tbody>
      </table>
      <t>IANA is requested to add the following entries to "SSHFP RR Types for
   public key algorithms" in the "DNS SSHFP Resource Record Parameters"
   registry <xref target="IANA-SSHFP"/>:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">ML-DSA-44</td>
            <td align="left">THIS RFC</td>
          </tr>
          <tr>
            <td align="left">TBD2</td>
            <td align="left">ML-DSA-65</td>
            <td align="left">THIS RFC</td>
          </tr>
          <tr>
            <td align="left">TBD3</td>
            <td align="left">ML-DSA-87</td>
            <td align="left">THIS RFC</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations in <xref target="RFC4251"/>, Section 9 apply to all SSH
   implementations, including those using ML-DSA.</t>
      <t>The security considerations in ML-DSA <xref target="FIPS204"/> apply to all
   uses of ML-DSA, including those in SSH.</t>
      <t>Cryptographic algorithms and parameters are usually broken or
   weakened over time.  Implementers and users need to continously re-evaluate that cryptographic algorithms continue to provide the
   expected level of security.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="FIPS204" target="https://doi.org/10.6028/NIST.FIPS.204">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
          <seriesInfo name="NIST" value="FIPS 204"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4250">
          <front>
            <title>The Secure Shell (SSH) Protocol Assigned Numbers</title>
            <author fullname="S. Lehtinen" initials="S." surname="Lehtinen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document defines the instructions to the IANA and the initial state of the IANA assigned numbers for the Secure Shell (SSH) protocol. It is intended only for the initialization of the IANA registries referenced in the set of SSH documents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4250"/>
          <seriesInfo name="DOI" value="10.17487/RFC4250"/>
        </reference>
        <reference anchor="RFC4251">
          <front>
            <title>The Secure Shell (SSH) Protocol Architecture</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell (SSH) Protocol is a protocol for secure remote login and other secure network services over an insecure network. This document describes the architecture of the SSH protocol, as well as the notation and terminology used in SSH protocol documents. It also discusses the SSH algorithm naming system that allows local extensions. The SSH protocol consists of three major components: The Transport Layer Protocol provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User Authentication Protocol authenticates the client to the server. The Connection Protocol multiplexes the encrypted tunnel into several logical channels. Details of these protocols are described in separate documents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4251"/>
          <seriesInfo name="DOI" value="10.17487/RFC4251"/>
        </reference>
        <reference anchor="RFC4253">
          <front>
            <title>The Secure Shell (SSH) Transport Layer Protocol</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an insecure network.</t>
              <t>This document describes the SSH transport layer protocol, which typically runs on top of TCP/IP. The protocol can be used as a basis for a number of secure network services. It provides strong encryption, server authentication, and integrity protection. It may also provide compression.</t>
              <t>Key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm are all negotiated.</t>
              <t>This document also describes the Diffie-Hellman key exchange method and the minimal set of algorithms that are needed to implement the SSH transport layer protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4253"/>
          <seriesInfo name="DOI" value="10.17487/RFC4253"/>
        </reference>
        <reference anchor="RFC4255">
          <front>
            <title>Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints</title>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <author fullname="W. Griffin" initials="W." surname="Griffin"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document describes a method of verifying Secure Shell (SSH) host keys using Domain Name System Security (DNSSEC). The document defines a new DNS resource record that contains a standard SSH key fingerprint. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4255"/>
          <seriesInfo name="DOI" value="10.17487/RFC4255"/>
        </reference>
        <reference anchor="IANA-SSH" target="https://www.iana.org/assignments/ssh-parameters">
          <front>
            <title>Secure Shell (SSH) Protocol Parameters</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA-SSHFP" target="https://www.iana.org/assignments/dns-sshfp-rr-parameters)">
          <front>
            <title>DNS SSHFP Resource Record Parameters</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 215?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The text of draft-josefsson-ssh-sphincs was used as a template for this document.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA71Z63LbNhb+z6fAKj9i70iybrZltdvWseOJZ2PHtZzudDKZ
HYiEJDYUwQKgVCXpu+yz7JPtdwDwJstpujuz/pGQIHDOwbl856JOpxOY2CRi
wlrT6Ss2zbNMKsPknN287lxOz1sBn82UWPvvxWLIjVhItZ2wOJ3LIIhkmPIV
qESKz01Hz5N8qYTqaL3srJJI805vFOh8toq1jmVqthn2Xr98uApCmWqR6lxP
mFG5CCJQngTgNwy4Ehx8tQhbwUaqDwsl84wW9HLVCrThafRPnshU+KNxpuyT
NoNe76w3CD6ILc5Fk4B1vORgF8XpYsLePlx1xsFapDm4MVaQnoowV4JNlyJJ
2A2PUyNSnoaihT1OaLclNlt2DvFofcXjxEn1QyzMvCvVgpa5CpdYXhqT6cnR
Ee2ipXgtusW2I1o4mim50eII54/o3CI2y3xGBL0Sj0ol0ucE+tGmRrjY1nUH
u7GsDhw9ZY7u0qySVhDw3CylIg102DxPEmfE1jSUxrArd4q4MgZxeRp/5Abm
m7CLWIeSTbfaiJW230WhBs/rh5C2dEMJUwWpVCucXEPX2Hx1fTcd9EYTe85w
tRC4T3GdSMZWNf1e96Q3GB/dXk8funSiiyPuhPPXGxnliei85sbEoei84FpE
7DKGFnjCpvEi5caaktyEq8ge1ULFQpPLOuaMtYh+C3ITCwYW7rbWC9l5voAz
YXUwCgI6Vb/F/dXFaHDcm5SP/epxWD0e0+P1+e15B/Gz/8qbzaYb85Q7l0CA
LNKVSI22dsy4gk2MULp++YafHoDyIbtT0shQJuyufqLgfHX3J3lHqSZ3mWcd
pWpCHNaluLydMkub3QstcxUKPISIuLoMQafTYXymjeKhIcWxh2WsGRAjJ04s
EjpU8UxoZpaC5VpU4MMiZ046pAuLakCO3bpHB5nXQddxXcVRlIggeMauU6Pg
LyF5r5XhnF2obWbkQvFsGYc8SbaQPRFrDpF+zPFvvmIXcpXluAQ7uLj/8eKQ
hTJPIgY45B+IBm4UxUQRDsf1doULqzhkYUWY8QQoibhcAd5Ed8Hup+dt9vIC
d/uGbcB3SXSAc2wTRwIiRCJL5BaOTIEJ7UAyYsBkRv9pUg0u2qVT5LhsyTVT
IsROHM7yWRLrJU6TejKpza/+Il6PlRIrwQpVv/NR+b77RRst5YYZac1kaEtF
B9GxK/UGH2AsShzvfIy8b0NVjEPoLOGhsNTpJElc1+ceSTU7qNR3CDGfPWMv
eGjTQhox8PMYT/L7Wx2Amc5EGM9jqAWyFGF+yEj4vQoxS27o60wksViTNiWe
gR3W3fgCWQGgANgBbzg47ChhhzU+PXYcvibYnyWCiOCOq65TriBKinSoBEgb
JdKFWULjYh6nYEkqiQ07IA06axYBBTkMyYYsxj6kcpOSPt1tO6NRu3g8OWbA
veJtfHpoGV9jd+R03LY8BA+XJdMGjzaxLaTcSLbGVckF7Tp7nkEXz4tFyGn3
llELlySHJO26sF4JrflCHFqhOI4rAdeFqz5Fwx3l5OBLZ5EN7hk6vcLYudGI
mAoq3P2urCfBdgUQtNmGYgsAwZMN32rvuNAn2dKzdh7f0I2Xgida2hiDyChU
jPjNPIcXQYa2C1/vRUuqmWBFMkrhPpB1hWs5u0OjaUT+kLrghIJCgUyinFns
AVtsRM7fgEcINLJQJJFYU5wn69iomgmzEaJcsphpkcHygQUdEIQM5U+3jOVC
IzVFQPQUeTtDLXPwUSjJEuuFhHP2qk4vRcQ4ZVjBCofzkaHylEJLxOQx8CZ4
0Aq1ggYOoGxgz2HmBVl6JWExb2YFTchVCrewKsyyJHY3t5coo1Jmwt3a2fcf
uBvBBkslVPhrDkezCEJYU5gDF4u+sWTiVZbY705vsBLBtwbKh4bNbL0gXSoB
TiZU0jklxsqLx9J8NaNwsLmNEAeRna4J4QiMyZiXFDvWaZDpENekdEZFp2at
m7coLdruf3b7xj7fv/zx7fX9y0t6nr46f/26fAj8jumrN29fX1ZP1cmLNzc3
L28v3WGsssZS0Lo5/xlfSKrWm7uH6ze3569bLlnWsdwGtLUbOZxCJFJAcR0U
IG9x8sXF3b//1R+xT5/+AuQe9Ptnv//uX8b90xFeYMfUcZMpYt29QnvbANYU
XBEVeAsLeUa5R1vghw2AWOQB0OZf35Fm3k/Yt7Mw64++8wt04cZiobPGotXZ
45VHh50S9yztYVNqs7G+o+mmvOc/N94LvdcWv/0+AbqyTn/8/XeBz63CZ9Qq
q5PbkC4r13fVZoVYqXR+TBRiX844W9VyK2oi6+vDdgk1HpZQ0XLbwrC5kisi
sufYcRdgFJF/I18q5+EUzXEqE7nY2qNFliUKRc1gnYoCjxKazBeINGOZF15n
Y+fOwdLfcdXzMqn/QUVI6bGCs3oxQOBIurEpEiUG+RfRAmIUVxvWrnbSPWkD
2BQKyEymkUVqhzaeSTPBlomlSNiMWqMSZqtqgW7eqtrc0YiCs3o/OW65iKyW
xqfYAt6wbuiSO8pOkbBBmw3t3uNdYWq1mRNG1yWw4ad9407+Q3cjOvAYJlJb
jpZZjm6CwoaqOFuWoGA02mfEUss6/ih05UClS9I6O4DHzbZoQg+rwm2PBh27
z3uNzm4pSzW+TYn053rfZhccjc5Tf4+/PVopaNRNxBp/n1l/2B80VwajQa++
sEsD5dUujbPjHRrDYe/sSzTGp7s0BsdnOzRGJ4PTBo1mGF1ZjCgNS7ZzsOGq
caDvXue21SoZbi4pnZO/wE/cZMQS85jR9Gt2AJo7rt1cgWcf1s9DHvv6Cnjf
Zs/x+pwy9I63NfJOow15VvOH0nksxWnVDVIALkRKdQLlsZD6z1p0o+4BTBIF
6kRKnBs08KsNJHG1G4KZSsNWWZaWQNB2SFOWTL5I8ne1AFdJu2OYSketupGo
svw/mKEM4LoxysXSJFWcZ7Xk4hRKMzBWNCMWZZVYxzLX1BZ5dHnGfhIKicM3
f1802Nru/CN77diost7wfzSYLAxmhxc0xtgZYLi09JZ6FouD3sE8fTt9KI+q
4qhysw9KZTWXrqXa4/ddn+u81hg6k5wmI8aPP5p8HI+CPhFyLFzy8zU4/EkX
2b5R51G5XvS+NjMSg2YGDKkizyTKCVJ/y89y7tkD6gTHpIpTO6ko02+rmMK0
vmYI1LJzKHeBBTKO2rJ31WTqfZWavnT/8vJ047oGYnu7Sudc+4jSFeEisGrD
pepqetdmj6ch4ok7WpxNa7Zg6AcWVFZDqXTUtfCcoTrtDI5P6p8P0SigI/Gd
+G+c2pU2srML/uxXLRR1iP4LjVK77PrWC/Lw4pIN2EHA9vzx8em8PzsZn/Kw
J45PowHvjft8MB+MByeng+Hp3kPDUXTWE9GwfxINZuP+OORnx+Oe4MMxPgxG
PeYw5d4Nbiz/cjqx5kkOHVNnlNtRGrWJoQXk2dba3oYbPVAHRa27s7KNs2b1
x/OFnUBawk9WD7pW+PZq2DDq9vvdoe/oiV2sbacotPGddRQ9wlxDU2EbAfv4
2WEbsax8/uvGr63S2y0GFA7/fvIVpdG9mAOnCXX/TA30NcXOw6vraQeK+6qq
5gubH5cv9c3/pf4fI5ANhX0NwJ9EoCfBp7DGT9aHP6OjLzuzJ+3QtMc+CyA8
+vR/OZkrNcTq6sS2QW2bNcD+bcPaNqv65jZKZsUPU48jzAKYLr6Hje9PdJBn
diiz9cMo0q9tPBsjFeSdOA2T3OXvpdTCp+WidfoK1rvj5wZbOl9Mt4qkvsvR
DZgdr8ZMv94sUnqsfsTw7aqDqpmSHwTSjfW0jeB4ocEQkJeZeCWoIy4uXbTE
EAlPqXAeTXUFGuRcg5gSHUFgSGM5OwgMn5LIncrtLAY1z5qmmb62Er8ha1O4
uL4Qdy/053/XmPHwA1n8PKQJcCIih5jBp4kbWInob6058r9o/V6awJY+IOV+
EfwFmptrLVP7k6CGcGmo7YjVdvF24mlQNtGvjb7Nq2F0N/gP3MuVVTgeAAA=

-->

</rfc>
