<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-atw-home-interfaces-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="home-interfaces">Hierarchical ORCHID Management Entity (HOME) Interfaces for Registration &amp; Differential Access Query</title>
    <seriesInfo name="Internet-Draft" value="draft-atw-home-interfaces-00"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="16"/>
    <area>Internet</area>
    <workgroup>Drone Remote ID Protocol</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 125?>

<t>This document standardizes the interfaces of an ORCHID Management Entity (OME) to allow clients to register and query with differential access an Overlay Routable Cryptographic Hash Identifier (ORCHID) such as a Hierarchial Host Identity Tag (HHIT). Existing technologies such as CBOR/JSON Object Signing &amp; Encryption (COSE/JOSE) and Registration Data Access Protocol (RDAP) are selected to enable widespread interoperability.</t>
    </abstract>
  </front>
  <middle>
    <?line 129?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="purpose">
        <name>Purpose</name>
        <t>An ecosystem using Overlay Routable Cryptographic Hash IDentifiers (ORCHIDs, <xref target="RFC7343"/>) as its primary identifier can be a strong option for modern systems. The Hierarchical Host Identity Tags (HHITs, <xref target="RFC9374"/>) are used in the fast growing sector of Unmanned Aircraft Systems (UAS) to provide identity and authentication services using the Domain Name System (DNS).</t>
        <t>With standardization, identity ecosystems can be created around the use of ORCHIDs to serve various use-cases. This provides widespread interoperability of the functions of registration, public query and private query using a selection of existing standards and methods. Being backed by cryptographic keys allow existing key infrastructure, certificates and policy to be leveraged with minimal overhead, modification or redeployment.</t>
      </section>
      <section anchor="background">
        <name>Background</name>
        <t>HHITs are an evolution of the Host Identity Tags (HITs) in the Host Identity Protocol (HIP, <xref target="RFC9063"/>). All of these tags are categorized as an ORCHID which were standardized in <xref target="RFC7343"/> and updated by <xref target="RFC9374"/>. HHITs solve the problem of HITs being a flat namespace, which is hard to manage at a global scale, by adding hierarchy into the identifier. When the hierarchy is laid onto the DNS, interoperability of lookups becomes trivial.</t>
        <t><xref target="RFC9434"/> introduces the concept of the DRIP Identity Management Entity (DIME) that provides the critical function of registering and querying information around DETs. It further specifies logical entities of the Public Information Registry and Private Information Registry of which the former has been specified in <xref target="RFC9886"/> using the DNS.</t>
        <t>The concept of the DIME can be backported to ORCHIDs in general with the addition of the term ORCHID Management Entity (HOME). In relation to key infrastructure policies and certificates the terms ORCHID Key Infrastructure (OKI) and ORCHID Key Infrastructure X.509 (OKIX) are introduced here to mirror but be distinct from the existing Public Key Infrastructure (PKI) and Public Key Infrastructure X.509 (PKIX).</t>
      </section>
      <section anchor="scope">
        <name>Scope</name>
        <t>This document provides specification of the interfaces and models for registration and differential access query of ORCHIDs to support identity services under an HOME. This is to provide specification for the final missing pieces of a DIME and is the exemplar use-case of using HHITs, such as the DET, as the core of an identity ecosystem.</t>
        <t>The term HHIT is used when discussing the general technology while DET is used with discussion around UAS/aviation specific elements when possible. Additional terms reinforcing this delineation are found in <xref target="terminology"/>. This document defines all data models in the Concise Data Definition Language (CDDL, <xref target="RFC8610"/>) with the full specification in <xref target="cddl"/>.</t>
        <section anchor="disclaimer">
          <name>Disclaimer</name>
          <t>The specifications in this document do NOT provide protection against incorrect (e.g. fraudulent) data entered during registration or asserted subsequently.</t>
          <t>The selected technologies do protect against alteration (intentional or unintentional) of data subsequent to its assertion by the cryptographic signer. The signer might be the proximate sender (e.g. UA transmitting Broadcast RID) or might be an attestor far away and long ago (e.g. root Certificate Authority).</t>
          <t>It is the duty of the operator of each HOME, or the party on whose behalf the HOME is being operated, to validate the registration data. An HOME at a root in the hierarchy aligned with the scope of the data SHOULD provide services to obtain this goal, see <xref target="oaas"/>.</t>
        </section>
        <section anchor="targeted-drip-requirements">
          <name>Targeted DRIP Requirements</name>
          <t>The following requirements of <xref target="RFC9153"/> are satisfied when following this document: GEN-3, ID-4, REG-2, REG-4 and PRIV-2.</t>
        </section>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
      <section anchor="additional-definitions-abbreviations">
        <name>Additional Definitions &amp; Abbreviations</name>
        <dl>
          <dt><strong>Hierarchical ORCHID Management Entity (HOME)</strong>:</dt>
          <dd>
            <t>A term to describe an entity providing various identity management functions (such as registration, query, etc.) to clients at a specific point in the hierarchy. HOME's have four major functional components that can be co-located or distributed as a system of systems: Registrar, Registry, Authoritative Name Server and Certificate Authority. The DRIP Identity Management Entity (DIME) is a specialization of HOME in support of the UAS/aviation ecosystem.</t>
          </dd>
          <dt><strong>ORCHID Key Infrastructure (OKI)</strong>:</dt>
          <dd>
            <t>A key infrastructure consisting of policies around entities using HHITs in a domain space. An example of an OKI is the DRIP Key Infrastructure (DKI) for UAS/aviation.</t>
          </dd>
          <dt><strong>ORCHID Key Infrastructure X.509 (OKIX)</strong>:</dt>
          <dd>
            <t>A set of X.509 certificate profiles in compliance of Public Key Infrastructure X.509 (PKIX, <xref target="RFC5280"/>) that support an OKI. An example of an OKIX is the DRIP Key Infrastructure X.509 (DKIX) for UAS/aviation.</t>
          </dd>
          <dt><strong>HOME Token</strong>:</dt>
          <dd>
            <t>In the context of this specification; a HOME Token can be any of the Concise Binary Object Representation (CBOR; <xref target="STD94"/>) Object Signing &amp; Encryption (COSE; <xref target="STD96"/>) or JavaScript Object Notation (JSON; <xref target="STD90"/>) Object Signing &amp; Encryption (JOSE; <xref target="RFC7515"/>, <xref target="RFC7516"/>) structure. See <xref target="home-token"/>.</t>
          </dd>
          <dt><strong>HRI Token</strong>:</dt>
          <dd>
            <t>A HOME Token containing an HRI claim per <xref target="hri"/>.</t>
          </dd>
          <dt><strong>HRR Token</strong>:</dt>
          <dd>
            <t>A HOME Token containing an HRR claim per <xref target="hrr"/>.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="home-component-architecture-functions">
      <name>HOME Component Architecture &amp; Functions</name>
      <t>To properly provide the necessary services identified in both <xref target="RFC9153"/> and <xref target="RFC9434"/> a DIME, or more generally an HOME, requires four critical functions: <em>Registrar</em>, <em>Registry</em>, <em>Authoritative Name Server</em> and <em>Certificate Authority</em> as detailed below for this document and in <xref target="arch-fig"/>.</t>
      <dl>
        <dt><em>Registrar</em>:</dt>
        <dd>
          <t>This document covers the client facing interface of the Registrar function used by Registrants. Interactions done by the Registrar with other HOME functions are out of scope for this document.</t>
        </dd>
        <dt><em>Certificate Authority</em>:</dt>
        <dd>
          <t>This document does not cover specific details of this function of an HOME. However, it is expected to provide at least ORCHID Key Infrastructure X.509 (OKIX) certificates used in other parts of the HOME. These are <xref target="RFC5280"/> compliant certificates that support HHITs, see <xref target="oki"/>. Explicit policy for Certificate Authorities are left for more specific implementation and documents, such as a Concept of Operations.</t>
        </dd>
        <dt><em>Authoritative Name Server</em>:</dt>
        <dd>
          <t>The specific details of records hosted by the Authoritative Name Server as part of DNS is specified in <xref target="RFC9886"/> and are out of scope for this document. Interactions done by other HOME functions to manage an Authoritative Name Server are out of scope for this document. It should be noted that some artifacts generated during the registration process specified in this document end up in RRTypes hosted in DNS. This function serves as the Public Information Registry as defined by <xref section="4.1" sectionFormat="of" target="RFC9434"/>.</t>
        </dd>
        <dt><em>Registry</em>:</dt>
        <dd>
          <t>This document covers the client facing interface of the Registry function used by Observers to query for additional details about the HHIT. Interactions done by the Registry with other HOME functions are out of scope for this document. It should be noted that artifacts generated during the registration process specified in this document MUST end up in the Registry for audit purposes. For this document the term Registry is short-hand for Private Information Registry as defined in <xref section="4.2" sectionFormat="of" target="RFC9434"/>.</t>
        </dd>
      </dl>
      <figure anchor="arch-fig">
        <name>Simplified Diagram of HOME Registration/Query Components &amp; Interactions</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="688" width="416" viewBox="0 0 416 688" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,128 L 8,544" fill="none" stroke="black"/>
              <path d="M 40,112 L 40,144" fill="none" stroke="black"/>
              <path d="M 48,448 L 48,512" fill="none" stroke="black"/>
              <path d="M 96,112 L 96,144" fill="none" stroke="black"/>
              <path d="M 104,512 L 104,592" fill="none" stroke="black"/>
              <path d="M 152,304 L 152,368" fill="none" stroke="black"/>
              <path d="M 160,176 L 160,224" fill="none" stroke="black"/>
              <path d="M 168,32 L 168,64" fill="none" stroke="black"/>
              <path d="M 168,624 L 168,656" fill="none" stroke="black"/>
              <path d="M 176,432 L 176,496" fill="none" stroke="black"/>
              <path d="M 192,592 L 192,624" fill="none" stroke="black"/>
              <path d="M 208,64 L 208,160" fill="none" stroke="black"/>
              <path d="M 224,592 L 224,624" fill="none" stroke="black"/>
              <path d="M 248,624 L 248,656" fill="none" stroke="black"/>
              <path d="M 256,160 L 256,208" fill="none" stroke="black"/>
              <path d="M 264,288 L 264,352" fill="none" stroke="black"/>
              <path d="M 272,32 L 272,64" fill="none" stroke="black"/>
              <path d="M 280,448 L 280,496" fill="none" stroke="black"/>
              <path d="M 320,496 L 320,592" fill="none" stroke="black"/>
              <path d="M 368,432 L 368,480" fill="none" stroke="black"/>
              <path d="M 408,128 L 408,544" fill="none" stroke="black"/>
              <path d="M 168,32 L 272,32" fill="none" stroke="black"/>
              <path d="M 168,64 L 200,64" fill="none" stroke="black"/>
              <path d="M 216,64 L 272,64" fill="none" stroke="black"/>
              <path d="M 40,112 L 96,112" fill="none" stroke="black"/>
              <path d="M 8,128 L 40,128" fill="none" stroke="black"/>
              <path d="M 96,128 L 200,128" fill="none" stroke="black"/>
              <path d="M 216,128 L 408,128" fill="none" stroke="black"/>
              <path d="M 40,144 L 96,144" fill="none" stroke="black"/>
              <path d="M 176,160 L 200,160" fill="none" stroke="black"/>
              <path d="M 216,160 L 256,160" fill="none" stroke="black"/>
              <path d="M 160,224 L 200,224" fill="none" stroke="black"/>
              <path d="M 216,224 L 240,224" fill="none" stroke="black"/>
              <path d="M 168,288 L 200,288" fill="none" stroke="black"/>
              <path d="M 216,288 L 264,288" fill="none" stroke="black"/>
              <path d="M 152,368 L 248,368" fill="none" stroke="black"/>
              <path d="M 64,432 L 72,432" fill="none" stroke="black"/>
              <path d="M 88,432 L 104,432" fill="none" stroke="black"/>
              <path d="M 120,432 L 176,432" fill="none" stroke="black"/>
              <path d="M 312,432 L 328,432" fill="none" stroke="black"/>
              <path d="M 344,432 L 368,432" fill="none" stroke="black"/>
              <path d="M 280,496 L 312,496" fill="none" stroke="black"/>
              <path d="M 328,496 L 352,496" fill="none" stroke="black"/>
              <path d="M 48,512 L 96,512" fill="none" stroke="black"/>
              <path d="M 112,512 L 160,512" fill="none" stroke="black"/>
              <path d="M 8,544 L 96,544" fill="none" stroke="black"/>
              <path d="M 112,544 L 312,544" fill="none" stroke="black"/>
              <path d="M 328,544 L 408,544" fill="none" stroke="black"/>
              <path d="M 104,592 L 192,592" fill="none" stroke="black"/>
              <path d="M 224,592 L 320,592" fill="none" stroke="black"/>
              <path d="M 168,624 L 184,624" fill="none" stroke="black"/>
              <path d="M 200,624 L 216,624" fill="none" stroke="black"/>
              <path d="M 232,624 L 248,624" fill="none" stroke="black"/>
              <path d="M 168,656 L 248,656" fill="none" stroke="black"/>
              <path d="M 176,160 C 167.16936,160 160,167.16936 160,176" fill="none" stroke="black"/>
              <path d="M 240,224 C 248.83064,224 256,216.83064 256,208" fill="none" stroke="black"/>
              <path d="M 168,288 C 159.16936,288 152,295.16936 152,304" fill="none" stroke="black"/>
              <path d="M 248,368 C 256.83064,368 264,360.83064 264,352" fill="none" stroke="black"/>
              <path d="M 64,432 C 55.16936,432 48,439.16936 48,448" fill="none" stroke="black"/>
              <path d="M 296,432 C 287.16936,432 280,439.16936 280,448" fill="none" stroke="black"/>
              <path d="M 352,496 C 360.83064,496 368,488.83064 368,480" fill="none" stroke="black"/>
              <path d="M 160,512 C 168.83064,512 176,504.83064 176,496" fill="none" stroke="black"/>
              <circle cx="80" cy="432" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="104" cy="512" r="6" class="closeddot" fill="black"/>
              <circle cx="112" cy="432" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="152" cy="336" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="160" cy="192" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="192" cy="624" r="6" class="closeddot" fill="black"/>
              <circle cx="208" cy="64" r="6" class="closeddot" fill="black"/>
              <circle cx="208" cy="160" r="6" class="closeddot" fill="black"/>
              <circle cx="208" cy="224" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="208" cy="288" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="224" cy="624" r="6" class="closeddot" fill="black"/>
              <circle cx="256" cy="192" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="264" cy="336" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="304" cy="432" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="320" cy="496" r="6" class="closeddot" fill="black"/>
              <circle cx="336" cy="432" r="6" class="opendot" fill="white" stroke="black"/>
              <g class="text">
                <text x="220" y="52">Registrant</text>
                <text x="236" y="100">HOME</text>
                <text x="304" y="100">Token/HTTPS</text>
                <text x="68" y="132">HOME</text>
                <text x="116" y="196">..........</text>
                <text x="208" y="196">Registrar</text>
                <text x="300" y="196">..........</text>
                <text x="80" y="212">:</text>
                <text x="336" y="212">:</text>
                <text x="80" y="228">:</text>
                <text x="336" y="228">:</text>
                <text x="80" y="244">:</text>
                <text x="208" y="244">:</text>
                <text x="336" y="244">:</text>
                <text x="80" y="260">:</text>
                <text x="208" y="260">:</text>
                <text x="336" y="260">:</text>
                <text x="80" y="276">:</text>
                <text x="208" y="276">:</text>
                <text x="336" y="276">:</text>
                <text x="80" y="292">:</text>
                <text x="336" y="292">:</text>
                <text x="80" y="308">:</text>
                <text x="336" y="308">:</text>
                <text x="80" y="324">:</text>
                <text x="208" y="324">Certificate</text>
                <text x="336" y="324">:</text>
                <text x="80" y="340">:</text>
                <text x="128" y="340">.....</text>
                <text x="208" y="340">Authority</text>
                <text x="288" y="340">.....</text>
                <text x="336" y="340">:</text>
                <text x="80" y="356">:</text>
                <text x="112" y="356">:</text>
                <text x="304" y="356">:</text>
                <text x="336" y="356">:</text>
                <text x="80" y="372">:</text>
                <text x="112" y="372">:</text>
                <text x="304" y="372">:</text>
                <text x="336" y="372">:</text>
                <text x="80" y="388">:</text>
                <text x="112" y="388">:</text>
                <text x="304" y="388">:</text>
                <text x="336" y="388">:</text>
                <text x="80" y="404">:</text>
                <text x="112" y="404">:</text>
                <text x="304" y="404">:</text>
                <text x="336" y="404">:</text>
                <text x="80" y="420">:</text>
                <text x="112" y="420">:</text>
                <text x="304" y="420">:</text>
                <text x="336" y="420">:</text>
                <text x="112" y="468">Authoritative</text>
                <text x="324" y="468">Registry</text>
                <text x="84" y="484">Name</text>
                <text x="132" y="484">Server</text>
                <text x="80" y="580">DNS</text>
                <text x="348" y="580">RDAP</text>
                <text x="208" y="644">Querant</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
                    +------------+
                    | Registrant |
                    +----*-------+
                         |
                         | HOME Token/HTTPS
    +------+             |
+---+ HOME +-------------|------------------------+
|   +------+             |                        |
|                   .----*-----.                  |
|                  |           |                  |
|        ..........o Registrar o..........        |
|        :         |           |         :        |
|        :         '-----o----'          :        |
|        :               :               :        |
|        :               :               :        |
|        :               :               :        |
|        :         .-----o------.        :        |
|        :        |             |        :        |
|        :        | Certificate |        :        |
|        :   .....o  Authority  o.....   :        |
|        :   :    |             |    :   :        |
|        :   :    '------------'     :   :        |
|        :   :                       :   :        |
|        :   :                       :   :        |
|        :   :                       :   :        |
|     .--o---o-------.             .-o---o---.    |
|    |               |            |          |    |
|    | Authoritative |            | Registry |    |
|    |  Name Server  |            |          |    |
|    |               |            '----*----'     |
|    '------*-------'                  |          |
|           |                          |          |
+-----------|--------------------------|----------+
            |                          |
        DNS |                          | RDAP
            '----------.   .-----------'
                       |   |
                    +--*---*--+
                    | Querant |
                    +---------+

]]></artwork>
        </artset>
      </figure>
      <t>The specific interaction models and transports between the <em>Registrar</em>, <em>Certificate Authority</em>, <em>Registry</em> and <em>Authoritative Name Server</em> when not co-located (i.e. as a distributed system of systems) is out of scope for this document. Note that of the duplicate links feeding <em>Authoritative Name Server</em> and <em>Registry</em> one set is chosen in an implementation for each. A number of these functions/interactions are lifted from the DNS and the existing relationships and protocols between such entities in that domain also can apply here. For example, between <em>Registrar</em> and <em>Registry</em> is the Extensible Provisioning Protocol (EPP, <xref target="STD69"/>) or equivalents such as RESTful Provisioning Protocol (RPP).</t>
      <t>This document details the interactions between a registering client (known as <em>Registrant</em>) and the <em>Registrar</em> through an HTTPS interface as described in <xref target="home-registration"/> and the RDAP interaction by <em>Querants</em> (such as <em>Observers</em>) and a <em>Registry</em> as described in <xref target="query-process"/>. These interfaces can be either used by machines as an API or provided with a UI for humans to interact with such as on a web browser.</t>
      <t>The elements of any maps found in CDDL for this specification MUST be declared by an ecosystem. An initial key set for elements in aviation use cases are registered in <xref target="iana-hp"/>. Context MAY be provided in-band in HTTP using a registered Media Type as part of the Content-Type header for what key set to use to avoid processing ambiguity.</t>
    </section>
    <section anchor="home-registration">
      <name>Registration</name>
      <t>This sections details the process of registration following <xref target="art-z-registration"/>. This Z-diagram is the upper link of <xref target="arch-fig"/> labeled with "HOME Token/HTTPS" between <em>Registrant</em> and <em>Registrar</em>.</t>
      <figure anchor="art-z-registration">
        <name>Registration Z-Diagram</name>
        <artwork type="ascii-art" align="center"><![CDATA[
          Registrant             HOME
              |                   |
 GEN_HHIT/HI  |                   |
     GEN_CSR  |                   |
              |--------HRI------->|
              |                   | VALID_HRI?
              |<-------FAIL-------|
              |                   | DUPE_HI?
              |<-------FAIL-------|
              |                   | DUPE_HHIT?
              |<-------FAIL-------|
              |                   | GEN_CERTS
              |                   | UPDATE_DATABASE
              |                   | UPDATE_NS
              |<------ HRR--------|
     ONBOARD  |                   |
              |                   |

]]></artwork>
      </figure>
      <t>The mechanism for registration is the use of COSE or JOSE over HTTPS. COSE MUST be supported and JOSE is RECOMMENDED for flexibility for non-constrained <em>Registrants</em>. The rest of this section specifies exact behavior for this interface of an HOME.</t>
      <section anchor="home-token">
        <name>HOME Token</name>
        <t>A HOME Token MUST be encoded in either COSE or JOSE. A token MAY contain multiple layers and SHOULD have the Content-Type parameter, as part of an unprotected header, set accordingly for each.</t>
        <section anchor="signature-layer">
          <name>Signature Layer</name>
          <t>Respective header parameters MUST be used to indicate the verification key. When the key is part of the payload (usually an HRI claim set, <xref target="hri"/>) a protected header parameter MUST be used (<tt>jwk</tt> for JOSE and <tt>kccs</tt> for COSE) to carry the verification key to avoid needing to parse the payload segment of the structure. For all other cases a KID parameter is used containing an HHIT, encoded per <xref target="ip6-handling"/>, and placed in a unprotected header.</t>
        </section>
        <section anchor="encryption-layer">
          <name>Encryption Layer</name>
          <t>HOME Tokens SHOULD be encrypted when the payload may contain Personally Identifiable Information (PII). For example, a HOME would not encrypt their response token (<xref target="hrr"/>) containing relevant processing errors when the original request token (<xref target="hri"/>) failed to decrypt.</t>
          <t>Asymmetric algorithms MUST be supported and symmetric MAY be supported. The precise list of encryption algorithm selected and policies are left for the HOME to decide and MUST be provided to clients.</t>
          <t>Encryption is done with Elliptic Curve Diffie-Hellman (ECDH) using Ephemeral-Static (ES) keying. The static key is provided by the HOME while a unique ephemeral key is provided by the client for each HOME Token and/or recipient. The transfer of this ephemeral key is covered by the relevant COSE/JOSE specifications for using ECDH with encryption objects. The HOME MUST provide its static keys through public methods such as the DNS or an HTTPS GET endpoint.</t>
        </section>
      </section>
      <section anchor="claims-set">
        <name>Claims Set</name>
        <t>A HOME Token is at its core a set of claims using a CWT or JWT claim set. The claims defined in this section are registered in the respective registries in <xref target="iana-claims"/> and either or both MUST be included in the claim set for HOME Tokens. A HOME Token carrying either of these claims is considered as an HRI Token or HRR Token respectively.</t>
        <t>The claim set SHOULD also contain the claims of <tt>nbf</tt>, <tt>exp</tt>, and <tt>iat</tt>. The set MAY contain the <tt>aud</tt> or <tt>iss</tt> claim with a targeted HHIT, encoded per <xref target="ip6-handling"/>, if known. Additional claims are out of scope for this document.</t>
        <t>The layer (<xref target="signature-layer"/> or <xref target="encryption-layer"/>) carrying a claim set is RECOMMENDED to set the Content-Type parameter, as part of the unprotected header, to <tt>application/home+cbor</tt> or <tt>application/home+json</tt>. This SHOULD include the <tt>ctx</tt> parameter to indicate the set of keys/parameters being used for any maps in the payload structure as they are application specific.</t>
        <section anchor="hri">
          <name>HOME Registration Inquiry (HRI)</name>
          <t>The structure of an HRI claim is around registration of a set of entities, each uniquely identified by the <em>Registrant</em> that contains keys (also each uniquely identified) and metadata for each.</t>
          <figure anchor="cddl-hri">
            <name>CDDL: HOME Registration Inquiry</name>
            <sourcecode type="ascii-text"><![CDATA[
inquiry = [
  entities: { &(entity-id) => entity },
  metadata: map / null
]
entity = [
  hhit_entity_type: uint,
  keys: { &(key-id): key },
  metadata: map / null
]
key = [
  csr: bytes / text .b64u bytes,
  metadata: map / null
]
]]></sourcecode>
          </figure>
          <dl>
            <dt><em>entities</em>:</dt>
            <dd>
              <t>A map containing elements using key (<em>entity-id</em>), value (<em>entity</em>) pairs for each <em>entity</em> being registered in the inquiry.</t>
            </dd>
            <dt><em>entity-id</em>:</dt>
            <dd>
              <t>A string or integer key, as part of the <em>entities</em> map, set by the <em>Registrant</em>.</t>
            </dd>
            <dt><em>entity</em>:</dt>
            <dd>
              <t>An array containing the elements of <em>hhit_entity_type</em>, <em>keys</em> and <em>metadata</em>.</t>
            </dd>
            <dt><em>hhit_entity_type</em>:</dt>
            <dd>
              <t>An HHIT Entity Type as defined in the registry found at <xref target="IANA.DRIP"/>.</t>
            </dd>
            <dt><em>keys</em>:</dt>
            <dd>
              <t>A map containing the key (<em>key-id</em>), value (<em>key</em>) pairs for the keys being registered entity in the inquiry for a given <em>entity</em>.</t>
            </dd>
            <dt><em>key-id</em>:</dt>
            <dd>
              <t>A string or integer key, as part of the <em>keys</em> map for each <em>entity</em>, set by the <em>Registrant</em>. Constrained in uniqueness to an individual HRI and the keys as part of an <em>entity</em>.</t>
            </dd>
            <dt><em>key</em>:</dt>
            <dd>
              <t>An array containing the elements of <em>csr</em> and <em>metadata</em>.</t>
            </dd>
            <dt><em>csr</em>:</dt>
            <dd>
              <t>OKI(X)-compliant Certificate Signing Request (CSR) that is DER encoded. See <xref target="key-csr"/> for considerations on the CSR.</t>
            </dd>
            <dt><em>metadata</em>:</dt>
            <dd>
              <t>A map containing elements (key, value pairs) and their associated values related to keys/entities in the inquiry. The contents are subject to policy of an HOME and MUST be provided to their clients. The specific key set to be used SHOULD be indicated using the optional parameter of the registered Media Type (<xref target="iana-mt"/>) as part of a Content-Type parameter. An initial key set is registered in <xref target="iana-hp"/>.</t>
            </dd>
          </dl>
          <t>Each nesting in <xref target="cddl-hri"/> contains its own <em>metadata</em>. This allows a <em>Registrant</em> to set elements at a higher nesting in the model to be shared among nested sections. When combining from each nesting level, elements found closer to the <tt>entities[entity-id].keys[key-id].metadata</tt> map are given priority.</t>
        </section>
        <section anchor="hrr">
          <name>HOME Registration Response (HRR)</name>
          <t>This claim is structured to use the provided <em>entity-id</em>s and <em>key-id</em>s from an HRI. It also can contain a list of failures, organized by those same identifiers.</t>
          <figure anchor="cddl-hrr">
            <name>CDDL: HOME Registration Response</name>
            <sourcecode type="ascii-text"><![CDATA[
response = [
  success: [
    entities: { &(entity-id): success-data },
    shared: map
  ] / null,
  failure: [ + error-data ] / null
]
success-data = [
  keys: { &(key-id): map },
  shared: map
]
error-data = [
  eid: &(entity-id) / null,
  kid: &(key-id) / null,
  cat: any,
  msg: any
]
]]></sourcecode>
          </figure>
          <dl>
            <dt><em>success</em>:</dt>
            <dd>
              <t>An array containing two elements: <em>entities</em> and <em>shared</em>. MUST be <tt>null</tt> when no successful registrations issued by the HOME.</t>
            </dd>
            <dt><em>entities</em>:</dt>
            <dd>
              <t>A map of elements with key (<em>entity-id</em>), value (<em>success-data</em>) pairs.</t>
            </dd>
            <dt><em>entity-id</em>:</dt>
            <dd>
              <t>A string or integer key, as part of the <em>entities</em> map, provided in an HRI from a <em>Registrant</em>.</t>
            </dd>
            <dt><em>success-data</em>:</dt>
            <dd>
              <t>An array containing two elements: <em>keys</em> and <em>shared</em>.</t>
            </dd>
            <dt><em>keys</em>:</dt>
            <dd>
              <t>A map of elements with key (<em>key-id</em>), value pairs. The value of each element is a map (keys from <xref target="iana-hp"/>) containing artifacts of the registration associated with the specific key and MUST have an element containing the Canonical Registration Certificate.</t>
            </dd>
            <dt><em>key-id</em>:</dt>
            <dd>
              <t>A string or integer key, as part of the <em>keys</em> map, provided in an HRI from a <em>Registrant</em>.</t>
            </dd>
            <dt><em>shared</em>:</dt>
            <dd>
              <t>Same as the <em>metadata</em> field of HRI except contains artifact elements provided to the <em>Registrant</em> for successful registration that is shared amongst either a set of <em>keys</em> or set of <em>entities</em>.</t>
            </dd>
            <dt><em>failure</em>:</dt>
            <dd>
              <t>An array with at least one element of <em>error-data</em> to indicate failures, <tt>null</tt> otherwise.</t>
            </dd>
            <dt><em>error-data</em>:</dt>
            <dd>
              <t>An array of four elements encoding a validation or processing error of an HRI. When <em>eid</em> or <em>kid</em> are <tt>null</tt> it implies that all of that type are denoting the same failure explained via <em>cat</em> and/or <em>msg</em>. When both <em>eid</em> and <em>kid</em> are <tt>null</tt> it indicates the processing of the HRI token itself or all keys across the HRI entities shared the same failure indicated by <em>cat</em> and/or <em>msg</em>. See <xref target="response-codes"/> for more details.</t>
            </dd>
          </dl>
          <t>Similar to the <em>metadata</em> in the HRI, <xref target="cddl-hrr"/> has an <em>shared</em> map at each level for data that is the identical across different keys/entities. When combining from each nesting level, elements found closer to those in the <tt>success.entities[entity-id].keys[key-id]</tt> map are given priority.</t>
        </section>
      </section>
      <section anchor="considerations">
        <name>Considerations</name>
        <section anchor="key-csr">
          <name>Keys &amp; Certificate Signing Request</name>
          <t><em>Registrant</em>s obtains one or more Certificate Signing Requests (CSRs) that are OKI(X)-compliant by either generating their own key-pair(s), RECOMMENDED asymmetric, or obtaining them from a related party they are acting as a proxy for.</t>
          <t>Cryptographic materials SHOULD be on the device intending to use said material in operation. If the <em>Registrant</em> is acting as a proxy the methods of the generation and/or transfer of cryptographic materials to and from the device being proxied to is out of scope for this document.</t>
          <t>If the <em>Registrant</em> knows the HID of the <em>Registar</em> and/or <em>Certificate Authority</em> it wishes to be endorsed by, it SHOULD construct its HHIT accordingly and include it in the CSR per <xref target="okix-csr"/>. The process of discovering a specific HID is out of scope for this document.</t>
        </section>
        <section anchor="registration-endpoint">
          <name>Registration Endpoint</name>
          <t>The <tt>/.well-known/home/registry</tt> endpoint SHOULD be redirected to a fully qualified path by the HOME and MUST use <tt>308 Permanent Redirect</tt>.</t>
        </section>
        <section anchor="req-valid">
          <name>HRI Validation &amp; Processing</name>
          <t>HRI validation and processing is done across two functional components, which can be co-located or distributed, the <em>Registrar</em> and <em>Certificate Authority</em>. The following text is based on the processing of an HRI Token. The HOME in question uses a single HHIT for both its <em>Registrar</em> and <em>Certificate Authority</em> roles.</t>
          <t>The initial steps of decryption and signature validation are skipped as they are straightforward. Failure of either of these steps results in sending a response following <xref target="response-codes"/>. Assuming success the claim set is extracted from the HRI Token to be processed.</t>
          <t>The <tt>nbf</tt>, <tt>ext</tt>, <tt>iat</tt>, <tt>iss</tt> and <tt>aud</tt> claims are validated, and then <tt>hri</tt> claim is processed recursively starting from the outside of the structure. Each entity merges their <em>metadata</em> with the inquiry <em>metadata</em> with entity elements taking precedence. Next each key merges its <em>metadata</em> with the entity <em>metadata</em> with key elements taking precedence. The HOME performs validation of the final combined <em>metadata</em> map for each key using local validation and/or consultation of an "oracle" (see <xref target="oaas"/>).</t>
          <t>Next each key CSR has its signature validated then the public key confirmed to be unique to the HOME's scope. The HOME then constructs, using its Hierarchy HID and the CSR public key, a prospective HHIT for the key. If the CSR contains an HHIT as part of the Subject Alternative Name the two HHITs are checked for equivalence. The HOME finally checks that the HHIT is unique in its scope.</t>
          <t>If everything above validates, the HOME endorses the new HHIT by generating and signing an OKI(x)-compliant Canonical Registration Certificate along with any other artifacts required for the entity registration. Any data for the <em>Registrant</em> is then placed within the HRR <tt>success.entities[entity-id].keys[key-id]</tt> map using the same <em>entity-id</em> and <em>key-id</em> from the HRI. All artifacts of this endorsement are placed in the <em>Registry</em> and artifacts that are considered public, such as those needed for <xref target="RFC9886"/>, are placed into the <em>Authoritative Name Server</em>.</t>
          <t>When a failure occurs at any point in the validation and/or processing of a entity/key the HRR <em>failure</em> array is appended using the <em>entity-id</em>, <em>key-id</em> and other elements to provide context for the issue. The HOME MAY compress the <em>failure</em> array after processing. For example if all the keys for an <em>entity-id</em> share the same failure the individual structures can be compressed to a single <tt>[&lt;eid&gt;, null, &lt;cat&gt;, &lt;msg&gt;]</tt> instead of one for each <em>key-id</em>.</t>
          <t>The HOME upon handling all entities and keys a HOME constructs an HRR Token and responds to the <em>Registrant</em> with it. The token SHOULD replicate the same layering as the original HRI Token. It MAY contain both the original HRI claim and the associated HRR claim.</t>
        </section>
      </section>
      <section anchor="transport">
        <name>Transport</name>
        <t>This document defines the use of HTTPS as the transport for the HOME Tokens. The use of other transports are out of scope for this document.</t>
        <t>For COSE, the resulting CBOR content MUST use a proper CBOR Tag to indicate what object is encoded. For JOSE content, the General or Flattened JWE JSON Serialization syntax MUST be used.</t>
        <t>The "Content-Type" header of HTTPS SHOULD be used to indicate the content typing. For JOSE this is <tt>application/jose+json</tt> and for COSE is one of the following: <tt>application/cose; cose-type="cose-sign</tt>, <tt>application/cose; cose-type="cose-sign1</tt>, <tt>application/cose; cose-type="cose-encrypt</tt>, <tt>application/cose; cose-type="cose-encrypt0</tt>.</t>
        <section anchor="response-codes">
          <name>Response Codes</name>
          <t>For HOME Tokens with a single entity/key object the HTTP Response Codes can be easily mapped. For example a key that fails processing due to a duplicate public key or HHIT can have the HOME Token returned using <tt>409 Conflict</tt>. It is also simple for the first stages of an HOME Token carrying an HRI since it needs to successfully be decrypted and signature(s) before processing resulting in earlier failure conditions to respond to.</t>
          <t>HOME Tokens with multiple entities/keys can be trivially mapped as well only when all entities/keys either pass or fail. Difficulty arises when a HOME Token has multiple entities/keys and not all of them fail or they all fail in different ways that can be attributed to either a 4xx or 5xx code.</t>
          <t>For the above reasoning and to maintain interoperability HOMEs MUST follow the below guidelines for management of HTTP Response Codes and using the HRR claim's <em>failure</em> array and <em>error-data</em> structure. Unless otherwise noted a responding HOME Token MUST use both encryption and signature layers.</t>
          <dl>
            <dt><strong>422 Unprocessable Content</strong>:</dt>
            <dd>
              <t>When a HOME Token fails to decrypt this response code MUST be sent with only a signature layer (<xref target="signature-layer"/>) signaling in the HRR claim the decryption issue(s) experienced. The <em>eid</em>, <em>kid</em> and <em>cat</em> fields MUST be set to <tt>null</tt>. The <em>msg</em> SHOULD contains specific details about the failed decryption. More than one <em>error-data</em> MAY be present for different decryption issues.</t>
            </dd>
            <dt><strong>401 Unauthorized</strong>:</dt>
            <dd>
              <t>Failed signature(s) of a HOME Token MUST use this response code with the HRR claim indicating the signature validation issue(s) experienced. The <em>eid</em>, <em>kid</em> and <em>cat</em> fields MUST be set to <tt>null</tt>. The <em>msg</em> SHOULD contains specific details about what signature failed to verify. More than one <em>error-data</em> MAY be present to separate signature(s) processed.</t>
            </dd>
            <dt><strong>200 OK</strong>:</dt>
            <dd>
              <t>This response code MUST be used to indicate the overall inquiry has been processed but that some entities and/or keys failed to be registered. The <em>cat</em> field SHOULD be used to carry the respective 4xx or 5xx HTTP Response Code exhibited for the entities/keys to fail validation or processing. If <em>cat</em> is not used, then clients MUST check contents of both the <em>success</em> and <em>failure</em> fields of the HRR.</t>
            </dd>
            <dt><strong>201 Created</strong>:</dt>
            <dd>
              <t>A response with this code MUST be used when all entities and keys in the original HRI were registered successfully and the <em>failure</em> in HRR MUST be set to <tt>null</tt>.</t>
            </dd>
            <dt><strong>4xx or 5xx</strong>:</dt>
            <dd>
              <t>If all entities/keys fail with the same <em>cat</em>, used as in <em>200 OK</em>, then the HOME Token is sent using that HTTP Response Code. The <em>failure</em> array in the HRR MUST be filled with <em>error-data</em>'s setting <em>eid</em> and <em>kid</em> as needed, <em>cat</em> to <tt>null</tt> and <em>msg</em> to any specific details for the given <em>eid</em>/<em>kid</em> pair.</t>
            </dd>
          </dl>
        </section>
      </section>
    </section>
    <section anchor="query-process">
      <name>Differential Access Query</name>
      <t>This section details the process of query for additional private information following the Z-diagram of <xref target="fig-z-query"/>. It is the lower right link of <xref target="arch-fig"/> labeled with "RDAP" between <em>Querant</em> and <em>Registry</em>.</t>
      <figure anchor="fig-z-query">
        <name>Query Z-Diagram</name>
        <artwork type="ascii-art" align="center"><![CDATA[
         Querant               HOME
            |                   |
    RX_HHIT |                   |
            |<-------DNS------->|
   RDAP_URI |                   |
            |------RDAP_Q------>|
            |                   | ACCEPT_X509?
            |<------DENY--------| 
            |                   | POLICY_CHECK?
            |<------DENY--------|
            |                   | REDACTION
            |<-----RDAP_R-------|
        ACT |                   |
            |                   |

]]></artwork>
      </figure>
      <t>For HOME's the differential access mechanism known as Registration Data Access Protocol (RDAP, <xref target="STD95"/>) is selected as the interface for the <em>Registry</em> and specified in the following sections. Public information is hosted by the <em>Authoritative Name Server</em> and accessed using DNS methods as defined in <xref target="RFC9886"/>. Authentication of the HOME and <em>Querant</em> is done through Mutual TLS using X.509 certificates.</t>
      <t>As part of RDAP, the HOME MAY follow <xref target="RFC9224"/> to be part of the RDAP bootstrap mechanism for discovery. This is not hard requirement as the same information can be obtained through the HHIT RRType from the <em>Authoritative Name Server</em>.</t>
      <t>It is RECOMMENDED that eXtensible Access Control Markup Language (XACML) with Security Assertion Markup Language (SAML) is used to exchange policy information.</t>
      <section anchor="client-query">
        <name>RDAP Query</name>
        <t>A <em>Querent</em> with an HHIT looking for private information is RECOMMENDED to perform a series of DNS queries to build a URI that is then used for an HTTPS GET query. The same URI MAY be obtained using the RDAP bootstrap process if the HOME followed <xref target="RFC9224"/>, but <em>Querants</em> MUST NOT expect this.</t>
        <t>The base URI needed is part of Subject Alternative Name extension of a Canonical Registration Certificate found in HHIT RRType defined in <xref section="5.1" sectionFormat="of" target="RFC9886"/> and accessed by one or more reverse IPv6 DNS lookups. The exact certificate with the base URI for an HOME and its clients is determined by policy and where the URI is minimally duplicated across many certificates.</t>
        <t>Once the base URI is found the <em>Querant</em> concatenates the <tt>/.well-known/home/query/</tt> string then the nibble-reversed HHIT to form the full query string.</t>
        <t>The HTTPS GET method MUST be authenticated using one of the methods defined in <xref target="mutual-tls"/>.</t>
        <section anchor="query-endpoint">
          <name>Query Endpoint</name>
          <t>The <tt>/.well-known/home/query/&lt;IP address&gt;</tt> endpoint SHOULD be redirected to a full qualified path conforming with <xref section="3.1.1" sectionFormat="of" target="RFC9082"/> (i.e. <tt>ip/&lt;IP address&gt;</tt>) by the HOME. All other RDAP endpoints SHOULD NOT be implemented as specified in <xref target="RFC9082"/>. Other methods MAY be provided to enable differential access controlled queries of information pertaining to an HHIT but are out of scope for this document.</t>
        </section>
      </section>
      <section anchor="mutual-tls">
        <name>Differential Access Control</name>
        <t>Per REG-2 and REG-4 of <xref section="4.4.1" sectionFormat="of" target="RFC9153"/>, RDAP queries to an HOME MUST be protected using fine-grained AAA policies in a both human- &amp; machine-readable form for automated enforcement. RDAP supports only HTTP-based mechanisms for authentication as defined in <xref section="3.2" sectionFormat="of" target="RFC7481"/>. A federated authentication mechanism, such as the examples in <xref section="3.2.1" sectionFormat="of" target="RFC7481"/>, is RECOMMENDED.</t>
        <t>For international and/or global harmonization, this document standardizes the following RDAP behavior for authentication of clients and servers:</t>
        <ul spacing="normal">
          <li>
            <t>MUST support HTTP Basic or Digest Authentication Scheme per <xref section="3.2" sectionFormat="of" target="RFC7481"/> <strong>AND</strong></t>
          </li>
          <li>
            <t>MUST support Mutual TLS per <xref section="7.4.6" sectionFormat="of" target="RFC5246"/> for global and/or international queries <strong>AND</strong></t>
          </li>
          <li>
            <t>SHOULD use Mutual TLS but MAY do any RDAP compatible AAA for domestic queries</t>
          </li>
        </ul>
        <t>An HOME, when supporting Mutual TLS, SHOULD accept valid OKIX-compliant certificates and MAY accept other <xref target="RFC5280"/> (PKIX) compliant certificates. Standard TLS rejection methods MUST be followed to signal to the <em>Querant</em> the rejection of the certificate and authentication.</t>
        <t>The use of other RDAP compatible authentication mechanisms are out of scope for this document.</t>
      </section>
      <section anchor="rdap-extension-response">
        <name>RDAP Extension &amp; Response</name>
        <t>A HOME MUST respond to a successful query using <xref target="RFC9083"/>. The HOME RDAP Extension shown in <xref target="cddl-rdap"/> is placed under the key <tt>home</tt> as part of the main JSON map. The <tt>rdapConformance</tt> array MUST include the string literal of "home_v0" to signal conformance with this specification. Other RDAP specifications MAY be part of the response such as <xref section="5.4" sectionFormat="of" target="RFC9083"/>.</t>
        <figure anchor="cddl-rdap">
          <name>CDDL: HOME RDAP Extension</name>
          <sourcecode type="ascii-text"><![CDATA[
[
  hhit: [ ip6: text, hhit_entity_type: uint ],
  canon_x: text .b64u bytes,
  metadata: map / null
]
]]></sourcecode>
        </figure>
        <dl>
          <dt><em>hhit</em>:</dt>
          <dd>
            <t>Array structure contain the HHIT Entity Type and the HHIT encoded per <xref target="ip6-handling"/>.</t>
          </dd>
          <dt><em>canon_x</em>:</dt>
          <dd>
            <t>Canonical Registration Certificate encoded in base64url.</t>
          </dd>
          <dt><em>metadata</em>:</dt>
          <dd>
            <t>Map that contains private information elements associated with the registration. Elements included are based on access policy and registration requirements of the HOME. Elements are redacted or removed using policy methods of the HOME and is out of scope for this document.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="oki">
      <name>ORCHID Key Infrastructure (OKI)</name>
      <t>The ORCHID Key Infrastructure (OKI) is focused on the delegation and management of the Hierarchy ID field of an HHIT and its levels.</t>
      <t>There are two types of nodes in the hierarchy, Root and Inode, and relationships between nodes use tree terminology such as ancestor, descendant and degree. Additional, more administrative members, include the IPv6 Prefix and Apex. The relationship between these entities (and their Authorization and Issuing HHITs) are shown in <xref target="fig-oki"/>.</t>
      <figure anchor="fig-oki">
        <name>ORCHID Key Infrastructure (OKI) Hierarchy</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="1136" width="544" viewBox="0 0 544 1136" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,80" fill="none" stroke="black"/>
              <path d="M 8,304 L 8,352" fill="none" stroke="black"/>
              <path d="M 8,576 L 8,624" fill="none" stroke="black"/>
              <path d="M 8,848 L 8,896" fill="none" stroke="black"/>
              <path d="M 24,352 L 24,576" fill="none" stroke="black"/>
              <path d="M 24,624 L 24,848" fill="none" stroke="black"/>
              <path d="M 40,128 L 40,160" fill="none" stroke="black"/>
              <path d="M 40,400 L 40,432" fill="none" stroke="black"/>
              <path d="M 40,672 L 40,704" fill="none" stroke="black"/>
              <path d="M 48,944 L 48,976" fill="none" stroke="black"/>
              <path d="M 72,976 L 72,1056" fill="none" stroke="black"/>
              <path d="M 144,112 L 144,144" fill="none" stroke="black"/>
              <path d="M 144,384 L 144,416" fill="none" stroke="black"/>
              <path d="M 152,656 L 152,688" fill="none" stroke="black"/>
              <path d="M 160,928 L 160,960" fill="none" stroke="black"/>
              <path d="M 176,128 L 176,160" fill="none" stroke="black"/>
              <path d="M 176,400 L 176,432" fill="none" stroke="black"/>
              <path d="M 176,672 L 176,704" fill="none" stroke="black"/>
              <path d="M 184,944 L 184,976" fill="none" stroke="black"/>
              <path d="M 248,32 L 248,80" fill="none" stroke="black"/>
              <path d="M 248,304 L 248,352" fill="none" stroke="black"/>
              <path d="M 248,576 L 248,624" fill="none" stroke="black"/>
              <path d="M 248,848 L 248,896" fill="none" stroke="black"/>
              <path d="M 280,112 L 280,144" fill="none" stroke="black"/>
              <path d="M 280,384 L 280,416" fill="none" stroke="black"/>
              <path d="M 288,656 L 288,688" fill="none" stroke="black"/>
              <path d="M 296,304 L 296,352" fill="none" stroke="black"/>
              <path d="M 296,576 L 296,624" fill="none" stroke="black"/>
              <path d="M 296,848 L 296,896" fill="none" stroke="black"/>
              <path d="M 296,928 L 296,960" fill="none" stroke="black"/>
              <path d="M 312,352 L 312,576" fill="none" stroke="black"/>
              <path d="M 312,624 L 312,848" fill="none" stroke="black"/>
              <path d="M 344,400 L 344,432" fill="none" stroke="black"/>
              <path d="M 344,672 L 344,704" fill="none" stroke="black"/>
              <path d="M 344,944 L 344,976" fill="none" stroke="black"/>
              <path d="M 368,976 L 368,1056" fill="none" stroke="black"/>
              <path d="M 448,384 L 448,416" fill="none" stroke="black"/>
              <path d="M 448,928 L 448,960" fill="none" stroke="black"/>
              <path d="M 456,656 L 456,688" fill="none" stroke="black"/>
              <path d="M 536,304 L 536,352" fill="none" stroke="black"/>
              <path d="M 536,576 L 536,624" fill="none" stroke="black"/>
              <path d="M 536,848 L 536,896" fill="none" stroke="black"/>
              <path d="M 8,32 L 248,32" fill="none" stroke="black"/>
              <path d="M 8,80 L 16,80" fill="none" stroke="black"/>
              <path d="M 32,80 L 56,80" fill="none" stroke="black"/>
              <path d="M 72,80 L 192,80" fill="none" stroke="black"/>
              <path d="M 208,80 L 248,80" fill="none" stroke="black"/>
              <path d="M 72,112 L 144,112" fill="none" stroke="black"/>
              <path d="M 208,112 L 280,112" fill="none" stroke="black"/>
              <path d="M 40,160 L 56,160" fill="none" stroke="black"/>
              <path d="M 72,160 L 112,160" fill="none" stroke="black"/>
              <path d="M 176,160 L 264,160" fill="none" stroke="black"/>
              <path d="M 128,192 L 216,192" fill="none" stroke="black"/>
              <path d="M 112,224 L 216,224" fill="none" stroke="black"/>
              <path d="M 72,240 L 160,240" fill="none" stroke="black"/>
              <path d="M 56,272 L 160,272" fill="none" stroke="black"/>
              <path d="M 8,304 L 16,304" fill="none" stroke="black"/>
              <path d="M 32,304 L 248,304" fill="none" stroke="black"/>
              <path d="M 296,304 L 304,304" fill="none" stroke="black"/>
              <path d="M 320,304 L 536,304" fill="none" stroke="black"/>
              <path d="M 8,352 L 16,352" fill="none" stroke="black"/>
              <path d="M 32,352 L 56,352" fill="none" stroke="black"/>
              <path d="M 72,352 L 192,352" fill="none" stroke="black"/>
              <path d="M 208,352 L 248,352" fill="none" stroke="black"/>
              <path d="M 296,352 L 304,352" fill="none" stroke="black"/>
              <path d="M 320,352 L 360,352" fill="none" stroke="black"/>
              <path d="M 376,352 L 536,352" fill="none" stroke="black"/>
              <path d="M 72,384 L 144,384" fill="none" stroke="black"/>
              <path d="M 208,384 L 280,384" fill="none" stroke="black"/>
              <path d="M 376,384 L 448,384" fill="none" stroke="black"/>
              <path d="M 40,432 L 56,432" fill="none" stroke="black"/>
              <path d="M 72,432 L 112,432" fill="none" stroke="black"/>
              <path d="M 176,432 L 264,432" fill="none" stroke="black"/>
              <path d="M 344,432 L 360,432" fill="none" stroke="black"/>
              <path d="M 376,432 L 416,432" fill="none" stroke="black"/>
              <path d="M 128,464 L 216,464" fill="none" stroke="black"/>
              <path d="M 432,464 L 520,464" fill="none" stroke="black"/>
              <path d="M 112,496 L 216,496" fill="none" stroke="black"/>
              <path d="M 416,496 L 520,496" fill="none" stroke="black"/>
              <path d="M 72,512 L 160,512" fill="none" stroke="black"/>
              <path d="M 376,512 L 464,512" fill="none" stroke="black"/>
              <path d="M 56,544 L 160,544" fill="none" stroke="black"/>
              <path d="M 360,544 L 464,544" fill="none" stroke="black"/>
              <path d="M 8,576 L 16,576" fill="none" stroke="black"/>
              <path d="M 32,576 L 248,576" fill="none" stroke="black"/>
              <path d="M 296,576 L 304,576" fill="none" stroke="black"/>
              <path d="M 320,576 L 536,576" fill="none" stroke="black"/>
              <path d="M 8,624 L 16,624" fill="none" stroke="black"/>
              <path d="M 32,624 L 56,624" fill="none" stroke="black"/>
              <path d="M 72,624 L 192,624" fill="none" stroke="black"/>
              <path d="M 208,624 L 248,624" fill="none" stroke="black"/>
              <path d="M 296,624 L 304,624" fill="none" stroke="black"/>
              <path d="M 320,624 L 360,624" fill="none" stroke="black"/>
              <path d="M 376,624 L 536,624" fill="none" stroke="black"/>
              <path d="M 72,656 L 152,656" fill="none" stroke="black"/>
              <path d="M 208,656 L 288,656" fill="none" stroke="black"/>
              <path d="M 376,656 L 456,656" fill="none" stroke="black"/>
              <path d="M 40,704 L 56,704" fill="none" stroke="black"/>
              <path d="M 72,704 L 112,704" fill="none" stroke="black"/>
              <path d="M 128,704 L 136,704" fill="none" stroke="black"/>
              <path d="M 176,704 L 272,704" fill="none" stroke="black"/>
              <path d="M 344,704 L 360,704" fill="none" stroke="black"/>
              <path d="M 376,704 L 416,704" fill="none" stroke="black"/>
              <path d="M 432,704 L 440,704" fill="none" stroke="black"/>
              <path d="M 128,736 L 216,736" fill="none" stroke="black"/>
              <path d="M 432,736 L 520,736" fill="none" stroke="black"/>
              <path d="M 112,768 L 216,768" fill="none" stroke="black"/>
              <path d="M 416,768 L 520,768" fill="none" stroke="black"/>
              <path d="M 72,784 L 160,784" fill="none" stroke="black"/>
              <path d="M 376,784 L 464,784" fill="none" stroke="black"/>
              <path d="M 56,816 L 160,816" fill="none" stroke="black"/>
              <path d="M 360,816 L 464,816" fill="none" stroke="black"/>
              <path d="M 8,848 L 16,848" fill="none" stroke="black"/>
              <path d="M 32,848 L 248,848" fill="none" stroke="black"/>
              <path d="M 296,848 L 304,848" fill="none" stroke="black"/>
              <path d="M 320,848 L 536,848" fill="none" stroke="black"/>
              <path d="M 8,896 L 64,896" fill="none" stroke="black"/>
              <path d="M 80,896 L 200,896" fill="none" stroke="black"/>
              <path d="M 216,896 L 248,896" fill="none" stroke="black"/>
              <path d="M 296,896 L 360,896" fill="none" stroke="black"/>
              <path d="M 376,896 L 536,896" fill="none" stroke="black"/>
              <path d="M 80,928 L 160,928" fill="none" stroke="black"/>
              <path d="M 216,928 L 296,928" fill="none" stroke="black"/>
              <path d="M 376,928 L 448,928" fill="none" stroke="black"/>
              <path d="M 48,976 L 64,976" fill="none" stroke="black"/>
              <path d="M 80,976 L 120,976" fill="none" stroke="black"/>
              <path d="M 136,976 L 144,976" fill="none" stroke="black"/>
              <path d="M 184,976 L 280,976" fill="none" stroke="black"/>
              <path d="M 344,976 L 360,976" fill="none" stroke="black"/>
              <path d="M 376,976 L 416,976" fill="none" stroke="black"/>
              <path d="M 136,1008 L 224,1008" fill="none" stroke="black"/>
              <path d="M 432,1008 L 520,1008" fill="none" stroke="black"/>
              <path d="M 120,1040 L 224,1040" fill="none" stroke="black"/>
              <path d="M 416,1040 L 520,1040" fill="none" stroke="black"/>
              <path d="M 80,1056 L 168,1056" fill="none" stroke="black"/>
              <path d="M 376,1056 L 464,1056" fill="none" stroke="black"/>
              <path d="M 64,1088 L 168,1088" fill="none" stroke="black"/>
              <path d="M 360,1088 L 464,1088" fill="none" stroke="black"/>
              <path d="M 56,112 C 47.16936,112 40,119.16936 40,128" fill="none" stroke="black"/>
              <path d="M 192,112 C 183.16936,112 176,119.16936 176,128" fill="none" stroke="black"/>
              <path d="M 128,160 C 136.83064,160 144,152.83064 144,144" fill="none" stroke="black"/>
              <path d="M 264,160 C 272.83064,160 280,152.83064 280,144" fill="none" stroke="black"/>
              <path d="M 112,192 C 103.16936,192 96,199.16936 96,208" fill="none" stroke="black"/>
              <path d="M 216,192 C 224.83064,192 232,199.16936 232,208" fill="none" stroke="black"/>
              <path d="M 112,224 C 103.16936,224 96,216.83064 96,208" fill="none" stroke="black"/>
              <path d="M 216,224 C 224.83064,224 232,216.83064 232,208" fill="none" stroke="black"/>
              <path d="M 56,240 C 47.16936,240 40,247.16936 40,256" fill="none" stroke="black"/>
              <path d="M 160,240 C 168.83064,240 176,247.16936 176,256" fill="none" stroke="black"/>
              <path d="M 56,272 C 47.16936,272 40,264.83064 40,256" fill="none" stroke="black"/>
              <path d="M 160,272 C 168.83064,272 176,264.83064 176,256" fill="none" stroke="black"/>
              <path d="M 56,384 C 47.16936,384 40,391.16936 40,400" fill="none" stroke="black"/>
              <path d="M 192,384 C 183.16936,384 176,391.16936 176,400" fill="none" stroke="black"/>
              <path d="M 360,384 C 351.16936,384 344,391.16936 344,400" fill="none" stroke="black"/>
              <path d="M 128,432 C 136.83064,432 144,424.83064 144,416" fill="none" stroke="black"/>
              <path d="M 264,432 C 272.83064,432 280,424.83064 280,416" fill="none" stroke="black"/>
              <path d="M 432,432 C 440.83064,432 448,424.83064 448,416" fill="none" stroke="black"/>
              <path d="M 112,464 C 103.16936,464 96,471.16936 96,480" fill="none" stroke="black"/>
              <path d="M 216,464 C 224.83064,464 232,471.16936 232,480" fill="none" stroke="black"/>
              <path d="M 416,464 C 407.16936,464 400,471.16936 400,480" fill="none" stroke="black"/>
              <path d="M 520,464 C 528.83064,464 536,471.16936 536,480" fill="none" stroke="black"/>
              <path d="M 112,496 C 103.16936,496 96,488.83064 96,480" fill="none" stroke="black"/>
              <path d="M 216,496 C 224.83064,496 232,488.83064 232,480" fill="none" stroke="black"/>
              <path d="M 416,496 C 407.16936,496 400,488.83064 400,480" fill="none" stroke="black"/>
              <path d="M 520,496 C 528.83064,496 536,488.83064 536,480" fill="none" stroke="black"/>
              <path d="M 56,512 C 47.16936,512 40,519.16936 40,528" fill="none" stroke="black"/>
              <path d="M 160,512 C 168.83064,512 176,519.16936 176,528" fill="none" stroke="black"/>
              <path d="M 360,512 C 351.16936,512 344,519.16936 344,528" fill="none" stroke="black"/>
              <path d="M 464,512 C 472.83064,512 480,519.16936 480,528" fill="none" stroke="black"/>
              <path d="M 56,544 C 47.16936,544 40,536.83064 40,528" fill="none" stroke="black"/>
              <path d="M 160,544 C 168.83064,544 176,536.83064 176,528" fill="none" stroke="black"/>
              <path d="M 360,544 C 351.16936,544 344,536.83064 344,528" fill="none" stroke="black"/>
              <path d="M 464,544 C 472.83064,544 480,536.83064 480,528" fill="none" stroke="black"/>
              <path d="M 56,656 C 47.16936,656 40,663.16936 40,672" fill="none" stroke="black"/>
              <path d="M 192,656 C 183.16936,656 176,663.16936 176,672" fill="none" stroke="black"/>
              <path d="M 360,656 C 351.16936,656 344,663.16936 344,672" fill="none" stroke="black"/>
              <path d="M 136,704 C 144.83064,704 152,696.83064 152,688" fill="none" stroke="black"/>
              <path d="M 272,704 C 280.83064,704 288,696.83064 288,688" fill="none" stroke="black"/>
              <path d="M 440,704 C 448.83064,704 456,696.83064 456,688" fill="none" stroke="black"/>
              <path d="M 112,736 C 103.16936,736 96,743.16936 96,752" fill="none" stroke="black"/>
              <path d="M 216,736 C 224.83064,736 232,743.16936 232,752" fill="none" stroke="black"/>
              <path d="M 416,736 C 407.16936,736 400,743.16936 400,752" fill="none" stroke="black"/>
              <path d="M 520,736 C 528.83064,736 536,743.16936 536,752" fill="none" stroke="black"/>
              <path d="M 112,768 C 103.16936,768 96,760.83064 96,752" fill="none" stroke="black"/>
              <path d="M 216,768 C 224.83064,768 232,760.83064 232,752" fill="none" stroke="black"/>
              <path d="M 416,768 C 407.16936,768 400,760.83064 400,752" fill="none" stroke="black"/>
              <path d="M 520,768 C 528.83064,768 536,760.83064 536,752" fill="none" stroke="black"/>
              <path d="M 56,784 C 47.16936,784 40,791.16936 40,800" fill="none" stroke="black"/>
              <path d="M 160,784 C 168.83064,784 176,791.16936 176,800" fill="none" stroke="black"/>
              <path d="M 360,784 C 351.16936,784 344,791.16936 344,800" fill="none" stroke="black"/>
              <path d="M 464,784 C 472.83064,784 480,791.16936 480,800" fill="none" stroke="black"/>
              <path d="M 56,816 C 47.16936,816 40,808.83064 40,800" fill="none" stroke="black"/>
              <path d="M 160,816 C 168.83064,816 176,808.83064 176,800" fill="none" stroke="black"/>
              <path d="M 360,816 C 351.16936,816 344,808.83064 344,800" fill="none" stroke="black"/>
              <path d="M 464,816 C 472.83064,816 480,808.83064 480,800" fill="none" stroke="black"/>
              <path d="M 64,928 C 55.16936,928 48,935.16936 48,944" fill="none" stroke="black"/>
              <path d="M 200,928 C 191.16936,928 184,935.16936 184,944" fill="none" stroke="black"/>
              <path d="M 360,928 C 351.16936,928 344,935.16936 344,944" fill="none" stroke="black"/>
              <path d="M 144,976 C 152.83064,976 160,968.83064 160,960" fill="none" stroke="black"/>
              <path d="M 280,976 C 288.83064,976 296,968.83064 296,960" fill="none" stroke="black"/>
              <path d="M 432,976 C 440.83064,976 448,968.83064 448,960" fill="none" stroke="black"/>
              <path d="M 120,1008 C 111.16936,1008 104,1015.16936 104,1024" fill="none" stroke="black"/>
              <path d="M 224,1008 C 232.83064,1008 240,1015.16936 240,1024" fill="none" stroke="black"/>
              <path d="M 416,1008 C 407.16936,1008 400,1015.16936 400,1024" fill="none" stroke="black"/>
              <path d="M 520,1008 C 528.83064,1008 536,1015.16936 536,1024" fill="none" stroke="black"/>
              <path d="M 120,1040 C 111.16936,1040 104,1032.83064 104,1024" fill="none" stroke="black"/>
              <path d="M 224,1040 C 232.83064,1040 240,1032.83064 240,1024" fill="none" stroke="black"/>
              <path d="M 416,1040 C 407.16936,1040 400,1032.83064 400,1024" fill="none" stroke="black"/>
              <path d="M 520,1040 C 528.83064,1040 536,1032.83064 536,1024" fill="none" stroke="black"/>
              <path d="M 64,1056 C 55.16936,1056 48,1063.16936 48,1072" fill="none" stroke="black"/>
              <path d="M 168,1056 C 176.83064,1056 184,1063.16936 184,1072" fill="none" stroke="black"/>
              <path d="M 360,1056 C 351.16936,1056 344,1063.16936 344,1072" fill="none" stroke="black"/>
              <path d="M 464,1056 C 472.83064,1056 480,1063.16936 480,1072" fill="none" stroke="black"/>
              <path d="M 64,1088 C 55.16936,1088 48,1080.83064 48,1072" fill="none" stroke="black"/>
              <path d="M 168,1088 C 176.83064,1088 184,1080.83064 184,1072" fill="none" stroke="black"/>
              <path d="M 360,1088 C 351.16936,1088 344,1080.83064 344,1072" fill="none" stroke="black"/>
              <path d="M 464,1088 C 472.83064,1088 480,1080.83064 480,1072" fill="none" stroke="black"/>
              <circle cx="24" cy="80" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="24" cy="304" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="24" cy="352" r="6" class="closeddot" fill="black"/>
              <circle cx="24" cy="576" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="24" cy="624" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="24" cy="848" r="6" class="closeddot" fill="black"/>
              <circle cx="64" cy="80" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="64" cy="112" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="64" cy="160" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="64" cy="240" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="64" cy="352" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="64" cy="384" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="64" cy="432" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="64" cy="512" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="64" cy="624" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="64" cy="656" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="64" cy="704" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="64" cy="784" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="72" cy="896" r="6" class="closeddot" fill="black"/>
              <circle cx="72" cy="928" r="6" class="closeddot" fill="black"/>
              <circle cx="72" cy="976" r="6" class="closeddot" fill="black"/>
              <circle cx="72" cy="1056" r="6" class="closeddot" fill="black"/>
              <circle cx="120" cy="160" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="120" cy="192" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="120" cy="432" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="120" cy="464" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="120" cy="704" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="120" cy="736" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="128" cy="976" r="6" class="closeddot" fill="black"/>
              <circle cx="128" cy="1008" r="6" class="closeddot" fill="black"/>
              <circle cx="200" cy="80" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="200" cy="112" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="200" cy="352" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="200" cy="384" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="200" cy="624" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="200" cy="656" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="208" cy="896" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="208" cy="928" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="248" cy="64" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="248" cy="336" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="248" cy="608" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="248" cy="880" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="296" cy="336" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="296" cy="608" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="296" cy="880" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="312" cy="304" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="312" cy="352" r="6" class="closeddot" fill="black"/>
              <circle cx="312" cy="576" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="312" cy="624" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="312" cy="848" r="6" class="closeddot" fill="black"/>
              <circle cx="368" cy="352" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="368" cy="384" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="368" cy="432" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="368" cy="512" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="368" cy="624" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="368" cy="656" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="368" cy="704" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="368" cy="784" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="368" cy="896" r="6" class="closeddot" fill="black"/>
              <circle cx="368" cy="928" r="6" class="closeddot" fill="black"/>
              <circle cx="368" cy="976" r="6" class="closeddot" fill="black"/>
              <circle cx="368" cy="1056" r="6" class="closeddot" fill="black"/>
              <circle cx="424" cy="432" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="424" cy="464" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="424" cy="704" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="424" cy="736" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="424" cy="976" r="6" class="closeddot" fill="black"/>
              <circle cx="424" cy="1008" r="6" class="closeddot" fill="black"/>
              <g class="text">
                <text x="84" y="52">Apex</text>
                <text x="132" y="68">Authorization(s)</text>
                <text x="284" y="68">........</text>
                <text x="312" y="84">:</text>
                <text x="24" y="100">:</text>
                <text x="64" y="100">:</text>
                <text x="200" y="100">:</text>
                <text x="312" y="100">:</text>
                <text x="24" y="116">:</text>
                <text x="312" y="116">:</text>
                <text x="24" y="132">:</text>
                <text x="68" y="132">Apex</text>
                <text x="204" y="132">Apex</text>
                <text x="312" y="132">:</text>
                <text x="24" y="148">:</text>
                <text x="80" y="148">Issuing</text>
                <text x="124" y="148">#1</text>
                <text x="216" y="148">Issuing</text>
                <text x="260" y="148">#N</text>
                <text x="312" y="148">:</text>
                <text x="24" y="164">:</text>
                <text x="312" y="164">:</text>
                <text x="24" y="180">:</text>
                <text x="64" y="180">:</text>
                <text x="120" y="180">:</text>
                <text x="312" y="180">:</text>
                <text x="24" y="196">:</text>
                <text x="64" y="196">:</text>
                <text x="312" y="196">:</text>
                <text x="24" y="212">:</text>
                <text x="64" y="212">:</text>
                <text x="152" y="212">Operational</text>
                <text x="212" y="212">#1</text>
                <text x="312" y="212">:</text>
                <text x="24" y="228">:</text>
                <text x="64" y="228">:</text>
                <text x="312" y="228">:</text>
                <text x="24" y="244">:</text>
                <text x="312" y="244">:</text>
                <text x="24" y="260">:</text>
                <text x="96" y="260">Operational</text>
                <text x="156" y="260">#N</text>
                <text x="312" y="260">:</text>
                <text x="24" y="276">:</text>
                <text x="312" y="276">:</text>
                <text x="24" y="292">:</text>
                <text x="312" y="292">:</text>
                <text x="80" y="324">HID</text>
                <text x="116" y="324">Root</text>
                <text x="144" y="324">A</text>
                <text x="368" y="324">HID</text>
                <text x="404" y="324">Root</text>
                <text x="432" y="324">B</text>
                <text x="132" y="340">Authorization(s)</text>
                <text x="272" y="340">.....</text>
                <text x="420" y="340">Authorization(s)</text>
                <text x="64" y="372">:</text>
                <text x="200" y="372">:</text>
                <text x="368" y="372">:</text>
                <text x="64" y="404">HID</text>
                <text x="100" y="404">Root</text>
                <text x="128" y="404">A</text>
                <text x="200" y="404">HID</text>
                <text x="236" y="404">Root</text>
                <text x="264" y="404">A</text>
                <text x="368" y="404">HID</text>
                <text x="404" y="404">Root</text>
                <text x="432" y="404">B</text>
                <text x="80" y="420">Issuing</text>
                <text x="124" y="420">#1</text>
                <text x="216" y="420">Issuing</text>
                <text x="260" y="420">#N</text>
                <text x="384" y="420">Issuing</text>
                <text x="428" y="420">#1</text>
                <text x="64" y="452">:</text>
                <text x="120" y="452">:</text>
                <text x="368" y="452">:</text>
                <text x="424" y="452">:</text>
                <text x="64" y="468">:</text>
                <text x="368" y="468">:</text>
                <text x="64" y="484">:</text>
                <text x="152" y="484">Operational</text>
                <text x="212" y="484">#1</text>
                <text x="368" y="484">:</text>
                <text x="456" y="484">Operational</text>
                <text x="516" y="484">#1</text>
                <text x="64" y="500">:</text>
                <text x="368" y="500">:</text>
                <text x="96" y="532">Operational</text>
                <text x="156" y="532">#N</text>
                <text x="400" y="532">Operational</text>
                <text x="460" y="532">#N</text>
                <text x="80" y="596">HID</text>
                <text x="120" y="596">Inode</text>
                <text x="152" y="596">A</text>
                <text x="368" y="596">HID</text>
                <text x="408" y="596">Inode</text>
                <text x="440" y="596">B</text>
                <text x="132" y="612">Authorization(s)</text>
                <text x="272" y="612">.....</text>
                <text x="420" y="612">Authorization(s)</text>
                <text x="64" y="644">:</text>
                <text x="200" y="644">:</text>
                <text x="368" y="644">:</text>
                <text x="64" y="676">HID</text>
                <text x="104" y="676">Inode</text>
                <text x="136" y="676">A</text>
                <text x="200" y="676">HID</text>
                <text x="240" y="676">Inode</text>
                <text x="272" y="676">A</text>
                <text x="368" y="676">HID</text>
                <text x="408" y="676">Inode</text>
                <text x="440" y="676">B</text>
                <text x="80" y="692">Issuing</text>
                <text x="124" y="692">#1</text>
                <text x="216" y="692">Issuing</text>
                <text x="260" y="692">#N</text>
                <text x="384" y="692">Issuing</text>
                <text x="428" y="692">#1</text>
                <text x="64" y="724">:</text>
                <text x="120" y="724">:</text>
                <text x="368" y="724">:</text>
                <text x="424" y="724">:</text>
                <text x="64" y="740">:</text>
                <text x="368" y="740">:</text>
                <text x="64" y="756">:</text>
                <text x="152" y="756">Operational</text>
                <text x="212" y="756">#1</text>
                <text x="368" y="756">:</text>
                <text x="456" y="756">Operational</text>
                <text x="516" y="756">#1</text>
                <text x="64" y="772">:</text>
                <text x="368" y="772">:</text>
                <text x="96" y="804">Operational</text>
                <text x="156" y="804">#N</text>
                <text x="400" y="804">Operational</text>
                <text x="460" y="804">#N</text>
                <text x="80" y="868">HID</text>
                <text x="116" y="868">Leaf</text>
                <text x="144" y="868">A</text>
                <text x="368" y="868">HID</text>
                <text x="404" y="868">Leaf</text>
                <text x="432" y="868">B</text>
                <text x="132" y="884">Authorization(s)</text>
                <text x="272" y="884">.....</text>
                <text x="420" y="884">Authorization(s)</text>
                <text x="72" y="916">:</text>
                <text x="208" y="916">:</text>
                <text x="368" y="916">:</text>
                <text x="72" y="948">HID</text>
                <text x="108" y="948">Leaf</text>
                <text x="136" y="948">A</text>
                <text x="208" y="948">HID</text>
                <text x="244" y="948">Leaf</text>
                <text x="272" y="948">A</text>
                <text x="368" y="948">HID</text>
                <text x="404" y="948">Leaf</text>
                <text x="432" y="948">B</text>
                <text x="88" y="964">Issuing</text>
                <text x="132" y="964">#1</text>
                <text x="224" y="964">Issuing</text>
                <text x="268" y="964">#N</text>
                <text x="384" y="964">Issuing</text>
                <text x="428" y="964">#1</text>
                <text x="128" y="996">:</text>
                <text x="424" y="996">:</text>
                <text x="160" y="1028">Operational</text>
                <text x="220" y="1028">#1</text>
                <text x="456" y="1028">Operational</text>
                <text x="516" y="1028">#1</text>
                <text x="104" y="1076">Operational</text>
                <text x="164" y="1076">#N</text>
                <text x="400" y="1076">Operational</text>
                <text x="460" y="1076">#N</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
+-----------------------------+
|       Apex                  |
|       Authorization(s)      o........
+-o----o----------------o-----+       :
  :    :                :             :
  :  .-o---------.    .-o---------.   :
  : | Apex       |   | Apex       |   :
  : | Issuing #1 |   | Issuing #N |   :
  : '--o------o-'    '-----------'    :
  :    :      :                       :
  :    :    .-o------------.          :
  :    :   | Operational #1 |         :
  :    :    '--------------'          :
  :  .-o------------.                 :
  : | Operational #N |                :
  :  '--------------'                 :
  :                                   :
+-o---------------------------+     +-o---------------------------+
|       HID Root A            |     |       HID Root B            |
|       Authorization(s)      o.....o       Authorization(s)      |
+-*----o----------------o-----+     +-*------o--------------------+
  |    :                :             |      :          
  |  .-o---------.    .-o---------.   |    .-o---------.
  | | HID Root A |   | HID Root A |   |   | HID Root B |
  | | Issuing #1 |   | Issuing #N |   |   | Issuing #1 |
  | '--o------o-'    '-----------'    |   '--o------o-' 
  |    :      :                       |      :      :   
  |    :    .-o------------.          |      :    .-o------------. 
  |    :   | Operational #1 |         |      :   | Operational #1 |
  |    :    '--------------'          |      :    '--------------' 
  |  .-o------------.                 |    .-o------------. 
  | | Operational #N |                |   | Operational #N |
  |  '--------------'                 |    '--------------' 
  |                                   |
+-o---------------------------+     +-o---------------------------+
|       HID Inode A           |     |       HID Inode B           |
|       Authorization(s)      o.....o       Authorization(s)      |
+-o----o----------------o-----+     +-o------o--------------------+
  |    :                :             |      :          
  |  .-o----------.   .-o----------.  |    .-o----------.
  | | HID Inode A |  | HID Inode A |  |   | HID Inode B |
  | | Issuing #1  |  | Issuing #N  |  |   | Issuing #1  |
  | '--o------o--'   '------------'   |   '--o------o--' 
  |    :      :                       |      :      :   
  |    :    .-o------------.          |      :    .-o------------. 
  |    :   | Operational #1 |         |      :   | Operational #1 |
  |    :    '--------------'          |      :    '--------------' 
  |  .-o------------.                 |    .-o------------. 
  | | Operational #N |                |   | Operational #N |
  |  '--------------'                 |    '--------------' 
  |                                   |                     
+-*---------------------------+     +-*---------------------------+
|       HID Leaf A            |     |       HID Leaf B            |
|       Authorization(s)      o.....o       Authorization(s)      |
+-------*----------------o----+     +--------*--------------------+
        :                :                   :          
      .-*----------.   .-o----------.      .-*---------.
     | HID Leaf A  |  | HID Leaf A  |     | HID Leaf B |
     | Issuing #1  |  | Issuing #N  |     | Issuing #1 |
     '--*------*--'   '------------'      '--*------*-' 
        |      :                             |      :   
        |    .-*------------.                |    .-*------------. 
        |   | Operational #1 |               |   | Operational #1 |
        |    '--------------'                |    '--------------' 
      .-*------------.                     .-*------------. 
     | Operational #N |                   | Operational #N |
      '--------------'                     '--------------' 
                                                              

]]></artwork>
        </artset>
      </figure>
      <t>In <xref target="fig-oki"/> the solid connections are REQUIRED and dotted connections are OPTIONAL. A two-level hierarchy will consist of only a Root and Leaf level with no Inodes, shown in <xref target="fig-oki"/> with a solid line but open connection point between its ancestor and descendant. Also note that <xref target="fig-oki"/> shows two distinct paths in the hierarchy, to illustrate OPTIONAL cross-endorsement, for simplicity.</t>
      <dl>
        <dt>IPv6 Prefix:</dt>
        <dd>
          <t>This level is not directly part of the OKI but performs the primary function of delegating reverse IPv6 zone(s) associated with Root Hierarchy ID values to respective Apexes or performing DNS delegations on an Apex's behalf.</t>
        </dd>
        <dt>Apex:</dt>
        <dd>
          <t>An administrative owner of a set of Root Hierarchy ID values. The Apex performs assignment and/or allocation of these values and either delegates management of the reverse IPv6 zone(s) back to the IPv6 Prefix or manages it themselves. The Apex MAY have an Authorization HHIT, with a self-signed endorsement, as part of the function to endorse membership into a hierarchy.</t>
        </dd>
        <dt>Root:</dt>
        <dd>
          <t>The first level of a Hierarchy ID, with descendant levels set to 0. It MUST have at least one Authorization HHIT to be used to obtain membership into the hierarchy and is either self-signed or endorsed by an Apex. A Root is the administrative entity that assigns/allocates the next level in the hierarchy to a descendant and manages the applicable reverse IPv6 zone(s). The endorsement of a descendant membership into the hierarchy MUST be performed using an Authorization HHIT endorsed by the direct ancestor. To support the endorsement of operational entities under the Root Hierarchy ID, the Root SHOULD use one or more Issuing HHITs that are endorsed by Root Authorization HHITs.</t>
        </dd>
        <dt>Inode:</dt>
        <dd>
          <t>A middle level node that has both an ancestor and descendant in the Hierarchy ID. It MUST have at least one Authorization HHIT to be used to obtain membership into the hierarchy and MUST be endorsed by a direct ancestor. An Inode is the administrative entity that assigns/allocates the next level in the hierarchy to a descendant and manages the applicable reverse IPv6 zone(s). To support the endorsement of operational entities under the Inode Hierarchy ID, the Inode SHOULD use one or more Issuing HHITs that are endorsed by Inode Authorization HHITs.</t>
        </dd>
        <dt>Leaf:</dt>
        <dd>
          <t>The last level of a Hierarchy ID. It MUST have at least one Authorization HHIT to be used to obtain membership into the hierarchy and MUST be endorsed by a direct ancestor. A Leaf node is the administrative entity that registers operational entities and manages the applicable reverse IPv6 zone(s). To support the endorsement of operational entities under the Leaf Hierarchy ID, the Leaf MUST use one or more Issuing HHITs that are endorsed by Leaf Authorization HHITs.</t>
        </dd>
      </dl>
      <t>This document allocates two new HHIT Entity Types in each level of hierarchy, one for Authorization and one for Issuing (<xref target="iana-het"/>).</t>
      <section anchor="hierarchy-responsibilities">
        <name>Hierarchy Responsibilities</name>
        <t>An HOME has a number of responsibilities depending on its place in the hierarchy. This section covers the technical responsibilities of each level of an HHIT's hierarchy. Specific non-technical policies for hierarchy levels are out of scope for this document and are expected to be developed into OKI policy guidance or added to existing PKI policy guidance for each use-case.</t>
        <table anchor="tbl-responsibilities">
          <name>Hierarchy Responsibilities</name>
          <thead>
            <tr>
              <th align="left">Responsibility</th>
              <th align="left">Apex</th>
              <th align="left">Root</th>
              <th align="left">Inode</th>
              <th align="left">Leaf</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">provide using public methods any requirements, policy and/or guidance to prospective descendants</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
            </tr>
            <tr>
              <td align="left">provide OKIX-compatible certificate(s) as endorsement for registration of descendant(s)</td>
              <td align="left">MAY<br/><em>see <strong>1+ Authorization HHIT</strong></em></td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
            </tr>
            <tr>
              <td align="left">maintain registrations with relevant Personally Identifiable Information (PII) as required by their jurisdiction</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
            </tr>
            <tr>
              <td align="left">fulfill any jurisdiction requirements that are out of scope for this document</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
            </tr>
            <tr>
              <td align="left">support <xref target="RFC7401"/><br/><em>MAY support services using <xref target="RFC8003"/> such as <xref target="RFC8004"/></em></td>
              <td align="left">-</td>
              <td align="left">MAY</td>
              <td align="left">MAY</td>
              <td align="left">MAY</td>
            </tr>
            <tr>
              <td align="left">1+ Authorization HHIT<br/><em>see <xref target="tbl-add-auth"/></em></td>
              <td align="left">MAY</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
            </tr>
            <tr>
              <td align="left">1+ Issuing HHIT<br/><em>MUST have same Hierarchy ID as an Authorization HHIT</em><br/><em>MUST be locally registered using an Authorization HHIT</em></td>
              <td align="left">MAY</td>
              <td align="left">MAY</td>
              <td align="left">SHOULD</td>
              <td align="left">MUST</td>
            </tr>
            <tr>
              <td align="left">cross-endorse with siblings<br/><em>MUST use an Authorization HHIT</em></td>
              <td align="left">-</td>
              <td align="left">MAY</td>
              <td align="left">MAY</td>
              <td align="left">MAY</td>
            </tr>
            <tr>
              <td align="left">maintain reverse IPv6 zone(s)</td>
              <td align="left">SHOULD<br/><em>or delegate back to the IPv6 Prefix</em></td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
            </tr>
            <tr>
              <td align="left">assign/allocate values in the X level of hierarchy in the Hierarchy ID<br/><em>see <xref target="tbl-add-assign"/></em></td>
              <td align="left">MUST<br/><em>X=Root</em></td>
              <td align="left">MUST<br/><em>X=Inode</em></td>
              <td align="left">MUST<br/><em>X=Inode or Leaf</em></td>
              <td align="left">-</td>
            </tr>
            <tr>
              <td align="left">implement <xref target="home-registration"/> and <xref target="query-process"/></td>
              <td align="left">MAY<br/><em>or 501 Not Implemented</em></td>
              <td align="left">SHOULD<br/><em>or 501 Not Implemented</em></td>
              <td align="left">SHOULD<br/><em>or 501 Not Implemented</em></td>
              <td align="left">MUST</td>
            </tr>
          </tbody>
        </table>
        <table anchor="tbl-add-auth">
          <name>Additional Responsibilities for 1+ Authorization HHIT</name>
          <thead>
            <tr>
              <th align="left">1+ Authorization HHIT</th>
              <th align="left">Apex</th>
              <th align="left">Root</th>
              <th align="left">Inode</th>
              <th align="left">Leaf</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">set Hierarchy ID to all zeros</td>
              <td align="left">MUST</td>
              <td align="left">MUST NOT</td>
              <td align="left">MUST NOT</td>
              <td align="left">MUST NOT</td>
            </tr>
            <tr>
              <td align="left">set Hierarchy ID to assignment/allocation from ancestor</td>
              <td align="left">MUST NOT</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
            </tr>
            <tr>
              <td align="left">self register</td>
              <td align="left">MUST</td>
              <td align="left">if <strong>Apex</strong> MUST then MUST NOT</td>
              <td align="left">MUST NOT</td>
              <td align="left">MUST NOT</td>
            </tr>
            <tr>
              <td align="left">registered to direct ancestor</td>
              <td align="left">MUST NOT</td>
              <td align="left">if <strong>Apex</strong> MUST NOT then MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
            </tr>
          </tbody>
        </table>
        <table anchor="tbl-add-assign">
          <name>Additional Responsibilities for Assign/allocate values in Hierarchy ID</name>
          <thead>
            <tr>
              <th align="left">Assign/allocate values in Hierarchy ID</th>
              <th align="left">Apex</th>
              <th align="left">Root</th>
              <th align="left">Inode</th>
              <th align="left">Leaf</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">verify prospective descendant(s) for hierarchy membership</td>
              <td align="left">SHOULD</td>
              <td align="left">SHOULD</td>
              <td align="left">SHOULD</td>
              <td align="left">-</td>
            </tr>
            <tr>
              <td align="left">register descendant(s) hierarchy members using an Authorization HHIT</td>
              <td align="left">MAY</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">-</td>
            </tr>
            <tr>
              <td align="left">delegate corresponding reverse IPv6 zone(s) to descendant(s)</td>
              <td align="left">SHOULD<br/><em>see <strong>maintain reverse IPv6 zone(s)</strong></em></td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">-</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="okix">
        <name>ORCHID Key Infrastructure X.509 (OKIX)</name>
        <t>Existing Public Key Infrastructure X.509 (PKIX) certificate profiles can be augmented to support HHITs creating ORCHID Key Infrastructure X.509 (OKIX) profiles.</t>
        <t>Other X.509 fields and OIDs MAY be required in a given jurisdiction. This is up to the original PKI(X) policy if applicable and is out of scope for this document.</t>
        <section anchor="okix-csr">
          <name>Signing Request</name>
          <t>The Certificate Signing Request is mandatory for all HHIT registrations. Depending on the entity being registered, there is specific content rules.</t>
          <figure anchor="fig-csr">
            <name>Certificate Signing Request Profile</name>
            <sourcecode type="ascii-text"><![CDATA[
Certificate Request:
    Data:
        Version: 1 (0x0)
        Subject: <subject to policy>
        Subject Public Key Info: <subject to policy>
        Attributes:
        Requested Extensions:
            X509v3 Subject Alternative Name: critical
                IP Address: <subject HHIT>
    Signature Algorithm: <subject to policy>
]]></sourcecode>
          </figure>
          <dl>
            <dt><em>Subject</em>:</dt>
            <dd>
              <t>As defined in <xref section="4.1.2.6" sectionFormat="of" target="RFC5280"/>. This field is filled in based on the HHIT Entity Type being registered and subject to policy of the Certificate Authority.</t>
            </dd>
            <dt><em>Subject Alternative Name IP6</em>:</dt>
            <dd>
              <t>When the registrant knows which HID and/or Suite ID they want the CSR SHOULD contain the Subject Alternate Name extension as defined in <xref section="4.2.1.6" sectionFormat="of" target="RFC5280"/> using ipAddress containing the fully formed HHIT and MUST mark the extension as <tt>critical</tt>. The HOME MUST check to ensure that the HHIT located in the extension is properly generated with the included public key of this CSR. If the registrant does not know or care the value of their HID and/or Suite ID, the Extensions field MUST NOT appear and the HOME will use its HID for HHIT generation using the public key provided by this CSR.</t>
            </dd>
          </dl>
          <t>The use of other Extension fields are out of scope for this document.</t>
        </section>
        <section anchor="okix-lite">
          <name>Certificate: Lite Profile</name>
          <t>OKIX-Lite is designed to fully encapsulate an OKI in the smallest reasonable X.509 certificates (e.g. 240 bytes for DER), but still adhere to <xref target="RFC5280"/> MUST field usage. The profile can be found in <xref target="okix-lite-profile"/> and a field matrix found in <xref target="okix-lite-matrix"/>.</t>
          <figure anchor="okix-lite-profile">
            <name>OKIX-Lite Profile</name>
            <sourcecode type="ascii-text"><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: <1 byte in size>
        Signature Algorithm: <subject to policy>
        Issuer: CN = <issuer HHIT>
        Validity
            Not Before: <subject to policy>
            Not After : <subject to policy>
        Subject: <subject to policy>
        Subject Public Key Info: <subject to policy>
        X509v3 extensions:
            X509v3 Subject Alternative Name: critical
                IP Address: <subject HHIT>
    Signature Algorithm: <subject to policy>
]]></sourcecode>
          </figure>
          <table anchor="okix-lite-matrix">
            <name>OKIX-Lite Field Matrix</name>
            <thead>
              <tr>
                <th align="left">Field</th>
                <th align="left">Authorization</th>
                <th align="left">Issuing</th>
                <th align="left">Operational</th>
                <th align="left">Comments</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Serial Number</td>
                <td align="left">MUST</td>
                <td align="left">MUST</td>
                <td align="left">MUST</td>
                <td align="left">
                  <xref target="lite-serial"/></td>
              </tr>
              <tr>
                <td align="left">Subject</td>
                <td align="left">MUST</td>
                <td align="left">MUST</td>
                <td align="left">MUST NOT</td>
                <td align="left">
                  <xref target="ca-subject"/></td>
              </tr>
              <tr>
                <td align="left">Issuer</td>
                <td align="left">MUST</td>
                <td align="left">MUST</td>
                <td align="left">MUST</td>
                <td align="left">
                  <xref target="issuer"/></td>
              </tr>
              <tr>
                <td align="left">Subject Alternative Name IP6</td>
                <td align="left">MUST</td>
                <td align="left">MUST</td>
                <td align="left">MUST</td>
                <td align="left">
                  <xref target="san-ip6"/></td>
              </tr>
              <tr>
                <td align="left">Subject Alternative Name URI</td>
                <td align="left">MAY</td>
                <td align="left">MAY</td>
                <td align="left">MAY</td>
                <td align="left">
                  <xref target="san-uri"/></td>
              </tr>
              <tr>
                <td align="left">Basic Constraints</td>
                <td align="left">MUST</td>
                <td align="left">MUST</td>
                <td align="left">MUST NOT</td>
                <td align="left">CA=True, flagged as Critical</td>
              </tr>
              <tr>
                <td align="left">Subject Key Identifier</td>
                <td align="left">MUST NOT</td>
                <td align="left">MUST NOT</td>
                <td align="left">MUST NOT</td>
                <td align="left">-</td>
              </tr>
              <tr>
                <td align="left">Authority Key Identifier</td>
                <td align="left">MUST NOT</td>
                <td align="left">MUST NOT</td>
                <td align="left">MUST NOT</td>
                <td align="left">-</td>
              </tr>
              <tr>
                <td align="left">Key Usage</td>
                <td align="left">MAY</td>
                <td align="left">MAY</td>
                <td align="left">MAY</td>
                <td align="left">-</td>
              </tr>
              <tr>
                <td align="left">
                  <em>Certificate Authority</em> Policy OIDs</td>
                <td align="left">MAY</td>
                <td align="left">MAY</td>
                <td align="left">MAY</td>
                <td align="left">-</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="okix-full">
          <name>Certificate: Full Profile</name>
          <t>The X.509 certificates are minimalistic (less than 400 bytes for DER). The profile can be found in <xref target="okix-full-profile"/> and a field matrix found in <xref target="okix-full-matrix"/>. This profile MUST be used as the Canonical Registration Certificate in the DNS.</t>
          <figure anchor="okix-full-profile">
            <name>OKIX-Full Profile</name>
            <sourcecode type="ascii-text"><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: <20 bytes in size>
        Signature Algorithm: <subject to policy>
        Issuer: CN = <issuer HHIT>
        Validity
            Not Before: <subject to policy>
            Not After : <subject to policy>
        Subject: <subject to policy>
        Subject Public Key Info: <subject to policy>
        X509v3 extensions:
            X509v3 Subject Alternative Name: critical 
                IP Address: <subject HHIT>
                URI: <subject to policy>
            X509v3 Subject Key Identifier: <subject HHIT>
            X509v3 Authority Key Identifier: <issuer HHIT>
            X509v3 Basic Constraints: critical
            X509v3 Key Usage: critical
    Signature Algorithm: <subject to policy>
]]></sourcecode>
          </figure>
          <table anchor="okix-full-matrix">
            <name>OKIX-Full Field Matrix</name>
            <thead>
              <tr>
                <th align="left">Field</th>
                <th align="left">Authorization</th>
                <th align="left">Issuing</th>
                <th align="left">Operational</th>
                <th align="left">Comments</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Serial Number</td>
                <td align="left">MUST</td>
                <td align="left">MUST</td>
                <td align="left">MUST</td>
                <td align="left">
                  <xref target="full-serial"/></td>
              </tr>
              <tr>
                <td align="left">Subject</td>
                <td align="left">MUST</td>
                <td align="left">MUST</td>
                <td align="left">MUST NOT</td>
                <td align="left">
                  <xref target="ca-subject"/></td>
              </tr>
              <tr>
                <td align="left">Issuer</td>
                <td align="left">MUST</td>
                <td align="left">MUST</td>
                <td align="left">MUST</td>
                <td align="left">
                  <xref target="issuer"/></td>
              </tr>
              <tr>
                <td align="left">Subject Alternative Name IP6</td>
                <td align="left">MUST</td>
                <td align="left">MUST</td>
                <td align="left">MUST</td>
                <td align="left">
                  <xref target="san-ip6"/></td>
              </tr>
              <tr>
                <td align="left">Subject Alternative Name URI</td>
                <td align="left">MAY</td>
                <td align="left">MAY</td>
                <td align="left">MAY</td>
                <td align="left">
                  <xref target="san-uri"/></td>
              </tr>
              <tr>
                <td align="left">Basic Constraints</td>
                <td align="left">MUST</td>
                <td align="left">MUST</td>
                <td align="left">MUST NOT</td>
                <td align="left">CA=True, flagged as Critical</td>
              </tr>
              <tr>
                <td align="left">Subject Key Identifier</td>
                <td align="left">MUST</td>
                <td align="left">MUST</td>
                <td align="left">MUST NOT</td>
                <td align="left">
                  <xref target="ski"/></td>
              </tr>
              <tr>
                <td align="left">Authority Key Identifier</td>
                <td align="left">MUST</td>
                <td align="left">MUST</td>
                <td align="left">MUST</td>
                <td align="left">
                  <xref target="aki"/></td>
              </tr>
              <tr>
                <td align="left">Key Usage</td>
                <td align="left">SHOULD</td>
                <td align="left">SHOULD</td>
                <td align="left">SHOULD</td>
                <td align="left">-</td>
              </tr>
              <tr>
                <td align="left">
                  <em>Certificate Authority</em> Policy OIDs</td>
                <td align="left">RECOMMENDED</td>
                <td align="left">RECOMMENDED</td>
                <td align="left">RECOMMENDED</td>
                <td align="left">-</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="certificate-fields">
          <name>Certificate Fields</name>
          <t>The following sections contain clarifications on the usage of fields in the OKIX when they deviate from "standard" X.509 <xref target="RFC5280"/> practice.</t>
          <section anchor="serial-number">
            <name>Serial Number</name>
            <section anchor="lite-serial">
              <name>Lite</name>
              <t>The Serial Number is a MUST field, but it has no usage in the Lite profile. It is 1-byte in size and thus duplicates are guaranteed. To drop this field could make many X.509 parsing libraries fail.</t>
              <t>However, <em>Certificate Authority</em> certificate's Serial Number MAY be the common 20 bytes. This is to avoid possible issues with general software expecting this size Serial Numbers for <em>Certificate Authority</em>s.</t>
              <t>If Serial Numbers are incrementally assigned, 31 bits are sufficient for an Issuing <em>Certificate Authority</em> with 2 billion HHITs active. A <em>Certificate Authority</em> should determine its best-used Serial Number field size to limit the impact of this field on the certificate size.</t>
            </section>
            <section anchor="full-serial">
              <name>Full</name>
              <t>The certificates MUST contain a 20-byte randomly generated Serial Number, compliant with CABForum recommendations. Serial Numbers are included for CRL functionality.</t>
            </section>
          </section>
          <section anchor="ca-subject">
            <name>Subject</name>
            <t>The Subject field is only used in Authorization and Issuing certificates. For Operational certificates, the Subject MUST be empty and the HHIT will be in Subject Alternative Name (<xref target="san-ip6"/>). In the Subject Alternative Name, the HHIT can be properly encoded as an IPv6 address. The contents of the Subject when used are determined by policy and is out of scope for this document.</t>
          </section>
          <section anchor="issuer">
            <name>Issuer</name>
            <t>The Issuer MUST be the higher level's HHIT.</t>
            <t>The Issuer for the Apex Authorization certificate MUST be its HHIT (indicating self-signed). If the RAA Authorization certificate is self-signed (i.e., no Apex), its Issuer is its HHIT.</t>
            <t>The Issuer content of its HHIT assists in finding this specific Issuer in the <tt>ip6.arpa.</tt> DNS tree and any additional information. The exact information that is provide is out of scope for this document.</t>
          </section>
          <section anchor="san-ip6">
            <name>Subject Alternative Name IP6</name>
            <t>Subject Alternative Name is only used in Operational certificates. It is used to provide the HHIT as an IP address with an Empty Subject (Subject Alternative Name MUST be flagged as Critical).</t>
          </section>
          <section anchor="san-uri">
            <name>Subject Alternative Name URI</name>
            <t>This field contains a pointer in the form of a URI where additional information on the <em>Certificate Authority</em> and certificates under its control can be found. The contents MUST be a base URL containing at least the fields scheme, host and port to query for additional information of a HHIT.</t>
            <t>Authorization certificates MAY have a Subject Alternative Name URI and MUST when it is self-signed. Issuing certificates SHOULD have a Subject Alternative Name URI. Operational certificates MAY have a Subject Alternative Name URI.</t>
            <t>The RECOMMENDED configuration with respect to Issuing and Operational certificates for a <em>Certificate Authority</em> is to place the Subject Alternative Name URI in the Issuing certificate and exclude them in Operational certificates.</t>
            <t>When multiple providers are used by the <em>Certificate Authority</em> to handle additional information there SHOULD be a unique Issuing certificate with Subject Alternative Name URI for each provider, and Operational certificates MUST NOT contain a Subject Alternative Name URI.</t>
            <t>Otherwise a <em>Certificate Authority</em> with multiple providers MUST NOT have a Subject Alternative Name URI in the Issuing certificate and MUST set the Subject Alternative Name URI to the specific provider for each Operational certificate.</t>
          </section>
          <section anchor="ski">
            <name>Subject Key Identifier</name>
            <t>The Subject Key Identifier MUST be the HHIT. This is a major deviation from "standard" X.509 certificates that hash (normally with SHA2) the Public Key to fill the Subject Key Identifier.</t>
            <t>The Subject Key Identifier is NOT included in Operational certificates. If needed by some application, it is identical with <xref target="san-ip6"/>.</t>
          </section>
          <section anchor="aki">
            <name>Authority Key Identifier</name>
            <t>The Authority Key Identifier MUST be the higher level's Subject Key Identifier (i.e. HHIT). This partially follows standard practice to chain up the Authority Key Identifier from the Subject Key Identifier, except for how the Subject Key Identifiers are populated.</t>
            <t>The Authority Key Identifier for the Apex Authorization (or self-signed RAA Authorization) certificate MUST be the Subject Key Identifier (indicating self-signed).</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="ic">
      <name>IANA Considerations</name>
      <section anchor="iana-well-known">
        <name>Well-Known URIs</name>
        <t>IANA is requested to add the following entries in the "Well-Known URIs" registry <xref target="IANA.WellKnownURIs"/>.</t>
        <table>
          <name>Additions to Well-Known URIs Registry</name>
          <thead>
            <tr>
              <th align="left">URI Suffix</th>
              <th align="left">Change Controller</th>
              <th align="left">Reference</th>
              <th align="left">Status</th>
              <th align="left">Related Information</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">home/register</td>
              <td align="left">IETF</td>
              <td align="left">This RFC</td>
              <td align="left">permanent</td>
              <td align="left">N/A</td>
            </tr>
            <tr>
              <td align="left">home/query</td>
              <td align="left">IETF</td>
              <td align="left">This RFC</td>
              <td align="left">permanent</td>
              <td align="left">N/A</td>
            </tr>
            <tr>
              <td align="left">home/oaas</td>
              <td align="left">IETF</td>
              <td align="left">This RFC</td>
              <td align="left">permanent</td>
              <td align="left">N/A</td>
            </tr>
          </tbody>
        </table>
        <ul empty="true">
          <li>
            <t>Author Note: should we also add Well-Known URIs for update and delete methods? This would then cover all parts of CRUD.</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-claims">
        <name>CWT &amp; JWT Claims</name>
        <t>HOME Tokens contain a Claim Set compatible with those of CWT and JWT, so the CWT and JWT Claims registries, <xref target="IANA.CWT.Claims"/> and <xref target="IANA.JWT.Claims"/>, are reused. No new IANA registry is created.</t>
        <t>Per this specification, the following values are requested to be added to the "JSON Web Token Claims" registry established by <xref target="RFC7519"/> and the "CBOR Web Token (CWT) Claims" registry established by <xref target="RFC8392"/>. Each entry is requested to be added to both registries. The "Claim Description", "Change Controller", and "Reference" fields are common and equivalent for the JWT and CWT registries. The "Claim Key" and "Claim Value Type" fields are for the CWT registry only. The "Claim Name" field is as defined for the CWT registry, not the JWT registry. The "JWT Claim Name" field is equivalent to the "Claim Name" field in the JWT registry.</t>
        <figure>
          <name>HOME Registration Inquiry Claim: Registration Form</name>
          <sourcecode type="ascii-text"><![CDATA[
Claim Name: HOME Registration Inquiry
Claim Description: HOME Registration Inquiry
JWT Claim Name: hri
Claim Key: TBD1
Claim Value Type: array
Change Controller: IETF
Reference: This RFC
]]></sourcecode>
        </figure>
        <figure>
          <name>HOME Registration Response Claim: Registration Form</name>
          <sourcecode type="ascii-text"><![CDATA[
Claim Name: HOME Registration Response
Claim Description: HOME Registration Response
JWT Claim Name: hrr
Claim Key: TBD2
Claim Value Type: array
Change Controller: IETF
Reference: This RFC
]]></sourcecode>
        </figure>
      </section>
      <section anchor="iana-rdap-ext">
        <name>RDAP Extensions Registry</name>
        <t>IANA is requested to register the following value in the "RDAP Extensions" registry <xref target="IANA.RDAP.Extensions"/>.</t>
        <figure>
          <name>RDAP Extensions: Registration Form</name>
          <sourcecode type="ascii-text"><![CDATA[
Extension Identifier: 
  home_v0
Registry Operator:
  Any
Specification:
  This specification
Contact:
  IETF <iesg@ietf.org>
Intended Usage:
  This extension is used to convey private information 
  stored under a HOME registration.
]]></sourcecode>
        </figure>
      </section>
      <section anchor="iana-het">
        <name>HHIT Entity Types</name>
        <t>IANA is requested to make the following changes to the "HHIT Entity Types" registry under <xref target="IANA.DRIP"/> to align with <xref target="tbl-het"/>.</t>
        <table anchor="tbl-het">
          <name>Updated HHIT Entity Type Registry</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">HHIT Entity Type</th>
              <th align="left">Abbreviation</th>
              <th align="left">Operational (Y/N)</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0</td>
              <td align="left">Undefined</td>
              <td align="left">UKN</td>
              <td align="left">N</td>
              <td align="left">
                <xref target="RFC9886"/></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">Hierarchical ORCHID Management Entity</td>
              <td align="left">HOME</td>
              <td align="left">N</td>
              <td align="left">This RFC</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">Hierarchical ORCHID Management Entity: Authorization</td>
              <td align="left">HOME-A</td>
              <td align="left">N</td>
              <td align="left">This RFC</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">Hierarchical ORCHID Management Entity: Issuing</td>
              <td align="left">HOME-I</td>
              <td align="left">N</td>
              <td align="left">This RFC</td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">HOME Apex</td>
              <td align="left">APEX</td>
              <td align="left">N</td>
              <td align="left">
                <xref target="RFC9886"/></td>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">HOME Apex: Authorization</td>
              <td align="left">APEX-A</td>
              <td align="left">N</td>
              <td align="left">This RFC</td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">HOME Apex: Issuing</td>
              <td align="left">APEX-I</td>
              <td align="left">N</td>
              <td align="left">This RFC</td>
            </tr>
            <tr>
              <td align="left">7</td>
              <td align="left">DRIP Identity Management Entity</td>
              <td align="left">DIME</td>
              <td align="left">N</td>
              <td align="left">
                <xref target="RFC9886"/></td>
            </tr>
            <tr>
              <td align="left">8</td>
              <td align="left">DRIP Identity Management Entity: Authorization</td>
              <td align="left">DIME-A</td>
              <td align="left">N</td>
              <td align="left">This RFC</td>
            </tr>
            <tr>
              <td align="left">9</td>
              <td align="left">DRIP Identity Management Entity: Issuing</td>
              <td align="left">DIME-I</td>
              <td align="left">N</td>
              <td align="left">This RFC</td>
            </tr>
            <tr>
              <td align="left">10</td>
              <td align="left">Registered Assigning Authority</td>
              <td align="left">RAA</td>
              <td align="left">N</td>
              <td align="left">
                <xref target="RFC9886"/></td>
            </tr>
            <tr>
              <td align="left">11</td>
              <td align="left">Registered Assigning Authority: Authorization</td>
              <td align="left">RAA-A</td>
              <td align="left">N</td>
              <td align="left">This RFC</td>
            </tr>
            <tr>
              <td align="left">12</td>
              <td align="left">Registered Assigning Authority: Issuing</td>
              <td align="left">RAA-I</td>
              <td align="left">N</td>
              <td align="left">This RFC</td>
            </tr>
            <tr>
              <td align="left">13</td>
              <td align="left">HHIT Domain Authority</td>
              <td align="left">HDA</td>
              <td align="left">N</td>
              <td align="left">
                <xref target="RFC9886"/></td>
            </tr>
            <tr>
              <td align="left">14</td>
              <td align="left">HHIT Domain Authority: Authorization</td>
              <td align="left">HDA-A</td>
              <td align="left">N</td>
              <td align="left">This RFC</td>
            </tr>
            <tr>
              <td align="left">15</td>
              <td align="left">HHIT Domain Authority: Issuing</td>
              <td align="left">HDA-I</td>
              <td align="left">N</td>
              <td align="left">This RFC</td>
            </tr>
            <tr>
              <td align="left">16</td>
              <td align="left">Unmanned Aircraft</td>
              <td align="left">UA</td>
              <td align="left">Y</td>
              <td align="left">
                <xref target="RFC9886"/></td>
            </tr>
            <tr>
              <td align="left">17</td>
              <td align="left">Ground Control Station</td>
              <td align="left">GCS</td>
              <td align="left">Y</td>
              <td align="left">
                <xref target="RFC9886"/></td>
            </tr>
            <tr>
              <td align="left">18</td>
              <td align="left">Unmanned Aircraft System</td>
              <td align="left">UAS</td>
              <td align="left">Y</td>
              <td align="left">
                <xref target="RFC9886"/></td>
            </tr>
            <tr>
              <td align="left">19</td>
              <td align="left">Remote Identification Module</td>
              <td align="left">RID</td>
              <td align="left">Y</td>
              <td align="left">
                <xref target="RFC9886"/></td>
            </tr>
            <tr>
              <td align="left">20</td>
              <td align="left">UAS Pilot</td>
              <td align="left">PILOT</td>
              <td align="left">Y</td>
              <td align="left">
                <xref target="RFC9886"/></td>
            </tr>
            <tr>
              <td align="left">21</td>
              <td align="left">UAS Operator</td>
              <td align="left">OP</td>
              <td align="left">Y</td>
              <td align="left">
                <xref target="RFC9886"/></td>
            </tr>
            <tr>
              <td align="left">22</td>
              <td align="left">Discovery &amp; Synchronization Service</td>
              <td align="left">DSS</td>
              <td align="left">Y</td>
              <td align="left">
                <xref target="RFC9886"/></td>
            </tr>
            <tr>
              <td align="left">23</td>
              <td align="left">UAS Service Supplier</td>
              <td align="left">USS</td>
              <td align="left">Y</td>
              <td align="left">
                <xref target="RFC9886"/></td>
            </tr>
            <tr>
              <td align="left">24</td>
              <td align="left">Network RID Service Provider</td>
              <td align="left">DP</td>
              <td align="left">Y</td>
              <td align="left">
                <xref target="RFC9886"/></td>
            </tr>
            <tr>
              <td align="left">25</td>
              <td align="left">Network RID Display Provider</td>
              <td align="left">SP</td>
              <td align="left">Y</td>
              <td align="left">
                <xref target="RFC9886"/></td>
            </tr>
            <tr>
              <td align="left">26</td>
              <td align="left">Supplemental Data Service Provider</td>
              <td align="left">SDSP</td>
              <td align="left">Y</td>
              <td align="left">
                <xref target="RFC9886"/></td>
            </tr>
            <tr>
              <td align="left">27</td>
              <td align="left">Crowd Sourced RID Finder</td>
              <td align="left">FINDER</td>
              <td align="left">Y</td>
              <td align="left">
                <xref target="RFC9886"/></td>
            </tr>
          </tbody>
        </table>
        <t>The above changes include two new fields for "Abbreviation" and "Operational (Y/N)", re-arrangement of the first 15 values and addition of entries for Authorization and Issuing for applicable entity types.</t>
      </section>
      <section anchor="iana-hp">
        <name>HOME Parameters</name>
        <t>This document requests IANA create a new registry under <xref target="IANA.DRIP"/> called "HOME Parameters" with registry policies described in <xref target="tbl-hp-registry"/>.</t>
        <table anchor="tbl-hp-registry">
          <name>HOME Parameters: Registry Policies</name>
          <thead>
            <tr>
              <th align="left">Range</th>
              <th align="left">Registration Policy</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Integers less than 0</td>
              <td align="left">delegated to HOME Common Parameters registry</td>
            </tr>
            <tr>
              <td align="left">Integers greater than -1</td>
              <td align="left">Reserved</td>
            </tr>
          </tbody>
        </table>
        <t>The positive integer values (including zero) MUST NOT be directly allocated. Instead new registries for specific use-case parameters/keys are created, inherit the HOME Common Parameter registry (<xref target="iana-hcp"/>) for negative values, and setup new allocation schemes for the positive integers in their scope. See <xref target="iana-hap"/> for an example. Such a new registry SHOULD have an associated Media Type to allow participants a mechanism to explicitly provide context for the parameter set in use.</t>
        <section anchor="registry-fields">
          <name>Registry Fields</name>
          <dl>
            <dt><em>Key</em>:</dt>
            <dd>
              <t>Title of the key.</t>
            </dd>
            <dt><em>Description</em>:</dt>
            <dd>
              <t>A short description of the entry providing an overview of its semantic meaning and its expected use-cases.</t>
            </dd>
            <dt><em>Name</em>:</dt>
            <dd>
              <t>A string value, to be used as a <tt>key</tt> in the <tt>key: value</tt> pair of a JSON object. No specific rules apply for syntax beyond being a valid JSON string for a object key, but it is recommended to use all lower-case and snake-case with underscores. Care should be given to the length of a Name to reduce wire size of JSON encodings for constrained environments.</t>
            </dd>
            <dt><em>Label</em>:</dt>
            <dd>
              <t>A integer value to be used as a key in a CBOR map.</t>
            </dd>
            <dt><em>Value Type</em>:</dt>
            <dd>
              <t>CBOR/JSON typing for value under the Key.</t>
            </dd>
            <dt><em>Change Controller</em>:</dt>
            <dd>
              <t>TDB</t>
            </dd>
            <dt><em>Reference</em>:</dt>
            <dd>
              <t>A link to a permanent and readily available specification defining the value syntax and semantics to be used for this key.</t>
            </dd>
          </dl>
        </section>
        <section anchor="hp-form">
          <name>Registration Form</name>
          <figure anchor="txt-hp-form">
            <name>HOME Parameters: Registration Form</name>
            <sourcecode type="ascii-text"><![CDATA[
Key:
Description:
Name:
Label:
Value Type:
Change Controller:
Reference:
]]></sourcecode>
          </figure>
          <section anchor="review-criteria">
            <name>Review Criteria</name>
            <t>For a Key the specified value of a new registration should not duplicate the syntax and/or semantics of an existing registration. For the Name parameter of the Key, a new registration MUST NOT duplicate an existing registration Name.</t>
            <t>Value Type MUST be a valid CBOR type or from <xref target="IANA.CBOR.Tags"/>. Their typing in JSON is assumed to follow the translation from CBOR to JSON following <xref section="6" sectionFormat="of" target="RFC8949"/>.</t>
          </section>
        </section>
      </section>
      <section anchor="iana-hcp">
        <name>HOME Common Parameters</name>
        <t>This document requests IANA create a new registry under <xref target="IANA.DRIP"/> called "HOME Common Parameters" with registry policies described in <xref target="tbl-hcp-registry"/>. Initial entries for this registry are in <xref target="txt-hcp"/> and uses the registration form of <xref target="hp-form"/>.</t>
        <table anchor="tbl-hcp-registry">
          <name>HOME Common Parameters: Registry Policies</name>
          <thead>
            <tr>
              <th align="left">Range</th>
              <th align="left">Registration Policy</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Integers less than -65536</td>
              <td align="left">Private Use (<xref section="4.2" sectionFormat="of" target="RFC8126"/>)</td>
            </tr>
            <tr>
              <td align="left">Integers in the range -257 to -65536</td>
              <td align="left">Specification Required (<xref section="4.7" sectionFormat="of" target="RFC8126"/>)</td>
            </tr>
            <tr>
              <td align="left">Integers in the range -1 to -256</td>
              <td align="left">Standard Action (<xref section="4.9" sectionFormat="of" target="RFC8126"/>)</td>
            </tr>
          </tbody>
        </table>
        <figure anchor="txt-hcp">
          <name>Initial HOME Common Parameters</name>
          <sourcecode type="ascii-text"><![CDATA[
Key: HHIT
Description: Hierarchial Host Identity Tag & Entity Type
Name: hhit
Label: -1
Value Type: array
Change Controller: IETF
Reference: This RFC

Key: VNB
Description: Valid Not Before
Name: vnb
Label: -2
Value Type: tdate / time
Change Controller: IETF
Reference: This RFC

Key: VNA
Description: Valid Not After
Name: vna
Label: -3
Value Type: tdate / time / number
Change Controller: IETF
Reference: This RFC

Key: Publish
Description: Boolean to publish to DNS
Name: publish
Label: -4
Value Type: bool
Change Controller: IETF
Reference: This RFC

Key: Certificate Signing Request (CSR)
Description: DER Encoded X.509 CSR
Name: csr
Label: -5
Value Type: bytes
Change Controller: IETF
Reference: This RFC

Key: Oracle Certificate
Description: DER Encoded Oracle X.509 Certificate
Name: oracle_x
Label: -6
Value Type: bytes
Change Controller: IETF
Reference: This RFC

Key: Canonical Certificate
Description: DER Encoded X.509 Certificate
Name: canon_x
Label: -7
Value Type: bytes
Change Controller: IETF
Reference: This RFC

Key: Canonical Certificate Chain
Description: List of DER Encoded X.509 Certificates
Name: canon_chain
Label: -8
Value Type: array
Change Controller: IETF
Reference: This RFC

Key: Contact
Description: Base64 Encoded jCard Contact Information
Name: contact
Label: -9
Value Type: text
Change Controller: IETF
Reference: This RFC
]]></sourcecode>
        </figure>
      </section>
      <section anchor="iana-hap">
        <name>HOME Aviation Parameters</name>
        <t>This document requests IANA create a new registry under <xref target="IANA.DRIP"/> called "HOME Aviation Parameters" with registry policies described in <xref target="tbl-hap-registry"/>. Initial entries for this registry are in <xref target="txt-hap"/> and uses the registration form of <xref target="hp-form"/>.</t>
        <t>When using this registry the "ctx" parameter of <xref target="iana-mt"/> is set to "aviation".</t>
        <table anchor="tbl-hap-registry">
          <name>HOME Aviation Parameters: Registry Policies</name>
          <thead>
            <tr>
              <th align="left">Range</th>
              <th align="left">Registration Policy</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Integers less than 0</td>
              <td align="left">delegated to HOME Common Parameters registry</td>
            </tr>
            <tr>
              <td align="left">Integers in the range 0 to 65535</td>
              <td align="left">Specification Required (<xref section="4.7" sectionFormat="of" target="RFC8126"/>)</td>
            </tr>
            <tr>
              <td align="left">Integers greater than 65535</td>
              <td align="left">First Come First Served (<xref section="4.3" sectionFormat="of" target="RFC8126"/>)</td>
            </tr>
          </tbody>
        </table>
        <figure anchor="txt-hap">
          <name>Initial HOME Aviation Parameters</name>
          <sourcecode type="ascii-text"><![CDATA[
Key: UAS Type 
Description: ASTM F3411 UAS Type Enumeration
Name: uas_type
Label: 0
Value Type: uint
Change Controller: IETF
Reference: Section 5.2 of RFC9886

Key: UAS Identifiers
Description: UAS ID Type & Value Pairs
Name: uas_ids
Label: 1
Value Type: array
Change Controller: IETF
Reference: Section 5.2 of RFC9886

Key: Authentication Data
Description: Authentication Type & Data Pairs
Name: auths
Label: 2
Value Type: array
Change Controller: IETF
Reference: Section 5.2 of RFC9886

Key: Self ID
Description: Self Description Type & Value
Name: self_id
Label: 3
Value Type: array
Change Controller: IETF
Reference: Section 5.2 of RFC9886

Key: UAS Classification
Description: UAS Category & Class
Name: classification
Label: 4
Value Type: array
Change Controller: IETF
Reference: Section 5.2 of RFC9886

Key: Area
Description: Count, Radius, Floor & Ceiling 
Name: area
Label: 5
Value Type: array
Change Controller: IETF
Reference: Section 5.2 of RFC9886

Key: Operator ID
Description: UAS Pilot Operator ID
Name: operator_id
Label: 6
Value Type: array
Change Controller: IETF
Reference: Section 5.2 of RFC9886
]]></sourcecode>
        </figure>
      </section>
      <section anchor="iana-mt">
        <name>Media Types</name>
        <t>IANA is requested to add the entries of <xref target="tbl-home-mt"/> to the "Media Types" registry <xref target="IANA.MediaTypes"/>.</t>
        <table anchor="tbl-home-mt">
          <name>New Media Types</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">home+cbor</td>
              <td align="left">application/home+cbor</td>
              <td align="left">This RFC, <xref target="home-cbor"/></td>
            </tr>
            <tr>
              <td align="left">home+json</td>
              <td align="left">application/home+json</td>
              <td align="left">This RFC, <xref target="home-json"/></td>
            </tr>
          </tbody>
        </table>
        <section anchor="home-cbor">
          <name>application/home+cbor</name>
          <figure anchor="txt-cbor-mt">
            <name>home+cbor Media Type Registration</name>
            <sourcecode type="ascii-text"><![CDATA[
Type name: 
  application
Subtype name: 
  home+cbor
Required parameters: 
  N/A
Optional parameters: 
  "ctx" (Context as a string for map keys. Case insensitive.)
Encoding considerations: 
  binary
Security considerations: 
  N/A
Interoperability considerations: 
  N/A
Published specification: 
  This RFC
Applications that use this media type: 
  Entities that exchange CBOR/COSE data as part of HOME interactions.
Fragment identifier considerations: 
  N/A
Person & email address to contact for further information:
  DRIP WG mailing list (tmrid@ietf.org)
Intended usage: 
  Common
Restrictions on usage: 
  None
Author/Change controller: 
  IETF
Provisional registration: 
  No
]]></sourcecode>
          </figure>
        </section>
        <section anchor="home-json">
          <name>application/home+json</name>
          <figure anchor="txt-json-mt">
            <name>home+json Media Type Registration</name>
            <sourcecode type="ascii-text"><![CDATA[
Type name: 
  application
Subtype name: 
  home+json
Required parameters: 
  N/A
Optional parameters: 
  "ctx" (Context as a string for map keys. Case insensitive.)
Encoding considerations: 
  same as STD90
Security considerations: 
  N/A
Interoperability considerations: 
  N/A
Published specification: 
  This RFC
Applications that use this media type: 
  Entities that exchange JOSE/JSON data as part of HOME interactions.
Fragment identifier considerations: 
  N/A
Person & email address to contact for further information: 
  DRIP WG mailing list (tmrid@ietf.org)
Intended usage:
  Common
Restrictions on usage: 
  None
Author/Change controller:
  IETF
Provisional registration:
  No
]]></sourcecode>
          </figure>
        </section>
      </section>
      <section anchor="iana-coap">
        <name>CoAP Content-Format</name>
        <t>IANA is requested to add the entries of <xref target="tbl-coap-mt"/> to the "CoAP Content-Formats" registry within the "Constrained RESTful Environments (CoRE) Parameters" registry group <xref target="IANA.CORE"/>.</t>
        <table anchor="tbl-coap-mt">
          <name>New CoAP Content-Formats</name>
          <thead>
            <tr>
              <th align="left">Content Type</th>
              <th align="left">Content Coding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/home+cbor; ctx=aviation</td>
              <td align="left">-</td>
              <td align="left">TBD</td>
              <td align="left">This RFC</td>
            </tr>
            <tr>
              <td align="left">application/home+json; ctx=aviation</td>
              <td align="left">-</td>
              <td align="left">TBD</td>
              <td align="left">This RFC</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="sc">
      <name>Security Considerations</name>
      <t>The considerations discussed in <xref target="RFC9153"/>, <xref target="RFC9374"/>, <xref target="RFC9434"/> and <xref target="RFC9886"/> apply.</t>
      <section anchor="aaa">
        <name>AAA</name>
        <t>OMEs use and provide various methods to protect data through: Attestation, Authentication, Authorization, Access Control, Attribution, Accounting, and Audit (AAA). All data, handled under DRIP, MUST be protected by AAA, as per applicable regulation and policy (which, in some cases, for public data, may impose minimal requirements). All private data MUST also be protected by strong encryption where permitted by applicable law etc. These requirements apply to data at rest and in transit in all phases of the process, i.e. registration and query.</t>
        <t>Attestation may be mandated by a jurisdiction for devices. Remote ATtestation ProcedureS (RATS, <xref target="RFC9334"/>) is recommended for such mandates. The specific attestation mechanisms are out of scope for this document.</t>
      </section>
      <section anchor="cryptographic-materials">
        <name>Cryptographic Materials</name>
        <t>Best practices dictate that cryptographic materials that should only be available to selected parties SHOULD be generated by one or more of those parties and stored accessibly only on those parties devices. E.g. the asymmetric key-pair from which an HHIT will be derived SHOULD be generated by the entity identified by that HHIT and the corresponding private key should be stored only on that entity's device. There may be scenarios where other parts of a system, such as a UAS, generates the cryptographic materials and provision them as needed during an operation. Any such system MUST ensure security of the cryptographic material is guaranteed.</t>
      </section>
    </section>
    <section anchor="ptc">
      <name>Privacy &amp; Transparency Considerations</name>
      <t>The use of COSE or JOSE encryption provides privacy for <em>Registrant</em> data when communicating with an HOME. The considerations of <xref target="RFC9153"/> apply.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7516">
          <front>
            <title>JSON Web Encryption (JWE)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Hildebrand" initials="J." surname="Hildebrand"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Encryption (JWE) represents encrypted content using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries defined by that specification. Related digital signature and Message Authentication Code (MAC) capabilities are described in the separate JSON Web Signature (JWS) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7516"/>
          <seriesInfo name="DOI" value="10.17487/RFC7516"/>
        </reference>
        <reference anchor="RFC9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC9164">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for IPv4 and IPv6 Addresses and Prefixes</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This specification defines two Concise Binary Object Representation (CBOR) tags for use with IPv6 and IPv4 addresses and prefixes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9164"/>
          <seriesInfo name="DOI" value="10.17487/RFC9164"/>
        </reference>
        <reference anchor="RFC9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking.</t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs). HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement.</t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="RFC9434">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Zhao" initials="S." role="editor" surname="Zhao"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture for protocols and services to support Unmanned Aircraft System Remote Identification and tracking (UAS RID), plus UAS-RID-related communications. This architecture adheres to the requirements listed in the Drone Remote Identification Protocol (DRIP) Requirements document (RFC 9153).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9434"/>
          <seriesInfo name="DOI" value="10.17487/RFC9434"/>
        </reference>
        <reference anchor="RFC9886">
          <front>
            <title>DRIP Entity Tags (DETs) in the Domain Name System</title>
            <author fullname="A. Wiethuechter" initials="A." role="editor" surname="Wiethuechter"/>
            <author fullname="J. Reid" initials="J." surname="Reid"/>
            <date month="December" year="2025"/>
            <abstract>
              <t>This document defines the Domain Name System (DNS) functionality of a Drone Remote Identification Protocol (DRIP) Identity Management Entity (DIME). It is built around DRIP Entity Tags (DETs) to standardize a hierarchical registry structure and associated processes to facilitate trustable and scalable registration and lookup of information related to Unmanned Aircraft Systems (UAS). The registry system supports issuance, discovery, and verification of DETs, enabling secure identification and association of UAS and their operators. It also defines the interactions between different classes of registries (root, organizational, and individual) and their respective roles in maintaining the integrity of the registration data. This architecture enables decentralized, federated operation while supporting privacy, traceability, and regulatory compliance requirements in the context of UAS Remote Identification and other services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9886"/>
          <seriesInfo name="DOI" value="10.17487/RFC9886"/>
        </reference>
        <referencegroup anchor="STD95" target="https://www.rfc-editor.org/info/std95">
          <reference anchor="RFC7480" target="https://www.rfc-editor.org/info/rfc7480">
            <front>
              <title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
              <author fullname="A. Newton" initials="A." surname="Newton"/>
              <author fullname="B. Ellacott" initials="B." surname="Ellacott"/>
              <author fullname="N. Kong" initials="N." surname="Kong"/>
              <date month="March" year="2015"/>
              <abstract>
                <t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP). It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP). RDAP is a successor protocol to the very old WHOIS protocol. The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="7480"/>
            <seriesInfo name="DOI" value="10.17487/RFC7480"/>
          </reference>
          <reference anchor="RFC7481" target="https://www.rfc-editor.org/info/rfc7481">
            <front>
              <title>Security Services for the Registration Data Access Protocol (RDAP)</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <author fullname="N. Kong" initials="N." surname="Kong"/>
              <date month="March" year="2015"/>
              <abstract>
                <t>The Registration Data Access Protocol (RDAP) provides "RESTful" web services to retrieve registration metadata from Domain Name and Regional Internet Registries. This document describes information security services, including access control, authentication, authorization, availability, data confidentiality, and data integrity for RDAP.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="7481"/>
            <seriesInfo name="DOI" value="10.17487/RFC7481"/>
          </reference>
          <reference anchor="RFC9082" target="https://www.rfc-editor.org/info/rfc9082">
            <front>
              <title>Registration Data Access Protocol (RDAP) Query Format</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <author fullname="A. Newton" initials="A." surname="Newton"/>
              <date month="June" year="2021"/>
              <abstract>
                <t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns. These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="9082"/>
            <seriesInfo name="DOI" value="10.17487/RFC9082"/>
          </reference>
          <reference anchor="RFC9083" target="https://www.rfc-editor.org/info/rfc9083">
            <front>
              <title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <author fullname="A. Newton" initials="A." surname="Newton"/>
              <date month="June" year="2021"/>
              <abstract>
                <t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs). These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="9083"/>
            <seriesInfo name="DOI" value="10.17487/RFC9083"/>
          </reference>
          <reference anchor="RFC9224" target="https://www.rfc-editor.org/info/rfc9224">
            <front>
              <title>Finding the Authoritative Registration Data Access Protocol (RDAP) Service</title>
              <author fullname="M. Blanchet" initials="M." surname="Blanchet"/>
              <date month="March" year="2022"/>
              <abstract>
                <t>This document specifies a method to find which Registration Data Access Protocol (RDAP) server is authoritative to answer queries for a requested scope, such as domain names, IP addresses, or Autonomous System numbers. This document obsoletes RFC 7484.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="9224"/>
            <seriesInfo name="DOI" value="10.17487/RFC9224"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="STD96" target="https://www.rfc-editor.org/info/std96">
          <reference anchor="RFC9052" target="https://www.rfc-editor.org/info/rfc9052">
            <front>
              <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
              <author fullname="J. Schaad" initials="J." surname="Schaad"/>
              <date month="August" year="2022"/>
              <abstract>
                <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
                <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="96"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
          </reference>
          <reference anchor="RFC9338" target="https://www.rfc-editor.org/info/rfc9338">
            <front>
              <title>CBOR Object Signing and Encryption (COSE): Countersignatures</title>
              <author fullname="J. Schaad" initials="J." surname="Schaad"/>
              <date month="December" year="2022"/>
              <abstract>
                <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. CBOR Object Signing and Encryption (COSE) defines a set of security services for CBOR. This document defines a countersignature algorithm along with the needed header parameters and CBOR tags for COSE. This document updates RFC 9052.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="96"/>
            <seriesInfo name="RFC" value="9338"/>
            <seriesInfo name="DOI" value="10.17487/RFC9338"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4291">
          <front>
            <title>IP Version 6 Addressing Architecture</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
              <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4291"/>
          <seriesInfo name="DOI" value="10.17487/RFC4291"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC7343">
          <front>
            <title>An IPv6 Prefix for Overlay Routable Cryptographic Hash Identifiers Version 2 (ORCHIDv2)</title>
            <author fullname="J. Laganier" initials="J." surname="Laganier"/>
            <author fullname="F. Dupont" initials="F." surname="Dupont"/>
            <date month="September" year="2014"/>
            <abstract>
              <t>This document specifies an updated Overlay Routable Cryptographic Hash Identifiers (ORCHID) format that obsoletes that in RFC 4843. These identifiers are intended to be used as endpoint identifiers at applications and Application Programming Interfaces (APIs) and not as identifiers for network location at the IP layer, i.e., locators. They are designed to appear as application-layer entities and at the existing IPv6 APIs, but they should not appear in actual IPv6 headers. To make them more like regular IPv6 addresses, they are expected to be routable at an overlay level. Consequently, while they are considered non-routable addresses from the IPv6-layer perspective, all existing IPv6 applications are expected to be able to use them in a manner compatible with current IPv6 addresses.</t>
              <t>The Overlay Routable Cryptographic Hash Identifiers originally defined in RFC 4843 lacked a mechanism for cryptographic algorithm agility. The updated ORCHID format specified in this document removes this limitation by encoding, in the identifier itself, an index to the suite of cryptographic algorithms in use.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7343"/>
          <seriesInfo name="DOI" value="10.17487/RFC7343"/>
        </reference>
        <reference anchor="RFC7401">
          <front>
            <title>Host Identity Protocol Version 2 (HIPv2)</title>
            <author fullname="R. Moskowitz" initials="R." role="editor" surname="Moskowitz"/>
            <author fullname="T. Heer" initials="T." surname="Heer"/>
            <author fullname="P. Jokela" initials="P." surname="Jokela"/>
            <author fullname="T. Henderson" initials="T." surname="Henderson"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document specifies the details of the Host Identity Protocol (HIP). HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes. HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication. The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks. When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t>
              <t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility. It also incorporates lessons learned from the implementations of RFC 5201.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7401"/>
          <seriesInfo name="DOI" value="10.17487/RFC7401"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8003">
          <front>
            <title>Host Identity Protocol (HIP) Registration Extension</title>
            <author fullname="J. Laganier" initials="J." surname="Laganier"/>
            <author fullname="L. Eggert" initials="L." surname="Eggert"/>
            <date month="October" year="2016"/>
            <abstract>
              <t>This document specifies a registration mechanism for the Host Identity Protocol (HIP) that allows hosts to register with services, such as HIP rendezvous servers or middleboxes. This document obsoletes RFC 5203.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8003"/>
          <seriesInfo name="DOI" value="10.17487/RFC8003"/>
        </reference>
        <reference anchor="RFC8004">
          <front>
            <title>Host Identity Protocol (HIP) Rendezvous Extension</title>
            <author fullname="J. Laganier" initials="J." surname="Laganier"/>
            <author fullname="L. Eggert" initials="L." surname="Eggert"/>
            <date month="October" year="2016"/>
            <abstract>
              <t>This document defines a rendezvous extension for the Host Identity Protocol (HIP). The rendezvous extension extends HIP and the HIP Registration Extension for initiating communication between HIP nodes via HIP rendezvous servers. Rendezvous servers improve reachability and operation when HIP nodes are multihomed or mobile. This document obsoletes RFC 5204.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8004"/>
          <seriesInfo name="DOI" value="10.17487/RFC8004"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9063">
          <front>
            <title>Host Identity Protocol Architecture</title>
            <author fullname="R. Moskowitz" initials="R." role="editor" surname="Moskowitz"/>
            <author fullname="M. Komu" initials="M." surname="Komu"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>This memo describes the Host Identity (HI) namespace, which provides a cryptographic namespace to applications, and the associated protocol layer, the Host Identity Protocol, located between the internetworking and transport layers, that supports end-host mobility, multihoming, and NAT traversal. Herein are presented the basics of the current namespaces, their strengths and weaknesses, and how a HI namespace will add completeness to them. The roles of the HI namespace in the protocols are defined.</t>
              <t>This document obsoletes RFC 4423 and addresses the concerns raised by the IESG, particularly that of crypto agility. The Security Considerations section also describes measures against flooding attacks, usage of identities in access control lists, weaker types of identifiers, and trust on first use. This document incorporates lessons learned from the implementations of RFC 7401 and goes further to explain how HIP works as a secure signaling channel.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9063"/>
          <seriesInfo name="DOI" value="10.17487/RFC9063"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <referencegroup anchor="STD69" target="https://www.rfc-editor.org/info/std69">
          <reference anchor="RFC5730" target="https://www.rfc-editor.org/info/rfc5730">
            <front>
              <title>Extensible Provisioning Protocol (EPP)</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <date month="August" year="2009"/>
              <abstract>
                <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository. Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects. This document includes a protocol specification, an object mapping template, and an XML media type registration. This document obsoletes RFC 4930. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="69"/>
            <seriesInfo name="RFC" value="5730"/>
            <seriesInfo name="DOI" value="10.17487/RFC5730"/>
          </reference>
          <reference anchor="RFC5731" target="https://www.rfc-editor.org/info/rfc5731">
            <front>
              <title>Extensible Provisioning Protocol (EPP) Domain Name Mapping</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <date month="August" year="2009"/>
              <abstract>
                <t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet domain names stored in a shared central repository. Specified in XML, the mapping defines EPP command syntax and semantics as applied to domain names. This document obsoletes RFC 4931. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="69"/>
            <seriesInfo name="RFC" value="5731"/>
            <seriesInfo name="DOI" value="10.17487/RFC5731"/>
          </reference>
          <reference anchor="RFC5732" target="https://www.rfc-editor.org/info/rfc5732">
            <front>
              <title>Extensible Provisioning Protocol (EPP) Host Mapping</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <date month="August" year="2009"/>
              <abstract>
                <t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet host names stored in a shared central repository. Specified in XML, the mapping defines EPP command syntax and semantics as applied to host names. This document obsoletes RFC 4932. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="69"/>
            <seriesInfo name="RFC" value="5732"/>
            <seriesInfo name="DOI" value="10.17487/RFC5732"/>
          </reference>
          <reference anchor="RFC5733" target="https://www.rfc-editor.org/info/rfc5733">
            <front>
              <title>Extensible Provisioning Protocol (EPP) Contact Mapping</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <date month="August" year="2009"/>
              <abstract>
                <t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of individual or organizational social information identifiers (known as "contacts") stored in a shared central repository. Specified in Extensible Markup Language (XML), the mapping defines EPP command syntax and semantics as applied to contacts. This document obsoletes RFC 4933. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="69"/>
            <seriesInfo name="RFC" value="5733"/>
            <seriesInfo name="DOI" value="10.17487/RFC5733"/>
          </reference>
          <reference anchor="RFC5734" target="https://www.rfc-editor.org/info/rfc5734">
            <front>
              <title>Extensible Provisioning Protocol (EPP) Transport over TCP</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <date month="August" year="2009"/>
              <abstract>
                <t>This document describes how an Extensible Provisioning Protocol (EPP) session is mapped onto a single Transmission Control Protocol (TCP) connection. This mapping requires use of the Transport Layer Security (TLS) protocol to protect information exchanged between an EPP client and an EPP server. This document obsoletes RFC 4934. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="69"/>
            <seriesInfo name="RFC" value="5734"/>
            <seriesInfo name="DOI" value="10.17487/RFC5734"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="STD90" target="https://www.rfc-editor.org/info/std90">
          <reference anchor="RFC8259" target="https://www.rfc-editor.org/info/rfc8259">
            <front>
              <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
              <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
              <date month="December" year="2017"/>
              <abstract>
                <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
                <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="90"/>
            <seriesInfo name="RFC" value="8259"/>
            <seriesInfo name="DOI" value="10.17487/RFC8259"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="STD94" target="https://www.rfc-editor.org/info/std94">
          <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949">
            <front>
              <title>Concise Binary Object Representation (CBOR)</title>
              <author fullname="C. Bormann" initials="C." surname="Bormann"/>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <date month="December" year="2020"/>
              <abstract>
                <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
                <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="94"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
          </reference>
        </referencegroup>
        <reference anchor="IANA.DRIP" target="https://www.iana.org/assignments/drip/">
          <front>
            <title>Drone Remote ID Protocol</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
        <reference anchor="IANA.WellKnownURIs" target="https://www.iana.org/assignments/well-known-uris/">
          <front>
            <title>Well-Known URIs</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="IANA.CWT.Claims" target="https://www.iana.org/assignments/cwt/">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date year="2025" month="November"/>
          </front>
        </reference>
        <reference anchor="IANA.JWT.Claims" target="https://www.iana.org/assignments/jwt/">
          <front>
            <title>JSON Web Token (JWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date year="2025" month="November"/>
          </front>
        </reference>
        <reference anchor="IANA.RDAP.Extensions" target="https://www.iana.org/assignments/rdap-extensions/">
          <front>
            <title>RDAP Extensions</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="IANA.CBOR.Tags" target="https://www.iana.org/assignments/cbor-tags/cbor-tags/">
          <front>
            <title>CBOR Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date year="2025" month="November"/>
          </front>
        </reference>
        <reference anchor="IANA.MediaTypes" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="IANA.CORE" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>CoAP Content-Formats</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 1282?>

<section anchor="oaas">
      <name>Oracle As A Service</name>
      <t>This appendix is normative.</t>
      <t>In certain circumstances field contents may only be properly validated by other entities outside of DRIP. A so called "oracle" can be provided by an RAA or designated 3rd party as a service (i.e. "oracle-as-a-service") or mandated by an RAA to be implemented directly by their HDAs. If such an "oracle" is not consulted there is a risk that information being registered is fraudulent and DRIP has no method or authority to confirm the claims. If such information is accepted, future information queries by authorities could result in bogus data being returned.</t>
      <t>The rest of this section (and subsections) only applies for an "oracle-as-a-service" model.</t>
      <section anchor="use-case-example">
        <name>Use Case Example</name>
        <t>An an example, the binding between UAS Serial Number and Operator ID should already be known by the CAA, as typically this information is required out of band of DRIP directly to the CAA in some form. The CAA should provide or itself have access to an "oracle" that can validate these claimed bindings for registration to proceed. When an "oracle" is not consulted there is a risk that the a recorded binding between UAS and Operator is non-existent, resulting in faulty CAA enforcement capabilities.</t>
      </section>
      <section anchor="expected-home-behavior">
        <name>Expected HOME Behavior</name>
        <t>HOME's when presented with additional information that requires an "oracle", MUST forward without modification the Registrants HOME Token for processing to their RAAs "oracle-as-a-service" endpoint. HOME's acting as an RAA under this specification MUST always provide the "oracle-as-a-service" endpoint (<tt>/.well-known/home/oaas</tt>) and respond as follows:</t>
        <ul spacing="normal">
          <li>
            <t>return an applicable HTTP Response error when the "oracle" does not exist within a given jurisdiction
            </t>
            <ul spacing="normal">
              <li>
                <t>OMEs receiving such a response SHOULD proceed as if the "oracle" successfully validated the request</t>
              </li>
            </ul>
          </li>
          <li>
            <t>perform a redirect to appropriate system when "oracle" is being provided as a 3rd party service that the HDAs are expected to independently consult</t>
          </li>
          <li>
            <t>process and respond following <xref target="eob"/></t>
          </li>
        </ul>
        <t>OMEs process non-error HTTP codes by including the returned "oracle" certificate in artifacts in the Private Information Registry and continuing the registration process. An error HTTP code received by a HOME MUST be mimicked back to the <em>Registrant</em>.</t>
      </section>
      <section anchor="eob">
        <name>Expected Oracle Behavior</name>
        <t>The "oracle" MUST validate the HOME Token signature before processing any of the claim data it has authority over. Additional authentication and/or authorization on the endpoint MAY be required by a jurisdiction and its selection, implementation and policy are out of scope for this document.</t>
        <t>If an "oracle" accepts the data presented it MUST respond with a valid X.509 certificate, RECOMMENDED to be OKIX compliant, with the Subject set to the same contents as the <em>Registrant</em> CSR. When a "oracle" denies any data presented it MUST respond with an appropriate HTTP Response code and MUST NOT include a reason. This is to avoid clients data mining information to forge malicious requests. Once the "oracle" has completed its validations on fields it has authority over and responded accordingly the HOME Token MUST be deleted from the "oracle".</t>
        <t>The policy and other inner mechanics of the "oracle" are out of scope for this document.</t>
      </section>
    </section>
    <section anchor="cddl">
      <name>CDDL &amp; Encoding Rules</name>
      <t>This appendix is normative.</t>
      <section anchor="prelude">
        <name>Prelude</name>
        <t>The HOME CDDL Prelude of <xref target="cddl-prelude"/> is built upon the prelude defined in <xref section="E" sectionFormat="of" target="RFC8610"/> to allow interoperability with JSON encodings. The conversion of fields to/from CBOR and JSON MUST use the advice in <xref section="6" sectionFormat="of" target="RFC8949"/>.</t>
        <figure anchor="cddl-prelude">
          <name>CDDL: HOME Prelude</name>
          <sourcecode type="ascii-text"><![CDATA[
entity-id = int / text
key-id = int / text
map = { &(int, text) => any }
]]></sourcecode>
        </figure>
      </section>
      <section anchor="hri-hrr-claims">
        <name>HRI &amp; HRR Claims</name>
        <t>The full claim set for HRI and HRR, including prelude, are shown in <xref target="cddl-claims"/>.</t>
        <figure anchor="cddl-claims">
          <name>CDDL: HRI &amp; HRR Claims</name>
          <sourcecode type="ascii-text"><![CDATA[
rdap = [
  hhit: [ ip6: text, hhit_entity_type: uint ],
  canon_x: text .b64u bytes,
  metadata: map / null
]

response = [
  success: { &(entity-id): success-data } / null
  failure: [ + error-data ] / null
  shared: map / null
]
success-data = [
  keys: { &(key-id): map },
  shared: map / null
]
error-data = [
  eid: &(entity-id) / null,
  kid: &(key-id) / null,
  cat: any,
  msg: any
]

inquiry = [
  entities: { &(entity-id) => entity },
  metadata: map / null
]
entity = [
  hhit_entity_type: uint,
  keys: { &(key-id): key },
  metadata: map / null
]
key = [
  csr: bytes / text .b64u bytes,
  metadata: map / null
]

entity-id = int / text
key-id = int / text
map = { &(int, text) => any }
]]></sourcecode>
        </figure>
      </section>
      <section anchor="ip6-handling">
        <name>IPv6 Handling</name>
        <t>IPv6 addresses MUST be tagged using <xref target="RFC9164"/> when encoded in CBOR. For JSON, IPv6 addresses MUST be an address string as defined in <xref section="2.2" sectionFormat="comma" target="RFC4291"/>.</t>
      </section>
      <section anchor="home-common-parameters">
        <name>HOME Common Parameters</name>
        <figure anchor="cddl-hcp">
          <name>CDDL: HOME Common Parameters</name>
          <sourcecode type="ascii-text"><![CDATA[
hhit = [
  ip6: #6.54(bytes .size(16)) / text, ; ip6 addr tstr
  hhit_entity_type: uint
]
vnb = tdate / time
vna = tdate / time / number
publish = bool
csr = bytes / text .b64u bytes ; DER encoded
oracle_x = bytes / text .b64u bytes ; DER encoded
canon_x = bytes / text .b64u bytes ; DER encoded
canon_chain = [ bytes / text .b64u bytes ] ; DER encoded
contact = text ; b64 encoded jCard object
]]></sourcecode>
        </figure>
        <section anchor="vnb-vna-handling">
          <name>VNB &amp; VNA Handling</name>
          <t>The inclusion of the valid not before (VNB) and valid not after (VNA) parameters to the <tt>metadata</tt> map of <xref target="hri"/> allows a <em>Registrant</em> to set very specific validity times for their registration.</t>
          <t>VNB when present is always an absolute time reference per its typing. VNA is either an absolute time reference (like VNB) or a positive offset in seconds (to be added to the VNB absolute time). Negative values of VNA MUST be considered an encoding error.</t>
          <ul empty="true">
            <li>
              <t>Implementation Note: due to not differentiating between integers and floats in its number type, implementations using JSON as the encoded format MUST check the value of VNA to determine if its being used as an offset or absolute time.</t>
            </li>
          </ul>
          <t>When VNB is not present in the <tt>metadata</tt> map the HOME MUST use the current absolute date/time as VNB. The absence of VNA is a signal for the HOME to use a default offset, determined by policy and out of scope for this document, to add to VNB.</t>
          <t>As an example of the use of VNB and VNA, a <em>Registrant</em> may set VNB to <tt>null</tt> and VNA to <tt>3600</tt>. The HOME in this instance would use the current absolute time at receipt of the registration request for VNB and then apply the offset specified by VNA to obtain an absolute time for VNA that is <tt>3600</tt> seconds after VNB.</t>
        </section>
      </section>
      <section anchor="home-aviation-parameters">
        <name>HOME Aviation Parameters</name>
        <t>These parameters are carried over from <xref section="5.2" sectionFormat="of" target="RFC9886"/>. The content in <xref target="cddl-hap"/> carries the same semantics from <xref target="RFC9886"/> but is more well-defined in syntax of CDDL.</t>
        <figure anchor="cddl-hap">
          <name>CDDL: HOME Aviation Parameters</name>
          <sourcecode type="ascii-text"><![CDATA[
uas_type = (uint .le 15) .default 0
uas_ids = [ + [
  id_type: uint .le 15,
  uas_id: bytes .size(20)  
] ]
auth = [ + [
  type: uint .le 15,
  data: bytes .size(1..362)
] ]
self_id = [
  type: uint .size(1),
  description: text .size(23)
]
area = [
  count: (uint .size(1)) .default 1,
  radius: number,
  floor: number,
  ceiling: number
]
classification = [
  type: (uint .le 8) .default 0,
  class: (uint .le 15) .default 0,
  category: (uint .le 15) .default 0
]
operator_id = [
  type: uint .size(1),
  id: bytes .size(20)
]
]]></sourcecode>
        </figure>
      </section>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
        <organization>HTT Consulting</organization>
        <address>
          <email>rgm@htt-consulting.com</email>
        </address>
      </contact>
      <t>Robert Moskowitz provided the concept and general
structure for the OKI and the specific inclusions 
for X.509 profiles to support HHITs.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1923bbRpboO78CR1orlhSSulh2YnaSHlqS20psWSPJnfT0
yopAEiQRgwQHACUrludbzrecLzv7WhdcKDod9/S56MGWgELVrqpd+753dTqd
VmuYjuL5pBcsi3Hn61ariIsk6gUv4ygLs+E0HoZJ8Obi6OXpcfA6nIeTaBbN
i+BkDu3ugq2Xb16fbAen8yLKxuEwyoNxmgUX0STOiyws4nQefBEcx+NxlMFX
MXTVH0KrPPj3ZZTdtcLBIItuesE0nUWd2HTSGqXDeTgDKEZZOC46YXHbKTXp
7O21YIgonPWC05OrF61WvMh6QZEt8+Jgb+/Z3kErhLc9Bm0eFa1bmOJxls4j
AG+WFlEAEzrP0iIdpknr3a1t2TnGQVvDsOgFeTFqwTjhfPRLmMC3veAOwFvE
veDv8GE7yNMMgBjn8NvdjH8ZpjNcofznVitcFtM067U6QRDE87wX9LvBj3FU
TJfRcAqDteB5wBPtj8JZ9V2aAdD9n3C1o2yRxb9F7eDVqyN6F83COOkFIXzY
vXU+/LfwfWSadwEa2OB5kcWDZaGw8JAX6SDKiuB1mr9Lb+PiNzviy6ur4Cid
58ukAMxwR8sms3+bFkVnaN7SCNjCjAKb3gvu6Rn+lIcJFll6E4+iUVBMI/xq
GC2KAFY4mERzwLnEfAn7uxwWyywipMLWb344pZb4e76IhvE4HsLKDpNlDqPm
gfkUP/ip+2TvGY42jhNAzCIN8uViARsWvHx5epV3W615ms0ASW+iHn148eLo
ycHh016wGRRJro++erL/BB/9muZRcBsNgjyezJ2XT72X0XyY3S1wDbTJs/0n
j7HJKIsXnSz6z2Wc0RHKbYOnh9ggXjwNhgOcaTgx7x5/dWg+HgEW6/PDx/Y5
HlPz4uuvn9oP5nmLXlxeHT+jSWSjcGGeUMMhQA6HZz6urMXhwbN9hSscjbLA
HefJwdd7+HLxLn5vFuPxIc00RbIx6twcmBeHe9TTNF44D5/sP6Oluy2CYRLG
M7MgX+/tPZbmsGCTTvS+cF4dmlc3ufdq/4AmFAORIvwEHGMSZDt+/OyA5lwd
8uk+TWc4GiVmKfeeGjC8JX7Maw+d5/xCV/QpTSha2CWmTn/NBRvwCX2K28xf
nfbP+t3ji9PznuCukN9GSsWtlLIovnfMb3KEsV/tMcwmEdAyOLeLvLe7e3t7
28VF6kLD3TBHdCZ83EWc2ZWPRmEBULwZFsHB3sETC+qPUZL8ME9v528vTvMS
zPiuQy8DfPs5Qb3Fod7hUJ1lFuc+1N8vk7sS2Ec/XnWPaMdLMB89f3MBgA+C
q/RdNA+2oOF2cGRx4zPBDxjow3yW3kQzIJQluL9vgvv7yzdnLtzf/3Pg/nVN
uC+O++fdk/dFNCfCXAIe3wb27ecEGAkeUgkZ6mFEAXzoXoWTWjzB558VK4As
dID6u7+ts9qvo1EcXt0tojLU9CKgN58T7hkO0ymcYZrX983FSXlpU8AGEDdg
j4rOC2JDn3eV0yzqLMIMhCAQk5ogbrXkRavV6XSCcIAC7bBota6mcR6AgLok
OZhkwzAbgayVk1hiRdQgHYOwskJ2JtEZxJIwSdJbYEgxgocPMpKfYZtR1vlP
lJQDkJymwcgVpEMWpHGEmyhLwjuQtJZFOEii4AhFkHSShQsQ34OXYT4NTkf4
2RiEehiXINoGcWg4DULowgr70O/LNC+kOQAJKA9CPshL2104sQAViHxBAZLm
PE3SSQyz1F7whOwSWXoz+DUCxnEJK46tv4AJq1AEBPbN5cnu9/DPNs3OUxWO
wyJUBUEZXrCF1AIagxiYRwl0jJJjCoIWTfUWuHy+AEl/xCufLmAmgzgB2Lu8
c7MYeDqIOJso4GfpCERKlM5am5vB+TJbkPjTnwcRCEJ3sOizAGRJgHqtRT3W
Rc11VUEB+PBBZKGPH7dxYWLYVBDGZyFsY2y3YQg7N4hg8WH6KQyY8gKh5DpL
QXSZBwxP3g2uAK88fayyRzlvko6OYiONDou2zCNcG0LOcQjfTTKQw2HAHNYS
BgMsfTufhfM5NOvH2RCVn+CShw623vYvCUdFaJcJwKC4eXg88c8hb18eZTcx
Ij6vIA54nILeMA/O4KxJn8HW8dnlNuzNj4jR9vhQF23bv9mPXFdqCLuMmx9m
6VJ0AJgbwi9LTyI+wBAFN2EWp0sEJOoMwzyiNYxznUW+Cm2wQ1qr5Zwwhc5x
5qBpO1gsBwngAJ9MXAjY3huATZ7w9ENBV1wZ6CHSw6NTzulLoEHTdATwPY/w
5SAcvoMpDu6CoYdu76K7XOiE6QieAfDjLDR6EiifoGqhUgTAcP+LFCC9w5WB
FUwiQGqgQiMmJ7N4DliZBMBUsiksRRsRj78moDOY9ihaJOkdkq0uHZnnAOCE
NqDVIowjHIMNim7SZKmTxfWrxVH4YFuR0W9gz/vL03NFY5DAAY27QT9JpFvY
cGSLNCrOcpKimjsiMmZo7S0s2RTUMSQZlj7TKXAOJ63PcjEipIIVd05Ol1VE
UO8TwCYEFjAHiMAMoaA3g4j3eJyEBenT+QJofluGBlSbwqC47DOi+wG0CoNJ
kg5gvXM4wtAUhgS1CruZytnG/YRPiI0YQtENfoRDRg+ddnkAst4oSLU9HKp2
LSonafpuuUCAQVFHHgWoCmQedpPnC4okLEUspFGYmGrlspWon9idquFkx6fE
yqYwS3PEqJ8sLohg6WGyZynKaAGVweEfRgmFdnLIj09AUQ9OC+gggw4z1fqh
f2Q/2DVBFTO7xTHP+XCeOp0Jk+Gzei5ntbYB9ME7SBQA3sOQ0xBXD7ZAx7aI
hNo2rJ5D784uuygiVJcQVkgJGR5ytEMwI1PiBX2KAYRPJ36F+OGeKVi12UPG
OFiuOaxxwjODAap0gqlCLCTCoxk6Sq7D/ABfn/pfb7354ZS5d3MbNr5gy5+Y
DRkMGwVTPJh4NOIsAyIzWBa4KiMiayA3jLN0RnAYSidbWgfKuYLS3EZAOUdQ
mIhdDuGQlCU5g7hqWArdlXfEOiLbwKETNna6rIHe1UlpzBhKrEqsUYblWf45
H5HwF+CGCuuKc5cN+zCqeWwcz2HIWZwTPi7iSKVQRj8ELs5laaPZIgkzwyGx
GaOxyBEq1hHynly19XeUnkWyrfJqwX1CU+wHhyP54xZJGOzwcJmbs6LYbqTJ
Ozx7CQ1nP2S5lz+0dAHEkt0Q6BjLHWoJBH5LIj4PB6JdHgPRBvYhx4gGQ9zO
IqI1QwYFsSBK4nmkpAePPo5Cxxy/iBk+ZAw+0owiWPOIWDNqEKEihrA40GqG
MSwuCbbH2JaP86twPlkiW9g6Oj5+JdwObVAotJnTP15Cr/5OE0RopAJQEJU3
g2NYG1T7o4zX3msvgHgQp8HZmyuDSPB/IUJKOAFRDVgyHMI0y1CC34q6ky6c
x3A5Wibw8TbPkczLsDejJdFw7wAAJoKuFRFxy5eDPALMnxfJXTcQ8IwI7+oQ
o1QBMVCESSHmu2ArJt2QNxAGWM6dB9uIjASWHQ5PCkrdDAl2AbyW+ZErVKFK
iPyV4KLf4exMpkSNhOe/BwGpQKjpRPJ6vO0DEw3n+SwuiDo9z9JwNETJ+gK1
qtTpBQ5JWABZRTl7DKctvA2ZCSUo8YeTVLrM0rQIjiwdDvqk+MLZ2saFA/4n
53a0tAIqMXqR4KMQTitSi3YgtAAUXGw6h7OAtulBNA0TEcygGfbHIgz3EoHw
B4t2EyYxykPUzttXXGE4SEySWJohoOOyZAI9TOZ6cMlOj8RWYaaNunz55u2r
Y0vLlOwBAOmgCBVlJ2mYAB2KIkD5NAxzg/JXpOnDGCSXXLgmdcKxcYqCMqOm
fYcgMNPef0LSH0qHMLmcODpRDPuhd2Z6wV9OzjqP26DvdQ7bwcXJXzoH/N8h
s56L0792DhC44MoSC4YFme9titL+xuu3l1cbbf4fzyD+fnHy729PL06O8ffL
l/1Xr8wvLWnBi2V/s18evXn9+uTsmD/GM+09am287v8N3iCAG2/Or07fnPVf
bVTpQci8eCAsDnQi0rHyFrBCEN8GLO08Pzr/X/9z/xAW8H/ACh7s7z+DFeQ/
vt5HiZkWkEdL58md/AlbftcKF4sIcB96QSo5DBdxESY5MZR8isZilAe6rW/+
jCQ46Dz983ct4tIO1bakMw++CPrkNYzFtt/a2fkUX+XOTq/VC/rMo2DiOk3S
YbghIyaigeqRhtPNbK9WP9xSXulricTz20FUDLukQquBhw6P4VmLFNa9coy6
dM4eoRpxQ9wIiEr4K1IRGRUmCvL8Ip2zzQglb1WT006SDkmpgfYoVZFXTnQk
MSrgYRD1umdsMFnbCMJtQ4HIJyQKPOrWbJSqpVVMSddUFuJcVwEoxm9G1mLi
NDfCkdANj9+74sbOzgNyqu53jRRMTiKWMGEYKxOziGH0CkcsIiSGs0NGDdL4
iCZG70OQplQsQielkGtaizrIjlFsRbHNndgD03FFap1VHtES8StHkLduTwAU
ESWJQ9BHsO1agrKIJOjlQ5GE8Eu3hKdYP/GfHpq5jHFMekHtAhAGkFeDJ3k6
V5W0iN4LQsQlKf1PaMM03xnT2tzwShXEnoOEDIK4WCgvIiB3wNsLkTPQhPkn
mDn56XDeD1oytfVTbA2z+T68CS+BnoDiJ9+epdo72ka1/d6DvX8vvYsH+uPH
tvmDBjNL2oVziSySAiQKnD8xSljIi1N3HfveCsFqAg6zCh5gSxIiAxAGsKss
Nn1crN3HRamPDMVlZIr0zZFSq6CPlBplPcSHL4IXSkeBYZIYCN8nd0Y6wN2b
oyKT48YZWcHYR4g9DVIQNjzmDgfYtW+wBkTC0QwVGNE9kjvVstoqK+RMbSuW
C6CTO4ZQ7rTNH3f4eyOx3CFIdmrJ5Q4S5FEEa5igASpC4x5rch5/Vj0E+UJn
HE94ZywouC++UjJEg55oa8RzQPYcsoFFlFg9FqYXa6AhrQvEZX0F7KXLoTGh
sLsReqZFoLYdkLyXko2G9tuyR5Qw0iWdXJYFK5PECdUvUXVyoxS2aJ7KLC0f
5YXMDX1wLU5Gk36Z3qIJtA3aARKq6P3C+BMU34DQJREK82vaNjzridraeR1Q
BDdmKVXl0YKJK+LQV0Ogi7ItxqG6qpazOPwOD2hw8n6BPKtQKy8ubN06MldD
+++4EAdD5gbQIA2fGTJINgxZbscQEBIRFZPWm4XGVuDeNaM/719Uu02gYpJg
DPqJWGBxnVbIHTmtKH56fHYZWB5QNciRc+JhtKvH61okdiy581UwrjNogXLv
MsEzj5hMkVC400DAoQPYPYAoFxJVWD27opMBypJxyVsGn3pEZOLG5xcX5AbW
1YYnaKvkw2XOCnlPcjX1rLSk5mL7ENP5pRgRDrv7OHlDeR1aVXeaP5lU3VUp
1ZsBgZ3RJrGhDVc9tOqDIl04wL2h0win6WGydvePUbXGnf6DN5kUSrvT/mrh
SixHSCPY2QnU/EWFyRjbsvkuJuUsKzpTPEvYy0q7uYMOdBQtOhyU0eG//uu/
AtDmbyaOL9/+fNlxfr6sbXLv8CYnzrDSy87KXrirFa8cUWf35dXV+WXLge/L
Ujdf0jP6wptB577T8PNl676xu2Zw61517WS7a35z3/B79Zuu+UkdZp/axzXf
9B4Yx7yv/eYRzSTFfx4Fa37zwN//rd907XycDVr5jb8lNe9rv3E5/4PfyJZa
USuQTV3xTa8Btt5D3zxyEf9RsNY3NT//rd90eQ9lH0snrWvedZ1vyifrvuGP
e+8bX7gofWMIrv+NJ4OsOc4K2B4ZivLIXQPZxh1vI5t68elOI0krfeMSz0bS
6b3yqfuqcUxDlB5XAoQRR163DgLjBndddG5iIffemO7Pl7yGO80MDrMjHuBu
Mnlkp60PvWBT1UOOqvt24xKlehYYjuNwkoUzY15zY652KRHDaudoX3XFog0U
Vm7T7F2HDPvfbgzJ+7Px0fc2sbzG36gPjAL10VGC+gu6G4rbSAIZfE26XvVz
VWzWoldo2WS+Z63QWD+34m7UZc3FtYJWDKBki3xIlDtLySsSGovkaIm6F4Kc
xPN3IENHEZmMH7QF2EmhwIkGPBhoiE4acu+hX9XXxxAa9O90g34wX1L4p4mF
MfLobuzKsqTsxWOcrvGmI9Zr7oTxrGucQD6NFxIwJHE4dsNIATTWUBIww0KN
oGGSp2RvCxeL5I5N+SRgimmwbbpx9ry8EGIzlIhgDLY7R20cHb7k/jehQSfn
FBpEofZicUOrzU2YEOqqqnpxcnk1XiZNvVycn293y+5/1RGMs1/XUuEPvcAV
0Va2KAYdx9yxQunOtllod9LFNEuXkylZI1CedHQcEp8dd4tY81xFQLRaEu4x
fNo9cKC17AjJyHesO2LHaEYCUegdqcqYpDt1ROFgXzfimBP6IIbVKCaNSBWw
GSAne8EpCKt/foobY9J8SIcKg7enhMnTJejRpKrpDLiBAo0GCMqkGWTpbY7u
WaY0xrdP9hwcdJFbNz260e2x9X3mpB5hgEk0TMKMQQ5dLwJassm9BKoiugnw
TNKh0yERz9X5gCGHFFJIh0xRQpeQkk+mC1y8IzFYv+7/DUc3yxHPOwMx6iEa
mGhBpysbtu0aPcSOTWHS9A5j9mAbENRbPJIKO6wtQomRxTdpPFIVkoaZDeLJ
koNjN/3g2w+bVZyTQ5JHqiM7h0QV01J0pONERZtl0fmthMZic/iPzkjYkpz+
5QINx0hM2VNr7Z1BEg6iRDFpo6yXbVRJDJxBj8bA8VPNMx/GcQfgcjiro066
PzhOif/WSQ3Ao/9ycvYLWhR2X542tsEfbHd0ebGyjf1bmfzLi1P57btKm7p+
gr/2X50e/wKf/bnc/Bvp6EX/9JWKUmt1efz2/OSXl394h7Bmf1yXtLonF1eX
a7V+e37cvzr5Bf7pP+9frrXR+s1ZZQSBGZ0gHR/mN2fP3/Qvjtfc8to2johX
Pk0q7HkH+T86IvA9ILvNouE0nMf5rBrGpkeS48LQ0UXOLfofVQw6d11+oeRV
DNXoZ4aTR23j3I1JoGHGCcgeEp2Kf8/TOSXrwchkPXKOcL7DDuUsyh23nxiW
bBwoCBrDguJbbuI0s0zAsyCqB4ACCxwflhA9dpu1Wp5/SycWzYcpE25lfO6C
oFRWcHsg9OITC2aYHIue0SS8Q8skLonEb5BHv0LLTT5K2yX5APZyLpFRFDiJ
BL9NRD4covUcyGxyZyVEjo9Bh2JInopXOHqrdRHhcpE8KjzDpr+YaRI3J7Y8
YrkWYYTNtowU+IsTjEwOdZ87LcK7JA1B8l7mS+NcM75FgLqtzkWQR4LyvCxQ
Pkxb17/evrumSRJW4VpevxsOc352RLkkGF8RZtldLdSWFc5FSkeHT5jlkQd2
Hk1IFJTZOB5WFGgxeIUtwcL+gx9Ojx2YNWKx5BYFEtc2KMSu0XjxlMyqwOsm
6NclsTsJh4xjYc2Wy8Y6/mHZWYuuueIXYyy207Amd46z8M4g6TlsP9rHYaM0
PYgyXVwL79b56el2SaIXX/stWbZR6ZLxcKAYKQlofHMSQCg1UXzB2+7KgN4R
3YQcdauySYTRwLkFGZSoCQW0omcWaYDTH6HQmD2nFMRDAMAy9fO7GexHBipp
mGByQDGd5Q00yjYVGc28ZsKzyCIKGkhiJkA2t9v2bQMaTbZFxdtmgu4YUvIy
QmMFyubDmxghmIiz17E4J0j8OUmSGB4Pg6MlZrpgbYU46ryMkgTkatCQjo5f
botMebKYggCbhUnnElXJIby93MbzgGn77Jbj53qUFRDxgvAuU0guImUMuxBE
2mfTR+rGEZLkElSY9C5xmmG8iEmrpmBhNBGMValFr2x5CHIS2REM7phUsnLQ
Kw4uSwDLwevmbF5KcReaV4Xw0VaYFCfUJM3C5EZvk6wfydjxA6RBt04zq9n9
5YQcMhTbxTyHU3ODy6gocZmYAsJwTIqsDjWkh/PTjXZw9OMVcRz4z1BTnoA0
dNwvHqOsaim8hoYjCOMX3V5UGO5UdE7hehiqj3EWirdUd2Fk+zRw0fo7lKlb
ihtBOk0HXvpVY4bMhHac0/dNYo+JZUEoTFCKM43kTvMuDBRCD9lCISSvsAsG
w17PB+PrdnAdvV9cMxm+Bi3vWs5GVHgsHT+9DpejawThOs6B/fBYot8WGpW6
DsmPxwFZDrzYdAFsrXgJhJBkC6SHuTL8Dj2CbUtxUIvy+nzbLn7orFRJTqM0
umJdGYUExRohBXq5RqOQnMpdFLS+xLxmXsDKK6yScC3KoWydYBgv/bB4f+2w
27KkIscGT+yuI91wkDMxZnKFquUg9tmiDe7gE33HaW0WRkNihBVXDKnANTF+
CMNML063UbAEJiVGUtO5SKJGJIpNtKEfRD+2dEANb20mp0yGkzs3AErooqf9
ckQoo27OdGyLTkJTL9uajhhSjLYjUlq1Ge0ZrVjm+W3wd1BfFLxe8CH4YouD
Pjsx9PbtdxpO+7EN7bTjHi5/sBvMl0nS+rklTbiv6TQufuEnv2AyeS9YAv3E
rxF+HgF+w+57xBtW9YzvudthnvVgjTCiZjcgk0x38PRwyY9W9KBqF6ZbdGA3
VdlCW1OvGQFQvdrRZZGoOezXkX6MYYmpO4K6tWPWbme7jYH4wGz14c42IGqc
5Zar6gvB7yqBl13qKizUscSMFmTBTDNSkSZwlgCAypG2U0DoWeeoQTQ0zykw
1D1ynMwKmRrT4JrvdsobjbZ+3GIx2uh+oM2m2lZGofQiCSlWS5nHAw1nuxMz
IRyIDx9MvRUOTaFRa/dIVZytHUY5d1fgibcl0jav7obgt78pTImCCbCtudlJ
geaTt4nXDYGvIMeKTTtyVO54LvRgjuY8VJXmRFpBGFpirvmFrbnEacieflqC
f30kgGNZt9/4GPt488Pp1k/bHRsa53qJNGT2QjSDraPLC4lSBpJ6fHKh7FeD
Y3FloWfgjLhKfnUgNDkTr7u8QAAMNKuP7hbtBmMEYYIx+seUApUOY/JCUYuc
HS0s4xOL8v0p9ryySMdcl0WBfMlhwqiycpiftWc06hEMhmoTfgieYyZWFduq
jspTR05SK1cmAFSw3Fewr95mvSVC5KyQCggGXRrkiVoLfJyvsK6DfoSYDhhb
cLSYpMV1SDW0jA/lanTQODjGEgbl0ueOR4S5Jks+ZpMpVWMaT1BMdcbCqZOT
U9Ywn5JfIZxhVhe2Qzej2MzFYgJ4PGAMIodc5EKPaflJ247K5GqYpDnLOST+
KML83ZDzn7uISX9novFzV2d4TSiLmMMEZpHFnJ3RJLhcqL4OkssFSy6ZWv6N
mGJkmJFxL0wdlHOYDBu7lJblPF+WeigizngMVbAOjYKNCj0MkWOc9iScU84+
kS/MYMvRk2rT4vOqZGIMD8z3QUFD00KP/miWVHrasEOCD8kUgWwpSQTw988i
FeA7ARK6Db5kmwV/+LOVHLwOGZgaCQa3iUZzxwKRyHYpIlYM7zzZygLzjt9J
n84Lql4I0i7JN/mEfq/KNNlDMo3iBgk1Mq1mEn+bGiTuuQIEIQTPEs6f0qtr
hPVaXfe6C+i3dYVh1AfzpW+U6NZLWCgtmwxgVMpWCFbuFikv/+OEJcfZpwI/
HwOfDds17ViO8/DCOqKSLmpVlGlYjLIwwxMnBsEPNJlUPuY8Lexwi5g/TcOh
xJ5Vz8a1evxBc+MtU7TJoS5TMsyMTOToohUYSmLEUThP55Sc4eGqIyD8w8LU
J20h7wEOdIk0SmxCluUEQK+SEYXfQC/RewqiNyxKF81uV4mR+ywK5ZeGo2IE
IJcfAWUVO4tRKWWa2JE8MOiL8xEC52MjGzk0NwKtkbo59L2hWTueYm4Juhx2
MqDfxjntkPOVNxZyAszBMQtCwhwbLSRDWVLNy9Zjq2AL290B4kkz3XmHvyBX
FEgwAwRFS82zCLXEDPxekD6RYcjAPC0U7YgByYwwdSRh8fkGxJ4dmO2O2jd3
gN7uyPhkMGMgmCvWQCGL5XnVJSeRCB7gDFu+QZiJknEgvgiWxYdZmuemnZEq
BQMqYFvxDmNGaqBmcVk5aQeF6FykZkoakQgA2L7LeBZjBQlFUovuWt/n4rRt
xTKUvadszNMTw4JKwfSGhCAah1ifojLJxsT0h1RNg6ZrKmz4svQfImqlFPHC
Mpecs+5DstdKkYt0LacWKUlhP+DmfbFSp/mwqUqLk+4FFCCXJPmcTqHuy4qe
clKP8m3NPYiquhUggxAJSUgQnAcdAqVnBAQZxVa+3fYshaFxoVBqHQMm386U
XqrqwxUJrHFtSKNQfB5WWiC1GFbMr7OG5RcyUAtc95boa6MIUwGJoM/Vqbck
QTEeme8oG0uTlUD+HFcpKnK4Ciwk4oulXw6iLk1qPBmu62LYADbp004YnkDN
lgKqMCFu1wdjEFutOujRjCwE4PTYMDJuIaF2dLwbUhBjDL/Kp1x9gVyHozTj
uC7KkpNVZxc9aACkUZHtxXVAczwTG2tjk82OoS5s/k7fxe9Z/1bPmokdwtou
6N+RkmkqD+Bk1lkSPEyeFHAibhc2vV7vdm2pWLIz76pV6Np4aBzUArIUZyYn
MKQSLHfBfy5DCaVdhEDPXfeYkVkQ864f732NXtVZSImuF9LZtapeQKH/avnX
FxiSqMT+w2YW/WeHuBucd2zpcDqJy9S26g9U4g/SYW1ZAK1G9lBhgHYlVHFF
0ipvoFMpAw2qWE0kRKyRo+lzMdd/4zjdAEuIPklUHdUDQHTi7CzabWKfiHFr
AhdkaYJ8gDdfLQqgjy8Y1yLrwEX/r4mTcNcaTS7v4sWCfU+GXJG5bDItAKzb
MBt1gxfCUlFgLjmyeEBgosuEowdzoVChdY67YXJldtsN+qDzzKhaILOgkoON
clepHqkb4WudZHyWZReikfiLrLurwP/Q1dUWTxb5vsi55TihtBrMqK2mrXlw
Pc3ia2sWMEOgV3eZ5eSJQ+9pVhgGTCakZYE8sCa0guw4Wl0jyiYsB8WZK1AY
dUENqOV38r1h60X4jslrNIxAeMAyDWeIpyQLoKohIxFq1Ywj/ZVf4ZerxjCo
DVQPQyhyT1yVspKxHNIBxzvZITwbLg7FFjg8s0mJGuyKERPwy3qM5sFGCiiR
RBvBlls1B2Od/dkjYZ5KZdLKIYhkp+kcs8sbv4HhxnE2Y8KIdkOOBxDpT6qV
EJ121qFgeUx4BxAknhLxEFMxCEm9GpiJZZhB28yOjava0AWxRRt+jp9ZhUqc
AyXl7lLsqH0sLDV3ovPxJdJQW85yOI2oDOfYjS/3Nph2ETCdWooGUUheKUUC
8erEc15jWhbi35h+fgdMDInBIL2xq563LVMRJsynfh7dcrfAdhzpTAmYxBmh
SPfeM5c/qCQHIVWhYs1urnnPVoeXgggjs+JyKlyVEy23d4HxGNbJVoQDEt6E
Yxnt4OJTBWxrkSadxrHVeCZHjyBy7dCSYQLJJy+xKYFk46/cOUjmif3ciNBO
hALjq1sxD3UIjDSTtXMy09v+YKo7NeeMYKHcKWUfqAqXDpHQkmkalt4rH1Ql
EiVGLFu4SzFxsglG3xftG8Vh4H7zkecDcBa7bVeayj0R2liyaEspaMkWxQwy
5LlRNxRdMcMaLGIyKYESjtHXYOfgxaFhDAXqwcYvxf59Dy1I0axqwcxKjIfL
cCNbaligUjFQ5JLrv38Dqvx3bbayBt/AKYI/vgHN+TtAUSxbhwWFYaFROrPu
OFkt4cI09SXw+0ADQmgaRnXHNWXdnpta8qllVkw0lUgTo7zWUkQHO9YoK/pG
BN0s0twlszQUICI6UOEG3zmS26kfEEPCWaUtiwZKzx2bnykQQ0VhNoMrTQ2r
ZuJwTUUKLOEIZI6qEtBMTpkfXKexRlf2M0ZNJwdtrdCaFxJU2hYTplx0w1cA
iGvOyvyhlKwxNwR4BjDKy+B4MxLa1Cv5QoNZpT8e6y9SERNevkiwcCBKCN//
eMK3PVySRqm1svI72IX3XqSsyr0brpdtQ6NrzTJabac25FdnWNwtzJEjUAsp
Q+qF7uDFNxy6E2ihgCMJ/SbzhAg9Kuz2/K/x8pk/0RU0dHvAtxv0K7I1lEzX
a7m/XlMJhvqkxnvXRsMUqf0IBXRGETf0VkLAhEw4RFa2npAUk338jkw+VZjH
CQUmLRQ5lMiFHL+MaDSm1BuHoo9Y/gqdXERHYEMQUWzAMUzMuROGl0VA8uaG
yF8f7j1DU9UYvscQOK45Sc66nBISnSqzWU4XH0zMHQd10X2i9UHnQzIKIEOU
urdqvYY5c16WRCt7StlWvg1vx2jccuZsjyOG44dZgqX0la4D6o5iU69FiCP8
2vUDpbn4uUboK+HdJaIrOyJVss2mIO1BQ4ItbugRbf5W1MBFiJYNhqrLAbpD
GAzVyBiFOv7aXTOUxRvgwSXBEGtjnka7GnQsZT7v6AU9iOeOXfQ2vPOrAgI1
0QRYvDxBPQKH799jT0/gP6RMQv2IcpN0mgFqpnOVN6kITszUv1JrHOcjkdZ8
3KkbLms1WcZcYZe5tFNFUahS+WBQaXYjfBjWASpGRUZAyc/1Pzi65dt5QlYm
dTpIDRbVwkklLyd8IE0nzuZGe3vGAk7poPJohwcHMIigJ98SwdSTy6X9WNlp
PsM2Yp2JqjEK4B7YYHXaSCpAg0gXlkGojfzc5laJE6lgK7Ox/dGJKwd5DI8Z
1sHKYlRxJPKdPBZtdVfgCpOrgPxYTjQ9B5GwK0M+RC+CYzRkjaxS/ckW4pEY
fgtVN3idkogGeIscxNtbk0tJVfvYW2Bwvjwz2aK9fdgivkgGAwp4Z17wsB6x
IQG5Dh1q9shYCuziChM1Kkqdcem/e8VJHLGQ2QQKypi5+5S1p1AZjOApIn8Z
XavTzs7B3h7opju29FM9rtdKImgWRvKmVh9TiN9anQaERlo8y5WhUfthtcBM
cuAGLMnq2VWukYtsRpETL++QzCrlgo2dxoO4KGvNhp5Dr0Stm/yYZNJgqGKu
c4fAtMWSIhVkadXI9GBDxQB7jUBuIjUYkwzFFGwyjsUL2aL94IjvVtEqj2aT
BM8pJL+8XRUuaFWXuJTBg4IAXcfhRHR5YoDJlzewxqzr1GM+HWyzD1IndFzD
kmmtbbQBmQ1wcds8hZBAVSRtW8OXn6BBCK/sCJCtuu+CTWVV2hJgncc4Tkwm
s3u80HgWcT3xirs4F2NCWxDDrIOETyIBIDfTXfXcKxZqsCl0uMvdokOvi5WW
m+9nDT5s+jUB/HzwpnTw2hpsekWOe8mHW287cjLCKf97HE86v3WoL7SI2xro
8Akwv4xqrK+RLo7VEpwUcamTUK5B0ZwerrVY/J9Kcnhzfu/FT5TovEYGsMl9
Pj679FK+cQ6/vIVDtEYf/B198e+1aeP1uc39o6OT86tffnqy9+zPtUAdn5z9
zSQ3B2v0eP7m1enR3345enly9MMaXa7R48XJcf8IK5nX9UYzvqj0Bh+ss2q1
LUy4nIOLGjHHB2SdXGtVFh9JCf+a60FsKrapJ7LmxWhSDuXZExT96GhqOmLp
OrqKfVZsm6W6gq5jyoawSiVI9+zG5cKdDxW+4akafRNT5tTBXq4eaMylXfLt
RfaKMaeYKh9gc5zVKarZeq+XBdr2rl5dyoCVGtk5pYsaHwGvpukdxR3RYxig
gwMsJCyeNcevQNVYBmla4G4tSln16t2+s7e4IE+ny6Gcywl0tzjG1Vll0d44
sII8Mzw742vgsp7W5L3KlGxukvCSvZChRT+ZyjuCZajHZIBkr8Ps3XLhXFjy
U//o9Su5pOQSfX6o+/XNRRuV9pd9bK7J0ah7vscFmkQaze5Ml+NlaEGV/7DI
I2wAUydpxyNj31RnD15zRR5HkqaqrKaa4iY+OgqLy+T+KERKHCqWeIhlnKC6
iJTXCUiau/lkTsYnASnB9rju+JlIzWYDrVJbwhvln7GD4Yx/0cjFwDbJvE65
H71OQqoZk7Qmpmb0yRMU4oxw0vUbvWHmrlQJ2H/YjWSK8LgIWVsN9IktDuvU
6VW6gKV3nYimDF1lAP/p+c1T2hi5yYwXmKs+uBXvjZRnZq0bpMSCkmxFhKY7
f/hqHx5asBHb3fIFVVPuBVrKRXkgpxpL20ijL2YodpWoyhs0eXmgxBpqRmfU
EC28JAy+mZvwv5p4FcKq3WsNYTUi6jwewHntyDJx2impF4jURMjx+iDmWfyt
OiAMwjL9NbKpc52jwVTHiKvU2tvaGZHZTpHY61n46D4Yh8Pz+ub0nC4XBxT4
bu2InHJADvqm04ziJQgLLMY97u5bnNv7+gBwjsvCXccLf+xtL8CcbxwkIxmd
UwXMhKHhgcN0GS3Vxhy3piA1DdoN3lBfuoTlmlD2PtM66WDItBhFWiVOMCOX
ugEtM5F3qaGJSCjW8nhs1usAygM+bDq73Gqd46LgHTh0WPgaHBLBbdFfpwo0
1eNv8yo6pFXPpZO8JPnDjHeIYp2JZKj1+31bWoEyRkjVpVJineALLUDWwfs8
aRXpDHDp4yKdETpHdOFXxNX8CBqp9pCzeQ1PRYeDmAwLz7UPVwRpKnX82JQ6
/urw632SXYJxNJLyzqVOzBD+RWti9c8rPZv15L7bJX4mdlsS9uahaFxiBJFL
J0HkmAEl13tW/frPlVuMrRDIbMqtrhNWRDJzsw3Kk1xxrtdqdXhzTQF7VJqf
hznIkdDJcTzBINeSeHc5xNIPEjTYtLDBzk7/7HhnpzyAI/H5HXwF+PhUunhy
cPhU4pllYWSZ/LVTTLVDyblHe6AzEB4xPMwjVr9psdB5DP2QMAWIS2IgXr1Z
yJWxMXqQ+nrtBFlRZAq43rbztqlgMKSMATIZ0SUrnYYLAygYEaCRD5h+uRcN
8CWIDfcNdINLQQOaWhb9KutnqJbaMFQsQRsgWZuN/9lwNjaaaQ/CQVx2Xb0/
WNiT57stL2jTMVrTtavSpbl7HoiH2nFMXQ6apnUeoYBo8y3cG36VwD/WsFbO
n/IH4CuubIIiXkiPF67mGgXClz1KFENwjbzxuhy7RKU2yQk8Cxc81jV2dMSM
D6/2uRabE0HvFk4QuSGJC/Ytj4MNHOOXm70NZwOHtifH6OfVVVEmxsTTr7ii
DM2B2dgQlcC5cuCh5cmPbVV4m8qn5QAwyy5ePO1RmGm7oUJA8DNnvIGk+sv7
3u9O8ccFrcuH8/aTEuEQDLaU0pJ7N0qZWiHVBHUR/+jFqvIglAbNs6FR1pDB
nRplyMNg7llSSWZ+jfPz6kLUaUo2+bUmX8uP/TqxBTKlFAyeQhMJLOKLI1l7
2Urly/ms8GX65eI1I45zpdJBM9CmVUaQjkth+lbcXyd8/MFrbj9s4mUrTJoe
aktS/nDpBEKPYDUnNojbd3wStCYMEjo2eWImhFG0Fkpb0bjmjHOTMGSxoCs9
4IM5eU3Lt8iB2IV3NGIvp9iiLZvg1vxVwyj3QO6uLOLbIOQiQ3sDDBAHvMqy
TYVjQSQO5X6iUTSBb9xaNm3W4cIRqk684zeoQWD14rzt0SfS784zEKneU2f9
RfReC/9ZQN3y0bnj6dmySfdi+fjNLvdpni/N3W18DbFDjtGoxxfpEPnRWyn8
+xvKP1+asuYIZ53R0Lx3wUHHGP2YmxNgHKoln5ZH4Ad6I0SvJbXoK8Xq/QfS
ruv0R6Xoyw+43b0LPRUqLz/QdrqEm/vSzjw4c9o9MvNIuSy8W/H/Ud08Gmvv
e+26/vJ0G9rd2/uIgEgKqHX9eRcR+PdLVNevU3efhq6LN+BZ1X4s/TUPWIbv
gZ+e4ksTXlKrB9oY3EQqRqSh745x7/zrtHnutVkLv9OVbbDM/45FdefHxf0v
9aKB2ilh5Xxz+YS/Ut5f95WH/OGDB+W+8pA+vHfXjk9E5YH38Dl5Gu7XOEql
h/vy4cNn654fOq1Ki9OEYP7i9MziPHj63A8rrdw+VpxMp49qKw+O5kPkwlFp
Vd3oTt2Jrmy0ncTDx/y+Cv2ZQv/g2Xcv1SiD/eDP/R9OEEhE8ChClSBwG5ci
/FEE4WFm+KXF8Nq5/HEEQS758B9U8cSlCLp490HdA/9hLUnghg5JsF96rSo0
gRCrcsNOmSb8f6LArf4vJwq1T1uGldb+lNhtfRuPUryKwvFDogO1+SyiA/9U
oE3duTQ14rkoRA+Qisoz+bDr9ltHKsqNui1ZHnfx7mse+I2ea5DCw4Si3Eg+
fGSWYKeBTpQaPbKBHVVCWfPjNPI/7PprXzlh9Y28PlaQiVWNfDgeOm+Nx22d
SdQ30j17iEzUNpKRHyQTq8D+vT+sBpuAF9CN1Rz2kOHDWDE2guY4mFNP6Wbb
ZIom7WE6n0fOzUUXJ//+9vTihLNCR2mBxp9ymzfnGAfUf0Xl92/TDpcPMZaP
4DZOEr3gnTOyKITa2EPogPFHZNyap8yc8cLbGhOByfAggDGSnUz/6YLzWwU0
ycZTU0VcWJuJ2EnUbIIOxjyleHQ2ybljIQCc1j+ia5qGBbk56+w7GDKbJEuy
sNhFCcg13XFyHNtcN4gq3gy5MoljdzHBubwgEqTCfle8itux6uLl9jhzk+HM
sX/xLHSvZqVce7Z8Uc6G48n/LZ1TmHDZukg741nDpHKiZHJI9C2aKSJKrxAI
NJbIWtr4DqE5NX2Uk+8qGaPtDB9ooSHfMAUbzhlSpkZSEzhsmSJjiVkCmAqg
ut7Wvcv1eVIvYimPdDpOQW0BOcpr7IK1azYIh+/U1eKazUxKBaZ0U45IHiU3
HrBooNeyWr6hjMtVK35HyZiyqshj6qBPySFhdpo819ROrXtorKPM1tAiKqAb
LqjeBs0ZRIxsHHXvLLTA4pgY2fqpIcB7nIho64S5RamqU3PLXMKvHIhTgdU7
Vmo9lm1y1wQzs2yFFMUyJEKEMBKhWsIuyZvm3GHClXxXMMTkeL/X9Sifccnw
8g2uuts0GGezoXesDmkkXMZJd6YVdzpcvRbGQc/YbozvtXjkLQ4HOyINMVQQ
gEmNv7aowpU63NCYeK2DrHIo2/ax4591o4g8E3Bg0rddONl2U5kLBvIQS5Ca
evFohPe50CaRGkedUU5CyoFoDbTehIE7gP9zcNjeYOOgbHVP+nNRTP810fcf
wRieVxVl+PnvxxnR7muQBvgMyhZK6pKwmdL9ayEBi0Rr4oHmceT1G/DP3WQC
vLrH9NgkcX3iBrNSVksU/Gx15ySAwGaKdTiO35xTVU2NO5iQI8FpqYCq90rf
KLRaVnkaFVzUBUtKmVlLGAPfrYXrY2JMuOyec3VoVm46ihZSoChlqZVCEypn
WWKYNfuDApslJT8aTtlDXelb64naM8ArCZKZ0/Gl5q3gfWC2NxP0RTdHmrmK
QPBwyIdU74gkNtakgY2wg3ShNThQqBVnMmaqUhAEZ69oyLJcl3pe09DUeVhi
AaeQSlve+9txp/61e2Y290I/7hnN0DDiq3IBP/D/s39Ce62xIZ5w/2oaDEVy
vettxwdPIWEKOxfrMMK1JdM5jEVHp/4/BwATjyQROk6MD4v53mGu3DRHmoKO
ih/co6j6zSD7bgdrGO3s7H9Zcwx3dnaaITMpyn4ZYZIqzd1Ba999hTMwlXBY
qomz4NdlFuejmA/CQ0s1XiaY9kXb4n3oRUAYMvQASj80mtJRik766nBv/+NH
Wk7UAPQdBunFwyh3A5m+3tt7jMqnidbhZ4cfP+Jad3hj/H9htNrtMdv34UMx
SDpwjjoYuMU9yff1wEN3LnFmwA2HpKh6TymTG2erCGK/HERcQiu5c7MPVwix
O6WpipTgQOmp13J9LSA/9Jjbcak4SFP/Tcvp4G6N/qew0CCpVSCbFMMVh4QF
OSPHqXYqJP+nGlZVJ8bWbTR1LFsNo1GTn75Fuld6RDSw7hnSXiSMslAArQmz
XnEzcuX+YoeUYJ7o3j5e4h2c2ojtncqC/iONZGnReoZrUWGEYkpr5thoI2s4
UJ/KP9ZmI6hTewcKxXUgVb9FgOIltMGQ94Zfm3oyhpFdxyIiFwKIrlTtsYak
YdljPbz2fTzG+FxYlx3JgqHciDVgdegAlmLwRWH/u8oY+NiOU4ZVd19Jnu66
c8tXRVBDEl+764wQ/caT6i3378OQ34EyXCqgQW5AKuXLao6C4pDS6i8db2dK
XVa6W2mEqOcxPIAhmcM0c6qA1JJbKtPhyyYOJWDxZCXBrhNTOmUsoe1dF0/W
QwZEnM1VoY2cC4m2+58kwvE9fHJixFwWJ5s/lDByJwAV0AFkHFvSKFxOJC2m
sKod61tDrDWAw6wJn3aNiVVkkOO3UswASf+b02MTgmxkNcoT4bR3V+iyiZjL
hbJMU6fgnApjm8zEsau4rh1SKjfw+rW8TQVkjiRdVfg7JnvwKARaJFn0QJAJ
sT2Bthscu2pbMTUaevkWKlKHM1LrTX0ArfKVLXll/6sUgO0CKID1yL2Eqcg9
42j6K+A8ANML9oOtvfd72+aF5Bf2gm8q9xd9V25Uwrd09Ud9rWSUWzAEQth1
E6jtvMUfzGu/edyY9tgDrIypxnzFh3Z6jnGtGd0kY+DC7WCQ7GXLfb0Tth5+
z7cGmGBCzVegwjmjPgWdC+gcd96Qg3TY3e8eOLkumPQhCM+xxfQLZZJJpLiJ
VK6Eq1fuMqPsnrrLqIoSQpt6zF0LdjXR9PT8qS2S5MaWY1l/KmrO1aulPCzq
rZfLGLpH2QIrX91iSxr78qJUAIcel0euJLg2ZXIdYr5VaRW1cu1CcKF8JwmX
MRELuYndJpo/C7N3kt3ljHytCHddvoeWC7uQYyXnapVucVkt4S2TtH1yNeZF
lCWmTqwbuW9C9N0ScVIMFW8+01K6zi6M0og9gbgdKJQPtZqmuSqGteGaLWIT
nD2Ngn9GhMKqamFmcyLoqmFUklFtovrAp3xhPE3aKb1vE6idifiXEMuMatKJ
bFqOco/1soY2XfzuBa9wjnI2lbZjfg0cUzKH0HvKMBa3EablEoJE82G4yJcJ
Z0CR4Uk2MscEYzzzXHKNWE61ZEGwFXUn3eDgcE9utER4j08utjktHNg32hlG
nMCcerlfXJmNdmGZh5PIVOKnWQjbNrncUrMfZ9WRNpqvLZ3MQqDD7+u/4HdO
ZH0tY1nJUB4jQzlwGApf53BGVkygsPu0AFRcPf4tcnjKuvTY0HesyQU9Hp0F
3wbfUIWuzKHvBBRm3gE983gDqoDPqT7h6v61bZ+K2a7FED8D1xT+F/3rs8cK
3pkgFHO0HLZ4H7wgbLwvKQI2GsqPsbkPjtIZG9yMUhSUlCP7t//G+Ys+9lCy
yS734QPNJae2aJTAD2X6tZ+w3vnhwzDsyDLJV4yozeMw6paGqGO7zV3k4bwT
L54+1AdXIqrYr6SDJV7BCJ9zrq+5abTJpszzPep/e5Uto3YwTsLJhLPpjwTn
4LUDDeG7uQZwDeOEaH5GKvndPeB3b5F01k6e2zRdTHHO0hJpKg1fByX0FwJb
wX5G+Nf0ljW9Ent6gSUSSuwJ2Y/oHjVcBdmgFLmIKU95K+Ga3MAVDvfKvGYt
zoEDfhrnoC8M52CpVQfxCs9JsvwaaZHCW4/PLj8jJzrQ9fn/vOify4uq8Y4P
MCP3B2jYw2tVAsUnHCuHkC+biE6vYXedTyvks4EJS3NDnErNficDdo+vR4Jc
4vJ/CAOmufy/xoCpg38qC65fxfydAvMQA66uRmi+dVnvg0bk9XiwWw5s9V9q
si1zqeq5eIA18/uc2XC1zp6xXgyTMHOKK4iFhrQ2uhyTdVdhbjg6VxEhqwje
L0dVudDLsqGFXTaE67sK4QLvj4qHEWu4m/5p4mebrOp+2HRlWAbfP3t0S6zV
MFkbjTk8bp4K6AIwdSmkRet67ndcbU7MAsvc1ttiGWWyDNEyEVH53jQYZemC
tXUWLIbpksSLdxGX5eI5L8KML1KKB1lIVV24Mnur9TK9Rat9uxFjHCHpUV6a
stibqa4JUDTYJBUErIkZfWA3aTwCIptzeT2uTM1mmYlc95Cn4+LWRqmwfQON
tbgU3qAsgzVAS7Fnp+PyFyFd+znkMANyg7PLAe3Cj0GLjs0981ioPtYoDZDq
lIA3rQ5N4gB6SBITH0VXKd5gLYDGz/IpbZMpv0bmnkGUFx2+i95bZd5YWglY
zCSecYAzeoSxAJxasKRywrxSZga/7Coy0xn9sOnyA0ZmTxhmI5y5nPxgj3ET
EG+Uzjzjmgdq2ymrQytz1H/+Is2WM7wajVjeSA339TvE5jm6QePilXOjn7m7
fdMQ4A+bDnOS8yivjJ2XMh5oReOyl8ytjeBXAMIqUi63dt+2PauqCSucLQpb
v5msdWTHG9BpbuRgWw6vA4XitN5kq83btnNRN4ypUyufcCQIed+kphurKW6B
bHeIW1PHkS/6bagFuKbHZ1OEA94LERR0iTiIboIGSAqreMQ3aOp1LdJa67OS
G9ffLxehtVNzD+eWU3jeCVXfNhbdi35/RX9cM9YEuFN1vDbSbIRju03jCIRx
bkbteqCrMwmr0pnrQXNMvSEuNY7lfla3pJDpVO7aBUzohtki7F5TOgcVISGl
Eei4U0barRbqFIJ0C9hopU6NUFt7C1eKbB82FV9brcaG5WPXdJSU7Wkwr4Jq
sFyxWXHZFDs9oeOmAGw1QmJqdVVlue0H54viJc8XRUmJeFUWq7fscbKT3UGq
uUcxzvg519Cs3zil000MArfdo8gc6kvlO6UkoWt0KJ1zU81Sq2++8q6o1yBr
ApkFqZyqzrWpnjENznHIaX0hc28iFNLN56HxiOVO8s3qNTcuIyJOcVE6nN1a
oq3S7xoDdBsRcl0Q5dy78jFdDDlZivVFoizzhWiXCjG56ZsGpxVuvqKYL5Wj
kORVTIILrTJq1SwUZ169N4WHZqsPqNy7Z67lkSMq7Hrp5Lg0wQ1AU02vxmPA
Xnlb6jTUayProOeCy6umbgKRFdT26lU3apqVdVYjj8Rf0E06zdvl365kl80M
t85JeGAbue5jVDyMDxLhYbiOwmNXq2F9ykSypLMCeTRlwRqauOyf+b2qBSGo
J79S/CbqaiYmrqKtedul6UbTYGuOKISSPCPFy/7BNo3iWOHQ4xjL7Yj18Kn4
0QA9gImbZeTS1dxsrCWm4UzQVSzOHWttoWTxiCs3Jlqk1wiAutaNFoIPm6FZ
7cZGK8SthjlyKWDcm221N+NVnyG78lE9z01pVKMu08UwUzwvGEC0CiBTlL1+
+DZSI6zTSQFzcl9WfVMmOot0QZ5jc9Ff88jNsuRW6mc0VqTD7Vpxsxm2ZgEU
y+ud9s/6ZICKR5FG4n/YjIccofYj1oT+ga48gMNKbzDDxZaKxrRx7CHmIHyO
8UGtejQSoUONKABOFtsI5o1S1xsa2HAHiIdddrEBvcfXhIP3RDEuUQ/GQMoj
LlN/pNWX0VB1EVGV5CHZoYqwWJIlKaJd8XIH/IjLsoGz/Mz8XtdQjJ3O5fUE
yunJ1Qv4j9D24sUR/LowN8/fB2e7ffsVyzGf9AleHb3mFx965ehFYtjlvdVr
J9Au9p2gHDojop5aBG4jvm8QN7f8NWL0cjFSBoBhnIUpSf5nBvCWein4zumb
iAPn8EST8nd08faYk6aOfrwKvgi+h3+P+LJzQTu++vyjf1mgZY7UGHT3wi1I
K/E1KUeZYM8IHvTdBjrIbir7TMcTVIxRpxZshFZdfmvC2en5987zttTD5Ls+
zzjbjI6Hwe1Ywivp9q3zKAuqZVzbpYOjeelZ5B+xQWQToOhEUf3ZH6OB3IvE
UDnnCr4Mgf/kU2YDnH/yZP+ZTIj6oEtSbR9bMO3t9Xr6+vEzKqSu98XzZBsh
ppxcu86sI2zwFh5H+TCL6aa4jTY8LJ/zDRacNsxh33DDhcTYR9Kk3g1ur6L9
XnYbd71heCCfGzwA//1XCqbiu1qdcbRHp6c70i69zlDQ2bBGHyekre77NoVz
KZz6VDo0CFru1Jmm4kJNu3m130pZX/uZFtd1PbenfM9bq7JLqxr7UPeCaRa3
zDr3gqvnx/ut8jr3uFZyq7LzPSJ4LbPxPUP5tFSwZnE0wcOw9Px3L4AtINn7
pNUwdanXWg7TuroeWWk9Dv4p62GvR1uxIJV63JZNKFHGqswdWK0mScBwxBqq
ZoSB0iBVYQAbdG2DupLUNnbQdeNinWqupt0ykLOcnGbo1u7P71qXLvnFh1cV
otzCNQf5Et8Sz/0GqMbk3+KoGHfTbPJd6xStG0jb2MernXjhn+bawnR+Q0GR
1eLO8B3muJiy43LhpVfWubS1pbVr3slq3rNsISYsN+we+Wr8nePbgcyV5huV
bp3d40nIHh5fnJ7zDU1Ueki1DEy0oJRpkvAY6e+r4c73QX8wyIxC5jutt/62
e7bti39Nvuvqo4eFP+hrD568nSvtht9/wIpRZ+QGtfflUIokQi/JHqRNSRrF
a1tDRuZ1z5vL3VgRDvo4WLePXsWrj112+nWdPl6/UxsaQN2d1nV3qPBLXlP/
/OSnhiV54jatgoxf1oP81P/QgkWf1IL1FTxATBMqAMtct/DHp2bhy8B+/XAH
1Slgf/VTeLZOd3Zi1FHtxPb3CMFNuD+nGuFXVs28J3WxAS/3H/y+Oi/orn5a
+wdr9Ganhf3Uz+qxHvbjlG5RcCfz8rhxModNn9WciGMzB3/oJ819OAfguAny
p0QSQNmiK3DibJiFY9S63uJgf6sDGnHzLxmF1endPaikMph/Obps+u7r2pEu
72DtZzRg45fPaJdmWMZMuaJkeb5OR8sEyeoFJSfWfX2wJ52fxwnlLJ6fvqKo
kdrG+9JYuSuS6POmxog9x3r3Hih7l3fz4TQz99/QlXgxafHHl02TO3gsI2rj
yyUatUj5ftv8FWLOWUQ18Gju+vW5Wh5hzEa4n5Q+hjkskvDO/fiy8WNEGIJR
XP18bWTN+JfHzZ0gDh1l6e0ouEyXGV5QgnC8iOf86YvTs+OTi9qPNatxinZZ
lh3eksY+qnJb1xiAygffNq+s31wPIBVVRCtCjWbD5dKiRlU4NShwWdRBmXbu
V1XjwmNwMJ1ibGqcp0olYkSqL8iih5bcFTYxUOvioGwiVVmQpZyHGQjgVCNH
5aDFx3L1GBGGclbjWXXHWi0w6ZVCDtYzgHXdKI20of4X+dTUTxmR9jDQTCfa
poVm0d+JbHRB0v+9L+BJ0NQqeUdlGJRRJzhfGzyMJ1xTbkngI4CPWIV2VshA
7PUzofXIuKsO8xe6X2rkopudh6eN2N57Vqk4lwVRvFukeUwOg5jHVMTYYhTE
3cZU+G3rvRhEtjCipuGiZ24OxDIcuTuniGR8D1ogBm1SAhrfUk1mBTbb4N0Y
0yiTKJfa1bKLZSoCDRd4/SsONqciiDeaGdyWO7mK5YJAc9Lw2etpb4guL4Wa
UuOM/eYYtoKFHnhEusRI4oTk1jJoQLVDfOz1vJNzt+zj62gUh0wOuOpAesv2
92G8oBI0oXOZKlXh4eKVicn3Yqfve2t9MQtLzqGYAjwkgcuggMbg7YA+zNfS
I9IohYD9wKxFR9uWK9HzKTqFR/a5fsG2KIZIctKR69zEsAoSEJFHwFsLKtAT
ztUbii9MWSJFDSQgO6i466h8eRNtZtutAEYlna4B2msTQfEO9XtqeU2Xe7N3
mqx2KRnuyWZosJEyf4mOsYs7vwOe8R4GuMN7rzj7M5RLx6gTgYWdtdwjLpeJ
9SPdTiKd+LBTCZQk4Ru7GfUJHeeg9fGfRK6IwAGOZWgoO5JbWtCUO9B7y0UX
TKL5BNrTvMjDR/r/aEl3VmUc7IVvCVwKDMKSLATxUGNgqbDlTQyyAAUh43q/
wvvCZcE9OlBZcMw1ZFsw2jHxLi743NpR+LYmeLVLEABH0AXj7mzJsh8YzSoG
F0bI4+fwzuiaAhlddU7V9KwJnq/zCUcxEqObME6IIXmWBbYHas4kwyFbzaSB
UTN352oiZPg0OMfHKv3A1IDyomWhathCS1PLNVi1yBbVooXutRzDU43JybE2
mfu5ivdFR0Z7iMaXzRIEOx1GjH/BwDu+KzFkN6n1DcO8TVqrR8OEXDJKUmFc
DUrlz81i7pJrTdeTS52Z0mH+zVkvhGARFluqJSTlBzxVNTAYJmQhaBqCeoa9
s2vtBMbwoSYcRqkFU3vJV6m+CHjRvQonudxrB6REUFlvoSNLc76cSWorX5ON
kGPicJ44Pm0eJOXPrJHHJltrmvXXzw6fiSe4SUhQMWr4meSoyoifJE4NPXkK
BIKY7lJ1RUo6U6Y3DvvEzxG7kYXTiYQTmHuZ2LyYEl314YOeus8ms3WePnny
GHWJczEgvs0pXtNJj9c92z/A8E2/I2FHJHsHnYMnX+H2mz49WyjVOaBiHV73
X63f/T51fvCEulZPfZ878vp8VunTyI/DBgGygg4NcmQN8SOFp+Wb7NUyBjjx
EgPNjL0GThpoqI521BLL/TQuhGTCRFv/mLmewfrr2XMfKsomc9LHZOib+cCM
fOCNXJALdhcWahb9LgD6TQBQTpoZPzTjP24cn+5xpGSFTweEQmXyqQ/M8zRN
QEKjcDN+j78en10KWPLQgHbogTaAr38HJKvqf2wdXV5s+zCi9n0iMc8cJQRt
BL5hnhnYnviwYV7C7wDuTRYOE6+6RzM00laAcr5g4FJ6/ct7A+HTPwRCmwW6
FpBN0Ml9mwa4rz4fcBhYEs99EF/JNQUrQc09WCkGycD79R9CH8QLVToVdKGo
AevXI6Sx0tKNeVHopA+F7Jl/fsnx+el+xk1hkkqhlb02MO6PVo7oq0unRpII
P5MkUTPmJ8kS4T8mS4S/R5b4kRMiTKC+5YnohRsW7zd8QVUsAbOCbzOW6vwb
odrm/jVNSp74sIefo2Ty5I+QTDxrlfb6giyORxgSyb9esv3K6/Zxs3ASNggn
NRj2CeIJWrVJJ/BPev/y6nXw4vHh/r5tcQIsVsyrcsCXYU6XL+sJ3/MOOF7I
vM4Bt3dBqzSJhuSWhc+JfvShpJfHDN0X4tA9D2FxHfjiUa7g/U7JaSV8pWvr
0c5eWkm/gcBK9ngXVCwRaQA9+AyAXmLlzNNjHzh66DzxllIgw0BOWEWF7fFn
gA338SjBPCETBVHZ5yM4UZOUXDjUVHmM/5kAefg5dhoOtQ/WUbrEC1EuwlG8
zNvBiyQFagzgRTEWAA50Z/E7gevJZ4DLeMHKm2v9aW4TEcHkibOxT/9Q2Dxm
HdYz6zreyOzaGoQNh541Ro5oBLDyROJIRDKxPjBxJY0gcfqtRv7QS3onGjWZ
ZO6Dq2i2oDJddVEfgVuIoBTJgeN/ORyQg9KJgt91n6t009Z6xvhcPHDU7tec
fLaV7+V55Xt87jvheBV0B85AfHGXQXLT6+H7sGlhqvAPohVzQqdW4HaAWXGF
99L02DLcdOFwK2hxtttvvVmI6670jkWOrSMx8ZP91TFBzwC90HmCFmMsGTfP
MUCJco+3Wydi++UbwEzkOfU7iOdhdtcCDF5SGEBNEwQL2TrlmIZSwr+hnSiS
MDfP7ErvjRDbt8skiRx00Tq+ntGuFHT84JMTvd6CWkXvh3IW0ah89ObyJBgh
D3FuY6IzRYl4IVcR6LZeZCEVX5WMCwrSb4KeyuAD+YpmYZyYbEMOIiMBH9d6
vMyofJ4TSYYRaBR28uNfsGh5wgn2qLIWsywemci1bRu5tuTqJPAhC2uAFbif
UvuASvtpg7N0HklC3a5Qo6FDjSRIrkUu7Zyxx5VwpQ+PHCEeOgfCYrvjhnKl
1MYjQkdQjggdu3/4iGAv/1JHhOrsQ2+XV8fP9v4POynfwyFh98u/ykkJfu9R
+cdPyoMHpXpOEBnL54RQfuU5AUD75yQxwDp2XtDcTVpFSmr2p3Fx/Mjn4jUj
uOwctWsN9z1ynH0XJ5dX42UC6GKdfnhkLk62Pe3cdDTJ0uXCuELeXJyIXCBD
a7So/nnEp+iea7DXBIg2RYHSg4r0UMuR/xTAQf82tLGp+N3V8+NyyFgtrVrv
Y5UbZN1duaF24XHXA0MZKgle+VAra/hvRnE+XOa5GjtQbtx/8hhTW/iPx18d
2j8OHx+aZBgbaEQea/YT9fv9VgtOdS6XbYxMYMBNmMXpMjc34nCOfYEuayIL
xRR2eTLtYTVpzDbhxBhfa2v7IUDw5xAvllC5uG0qUetLVAwAFzjmor8cxXDE
AcRtvOwzoXHbkhGs4ddIFtrGMScQctILfMi3LkaZf33WZJnYkCSpVLFFpZLb
VD8HTQ0USsB3fkqVXB59Ft5h5RTMVpJyf94dNAKpBo7TShFwlJZVhhBOS0qJ
d8PsjvVITvpH93RcSCMH9CS8DaJiSC7FPPIGljAELLhPRBvNcJKLj2canYox
xXNQRtcUZ6e+UrnuA+aOuZyenQs/p9Q3zM63+0yrMIikyLpeiOZdzDOW5Nwh
RiRIfGP/yvZwjoOOlll0GWxd9K8uDfoixm6XIyEougJDY2RESQcykRihC5tG
vKxdmzg4wuVPJ1m4ACTA4lNUXSZvtZ7jGmraKp69YRHqfbND76OZfsQvxddN
pSzQYWwiC7CWf5QwBlCoji0/gLEapjDO4M67b422KuXAJ3M/nOQhhHSo4kHC
yU1cG8Jta/bhBCsf45aH+R0sLTJEFG86FOtCzmYuGC4XjJkyNHDQYjS5NQBa
2ML5RgqQF2FhS3lznSf3zgg9JhgUYgNWZFp2LiicUPePdC60/Vhxk/EQb5hA
cpXL+eFS1SZvEUQ6CsRtm6uZQlTy22YWbOFt2lBDFSlLhOoeYE0uztYGFNaQ
JY2hxOsg73goHpcpgNQiz5Xiy+mrHxUPgFOqC1kF+ZKHaMe5wtMMswO6UcM4
FoVyDincTUoPIBLKdS6tEUqf8zYMOYZpRyWTebHDpOSWs0Fns+Vcc5S1lArK
g6Z2iAsFCSGGNRmGgywaL1rC6Yivq58HfRNg+2ETk2bVoYAFzgFP3vNtyiQL
3kR0pSjlV1OZtziDc4wJ5ng8bX0VooiIHHoATbEjCtwwJ4zwxNyHCKQCJ0Fe
JGArWIELiLa6Jdj7tuGUTzIF0+EJRvUTycupWiQ8f5zxCb8TrULmyBnz0lsn
zDthR15tbMs1xJamcr8cVxTby5Js/KS5Tu3lcZ+rCDCKzy28chc17tAyIaFR
r7IIAyDY76Taj5PiVLm3AGvXZOESw9ElZIqkcSlNxxICXfdnMgNYqB/HGafv
c16whc8dDQEZYhY/hm6Ol1Ro032P/Ad3B9dD+sc/uVIdEBOYFF3FkE6w2h1i
rMIPXc3p8FyR/ya3xc70AsYtuZFB6wduyy3nFKWea3Rm7WYBXR5FCfMPDO8g
BfGE4zjp4kgb1sn5wgOp4aR3m0tcvFOpzdYaIZOjksQwwQA1QmPK6FeSeyTy
DUYW8e1sNLfS2prbXIQRDuhiTMZwi0eiIkCXRgLCXvhw41OBRaXDlIoJoRWc
w1JZrkN1xME8ZpPwRA8djpELNiCG84rk1TsNWdgcUpVC8qp9OkITmyMhIhvZ
sbzV99abep13KBQsQvM0o5bEbI1D+P2OViLC9R1yUPwwXIR6uxCjwonGo5Ku
/DyC5YnTjBPiH+VMTBfQNZ9jJqRNtW3CQncvdxdAxF1oeYt+ZOwD9xbw0Trf
qGqZoeR5YPPxWaRlkY88lalQEKA0eQOqAxmmUlXdQKYRco1FrrGFJErjMstZ
mSr83oZ3uVeja/VAwdb1btfWsNg1BRWutyVik2QIBECqjPSAu8iRpyBpKzS/
vLo6t7m0UZbB/LXYp0Uqc1MHIYDqwnXXH4HC3wlIZQLkiuIbKtrBYduZjiKC
kuAwghmP/fHgC9wBvtPCMiX2NHPoCkxIrgynruWSNTxjC2RnGRUpFQmDJuSe
EKaBhkkRC7IcSZmRvRgF2EflmlfMWEEWDLia3Ol5Q6gYe7ydcAMTo3Tw8aOo
ldqWzhatPe0HBkIQSbdZAjx1ptkOt/VrkaNEOwbsM25ojbBzK4cYJy6VQUtR
pVzaERwyI8DR/d0l4GRzVbexd8ug2hPP4uE7fOVcGukKTiVSIKKOEgMQc3CF
mC2ZiVLnLqF0z2xuSlAPKMjMPcBY3k9lScpKJx4olWMtR8aI+m7g3I4W+g5W
ib4NvZydVG/FkmNZviGsqvdpXD4rOaTXG8GlonSvpZ+djj3qz7ICS+w0U0tN
Y6mpqTjJ1FVidSv1oNpeDTaWsagSsClC2rZ3/2jhHonRoKhlNPEaYVMq6nvi
M10KxOzLITTRnPW3u/XAn3vH3SdmhKimmpdTbIoIBl6CU1NId5jEBDGNPuPA
do/vYDhyNkHlCkMg0AakET3d4M18GPmEDLGMViziOeSKxGpp1VrLdQjpkhDW
ZIFbA0DJXfkE6NnjsjUjWxlKAelqOpIpPJqKHRl0PDUKDI3Rw+LTWjaC4Oj4
+BXFmIrN/4JyPz5sDkej5CGFZROVtwj3hWHkcBvsUB6zvoRddRb8hCOCBssY
hNvlQo6hvPOv3OrroCcaAvN0f0+T+DGoPC47Fwiv/AQPo8Td8JUNTo3sIt21
YehUhQe/NPfzkpg1Imbi3QBWCUoveXhYoe8APn6LEGI8Kj5Ga0T5GTphvg0+
BF9sxXgm8dl28O13dIQ+Gsu7u3rmYjhYYyn1ISutYW0Xp7CZLy8upHKO1BPH
4sZMQ/Gc091ZUlMSmrYdXiXjcDkhEI1BKKfZExBSBKlm0liJA6byd3RbTeOi
F/w9iBdPOaSvTY9+4XX5pTCRQMHPbWguwZXcNOgOnh4uOaQSX4ICFuJp7pG/
CkN6k6T1c6tlxBEeUkSOHi2lWf/tnr7oEEX4qB0EVOR7iRdi/D34kvkjN/nZ
NsmnsAKj0sBefzw2OtF4YN7hbf7kY7upD2c47iGKoYkLt7TFHt7xO+naeQF0
vod4QquUT+h3XJlYSs1I12IAKK8MIpnYtT6uWGdpYve1uont+iVAu9eqnvE9
dzvMM4mhlVOxLg58nnPGKF46ZqUzJUeN6km/RJs9CYebgPCdqfyJPi2n3HRk
S88WXHPXuVz92f5T9GWQoKsVq+HMUaYNJQMhXWoHDf0hGxV/o7h3y1cXwhCH
B8/22yYw56B7sDqbpnK8ce9lv+hYbz7tPjnc4l3rYmbd1v7T7W1Z7nbwJ2xF
YAUFANWIPLCNN/MBdOxlDtzMw9IjG8yvofffckQ9XpX5bSP2ABwYMy1r2tIg
8/W/ENr0qR9wBUhYrubPfi5/KH7ib7npnwJoa5CBo6o5q9LHVifo2eEIDSHP
m5jigaF8Z32DtsweiPwrd5RUwJjz2UQq34JPWUG1r0K6KAje9Led4AMVIq/1
3F7TueWQYrp8JOTimaEvUpL7oAioJoPxftzIhUaEBSYdOfZtKpjJBhNzDRBk
MmHVHM/HIE+TJeoeiEuZccMupHA0J7B1aWGwblJM4tWKD7eS+F0U0JJQtqBJ
j07HY0kuziPYUhAytmqq5SG0Xtfb3eDMz83G9UJw9JSrFRpFybmRbph1dbFm
4qmvinDtxBGnqVJeYjwm6IuYDd1qLTIJ3bi34yQNWQHFZeEjR0EVZVVH79gm
iUkUBMVWlre960qnzq2gOCu6PNvc8DCWSx6wQ5NOO9e1xAV210qj0XERxV5m
Nn1eh3lG3PYku+Eyy8jkq30judmlfYbhoXMWHOE17bgATpY4UlkTk1dOfWtC
M1JeNKgJ9O3mywNWS+ZtEwCREjCtVj937K56TsUPQggFfQKI7fK5Ql8BriO2
gc6ukX1ea2t68vjp3p570SwtI5lb2f0gtTMbV44XrWC7wsLU0/DsEWr5wYkq
tFSMU5y7U3N2bMYtrJeAmA64zGb5RHJv/UCr+vNUzNljAsXLtyLjg2igV3mB
iy6EWYZgkDYnKbD1oa2SCmuuOrACM2dbcE+51a1tIrD0ayMYKF8+Z9comQkd
Vi7ZxOj4AmJfFcI1+B64yBYJ2F3AlP0n20FXsXKvJQHwxJ2+ZIY+cmVy/gTl
Lm6pshlz+YO97SBo/Rz83EJt1+mktgeW2jwpodt9/PRgm3qQKHIRK9wOuOk2
deGGLzMXZUAeQyctDKRWMRIDLHo6b+nBmfk+9pZRXHZPKBs+GWOEtvtgyKHa
+ggG8ePJPXDtKn/tLjL1g1/1GvdBRHiKX29uBaM7YdmrV6pmq+BzX1oI66SF
+pjr/w17QPGo/jMBAA==

-->

</rfc>
