<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-keytrans-architecture-07" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Key Transparency Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-keytrans-architecture-07"/>
    <author fullname="Brendan McMillion">
      <organization/>
      <address>
        <email>brendanmcmillion@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="18"/>
    <area>Security</area>
    <workgroup>Key Transparency</workgroup>
    <keyword>key transparency</keyword>
    <abstract>
      <?line 37?>

<t>This document defines the terminology and interaction patterns involved in the
deployment of Key Transparency in a general secure group messaging
infrastructure, and specifies the security properties that the protocol
provides. It also gives more general, non-prescriptive guidance on how to
securely apply Key Transparency to a number of common applications.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-keytrans.github.io/draft-arch/draft-ietf-keytrans-architecture.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-keytrans-architecture/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Key Transparency Working Group mailing list (<eref target="mailto:keytrans@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/keytrans/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/keytrans/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-keytrans/draft-arch"/>.</t>
    </note>
  </front>
  <middle>
    <?line 45?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Before any information can be exchanged in an end-to-end encrypted system, two
things must happen: First, participants in the system must provide the service
operator with any public keys they wish to use to receive messages. Second, the
service operator must somehow distribute these public keys amongst the
participants that wish to communicate with each other.</t>
      <t>Typically this is done by having users upload their public keys to a simple
directory where other users can download them as necessary, or by providing
public keys in-band with the communication being secured. If the service
operator is simply trusted to correctly forward public keys between users, this
means that the underlying encryption protocol can only protect users against
passive eavesdropping on their messages.</t>
      <t>However, most messaging systems are designed such that all messages are
exchanged through the service operator's servers, which makes it extremely easy
for an operator to launch an active attack. That is, the service operator can
take public keys for which it knows the corresponding private keys, and
associate those public keys with a user's account without the user's knowledge
to impersonate or eavesdrop on conversations with that user.</t>
      <t>Key Transparency (KT) solves this problem by requiring the service operator to
store user public keys in a cryptographically protected append-only log. Any
malicious entries added to such a log will generally be equally visible to both
the affected user and the user's contacts. This allows users to detect whether
they are being impersonated by viewing the public keys attached to their
account. If the service operator attempts to conceal some entries of the log
from some users but not others, this creates a "forked view" which is permanent
and easily detectable.</t>
      <t>The critical improvement of KT over related protocols like Certificate
Transparency <xref target="RFC6962"/> is that KT includes an efficient
protocol to search the log for entries related to a specific participant. This
means users don't need to download the entire log, which may be substantial, to
find all entries that are relevant to them. It also means that KT can better
preserve user privacy by only showing entries of the log to participants that
genuinely need to see them.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<dl>
        <dt><strong>End-to-End Encrypted Communication Service:</strong></dt>
        <dd>
          <t>A communication service that allows end-users to engage in text, voice,
video, or other forms of communication over the internet, and uses public key
cryptography to ensure that communications are only accessible to their
intended recipients.</t>
        </dd>
        <dt><strong>End-User Device:</strong></dt>
        <dd>
          <t>The device at the final point in a digital communication, which may either
send or receive encrypted data in an end-to-end encrypted communication
service.</t>
        </dd>
        <dt><strong>End-User Identity:</strong></dt>
        <dd>
          <t>A unique and user-visible identity associated with an account (and therefore
one or more end-user devices) in an end-to-end encrypted communication
service. In the case where an end-user explicitly requests to communicate with
(or is informed they are communicating with) an end-user uniquely identified
by the name "Alice", the end-user identity is the string "Alice".</t>
        </dd>
        <dt><strong>User / Account:</strong></dt>
        <dd>
          <t>A single end-user of an end-to-end encrypted communication service, which may
be represented by several end-user identities and end-user devices. For
example, a user may be represented simultaneously by multiple identities
(email, phone number, username) and interact with the service on multiple
devices (phone, laptop).</t>
        </dd>
        <dt><strong>Service Operator:</strong></dt>
        <dd>
          <t>The primary organization that provides the infrastructure for an end-to-end
encrypted communication service and the software to participate in it.</t>
        </dd>
        <dt><strong>Transparency Log:</strong></dt>
        <dd>
          <t>A specialized service capable of securely attesting to the information (such
as public keys) associated with a given end-user identity. A transparency
log is usually run either entirely or partially by the service operator, but
could also be operated externally.</t>
        </dd>
      </dl>
    </section>
    <section anchor="protocol-overview">
      <name>Protocol Overview</name>
      <t>From a networking perspective, KT follows a client-server architecture with a
central <em>transparency log</em>, acting as a server, which holds the authoritative
copy of all information and exposes endpoints that allow users to query or
modify stored data. Users coordinate with each other through the server by
uploading their own public keys and downloading the public keys of other
users. Users are expected to maintain relatively little state, limited only
to what is required to interact with the log and ensure that it is behaving
honestly.</t>
      <t>From an application perspective, KT can be thought of as a versioned key-value
database. Users insert key-value pairs into the database where, for example, the
key is their username and the value is their public key. Users can update a key
by inserting a new version with new data. They can also look up the most recent
version of a key or any previous version. From this point forward, the term
<strong>label</strong> will be used to refer to lookup keys in the key-value database that a
transparency log represents to avoid confusion with cryptographic public or
private keys.</t>
      <t>Users are considered to <strong>own</strong> a label if they are understood to either
initiate all changes to the label's value, or if they must be informed of all
changes to the label's value. The latter situation may occur if, for example, KT
is deployed in a way where the service operator makes automated modifications to
stored data. The owning user would then be informed, after the fact, of
modifications to verify that they were legal.</t>
      <t>KT does not require the use of a specific transport protocol. This is intended
to allow applications to layer KT on top of whatever transport protocol their
application already uses. In particular, this allows applications to continue
relying on their existing access control system.</t>
      <t>With some small exceptions, applications may enforce arbitrary access control
rules on top of KT. This may include requiring a user to be logged in to make KT
requests, only allowing a user to lookup the labels of another user if they're
"friends", or applying a rate limit. Applications <bcp14>SHOULD</bcp14> prevent users from
modifying labels they do not own. The exact mechanism for rejecting requests,
and possibly explaining the reason for rejection, is left to the application.</t>
      <section anchor="user-operations">
        <name>User Operations</name>
        <t>The operations that can be executed by a user are as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>Search:</strong> Looks up the value of a specific label in the most recent version
of the log. Users may request either a specific version of the label or the
most recent version available. If the label-version pair exists, the server
returns the corresponding value and an inclusion proof.</t>
          </li>
          <li>
            <t><strong>Update:</strong> Adds a new label-value pair to the log, for which the server
returns an inclusion proof. Note that this means that new values are added to
the log immediately and no provisional inclusion proof, such as an SCT as
defined in <xref section="3" sectionFormat="of" target="RFC6962"/>, is provided.</t>
          </li>
          <li>
            <t><strong>Monitor:</strong> While Search and Update are run by the user as necessary,
monitoring is done in the background on a recurring basis. It can both check
that the log is continuing to behave honestly (all previously returned labels
remain in the tree) and that no changes have been made to labels owned by the
user without the user's knowledge.</t>
          </li>
        </ol>
        <t>These operations are executed over an application-provided transport layer.
The transport layer enforces access control by blocking queries which are
not allowed:</t>
        <figure anchor="request-response">
          <name>Example request and response flow. Valid requests receive a response while invalid requests are blocked by the transport layer.</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="336" width="456" viewBox="0 0 456 336" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 24,48 L 24,320" fill="none" stroke="black"/>
                <path d="M 384,48 L 384,320" fill="none" stroke="black"/>
                <path d="M 152,96 L 376,96" fill="none" stroke="black"/>
                <path d="M 32,112 L 208,112" fill="none" stroke="black"/>
                <path d="M 136,144 L 376,144" fill="none" stroke="black"/>
                <path d="M 32,160 L 208,160" fill="none" stroke="black"/>
                <path d="M 192,192 L 376,192" fill="none" stroke="black"/>
                <path d="M 32,208 L 208,208" fill="none" stroke="black"/>
                <path d="M 144,288 L 320,288" fill="none" stroke="black"/>
                <path d="M 176,304 L 320,304" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="384,192 372,186.4 372,197.6" fill="black" transform="rotate(0,376,192)"/>
                <polygon class="arrowhead" points="384,144 372,138.4 372,149.6" fill="black" transform="rotate(0,376,144)"/>
                <polygon class="arrowhead" points="384,96 372,90.4 372,101.6" fill="black" transform="rotate(0,376,96)"/>
                <polygon class="arrowhead" points="328,304 316,298.4 316,309.6" fill="black" transform="rotate(0,320,304)"/>
                <polygon class="arrowhead" points="328,288 316,282.4 316,293.6" fill="black" transform="rotate(0,320,288)"/>
                <polygon class="arrowhead" points="40,208 28,202.4 28,213.6" fill="black" transform="rotate(180,32,208)"/>
                <polygon class="arrowhead" points="40,160 28,154.4 28,165.6" fill="black" transform="rotate(180,32,160)"/>
                <polygon class="arrowhead" points="40,112 28,106.4 28,117.6" fill="black" transform="rotate(180,32,112)"/>
                <g class="text">
                  <text x="24" y="36">Alice</text>
                  <text x="372" y="36">Transparency</text>
                  <text x="440" y="36">Log</text>
                  <text x="116" y="68">(Valid</text>
                  <text x="152" y="68">/</text>
                  <text x="196" y="68">Accepted</text>
                  <text x="272" y="68">Requests)</text>
                  <text x="88" y="100">Search(Alice)</text>
                  <text x="296" y="116">SearchResponse(...)</text>
                  <text x="80" y="148">Search(Bob)</text>
                  <text x="296" y="164">SearchResponse(...)</text>
                  <text x="88" y="196">Update(Alice,</text>
                  <text x="164" y="196">...)</text>
                  <text x="296" y="212">UpdateResponse(...)</text>
                  <text x="120" y="260">(Rejected</text>
                  <text x="168" y="260">/</text>
                  <text x="208" y="260">Blocked</text>
                  <text x="280" y="260">Requests)</text>
                  <text x="84" y="292">Search(Fred)</text>
                  <text x="336" y="292">X</text>
                  <text x="80" y="308">Update(Bob,</text>
                  <text x="148" y="308">...)</text>
                  <text x="336" y="308">X</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
Alice                                   Transparency Log
  |                                            |
  |        (Valid / Accepted Requests)         |
  |                                            |
  | Search(Alice) ---------------------------->|
  |<---------------------- SearchResponse(...) |
  |                                            |
  | Search(Bob) ------------------------------>|
  |<---------------------- SearchResponse(...) |
  |                                            |
  | Update(Alice, ...) ----------------------->|
  |<---------------------- UpdateResponse(...) |
  |                                            |
  |                                            |
  |       (Rejected / Blocked Requests)        |
  |                                            |
  | Search(Fred) ----------------------> X     |
  | Update(Bob, ...) ------------------> X     |
  |                                            |
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="credentials">
        <name>Credentials</name>
        <t>While users are generally understood to interact directly with the transparency
log, many end-to-end encrypted communication services require the ability to
provide <em>credentials</em> to their users. Credentials convey a binding between an
end-user identity and public keys or other information, and can be verified with
minimal network access.</t>
        <t>In particular, credentials that can be verified with minimal network access are
often desired by applications that support anonymous communication. These
applications provide end-to-end encryption with a protocol like the Messaging
Layer Security Protocol <xref target="RFC9420"/> (with the encryption of handshake messages
required) or Sealed Sender <xref target="sealed-sender"/>. When a user sends a message, these
protocols have the sender provide their own credential in an encrypted portion
of the message.</t>
        <t>Encrypting the sender's credential allows the sender to submit messages over an
anonymous channel by specifying only the recipient's identity. The service
operator can deliver the message to the intended recipient, who can decrypt it
and validate the credential inside to be assured of the sender's identity. Note
that the recipient does not need access to an anonymous channel to preserve the
sender's anonymity.</t>
        <t>At a high level, KT credentials are created by serializing one or more Search
request-response pairs. These Search operations correspond to the lookups the
recipient would do to authenticate the relationship between the presented
end-user identity and their public keys. Recipients can verify the
request-response pairs themselves without contacting the transparency log.</t>
        <t>Any future monitoring that may be required <bcp14>SHOULD</bcp14> be provided to recipients
proactively by the sender. However, if this fails, the recipient will need to
perform the monitoring themself over an anonymous channel.</t>
        <figure anchor="anonymous">
          <name>Example message flow in an anonymous deployment. Users request their own label from the transparency log and provide the serialized response, functioning as a credential, in encrypted messages to other users. Required monitoring is provided proactively.</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="224" width="504" viewBox="0 0 504 224" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,208" fill="none" stroke="black"/>
                <path d="M 272,48 L 272,208" fill="none" stroke="black"/>
                <path d="M 496,48 L 496,208" fill="none" stroke="black"/>
                <path d="M 16,64 L 144,64" fill="none" stroke="black"/>
                <path d="M 184,80 L 264,80" fill="none" stroke="black"/>
                <path d="M 408,128 L 488,128" fill="none" stroke="black"/>
                <path d="M 16,160 L 136,160" fill="none" stroke="black"/>
                <path d="M 192,176 L 264,176" fill="none" stroke="black"/>
                <path d="M 456,192 L 488,192" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="496,192 484,186.4 484,197.6" fill="black" transform="rotate(0,488,192)"/>
                <polygon class="arrowhead" points="496,128 484,122.4 484,133.6" fill="black" transform="rotate(0,488,128)"/>
                <polygon class="arrowhead" points="272,176 260,170.4 260,181.6" fill="black" transform="rotate(0,264,176)"/>
                <polygon class="arrowhead" points="272,80 260,74.4 260,85.6" fill="black" transform="rotate(0,264,80)"/>
                <polygon class="arrowhead" points="24,160 12,154.4 12,165.6" fill="black" transform="rotate(180,16,160)"/>
                <polygon class="arrowhead" points="24,64 12,58.4 12,69.6" fill="black" transform="rotate(180,16,64)"/>
                <g class="text">
                  <text x="52" y="36">Transparency</text>
                  <text x="120" y="36">Log</text>
                  <text x="272" y="36">Alice</text>
                  <text x="416" y="36">Anonymous</text>
                  <text x="480" y="36">Group</text>
                  <text x="208" y="68">Search(Alice)</text>
                  <text x="96" y="84">SearchResponse(...)</text>
                  <text x="332" y="84">Encrypt(Anon</text>
                  <text x="412" y="84">Group,</text>
                  <text x="372" y="100">SearchResponse</text>
                  <text x="444" y="100">||</text>
                  <text x="344" y="116">Message</text>
                  <text x="404" y="116">||</text>
                  <text x="356" y="132">Signature)</text>
                  <text x="204" y="164">Monitor(Alice)</text>
                  <text x="100" y="180">MonitorResponse(...)</text>
                  <text x="332" y="180">Encrypt(Anon</text>
                  <text x="412" y="180">Group,</text>
                  <text x="380" y="196">MonitorResponse)</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
Transparency Log               Alice           Anonymous Group
|                                |                           |
|<---------------- Search(Alice) |                           |
| SearchResponse(...) ---------->| Encrypt(Anon Group,       |
|                                |     SearchResponse ||     |
|                                |     Message   ||          |
|                                |     Signature) ---------->|
|                                |                           |
|<--------------- Monitor(Alice) |                           |
| MonitorResponse(...) --------->| Encrypt(Anon Group,       |
|                                |     MonitorResponse) ---->|
|                                |                           |
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="detecting-forks">
        <name>Detecting Forks</name>
        <t>It is sometimes possible for a transparency log to present forked views of data
to different users. This means that, from an individual user's perspective, a
log may appear to be operating correctly in the sense that all of a user's
requests succeed and proofs verify correctly. However, the transparency log has
presented a view to the user that's not globally consistent with what it has
shown other users. As such, the log may be able to change a label's value
without the label's owner becoming aware.</t>
        <t>The protocol is designed such that users always require subsequent queries to
prove consistency with previous queries. As such, users always stay on a
linearizable view of the log. If a user is ever presented with a forked view,
they hold on to this forked view forever and reject the output of any subsequent
queries that are inconsistent with it.</t>
        <t>This provides ample opportunity for users to detect when a fork has been
presented but isn't in itself sufficient for detection. To detect forks, users
require either a <strong>trusted third party</strong>, <strong>anonymous communication</strong> with the
transparency log, or <strong>peer-to-peer communication</strong>.</t>
        <t>With a trusted third party, such as a Third-Party Auditor or Manager as
described in <xref target="third-party-auditing"/> and <xref target="third-party-management"/>, an outside
organization monitors the operation of the transparency log. This third party
verifies, among other things, that the transparency log is growing in an
append-only manner. If verification is successful, the third party produces
a signature on the most recent tree head. The transparency log provides this
signature to users inline with their query responses as proof that they are not
being shown a fork. This approach relies on an assumption that the third party
is trusted not to collude with the transparency log to sign a fork.</t>
        <t>With anonymous communication, a single user accesses the transparency log over
an anonymous channel and checks that the transparency log is presenting the same
tree head over the anonymous channel as it does over an authenticated channel.
The security of this approach relies on the fact that, if the transparency log
doesn't know which user is making the request, it will show the user the wrong
fork with high probability. Repeating this check over time makes it
overwhelmingly likely that any fork presented to any user will be detected.</t>
        <t>With peer-to-peer communication, two users gossip with each other to establish
that they both have the same view of the transparency log. This gossip is able
to happen over any supported out-of-band channel even if it is heavily
bandwidth-constrained, such as scanning a QR code. However, this approach is
only secure if gossip can be implemented such that gossipping users are
reasonably expected to form a connected graph of all users. If not, then the
transparency log can attempt to partition users into subsets that do not gossip
and can present each subset of users with different forks.</t>
        <t>Regardless of approach, in the event that a fork is successfully detected, the
user is able to produce non-repudiable proof of log misbehavior which can be
published.</t>
        <figure anchor="out-of-band-checking">
          <name>Users receive tree heads while making authenticated requests to a transparency log. Users ensure consistency of tree heads by either comparing amongst themselves, or by contacting the transparency log over an anonymous channel. Requests that require authentication do not need to be available over the anonymous channel.</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="304" width="584" viewBox="0 0 584 304" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,288" fill="none" stroke="black"/>
                <path d="M 232,48 L 232,288" fill="none" stroke="black"/>
                <path d="M 576,48 L 576,288" fill="none" stroke="black"/>
                <path d="M 344,96 L 568,96" fill="none" stroke="black"/>
                <path d="M 240,112 L 328,112" fill="none" stroke="black"/>
                <path d="M 16,224 L 72,224" fill="none" stroke="black"/>
                <path d="M 392,224 Q 394,220.8 396,224 Q 398,227.2 400,224 Q 402,220.8 404,224 Q 406,227.2 408,224 Q 410,220.8 412,224 Q 414,227.2 416,224 Q 418,220.8 420,224 Q 422,227.2 424,224 Q 426,220.8 428,224 Q 430,227.2 432,224 Q 434,220.8 436,224 Q 438,227.2 440,224 Q 442,220.8 444,224 Q 446,227.2 448,224 Q 450,220.8 452,224 Q 454,227.2 456,224 Q 458,220.8 460,224 Q 462,227.2 464,224 Q 466,220.8 468,224 Q 470,227.2 472,224 Q 474,220.8 476,224 Q 478,227.2 480,224 Q 482,220.8 484,224 Q 486,227.2 488,224 Q 490,220.8 492,224 Q 494,227.2 496,224 Q 498,220.8 500,224 Q 502,227.2 504,224 Q 506,220.8 508,224 Q 510,227.2 512,224 Q 514,220.8 516,224 Q 518,227.2 520,224 Q 522,220.8 524,224 Q 526,227.2 528,224 Q 530,220.8 532,224 Q 534,227.2 536,224 Q 538,220.8 540,224 Q 542,227.2 544,224 Q 546,220.8 548,224 Q 550,227.2 552,224 Q 554,220.8 556,224 Q 558,227.2 560,224 " fill="none" stroke="black"/>
                <path d="M 88,240 L 224,240" fill="none" stroke="black"/>
                <path d="M 248,240 Q 250,236.8 252,240 Q 254,243.2 256,240 Q 258,236.8 260,240 Q 262,243.2 264,240 Q 266,236.8 268,240 Q 270,243.2 272,240 Q 274,236.8 276,240 Q 278,243.2 280,240 Q 282,236.8 284,240 Q 286,243.2 288,240 Q 290,236.8 292,240 Q 294,243.2 296,240 Q 298,236.8 300,240 Q 302,243.2 304,240 Q 306,236.8 308,240 Q 310,243.2 312,240 Q 314,236.8 316,240 Q 318,243.2 320,240 Q 322,236.8 324,240 Q 326,243.2 328,240 Q 330,236.8 332,240 Q 334,243.2 336,240 Q 338,236.8 340,240 Q 342,243.2 344,240 Q 346,236.8 348,240 Q 350,243.2 352,240 Q 354,236.8 356,240 Q 358,243.2 360,240 Q 362,236.8 364,240 Q 366,243.2 368,240 Q 370,236.8 372,240 Q 374,243.2 376,240 Q 378,236.8 380,240 Q 382,243.2 384,240 Q 386,236.8 388,240 Q 390,243.2 392,240 Q 394,236.8 396,240 Q 398,243.2 400,240 Q 402,236.8 404,240 Q 406,243.2 408,240 Q 410,236.8 412,240 Q 414,243.2 416,240 Q 418,236.8 420,240 Q 422,243.2 424,240 Q 426,236.8 428,240 Q 430,243.2 432,240 Q 434,236.8 436,240 Q 438,243.2 440,240 Q 442,236.8 444,240 Q 446,243.2 448,240 Q 450,236.8 452,240 Q 454,243.2 456,240 Q 458,236.8 460,240 Q 462,243.2 464,240 Q 466,236.8 468,240 Q 470,243.2 472,240 Q 474,236.8 476,240 Q 478,243.2 480,240 Q 482,236.8 484,240 Q 486,243.2 488,240 Q 490,236.8 492,240 Q 494,243.2 496,240 " fill="none" stroke="black"/>
                <path d="M 344,272 Q 346,268.8 348,272 Q 350,275.2 352,272 Q 354,268.8 356,272 Q 358,275.2 360,272 Q 362,268.8 364,272 Q 366,275.2 368,272 Q 370,268.8 372,272 Q 374,275.2 376,272 Q 378,268.8 380,272 Q 382,275.2 384,272 Q 386,268.8 388,272 Q 390,275.2 392,272 Q 394,268.8 396,272 Q 398,275.2 400,272 Q 402,268.8 404,272 Q 406,275.2 408,272 Q 410,268.8 412,272 Q 414,275.2 416,272 Q 418,268.8 420,272 Q 422,275.2 424,272 Q 426,268.8 428,272 Q 430,275.2 432,272 Q 434,268.8 436,272 Q 438,275.2 440,272 Q 442,268.8 444,272 Q 446,275.2 448,272 Q 450,268.8 452,272 Q 454,275.2 456,272 Q 458,268.8 460,272 Q 462,275.2 464,272 Q 466,268.8 468,272 Q 470,275.2 472,272 Q 474,268.8 476,272 Q 478,275.2 480,272 Q 482,268.8 484,272 Q 486,275.2 488,272 Q 490,268.8 492,272 Q 494,275.2 496,272 " fill="none" stroke="black"/>
                <polygon class="arrowhead" points="576,96 564,90.4 564,101.6" fill="black" transform="rotate(0,568,96)"/>
                <polygon class="arrowhead" points="568,224 556,218.4 556,229.6" fill="black" transform="rotate(0,560,224)"/>
                <polygon class="arrowhead" points="504,272 492,266.4 492,277.6" fill="black" transform="rotate(0,496,272)"/>
                <polygon class="arrowhead" points="256,240 244,234.4 244,245.6" fill="black" transform="rotate(180,248,240)"/>
                <polygon class="arrowhead" points="248,112 236,106.4 236,117.6" fill="black" transform="rotate(180,240,112)"/>
                <polygon class="arrowhead" points="232,240 220,234.4 220,245.6" fill="black" transform="rotate(0,224,240)"/>
                <polygon class="arrowhead" points="24,224 12,218.4 12,229.6" fill="black" transform="rotate(180,16,224)"/>
                <g class="text">
                  <text x="24" y="36">Alice</text>
                  <text x="232" y="36">Bob</text>
                  <text x="500" y="36">Transparency</text>
                  <text x="568" y="36">Log</text>
                  <text x="272" y="68">(Normal</text>
                  <text x="324" y="68">reqs</text>
                  <text x="364" y="68">over</text>
                  <text x="440" y="68">authenticated</text>
                  <text x="532" y="68">channel)</text>
                  <text x="288" y="100">Search(Bob)</text>
                  <text x="396" y="116">Response{Head:</text>
                  <text x="492" y="116">6c063bb,</text>
                  <text x="548" y="116">...}</text>
                  <text x="52" y="196">(OOB</text>
                  <text x="96" y="196">check</text>
                  <text x="140" y="196">with</text>
                  <text x="184" y="196">peer)</text>
                  <text x="284" y="196">(OOB</text>
                  <text x="328" y="196">check</text>
                  <text x="372" y="196">over</text>
                  <text x="432" y="196">anonymous</text>
                  <text x="508" y="196">channel)</text>
                  <text x="152" y="228">DistinguishedHead</text>
                  <text x="312" y="228">DistinguishedHead</text>
                  <text x="48" y="244">6c063bb</text>
                  <text x="536" y="244">6c063bb</text>
                  <text x="288" y="276">Search(Bob)</text>
                  <text x="512" y="276">X</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
Alice                      Bob                          Transparency Log
|                           |                                          |
|                           | (Normal reqs over authenticated channel) |
|                           |                                          |
|                           | Search(Bob) ---------------------------->|
|                           |<----------- Response{Head: 6c063bb, ...} |
|                           |                                          |
|                           |                                          |
|                           |                                          |
|                           |                                          |
|   (OOB check with peer)   |    (OOB check over anonymous channel)    |
|                           |                                          |
|<------- DistinguishedHead | DistinguishedHead ~~~~~~~~~~~~~~~~~~~~~> |
| 6c063bb ----------------->| <~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 6c063bb |
|                           |                                          |
|                           | Search(Bob) ~~~~~~~~~~~~~~~~~~~> X       |
|                           |                                          |
]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
    <section anchor="deployment-modes">
      <name>Deployment Modes</name>
      <t>In the interest of satisfying the widest range of use-cases possible, three
different modes for deploying a transparency log are supported. Each mode has
slightly different requirements and efficiency considerations for both the
transparency log and the end-user.</t>
      <t><strong>Third-Party Management</strong> and <strong>Third-Party Auditing</strong> are two deployment modes
that require the transparency log to delegate part of its operation
to a third party. Users are able to run more efficiently as
long as they can assume that the transparency log and the third party won't
collude to trick them into accepting malicious results.</t>
      <t>With both third-party modes, all requests from end-users are initially routed to
the transparency log and the log coordinates with the third party
itself. End-users never contact the third party directly, although they will
need a signature public key from the third party to verify its assertions.</t>
      <t>With Third-Party Management, the third party performs the majority of the work
of actually storing and operating the service, and the transparency log only
signs new entries as they're added. With Third-Party Auditing, the transparency
log performs the majority of the work of storing and operating the service, only
obtaining signatures from a third-party auditor at regular intervals
asserting that the tree has been constructed correctly.</t>
      <t>To reduce the probability of collusion between the transparency log and the
third party, a transparency log can have two or more independent third parties
coordinate as one and produce threshold signatures. In this scenario, the
threshold for a valid signature <bcp14>MUST</bcp14> be at least a majority of the third
parties, to prevent different subsets from authenticating forked views.</t>
      <t><strong>Contact Monitoring</strong>, on the other hand, supports a single-party deployment
with no third party. The cost of this is that, when a user looks up a version of
a label that was inserted very recently, the user may need to retain some
additional state and monitor the label until it is included in a <em>distinguished
log entry</em> (defined in <xref target="PROTO"/>). If a user
looks up many label-version pairs that were inserted very recently, monitoring
may become relatively expensive.</t>
      <t>Additionally, applications that rely on a transparency log deployed in Contact
Monitoring mode <bcp14>MUST</bcp14> regularly attempt to detect forks through anonymous
communication with the transparency log or peer-to-peer communication, as
described in <xref target="detecting-forks"/>.</t>
      <t>Applications that rely on a transparency log deployed in either of the
third-party modes <bcp14>SHOULD</bcp14> allow users to enable a "Contact Monitoring Mode". This
mode, which affects only the individual client's behavior, would cause the
client to behave as if its transparency log was deployed in Contact Monitoring
mode. As such, it would start retaining state about previously looked-up labels
and regularly engaging in out-of-band communication. Enabling this
higher security mode allows users to double check that the third party is not
colluding with the transparency log.</t>
      <section anchor="contact-monitoring">
        <name>Contact Monitoring</name>
        <t>With the Contact Monitoring deployment mode, the monitoring burden is split
between both the owner of a label and those that look up the label. Stated as
simply as possible, the monitoring obligations of each party are:</t>
        <ol spacing="normal" type="1"><li>
            <t>On a regular basis, the label owner verifies that the most recent version of
their label has not changed unexpectedly.</t>
          </li>
          <li>
            <t>When a user that looked up a label sees that it was inserted very recently,
they check back later to see that the label-version pair they observed was
not removed before it could be detected by the label owner.</t>
          </li>
        </ol>
        <t>This guarantees that if a malicious value for a label is added to the log, then
either it is detected by the label owner, or if it is removed/obscured from the
log before the label owner can detect it, then any users that observed it will
detect its removal.</t>
        <figure anchor="contact-monitoring-fig">
          <name>Contact Monitoring. Alice searches for Bob's label. One day later, Alice verifies the label-version pair she observed remained in transparency log. Another day later, Bob comes online and monitors his own label. Note that Alice does not need to wait on Bob to make his Monitor request before making hers.</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="584" viewBox="0 0 584 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,256" fill="none" stroke="black"/>
                <path d="M 296,48 L 296,256" fill="none" stroke="black"/>
                <path d="M 576,48 L 576,256" fill="none" stroke="black"/>
                <path d="M 120,64 L 288,64" fill="none" stroke="black"/>
                <path d="M 16,80 L 120,80" fill="none" stroke="black"/>
                <path d="M 128,144 L 288,144" fill="none" stroke="black"/>
                <path d="M 16,160 L 112,160" fill="none" stroke="black"/>
                <path d="M 304,224 L 456,224" fill="none" stroke="black"/>
                <path d="M 480,240 L 568,240" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="576,240 564,234.4 564,245.6" fill="black" transform="rotate(0,568,240)"/>
                <polygon class="arrowhead" points="312,224 300,218.4 300,229.6" fill="black" transform="rotate(180,304,224)"/>
                <polygon class="arrowhead" points="296,144 284,138.4 284,149.6" fill="black" transform="rotate(0,288,144)"/>
                <polygon class="arrowhead" points="296,64 284,58.4 284,69.6" fill="black" transform="rotate(0,288,64)"/>
                <polygon class="arrowhead" points="24,160 12,154.4 12,165.6" fill="black" transform="rotate(180,16,160)"/>
                <polygon class="arrowhead" points="24,80 12,74.4 12,85.6" fill="black" transform="rotate(180,16,80)"/>
                <g class="text">
                  <text x="24" y="36">Alice</text>
                  <text x="284" y="36">Transparency</text>
                  <text x="352" y="36">Log</text>
                  <text x="568" y="36">Bob</text>
                  <text x="64" y="68">Search(Bob)</text>
                  <text x="208" y="84">SearchResponse(...)</text>
                  <text x="108" y="116">(1</text>
                  <text x="136" y="116">day</text>
                  <text x="180" y="116">later)</text>
                  <text x="68" y="148">Monitor(Bob)</text>
                  <text x="204" y="164">MonitorResponse(...)</text>
                  <text x="108" y="196">(1</text>
                  <text x="136" y="196">day</text>
                  <text x="180" y="196">later)</text>
                  <text x="516" y="228">Monitor(Bob)</text>
                  <text x="388" y="244">MonitorResponse(...)</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
Alice                        Transparency Log                        Bob
|                                   |                                  |
| Search(Bob) --------------------->|                                  |
|<------------- SearchResponse(...) |                                  |
|                                   |                                  |
|           (1 day later)           |                                  |
|                                   |                                  |
| Monitor(Bob) -------------------->|                                  |
|<------------ MonitorResponse(...) |                                  |
|                                   |                                  |
|           (1 day later)           |                                  |
|                                   |                                  |
|                                   |<------------------- Monitor(Bob) |
|                                   | MonitorResponse(...) ----------->|
|                                   |                                  |
]]></artwork>
          </artset>
        </figure>
        <t>Importantly, Contact Monitoring impacts how the server is able to enforce access
control on Monitor queries. While Search and Update queries can enforce access
control on a "point in time" basis, where a user is allowed to execute the query
at one point in time but maybe not the next, Monitor queries <bcp14>MUST</bcp14> have
<em>accretive</em> access control. This is because, if a user is allowed to execute a
Search or Update query for a label, the user may then need to issue at least one
Monitor query for the label some time in the future. These Monitor queries <bcp14>MUST</bcp14>
be permitted, regardless of whether or not the user is still permitted to
execute such Search or Update queries.</t>
      </section>
      <section anchor="third-party-auditing">
        <name>Third-Party Auditing</name>
        <t>With the Third-Party Auditing deployment mode, the transparency log obtains
signatures from a third-party auditor attesting (at minimum) to the fact that
the tree has been constructed correctly. These signatures are provided to users
as part of the responses for their queries.</t>
        <t>When running synchronously, the auditor can easily become a bottleneck for the
transparency log. It's generally expected that third-party auditors run
asynchronously, downloading and authenticating a log's contents in the
background. As a result, signatures from the auditor may lag behind the view
presented by the transparency log. The maximum amount of time that the auditor
may lag behind the transparency log without its signature being rejected by
users is set in the transparency log's configuration.</t>
        <figure anchor="auditing-fig">
          <name>Third-Party Auditing. A recent signature from the auditor is provided to users. The auditor is updated on changes to the tree in the background.</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="584" viewBox="0 0 584 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,192" fill="none" stroke="black"/>
                <path d="M 336,48 L 336,192" fill="none" stroke="black"/>
                <path d="M 576,48 L 576,192" fill="none" stroke="black"/>
                <path d="M 176,64 L 328,64" fill="none" stroke="black"/>
                <path d="M 160,80 L 328,80" fill="none" stroke="black"/>
                <path d="M 176,96 L 328,96" fill="none" stroke="black"/>
                <path d="M 24,110 L 64,110" fill="none" stroke="black"/>
                <path d="M 24,114 L 64,114" fill="none" stroke="black"/>
                <path d="M 480,160 L 568,160" fill="none" stroke="black"/>
                <path d="M 344,176 L 432,176" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="576,160 564,154.4 564,165.6" fill="black" transform="rotate(0,568,160)"/>
                <polygon class="arrowhead" points="352,176 340,170.4 340,181.6" fill="black" transform="rotate(180,344,176)"/>
                <polygon class="arrowhead" points="336,96 324,90.4 324,101.6" fill="black" transform="rotate(0,328,96)"/>
                <polygon class="arrowhead" points="336,80 324,74.4 324,85.6" fill="black" transform="rotate(0,328,80)"/>
                <polygon class="arrowhead" points="336,64 324,58.4 324,69.6" fill="black" transform="rotate(0,328,64)"/>
                <polygon class="arrowhead" points="32,112 20,106.4 20,117.6" fill="black" transform="rotate(180,24,112)"/>
                <g class="text">
                  <text x="20" y="36">Many</text>
                  <text x="64" y="36">Users</text>
                  <text x="324" y="36">Transparency</text>
                  <text x="392" y="36">Log</text>
                  <text x="552" y="36">Auditor</text>
                  <text x="72" y="68">Update(Alice,</text>
                  <text x="148" y="68">...)</text>
                  <text x="64" y="84">Update(Bob,</text>
                  <text x="132" y="84">...)</text>
                  <text x="72" y="100">Update(Carol,</text>
                  <text x="148" y="100">...)</text>
                  <text x="156" y="116">Response{AuditorSig:</text>
                  <text x="264" y="116">66bf,</text>
                  <text x="308" y="116">...}</text>
                  <text x="408" y="164">[AuditorUpdate]</text>
                  <text x="504" y="180">AuditorTreeHead</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
Many Users                        Transparency Log               Auditor
|                                        |                             |
| Update(Alice, ...) ------------------->|                             |
| Update(Bob, ...) --------------------->|                             |
| Update(Carol, ...) ------------------->|                             |
| <===== Response{AuditorSig: 66bf, ...} |                             |
|                                        |                             |
|                                        |                             |
|                                        | [AuditorUpdate] ----------->|
|                                        |<----------- AuditorTreeHead |
|                                        |                             |
]]></artwork>
          </artset>
        </figure>
        <t>Given the long-lived nature of transparency logs and the potentially short-lived
nature of third-party auditing arrangements, KT allows third-party auditors to
start auditing a log at any arbitrary point. This allows a new third-party
auditor to start up without ingesting the transparency log's entire
history. The point at which an auditor started auditing is provided to users in
the transparency log's configuration. When verifying query responses, users
verify that the auditor started auditing at or before the point necessary for
the query to be secure.</t>
      </section>
      <section anchor="third-party-management">
        <name>Third-Party Management</name>
        <t>With the Third-Party Management deployment mode, a third party is responsible
for the majority of the work of storing and operating the log. The transparency
log serves mainly to enforce access control and authenticate the addition of new
entries to the log. All user queries are initially sent by users directly to the
transparency log, and the transparency log proxies them to the third-party
manager if they pass access control.</t>
        <figure anchor="manager-fig">
          <name>Third-Party Management. Valid requests are proxied by the transparency log to the manager. Invalid requests are blocked.</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="520" viewBox="0 0 520 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,192" fill="none" stroke="black"/>
                <path d="M 248,48 L 248,192" fill="none" stroke="black"/>
                <path d="M 512,48 L 512,192" fill="none" stroke="black"/>
                <path d="M 136,64 L 240,64" fill="none" stroke="black"/>
                <path d="M 264,64 L 504,64" fill="none" stroke="black"/>
                <path d="M 16,80 L 232,80" fill="none" stroke="black"/>
                <path d="M 256,80 L 336,80" fill="none" stroke="black"/>
                <path d="M 176,112 L 240,112" fill="none" stroke="black"/>
                <path d="M 264,112 L 504,112" fill="none" stroke="black"/>
                <path d="M 16,128 L 232,128" fill="none" stroke="black"/>
                <path d="M 256,128 L 336,128" fill="none" stroke="black"/>
                <path d="M 128,160 L 208,160" fill="none" stroke="black"/>
                <path d="M 160,176 L 208,176" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="512,112 500,106.4 500,117.6" fill="black" transform="rotate(0,504,112)"/>
                <polygon class="arrowhead" points="512,64 500,58.4 500,69.6" fill="black" transform="rotate(0,504,64)"/>
                <polygon class="arrowhead" points="264,128 252,122.4 252,133.6" fill="black" transform="rotate(180,256,128)"/>
                <polygon class="arrowhead" points="264,80 252,74.4 252,85.6" fill="black" transform="rotate(180,256,80)"/>
                <polygon class="arrowhead" points="248,112 236,106.4 236,117.6" fill="black" transform="rotate(0,240,112)"/>
                <polygon class="arrowhead" points="248,64 236,58.4 236,69.6" fill="black" transform="rotate(0,240,64)"/>
                <polygon class="arrowhead" points="216,176 204,170.4 204,181.6" fill="black" transform="rotate(0,208,176)"/>
                <polygon class="arrowhead" points="216,160 204,154.4 204,165.6" fill="black" transform="rotate(0,208,160)"/>
                <polygon class="arrowhead" points="24,128 12,122.4 12,133.6" fill="black" transform="rotate(180,16,128)"/>
                <polygon class="arrowhead" points="24,80 12,74.4 12,85.6" fill="black" transform="rotate(180,16,80)"/>
                <g class="text">
                  <text x="24" y="36">Alice</text>
                  <text x="236" y="36">Transparency</text>
                  <text x="304" y="36">Log</text>
                  <text x="488" y="36">Manager</text>
                  <text x="72" y="68">Search(Alice)</text>
                  <text x="424" y="84">SearchResponse(...)</text>
                  <text x="72" y="116">Update(Alice,</text>
                  <text x="148" y="116">...)</text>
                  <text x="424" y="132">UpdateResponse(...)</text>
                  <text x="68" y="164">Search(Fred)</text>
                  <text x="224" y="164">X</text>
                  <text x="64" y="180">Update(Bob,</text>
                  <text x="132" y="180">...)</text>
                  <text x="224" y="180">X</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
Alice                  Transparency Log                  Manager
|                             |                                |
| Search(Alice) ------------->| ------------------------------>|
|<--------------------------- |<---------- SearchResponse(...) |
|                             |                                |
| Update(Alice, ...) -------->| ------------------------------>|
|<--------------------------- |<---------- UpdateResponse(...) |
|                             |                                |
| Search(Fred) ----------> X  |                                |
| Update(Bob, ...) ------> X  |                                |
|                             |                                |
]]></artwork>
          </artset>
        </figure>
        <t>The security of the Third-Party Management deployment mode comes from an
assumption that the transparency log and the third-party manager do not collude
to behave maliciously. If the third-party manager behaves honestly, then any
improper modifications to a label's value that were requested by the
transparency log will be properly published such that the label owner will
detect them when monitoring. If the transparency log behaves honestly, the
third-party manager will be unable to add any new unauthorized versions of a
label such that a user will accept them, or remove any authorized version of a
label without the label owner detecting it.</t>
        <t>The transparency log <bcp14>MUST</bcp14> implement some mechanism to detect when forks are
presented by the third-party manager. Additionally, the transparency log <bcp14>MUST</bcp14>
implement some mechanism to prevent the same version of a label from being
submitted to the third-party manager multiple times with different associated
values.</t>
      </section>
    </section>
    <section anchor="combining-logs">
      <name>Combining Logs</name>
      <t>There are many cases where it makes sense to operate multiple cooperating
transparency log instances, for example:</t>
      <ul spacing="normal">
        <li>
          <t>A service provider may wish to gradually migrate to a transparency log that
uses different cryptographic keys, a different cipher suite, or different
deployment mode.</t>
        </li>
        <li>
          <t>A service provider may operate multiple logs to improve their ability to scale
or provide higher availability.</t>
        </li>
        <li>
          <t>A federated system may allow each participant in the federation to operate
their own transparency log for their own users.</t>
        </li>
      </ul>
      <t>Client implementations <bcp14>SHOULD</bcp14> generally be prepared to interact with multiple
independent transparency logs. When multiple transparency logs are used as part
of one application, all users <bcp14>MUST</bcp14> have a consistent policy for executing
Search, Update, and Monitor queries against the logs in a way that maintains the
high-level security guarantees of KT:</t>
      <ul spacing="normal">
        <li>
          <t>If all transparency logs behave honestly, then users observe a globally
consistent view of the data associated with each label.</t>
        </li>
        <li>
          <t>If any transparency log behaves dishonestly such that the prior guarantee is
not met, this will be detected in a timely manner by background monitoring or
out-of-band communication.</t>
        </li>
      </ul>
      <section anchor="gradual-migration">
        <name>Gradual Migration</name>
        <t>In the case of gradually migrating from an old transparency log to a new one,
this policy may look like:</t>
        <ol spacing="normal" type="1"><li>
            <t>Search queries should be executed against the old transparency log first, and
then against the new transparency log only if the most recent version of a
label in the old transparency log is a special application-defined
'tombstone' entry.</t>
          </li>
          <li>
            <t>Update queries should only be executed against the new transparency log, with
the exception of adding a tombstone entry for the label to the old
transparency log if one hasn't been added already.</t>
          </li>
          <li>
            <t>Both transparency logs should be monitored as they would be if they were run
individually. Once the migration has completed and the old transparency log
has stopped accepting modifications, the old transparency log <bcp14>MUST</bcp14> stay
operational long enough for all users to complete their monitoring of it
(keeping in mind that some users may be offline for a significant amount of
time).</t>
          </li>
        </ol>
        <t>Placing a tombstone entry for each label in the old transparency log gives users
a clear indication as to which transparency log contains the most recent version
of a label. Importantly, it prevents users from incorrectly accepting a stale
version of a label if the new transparency log is unreachable.</t>
      </section>
      <section anchor="immediate-migration">
        <name>Immediate Migration</name>
        <t>In some situations, the service provider may instead choose to stop adding new
entries to a transparency log immediately and provide a new transparency log
that is pre-populated with the most recent versions of all labels. In this case,
the policy may look like:</t>
        <ol spacing="normal" type="1"><li>
            <t>Search queries must be executed against the new transparency log.</t>
          </li>
          <li>
            <t>Update queries must be executed against the new transparency log.</t>
          </li>
          <li>
            <t>The final tree size and root hash of the old transparency log is provided to
users over a trustworthy channel. Users issue their final Monitor queries to
complete monitoring up to this point. Label owners initiate monitoring state
for the new transparency log by processing an Update for the migrated
versions of their labels and verifying that the migration was done correctly.
From then on, users will monitor only the new transparency log.</t>
          </li>
        </ol>
        <t>The final tree size and root hash of the prior transparency log need to be
distributed to users in a way that guarantees all users have a globally
consistent view. This can be done by storing them in a well-known label of the
new transparency log. Users <bcp14>MUST</bcp14> process this well-known label as if they own
it, so that they continue to monitor it for unexpected changes for the duration
of the migration period. Alternatively, the final tree size and root hash may be
distributed with the application's code distribution mechanism.</t>
      </section>
      <section anchor="federation">
        <name>Federation</name>
        <t>In a federated application, many servers that are owned and operated by
different entities will cooperate to provide a single end-to-end encrypted
communication service. Each entity in a federated system provides its own
infrastructure (in particular, a transparency log) to serve the users that rely
on it. Given this, there <bcp14>MUST</bcp14> be a consistent policy for directing KT requests
to the correct transparency log. Typically in such a system, the end-user
identity directly specifies which entity requests should be directed to. For
example, with an email end-user identity like <tt>alice@example.com</tt>, the
controlling entity is <tt>example.com</tt>.</t>
        <t>A controlling entity like <tt>example.com</tt> <bcp14>MAY</bcp14> act as an anonymizing proxy for its
users when they query transparency logs run by other entities (in the manner of
<xref target="RFC9458"/>), but <bcp14>SHOULD NOT</bcp14> attempt to 'mirror' or combine other transparency
logs with its own.</t>
      </section>
    </section>
    <section anchor="pruning">
      <name>Pruning</name>
      <t>As part of the core infrastructure of an end-to-end encrypted communication
service, transparency logs are required to operate seamlessly for several years.
This presents a problem for general append-only logs, as even moderate usage can
cause the log to grow to an unmanageable size in that time frame. This issue is
further compounded by the fact that a substantial portion of the entries added
to a log may be fake, having been added solely for the purpose of obscuring
short-term update rates (discussed in <xref target="privacy-guarantees"/>). Given this,
transparency logs need to be able manage their footprint by pruning data which
is no longer required by the communication service.</t>
      <t>Broadly speaking, a transparency log's database will contain two types of data:</t>
      <ol spacing="normal" type="1"><li>
          <t>Serialized user data (the values corresponding to labels in the log), and</t>
        </li>
        <li>
          <t>Cryptographic data, such as pre-computed portions of hash trees or commitment
openings.</t>
        </li>
      </ol>
      <t>The first type, serialized user data, can be pruned by removing any entries that
have either expired, or to which the service operator's access control policy
would never permit access. A version of a label expires when it is no longer
possible to produce a valid search proof for the label-version pair, which
happens when all of the necessary log entries have passed their <strong>maximum
lifetime</strong> (as defined in <xref target="PROTO"/>).</t>
      <t>Notably, the greatest version of a label is the only version that never expires
through the maximum lifetime mechanism. However, service operators may define
arbitrary access control policies that permanently block access to the greatest
(or any other versions) of a label. The values corresponding to these
label-version pairs may also be deleted without consideration to the rest of the
protocol.</t>
      <t>The second type of data, cryptographic data, can also be pruned, but only after
considering which parts are no longer required by the protocol for producing
proofs. For example, even though a particular version of a label may have been
deleted, the corresponding VRF output and commitment may still need to exist in
the latest version of the transparency log's prefix tree to produce valid search
proofs for other versions of the label. The exact mechanism for determining
which data is safe to delete will depend on the protocol and implementation.</t>
      <t>The distinction between user data and cryptographic data provides a valuable
separation of concerns since <xref target="PROTO"/> does not provide a way for a service
operator to convey its access control policy to a transparency log. That is, it
allows the pruning of user data to be done entirely by application-defined code,
while the pruning of cryptographic data can be done entirely by KT-specific code
as a subsequent operation.</t>
    </section>
    <section anchor="security-guarantees">
      <name>Security Guarantees</name>
      <t>A user that correctly verifies a proof from the transparency log and does any
required monitoring afterwards receives a guarantee that the transparency log
operator executed the operation correctly, and in a way that's globally
consistent with what it has shown all other users. That is, when a user searches
for a label, they're guaranteed that the result they receive represents the same
result that any other user searching for the same label at roughly the same time
would've seen. When a user modifies a label, they're guaranteed that other users
will see the modification within a bounded amount of time, or will
themselves permanently enter an invalid state as discussed below.</t>
      <t>If the transparency log does not execute an operation correctly, then either:</t>
      <ol spacing="normal" type="1"><li>
          <t>The user will detect the error immediately and reject the proof, or</t>
        </li>
        <li>
          <t>The user will permanently enter an invalid state.</t>
        </li>
      </ol>
      <t>Depending on the exact reason that the user enters an invalid state, it will
either be detected by background monitoring or by the mechanisms described in
<xref target="detecting-forks"/>. Importantly, this means that users must stay online for
a bounded amount of time after entering an invalid state for it to be
successfully detected.</t>
      <t>Alternatively, instead of executing a lookup incorrectly, the transparency log
can attempt to prevent a user from learning about more recent states of the log.
This would allow the log to continue executing queries correctly, but on
stale versions of data. To prevent this, applications configure an upper
bound on how stale a query response can be without being rejected.</t>
      <t>The exact caveats of the above guarantees depend naturally on the security of
the underlying cryptographic primitives and also the deployment mode that the
transparency log relies on:</t>
      <ul spacing="normal">
        <li>
          <t>Third-Party Management and Third-Party Auditing require an assumption that the
transparency log and the third-party manager or auditor do not collude
to trick users into accepting malicious results.</t>
        </li>
        <li>
          <t>Contact Monitoring requires an assumption that the user that owns a label and
all users that look up the label do the necessary monitoring afterwards.</t>
        </li>
      </ul>
      <t>In short, assuming that the underlying cryptographic primitives used are secure,
any deployment-specific assumptions hold (such as non-collusion), and that user
devices don't go permanently offline, then malicious behavior by the
transparency log is always detected within a bounded amount of time. The
parameters that determine the maximum amount of time before malicious behavior
is detected are as follows:</t>
      <ul spacing="normal">
        <li>
          <t>The configured maximum amount of time by which a query response can be stale.</t>
        </li>
        <li>
          <t>The configured Reasonable Monitoring Window (described in
<xref section="7.1" sectionFormat="of" target="PROTO"/>), weighed against how frequently users execute
background monitoring in practice.</t>
        </li>
        <li>
          <t>For logs that use the Contact Monitoring deployment mode: how frequently users
engage in anonymous communication with the transparency log, or peer-to-peer
communication with other users.</t>
        </li>
        <li>
          <t>For logs that use the Third-Party Auditing deployment mode: the configured
maximum acceptable lag for an auditor.</t>
        </li>
        <li>
          <t>For logs that use the Third-Party Management deployment mode: the amount of
lag, or potential inefficacy, of the service operator's approach to detecting
forks.</t>
        </li>
      </ul>
      <section anchor="state-loss">
        <name>State Loss</name>
        <t>The security of KT often depends on the ability of users to maintain robust
local state. Users that lose their state in a Contact Monitoring or Third-Party
Auditing deployment will have a correspondingly reduced ability to detect if
they were shown a fork, or if the transparency log later obscured data that they
consumed.</t>
        <t>In a Contact Monitoring deployment mode, this can happen when a user loses their
state after consuming a version of a label that was created either within the
Reasonable Monitoring Window, or within a portion of the log that was
insufficiently gossipped. In a Third-Party Auditing deployment mode, this can
happen when a user loses their state after consuming a version of a label that
was created within the auditor's maximum acceptable lag.</t>
        <t>Applications should consider the nature of possible state loss in their clients
when configuring a transparency log and <bcp14>MUST</bcp14> ensure that the relevant protocol
parameters are set in a way that appropriately mitigates this risk.
For example, in a Contact Monitoring deployment, the Reasonable Monitoring
Window and the duration between out-of-band communication attempts <bcp14>SHOULD</bcp14> be
much less than the typical time between state loss events. Similarly, in a
Third-Party Auditing deployment, the maximum acceptable lag for an auditor
<bcp14>SHOULD</bcp14> be much less than the typical time between state loss events.</t>
        <t>In applications where client state is typically ephemeral (like a web page), or
where state loss could possibly be triggered adversarially, a Third-Party
Management deployment mode is <bcp14>RECOMMENDED</bcp14>. Alternatively, applications could
also consider implementing a policy of not consuming label-version pairs that
were inserted too recently. Once a label-version pair is outside of the
Reasonable Monitoring Window in a Contact Monitoring deployment, or beyond the
maximum acceptable auditor lag in a Third-Party Auditing deployment, the risks
associated with state loss are often already sufficiently mitigated.</t>
      </section>
      <section anchor="privacy-guarantees">
        <name>Privacy Guarantees</name>
        <t>For applications deploying KT, service operators expect to be able to control
when sensitive information is revealed. In particular, a service operator can
often only reveal that a user is a member of their service, and information
about that user's account, to that user's friends or contacts.</t>
        <t>KT only allows users to learn whether or not a label exists in the
transparency log if the user obtains a valid search proof for that label.
Similarly, KT only allows users to learn about the value of a label if
the user obtains a valid search proof for that exact version of the label.</t>
        <t>When a user was previously allowed to lookup or change a label's value but no
longer is, KT prevents the user from learning whether or not the label's value
has changed since the user's access was revoked. This is true even in Contact
Monitoring mode, where users are still permitted to perform monitoring after
their access to perform other queries has been revoked.</t>
        <t>Applications determine the privacy of data in KT by
relying on these properties when they enforce access control policies on the
queries issued by users, as discussed in <xref target="protocol-overview"/>. For example if
two users aren't friends, an application can block these users from searching
for each other's labels. This prevents both users from learning about
each other's existence. If the users were previously friends but no longer are,
the application can prevent the users from searching for each other's labels and
learning the contents of any subsequent account updates.</t>
        <t>Service operators also expect to be able to control sensitive population-level
metrics about their users. These metrics include the size of their user base, the
frequency with which new users join, and the frequency with which existing users
update their labels.</t>
        <t>KT allows a service operator to obscure the size of its user base by batch
inserting a large number of fake label-version pairs when a transparency log is
first initialized. Similarly, KT also allows a service operator to obscure the
rate at which "real" changes are made to the transparency log by padding "real"
changes with the insertion of other fake label-version pairs, such that it
creates the outside appearance of a constant baseline rate of insertions.</t>
        <section anchor="leakage-to-third-party">
          <name>Leakage to Third-Party</name>
          <t>In the event that a third-party auditor or manager is used, there's additional
information leaked to the third-party that's not visible to outsiders.</t>
          <t>In the case of a third-party auditor, the auditor is able to learn the total
number of distinct changes to the log. It is also able to learn the order and
approximate timing with which each change was made. However, auditors are not
able to learn the plaintext of any labels or values. This is because labels
are masked with a VRF, and values are only provided to auditors as commitments.
They are also not able to distinguish between whether a change represents a label
being created for the first time or being updated, or whether a change
represents a "real" change from an end-user or a "fake" padding change.</t>
          <t>In the case of a third-party manager, the manager generally learns everything
that the service operator would know. This includes the total set of plaintext
labels and values and their modification history. It also includes traffic
patterns, such as how often a specific label is looked up.</t>
        </section>
      </section>
    </section>
    <section anchor="privacy-law-considerations">
      <name>Privacy Law Considerations</name>
      <t>Consumer privacy laws often provide a <em>right to erasure</em>. This means that when a
consumer requests that a service provider delete their personal information, the
service provider is legally obligated to do so. This may seem to be incompatible
with the description of KT in <xref target="introduction"/> as an "append-only log". Once an
entry is added to a transparency log, it indeed can not be removed. The
important caveat here is that user data is not directly stored in the
append-only log. Instead, it primarily contains privacy-preserving VRF outputs
and cryptographic commitments.</t>
      <t>The value corresponding to a label is typically some serialized user account
data, like a public key or internal identifier. KT uses cryptographic
commitments to ensure that users interacting with a transparency log are unable
to learn anything about a label's value until the transparency log explicitly
provides the commitment's opening. A transparency log responding to an erasure
request can delete the commitment opening and the associated data. This can be
done immediately and permanently prevents recovery of the associated value.</t>
      <t>Labels themselves are typically serialized end-user identifiers, like a username
or email address. All labels are processed through a Verifiable Random Function,
or VRF <xref target="RFC9381"/>, which deterministically maps each label to a fixed-length
pseudorandom value. The set of all labels stored in a transparency log is
committed to by a prefix tree, and each version of the prefix tree is committed
to by a log tree.</t>
      <t>While all the VRF outputs corresponding to labels affected by an erasure request
can be deleted from the most recent version of the prefix tree immediately,
previous versions of the prefix tree will still contain the VRF outputs and will
still be needed by the protocol for a bounded amount of time. This bound is
defined by the log entry maximum lifetime discussed in <xref target="PROTO"/>. As such, the
VRF outputs can only be fully purged from the transparency log once all log
entries that contain them have passed their maximum lifetime. After this point,
they are no longer necessary for the protocol to operate.</t>
    </section>
    <section anchor="implementation-guidance">
      <name>Implementation Guidance</name>
      <t>Fundamentally, KT can be thought of as guaranteeing that all the users of a
service agree on the contents of a key-value database (noting that this document
refers to these keys as "labels"). It takes special care to turn the guarantee
that all users agree on a set of labels and values into a guarantee that the
mapping between end-users and their public keys is authentic. Critically, to
authenticate an end-user identity, it must be both <em>unique</em> and <em>user-visible</em>.
However, what exactly constitutes a unique and user-visible identifier varies
greatly from application to application.</t>
      <t>Consider, for example, a communication service where users are uniquely
identified by a fixed username, but KT has been deployed using each user's
internal UUID as their label. While the UUID might be unique, it is not
necessarily user-visible. When a user attempts to lookup a contact by username,
the service operator translates the username into a user UUID under the hood. If
this mapping (from username to UUID) is unauthenticated, the service operator
could manipulate it to eavesdrop on conversations by returning the UUID for an
account that it controls. From a security perspective, this would be equivalent
to not using KT at all.</t>
      <t>However, that's not to say that the use of internal UUIDs in KT is never
appropriate. Many applications don't have a concept of a fixed explicit
identifier, like a username, and instead rely on their UI (underpinned
internally by a user's ID) to indicate to users whether a conversation is with a
new person or someone they've previously contacted. The fact that the UI behaves
this way makes the user's ID a user-visible identifier even if a user may not be
able to actually see it written out. An example of this kind of application
would be Slack.</t>
      <t>A <strong>primary end-user identity</strong> is one that is unique, user-visible, and unable
to change. (Or equivalently, if it changes, it appears in the application UI as
a new conversation with a new user.) An example of this type of identifier would
be an email address on an email service. A primary end-user identity <bcp14>SHOULD</bcp14>
always be a label in KT, with the end-user's public keys and other account
information as the associated value.</t>
      <t>A <strong>secondary end-user identity</strong> is one that is unique, user-visible, and able
to change without being interpreted as a different account due to its
association with a primary end-user identity. These identities are used solely
for initial user discovery, during which they're converted into a primary
end-user identity (like a UUID) that's used by the application to identify the
end-user from then on. An example of this type of identity would be a username,
since users can often change their username without disrupting existing
communications. A secondary end-user identity <bcp14>SHOULD</bcp14> be a label in KT with the
primary end-user identity as the associated value, such that it can be used to
authenticate the user discovery process.</t>
      <t>While likely helpful to most common applications, the distinction between
handling primary and secondary end-user identities is not a guaranteed rule.
Applications must be careful to ensure they fully capture the semantics of
identity in their application with the labels and values they store in KT.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="PROTO">
          <front>
            <title>Key Transparency Protocol</title>
            <author fullname="Brendan McMillion" initials="B." surname="McMillion">
         </author>
            <author fullname="Felix Linker" initials="F." surname="Linker">
         </author>
            <date day="19" month="October" year="2025"/>
            <abstract>
              <t>   While there are several established protocols for end-to-end
   encryption, relatively little attention has been given to securely
   distributing the end-user public keys for such encryption.  As a
   result, these protocols are often still vulnerable to eavesdropping
   by active attackers.  Key Transparency is a protocol for distributing
   sensitive cryptographic information, such as public keys, in a way
   that reliably either prevents interference or detects that it
   occurred in a timely manner.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-keytrans-protocol-03"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="sealed-sender" target="https://signal.org/blog/sealed-sender/">
          <front>
            <title>Technology preview: Sealed sender for Signal</title>
            <author>
              <organization/>
            </author>
            <date year="2018" month="October" day="29"/>
          </front>
        </reference>
        <reference anchor="RFC6962">
          <front>
            <title>Certificate Transparency</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Kasper" initials="E." surname="Kasper"/>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document describes an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or observed, in a manner that allows anyone to audit certificate authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6962"/>
          <seriesInfo name="DOI" value="10.17487/RFC6962"/>
        </reference>
        <reference anchor="RFC9420">
          <front>
            <title>The Messaging Layer Security (MLS) Protocol</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="B. Beurdouche" initials="B." surname="Beurdouche"/>
            <author fullname="R. Robert" initials="R." surname="Robert"/>
            <author fullname="J. Millican" initials="J." surname="Millican"/>
            <author fullname="E. Omara" initials="E." surname="Omara"/>
            <author fullname="K. Cohn-Gordon" initials="K." surname="Cohn-Gordon"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>Messaging applications are increasingly making use of end-to-end security mechanisms to ensure that messages are only accessible to the communicating endpoints, and not to any servers involved in delivering messages. Establishing keys to provide such protections is challenging for group chat settings, in which more than two clients need to agree on a key but may not be online at the same time. In this document, we specify a key establishment protocol that provides efficient asynchronous group key establishment with forward secrecy (FS) and post-compromise security (PCS) for groups in size ranging from two to thousands.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9420"/>
          <seriesInfo name="DOI" value="10.17487/RFC9420"/>
        </reference>
        <reference anchor="RFC9458">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes Oblivious HTTP, a protocol for forwarding encrypted HTTP messages. Oblivious HTTP allows a client to make multiple requests to an origin server without that server being able to link those requests to the client or to identify the requests as having come from the same client, while placing only limited trust in the nodes used to forward the messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9458"/>
          <seriesInfo name="DOI" value="10.17487/RFC9458"/>
        </reference>
        <reference anchor="RFC9381">
          <front>
            <title>Verifiable Random Functions (VRFs)</title>
            <author fullname="S. Goldberg" initials="S." surname="Goldberg"/>
            <author fullname="L. Reyzin" initials="L." surname="Reyzin"/>
            <author fullname="D. Papadopoulos" initials="D." surname="Papadopoulos"/>
            <author fullname="J. Včelák" initials="J." surname="Včelák"/>
            <date month="August" year="2023"/>
            <abstract>
              <t>A Verifiable Random Function (VRF) is the public key version of a keyed cryptographic hash. Only the holder of the secret key can compute the hash, but anyone with the public key can verify the correctness of the hash. VRFs are useful for preventing enumeration of hash-based data structures. This document specifies VRF constructions based on RSA and elliptic curves that are secure in the cryptographic random oracle model.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9381"/>
          <seriesInfo name="DOI" value="10.17487/RFC9381"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+196XIcx7Xm/3yKutAPAohu0JQ8ss2w5UuRlM0QKeqSkH0d
N26Eq7uq0WVWV7VrAdim6GeZZ5knm/OdJTNraQBawjMTMQiFCHRX5XLy5NmX
5XLpuqIr88fJydf5Ibls0qrdp01erQ/Jk2a9Lbp83fVNfuLWaZdf1c3hcVJU
m9q5rF5X6Y5ezJp00y2LvNss3+WHDiMs0+jV5S9+5dp+tSvatqir7rCnd148
v/zKVf1ulTePXUYjP3brumrzqu3bx0nX9Lm7fpx85mglKS3tbb7um6I7nLib
unl31dT9fmbBJ47mpweyxy5ZJvR70kXfuuu86mmeJDn+fpLI8k7+TNMU1VXy
BzyKz3dpUdLntsF/x3Yv6uYK32Gz9N226/bt44cP8Sjv/zq/sMce4oOHq6a+
afOHNshDvHxVdNt+Ra8zAG+uPAwfClzxIp4rCUhtF00zfv5CRroo6ujNh3cd
zsW225UnzqV9t60bAI7mSpJNX5Zyul8SaLK0Sl6tXxVlSQfI3+cCj5V8uVvv
5Lt/v8LnF+t651xVN7u0IyA8dg4Y4/9KkjZPyzxb0nFnOH8M2KXNVU7bs921
xVWVlgy6VVlfPRy88lBeUby9zNfbqqaHDsm+ya+L/OZx8pYfT+TxhCZP3vKA
J/wmI1zy6S8e/Xr56BfLT3/jnFsul0m6aglA6865y23RJoTg/S6vuiTLN0WV
t0m3zZMub3aFzpZWGd0F+oTeoc0n+7SjP6qWPryuy+sc3+Ill+X7sj7wWPUm
mdwzeipNrvKKBippyYTqueBossvbNr0iRAQEm5SW1/OpLXjudp+vi02hK2v1
jhAQ6n3edPJ52vGX9FlXr+vS0S/XRZa3F8mLLknLtiYEvKYndzUmlTUskqqu
lgTLdt0UexxactUXdM7rPKFtbuubpKudLLQkMOz39P/JrrqadiVXHLsmnNjR
y3i4IFJC8GovBOy7IsvK3LlPkhdV19RZz9B07st8g0Wl1SHx+EMjrAkZV3mS
v19v0+pKgEwf0Ukvu3pJ/9Cv6+aw73D+h7bLd4uku6ldtyU40kb7tku2tIy8
epx8VTRtt6CDI3Cti31ada2emb4qjyvQFMzNdbHOHWCcdoRYN3TteJH7fkVb
A93hAznQN+0WYOjbHP80+ToHLOVQcQRE1uoqWzCO6LiJH5dnbutdDnhnBZ19
seo7XgSNF0+WEmCvWj5oN9gKH7+tAgfQV4B9LmvO0/U2qemlhg7i8rCnr0o6
yA64z+hf5cnqQLC6BiWkTTRt0hMipxlmKprhhnHabbHb00lmBW2VtkAQoMFz
mUMHwOll9U1lw+yStE0qggzBpDksEtr46qAAB97HcxTVcgW859XjLMKWgBir
HOsUtMwIvzfz50Vb43WCOxCICUsYOA3WTB8Sot2kTTbY3CrvbvK8ki0sGEJu
lxOuhwvWg9CUB6xA0Y8pgl473nZdlbwzUF6FRnqVFlXb0akRbyTUyFO6ixnd
3z0GqisFtMcY5/5Y3+TXebOgC0sn7umDoiuNSPCm603EDujfr7eyRDpZPwqe
ceH6dFsiNVfbGFgeCR+0/BHv+mZb0Gi79B2NUHR0/7om3+H+52l7cCCx2KNB
mWBapn21xtVIQB9pd0Qe0/W7i+QSKyoYkNMpASrX0SyDE8DwsgCa+l1FbFQR
gI6t3dMlAgz2TXEN7MYbTCEdgbVeFynfmnp0a+Te8kHQNtP1uu6rjj+tez1T
+QrTETO5yh1tijCHoFFXGJPW5A8Mh0WXGaAS4mZYmspZ09FNKOTp15dndMPL
a6bUhJeEHKuSrgTdgCb/e1802NUskEB/O1BHjJ0MLwltihGwvmrS/VZvteId
nTeTvmzJ2Ehs7CJ5Uh3cLqUBirpvCXuJ0ABJskyuBiNRikdpS4RGyiTobVDh
v/f863XRFrR0PL+i6+6w6HSzkRl5jbi4EVAJVoQMXQtsoJ3TIDhTuRU0SJbz
LSH6AdrhmJwCteWOR4eQAVjg+QaqAWEEwm1lG3yTnB7zmDoEwIKF7/ZdK0SB
OB5YMhFhD5daXiRwuE1T7+RLWTeRZ+KcndA7pRN0FDkkN4LgCSHxO1oMVnti
2EyHThJFWtHwDiCiy1QQPGX/KYEUtBmYTqwdR4m9E3HMvTBxmdBfDeFLydAw
itMmZUF36CkEgQ0TfTfAvQ8f3nz19PPffP7px49YBOMpjVVU67LPsFziqBt6
scDCPBkDOuQQHw0GfDENNLYG4QUinKxj5iqHraRTYEZc5gFBLZfXYs6AYYmR
YJZAfBjpSJloOxqugKhCN4Gks4wpnC1ESB69SyvKr+lJRYBdkHoi8k3bFpkC
0puD2AOSpzcLJIXARUjGF6YlZiw0fowNmGLCfB1dlp5kR3rTttjmuSzFQeJ5
CpJRCcHA8T+DqFnw33Lu0GKg0rTJyavv3l6eLOTf5JvX/Pub5//x3Ys3z5/h
97d/fPLypf/F6RNv//j6u5fPwm/hzaevX716/s0zeZk+TQYfuZNXT/5yIoLm
yetvL1+8/ubJyxORjmLhGGDGrc9FFCbwMZFpSeiF+LgSAe3Lp9/+r//56JeE
dv9GePfpo0e/IbyTP3796Fe/pD/oqlcyGwNa/sS9dyBYacOErQQn3RcdHeEC
ggOOgwRSEjIInOf/Bcj89+Pkt6v1/tEvv9APsOHBhwazwYcMs+knk5cFiDMf
zUzjoTn4fATp4Xqf/GXwt8E9+vC3vy8JoZLlo1///gtCofPz5yL40j/Jcy/4
Ph1IRm+Fyj0+P3ePkycjsclIoMkJoMNgEJ4W59UViQ188sT0F8l1TY8vSJGC
TFyzyCYSHmT01mT9MAHTJ9wSRpAq7+SYafw2otY0XsS1DjJxC1WIFzYYUsQc
xhMi6CTWGO8RIp/wTBX4Fwl1xR40DLKTwOo73OtneQAIrlnGfycqzNEdJEq7
r2kY4adZcQWkG64ipkp5wXwqYY0TEDFhP+gipHSmt+kqg7F5JD6X4bpfZKAW
3cGOkl74e58bPJul8eFCn0u8BJSZouJFnVNlyQ3rWTQjBH4oHpArDAMUMu3Z
j1k6KXQipqUke4kuoEPw0Pl76IIFpG6IO3lrbHeoqNCApyK3ixrIMqvKA9HM
1RU/fTaYQuBDEwhASFnOaLjVgZcFA0dy8oTWkJ8slOXoex5+hSrXHcti+jCf
CZ/Hw+SJQNMOpKXHymggug33gprBLEIqLBQsjDlSpaJOC+k/LScrZZGNhx+e
20XyVQ28zN+n0M0WKvEaK41HJ62oL4mv5iQGlszy8HexD+hEk+Aw2PhDWvMW
CCMa/oJHBUDPBmaRoKt5Savyw9JYusrklAdbkM5AFGB/xgBWqpW8Vtks3Fbi
yjvSFglZr9Kq+IcAkMmEmTeU3sQ2k0RVlHAWAMvtp+Gl1rbedDfK6jyX75go
Fh2vdiBdvayvPEJADiLp+h9sjpJRiYdBtANyBCtKB/seS7G1rd7bPE4hhMPS
GFNMupOT283WnGqKxyTlD42hCcssBcQwkeCbvlIqpoJXCfjKZkXaP8xKzAuI
vSDedV9mIlut7FtaFnEM4AUNIALPtyZKvr7GQPmNc19BjE5JQOpu1OoK6Z7A
BqVxAfFsUwtbIsWmBDFfilKaxIZMBYBbQzSjC3IebxebPV+wHkrDpxhJhrDr
tq3LTJBGDKFE7TG7W9f7A99hkjziA+Gr9n5fg4cRsJlVtBELDZoMkR/GVLer
s2JDFxhqm3CDi+Q7sYnUJOAV1YxhZqKc5zCPOLHCqMZTEJEhIWig99DqTJSe
04toQzy841XaMoDetCfR2WjldMtJRyMMZ7meoAGFsei6EuSQFku3tdgVeBic
GMrxjSj2qrzKKFNKAMQTUhXYe8HvrXIxNjkQg7ZjnBHsGBgOJ/ihJkFo7ldb
Vov4iKGM0+O0Dtr18jot+xy+hnRF7Mg2XVT0TxceIIQv+GO9hfa8sK+F6DtG
S2Fwg4AuTKJoPBH0dEPG9N+HQ/BnT0vv9zBI04IhBq0OuibGVLoVN7YPgSA+
EOS5BBPE+3zpyrp+RyPxrGwbggRCupu9DKCwNsFUUE3lUPj1AWIUgLTYIVjy
UUvYwtu9icqV6Sovz8/FErBiJSkT2+YmF6MPLYNWYaaITlQYha0HplwUN76i
gR2JQZEkTRDmatOH/Q9MGwbQGnpbMP4Q2gSUhl+JyKCi4/k53QvaQJrwVpJi
E4QJtuHR/az5SRXpWB3j44HywTaz1kg0D/GglVNmQdiGY+PtKg8Si9AQd9sA
fKLw8xCsiRl3vSA7OHW9Ji5Bg4/w7+tLB1WMvQtqCE9uUjO7zto3xH5HRK7e
MX1mquTFajMrZQHFQFzM/kuaKIg8DVzFmyPCuulUxt/QVSdIbNx4YOAZ6J9Z
TGmVWGSZX6UljGOXRLFoZbCfKPkwc5GgrrcnCNLUTedtHWpDYgFR5H4QI6HD
sb9BjJIHWimsJoScMNttmGrlrKNMRjarUUR70rLJ0+zA6gsLuCIO9GXaqMVH
dajxzLB4FRWRILDWgXk3f18I5xdlhp9saHKx6RJw/gzEZ0NTu2M7x/t1zgZm
aMHxNKyK4FQgujSrgnbUHEbDuqYvYbnw+//6UgGIt9UAFNkfVWAUHZ8uqbpc
mEG8y4GDJrwvVCXD/odvKlXwKN+KXBwcA3ZxHpAicrJpiMln7QnfKPYuyWiQ
KITnkDgTb1s1cJA0mCSE98I6p0wXr+u8jHlZLXa6m0pQnC7UGsZ03M6i3fEl
a/K/5SIu+O2xgY54PlSsA2svxB2NvxJWtATT6FVoiATVMt+Y/Sk+LDrWTz5h
JqACbrD51P5v1X3N40WyoqoBClpQrbQ1+eixc48uEgjO7JEmKveS4N4aVxAa
PLxMSgSrMdswrgB3abBxGdMCoihUTGaMxow4jj9wnCS4JQ03MwtRevjMYe00
wyy/tbTvwZTlmkReA9a3aSSS/qo5d4DsF2dG8GO8btUnU28u3KeA1HfMeQGp
J1nWKrvVqb004Ik1DJHBETG/jJmpkm/qLje6h2sWTI/M3TGRsCqzuWNAk5SK
HVFYMKBSHM5VLUoOJoA5eDjZQs31vJC3Ty9hiIPDmz3YfG8/fHgryJl8hhP6
vTcDM7Kq/pRduM8An1c1cT/WvJI/bwsS/AS1eCHfqdQCMyvpDqoeCFrGLj05
cx6HbffqWVScW6Vrjudgux/uOPQhfpAEhULc1Iz/NXj/Nl+/E+CopUaVGKWt
qj2xGJknJkQmp6CZJu+wsQFnReAQmiDHB2nXFtU1ueqxckq1Z/w88Aq+wF2a
5cJQhJ7dVHIzFcuFXd7iTBK7fju47SKB6y1ns9lQ8F3a8USsihnaBdON0YfG
CdoxX6FVrsp6zaoW1BPYDgSn4RkEZWQSnmdEUP75z3+maXt95djykdz9M9aD
CRjf3+M1//N9/MLpn0hzzsTKkrOa/kaJ8dn8C/efQTD5lLd1lixv+fmCX/jt
/Jc6zhsmO21+enFxcfYTl/Rlvbp9Qf/CJcklFygtEh7pRy1JxvlZlvQjXzh9
w1w5BzZ9CeyfQ6afdnBfkeB8DD5fJP8ZvaBgpZM+CtThCz9oSXRn3YfHySfK
opeNgl0ipn538lz0B8/CQej8Mxu6+ReJ3DuTfJxZs9Pw3A3zg6K6HjwpTloF
r7KEMa06ST6y7POUwJWzF4/kHmEvvdfagpd5qJV5c4IEmcBTZHaFgX2LmfUO
iu79ba/tQPNIV0UJCzCxY4v/OV+HJZ97f0OiVpRoPxIKADFtVYgwYiEkaeWm
RmaWK2P7jHlUIpOTOE1UFGRdqlCrn9uRFEp6gVnQlNwTgxlpJ9HqB4LlYLRk
fjRmDTWpeRWHlzQqhg50HAzZ9ns+ahLuq8MO9oUBqFnebnM3eNHAOz0pr/Wn
QSVjvzYO6JUPjnvJ7M6CRION8cMHiDe/+eWnv/j4MTn1iBINThIQcfas3UKV
sQAZZ/arM5yEhhK+lVDCDx8GkYgfP16QZIRzFY6PTyFH6lALidZywSvPAoSI
jjxeFFqmhrxwSt7lYlgLyEIoV8laJ6GDVsdfCBfB2A/aeCzVSqOpObZjRdpU
iAxSmcNFp0fgqXKWGUTAV9W1PKjWo/41mizYmi/n4q448isvC/MG6qTB3D12
2cE2W+trvL2kkBgJJjkS1JMPwdUWmXmj0xbWxcy0EA+SsEqI5c5Lkn7aYIdg
l72iPwwKVTKFC/wBFjHQcRifziOPYiLnntB9SLbF1ZaUweu8FJtldBnZTMVx
IurjadhjIJAOPjlhM25C1tlkqTfLJPRIqgxaUdBkoI4zMriwbzHukG6MvfYw
8nTihBPwlDLctth7YsZ2ZfMfHaFrY8MnLfSNd8ry6XrDUH5kaxwv0eYcJ2Ui
tcYPGcaPLYkAOtH+Tc+ugUj94PP2zi81U6v9YJUnQcCuI98x7q/EsMV+EBz0
ReID8tiCQbrIhlRZ1VIj2MJeqiEgjo4GZF117mhpvMtNkPzH2HYRyeNjOXsk
BYzF9Sd+LA5pd3eKFLc98L2bCnojgfqO12dl1FiYtFiGUyxc1ryIXr/X4odz
JN9//8Nef6UEKrE3f+DsCDgH+g039rNDPlEl/b6Q18ePgP7ngfxoDhn/p+/d
BNtwMUYSrfEUCLHKPcOzIQpf7VhGbiLmK8aqjXhCpmRFJLVhNLg6d53RrAVR
nYotLN7XGGj9AqsKDN0zXiI3UZT0hXtjpGloOfHkKSJIXp5+xjGDePIrkttI
pn7BTjXYjbtih2CbWiNl2BM+3ZzxMvH9WKgi22rhDoBRPSs2m7zxRlYzHHuL
1kJgx1awrKC19sSX1fQx8NqlkNCZEGt4Vxf5jbGHEJFtAfl51YYoJbFjysje
AA3j15qZthxTvWmNu/jhIoo9e8LbtHUhJiJlEBjfFHM2reCBCAhXZb1iHYV9
TG2XawCxOkI7Hkxi1OLTTZ7wSrcLb8JShpRqGJNYm8xHZf4hF5uT7BvYnRp6
l6RsRjcEKWjIqJeY2Uc0CQlXXau8SQ9B8UFoJYBJGzHLkOo/edjkWpUu70LU
R6ONDQZvO7iwKpx5UdFZF//gjTJkY+PyCztSrJg9MuEgVAuI8HIhUcHw3Isz
Q9lveAK/59caeyxGeZ6MYLjvxU1MMkLYsvNbtvjRohqfLEd7XG7DXUT6BUhP
zXoPKTod5xDMhTJXugGgBRsRI0RD7HDRIhaWQ0pYDmh7i8DlEWUgUaL8sBiv
VXib3hJs8ufnPsdhWyCpgbTBw/n5gr44oqCxb1f0pIl7lv0x5+f7PG+gp+Hf
8cvmrEqTmYkj4zToRpMtv8XHyZM+A43D6K/SiuhhM4kf/fCBx1nyOMsULxC6
k1aHox1+ueMhQOZh00ZOQt9BL3CDaCGlq6IQeWHZ0HEiTgqdi/biVGmGBw7p
Nz5eA0lGi2CgntAXGuaqEf8YMygXx+PvIOY1fBNkfDVQFEra2nbTl0q4wlqA
illP3zqk4KjUoe7FgbsFdu1km6eZqGiTtUXRUwURLj+U5DBxWAQHnxqGENOU
8BbjfS1HKIHwRn5eXCSilk7zc5gcykWw4P89s7MtlIxCXJNg3KTA7fYhtGu0
aXi+DcdAi9nDWrLvctYiZBwOu7LpDVnnr8KCM5o4nE+8GnwAlgc4HhpCu5tV
EdluA89FeztaKDHwSny6wxXUEwtRtDMTcEIOq61edYj0tyyoD5dxnmCtCssM
+M2Trzy9mL8VDlOCZMGpoR4EI9+79F3wjDJ3XmCRrAe1nEEY+CmdWENXyDFt
5MNjXRnZMGqEg85IUoLCBg4fwFNhQrKNT0ty+IhIbQluyPFK7/JSgw5A7HmK
QHVZqz+Ys0ZCWoSwwgUm2HGc3HFeod6MK8hW+2n8Vp3Q1ondFe3WhSvB3qxg
CkLEUMwNj5AfnQNHRvwT4pjkMdqpH8z6BrNH3y3rjeTLGZ7AO46zlGArwqrr
ojw4PHJTZN12CV5HU8NTGEh1Syq6SLLJf7yh/Wf5QIKK8YdohiRJSAorzaQr
VjsjZwfuNNjUyyHyzD7kGMLSKN70VP3sPiSN1eYUkkgln3EckAXoqXRFxJMI
wkLCVOb4mARNSaKPD+hkQmNUTkxjbW4xfRowIEt1Zog1YZnPW57HUmQQxoQg
LjOfJpR6k1+lTVbCpIRVK+gWJuRKAIOgqyDrgPT7zKBcs0btupnkqJyAE3ib
fE98kr8Rkkz/sbBZtBJo513Zcj6Sa9luGfXv4/f7sl4d19YmfsBbVbu79MJY
C7x9oNNvYDEvQXWMHM7RwrM7B/rZVnRft94d+vFA8U9Mtf7wR2IOj5PP17/4
/LOVeJM+/uu29v/8QKevX3+pzOTGiP2ZDRR9qRR2xHnPfu4V2REnzyQirOfr
iCOmgaaf/XPu5wtekSLEFOG++D757ex74ce//H/kisxu6T/vOdAPWJEZkyJO
ueTDZiFD7EoS7mTeTy+Mter9FCHHDQlMnMoyNbJYCJUGP8c6NZg/zeBkhpUl
FUHmoAGYBYdEf7WHW8L8LeZwZ9LpvEnZO8GF65gKGe0JjFEZICzYTv0rFrJ1
i2SqpqnkWah/8YoEiJY9k+b0aWCBQyYEzdSKe4lFQigitB62hAhXXSKPKJix
wAEBr8BkdxhcdWXMKGLL1IjHhg6VlC6S52DfeFXMNSXJnjA7hWEVJjv2WHDk
uurl64OPLlZfC+Zm4W5W7rCocPOUSOJIpAm/8rorQpTp6eHXT1TvxZdQy27q
yKgpu3eDUzymBGU54m67nEUfQLegnXkt2AnmBl0rzhAwSQMxX5IpZkYKBKi1
hG1i9ex8dDr0OB//dsSmOtZob5AW7Eyhg22nKYgMA/FFPEs5IAgHHFLXCZP6
kjP9WHDXc/CWAQHQgkVFf0nZXBnSHcXoU2jKS1P3Ini6WxfOIqXP4Wgj/TNW
V9mmQ9jm56rYNqU3dwIBi2/AeiWxQUAKNcWJZzJS9oN/LTJeR6OF+GucNB1J
3lgJFobVPBLOWBrEdSU68C79Wx00yRx5yu/gm6btSE5Rq5Zrzur1ll0LnOSQ
In/4E30aOSXYYMtRkr4sgWDWA4uWvEgm67dbMjXwMim8cwtMjO5eOS+wXnUa
A+zPQnEqHaBeqiYuvptXCMcQ2neN4Bc9DvNOWgSiNxMmopj1a4lcMUO2c5dw
UrK8L55Yry9LEm6pkaGxu/YYEruBnW6GaOIqi8ZKVMc80kVF9AeOUFZabACk
CUY5TWnLXmy1yetyCU5suQ1g02xR6DvrvCKGVy90YfasuC0k4CigPud4rzh3
tyStEYrT+FR5aU6XtlA/B2tagcibvieHF3G/6mrgDWGa/VQv7SvvnYFRVQ0n
ovkjrGRhbKb1piTFh0C2nWT11EN6e8nRzMIYrSCP2GJuomiT0sK70yjo2llq
i1T/SS3HCRsQW92aifUimGDgfrD6BE3OOV/wGjm6YawXowZGx0dZeY9U8EIk
PUGqVKuC5g9oMsp5FsusfP1wkQ/nyekgJPnfvn3z+vL1714sn10MS5WZD+Pj
x7PIP+D8xjnCaxorbqWPcsbR+d0Hz5oT98saCRZRrhsMDxXK8iCYwEOCKfIk
7EnSJau5ixOn5yjeuIA3IngwDith0FxQtU3EZv7EsgG9oOWGcWzHDZ/I5LzF
jjU1t2fmTFzy1B8/Agg/dtsqyMptdBOWbPEXo8zJvGJZI01OpteN5cgTqydC
v1sipxSdaUOEUuSHlOTRB5ZniNxViXlZp1yii9Ymj0RB5Lg+Ih5NdoirNXO4
0Sp5ZZFXrLAgG7pNTadXjZmH3K4VvHtRoDrQPCdxYW+R6uLIMjThwgzqSBjY
+4YRd88BR7OcOphWOVBNrcCMf5PyO3UP0IvuO2d9x1WHTV8kNMu9nzdeSrDn
FDgieeCVmfMdybWLZBQss+qbLBfHCCElnAvC40z4Vscoe4mFSgmjq82HHOdL
8gMXydsu1dolWiAsHSobgwXUBNMrvQs0C9sAldc3uWTivJaEBmH3nM6wiKim
LNDcSAHKc/kxRNWTRD0u8jZkA2hkVsWrr8xOCsng02FUot8wHtx7iLS5zVvc
yih07oPiA1I2uBxlE+rZpJFXepi1wy/WK46QyzALRpMsv12Nj1ZS5q/oNIU8
MsFbrFUEMPO+XvUp4VkXdrBhvm+qgGTviMCgOU5RSavOsnnA5Z1SJ+Fft0xt
CZ6F5jjz8h/S1rjgnJe7mcvppsanLcGMTNELs1CbA0I34kGl3hLnn9c50/Ke
5tmpDfbYc1/Wq7tDc+5nXwmxXbcYPL+430DDSKf5tIb7regeT/3QgU4fJVl6
kHtwFj/1L16RRX8dhfaPAfZ8kNj/B/Y9nprLgBke0n1XdHug3v3i6ZJ7bs2M
oWqNWAZGt9wU3hw65dMXGmgqVeHU+Ea7fNA6Zaqvqzyc3UIfj7jeLNNowcCV
EDrJzdOs44k59YlmEUdzwC8FYZ6lwKIaqC0QgNoQ6hcnZ8rShtHfKGqREiWm
hWFUS3rGGAoEH0SoJF8d36gAKObPFztogKkoHTOSDokaKISYmFNcy3xETj2f
0c1uQGdpfLQmHSYEYB3L0rTIpjXnExwbjkRtX/QKbvUTk1q0dpP37mt+IC9O
8hV56RwM4sDECOiDkTi+idSsVS7BGvRwxcXERjsQTQiStzun9ZGETPrX+SiB
MeT7k9IG0X0h7P+W1aXO4uKbGCSHWEQYKcTMnA0JirbtIxMD7c/FK5dxArfn
XH3et/p1JRDdYvTnNu0QfY7i0h07d5uBn1jrYGL1Bj7bLOnXyG61N2GstE2z
j3123wXXkiWxfM5uFgnmc1/Pi+ZTjZMtY1EU0R12Mat+dIr4fKQg9bszk9V8
KIq7r21MAR1NDstuHN0vEXOQ8NUELqEqFsek51k0EbxYpG56CYdoD9Wa1PGK
NTWBgW2GL5nU8VSrQgq9hEhoBflZh564B5DrTMppyHwLkQ+aOz4GW4vV0B6G
S4kr/3D2+9CYxaVctQJrHgpeu5CJzRprqub0xcSyGW91x1QX8u62sJI3KOo0
qFl2LKQFxPI9DhqOrV7qmfKl8fqETuNmppmq4xodC0E5WAcl6Kyx3E8UT5IY
D1Q27kLC93AwAQ9xvr6xYg1e4n4FgV38IUd+7krN0E3d21t5+4OQAu6XpnuH
JBgNdFti6g8a6GlK9Ponrei3v8NPiHdQ6L0trh4nn3++2ljIw50D3fPn/8aB
/ks3LUD97x8hBMpAgwgSHfOSqKkEGPx8W/N5GsoyYhlyjqWgOp1aPMLN9fq0
0Zo4/8EIuJCR6AmppcUR4aNaS8w2iopZSETrWEb7A1fNE7MALRdJillicbSb
CXlovdtqX3eS2CG1gZtO3nXRu2OyzTS4Yb82e5Q5G9BnZ87QeC7KBCYVXhfP
jYQ0hjo/LHENC2pLRZNoWA9NmG541H4fSCfgdTSn7kGrlQEhQqO8vwBf5DxY
28UAW/nj4PFhULN1z52gHcmdJFgsWuLFtMoVUeSxxcCPykwdXwzE1CY21MhG
fOES8GnnpVrNT5HQxqnsFHymR6Sn8MBUfhr42sW2xJuC3dGZYPnDPZWey05c
oKxitFzgrzxMNQxfKGQkPWhevLpCMDkhl/NFt+sw6xONxvQS7tCvzlGTKzN7
+Ux+GWEm7eCok5iw6b2qkTt/zyNk32k6gZVlQ5+FsTJxtzHtbjOapi3cQUHv
zn5zt9YlIW45y44HzOBIBQ6h+fG3R8qE/AxbuEUa+Zm3MF9W5Oc7hXFFDw5E
+yEwGAtS9x/gJ27BWLDegGMcOJClcc0PU5jeF6Gu0VwokdAmngQe/OPlQITT
Xk4yEO5LJ9Wko/mFbjY95NbQInM5Kk3QkDaNMXLB5ee9CNAjX2yODiCPt77O
VLDnO27SsIchYVwFcZTTF/mpFWa3QNsyFGTsUjsOwbMehdOPXQ6xD4HJJAcQ
7CIL3ov5pIP5/bk5SPhqoJWZrIhJsHAC6YM+lZq6/xDPUms+s9SptSS0qYlS
MSTCi9e8kIrqcLiIyDMZLx5ukiapkPAubUvim9kzm598noLYcUJdwFE2nzjl
ka4wVXenULpIhkEEszBnS9Bt81vgSufzRuL6rlH6Miu+0ndP7UJHEdmX+ZY0
4VHmQqgx7aRU3YU0rtitxHdNDFHqFjZSDI5DMiRSU8yGKDDC6TmawVtbdegw
8br2ossU7dEhCb3H2kH108fOLVFeWwucqlwpFglreXXVpJlEou2KK55xNiZX
TEuJdCQIGx9WmtWmQvH3xZ496X3RSfFX/xUXNh8Qr4vji50AgxUMaTXEebdi
hgrliJCSw8XT61A+Rr36GpQrOVM85SbPtBK3NTRLtUJncFlryxJvq8wtnjU6
K2fuZ5jOJwAM1jJ8rTns7qkEU3h0HlbrHPQRIrTGeDMVo32x+EGs2VghU+0g
YPJUY2u0WrGa/BCoyGFpIahlEbKIgh1a0o0sB3hf08MHxUNYWYGxIiwslOeL
uDo28WqnLxOR21CsVyuSSK1tqcmC01xyqZjAKyOHN9dsZfx/IYlP092OSiAq
a5KtqWMFxeI1f53Lt/s9xplo3LRiXGWeEUfcJ7qG6nCcfWR0Ga0S45BN7Ruk
IPmNIX9MQgN2eae5ZeOkPAEb6JTPluVyhqGKZByigcqcxwNjWIn7g5CI5BUT
CO47GDetIDCMiQgHBGqRA0QlzglFonajo4HTgtqMNmzGRNwJ0hIlRkTN84Ym
BCqNgfB1IGPMmZ1vI00MU25ooDJI9A4bAOaiay2tcz7ghNhpkgzrw87OXrRW
+xVFpqJalRrgh1EedMQtSFGt8gcS/8cRKiPXlG6dV3Zs/3N7WViTEH7Cl0bm
LWSZpgDY/DL9yFujrJG2x6NMdiiEYptyris7HSSSREtBc63ULznuaHIPw3kq
XgoBYmX0xr4y7VTEwJ6L7oawNUihryuN8d0ZmrIDBJkhpfRbUkF37ogwHJ4m
AOz3WtFKQ+dj6XRx/IyZGKKKA5cDtjQBOm8O9s8rDkpkT5qnn9LHhVennCG+
mAiiwVin7/J8rxFsu8LqrUYt1bQwRr3ZsCNXvHWwEfK6IZ2Y54CPjugCeod8
W6br4wcfyNetiC19UdVNlKxL6UGV+TrgvEctBTwJlq4DNZ8tqxykNZK/Ywdx
0ZmIZ+F4TGtQiMLqoYTzS3EoxBpnZEC927OXH2bSqgEYtMEc0cEXVmZ4RAml
6rgVox/1bBzIMbiksCOvt3UtYh4Qzu7gyFI0I4SNCx2baJPObkLyXCRrfrmv
930Z+NMRoLeWJyzBlCHeHJSeq4ncn05bff97U6k5ivcjBvlMLHrSoIot2i2p
QVLgpK654MzWePcxch2ZYK1SsWXKSkWFG0LH7SFkiGmnDHaBy12W+ccyjozn
r3104RFnqfVZ1Ej9MihmbeJ7LESvcEgsxjNaPYvK0iuWW4CxDdRA7K2mIvcz
YY/RIAqlFGN+sCuHQExPaznSF0QkSr6gAbVhBhLwq4VP+0anVQWMD0KeP0x3
76MUSWmye4tOWCEJzhoED0zrsYwZSZCBTquI6yXBkRyo3gRN4LeWwGZz7iQd
C5PkZblEGQgroaWx3rMbV4RirqKnp9LeeBSJvmbmSB86xEy2tT+hg++pwIE5
CvRCquWEgFjvCDKkyNSl4Oto+oMm1lbU8H+X3LVIEgGE5t1+TsKnBqfgSVEk
FLFTg2iaf45L0Zh+L5T4K69+MQFOIxVuoKuwni3BQlHFIqlDHpwB4vMOSqtv
FsaIanq31Q5Qghs1MRtXznWzlXM1idJ6pg1XrYqnLy7DuYY4zWF7rtNiWK12
yiLOJN5YS23GQbPIQ3A19+JKzJen0dZxhtARTU4cEEDory9DzWOVCvXKzwUw
+JbZyJeRLrm+4fg2ZHk6Xw/TezpC53YRIPT7UMfMi43yCl9qaeXmm79YOz/u
xjbTuY7r5P4Vtsz83/WlCzq8v4oZT70fpTYz1VZ3f40fRMZHMvOcDBw/mbx6
8hdk/WnfAS19yvVLYUEWKNOxa+zFjRbmOJhrbSI2a0MBiezzKHtqfSpE7yOZ
zwr8/o9ff/x4xp3IktCNM06jebArmqZuHsBmsmbTleVpjZ1jrdX5YiS1pmV9
xYFRT4bhQmvJgRug8X0b/lnD98URW0XcQ8suaZunO4SESZty3wvwQLJJe2FV
ybR/Uuq7SeNRNbaMmz9LF1WuCwMrFU/ScwVFdOH2aTGm1qJwlVbC7SuxHrLB
lwliYYZ4RPAQSHa5j9NruQeW2/RNZwnt0NWDudQHeOEKhe6+VvDY4J3Hvakl
SzmqnrdJ3xE0tV19pKa1dZmXQefb9w36tnETNI7dZzsp++7R5Mq6cTWcyntK
lHrdt62lRWk/4GXgpZyZFtGcif2yjdi0hHQK5EyUIh5Co4pDdC+IJmYXJg2O
E21Y0eIuz4oUCrd5Yuzcl02dZkJnOBx1jpoSLwrNzYQZSLs3JHh2h33uCz+a
BGylLsVIz2s85Ygv6WAy7L4SWmMUFllxdSZWik9RKz22rWKoUHEIEj1QpI9K
XrdSqRtm3YZNYJLCVnQ7MbfiigByrZeqGsjRtItFVKMzLHxhIg0gLvBk/4JI
kYdBJ2nHMpL1Rny/xwGwvTfof5FOZPWuH0zabgjHcaL2S/K3hG1awfbkyZw1
X2ZUqim5Jx4hnC/pGdX+8SmyorJI7Z+BxWMQbK2Zc05qSek8WmFTZFcLiLD0
zcIaocCdnluJ5/NzjeZzZbHhiqPn58kp58hFmZ6c6Ik749w3NQpjqXh1JW3S
uzkIaA9WJlr2tbbPufZHgsoHoVeiBRbaUiIhK1SvGh+ZmBtkue5Y+yw5Rp+x
5bu3l9pUJSoYHu/LnWrfPeE6poucJbEl4PKWy9RxIfm5VFex6EvfTRR2MOFT
y2SH8hS2Jqu4ATnA91DzrlmuE04Xx27/YuQICdfHJpU7JOxXOoChHZyzuTk7
kO8JeGer9QCPkTRftXQj7g1CaRBoqebKIlDof5cL1ZWc2Eh4nEMiQMl373EK
p0UQ8Tys//TmK6sQajZjITM8hIRbG0XnllQWwVROEPhIXBMRuE3xXnSJ6N7G
t1b3y0AYYsygrdbx9mUwmDc79tA5Ab70nybZMt3kVgOkU9IvnhVLYPdHwJ18
B94bRRNJ65Y2UpZ5GZgCg22CM1HBVEZyrmHXwu3jS28SxqxzdNEiBYQA4qlF
SMoIOgrUWjUHjjsNSLM99N/gYhdzVPhYcZ5LsSotuNVA6JhgfFmru8l+hKNn
alyUjrnDnhhmA2elb+GkaNBovBlAxdp2PPLXl0vfZA0jOmlkG0r2etOsiK2+
IcYfvLQCkT6khAabok/ISY1f3FoCm88DgQ7NTJ1qvv3oHOorJ2HY4OY5Gq4R
TtBbxJju++qsfr0LbTIdmTcQOT9jxBiXY7b6o+BvXVSS2R/8zaCbh2Q1uXGW
CNcf8TvKwpYkZl6UGysbFTc1Va+9889pEGfUCVEm1bITwc+vBpEuYSandiX+
BvxNpIoH16DgeTXM/hUrPx/CHTuIIOKkUmeubofIUcAgZdCvVIgfRu+zaMRR
J11o2xCzSQRKNFIiXElep2VCgrBNy6xv0MHmSGyKJwg+waeaxxM2z4nsJmLs
peXOKOGzwJgkh4I4sUJHZaO1wR7p4J+Oh7l7e7SXZ0xkC9/5U+m2No70KMSj
8iDtZBRfQ9WSlkfJ0sf8oMZcPY/giuC+3oObq/cw9EuMOxeqewYWbC3vbQ4a
dwwxtEssb02ttUMMECuBGjRni17CJDE0zZnXASn45pBntZAbjkZuk/mAGzcu
BarhNXp1mArC8yMVULk+Axe+sWj1jrXEqIi5aOE32gy91Jw+1Z+9uTIs1Sfm
hXWKGOXYtTNg+9qTNw4CKsYdYC1mmm9ETxJ941bWXREZhjJqOoqeNpZjYuMw
a0aZvqDrmmSotPN7Jphc57FpWUUJDoBn41ht5ft90B9LS9zWSzq7jlo6N+jw
Klyj0o7ybLUdhQPahZnrIq11jDlG4kh0IcaeTW/zFfBmS1C7GQfxbVGGYBwa
gT4KOExCWbOo7Oytdc2Wc/mjut72WM3swO6J8XkmoOECkcN2tigGtwMaKIGz
jF56jbERZSGLGHhS7nPWEpvTWIg9mu3GZZKC5BP22Erx/1MzHKDora96dWZh
40qsSOSXHm8ZSsslV/WAaKuDWflFAL0vlHssJrPwXQ48Hb6DPzLvQDEq4t2d
h7zJ6/lAfR0RUJ9iPF6eiytXpOOmwEstJ6WUITs6/MFyOI6QByYeF9Px3li1
5jxGzD8XVUYU53TAaZKoAe2vLh5hbjMJkOyVI4wt+EFBsDaNCLelpQsox6eR
5rkd3AgIH2NL2JIVRomoU0xgAN9dcebx7Ow0K1fdyaV4/2zd+OOlcBbjOkwc
eDV5ddAJ5tgO7pOa+1jVWzsoms4fPdMZPjIkVrKA6zN37jfr8VBtmTcOzaA5
ZPOWL0Xw48KR6fqwCD3apiY0qy3uQ2+h0Ca+nPYnn0jVnuRl3bbT6HL0edee
hXvuzKfMKCqT58NVLASPBOwViTWurNdW98w8lkojW7PditjCd30GoWi7Ebjc
3CGx8OijDCMrBHcphlUgiwM/rRTMRlqfcLxQ3E/BKtTMisxSsceXqxEV1jyp
rDL1O+b1L47sZybvW13DWoZ+WJpOOyUUjVP5nqU/mUeEtBkrja9ZZ+3wVM5V
mgoSfBuxUd1D6e/Ie2CRvlyEiOhLHxUu1SL0qCfJ279v4rsAwN0OgOQHAsDF
AAg7t9v5oD1yi8cl2tSLaHY4YeQ+MdGbjmV1tF4z1dOKpQ4aaYFbSbFnAnKs
nC7CXeFi1ZrGkTJc5tcI0jKDUsz1hNV3oxgFvu8kFYgCBtngiiVshnRTtO8u
3MACeOzuhaMSuX8WaZxyKJPfLC7Am7SOxo6aytCG1oFuBymklFiGVNPKxUNs
zFsGjcAtcV4XyVuSgrikm2zI3YF9i6GMcBsld6G14Y9fn5CEGLMksF+L5SkV
bG046MB7Uv3Z4XjK3mIEiKySPbGLM1ag5f1oJin9pSjJ3jySjK9IgAYBzHBP
0qbQ4osDqnpLvhCt6M3zp69fvXr+zbPnzyZBHSO1ieZ3rGv46+Itn4L3ajis
NyrF2zU+Vn3SDatPdnXtK6ppQGc6V/oG1WmkYZGZ6G+Vru5zATjN9VBrodcZ
vDENBfhT3IP8aXdLuo5cvHYQHB4dKsejMPvVSNlkQHPtdmfCx78V1+rAWIm7
PjinUNf768s5B47E/MTOVlW7G6I+TMyQhMIqR9xcWZJur7mzL3OAYSDKeB6m
+bIz9nfIq+bA9mVokl2+W/m6l+ADcdXjaHonlgWvq4jvENLTQnw24fNNU4gg
4ytH435CzmHHy6iOI5suxtVjgmOxaEP5j7mwZ68+ajGX21yLkIwkJSCiZrev
y3atTq9h+Kr7gZOLdWLkfNEVudgceiMuZquxGRULUqMRQDvbgI8tM1Xt1HNV
SOq+D9f1Cx5ajWZq9wzb+nEkt5ZxFMeHjRR8yFg0zYMKjqH6Udf0uTb1OVpa
1mo3hfLm04JBVhJ7ots7Qdvg0bQHRUMx25WvxWMrHMkhQ91WQyjMoIW1ExRX
8CWUh2AdbS3PUaLVfMjQkVR175WVt30rPw4+yXyy+WJoZtaYDpFOloiBRdAj
jJ+RlMHI6Bs94YY86OwecoO5iEKJpsx+YNlDFMPtDfvOR6EzHOmULSLZQngE
obiWaTTA0BDpBiPwZaa7m/t8To21yjmN16O70Q9BZXPCpo0GQI+3Eqcbzm0l
ObIVNi/59aoWKuWGJm0XjdZp5A3o2dsJYWfWfBt1jwi7hoPDAcdJVI5EzqZY
t4HgFJHfB6dkD2j1atFGEdTkSTdfbMTKSPic2gWsE6aYTTjZlYH0t7qoQtmC
2Yf5wApreuU06qiL4pKFrvtCHhMmhMAw0eYG6y00c4BXK06BDnFElRWZB1Vr
iLpVvXEnRE7NyjGq0MxYvZxE2GhNBwTXDMRYXjid2H1X7zj0zBcROSFxoTzx
gbuSVqqNIOZ0W4ROaaKBvOrsVW+L0f0LbxD6dWzbiyhPreicaGIag6KimTSt
RVaqcC2uQgZVB0BnTwhvCMdh84q54pPkZZ6+0773sSBraWeDDmBzpdK46paW
tRCzqca5PmiTULDdxdINXcR38ynAUTPb68JHEukuGxX9+fpqNtzsmoblz6LK
hcLnedK6o0UFlLMIgnGVHq2DJnZVINBkpLrJpKWrY2WRhFm+OMXOV6HWCwaq
pIwc7BMIFAX/+PI61p5yOtO+hEkof+9bxSptoz1qJvS4EKGv080I277LfePa
P735SgiCxvewbAzRKC6IE9bURnEnHNqpfTQZJizE6WqjAvtegzOJI7XtRx5o
FWm0GacZGczTrGFzUAdZaZDcDa6oJKaV0chuMPLg1vocSR+ZzD70E1y6E39b
5dm70Ezx3fReQf6QP8wnJh2DD9yA1XdanJId8cwhx8AOT0h+G7A00T5+/vhd
nCeix1dZ2NvANe4LI73o5KjC6E0K1cftYTloqjaEO8LMrFpS4p0cPvDNV+22
SGQRnl6mN5D4otZDzj0VE17jJawy5ebdGDrEzZw36G/EwUtNCnvN+aSJt5J9
swk2UUsrDdEd539pLJFABH2+OTswIkHCNSfvYYP5lbgJpZ66XISsTtra1oWo
q1zq+6ykJfOOoMjFkTx1Fx+DT/wk9sOiXQHRIOvZ3YBmwewkOxkFQZ+YOl45
SRKMS4VPmR/74JGMnksXSNzGVW71wMW7U5jrXN2liRRCiHznPhwLr4e8AMkQ
VZVstE4opuzs1ixBInxNUR5CsqEFJ/OVbK6HwWzSPGDofhvQGDaei54zCT6M
IzG9kUdSA0fBtSrLOYkSVONP1J2o1sY3jB+cqrApUBuDTozLLwwW6KIFSpmq
YGD0PlOuFeBp/5F2X1KZxAXVsxJKoSLhWNGTjiazogbJoNA06LRc1C45j2D5
oLVoZET0zninB5Ct7B76QsJSJN4uVByAqMN6wTKyvWhsQEjWchw+NkmqjHye
Xs8g5Ku54r/59MOwDA7CjZdCAbsQ0cMNyAIuBDQYZaLgeFuPCfiiQgAU1AZO
XKGb1kjws8/MtNJD3G4ZO9WuJ8mfOEqNWd8b2g3xl696iUJcYEAgu2aEfPbr
R+j+rZGPFgvZdrrcXbpv4zxgRvFN8T7PSGOorrqt27d5n9WNzCJQSMS71A3T
SKM7Oy8oy/kpYUN8YBz/KTIBr2RkuoiDRAsTBzptv3fQzAd8y+YNBBZyJQh6
M7rzR2PypU2KKMYBBY3QO4tA1GhiHwx4pFTAZL0B6xbOlM9JBGv8hkSbdYM0
hNFWACgOfZLHUEmaSPCRwOHbnO8Q19hpXKDrjQRoWrcHa1A0DSAfGQ3UaR01
dwHFHoA+rXwxA4li2vfNVQzNmaoMazlGRCbFKQgxUHYzsffj1dKy2NkUMm4X
4jIcxl4Pah0OgRiyjkTweDEIA07+0BcZtB/n6AZmKX9RquKnyCNx2XJbon4d
PjDE0FXzj1FwwuSD9Ao4ob7ageEAPGQpNNonr5wSC43CTRAKUa97TgwhDFOL
o1hjUMQHqzmRa3ByxpJaJ9WJtIbFOpWO912vaoBfuvPrVlOQLTM1sjAVFCWo
Zyb61REN2kumkkjtURNCL1wGxslahq/FiASaQokZTMSDFqQDodvSAVlmsIRz
Niyd91VBt137TOLhpaqA5xfOq0k33rYqkgZdvq7vOJhU3ufX47cjuk9AAAo7
ToIotTVhbGICbMKfFyLDQjIclHpasII9k+k0sW3Kkog1+zUIhRPa7rmPxNh9
fRksl76PU8+J5EyQxQLrvLjy3XcvnmnxDrPRWMF9oAl/vWPhemUrWfiEnc7Z
ZSs0lsTgNQzW9Y7FYI9OfY9ItWLyFtysesMkpfTmCnva0JCn4IVySBY/s62R
8fxiI5VqDCtP+az8+/Q2XjuT2hGDhrfDkhC2EicePRI2CqnNoJGdOWoCZU29
5wq9iNJvWjUTcw4Wbp2ZDHmh4s90ZiO0dkVq9UNGiFSV92EfUD9gJiyuzUPv
C60gUo7uJShDJ2q0HDesVXyxCQOj3vbeNIK04zSqKdu3atqJMKNVQ3ahjT1d
5Mq+SLho+NCTxWFoocIUF7tjEie4anJmQOVmIkWZI0lCYK0Zm+Dndy+SUz5k
Ok6U4bHFapKC+RdwplxzK9MKr2bnjlT96JSSQk1qKaf2i6oHoR7KQC0W/gPC
0COTs2Kv6kZRrief8QsrFCX4h0gAqRYXOUFw747SGHGA+P4P3MuQVTJv0Qn9
SHNGw5sGkhS799E/xNv5rdfiO1SiwVGE83Ieh96W6fodp0afn4sOdphS2/Nz
9uNWSu750gg9iHchxxdUEzWGJKevmwhVOSqAu06pqYyJihggfXJlTFQJpClK
1uCABmenCpKZqS/O5jZvqV8RhHnv6E/hs81VaGfeZ5/5UgBPkqNw0XAJpyGT
qzxolhV7dL1Cb68iXSpiglzYQPBSFc3YzinEeU5/wWlJbttPPq/haY1CpvmW
Ee5LH7kkLhdoFCyTchVIh7eFRodzFHTmqtC/ragyh81KhjO7ldQgrzYGkllZ
s1sgtiXk4XWa/yHYIWXVmD/o7G56cBbHIVxAaSNPrqLziK0r+kjUrB9uE1VM
mb16Q+zroiJZEdVz4iUVOsViNtu49ECCv4Y5l50PwaLpJbLaXC/DWhacf3sL
joRQnyHSepx1x9H+CGIOHQ0mODNUxzKddy77MzUN2et/OCEictu83JO+ISVR
YE6gTdbD+B1h2TNJfA5da0up2yB7AcYfB4p4WDWqIMomanrECQ+cwCZ7QrzW
5XlzDrpWs4a0Tved92cRWcHuIfiHEho+Qi3GN081pvI3D84qupyWajNPvnky
sZ9exqqDNliUJ9O1OnD+N92uw8YvxQAA

-->

</rfc>
