<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-tomas-openroaming-02" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="WBA OpenRoaming">WBA OpenRoaming Wireless Federation</title>

    <author initials="B." surname="Tomas" fullname="Bruno Tomas">
      <organization>Wireless Broadband Alliance, Inc.</organization>
      <address>
        <postal>
          <street>5000 Executive Parkway, Suite 302</street>
          <city>San Ramon</city>
          <code>94583</code>
          <country>US</country>
        </postal>
        <email>bruno@wballiance.com</email>
      </address>
    </author>
    <author initials="M." surname="Grayson" fullname="Mark Grayson">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>10 New Square Park</street>
          <city>Feltham</city>
          <code>TW14 8HA</code>
          <country>UK</country>
        </postal>
        <email>mgrayson@cisco.com</email>
      </address>
    </author>
    <author initials="N." surname="Canpolat" fullname="Necati Canpolat">
      <organization>Intel Corporation</organization>
      <address>
        <postal>
          <street>2111 NE. 25th Ave</street>
          <city>Hillsboro</city>
          <code>97124</code>
          <country>US</country>
        </postal>
        <email>necati.canpolat@intel.com</email>
      </address>
    </author>
    <author initials="B. A." surname="Cockrell" fullname="Betty A. Cockrell">
      <organization>SingleDigits</organization>
      <address>
        <postal>
          <city>San Antonio</city>
          <country>US</country>
        </postal>
        <email>bcockrell@singledigits.com</email>
      </address>
    </author>
    <author initials="S." surname="Gundavelli" fullname="Sri Gundavelli">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>170 West Tasman Drive</street>
          <city>San Jose</city>
          <code>95134</code>
          <country>US</country>
        </postal>
        <email>sgundave@cisco.com</email>
      </address>
    </author>

    <date year="2024" month="February" day="14"/>

    <area>general</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>Internet-Draft</keyword> <keyword>OpenRoaming</keyword> <keyword>Federation</keyword>

    <abstract>


<t>This document describes the Wireless Broadband Alliance's
OpenRoaming system. The OpenRoaming architectures enables a seamless
onboarding experience for devices connecting to access networks
that are part of the federation of access networks and identity providers.
The primary objective of this document is to describe the protocols that
form the foundation for this architecture, enabling providers to correctly configure
their equipment to support interoperable OpenRoaming signalling exchanges.
In addition, the topic of OpenRoaming has been raised in different IETF working
groups, and therefore a secondary objective is to assist those discussions by
describing the federation organization and framework.</t>



    </abstract>



  </front>

  <middle>


<section anchor="intro"><name>Introduction</name>

<t>WBA OpenRoaming is a roaming federation service of Access Network Providers (ANPs)
and Identity Providers (IDPs), enabling an automatic and secure
Wi-Fi experience globally. WBA OpenRoaming creates the framework to seamlessly
connect billions of users and things to millions of Wi-Fi networks.</t>

<figure title="OpenRoaming Federation" anchor="figfedarch"><artwork><![CDATA[
ANP-1 --\                    _----_                     /-- IDP-1
         \     Access      _( Open )_      Identity    /
ANP-2  ---<==  Network ---(  Roaming )---  Providers <==-- IDP-2
         /     Providers   (_      _)                  \
ANP-3 --/                    '----'                     \-- IDP-3

]]></artwork></figure>

<t>WBA OpenRoaming recognizes the benefits that the likes of eduroam <xref target="RFC7593"/> provide to the
education and research community. WBA OpenRoaming defines a global federation that is targeted at serving
all communities, while supporting both settlement-free use cases where "free" Wi-Fi is being offered to
end-users in order to support some
alternative value proposition, as well as traditional settled "paid" for Wi-Fi offered by some
cellular providers.</t>

<t>OpenRoaming is designed to deliver end-to-end security between a Network Access Server deployed by an
OpenRoaming Access Network Provider and an EAP Server <xref target="RFC3748"/> deployed by an OpenRoaming
Identity Provider. The security of the solution is based on mTLS using certificates
issued under Wireless Broadband Alliance's Public Key Infrastructure <xref target="RFC5280"/>.</t>

<section anchor="Requirements"><name>Requirements Language</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
"SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT
RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="Terminology"><name>Terminology</name>

<t>Access Network Query Protocol (ANQP):</t>

<ul empty="true"><li>
  <t>An IEEE 802.11 defined protocol that allows for access network information retrieval
in a pre-association state. ANQP has been further extended by the
Wi-Fi Alliance (WFA) as part of its Passpoint program <xref target="PASSPOINT"/>.</t>
</li></ul>

<t>Access Network Provider (ANP):</t>

<ul empty="true"><li>
  <t>An entity that has joined the federation and serves OpenRoaming end-users by configuring the OpenRoaming RCOI(s) in its Wi-Fi equipment.</t>
</li></ul>

<t>Broker:</t>

<ul empty="true"><li>
  <t>An entity that has joined the federation and performs certain specific roles to help scale the operation of the federation. The separate roles of a broker can include:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t><list style="numbers">
      <t>Assigning WBA identities to ANPs and IDPs.</t>
      <t>Operating an issuing intermediate certificate authority under the WBA's PKI and issuing certificates to ANPs and IDPs.</t>
      <t>Operating a registration authority to a third party operated issuing intermediate certificate authority under WBA's PKI to enable certificates to be issued to ANPs and IDPs.</t>
    </list></t>
  </li></ul>
</li></ul>

<t>Closed Access Group (CAG):</t>

<ul empty="true"><li>
  <t>The definition of the 12 most significant bits of an OUI-36 RCOI to indicate OpenRoaming policy controls that
can be enforced by ANPs and IDPs.</t>
</li></ul>

<t>Identity Provider (IDP):</t>

<ul empty="true"><li>
  <t>An entity that has joined the federation and
includes the OpenRoaming RCOI(s) in the Passpoint profile of its end-user devices and
authenticates end-user devices on OpenRoaming ANP networks.</t>
</li></ul>

<t>Level of Assurance (LoA):</t>

<ul empty="true"><li>
  <t>An ISO/IEC 29115 term that is used to define equivalent levels for handling of end-user enrollment, credential management
and authentication amongst different IDPs.</t>
</li></ul>

<t>OpenRoaming-Settled:</t>

<ul empty="true"><li>
  <t>The "base RCOI" of BA-A2-D0 that is used to indicate that the ANP expects to receive payment for
providing OpenRoaming service to end-users.</t>
</li></ul>

<t>OpenRoaming-Settlement-Free:</t>

<ul empty="true"><li>
  <t>The "base RCOI" of 5A-03-BA that is used to indicate that the ANP provides the OpenRoaming service to end-users at
no cost to the IDP.</t>
</li></ul>

<t>Passpoint Profile:</t>

<ul empty="true"><li>
  <t>Passpoint is a Wi-Fi Alliance (WFA) certification program that defines the use a Passpoint profile, that includes the user's credentials
and the access network identifiers, to enables Wi-Fi devices to discover and authenticate to Wi-Fi hotspots
that provide Internet access <xref target="PASSPOINT"/>.</t>
</li></ul>

<t>PLMN Id:</t>

<ul empty="true"><li>
  <t>Is a unique identifier for a mobile network operator. The identifier consists of a MCC (Mobile Country Code) and a MNC (Mobile Network Code). <xref target="PASSPOINT"/> defines how the PLMN Id can be sent in ANQP messages.</t>
</li></ul>

<t>Roaming Consortium Identifier (RCOI):</t>

<ul empty="true"><li>
  <t>RCOI identifies the groups of identity providers that are supported by the network.
It is a 3-octet, or a 5-octet value carried in the 802.11 beacon information element (IE).
It is also sent in the ANQP messages. Based on the access technologies, the specific link-layer
protocols will be used for carrying the RCOI. RCOI is also part of the Passpoint profile.</t>
</li></ul>

<t>Subscriber Identity Module (SIM):</t>

<ul empty="true"><li>
  <t>The SIM is traditionally a smart card distributed by a mobile operator.</t>
</li></ul>

<t>WBA Identity (WBAID):</t>

<ul empty="true"><li>
  <t>A hierarchical namespace that is used to uniquely identify every OpenRoaming entity.</t>
</li></ul>

<t>Wireless Roaming Intermediary eXchange:</t>

<ul empty="true"><li>
  <t>A framework, aimed at facilitating
  interconnectivity between operators and the Wi-Fi roaming hub services.</t>
</li></ul>

</section>
</section>
<section anchor="wireless-broadband-alliance"><name>Wireless Broadband Alliance</name>

<t>The Wireless Broadband Alliance (WBA) defines the Wireless
Roaming Intermediary eXchange (WRIX) framework, aimed at facilitating
interconnectivity between Wi-Fi operators and the Wi-Fi roaming hub services,
as well as the Carrier Wi-Fi Services program that provides guidelines to
improve customer experience on Carrier Wi-Fi networks. Both of these
programs leverage the Wi-Fi Alliance specified Passpoint functionality
<xref target="PASSPOINT"/> to enable automatic and secure connectivity to Wi-Fi networks, allowing devices
to be provisioned with network access credentials with minimal user interaction.</t>

<t>WBA programs have traditionally focussed on "offloading"
cell phone data from cellular networks onto Wi-Fi networks.
Deployments of such systems have seen uneven
adoption across geographies, with cellular operators frequently limiting
their engagement to premier locations that have deployed Wi-Fi and experience
a significant footfall of operator's customers.</t>

<t>Whereas conventional Carrier Wi-Fi has focused on premier locations, the
last decade has seen a continued increase in the requirements of private Wi-Fi
networks to be able to serve visitors, contractors and guest users. Moreover, in
most of these scenarios, the Wi-Fi network is primarily being used to support some
alternative value proposition; an improved retail experience in a shopping
mall, a more efficient meeting in a carpeted office, a superior stay in a
hospitality venue, or a better fan experience in a sporting arena. Traditionally,
this segment has made wide-scale use of captive portals and unencrypted Wi-Fi links
to onboard end-users onto their networks <xref target="RFC8952"/>. However, the decreasing costs for cellular data means
end-users are less motivated to search out and attach to such "free" Wi-Fi
networks, and as a consequence, captive portal conversion rates continue to decrease.</t>

<t>As a consequence, in 2020 WBA launched its OpenRoaming federation,
designed to provide a better on-boarding experience to end-users, that is seamless, scalable and secure.</t>

</section>
<section anchor="orarch"><name>OpenRoaming Architecture</name>

<t><xref target="figwifiarch"/> contrasts a conventional carrier Wi-Fi roaming system with OpenRoaming.
As illustrated, conventional Wi-Fi roaming is typically based on:</t>

<t><list style="numbers">
  <t>IPSec <xref target="RFC6071"/> tunnels established between access networks, hub providers and identity providers used to protect exchanged signalling.</t>
  <t>Static routing of RADIUS signalling <xref target="RFC2865"/> based on realm routing tables populated according to agreements between access networks and hub providers.</t>
  <t>Passpoint primarily used with SIM based identifiers, where individual PLMN Ids are configured in the access networks WLAN equipment enabling them to be sent in ANQP messages, and cellular providers enable Passpoint based SIM authentication in end-user devices.</t>
  <t>EAP-AKA <xref target="RFC4187"/> based passpoint authentication exchanged between the Supplicant in the end-user device and the EAP Server in the cellular provider's network.</t>
  <t>A primary focus on carrier based identities where the end-user has a billing relationship with the carrier.</t>
</list></t>

<t>In contrast, OpenRoaming is based on:</t>

<t><list style="numbers">
  <t>RadSec signalling <xref target="RFC6614"/> secured using mTLS with certificates issued under WBA's private certificate authority.</t>
  <t>Dynamic routing of RADIUS based on DNS-based discovery of signalling peers <xref target="RFC7585"/></t>
  <t>Passpoint based network selection based on 36-bit Roaming Consortium Organization Identifiers (RCOIs), where WBA defines the use of 12-bits of the RCOI to embed closed access group policies.</t>
  <t>Passpoint authentication that can use any of the Passpoint defined EAP methods.</t>
  <t>Encompassing new identity providers who do not have a billing relationship with their end-users.</t>
</list></t>

<figure title="Contrasting Carrier Wi-Fi and OpenRoaming Architectures" anchor="figwifiarch"><artwork><![CDATA[
+---------+        +--------+        +--------+        +--------+              
| Visited |        | Wi-Fi  |        | Wi-Fi  |        |Cellular|              
|  Wi-Fi  |        |  Hub   |        |  Hub   |        |Provider|              
| Network |<------>|Provider|<------>|Provider|<------>|Network |              
|         | RADIUS |        | RADIUS |        | RADIUS |        |              
|   NAS   |        | RADIUS |        | RADIUS |        | RADIUS |              
|         |<------>| proxy  |<------>| proxy  |<------>| Server |              
|Passpoint| IPSec  +--------+ IPSec  +--------+ IPSec  +--------+              
|PLMNId(s)|                                                                    
+---------+                                                                    
    /|\                                                                        
     |                                                                         
    \|/                                                                        
+---------+         A) Conventional Carrier Wi-Fi                              
|Passpoint|                                                                    
| device  |                                                                    
|  with   |                                                                    
| PLMN-Id |                                                                    
| profile |                                                                    
+---------+                                                                    


+---------+                   +---+                    +--------+              
| Visited |<----------------->|DNS|<------------------>|Identity|              
|  Wi-Fi  |   DNS based peer  +---+  Configure NAPTR,  |Provider|              
| Network |      discovery            SRV and A/AAAA   |Network |              
|         |                              records       |        |              
|   NAS   |                                            | RADIUS |              
|         |<------------------------------------------>| Server |              
|Passpoint|        RadSec/TLS secured using mTLS       +--------+              
| RCOI(s) |               and WBA PKI                                          
+---------+                                                                    
    /|\                                                                        
     |                                                                         
    \|/                                                                        
+---------+              B) OpenRoaming                                        
|Passpoint|                                                                    
| device  |                                                                    
|  with   |                                                                    
| RCOI(s) |                                                                    
| profile |                                                                    
+---------+                                                                    

]]></artwork></figure>

</section>
<section anchor="wbaid"><name>Identifying OpenRoaming Entities</name>

<t>All OpenRoaming providers and OpenRoaming brokers are allocated a WBA Identity (WBAID). The
WBAID is defined to be transported in the RADIUS Operator-Name attribute (#126) <xref target="RFC5580"/>.
WBA has been allocated the Operator Namespace identifier 0x34 "4" to identify
an Operator-Name attribute carrying a WBAID.</t>

<t>The WBAID is a hierarchical namespace that comprises at its top level the
identity allocated by WBA to a WBA Member and is of the form shown in <xref target="figwbaid"/>
where the optional 2 upper case characters represent an ISO-3166 Alpha-2 country code <xref target="ISO3166"/> e.g.,
"WBAMEMBER:US".</t>

<figure title="ABNF definition of Primary WBAID Structure" anchor="figwbaid"><artwork><![CDATA[
upper-case-char = %x41-5a
member-id       = 1*upper-case-char
wbaid           = member-id [ %x3a 2*2upper-case-char]

]]></artwork></figure>

<t>When operating as an OpenRoaming broker, the WBA Member
is able to allocate subordinate identities to OpenRoaming providers
who are not WBA members by pre-pending a subordinate identity ,
plus "." (%x2e) to the Member's WBAID, e.g., "OPENROAMINGPROVIDER.WBAMEMBER:US".
In this way, any receiving entity of a WBAID can identify the WBA Member who
is acting as an OpenRoaming broker to the provider by assigning it an identity.</t>

</section>
<section anchor="sss"><name>Scaling Secured Signalling</name>

<t>As described in <xref target="legal"/>, the OpenRoaming legal framework does not assume
any direct relationship between ANP and IDP. In order to scale the
secured signalling between providers, the federation makes use of a
Public Key Infrastructure using a private Certificate Authority specifically
designed to secure the operations of the roaming federation. WBA
and its members have published the WBA Certificate Policy that defines the
policies which govern the operations of the PKI components by all
individuals and entities within the infrastructure. The OID for Wireless
Broadband Alliance is:</t>

<t>{ iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) The Wireless Broadband Alliance(14122) }</t>

<t>The Wireless Broadband Alliance organizes its OID arcs for the Certificates
Policy Documents using the object identifier 1.3.6.1.4.1.14122.1.1. At the time of writing,
the current certificate policy is 1.3.6.1.4.1.14122.1.1.6.</t>

<t>This Certificate Policy is based on a 4-level hierarchy, as illustrated below.</t>

<figure title="OpenRoaming PKI Hierarchy" anchor="figpki"><artwork><![CDATA[
+---------+---------------------------+----------------------------+
|         |                           |                            |
| Level   | Description               |  Comment                   |
|         |                           |                            |
+---------+---------------------------+----------------------------+
| Level 1 | OpenRoaming Root          | Operation managed by WBA   |
|         | Certificate Authority     |                            |
+---------+---------------------------+----------------------------+
| Level 2 | OpenRoaming Policy        | Operation managed by WBA.  |
|         | Intermediate Certificate  | Instantiates WBA policy OID|
|         | Authority                 |                            |
+---------+---------------------------+----------------------------+
| Level 3 | OpenRoaming Issuing       | Operated by an OpenRoaming |
|         | Intermediate Certificate  | broker                     |
|         | Authority                 |                            |
+---------+---------------------------+----------------------------+
| Level 3 | OpenRoaming Registration  | Optional and when used,    |
|         | Authority                 | operated by an OpenRoaming |
|         |                           | broker                     |
+---------+---------------------------+----------------------------+
| Level 4 | OpenRoaming Entity        | A WBA member or non-member.|
|         |                           | WBA's Certificate Policy   |
|         |                           | requires the Entity's      |
|         |                           | WBAID is included in the   |
|         |                           | Subject UID field in the   |
|         |                           | certificate.               |
+---------+---------------------------+----------------------------+

]]></artwork></figure>

<t>Certificates issued under the WBA PKI are used by Entities to perform mutual
authentication with other Entities and to secure RadSec
signalling <xref target="RFC6614"/> that carries EAP-based Passpoint authentication. This is typically between a
RadSec client in the OpenRoaming ANPs network and an RadSec Server in the OpenRoaming
IDPs network, although a provider can decide to outsource the operation of the RadSec
endpoint to a third party provider.</t>

</section>
<section anchor="dpd"><name>IDP Discovery</name>

<section anchor="dynamic-discovery"><name>Dynamic Discovery</name>

<t>OpenRoaming defines the use of dynamic discover <xref target="RFC7585"/> by which an ANP discovers the
IP address of the IDP's RadSec server.</t>

</section>
<section anchor="discovery-of-eap-akaaka-servers"><name>Discovery of EAP-AKA/AKA' Servers</name>

<t>Passpoint defines the use of EAP-AKA' based authentication <xref target="RFC5448"/> which uses the
3GPP 23.003 <xref target="TS23003"/> defined realm of wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.3gppnetwork.org, where
&lt;mcc&gt; represent an E.212 Mobile Country Code and &lt;mnc&gt; represents the E.212
Mobile Network Code allocated to the IDP. GSMA is responsible for
operating the 3gppnetwork.org domain and GSMA IR.67 <xref target="GSMAIR67"/> limits access to
the DNS systems supporting such records to those systems connected to the inter-PLMN IP
backbone (known as "GRX/IPX"). As OpenRoaming ANPs do not connect to this inter-PLMN backbone,
then conventional realm based lookup cannot be used over the Internet to discover the RadSec server
supporting EAP-AKA' authentication.</t>

<t>GSMA IR.67 does allow systems to be discoverable
from the public Internet, specifically calling out the use of the
pub.3gppnetwork.org domain name for such procedures. In order for ANPs
to dynamically discover the RadSec server supporting EAP-AKA' authentication,
GSMA has defined the use of the wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org by
OpenRoaming systems. This means that whenever a RadSec client receives a user-name
containing an NAI formatted as user@wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.3gppnetwork.org, the dynamic
peer detection functionality MUST insert ".pub" into the realm and perform
DNS based dynamic discovery using the wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org
domain name. The RADIUS user-name attribute MUST NOT be similarly modified.</t>

<t>IR.67 defines the procedure by which a cellular operator can request the delegation
of their mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org.  GSMA PRD IR.67 also allows an MNO
to delegate the entire mnc&lt;MNC&gt;.mcc&lt;MCC&gt;.pub.3gppnetwork.org sub-domain
which could have already occurred, e.g., to enable use of the
epdg.mnc&lt;MNC&gt;.mcc&lt;MCC&gt;.pub.3gppnetwork.org used with 3GPP's Wi-Fi calling service. Using this approach,
a cellular operator operating as an OpenRoaming IDP can authenticate their end-users on
third party ANP Wi-Fi networks.</t>

</section>
<section anchor="proving-a-discovered-radsec-server-is-authoritative-for-a-realm"><name>Proving a discovered RadSec server is authoritative for a realm</name>

<t>The OpenRoaming preferred approach to dynamically discover the RadSec server
IP address serving a particular realm or set of realms is to
use DNS records that are protected with DNSSEC <xref target="RFC4035"/>. However, GSMA
have not enabled DNSSEC on their 3gppnetwork.org domain, meaning that DNSSEC
cannot be applied on the publicly resolvable domains under pub.3gppnetwork.org.
Because of this situation, OpenRoaming does not currently mandate operation of DNSSEC.</t>

<t>If the DNS records for a realm are not protected with DNSSEC, because the realm
has been provided directly by the OpenRoaming End-User, the
IDP SHOULD ensure that the discovered RadSec server(s) supporting its realm(s)
is/are configured with a WBA-PKI server certificate that includes the realm(s)
used in the dynamic peer detection in the certificate SubjectAltName.</t>

<t>Where the DNS records are protected with DNSSEC, the IDP SHOULD ensure that
the discovered RadSec server(s) supporting its realm(s)
is/are configured with a WBA-PKI server certificate that includes the
derived name(s) from the secured DNS NAPTR/SRV query in the
certificate SubjectAltName.</t>

<t>Where the OpenRoaming IDP has offloaded the operation of RadSec termination to a
third party hub-provider that is responsible for supporting a number of independent realms,
the hub-provider SHOULD ensure that the discovered RadSec server(s) supporting
the independent realms from its partner IDPs
is/are configured with a WBA-PKI server certificate that includes the
derived name(s) from the DNS NAPTR/SRV query in the
certificate SubjectAltName.</t>

</section>
</section>
<section anchor="PASSPOINT-SEC"><name>OpenRoaming Passpoint Profile</name>

<section anchor="openroaming-policy-controls"><name>OpenRoaming Policy Controls</name>

<t>In order to avoid possible fragmentation of roaming federations, OpenRoaming recognizes
that there is a need to permit OpenRoaming to be integrated into a variety of
different use-cases and value propositions. These use-cases include scenarios where
providers are able to enforce policy controls of which end-users are authorized to access the service.
The realization of authorization policy controls in the OpenRoaming federation is a balance
between the requirements for fine grain policy enforcement versus the potential
impact of policy enforcement on the user experience.</t>

<t>Such a level of control is realized using Closed Access Group (CAG) based policies.
A Closed Access Group identifies a group of OpenRoaming users who are permitted
to access one or more OpenRoaming access networks configured with a particular CAG policy.
These Closed Access Group policies are encoded using one or more
Roaming Consortium Organization Identifiers (RCOIs), first defined
in Passpoint Release 1.0, and well supported
across the smartphone device ecosystem.</t>

<t>Note, encoding CAG policies in OpenRoaming using one or more RCOIs is aimed at
delivering an equivalent functionality to the CAG policies encoded in 3GPP using one or more CAG-IDs.</t>

</section>
<section anchor="CAG"><name>OpenRoaming Closed Access Group Policies</name>

<t>OpenRoaming defines the use of multiple RCOIs to facilitate the implementation of
closed access group policies across the federation. The currently defined RCOIs are:</t>

<t><list style="symbols">
  <t>OpenRoaming-Settled:  BA-A2-D0-xx-x</t>
  <t>OpenRoaming-Settlement-Free:  5A-03-BA-xx-x</t>
</list></t>

<t><xref target="figrcoi"/> shows how the 24-bit length OpenRoaming RCOIs are further extended into 36-bit length OUI-36s
with additional context dependent identifiers used to encode specific closed access group
policies. Following Passpoint Release 1.0 specification, only when there is a bitwise match of
all 36 bits of the configured RCOI in the WLAN equipment and the Passpoint profile configured in the
end-user device will an EAP authentication be triggered.</t>

<t>The encoding of closed access group policies is defined so that the "no-restrictions" policy is
encoded using the 12-bit value "00-0", i.e., 54-03-BA-00-0 represents a policy
that accepts all OpenRoaming settlement-free users onto a particular ANP installation.</t>

<figure title="Extension of Octets 4 and 5 for OpenRoaming Context Dependent RCOI Field " anchor="figrcoi"><artwork><![CDATA[
+---------------------------------------+-------------------+
|               OUI-36 Octet 4          |  OUI-36 Octet 5   |
+---------------------------------------+-------------------+
| B7 | B6 | B5 | B4 | B3 | B2 | B1 | B0 | B7 | B6 | B5 | B4 |
+----+---------+----+-------------------+-------------------+
| LoA|   QoS   |PID |     ID-Type       |Reserved - set to 0|
+----+---------+----+-------------------+-------------------+

]]></artwork></figure>

<section anchor="level-of-assurance-policies"><name>Level of Assurance Policies</name>

<t>The format of the Level of Assurance (LoA) field is as shown in <xref target="figloa"/>.</t>

<figure title="OpenRoaming CAG LoA Field " anchor="figloa"><artwork><![CDATA[
+------------------------------------------------------------+
|  LoA Field  |           Description                        |
+------------------------------------------------------------+
|     B7      |                                              |
+------------------------------------------------------------+
|     0       |   Baseline Identity Proofing                 |
+------------------------------------------------------------+
|     1       |   Enhanced Identity Proofing                 |
+------------------------------------------------------------+

]]></artwork></figure>

<t>The baseline identity proofing requirement on IDPs ensures that all
OpenRoaming identities are managed with at least a medium level of
assurance (LoA level 2) for end-user enrollment, credential management
and authentication, as specified in ISO/IEC 29115 <xref target="ISO29115"/>.</t>

<t>Any IDP that manages its identities according to ISO/IEC 29115 LoA level 2
MUST NOT configure any RCOI in their end-users' Passpoint profile
with the LoA field set to "1". Conversely, an IDP that manages its identities
according to ISO/IEC 29115 LoA level 3 MAY configure multiple RCOIs
in their end-users' Passpoint profile, including RCOIs with the LoA field
set to "0" and RCOIs with the LoA field set to "1".</t>

<t>The LoA field is used to support ANPs which operate in regulatory
regimes that require enhanced identity proofing to be used in the
provision of credentials on OpenRoaming devices, equivalent to LoA level
3 in ISO/IEC29115 <xref target="ISO29115"/>. In such a scenario, the ANP can set the LoA bit
field to 1 in all configured RCOIs to ensure that only identities
provisioned using enhanced LoA 3 procedures can access via the ANP's network.</t>

</section>
<section anchor="quality-of-service-policies"><name>Quality of Service Policies</name>

<t>One of the challenges faced by users of Wi-Fi hotspots is when the Wi-Fi network
is configured sub-optimally and results in a poor user experience. Often the only
remedy open to a user it to disable the Wi-Fi interface on their smartphone and
continue to use cellular data. This is especially the case where the Wi-Fi hotspot
has been automatically selected with no user intervention. As a consequence, OpenRoaming defines specific
service tiers across the federation and uses the QoS field to differentiate between different tiers.
The format of the QoS field is shown in <xref target="figqos"/>.</t>

<figure title="OpenRoaming CAG QoS Field " anchor="figqos"><artwork><![CDATA[
+------------------------------------------------------------+
|            QoS Field              |      Description       |
+------------------------------------------------------------+
|        B6       |        B5       |                        |
+------------------------------------------------------------+
|        0        |        0        |        Bronze          |
+------------------------------------------------------------+
|        0        |        1        |        Silver          |
+------------------------------------------------------------+
|        1        |        0        |       Reserved         |
+------------------------------------------------------------+
|        1        |        1        |       Reserved         |
+------------------------------------------------------------+
]]></artwork></figure>

<t>The "Bronze" and "Silver" values of QoS field are used to identify
specific quality of service policy aspects.</t>

<t>The bronze service tier corresponds to the following:</t>

<t><list style="numbers">
  <t>The availability of OpenRoaming service
when used to access the Internet measured during scheduled operations
across the ANP's network exceeds 90% over any one month period.</t>
  <t>The aggregate bandwidth used to receive
Internet service on the ANP's network is sufficient to enable
each and every authenticated and authorized OpenRoaming end-user to simultaneously receive a
sustained 256 kilobits per second connection.</t>
</list></t>

<t>The silver service tier corresponds to the following:</t>

<t><list style="numbers">
  <t>The availability of OpenRoaming service
when used to access the Internet measured during scheduled operations
across the ANP's network exceeds 95% over any one month period.</t>
  <t>The aggregate bandwidth used to receive
Internet service on the ANP's network is be sufficient to enable
each and every authenticated and authorized end-user to receive a
sustained 512 kilobits per second connection.</t>
  <t>At least 10% of authenticated and authorized users are able
to stream video content at a downlink rate of at least 5 megabits per
second (when measured over a one-minute interval) over all of the ANP's
OpenRoaming enabled Wi-Fi networks.</t>
  <t>The authenticated and authorized end-users are
able to stream video from one or more third party content distribution
networks with an end-to-end latency of less than 150ms from all of the
ANP's OpenRoaming enabled Wi-Fi networks.</t>
</list></t>

<t>The QoS field can be used by those IDPs that are only interested in providing
their end-users with a higher quality service level when automatically authenticated
onto an OpenRoaming network. For example, an IDP configures the QoS field
as bronze in a Passpoint profile that uses the "5A-03-BA" settlement free RCOI and
configures the QoS field as silver in a Passpoint profile that uses the
"BA-A2-D0" OpenRoaming-settled paid service.</t>

<t>ANPs that only support the bronze service tier MUST set the QoS Field to "00" in
all RCOIs configured on their WLAN equipment. ANPs that support the silver service
tier MAY configure multiple RCOIs on their WLAN equipment that include values where
the QoS field is set to "01" and values where the QoS field is set to "00".</t>

<t>Exceptionally, ANPs that operate OpenRoaming installations on moving platforms
are permitted to deviate from normal OpenRoaming service level requirements. This is
because such installations may necessitate use of cellular-based backhaul and/or
backhaul via Non-Terrestrial Networks (NTN) which may not be able to meet the
OpenRoaming minimum "bronze" service level requirements.
If an ANP wants to benefit from such deviations, it MUST signal using the WLAN-Venue-Info
attribute <xref target="RFC7268"/> that it is operating in a venue category identified using
a Venue Group value of "10", which is defined in Section 8.4.1.34 of <xref target="IEEE80211"/>
as being used for vehicular installations. In such cases, the OpenRoaming ANP MAY
signal one or more WBA-Custom-SLA vendor specific attributes <xref target="WBAVSA"/> to indicate
one or more (availability, per-user sustained bandwidth) tuples to the IDP.</t>

</section>
<section anchor="privacy-policies"><name>Privacy Policies</name>

<t>The baseline privacy policy of OpenRoaming ensures
the identities of end-users remain anonymous when using the
service. The WBA WRIX specification specifies that where supplicants use EAP methods
that support user-name privacy, i.e., which are compatible with the "@realm" (or "anonymous@realm") (outer) EAP-Identifier,
then the supplicant SHOULD use the anonymized outer EAP identifier. Supplicants supporting
other EAP methods SHOULD support EAP method specific techniques for masking the
end-user's permanent identifier, for example pseudonym support in EAP-AKA/AKA' <xref target="RFC4187"/>
and/or enhanced IMSI privacy protection <xref target="WBAEIPP"/>. OpenRoaming IDPs SHOULD support and
enable the corresponding server-side functionality to ensure end-user privacy is protected.</t>

<t>The WBA WRIX specification also recognizes that the privacy of end-users can be
unintentionally weakened by the use of correlation identifiers signalled using the
Chargeable-User-Identity attribute (#89) <xref target="RFC4372"/> and/or the Class attribute (#25) <xref target="RFC2865"/>
in the RADIUS Access-Accept packet. The WBA WRIX Specification recommends that the
default IDP policy SHOULD ensure that, when used, such correlation identifiers are unique for
each combination of end-user/ANP and that the keys and/or initialization vectors
used in creating such correlation identifiers SHOULD be refreshed at least every 48 hours,
but not more frequently than every 2 hours.</t>

<t>This 2 hour limit is designed to assist the ANP in performing autonomous troubleshooting
of connectivity issues from authentic users/devices that are repeatedly re-initiating
connectivity to the ANP's network and/or to assist the ANP in identifying a new session
originated by an authentic user/device that has previously been identified by the ANP as having violated the OpenRoaming
end-user terms and conditions. When using typical public Wi-Fi session durations, it is
estimated that, with this 2 hour restriction, the ANP will be able to correlate an
Access-Request/Access-Accept exchange that immediately follows an Accounting-Request
stop message in over 50% of the sessions.</t>

<t>In contrast to this default policy, there can be scenarios where the ANP
desires to derive value from its OpenRoaming settlement-free service by analysing
aggregate end-user behaviour. Whereas the use of aggregated end-user information does not
violate the OpenRoaming privacy policy, the derivation of such can benefit from the
ANP being able to uniquely identify end-users. In order to support such scenarios, the
OpenRoaming closed access group policies include the PID field.</t>

<t>The PID field can be used to support scenarios where the user has consented
with their IDP that an immutable end-user identifier can be signalled to the
ANP in the RADIUS Access-Accept. The format of the PID field is
illustrated in <xref target="figpid"/>. The PID
field can be configured to "1" in the RCOIs used by those ANPs that
want to be be able to account for unique OpenRoaming end-users.</t>

<t>The OpenRoaming IDP terms ensure subscribers MUST
explicitly give their permission before an immutable end-user identity
is shared with a third party ANP. When such permission has
not been granted, an IDP MUST NOT set the PID field to "1" in any
of the RCOIs in its end-user Passpoint profiles. When such permission has
been granted, an IDP MAY configure multiple RCOIs
in their end-users' Passpoint profile, including RCOIs with the PID field
set to "0" and RCOIs with the PID field set to "1".</t>

<figure title="OpenRoaming CAG PID Field " anchor="figpid"><artwork><![CDATA[
+------------------------------------------------------------+
|  PID Field  |           Description                        |
+------------------------------------------------------------+
|     B4      |                                              |
+------------------------------------------------------------+
|     0       |   Baseline ID Policy applies, i.e., users    |
|             |   remain anonymous whilst using the service. |
+------------------------------------------------------------+
|     1       |   An immutable end-user ID will be returned  |
|             |   by the IDP in the Access-Accept packet.    |
+------------------------------------------------------------+

]]></artwork></figure>

</section>
<section anchor="id-type-policies"><name>ID-Type Policies</name>

<t>The ID-Type field can be used to realize policies which are based
on the business sector associated with the identity used by the IDP.
The format of the ID-Type
field is illustrated in <xref target="figidtype"/>.</t>

<t>All IDPs configure at least one RCOI in their end-user's
Passpoint profile with ID-Type set to "0000" (Any identity type is permitted).
An IDP MAY configure additional RCOIs in their end-users' Passpoint profile
with an ID-Type representing the sector type of IDP.</t>

<t>An ANP what wants to serve all end-users, irrespective of sector,
configures RCOIs in the WLAN equipment with ID-Type set to "0000".
Alternatively, an ANP which operates a sector specific business that
only desires to serve a subset of OpenRoaming end-users MAY set the ID-Type
to their desired sector in all configured RCOIs.</t>

<figure title="OpenRoaming CAG ID-Type Field " anchor="figidtype"><artwork><![CDATA[
+------------------------------------------------------------+
|       ID-Type Field       |              Description       |
+------------------------------------------------------------+
|  B3  |  B2  |  B1  |  B0  |                                |
+------------------------------------------------------------+
|  0   |  0   |  0   |  0   | Any identity type is permitted |
+------------------------------------------------------------+
|  0   |  0   |  0   |  1   | A service provider identity    |
+------------------------------------------------------------+
|  0   |  0   |  1   |  0   | A cloud provider identity      |
+------------------------------------------------------------+
|  0   |  0   |  1   |  1   | A generic enterprise identity  |
+------------------------------------------------------------+
|  0   |  1   |  0   |  0   | A government identity, e.g.,   |
|      |      |      |      | including city                 |
+------------------------------------------------------------+
|  0   |  1   |  0   |  1   | An automotive identity         |
+------------------------------------------------------------+
|  0   |  1   |  1   |  0   | A hospitality identity         |
+------------------------------------------------------------+
|  0   |  1   |  1   |  1   | An aviation industry identity  |
+------------------------------------------------------------+
|  1   |  0   |  0   |  0   | An education or research       |
|      |      |      |      | identity                       |
+------------------------------------------------------------+
|  1   |  0   |  0   |  1   | A cable industry identity      |
+------------------------------------------------------------+
|  1   |  0   |  1   |  0   | A manufacturer identity        |
+------------------------------------------------------------+
|  1   |  0   |  1   |  1   | A retail identity              |
+------------------------------------------------------------+
|        other values       | Reserved                       |
+------------------------------------------------------------+
]]></artwork></figure>

</section>
</section>
<section anchor="prioritizing-policies"><name>Prioritizing Policies</name>

<t>The  definition of OpenRoaming closed access group policies assumes
the configuration of multiple RCOIs in ANP WLAN equipment and IDP end-user devices.</t>

<t>When a device has multiple Passpoint profiles matching the ANP's RCOI policy,
an OpenRoaming ANP may want to prefer OpenRoaming subscribers use a particular IDP's
profile when attaching to its access network. Such a preference can be because
the OpenRoaming ANP has a preferential relationship with certain OpenRoaming IDPs.</t>

<t>The OpenRoaming ANP is able to use the Home SP preference functionality defined in
Passpoint <xref target="PASSPOINT"/> to prioritize the use of a particular profile by a Passpoint enabled device.
In such a scenario, the ANP configures the Domain Name list to include the
FQDN(s) associated with the profile(s) to be prioritized.</t>

</section>
</section>
<section anchor="RADIUS"><name>OpenRoaming RADIUS Profile</name>

<t>The OpenRoaming RADIUS profile is based on the WBA WRIX Specification which in turn
are derived from <xref target="RFC3580"/> and <xref target="RFC3579"/>.</t>

<t>Additionally, OpenRoaming defines the use of the following RADIUS attributes.</t>

<section anchor="operator-name"><name>Operator-Name</name>

<t>As described in <xref target="wbaid"/>, OpenRoaming uses the Operator-Name (#126) <xref target="RFC5580"/> attribute to signal
the WBAID of the OpenRoaming ANP. All ANPs MUST support the Operator-Name attribute and use it to signal the
WBAID of the OpenRoaming ANP.</t>

</section>
<section anchor="chargeable-user-identity"><name>Chargeable-User-Identity</name>

<t>All OpenRoaming ANPs MUST support the Chargeable-User-Identity attribute (#89) <xref target="RFC4372"/> and
indicate such by including a CUI attribute in all RADIUS Access-Request packets.</t>

<t>When an end-user has explicitly given their permission to share an immutable end-user identifier
with third party ANPs, the CUI returned by the IDP is invariant over subsequent
end-user authentication exchanges between the IDP and the ANP.</t>

</section>
<section anchor="location-datalocation-information"><name>Location-Data/Location-Information</name>

<t>All OpenRoaming ANPs MUST support signalling of location information using <xref target="RFC5580"/>.
As a minimum, all OpenRoaming IDPs need to be able to determine the country in which the
OpenRoaming ANP operates. The OpenRoaming legal framework described in <xref target="legal"/> serves as an "out-of-band agreement" as
specified in clause 3.1 of <xref target="RFC5580"/>. Hence, all OpenRoaming ANPs MUST include the Location-Data
attribute (#128) in RADIUS Access-Request packet where the location profile is the civic location profile
that includes the country code where the ANP is located in all Access-Request packets
<xref target="RFC5580"/>.</t>

<t>When the OpenRoaming ANP supports the OpenRoaming-Settled RCOI ("BA-A2-D0"),
the Location-Data attribute (#128) MUST be included where the location profile
is the civic location profile containing Civic Address Type information that
is sufficient to identify the financial regulatory regime that defines the
taxable rates associated with consumption of the ANP's service.</t>

<t>OpenRoaming also defines the optional use the geospatial location profile as specified in
<xref target="RFC5580"/>. ANPs MAY signal coordinate-based geographic location of
the NAS or end-user device and this information MAY be used by IDPs, e.g.,
in their authorization decisions.</t>

</section>
<section anchor="wba-identity-provider"><name>WBA-Identity-Provider</name>

<t>The Operator-Name attribute allows the WBAID of the ANP to be signalled to the IDP.
In the reverse direction, the IDP MUST use the WBA-Identity-Provider vendor
specific attribute <xref target="WBAVSA"/> to signal the WBAID of the IDP back to the ANP.</t>

</section>
<section anchor="wba-offered-service"><name>WBA-Offered-Service</name>

<t>The ANP MAY use the WBA-Offered-Service vendor specific attribute to signal the
highest OpenRoaming service tier supported on its network <xref target="WBAVSA"/>.</t>

</section>
<section anchor="wlan-venue-info"><name>WLAN-Venue-Info</name>

<t>The ANP MAY use the WLAN-Venue-Info attribute <xref target="RFC7268"/> to signal the
category of venue hosting the WLAN.</t>

</section>
<section anchor="wba-custom-sla"><name>WBA-Custom-SLA</name>

<t>When the ANP uses the WLAN-Venue-Info attribute to signal that the venue
hosting the WLAN is a vehicular installation, the  ANP MAY use the
WBA-Custom-SLA vendor specific attribute <xref target="WBAVSA"/> to indicate
one or more (availability, per-user sustained bandwidth) tuples to the IDP.</t>

</section>
<section anchor="additional-attributes-related-to-openroaming-settled"><name>Additional attributes related to OpenRoaming settled</name>

<t>OpenRoaming settled defines the use of additional RADIUS attributes.</t>

<section anchor="wba-financial-clearing-provider"><name>WBA-Financial-Clearing-Provider</name>

<t>All OpenRoaming ANPs and IDPs that support the OpenRoaming settled service
MUST use the WBA-Financial-Clearing-Provider vendor specific attribute to signal
the  identity of the provider of financial clearing services <xref target="WBAVSA"/>.</t>

</section>
<section anchor="wba-data-clearing-provider"><name>WBA-Data-Clearing-Provider</name>

<t>All OpenRoaming ANPs and IDPs that support the OpenRoaming settled service MAY
use the WBA-Data-Clearing-Provider vendor specific attribute to signal
the  identity of the provider of data clearing services <xref target="WBAVSA"/>.</t>

</section>
<section anchor="wba-linear-volume-rate"><name>WBA-Linear-Volume-Rate</name>

<t>In cellular roaming, inter-operator tariff information is exchanged in
the roaming agreements between operators. In OpenRoaming, as there is no
direct agreement between ANPs and IDPs, the tariff information is
exchanged in RADIUS messages. All OpenRoaming ANPs that support
the OpenRoaming settled service MUST use the WBA-Linear-Volume-Rate
vendor specific attribute to signal the charging model being offered
by the ANP <xref target="WBAVSA"/>. An IDP that authorizes an offered charging model MUST include
the agreed WBA-Linear-Volume-Rate in the Access-Accept packet.</t>

</section>
</section>
</section>
<section anchor="Security"><name>Security Considerations</name>

<section anchor="network-selection-and-triggering-authentication"><name>Network Selection and Triggering Authentication</name>

<t>OpenRoaming defines the use of Passpoint with Roaming Consortium Organization Identifiers.
A bit-wise match between an RCOI configured in the Passpoint profile of an end-user's device and the RCOI signalled
by WLAN equipment will trigger a Passpoint defined EAP-based authentication exchange.
The security associated with the Passpoint RCOI
information element is identical to other PLMN Id and Realm information elements, allowing an
unauthorized system to configure the OpenRoaming RCOI with the aim of triggering a Passpoint authentication.
Because such an unauthorized system will not have been issued with a certificate using WBA's PKI, the
unauthorized system is unable to communicate with any other OpenRoaming provider.
In such a scenario, after successive multiple failed authentications, the device's supplicant
SHOULD add the Access Point's BSSID to a deny list
to avoid future triggering of an authentication exchange with the unauthorized system.</t>

</section>
<section anchor="dynamic-discovery-of-radsec-peers"><name>Dynamic Discovery of RadSec Peers</name>

<t>OpenRoaming recommends the use of DNSSEC to ensure a dynamically discovered RadSec server
is authoritative for a particular realm or set of realms. Where this is not possible, e.g.,
when using dynamic resolution with the pub.3gppnetwork.org sub-domain, the OpenRoaming
certificate policy permits the configuration of supported realm(s) in the SubjectAltName
of the certificate(s) issued to the IDP.</t>

<t>An ANP can decide to continue with the RadSec establishment, even if a server cannot prove it is
authoritative for a realm. As the ANP's RadSec client uses a dedicated trust store corresponding to the WBA's private Certificate
Authority, if DNS is hijacked by a third-party non-federation member
who has not been issued a certificate under WBA's PKI, the subsequent TLS establishment will fail.</t>

</section>
<section anchor="end-user-traffic"><name>End-User Traffic</name>

<t>The OpenRoaming federation ensures RADIUS traffic is secured between ANP and IDP and ensures Wi-Fi traffic is protected
between the end-user device and the WLAN equipment of the ANP. The ANP is therefore able to observe IP
traffic to/from end-users who have performed a successful authentication with their IDP. The OpenRoaming legal framework (see <xref target="legal"/>) ensures that the ANP has agreed to the OpenRoaming Privacy Policy <xref target="ORPRIVACY"/> to correctly handle the personally identifiable information collected
as part of providing the ANP service.</t>

<t>The Open-Roaming end-user terms and conditions <xref target="ORTERMS"/> ensure that end-users are aware that the federation does not provide a
secure end-to-end service. The end-user MUST NOT rely on the encryption delivered by OpenRoaming for providing security of services accessed using the ANP's Wi-Fi network.</t>

</section>
</section>
<section anchor="future-enhancements"><name>Future Enhancements</name>

<t>WBA announced the launch of its OpenRoaming Federation in June 2020. Since then, WBA members have continued to enhance the technical framework to address new market requirements that are reflected in the Closed Access Group policies described in <xref target="CAG"/> and the RADIUS profile described in <xref target="RADIUS"/>. WBA encourages those parties interested in adapting OpenRoaming to address new requirements to join the Alliance and help drive the definition of OpenRoaming forward.</t>

</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>



<reference anchor='RFC2865' target='https://www.rfc-editor.org/info/rfc2865'>
  <front>
    <title>Remote Authentication Dial In User Service (RADIUS)</title>
    <author fullname='C. Rigney' initials='C.' surname='Rigney'/>
    <author fullname='S. Willens' initials='S.' surname='Willens'/>
    <author fullname='A. Rubens' initials='A.' surname='Rubens'/>
    <author fullname='W. Simpson' initials='W.' surname='Simpson'/>
    <date month='June' year='2000'/>
    <abstract>
      <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='2865'/>
  <seriesInfo name='DOI' value='10.17487/RFC2865'/>
</reference>

<reference anchor='RFC3579' target='https://www.rfc-editor.org/info/rfc3579'>
  <front>
    <title>RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)</title>
    <author fullname='B. Aboba' initials='B.' surname='Aboba'/>
    <author fullname='P. Calhoun' initials='P.' surname='Calhoun'/>
    <date month='September' year='2003'/>
    <abstract>
      <t>This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms. In the proposed scheme, the Network Access Server (NAS) forwards EAP packets to and from the RADIUS server, encapsulated within EAP-Message attributes. This has the advantage of allowing the NAS to support any EAP authentication method, without the need for method- specific code, which resides on the RADIUS server. While EAP was originally developed for use with PPP, it is now also in use with IEEE 802. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='3579'/>
  <seriesInfo name='DOI' value='10.17487/RFC3579'/>
</reference>

<reference anchor='RFC3580' target='https://www.rfc-editor.org/info/rfc3580'>
  <front>
    <title>IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines</title>
    <author fullname='P. Congdon' initials='P.' surname='Congdon'/>
    <author fullname='B. Aboba' initials='B.' surname='Aboba'/>
    <author fullname='A. Smith' initials='A.' surname='Smith'/>
    <author fullname='G. Zorn' initials='G.' surname='Zorn'/>
    <author fullname='J. Roese' initials='J.' surname='Roese'/>
    <date month='September' year='2003'/>
    <abstract>
      <t>This document provides suggestions on Remote Authentication Dial In User Service (RADIUS) usage by IEEE 802.1X Authenticators. The material in this document is also included within a non-normative Appendix within the IEEE 802.1X specification, and is being presented as an IETF RFC for informational purposes. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='3580'/>
  <seriesInfo name='DOI' value='10.17487/RFC3580'/>
</reference>

<reference anchor='RFC3748' target='https://www.rfc-editor.org/info/rfc3748'>
  <front>
    <title>Extensible Authentication Protocol (EAP)</title>
    <author fullname='B. Aboba' initials='B.' surname='Aboba'/>
    <author fullname='L. Blunk' initials='L.' surname='Blunk'/>
    <author fullname='J. Vollbrecht' initials='J.' surname='Vollbrecht'/>
    <author fullname='J. Carlson' initials='J.' surname='Carlson'/>
    <author fullname='H. Levkowetz' initials='H.' role='editor' surname='Levkowetz'/>
    <date month='June' year='2004'/>
    <abstract>
      <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees. Fragmentation is not supported within EAP itself; however, individual EAP methods may support this. This document obsoletes RFC 2284. A summary of the changes between this document and RFC 2284 is available in Appendix A. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='3748'/>
  <seriesInfo name='DOI' value='10.17487/RFC3748'/>
</reference>

<reference anchor='RFC4035' target='https://www.rfc-editor.org/info/rfc4035'>
  <front>
    <title>Protocol Modifications for the DNS Security Extensions</title>
    <author fullname='R. Arends' initials='R.' surname='Arends'/>
    <author fullname='R. Austein' initials='R.' surname='Austein'/>
    <author fullname='M. Larson' initials='M.' surname='Larson'/>
    <author fullname='D. Massey' initials='D.' surname='Massey'/>
    <author fullname='S. Rose' initials='S.' surname='Rose'/>
    <date month='March' year='2005'/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4035'/>
  <seriesInfo name='DOI' value='10.17487/RFC4035'/>
</reference>

<reference anchor='RFC4187' target='https://www.rfc-editor.org/info/rfc4187'>
  <front>
    <title>Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)</title>
    <author fullname='J. Arkko' initials='J.' surname='Arkko'/>
    <author fullname='H. Haverinen' initials='H.' surname='Haverinen'/>
    <date month='January' year='2006'/>
    <abstract>
      <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card.</t>
      <t>EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4187'/>
  <seriesInfo name='DOI' value='10.17487/RFC4187'/>
</reference>

<reference anchor='RFC4372' target='https://www.rfc-editor.org/info/rfc4372'>
  <front>
    <title>Chargeable User Identity</title>
    <author fullname='F. Adrangi' initials='F.' surname='Adrangi'/>
    <author fullname='A. Lior' initials='A.' surname='Lior'/>
    <author fullname='J. Korhonen' initials='J.' surname='Korhonen'/>
    <author fullname='J. Loughney' initials='J.' surname='Loughney'/>
    <date month='January' year='2006'/>
    <abstract>
      <t>This document describes a new Remote Authentication Dial-In User Service (RADIUS) attribute, Chargeable-User-Identity. This attribute can be used by a home network to identify a user for the purpose of roaming transactions that occur outside of the home network. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4372'/>
  <seriesInfo name='DOI' value='10.17487/RFC4372'/>
</reference>

<reference anchor='RFC5448' target='https://www.rfc-editor.org/info/rfc5448'>
  <front>
    <title>Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA')</title>
    <author fullname='J. Arkko' initials='J.' surname='Arkko'/>
    <author fullname='V. Lehtovirta' initials='V.' surname='Lehtovirta'/>
    <author fullname='P. Eronen' initials='P.' surname='Eronen'/>
    <date month='May' year='2009'/>
    <abstract>
      <t>This specification defines a new EAP method, EAP-AKA', which is a small revision of the EAP-AKA (Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement) method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network. The new key derivation mechanism has been defined in the 3rd Generation Partnership Project (3GPP). This specification allows its use in EAP in an interoperable manner. In addition, EAP-AKA' employs SHA-256 instead of SHA-1.</t>
      <t>This specification also updates RFC 4187, EAP-AKA, to prevent bidding down attacks from EAP-AKA'. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='5448'/>
  <seriesInfo name='DOI' value='10.17487/RFC5448'/>
</reference>

<reference anchor='RFC5280' target='https://www.rfc-editor.org/info/rfc5280'>
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname='D. Cooper' initials='D.' surname='Cooper'/>
    <author fullname='S. Santesson' initials='S.' surname='Santesson'/>
    <author fullname='S. Farrell' initials='S.' surname='Farrell'/>
    <author fullname='S. Boeyen' initials='S.' surname='Boeyen'/>
    <author fullname='R. Housley' initials='R.' surname='Housley'/>
    <author fullname='W. Polk' initials='W.' surname='Polk'/>
    <date month='May' year='2008'/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='5280'/>
  <seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>

<reference anchor='RFC5580' target='https://www.rfc-editor.org/info/rfc5580'>
  <front>
    <title>Carrying Location Objects in RADIUS and Diameter</title>
    <author fullname='H. Tschofenig' initials='H.' role='editor' surname='Tschofenig'/>
    <author fullname='F. Adrangi' initials='F.' surname='Adrangi'/>
    <author fullname='M. Jones' initials='M.' surname='Jones'/>
    <author fullname='A. Lior' initials='A.' surname='Lior'/>
    <author fullname='B. Aboba' initials='B.' surname='Aboba'/>
    <date month='August' year='2009'/>
    <abstract>
      <t>This document describes procedures for conveying access-network ownership and location information based on civic and geospatial location formats in Remote Authentication Dial-In User Service (RADIUS) and Diameter.</t>
      <t>The distribution of location information is a privacy-sensitive task. Dealing with mechanisms to preserve the user's privacy is important and is addressed in this document. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='5580'/>
  <seriesInfo name='DOI' value='10.17487/RFC5580'/>
</reference>

<reference anchor='RFC6071' target='https://www.rfc-editor.org/info/rfc6071'>
  <front>
    <title>IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap</title>
    <author fullname='S. Frankel' initials='S.' surname='Frankel'/>
    <author fullname='S. Krishnan' initials='S.' surname='Krishnan'/>
    <date month='February' year='2011'/>
    <abstract>
      <t>Over the past few years, the number of RFCs that define and use IPsec and Internet Key Exchange (IKE) has greatly proliferated. This is complicated by the fact that these RFCs originate from numerous IETF working groups: the original IPsec WG, its various spin-offs, and other WGs that use IPsec and/or IKE to protect their protocols' traffic.</t>
      <t>This document is a snapshot of IPsec- and IKE-related RFCs. It includes a brief description of each RFC, along with background information explaining the motivation and context of IPsec's outgrowths and extensions. It obsoletes RFC 2411, the previous "IP Security Document Roadmap."</t>
      <t>The obsoleted IPsec roadmap (RFC 2411) briefly described the interrelationship of the various classes of base IPsec documents. The major focus of RFC 2411 was to specify the recommended contents of documents specifying additional encryption and authentication algorithms. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6071'/>
  <seriesInfo name='DOI' value='10.17487/RFC6071'/>
</reference>

<reference anchor='RFC6614' target='https://www.rfc-editor.org/info/rfc6614'>
  <front>
    <title>Transport Layer Security (TLS) Encryption for RADIUS</title>
    <author fullname='S. Winter' initials='S.' surname='Winter'/>
    <author fullname='M. McCauley' initials='M.' surname='McCauley'/>
    <author fullname='S. Venaas' initials='S.' surname='Venaas'/>
    <author fullname='K. Wierenga' initials='K.' surname='Wierenga'/>
    <date month='May' year='2012'/>
    <abstract>
      <t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6614'/>
  <seriesInfo name='DOI' value='10.17487/RFC6614'/>
</reference>

<reference anchor='RFC7268' target='https://www.rfc-editor.org/info/rfc7268'>
  <front>
    <title>RADIUS Attributes for IEEE 802 Networks</title>
    <author fullname='B. Aboba' initials='B.' surname='Aboba'/>
    <author fullname='J. Malinen' initials='J.' surname='Malinen'/>
    <author fullname='P. Congdon' initials='P.' surname='Congdon'/>
    <author fullname='J. Salowey' initials='J.' surname='Salowey'/>
    <author fullname='M. Jones' initials='M.' surname='Jones'/>
    <date month='July' year='2014'/>
    <abstract>
      <t>RFC 3580 provides guidelines for the use of the Remote Authentication Dial-In User Service (RADIUS) within IEEE 802 local area networks (LANs). This document defines additional attributes for use within IEEE 802 networks and clarifies the usage of the EAP-Key-Name Attribute and the Called-Station-Id Attribute. This document updates RFCs 3580 and 4072.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7268'/>
  <seriesInfo name='DOI' value='10.17487/RFC7268'/>
</reference>

<reference anchor='RFC7585' target='https://www.rfc-editor.org/info/rfc7585'>
  <front>
    <title>Dynamic Peer Discovery for RADIUS/TLS and RADIUS/DTLS Based on the Network Access Identifier (NAI)</title>
    <author fullname='S. Winter' initials='S.' surname='Winter'/>
    <author fullname='M. McCauley' initials='M.' surname='McCauley'/>
    <date month='October' year='2015'/>
    <abstract>
      <t>This document specifies a means to find authoritative RADIUS servers for a given realm. It is used in conjunction with either RADIUS over Transport Layer Security (RADIUS/TLS) or RADIUS over Datagram Transport Layer Security (RADIUS/DTLS).</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7585'/>
  <seriesInfo name='DOI' value='10.17487/RFC7585'/>
</reference>

<reference anchor='RFC7593' target='https://www.rfc-editor.org/info/rfc7593'>
  <front>
    <title>The eduroam Architecture for Network Roaming</title>
    <author fullname='K. Wierenga' initials='K.' surname='Wierenga'/>
    <author fullname='S. Winter' initials='S.' surname='Winter'/>
    <author fullname='T. Wolniewicz' initials='T.' surname='Wolniewicz'/>
    <date month='September' year='2015'/>
    <abstract>
      <t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia. The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access. The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document. In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7593'/>
  <seriesInfo name='DOI' value='10.17487/RFC7593'/>
</reference>

<reference anchor='RFC8952' target='https://www.rfc-editor.org/info/rfc8952'>
  <front>
    <title>Captive Portal Architecture</title>
    <author fullname='K. Larose' initials='K.' surname='Larose'/>
    <author fullname='D. Dolson' initials='D.' surname='Dolson'/>
    <author fullname='H. Liu' initials='H.' surname='Liu'/>
    <date month='November' year='2020'/>
    <abstract>
      <t>This document describes a captive portal architecture. Network provisioning protocols such as DHCP or Router Advertisements (RAs), an optional signaling protocol, and an HTTP API are used to provide the solution.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8952'/>
  <seriesInfo name='DOI' value='10.17487/RFC8952'/>
</reference>


<reference anchor="TS23003" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.003/23003-i10.zip">
  <front>
    <title>3GPP 23.003: Numbering, addressing and identification v18.1.0</title>
    <author initials="" surname="3GPP">
      <organization></organization>
    </author>
    <date year="2023" month="March" day="28"/>
  </front>
</reference>
<reference anchor="GSMAIR67" target="https://www.gsma.com/newsroom/wp-content/uploads//IR.67-v21.0.pdf">
  <front>
    <title>GSMA IR.67: DNS Guidelines for Service Providers and GRX and IPX Providers</title>
    <author initials="" surname="GSMA">
      <organization></organization>
    </author>
    <date year="2022" month="November" day="25"/>
  </front>
</reference>
<reference anchor="PASSPOINT" target="https://www.wi-fi.org/discover-wi-fi/passpoint">
  <front>
    <title>Wi-Fi Alliance Passpoint</title>
    <author initials="" surname="Wi-Fi Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ISO3166" target="https://www.iso.org/standard/72483.html">
  <front>
    <title>Codes for the representation of names of countries and their subdivisions</title>
    <author initials="" surname="ISO 3166-2:2020">
      <organization></organization>
    </author>
    <date year="2020" month="August"/>
  </front>
</reference>
<reference anchor="ISO29115" >
  <front>
    <title>Information technology - Security techniques: Entity authentication assurance framework</title>
    <author initials="" surname="ISO/IEC 29115">
      <organization></organization>
    </author>
    <date year="2013" month="April"/>
  </front>
</reference>
<reference anchor="ORPRIVACY" target="https://wballiance.com/openroaming/privacy-policy/">
  <front>
    <title>OpenRoaming End-User Privacy Policy</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ORTERMS" target="https://wballiance.com/openroaming/toc/">
  <front>
    <title>OpenRoaming End User Terms and Conditions</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="WBAVSA" target="https://github.com/wireless-broadband-alliance/RADIUS-VSA">
  <front>
    <title>Vendor Specific Attributes</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="IEEE80211" target="https://standards.ieee.org/ieee/802.11/5536/">
  <front>
    <title>Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications</title>
    <author initials="" surname="IEEE">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="WBAEIPP" target="https://wballiancec.wpenginepowered.com/wp-content/uploads/2021/02/IMSI_Privacy_Protection_for_Wi-Fi_Technical_Specification_v1.1.0_Revision_FINAL.pdf">
  <front>
    <title>WBA Enhanced IMSI Privacy Protection</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="2022" month="August"/>
  </front>
</reference>


    </references>


<section anchor="sig"><name>Example OpenRoaming Signalling Flow</name>

<t>An example signalling flow for OpenRoaming is illustrated in <xref target="figsigflow"/>.</t>

<t><list style="numbers">
  <t>In step 1, the WLAN is configured with Passpoint information and includes
configured RCOIs in its beacon.</t>
  <t>The beacon can only contain 3 RCOIs and so if none of the RCOIs match a
profile provisioned in the device, the device queries for the list of RCOIs supported.</t>
  <t>If the list includes an RCOI that matches a configured profile in the device, then device
sends an EAPOL Start message to the authenticator.</t>
  <t>The authenticator in the AP/WLC requests the EAP-Identity of the device.</t>
  <t>The device responds with its EAP-Identity, which is a user@realm Network Access Identifier (NAI)</t>
  <t>The NAS in the WLC/AP embeds the NAI in the user-name attribute in a RADIUS Access-Request packet and forwards to the configured RadSec client.</t>
  <t>The RadSec client recovers the realm from the NAI/user-name attribute and performs a DNS-based dynamic peer discovery.</t>
  <t>The RadSec client established an mTLS authenticated TLS session with the discovered peer using certificates issued by the WBA PKI.</t>
  <t>Once TLS is established, the RadSec client forwards the Access-Request to the RadSec server.</t>
  <t>If the EAP Server is not co-located with the RadSec server, the RadSec server proxies the Access-Request to the EAP-Server.</t>
  <t>The EAP-Server continues the EAP dialogue with the EAP Supplicant in the device using a Passpoint defined EAP method.</t>
  <t>Following successful authentication, the EAP-Server responds with an Access-Accept packet containing the EAP-SUCCESS message and the keying material generated through the EAP method to secure the Wi-Fi session.</t>
  <t>The Access-Accept packet is forwarded back to the RadSec client.</t>
  <t>The RadSec client forwards the Access-Accept packet to the NAS in the AP/WLC.</t>
  <t>The AP/WLC recovers the keying material from the Access-Accept packet and forwards the EAP-SUCCESS message to the device.</t>
  <t>The keying material is used to secure the Wi-Fi interface between the device and AP/WLC.</t>
  <t>The AP/WLC generates a RADIUS Accounting-Request packet with Acct-Status-Type Start which is forwarded to the RadSec client.</t>
  <t>The RadSec client forwards the Accounting-Request packet over the TLS tunnel to the RadSec server.</t>
  <t>The RadSec server can forward the Accounting-Request packet to the EAP-Server.</t>
</list></t>

<ul empty="true"><li>
  <t>20-22. After the Wi-Fi session terminates, an Accounting-Request message with Acct-Status-Type Stop is proxied towards the RadSec Server.</t>
</li></ul>

<figure title="Example OpenRoaming Signalling Flow" anchor="figsigflow"><artwork><![CDATA[
+------+    +------+    +------+    +------+    +------+    +------+
|      |    |Wi-Fi |    |RadSec|    |      |    |RadSec|    |  EAP |
|Device|    |AP/WLC|    |Client|    | DNS  |    |Server|    |Server|
+------+    +------+    +------+    +------+    +------+    +------+
   | 1) Beacon |           |           |           |           |
   |<----------|           |           |           |           |
   | 2) ANQP   |           |           |           |           |   
   | Query     |           |           |           |           |   
   |<--------->|           |           |           |           |   
   | 3) EAPOL  |           |           |           |           |
   | Start     |           |           |           |           |
   |---------->|           |           |           |           |
   | 4) EAP-ID |           |           |           |           |
   | Request   |           |           |           |           |
   |<----------|           |           |           |           |
   | 5) EAP-ID | 6) RADIUS |           |           |           |
   | Response  | Access-   | 7) DNS    |           |           |
   |---------->| Request   | Query     |           |           |
   |           |---------->| NAPTR,SRV,|           |           |
   |           |           | A/AAAA    |           |           |
   |           |           | Records   |           |           |
   |           |           |<--------->|           |           |
   |           |           | 8) mTLS   |           |           |
   |           |           |<--------------------->|           |
   |           |           | 9) RadSec |           |           |
   |           |           | Access-Request        |           |
   |           |           |---------------------->|           |
   |           |           |           |           | 10) RADIUS|
   |           |           |           |           | Access-   |
   |           |           |           |           | Request   |
   |           |           |           |           |---------->|
   |           |         11) EAP Dialogue          |           |
   |<--------------------------------------------------------->|
   |           |           |           |           | 12) RADIUS|
   |           |           |           |           | Access-   |
   |           | 14) RADIUS|           |           | Accept    |
   |           | Access-   |           |           | (EAP-     |
   |           | Accept    | 13) RadSec Access-    | SUCCESS)  |   
   |           | (EAP-     | Accept (EAP-SUCCESS)  |<----------|
   | 15) EAP-  | SUCCESS)  |<----------------------|           |
   | SUCCESS   |<----------|           |           |           |
   |<----------|           |           |           |           |
 +---------------+         |           |           |           |
 | 16) Secured   |         |           |           |           |
 |  OpenRoaming  17) RADIUS|           |           |           |
 |    Service    Accounting|           |           |           |
 |               Request   |           |           | 19) RADIUS|
 |               (Start)   | 18) RadSec Accounting | Accounting|
 |               |-------->| -Request (Start)      | Request   |
 |               |         |---------------------->| (Start)   |
 |               |         |           |           |---------->|
 +---------------+         |           |           |           |
   |           | 20) RADIUS|           |           |           |
   |           | Accounting|           |           |           |
   |           | Request   |           |           | 22) RADIUS|
   |           | (Stop)    | 21) RadSec Accounting | Accounting|
   |           |---------->| -Request (Stop)       | Request   |
   |           |           |---------------------->| (Stop)    |
   |           |           |           |           |---------->|   
+------+    +------+    +------+    +------+    +------+    +------+
|Device|    |Wi-Fi |    |RadSec|    | DNS  |    |RadSec|    |  EAP |
|      |    |AP/WLC|    |Client|    |      |    |Server|    |Server|
+------+    +------+    +------+    +------+    +------+    +------+
]]></artwork></figure>

</section>
<section anchor="rcoi"><name>Example OpenRoaming RCOI Usage</name>

<t>This Annex illustrates the use of OpenRoaming RCOIs to enforce different policies
in the OpenRoaming federation, ensuring that when there is a policy mismatch
between the device and access network, that the device will avoid triggering
an authentication exchange that would subsequently have to be rejected because
of policy enforcement decisions.</t>

<section anchor="openroaming-rcoi-based-policy-for-supporting-qos-tiers"><name>OpenRoaming RCOI based policy for supporting QoS tiers</name>

<t><xref target="figqosrcoi"/> illustrates the use of OpenRoaming RCOIs for
supporting the standard (bronze) and silver QoS tiers across the federation.
The figure shows two different devices:</t>

<t><list style="symbols">
  <t>Device 1 has been provisioned by its IDP to require the basic bronze QoS policy.</t>
  <t>Device 2 has been provisioned by its IDP to require the silver tier of QoS handling.</t>
</list></t>

<t>The figure also shows illustrates the RCOI configuration of two ANP Access Networks:</t>

<t><list style="symbols">
  <t>ANP#1 is configured to support the silver tier of QoS handling corresponding to the silver RCOI. Because the network requirements associated with the silver tier are a superset of the bronze QoS tier, the ANP also configures the bronze RCOI on its Wi-Fi access network.</t>
  <t>ANP#2 is only configured to support the standard (bronze) QoS tier and as such only configures the RCOI corresponding to the bronze QoS tier on its Wi-Fi access network.</t>
</list></t>

<t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required QoS tier according to the device's policy.</t>

<figure title="Use of OpenRoaming RCOIs to realize QoS policies" anchor="figqosrcoi"><artwork><![CDATA[

+----------------------+      +----------------------+  
|OpenRoaming Device #1 |      |OpenRoaming Device #2 |  
| Bronze Service Level |      | Silver Service Level |   
| +------------------+ |      | +------------------+ |      
| |Passpoint Profile | |      | |Passpoint Profile | |     
| |   Bronze RCOI    | |      | |   Silver RCOI    | |              
| +------------------+ |      | +------------------+ |           
|     /|\        /|\   |      |           /|\        |      
+------|----------|----+      +------------|---------+         
       |          |                        |                   
       |          |                        |                    
       |          |                        | RCOI                
       |          |                        | Match                 
       |     +-----------------------------+                 
  RCOI |     |    |                                          
 Match |     |    |                                              
       |     |    |                                        
       |     |    +------------------------+                  
       |     |                             | RCOI           
       |     |                             | Match         
       |     |                             |              
      \|/   \|/                           \|/           
+----------------------+       +----------------------+   
|  OpenRoaming ANP#1   |       |  OpenRoaming ANP#2   |  
|      Silver QoS      |       |      Bronze QoS      |     
|   +--------------+   |       |   +--------------+   |   
|   |     WLAN     |   |       |   |     WLAN     |   |   
|   | Bronze RCOI  |   |       |   | Bronze RCOI  |   |    
|   | Silver RCOI  |   |       |   |              |   |   
|   +--------------+   |       |   +--------------+   |  
+----------------------+       +----------------------+

]]></artwork></figure>

</section>
<section anchor="openroaming-rcoi-based-policy-for-supporting-identity-type-policies"><name>OpenRoaming RCOI based policy for supporting identity type policies</name>

<t><xref target="figidtypercoi"/> illustrates the use of OpenRoaming RCOIs for supporting different identity type policies across the federation. The figure shows two different devices:</t>

<t><list style="symbols">
  <t>Device#1 has been provisioned by an IDP corresponding to a service provider. It provisions the device's Passpoint profile with the RCOI policy identifying the service provider ID-type policy as well as the "any ID-type"  RCOI policy.</t>
  <t>Device 2 has been provisioned by a IDP corresponding to a hospitality provider. It provisions the device's Passpoint profile with the RCOI policy identifying the hospitality ID-type policy as well as the "any ID-type" RCOI policy.</t>
</list></t>

<t>The figure also shows the RCOI configuration of three different ANP Access Networks:</t>

<t><list style="symbols">
  <t>ANP#1 only supports access using service provider type-IDs and so has configured the service provider ID-type policy RCOI.</t>
  <t>ANP#2 supports access from all identity types and so has configured the any ID-type policy RCOI.</t>
  <t>ANP#3 only supports access using hospitality type IDs and so has configured the hospitality ID-type policy RCOI.</t>
</list></t>

<t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required identity types according to the ANP's policy.</t>

<figure title="Use of OpenRoaming RCOIs to realize ID-Type policies" anchor="figidtypercoi"><artwork><![CDATA[


+----------------------------+   +-----------------------------+                                                 
|   OpenRoaming Device #1    |   |    OpenRoaming Device #2    |                                                 
|  IDP is Service Provider   |   | IDP is Hospitality Provider |                                                 
|+------------++------------+|   |+------------++------------+ |                                                 
|| Passpoint  || Passpoint  ||   || Passpoint  || Passpoint  | |                                                 
||  Profile   ||  Profile   ||   ||  Profile   ||  Profile   | |                                                 
||     SP     ||Any ID-Type ||   ||Any ID-Type || Hospitality| |                                                 
||ID-Type RCOI||    RCOI    ||   ||   RCOI     ||ID-Type RCOI| |                                                 
|+------------++------------+|   |+------------++------------+ |                                                 
|      /|\          /|\      |   |       /|\        /|\        |                                                 
+-------|------------|-------+   +-------------------|---------+                                                 
        |            |                    |          |                                                           
        |            |                    |          |                                                           
        |            |                    |          |                                                           
        |            |                    |          |                                                           
        | RCOI       | RCOI               | RCOI     | RCOI                                                      
        | Match      | Match              | Match    | Match                                                     
        |            |                    |          |                                                           
        |            +-----+        +-----+          |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
       \|/                \|/      \|/              \|/                                                          
+------------------+  +------------------+  +------------------+                                                 
|OpenRoaming ANP#1 |  |OpenRoaming ANP#2 |  |OpenRoaming ANP#3 |                                                 
|  Only accepts    |  |    Accepts all   |  |   Only accepts   |                                                 
| Service Provider |  |     ID-Types     |  |    Hospitality   |                                                 
|     ID-Types     |  |                  |  |     ID-Types     |                                                 
| +--------------+ |  | +--------------+ |  | +--------------+ |                                                 
| |     WLAN     | |  | |     WLAN     | |  | |     WLAN     | |                                                 
| |  SP ID-Type  | |  | | Any ID-Type  | |  | |  Hospitality | |                                                 
| |     RCOI     | |  | |     RCOI     | |  | | ID-Type RCOI | |                                                 
| +--------------+ |  | +--------------+ |  | +--------------+ |                                                 
+------------------+  +------------------+  +------------------+    


]]></artwork></figure>

</section>
<section anchor="openroaming-rcoi-based-policy-for-supporting-different-identity-proofing-policies"><name>OpenRoaming RCOI based policy for supporting different identity proofing policies</name>

<t><xref target="figidproofrcoi"/> illustrates the use of OpenRoaming RCOIs for supporting different
identity proofing policies across the federation. The figure shows two different devices:</t>

<t><list style="symbols">
  <t>Device 1 has been provisioned by an IDP that uses enhanced identity proofing controls that meet the enhanced OpenRoaming requirements, equivalent to LoA 3 in <xref target="ISO29115"/>. Because the enhanced identity proofing requirements are a superset of the requirements of the baseline identity proofing policy, the IDP also configures the use of the RCOI with baseline identity proofing.</t>
  <t>Device 2 has been provisioned by an IDP that uses identity proofing with controls that meet the baseline OpenRoaming requirements.</t>
</list></t>

<t>The figure also shows the RCOI configuration of two ANP Access Networks:</t>

<t><list style="symbols">
  <t>ANP#1 is operated in a geography where regulations require support of enhanced identity proofing.</t>
  <t>ANP#2 is operated in a geography where regulations permit support of authentications with identities managed using the OpenRoaming baseline identity proofing requirements.</t>
</list></t>

<t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required identity proofing according to the ANP's policy.</t>

<figure title="Use of OpenRoaming RCOIs to realize identity proofing policies" anchor="figidproofrcoi"><artwork><![CDATA[

+----------------------------+   +-----------------------------+                                                 
|    OpenRoaming Device #1   |   |    OpenRoaming Device #2    |                                                 
|     IDP uses enhanced      |   |     IDP uses baseline       |                                                 
|     identity proofing      |   |     identity proofing       |                                                 
|+------------++------------+|   |       +------------+        |                                                 
|| Passpoint  ||  Passpoint ||   |       |  Passpoint |        |                                                 
||  Profile   ||   Profile  ||   |       |   Profile  |        |                                                 
||Enhanced LoA||Baseline LoA||   |       |Baseline LoA|        |                                                 
||    RCOI    ||    RCOI    ||   |       |    RCOI    |        |                                                 
|+------------++------------+|   |       +------------+        |                                                 
|      /|\          /|\      |   |             /|\             |                                                 
+-------|------------|-------+   +--------------|--------------+                                                 
        |            |                          |                                                                
        |            |                          |                                                                
        |            |                          |                                                                
        | RCOI       | RCOI                     | RCOI                                                           
        | Match      | Match                    | Match                                                          
        |            |                          |                                                                
        |            |                          |                                                                
        |            +--------------------+     +-----+                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
       \|/                               \|/         \|/                                                         
   +------------------------+       +------------------------+                                                   
   |   OpenRoaming ANP#1    |       |   OpenRoaming ANP#2    |                                                   
   | Operates in a country  |       | Operates in a country  |                                                   
   |  where the regulator   |       |  where the regulator   |                                                   
   |   requires enhanced    |       |   permits baseline     |                                                   
   |   identity proofing    |       |   identity proofing    |                                                   
   |    +--------------+    |       |    +--------------+    |                                                   
   |    |     WLAN     |    |       |    |     WLAN     |    |                                                   
   |    | Enhanced LoA |    |       |    | Baseline LoA |    |                                                   
   |    |     RCOI     |    |       |    |     RCOI     |    |                                                   
   |    +--------------+    |       |    +--------------+    |                                                   
   +------------------------+       +------------------------+                                                     


]]></artwork></figure>

</section>
</section>
<section anchor="legal"><name>OpenRoaming legal framework</name>

<section anchor="seamless-experience"><name>Seamless experience</name>

<t>In order for OpenRoaming to avoid the need for end-users to
be presented with and accept legal terms and conditions covering their
use of the Wi-Fi hotspot service, there needs to be a legal framework in place.</t>

</section>
<section anchor="openroaming-organization"><name>OpenRoaming Organization</name>

<t>The federation is based on a legal framework that comprises a set of policies,
templated agreements and immutable terms as agreed to by the WBA and its membership.
The framework defines a hierarchy of roles, responsibilities and relationships that
are designed to enable the federation to scale to millions of Wi-Fi access networks.</t>

<t><xref target="figorg"/> shows the
relationships between WBA, OpenRoaming Brokers, who are members of the WBA that
have agreed terms with WBA to perform the OpenRoaming broker role and the OpenRoaming providers.
OpenRoaming brokers agree terms with OpenRoaming Providers that can act as Access Network
Providers (ANPs) and/or Identity Providers (IDPs). OpenRoaming providers do not have
to be members of the WBA to provide OpenRoaming services. Finally, OpenRoaming IDPs
agree terms with OpenRoaming end-users who then benefit from seamless authentication onto
the Wi-Fi networks deployed by the different OpenRoaming ANPs.</t>

<figure title="Organization of the OpenRoaming Federation" anchor="figorg"><artwork><![CDATA[
                            +----------+                   
                            | Wireless |                      
                            | Broadband|                        
                            | Alliance |                         
                            +----------+                       
                              /|\  /|\                        
                               |    |                         
                          Agrees terms with                    
                               |    |                              
          +-----------+        |    |        +-----------+        
          |OpenRoaming|<-------+    +------->|OpenRoaming|       
          |Broker     |                      |Broker     |      
          +-----------+                      +-----------+       
             /|\  /|\                           /|\  /|\         
              |    |                             |    |        
         Agrees terms with                  Agrees terms with     
              |    |                             |    |           
        +-----+    +-----+                 +-----+    +-----+     
        |                |                 |                |    
       \|/              \|/               \|/              \|/     
+-----------+     +-----------+     +-----------+     +-----------+
|OpenRoaming|     |OpenRoaming|     |OpenRoaming|     |OpenRoaming|
|Access     |     |Identity   |     |Identity   |     |Access     |
|Network    |     |Provider   |     |Provider   |     |Network    |
|Provider   |     |           |     |           |     |Provider   |
+-----------+     +-----------+     +-----------+     +-----------+
                   /|\  /|\            /|\  /|\      
                    |    |              |    |       
               Agrees terms with   Agrees terms with
                    |    |              |    |       
      +-------------+    |              |    +-------------+       
      |                  |              |                  |       
     \|/                \|/            \|/                \|/      
+-----------+     +-----------+     +-----------+      +-----------+
|OpenRoaming|     |OpenRoaming|     |OpenRoaming|      |OpenRoaming|
|End-User   |     |End-User   |     |End-User   |      |End-User   |
+-----------+     +-----------+     +-----------+      +-----------+

]]></artwork></figure>

</section>
<section anchor="openroaming-legal-terms"><name>OpenRoaming legal terms</name>

<t>In OpenRoaming there is no direct agreement between individual ANPs and individual
IDPs or between end-users and ANPs. As a consequence, OpenRoaming brokers
agree to use certain federation-specific terms in their agreements with
OpenRoaming providers.</t>

<t>This arrangement ensures that all ANPs agree to abide by the OpenRoaming
privacy policy <xref target="ORPRIVACY"/> and all end-users agree to abide by the
OpenRoaming end-user Terms and Conditions <xref target="ORTERMS"/>.</t>

</section>
</section>
<section numbered="false" anchor="Changelog"><name>Changelog</name>
<t><list style="symbols">
  <t>01 - added details of WBA-Custom-SLA for OpenRoaming ANP networks that signal using
<xref target="RFC7268"/> that they operate on a vehicular platform. Added clarifications regarding use
of direct and indirect names in certificate validation.</t>
  <t>02 - added details of OpenRoaming protection of end-user privacy, including WRIX recommendations
on use of correlation identifiers in RADIUS Access-Accept packet that may unintentionally weaken
end-user privacy.</t>
</list></t>

</section>
<section numbered="false" anchor="Acknowledgements"><name>Acknowledgements</name>

<t>The authors would like to thank all the members of the WBA's OpenRoaming Workgroup
who help define the OpenRoaming specifications.</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAD2CzGUAA+19aXMbR5Lo9/oVFVRsmBwBIMFDkvXGjoFIyeaORNGkbM/E
zgtHE2iSPQK6Md0NURhR77e/vOrqrgYPUd6d2EGERKCPqqysrKzMrDz6/b6q
s3qaPte/vhjpt/M0PymSWZZf6F+zMp2mVaVfpZO0TOqsyFVydlamH1rPqkkx
zpMZNDIpk/O6XxezpOoX8EDJD/S3ttUkqeGB7a3tXfjVH+6qMVy4KMrlc53l
54WqFmezrKqgm3o5T/HiJIUWJmleK6Wyeflc1+Wiqre3tr6F5pIyTZ7rizQH
2KbqqijfX5TFYv5cH7r39KltU6n36RKemjxXWvfhoTot87TuHyDAdMkfD/72
hq2qOsknvyXTIgfAlmml5tlz/V91Me7pqijrMj2v4Ntyhl/+r1LJor4syudK
9aElGEj1XL8Y6HeIFbzAqHpRLvLCXSzKiyTP/kkdPnfIfwEYnJxB73o0nWZJ
Pk57APx4gK9U0HFaP9d7W1tb+uXHdLyosw+pPk7K91fJsgejz+pU7wCy4OFx
VgOmT5NcnyQzGBNeKiYAx7e7e892+Ocir3E6fj7Fn+ksyabP9RmC+aers0S6
H4yLmT+wNwP9Q5ksK26Sh/YGIPCvhmPbz6pxoU+XVZ3OKn8cwy19lF7p038s
YHJpGA7wV+m0vkxmDux3vw539bMfRyHkf/Ygn10wBH8aY4cObgL7aKD3k3xe
TBOcfQb7KAWSzPzrIeBINFO9X5TzQgjDwb49HA710cuB3t6rL/XoQ6oM5D9m
02l1VpSFshh/OtzeVU2EC9Q5ATEYCxB/yrDTBvBATCOAvxi/ByqZWvhfpHW9
bNwJR3AKxD1ND7KLrK6UTxOjvC7yrOgC6mwsLf6pohYm1EIDqlOghEU+ST7A
c5kF6rTMwsuricHSwtMt/Wta1fpdUs0AwIMy83CKIP9nUaUOpXvDnU6UVhfc
v08IKi/KWYLrBRnCyat9mMBv5euz4dPd58hzgC01Hnr2ZE++7uw9/dZ+fbZl
vj7dfSZfd7d2zLO7w2dPzdedp9vydW/XPru3bVvYc4092Xo6NF+fDHfl69Pt
J+a1p3vP9uzXb3cM+N/uURfvTrd3trboqtbC5Nd2fjg+1ts7A7yhjxazs7SE
Ge3pZDIpgd8g40dmkyH7zM6zMU2T/jB8NhgOtta4qaS8wCm6rOt59Xxz8+rq
arBzMZ8PYGY3z+v55uk8HVebSTm+BMxtbu/8VkEnabXJ3W4SVP1suDX4Zzan
Fg2/1PQhYkI46bfdNnb68Nb2M7j4w+mb0eHJk6fhyPCqPjwZwHV9cHQKRAeD
mGZ5WmmYRn2alh+yMbCVsvgAN8qKxvnDyV/o7+HxX9yd7mFeAC0i/Wzm6VVV
FvDlat4fw44F2NpczKfAq6vNTQKi/2EbMDaYT867hogAh0OEbXHY396Di8ej
09Pjt4dH78Ix/pr1X2V2JwAWWVXzAjhEN8RXWf88o5mZIPF/SMs+Xdqcm3e7
wAv7gjuHp293hk+ehBDtw/JjBNeXqS7TOVARIIPJpjgnJlDhF16ZQAaEb3g4
KzVs+ZPsQ4b78wqkZ1VBA6BNOCknm0+3d5/tDC7r2bQLdgBVI6z97eeA1q0Q
y1v9rWc8nO1vh8O9cDyHZs0D+HU6vsyLaXGxBHHgFLbXEpgPX83+sUihn5ew
SOASQoDrRVYLYHZR0gSdlzB8lE3WVkC6efhyXxMoAZxDIHhkaW9Pjk8Ofxnt
/zUA1JfUXuaT/s+wxoCCsw/JeKmPi2k2XsYRGmzkm56Mtjnnt/tzenuzmy46
RROC9t3Lkzenq2DVBOu7tJwxLewX+SRDxFV3hRgEsHuCCQLsL6ejAMpfQGZE
PgHMCxmfHtVArmeLOo2DBRvg5eKMQLqSrvpnpqu+AXnzZHRw+PNpHzq7H6CH
L1++fLYFm1MAq33n9ehIv4HteDHTo/EYrwA267KY6vU3o/0Nwu/x5bIC0pzq
18kSEL9+/ONfN+wwk27Em/VWDbI0TWkJ4pdNAGcwHG7u7e086cQ+gs1ofnl4
fBzCDrrDy/wSxwd8983poSPbsoDFJYLVKkIYD66ACi6At8+Lq7RMJzwNbVYM
q324ubW9id38Jt385rr5Ddb6b8TnfntHqxqw9FuAmd8+DHHj++0kZTb126vD
o9HrVVx99XQGzB7YkOr3+zo5A6knGYOa8+4yqzQoU4sZai/AWcdAgsAykbeu
aPibSvlrrCJpChQOeMu/TjsyDn0BTFqneXI2RXasqzSZYcuqyM8KmHB8Nv04
x02bmBisikmKm2cFXDzPEXfwRF3ohEkO9CjkcZUCCb3WKLvPk7JGpo9wn1s9
Cq80XvGEDeCjc7MDDxTCDgxplpRLXZz9HfsE1Yaa9FEE3wEOgyjqDxoBvlBM
EWsgxCM7ZzgKlAIJDt6u4F0fIz3GCA7NwoGNj4uyhCemSxz8eXYBjyrevtJ/
LLI5gQGPVYs5qAUAEWqWwKRKxG6A/iq7yJGCCbtjWAAXKQz0MEfZi/hfj+Cs
izlwHxip/+5lUumzNM11mWQVrJss15Ps/BxoH3o/fPnulUZ0oupKWjBoo7LL
gkZawITgJAP4kxCdjD3YrjIQtIGSq1SjlLAgjRk6XCrBLM13Yy49MZ46s3vd
gKl6lk0m01TBAIEfTRa04LR8Pj3K8Opn9Z33UappgsAZ0sLs/b4rkeUAScL1
jpiePOlufXR0XG0oEu4MfXl3Dw/grjfloFDAYi5w5x/TcCrc71PFUpC3Gi6m
BfKh5aBlMBmXKaxtXqwWGUQasr6mSyXrR5+BUkg4hiEsKiONAk3mFzQnM+8+
g2BWDGD3/9mPUjDK/lD3+3/Tkc9vMA/932J39CbMEOCgP1T2EjchCOX312mA
ekPasIjEBqjrbQ199//43XfaTgH8Xgc9RJCygaTgIR4elZ63Xc+b9L97SOt1
6fG3jTbof6Oed6CjzdjIvsFBfxMd9N+k650Ah5+e60ewroG+kB3wNvXdmj+z
zhS09lm1yRTYQ3EBa0Hm/izN03NQj4n/0JVp9p6F4HSyQHLWnz6Jyvb5s2E2
OOvwrIJHxm5RoTRNUMEGN1vkgPs23U2gt5wYOdOmv1IIBFzmtJcC44CftHqA
UwAV22ZBLu/pq8sMWJYwMmz5rKgv4fEaEIJsrn8OujmSqx4nFXR4hexFr+HV
NaHSDNkUvloQcwKSLhTIVX2m8QzZBsDm88uqmKUACprjSNPWH5Lpgrj4vKiE
LQLzu0oBWvgLGyUzSxgnQzbRa/Mkm6wRV2coTOdnS25+DC8vpknpbzCqwWiA
0wF/Jog16o2gKWmEvC76qWEHSPpnQObIiBNL8LJiUMFMcacE2WPJnSd50EsH
r6KJBv7zcnRsGiH6QFsC0EfYYGCmbDE23vMtrLIDV8V0QdSAs5Pg9gHfZ+9e
n8JcEuNKS9H1QdbNQHmBJ2CvTMvVMoc+XgDvHOs/p0sNalOZgBSzoK2U4Uej
xufPgGl1gjtlSTQEIitsfIvkInXL8tMj/4HPuHuYD8kB76EDNN1Weu3Nz6fv
1nr8Vx+9pe8nL3/6+fDk5QF+P/1x9Pr1Wk/xF/PE6Y9vf3594L65N/ffvnnz
8uiAX4arqnHpzeiva7yXrr09fnf4FoS/NSTjUApBkQfI5ixVtPuDDkxLrbKC
CW3YL/aP9XCXcYPWJphb+o7mps+fFaymnLsqchA2+CdMH8z6fA5MAJugJZvM
szqZVrQsqsviKte4DhHPqFNlorF62PUuh8hVDYr8aZGWLIajAIVb6E/HG8+V
+l6PchLpNcv+wnImVtZiPgPQFVdsDAjFPJ15WjUgB7ZSWOUKBwRNpH2QQIpx
Jnt7DWQ40Ni1k3rOFyXKMrAP12jZp7WAzLJhD1n/9dVoA9Fi5E/kwtZIgtBe
lMR9rXmF6LNrXaIIQcOH0ctCo3EiWH8vCAENoYgFB1jCVcChHQc8c1Kkkan8
B0/23x6uVxs41Qi6CB9GzARQYR2+T8s7wwTSC05ARUs9gdYro+WCqpiSxHGZ
Tue6AgWIpWiSYI3QHrZomAwgGaZKWkDRXp8RdEChAH4+ni4mKUL6vR7CfFbI
XulcCbYvkfgz7holNbbCgVA2wBe2B4gW7I5FM2RKxKdxec1A38WOPbYlihhi
gxkXKUwvRsik/nzISoY04TO7eOc7QedArxcZ6meMTNsPCs7IBsoJUdtSMJZO
7g6sAxQaZbWsBeZZqoUzt2FW+9MCubrQ8Q+oAej1/dEPRLw4WbReM386h9t6
VoDUT7OC/eQolNY8kbDL/HzY33lC9IgdZvmEQfeJle1ESM9ocBB1C+ceYE1x
wY95oTahbe1aJI3feaEpIbFq1SrCWwEDOEcRRziDWZZWu8VWPVteGnmkCHZg
HJsvmb9OP6RTUkusCXD9dTEyYwuMfRqpwwpoi8qIHshZac0Di8TNZYptMlcF
nXEyZenKQYbmsOkU+UMPVRBCLghHsySHTRYvkw7UNFHOCtA0al+J5MnxBtc/
ZfnKENEayg6E3DUE4MWoP9ruH2y1hmCJxcq/iCVUocY10TLIyylKevNkSdsn
DE2xZIZjC1RmUfRoXQgPjQJJ4ukrEEQ7gN0b4ekBcJ7bAStyYpu0YgCBTK1y
tBNUtQjxiEwA0xHeMRMeAucuknYb3cHc4se5MtsWQWiEfewFJfGkTd49GaS/
PBBQ4DGOPiolBoLWVi0nPzCwnuNHZi8yywApVc4TdIO8CDn89GVRA2i1GIaM
omPO3k3Pze34+PWbI1A1EVmHiKIFWds9wFjCAP51hovZAM78txAZ2HsaGBQa
OGSPerO/r9ff8Kv7fFqo8RCDbaVw/8jdNxIB3R+EgNqZAAmM2QyDrYUDVmSe
ylmQmcE4EzL3KENJ+wAVqlmLmajVBOs6UiyxC2K9dhQ8i2zbIfbVMplpa3wT
zcpKSQZDA3UoRLfTL8Z1CvyC8LjHv0TxGicliGcTwzxF4DtLkzEqEJ4cl/Kq
A+b9csM2Pa0KO3JeTP7o9QujfXiEZ09ZSAclfcUIJ8Dr3venaLVWzqp3lYEQ
fJbyCkZKQIiXRppCtA143zLw+MbI1mKBGTldnLGUXjoDx5tisgACWD89fGM3
UfhOqrTTQEFMT3Q1w/YBiAkuCTkzYG3NkKglTbYd2F7W4dfhAe8O+hLmn+yR
aKqnY7N5Mk5bDItXA/QstLHUsD8ADYfyJjaPGoFV4MytQyuUwDvpX9gMyQBY
mxVoFtmMbQXnyTibZjXJQnTOD28bG/AHXx02Q7THe8ICjPXucnFmmCeuAh+0
iKH8u/CjSA1c8QJhciNgjuZptXLk8OLJ4V82bh5798jF5HCH8feUb9CAR/dp
zRnrhZxUVyHjt1vShTvXrguVzfAGLNtFVRczUpGsqRLWWdiylVT0C7Ts8Jqo
UiUdVSRrlKibuwFYFMuqBNy4RXS+yMe8FAAjKuSPTpaNGVZ1gEu7YxgIe6xM
snmLsKFYCCY0oHka4LjKYBCG/Qs38XY4vg/Yz2awokhWollMCGRZi3bolwlg
MVzb5wWawplhrRXn53imBBCtkT1Jzy8BCDzOSYB6ipm2RiZ7tgGCcXNcA3VA
5hw2hcAEVIvxpRzYCAwVEtUih5nIVTIp5iyvjcsCRneRIrTzSzbX4fBsr44A
z0uQHqF9GME0m2VEvnJgkV+ITIgYB817hrQxLeQU0AjdH1JndGLwcd4cYakk
UBvOi6I+R8sEDMdAgbKGUCQu91/RQpHQ8dEHnB0y34W0ibI+IZzx3QKOtgY1
TVBoTccJyBH4RsWmONRBsnxB2xaa4UEwkg2o9E1PACAdctdC3MpOFRMXUSsZ
7Es0RAKdIUJ7rOIA2ZjlfbFAzySWRmGrKFOUg3rQpSKdyqwrUKdhBZRZIfta
QArI0/mAK5suxWhqePztbaP/h7Rj5gFoLQblfuqzADKxVJfFfI5UAOtg2qNt
CRZgeg7zlyEtzNK0ZoUVUZmUczJfFXg/xccBHGgPdtqqTpb0lLosKrJC4eKF
GV2kIksAU6xRQAOoWlAYqzLIKHkCUpq/1nqKLGpVekHUiVM7wzm+Al7XZ6sE
SrvoR5LMCRXYGi5ynA9YLTDty3ltCRYlB2IZcqTpSeu0Knk92OlnO9y3e9sg
gOofi6uU5rMmzZnoiSwHBQqRJHGYRUerf5YmeeVZuVEGo31qVtREbBM5BEI7
frGoWdCs6wQPGwrmAL4RXXlMMCczIhF4RasaZyREAS+qsiLbGimtZjWwPsnr
Ac1crYZgXtAfhkwy0wR4+SWuoDo0Xjmtu6d8I7kR5+2kF3k/dnzsq0o9K86Y
M7Ee2Zx4m7CbAwoIgZbtHdPqT48KkpM+N6UEEhQ+fTrPLq6ANdEjn2Xp4sQl
IfcZB9ynDI7OmbV6EAwQeSB3LsgQlE56YVthGygjLucoxuHCFokXRKzhQB8e
n6ZjpjZ07sNdcgHbIJAxMBQ8iaxwBuwRQ3hW3iMhYh74r0X0AMNE5uzmYM+a
J94B9EBtD/RpTXsy6BS12BTYWcU/qGZj9bMnewCqPToAgprO7Hs164fzYg5L
guze43HBVIA2sgsgbOa+HcOicQQjG6idQSCpGy5JQ6O5QVmc4Qn0VT6RQp0e
WlrAzIhSxovSnt9b7aYJyq/oT+OO9e3pMDw7kz0iqtfxSm0fMxkJyA2GgUbw
GxaZLG8ZmwZqd4CnQv3Rn0c8E+hIamfCevA1m3IzblCOYz2FTWXKO7aMvtGf
lVy9gyh5sjWybyqnVe4N9Mj6atAWjkRi1pc/S2Tw5TkK+r8kHkdn4nScOuUt
/zKb82wTCNwe2g9zu6p7TXeBcLmdJBNcb016RmdawCLzmokcgtF5mIhUnuk1
PA4jQ60RIaImXVpZB0vQ36JLy66hg6PTPv8wdhQ6rvNAnadIQHJS/AwWYLgq
+GUjTFSg67CHhe1h50n/LKt1xN7w1nfdcMaHiq0P6BbBc4TbQtPeBDAOt/vG
Umw0bmLyMzznGrMpWhYWGSzYUJwJPR93US3tDGg8IbNWvmyr7ObUCelzlgLC
JxVR38t8XMxwNeA48/QqxhWvLmEvLHReiIB7A7llZWBw9D0uHtvzs8fmiO3x
va7wR13rX1DQhHFdm2vXsqOsvLIva/K61V7kbf0jMNjVV4w1vt2eMYNd/5FH
8L17dsUV+1YbPguErIrru11pt3c0Og1Hd5+G2/DZsSAhfVzecEVYZqs9S8DX
sv/7tHCbK832YE87nKxXG42e7veJ0fMXtYf/bV5H/ZHu3V4TqV/a3t+uo65D
92ovhr/RBvLbLlV3dXs+vTwEfNdme38YJOL6IC75cO0hQfcPJw/Wnjnm+5+5
PqI7iPd53NXTbXaQP/abn++vQdSIXIcbxg69egfBWBoROEEisfDtG2EamO/x
u5Pe7XYQvuJEHu9zevILSaCjzRF84MKtdpCVH3TMQ7ehxsO32EFu87nDDnKb
z+12EPmwZLuJMmtEjOXPCnoxJ+TN8SL+UepDX4Rbf/69g3xhe534e7ER6De3
be9/3w7SRc/3be9/+A7Sdl42Fi/jvbwvCjJpfoHwgUu8y7ZWkXuz8dA5Xzbd
MV4aHf7To6uzJJvETXCj6TT0EwosVv4d9hdj4wye94zZfqRjh6R0rK/oO7vr
si7IRhkYa17JobeYLIQ3v5UDif5RMkvR6srns3r90XD7yYY4qu6xoyp2a10O
HTziA0LN6CN7MOt5GGx93NnVa7tr5FAiuFPsqxvt3J5Y01APDwZywGkGl6w8
DEZlt8zQARtNqeRSM2cvIToiscqvG8HZklBKLmv45Q3q6qW4xVkHPwyUYX9S
QCHbUWmSyTW1NG6BItFu68V8Tr5+6A5+meDxCE6ljQDFg4nD07d9DMPUo+n8
Mulvm/BsCtqGLiSi9PNnnQ4uBj21BsC9efnmxcuT5z+frjX0buqvj/31sT/9
nf6Pj7vD/l6iZjScfjaRBfKdHv6h8bSioXiL6Dvt3vovaGkn0dt/2G689X+j
S41aknU2enH0quFddyyWMJ7NU+MTjUvr10t7Uk6zXzUcumVB9Iz7okyUQpKQ
oykzqRg7S1ZW/B66U0bXnkIDCK4ztIBg0zx88khFF1zMmMEUGWl4qXtqPl1U
em2wptf/4+N2umE8nRjCbyoebo8nEp2lXx6dvB29OTz64fjk7S+HBy9PBo3J
PRQvakpVgfYedgtz/gvsr8NoJJdS4/AQYgdNO4Sh8UqkGoANRshBwzqlZkSv
ZrjoFAILD2+cinR16gxzwP2qqurgfQ2f70+fpulFMv38uddyJaMbXqDQpIDp
w9nB8GE89wOUTDIMPQtNVMami35q4lU50Id+ZIVx4lVGNPSsiuZtSxi9pmvl
LMFgFbH1JarbyZ8FzsTaQ/c9e+jIurgaZx48DQnOj8QPIHA2tsyoHfRFcS/k
tIYsz1Av2fLmC3NyYijDB4WDoVvec8pYJTHsBTbOC1RI8g5wUB5GtlvkfJJB
zFW5cwbe2pyJO8NILnozC3AmMZlA0BysIi4qEYeWrHqu1Cf4U6wPN9xeM+n7
cXfrOxtANpP1Jxvs2ZCnNT4tE7K+u4EgYTwC7BZ44wYvmvXh7nB7e0N/vtnf
RqBAAzkeF8KAYLdyeQD2/YgSmYADiZaohHAI0xSK6G+lw8HO4MlgONiFfwQO
/h3oEftm1tmMyPKqJLcGPDVG15eSPFh9e7z4JgNbiDf4ZCDBthFK8aNkEr3b
563V7MhLirvwzgJhSU2Lq24j8QqVb9W9/uNb6rkrZdRraISdkvHBA2JNcz8S
0zWyX8zo0CveyANA8kA44eEMobfA57soPNCvjQc/8TN0hLZCUHM4ca71ew9n
uzEcIcUbhzNoDufQDzrwx0b3MKS/zuhgi5yfuBdYvmEjIR7+u6Z4p4GTQ4mr
CHESC4y7A05EOIgP538+Tk784BS6J/I5cmsMIaMz897dhlPcFrErhr0asQ+K
k90GTl7aGGUZqifvopdSXuR9/jW4/XD46DeyW9yFPYozGp+mMpjfVAYnd4CE
tURx8Lca710aOV3wzvsziiJZOr1XI96GO2jefJgpjqhf8/dZLEQbJbQfzRZN
Zoz9zmN8IyVSaFgpnuRA6y89JUoi5vRsUYN8pxpn1WS+Kigk0b5E3hNWrGUD
repwPZCz7pLyIaGHBwscXWfjKDbihAeORcabRomXw3iaeY73jSAlF98hwcby
UujmEcQWH7iX0BsX2MXi4pLEfVGgUCebgHDPsevFoq6KRTnuCB8UfICWyQNs
hc+ZZtHB4+BYH9gjgk+PJvMOS5Pxs7APqxYNhY5kEW+GibRhw1k8jwskCtYO
Eta3zEOsQRwem7RpZpQAOSxo43ZCuIXxHPgeHuLPswn/vhH0VzGwm24PAdDS
yDciqDaok41auxQ9zuAvKlF6vPRv8JhkiLPBLBNx7UIJe5rkg1k+/tsf8b/v
B7Mxfh3jV8z1Zpx/QA8QbxElt0ML0MvB9nBbR8JtiA6lcfeKcEZ8SUVicHyj
nAu0okRquDigjTnG+qCpBGPKnKUFH22ADYrTDCNhKQucTR0HSDHZ5QAr5D5d
2UCVgtQNPA8zDttergRy4zQHTgQdplMxD4q3uwOc9LU+u6cdq7Nk/P4M3cnX
3+dogAMNY+2Hk79sHh7/ZW0Dg2fb61mcWUxCEWqWNgXbrmmUtKQ89FjkeWbq
mRbF+8UclzM2aCJraC0Qik24lh/z5Za0kLnyUGGps8HFlPIQTeYOcvK3SGJb
rukDLV6KPOvJbMNmCANML7Ar6LHwWPSu9ZYJqfmLsybFmqlHuyqprDR3wIDG
mJ8D45SsOQXvIrrRlVg4BXXYjQh9MyJ6jIfLxDNjB0CvWn2x8ZwtI/mfKtk1
yD2ZdxwUCFMK2dPhpiERmRRtB8PoI2YwVw3GiksI9tHoUHPwl+Q2wAf/dBc2
Qe7UjENFR8mTVPJwhXEkmpI7ZDm0X+s1HDCmXJB1w4TrxbQrdz7dZOVLz9Jw
N4wqj0LYZiPHCRY7njXf5KIg71DgGNOkBAqZFRMy2OB+xgTvsXFLa94O0w7l
oB2WgjmqWpzR0WhICdKYULJS33pMA06cqY9PDmQJUnScJG2Ant4cvVWc/AQ7
MS6aNQis3Mmbo33TyZv9/Q5SrBZnfUae4nGNiwVIl+xzN4XZm8AuOCaTzcRY
i12kkLdu0/nkYnD7fp1rMG5x35h4VcMYJPRqoH8WikCD8RymIRlf9lQM96vM
9CigjDljlBf1GnoNapgkX75B8aGVyYk8JsiIamgWRhGyEwRUdDWOAeHgV1oH
MbnhXUP4g531PEVs2/HqW/MyX8KRrEEoAMJ4sjFhS8SFElPx4MTRbxZUC4WT
iYvTboo2Oxx7ppsJg2dOX+6Lg/PWzl4Qg0FJUol6cHNiMpmYVziQFLAeZ/A9
4n0839A1v6TcPpegQ7SLR+UtZooHEVUx/UAEyQ1VojjEVpV6kY4TS7cY2ZCB
xsB5iwLR05j3xVyJLALzK9YNYZmhRK7BW4GPQW/q7VlOFJk9GB5DZXmmsieb
ImlP5HQBdYllS2cwOUU57AoJXlLnpHnFZnsJl+8iXDyO97ZClKMIDriuMswO
HPjjE+x02NNHrUxo37fotmPabXOLyinBZg9obDDWj901KCrwaFrj6awJUmvh
vJNge0YAjWBG/bdiRgGtZhgPhhsV9malKHMghAMkt61N9Lr6B6X9YRSpW6Ko
yQ6RuiREUsSZgKoFATVlIhJ/b9h7Ag55CVuHVS5NnFBDpvcRl+h8wTadc79Y
gDAhPhsI2vwiClYstTe7YdziHOIgcowhB8X5a8/jfecvsJg0s1OApm3jd/tA
4HGdW0XM1JJz1uqxFKNhzyOTD0UGc1xUMotlQkF+ljbaZ31VyDpdfj1lJq1M
2U8iTyXYCQmrDt6SpDmgMFxIXp6cjA4fkjJL6XRZuewnCzzxp6R2KFq2wixJ
lsaITvecTJSL8RQ12PN2KV1EqeTDaeXMQU2bxKQwfFB2/H/y4Iz+SQuY5Rja
5pECTRgHntXKS5I1pNFTxC7kHfoSMs+SKUXf+1FDQfwsLkBKTwMYzWwXMjY6
PEJrxkJk3KLmQGyMUU/GJB9E3pDNl1PZ2KhBSstAUvHUpNSRkTBTwIFbn8fO
9EfGb9XGn4yiz3pZNhIJWWmkX+WZMS4UTGxAUspNDirvgB2KrA1y7jYizNoc
wROnAGZBEU0w0FsMXHtwjbAAsoqJxYQHRSzRyM2BP+dZWdlAG0zQ5rjECegF
6OwzHGxxuBtlMLDJRpSEqBOVYkoMiY9nz0FYwZKVWKkjIIweA07wmUFntKoa
eG+Mijz9SMA0aRqUJGsUNdVLnBQqlaI/Br0Z5EGvZBhrdweP9w8PmukiY7Ny
bBr99Ahe+uxY4Q32x9liWmfzqRkZgGnzTvBOC6uHM62Yha5WxVhpbxqaKduc
5GnMDtwn0NFzpf7gY97mftI2z1P/48f+x+hTLvmStomW+GkOxy3HRYbxdpeo
aJp0Odu7FJ4GM3URxto6oNpp/4iFS2CbeZMylVWKV9PEJgelVOAfkZbNhu1F
itogWaYAl3EmglrrKDLQrwqTlCK6LJxNisV/m8fR37EA9KsMnp8lNYaDn1Ma
1p0n2g+p85gEZ7JhHtmITjXhmu38Zq1AV9UM9aQkOpJztGE9JnfK7OKC8qqz
PmnXKrLhVcTnOWZWhZOw1vKiD4IcNEsLslpz/hkqZGD4NMcXyia8trXV31rr
6WyQDnp6b1eoC6/6ZuNEWpQU5ADcvCbzYiN7VyuVrUkIEPBh1NUzPCyfTo3l
Mu7csfoTe8736uCPpNp7SzmYdv3ztfDWXuNY7X59v3gKDb94gv/t4X94ePoC
T5VfoAvCC3SreLGlo89x341zvWg/HX2/LkY4+J8KCrU4PjyQ88XDg/675dwk
hL0+SUk4nug+mRVgcra+tO/IOSIyJXOQ+BL5SyViFGG7gpnA9bVHMk/A+4Wv
HFi+Qkv0FR2i0sHjo0ePdCQRoNkgeEmxKdUs+K68geZstnK5Xo1vLmhalC3t
PoQZ/RBlQqcylODst9txKHrie9/e4QN0d+PJ89frfcutPcpVhmmWgvTxwF8j
gRgP1PvQ691VyPj6vUdWB1BX7JQdpSdHIkTtSMxnBlV+4DUD6+kPKOrTqTIr
4MYgOJ2GqbidLzOKAMbdibd33PUxAxAmXaGiJ0Y7UEmwcOT69gYt3y9Klclp
lm3uq6yZxZO82Okr5xLOl2QPobFxw+wj6Y/LT5ARtubBruy5gt3OyU3akwh8
e/M3bTlA2eQJ2CyzEuGoa8O1AYeoljB15IB9E9jqVmDv6Dejv3oQh+KtuhXc
PVGunTDYHogyA9laI0bd9Zw/YCZWd8vLqmcyLtHRKmvk4gWFqC7TC8xtUpRL
hdmAZ4Z2hbhhMLJY2/TPVgjPQqlsBjOSprx0ZY3UspIEpOerNNCaRbXa8Ygx
Qot4iFmxDm1sFGyyROkGTy8IM4IQELgUIwW6GNpU46EcWrHE7KxnJOB6FOIn
Z2N5zmIGO9nxzlj5/ISFyA9ZYgDz84rwTvrTgvU3QJYt4WZ30re5PTIdXwLE
KdZUQQWKHXpEvjtvpCPFiTdieXgmg3EE3qDxMAsjXmac6pHrMQBBV5zRal4A
c2kaLvTb81qaRvQo5H0Tyg7NJk9JRGeO09lAZOGg43uE351teMo05if2kztR
KQY/F5VzFEqJZRHchB1UUVwYT4APdzJgE/XRe5xTxObZK7wUeuJIQJ4JjZxS
MXXX6EXKps8lJSyqqnJCL/FXIVnR0qU115Ejp7FSOSMetTqIiFeulawpRv2j
qL6CGOU+2LUIVMGezX/actUDiRIovzwJ+9IoyTeufCVBxpOk9IorL8oi/6dX
B+Jr9j5sXTnNph98B9WH673dVwseq+P8Hr23rjx8720JEhZWlwTp1sSahJqs
MSnwVr7GM7PGFgDi324BW39NP9TSmm/+4TYLw2rE0pBUlH5cZIAzpjyfHXGd
LzxsMv5byEXE3sPppPDN5EOSTZOzzHQTSQ6urN91w3hvPalmIMTSBjPhMhAV
Jt5b4MG2Cz3y7anBxojpvdIUgPx26z+0JOBektFyBlvDpaZcjWi52RaILy5K
dujAEJ6rbFJfWuDE70dZyGxlrTzSMTLPhc0aab02VJqQh+REMhH7XhETmx1c
jjNiZTFIAMtQUkzytFhUUxMLCMCralGhFxK8ur33RL/PpgVZyjD2lEua2Uyy
ZKfBEVe8sv/FZ3dv5ex+jclF/6UvnV9/TmOTuDfcvnESdyjeizW9IRL5+eo+
vXMzBBepqS7TZKbxIK7QUhQStcdET2Dzx+SglCqTWjY97cHEXSQGLiVwrdN0
2ynlGcH56ANRLGpx5AROtSH3OA+uxa8KCZ7dV5p+QLsymbdBLA1U2Uy1/kDp
eNg/vfBP1w0WbI5y9CKzx1KsXud+xStM5piPaRlMmcbh/nBvy5x5u5EqpqTb
jJTWp+PmkivfOOCzzyzZCKyzEOsYiOS0kvB+WyvCpjU2qJEjtcvsAo8NzG5g
6J41VJrQUNINEK/YHhwqY0Yp0a/QnvAxwTMZqzRbjaEhs2Kab9lpSF9oG+pp
lFbYXTOHJ2uepVqTpZqUfhH/o32RlYL53m36UmvmWGctONAxJdWwopo7bFak
FjuVz2jLdcdWSpYLo1663Z7U9S105qRDD1YpPXXLqjzhQcdAu+79nkM2r7jn
FcaHrvYDxwsjdPBhflt5MFaH4ZrzFPBzWsaf3kLjw8uPeCphEh57gzKWhsAM
5h0/EOQz9hScwyUq5aSCk2hO9fuBFCNanVTevnn64S8D/2Dfqo3KuI2R4SCE
YZYsYRngdsdnkyYfs+ifEsKCTueXyYIC0DaLUtnfqOQfFXn/HTojIgsC6I4M
+1k/ene0IXYX6kcc9ITLYYJqolp/OJTYfTHTa2ciO64YHzrTSQjHVZLX4mpO
ZRoZXTReRiD7n8ANpmIK4PFOp5B2+r9gyus+1gpXzg+YA0e2nzwzAT4ZeTA5
R1JamJQtWyOnuSjKpRfZzX2oRFPjcqrMh2CA5rUhnoIxhrxTNmjyVFzcnlGI
884uPv3pk60b/fkzsSGXXxwtoh/SSznqCubY2YzIx6WdswARCEtMwpqCvQYd
m/Yp5Xv/9PUIh4nVtK1kbtGEKU25+jbXCDAFeJTf2LoviPWQzFmocHKEFXc2
dL2YSw0zccgbsOUoqIZuD16srVrKnRsFoSHtiY2avb6c6dYrvIRuKBJBUuTL
GcitJuBSSMVYO3hzx4AzrDURHhJby7Lz0JcKLpyqlxMxeAlPVcAGnTu6jMYc
lIpPObmgzebQFa4kax1d+xM5r63pdUD4moVfrm7AZZiocoPiF5ybiMSREOt1
uYTFqc74mnJjJLFQIwS7O3kfeGmI/fAZJcF0bqCmYTNUd8sRFZWOwXIo7Jo0
S6r3Bvdmlr4haW6W5KEHQI8PBngj1/MqXUwQbq+Kcxio5WVfVszZnGmTaphb
arLFxZnOsfw5GmMb/pKt4eHeLk7w7AFg1BXDuWGiKwy1a3m1iEHWCt4GEqov
IH6rLsFQjAYpDiAoYivn9qapgOpZZlOLPCOB0hTLuEqT92me2qJDZnvAgUzF
ycxzwJDASP/gX+1fYpVaxAG5Hvft0ZeftunZt5K1aXfn6TawEJkN8u2ZgtAT
PLy9t+GnMFdhbij23+mPyFsARJ7x+7RuLNagGDzhCJMkTByOFHBi2N6ofpph
JW0/054fi80MtgMvZN/gglcYwkaqF3R6ZrxmvanYNBlg7Hy9T5eVQQhlJHL+
gR9SKl9hfaWpWLWNW+uCRkZyhn6AIIdSjhWrMLE2uPtMXxaLsuopwDlt3MTB
vSIkpDjww9v8rEm+wT85zK5Zg9dWJU/FHcME/JCjF4jveUE8t4Z9EhPQXxYF
M5LzsLQMRf4alcXI+awybtpqZkbZKNM51vCekAWizyikVpvVatr6s6HDGOTG
UCVey+kVrGiqsa5AubugVEsm2D4EUSDUthrivIQLbCIhi70nPsi6I6KgxDjY
Gzw89ZOY2fBep6enWBc0YRV8Yrxdf/V2Mg45NhF4rNEJ/Gji8CQmdOep8LiE
eyS65z3HTbbnB+SOo0xNLyPwGXrE/UTKs/ZPOBBqM1y1Jte9SFwzSfNA1Xts
ZBM8i6GnqOBIK6rCpGmSvp/qUqMqscfGBna0pQFWYb55G2ZpVj2v+J44eJnS
b6FLsBklZT8qpXgeeXaLeGddyFf5KhnplsgkmS5ZWLTmHzufZylOPWCaJpGq
7njs2L7gWWr8om4mSkUJ4bQkwFBqMjVSKOGQsCeRH/NQwBYzgQiiZp4jxcxs
1vUwp5WpiEPlkoKyOoFSsNo7TVQ8cpoziQ9ka7S/A5uE33NkUm3xAjoBy9F4
4CWQt+fpVKJntqBCGR7avQqFQjd2T5Ra8MI+urYs3qvCoy43DliMfpYic+A1
x4x+/CY8q4Ixe7o4H5nb3kl/Ds00Vn9VqFLJQbe3hhNedCRoyY4WrYk8aMes
EeaIL8keWtkSfRWpZSr9iEJkhtvLBS4kxjipw8yYztLzghwmulFfLxUdByae
M3YjYk8YIccHu8ZhyhWrqHDzokxyKgkj1iDrtmEMIG5KHFKTfKm8+gmVqfhs
QWzZb6oVsMTh+Jp+GHZMN/hhuLEHfhgPe9qKnfz3Oq3tNk7cbvf5qk5rByY4
h6McK6MZshCvwzwv5vWIRptNqdSZMX9YnfYr+LyNoosVRmLEgzKtFyXKh1Hg
RQBC2jfVR6MC/kNgPpaYxmUFbR54OgLFA0+0TRiX19A2Ya5GNyIJenHbmdPx
yfSm5FjnDCeLI3ZR5EdxtBhniXXk8CwaS4+li+WkvaMIUMpaNWO7SjYBMTFl
DziYK9JwPbc1ozKgjSfuv/ZNpdoma4LXIMUZU9GGvI6OdnYY2DkpvMYeujFQ
oxgb9AIELN+9rSMd8VWGxXqeu2VBuCY4AG9shBqJxZEMO8bsyLUF0f7tVUXL
SNsnBSPlw2tsrudb+31wmwbsbjwBGlz5QPHzY5g8Fzf04ZEBWNOKpSLa4cnq
74mvMgjalznyO7q1E/LNNmjoyFbf4/YmpusOnzP0A/sKzjkGW75vToN9fx3n
nBc71NGLbf4z5D9bt9g8HqL3LR5m7M/qBfX1eh9y785hw4TrWmC+ytiHwdhR
cVhM4n1/xd7N2C9AVQKl2EvX6kHwgL0PY/MuqW9nzkKKNndOzeHttB1/nIg4
jmYT/FrAC+rkKLcgzhnO2lfpvUE2fh3U3693N3Y5sMJTFNyTlw9MNjF6sexC
p5OFGEYLsutwhVMz9hvIpomshyebKPBmxY1JyIyg7ev03iCbWZIvzhNKCd3k
NV+xdzN2KRMcn4KHc0TkIx05ITfz3nI9fODe23I5i6ZdonkoB6B4foyljkFI
/KdNcIDyuXTAcnoj4/+tDVCc2Z0PFY2cY+1mDWeFjAW1SMwnSrXtUqFcXCAx
AZ5UQdm02DYmcPipkV7Zkk2Cudj1VMP/BUHBg3lj6uGsQqHB0rPRUAlHP6KS
EiMqK9cTqFQBWWIkvDR71tVGEgBwV1RKWDQicVJQsdNpLiVq3qHwnnaBR8yR
kWStnE4xUxSZ4Fz5BXPM+WMxS/XpsQ9ceDDnDug9vebTJ5tggw+/54bWrD2R
ix54mDM4Q7uvN5HGwYqnm6opdAd7hD5DB5zbjGqSTDM2anumUfXqp4MjzDYS
UxwFGrzNBj83gkkjSF4sli65CF+IZxVpol1eNoP3U7LX3edz4h4BzyzKnBxk
TAYVskHTSeAOFXuhhSS/n37LeuvEK0ceDWPwpijwHzXQOh8HRoWr/RIm6oqV
iZBSK2HH1jMsLCTTrl3jHXqSLy3akZUg6vDAANyg6wGm82czLru6eL5VXZVr
JDhD4lfEDaS2hXk6OlKdR7stxDQituPQ3fegWBlnE14rZ0tPek30/s+HXgOi
joZ2dzk9ElOS47pe7WZkQA3rtDExeFZbRN5lcoOBGs8GzIFCYJYWzxwE2JrE
fOsX7h6Y5gaZdcE5Kc84Qqd2B38dRaNdnW7TnMkzwDP5uuAX+gdJnWzaX4fu
EOnuc+plSUZv08KWxHYHU2yBDMo1UeyReIH1WrH+kr84NSWiDAfHnGB4iGz8
LDglbWaYR/NACfmnMZNI9Y5VNVyitV/YXFJJIsG1YlH3i/M+FdSw5dHX4K4K
wkzHU/LE2xkM2aPLjVz/yKFWzSE7xPonXcGEqbAC1jMsHLKSxr3TLjsvHlcm
HGawBbXuqnbCtqD6U3A0ik2ZzL6y8OIrTgUUwKsvJgYIZVXNmyavCQs7684L
doPzhQXI0i1kEXIpq5SkXu/GjlqJHe0lV92nJ0aSZ5GkUZ/yyQDXCr0IiiHB
9pTkY5Z1TKSq5khV3ap7UycfaS2I5a+xyeNJ5mI291N3s3TonIGD9EboOuTv
j7ZAmJGULlJQkRMSxFpIaERWB5Mr1IwGRN5lxoUpSyWuptDyRZnML330Fuc0
jVjN0w/8DgrcE3t0+MUuPB905Bti/XCnZGFqLUx6bpwD0O3RbD99UwC1yQHf
rdpR2UuhtVkjFTPnah4Ls3X50OTnohBuyeVonSrsQaSZhiic4qWp2l6aDSdN
t9GHQGI36OHrucQITt5SUOakLzG7qokO8SQN4Gu80+1D2pA9yN2/qqPOzuQV
bpNUofyIqoZx2nGjRLAbnr2RSWxBHb6iO5yBA2it6y/gkJ2BL4vKHiRgi4JC
500bYM/yPATGSojdkPi9i58Ydaua3XJ+orhrMFNVc/zqtk6/v4vPrxPgfW9j
9iOaNAvjSaBDgNnI/Zjs758hRQR/PN5DvLwyTLm/P00TjARz/CEuE4lyHwl1
iEFm4h5ay3xFx7dZUsRAnXFIVrq1jMNvt92MpQMDTBWuKIMK3Ey/LhbIK91H
QrzLhxk/RtrfduivgXqSsv9LMV3M0v4JEj05lJmofUl+2ZPE/Tb9dA2Nn58H
GxVG9YuQTrslsX+zDxs50onvpin2pPJwRxlNapORLC+UVBm0bfglBt18MAuI
wqV8uMyiEOe6itXM1jT7s9uy5LRmt0njEbTecregYqUXFEACYuhUHNIK3nqU
50TpTaceedlRbEweSfPyYrNVXwqn0RFyJx2wr/RXUEpREUokRszlmNksqfrT
I3MnblUxtTNOKZODSa7wjrO70UwEOmAnM4wwQWeJIrHxDskmMQvnWVb3vSx4
tpZNznJ5K39dJJytOPfV7m+qUMYTNwMrOuHEtg7NgSwl011gWjOmO1eXp0NV
Zm+JykxOzF7m5QkEeJS/bFKJ78tMkh10ssVCOmQ258ogHAV6Qgm/I+9WPRYf
iQPkapF78aKcbpOdaY33Q3OZEY4srElGlV9qRx5Jd0Uim/acrY6goEc6JxSj
oxwlcGeHZS7EJO52frJi1vC5ztbxnw/ZtzPWKqbtyZ2n8Gy2yLkF8dJYCgpj
dXDjhtLkvCZBg5YfHiRay/k5iCQtAqiM2ysS3DeVFw2jxGEeRARvQetjxCA8
+OL0FGRnygIDM74k66uyGZLPF1RW1cM/03gH9bmJiyBpECmO5OXhPk7DqkPh
cg/CHOyKl5z7LuIkiVYRSBtZtFVHAYMbqwiI/7IobJw73ySRNgqaF3BlEr9T
8v6Fq9JFm/fKQhWtMDcVqSTKjhDGjtE4unH6hUnkbvhWmIHbuHx67dOzvCZC
YTa3eZpcjS2b+8eOTFAN2k9CNXA5t1mKNsfsnNx6OM041zzAVZCKo35nUQlK
6uOdCgWFYkjfQOqdSJR6XYJ4rkEDKJtBSzIcXtCRGsHKliDsIayY0hxm+TL7
O257HA7Bds8+2z2xbJ9fpphLY2NOZjS5WndcQWaDt1D5hpC3eEZR/e71aYhD
Zl24+jFwV2ohwM6ZoA2mpcx2JNU2ee5EIKr5bQ4M5jz8kVrOUkmY3+RgC+9F
G9EVJOmO2zlabmLOssCWTDG8kSjI3tLCVIszdvA6PFam77rYpDMUL9aeMP8h
NXE5hHThoecYABwpmVcbx/ibTanrVZo6E+pGmDTQyGh02seSlZBbkJ3eDwBd
QmNvT45PDn8Z7f+V1VCiVyqAAQx1IpF3MJpKQtqMFV5cBdz2Oy6mnBoLQ2uR
Oim3uclKYKFzJjMz2H479Ukk/IYgfffy5M0pwOnnW2skib9K/DIGHuHZWiOy
7WEGDi5L6OV3CKJTLTzWe73EsIzC0Ne4XM7F9kXZtnmBBnRflB4KrFDkMvGY
A94g1y/zmCBLBKDrFe+EkgOTJJ2ofIvHgMjZFhSHSVbYBL5fUkWIRjzNKy/Z
fa7/c5Gnentre2ugT7OcixbCRuAKhUppccNxJVk0wcN6EIWejgOSxZ1crLgY
4zVLSjSgBxn0vUizc8muJjvFykzvjXMFTDD+2Um64Vlp41k5df1M9dMpkzNs
XBe0kDCKg7bhtGpk2EgmyZxsQ42CCv7wwnEV+u+F0WJMkXAE8DKdzvWklBiN
FY4TQD9Az3iIrA5HR6O2qoNXuw6PMSJLyovLbqCpkYTzTWOjCrk2GSsxEwPH
/fr9n7ozqFdYlO7TI1Ae4v2h65O04J1cneNbzWzBHe7S8Bo+TpaCIUfd1+lc
D3uBMa5ZK8AJ4z4zQiybYxbV9J41cSVnaTJGqV3SBvFPki7ItVdOI/SOSb6e
UwJv2JbzwqVY5HussiXWmcNP+miK8NA25EvJVKMkS12FeHI8QIGU2rQCFCX/
kcpH9Ig9QDK6oWQoBRhSyT1oBmyPpVpA5PIDuCAKtZz3/O1rfVoj7zZRgLKD
ePtWUcZy8xS2XuroePPX1/umRJsUr7Qx8854ZJw09rgtQYnNR0WTi7Pkv+sl
e+CckRydb+thCqNwirVePxodbqgn3AeegFhn8f3N0bFGtiYSPdbyy1zdjWZB
O8pTsfJQEOlDFqw1wvqk58uMA/VUSug1Sw7aSqqiAdjyNgDfZgwwr+wfYgVE
xn5Y+Y+rPhmFZ6CexXq2gh4lWdIzFP7C1Et4xUS4WlHbU3CoG97ExpEqw2JE
khLDA/XtQL9FfojNUmpO23/PF+IFPIdXZxEy6BdUNwrMDrfsmsEsCaamr5Qb
K/rmZLWpNfD7vfYlXEofs3QVCEiqp6Z/yZ7mrtl9064JQF8yLS583YVgdYkk
gmUr2O0wy0giCOh52y/K0Cl89hogN5YeRwi3LG/+Ga19/+f9/Zen1rhp9+D3
KQV3Y+QzZbYhh24Jgy6pcLIZseSwqG2laCIVP6gahrUjAnoMqqwyJCLpdhpU
YVbdcDdG/DHqCtuX1jwGwmwOWhT+Zdmet4KbCLBrOdpHyD86cCuAGOY5FM7W
7MnP4tzEqEun66tLnpZkh/Y0GJqZvipghI0YcushgTQEt+s+7Cf1omKHUt5b
LA93U9YxW1FW1ZytDghs9UbkMPUiz9NpF6v4NujGmQdMVzf0FFn96vvtrf42
LMQRWdFa5GyLvmEMYjQY3854FyaLuei+HzNCoMNJUMacxLxIrNBj9Cy+7/fA
j/2aR8bfue/rpnd74zqu+Wt1fUA0xxeZyPj7Pk20PIw2EGmERxR8f5jhUEfD
Df2CRUA/6uhW36mBPzoLyP0awNT8o6Ofjm/7UuM7t/ET1b27y3utNtxAvr8/
HDsbIk/eE5vCK+41EGqg/wWjYAh2JdnTwX2HYJbyfYfw5RS15w3hyYZh23ca
ApWaTClIgnctuv50gxfmnWbBx8ct6FQ1LwSNUanH3unJL73bNxB8H22O4HM3
CILvJ1IN9b4N3GadrYbg2QZL6l8Ogf/5/g4QfLthtpv7zkIoSd+5gegI7jSE
ru/DLbNg7tmAt17u14C3Xu7VgI+P7gaGQ2IS+sAoI/HGmhzpjp9VEKyche2v
OQvDXdv6ygbmtY434PPErgbWkQXrFQ1I63q4Y1eTaxe3QlYCNrS3v3Z0YNpb
95SHjcZWIuKO7A2NDjpmOLZBi2pyj43qAXa3Zkjc47s2ABiAHfFUDp3827du
ILBq6uHTm2mp2YC29Vvg45SAuzTgfW4jbwy/9dZTs4F1Ero2+MFnPjEKYExg
Bsp2A5blAAO2PN21qltcrdVAu6kmH/GhXNlAFw5CpvTFhNS8ub11RzqIsIS7
0cGKfaOzge1VfHUd1csNeXB4CzpYgeGADqTVJpT32+E9KL94e4TfD6QZ+0pt
p2bsKbVRzdiDtlsz9p75appxO3RYjmlcmcgbj42oJF7sOTq7+JmsHJ8eUUHc
7qOsUZ6nH71zo8ANp10p1ysv7mohmaNDk/I07qLQ4+NltnBy+uGgWK04v8yy
ik5cVIcVLYzc7bkz6aDaLDk5Oe8mtcK1iYEpFtOJ56VB5/QfUomKKNO/8/mp
iQaOlxf3YzVa8+GVB1/SyZRLSEyJ3KmglPP2kHLG/ygqqWh86ynCVK5e2+R9
UgPm0OC2zvnLN/jQjXPa2847yjlzmiZ26uOyyoB5b/YlKpyqOvMi1UNty3z5
J3YYA1lX7N1a2IJ22B0gB/MAcXp/BMhUJv+DMBVpePuuDcsYKTJDavuQ/wVg
RlwlTLImDC7i4TUxHbiJWj8sRAI6XsjZmEkvT2iA64+GjVNVL73jDYDFfZvk
BQRmoI1DJN4w8SXBGXnMP9Tvknw6ECAM6LHeOt4E1Jk5rSF/IcROI7RbHibs
SKgL8+VGbL2dQ8TKNmWpl2PgLtS0qNUAxAygYqfKsJVgqiLoawxtNcRtksdK
4lLmIHSzdckNysU0rZqJ1HyPGpMBmAC3zsARzyXCeACSScDmo0nme+Jhxy+a
6VgiusTJcmrYrLsSYIis1n1XXft8Rxbno6HdPGN3seazxqrQPBNGQOdyxHbX
lUpp7bvwZgSex+7NVXfh5Ws3byZNwLV7ecVdxV9eeOTOr9h3tS3w1rprPl8E
vWkBP5vXfzNX+KsvrwQ3/Mtmoj3Z7Lproq89AGznYXPNDoNP7MaXvn/HBsw0
3L+FN+R4srqN1dljHsfeJsCuXRudELQ/SmC639tt6O/WQuTdzuG3Rx57vfPT
mr67vRzO3N3eDT7y6t+uN+3/XZ/w7g1cdQVbpUXeiF56NPRAi9ze5stGtzl1
Ql0wKPn7wm2D3mV6+XEbHP/ljtv0Kj9HrmTmcf/VjtvyasBY26/Gb8u7AduN
d2s/Qbf3Gux9JzaWwVUEe6Pu/bxC4TLJWK1cDKoW6n53UjHCbIvzRqopq29w
Aqt7qBx+X043iPfaoWjoOyga/GHR4lG3umGLpjUkwqSVAXKgD2v3dhWKTx3Z
Yq3EKSj3Sy+QINvMMnl40HeIwCAufZWitiol2RKq506PrGm/5TvoQUnXgP3s
gV9z0H4/dxlvMNwOzWyFNnaJdQscrXRpZvxhtuqXl7MZwdgXrDVzCGP/8MB6
q0oifqvB3GK2SXNrKEPN3m2xw2DhrOrVw2F3RzurxupPGDWzepgr5pc7/tdS
npqIbqpQHDTg9KdAfVqdQPBx95bQ2Dhu/6HNK657+bteXP9q74m37FESPRml
zEa4mx7l/o8eadhn7tNjgLXH4S/qcdUD9+rx2qNM3foVueT/umePVtPkPsJf
kUver/v2CJ/TY/pzfT1izkFub9Jj45I3n/fs0TSGi537txqyGaOT9huP/4tQ
Dv/1VG7vhy+FthR3+8QdezQwBwc413YMcZ4TU+pv3WMU2Cjkt1Gu/93jf3+P
noYdtZZ4F+PWlDv36KnlUeuKd7HL+nLHHoPGI5+vOo+Pw7X2uLn0Hr7HxqXW
vX/3+O8eTY8Ra5a91Lq32vR1U49Ru3bc2t1x9a49XrcNaICz1tXt6NWde8oA
b1EtSchHjAseyUSN5BLqdPZq4+F79diSxU2PRoDjNOjmqi+a31cL6Go7/HTC
cfceW1Y4avv2V+/eY8tSee2E7dtcvVePIJEbwde17YviXo/+PN6/R+1L3f5o
2ld9kfy+Pf7e8/gQPEfFjLbOOnoXu61B4b1ttxF76rwsQBnEZEPdllx65qFM
uaq76y825zatmzfac8kiROlhbGHsNnhUR7WYSh6EWSqloewbYRYi5zvRoywm
H5KpZL99XYz0DkfTH56+3f52ONzDDAe+C8YKKEKvjKjXRfCI8cQwtfU60L50
qVdjvhle5niXd6u7zbvYl5sz0AbQ5PaNYd/C0IX9+9h+V3ji8Mf640h2bc47
YZP6LiW1siQ0JlO4cSIyRkOqhd01yzEfl1v3xNme/I4aGcAkZp87zaieRp5c
BKlNfGyuIJ1uRP8LGWrtaG6y1d7G08Vx/K9iqe001X4tS61mY23IG7Vpr/GA
pRT3xL16bE9No8eOB76OhU+efBydvoewDXs/r/0ewztf1mPTGmx/Nnv07nxR
jy8NscB2d31tS7vSL7/H4M4XjrFhDW7Yhv22nV/VF/T4+1MO/73ZNhx57n49
3tU23AgC+Kq24Rtv/bvHSI83WWpvvHXnHm+y1N546849Bs12fv6159H7RCWN
x96tuy/DG3qMfq47vv+7x//VPd5s7vWf+BLjMPZ4oxPpXbxMb9UjGWAjLpaB
wBFzsrwXcrnHt6b2NSmDpjSR1+MND9xjjK5YkC3TE45x9QP36NGoaqHi4WPV
5DUO9I4v6TGqV/g9rnzgPj3GPENDUXXVA/fqsWVnbva46oF79uhrA9EefTXg
QXrEj2d9bvfY/cC9evxd5/H35XKdxmtrEL6L9brb7kvxpyq0ZTczK396xEmV
owGop2kym6L9J/04x4yd+bhRvLJP9UuKEs+3mtlObSp7joFLKcmbl7W4LhSV
DE0rLHRuqgBIAOm8FkijKZEp1ZyY1rJSecZUDhe7LGrQ8mvj8dmTKFYEojIV
AFuYAM4+nyatomZ+5YrW4N8FFvWgMmm7A7K+jYsZlXSvyMWZc0XLdPVUnc7m
XKDIK+FCKV1tVUjBh5/p2sswSc/CO5K2+DKbS3SoV5SQq3ck+jIDsMvxJSUm
LYspZmRjn+Qqo7pLmfi1+iVz2Vws1VQx362xLzJwITowbHCccBbxWTad0txB
Z7GYPjR30rFIUV5gkURjUlZh7ybmGAYbVkd9URbvYcQ9ykSO4JnMzYYwADsE
OkUNG+QRMonw6H5hEoq2bbbUPKHJpnmMlZSAYbRfk8nyuwszk8u7QiEYCo0V
eKqGwVy5B9exag4FCW/CmrIZZr0HsEjPxiAOo54UthCH4uUQw1ZhM4ZHaqlV
A42lpVrlcbFftXK4YdJ4NDsDADmQZc3e1ZVhOg2bdJEDx3Br3JqkJ+l8Wixd
plV3gNUsM9QwOa9i0I9Xc/iV714DhEC1OISO/eiG14GWkwnWN+vczm5owCbd
7t4Pv2T0N74vprKmvez2r98kP6x4fYS0V/nE9/DdN9vwpYPQHnm98hGvCd/R
xWYI8lNS9L8PHom0wCzQ9R0ZVvuRm0YRfmKPhLi8aeJjjzRm4xbIDx9x799i
8uOPfCkIfhOPm3PXRmbHI91GhTYs8Uc6jQRtO0DnI6o9y3e+otrEeucr6lr2
Pzfca7vVrbjiv6WuTYp0d78RHRG94r+lIvdbExG54r/1IDjV7U9suYXXoqwu
Rt/BteZbsVXTuvZFXYUaVkybi2h9DR4UWbGxNuKXuI1VnpfRn8Gle07zg6yd
5uKxhYosQd7iSnjpYYYTUXWx5paouEFlQBE/46VaSJ1t67JEfzG1NFBGXYVL
3VnhEivRwopdQKO22KW7pqgOKYjb5nGvAA8mD0cBU4+kDAVnKULVM6IOGPm4
IDcgLBqA5Tac4tS3ZSt5bbnK004rpPXWoYFw4qikLDF9Eo0wqJdEBdVpfAaM
5AylfJGf/dpncymaNI8VTSJdHdry8BBrUMWEf/3O6vX70VJHGMr3SO9TBqhp
caE/PbLfPyMV5QtUWNLJd2vnybRKgTb+oPXWUPexLA2V6gWkTlndDOsSN+0U
6OZilQkuRMr1Qcl7RwW1myWV1dJ4D7Gi76oko/aO+uMAK7hjIdApVki1fkIl
ECw7xEiOKkOKQmj0A8tc0Jz7Ncs+JNNsIumecKDbsYE2yKGWMp/kGSVolwnt
SSkVfPLXk8O/uCp/DKkqcuOiRpHKU7FvuMKdXm3XeOEArsyy1Isc8+7nXCN5
utRXafI+zVUTIqySCy29z4uraTq5ECr/9Kh5qWPyycrBVewqyRU2zd5L2YAk
f0+EitTdVnS/CUtD/Qp0cIEFl7iaHFUsIptJizOZVZpIWaH/D04cfcg/LQEA

-->

</rfc>

