<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.2.3) -->
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-attestation-freshness-06" category="std" consensus="true" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="Freshness Nonces for Remote Attestation">Nonce-based Freshness for Remote Attestation in Certificate Signing Requests (CSRs) for the Certification Management Protocol (CMP), for Enrollment over Secure Transport (EST), and for Certificate Management over CMS (CMC)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-attestation-freshness-06"/>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization>Siemens</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="H." surname="Brockhaus" fullname="Hendrik Brockhaus">
      <organization abbrev="Siemens">Siemens</organization>
      <address>
        <postal>
          <street>Werner-von-Siemens-Strasse 1</street>
          <city>Munich</city>
          <code>80333</code>
          <country>Germany</country>
        </postal>
        <email>hendrik.brockhaus@siemens.com</email>
        <uri>https://www.siemens.com</uri>
      </address>
    </author>
    <author initials="J." surname="Mandel" fullname="Joe Mandel">
      <organization abbrev="AKAYLA">AKAYLA, Inc.</organization>
      <address>
        <email>joe@akayla.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <date year="2026"/>
    <area>sec</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Remote Attestation</keyword>
    <keyword>Certificate Signing Request</keyword>
    <keyword>Certificate Management Protocol (CMP)</keyword>
    <keyword>Enrollment over Secure Transport (EST)</keyword>
    <keyword>Certificate Management over CMS (CMC)</keyword>
    <abstract>
      <?line 107?>

<t>When an end entity includes attestation statements in a Certificate Signing Request (CSR), this
document is specifically concerned with establishing the freshness of Evidence statements among
that attestation data. Current attestation technology
commonly achieves this using nonces.</t>
      <t>This document outlines the process through which nonces are supplied to the end entity by an RA/CA
for inclusion in Evidence, leveraging the Certificate Management Protocol (CMP), Enrollment
over Secure Transport (EST), and Certificate Management over CMS (CMC).</t>
    </abstract>
  </front>
  <middle>
    <?line 118?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The management of certificates, encompassing issuance, CA certificate provisioning, renewal, and
revocation, has been streamlined through standardized protocols.</t>
      <t>The Certificate Management Protocol (CMP) <xref target="RFC9810"/> defines messages for
X.509v3 certificate creation and management. CMP facilitates interactions between end entities
and PKI management entities, such as Registration Authorities (RAs) and Certification Authorities
(CAs). For Certificate Signing Requests (CSRs), CMP primarily utilizes the Certificate Request
Message Format (CRMF) <xref target="RFC4211"/> but also supports PKCS#10 <xref target="RFC2986"/>.</t>
      <t>Enrollment over Secure Transport (EST) (<xref target="RFC7030"/>, <xref target="RFC8295"/>) is another certificate management
protocol that provides a subset of CMP's features, primarily using PKCS#10 for CSRs.</t>
      <t>Certificate Management over CMS (CMC) <xref target="I-D.ietf-lamps-rfc5272bis"/> is a certificate management protocol
using the Cryptographic Message Syntax (CMS).</t>
      <t>When an end entity requests a certificate from a Certification Authority (CA), it may need to assert
credible claims about the protections of the corresponding private key, such as the use of a hardware
security module or the protective capabilities provided by the hardware, as well as claims about the
platform itself.</t>
      <t>To include these claims in a CSR, <xref target="I-D.ietf-lamps-csr-attestation"/> defines
<tt>AttestationStatement</tt> and <tt>AttestationBundle</tt> structures. These structures specify how
attestation statements, including Evidence produced by an Attester, are encoded for inclusion in
CRMF or PKCS#10, along with any necessary certificates for their validation.</t>
      <t>This specification does not define freshness for all possible attestation statement types carried
by <xref target="I-D.ietf-lamps-csr-attestation"/>. Its focus is specifically the freshness of Evidence
generated by an Attester.</t>
      <t>For a Verifier or Relying Party to ensure the freshness of the Evidence, knowing the exact time of its
production is crucial. Current attestation technologies, like <xref target="TPM20"/> and
<xref target="RFC9783"/>, often employ nonces to ensure the freshness of Evidence. Further
details on ensuring Evidence freshness can be found in <xref section="10" sectionFormat="of" target="RFC9334"/>.</t>
      <t>In this document, the freshness of Evidence refers to the incorporation of the nonce into the
claims carried by the Evidence so that the Verifier can determine that the Evidence was generated
for the current appraisal transaction. It does not mean that all other claims in the Evidence are
newly collected or updated for each exchange. For example, a measurement claim describing a
second-stage bootloader would normally change only when that bootloader software is updated, not
merely because a fresh nonce was requested.</t>
      <t><xref section="3" sectionFormat="of" target="I-D.ietf-lamps-csr-attestation"/> defines an <tt>AttestationBundle</tt> that can contain one
or more <tt>AttestationStatement</tt> values. For each Evidence statement whose freshness is to be
established using a nonce, the end entity may wish to request a separate nonce.</t>
      <t>Since an end entity requires one or more nonces from one or more Verifiers via the RA/CA, an additional
roundtrip is necessary. However, a CSR is a one-shot message. Therefore, CMP, EST, and CMC enable the end
entity to request information from the RA/CA before submitting a certification request conveniently.</t>
      <t>Once a nonce is obtained, the end entity invokes the API on an Attester, providing the nonce as an
input parameter. The Attester then returns Evidence, which is embedded into an
<tt>AttestationStatement</tt> in the CSR and potentially, together with further attestation statements,
submitted back to the RA/CA in a certification request message.</t>
      <t><xref target="fig-arch"/> illustrates this interaction:</t>
      <ul spacing="normal">
        <li>
          <t>One or more nonces are requested in step (0) and obtained in step (1) using the extension to CMP/EST/CMC defined
in this document.</t>
        </li>
        <li>
          <t>The CSR attribute or extension defined in <xref target="I-D.ietf-lamps-csr-attestation"/> conveys an
<tt>AttestationBundle</tt> containing one or more attestation statements to the RA/CA in step (2).</t>
        </li>
        <li>
          <t>One or more Verifiers process the received attestation statements that require appraisal and
return the Attestation Result(s) to the Relying Party.
The CA uses the Attestation Result(s) with the Appraisal Policy and other information to create the
requested certificate. The certificate is returned to the End Entity in step (3).</t>
        </li>
      </ul>
      <figure anchor="fig-arch">
        <name>Architecture with Background Check Model.</name>
        <artwork><![CDATA[
Attester                 Relying Party            One or more
(End Entity)             (RA/CA)                   Verifier
    |                         |                        |
    |  Certificate            |                        |
    |  Management             |                        |
    |  Protocol               |                        |
    |<----------------------->|                        |
    |                         |                        |
    |                         |                        |
    |  Request Nonce(s)(0)    |                        |
    |------------------------>|                        |
    |                         |  Request Nonce(s)      |
    |                         |----------------------->|
    |                         |  Nonce(s)              |
    |                         |<-----------------------|
    |  Nonce(s) (1)           |                        |
    |<------------------------|                        |
    |                         |                        |
    |  Attested CSR (2)       |                        |
    |------------------------>|                        |
    |                         |  Attestation(s)        |
    |                         |----------------------->|
    |                         |  Attestation Result(s) |
    |                         |<-----------------------|
    |  Certificate (3)        |                        |
    |<------------------------|                        |
    |                         |                        |
    |                         |                        |
]]></artwork>
      </figure>
      <t>The functionality described in this document is divided into three sections:</t>
      <ul spacing="normal">
        <li>
          <t><xref target="CMP"/> describes how to convey the nonce using CMP.</t>
        </li>
        <li>
          <t><xref target="EST"/> describes the equivalent functionality for EST.</t>
        </li>
        <li>
          <t><xref target="CMC"/> describes the equivalent functionality for CMC.</t>
        </li>
      </ul>
    </section>
    <section anchor="terminology-and-requirements-language">
      <name>Terminology and Requirements Language</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 <xref target="RFC2119"/>.</t>
      <t>The terms Attester, Relying Party, Verifier and Evidence are defined
in <xref target="RFC9334"/>. The terms end entity, certification authority (CA),
and registration authority (RA) are defined in <xref target="RFC5280"/>.</t>
      <t>We use the terms Certificate Signing Request (CSR) and certification
request interchangeably.</t>
    </section>
    <section anchor="CMP">
      <name>Conveying a Nonce in CMP</name>
      <t><xref section="5.3.19" sectionFormat="of" target="RFC9810"/> defines the
general request message (genm) and general response (genp).
The NonceRequest payload of the genm message, sent by the end
entity to request a nonce, optionally includes details on the
required length of the nonce from the Attester. The NonceResponse
payload of the genp message, sent by the CA/RA in response to the
request, contains the nonce itself.</t>
      <artwork><![CDATA[
 GenMsg:    {id-it TBD1}, NonceRequestValue
 GenRep:    {id-it TBD2}, NonceResponseValue | < absent >

 id-it-nonceRequest OBJECT IDENTIFIER ::= { id-it TBD1 }
 NonceRequestValue ::= SEQUENCE SIZE (1..MAX) OF NonceRequest
 NonceRequest ::= SEQUENCE {
    len INTEGER OPTIONAL,
    -- indicates the required length of the requested nonce
    type ATTESTATION-STATEMENT.&id({AttestationStatementSet}) OPTIONAL,
    -- indicates which attestation statement type to request a nonce for
    hint UTF8String OPTIONAL
    -- indicates which Verifier to request a nonce from
 }

 id-it-nonceResponse OBJECT IDENTIFIER ::= { id-it TBD2 }
 NonceResponseValue ::= SEQUENCE SIZE (1..MAX) OF NonceResponse
 NonceResponse ::= SEQUENCE {
    nonce OCTET STRING,
    -- contains the nonce of length len
    -- provided by the Verifier indicated with hint
    expiry INTEGER OPTIONAL,
    -- indicates how long in seconds the Verifier considers
    -- the nonce valid
    type ATTESTATION-STATEMENT.&id({AttestationStatementSet}) OPTIONAL,
    -- indicates which attestation statement type to request a nonce for
    hint UTF8String OPTIONAL
    -- indicates which Verifier to request a nonce from
 }
]]></artwork>
      <t>The end entity may request one or more nonces for different Verifiers. The
<tt>ATTESTATION-STATEMENT</tt> type is defined in
<xref target="I-D.ietf-lamps-csr-attestation"/>. It identifies the attestation statement
format to which a nonce request applies. The <tt>hint</tt> field defined in this
specification additionally allows the end entity to indicate which Verifier
should be contacted to obtain a nonce.
If a NonceRequest structure does not contain type or hint, the RA/CA MAY
generate a nonce itself and include it in the response.</t>
      <t>The use of the general request/response message exchange introduces an additional
round trip for transmitting nonce(s) from the CA/RA to the end entity (and
subsequently to the Attester within the end entity).</t>
      <t>The end entity MUST construct an id-it-nonceRequest message to prompt
the RA/CA to send one or more nonces in response. The message may contain one or more
NonceRequest structures, at a maximum one per attestation statement the end
entity wishes to provide in a CSR. If a NonceRequest structure does neither
contain a type nor a hint, the RA/CA MAY generate a nonce itself and provide
it in the respective NonceResponse structure.
If an RA/CA is not able to provide a requested nonce, it MUST provide an empty
OCTET STRING in the respective NonceResponse structure.</t>
      <t>NonceRequest and NonceResponse structures can contain both a type field and a hint field.
The <tt>AttestationStatement</tt> structures carried later in the CSR contain the corresponding
type field. In terms of type and hint content, the order in which the NonceRequest
structures were sent in the request message MUST match the order of the NonceResponse
structures in the response message and the <tt>AttestationStatement</tt> values in the CSR later.
This matching ensures that the RA/CA can associate each attestation statement with the
corresponding nonce and, where a hint is present, contact the intended Verifier.</t>
      <t>When receiving nonces from the RA/CA in an id-it-nonceResponse message, the end entity
MUST use them to request fresh attestation information, typically Evidence from the
respective Attester, as optionally indicated by type and hint. If a nonce is provided in a
NonceResponse structure without indicating any type or hint, it can be used for all
attestation statements requiring a nonce.</t>
      <t>An attestation statement generated using a nonce provided with an expiry value will be
accepted by the Verifier as valid until the respective expiry time has elapsed.
It is expected that the respective messages are delivered in a timely manner.</t>
      <t>The interaction is illustrated in <xref target="fig-cmp-msg"/>.</t>
      <figure anchor="fig-cmp-msg">
        <name>CMP Exchange with Nonce and Attestation Statements.</name>
        <artwork><![CDATA[
End Entity                                          RA/CA
==========                                      =============

            ------- id-it-NonceRequest ----->
                                                Verify request
                                                Generate nonce(s)*
                                                Create response
            <------ id-it-NonceResponse -----
                    (nonce(s), expiry)

Generate key pair
Generate attestation(s)*
Generate certification
  request message
            ------- certification request --->
                +attestation(s) including nonce)
                                               Verify request
                                               Verify attestation(s)*
                                               Check for replay*
                                               Issue certificate
                                               Create response
            <------ certification response ---
Handle response
Store certificate

*: These steps require interactions with the Attester
(on the EE side) and with the Verifier (on the RA/CA side).
]]></artwork>
      </figure>
      <t>If HTTP is used to transfer the NonceRequest and NonceResponse
messages, the OPTIONAL <tt>&lt;operation&gt;</tt> path segment defined in
<xref section="3.4" sectionFormat="of" target="RFC9811"/> MAY be used.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Operation</th>
            <th align="left">Operation Path</th>
            <th align="left">Details</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Get Attestation Freshness Nonce</td>
            <td align="left">getnonce</td>
            <td align="left">
              <xref target="CMP"/></td>
          </tr>
        </tbody>
      </table>
      <t>If CoAP is used for transferring NonceRequest and NonceResponse messages,
the OPTIONAL <tt>&lt;operation&gt;</tt> path segment defined in
<xref section="2.1" sectionFormat="of" target="RFC9482"/> MAY be used.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Operation</th>
            <th align="left">Operation Path</th>
            <th align="left">Details</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Get Attestation Freshness Nonce</td>
            <td align="left">nonce</td>
            <td align="left">
              <xref target="CMP"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="EST">
      <name>Conveying a Nonce in EST</name>
      <t>The EST client requests one or more nonces for its Attester from the EST server.
This function typically follows the request for CA certificates and
precedes other EST operations.</t>
      <t>The EST server MUST support the path-prefix of "/.well-known/" as
defined in <xref target="RFC5785"/> and the registered name of "est".
Therefore, a valid EST server URI path begins with
"https://www.example.com/.well-known/est". Each EST operation is
indicated by a path-suffix that specifies the intended operation.</t>
      <t>The following operation is defined by this specification:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Operation</th>
            <th align="left">Operation Path</th>
            <th align="left">Details</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Retrieval of a nonce</td>
            <td align="left">/nonce</td>
            <td align="left">
              <xref target="EST"/></td>
          </tr>
        </tbody>
      </table>
      <t>The operation path is appended to the path-prefix to form the URI
used with HTTP GET or POST to perform the desired EST operation.
An example of a valid URI absolute path for the "/nonce" operation
is "/.well-known/est/nonce".</t>
      <section anchor="request-methods">
        <name>Request Methods</name>
        <t>An EST client uses either a GET or a POST method, depending on
whether additional parameters need to be conveyed:</t>
        <ul spacing="normal">
          <li>
            <t>A GET request MUST be used when the EST client does not want to
convey extra parameters.</t>
          </li>
          <li>
            <t>A POST request MUST be used when parameters, such as nonce length
or a hint about the verification service, are included in the request.</t>
          </li>
        </ul>
        <artwork><![CDATA[
 +------------------+------------------------------+---------------+
 | Message type     | Media type(s)                | Reference     |
 | (per operation)  |                              |               |
 +==================+==============================+===============+
 | Nonce Request    | N/A (for GET) or             | This section  |
 |                  | application/json (for POST)  |               |
 +==================+==============================+===============+
 | Nonce Response   | application/json             | This section  |
 |                  |                              |               |
 +==================+==============================+===============+
]]></artwork>
      </section>
      <section anchor="request-payload-post">
        <name>Request Payload (POST)</name>
        <t>The payload in a POST request MUST be of content-type "application/json" and
MUST contain an array of JSON objects <xref target="RFC8259"/> with the optional members
"len", "type", and "hint".</t>
        <ul spacing="normal">
          <li>
            <t>The optional "len" member indicates the length of the requested nonce value in bytes.</t>
          </li>
          <li>
            <t>The optional "type" member contains an <tt>AttestationStatement</tt> OID (dotted-decimal string) as defined in <xref target="I-D.ietf-lamps-csr-attestation"/>.</t>
          </li>
          <li>
            <t>The optional "hint" member contains an FQDN or URI identifying the Verifier.</t>
          </li>
        </ul>
        <t>The order of objects in the JSON array is significant and MUST be preserved by the server.
The response array MUST contain the same number of elements in the same order so clients
can correlate requests and responses by array index.</t>
        <section anchor="example-get">
          <name>Example GET</name>
          <artwork><![CDATA[
GET /.well-known/est/nonce HTTP/1.1
]]></artwork>
        </section>
        <section anchor="example-post">
          <name>Example POST</name>
          <t>To retrieve one or more nonces while optionally specifying the length, type, and/or hint:</t>
          <artwork><![CDATA[
POST /.well-known/est/nonce HTTP/1.1
Content-Type: application/json
[
  {
    "len": 8,
    "type": "1.2.3.4.5",
    "hint": "https://example.com"
  }
]
]]></artwork>
        </section>
      </section>
      <section anchor="server-response">
        <name>Server Response</name>
        <t>If successful, the EST server MUST respond with an HTTP 200 status code and a
content-type of "application/json", containing an array of JSON objects <xref target="RFC8259"/> with
the "nonce" member. The "expiry" member is optional and indicates the absolute
expiry time of the nonce encoded as an RFC 3339 timestamp string. The optional
"type" and "hint" members MAY be copied from the request to aid correlation.</t>
        <t>Note: CMP encodes "expiry" as an INTEGER representing seconds of validity.
EST encodes "expiry" as an absolute timestamp.</t>
        <t>Below is an example response:</t>
        <artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/json
[
  {
    "nonce": "MTIzNDU2Nzg5MDEyMzQ1Njc4OTAxMjM0NTY3ODkwMTI=",
    "expiry": "2031-10-12T07:20:50.52Z",
    "type": "1.2.3.4.5",
    "hint": "https://example.com"
  }
]
]]></artwork>
        <t>The EST server MAY request HTTP-based client authentication, as
explained in Section 3.2.3 of <xref target="RFC7030"/>.</t>
        <t>Open Issue: Should a specific content type be registered for use
with EST over CoAP, where the nonce and expiry fields are encoded
in a CBOR structure?</t>
      </section>
    </section>
    <section anchor="CMC">
      <name>Conveying a Nonce in CMC</name>
      <t>CMC defines Simple and Full PKI Requests for the client to use to request a certificate.
Full PKI Requests provide the client with more functionality through the use of Controls,
defined in Section 6 of <xref target="I-D.ietf-lamps-rfc5272bis"/>. Currently, the client sends an initial request
containing a certification request (CRMF, PKCS#10, or other). To allow the client to request a nonce
prior to sending a certification request, this section defines the nonceReq and nonceResp.</t>
      <t>Generally a Full PKI Request is encapsulated in a SignedData or AuthenticatedData with an
encapsulated content type of 'id-cct-PKIData'. To accommodate a generic request for a nonce,
the Client/Server SHOULD use the Data content type; id-data, to transmit the nonceReq and nonceResp controls.
The syntax for the controls uses the same syntax as the CMP information types defined in <xref target="CMP"/>.</t>
      <t>The NonceRequest control is identified by:</t>
      <artwork><![CDATA[
id-cmc-nonceReq OBJECT IDENTIFIER ::= { id-it TBD1 }
]]></artwork>
      <t>The NonceResponse control is identified by:</t>
      <artwork><![CDATA[
id-cmc-nonceResp OBJECT IDENTIFIER ::= { id-it TBD2 }
]]></artwork>
      <section anchor="generic-nonce-request-message-flow">
        <name>Generic Nonce Request Message Flow</name>
        <t>The client sends id-cmc-nonceReq structure to the server. Upon receiving and processing the request,
the server responds with id-cmc-nonceResp.</t>
        <t>Once this round-trip transaction is complete, the client will include the nonce in either a Simple or Full PKI Request.</t>
        <t>Client to Server:</t>
        <artwork><![CDATA[
   ContentInfo.contentType = id-Data
   ContentInfo.content
       eContentType = id-cct-PKIData
       eContent
         controlSequence
           {101, id-cmc-senderNonce, 10001}
           {102, id-cmc-nonceReq, &lt;sequence of nonce request&gt;}
]]></artwork>
        <t>Server to Client:</t>
        <artwork><![CDATA[
   ContentInfo.contentType = id-Data
   ContentInfo.content
       eContentType = id-cct-PKIData
       eContent
         controlSequence
           {101, id-cmc-senderNonce, 10005}
           {102, id-cmc-recipientNonce, 10001}
           {103, id-cmc-nonceResp, &lt;sequence of nonce response&gt;}
]]></artwork>
      </section>
    </section>
    <section anchor="nonce-processing-guidelines">
      <name>Nonce Processing Guidelines</name>
      <t>When the RA/CA is requested to provide a nonce to an
end entity, it interacts with the Verifier.
According to the IETF RATS architecture <xref target="RFC9334"/>, the Verifier is
responsible for validating Evidence about an Attester and generating
Attestation Results for use by a Relying Party. The Verifier also acts as
the source of the nonce to prevent replay attacks.</t>
      <t>The nonce value MUST contain a random byte sequence with at least 64 bits of entropy.
The RA/CA MUST ensure that nonces are unique and MUST NOT be reused.
The length of the nonce depends on the remote attestation technology in use, as specific nonce
lengths may be required by the end entity. This specification assumes
that the RA/CA possesses knowledge, either out-of-band or through the
len field in the NonceRequest, regarding the required nonce length for
the attestation technology. Nonces of incorrect length will cause the
remote attestation protocol to fail.</t>
      <t>For instance, the PSA attestation token <xref target="RFC9783"/>
supports nonce lengths of 32, 48, and 64 bytes. Other attestation
technologies employ nonces of similar lengths.</t>
      <t>If a specific length was requested, the RA/CA MUST provide a nonce of that size.
The end entity MUST use the received nonce if the remote attestation supports
the requested length. If necessary, the end entity MAY adjust the length of the
nonce by truncating or padding it accordingly.</t>
      <t>While this specification does not address the semantics of the attestation API
or the underlying software/hardware architecture, the API returns Evidence from
the Attester in a format specific to the attestation technology used and specified by the type and hint. The
returned Evidence is encapsulated in an <tt>AttestationStatement</tt> within the
<tt>AttestationBundle</tt> carried in the CSR, as defined in <xref target="I-D.ietf-lamps-csr-attestation"/>.
The software generating the CSR treats the attestation statement payload as an opaque blob
and does not interpret its format. It's crucial to note that the nonce is included in the
Evidence, either implicitly or explicitly, and MUST NOT be conveyed in CSR structures
outside of the attestation payload.</t>
      <t>The processing of CSRs containing attestation statements is detailed in
<xref target="I-D.ietf-lamps-csr-attestation"/>. Importantly, certificates issued based
on this process do not contain the nonce, as specified in
<xref target="I-D.ietf-lamps-csr-attestation"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document adds new entries to the "CMP Well-Known URI Path Segments"
registry defined in <xref target="RFC8615"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Path Segment</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">getnonce</td>
            <td align="left">Get Attestation Freshness Nonce over HTTP</td>
            <td align="left">
              <xref target="CMP"/></td>
          </tr>
          <tr>
            <td align="left">nonce</td>
            <td align="left">Get Attestation Freshness Nonce over CoAP</td>
            <td align="left">
              <xref target="CMP"/></td>
          </tr>
        </tbody>
      </table>
      <t>Open issue: register path segments for EST.</t>
      <t>IANA is also requested to register the following ASN.1 <xref target="X.680"/>
module OID in the "SMI Security for PKIX Module Identifier" registry
(1.3.6.1.5.5.7.0). This OID is defined in <xref target="asn1"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Decimal</th>
            <th align="left">Description</th>
            <th align="left">References</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBDMOD</td>
            <td align="left">id-mod-att-fresh-req</td>
            <td align="left">This-RFC</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This specification details the process of obtaining a nonce via CMP, EST, and CMC,
assuming that the nonce does not require confidentiality protection while maintaining
the security properties of the remote attestation protocol. <xref target="RFC9334"/> defines the
IETF remote attestation architecture and extensively discusses nonce-based freshness.</t>
      <t>Section 8.4 of <xref target="RFC9711"/> specifies requirements for the randomness and
privacy of nonce generation when used with the Entity Attestation Token (EAT). These
requirements, which are also adopted by attestation technologies like the PSA attestation
token <xref target="RFC9783"/>, provide general utility:</t>
      <ul spacing="normal">
        <li>
          <t>The nonce MUST have at least 64 bits of entropy.</t>
        </li>
        <li>
          <t>To prevent disclosure of privacy-sensitive information, it should be derived using a
salt from a genuinely random number generator or another reliable source of randomness.</t>
        </li>
      </ul>
      <t>Each attestation technology specification offers guidance on replay protection using nonces
and other techniques. Specific recommendations are deferred to these individual specifications
in this document.</t>
      <t>Regarding the use of attestation statements in a CSR, the security considerations outlined in
<xref target="I-D.ietf-lamps-csr-attestation"/> are pertinent to this specification.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank Russ Housley, Thomas Fossati, Watson Ladd, Ionut Mihalcea,
Carl Wallace, and Michael StJohns for their review comments.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5785">
          <front>
            <title>Defining Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="E. Hammer-Lahav" initials="E." surname="Hammer-Lahav"/>
            <date month="April" year="2010"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5785"/>
          <seriesInfo name="DOI" value="10.17487/RFC5785"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8295">
          <front>
            <title>EST (Enrollment over Secure Transport) Extensions</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The EST (Enrollment over Secure Transport) protocol defines the Well-Known URI (Uniform Resource Identifier) -- /.well-known/est -- along with a number of other path components that clients use for PKI (Public Key Infrastructure) services, namely certificate enrollment (e.g., /simpleenroll). This document defines a number of other PKI services as additional path components -- specifically, firmware and trust anchors as well as symmetric, asymmetric, and encrypted keys. This document also specifies the PAL (Package Availability List), which is an XML (Extensible Markup Language) file or JSON (JavaScript Object Notation) object that clients use to retrieve packages available and authorized for them. This document extends the EST server path components to provide these additional services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8295"/>
          <seriesInfo name="DOI" value="10.17487/RFC8295"/>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC9482">
          <front>
            <title>Constrained Application Protocol (CoAP) Transfer for the Certificate Management Protocol</title>
            <author fullname="M. Sahni" initials="M." role="editor" surname="Sahni"/>
            <author fullname="S. Tripathi" initials="S." role="editor" surname="Tripathi"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the use of the Constrained Application Protocol (CoAP) as a transfer mechanism for the Certificate Management Protocol (CMP). CMP defines the interaction between various PKI entities for the purpose of certificate creation and management. CoAP is an HTTP-like client-server protocol used by various constrained devices in the Internet of Things space.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9482"/>
          <seriesInfo name="DOI" value="10.17487/RFC9482"/>
        </reference>
        <reference anchor="RFC9810">
          <front>
            <title>Internet X.509 Public Key Infrastructure -- Certificate Management Protocol (CMP)</title>
            <author fullname="H. Brockhaus" initials="H." surname="Brockhaus"/>
            <author fullname="D. von Oheimb" initials="D." surname="von Oheimb"/>
            <author fullname="M. Ounsworth" initials="M." surname="Ounsworth"/>
            <author fullname="J. Gray" initials="J." surname="Gray"/>
            <date month="July" year="2025"/>
            <abstract>
              <t>This document describes the Internet X.509 Public Key Infrastructure (PKI) Certificate Management Protocol (CMP). Protocol messages are defined for X.509v3 certificate creation and management. CMP provides interactions between client systems and PKI components such as a Registration Authority (RA) and a Certification Authority (CA).</t>
              <t>This document adds support for management of certificates containing a Key Encapsulation Mechanism (KEM) public key and uses EnvelopedData instead of EncryptedValue. This document also includes the updates specified in Section 2 and Appendix A.2 of RFC 9480.</t>
              <t>This document obsoletes RFC 4210, and together with RFC 9811, it also obsoletes RFC 9480. Appendix F of this document updates Section 9 of RFC 5912.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9810"/>
          <seriesInfo name="DOI" value="10.17487/RFC9810"/>
        </reference>
        <reference anchor="RFC9811">
          <front>
            <title>Internet X.509 Public Key Infrastructure -- HTTP Transfer for the Certificate Management Protocol (CMP)</title>
            <author fullname="H. Brockhaus" initials="H." surname="Brockhaus"/>
            <author fullname="D. von Oheimb" initials="D." surname="von Oheimb"/>
            <author fullname="M. Ounsworth" initials="M." surname="Ounsworth"/>
            <author fullname="J. Gray" initials="J." surname="Gray"/>
            <date month="July" year="2025"/>
            <abstract>
              <t>This document describes how to layer the Certificate Management Protocol (CMP) over HTTP.</t>
              <t>It includes the updates to RFC 6712 specified in Section 3 of RFC 9480; these updates introduce CMP URIs using a well-known prefix. It obsoletes RFC 6712; and, together with RFC 9810, it also obsoletes RFC 9480.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9811"/>
          <seriesInfo name="DOI" value="10.17487/RFC9811"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-csr-attestation">
          <front>
            <title>Use of Remote Attestation with Certification Signing Requests</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Cryptic Forest Software</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Siemens</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
         </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
         </author>
            <date day="27" month="March" year="2026"/>
            <abstract>
              <t>   Certification Authorities (CAs) issuing certificates to Public Key
   Infrastructure (PKI) end entities may require a certificate signing
   request (CSR) to include additional verifiable information to confirm
   policy compliance.  For example, a CA may require an end entity to
   demonstrate that the private key corresponding to a CSR's public key
   is secured by a hardware security module (HSM), is not exportable,
   etc.  The process of generating, transmitting, and verifying
   additional information required by the CA is called remote
   attestation.  While work is currently underway to standardize various
   aspects of remote attestation, a variety of proprietary mechanisms
   have been in use for years, particularly regarding protection of
   private keys.

   This specification defines ASN.1 structures which may carry
   attestation data for PKCS#10 and Certificate Request Message Format
   (CRMF) messages.  Both standardized and proprietary attestation
   formats are supported by this specification.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-24"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-rfc5272bis">
          <front>
            <title>Certificate Management over CMS (CMC)</title>
            <author fullname="Joe Mandel" initials="J." surname="Mandel">
              <organization>AKAYLA, Inc.</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="26" month="February" year="2026"/>
            <abstract>
              <t>   This document defines the base syntax for CMC, a Certificate
   Management protocol using the Cryptographic Message Syntax (CMS).
   This protocol addresses two immediate needs within the Internet
   Public Key Infrastructure (PKI) community:

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5272bis-11"/>
        </reference>
        <reference anchor="X.680" target="https://www.itu.int/rec/T-REC.X.680">
          <front>
            <title>Information Technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation X.680" value=""/>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC.X.690">
          <front>
            <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation X.690" value=""/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2986">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC4211">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes the Certificate Request Message Format (CRMF) syntax and semantics. This syntax is used to convey a request for a certificate to a Certification Authority (CA), possibly via a Registration Authority (RA), for the purposes of X.509 certificate production. The request will typically include a public key and the associated registration information. This document does not define a certificate request protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4211"/>
          <seriesInfo name="DOI" value="10.17487/RFC4211"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC9783">
          <front>
            <title>Arm's Platform Security Architecture (PSA) Attestation Token</title>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="S. Frost" initials="S." surname="Frost"/>
            <author fullname="M. Brossard" initials="M." surname="Brossard"/>
            <author fullname="A. Shaw" initials="A." surname="Shaw"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>Arm's Platform Security Architecture (PSA) is a family of hardware and firmware security specifications, along with open-source reference implementations, aimed at helping device makers and chip manufacturers integrate best-practice security into their products. Devices that comply with PSA can generate attestation tokens as described in this document, which serve as the foundation for various protocols, including secure provisioning and network access control. This document specifies the structure and semantics of the PSA attestation token.</t>
              <t>The PSA attestation token is a profile of the Entity Attestation Token (EAT). This specification describes the claims used in an attestation token generated by PSA-compliant systems, how these claims are serialized for transmission, and how they are cryptographically protected.</t>
              <t>This Informational document is published as an Independent Submission to improve interoperability with Arm's architecture. It is not a standard nor a product of the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9783"/>
          <seriesInfo name="DOI" value="10.17487/RFC9783"/>
        </reference>
        <reference anchor="RFC9711">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
            <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="April" year="2025"/>
            <abstract>
              <t>An Entity Attestation Token (EAT) provides an attested claims set that describes the state and characteristics of an entity, a device such as a smartphone, an Internet of Things (IoT) device, network equipment, or such. This claims set is used by a relying party, server, or service to determine the type and degree of trust placed in the entity.</t>
              <t>An EAT is either a CBOR Web Token (CWT) or a JSON Web Token (JWT) with attestation-oriented claims.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9711"/>
          <seriesInfo name="DOI" value="10.17487/RFC9711"/>
        </reference>
        <reference anchor="TPM20" target="https://trustedcomputinggroup.org/resource/tpm-library-specification/">
          <front>
            <title>Trusted Platform Module Library Specification, Family 2.0, Level 00, Revision 01.59</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2019" month="November"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 630?>

<section anchor="asn1">
      <name>ASN.1 Module</name>
      <t>The following module adheres to ASN.1 specifications <xref target="X.680"/> and
<xref target="X.690"/>.</t>
      <sourcecode type="asn1"><![CDATA[
<CODE BEGINS>

att-fresh-req
  { iso(1) identified-organization(3) dod(6) internet(1)
  security(5) mechanisms(5) pkix(7) id-mod(0)
  id-mod-att-fresh-req (TBDMOD) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN
EXPORTS ALL;
IMPORTS

id-it, InfoTypeAndValue{}
  FROM PKIXCMP-2023
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-cmp2023-02(116) }

ATTESTATION-STATEMENT, AttestationStatementSet
  FROM CSR-ATTESTATION-2025
    { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-pkix-attest-01(TBD-CSR-ATTESTATION-2025) }
-- RFC Editor: The value for id-mod-pkix-attest-01 must be set as soon
-- as it is assigned by I-D.ietf-lamps-csr-attestation

CMC-CONTROL
FROM EnrollmentMessageSyntax-2025
   { iso(1) identified-organization(3) dod(6) internet(1)
   security(5) mechanisms(5) pkix(7) id-mod(0)
   id-mod-enrollMsgSyntax-2025(TBD1) }

;

-- NonceRequest and NonceResponse messages

 id-it-nonceRequest OBJECT IDENTIFIER ::= { id-it TBD1 }
 NonceRequestValue ::= SEQUENCE SIZE (1..MAX) OF NonceRequest
 NonceRequest ::= SEQUENCE {
    len    INTEGER OPTIONAL,
    -- indicates the required length of the requested nonce
    type   ATTESTATION-STATEMENT.&id({AttestationStatementSet}) OPTIONAL,
    -- indicates which attestation statement type to request a nonce for
    hint   UTF8String OPTIONAL
    -- indicates which Verifier to request a nonce from
 }

 id-it-nonceResponse OBJECT IDENTIFIER ::= { id-it TBD2 }
 NonceResponseValue ::= SEQUENCE SIZE (1..MAX) OF NonceResponse
 NonceResponse ::= SEQUENCE {
    nonce  OCTET STRING,
    -- contains the nonce of length len
    -- provided by the Verifier indicated with hint
    expiry INTEGER OPTIONAL,
    -- indicates how long in seconds the Verifier considers
    -- the nonce valid
    type   ATTESTATION-STATEMENT.&id({AttestationStatementSet}) OPTIONAL,
    -- indicates which attestation statement type to request a nonce for
    hint UTF8String OPTIONAL
    -- indicates which Verifier to request a nonce from
 }

id-cmc-nonceReq ::= { id-it TBD1 }

cmc-nonceReq CMC-CONTROL ::=
      { NonceRequest IDENTIFIED BY id-cmc-nonceReq }

id-cmc-nonceResp ::= { id-it TBD2 }

cmc-nonceResp CMC-CONTROL ::=
      { NonceResponse IDENTIFIED BY id-cmc-nonceResp }

END
<CODE ENDS>
]]></sourcecode>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+U9a3PbRpLf51dMyVVrKSEpSrIcW3lcaEp2mFiPFelNsldX
ZxAYUohBAIsBJTOy97dfP2YGAxCUpWRzl6vlZkskMI+e7p5+z7jb7YrrI3kg
oixMg4U6kjIqglnZjVU56ybBItfdoCyVLoMyztLurFD6KlVad/tPRRiUR1KX
kYjz4kiWxVKX+/3+8/6+CLNUq1Qv9ZF8DM/VY6GX00WsNYxRrnKYZnQyeSmS
IJ0fSZWKPD4SUhazUEW6XCXwfqU0PCmz0Psap5FKS/tAZ0VZqJl2v1eL2s+y
iEPXOMwWC+jr3sZpEqfVNOp92U1iXXZhkGmWQLNu9tnn8AbQsgjyPEY4sW0Z
lwjdWZaGqjsNtIrkS4sSOcsKeakWWankoMIZzCWHqijjWQwIU3Icz1MYD1r+
YwlttNweji/1DvUur5TXFjufBmkwVwi7vCgyQEKWQIfTi50OdThJiyxJ6HV2
rQo5VuGyUHJSBKnOAUFy+2Q8gbZBGlF7HxBvaOo7PB3j0MMdEUynhQK2qJZG
C960QhEUKgBOUKG4ATy9HpxejOWPWfEOl/mqyJa5eKdWN1kRHYluW//uXQhq
vN2IEGh3P2xsHrCBhgheH8n9/v5TMY/Lq+X0SG7dzHlX7N6xN7YEPEqj/w6S
zPJYsCyvsgKYvCslch9w2Hc9OdHhVTZTaTwXkj68Bb8LUhhm/W1WAHbHMcKq
zaMwW6ZlsTqSr1SxCNKVeawWQZwcySsaqFe6gb6dL973UlU24HhRZOG7q2Cp
62CoNCrid2tvW8CwDFN/CltQKdiCP6oiVUX3GnBkGnTHZRForeSeW0cEMz5+
1j84OHhsn8UlLOx0mcbh1f2WywD3phbgbzVP14Ptb5ouixgalmWuj3Z3b25u
erUmFVa+7yFjRCqpoeT7TNUfEy4GPwx+fj3oyFEa9hoI4Vd1MH/J1LfBu2CV
BM1Jx8ASS8RVbdKxCtL6c5pVpwdFVB9ZQ8tv6TmNLNIMsFTG1wql6+XL4f7e
3nPz9XD/Wd9+/eLZofn6Rf/APn22f/jcfX1uGzx7ume/Pn/ybN9+fbbXr77u
4ddR97jn6ZBQF/5eaWkBwv9w/4v9aazx5U+9pwwfCOegmCMX+USLy2UvTsvd
QoW7k+7lybBHHbg9i+hvDGpG6YyxAMJ0osKrNEuy+QqQPpgCfwZhKcertAze
g4gz8vo8VXJ7MD7r7e0cmUHGuQormZzNJIj+OJSp6UKt3BavSDSavOlO6AGL
kscgS/a6/X3mcK2KWOkY4LOdqD3IPdZWEc9mVwZ/nz8UJc8fiBJcNOhj2I0o
gItlovRGFLwgFJzYxpfYWG6/OLnc6ZguwyDNYPMGyVqrIbSyOwU00zGoXni7
jPUVKNRm42Pb+A/EMCAqtliptsvzZ0/N1yf7zNbI4QcHT+zXL54duK/cYHJx
um+o1IDXQDxBMwlWOcwW+bKsNKT0CGXbXCRBiUDJ0ywCXMjX8bQIilWdFh35
MljEyUru9/od+Vpdq0T24duluo7R3pL9vd7hczN+g3FKnii0sMwRlB7ACWyk
s2URqt0yX4BpRPN2tT/vLg/JeD8D1bmYgvbc7+89F6Lb7YII5P0lxI8gmIHO
wFgR/B/WuAJxFybLCKjrCQWJf0kRa7SZgruMAjKawK4pr2KNtuuS9HespQMx
AYyEaLWA3IzkDehviRNNwcy7woHQ1HIaG/n55DoG8zJUPhjBIkvnorwKyhqg
sOagJ4fLosBZ/Tel204CWSxLAYogvIqBKpqAlUuNs6dkT/WEmOAzt4BsWaJd
qgm6HNQYwlZeAVXmV/LmChSh6SnB5JJ6medJDKsrM+rg4Xe6QoRfDnaHA4FG
G+FbG2vUrrQjE4CrCOYWH/eyszqemSU+aXTey9LqMccs4ihKlBCPUESVBfB8
SNIVkKTkwus8k2E1rO6QxFrkYFDgQsDLWAa0uuHAb4f45B0BrToSSKdugoSg
FKCrM7ubrgItp0qlZL4EC6RH5GhAhl1QRPGv8DA3eGE63hN98vbWaMyPH2Wk
ZkTuBdAZmpOBLX7qHfafXx/UYA8BFGIwxGmFCmDC0ws5C8I4iZFrceOUCncd
tMVllDe4EscYMZqi8OPih5GPUPuuAywFLAYIuFTzGLcvzTkgOUYt5PblAHyV
OmUbbcT2ENr05MuGv7HB8enQGvIiXgQFijEQRAmgV69xpPUHThlZOD6Iaxjl
8vSlQSuKaUDrdAm7MtEZ7RBgSA0LHo4f7fW5Fcr1jx+BaPfzF+Q29ULb6OPH
Dg+BJtHHjzsocUDJAaRFjVwVboVlEklShHiQ5B7ANtWKmBnW/xhIDxSG2YEI
Hi6Ioy3w5MABygDye20rAHWjkQVYQtg3QO1YWzAERIpilZfZvAhykEPSEsEY
TzDfGLdxi6gvLLnrk82KbFGT8T4XrWDAAXBGXAJQK5kqFnLoMhSlgM0QxVPQ
h2ESxAsYeApy04pMkMDM/IBYfBRmIKWBmimZFIDaa5wd/NGK2bHZEpwR6BHA
9i+iG5CuQiMzICgLVr7GPbdTXMPQQR5McefhxjCUjVD0Yjs7TgdnuFFJgn+b
AIvcavi41CqZoSDJrHLEBtotkjXi+LKzTtWGcV3JFfHW87LHVq29pe3rv3qx
TEHwvkWJByIXmRAcEZq8emI060peZTeiXWt3DOSIaKdNc5LjjBdgDJ5VFR3S
YGRqKg5N+CpK4J5GjBvWh9bgS89ZjYPfBxyBqhFtIV8T2BhKXMjrIInZvLNK
tma8gMqF5rBzDao8UwDHAOtB5hnoE+Sy1sVKDGMBQYMCTMxIwOI+TZaeHJU4
frjUa6bKRnNEzEFRgSBewyCsCyVsIP8GVu4sho1PwZlkRSIjKIBzYctgFK5Q
68Pjg8oOeJdmN3afq/foFJXxgjYE8KXInSpGsEPgiDhIPmH/kDZJ4ncK8EI2
MXAlalrWfmA3oyjNZiVqp0WeZCtr2NwBs4UXVMuyQJkrIlWC4wsvU+5U47yq
bwhom8KDDPgcN9Lt7ZilhASpCgMbq550wihlO83aZJ07LMVCzVShrfkFDJwV
oDach4QPaVWolamNMJvZsI2VFZXpmbGawIeOrAg9LFQVC2RU9951ugHB4phE
2DBiaKmT50UQa3DCSlRrbBogJ1ZbYIEBBjZyge+NNnNSpzYXCkawm8i2ThJA
IiwCJlzmEXEoTq7A3gUmCq+CdK7YCgCWAhqjKMS5kLi0hWgOWJoOi3iKpAtQ
6IKk7gI7gW6ZZlmZZEEE4NxkyySSFM8gw54Gl2Re36DKIei99hpYC6UvMqwB
roNrFQtVwBYBbggDFPkBU9aQCTFp1JWKgBcqPjlAet5X7OIubROvBCRSE9YI
fAs8kioB6FlkAOgGUQ1ybIni+KXF7LqbAhjItM+iMbHkVAnn8ABpWJEHvNJO
019ALXsDDbGjwQCaKCoPkKu4EyBkHBMTrOn3GBUErEba1ZjNTEref26ZWsvr
OCAgyEdBK1wGURTj6oNEFLhTyyLOcS1O1vfkd9kNeiwdVoVswcDwXX1FbEwm
Caku2JkZ6l4wrcBfGU+MM3I6BKgDFOpm/cIswlt27EVHCH4HJaAUR5WUyyhL
xmdYM2DsIEDha5XGMHqyArydE9qsMABUTZH+yJMNOsTpdfbO2L6Di5Eki99T
mmxlWFHN4wXIcCJOwYWXSK8FygrCguuIrRE40ORgGVVyn11KAAid9wg1MUkq
GG4DOxp5gMhHhOZgCwHguCdhKdlckewgLT1jEb3Bwe8Ig0QUgkH4zspQxjPZ
Ou2ItUTGzTmL592gCK/Qlk3AdkB/xbrZnh90BN4lBfUazIniwe12nBP+5nK7
z+6NJVH1Ym9HVtaweg8rJ2sFIAcu2wUm20X+YhkQibihR3oAxMSirgTeBieF
QKpGMl1ZQ31S2BCLrYj2slXcGCmDEPtbcEPEpUkAXvP+Tq+BvGoHV/EJxGOo
wCSONo6Oos9ICk8lse+NXMkc73W+VHqZlNvgbFrIfNOmxw73AO12fUdfYkV6
7ea8yJI4XDGNiUP9DQ9zkatNAkJU3OFZmbyzfFcm1mZrVaGYkxTjmGZLG1we
oIP0z3/+U7hd2fzUrTfv4xFAbFdj79R6bxPt6s/4Y2lGEbsPLQ34s/HNB9vR
dzsf1NHzUR/W0QVPHgbqV932zzefnnHT+z+uo41pUpIVuBZF0D06blji71tj
E5Z7dtwIyqdnrM90b1A3Udh1dOOi4K7NuGHEuzmn+wcygBEIESkHkLn37PiH
MIAnRz2i/JEM0C65fz8D+MIKhK8344YR/+8Y4OEdUY/cHslH1gbi1NHXWwP4
HmOACj1o0n4vwLyak0Eth1cKTK3TLFJJb+sjB61nyzRkqxuVlXHG2Aip2S+o
5aKYQ1zGnS2UwqIPCreRkXV7C5YQ+UE8isZgEelUslU8m5UNKWjdo25gPNW6
kYUFxgJ4Pzh1HUaqexlPembC4cN6Qocephgm5E9z5hNtgUs2TthceQ3u5RIU
FqPoHYCO1Stabp2+GU+2OvxXnp3T98uTv74ZXZ4c4/fxd4PXr90XbiHgx/mb
1+Y9fqt6Ds9PT0/Ojrnz6eDnLXZUts4vJqPzs8HrLUuHKsmFZiu5d2zj5mB6
oN2l67S7fDmUmO43EW/4RtENXA5GErTnU9Ssjk4Vd0BAfMffN205jMMxE1kN
WnkynYb9HtQju5SFKPwkg9fgEowYbz5p58OaBVrFjxyvLd28n8wU0mJqEInK
34MxOKAAnuGKmGNI/MoO3pmJ4FCa4vYRcrgfGTjsHfQAzSaKVE/roA3JkZmk
6cDIbXixYLiqJhin1vwu32Ebl6a3a8mDFQY4bHAJh7ADdmArAneYiFK7a+u8
/yznTZF4mVgvlmZtX9gPkYR9NAcxUotnOb/YBSOlByuvQqwDm7cDOxzsXpLP
4RBgomUG7o51ZbQfUrMBc5SE8pVKT/X8CGXjbRx141JOXhzvfezU0Pc3jKVQ
20uVN9ruV20ZBmoMEvgrTGQjsN8IIal5N/VJcv7i+5PhRI6OT84mo5ejk0t5
dPS1vJUVFPKjWAeDWo1BcpycDU/kePT3E7BTer3TwU878vxlrX29d73jLWkQ
IJEcnU1OXsHsVnJwEUa3C3iNTHScHbVWslaeDi2Oq0ZWORB4MgFZO8Axu/j3
BMTVpPeXONq+bYsQjFX5cecuGDjisDmk3sKulBTFga5gq8o3k5fPxiVFeu00
m2ZxkqxtzAJLrz42aWr475NE3feI6vPLvahq9kf9ZxtdGdTz4eRkIseTy9HZ
K4fRlh0BpDREhT+2XTMt5XBikWVqIxC31Ee9z+NidR92Qt1OWRn0cCluqxuB
a1gXzF1o27eCldIz/z5chjKKpHkj5Grbt4VO4XcUz2aKovgu6kKCVrxtRdhb
Xhsaak5zivulpSSqeVSORky0ok5wnAQXahBslumWTfUoDKN8i4h8K2HIJPJV
OVkz9WRcFfnFcpkkyW50MzBaZg7xDbwLfUXJganiTUE5CWjOATwLY0+MZlaZ
W0nqkptVKsRG5gmRQAFcQ8cLjIGJ5hJyVUCXVBGpcpu6jUsbKrU6zRhfJs9s
FKJvGew67WdNBJtEQROFs6i6LU4uKVBOeR/M8NjQdGr9X6esWc+uFwttYxiO
yhEAEIxY2zYuUIUiwqyn6rfTW+NpMotx2xNmEdgWjWmXB5OAdFrkpajwC880
jteyITz7gBnMjoMbycuouEBZO601WNi4QRfB+3ix5OxEvilO3bSlMEXCOUoj
V11aHjbRJ/lLxZS0tLAGzGUpJXFbGE3exWhmflFnNFOYUFcsDgzeA6mN8TLH
czakWlDQtAWoCoMI65pQzrZcCV8zPQSMOmlwORua6lq6bJph9p+xxmIFuzLu
+AGbzBtyF7VROf+aBCWpQpfUcPu/WTkiqlmB1KnxO3An43OEg6DA/i5pDC4j
j84Cq2xY88ID6EZhXonc7NQ3yByTEwFA+JpxeGgjSOpmhTdqQwS5wRDccjOi
OOfoo4Xw1OM6CgICBQyn6XWVkWa+QooFWmdhjKxLOcv2vWVj86JeomOSWmmE
6SlEiyFwjBkHpQm7RtCbtDtgHC0cqxBsGRLnJKpqy2Y2L07XBFQdT83snCAi
GM9z4et7TiL7y/SSCh3kEVPm4RUnMCzC2y9ebYyuu2jWVEMjzuc3I3VcXtFZ
e7g2sWFTEeKxAMmMS25uumrovLi0ZRNLbTL7AMyGyh/jVngZZiDCIN1A+Kqi
pZaUrqA3ZT7WFiV+hIdJgkntIAxVXrZYtIA0MivlEqiVNIWRGYvqWrDEUyVB
rjHLPyLWgtdczeC42evryjM5KpHAs8IgmQZM0JpLU2K9iWFJk3zEsavkpIll
YNAuXOTdhZ5TPAPNQy9jdO8P1/d+7T736/W1/xHCf2UinWZT1KQ0h3PFpkE3
fYg6ztB9cPdXVgVaa+azBw8x5Hxe4dwu7/NV23rNfqE3rbNtW2A6hqt2hHCA
YrAwD+KiehLUIuqfVS/q8SjZlPmtlGnPireS5vP6xF5xHsG/81BM/j5Smt5N
ZDxwFI5gozAqVJ4EqwcPMNJ6WcvePhiCe7BTk0gVR4nvAkzOV93HJZq4Pjzi
syNXfKlyK1prQkV7eW2jM8R2Zkq1TiQ63RxZdM2ckLTNWAVSy14tmWDkks0n
YNDzxPohNNyZ1c+1xI0zHzRlFkAtfTeZXFD5lTZpcXROZlyLIu82AIUVuKyB
rQcu336V5Yrjxd+8hV0G0Gg1J51S83hd1VbvSRWYxcJwtKqNRgOx+0Ge2+E8
IvpPL3CKD/LYhEblB/HhqDU11HzqP4BOIMfKGroaJ2thjrkqU/PVplE+EB6H
2aDCo/PyAJGkbj9hSTtEit+FyP3enkXkk2f7f25EtmBxQ0D/BKy520eYe2K1
jb/DBIu2qqL1DZEZ8MQq79jZlTiAVsW1s5Vt+smzAGdZFd9w5iPmpQb1Umb0
yXM0YTE2z4UqOLyjmz10Us3JPoI58sC16oD1Lgwyi98j+bZ2e1iI3sVq33R3
CwwmsZZi+eLZIVfqGgAxQ0PGDp5FpUEA4C3ys2yNXWDMLg+SN5cj5qopDGDE
ldjyjyuaklA8p1qDikaXJ1Tp6C8XdoCo2cEBr04vZ7g6stpMUMmEsJxf4MYw
GGMKUFmUN7pjfDIrm/XiR/+rTH6pSnBPAat8JMFy9G7F2pww/cALqpZBOMeq
yDzntZtAjs8I8IhOHOBzoJMguUKSnST2K/DosfD+HLCPYQFVuNbAiZQ6qBGm
h3a+oSaDy9yALBBMdZZgmRvBZSuTt3gdW9UYAkDearKBaYX5uEcumXeqwHWJ
NDkX3nalKjAOrwAAZgkBL2JBXToAPeKEq+EEeJbc2MXSqtJJ7c6bcEgRBIeK
KL89oKHtrqXtZv0jU4VcEyIuqngTYCgpEyYNrt6DCPfm69HQBOzmsavm1cEV
5gcO+gsXRvLOw1yT2jd2CO7NGOM5VBfNgcqoEW+w+bTP17m25dFdrz8XwKj2
lBC5lrxdTlUUcwxnreYHX18qiniHpjkOso3hOccrO3cVTJhBGr9hOV+vfVoe
3fWalsOaw/IiTXW2O5DbyNnAGTvIdXVI+OSJ0aK8nBZ4KW5uTtX+oqEljYgM
0bLaf/1yjK3QCslvWc7/BXUow+IJiguTfN4mLLKctAlp8ttbtxueLOUIXpdY
dquJjy3SyzbMzWFc+K8oghV2/n58fiaz6S+AIW0PCh4+B0ntDHEb1gGxhOel
tdiC7YvFHzifrf7AXYyCjyuGXRdqajo20rp3ZnNNAAUjqKtS6d7auDS3Hdhl
FhunGLwA4fnoWG5HGVZvdyPQkgsYRFO2bIcLUR5Qx7wODa2+DZqXfz0+wy2G
qsXkq1a2HtsL/k38+KglhhFzRCAmF3IyloqgfEzZdrZsQHHG4rqKMVVGnRdN
5WFqvEBt0VBKlwQ9AKCS6ki7e83g6cxoCi04zF0UKmHn0h6ZpCoZnk+T1cOg
g25/T4rxEThnrHpB/rDsRhXVrktJwe/u9fbsbql6426gs4cFmx6qzfC9uYoT
5QcmzZFASwNmQgp3KuLkXRNNPGLIaMt9CrSh2X8Tuiaquf/Ef4LDzclx2g1H
8hmnf5mHj+TWXm+/B35f73DLvCB2ghfW+vQszy1o8VH8lxMeY7ZenRuK7hfo
Wqxyny2TTsPGZ9KbyLWLWZIRtd/vU7xzqelmG85TiJpoQVN6Tbp0/KL9ewsW
8u22jFHF+4YzZFscnqpkRhVWNtlKX4ZYa034odJa2Y89rkknTqjE7ODg4Dk1
hNUuciMEerUNLYx4qSSblX3WiwyzHJMxzo2yUhlPooAlafcFW/BnGd43gWEJ
hkZXq2SwbOVCoUy6AHFp6xNgOWSexniEAEm5YRBnubq1wdQvFPgNfOTbWbx2
dxoWt2xMHHD+wwO4mckHfHo6Gf16dvxm/+zX+eHp8cnq9Ne/7p39Ej45nwze
n/5y2j+b/HxwfvzuBtp9bXncAA+99/sHe929fndvf9L/4mi/f3TY7x3u/33r
X7VLmi4nUNCSC9du7kQzBjDW9CEB7NUK4HACpIk7V1PFaQAapI130B5PTeVY
14QBuyM55iR/4Nwyq6jZtpzWfFW0nsByFrQnyVuhc/HZ4MLmlCqeRrY0DE/Z
Pe0fTBac3n1xflmlT/7jjgLBIRUIDj8KUR0F0nIcE6vgTC+XSUK3L7hLENx5
TUYZ8PxSN+pT/MMnYn0Em5b1RqGFk+iuF8DaayzKqhIBObTIEt3xYwGWME+Z
KHfcIuCOAdMJsAoCzOLTRgFZhgfEXNjYF3Abotl0o0OnOvsNGKIAyA4Ilozr
Qxooa9TdiLyIs8IWE9wxVce4+ma5Xt2mtCULRDaXHuzZSD9VqqyRkzJJaRjk
epnYdE9AFakqOg7KAJcyqDaFeWhUh6j1rLE3UOFxHHXDsOzCbNjpMeMipFtm
Ii4SoLwa7Aw/rGRLPklHDAlhu0bNmVpkW0lLoPizfolpEbzqpuPCt4u4vAM5
1Lug+1BQTGi+GsIxuHlZHdkiU8i0MtcwoFyvnceiU/Y1g5KiesbMq0U/zQSU
cbPVTGjBGdGM+FuErhTlfoWbTubVw6oPmgoQc696QmuFvDJkrHub7tYT4H4G
qbbTmqursr0mBGRMWPkmz/zUuKklQRPHmnF2b4iqm7VyTOKhuT57wpU2E9Uk
dakmyTtxTjcHZCgHS9WpiyrYQt6NF+7EfBXPMfIT+Ki53/AmFCcEmK0NCUCn
Gd2Lt531DF+jGpZfI/zI7Rsa2ZSOGjY7efuv2ajKAxneGFMxVVhLEN3u9fc6
FntIN1WccYnNXr/f3/vYaLvfaZK1I/+SlF9qMzSKhVoB3l/m5ZeGj8wex8Op
hKD/v2g53IwWYOM4x9XdhcWDJhZ1vhmNvL89PD4y2/Ci2iOvljHWAOD9Klxo
4pWUePcH1IuqeAI+W+2fkohLl9jT6+m6nhiAhC/4wDfvY7w4F2abjGXgH/Xx
DmR0GoW+Wph10W0mKI7t5Sj+bRkcNPQOm3tHE7ClWD+mpa2hxfH4+gFd8gGq
2gy8jYnWCDYgyRW6Xa7uXhDCwPek/AtmdzFbHITvbKrDD2bUQzASBE0E3gPG
N6SjK+vVEvzSAATo0ydyimkb9MmRFXNziNjU270hZ8BcPAKdvEPiyzSGEasI
wdn5hA1OTn9N1uIvDCgHnO2BCmhO99623xaH8g5Go8ofZ+GyLcNDaypznHoF
/NVJD8NMPdlyz00A5vMCLy6uF2nh5TYK/6OrXxIVYbWTEbjAB91sBpZ8GvGl
R85mRFhM5Z2JZvgKGO9UmwdF5OsRgtQPU1OZdXm1CQ89e9MwXj2TkucXlrYr
qQq+t4Mrp9YQWl22lclZECfmjpw4xXvb7LUXF+NBffbsnbInmuhiGuGuDfMh
J5gOQPg8ecZhOmQoiqfJ87Jx04Hw78FpXHADo+h4ESdBYQfuCS5OdoS36/Wv
I6kVh9aqMavyf86Cxb+qXmthrrX03GF9o2pnm/jT4kHUg4oMHtWeubs51m6y
QM8wiH5Z6nI9QCl4YuTgAvwTlkRApxzTMXigoCTLlliJTmT9SJGn9bRclWKB
noW9jECrRYAGtrvoyF/T4GIkjEW6RE3DMsveF7Nrr+2qSVdeHN7H0bxCgyv8
/UIMNvlNpbyjqBHeGzY/ZXmQpWwG0+3uRrXfhNjeXDXgYGhzOjbGbqtSbtF6
aYSpjK2KPzu/IaRL5r+9gqfSIa6eFG9WLO84aeBC9RyNyfIABfA0yaZ0cNBR
3Z2ApIQ8Ix2PMzx211Qh5tOs9O5NcsWSjRSYqK5FMYIQzc44jLEgnu7psL86
a6rAZgkpCjD2ggVagDTFKps2VjSLNNrNs8LRLR9f6lowcMM9qfbc3gMOeyxw
TwfssddKDvDmTLqPBdhRZOb8r73lI8rqByQsJn2VdW8g+I7PwdkADU06I8Q1
Dc37UGFXYzb2hjR2rNwtJVSW9CPGkX/AODJlBCj7PuYqFr0lzOHS1dopUrzC
mkD4UOtCiXs8QEthy1omcj2P3/hd+4kJfK+Y51MFKxSaoqCxX7JSlbHcqz/V
CNVKXih2FnPszEbGaoU+ujpHLYgSGNdEK61mwLquZa1wgi+Kvr2lu6lBYZor
EjEvZHhja3w64vs07cFr8BB+shcZj6zTXGzZU8Arsb3XO+g97e31DuF/X/T6
O8agoVEbIijQ6Z4h4rFJQNXp5yccHSV1jZTtxRkt1AT//PT8GEcCRwKWiszM
t/2DB/IPmxftYjxccrlRtfJW/m7oMFMvUlZCgDNXVZzMWL5xsH6hVUeQicfS
tSbinJS0FYSwd2ccruBoYHVbpkntLGBCM6lx/s0qoGWOkkLpKsW40fjq+c5I
7Sw0+S4tPWueDAdk6U6ka6ysjmIdLslUpWWZCLO77QxvJTOLeMblfsaSo4K/
qiSo8M/325gUuw20m7jeKr4OwlXlEFrVRRhSqaxqZSgVxJaOvzsnZEtunwwm
O+YKTeFPbG/cIgODXKIos7Xsm65R5FsUWwxXsWa4dpxRaM+W0WW65erI5pJ5
WaS6roJrdbd31MUQo/XIkAxJRv4RtDGYQm9dx1QjXzvwAAZcdSoPuJ+sTVPs
D+65DpLSXgALkC6BQYDQxoczqVOD+oyutbR37Bbgd9OBpcp9rEiIF/o2T5t4
RpZuXGBPVzfOwZcPSIym1uf0doV/V7eoLoyiQdElBNPfXsWORrV3p7w9KoBl
mq4MSyvKuAGBlpgw9+HRLfeFicuaO2VvqL3rwnS01mobN6yJH3u/+D3VNK2B
9n1qQmzrFjip8kFovUgChi5o4BsbmXfpVsv0nbyEfSy/y5Y6wet3J1fZAmyH
l+CKwlAd+SOYhLCo16D0O3KUpctSnsZXQRKqoCOGQZFAiyQJQmXsL9hIgUrk
uPw+u0r9u1+BY2OwGey/+WNuF8dr5ghY0l1GEd0+Ik3SLAw0+iyIMFlEVgf3
qtOsUoDmalP6hwTsiQ6JI4uvhufHJ/LFyavR2fgbIWqaA5N/oNkyvKCoCiN3
s2IepPGvXCN/sAMcEW0/3WFbN1UltMYtZCi8fbgjFwrrs2O90Pgrfxe/3/5i
x+iq7T62btVb26zXdvAU/PHJy9HZCKuDx3J0evF6NBxN5GTwaoyBakHgi5Of
Ls4vJ2M5eP36SwGN8IcQFMLu0L8pgRHBQRrRSfhbDMO9vDw/Jb0PWqu7398/
oNDcb14zfh62bvyYtYeLHCHo9ve39/ae0qJbD1F3ZJvfNMZ/M4fXA5us6/eE
UQ9/x7r8FRmIP7EuuyJ8YTZst7+H1Oy2wYZLBfZH6+QkikGg0vECE0ajWua2
4eQCPfcpipKSLPwM/52mLn6NKc2Ft+3PTb3s3YKEkqHd4fnZ5PL8tSAcVhev
m7QGXyPucPnbWeSB/GHWrgieUz334ECE7hGffIkC5L6V9n/uW0Lg8wddFCL/
fJc4yH/Dy0L+HW4L+ROy2r+a0Zrp3BZpIWoNPBFLKtukv+pCwbHosXzx81rK
eG1anbdxsqi3+MTEhl/vmhkGgVFPzo6NsQTfwFTC7Nv/ACK2hHiecgAA

-->

</rfc>
