<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dekok-radext-review-radius-01" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="A Review of RADIUS Security and Privacy">A Review of RADIUS Security and Privacy</title>
    <seriesInfo name="Internet-Draft" value="draft-dekok-radext-review-radius-01"/>
    <author initials="A." surname="DeKok" fullname="Alan DeKok">
      <organization>InkBridge Networks</organization>
      <address>
        <email>alan.dekok@inkbridge.io</email>
      </address>
    </author>
    <date year="2026" month="March" day="15"/>
    <area>Internet</area>
    <workgroup>RADEXT Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 153?>

<t>This document provides a comprehensive review of security issues
related to the RADIUS Protocol.  This review motivates the changes to
RADIUS security which are made in
<xref target="I-D.ietf-radext-deprecating-radius"/>.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dekok-radext-review-radius/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        RADEXT Working Group mailing list (<eref target="mailto:radext@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/radext/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/radext/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/freeradius/review-radius.git"/>.</t>
    </note>
  </front>
  <middle>
    <?line 160?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The RADIUS protocol <xref target="RFC2865"/> was first standardized in 1997, though its roots go back much earlier to 1993.  The protocol uses MD5 <xref target="RFC1321"/> to authenticate some packets, and to obfuscate certain attributes such as User-Password.  As originally designed, Access-Request packets were entirely unauthenticated, and could be trivially spoofed (<xref section="7.1" sectionFormat="comma" target="RFC2869"/> and <xref section="4.3.2" sectionFormat="comma" target="RFC3579"/>).  As much of the protocol data is sent in clear-text, packets can leak information about use names, devices, and locations.</t>
      <t>This document provides a comprehensive review of RADIUS security and privacy.  The discussion here motivates the changes to RADIUS security which are made in <xref target="I-D.ietf-radext-deprecating-radius"/>.  In order to simplify the protocol changes for implementers, this historical review is a separate document from the protocol changes.  While this document contains some operational recommendations, it does not change the RADIUS protocol.</t>
      <section anchor="history-of-radius-security">
        <name>History of RADIUS Security</name>
        <t>The insecurity of MD5 has been known for a long time.  It was first noted in relation to RADIUS in 1996 on the IETF RADIUS working group mailing list <xref target="MD5-1996"/>, which also discussed using an HMAC construct to increase security.  While it was common knowledge at the time, the earliest record of concerns about Access-Request packets spoofing was on the RADIUS working group mailing list <xref target="DATTACK"/> in 1998.  There was substantial further discussions about the lack of integrity checks on the list over the next few years.  The outcome of that process was the definition of Message-Authenticator as an optional HMAC-based attribute in <xref section="5.14" sectionFormat="comma" target="RFC2869"/>.</t>
        <t>Unfortunately, the use of Message-Authenticator was made optional.  This lack of integrity checks for Access-Request packets was deemed acceptable for some situations in <xref section="7.1" sectionFormat="comma" target="RFC2869"/>:</t>
        <ul empty="true">
          <li>
            <t>Access-Request packets with a User-Password establish the identity of
both the user and the NAS sending the Access-Request, because of the
way the shared secret between NAS and RADIUS server is used.</t>
          </li>
        </ul>
        <t>That conclusion now appears to be incorrect.  The text continues with an acknowledgment that:</t>
        <ul empty="true">
          <li>
            <t>Access-Request packets with CHAP-Password or EAP-Message do not have
a User-Password attribute, so the Message-Authenticator attribute
should be used in access-request packets that do not have a User-
Password, in order to establish the identity of the NAS sending the
request.</t>
          </li>
        </ul>
        <t>This text was non-normative due to the lowercase 'should'.  It appears that no implementation followed even this limited suggestion.</t>
        <t>The packet forgery issue was further discussed in 2004 in <xref section="4" sectionFormat="comma" target="RFC3579"/>, and again in 2007 in <xref section="2.2.2" sectionFormat="comma" target="RFC5080"/>.  That document suggested that implementations require the use of Message-Authenticator in order to prevent forgery:</t>
        <ul empty="true">
          <li>
            <t>However, Access-Request packets not containing a Message-
Authenticator attribute ...  may
be trivially forged.  To avoid this issue, server implementations may
be configured to require the presence of a Message-Authenticator
attribute in Access-Request packets.  Requests not containing a
Message-Authenticator attribute MAY then be silently discarded.</t>
          </li>
        </ul>
        <t>It appears that only one RADIUS server implemented even this limited suggestion.  At the time of publication of <xref target="RFC5080"/>, there was no consensus to require the use of Message-Authenticator in all Access-Request packets.  If this recommendation had instead been made mandatory, then the recent BlastRADIUS attack <xref target="BLAST"/> would largely have been prevented.</t>
        <t>The state of MD5 security was again discussed in <xref target="RFC6151"/>, which states in Section 2:</t>
        <ul empty="true">
          <li>
            <t>MD5 is no longer acceptable where collision resistance is required such as digital signatures.</t>
          </li>
        </ul>
        <t>That statement led to RADIUS security being reviewed in <xref section="3" sectionFormat="comma" target="RFC6421"/>.  The outcome of that review was the text in the remainder of <xref target="RFC6421"/>, which created crypto-agility requirements for RADIUS.  The main outcome of those requirements was not any change to RADIUS, but instead the definition of RADIUS/TLS in <xref target="RFC6614"/>, and RADIUS/DTLS in <xref target="RFC7360"/>.  Another outcome was the consensus that adding crypto-agility to RADIUS was likely not a good idea, and that standardizing RADIUS over TLS instead was a significantly better path forward.</t>
        <t>RadSec has now been standardized in <xref target="I-D.ietf-radext-radiusdtls-bis"/>.  That document standardizes TLS and DTLS transporst for RADIUS, which gives implementors and operators a way to secure the RADIUS protocol.</t>
        <t>As for RADIUS/UDP and RADIUS/TCP, they still depend on MD5 for all security.  The insecurity of MD5 was noted in <xref target="RFC6151"/>, which is over a decade old as of the time of publication of this document.  The recommendation to use Message-Authenticator in <xref target="RFC5080"/> is almost two decades old.  The knowledge that Access-Request packets lack integrity checks is almost three decades old.  Over that entire span of time, there has been no mandate to increase the security of Access-Request packets. This document explains why that mandate is now being made in <xref target="I-D.ietf-radext-deprecating-radius"/>.</t>
        <t>It is no longer acceptable for RADIUS to rely on MD5 for security.  It is no longer acceptable to send device or location information in clear text across the wider Internet.  This document therefore explains why insecure uses of RADIUS need to be deprecated. <xref target="I-D.ietf-radext-deprecating-radius"/> mandates the use of secure practices in RADIUS, including the use of (D)TLS via <xref target="I-D.ietf-radext-radiusdtls-bis"/>.</t>
      </section>
      <section anchor="radiusudp-over-the-internet-is-insecure">
        <name>RADIUS/UDP over the Internet is insecure</name>
        <t>Since the insecurity of MD5 has been well known for decades, RADIUS traffic over the Internet was historically secured with IPsec as described in <xref section="4.2" sectionFormat="comma" target="RFC3579"/>:</t>
        <ul empty="true">
          <li>
            <t>To address the security vulnerabilities of RADIUS/EAP,
implementations of this specification SHOULD support IPsec
(RFC2401) along with IKE (RFC2409) for key management.  IPsec ESP
(RFC2406) with non-null transform SHOULD be supported, and IPsec
ESP with a non-null encryption transform and authentication
support SHOULD be used to provide per-packet confidentiality,
authentication, integrity and replay protection.  IKE SHOULD be
used for key management.</t>
          </li>
        </ul>
        <t>The use of IPsec allowed RADIUS to be sent privately, and securely, across the Internet.  However, experience showed that TLS was simpler than IPSec in many ways simpler for implementations and deployments.  While IPsec required operating system support, TLS was an application-space library.  This difference, coupled with the wide-spread adoption of TLS for HTTPS, ensures that it was often easier for applications such as RADIUS to use TLS than IPsec.</t>
        <t>RADIUS/TLS <xref target="RFC6614"/> and RADIUS/DTLS <xref target="RFC7360"/> were then defined in order to meet the crypto-agility requirements of <xref target="RFC6421"/>.  RADIUS/TLS has been in wide-spread use for about a decade, including in eduroam <xref target="EDUROAM"/> <xref target="RFC7593"/>, and more recently in OpenRoaming <xref target="OPENROAMING"/> and <xref target="I-D.tomas-openroaming"/>.  RADIUS/DTLS has seen less use across the public Internet, but it still has multiple implementations.</t>
        <t>However, RADIUS/UDP is still widely used, even though it depends on MD5 and "ad hoc" constructions for security.  The recent BlastRADIUS attack shows just how inadequate this dependency is.  The details of the BlastRADIUS attack are discussed in more detail below, in <xref target="blastradius"/>.</t>
      </section>
      <section anchor="radiusudp-has-security-and-privacy-problems">
        <name>RADIUS/UDP Has Security and Privacy Problems</name>
        <t>Even if we ignore the BlastRADIUS attack, problems with MD5 mean that a hobbyist attacker who can view RADIUS/UDP traffic can brute-force check all possible RADIUS shared secrets of eight characters in not much more than an hour.  A more resourceful attacker (e.g. a nation-state) can check all much longer shared secrets with only modest expenditures.  See <xref target="cracking"/> below for a longer discussion of this topic.</t>
        <t>Determining the shared secret will also result in compromise of all passwords carried in the User-Password attribute.  Even using CHAP-Password offers minimal protection, as the cost of cracking the underlying password is similar to the cost of cracking the shared secret.  MS-CHAP (<xref target="RFC2433"/> and MS-CHAPv2 <xref target="RFC2759"/>) are significantly worse in security than PAP, as they can be completely broken with minimal resources.  Attacks on MS-CHAP are described below in <xref target="ms-chap"/>.</t>
        <t>The use of Message-Authenticator does not change the cost of attacking the shared secret.  The Message-Authenticator attribute is a later addition to RADIUS, and does does not replace the original MD5-based packet signatures.  While that attribute provides stronger protection for packets, it does not change the cost of attacking the shared secret.  Moving to a stronger packet signatures (e.g. <xref target="RFC6218"/>) would still not fully address the issues with RADIUS, as the protocol still has privacy issues unrelated to the the security of the Authenticator field.</t>
        <t>Most attributes in RADIUS are sent in clear-text, with only a few attributes such as User-Password and Tunnel-Password have their contents hidden.  The hidden attributes rely on "ad hoc" obfuscation methods using MD5, which have not been successfully attacked, but have not proven to be secure.  Peoples locations can (and has) been accurately determined, and people have been tracked using location data sent insecurely across the Internet (<xref target="privacy"/>).</t>
        <t>The implications for security and individual safety are large, and negative.</t>
        <t>These issues are only partly mitigated when the data carried within RADIUS use their own methods for increased security and privacy.  For example, some authentication methods such EAP-TLS, EAP-TTLS, etc. allow for User-Name privacy and for more secure transport of passwords via the use of TLS.  Some privacy can be gained through MAC address randomization, which can also limit device information identification to a particular manufacturer, instead of to a unique device.</t>
        <t>However, these methods are not always used, or are not always available.  Even if these methods were used ubiquitously, they do not protect all of the information which is publicly available over RADIUS/UDP or RADIUS/TCP transports.  And even when TLS-based EAP methods are used, implementations have historically often skipped certificate validation, leading to password compromise (<xref target="SPOOFING"/>).  In many cases, users were not even aware that the server certificate was incorrect or spoofed, which meant that there was no way for the user to detect that anything was wrong.  Their passwords were simply handed to a spoofed server, with little possibility for the user to take any action to stop it.</t>
      </section>
      <section anchor="simply-using-ipsec-or-tls-is-not-enough">
        <name>Simply using IPsec or TLS is not enough</name>
        <t>The use of a secure transport such as IPsec or TLS ensures complete privacy and security for all RADIUS traffic.  An observer of encrypted traffic is limited to knowing rough activity levels of a client or server.  That is, an observer can tell if there are a few users on a NAS, or many users on a NAS.  All other information is hidden from all observers.  Even with those limitations, it is not enough to say "use IPsec" and then move on to other issues.  There are many issues which can only be addressed via an informed approach.</t>
        <t>For example, it is possible for an attacker to record the session traffic, and later crack the TLS session key or IPsec parameters.  This attack could comprise all traffic sent over that connection, including EAP session keys.  When the cryptographic methods provide forward secrecy (<xref section="6.3" sectionFormat="comma" target="RFC7525"/>), then breaking one session provides no information about other sessions.</t>
        <t>The final attack possible in a AAA system is where one party in a AAA conversation is compromised or run by a malicious party.  This attack is made more likely by the extensive use of RADIUS proxy forwarding chains.  In that situation, every RADIUS proxy has full visibility into, and control over, the traffic it transports.  The solution here is to minimize the number of proxies involved, such as by using Dynamic Peer Discovery, as defined in <xref target="RFC7585"/>.</t>
        <t>There are many more security issues in addition to the need for a secure transport. The rest of this document discusses those issues in detail.</t>
      </section>
      <section anchor="overview-of-this-document">
        <name>Overview of this document</name>
        <t>This document begins with a summary of issues with RADIUS, including showing just how trivial it is to crack RADIUS/UDP security.  We then explain why mandating a secure transport is necessary, and describe what that requirement means in practice.  We give recommendations on how current systems can be migrated to using TLS.  We give suggestions for increasing the security of existing RADIUS transports, including a discussion of the authentication protocols carried within RADIUS.  We conclude with security and privacy considerations.</t>
        <t>As IPsec has been discussed previously in the context of RADIUS, we do not discuss it more here, except to say it is an acceptable solution for securing RADIUS traffic.  As the bulk of the current efforts are focused on TLS, this document likewise focuses on TLS.  We note that all of the issues raised here about the RADIUS protocol also apply to IPsec transport.  That is, when the application is not in charge of protocol security, the application is vulnerable to transport misconfigurations or attacks.</t>
        <section anchor="a-comment-on-specifications">
          <name>A Comment on Specifications</name>
          <t>While this document tries to be comprehensive, it is necessarily imperfect.  There may be issues which should have been included here, but which were missed due to oversight or accident.  Any reader should be aware that there are good practices which are perhaps not documented in a specification, and bad behaviors which are likewise not forbidden.  For example, documents such as <xref target="RFC5080"/> were written to both correct errors in earlier documents, and to address harmful behaviors which had been seen in practice.</t>
          <t>These harmful behaviors can have a large impact both on security and on interoperability, even if they are not expressly forbidden in a specification.</t>
          <t>There is a regrettable belief in some readers that a particular practice is "allowed" by a specification, simply because the practice is not forbidden.  This belief is wrong.  That is, a behavior which is not even mentioned in the specification cannot honestly be said to be "permitted" or "allowed" by that specification.    The most charitable description would be that these behaviors are undefined, or perhaps not forbidden.</t>
          <t>By their very nature, documents include a small number of permitted, required, and/or forbidden behaviors.  There are a much larger set of behaviors which are undefined.  That is, behaviors which are neither permitted nor forbidden.  Those behaviors are unconstrained by the specification, and therefore may be good or bad.</t>
          <t>Outside of published specifications, there is also a large set of common practices and behaviors which have grown organically over time, but which have not been formally written down.  These practices have been found to be valuable by implementers and administrators.  Deviations from these practices generally results in instabilities and incompatibilities between systems.  As such, implementers should exercise caution when creating new behaviors which have not previously been seen in the industry.  Such behaviors are likely to cause problems, where there would have been no problems if common practices had been followed instead.</t>
          <t>It is RECOMMENDED that implementations and administrators follow widely accepted practices which have been proven to work and to be secure, even if those practices are not written down in a public specification.  Implementers SHOULD NOT create features which depend on undefined behavior; such features are very likely to be wrong.</t>
        </section>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <ul spacing="normal">
        <li>
          <t>RADIUS</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>The Remote Authentication Dial-In User Service protocol, as defined in <xref target="RFC2865"/>, <xref target="RFC2866"/>, and <xref target="RFC5176"/> among others.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>RADIUS/UDP</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the User Datagram Protocol as define above.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>RADIUS/TCP</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the Transport Control Protocol <xref target="RFC6613"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>RADIUS/TLS</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the Transport Layer Security protocol <xref target="RFC6614"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>RADIUS/DTLS</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the Datagram Transport Layer Security protocol  <xref target="RFC7360"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>TLS</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>the Transport Layer Security protocol.  Generally when we refer to TLS in this document, we are referring to RADIUS/TLS and/or RADIUS/DTLS.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>NAS</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Network Access Server, which is a RADIUS client.</t>
        </li>
      </ul>
      <t>In order to continue the terminology of <xref target="RFC2865"/>, we describe the Request Authenticator, Response Authenticator, and Message-Authenticator as "signing" the packets.  This terminology is not consistent with modern cryptographic terms, but using other terminology is inconsistent with historic RADIUS practices.  The reader is assured that no modern cryptographic methods are used with RADIUS/UDP.</t>
    </section>
    <section anchor="security-issues-with-radius">
      <name>Security Issues with RADIUS</name>
      <t>There are a large number of issues with RADIUS.   The most serious is the BlastRADIUS vulnerability, which means that subject to some limitations, attackers can leverage MD5 known-prefix collisions to cause any user to be authenticated, and then be given any authorization.  Multi-factor Authentication (MFA) systems can be bypassed, and in many cases the RADIUS server will not even be aware that an unauthorized user is on the network.</t>
      <t>Another issue is that RADIUS sends most information (but not passwords) "in the clear", with obvious privacy implications.  Publicly available data includes information such as names, MAC addresses, locations, etc.</t>
      <t>As for authenticating the packets themselves, even if Message-Authenticator is used for integrity checks, an average hobbyist who observes RADIUS traffic can perform brute-force attacks to crack even seemingly complex shared secrets.</t>
      <t>There is no way to fix the RADIUS protocol to address all of these issues.  The short-term fix is in <xref target="I-D.ietf-radext-deprecating-radius"/>, which requires the use of Message-Authenticator to authenticate Access-Request packets, and responses to them.  The long-term solution is in <xref target="I-D.ietf-radext-radiusdtls-bis"/>, which wraps the protocol in a secure transport.</t>
      <t>With the benefit of experience, <xref target="I-D.ietf-radext-deprecating-radius"/> errs on the side of security, while still allowing for backwards compatibility.  It is not acceptable to permit insecure practices in the RADIUS protocol simply because a small number of implementations or organizations find it difficult to upgrade.  Insecure implementations or practices have a concrete cost not only to the insecure organizations, but also to other organizations via secondary effects.  When insecure organizations demand that others follow insecure practices continue due to perceived local costs, they are effectively offloading their costs onto everyone else.  This practice both decreases security, and increases costs.</t>
      <t>We address these issues in more detail below.</t>
      <section anchor="the-blastradius-vulnerability">
        <name>The BlastRADIUS Vulnerability</name>
        <t>The BlastRADIUS vulnerability was first described in <xref target="BLAST"/>.  This section gives a short summary of why RADIUS is vulnerable to this attack.   <xref target="blastradius"/>, below, gives a longer explanation as to how the attack works, and why the mitigations defined in <xref target="I-D.ietf-radext-deprecating-radius"/> protect from the attack. The reader is referred to <xref target="BLAST"/> for a comprehensive description of the attack.</t>
        <t>The discussion below assumes that there exist plain texts "A", "B", "S".  Following the practice of <xref target="RFC2865"/>, we use "+" to denote concatenation.  The vulnerability then relies on the following property of MD5:</t>
        <ul empty="true">
          <li>
            <t>If MD5(A) == MD5(B), then MD5(A + S) == MD5(B + S)</t>
          </li>
        </ul>
        <t>This construction menas that if an attacker is given text "A", and can find text "B" which has the same MD5 hash, then the attacker can perform a chosen prefix attack.  The attack works even if the attacker does not know text "S".  That is, given M5(A + S), then the attacker can trivially calculate MD5(B + S): it has the same value.</t>
        <t>In RADIUS, the Response Authenticator field <xref section="3" sectionFormat="comma" target="RFC2865"/> is calculated via precisely this vulnerable construct:</t>
        <ul empty="true">
          <li>
            <t>Response Authenticator = MD5(packet + secret)</t>
          </li>
        </ul>
        <t>The attacker can generally observe or predict an Access-Reject packet, as they are generally empty.  Each valid Access-Reject
is signed with a shared secret unknown to the attacker.  With sufficient work, the attacker can create an Access-Accept which has the same MD5 hash as the Access-Reject.  The attacker then replaces the Access-Reject with this Access-Accept, using the Response Authenticator from the Access-Reject.</t>
        <t>The client will then receive the packet, calculate MD5(Access-Accept + secret), and verify that the Response Authenticator is correct.  The client will then follow the attackers instructions: give the user access, along with some authorization.</t>
        <t>This chosen prefix attack is root cause behind the BlastRADIUS vulnerability.</t>
        <t>We note also that this attack does not expose the contents of the User-Password attribute.  Instead, the attack simply bypasses all server-side authentication, and fools the client into accepting a forged response.</t>
        <t>While this attack requires that an attacker be "on path" and be able to intercept and modify packets, the meaning of "on path" is often "the entire Internet".  As such, the existence of this attack alone is sufficient reason to deprecate all uses of RADIUS/UDP and RADIUS/TCP.</t>
      </section>
      <section anchor="failed-attempts-to-improve-radius-security">
        <name>Failed Attempts to Improve RADIUS Security</name>
        <t>Independent of any cryptographic vulnerability, there are a number of factors which contributed to the ongoing failure to improve RADIUS security.</t>
        <t>A major factor is the continued use of MD5 for security, instead of mandating the use of an HMAC via Message-Authenticator.  This change could have been made in <xref target="RFC2869"/> in the year 2000.  The stated reason there for not mandating Message-Authenticator was the issue of backwards compatibility.  Unfortunately, experience shows that issues which are not fixed just grow larger over time.  The issue of backwards compatibility is significantly worse now than it was in the year 2000.</t>
        <t>The issue of unauthenticated Access-Request packets was raised again in <xref section="2.2.2" sectionFormat="comma" target="RFC5080"/>, and again was widely ignored.  If vendors had implemented this recommendation in 2007, then the BlastRADIUS attack would have been impossible.</t>
      </section>
      <section anchor="failures-of-the-protocol-state-machine">
        <name>Failures of the Protocol State Machine</name>
        <t>Another contributing factor to the BlastRADIUS vulnerability is the principle of "be conservative in what you do, be liberal in what you accept from others", often known as Postel's law, after John Postel.  This principle means that a client will accept packets that are well-formed, but which contain invalid signaling.  Specifically, the Proxy-State attribute is intended for signalling between a proxy and a "next hop" server.  It offers no value for RADIUS clients.  A NAS which originates packets therefore does not send Proxy-State in an Access-Request, and should also not receive Proxy-State in any response packets.</t>
        <t>If a NAS does receive Proxy-State in a response, where the request did not contain Proxy-State, this is arguably a violation of the protocol state machine.  It would be useful if such a packet would either trigger a warning message, or instead be rejected entirely.</t>
        <t>That is, when a NAS sees Proxy-State in an Access-Accept, that is a failure of signaling in the RADIUS protocol.  It indicates either a serious failure of configuration, implementation, or as seen in this case, an active attack.  If the specifications had instructed clients to discard responses which contained unexpected Proxy-State attributes, then this attack would have been prevented.</t>
      </section>
      <section anchor="privacy">
        <name>Most information is sent in Clear Text</name>
        <t>Even ignoring security issues, the RADIUS protocol has fundamental problems with privacy.</t>
        <t>With the exception of a few attributes such as User-Password, all RADIUS traffic is sent "in the clear" when using UDP or TCP transports.  Even when TLS is used, all RADIUS traffic (including User-Password) is visible to proxies.  The resulting data exposure has a large number of privacy issues.  We refer to <xref target="RFC6973"/>, and specifically to <xref section="5" sectionFormat="comma" target="RFC6973"/> for detailed discussion, and to <xref section="6" sectionFormat="comma" target="RFC6973"/> for recommendations on threat mitigations.</t>
        <t>When RADIUS/UDP or RADIUS/TCP is used across the public Internet, common configurations allow the location of individuals to be tracked in real-time (usually 10 minute intervals), to within a small physical location.  The users devices can be identified, and also tracked. Even when the packets do not contain any <xref target="RFC5580"/> location information for the user, the packets usually contain the MAC address of the Wi-Fi access point.  The MAC address and physical location of the user device and often W-Fi access points are publicly available.  There are multiple services selling databases of Wi-Fi access point location.</t>
        <t>More discussion of location privacy is given in <xref target="RFC6280"/>, which defines an "Architecture for Location and Location Privacy in Internet Applications".  However, that work was published too late to have any practical impact on the design of location information attributes, as <xref target="RFC5580"/> had already been published.</t>
        <t>The effect of these design decisions is that any observer of non-TLS RADIUS traffic is able to obtain a substantial amount of personal identifiable information (PII) about users.  The observer can tell who is logging in to the network, what devices they are using, where they are logging in from, and their approximate location (usually city).  With location-based attributes as defined in <xref target="RFC5580"/>, a user's location may be determined to within 15 or so meters outdoors, and with "meter-level accuracy indoors" <xref target="WIFILOC"/>.  An observer can also use RADIUS accounting packets to determine how long a user is online, and to track a summary of their total traffic (upload and download totals).</t>
        <t>These issues are not theoretical.  Recently, <xref target="BRIGGS"/> noted for the Diameter <xref target="RFC6733"/> protocol that:</t>
        <ul empty="true">
          <li>
            <t>Overall, I think the above three examples are just the tip of the proverbial iceberg of SS7 and Diameter based location and monitoring exploits that have been used successfully against targeted people in the USA.</t>
          </li>
        </ul>
        <t><xref target="BRIGGS"/> continues with a statement that there have been:</t>
        <ul empty="true">
          <li>
            <t>... numerous other exploits based on SS7 and Diameter that go beyond location tracking. Some of these involve issues like (1) the monitoring of voice and text messages, (2) the delivery of spyware to targeted devices, and (3) the influencing of U.S. voters by overseas countries using text messages.</t>
          </li>
        </ul>
        <t>While these comments mention only Diameter, the same location tracking and monitoring is also possible with RADIUS.  There is every reason to believe that similar attacks on RADIUS have occurred, but are simply less publicized than similar attacks on Diameter.</t>
      </section>
      <section anchor="md5-has-been-broken">
        <name>MD5 has been broken</name>
        <t>Attacks on MD5 are summarized in part in <xref target="RFC6151"/>.  The BlastRADIUS work substantially improved the speed of finding MD5 collisions, and those improvements are publicly available at <xref target="HASHCLASH"/>.</t>
        <t>While there have not been many other new attacks in the decade since <xref target="RFC6151"/> was published, that does not mean that further attacks do not exist.  It is more likely instead that no one is looking for new attacks.</t>
      </section>
      <section anchor="cracking">
        <name>Cracking RADIUS shared secrets is not hard</name>
        <t>The cost of cracking a a shared secret can only go down over time as computation becomes cheaper.  The issue is made worse because of the way MD5 is used to authenticate RADIUS packets.  The attacker does not have to calculate the hash over the entire packet, as the hash prefix can be calculated once, and then cached.  The attacker can then begin the attack with that hash prefix, and brute-force only the shared secret portion.</t>
        <t>At the time of writing this document, an "off the shelf" commodity computer can calculate at least 100M MD5 hashes per second.  If we limit shared secrets to upper/lowercase letters, numbers, and a few "special" characters, we have 64 possible characters for shared secrets.  Which means that for 8-character secrets, there are 2^48 possible combinations.  The result is that using a consumer-grade machine, it can take about 32 days to brute-force the entire 8 octet / 64 character space for shared secrets.</t>
        <t>The problem is even worse when graphical processing units (GPUs) are used. A high-end GPU is capable of performing more than 64 billion hashes per second.  At that rate, the entire 8 character space described above can be searched in approximately 90 minutes.  This is an attack which is feasible today for a hobbyist.</t>
        <t>Increasing the size of the character set raises the cost of cracking, but not enough to be secure.  Increasing the character set to 93 characters means that the hobbyist using a GPU could search the entire 8 character space in about a day.</t>
        <t>Increasing the length of the shared secret has a larger impact on the cost of cracking.  For secrets ten characters long, the search space is approximately 2^60.  One GPU can search a 64-character space in about six months. A 93 character space (2^65 complexity) would take approximately 24 years.</t>
        <t>This brute-force attack is trivially parallelizable.  Nation-states have sufficient resources to deploy hundreds to thousands of systems dedicated to these attacks.  That reality means that a "time to crack" of 24 years means "24 CPU years", and does not mean "wall clock" time.  A thousand commodity CPUs are enough to reduce the crack time from 24 years to a little over a week.  This attack is feasible for any organisation with a modest amount of resources.</t>
        <t>Whether the above numbers are precise or only approximate is immaterial.  These attacks will only get better over time.  The cost to crack shared secrets will only go down over time.</t>
        <t>If the shared secret is long, then "cracking" the secret is expensive, and different trade-offs occur.  Rather than cracking the secret, it is cheaper to perform the BlastRADIUS attack at a cost of approximately 2^53 per packet, and less than $100 in purchased CPU time.  While cracking the shared secret would break all RADIUS packets using that secret, forging one packet is likely enough to give the attacker administrator access to a NAS, where the shared secret is likely to be visible in the administration interface.  The conclusion, then, is that increasing the security of the shared secret offers minimal protection when the Access-Request packets are unsigned.</t>
        <t>Even if the shared secrets were enough to secure all RADIUS packets, administrators do not always derive shared secrets from secure sources of random numbers.  The "time to crack" numbers given above are the absolute best case, assuming administrators follow best practices for creating secure shared secrets.  For shared secrets created manually by a person, the search space is orders of magnitude smaller than the best case outlined above.  Rather than brute-forcing all possible shared secrets, an attacker can create a local dictionary which contains common or expected values for the shared secret.  Where the shared secret used by an administrator is in the dictionary, the cost of the attack can drop by multiple orders of magnitude.</t>
        <t>Implementers and administrators should assume that a hobbyist attacker with modest resource can crack most shared secrets created by people in minutes, if not seconds.</t>
        <t>Despite the ease of attacking MD5, it is still a common practice for some "cloud" and other RADIUS providers to send RADIUS/UDP packets over the Internet.  It is also common practice for administrators to use "short" shared secrets, and to use shared secrets created by a person, or to use secrets that are derived from a limited character set.  Theses practice are simple to implement and to follow, but they are highly insecure, and do not provide adequate security.  Any system using these practices is vulnerable to all of the issues which are outlined in this document.</t>
        <t><xref target="I-D.ietf-radext-deprecating-radius"/> gives suggestions for how strong shared secrets can be created.</t>
      </section>
      <section anchor="tunnel-coa">
        <name>CoA-Request packets might leak Tunnel-Password contents</name>
        <t>There are a number of security problems with the use Tunnel-Password attribute in CoA-Request and Disconnect-Request packets.  A full explanation requires a review of the relevant specifications.</t>
        <t><xref target="RFC5176"/> Section 2.3 describes how to calculate the Request Authenticator field for these packets:</t>
        <artwork><![CDATA[
Request Authenticator

   In Request packets, the Authenticator value is a 16-octet MD5
   [RFC1321] checksum, called the Request Authenticator.  The
   Request Authenticator is calculated the same way as for an
   Accounting-Request, specified in [RFC2866].
]]></artwork>
        <t>Where <xref target="RFC2866"/> Section 3 says:</t>
        <artwork><![CDATA[
   The NAS and RADIUS accounting server share a secret.  The Request
   Authenticator field in Accounting-Request packets contains a one-
   way MD5 hash calculated over a stream of octets consisting of the
   Code + Identifier + Length + 16 zero octets + request attributes +
   shared secret (where + indicates concatenation).  The 16 octet MD5
   hash value is stored in the Authenticator field of the
   Accounting-Request packet.
]]></artwork>
        <t>Taken together, these definitions mean that for CoA-Request packets, all attribute obfuscation is calculated with the Reply Authenticator being all zeroes.  In contrast for Access-Request packets, the Request Authenticator is mandated to be 16 octets of random data.  This difference reduces the security of the obfuscation.</t>
        <t>For Tunnel-Password, <xref target="RFC5176"/> Section 3.6 allows it to appear in CoA-Request packets:</t>
        <artwork><![CDATA[
   ...
   Change-of-Authorization Messages
   
   Request   ACK      NAK   #   Attribute
   ...
   0+        0        0    69   Tunnel-Password (Note 5)
   ...
   (Note 5) When included within a CoA-Request, these attributes
   represent an authorization change request.  Where tunnel attributes
   are included within a successful CoA-Request, all existing tunnel
   attributes are removed and replaced by the new attribute(s).
]]></artwork>
        <t>However, <xref target="RFC2868"/> Section 3.5 says that Tunnel-Password is encrypted with the Request Authenticator:</t>
        <artwork><![CDATA[
   Call the shared secret S, the pseudo-random 128-bit Request
   Authenticator (from the corresponding Access-Request packet) R,
]]></artwork>
        <t>The assumption that the Request Authenticator is random data is true for Access-Request packets.  That assumption is not true for CoA-Request packets.</t>
        <t>That is, when the Tunnel-Password attribute is used in CoA-Request packets, the only source of randomness in the obfuscation is the salt, as defined in <xref target="RFC2868"/> Section 3.5;</t>
        <artwork><![CDATA[
 Salt
   The Salt field is two octets in length and is used to ensure the
   uniqueness of the encryption key used to encrypt each instance of
   the Tunnel-Password attribute occurring in a given Access-Accept
   packet.  The most significant bit (leftmost) of the Salt field
   MUST be set (1).  The contents of each Salt field in a given
   Access-Accept packet MUST be unique.
]]></artwork>
        <t>This chain of unfortunate definitions means that there is only 15 bits of entropy in the Tunnel-Password obfuscation (plus the RADIUS shared secret).  It is not currently known if this limitation makes it sufficiently easy for an attacker to determine the contents of the Tunnel-Password, as the obfuscated value still depends on the shared secret.  However, such limited entropy cannot be a good thing.</t>
        <t>Due to the above issues, the use obfuscated attributes in CoA-Request or Disconnect-Request packets needs to be avoided.</t>
      </section>
      <section anchor="secure-transports-can-still-leak-information">
        <name>Secure Transports Can Still Leak Information</name>
        <t>The above analysis as to security and privacy issues focuses on RADIUS/UDP and RADIUS/TCP.  These issues are partly mitigated through the use secure transports, but it is still possible for information to "leak".</t>
        <t>When TLS-based EAP methods such as TTLS or PEAP are used, they still transport passwords inside of the TLS tunnel.  It is possible for an authentication server to terminate the TLS tunnel, and then proxy the inner data over RADIUS/UDP.  The design of both TTLS and PEAP make this process fairly trivial.  The inner data for TTLS is in Diameter AVP format, which can be trivially transformed to RADIUS attributes.  The inner data for PEAP is commonly EAP-MSCHAPv2, which can also be trivially transformed to bare EAP, or to MS-CHAPv2.</t>
        <t>Similar issues apply for proxies even when RADIUS/TLS and IPsec are used.  A proxy which receives packets over IPsec will terminate the IPSec tunnel, but it then might forward the packets over an insecure transport protocol.  While this process could arguably be seen as a misconfiguration issue, it is never the less possible due to the design of the RADIUS protocol.  As RADIUS security is "hop by hop", there is no way for one "hop" to know anything about, or to control, the security of another "hop".</t>
        <t>The use of channel binding <xref target="RFC6677"/> does not prevent these attack, as they made by parties within the trusted RADIUS system.  Instead, channel binding protects from an unrelated attack by an untrusted third party.</t>
        <t>One solution to the above issues would be to create a new protocol which is secure by design, but that solution is not practical.</t>
      </section>
      <section anchor="all-short-shared-secrets-have-been-compromised">
        <name>All short Shared Secrets have been compromised</name>
        <t>As a result of the above analysis, administrators can assume that any shared secret of 8 characters or less has been compromised as soon as it is used in RADIUS/UDP or RADIUS/TCP.  Administrators can assume that any shared secret of 10 characters or less has been compromised by an attacker with significant resources.  Administrators can also assume that all private information (such as User-Password or Tunnel-Password) which depend on such shared secrets have also been compromised.</t>
        <t>As the analysis in [](#user-password} below shows, a strong shared secret protects the contents of User-Password, no matter how weak the end-users password is.  As such it is acceptable (for a short time) for RADIUS/UDP to continue to carry User-Password and Tunnel-Password, but only when a strong shared secret is used.</t>
        <t>Using a strong shared secret is only a partial protection from known attacks.  RADIUS can carry end-user credentials such as CHAP-Password and MS-CHAP which are not protected with the shared secret.  Many of those credentials have been compromised, too.</t>
      </section>
      <section anchor="many-end-user-passwords-have-been-compromised">
        <name>Many End-User Passwords Have Been Compromised</name>
        <t>The analyis in <xref target="ms-chap"/> below shows how the construction of MS-CHAP can allow attackers to determine the underyling password in milliseconds.  <xref target="chap-password"/> also shows how a different attack on CHAP-Password can recover the underlying password in milliseconds.  This section explains the effects of those attacks.</t>
        <t>As the security of CHAP-Password and MS-CHAP depends only on the strength of the end-users password, those methods can be safe only if the user chooses a strong password.  That is, a password which is 10 characters or more, and which is derived from a cryptograpically strong pseudo-random number generator. This requirement is unlikely to be met by a large percentage of end users.  As such, the use of CHAP-Password and MS-CHAP needs to be deprecated.</t>
        <t>To be perfectly clear: if a CHAP-Password, or MS-CHAP data has been sent over the Internet via RADIUS/UDP or RADIUS/TCP in the last decade, you should assume that the underlying passwords have been compromised.</t>
      </section>
    </section>
    <section anchor="blastradius">
      <name>The BlastRADIUS Attack</name>
      <t>This section gives more details on the BlastRADIUS attack, so that the reader can be informed as to why <xref target="I-D.ietf-radext-deprecating-radius"/> makes its recommendations.  In the interest of simplicity for implementers, {I-D.ietf-radext-deprecating-radius}} omits all explanation of the attack.  That document also gives minimal explanation for each of the protocol changes.  This document contains the full details instead.</t>
      <t>The attack depends on a few related factors.  If any one of these factors are not present, the attack is not possible.  These factors are outlined below:</t>
      <ul spacing="normal">
        <li>
          <t>The Access-Request packets are not authenticated, and can therefore be modified without detection.</t>
        </li>
        <li>
          <t>The use of MD5 within RADIUS is subject to known prefix attacks.</t>
        </li>
        <li>
          <t>The improvements to MD5 collisions in <xref target="HASHCLASH"/> make the attack feasible.</t>
        </li>
        <li>
          <t>The structure and behavior of Proxy-State makes it the perfect vector for an attacker to inject the "MD5 garbage" (<xref target="BLAST"/>) which is needed to force the MD5 collision.</t>
        </li>
      </ul>
      <t>The attack works by having An "on path" attacker who modifies an Access-Request packet, and injects one or more Proxy-State attributes with special contents. The Proxy-State attribute itself will not trigger any overflow or “out of bounds” issue with the RADIUS client or server.  Instead, the contents of the attributes allows the attacker to create an MD5 known-prefix collision when the server calculates the Response Authenticator.  In effect, the attacker uses the RADIUS server, and its knowledge of the shared secret, to unknowingly authenticate packets which it has not created.</t>
      <t>The behavior of the Proxy-State attribute is extremely useful to this attack.  The attribute is defined in <xref section="5.33" sectionFormat="comma" target="RFC2865"/> as an opaque token which is sent by a RADIUS proxy, and is echoed back by RADIUS servers.  That is, the contents of the attribute are never examined or interpreted by the RADIUS server.  Even better, testing shows that all known RADIUS clients will simply ignore any unexpected Proxy-State attributes which they receive.  Finally, implementations generally add Proxy-State to the end of response packets, which simplifies the attack.</t>
      <t>This attribute is therefore ideally suited to an attackers purpose of injecting arbitrary data into packets, without that data affecting client or server behavior.   The reasons for this behavior are outlined below in <xref target="proxy-state"/>.  While those reasons were transient and decades in the past, the impact of those decisions has continued to impact RADIUS until the present.</t>
      <t>While it is possible to use other attributes to achieve the same effect, the use of Proxy-State is simple, and is sufficient to trigger the issue.  For example, it is theoretically possible to use the User-Name attribute for this attack, so long as it is echoed back in an Access-Accept, or even as part of the the contents of a Reply-Message in an Access-Accept.  There is no much benefit in further researching that attack, as the mitigations for attacks using Proxy-State will also protect clients and servers from a similar attacks which use other attributes.</t>
      <t>The injected data and resulting MD5 collision allows the attacker to modify the packet contents almost at will, and the client will still accept the modified packet as being authentic.  The attack allows nearly arbitrary attributes to be added to the response.  Those attributes are simply part of the MD5 collision calculation, and do not substantially impact the cost of that calculation.</t>
      <t>We reiterate that since the RADIUS server can be convinced to authenticate packets using a prefix chosen by the attacker, there is no need for the attacker to know the shared secret.  This attack succeeds no matter how secure the shared secret is, the only mitigation against the attack for RADIUS systems to use TLS, or to require that packets contain a is valid Message-Authenticator.</t>
      <section anchor="detailed-description-of-the-attack">
        <name>Detailed Description of the Attack</name>
        <t>The specific details of the attack are outlined below, as steps which are numbered the same as in the original paper (<xref target="BLAST"/>).</t>
        <ol spacing="normal" type="1"><li>
            <t>The attacker requests network access from the RADIUS client (NAS).  This action triggers the NAS to send an Access-Request packet to the RADIUS server.</t>
          </li>
          <li>
            <t>The Access-Request is observed to obtain its contents, including the Request Authenticator field.  The attacker prevents this packet from reaching the server until the MD5 collision data has been calculated.  The NAS will retransmit the packet one or more times after a delay, giving the attacker time to calculate the chosen prefix.</t>
          </li>
          <li>
            <t>An external resource is used to calculate an MD5 collision using the Request Authenticator, along with the expected contents of an Access-Reject.  As Access-Reject packets are typically empty or can be observed, the expected packet contents are known in their entirety.</t>
          </li>
          <li>
            <t>Once an MD5 collision is found, the resulting "MD5 garbage" data is placed into one or more Proxy-State attributes in the previously seen Access-Request.  The attacker then sends this modified Access-Request to the RADIUS server.</t>
          </li>
          <li>
            <t>The RADIUS server responds with an Access-Reject, and includes the Proxy-State attributes from the modified Access-Request packets.  The packet contains the malicious Proxy-State(s), along with a Response Authenticator which depends on both those malicious attributes, and the shared secret.</t>
          </li>
          <li>
            <t>The attacker discards the original Access-Reject, and uses the chosen prefix data in the Proxy-State(s) to create a different (i.e. modified) response, such as an Access-Accept.  Other authorization attributes such as VLAN assignment can also be added, modified, or deleted.  This modified packet is sent to the NAS.</t>
          </li>
          <li>
            <t>The NAS receives the modified Access-Accept, verifies that the Response Authenticator is correct, and gives the user access, along with the attackers desired authorization.</t>
          </li>
        </ol>
        <t>The result of this attack is a near-total compromise of the RADIUS protocol.  The attacker can cause any user to be authenticated.  The attacker can give almost any authorization to any user.</t>
        <t>While the above description leverages Access-Reject responses, we reiterate that the root cause of the vulnerability is the unauthenticated Access-Request packets.  The attack will therefore succeed even if the server responds with Access-Accept, Access-Challenge, or Protocol-Error <xref target="RFC7930"/>.  The ability for the attacker to avoid Access-Challenge allows MFA to be bypassed, as the attacker simply replaces the Access-Challenge with an Access-Accept.</t>
        <t>In addition to forging an Access-Accept for a user who has no credentials, the attacker can control the traffic of known and authenticated users.  Many modern Broadband Network Gateways (BNG)s, Wireless LAN Controllers (WLCs), and Broadband Remote Access Servers (BRAS) support configuring a dynamic HTTP redirect using Vendor Specific Attributes (VSA)s.  These VSAs are not protected in any way, and could be injected into an Access-Accept in order to redirect a users traffic.  The attacker could then set up a malicious website to launch Zero-Day/Zero-Click attacks, driving subscribers to the website using an HTTP redirect.  This issue is compounded by the fact that many devices perform automatic HotSpot 1.0 style walled garden discovery.  The act of simply connecting to their home WiFi connect could be enough to compromise a subscriber's equipment.</t>
        <t><xref target="I-D.ietf-radext-deprecating-radius"/> defines mitigations which will protect clients and servers from this attack when using RADIUS/UDP or RADIUS/TCP.  However, we reiterate here, and in the rest of this document, that the only long-term solution is to deprecate insecure transports entirely.  In the long term, implementers need to remove all uses of RADIUS/UDP and RADIUS/TCP from their products.  Administrators need to stop using RADIUS/UDP and RADIUS/TCP.</t>
      </section>
      <section anchor="configuration-flags">
        <name>Mitigating the Attack</name>
        <t>While <xref target="I-D.ietf-radext-deprecating-radius"/> defines the mitigations that are mandated for clients and servers, we give a summary description of those mandates here for clarity.  These descriptions are not normative, and readers are instructed to refer to <xref target="I-D.ietf-radext-deprecating-radius"/> for the full list of normative changes to RADIUS.</t>
        <t>Clients</t>
        <ul empty="true">
          <li>
            <t>Clients are required to include Message-Authenticator as the first attribute in all Access-Request packets.</t>
            <t>Clients are required to have a new boolean configuration flag for each server, called "require Message-Authenticator".</t>
            <ul empty="true">
              <li>
                <t>When this flag is set to "false", client behavior remains unchanged from legacy RADIUS.</t>
                <t>When this flag is set to "true", clients discard all responses to Access-Request packets which do not contain a Message-Authenticator attribute.</t>
              </li>
            </ul>
            <t>Clients still need to validate the contents of Message-Authenticator when it is present.  Clients also need to accept valid and authenticated responses, no matter where the Message-Authenticator is located in the response.</t>
          </li>
        </ul>
        <t>Servers</t>
        <ul empty="true">
          <li>
            <t>Servers are required to include Message-Authenticor as the first attribute in all responses to Access-Request packets.</t>
            <t>Servers are required to have a new boolean configuration flag for each client, called "require Message-Authenticator".</t>
            <ul empty="true">
              <li>
                <t>When this flag is set to "false", their behavior remains unchanged from legacy RADIUS, except that the "limit Proxy-State" flag below is also checked.</t>
                <t>When this flag is set to "true", clients discard all Access-Request packets which do not contain a Message-Authenticator attribute.</t>
              </li>
            </ul>
            <t>Servers still need to validate the contents of Message-Authenticator when it is present.  Servers also need to accept valid and authenticated Access-Requests, no matter where the Message-Authenticator is located in the request.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Servers are required to have a new boolean configuration flag for each client, called "limit Proxy-State".</t>
            <ul empty="true">
              <li>
                <t>When this flag is set to "false", server behavior remains unchanged from legacy RADIUS.</t>
                <t>When this flag is set to "true", servers discard all Access-Request packets that contain a Proxy-State attribute.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="why-the-mitigiations-work">
        <name>Why the Mitigiations Work</name>
        <t>This section explains the rationale for the mitigations defined by <xref target="I-D.ietf-radext-deprecating-radius"/>.</t>
        <t>Adding Message-Authenticator as the first attribute in packets means that the first attribute contains data which is impossible for the attacker to predict.  That is, for the purposes of MD5 known prefix attacks, the unknown suffix begins with the Message-Authenticator, and continues for the remainder of the packet.  The attacker is therefore unable to leverage the attack using a known prefix, and the vulnerability is prevented.</t>
        <t>When this change is made on clients, it is necessary to prevent the attack, but it is not sufficient.  When a server does not require that Access-Request packets contain Message-Authenticator, an attacker can simply remove it from the Access-Request.  The attack can then proceed, as the server will receive, process, and respond to, an unauthenticated Access-Request packet.</t>
        <t>In contrast, when both clients and servers requires that packets contain a valid Message-Authenticator, the BlastRADIUS attack is impossible.  Therefore the "require Message-Authenticator" flag is needed on both clients and servers in order to secure the RADIUS protocol.  In order to enable compatibility with legacy systems, this protocol change must be enabled by a configuration flag.</t>
        <section anchor="protecting-clients">
          <name>Protecting Clients</name>
          <t>A client is fully protected from the attack if it requires that all responses to Access-Request contain a Message-Authenticator, and it validates the contents of Message-Authenticator.  The client is also protected when the server sends Message-Authenticator as the first attribute in all responses to Access-Request packets.</t>
          <t>That server behavior secures one client to server connection, even if the server does not require Message-Authenticator in Access-Request packets, and even if the client does not examine or validate the contents of the Message-Authenticator.  As noted above, this location of the Message-Authenticator ensures that the unknown suffix is the entire packet, and the attack is impossible.</t>
          <t>In contrast, when the Message-Authenticator is the last attribute in a packet (as was historically common in many implementations), the attacker can treat the Message-Authenticator itself as an unknown suffix, as it does with the shared secret.  The attacker can then proceed with the attack, with no additional effort.</t>
          <t>The analysis is similar if the Message-Authenticator is in the middle of the packet, with attributes existing both before an after the Message-Authenticator.  Attributes before the Message-Authenticator can be modified, discarded, or added, while attributes after the Message-Authenticator need to remain in the packet.  We direct the reader to <xref target="BLAST"/> Section 7.2 for a more complete description of these issues.</t>
          <t>In short, the only solution which mitigates the attack is that servers need to place Message-Authenticator as the first attribute in all responses to Access-Request packets.</t>
        </section>
        <section anchor="protecting-servers-and-proxies">
          <name>Protecting Servers and Proxies</name>
          <t>Ugrading all client equipment can be  difficult, if only because there are many more clients than servers.  Some client products may no longer be supported, or the relevant vendor may have gone out of business.  Even if upgraded software images are available, the upgrade process may impact production networks, which has a cost.  As a result, any mitigations must work even when clients have not been updated.</t>
          <t>A server is vulnerable to the attack when it proxies packets, even if it adds Message-Authenticator is added as the first attribute in responses to all Access-Request packets.  Due to the limitations of RADIUS, a proxy has no way of knowing whether or not a "next hop" RADIUS server has been upgraded.  It therefore has to protect itself from attacks when it is the only upgraded party in a RADIUS proxy chain.</t>
          <t>In this scenario, a legacy client sends Access-Request packets to an upgraded proxy, which in turn forwards the packets to a legacy next hhop server.  Responses from the next hop server are sent back to the proxy, and then to the client.</t>
          <t>Upgrading the proxy will protect only the responses from the proxy to the client.  The attacker can still modify packets from the client to the proxy, or it can modify all request and response packets that are sent between the proxy and next hop server.  The result is that the upgraded server is still vulnerable to the attack.</t>
          <t>The "limit Proxy-State" flag allows servers to detect and prevent attacks when Access-Request packets do not contain Message-Authenticator.  This configuration is only necessary when the server is a proxy.  When the server enables the "limit Proxy-State" flag, legacy clients to be used without substantially compromising security.</t>
          <t>The proxy is likely to still be vulnerable to attacks on the link between itself and the next hop server.  However, the proxy can use the client "require Message-Authenticator" flag defined above to protect itself.  Even when the proxy cannot set that flag, the link between the proxy and the next hop server is much more likely to be protected via TLS or IPSec than the link between the client and proxy.</t>
          <t>In addition, it is generally easier to upgrade servers than clients.  The focus of the mitigations, therefore, has been on securing the link between clients and servers, not between proxy servers.</t>
        </section>
        <section anchor="other-attributes">
          <name>Other Attributes</name>
          <t>While it is theoretically possible to perform the BlastRADIUS attack via attributes other than Proxy-State, no such exploits are known at this time.  Any such exploit would require that the server receive fields under the attackers control (e.g. User-Name), and echo those fields back in a response.  Such attacks are therefore only possible when the server is configured to echo back attacker-controlled data, which is not their default behavior.</t>
          <t>As a result, the configuration flags described above in <xref target="configuration-flags"/> allow the maximum amount of security while adding the minimum disruption to operational networks.  For the remaining attack vectors, is is RECOMMENDED that servers which echo back user-supplied data in responses do so only when their "require Message-Authenticator" flag is set to "true".  If such user-supplied data is echoed back in responses when the "require Message-Authenticator" flag is set "false", then the BlastRADIUS attack is theoretically still possible, even though no exploit is currently available.</t>
          <t>The server configuration flags will protect it even if clients have not been upgraded or been configured to be secure.  The server configuration flags will not protect clients (NASes or proxies) from servers which have not been upgraded or been configured to be secure.</t>
        </section>
        <section anchor="requirements-for-full-mitigation">
          <name>Requirements for Full Mitigation</name>
          <t>The attack will only be mitigated in either of the following two circumstances:</t>
          <ol spacing="normal" type="1"><li>
              <t>The client implements the "require Message-Authenticator" flag, and has set that flag to "true",</t>
            </li>
            <li>
              <t>The server places Message-Authenticator as the first attribute in all responses to Access-Request packets.</t>
            </li>
          </ol>
          <t>Since RADIUS has no feature negotiation, the server has no way of knowing whether or not the client has been configured securely.  The only remaining choice then for server behavior then, is the second item.  <xref target="I-D.ietf-radext-deprecating-radius"/> therefore mandates that all RADIUS servers send Message-Authenticator as the first attribute in all responses to Access-Request packets.  This change is the simplest possible fix to the RADIUS protocol which will protect systems from the attack.</t>
        </section>
      </section>
      <section anchor="limitations-of-the-mitigations">
        <name>Limitations of the Mitigations</name>
        <t>The above mitigations have some limitations.  The design of the mitigations had to allow for backwards compatibility with legacy RADIUS systems, while still allowing for (but not requiring) whole-sale network upgrades.  There is a trade-off to be made between perfectly secure networks which are unusable, and networks which are usable but somewhat insecure.  The mitigations defined in <xref target="I-D.ietf-radext-deprecating-radius"/> create as much security as possible, while still not breaking existing networks.</t>
        <t>The result is that there are situations where a network is functional, but insecure.  In addition, there are situations where existing client implementations are not compatible with the mitigations.  This section outlines those limitations.</t>
        <section anchor="vulnerable-systems">
          <name>Vulnerable Systems</name>
          <t>A RADIUS server is vulnerable to the attack if it does not require that all received Access-Request packets contain a Message-Authenticator attribute.  This vulnerability exists for many common uses of Access-Request, including packets containing PAP, CHAP, MS-CHAP, or packets containing “Service-Type = Authorize-Only”.   The vulnerability is also transitive.  If any one RADIUS server in a proxy chain is vulnerable, then the entire chain is vulnerable.  The attack can proceed on the vulnerable systems, and the attacker can gain unauthenticated and/or unauthorized access to any systems which depend on that proxy chain.</t>
          <t>Similarly, simply having the Message-Authenticator attribute present in Access-Request packets is not sufficient.  In order to be protected, a server must require that the attribute is present, and must also discard packets which are missing it.  Similarly, the client must also require that the attribute is present, and discard packets which are missing oit.</t>
          <t>Similarly, clients are vulnerable when they do not require that all responses to Access-Request packets contain Message-Authenticator.  Note that clients which validate Message-Authenticator are not vulnerable even if Message-Authenticator is the last attribute in a response.  The HMAC construct of Message-Authenticator makes the attack impossible in that situation.</t>
          <t>The requirement on servers to place Message-Authenticator as the first attribute in all responses to Access-Request is there only to protect legacy clients which do not validate Message-Authenticator.  There is no need for a client to discard responses where the Message-Authenticator is valid, but is also not the first attribute.  Such behavior is incorrect, and will cause interoperability problems.</t>
        </section>
        <section anchor="unaffected-systems">
          <name>Unaffected Systems</name>
          <t>There are a number of systems which are not vulnerable to this attack.  The most important ones are systems which only perform EAP authentication, such as with 802.1X / WPA Enterprise.  The EAP over RADIUS protocol is defined in <xref section="3.3" sectionFormat="comma" target="RFC3579"/> which states explicitly:</t>
          <ul empty="true">
            <li>
              <t>If any packet type contains an EAP-Message attribute it MUST also contain a Message-Authenticator.</t>
            </li>
          </ul>
          <t>This requirement reiterates that of <xref section="5.13" sectionFormat="comma" target="RFC2869"/>, which defines EAP-Message and Message-Authenticator, but which does not get into details about EAP.</t>
          <t>This requirement is enforced by all known RADIUS servers.  As a result, when roaming federations such as eduroam <xref target="EDUROAM"/> use RADIUS/UDP to transport EAP, the attack is not possible.</t>
          <t>Other roaming groups such as OpenRoaming <xref target="OPENROAMING"/> require the use of TLS, and are not vulnerable.  Other roaming providers generally use VPNs to connect disparate systems, and are also not vulnerable.</t>
          <t>802.1X / WPA enterprise systems have an additional layer of protection, due to the use of the master session keys (MSK) which are derived from the EAP authentication method.  These keys are normally carried in an Access-Accept, in the MS-MPPE-Recv-Key and MS-MPPE-Send-Key attributes, and are used to secure the link between the NAS and the supplicant.  The contents of the attributes are obfuscated via the same method used for Tunnel-Password, and are not visible to an "on-path" attacker.</t>
          <t>While an attacker could perhaps force an Access-Accept in some situations where EAP is used, or strip the Message-Authenticator from packets, it is not currently possible for an attacker to see, modify, or create the correct MSK for the EAP session.  As a result, when 802.1X / WPA enterprise is used, even a successful attack on the Access-Accept packet would likely not result in the attacker obtaining network access.</t>
        </section>
      </section>
      <section anchor="implementations-with-incorrect-mitigations">
        <name>Implementations with Incorrect Mitigations</name>
        <t>This section summarizes the various implementation issues, and the recommended fixes to them.  While this section does not contain normative text, it refers to normative requirements in <xref target="I-D.ietf-radext-deprecating-radius"/>.  This summary is necessary because multiple implementations failed to follow the normative requirements of that document. Instead, those systems either implemented behavior which was forbidden by the normative text, or else failed to implement behavior which was mandated by the normative text.</t>
        <t>It is therefore necessary to reiterate to the reader that the normative text in <xref target="I-D.ietf-radext-deprecating-radius"/> is, in fact, normative, and that the mandates of the normative text need to be respected.  The reader should understand that any non-normative text in this specification does not over-ride the clear mandates of the normative text in <xref target="I-D.ietf-radext-deprecating-radius"/>.</t>
        <t>The following list outlines the problems seen, in no particular order.</t>
        <ul spacing="normal">
          <li>
            <t>Some implementations discard packets which contain
Message-Authenticator.</t>
          </li>
          <li>
            <t>Some implementations discard responses where the
Message-Authenticator is not first, in violation of <xref section="5" sectionFormat="comma" target="RFC2865"/>.  It should be reiterated that the requirement in
<xref target="I-D.ietf-radext-deprecating-radius"/> "Server Responses" to place
Message-Authenticator first is a requirement on the server, and is
not a requirement on the client.</t>
          </li>
        </ul>
        <section anchor="discarding-packets-with-message-authenticator-is-wrong">
          <name>Discarding Packets with Message-Authenticator is Wrong</name>
          <t>Nearly all clients which do not validate Message-Authenticator are known to accept responses which contain it, due to the provisions of <xref section="5" sectionFormat="comma" target="RFC2866"/>:</t>
          <ul empty="true">
            <li>
              <t>A RADIUS client MAY ignore Attributes with an unknown Type.</t>
            </li>
          </ul>
          <t>These RADIUS clients are compatible with the protocol change outlined in this document.   We note also that Message-Authenticator has been defined for almost twenty-five (25) years, since <xref target="RFC2869"/>, so there are few reasons for equipment to not support it.</t>
          <t>Since the publication of the original BlastRADIUS notification, it has become known that some implementations do not behave as expected.  That is, instead of ignoring an unexpected Message-Authenticator attribute, they discard all responses with contain Message-Authenticator.  That behavior is entirely unreasonable, and is not required by any standard.</t>
          <t>The unfortunate reality is that the only way that RADIUS servers could be compatible with such systems is for them to never send Message-Authenticator in responses.  However, doing so would open up significantly more systems to the BlastRADIUS attack.  As such, there is no attempt made to be compatible with implementations that fail to implement RADIUS correctly.</t>
          <t>The only way to secure those systems is to upgrade them.  Failing that, the administrators of those systems will need to accept the fact that their systems are vulnerable.</t>
          <t>The solution adopted by <xref target="I-D.ietf-radext-deprecating-radius"/> is to declare that clients or servers which discard packets containing Message-Authenticator are not compliant with the RADIUS specifications.  It is not acceptable to decrease the security of the RADIUS protocol in order to be compatible with insecure and non-compliant implementations.  That specification attempts to prevent such issues from happening in the future, by mandating behavior for unknown attributes in <xref target="I-D.ietf-radext-deprecating-radius"/> "Unknown Attributes".  There is no reason for an implementation to discard response a packet simply because it does not recognize an attribute in the packet.</t>
        </section>
        <section anchor="checking-the-location-of-message-authenticator-is-wrong">
          <name>Checking the location of Message-Authenticator is Wrong</name>
          <t>Nothing in any previous RADIUS specification requires attributes to be placed in any particular location in a packet.  Nothing in any previous RADIUS specification requires implementations to discard packets which contain unrecognized attributes.</t>
          <t>Further, the construction of Message-Authenticator allows for a RADIUS implementation to authenticate packets (other than Access-Request), even if the Message-Authenticator is not validated.</t>
          <t>This issue is addressed in <xref section="TBD" sectionFormat="comma" target="I-D.ietf-radext-deprecating-radius"/>, which clarifies and extends the requirements on attribute ordering and location.  <xref section="TBD" sectionFormat="comma" target="I-D.ietf-radext-deprecating-radius"/> also clarifies and extends the requirements on receiving unknown attributes.</t>
        </section>
      </section>
      <section anchor="less-effective-mitigations">
        <name>Less Effective Mitigations</name>
        <t>There was substantial discussion around the design and effectiveness of the mitigations defined in <xref target="I-D.ietf-radext-deprecating-radius"/>.  This section outlines some obvious mitigations which were considered and rejected.  As protocol design is subject to a complex series of trade-offs, it is useful to explain what those alternative mitigations are, and why they were rejected.</t>
        <t>An alternative configuration flag with a similar effect to the “limit Proxy-State” flag could be one called “this client is a NAS, and will never send Proxy-State”.  The intention for such a flag would be to clearly separate RADIUS proxies (which always send Proxy-State), from NASes (which will never send Proxy-State).  When the flag is set for a client, the server could then discard Access-Request packets which contain Proxy-State.  Alternatively, the server could also discard Proxy-State from all responses sent to that client.</t>
        <t>Such a flag, however, depends on network topology, and fails to correct the underlying lack of packet authenticity and integrity.  The flag may also work for one NAS, but it is likely to be incorrect if the NAS is replaced by a proxy.  Where there are multiple different pieces of NAS equipment behind a NAT gateway, the flag is also likely to be correct for some packets, and incorrect for others.</t>
        <t>Using configuration flags which control the desired outcome is preferable to using flags which depend on network topology that is outside of the control of clients and servers.</t>
      </section>
      <section anchor="non-mitigations">
        <name>Non-Mitigations</name>
        <t>It may be tempting to come up with other "ad hoc" solutions to this vulnerability which are simpler than the ones outlined in <xref target="I-D.ietf-radext-deprecating-radius"/>.  Such solutions are likely to either break existing RADIUS deployments, or else they will not protect systems from the attack.  The mitigations described in <xref target="I-D.ietf-radext-deprecating-radius"/> not only prevent the attack, they do so without negatively affecting normal RADIUS operation.  There is therefore no reason to use any other methods.</t>
        <t>Other attempted mitigation factors are discussed in the BlastRADIUS document (<xref target="BLAST"/>).  For example, <xref target="BLAST"/> Section 7.4 explains why decreasing timeouts simply increases the cost of the attack without preventing it.  Decreasing timeouts also can negatively affect normal RADIUS traffic.</t>
        <t><xref target="BLAST"/> Section 7.7 explains why clients validating Proxy-State, or looking for unexpected Proxy-State does not protect them from the attack.  The attacker can just change the form of the attack, and bypass those checks.</t>
        <t>There is therefore no reason to implement “ad hoc” solutions when a solution exists which has passed reviews by both the BlastRADIUS cryptographers, and by the relevant RADIUS experts.  There is every reason to believe that cryptographic operations designed by experts and subject to rigorous peer review are better than random guesses made by programmers who lack the relevant cryptographic and RADIUS experience.</t>
        <section anchor="switch-to-other-protocols-is-not-appropriate">
          <name>Switch to Other Protocols is Not Appropriate</name>
          <t>Switching away from RADIUS to another protocol will not protect from the attack, as there is no other protocol which can replace RADIUS.  No other protocol is supported by medium to low-end networking devices for end-user authentication, authorization, and accounting.  Outside of situations where Diameter is used, the choice for nearly every use-case which controls network access is limited to one protocol: RADIUS.</t>
          <t>Despite this reality, some "security" sites have recommended "securing" the network by switching to "alternative" protocols.  Such recommendations are incorrect and inappropriate.</t>
          <t>Diameter <xref target="RFC6733"/> is the closest protocol in functionality to RADIUS, but the Diameter use-case is applicable to large-scale telecommunications and internet service providers (ISPs).  Support for Diameter is rarely present in equipment which is available to consumers or enterprises.  As such, replacing RADIUS with Diameter is not an option.</t>
          <t>Other proposals for protocols to replace RADIUS are even less effective.  TACACS+ <xref target="RFC8907"/> has some overlap with RADIUS for administrator login to network devices, but it cannot be used outside of that limited scope.  TACACS+ does not support 802.1X, end-user authentication, or end-user accounting.  It is therefore impossible for an ISP or enterprise to replace RADIUS with TACACS+.</t>
          <t>Kerberos <xref target="RFC4120"/> is also not a option.  It is most generally used to authenticate applications, when the underlying system already has network access.  Kerberos also does not support 802.1X, and does not support accounting.</t>
          <t>The situation is much the same with any proposal to replace RADIUS with IPsec.  While IPsec does authenticates devices prior to bringing up the VPN, those devices must already have network access.  IPsec also requires that the end-user traffic be transported over the IPsec connection, where RADIUS does not transport any end-user traffic.</t>
          <t>In conclusion, recommendations to use alternate protocols are, at best, misguided.  We do not recommend following any "security" advice which is based on a fundamental misunderstanding of networking protocols.</t>
        </section>
        <section anchor="intrusion-detection-rules">
          <name>Intrusion Detection Rules</name>
          <t>Intrusion detection systems can be updated to detect and/or warn about the BlastRADIUS attack with the following rules.  In the interests of brevity and generality, the rules are written as plain text.</t>
          <ol spacing="normal" type="1"><li>
              <t>Access-Request does not contain a Message-Authenticator attribute.  </t>
              <t>
Action: Warn the administrator that the system is vulnerable, and should be upgraded.</t>
            </li>
            <li>
              <t>Access-Accept, Access-Reject, or Access-Challenge does not contain a Message-Authenticator attribute.  </t>
              <t>
Action: Warn the administrator that the system is vulnerable, and should be upgraded.</t>
            </li>
            <li>
              <t>Access-Accept, Access-Reject, or Access-Challenge contains a Message-Authenticator attribute, but it is not the first attribute in the packet.  </t>
              <t>
Action: Warn the administrator that the system may be vulnerable, and should be upgraded.</t>
            </li>
            <li>
              <t>Access-Request packet received by a RADIUS server contains Proxy-State, when the RADIUS client is a NAS.  </t>
              <t>
Action: Alert that an attack is likely taking place.  </t>
              <t>
Note that the check should be for packets received by the RADIUS server, and not for packets sent by the NAS.  The attack involves packets being modified after they are sent by the NAS, and before they are received by the RADIUS server.</t>
            </li>
            <li>
              <t>Access-Accept, Access-Reject, or Access-Challenge sent by a RADIUS server contain Proxy-State, when the RADIUS client is a NAS.  </t>
              <t>
Action: Alert that an attack is likely taking place.  </t>
              <t>
Note that the check should be for packets sent by the RADIUS server, and not for packets received by the NAS.  The attacker can modify packets to "hide" Proxy-State in another attribute, such as Vendor-Specific.</t>
            </li>
            <li>
              <t>Any RADIUS traffic is sent over UDP or TCP transport, without IPsec or TLS.  </t>
              <t>
Action: Warn that the system uses deprecated transport protocols, and should be upgraded.</t>
            </li>
            <li>
              <t>Any RADIUS traffic is sent external to the organization over UDP or TCP transport, without IPsec or TLS.  </t>
              <t>
Action: Warn that this is an insecure configuration, and can expose users private data, identities, passwords, locations, etc. to unknown attackers.</t>
            </li>
          </ol>
          <t>These rules should assist administrators with ongoing security and monitoring.</t>
        </section>
      </section>
      <section anchor="summary">
        <name>Summary</name>
        <t>The RADIUS protocol as defined in <xref target="RFC2865"/> is vulnerable to an attack due to Access-Request packets being entirely unauthenticated.  This issue has been known and ignored for decades.  It was first raised as a vulnerability in 1998 <xref target="DATTACK"/>, and a fix was rejected in <xref target="RFC2869"/>.  A practicl fix was suggested in 2007 in <xref section="2.2.2" sectionFormat="comma" target="RFC5080"/>, but it took until <xref target="I-D.ietf-radext-deprecating-radius"/> before a fix was mandated,  That mandate only occurred because an exploit was demonstrated in 2024, in <xref target="BLAST"/>.</t>
      </section>
    </section>
    <section anchor="other-radius-problems">
      <name>Other RADIUS Problems</name>
      <t>Independent of the above security and privacy issues, there are a large number of other problems with the RADIUS protocol, and with the historic practices around the use of RADIUS.  This section discusses those problems.</t>
      <section anchor="authentication-methods">
        <name>Authentication Methods</name>
        <t>There are a number of problems with authentication methods that are transported in RADIUS attributes.  Even independent of security issues with a particular authentication method, the choice of authentication method can in fact decrease security, as noted below in <xref target="password-security"/>.</t>
        <section anchor="ms-chap">
          <name>Attacks on MS-CHAP</name>
          <t>MS-CHAP (v1 in <xref target="RFC2433"/> and v2 in <xref target="RFC2759"/>) have major design flaws, and are not suitable for use outside of a secure tunnel such as PEAP, TEAP, or TTLS.  As MS-CHAPv1 is less commonly used, the discussion in this section will focus on MS-CHAPv2, but the same analysis applies to MS-CHAPv1.</t>
          <t>MS-CHAP has been broken since 2004, as seen in <xref target="ASLEAP"/>.  While the attack there mentions LEAP, the same attack applies to MS-CHAP.  This information was apparently insufficiently clear in the <xref target="ASLEAP"/> attack, as and no previous sp=ecification has deprecated MS-CHAP.  As a result, most implementations still support it.</t>
          <t>The attack relies on a vulnerability in the protocol design in <xref section="8.4" sectionFormat="comma" target="RFC2759"/>.  In that section, the response to the MS-CHAP challenge is calculated via three DES operations, which are based on the 16-octet NT-Hash form of the password.  However, the DES operation requires 7 octet keys, so the 16-octet NT-Hash cannot be divided evenly into the 21 octets of keys required for the DES operation.</t>
          <t>The solution in <xref target="RFC2759"/> Section 8.4 was to use the first 7 octets of the NT-Hash for the first DES key, the next 7 octets for the second DES key, leaving only 2 octets for the final DES key.  The final DES key is padded with zeros.  This construction means that an attacker who can observe the MS-CHAP2 exchange only needs to perform 2^16 DES operations in order to determine the final 2 octets of the original NT-Hash.</t>
          <t>If the attacker has a database which correlates known passwords to NT-Hashes, then those two octets can be used to returns a small subset (1/65536) of candidate hashes.  Those hashes are then checked via brute-force operations to see if they match the original MS-CHAPv2 data.  Limiting the number of candidate hashes allows the attacker to use greatly increase the size of precalculated hashes, with minimal additional cost.</t>
          <t>This process lowers the complexity of cracking MS-CHAP by nearly five orders of magnitude as compared to a brute-force attack.  The attack has been demonstrated using databases which contain hundreds of millions of passwords.  On a consumer-grade machine, the time required for such an attack to succeed is on the order of tens of milliseconds.</t>
          <t>While this attack requires a database of known passwords, such databases are easy to find online, or to create locally from generator functions.  Passwords created manually by people are notoriously predictable, and are highly likely to be found in a database of known passwords.  In the extreme case of strong passwords, they will not be found in the database, and the attacker is still required to perform a brute-force dictionary search.</t>
          <t>The result is that MS-CHAP has significantly lower security than PAP.  When the MS-CHAP data is not protected by TLS, it is visible to everyone who can observe the RADIUS traffic.  Attackers who can see the MS-CHAP data can therefore obtain the underlying NT-Hash with essentially zero effort as compared to cracking the RADIUS shared secret.  This attack means that from a cryptographic perspective, using MS-CHAP is essentially the same as sending passwords in clear-text.</t>
        </section>
        <section anchor="chap-password">
          <name>CHAP-Password</name>
          <t>This section describes a viable attack on CHAP, which does not appear to have been published before.</t>
          <t>The contents of CHAP-Password are calculated using MD5 to hash an identifier, a password, and a challenge.  From <xref target="RFC1994"/>:</t>
          <ul empty="true">
            <li>
              <t>The Response Value is the one-way hash calculated over a stream of
octets consisting of the Identifier, followed by (concatenated
with) the "secret", followed by (concatenated with) the Challenge
Value.</t>
            </li>
          </ul>
          <t>That is, the CHAP-Password contents are MD5(ID + password + challenge).  While this construction is different from the one used to sign the Authenticator fields, attacks on CHAP-Password have substantially the same cost as for cracking the RADIUS shared secret (<xref target="cracking"/>).</t>
          <t>That is, checking all 8 character passwords from a 93 character set is possible for a hobbyist in about day.</t>
          <t>The attack is made easier by the human practice of creating insecure passwords.  An attacker can create dictionaries of hashes of potential passwords.  For CHAP-Password, this also means a 256 times increase in dictionary size, due to the need to calculate the prefix of MD5(ID + password).  However, that calculation is done once, and the results then stored on disk.  The only ongoing cost is the need for more disk space.</t>
          <t>Once the attacker sees a CHAP-Password, the ID field is used to select one of 256 dictionaries, and then every password hash in that dictionary extended with the challenge, and checked against the contents of CHAP-Password.  As these pre-calculated dictionaries generally contain hundreds of millions or low billions of passwords, that number bounds the total number of hashes which need to be checked.</t>
          <t>As noted above in <xref target="cracking"/>, a high-end retail GPU is capable of performing more than 64 billion hashes per second.  Which means that most CHAP-Password attributes can be turned into the equivalent clear-text passwords in sub-second time.  The main gating factor in this attack is the time taken to stream billions of candidate hashes from disk to the GPU.</t>
          <t>This attack means that from a cryptographic perspective, using CHAP-Password is essentially the same as sending passwords in clear-text.</t>
        </section>
        <section anchor="user-password">
          <name>User-Password</name>
          <t>While the obfuscation method used for the User-Password attribute has not been shown to be insecure, it has not been proven to be secure.  The obfuscation method depends on calculating MD5(secret + Request Authenticator), which has a few helpful properties for an attacker.  The cost of brute-forcing short secrets is not large, <xref target="cracking"/> discusses that cost in detail.  Even for longer secrets which are humanly generated, the MD5 state for hashing the secret can be pre-calculated and stored on disk.  This process is relatively inexpensive, even for billions of possible shared secrets.  The Request Authenticator can then be added to each pre-calculated state via brute-force, and compared to the obfuscated User-Password data.</t>
          <t>The MD5 digest is 16 octets long, and many passwords are shorter than that.  This difference means that the final octets of the digest are placed into the User-Password attribute without modification.  The result is that a brute-force attack does not need to decode the User-Password and see if the decoded password "looks reasonable".  Instead, the attacker simply needs to compare the final octets of the calculated digest with the final octets of the User-Password attribute.  The result is a signal which indicates with high probability that the guessed secret is correct.</t>
          <t>The only protection from this particular attack is to ensure that the secret is long, and is derived from a cryptographically strong pseudo-random number generator.  To put it more clearly, if the RADIUS packet is secure due to the use of a strong shared secret, then the User-Password attribute is also secure.</t>
        </section>
        <section anchor="eap">
          <name>EAP</name>
          <t>There are too many EAP methods for them to be discussed here in any detail.  Instead, we can make a few simple observations:</t>
          <ul spacing="normal">
            <li>
              <t>EAP-MD5 is essentially the same as CHAP-Password, and shares the same security analysis.  EAP-MD5 is not suitable for use outside of a secure tunnel such as PEAP, TEAP, or TTLS.</t>
            </li>
            <li>
              <t>EAP-MSCHAPv2 (any variant) is essentially the same as MS-CHAP, and shares the same security analysis.  EAP-MSCHAPv2  is not suitable for use outside of a secure tunnel such as PEAP, TEAP, or TTLS.</t>
            </li>
            <li>
              <t>TLS-based EAP methods (e.g. TTLS, PEAP, etc.) benefit from the security of TLS, and are therefore secure.</t>
            </li>
            <li>
              <t>Other EAP methods are not discussed here.</t>
            </li>
          </ul>
        </section>
        <section anchor="summary-1">
          <name>Summary</name>
          <t>There are no known security issues with User-Password, or with many EAP methods. In contrast, MS-CHAP and CHAP-Password are insecure, and can only be used safely within a TLS tunnel.</t>
          <t>While the "on the wire" encoding of User-Password is secure, the passwords still have to be stored somewhere, typically in a database.  The next section explains how the interaction between authentication methods and password storage methods can increase, or decrease, security of the system as a whole.</t>
        </section>
      </section>
      <section anchor="password-security">
        <name>Password Visibility and Storage</name>
        <t>An attacker can ignore the wire protocol entirely, and bypass all of the issues described earlier in this document.  One such attack is to focus on the database that holds user credentials such as account names and passwords.  At the time of this writing, databases such as <xref target="PWNED"/> claim to have records of over twelve billion user accounts which have been compromised.  User databases are therefore highly sought-after targets.</t>
        <t>The attack discussed in this section is dependent on vulnerabilities with the credential database, and does not assume an attacker can see or modify RADIUS traffic.  As a result, issues raised here apply equally well when TTLS, PEAP, or RADIUS/TLS are used.  The success of the attack depends only on how the credentials are stored in the database.  Since the choice of authentication method affects the way credentials are stored in the database, the security of that dependency needs to be discussed and explained.</t>
        <t>Some organizations may desire to increase the security of their network by avoiding PAP, and using CHAP or MS-CHAP, instead.  These attempts are misguided.  If simple password-based methods must be used, in almost all situations, the security of the network as a whole is increased by using PAP in preference to CHAP or MS-CHAP.  The reason is found through a straightforward risk analysis, which we explain in more detail below.</t>
        <section anchor="pap-security-analysis">
          <name>PAP Security Analysis</name>
          <t>When PAP is used, the User-Password is obfuscated "on the wire", but the RADIUS server sees a clear-text password from the user.  The server then compares that password to credentials which have been stored in a user database, and either accepts or rejects the user.</t>
          <t>In many cases, the credentials stored in the database can be salted and/or hashed in a form which is commonly referred to as being in "crypt"ed form.  The RADIUS server can take the users clear-text password, performs the same "crypt" transformation, and then compares the two "crypt"ed passwords.</t>
          <t>Any compromise of the RADIUS server can result in the compromise of clear-text passwords for users.  However, in most cases, the clear-text password is available only in the memory of the RADIUS server application (i.e. not "on the wire"), and then only for a short period of time.  An attacker who desires to obtain passwords for all users would have to wait for all users to log in, which can take a substantial amount of time.  During that time, an administrator may discover the breach, and resolve the issue.</t>
          <t>When PAP is used, the credentials in the database are stored securely "at rest", presuming that the administrator only stores "crypt"ed credentials.  Any compromise of the database results in the disclosure of minimal information to the attacker.  That is, an attacker cannot easily obtain the clear-text passwords from the compromised database.</t>
          <t>The result is that the user passwords are visible in clear-text only for a short time, and then only on the RADIUS server.  The security of this system is not as good as seen with EAP-pwd <xref target="RFC5931"/> for example, but it is not terrible.</t>
          <t>Storing passwords securely "at rest" is significantly more secure than storing clear-text passwords in a database, even when PAP authentication is used in RADIUS.</t>
        </section>
        <section anchor="chap-and-ms-chap-password-storage">
          <name>CHAP and MS-CHAP Password Storage</name>
          <t>In contrast with PAP, when CHAP or MS-CHAP is used, those methods do not expose a clear-text password to the RADIUS server, but instead a hashed transformation of it.  The design goal of those methods was to make the hash output secure even if an attacker can observe it.  However, as noted above, those methods have been shown to be insecure.</t>
          <t>For the purposes of this section, we will ignore the previous attacks, and instead focus on the implications of using these hashing methods.</t>
          <t>The hash transformations for CHAP and MS-CHAP depend on a random challenge.  The intent was to increase security, but their construction makes strong requirements on the form in which user credentials are stored.</t>
          <t>The process for performing CHAP and MS-CHAP is inverted from the process for PAP.  Using similar terminology as above for illustrative purposes, the "hash"ed passwords are carried in the CHAP method, and are sent to the server.  The server must obtain the clear-text (or NT hashed) password from the database, and then perform the "hash" operation on the password from the database. The two "hash"ed passwords are then compared as was done with PAP.  This inverted process decreases system security substantially.</t>
          <t>Critically, when CHAP or MS-CHAP are used, all credentials must be stored as clear-text (or clear-text equivalent) in the database, all of the time.  Even if the database contents are encrypted, the decryption keys are necessarily accessible to the application which reads that database.  Any compromise of the application means that the entire database can be immediately read and exfiltrated as a whole.  The attacker then has complete access to all user identities, and all associated clear-text passwords.</t>
          <t>It should go without saying that having an attacker obtain all clear-text passwords is more of an issue than having the same attacker obtain passwords in a "crypt"ed form.  Similarly, it is more secure for a RADIUS server to have limited clear-text passwords (i.e. some of the time), rather than having unlimited access to all of the clear-text passwords, all of the time.</t>
        </section>
        <section anchor="on-the-wire-user-password-versus-chap-password">
          <name>On-the-wire User-Password versus CHAP-Password</name>
          <t>There is one more security myth which should be put to rest about PAP versus CHAP.  There is a common belief that CHAP is more secure, because passwords are sent "in the clear" via the User-Password attribute.  This belief is false.</t>
          <t>The User-Password attribute is obfuscated when it is sent in an Access-Request packet, using keyed MD5 and the shared secret, as defined in <xref section="5.2" sectionFormat="comma" target="RFC2865"/>.  At the time of this writing, no attack better than brute force has been found which allows an attacker to reverse this obfuscation.</t>
          <t>There have been claims that it is preferable to use CHAP-Password as it does not "send the password in clear-text".  This preference is based on a misunderstanding of how CHAP-Password and User-Password attributes are calculated.</t>
          <t>The CHAP-Password attribute depends on the hash of a visible Request Authenticator (or CHAP-Challenge) and the users password.  The obfuscated User-Password depends on the same Request Authenticator, and on the RADIUS shared secret.  For an attacker, the difference between the two calculations is minimal.  Presuming that the user password has similar complexity to the shared secret, they can both be attacked with similar amounts of effort.   As a result, any security analysis which makes the claim that "User-Password insecure because it uses MD5" ignores the fact that the CHAP-Password attribute is constructed through substantially the same method.</t>
          <t>The difference in security between the two methods is due instead to the practice of people creating their own insecure password, versus a RADIUS administrator creating a strong shared secret.  The CHAP-Password contents depends only on the strength of the users chosen password.  The User-Password contents instead depends on both the RADIUS shared secret, and on the users password.  As such, even though their constructs are roughly similar, in practice User-Password is significantly more secure than CHAP-Password.</t>
          <t>An attacker who can crack one users password can gain network access as that user, or even administrator access to network devices.  In contrast, an attacker who can crack the shared secret can gain network access as any user, and perform any authorization.  The result is that it is more valuable to crack shared secrets, even if the underlying attacks are similar.</t>
        </section>
        <section anchor="pap-vs-chap">
          <name>PAP vs CHAP Conclusions</name>
          <t>A careful security analysis shows that for all of PAP, CHAP, and MS-CHAP, the RADIUS server must at some point have access to the clear-text version of the password.  As a result, there is minimal difference in risk exposure between the different authentication methods if a RADIUS server is compromised.</t>
          <t>However, when PAP is used, the user credentials can be stored securely "at rest" in a database, while this secure storage is impossible with CHAP and MS-CHAP.  There is therefore a substantial difference in risk exposure between the different authentication methods, with PAP offering substantially higher security due to its ability to secure passwords at rest via the "crypt" construct mentioned above.</t>
          <t>In contrast, CHAP or MS-CHAP are highly insecure, as any database compromise results in the immediate exposure of the clear-text passwords for all users.  The security of those methods are best described as near zero, independent of any database compromise.  The construction of MS-CHAP makes it easier to crack than CHAP-Password, which makes MS-CHAP the worst of all possible choices.</t>
          <t>This security difference is shown not just in the <xref target="PWNED"/> database, but also in attacks on RADIUS systems <xref target="EXPLOIT"/>, where attackers identified a vulnerable RADIUS system, and then:</t>
          <ul empty="true">
            <li>
              <t>utilized SQL commands to dump the credentials [T1555], which contained both clear-text and hashed passwords for user and administrative accounts.</t>
            </li>
          </ul>
          <t>The attack proceeded to leverage those passwords to gain more permissions:</t>
          <ul empty="true">
            <li>
              <t>Having gained credentials from the RADIUS server, PRC state-sponsored cyber actors used those credentials with custom automated scripts to authenticate to a router via Secure Shell (SSH), execute router commands, and save the output.</t>
            </li>
          </ul>
          <t>This attack is only possible when systems store clear-text passwords.</t>
          <t>The result is that when the system as a whole is taken into account, the risk of password compromise is substantially less with PAP than with CHAP or MS-CHAP.  Administrators should therefore prefer PAP over CHAP or MS-CHAP.  Administrators should also store passwords "at rest" in a secure form (salted, hashed), as with the "crypt" format discussed above.</t>
          <t>That being said, other authentication methods such as EAP-TLS <xref target="RFC9190"/> and EAP-pwd <xref target="RFC5931"/> do not expose clear-text passwords to the RADIUS server or to any intermediate proxy.  Those methods therefore lower the risk of password exposure even more than using PAP.</t>
          <t>The conclusion is that administrators should avoid password-based authentication methods where at all possible.  If passwords ahve to be used, wrap them in TLS (e.g. TTLS or PEAP).  Where TLS cannot be used, prefer User-Password to CHAP-Password or MS-CHAP.</t>
        </section>
        <section anchor="the-weakest-link">
          <name>The Weakest Link</name>
          <t>RADIUS security is done on a “hop by hop” basis, which means that an attacker can take advantage of the weakest link in a proxy chain in order to attack other systems which have fully implemented the above mitigations.  If the packets are passed through one or more proxies, then any one vulnerable proxy will still allow the attack to take place.</t>
          <t>If proxies are used, then the weakest link in the proxy chain limits the security of the entire chain. That is, it does not matter if one hop implements RadSec, if another hop implements RADIUS/UDP without sending or requiring Message-Authenticator.</t>
          <t>Even worse, proxies have full control over packet contents.  A malicious proxy can change a reject into an accept, and can add or delete any authorization attributes it desires.  While proxies are generally part of a trusted network, there is every benefit in limiting the number of participants in the RADIUS conversation.</t>
          <t>Proxy chains SHOULD therefore be avoided where possible, and <xref target="RFC7585"/> dynamic discovery should be used where possible.  RADIUS clients and servers SHOULD also be configured with static IP addresses, and with static routes.  This static configuration also protects the systems from DHCP related attacks where an attacker spoofs DHCP to cause clients or servers to route packets through the a system of the attackers choice.</t>
        </section>
      </section>
      <section anchor="proxy-state">
        <name>Note on Proxy-State</name>
        <t>As the BlastRADIUS paper points out in Appendix A:</t>
        <ul empty="true">
          <li>
            <t>The presence of this attribute makes the protocol vulnerability much simpler to exploit than it would have been otherwise.</t>
          </li>
        </ul>
        <t>To see why Proxy-State has this particular design, we go back to the original discussion in May 1995 <xref target="MAY-1995"/></t>
        <ul empty="true">
          <li>
            <t>The RADIUS proxy may place any state information (subject to the length
limitations of a RADIUS attribute) that it will need to transform a
reply from its server into a reply to its client.  This is typically
the original authenticator, identifier, IP address and UDP port number
of the proxy's RADIUS client.</t>
          </li>
        </ul>
        <t>There appear to be few, if any, RADIUS servers which implemented this suggestion.  In part because later discussions note:</t>
        <ul empty="true">
          <li>
            <t>This works only if the NAS is
prepared to accept replies from a proxy server for a request issued to
a different server.</t>
          </li>
        </ul>
        <t>This stateless proxy design has a number of additional issues, most notably violating the <xref target="RFC3539"/> "end-to-end" principle.  It therefore negatively impacts the stability of a RADIUS proxy system.</t>
        <t>This definition for Proxy-State later changed in <xref section="5.33" sectionFormat="comma" target="RFC2865"/> to</t>
        <ul empty="true">
          <li>
            <t>Usage of the Proxy-State Attribute is implementation dependent.  A
description of its function is outside the scope of this
specification.</t>
          </li>
        </ul>
        <t>In practice, the utility of Proxy-State is limited to detecting proxy loops.  Proxies can count the number of Proxy-State attributes in received packets, and if the total is more than some number, then a proxy loop is likely.  We offer no advice on what to do if a proxy loop is detected, as RADIUS has no ability to signal protocol-layer errors.</t>
        <t>It is likely that a "hop count" attribute would likely have been simpler to implement.  But even in 1996, it was likely difficult to change the behavior of proxies due to multiple implementations.</t>
      </section>
    </section>
    <section anchor="other-protocol-failures">
      <name>Other Protocol Failures</name>
      <t>There are many other issues with RADIUS which are not directly related to security or privacy, but still have negative affects on security, privacy, and on operation of the protocol.  At of the time of writing, those issues are being collated in <xref target="ISSUES"/>.</t>
      <t>Although the focus of this document is a review of RADIUS security, it is still important to discuss problems with the protocol in general.  For example, there is implicitly a RADIUS state machine which correlates multiple types of packets, but that state machine is not defined anywhere.  There are common practices which are secure but which are operationally expensive.  RADIUS accounting is known to be inaccurate and is often inconsistent, as seen in <xref target="WBA-ACCT"/></t>
      <t>Some of the issues noted in the above Wiki could potentially have security impact.  For example, if a RADIUS server is not implemented correctly, an attacker can perform a resource exhaustion attack on it, and effectively take it offline.  Proxies are subject to Denial of Service attacks even from trusted clients, because those clients originate packets at the request of untrusted and unknown users.  Rate limiting for RADIUS requests is a poorly tested or documented process, and largely relies on mutual trust of administrators.</t>
      <section anchor="accounting-is-imperfect">
        <name>Accounting Is Imperfect</name>
        <t>The use of RADIUS/UDP for accounting means that accounting is inherently unreliable.  Unreliable accounting means that different entities in the network can have different views of accounting traffic.  These differences can have multiple impacts, including incorrect views of who is on the network, to disagreements about financial obligations.  These issues are discussed in substantial detail in <xref target="RFC2975"/>, and we do not repeat those discussions here.  We do, however, summarize a few key issues.  Sites which use accounting SHOULD be aware of the issues raised in <xref target="RFC2975"/>, and the limitations of the suggested solutions.</t>
        <t>Using a reliable transport such as RADIUS/TLS makes it more likely that accounting packets are delivered, and that acknowledgments to those packets are received.  Reducing the number of proxies means that there are fewer disparate systems which need to have their accounting data reconciled.  Using non-volatile storage for accounting packets means that a system can reboot with minimal loss of accounting data.  Using interim accounting updates means that transient network issues or data losses can be corrected by later updates.</t>
        <t>As RADIUS does not provide for end-to-end signaling or transport, using RADIUS/TLS provides for reliable transport only when the client originating the accounting traffic is connected directly to the server which records it.  If there are instead one or more proxies involved, the proxies increase overall unreliability.</t>
        <t>Systems which perform accounting are also subject to significant operational loads.  Wheres authentication and authorization may use multiple packets, those packets are sent at session start, and then never again.  In contrast, accounting packets can be sent for the lifetime of a session, which may be hours or even days.  There is a large cost to receiving, processing, and storing volumes of accounting data.</t>
        <t>However, even with all of the above concerns addressed, accounting is still imperfect.  The obvious way to increase the accuracy of accounting data is to increase the rate at which interim updates are sent, but doing so also increases the load on the servers which process the accounting data.  At some point, the trade-off of cost versus benefit becomes negative.</t>
        <t>There is no perfect solution here.  Instead, there are simply a number of imperfect trade-offs.</t>
        <section anchor="incorrect-accounting-data">
          <name>Incorrect Accounting Data</name>
          <t>Even if all accounting packets were delivered and stored without error, there is no guarantee that the contents of those packets are in any way reasonable.  The Wireless Broadband Alliance RADIUS Accounting Assurance <xref target="WBA"/> group has been investigating these issues.  While the results are not yet public, a presentation on the topic was made at IETF 118 in the RADEXT working group <xref target="WBA-ACCT"/>.</t>
          <t>The data presented indicated that the WBA saw just about every possible counter attribute in RADIUS accounting packets as containing data which was blatantly wrong or contradictory.  One example is extremely short sessions which have impossibly large amounts of data being downloaded.  Other accounting packets allege that large amounts of data were downloaded via octet counters, while at the same time claiming negligible packet counters, leading to absurdly large packet sizes.</t>
          <t>The only conclusion from this analysis is that some RADIUS clients act as if it is better to produce incorrect accounting data rather than to produce no data at all.  This failure to follow reasonable practices is expensive for network operators.  In effect, vendors have offset their costs to produce quality data onto their customers, who have to take difficult and uncertain steps in order to sanitize or verify the confusing data which vendors provide in accounting packets.</t>
          <t>It should go without saying that accounting systems need to produce correct data.</t>
        </section>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The primary focus of this document is documenting historic privacy and security considerations for RADIUS.</t>
      <t>The use of insecure transport protocols for RADIUS means that personally identifying information is sent "in the clear".  As noted earlier in this document, such information can include MAC addresses, user identifiers, and user locations.</t>
      <t>In addition, this document suggests ways to increase privacy by minimizing the use and exchange of PII.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The primary focus of this document is documenting historic privacy and security considerations for RADIUS.</t>
      <t>The BlastRADIUS vulnerability is the result of RADIUS security being a low priority for decades.  Even the recommendation of <xref section="2.2.2" sectionFormat="comma" target="RFC5080"/> that all clients add Message-Authenticator to all Access-Request packets was ignored by nearly all implementers.  If that recommendation had been followed, then the BlastRADIUS vulnerability notification would have been little more than "please remember to set the require Message-Authenticator flag on all RADIUS servers."</t>
      <t>Similarly, the MS-CHAP, was not officially deprecated, even though it has been proven to be insecure for decades.  This continued use of MS-CHAP has likely resulted in the leaking of many the clear-text passwords for many users.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to the many reviewers and commenters for raising topics to discuss, and for providing insight into the issues related to increasing the security of RADIUS.  In no particular order, thanks to Margaret Cullen, Alexander Clouter, and Josh Howlett.</t>
      <t>Many thanks to Nadia Heninger and the rest of the BlastRADIUS team, along with Heikki Vatiainen, for extensive discussions and feedback about that issue.</t>
      <t>The author is deeply indebted to the late Bernard Aboba for decades of advice and guidance.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
      <ul spacing="normal">
        <li>
          <t>00 - copy from draft-ietf-radext-deprecating-radius, and edit to contain only historical review contents.</t>
        </li>
        <li>
          <t>01 - word smithing and updated analysis of CHAP-Password.</t>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="BCP14">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
        <reference anchor="RFC6421">
          <front>
            <title>Crypto-Agility Requirements for Remote Authentication Dial-In User Service (RADIUS)</title>
            <author fullname="D. Nelson" initials="D." role="editor" surname="Nelson"/>
            <date month="November" year="2011"/>
            <abstract>
              <t>This memo describes the requirements for a crypto-agility solution for Remote Authentication Dial-In User Service (RADIUS). This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6421"/>
          <seriesInfo name="DOI" value="10.17487/RFC6421"/>
        </reference>
        <reference anchor="I-D.ietf-radext-radiusdtls-bis">
          <front>
            <title>RadSec: RADIUS over Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Jan-Frederik Rieckers" initials="J." surname="Rieckers">
              <organization>Deutsches Forschungsnetz | German National Research and Education Network</organization>
            </author>
            <author fullname="Margaret Cullen" initials="M." surname="Cullen">
              <organization>Painless Security</organization>
            </author>
            <author fullname="Stefan Winter" initials="S." surname="Winter">
              <organization>Fondation Restena | Restena Foundation</organization>
            </author>
            <date day="23" month="February" year="2026"/>
            <abstract>
              <t>   This document defines transport profiles for running RADIUS over
   Transport Layer Security (TLS) and Datagram Transport Layer Security
   (DTLS), allowing the secure and reliable transport of RADIUS
   messages.  RADIUS/TLS and RADIUS/DTLS are collectively referred to as
   RadSec.

   This document obsoletes RFC6614 and RFC7360, which specified
   experimental versions of RADIUS over TLS and DTLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-radext-radiusdtls-bis-15"/>
        </reference>
        <reference anchor="I-D.ietf-radext-deprecating-radius">
          <front>
            <title>Deprecating Insecure Practices in RADIUS</title>
            <author fullname="Alan DeKok" initials="A." surname="DeKok">
              <organization>InkBridge Networks</organization>
            </author>
            <date day="6" month="November" year="2025"/>
            <abstract>
              <t>   RADIUS crypto-agility was first mandated as future work by RFC 6421.
   The outcome of that work was the publication of RADIUS over TLS (RFC
   6614) and RADIUS over DTLS (RFC 7360) as experimental documents.
   Those transport protocols have been in wide-spread use for many years
   in a wide range of networks.  They have proven their utility as
   replacements for the previous UDP (RFC 2865) and TCP (RFC 6613)
   transports.  With that knowledge, the continued use of insecure
   transports for RADIUS has serious and negative implications for
   privacy and security.

   The publication of the "BlastRADIUS" exploit has also shown that
   RADIUS security needs to be updated.  It is no longer acceptable for
   RADIUS to rely on MD5 for security.  It is no longer acceptable to
   send device or location information in clear text across the wider
   Internet.  This document therefore deprecates many insecure practices
   in RADIUS, and mandates support for secure TLS-based transport
   layers.  Related security issues with RADIUS are discussed, and
   recommendations are made for practices which increase both security
   and privacy.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-radext-deprecating-radius-08"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1321">
          <front>
            <title>The MD5 Message-Digest Algorithm</title>
            <author fullname="R. Rivest" initials="R." surname="Rivest"/>
            <date month="April" year="1992"/>
            <abstract>
              <t>This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. This memo provides information for the Internet community. It does not specify an Internet standard.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1321"/>
          <seriesInfo name="DOI" value="10.17487/RFC1321"/>
        </reference>
        <reference anchor="RFC2433">
          <front>
            <title>Microsoft PPP CHAP Extensions</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <author fullname="S. Cobb" initials="S." surname="Cobb"/>
            <date month="October" year="1998"/>
            <abstract>
              <t>The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links. PPP defines an extensible Link Control Protocol and a family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2433"/>
          <seriesInfo name="DOI" value="10.17487/RFC2433"/>
        </reference>
        <reference anchor="RFC2759">
          <front>
            <title>Microsoft PPP CHAP Extensions, Version 2</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <date month="January" year="2000"/>
            <abstract>
              <t>This document describes version two of Microsoft's PPP CHAP dialect (MS-CHAP-V2). MS-CHAP-V2 is similar to, but incompatible with, MS-CHAP version one (MS-CHAP-V1). This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2759"/>
          <seriesInfo name="DOI" value="10.17487/RFC2759"/>
        </reference>
        <reference anchor="RFC2866">
          <front>
            <title>RADIUS Accounting</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying accounting information between a Network Access Server and a shared Accounting Server. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2866"/>
          <seriesInfo name="DOI" value="10.17487/RFC2866"/>
        </reference>
        <reference anchor="RFC2868">
          <front>
            <title>RADIUS Attributes for Tunnel Protocol Support</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <author fullname="D. Leifer" initials="D." surname="Leifer"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="J. Shriver" initials="J." surname="Shriver"/>
            <author fullname="M. Holdrege" initials="M." surname="Holdrege"/>
            <author fullname="I. Goyret" initials="I." surname="Goyret"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document defines a set of RADIUS (Remote Authentication Dial In User Service) attributes designed to support the provision of compulsory tunneling in dial-up networks. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2868"/>
          <seriesInfo name="DOI" value="10.17487/RFC2868"/>
        </reference>
        <reference anchor="RFC3579">
          <front>
            <title>RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
            <date month="September" year="2003"/>
            <abstract>
              <t>This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms. In the proposed scheme, the Network Access Server (NAS) forwards EAP packets to and from the RADIUS server, encapsulated within EAP-Message attributes. This has the advantage of allowing the NAS to support any EAP authentication method, without the need for method- specific code, which resides on the RADIUS server. While EAP was originally developed for use with PPP, it is now also in use with IEEE 802. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3579"/>
          <seriesInfo name="DOI" value="10.17487/RFC3579"/>
        </reference>
        <reference anchor="RFC5176">
          <front>
            <title>Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="M. Chiba" initials="M." surname="Chiba"/>
            <author fullname="G. Dommety" initials="G." surname="Dommety"/>
            <author fullname="M. Eklund" initials="M." surname="Eklund"/>
            <author fullname="D. Mitton" initials="D." surname="Mitton"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document describes a currently deployed extension to the Remote Authentication Dial In User Service (RADIUS) protocol, allowing dynamic changes to a user session, as implemented by network access server products. This includes support for disconnecting users and changing authorizations applicable to a user session. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5176"/>
          <seriesInfo name="DOI" value="10.17487/RFC5176"/>
        </reference>
        <reference anchor="RFC5580">
          <front>
            <title>Carrying Location Objects in RADIUS and Diameter</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="F. Adrangi" initials="F." surname="Adrangi"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="A. Lior" initials="A." surname="Lior"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes procedures for conveying access-network ownership and location information based on civic and geospatial location formats in Remote Authentication Dial-In User Service (RADIUS) and Diameter.</t>
              <t>The distribution of location information is a privacy-sensitive task. Dealing with mechanisms to preserve the user's privacy is important and is addressed in this document. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5580"/>
          <seriesInfo name="DOI" value="10.17487/RFC5580"/>
        </reference>
        <reference anchor="RFC6151">
          <front>
            <title>Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <author fullname="L. Chen" initials="L." surname="Chen"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>This document updates the security considerations for the MD5 message digest algorithm. It also updates the security considerations for HMAC-MD5. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6151"/>
          <seriesInfo name="DOI" value="10.17487/RFC6151"/>
        </reference>
        <reference anchor="RFC6218">
          <front>
            <title>Cisco Vendor-Specific RADIUS Attributes for the Delivery of Keying Material</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <author fullname="T. Zhang" initials="T." surname="Zhang"/>
            <author fullname="J. Walker" initials="J." surname="Walker"/>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document defines a set of vendor-specific RADIUS Attributes designed to allow both the secure transmission of cryptographic keying material and strong authentication of any RADIUS message. These attributes have been allocated from the Cisco vendor-specific space and have been implemented by multiple vendors. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6218"/>
          <seriesInfo name="DOI" value="10.17487/RFC6218"/>
        </reference>
        <reference anchor="RFC6613">
          <front>
            <title>RADIUS over TCP</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>The Remote Authentication Dial-In User Server (RADIUS) protocol has, until now, required the User Datagram Protocol (UDP) as the underlying transport layer. This document defines RADIUS over the Transmission Control Protocol (RADIUS/TCP), in order to address handling issues related to RADIUS over Transport Layer Security (RADIUS/TLS). It permits TCP to be used as a transport protocol for RADIUS only when a transport layer such as TLS or IPsec provides confidentiality and security. This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6613"/>
          <seriesInfo name="DOI" value="10.17487/RFC6613"/>
        </reference>
        <reference anchor="RFC6614">
          <front>
            <title>Transport Layer Security (TLS) Encryption for RADIUS</title>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="M. McCauley" initials="M." surname="McCauley"/>
            <author fullname="S. Venaas" initials="S." surname="Venaas"/>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6614"/>
          <seriesInfo name="DOI" value="10.17487/RFC6614"/>
        </reference>
        <reference anchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="M. Hansen" initials="M." surname="Hansen"/>
            <author fullname="R. Smith" initials="R." surname="Smith"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC7360">
          <front>
            <title>Datagram Transport Layer Security (DTLS) as a Transport Layer for RADIUS</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="September" year="2014"/>
            <abstract>
              <t>The RADIUS protocol defined in RFC 2865 has limited support for authentication and encryption of RADIUS packets. The protocol transports data in the clear, although some parts of the packets can have obfuscated content. Packets may be replayed verbatim by an attacker, and client-server authentication is based on fixed shared secrets. This document specifies how the Datagram Transport Layer Security (DTLS) protocol may be used as a fix for these problems. It also describes how implementations of this proposal can coexist with current RADIUS systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7360"/>
          <seriesInfo name="DOI" value="10.17487/RFC7360"/>
        </reference>
        <reference anchor="I-D.tomas-openroaming">
          <front>
            <title>WBA OpenRoaming Wireless Federation</title>
            <author fullname="Bruno Tomas" initials="B." surname="Tomas">
              <organization>Wireless Broadband Alliance, Inc.</organization>
            </author>
            <author fullname="Mark Grayson" initials="M." surname="Grayson">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Necati Canpolat" initials="N." surname="Canpolat">
              <organization>Intel Corporation</organization>
            </author>
            <author fullname="Elizabeth A Cockrell" initials="B." surname="Cockrell">
              <organization>Independent</organization>
            </author>
            <author fullname="Sri Gundavelli" initials="S." surname="Gundavelli">
              <organization>Cisco Systems</organization>
            </author>
            <date day="23" month="January" year="2026"/>
            <abstract>
              <t>   This document describes the Wireless Broadband Alliance's OpenRoaming
   system.  The OpenRoaming architecture enables a seamless onboarding
   experience for devices connecting to access networks that are part of
   the federation of access networks and identity providers.  The
   primary objective of this document is to describe the protocols that
   form the foundation for this architecture, enabling providers to
   correctly configure their equipment to support interoperable
   OpenRoaming signalling exchanges.  In addition, the topic of
   OpenRoaming has been raised in different IETF working groups, and
   therefore a secondary objective is to assist those discussions by
   describing the federation organization and framework.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tomas-openroaming-07"/>
        </reference>
        <reference anchor="BLAST" target="https://www.blastradius.fail/pdf/radius.pdf">
          <front>
            <title>RADIUS/UDP Considered Harmful</title>
            <author initials="" surname="Goldberg, S , et al" fullname="Golberg, Sharon, et. al">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="DATTACK" target="https://www.ietf.org/ietf-ftp/ietf-mail-archive/radius/1998-11.mail">
          <front>
            <title>CHAP and Shared Secret</title>
            <author initials="A." surname="DeKok" fullname="Alan DeKok">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MD5-1996" target="https://www.ietf.org/ietf-ftp/ietf-mail-archive/radius/1998-02">
          <front>
            <title>MD5 Key recovery attack</title>
            <author initials="I. R. W." surname="group" fullname="IETF RADIUS Working group">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MAY-1995" target="http://ftp.cerias.purdue.edu/pub/doc/network/radius/archive/ietf-radius.9506">
          <front>
            <title>Proxy-State radius extension to support stateless proxies</title>
            <author initials="M." surname="O'Dell" fullname="Mike O'Dell">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="EDUROAM" target="https://eduroam.org">
          <front>
            <title>eduroam</title>
            <author initials="" surname="eduroam" fullname="eduroam">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="EXPLOIT" target="https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-158a">
          <front>
            <title>People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices</title>
            <author initials="A. C. D." surname="Agency" fullname="America's Cyber Defense Agency">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="BRIGGS" target="https://www.fcc.gov/ecfs/document/10427582404839/1">
          <front>
            <title>Comments on the FCC’s Public Notice DA 24-308 on SS7 and Diameter Vulnerabilities</title>
            <author initials="K." surname="Briggs" fullname="Kevin Briggs">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="HASHCLASH" target="https://github.com/cr-marcstevens/hashclash">
          <front>
            <title>Project HashClash - MD5 &amp; SHA-1 cryptanalytic toolbox</title>
            <author initials="M." surname="Stevens" fullname="Marc Stevens">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="OPENROAMING" target="https://wballiance.com/openroaming/">
          <front>
            <title>OpenRoaming: One global Wi-Fi network</title>
            <author initials="W. B." surname="Alliance" fullname="Wireless Broadband Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WIFILOC" target="https://www.wi-fi.org/discover-wi-fi/wi-fi-location">
          <front>
            <title>Accurate indoor location with Wi-Fi connectivity</title>
            <author initials="W.-F." surname="Alliance" fullname="Wi-Fi Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SPOOFING" target="https://networkradius.com/articles/2021/08/04/wifi-spoofing.html">
          <front>
            <title>Wi-Fi Spoofing for Fun and Profit</title>
            <author initials="A." surname="Cudbard-Bell" fullname="Arran Cudbard-Bell">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ASLEAP" target="https://github.com/joswr1ght/asleap">
          <front>
            <title>asleap - recovers weak LEAP and PPTP passwords</title>
            <author initials="J." surname="Wright" fullname="Joshua Wright">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WBA" target="https://wballiance.com/radius-accounting-assurance/">
          <front>
            <title>RADIUS Accounting Assurance</title>
            <author initials="W. B." surname="Alliance" fullname="Wireless Broadband Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WBA-ACCT" target="https://youtu.be/wwmYSItcQt0?t=3953">
          <front>
            <title>RADIUS Accounting Assurance at IETF 118</title>
            <author initials="W. B." surname="Alliance" fullname="Wireless Broadband Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PWNED" target="https://haveibeenpwned.com/">
          <front>
            <title>Have I been Pwned</title>
            <author initials="T." surname="Hunt" fullname="Troy Hunt">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ISSUES" target="https://github.com/radext-wg/issues-and-fixes-2/wiki">
          <front>
            <title>Issues and Fixes 2</title>
            <author initials="" surname="RADEXT" fullname="IETF RADEXT Working Group">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC5080">
          <front>
            <title>Common Remote Authentication Dial In User Service (RADIUS) Implementation Issues and Suggested Fixes</title>
            <author fullname="D. Nelson" initials="D." surname="Nelson"/>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="December" year="2007"/>
            <abstract>
              <t>This document describes common issues seen in Remote Authentication Dial In User Service (RADIUS) implementations and suggests some fixes. Where applicable, ambiguities and errors in previous RADIUS specifications are clarified. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5080"/>
          <seriesInfo name="DOI" value="10.17487/RFC5080"/>
        </reference>
        <reference anchor="RFC7593">
          <front>
            <title>The eduroam Architecture for Network Roaming</title>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="T. Wolniewicz" initials="T." surname="Wolniewicz"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia. The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access. The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document. In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7593"/>
          <seriesInfo name="DOI" value="10.17487/RFC7593"/>
        </reference>
        <reference anchor="RFC7525">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="R. Holz" initials="R." surname="Holz"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP. Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation. This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7525"/>
          <seriesInfo name="DOI" value="10.17487/RFC7525"/>
        </reference>
        <reference anchor="RFC7585">
          <front>
            <title>Dynamic Peer Discovery for RADIUS/TLS and RADIUS/DTLS Based on the Network Access Identifier (NAI)</title>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="M. McCauley" initials="M." surname="McCauley"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document specifies a means to find authoritative RADIUS servers for a given realm. It is used in conjunction with either RADIUS over Transport Layer Security (RADIUS/TLS) or RADIUS over Datagram Transport Layer Security (RADIUS/DTLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7585"/>
          <seriesInfo name="DOI" value="10.17487/RFC7585"/>
        </reference>
        <reference anchor="RFC2869">
          <front>
            <title>RADIUS Extensions</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="W. Willats" initials="W." surname="Willats"/>
            <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes additional attributes for carrying authentication, authorization and accounting information between a Network Access Server (NAS) and a shared Accounting Server using the Remote Authentication Dial In User Service (RADIUS) protocol described in RFC 2865 and RFC 2866. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2869"/>
          <seriesInfo name="DOI" value="10.17487/RFC2869"/>
        </reference>
        <reference anchor="RFC6280">
          <front>
            <title>An Architecture for Location and Location Privacy in Internet Applications</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>Location-based services (such as navigation applications, emergency services, and management of equipment in the field) need geographic location information about Internet hosts, their users, and other related entities. These applications need to securely gather and transfer location information for location services, and at the same time protect the privacy of the individuals involved. This document describes an architecture for privacy-preserving location-based services in the Internet, focusing on authorization, security, and privacy requirements for the data formats and protocols used by these services. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="160"/>
          <seriesInfo name="RFC" value="6280"/>
          <seriesInfo name="DOI" value="10.17487/RFC6280"/>
        </reference>
        <reference anchor="RFC6733">
          <front>
            <title>Diameter Base Protocol</title>
            <author fullname="V. Fajardo" initials="V." role="editor" surname="Fajardo"/>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="J. Loughney" initials="J." surname="Loughney"/>
            <author fullname="G. Zorn" initials="G." role="editor" surname="Zorn"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The Diameter base protocol is intended to provide an Authentication, Authorization, and Accounting (AAA) framework for applications such as network access or IP mobility in both local and roaming situations. This document specifies the message format, transport, error reporting, accounting, and security services used by all Diameter applications. The Diameter base protocol as defined in this document obsoletes RFC 3588 and RFC 5719, and it must be supported by all new Diameter implementations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6733"/>
          <seriesInfo name="DOI" value="10.17487/RFC6733"/>
        </reference>
        <reference anchor="RFC6677">
          <front>
            <title>Channel-Binding Support for Extensible Authentication Protocol (EAP) Methods</title>
            <author fullname="S. Hartman" initials="S." role="editor" surname="Hartman"/>
            <author fullname="T. Clancy" initials="T." surname="Clancy"/>
            <author fullname="K. Hoeper" initials="K." surname="Hoeper"/>
            <date month="July" year="2012"/>
            <abstract>
              <t>This document defines how to implement channel bindings for Extensible Authentication Protocol (EAP) methods to address the "lying Network Access Service (NAS)" problem as well as the "lying provider" problem. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6677"/>
          <seriesInfo name="DOI" value="10.17487/RFC6677"/>
        </reference>
        <reference anchor="RFC7930">
          <front>
            <title>Larger Packets for RADIUS over TCP</title>
            <author fullname="S. Hartman" initials="S." surname="Hartman"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The RADIUS-over-TLS experiment described in RFC 6614 has opened RADIUS to new use cases where the 4096-octet maximum size limit of a RADIUS packet proves problematic. This specification extends the RADIUS-over-TCP experiment (RFC 6613) to permit larger RADIUS packets. This specification compliments other ongoing work to permit fragmentation of RADIUS authorization information. This document registers a new RADIUS code, an action that required IESG approval.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7930"/>
          <seriesInfo name="DOI" value="10.17487/RFC7930"/>
        </reference>
        <reference anchor="RFC8907">
          <front>
            <title>The Terminal Access Controller Access-Control System Plus (TACACS+) Protocol</title>
            <author fullname="T. Dahm" initials="T." surname="Dahm"/>
            <author fullname="A. Ota" initials="A." surname="Ota"/>
            <author fullname="D.C. Medway Gash" initials="D.C." surname="Medway Gash"/>
            <author fullname="D. Carrel" initials="D." surname="Carrel"/>
            <author fullname="L. Grant" initials="L." surname="Grant"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This document describes the Terminal Access Controller Access-Control System Plus (TACACS+) protocol, which is widely deployed today to provide Device Administration for routers, network access servers, and other networked computing devices via one or more centralized servers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8907"/>
          <seriesInfo name="DOI" value="10.17487/RFC8907"/>
        </reference>
        <reference anchor="RFC4120">
          <front>
            <title>The Kerberos Network Authentication Service (V5)</title>
            <author fullname="C. Neuman" initials="C." surname="Neuman"/>
            <author fullname="T. Yu" initials="T." surname="Yu"/>
            <author fullname="S. Hartman" initials="S." surname="Hartman"/>
            <author fullname="K. Raeburn" initials="K." surname="Raeburn"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document provides an overview and specification of Version 5 of the Kerberos protocol, and it obsoletes RFC 1510 to clarify aspects of the protocol and its intended use that require more detailed or clearer explanation than was provided in RFC 1510. This document is intended to provide a detailed description of the protocol, suitable for implementation, together with descriptions of the appropriate use of protocol messages and fields within those messages. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4120"/>
          <seriesInfo name="DOI" value="10.17487/RFC4120"/>
        </reference>
        <reference anchor="RFC1994">
          <front>
            <title>PPP Challenge Handshake Authentication Protocol (CHAP)</title>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="August" year="1996"/>
            <abstract>
              <t>This document defines a method for Authentication using PPP, which uses a random Challenge, with a cryptographically hashed Response which depends upon the Challenge and a secret key. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1994"/>
          <seriesInfo name="DOI" value="10.17487/RFC1994"/>
        </reference>
        <reference anchor="RFC5931">
          <front>
            <title>Extensible Authentication Protocol (EAP) Authentication Using Only a Password</title>
            <author fullname="D. Harkins" initials="D." surname="Harkins"/>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>This memo describes an Extensible Authentication Protocol (EAP) method, EAP-pwd, which uses a shared password for authentication. The password may be a low-entropy one and may be drawn from some set of possible passwords, like a dictionary, which is available to an attacker. The underlying key exchange is resistant to active attack, passive attack, and dictionary attack. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5931"/>
          <seriesInfo name="DOI" value="10.17487/RFC5931"/>
        </reference>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC3539">
          <front>
            <title>Authentication, Authorization and Accounting (AAA) Transport Profile</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Wood" initials="J." surname="Wood"/>
            <date month="June" year="2003"/>
            <abstract>
              <t>This document discusses transport issues that arise within protocols for Authentication, Authorization and Accounting (AAA). It also provides recommendations on the use of transport by AAA protocols. This includes usage of standards-track RFCs as well as experimental proposals. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3539"/>
          <seriesInfo name="DOI" value="10.17487/RFC3539"/>
        </reference>
        <reference anchor="RFC2975">
          <front>
            <title>Introduction to Accounting Management</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="D. Harrington" initials="D." surname="Harrington"/>
            <date month="October" year="2000"/>
            <abstract>
              <t>This document describes and discusses the issues involved in the design of the modern accounting systems. The field of Accounting Management is concerned with the collection the collection of resource consumption data for the purposes of capacity and trend analysis, cost allocation, auditing, and billing. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2975"/>
          <seriesInfo name="DOI" value="10.17487/RFC2975"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIADJDt2kAA8y963IjyZEm+p9PkUatHZFqgFVk3WttZhZdrO6q7bpwm2y1
5szOHEsACSJVQCYmM0EW1FZreo01m305Pcnxe3hEJlhsjWS22h2pSAKRkREe
Hn75/PPxeHzQld2qeJlNsh+Lm7K4zepF9uPk/O1Pl9llMds2ZbfL8mqeXTTl
TT7bHeTTaVPc3P/z83pW5Wt4wLzJF914XnyqP42bfF587sYNjYA/ldt2/PD0
4KDt4Lv/X76qK/hG12yLg3LT0L/a7uzhwxcPzw7ypshfZm+rrmiqoju4vX6J
z3/9h6vs57r5VFbX2fdNvd0cfLoNnxqf48MPZnn3MiurRX3Qbqfrsm3Lurra
beBRb19ffXdwsClfZvCf32SzvMq2bZHlTZPvsqNykeWrVbYr2uOsbrJl3i6z
ZdEUB1nW1bOX+Af4Z1s3XVMs2pc0xLxY5NtV18In9O+7Nf8ZfzzIt92ybl4e
HIxhRvDLyUl2XvxQf4IP8npNVjAJ/VXdXOPbfPq2KefXRfah6G7hZXHUYp2X
q5cwv7w6ocX9b2X1aUofOynrg4OqbtZ5V94UL+HD3766OH0M6/Xdq+enzx7D
L+BfZ8+fPnnJ/3z6+OwU//l2fH5SFt3C9ok2aN6t2vG0bIc+MS82TQHLC8sv
n4Y3w5V2D4cHnD7iB+BjHz96pP989uTFS5vM0/DP5/LPR0+e6QeenD7TDzx5
8vyhTvz0iY779OxUv/b06emj8M/H+s8Xz/S3zx49fahv09XrvB3Xm6Jq6nwN
70Hr9W5yeYX/gP/IOTlkYX/w0/lF9qqu2nIOgjDP3uTNerFdHfJndXMz/g9t
8Pf1aj4tmutRdnkyyoruBPZMP8A7Dp+QDyzzpq7iD/FS2pBXf7gCOVt23aZ9
+eDB7e3tyXSVtx2v/ckCZOLBZr54ID/DP+GL55Orq8mrH5L3efVmckEnFp8K
bwKnuCm64RcZkMz7TA0l5QRE+AGJzKLb8D9Qcsd5M1uCgMhMH5y+ePF8fHp6
gn+DAd+fPxnDr54mc4ZfZz8Uuwxkrr4pGtA4XZfPPt01aTzhqqhUUVyTovj7
vANoKpj+5J9x+k+S6V809efd+LLLuyLj72RwiIoK9RHqi3a72YAyyVr8xKpo
22wD3yiL9q4XfF9+KrKPvz0vVl+TGHgjmP/JrGjKHGRj28y3xUkx3z7YbKcP
QF8/qFi96Pvo6+mBR4l68eThUxj59flPP36cvE/eD8bCQ3TXbOUj91h8+SSu
PT7wDxfvPr5Nz+RFUW9WxV/+/L9buJXgLVblDO+lV8uyyjNa5/HlBg5rjQL+
agenLJvMurpps9efN6u67FSjwrVV3+CRbulInMMFNbt72SdrWMZZ/ttWxj0v
FrCRRTa5Liq4/u4nXLOyzU+u6xtY+dt2XNwUVdc+mOF4rdyp43x+U8L8QQge
5PnZ2fj0yfMcNdSPb7///jI90vV6jUNkKE7LIvvu1StamwtemQ91B28F6iA7
ezx+9PA5fuzy8hm/cQlvBZdm9vvtqiqafFquyu4rkvcDrFKVwdV0fd3uf2H/
vovZjF63mC1alLgtTvfB6cPHcBU8P3v88PHzRy8enMLX30wu37wCJfymf4L+
WMw6ULvt8tUK7+Mx6ors/8ku30zGp9ms2W3AlMhXO3hVOFKgWevPd54eEHKQ
FFz6e7zDddktt9OTWb1+MGtABzSzlr/6AG2DGU4Ivvfx4vUHPB1vP3yfTP8j
XDM/yjWTfayK7HpVT/NV9nM5/q7M5PjdNd2fy4YVw7dwNuZT3LnJalXm1ay4
j8jBs/jD9Aru0nsAX/j57Xdv3318lUx5MgNBRIVVVvMajKBVjdc9SM4trIVM
fFZXFexKeQMCe9fsD/njOuPD+wnNbTlelKSC52VLen9Mv3pA/z3WCcH3Ly8+
fvyuv+r8VFAE9QK1Pzwv+25bibUKv7vz0jucgC1YZa+2sNrNfPwtqNl7zFu2
UpQmLnbegETC1j04e3h2+uDh8wcPH8MLwPxbmdfJslujBp9cvns9uUheIW9X
Rb4BYZebr81ui/xThp/k97i4usg2edvCU+d3Htr/XrfLbZ79DKd22f0qif9j
3d42p/CtBzwbFJlvJ4NWEmjZWb2t0CzMJm0LAhS2e59k7BXs+4hJLNjiWOQ2
iXGuk3jAsx5PXr0aNvAGpw52BhsSp6fP/46vsau33fZkWoDYr//58m03+x/d
w3/q/uHRiyeP4PMXP394fZ7M+U1+U2Rvs2lRVNnFbVXM75zdVVPvsjfwcveY
yxJGLnHcDQ5Ly4oW8+XlT6/Ta+ctLFPBF+d35Wf419kd5jD7bMM2Wt+Z2zvN
IQEVn+QWbDWa0RhmBBoCZjQ+g7P2qTw4AF29JaeETEA3G/ameIT/pjYffo6G
f5ktmqIQsyjyXk/gA+DLjcdZPkUzfAY/XS3LNtPbDU04tCxgfUBPrsFdWqLB
B9vWmB+tl33G8z4AGQKNO0eTEK9xEUzQVeB11qsTWAJ8gnx/Dbf6DXy8pc/O
lnl1jf+uD+RrNvjtspwtwbUt4GXnqM8Pfvnl6/7cly8n/H7rcj5fFQcHv0Hv
uqnn2xlpXXhbm+FGZpj98os4mF++ZLd5my3KpiWztpqDEi3/BO8GlgNYyM9G
MOt6e73MSjBbmrqG/76usykY9dl6C9Mt8mZVglkCSwEff0TvXoQHgbPekgFA
T0Q3E54In0XJg8UHAw1urrZew1dgyKJrRySm8Il6uti29Gewh7scpgO+RFNO
t7iSLT4a5v1TC5fNhahVePYETCtQnGBdrlY7cPXb8hoOxwh1Bhz68Y/Fv8P2
dfos0NGw2DgN2NBdtq38rOY8E9A1qzmc3wyefVPSsHQhwAod6Sq+GKFzRpfu
sxN8Qfwi/REd5PDHxyePTs6+fDnmidLygXB1fr3meZeDlIFQgGTCO8ONlDfj
DrZ+ZLPGIMgKbxfz42HsfAq6iWIjeGRhGedsIvNb6B3cnvwV0p/KKQ644SiS
bDfe+1uK2lD4Za/I94bqiXx2T5EHTVfBVs9Z8tpyvVmVi128lvpctCfwAwW+
MFzNKNKwBPB/4GnAXq/0XUtchbbY5GRP2RItmno9ODLM4udluSp4PPs8WFso
ry3LNRhxDa09PWdGHsCcN2MEhwq+BlOs6k4G9QpFnweb9pvfZG9ovruBuB6f
cXiiLit8BM8c2Lx883yq6tuK1iEHUQDl3ZXrAtewc6cf5sDHnrSbeLzyJFYG
T9Vv8T77rffZSU3jTyuYLOylhgm+fBnpXq/aWuUFHrdt8dMg0G/eT17hyoGO
BsWFjy6rWVPkIND6WrbcJU8b17Lml1sVGH0DIwBnhy83on+xcoKZ4MI3c1wX
eAToE9gcPjB7FIPafPQceen7vK9EckAF8Io95wMC8o0DtdspqtgO1Ei22DYw
aOOOjk4Jn7VC/QqzLUFgr2lLZ8ti9snmQo9DO5N+quCYZAsQ4B28cCtnEoaa
kfyhhsnpoOOr0kTwS/MCXrCkfUZxgT/l18V4EjQgSgsaDSDBIr64R+Npjvtm
upjPbE8PPjk5fUw300+oozpQrR2oWN4VVFJ7H4nTI12gT9XbdO+SoFjv0+8w
2LyAcw8Thk+A5zkF8cEv0NFsy27LJ3HPW5A2f3lw8I97H4A+Vh5fQxl8AJ5T
gu+LbwvKFV6ODiWMM627pS5Cw1cd/PBhgjqxmqMk4c/x00ZwiGe5rBr8GYa5
zVnXtRwabCk0CB/rbvG443A4tGnbBiUF1hDGmNMNkJOWmq22pLPhAGX5ZoPC
gwdvipsK5wUOTSfChBcQ6bWyQkuSXxsunZkePlJ8KGdfXS0Ma4a1gq0AF2ks
sgDKkFQh2rYwTLqwJnQj2D96/z1iq5+DMdqlXuD48rjPOU+uSSZHh8Q9X58O
Y+gERvh1u3T2bvPQlsIo8kC9gWlJUUCruhpbMiCbbws1K1c12Ccz1IC/5bf4
Lats2yqccVWHu4219qJe4TdBDsGY5qtpVa5LVO7t9hquLfzUCd8Z/PJ4Iq4x
WkvmLV8JsXrilTt7+PCxnZTEtEENjzKXX6Opxh9+xh/+J8wJPHz+MHz67OQM
DSESLlp1uTllfmhZ4+/jF2tpBcFU+7oS8dsExsMN3eL8jiSfb2B94EjstQvp
OuZbnK4newzK9rCoZScnJ+il7PCQe2uRnou26RVYvTd1OectoaUe2dlM3tTG
gVksyuttw86GXwB4L5CvGa1CPrwOeIS8nh5+W5ia/Kb/4jDCV44YhtJxPhXO
toXbuerQ8gaxAUeCtE0qsXUFH6irIlVPZqF9RXLBeA73PL49x5VzvcqCwKFM
dnb7wklB+wLM222bLubXpAmzjHtX7+2C5xpbd6BE8NCANOdztsLoWluji4V2
3IhXDZ8OX0QJ/RYTRbIonDeBd6FMF3pppMZWOQgTLB8pKBpUxFv0esGpCTUA
g52NNzmdzOhA00HGHF2wz+j7dB/aYaUjg8OVtIhoQOLdFS7UW1pjMFRBG+I3
QDJLNHRAOEs7tXNz2ubgoHVgTqBzlncg263eSfRw0gQrFvjUX5gWKJZsrvtX
eHx2GrTLI9EsfRtI7Hw1gUgFl7oHYMpVqDNIhGTQsC5oi6IgUgC7HufXGH/f
6ctxVB8NC56xPB+HjCdRt0X8HZZMOCLVzjwAfW+4+LedyVDfaJOM59W7y7AS
T09NFcufz/3fMbNKyzOBh6KC19npmrgjgiuWz+kGS9467Ax+bVV+Qpmkt8iu
63qOl2Eujrxsq8QVcCz5JlmvPDV+P5JREopyASeP9AhYNJjz2ORgOMDq3sIg
ICs/5nPYa3Jv0HShc5DGLvp+ZJwsH7p9whAtzYzyLviPrskrcAnQSwp7rJJx
Ddd2G9RXLSkq9vvoJzbXahbjfR7exMsPZbHdHl69uiB9sYNJlqCLwCcu8BkV
nUty7OC3zlEadghF2PYefjittC05PGBGRjjoHPSAFncp3Mj7lWcnuhBeHlXs
Xv3qdTa54at1DYvd3dYykxanImMHh4+ka88dTv5Cz1lwYy+bokhG/8geFQzK
QSHwA3N+RXUp4XfmVYMuZG1eRO4q2eVu4ffdG3Ecpvi8WVHQ4Ha54yno2KVK
OR6eXxkmodt3n9oO4sbXIV3LJlBOmO4Yg6QaJJGjTZnPP/nolEayWOXms6Zu
Wd3cYk7X4EDq69mq0IrDMEW8PiLZBYcXQ0CkKvjamOLG8nKg6XW/xdIFb71F
IM/ZYOAYw2n4Jnr8S3SgzGeTLxydH6PGAOPvPiqIAjvuyJtLryuCC69ve3Bw
WeKd2t0d7LktQBWEiI9I+Mi2uskXC0zD9x6F2iEExTDQSY+ds9/29gJ+pOu7
aGdg+zklkkY5z8RpRot3Pm8K2Wub8U2cwnZXGfiCI/hiag6rkmk3xYwuB3rQ
5ZuPP707N1AGTRC+fEQgpoenx1lOsS6e/Q+v9Q8vjmldPoEyhR0HdSRqi1/w
9eVFGOPpMX+bXLQtLCtdBCjW+nA0evn5GjDWacBAGh6wr4O9jhcpaUQbibym
oBAxZv+P9lLhMeS+kj9DAdsMrpexuG/kJJD/meP1jCsYDzhyihAf1xRwmHZ0
+/Cm4evDCtnTDuhpA8vERqbIuoiEuJtBleCicGyZosAY98GnsjjRT0EBuKNv
Xhmc9aIpybkBx/dW3UE8VxRGI/EgRV3BHNAUKNG6rtDO3YW/R3FfkaScdNVm
Ve/I/LKQIr+KmaoStAXpaXdgnax1P0Y2CYx+bDZ6DY7hophhWG7a5M3O1Fi5
WID+gvcYYR5hs9KzpJoPvtag6ZPPOdqFi4oPwJm/ubq6ACWDtlhTiDUmgc96
0cE5h8umlLd0Mwm5kbAfuF1kxvCCwZuiERWMR2c59gxHZzVyuoS8FrJDWQOY
o70uCvbL7jKRY+MaXc8wDdNgZRWtDk6f3pLCo2qbeP0LXxA0Eowu0CeYL1sV
z568eKQm8RqvEna3VniNZA7wAR93wBDL4gxiEP3Uz3XuLc6dkssEUQ0yLsAn
FXUx6zux5fCr6+2qKzcY2o7lFfbJToW7JlAV0ndxmTBz1aL2Ea9ZsnViI7Z6
p+PbHMJqLuvZYQi0k8Qk1/3VnS4pnsg2++MWTBn4F6wh7MW/b8kIIpmnpyLE
Cmap6aGiy8uVmZEDg2IGKPJMaaP4eyAToGAo9vYv/3r0GwenPO7dn29gLYfQ
zpibBXNl3R4cvMZVKhcgzBm4GrXY4/05jVA90nf4zOIarou8Er8IXn463WEY
nj8OZ+B2WVNujnxMNym9cfFv02bbFWNY8FnBJikZ7huQlBLNKfV3fViX1q1A
NAg6iGiIILykrMjhoiTimt8CVVIF89o26N+prLfw86xYbFdhokfFyfUJ3kui
u9DrPqbphSnRwGLvJdOh5aAozrqeo0mL+rqal+zKZ7ABBe3UDOaKqZJj3kGX
f4ryHna7d/WmRM10jji3NUeg+kHuW5R7yiLB0+DYkG2Jmct6XfK1RCuqUBt4
rQbukrn6+XsiyjBtEgzORyUxatTicEZhRut85W7NUWZOM6ZjFpm+MRuEGE1Y
7fBHnQ0d3HJdrvJGg7yDX43eGKb2/nJMaGDJOD9+9EjUk/zh5kyyF6Drvnw5
puMUO9Lw9JYcBzPCSF4uwN6Sl9ixfBa0mKsCr22Q1vpTIUgyfX2VqJYCcShR
rGJkinSSzULkjZeTu27HIMCb49iIGPYJh7KiulQsx/vW6urraQFO9CKEo6EA
R5zs5JuCJmCzIINJTG8FGBAGmrNhYoe5gFbIDOede7Bl20GF8TkI0kTnw1AQ
ezLD91uD9/AU/FONARV7UjpJ0QN8H5+dPkfJ4TAjXy74aNAbIAfeimcIDMuE
LVgb58fDxSY4Af3WtkqgM6mzTNmvaNcWZbHCoM/7uu08BMQcMZb2AbxE0FM5
ZUe/hh+hfb/aVlWxCr+jSCvMp2woME5GzLKcww0nssY/+MHVk7bbVqEsuMnr
Am7oeSuKBkRIYy/0IFxyDmdtKWogy8+Ke86Gg30QhamozOBG4xrmxJDrNkA+
6Fwf4bvBhhzz8LmARgkkw9pW/ZcNfd9FmBE09clS9ebeE1JFll0t+yHDPjvC
sy9ycKyHnwAbOkFvf9AcSrhN4JxsMUicLwr8bVNw8JsnWRXXlC7j0VqTSvwY
7fgmb1DtreFsX5O83WqwneatlwKKSBCkbatbjc6z7hS5ERLcme9DwXwHHyo+
56g5R5xcjj0wG40kD1OeYDWO+B/0r6KbnbArRQ8kwfyQIy5KThA+D/9C17pG
EiUuSSohXHkYfHAhCRgfb+XaDSaqHjMC5F01ZDQiBEOPOow8hxv1T+I/ShAc
TQy8eikto0GfKNBDbqi56KSBNgSt3eKlB07adgEWDEy+GVnkF889fnBblf++
LWRYb/p2tMe6hLjJFGxekbvHxi/q9/j3+Q0Yjxik0ru9XCQDkT9Dnu52Ck8u
u3rbCkhhp6lg0c9kVIh+8u9rcVO28fEI6GM5wuKDO40L54a9o4u0kqQXiSls
mFwsCB/2r83vmjq1dFajyA17iO2ncrPBnEXRyJ4U2U2+KueyqaAr53JPmIXi
TCmwNhSwzaC1t+JlY04ariiEMMgi4krR/PPbvJFbj1U75fb8BNCBNXgBronA
6VTG0MbubISQu8MYOsq/gSe6mnTXTD4ME8OzzJCdW7zzWEGXjTsZNFmKD2AO
DQy0uVySAunj+crVAd5rB9vIxjn7sukEuvxTQambfKbyDruwgdubXZNLfhSr
To4x1JL14Ku9qPDkRQZR3j/del1FI2hkQO21SFOYmtLcQBz9I5GDe0n2Bx0M
Dk3hgoi74rKv8FoYUKTcG2mKXIoJQIRuCvbsQKmuSrwOSJnjsJpgKQmEGJ6G
WqTDICUfyKYg0eY7mmUK8YyIoKBjTSIX/x6nj+eRMliR+tHLmUF7dGjlsa2q
AYnAYCaO3s9h8aJNoc0EoTvEfaGVP1TADvqnN0XGGy6zoAvI4F4MaazM8An6
k64n0L2iaGF1UV3nGi9HqNIGTmA+W4IIRdcKT9B8RdrZKnh1FMMnmBufPHau
ZDcFBkomL7ka9CEUI/0gBvpgRBYxhEBSuVGrsSxx1BkOS0oCVUTOMVGSF7IF
asugaM0JRx81UoMKzT2RDWW5mTludN3kG1gsU3sa75T0Hxu5IOVHGt05exJi
z09PwDM6ltT6FK5sMpERbKAPNQscgTM9/CzvpXy2FVtlQda+LIAtP6ICsslk
ohHCspU8OD4Nr7xd+AisBUqgyWhQsoSAarYwWbRSwb8qZyXcQjxAsvalIOPI
ApCk65RxYFKleGNKJOQXP+906SiRu8QkCutyzs0qBo7iR80u/uaSoECwyTel
6cCy6mrFRiPQfEWbztA+0x1dfL8RMqFebTuDCJO/z05l+Sf2A6rtesrKSKoq
4VE39eoG7wbVgFNVpue7Kl/Dky4KrO2TuqPdiBMUFpxUGXn+hJItydkMplTA
9tOmOZ+Q8ZUSDO+r5hOJlrFXFuOANaDVirYJD+DAFl8RmHNUpHX0/RSpPS2u
Kf/FOYV2u17njAYe8sjCicN4Hf6vRewEmiTqBF6R9YEzVDzgVgK+kn6j7Bvn
yRgY1buqUIUW6LrkjYT9NRoA3807xWFYSJjue1oUzbHxU68Zgx7hpVHh4hvA
IxtK2NPJa9WaXZfXjfqWLCRs+epoAUMUGfXmRDs3tPgM1pQDKwRh9kub96JY
PbNfXeJ22OXg2TEUc17wFg55GBSwxVSphYUnag1Y1DzETxETVJItq1Evcl0/
d0EzjDD+KSaufBEFgk4EHhJMwmCSVy9BFpa88rlfO9DBf4tWTA0N9gen29Un
XSTdwGKB4GA2bRcg56QPyf4dJWcJ1d1t2erHWvkYrx9CGsQIdFY6n4omJy3L
B9/w1Wk9DDk1mEUhnAYvrDvjwY4xN9KlXNRswPDDEn1UUWESC5HtHA19TTOh
nEkPp2iNCo2Rfyr6jVwDLamN32STTKqJqUrYJ0bbg4OhsoQOa5QlWhCVepjp
I+e2RLlZb4pmYQBg0phktkT2jIBrQ6yAz4asN4cr+JNkeCOzB/xNIK5UJklh
7ZogBeQ6kmGKOaN8ToFnBe/GfoUoccIahdR8KCaBuS/zDe+Kvr+Af+McMmuo
KSH04C1KhOuEYUzoKBJWN1ON+0RmmT4gRJUiNAu9+S1IQCexGkSAq/tTNE3N
wXyto7LRrBBKPfIlM1n0ZrpUfGEruTNTpBoc6X8TNaaAnCmqgvsNX+LJ1VWs
gwi/AbYgJUXZCJBkExvwO/O84ZbAqTLqlVdrYNHtIqYwbFNcN0XHGmVawBos
KEyN0QqWAkWi+TiCviIOcSgJ6EO2oZL9FWdPEfQcpgxfTneWrlydhvcj1Y+x
RQyuvzm/uG/w0JBsiPEKsOgELodPtAxuA9VaKmDlcINhOJASeBEYPXorttSi
NaRCS4QYYlgU1U7JS8i3LWeTb612Tc5NWzgZoHhCJcYSeVr+2IRFOTj4didh
MTIQOXrs5V5OPS7+GjWwM+T0nUaWWye5flA3TkRsTpH7lEsOCuUT7xe6vYaO
qb2E36ihD1ZFSfa9zQretEm2vx5YI86WcqxMDO4BLRKwSqIqST3BA0C9wCJ+
3HZ4gxt+rl1ivCHS24owI5AaXkhyOOXdpd4pKDzSXT1tAKf6usEAZt1c55UG
hMgvIxRbUMpxyJl8IfysKqs5DMI70noEVND2i3pbqfje5Kstn+FdVGzH8JY5
Gvq4hh3vMvJ3aPBXquuiZ1wXeC3iZDjJRyoSw4UBNMRxYrzIYCD7rZbAiGnI
5gfq5VE8K7lZis9FM0MND9pB4nnwZcL6oi1TFbfDC8yRQbOyIvXLIcI5mNuE
BLlEIY4lSnw3NL1JKWmieSQepMS9kru1qkNGuhyQBrsHrABE4quGAvzx9auP
79+//nD++jwbLLDo75UMpkADtv6K/q3rAemalSDeltwkhF0Ff3PU0Z7rJeLF
j28PwU+kCvCt31CBLn34eCVQ7WxRSJqLZxggs6YvbFv+K1/d9g2cCum6sFPo
v9BlgAXWV5QxqVf19e7g4HdiTRLiDW3LYo326CR2BM7B5RqD042B/ewSXb5Z
SJj13VYrzx7ZD08VxEK/QL4tTAKvEeJGYQs0DH/n3Dicj8daa/Y7O8+7HDyl
tRWsh6ejiUxZld+5UPXQQFdmqr6SIMBFVFuOFF9fvvhx3l3ePc67fEcrI4bH
Jh3ucTTc+Z7x7N2+PrCHNuHIMuK9ZgXS972pKNIZt2iuLDgMJ4D7yPwmhytv
5FONhN0d+kluRfd+tA0fJjQrpUFiMDEJEMWp1QbJdSU4CItH3kGztHKPYzRB
eA2OpbJ2G5L37CcJaDlKyY7g1y2yNhXp7wmSsK+S9JAQCdX1IRthVj4j1XBh
UqXVIWEZCbouDECo4W2qJEqI32v5TmOXnyN4yXBllQ6m2ZLgCYoaMvwTOSC4
ssgxohBEhHwPTSPN0fhgDJ5F0homRW97ARsfmtJbP1hR/QDPibf+4ExTzLBs
e1Amj7Td+QyLGNXtdkp0Tejlo8UdBcQ1sqyMAyBxWKOJQCiCF4/hBlyUn0Ph
TxuuNI3Zi+ocIFbopGYMQzMV51CIjURSjohiQFDcGNOFWOEbq9Oj999NjtMA
0HSHmR59QOmzVd7rlzTErWIc6EKKfUykmax0PpT7ZmGQ8mthD8IwTOXC/7wD
8HV7EOLvaI98qPkIpZUsCM1LHWeHGqhB/MKhYhemNxwMVhCFS5pjpr+fcmT6
CDbH2+ih6psKO4RL9eKPBhbgRLRVo/holoTJQr0srHyxusGv65W+p76Dc7QS
c4sLMigzlItkGaQOkXSSt2mTgBLtNcYmEDrt0XQSHQkBTZoUGGWI11ztJE32
OQGzeV9UkowwAEr1UJjIeeMh0mSRXY1zg9B0Y9RANE7Z3r9eQ0+o+EpRJcLw
2qZUKsPFJiNBfbPWbiWuvZYJIyKP52sRvX2TTgsYdMK3DfqNEQaI/f40XH5w
8LMCoKdwgS7KjsOtCvge3bdYA+5QO47qV4VQ2y3FvxiGRI608oohcQ3mQjgH
o56DL3LpkvIWdhZDyUlUCjIkJEnEoe8U96obGnHV/qQuUYnqqyP8OAY8SD9v
N9e4HpS6kakMDJS4aTnFlhvMDhNyDF+PEpCS2bC3iibA9ym5oJbfjGeIKUv4
Zo31cjsM48IlYrm84UHBsFhbRSAbrOpcDKytWSwSLIRdmBVwUzCVzYreph2F
6BNPAT5A4IfFqs61MIeAWy1xLmLRPpr1mKErVm2hxocFhCj8NS8Y69M6eRJn
U35P46EoFx4ZF2V4evhlTvZcJfezJ3MUGpe917ejaklKcKRGWF+nlWQoFybm
rJB8wgiTOErs0otBh4QjGhkp4nqkaGwdXOC8lB+qJJVKCoZSTUvVy+QMih7i
CrdCwVkiHM75uZcCUGCOsfPopGPzjc1tTgqFampO5sWERz5ypskcHpI3xuV6
GNaKluFaSzPYZ6e8UcapMky4gNU7gdv88Fv8r8tDCh2rOopCkQOGOCqPw28O
GedCKQ48y6DkKzWQcFaxiJBR1WD40pTjwh64oQiuVYxRidZb+ucR2FL/8A/0
r281e06/zr7JLsOf6CdJS/oKAgx85lqisohACfBJNvAo/USLQZlj+AxpOf71
t4cWRpBSMUS+SVXb0lXK27jeCoCNxFAC1cLjjWvSe5WInw9ah6EMZotGrUyI
tspiifwG73U99s0ncD6AhsI4dVe4dXuJGj16PwyZFeypaVKOfa4h54pxsEFI
onJ3whToMxlQgiembCl4sYwPue0cCcCep/GOC2T4G7GWjvkgRC8dInVisPEt
VMzLGZnRZpCQn8EDBsg5ZXFshGK9oav4dQ6iQEC1+OsHBJ9HRjfLgkelAduK
yx7lctN54r1EidUtXqeEUUJxGPV3UCJHYdoTMgXuEk7FPkcTjWSPIxOVYsgH
Pq6QJHi96Lkj8WnvkgrVfvHzeaMEkEWOjkyBLlFnx48SWY3f2zaeTy3cnUyy
Jui+PXMi7eDZg3rzkHvfrz+VuVpJ0kvO2HcKtWPOnpGv6DSQbXAZVTUNaAO6
CmqMKpBRNi2WpXAv7b1v+YInxcumEL92wOOY4oDLr24Vny8YcblB9pebvOXg
rJdCMx3Zj22lqB+91THZuGlVJ2OCEV3QhWVGfI7YsAxSYAYaM/9PovSwPNl5
HOz+muxiagrjzHm3PJSMQ6bGAqUFSVK4uG6O4mE+B93xRU51PLAcYZRSSxgP
8SNSaq948UMfs6e/f6bAzawwhIwWjWE3CiqpCQcbLTQG7lgBOK1iXCg+QK/A
9tl3YK/BUk26DnUR2TFv1xTR7nPuva201o0rMjDUEAWFkuBL5yI8wRng8IYB
BDGYShJiFRIg8DV5LzA18qWI8MlPyeA64LZn6/yPqBY4aFIapwcZ03PzJZMa
/wiKHeA9zvtUhj68WgY9UTU+pVZlliQvAm/BPwnLGnPk4SOQtQ7poh6qA93R
LaZbScuGs6V6N5vcfvq4TtEflDDc6/AlzHRJ0bGaMx7uoBkKpKydM6AKM22a
orQcm/JvfGUOmVxnaZUWmSFYnSXlvr1lkhIKHT7hLb2LDE/QMEbSdQc5l6fz
Ikg1Z4C4ZnLOtEdgFs1ReInqyPE3DdEhCSWYM54G6kDTnBcMKnjLcD4pQyPq
1ZIO3LPhPRgO4EaEsJydJz5BMwmZ3Kn39dRsGvD4qCgXlddUqHGaG+ZpIywc
CMiu3sJFgG4RVn+jIRP9ifUwX9Ps9IIFzMqPbRVY2QtwJ4vVb5GyBByrfIEY
3f9eLyv5Q/BSdT4ugJtHl6s8LaK0Q6FFSogxo4t9/leYvhBmScYWlYYhnSWm
LTXZtlLaRt8cIyqlw1uAoPSkUmgM4sTUXGwuYFKSp+yQ2CqX9eYwwMTfdlpk
WdVsFntyEn5DyuUSrR5PXsrwsODKhSQlA29XM5GT+JmXVWSVCsEiQeY5JUx3
Pdf8sbHU+/bOrlLLYsBtsGBoOj9633ftmy7Vq8SA4GDOPQGb/7LA4fDua64x
z45Il5uyXuXeXXX1d/jANZ8G4Xl1NIiIBQIviEPCWhfIHxCERIc9I4gICPQW
XeBrVreEEwmsZjB3tDeRsk1YlJXKy8ByuVAhwqrs3Qc1d0Xlos0itx1G9VQq
9wTcJHZXzUn9tfoKueVF3FgRqC4tpOEiotYl8smtagsOUlN4KTiXbxd9IEhr
pG9oyGLlDYsu2SNMieeisNEhxMu5wjuIvjd41lrTncEGShWmp4MDffk+zT04
aulXRMhzhafxF63P+6L18ajlCT0co6NHgxFPRomDoqelXCWF81ok50K/jC0V
yb1fceZooIrF3ibOnrDcseskdVe9gqvXvthKMxSDzzgKeN9oQscUOyu5GIB5
WRCzbvlDhK3glyglQx7CVsij+gm+uEqWQa2WTeYE+ItnRmLROtUcfcDR70qM
iyOQiLm04JXhCge+9lS+NoC7RrosJKUKMTvyI4rKm9RxhZvmfe5iwhAUSwJ2
zc09tHJTYv7VqlCFsWppKpFW56sxEZQdbdstLc3pQ6wvYO7LDi/uFcYvEZjC
EGyNzG+Wu5ZowPVhsodccyQ86ppj1AJHzTKya8jzOHFi5VNlgrNWvY43CGM4
nhBCdJAxy1eajaLR9PV0OPybr9yUy4CbqrDjnG3AhbDiePdZgpinr68jkOct
NZ6EAyWz5ed0WM569+sf41ooJThpGfqCB5etBDwf01zcs/6kw6ZgCXhTJJB7
m3M4QhKuM+v26RkzgSoMCAPNBGU/nGD/LAwib8XDeKej4evaD8ohAiNaUfPE
Me4ceu4iusIIqoFGc0D6dXVN5VcUGqfUTLXT8C/ajIy/lZgtNy6I3i+qVXI3
AsGNgyzh/ZOvMPwtqDSbgXgNnCgJqUt51ByjhXT2SosB7KICQSSxQl3ZV8Ea
DainLN4Rz3m+xmYtggVtiUZcj1DOZVQuMX7x9u1x6GQQqMx7lYOYIMb6xPr6
Wg0DLdXpOLZHFrieXYs10qXgbC8pLA/DoKFu+ISy4Vq8z+Uad872wjTMDG7G
Yw0v6p9ThvR2CNzF24V4YnzR34ZyfQWPhrJ8p7FOn1B1JXItEegNFgp7Pmle
BWdxSH8aU12mlPmT6NLnDuHh0kVKSEDjtSVlhh6/emWh1Y7Z2HWYGuV4KCKX
O4QEnOrCLhnSjHG5Ei9sV6OlYJfsdoMpO2HeuK3oB/pIezxU44/qFMYBfUDH
hyiMmdQJE8jcew1OA3Ndqiq1FmqiF54RjUpI7it7OVZkwfaOsrdoalVcKknA
uIxJIwX6z1OhMAB+AvSbM8RhjClVWc0K7B2Jf+m1cmNBWXmlA5dh2bHpVXAH
PDmOwcSjOzXmh0AnHWeBZgWhM5nDQSlvLiewhm5ZUiJ3x7vrcln2RFoUpLcG
g6Vo0KJm59omyO8x1KyOhsN+McWudm1IWCzI0bw0alzaYi74061G+GV2dHrM
ocSwNPD5m1qvJcrYiHsCJ+Ho7Fh06KokDCe6EJsdY3vqsEZRf5SjR8eSD1+A
8wluNj/kp5PLE3gSnbUpg6jbgjpPbCsup5EAvZ/CSRYCrPhOM236J+UBnIDX
JRqFlEJvdVKJUFy41aDGiLArBbJwIWcIhVI9w41Am5R/SPEytdFf0IbXMyrO
kjhBHsrlud0l3fIEiaII1cBg+mLigHhmSqYTOjjwtEHITIYPIf2g5L1Y6WGq
kilq5SrwURu6Zd1dw2VLePTm6poVFNHETKOwrTiwmqp5Ks3k7/E+DZsz2F3k
l1+s7yHVk9o263ExMD0hz/iYVOzd0BuXer8Tu25LdJ7uJWObQYwJi2UE9jFl
59dhxcCkSLlBWXyZcOCQZhCjBM5Xdf1JkTFumrx1r1QKh0nJBCyzRJ/2F+P6
+iKZp5TVKu8l66wWHtQDQb0tfJpxb5fNVhoaTNEbQQt8WeQboRXQ8KfWRHPk
NO6TQWgu4S1X9swILKV+rIOiDuWFmQKodpkyHJySf4Y7liRGnN/kzyhKUti1
Qpq2JryTYSFn+WxZzNNZkMnDUMnr0iedNWlId4M9RgraHC6O4T7LlEYNHWG2
qhM2fYTfc/A/Qi+jvVwvJOaxLFaLQ/bd5oTlo93SJKotU4487nBewRN7+N4y
phiwo4IehA9xIOVWkKepjBHsCT78ILTCWBEjOBxe9p7lFHMM4ZA843x16Ijy
CEpBO/j0cVCcjkiPgpYxJpDIu2KgLH7q+di+ph/1WZ2zf3v83D2hXk/LyrCa
ISZgBra0PqKwMl6sY8J3adSOijJp84lihGziR2fgLe3Y+XU77OTvOejvDnb3
Ab6tmy2xkw68qXQB4XiNXB2VHCZyYyWXxUEdtDhwztsKb/2j7y9+ao8N8nyS
TbJleb0cY8QV/sSYhA0z4SwUrEGhRKMrhElOS9DH1C2hLxkTLReXCKh7zfTd
AiKKDTU5bXBbN3iqKNwYTHk4ES80OGAQdKlvlsOlwPoFVoizgzMXBprA/Ujg
jbiIHMkMtMrZSUvHqZdhukC+a2PmEU/plTwjHhc+++KRF2gntaSDFFSr8oZ7
w+k5Xp27F7asAu9qvuu/8KqorjvrYxfrGBfsahIPN10CKaq1g19U/pXQxxBD
iacsc2uTTT37t6eYRMTGvfSWaKHwF3KQtfHed2tBP4Od1S1blGK/nPLJIxj5
iUKI0emTwCsfzngOj6UNl6AR+hhl0gCGFUKqldUKLLQ/SdDkg2PlFBhnlOAW
+kXJca/qXbbcVnNYdsH1goGeE+/rwvDx82IuuUF2k1uDSyvMCcNnqMmj1NIh
3QkKqD7EEfXt5IOH8PMrWGn63aFjTjR75fAWQ2wzsG1hAEmOTmyW7g6BYdj0
CmcA3mkr+k04a3A+lEuzeRB9kzA1Se+C26L41KdOsYPMvDk7QacKKYs4QkJo
GoIWge2Sop2cHDF3UO4gthgZcEVoXuIcdJED1C5r/FdTSkMztwWcumNTiJt4
dQPJZDowhm3vMbLaCKkxxamp/tks3amCXdJzeCinTD9D1K5MEkB7K4zWRO8y
L8ZgEbTsMqALnsvyEJLK01PScEozIGacoHoJwbcnG8z5TWW8TE76k0d0WZjF
he4lI3Hh8f8FLA5yJGDvluSdopTKcrLVvp9wVXNlSB/kMwIhAMtfQ2dK3gwh
Nso0JPm00hqjBIE2UJOZd1G1pQY+SaaJ/iokCfu750sTNQ+hFmIYtdTq/UU+
C7Kkrd94+0dmk9xBidKfxF5e3BAB3wNF4LJqhvKdBErm3iOsQ6vxcTFOvL8p
o7RuVVwi4QKcw8m76Q1OmkSGVK2KZ56oD/Vwy5qlulCPvpQvkTrIZa/yKRVS
oD+CxfmcQUSwMF3Ag/W19MkAf0cdZVXIOsPUSP2uZ89ZlyLkWaTbhSgROPI6
fIFSjWDLuJ9rsOuwjp/SInqS8Uv2HhhxXFFQkgtF40Mfrjp6UU9sHc9zFCHM
PPJS4P2IHgVBwohhlCW1pp9EwCHJUgIMtBbmS8lwf95zhsglxPWpklNYBj/d
pjGKrBbnheHk5029wZEsyTGwqKiH7y6LNwACwcr1Dh6gGddiyDZYA7KGOCEu
CRwWC5hjCA2K+TvCk8dQCTS7WyLgbjeluLnU0iYiHCbOWlblUmCT1qKHDpuH
cPFv54wb5GhIyB0jDRtf4ATScGlEVRO9FiUW26Aw2NBTkyWV5geHVAJxOCCF
c/3I/hUL54fBQ9u2CHaqImxYwcyFdtCIEyNTXS9+V3Bi8TXF9bGA6MRYObB7
YNkKdLJWoQeOGl1GCUxAUeXkd1ReyKsjXHUGK44K8Hu1IH02pYCDM0WQFjpT
qPleFRxcQpKycmFOgTmre3siERTeGglS1ZPe7bImUiHqkJ2yORs895ffdPyn
WZ1/iatvQ1q+dWXfDtAgudHe4FGvRT8xDom3wog40EFwwiR7vojGALm568TN
aKFVcYMUqTHyhJY98AIEMN8j841brslJA1mDNd5SbiA6NSCdXh4c/C/4z8Hg
lw4OMiIW7FUfkikQDc8gL4L6nD4dc9ACFAsO8C/SKP5fpUR0uyaQ+kqiuoNP
5qOF3x5+m7g+wiLuGCDMpdK1wm9PLOEVsGGyzizq/yJcDP96wutwwLeL42gI
dRlInGYLJgXbSWtel2CTNBzJPFdOBj57mQvNcGCXuLVnMvHQLl6vzhzN0zEO
ooFRChz6iCQ7UHD8inyNAkcb02opvmRFOl7pV3AFZd9kbxUQ0cAP7zga8A1s
avanoql1gG8M5ObSot/gKPGdfMQG7zcOzhUVPR3LgsDwkczQi5hMYWl/IGEa
WrHwFnsXTjf4Kv9EdCbX5PwpF3VoxNj6uDw8YEAjMa4oqAfPBx9LpumXHwvM
ucRT5w5wOBQubSEsngRxzaUz4b7y3/3nnALo1PdMeVp0bb0tjCANdalDVyNx
0JPuXqKn3EsKkW2iL0fZkMJ6dPKU4T/ER9jV0js2VamJOoKNPDk5Iakk/Dk4
pgQMt9oQhYu3+BmvJ0ACXv2Q0X8+TPAfv8mor4U0kA4DP/wmk/88jP7x9AUe
7eQqOPqAZSNPjt339VdaIytEeYZFcm+nQhbOCg7QFNzyl8szopcT0L12mDab
l2aVDIPqpf/0kE+OJ5LTtSRnn8ejQRy4gThN1pR1s95is8CUVXlw3xGm8/lc
GWJGdefzSAqekPbkY5WuLsYljK7aHZkB+XYC8irn8qNE5UjV3aYttvN6LPJ+
evZ8PAX526t4j6zwikqdENJJKcbBA3ic/ThSbYKeAxr40gUulFLtOZzuAHLc
ULDRe7sRUzjPPULydPbFgVPUw+zijO6wblrrpT6o7Oj0YzBKfBNTIxUGN0Qr
JzqQr+RVt48JKRGO/6rbegnf0bsV/603Yku9Q0WPlZWGqamOO2QDmUJdrwJu
P1A5DJ3r14f02OFr9GvwjTBHUEmr43qBg9y9dJxdF6xRLsGDCASNY8gF5Cle
QplIhnJ5tCoWHf7lWKcaXh5HeP/T5RWnEDrET4S4jxWn0dz9itl85FZ0ZYAS
0dJBeZ3kHGdac0etjrEYxapqepdkVCrNWKEdYpqmpcwJmaQ2RlqbLqMXmaPN
ahuTuvhDfRzxOQjbLDyLSy5KKSMLZDdwBX4q6MIJkXYM3OXtbohmPQCgumW/
5K93zUkyWKevEYuolW/gskiiF6YmCRWtfqWulFBKYkke0w1SCwR04beFlcFS
bMrjtylFHmYTN9XxR7pu7vBbiBZbkbjU2V6dsksOWBmLVgu6t8ou6XXfoVv2
NoD+RCVy/KzKV7uWOJcs2JcSIYsj6miA95f0aaDdAcd6fWG094muS8pY0lq3
Pot3RAz8Hr8Icz5Et/NQodHDjTwU346NX3CJL15L3yzGoHehzXMgBA4tLMpK
6U5I2LCtIwmciXyvQUDMnCR+BgoHCbG6gWEkh0ngwh0KAMBfGr6Gkr4mJ9rk
TzGrxKJxpQ206e3wfPGhkzQyFmU0GL7mPJhiOsJDcPJXgs0vA6oom/z+gpkq
O9+UhrDgmlGz1qqF7yEfpHz4YTTPUgOMMAz25nl/ye3Veg1w7nrgFPcSO9lK
wMiatJ1gB18GTKlIEuU0Nf4SyvvQBSbmhtNmq5ZtzyayO0oZRBVHbRw84y9x
4XW029w2VfdbJJy2nKMn2m2hc8Bz9g4dv4sTz1CL42qLda8522yVS3QvFVT6
lveYrnllAiW1hgAZfqaiPQ/qLciduw3cfCZtWidLpMFLDtliHZqjXXV9ZjCV
c0hlatL9JHSYoaSx7q40QdDoenCCcqlBpEHinndor6NlPhVgmgBSnz57BmaO
5U+llidK2AbqBII9TbnTVSlQTrk4wdZrUbfpe1PQz5ecp8+X1I1kRIj8TPu0
SZib4+SIeuSh4VnNXLpUHBxgwt24owauHcdEXIdQP3oGhr41wIXI1nQnO6vR
T8y2OXoqXiCBz/O1gy1hmOvmki/RSwkcBuysa7xBHGe5gnI0qB/dQ72kEh1/
H57HkGqSE/MYCqJkWjF5d9ubAdWa1UyYw+KuZvW+khoU579iRqcP7z0lyYdE
uQZvfEbdHwemQrTFfj54X3Ib6BjqP9yBrx8lOO7Rt9I3k9AwV1SwYo7fiLns
aG/VupB2lIhYH+u9+kU4faj0e2RtE1PQnJ6T1O5LStWQJjKnND5GXG/R5GF3
Yj7moiLXEDTQHWiThUA/diRNR0ioMQF57OpiubesJ/esqcnE7utdDflM0S0n
NZqDrysSCUv4k2CH9n1MuiySLopTwaRRpNTZICda2EtoQZyxrgwqB2lkHuyk
uBura3ualOXLU31MoNcYk4Afyj3sHzaoI7BarBYgM37zNUyTKHQvzBx7g9/7
Fr/3yuuWKxW4IG/a/tRLmrFkRXRKyNAgb8iHitimjCil54FQp9ndKu40izc5
Qp0lq8dUXjgBk/ljPjFhIrnDd4jeh9nEy48TwvJAvZcHu9z2nh3xkkkvGT5F
wh0XNiVgkCf9wOJ+UQhuFDffpG92TYRO65+/kTxUTXOFDeYLCWGUrhRutqzr
lhnV+BjoKHGDAFsGu9J6+hcRkMqFJp9JEoiBSUTqPPWRUZhKUlXMoERpkCtm
XgjtdfAMVxFWZI0go51VoRKzXtXl3LYEdayWXkUsLGK57N8A7w0a9wpVndGv
pJ0IFk1hke5LIgqLhyOLyvYT7XK7onxvMddaFNlI9pefshAgrMhaxiMlw0Ca
fY8g79EKTAGeQJa4piH7xbPlfREIYEzI56gBzesfaj8eKIeMz05rUK1THC04
8undM+WqcY6UncM6gkmtrPSzaplxVvsIegb9UXa/J8KSda2EkUN2M+bXk+Nj
nWpILcliCbjIfxmnQuGrlPaAw+Cmb2w8y4DhpynTqssfGPKvAqTDRWQYV662
sHD1MGadbpLK1S4pk0+4jihaHxE8qeGqpCYaofDftcw63RMviZr8bigVAZ36
DMtSOiCUGHjykaBJe1Ah7pX7Z3KG5nda86wEQXFvXKJZMrJovtAjhq3WxoiK
adD/jcpuOKrr6mg0OGCLpEhNG5BvRgJ+uY4XOE/Pk2AxPJIJVjfZTUGcLwNB
vLLil0FsF87wOm+moAQPsbGg0EQeB/WM2q0QTIZi7qP3ikWI6QbRv8ypE/ek
8iRaZl0va92Tts9KEkEbebYtS5w0AR4miRCbnSshzEhlWsw9FC5dW6wWgQ/b
yD8qLnlboPkBD/3Ln/+DeiRihAe0ZfuXP/8fqcIJORjP2BJ1Ao3oztKQqU8n
ce4viIMw2Bsz33768ZC7sJJWSaxKpHiQro41H5shCSXgdpA4XDYEZo/TWBXz
a4vGReYmUQ0wJSEzUEe1R8bKxBLGYHmKVhu85WpZRMLe7d9BBOp2eONTs1ki
eOlxuV4tk68MNZxwFBInVB6bk2TWm/zfycP4VFTeVa/ElPBNI0eaZSnAYEI1
JvGDaBFbbzPdKRLSueem4JZbNGMhEm82TdGFTGP0AOX4YDg1PKPgHKbj9sJL
iRVZTDTEJ0HKHpnvivnsv8bPIitD4RmJxyFME9uHYmFyStcciC/zeTykhFDI
4V302IY0GMm3MykPd5mKzRHtdLgFynnB5uRWG/s6tYi1hw1RGRLbBmoccvua
aQkWDbhpQi+PyG2bilwlXKqIf8+ZihmbjSZqwKRZ2xdwiapCN7FYQsW9fxGq
G0UyxtURxy7ciLPW4Qg0TMHJUsF0bABa9hEsPDnsWpai7kcgQljmgYZ6LvA8
/Kg2i4e/rMT+oIve6kGTPr0CGeRgoBMWYmlcSmGuAJK8GpKrOCJNagUtaGfM
VYZQtT1r7k4ReydJrzrp+Rkq57EAJZkofjm0nw9yZJvkDFQu/tfwlT/wg/xO
OJUbjvxSia+c9fT85wx/GQtmY2gsX+6M0RZussSE8kjjIAWyuDOIdzbAfhxF
jSioF6HFogAk/dIzvxpVXwvxtGoLbrdNSk29t7Qsms/rkBQol18lNFp8gpis
XwiEIjNj3/0o3JshXB8WNF9RCjlnjjhL7kTEcQLk5XQvLYyaijIaOWKkDPQS
i/mVZVoVtjHcOY0Ryzu3vQ7clkZJqp3XElyJ6GAvK/Fq6A1vvEaCg+1Vhedi
6gUEN7aoDt9mstemAK3Y5NpNlOuze1eLAVHr6gY/0S8sjitFcisBZmJaua50
++L0g/UaTneY2akHYlq+zolgPOiHxxFIzdf0wC+lh2uEwxAYJZxVHgj5tKxM
FAa1a62lATlFHnj5EgBiRgAWZhocphClQNu5Ulad9/nY2cnmI6Pw1+BKR7j8
/gVChx4mvonoPCmC4jGhgXBTGAZX8CJYaeT8Apjp6Ulcpy3Yq1YZaLSWx3BC
sWl89GFyeWybNxPaB9LefLgRKKrQ+H2ugR6j2PA5ODg7GfIYMUzLZC9zx9ZT
ygZxy9HAddbtBSURXiQtU5dcVSuJP54evXtT5Kp/zTAPd2d8nOOgT8BFngTw
LKkrEF283dfq7PHjvG+EwfJWuDRz5ALJd8TjrhMJJ0vLeiJMdEQhDSv66ARd
OOyy3qBAWNmFwxK5svcqeS3P4j3YT8vRWpPdp2ZmdClWPY7xSTtIr866s9tp
6JBo1XFlRG+pFIzih/XuDRhEADN0HspGqoQp5ff4JPtYzQZeFkst0T0cqYaX
ayx2shXPJlhBsinv4duq+RZaL1ImOZb0QfZ17sVE0ml3W3JA9pymJ3ya4itA
IH/KoJPsjTUM4T5Mex03px72TSomp3B7ZAGtdY4hOqTlcc84Qqo7J1b5PrJ2
n12jkBehNyQqbiNHjGNiP8T30MHB00QjCuFlG+vSgXUyNzsmbhdnI109eLMo
ixxSFkflCVgSupDHjmtVM0kDVuRHNsgiOO0AF+Xv300+YMgY3EEOKTogCJk0
I3sw3YWgcQpVXF7kQnFoqzY7KzZYwGcnpuUMzTEkGmpNEx1/6RqQfJ2Qnxf8
2obeR67vVWRLiXjc6j7bfhHlz6N665yMwTHzfIXo+X6gRiQ8nBr8Wie5oW9R
ja3avGlXOXZ4ecCIp0ky/74HjDa8S5WsEbiOuOljZDKSzgt9BuRlB/ml70fb
nbQxkRYK4s2LuRf1NRlUUInkyI+vllhWUwmrr3Jpj19jU3LBpDx78eihkS/p
CwyZpwQA7A2sfsH77yayf65HX+LFiLE/1CYjjJeoWznG1EMFjmGpe6z12L1O
HpxQJ3nC6CsH3XwieKgriHQ4JVdVCOtgYyWpXc1jmbT0GWWMpVvkt02dz6f4
WW3k+T18lkqTj7798P0xPPZnpE9GixE1jTRVXeHpO/r53atWOnCEcbTLrO8H
ioP9CHYlyMWGYFmKrGIvZL6r8jXM/c3V1QWWbpTUgp6Nk98Tk7uxfocKCBjz
95eT49ZSFfBTO5ByF17T21zifzNF/Jhry30p0g0pXZtSm1Mu3Kuy2r1jztwb
fK3DG2wQR2Z31W0xbUsOoq3ybQX6+/8tmnp8nu8e0D9ewQc/qWs+yuYNW4Xo
MlKZXKP98WwkceOqeOUCb4wQUaGSQ8snRCQX7HbmHfOBKR2lNS7adjXiYWBL
6u5yA+t5evIQXJQdUrtxxRsYTNghHe9SDMXvdClmIT9HTLCVhNx45iW6fWvk
gP2u1L+GHQnl9E4t524Bfttm6Mdtfl05pzKr+piKdAck1OzXwiYRrXVgcL4D
C2XY6EgPo3a0DqBig4YLKjBamb4m53e4CWLUR6SPe2wD7bnlT+kSxYGSjuPk
2JOQrwljdp+mJGYelgQQnW+5y14CvNKR267e9BdtqM3Je9ki8Uosdx0hMceL
VX6NOWy+JH+lFKTRNauUtmoz4jjoCwPtJl/ixhraa83G1ikN1GbWIGS2yqXW
+Uq5bfVrQWVVjEFTRhPOrLdSFmXE7bRRRsB9rzfXW5ESzKuSZc6epsnpgEiG
rXjFr4/8mq90JZpCoygcdGYnYn9bZXokdQWM6o9RvvZYFAf/eMfzpG0kYjOn
db0q8oScO0OpCCl4TYlJge6hBoAGp3tIj/5HroCj00iDkTFMtvDhAm7g4nCk
URJLB8ChIX8H1Tkuo+BkVsU11gToev7jV0bHGigbvDVG/pwiCq436r4GKuwq
JWTe+3bGWj1Fy82BVj2xFAyzmINz9vc0t6HKQc4uSM4hCxtJfStkYInkcrCt
b6I4EzYECgPXzN42vsRQWnjFqh2lxABBSVZb5N6S/FU5vsfm8Crve/SvFGoW
kL+5ULMe/1UyPZJWCeGyOmSiROcQH/IDJUmm3BhYOo9Z5P/Emfg7HAPdoL/9
MbCt/xXHIH7B//Rh4ODTXUfgPymH/a2/t+wlCdi/rUJVM+4ewsN5FxOawagY
LCEaKT9Lm1gyVkoxI34G3ylB1UVwUl7HfFXYdTzUZXZ6X8AcolDn8/3txvbr
LSMjidkY009aJI+iXYasCH2vBp1t6a/pMRT6Mcngt4riGkJqSX5ZumVSCvkz
88s6hpPBF1bfTvnD9aksTvPCcCpRCatNPYIibCvlmdFIi8/faOrMzz/EHnsB
Fd/3Jsir1MWXQhKMCUPWc6G+CKUUTUxeVa23sTxxqP3jtKJm20+k13WuJ8uq
dqIU2J5ToAdg7xrHAQiLjJDnUHYDXT/7ge/AHExlWC7iIjOWTAoFGkdaq+U7
xaPKGnHZzz0iVRyEUTYKKSSnYPKQxxf3m+xnCu9IE7L0DtAFRudGAQKLWvT4
V25x022C9KvvmLyPWbjU6kBfKvfBopLuu74DIJ02UbqSVZVWXwmoNVtjmwFy
3nEYIabqXx7k3/2GYnkSETAfY2INQtuM+waE6E3SRBtjiWWXbNLXLLGvmAIK
m7Pbvl9Fs7+xZOHm7kEYiGVNQH+c6Plr3KV7mZnMlJBepywFDM+UmZJsMFxA
wjOIURiI1PY0xx6LY08SWI6sH1hm4PrTEm4uY96lYVNrr8rnPCN30qAguQho
2i1oeNbMsOAuwOTWkVh4kdCni5ofPNhDeuZOQ42iMnlvxzUXc5Rzb0x4Keyz
MJPmSsQtVwqTfwLdOx6IEnfUH+uOiTDKlrNQ8SqMBEJFG7a3dqmX6fDKPU3b
MDAPDVoNiyOIfoHcDCeuOonK4VrDK5V3bWWgRVyX8/mqiK96eaBLnRltDOnR
KWtivNoWnUDU9spbGGQaFPjwrCSnHZJvYoRKHk5yc7cUwvLoorsn4aN10io1
smp+Rm7IRvHjUp1BoSKBiBiM9tnJmSQdKK/NFNJd0Q9pBaIClnAq+ovIVCQs
yUaiMhi0yUHpgnoKkUHKqPwddWJy5Zj7I703ywKun5+Q3l4JrERDWZRZt5Gy
ueVsi0QwIIz04trUoQvNxDiz0hShvyI1IzFkMTWVkWdo3JQaK1UMWSTVrVkS
kRTeSOHW48a29BXy2a4JmyDgdzRNYR0UYQzz3G6Iux8Oa73oqNNMuabMIXG5
aQcRMbv5s1Ycj88QgJpMFTdZUESG9WUqdUSvsT7WwuURZV28j0OGAqWYApWA
LlPco2S7mQvSfKJ3UY8C0gmXut3KVGDXj1498Dc4bvvuXry5Cfu3X+AiYbsj
gJlljt4ksLi4WPrIms5Khg+r+iVnhzJ4K1TeNXeVjrrSxkAPQyPpHjPPRnBj
llyEpekNUfMMBDX4pwUs7DibyFANPV9IHkXPjDqsCui+bWdg+jUlWuRqMYqE
s8Wzz+GmnFt4GiP0xdGEobdNpWQPrdNxSqzOD+LFQcoEA9f/aHtltqMuoS4d
ITgpjIviI9vlSgTo/pJf86tgpfFG9YR9Os4fWT+Tpj8DoSuJhhy4ODn6FLer
D4ME+83Nly5w+rJ8jZVj4PdMQfoh4cFLIL2QwyzxS8mKDfcJcUpj7s4pv8S+
0yqX/N5ooeTl9aKQkuJZJ1w77AhH8rtHvpI44N294ROiD97L4IOnpjyhSGi1
1N12f2RHqL0zKDqKT4pikAmyp4ULMVTYMqK++W1ok/J5F1Ov8yZMi5Q4NzS4
YhVVfTIJUDtQTNy+CLhWkvpMlDuF5ot43sud1XiXNK9LtdRJljYs1acxH7SE
nXkley8Si/KQAsC4C+KnfCcq3oHgvmEJr/AgCSeNko73HiZvzhKKQhHBPjSk
E6pqsIyQzTK9c03cqUWBtRXHzSVCKTVp3X06Cqp+FC4D4lGaMbCiN9fBpCbf
uvwBXjU1V9h8YhxasHzjYpJub8XGV1oo4PI6s5fLD+j1o+7icEMS0s1a+gXw
J2kgnIL07kCCEfdRoXaJol7ulGojdAINt1xkHflOrcFrjoqT65NQeSKIF6wp
yTjhK2NYeYkvH7gknJ4cO+HhlwualExomdfXMaqWhNwPH0jP0CmOZ4rG4fqM
UYjTSh/KEgF/ixy1tpU4RfwyVuOWhGvaXuMiqXIayMQfu7bI6/xzud6uXaMS
Y0kQV2dudyiVUMNnwTFqthtFSNWbQmPlZmxKtVAI6JK5LoJEhbQttYqA///j
61cf379//eH89XnscvDShEUklhW0tFellrdElh7cH23tqEh4Ne8brIsSEVyX
TcI59NRefZLvxC5C8Wue6/N6+6r4+2c3ppAT4xlvomvy1vVUoVgabWFoqSyl
DxZX6olTZCrBOGqb7/MAxKwgduGiSo6C70F1n+c6RJg9EAsdCiK9EL/hWNtu
eHn5a6fFuvPHwHfBKYnvEILx3pR4XJptvXKmheMBBHkoSvYJ+A5g7n06RLd1
Niub2XbNTJ/IOizlHxqV1PBQe28pYu2GF0p0z7q0mtVxyLILLPLv58VfUrmT
NQMlv2lR5FR4XxXXdVdKoZVTn/dyr9zl7UinbEt5M1eKbaO9CfoHzmzJVVjM
/JCGXrvQwKaQHhYg+MR3dk/gTrgqDFJkAe+4aJnLcf5eO6BWsiWt6I1IttrO
0TqWn5NShYRELdIBWquVRPgZB/Yu9p07zbbyrzw1p48wcEsyDLE437vHApnY
UdSZnN16uMNwI1ENs9u5PycSF5xpHE+qFfV84mBH2kGPjx78Gskb6lUxbjEZ
rEVZollaXz6ah15WypBD1HpqrBlxjaR69LZ0VWTbattyhIe9uv4H6M+UTcSF
u+VeS5FyHcpTU2X+vWRYyyHE4g7Uqa27a/zqkbLFDlfcalpCtWYJROB+54k2
2rOk2xrEs+C2GbLElF2quG+OUkuGN40M9jvGsxmlGjaP0XwqOitHQuFWMqWe
korAVixKL798lfw++HGXLHQYHYtDQncFyTgMNpwMzkO+dR/a/1fgaeTN4kw4
LRvfgRQklTSGAk3jh/pyv+T5VP2MDKbIxTRSUiYKgwx88i9//g8M+YKaHl/t
NkX2D5ly7xfjj6DN//Ln/6MV/73EPWXzuFa/Y74Ex62TrHtlUT2mm442wtlh
kk0a+FA/Q675E3HV3caa0omzUVpmgmOniXH45IO6kV/X3M7a9XSzBjwGojJS
Q06DR4E/oYpF5ggBAAiZzP6sRbh2tFXA3qzhIKTB56u9lz4KOAcKL/e8vYht
woiPqH05fp42WdFBMY6M4vkl95UtCcgVXtvZDWGYX/Hsrz8RTO14pc13byJZ
UAdhp/GugYP9dQDp14Jk1CGCEVLKREIztqTtnl0XXejmq2b/r86JRhX5Rfbm
/eRV4CbcD8lj7iWvBwOAqRTpNh1vl0tgqTNe6vbvl65S8JFEkEMwLIkRRvjG
u5c+YaGw2v3cBZFVCCNv82vYQnqsXJ6KaawHEWQa+zB7mNK0Ubkf2YOcQyPW
HHL9RQNrZyu5/n6qmL0FyXP1+rsa7o0VKbIBERzkH6KqPJSNBkOuqOOF6CEa
jSM2EtgicvSIwjzUc9KV//zh2cnpH7IH2c8Xk+w10wKVJsH4dUdYHmzlAQKk
R0+evRi5NhPIfyRUO9yMF71zpMNb7V4izFNuKi3Gx6svNFuqmEBcKEw82xY3
UpAWdnde90rm44+KFbqIUQZ7waV6Z8+fvvD0Tacw/ZFdNFyVEU1pnyvDcqfH
QCwZbE1LFVxKt8Cdk2HAoUlisKUipjRGKqVMSyFVGwXJSM02dU6NMhfFXEJU
oQy3mG/xz/DGr89/+vHj5D3sEMp1zIgbeMmJhd2rpYR/7+CA4676zOum3m7C
4z7C9fyj/OmXXz5evP6Az3z74Xt4bLgBjKqHiDAIZtw7DlZprE8KDRBDwBqH
+f3Fh1ZYfalqC9QHdojuEnuEjqOqBfeYg4PoOBR2HOyIMQa58riQVb7jQx14
e0eeYt1Vsq7hziCQVdtKV5Q2O3p/+cOxUwQRlWknZzDpQsCEq1apQ+PwqjVr
TsTkTVNqXWFavypwDDBL319cvAYNP7sZ/1DslI+UfnmJbK/0y6R2XSn0E/Re
L92grdrIC6dQIjJgD7RSiYwQ4XB0vT7KnIdAchF+bX78YqglViQ9pUX5c+IP
HMf8gUY4FeFFKRwPynOZb1ohKxwquiT/ved2SQ8EbkSBwRZ4q80dVxVtsQEB
AlA2xC573SgcjLktCimb5wyrOLEcKqcLDHbzBwMZ4+RE8AYVxz7Jtxdi7inf
6yo3lmN8wGDXG85vSPaKTT92iqvYKWA+FedEi+XPkZa3if9KN9fbyl4zjro4
j5VL4MCTYLvnBiEA2zbxh627i8qrsbuinJWfCy1pXccNGvQhpuX1Pgpla13x
mTt3UzkcjRP+2PjA672DFeaUS3VfhMNWtI/10k09/wWzA3XaHZUzj8NTUqIn
603qaShrpxQl9BsKNh3NqATVuE/ktJzPA4VTukwIeFwRnavOMbR0HRjPSiEH
h8P0ZrBaKT4ZwdUd84CyaTEMTR2jeLhfEUwqiQmIqpdHab2kjW6xUtGAydMU
ejZloAbZlIZvoHkKDzOlBDGwLmOjRVWBruvPnkXWdz0Ngosm3rjBxjjsNGLL
wK/M8P7yyv5KSAhwcWcIJRWhQSzS0dDiVTWz4SMnUMNeNfHZEjQtlelhR1UO
40G21zj8ynADLse+wVRxk3dBLwCyujKAb+AHPciCiUlH+W2nOzl1VdhOUCK7
EN/mnlJ4yDDCgDQ6NN9w71uwc1Ty1RC5lyFnodyJMAhjvwY+aXAkdIrOeTkp
JqYbhOp770L+jFTtBwcfhAzP8I6/yrd0KfhQyeZ31IkI6OfIYCPjstWwvjWn
HfmtIw9mktCSvZ/8szKeOhCukm4oahmDfHwo2oTXjK2foaBsWs+wv390RvBa
BJxLcBAFaXiJLJuknhwZGcz9AoZc1e3GCzzvR2dPjrMdbEc7ElK/4DKhk0RP
US+XGb8DMWkAqXZKLsjsGhI7Uo7AzXa6Ur2kPVCV9chnhmEIU2AjZf6d4oVt
+83NboZOdi1ZUrbiW2Pv8qVgQmpOJK64l0Je4ehrvxI9lB5kw/XRtKNfh3vl
XRSSKIQngToL4dqGdEkZhcqlBQ0mylF9N0qE7PsKwgiBSMeTOGAakn6TpO2M
+iKVTO4lI0ZAafVsa9rqQstJ9ldk2LJ43Na8JvBYLaZjvaGUtm+jsxL4siNS
7AbxA0kXBos0YZHqetNxpopv2fTVUtHhFHNermKzRI8vG6IrxbqF5XROkreY
mBxDgVViWn4HwyvVqvjdMVWFkTdYwMfXATv+0cCc0hEgRD8fx2UVD6HQ+Hxe
b7pfU99pHB9IHZHEXi3XbGo7uaVdBuTuwCyB/sucyFZjovSkh7vvWunaAPEM
8dwUmuWOWi33QltxGL8nGcpjQslKMLXC/BKh0ZMcG10ifK2vmeT+RdKbEZ3C
JfZtrqTTKe3oFoEEI9wbNsyoNERVxILSJtYnyPH93dda+Em+He6twyQ8y4pH
HdHEgxqI1IYSIcm/qG8SZ/hmNZzrP6kXHuLRdCdoaSTaEa+wJt8Qg6586quG
RM1954RjSdkPB4UoFO31qHeNa1Gilmad2lxcWRSnI/6Kx/b0zr7Mj94heCPI
GvpepNg0nFmcDTwXd0gaPnKMa+YgvLau6O30IFnvkQNHxqmD47hu704DWo26
uYZFjR4qn89hfdr7p/WDuXb17XmI5RLLjbSMmBMnaSXQ/dj39eJI6oDtgLlt
9z0RMsk0JHB970lwxhuf3T/fgkLB/OhrZo2/6SNQmoKcZYfTJoHacgQyb5By
i54s2BOakI7muzn/pxAWe5EEZKfVUz4aA9xXRcOyi8HeQluk/1GNtomr9JX5
l1GnlVxKxj7jZVSKM6t4FYu5hZ4PwoaQ3fLdSaTaK6KtpcX1E8xDE6odW3w0
WZvdwcGkir48wFUh5KJaQMjrrvbMX/78Hz1gPjYNoW+aTUY1s8xwAV/guv1Q
7IthWJfGckZZPKg1dcWwrHYJ4ji+zNS3oFyxa9YWElt3lTe4xkcSzF4RQ1/6
NFAHdMUxsvHIga6GZ3fsqxc8gtSnCiNUnSO4U915JxmLqlL3UJStsHWaTY/G
j7LynomDi5ciqz+wlZqFhM5PWN8REo2L/RvIZDUU2tWbelVfS+HPghJIlORo
rIjS9d9aUUx2Ydzzqme1FzRu8nVg+uI1xTo6eiN6oHZwJekJJA5REYKlSVWx
Y8SfEllyU1KNvas/UVg5Qwg0QBkIaDclxudw5jhS8BvByikxrg+/vsqumfhx
FEkDTTyanE6NxBhVTFTtHaZOL4qzaq1N4yA+1+REmSyV1BUUGbmeDJ5YhOwt
M3D4rwe4SrqvLBdY0bPtfHtqfWC9GKqKYPX/ASzQSOe/7Wgz8aiinSm0hjRJ
cKNI40hnXXByl/Xs0ByA1rLOMc4o5KYYTim3PPuNRRsFI+59HZDwhyfnUY2L
BJQJYRfAbKJmYMBVvaMbMsSMWQGnMOp98M0hzKAWEtzfaKbIKSXbB6hPOoG7
4JGSWqmquBZ14rq8cMpO383qCrzx7SLYZoZ33DyAoF60VtKD0XKy4mbAC7nG
BL5RmlgBgYLJ+8/W/M3T9ifdUIaqtR8HPiG8FsXvIhks1wWKt3UGqtglUx6L
tnPJQEaa86rJ4hrC6XxgTDaq8qq/xMn6KiUq0nL2Z/8snr2eOTFKk54mJHur
uv6kINo9DY5cQ2oWSoqQDEtkhJH7I4K2JN5H2g7xHNEasTZjTmCxVoi5TACo
d0pPiGGA2cCaAI2LcCK1ta1GBwQcGQqqmYk4Q7+muKV2bUJ+HotS6MW5pFIu
nrIYu1IwLh/F9Wu6CF6Md+LOTXtarKTnD96kYWgkFd4Y4IFtQb6DZFDWnMEy
bMrrukGjc1NQoRW+BJ0LbnnFKk4ahV5v0fNoQ9PwBh+6XnNwo+YbN3qheGaB
RJRnA2I1K8StvQQ5nxGdLJ9b5ZGmGBH4kNlkA4/bNCXIEpgM9GlyRajTOkqR
ijbmuVkXBER7qhATsVNSI3Py0+/zvUdNaxlWJtxm6N6mHybLWzgBKE5RgJ6k
WCA4leMiQLtx+krmSyFibV+cApUi8nHJ7s9mWLMFQyAmJFyXvVz8eZmvsc1v
yF+TnuFyiAVxVJARywIGnxjPMEAU3fS9diRkA6219xdaSPr2LwMt6TmYfcSg
zLAeCraO2Ao51NjTIU64EDiJTzcfamHkISfd5PmwnK1tPRa5OMfi0CbR6r2a
tCcVelY1etgEyoNc4aR1uTi0//QZta8TqONshZxoXRQiCyh1NBGMllX7zbsN
sLVFS42BIMpchi10x2BB449wdHDS20rjeWasUrPaliHSDvlz9Pbyoj2mV+aM
Au6q3/Ymp5i5A/MGo9JqEK06TGBD2NaW2wwHDETUzpdPgrNHyKTyz6X4I3b9
E7jmRz0nm7rFZtmLOpyalnPR/nDRblHEhAjNzRlHtTh5NXl1+Y1s0vMXD5/B
JlEVFLnRIMqrXGw8GYucJB9FhsN4XVYcoWfZkqNohr4UMGuld2STgtLVA9DO
QOG6Odk9pwkeBpSM9h/v6Oj7c50m7hM+P1hb2Pp4iwaWkZZBZge78EPRTIum
bmXxHp+ePWQJNyBYrlumM6BMWAQw6zerEomWamcrhXT+GBuh8BjM3AulRoxx
yTKbHHuV+5aSe3Qlf3RLJwF91YVWQt4pgkpykTuTxn3r9vYCFJHBXegnfrJ/
+TZwsjclt7Caou6icBUDn35/8UHRIvpZAaPratwU/eXg53nAustVmcxoN4Gp
4xRHgbVG1zSK5w/jq8FsXFnIAHjElUmHN8as2Wrb0iipdlVbXFRy4Q43B4nw
MCEuYF2219uSWVCQA6m2GDgN5zASOBF3WeRz0n2mtKZ5y0UXOerheU7h2RWO
H/AgBNBf+Ds3XBNseryFS45eCbuGiRH843aF1fPhT9bk2JwpIRsS/puY/ALr
N27zphJ863BaLuRxwgs3+NyTXhttCgdM0TqT4IWcRrpSyeLC75HGvIWl6qQ7
IsXwBAV0epJGf3p4rXvQ7x5kcAXQOrzMfsYX7KXngoDKgU/qa8j+NKiH8eFQ
nepwgxHt8gNj9zp5/F/2Do/+mncIaO+vp9RjJtFuuIYhyhn9+peVsMm9Xvhx
T6ok3GYlar6zbyj95heO3Ei7M2IwiYZv41eZrMCZUaiXw2Vr7IQrEkmf8xdD
VQzbvwX2ObQ3WriSND9zn2R1sB/COLmvaAtjCf/F9WFldVOvbgLVlbTAtH5M
RiK3c0Q/NpY4ikZgtxM66DvmyN3Gfr0c9hoxx9v1f+du+eW6x06lC5fulsQc
ElYn9DSWcGEdxn10K/M03Qm1Xl9E/jbWXjjc2gx5T+IQDEfxK8YeZtKfBJt2
2G0cuiPzRY5/f3c5eLLjc0z1mtZ4ZO7ud7sB7zjZz+6crTUxlCRN3VznlbbH
+pu9CrOEYJpdwQZRVFp4pHNi70bTivv9gBF2QxEnYlkpqSdTV6JlvxGEPPxT
05fIPNeBhdfVPrPIpDKGTuPbVZYJ+7ehxo0xKRxQrq5rT/nEtYt1VXaEn+JI
9SUDltlGTUEX+XBDdbbQE3ooO0mC2duT3GF146BT/eZnlmA2KFxoS8VAPgbF
Sf9rdgwIy0yXT5OXLVPy5WlpbpWdvnjxHF7kfHIFPsgPmICm+AUREOAQmij0
7/uCQuMTWBZsajpb2Yfb7fU1vBt/+uzhw2f2rScPnz8MOeazE/h/+Cy5L7u6
/iT9Qu8Z1FamUXu0wqxHgmaRnznyXc+oVmFu4A6WSaY2oj1dE/Agt6mfPR7x
3CX8irIhoS+RiQtBA6MVyjmTogrBYeJTiOSMxH62MxR/SDLlHGFwdXcWsmK8
cQooUnHUlKn8VbltdV/I4rTEudT3WGQsSnRrlF3js1HFoG80iB9+zzH87Jff
xK7yWIL7X/aVE8YvNFgs5Cj1vLNUWlGZwxUoNWe8/LboAlSS5LVDwgw+OAq8
YSfWoQ+RMhPQfEBr6RMpTMkcynEze1FrY/3gsXg2k8AgJ8X3sKbrdjxb5htY
RP3d0c1pOH2PKeKF+35zFn777AmcyWN2U9f5H0kXEM5gscpv27jiqN2WjDij
bEBb+NBJbjhAqlmy2/KCauyuXgs9wBVeCxRskjniDFsOBDEbgcQheFUdksMQ
/iJ4FPoVWjZbhZuzEJ/jds1KY0xhDMY62ZNPwkqZfpw29SdsHEe4XVBEj7kv
NFHz4ZpNLt/Bu5Aac90hWV3zwVwzwqDN3ll5IU9FOk/3JmKaGjGsa5Ya1C3w
yVzKpOCatEJ8rH6jAgZxCMKcfNCbbaSAymo3/+DxWMs8siDCTKK6Ka3HjRBb
TBASoZydUdwU9HbkuveujM4jvRXP4iQx6PnnJ4+5fEDhzhrh4CyEIPDERtFN
nJnFiyARaw8tNXZNUWTnr10K0thzKSuiEQcc8PTpuIarq8s+XI3f5O0ySk3p
oUy5GKOxQ1jnWcZDYQ2jQsn7DwgxyXmJ4V9mbKedl5c8O+WBKGJABZEGidYK
uGgGKfg1PvF+oUnYJMYTHM9n7nFkUIelcJ/CR8JkRhLM/+y+px8U0iX7JMgu
4b3oqJ+ln14QIF4+rAAO/ztCIjBVMCnoP2FY0VGIBhSg663iKwsxoYXaWPpc
ewk6w35KUoDA3KPFvPU0imf/dvo0EaIITouBoobI9MO7nCULaah/WVGMv/mk
p9Bm5WTmTn3OBgyRFUUlpeuJGr34ZBlM7INKbmPkJpOna1SrVeZy5PbFx7RY
UUv4OWS7P33w9MmTR0+PCZOBUTayhZY0NK0yDss/KpFipe2k6KBNG7hix1xZ
6laJ6zkFSoMY307CtrYcpsLpxeFZRD+lgNhgC6SzUlBntIIiztdYMuqS8SyQ
CMclo6JwSmIpq0dCRaSIMCdXBU3k2gLaVHJueC7zhSpz+2eBXc/AjiLXV1XT
dKf5OKo4IYEhiVjn1+BFYOOzXJiuhMYuXsmBLLovb3FGKONyVHZSCNgSjLoG
hRofDXpci4BMljDrWHHvEMoUjRnBv84xNScc5QhLiLUP3/bmt3S19R4ujeaW
DwkegqIKz2ft0J6EZstGCuGwyuEsWGdd5/LR08MbU3opbylptygJkbSiuXME
X8qI0U/EpAdljDnqSiVikvbDhbiwA8bfmaNvsKVvYZK8qBHfJcZR3UjHeWm+
FMJr+IFleb3ELqIewrUgA5sim3e8XQgZg3JF3Gw2kw/ChtdEzWTr0EUYIf8I
sqXkIQOMRcYX7buRWRvaSBDx3fBANAiPzJvZcpgLzNtVcWULnZlgazPZLJke
BoLULysxZ9xKGJaemBQ4Wuqq4CnTjTnrIQ2f4GMyMaEV4UC830XRf7x00lCy
WKriThNgejWS6kAkhdJF490kbTXS420awse3ei09wllwlxnjLxMIBuwWldFS
JS7rAH0PRJm4SQWDlLGrpRciFBayLseSXaDKBBjFSAiwDyx4GWP9ypekIl2B
ZhQzKMldCGX0TBOWcIdgKUhOR5O8EFJpVC0HClkjpCJlnlchnhUVFgZtLitw
/oSHbUk7ccRoUVIM0d5Z4xZmPSIODJeY86inL148lnJIiuuo7fn7fLU1GkaQ
uvEtdYMgW86mQQGzHI9qkaMBCYPodYyYb4b9iV3w1s2O80Ys7EeYmoPRMPM2
hwFQyo7pG4csKYd3fN592uLBMAZNXrsVldLxLV5QW2pcWVjIo7fn2Te2aPBP
W6/jmDUgssGwctMAsAbOwUNqHBvoBOAv01JdZHMeea70eH5MMxmxs5tkE9qO
K/K/ftCyI2JUlo8dH/tlmWlNDppIz/GVMUCCERY7MHIaXzxyf0VLqmwTcots
WU+nO4wwlpo+nOe72HsqBYMl3OQSy15u10RFx7EZti8KxutZ/NRfGJOkQZzc
eKa6pU5AzCe8/euO1UM0DIIhozWX1k6UtmZ9lGdnT56SPdAGG6usolsCrK2o
+ljL+eyYiFtILQi5LWEsa8exp4W4OPmqShi1XwGH3TNc4HXUsnmKwS127uZl
q0YUh/ckrksCI2fZaLqoBhO/Ac4zJzA+ajGvLS/cGbgKvWWC43zOMqz4LLaA
V9yjgjYRl87viWt7waCtTZD1dmlEaW5tubDGt3eyQykhdDHMc+QjbCXpsk+H
svffUWActmPs9FgkOgEwcrdViVCc22w6ZGXKPopRP0UzhRe/qzHPH4x9kVG+
MRxphDWwPYi7jxlBuh5n1PRofRE+ryFyquz7i584QrCh6wknxrYOp++40rPK
nj7Wyes0Nmy5gMHKKg+bF4R7maIlya0UiuzE/0Kvi8KSchrQ4LrJV6gew70b
38eg5MbiRAvLPsovNZ6SLu0Me7YQWUQuztZ6l3/ibipyFfld6TlUpNJI8GWS
sGDq+vz15ki8Mv9po4Q6ATijhDjdnVESonPKtuSiscawhH+PRwoJdyavFtLx
dilUC1QZwkrXyvPtUwjeK/RjEX/vwCRcIYwpNDZajuRm+ibTnE90OR7HbZ+Q
kWBZrDZY4rUh+j5MiqWMSsZMxUD0YNNTXgu7icl9aNyflFsYxccpivdTr16+
z5j2TQPrCzr71EhLxwyRNrrNYMvF59JQL9pqLdcXMXXDUi9tWQw5QIlmojRn
X787J51AqitFzZcEYgfb60bZ9Yls2ispvbUjK0EZrAc3JPTbmxbSxgr9EWzS
nEyX3zCJk2jb3OAdeLGF38QSSuERNhtw0ebltfBXnj5V6xIXXwhWuZhXTxIB
EXCzQ5FLbq6GWmqzot+XGEMgcRxLnosjWumwTH3fidIkMUMkrMx0wH8cin4E
j0EvgjloReH0SR5JVUQabpLPzcOFeoh1DW0WuCaoO0Qgf/I3PJdzWChQtmnv
skS3Jq1QQIMNfHzPUvVWJSdDOVfIegkqkhGKNDrecJQk02C77RxD+83WJfuc
UNKeySEQ+6mNTkHWkPcKF0otPTsdKMFGDlJH7JmO5i+5HqTVBccv2mI7r8dS
iSA3v8VjcB1q8AYp2Ss9/Qrm4i1jdgNGJ7EjivPrExTm+sjoYDti6H1iqzav
KHS+f15PLny2sqtrPmtIQ6cZSc8XMvUVSVyRwIXzpjpN/m4LxqrAnS3qnevS
JKDBEdWXyO9EhJ2gA+64TRPTlGEheSN1SfQpl23mbBnq8TDy3zL1Z5O+lFjv
ES4B0taBF3d813sYyfivegN9zN/jPeB/x5w28nvOfYquKETF30QYyjHsfwUe
jnOCPU1HRA0awk0mcL8TBIF/kGZlY6nSqhuHRWk0SCmxxcE8dyT79J4cCE9E
GinyXHddDTHh1PvxmGAnKZxHG6uQ/dXmC7yR8TkUBcU+X7z0J958O5T48W3Z
FIegfUCVS9QkPq929EdRmk5DmxQvEMOM7QVutVDQF3Yb0UpRPFa0MOW1NL5l
FXRLIRckKG/Of1SC0D0IBUJz6HxxFki0q39khAD70LQBChMY9RhdFHGP1wK1
sWC0hS3F7zEoyhcBPvJSnvRLH1Dwhav4fbRACL50yUPCVpFGUVUeBkZkViJO
odIUFXVZBL/EcXh9rAo5X/5qsXS+j1fzTQNvOSdHmnhA56wiAhWv1AhkVb4u
4nWmgEgXPCGaLDwO4dQl3lchcaCD/fLLxc8fXiOZxQy2em2RSQSyN+zlMgb/
tlhhwFKcRF/nEXUuko420jqQoFkouknKIhx7yRa02PWpGwuMFI3xro3DRUmJ
q4vC0gVs2JYqSsWXvo10WMwkQRDCsy0mgmIWWYmWU5CEAJX98LrHEYhkCJyM
NdIGrSowpunUwUKuGHnqFWetkKkHqBqUmFe7TTFNa1JUG3wqiu7YIfUyQzYw
q4AkNUL9BTTG8zVED9ff8iWEsd/7PWLU0/0c1JHNmjlLM7IYmEeFVA+FPYjZ
0YMzuVUwl+1T/Wu1nxKqbHzhXX5Tl3Nr6YEPCg477oHdvMIcZ7TMxvQkPROs
9gP7rLHFYgqHL0rVdVQiI/fAiNn5KXpCmWirdBxaK1dMY9pPSO3pdSkEzvO/
wNxHJbQF5NXAsiQvFThHWz41C4G9NdRyjUzGHI5jJ01wswbDImplqB9+Wxix
SllJ3JBDTQTn0hbY8ORLfZmJDIE3XVHxXH0hZ+9uc+5gdCMGwFMM7pbI5EBQ
KZggqLHi5m1kC4uLI66YfY1zpybjqYIL8p6zKoz1iVAeMG8ZRQcZINqGmVAh
EjemQa046p3c4SOlkYEWC5SsywrFsmQ6lMe04iLDmZFgaLpd8bTwhUNyVg45
RLRWxz+GzqPrjPa5Tr4dWumRBhadqSqDM0jRAF8u9utWnwEcYTrhTsNr27Wj
NUaN/ixjPur4G4MRR7GMm4i0kMQay/XdxgxIVlRvWjN+iT68LuBUpIx02gg6
VBhmR+UJaGG8diIhP3brQ8NyRoXDVlhwXhOfpTUhjdE+rBRJp0oCN35b1Dq8
h8wCpKbibV52yQeo2BuFZORqxzt21DwFVei8KXM6126w6DXDr0ZMsu/LdUh/
g8K3+j6kB8GKXGkgjcUmwdA62ac5/IFJT4q7l7StXnaYE3EsphGxkni7DvNc
phVFtPY0QOvE0j3xhFvA9gXTpqCZGZ0avPCqpogCJQ8Yd+OhkJ3voFUYfWjZ
jlKbBMUGM2d49YdE/bCQWzvvYJYFM2BfezPWa3E0TQEIUYy6L6S6516I66p/
Gkwd+0sPDTurV2ObLLuu67lBU8mcQ4d3czuXvPWTF49OwYJdeEaTpMgMlJ+0
ubjkOgbvNPXEgxysAZJSpf/M+QrgrmzDmYzc3QmFtZa+6Pd/0JyZobcdEkHb
ONC/7YYUH0drWck/5WW5YMhBUaV3vz82iGpT40TKVqX0ZPgK7er+1lk3O6LX
zfUGihU90e5qmwiBwF7X+Spwn+o0BJW51luGkoD1tsNgmCy60g6mtrkCX+hB
psPzKFOWvrW7yAdSHUi3KOmSzbbBhWmDaFr1ccHoI+dBGv5Y8vjKT8VrFPl7
aDAaNQKMzUYcpyM1HRBIgK50ReLlZYXeE5NATZUr54mHe1wtlRpOV92s5wDR
FzOrbBKUKfW2kshiym5IUV80Pohyr5TWw3tchdBHnhwbqm4LecneO5HRCxvb
Fc6i819mVBWTfikDH8NTmZQrbyVnih+GfduSlkd4om4xXyiHuM6R+SFoG2vB
0gl6xCoiNJQVeOGKVL+FdnHDuvoIJvXhSg7R8YDx2sOzVVG3c561Q2TXWj+7
byBup0sW1/Abe/OMdC9VABHiTBRNgPLLxuh+aCzHFLkp+AjCAiLwCuMSFIva
o7XUDx4xdbwTJfWq5IbP23Q93Y8h73w8ABAMQR0xX147gtNgd3uIEDhYaA9Y
5UZBP5baBSh3/SnwgmYqBIXu0QXvzEA+K8igIJev89CH7Qv/7SR5xXGrnrtQ
rpHABxwq8gRydbEX5UqQtC68llSSkiAsBdG3KpAlI7RxFFsxqk+k84BNadu2
npU0+tAdyT09pBzxOhCrtfnOjDLp8uhVvhwg7iQwdPO2fFXXdFNwQSDd165j
pCtRCSMml3fPL3KdEcvOHiOXU0Syq+6lRNKUY2VwuuwDMONLEEJwAWBbjIJX
pr6tdKh4BzQZNzB+X7zZtvhYjeE3Y4p5xt43khFuk0yKIyBDBRBeHM/0egfq
QFrDWQku3tsEvMc4B8G/0PBxY3tasFx7sxIfmASJVO27VR5ZYWKS40XFe+i1
6qG1mror5YjcG/xEjIVgB3u5le7IjbnIBCmssrNq4qg9V1y/qrAQ0A5YgHT+
JHTTitNzeypnfS+7My4rvSvKy6z4GCL0/GeUZJY2WAan5xCQcrxSbUHSmQoZ
+5pW8I4O2WG0dC7sixFkUUa8MCmNZgq8hGl4BvFD4ouNbq7I1TgMeAeLc8UM
KkOsKRgXTR5bpTiDpGlZSGyLSOyBOnlcS7BbFwQHZoU/jKE4UrihAVWPTSSk
/jsA1a7uBEjEEyDVNvhMVsyJG5aAsL+LYTRal2hICd8TDm0Hh01kzcsuLZYT
9L3ryJ8UsDwbaq6eRO2nXtZ6x1cZkhJOTXkLGFDH4UAEGdQMRMcGKlFwnrpp
pPlTEf/QuFUyITjxwyQ2qRBUx39PDAVwpg/FF5CurL5rw17x8RDiIoRi90B9
pVMgS6TbltLlOdMtUpcHkyTbwrwR644TcLZS42FwW7b/0T3qAW9HqsrtzotD
JzbGMAxBZHoPBjtNa9Drd/Cm191SrzKJQqJTV6VHJd4xG1bf3B0Yo7gcOg7R
eemdSWOQI7cULZfrZeoxsSqhHcVIEgvpiMP0suz9rO7dQYcYwxrnM7W0g/Br
Cjt3sw69uhMixFxUNn6cidyoOWC0o8HiSJjmuGYnZMmHqg95Rr1zfdeE8KDy
fCi/qeU58NuIR3IYUOXsMzD7t0YISNOIkW5xOwNX56JYfGFKxq1zqY0btmKy
V8Yk1lLGeTO+scL0CXqNxEXf1zgYdlBIqcRcQbJdm3nn/I4GwshMuyadkTY1
+PPSzNS2KbEI8byWoRtTLMlBP3Zqk2lwMtYylBCiWBHrwKBqQuHDHjgARm7S
JvZtlCg+OLDoze1gsLcXTtBcyL4gbxqGu43aPW4lGJFzDbXjJaRLJY1BDJM4
50kzhr/Nao3MyYYNW3C7ivhOwLS5Ly0TBFiJSkdhcdauyJnLvDJmHmuCJvQ1
l4p+jZydREHG0aCDLil8h4Dh8+t8Z/Ngk4i4+aVhne7wZuL8xGD02Ef5mAAY
OeIMpUF0jWApYLHaKOXE2DNnAxMnTVdkBdhsKDutYzFF01fYo8jS0AEo8VM3
DFXGtzM55Kx8exKqzmSznZi1EsJE85lIpo0pQXEdQf4xqkfgvrIy/VaHRtRC
CfjLL6//cPHu49sr7rNCAAarH7SysrnjPFgV8RghSkWlZNsOBBI72lz+j3fk
6uUVJ/3n2/Wml8b5n/9ydfrkyZP/+a+WdeLCC8x2433tBAOfIoHnfkqP4xDh
EitZPZKFeJJF0BIKXBWCZF6hCsqvtclXVHhOlxXdKxuMLRJZR0vv+IZd9Gue
qH8fC70l8fOLH18xQnpMRXakwma7KaWNiYyJC2mYCNynoqnpHOw0Qk238N+M
tQYBlz5UEaMpFVeDCYJeIB76S9YIl0sEoRxdXr7Bhj6f4ZddoR/THRL0YS6J
OI7GJ6URpZhpQXVSDZJIEinmfcGfgXvb6Nh6mC/6CJV1EO5a9lEYMlDNuoIb
r27KNtGbRL5iypWOaND2EVRiElNjSWwjaH52QVlH42123xEYXUsrE2QrubJC
VGmdHXGqf6TRYVKvBmlSBc5JAY+hEe0t7QfpBslLRDtSXGnPLa2oMEyvIQ6J
02svTl88FDqdwbxbnEQa1NxDOSSpUUe1S7hCvQq0zchVpM3DynNV9eDW2y1C
Vl0obzKQTKitFbstoPCHdwvxQimyZ8/iqa6MlDgjhNwNvDRoJls2t01OSpDy
JrjmAVSLC4TosGPruYK/jCmdRyqIsSsh6J/wCyeZbMbiMvxc4E3UZe/K6tPB
gW2OQWa12hBE8i9//o9lvUHAEfwPNheApQigoD30IwEwMEcmfdSqcr3fypOp
1Tz3WsNdx0wVA4uMZkQLqklsrVdiwOOAgY3Gh2tXTSFySva4piC8D2z7MqVc
LifQ+d30tlIMKQ2QBDJPvTkqzycqE6YkIKNuc+vBHagh6O2VE/LtwtoqhcRG
p0ovXRJJcdmiUPBXwDUJTEyi/vS5E9f91IXW1jlFAsEMx9fArbQla7Mf8zlc
DCNOr/JKp59gbCLyIVqgXkrXCN2EqcC93R/h1SmnglZOMbI1sO0LvXFuCmW5
NMedOPTAFSlnlFuVFUGvkslrcsFWyc1QCeoq4LDz+ZwRxpy8SF3IqMdip/gZ
K/P2GxaKQbFehON8SK2MQicurHOhuK5VofC6gX2OF649KTd5Fexia0WKubVW
460XQRra7PLNx5/enTu1iGEx1FYcmkYJFhXES8Ea+9mT58jDON9V+bqcGQRn
5+kz294IsBppb+PQukhnQhfbNLBbWnQOybRm2dsLa/vXOko++SvZHkZtJL+M
uzfR+FK90zozQUys8zevLrj4rZibdSsq2akkMLbqRcufpsLsbVtkA31OMfKN
cwr0qaIj6HyrhRIBciUkVUo7EOZ/rSPKWQwS0E9k+X2hil4cwPNqb3IsvSWn
ntoxoUxMsIPovPycTYycgTshzEL4P0QVQyTT8OwxPRnxyFv/p9pYHumuRLbH
AA2jwD6phNvy/y/uWnbbyI7o3l9BOIskgDgYZ+A8lrTGwSiAg8HIEyfLlrpJ
NdRiC92kZc7A/56qU6fq1m1Rg+yyky3xsvs+6tbj1DlWIDFyI9XUyS92hyxS
3UplkA9gJXayNdwk3iUipJr07kNzUqrNt7JZP2z+s9Yfv34NNooiTHcCfsyI
7imQDCrbgjz5Q1KH0S8ckD6UkXAIC/CiecaY+MfIIVWCvAG9WDUyirLsk06n
B3+vJTT25m7jl4zGKRAXBKWl/UKGqaaiqbP1mcCjnB0rXYgVBiGdGREl2tiW
6+L3c31Yo1BTuEduIO1Ne3+6WGpEEz1aXal98JZSVGFvRtAT4XruprSchr/h
btUcuxhHBguVxJz8XnZyYYJycXcjDmRDna05Z9lqrRNrHKjw6kdloCYlVoJF
OgxKB9/fhiIYyXqKiylOFFhOQAokqLyKXPkniaDGIZLjtKjfvf1OOeZeq9TA
YdTWe9Vw6fe3qohnJLPFRidJK5neJgzZwU9m3pJ8a1gafxFUB/tQdcwn0FbA
bsWXy4cgxpTZkun6eU4OWR5pk+sTC8nYyJjovSyDWG7lscC95qCVyiJ4eEsV
GXFzJR+tVHMt0eSJcSb8DjEpFWV1JdxDTQOTRPiinEvjIwiteHHDVQBAtb52
84i1zHLQa9c6gyyig7TB08uGBNQkrA3s3mJ6lkIRbkIRSOihRGs6EKMLlKpU
iKVJ6w/bCwIDEyfbGvGrVJ91zLrBXw/NSb6mm6ZxItSiL1Tl1nX8Wn08TM3r
3LcM28+/TEC5clvEjpAXeif3k2XQQZL8ZzidChXiAHog9TbA+yX9s1C7HotP
zBxmqEkuFbgLubDrakFlXTyNOff+PRQdvdz054Io0Ztv/YQm9R6OgydNse0m
pyO21FnqrfNzHI0xYynBXZRPsYKUcFnb6lq2Qn6CZ+jPUca33A/fwZKZxt8y
DE7B/OuvV9fXP7+/BvXyZih1KIcb0jcICcDesv0QSAue4/ToxDPgTTUjPmnq
BHvTLPsZuuUsJEUPeakuGD6x4R57nfFSDcARJOnec/7H2A5ycZLBx4+loRS1
DFINQcivAylkO8ANjAQ+CvyGOCkc0EkXkxXe4yH9Zywh3P+gVSiOcRHu0e+3
5lOHlTZKrA07Y+3i4/aAE0NeLEjeVsS7n95t1pvLy4/q/FwnbBD3giFbGSpY
pPupv++pZRsER35+S0CPK2e5OOcrMzqD2QNgJ711RNYRfiHPU+D+UfEl3Zc7
8Qo8vCIhWs+gLESwTDUBRXSxispbmOw2lqI4cd93+96Qw9cUD3Mf34gtkGVl
LEZ3vuCFmEUNLx8eV/LtWaV3n0IBuXsfDD1iJNX3usNPuG89nNtG756PYIz/
shKjsmAejOxdY1AewwKWtBkB+4hZIRIKPxwPRxUmmI6sC1TZKRKOly13Na+u
HnQdZLYsw1URmSNu345ZmatK2VR7t9/fdaRiVj36Abx2Cq6Nf7wwTHG+HAzo
e9Tru7cGZssFMNOb1DcsY5bOyo9ARJd6x1yGyNeEOlJazrkdjq31Nbk8Xgyv
teg+YDIlWodla3ZTx0SHodWUvUI8ON1wN0NKIdnzJJNcdaVWpUDricNxVjfx
T3/7y1vXDXhKclHikrs4eXaeabAgLJX0pGe0uiunq3ElGEewPg0QiocwZKDv
LzPKEF1TBE/NtLQn7FU9+6wInuqYCb5caBiEyGiILjer2ChFrcMzy6nJNSpn
cKUq36Q8ec7WtTLsZ5WO90fDn+rRHLp2Z+uHeM8KN+WD7tHp0e3a4+2ZJAyt
Tg2n5WUhM22xDSXS6yykR4h3rJT01TEDsaY2U8t2GtgObVLB+/VnRBNDKUMv
jqi/Qj6qnnmwdrebcTzULL7DOC+PEymG7XuRae8f8u9N/Kt+d103aOH40eVW
Ga3VEV9TiL542qwh1eIQDmqkZUuRNuo+hmCoxU30YZlTTHorlr1PO4eft2Lf
mc2GMDOqSVT1cbPvi//c4BCOtbdXCd+wwvQHXNva49F1YollbhbHGZ3JJa+o
okQ8Q/lf9l9oJg7lbVpaOPfasVTtt7huy/NDQgJ1pXJhJiRR9l5k5Zp29oLC
vKxloGhapUc106LWJOxtuF/PzxlwsGCwt5SOWMPpkHoW9h16IHdIUy9wQ8+3
vcM7QKfJhpyh33buKDf+PaWuDsINcYIp+qmeQducKhFi1xEBmxfwrWob4HDz
Tu6d2cdbvGTRjg/d2WOVQCvW5AUdjYK5Nu9MT38HBnJmQNuLxaUbHrfd4YH6
tIYibblftrmbU3l7OvNUZJio/tz8z9BKpRXwo++LZz51a/o/o4MFsri3bp9A
5VX5Im//WJwtWp9NBiuRWlvZttfi+aE9V5eDqELPmd+omKKaDEZbWQl7b6TN
EIZ32n9empnbioeSxFY51xNzXZ6jaCm6+5BcrO/lPVjH6A2ncWbLPnX5msqE
bV41QUSeIiJ5j91RrhVZkCwWlngrnx8zkinpriisXtwyn5S2RJfh3SQrdaNP
sBnEmOyLJmh6qY1Y9Qm/Q9Dx9etqN43Hx4IP1+ae2Ypo0aAWDkfhrXFYj8fV
p+5gtMa3YB820d6qNekwPorBNU2iFjvz6v3Hv6/evPlrqoG8//fHlQte2oPl
2MiBsLrj+RXwYowtrC2zKR9Zzc2T4WPMwSPpaCBtdEKyBFrpxjzrjMyOSokj
R3IEnTe5AA2++QTo6zjRzCmx6DidyAjD+AuVImM7H07BTUgvMJU5A552ov1K
YGc8gCUHWglT9IjC07BkybnnH4Zux+12fjTbyDEYsCOm4sGpmh1O58xoClCG
ZQZ6Gi5OtxPfGfMbNT3/7CAHlPLXzY3swTbei3+qVLoOE8F1nkr2hbctAJVe
xYeNWdaqbtFE3G+Z3fCmCFSTxBus5LSXnltqw0kfkFOLX1ux37P7W8tGGbsP
isHleKZUA1acCQSql5uPZdf0OBFUa3GyYq1VhI/1UjVTXWnOnM3l9edSihkg
xPThRlIU6h8CL8RVc1eV1emSorNQV24qNESJEX2sFT/mRlPPv8CvkfOjXDg0
VtuixMBN6w/trl6/P7MR/5cesPQp97vd4/a39sXjjfy71Y9UEbvUBEvruhze
ctorW9hvJMj8Z/3KpBZmQ1rhkwmV22r8lAj4pgrCAz9/RrwwZw+SA66cskw2
sRB0Mu+9lLi876jufDJEr2WIXuKkoopEHoyEXIOKc3zYXOZSbWrw02rU7LQ5
3VT0By177+WTi8WcMliEH1N7Jj6rEjYggOl/ce/c9OfaJFKzXf14dYXlDWKZ
//f65rLtQgBqTvfimUwrzXUD2mgIbut/1vKE7z8zgKk1qnU0wq/OyQXy1KA/
kvavbV/Q5GUD4Quai3qZuXBi0XRpzE9lYnAKYE1zWD7nXdN6k5kx9iewy8sz
J1u3SHctC9HyF4ehS7WX1/IgxrTx0MGzQwK/pPMUFnP+3bdDswO0Sd6nrn9+
81pCrtLtqUMFFP+JDMgjFMpwPou0WN0NQr7k51zJYQ7q5XZRJ9mXWtGk7cji
IkyR2KYqGWCZgXu2uqH2EcbgHHz6wTsrrJ6yifSJ5b8AGNzfB2APf271AvX0
yd3Lpbfwu+mNvEAdujmVCsxOoLMfdwAp/JVgqrDnegaqlF9oGxIhckCdQpXx
ag//vyANcEWBaJ3P/kF8iUZ7TC6P2l93oeq9Xxpt71hdDsC52uP9Y5zvlDVi
EJ9AJfJs/nyUf4qT0qx+6NTNI6KYpzqqNnkjS9Sh2GelhrVA8Ieuv7/vV/+S
zazA4P0FKUoOvPxzxg+TJRcbYBKuuN4cggBH7Y1F5lYUBMhAEew3h8KjDImB
dypqO4nffzPeNHmTWSLZkucqv37sW/X9sREuYWWHcacEnN9+u1rLOj8S4tBO
zfaw/m21Uab2294qfSTLh+fmNrYZvPIU2C582Rv5MmOJfAA95s4uGErSh4v3
jML/1av1eg1Yyav/Au5HN+wlpAEA

-->

</rfc>
